Author of the publication

Part of Speech Tagging Bilingual Speech Transcripts with Intrasentential Model Switching.

, and . AAAI Spring Symposium: Analyzing Microtext, volume SS-13-01 of AAAI Technical Report, AAAI, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Patterns of software architecture in vastu: a new revelation., , and . ACM SIGSOFT Softw. Eng. Notes, 38 (6): 1-6 (2013)A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies., and . CNSA, volume 89 of Communications in Computer and Information Science, page 349-358. Springer, (2010)Survey and Comparison of Frameworks in Software Architecture., and . ACC (4), volume 193 of Communications in Computer and Information Science, page 9-18. Springer, (2011)Probabilistic Modeling of Speech in Spectral Domain using Maximum Likelihood Estimation., , , , and . Symmetry, 10 (12): 750 (2018)An Investigative Testing of Structured and Unstructured Data Formats in Big Data Application Using Apache Spark., and . Wirel. Pers. Commun., 122 (1): 603-620 (2022)Spelling Correction for Dialectal Arabic Dictionary Lookup., , , , , , and . ACM Trans. Asian Lang. Inf. Process., 10 (1): 3:1-3:15 (2011)Accenture at CheckThat!-2023: Learning to Detect Factuality Levels of News Sources., , , and . CLEF (Working Notes), volume 3497 of CEUR Workshop Proceedings, page 494-499. CEUR-WS.org, (2023)The IUCL+ System: Word-Level Language Identification via Extended Markov Models., , , , , , and . CodeSwitch@EMNLP, page 102-106. Association for Computational Linguistics, (2014)A Framework for Securing Web Services by Formulating an Collaborative Security Standard among Prevailing WS-* Security Standards., , , and . ACC (4), volume 193 of Communications in Computer and Information Science, page 269-283. Springer, (2011)Cronbach alpha reliability coefficient-based reputation mechanism for mitigating root node attack in MANETs., and . Int. J. Inf. Commun. Technol., 11 (2): 286-300 (2017)