Information & computer science publications
-
Constrained Optimal Selection for Multi-Sensor Robot Navigation Using Plug-and-Play Factor Graphs
This paper proposes a real-time navigation approach that is able to integrate many sensor types while fulfilling performance needs and system constraints.
-
Forensic Prescreening System Using Coded Aperture Snapshot Spectral Imager
We present a camera system for instantaneous, non-destructive capture of spectral signatures for forensic analysis. Our system detects highly probative samples in the forensic scene mixed by the multiple target…
-
Unscented Transform for iVector-Based Noisy Speaker Recognition
In this paper, it is proposed to substitute the first order VTS by an unscented transform, where unlike VTS, the nonlinear function is not applied over the clean model parameters…
-
Automatic Characterization of Speaking Styles in Educational Videos
We use crowd-sourcing to explore speaking style dimensions in online educational videos, and then propose techniques based solely on acoustic features for automatically identifying a subset of the dimensions.
-
The IEEE Symposium on Security and Privacy, in Retrospect
We focus on SSP’s evolution and its vital relevance to the research and development communities along its path from community gathering to premier security research meeting.
-
DCAD: Dynamic Cell Anomaly Detection for Operational Cellular Networks
In this paper, we present Dynamic Cell Anomaly Detection (DCAD), a tool that implements an adaptive ensemble method for modeling cell behavior [5], [6].
-
Emotion Detection in Speech Using Deep Networks
We propose a novel staged hybrid model for emotion detection in speech. Hybrid models exploit the strength of discriminative classifiers along with the representational power of generative models.
-
Global Ethics and Virtual Worlds: Ensuring Functional Integrity in Transnational Research Studies
This paper examines a number of issues in this research context, with particular stress on the challenges posed by transnational experimental projects in virtual worlds and social networks.
-
Neuroscience Meets Cryptography: Crypto Primitives Secure against Rubber Hose Attacks
We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to plant a secret password in the participant’s brain…
-
NV-CMOS HD Camera for Day/Night Imaging
SRI International (SRI) has developed a new multi-purpose day/night video camera with low-light imaging performance comparable to an image intensifier, while offering the size, weight, ruggedness, and cost advantages enabled…
-
Medium-Duration Modulation Cepstral Feature for Robust Speech Recognition
In this paper, we present the Modulation of Medium Duration Speech Amplitude feature, which is a composite feature capturing subband speech modulations and a summary modulation.
-
Computationally-Efficient Endpointing Features for Natural Spoken Interaction with Personal-Assistant Systems
We elicit personal-assistant speech using a recognizer with a dramatically increased endpoint threshold, and find frequent non-final pauses. Based on the new data, we develop low-cost acoustic features to discriminate…