Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
Our work explores an interactive open learner modelling (IOLM) approach where learner diagnosis is considered as an interactive process involving both a computer system and a learn...
Research in knowledge-based software engineering has led to advances in the ability to specify and automatically generate software. Advances in the support of upstream activities ...
Andreas Girgensohn, David F. Redmiles, Frank M. Sh...
Developing dispatching rules for manufacturing systems is a tedious process, which is time- and cost-consuming. Since there is no good general rule for different scenarios and ob...
In this paper the FAU IISAH corpus and its recording conditions are described: a new speech database consisting of human-machine and human-human interaction recordings. Beside clo...
Werner Spiegl, Korbinian Riedhammer, Stefan Steidl...