Sciweavers

1717 search results - page 184 / 344
» Error concealment using a diffusion based method
Sort
View
132
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Intra-session variability compensation and a hypothesis generation and selection strategy for speaker segmentation
This paper addresses the problem of speaker segmentation in two-speaker telephone conversations, using an eigenvoice based factor analysis approach. We present a set of improvemen...
Carlos Vaquero, Alfonso Ortega, Eduardo Lleida
158
Voted
TMC
2012
13 years 5 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
111
Voted
ICCS
2004
Springer
15 years 8 months ago
Parallel Importance Separation for Multiple Integrals and Integral Equations
In this paper we present error and performance analysis of a Monte Carlo variance reduction method for solving multidimensional integrals and integral equations. This method, calle...
Sofiya Ivanovska, Aneta Karaivanova
138
Voted
CORR
2012
Springer
230views Education» more  CORR 2012»
13 years 10 months ago
Fast Triangle Counting through Wedge Sampling
Graphs and networks are used to model interactions in a variety of contexts, and there is a growing need to be able to quickly assess the qualities of a graph in order to understa...
C. Seshadhri, Ali Pinar, Tamara G. Kolda
ICML
2004
IEEE
16 years 3 months ago
Generalized low rank approximations of matrices
The problem of computing low rank approximations of matrices is considered. The novel aspect of our approach is that the low rank approximations are on a collection of matrices. W...
Jieping Ye