Publications

Found 416 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is C  [Clear All Filters]
Technical Report
Kobsa, A. (1989).  Conceptual Hierarchies in Classical and Connectionist Architecture.
Munro, P. W. (1989).  Conjectures on Representations in Backpropagation Networks.
Guesgen, H. Werner (1990).  A Connectionist Approach to Symbolic Constraint Satisfaction.
Shastri, L., Grannes D. Jeffrey, Narayanan S., & Feldman J. (2002).  A Connectionist Encoding of Parameterized Schemas and Reactive Plans.
Shastri, L., Grannes D. Jeffrey, Narayanan S., & Feldman J. (2002).  A Connectionist Encoding of Parameterized Schemas and Reactive Plans.
Kohn, P. (1991).  Connectionist Layered Object-Oriented Network Simulator (CLONES): User's Manual.
Stolcke, A. (1989).  A Connectionist Model of Unification.
Feldman, J. (1985).  Connectionist Models and Parallelism in High Level Vision.
Renals, S., & Morgan N. (1992).  Connectionist Probability Estimation in HMM Speech Recognition.
Renals, S., Morgan N., Bourlard H., Cohen M., Franco H., Wooters C., et al. (1991).  Connectionist Speech Recognition: Status and Prospects.
Hölldobler, S. (1990).  A Connectionist Unification Algorithm.
Morgan, N. (1990).  Considerations for the Electronic Implementation of Artificial Neural Networks.
Kannan, J. Kumar, Caesar M., Stoica I., & Shenker S. J. (2007).  On the Consistency of DHT-Based Routing.
Ladkin, P. (1990).  Constraint Reasoning With Intervals: A Tutorial, Survey and Bibliography.
Brewka, G., Guesgen H. Werner, & Hertzberg J. (1992).  Constraint Relaxation and Nonmonotonic Reasoning.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Berthold, M. R., & Huber K-P.. (1997).  Constructing Fuzzy Graphs from Examples.
Scheler, G. (1997).  Constructing Semantic Representations Using the MDL Principle.
Hastad, J.., Impagliazzo R., Levin L. A., & Luby M. (1991).  Construction of a Pseudo-Random Generator from Any One-Way Function.
Pietracaprina, A., Pucci G., & Sibeyn J. Frederik (1993).  Constructive Deterministic PRAM Simulation on a Mesh-Connected Computer.
Cleve, R., & Dagum P. (1989).  A Constructive Omega(t(superscript 1.26)) Lower Bound for the Ramsey Number R (3,t).
Janin, A., Friedland G., & Sommer R. (2012).  Content?based Privacy for Consumer?Produced Multimedia.
Di Gesu, V., & Isgro F. (1995).  Context and Vision.
Morgan, N., Wooters C., Bourlard H., & Cohen M. (1990).  Continuous Speech Recognition on the Resource Management Database Using Connectionist Probability Estimation.
Cleve, R. (1989).  Controlled Gradual Disclosure Schemes for Random Bits and Their Applications.

Pages