Sciweavers

1433 search results - page 264 / 287
» An approach to detecting failures automatically
Sort
View
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 6 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
ACCV
2010
Springer
13 years 4 months ago
Spatiotemporal Closure
Spatiotemporal segmentation is an essential task for video analysis. The strong interconnection between finding an object's spatial support and finding its motion characterist...
Alex Levinshtein, Cristian Sminchisescu, Sven J. D...
INTERSPEECH
2010
13 years 4 months ago
Emotion recognition using imperfect speech recognition
This paper investigates the use of speech-to-text methods for assigning an emotion class to a given speech utterance. Previous work shows that an emotion extracted from text can c...
Florian Metze, Anton Batliner, Florian Eyben, Tim ...
INTERSPEECH
2010
13 years 4 months ago
VAD-measure-embedded decoder with online model adaptation
We previously proposed a decoding method for automatic speech recognition utilizing hypothesis scores weighted by voice activity detection (VAD)-measures. This method uses two Gau...
Tasuku Oonishi, Koji Iwano, Sadaoki Furui
ICASSP
2011
IEEE
13 years 1 months ago
Further analysis of latent affective mapping for naturally expressive speech synthesis
An essential step in the generation of expressive speech synthesis is the automatic detection and classification of emotions most likely to be present in textual input. At last I...
Jerome R. Bellegarda