default search action
John E. Shore
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 1985
- [j20]John E. Shore:
The Sachertorte algorithm and other antidotes to computer anxiety. ACM SIGCHI Bull. 17(1): 35-37 (1985) - [j19]David K. Burton, John E. Shore:
Speaker-dependent isolated word recognition using speaker-independent vector quantization codebooks augmented with speaker-specific data. IEEE Trans. Acoust. Speech Signal Process. 33(2): 440-443 (1985) - [j18]David K. Burton, John E. Shore, Joseph T. Buck:
Isolated-word speech recognition using multisection vector quantization codebooks. IEEE Trans. Acoust. Speech Signal Process. 33(4): 837-849 (1985) - 1984
- [j17]John E. Shore:
On a relation between maximum likelihood classification and minimum relative-entropy classification. IEEE Trans. Inf. Theory 30(6): 851-854 (1984) - 1983
- [j16]John E. Shore:
Minimum-cross-entropy inversion, spectrum analysis, and classification. Introduction and discussion of possible geophysical applications. Inf. Sci. 31(3): 199-207 (1983) - [j15]John E. Shore, David K. Burton:
Discrete utterance speech recognition without time alignment. IEEE Trans. Inf. Theory 29(4): 473-490 (1983) - [j14]Rodney W. Johnson, John E. Shore:
Comments on and correction to 'Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy' (Jan 80 26-37). IEEE Trans. Inf. Theory 29(6): 942-943 (1983) - 1982
- [j13]John E. Shore:
Information Theoretic Approximations for M/G/ 1 und G/G/ 1 Queuing Systems. Acta Informatica 17: 43-61 (1982) - [j12]John E. Shore, Robert M. Gray:
Minimum Cross-Entropy Pattern Classification and Cluster Analysis. IEEE Trans. Pattern Anal. Mach. Intell. 4(1): 11-17 (1982) - [j11]John E. Shore:
Cross-entropy minimization given fully decomposable subset and aggregate constraints. IEEE Trans. Inf. Theory 28(6): 956-961 (1982) - 1981
- [j10]John E. Shore, Rodney W. Johnson:
Properties of cross-entropy minimization. IEEE Trans. Inf. Theory 27(4): 472-482 (1981) - [j9]Robert M. Gray, Augustine H. Gray Jr., Guillermo Rebolledo, John E. Shore:
Rate-distortion speech coding with a minimum discrimination information distortion measure. IEEE Trans. Inf. Theory 27(6): 708-720 (1981) - 1980
- [j8]John E. Shore, Rodney W. Johnson:
Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy. IEEE Trans. Inf. Theory 26(1): 26-37 (1980) - 1979
- [j7]John E. Shore, Kathryn L. Heninger:
Limits to specifications: why not more progress? Panel at IEEE conference on <u>specifications of reliable software</u>. ACM SIGSOFT Softw. Eng. Notes 4(3): 15-16 (1979) - 1977
- [j6]John E. Shore:
Anomalous Behaviour of the Fifty-Percent Rule in Dynamic Memory Allocation. Commun. ACM 20(11): 812-820 (1977) - 1975
- [j5]John E. Shore:
On the External Storage Fragmentation Produced by First-Fit and Best-Fit Allocation Strategies. Commun. ACM 18(8): 433-440 (1975) - [j4]David Lorge Parnas, John E. Shore, W. David Elliott:
On the need for fewer restrictions in changing compile-time environments. ACM SIGPLAN Notices 10(5): 29-36 (1975) - 1974
- [j3]John E. Shore:
Conjecture corner. SIGARCH Comput. Archit. News 3(1): 3-6 (1974) - [j2]John E. Shore:
Conjecture corner. SIGARCH Comput. Archit. News 3(3): 4-9 (1974) - 1973
- [j1]John E. Shore:
On the Application of Haar Functions. IEEE Trans. Commun. 21(3): 209-216 (1973)
Conference and Workshop Papers
- 1999
- [c15]Onur M. Ülgen, John E. Shore, Gene Coffman, David P. Sly, Matthew W. Rohrer, Demet C. Wood:
Increasing the power and value of manufacturing simulation via collaboration with other analytical tools: a panel discussion. WSC 1999: 749-753 - 1992
- [c14]John E. Shore:
Portable Software Modules for Speech Recognition (DARPA PHASE II SBIR Contract DAAH01-91-C-R297). HLT 1992 - 1991
- [c13]John E. Shore:
Portable Software Modules for Speech Recognition (Phase I SBIR grant from DARPA). HLT 1991 - 1990
- [c12]John E. Shore:
Portable Software Modules for Speech Recognition. HLT 1990 - 1989
- [c11]John E. Shore:
An extensible file system for signal processing software. ICASSP 1989: 1083-1086 - 1985
- [c10]Joseph T. Buck, David K. Burton, John E. Shore:
Text-dependent speaker recognition using vector quantization. ICASSP 1985: 391-394 - [c9]John E. Shore:
Relative Entropy, Probabilistic Inference, and AI. UAI 1985: 211-216 - 1984
- [c8]David K. Burton, Joseph T. Buck, John E. Shore:
Parameter selection for isolated word recognition using vector quantization. ICASSP 1984: 344-347 - [c7]Rodney W. Johnson, John E. Shore:
Power spectrum estimation by means of relative-entropy minimization with uncertain constraints. ICASSP 1984: 558-561 - 1983
- [c6]David K. Burton, John E. Shore, Joseph T. Buck:
A generalization of isolated word recognition using vector quantization. ICASSP 1983: 1021-1024 - [c5]Rodney W. Johnson, John E. Shore, Joseph T. Buck, David K. Burton:
Speech noise reduction by means of multi-signal minimum-cross-entropy spectral analysis. ICASSP 1983: 1129-1132 - 1982
- [c4]John E. Shore, David K. Burton:
Discrete utterance speech recognition without time normalization. ICASSP 1982: 907-910 - 1980
- [c3]John E. Shore:
The lazy repairman and other models: Performance collapse due to overhead in simple, single-server queuing systems. Performance 1980: 217-224 - 1978
- [c2]John E. Shore:
Derivation of equilibrium and time-dependent solution to M/M/00/N and M/M/oo queueing systems using entropy maximization. AFIPS National Computer Conference 1978: 483-488 - 1976
- [c1]David Lorge Parnas, John E. Shore, David M. Weiss:
Abstract Types Defined as Classes of Variables. Conference on Data: Abstraction, Definition and Structure 1976: 149-153
Informal and Other Publications
- 2013
- [i1]John E. Shore:
Relative Entropy, Probabilistic Inference and AI. CoRR abs/1304.3423 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint