Sciweavers

9931 search results - page 1757 / 1987
» Generative Modeling by PRISM
Sort
View
CRYPTO
2010
Springer
145views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
Protocols for Multiparty Coin Toss with Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution. These protocols are used as a building block in many cryptographic protocols. Cleve [STOC...
Amos Beimel, Eran Omri, Ilan Orlov
ICASSP
2010
IEEE
15 years 4 months ago
Boosted binary features for noise-robust speaker verification
The standard approach to speaker verification is to extract cepstral features from the speech spectrum and model them by generative or discriminative techniques. We propose a nov...
Anindya Roy, Mathew Magimai-Doss, Sébastien...
ICASSP
2010
IEEE
15 years 4 months ago
Motion estimation from compressed linear measurements
This paper presents a novel algorithm for computing the relative motion between images from compressed linear measurements. We propose a geometry based correlation model that desc...
Vijayaraghavan Thirumalai, Pascal Frossard
ICASSP
2010
IEEE
15 years 4 months ago
Investigations on ensemble based unsupervised adaptation methods
We have previously proposed unsupervised cross-validation (CV) adaptation that introduces CV into an iterative unsupervised batch mode adaptation framework to suppress the influe...
Yu Kubota, Takahiro Shinozaki, Sadaoki Furui
4OR
2008
79views more  4OR 2008»
15 years 4 months ago
MIP-based heuristic for non-standard 3D-packing problems
This paper is the continuation of a previous work (Fasano 2004), dedicated to a MIP formulation for non-standard three-dimensional packing issues, with additional conditions. The ...
Giorgio Fasano
« Prev « First page 1757 / 1987 Last » Next »