Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New background modeling for speaker verification.. INTERSPEECH, ISCA, (2004)A VHDL Based Controller Design for Non-contact Temperature and Breathing Sensors Suitable for Crib., , and . BIBE, page 126-133. IEEE Computer Society, (2014)Testing Voice Mimicry with the YOHO Speaker Verification Corpus., , and . KES (4), volume 3684 of Lecture Notes in Computer Science, page 15-21. Springer, (2005)A study on the stability of EEG signals for user authentication., , , , and . NER, page 122-125. IEEE, (2015)Fuzzy C-Means Clustering-Based Speaker Verification., and . AFSS, volume 2275 of Lecture Notes in Computer Science, page 318-324. Springer, (2002)Novel Convex Active Contour Model Using Local and Global Information., , , , and . DICTA, page 346-351. IEEE Computer Society, (2011)Password Entropy and Password Quality., , , and . NSS, page 583-587. IEEE Computer Society, (2010)Fuzzy entropy semi-supervised support vector data description., , , , and . IJCNN, page 1-5. IEEE, (2013)Fuzzy Kernel Stochastic Gradient Descent machines., , , , , , and . IJCNN, page 3226-3232. IEEE, (2016)A Novel Sphere-Based Maximum Margin Classification Method., , , and . ICPR, page 620-624. IEEE Computer Society, (2014)