Sciweavers

2553 search results - page 306 / 511
» Evaluating machine creativity
Sort
View
141
Voted
SEMWEB
2005
Springer
15 years 10 months ago
Ontology Learning and Reasoning - Dealing with Uncertainty and Inconsistency
Ontology Learning from text aims at generating domain ontologies from textual resources by applying natural language processing and machine learning techniques. It is inherent in t...
Peter Haase, Johanna Völker
TSD
2005
Springer
15 years 10 months ago
The VoiceTRAN Speech-to-Speech Communicator
The paper presents the design concept of the VoiceTRAN Communicator that integrates speech recognition, machine translation and text-to-speech synthesis using the DARPA Galaxy arch...
Jerneja Zganec-Gros, France Mihelic, Tomaz Erjavec...
IEAAIE
2004
Springer
15 years 10 months ago
Data Mining Approach for Analyzing Call Center Performance
Abstract. The aim of our research was to apply well-known data mining techniques (such as linear neural networks, multi-layered perceptrons, probabilistic neural networks, classifi...
Marcin Paprzycki, Ajith Abraham, Ruiyuan Guo, Srin...
IJCNLP
2004
Springer
15 years 10 months ago
Deterministic Dependency Structure Analyzer for Chinese
In this paper, we present a deterministic dependency structure analyzer for Chinese. This analyzer implements two algorithms – Yamada and Nivre models – and two sorts of class...
Yuchang Cheng, Masayuki Asahara, Yuji Matsumoto
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
15 years 10 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...