Publications

Found 118 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Leicher, C. (1994).  Hierarchical Encoding of MPEG Sequences Using Priority Encoding Transmission (PET).
Xing, E. P., Jordan M. I., Karp R. M., & Russell S. (2002).  A Hierarchical Bayesian Markovian Model for Motifs in Biopolymer Sequences.
Feldman, M., Chuang J., Stoica I., & Shenker S. J. (2007).  Hidden-Action in Network Routing. IEEE Journal on Selected Areas in Communications. 25(6), 1161-1172.
Feldman, M., Chuang J., Stoica I., & Shenker S. J. (2005).  Hidden-Action in Multi-Hop Routing. Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05). 117-126.
Lorenzo, A., Metere A., & Dzugutov M. (2018).  Hexatic smectic phase with algebraically decaying bond-orientational order.
Coja-Oghlan, A.., Krumke S.. O., & Nierhoff T. (2003).  A Heuristic for the Stacker Crane Problem on Trees Which is Almost Surely Exact. Algorithms and Computation, 14th International Symposium, ISAAC 2003, LNCS 2906. 605-614.
Karp, R. M. (2011).  Heuristic Algorithms in Computations Molecular Biology. Journal of Computer and System Sciences. 77(1), 122-128.
Ruiz, P. M., & Gómez-Skarmeta A. (2005).  Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh Networks. Lecture Notes in Computer Science. 3738,
Yao, Z.., Gholami A.., Lei Q.., Keutzer K.., & Mahoney M. (2018).  Hessian-based Analysis of Large Batch Training and Robustness to Adversaries. Proceedings of the 2018 NeurIPS Conference. 4954-4964.
Akhawe, D., Amann J., Vallentin M., & Sommer R. (2013).  Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web.
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Dodge, E., & Wright A. (2002).  Herds of Wildebeest, Flasks of Vodka, Heaps of Trouble: An Embodied Construction Grammar Approach to English Measure Phrases. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Aziz-Zadeh, L., Iacoboni M., & Zaidel E. (2005).  Hemispheric Sensitivity to Body Stimuli in Simple Reaction Time. Experimental Brain Research. 170(1), 116-121.
Al-Fares, M.., Radhakrishnan S., Raghavan B., Huang N.., & Vahdat A. (2010).  Hedera: Dynamic Flow Scheduling for Data Center Networks.
Feldman, J., Tsur S.., & Lehman D.. (1971).  Hebrew University Production Language.
Martin, C.. H., & Mahoney M. (2020).  Heavy-Tailed Universality Predicts Trends in Test Accuracies for Very Large Pre-Trained Deep Neural Networks. Proceedings of 2020 SDM Conference.
Jia, Y., & Darrell T. (2011).  Heavy-Tailed Distances for Gradient Based Image Descriptors.
Stern, R. M., & Morgan N. (2012).  Hearing is Believing: Biologically-Inspired Feature Extraction for Robust Automatic Speech Recognition. Signal Processing Magazine. 29(6), 34-43.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., & Paxson V. (2015).  Header Enrichment or ISP Enrichment: Emerging Privacy Threats in Mobile Networks.
Knightly, E. W. (1995).  H-BIND: A New Approach to Providing Statistical Performance Guarantees to VBR Traffic.
Yao, Z., Dong Z., Zheng Z., Gholami A., Yu J., Tan E., et al. (2021).  HAWQV3: Dyadic Neural Network Quantization.
Dong, Z.., Yao Z.., Gholami A.., Mahoney M., & Keutzer K.. (2019).  HAWQ: Hessian AWare Quantization of Neural Networks with Mixed-Precision. Proceedings of ICCV 2019.
Vinyals, O., & Friedland G. (2008).  A Hardware-Independent Fast Logarithm Approximation with Adjustable Accuracy. 61-65.
Salfner, F. (2008).  Hardware Reliability; Software Reliability; Performability.
Cook, H., Moretó M., Bird S., Dao K., Patterson D., & Asanović K. (2013).  A Hardware Evaluation of Cache Partitioning to Improve Utilization and Energy-Efficiency while Preserving Responsiveness.

Pages