Publications

Found 4113 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Plane, A. C., Redmiles E. M., Mazurek M. L., & Tschantz M. Carl (2017).  Assessing user perceptions of online targeted advertising. Proceedings of USENIX Security 2017.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Feldman, J. (1965).  Aspects of Associative Processing.
Sander, T. (1996).  Aspects of Algebraic Geometry over Non Algebraically Closed Fields.
Feldman, J., Brown C. M., Ellis C. S., LeBlanc T. J., & Peterson G. L. (1985).  Artificial Intelligence Research on the Butterfly Multicomputer. Proceedings of the Workshop on Artificial Intelligence and Distributed Problem Solving. 109-118.
Feldman, J., & Paul R. P. (1974).  Artificial Intelligence and Advanced Automation.
Black, A. W., H. Bunnell T., Dou Y., Kumar P., Metze F., Perry D., et al. (2012).  Articulatory Features for Expressive Speech Synthesis.
etin, Ö. Ç., Kantor A., King S., Bartels C., Magimai-Doss M., Frankel J., et al. (2007).  An Articulatory Feature-Based Tandem Approach and Factored Observation Modeling. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 645-648.
Livescu, K., etin Ö. Ç., Hasegawa-Johnson M., King S., Bartels C., Borges N., et al. (2007).  Articulatory Feature-Based Methods for Acoustic and Audio-Visual Speech Recognition: Summary from the 2006 Jhu Summer Workshop.
Cristóbal, M. (2001).  Arriving Events in English and Spanish: A Contrastive Analysis in Terms of Frame Semantics.
Dodge, E. (2014).  Argument Structure Constructions in Embodied Construction Grammar.
Kay, P. (2005).  Argument Constructions and the Argument-Adjunct Distinction. 71-98.
Tsai, T.. J. (2015).  Are You TED Talk Material? Comparing Prosody in Professors and TED Speakers.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Moody, J., & Utans J. (1994).  Architecture Selection Strategies for Neural Networks: Application to Corporate Bond Rating Prediction.
Huebsch, R., Chun B., Hellerstein J. M., Loo B. Thau, Maniatis P., Roscoe T., et al. (2005).  The Architecture of PIER: An Internet-Scale Query Processor. Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
Paxson, V., Mahdavi J., Adams A. K., & Mathis M. (1998).  An Architecture for Large-Scale Internet Measurement. IEEE Communications. 36(8), 48-54.
Paxson, V., Sommer R., & Weaver N. (2007).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. 1-7.
Sommer, R., Weaver N., & Paxson V. (2009).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 31-36.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 4(3), 31-36.
Allman, M., Blanton E., & Paxson V. (2005).  An Architecture for Developing Behavioral History. Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
Francis, P., Jamin S., Paxson V., Zhang L., Gryniewicz D. F., & Jin Y. (1999).  An Architecture for a Global Internet Host Distance Estimation Service. Proceedings of IEEE INFOCOM.
Ziekow, H., Ivantysynova L., & Günther O. (2010).  Architectural Patterns for RFID Applications in Manufacturing.

Pages