Publications

Found 4077 results
Author Title Type [ Year(Asc)]
2015
Venugopalan, S., Xu H., Donahue J., Rohrbach M., Mooney R., & Saenko K. (2015).  Translating Videos to Natural Language Using Deep Recurrent Neural Networks.
Guadarrama, S., Rodner E., Saenko K., & Darrell T. (2015).  Understanding object descriptions in robotics by open-vocabulary object retrieval and detection. The International Journal of Robotics Research. 35(1-3), 265-280.
Wang, D., Rao S., & Mahoney M. W. (2015).  Unified Acceleration Method for Packing and Covering Problems via Diameter Reduction. Proceedings of the 43rd ICALP Conference.
Chang, S-Y., Morgan N., Raju A., Alwan A., & Kreiman J. (2015).  Using Fast and Slow Modulations to Model Human Hearing of Fast and Slow Speech.
Gleich, D., & Mahoney M. W. (2015).  Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms. Proceedings of the 21st Annual SIGKDD.
Garg, A., Krishnan S., Murali A., Pokorny F. T., Abbeel P., Darrell T., et al. (2015).  On Visual Feature Representations for Transition State Learning in Robotic Task Demonstrations. 44,
Yang, J., Chow Y-L., Re C., & Mahoney M. W. (2015).  Weighted SGD for ℓp Regression with Randomized Preconditioning. Proceedings of the 27th Annual SODA Conference. 558-569.
Thomee, B., Shamma D. A., Elizalde B. Martinez, Friedland G., Ni K., Poland D., et al. (2015).  YFCC100M: The New Data in Multimedia Research.
Bernd, J., Borth D., Elizalde B. Martinez, Friedland G., Gallagher H., Gottlieb L., et al. (2015).  The YLI?MED Corpus: Characteristics, Procedures, and Plans.
2014
[Anonymous] (2014).  2014 Audited Financial Statement.
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
Feldman, J., & Narayanan S. (2014).  Affordances, Actionability, and Simulation.
Gleich, D., & Mahoney M. W. (2014).  Anti-Differentiating Approximation Algorithms: A Case Study with Min-Cuts, Spectral, and Flow.
Karayev, S., Fritz M., & Darrell T. (2014).  Anytime Recognition of Objects and Scenes.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Dodge, E. (2014).  Argument Structure Constructions in Embodied Construction Grammar.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Elizalde, B. Martinez, Ravanelli M., Ni K., Borth D., & Friedland G. (2014).  Audio-Concept Features and Hidden Markov Models for Multimedia Event Detection.
De Carli, L., Sommer R., & Jha S. (2014).  Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2014).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Lei, H., & Mirghafori N. (2014).  Broad Phonetic Classes for Speaker Verification with Noisy, Large-Scale Data.
David, O., Stickles E., Hong J., Dodge E., & Sweetser E. (2014).  Building the MetaNet Metaphor Repository: The Natural Symbiosis of Metaphor Analysis and Construction Grammar.
Jia, Y., Shelhamer E., Donahue J., Karayev S., Long J., Girshick R., et al. (2014).  Caffe: Convolutional Architecture for Fast Feature Embedding. 675-678.
van Hout, J., Ferrer L., Vergyri D., Scheffer N., Lei Y., Mitra V., et al. (2014).  Calibration and Multiple System Fusion for Spoken Term Detection Using Linear Logistic Regression.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.

Pages