Search the dblp DataBase
Naohisa Komatsu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yasushi Yamazaki , Naohisa Komatsu Proposal for a Text-Indicated Writer Verification Method. [Citation Graph (0, 0)][DBLP ] ICDAR, 1997, pp:709-713 [Conf ] Yasushi Yamazaki , Yousuke Mizutani , Naohisa Komatsu Extraction of Personal Features from Stroke Shape, Writing Pressure and Pen Inclination in Ordinary Characters. [Citation Graph (0, 0)][DBLP ] ICDAR, 1999, pp:426-429 [Conf ] Yasushi Yamazaki , Tsuyoshi Nagao , Naohisa Komatsu Text-indicated Writer Verification Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP ] ICDAR, 2003, pp:329-332 [Conf ] Yasushi Yamazaki , Akane Nakashima , Kazunobu Tasaka , Naohisa Komatsu A Study on Vulnerability in On-line Writer Verification System. [Citation Graph (0, 0)][DBLP ] ICDAR, 2005, pp:640-644 [Conf ] Atsunobu Hiraiwa , Keisuke Fuse , Naohisa Komatsu , Kazumi Komiya , Hiroaki Ikeda A Fully Automated Object Extraction from Video Stream: A Useful Tool for Distributed Object-Based Browsing and Content-Based Searching Systems. [Citation Graph (0, 0)][DBLP ] ICMCS, Vol. 2, 1999, pp:174-178 [Conf ] Atsunobu Hiraiwa , Keisuke Fuse , Naohisa Komatsu , Kazumi Komiya , Hiroaki Ikeda Accurate estimation of optical flow for fully automated tracking of moving-objects within video streams. [Citation Graph (0, 0)][DBLP ] ISCAS (4), 1999, pp:515-519 [Conf ] Toshiyuki Sakai , Naohisa Komatsu Digital watermarking based on process of speech production. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:127-138 [Conf ] Improving the safety and practicality of authorization technology using LOAF. [Citation Graph (, )][DBLP ] Multi-Server Loss System with T-Limited Service for Traffic Control in Information Networks. [Citation Graph (, )][DBLP ] Multimodal Biometrics of Lip Movements and Voice using Kernel Fisher Discriminant Analysis. [Citation Graph (, )][DBLP ] Text-indicated speaker recognition using kernel mutual subspace method. [Citation Graph (, )][DBLP ] On biometric encryption using fingerprint and it's security evaluation. [Citation Graph (, )][DBLP ] Speaker recognition using kernel mutual subspace method. [Citation Graph (, )][DBLP ] CELP-based speaker verification: an evaluation under noisy conditions. [Citation Graph (, )][DBLP ] Traffic performance for a time-out scheme communication system. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs