Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Janin, A., Ang J., Bhagat S., Dhillon R., Edwards J., Macías-Guarasa J., et al. (2004).  The ICSI Meeting Project: Resources and Research. Proceedings of the ICASSP 2004 Meeting Recognition Workshop.
Edwards, J. (2004).  The ICSI Meeting Corpus: Close-Talking and Far-Field, Multi-Channel Transcriptions for Speech and Language Researchers. Proceedings of the Workshop on Compiling and Processing Spoken Language Corpora at the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 8-11.
Janin, A., Baron D., Edwards J., Ellis D. P. W., Gelbart D., Morgan N., et al. (2003).  The ICSI Meeting Corpus. Proceedings of ICASSP-2003.
Kingsbury, B., Soltau H.., Saon G.., Chu S.., Kuo H.-K.., Mangu L.., et al. (2011).  The IBM 2009 GALE Arabic Speech Transcription System. 4672-4675.
Kim, S., Gholami A., Yao Z., Mahoney M., & Keutzer K. (2021).  I-BERT: Integer-only BERT Quantization.
Makin, J., & Narayanan S. (2013).  A Hybrid-System Model of the Coagulation Cascade. 206-212.
Anguera, X., Aguilo M., Wooters C., Nadeu C., & Hernando J. (2006).  Hybrid Speech/Non-Speech Detector Applied to Speaker Diarization of Meetings. Proceedings of IEEE Odyssey: The Speaker and Language Recognition Workshop. 1-6.
Cohen, M., Franco H., Morgan N., Rumelhart D., & Abrash V. (1992).  Hybrid Neural Network / Hidden Markov Model Continuous Speech Recognition. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 915-918.
Ravuri, S. (2014).  Hybrid MLP/Structured-SVM Tandem Systems for Large Vocabulary and Robust ASR.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.
Vaquero, C.., Vinyals O., & Friedland G. (2010).  A Hybrid Approach to Online Speaker Diarization. 2642-2645.
Stoll, L., & Doddington G. (2010).  Hunting for Wolves in Speaker Recognition. 159-164.
Lee, M. Kyung, Grgić-Hlača N., Tschantz M. Carl, Binns R., Weller A., Carney M., et al. (2020).  Human-Centered Approaches to Fair and Responsible AI. CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1-8.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Saha, D., Schumann C., McElfresh D. C., Dickerson J. P., Mazurek M. L., & Tschantz M. Carl (2020).  Human Comprehension of Fairness in Machine Learning. AIES '20: Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 152.
Orr, R., & van Leeuwen D. A. (2009).  A Human Benchmark for Language Recognition. 2175-2178.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Kruse, H., Allman M., Griner J., & Tran D. (1998).  HTTP Page Transfer Rates Over Geo-Stationary Satellite Links. Proceedings of the 6th International Conference on Telecommunication Systems.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Huang, P-S., Mertens R., Divakaran A., Friedland G., & Hasegawa-Johnson M. (2012).  How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection. 505-508.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Ravuri, S., & Wegmann S. (2016).  How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models. Proceedings of Interspeech 2016.
Kay, P., & Sag I. A. (2009).  How Hard A Problem Would This Be To Solve?.
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
Hong, J., & Baker C. F. (2011).  How Good Is the Crowd at "Real" WSD?.

Pages