Sciweavers

247 search results - page 16 / 50
» Extracting All the Randomness from a Weakly Random Source
Sort
View
TASLP
2010
159views more  TASLP 2010»
13 years 2 months ago
Under-Determined Reverberant Audio Source Separation Using a Full-Rank Spatial Covariance Model
This article addresses the modeling of reverberant recording environments in the context of under-determined convolutive blind source separation. We model the contribution of each ...
Ngoc Q. K. Duong, Emmanuel Vincent, Rémi Gr...
ICASSP
2011
IEEE
12 years 11 months ago
An acoustically-motivated spatial prior for under-determined reverberant source separation
We consider the task of under-determined reverberant audio source separation. We model the contribution of each source to all mixture channels in the time-frequency domain as a ze...
Ngoc Q. K. Duong, Emmanuel Vincent, Rémi Gr...
ICASSP
2010
IEEE
13 years 7 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
13 years 9 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
VALUETOOLS
2006
ACM
112views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime
— Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay no...
Ahmad Al Hanbali, Philippe Nain, Eitan Altman