Sciweavers

ICASSP
2011
IEEE
13 years 3 months ago
Closed-form expressions vs. BIC: A comparison for speaker clustering
In this paper, the use of closed-form expressions is compared to the BIC approximation, with respect to speaker clustering. We first show that the particular BIC setting which is...
Themos Stafylakis, Xavier Anguera Miró, Vas...
ICASSP
2011
IEEE
13 years 3 months ago
A new structure with spectrum-tuning of residual noise for active noise control
Typical active noise control (ANC) system aims primarily at reducing the acoustic noise over the entire frequency band. Non-uniformity of human hearing response in frequency domai...
Hua Bao, Issa M. S. Panahi
ICASSP
2011
IEEE
13 years 3 months ago
CYCLOP: A stereo color image quality assessment metric
—In this work, a reduced reference (RR) perceptual quality metric for color stereoscopic images is presented. Given a reference stereo pair of images and their ”distorted” ve...
Aldo Maalouf, Mohamed-Chaker Larabi
ICASSP
2011
IEEE
13 years 3 months ago
A new speaker identification algorithm for gaming scenarios
Speaker identification is a well-established research problem but has not been a major application used in gaming scenarios. In this paper, we propose a new algorithm for the ope...
Hoang Do, Ivan Tashev, Alex Acero
ICASSP
2011
IEEE
13 years 3 months ago
Fixed point iteration for max-min sir balancing with general interference functions
This paper studies the convergence of a fixed point iteration algorithm for the problem of max-min signal-to-interference ratio (SIR) balancing. Differently from the existing wor...
Nikola Vucic, Martin Schubert
ICASSP
2011
IEEE
13 years 3 months ago
Joint source-channel-network coding for bidirectional wireless relays
The application of joint source-channel coding, based on fountain codes, in the broadcast timeslot of wireless two-way network coding is investigated in this paper. A computationa...
Francois P. S. Luus, Bodhaswar T. Maharaj
ICASSP
2011
IEEE
13 years 3 months ago
Smart grid monitoring for intrusion and fault detection with new locally optimum testing procedures
The vulnerability of smart grid systems is a growing concern. Signal detection theory is employed here to detect a change in the system. We employ a discrete-time linear state spa...
Qian He, Rick S. Blum
ICASSP
2011
IEEE
13 years 3 months ago
Log spectra enhancement using speaker dependent priors for speaker verification
We present a variational Bayesian algorithm that enhances the log spectra of noisy speech using speaker dependent priors. This algorithm extends prior work by Frey et al. where th...
Ciira Wa Maina, John MacLaren Walsh
ICASSP
2011
IEEE
13 years 3 months ago
Use of VTL-wise models in feature-mapping framework to achieve performance of multiple-background models in speaker verification
Recently, Multiple Background Models (M-BMs) [1, 2] have been shown to be useful in speaker verification, where the M-BMs are formed based on different Vocal Tract Lengths (VTLs)...
Achintya Kumar Sarkar, Srinivasan Umesh
ICASSP
2011
IEEE
13 years 3 months ago
Multidimensional ICA and its performance analysis applied to CMB observations
This paper deals with multidimensional ICA and its performance analysis, applied to cosmological observations. Our purpose is the separation of the cosmic microwave background rad...
Dana Lahat, Jean-François Cardoso, Maude Le...