Publications
Found 572 results
Author [ Title] Type Year Filters: First Letter Of Last Name is C [Clear All Filters]
On Using MLP Features in LVCSR.
Proceedings of International Conference on Spoken Language Processing.
(2004). Using MLP Features in SRI's Conversational Speech Recognition System.
Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 2141-2144.
(2005).
(2013).
(1998).
(2011).
A Virtual Spanner for Efficient Face Routing in Multihop Wireless Networks.
Lecture Notes in Computer Science. 4217,
(2006).
(2010). Visual Similarity from Optimizing Feature and Memory On A Hypersphere.
Proceedings of IEEE Conference on Computer Vision and Pattern Recognition .
(2019). A Voice-Enabled Procedure Browser for the International Space Station.
Proceedings of the 43rd Annual Meeting of the Association for Computational Linguistics (ACL 2005). 29-32.
(2005). We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of USENIX Security Symposium.
(2018). We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of USENIX Security Symposium.
(2018). Web Caching and Zipf-Like Distributions: Evidence and Implications.
Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
(1999). Weighted SGD for ℓp Regression with Randomized Preconditioning.
Proceedings of the 27th Annual SODA Conference. 558-569.
(2015). Where is natural language understanding? Toward context-dependent utterance interpretation.
Proceedings of the 7th Annual Conference on Architectures and Mechanisms for Language Processing AMLaP.
(2001).
(2016). Who is "You"? Combining Linguistic and Gaze Features to Resolve Second-Person References in Dialogue.
273-281.
(2009).
(2009). Whole-Genome Patterns of Common DNA Variation in Three Human Populations.
Science. 307(5712), 1072-1079.
(2005).
(2010).
(2005). You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016).