Publications

Found 4139 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
U
ulo, O. Č., & Hansen-Schirra S. (2012).  Treebanks in translation studies - the (CroCo) Dependency Treebank.
ulo, O. Č. (2011).  Querying Multilevel Annotation and Alignment for Detecting Grammatical Valence Divergencies. 63-68.
Ulrich, R., & Kritzinger P. (1996).  Managing ABR Capacity in Reservation-based Slotted Networks.
Ulrich, R. (1996).  A Management Platform for Global Area ATM Networks.
Umemura, K.., & Okazaki A.. (1991).  Real-Time Transmission and Software Decompression of Digital Video in a Workstation.
Unger, H. (1998).  A Security Mechanism for the Resource Management in a Web Operating System.
Unger, H., & Böhme T. (1998).  A Fuzzy Based Load Sharing Mechanism for Distributed Systems.
Unger, H., & Daene B. (1995).  Performance Oriented Specification for Heterogenous Parallel Systems Using Graphical Based Specifications.
Uras, C., & Verri A. (1992).  Describing and Recognizing Shape Through Size Functions.
Urtasun, R., Fleet D. J., Geiger A., Popović J., Darrell T., & Lawrence N. D. (2008).  Topologically-Constrained Latent Variable Models. 1080-1087.
Urtasun, R. (2009).  Non-Parametric Latent Variable Models for Shape and Motion Analysis.
Urtasun, R., & Darrell T. (2008).  Local Probabilistic Regression for Activity-Independent Human Pose Inference.
Urtasun, R., Geiger A., & Darrell T. (2009).  Rank Priors for Continuous Non-Linear Dimensionality Reduction.
Utans, J., Moody J., Rehfuss S., & Siegelmann H.. (1995).  Selecting Input Variables via Sensitivity Analysis: Application to Predicting the U.S. Business Cycle. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
Utans, J. (1993).  Mixture Models and the EM Algorithm for Object Recognition within Compositional Hierarchies. Part 1: Recognition.
Utans, J., & Moody J. (1991).  Selecting Neural Network Architecture via the Prediction Risk: Application to Corporate Bond Rating Prediction. Proceedings of the First International Conference on Artificial Intelligence Applications on Wall Street.
V
Valente, F., Magimai-Doss M., Plahl C., & Ravuri S. (2009).  Hierarchical Processing of the Modulation Spectrum for GALE Mandarin LVCSR System. 2963-2966.
Valente, F., Magimai-Doss M., Plahl C., Ravuri S., & Wang W. (2010).  A Comparative Large Scale Study of MLP Features for Mandarin ASR. 2630-2633.
Vallentin, M., Paxson V., & Sommer R. (2016).  VAST: A Unified Platform for Interactive Network Forensics. Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
Vallentin, M., Sommer R., Lee J., Leres C.., Paxson V., & Tierney B. (2007).  The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
Vallet, D., Hopfgartner F., Jose J. M., & Castells P. (2011).  Effects of Usage Based Feedback on Video Retrieval: A Simulation Based Study. ACM Transactions on Information Systems. 29(2), 
Vallina, P.., Feal Á., Gamba J.., Vallina-Rodriguez N., & Anta A.F.. (2019).  Tales From the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. Proceedings of the Internet Measurement Conference. 245-258.
Vallina-Rodriguez, N., Sundaresan S., Razaghpanah A., Nithyanand R., Allman M., Kreibich C., et al. (2016).  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2015).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2014).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.

Pages