Basic Manual
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011)
IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011) November 13, 2011 Shangri-La Hotel Chiang Mai, Thailand IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011) November 13, 2011 Chiang Mai, Thailand We wish to thank our sponsors Gold Sponsors www.google.com www.baidu.com The Office of Naval Research (ONR) Department of Systems Engineering and The Asian Office of Aerospace Research and Devel- Engineering Managment, The Chinese Uni- opment (AOARD) versity of Hong Kong Silver Sponsors Microsoft Corporation Bronze Sponsors Chinese and Oriental Languages Information Processing Society (COLIPS) Supporter Thailand Convention and Exhibition Bureau (TCEB) We wish to thank our sponsors Organizers Asian Federation of Natural Language National Electronics and Computer Technolo- Processing (AFNLP) gy Center (NECTEC), Thailand Sirindhorn International Institute of Technology Rajamangala University of Technology Lanna (SIIT), Thailand (RMUTL), Thailand Chiang Mai University (CMU), Thailand Maejo University, Thailand c 2011 Asian Federation of Natural Language Proceesing vii Preface Welcome to the IJCNLP Workshop on Advances in Text Input Methods (WTIM 2011)! Methods of text input have entered a new era. The number of people who have access to computers and mobile devices is skyrocketing in regions where people do not have a convenient method of inputting their native language. It has also become commonplace to input text not through a keyboard but through different modes such as voice and handwriting recognition. Even when people input text using a keyboard, it is done differently from only a few years ago – adaptive software keyboards, word auto- completion and prediction, and spell correction are just a few examples of such recent changes in text input experience. -
Proceedings of the Second Workshop on Advances in Text Input Methods (WTIM 2)
COLING 2012 24th International Conference on Computational Linguistics Proceedings of the Second Workshop on Advances in Text Input Methods (WTIM 2) Workshop chairs: Kalika Bali, Monojit Choudhury and Yoh Okuno 15 December 2012 Mumbai, India Diamond sponsors Tata Consultancy Services Linguistic Data Consortium for Indian Languages (LDC-IL) Gold Sponsors Microsoft Research Beijing Baidu Netcon Science Technology Co. Ltd. Silver sponsors IBM, India Private Limited Crimson Interactive Pvt. Ltd. Yahoo Easy Transcription & Software Pvt. Ltd. Proceedings of the Second Workshop on Advances in Text Input Methods (WTIM 2) Kalika Bali, Monojit Choudhury and Yoh Okuno (eds.) Revised preprint edition, 2012 Published by The COLING 2012 Organizing Committee Indian Institute of Technology Bombay, Powai, Mumbai-400076 India Phone: 91-22-25764729 Fax: 91-22-2572 0022 Email: [email protected] This volume c 2012 The COLING 2012 Organizing Committee. Licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 Nonported license. http://creativecommons.org/licenses/by-nc-sa/3.0/ Some rights reserved. Contributed content copyright the contributing authors. Used with permission. Also available online in the ACL Anthology at http://aclweb.org ii Preface It is our great pleasure to present the proceedings of the Second Workshop on Advances in Text Input Methods (WTIM-2) held in conjunction with Coling 2012, on 15th December 2012, in Mumbai, India. This workshop is a sequel to the first WTIM which was held in conjunction with IJCNLP 2011 in November 2011, Chiang Mai, Thailand. The aim of the current workshop remains the same as the previous one that is to bring together the researchers and developers of text input technologies around the world, and share their innovations, research findings and issues across different applications, devices, modes and languages. -
Locale Database
International Language Environments Guide Part No: 817–2521–11 November 2010 Copyright © 2005, 2010, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related software documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are “commercial computer software” or “commercial technical data” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms setforth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065. -
Basic Manual
Basic Manual Basic Manual Contents Getting Ready Basic operation Character input Initial settings Internet / Google Talk Mail For inquiries, call: au Customer Service Center Phone For general information and charges (toll free) From fixed-line phones: From au cell phones: Overseas usage area code not required Application PRESSING ZERO WILL CONNECT YOU TO AN OPERATOR AFTER CALLING 157 ON YOUR au CELL PHONE Data management For loss, theft or damage and operation information Wireless LAN (toll free) From fixed-line phones: From au cell phones: Function settings Cell phone and PHS operators collect and recycle unused area code not required telephones, batteries and battery chargers at stores bearing the logo regardless of brand and manufacturer Remote Lock to protect the environment and reuse valuable resources. In case above numbers are not available, (toll free) Appendix/Index (except Okinawa) January 2011 Edition (Okinawa) Sales: KDDI CORPORATION • OKINAWA CELLULAR TELEPHONE COMPANY Manufactured by: FUJITSU TOSHIBA MOBAIL COMUNICATION CORPORATION Preface Before Using IS04 Thank you for purchasing the IS04. • You cannot receive or make calls in a location where the Before using your IS04, be sure to read the IS04 Basic signal cannot be received, even within the service area. Manual (this PDF manual) to ensure correct usage. After you Calling may not be available in a location where the signal have finished reading this manual, store this PDF manual and is weak. If you move to a location where the signal is weak the printed manuals in safe places so you can retrieve them during a call, the call may be interrupted. -
Slides on XFY and Model-Based UI
Relevant work at JustSystems Dave Raggett, W3C/JustSystems ISTI, Pisa, 23 July 2008 Contact: [email protected] 1 JustSystems ● Japanese software developer – Headquarters in Tokushima – Founded in 1979 ● In Japan – ATOK Japanese input method – Ichitaro, word processor, drawing tools, etc. – Full member of Unicode Consortium ● XML software – XMetaL XML-based authoring tool – XFY XML data fusion and app development 2 XFY ● The document is the application ● XFY client – Written in Java – View and edit compound documents ● XHTML, SVG, MathML, Chemical ML ● UI markup (a kind of concrete UI) ● Vocabulary components for charts, pie diagrams – Extends XSLT for dynamic bindings ● Source markup kept in sync with UI ● XFY server – XML repository and interfaces to databases, etc. 3 What is a Vocabulary Component? xfy Client XML data Vocabulary Component <XHTML> XHTML Component <sgv> Input Output </svg> SVG Component VC <math> MathML Component Reflect Edit </math> </XHTML> Other What is VC (Vocabulary Connection)? XML Web browser document Display XSLT Hello World! xfy Enterprise Client XML document Display VC mechanism (XVCD) Update Edit Multi-view Vocabulary Component Vocabulary Component A vocabulary component defines how to display and edit XML documents How to create vocabulary components: • View Designer • XVCD • JAVA XVCD ● Extended version of XSLT that allows you to define event handlers – Update source and target DOM trees in response to use input and application events ● xvcd:action element and event attribute – Commands to modify a DOM tree ● xvcd:delete, -
INSTRUCTION MANUAL ’11.6 Introduction Please Keep a Separate Record of the Information (E.G., Contacts) You Have Saved in Thank You for Your Purchase of "N-06C"
N-06C INSTRUCTION MANUAL ’11.6 Introduction Please keep a separate record of the information (e.g., Contacts) you have saved in Thank you for your purchase of "N-06C". your FOMA terminal. Even if the data may be For proper use of the N-06C, read this lost as a result of malfunction, repair, changing, manual before and while you use the N-06C. or other handling of the FOMA terminal, under no condition will DOCOMO be held liable for Before using the FOMA terminal any lost data saved in the FOMA terminal. The N-06C supports W-CDMA, GSM/GPRS, It is recommended that you save your and wireless LAN connectivity. important data into microSD cards. Because a FOMA terminal operates using radio Your FOMA terminal is the same as a PC. frequencies, it cannot be used inside a tunnel, Depending on the applications or other items underground, in a building or other locations that you install, the operation of your FOMA where radio waves do not reach the FOMA terminal may become unstable and your location terminal, in locations with weak radio wave or personal information saved on the FOMA condition, or outside of the FOMA's service terminal may be disseminated on the Internet area. The FOMA services may not be available and used improperly. You should therefore on high upper floors of high-rise apartments thoroughly check the provider and operation or buildings, even if you can see no status of an application before using it. obstructions around you. On occasion, your Operation of your FOMA terminal may calls may become disconnected even in areas become unstable if original product with strong signal, even if you are not moving, information contained in it is altered or or even if all four antenna icons are displayed. -
Oracle Solaris 10 910 Patch List
Oracle® Solaris 10 9/10 Patch List Part No: 821–2170 September 2010 Copyright © 2000, 2011, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms setforth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle USA, Inc., 500 Oracle Parkway, Redwood City, CA 94065. -
One Finger, 10 Keys and 6000 Characters
Publications: One Finger, 10 Keys and 6,000 Characters Carl Kay Globalization Insider March 19, 2004 http://www.lisa.org/archive_domain/newsletters/2004/1.3/kay.html?access=manioca The Dilemma for Japanese Cell Phone Users Gangster movies notwithstanding, most Japanese still have ten fingers. But when using a cell phone moving around in Tokyo, nine of those fingers are otherwise occupied holding the device itself (four of ‘em) and the strap one clings to for life (the other five) in the sardinecan packed subway. That leaves people with one finger and ten keys to deal with 6,000 characters! Carl Kay explains how cell phone manufacturers (and users) are rising to the challenge. The Japanese have gone from typing 6,000 characters with ten fingers on 100 keys to doing it with just one finger and only ten keys. According to Naruhito Tanaka of Omron Software, “In Japan, about 10 million people touchtype on PC keyboards, while over 30 million send mail from their cell phones. So the cell phone keyboard is the defacto standard now.” (2002, Japanese). When I wrote “Japanese Software Wars” for Language International (9.3:10–11, 47) back in 1997 about the linguistic and technical issues of inputting Japanese text using a PC keyboard, and the related battle between Microsoft and Japan’s Justsystem to dominate the Japanese PC desktop, I never imagined the reality of 2002 described by Tanaka. Having once tried to explain the challenges of typing 6,000 characters with only ten fingers and the 100 keys of the PC keyboard, here I’d like to describe the emerging technical, business and cultural trends related to the challenge of typing the same 6,000 characters with just one finger and only ten keys. -
International Language Environments Guide for Oracle® Solaris 11.3
International Language Environments ® Guide for Oracle Solaris 11.3 Part No: E54757 December 2018 International Language Environments Guide for Oracle Solaris 11.3 Part No: E54757 Copyright © 2011, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. -
Relationship Analysis Between User's Contexts and Real Input Words
Relationship Analysis between User’s Contexts and Real Input Words through Twitter Yutaka Arakawa, Shigeaki Tagashira and Akira Fukuda Graduate School of Information Science and Electrical Engineering, Kyushu University, Fukuoka, Japan 744, Motooka, Nishi-ku, Fukuoka, Fukuoka, JAPAN, 819-0395 Email: arakawa, shigeaki, [email protected] Abstract—In this paper, we propose a method to evaluate such as location, presence and time. We mainly focus on effectiveness of our proposed context-aware text entry by using how to make dictionary dynamically among above-mentioned Twitter. We focus on ”geo-tagged” public tweets because they three component of predictive transform in text entry. The include user’s important contexts, real location and time. We also focus on TV program listing because 50% traffic of iPhone reason is that the word not included in the dictionary cannot in Japan is generated from our home, in which I often tweets in be recommended, and we are not specialists of philolog- watching a TV. Cyclical collecting system based on Streaming API ical syntactic parsing. In our proposed system, based on and Search API of Twitter is proposed for gathering the target user’s current contexts, the dictionary in the mobile phone tweets efficiently. In order to find the relationship between user’s is updated periodically in cooperation with the dictionary contexts and really used words, we compare really-tweeted words with words obtained from Local Search API of Yahoo! Japan that creation server on the Internet, which generates user’s current is used for our context-aware text entry and words obtained from dictionary dynamically by using several public Web APIs. -
IME As a Possible Keylogger
IME as a Possible Keylogger Masaki Suenaga SecuritySymantec Response, Tokyo Originally published bypublished Originally Virus Bulletin, November by 2005.held Virus Bulletin, Copyright Ltd., but is made bycharge of free permissionavailable of Virus Bulletin. For more information on Virus Bulletin, please visit http://virusbtn.com/ WHITE PAPER: SYMANTEC SECURITY RESPONSE White Paper: Symantec Security Response IME as a Possible Keylogger Contents Abstract.......................................................................................................................................4 Introduction................................................................................................................................ 4 An IME Is Loaded In Every Process ........................................................................................... 9 An IME Can Be Added ................................................................................................................ 9 IMEs Capture Every Keystroke Without Hooking ..................................................................... 10 IMEs Are Loaded In Safe Mode ..................................................................................................11 More Harmful Actions ................................................................................................................11 Details Of The IME Interface ..................................................................................................... 11 DllMain ...................................................................................................................................... -
Macos X Workshop — an Apt-Rpm System on Macos X — 10.6-1 for I386/X86 64
MacOS X WorkShop | an apt-rpm system on MacOS X | 10.6-1 for i386/x86 64 KOBAYASHI Taizo 2011/08/24 CocoaEmacs を入れ、TeXLive を入れ、、、 ghostscript を入れ、gnuplot を入れ、、、、 ドットファイル群を設定して、、、、 でも、LaTeXiT が動かなかったりする。。。。 web 上の掲示板でしばしば目にする光景です。 みんな殆ど同じ事をするのに、 ひとり一人が、或は一台一台大変な作業を繰り返すのは 開発者か趣味でもない限り大いなる無駄!! だと思いませんか? MacOS X で LaTeX や emacs 等の環境を整えられてきた 先人達の成果を集積したものと、 Vine Linux の行き届いた環境を融合させたもの、 それが MacOS X WorkShop です。 MacOS X WorkShop を利用すれば、 定評のある Vine Linux の TeX 環境が一発で構築でき、 すぐさま仕事に入れます。 1 ただし、このプロジェクトの成果物を利用して不具合が生じても、 プロジェクトとしてもプロジェクトに関係する如何なる人間も 一切責任を負わないものとします。 また、バグ報告やパッケージングの要望は歓迎しますが 迅速な対応は期待しないでください。 と云うよりも、要望をお持ちでしたら、 是非、要望を実現した姉妹 apt-rpm tree を作ってください!! 最後に、 我々は企業のサポート窓口ではありません! こちらで不具合を再現出来る程度の情報がバグ報告に無い限り、 返事も対応も無いと考えてください。 Copyright ⃝c 2004-2011 KOBAYASHI Taizo All rights reserved. 2 目 次 1 はじめに 5 1.1 何故 apt-rpm か? :::::::::::::::::::::::::::::::::::::::: 5 1.2 プロジェクトのポリシー ::::::::::::::::::::::::::::::::::::: 8 1.3 派生プロジェクトの歓迎 ::::::::::::::::::::::::::::::::::::: 9 1.4 連絡先とメンバー ::::::::::::::::::::::::::::::::::::::::: 9 1.5 ライセンス :::::::::::::::::::::::::::::::::::::::::::: 10 2 姉妹 trees !! 11 3 MacOS X WorkShop をインストールする 12 3.1 インストールする前に… ::::::::::::::::::::::::::::::::::::: 12 3.2 ターミナルの設定 ::::::::::::::::::::::::::::::::::::::::: 12 3.3 Install ::::::::::::::::::::::::::::::::::::::::::::::: 13 3.4 Remote Install :::::::::::::::::::::::::::::::::::::::::: 15 3.5 SnowLeopard 以前の版からの Upgrade ::::::::::::::::::::::::::::: 15 3.6 Uninstall ::::::::::::::::::::::::::::::::::::::::::::: 15 4 MacOS X WorkShop の使い方 17 4.1 apt の「いろは」