Publications

Found 271 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is V  [Clear All Filters]
Conference Paper
van Hout, J., Ferrer L., Vergyri D., Scheffer N., Lei Y., Mitra V., et al. (2014).  Calibration and Multiple System Fusion for Spoken Term Detection Using Linear Logistic Regression.
Tur, G., Stolcke A., Voss L., Dowding J., Favre B., Fernández R., et al. (2008).  The CALO Meeting Speech Recognition and Understanding System. 69-72.
Tur, G., Stolcke A., Voss L., Dowding J., Favre B., Fernández R., et al. (2008).  The CALO Meeting Speech Recognition and Understanding System. 69-72.
Vo, H., Lee Y., Waterman A., & Asanović K. (2013).  A Case for OS-Friendly Hardware Accelerators.
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Vinyals, O., & Wegmann S. (2014).  Chasing the Metric: Smoothing Learning Algorithms for Keyword Detection.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Kotzias, P., Razaghpanah A., Amann J., Paterson K. G., Vallina-Rodriguez N., & Caballero J. (2018).  Coming of Age: A Longitudinal Study of TLS Deployment. Proceedings of IMC 18.
Jia, Y., Vinyals O., & Darrell T. (2013).  On Compact Codes for Spatially Pooled Features.
Valente, F., Magimai-Doss M., Plahl C., Ravuri S., & Wang W. (2010).  A Comparative Large Scale Study of MLP Features for Mandarin ASR. 2630-2633.
Vinyals, O., & Ravuri S. (2011).  Comparing Multilayer Perceptron to Deep Belief Network Tandem Features for Robust ASR.
Ben-David, Y., Hasan S., Pal J., Vallentin M., Panjwani S.., Gutheim P.., et al. (2011).  Computing Security in the Developing World: A Case for Multidisciplinary Research. 39-44.
Bensel, P., Günther O., Tribowski C., & Vogeler S. (2008).  Cost-Benefit Sharing in Cross-Company RFID Applications.
Stolcke, A., Grezl F., Hwang M-Y., Lei X., Morgan N., & Vergyri D. (2006).  Cross-Domain and Cross-Language Portability of Acoustic Features Estimated by Multilayer Perceptrons. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 321-324.
van Vuuren, S., & Hermansky H. (1997).  Data-Driven Design of RASTA-like Filters. Proceedings of the Fifth European Conference on Speech Communication and Technology (Eurospeech '97).
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  DDoS Defense by Offense. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
Donahue, J., Jia Y., Vinyals O., Hoffman J., Zhang N., Tzeng E., et al. (2014).  DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition.
Hendricks, L. Anne, Venugopalan S., Rohrbach M., Mooney R., Saenko K., & Darrell T. (2016).  Deep Compositional Captioning: Describing Novel Object Categories Without Paired Training Data. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1-10.
Vinyals, O., & Morgan N. (2013).  Deep vs. Wide: Depth on a Budget for Robust Speech Recognition.
Voisard, A., & Ziekow H. (2010).  Designing Sensor-Based Event Processing Infrastructures.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Pirinen, T., Yli-Hietanen J., Pertilä P., & Visa A. (2004).  Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation. Proceedings of IEEE ISCAS.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.

Pages