Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2013
Jia, Y., & Han M. (2013).  Category Independent Object-Level Saliency Detection.
Yu, S. X., & Lisin D. (2013).  Change Blindness Reveals Distinctive Featural Processing in Size, Color, and Orientation.
Allman, M. (2013).  On Changing the Culture of Empirical Internet Assessment. ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
Ghodsi, A., Zaharia M., Shenker S. J., & Stoica I. (2013).  Choosy: Max-Min Fair Sharing for Datacenter Jobs with Constraints. 365-378.
Narayanan, S. (2013).  A Cognitive Model of Scales.
Allman, M. (2013).  Comments on Bufferbloat. ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
Schilling, M., & Narayanan S. (2013).  Communicating with Executable Action Representations.
Jia, Y., Vinyals O., & Darrell T. (2013).  On Compact Codes for Spatially Pooled Features.
Tsai, T.. J., & Janin A. (2013).  Confidence-Based Scoring: A Useful Diagnostic Tool for Detection Tasks.
Lee, Y., Krashinsky R., Grover V., Keckler S. W., & Asanović K. (2013).  Convergence and Scalarization for Data-Parallel Architectures.
Souiai, M., Nieuwenhuis C., Strekalovskiy E., & Cremers D. (2013).  Convex Optimization for Scene Understanding.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Curvature and Optimal Algorithms for Learning and Minimizing Submodular Functions.
Vinyals, O., & Morgan N. (2013).  Deep vs. Wide: Depth on a Budget for Robust Speech Recognition.
Zhang, N., Farrell R., Iandola F., & Darrell T. (2013).  Deformable Part Descriptors for Fine-Grained Recognition and Attribute Prediction.
Batten, C., Joshi A., Stojanovic V., & Asanović K. (2013).  Designing Chip-Level Nanophotonic Interconnection Networks.
Javed, M., & Paxson V. (2013).  Detecting Stealthy, Distributed SSH Brute-Forcing.
Girshick, R., Song H. Oh, & Darrell T. (2013).  Discriminatively Activated Sparselets.
Beamer, S., Buluç A., Asanović K., & Patterson D. (2013).  Distributed Memory Breadth-First Search Revisited: Enabling Bottom-Up Search.
Ananthanarayanan, G., Ghodsi A., Shenker S. J., & Stoica I. (2013).  Effective Straggler Mitigation: Attack of the Clones. 185-198.
Hoffman, J., Rodner E., Donahue J., Darrell T., & Saenko K. (2013).  Efficient Learning of Domain-Invariant Image Representations.
Liu, J., Panda A., Singla A., P. Godfrey B., Schapira M., & Shenker S. J. (2013).  Ensuring Connectivity via Data Plane Mechanisms. 113-126.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2013).  Exploiting Innocuous Activity for Correlating Users Across Sites.
Knox, M. Tai, Mirghafori N., & Friedland G. (2013).  Exploring Methods of Improving Speaker Accuracy for Speaker Diarization.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Fast Semidifferential-based Submodular Function Optimization. 28(3), 855-863.
Graciarena, M., Alwan A., Ellis D. P. W., Franco H., Ferrer L., Hansen J. H. L., et al. (2013).  Feature Combination for Highly Channel-Degraded Speech Activity Detection.

Pages