Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adapting Dynamic Time Warping to the Speech of the Hearing Impaired., and . Acta Cybern., 22 (4): 771-789 (2016)Features and results of a speech improvement experiment on hard of hearing children., , and . Speech Commun., (2019)Audio and audio-visual perception of consonants disturbed by white noise and 'cocktail party'.. ICSLP, ISCA, (1998)Fuzzy model based user adaptive framework for consonant articulation and pronunciation therapy in Hungarian hearing-impaired education., , and . CogInfoCom, page 361-366. IEEE, (2014)Broadcasting private messages securely., , , and . ISIT, page 428-432. IEEE, (2012)Securing broadcast against dishonest receivers., , , and . NetCod, page 1-6. IEEE, (2013)Creating Secrets Out of Packet Erasures., , , and . IEEE Trans. Inf. Forensics Secur., 11 (6): 1177-1191 (2016)Wireless Network Security: Building on Erasures., , , and . Proc. IEEE, 103 (10): 1826-1840 (2015)Development of an online subjective evaluation system for recorded speech of deaf and hard of hearing children., and . CogInfoCom, page 455-458. IEEE, (2015)Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes., , and . IEEE Trans. Dependable Secur. Comput., 8 (6): 824-838 (2011)