Found 4071 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Bernd, J., Frik A., Johnson M., & Malkin N. (In Press).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd annual Symposium on Applications of Contextual Integrity.
Bernd, J., Borth D., Carrano C., Choi J., Elizalde B. Martinez, Friedland G., et al. (2015).  Kickstarting the Commons: The YFCC100M and the YLI Corpora. 1-6.
Bernd, J., & Corley J. (2017).  Teach Global Impact: A Resource for CSP (or Any CS Class!). Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education. 699.
Bernd, J., Gordo B., Choi J., Morgan B., Henderson N., Egelman S., et al. (2015).  Teaching Privacy: Multimedia Making a Difference. IEEE MultiMedia. 12-19.
Bernd, J., Borth D., Elizalde B. Martinez, Friedland G., Gallagher H., Gottlieb L., et al. (2015).  The YLI?MED Corpus: Characteristics, Procedures, and Plans.
Bernhardt, M. (1996).  Design and Implementation of a Web-based Tool for ATM Connection Management.
Bernini, C.., Codenotti B., Leoncini M., & Resta G. (1991).  Incomplete Factorizations for Certain Toeplitz Matrices.
Bertasius, G., Yu S. X., Park H. Soo, & Shi J. (2016).  Am I a Baller? Basketball Skill Assessment using First-Person Cameras.
Bertasius, G., Yu S. X., & Shi J. (2016).  Exploiting Visual-Spatial First-Person Co-Occurrence for Action-Object Detection without Labels.
Bertasius, G., Park H. Soo, Yu S. X., & Shi J. (2016).  First Person Action-Object Detection with EgoNet.
Bertasius, G., Torresani L., Yu S. X., & Shi J. (2016).  Convolutional Random Walk Networks for Semantic Image Segmentation.
Berthold, M. R., & Huber K-P.. (1997).  Constructing Fuzzy Graphs from Examples.
Bertoni, A., Campadelli P., Morpurgo A., & Panizza S. (1992).  Polynomial Uniform Convergence and Polynomial-Sample Learnability.
Bertoni, A., & Dorigo M. (1993).  Implicit Parallelism in Genetic Algorithms.
Bettati, R., & Gupta A. (1995).  Dynamic Resource Migration for Multi-Party Real-Time Communication.
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Bettinson, M., & Bird S. (2018).  Image-Gesture-Voice: A Web Component for Eliciting Speech. Proceedings of the LREC 2018 Workshop.
Beverly, R., & Allman M. (2013).  Findings and Implications from Data Mining the IMC Review Process. ACM SIGCOMM Computer Communication Review. 3(1), 23-29.
Bhagat, S., Carvey H., & Shriberg E. (2003).  Automatically Generated Prosodic Cues to Lexically Ambiguous Dialog Acts in Multiparty Meetings. Proceedings of the 15th International Congress of Phonetic Sciences (ICPhS 2003).
Bhandarkar, S.., Reddy A.. L. N., Allman M., & Blanton E. (2006).  RFC 4653: Improving the Robustness of TCP to Non-Congestion Events.
Bharghavan, V., Demers A. J., Shenker S., & Zhang L. (1994).  MACAW: A Media Access Protocol for Wireless LAN's. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 212-225.
Bhattacharya, A. A., Culler D. E., Friedman E., Ghodsi A., Shenker S., & Stoica I. (2013).  Hierarchical Scheduling for Diverse Datacenter Workloads.
Bialek, W.., Moody J., & Wilczek F. (1986).  Macroscopic T Nonconservation: Prospects for a New Experiment. 56,
Bian, F.., Li X.., Govindan R., & Shenker S. (2006).  Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks. International Journal of Ad Hoc and Ubiquitous Computing. 1(4), 179-193.
Bigi, B., Huang Y., & De Mori R. (2004).  Vocabulary and Language Model Adaptation Using Information Retrieval. Proceedings of International Conference on Spoken Language Processing.