Publications
-
Model Adaptation for Dialog Act Tagging
In this study we used the ICSI meeting corpus with high-level meeting recognition dialog act (MRDA) tags, that is, question, statement, backchannel, disruptions, and floor grabbers/holders. We performed controlled adaptation…
-
Model Adaptation for Sentence Segmentation from Speech
This paper analyzes various methods to adapt sentence segmentation models trained on conversational telephone speech (CTS) to meeting style conversations. The sentence segmentation model trained using a large amount of…
-
A Case Study in Engineering a Knowledge Base for an Intelligent Personal Assistant
We present a case study in engineering a large knowledge base (KB) to meet the requirements of a personal assistant. We discuss our KB development methodology and the engineering challenges…
-
Localization in Horizontal-Only Ambisonic Systems
We test the localization of horizontal-only Ambisonic reproduction systems using various test signals to separately evaluate low-frequency and mid-frequency localization.
-
Infusing IT/STEM Skill Standards in Informal ITEST Learning
-
A Study in Machine Learning from Imbalanced Data for Sentence Boundary Detection in Speech
We have constructed a hidden Markov model (HMM) system to detect sentence boundaries that uses both prosodic and textual information. Since there are more non-sentence boundaries than sentence boundaries in…
-
Morphology-based Language Modeling for Conversational Arabic Speech Recognition
In this paper, we investigate improvements in Arabic language modeling by developing various morphology-based language models. We present four different approaches to morphology-based language modeling, including a novel technique called…
-
Presentation of Information for Link Analysis
SRI's LAW (Link Analysis Workbench) is a system that helps intelligence analysts detect occurrences of situations of interest by finding pattern instances in vast amounts of data using graph edit…
-
Posture-based data protection
We introduce Posture-Based Data Protection (PBDP), which encrypts data using keys available to a device only when it has been verified to be in a known good state, and has…
-
Assessing Local Item Dependence In Building Explanation Tasks (Padi Technical Report 14)
A common practice in the assessment of science education is to have a shared stimulus followed by a number of questions. In these cases, one might doubt the usual assumption…
-
QASR: Question Answering Using Semantic Roles for Speech Interface
In this paper, we evaluate a semantic role labeling approach to the extraction of answers in the open domain question answering task. We show that this technique especially improves the…
-
Machine Translation Research at SRI
An outline of the many machine translation research programs at SRI in 2006.