Sciweavers

3771 search results - page 512 / 755
» Subobject Transformation Systems
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 8 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
ICASSP
2011
IEEE
14 years 7 months ago
Dynamics of tongue gestures extracted automatically from ultrasound
We describe a system for automatically extracting dynamics of tongue gestures from ultrasound images of the tongue using translational deep belief networks (tDBNs). In tDBNs, a jo...
Jeff Berry, Ian Fasel
ICASSP
2011
IEEE
14 years 7 months ago
The Bayesian inference of phase
Bayesian recursive inference of phase in additive Gaussian noise environments is studied. A tractable conjugate system is established using a von Mises distribution. Its shaping p...
Anthony Quinn, Jean-Pierre Barbot, Pascal Larzabal
ICASSP
2011
IEEE
14 years 7 months ago
HMM-based speech synthesiser using the LF-model of the glottal source
A major factor which causes a deterioration in speech quality in HMM-based speech synthesis is the use of a simple delta pulse signal to generate the excitation of voiced speech. ...
João P. Cabral, Steve Renals, Junichi Yamag...
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 7 months ago
Oracle database filesystem
Modern enterprise, web, and multimedia applications are generating unstructured content at unforeseen volumes in the form of documents, texts, and media files. Such content is gen...
Krishna Kunchithapadam, Wei Zhang, Amit Ganesh, Ni...