Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph-based representation and techniques for NLU application development., and . ICASSP (1), page 288-291. IEEE, (2003)New distance measures for text-independent speaker identification., , and . INTERSPEECH, page 811-814. ISCA, (2000)Cultural voice markers in speech-to-speech machine translation systems., , , and . IWIC, page 313-316. ACM, (2009)A hybrid HMM-MLP speaker verification algorithm for telephone speech., and . ICASSP (1), page 153-156. IEEE Computer Society, (1994)RTTS: towards enterprise-level real-time speech transcription and translation services., , , , , , , , , and 2 other author(s). INTERSPEECH, page 436-439. ISCA, (2009)Towards robust telephony speech recognition in office and automobile environments., and . INTERSPEECH, page 955-958. ISCA, (2000)Key-phrase spotting using an integrated language model of n-grams and finite-state grammar., , , and . EUROSPEECH, page 255-258. ISCA, (1997)Conversational help desk: vague callers and context switch., , , , , and . INTERSPEECH, ISCA, (2006)Social Network Analysis in Enterprise., , , , , , and . Proc. IEEE, 100 (9): 2759-2776 (2012)Cognitive mobile security: invited conference keynote., , , and . MOBILESoft, page 267-268. ACM, (2016)