Sciweavers

775 search results - page 111 / 155
» Email data cleaning
Sort
View
ISCAS
2008
IEEE
139views Hardware» more  ISCAS 2008»
15 years 4 months ago
Missing feature speech recognition in a meeting situation with maximum SNR beamforming
Abstract— Especially for tasks like automatic meeting transcription, it would be useful to automatically recognize speech also while multiple speakers are talking simultaneously....
Dorothea Kolossa, Shoko Araki, Marc Delcroix, Tomo...
SIGIR
2006
ACM
15 years 3 months ago
Near-duplicate detection by instance-level constrained clustering
For the task of near-duplicated document detection, both traditional fingerprinting techniques used in database community and bag-of-word comparison approaches used in information...
Hui Yang, James P. Callan
ISMAR
2005
IEEE
15 years 3 months ago
Augmented Foam: A Tangible Augmented Reality for Product Design
Computer Aided Design applications have become designers’ inevitable tools for expressing and simulating innovative ideas and concepts. However, replacing traditional materials ...
Woohun Lee, Jun Park
PCI
2005
Springer
15 years 3 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
COOPIS
2003
IEEE
15 years 3 months ago
Extending OO Metamodels towards Dynamic Object Roles
This paper discusses some of the implications of introducing the dynamic object role concept into object-oriented metamodels on both implementational and conceptual modeling levels...
Andrzej Jodlowski, Piotr Habela, Jacek Plodzien, K...