Publications

Found 411 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Skibola, C. F., Bracci P. M., Halperin E., Conde L., Craig D. W., Agana L., et al. (2009).  Genetic Variants at 6p21.33 Are Associated with Susceptibility to Follicular Lymphoma. Nature Genetics. 41(8), 873-875.
Skočaj, D., Kristan M., Vrečko A., Leonardis A., Fritz M., Stark M., et al. (2010).  Multi-Modal Learning. 265-309.
Slager, S.. L., Skibola C. F., & Halperin E. (2012).  Common Variation at 6p21.31 (BAK1) Influences the Risk of Chronic Lymphocytic Leukemia. Blood. 120(4), 843-846.
Sokol, J., & Tutsch D. (2001).  Petri Net Based Performance Evaluation of USAIA's Bandwidth Partitioning for the Wireless Cell Level.
Sokol, J., & Widmer J. (2001).  USAIA: Ubiquitous Service Access Internet Architecture.
Somervuo, P. (2003).  Experiments with Linear and Nonlinear Feature Transformations in HMM Based Phone Recognition. Proceedings of ICASSP-2003.
Somervuo, P. (2002).  Speech Modeling Using Variational Bayesian Mixture of Gaussians. Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
Somervuo, P., Chen B. Y., & Zhu Q. (2003).  Feature Transformations and Combinations for Improving ASR Performance. Proceedings of EUROSPEECH 2003.
Sommer, R., Weaver N., & Paxson V. (2009).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
Sommer, R., & Paxson V. (2005).  Exploiting Independent State For Network Intrusion Detection. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
Sommer, R., Amann J., & Hall S. (2015).  Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data. ICSI Technical Report.
Sommer, R., & Paxson V. (2003).  Enhancing Byte-Level Network Intrusion Detection Signatures with Context. Proceedings of ACM CCS.
Sommer, R., Vallentin M., De Carli L., & Paxson V. (2014).  HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Sommer, R., Amann J., & Hall S. (2016).  Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data. Proceedings of 2016 Annual Computer Security Applications Conference.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Sommer, R., & Paxson V. (2010).  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. 305-316.
Song, H. Oh, Lee Y. Jae, Jegelka S., & Darrell T. (2014).  Weakly-Supervised Discovery of Visual Pattern Configurations.
Song, X., Rave W., & Fettweis G. (2016).  Analog and successive channel equalization in strong line-of-sight MIMO communication. 2016 IEEE International Conference on Communications (ICC). 1-7.
Song, H. Oh, Girshick R., Jegelka S., Mairal J., Harchaoui Z., & Darrell T. (2014).  On Learning to Localize Objects With Minimal Supervision.
Song, X., Jans C., Landau L., Cvetkovski D., & Fettweis G. (2015).  A 60GHz LOS MIMO Backhaul Design Combining Spatial Multiplexing and Beamforming for a 100Gbps Throughput. 2015 IEEE Global Communications Conference (GLOBECOM). 1-6.
Song, H. Oh, Fritz M., Göhring D., & Darrell T. (2015).  Learning to Detect Visual Grasp Affordance.
Song, X., Babu N., Rave W., Majhi S., & Fettweis G. (2016).  Two-Level Spatial Multiplexing using Hybrid Beamforming Antenna Arrays for mmWave Communications. CoRR. abs/1607.08737,
Song, X., & Fettweis G. (2015).  On Spatial Multiplexing of Strong Line-of-Sight MIMO With 3D Antenna Arrangements. IEEE Wireless Communications Letters. 4, 393-396.

Pages