Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2011
Satzger, B., Pietzowski A., & Ungerer T. (2011).  Autonomous and Scalable Failure Detection in Distributed Systems. International Journal of Autonomous and Adaptive Communications Systems. 4(1), 61-77.
Peters, N., & Schmeder A. W. (2011).  Beamforming using a spherical microphone array based on legacy microphone characteristics.
Graciarena, M., Delplanche M., Shriberg E., & Stolcke A. (2011).  Bird Species Recognition Combining Acoustic and Sequence Modeling. 341-344.
Farrell, R., Oza O., Zhang N., Morariu V. I., Darrell T., & Davis L. S. (2011).  Birdlets: Subordinate Categorization Using Volumetric Primitives and Pose-Normalized Appearance. 161-168.
Ouyang, T., Ray S., Rabinovich M., & Allman M. (2011).  Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?.
Hopfgartner, F. (2011).  Capturing Long-Term User Interests in Online Television News Program.
Janoch, A., Karayev S., Jia Y., Barron J. T., Fritz M., Saenko K., et al. (2011).  A Category-Level 3-D Object Dataset: Putting the Kinect to Work. 1168-1174.
Lei, H., Choi J., & Friedland G. (2011).  City-Identification on Flickr Videos Using Acoustic Features.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Morrison, R., Friedman E., & Landsberg A. S. (2011).  Combinatorial Games with a Pass: A Dynamical Systems Approach.
Morrison, R., Friedman E., & Landsberg A. S. (2011).  Combinatorial Games with a Pass: A dynamical systems approach. Chaos. 21,
Kitzelmann, E. (2011).  A Combined Analytical and Search-Based Approach for the Inductive Synthesis of Functional Programs. Künstliche Intelligenz. 25(2), 179-182.
Meyer, B. T., Ravuri S., Schädler M. René, & Morgan N. (2011).  Comparing Different Flavors of Spectro-Temporal Features for ASR. 1269-1272.
Vinyals, O., & Ravuri S. (2011).  Comparing Multilayer Perceptron to Deep Belief Network Tandem Features for Robust ASR.
Ben-David, Y., Hasan S., Pal J., Vallentin M., Panjwani S.., Gutheim P.., et al. (2011).  Computing Security in the Developing World: A Case for Multidisciplinary Research. 39-44.
Paxson, V., Allman M., Chu J., & Sargent M. (2011).  Computing TCP's Retransmission Timer.
Sanchez, M. Hewlett, Ferrer L., Shriberg E., & Stolcke A. (2011).  Constrained Cepstral Speaker Recognition Using Matched UBM and JFA Training. 141-144.
Cook, H., Gonina E., Kamil S., Friedland G., Patterson D., & Fox A. (2011).  CUDA-Level Performance with Python-Level Productivity for Gaussian Mixture Model Applications.
Lei, H., & Mirghafori N. (2011).  Data Selection with Kurtosis and Nasality features for Speaker Recognition. 2753-2756.
Zaharia, M., Hindman B., Konwinski A., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  The Datacenter Needs an Operating System. 1-5.
Tan, Z., Asanović K., & Patterson D. (2011).  Datacenter-Scale Network Research on FPGAs.
Liu, J., Shenker S. J., Schapira M., & Yang B. (2011).  Data-Driven Network Connectivity. 1-6.
Choi, J., & Friedland G. (2011).  Data-Driven vs. Semantic-Technology-Driven Tag-Based Video Location Estimation. 243-246.
Choi, J., & Friedland G. (2011).  Data-Driven vs. Semantic-Technology-Driven Tag-Based Video Location Estimation. 243-246.
Morgan, N. (2011).  Deep and Wide: Multiple Layers in Automatic Speech Recognition.

Pages