Found 247 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is I  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Baraldi, A., Blonda P., Parmiggiani F., & Satalino G. (1998).  Image Segmentation Through Contextual Clustering.
Baum, E.. B., Moody J., & Wilczek F. (1988).  Internal Representations for Associative Memory. 59, 217-228.
Baumbach, J., Wittkop T., Kleindt C. Katja, & Tauch A. (2009).  Integrated Analysis and Reconstruction of Microbial Transcriptional Gene Regulatory Networks Using CoryneRegNet. Nature Protocols. 4(6), 992-1005.
Bergen, B. K., & Feldman J. (2006).  It’s the Body, Stupid: Concept Learning According to Cognitive Science.
Berlekamp, E. (2002).  Idempotents Among Partesan Games.
Bermudez-Edo, M.., Hurtado-Torres N.., & Aragon-Correa J.. A. (2010).  The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online Innovations. Information Technology and Management. 11(4), 177-189.
Bernini, C.., Codenotti B., Leoncini M., & Resta G. (1991).  Incomplete Factorizations for Certain Toeplitz Matrices.
Bertoni, A., & Dorigo M. (1993).  Implicit Parallelism in Genetic Algorithms.
Bettinson, M., & Bird S. (2018).  Image-Gesture-Voice: A Web Component for Eliciting Speech. Proceedings of the LREC 2018 Workshop.
Bini, D., & Pan V. (1992).  Improved Parallel Computations with Toeplitz-like and Hankel-like Matrices.
Bini, D., & Pan V. (1992).  Improved Parallel Polynomial Division and Its Extensions.
Blanton, E., & Allman M. (2005).  On the Impact of Bursting on TCP Performance. Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005).
Boakye, K., & Stolcke A. (2006).  Improved Speech Activity Detection Using Cross-Channel Features for Recognition of Multiparty Meetings. Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006). 1962-1965.
Boakye, K., Vinyals O., & Friedland G. (2011).  Improved Overlapped Speech Handling for Speaker Diarization. 941-944.
Böhme, R.., & Moore T.. (2010).  The Iterated Weakest Link. IEEE Security and Privacy. 9(1), 53-55.
Braden, R., Clark D. D., & Shenker S. (1994).  Integrated Services in the Internet Architecture: An Overview.
Bradner, S.., & Paxson V. (2000).  IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers.