Publications

Found 92 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is E  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Evans, W. S. (1994).  Information Theory and Noisy Computation.
Etzioni, O., Hanks S., Jiang T., & Karp R. M. (1996).  Efficient Information Gathering on the Internet. Proceedings. Thirty-Seventh Annual Symposium Foundations of Computer Science. 234-243.
etin, Ö. Ç., & Stolcke A. (2005).  Language Modeling in the ICSI-SRI Spring 2005 Meeting Speech Recognition Evaluation System.
etin, Ö. Ç., & Ostendorf M. (2005).  Multi-Rate and Variable-Rate Modeling of Speech at Phone and Syllable Time Scales. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 665-668.
etin, Ö. Ç., & Shriberg E. (2006).  Overlap in Meetings: ASR Effects and Analysis by Dialog Factors, Speakers, and Collection Site. Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006). 212-224.
etin, Ö. Ç., Kantor A., King S., Bartels C., Magimai-Doss M., Frankel J., et al. (2007).  An Articulatory Feature-Based Tandem Approach and Factored Observation Modeling. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 645-648.
etin, Ö. Ç., & Shriberg E. (2006).  Speaker Overlaps and ASR Errors in Meetings: Effects Before, During, and After the Overlap. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 357-360.
Estrin, D., Handley M., Heidemann J., McCanne S., Xu Y.., & Yu H. (2000).  Network Visualization with the Nam, VINT Network Animator.
Estrin, D., Handley M., Helmy A., Huang P., & Thaler D. (1999).  A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast Routing. Proceedings of Infocom 1999.
Eskin, E., Halperin E., & Sharan R. (2006).  A Note on Optimally Phasing Long Genomic Regions Using Local Haplotype Predictions. Journal of Bioinformatics and Computational Biology. 4(3), 639-647.
Eskin, E., Halperin E., & Karp R. M. (2003).  Efficient Reconstruction of Haplotype Structure Via Perfect Phylogeny. Journal of Bioinformatics and Computational Biology. 1(1), 1-20.
Eskin, E., Halperin E., & Karp R. M. (2003).  Large Scale Reconstruction of Haplotypes from Genotype Data. Proceedings of the Seventh Conference on Research in Computational Biology (RECOMB).
Eskin, E., Halperin E., & Karp R. M. (2002).  Large-Scale Reconstruction of Haplotype Structure via Perfect Phylogeny.
Eskin, E., Halperin E., & Sharan R. (2004).  Optimally Phasing Long Genomic Regions using Local Haplotype Predictions. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNPs and Haplotypes. 13-16.
Ertel, W. (1993).  On the Definition of Speedup.
Ermolinskiy, A., & Shenker S. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding. 91-96.
Ermolinskiy, A., & Shenker S. (2011).  Design and Implementation of a Hypervisor-Based Platform for Dynamic Information Flow Tracking in a Distributed Environment.
Ermolinskiy, A., Moon D., Chun B-G., & Shenker S. (2009).  Minuet: Rethinking Concurrency Control in Storage Area Networks. 311-324.
Ermolinskiy, A., Katti S., Shenker S., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
Ermolinskiy, A., & Shenker S. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding.
Ermolinskiy, A., Moon D., Chun B-G., & Shenker S. (2008).  Minuet: Rethinking Concurrency Control in Storage Area Networks.
Eppe, M., Trott S., Raghuram V., Feldman J., & Janin A. (2016).  Application-Independent and Integration-Friendly Natural Language Understanding. Proceedings of Global Conference on Artificial Intelligence (GCAI 2016), EPiC Series in Computing.
Eppe, M., Trott S., & Feldman J. (2016).  Exploiting Deep Semantics and Compositionality in Natural Language for Human-Robot-Interaction. Proceedings of International Conference on Inteligent Robots and Systems (IROS 2016).
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.

Pages