Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Stolcke, A., Kajarekar S., & Ferrer L. (2008).  Nonparametric Feature Normalization for SVM-Based Speaker Verification. 1577-1580.
Fosler-Lussier, E., & Williams G. (1999).  Not Just What, But Also When: Guided Automatic Pronunciation Modeling for Broadcast News. Proceedings of the DARPA Broadcast News Transcription and Understanding Workshop.
Moody, J. (1991).  Note on Generalization, Regularization, and Architecture Selection in Nonlinear Learning Systems. Proceedings of the First IEEE-SP Workshop on Neural Networks for Signal Processing. 1-10.
Satzger, B., Bagci F., & Ungerer T. (2010).  A Novel Constraint Satisfaction Problem Solver for Self-Configuring Distributed Systems with Highly Dynamic Behavior.
Satzger, B., Bagci F., & Ungerer T. (2010).  A Novel Constraint Satisfaction Problem Solver for Self-Configuring Distributed Systems with Highly Dynamic Behavior. 1-6.
Kelm, P., Schmiedeke S., Choi J., Friedland G., Ekambaram V., Ramchandran K., et al. (2013).  A Novel Fusion Method for Integrating Multiple Modalities and Knowledge for Multimodal Location Estimation. 7-12.
Lei, H., Choi J., & Friedland G. (2013).  Nowhere to Hide: Exploring User-Verification Across Flickr Accounts.
Henderson, T., Roy S.., Floyd S., & Riley G.. (2006).  NS-3 Project Goals. Proceedings of the Workshop on NS-2 (WNS2 2006).
Mirghafori, N., & Wooters C. (2006).  Nuts and Flakes: A Study of Data Characteristics in Speaker Diarization. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 1017-1020.
Maire, M., Yu S. X., & Perona P. (2011).  Object Detection and Segmentation from Joint Embedding of Parts and Pixels. Proceedings of International Conference on Computer Vision.
Chu, M., Weaver N., Sulimma K., DeHon A., & Wawrzynek J. (1998).  Object Oriented Circuit Generators in Java. Proceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM).
Shriberg, E., Stolcke A., & Baron D. (2001).  Observations on Overlap: Findings and Implications for Automatic Processing of Multi-Party Conversation. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Zhang, L., Shenker S. J., & Clark D. D. (1991).  Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 133-147.
Kohler, E., Li J., Paxson V., & Shenker S. J. (2002).  Observed Structure of Addresses in IP Traffic. Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW). 253-266.
Joseph, D.., Kannan J., Kubota A.., Lakshminarayanan K., Stoica I., & Wehrle K.. (2006).  OCALA: An Architecture for Supporting Legacy Applications Over Overlays. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 267-280.
Ballani, H., Chawathe Y., Ratnasamy S., Roscoe T., & Shenker S. J. (2005).  Off by Default. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Koponen, T., Casado M., Gude N. S., Stribling J., Poutievski L., Zhu M., et al. (2010).  Onix: A Distributed Control Platform for Large-scale Production Networks. 351-364.
Karp, R. M. (1992).  On-line algorithms versus off-line algorithms: how much is it worth to know the future?. Proceedings of the IFIP 12th World Computer Congress on Algorithms, Software, Architecture - Information Processing '92. 416-429.
Oliva, J., Feldman J., Giraldi L., & Dodge E. (2012).  Ontology Driven Contextual Reference Resolution in Embodied Construction Grammar.
Scheffczyk, J., Baker C. F., & Narayanan S. (2006).  Ontology-Based Reasoning about Lexical Resources. Proceedings of the Workshop on Interfacing Ontologies and Lexical Resources for Semantic Web Technologies (OntoLex 2006). 1-8.
Koerner, M., Runge T., Panda A., Ratnasamy S., & Shenker S. J. (2018).  Open Carrier Interface: An Open Source Edge Computing Framework. Proceedings of the 2018 Workshop on Networking for Emerging Applications and Technologies NEAT '18.
Schryen, G., & Kadura R.. (2009).  Open Source vs. Closed Source Software: Towards Measuring Security. 2016-2023.
Rhea, S., P. Godfrey B., Karp B., Kubiatowicz J. D., Ratnasamy S., Shenker S. J., et al. (2005).  OpenDHT: A Public DHT Service and Its Uses. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 73-84.
Shenker, S. J., McKeown N., Anderson T., Balakrishnan H., Parulkar G., Peterson L., et al. (2008).  OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review . 38(2), 71.
Guadarrama, S., Rodner E., Saenko K., Zhang N., Farrell R., Donahue J., et al. (2014).  Open-Vocabulary Object Retrieval.

Pages