Publications

Found 642 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
Conference Paper
Katabi, D., Handley M., & Rohrs C. (2002).  Internet Congestion Control for High Bandwidth-Delay Product Environments. Proceedings of ACM SIGCOMM 2002.
Ellis, D. P. W., & Reyes M.. (2001).  Investigations Into Tandem Acoustic Modeling for the Aurora Taks. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Günther, O., Ivantysynova L., Rode J., & Ziekow H. (2009).  IT Infrastructures in Manufacturing: Insights from Seven Case Studies.
Rayner, M., Chatzichrisafis N., Bouillon P., Nakao Y., Isahara H., Kanzaki K., et al. (2005).  Japanese Speech Understanding Using Grammar Specialization. Proceedings of the Joint Conference on Human Language Technology and Empirical Methods in Natural Language Processing (HLT-EMNLP 2005). 26-27.
Steidl, S., Riedhammer K., Bocklet T., Hoenig F.., & Noeth E.. (2011).  Java Visual Speech Components for Rapid Application Development of GUI based Speech Processing Applications. 3257-3260.
Riedhammer, K., Favre B., & Hakkani-Tür D. (2008).  A Keyphrase Based Approach to Interactive Meeting Summarization. 153-156.
Ronen, T.., Shani C.., Hope T.., Petruck M. R. L., Abend O., & Shahaf D. (2020).  Language (Re)modelling: Towards Embodied Language Understanding. Proceedings of the Association for Computational Linguistics . 58, 6268–6281.
Franklin, A., Drivonikou V. G., Clifford A., Kay P., Regier T., & Davies I. R. L. (2008).  Lateralization of Categorical Perception of Color Changes with Color Term Acquisition. 105(47), 18221-18225.
Balakrishnan, H., Lakshminarayanan K., Ratnasamy S., Shenker S. J., Stoica I., & Walfish M. (2004).  A Layered Naming Architecture for the Internet. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2004). 343-352.
Feldman, J., & Rovner P. D. (1968).  The Leap Language and Data Structure. Proceedings of the International Federation of Information Processing Societies.
Subramanian, L., Roth V., Stoica I., Shenker S. J., & Katz R. H. (2004).  Listen and Whisper: Security Mechanisms for BGP. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 127-140.
Rao, A., Lakshminarayanan K., Surana S., Karp R. M., & Stoica I. (2003).  Load Balancing in Structured P2P Systems. Second International Workshop on Peer-to-Peer Systems.
Rao, A., Lakshminarayanan K., Surana S., Karp R. M., & Stoica I. (2003).  Load Balancing in Structured P2P Systems. Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03).
Karp, R. M., Rao A., Lakshminarayanan K., Surana S., & Stoica I. (2003).  Load Balancing in Structured P2P Systems. Proceedings of the Second International Workshop on Peer-to-Peer Systems.
Donahue, J., Hendricks L. Anne, Guadarrama S., Rohrbach M., Venugopalan S., Saenko K., et al. (2015).  Long-Term Recurrent Convolutional Networks for Visual Recognition and Description.
Chiang, H-L., Kadur T., Rave W., & Fettweis G. (2016).  Low-complexity spatial channel estimation and hybrid beamforming for millimeter wave links. 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). 1-7.
Jantz, K., Friedland G., Knipping L., & Rojas R. (2007).  A Low-Cost Mobile Pointing and Drawing Device. 121-122.
Chawathe, Y., Ratnasamy S., Breslau L., & Shenker S. J. (2003).  Making Gnutella-Like P2P Systems Scalable. Proceedings of ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM). 407-418.
Grier, C., Ballard L., Caballero J., Chachra N., Dietrich C. J., Levchenko K., et al. (2012).  Manufacturing Compromise: The Emergence of Exploit-as-a-Service. 821-832.
Grier, C., Ballard L., Caballero J., Chachra N., Dietrich C. J., Levchenko K., et al. (2012).  Manufacturing Compromise: The Emergence of Exploit-as-a-Service. 821-832.
Grier, C., Ballard L., Caballero J., Chachra N., Dietrich C. J., Levchenko K., et al. (2012).  Manufacturing Compromise: The Emergence of Exploit-as-a-Service. 821-832.
Kumar, S.., Radoslavov P., Thaler D., Alaettinoglu C.., Estrin D., & Handley M. (1998).  The MASC/BGMP Architecture for Inter-Domain Multicast Routing. Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (SIGCOMM '98).
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2013).  On Measuring the Client-Side DNS Infrastructure. 77-90.
Rizk, R., Marx D.., Schrepfer M.., Zimmermann J.., & Günther O. (2009).  Media Coverage of Online Social Network Privacy Issues in Germany - A Thematic Analysis.
Bouillon, P., Chatzichrisafis N., Hockey B. Ann, Rayner M., Santaholma M., Starlander M., et al. (2005).  A Methodology for Comparing Grammar-Based and Robust Approaches to Speech Understanding. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 1877-1880.

Pages