Publications

Found 4139 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Ben-Dor, A., Karp R. M., Schwikowski B., & Shamir R. (2003).  The Restriction Scaffold Problem. Journal of Computational Biology. 10(3-4), 385-398.
Ben-Dor, A., Chor B., Karp R. M., & Yakhini Z. (2002).  Discovering Local Structure in Gene Expression Data: The Order Preserving Submatrix Problem. Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02).
Ben-Dor, A., Karp R. M., Schwikowski B., & Yakhini Z. (2000).  Universal DNA Tag Systems: A Combinatorial Design Scheme. Proceedings of RECOMB 2000.
Ben-Dor, A., Hartman T., Schwikowski B., Sharan R., & Yakhini Z. (2003).  Towards Optimally Multiplexed Applications of Universal DNA Tag Systems. Proceedings of the Seventh Annual International Conference on Research in Computational Molecular Biology (RECOMB'03).
Ben-Dor, A., Hartman T., Karp R. M., Schwikowski B., Sharan R., & Yakhini Z. (2004).  Towards Optimally Multiplexed Applications of Universal Arrays. Journal of Computational Biology. 11, 477-493.
Benitez, C.., Burget L., Chen B. Y., Dupont S., Garudadri H., Hermansky H., et al. (2001).  Robust ASR Front-End Using Spectral-Based and Discriminant Features: Experiments on the Aurora Tasks. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001). 429-432.
Bensel, P., Günther O., Tribowski C., & Vogeler S. (2008).  Cost-Benefit Sharing in Cross-Company RFID Applications.
Berenbrink, P., & Sauerwald T. (2009).  The Weighted Coupon Collector's Problem and Applications. 449-458.
Berenbrink, P., Cooper C.., Elsässer R., Radzik T.., & Sauerwald T. (2010).  Speeding Up Random Walks with Neighborhood Exploration. 1422-1435.
Bergbauer, J., Nieuwenhuis C., Souiai M., & Cremers D. (2013).  Proximity Priors for Variational Semantic Segmentation and Recognition.
Bergemann, D., Feigenbaum J., Shenker S., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems.
Bergemann, D., Eisenbach T.., Feigenbaum J., & Shenker S. (2005).  Flexibility as an Instrument in DRM Systems. Proceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005).
Bergemann, D., Feigenbaum J., Shenker S., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems (Position Paper). Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota.
Bergen, B. K., & Feldman J. (2008).  Embodied Concept Learning. 313-332.
Bergen, B. K. (2000).  Probability in phonological generalizations: Modeling optional French final consonants. Proceedings of the 26th Annual Meeting of the Berkeley Linguistics Society.
Bergen, B. K., Lindsay T.. S., Matlock T.., & Narayanan S. (2007).  Spatial and Linguistic Aspects of Visual Imagery in Sentence Processing. Cognitive Science. 31(5), 733-764.
Bergen, B. K., Chang N., & Paskin M.. (2000).  Simulation-based language understanding in embodied construction grammar.
Bergen, B. K., Chang N., & Narayanan S. (2004).  Simulated Action in an Embodied Construction Grammar. Proceedings of the 26th Annual Meeting of the Cognitive Science Society.
Bergen, B. K., & Chang N. (2000).  Prepositional semantics in embodied construction grammar.
Bergen, B. K., & Chang N. (2001).  Semantic agreement and construal.
Bergen, B. K., & Chang N. (2002).  Embodied Construction Grammar in Simulation-Based Language Understanding.
Bergen, B. K., & Chang N. (2000).  Spatial Schematicity of prepositions in neural grammar.
Bergen, B. K. (2000).  Ramifications of phonology-syntax interactions for phonological models. Proceedings of the 24th Annual Penn Linguistics Colloquium. 27-36.
Bergen, B. K., & Feldman J. (2006).  It’s the Body, Stupid: Concept Learning According to Cognitive Science.
Berlekamp, E. (2002).  Idempotents Among Partesan Games.

Pages