Distributed meetings: a meeting capture and broadcasting system
Proceedings of the tenth ACM international conference on Multimedia
Voice Source Localization for Automatic Camera Pointing System in Videoconferencing
ICASSP '97 Proceedings of the 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '97) -Volume 1 - Volume 1
Active speech source localization by a dual coarse-to-fine search
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 05
Acoustic source direction by hemisphere sampling
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 05
3D-audio matting, postediting, and rerendering from field recordings
EURASIP Journal on Applied Signal Processing
Binaural Source Localization and Spatial Audio Reproduction for Telepresence Applications
Presence: Teleoperators and Virtual Environments
Audio analysis for multimedia retrieval from a ubiquitous home
MMM'08 Proceedings of the 14th international conference on Advances in multimedia modeling
Self-localization based on ambient signals
ALGOSENSORS'10 Proceedings of the 6th international conference on Algorithms for sensor systems, wireless adhoc networks, and autonomous mobile entities
OPF: a distributed context-sensing framework for ubiquitous computing environments
UCS'06 Proceedings of the Third international conference on Ubiquitous Computing Systems
Using sound source localization in a home environment
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Self-Localization based on Ambient Signals
Theoretical Computer Science
State of the art of smart homes
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
When more than two microphones are used, the traditional time-delay-of-arrival (TDOA) based sound source localization (SSL) approach involves two steps. The first step computes TDOA for each microphone pair, and the second step combines these estimates. This two-step process discards relevant information in the first step, thus degrading the SSL accuracy and robustness. Although less used, one-step processes do exist. In this paper, we review these processes, create a unified framework, and introduce two new one-step algorithms. We compare our proposed approaches against existing 1and 2-step approaches and demonstrate significantly better SSL performance.