Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able t...
Many techniques have been reported for handwriting-based writer identification. Most such techniques assume that the written text is fixed (e.g., in signature verification). In th...
H. E. S. Said, G. S. Peake, T. N. Tan, Keith D. Ba...
We have developed a method for answering single answer questions automatically using a collection of documents or the Internet as a source of data for the production of the answer...
James R. Cowie, Yevgeny Ludovik, Hugo Molina-Salga...
Abstract--Motivated by potential applications in second-language pedagogy, we present a novel approach to using articulatory information to improve automatic detection of typical p...
Incompleteness due to missing attribute values (aka "null values") is very common in autonomous web databases, on which user accesses are usually supported through media...
Hemal Khatri, Jianchun Fan, Yi Chen, Subbarao Kamb...