Skip to main content

Showing 1–4 of 4 results for author: van Son, R J J H

.
  1. arXiv:2310.02570  [pdf, other

    cs.SD eess.AS

    Improving severity preservation of healthy-to-pathological voice conversion with global style tokens

    Authors: Bence Mark Halpern, Wen-Chin Huang, Lester Phillip Violeta, R. J. J. H. van Son, Tomoki Toda

    Abstract: In healthy-to-pathological voice conversion (H2P-VC), healthy speech is converted into pathological while preserving the identity. The paper improves on previous two-stage approach to H2P-VC where (1) speech is created first with the appropriate severity, (2) then the speaker identity of the voice is converted while preserving the severity of the voice. Specifically, we propose improvements to (2)… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: 7 pages, 3 figures, 5 tables. Accepted to IEEE Automatic Speech Recognition and Understanding Workshop 2023

    ACM Class: I.2.7

  2. arXiv:2209.06521  [pdf

    physics.med-ph cs.CL

    Preregistered protocol for: Articulatory changes in speech following treatment for oral or oropharyngeal cancer: a systematic review

    Authors: Thomas B. Tienkamp, Teja Rebernik, Defne Abur, Rob J. J. H. van Son, Sebastiaan A. H. J. de Visscher, Max J. H. Witjes, Martijn Wieling

    Abstract: This document outlines a PROSPERO pre-registered protocol for a systematic review regarding articulatory changes in speech following oral or orophayrngeal cancer treatment. Treatment of tumours in the oral cavity may result in physiological changes that could lead to articulatory difficulties. The tongue becomes less mobile due to scar tissue and/or potential (postoperative) radiation therapy. Mor… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

  3. arXiv:1003.2123  [pdf, ps, other

    cs.CR

    Quantifying Shannon's Work Function for Cryptanalytic Attacks

    Authors: R. J. J. H. van Son

    Abstract: Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on computability logic to quantify Shannon's work function and evaluate resource use in cryptanalysis. A si… ▽ More

    Submitted 10 March, 2010; originally announced March 2010.

    Comments: 19 pages

  4. arXiv:0911.5262  [pdf, ps, other

    cs.CC cs.CR

    Quantifying Resource Use in Computations

    Authors: R. J. J. H. van Son

    Abstract: It is currently not possible to quantify the resources needed to perform a computation. As a consequence, it is not possible to reliably evaluate the hardware resources needed for the application of algorithms or the running of programs. This is apparent in both computer science, for instance, in cryptanalysis, and in neuroscience, for instance, comparative neuro-anatomy. A System versus Environ… ▽ More

    Submitted 27 November, 2009; originally announced November 2009.

    Comments: 26 pages, no figures