No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
—In recent years, cooperative communication has been proposed as a new communication paradigm that incorporates a relay node to assist the direct point-to-point transmission. By ...
Today there are many process mining techniques that allow for the automatic construction of process models based on event logs. Unlike synthesis techniques (e.g., based on regions...
On a large group picture, having all people open their eyes can turn out to be a difficult task for photographers. Therefore, in this paper, we describe an original method to auto...
Jean Charles Bazin, Dang-Quang Pham, Inso Kweon, K...
We explore morphology-based and sub-word language modeling approaches proposed for morphologically rich languages, and evaluate and contrast them for Turkish broadcast news transc...