Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Levit, M., Boschee E.., & Freedman M. (2007).  Selecting On-topic Sentences from Natural Language Corpora. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 2793-2796.
Utans, J., & Moody J. (1991).  Selecting Neural Network Architecture via the Prediction Risk: Application to Corporate Bond Rating Prediction. Proceedings of the First International Conference on Artificial Intelligence Applications on Wall Street.
Utans, J., Moody J., Rehfuss S., & Siegelmann H.. (1995).  Selecting Input Variables via Sensitivity Analysis: Application to Predicting the U.S. Business Cycle. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
[Anonymous] (2009).  Selected Papers from the Third IEEE International Conference on Semantic Computing (ICSC2009). (Friedland, G., & Chen S-C., Ed.).International Journal of Semantic Computing. 3,
[Anonymous] (2010).  Selected Papers from the 11th IEEE International Symposium on Multimedia (ISM2009). (Friedland, G., & Shyu M.-L.., Ed.).International Journal of Semantic Computing. 4,
Catanzaro, B., Kamil S., Lee Y., Asanović K., Demmel J., Keutzer K., et al. (2009).  SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization.
Hwang, J-J., Yu S. X., Shi J., Collins M. D., Yang T-J., Zhang X., et al. (2019).  SegSort: Segmentation by Discriminative Sorting of Segments. Proceedings of the International Conference on Computer Vision.
Elizalde, B. Martinez, Raj B., Friedland G., Nolazco J., & Garcia L. (2012).  Segment and Conquer.
Shastri, L., & Wendelken C. (2000).  Seeking coherent explanations - a fusion of structured connectionism, temporal synchrony, and evidential reasoning. Proceedings of the 22nd Annual Conference of the Cognitive Science Society (CogSci 2000).
Fillmore, C. J., Baker C. F., & Sato H. (2002).  Seeing Arguments Through Transparent Structures. Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002). 787-791.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols. 55(1-3), 57-68.
Schryen, G. (2009).  Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.
Unger, H. (1998).  A Security Mechanism for the Resource Management in a Web Operating System.
Galera, F.. J., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Security Extensions to MMARP Through Cryptographically Generated Addresses. Lecture Notes on Informatics. P-68,
Fabian, B., & Günther O. (2009).  Security Challenges of the EPC Network. 121-125.
Oppliger, R., Gupta A., Moran M., & Bettati R. (1995).  A Security Architecture for Tenet Scheme 2.
Koskela, J.., Weaver N., Gurtov A., & Allman M. (2009).  Securing Web Content. 7-12.
Mittal, P., Paxson V., Sommer R., & Winterrowd M. (2009).  Securing Mediated Trace Access Using Black-Box Permutation Analysis.
Binder, W.., & Roth V. (2002).  Secure Mobile Agent Systems Using Java - Where Are We Heading?. Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS).
Rojas, R. (1993).  Second Order Backpropagation - Efficient Computation of the Hessian Matrix for Neural Networks.
de Melo, G., & Hose K. (2012).  Searching the Web of Data (Tutorial Abstract).
Karp, R. M., & Pearl J.. (1983).  Searching for an optimal path in a tree with random costs. Artificial Intelligence. 21(1-2), 99-116.
Beamer, S., Asanović K., & Patterson D. (2011).  Searching for a Parent Instead of Fighting Over Children: A Fast Breadth-First Search Implementation for Graph500.
Chandrayana, K.., Karp R. M., Roughan M.., Sen S.., & Zhang Y. (2004).  Search Strategies in Inter-Domain Traffic Engineering.

Pages