Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Ganapathy, S., Motlicek P., Hermansky H., & Garudadri H. (2008).  Temporal Masking for Bit-Rate Reduction in Audio Codec based on Frequency Domain Linear Prediction. 4781-4784.
Hermansky, H., & Sharma S. (1999).  Temporal Patterns (TRAPS) in ASR of Noisy Speech. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
Arai, T., & Greenberg S. (1997).  The Temporal Properties of Spoken Japanese Are Similar to Those of English. Proceedings of the Fifth European Conference on Speech Communication and Technology (Eurospeech '97). 2, 1011-1014.
Morgan, N. (1999).  Temporal Signal Processing for ASR. Proceedings of the IEEE Workshop on Automatic Speech Recognition and Understanding. 9-16.
Colmenares, J. A., Eads G., Hofmeyr S., Bird S., Moretó M., Chou D., et al. (2013).  Tessellation: Refactoring the OS around Explicit Resource Containers with Continuous Adaptation.
Liu, R., Klues K., Bird S., Hofmeyr S., Asanović K., & Kubiatowicz J. D. (2009).  Tessellation: Space-Time Partitioning in a Manycore Client OS.
Feldman, J., Weber S. Hollbach, & Stolcke A. (1990).  A Testbed for the Miniature Language L0. Proceedings of the Fifth Rocky Mountain Conference on Artificial Intelligence.
Boulis, C., & Ostendorf M. (2005).  Text Classification by Augmenting the Bag-of-Words Representation with Redundancy-Compensated Bigrams. Proceedings of the SIAM International Conference on Data Mining at the Workshop on Feature Selection in Data Mining (SIAM-FSDM 2005).
Shriberg, E., & Ferrer L. (2007).  A Text-constrained Prosodic System for Speaker Verification. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 1226-1229.
Boakye, K., & Peskin B. (2004).  Text-Constrained Speaker Recognition on a Text-Independent Task. Proceedings of the Speaker and Language Recognition Workshop (Odyssey 2004).
Shenker, S. J. (1990).  A Theoretical Analysis of Feedback Flow Control. Proceedings of the ACM SIGCOMM Symposium on Communications Architectures & Protocols. 156-165.
Karp, R. M. (2012).  Theory of Computation as an Enabling Tool for the Sciences.
Elizalde, B. Martinez, Friedland G., Lei H., & Divakaran A. (2012).  There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media. 27-32.
Egelman, S., Kannavara R., & Chow R. (2015).  Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Wang, X., & Yu S. X. (2021).  Tied Block Convolution: Leaner and Better CNNs with Shared Thinner Filters. Proceedings of AAAI Conference on Artificial Intelligence.
Chun, B-G., Maniatis P., Shenker S. J., & Kubiatowicz J. D. (2009).  Tiered Fault Tolerance for Long-Term Integrity. 267-282.
Elsässer, R., & Sauerwald T. (2009).  Tight Bounds for the Cover Time of Multiple Random Walks. 415-426.
Chuzhoy, J., Guha S., Halperin E., Khanna S., Kortsarz G., & Naor S.. (2004).  Tight Lower Bounds for the Asymetric k-Center Problem. Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC04).
Pirinen, T., & Yli-Hietanen J. (2004).  Time Delay Based Failure-Robust Direction of Arrival Estimation. Proceedings of IEEE SAM 2004.
Holtz, R., Amann J., Mehani O., Wachs M., & Kaafar M. Ali (2016).  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Michaelis, L.., Chang N., & Narayanan S. (2005).  Together at Last: The Tense-Aspect Interface in Simulation Semantics. Proceedings of the First Conference on New Directions in Cognitive Linguistics.
Chen, B. Y., Zhu Q., & Morgan N. (2005).  Tonotopic Multi-Layered Perceptron: A Neural Network for Learning. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 945-948.
Agarwal, D.., & Floyd S. (1994).  A Tool for Debugging Internet Multicast Routing. Proceedings of the 22nd Annual ACM Computer Science Conference (CSC '94).
Juan, L.., Kreibich C., Lin C.-H.., & Paxson V. (2008).  A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 267-278.
Staniford, S., Moore D., Paxson V., & Weaver N. (2004).  The Top Speed of Flash Worms. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).

Pages