Proceedings of ICASSP '94. IEEE International Conference on Acoustics, Speech and Signal Processing
DOI: 10.1109/icassp.1994.389276
|View full text |Cite
|
Sign up to set email alerts
|

Spotting events in continuous speech

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…A search of the traditional ROC literature [Swets 1988;Egan 1975;Swets and Pickett 1982] shows no mention of this formulation. It does appear, without comment or justification in the wordspotting literature [James and Young 1994;Jeanrenaud et al 1994;Lippmann et al 1994;Junkawitsch et al 1998;Dharanipragada and Roukos 1998], where it is usually, but not always, referred to as a ROC curve. We speculated that false alarms per unit time might be a surrogate measure for percent false alarms under the assumption that spoken word rates are approximately constant (at least compared to Internet traffic rates) across many speakers or passages and we were concerned that there might be assumptions associated with the word-spotting usage that would not hold for intrusion detection.…”
Section: Errors Per Unit Timementioning
confidence: 99%
“…A search of the traditional ROC literature [Swets 1988;Egan 1975;Swets and Pickett 1982] shows no mention of this formulation. It does appear, without comment or justification in the wordspotting literature [James and Young 1994;Jeanrenaud et al 1994;Lippmann et al 1994;Junkawitsch et al 1998;Dharanipragada and Roukos 1998], where it is usually, but not always, referred to as a ROC curve. We speculated that false alarms per unit time might be a surrogate measure for percent false alarms under the assumption that spoken word rates are approximately constant (at least compared to Internet traffic rates) across many speakers or passages and we were concerned that there might be assumptions associated with the word-spotting usage that would not hold for intrusion detection.…”
Section: Errors Per Unit Timementioning
confidence: 99%
“…And also, there are discrimination techniques using linguistic features. Keyword or key-phrase spotting based methods [7,8] have been proposed. However, using keyword spotting based method, it is difficult to distinguish system requests from explanations of system usage.…”
Section: : Introductionmentioning
confidence: 99%
“…And also, there are discrimination techniques using linguistic features. Keyword or key-phrase spotting based methods (T. Kawahara, et al, 1998) (P. Jeanrenaud, et al, 1994 have been proposed. However, using keyword spotting based method, it is difficult to distinguish system requests from explanations of system usage.…”
Section: Introductionmentioning
confidence: 99%