Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognitive mobile security: invited conference keynote., , , and . MOBILESoft, page 267-268. ACM, (2016)Social Network Analysis in Enterprise., , , , , , and . Proc. IEEE, 100 (9): 2759-2776 (2012)Improving end-to-end performance of call classification through data confusion reduction and model tolerance enhancement., , , , , and . INTERSPEECH, page 3473-3476. ISCA, (2005)A new confidence measure based on rank-ordering subphone scores., , , and . ICSLP, ISCA, (1998)Generalized context-dependent phone modeling using artificial neural networks.. EUROSPEECH, page 1477-1480. ISCA, (1993)BIG-ALIGN: Fast Bipartite Graph Alignment., , and . ICDM, page 389-398. IEEE Computer Society, (2013)Towards robust telephony speech recognition in office and automobile environments., and . INTERSPEECH, page 955-958. ISCA, (2000)Conversational help desk: vague callers and context switch., , , , , and . INTERSPEECH, ISCA, (2006)Key-phrase spotting using an integrated language model of n-grams and finite-state grammar., , , and . EUROSPEECH, page 255-258. ISCA, (1997)Graph-based representation and techniques for NLU application development., and . ICASSP (1), page 288-291. IEEE, (2003)