Publications

Export 231 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Dorr BJ, Voss CR, Sencan MU.  1998.  Lexical Allocation in Interlingua-Based Machine Translation of Spatial Expressions. Representation and processing of spatial expressions. :125-125.
Dorr BJ.  1997.  Large-Scale Dictionary Construction for Foreign Language Tutoring and Interlingual Machine Translation. Machine Translation. 12(4):271-322.
Dorr BJ.  1997.  LEXICALL: Lexicon Construction for Foreign Language Tutoring.
Dorr BJ.  1988.  A Lexical Conceptual Approach to Generation for Machine Translation.
Dorr BJ, Levow G-A, Lin D.  2000.  Large-Scale Construction of a Chinese-English Semantic Hierarchy.
Dorr BJ.  1991.  Lexical semantics and tense/aspect in machine translation.
Dorr BJ.  1997.  Large-scale acquisition of LCS-based lexicons for foreign language tutoring. Proceedings of the fifth conference on Applied natural language processing. :139-146.
Dorr BJ, Katsova M.  1998.  Lexical Selection for Cross-Language Applications: Combining LCS with WordNet. Machine Translation and the Information SoupMachine Translation and the Information Soup. 1529:438-447.
Drapkin J, Miller M, Perlis D.  1987.  Life on a desert island. Proc. Workshop on The Frame Problem in Artificial Intelligence. :349-357.
Du X, Abdalmageed W, Doermann D.  2013.  Large-Scale Signature Matching Using Multi-stage Hashing. Document Analysis and Recognition (ICDAR), 2013 12th International Conference on. :976-980.
Du X, Smolka SA, Cleaveland R.  1999.  Local model checking and protocol analysis. International Journal on Software Tools for Technology Transfer (STTT). 2(3):219-241.
E
El-Osery AI, Baird D, Abd-Almageed W.  2005.  A learning automata based power management for ad-hoc networks. 2005 IEEE International Conference on Systems, Man and Cybernetics. 4:3569-3573Vol.4-3569-3573Vol.4.
Elgammal A, Shet V, Yacoob Y, Davis LS.  2003.  Learning dynamics for exemplar-based gesture recognition. Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on. 1:I-571-I-578vol.1-I-571-I-578vol.1.
Elman H, Howle VE, Shadid J, Silvester D, Tuminaro R.  2007.  Least squares preconditioners for stabilized discretizations of the Navier-Stokes equations. SIAM J. Sci. Comput. 30(1):290-311.
Elman H, Golub GH.  1990.  Line iterative methods for cyclically reduced discrete convection-diffusion problems.
Eom H, Hollingsworth J.  1998.  LBF: a performance metric for program reorganization. 18th International Conference on Distributed Computing Systems, 1998. Proceedings. :222-229.
Erickson J, Har-Peled S, Mount D.  2006.  On the Least Median Square Problem. Discrete & Computational Geometry. 36(4):593-607.
Etherington DW, Kraus S, Perlis D.  1990.  Limited scope and circumscriptive reasoning. International Journal of Expert Systems. 3(3):207-217.
F
Farrell R, Doermann D, Davis LS.  2007.  Learning Higher-order Transition Models in Medium-scale Camera Networks. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Feamster N, Dingledine R.  2004.  Location diversity in anonymity networks. Proceedings of the 2004 ACM workshop on Privacy in the electronic society. :66-76.
Fekete J-D, Plaisant C.  2004.  Les leçons tirées des deux compétitions de visualisation d'information. Proceedings of the 16th conference on Association Francophone d'Interaction Homme-Machine. :7-12.
Friedman N, Getoor L, Koller D, Pfeffer A.  1999.  Learning probabilistic relational models. International Joint Conference on Artificial Intelligence. 16:1300-1309.
Froehlich J, Larson E, Saba E, Campbell T, Atlas L, Fogarty J, Patel S.  2011.  A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home. Pervasive ComputingPervasive Computing. 6696:50-69.
Froehlich J, Larson E, Saba E, Campbell T, Atlas L, Fogarty J, Patel S.  2011.  A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home. Pervasive Computing. 6696:50-69.
G
Gennaro R, Gertner Y, Katz J.  2003.  Lower bounds on the efficiency of encryption and digital signature schemes. Proceedings of the thirty-fifth annual ACM symposium on Theory of computing. :417-425.

Pages