This paper addresses the detection of OOV segments in the output of large vocabulary continuous speech recognition (LVCSR) system. First, standard confidence measures based on fr...
Lukas Burget, Petr Schwarz, Pavel Matejka, Mirko H...
Image and geometry processing applications estimate the local geometry of objects using information localized at points. They usually consider information about the tangents as a s...
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
For the World Wide Web, the Transmission Control Protocol (TCP) and the HyperText Transfer Protocol (HTTP) are two important protocols. However, interactions between these two pro...
Abstract. In this paper we investigate the way of improving the performance of a Named Entity Extraction (NEE) system by applying machine learning techniques and corpus transformat...