Author of the publication

Speech Fragment Decoding Techniques Using Silent Pause Detection.

, , , , and . CCPR, volume 321 of Communications in Computer and Information Science, page 579-588. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Ranking-Oriented Hybrid Approach to QoS-Aware Web Service Recommendation., , , and . SCC, page 578-585. IEEE Computer Society, (2015)Extension of Modularity Density for overlapping community structure., , and . ASONAM, page 856-863. IEEE Computer Society, (2014)Automatic Prosodic Events Detection Using a Two-Stage SVM/CRF Sequence Classifier with Acoustic Features., , , and . CCPR, volume 321 of Communications in Computer and Information Science, page 572-578. Springer, (2012)Speech Fragment Decoding Techniques Using Silent Pause Detection., , , , and . CCPR, volume 321 of Communications in Computer and Information Science, page 579-588. Springer, (2012)Identifying robust clusters and multi-community nodes by combining top-down and bottom-up approaches to clustering., , , , , , , , , and 2 other author(s). CoRR, (2015)Weighted Shortest Path Models: A Revisit to the Simulation of Internet Routing., , , and . CoRR, (2014)Control of Absence Seizures by the Thalamic Feed-Forward Inhibition., , , and . Front. Comput. Neurosci., (2017)Text mining and sustainable clusters from unstructured data in cloud computing., , , and . Cluster Computing, 21 (1): 779-788 (2018)Improving native accent identification using deep neural networks., , , and . INTERSPEECH, page 2170-2174. ISCA, (2014)K-core-preferred Attack to the Internet: Is It More Malicious Than Degree Attack?, , , , and . WAIM, volume 7923 of Lecture Notes in Computer Science, page 717-728. Springer, (2013)