Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Feldman, J. (1989).  Connectionist Representation of Concepts. 25-45.
Feldman, J. (1988).  Connectionist Representation of Concepts.
Bourlard, H., & Morgan N. (1993).  Connectionist Speech Recognition: A Hybrid Approach.
Renals, S., Morgan N., Bourlard H., Cohen M., Franco H., Wooters C., et al. (1991).  Connectionist Speech Recognition: Status and Prospects.
[Anonymous] (1999).  Connectionist Symbol Processing: Dead or Alive?. (Jagota, A.., Plate T.., Shastri L., & Sun R.., Ed.).2, 1-40.
Feldman, J. (1990).  Connectionist Systems. Annual Review of Computer Science. 4, 369-383.
Bourlard, H., & Morgan N. (1998).  Connectionist Techniques for Speech Recognition. 356-361.
Shastri, L., & Grannes D. Jeffrey (1996).  A Connectionist Treatment of Negation and Inconsistency. Proceedings of the 18th Conference of the Cognitive Science Society.
Hölldobler, S. (1990).  A Connectionist Unification Algorithm.
Wooters, C., & Morgan N. (1992).  Connectionist-Based Acoustic Word Models. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 157-163.
Feldman, J. (1985).  Connections: Massive Parallelism in Natural and Artificial Intelligence. 277-284.
Floyd, S. (1991).  Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way Traffic. Computer Communication Review. 21(5), 30-47.
Pauls, A., DeNero J., & Klein D. (2009).  Consensus Training for Consensus Decoding in Machine Translation. 1418-1427.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Blanton, E., Allman M., Fall K., & Wang L. (2003).  A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCP.
Kelley, B. P., Sharan R., Karp R. M., Sittler T., Root D. E., Stockwell B. R., et al. (2003).  Conserved Pathways Within Bacteria and Yeast as Revealed by Global Protein Network Alignment. Proceedings of the National Academy of Sciences of the United States of America. 100(20), 11394-11399.
Sharan, R., Sutharan S., Kelley R. M., Kuhn T., McCuine S., Sittler T., et al. (2005).  Conserved Patterns of Protein Interaction in Multiple Species. Proceedings of National Academy of Science. 102(6), 1974-1979.
Morgan, N. (1990).  Considerations for the Electronic Implementation of Artificial Neural Networks.
Kannan, J. Kumar, Caesar M., Stoica I., & Shenker S. J. (2007).  On the Consistency of DHT-Based Routing.
Sönmez, K., Plauché M., Shriberg E., & Franco H. (2000).  Consonant Discrimination in Elicited and Spontaneous Speech: A Case for Signal-Adaptive Front Ends in ASR. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Zhang, Y., Duffield N., Paxson V., & Shenker S. J. (2001).  On the Constancy of Internet Path Properties. Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop (IMW '01). 197-211.
Amir, E., Krathgamer R., & Rao S. (2002).  Constant-Factor Approximation of Vertex-Cuts in Planar Graphs.
Sanchez, M. Hewlett, Ferrer L., Shriberg E., & Stolcke A. (2011).  Constrained Cepstral Speaker Recognition Using Matched UBM and JFA Training. 141-144.
Salzmann, M., & Urtasun R. (2010).  A Constrained Combination of Discriminative and Generative Methods.
Pathak, D., Krahenbuhl P., & Darrell T. (2015).  Constrained Convolutional Neural Networks for Weakly Supervised Segmentation. The IEEE International Conference on Computer Vision (ICCV). 1796-1804.

Pages