Publications

Found 405 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Stoica, I., Adkins D., Ratnasamy S., Shenker S., Surana S., & Zhuang S. (2002).  Internet Indirection Infrastructure. 191-202.
Stickles, E., Dodge E., & Hong J. (2014).  A Construction-Driven, MetaNet-Based Approach to Metaphor Extraction and Corpus Analysis.
Stickles, E., David O., Dodge E., & Hong J. (2016).  Formalizing contemporary conceptual metaphor theory: A structured repository for metaphor analysis. MetaNet, Special Issue of Constructions and Frames. 8(2), 
Stickles, E., David O., & Sweetser E. (2014).  Frame Role Type Constraints and Frame Metonymy in Metaphoric Interpretation.
Stewart, R.., Xie Q.., Morneault K.., Sharp C.., Schwarzbauer H.., Taylor T.., et al. (2000).  Stream Control Transmission Protocol.
Stern, R. M., & Morgan N. (2012).  Features Based on Auditory Physiology and Perception. 193-227.
Stern, R. M., & Morgan N. (2012).  Hearing is Believing: Biologically-Inspired Feature Extraction for Robust Automatic Speech Recognition. Signal Processing Magazine. 29(6), 34-43.
Stephens, K.., & Kirkpatrick B. (2011).  Efficiently Solvable Perfect Phylogeny Problems on Binary and k-State Data with Missing Values. Proceedings of the 11th Workshop on Algorithms in Bioinformatics (WABI 2011).
Stenchikova, S.., Hakkani-Tür D., & Tur G. (2006).  QASR: Question Answering Using Semantic Roles for Speech Interface. Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006). 1185-1188.
Stemann, V. (1996).  Parallel Balanced Allocation.
Steidl, S., Riedhammer K., Bocklet T., Hoenig F.., & Noeth E.. (2011).  Java Visual Speech Components for Rapid Application Development of GUI based Speech Processing Applications. 3257-3260.
Staunton, P. (1995).  Tenet Suite 1 and the Continuous Media Toolkit.
Stantchev, V. (2008).  Effects of Replication on Web Service Performance in WebSphere.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Staniford, S., Moore D., Paxson V., & Weaver N. (2004).  The Top Speed of Flash Worms. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Stafford, S. (2005).  The Sequential GMM: A Gaussian Mixture Model Based Speaker Verification System that Captures Sequential Information.
Staff, ICSI. (1992).  ICSI Annual Report 1992.
Staff, ICSI. (2001).  ICSI Annual Report 2001.
Staff, ICSI. (2006).  ICSI Annual Report 2006.
Staff, ICSI. (1996).  ICSI Annual Report 1996.
Staff, ICSI. (2005).  ICSI Annual Report 2005.
Staff, ICSI. (2014).  ICSI Annual Report 2014.
Staff, ICSI. (1991).  ICSI Annual Report 1991.
Staff, ICSI. (2002).  ICSI Annual Report 2002.
Staff, ICSI. (2009).  ICSI Annual Report 2009.

Pages