In this paper we share our experience and describe the methodologies that we have used in designing and recording large speech databases for applications requiring speech synthesi...
This paper deals with a shared server environment where the server is divided into a number of resource partitions and used to host multiple applications at the same time. In a cas...
Abstract. Many complex control problems are not amenable to traditional controller design. Not only is it difficult to model real systems, but often it is unclear what kind of beha...
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
In this paper we propose a methodology for the construction of 3D electronic institutions. 3D electronic institutions are normative environments where software and human agents ca...
Anton Bogdanovych, Marc Esteva, Simeon J. Simoff, ...