Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
Janin, A., Baron D., Edwards J., Ellis D. P. W., Gelbart D., Morgan N., et al. (2003).  The ICSI Meeting Corpus. Proceedings of ICASSP-2003.
Janin, A. (2004).  Speech recognition on vector architectures.
Janin, A., Gottlieb L., & Friedland G. (2010).  Joke-O-Mat HD: Browsing Sitcoms with Human Derived Transcripts. 1591-1594.
Janin, A., Stolcke A., Anguera X., Boakye K., etin Ö. Ç., Frankel J., et al. (2006).  The ICSI-SRI Spring 2006 Meeting Recognition System.
Janin, A., Ang J., Bhagat S., Dhillon R., Edwards J., Macías-Guarasa J., et al. (2004).  The ICSI Meeting Project: Resources and Research. Proceedings of the ICASSP 2004 Meeting Recognition Workshop.
Janin, A. (2001).  Meeting Recorder. Proceedings of the Applied Voice Input/Output Society.
Jamin, S., Shenker S. J., & Danzig P. B. (1997).  Comparison of Measurement-Based Admission Control Algorithms for Controlled-Load Service. Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 3, 973-980.
Jamin, S., Danzig P. B., Shenker S. J., & Zhang L. (1997).  A Measurement-Based Admission Control Algorithm for Integrated Services Packet Network. IEEE/ACM Transactions on Networking. 5(1), 56-70.
Jamin, S., Shenker S. J., Zhang L., & Clark D. D. (1992).  An Admission Control Algorithm for Predictive Real-Time Service (Extended Abstract). Proceedings of the Third International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV). 349-356.
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Jain, P., Kulis B., & Dhillon I. (2010).  Inductive Regularized Learning of Kernel Functions. 946-954.
Jähnichen, S., Gabriel R., Weber M., & Anlauff M. (1989).  Supporting Formal Program Developments: the DEVA Environment.
[Anonymous] (1999).  Connectionist Symbol Processing: Dead or Alive?. (Jagota, A.., Plate T.., Shastri L., & Sun R.., Ed.).2, 1-40.
Jacobsen, H-A., & Voisard A. (1998).  CORBA-Based Interoperable Geographic Information Systems.
I
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Fast Semidifferential-based Submodular Function Optimization. 28(3), 855-863.
Iyer, A. Pamanabha, Panda A., Chowdhury M., Akella A., Shenker S. J., & Stoica I. (2018).  Monarch: Gaining Command on Geo-Distributed Graph Analytics.. Proceedings of HotCloud 2018.
Iyer, A. Padmanabha, Panda A., Venkataraman S., Chowdhury M., Akella A., Shenker S. J., et al. (2018).  Bridging the GAP: towards approximate graph analytics. Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Curvature and Optimal Algorithms for Learning and Minimizing Submodular Functions.
Ivantysynova, L., Klafft M., Ziekow H., Günther O., & Kara S. (2009).  RFID in Manufacturing: The Investment Decision.
Ishac, J., & Allman M. (2001).  On the Performance of TCP Spoofing in Satellite Networks.
Isenburg, M. (1996).  Transmission of Multimedia Data Over Lossy Networks (Thesis).
Irani, S. (1990).  Two Results on the List Update Problem.
Irani, S. (1992).  Competitive On-line Algorithms for Paging and Graph Coloring.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
Imseng, D., & Friedland G. (2010).  Tuning-Robust Initialization Methods for Speaker Diarization. IEEE Transactions on Audio. 18(8), 2028-2037.

Pages