Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Mańdziuk, J., & Shastri L. (1998).  Incremental Class Learning Approach and Its Application to Handwritten Digit Recognition.
Mańdziuk, J. (1997).  Optimization with the Hopfield network based on correlated noises: an empirical approach.
Mandel, M. I., & Ellis D. P. W. (2009).  The Ideal Interaural Parameter Mask: A Bound on Binaural Separation Systems. 85-88.
Mandal, A., Vergyri D., Wang W., Zheng J., Stolcke A., Tur G., et al. (2008).  Efficient Data Selection for Machine Translation. 261-264.
Malkoc, G., Kay P., & Webster M. A. (2005).  Variations in Normal Color Vision. IV. Binary Hues and Hue Scaling. Journal of the Optical Society of America A. 22(10), 2154-2168.
Malkin, N., Deatrick J., Tong A., Wijesekera P., Wagner D., & Egelman S. (2019).  Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies (PoPETS), 2019.
Malkin, N., Wagner D., & Egelman S. (2022).  Runtime Permissions for Privacy in Proactive Intelligent Assistants. Symposium on Usable Privacy and Security.
Malkin, N., Mathur A., Harbach M., & Egelman S. (2017).  Personalized Security Messaging: Nudges for Compliance with Browser Warnings. Proceedings of the European Workshop on Usable Security (EuroUSEC '17).
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Maletti, A. (2008).  Minimizing Deterministic Weighted Tree Automata. 357-372.
Maletti, A. (2008).  Myhill Nerode Theorem for Recognizable Tree Series --- Revisited. 106-120.
Makin, J., & Narayanan S. (2013).  A Hybrid-System Model of the Coagulation Cascade. 206-212.
Makin, J. (2008).  A Computational Model of Human Blood Clotting: Simulation, Analysis, Control, and Validation.
Makin, J., & Narayanan S. (2008).  Hybrid-System Modeling of Human Blood Clotting.
Makin, J., & Narayanan S. (2012).  Real-Time Control of Human Coagulation. IET Control Theory and Applications. 6(17), 2630-2643.
Makhoul, J.., Baron A.., Bulyko I., Nguyen L.., Ramshaw L.., Stallard D.., et al. (2005).  The Effects of Speech Recognition and Punctuation on Information Extraction Performance. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 57-60.
Maire, M., Yu S. X., & Perona P. (2011).  Object Detection and Segmentation from Joint Embedding of Parts and Pixels. Proceedings of International Conference on Computer Vision.
Maire, M., Narihira T., & Yu S. X. (2016).  Affinity CNN: Learning Pixel-Centric Pairwise Relations for Figure/Ground Embedding. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Maire, M., Yu S. X., & Perona P. (2014).  Reconstructive Sparse Code Transfer for Contour Detection and Semantic Labeling.
Maire, M., & Yu S. X. (2013).  Progressive Multigrid Eigensolvers for Multiscale Spectral Segmentation.
Maire, M., Yu S. X., & Perona P. (2013).  Hierarchical Scene Annotation.
Maier, G., Feldmann A., Paxson V., Sommer R., & Vallentin M. (2011).  An Assessment of Overt Malicious Activity Manifest in Residential Networks.
Maier, G., Schneider F., & Feldmann A. (2010).  A First Look at Mobile Hand-held Device Traffic. 161-170.
Maier, G., Schneider F., & Feldmann A. (2011).  NAT Usage in Residential Broadband Networks.
Maier, G., Sommer R., Dreger H., Feldmann A., Paxson V., & Schneider F. (2008).  Enriching Network Security Analysis with Time Travel. 183-194.

Pages