Found 110 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is H  [Clear All Filters]
Conference Paper
Sivadas, S., & Hermansky H. (2002).  Hierarchical Tandem Feature Extraction. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Qazi, Z. Ayyub, Walls M., Panda A., Sekar V., Ratnasamy S., & Shenker S. (2017).  A High Performance Packet Core for Next Generation Cellular Networks.. Proceedings of the Conference of the ACM Special Interest Group on Data Communication SIGNCOMM '17.
Pang, R., & Paxson V. (2003).  A High-level Programming Environment for Packet Trace Anonymization and Transformation. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003).
Ziekow, H., Fabian B., & Müller C. (2009).  High-Speed Access to RFID Data: Meeting Real-Time Requirements in Distributed Value Chains. 142-151.
Gelbart, D., Morgan N., & Tsymbal A.. (2009).  Hill-Climbing Feature Selection for Multi-Stream ASR. 2967-2970.
Sommer, R., Vallentin M., De Carli L., & Paxson V. (2014).  HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S., et al. (2005).  HLP: A Next-Generation Interdomain Routing Protocol. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 13-24.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. (2007).  Holding the Internet Accountable. 1-7.
Duan, H., Weaver N., Zhao Z., Hu M., Liang J., Jiang J., et al. (2012).  Hold-On: Protecting Against On-Path DNS Poisoning.
Meyer, B. T., Spille C., Kollmeier B., & Morgan N. (2012).  Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. (2003).  Host Mobility Using an Internet Indirection Infrastructure. Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003). 129-144.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Nedevschi, S., Ratnasamy S., & Padhye J. (2009).  Hot Data Centers vs. Cool Peers. 8.
Hong, J., & Baker C. F. (2011).  How Good Is the Crowd at "Real" WSD?.
Kay, P., & Sag I. A. (2009).  How Hard A Problem Would This Be To Solve?.
Ravuri, S., & Wegmann S. (2016).  How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models. Proceedings of Interspeech 2016.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Huang, P-S., Mertens R., Divakaran A., Friedland G., & Hasegawa-Johnson M. (2012).  How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection. 505-508.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Kruse, H., Allman M., Griner J., & Tran D. (1998).  HTTP Page Transfer Rates Over Geo-Stationary Satellite Links. Proceedings of the 6th International Conference on Telecommunication Systems.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Orr, R., & van Leeuwen D. A. (2009).  A Human Benchmark for Language Recognition. 2175-2178.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Stoll, L., & Doddington G. (2010).  Hunting for Wolves in Speaker Recognition. 159-164.
Vaquero, C.., Vinyals O., & Friedland G. (2010).  A Hybrid Approach to Online Speaker Diarization. 2642-2645.