Sciweavers

5948 search results - page 337 / 1190
» Computing Robust Counter-Strategies
Sort
View
INTERSPEECH
2010
14 years 11 months ago
VAD-measure-embedded decoder with online model adaptation
We previously proposed a decoding method for automatic speech recognition utilizing hypothesis scores weighted by voice activity detection (VAD)-measures. This method uses two Gau...
Tasuku Oonishi, Koji Iwano, Sadaoki Furui
TIP
2010
181views more  TIP 2010»
14 years 11 months ago
Cluster-Based Distributed Face Tracking in Camera Networks
In this paper, we present a distributed multicamera face tracking system suitable for large wired camera networks. Unlike previous multicamera face tracking systems, our system doe...
Josiah Yoder, Henry Medeiros, Johnny Park, Avinash...
CN
2011
111views more  CN 2011»
14 years 8 months ago
On the design of network control and management plane
We provide a design of a control and management plane for data networks using the abstraction of 4D architecture, utilizing and extending 4D’s concept of a logically centralized...
Hammad Iqbal, Taieb Znati
JAISE
2011
179views more  JAISE 2011»
14 years 7 months ago
A hybrid probabilistic neural model for person tracking based on a ceiling-mounted camera
Person tracking is an important topic in ambient living systems as well as in computer vision. In particular, detecting a person from a ceiling-mounted camera is a challenge since ...
Wenjie Yan, Cornelius Weber, Stefan Wermter

Publication
270views
14 years 3 months ago
A Data Hiding Scheme Based on LBPROT Pattern
Texture classification is mainly used for segmentation of texture regions and content-based access to image databases. Lately these texture classification patterns have been appl...
E. E. Varsaki, V. Fotopoulos, A. N. Skodras