Publications

Found 110 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Kutten, S., Ostrovsky R., & Patt-Shamir B. (1993).  How and When to Be Unique.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Maass, W., & Turan G. (1990).  How Fast Can A Threshold Gate Learn?.
Hong, J., & Baker C. F. (2011).  How Good Is the Crowd at "Real" WSD?.
Kay, P., & Sag I. A. (2009).  How Hard A Problem Would This Be To Solve?.
Pal, J., Lyman P., Varian H. R., Charles P., Good N., Jordan L. Lamar, et al. (2003).  How Much Information.
Ravuri, S., & Wegmann S. (2016).  How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models. Proceedings of Interspeech 2016.
Omohundro, S., & Mel B. W. (1991).  How Receptive Field Parameters Affect Neural Learning.
Paxson, V. (2009).  How the Pursuit of Truth Led Me to Selling Viagra.
Kotro, T.., Lindh-Knuutila T., & Hiltunen E.. (2009).  How to Analyze Various Consumer Data in the Future?. 135-143.
Plaskota, L. (1995).  How to Benefit From Noise.
Plauché, M., etin Ö. Ç., & Nallasam U. (2007).  How to Build a Spoken Dialog System with Limited (or No) Resources.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Huang, P-S., Mertens R., Divakaran A., Friedland G., & Hasegawa-Johnson M. (2012).  How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection. 505-508.
Ladkin, P., & Reinefeld A. (1991).  How to Solve Interval Constraint Networks: The Definitive Answer - Probably.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Kruse, H., Allman M., Griner J., & Tran D. (1998).  HTTP Page Transfer Rates Over Geo-Stationary Satellite Links. Proceedings of the 6th International Conference on Telecommunication Systems.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Orr, R., & van Leeuwen D. A. (2009).  A Human Benchmark for Language Recognition. 2175-2178.
Regier, T. (1996).  The Human Semantic Potential.
Regier, T. (1996).  The Human Semantic Potential: Spatial Language and Constrained Connectionism.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Stoll, L., & Doddington G. (2010).  Hunting for Wolves in Speaker Recognition. 159-164.
Vaquero, C.., Vinyals O., & Friedland G. (2010).  A Hybrid Approach to Online Speaker Diarization. 2642-2645.
Wermter, S. (1997).  Hybrid Approaches to Neural Network-based Language Processing.

Pages