The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
— Designing a localization system for a low-cost robotic consumer product poses a major challenge. In previous work, we introduced Vector Field SLAM [5], a system for simultaneou...
Jens-Steffen Gutmann, Gabriel Brisson, Ethan Eade,...
Abstract. We apply sparse Bayesian learning methods, automatic relevance determination (ARD) and predictive ARD (PARD), to Alzheimer’s disease (AD) classification to make accura...
Li Shen, Yuan Qi, Sungeun Kim, Kwangsik Nho, Jing ...
We extend our earlier work on deep-structured conditional random field (DCRF) and develop deep-structured hidden conditional random field (DHCRF). We investigate the use of this n...
The performance of a typical speaker verification system degrades significantly in reverberant environments. This degradation is partly due to the conventional feature extractio...
Sriram Ganapathy, Jason W. Pelecanos, Mohamed Kama...