Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Software Transactional Memory (STM) promises to simplify concurrent programming without requiring specific hardware support. Yet, STM’s credibility lies on the extent to which ...
Aleksandar Dragojevic, Pascal Felber, Vincent Gram...
The evolution from a disease-centered model of care to a more patient-centered model presents opportunities for going beyond designing technology to support medical professionals ...
We present an investigation of the relevance of simple conversational features as indicators of topic shifts in small-group meetings. Three proposals for representation of dialogu...
In the paper we present two techniques improving the recognition accuracy of multilayer perceptron neural networks (MLP ANN) by means of adopting Speaker Adaptive Training. The us...