Остановите войну!
for scientists:
default search action
Michael Cohen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Michael B. Cohen (aka: Michael Benjamin Cohen, Michael Cohen 0001) — Massachusetts Institute of Technology, EECS, Cambridge, MA, USA
- Michael Cohen 0002 — University of Aizu, Aizuwakamatsu, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j18]Michael Cohen:
Opaque Updates. J. Philos. Log. 50(3): 447-470 (2021) - [j17]Michael Cohen:
The problem of perception and the no-miracles principle. Synth. 198(11): 11065-11080 (2021) - [c45]Michael Cohen, Wen Tang, Yanjing Wang:
De Re Updates. TARK 2021: 103-117
2010 – 2019
- 2018
- [c44]Justin E. Kleiner, Michael Cohen, Dilum P. Aluthge, Ishan Sinha, Indra Neil Sarkar, Elizabeth S. Chen, Dario R. Roque:
Predicting Thromboembolism after Vaginal and Laparoscopic Hysterectomy in Gynecologic Oncology Patients using Machine Learning. AMIA 2018 - 2017
- [j16]Bradley L. Schatz, Michael Cohen:
Advances in volatile memory forensics. Digit. Investig. 20: 1 (2017) - [j15]Michael Cohen:
Scanning memory with Yara. Digit. Investig. 20: 34-43 (2017) - [c43]Michael Cohen:
A Note on Belief, Question Embedding and Neg-Raising. LORI 2017: 648-652 - [c42]Michael Cohen:
Intra-feature Random Forest Clustering. MOD 2017: 41-49 - 2016
- [j14]Arkadiusz Socala, Michael Cohen:
Automatic profile generation for live Linux Memory analysis. Digit. Investig. 16 Supplement: S11-S24 (2016) - 2015
- [c41]Michael Cohen:
Forensic analysis of windows user space applications through heap allocations. ISCC 2015: 237-244 - [c40]Michael Cohen:
A Dynamic Epistemic Logic with a Knowability Principle. LORI 2015: 406-410 - 2014
- [j13]Johannes Stüttgen, Michael Cohen:
Robust Linux memory acquisition with minimal target impact. Digit. Investig. 11(Supplement 1): S112-S119 (2014) - 2013
- [j12]Johannes Stüttgen, Michael Cohen:
Anti-forensic resilient memory acquisition. Digit. Investig. 10(Supplement): S105-S115 (2013) - [c39]Joseph Phillips, Donald Bartoli, Michael Cohen:
StructProc8b: A Language for Scientific Reasoning. MAICS 2013: 93-99 - 2012
- [c38]Michael Cohen, Haitao Steve Zhu, Senem Ezgi Emgin, Yu David Liu:
Energy types. OOPSLA 2012: 831-850 - 2011
- [c37]Senaka Amarakeerthi, Tin Lay Nwe, Liyanage C. De Silva, Michael Cohen:
Emotion Classification Using Inter- and Intra-Subband Energy Variation. INTERSPEECH 2011: 1569-1572 - [c36]Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang, Pamela Briggs, Lewis Robart, John A. Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva:
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security. STM 2011: 28-39 - 2010
- [j11]Michael Cohen, Bradley L. Schatz:
Hash based disk imaging using AFF4. Digit. Investig. 7(Supplement): S121-S128 (2010) - [c35]Prabath Kumara Weerasinghe, Rasika Ranaweera, Senaka Amarakeerthi, Michael Cohen:
"Emo Sim": expressing voice-based emotions in mobile interfaces. Humans and Computers 2010: 28-31 - [c34]Akira Inoue, Michael Cohen:
Time-aware geomedia browsing integration with virtual environment. Humans and Computers 2010: 47-54 - [c33]Kyoko Katono, Michael Cohen:
Dolly: zoom camera perspective with Alice. Humans and Computers 2010: 55-58 - [c32]Hiromitsu Sato, Michael Cohen:
Using motion capture for real-time augmented reality scenes. Humans and Computers 2010: 58-62 - [c31]Bradley L. Schatz, Michael Cohen:
Refining Evidence Containers for Provenance and Accurate Data Representation. IFIP Int. Conf. Digital Forensics 2010: 227-242 - [e1]Vitaly Klyuev, Michael Cohen:
International Conference on Humans and Computers, HC '10, Aizu-Wakamatsu, Fukushima-ken, Japan, December 6-10, 2010. University of Aizu Press / ACM 2010 [contents] - [r1]John Steven, Michael Cohen:
Security Testing. Encyclopedia of Software Engineering 2010: 1056-1071
2000 – 2009
- 2009
- [j10]Michael Cohen, Simson L. Garfinkel, Bradley L. Schatz:
Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow. Digit. Investig. 6(Supplement): S57-S68 (2009) - 2008
- [j9]Edward Bonver, Michael Cohen:
Developing and Retaining a Security Testing Mindset. IEEE Secur. Priv. 6(5): 82-85 (2008) - [j8]Mohammad Sabbir Alam, Michael Cohen, Ashir Ahmed:
Articulated Narrowcasting for Privacy and Awareness in Multimedia Conferencing Systems and Design for Implementation Within a SIP Framework. J. Virtual Real. Broadcast. 5 (2008) - [c30]Michael Cohen, Mark A. Miodownik, Buzz Baum:
Measuring the robustness of a developmental system based on sequential growth rules. ALIFE 2008: 118-125 - 2007
- [c29]Tatsuya Nagai, Michael Cohen, Yoshinori Moriguchi, Yoko Murakami:
Dual-Driver Networked Fire Truck Simulator with Multimodal Display including Force Feedback Steering and Rotating Motion Platform. WETICE 2007: 424-430 - 2004
- [c28]Wenxi Chen, Daming Wei, Michael Cohen, Shuxue Ding, Shigeru Tokinoya, Naotoshi Takeda:
Development of a Scalable Healthcare Monitoring Platform. CIT 2004: 912-915 - 2002
- [c27]Ramesh A. Dandekar, Michael Cohen, Nancy Kirkendall:
Sensitive Micro Data Protection Using Latin Hypercube Sampling Technique. Inference Control in Statistical Databases 2002: 117-125 - 2001
- [j7]David W. Bates, Michael Cohen, Lucian Leape, J. Marc Overhage, M. Michael Shabot, Thomas B. Sheridan:
White Paper: Reducing the Frequency of Errors in Medicine Using Information Technology. J. Am. Medical Informatics Assoc. 8(4): 299-308 (2001) - [c26]Jennifer Balogh, Nicole Leduc, Michael Cohen:
Navigating the voice Web. HCI 2001: 242-246 - [c25]Michael Cohen, Toshifumi Kanno:
The 3D Helical Keyboard. NIME 2001
1990 – 1999
- 1999
- [c24]Michiro Negishi, Daniel Bullock, Michael Cohen:
A self-organizing two-stream model of language comprehension. IJCNN 1999: 288-292 - 1998
- [c23]Michael Cohen, Jens Herder:
Symbolic representations of exclude and include for audio sources and sinks: Figurative suggestions of & and &. EGVE 1998: 235-242 - 1997
- [c22]Horacio Franco, Mitch Weintraub, Michael Cohen:
Context modeling in a hybrid HMM-neural net speech recognition system. ICNN 1997: 2089-2092 - 1996
- [c21]Zeév Rivlin, Michael Cohen, Victor Abrash, Thomas Chung:
A phone-dependent confidence measure for utterance rejection. ICASSP 1996: 515-517 - [c20]Victor Abrash, Ananth Sankar, Horacio Franco, Michael Cohen:
Acoustic adaptation using nonlinear transformations of HMM parameters. ICASSP 1996: 729-732 - 1995
- [c19]Victor Abrash, Horacio Franco, Ananth Sankar, Michael Cohen:
Connectionist speaker normalization and adaptation. EUROSPEECH 1995: 2183-2186 - 1994
- [j6]Horacio Franco, Michael Cohen, Nelson Morgan, David E. Rumelhart, Victor Abrash:
Context-dependent connectionist probability estimation in a hybrid hidden Markov model-neural net speech recognition system. Comput. Speech Lang. 8(3): 211-222 (1994) - [j5]Shigeaki Aoki, Michael Cohen, Nobuo Koizumi:
Design and Control of Shared Conferencing Environments for Audio Telecommunication Using Individually Measured HRTFs. Presence Teleoperators Virtual Environ. 3(1): 60-72 (1994) - [j4]Michael Cohen:
Cybertokyo: A Survey of Public VRtractions. Presence Teleoperators Virtual Environ. 3(1): 87-93 (1994) - [j3]Steve Renals, Nelson Morgan, Hervé Bourlard, Michael Cohen, Horacio Franco:
Connectionist probability estimators in HMM speech recognition. IEEE Trans. Speech Audio Process. 2(1): 161-174 (1994) - [c18]Victor Abrash, Michael Cohen, Horacio Franco, Isao Arima:
Incorporating linguistic features in a hybrid HMM/MLP speech recognizer. ICASSP (2) 1994: 673-676 - [c17]Michael Cohen, Robert C. Moore:
Combining Linguistic and Statistical Technology for Improved Spoken Language Understanding. HLT 1994 - 1993
- [j2]Nelson Morgan, Hervé Bourlard, Steve Renals, Michael Cohen, Horacio Franco:
Hybrid Neural Network/Hidden Markov Model Systems for Continuous Speech Recognition. Int. J. Pattern Recognit. Artif. Intell. 7(4): 899-916 (1993) - 1992
- [j1]Michael Cohen:
Integrating Graphic and Audio Windows. Presence Teleoperators Virtual Environ. 1(4): 468-481 (1992) - [c16]Steve Renals, Nelson Morgan, Michael Cohen, Horacio Franco:
Connectionist probability estimation in the DECIPHER speech recognition system. ICASSP 1992: 601-604 - [c15]Otoya Shirotsuka, G. Kawai, Michael Cohen, Jared Bernstein:
Performance of speaker-independent Japanese recognizer as a function of training set size and diversity. ICSLP 1992: 297-300 - [c14]Victor Abrash, Horacio Franco, Michael Cohen, Nelson Morgan, Yochai Konig:
Connectionist gender adaptation in a hybrid neural network / hidden Markov model speech recognition system. ICSLP 1992: 911-914 - [c13]Michael Cohen, Horacio Franco, Nelson Morgan, David E. Rumelhart, Victor Abrash:
Hybrid neural network/hidden Markov model continuous-speech recognition. ICSLP 1992: 915-918 - [c12]Michael Cohen, Horacio Franco, Nelson Morgan, David E. Rumelhart, Victor Abrash:
Context-Dependent Multiple Distribution Phonetic Modeling with MLPs. NIPS 1992: 649-657 - [c11]Yochai Konig, Nelson Morgan, Chuck Wooters, Victor Abrash, Michael Cohen, Horacio Franco:
Modeling Consistency in a Speaker Independent Continuous Speech Recognition System. NIPS 1992: 682-687 - [c10]Michael Cohen:
Blush and Zebrackets: Large- and Small-Scale Typographical Representation of Nested Associativity. VL 1992: 264-266 - 1991
- [c9]Nelson Morgan, Hervé Bourlard, Chuck Wooters, Phil Kohn, Michael Cohen:
Phonetic context in hybrid HMM/MLP continuous speech recognition. EUROSPEECH 1991: 109-112 - [c8]Steve Renals, Nelson Morgan, Hervé Bourlard, Horacio Franco, Michael Cohen:
Connectionist Optimisation of Tied Mixture Hidden Markov Models. NIPS 1991: 167-174 - 1990
- [c7]Michael Cohen, Hy Murveit, Jared Bernstein, Patti J. Price, Mitch Weintraub:
The decipher speech recognition system. ICASSP 1990: 77-80 - [c6]Patti Price, Victor Abrash, Douglas E. Appelt, John Bear, Jared Bernstein, Bridget Bly, John Butzberger, Michael Cohen, Eric Jackson, Robert C. Moore, Douglas B. Moran, Hy Murveit, Mitchel Weintraub:
Spoken language system integration and development. ICSLP 1990: 729-732 - [c5]Jared Bernstein, Michael Cohen, Hy Murveit, Dimitry Rtischev, Mitchel Weintraub:
Automatic evaluation and training in English pronunciation. ICSLP 1990: 1185-1188 - [c4]Nelson Morgan, Chuck Wooters, Hervé Bourlard, Michael Cohen:
Continuous speech recognition on the resource management database using connectionist probability estimation. ICSLP 1990: 1337-1340
1980 – 1989
- 1989
- [c3]Mitch Weintraub, Hy Murveit, Michael Cohen, Patti Price, Jared Bernstein, Gay Baldwin, Don Bell:
Linguistic constraints in hidden Markov model based speech recognition. ICASSP 1989: 699-702 - [c2]Hy Murveit, Michael Cohen, Patti Price, Gay Baldwin, Mitch Weintraub, Jared Bernstein:
SRI's DECIPHER System. HLT (1) 1989 - 1987
- [c1]Hy Murveit, Mitchel Weintraub, Michael Cohen, Jared Bernstein, Alex Rudnicky:
Lexical access with lattice input. ICASSP 1987: 837-840
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 05:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint