Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Cutello, V., & Montero J. (1992).  A Model for Amalgamation in Group Decision Making.
Anguera, X., Shinozaki T., Wooters C., & Hernando J. (2007).  Model Complexity Selection and Cross-validation EM Training for Robust Speaker Diarization. 273-276.
Feldman, J., & Nigam A.. (1980).  A Model and Proof Technique for Message-Based Systems. 9(4), 768-784.
Cuendet, S., Hakkani-Tür D., & Tur G. (2006).  Model Adaptation for Sentence Segmentation from Speech. Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 102-105.
Tur, G., Guz U., & Hakkani-Tür D. (2006).  Model Adaptation for Dialog Act Tagging. Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 94-97.
Ruiz, P. M., & Gómez-Skarmeta A. (2004).  Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc Routing. 6(4), 331-342.
Widmer, J. (2000).  A Mobile Network Architecture for Vehicles.
Pinsdorf, U.., & Roth V. (2002).  Mobile Agent Interoperability Patterns and Practice. Proceedings Ninth Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems.
Günther, O., Müller R., Schmidt P., Bhargava H., & Krishnan R. (1996).  MMM: A WWW-Based Method Management System for Using Software Modules Remotely.
Morgan, N., Faria A., Ravuri S., & Zhao S. Y. (2010).  MLP-Based Feature Extraction for Speech Transcription.
Stolcke, A., Ferrer L., Kajarekar S., Shriberg E., & Venkataraman A. (2005).  MLLR Transforms as Features in Speaker Recognition. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 2425-2428.
Utans, J. (1993).  Mixture Models and the EM Algorithm for Object Recognition within Compositional Hierarchies. Part 1: Recognition.
Sauerwald, T. (2010).  On Mixing and Edge Expansion Properties in Randomized Broadcasting. Algorithmica. 56(1), 51-88.
Amann, J., Gasser O., Scheitle Q., Brent L., Carle G., & Holz R. (2017).  Mission Accomplished? HTTPS Security after DigiNotar. Proceedings of the IMC 2017.
Ronen, R.., Gan I.., Modai S.., Sukacheov A.., Dror G.., Halperin E., et al. (2010).  miRNAkey: A Software for microRNA Deep Sequencing Analysis. Bioinformatics. 26(20), 2615-2616.
Ermolinskiy, A., Moon D., Chun B-G., & Shenker S. J. (2008).  Minuet: Rethinking Concurrency Control in Storage Area Networks.
Ermolinskiy, A., Moon D., Chun B-G., & Shenker S. J. (2009).  Minuet: Rethinking Concurrency Control in Storage Area Networks. 311-324.
Gleich, D., & Mahoney M. (2016).  Mining Large graphs. Handbook of Big Data. 191-220.
Halperin, E., & Karp R. M. (2005).  The Minimum-Entropy Set Cover Problem. Theoretical Computer Science. 348(2), 240-250.
Halperin, E., & Karp R. M. (2004).  The Minimum-Entropy Set Cover Problem. Proceedings of ICALP.
Moody, J., & Saffell M. (2000).  Minimizing Downside Risk via Stochastic Dynamic Programming.
Maletti, A. (2008).  Minimizing Deterministic Weighted Tree Automata. 357-372.
P. Godfrey, B., Shenker S. J., & Stoica I. (2006).  Minimizing Churn in Distributed Systems. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 147-158.
P. Godfrey, B., Shenker S. J., & Stoica I. (2005).  Minimizing Churn in Distributed Systems.
Derezinski, M.., Clarkson K.. L., Mahoney M., & Warmuth M.. K. (2019).  Minimax experimental design: Bridging the gap between statistical and worst-case approaches to least squares regression. Proceedings of 2019 COLT.

Pages