Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Henderson, T., Roy S.., Floyd S., & Riley G.. (2006).  NS-3 Project Goals. Proceedings of the Workshop on NS-2 (WNS2 2006).
Lei, H., Choi J., & Friedland G. (2013).  Nowhere to Hide: Exploring User-Verification Across Flickr Accounts.
Kelm, P., Schmiedeke S., Choi J., Friedland G., Ekambaram V., Ramchandran K., et al. (2013).  A Novel Fusion Method for Integrating Multiple Modalities and Knowledge for Multimodal Location Estimation. 7-12.
Satzger, B., Bagci F., & Ungerer T. (2010).  A Novel Constraint Satisfaction Problem Solver for Self-Configuring Distributed Systems with Highly Dynamic Behavior.
Satzger, B., Bagci F., & Ungerer T. (2010).  A Novel Constraint Satisfaction Problem Solver for Self-Configuring Distributed Systems with Highly Dynamic Behavior. 1-6.
Moody, J. (1991).  Note on Generalization, Regularization, and Architecture Selection in Nonlinear Learning Systems. Proceedings of the First IEEE-SP Workshop on Neural Networks for Signal Processing. 1-10.
Fosler-Lussier, E., & Williams G. (1999).  Not Just What, But Also When: Guided Automatic Pronunciation Modeling for Broadcast News. Proceedings of the DARPA Broadcast News Transcription and Understanding Workshop.
Stolcke, A., Kajarekar S., & Ferrer L. (2008).  Nonparametric Feature Normalization for SVM-Based Speaker Verification. 1577-1580.
Petrov, S., Barrett L., & Klein D. (2006).  Non-Local Modeling with a Mixture of PCFGs. Proceedings of the 10th International Conference on Conference of Computational Natural Language Learning (CoNLL-X '06). 14-20.
Lawrence, N. D., & Urtasun R. (2009).  Non-Linear Matrix Factorization with Gaussian Processes. 601-608.
Lim, S. Hoe, N. Erichson B., Hodgkinson L., & Mahoney M. (2021).  Noisy Recurrent Neural Networks. Advances in Neural Information Processing Systems Conference. 34,
Karp, R. M., & Kleinberg R.. (2007).  Noisy Binary Search. Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2007). 881-890.
N. Erichson, B., Taylor D., Wu Q., & Mahoney M. (2021).  Noise-Response Analysis of Deep Neural Networks Quantifies Robustness and Fingerprints Structural Malware. Proceedings of the 2021 SIAM International Conference on Data Mining (SDM). 100-108.
Graciarena, M., Kajarekar S., Stolcke A., & Shriberg E. (2007).  Noise Robust Speaker Identification for Spontaneous Arabic Speech. Proceedings of the 32nd IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 245-248.
Eisenhofer, T., Quiring E., Möller J., Riepel D., Holz T., & Rieck K. (In Press).  No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. Proceedings of 32nd USENIX Security Symposium.
Amann, J., Sommer R., Vallentin M., & Hall S. (2013).  No Attack Necessary: The Surprising Dynamics of SSL Trust Relationships.
Vallentin, M., Sommer R., Lee J., Leres C.., Paxson V., & Tierney B. (2007).  The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
Zhou, K., Mo L., Kay P., Kwok V.. P. Y., Ip T. N. M., & Tan L. Hai (2010).  Newly Trained Lexical Categories Produce Lateralized Categorical Perception of Color. 107(22), 9974-9978.
Adami, A., Kajarekar S., & Hermansky H. (2002).  A New Speaker Change Detection Method for Two-Speaker Segmentation. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  A New Perspective on Efficient and Dependable Vehicle Routing. 388-391.
Gergen, S., Zeiler S., Abdelaziz A. Hussen, & Kolossa D. (2016).  New Insights into Turbo-Decoding-Based AVSR with Dynamic Stream Weights. Proceedings of ITG Conference on Speech Communication.
Lönneker-Rodman, B., Baker C. F., & Hong J. (2008).  The New FrameNet Desktop: A Usage Scenario for Slovenian. 147-154.
Lässig, J., & Trommler U.. (2010).  New Approaches to Enterprise Cooperation Generation and Management. Proceedings of the 12th International Conference on Enterprise Information Systems (ICEIS 2010).
Gupta, D., Segal A., Panda A., Segev G., Schapira M., Feigenbaum J., et al. (2012).  A New Approach to Interdomain Routing Based on Secure Multi-Party Computation. 37-42.
Guz, U., Gurkan H., & B. Yarman S. (2007).  A New Algorithm for High Speed Speech and Audio Coding. Proceedings of the European Conference on Circuit Theory and Design.

Pages