Sciweavers

2047 search results - page 300 / 410
» The limits of speech recognition
Sort
View
ACHI
2008
IEEE
14 years 3 months ago
Face Authentication for Banking
—This paper analyzes the benefit and the limitations of using a particular biometric technology “namely face authentication” for banking applications. We present first the ge...
Baptiste Hemery, Julien Mahier, Marc Pasquet, Chri...
ICB
2007
Springer
207views Biometrics» more  ICB 2007»
14 years 27 days ago
Super-Resolved Faces for Improved Face Recognition from Surveillance Video
Characteristics of surveillance video generally include low resolution and poor quality due to environmental, storage and processing limitations. It is extremely difficult for comp...
Frank Lin, Clinton Fookes, Vinod Chandran, Sridha ...
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 3 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
PAA
2006
13 years 9 months ago
Audio-visual sports highlights extraction using Coupled Hidden Markov Models
We present our studies on the application of Coupled Hidden Markov Models(CHMMs) to sports highlights extraction from broadcast video using both audio and video information. First,...
Ziyou Xiong
ICASSP
2011
IEEE
13 years 22 days ago
Exemplar-based Sparse Representation phone identification features
Exemplar-based techniques, such as k-nearest neighbors (kNNs) and Sparse Representations (SRs), can be used to model a test sample from a few training points in a dictionary set. ...
Tara N. Sainath, David Nahamoo, Bhuvana Ramabhadra...