Publications

Found 683 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
Conference Paper
Wooters, C., Mirghafori N., Stolcke A., Pirinen T., Bulyko I., Gelbart D., et al. (2004).  The 2004 ICSI-SRI-UW Meeting Recognition System. 196-208.
Wooters, C., Mirghafori N., Stolcke A., Pirinen T., Bulyko I., Gelbart D., et al. (2004).  The 2004 ICSI-SRI-UW Meeting Recognition System. 196-208.
Graciarena, M., Delplanche M., Shriberg E., Stolcke A., & Ferrer L. (2010).  Acoustic Front-End Optimization for Bird Species Recognition. 293-296.
Mertens, R., Lei H., Gottlieb L., Friedland G., & Divakaran A. (2011).  Acoustic Super Models for Large Scale Video Event Detection.
Gomes, B., Weissman B., & Feldman J. (1998).  Active Threads: Enabling Fine-Grained Parallelism in Object-Oriented Languages. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’98).
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Goebel, C., Tribowski C., & Günther O. (2009).  Adoption of Cross-Company RFID: An Empirical Analysis of Perceived Influence Factors.
Goebel, C., Tribowski C., & Günther O. (2009).  Adoption of Cross-Company RFID: An Empirical Analysis of Perceived Influence Factors.
Gamba, J.., Rashed M.., Razaghpanah A., Vallina-Rodriguez N., & Tapiador J.. (In Press).  An Analysis of Pre-Installed Android Software. IEEE Sympsium on Security and Privacy 2020.
Gleich, D., & Mahoney M. W. (2014).  Anti-Differentiating Approximation Algorithms: A Case Study with Min-Cuts, Spectral, and Flow.
Mertens, R., Huang P-S., Gottlieb L., Friedland G., & Divakaran A. (2011).  On the Applicability of Speaker Diarization to Audio Concept Detection for Multimedia Retrieval. 446-451.
Botia, J., Valdes M.., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions. Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy. 467-470.
Razaghpanah, A., Nithyanand R., Vallina-Rodriguez N., Sundaresan S., Allman M., Kreibich C., et al. (2018).  Apps, Trackers, Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem. Proceedings of NDSS 2018.
Ruiz, P. M., & Gómez-Skarmeta A. (2005).  Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc Inalambricas. Proceedings of the V Jornadas de Ingenieria Telematica.
Ziekow, H., Ivantysynova L., & Günther O. (2010).  Architectural Patterns for RFID Applications in Manufacturing.

Pages