Publications

Found 4169 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Boas, H. C. (2002).  Bilingual FrameNet Dictionaries for Machine Translation. Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002). IV, 1364-1371.
Pang, R., Paxson V., Sommer R., & Peterson L. (2006).  binpac: A yacc for Writing Application Protocol Parsers. Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 289-300.
Shastri, L. (1999).  A Biological Grounding of Recruitment Learning and Vicinal Algorithms.
Shastri, L. (2001).  Biological grounding of recruitment learning and vicinal algorithms in long-term potentiation. 348-367.
Graciarena, M., Delplanche M., Shriberg E., & Stolcke A. (2011).  Bird Species Recognition Combining Acoustic and Sequence Modeling. 341-344.
Farrell, R., Oza O., Zhang N., Morariu V. I., Darrell T., & Davis L. S. (2011).  Birdlets: Subordinate Categorization Using Volumetric Primitives and Pose-Normalized Appearance. 161-168.
Karp, R. M., Waarts O., & Zweig G. (1995).  The bit vector intersection problem. Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95). 621-630.
Halvorson, T., Szurdi J., Maier G., Felegyhazi M., Kreibich C., Weaver N., et al. (2012).  The BIZ Top-Level Domain: Ten Years Later.
Schnorr, C. P., & Vaudenay S. (1994).  Black Box Cryptanalysis of Hash Networks Based on Multipermutations.
Parthasarathi, S. Hari Krish, Chang S-Y., Cohen J., Morgan N., & Wegmann S. (2013).  The Blame Game in Meeting Room ASR: An Analysis of Feature versus Model Errors in Noisy and Mismatched Conditions.
Huijbregts, M., & Wooters C. (2007).  The Blame Game: Performance Analysis of Speaker Diarization System Components. 1857-1860.
Karbasi, M., Abdelaziz A. Hussen, Meutzner H., & Kolossa D. (2016).  Blind Non-Intrusive Speech Intelligibility Prediction Using Twin-HMMs. Proceedings of Interspeech 2016.
Schnorr, C. P. (1992).  Block Korkin-Zolotarev Bases and Successive Minima.
Fifield, D., Lan C., Hynes R., Wegmann P., & Paxson V. (2015).  Blocking-resistant communication through domain fronting. Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
Feldman, J. (1996).  Book Review, Crangle and Suppes, “Language Learning".
Karpinski, M. (1989).  Boolean Circuit Complexity of Algebraic Interpolation Problems.
Schuett, D.., Eckhardt U.., & Suda P.. (1992).  Boot Algebras.
Pitsillidis, A., Levchenko K., Kreibich C., Kanich C., Voelker G. M., Paxson V., et al. (2010).  Botnet Judo: Fighting Spam with Itself.
Karp, R. M., & Zhang Y. (1995).  Bounded branching process and AND/OR tree evaluation. Random Structures and Algorithms. 7(2), 97-116.
Fornasa, M., Stecca M., Maresca M., & Baglietto P. (2015).  Bounded Latency Spanning Tree Reconfiguration. Computer Networks. 76, 259-274.
Ferber, M., Hunold S., & Rauber T. (2010).  BPEL Remote Objects: Integrating BPEL Processes into Object-Oriented Applications.
Feldman, J. (1984).  Brains and Robots, Two Weak Attempts at the Grand Synthesis.
Althaus, E., Kohlbacher O., Lenhof H-P., & Müller P. (2000).  A Branch and Cut Algorithm for the Optimal Solution of the Side Chain Placement Problem.
Bockmayr, A.., & Kasper T.. (1998).  Branch and Infer: A Unifying Framework for Integer and Nite Domain Constraint Programming.
Iyer, A. Padmanabha, Panda A., Venkataraman S., Chowdhury M., Akella A., Shenker S., et al. (2018).  Bridging the GAP: towards approximate graph analytics. Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).

Pages