Publications

Found 416 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is C  [Clear All Filters]
2011
Ouyang, T., Ray S., Rabinovich M., & Allman M. (2011).  Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?.
Hopfgartner, F. (2011).  Capturing Long-Term User Interests in Online Television News Program.
Janoch, A., Karayev S., Jia Y., Barron J. T., Fritz M., Saenko K., et al. (2011).  A Category-Level 3-D Object Dataset: Putting the Kinect to Work. 1168-1174.
Lei, H., Choi J., & Friedland G. (2011).  City-Identification on Flickr Videos Using Acoustic Features.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Morrison, R., Friedman E., & Landsberg A. S. (2011).  Combinatorial Games with a Pass: A Dynamical Systems Approach.
Morrison, R., Friedman E., & Landsberg A. S. (2011).  Combinatorial Games with a Pass: A dynamical systems approach. Chaos. 21,
Kitzelmann, E. (2011).  A Combined Analytical and Search-Based Approach for the Inductive Synthesis of Functional Programs. Künstliche Intelligenz. 25(2), 179-182.
Meyer, B. T., Ravuri S., Schädler M. René, & Morgan N. (2011).  Comparing Different Flavors of Spectro-Temporal Features for ASR. 1269-1272.
Vinyals, O., & Ravuri S. (2011).  Comparing Multilayer Perceptron to Deep Belief Network Tandem Features for Robust ASR.
Ben-David, Y., Hasan S., Pal J., Vallentin M., Panjwani S.., Gutheim P.., et al. (2011).  Computing Security in the Developing World: A Case for Multidisciplinary Research. 39-44.
Paxson, V., Allman M., Chu J., & Sargent M. (2011).  Computing TCP's Retransmission Timer.
Sanchez, M. Hewlett, Ferrer L., Shriberg E., & Stolcke A. (2011).  Constrained Cepstral Speaker Recognition Using Matched UBM and JFA Training. 141-144.
Cook, H., Gonina E., Kamil S., Friedland G., Patterson D., & Fox A. (2011).  CUDA-Level Performance with Python-Level Productivity for Gaussian Mixture Model Applications.
2010
Tur, G., Stolcke A., Voss L., Peters S., Hakkani-Tür D., Dowding J., et al. (2010).  The CALO Meeting Assistant System. IEEE Transactions on Audio. 18(6), 1601-1611.
Gillick, D. (2010).  Can Conversational Word Usage Be Used to Predict Speaker Demographics?.
Guz, U., Tur G., Hakkani-Tür D., & Cuendet S. (2010).  Cascaded Model Adaptation for Dialog Act Segmentation and Tagging. Journal of Computer Speech and Language. 24(2), 289-306.
Tan, Z., Waterman A., Cook H., Bird S., Asanović K., & Patterson D. (2010).  A Case for FAME: FPGA Architecture Model Execution. 290-301.
Fritz, M., Andriluka M., Fidler S., Stark M., Leonardis A., & Schiele B. (2010).  Categorial Perception. 131-164.
Bracci, P. M., Skibola C. F., Conde L., Halperin E., Lightfoot T., Smith A., et al. (2010).  Chemokine Polymorphisms and Lymphoma: A Pooled Analysis. Leukemia and Lymphoma. 51(3), 497-506.
Caputo, B., Hayman E., Fritz M., & Eklundh J-O. (2010).  Classifying Materials in the Real World. Image and Vision Computing. 28(1), 150-163.
Popa, L., Yu M., Ko S.. Y., Ratnasamy S., & Stoica I. (2010).  CloudPolice: Taking Access Control out of the Network.
Feldman, J. (2010).  Cognitive Science Should Be Unified: Comment on Griffiths et al. and McClelland et al.. Trends in Cognitive Science. 14(8), 339-388.
Salzmann, M., & Urtasun R. (2010).  Combining Discriminative and Generative Methods for 3D Deformable Surface and Articulated Pose Reconstruction. 647-654.
Ferber, M., Rauber T., & Hunold S. (2010).  Combining Object-Oriented Design and SOA with Remote Objects over Web Services. 83-90.

Pages