Author of the publication

Understanding the dropout strategy and analyzing its effectiveness on LVCSR.

, , and . ICASSP, page 7614-7618. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Logic-Based Adaptive Point Cloud Video Streaming., , , , , , and . IEEE Open J. Comput. Soc., (2020)An evolutionary approach for gray-level image zooming., , and . AHS, page 383-389. IEEE, (2011)Bridging the Gap between the Cloud and an eScience Application Platform, , , and . MSR-TR-2009-2021. Microsoft Research, (November 2009)Direct incremental transmission of boundary representation., , and . Symposium on Solid Modeling and Applications, page 298-303. ACM, (2003)Water wave visualization simulation using feedback of image texture analysis., , , and . Multimedia Tools Appl., 74 (19): 8379-8400 (2015)Damage Effectiveness Evaluation on the Time Sensitive Group Targets for Trajectory Correction Missile Carrying with Terminal-Sensitive Projectiles., and . INCoS, page 532-537. IEEE, (2016)Mathematical Models of the Purkinje Fibre Cell and Simulations., , , and . BMEI, page 1-5. IEEE, (2009)Perceptual relativity-based semi-supervised dimensionality reduction algorithm., , , , and . Appl. Soft Comput., (2014)A Framework of Constructions of Minimum Storage Regenerating Codes with the Optimal Update/Access Property for Distributed Storage Systems Based on Invariant Subspace Technique., , and . CoRR, (2013)curso: protect yourself from curse of attribute inference: a social network privacy-analyzer., , , and . DBSocial, page 13-18. ACM, (2013)