Speech synthesis

Results: 999



#Item
51Thu.P10a.09  Phrase Boundary Assignment from Text in Multiple Domains

Thu.P10a.09 Phrase Boundary Assignment from Text in Multiple Domains

Add to Reading List

Source URL: speech.cs.qc.cuny.edu

Language: English - Date: 2012-10-22 02:43:18
52DRAFT  February, 2006 Speaker Identification and Verification Applications

DRAFT February, 2006 Speaker Identification and Verification Applications

Add to Reading List

Source URL: www.voicexml.org

Language: English - Date: 2015-06-05 20:40:12
53275  A PPENDIX C E NHANCED BAKER ’ S BASIC E RGONOMIC E QUATION As noted in Chapter 4, Section 2.2, Baker’s Basic Ergonomic Equation (Baker, 1986; King, 1999) is a useful heuristic for determining the likelihood of a

275 A PPENDIX C E NHANCED BAKER ’ S BASIC E RGONOMIC E QUATION As noted in Chapter 4, Section 2.2, Baker’s Basic Ergonomic Equation (Baker, 1986; King, 1999) is a useful heuristic for determining the likelihood of a

Add to Reading List

Source URL: staff.washington.edu

Language: English - Date: 2011-01-26 16:47:25
54Microsoft Word - O-ccsd06-4b.doc

Microsoft Word - O-ccsd06-4b.doc

Add to Reading List

Source URL: ahclab.naist.jp

Language: English - Date: 2006-12-25 03:25:36
55Applying Prediction Techniques to Phoneme-based AAC Systems Keith Vertanen Department of Computer Science Montana Tech of the University of Montana

Applying Prediction Techniques to Phoneme-based AAC Systems Keith Vertanen Department of Computer Science Montana Tech of the University of Montana

Add to Reading List

Source URL: www.keithv.com

Language: English - Date: 2012-06-13 10:17:44
56ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-10 07:44:29
57IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. X, NO. X, MONTH 20XX  1 Joint Speaker Verification and Anti-Spoofing in the i-Vector Space

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. X, NO. X, MONTH 20XX 1 Joint Speaker Verification and Anti-Spoofing in the i-Vector Space

Add to Reading List

Source URL: www.cstr.inf.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
58Deep neural network context embeddings for model selection in rich-context HMM synthesis Thomas Merritt1 , Junichi Yamagishi1,2 , Zhizheng Wu1 , Oliver Watts1 , Simon King1 1  The Centre for Speech Technology Research, U

Deep neural network context embeddings for model selection in rich-context HMM synthesis Thomas Merritt1 , Junichi Yamagishi1,2 , Zhizheng Wu1 , Oliver Watts1 , Simon King1 1 The Centre for Speech Technology Research, U

Add to Reading List

Source URL: www.cstr.inf.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
59Transcription of tonal aspects in speech and a system for automatic tonal annotation Piet Mertens University of Leuven, Leuven, Belgium This paper describes a transcription system for tonal aspects in speech, as well as

Transcription of tonal aspects in speech and a system for automatic tonal annotation Piet Mertens University of Leuven, Leuven, Belgium This paper describes a transcription system for tonal aspects in speech, as well as

Add to Reading List

Source URL: www.labphon.org

Language: English - Date: 2014-10-07 13:15:29
60Midterm Review L245 For the Midterm on Tuesday, March 8, 2016 1

Midterm Review L245 For the Midterm on Tuesday, March 8, 2016 1

Add to Reading List

Source URL: cl.indiana.edu

Language: English - Date: 2016-03-03 14:26:28