Publications

Found 4258 results
Author Title Type [ Year(Desc)]
2013
Donahue, J., Hoffman J., Rodner E., Saenko K., & Darrell T. (2013).  Semi-Supervised Domain Adaptation with Instance Constraints.
Xin, R., Rosen J., Zaharia M., Franklin M. J., Shenker S. J., & Stoica I. (2013).  Shark: SQL and Rich Analytics at Scale. 13-24.
Chang, S-Y., Meyer B. T., & Morgan N. (2013).  Spectro-Temporal Features for Robust Speech Recognition Using Power-Law Nonlinearity and Power-Bias Subtraction.
Tsai, T.. J., & Morgan N. (2013).  Speech Activity Detection: An Economics Approach.
Liu, X., Hieronymus J., Gales M.. J. F., & Woodland P. (2013).  Syllable Models for Mandarin Speech Recognition: Exploiting Character Language Models. Journal of the Acoustical Society of America. 133(1), 519-528.
Elizalde, B. Martinez, & Friedland G. (2013).  Taming the Wild: Acoustic Segmentation in Consumer?Produced Videos.
Wegmann, S., Faria A., Janin A., Riedhammer K., & Morgan N. (2013).  The Tao of ATWV: Probing the Mysteries of Keyword Search Performance.
de Melo, G., & Weikum G. (2013).  Taxonomic Data Integration from Multilingual Wikipedia Editions. 1-39.
Colmenares, J. A., Eads G., Hofmeyr S., Bird S., Moretó M., Chou D., et al. (2013).  Tessellation: Refactoring the OS around Explicit Resource Containers with Continuous Adaptation.
Hadziosmanovic, D., Sommer R., Zambon E., & Hartel P. (2013).  Through the Eye of the PLC: Towards Semantic Security Monitoring for Industrial Control Systems.
Khattak, S., Javed M., Anderson P. D., & Paxson V. (2013).  Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
Nechaev, B., Paxson V., Allman M., Bennett M., & Gurtov A. (2013).  Towards Methodical Calibration: A Case Study of Enterprise Switch Measurements.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Transform-Based Domain Adaptation for Big Data.
de Melo, G., & Hose K. (2013).  Tutorial: Searching the Web of Data.
Chu, V., McMahon I., Riano L., McDonald C. G., He Q., Perez-Tejada J. Martinez, et al. (2013).  Using Robotic Exploratory Procedures to Learn the Meaning of Haptic Adjectives.
Jia, Y., Abbott J., Austerweil J., Griffiths T., & Darrell T. (2013).  Visual Concept Learning: Combining Machine Vision and Bayesian Generalization on Concept Hierarchies.
Ziem, A. (2013).  Von der Kasusgrammatik zum FrameNet: Frames, Konstruktionen und die Idee eines Konstruktikons.
Fillmore, L. Wong, & Fillmore C. J. (2013).  What Does Text Complexity Mean for English Learners and Language Minority Students?. 1-11.
Elizalde, B. Martinez, Friedland G., & Ni K. (2013).  What You Hear Is What You Get: Audio-Based Video Content Analysis.
Vinyals, O., Jia Y., & Darrell T. (2013).  Why Size Matters: Feature Coding as Nystrom Sampling.
Marquis-Boire, M., Marczak B., Guarnieri C., & Scott-Railton J. (2013).  You Only Click Twice: FinFisher's Global Proliferation. The Citizen Lab.
Guadarrama, S., Krishnamoorthy N., Malkarnenkar G., Mooney R., Darrell T., & Saenko K. (2013).  YouTube2Text: Recognizing and Describing Arbitrary Activities Using Semantic Hierarchies and Zero-Shoot Recognition.
2014
[Anonymous] (2014).  2014 Audited Financial Statement.
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.

Pages