Publications

Found 495 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Paper
Fosler-Lussier, E., Weintraub M., Wegmann S., Kao Y-H., Khudanpur S., Galles C., et al. (1996).  Automatic Learning of Word Pronunciation from Data. Proceedings of the Fourth International Conference on Spoken Language Processing (CSLP-96).
Larson, M.., Soleymani M.., Serdyukov P.., Rudinac S.., Wartena C.., Murdock V.., et al. (2011).  Automatic Tagging and Geo-Tagging in Video Collections and Communities.
Anguera, X., Wooters C., Pardo J. M., & Hernando J. (2007).  Automatic Weighting for the Combination of TDOA and Acoustic Features in Speaker Diarization for Meetings. 4, 241-244.
Wernicke, S., Alber J., Gramm J., Guo J., & Niedermeier R. (2004).  Avoiding Forbidden Submatrices by Row Deletions. 2832, 349-360.
Jurafsky, D., Wooters C., Tajchman G., Segal J., Stolcke A., Fosler-Lussier E., et al. (1994).  The Berkeley Restaurant Project. Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94). 2139-2142.
Wooters, C., Jurafsky D., Tajchman G., & Morgan N. (1993).  The Berkeley Restaurant Project. Proceedings of the Speech Research Symposium XIII. 119-128.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2015).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Karp, R. M., Waarts O., & Zweig G. (1995).  The bit vector intersection problem. Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95). 621-630.
Halvorson, T., Szurdi J., Maier G., Felegyhazi M., Kreibich C., Weaver N., et al. (2012).  The BIZ Top-Level Domain: Ten Years Later.
Parthasarathi, S. Hari Krish, Chang S-Y., Cohen J., Morgan N., & Wegmann S. (2013).  The Blame Game in Meeting Room ASR: An Analysis of Feature versus Model Errors in Noisy and Mismatched Conditions.
Huijbregts, M., & Wooters C. (2007).  The Blame Game: Performance Analysis of Speaker Diarization System Components. 1857-1860.
Fifield, D., Lan C., Hynes R., Wegmann P., & Paxson V. (2015).  Blocking-resistant communication through domain fronting. Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
Pitsillidis, A., Levchenko K., Kreibich C., Kanich C., Voelker G. M., Paxson V., et al. (2010).  Botnet Judo: Fighting Spam with Itself.
Whitlock, S., Scott C., & Shenker S. (2013).  Brief Announcement: Techniques for Programmatically Troubleshooting Distributed Systems. 1-3.
Hwang, M-Y., Peng G.., Wang W., Faria A., & Heidel A.. (2007).  Building a Highly Accurate Mandarin Speech Recognizer. 490-495.
Fillmore, C. J., Wooters C., & Baker C. F. (2001).  Building a Large Lexical Databank Which Provides Deep Semantics. Proceedings of the Pacific Asian Conference on Language, Information and Computation (PACLIC).
van Hout, J., Ferrer L., Vergyri D., Scheffer N., Lei Y., Mitra V., et al. (2014).  Calibration and Multiple System Fusion for Spoken Term Detection Using Linear Logistic Regression.
Akkus, I. Ekin, & Weaver N. (2015).  The Case for a General and Interaction-Based Third-Party Cookie Policy.
Tan, Z., Waterman A., Cook H., Bird S., Asanović K., & Patterson D. (2010).  A Case for FAME: FPGA Architecture Model Execution. 290-301.
Vo, H., Lee Y., Waterman A., & Asanović K. (2013).  A Case for OS-Friendly Hardware Accelerators.
Bourlard, H., Morgan N., Wooters C., & Renals S. (1992).  CDNN: A Context Dependent Neural Network for Continuous Speech Recognition. Proceedings of IEEE International Conference on Acoustics, Speech & Signal Processing.
Vinyals, O., & Wegmann S. (2014).  Chasing the Metric: Smoothing Learning Algorithms for Keyword Detection.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.

Pages