Publications

Found 983 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Genoud, D., Ellis D. P. W., & Morgan N. (1999).  Simultaneous Speech and Speaker Recognition Using Hybrid Architecture.
Ee, C. Tien, Lee J., Maltz D., Shenker S. J., & Subramanian L. (2007).  Simplifying Access Control in Enterprise Networks.
Veldt, N., Gleich D., & Mahoney M. (2016).  A Simple and Strongly-Local Flow-Based Method for Cut Improvement. Proceedings of the 33rd ICML Conference.
Giannakis, G. B., Bach F., Cendrillon R., Mahoney M., & Neville J. (2014).  Signal Processing for Big Data (Editorial for Special Issue). IEEE Signal Processing Magazine. 31, 15-16.
Hermansky, H., & Morgan N. (2004).  Show What You Know: Musings on the Reporting of Negative Results in Speech Recognition Research. Journal of Negative Results in Speech and Audio Sciences. 1,
Kanich, C., Weaver N., McCoy D., Halvorson T., Kreibich C., Levchenko K., et al. (2011).  Show Me the Money: Characterizing Spam-Advertised Revenue.
Fountoulakis, K.., Gleich D.. F., & Mahoney M. (2018).  A Short Introduction to Local Graph Clustering Methods and Software. Abstracts of the 7th International Conference on Complex Networks and Their Applications.
Friedland, G., Maier G., Sommer R., & Weaver N. (2011).  Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy.
N. Erichson, B., Mathelin L., Yao Z., Bruntonq S. L., Mahoney M., & J. Kutz N. (2020).  Shallow neural networks for fluid flow reconstruction with limited sensors. Proceedings of the Royal Society A. 476(2238), 
N. Erichson, B., Mathelin L., Yao Z., Bruntonq S. L., Mahoney M., & J. Kutz N. (2020).  Shallow neural networks for fluid flow reconstruction with limited sensors. Proceedings of the Royal Society A. 476(2238), 
MacKie-Mason, J., Shenker S. J., & Varian H. R. (1996).  Service Architecture and Content Provision: The Network Provider as Editor. 191-208.
Moulin, H., & Shenker S. J. (1992).  Serial Cost Sharing. Econometrica. 60(5), 1009-1037.
S. McCormick, T., Pinedo M. L., Shenker S. J., & Wolf B. (1989).  Sequencing in an Assembly Line with Blocking to Minimize Cycle Time. Operations Research. 37(6), 925-935.
Venugopalan, S., Rohrbach M., Donahue J., Mooney R., Darrell T., & Saenko K. (2015).  Sequence to Sequence - Video to Text. The IEEE International Conference on Computer Vision (ICCV).
Ruppenhofer, J., Sporleder C., Morante R., Baker C. F., & Palmer M. (2010).  SemEval-2010 Task 10: Linking Events and Their Participants in Discourse. 45-50.
Ruppenhofer, J., Sporleder C., Morante R., Baker C. F., & Palmer M. (2009).  SemEval-2010 Task 10: Linking Events and their Participants in Discourse. 106-111.
Mohit, B., & Narayanan S. (2003).  Semantic Extraction with Wide-Coverage Lexical Resources. 64-66.
Utans, J., & Moody J. (1991).  Selecting Neural Network Architecture via the Prediction Risk: Application to Corporate Bond Rating Prediction. Proceedings of the First International Conference on Artificial Intelligence Applications on Wall Street.
Utans, J., Moody J., Rehfuss S., & Siegelmann H.. (1995).  Selecting Input Variables via Sensitivity Analysis: Application to Predicting the U.S. Business Cycle. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
Oppliger, R., Gupta A., Moran M., & Bettati R. (1995).  A Security Architecture for Tenet Scheme 2.
Mittal, P., Paxson V., Sommer R., & Winterrowd M. (2009).  Securing Mediated Trace Access Using Black-Box Permutation Analysis.
Freksa, C., Moratz R., & Barkowsky T. (1999).  Schematic Maps for Robot Navigation.
Bano, S.., Richter P.., Javed M.., Sundaresan S.., Durumeric Z.., Murdoch S.. J., et al. (2018).   Scanning the Internet for Liveness. Computer Communication Review. 48(2), 
Bano, S.., Richter P.., Javed M.., Sundaresan S.., Durumeric Z.., Murdoch S.. J., et al. (2018).   Scanning the Internet for Liveness. Computer Communication Review. 48(2), 
Morgan, N., Chen B. Y., Zhu Q., & Stolcke A. (2003).  Scaling Up: Learning Large-Scale Recognition Methods from Small-Scale Recognition Tasks.

Pages