Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Miscellaneous
Krauss, L.. M., Moody J., & Wilczek F. (1984).  A Stellar Energy Loss Mechanism Involving Axions. 144B,
Bourlard, H., Morgan N., & Wellekens C. (1990).  Statistical Inference in Multilayer Perceptrons and Hidden Markov Models with Applications in Continuous Speech Recognition. F68, 217-226.
Fillmore, C. J., & Atkins B.. T. S. (1994).  Starting where the dictionaries stop: The challenge for computational lexicography. 349-393.
Feldman, J. (1974).  The Stanford Hand-Eye Project--Recent Results.
Chernjavsky, A., & Moody J. (1990).  Spontaneous Development of Modularity in Simple Cortical Models. 2(3), 334-354.
Gold, B., Morgan N., & Ellis D. P. W. (2011).  Speech and Audio Signal Processing: Processing and Perception of Speech and Music, 2nd Edition.
Friedland, G., & Valente F. (2012).  Speaker Diarization.
Bergen, B. K., & Chang N. (2000).  Spatial Schematicity of prepositions in neural grammar.
Hobbs, J.., & Narayanan S. (2003).  Spatial Representation and Reasoning.
Subirats-Rüggeberg, C., Ferrandez O.., & Ortega M. (2009).  Spanish FrameNet in Question Answering.
Fillmore, C. J. (1971).  Space. 16-27.
Feldman, J. (1961).  Some Regularity Theorems on Kernel Methods of Summation for Functions of a Complex Variable.
Feldman, J. (1972).  Some Decidability Results on Grammatical Inference and Complexity. 20(3), 244-262.
Moody, J., & Rögnvaldsson T. S. (1997).  Smoothing Regularizers for Projective Basis Function Networks.
Gelbart, D., Bryant J., Stolcke A., Porzel R., Baudis M.., & Morgan N. (2004).  SmartKom English: From Robust Recognition to Felicitous Interaction. 453-470.
Floyd, S. (2001).  Simulation is Crucial.
Shastri, L. (2007).  SHRUTI: A Neurally Motivated Architecture for Rapid, Scalable Inference. 183-203.
MacKie-Mason, J., Shenker S. J., & Varian H. R. (1996).  Service Architecture and Content Provision: The Network Provider as Editor. 191-208.
Feldman, J., & Shastri L. (1984).  Semantic Networks and Neural Nets.
Friedland, G., & Choi J. (2012).  Semantic Computing and Privacy: A Case Study Using Inferred Geo-Location.
Bergen, B. K., & Chang N. (2001).  Semantic agreement and construal.
Willinger, W., Paxson V., & Taqqu M. S. (1998).  Self-similarity and Heavy Tails: Structural Modeling of Network Traffic.
Catanzaro, B., Kamil S., Lee Y., Asanović K., Demmel J., Keutzer K., et al. (2009).  SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization.
Elizalde, B. Martinez, Raj B., Friedland G., Nolazco J., & Garcia L. (2012).  Segment and Conquer.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols. 55(1-3), 57-68.

Pages