Sciweavers

21342 search results - page 3958 / 4269
» A Structured Language Model
Sort
View
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
15 years 9 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
100
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Multiple kernel learning for speaker verification
Many speaker verification (SV) systems combine multiple classifiers using score-fusion to improve system performance. For SVM classifiers, an alternative strategy is to combine...
Chris Longworth, Mark J. F. Gales
ICASSP
2008
IEEE
15 years 9 months ago
Link throughput of multi-channel opportunistic access with limited sensing
—We aim to characterize the maximum link throughput of a multi-channel opportunistic communication system. The states of these channels evolve as independent and identically dist...
Keqin Liu, Qing Zhao
97
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Non-robustness of statistics-based beamformer design in correlated MIMO channels
Recent attention on correlated multi-input multi-output systems has centered around the case of imperfect channel or statistical information at the transmitter. The focus of this ...
Vasanthan Raghavan, Ada S. Y. Poon, Venugopal V. V...
ICASSP
2008
IEEE
15 years 9 months ago
Text-independent voice conversion based on state mapped codebook
Voice conversion has become more and more important in speech technology, but most of current works have to use parallel utterances of both source and target speaker as the traini...
Meng Zhang, Jianhua Tao, Jilei Tian, Xia Wang
« Prev « First page 3958 / 4269 Last » Next »