Publications

Found 468 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
Conference Paper
Vinyals, O., Deng L., Yu D., & Acero A. (2009).  Discriminative Pronunciation Learning Using Phonetic Decoder and Minimum-Classification-Error Criterion. 4445-4448.
Girshick, R., Song H. Oh, & Darrell T. (2013).  Discriminatively Activated Sparselets.
Derezinski, M.., & Mahoney M. W. (2019).  Distributed estimation of the inverse Hessian by determinantal averaging. Proceedings of the 2019 NeurIPS Conference.
Dreger, H., Feldmann A., Mai M.., Paxson V., & Sommer R. (2006).  Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Proceedings of the 15th USENIX Security Symposium (Security '06).
Yeh, T., & Darrell T. (2008).  Dynamic Visual Category Learning.
Hoffman, J., Rodner E., Donahue J., Darrell T., & Saenko K. (2013).  Efficient Learning of Domain-Invariant Image Representations.
Hoffman, J., Rodner E., Donahue J., Darrell T., & Saenko K. (2013).  Efficient Learning of Domain-Invariant Image Representations.
DeNero, J., Bansal M., Pauls A., & Klein D. (2009).  Efficient Parsing for Transducer Grammars. 227-235.
Karp, R. M., Luby M., & der Heide F. Meyer auf (1992).  Efficient PRAM simulation on a distributed memory machine. Proceedings of the 24th Annual ACM Symposium on the Theory of Computing. 318-326.
Quattoni, A., Carreras X.., Collins M., & Darrell T. (2009).  An Efficient Projection for L-1/L-Infinity Regularization.
de Melo, G., Baker C. F., Ide N., Passonneau R. J., & Fellbaum C. (2012).  Empirical Comparisons of MASC Word Sense Annotations.
Dreger, H., Kreibich C., Paxson V., & Sommer R. (2005).  Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
Maier, G., Sommer R., Dreger H., Feldmann A., Paxson V., & Schneider F. (2008).  Enriching Network Security Analysis with Time Travel. 183-194.
Demers, A. J., Greene D., Hauser C., Irish W., Larson J., Shenker S. J., et al. (1987).  Epidemic Algorithms for Replicated Database Maintenance. Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
Datta, A., Lu J., & Tschantz M. Carl (2019).  Evaluating Anti-Fingerprinting Privacy Enhancing Technologies. Proceedings of the WWW'19 (World Wide Web Conference).
de Melo, G. (2012).  Exploiting Web Data Sources for Advanced NLP.
Jia, Y., Salzmann M., & Darrell T. (2010).  Factorized Latent Spaces with Structured Sparsity. 982-990.
Virtanen, S., Jia Y., Klami A., & Darrell T. (2012).  Factorized Multi-Modal Topic Model.
Salzmann, M., Ek C. Henrik, Urtasun R., & Darrell T. (2010).  Factorized Orthogonal Latent Spaces. 701-708.
Docio, L.., Gelbart D., & Morgan N. (2003).  Far-Field ASR on Inexpensive Microphones. Proceedings of Eighth European Conference on Speech Communication and Technology (EUROSPEECH 2003). 2141-2144.
Darken, C., & Moody J. (1990).  Fast, Adaptive K-Means Clustering: Some Empirical Results. Proceedings of the IEEE International Joint Conference on Neural Networks (IJCNN 1990).
Yeh, T., Lee J. J., & Darrell T. (2009).  Fast Concurrent Object Localization and Recognition. 280-287.
DeNero, J., Chiang D.., & Knight K.. (2009).  Fast Consensus Decoding over Translation Forests.
Dhawan, M.., Samuel J.., Teixeira R., Kreibich C., Allman M., Weaver N., et al. (2012).  Fathom: A Browser-based Network Measurement Platform.
Saenko, K., & Darrell T. (2009).  Filtering Abstract Sense from Image Search Results.

Pages