Publications

Found 223 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Hemmerling, A. (1996).  Computability of String Functions Over Algebraic Structures (Preliminary Version).
Hellerstein, L., Gibson G. A., Karp R. M., Katz R.. M., & Patterson D. (1994).  Coding techniques for handling failures in large disk arrays. Algorithmica. 12(2-3), 182-208.
Hellerstein, J. M., Paxson V., Peterson L., Roscoe T., Shenker S. J., & Wetherall D. (2005).  The Network Oracle. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
Hellerstein, L., & Karpinski M. (1991).  Computational Complexity of Learning Read-Once Formulas over Different Bases.
Hellerstein, L., & Karpinski M. (1989).  Learning Read-Once Formulas Using Membership Queries.
Heller, B., Erickson D., McKeown N., Griffith R., Ganichev I., Whyte S., et al. (2010).  Ripcord: A Modular Platform for Data Center Networking.
Heller, B., Scott C., McKeown N., Shenker S. J., Wundsam A., Zeng H., et al. (2013).  Leveraging SDN Layering to Systematically Troubleshoot Networks.
Heller, B., Erickson D., McKeown N., Griffith R., Ganichev I., Whyte S., et al. (2010).  Ripcord: A Modular Platform for Data Center Networking. 457-458.
Helbig, H. (1997).  User-Friendly Information Retrieval in Data Bases and in the World Wide Web.
Helbig, H. (1997).  Multilayered Extended Semantic Networks-The MESNET Paradigm.
Heiner, M. (1992).  Petri Net Based Software Validation: Prospects and Limitations.
Hein, T.., & Kramer O. (2010).  Recognition and Visualization of Music Sequences Using Self-Organizing Feature Maps. 160-167.
Heidemann, J., Silva F., Intanagonwiwat C., Govindan R., Estrin D., & Ganesan D. (2001).  Building Efficient Wireless Sensor Networks With Low-Level Naming. Proceedings of the Symposium on Operating Systems Principles.
Heffner, W. (1995).  Scaling Issues in the Design and Implementation of the Tenet RCAP2 Signaling Protocol.
Hébert, M., & Mirghafori N. (2004).  Desperately Seeking Impostors: Data-Mining for Competitive Impostor Testing in a Text-Dependent Speaker Verification System. Proceedings of IEEE ICASSP.
He, X., Papadopoulos C., & Radoslavov P. (2003).  A Framework for Incremental Deployment Strategies for Router-Assisted Services. Proceedings of the IEEE Infocom 2003.
He, X., Papadopoulos C., Radoslavov P., & Govindan R. (2001).  A Comparison of Incremental Deployment Strategies for Router-Assisted Reliable Multicast.
He, D., Zaitlen N., Pasaniuc B., Eskin E., & Halperin E. (2011).  Genotyping Common and Rare Variation Using Overlapping Pool Sequencing. BMC Informatics. 12,
He, D., Zaitlen N., Pasaniuc B., Eskin E., & Halperin E. (2011).  Genotyping Common and Rare Variation Using Overlapping Pool Sequencing. Proceedings of the First Annual RECOMB Satellite Workshop on Massively Parallel Sequencing (RECOMB-seq). 26-27.
He, X., Papadopoulos C., & Radoslavov P. (2006).  Incremental Deployment Strategies for Router-Assisted Reliable Multicast. IEEE/ACM Transactions on Networking. 14(4), 779-792.
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
Haussler, D., Patterson D., Diekhans M., Fox A., Jordan M. I., Joseph A. D., et al. (2012).  A Million Cancer Genome Warehouse.
Hauenstein, A. (1996).  The Syllable Re-revisited.
Hatch, A. (2006).  Kernel Optimization for Support Vector Machines: Application to Speaker Verification.
Hatch, A., Kajarekar S., & Stolcke A. (2006).  Within-Class Covariance Normalization for SVM-Based Speaker Recognition. Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006). 1471-1474.

Pages