First Page | Document Content | |
---|---|---|
![]() Date: 2013-10-07 08:11:17Computational linguistics Cyberwarfare Human communication Speech recognition Biometrics Speaker recognition Speech synthesis Spoofing attack Attack Computer network security Automatic identification and data capture Science | Source URL: www.cstr.ed.ac.ukDownload Document from Source WebsiteFile Size: 336,77 KBShare Document on Facebook |
![]() | 8 Complementing Text Entry Evaluations with a Composition Task KEITH VERTANEN, Montana Tech PER OLA KRISTENSSON, University of St AndrewsDocID: 1rt1o - View Document |
![]() | Securing RFID with Ultra-wideband Modulation Pengyuan Yu, Patrick Schaumont and Dong Ha Presented By: Eric SimpsonDocID: 1rrCC - View Document |
![]() | Researchers Join Forces To Study Data From Radio-Frequency Identification (RFID) Tags Page 1 of 7 List your CompanyDocID: 1rrmT - View Document |
![]() | TABLE OF CONTENTS Progressive Librarian #26 WinterDocID: 1rr6P - View Document |
![]() | ARF @ MediaEval 2012: A Romanian ASR-based Approach to Spoken Term Detection 1 Andi BuzoDocID: 1rqzS - View Document |