Publications

Found 289 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Title is P  [Clear All Filters]
Conference Paper
Chang, N., Narayanan S., & Petruck M. R. L. (2002).  Putting Frames in Perspective. Proceedings COLING 2002.
Narayanan, S., Petruck M. R. L., Baker C. F., & Fillmore C. J. (2003).  Putting FrameNet Data into the ISO Linguistic Annotation FrameWork. Proceedings of the ACL 2003 Workshop on Linguistic Annotation: Getting the Model Right.
Gottlieb, L., Choi J., Kelm P., Sikora T., & Friedland G. (2012).  Pushing the Limits of Mechanical Turk: Qualifying the Crowd for Video Geo-Location. 23-28.
Anguera, X., Wooters C., & Hernando J. (2006).  Purity Algorithms for Speaker Diarization of Meetings Data. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006).
Favre, B., Grishman R., Hillard D., Ji H., Hakkani-Tür D., & Ostendorf M. (2008).  Punctuating Speech For Information Extraction. 5013-5016.
Callahan, T., Allman M., & Rabinovich M. (2012).  Psst, Over Here: Communicating Without Fixed Infrastructure.
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.
Rejaie, R., Handley M., Yu H., & Estrin D. (1999).  Proxy Caching Mechanism for Multimedia Playback Streams in the Internet. Proceedings of the Fourth International Web Caching Workshop.
Bergbauer, J., Nieuwenhuis C., Souiai M., & Cremers D. (2013).  Proximity Priors for Variational Semantic Segmentation and Recognition.
Argyraki, K., Maniatis P., Cheriton D., & Shenker S. (2004).  Providing Packet Obituaries. Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III).
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

Pages