Sciweavers

1998 search results - page 59 / 400
» Situated Control Rules
Sort
View
144
Voted
COLCOM
2009
IEEE
15 years 8 months ago
Aggregating uncertain access risk estimations from different sources invited paper
Risk-based access control raises some novel problems that have not yet been investigated. In particular, the ability to aggregate uncertain risk estimations from different experts...
Qun Ni, Elisa Bertino
SKG
2006
IEEE
15 years 10 months ago
Abox Inference for Large Scale OWL-Lite Data
Abox inference is an important part in OWL data management. When involving large scale of instance data, it can not be supported by existing inference engines. In this paper, we p...
Xiaofeng Wang, Jianbo Ou, Xiaofeng Meng, Yan Chen
COMPSAC
2006
IEEE
15 years 10 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
133
Voted
AAAI
2007
15 years 6 months ago
Reasoning from Desires to Intentions: A Dialectical Framework
Here, we define a framework where defeasible argumentation is used for reasoning about beliefs, desires and intentions. A dialectical filtering process is introduced to obtain a...
Nicolás D. Rotstein, Alejandro Javier Garc&...
136
Voted
JSW
2007
106views more  JSW 2007»
15 years 3 months ago
A Multimodal Biometric System Implemented within an Active Database Management System
— Active databases have been used in many different fields to accomplish many different tasks. One of the main problems today that still have not been solved is authorization. In...
Kornelije Rabuzin, Miroslav Baca, Mirko Malekovic