Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Z
Zhu, Q., Chen B. Y., Morgan N., & Stolcke A. (2004).  On Using MLP Features in LVCSR. Proceedings of International Conference on Spoken Language Processing.
Zhu, Q., Stolcke A., Chen B. Y., & Morgan N. (2005).  Using MLP Features in SRI's Conversational Speech Recognition System. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 2141-2144.
Zhu, Q., Stolcke A., Chen B. Y., & Morgan N. (2004).  Incorporating Tandem/HATs MLP Features into SRI's Conversational Speech Recognition System. Proceedings of the EARS RT-04F Workshop.
Zhu, Q., Chen B. Y., Morgan N., & Stolcke A. (2004).  Tandem Connectionist Feature Extraction for Conversational Speech Recognition. Proceedings of the First International Workshop on Machine Learning for Multimodal Interaction (MLMI 2004).
Zhu, Q., Chen B. Y., Grezl F., & Morgan N. (2005).  Improved MLP Structures for Data-Driven Feature Extraction for ASR. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 2129-2132.
Zhou, T., Lee Y. Jae, Yu S. X., & Efros A. A. (2015).  FlowWeb: Joint Image Set Alignment by Weaving Consistent, Pixel-Wise Correspondences.
Zhou, K., Mo L., Kay P., Kwok V.. P. Y., Ip T. N. M., & Tan L. Hai (2010).  Newly Trained Lexical Categories Produce Lateralized Categorical Perception of Color. 107(22), 9974-9978.
Zheng, J., etin Ö. Ç., Huang M.-Y.., Lei X., Stolcke A., & Morgan N. (2007).  Combining Discriminative Feature, Transform, and Model Training for Large Vocabulary Speech Recognition. 4, 633-636.
Zheng, C., Shen G., Li S., & Shenker S. J. (2006).  Distributed Segment Tree: Support Range Query and Cover Query over DHT. Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS).
Zheng, X., Jiang J., Liang J., Duan H., Chen S.., Wan T., et al. (2015).  Cookies Lack Integrity: Real-World Implications. 707-721.
Zheng, J., & Stolcke A. (2007).  fMPE-MAP: Improved Discriminative Adaptation for Modeling New Domains. 1573-1576.
Zhao, S. Y., & Morgan N. (2008).  Multi-Stream Spectro-Temporal Features for Robust Speech Recognition. 898-901.
Zhao, T., Choi J., & Friedland G. (2020).  DIME: An Online Tool for the Visual Comparison of Cross-modal Retrieval Models. International Conference on Multimedia Modeling. 729-733.
Zhao, S. Y., Ravuri S., & Morgan N. (2009).  Multi-Stream to Many-Stream: Using Spectro-Temporal Features for ASR. 2951-2954.
Zhang, W., Yu S. X., & Teng S-H. (2012).  Power SVM: Generalization with Exemplar Classification Uncertainty. 2144-2151.
Zhang, N., Farrell R., & Darrell T. (2012).  Pose Pooling Kernels for Sub-Category Recognition. 3665-3672.
Zhang, M., Karp B., Floyd S., & Peterson L. (2002).  Improving TCP's Performance Under Reordering with DSACK.
Zhang, W., Fang V., Panda A., & Shenker S. J. (2020).  Kappa: a programming framework for serverless computing. SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 328-343.
Zhang, Y., Paxson V., & Shenker S. J. (2000).  The Stationarity of Internet Path Properties: Routing, Loss, and Throughput.
Zhang, Y., Breslau L., Paxson V., & Shenker S. J. (2002).  On the Characteristics and Origins of Internet Flow Rates. ACM SIGCOMM Computer Communication Review. 32(4), 309-322.
Zhang, N., Paluri M., Ranzato M. Aurelio, Darrell T., & Bourdev L. (2014).  PANDA: Pose Aligned Networks for Deep Attribute Modeling.
Zhang, T.., Yao Z.., Gholami A.., Keutzer K.., Gonzalez J.., Biros G.., et al. (2019).  ANODEV2: A Coupled Neural ODE Evolution Framework. Proceedings of the 2019 NeurIPS Conference.
Zhang, L., Shenker S. J., & Clark D. D. (1991).  Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 133-147.
Zhang, H., & Ferrari D. (1992).  Rate-Controlled Static Priority Queueing.
Zhang, Y., & Paxson V. (2000).  Detecting Stepping Stones. Proceedings of the Ninth USENIX Security Symposium.

Pages