No abstract available.
Cited By
- Hartmann B, Abdulla L, Mittal M and Klemmer S Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognition Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (145-154)
- Hall R Generalized behavior-based retrieval Proceedings of the 15th international conference on Software Engineering, (371-380)
Recommendations
Is This Argument Justified, Overruled or Defensible?
DEXA '99: Proceedings of the 10th International Conference on Database and Expert Systems ApplicationsThe purpose of this paper is to develop a theory for argumentation. Its central notion is the determination whether an argument is justified, overruled or defensible in an argumentation framework on the basis of priority. Most approaches are based on a ...
Skeptic: Automatic, Justified and Privacy-Preserving Password Composition Policy Selection
ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications SecurityThe choice of password composition policy to enforce on a password-protected system represents a critical security decision, and has been shown to significantly affect the vulnerability of user-chosen passwords to guessing attacks. In practice, however, ...
Explicit Generalization as Generalization of Semantic Generalization
ACIT-CSI '15: Proceedings of the 2015 3rd International Conference on Applied Computing and Information Technology/2nd International Conference on Computational Science and IntelligenceThe semantic generalization was proposed. This generalization makes it possible for a kind of class to have attributes by considering the semantics of the attributes of the subclasses even if there is no common attribute in the subclasses. The ...