308 results

Felix Stahlberg, Tim Schlippe, Stephan Vogel, and Tanja Schultz.

Published :Jun 2014

Yang Liu, Raghul Gunasekaran, Xiaosong Ma, and Sudharshan Vazhkudai.

Automatic identification of application I/O signatures from noisy server-side traces. In Proceedings of USENIX Conference on File and Storage Technologies (FAST), February 2014.

Published :Jun 2014

Ahmed Ali, Yifan Zhang, Patrick Cardinal, Najim Dahak, Stephan Vogel, Jim Glass .

2014. A Complete Kaldi Recipe For Building Arabic Speech Recognition Systems. In Proceedings of the Spoken Language Technology Workshop (SLT) IEEE. December 2014, Nevada, USA 

Published :Jun 2014

Kareem Darwish, Ahmed A. Ali, Ahmed Abdelali, 2014,

 Query Term Expansion by Automatic Learning of Morphological Equivalence Patterns from Wikipedia. In Proceedings of SIGIR 2014 Workshop on Semantic Matching in Information Retrieval (SMIR), July 2014, Gold Coast, Australia

Published :Jun 2014

A Masking Index for Quantifying Hidden Glitches (extended version)

Kownledge and Information Systems, Springer, July 2014.

Laure Berti-Equille, Ji Meng Loh and Tamraparni Dasu

Published :Jun 2014

Eslam Elsawy, Mohamed Mokhtar, and Walid Magdy.

TweetMogaz v2: Identifying News Stories in Social Media. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, ACM (CIKM). Shanghai, China 

Published :Jun 2014

Ahmed Abdelali, Francisco Guzman, Hassan Sajjad, Stephan Vogel, 2014,

The AMARA Corpus: Building parallel language resources for the educational domain. In Proceedings of the Ninth International Conference on Language Resources and Evaluation (LREC-2014). May 2014. Reykjavik, Iceland 

Published :Jun 2014

A. Mohaisen, O. Alrawi, M. Larson, and D. McPherson, "Towards a Methodical Evaluation of Antivirus Scans and Labels."

Information Security Applications, Y. Kim, H. Lee, and A. Perrig, (Eds.), Springer International Publishing, 2014, pp. 231-241.

Published :Jun 2014

Conflict Resolution with Data Currency and Consistency

ACM Journal of Data and Information Quality (JDIQ) (invited).  

Wenfei Fan, Shuai Ma, Nan Tang, and Wenyuan Yu

Published :Jun 2014