Sfoglia per Rivista NEUROCOMPUTING
Mostrati risultati da 1 a 6 di 6
An artificial neural network approach to automatic speech processing
2014-01-01 Siniscalchi, S. M.; Svendsen, T.; Lee, C. -H.
Combining Speech Attribute Detection and Penalized Logistic Regression for Phoneme Recognition
2012-01-01 Siniscalchi, SABATO MARCO
Exploiting Deep Neural Networks for Detection-Based Speech Recognition
2013-01-01 Siniscalchi, SABATO MARCO; Yu, D.; Deng, L.; Lee, C. H.
Exploiting deep neural networks for detection-based speech recognition
2013-01-01 Siniscalchi, SABATO MARCO; Yu, Dong; Deng, Li; Lee, Chin Hui
A step-by-step training method for multi generator GANs with application to anomaly detection and cybersecurity
2023-01-01 Adiban, M; Siniscalchi, Sm; Salvi, G
A unified approach to transfer learning of deep neural networks with applications to speaker adaptation in automatic speech recognition
2016-01-01 Huang, Z.; Siniscalchi, S. M.; Lee, C. -H.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
An artificial neural network approach to automatic speech processing | 1-gen-2014 | Siniscalchi, S. M.; Svendsen, T.; Lee, C. -H. | |
Combining Speech Attribute Detection and Penalized Logistic Regression for Phoneme Recognition | 1-gen-2012 | Siniscalchi, SABATO MARCO | |
Exploiting Deep Neural Networks for Detection-Based Speech Recognition | 1-gen-2013 | Siniscalchi, SABATO MARCO; Yu, D.; Deng, L.; Lee, C. H. | |
Exploiting deep neural networks for detection-based speech recognition | 1-gen-2013 | Siniscalchi, SABATO MARCO; Yu, Dong; Deng, Li; Lee, Chin Hui | |
A step-by-step training method for multi generator GANs with application to anomaly detection and cybersecurity | 1-gen-2023 | Adiban, M; Siniscalchi, Sm; Salvi, G | |
A unified approach to transfer learning of deep neural networks with applications to speaker adaptation in automatic speech recognition | 1-gen-2016 | Huang, Z.; Siniscalchi, S. M.; Lee, C. -H. |
Mostrati risultati da 1 a 6 di 6
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile