Sciweavers

ICASSP
2011
IEEE
13 years 3 months ago
A Bayesian marked point process for object detection. Application to muse hyperspectral data
Marked point processes have received a great attention in the recent years, for their ability to extract objects in large data sets as those obtained in biological studies or hype...
Florent Chatelain, Aude Costard, Olivier J. J. Mic...
ICASSP
2011
IEEE
13 years 3 months ago
Image prediction based on non-negative matrix factorization
This paper presents a novel spatial texture prediction method based on non-negative matrix factorization. As an extension of template matching, approximation based iterative textu...
Mehmet Türkan, Christine Guillemot
ICASSP
2011
IEEE
13 years 3 months ago
Separation and tracking of multiple speakers in a reverberant environment using a multiple model particle filter glimpsing metho
In this paper, we explore the problem of separating and localizing multiple maneuvering speakers in a reverberant environment. Moreover, the speakers can become silent intermitten...
Alireza Masnadi-Shirazi, Bhaskar D. Rao
ICASSP
2011
IEEE
13 years 3 months ago
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization...
Aniketh Talwai, Francis Minhthang Bui, Ashish Khis...
ICASSP
2011
IEEE
13 years 3 months ago
Factored covariance modeling for text-independent speaker verification
Gaussian mixture models (GMMs) are commonly used to model the spectral distribution of speech signals for text-independent speaker verification. Mean vectors of the GMM, used in c...
Eryu Wang, Kong-Aik Lee, Bin Ma, Haizhou Li, Wu Gu...
ICASSP
2011
IEEE
13 years 3 months ago
Online learning with minority class resampling
This paper considers using online binary classification for target detection where the goal is to identify signals of interest within a sequence of received signals generated by ...
Michael J. Pekala, Ashley J. Llorens
ICASSP
2011
IEEE
13 years 3 months ago
Detection of synthetic speech for the problem of imposture
In this paper, we present new results from our research into the vulnerability of a speaker verification (SV) system to synthetic speech. We use a HMM-based speech synthesizer, w...
Phillip L. De Leon, Inma Hernáez, Ibon Sara...
ICASSP
2011
IEEE
13 years 3 months ago
Correlation properties of quantization noise
This paper examines the correlation properties of quantization noise. The quantization noise energy is subtractive if the quantizer output levels are optimized for the probability...
Peter Kabal
ICASSP
2011
IEEE
13 years 3 months ago
A family of algorithms for blind equalization of QAM signals
We propose blind equalization algorithms that perform similarly to supervised ones, independently of the QAM order. They converge approximately to the Wiener solution, which gener...
Joao Mendes Filho, Magno T. M. Silva, Maria D. Mir...
ICASSP
2011
IEEE
13 years 3 months ago
Diffusions of innovations on deterministic topologies
In this paper, we are interested in modeling diffusion of innovations on social networks. We focus on a scenario where innovation emerges at a small number of nodes in the society...
Mehmet Ercan Yildiz, Daron Acemoglu, Asuman E. Ozd...