Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robustness of Bit-stream Based Features for Speaker Verification., , and . ICASSP (1), page 749-752. IEEE, (2005)Spoken information retrieval for multimedia databases., , and . AICCSA, page 146. IEEE Computer Society, (2005)Cryptographic-Speech-Key Generation Architecture Improvements., , and . IbPRIA (2), volume 3523 of Lecture Notes in Computer Science, page 579-585. Springer, (2005)Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models., , , and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 622-631. Springer, (2006)Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks., , , and . Peer-to-Peer Networking and Applications, 10 (1): 122-137 (2017)On the Use of Automatic Speech Recognition for Spoken Information Retrieval from Video Databases., and . CIARP, volume 3287 of Lecture Notes in Computer Science, page 381-385. Springer, (2004)Biometric-Iris Random Key Generator Using Generalized Regression Neural Networks., , and . IEA/AIE, volume 4031 of Lecture Notes in Computer Science, page 530-539. Springer, (2006)Some Representations of the S-Box of Camellia in GF(((22)2)2)., , and . CANS, 7712, page 296-309. Springer, (2012)Quality Function Deployment (QFD) House of Quality for Strategic Planning of Computer Security of SMEs., , , , , and . IJCOPI, 4 (1): 39-53 (2013)Continuous speech recognition in noise using spectral subtraction and HMM adaptation., and . ICASSP (1), page 409-412. IEEE Computer Society, (1994)