In today’s global village, it is critical that the key information tools, such as web search engines, e-Commerce portals and e-Governance, work across multiple natural languages,...
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
In the past several years, we’ve been studying feature transformation (FT) approaches to robust automatic speech recognition (ASR) which can compensate for possible “distortio...
In this paper we introduce a dynamic programming algorithm to perform linear text segmentation by global minimization of a segmentation cost function which consists of: (a) within...
Many researchers in the HRI and ECA domains try to build robots and agents that exhibit human-like behavior in real-world close encounter situations. One major requirement for comp...