Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Voice Forgery Using ALISP: Indexation in a Client Memory., , , , and . ICASSP (1), page 17-20. IEEE, (2005)Voice Disguise and Automatic Detection: Review and Perspectives., , and . WNSP, volume 4391 of Lecture Notes in Computer Science, page 101-117. Springer, (2005)Audio-visual Identity Verification: An Introductory Overview., , , and . WNSP, volume 4391 of Lecture Notes in Computer Science, page 118-134. Springer, (2005)Text Independent Methods for Speech Segmentation., and . Summer School on Neural Networks, volume 3445 of Lecture Notes in Computer Science, page 261-290. Springer, (2004)Automatic Parameter Estimation for a Context-Independent Speech Segmentation Algorithm., and . TSD, volume 2448 of Lecture Notes in Computer Science, page 293-300. Springer, (2002)Optimal Parameters in Neural Network Models for Speech Phoneme Characterization., , and . WIRN, page 178-186. Springer, (2001)An Audio-Visual Imposture Scenario by Talking Face Animation., , , , , and . Summer School on Neural Networks, volume 3445 of Lecture Notes in Computer Science, page 365-369. Springer, (2004)Eigentongue Feature Extraction for an Ultrasound-Based Silent Speech Interface., , , , , , , and . ICASSP (1), page 1245-1248. IEEE, (2007)A JAVA interface for speech analysis and segmentation., , and . NOLISP, page 26. ISCA, (2003)