Sciweavers

ICASSP
2011
IEEE
13 years 3 months ago
Robust distributed detection, localization, and estimation of a diffusive target in clustered wireless sensor networks
Robust operation of wireless sensor networks deployed in harsh environment is important in many application. In this paper, we develop a robust technique for distributed detection...
Sami Aldalahmeh, Mounir Ghogho
ICASSP
2011
IEEE
13 years 3 months ago
ECG for blind identity verification in distributed systems
This paper discusses ECG biometric recognition in a distributed system, such as smart cards. In a setting where every card is equipped with an ECG sensor to record heart beats fro...
Jiexin Gao, Foteini Agrafioti, Hoda Mohammadzade, ...
ICASSP
2011
IEEE
13 years 3 months ago
Heterogeneous multiprocessor mapping for real-time streaming systems
Real-time streaming signal processing systems typically desire high throughput and low latency. Many such systems can be modeled as synchronous data flow graphs. In this paper, w...
Jing Lin, Akshaya Srivatsa, Andreas Gerstlauer, Br...
ICASSP
2011
IEEE
13 years 3 months ago
Hidden Discrete Tempo Model: A tempo-aware timing model for audio-to-score alignment
In this paper, we present the Hidden Discrete Tempo Model, an effective Dynamic Bayesian Network for audio to score matching. Its main feature is an explicit modeling of tempo, wh...
Cyril Joder, Slim Essid, Gaël Richard
ICASSP
2011
IEEE
13 years 3 months ago
Leveraging the Web for automatically generating indexable and browsable keywords for speech files
This paper presents a method for generating indexable and browsable keyword metadata from ASR transcripts by leveraging the Web. Search engine queries are built from an ASR transc...
Kishan Thambiratnam, Gang Li, Sha Meng, Frank Seid...
ICASSP
2011
IEEE
13 years 3 months ago
The cost of JPEG compression anti-forensics
The statistical footprint left by JPEG compression can be a valuable source of information for the forensic analyst. Recently, it has been shown that a suitable anti-forensic meth...
Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tu...
ICASSP
2011
IEEE
13 years 3 months ago
Robust Bayesian Analysis applied to Wiener filtering of speech
Commonly used speech enhancement algorithms estimate the power spectral density of the noise to be removed, or make a decision about the presence of speech in a particular frame, ...
Phil Spencer Whitehead, David V. Anderson
ICASSP
2011
IEEE
13 years 3 months ago
Optimization of the antenna array geometry based on a Bayesian DOA estimation criterion
In this paper, we address the problem of the sensor placement for estimating the direction of a narrow-band source, randomly located in the far-field of a planar antenna array. E...
Houcem Gazzah, Jean Pierre Delmas
ICASSP
2011
IEEE
13 years 3 months ago
Logarithmic weak regret of non-Bayesian restless multi-armed bandit
Abstract—We consider the restless multi-armed bandit (RMAB) problem with unknown dynamics. At each time, a player chooses K out of N (N > K) arms to play. The state of each ar...
Haoyang Liu, Keqin Liu, Qing Zhao
ICASSP
2011
IEEE
13 years 3 months ago
Emergence of rationality amongst simple nodes performing adaptive filtering
We present a decentralized adaptive filtering algorithm where each agent acts selfishly to maximize its payoff. Agents are only aware of the actions of other agents within their...
Vikram Krishnamurthy, Omid Namvar Gharehshiran, Am...