Publications

Found 983 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Technical Report
Genoud, D., Ellis D. P. W., & Morgan N. (1999).  Simultaneous Speech and Speaker Recognition Using Hybrid Architecture.
Chasins, S., Cheung A., Crooks N., Ghodsi A., Goldberg K., Gonzalez J. E., et al. (2022).  The Sky Above the Clouds: A Berkeley View on the Future of Cloud Computing. arxiv.org.
Sachs, S. R., Freitas C. M. Dal Sas, Markowitz V., Talis A., Chen I-M.. A., Szeto E., et al. (1997).  The Spectro-Microscopy Electronic Notebook.
Wooters, C., & Morgan N. (1990).  Speech Segmentation and Labeling on the NeXT Machine.
Huang, Y., Friedland G., Müller C., & Mirghafori N. (2007).  Speeding Up Speaker Diarization by Using Prosodic Features.
Huang, Y., Friedland G., Müller C., & Mirghafori N. (2007).  Speeding Up Speaker Diarization by Using Prosodic Features.
Asanović, K., Beck J., Kingsbury B., Kohn P., Morgan N., & Wawrzynek J. (1991).  SPERT: A VLIW/SIMD Microprocessor for Artificial Neural Network Computations.
Morgan, N., Hermansky H., & Wooters C. (1990).  SPOONS '90: The SPeech recOgnition frOnt eNd workShop.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  The Spread of the Sapphire/Slammer Worm.
Zhang, J., & Morgan N. (1990).  Stochastic Model-Based Image Segmentation Using Markov Random Fields and Multi-Layer Perceptrons.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1989).  Subtree Isomorphism is in Random NC.
Antoniotti, M., & Mishra B. (1995).  The Supervisor Synthesis Problem for Unrestricted CTL is NP-complete.
Rasti, R., Murthy M., & Paxson V. (2014).  Temporal Lensing and its Application in Pulsing Denial of Service Attacks.
Banerjea, A., Ferrari D., Mah B. A., Moran M., Verma D. C., & Zhang H. (1994).  Tenet Real-Time Protocol Suite: Design, Implementation, and Experiences.
Banerjea, A., Ferrari D., Mah B. A., Moran M., Verma D. C., & Zhang H. (1994).  Tenet Real-Time Protocol Suite: Design, Implementation, and Experiences.
Ermolinskiy, A., Katti S., Shenker S. J., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
Adcock, A. B., Sullivan B. D., & Mahoney M. (2014).  Tree Decompositions and Social Graphs.
Chang, S-Y., Morgan N., Raju A., Alwan A., & Kreiman J. (2015).  Using Fast and Slow Modulations to Model Human Hearing of Fast and Slow Speech.
Karpinski, M., & Macintyre A. (1995).  VC Dimension of Sigmoidal and General Pfaffian Neural Networks.
Mueller, A., & Neuhold E. (1998).  The Virtual Gallery (TVIG) - 3D Visualization of a Queryable Art-database on the Internet.
Maresca, M., & Li H. (1991).  Virtual Parallelism Support in Reconfigurable Processor Arrays.
d'Amore, F., Marchetti-Spaccamela A., & Nanni U. (1992).  The Weighted List Update Problem and the Lazy Adversary.

Pages