Author of the publication

An overview of the PICASSO project research activities in speaker verification for telephone applications.

, , , , , , , , , , , and . EUROSPEECH, page 1963-1966. ISCA, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advances in Very Low Bit Rate Speech Coding Using Recognition and Synthesis Techniques., , , , , , and . TSD, volume 2448 of Lecture Notes in Computer Science, page 269-276. Springer, (2002)VLSI architectures for dynamic time warping using systolic arrays., , , and . ICASSP, page 778-781. IEEE, (1984)Speaker adaptation using multi-layer feed-forward automata and canonical correlation analysis., , and . NATO Neurocomputing, volume 68 of NATO ASI Series, page 261-264. Springer, (1989)People indexing in TV-content using lip-activity and unsupervised audio-visual identity verification., , and . CBMI, page 139-144. IEEE, (2011)Evaluating the performance of speech recognisers at the acoustic-phonetic level., , and . ICASSP, page 758-761. IEEE, (1981)On the generation and use of a segment dictionary for speech coding, synthesis and recognition., , , and . ICASSP, page 1328-1331. IEEE, (1983)Towards multilingual speech recognition using data driven source/target acoustical units association., , , and . ICASSP (1), page 521-524. IEEE, (2004)Detecting Replay Attacks in Audiovisual Identity Verification., , , and . ICASSP (1), page 621-624. IEEE, (2006)On the evaluation of speech recognizers and data bases using a reference system., and . ICASSP, page 2026-2029. IEEE, (1982)Accelerated encryption algorithms for secure storage and processing in the cloud., , , , and . ATSIP, page 1-6. IEEE, (2017)