Author of the publication

Behavior of a Bayesian adaptation method for incremental enrollment in speaker verification.

, , , , , and . ICASSP, page 1197-1200. IEEE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The multiscenario multienvironment biosecure multimodal database (BMDB), , , , , , , , , and 22 other author(s). IEEE Trans Pattern Anal Mach Intell, 32 (6): 1097--1111 (2010)DLL: A Fast Deep Neural Network Library., , and . ANNPR, volume 11081 of Lecture Notes in Computer Science, page 54-65. Springer, (2018)Architecture Proposal for Machine Learning Based Industrial Process Monitoring., , and . ANT/EDI40, volume 170 of Procedia Computer Science, page 648-655. Elsevier, (2020)Estimation of global posteriors and forward-backward training of hybrid HMM/ANN systems., , , , and . EUROSPEECH, page 1951-1954. ISCA, (1997)Text-independent speaker verification using automatically labelled acoustic segments., , , and . ICSLP, ISCA, (1998)ICPR2016 contest on Arabic Text detection and Recognition in video frames - AcTiVComp., , , , , , and . ICPR, page 187-191. IEEE, (2016)Towards identification of very low resolution, anti-alaised characters., , and . ISSPA, page 1-4. IEEE, (2007)Affixal Approach versus Analytical Approach for Off-Line Arabic Decomposable Vocabulary Recognition., , , , , and . ICDAR, page 661-665. IEEE Computer Society, (2009)User interaction event detection in the context of appliance monitoring., , and . PerCom Workshops, page 323-328. IEEE Computer Society, (2015)A New Forgery Scenario Based on Regaining Dynamics of Signature., , , and . ICB, volume 4642 of Lecture Notes in Computer Science, page 366-375. Springer, (2007)