Abstract. This paper describes the experience of QAST 2008, the second time a pilot track of CLEF has been held aiming to evaluate the task of Question Answering in Speech Transcri...
Jordi Turmo, Pere Comas, Sophie Rosset, Lori Lamel...
Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
Considering the available body of literature on continuous EDAs, one must state that many important questions are still unanswered, e.g.: How do continuous EDAs really work, and h...
The Slot Filling task requires a system to automatically distill information from a large document collection and return answers for a query entity with specified attributes (`slot...
Zheng Chen, Suzanne Tamang, Adam Lee, Xiang Li, Ma...
- In order to enable fast deployment of new emerging services over multimedia radio networks, it is important to design an efficient service-based platform with necessary traffic m...