Sciweavers

323 search results - page 54 / 65
» Prediction error estimation: a comparison of resampling meth...
Sort
View
137
Voted
NIPS
2007
15 years 5 months ago
Discovering Weakly-Interacting Factors in a Complex Stochastic Process
Dynamic Bayesian networks are structured representations of stochastic processes. Despite their structure, exact inference in DBNs is generally intractable. One approach to approx...
Charlie Frogner, Avi Pfeffer
138
Voted
INTERSPEECH
2010
14 years 10 months ago
HMM adaptation using linear spline interpolation with integrated spline parameter training for robust speech recognition
We recently proposed a method for HMM adaptation to noisy environments called Linear Spline Interpolation (LSI). LSI uses linear spline regression to model the relationship betwee...
Michael L. Seltzer, Alex Acero
229
Voted
CVPR
2011
IEEE
14 years 11 months ago
Real-time Human Pose Recognition in Parts from Single Depth Images
We propose a new method to quickly and accurately predict 3D positions of body joints from a single depth image, using no temporal information. We take an object recognition appro...
Jamie Shotton, Andrew Fitzgibbon, Mat Cook, Andrew...
144
Voted
BROADNETS
2004
IEEE
15 years 7 months ago
The Effects of the Sub-Carrier Grouping on Multi-Carrier Channel Aware Scheduling
Channel-aware scheduling and link adaptation (LA) methods are widely considered to be crucial for realizing high data rates in wireless networks. Multi-carrier systems that spread...
Fanchun Jin, Gokhan Sahin, Amrinder Arora, Hyeong-...
165
Voted
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 9 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...