Publications

Found 4048 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wooters, C., Mirghafori N., Stolcke A., Pirinen T., Bulyko I., Gelbart D., et al. (2004).  The 2004 ICSI-SRI-UW Meeting Recognition System. 196-208.
Wooters, C., & Morgan N. (1990).  Speech Segmentation and Labeling on the NeXT Machine.
Wooters, C., & Morgan N. (1992).  Acoustic Sub-word Models in the Berkeley Restaurant Project. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 1551-1554.
Wooters, C., Fung J., Peskin B., & Anguera X. (2004).  Towards Robust Speaker Segmentation: The ICSI-SRI Fall 2004 Diarization System. Proceedings of Fall 2004 Rich Transcription Workshop (RT-04F).
Wooters, C., Jurafsky D., Tajchman G., & Morgan N. (1993).  The Berkeley Restaurant Project. Proceedings of the Speech Research Symposium XIII. 119-128.
Wooters, C., & Huijbregts M. (2007).  The ICSI RT07s Speaker Diarization System. 509-519.
Wooters, C., & Morgan N. (1992).  Connectionist-Based Acoustic Word Models. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 157-163.
Wooters, C. (1993).  Lexical Modeling in a Speaker Independent Speech Understanding System.
Wooters, C., & Stolcke A. (1994).  Multiple-Pronunciation Lexical Modeling in a Speaker Independent Speech Understanding System. Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94). 1963-1966.
Wolfinger, B. (1997).  Efficiency of PET and MPEG Encoding for Video Streams: Analytical QoS Evaluations.
Wöhlke, G. (1994).  Dextrous Object Manipulation with Robot Hands Including Rolling and Slipping: Improved Motion & Force Computation Method.
Wittkop, T., Emig D., Lange S.. J., Rahmann S., Albrecht M., Morris J.. H., et al. (2010).  Partitioning Biological Data with Transitivity Clustering. Nature Methods. 7(6), 419-420.
Willinger, W., Paxson V., & Taqqu M. S. (1998).  Self-similarity and Heavy Tails: Structural Modeling of Network Traffic.
Willinger, W., & Paxson V. (1998).  Where Mathematics Meets the Internet. Notices of the American Mathematical Society. 45(8), 961-970.
Willinger, W., & Paxson V. (1997).  Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick. 25(5), 1805-1869.
Willinger, W., Paxson V., Riedi R. H., & Taqqu M. S. (2002).  Long-Range Dependence and Data Network Traffic.
Willinger, W., Govindan R., Jamin S., Paxson V., & Shenker S. (2002).  Scaling Phenomena in the Internet: Critically Examining Criticality. Proceedings of National Academy of Science of the United States of America (PNAS). 99,
Williams, G., & Ellis D. P. W. (1999).  Speech/music Discrimination Based on Posterior Probability Features. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Wikarski, D. (1996).  An Introduction to Modular Process Nets.
Wijesekera, P., Baokar A., Tsai L., Reardon J., Egelman S., Wagner D., et al. (2017).  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland ’17).
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Wijesekera, P., Razaghpanah A., Reardon J., Reyes I., Vallina-Rodriguez N., Egelman S., et al. (2017).  “Is Our Children’s Apps Learning?” Automatically Detecting COPPA Violations. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’17).
Widyono, R. (1994).  The Design and Evaluation of Routing Algorithms for Real-Time Channels.
Widom, M., & Shenker S. (1984).  Topological Phase Transitions. 46-51.

Pages