Publications

Found 572 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Conference Paper
Franco, H., Cohen M., Morgan N., Rumelhart D., & Abrash V. (1992).  Context-Dependent Connectionist Probability Estimation in a Hybrid HMM-Neural Net Speech Recognition System. Proceedings of the International Joint Conference on Neural Networks.
Chang, N., & Gurevich O.. (2004).  Context-Driven Construction Learning. Proceedings of the 26th Annual Meeting of the Cognitive Science Society.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Tootoonchian, A., Gorbunov S., Ganjali Y., Casado M., & Sherwood R. (2012).  On Controller Performance in Software-Defined Networks.
Souiai, M., Nieuwenhuis C., Strekalovskiy E., & Cremers D. (2013).  Convex Optimization for Scene Understanding.
Zheng, X., Jiang J., Liang J., Duan H., Chen S.., Wan T., et al. (2015).  Cookies Lack Integrity: Real-World Implications. 707-721.
Guz, U., Cuendet S., Hakkani-Tür D., & Tur G. (2007).  Co-training Using Prosodic and Lexical Information for Sentence Segmentation. 2597-2600.
C. Christoudias, M., Urtasun R., Kapoor A., & Darrell T. (2009).  Co-Training with Noisy Perceptual Observations. 2844-2851.
Cuendet, S., Hakkani-Tür D., Shriberg E., Fung J., & Favre B. (2007).  Cross-Genre Feature Comparisons for Spoken Sentence Segmentation. 265-274.
Cook, H., Gonina E., Kamil S., Friedland G., Patterson D., & Fox A. (2011).  CUDA-Level Performance with Python-Level Productivity for Gaussian Mixture Model Applications.
Shire, M. Lee, & Chen B. Y. (2000).  On Data-Derived Temporal Processing in Speech Feature Extraction. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Shire, M. Lee, & Chen B. Y. (2000).  Data-driven RASTA Filters in Reverberation. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2000).
Choi, J., & Friedland G. (2011).  Data-Driven vs. Semantic-Technology-Driven Tag-Based Video Location Estimation. 243-246.
Choi, J., & Friedland G. (2011).  Data-Driven vs. Semantic-Technology-Driven Tag-Based Video Location Estimation. 243-246.
Koponen, T., Chawla M., Chun B-G., Ermolinskiy A., Kim K. Hyun, Shenker S. J., et al. (2007).  A Data-Oriented (and Beyond) Network Architecture. 181-192.
Koponen, T., Chawla M., Chun B-G., Ermolinskiy A., Kim K. Hyun, Shenker S. J., et al. (2007).  A Data-Oriented (and Beyond) Network Architecture. 181-192.
Tavakoli, A., Chu D., Hellerstein J. M., Levis P., & Shenker S. J. (2007).  A Declarative Sensornet Architecture. 55-60.
Barker, J., Cooke M. P., & Ellis D. P. W. (2000).  Decoding Speech in the Presence of Other Sound Sources. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S. J., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Zhao, T., Choi J., & Friedland G. (2020).  DIME: An Online Tool for the Visual Comparison of Cross-modal Retrieval Models. International Conference on Multimedia Modeling. 729-733.
Ben-Dor, A., Chor B., Karp R. M., & Yakhini Z. (2002).  Discovering Local Structure in Gene Expression Data: The Order Preserving Submatrix Problem. Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02).
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M., et al. (2016).  A discriminative and compact audio representation for event detection. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 57-61.
Caballero, J., Poosankam P., Kreibich C., & Song D. (2009).  Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering. 621-634.
Chun, B-G., Maniatis P., & Shenker S. J. (2008).  Diverse Replication for Single-Machine Byzantine-Fault Tolerance. 287-292.

Pages