Author of the publication

Semantic Extensions of the Ephyra QA System for TREC 2007.

, , , , , and . TREC, volume 500-274 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy preserving probabilistic inference with Hidden Markov Models., , , and . ICASSP, page 5868-5871. IEEE, (2011)Large Margin Gaussian Mixture Models with Differential Privacy., and . IEEE Trans. Dependable Secur. Comput., 9 (4): 463-469 (2012)Privacy Preserving Speaker Verification Using Adapted GMMs., and . INTERSPEECH, page 2405-2408. ISCA, (2011)Semantic Extensions of the Ephyra QA System for TREC 2007., , , , , and . TREC, volume 500-274 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2007)A Practical System for Privacy-Preserving Collaborative Filtering., , and . ICDM Workshops, page 547-554. IEEE Computer Society, (2012)Privacy-Preserving Speech Processing: Cryptographic and String-Matching Frameworks Show Promise., , , and . IEEE Signal Process. Mag., 30 (2): 62-74 (2013)Learning Algorithms for Domain Adaptation., and . ACML, volume 5828 of Lecture Notes in Computer Science, page 293-307. Springer, (2009)Privacy-Preserving Speaker Authentication., , , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 1-22. Springer, (2012)Efficient Protocols for Principal Eigenvector Computation over Private Data., and . Trans. Data Priv., 4 (3): 129-146 (2011)Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models., and . IEEE Trans. Speech Audio Process., 21 (2): 397-406 (2013)