This paper introduces a color visual cryptography encryption method that produces meaningful color shares via visual information pixel (VIP) synchronization and error diffusion ha...
We introduce a model for extractive meeting summarization based on the hypothesis that utterances convey bits of information, or concepts. Using keyphrases as concepts weighted by...
Smart homes for the aging population have recently started attracting the attention of the research community. One of the problems of interest is this of monitoring the activities...
Jing Huang, Xiaodan Zhuang, Vit Libal, Gerasimos P...
We propose an algorithm that enables joint Viterbi decoding of multiple independent audio recordings of a word to derive its pronunciation. Experiments show that this method resul...
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
This paper addresses the problem of using unstructured queries to search a structured database in voice search applications. By incorporating structural information in music metad...
Young-In Song, Ye-Yi Wang, Yun-Cheng Ju, Mike Selt...
This paper develops a Bayesian network (BN) predictor to profile cross-race gene expression data. Cross-race studies face more data variability than single-lab studies. Our desig...
In recent years, the field of automatic speaker identification has begun to exploit high-level sources of speaker-discriminative information, in addition to traditional models o...
Abstract –In this paper, a variational message passing framework is proposed for Markov random fields, which is computationally more efficient and admits wider applicability comp...
Discriminative reranking has been able to significantly improve parsing performance, and co-training has proven to be an effective weakly supervised learning algorithm to bootstr...