Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transaction management in service-oriented systems: Requirements and a proposal, , and . IEEE Transactions on Services Computing, 4 (2): 167--180 (2011)A conditional random field approach for face identification in broadcast news using overlaid text., , , , and . ICIP, page 318-322. IEEE, (2014)Combining transcription-based and acoustic-based speaker identifications for broadcast news., , , and . ICASSP, page 4377-4380. IEEE, (2012)On the vulnerability of speaker verification to realistic voice spoofing., , , and . BTAS, page 1-6. IEEE, (2015)Introducing i-vectors for joint anti-spoofing and speaker verification., , , , and . INTERSPEECH, page 61-65. ISCA, (2014)Bi-modal biometric authentication on mobile phones in challenging conditions., , , , and . Image Vision Comput., 32 (12): 1147-1160 (2014)Fusing matching and biometric similarity measures for face diarization in video., , and . ICMR, page 97-104. ACM, (2013)Optimal QoS-Aware Web Service Composition, , , and . IEEE Conference on Commerce and Enterprise Computing, page 491--494. IEEE Computer Society, (2009)Visualizing Compositions of Services from Large Repositories, , and . IEEE International Conference on E-Commerce Technology / IEEE International Conference on Enterprise Computing, page 359--362. IEEE Computer Society, (2008)The IMMED project: wearable video monitoring of people with age dementia., , , , , , , , , and 1 other author(s). ACM Multimedia, page 1299-1302. ACM, (2010)