نتایج جستجو برای: language access

تعداد نتایج: 733516  

Journal: :Computers and the Humanities 2001
Gareth J. F. Jones Nigel Collier Tetsuya Sakai Kazuo Sumita Hideki Hirakawa

Internet search engines allow access to online information from all over the world. However, there is currently a general assumption that users are uent in the languages of all documents that they might search for. This has for historical reasons usually been a choice between English and the locally supported language. Given the rapidly growing size of the Internet, it is likely that future use...

2009
Sean Policarpio Yan Zhang

The Extensible Markup Language (XML) is utilised in many Internet applications we are using today. However, as with many computing technologies, vulnerabilities exist in XML that can allow for malicious and unauthorised use. Applications that utilise XML are therefore susceptible to security faults if they do not provide their own methods. Our research focuses on developing a formal language wh...

2004
Chenxi Huang Jie Xu Keith Bennett

Role Based Access Control (RBAC) and Access Control List (ACL) are the most commonly adopted access control mechanisms in traditional centralized computing environment. Nowadays people frequently work in a highly dynamic and distributed computing environment, in which two or more heterogeneous systems do not share the same security domain. Traditional access control mechanisms that require pre-...

Background: The cochlear implant has the potential to give an individual access to the frequencies important to access spoken language. The factors that influence outcome are complex and some factors, such as intelligence, working memory ability, and elements within the auditory periphery, are known to be inherent to the patient and not highly amenable to change. However, several factors that a...

2012
Mark Evered

In this paper we describe the formal specification language RASP for expressing fine-grained access control constraints in information systems. The design of the language is motivated by a number of IS case studies which demonstrate the complexity of the access constraints which arise if minimal (need-to-know) access is to be strictly enforced. RASP supports modularity, parameterization, role a...

1998
Gerald Brose

Specifying and managing access control policies for large distributed systems is a non{ trivial task. Commonly, access control policies are speciied in natural language and later reformulated in terms of a particular access control mechanism. Management of policies is thus done in terms of low{level constructs rather than in terms of the speciication. This paper presents and discusses concepts ...

2006
Henrike K. Blumenfeld

The role of phonological neighborhood density in lexical access was examined during nativeand nonnative language production. German-English and English-German bilinguals named pictures of German words with highand low-density neighborhoods. Results revealed that accuracy of picture naming was influenced by phonological neighborhood, with high-density neighborhoods facilitating lexical access in...

1998
Gerald Brose

Specifying and managing access control policies for large distributed systems is a non{ trivial task. Commonly, access control policies are speciied in natural language and later reformulated in terms of a particular access control mechanism. Management of policies is thus done in terms of low{level constructs rather than in terms of the speciication. This paper presents and discusses concepts ...

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید