Publications

Found 472 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is S  [Clear All Filters]
Journal Article
Liu, X., Hieronymus J., Gales M.. J. F., & Woodland P. (2013).  Syllable Models for Mandarin Speech Recognition: Exploiting Character Language Models. Journal of the Acoustical Society of America. 133(1), 519-528.
Floyd, S., & Jacobson V. (1994).  The Synchronization of Periodic Routing Messages. IEEE/ACM Transactions on Networking. 2(2), 122-136.
Feldman, J., & Biermann A. (1972).  On the Synthesis of Finite-State Machines from Samples of Their Behavior. IEEE Transactions on Computers. C-21(6), 592-596.
Peters, N., & Schmeder A. W. (2011).  Synthesizing classic recording microphones characteristics using a spherical microphone array. Journal of the Acoustical Society of America. 130(4), 2507.
Miscellaneous
Krashinsky, R., Batten C., & Asanović K. (2007).  The Scale Vector-Thread Processor.
Morgan, N., Tajchman G., Mirghafori N., Konig Y., & Wooters C. (1994).  Scaling a Hybrid HMM/MLP System for Large Vocabulary CSR. 123-124.
Chang, N., Feldman J., Porzel R., & Sanders K. (2002).  Scaling Cognitive Linguistics: Formalisms for Language Understanding.
Fillmore, C. J. (1977).  Scenes-and-frames semantics, Linguistic Structures Processing. 55-88.
Feldman, J. (1977).  The Science of Artificial Intelligence.
Chandrayana, K.., Karp R. M., Roughan M.., Sen S.., & Zhang Y. (2004).  Search Strategies in Inter-Domain Traffic Engineering.
Fabian, B., & Günther O. (2009).  Security Challenges of the EPC Network. 121-125.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols. 55(1-3), 57-68.
Elizalde, B. Martinez, Raj B., Friedland G., Nolazco J., & Garcia L. (2012).  Segment and Conquer.
Catanzaro, B., Kamil S., Lee Y., Asanović K., Demmel J., Keutzer K., et al. (2009).  SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization.
Willinger, W., Paxson V., & Taqqu M. S. (1998).  Self-similarity and Heavy Tails: Structural Modeling of Network Traffic.
Bergen, B. K., & Chang N. (2001).  Semantic agreement and construal.
Friedland, G., & Choi J. (2012).  Semantic Computing and Privacy: A Case Study Using Inferred Geo-Location.
Feldman, J., & Shastri L. (1984).  Semantic Networks and Neural Nets.
MacKie-Mason, J., Shenker S. J., & Varian H. R. (1996).  Service Architecture and Content Provision: The Network Provider as Editor. 191-208.
Shastri, L. (2007).  SHRUTI: A Neurally Motivated Architecture for Rapid, Scalable Inference. 183-203.
Floyd, S. (2001).  Simulation is Crucial.
Gelbart, D., Bryant J., Stolcke A., Porzel R., Baudis M.., & Morgan N. (2004).  SmartKom English: From Robust Recognition to Felicitous Interaction. 453-470.
Moody, J., & Rögnvaldsson T. S. (1997).  Smoothing Regularizers for Projective Basis Function Networks.
Feldman, J. (1972).  Some Decidability Results on Grammatical Inference and Complexity. 20(3), 244-262.
Feldman, J. (1961).  Some Regularity Theorems on Kernel Methods of Summation for Functions of a Complex Variable.

Pages