Sciweavers

11909 search results - page 2310 / 2382
» The Scheme Programming Language
Sort
View
KCAP
2005
ACM
14 years 2 months ago
Automated story capture from conversational speech
While storytelling has long been recognized as an important part of effective knowledge management in organizations, knowledge management technologies have generally not distingui...
Andrew S. Gordon, Kavita Ganesan
EUROPKI
2005
Springer
14 years 2 months ago
A Heterogeneous Network Access Service Based on PERMIS and SAML
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing different authorizatio...
Gabriel López Millán, Óscar C...
CCS
2004
ACM
14 years 2 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
TSD
2004
Springer
14 years 2 months ago
Modeling Prosodic Structures in Linguistically Enriched Environments
A significant challenge in Text-to-Speech (TtS) synthesis is the formulation of the prosodic structures (phrase breaks, pitch accents, phrase accents and boundary tones) of uttera...
Gerasimos Xydas, Dimitris Spiliotopoulos, Georgios...
CAV
1998
Springer
175views Hardware» more  CAV 1998»
14 years 1 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
« Prev « First page 2310 / 2382 Last » Next »