Publications

Found 4190 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Torres, E.., Ibáñez P.., Viñals-Yúfera V.., & J. Llaberia M. (2009).  Store Buffer Design for Multibanked Data Caches. IEEE Transactions on Computers. 58(10), 1307-1320.
Toth, B.., Hakkani-Tür D., & Yaman S. (2010).  Summarization- and Learning-Based Approaches to Information Distillation. 5306-5309.
Traub, J. F., & Wozniakowski H. (1990).  Information-Based Complexity: New Questions for Mathematicians.
Traub, J. F., & Wozniakowski H. (1990).  The Monte Carlo Algorithm with a Pseudo-Random Generator.
Traub, J. F., & Wozniakowski H. (1993).  Recent Progress in Information-Based Complexity.
Tresp, V., Briegel T., & Moody J. (1999).  Predicting Blood Glucose Metabolism in Diabetics -- A Machine Learning Solution.
Tresp, V., Moody J., & Delong W.. R. (1993).  Neural Network Modeling of Physiological Processes. 2, 363-378.
Tribowski, C., Spin K., Günther O., & Sielemann O. (2009).  Unternehmensübergreifende RFID-Anwendungen – Eine Fallstudie aus der Möbelindustrie zur RFID-basierten Auftragsabwicklung. Proceedings of the 11th Paderborner Frühjahrstagung (PBFT 2009).
Tribowski, C., Goebel C., & Günther O. (2009).  RFID Context Data Management: The Missing Link to EPCIS-Based Supply Chain Monitoring.
Tribowski, C., Spin K., Günther O., & Sielemann O. (2009).  Storing Data on RFID Tags: A Standards-Based Approach.
Trompf, M. (1992).  Experiments with Noise Reduction Neural Networks for Robust Speech Recognition.
Tsai, T.. J. (2015).  Are You TED Talk Material? Comparing Prosody in Professors and TED Speakers.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  Multimodal Addressee Detection in Multiparty Dialogue Systems.
Tsai, T.. J., & Morgan N. (2013).  Speech Activity Detection: An Economics Approach.
Tsai, T.. J., & Janin A. (2013).  Confidence-Based Scoring: A Useful Diagnostic Tool for Detection Tasks.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction. IEEE Transactions on Multimedia. 17(9), 1550-1561.
Tsai, L., Wijesekera P., Reardon J., Reyes I., Chen J-W., Good N., et al. (2017).  TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences. Proceedings of SOUPS '17.
Tsai, T.. J., & Morgan N. (2012).  Longer Features: They Do a Speech Detector Good.
Tsai, T.. J., & Stolcke A. (2015).  Aligning Meeting Recordings Via Adaptive Fingerprinting. 786-790.
Tsai, T.. J., Friedland G., & Anguera X. (2015).  An Information-Theoretic Metric of Fingerprint Effectiveness.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Tschantz, M. Carl, Datta A., Datta A., & Wing J. M. (2015).  A Methodology for Information Flow Experiments. 2015 IEEE 28th Computer Security Foundations Symposium. 554-568.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2018).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2016).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings.
Tschantz, M. Carl, Afroz S., Paxson V., & Tygar J.D.. (2014).  On Modeling the Costs of Censorship. CoRR. abs/1409.3211,

Pages