Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robustness of Bit-stream Based Features for Speaker Verification., , and . ICASSP (1), page 749-752. IEEE, (2005)Some Representations of the S-Box of Camellia in GF(((22)2)2)., , and . CANS, 7712, page 296-309. Springer, (2012)On the Use of Automatic Speech Recognition for Spoken Information Retrieval from Video Databases., and . CIARP, volume 3287 of Lecture Notes in Computer Science, page 381-385. Springer, (2004)Biometric-Iris Random Key Generator Using Generalized Regression Neural Networks., , and . IEA/AIE, volume 4031 of Lecture Notes in Computer Science, page 530-539. Springer, (2006)Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models., , , and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 622-631. Springer, (2006)Cryptographic-Speech-Key Generation Architecture Improvements., , and . IbPRIA (2), volume 3523 of Lecture Notes in Computer Science, page 579-585. Springer, (2005)Adaptive Resource Allocation with Job Runtime Uncertainty., , , , and . J. Grid Comput., 15 (4): 415-434 (2017)Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks., , , and . Peer-to-Peer Netw. Appl., 10 (1): 122-137 (2017)Spoken information retrieval for multimedia databases., , and . AICCSA, page 146. IEEE Computer Society, (2005)Parameter Optimization in a Text-Dependent Cryptographic-Speech-Key Generation Task., , and . NOLISP, volume 3817 of Lecture Notes in Computer Science, page 92-99. Springer, (2005)