We describe an object oriented approach to developing an Identity Based Encryption system. We show how an existing API was reused and extended to facilitate our development of the...
Abstract--In this paper, we report on the performance of automatic speech recognition (ASR) systems on voicemail transcription. Voicemail is spontaneous telephone speech recorded o...
Mukund Padmanabhan, George Saon, Jing Huang, Brian...
In this paper, the specification of Verity, a webbased instructional tool, is presented. Verity is intended to be used as a learning assistant and self-assessment tool, more than ...
Sergiu Dascalu, Daniela Saru, Ryan Simpson, Justin...
Quality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. ...
Arvind S. Krishna, Douglas C. Schmidt, Atif M. Mem...
Work-integrated learning (WIL) poses unique challenges for user model design: on the one hand users’ knowledge levels need to be determined based on their work activities – tes...