In this paper, we examine the problem of text-independent open-set speaker identification (OS-SI) in broadcast news. Particularly, the impact of the population of registered speak...
Chao Gao, Guruprasad Saikumar, Amit Srivastava, Pr...
In this paper, we present a new evaluation approach for missing data techniques (MDTs) where the efficiency of those are investigated using listwise deletion method as reference....
Seliz G. Karadogan, Letizia Marchegiani, Lars Kai ...
In this paper, we extend the statistical model-based Estimation-Quantization (EQ) wavelet image coding algorithm introduced in [?] to include an adaptive transform component. For ...
The structural health of airframes is often monitored by analysis of the frequency of occurrence matrix (FOOM) produced after each flight. Each cell in the matrix records a stress...
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli