
-
Improving noise robustness of automatic speech recognition via parallel data and teacher-student learning
For real-world speech recognition applications, noise robustness is stil...
read it
-
Self-supervised speaker embeddings
Contrary to i-vectors, speaker embeddings such as x-vectors are incapabl...
read it
-
Brno Mobile OCR Dataset
We introduce the Brno Mobile OCR Dataset (B-MOD) for document Optical Ch...
read it
-
Traffic Surveillance Camera Calibration by 3D Model Bounding Box Alignment for Accurate Vehicle Speed Measurement
In this paper, we focus on fully automatic traffic surveillance camera c...
read it
-
Absolute Pose Estimation from Line Correspondences using Direct Linear Transformation
This work is concerned with camera pose estimation from correspondences ...
read it
-
CNN for License Plate Motion Deblurring
In this work we explore the previously proposed approach of direct blind...
read it
-
Gabor Wavelets in Image Processing
This work shows the use of a two-dimensional Gabor wavelets in image pro...
read it
-
Technical Report: Image Captioning with Semantically Similar Images
This report presents our submission to the MS COCO Captioning Challenge ...
read it
-
New Transforms for JPEG Format
The two-dimensional discrete cosine transform (DCT) can be found in the ...
read it
-
Simple Signal Extension Method for Discrete Wavelet Transform
Discrete wavelet transform of finite-length signals must necessarily han...
read it
-
End-to-end DNN Based Speaker Recognition Inspired by i-vector and PLDA
Recently several end-to-end speaker verification systems based on deep n...
read it
-
HADES: Microprocessor Hazard Analysis via Formal Verification of Parameterized Systems
HADES is a fully automated verification tool for pipeline-based micropro...
read it
-
Gaussian meta-embeddings for efficient scoring of a heavy-tailed PLDA model
Embeddings in machine learning are low-dimensional representations of co...
read it
-
Automation of Processor Verification Using Recurrent Neural Networks
When considering simulation-based verification of processors, the curren...
read it
-
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach
Machine-learning based intrusion detection classifiers are able to detec...
read it
-
Comparison of Semantic Segmentation Approaches for Horizon/Sky Line Detection
Horizon or skyline detection plays a vital role towards mountainous visu...
read it
-
Residual Memory Networks: Feed-forward approach to learn long temporal dependencies
Training deep recurrent neural network (RNN) architectures is complicate...
read it
-
Spoken Pass-Phrase Verification in the i-vector Space
The task of spoken pass-phrase verification is to decide whether a test ...
read it
-
Multilingual sequence-to-sequence speech recognition: architecture, transfer learning, and language modeling
Sequence-to-sequence (seq2seq) approach for low-resource ASR is a relati...
read it
-
Discriminatively Re-trained i-vector Extractor for Speaker Recognition
In this work we revisit discriminative training of the i-vector extracto...
read it
-
Introducing SPAIN (SParse Audion INpainter)
A novel sparsity-based algorithm for audio inpainting is proposed by tra...
read it
-
Language model integration based on memory control for sequence to sequence speech recognition
In this paper, we explore several new schemes to train a seq2seq model t...
read it
-
Promising Accurate Prefix Boosting for sequence-to-sequence ASR
In this paper, we present promising accurate prefix boosting (PAPB), a d...
read it
-
On the use of DNN Autoencoder for Robust Speaker Recognition
In this paper, we present an analysis of a DNN-based autoencoder for spe...
read it
-
Speaker verification using end-to-end adversarial language adaptation
In this paper we investigate the use of adversarial domain adaptation fo...
read it
-
Analysis of DNN Speech Signal Enhancement for Robust Speaker Recognition
In this work, we present an analysis of a DNN-based autoencoder for spee...
read it
-
Segmentation of Head and Neck Organs at Risk Using CNN with Batch Dice Loss
This paper deals with segmentation of organs at risk (OAR) in head and n...
read it
-
BUT-FIT at SemEval-2019 Task 7: Determining the Rumour Stance with Pre-Trained Deep Bidirectional Transformers
This paper describes our system submitted to SemEval 2019 Task 7: Rumour...
read it
-
autoAx: An Automatic Design Space Exploration and Circuit Building Methodology utilizing Libraries of Approximate Components
Approximate computing is an emerging paradigm for developing highly ener...
read it
-
Automated Circuit Approximation Method Driven by Data Distribution
We propose an application-tailored data-driven fully automated method fo...
read it
-
Learning Feature Aggregation in Temporal Domain for Re-Identification
Person re-identification is a standard and established problem in the co...
read it
-
Bayesian Subspace Hidden Markov Model for Acoustic Unit Discovery
This work tackles the problem of learning a set of language specific aco...
read it
-
Factorization of Discriminatively Trained i-vector Extractor for Speaker Recognition
In this work, we continue in our research on i-vector extractor for spea...
read it
-
Self-supervised Sequence-to-sequence ASR using Unpaired Speech and Text
Sequence-to-sequence ASR models require large quantities of data to atta...
read it
-
Simulations in Rank-Based Büchi Automata Complementation
The long search for an optimal complementation construction for Büchi au...
read it
-
Speaker Recognition with Random Digit Strings Using Uncertainty Normalized HMM-based i-vectors
In this paper, we combine Hidden Markov Models (HMMs) with i-vector extr...
read it
-
ALWANN: Automatic Layer-Wise Approximation of Deep Neural Network Accelerators without Retraining
The state-of-the-art approaches employ approximate computing to improve ...
read it
-
Detecting Spoofing Attacks Using VGG and SincNet: BUT-Omilia Submission to ASVspoof 2019 Challenge
In this paper, we present the system description of the joint efforts of...
read it
-
Learning document embeddings along with their uncertainties
Majority of the text modelling techniques yield only point estimates of ...
read it
-
Brno Urban Dataset -- The New Data for Self-Driving Agents and Mapping Tasks
Autonomous driving is a dynamically growing field of research, where qua...
read it
-
Segmentation of Defective Skulls from CT Data for Tissue Modelling
In this work we present a method of automatic segmentation of defective ...
read it
-
ReD-CaNe: A Systematic Methodology for Resilience Analysis and Design of Capsule Networks under Approximations
Recent advances in Capsule Networks (CapsNets) have shown their superior...
read it
-
Audio Inpainting: Revisited and Reweighted
We deal with the problem of sparsity-based audio inpainting. A consequen...
read it
-
TFApprox: Towards a Fast Emulation of DNN Approximate Hardware Accelerators on GPU
Energy efficiency of hardware accelerators of deep neural networks (DNN)...
read it
-
Using Libraries of Approximate Circuits in Design of Hardware Accelerators of Deep Neural Networks
Approximate circuits have been developed to provide good tradeoffs betwe...
read it
-
ApproxFPGAs: Embracing ASIC-Based Approximate Arithmetic Components for FPGA-Based Systems
There has been abundant research on the development of Approximate Circu...
read it
-
Semantically-Oriented Mutation Operator in Cartesian Genetic Programming for Evolutionary Circuit Design
Despite many successful applications, Cartesian Genetic Programming (CGP...
read it
-
Jointly Trained Transformers models for Spoken Language Translation
Conventional spoken language translation (SLT) systems are pipeline base...
read it
-
Multi-Agent Programming Contest 2019 FIT BUT Team solution
During our participation in MAPC 2019, we have developed two multi-agent...
read it
-
Automatic Speech Recognition Benchmark for Air-Traffic Communications
Advances in Automatic Speech Recognition (ASR) over the last decade open...
read it