Publications

Found 529 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Technical Report
Renals, S., Morgan N., Bourlard H., Cohen M., Franco H., Wooters C., et al. (1991).  Advances in Connectionist Speech Recognition.
Eklund, R., Bates R., Kuyper C., Willingham E., & Shriberg E. (2006).  The Annotation and Analysis of Importance in Meetings.
Karpinski, M., Wirtgen J., & Zelikovsky A. (1997).  An Approximation Algorithm for the Bandwidth Problem on Dense Graphs.
Karpinski, M., & Wirtgen J. (1997).  On Approximation Hardness of the Bandwidth Problem.
Haban, D., & Wybranietz D. (1989).  Behavior and Performance Analysis of Distributed Systems Using a Hybrid.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2014).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Althoff, K-D., Richter M. M., & Wilke W. (1997).  Cased-Based Reasoning: A New Technology for Experience Based Construction of Knowledge Systems.
Asanović, K., Beck J., Callahan T. J., Feldman J., Irissou B., Kingsbury B., et al. (1993).  CNS-1 Architecture Specification: A Connectionist Network Supercomputer.
Krämer, B., & Wegner L. (1997).  Collaboration Support in Networked Distance Learning.
Albers, S., von Stengel B., & Werchner R. (1995).  A Combined BIT and TIMESTAMP Algorithm for the List Update Problem.
Govil, K., Chan E., & Wasserman H. (1995).  Comparing Algorithms for Dynamic Speed-Setting of a Low-Power CPU.
von Stengel, B., & Werchner R. (1995).  Complexity of Searching an Immobile Hider in a Graph.
Renals, S., Morgan N., Bourlard H., Cohen M., Franco H., Wooters C., et al. (1991).  Connectionist Speech Recognition: Status and Prospects.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Morgan, N., Wooters C., Bourlard H., & Cohen M. (1990).  Continuous Speech Recognition on the Resource Management Database Using Connectionist Probability Estimation.
Choi, J., Akkus I. Ekin, Egelman S., Friedland G., Sommer R., Tschantz M. Carl, et al. (2018).  Cybercasing 2.0: You Get What You Pay For.
M. Shokrollahi, A., & Wasserman H. (1998).  Decoding Algebraic-Geometric Codes Beyond the Error-Correction Bound.
Weihrauch, K. (1992).  The Degrees of Discontinuity of Some Translators Between Representations ofthe Real Numbers.
Liebeherr, J., & Wrege D. E. (1994).  Design and Analysis of a High-Performance Packet Multiplexer for Multiservice Networks with Delay Guarantees.
Widyono, R. (1994).  The Design and Evaluation of Routing Algorithms for Real-Time Channels.
Moran, M., & Wolfinger B. (1992).  Design of a Continuous Media Data Transport Service and Protocol.
Morgan, N., Asanović K., Kingsbury B., & Wawrzynek J. (1990).  Developments in Digital VLSI Design for Artificial Neural Networks.
Wöhlke, G. (1994).  Dextrous Object Manipulation with Robot Hands Including Rolling and Slipping: Improved Motion & Force Computation Method.
Wolfinger, B. (1997).  Efficiency of PET and MPEG Encoding for Video Streams: Analytical QoS Evaluations.
Brockmann, K., & Wanka R. (1996).  Efficient Oblivious Parallel Sorting on the MasPar MP-1.

Pages