Publications

Found 983 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Banerjea, A., Ferrari D., Mah B. A., Moran M., Verma D. C., & Zhang H. (1994).  Tenet Real-Time Protocol Suite: Design, Implementation, and Experiences.
Banerjea, A., Ferrari D., Mah B. A., Moran M., Verma D. C., & Zhang H. (1994).  Tenet Real-Time Protocol Suite: Design, Implementation, and Experiences.
Morgan, N. (1999).  Temporal Signal Processing for ASR. Proceedings of the IEEE Workshop on Automatic Speech Recognition and Understanding. 9-16.
Ganapathy, S., Motlicek P., Hermansky H., & Garudadri H. (2008).  Temporal Masking for Bit-Rate Reduction in Audio Codec based on Frequency Domain Linear Prediction. 4781-4784.
Rasti, R., Murthy M., Weaver N., & Paxson V. (2015).  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks.
Rasti, R., Murthy M., & Paxson V. (2014).  Temporal Lensing and its Application in Pulsing Denial of Service Attacks.
Moody, J., & Hendel R.. H. (1982).  Temperature Profiles Induced by a Scanning CW Laser Beam. 53(6), 4364-4371.
Bernd, J., Gordo B., Choi J., Morgan B., Henderson N., Egelman S., et al. (2015).  Teaching Privacy: Multimedia Making a Difference. IEEE MultiMedia. 12-19.
Cox, R., Bird S., & Meyer B. (2017).  Teaching Computer Science in the Victorian Certificate of Education: A Pilot Study. Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education.
Medina, A., Fraleigh C.., Taft N., Battacharyya S.., & Diot C. (2002).  A Taxonomy of Traffic Matrices.
Wegmann, S., Faria A., Janin A., Riedhammer K., & Morgan N. (2013).  The Tao of ATWV: Probing the Mysteries of Keyword Search Performance.
Zhu, Q., Chen B. Y., Morgan N., & Stolcke A. (2004).  Tandem Connectionist Feature Extraction for Conversational Speech Recognition. Proceedings of the First International Workshop on Machine Learning for Multimodal Interaction (MLMI 2004).
McCauley, M., Sheng A., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. (2015).  Taking an AXE to L2 Spanning Trees.
S
Antoniotti, M., & Mishra B. (1995).  The Supervisor Synthesis Problem for Unrestricted CTL is NP-complete.
Konig, Y., & Morgan N. (1993).  Supervised and Unsupervised Clustering of the Speaker Space for Connectionist Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech & Signal Processing.
Reynolds, D., Andrews W., Campbell J., Navratil J., Peskin B., Adami A., et al. (2003).  The SuperSID Project: Exploiting High-Level Information for High-Accuracy Speaker Recognition. Proceedings of ICASSP-2003.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1988).  Subtree isomorphism is in random NC. Proceedings of the Third Aegean Workshop on Computing, VLSI Algorithms and Architectures (AWOC 88). 43-52.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1990).  Subtree isomorphism is in random NC. Discrete Applied Mathematics. 29(1), 35-62.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1989).  Subtree Isomorphism is in Random NC.
Xu, P., Yang J., Roosta-Khorasani F., Re C., & Mahoney M. (2016).  Sub-sampled Newton Methods with Non-uniform Sampling. Proceedings of the 2016 NIPS Conference.
Roosta-Khorasani, F., & Mahoney M. (2016).  Sub-Sampled Newton Methods II: Local Convergence Rates.
Roosta-Khorasani, F., & Mahoney M. (2016).  Sub-Sampled Newton Methods I: Globally Convergent Algorithms.
Roosta-Khorasani, F.., & Mahoney M. (2019).  Sub-Sampled Newton Methods. Mathematical Programming. 293-326.
Mitzel, D. J., Estrin D., Shenker S. J., & Zhang L. (1996).  A Study of Reservation Dynamics in Integrated Services Packet Networks. Proceedings of the 15th IEEE Annual Joint Conference on Networking the Next Generation. 2, 871-879.
Chang, N., & Mok E. (2006).  A Structured Context Model for Grammar Learning. Proceedings of the International Joint Conference on Neural Networks (IJCNN 2006). 1604-1611.

Pages