The design of practical language applications by means of statistical approaches requires annotated data, which is one of the most critical constraint. This is particularly true f...
Marco Dinarelli, Alessandro Moschitti, Giuseppe Ri...
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
In this paper, an influence model is used to recognize functional roles played during meetings. Previous works on the same corpus demonstrated a high recognition accuracy using SV...
Wen Dong, Bruno Lepri, Alessandro Cappelletti, Ale...
We present a system that detects human falls in the home environment, distinguishing them from competing noise, by using only the audio signal from a single far-field microphone....
We propose an algorithm for extracting fields from HTML search results. The output of the algorithm is a database table– a data structure that better lends itself to high-level...