• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,584
Next 10 →

Maximum Likelihood Linear Transformations for HMM-Based Speech Recognition

by M.J.F. Gales - COMPUTER SPEECH AND LANGUAGE , 1998
"... This paper examines the application of linear transformations for speaker and environmental adaptation in an HMM-based speech recognition system. In particular, transformations that are trained in a maximum likelihood sense on adaptation data are investigated. Other than in the form of a simple bias ..."
Abstract - Cited by 570 (68 self) - Add to MetaCart
of the constrained model-space transform from the simple diagonal case to the full or block-diagonal case. The constrained and unconstrained transforms are evaluated in terms of computational cost, recognition time efficiency, and use for speaker adaptive training. The recognition performance of the two model-space

CONSTRUCTION OF MODEL-SPACE CONSTRAINTS

by Patrick Nguyen, Luca Rigazio, Christian Wellekens, Jean-claude Junqua
"... HMM systems exhibit a large amount of redundancy. To this end, a technique called Eigenvoices was found to be very effective for speaker adaptation. The correlation between HMM parameters is exploited via a linear constraint called eigenspace. This constraint is obtained through a PCA analysis of th ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
. 1. OPTIMAL ESTIMATION OF THE EIGENSPACE In this section, we show that the expected log-likelihood of the data is related to a sum of squared euclidean distances in the model space. This justifies using the SVD to compute the eigenspace. First, we will show that the log-likelihood of rows of MLLR

Perturbative gauge theory as a string theory in twistor space

by Edward Witten - COMMUN. MATH. PHYS , 2003
"... Perturbative scattering amplitudes in Yang-Mills theory have many unexpected properties, such as holomorphy of the maximally helicity violating amplitudes. To interpret these results, we Fourier transform the scattering amplitudes from momentum space to twistor space, and argue that the transformed ..."
Abstract - Cited by 385 (1 self) - Add to MetaCart
Perturbative scattering amplitudes in Yang-Mills theory have many unexpected properties, such as holomorphy of the maximally helicity violating amplitudes. To interpret these results, we Fourier transform the scattering amplitudes from momentum space to twistor space, and argue that the transformed

On Model-Space and Data-Space Regularization:

by Tutorial Sergey Fomel, Sergey Fomel , 1997
"... Constraining ill-posed inverse problems often requires regularized optimization. I describe two alternative approaches to regularization. The first approach involves a column operator and an extension of the data space. The second approach constructs a row operator and expands the model space. In ..."
Abstract - Add to MetaCart
Constraining ill-posed inverse problems often requires regularized optimization. I describe two alternative approaches to regularization. The first approach involves a column operator and an extension of the data space. The second approach constructs a row operator and expands the model space

GTM: The generative topographic mapping

by Christopher M. Bishop, Markus Svensén, Christopher K. I. Williams - Neural Computation , 1998
"... Latent variable models represent the probability density of data in a space of several dimensions in terms of a smaller number of latent, or hidden, variables. A familiar example is factor analysis which is based on a linear transformations between the latent space and the data space. In this paper ..."
Abstract - Cited by 361 (6 self) - Add to MetaCart
Latent variable models represent the probability density of data in a space of several dimensions in terms of a smaller number of latent, or hidden, variables. A familiar example is factor analysis which is based on a linear transformations between the latent space and the data space. In this paper

MLESAC: A New Robust Estimator with Application to Estimating Image Geometry

by P. H. S. Torr, A. Zisserman - Computer Vision and Image Understanding , 2000
"... A new method is presented for robustly estimating multiple view relations from point correspondences. The method comprises two parts. The first is a new robust estimator MLESAC which is a generalization of the RANSAC estimator. It adopts the same sampling strategy as RANSAC to generate putative solu ..."
Abstract - Cited by 362 (10 self) - Add to MetaCart
is that there are often nonlinear constraints between the parameters, making optimization a difficult task. The parameterization method overcomes the difficulty of nonlinear constraints and conducts a constrained optimization. The method is general and its use is illustrated for the estimation of fundamental matrices

Geodesic Active Regions and Level Set Methods for Supervised Texture Segmentation

by Nikos Paragios, Rachid Deriche - INTERNATIONAL JOURNAL OF COMPUTER VISION , 2002
"... This paper presents a novel variational framework to deal with frame partition problems in Computer Vision. This framework exploits boundary and region-based segmentation modules under a curve-based optimization objective function. The task of supervised texture segmentation is considered to demonst ..."
Abstract - Cited by 312 (9 self) - Add to MetaCart
to demonstrate the potentials of the proposed framework. The textured feature space is generated by filtering the given textured images using isotropic and anisotropic filters, and analyzing their responses as multi-component conditional probability density functions. The texture segmentation is obtained

Interactive Multi-Resolution Modeling on Arbitrary Meshes

by Leif Kobbelt , Swen Campagna, Jens Vorsatz, Hans-Peter Seidel , 1998
"... During the last years the concept of multi-resolution modeling has gained special attention in many fields of computer graphics and geometric modeling. In this paper we generalize powerful multiresolution techniques to arbitrary triangle meshes without requiring subdivision connectivity. Our major o ..."
Abstract - Cited by 307 (34 self) - Add to MetaCart
During the last years the concept of multi-resolution modeling has gained special attention in many fields of computer graphics and geometric modeling. In this paper we generalize powerful multiresolution techniques to arbitrary triangle meshes without requiring subdivision connectivity. Our major

On model-space and data-space regularization: A tutorial: SEP--94

by Sergey Fomel , 1997
"... 1 Constraining ill-posed inverse problems often requires regularized optimization. I describe two alternative approaches to regularization. The first approach involves a column operator and an extension of the data space. The second approach constructs a row operator and expands the model space. In ..."
Abstract - Cited by 17 (7 self) - Add to MetaCart
1 Constraining ill-posed inverse problems often requires regularized optimization. I describe two alternative approaches to regularization. The first approach involves a column operator and an extension of the data space. The second approach constructs a row operator and expands the model space

Transforming Data to Satisfy Privacy Constraints

by Vijay S. Iyengar , 2002
"... Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can also contain other kinds of personal information (e.g., date of birth, zip code, gender) that are potentially identifying ..."
Abstract - Cited by 250 (0 self) - Add to MetaCart
of preserving privacy for the specified usage. In particular, we investigate the privacy transformation in the context of data mining applications like building classification and regression models. Second, our work improves on previous approaches by allowing more flexible generalizations for the data. Lastly
Next 10 →
Results 1 - 10 of 10,584
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University