Sciweavers

451 search results - page 47 / 91
» What Is a Conversation Policy
Sort
View
ICRE
1996
IEEE
14 years 2 months ago
Structuring utterance records of requirements elicitation meetings based on speech act theory
This paper discusses a technique to structure utterance records of the meetings for requirements elicitation based on speech act theory. To elicit requirements to the system to be...
Motoshi Saeki, Kinji Matsumura, Jun'ichi Shimoda, ...
LREC
2010
164views Education» more  LREC 2010»
13 years 11 months ago
Practical Evaluation of Speech Recognizers for Virtual Human Dialogue Systems
We perform a large-scale evaluation of multiple off-the-shelf speech recognizers across diverse domains for virtual human dialogue systems. Our evaluation is aimed at speech recog...
Xuchen Yao, Pravin Bhutada, Kallirroi Georgila, Ke...
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 10 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal
EATCS
2000
85views more  EATCS 2000»
13 years 9 months ago
A New Zero-One Law and Strong Extension Axioms
One of the previous articles in this column was devoted to the zero-one laws for a number of logics playing prominent role in finite model theory: first-order logic FO, the extens...
Andreas Blass, Yuri Gurevich
XPU
2010
Springer
13 years 8 months ago
Towards Understanding Communication Structure in Pair Programming
Pair Programming has often been reported to be beneficial in software projects. To better understand where these benefits come from we evaluate the aspect of intra-pair communica...
Kai Stapel, Eric Knauss, Kurt Schneider, Matthias ...