Publications

Found 4161 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Leen, T. K., & Moody J. (1993).  Weight-Space Probability Densities and Equilibria in Stochastic Learning.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Fillmore, L. Wong, & Fillmore C. J. (2013).  What Does Text Complexity Mean for English Learners and Language Minority Students?. 1-11.
Moody, J., & Wu L. (1997).  What is the True Price? -- State Space Models for High Frequency FX Rates.
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
Feldman, J. (1989).  What Lies Ahead.
Allman, M. (2008).  What Ought a Program Committee to Do?.
Scott, C., Wundsam A., Zarifis K., & Shenker S. (2012).  What, Where, and When: Software Fault Localization for SDN.
Elizalde, B. Martinez, Friedland G., & Ni K. (2013).  What You Hear Is What You Get: Audio-Based Video Content Analysis.
Kulis, B., Saenko K., & Darrell T. (2011).  What You Saw is Not What You Get: Domain Adaptation Using Asymmetric Kernel Transforms. 1785-1792.
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.
Morgan, N. (2002).  What's New in Government-Sponsored Speech Recognition Research. Speech Technology Magazine. 7,
Faria, A., & Morgan N. (2008).  When a Mismatch Can Be Good: Large Vocabulary Speech Recognition Trained with Idealized Tandem Features. 1574-1577.
Marczak, B., Scott-Railton J., Marquis-Boire M., & Paxson V. (2014).  When Governments Hack Opponents: A Look at Actors and Technology.
Frieze, A., Karp R. M., & Reed B. (1992).  When is the Assignment Bound Tight for the Asymmetric Traveling-Salesman Problem?.
Frieze, A., Karp R. M., & Reed B. (1995).  When is the assignment bound tight for the asymmetric traveling-salesman problem?. SIAM Journal on Computing. 24(3), 484-493.
Bailey, D. R. (1997).  When Push Comes to Shove: A Computational Model of the Role of Motor Control in the Acquisition of Action Verbs.
Bailey, D. R. (1997).  When Push Comes to Shove: A Computational Model of the Role of Motor Control in the Acquisition of Action Verbs.
Friedrich, T., & Neumann F. (2010).  When to Use Bit-Wise Neutrality. Natural Computing. 9(1), 283-294.
Knox, M. Tai, Mirghafori N., & Friedland G. (2012).  Where did I go Wrong?: Identifying Troublesome Segments for Speaker Diarization Systems.
Bryant, J., Chang N., Porzel R., & Sanders K. (2001).  Where is natural language understanding? Toward context-dependent utterance interpretation. Proceedings of the 7th Annual Conference on Architectures and Mechanisms for Language Processing AMLaP.
Willinger, W., & Paxson V. (1998).  Where Mathematics Meets the Internet. Notices of the American Mathematical Society. 45(8), 961-970.
Choi, J., Larson M., Li X., Friedland G., & Hanjalic A. (2016).  Where to be wary: The impact of widespread photo-taking and image enhancement practices on users' geo-privacy.
Greenberg, S. (2001).  Whither Speech Technology? - A Twenty-First Century Perspective. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Frampton, M., Fernández R.., Ehlen P.., C. Christoudias M., Darrell T., & Peters S. (2009).  Who is "You"? Combining Linguistic and Gaze Features to Resolve Second-Person References in Dialogue. 273-281.

Pages