Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Elizalde, B. Martinez, Raj B., Friedland G., Nolazco J., & Garcia L. (2012).  Segment and Conquer.
Hwang, J-J., Yu S. X., Shi J., Collins M. D., Yang T-J., Zhang X., et al. (2019).  SegSort: Segmentation by Discriminative Sorting of Segments. Proceedings of the International Conference on Computer Vision.
Catanzaro, B., Kamil S., Lee Y., Asanović K., Demmel J., Keutzer K., et al. (2009).  SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization.
[Anonymous] (2010).  Selected Papers from the 11th IEEE International Symposium on Multimedia (ISM2009). (Friedland, G., & Shyu M.-L.., Ed.).International Journal of Semantic Computing. 4,
[Anonymous] (2009).  Selected Papers from the Third IEEE International Conference on Semantic Computing (ICSC2009). (Friedland, G., & Chen S-C., Ed.).International Journal of Semantic Computing. 3,
Utans, J., Moody J., Rehfuss S., & Siegelmann H.. (1995).  Selecting Input Variables via Sensitivity Analysis: Application to Predicting the U.S. Business Cycle. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
Utans, J., & Moody J. (1991).  Selecting Neural Network Architecture via the Prediction Risk: Application to Corporate Bond Rating Prediction. Proceedings of the First International Conference on Artificial Intelligence Applications on Wall Street.
Levit, M., Boschee E.., & Freedman M. (2007).  Selecting On-topic Sentences from Natural Language Corpora. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 2793-2796.
Adler, M., Gemmell P., Harchol-Balter M., Karp R. M., & Kenyon C. (1994).  Selection in the presence of noise: the design of playoff systems. Proceedings of Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 564-572.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. J. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 117-130.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. J. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. ACM SIGCOMM Computer Communication Review. 32(4), 117-130.
Qiu, L., Yang Y. Richard, Zhang Y., & Shenker S. J. (2003).  On Selfish Routing in Internet-Like Environments. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM). 151-162.
Qiu, L., Yang Y. Richard, Zhang Y., & Shenker S. J. (2006).  On Selfish Routing in Internet-Like Environments. IEEE/ACM Transactions on Networking. 14(4), 725-738.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Willinger, W., Paxson V., & Taqqu M. S. (1998).  Self-similarity and Heavy Tails: Structural Modeling of Network Traffic.
Lässig, J., Satzger B., & Kramer O. (2011).  Self-Stabilization in Hierarchically Structured Energy Markets. Proceedings of the 8th International Conference on Information Technology: New Generations (ITNG 2011). 803-809.
Sauerwald, T., & Sudholt D. (2010).  A Self-Stabilizing Algorithm for Cut Problems in Synchronous Networks. Theoretical Computer Science. 411(14-15), 1599-1612.
Blum, M. E., Luby M., & Rubinfeld R. (1990).  Self-Testing/Correcting with Applications to Numerical Problems.
Blum, M. E., Luby M., & Rubinfeld R. (1991).  Self-Testing/Correcting with Applications to Numerical Problems (Revised Version).
Stoica, I., Zhang H., & Shenker S. J. (2002).  Self-Verifying CSFQ. Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 1, 21-30.
Bergen, B. K., & Chang N. (2001).  Semantic agreement and construal.
Zaslavsky, N., Regier T., Tishby N., & Kemp C. (2019).  Semantic categories of artifacts and animals reflect efficient coding. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
Friedland, G., & Choi J. (2012).  Semantic Computing and Privacy: A Case Study Using Inferred Geo-Location.
Friedland, G., & Choi J. (2011).  Semantic Computing and Privacy: A Case Study Using Inferred Geo-Location. International Journal of Semantic Computing. 5(1), 79-93.
Mohit, B., & Narayanan S. (2003).  Semantic Extraction with Wide-Coverage Lexical Resources. 64-66.

Pages