Sciweavers

538 search results - page 100 / 108
» Natural Language Access to Software Applications
Sort
View
CCS
2007
ACM
14 years 2 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
CCS
2005
ACM
14 years 2 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
LREC
2008
101views Education» more  LREC 2008»
13 years 10 months ago
The QALL-ME Benchmark: a Multilingual Resource of Annotated Spoken Requests for Question Answering
This paper presents the QALL-ME benchmark, a multilingual resource of annotated spoken requests in the tourism domain, freely available for research purposes. The languages curren...
Elena Cabrio, Milen Kouylekov, Bernardo Magnini, M...
AND
2010
13 years 6 months ago
Reshaping automatic speech transcripts for robust high-level spoken document analysis
High-level spoken document analysis is required in many applications seeking access to the semantic content of audio data, such as information retrieval, machine translation or au...
Julien Fayolle, Fabienne Moreau, Christian Raymond...
SIGCOMM
2009
ACM
14 years 2 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...