Author of the publication

KIT Lecture Translator: Multilingual Speech Translation with One-Shot Learning.

, , , , , , , , , , and . COLING (Demos), page 89-93. Association for Computational Linguistics, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical property-based model for vulnerability analysis and evaluation., , , and . APSCC, page 40-45. IEEE, (2009)The KIT translation systems for IWSLT 2012., , , , , , , and . IWSLT, page 38-45. ISCA, (2012)Quantitative Evaluation of Related Web-Based Vulnerabilities., , , and . SSIRI (Companion), page 118-125. IEEE Computer Society, (2010)Efficient Solution for Misalignment of Signal in Side Channel Analysis., , , and . ICASSP (2), page 257-260. IEEE, (2007)A novel simulation approach for fault injection resistance evaluation on smart cards., , , and . ICST Workshops, page 1-8. IEEE Computer Society, (2015)Performance evaluation of cyber reconnaissance tools., , and . IJIPSI, 2 (3): 177-196 (2016)Novel Approaches for Improving the Power Consumption Models in Correlation Analysis., , , and . IACR Cryptology ePrint Archive, (2007)Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage., , , , , , , , , and 4 other author(s). IEICE Transactions, 97-C (4): 272-279 (2014)Spatial Interpolation of Meteorologic Variables in Vietnam using the Kriging Method., , , , , , and . JIPS, 11 (1): 134-147 (2015)Automated Inference of Access Control Policies for Web Applications., , , and . SACMAT, page 27-37. ACM, (2015)