Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Gaussian mixture models (GMMs) are commonly used to model the spectral distribution of speech signals for text-independent speaker verification. Mean vectors of the GMM, used in c...
Eryu Wang, Kong-Aik Lee, Bin Ma, Haizhou Li, Wu Gu...
Face verification has many potential applications including
filtering and ranking image/video search results on
celebrities. Since these images/videos are taken under uncontrolle...
Xiaogang Wang (MIT), Cha Zhang (Microsoft Research...
The difficulty of obtaining data from impostors and the scarcity of data are two factors that have a large influence in the estimation of speakerdependent thresholds in text-depend...
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...