We propose a novel algorithm for the separation of convolutive speech mixtures using two-microphone recordings, based on the combination of independent component analysis (ICA) an...
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Abstract-This paper describes a new image-based approach to tracking the 6 degrees of freedom trajectory of a stereo camera pair. The proposed technique estimates the pose and subs...
This paper describes the AuToBI tool for automatic generation of hypothesized ToBI labels. While research on automatic prosodic annotation has been conducted for many years, AuToB...