Sciweavers

62 search results - page 8 / 13
» Modified bar recursion
Sort
View
98
Voted
ICPR
2010
IEEE
15 years 4 months ago
Noise-Robust Voice Activity Detector Based on Hidden Semi-Markov Models
This paper concentrates on speech duration distributions that are usually invariant to noises and proposes a noise-robust and real-time voice activity detector (VAD) using the hid...
Xianglong Liu, Yuan Liang, Yihua Lou, He Li, Baoso...
ICTAI
2010
IEEE
14 years 11 months ago
Unsupervised Greedy Learning of Finite Mixture Models
This work deals with a new technique for the estimation of the parameters and number of components in a finite mixture model. The learning procedure is performed by means of a expe...
Nicola Greggio, Alexandre Bernardino, Cecilia Lasc...
MIR
2010
ACM
229views Multimedia» more  MIR 2010»
15 years 9 months ago
Wavelet, active basis, and shape script: a tour in the sparse land
Sparse coding is a key principle that underlies wavelet representation of natural images. In this paper, we explain that the effort of seeking a common wavelet sparse coding of i...
Zhangzhang Si, Ying Nian Wu
MICCAI
2009
Springer
16 years 3 months ago
Two-Tensor Tractography Using a Constrained Filter
We describe a technique to simultaneously estimate a weighted, positive-definite multi-tensor fiber model and perform tractography. Existing techniques estimate the local fiber ori...
James G. Malcolm, Martha Elizabeth Shenton, Yoge...
OSDI
2006
ACM
16 years 2 months ago
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML
Vulnerability-driven filtering of network data can offer a fast and easy-to-deploy alternative or intermediary to software patching, as exemplified in Shield [43]. In this paper, ...
Charles Reis, John Dunagan, Helen J. Wang, Opher D...