Sciweavers

ICASSP
2010
IEEE
13 years 6 months ago
An adaptive initialization method for speaker Diarization based on prosodic features
The following article presents a novel, adaptive initialization scheme that can be applied to most state-of-the-art Speaker Diarization algorithms, i.e. algorithms that use agglom...
David Imseng, Gerald Friedland
ICASSP
2010
IEEE
13 years 6 months ago
Noise-to-mask ratio minimization by weighted non-negative matrix factorization
This paper proposes a novel algorithm for minimizing the perceptual distortion in non-negative matrix factorization (NMF) based audio representation. We formulate the noise-to-mas...
Joonas Nikunen, Tuomas Virtanen
ICASSP
2010
IEEE
13 years 6 months ago
Efficient weighted-sum-rate maximization for a class of half-duplex cooperative systems
In many half-duplex cooperative systems, the direct formulation of the problem of finding the jointly optimal power and channel resource allocation that maximizes a weighted sum ...
Wessam Mesbah, Timothy N. Davidson
ICASSP
2010
IEEE
13 years 6 months ago
Synthesis of filled pauses based on a disfluent speech model
In the present paper we present a new approach to the synthesis of filled pauses. The problem is tackled from the point of view of disfluent speech synthesis. Based on the synth...
Jordi Adell, Antonio Bonafonte, David Escudero Man...
ICASSP
2010
IEEE
13 years 6 months ago
Audio forensics from acoustic reverberation
An audio recording is subject to a number of possible distortions and artifacts. For example, the persistence of sound, due to multiple reflections from various surfaces in a roo...
Hafiz Malik, Hany Farid
ICASSP
2010
IEEE
13 years 6 months ago
Error resilient video multicast using Randomized Distributed Space Time Codes
—In this paper we study a two-hop cooperative transmission scheme where multiple relays forward the data simultaneously using Randomized Distributed Space Time Codes (R-DSTC). We...
Ozgu Alay, Pei Liu, Yao Wang, Elza Erkip, Shivendr...
ICASSP
2010
IEEE
13 years 6 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
ICASSP
2010
IEEE
13 years 6 months ago
Multipass strategies for improving accuracy in a voice search application
This paper describes a set of techniques for improving the performance of automated voice search services intended for mobile users accessing these services over a range of portab...
Tianhe Zhang, Richard Rose, Jean Dahan
ICASSP
2010
IEEE
13 years 6 months ago
Search-Based Automatic Image Annotation via Flickr Photos Using Tag Expansion
Exponentially growing photo collections motivate the needs for automatic image annotation for effective manipulations (e.g., search, browsing). Most of the prior works rely on sup...
Liang-Chi Hsieh, Winston H. Hsu
ICASSP
2010
IEEE
13 years 6 months ago
Robust critical data recovery for MPEG-4 AAC encoded bitstreams
This paper presents a bandwidth-efficient method for improved decoding of critical data generated by the MPEG-4 AAC audio coder when encoded bitstreams are transmitted over noisy...
Ruijing Hu, Xucen Huang, Michel Kieffer, Olivier D...