Objective The study was undertaken to show the magnitude of interindividual differences in energy expenditure (i.e., heat production) under normal living conditions with the aim of providing physiological evidence to support the advancement of a personaliz ...
A detailed theoretical and experimental study on the effect of the superposition of uncorrelated speckle patterns with polarization diversity on the spatial statistics of the superposed speckle pattern is presented. It is shown that depending on the mutual ...
In distributed computing, many papers try to evaluate the message complexity of a distributed system as a function of the number of nodes n. But what about the cost of building the distributed system itself? Assuming that we want to reliably connect n node ...
Context. During February-March 2014, the MAGIC telescopes observed the high-frequency peaked BL Lac 1ES 1011 + 496 (z = 0.212) in flaring state at very-high energy (VHE, E > 100 GeV). The flux reached a level of more than ten times higher than any previous ...
We consider the previously unsolved problem of sampling paths according to a given distribution from a general network. The problem is difficult because of the combinatorial number of alternatives, which prohibits a complete enumeration of all paths and he ...
This paper applies score and feature normalization techniques to parts-based Gaussian mixture model (GMM) face authentication. In particular, we propose to utilize techniques that are well established in state-of-the-art speaker authentication, and apply t ...
We consider the previously unsolved problem of sampling paths according to a given distribution from a general network. The problem is difficult because of the combinatorial number of alternatives, which prohibits a complete enumeration of all paths and he ...
We consider the previously unsolved problem of sampling paths according to a given distribution from a general network. The problem is difficult because of the combinatorial number of alternatives, which prohibits a complete enumeration of all paths and he ...
This paper discusses and optimizes an HMM/GMM based User-Customized Password Speaker Verification (UCP-SV) system. Unlike text-dependent speaker verification, in UCP-SV systems, customers can choose their own passwords with no lexical constraints. The pass ...