Sciweavers

565 search results - page 89 / 113
» A logic for authorization provenance
Sort
View
94
Voted
CHI
2005
ACM
16 years 2 months ago
Topic spotting common sense translation assistant
Our Translation Assistant applies common sense logic to the problem of translating speech in real time from one language to another. Using speech recognition combined with a softw...
Jae-woo Chung, Rachel Kern, Henry Lieberman
CHI
2004
ACM
16 years 2 months ago
Single-handed interaction techniques for multiple pressure-sensitive strips
We present a set of interaction techniques that make novel use of a small pressure-sensitive pad to allow one-handed direct control of a large number of parameters. The surface of...
Gábor Blaskó, Steven Feiner
126
Voted
TPHOL
2008
IEEE
15 years 8 months ago
A Type of Partial Recursive Functions
We describe a new method to represent (partial) recursive functions in type theory. For every recursive definition, we define a co-inductive type of prophecies that characterises...
Ana Bove, Venanzio Capretta
ESORICS
2007
Springer
15 years 8 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
125
Voted
TLCA
2007
Springer
15 years 8 months ago
Computation by Prophecy
We describe a new method to represent (partial) recursive functions in type theory. For every recursive definition, we define a co-inductive type of prophecies that characterises...
Ana Bove, Venanzio Capretta