منابع مشابه
Offline Delegation
This article describes mechanisms for offline delegation of access rights to files maintained by a distributed “File Repository”. The mechanisms are designed for a target environment where personal machines are used at times when critical services, such as authentication and authorization services, are not accessible. We demonstrate how valid delegation credentials can be transferred verbally w...
متن کاملOFFLINE CONSOLIDATION 1 Running head: OFFLINE CONSOLIDATION Offline consolidation in implicit sequence learning
The goal of this study was to investigate offline memory consolidation with regard to general motor skill learning and implicit sequence-specific learning. We trained young adults on a serial reaction time task with a retention interval of either 24 hours (Experiment 1) or 1 week (Experiment 2) between two sessions. We manipulated sequence complexity (deterministic vs. probabilistic) and motor ...
متن کاملHandwriting Recognition – “Offline” Approach
There are many things we humans have in common. But there are other things that are very unique to every individual DNA, fingerprints, etc. Handwriting is one other such thing that is unique to every individual, which the recent studies on Handwriting analysis have already proved. Although arguable is this issue, that handwriting can be mimicked and forgery becoming a huge issue, there is certa...
متن کاملTaking Entity Reconciliation Offline
Entity reconciliation—linking names or terms to identifiers in external datasets—is a popular method of adding standardized structured data to loosely structured documents. Most approaches to entity reconciliation rely on remote web services, requiring network access during the reconciliation process. For use cases that rely on a “human in the loop” (reconciling entities during the authoring pr...
متن کاملOffline Signature Recognition
The most commonly used protection mechanisms today are based on either what a person possesses (e.g. an ID card) or what the person remembers (like passwords and PIN numbers). However, there is always a risk of passwords being cracked by unauthenticated users and ID cards being stolen, in addition to shortcomings like forgotten passwords and lost ID cards (Huang & Yan, 1997). To avoid such inco...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Robotics Society of Japan
سال: 1995
ISSN: 0289-1824,1884-7145
DOI: 10.7210/jrsj.13.611