Reinforcement learning for personalization: A systematic literature review

F Den Hengst, EM Grua, A el Hassouni… - Data …, 2020 - content.iospress.com
The major application areas of reinforcement learning (RL) have traditionally been game
playing and continuous control. In recent years, however, RL has been increasingly applied …

A critical analysis of legal requirements engineering from the perspective of legal practice

G Boella, L Humphreys, R Muthuri… - 2014 IEEE 7th …, 2014 - ieeexplore.ieee.org
This paper reviews existing approaches to representing legal knowledge for legal
requirements engineering. Legal requirement methodologies are rarely developed together …

Automated extraction of semantic legal metadata using natural language processing

A Sleimi, N Sannier, M Sabetzadeh… - 2018 IEEE 26th …, 2018 - ieeexplore.ieee.org
[Context] Semantic legal metadata provides information that helps with understanding and
interpreting the meaning of legal provisions. Such metadata is important for the systematic …

Eunomos, a legal document and knowledge management system for the web to provide relevant, reliable and up-to-date information on the law

G Boella, LD Caro, L Humphreys, L Robaldo… - Artificial Intelligence and …, 2016 - Springer
This paper describes the Eunomos software, an advanced legal document and knowledge
management system, based on legislative XML and ontologies. We describe the challenges …

[PDF][PDF] The usable privacy policy project

N Sadeh, A Acquisti, TD Breaux… - … , CMU-ISR-13 …, 2013 - reports-archive.adm.cs.cmu.edu
Natural language privacy policies have become a de facto standard to address expectations
of “notice and choice” on the Web [FTC10]. Yet, there is ample evidence that users generally …

Scaling requirements extraction to the crowd: Experiments with privacy policies

TD Breaux, F Schaub - 2014 IEEE 22nd International …, 2014 - ieeexplore.ieee.org
Natural language text sources have increasingly been used to develop new methods and
tools for extracting and analyzing requirements. To validate these new approaches …

Large-scale and drift-free surface reconstruction using online subvolume registration

N Fioraio, J Taylor, A Fitzgibbon… - Proceedings of the …, 2015 - openaccess.thecvf.com
Depth cameras have helped commoditize 3D digitization of the real-world. It is now feasible
to use a single Kinect-like camera to scan in an entire building or other large-scale scenes …

Evaluating existing security and privacy requirements for legal compliance

AK Massey, PN Otto, LJ Hayward, AI Antón - Requirements engineering, 2010 - Springer
Governments enact laws and regulations to safeguard the security and privacy of their
citizens. In response, requirements engineers must specify compliant system requirements …

Automatic extraction of access control policies from natural language documents

M Narouei, H Takabi, R Nielsen - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A fundamental management responsibility is securing information systems. Almost all
applications that deal with safety, privacy, or defense include some form of access control …

Automated certification for compliant cloud-based business processes

R Accorsi, L Lowis, Y Sato - Business & Information Systems Engineering, 2011 - Springer
A key problem in the deployment of large-scale, reliable cloud computing concerns the
difficulty to certify the compliance of business processes operating in the cloud. Standard …