Recent studies in speaker recognition have shown that scorelevel combination of subsystems can yield significant performance gains over individual subsystems. We explore the use ...
Luciana Ferrer, Martin Graciarena, Argyrios Zymnis...
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
As most computer systems are expected to remain operational 24 hours a day, 7 days a week, they must complete maintenance work while in operation. This work is in addition to the ...
Qi Zhang, Ningfang Mi, Evgenia Smirni, Alma Riska,...
With very noisy data, having plentiful samples eliminates overfitting in nonlinear regression, but not in nonlinear principal component analysis (NLPCA). To overcome this problem...
—Intelligent mobile terminals (or users) of next generation wireless networks are expected to initiate voice over IP (VoIP) calls using session set-up protocols like H.323 or SIP...