Found 259 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is D  [Clear All Filters]
Conference Paper
Barker, J., Cooke M. P., & Ellis D. P. W. (2000).  Decoding Speech in the Presence of Other Sound Sources. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Fritz, M., & Schiele B. (2008).  Decomposition, Discovery, and Detection of Visual Categories Using Topic Models.
Alizadeh, M., Yang S., Katti S., McKeown N., Prabhakar B., & Shenker S. (2012).  Deconstructing Datacenter Packet Transport. 133-138.
Hendricks, L. Anne, Venugopalan S., Rohrbach M., Mooney R., Saenko K., & Darrell T. (2016).  Deep Compositional Captioning: Describing Novel Object Categories Without Paired Training Data. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1-10.
Andreas, J., Rohrbach M., Darrell T., & Klein D. (2016).  Deep compositional question answering with neural module networks. IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Yu, S. X., & Zipser K. (2016).  A Deep Neural Net Trained for Person Categorization Develops Both Detailed Local Features and Broad Contexual Specificities. Poster at Vision Sciences Society Annual Meeting.
Vinyals, O., & Morgan N. (2013).  Deep vs. Wide: Depth on a Budget for Robust Speech Recognition.
McCauley, M., Zhao M., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. (2016).  The Deforestation of L2.
Zhang, N., Farrell R., Iandola F., & Darrell T. (2013).  Deformable Part Descriptors for Fine-Grained Recognition and Attribute Prediction.
Girshick, R., Iandola F., Darrell T., & Malik J. (2015).  Deformable Part Models are Convolutional Neural Networks. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 437-446.
Zaharia, M., Borthakur D., Sarma J. Sen, Elmeleegy K., Shenker S., & Stoica I. (2010).  Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling. 265-278.
Fernández-Iglesias, M. J., Pavón-Marino P., Rodríguez J.., Rifon L. Anido, & Llamas-Nistal M. (2000).  DelfosnetX: A Workbench for XML-Based Information Retrieval Systems. Proceedings of the 7th International Symposium on String Processing and Information Retrieval. 87-95.
Rosario, B., Hearst M. A., & Fillmore C. J. (2002).  The Descent of Hierarchy, and Selection in Relational Semantics. Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL 2002). 247-254.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Anderson, T., Shenker S., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
Feldman, J. (1993).  Designing a Connectionist Network Supercomputer. Proceedings of the Third International Conference on Microelectronics for Neural Networks. 253-262.
Kohler, E., Handley M., & Floyd S. (2006).  Designing DCCP: Congestion Control Without Reliability. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 27-38.
Handley, M., Kohler E., Ghosh A., Hodson O., & Radoslavov P. (2005).  Designing Extensible IP Router Software. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 189-202.
Beamer, S., Asanović K., Batten C., Joshi A., & Stojanovic V. (2009).  Designing Multi-Socket Systems Using Silicon Photonics. 521-522.
McGillivary, P.., Stecca M., Maresca M., & Baglietto P. (2015).  Designing New Arctic Ships to Incorporate Cloud Computing for Improved Information Systems and Vessel Management.
Voisard, A., & Ziekow H. (2010).  Designing Sensor-Based Event Processing Infrastructures.
Hébert, M., & Mirghafori N. (2004).  Desperately Seeking Impostors: Data-Mining for Competitive Impostor Testing in a Text-Dependent Speaker Verification System. Proceedings of IEEE ICASSP.
Zhang, C. Micahel, & Paxson V. (2011).  Detecting and Analyzing Automated Activity on Twitter.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.