The design of practical language applications by means of statistical approaches requires annotated data, which is one of the most critical constraint. This is particularly true f...
Marco Dinarelli, Alessandro Moschitti, Giuseppe Ri...
The paper introduces some generalizations of Vapnik’s method of structural risk minimisation (SRM). As well as making explicit some of the details on SRM, it provides a result t...
John Shawe-Taylor, Peter L. Bartlett, Robert C. Wi...
In this work we focus on speaker verification on channels of varying quality, namely Skype and high frequency (HF) radio. In our setup, we assume to have telephone recordings of ...
Korbinian Riedhammer, Tobias Bocklet, Elmar Nö...
Similarity search is a fundamental operation for applications that deal with unstructured data sources. In this paper we propose a new pivot-based method for similarity search, ca...
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...