Publications

Found 223 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Hermelin, D., Mnich M., van Leeuwen E. J., & Woeginger G. (2011).  Domination When the Stars Are Out. 432-473.
Hernek, D. (1995).  Random Walks on Colored Graphs: Analysis and Applications.
Herrtwich, R. Guido (1990).  Time Dated Streams in Continuous-Media Systems.
Herrtwich, R. Guido (1990).  An Introduction to Real-Time Scheduling.
Herrtwich, R. Guido, & Brandenburg U. Wolfgang (1989).  Accessing and Customizing Services in Distributed Systems.
Herrtwich, R. Guido (1990).  Audio and Video in Distributed Computer Systems: Why and How?.
Herrtwich, R. Guido, & Delgrossi L. (1990).  ODA-Based Data Modeling in Multimedia Systems.
Hersch, M.. (2003).  Data-Driven Speaker and Subword Unit Clustering in Speech Processing.
Hertzberg, J., & Thiébaux S. (1993).  Turning an Action Formalism Into a Planner–A Case Study.
Herzberg, A., & Luby M. (1992).  Public Randomness in Cryptography.
Herzog, S., Shenker S. J., & Estrin D. (1997).  Sharing the "Cost" of Multicast Trees: An Axiomatic Analysis. IEEE/ACM Transactions on Networking. 5, 847-860.
Heun, V. (1998).  Approximate Protein Folding in the HP Side Chain Model on Extended Cubic Lattices.
Heun, V., & Mayr E. W. (1998).  Efficient Dynamic Embeddings of Binary Trees into Hypercubes.
Heun, V., & Mayr E. W. (1998).  Optimal Dynamic Embeddings of Complete Binary Trees Into Hypercubes.
Hidber, C. (1998).  Online Association Rule Mining.
Hidber, C. (1998).  Isoperimetric Functions of Amalgamations of Nilpotent Groups.
Hieronymus, J., Liu X., Gales M.. J. F., & Woodland P. (2009).  Exploiting Chinese Character Models to Improve Speech Recognition Performance.
Hillard, D., Ostendorf M., & Shriberg E. (2003).  Detection of Agreement vs. Disagreement In Meetings: Training With Unlabeled Data. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2003).
Hillard, D., Huang Z.., Ji H., Grishman R., Hakkani-Tür D., Harper M. P., et al. (2006).  Impact of Automatic Comma Prediction on POS/Name Tagging of Speech. Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 58-61.
Hillard, D., Ostendorf M., Stolcke A., Liu Y., & Shriberg E. (2004).  Improving Automatic Sentence Boundary Detection with Confusion Networks. Proceedings of HLT-NAACL Conference.
Hilpert, M. (2008).  The English Comparative: Language Structure and Language Use. English Language and Linguistics. 12(3), 395-417.
Hilpert, M., & Gries S. Th. (2008).  The Identification of Stages in Diachronic Data: Variability-Based Neighbor Clustering. Corpora. 3(1), 59-81.
Himanen, P. (2002).  The Hacker Ethic and the Spirit of the Information Age.
Himanen, P., & Castells M. (2002).  The Information Society and the Welfare State: The Finnish Model.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center. 1-14.

Pages