Publication Search Results

TitleAuthorBibliographicsort ascendingDateGroupLinks
Search for Information Bearing Components in SpeechH.H. Yang and H. HermanskyAdvances in Neural Information Processing Systems, Vol. 12, S.A. Solla, T.K. Leen and K.-R. Muller, eds., MIT Press 2000Speech
Fast Learning in Multi-Resolution HierarchiesJ. MoodyAdvances in Neural Information Processing Systems, D. Touretzky, editor, Morgan Kauffmann 1989Algorithms
The Effective Number of Parameters: an Analysis of Generalization and Regularization in Nonlinear Learning SystemsJ. MoodyAdvances in Neural Information Processing Systems Vol. 4, Moody, Hanson, and Lippmann, eds., Morgan Kaufmann, Palo Alto, pp. 847-854 1992Algorithms
Multi-Effect Decompositions for Financial Data ModelingL. Wu and J. MoodyAdvances in Neural Information Processing Systems 9, M.C. Mozer, M.I. Jordan and T. Petsche, eds, MIT Press, Cambridge, 1997. 1997Algorithms
Weight-Space Probability Densities and Equilibria in Stochastic LearningT.K. Leen and J. MoodyAdvances in Neural Information Processing Systems 5, Hanson, Cowan, and Giles (eds), Morgan Kaufmann Publishers, San Mateo, California 1993Algorithms
Smoothing Regularizers for Projective Basis Function NetworksJ. Moody and T. RognvaldssonAdvances in Neural Information Processing Systems 9, M.C. Mozer, M.I. Jordan and T. Petsche, eds, MIT Press, Cambridge, 1997. 1997Algorithms
Feature Selection Based on Joint Mutual InformationH. Yang and J. MoodyAdvances in Intelligent Data Analysis (AIDA), Computational Intelligence Methods and Applications (CIMA), International Computer Science Conventions, Rochester, New York, June 22-25, 1999.June 1999Algorithms
On the security of ping-pong protocolsD. Dolev, S. Even, and R. M. Karp. Edited by: D. Chaum, R.L. Rivest, and A.T. ShermanAdvances in Cryptology: Proceedings of Crypto 82, Santa Barbara, California, pp. 177-86August 1982Algorithms
Neural Nets, Routines and Semantic NetworksJ.A. Feldman and L. ShastriAdvances in Cognitive Science, N. Sharkey (ed.), Ellis Horwood Publishers 1986AI
Hybrid HMM/ANN Systems for Speech Recognition: Overview and New Research DirectionsH. Bourlard and N. MorganAdaptive Processing of Sequences and Data Structures, C.L. Giles and M. Gori (Eds.), pp. 389-417, Lecture Notes in Artificial Intelligence (1387), Springer 1998Speech
Barter Trade Improves Message Delivery in Opportunistic NetworksL. Buttyan, L. Dora, M. Felegyhazi, and I. VajdaAd Hoc Networks, Vol. 8, Issue 1, pp. 1-14January 2010Networking[PDF]

Morph-Based Speech Recognition and Modeling of Out-of-Vocabulary Words Across LanguagesM. Creutz, T. Hirsimäki, M. Kurimo, A. Puurula, J. Pylkkönen, V. Siivola, M. Varjokallio, E. Arisoy, M. Saraclar, and A. StolckeACM Transactions on Speech and Language Processing, Vol. 5, Issue 1, pp. 1-29December 2007Speech[PDF]

Dialocalizaton: Acoustic Speaker Diarization and Visual Localization as Joint Optimization ProblemG. Friedland, C. Yeo, and H. HungACM Transactions on Multimedia Computing, Communications, and Applications, Vol. 6, No. 4, Article 27November 2010Speech[PDF]

Effects of Usage Based Feedback on Video Retrieval: A Simulation Based StudyD. Vallet, F. Hopfgartner, J. M. Jose, and P. CastellsACM Transactions on Information Systems, Vol. 29, Issue 2, Article 11April 2011AI[PDF]

Implementing the Scale Vector-Thread ProcessorR. Krashinsky, C. Batten, and K. AsanovićACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 13, Issue 3, pp. 41:1-41:24July 2008Architecture[PDF]

A Simple Algorithm for Finding Frequent Elements in Streams and BagsR.M. Karp, S. Shenker, and C.H. PapadimitriouACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55March 2003Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3March 2010Networking[PDF]

The Click Modular RouterE. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. KaashoekACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297.August 2000Networking
Incentive Compatibility and Dynamics of Congestion ControlP. B. Godfrey, M. Schapira, A. Zohar, and S. ShenkerACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106June 2010Networking[PDF]

On the Performance of MiddleboxesM. AllmanACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USAOctober 2003Networking
On Estimating End-to-End Network Path PropertiesM. Allman and V. PaxsonACM SIGCOMM, September 1999, Cambridge, Massachusetts.September 1999Networking
A Comparison of RED's Byte and Packet ModesW. Eddy and M. AllmanACM SIGCOMM Student Poster Session, August 2002.August 2002Networking
Measuring End-to-End Bulk Transfer CapacityM. AllmanACM SIGCOMM Internet Measurement Workshop. November 2001.November 2001Networking
Comments on BufferbloatM. AllmanACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37January 2013Networking[PDF]

On Building Inexpensive Network CapabilitiesC. Shue, A. Kalafut, M. Allman, and C. TaylorACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79April 2012Networking[PDF]

Editorial: Architecting for InnovationT. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. KuptsovACM SIGCOMM Computer Communications Review, Vol. 41, No. 3July 2011Networking[PDF]

NOX: Towards an Operating System for NetworksN. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. ShenkerACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110July 2008Networking[PDF]

YAMR: Yet Another Multipath Routing ProtocolI. Ganichev, B. Dai, B. Godfrey, and S. ShenkerACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

Comments on Selecting Ephemeral PortsM. AllmanACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19April 2009Networking[PDF]

Notes on Burst Mitigation for Transport ProtocolsM. Allman and E. BlantonACM SIGCOMM Computer Communication Review, Vol. 35, Issue 2, pp. 53-60. DOI:http://doi.acm.org/10.1145/1064413.1064419April 2005Networking[PDF]

New Techniques for Making Transport Protocols Robust to Corruption-Based LossW. Eddy, S. Ostermann, and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88October 2004Networking[PDF]

Findings and Implications from Data Mining the IMC Review ProcessR. Beverly and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29January 2013Networking[PDF]

Endpoint Admission Control: Architectural Issues and PerformanceL. Breslau, E.W. Knightly, S. Shenker, I. Stoica, and H. ZhangACM SIGCOMM 2000, pages 57-69, Stockholm, Sweeden, October 2000.October 2000Networking
On Estimating End-to-End Network Path PropertiesM. Allman and V. PaxsonACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean, April 2001. This paper was originally presented at ACM SIGCOMM 1999.April 2001Networking
Estimating Loss Rates With TCPM. Allman, W. Eddy, and S. OstermannACM Performance Evaluation Review, 31(3)December 2003Networking
An Evaluation of XML-RPCM. AllmanACM Performance Evaluation Review, 30(4)March 2003Networking
Unexpected Artefacts in PRNU-Based Camera Identification: A "Dresden Image Database" Case-StudyT. Gloe, S. Pfennig, and M. KirchnerACM Multimedia and Security Workshop, Coventry, UKSeptember 2012Vision[PDF]

Data-Centric Storage in Sensornets with GHT, a Geographic Hash TableS. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. YuACM MONET 2003Networking
Can We Escape the Trough of Disillusionment?--A Perspective on E-learning Technology Research from the ACM Workshop on Educational Multimedia and Multimedia EducationG. Friedland, L. Knipping, W. Huerst, and M. MuhlhauserACM E-Learn JournalFebruary 2009Speech
Review of A. Rahman, et al., "Spatial-Geometric Approach to Physical Mobile Interaction Based on Accelerometer and IR Sensory Data Fusion"G. FriedlandACM Computing Reviews, CR139264July 2011Speech
Review of J. Ajmera, et al., "Two-Stream Indexing for Spoken Web Search"G. FriedlandACM Computing Reviews, CR139192June 2011Speech
Review of C. Simon, et al., "Visual Event Recognition Using Decision Trees"G. FriedlandACM Computing Reviews, CR138638January 2011Speech
Review of C. Mueller-Tomfelder, "Tabletops - Horizontal Interactive Displays"G. FriedlandACM Computing Reviews, CR138453October 2010Speech[PDF]

Review of E. Aguilar, "Animation and Performance Capture Using Digitized Models"G. FriedlandACM Computing Reviews, CR138181July 2010Speech
Review of J. Nichols and B. Myers, "Creating a Lightweight User Interface Description Language: An Overview and Analysis of the Personal Universal Controller Project"G. FriedlandACM Computing Reviews, CR137773March 2010Speech
Review of L. Cairco, et al., "AVARI: Animated Virtual Agent Retrieving Information"G. FriedlandACM Computing Reviews, CR137225August 2009Speech
Review of G. Welch, "History: The Use of the Kalman Filter for Human Motion Tracking in Virtual Reality"G. FriedlandACM Computing Reviews, CR137162August 2009Speech
Review of P. Dev and W. Heinrichs, "Learning Medicine Through Collaboration and Action: Collaborative, Experimental, Networked Learning Environments"G. FriedlandACM Computing Reviews, CR136993June 2009Speech
Review of E. Villalon, “High-Dimensionality Data Reduction in Java”G. FriedlandACM Computing ReviewsMarch 2009Speech
Review of Cattelan, et al, "Watch-and-Comment as a Paradigm Toward Ubiquitous Interactive Video Editing"G. FriedlandACM Computer Reviews, CR136487October 2009Speech

Pages