Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
N
Lawrence, N. D., & Urtasun R. (2009).  Non-Linear Matrix Factorization.
N. Erichson, B., Lim S. Hoe, Utrera F., Xu W., Cao Z., & Mahoney M. (2022).  NoisyMix: Boosting Robustness by Combining Data Augmentations, Stability Training, and Noise Injections. arXiv.
Lim, S. Hoe, N. Erichson B., Hodgkinson L., & Mahoney M. (2021).  Noisy Recurrent Neural Networks. Advances in Neural Information Processing Systems Conference. 34,
Plaskota, L. (1995).  Noisy Information and Computational Complexity: A Short Survey.
Karp, R. M., & Kleinberg R.. (2007).  Noisy Binary Search. Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2007). 881-890.
N. Erichson, B., Taylor D., Wu Q., & Mahoney M. (2021).  Noise-Response Analysis of Deep Neural Networks Quantifies Robustness and Fingerprints Structural Malware. Proceedings of the 2021 SIAM International Conference on Data Mining (SDM). 100-108.
Graciarena, M., Kajarekar S., Stolcke A., & Shriberg E. (2007).  Noise Robust Speaker Identification for Spontaneous Arabic Speech. Proceedings of the 32nd IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 245-248.
Hermansky, H., & Morgan N. (1996).  Noise resistant auditory model for parametrization of speech.
Eisenhofer, T., Quiring E., Möller J., Riepel D., Holz T., & Rieck K. (In Press).  No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. Proceedings of 32nd USENIX Security Symposium.
Amann, J., Sommer R., Vallentin M., & Hall S. (2013).  No Attack Necessary: The Surprising Dynamics of SSL Trust Relationships.
Lampikoski, T.. (2009).  Nintendo Yes Wii Can.
Vallentin, M., Sommer R., Lee J., Leres C.., Paxson V., & Tierney B. (2007).  The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Shenker S. J., et al. (2009).  Nexus: A Common Substrate for Cluster Computing.
Floyd, S., & Henderson T. (1999).  The NewReno Modification to TCP's Fast Recovery Algorithm.
Zhou, K., Mo L., Kay P., Kwok V.. P. Y., Ip T. N. M., & Tan L. Hai (2010).  Newly Trained Lexical Categories Produce Lateralized Categorical Perception of Color. 107(22), 9974-9978.
Ranganath, C., Shastri L., & D'Esposito M. (2002).  A New View of the Medial Temporal Lobes and the Structure of Memory.
Eddy, W. M., Ostermann S., & Allman M. (2004).  New Techniques for Making Transport Protocols Robust to Corruption-Based Loss. ACM SIGCOMM Computer Communication Review. 34(5), 75-88.
Mahoney, M. (2014).  A New Spin on an Old Algorithm: Technical Perspective on "Communication Costs of Strassen's Matrix Multiplication". Communications of the ACM. 57(2), 106.
Adami, A., Kajarekar S., & Hermansky H. (2002).  A New Speaker Change Detection Method for Two-Speaker Segmentation. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  A New Perspective on Efficient and Dependable Vehicle Routing. 388-391.
Gergen, S., Zeiler S., Abdelaziz A. Hussen, & Kolossa D. (2016).  New Insights into Turbo-Decoding-Based AVSR with Dynamic Stream Weights. Proceedings of ITG Conference on Speech Communication.
Regli, W., Rossignac J., Shapiro V., & Srinivasan V. (2016).  The new frontiers in computational modeling of material structures. Computer-Aided Design. 77, 73-85.
Lönneker-Rodman, B., Baker C. F., & Hong J. (2008).  The New FrameNet Desktop: A Usage Scenario for Slovenian. 147-154.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  A New Communications API.
Academies, N. Research C. (2010).  A New Biology for the 21st Century.

Pages