Found 181 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Ribeiro, M. Túlio, Guerra P. H. Calais, Vilela L., Veloso A., Guedes D., Meira, Jr. W., et al. (2011).  Spam Detection Using Web Page Content: A New Battleground.
Richter, P., Wohlfart F., Vallina-Rodriguez N., Allman M., Bush R., Feldmann A., et al. (2016).  A Multi-perspective Analysis of Carrier-Grade NAT Deployment. Proceedings of ACM Internet Measurement Conference.
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Richter, M. M. (1997).  Perspectives on the Integration of Fuzzy and Case-Based Reasoning Systems.
Richter, M. M. (1997).  Generalized Planning and Information Retrieval.
Richter, D. (1992).  Ambiguities in Object Specifications in View of Data Testing.
Riedhammer, K., Favre B., & Hakkani-Tür D. (2010).  Long Story Short - Global Unsupervised Models for Keyphrase Based Meeting Summarization. Speech Communication. 52(10), 801-815.
Riedhammer, K., Favre B., & Hakkani-Tür D. (2008).  A Keyphrase Based Approach to Interactive Meeting Summarization. 153-156.
Riedhammer, K., Gillick D., Favre B., & Hakkani-Tür D. (2008).  Packing the Meeting Summarization Knapsack. 2434-2437.
Rieger, B. B. (1991).  On Distributed Representation in Word Semantics.
Rizk, R., Marx D.., Schrepfer M.., Zimmermann J.., & Günther O. (2009).  Media Coverage of Online Social Network Privacy Issues in Germany - A Thematic Analysis.
Roark, B.., Liu Y., Harper M. P., Stewart R.., Lease M.., Snover M.., et al. (2006).  Reranking for Sentence Boundary Detection in Conversational Speech. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 1, 545-548.
Robinson, A.., Almeida L.., Boite J.., Bourlard H., Fallside F., Hochberg H.., et al. (1993).  A Neural Network Based, Speaker Independent, Large Vocabulary, Continuous Speech Recognition System: the Wernicke Project. Proceedings of the Third European Conference on Speech Communication and Technology (Eurospeech '93). 1941-1944.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Scalable Transform-Based Domain Adaptation.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Transform-Based Domain Adaptation for Big Data.
Rodrigues, H., Santos J. Renato, Turner Y., Soares P., & Guedes D. (2011).  Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter Networks.
Rodriguez, N.., & Ierusalimschy R. (1994).  Side Effect Free Functions in Object-Oriented Languages.
Rohrbach, A., Rohrbach M., Tandon N., & Schiele B. (2015).  A Dataset for Movie Description.
Rohrbach, A., Rohrbach M., Qiu W., Friedrich A., Pinkal M., & Schiele B. (2014).  Coherent Multi-Sentence Video Description with Variable Level of Detail. 8753, 184-195.
Rojas, R. (1993).  Second Order Backpropagation - Efficient Computation of the Hessian Matrix for Neural Networks.
Ronen, R.., Gan I.., Modai S.., Sukacheov A.., Dror G.., Halperin E., et al. (2010).  miRNAkey: A Software for microRNA Deep Sequencing Analysis. Bioinformatics. 26(20), 2615-2616.
Ronen, A.. (2001).  On Approximating Optimal Auctions.
Ronen, B.., & Karp R. M. (1994).  An information entropy approach to the small-lot concept. IEEE Transactions on Engineering Management. 41(1), 89-92.
Roosta-Khorasani, F., & Mahoney M. W. (2016).  Sub-Sampled Newton Methods I: Globally Convergent Algorithms.
Roosta-Khorasani, F.., & Mahoney M. W. (2019).  Sub-Sampled Newton Methods. Mathematical Programming. 293-326.