Found 4169 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Hermansky, H., & Morgan N. (1992).  Towards Handling the Acoustic Environment in Spoken Language Processing. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 85-88.
Petruck, M. R. L. (2005).  Towards Hebrew FrameNet.
Khattak, S., Javed M., Anderson P. D., & Paxson V. (2013).  Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
Bourlard, H., Hermansky H., & Morgan N. (1996).  Towards Increasing Speech Recognition Error Rates. Speech Communication. 205-231.
Boehme, R. (2010).  Towards Insurable Network Architectures. Journal of Information Technology. 52(5), 290-293.
Fritz, M., & Schiele B. (2009).  Towards Integration of Different Paradigms in Modeling, Representation and Learning of Visual Categories. 324-347.
Satzger, B., Bagci F., Kluge F., & Ungerer T. (2010).  Towards Lightweight Self-Configuration in Wireless Sensor Networks. 791-792.
Nechaev, B., Paxson V., Allman M., Bennett M., & Gurtov A. (2013).  Towards Methodical Calibration: A Case Study of Enterprise Switch Measurements.
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Sander, T., & Tschudin C. F. (1997).  Towards Mobile Cryptography.
Cleve, R. (1990).  Towards Optimal Simulations of Formulas by Bounded-Width Programs.
Ben-Dor, A., Hartman T., Karp R. M., Schwikowski B., Sharan R., & Yakhini Z. (2004).  Towards Optimally Multiplexed Applications of Universal Arrays. Journal of Computational Biology. 11, 477-493.
Ben-Dor, A., Hartman T., Schwikowski B., Sharan R., & Yakhini Z. (2003).  Towards Optimally Multiplexed Applications of Universal DNA Tag Systems. Proceedings of the Seventh Annual International Conference on Research in Computational Molecular Biology (RECOMB'03).
Ermolinskiy, A., Katti S., Shenker S., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
Marzo, J. L., Maryni P.., & Vilà P. (2001).  Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS Case. Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001).
Wooters, C., Fung J., Peskin B., & Anguera X. (2004).  Towards Robust Speaker Segmentation: The ICSI-SRI Fall 2004 Diarization System. Proceedings of Fall 2004 Rich Transcription Workshop (RT-04F).
Mirghafori, N., Fosler-Lussier E., & Morgan N. (1996).  Towards Robustness to Fast Speech in ASR. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP-96).
Vinyals, O., & Friedland G. (2008).  Towards Semantic Analysis of Conversations: A System for the Live Identification of Speakers in Meetings. 426-431.
Li, Z., Goyal A., Chen Y., & Paxson V. (2011).  Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
Lei, H. (2009).  Towards Structured Approaches to Arbitrary Data Selection and Performance Prediction for Speaker Recognition.
Bourlard, H., Dupont S., Hermansky H., & Morgan N. (1996).  Towards Subband-Based Speech Recognition. Proceedings of the VIII European Signal Processing Conference (EUSIPCO '96). 1579-1582.
Feldman, J. (1978).  Towards Symbolic Models of Neural Nets.
Baumbach, J., Rahmann S., & Tauch A. (2009).  Towards the Integrated Analysis, Visualization, and Reconstruction of Microbial Gene Regulatory Networks. Briefings in Bioinformatics. 10(1), 75-83.
Bonzon, P. E. (1995).  A Tower Architecture for Meta-Level Inference Systems Based on Omega-OrderedHorn Theories.
Allman, M., Barford P., Krishnamurty B., & Wang J. (2006).  Tracking the Role of Adversaries in Measuring Unwanted Traffic. Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.