—Support Vector Machines are used to combine the outputs of multiple entity extractors, thus creating a composite entity extraction system. The composite system has a significant...
Deborah Duong, James Venuto, Ben Goertzel, Ryan Ri...
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
In this paper we present a technique for prediction of electrical demand based on multiple models. The multiple models are composed by several local models, each one describing a r...
J. Jesus Rico Melgoza, Juan J. Flores, Constantino...
Terms used in search queries often have multiple meanings. Consequently, search results corresponding to different meanings may be retrieved, making identifying relevant results in...
We report results on speaker diarization of French broadcast news and talk shows on current affairs. This speaker diarization process is a multistage segmentation and clustering s...
Vishwa Gupta, Gilles Boulianne, Patrick Kenny, Pie...