E-Commerce Agents
暂无分享,去创建一个
[1] Tuomas Sandholm,et al. An algorithm for optimal winner determination in combinatorial auctions , 1999, IJCAI 1999.
[2] Mark Weiser,et al. The world is not a desktop , 1994, INTR.
[3] Steve H. Weingart. Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.
[4] D. O'Shaughnessy,et al. Speaker recognition , 1986, IEEE ASSP Magazine.
[5] Herbert Gish,et al. Speaker verification with limited enrollment data , 1997, EUROSPEECH.
[6] Roy C. Milton,et al. Computer Evaluation of the Multivariate Normal Integral , 1972 .
[7] Aaron E. Rosenberg,et al. Speaker identification with user-selected password phrases , 1997, EUROSPEECH.
[8] Salim Roukos,et al. Free-flow dialog management using forms , 1999, EUROSPEECH.
[9] Stéphane H. Maes,et al. An instantiable speech biometrics module with natural language interface: implementation in the telephony environment , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[10] Michael P. Wellman,et al. Some economics of market-based distributed scheduling , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[11] Stéphane H. Maes,et al. Open Sesame! Speech, Password or Key to Secure Your Door? , 1998, ACCV.
[12] Biing-Hwang Juang,et al. Verbal information verification , 1997, EUROSPEECH.
[13] Kuldip K. Paliwal,et al. Automatic Speech and Speaker Recognition: Advanced Topics , 1999 .
[14] Ponani S. Gopalakrishnan,et al. Compression of acoustic features for speech recognition in network environments , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).