Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wawrzynek, J., Patterson D., Oskin M., Lu S-L., Kozyrakis C., Hoe J. C., et al. (2007).  RAMP: Research Accelerator for Multiple Processors. IEEE Micro. 27(2), 46-57.
Wawrzynek, J., Asanović K., Kingsbury B., Beck J., Johnson D., & Morgan N. (1995).  SPERT-II: A Vector Microprocessor System and Its Application to Large Problems in Backpropagation Training. Proceedings of the Advances in Neural Information Processing Systems 8 Conference (NIPS 8). 619-625.
Waterman, A. (2011).  Improving Energy Efficiency and Reducing Code Size with RISC-V Compressed.
Waterman, A., Lee Y., Patterson D., & Asanović K. (2011).  The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA.
Waterman, A. (2011).  Improving Energy Efficiency and Reducing Code Size with RISC-V Compressed.
Warren, W. (2001).  Global Posterior Probability Estimates as Confidence Measures in an Automatic Speech Recognition System. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001).
Warren, W. (2000).  Global Posterior Probability Estimates as Decision Confidence Measures in an Automatic Speech Recognition System.
Wang, J., Majumdar A., & Ramchandran K. (2005).  On Enhancing MPEG Video Broadcast Over Wireless Networks with an Auxiliary Broadcast Channel. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005).
Wang, P. Chuan, Miller S., Fritz M., Darrell T., & Abbeel P. (2011).  Perception for the Manipulation of Socks. 4877-4884.
Wang, Z., Hormozdiari F., Yang W-Y., Halperin E., & Eskin E. (2012).  CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping. 326-340.
Wang, X., Lian L., Miao Z., Liu Z., & Yu S. X. (2021).  Long-tailed Recognition by Routing Diverse Distribution-Aware Experts. Proceedings of International Conference on Learning Representations.
Wang, X., Liu Z., & Yu S. X. (2021).  Unsupervised Feature Learning by Cross-Level Instance-Group Discrimination. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Wang, X., Lian L., & Yu S. X. (2021).  Unsupervised Visual Attention and Invariance for Reinforcement Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Wang, H.., Gelbart D., Hirsch H-G., & Hemmert W. (2008).  The Value of Auditory Offset Adaptation and Appropriate Acoustic Modeling. 902-905.
Wang, R., Li Y., Mahoney M., & Darve E. (2015).  Structured Block Basis Factorization for Scalable Kernel Matrix Evaluation.
Wang, R., & Shapiro V. (2019).  Topological semantics for lumped parameter systems modeling. Advanced Engineering Informatics. 42,
Wang, D., Mahoney M., Mohan N., & Rao S. (2015).  Faster Parallel Solver for Positive Linear Programs via Dynamically-Bucketed Selective Coordinate Descent.
Wang, K., Kellman M., Sandino C. M., Zhang K., Vasanawala S. S., Tamir J. I., et al. (2021).  Memory-efficient Learning for High-Dimensional MRI Reconstruction. Proceedings of International Society for Magnetic Resonance in Medicine.
Wang, J., Chakraborty R., & Yu S. X. (2021).  Spatial Transformer for 3D Point Clouds. IEEE Transactions on Pattern Analysis and Machine Intelligence.
Wang, X., & Yu S. X. (2021).  Tied Block Convolution: Leaner and Better CNNs with Shared Thinner Filters. Proceedings of AAAI Conference on Artificial Intelligence.
Wang, J., Geesman G. J., Hostikka S. Liisa, Atallah M., Blackwell B., Lee E., et al. (2011).  Inhibition of Activated Pericentromeric SINE/Alu Repeat Transcription in Senescent Human Adult Stem Cells Reinstates Self-Renewal. Cell Cycle. 10(17), 3016-3030.
Wang, D., Rao S., & Mahoney M. (2015).  Unified Acceleration Method for Packing and Covering Problems via Diameter Reduction. Proceedings of the 43rd ICALP Conference.
[Anonymous] (1988).  Connectionist Models and Their Applications. (Waltz, D.., & Feldman J., Ed.).
Walfish, M., Stribling J., Krohn M., Balakrishnan H., Morris R., & Shenker S. J. (2004).  Middleboxes No Longer Considered Harmful. Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04). 215-230.
Walfish, M., Balakrishnan H., & Shenker S. J. (2004).  Untangling the Web from DNS. Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004). 225-238.

Pages