Sciweavers

1249 search results - page 107 / 250
» Limitations of the Even-Mansour Construction
Sort
View
GLOBECOM
2009
IEEE
15 years 8 months ago
How Much Training Is Needed for Iterative Multiuser Detection and Decoding?
Abstract—This paper studies large randomly spread directsequence code-division multiple-access system operating over a block fading multipath channel. Channel knowledge is obtain...
Mikko Vehkaperä, Keigo Takeuchi, Ralf R. M&uu...
ICASSP
2009
IEEE
15 years 8 months ago
Using a pitch-synchronous residual codebook for hybrid HMM/frame selection speech synthesis
This paper proposes a method to improve the quality delivered by statistical parametric speech synthesizers. For this, we use a codebook of pitch-synchronous residual frames, so a...
Thomas Drugman, Alexis Moinet, Thierry Dutoit, Geo...
ICASSP
2009
IEEE
15 years 8 months ago
Language model parameter estimation using user transcriptions
In limited data domains, many effective language modeling techniques construct models with parameters to be estimated on an in-domain development set. However, in some domains, no...
Bo-June Paul Hsu, James R. Glass
ICDAR
2009
IEEE
15 years 8 months ago
Manuscript Bleed-through Removal via Hysteresis Thresholding
Many types of degradation can render ancient manuscripts very hard to read. In bleed-through, the text from the reverse, or verso, side of a page seeps through into the front, or ...
Rolando Estrada, Carlo Tomasi
ICICS
2009
Springer
15 years 7 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson