Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Bohnet, B. (2009).  Synchronous Parsing of Syntactic and Semantic Structures.
Favre, B., Hakkani-Tür D., & Shriberg E. (2009).  Syntactically Informed Models for Comma Prediction. 4697-4700.
Peters, N., & Schmeder A. W. (2011).  Synthesizing classic recording microphones characteristics using a spherical microphone array.
Ferrer, L., Graciarena M., Zymnis A.., & Shriberg E. (2008).  System Combination Using Auxiliary Information for Speaker Verification. 4853-4856.
Bozonnet, S., Evans N., Anguera X., Vinyals O., Friedland G., & Fredouille C. (2010).  System Output Combination for Improved Speaker Diarization. 2642-2645.
Feldman, J., & Sproull R. F. (1971).  System Support for the Stanford Hand-Eye System. Proceedings of the Second International Joint Conference on Artificial Intelligence (IJCAI 1971). 185-189.
Raabe, A., & Felke A. (2008).  A SYSTEMC Language Extension for High-Level Reconfiguration Modeling. 55-60.
Halperin, E., Kimmel G., & Shamir R. (2005).  Tag SNP Selection in Genotype Data for Maximizing SNP Prediction Accuracy. Proceedings of the 13th Annual International Conference on Intelligent Systems for Molecular Biology (ISMB 2005). 195-203.
McCauley, M., Sheng A., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. (2015).  Taking an AXE to L2 Spanning Trees.
Vallina, P.., Feal Á., Gamba J.., Vallina-Rodriguez N., & Anta A.F.. (2019).  Tales From the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. Proceedings of the Internet Measurement Conference. 245-258.
Ellis, D. P. W., Singh R.., & Sivadas S. (2001).  Tandem Acoustic Modeling in Large-Vocabulary Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001).
Zhu, Q., Chen B. Y., Morgan N., & Stolcke A. (2004).  Tandem Connectionist Feature Extraction for Conversational Speech Recognition. Proceedings of the First International Workshop on Machine Learning for Multimodal Interaction (MLMI 2004).
Hermansky, H., Ellis D. P. W., & Sharma S. (2000).  Tandem Connectionist Feature Stream Extraction for Conventional HMM Systems. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2000).
Vallina-Rodriguez, N., Amann J., Kreibich C., Weaver N., & Paxson V. (2014).  A Tangled Mass: The Android Root Certificate Stores.
Wegmann, S., Faria A., Janin A., Riedhammer K., & Morgan N. (2013).  The Tao of ATWV: Probing the Mysteries of Keyword Search Performance.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
Allman, M., Griner J., & Richard A.. (2000).  TCP Behavior in Networks with Dynamic Propagation Delay. Proceedings of Globecom 2000.
Radhakrishnan, S., Cheng Y., Chu J., Jain A., & Raghavan B. (2011).  TCP Fast Open.
Allman, M., Hayes C., Kruse H., & Ostermann S. (1997).  TCP Performance Over Satellite Links. Proceedings of the Fifth International Conference on Telecommunications Systems.
Bernd, J., & Corley J. (2017).  Teach Global Impact: A Resource for CSP (or Any CS Class!). Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education. 699.
Cox, R., Bird S., & Meyer B. (2017).  Teaching Computer Science in the Victorian Certificate of Education: A Pilot Study. Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education.
Egelman, S., Bernd J., Friedland G., & Garcia D. D. (2016).  The Teaching Privacy Curriculum. Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE ’16), Memphis, TN. 591-596.
Varol, A.., Salzmann M., Tola E.., & Fua P. (2009).  Template-Free Monocular Reconstruction of Deformable Surfaces.
Silipo, R., Greenberg S., & Arai T. (1999).  Temporal Constraints on Speech Intelligibility as Deduced From Exceedingly Sparse Spectral Representations. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Rasti, R., Murthy M., Weaver N., & Paxson V. (2015).  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks.

Pages