<--- Back to Details
First PageDocument Content
Transport / Land transport / Road transport / Traffic law / Roundabout / Traffic / CMU Sphinx / Speech recognition / Junction / Sphinx
Date: 2013-02-22 11:59:24
Transport
Land transport
Road transport
Traffic law
Roundabout
Traffic
CMU Sphinx
Speech recognition
Junction
Sphinx

CMU Sphinx: the recognizer library Supervisor: Authors:

Add to Reading List

Source URL: twiki.di.uniroma1.it

Download Document from Source Website

File Size: 515,27 KB

Share Document on Facebook

Similar Documents

Transport / Land transport / Road transport / Traffic law / Roundabout / Traffic / CMU Sphinx / Speech recognition / Junction / Sphinx

CMU Sphinx: the recognizer library Supervisor: Authors:

DocID: 1reah - View Document

Markov models / Software / Computing / Speech recognition software / Humancomputer interaction / Computational linguistics / CMU Sphinx / Speech recognition / Sphinx / Viterbi algorithm / CMU Pronouncing Dictionary / Hidden Markov model

c SMLI TR2004-0811 2004 SUN MICROSYSTEMS INC. 1

DocID: 1qdIm - View Document

Computing / Speech recognition / Human communication / Information technology / Records management / Computational linguistics / Computer accessibility / Transcription / Intelligent computer-assisted language instruction / CMU Sphinx / Speaker diarisation / Medical transcription

Automatic speech recognition in media asset management Johanna Bj¨orklund, Emil Lundh Dept. Computing Science, CodeMill AB Ume˚a University, Riddaregatan 8, Ume˚a, 90336 Ume˚a , emil.lundh@cod

DocID: 1pVrA - View Document

Speech recognition software / Computational linguistics / Markov models / Bioinformatics / Automatic identification and data capture / CMU Sphinx / Julius / HTK / Speech recognition / DICT / Hidden Markov model / HMM

Using open source speech recognition software without an American accent. The field Julius: C, strange BSDish license, Japanese HTK: (HMM (Hidden Markov Model) Toolkit)

DocID: 1pIhi - View Document

Cyberwarfare / Computational linguistics / Automatic identification and data capture / Computer accessibility / Speech recognition / Mel-frequency cepstrum / Computer security / Denial-of-service attack / Artificial neural network / CMU Sphinx / Vector / CAPTCHA

Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

DocID: 1pszK - View Document