Microsoft Research Blog

English

  1. Efficient Cepstral Normalization for Robust Speech Recognition 

    March 1, 1993 | Alex Acero and Xuedong Huang

    In this paper we describe and compare the performance of a series of cepstrum-based procedures that enable the CMU SPHINX-II speech recognition system to maintain a high level of recognition accuracy over a wide variety of acoustical environments. We describe the MFCDCN algorithm, an environment-independent…

  2. Bounded incremental computation 

    January 2, 1993 | G. Ramalingam

    Incremental computation concerns the re-computation of output after a change in the input. Incremental algorithms, also called dynamic or on-line algorithms, process a change in the input by identifying the "affected output", that is, the part of the previous output that is no longer "correct",…

  3. Deus ex Machina 

    January 1, 1993 | Brian Guenter and Casey Anderson

    "This is a movie made by my graduate students in 1993 when I was an assistant professor at Georgia Tech. I hadn't looked at this video for more than 15 years. It holds up remarkably well and I'm still impressed by the incredible job they…

  4. A Term Calculus for Intuitionistic Linear Logic 

    January 1, 1993 | Nick Benton, Gavin Bierman, Valeria de Paiva, and Martin Hyland

    In this paper we consider the problem of deriving a term assignment system for Girard's Intuitionistic Linear Logic for both the sequent calculus and natural deduction proof systems. Our system di ers from previous calculi (e.g. that of Abramsky [1]) and has two important properties which…

  5. Best First Minimax Search: First Results 

    January 1, 1993 | Richard Korf and Max Chickering

    We present a very simple selective minimax search algorithm for two-player games. It always expands next the frontier node at the end of the principal variation, or current best line of play, which is the node that determines the minimax value of the root. The…

  6. Key Range Locking Strategies for Improved Concurrency 

    January 1, 1993 | David Lomet

    "Phantoms" are records inserted into a concurrently selected set of records specified by a predicate such that the selection does not see a transaction consistent result. The usual locking strategy is to lock only existing records. However, records that satisfy the selection predicate must be…

  7. Formal Parametric Polymorphism 

    January 1, 1993 | Martin Abadi, Luca Cardelli, and Pierre-Louis Curien

    A polymorphic function is parametric if its behavior does not depend on the type at which it is instantiated. Starting with Reynolds's work, the study of parametricity is typically semantic. In this paper, we develop a syntactic approach to parametricity, and a formal system that…

  8. Alignment by maximisation of mutual information 

    January 1, 1993 | Paul A. Viola

    A new information-theoretic approach is presented for fi nding the pose of an object in an image. The technique does not require information about the surface properties of the object, besides its shape, and is robust with respect to variations of illumination. In our derivation, few…