Publications

Found 1144 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Book Chapter
Kay, P. (2005).  Argument Constructions and the Argument-Adjunct Distinction. 71-98.
Kay, P., & Sag I. A. (2012).  Cleaning up the Big Mess: Discontinuous Dependencies and Complex Determiners.
Kay, P., & Michaelis L.. (2008).  Constructional Meaning and Compositionality.
Boehme, R., & Kirchner M. (2012).  Counter-Forensics: Attacking Image Forensics. 327-366.
Kay, P., & Sag I. A. (2012).  Discontinuous Dependencies and Complex Determiners. 211-238.
Karp, R. M. (2006).  Fair Bandwidth Allocation Without Per-Flow State. 88-110.
Karp, R. M., & Kenyon C. (2003).  A Gambling Game and its Application to the Analysis of Adaptive Randomized Rounding.
Karp, R. M., & Kenyon C. (2003).  A Gambling Game and its Application to the Analysis of Adaptive Randomized Rounding.
Webster, M. A., & Kay P. (2006).  Individual and Population Differences in Focal Colors. 29-54.
Sag, I. A., Boas H. C., & Kay P. (2012).  Introducing Sign-Based Construction Grammar. 1-28.
Regier, T., Kay P., Gilbert A. L., & Ivry R. B. (2010).  Language and Thought: Which Side Are You On, Anyway?. 165-182.
Kay, P., Regier T., Gilbert A. L., & Ivry R. B. (2009).  Lateralized Whorf: Language Influences Perceptual Decision in the Right Visual Field. 261-284.
Kay, P., & Michaelis L.. (2009).  The Meaning of Constructions.
Skočaj, D., Kristan M., Vrečko A., Leonardis A., Fritz M., Stark M., et al. (2010).  Multi-Modal Learning. 265-309.
Asanović, K., Beck J., Johnson D., Kingsbury B., Morgan N., & Wawrzynek J. (1998).  Training Neural Networks with SPERT-II. 345-364.
Conference Paper
Gittens, A.., Rothauge K.., Wang S.., Mahoney M., Gerhardt L.., Prabhat, et al. (2018).  Accelerating Large-Scale Data Analysis by Offloading to High-Performance Computing Libraries using Alchemist. Proceedings of the 24th Annual SIGKDD. 293-301.
Thom, A.., & Kramer O. (2010).  Acceleration of DBSCAN-Based Clustering with Reduced Neighborhood Evaluations. 195-202.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. J. (2008).  Accountable Internet Protocol (AIP). 339-350.
Kääriäinen, M. (2005).  On Active Learning in the Non-Realizable Case. Proceedings of the Foundations of Active Learning Workshop at the 19th Annual Conference on Neural Information Processing Systems (NIPS).
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Saenko, K., Kulis B., Fritz M., & Darrell T. (2010).  Adapting Visual Category Models to New Domains. 213-226.
Satzger, B., Kramer O., & Lässig J. (2010).  Adaptive Heuristic Estimates for Automated Planning Using Regression. 576-581.
Nithyanand, R., Khattak S., Javed M., Vallina-Rodriguez N., Falahrastegar M., Powles J. E., et al. (2016).  Adblocking and Counter-Blocking: A Slice of the Arms Race. Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI '16).
Fritz, M., Black M., Bradski G., Karayev S., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition.
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.

Pages