Experiments on acoustic model supervised adaptation and evaluation by K-Fold Cross Validation technique
暂无分享,去创建一个
Chafic Mokbel | Asmaa Amehraye | Gerard Chollet | Joseph Razik | Daniel R. S. Caon | Rodrigo V. Andreao | G. Chollet | Asmaa Amehraye | Joseph Razik | C. Mokbel | R. V. Andreão
[1] Ralf Kompe,et al. A Combined MAP + MLLR Approach for Speaker Adaptation , 2002 .
[2] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[3] Mostafa Azizi,et al. Implementation of secure key distribution based on quantum cryptography , 2009, 2009 International Conference on Multimedia Computing and Systems.
[4] Mostafa Azizi,et al. Analysis of the Security of BB84 by Model Checking , 2010, ArXiv.
[5] N. Gisin,et al. Quantum key distribution over 67 km with a plug , 2002 .
[6] Jian-Wei Pan,et al. Experimental free-space distribution of entangled photon pairs over 13 km: towards satellite-based global quantum communication. , 2005, Physical review letters.
[7] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[8] Steve Young,et al. The HTK book version 3.4 , 2006 .
[9] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs , 2005, RFC.
[10] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[11] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[12] Guillaume Gravier,et al. Corpus description of the ESTER Evaluation Campaign for the Rich Transcription of French Broadcast News , 2004, LREC.
[13] Tanja Schultz,et al. Comparison of acoustic model adaptation techniques on non-native speech , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[14] Mostafa Azizi,et al. Integration of Quantum Key Distribution in the TLS Protocol , 2009 .
[15] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[16] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[17] W. Marsden. I and J , 2012 .
[18] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[19] R. Schwartz,et al. Maximum a posteriori adaptation for large scale HMM recognizers , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.