Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Efros, A., & Halperin E. (2012).  Haplotype Reconstruction Using Perfect Phylogeny and Sequence Data. 13,
Kirkpatrick, B. (2010).  Haplotypes versus Genotypes on Pedigrees. 136-147.
Fillmore, C. J. (1994).  The Hard Road from Verbs to Nouns. 105-129.
Kortsarz, G., Krauthgamer R., & Lee J. R. (2002).  Hardness of Approximation for Vertex-Connectivity Network Design Problems.
Feigenbaum, J., Krishnamurthy A., Sami R., & Shenker S. J. (2002).  Hardness Results for Multicast Cost Sharing. Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2002). 133-144.
Feigenbaum, J., Krishnamurthy A., Sami R., & Shenker S. J. (2003).  Hardness Results for Multicast Cost Sharing. Theoretical Computer Science. 304(1-3), 215-236.
Cook, H., Moretó M., Bird S., Dao K., Patterson D., & Asanović K. (2013).  A Hardware Evaluation of Cache Partitioning to Improve Utilization and Energy-Efficiency while Preserving Responsiveness.
Salfner, F. (2008).  Hardware Reliability; Software Reliability; Performability.
Vinyals, O., & Friedland G. (2008).  A Hardware-Independent Fast Logarithm Approximation with Adjustable Accuracy. 61-65.
Dong, Z.., Yao Z.., Gholami A.., Mahoney M., & Keutzer K.. (2019).  HAWQ: Hessian AWare Quantization of Neural Networks with Mixed-Precision. Proceedings of ICCV 2019.
Yao, Z., Dong Z., Zheng Z., Gholami A., Yu J., Tan E., et al. (2021).  HAWQV3: Dyadic Neural Network Quantization.
Knightly, E. W. (1995).  H-BIND: A New Approach to Providing Statistical Performance Guarantees to VBR Traffic.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., & Paxson V. (2015).  Header Enrichment or ISP Enrichment: Emerging Privacy Threats in Mobile Networks.
Stern, R. M., & Morgan N. (2012).  Hearing is Believing: Biologically-Inspired Feature Extraction for Robust Automatic Speech Recognition. Signal Processing Magazine. 29(6), 34-43.
Jia, Y., & Darrell T. (2011).  Heavy-Tailed Distances for Gradient Based Image Descriptors.
Martin, C.. H., & Mahoney M. (2020).  Heavy-Tailed Universality Predicts Trends in Test Accuracies for Very Large Pre-Trained Deep Neural Networks. Proceedings of 2020 SDM Conference.
Feldman, J., Tsur S.., & Lehman D.. (1971).  Hebrew University Production Language.
Al-Fares, M.., Radhakrishnan S., Raghavan B., Huang N.., & Vahdat A. (2010).  Hedera: Dynamic Flow Scheduling for Data Center Networks.
Aziz-Zadeh, L., Iacoboni M., & Zaidel E. (2005).  Hemispheric Sensitivity to Body Stimuli in Simple Reaction Time. Experimental Brain Research. 170(1), 116-121.
Dodge, E., & Wright A. (2002).  Herds of Wildebeest, Flasks of Vodka, Heaps of Trouble: An Embodied Construction Grammar Approach to English Measure Phrases. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Akhawe, D., Amann J., Vallentin M., & Sommer R. (2013).  Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web.
Yao, Z.., Gholami A.., Lei Q.., Keutzer K.., & Mahoney M. (2018).  Hessian-based Analysis of Large Batch Training and Robustness to Adversaries. Proceedings of the 2018 NeurIPS Conference. 4954-4964.
Ruiz, P. M., & Gómez-Skarmeta A. (2005).  Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh Networks. Lecture Notes in Computer Science. 3738,
Karp, R. M. (2011).  Heuristic Algorithms in Computations Molecular Biology. Journal of Computer and System Sciences. 77(1), 122-128.

Pages