Sciweavers

2279 search results - page 383 / 456
» Robust Circle Detection
Sort
View
GMP
2008
IEEE
197views Solid Modeling» more  GMP 2008»
15 years 4 months ago
Determining Directional Contact Range of Two Convex Polyhedra
The directional contact range of two convex polyhedra is the range of positions that one of the polyhedron may locate along a given straight line so that the two polyhedra are in c...
Yi-King Choi, Xueqing Li, Fengguang Rong, Wenping ...
ICASSP
2008
IEEE
15 years 4 months ago
Audio authentication based on distributed source coding
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
David P. Varodayan, Yao-Chung Lin, Bernd Girod
ICASSP
2008
IEEE
15 years 4 months ago
Toward a detector-based universal phone recognizer
In recent research, we have proposed a high-accuracy bottom-up detection-based paradigm for continuous phone speech recognition. The key component of our system was a bank of arti...
Sabato Marco Siniscalchi, Torbjørn Svendsen...
ICASSP
2008
IEEE
15 years 4 months ago
Automatic lecture transcription by exploiting presentation slide information for language model adaptation
The paper addresses language model adaptation for automatic lecture transcription by fully exploiting presentation slide information used in the lecture. As the text in the presen...
Tatsuya Kawahara, Yusuke Nemoto, Yuya Akita
ICC
2008
IEEE
123views Communications» more  ICC 2008»
15 years 4 months ago
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...