Recognition of a person that issued a voice command is necessary for a device that implements a voice-based user interface to respond to the user command. This disclosure describes techniques that can be implemented by devices that provide a voice-based user interface, e.g., a smart home speaker, an appliance, etc. to recognize the identity of a person that issues a voice command. With user permission, user context data is obtained and used to determine the identity of the person. Such data can include, with user permission, location data, recent activity data, user interests, etc. Improvement in the identification of the person issuing a voice command enables the devices to provide an improved user experience
Automatic speech recognition (ASR) models are used to recognize user commands or queries in products...
When responding to a request from another person, human beings take into account non-verbal cues and...
M.Com. (Informatics)A certain degree of vulnerability exists in traditional knowledge-based identifi...
The present disclosure describes systems and methods that can determine a context of an audible quer...
Speaker recognition is the computing task of validating a user's claimed identity using characterist...
Speaker recognition, which can be classified into identification and verification, is the process of...
This project is to design and implement a speaker recognition system, and apply it to a speech of an...
Carrying out tasks using voice-based user interfaces often requires navigating through a long list o...
Automatic speaker recognition is the use of a machine (i.e. software or hardware) to recognize a per...
In a technologically advanced society, the average person manages dozens of accounts for e-mail, soc...
Smart speakers provide a convenient, often hands-free way for a user to interface with smart technol...
Recent years have seen a proliferation of systems designed to respond to voice, e.g., smart speakers...
People are known to have different personality types, each corresponding to its own typical behavior...
Home environments are rapidly becoming more and more automated via the use of voice-recognizing pers...
Smart devices continue to proliferate, and they provide a variety of functions to assist end users. ...
Automatic speech recognition (ASR) models are used to recognize user commands or queries in products...
When responding to a request from another person, human beings take into account non-verbal cues and...
M.Com. (Informatics)A certain degree of vulnerability exists in traditional knowledge-based identifi...
The present disclosure describes systems and methods that can determine a context of an audible quer...
Speaker recognition is the computing task of validating a user's claimed identity using characterist...
Speaker recognition, which can be classified into identification and verification, is the process of...
This project is to design and implement a speaker recognition system, and apply it to a speech of an...
Carrying out tasks using voice-based user interfaces often requires navigating through a long list o...
Automatic speaker recognition is the use of a machine (i.e. software or hardware) to recognize a per...
In a technologically advanced society, the average person manages dozens of accounts for e-mail, soc...
Smart speakers provide a convenient, often hands-free way for a user to interface with smart technol...
Recent years have seen a proliferation of systems designed to respond to voice, e.g., smart speakers...
People are known to have different personality types, each corresponding to its own typical behavior...
Home environments are rapidly becoming more and more automated via the use of voice-recognizing pers...
Smart devices continue to proliferate, and they provide a variety of functions to assist end users. ...
Automatic speech recognition (ASR) models are used to recognize user commands or queries in products...
When responding to a request from another person, human beings take into account non-verbal cues and...
M.Com. (Informatics)A certain degree of vulnerability exists in traditional knowledge-based identifi...