Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Bilmes, J. A., & Kirchhoff K. (2003).  Factored Language Models and Generalized Parallel Backoff. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2003). 1.
Su, H., & Wegmann S. (2016).  Factor analysis based speaker verification using ASR. Proceedings of Interspeech 2016.
Fromherz, T. (1998).  Face Recognition: a Summary of 1995 - 1997.
Casado, M., Koponen T., Shenker S. J., & Tootoonchian A. (2012).  Fabric: A Retrospective on Evolving SDN. 85-90.
E
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service.
Floyd, S., Mahdavi J., Mathis M., & Podolsky M.. (2000).  An Extension to the Selective Acknowledgement (SACK) Option for TCP.
Pfaff, B., Pettit J., Amidon K., Casado M., Koponen T., & Shenker S. J. (2009).  Extending Networking into the Virtualization Layer. 1-6.
Widmer, J., & Handley M. (2001).  Extending Equation-Based Congestion Control to Multicast Applications. Proceedings of ACM SIGCOMM 2001.
Bailey, D. R., Chang N., Narayanan S., & Feldman J. (1998).  Extending Embodied Lexical Development. Proceedings of 20th Cognitive Science Society Conference. 84-90.
Shastri, L. (2000).  An Extended Local Connectionist Manifesto: Embracing Relational and Procedural Knowledge. Behavioral and Brain Sciences. 23(4), 492-493.
Shastri, L. (2000).  An Extended Local Connectionist Manifesto: Embracing Relational and Procedural Knowledge.
Hasegawa, Y., Lee-Goldman R., Ohara K. Hirose, Fujii S., & Fillmore C. J. (2010).  On Expressing Measurement and Comparison in Japanese and English. 169-198.
Grigoriev, D. Yu., Karpinski M., & Yao A. C. (1995).  An Exponential Lower Bound on the Size of Algebraic Decision Trees for MAX.
Amann, J., & Sommer R. (2016).  Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement. Proceedings of Passive and Active Measurement Conference (PAM).
Lee, Y., Avižienis R., Bishara A.., Xia R.., Lockhart D.., Batten C., et al. (2011).  Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators. 129-140.
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Knox, M. Tai, Mirghafori N., & Friedland G. (2013).  Exploring Methods of Improving Speaker Accuracy for Speaker Diarization.
de Melo, G. (2012).  Exploiting Web Data Sources for Advanced NLP.
Bertasius, G., Yu S. X., & Shi J. (2016).  Exploiting Visual-Spatial First-Person Co-Occurrence for Action-Object Detection without Labels.
Vergyri, D., Stolcke A., & Tur G. (2009).  Exploiting User Feedback for Language Model Adaptation in Meeting Recognition. 4737-4740.
Kumar, A., Paxson V., & Weaver N. (2005).  Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event. Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 351-364.
Radoslavov, P., Estrin D., & Govindan R. (1999).  Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.

Pages