Sciweavers

2458 search results - page 371 / 492
» Database-Management Principles And Applications
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
DSD
2009
IEEE
118views Hardware» more  DSD 2009»
15 years 1 months ago
On the Risk of Fault Coupling over the Chip Substrate
—Duplication and comparison has proven to be an efficient method for error detection. Based on this generic principle dual core processor architectures with output comparison ar...
Peter Tummeltshammer, Andreas Steininger
ASIAMS
2008
IEEE
14 years 12 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
COLING
1992
14 years 11 months ago
The Kant System: Fast, Accurate, High-Quality Translation In Practical Domains
Knowledge-based interlingual machine translation systems produce semantically accurate translations, but typically require massive knowledge acquisition. Ongoing research and deve...
Eric Nyberg, Teruko Mitamura
IJCAI
1989
14 years 11 months ago
Layering Predictions: Flexible Use of Dialog Expectation in Speech Recognition
entional user behavior, we need a principled mannerAbstract for relaxing contextual constraints when they are violated.When computer speech recognition is used for problem In order...
Sheryl R. Young, Wayne H. Ward, Alexander G. Haupt...