Sciweavers

INTERSPEECH
2010
12 years 11 months ago
Binary coding of speech spectrograms using a deep auto-encoder
This paper reports our recent exploration of the layer-by-layer learning strategy for training a multi-layer generative model of patches of speech spectrograms. The top layer of t...
Li Deng, Michael L. Seltzer, Dong Yu, Alex Acero, ...
COMBINATORICS
1998
63views more  COMBINATORICS 1998»
13 years 4 months ago
On Kissing Numbers in Dimensions 32 to 128
An elementary construction using binary codes gives new record kissing numbers in dimensions from 32 to 128.
Yves Edel, Eric M. Rains, Neil J. A. Sloane
EJC
2007
13 years 4 months ago
Binary codes from rectangular lattice graphs and permutation decoding
We examine the binary codes obtained from the row span over the field F2 of an adjacency matrix of the rectangular lattice graphs L2(m, n) for 3 ≤ m < n and show that permut...
Jennifer D. Key, P. Seneviratne
DM
2007
103views more  DM 2007»
13 years 4 months ago
Codes from the line graphs of complete multipartite graphs and PD-sets
The binary codes of the line graphs Lm(n) of the complete multipartite graphs Kn1,...,nm (ni = n for 1 ≤ i ≤ m) n ≥ 2, m ≥ 3 are examined, and PD-sets and s-PD-sets are fo...
Jennifer D. Key, P. Seneviratne
CORR
2010
Springer
101views Education» more  CORR 2010»
13 years 4 months ago
Bounds for binary codes relative to pseudo-distances of k points
We apply Schrijver's semidefinite programming method to obtain improved upper bounds on generalized distances and list decoding radii of binary codes.
Christine Bachoc, Gilles Zémor
ITCC
2003
IEEE
13 years 9 months ago
On Quaternary MacDonald Codes
This paper studies two families of codes over Z4, MacDonald codes of type α and type β. The torsion code, weight distribution, and Gray image properties are studied. Some intere...
Charles J. Colbourn, Manish K. Gupta
STOC
2003
ACM
142views Algorithms» more  STOC 2003»
14 years 4 months ago
Optimal probabilistic fingerprint codes
We construct binary codes for fingerprinting. Our codes for n users that are -secure against c pirates have length O(c2 log(n/ )). This improves the codes proposed by Boneh and Sh...
Gábor Tardos