Automatic English inflection
276 pages
English

Automatic English inflection

-

Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres
276 pages
English
Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres

Description

  • fiche de synthèse - matière potentielle : the noun classes
[Proceedings of the National Symposium on Machine Translation, UCLA February 1960] Session 5: GRAMMATICAL STUDIES AUTOMATIC ENGLISH INFLECTION1 William D. Foust Harvard University This paper is a description of a system for classifying English nouns and verbs into inflectional classes semi-automatically, and for inflecting English automatically, using these inflectional classes. The inflectional classification system has been applied to the English correspondents in the Harvard automatic dictionary file, and the in- flection process itself is intended to be a part of the English synthesis procedure in translation.
  • regular classification procedure
  • correspondents
  • part of the transla- tion procedure
  • class marker
  • noun noun classification figure
  • inflectional classes
  • nouns
  • noun
  • 3verbs
  • verbs
  • system

Sujets

Informations

Publié par
Nombre de lectures 15
Langue English
Poids de l'ouvrage 2 Mo

Extrait

Sun Java™ System
Identity Manager 6.0 2005Q4M3
Administration
Sun Microsystems, Inc.
4150 Network Circle
Santa Clara, CA 95054
U.S.A.
Part No: 819-4481-10Copyright © 2006 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights
reserved.
U.S. Government Rights - Commercial software. Government users are subject to the Sun Microsystems, Inc.
standard license agreement and applicable provisions of the FAR and its supplements.
Use is subject to license terms.
This distribution may include materials developed by third parties.
Sun, Sun Microsystems, the Sun logo, Java, SunTone, The Network is the Computer, We're the dot in .com and
iForce are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries.
UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd.
This product is covered and controlled by U.S. Export Control laws and may be subject to the export or import laws in
other countries. Nuclear, missile, chemical biological weapons or nuclear maritime end uses or end users, whether
direct or indirect, are strictly prohibited. Export or reexport to countries subject to U.S. embargo or to entities identified
on U.S. export exclusion lists, including, but not limited to, the denied persons and specially designated nationals lists
is strictly prohibited.
Waveset, Waveset Lighthouse, and the Waveset logo are trademarks of Waveset Technologies, a Wholly-Owned
Subsidiary of Sun Microsystems, Inc.
Copyright © 2000 The Apache Software Foundation. All rights reserved.
Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution. This product includes
software developed by the Apache Software Foundation (http://www.apache.org/).
Copyright © 2003 AppGate Network Security AB. All rights reserved.
Copyright © 1995-2001 The Cryptix Foundation Limited. All rights reserved.
Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. ributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE CRYPTIX FOUNDATION LIMITED AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE CRYPTIX FOUNDATION LIMITED OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Third party trademarks, trade names, product names, and logos contained in this document may be the trademarks or
registered trademarks of their respective owners.Contents
Contents
Contents
Identity Manager Overview
The Big Picture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1–1
Goals of the Identity Manager System . . . . . . . . . . . . . . . . . .1–1
Defining User Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1–2
Delegating Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . .1–3
Identity Manager Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1–3
User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1–4
Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1–4
Resources and Resource Groups . . . . . . . . . . . . . . . . . . . . .1–5
Organizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1–7
Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1–7
Admin Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1–7
Object Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1–8
Identity Manager Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1–10
Getting Started with Identity Manager
Identity Manager Interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2–1
Identity Manager Administrator Interface . . . . . . . . . . . . . . . .2–1y Manager User Interface . . . . . . . . . . . . . . . . . . . . . .2–2
Identity Manager Business Process Editor . . . . . . . . . . . . . . .2–3
Help and Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2–4
Identity Manager Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2–4
Finding Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2–4
Search Behavior. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2–5
Advanced Query Syntax. . . . . . . . . . . . . . . . . . . . . . . . . .2–5
Identity Manager Guidance. . . . . . . . . . . . . . . . . . . . . . . . . . .2–7y Manager Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2–8
Where to Go from Here. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2–11
User and Account Management
About User Account Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3–1
Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3–1
Assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3–2
Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3–2
Contents v
Contents
Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–4
Accounts Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–4
Actions Lists in the Accounts Area. . . . . . . . . . . . . . . . . . . . . 3–5
Searching in the Accounts Area. . . . . . . . . . . . . . . . . . . . . . . 3–5
User Account Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–6
Working with User Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–6
Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–7
View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–7
Create (New Actions List, New User Selection) . . . . . . . 3–7
Creating Multiple User Accounts (Identities) . . . . . . . . . . 3–8
Edit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–8
Move Users (User Actions) . . . . . . . . . . . . . . . . . . . . . . . 3–9
Rename (User Actions) . . . . . . . . . . . . . . . . . . . . . . . . . . 3–9
Disable Users (User Actions, Organization Actions. . . . 3–10
Enable Users (User Actions, Organization Actions) . . . 3–12
Update Users (User Actions, Organization Actions) . . . 3–12
Unlock Users (User Actions, Organization Actions) . . . 3–14
Deletion (User Actions, Organization Actions) . . . . . . . 3–15
Finding Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–17
Setting Password Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–18
Creating a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–19
Length Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–19
Character Type Rules . . . . . . . . . . . . . . . . . . . . . . . . . . 3–19
Minimum Number of Character Type Rules. . . . . . . . . . 3–19
Dictionary Policy Selection . . . . . . . . . . . . . . . . . . . . . . 3–20
Password History Policy . . . . . . . . . . . . . . . . . . . . . . . . 3–20
Must Not Contain Words . . . . . . . . . . . . . . . . . . . . . . . . 3–21
Must Not Contain Attributes. . . . . . . . . . . . . . . . . . . . . . 3–21
Implementing Password Policies . . . . . . . . . . . . . . . . . . . . . 3–21
Working with User Account Passwords . . . . . . . . . . . . . . . . . . . 3–22
Changing User Account Passwords. . . . . . . . . . . . . . . . . . . 3–22
Resetting User Account Passwords. . . . . . . . . . . . . . . . . . . 3–23
Password Expiration on Reset. . . . . . . . . . . . . . . . . . . . 3–23
User Self-Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–24
Enabling Self-Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–24
User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–25
Personalized Authentication Questions . . . . . . . . . . . . . . . . 3–26
Bypassing the Change Password Challenge
after Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–26
Bulk Account Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–28
Launching Bulk Account Actions . . . . . . . . . . . . . . . . . . . . . 3–28
vi Contents
Contents
Using Action Lists . . . . .

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents