-
4
-
-
0030388964
-
Secure spread spectrum watermarking for images, audio and video
-
Cox, I. J., J. Kilian, F.T. Leighton, T. Shamoon 1996. Secure spread spectrum watermarking for images, audio and video. International Conference on Image Processing, Vol. 3, pp. 243-246.
-
(1996)
International Conference on Image Processing
, vol.3
, pp. 243-246
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
5
-
-
58849141394
-
A review of water-marking and the importance of perceptual modeling
-
Cox, I. J., and M. L. Miller 1996. A review of water-marking and the importance of perceptual modeling. Proc. SPIE - Int. Soc. Opt. Eng., Vol. 3016, pp. 92-99.
-
(1996)
Proc. SPIE - Int. Soc. Opt. Eng.
, vol.3016
, pp. 92-99
-
-
Cox, I.J.1
Miller, M.L.2
-
8
-
-
12244306360
-
Ontology development for machine translation: Ideology and methodology
-
Las Cruces, NM, New Mexico State University, Computing Research Laboratory
-
Mahesh, K. 1996. Ontology Development for Machine Translation: Ideology and Methodology. Memoranda in Computer and Cognitive Science, MCCS-96-292. Las Cruces, NM, New Mexico State University, Computing Research Laboratory.
-
(1996)
Memoranda in Computer and Cognitive Science
, vol.MCCS-96-292
-
-
Mahesh, K.1
-
10
-
-
0013294536
-
-
Latest (Macintosh) version available for download at ftp://ftp.realsoftware.com/developer\_examples/applications/
-
Meunier, Pascal C. 1998. Sing-a-Password: Quality Random Password Generation with Mnemonics. Description by the author at http://home.spry-net.com/sprynet/meunierp/singit.html}. Latest (Macintosh) version available for download at ftp://ftp.realsoftware.com/developer\_examples/applications/.
-
(1998)
Sing-a-Password: Quality Random Password Generation with Mnemonics
-
-
Meunier, P.C.1
-
11
-
-
84962372339
-
What is a secret and what does it have to do with computer security?
-
Los Alamitos, CA: IEEE Computer Society Press
-
Nelson, R. 1997. What is a secret and what does it have to do with computer security? Proceedings. 1994 SIGSAG New Security Paradigms Workshop. Little Compton, RI. Los Alamitos, CA: IEEE Computer Society Press, pp. 74-79.
-
(1997)
Proceedings. 1994 SIGSAG New Security Paradigms Workshop. Little Compton, RI
, pp. 74-79
-
-
Nelson, R.1
-
12
-
-
84936823528
-
The subworld concept lexicon and the lexicon management system
-
Nirenburg, S., and V. Raskin 1987. The subworld concept lexicon and the lexicon management system. Computational Linguistics, 13:3-4, pp. 276-289.
-
(1987)
Computational Linguistics
, vol.13
, Issue.3-4
, pp. 276-289
-
-
Nirenburg, S.1
Raskin, V.2
-
13
-
-
0012982333
-
Ten choices for lexical semantics
-
Las Cruces, NM, New Mexico State University, Computing Research Laboratory
-
Nirenburg, S., and V. Raskin 1996. Ten Choices for Lexical Semantics. Memoranda in Computer and Cognitive Science, MCCS-96-304. Las Cruces, NM, New Mexico State University, Computing Research Laboratory.
-
(1996)
Memoranda in Computer and Cognitive Science
, vol.MCCS-96-304
-
-
Nirenburg, S.1
Raskin, V.2
-
14
-
-
0040639183
-
Universal grammar and lexis for quick ramp-up of MT systems
-
Montreal: University of Montreal
-
Nirenburg, S., and V. Raskin 1998. Universal grammar and lexis for quick ramp-up of MT systems. Proceedings of ACL/COLING '98, Vol. 2. Montreal: University of Montreal, pp. 975-979.
-
(1998)
Proceedings of ACL/COLING '98
, vol.2
, pp. 975-979
-
-
Nirenburg, S.1
Raskin, V.2
-
16
-
-
0029486970
-
A lexicon for knowledge-based MT
-
Onyshkevych, B., and S. Nirenburg 1995. A lexicon for knowledge-based MT. Machine Translation, 10:1-2, pp. 5-57.
-
(1995)
Machine Translation
, vol.10
, Issue.1-2
, pp. 5-57
-
-
Onyshkevych, B.1
Nirenburg, S.2
-
17
-
-
0013190270
-
Software watermarking with secret keys
-
Purdue University, W. Lafayette, IN, April 21
-
Palsberg, J. 2000. Software watermarking with Secret keys. Paper at the CERIAS Annual Research Symposium on "Advancing the State and Practice of Information Assurance and Security," Purdue University, W. Lafayette, IN, April 21.
-
(2000)
CERIAS Annual Research Symposium on "Advancing the State and Practice of Information Assurance and Security,"
-
-
Palsberg, J.1
-
19
-
-
79951918191
-
Computer implementation of the general verbal theory of humor
-
Raskin, V. 1996. Computer implementation of the general verbal theory of humor. In Hulstijn and Nijholt, pp. 9-19.
-
(1996)
Hulstijn and Nijholt
, pp. 9-19
-
-
Raskin, V.1
-
20
-
-
84969479905
-
Non-literalness and non-bona-fide in language: Approaches to format and computational treatments of humor
-
Raskin, V., and S. Attardo 1994. Non-literalness and non-bona-fide in language: Approaches to format and computational treatments of humor. Cognition and Pragmatics, 2:1, pp. 31-69.
-
(1994)
Cognition and Pragmatics
, vol.2
, Issue.1
, pp. 31-69
-
-
Raskin, V.1
Attardo, S.2
-
21
-
-
0013191699
-
Humor in human-computer interface
-
College Park, MD, January 28
-
Raskin, V., S. Nirenburg, and O. Stock 2000. Humor in Human-Computer Interface. Panel, The Art Gliner Center of Humor Studies, University of Maryland, College Park, MD, January 28, http://www.otal.umd.edu/amst/humorcenter/.
-
(2000)
Panel, The Art Gliner Center of Humor Studies
-
-
Raskin, V.1
Nirenburg, S.2
Stock, O.3
-
22
-
-
0013240866
-
Preventing weak password choices
-
National Institute of Standards and National Security Institute
-
Spafford. E. H. 1991. Preventing weak password choices. Proceedings of the 14th National Computer Security Conference, National Institute of Standards and National Security Institute, pp. 446-455.
-
(1991)
Proceedings of the 14th National Computer Security Conference
, pp. 446-455
-
-
Spafford, E.H.1
-
23
-
-
0013197874
-
Observing reusable password choices
-
The USENIX Association
-
Spafford, E. H. 1992a. Observing reusable password choices. 3rd USENIX UNIX Security Symposium, The USENIX Association. pp. 299-312.
-
(1992)
3rd USENIX UNIX Security Symposium
, pp. 299-312
-
-
Spafford, E.H.1
-
24
-
-
0026869371
-
OPUS: Preventing weak password choices
-
Spafford, E. H. 1992b. OPUS: Preventing weak password choices. Computers & Security, 11:3, pp. 273-278.
-
(1992)
Computers & Security
, vol.11
, Issue.3
, pp. 273-278
-
-
Spafford, E.H.1
-
26
-
-
4243471564
-
Computational semantic lexicon acquisition: Methodology and guidelines
-
Las Cruces, NM, New Mexico State University, Computing Research Laboratory
-
Viegas, E., and V. Raskin 1998. Computational Semantic Lexicon Acquisition: Methodology and Guidelines. Memoranda in Computer and Cognitive Science, MCCS-98-315. Las Cruces, NM, New Mexico State University, Computing Research Laboratory.
-
(1998)
Memoranda in Computer and Cognitive Science
, vol.MCCS-98-315
-
-
Viegas, E.1
Raskin, V.2
|