Publications

Found 99 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2015).  Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR. abs/1510.07338,
Fillmore, C. J., Johnson C. R., & Petruck M. R. L. (2003).  Background to Framenet. International Journal of Lexicography. 235-250.
Ji, G., & Bilmes J. A. (2006).  Backoff Model Training Using Partially Observed Data: Application to Dialog Act Tagging. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2006). 280-287.
Portnoff, R. S., Huang D. Yuxing, Doerfler P., Afroz S., & McCoy D. (2017).  Backpage and Bitcoin: Uncovering Human Traffickers. Proceedings of KDD 2017.
Seidel, R.. (1992).  Backwards Analysis of Randomized Geometric Algorithms.
Feldman, J. (1975).  Bad-Mouthing Frames.
Popa, L., Rostami A.., Karp R. M., Papadimitriou C. H., & Stoica I. (2007).  Balancing the Traffic Load in Wireless Networks with Curveball Routing. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007).
Kadanoff, L. P., & Shenker S. (1981).  Band to Band Hopping in One-Dimensional Maps. Journal of Physics A: Mathematical and General. 14(2), L23-26.
Buttyan, L.., Dora L.., Felegyhazi M., & Vajda I.. (2010).  Barter Trade Improves Message Delivery in Opportunistic Networks. Ad Hoc Networks. 8(1), 1-14.
Zimmermann, M., Liu Y., Shriberg E., & Stolcke A. (2005).  A* Based Joint Segmentation and Classification of Dialog Acts in Multi-Party Meetings. Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2005). 215-219.
Xing, E. P., Sharan R., & Jordan M. I. (2004).  Bayesian Haplotype Inference via the Dirichlet Process. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNP and Haplotypes. 99-112.
Xing, E. P., Sharan R., & Jordan M. I. (2004).  Bayesian Haplotype Inference via the Dirichlet Process. Proceedings of ICML 2004.
Fonseca, R., Ratnasamy S., Zhao J., Ee C. Tien, Culler D. E., Shenker S., et al. (2005).  Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 329-342.
Peters, N., & Schmeder A. W. (2011).  Beamforming using a spherical microphone array based on legacy microphone characteristics.
Haban, D., & Wybranietz D. (1989).  Behavior and Performance Analysis of Distributed Systems Using a Hybrid.
Egelman, S., Harbach M., & Peer E. (2016).  Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Torrent, T. Timponi, & Ellsworth M. (2013).  Behind the Labels: Criteria for Defining Analytical Categories in FrameNet Brazil. 17(1), 44-65.
Lässig, J., & Sudholt D. (2010).  The Benefit of Migration in Parallel Evolutionary Algorithms. 1105-1112.
Fillmore, C. J. (2013).  Berkeley Construction Grammar.
Baker, C. F., Fillmore C. J., & Lowe J.. B. (1998).  The Berkeley FrameNet Project. Proceedings of the Joint Conference of the International Committee on Computational Linguistics and the Association for Computational Linguistics (COLING-ACL).
Jurafsky, D., Wooters C., Tajchman G., Segal J., Stolcke A., Fosler-Lussier E., et al. (1994).  The Berkeley Restaurant Project. Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94). 2139-2142.
Wooters, C., Jurafsky D., Tajchman G., & Morgan N. (1993).  The Berkeley Restaurant Project. Proceedings of the Speech Research Symposium XIII. 119-128.
[Anonymous] (2009).  Best Papers from the 10th IEEE International Symposium on Multimedia. (Friedland, G., & Chen S-C., Ed.).International Journal of Semantic Computing. 3,
[Anonymous] (2008).  Best Papers from the Second IEEE International Conference on Semantic Computing (IJSC). (Friedland, G., & Martell C.., Ed.).International Journal of Semantic Computing. 2,
Breslau, L., & Shenker S. (1998).  Best-Effort versus Reservations: A Simple Comparative Analysis. ACM Computer Communication Review. 28, 3-16.

Pages