Found 111 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is N  [Clear All Filters]
Conference Paper
Peters, N., Lei H., & Friedland G. (2012).  Name That Room: Room Identification Using Acoustic Features in a Recording. 841-844.
Stoyanchev, S.., Tur G., & Hakkani-Tür D. (2008).  Name-Aware Speech Recognition for Interactive Question Answering. 5113-5116.
Ghodsi, A., Koponen T., Rajahalme J., Sarolahti P., & Shenker S. (2011).  Naming in Content-Oriented Architectures. 1-6.
Friedland, G., Gottlieb L., & Janin A. (2010).  Narrative-Theme Navigation for Sitcoms Supported by Fan-Generated Scripts. 3-8.
Maier, G., Schneider F., & Feldmann A. (2011).  NAT Usage in Residential Broadband Networks.
Feldman, J., Trott S., & Khayrallah H. (2015).  Natural Language For Human Robot Interaction.
Hu, R., Xu H., Rohrbach M., Feng J., Saenko K., & Darrell T. (2016).  Natural Language Object Retrieval. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Tuytelaars, T., Fritz M., Saenko K., & Darrell T. (2011).  The NBNN Kernel. 1824-1831.
Friedrich, T., & Sauerwald T. (2009).  Near-Perfect Load Balancing by Randomized Rounding. 121-130.
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating The Edge Network. 246-259.
Panda, A., Han S., Walls M., Ratnasamy S., & Shenker S. (2016).  NetBricks: Taking the V out of NFV. Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16).
Chun, B-G., Ratnasamy S., & Kohler E. (2008).  NetComplex: A Complexity Metric for Network System Designs. Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008). 393-406.
Kruse, H., Allman M., & Mallasch P.. (1998).  Network and User-Perceived Performance of Web Page Retrievals. Proceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC).
Fabrikant, A., Luthra A., Maneva E., Papadimitriou C. H., & Shenker S. (2003).  On a Network Creation Game. Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing (PODC '03). 347-351.
Handley, M., Kreibich C., & Paxson V. (2001).  Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML). Proceedings of USENIX Security Symposium 2001.
Parker, A., Reddy S., Schmid T., Chang K., Saurabh G., Srivastava M., et al. (2006).  Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications. Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 37-42.
Handley, M., & Crowcroft J. (1997).  Network Text Editor (NTE): A scalable shared text editor for the MBone. Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
Tangmunarunkit, H., Govindan R., Jamin S., Shenker S., & Willinger W. (2002).  Network Topology Generators: Degree-Based vs. Structural. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 147-159.
Raghavan, B., & Ma J. (2011).  Networking in the Long Emergency. 37-42.
Andreas, J., Rohrbach M., Darrell T., & Klein D. (2016).  Neural Module Networks. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 39-48.
Robinson, A.., Almeida L.., Boite J.., Bourlard H., Fallside F., Hochberg H.., et al. (1993).  A Neural Network Based, Speaker Independent, Large Vocabulary, Continuous Speech Recognition System: the Wernicke Project. Proceedings of the Third European Conference on Speech Communication and Technology (Eurospeech '93). 1941-1944.
Ravuri, S., & Stolcke A. (2014).  Neural Network Models for Lexical Addressee Detection.