Found 110 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Title is H  [Clear All Filters]
Conference Paper
Makin, J., & Narayanan S. (2013).  A Hybrid-System Model of the Coagulation Cascade. 206-212.
Anguera, X., Aguilo M., Wooters C., Nadeu C., & Hernando J. (2006).  Hybrid Speech/Non-Speech Detector Applied to Speaker Diarization of Meetings. Proceedings of IEEE Odyssey: The Speaker and Language Recognition Workshop. 1-6.
Cohen, M., Franco H., Morgan N., Rumelhart D., & Abrash V. (1992).  Hybrid Neural Network / Hidden Markov Model Continuous Speech Recognition. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 915-918.
Ravuri, S. (2014).  Hybrid MLP/Structured-SVM Tandem Systems for Large Vocabulary and Robust ASR.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.
Vaquero, C.., Vinyals O., & Friedland G. (2010).  A Hybrid Approach to Online Speaker Diarization. 2642-2645.
Stoll, L., & Doddington G. (2010).  Hunting for Wolves in Speaker Recognition. 159-164.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Orr, R., & van Leeuwen D. A. (2009).  A Human Benchmark for Language Recognition. 2175-2178.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Kruse, H., Allman M., Griner J., & Tran D. (1998).  HTTP Page Transfer Rates Over Geo-Stationary Satellite Links. Proceedings of the 6th International Conference on Telecommunication Systems.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Huang, P-S., Mertens R., Divakaran A., Friedland G., & Hasegawa-Johnson M. (2012).  How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection. 505-508.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Ravuri, S., & Wegmann S. (2016).  How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models. Proceedings of Interspeech 2016.
Kay, P., & Sag I. A. (2009).  How Hard A Problem Would This Be To Solve?.
Hong, J., & Baker C. F. (2011).  How Good Is the Crowd at "Real" WSD?.
Nedevschi, S., Ratnasamy S., & Padhye J. (2009).  Hot Data Centers vs. Cool Peers. 8.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. (2003).  Host Mobility Using an Internet Indirection Infrastructure. Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003). 129-144.