Sciweavers

ICASSP
2011
IEEE
13 years 3 months ago
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization...
Aniketh Talwai, Francis Minhthang Bui, Ashish Khis...
ICASSP
2011
IEEE
13 years 3 months ago
Factored covariance modeling for text-independent speaker verification
Gaussian mixture models (GMMs) are commonly used to model the spectral distribution of speech signals for text-independent speaker verification. Mean vectors of the GMM, used in c...
Eryu Wang, Kong-Aik Lee, Bin Ma, Haizhou Li, Wu Gu...
ICASSP
2011
IEEE
13 years 3 months ago
Online learning with minority class resampling
This paper considers using online binary classification for target detection where the goal is to identify signals of interest within a sequence of received signals generated by ...
Michael J. Pekala, Ashley J. Llorens
ICASSP
2011
IEEE
13 years 3 months ago
Detection of synthetic speech for the problem of imposture
In this paper, we present new results from our research into the vulnerability of a speaker verification (SV) system to synthetic speech. We use a HMM-based speech synthesizer, w...
Phillip L. De Leon, Inma Hernáez, Ibon Sara...
ICASSP
2011
IEEE
13 years 3 months ago
Correlation properties of quantization noise
This paper examines the correlation properties of quantization noise. The quantization noise energy is subtractive if the quantizer output levels are optimized for the probability...
Peter Kabal
ICASSP
2011
IEEE
13 years 3 months ago
A family of algorithms for blind equalization of QAM signals
We propose blind equalization algorithms that perform similarly to supervised ones, independently of the QAM order. They converge approximately to the Wiener solution, which gener...
Joao Mendes Filho, Magno T. M. Silva, Maria D. Mir...
ICASSP
2011
IEEE
13 years 3 months ago
Diffusions of innovations on deterministic topologies
In this paper, we are interested in modeling diffusion of innovations on social networks. We focus on a scenario where innovation emerges at a small number of nodes in the society...
Mehmet Ercan Yildiz, Daron Acemoglu, Asuman E. Ozd...
ICASSP
2011
IEEE
13 years 3 months ago
The least-mean-magnitude-phase algorithm with applications to communications systems
This paper presents the least-mean-magnitude-phase (LMMP) algorithm for adaptive signal processing of complex-valued signals. The algorithm employs a decomposition of the meansqua...
Scott C. Douglas, Danilo P. Mandic
ICASSP
2011
IEEE
13 years 3 months ago
Analysis of human footsteps utilizing multi-axial seismic fusion
This paper introduces a method of enhancing an unattended ground sensor (UGS) system’s classification capability of humans via seismic signatures while subsequently discriminati...
Sean Schumer
ICASSP
2011
IEEE
13 years 3 months ago
Distributed auxiliary particle filters using selective gossip
This paper introduces a distributed auxiliary particle filter for target tracking in sensor networks. Nodes maintain a shared particle filter by coming to a consensus about the ...
Deniz Üstebay, Mark Coates, Michael Rabbat