Sciweavers

1094 search results - page 74 / 219
» On Computing Explanations in Argumentation
Sort
View
SAC
2006
ACM
15 years 5 months ago
A framework for content-based image retrieval fully exploiting the semantics of annotation
We present a framework and an application for semanticbased retrieval of images. Our approach adopts a two-level ontology structure in a subset of OWL-DL. In the core ontology onl...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco di...
KIVS
2005
Springer
15 years 4 months ago
On the Distribution of Nodes in Distributed Hash Tables
: We develop a model for the distribution of nodes in ring-based DHTs like Chord that position nodes randomly or based on hash-functions. As benefit of our model we get the distri...
Heiko Niedermayer, Simon Rieche, Klaus Wehrle, Geo...
FOSSACS
2003
Springer
15 years 4 months ago
Type Assignment for Intersections and Unions in Call-by-Value Languages
We develop a system of type assignment with intersection types, union types, indexed types, and universal and existential dependent types that is sound in a call-by-value functiona...
Joshua Dunfield, Frank Pfenning
COLCOM
2009
IEEE
15 years 3 months ago
Aggregating uncertain access risk estimations from different sources invited paper
Risk-based access control raises some novel problems that have not yet been investigated. In particular, the ability to aggregate uncertain risk estimations from different experts...
Qun Ni, Elisa Bertino
NSDI
2008
15 years 1 months ago
Predicted and Observed User Behavior in the Weakest-link Security Game
We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-maki...
Jens Grossklags, Nicolas Christin, John Chuang