Sciweavers

2043 search results - page 161 / 409
» Reasoning About Security Models
Sort
View
104
Voted
SPEECH
2010
89views more  SPEECH 2010»
14 years 7 months ago
Which words are hard to recognize? Prosodic, lexical, and disfluency factors that increase speech recognition error rates
Despite years of speech recognition research, little is known about which words tend to be misrecognized and why. Previous work has shown that errors increase for infrequent words...
Sharon Goldwater, Daniel Jurafsky, Christopher D. ...
90
Voted
CCS
1993
ACM
15 years 5 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
ESORICS
2006
Springer
15 years 4 months ago
A Linear Logic of Authorization and Knowledge
We propose a logic for specifying security policies at a very el of abstraction. The logic accommodates the subjective nature of affirmations for authorization and knowledge withou...
Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pf...
132
Voted
AGENTS
2001
Springer
15 years 5 months ago
A fuzzy model of reputation in multi-agent systems
Agents are intended to interact in open systems where the knowledge about others (reputation) is incomplete and uncertain. Also, this knowledge about other agents is subjective si...
Javier Carbo Rubiera, José M. Molina L&oacu...
ER
2007
Springer
193views Database» more  ER 2007»
15 years 7 months ago
Applying Model Transformation By-Example on Business Process Modeling Languages
Model transformations are playing a vital role in the field of model engineering. However, for non-trivial transformation issues most approaches require imperative definitions, w...
Michael Strommer, Marion Murzek, Manuel Wimmer