Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chang, N. (2009).  Constructing Grammar: A Computational Model of the Emergence of Early Constructions.
Berthold, M. R., & Huber K-P.. (1997).  Constructing Fuzzy Graphs from Examples.
de Melo, G., & Weikum G. (2012).  Constructing and Utilizing Wordnets using Statistical Methods. Journal of Language Resources and Evaluation. 46(2), 287-311.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Brewka, G., Guesgen H. Werner, & Hertzberg J. (1992).  Constraint Relaxation and Nonmonotonic Reasoning.
Ladkin, P. (1990).  Constraint Reasoning With Intervals: A Tutorial, Survey and Bibliography.
Regier, T. (2003).  Constraining Computational Models of Cognition. 611-615.
Pathak, D., Kraehenbuehl P., Yu S. X., & Darrell T. (2015).  Constrained Structured Regression with Convolutional Neural Networks. CoRR. abs/1511.07497,
Pathak, D., Krahenbuhl P., & Darrell T. (2015).  Constrained Convolutional Neural Networks for Weakly Supervised Segmentation. The IEEE International Conference on Computer Vision (ICCV). 1796-1804.
Salzmann, M., & Urtasun R. (2010).  A Constrained Combination of Discriminative and Generative Methods.
Sanchez, M. Hewlett, Ferrer L., Shriberg E., & Stolcke A. (2011).  Constrained Cepstral Speaker Recognition Using Matched UBM and JFA Training. 141-144.
Amir, E., Krathgamer R., & Rao S. (2002).  Constant-Factor Approximation of Vertex-Cuts in Planar Graphs.
Zhang, Y., Duffield N., Paxson V., & Shenker S. J. (2001).  On the Constancy of Internet Path Properties. Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop (IMW '01). 197-211.
Sönmez, K., Plauché M., Shriberg E., & Franco H. (2000).  Consonant Discrimination in Elicited and Spontaneous Speech: A Case for Signal-Adaptive Front Ends in ASR. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Kannan, J. Kumar, Caesar M., Stoica I., & Shenker S. J. (2007).  On the Consistency of DHT-Based Routing.
Morgan, N. (1990).  Considerations for the Electronic Implementation of Artificial Neural Networks.
Sharan, R., Sutharan S., Kelley R. M., Kuhn T., McCuine S., Sittler T., et al. (2005).  Conserved Patterns of Protein Interaction in Multiple Species. Proceedings of National Academy of Science. 102(6), 1974-1979.
Kelley, B. P., Sharan R., Karp R. M., Sittler T., Root D. E., Stockwell B. R., et al. (2003).  Conserved Pathways Within Bacteria and Yeast as Revealed by Global Protein Network Alignment. Proceedings of the National Academy of Sciences of the United States of America. 100(20), 11394-11399.
Blanton, E., Allman M., Fall K., & Wang L. (2003).  A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCP.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Pauls, A., DeNero J., & Klein D. (2009).  Consensus Training for Consensus Decoding in Machine Translation. 1418-1427.
Floyd, S. (1991).  Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way Traffic. Computer Communication Review. 21(5), 30-47.
Feldman, J. (1985).  Connections: Massive Parallelism in Natural and Artificial Intelligence. 277-284.
Wooters, C., & Morgan N. (1992).  Connectionist-Based Acoustic Word Models. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 157-163.
Hölldobler, S. (1990).  A Connectionist Unification Algorithm.

Pages