Found 192 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Chang, K., Lei H., & Canny J.. (2011).  Improved Classification of Speaking Styles for Mental Health Monitoring using Phoneme Dynamics. 85-88.
Chang, N. (2009).  Constructing Grammar: A Computational Model of the Emergence of Early Constructions.
Chang, H., Govindan R., Jamin S., Shenker S., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Chang, S. (2002).  A Syllable, Articulatory-Feature, and Stress-Accent Model of Speech Recognition.
Chandrayana, K.., Karp R. M., Roughan M.., Sen S.., & Zhang Y. (2004).  Search Strategies in Inter-Domain Traffic Engineering.
Chandrasekaran, K.., Karp R. M., Moreno-Centeno E.., & Vempala S.. (2011).  Algorithms for Implicit Hitting Set Problems. 614-629.
Chakraborty, R., Wang J., & Yu S. X. (2019).  SurReal: Fr'echet Mean and Distance Transform for Complex-Valued Deep Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Graph-Based Semi-Supervised Learning for Question Semantic Labeling. 27-35.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.
Celikyilmaz, A., Hakkani-Tür D., & Tur G. (2010).  LDA Based Similarity Modeling for Question Answering. 1-9.
Cebron, N.. (2010).  Refinement of Observations Under Budget Constraints in Active Learning.
Catanzaro, B., Kamil S., Lee Y., Asanović K., Demmel J., Keutzer K., et al. (2009).  SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization.
Castro, I., Panda A., Raghavan B., Shenker S., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Castelluccia, C., Duermuth M., & Imamoglu F. (2014).  Learning from Neuroscience to Improve Internet Security. ERCIM News. 99, 46.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. (2007).  Ethane: Taking Control of the Enterprise. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007). 1-12.
Casado, M., Garfinkel T., Cui W., Paxson V., & Savage S. (2005).  Opportunistic Measurement: Extracting Insight from Spurious Traffic. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. (2007).  Ethane: Taking Control of the Enterprise. ACM SIGCOMM Computer Communication Review. 37(4), 1-12.
Casado, M., Koponen T., Ramanathan R., & Shenker S. (2010).  Virtualizing the Network Forwarding Plane. 1-6.
Casado, M., Koponen T., Shenker S., & Tootoonchian A. (2012).  Fabric: A Retrospective on Evolving SDN. 85-90.
Casado, M., Freedman M. J., Pettit J., Luo J.., Gude N. S., McKeown N., et al. (2009).  Rethinking Enterprise Network Control. IEEE/ACM Transactions on Networking. 17(4), 1270-1283.
Caputo, B., Hayman E., Fritz M., & Eklundh J-O. (2010).  Classifying Materials in the Real World. Image and Vision Computing. 28(1), 150-163.
Cao, L., Friedland G., & Xie L. (2014).  GeoMM 2014: The Third ACM Multimedia Workshop on Geotagging and its Applications in Multimedia. 1251-1252.
Cantone, D., & Cutello V. (1991).  On the Decidability Problem for a Topological Syllogistic Involving the Notion of Topological Product.