Sciweavers

ICASSP
2008
IEEE
13 years 12 months ago
Cross-correlation of beat-synchronous representations for music similarity
Daniel P. W. Ellis, Courtenay V. Cotton, Michael I...
ICASSP
2008
IEEE
13 years 12 months ago
Segmentation of a speech spectrogram using mathematical morphology
It has been shown that speech spectrograms can be read by trained experts. In this work, we regard the speech spectrogram image as a written text in some unknown language and perf...
Raphael Steinberg, Douglas D. O'Shaughnessy
ICASSP
2008
IEEE
13 years 12 months ago
Perceptsynth: mapping perceptual musical features to sound synthesis parameters
This paper presents a new system that allows for intuitive control of an additive sound synthesis model from perceptually relevant high-level sonic features. We suggest a general ...
Sylvain Le Groux, Paul F. M. J. Verschure
ICASSP
2008
IEEE
13 years 12 months ago
Fusion of cleavage site detection and pairwise alignment for fast subcellular localization
In recent years, homology-based and signal-based methods have been proposed for predicting the subcellular localization of proteins. While it has been known that homology-based me...
Man-Wai Mak, Sun-Yuan Kung
ICASSP
2008
IEEE
13 years 12 months ago
Analytical driving functions for higher order Ambisonics
In this paper, we present the derivation and investigation of analytical expressions for the loudspeaker driving signals for higher order Ambisonics. The approach relies on the as...
Jens Ahrens, Sascha Spors
ICASSP
2008
IEEE
13 years 12 months ago
Model-based sparsity projection pursuit for lattice vector quantization
In this work we present an efficient coding scheme suitable for lossy image compression using a lattice vector quantizer (LVQ) based on statistically independent data projections...
Leonardo H. Fonteles, Marc Antonini, Ronald Phlypo
ICASSP
2008
IEEE
13 years 12 months ago
Multi-feature vector flow for active contour tracking
In order to achieve both fast tracking and accurate object extraction, we present in this paper an original real-time active contour method, incorporating different feature maps i...
Joanna I. Olszewska, Christophe De Vleeschouwer, B...
ICASSP
2008
IEEE
13 years 12 months ago
Speech privacy for modern mobile communication systems
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have ...
Jose Francisco de Andrade, Marcello Luiz Rodrigues...
ICASSP
2008
IEEE
13 years 12 months ago
Algebraic visual cryptography scheme for color images
This paper introduces a novel, cost effective visual cryptography scheme suitable for color image transmission over bandwidth constraint channels. Unlike previously proposed schem...
Mohsen Heidarinejad, Amirhossein Alamdar Yazdi, Ko...