The goal of this work was to test whether the performance of a regular pairwise classifier can be improved when additional information about the hierarchical class structure is ad...
For ages we used our ears side by side with our ophthalmic stimuli to gather additional information, leading and supporting us in our visualization. Nowadays numerous software vis...
Recently, Sun proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we present a...
This paper1 describes an algorithm for testing polymorphic interactions between classes in object-oriented (O-O) software. We propose an Augmented Object Relationship Diagram (AOR...
In the experiment described in this paper, we investigate the effectiveness of a document-independent technique for eliciting additional information from searchers about their inf...
We have been investigating an interactive approach for Open-domain QA (ODQA) and have constructed a spoken interactive ODQA system, SPIQA. The system derives disambiguating querie...
Chiori Hori, Takaaki Hori, Hajime Tsukada, Hideki ...
This paper introduces techniques for the exploration of images augmented with additional information. We present the so-called Meta-Previewer and propose the Cascading-Views which ...
Biomedical corpora annotated with event-level information provide an important resource for the training of domain-specific information extraction (IE) systems. These corpora conc...
Raheel Nawaz, Paul Thompson, John McNaught, Sophia...
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Abstract. A two-argument function is computed privately by two parties if after the computation, no party should know anything about the other inputs except for what he is able to ...