Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Bagci, F., Wolf J.., Satzger B., & Ungerer T. (2010).  UbiMASS - Ubiquitous Mobile Agent System for Wireless Sensor Networks. 245-252.
Boakye, K., Vinyals O., & Friedland G. (2008).  Two's a Crowd: Improving Speaker Diarization by Automatically Identifying and Excluding Overlapped Speech Authors. Proceedings of the Annual Conference of the International Speech Communication Association (Interspeech 2008). 32-35.
Kitzelmann, E. (2011).  Two New Operators for IGOR2 to Increase Synthesis Efficiency. 49-61.
Shenker, S. J., & Breslau L. (1995).  Two Issues in Reservation Establishment. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95). 14-26.
Karbasi, M., Abdelaziz A. Hussen, & Kolossa D. (2016).  Twin-HMM-based Non-intrusive Speech Intelligibility Prediction. Proceedings of ICASSP.
Tsai, L., Wijesekera P., Reardon J., Reyes I., Chen J-W., Good N., et al. (2017).  TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences. Proceedings of SOUPS '17.
Althaus, E., & Mehlhorn K. (2000).  TSP-Based Curve Reconstruction in Polynomial Time. Proceedings of the Eleventh Symposium on Discrete Algorithms. 686-695.
Yao, Z.., Gholami A.., Xu P.., Keutzer K.., & Mahoney M. (2019).  Trust Region Based Adversarial Attack on Neural Networks. Proceedings of the 32nd CVPR Conference. 11350-11359.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Levis, P., Patel N., Culler D. E., & Shenker S. J. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Morgan, N., Chen B. Y., Zhu Q., & Stolcke A. (2004).  TRAPping Conversational Speech: Extending TRAP/Tandem Approaches to Conversational Telephone Speech Recognition. Proceedings of IEEE ICASSP.
Fillmore, C. J., & Sato H. (2002).  Transparency and Building Lexical Dependency Graphs. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Mirghafori, N., & Morgan N. (1998).  Transmissions and Transitions: A Study of Two Common Assumptions in Multi-Band ASR. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1998). 713-716.
Venugopalan, S., Xu H., Donahue J., Rohrbach M., Mooney R., & Saenko K. (2015).  Translating Videos to Natural Language Using Deep Recurrent Neural Networks.
Morgan, N., Konig Y., Wu S-L., & Bourlard H. (1995).  Transition-Based Statistical Training for ASR. IEEE Snowbird Workshop '95.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Transform-Based Domain Adaptation for Big Data.
Quattoni, A., Collins M., & Darrell T. (2008).  Transfer Learning for Image Classification with Sparse Prototype Representations.
Asanović, K. (2007).  Transactors for Parallel Hardware and Software Co-design. Proceedings of the IEEE International High Level Design Validation and Test Workshop 2007 (HLDVT-2007). 140-142.
Boehme, R., & Koepsell S.. (2010).  Trained to Accept? A Field Experiment on Consent Dialogs. 2403-2406.
Medina, A., Taft N., Salamatian K., Bhattacharyya S., & Diot C. (2002).  Traffic Matrix Estimation Techniques: Existing Techniques Compared and New Directions. Proceedings of SIGCOMM 2002.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Martin, C.. H., & Mahoney M. (2019).  Traditional and Heavy-Tailed Self Regularization in Neural Network Models. Proceeding of the 36th ICML Conference. 4284-4293.
Rehfuss, S., Wu L., & Moody J. (1996).  Trading with Committees: A Comparative Study. Proceedings of the Third International Conference on Neural Networks in the Capital Markets.
Vallina-Rodriguez, N., Sundaresan S., Razaghpanah A., Nithyanand R., Allman M., Kreibich C., et al. (2016).  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Allman, M., Barford P., Krishnamurty B., & Wang J. (2006).  Tracking the Role of Adversaries in Measuring Unwanted Traffic. Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.

Pages