Publications

Found 572 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Liu, Y., Chawla N.. V., Harper M. P., Shriberg E., & Stolcke A. (2006).  A Study in Machine Learning from Imbalanced Data for Sentence Boundary Detection in Speech. Computer Speech and Language. 20(4), 468-494.
Cocchi, R., Estrin D., Shenker S. J., & Zhang L. (1991).  A Study of Priority Pricing in Multiple Service Class Networks. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 123-130.
Tombros, T., & Crestani F. (1999).  A Study of Users' Perception of Relevance of Spoken Documents.
Reynolds, D., Andrews W., Campbell J., Navratil J., Peskin B., Adami A., et al. (2003).  The SuperSID Project: Exploiting High-Level Information for High-Accuracy Speaker Recognition. Proceedings of ICASSP-2003.
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
Clark, D. D., Shenker S. J., & Zhang L. (1992).  Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanism. Proceedings of the ACM SIGCOMM '92 Conference on Communications Architecture & Protocols. 14-26.
Chakraborty, R., Wang J., & Yu S. X. (2019).  SurReal: Fr'echet Mean and Distance Transform for Complex-Valued Deep Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Chang, S. (2002).  A Syllable, Articulatory-Feature, and Stress-Accent Model of Speech Recognition.
Chang, S. (2002).  A Syllable, Articulatory-Feature, and Stress-Accent Model of Speech Recognition.
Shastri, L., Chang S., & Greenberg S. (1999).  Syllable Detection and Segmentation Using Temporal Flow Neural Networks. Proceedings of the International Congress of Phonetic Sciences. 3, 1721-1724.
T
Zhu, Q., Chen B. Y., Morgan N., & Stolcke A. (2004).  Tandem Connectionist Feature Extraction for Conversational Speech Recognition. Proceedings of the First International Workshop on Machine Learning for Multimodal Interaction (MLMI 2004).
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
Radhakrishnan, S., Cheng Y., Chu J., Jain A., & Raghavan B. (2011).  TCP Fast Open.
Radhakrishnan, S., Cheng Y., Chu J., Jain A., & Raghavan B. (2011).  TCP Fast Open.
Xiao, X.., Hannan A.., Paxson V., & Crabbe E.. (2000).  TCP Processing of the IPv4 Precedence Field.
Bernd, J., & Corley J. (2017).  Teach Global Impact: A Resource for CSP (or Any CS Class!). Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education. 699.
Cox, R., Bird S., & Meyer B. (2017).  Teaching Computer Science in the Victorian Certificate of Education: A Pilot Study. Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education.
Bernd, J., Gordo B., Choi J., Morgan B., Henderson N., Egelman S., et al. (2015).  Teaching Privacy: Multimedia Making a Difference. IEEE MultiMedia. 12-19.
Craven, R., Beverly R., & Allman M. (2014).  Techniques for the Detection of Faulty Packet Header Modifications.
Colmenares, J. A., Eads G., Hofmeyr S., Bird S., Moretó M., Chou D., et al. (2013).  Tessellation: Refactoring the OS around Explicit Resource Containers with Continuous Adaptation.
Colmenares, J. A., Eads G., Hofmeyr S., Bird S., Moretó M., Chou D., et al. (2013).  Tessellation: Refactoring the OS around Explicit Resource Containers with Continuous Adaptation.
Ben-David, S., Chor B., Goldreich O., & Luby M. (1989).  On the Theory of Average Case Complexity (Revised Edition).
Egelman, S., Kannavara R., & Chow R. (2015).  Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Chun, B-G., Maniatis P., Shenker S. J., & Kubiatowicz J. D. (2009).  Tiered Fault Tolerance for Long-Term Integrity. 267-282.

Pages