Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognitive mobile security: invited conference keynote., , , and . MOBILESoft, page 267-268. ACM, (2016)Social Network Analysis in Enterprise., , , , , , and . Proc. IEEE, 100 (9): 2759-2776 (2012)Generalized context-dependent phone modeling using artificial neural networks.. EUROSPEECH, page 1477-1480. ISCA, (1993)Improving end-to-end performance of call classification through data confusion reduction and model tolerance enhancement., , , , , and . INTERSPEECH, page 3473-3476. ISCA, (2005)A new confidence measure based on rank-ordering subphone scores., , , and . ICSLP, ISCA, (1998)BIG-ALIGN: Fast Bipartite Graph Alignment., , and . ICDM, page 389-398. IEEE Computer Society, (2013)Graph-based representation and techniques for NLU application development., and . ICASSP (1), page 288-291. IEEE, (2003)RTTS: towards enterprise-level real-time speech transcription and translation services., , , , , , , , , and 2 other author(s). INTERSPEECH, page 436-439. ISCA, (2009)New distance measures for text-independent speaker identification., , and . INTERSPEECH, page 811-814. ISCA, (2000)Cultural voice markers in speech-to-speech machine translation systems., , , and . IWIC, page 313-316. ACM, (2009)