Sciweavers

255 search results - page 24 / 51
» Principles for Entity Authentication
Sort
View
TASLP
2008
141views more  TASLP 2008»
13 years 8 months ago
Unsupervised Pattern Discovery in Speech
We present a novel approach to speech processing based on the principle of pattern discovery. Our work represents a departure from traditional models of speech recognition, where t...
A. S. Park, J. R. Glass
ACL
1990
13 years 9 months ago
Normal State Implicature
In the right situation, a speaker can use an unqualified indefinite description without being misunderstood. This use of language, normal slate implicature, is a kind of conversat...
Nancy Green
ISCI
2007
90views more  ISCI 2007»
13 years 8 months ago
Database design and querying within the fuzzy semantic model
Fuzzy semantic model (FSM) is a data model that uses basic concepts of semantic modeling and supports handling fuzziness, uncertainty and imprecision of real-world at the attribut...
Rafik Bouaziz, Salem Chakhar, Vincent Mousseau, Su...
EUROSYS
2007
ACM
14 years 5 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
WETICE
2009
IEEE
14 years 3 months ago
Maintaining Unlinkability in Group Based P2P Environments
Abstract—In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communicati...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...