Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Journal Article
Liu, Y., Chawla N.. V., Harper M. P., Shriberg E., & Stolcke A. (2006).  A Study in Machine Learning from Imbalanced Data for Sentence Boundary Detection in Speech. Computer Speech and Language. 20(4), 468-494.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction. IEEE Transactions on Multimedia. 17(9), 1550-1561.
Roosta-Khorasani, F.., & Mahoney M. (2019).  Sub-Sampled Newton Methods. Mathematical Programming. 293-326.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1990).  Subtree isomorphism is in random NC. Discrete Applied Mathematics. 29(1), 35-62.
Gilbert, A. L., Regier T., Kay P., & Ivry R. B. (2008).  Support for Lateralization of the Whorf Effect Beyond the Realm of Color Discrimination. Brain and Language. 105(2), 91-98.
Arai, T., Pavel M., Hermansky H., & Avendano C. (1999).  Syllable Intelligibility for Temporally-Filtered LPC Cepstral Trajectories. Journal of the Acoustical Society of America. 105(5), 2783-2791.
Liu, X., Hieronymus J., Gales M.. J. F., & Woodland P. (2013).  Syllable Models for Mandarin Speech Recognition: Exploiting Character Language Models. Journal of the Acoustical Society of America. 133(1), 519-528.
Floyd, S., & Jacobson V. (1994).  The Synchronization of Periodic Routing Messages. IEEE/ACM Transactions on Networking. 2(2), 122-136.
Feldman, J., & Biermann A. (1972).  On the Synthesis of Finite-State Machines from Samples of Their Behavior. IEEE Transactions on Computers. C-21(6), 592-596.
Peters, N., & Schmeder A. W. (2011).  Synthesizing classic recording microphones characteristics using a spherical microphone array. Journal of the Acoustical Society of America. 130(4), 2507.
Floyd, S. (1994).  TCP and Explicit Congestion Notification. ACM Computer Communication Review. 24(5), 10-23.
Allman, M. (1999).  TCP Byte Counting Refinements.
Bernd, J., Gordo B., Choi J., Morgan B., Henderson N., Egelman S., et al. (2015).  Teaching Privacy: Multimedia Making a Difference. IEEE MultiMedia. 12-19.
Moody, J., & Hendel R.. H. (1982).  Temperature Profiles Induced by a Scanning CW Laser Beam. 53(6), 4364-4371.
Shastri, L. (1996).  Temporal Synchrony, Dynamic Bindings, and SHRUTI -- a representational but non-classical model of reflexive reasoning. 19(2), 
Edmonds, J., & Karp R. M. (1972).  Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems. Journal of the Association for Computing Machinery. 19(2), 248-264.
McCauley, J., Panda A., Krishnamurthy A., & Shenker S. J. (2019).  Thoughts on Load Distribution and the Role of Programmable Switches. Newsletter of ACM SIGCOMM Computer Communication Review. 49(1), 18-23.
Allman, M. (2008).  Thoughts on Reviewing. ACM Computer Communication Review. 38(2), 47-50.
Wang, R., & Shapiro V. (2019).  Topological semantics for lumped parameter systems modeling. Advanced Engineering Informatics. 42,
Bruckner, S., Hüffner F., Karp R. M., Shamir R., & Sharan R. (2010).  Topology-Free Querying of Protein Interaction Networks. Journal of Computational Biology. 17(3), 237-252.
Bruckner, S., Hüffner F., Karp R. M., Shamir R., & Sharan R. (2009).  Torque: Topology-Free Querying of Protein Interaction Networks. Nucleic Acids Research. 37, 106-108.
Bruckner, S., Hüffner F., Karp R. M., Shamir R., & Sharan R. (2010).  Torque: Topology-Free Querying of Protein Interaction Networks. Journal of Computational Biology. 17(3), 237-252.
Pearce, P.., Ensafi R.., Li F.., Feamster N.., & Paxson V. (2018).   Toward Continual Measurement of Global Network-Level Censorship. Security and Privacy. 16(1), 
Tzeng, E., Devin C., Hoffman J., Finn C., Peng X., Levine S., et al. (2015).  Towards Adapting Deep Visuomotor Representations from Simulated to Real Environments. CoRR. abs/1511.07111,
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2004).  Towards Capturing Representative AS-Level Internet Topologies. Computer Networks. 44(6), 737-755.

Pages