Publications

Found 91 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Tzeng, E., Devin C., Hoffman J., Finn C., Abbeel P., Levine S., et al. (2016).  Adapting deep visuomotor representations with weak pairwise constraints. Workshop on the Algorithmic Foundations of Robotics (WAFR).
Tzeng, E., Devin C., Hoffman J., Finn C., Peng X., Levine S., et al. (2015).  Towards Adapting Deep Visuomotor Representations from Simulated to Real Environments. CoRR. abs/1511.07111,
Tzeng, E., Hoffman J., Darrell T., & Saenko K. (2015).  Simultaneous Deep Transfer Across Domains and Tasks. The IEEE International Conference on Computer Vision (ICCV). 4068-4076.
Tuytelaars, T., Fritz M., Saenko K., & Darrell T. (2011).  The NBNN Kernel. 1824-1831.
Turau, V., & Chen W. (1995).  Efficient Implementation of Multi-Methods for Statically Typed Languages.
Tur, G., Guz U., & Hakkani-Tür D. (2006).  Model Adaptation for Dialog Act Tagging. Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 94-97.
Tur, G., Stolcke A., Voss L., Dowding J., Favre B., Fernández R., et al. (2008).  The CALO Meeting Speech Recognition and Understanding System. 69-72.
Tur, G., Shriberg E., Stolcke A., & Kajarekar S. (2007).  Duration and Pronunciation Conditioned Lexical Modeling for Speaker Verification. 2049-2052.
Tur, G., Stolcke A., Voss L., Peters S., Hakkani-Tür D., Dowding J., et al. (2010).  The CALO Meeting Assistant System. IEEE Transactions on Audio. 18(6), 1601-1611.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2016).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings.
Tschantz, M. Carl, Afroz S., Paxson V., & Tygar J.D.. (2014).  On Modeling the Costs of Censorship. CoRR. abs/1409.3211,
Tschantz, M. Carl, Sen S., & Datta A. (2017).  Differential Privacy as a Causal Property.
Tschantz, M. Carl, Datta A., Datta A., & Wing J. M. (2015).  A Methodology for Information Flow Experiments. 2015 IEEE 28th Computer Security Foundations Symposium. 554-568.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2018).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  Multimodal Addressee Detection in Multiparty Dialogue Systems.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction. IEEE Transactions on Multimedia. 17(9), 1550-1561.
Tsai, T.. J., & Morgan N. (2012).  Longer Features: They Do a Speech Detector Good.
Tsai, T.. J., & Stolcke A. (2015).  Aligning Meeting Recordings Via Adaptive Fingerprinting. 786-790.
Tsai, T.. J., & Morgan N. (2013).  Speech Activity Detection: An Economics Approach.
Tsai, T.. J. (2015).  Are You TED Talk Material? Comparing Prosody in Professors and TED Speakers.
Tsai, T.. J., & Janin A. (2013).  Confidence-Based Scoring: A Useful Diagnostic Tool for Detection Tasks.
Tsai, T.. J., Friedland G., & Anguera X. (2015).  An Information-Theoretic Metric of Fingerprint Effectiveness.
Trompf, M. (1992).  Experiments with Noise Reduction Neural Networks for Robust Speech Recognition.
Tribowski, C., Spin K., Günther O., & Sielemann O. (2009).  Unternehmensübergreifende RFID-Anwendungen – Eine Fallstudie aus der Möbelindustrie zur RFID-basierten Auftragsabwicklung. Proceedings of the 11th Paderborner Frühjahrstagung (PBFT 2009).

Pages