| Automatic Labeling of Semantic Roles | D. Gildea and D. Jurafsky | The 38th Annual Meeting of the Association for Computational Linguistics (ACL-2000), Hong Kong, pp. 512-520 | October 2000 | Speech | [PDF]
|
| A Best-Fit Approach to Productive Omission of Arguments | E. Mok and J. Bryant | The 32nd Annual Meeting of the Berkeley Linguistics Society, Berkeley, California | February 2006 | AI | [PDF]
|
| The Modulation Spectrogram: In Pursuit of an Invariant Representation of Speech | S. Greenberg and B. Kingsbury | The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997), Munich, Germany, Vol. 3, pp. 1647-1650 | April 1997 | Speech | [PDF]
|
| Integrating Syllable Boundary Information Into Speech Recognition | S.L. Wu, M. Shire, S. Greenberg, and N. Morgan | The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997), Munich, Germany, Vol. 2, pp. 987-990 | April 1997 | Speech | [PDF]
|
| The Weft: A Representation for Periodic Sounds | D. Ellis | The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997), Munich, Germany, Vol. 2, pp. 1307-1310 | April 1997 | Speech | [PDF]
|
| Recognizing Reverberant Speech With RASTA-PLP | B. Kingsbury and N. Morgan | The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997), Munich, Germany, Vol. 2, pp. 1259-1262 | April 1997 | Speech | [PDF]
|
| Question Answering based on Semantic Structures | S. Narayanan and S. Harabagiu | The 20th International Conference on Computational Linguistics (COLING 2004), Geneva, Switzerland | August 2004 | AI | |
| Early-stage practicalities of implementing computer aided education: Experience from India | J. Pal | TEDC2006 - Technology and Education in Developing Countries, Iringa, Tanzania | July 12 2006 | BCIS (archived) | |
| Exploiting Independent State For Network Intrusion Detection | R. Sommer and V. Paxson | Technische Universität München Technical Report No. TUM-I0420, Munich, Germany | November 2004 | Networking | [PDF]
|
| A Branch and Cut Algorithm for the Optimal Solution of the Side Chain Placement Problem | E. Althaus, O. Kohlbacher, H.P. Lenhof, and P. Muller | Technical Report Vol.2000-1-001, Max-Planck-Institut fur Informatik: Foschungsbericht, 2000. | 2000 | Algorithms | |
| ONE: The Ohio Network Emulator | M. Allman, A. Caldwell, and S. Ostermann | Technical Report TR-19972, Ohio University Computer Science Department | August 1997 | Networking | |
| Multiple Data Connection FTP Extensions | M. Allman and S. Ostermann | Technical Report TR-19971, Ohio University Computer Science | February 1997 | Networking | |
| A Swifter Start for TCP | C. Partridge, D. Rockwell, M. Allman, R. Krishnan, and J.P.G. Sterbenz | Technical Report No. 8339, BBN Technologies, March 2002 | March 2002 | Networking | |
| Advantages of Parallel Processing and the Effects of Communications Time | W. Eddy and M. Allman | Technical Report CR-209455, NASA Glenn Research Center, February 2000. | February 2000 | Networking | |
| FTP Extensions for Variable Protocol Specification | M. Allman and S. Ostermann | Technical Report CR-209414, NASA Glenn Research Center, February 2000. | February 2000 | Networking | |
| Fixing Two BSD TCP Bugs | M. Allman | Technical Report CR-204151, NASA Lewis Research Center | October 1997 | Networking | |
| Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation | P. Radoslavov, D. Estrin, and R. Govindan | Technical Report 99-697, Computer Science Department, University of Southern California, July 1999. | July 1999 | Networking | |
| Architectural Considerations for Playback of Quality Adaptive Video over the Internet | R. Rejaie, M. Handley, and D. Estrin | Technical report 98-686, Computer Science Department, University of Southern California | 1998 | Networking | |
| Switchboard-DAMSL Labeling Project Coder's Manual | D. Jurafsky, E. Shriberg, and D. Biasca | Technical Report 97-02, University of Colorado, Institute of Cognitive Science, Boulder, Colorado | 1997 | Speech | [PDF]
|
| On Characterizing Network Topologies and Analyzing Their Impact on Protocol Design | P. Radoslavov, H. Tangmunarunkit, H. Yu, R. Govindan, S. Shenker, and D. Estrin | Technical Report 00-731, Computer Science Department, University of Southern California, February 2000. | February 2000 | Networking | |
| Scalable Session Messages in SRM | P. Sharma, D. Estrin, S. Floyd, and L. Zhang | Technical report | February 1998 | Networking | |
| Ns Simulator Tests for Random Early Detection (RED) Gateways | S. Floyd | Technical Report | October 1996 | Networking | |
| Comments on Measurement-based Admissions Control for Controlled-Load Services | S. Floyd | Technical Report | July 1996 | Networking | |
| Issues of TCP with SACK | S. Floyd | Technical report | January 1996 | Networking | [PDF]
|
| Impact of Network Dynamics on End-to-End Protocols: Case Studies in TCP and Reliable Multicast | K. Varadhan, D. Estrin, and S. Floyd | Tech report USC-CS-TR 98-672, April 1998. An abbreviated version appeared in the proceedings of the IEEE Symposium on Computers and Communications, July 1998 | April 1998 | Networking | |
| Distributed Caching Independent of the Network Size | M. Westermann | Symposium on Parallel Algorithms and Archiectures, 31-40, 2002. | 2002 | Algorithms | |
| The Compiler-compiler in a Time-Sharing Environment | J.A. Feldman and J. Curry | Summer Lectures on Advanced Computer Organization, University of Michigan; also Bit Dropper, September 1967 | June 1967 | AI | |
| Practical and Robust Geographic Routing in Wireless Networks | Y. Kim, R. Govindan, B. Karp, and S. Shenker | Submitted to Mobicom | January 05 2004 | Networking | |
| Finite-Length Analysis of LT-codes | R.M. Karp, M. Luby, and A. Shokrollahi | Submitted to International Symposium on Information Theory (ISIT '04). | 2004 | Networking | |
| CPRM: An Expressive Probabilistic Framework for Reasoning About Event Structure | S. Narayanan and J. Feldman | Submitted for publication, 2004 | 2004 | AI | |
| Connectionist Mechanisms for Cognitive Control | C. Wendelken and L. Shastri | Submitted for publication, 2004 | January 05 2004 | AI | |
| Regularizers and Priors for Feed-Forward Networks | J. Moody and T. Rognvaldsson | Submitted for publication 2003 | 2003 | Algorithms | |
| On the Convergence of Statistical Techniques for Estimating Network Traffic Demands | A. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. Diot | Submitted for publication 2003 | February 2003 | Networking | |
| A Gambling Game and its Application to the Analysis of Adaptive Randomized Rounding | R.M. Karp and C. Kenyon | Springer-Verlag Lecture Notes in Computer Science, Volume 2764 (RANDOM 03), 329-340 | 2003 | Algorithms | |
| Long-Term Preservation of Digital Documents: Principles and Practices | U.M. Borghoff, P. Roedig, J. Scheffczyk, and L. Schmitz | Springer-Verlag Berlin Heidelberg | 2006 | AI | |
| Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada | S. Jha, R. Sommer, and C. Kreibich, eds. | Springer Verlag | September 2010 | Networking | |
| Proceedings of the 7th International Conference on Computer Vision Systems (ICVS 2009), Liege, Belgium | M. Fritz, B. Schiele, and J. H. Piater, eds. | Springer | October 2009 | Vision | |
| Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany | C. Kreibich and M. Jahnke, eds. | Springer | 2010 | Networking | |
| A Taxonomy of Traffic Matrices | A. Medina, C. Fraleigh, N. Taft, S. Battacharyya, and C. Diot | SPIE Workshop on Scalability and Traffic Control in IP Networks II. Boston, Massachusetts. July 29-August 1, 2002. | July 2002 | Networking | |
| What's New in Government-Sponsored Speech Recognition Research | N. Morgan | Speech Technology Magazine, Vol. 7, No. 5 | September 2002 | Speech | |
| Prosody-Based Automatic Segmentation of Speech into Sentences and Topics | E. Shriberg, A. Stolcke, D. Hakkani-Tür, and G. Tür | Speech Communications, T. Robinson and S. Rendals, eds., Vol. 32, Issue 1-2, pp. 127-154 | September 2000 | Speech | |
| Relevance of Time-Frequency Features for Phonetic and SpeakerChannel Classification | H.H. Yan, S. Sharma, S. van Vuuren, and H. Hermansky | Speech Communication,Vol. 1, No. 31, pp. 35-50 | May 2000 | Speech | [PDF]
|
| Speaker Adaptation of Language and Prosodic Models for Automatic Dialog Act Segmentation of Speech | J. Kolar, Y. Liu, and E. Shriberg | Speech Communication, Vol. 52, Issue 3, pp. 236-245 | March 2010 | Speech | |
| Long Story Short - Global Unsupervised Models for Keyphrase Based Meeting Summarization | K. Riedhammer, B. Favre, and D. Hakkani-Tur | Speech Communication, Vol. 52, Issue 10, pp. 801-815. DOI:10.1016/j.specom.2010.06.002 | October 2010 | Speech | |
| Speech Encoding in a Model of Peripheral Auditory Processing: Quantitative Assessment by Means of Automatic Speech Recognition | M. Holmberg, D. Gelbart, and W. Hemmert | Speech Communication, Vol. 49, Issue 12, pp. 917-932 | December 2007 | Speech | |
| Modeling Prosodic Feature Sequences for Speaker Recognition | E. Shriberg, L. Ferrer, S. Kajarekar, A. Venkataraman, and A. Stolcke | Speech Communication, Vol. 46, Issues 3-4, pp. 455-472 | July 2005 | Speech | |
| Using Knowledge to Organize Sound: The Prediction-driven Approach to Computational Auditory Scene Analysis and Its Application to Speech/Nonspeech Mixtures | D. Ellis | Speech Communication, Vol. 27, Issue 3-4, pp. 281-298 | 1999 | Speech | |
| Robust Speech Recognition Using the Modulation Spectrogram | B. Kingsbury, N. Morgan, and S. Greenberg | Speech Communication, Vol. 25, pp. 117-132 | 1998 | Speech | |
| Neural nets and hidden Markov models: Review and Generalizations | H. Bourlard, N. Morgan, and S. Renals | Speech Communication, Vol. 11, No.2-3, pp. 237-246 | 1992 | Speech | |
| Towards Increasing Speech Recognition Error Rates | H. Bourlard, H., Hermansky, and N. Morgan | Speech Communication, pp. 205-231 | May 1996 | Speech | |