Sciweavers

ICASSP
2011
IEEE
13 years 3 months ago
Factor graph switching portfolios under transaction costs
We consider the sequential portfolio investment problem. Building on results in signal processing, machine learning, and other areas, we use factor graphs to develop new universal...
Andrew J. Bean, Andrew C. Singer
ICASSP
2011
IEEE
13 years 3 months ago
Clustering and suppression of transient noise in speech signals using diffusion maps
Recently we have presented a novel approach for transient noise reduction that relies on non-local (NL) filtering. In this paper, we modify and extend our approach to support clu...
Ronen Talmon, Israel Cohen, Sharon Gannot
ICASSP
2011
IEEE
13 years 3 months ago
Automatic speech recognition using Hidden Conditional Neural Fields
Hidden Conditional Random Fields(HCRF) is a very promising approach to model speech. However, because HCRF computes the score of a hypothesis by summing up linearly weighted featu...
Yasuhisa Fujii, Kazumasa Yamamoto, Seiichi Nakagaw...
ICASSP
2011
IEEE
13 years 3 months ago
Analysis of phone confusion in EMG-based speech recognition
In this paper we present a study on phone confusabilities based on phone recognition experiments from facial surface electromyographic (EMG) signals. In our study EMG captures the...
Michael Wand, Tanja Schultz
ICASSP
2011
IEEE
13 years 3 months ago
Secure video processing: Problems and challenges
Secure signal processing is an emerging technology to enable signal processing tasks in a secure and privacy-preserving fashion. It has attracted a great amount of research attent...
Wenjun Lu, Avinash L. Varna, Min Wu
ICASSP
2011
IEEE
13 years 3 months ago
A modified MAP criterion based on hidden Markov model for voice activity detecion
The maximum a posteriori (MAP) criterion is broadly used in the statistical model-based voice activity detection (VAD) approaches. In the conventional MAP criterion, however, the ...
Shiwen Deng, Jiqing Han, Tieran Zheng, Guibin Zhen...
ICASSP
2011
IEEE
13 years 3 months ago
Calibration and weight of the evidence by human listeners. The ATVS-UAM submission to NIST HUMAN-aided speaker recognition 2010
This work analyzes the performance of speaker recognition when carried out by human lay listeners. In forensics, judges and jurors usually manifest intuition that people is profi...
Daniel Ramos, Javier Franco-Pedroso, Joaquin Gonza...
ICASSP
2011
IEEE
13 years 3 months ago
Ordering for energy efficient estimation and optimization in sensor networks
A discretized version of a continuous optimization problem is considered for the case where data is obtained from a set of dispersed sensor nodes and the overall metric is a sum o...
Rick S. Blum
ICASSP
2011
IEEE
13 years 3 months ago
Extended Viterbi algorithm for optimized word HMMS
This paper deals with the problem of finding the optimal sequence of sub-word unit HMMs for a number of given utterances of a word. For this problem we present a new solution bas...
Michael Gerber, Tobias Kaufmann, Beat Pfister
ICASSP
2011
IEEE
13 years 3 months ago
Distributed routing in networks using affinity propagation
This paper applies affinity propagation (AP) to develop distributed solutions for routing over networks. AP is a message passing algorithm for unsupervised learning. This paper d...
Manohar Shamaiah, Sang Hyun Lee, Sriram Vishwanath...