Publications

Found 269 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is I  [Clear All Filters]
Journal Article
Foraker, S., Regier T., Khetarpal N., Perfors A., & Tenenbaum J. (2009).  Indirect Evidence and the Poverty of the Stimulus: The Case of Anaphoric One. Cognitive Science. 33(2), 287-300.
Schmid, U., & Kitzelmann E. (2011).  Inductive Rule Learning on the Knowledge Level. Cognitive Systems Research. 12(3-4), 237-248.
Shastri, L. (1999).  Infants learning algebraic rules. Science. 285(5434), 
Zaitlen, N., Kang H. Min, Feolo M. L., Sherry S. T., Halperin E., & Eskin E. (2005).  Inference and Analysis of Haplotypes from Combined Genotyping Studies Deposited in dbSNP. Genome Research. 15(11), 1594-1600.
Ronen, B.., & Karp R. M. (1994).  An information entropy approach to the small-lot concept. IEEE Transactions on Engineering Management. 41(1), 89-92.
Wang, J., Geesman G. J., Hostikka S. Liisa, Atallah M., Blackwell B., Lee E., et al. (2011).  Inhibition of Activated Pericentromeric SINE/Alu Repeat Transcription in Senescent Human Adult Stem Cells Reinstates Self-Renewal. Cell Cycle. 10(17), 3016-3030.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  Inside the Slammer Worm. IEEE Magazine of Security and Privacy. 1(4), 33-39.
Baumbach, J., Wittkop T., Kleindt C. Katja, & Tauch A. (2009).  Integrated Analysis and Reconstruction of Microbial Transcriptional Gene Regulatory Networks Using CoryneRegNet. Nature Protocols. 4(6), 992-1005.
Feldman, J., Hayhoe M.., & Lachter J.. (1991).  Integration of Form Across Saccadic Eye Movements. Perception. 20(3), 393-402.
Jegelka, S., Kapoor A., & Horvitz E. (2013).  An Interactive Approach to Solving Correspondence Problems. International Journal of Computer Vision.
Ruiz, P. M., Ros F.. J., & Gómez-Skarmeta A. (2005).  Internet Connectivity for Mobile Ad Hoc Networks: Solutions and Challenges.
Stoica, I., Adkins D., Zhaung S.., Shenker S., & Surana S. (2004).  Internet Indirection Infrastructure. IEEE/ACM Transactions on Networking. 12(2), 205-218.
Floyd, S., & Kohler E. (2003).  Internet Research Needs Better Models. ACM Computer Communication Review. 33(1), 29-34.
Levit, M., & Roy D.. (2007).  Interpretation of Spatial Language in a Map Navigation Task. IEEE Transactions on Systems. 37(3), 667-679.
Hasegawa, Y., & Ohara K. Hirose (2006).  An Interview with Prof. Charles J. Fillmore. 152(6), 34-39.
Morgan, N., & Bourlard H. (1995).  An Introduction to Hybrid HMM/Connectionist Continuous Speech Recognition. IEEE Signal Processing Magazine. 25-42.
Petruck, M. R. L. (2016).  Introduction to MetaNet. MetaNet, Special Issue of Constructions and Frames. 8(2), 
Karp, R. M. (1991).  An Introduction to Randomized Algorithms. Discrete Applied Mathematics. 34,
Sarikaya, R.., Kirchhoff K., Schultz T.., & Hakkani-Tür D. (2009).  Introduction to the Special Issue on Processing Morphologically Rich Languages. IEEE Transactions on Audio. 17(5), 861-862.
Yu, D., Hinton G., Morgan N., Chien J-T., & Sagayama S. (2012).  Introduction to the Special Section on Deep Learning for Speech and Language Processing. IEEE Transactions on Audio. 20(1), 4-6.
Tang, L.., Li J., Li Y.., & Shenker S. (2009).  An Investigation of the Internet’s IP-Layer Connectivity. Computer Communications. 32(5), 913-926.
Böhme, R.., & Moore T.. (2010).  The Iterated Weakest Link. IEEE Security and Privacy. 9(1), 53-55.
Levit, M., Hakkani-Tür D., Tur G., & Gillick D. (2009).  IXIR: A Statistical Information Distillation System. Journal of Computer Speech and Language. 23(4), 527-542.

Pages