Found 196 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Casado, M., Koponen T., Ramanathan R., & Shenker S. J. (2010).  Virtualizing the Network Forwarding Plane. 1-6.
Casado, M., Koponen T., Shenker S. J., & Tootoonchian A. (2012).  Fabric: A Retrospective on Evolving SDN. 85-90.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Castelluccia, C., Duermuth M., & Imamoglu F. (2014).  Learning from Neuroscience to Improve Internet Security. ERCIM News. 99, 46.
Castro, I., Panda A., Raghavan B., Shenker S. J., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Catanzaro, B., Kamil S., Lee Y., Asanović K., Demmel J., Keutzer K., et al. (2009).  SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization.
Cebron, N.. (2010).  Refinement of Observations Under Budget Constraints in Active Learning.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.
Celikyilmaz, A., Hakkani-Tür D., & Tur G. (2010).  LDA Based Similarity Modeling for Question Answering. 1-9.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Graph-Based Semi-Supervised Learning for Question Semantic Labeling. 27-35.
Chakraborty, R., Wang J., & Yu S. X. (2019).  SurReal: Fr'echet Mean and Distance Transform for Complex-Valued Deep Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Chandrasekaran, K.., Karp R. M., Moreno-Centeno E.., & Vempala S.. (2011).  Algorithms for Implicit Hitting Set Problems. 614-629.
Chandrayana, K.., Karp R. M., Roughan M.., Sen S.., & Zhang Y. (2004).  Search Strategies in Inter-Domain Traffic Engineering.
Chang, S-Y., Meyer B. T., & Morgan N. (2013).  Spectro-Temporal Features for Robust Speech Recognition Using Power-Law Nonlinearity and Power-Bias Subtraction.
Chang, N., & Maia T.. (2001).  Grounded learning of grammatical constructions. Proceedings of the Association for the Advancement of Artificial Intelligence 2001 Spring Symposium on Learning Grounded Representations.
Chang, N. (2009).  Constructing Grammar: A Computational Model of the Emergence of Early Constructions.
Chang, K., Lei H., & Canny J.. (2011).  Improved Classification of Speaking Styles for Mental Health Monitoring using Phoneme Dynamics. 85-88.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Chang, S-Y., Morgan N., Raju A., Alwan A., & Kreiman J. (2015).  Using Fast and Slow Modulations to Model Human Hearing of Fast and Slow Speech.
Chang, S. (2002).  A Syllable, Articulatory-Feature, and Stress-Accent Model of Speech Recognition.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2004).  Towards Capturing Representative AS-Level Internet Topologies. Computer Networks. 44(6), 737-755.
Chang, N., & Hunter R.. (2001).  Reference resolution in child-directed speech: A deep semantic approach.
Chang, S-Y., & Morgan N. (2014).  Robust CNN-Based Speech Recognition With Gabor Filter Kernels.
Chang, S-Y., Edwards E., Morgan N., Ellis D. P. W., Mesgarani N., & Chang E. (2015).  Phone Recognition for Mixed Speech Signals: Comparison of Human Auditory Cortex and Machine Performance.