Author of the publication

Personalising speech-to-speech translation in the EMIME project

, , , , , , , , , , , , , , , , , , and . Proceedings of the ACL 2010 System Demonstrations, page 48-53. Association for Computational Linguistics, (July 2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Modelling and Verification of Spinlocks at Instruction Level., , , , , and . APSEC, page 355-362. IEEE, (2019)A Graph-Based Investigation of Bitcoin Transactions., and . IFIP Int. Conf. Digital Forensics, volume 462 of IFIP Advances in Information and Communication Technology, page 79-95. Springer, (2015)A robust group-based key management scheme for wireless sensor networks., and . WCNC, page 1915-1920. IEEE, (2005)FishEYE: A Forensic Tool for the visualization of change-over-time in Windows VSS., and . SADFE, page 1-7. IEEE, (2013)Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs., , and . Comput. Commun., 28 (14): 1618-1630 (2005)A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery., and . IFIP Int. Conf. Digital Forensics, volume 194 of IFIP, page 79-90. Springer, (2005)Introduction., , , and . Digital Fingerprinting, Springer, (2016)Conclusion., , , and . Digital Fingerprinting, Springer, (2016)A dynamic en-route filtering scheme for data reporting in wireless sensor networks., and . IEEE/ACM Trans. Netw., 18 (1): 150-163 (2010)An Effective Method for Combating Malicious Scripts Clickbots., , , and . ESORICS, volume 5789 of Lecture Notes in Computer Science, page 523-538. Springer, (2009)