Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Posch, S. (1991).  Detecting Skewed Symmetries.
Javed, M., & Paxson V. (2013).  Detecting Stealthy, Distributed SSH Brute-Forcing.
Zhang, Y., & Paxson V. (2000).  Detecting Stepping Stones. Proceedings of the Ninth USENIX Security Symposium.
Pirinen, T., Yli-Hietanen J., Pertilä P., & Visa A. (2004).  Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation. Proceedings of IEEE ISCAS.
Althoff, T., Song H. Oh, & Darrell T. (2012).  Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition.
Hillard, D., Ostendorf M., & Shriberg E. (2003).  Detection of Agreement vs. Disagreement In Meetings: Training With Unlabeled Data. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2003).
Lindfors, E., Gopalacharyulu P. V., Halperin E., & Orešič M. (2009).  Detection of Molecular Paths Associated with Insulitis and Type 1 Diabetes in Non-Obese Diabetic Mouse. PLoS ONE. 4(10), 
Griesemer, R. (1994).  Detection of Side-Effects in Function Procedures.
Hoffman, J., Pathak D., Darrell T., & Saenko K. (2015).  Detector Discovery in the Wild: Joint Multiple Instance and Representation Learning. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2883-2891.
Lee-Goldman, R., Rhodes R., & Ellsworth M. (2009).  Determination and Modification: Interaction and Interpretation.
Sarolahti, P., Allman M., & Floyd S. (2007).  Determining an Appropriate Sending Rate Over an Underutilized Network Path. 51(7), 1815-1832.
Knightly, E. W. (1996).  Determining Priority Queue Performance from Second Moment Traffic Characterizations.
Luby, M., & Velickovic B. (1993).  On Deterministic Approximation of DNF.
Giammarresi, D., & Montalbano R. (1996).  Deterministic Generalized Automata.
Alomar, N., & Egelman S. (2022).  Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps. Proceedings on Privacy Enhancing Technologies. 2022, 250-273.
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Hopfgartner, F., & Jose J. M. (2011).  Development of a Test Collection for Studying Long-Term User Modelling. Proceedings of the Workshop Information Retrieval (LWA'11).
Adamo, J-M. (1994).  Development of Parallel BLAS with ARCH Object-Oriented Parallel Library, Implementation on CM-5.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Pal, J. (2003).  The Developmental Promise of Information and Communications Technology in India.
Morgan, N., Asanović K., Kingsbury B., & Wawrzynek J. (1990).  Developments in Digital VLSI Design for Artificial Neural Networks.
[Anonymous] (2001).  Developments in Forecast Combination and Portfolio Choice. (Dunis, C.., Timmermann A.., & Moody J., Ed.).
Pang, R., Allman M., Paxson V., & Lee J. (2006).  The Devil and Packet Trace Anonymization. Computer Communication Review. 36(1), 29-38.
Wöhlke, G. (1994).  Dextrous Object Manipulation with Robot Hands Including Rolling and Slipping: Improved Motion & Force Computation Method.

Pages