Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Tschantz, M. Carl (2023).  A Mathematical Model of Contextual Integrity. ICSI Technical Report.
Tschantz, M. Carl, Sen S., & Datta A. (2017).  Differential Privacy as a Causal Property.
Tschantz, M. Carl, & Friedland G. (2019).  Privacy Concerns of Multimodal Sensor Systems. The Handbook of Multimodal-Multisensor Interfaces: Foundations, User Modeling, and Common Modality Combinations . 1,
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Tschantz, M. Carl, Datta A., Datta A., & Wing J. M. (2015).  A Methodology for Information Flow Experiments. 2015 IEEE 28th Computer Security Foundations Symposium. 554-568.
Tur, G., Shriberg E., Stolcke A., & Kajarekar S. (2007).  Duration and Pronunciation Conditioned Lexical Modeling for Speaker Verification. 2049-2052.
Tur, G., Guz U., & Hakkani-Tür D. (2006).  Model Adaptation for Dialog Act Tagging. Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 94-97.
Tur, G., Stolcke A., Voss L., Peters S., Hakkani-Tür D., Dowding J., et al. (2010).  The CALO Meeting Assistant System. IEEE Transactions on Audio. 18(6), 1601-1611.
Tur, G., Stolcke A., Voss L., Dowding J., Favre B., Fernández R., et al. (2008).  The CALO Meeting Speech Recognition and Understanding System. 69-72.
Turau, V., & Chen W. (1995).  Efficient Implementation of Multi-Methods for Statically Typed Languages.
Tuytelaars, T., Fritz M., Saenko K., & Darrell T. (2011).  The NBNN Kernel. 1824-1831.
Tzeng, E., Hoffman J., Darrell T., & Saenko K. (2015).  Simultaneous Deep Transfer Across Domains and Tasks. The IEEE International Conference on Computer Vision (ICCV). 4068-4076.
Tzeng, E., Devin C., Hoffman J., Finn C., Abbeel P., Levine S., et al. (2016).  Adapting deep visuomotor representations with weak pairwise constraints. Workshop on the Algorithmic Foundations of Robotics (WAFR).
Tzeng, E., Devin C., Hoffman J., Finn C., Peng X., Levine S., et al. (2015).  Towards Adapting Deep Visuomotor Representations from Simulated to Real Environments. CoRR. abs/1511.07111,
U
Ulitzky, I.., Karp R. M., & Shamir R. (2008).  Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles. Proceedings of 12th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2008). 347-359.
ulo, O. Č., & Hansen-Schirra S. (2012).  Treebanks in translation studies - the (CroCo) Dependency Treebank.
ulo, O. Č. (2011).  Querying Multilevel Annotation and Alignment for Detecting Grammatical Valence Divergencies. 63-68.
ulo, O. Č., Hansen-Schirra S., Maksymski K., & Neumann S. (2011).  Empty Links and Crossing Lines: Querying Multilayer Annotation and Alignment in Parallel Corpora. In Translation: Computation. 1(1), 75-104.
ulo, O. Č., & de Melo G. (2012).  Source-Path-Goal: Investigating the Cross-Linguistic Potential of Frame-Semantic Text Analysis. it - Information Technology. 54(3), 147-152.
Ulrich, R., & Kritzinger P. (1996).  Managing ABR Capacity in Reservation-based Slotted Networks.
Ulrich, R. (1996).  A Management Platform for Global Area ATM Networks.
Umemura, K.., & Okazaki A.. (1991).  Real-Time Transmission and Software Decompression of Digital Video in a Workstation.
Unger, H. (1998).  A Security Mechanism for the Resource Management in a Web Operating System.
Unger, H., & Böhme T. (1998).  A Fuzzy Based Load Sharing Mechanism for Distributed Systems.
Unger, H., & Daene B. (1995).  Performance Oriented Specification for Heterogenous Parallel Systems Using Graphical Based Specifications.

Pages