We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Finite-state technology is considered the preferred model for representing the phonology and morphology of natural languages. The attractiveness of this technology for natural lang...
Conventional human-computer interfaces for the exploration of volume datasets employ the mouse as an input device. Specifying an oblique orientation for a crosssectional plane thr...
Rahul Sarkar, Chrishnika de Almeida, Noureen Syed,...
This paper introduces a faceted model of image semantics which attempts to express the richness of semantic content interpretable within an image. Using a large image data-set fro...
Jonathon S. Hare, Paul H. Lewis, Peter G. B. Enser...
We describe the latest version of the SRI-ICSI meeting and lecture recognition system, as was used in the NIST RT-07 evaluations, highlighting improvements made over the last year....
Andreas Stolcke, Xavier Anguera, Kofi Boakye, &Oum...