Singing Voice Data Scaling-up: An Introduction to ACE-Opencpop and KiSing-v2

espnet/espnet 31 Jan 2024

In singing voice synthesis (SVS), generating singing voices from musical scores faces challenges due to limited data availability, a constraint less common in text-to-speech (TTS).

Sound Audio and Speech Processing

Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System

seemoo-lab/openhaystack 3 Mar 2021

In particular, OF aims to ensure finder anonymity, untrackability of owner devices, and confidentiality of location reports.

Cryptography and Security Networking and Internet Architecture

Decoupling Magnitude and Phase Estimation with Deep ResUNet for Music Source Separation

facebookresearch/demucs 12 Sep 2021

This approach has several limitations: 1) its incorrect phase reconstruction degrades the performance, 2) it limits the magnitude of masks between 0 and 1 while we observe that 22% of time-frequency bins have ideal ratio mask values of over~1 in a popular dataset, MUSDB18, 3) its potential on very deep architectures is under-explored.

Sound Audio and Speech Processing

I Learn to Diffuse, or Data Alchemy 101: a Mnemonic Manifesto

alembics/disco-diffusion 8 Aug 2022

In this manifesto, we put forward the idea of data alchemy as a narrative device to discuss storytelling and transdisciplinarity in visualization.

Human-Computer Interaction

Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC

feross/simple-peer 25 Apr 2019

Our design quickly scales when a large number of participants join in a short amount of time, by relying on a novel scheme that only requires local information to route connection messages: the destination is derived from the hash value of the combined identifiers of the message's source and of the node that is holding the message.

Distributed, Parallel, and Cluster Computing

The Effectiveness of Security Interventions on GitHub

github/codeql 9 Sep 2023

It has since introduced further security interventions to help developers improve the security of their open source software.

Cryptography and Security

Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS

wangyu-/udp2raw-tunnel 2 Mar 2011

Internet applications increasingly employ TCP not as a stream abstraction, but as a substrate for application-level transports, a use that converts TCP's in-order semantics from a convenience blessing to a performance curse.

Networking and Internet Architecture Performance

Comparative Study of Large Language Model Architectures on Frontier

eleutherai/gpt-neox 1 Feb 2024

Our efforts culminate in achieving state-of-the-art performance on a challenging materials science benchmark.

Distributed, Parallel, and Cluster Computing

PentestGPT: An LLM-empowered Automatic Penetration Testing Tool

greydgl/pentestgpt 13 Aug 2023

Penetration testing, a crucial industrial practice for ensuring system security, has traditionally resisted automation due to the extensive expertise required by human professionals.

Software Engineering Cryptography and Security

Summarizing CPU and GPU Design Trends with Product Data

rfordatascience/tidytuesday 13 Jul 2020

But we also see the ratio of GPU to CPU performance moving closer to parity, thanks to new SIMD extensions on CPUs and increased CPU core counts.

Distributed, Parallel, and Cluster Computing