5,706 research outputs found

    Sound Scholarship: Scope, Purpose, Function and Potential of Phonorecord Archives

    Get PDF
    published or submitted for publicatio

    Special Libraries, Winter 1986

    Get PDF
    Volume 77, Issue 1https://scholarworks.sjsu.edu/sla_sl_1986/1000/thumbnail.jp

    Design and evaluation of acceleration strategies for speeding up the development of dialog applications

    Get PDF
    In this paper, we describe a complete development platform that features different innovative acceleration strategies, not included in any other current platform, that simplify and speed up the definition of the different elements required to design a spoken dialog service. The proposed accelerations are mainly based on using the information from the backend database schema and contents, as well as cumulative information produced throughout the different steps in the design. Thanks to these accelerations, the interaction between the designer and the platform is improved, and in most cases the design is reduced to simple confirmations of the “proposals” that the platform dynamically provides at each step. In addition, the platform provides several other accelerations such as configurable templates that can be used to define the different tasks in the service or the dialogs to obtain or show information to the user, automatic proposals for the best way to request slot contents from the user (i.e. using mixed-initiative forms or directed forms), an assistant that offers the set of more probable actions required to complete the definition of the different tasks in the application, or another assistant for solving specific modality details such as confirmations of user answers or how to present them the lists of retrieved results after querying the backend database. Additionally, the platform also allows the creation of speech grammars and prompts, database access functions, and the possibility of using mixed initiative and over-answering dialogs. In the paper we also describe in detail each assistant in the platform, emphasizing the different kind of methodologies followed to facilitate the design process at each one. Finally, we describe the results obtained in both a subjective and an objective evaluation with different designers that confirm the viability, usefulness, and functionality of the proposed accelerations. Thanks to the accelerations, the design time is reduced in more than 56% and the number of keystrokes by 84%

    Special Libraries, October 1963

    Get PDF
    Volume 54, Issue 8https://scholarworks.sjsu.edu/sla_sl_1963/1007/thumbnail.jp

    The ACCENT Policy Wizard

    Get PDF
    The ACCENT project (Advanced Component Control Enhancing Network Technologies) developed a practical and comprehensive policy system for call control/Internet telephony. The policy system has subsequently been extended for management of sensor networks/wind farms and of home care/telecare. This report focuses on a web-based policy wizard that acts as the primary interface between end users and the policy system. The policy wizard has an intimate knowledge of the APPEL policy language (Adaptable and Programmable Policy Environment and Language). The wizard allows end users to create policies using nearnatural language without knowing or seeing XML, and to upload them to the policy system. The wizard also provides a number of convenience functions such as predefined policy templates, editing and activating existing policies, and defining policy variables. Relative to the version of December 2005, this Technical Report has been updated as follows to reflect changes in the policy wizard: - The whole report has been updated to reflect later work on the PROSEN and MATCH projects. As a result, the ACCENT and APPEL acronyms have changed. Call control, however, remains are the primary illustration of the approach in this report. - Chapter 1 is now named ‘Introduction’, and a brief ‘Conclusion’ chapter has been added in section 4. - Chapter 2 has been updated to sheet screenshots of the new policy wizard. The wizard now handles resolution policies. - The wizard now makes use of ontologies, as described briefly in section 3.1. All domain-specific knowledge is held outside the wizard, so that largely common code can be used across all domains. As a result, the wizard configuration now also refers to the POPPET server. - Section 3.6 describes a new code structure that allows different versions of the wizard to coexist. - A brief explanation has been given in section 3.8 of what is involved in supporting a new application domain with the wizard

    Special Libraries, December 1964

    Get PDF
    Volume 55, Issue 10https://scholarworks.sjsu.edu/sla_sl_1964/1009/thumbnail.jp

    Special Libraries, December 1964

    Get PDF
    Volume 55, Issue 10https://scholarworks.sjsu.edu/sla_sl_1964/1009/thumbnail.jp

    Evaluation of M-Sites Using PDAs

    Get PDF
    As mobile sites (m-sites) are introduced a very relevant question to ask is “How should these sites be different from the typical websites developed for desktop PCs?” This paper presents an initial, exploratory attempt to address some issues related to m-sites. This evaluation of sites was conducted using wireless PDAs in a WLAN environment. The results indicated that regular sites and m-sites differed significantly in perceived search engine functionality. The evaluated m-sites showed little differences across various industries. A discussion of these results as well as recommendations for managers and academic researchers are provided

    Relational multimedia databases.

    Get PDF

    Public Key Infrastructure based on Authentication of Media Attestments

    Full text link
    Many users would prefer the privacy of end-to-end encryption in their online communications if it can be done without significant inconvenience. However, because existing key distribution methods cannot be fully trusted enough for automatic use, key management has remained a user problem. We propose a fundamentally new approach to the key distribution problem by empowering end-users with the capacity to independently verify the authenticity of public keys using an additional media attestment. This permits client software to automatically lookup public keys from a keyserver without trusting the keyserver, because any attempted MITM attacks can be detected by end-users. Thus, our protocol is designed to enable a new breed of messaging clients with true end-to-end encryption built in, without the hassle of requiring users to manually manage the public keys, that is verifiably secure against MITM attacks, and does not require trusting any third parties
    • 

    corecore