Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hierarchical approach to large-scale speaker recognition., , , and . EUROSPEECH, page 2203-2206. ISCA, (1999)A distance measure between collections of distributions and its application to speaker recognition., , and . ICASSP, page 753-756. IEEE, (1998)Rethinking Full-Text Search for Multi-lingual Databases., and . IEEE Data Eng. Bull., 30 (1): 5-16 (2007)Merkle tree authentication of HTTP responses., and . WWW (Special interest tracks and posters), page 1182-1183. ACM, (2005)Anonymous Investing: Hiding the Identities of Stockholders., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 212-229. Springer, (1999)If We Want Your Opinion., and . ICSC, page 493-500. IEEE Computer Society, (2007)A novel approach for proper name transliteration verification., , , , and . ISCSLP, page 89-94. IEEE, (2010)Dependency Tree Kernels for Relation Extraction., and . ACL, page 423-429. ACL, (2004)Co-channel speaker separation based on maximum-likelihood deconvolution., , and . ICASSP (1), page 25-28. IEEE Computer Society, (1994)