Publications

Found 315 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Maire, M., Narihira T., & Yu S. X. (2016).  Affinity CNN: Learning Pixel-Centric Pairwise Relations for Figure/Ground Embedding. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Marzo, J. L., Vilà P., Fàbrega L., & Massaguer D.. (2001).  An ATM Distributed Simulator for Network Management Research. Proceedings of the 34th Annual Simulation Symposium (SS 2001). 185-192.
Mertens, R., Lei H., Gottlieb L., Friedland G., & Divakaran A. (2011).  Acoustic Super Models for Large Scale Video Event Detection.
Mertens, R., Huang P-S., Gottlieb L., Friedland G., & Divakaran A. (2011).  On the Applicability of Speaker Diarization to Audio Concept Detection for Multimedia Retrieval. 446-451.
Metere, A. (2019).  AI will never conquer humanity. It’s too rational. Cosmos Magazine.
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
Mitzel, D. J., & Shenker S. J. (1994).  Asymptotic Resource Consumption in Multicast Reservation Styles. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 226-233.
Mitzel, D. J., Estrin D., Shenker S. J., & Zhang L. (1994).  An Architectural Comparison of ST-II and RSVP. Proceedings of the 13th IEEE Conference on Networking for Global Communications (INFOCOM '94). 2, 716-725.
Monteleoni, C.., & Kääriäinen M. (2005).  Active Learning Under Arbitrary Distributions.
[Anonymous] (1992).  Advances in Neural Information Processing Systems 4. (Moody, J., Hanson S.., & Lippmann R.., Ed.).
Moody, J. (1988).  Associative Memories.
Moody, J., & Utans J. (1994).  Architecture Selection Strategies for Neural Networks: Application to Corporate Bond Rating Prediction.
Moody, J., Shapere A. D., & Wilczek F. (1989).  Adiabatic Effective Lagrangian.
Moulin, H., & Shenker S. J. (1994).  Average Cost Pricing Versus Serial Cost Sharing: An Axiomatic Comparison. Journal of Economic Theory. 64(1), 178-201.
Müller, S. M. (1993).  All-to-All Broadcast on the CNS-1.
N
Nakamura, T., & Berlekamp E. (2002).  Analysis of Composite Corridors.
Narayanan, S., & Harabagiu S. (2004).  Answering Questions Using Advanced Semantics and Probabilistic Inference. Proceedings of the Pragmatics of Question Answering Workshop at the North American Chapter of the Association for Computational Linguistics Human Language Technologies Conference (NAACL HLT 2004).
Narayanan, S., & McIlraith S. (2003).  Analysis and Simulation of Web Services. Computer Networks. 42, 675-693.
Nithyanand, R., Khattak S., Javed M., Vallina-Rodriguez N., Falahrastegar M., Powles J. E., et al. (2016).  Adblocking and Counter-Blocking: A Slice of the Arms Race. Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI '16).

Pages