Changes between Version 14 and Version 15 of SD2010-SemTech-Project-session

Show
Ignore:
Timestamp:
06/10/10 10:32:35 (14 years ago)
Author:
titiroman (IP: 129.241.153.126)
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • SD2010-SemTech-Project-session

    v14 v15  
    1212 * Abstract: The presentation will  highlight how formal logical representations can be used for information  retrieval purposes in indefinite contexts such as, e.g., multimedia  information systems. In these contexts, data is inherently unstructured  and under-determined, and statements which cannot be derived to hold  cannot be assumed to be false (in particular if data is provided  incrementally, which is often the case). Furthermore, not knowing  concrete names for objects set into relation to a certain object at a  specific point in time cannot be handled by assuming that they do not  exist, or by even signalling an exception. The presentation shows how  expressive logical representation formalisms can nevertheless be used to  provide certain answers. We will also show how additional data  descriptions can be systematically derived such that symbolic structures  better represent which meaning a set of data has for humans in a  certain context. 
    1313 
    14 !14:30 - !14:50 [https://www.posccaesar.org/attachment/wiki/SD2010-SemTech-Project-session/chowdhury_SemanticDays02062010-.pdf Applicability  of Semantic Technologies in Security, Privacy and   Trust]'''', by Mohammad  Chowdhury, UNIK-University Graduate Center at   Kjeller, Norway 
     14!14:30 - !14:50 [https://www.posccaesar.org/attachment/wiki/SD2010-SemTech-Project-session/chowdhury_SemanticDays02062010-.pdf Applicability  of Semantic Technologies in Security, Privacy and   Trust], by Mohammad  Chowdhury, UNIK-University Graduate Center at   Kjeller, Norway 
    1515 
    1616 * Abstract:  Secure and privacy aware access can be achieved   through access control  mechanism. There are challenges in the   specification of flexible,  personalized and granular access   constraints. These concerns can be  addressed by the semantic   technologies through the formal knowledge  representation, rule-based   constraint specification and automated  reasoning capabilities. Such   semantic access control mechanism can be  applied not only on the Web   but also in the context of devices. This  talk provides an architectural   overview of the mechanism including a  brief presentation of the   research results and some of the research  challenges. 
Home
About PCA
Reference Data Services
Projects
Workgroups