Found 4190 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Vallina-Rodriguez, N., Sundaresan S., Razaghpanah A., Nithyanand R., Allman M., Kreibich C., et al. (2016).  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2015).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2014).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Vallina-Rodriguez, N., Aucinas A., Almeida M., Grunenberger Y., Papagiannaki K., & Crowcroft J. (2013).  RILAnalyzer: A Comprehensive 3G Monitor On Your Phone.
Vallina, P.., Feal Á., Gamba J.., Vallina-Rodriguez N., & Anta A.F.. (2019).  Tales From the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. Proceedings of the Internet Measurement Conference. 245-258.
Vallet, D., Hopfgartner F., Jose J. M., & Castells P. (2011).  Effects of Usage Based Feedback on Video Retrieval: A Simulation Based Study. ACM Transactions on Information Systems. 29(2), 
Vallentin, M., Paxson V., & Sommer R. (2016).  VAST: A Unified Platform for Interactive Network Forensics. Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
Vallentin, M., Sommer R., Lee J., Leres C.., Paxson V., & Tierney B. (2007).  The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
Valente, F., Magimai-Doss M., Plahl C., & Ravuri S. (2009).  Hierarchical Processing of the Modulation Spectrum for GALE Mandarin LVCSR System. 2963-2966.
Valente, F., Magimai-Doss M., Plahl C., Ravuri S., & Wang W. (2010).  A Comparative Large Scale Study of MLP Features for Mandarin ASR. 2630-2633.
Utans, J. (1993).  Mixture Models and the EM Algorithm for Object Recognition within Compositional Hierarchies. Part 1: Recognition.
Utans, J., & Moody J. (1991).  Selecting Neural Network Architecture via the Prediction Risk: Application to Corporate Bond Rating Prediction. Proceedings of the First International Conference on Artificial Intelligence Applications on Wall Street.
Utans, J., Moody J., Rehfuss S., & Siegelmann H.. (1995).  Selecting Input Variables via Sensitivity Analysis: Application to Predicting the U.S. Business Cycle. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
Urtasun, R., Geiger A., & Darrell T. (2009).  Rank Priors for Continuous Non-Linear Dimensionality Reduction.
Urtasun, R., Fleet D. J., Geiger A., Popović J., Darrell T., & Lawrence N. D. (2008).  Topologically-Constrained Latent Variable Models. 1080-1087.
Urtasun, R. (2009).  Non-Parametric Latent Variable Models for Shape and Motion Analysis.
Urtasun, R., & Darrell T. (2008).  Local Probabilistic Regression for Activity-Independent Human Pose Inference.
Uras, C., & Verri A. (1992).  Describing and Recognizing Shape Through Size Functions.
Unger, H., & Daene B. (1995).  Performance Oriented Specification for Heterogenous Parallel Systems Using Graphical Based Specifications.
Unger, H. (1998).  A Security Mechanism for the Resource Management in a Web Operating System.
Unger, H., & Böhme T. (1998).  A Fuzzy Based Load Sharing Mechanism for Distributed Systems.
Umemura, K.., & Okazaki A.. (1991).  Real-Time Transmission and Software Decompression of Digital Video in a Workstation.
Ulrich, R., & Kritzinger P. (1996).  Managing ABR Capacity in Reservation-based Slotted Networks.
Ulrich, R. (1996).  A Management Platform for Global Area ATM Networks.
ulo, O. Č., & de Melo G. (2012).  Source-Path-Goal: Investigating the Cross-Linguistic Potential of Frame-Semantic Text Analysis. it - Information Technology. 54(3), 147-152.