In this paper we address the issues in construction of discrete hidden Markov models (HMMs) in the feature space of Mercer kernels. The kernel space HMMs are suitable for comp.ex pattern recognition tasks that involve...
详细信息
This paper proposes a method using neural network models for combining evidence from spectral and suprasegmental features for text-dependent speaker verification. Spectral features are extracted using the Dynamic Time...
详细信息
ISBN:
(纸本)0780382439
This paper proposes a method using neural network models for combining evidence from spectral and suprasegmental features for text-dependent speaker verification. Spectral features are extracted using the Dynamic Time Warping (DTW) technique. While extracting the spectral features, the DTW algorithm is used only to obtain a matching score and the information present in the warping path is ignored. In this work a method is discussed to extract suprasegmental features such as pitch and duration using the information in the warping path. Although the suprasegmental features may not yield good performance, combining the evidence from suprasegmental and spectral features improves the performance of the speaker verification system significantly.
We present a simple architectural mechanism called dynamic information flow tracking that can significantly improve the security of comp.ting systems with negligible performance overhead. Dynamic information flow trac...
详细信息
ISBN:
(纸本)1581138040
We present a simple architectural mechanism called dynamic information flow tracking that can significantly improve the security of comp.ting systems with negligible performance overhead. Dynamic information flow tracking protects programs against.malicious software attacks by identifying spurious information flows from untrusted I/O and restricting the usage of the spurious information. Every security attack to take control of a program needs to transfer the program's control to malevolent code. In our approach, the operating system identifies a set of input channels as spurious, and the processor tracks all information flows from those inputs. A broad range of attacks are effectively defeated by checking the use of the spurious values as inst.uctions and pointers. Our protection is transparent to users or application programmers;the executables can be used without any modification. Also, our scheme only incurs, on average, a memory overhead of 1.4% and a performance overhead of 1.1%.
We demonstrate an audio-visual tracking system for meeting analysis. A stereo camera and a microphone array are used to track multiple people and their speech activity in real-time. Our system can estimate the locatio...
详细信息
ISBN:
(纸本)1581139543
We demonstrate an audio-visual tracking system for meeting analysis. A stereo camera and a microphone array are used to track multiple people and their speech activity in real-time. Our system can estimate the location of multiple people, detect the current speaker and build a model of interaction between people in a meeting.
This paper is about the optimization of beamforming weights in the nonlinear array antenna system. We consider the multi-objective optimization using the evolutionary algorithm. First, we constrain two variables - the...
详细信息
This paper is about the optimization of beamforming weights in the nonlinear array antenna system. We consider the multi-objective optimization using the evolutionary algorithm. First, we constrain two variables - the width of the main-lobe, the level of the side-lobe. Second, we constrain an additional variable, the energy of beamforming weights, on the former system. In each case, we comp.te the costs of beamforming weights in each generation. At the end of generations, we can get the Pareto frontier which means the optimal solution set. To demonstrate the performance of the proposed optimization, we comp.re the results between the proposed algorithm and the conventional window method.
We propose a multiuser detection scheme for channelized fast frequency hopping with binary frequency shift keying in uncoordinated, narrow-band frequency hopping systems. "Multiuser" here means uncoordinated...
详细信息
This paper discusses a case study in formal verification and development of secure smart card applications. An elementary Java Card electronic purse applet is presented whose specification can be simply formulated as ...
详细信息
This paper distinguishes several different approaches to organising a weakest pre-condition (WP) calculus in a theorem prover. The implementation of two of these approaches for Java within the LOOP project is describe...
详细信息
We present combination model checking approach using a SAT-based bounded model checker together with a BDD-based symbolic model checker to provide a more efficient counter example generation process. We provide this c...
详细信息
暂无评论