Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Journal Article
Sarikaya, R.., Kirchhoff K., Schultz T.., & Hakkani-Tür D. (2009).  Introduction to the Special Issue on Processing Morphologically Rich Languages. IEEE Transactions on Audio. 17(5), 861-862.
Yu, D., Hinton G., Morgan N., Chien J-T., & Sagayama S. (2012).  Introduction to the Special Section on Deep Learning for Speech and Language Processing. IEEE Transactions on Audio. 20(1), 4-6.
Tang, L.., Li J., Li Y.., & Shenker S. J. (2009).  An Investigation of the Internet’s IP-Layer Connectivity. Computer Communications. 32(5), 913-926.
Böhme, R.., & Moore T.. (2010).  The Iterated Weakest Link. IEEE Security and Privacy. 9(1), 53-55.
Levit, M., Hakkani-Tür D., Tur G., & Gillick D. (2009).  IXIR: A Statistical Information Distillation System. Journal of Computer Speech and Language. 23(4), 527-542.
Roth, V. (2002).  Java Security Architecture and Extensions. Dr. Dobbs Journal.
Baran, Y., & Halperin E. (2012).  Joint Analysis of Multiple Metagenomic Samples. PLoS Computational Biology. 8(2), 
Sankararaman, S., Sridhar S., Kimmel G., & Halperin E. (2008).  LAMP: Local Ancestry in adMixed Populations. American Journal of Human Genetics. 82(2), 290-303.
Feldman, J. (2019).  Language, Stapp, and the Mind/Body/World Problem. Activitas Nervosa Superior. 98–101.
Kay, P., & Regier T. (2006).  Language, Thought, and Color: Recent Developments. Trends in Cognitive Sciences. 10(2), 51-54.
Regier, T., & Kay P. (2009).  Language, Thought, and Color: Whorf Was Half Right. Trends in Cognitive Science. 13(10), 439-446.
Hoffman, J., Pathak D., Tzeng E., Long J., Guadarrama S., Darrell T., et al. (2016).  Large Scale Visual Recognition Through Adaptation Using Joint Representation and Multiple Instance Learning. J. Mach. Learn. Res.. 17, 4954–4984.
Consortium, T. C. A. R. D. IoG. R. A. M. (2011).  Large-scale Association Analysis Identifies 13 New Susceptibility Loci for Coronary Artery Disease. Nature Genetics. 43(4), 333-338.
Ouyang, T., Ray S., Allman M., & Rabinovich M. (2014).  A Large-Scale Empirical Analysis of Email Spam Detection Through Network Characteristics in a Stand-Alone Enterprise. Computer Networks. 59, 101-121.
Li, F.., & Paxson V. (2018).   A Large-Scale Empirical Study of Security Patches. USENIX ;login:. 43(1), 
Schulz, P., Matthé M., Klessig H., Simsek M., Fettweis G., Ansari J., et al. (2017).  Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture. IEEE Communications Magazine. 55(2), 
Aziz-Zadeh, L., Koski L.., Zaidel E., Mazziotta J.., & Iacoboni M. (2006).  Lateralization of the Human Mirror Neuron System. Journal of Neuroscience. 26(11), 2964-2970.
Castelluccia, C., Duermuth M., & Imamoglu F. (2014).  Learning from Neuroscience to Improve Internet Security. ERCIM News. 99, 46.
Greenwald, A., Friedman E., & Shenker S. J. (2001).  Learning in Network Contexts: Experimental Results from Simulations. Games and Economic Behavior. 35(1), 80-123.
Darken, C., Chang J.., & Moody J. (1992).  Learning Rate Schedules for Faster Stochastic Gradient Search. Neural Networks for Signal Processing.
Regier, T., & Gahl S. (2004).  Learning the Unlearnable: The Role of Missing Evidence. Cognition. 93(2), 147-155.
Andreas, J., Rohrbach M., Darrell T., & Klein D. (2016).  Learning to Compose Neural Networks for Question Answering. CoRR. abs/1601.01705,
Song, H. Oh, Fritz M., Göhring D., & Darrell T. (2015).  Learning to Detect Visual Grasp Affordance.
Song, H. Oh, Fritz M., Goehring D., & Darrell T. (2016).  Learning to Detect Visual Grasp Affordance. IEEE Transactions on Automation Science and Engineering. 13(2), 798-809.
Moody, J., & Saffell M. (2001).  Learning to Trade via Direct Reinforcement. IEEE Transactions on Neural Networks. 12(4), 

Pages