Sciweavers

2059 search results - page 184 / 412
» An adaptive system developer's tool-kit
Sort
View
IJSWIS
2007
138views more  IJSWIS 2007»
15 years 4 months ago
Using a Natural Language Understanding System to Generate Semantic Web Content
We describe our research on automatically generating rich semantic annotations of text and making it available on the Semantic Web. In particular, we discuss the challenges involv...
Akshay Java, Sergei Nirenburg, Marjorie McShane, T...
CCIA
2010
Springer
14 years 11 months ago
Comparison of Topologies in Peer-to-Peer Data Sharing Networks
Interactions within Multi-agent systems can be structured in different ways depending on the application scenario and its environmental restrictions. In previous work we have devel...
Jordi Campos Miralles, Nuria Piqué, Maite L...
TPDS
2010
126views more  TPDS 2010»
14 years 11 months ago
Stabilizing Distributed R-Trees for Peer-to-Peer Content Routing
Publish/subscribe systems provide useful platforms for delivering data (events) from publishers to subscribers in a decoupled fashion. Developing efficient publish/subscribe scheme...
Silvia Bianchi, Pascal Felber, Maria Gradinariu Po...
ICASSP
2011
IEEE
14 years 8 months ago
Detection of synthetic speech for the problem of imposture
In this paper, we present new results from our research into the vulnerability of a speaker verification (SV) system to synthetic speech. We use a HMM-based speech synthesizer, w...
Phillip L. De Leon, Inma Hernáez, Ibon Sara...
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
13 years 12 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...