Publications

Found 983 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Jurafsky, D., Wooters C., Tajchman G., Segal J., Stolcke A., Fosler-Lussier E., et al. (1994).  The Berkeley Restaurant Project. Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94). 2139-2142.
Wooters, C., Jurafsky D., Tajchman G., & Morgan N. (1993).  The Berkeley Restaurant Project. Proceedings of the Speech Research Symposium XIII. 119-128.
[Anonymous] (2008).  Best Papers from the Second IEEE International Conference on Semantic Computing (IJSC). (Friedland, G., & Martell C.., Ed.).International Journal of Semantic Computing. 2,
Mok, E., & Bryant J. (2006).  A Best-Fit Approach to Productive Omission of Arguments.
Frik, A., Egelman S., Harbach M., Malkin N., & Peer E. (2018).  Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias. Proceedings of WEIS '18.
Kantchelian, A., Tschantz M. Carl, Afroz S., Miller B., Shankar V., Bachwani R., et al. (2015).  Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
Morgan, N. (1994).  Big Dumb Neural Nets: A Working Brute Force Approach to Speech Recognition. Proceedings of the International Conference on Neural Networks. VII, 4462-4465.
Farrell, R., Oza O., Zhang N., Morariu V. I., Darrell T., & Davis L. S. (2011).  Birdlets: Subordinate Categorization Using Volumetric Primitives and Pose-Normalized Appearance. 161-168.
Halvorson, T., Szurdi J., Maier G., Felegyhazi M., Kreibich C., Weaver N., et al. (2012).  The BIZ Top-Level Domain: Ten Years Later.
Parthasarathi, S. Hari Krish, Chang S-Y., Cohen J., Morgan N., & Wegmann S. (2013).  The Blame Game in Meeting Room ASR: An Analysis of Feature versus Model Errors in Noisy and Mismatched Conditions.
Karbasi, M., Abdelaziz A. Hussen, Meutzner H., & Kolossa D. (2016).  Blind Non-Intrusive Speech Intelligibility Prediction Using Twin-HMMs. Proceedings of Interspeech 2016.
Fornasa, M., Stecca M., Maresca M., & Baglietto P. (2015).  Bounded Latency Spanning Tree Reconfiguration. Computer Networks. 76, 259-274.
Althaus, E., Kohlbacher O., Lenhof H-P., & Müller P. (2000).  A Branch and Cut Algorithm for the Optimal Solution of the Side Chain Placement Problem.
Medina, A., & Matta I. (2000).  BRITE: A Flexible Generator of Internet Topologies.
Medina, A., & Matta I. (2000).  BRITE: A Flexible Generator of Internet Topologies.
Medina, A., Lakhina A., Matta I., & Byers J. W. (2001).  BRITE: An Approach to Universal Topology Generation. Proceedings of MASCOTS 2001.
Medina, A., Lakhina A., Matta I., & Byers J. W. (2001).  BRITE: An Approach to Universal Topology Generation. Proceedings of MASCOTS 2001.
Medina, A., Lakhina A., Matta I., & Byers J. W. (2001).  BRITE: Universal Topology Generation From a User's Perspective.
Medina, A., Lakhina A., Matta I., & Byers J. W. (2001).  BRITE: Universal Topology Generation From a User's Perspective.
Lei, H., & Mirghafori N. (2014).  Broad Phonetic Classes for Speaker Verification with Noisy, Large-Scale Data.
Batten, C., Joshi A., Orcutt J., Khilo A., Moss B., Holzwarth C., et al. (2009).  Building Many-Core Processor-to-DRAM Networks with Monolithic CMOS Silicon Photonics. IEEE Micro. 29(4), 8-21.
Batten, C., Joshi A., Orcutt J., Khilo A., Moss B., Holzwarth C., et al. (2008).  Building Manycore Processor-to-DRAM Networks with Monolithic Silicon Photonics. 21-30.

Pages