Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S. J., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Makin, J., & Narayanan S. (2008).  Hybrid-System Modeling of Human Blood Clotting.
Makin, J., & Narayanan S. (2013).  A Hybrid-System Model of the Coagulation Cascade. 206-212.
Anguera, X., Aguilo M., Wooters C., Nadeu C., & Hernando J. (2006).  Hybrid Speech/Non-Speech Detector Applied to Speaker Diarization of Meetings. Proceedings of IEEE Odyssey: The Speaker and Language Recognition Workshop. 1-6.
Cohen, M., Franco H., Morgan N., Rumelhart D., & Abrash V. (1992).  Hybrid Neural Network / Hidden Markov Model Continuous Speech Recognition. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 915-918.
Ravuri, S. (2014).  Hybrid MLP/Structured-SVM Tandem Systems for Large Vocabulary and Robust ASR.
Bourlard, H., & Morgan N. (1998).  Hybrid HMM/ANN Systems for Speech Recognition: Overview and New Research Directions. 389-417.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.
Krieger, R., Becker B., & Keim M. (1994).  A Hybrid Fault Simulator for Synchronous Sequential Circuits.
Bourlard, H., & Morgan N. (1996).  Hybrid Connnectionist Models for Continuous Speech Recognition. 259-283.
Wermter, S. (1997).  Hybrid Approaches to Neural Network-based Language Processing.
Vaquero, C.., Vinyals O., & Friedland G. (2010).  A Hybrid Approach to Online Speaker Diarization. 2642-2645.
Stoll, L., & Doddington G. (2010).  Hunting for Wolves in Speaker Recognition. 159-164.
Lee, M. Kyung, Grgić-Hlača N., Tschantz M. Carl, Binns R., Weller A., Carney M., et al. (2020).  Human-Centered Approaches to Fair and Responsible AI. CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1-8.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Regier, T. (1996).  The Human Semantic Potential: Spatial Language and Constrained Connectionism.
Regier, T. (1996).  The Human Semantic Potential.
Saha, D., Schumann C., McElfresh D. C., Dickerson J. P., Mazurek M. L., & Tschantz M. Carl (2020).  Human Comprehension of Fairness in Machine Learning. AIES '20: Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 152.
Orr, R., & van Leeuwen D. A. (2009).  A Human Benchmark for Language Recognition. 2175-2178.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Kruse, H., Allman M., Griner J., & Tran D. (1998).  HTTP Page Transfer Rates Over Geo-Stationary Satellite Links. Proceedings of the 6th International Conference on Telecommunication Systems.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Weaver, N. (2021).  How to Start Disrupting Cryptocurrencies: “Mining” Is Money Transmission. Lawfare.

Pages