Many research approaches in software engineering propose models or extensions to existing models. This includes system models, such as UML models, and project management artifacts,...
Jonas Helming, Maximilian Koegel, Hoda Naguib, Mir...
Abstract. Errors in speech recognition transcripts have a negative impact on effectiveness of content-based speech retrieval and present a particular challenge for collections cont...
A raw object is partially initialized, with only some fields set to legal values. It may violate its object invariants, such as that a given field is non-null. Programs often ma...
In spite of decades of research on word sense disambiguation (WSD), all-words general purpose WSD has remained a distant goal. Many supervised WSD systems have been built, but the...
Mitesh M. Khapra, Anup Kulkarni, Saurabh Sohoney, ...
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese