Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Ben-Dor, A., Hartman T., Schwikowski B., Sharan R., & Yakhini Z. (2003).  Towards Optimally Multiplexed Applications of Universal DNA Tag Systems. Proceedings of the Seventh Annual International Conference on Research in Computational Molecular Biology (RECOMB'03).
Marzo, J. L., Maryni P.., & Vilà P. (2001).  Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS Case. Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001).
Wooters, C., Fung J., Peskin B., & Anguera X. (2004).  Towards Robust Speaker Segmentation: The ICSI-SRI Fall 2004 Diarization System. Proceedings of Fall 2004 Rich Transcription Workshop (RT-04F).
Mirghafori, N., Fosler-Lussier E., & Morgan N. (1996).  Towards Robustness to Fast Speech in ASR. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP-96).
Vinyals, O., & Friedland G. (2008).  Towards Semantic Analysis of Conversations: A System for the Live Identification of Speakers in Meetings. 426-431.
Lei, H. (2009).  Towards Structured Approaches to Arbitrary Data Selection and Performance Prediction for Speaker Recognition.
Bourlard, H., Dupont S., Hermansky H., & Morgan N. (1996).  Towards Subband-Based Speech Recognition. Proceedings of the VIII European Signal Processing Conference (EUSIPCO '96). 1579-1582.
Holz, R., Hiller J., Amann J., Razaghpanah A., Hohleld O., Vallina-Rodriguez N., et al. (2020).  Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization. ACM SIGCOMM Computer Communication Review. 50(3), 3-15.
Allman, M., Barford P., Krishnamurty B., & Wang J. (2006).  Tracking the Role of Adversaries in Measuring Unwanted Traffic. Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
Vallina-Rodriguez, N., Sundaresan S., Razaghpanah A., Nithyanand R., Allman M., Kreibich C., et al. (2016).  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Rehfuss, S., Wu L., & Moody J. (1996).  Trading with Committees: A Comparative Study. Proceedings of the Third International Conference on Neural Networks in the Capital Markets.
Martin, C.. H., & Mahoney M. (2019).  Traditional and Heavy-Tailed Self Regularization in Neural Network Models. Proceeding of the 36th ICML Conference. 4284-4293.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Medina, A., Taft N., Salamatian K., Bhattacharyya S., & Diot C. (2002).  Traffic Matrix Estimation Techniques: Existing Techniques Compared and New Directions. Proceedings of SIGCOMM 2002.
Boehme, R., & Koepsell S.. (2010).  Trained to Accept? A Field Experiment on Consent Dialogs. 2403-2406.
Asanović, K. (2007).  Transactors for Parallel Hardware and Software Co-design. Proceedings of the IEEE International High Level Design Validation and Test Workshop 2007 (HLDVT-2007). 140-142.
Quattoni, A., Collins M., & Darrell T. (2008).  Transfer Learning for Image Classification with Sparse Prototype Representations.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Transform-Based Domain Adaptation for Big Data.
Morgan, N., Konig Y., Wu S-L., & Bourlard H. (1995).  Transition-Based Statistical Training for ASR. IEEE Snowbird Workshop '95.
Venugopalan, S., Xu H., Donahue J., Rohrbach M., Mooney R., & Saenko K. (2015).  Translating Videos to Natural Language Using Deep Recurrent Neural Networks.
Mirghafori, N., & Morgan N. (1998).  Transmissions and Transitions: A Study of Two Common Assumptions in Multi-Band ASR. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1998). 713-716.
Fillmore, C. J., & Sato H. (2002).  Transparency and Building Lexical Dependency Graphs. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Morgan, N., Chen B. Y., Zhu Q., & Stolcke A. (2004).  TRAPping Conversational Speech: Extending TRAP/Tandem Approaches to Conversational Telephone Speech Recognition. Proceedings of IEEE ICASSP.
Levis, P., Patel N., Culler D. E., & Shenker S. J. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.

Pages