Publications

Found 270 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2015).  Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR. abs/1510.07338,
Fillmore, C. J., Johnson C. R., & Petruck M. R. L. (2003).  Background to Framenet. International Journal of Lexicography. 235-250.
Ji, G., & Bilmes J. A. (2006).  Backoff Model Training Using Partially Observed Data: Application to Dialog Act Tagging. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2006). 280-287.
Xing, E. P., Sharan R., & Jordan M. I. (2004).  Bayesian Haplotype Inference via the Dirichlet Process. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNP and Haplotypes. 99-112.
Xing, E. P., Sharan R., & Jordan M. I. (2004).  Bayesian Haplotype Inference via the Dirichlet Process. Proceedings of ICML 2004.
Wooters, C., Jurafsky D., Tajchman G., & Morgan N. (1993).  The Berkeley Restaurant Project. Proceedings of the Speech Research Symposium XIII. 119-128.
Jurafsky, D., Wooters C., Tajchman G., Segal J., Stolcke A., Fosler-Lussier E., et al. (1994).  The Berkeley Restaurant Project. Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94). 2139-2142.
Afroz, S., Javed M., Paxson V., Qazi S. Asif, Sajid S., & Tschantz M. Carl (2018).  A Bestiary of Blocking The Motivations and Modes behind Website Unavailability.
Kantchelian, A., Tschantz M. Carl, Afroz S., Miller B., Shankar V., Bachwani R., et al. (2015).  Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
De Carli, L., Sommer R., & Jha S. (2014).  Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
Jia, Y., Huang C., & Darrell T. (2012).  Beyond Spatial Pyramids: Receptive Field Learning for Pooled Image Features. 3370-3377.
Batten, C., Joshi A., Orcutt J., Khilo A., Moss B., Holzwarth C., et al. (2009).  Building Many-Core Processor-to-DRAM Networks with Monolithic CMOS Silicon Photonics. IEEE Micro. 29(4), 8-21.
Batten, C., Joshi A., Orcutt J., Khilo A., Moss B., Holzwarth C., et al. (2008).  Building Manycore Processor-to-DRAM Networks with Monolithic Silicon Photonics. 21-30.
Tajchman, G., Fosler-Lussier E., & Jurafsky D. (1995).  Building Multiple Pronunication Models for Novel Words using Exploratory Computational Phonology. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).

Pages