Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–27 of 27 results for author: Meyer, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.17275  [pdf, other

    cs.RO eess.SY

    Reacting on human stubbornness in human-machine trajectory planning

    Authors: Julian Schneider, Niels Straky, Simon Meyer, Balint Varga, Sören Hohmann

    Abstract: In this paper, a method for a cooperative trajectory planning between a human and an automation is extended by a behavioral model of the human. This model can characterize the stubbornness of the human, which measures how strong the human adheres to his preferred trajectory. Accordingly, a static model is introduced indicating a link between the force in haptically coupled human-robot interactions… ▽ More

    Submitted 24 July, 2024; originally announced July 2024.

  2. arXiv:2407.02937  [pdf, other

    cs.CL cs.SD eess.AS

    Probing the Feasibility of Multilingual Speaker Anonymization

    Authors: Sarina Meyer, Florian Lux, Ngoc Thang Vu

    Abstract: In speaker anonymization, speech recordings are modified in a way that the identity of the speaker remains hidden. While this technology could help to protect the privacy of individuals around the globe, current research restricts this by focusing almost exclusively on English data. In this study, we extend a state-of-the-art anonymization system to nine languages by transforming language-dependen… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: accepted at Interspeech 2024

  3. arXiv:2406.06403  [pdf, other

    cs.CL cs.LG cs.SD eess.AS

    Meta Learning Text-to-Speech Synthesis in over 7000 Languages

    Authors: Florian Lux, Sarina Meyer, Lyonel Behringer, Frank Zalkow, Phat Do, Matt Coler, Emanuël A. P. Habets, Ngoc Thang Vu

    Abstract: In this work, we take on the challenging task of building a single text-to-speech synthesis system that is capable of generating speech in over 7000 languages, many of which lack sufficient data for traditional TTS development. By leveraging a novel integration of massively multilingual pretraining and meta learning to approximate language representations, our approach enables zero-shot speech syn… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: accepted at Interspeech 2024

  4. arXiv:2404.02677  [pdf, other

    eess.AS cs.CL cs.CR

    The VoicePrivacy 2024 Challenge Evaluation Plan

    Authors: Natalia Tomashenko, Xiaoxiao Miao, Pierre Champion, Sarina Meyer, Xin Wang, Emmanuel Vincent, Michele Panariello, Nicholas Evans, Junichi Yamagishi, Massimiliano Todisco

    Abstract: The task of the challenge is to develop a voice anonymization system for speech data which conceals the speaker's voice identity while protecting linguistic content and emotional states. The organizers provide development and evaluation datasets and evaluation scripts, as well as baseline anonymization systems and a list of training resources formed on the basis of the participants' requests. Part… ▽ More

    Submitted 12 June, 2024; v1 submitted 3 April, 2024; originally announced April 2024.

    Comments: 19 pages, https://www.voiceprivacychallenge.org/. arXiv admin note: substantial text overlap with arXiv:2203.12468

  5. Algorithmic Ways of Seeing: Using Object Detection to Facilitate Art Exploration

    Authors: Louie Søs Meyer, Johanne Engel Aaen, Anitamalina Regitse Tranberg, Peter Kun, Matthias Freiberger, Sebastian Risi, Anders Sundnes Løvlie

    Abstract: This Research through Design paper explores how object detection may be applied to a large digital art museum collection to facilitate new ways of encountering and experiencing art. We present the design and evaluation of an interactive application called SMKExplore, which allows users to explore a museum's digital collection of paintings by browsing through objects detected in the images, as a no… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

  6. arXiv:2401.16167  [pdf, other

    cs.HC cs.CL

    "You tell me": A Dataset of GPT-4-Based Behaviour Change Support Conversations

    Authors: Selina Meyer, David Elsweiler

    Abstract: Conversational agents are increasingly used to address emotional needs on top of information needs. One use case of increasing interest are counselling-style mental health and behaviour change interventions, with large language model (LLM)-based approaches becoming more popular. Research in this context so far has been largely system-focused, foregoing the aspect of user behaviour and the impact t… ▽ More

    Submitted 3 April, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: Preprint as accepted at the 2024 ACM SIGIR Conference on Human Information Interaction and Retrieval (CHIIR '24)

  7. arXiv:2401.14983  [pdf

    cs.DB hep-ex

    Quota management in dCache or making a perfectly normal file system normal

    Authors: Dmitry Litvintsev, Chitrapu Krishnaveni, Svenja Meyer, Paul Millar, Tigran Mkrtchyan, Lea Morschel, Albert Rossi, Marina Sahakyan

    Abstract: dCache (https://dcache.org) is a highly scalable storage system providing location-independent access to data. The data are stored across multiple data servers as complete files presented to the end-user via a single-rooted namespace. From its inception, dCache has been designed as a caching disk buffer to a tertiary tape storage system with the assumption that the latter has virtually unlimited c… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: 26th Intl Conf Computing High Energy & Nuclear Phys (CHEP 2023)

    Report number: FERMILAB-CONF-23-530-CSAID

  8. Controllable Generation of Artificial Speaker Embeddings through Discovery of Principal Directions

    Authors: Florian Lux, Pascal Tilli, Sarina Meyer, Ngoc Thang Vu

    Abstract: Customizing voice and speaking style in a speech synthesis system with intuitive and fine-grained controls is challenging, given that little data with appropriate labels is available. Furthermore, editing an existing human's voice also comes with ethical concerns. In this paper, we propose a method to generate artificial speaker embeddings that cannot be linked to a real human while offering intui… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: Published at ISCA Interspeech 2023 https://www.isca-speech.org/archive/interspeech_2023/lux23_interspeech.html

  9. arXiv:2310.17499  [pdf, other

    cs.CL cs.LG eess.AS

    The IMS Toucan System for the Blizzard Challenge 2023

    Authors: Florian Lux, Julia Koch, Sarina Meyer, Thomas Bott, Nadja Schauffler, Pavel Denisov, Antje Schweitzer, Ngoc Thang Vu

    Abstract: For our contribution to the Blizzard Challenge 2023, we improved on the system we submitted to the Blizzard Challenge 2021. Our approach entails a rule-based text-to-phoneme processing system that includes rule-based disambiguation of homographs in the French language. It then transforms the phonemes to spectrograms as intermediate representations using a fast and efficient non-autoregressive synt… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: Published at the Blizzard Challenge Workshop 2023, colocated with the Speech Synthesis Workshop 2023, a sattelite event of the Interspeech 2023

  10. VoicePAT: An Efficient Open-source Evaluation Toolkit for Voice Privacy Research

    Authors: Sarina Meyer, Xiaoxiao Miao, Ngoc Thang Vu

    Abstract: Speaker anonymization is the task of modifying a speech recording such that the original speaker cannot be identified anymore. Since the first Voice Privacy Challenge in 2020, along with the release of a framework, the popularity of this research topic is continually increasing. However, the comparison and combination of different anonymization approaches remains challenging due to the complexity… ▽ More

    Submitted 21 December, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

    Comments: Accepted by OJSP-ICASSP 2024 https://ieeexplore.ieee.org/document/10365329

  11. arXiv:2309.05827  [pdf, ps, other

    math.CO cs.DM

    Digraph Branchings and Matrix Determinants

    Authors: Sayani Ghosh, Bradley S. Meyer

    Abstract: We present a version of the matrix-tree theorem, which relates the determinant of a matrix to sums of weights of arborescences of its directed graph representation. Our treatment allows for non-zero column sums in the parent matrix by adding a root vertex to the usually considered matrix directed graph. We use our result to prove a version of the matrix-forest, or all-minors, theorem, which relate… ▽ More

    Submitted 13 September, 2023; v1 submitted 11 September, 2023; originally announced September 2023.

  12. arXiv:2308.02037  [pdf

    cs.CY cs.CL cs.SI

    Proposing a conceptual framework: social media listening for public health behavior

    Authors: Shu-Feng Tsao, Helen Chen, Samantha Meyer, Zahid A. Butt

    Abstract: Existing communications and behavioral theories have been adopted to address health misinformation. Although various theories and models have been used to investigate the COVID-19 pandemic, there is no framework specially designed for social listening or misinformation studies using social media data and natural language processing techniques. This study aimed to propose a novel yet theory-based c… ▽ More

    Submitted 29 July, 2023; originally announced August 2023.

    Comments: 20 pages, 2 figures, 3 tables

  13. arXiv:2304.04472  [pdf, other

    cs.CL

    Modeling Speaker-Listener Interaction for Backchannel Prediction

    Authors: Daniel Ortega, Sarina Meyer, Antje Schweitzer, Ngoc Thang Vu

    Abstract: We present our latest findings on backchannel modeling novelly motivated by the canonical use of the minimal responses Yeah and Uh-huh in English and their correspondent tokens in German, and the effect of encoding the speaker-listener interaction. Backchanneling theories emphasize the active and continuous role of the listener in the course of the conversation, their effects on the speaker's subs… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

    Comments: Published in IWSDS 2023

  14. arXiv:2210.07002  [pdf, other

    cs.SD cs.CL eess.AS

    Anonymizing Speech with Generative Adversarial Networks to Preserve Speaker Privacy

    Authors: Sarina Meyer, Pascal Tilli, Pavel Denisov, Florian Lux, Julia Koch, Ngoc Thang Vu

    Abstract: In order to protect the privacy of speech data, speaker anonymization aims for hiding the identity of a speaker by changing the voice in speech recordings. This typically comes with a privacy-utility trade-off between protection of individuals and usability of the data for downstream applications. One of the challenges in this context is to create non-existent voices that sound as natural as possi… ▽ More

    Submitted 20 October, 2022; v1 submitted 13 October, 2022; originally announced October 2022.

    Comments: IEEE Spoken Language Technology Workshop 2022

  15. arXiv:2207.04834  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    Speaker Anonymization with Phonetic Intermediate Representations

    Authors: Sarina Meyer, Florian Lux, Pavel Denisov, Julia Koch, Pascal Tilli, Ngoc Thang Vu

    Abstract: In this work, we propose a speaker anonymization pipeline that leverages high quality automatic speech recognition and synthesis systems to generate speech conditioned on phonetic transcriptions and anonymized speaker embeddings. Using phones as the intermediate representation ensures near complete elimination of speaker identity information from the input while preserving the original phonetic co… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

    Comments: Accepted at Interspeech 2022

  16. arXiv:2202.02085  [pdf, other

    cs.LG stat.ML

    SignSGD: Fault-Tolerance to Blind and Byzantine Adversaries

    Authors: Jason Akoun, Sebastien Meyer

    Abstract: Distributed learning has become a necessity for training ever-growing models by sharing calculation among several devices. However, some of the devices can be faulty, deliberately or not, preventing the proper convergence. As a matter of fact, the baseline distributed SGD algorithm does not converge in the presence of one Byzantine adversary. In this article we focus on the more robust SignSGD alg… ▽ More

    Submitted 7 February, 2022; v1 submitted 4 February, 2022; originally announced February 2022.

    Comments: https://github.com/jasonakoun/signsgd-fault-tolerance

  17. arXiv:1808.03232  [pdf, other

    cs.CV

    Deep Video Color Propagation

    Authors: Simone Meyer, Victor Cornillère, Abdelaziz Djelouah, Christopher Schroers, Markus Gross

    Abstract: Traditional approaches for color propagation in videos rely on some form of matching between consecutive video frames. Using appearance descriptors, colors are then propagated both spatially and temporally. These methods, however, are computationally expensive and do not take advantage of semantic information of the scene. In this work we propose a deep learning framework for color propagation tha… ▽ More

    Submitted 9 August, 2018; originally announced August 2018.

    Comments: BMVC 2018

  18. arXiv:1804.00884  [pdf, other

    cs.CV

    PhaseNet for Video Frame Interpolation

    Authors: Simone Meyer, Abdelaziz Djelouah, Brian McWilliams, Alexander Sorkine-Hornung, Markus Gross, Christopher Schroers

    Abstract: Most approaches for video frame interpolation require accurate dense correspondences to synthesize an in-between frame. Therefore, they do not perform well in challenging scenarios with e.g. lighting changes or motion blur. Recent deep learning approaches that rely on kernels to represent motion can only alleviate these problems to some extent. In those cases, methods that use a per-pixel phase-ba… ▽ More

    Submitted 3 April, 2018; originally announced April 2018.

    Comments: CVPR 2018

  19. arXiv:1704.08111  [pdf

    cs.AI

    A Popperian Falsification of Artificial Intelligence -- Lighthill Defended

    Authors: Steven Meyer

    Abstract: The area of computation called artificial intelligence (AI) is falsified by describing a previous 1972 falsification of AI by British mathematical physicist James Lighthill. How Lighthill's arguments continue to apply to current AI is explained. It is argued that AI should use the Popperian scientific method in which it is the duty of scientists to attempt to falsify theories and if theories are f… ▽ More

    Submitted 30 April, 2020; v1 submitted 23 April, 2017; originally announced April 2017.

    Comments: 12 pages. Version improves discussion of chess and adds sections on when combinatorial explosion may not apply

    ACM Class: I.1; I.1.2

  20. arXiv:1603.08059  [pdf, ps, other

    cs.PL

    CVC Verilog Compiler -- Fast Complex Language Compilers Can be Simple

    Authors: Steven Meyer

    Abstract: This paper explains how to develop Verilog hardware description language (HDL) optimized flow graph compiled simulators. It is claimed that the methods and algorithms described here can be applied in the development of flow graph compilers for other complex computer languages. The method uses the von Neumann computer architecture (MRAM model) as the best abstract model of computation and uses comp… ▽ More

    Submitted 12 January, 2018; v1 submitted 25 March, 2016; originally announced March 2016.

    Comments: 7 pages, 24 references. Paper rewritten in an attempt to comply with the new ACM double blind refereeing system (referees should not be able to determine author), but original title used for this second version. Also added discussion of importance of unbounded size tmps and connections to Bell Labs Unix and XPL historical projects

    ACM Class: D.3.4; B.6.3

  21. arXiv:1603.06018  [pdf

    cs.GL

    Philosophical Solution to P=?NP: P is Equal to NP

    Authors: Steven Meyer

    Abstract: The P=?NP problem is philosophically solved by showing P is equal to NP in the random access with unit multiply (MRAM) model. It is shown that the MRAM model empirically best models computation hardness. The P=?NP problem is shown to be a scientific rather than a mathematical problem. The assumptions involved in the current definition of the P?=NP problem as a problem involving non deterministic T… ▽ More

    Submitted 18 March, 2016; originally announced March 2016.

    Comments: 9 pages, 25 references

    ACM Class: F.0

  22. arXiv:1411.0416  [pdf, other

    stat.CO cs.CE physics.data-an stat.AP

    Spatio-Temporal Analysis of Epidemic Phenomena Using the R Package surveillance

    Authors: Sebastian Meyer, Leonhard Held, Michael Höhle

    Abstract: The availability of geocoded health data and the inherent temporal structure of communicable diseases have led to an increased interest in statistical models and software for spatio-temporal data with epidemic features. The open source R package surveillance can handle various levels of aggregation at which infective events have been recorded: individual-level time-stamped geo-referenced data (cas… ▽ More

    Submitted 6 November, 2015; v1 submitted 3 November, 2014; originally announced November 2014.

    Comments: 53 pages, 20 figures, package homepage: http://surveillance.r-forge.r-project.org/

    MSC Class: 62-04 ACM Class: G.3

    Journal ref: Journal of Statistical Software (2017); 77 (11): 1-55

  23. arXiv:1312.4853  [pdf, other

    cs.DC

    Bid-Centric Cloud Service Provisioning

    Authors: Philip Healy, Stefan Meyer, John Morrison, Theo Lynn, Ashkan Paya, Dan C. Marinescu

    Abstract: Bid-centric service descriptions have the potential to offer a new cloud service provisioning model that promotes portability, diversity of choice and differentiation between providers. A bid matching model based on requirements and capabilities is presented that provides the basis for such an approach. In order to facilitate the bidding process, tenders should be specified as abstractly as possib… ▽ More

    Submitted 17 December, 2013; originally announced December 2013.

  24. arXiv:1208.3739  [pdf

    cs.OH

    Adding Methodological Testing to Naur's Anti-formalism

    Authors: S. J. Meyer

    Abstract: Peter Naur is the leading critic of formalist computing because of his extensive writings that disprove the now dominate characterization of human thought as cognitive information processing. Naur criticizes the ideological position that only discourse that adopts computer inspired forms are acceptable. Lakatosian philosophy of the methodology of scientific research programmes (MSRP) is added to N… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 8 pages, no figures, and 28 references

  25. arXiv:1107.1101  [pdf

    cs.CR

    Misbehavior in Mobile Application Markets

    Authors: Steven Meyer

    Abstract: Mobile application markets facilitate the distribution of applications and thus help developers advertise their work and customers find useful applications. In addition, the operators of mobile application markets can control the quality and the content of the applications. These markets are growing rapidly with more than 300'000 application in the App Store of Apple and more than 100'000 in the A… ▽ More

    Submitted 6 July, 2011; originally announced July 2011.

    Comments: December 2010

  26. arXiv:1107.1099  [pdf, other

    cs.CR

    Selling train tickets by SMS

    Authors: Steven Meyer

    Abstract: Selling train tickets has evolved in the last ten years from queuing in the railway station, to buying tickets on the internet and printing them. Both alternatives are still viable options, though they are time consuming or need printing devices. Nowadays it is essential to offer a service that is as fast and efficient as possible: mobile phones provide an accessible, affordable and widely availab… ▽ More

    Submitted 6 July, 2011; originally announced July 2011.

    Comments: June 2010

  27. arXiv:1107.1086  [pdf

    cs.CR

    Breaking GSM with rainbow Tables

    Authors: Steven Meyer

    Abstract: Since 1998 the GSM security has been academically broken but no real attack has ever been done until in 2008 when two engineers of Pico Computing (FPGA manufacture) revealed that they could break the GSM encryption in 30 seconds with 200'000$ hardware and precomputed rainbow tables. Since then the hardware was either available for rich people only or was confiscated by government agencies. So Chri… ▽ More

    Submitted 6 July, 2011; originally announced July 2011.

    Comments: March 2010