1 A number of e-Processes (i.e. software processes for developing e-Commerce information systems) exist in industry. We presuppose that for a subclass of these their targeted quali...
Roland Kaschek, Frina Albertyn, Vladimir A. Shekho...
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
This paper presents new techniques for improving the structural quality of automatically acquired architectural 3D models. Common architectural features like parallelism and ortho...
In this paper we evaluate a method for generating synthetic speech at high speaking rates based on the interpolation of hidden semi-Markov models (HSMMs) trained on speech data re...
Michael Pucher, Dietmar Schabus, Junichi Yamagishi
Mobile phones are among the most popular consumer devices and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plan...