A general scheme for trust-region methods on Riemannian manifolds is proposed and analyzed. Among the various approaches available to (approximately) solve the trust-region subpro...
Pierre-Antoine Absil, C. G. Baker, Kyle A. Galliva...
: Many believe that today's Web has not yet reached the full potential which globally distributed systems may achieve in terms of information access and use. Realizing this po...
We describe a new approach to speech recognition, in which all Hidden Markov Model (HMM) states share the same Gaussian Mixture Model (GMM) structure with the same number of Gauss...
Daniel Povey, Lukas Burget, Mohit Agarwal, Pinar A...
— Periocular biometric refers to the facial region in the immediate vicinity of the eye. Acquisition of the periocular biometric does not require high user cooperation and close ...
Unsang Park, Raghavender R. Jillela, Arun Ross, An...
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...