Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Skibola, C. F., Bracci P. M., Halperin E., Conde L., Craig D. W., Agana L., et al. (2009).  Genetic Variants at 6p21.33 Are Associated with Susceptibility to Follicular Lymphoma. Nature Genetics. 41(8), 873-875.
Skočaj, D., Kristan M., Vrečko A., Leonardis A., Fritz M., Stark M., et al. (2010).  Multi-Modal Learning. 265-309.
Slager, S.. L., Skibola C. F., & Halperin E. (2012).  Common Variation at 6p21.31 (BAK1) Influences the Risk of Chronic Lymphocytic Leukemia. Blood. 120(4), 843-846.
Sokol, J., & Tutsch D. (2001).  Petri Net Based Performance Evaluation of USAIA's Bandwidth Partitioning for the Wireless Cell Level.
Sokol, J., & Widmer J. (2001).  USAIA: Ubiquitous Service Access Internet Architecture.
Somervuo, P., Chen B. Y., & Zhu Q. (2003).  Feature Transformations and Combinations for Improving ASR Performance. Proceedings of EUROSPEECH 2003.
Somervuo, P. (2003).  Experiments with Linear and Nonlinear Feature Transformations in HMM Based Phone Recognition. Proceedings of ICASSP-2003.
Somervuo, P. (2002).  Speech Modeling Using Variational Bayesian Mixture of Gaussians. Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Sommer, R., & Paxson V. (2005).  Exploiting Independent State For Network Intrusion Detection. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
Sommer, R., Weaver N., & Paxson V. (2009).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
Sommer, R., & Paxson V. (2003).  Enhancing Byte-Level Network Intrusion Detection Signatures with Context. Proceedings of ACM CCS.
Sommer, R., & Paxson V. (2010).  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. 305-316.
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Sommer, R., Vallentin M., De Carli L., & Paxson V. (2014).  HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Sommer, R., Amann J., & Hall S. (2016).  Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data. Proceedings of 2016 Annual Computer Security Applications Conference.
Sommer, R., Amann J., & Hall S. (2015).  Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data. ICSI Technical Report.
Song, X., Rave W., & Fettweis G. (2016).  Analog and successive channel equalization in strong line-of-sight MIMO communication. 2016 IEEE International Conference on Communications (ICC). 1-7.
Song, H. Oh, Fritz M., Göhring D., & Darrell T. (2015).  Learning to Detect Visual Grasp Affordance.
Song, X., Jans C., Landau L., Cvetkovski D., & Fettweis G. (2015).  A 60GHz LOS MIMO Backhaul Design Combining Spatial Multiplexing and Beamforming for a 100Gbps Throughput. 2015 IEEE Global Communications Conference (GLOBECOM). 1-6.
Song, H. Oh, Fritz M., Gu C., & Darrell T. (2011).  Visual Grasp Affordances From Appearance-Based Cues. 998-1005.
Song, H. Oh, Lee Y. Jae, Jegelka S., & Darrell T. (2014).  Weakly-Supervised Discovery of Visual Pattern Configurations.
Song, X., Babu N., Rave W., Majhi S., & Fettweis G. (2016).  Two-Level Spatial Multiplexing using Hybrid Beamforming Antenna Arrays for mmWave Communications. CoRR. abs/1607.08737,
Song, H. Oh, Girshick R., Jegelka S., Mairal J., Harchaoui Z., & Darrell T. (2014).  On Learning to Localize Objects With Minimal Supervision.

Pages