Publications

Found 92 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Tzeng, E., Devin C., Hoffman J., Finn C., Abbeel P., Levine S., et al. (2016).  Adapting deep visuomotor representations with weak pairwise constraints. Workshop on the Algorithmic Foundations of Robotics (WAFR).
Tzeng, E., Devin C., Hoffman J., Finn C., Peng X., Levine S., et al. (2015).  Towards Adapting Deep Visuomotor Representations from Simulated to Real Environments. CoRR. abs/1511.07111,
Tzeng, E., Hoffman J., Darrell T., & Saenko K. (2015).  Simultaneous Deep Transfer Across Domains and Tasks. The IEEE International Conference on Computer Vision (ICCV). 4068-4076.
Tuytelaars, T., Fritz M., Saenko K., & Darrell T. (2011).  The NBNN Kernel. 1824-1831.
Turau, V., & Chen W. (1995).  Efficient Implementation of Multi-Methods for Statically Typed Languages.
Tur, G., Stolcke A., Voss L., Dowding J., Favre B., Fernández R., et al. (2008).  The CALO Meeting Speech Recognition and Understanding System. 69-72.
Tur, G., Shriberg E., Stolcke A., & Kajarekar S. (2007).  Duration and Pronunciation Conditioned Lexical Modeling for Speaker Verification. 2049-2052.
Tur, G., Stolcke A., Voss L., Peters S., Hakkani-Tür D., Dowding J., et al. (2010).  The CALO Meeting Assistant System. IEEE Transactions on Audio. 18(6), 1601-1611.
Tur, G., Guz U., & Hakkani-Tür D. (2006).  Model Adaptation for Dialog Act Tagging. Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 94-97.
Tschantz, M. Carl, Afroz S., Paxson V., & Tygar J.D.. (2014).  On Modeling the Costs of Censorship. CoRR. abs/1409.3211,
Tschantz, M. Carl, & Friedland G. (2019).  Privacy Concerns of Multimodal Sensor Systems. The Handbook of Multimodal-Multisensor Interfaces: Foundations, User Modeling, and Common Modality Combinations . 1,
Tschantz, M. Carl, Sen S., & Datta A. (2017).  Differential Privacy as a Causal Property.
Tschantz, M. Carl, Datta A., Datta A., & Wing J. M. (2015).  A Methodology for Information Flow Experiments. 2015 IEEE 28th Computer Security Foundations Symposium. 554-568.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2018).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2016).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings.
Tsai, T.. J., & Morgan N. (2013).  Speech Activity Detection: An Economics Approach.
Tsai, T.. J. (2015).  Are You TED Talk Material? Comparing Prosody in Professors and TED Speakers.
Tsai, T.. J., & Janin A. (2013).  Confidence-Based Scoring: A Useful Diagnostic Tool for Detection Tasks.
Tsai, T.. J., Friedland G., & Anguera X. (2015).  An Information-Theoretic Metric of Fingerprint Effectiveness.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  Multimodal Addressee Detection in Multiparty Dialogue Systems.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction. IEEE Transactions on Multimedia. 17(9), 1550-1561.
Tsai, T.. J., & Morgan N. (2012).  Longer Features: They Do a Speech Detector Good.
Tsai, T.. J., & Stolcke A. (2015).  Aligning Meeting Recordings Via Adaptive Fingerprinting. 786-790.
Trompf, M. (1992).  Experiments with Noise Reduction Neural Networks for Robust Speech Recognition.

Pages