Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
Impagliazzo, R., & Luby M. (1989).  Pseudo-Random Number Generator From ANY One-Way Function.
Imseng, D., & Friedland G. (2010).  Tuning-Robust Initialization Methods for Speaker Diarization. IEEE Transactions on Audio. 18(8), 2028-2037.
Imseng, D., & Friedland G. (2009).  Robust Speaker Diarization for Short Speech Recordings. 432-437.
Imseng, D., & Friedland G. (2010).  An Adaptive Initialization Method for Speaker Diarization Based on Prosodic Features. 4946-4949.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
Irani, S. (1990).  Two Results on the List Update Problem.
Irani, S. (1992).  Competitive On-line Algorithms for Paging and Graph Coloring.
Isenburg, M. (1996).  Transmission of Multimedia Data Over Lossy Networks (Thesis).
Ishac, J., & Allman M. (2001).  On the Performance of TCP Spoofing in Satellite Networks.
Ivantysynova, L., Klafft M., Ziekow H., Günther O., & Kara S. (2009).  RFID in Manufacturing: The Investment Decision.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Fast Semidifferential-based Submodular Function Optimization. 28(3), 855-863.
Iyer, A. Pamanabha, Panda A., Chowdhury M., Akella A., Shenker S. J., & Stoica I. (2018).  Monarch: Gaining Command on Geo-Distributed Graph Analytics.. Proceedings of HotCloud 2018.
Iyer, A. Padmanabha, Panda A., Venkataraman S., Chowdhury M., Akella A., Shenker S. J., et al. (2018).  Bridging the GAP: towards approximate graph analytics. Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Curvature and Optimal Algorithms for Learning and Minimizing Submodular Functions.
J
Jacobsen, H-A., & Voisard A. (1998).  CORBA-Based Interoperable Geographic Information Systems.
[Anonymous] (1999).  Connectionist Symbol Processing: Dead or Alive?. (Jagota, A.., Plate T.., Shastri L., & Sun R.., Ed.).2, 1-40.
Jähnichen, S., Gabriel R., Weber M., & Anlauff M. (1989).  Supporting Formal Program Developments: the DEVA Environment.
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Jain, P., Kulis B., & Dhillon I. (2010).  Inductive Regularized Learning of Kernel Functions. 946-954.
Jamin, S., Shenker S. J., & Danzig P. B. (1997).  Comparison of Measurement-Based Admission Control Algorithms for Controlled-Load Service. Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 3, 973-980.
Jamin, S., Danzig P. B., Shenker S. J., & Zhang L. (1997).  A Measurement-Based Admission Control Algorithm for Integrated Services Packet Network. IEEE/ACM Transactions on Networking. 5(1), 56-70.
Jamin, S., Shenker S. J., Zhang L., & Clark D. D. (1992).  An Admission Control Algorithm for Predictive Real-Time Service (Extended Abstract). Proceedings of the Third International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV). 349-356.
Janin, A., Ellis D. P. W., & Morgan N. (1999).  Multi-stream Speech Recognition: Ready for Prime Time?. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Janin, A., & Morgan N. (2001).  SpeechCorder, The Portable Meeting Recorder. Proceedings of the Workshop on Hands-Free Speech Communication.
Janin, A., Friedland G., & Sommer R. (2012).  Content?based Privacy for Consumer?Produced Multimedia.

Pages