Publications
The LEAP language and data structure.
1, 579-585.
(1968). Improved Key Management for Digital Watermark Monitoring.
Proceedings of SPIE.
(2002). Empowering mobile software agents.
Proceedings 6th IEEE Mobile Agents Conference.
(2002). Java Security Architecture and Extensions.
Dr. Dobbs Journal.
(2002).
(2012).
(1994).
(1977). The Descent of Hierarchy, and Selection in Relational Semantics.
Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL 2002). 247-254.
(2002).
(2016). Sub-Sampled Newton Methods.
Mathematical Programming. 293-326.
(2019).
(2016).
(2001). An information entropy approach to the small-lot concept.
IEEE Transactions on Engineering Management. 41(1), 89-92.
(1994). miRNAkey: A Software for microRNA Deep Sequencing Analysis.
Bioinformatics. 26(20), 2615-2616.
(2010). Language (Re)modelling: Towards Embodied Language Understanding.
Proceedings of the Association for Computational Linguistics . 58, 6268–6281.
(2020).
(1993).
(2015).
(2014).
(1994).
(2011).
(2013).
(2013). A Neural Network Based, Speaker Independent, Large Vocabulary, Continuous Speech Recognition System: the Wernicke Project.
Proceedings of the Third European Conference on Speech Communication and Technology (Eurospeech '93). 1941-1944.
(1993). Reranking for Sentence Boundary Detection in Conversational Speech.
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 1, 545-548.
(2006).
(2009).