Sciweavers

12194 search results - page 123 / 2439
» cans 2010
Sort
View
IJNSEC
2010
66views more  IJNSEC 2010»
13 years 4 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
INTERSPEECH
2010
13 years 4 months ago
Redescribing intonational categories with functional data analysis
Intonational research is often dependent upon hand-labeling by trained listeners, which can be prone to bias or error. We apply tools from Functional Data Analysis (FDA) to a set ...
Margaret Zellers, Michele Gubian, Brechtje Post
INTERSPEECH
2010
13 years 4 months ago
Say what? why users choose to speak their web queries
The context in which a speech-driven application is used (or conversely not used) can be an important signal for recognition engines, and for spoken interface design. Using large-...
Maryam Kamvar, Doug Beeferman
INTERSPEECH
2010
13 years 4 months ago
Phonetic subspace mixture model for speaker diarization
This paper presents an improved distance measure for speaker clustering in speaker diarization systems. The proposed phonetic subspace mixture (PSM) model introduces phonetic info...
I-Fan Chen, Shih-Sian Cheng, Hsin-Min Wang
INTERSPEECH
2010
13 years 4 months ago
Exploiting glottal formant parameters for glottal inverse filtering and parameterization
It is crucial for many methods of inverse filtering that the time domain information of the glottal source waveform is known, e.g. the location of the instant of glottal closure. ...
Alan Ó Cinnéide, David Dorran, Mikel...