Sciweavers

24105 search results - page 4506 / 4821
» Models in Information Retrieval
Sort
View
IJSN
2007
73views more  IJSN 2007»
15 years 4 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
TASLP
2008
101views more  TASLP 2008»
15 years 4 months ago
Speaker Identification Using Instantaneous Frequencies
This work presents an experimental evaluation of different features for use in speaker identification. The features are tested using speech data provided by the CHAINS corpus, in a...
Marco Grimaldi, Fred Cummins
IJVR
2007
202views more  IJVR 2007»
15 years 4 months ago
Full Solid Angle Panoramic Viewing by Depth Image Warping on Field Programmable Gate Array
—To construct 3D virtual scenes from two-dimensional images with depth information, image warping techniques could be used. In this paper, a novel approach of cylindrical depth i...
Xiaoying Li, Baoquan Liu, Enhua Wu
TASLP
2008
141views more  TASLP 2008»
15 years 4 months ago
Unsupervised Pattern Discovery in Speech
We present a novel approach to speech processing based on the principle of pattern discovery. Our work represents a departure from traditional models of speech recognition, where t...
A. S. Park, J. R. Glass
TASLP
2008
99views more  TASLP 2008»
15 years 4 months ago
Epoch Extraction From Speech Signals
Epoch is the instant of significant excitation of the vocal-tract system during production of speech. For most voiced speech, the most significant excitation takes place around the...
K. S. R. Murty, B. Yegnanarayana
« Prev « First page 4506 / 4821 Last » Next »