Sciweavers

14824 search results - page 2781 / 2965
» Security - Introduction
Sort
View
SPEECH
2010
94views more  SPEECH 2010»
14 years 6 months ago
Predicting the phonetic realizations of word-final consonants in context - A challenge for French grapheme-to-phoneme converters
One of the main problems in developing a text-to-speech (TTS) synthesizer for French lies in grapheme-to-phoneme conversion. Automatic converters produce still too many errors in ...
Josafá de Jesus Aguiar Pontes, Sadaoki Furu...
SPEECH
2010
154views more  SPEECH 2010»
14 years 6 months ago
Long story short - Global unsupervised models for keyphrase based meeting summarization
act 11 We analyze and compare two different methods for unsupervised extractive spontaneous speech summarization in the meeting 12 domain. Based on utterance comparison, we introdu...
Korbinian Riedhammer, Benoît Favre, Dilek Ha...
SPEECH
2010
122views more  SPEECH 2010»
14 years 6 months ago
Similarity and familiarity: Second language sentence recognition in first- and second-language multi-talker babble
The intelligibility of speech in noisy environments depends not only on the functionality of listeners' peripheral auditory systems, but also on cognitive factors such as the...
Kristin J. Van Engen
TCSV
2010
14 years 6 months ago
Object Tracking in Structured Environments for Video Surveillance Applications
Abstract--We present a novel tracking method for effectively tracking objects in structured environments. The tracking method finds applications in security surveillance, traffic m...
Junda Zhu, Yuanwei Lao, Yuan F. Zheng
TDP
2010
140views more  TDP 2010»
14 years 6 months ago
Movement Data Anonymity through Generalization
In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diffusion of mobile devices (e.g., mobile phones, RFID devices and GPS ...
Anna Monreale, Gennady L. Andrienko, Natalia V. An...
« Prev « First page 2781 / 2965 Last » Next »