: Developing a speech-based application for mobile devices requires work upfront, since mobile devices and speech recognition systems vary dramatically in their capabilities. While...
Werner Kurschl, Stefan Mitsch, Rene Prokop, Johann...
The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data securit...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edga...
This paper describes an empirical study of the "Information Synthesis" task, defined as the process of (given a complex information need) extracting, organizing and inte...
In this paper, we propose a multi-criteriabased active learning approach and effectively apply it to named entity recognition. Active learning targets to minimize the human annota...
Dan Shen, Jie Zhang, Jian Su, Guodong Zhou, Chew L...
In this paper, a `market trading' technique is integrated with the techniques of rule discovery and refinement for data mining. A classifier system-inspired model, the market...