Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Rovner, P. D., & Feldman J. (1968).  The LEAP language and data structure. 1, 579-585.
Roth, V., & Arnold M.. (2002).  Improved Key Management for Digital Watermark Monitoring. Proceedings of SPIE.
Roth, V. (2002).  Empowering mobile software agents. Proceedings 6th IEEE Mobile Agents Conference.
Roth, V. (2002).  Java Security Architecture and Extensions. Dr. Dobbs Journal.
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.
Rössner, C., & Schnorr C. P. (1994).  A Stable Integer Relation Algorithm.
Rosenfeld, A.., Feldman J., Kanal L.. N., & Winston P.. H. (1977).  AI and Pattern Recognition.
Rosario, B., Hearst M. A., & Fillmore C. J. (2002).  The Descent of Hierarchy, and Selection in Relational Semantics. Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL 2002). 247-254.
Roosta-Khorasani, F., & Mahoney M. (2016).  Sub-Sampled Newton Methods I: Globally Convergent Algorithms.
Roosta-Khorasani, F.., & Mahoney M. (2019).  Sub-Sampled Newton Methods. Mathematical Programming. 293-326.
Roosta-Khorasani, F., & Mahoney M. (2016).  Sub-Sampled Newton Methods II: Local Convergence Rates.
Ronen, A.. (2001).  On Approximating Optimal Auctions.
Ronen, B.., & Karp R. M. (1994).  An information entropy approach to the small-lot concept. IEEE Transactions on Engineering Management. 41(1), 89-92.
Ronen, R.., Gan I.., Modai S.., Sukacheov A.., Dror G.., Halperin E., et al. (2010).  miRNAkey: A Software for microRNA Deep Sequencing Analysis. Bioinformatics. 26(20), 2615-2616.
Ronen, T.., Shani C.., Hope T.., Petruck M. R. L., Abend O., & Shahaf D. (2020).  Language (Re)modelling: Towards Embodied Language Understanding. Proceedings of the Association for Computational Linguistics . 58, 6268–6281.
Rojas, R. (1993).  Second Order Backpropagation - Efficient Computation of the Hessian Matrix for Neural Networks.
Rohrbach, A., Rohrbach M., Tandon N., & Schiele B. (2015).  A Dataset for Movie Description.
Rohrbach, A., Rohrbach M., Qiu W., Friedrich A., Pinkal M., & Schiele B. (2014).  Coherent Multi-Sentence Video Description with Variable Level of Detail. 8753, 184-195.
Rodriguez, N.., & Ierusalimschy R. (1994).  Side Effect Free Functions in Object-Oriented Languages.
Rodrigues, H., Santos J. Renato, Turner Y., Soares P., & Guedes D. (2011).  Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter Networks.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Transform-Based Domain Adaptation for Big Data.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Scalable Transform-Based Domain Adaptation.
Robinson, A.., Almeida L.., Boite J.., Bourlard H., Fallside F., Hochberg H.., et al. (1993).  A Neural Network Based, Speaker Independent, Large Vocabulary, Continuous Speech Recognition System: the Wernicke Project. Proceedings of the Third European Conference on Speech Communication and Technology (Eurospeech '93). 1941-1944.
Roark, B.., Liu Y., Harper M. P., Stewart R.., Lease M.., Snover M.., et al. (2006).  Reranking for Sentence Boundary Detection in Conversational Speech. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 1, 545-548.
Rizk, R., Marx D.., Schrepfer M.., Zimmermann J.., & Günther O. (2009).  Media Coverage of Online Social Network Privacy Issues in Germany - A Thematic Analysis.

Pages