Publications

Found 1886 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Subirats-Rüggeberg, C., & Petruck M. R. L. (2003).  Surprise: Spanish FrameNet!. Proceedings of the Workshop on Frame Semantics.
Clark, D. D., Shenker S. J., & Zhang L. (1992).  Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanism. Proceedings of the ACM SIGCOMM '92 Conference on Communications Architecture & Protocols. 14-26.
Shyr, A., Darrell T., Jordan M. I., & Urtasun R. (2011).  Supervised Hierarchical Pitman-Yor Process for Natural Scene Segmentation.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1990).  Subtree isomorphism is in random NC. Discrete Applied Mathematics. 29(1), 35-62.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1989).  Subtree Isomorphism is in Random NC.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1988).  Subtree isomorphism is in random NC. Proceedings of the Third Aegean Workshop on Computing, VLSI Algorithms and Architectures (AWOC 88). 43-52.
Razaghpanah, A., Niaki A. Akhavan, Vallina-Rodriguez N., Sundaresan S., Amann J., & Gill P. (2017).  Studying TLS Usage in Android Apps.
Mitzel, D. J., Estrin D., Shenker S. J., & Zhang L. (1996).  A Study of Reservation Dynamics in Integrated Services Packet Networks. Proceedings of the 15th IEEE Annual Joint Conference on Networking the Next Generation. 2, 871-879.
Cocchi, R., Estrin D., Shenker S. J., & Zhang L. (1991).  A Study of Priority Pricing in Multiple Service Class Networks. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 123-130.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction. IEEE Transactions on Multimedia. 17(9), 1550-1561.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction. IEEE Transactions on Multimedia. 17(9), 1550-1561.
Sah, A., Oklobdjiza V. G., & Verma D. C. (1991).  A Study of I/O Architecture for High Performance Next Generation Computers.
Liu, Y., Chawla N.. V., Harper M. P., Shriberg E., & Stolcke A. (2006).  A Study in Machine Learning from Imbalanced Data for Sentence Boundary Detection in Speech. Computer Speech and Language. 20(4), 468-494.
Liu, Y., Chawla N.. V., Harper M. P., Shriberg E., & Stolcke A. (2006).  A Study in Machine Learning from Imbalanced Data for Sentence Boundary Detection in Speech. Computer Speech and Language. 20(4), 468-494.
Shastri, L. (2003).  Structured Connectionist Models.
Liu, Y., Shriberg E., Stolcke A., Peskin B., Ang J., Hillard D., et al. (2005).  Structural Metadata Research in the EARS Program. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 957-960.
Liu, Y., Shriberg E., Stolcke A., Peskin B., Ang J., Hillard D., et al. (2005).  Structural Metadata Research in the EARS Program. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 957-960.
Sturmfels, B., & Wiegelmann M. (1996).  Structural Gröbner Basis Detection.
Koehler, J., Stoffel K., & Hendler J. A. (1996).  Structural Classification - A Preliminary Report.
Song, X., Landau L., Israel J., & Fettweis G. (2015).  Strong LOS MIMO for Short Range mmWave Communication - Towards 1 Tbps Wireless Data Bus. 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB). 1-5.
Weaver, N., & Sommer R. (2007).  Stress Testing Cluster Bro. Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Stewart, R.., Xie Q.., Morneault K.., Sharp C.., Schwarzbauer H.., Taylor T.., et al. (2000).  Stream Control Transmission Protocol.
Stewart, R.., Xie Q.., Morneault K.., Sharp C.., Schwarzbauer H.., Taylor T.., et al. (2000).  Stream Control Transmission Protocol.
Stewart, R.., Xie Q.., Morneault K.., Sharp C.., Schwarzbauer H.., Taylor T.., et al. (2000).  Stream Control Transmission Protocol.

Pages