Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Wu, S-L., Kingsbury B., Morgan N., & Greenberg S. (1998).  Performance Improvements Through Combining Phone- and Syllable-Length Information in Automatic Speech Recognition. Proceedings of the Fifth International Conference on Spoken Language Processing (ICSLP'98). 854-857.
Allman, M. (2003).  On the Performance of Middleboxes. ACM SIGCOMM/Usenix Internet Measurement Conference.
Ishac, J., & Allman M. (2001).  On the Performance of TCP Spoofing in Satellite Networks.
Kruse, H., Ostermann S., & Allman M. (2000).  On the Performance of TCP-Based Data Transfers on a Faded Ka-Band Satellite Link. Proceedings of the Sixth Ka-Band Utilization Conference.
Unger, H., & Daene B. (1995).  Performance Oriented Specification for Heterogenous Parallel Systems Using Graphical Based Specifications.
Sargent, M., & Allman M. (2014).  Performance Within A Fiber-To-The-Home Network. ACM SIGCOMM Computer Communication Review. 44(3), 23-30.
Klas, W., & Turau V. (1992).  Persistence in the Object-Oriented Database Programming Language VML.
Lei, H., Choi J., Janin A., & Friedland G. (2011).  Persona Linking: Matching Uploaders of Videos Across Accounts.
Lei, H., Choi J., Janin A., & Friedland G. (2010).  Persona Linking: Matching Uploaders of Videos Across Accounts.
Allman, M. (2007).  Personal Namespaces. Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
Garg, N. P., & Weber I.. (2008).  Personalized, Interactive Tag Recommendation for Flickr. 67-74.
Malkin, N., Mathur A., Harbach M., & Egelman S. (2017).  Personalized Security Messaging: Nudges for Compliance with Browser Warnings. Proceedings of the European Workshop on Usable Security (EuroUSEC '17).
Moody, J. (1987).  Perspectives on Associative Memories. Proceedings of the IEEE First International Conference on Neural Networks.
Richter, M. M. (1997).  Perspectives on the Integration of Fuzzy and Case-Based Reasoning Systems.
Codenotti, B., Manzini G., Margara L., & Resta G. (1993).  Perturbation: An Efficient Technique for the Solution of Very Large Instances of the Euclidean TSP.
Lamparter, B., Albanese A., Kalfane M., & Luby M. (1995).  Pet - Priority Encoded Transmission.
Sokol, J., & Tutsch D. (2001).  Petri Net Based Performance Evaluation of USAIA's Bandwidth Partitioning for the Wireless Cell Level.
Heiner, M. (1992).  Petri Net Based Software Validation: Prospects and Limitations.
Alizadeh, M., Yang S., Sharif M., Katti S., McKeown N., Prabhakar B., et al. (2013).  pFabric: Minimal Near-Optimal Datacenter Transport. 435-446.
McCoy, D., Pitsillidis A., Jordan G., Weaver N., Kreibich C., Krebs B., et al. (2012).  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Gale, D.., & Karp R. M. (1972).  A Phenomenon in the Theory of Sorting. Journal of Computer and System Sciences. 6(2), 103-115.
Bilmes, J. A., Asanović K., Chin C-W., & Demmel J. (1998).  The PHiPAC v1.0 Matrix-Multiply Distribution..
Chang, S-Y., Edwards E., Morgan N., Ellis D. P. W., Mesgarani N., & Chang E. (2015).  Phone Recognition for Mixed Speech Signals: Comparison of Human Auditory Cortex and Machine Performance.
Stoll, L. (2006).  Phonetic- and Speaker-Discriminant Features for Speaker Recognition.
Bourlard, H., Cohen M., Kohn P., Morgan N., & Wooters C. (1991).  Phonetic Context in Hybrid HMM/MLP Continuous Speech Recognition. Proceedings of the Second European Conference on Speech Communication and Technology (Eurospeech '91). 109-112.

Pages