This paper addresses the problem of social interaction analysis in competitive meetings, using nonverbal cues. For our study, we made use of ”The Apprentice” reality TV show, ...
This paper introduces a color visual cryptography encryption method that produces meaningful color shares via visual information pixel (VIP) synchronization and error diffusion ha...
We introduce a model for extractive meeting summarization based on the hypothesis that utterances convey bits of information, or concepts. Using keyphrases as concepts weighted by...
Smart homes for the aging population have recently started attracting the attention of the research community. One of the problems of interest is this of monitoring the activities...
Jing Huang, Xiaodan Zhuang, Vit Libal, Gerasimos P...
We propose an algorithm that enables joint Viterbi decoding of multiple independent audio recordings of a word to derive its pronunciation. Experiments show that this method resul...
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
This paper addresses the problem of using unstructured queries to search a structured database in voice search applications. By incorporating structural information in music metad...
Young-In Song, Ye-Yi Wang, Yun-Cheng Ju, Mike Selt...
This paper develops a Bayesian network (BN) predictor to profile cross-race gene expression data. Cross-race studies face more data variability than single-lab studies. Our desig...
In recent years, the field of automatic speaker identification has begun to exploit high-level sources of speaker-discriminative information, in addition to traditional models o...
Abstract –In this paper, a variational message passing framework is proposed for Markov random fields, which is computationally more efficient and admits wider applicability comp...