Publications

Found 62 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is W  [Clear All Filters]
Conference Paper
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Song, H. Oh, Lee Y. Jae, Jegelka S., & Darrell T. (2014).  Weakly-Supervised Discovery of Visual Pattern Configurations.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. J. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Al-Qudah, Z., Rabinovich M., & Allman M. (2010).  Web Timeouts and Their Implications.
Bansal, M., & Klein D. (2011).  Web-Scale Features for Full-Scale Parsing. 693-702.
Ellis, D. P. W. (1997).  The Weft: A Representation for Periodic Sounds. The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997). 2, 1307-1310.
Berenbrink, P., & Sauerwald T. (2009).  The Weighted Coupon Collector's Problem and Applications. 449-458.
Yang, J., Chow Y-L., Re C., & Mahoney M. (2015).  Weighted SGD for ℓp Regression with Randomized Preconditioning. Proceedings of the 27th Annual SODA Conference. 558-569.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
Allman, M. (2008).  What Ought a Program Committee to Do?.
Elizalde, B. Martinez, Friedland G., & Ni K. (2013).  What You Hear Is What You Get: Audio-Based Video Content Analysis.
Kulis, B., Saenko K., & Darrell T. (2011).  What You Saw is Not What You Get: Domain Adaptation Using Asymmetric Kernel Transforms. 1785-1792.
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.
Faria, A., & Morgan N. (2008).  When a Mismatch Can Be Good: Large Vocabulary Speech Recognition Trained with Idealized Tandem Features. 1574-1577.
Marczak, B., Scott-Railton J., Marquis-Boire M., & Paxson V. (2014).  When Governments Hack Opponents: A Look at Actors and Technology.
Knox, M. Tai, Mirghafori N., & Friedland G. (2012).  Where did I go Wrong?: Identifying Troublesome Segments for Speaker Diarization Systems.
Bryant, J., Chang N., Porzel R., & Sanders K. (2001).  Where is natural language understanding? Toward context-dependent utterance interpretation. Proceedings of the 7th Annual Conference on Architectures and Mechanisms for Language Processing AMLaP.
Greenberg, S. (2001).  Whither Speech Technology? - A Twenty-First Century Perspective. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Frampton, M., Fernández R.., Ehlen P.., C. Christoudias M., Darrell T., & Peters S. (2009).  Who is "You"? Combining Linguistic and Gaze Features to Resolve Second-Person References in Dialogue. 273-281.
Parton, K., McKeown K. R., Coyne B., Diab M. T., Grishman R., Hakkani-Tür D., et al. (2009).  Who, What, When, Where, Why? Comparing Multiple Approaches to the Cross-Lingual 5W Task. 423-431.
Gilbert, A. L., Regier T., Kay P., & Ivry R. B. (2006).  Whorf Hypothesis Is Supported in the Right Visual Field but Not The Left. Proceedings of the National Academy of Sciences of the United States of America. 103(2), 489-494.
Mirghafori, N., Fosler-Lussier E., & Morgan N. (1995).  Why Is ASR Harder For Fast Speech And What Can We Do About It?. IEEE Snowbird Workshop '95.
Ananthanarayanan, G., Ghodsi A., Shenker S. J., & Stoica I. (2012).  Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly. 1-6.

Pages