default search action
Kenneth E. Hild II
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [c21]Umut Orhan, Deniz Erdogmus, Brian Roark, Barry Oken, Shalini Purwar, Kenneth E. Hild II, Andrew Fowler, Melanie Fried-Oken:
Improved accuracy using recursive Bayesian estimation based language model fusion in ERP-based BCI typing systems. EMBC 2012: 2497-2500 - [c20]Umut Orhan, Kenneth E. Hild II, Deniz Erdogmus, Brian Roark, Barry Oken, Melanie Fried-Oken:
RSVP keyboard: An EEG based typing interface. ICASSP 2012: 645-648 - [c19]Yonghong Huang, Kenneth E. Hild II, Misha Pavel, Santosh Mathan, Deniz Erdogmus:
Neural correlates of visual perception in rapid serial visual presentation paradigms. MLSP 2012: 1-6 - [c18]Ken Montanez, Weifeng Liu, Vince D. Calhoun, Catherine Huang, Kenneth E. Hild II:
The eighth annual MLSP competition: Overview. MLSP 2012: 1-4 - 2011
- [j22]Yonghong Huang, Deniz Erdogmus, Misha Pavel, Santosh Mathan, Kenneth E. Hild II:
A framework for rapid visual image search using single-trial brain evoked responses. Neurocomputing 74(12-13): 2041-2051 (2011) - [j21]Hooman Nezamfar, Umut Orhan, Shalini Purwar, Kenneth E. Hild II, Barry Oken, Deniz Erdogmus:
Decoding of multichannel EEG activity from the visual cortex in response to pseudorandom binary sequences of visual stimuli. Int. J. Imaging Syst. Technol. 21(2): 139-147 (2011) - [c17]Kenneth E. Hild II, Umut Orhan, Deniz Erdogmus, Brian Roark, Barry Oken, Shalini Purwar, Hooman Nezamfar, Melanie Fried-Oken:
An ERP-based Brain-Computer Interface for text entry using Rapid Serial Visual Presentation and Language Modeling. ACL (System Demonstrations) 2011: 38-43 - [c16]Umut Orhan, Deniz Erdogmus, Kenneth E. Hild II, Brian Roark, Barry Oken, Melanie Fried-Oken:
Context information significantly improves brain computer interface performance - a case study on text entry using a language model assisted BCI. ACSCC 2011: 132-136 - [c15]Umut Orhan, Deniz Erdogmus, Brian Roark, Shalini Purwar, Kenneth E. Hild II, Barry Oken, Hooman Nezamfar, Melanie Fried-Oken:
Fusion with language models improves spelling accuracy for ERP-based brain computer interface spellers. EMBC 2011: 5774-5777 - [c14]Santosh Mathan, Kenneth E. Hild II, Yonghong Huang, Misha Pavel:
Characterizing the Performance Limits of High Speed Image Triage Using Bayesian Search Theory. HCI (20) 2011: 95-103 - [c13]Hooman Nezamfar, Umut Orhan, Deniz Erdogmus, Kenneth E. Hild II, Shalini Purwar, Barry Oken, Melanie Fried-Oken:
On visually evoked potentials in eeg induced by multiple pseudorandom binary sequences for brain computer interface design. ICASSP 2011: 2044-2047 - 2010
- [p2]Deniz Erdogmus, Dongxin Xu, Kenneth E. Hild II:
Classification with EEC, Divergence Measures, and Error Bounds. Information Theoretic Learning 2010: 219-261 - [p1]Sudhir Rao, Deniz Erdogmus, Dongxin Xu, Kenneth E. Hild II:
Self-Organizing ITL Principles for Unsupervised Learning. Information Theoretic Learning 2010: 299-349
2000 – 2009
- 2009
- [j20]Kenneth E. Hild II, Srikantan S. Nagarajan:
Source Localization of EEG/MEG Data by Correlating Columns of ICA and Lead Field Matrices. IEEE Trans. Biomed. Eng. 56(11): 2619-2626 (2009) - [c12]Yonghong Huang, Deniz Erdogmus, Misha Pavel, Kenneth E. Hild II, Santosh Mathan:
Target detection using incremental learning on single-trial evoked response. ICASSP 2009: 481-484 - 2008
- [j19]Stephen James Redmond, Conor Heneghan, Kenneth E. Hild II, Srikantan S. Nagarajan:
Denoising of magnetoencephalographic data using spatial averaging. Neurocomputing 72(1-3): 112-118 (2008) - [j18]Kensuke Sekihara, Kenneth E. Hild II, Sarang S. Dalal, Srikantan S. Nagarajan:
Performance of Prewhitening Beamforming in MEG Dual Experimental Conditions. IEEE Trans. Biomed. Eng. 55(3): 1112-1121 (2008) - [j17]Kenneth E. Hild II, Hagai Thomas Attias, Srikantan S. Nagarajan:
An Expectation-Maximization Method for Spatio-Temporal Blind Source Separation Using an AR-MOG Source Model. IEEE Trans. Neural Networks 19(3): 508-519 (2008) - 2007
- [j16]Robert Jenssen, Deniz Erdogmus, Kenneth E. Hild II, José C. Príncipe, Torbjørn Eltoft:
Information cut for clustering using a gradient descent approach. Pattern Recognit. 40(3): 796-806 (2007) - [j15]Kenneth E. Hild II, Hagai Thomas Attias, Silvia Comani, Srikantan S. Nagarajan:
Fetal cardiac signal extraction from magnetocardiographic data using a probabilistic algorithm. Signal Process. 87(8): 1993-2004 (2007) - [c11]Kenneth E. Hild II, Srikantan S. Nagarajan:
Source Localization of EEG/MEG Data by Correlating Columns of ICA Solution with Lead Field Matrix. ICASSP (4) 2007: 1177-1180 - 2006
- [j14]Srikantan S. Nagarajan, Hagai Thomas Attias, Kenneth E. Hild II, Kensuke Sekihara:
A graphical model for estimating stimulus-evoked brain responses from magnetoencephalography data with large background brain activity. NeuroImage 30(2): 400-416 (2006) - [j13]Kenneth E. Hild II, Deniz Erdogmus, Kari Torkkola, José C. Príncipe:
Feature Extraction Using Information-Theoretic Learning. IEEE Trans. Pattern Anal. Mach. Intell. 28(9): 1385-1392 (2006) - [j12]Kenneth E. Hild II, Deniz Erdogmus, José C. Príncipe:
An analysis of entropy estimators for blind source separation. Signal Process. 86(1): 182-194 (2006) - [j11]Kensuke Sekihara, Kenneth E. Hild II, Srikantan S. Nagarajan:
A novel adaptive beamformer for MEG source reconstruction effective when large background brain activities exist. IEEE Trans. Biomed. Eng. 53(9): 1755-1764 (2006) - [j10]Kenneth E. Hild II, Deniz Erdogmus, José Carlos Príncipe:
Experimental upper bound for the performance of convolutive source separation methods. IEEE Trans. Signal Process. 54(2): 627-635 (2006) - [c10]Kenneth E. Hild II, Hagai Attias, Srikantan S. Nagarajan:
An EM Method for Spatio-temporal Blind Source Separation Using an AR-MOG Source Model. ICA 2006: 98-105 - [c9]Srikantan S. Nagarajan, Hagai Attias, Kensuke Sekihara, Kenneth E. Hild II:
Partitioned Factor Analysis for Interference Suppression and Source Extraction. ICA 2006: 189-197 - 2005
- [j9]Kenneth E. Hild II, David Pinto, Deniz Erdogmus, José Carlos Príncipe:
Convolutive blind source separation by minimizing mutual information between segments of signals. IEEE Trans. Circuits Syst. I Regul. Pap. 52-I(10): 2188-2196 (2005) - [j8]Marcelino Lázaro, Ignacio Santamaría, Deniz Erdogmus, Kenneth E. Hild II, Carlos Pantaleón, José C. Príncipe:
Stochastic blind equalization based on PDF fitting using Parzen estimator. IEEE Trans. Signal Process. 53(2-1): 696-704 (2005) - [c8]Robert Jenssen, Deniz Erdogmus, Kenneth E. Hild II, José Carlos Príncipe, Torbjørn Eltoft:
Optimizing the Cauchy-Schwarz PDF Distance for Information Theoretic, Non-parametric Clustering. EMMCVPR 2005: 34-45 - [c7]Srikantan S. Nagarajan, Hagai Attias, Kenneth E. Hild II, Kensuke Sekihara:
Stimulus Evoked Independent Factor Analysis of MEG Data with Large Background Activity. NIPS 2005: 963-970 - 2004
- [j7]Deniz Erdogmus, Kenneth E. Hild II, Yadunandana N. Rao, José Carlos Príncipe:
Minimax Mutual Information Approach for Independent Component Analysis. Neural Comput. 16(6): 1235-1252 (2004) - [j6]Deniz Erdogmus, Kenneth E. Hild II, José C. Príncipe, Marcelino Lázaro, Ignacio Santamaría:
Adaptive blind deconvolution of linear channels using Renyi's entropy with Parzen window estimation. IEEE Trans. Signal Process. 52(6): 1489-1498 (2004) - 2003
- [j5]Deniz Erdogmus, Kenneth E. Hild II, José C. Príncipe:
Online entropy manipulation: stochastic information gradient. IEEE Signal Process. Lett. 10(8): 242-245 (2003) - [c6]Robert Jenssen, Deniz Erdogmus, Kenneth E. Hild II, José Carlos Príncipe, Torbjørn Eltoft:
Information Force Clustering Using Directed Trees. EMMCVPR 2003: 68-82 - [c5]Dorothee E. Marossero, Deniz Erdogmus, Neil R. Euliano, José C. Príncipe, Kenneth E. Hild II:
Independent components analysis for fetal electrocardiogram extraction: a case for the data efficient Mermaid algorithm. NNSP 2003: 399-408 - 2002
- [j4]Deniz Erdogmus, Yadunandana N. Rao, Kenneth E. Hild II, José C. Príncipe:
Simultaneous Principal-Component Extraction with Application to Adaptive Blind Multiuser Detection. EURASIP J. Adv. Signal Process. 2002(12): 1473-1484 (2002) - [j3]Deniz Erdogmus, Kenneth E. Hild II, José Carlos Príncipe:
Blind source separation using Renyi's -marginal entropies. Neurocomputing 49(1-4): 25-38 (2002) - [j2]Deniz Erdogmus, José Carlos Príncipe, Kenneth E. Hild II:
Beyond second-order statistics for learning: A pairwise interaction model for entropy estimation. Nat. Comput. 1(1): 85-108 (2002) - [c4]Deniz Erdogmus, Kenneth E. Hild II, José C. Príncipe, Luis Vielva:
Blind separation of uncorrelated sources via principal component analysis of observations for a symmetric mixing matrix. EUSIPCO 2002: 1-4 - [c3]Kenneth E. Hild II, Deniz Erdogmus, José C. Príncipe:
Blind source separation of time-varying instantaneous mixtures using an on-line algorithm. ICASSP 2002: 993-996 - [c2]Deniz Erdogmus, Yadunandana N. Rao, José C. Príncipe, Jing Zhao, Kenneth E. Hild II:
Simultaneous extraction of Principal Components using givens rotations and output variances. ICASSP 2002: 1069-1072 - [c1]Deniz Erdogmus, José C. Príncipe, Kenneth E. Hild II:
Do Hebbian synapses estimate entropy? NNSP 2002: 199-208 - 2001
- [j1]Kenneth E. Hild II, Deniz Erdogmus, José C. Príncipe:
Blind source separation using Renyi's mutual information. IEEE Signal Process. Lett. 8(6): 174-176 (2001)
Coauthor Index
aka: José Carlos Príncipe
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint