Sciweavers

255 search results - page 24 / 51
» Principles for Entity Authentication
Sort
View
TASLP
2008
141views more  TASLP 2008»
14 years 9 months ago
Unsupervised Pattern Discovery in Speech
We present a novel approach to speech processing based on the principle of pattern discovery. Our work represents a departure from traditional models of speech recognition, where t...
A. S. Park, J. R. Glass
59
Voted
ACL
1990
14 years 11 months ago
Normal State Implicature
In the right situation, a speaker can use an unqualified indefinite description without being misunderstood. This use of language, normal slate implicature, is a kind of conversat...
Nancy Green
ISCI
2007
90views more  ISCI 2007»
14 years 9 months ago
Database design and querying within the fuzzy semantic model
Fuzzy semantic model (FSM) is a data model that uses basic concepts of semantic modeling and supports handling fuzziness, uncertainty and imprecision of real-world at the attribut...
Rafik Bouaziz, Salem Chakhar, Vincent Mousseau, Su...
64
Voted
EUROSYS
2007
ACM
15 years 6 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
85
Voted
WETICE
2009
IEEE
15 years 4 months ago
Maintaining Unlinkability in Group Based P2P Environments
Abstract—In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communicati...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...