Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Harchol-Balter, M., & Downey A. B. (1995).  Exploiting Process Lifetime Distributions for Dynamic Load Balancing.
Ziekow, H. (2009).  Exploiting Process Knowledge for Event Processing in Distributed Business Applications. 277-281.
Fountoulakis, K., Chen X., Shun J., Roosta-Khorasani F., & Mahoney M. (2016).  Exploiting Optimization for Local Graph Clustering.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2012).  On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2013).  Exploiting Innocuous Activity for Correlating Users Across Sites.
Hakkani-Tür, D., Tur G., & Levit M. (2007).  Exploiting Information Extraction Annotations for Document Retrieval in Distillation Tasks. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 330-333.
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Sommer, R., & Paxson V. (2005).  Exploiting Independent State For Network Intrusion Detection. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
Yang, F., Tur G., & Shriberg E. (2008).  Exploiting Dialog Act Tagging and Prosodic Information for Action Item Identification. 4941-4944.
Eppe, M., Trott S., & Feldman J. (2016).  Exploiting Deep Semantics and Compositionality in Natural Language for Human-Robot-Interaction. Proceedings of International Conference on Inteligent Robots and Systems (IROS 2016).
Hieronymus, J., Liu X., Gales M.. J. F., & Woodland P. (2009).  Exploiting Chinese Character Models to Improve Speech Recognition Performance.
Sperduti, A. (1993).  Exploitation of Structured Gating Connections for the Normalization of a Visual Pattern.
Krishnan, R., Sterbenz J. P. G., Eddy W. M., Partridge C., & Allman M. (2004).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks. 46(3), 343-362.
Krishnan, R., Allman M., Partridge C., Sterbenz J. P. G., & Ivancic W.. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - Summary.
Krishnan, R., Allman M., Partridge C., & Sterbenz J. P. G. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks.
Bornscheuer, S-E., & Thielscher M. (1996).  Explicit and Implicit Indeterminism: Reasoning About Uncertain and Contradictory Specifications of Dynamic Systems.
Diederich, J. (1989).  Explanation and Connectionist Systems.
Valverde-Albacete, F.. J. (2005).  Explaining the Structure of FrameNet with Concept Lattices. Proceedings of the Third International Conference on Formal Concept Analysis (ICFCA 2005). 79-94.
Banerjea, A., Knightly E. W., Templin F. L., & Zhang H. (1994).  Experiments with the Tenet Real-Time Protocol Suite on the Sequoia 2000 Wide Area Network.
Morgan, N., Wooters C., Hermansky H., & Bourlard H. (1991).  Experiments with Temporal Resolution for Continuous Speech Recognition with Multi-Layer Perceptrons. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 405-410.
Trompf, M. (1992).  Experiments with Noise Reduction Neural Networks for Robust Speech Recognition.
Somervuo, P. (2003).  Experiments with Linear and Nonlinear Feature Transformations in HMM Based Phone Recognition. Proceedings of ICASSP-2003.
Althaus, E., Mehlhorn K., Naher S.., & Schirra S. (2000).  Experiments on Curve Reconstruction.
Kruse, H., Allman M., Griner J., & Tran D. (2001).  Experimentation and Modeling of HTTP Over Satellite Channels. International Journal of Satellite Communications.

Pages