Sciweavers

515 search results - page 15 / 103
» A Strategy for Information Source Identification
Sort
View
ICASSP
2010
IEEE
13 years 7 months ago
Tuning phone decoders for language identification
Phonotactic approach, phone recognition to be followed by language modeling, is one of the most popular approaches to language identification (LID). In this work, we explore how ...
C. P. Santhosh Kumar, Haizhou Li, Rong Tong, Pavel...
COOPIS
1998
IEEE
13 years 11 months ago
Jedi: Extracting and Synthesizing Information from the Web
Jedi (Java based Extraction and Dissemination of Information) is a lightweight tool for the creation of wrappers and mediators to extract, combine, and reconcile information from ...
Gerald Huck, Peter Fankhauser, Karl Aberer, Erich ...
IEAAIE
2000
Springer
13 years 11 months ago
Knowledge-Intensive Gathering and Integration of Statistical Information on European Fisheries
Gathering, maintenance, integration and presentation of statistics are major activities of the Dutch Agricultural Economics Research Institute LEI. In this paper we explore how kno...
Mike Klinkert, Jan Treur, Tim Verwaart
OTM
2009
Springer
14 years 1 months ago
A Framework for Decentralized, Context-Aware Mobile Applications Using Semantic Web Technology
The recent evolution in mobile devices, combined with rapid advancements in identification techniques, has lead to new opportunities for mobile application developers: mobile appli...
William Van Woensel, Sven Casteleyn, Olga De Troye...
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 7 months ago
Rate Regions of Secret Key Sharing in a New Source Model
A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other si...
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Rez...