Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
Pan, X., Chakraborty R., & Yu S. X. (2019).  Visual Similarity from Optimizing Feature and Memory On A Hypersphere. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition .
Friedland, G., Yeo C., & Hung H. (2009).  Visual Speaker Localization Aided by Acoustic Models. 195-202.
Lüning, A.., Friedland G., Knipping L., & Rojas R. (2007).  Visualizing Large-Screen Electronic Chalkboard Content on Handheld Devices. Proceedings of the Second IEEE International Workshop on Multimedia Technologies for E-Learning at 9th IEEE Symposium on Multimedia. 369-375.
Bigi, B., Huang Y., & De Mori R. (2004).  Vocabulary and Language Model Adaptation Using Information Retrieval. Proceedings of International Conference on Spoken Language Processing.
Klisch, R. (1996).  The Voice Mail Digits and Their Performance on ICSI's Hybrid HMM/ANN System.
Rayner, M., Hockey B. Ann, Chatzichrisafis N., Farrell K., & Renders J-M. (2005).  A Voice-Enabled Procedure Browser for the International Space Station. Proceedings of the 43rd Annual Meeting of the Association for Computational Linguistics (ACL 2005). 29-32.
Ziem, A. (2013).  Von der Kasusgrammatik zum FrameNet: Frames, Konstruktionen und die Idee eines Konstruktikons.
Hitchcock, L., & Greenberg S. (2001).  Vowel Height is Intimately Associated with Stress Accent in Spontaneous American English Discourse. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
W
Feldman, J. (1971).  A Way of Looking at Things.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Song, H. Oh, Lee Y. Jae, Jegelka S., & Darrell T. (2014).  Weakly-Supervised Discovery of Visual Pattern Configurations.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. J. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Allman, M. (2000).  A Web Server's View of the Transport Layer.
Al-Qudah, Z., Rabinovich M., & Allman M. (2010).  Web Timeouts and Their Implications.
Bansal, M., & Klein D. (2011).  Web-Scale Features for Full-Scale Parsing. 693-702.
Ellis, D. P. W. (1997).  The Weft: A Representation for Periodic Sounds. The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997). 2, 1307-1310.
Berenbrink, P., & Sauerwald T. (2009).  The Weighted Coupon Collector's Problem and Applications. 449-458.
d'Amore, F., Marchetti-Spaccamela A., & Nanni U. (1992).  The Weighted List Update Problem and the Lazy Adversary.
Yang, J., Chow Y-L., Re C., & Mahoney M. (2015).  Weighted SGD for ℓp Regression with Randomized Preconditioning. Proceedings of the 27th Annual SODA Conference. 558-569.
Leen, T. K., & Moody J. (1993).  Weight-Space Probability Densities and Equilibria in Stochastic Learning.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Fillmore, L. Wong, & Fillmore C. J. (2013).  What Does Text Complexity Mean for English Learners and Language Minority Students?. 1-11.
Weaver, N. (2021).  What Happened in the Kaseya VSA Incident?. Lawfare.
Moody, J., & Wu L. (1997).  What is the True Price? -- State Space Models for High Frequency FX Rates.
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).

Pages