Information & computer science publications
-
On the Feasibility of Deploying Cell Anomaly Detection in Operational Cellular Networks
In this paper, we build on our previous work and study the feasibility of an operational deployment of an adaptive ensemble-method framework for modeling cell behavior.
-
Highly Accurate Phonetic Segmentation Using Boundary Correction Models and System Fusion
Accurate phone-level segmentation of speech remains an important task for many subfields of speech research. We investigate techniques for boosting the accuracy of automatic phonetic segmentation based on HMM acoustic-phonetic…
-
Towards Quantifying the Completeness of BDI Goals
We sketch a pragmatic but principled mechanism for quantifying the level of completeness of goals in a Belief-Desire-Intention--like agent.
-
Simplified VTS-Based I-Vector Extraction in Noise-Robust Speaker Recognition
In this work, we propose an efficient simplification scheme, named sVTS, in order to show that the VTS approach gives improvements in large scale applications compared to state-of-the-art systems.
-
Submodular Subset Selection for Large-Scale Speech Training Data
We address the problem of subselecting a large set of acoustic data to train automatic speech recognition (ASR) systems. To this end, we apply a novel data selection technique based…
-
Multi-Modal Image Retrieval for Complex Queries Using Small Codes
We propose a unified framework for image retrieval capable of handling complex and descriptive queries of multiple modalities in a scalable manner.
-
The Gradual Verifier
We propose a gradual verification approach, GraVy. For a given piece of Java code, GraVy partitions the statements into those that are unreachable, or from which exceptional termination is impossible, inevitable, or…
-
ISOMER: Informative Segment Observations for Multimedia Event Recounting
This paper describes a system for multimedia event detection and recounting. The goal is to detect a high level event class in unconstrained web videos and generate event oriented summarization…
-
A Synthesized Algorithm for Interactive Consistency
We discovered our algorithm using an automated synthesis technique that is based on bounded model checking and QBF solving. Our synthesis technique is general and simple, and it is a…
-
Addition of Escherichia coli K-12 Growth Observation and Gene Essentiality Data to the Ecocyc Database
We have integrated data on the growth or nongrowth of E. coli K-12 obtained from published observations using a variety of individual media and from high-throughput phenotype microarrays into the…
-
Reverse Engineering Digital Circuits Using Structural and Functional Analyses
In this paper, we present a set of algorithms for the reverse engineering of digital circuits starting from an unstructured netlist and resulting in a high-level netlist with components such…
-
Two-Round Secure Mpc from Indistinguishability Obfuscation
Here, we show how to achieve this result with only two rounds. We obtain UC security with abort against static malicious adversaries, and fairness if there is an honest majority.