{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:23:17Z","timestamp":1740201797096,"version":"3.37.3"},"reference-count":49,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Connection Science"],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1080\/09540090903431673","type":"journal-article","created":{"date-parts":[[2010,5,28]],"date-time":"2010-05-28T12:21:55Z","timestamp":1275049315000},"page":"157-175","source":"Crossref","is-referenced-by-count":1,"title":["An attention-gating recurrent working memory architecture for emergent speech representation"],"prefix":"10.1080","volume":"22","author":[{"given":"Mark","family":"Elshaw","sequence":"first","affiliation":[]},{"given":"Roger K.","family":"Moore","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Klein","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","first-page":"35","volume":"12","author":"Arons B.","year":"1992","journal-title":"Journal of the American Voice I\/O Society"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1038\/nrn1201"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1126\/science.1736359"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/S0079-7421(08)60452-1"},{"key":"CIT0005","first-page":"835","volume":"13","author":"Barto A.","year":"1983","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1126\/science.279.5355.1347"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/S0896-6273(02)00963-7"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(99)00046-5"},{"volume-title":"Advances in Neural Information Processing Systems 7","year":"1995","author":"Doya K.","key":"CIT0009"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1402_1"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.conb.2005.10.006"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1002\/hbm.10157"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroscience.2005.04.067"},{"volume-title":"Speech Synthesis and Recognition","year":"2001","author":"Holmes J.","key":"CIT0014"},{"key":"CIT0015","first-page":"249","volume-title":"Models of Information Processing in the Basal Ganglia","author":"Houke J. C.","year":"1995"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(02)00047-3"},{"key":"CIT0017","volume-title":"Speech and Language: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition","author":"Jurafsky D.","year":"2008","edition":"2"},{"key":"CIT0018","doi-asserted-by":"crossref","unstructured":"Karlof, C. and Wagner, D. 2003. \u201cHidden Markov Model Cryptanalysis\u201d. University of California, Berkeley, Computer Science Division (EECS). Technical Report UCB\/\/CSD-03-1244","DOI":"10.1007\/978-3-540-45238-6_3"},{"key":"CIT0019","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1177\/105971230501300205","volume":"13","author":"Khamassi M.","year":"2005","journal-title":"Adaptive Behavior, Special Issue Towards Artificial Rodents"},{"key":"CIT0020","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97966-8","volume-title":"Self-organizing Maps","author":"Kohonen T.","year":"1997"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1038\/nrn1533"},{"key":"CIT0022","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/S0095-4470(19)31326-9","volume":"21","author":"Kuhl P.","year":"1993","journal-title":"Journal Phonetics"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2007.2154"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.neuro.30.051606.094321"},{"key":"CIT0025","doi-asserted-by":"crossref","unstructured":"Lippmann, R. and Carlson, B. Using Missing Feature Theory to Actively Select Features for Robust Speech Recognition with Interruptions, Filtering and Noise. Proceedings of EUROSPEECH. pp.KN37\u2013KN40. Rhodes","DOI":"10.21437\/Eurospeech.1997-6"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2005.07.005"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1207\/s15327078in1003_3"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1162\/089976606775093909"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ne.13.030190.000325"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/0166-2236(87)90116-0"},{"volume-title":"Models of Working Memory: Mechanisms of Active Maintenance and Executive Control","year":"1999","author":"Pritil S.","key":"CIT0031"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1006\/nimg.1996.0067"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X9900182X"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-6613(00)01803-9"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/S0301-0082(02)00014-X"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511615528"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3940(99)00724-7"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/39546"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1093\/cercor\/10.3.272"},{"key":"CIT0041","unstructured":"Seltzer, M. (1999), SPHINX III Signal Processing Front End Specification\u2019, Technical Report, Carnegie Mellon University, Pittsburgh, CMU Speech Group"},{"key":"CIT0042","unstructured":"Shah, J., Iyer, A., Smolenski, B. and Yantorno, R. Robust Voiced\/Unvoiced Classification using Novel Features and Gaussian Mixture Model. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). Montreal. pp.619\u2013623."},{"key":"CIT0043","doi-asserted-by":"crossref","unstructured":"Shin, W. H., Lee, B.S., Lee, Y.K. and Lee, J.S. Speech\/Non-speech Classification using Multiple Features for Robust Endpoint Detection. IEEE International Conference on Acoustics, 3. pp.1399\u20131402.","DOI":"10.1109\/ICASSP.2000.861845"},{"key":"CIT0044","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4632.001.0001","volume-title":"The Mind Within the Net: Models of Learning, Thinking and Acting","author":"Spitzer M.","year":"1999"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1162\/089976601300014376"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(02)00072-2"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2004.03.012"},{"key":"CIT0048","first-page":"285","volume-title":"Phonological Development: Models, Research, and Implications","author":"Werker J.","year":"1992"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2005.09.003"}],"container-title":["Connection Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09540090903431673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:08:55Z","timestamp":1740128935000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09540090903431673"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,6]]}},"alternative-id":["10.1080\/09540090903431673"],"URL":"https:\/\/doi.org\/10.1080\/09540090903431673","relation":{},"ISSN":["0954-0091","1360-0494"],"issn-type":[{"type":"print","value":"0954-0091"},{"type":"electronic","value":"1360-0494"}],"subject":[],"published":{"date-parts":[[2010,6]]}}}