The SCEAS System
Navigation Menu

Search the dblp DataBase


Dat Tran: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dat Tran, Michael Wagner
    Fuzzy C-Means Clustering-Based Speaker Verification. [Citation Graph (0, 0)][DBLP]
    AFSS, 2002, pp:318-324 [Conf]
  2. Dat Tran, Michael Wagner
    Noise Clustering-Based Speaker Verification. [Citation Graph (0, 0)][DBLP]
    AFSS, 2002, pp:325-331 [Conf]
  3. Dat Tran, Michael Wagner
    Generalised Fuzzy Hidden Markov Models for Speech Recognition. [Citation Graph (0, 0)][DBLP]
    AFSS, 2002, pp:345-351 [Conf]
  4. Dat Tran, Michael Wagner
    A Proposed Fuzzy Pattern Verification System. [Citation Graph (0, 0)][DBLP]
    FUZZ-IEEE, 2001, pp:932-935 [Conf]
  5. Dat Tran
    A Proposed Possibilistic Approach to Pattern Verification. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2003, pp:975-980 [Conf]
  6. Dat Tran
    Fuzzy Normalisation Methods for Pattern Verification. [Citation Graph (0, 0)][DBLP]
    ICBA, 2004, pp:648-654 [Conf]
  7. Alfred L. Crouch, Michael Mateja, Teresa L. McLaurin, John C. Potter, Dat Tran
    The testability features of the 3rd generation ColdFire family of microprocessors. [Citation Graph (0, 0)][DBLP]
    ITC, 1999, pp:913-922 [Conf]
  8. Yee W. Lau, Dat Tran, Michael Wagner
    Testing Voice Mimicry with the YOHO Speaker Verification Corpus. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:15-21 [Conf]
  9. Wanli Ma, Dat Tran, Dharmendra Sharma, Abhishek Mathur
    Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1176-1183 [Conf]
  10. Phu-Nhan Nguyen, Dharmendra Sharma, Dat Tran
    Smart Clients and Small Business Model. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:730-736 [Conf]
  11. Dharmendra Sharma, Wanli Ma, Dat Tran
    On an IT Security Framework. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:226-232 [Conf]
  12. Dharmendra Sharma, Wanli Ma, Dat Tran, Mary Anderson
    A Novel Approach to Programming: Agent Based Software Engineering. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1184-1191 [Conf]
  13. Dharmendra Sharma, Dat Tran
    Dynamic Scheduling Using Multiagent Architecture. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:476-482 [Conf]
  14. Dat Tran, Dharmendra Sharma
    New Background Speaker Models and Experiments on the ANDOSL Speech Corpus. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:498-503 [Conf]
  15. Alfred L. Crouch, Michael Mateja, Teresa L. McLaurin, John C. Potter, Dat Tran
    Test Development for a Third-Version ColdFire Microprocessor. [Citation Graph (0, 0)][DBLP]
    IEEE Design & Test of Computers, 2000, v:17, n:4, pp:29-37 [Journal]
  16. Dat Tran, Michael Wagner
    A Fuzzy Approach to Speaker Verification. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2002, v:16, n:7, pp:913-926 [Journal]
  17. Dat Tran, Michael Wagner, Tongtao Zheng
    State mixture modelling applied to speech recognition. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1999, v:20, n:11-13, pp:1449-1456 [Journal]
  18. Wanli Ma, Dat Tran, Dharmendra Sharma
    Using Tuple Space to Coordinate Multiagent Activities. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:589-596 [Conf]
  19. Rossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran
    A Multi-agent Security Framework for e-Health Services. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:547-554 [Conf]
  20. Xu Huang, Dat Tran
    Adaptive Binary Splitting for a RFID Tag Collision Arbitration Via Multi-agent Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:926-933 [Conf]

  21. Negative Selection with Antigen Feedback in Intrusion Detection. [Citation Graph (, )][DBLP]

  22. Subspace Vector Quantization and Markov Modeling for Cell Phase Classification. [Citation Graph (, )][DBLP]

  23. Remote multimodal biometric authentication using bit priority-based fragile watermarking. [Citation Graph (, )][DBLP]

  24. Password Less System Security Using Multimodal Biometric Fusion. [Citation Graph (, )][DBLP]

  25. On Extendable Software Architecture for Spam Email Filtering. [Citation Graph (, )][DBLP]

  26. Fuzzy Normalisation Methods for Typist Verification. [Citation Graph (, )][DBLP]

  27. A study on the feature selection of network traffic for intrusion detection purpose. [Citation Graph (, )][DBLP]

  28. Automated network feature weighting-based anomaly detection. [Citation Graph (, )][DBLP]

  29. Automatic Speech-Based Classification of Gender, Age and Accent. [Citation Graph (, )][DBLP]

  30. Possibility Theory-Based Approach to Spam Email Detection. [Citation Graph (, )][DBLP]

  31. Fuzzy Vector Quantization for Network Intrusion Detection. [Citation Graph (, )][DBLP]

  32. Detecting Image Based Spam Email. [Citation Graph (, )][DBLP]

  33. Australian Accent-Based Speaker Classification. [Citation Graph (, )][DBLP]

  34. Construction of Fuzzy Ontology-Based Terrorism Event Extraction. [Citation Graph (, )][DBLP]

  35. A Multi-agent Security Architecture. [Citation Graph (, )][DBLP]

  36. Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting [Citation Graph (, )][DBLP]

  37. Terrorism Event Classification Using Fuzzy Inference Systems [Citation Graph (, )][DBLP]

Search in 0.018secs, Finished in 0.020secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002