Sciweavers

1856 search results - page 244 / 372
» Phoning it in
Sort
View
ICASSP
2008
IEEE
14 years 3 months ago
Speech privacy for modern mobile communication systems
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have ...
Jose Francisco de Andrade, Marcello Luiz Rodrigues...
ICASSP
2008
IEEE
14 years 3 months ago
A GIS-like training algorithm for log-linear models with hidden variables
Conditional Random Fields (CRFs) are often estimated using an entropy based criterion in combination with Generalized Iterative Scaling (GIS). GIS offers, upon others, the immedi...
Georg Heigold, Thomas Deselaers, Ralf Schlüte...
ICASSP
2008
IEEE
14 years 3 months ago
Confidence estimation, OOV detection and language ID using phone-to-word transduction and phone-level alignments
Automatic Speech Recognition (ASR) systems continue to make errors during search when handling various phenomena including noise, pronunciation variation, and out of vocabulary (O...
Christopher M. White, Geoffrey Zweig, Lukas Burget...
ICASSP
2008
IEEE
14 years 3 months ago
Maximum conditional likelihood linear regression and maximum a posteriori for hidden conditional random fields speaker adaptatio
This paper shows how to improve Hidden Conditional Random Fields (HCRFs) for phone classification by applying various speaker adaptation techniques. These include Maximum A Poste...
Yun-Hsuan Sung, Constantinos Boulis, Daniel Jurafs...
ICIP
2008
IEEE
14 years 3 months ago
Adaptive block-based approach to image stabilization
The objective of image stabilization is to prevent image blurring caused by the relative motion between the camera and the scene during the image integration time. In this paper w...
Marius Tico