Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition (International Edition), and . Prentice Hall, (February 2000)Type Underspecification and On-line Type Construction in the Lexicon, and . West Coast Conference on Formal Linguistics (WCCFL13), page 270--285. (1995)Hidden Conditional Random Fields for phone recognition., and . ASRU, page 107-112. IEEE, (2009)Knowledge-Free Induction of Morphology Using Latent Semantic Analysis., and . CoNLL/LLL, page 67-72. ACL, (2000)It's Not You, it's Me: Detecting Flirting and its Misperception in Speed-Dates., , and . EMNLP, page 334-342. ACL, (2009)Lateen EM: Unsupervised Training with Multiple Objectives, Applied to Dependency Grammar Induction., , and . EMNLP, page 1269-1280. ACL, (2011)Jointly Combining Implicit Constraints Improves Temporal Ordering., and . EMNLP, page 698-706. ACL, (2008)Breaking Out of Local Optima with Count Transforms and Model Recombination: A Study in Grammar Induction., , and . EMNLP, page 1983-1995. ACL, (2013)How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation., , , , and . IEEE Symposium on Security and Privacy, page 399-413. IEEE Computer Society, (2010)Learning to Follow Navigational Directions., and . ACL, page 806-814. The Association for Computer Linguistics, (2010)