Publications

Found 4089 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
U
Gillick, D., Hakkani-Tür D., & Levit M. (2008).  Unsupervised Learning of Edit Parameters for Matching Name Variants. 467-470.
Saenko, K., & Darrell T. (2008).  Unsupervised Learning of Visual Sense Models for Polysemous Words. 1393-1400.
QasemiZadeh, B., Petruck M. R. L., Kallmeyer L., Candito M., Maldonado A., Osswald R., et al. (2019).  Unsupervised Lexical Semantic Frame Induction: A SemEval 2019 Task Proposal.
Bansal, M., DeNero J., & Lin D. (2012).  Unsupervised Translation Sense Clustering. 773-782.
Walfish, M., Balakrishnan H., & Shenker S. (2004).  Untangling the Web from DNS. Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004). 225-238.
Tribowski, C., Spin K., Günther O., & Sielemann O. (2009).  Unternehmensübergreifende RFID-Anwendungen – Eine Fallstudie aus der Möbelindustrie zur RFID-basierten Auftragsabwicklung. Proceedings of the 11th Paderborner Frühjahrstagung (PBFT 2009).
Li, Z., Atre R., Huda Z. Ul, Jannesari A., & Wolf F. (2016).  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117, 282–295.
Baker, J. M., Deng L., Khudanpur S., Lee C-H., Glass J. R., Morgan N., et al. (2009).  Updated MINDS Report on Speech Recognition and Understanding, Part 2. IEEE Signal Processing Magazine. 26(4), 78-85.
Lee, L., Fifield D., Malkin N., Iyer G., Egelman S., & Wagner D. (2017).  A Usability Evaluation of Tor Launcher. Proceedings on Privacy Enhancing Technologies 2017.
Egelman, S. (2018).  The Usable Security & Privacy Group. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Patra, R., Pal J., Nedevschi S., Plauché M., & Pawar U.. S. (2007).  Usage Models of Classroom Computing in Developing Regions. Proceedings of International Conference on Information Technologies and Development (ICTD2007). 158-167.
Sokol, J., & Widmer J. (2001).  USAIA: Ubiquitous Service Access Internet Architecture.
Gottlieb, L., & Friedland G. (2009).  On the Use of Artificial Conversation Data for Speaker Recognition in Cars. 124-128.
Adams, A. K., Bu T., Cáceres R., Duffield N., Friedman T., Horowitz J., et al. (2000).  The Use of End-to-end Multicast Measurements for Characterizing Internal Network Behavior.
Ravuri, S. (2011).  On the Use of Spectro-Temporal Features in Noise-Additive Speech.
Feldman, J., Pingle K.. K., Binford T.. O., Falk G., Hay A.., Pau R.., et al. (1971).  The Use of Vision and Manipulation to Solve the 'Instant Insanity' puzzle. 359-364.
Fillmore, C. J. (1986).  U-Semantics, Second Round. Quaderni di Semantica. 49-58.
Lei, H., Choi J., Janin A., & Friedland G. (2011).  User Verification: Matching the Uploaders of Videos Across Accounts. 2404-2407.
Ruiz, P. M., Botia J., & Gómez-Skarmeta A. (2004).  User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments. Lecture Notes in Computer Science.
Botia, J., Ruiz P. M., & Gómez-Skarmeta A. (2004).  User-Aware Videoconference Session Control Using Software Agents. Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004).
Helbig, H. (1997).  User-Friendly Information Retrieval in Data Bases and in the World Wide Web.
Friedland, G. (2012).  Using a GPU, Online Diarization = Offline Diarization.
Morgan, N. (1994).  Using A Million Connections for Continuous Speech Recognition. 1439-1444.
Jurafsky, D., Wooters C., Segal J., Stolcke A., Fosler-Lussier E., Tajchman G., et al. (1995).  Using A Stochastic Context-Free Grammar as a Language Model for Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 95).
López, J. Ferreiros, & Ellis D. P. W. (2000).  Using Acoustic Condition Clustering to Improve Acoustic Change Detection on Broadcast News. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000). 4, 568-571.

Pages