77 research outputs found

    Emergent faithfulness to morphological and semantic heads in lexical blends

    Get PDF
    In many languages, sounds in certain "privileged" positions preserve marked structure which is eliminated elsewhere (Positional Faithfulness, Beckman 1998).  This paper presents new corpus and experimental evidence that faithfulness to main-stress location and segmental content of morpho-semantic heads emerges in English blends. The study compared right-headed (subordinating) blends, like motor + hotel -> motel (a kind of hotel) with coordinating blends like spoon + fork -> spork (equally spoon and fork).Stress: Analysis of 1095 blends from Thurner (1993) found that right-headed blends were more faithful to stress location of the second source word than were coordinating blends.  Given source words with conflicting stress (e.g., FLOUNder + sarDINE), participants preferentially matched the blend that preserved second-word stress (flounDINE) to a right-headed definition.Segmental content: When source-word length was controlled, segments from right-headed blends were more likely to survive than those from coordinating blends.  Given source words that could be spliced at two points (e.g., flaMiNGo + MoNGoose), participants preferentially matched the one that preserved more of the second word (flamongoose) to a right-headed definition.These results support the hypotheses that Positional Faithfulness constraints are universally available, that heads are a privileged position, and that blend phonology is sensitive to headedness

    Authentication via Keystroke Dynamics

    No full text
    In an effort to confront the challenges brought forward by the networking revolution of the past few years, we present improved techniques for authorized access to computer system resources and data. More than ever before, the Internet is changing computing as we know it. The possibilities of this global network seem limitless; unfortunately, with this global access comes increased chances of malicious attack and intrusion. Alternatives to traditional access control measures are in high demand. In what follows we present one such alternative : computer access via keystroke dynamics. A database of 42 profiles was constructed based on keystrokes patterns gathered from various users performing structured and unstructured tasks. We study the performance of a system for recognition of these users, and present a toolkit for analyzing system performance under varying criteria. Keywords: Biometrics, keystroke dynamics, pattern recognition, computer security. 1 Introduction Todays' society de..
    • …
    corecore