Found 295 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Maire, M., Yu S. X., & Perona P. (2014).  Reconstructive Sparse Code Transfer for Contour Detection and Semantic Labeling.
Makin, J., & Narayanan S. (2012).  Real-Time Control of Human Coagulation. IET Control Theory and Applications. 6(17), 2630-2643.
Mani, D.. R., & Shastri L. (1993).  Reflexive Reasoning with Multiple-Instantiation in in a Connectionist Reasoning System with a Typed Hierarchy. 5, 205-242.
Mao, Z. Morley, Govindan R., Varghese G., & Katz R. H. (2002).  Route Flap Dampening Exacerbates Internet Routing Convergence. Proceedings of the ACM SIGCOMM 2002.
Martin, M.., Maycock J.., Schmidt F.., & Kramer O. (2010).  Recognition of Manual Motions with Dimension Reduction and Dynamic Time Warping. Proceedings of the Fifth International Conference on Hybrid Artificial Intelligence Systems (HAIS 2010). 1, 221-228.
Mathis, M., Mahdavi J., Floyd S., & Romanow A. (1996).  RFC 2018: TCP Selective Acknowledgment Options.
Mavronicolas, M., & Sauerwald T. (2009).  A Randomized, O(log w)-Depth 2-Smoothing Network. 178-187.
McClure, S., Ratnasamy S., Bansal D., & Padhye J. (2021).  Rethinking networking abstractions for cloud tenants. HotOS '21: Proceedings of the Workshop on Hot Topics in Operating Systems. 41-48.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Mittal, R., Shpiner A., Panda A., Zahavi E., Krishnamurthy A., Ratnasamy S., et al. (2018).  Revisiting network support for RDMA. Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication SIGCOMM '18.
Mnich, M. (2011).  Review of F. V. Fomin and D. Kratsch, "Exact Exponential Algorithms". Operations Research Letters. 39(3), 229-230.
Moody, J., & Saffell M. (1998).  Reinforcement Learning for Trading: Immediate vs. Future Rewards. Knowledge Discovery and Datamining, Proceedings of the 1998 New York Conference.
Moody, J., Shapere A. D., & Wilczek F. (1986).  Realizations of Magnetic Monopole Gauge Fields: Diatoms and Spin-Precession. 56,
Moody, J., & Saffell M. (1999).  Reinforcement Learning for Trading. Advances in Neural Information Processing Systems 11.
Moody, J., & Rögnvaldsson T. S. (2003).  Regularizers and Priors for Feed-Forward Networks.
Moody, J., Saffell M., Liao Y., & Wu L. (1998).  Reinforcement Learning for Trading Systems and Portfolios. Decision Technologies for Computational Finance, Proceedings of the London Conference.
Moon, D., Casado M., Koponen T., & Shenker S. J. (2008).  Rethinking Packet Forwarding Hardware. 1-6.
Morgan, N. (1990).  The Ring Array Processor (RAP): Algorithms and Architecture.
Morgan, N., Ellis D. P. W., Fosler-Lussier E., Janin A., & Kingsbury B. (1999).  Reducing Errors by Increasing the Error Rate: MLP Acoustic Modeling for Broadcast News Transcription. Proceedings of the DARPA Broadcast News Transcription and Understanding Workshop.
Morgan, N., & Hermansky H. (1992).  RASTA Extensions: Robustness to Additive and Convolutional Noise. Proceedings of the Workshop on Speech Processing in Adverse Conditions. 115-118.
Morgan, N. (1997).  Robust Features and Environmental Compensation: A Few Comments. Proceedings of the ESCA Workshop of Robust Speech Recognition. 43-44.