Publications

Found 198 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chang, S-Y., & Morgan N. (2014).  Robust CNN-Based Speech Recognition With Gabor Filter Kernels.
Chang, S-Y., Edwards E., Morgan N., Ellis D. P. W., Mesgarani N., & Chang E. (2015).  Phone Recognition for Mixed Speech Signals: Comparison of Human Auditory Cortex and Machine Performance.
Chang, K., Lei H., & Canny J.. (2011).  Improved Classification of Speaking Styles for Mental Health Monitoring using Phoneme Dynamics. 85-88.
Chang, N. (2009).  Constructing Grammar: A Computational Model of the Emergence of Early Constructions.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Chang, S. (2002).  A Syllable, Articulatory-Feature, and Stress-Accent Model of Speech Recognition.
Chang, S-Y., & Morgan N. (2013).  Informative Spectro-Temporal Bottleneck Features for Noise-Robust Speech Recognition.
Chang, N., & Hunter R.. (2001).  Reference resolution in child-directed speech: A deep semantic approach.
Chandrayana, K.., Karp R. M., Roughan M.., Sen S.., & Zhang Y. (2004).  Search Strategies in Inter-Domain Traffic Engineering.
Chandrasekaran, K.., Karp R. M., Moreno-Centeno E.., & Vempala S.. (2011).  Algorithms for Implicit Hitting Set Problems. 614-629.
Chakraborty, R., Wang J., & Yu S. X. (2019).  SurReal: Fr'echet Mean and Distance Transform for Complex-Valued Deep Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Graph-Based Semi-Supervised Learning for Question Semantic Labeling. 27-35.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.
Celikyilmaz, A., Hakkani-Tür D., & Tur G. (2010).  LDA Based Similarity Modeling for Question Answering. 1-9.
Cebron, N.. (2010).  Refinement of Observations Under Budget Constraints in Active Learning.
Catanzaro, B., Kamil S., Lee Y., Asanović K., Demmel J., Keutzer K., et al. (2009).  SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization.
Castro, I., Panda A., Raghavan B., Shenker S. J., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Castor, A. (2021).  Did a CryptoPunk NFT Just Sell for $500 Million? Sort of, in a Transaction That Illuminates How the NFT Market Differs From the Art Market.
Castelluccia, C., Duermuth M., & Imamoglu F. (2014).  Learning from Neuroscience to Improve Internet Security. ERCIM News. 99, 46.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Casado, M., Koponen T., Shenker S. J., & Tootoonchian A. (2012).  Fabric: A Retrospective on Evolving SDN. 85-90.
Casado, M., Koponen T., Ramanathan R., & Shenker S. J. (2010).  Virtualizing the Network Forwarding Plane. 1-6.
Casado, M., McKeown N., & Shenker S. J. (2019).  From ethane to SDN and beyond. ACM SIGCOMM Computer Communication Review. 49(5), 92-95.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. ACM SIGCOMM Computer Communication Review. 37(4), 1-12.

Pages