Publication Search Results

TitleAuthorBibliographicsort ascendingDateGroupLinks
Automatic Labeling of Semantic RolesD. Gildea and D. JurafskyThe 38th Annual Meeting of the Association for Computational Linguistics (ACL-2000), Hong Kong, pp. 512-520October 2000Speech[PDF]

A Best-Fit Approach to Productive Omission of ArgumentsE. Mok and J. BryantThe 32nd Annual Meeting of the Berkeley Linguistics Society, Berkeley, CaliforniaFebruary 2006AI[PDF]

The Modulation Spectrogram: In Pursuit of an Invariant Representation of SpeechS. Greenberg and B. KingsburyThe 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997), Munich, Germany, Vol. 3, pp. 1647-1650April 1997Speech[PDF]

Integrating Syllable Boundary Information Into Speech RecognitionS.L. Wu, M. Shire, S. Greenberg, and N. MorganThe 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997), Munich, Germany, Vol. 2, pp. 987-990April 1997Speech[PDF]

The Weft: A Representation for Periodic SoundsD. EllisThe 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997), Munich, Germany, Vol. 2, pp. 1307-1310April 1997Speech[PDF]

Recognizing Reverberant Speech With RASTA-PLPB. Kingsbury and N. MorganThe 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997), Munich, Germany, Vol. 2, pp. 1259-1262April 1997Speech[PDF]

Question Answering based on Semantic StructuresS. Narayanan and S. HarabagiuThe 20th International Conference on Computational Linguistics (COLING 2004), Geneva, SwitzerlandAugust 2004AI
Early-stage practicalities of implementing computer aided education: Experience from IndiaJ. PalTEDC2006 - Technology and Education in Developing Countries, Iringa, TanzaniaJuly 12 2006BCIS (archived)
Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonTechnische Universität München Technical Report No. TUM-I0420, Munich, GermanyNovember 2004Networking[PDF]

A Branch and Cut Algorithm for the Optimal Solution of the Side Chain Placement ProblemE. Althaus, O. Kohlbacher, H.P. Lenhof, and P. MullerTechnical Report Vol.2000-1-001, Max-Planck-Institut fur Informatik: Foschungsbericht, 2000. 2000Algorithms
ONE: The Ohio Network EmulatorM. Allman, A. Caldwell, and S. OstermannTechnical Report TR-19972, Ohio University Computer Science DepartmentAugust 1997Networking
Multiple Data Connection FTP ExtensionsM. Allman and S. OstermannTechnical Report TR-19971, Ohio University Computer ScienceFebruary 1997Networking
A Swifter Start for TCPC. Partridge, D. Rockwell, M. Allman, R. Krishnan, and J.P.G. SterbenzTechnical Report No. 8339, BBN Technologies, March 2002March 2002Networking
Advantages of Parallel Processing and the Effects of Communications TimeW. Eddy and M. AllmanTechnical Report CR-209455, NASA Glenn Research Center, February 2000.February 2000Networking
FTP Extensions for Variable Protocol SpecificationM. Allman and S. OstermannTechnical Report CR-209414, NASA Glenn Research Center, February 2000.February 2000Networking
Fixing Two BSD TCP BugsM. AllmanTechnical Report CR-204151, NASA Lewis Research CenterOctober 1997Networking
Exploiting the Bandwidth-Memory Tradeoff in Multicast State AggregationP. Radoslavov, D. Estrin, and R. GovindanTechnical Report 99-697, Computer Science Department, University of Southern California, July 1999.July 1999Networking
Architectural Considerations for Playback of Quality Adaptive Video over the InternetR. Rejaie, M. Handley, and D. EstrinTechnical report 98-686, Computer Science Department, University of Southern California 1998Networking
Switchboard-DAMSL Labeling Project Coder's ManualD. Jurafsky, E. Shriberg, and D. BiascaTechnical Report 97-02, University of Colorado, Institute of Cognitive Science, Boulder, Colorado 1997Speech[PDF]

On Characterizing Network Topologies and Analyzing Their Impact on Protocol DesignP. Radoslavov, H. Tangmunarunkit, H. Yu, R. Govindan, S. Shenker, and D. EstrinTechnical Report 00-731, Computer Science Department, University of Southern California, February 2000.February 2000Networking
Scalable Session Messages in SRMP. Sharma, D. Estrin, S. Floyd, and L. ZhangTechnical reportFebruary 1998Networking
Ns Simulator Tests for Random Early Detection (RED) GatewaysS. FloydTechnical ReportOctober 1996Networking
Comments on Measurement-based Admissions Control for Controlled-Load ServicesS. FloydTechnical ReportJuly 1996Networking
Issues of TCP with SACKS. FloydTechnical reportJanuary 1996Networking[PDF]

Impact of Network Dynamics on End-to-End Protocols: Case Studies in TCP and Reliable MulticastK. Varadhan, D. Estrin, and S. FloydTech report USC-CS-TR 98-672, April 1998. An abbreviated version appeared in the proceedings of the IEEE Symposium on Computers and Communications, July 1998April 1998Networking
Distributed Caching Independent of the Network SizeM. WestermannSymposium on Parallel Algorithms and Archiectures, 31-40, 2002. 2002Algorithms
The Compiler-compiler in a Time-Sharing EnvironmentJ.A. Feldman and J. CurrySummer Lectures on Advanced Computer Organization, University of Michigan; also Bit Dropper, September 1967June 1967AI
Practical and Robust Geographic Routing in Wireless NetworksY. Kim, R. Govindan, B. Karp, and S. ShenkerSubmitted to MobicomJanuary 05 2004Networking
Finite-Length Analysis of LT-codesR.M. Karp, M. Luby, and A. ShokrollahiSubmitted to International Symposium on Information Theory (ISIT '04). 2004Networking
CPRM: An Expressive Probabilistic Framework for Reasoning About Event StructureS. Narayanan and J. FeldmanSubmitted for publication, 2004 2004AI
Connectionist Mechanisms for Cognitive ControlC. Wendelken and L. ShastriSubmitted for publication, 2004January 05 2004AI
Regularizers and Priors for Feed-Forward NetworksJ. Moody and T. RognvaldssonSubmitted for publication 2003 2003Algorithms
On the Convergence of Statistical Techniques for Estimating Network Traffic DemandsA. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. DiotSubmitted for publication 2003February 2003Networking
A Gambling Game and its Application to the Analysis of Adaptive Randomized RoundingR.M. Karp and C. KenyonSpringer-Verlag Lecture Notes in Computer Science, Volume 2764 (RANDOM 03), 329-340 2003Algorithms
Long-Term Preservation of Digital Documents: Principles and PracticesU.M. Borghoff, P. Roedig, J. Scheffczyk, and L. SchmitzSpringer-Verlag Berlin Heidelberg 2006AI
Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, CanadaS. Jha, R. Sommer, and C. Kreibich, eds.Springer VerlagSeptember 2010Networking
Proceedings of the 7th International Conference on Computer Vision Systems (ICVS 2009), Liege, BelgiumM. Fritz, B. Schiele, and J. H. Piater, eds.SpringerOctober 2009Vision
Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, GermanyC. Kreibich and M. Jahnke, eds.Springer 2010Networking
A Taxonomy of Traffic MatricesA. Medina, C. Fraleigh, N. Taft, S. Battacharyya, and C. DiotSPIE Workshop on Scalability and Traffic Control in IP Networks II. Boston, Massachusetts. July 29-August 1, 2002.July 2002Networking
What's New in Government-Sponsored Speech Recognition ResearchN. MorganSpeech Technology Magazine, Vol. 7, No. 5September 2002Speech
Prosody-Based Automatic Segmentation of Speech into Sentences and TopicsE. Shriberg, A. Stolcke, D. Hakkani-Tür, and G. TürSpeech Communications, T. Robinson and S. Rendals, eds., Vol. 32, Issue 1-2, pp. 127-154September 2000Speech
Relevance of Time-Frequency Features for Phonetic and SpeakerChannel ClassificationH.H. Yan, S. Sharma, S. van Vuuren, and H. HermanskySpeech Communication,Vol. 1, No. 31, pp. 35-50May 2000Speech[PDF]

Speaker Adaptation of Language and Prosodic Models for Automatic Dialog Act Segmentation of SpeechJ. Kolar, Y. Liu, and E. ShribergSpeech Communication, Vol. 52, Issue 3, pp. 236-245March 2010Speech
Long Story Short - Global Unsupervised Models for Keyphrase Based Meeting SummarizationK. Riedhammer, B. Favre, and D. Hakkani-TurSpeech Communication, Vol. 52, Issue 10, pp. 801-815. DOI:10.1016/j.specom.2010.06.002October 2010Speech
Speech Encoding in a Model of Peripheral Auditory Processing: Quantitative Assessment by Means of Automatic Speech RecognitionM. Holmberg, D. Gelbart, and W. HemmertSpeech Communication, Vol. 49, Issue 12, pp. 917-932December 2007Speech
Modeling Prosodic Feature Sequences for Speaker RecognitionE. Shriberg, L. Ferrer, S. Kajarekar, A. Venkataraman, and A. StolckeSpeech Communication, Vol. 46, Issues 3-4, pp. 455-472July 2005Speech
Using Knowledge to Organize Sound: The Prediction-driven Approach to Computational Auditory Scene Analysis and Its Application to Speech/Nonspeech MixturesD. EllisSpeech Communication, Vol. 27, Issue 3-4, pp. 281-298 1999Speech
Robust Speech Recognition Using the Modulation SpectrogramB. Kingsbury, N. Morgan, and S. GreenbergSpeech Communication, Vol. 25, pp. 117-132 1998Speech
Neural nets and hidden Markov models: Review and GeneralizationsH. Bourlard, N. Morgan, and S. RenalsSpeech Communication, Vol. 11, No.2-3, pp. 237-246 1992Speech
Towards Increasing Speech Recognition Error RatesH. Bourlard, H., Hermansky, and N. MorganSpeech Communication, pp. 205-231May 1996Speech

Pages