Sciweavers

1655 search results - page 306 / 331
» Stemming in the language modeling framework
Sort
View
91
Voted
SACMAT
2004
ACM
15 years 3 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
ATAL
2004
Springer
15 years 3 months ago
Accurate and Flexible Simulation for Dynamic, Vision-Centric Robot
As robots become more complex by incorporating dynamic stability or greater mechanical degrees of freedom, the difficulty of developing control algorithms directly on the robot in...
Jared Go, Brett Browning, Manuela M. Veloso
IJCNLP
2004
Springer
15 years 3 months ago
Phoneme-Based Transliteration of Foreign Names for OOV Problem
One problem seriously affecting CLIR performance is the processing of queries with embedded foreign names. A proper noun dictionary is never complete rendering name translation fr...
Wei Gao, Kam-Fai Wong, Wai Lam
93
Voted
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 3 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
82
Voted
ASM
2003
ASM
15 years 3 months ago
An ASM Semantics of UML Derived from the Meta-model and Incorporating Actions
We present an approach towards a formal dynamic semantics for UML using ASM. We aim to remain as close as possible to the standard definition of UML and to cover the operational pa...
Ileana Ober