Found 4190 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Tsai, T.. J. (2015).  Are You TED Talk Material? Comparing Prosody in Professors and TED Speakers.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  Multimodal Addressee Detection in Multiparty Dialogue Systems.
Tsai, T.. J., & Morgan N. (2013).  Speech Activity Detection: An Economics Approach.
Tsai, T.. J., & Janin A. (2013).  Confidence-Based Scoring: A Useful Diagnostic Tool for Detection Tasks.
Trompf, M. (1992).  Experiments with Noise Reduction Neural Networks for Robust Speech Recognition.
Tribowski, C., Spin K., Günther O., & Sielemann O. (2009).  Storing Data on RFID Tags: A Standards-Based Approach.
Tribowski, C., Spin K., Günther O., & Sielemann O. (2009).  Unternehmensübergreifende RFID-Anwendungen – Eine Fallstudie aus der Möbelindustrie zur RFID-basierten Auftragsabwicklung. Proceedings of the 11th Paderborner Frühjahrstagung (PBFT 2009).
Tribowski, C., Goebel C., & Günther O. (2009).  RFID Context Data Management: The Missing Link to EPCIS-Based Supply Chain Monitoring.
Tresp, V., Briegel T., & Moody J. (1999).  Predicting Blood Glucose Metabolism in Diabetics -- A Machine Learning Solution.
Tresp, V., Moody J., & Delong W.. R. (1993).  Neural Network Modeling of Physiological Processes. 2, 363-378.
Traub, J. F., & Wozniakowski H. (1990).  The Monte Carlo Algorithm with a Pseudo-Random Generator.
Traub, J. F., & Wozniakowski H. (1993).  Recent Progress in Information-Based Complexity.
Traub, J. F., & Wozniakowski H. (1990).  Information-Based Complexity: New Questions for Mathematicians.
Toth, B.., Hakkani-Tür D., & Yaman S. (2010).  Summarization- and Learning-Based Approaches to Information Distillation. 5306-5309.
Torres, E.., Ibáñez P.., Viñals-Yúfera V.., & J. Llaberia M. (2009).  Store Buffer Design for Multibanked Data Caches. IEEE Transactions on Computers. 58(10), 1307-1320.
Torrent, T. Timponi, Ellsworth M., Baker C. F., & Matos E. Edison da (2018).  The Multilingual FrameNet Shared Annotation Task: a Preliminary Report.
Torrent, TT., Baker CF., Czulo O., Ohara K., & Petruck M. R. L. (2020).  Proceedings of the LREC International FrameNet Workshop 2020: Towards a Global, Multilingual FrameNet.
Torrent, T. Timponi, & Ellsworth M. (2013).  Behind the Labels: Criteria for Defining Analytical Categories in FrameNet Brazil. 17(1), 44-65.
Töpfer, A., Zagordi O., Prabhakaran S., Roth V., Halperin E., & Beerenwinkel N. (2013).  Probabilistic Inference of Viral Quasispecies Subject to Recombination. Journal of Computational Biology. 20(2), 113-123.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Tootoonchian, A., Gorbunov S., Ganjali Y., Casado M., & Sherwood R. (2012).  On Controller Performance in Software-Defined Networks.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Tombros, T., & Crestani F. (1999).  A Study of Users' Perception of Relevance of Spoken Documents.
Tolley, W. J., Kujath B., Khan M. Taha, Vallina-Rodriguez N., & Crandall J. R. (2021).  Blind In/On-Path Attacks and Applications to VPNs. 30th USENIX Security Symposium '21. 3129-3146.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.