1 |
Troping the Enemy: Metaphor, Culture, and the Big Data Black Boxes of National Security
|
|
|
|
In: Secrecy and Society (2018)
|
|
BASE
|
|
Show details
|
|
4 |
Machine Translation Based Data Augmentation for Cantonese Keyword Spotting (Author's Manuscript)
|
|
|
|
BASE
|
|
Show details
|
|
5 |
LSTM, GRU, Highway and a Bit of Attention: An Empirical Overview for Language Modeling in Speech Recognition
|
|
|
|
BASE
|
|
Show details
|
|
6 |
Investigation of Back-off Based Interpolation Between Recurrent Neural Network and N-gram Language Models (Author's Manuscript)
|
|
|
|
BASE
|
|
Show details
|
|
7 |
Investigating Techniques for Low Resource Conversational Speech Recognition
|
|
|
|
BASE
|
|
Show details
|
|
8 |
Code-switched English Pronunciation Modeling for Swahili Spoken Term Detection (Pub Version, Open Access)
|
|
|
|
BASE
|
|
Show details
|
|
9 |
Multilingual Data Selection for Low Resource Speech Recognition
|
|
|
|
BASE
|
|
Show details
|
|
10 |
Study of Large Data Resources for Multilingual Training and System Porting (Pub Version, Open Access)
|
|
|
|
BASE
|
|
Show details
|
|
11 |
A Functional Model of Sensemaking in a Neurocognitive Architecture (Open Access, Publisher's Version)
|
|
|
|
BASE
|
|
Show details
|
|
13 |
The Dependency Parsed FrameNet Corpus (Author's Manuscript)
|
|
|
|
BASE
|
|
Show details
|
|
14 |
Open Language Learning for Information Extraction (Author's Manuscript)
|
|
|
|
BASE
|
|
Show details
|
|
15 |
A KEYWORD SEARCH SYSTEM USING OPEN SOURCE SOFTWARE
|
|
|
|
In: http://www.clsp.jhu.edu/%7Eguoguo/papers/slt2014_babel_system_paper.pdf
|
|
BASE
|
|
Show details
|
|
|
|