Publications

Found 92 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is E  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Evans, W. S. (1994).  Information Theory and Noisy Computation.
Etzioni, O., Hanks S., Jiang T., & Karp R. M. (1996).  Efficient Information Gathering on the Internet. Proceedings. Thirty-Seventh Annual Symposium Foundations of Computer Science. 234-243.
etin, Ö. Ç., & Shriberg E. (2006).  Speaker Overlaps and ASR Errors in Meetings: Effects Before, During, and After the Overlap. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 357-360.
etin, Ö. Ç., & Stolcke A. (2005).  Language Modeling in the ICSI-SRI Spring 2005 Meeting Speech Recognition Evaluation System.
etin, Ö. Ç., & Ostendorf M. (2005).  Multi-Rate and Variable-Rate Modeling of Speech at Phone and Syllable Time Scales. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 665-668.
etin, Ö. Ç., & Shriberg E. (2006).  Overlap in Meetings: ASR Effects and Analysis by Dialog Factors, Speakers, and Collection Site. Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006). 212-224.
etin, Ö. Ç., Kantor A., King S., Bartels C., Magimai-Doss M., Frankel J., et al. (2007).  An Articulatory Feature-Based Tandem Approach and Factored Observation Modeling. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 645-648.
Estrin, D., Handley M., Helmy A., Huang P., & Thaler D. (1999).  A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast Routing. Proceedings of Infocom 1999.
Estrin, D., Handley M., Heidemann J., McCanne S., Xu Y.., & Yu H. (2000).  Network Visualization with the Nam, VINT Network Animator.
Eskin, E., Halperin E., & Karp R. M. (2002).  Large-Scale Reconstruction of Haplotype Structure via Perfect Phylogeny.
Eskin, E., Halperin E., & Sharan R. (2004).  Optimally Phasing Long Genomic Regions using Local Haplotype Predictions. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNPs and Haplotypes. 13-16.
Eskin, E., Halperin E., & Sharan R. (2006).  A Note on Optimally Phasing Long Genomic Regions Using Local Haplotype Predictions. Journal of Bioinformatics and Computational Biology. 4(3), 639-647.
Eskin, E., Halperin E., & Karp R. M. (2003).  Efficient Reconstruction of Haplotype Structure Via Perfect Phylogeny. Journal of Bioinformatics and Computational Biology. 1(1), 1-20.
Eskin, E., Halperin E., & Karp R. M. (2003).  Large Scale Reconstruction of Haplotypes from Genotype Data. Proceedings of the Seventh Conference on Research in Computational Biology (RECOMB).
Ertel, W. (1993).  On the Definition of Speedup.
Ermolinskiy, A., Moon D., Chun B-G., & Shenker S. (2008).  Minuet: Rethinking Concurrency Control in Storage Area Networks.
Ermolinskiy, A., & Shenker S. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding. 91-96.
Ermolinskiy, A., & Shenker S. (2011).  Design and Implementation of a Hypervisor-Based Platform for Dynamic Information Flow Tracking in a Distributed Environment.
Ermolinskiy, A., Moon D., Chun B-G., & Shenker S. (2009).  Minuet: Rethinking Concurrency Control in Storage Area Networks. 311-324.
Ermolinskiy, A., Katti S., Shenker S., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
Ermolinskiy, A., & Shenker S. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding.
Eppe, M., Trott S., Raghuram V., Feldman J., & Janin A. (2016).  Application-Independent and Integration-Friendly Natural Language Understanding. Proceedings of Global Conference on Artificial Intelligence (GCAI 2016), EPiC Series in Computing.
Eppe, M., Trott S., & Feldman J. (2016).  Exploiting Deep Semantics and Compositionality in Natural Language for Human-Robot-Interaction. Proceedings of International Conference on Inteligent Robots and Systems (IROS 2016).
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.

Pages