Sciweavers

851 search results - page 49 / 171
» History Effects and Verification
Sort
View
IDEAL
2010
Springer
14 years 9 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
ICASSP
2011
IEEE
14 years 3 months ago
Factored covariance modeling for text-independent speaker verification
Gaussian mixture models (GMMs) are commonly used to model the spectral distribution of speech signals for text-independent speaker verification. Mean vectors of the GMM, used in c...
Eryu Wang, Kong-Aik Lee, Bin Ma, Haizhou Li, Wu Gu...
CVPR
2009
IEEE
16 years 7 months ago
Boosted Multi-Task Learning for Face Verification With Applications to Web Image and Video Search
Face verification has many potential applications including filtering and ranking image/video search results on celebrities. Since these images/videos are taken under uncontrolle...
Xiaogang Wang (MIT), Cha Zhang (Microsoft Research...
NOLISP
2005
Springer
15 years 5 months ago
Weighting Scores to Improve Speaker-Dependent Threshold Estimation in Text-Dependent Speaker Verification
The difficulty of obtaining data from impostors and the scarcity of data are two factors that have a large influence in the estimation of speakerdependent thresholds in text-depend...
Javier R. Saeta, Javier Hernando
BIRTHDAY
2006
Springer
15 years 3 months ago
Verification by Parallelization of Parametric Code
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...
Tobias Gedell, Reiner Hähnle