Publications

Found 575 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
Conference Paper
van Hout, J., Ferrer L., Vergyri D., Scheffer N., Lei Y., Mitra V., et al. (2014).  Calibration and Multiple System Fusion for Spoken Term Detection Using Linear Logistic Regression.
Tur, G., Stolcke A., Voss L., Dowding J., Favre B., Fernández R., et al. (2008).  The CALO Meeting Speech Recognition and Understanding System. 69-72.
Elizalde, B. Martinez, Lei H., Friedland G., & Peters N. (2013).  Capturing the Acoustic Scene Characteristics for Audio Scene Detection.
Vo, H., Lee Y., Waterman A., & Asanović K. (2013).  A Case for OS-Friendly Hardware Accelerators.
Chawathe, Y., Ramabhadran S., Ratnasamy S., LaMarca A., Shenker S., & Hellerstein J. M. (2005).  A Case Study in Building Layered DHT Applications. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 97-108.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Lesser, N.., & Ellis D. P. W. (2005).  Clap Detection and Discrimination for Rhythm Therapy. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 37-40.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Althaus, E., Kohlbacher O., Lenhof H-P., & Müller P. (2000).  A Combinatorial Approach to Protein Docking with Flexible Side-Chains. Proceedings of the Fourth Annual International conference on Computational Molecular Biology (RECOMB-00).
Morrison, R., Friedman E., & Landsberg A. S. (2011).  Combinatorial Games with a Pass: A Dynamical Systems Approach.
Lecouteux, B.., Linarès G.., & Favre B. (2009).  Combined Low Level and High Level Features for Out-of-Vocabulary Word Detection. 1187-1190.
Lecouteux, B.., Linarès G.., & Favre B. (2009).  Combined Low Level and High Level Features for Out-of-Vocabulary Word Detection. 1187-1190.
Zheng, J., etin Ö. Ç., Huang M.-Y.., Lei X., Stolcke A., & Morgan N. (2007).  Combining Discriminative Feature, Transform, and Model Training for Large Vocabulary Speech Recognition. 4, 633-636.
Liu, Y., Stolcke A., Shriberg E., & Harper M. P. (2004).  Comparing and Combining Generative and Posterior Probability Models: Some Advances in Sentence Boundary Detection in Speech. Proceedings of Conference on Empirical Methods in Natural Language Processing.
Liu, Y., & Shriberg E. (2007).  Comparing Evaluation Metrics for Sentence Boundary Detection. 4, 185-188.
Liu, Y., Shriberg E., Stolcke A., & Harper M. P. (2005).  Comparing HMM, Maximum Entropy, and Conditional Random Fields for Disfluency Detection. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 3313-3316.
Laskowski, K., & Shriberg E. (2010).  Comparing the Contributions of Context and Prosody in Text-Independent Dialog Act Recognition. 5374-5377.
Kääriäinen, M., & Langford J. (2005).  A Comparison of Tight Generalization Error Bounds. Proceedings of the 22nd International Conference on Machine Learning (ICML 2005). 409-416.
Lei, H., & Mirghafori N. (2008).  Comparisons of Recent Speaker Recognition Approaches Based on Word Conditioning.
Harren, M.., Hellerstein J. M., Huebsch R., Loo B. Thau, Shenker S., & Stoica I. (2002).  Complex Queries in DHT-based Peer-to-Peer Networks. Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02). 2429, 242-250.
Liu, D., Allman M., Jin S., & Wang L. (2007).  Congestion Control Without a Startup Phase.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Dunietz, J., Levin L., & Petruck M. R. L. (2017).  Construction Detection in a Conventional NLP Pipeline. Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding. 178-184.

Pages