Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
U
Urtasun, R., Fleet D. J., Geiger A., Popović J., Darrell T., & Lawrence N. D. (2008).  Topologically-Constrained Latent Variable Models. 1080-1087.
Urtasun, R. (2009).  Non-Parametric Latent Variable Models for Shape and Motion Analysis.
Uras, C., & Verri A. (1992).  Describing and Recognizing Shape Through Size Functions.
Unger, H. (1998).  A Security Mechanism for the Resource Management in a Web Operating System.
Unger, H., & Böhme T. (1998).  A Fuzzy Based Load Sharing Mechanism for Distributed Systems.
Unger, H., & Daene B. (1995).  Performance Oriented Specification for Heterogenous Parallel Systems Using Graphical Based Specifications.
Umemura, K.., & Okazaki A.. (1991).  Real-Time Transmission and Software Decompression of Digital Video in a Workstation.
Ulrich, R., & Kritzinger P. (1996).  Managing ABR Capacity in Reservation-based Slotted Networks.
Ulrich, R. (1996).  A Management Platform for Global Area ATM Networks.
ulo, O. Č., Hansen-Schirra S., Maksymski K., & Neumann S. (2011).  Empty Links and Crossing Lines: Querying Multilayer Annotation and Alignment in Parallel Corpora. In Translation: Computation. 1(1), 75-104.
ulo, O. Č., & de Melo G. (2012).  Source-Path-Goal: Investigating the Cross-Linguistic Potential of Frame-Semantic Text Analysis. it - Information Technology. 54(3), 147-152.
ulo, O. Č., & Hansen-Schirra S. (2012).  Treebanks in translation studies - the (CroCo) Dependency Treebank.
ulo, O. Č. (2011).  Querying Multilevel Annotation and Alignment for Detecting Grammatical Valence Divergencies. 63-68.
Ulitzky, I.., Karp R. M., & Shamir R. (2008).  Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles. Proceedings of 12th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2008). 347-359.
T
Tzeng, E., Devin C., Hoffman J., Finn C., Peng X., Levine S., et al. (2015).  Towards Adapting Deep Visuomotor Representations from Simulated to Real Environments. CoRR. abs/1511.07111,
Tzeng, E., Hoffman J., Darrell T., & Saenko K. (2015).  Simultaneous Deep Transfer Across Domains and Tasks. The IEEE International Conference on Computer Vision (ICCV). 4068-4076.
Tzeng, E., Devin C., Hoffman J., Finn C., Abbeel P., Levine S., et al. (2016).  Adapting deep visuomotor representations with weak pairwise constraints. Workshop on the Algorithmic Foundations of Robotics (WAFR).
Tuytelaars, T., Fritz M., Saenko K., & Darrell T. (2011).  The NBNN Kernel. 1824-1831.
Turau, V., & Chen W. (1995).  Efficient Implementation of Multi-Methods for Statically Typed Languages.
Tur, G., Guz U., & Hakkani-Tür D. (2006).  Model Adaptation for Dialog Act Tagging. Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 94-97.
Tur, G., Stolcke A., Voss L., Peters S., Hakkani-Tür D., Dowding J., et al. (2010).  The CALO Meeting Assistant System. IEEE Transactions on Audio. 18(6), 1601-1611.
Tur, G., Stolcke A., Voss L., Dowding J., Favre B., Fernández R., et al. (2008).  The CALO Meeting Speech Recognition and Understanding System. 69-72.
Tur, G., Shriberg E., Stolcke A., & Kajarekar S. (2007).  Duration and Pronunciation Conditioned Lexical Modeling for Speaker Verification. 2049-2052.
Tschantz, M. Carl, & Friedland G. (2019).  Privacy Concerns of Multimodal Sensor Systems. The Handbook of Multimodal-Multisensor Interfaces: Foundations, User Modeling, and Common Modality Combinations . 1,
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.

Pages