Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Paxson, V. (2009).  How the Pursuit of Truth Led Me to Selling Viagra.
Kotro, T.., Lindh-Knuutila T., & Hiltunen E.. (2009).  How to Analyze Various Consumer Data in the Future?. 135-143.
Plaskota, L. (1995).  How to Benefit From Noise.
Plauché, M., etin Ö. Ç., & Nallasam U. (2007).  How to Build a Spoken Dialog System with Limited (or No) Resources.
Schneier, B., & Weaver N. (2021).  How to Cut Down on Ransomware Attacks Without Banning Bitcoin. Slate.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Huang, P-S., Mertens R., Divakaran A., Friedland G., & Hasegawa-Johnson M. (2012).  How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection. 505-508.
Ladkin, P., & Reinefeld A. (1991).  How to Solve Interval Constraint Networks: The Definitive Answer - Probably.
Weaver, N. (2021).  How to Start Disrupting Cryptocurrencies: “Mining” Is Money Transmission. Lawfare.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Kruse, H., Allman M., Griner J., & Tran D. (1998).  HTTP Page Transfer Rates Over Geo-Stationary Satellite Links. Proceedings of the 6th International Conference on Telecommunication Systems.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Orr, R., & van Leeuwen D. A. (2009).  A Human Benchmark for Language Recognition. 2175-2178.
Saha, D., Schumann C., McElfresh D. C., Dickerson J. P., Mazurek M. L., & Tschantz M. Carl (2020).  Human Comprehension of Fairness in Machine Learning. AIES '20: Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 152.
Regier, T. (1996).  The Human Semantic Potential.
Regier, T. (1996).  The Human Semantic Potential: Spatial Language and Constrained Connectionism.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Lee, M. Kyung, Grgić-Hlača N., Tschantz M. Carl, Binns R., Weller A., Carney M., et al. (2020).  Human-Centered Approaches to Fair and Responsible AI. CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1-8.
Stoll, L., & Doddington G. (2010).  Hunting for Wolves in Speaker Recognition. 159-164.
Vaquero, C.., Vinyals O., & Friedland G. (2010).  A Hybrid Approach to Online Speaker Diarization. 2642-2645.
Wermter, S. (1997).  Hybrid Approaches to Neural Network-based Language Processing.
Bourlard, H., & Morgan N. (1996).  Hybrid Connnectionist Models for Continuous Speech Recognition. 259-283.
Krieger, R., Becker B., & Keim M. (1994).  A Hybrid Fault Simulator for Synchronous Sequential Circuits.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.
Bourlard, H., & Morgan N. (1998).  Hybrid HMM/ANN Systems for Speech Recognition: Overview and New Research Directions. 389-417.

Pages