Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Tschantz, M. Carl, Sen S., & Datta A. (2017).  Differential Privacy as a Causal Property.
Storn, R. (1995).  Differential Evolution Design of an IIR-Filter with Requirements for Magnitude and Group Delay.
Storn, R., & Price K. (1995).  Differential Evolution - A Simple and Efficient Adaptive Scheme for Global Optimization Over Continuous Spaces.
Rüttgers, M. (1997).  Differential Evolution: A Method for Optimization of Real Scheduling Problems.
Castor, A. (2021).  Did a CryptoPunk NFT Just Sell for $500 Million? Sort of, in a Transaction That Illuminates How the NFT Market Differs From the Art Market.
Ji, G., & Bilmes J. A. (2005).  Dialog Act Tagging Using Graphical Models. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 1, 33-36.
Friedland, G., Yeo C., & Hung H. (2010).  Dialocalizaton: Acoustic Speaker Diarization and Visual Localization as Joint Optimization Problem. ACM Transactions on Multimedia Computing. 6(4), 
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Wöhlke, G. (1994).  Dextrous Object Manipulation with Robot Hands Including Rolling and Slipping: Improved Motion & Force Computation Method.
Pang, R., Allman M., Paxson V., & Lee J. (2006).  The Devil and Packet Trace Anonymization. Computer Communication Review. 36(1), 29-38.
[Anonymous] (2001).  Developments in Forecast Combination and Portfolio Choice. (Dunis, C.., Timmermann A.., & Moody J., Ed.).
Morgan, N., Asanović K., Kingsbury B., & Wawrzynek J. (1990).  Developments in Digital VLSI Design for Artificial Neural Networks.
Pal, J. (2003).  The Developmental Promise of Information and Communications Technology in India.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Adamo, J-M. (1994).  Development of Parallel BLAS with ARCH Object-Oriented Parallel Library, Implementation on CM-5.
Hopfgartner, F., & Jose J. M. (2011).  Development of a Test Collection for Studying Long-Term User Modelling. Proceedings of the Workshop Information Retrieval (LWA'11).
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Alomar, N., & Egelman S. (2022).  Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps. Proceedings on Privacy Enhancing Technologies. 2022, 250-273.
Giammarresi, D., & Montalbano R. (1996).  Deterministic Generalized Automata.
Luby, M., & Velickovic B. (1993).  On Deterministic Approximation of DNF.
Knightly, E. W. (1996).  Determining Priority Queue Performance from Second Moment Traffic Characterizations.
Sarolahti, P., Allman M., & Floyd S. (2007).  Determining an Appropriate Sending Rate Over an Underutilized Network Path. 51(7), 1815-1832.
Lee-Goldman, R., Rhodes R., & Ellsworth M. (2009).  Determination and Modification: Interaction and Interpretation.
Hoffman, J., Pathak D., Darrell T., & Saenko K. (2015).  Detector Discovery in the Wild: Joint Multiple Instance and Representation Learning. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2883-2891.
Griesemer, R. (1994).  Detection of Side-Effects in Function Procedures.

Pages