Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction. IEEE Transactions on Multimedia. 17(9), 1550-1561.
Hasegawa, Y., Lee-Goldman R., Kong A., Ohara K. Hirose, Akita K., Uchida S., et al. (2011).  A Study of Paraphrasing in Terms of FrameNet and Frame Semantics. Proceedings of the 6th International Conference on Construction Grammar (ICCG-6).
Luby, M., & Rackoff C. (1989).  A Study of Password Security.
Zlatev, J. (1992).  A Study of Perceptually Grounded Polysemy in a Spatial Microdomain.
Cocchi, R., Estrin D., Shenker S. J., & Zhang L. (1991).  A Study of Priority Pricing in Multiple Service Class Networks. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 123-130.
Mitzel, D. J., Estrin D., Shenker S. J., & Zhang L. (1996).  A Study of Reservation Dynamics in Integrated Services Packet Networks. Proceedings of the 15th IEEE Annual Joint Conference on Networking the Next Generation. 2, 871-879.
Kajarekar, S., Yegnanarayana B.., & Hermansky H. (2001).  A Study of Two Dimensional Linear Descriminants For ASR. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001).
Tombros, T., & Crestani F. (1999).  A Study of Users' Perception of Relevance of Spoken Documents.
Razaghpanah, A., Niaki A. Akhavan, Vallina-Rodriguez N., Sundaresan S., Amann J., & Gill P. (2017).  Studying TLS Usage in Android Apps.
Karpinski, M., & Rytter W. (1993).  On a Sublinear Time Parallel Construction of Optimal Binary Search Trees.
Liskiewicz, M., & Reischuk R. (1993).  The Sublogarithmic Space World.
Roosta-Khorasani, F.., & Mahoney M. (2019).  Sub-Sampled Newton Methods. Mathematical Programming. 293-326.
Roosta-Khorasani, F., & Mahoney M. (2016).  Sub-Sampled Newton Methods I: Globally Convergent Algorithms.
Roosta-Khorasani, F., & Mahoney M. (2016).  Sub-Sampled Newton Methods II: Local Convergence Rates.
Xu, P., Yang J., Roosta-Khorasani F., Re C., & Mahoney M. (2016).  Sub-sampled Newton Methods with Non-uniform Sampling. Proceedings of the 2016 NIPS Conference.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1988).  Subtree isomorphism is in random NC. Proceedings of the Third Aegean Workshop on Computing, VLSI Algorithms and Architectures (AWOC 88). 43-52.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1990).  Subtree isomorphism is in random NC. Discrete Applied Mathematics. 29(1), 35-62.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1989).  Subtree Isomorphism is in Random NC.
Weber, S. (2004).  The Success of Open Source.
Toth, B.., Hakkani-Tür D., & Yaman S. (2010).  Summarization- and Learning-Based Approaches to Information Distillation. 5306-5309.
Reynolds, D., Andrews W., Campbell J., Navratil J., Peskin B., Adami A., et al. (2003).  The SuperSID Project: Exploiting High-Level Information for High-Accuracy Speaker Recognition. Proceedings of ICASSP-2003.
Konig, Y., & Morgan N. (1993).  Supervised and Unsupervised Clustering of the Speaker Space for Connectionist Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech & Signal Processing.
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
Shyr, A., Darrell T., Jordan M. I., & Urtasun R. (2011).  Supervised Hierarchical Pitman-Yor Process for Natural Scene Segmentation.

Pages