Sciweavers

371 search results - page 35 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
JCS
2010
124views more  JCS 2010»
14 years 8 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
AAAI
2004
14 years 11 months ago
Common Sense Data Acquisition for Indoor Mobile Robots
Common sense knowledge can be efficiently collected from non-experts over the web in a similar fashion to the Open Mind family of distributed knowledge capture projects. We descri...
Rakesh Gupta, Mykel J. Kochenderfer
88
Voted
HPCA
2006
IEEE
15 years 10 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
ECAI
2008
Springer
14 years 11 months ago
Approximate structure preserving semantic matching
Abstract. Typical ontology matching applications, such as ontology integration, focus on the computation of correspondences holding between the nodes of two graph-like structures, ...
Fausto Giunchiglia, Mikalai Yatskevich, Fiona McNe...
74
Voted
MIDDLEWARE
2007
Springer
15 years 3 months ago
A Policy Management Framework for Content-Based Publish/Subscribe Middleware
Abstract. Content-based Publish/Subscribe (CPS) is a powerful paradigm providing loosely-coupled, event-driven messaging services. Although the general CPS model is well-known, man...
Alex Wun, Hans-Arno Jacobsen