Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phrase splicing and variable substitution using the IBM trainable speech synthesis system., , , and . ICASSP, page 373-376. IEEE Computer Society, (1999)A hierarchical approach to large-scale speaker recognition., , , and . EUROSPEECH, ISCA, (1999)A distance measure between collections of distributions and its application to speaker recognition., , and . ICASSP, page 753-756. IEEE, (1998)The IBM conversational telephony system for financial applications., , , , , , , , , and 6 other author(s). EUROSPEECH, ISCA, (1999)Statistical natural language generation for speech-to-speech machine translation systems., , , , and . INTERSPEECH, ISCA, (2002)Text Search Protocols with Simulation Based Security., , and . Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, page 332-350. Springer, (2010)MARS: A Statistical Semantic Parsing and Generation-Based Multilingual Automatic tRanslation System., , , , and . Machine Translation, 17 (3): 185-212 (2002)A novel approach for proper name transliteration verification., , , , and . ISCSLP, page 89-94. IEEE, (2010)Syntax Based Reordering with Automatically Derived Rules for Improved Statistical Machine Translation., , , , and . COLING, page 1119-1127. Tsinghua University Press, (2010)Maximum Entropy Based Restoration of Arabic Diacritics., , and . ACL, The Association for Computer Linguistics, (2006)