Found 183 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Lei, H., & Mirghafori N. (2008).  Comparisons of Recent Speaker Recognition Approaches Based on Word Conditioning.
Leicher, C. (1994).  Hierarchical Encoding of MPEG Sequences Using Priority Encoding Transmission (PET).
Leoncini, M. (1994).  On the Parallel Complexity of Gaussian Elimination with Pivoting.
Leoncini, M., Manzini G., & Margara L. (1997).  Parallel Complexity of Numerically Accurate Linear System Solvers.
Lesser, N.., & Ellis D. P. W. (2005).  Clap Detection and Discrimination for Rhythm Therapy. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 37-40.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Levin, D., Wundsam A., Heller B., Handigol N., & Feldmann A. (2012).  Logically Centralized? State Distribution Tradeoffs in Software Defined Networks.
Levin, A.. U., Leen T. K., & Moody J. (1994).  Fast Pruning Using Principal Components. 6,
Levine, S., Finn C., Darrell T., & Abbeel P. (2016).  End-to-end training of deep visuomotor policies. Journal of Machine Learning Research. 17, 1–40.
Levis, P., Brewer E., Culler D. E., Gay D., Madden S., Patel N., et al. (2008).  The Emergence of a Networking Primitive in Wireless Sensor Networks. Communications of the ACM. 51(7), 99-106.
Levis, P., Patel N., Culler D. E., & Shenker S. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Levit, M., Hakkani-Tür D., Tur G., & Gillick D. (2009).  IXIR: A Statistical Information Distillation System. Journal of Computer Speech and Language. 23(4), 527-542.
Levit, M., & Roy D.. (2007).  Interpretation of Spatial Language in a Map Navigation Task. IEEE Transactions on Systems. 37(3), 667-679.
Levit, M., Boschee E.., & Freedman M. (2007).  Selecting On-topic Sentences from Natural Language Corpora. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 2793-2796.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Li, Z., Goyal A., Chen Y., & Paxson V. (2011).  Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
Li, M. (2003).  SchemaDB - An Extensible Schema Database System Using ECG Representation.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
Li, F.., & Paxson V.. (2018).   A Large-Scale Empirical Study of Security Patches. USENIX ;login:. 43(1), 
Li, H., Ghodsi A., Zaharia M., Shenker S., & Stoica I. (2014).  Reliable, Memory Speed Storage for Cluster Computing Frameworks.
Li, Z., Goyal A., Chen Y., & Paxson V. (2009).  Automating Analysis of Large-Scale Botnet Probing Events. 11-22.
Li, Z., Atre R., Huda Z. Ul, Jannesari A., & Wolf F. (2016).  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117, 282–295.
Liao, Y., & Moody J. (2000).  Constructing Heterogeneous Committees via Input Feature Grouping. 12,
Liao, Y., Moody J., & Wu L. (2002).  Neural Networks for Time Series Analysis.