Sciweavers

345 search results - page 41 / 69
» When Systems Loose their Identity
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Hilbert envelope based features for robust speaker identification under reverberant mismatched conditions
It is well known that MFCC based speaker identification (SID) systems easily break down under mismatched training and test conditions. One such mismatch occurs when a SID system ...
Seyed Omid Sadjadi, John H. L. Hansen
CHI
2009
ACM
14 years 10 months ago
Resilience through technology adoption: merging the old and the new in Iraq
Little attention has been given to how citizens use technology to be resilient when their country is at war. We report on an ethnographic interview study of how technology was ado...
Gloria Mark, Ban Al-Ani, Bryan Semaan
ICASSP
2008
IEEE
14 years 4 months ago
Single-channel speech separation based on modulation frequency
This paper describes an algorithm that performs a simple form of computational auditory scene analysis to separate multiple speech signals from one another on the basis of the mod...
Lingyun Gu, Richard M. Stern
ICNP
2007
IEEE
14 years 4 months ago
FRASA: Feedback Retransmission Approximation for the Stability Region of Finite-User Slotted ALOHA
—FRASA, Feedback Retransmission Approximation for Slotted ALOHA, is proposed to study the stability region of finiteuser slotted ALOHA under collision channel. With FRASA, the s...
Ka-Hung Hui, On-Ching Yue, Wing Cheong Lau
NDSS
2006
IEEE
14 years 4 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...