Sciweavers

ICASSP
2011
IEEE
13 years 3 months ago
Multi-stage infrared stationary human detection
Detecting stationary human targets is crucial in ensuring safe operation of unmanned ground vehicles. In this paper, a multi-stage detection algorithm for stationary humans in inf...
Alex Lipchen Chan
ICASSP
2011
IEEE
13 years 3 months ago
Multi-rank processing for passive ranging in underwater acoustic environments subject to spatial coherence loss
In this work we derive the maximum likelihood estimator for passive wavefront curvature ranging systems operating in environments subject to a spatial coherence loss. As a consequ...
Hongya Ge, Ivars P. Kirsteins
ICASSP
2011
IEEE
13 years 3 months ago
Cross-Channel Spectral Subtraction for meeting speech recognition
We propose Cross-Channel Spectral Subtraction (CCSS), a source separation method for recognizing meeting speech where one microphone is prepared for each speaker. The method quick...
Yu Nasu, Koichi Shinoda, Sadaoki Furui
ICASSP
2011
IEEE
13 years 3 months ago
Automatic music tagging via PARAFAC2
Automatic music tagging is addressed by resorting to auditory temporal modulations and Parallel Factor Analysis 2 (PARAFAC2). The starting point is to represent each music recordi...
Yannis Panagakis, Constantine Kotropoulos
ICASSP
2011
IEEE
13 years 3 months ago
Combination of stochastic understanding and machine translation systems for language portability of dialogue systems
In this paper, several approaches for language portability of dialogue systems are investigated with a focus on the spoken language understanding (SLU) component. We show that the...
Bassam Jabaian, Laurent Besacier, Fabrice Lefevre
ICASSP
2011
IEEE
13 years 3 months ago
Robust talking face video verification using joint factor analysis and sparse representation on GMM mean shifted supervectors
It has been previously demonstrated that systems based on block wise local features and Gaussian mixture models (GMM) are suitable for video based talking face verification due t...
Ming Li, Shrikanth Narayanan
ICASSP
2011
IEEE
13 years 3 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
ICASSP
2011
IEEE
13 years 3 months ago
Objective evaluation of the Dynamic Model Selection method for spectral voice conversion
Spectral voice conversion is usually performed using a single model selected in order to represent a tradeoff between goodness of fit and complexity. Recently, we proposed a new ...
Pierre Lanchantin, Xavier Rodet
ICASSP
2011
IEEE
13 years 3 months ago
Maximum likelihood ICA of quaternion Gaussian vectors
This work considers the independent component analysis (ICA) of quaternion random vectors. In particular, we focus on the Gaussian case, and therefore the ICA problem is solved by...
Javier Vía, Daniel P. Palomar, Luis Vielva,...
ICASSP
2011
IEEE
13 years 3 months ago
The Centered Discrete Fourier Transform and a parallel implementation of the FFT
This paper describes a novel method for the computation of the Discrete Fourier Transform (DFT). The development of a truly centered DFT is coupled with a method for computing the...
Dale H. Mugler