Jelinek, Frederick; Bahl, Lalit R.; Mercer, Robert L. (May 1975). "Design of a linguistic statistical decoder for the recognition of continuous speech". IEEE Transactions on Information Theory. 21 (3): 250–6. doi:10.1109/tit.1975.1055384.
Bishop, Martin J.; Thompson, Elizabeth A. (20 July 1986). "Maximum likelihood alignment of DNA sequences". Journal of Molecular Biology. 190 (2): 159–65. doi:10.1016/0022-2836(86)90289-5. PMID3641921.
Rabiner, Lawrence (February 1989). "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition". Proceedings of the IEEE. 77 (2): 257–286. CiteSeerX10.1.1.381.3454. doi:10.1109/5.18626. S2CID13618539.
Brumley, Bob; Hakala, Risto (2009). "Cache-Timing Template Attacks". Advances in Cryptology – ASIACRYPT 2009. Lecture Notes in Computer Science. Vol. 5912. pp. 667–684. doi:10.1007/978-3-642-10366-7_39. ISBN978-3-642-10365-0.
Bishop, Martin J.; Thompson, Elizabeth A. (20 July 1986). "Maximum likelihood alignment of DNA sequences". Journal of Molecular Biology. 190 (2): 159–65. doi:10.1016/0022-2836(86)90289-5. PMID3641921.
Rabiner, Lawrence (February 1989). "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition". Proceedings of the IEEE. 77 (2): 257–286. CiteSeerX10.1.1.381.3454. doi:10.1109/5.18626. S2CID13618539.
Rabiner, Lawrence (February 1989). "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition". Proceedings of the IEEE. 77 (2): 257–286. CiteSeerX10.1.1.381.3454. doi:10.1109/5.18626. S2CID13618539.