Search the dblp DataBase
Dat Tran :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dat Tran , Michael Wagner Fuzzy C-Means Clustering-Based Speaker Verification. [Citation Graph (0, 0)][DBLP ] AFSS, 2002, pp:318-324 [Conf ] Dat Tran , Michael Wagner Noise Clustering-Based Speaker Verification. [Citation Graph (0, 0)][DBLP ] AFSS, 2002, pp:325-331 [Conf ] Dat Tran , Michael Wagner Generalised Fuzzy Hidden Markov Models for Speech Recognition. [Citation Graph (0, 0)][DBLP ] AFSS, 2002, pp:345-351 [Conf ] Dat Tran , Michael Wagner A Proposed Fuzzy Pattern Verification System. [Citation Graph (0, 0)][DBLP ] FUZZ-IEEE, 2001, pp:932-935 [Conf ] Dat Tran A Proposed Possibilistic Approach to Pattern Verification. [Citation Graph (0, 0)][DBLP ] IC-AI, 2003, pp:975-980 [Conf ] Dat Tran Fuzzy Normalisation Methods for Pattern Verification. [Citation Graph (0, 0)][DBLP ] ICBA, 2004, pp:648-654 [Conf ] Alfred L. Crouch , Michael Mateja , Teresa L. McLaurin , John C. Potter , Dat Tran The testability features of the 3rd generation ColdFire family of microprocessors. [Citation Graph (0, 0)][DBLP ] ITC, 1999, pp:913-922 [Conf ] Yee W. Lau , Dat Tran , Michael Wagner Testing Voice Mimicry with the YOHO Speaker Verification Corpus. [Citation Graph (0, 0)][DBLP ] KES (4), 2005, pp:15-21 [Conf ] Wanli Ma , Dat Tran , Dharmendra Sharma , Abhishek Mathur Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System. [Citation Graph (0, 0)][DBLP ] KES (3), 2006, pp:1176-1183 [Conf ] Phu-Nhan Nguyen , Dharmendra Sharma , Dat Tran Smart Clients and Small Business Model. [Citation Graph (0, 0)][DBLP ] KES (1), 2005, pp:730-736 [Conf ] Dharmendra Sharma , Wanli Ma , Dat Tran On an IT Security Framework. [Citation Graph (0, 0)][DBLP ] KES (1), 2005, pp:226-232 [Conf ] Dharmendra Sharma , Wanli Ma , Dat Tran , Mary Anderson A Novel Approach to Programming: Agent Based Software Engineering. [Citation Graph (0, 0)][DBLP ] KES (3), 2006, pp:1184-1191 [Conf ] Dharmendra Sharma , Dat Tran Dynamic Scheduling Using Multiagent Architecture. [Citation Graph (0, 0)][DBLP ] KES, 2004, pp:476-482 [Conf ] Dat Tran , Dharmendra Sharma New Background Speaker Models and Experiments on the ANDOSL Speech Corpus. [Citation Graph (0, 0)][DBLP ] KES, 2004, pp:498-503 [Conf ] Alfred L. Crouch , Michael Mateja , Teresa L. McLaurin , John C. Potter , Dat Tran Test Development for a Third-Version ColdFire Microprocessor. [Citation Graph (0, 0)][DBLP ] IEEE Design & Test of Computers, 2000, v:17, n:4, pp:29-37 [Journal ] Dat Tran , Michael Wagner A Fuzzy Approach to Speaker Verification. [Citation Graph (0, 0)][DBLP ] IJPRAI, 2002, v:16, n:7, pp:913-926 [Journal ] Dat Tran , Michael Wagner , Tongtao Zheng State mixture modelling applied to speech recognition. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 1999, v:20, n:11-13, pp:1449-1456 [Journal ] Wanli Ma , Dat Tran , Dharmendra Sharma Using Tuple Space to Coordinate Multiagent Activities. [Citation Graph (0, 0)][DBLP ] KES (2), 2007, pp:589-596 [Conf ] Rossilawati Sulaiman , Dharmendra Sharma , Wanli Ma , Dat Tran A Multi-agent Security Framework for e-Health Services. [Citation Graph (0, 0)][DBLP ] KES (2), 2007, pp:547-554 [Conf ] Xu Huang , Dat Tran Adaptive Binary Splitting for a RFID Tag Collision Arbitration Via Multi-agent Systems. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:926-933 [Conf ] Negative Selection with Antigen Feedback in Intrusion Detection. [Citation Graph (, )][DBLP ] Subspace Vector Quantization and Markov Modeling for Cell Phase Classification. [Citation Graph (, )][DBLP ] Remote multimodal biometric authentication using bit priority-based fragile watermarking. [Citation Graph (, )][DBLP ] Password Less System Security Using Multimodal Biometric Fusion. [Citation Graph (, )][DBLP ] On Extendable Software Architecture for Spam Email Filtering. [Citation Graph (, )][DBLP ] Fuzzy Normalisation Methods for Typist Verification. [Citation Graph (, )][DBLP ] A study on the feature selection of network traffic for intrusion detection purpose. [Citation Graph (, )][DBLP ] Automated network feature weighting-based anomaly detection. [Citation Graph (, )][DBLP ] Automatic Speech-Based Classification of Gender, Age and Accent. [Citation Graph (, )][DBLP ] Possibility Theory-Based Approach to Spam Email Detection. [Citation Graph (, )][DBLP ] Fuzzy Vector Quantization for Network Intrusion Detection. [Citation Graph (, )][DBLP ] Detecting Image Based Spam Email. [Citation Graph (, )][DBLP ] Australian Accent-Based Speaker Classification. [Citation Graph (, )][DBLP ] Construction of Fuzzy Ontology-Based Terrorism Event Extraction. [Citation Graph (, )][DBLP ] A Multi-agent Security Architecture. [Citation Graph (, )][DBLP ] Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting [Citation Graph (, )][DBLP ] Terrorism Event Classification Using Fuzzy Inference Systems [Citation Graph (, )][DBLP ] Search in 0.018secs, Finished in 0.020secs