The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Naohisa Komatsu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yasushi Yamazaki, Naohisa Komatsu
    Proposal for a Text-Indicated Writer Verification Method. [Citation Graph (0, 0)][DBLP]
    ICDAR, 1997, pp:709-713 [Conf]
  2. Yasushi Yamazaki, Yousuke Mizutani, Naohisa Komatsu
    Extraction of Personal Features from Stroke Shape, Writing Pressure and Pen Inclination in Ordinary Characters. [Citation Graph (0, 0)][DBLP]
    ICDAR, 1999, pp:426-429 [Conf]
  3. Yasushi Yamazaki, Tsuyoshi Nagao, Naohisa Komatsu
    Text-indicated Writer Verification Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    ICDAR, 2003, pp:329-332 [Conf]
  4. Yasushi Yamazaki, Akane Nakashima, Kazunobu Tasaka, Naohisa Komatsu
    A Study on Vulnerability in On-line Writer Verification System. [Citation Graph (0, 0)][DBLP]
    ICDAR, 2005, pp:640-644 [Conf]
  5. Atsunobu Hiraiwa, Keisuke Fuse, Naohisa Komatsu, Kazumi Komiya, Hiroaki Ikeda
    A Fully Automated Object Extraction from Video Stream: A Useful Tool for Distributed Object-Based Browsing and Content-Based Searching Systems. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 2, 1999, pp:174-178 [Conf]
  6. Atsunobu Hiraiwa, Keisuke Fuse, Naohisa Komatsu, Kazumi Komiya, Hiroaki Ikeda
    Accurate estimation of optical flow for fully automated tracking of moving-objects within video streams. [Citation Graph (0, 0)][DBLP]
    ISCAS (4), 1999, pp:515-519 [Conf]
  7. Toshiyuki Sakai, Naohisa Komatsu
    Digital watermarking based on process of speech production. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:127-138 [Conf]

  8. Improving the safety and practicality of authorization technology using LOAF. [Citation Graph (, )][DBLP]


  9. Multi-Server Loss System with T-Limited Service for Traffic Control in Information Networks. [Citation Graph (, )][DBLP]


  10. Multimodal Biometrics of Lip Movements and Voice using Kernel Fisher Discriminant Analysis. [Citation Graph (, )][DBLP]


  11. Text-indicated speaker recognition using kernel mutual subspace method. [Citation Graph (, )][DBLP]


  12. On biometric encryption using fingerprint and it's security evaluation. [Citation Graph (, )][DBLP]


  13. Speaker recognition using kernel mutual subspace method. [Citation Graph (, )][DBLP]


  14. CELP-based speaker verification: an evaluation under noisy conditions. [Citation Graph (, )][DBLP]


  15. Traffic performance for a time-out scheme communication system. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002