Sciweavers

24 search results - page 4 / 5
» Speaker recognition from encrypted VoIP communications
Sort
View
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 2 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
HCI
2007
13 years 9 months ago
User Expectations from Dictation on Mobile Devices
Mobile phones, with their increasing processing power and memory, are enabling a diversity of tasks. The traditional text entry method using keypad is falling short in numerous way...
Santosh Basapur, Shuang Xu, Mark Ahlenius, Young S...
CHI
2005
ACM
14 years 8 months ago
Topic spotting common sense translation assistant
Our Translation Assistant applies common sense logic to the problem of translating speech in real time from one language to another. Using speech recognition combined with a softw...
Jae-woo Chung, Rachel Kern, Henry Lieberman
TASLP
2010
133views more  TASLP 2010»
13 years 2 months ago
Unsupervised Equalization of Lombard Effect for Speech Recognition in Noisy Adverse Environments
In the presence of environmental noise, speakers tend to adjust their speech production in an effort to preserve intelligible communication. The noise-induced speech adjustments, c...
Hynek Boril, John H. L. Hansen
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 2 months ago
Peer-to-Peer Application Recognition Based on Signaling Activity
—Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ...
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Lau...