Sciweavers

5101 search results - page 182 / 1021
» Capturing Context Requirements
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 10 days ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
LICS
1991
IEEE
13 years 11 months ago
Logic Programming in a Fragment of Intuitionistic Linear Logic
When logic programming is based on the proof theory of intuitionistic logic, it is natural to allow implications in goals and in the bodies of clauses. Attempting to prove a goal ...
Joshua S. Hodas, Dale Miller
LREC
2010
141views Education» more  LREC 2010»
13 years 9 months ago
Evaluating Distributional Properties of Tagsets
We investigate which distributional properties should be present in a tagset by examining different mappings of various current part-ofspeech tagsets, looking at English, German, ...
Markus Dickinson, Charles Jochim
PAKM
2004
13 years 9 months ago
Integrating Knowledge Management and Groupware in a Software Development Environment
Knowledge is one of the organization's most valuable assets. In the context of software development, knowledge management can be used to capture knowledge and experience gener...
Ricardo de Almeida Falbo, Daniel O. Arantes, Ana C...
GW
2009
Springer
174views Biometrics» more  GW 2009»
13 years 6 months ago
Towards a Gesture-Sound Cross-Modal Analysis
This article reports on the exploration of a method based on canonical correlation analysis (CCA) for the analysis of the relationship between gesture and sound in the context of m...
Baptiste Caramiaux, Frédéric Bevilac...