Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Feldman, J., & Gries D. (1968).  Translator writing systems. 11(2), 77-113.
Feldman, J., & Gries D. (1967).  Translator Writing Systems.
Isenburg, M. (1996).  Transmission of Multimedia Data Over Lossy Networks (Thesis).
Mirghafori, N., & Morgan N. (1998).  Transmissions and Transitions: A Study of Two Common Assumptions in Multi-Band ASR. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1998). 713-716.
Fillmore, C. J., & Sato H. (2002).  Transparency and Building Lexical Dependency Graphs. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Morgan, N., Chen B. Y., Zhu Q., & Stolcke A. (2004).  TRAPping Conversational Speech: Extending TRAP/Tandem Approaches to Conversational Telephone Speech Recognition. Proceedings of IEEE ICASSP.
Adcock, A. B., Sullivan B. D., & Mahoney M. (2014).  Tree Decompositions and Social Graphs.
Stolcke, A., & Wu D. (1992).  Tree Matching with Recursive Distributed Representations.
ulo, O. Č., & Hansen-Schirra S. (2012).  Treebanks in translation studies - the (CroCo) Dependency Treebank.
Levis, P., Patel N., Culler D. E., & Shenker S. J. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Yao, Z.., Gholami A.., Xu P.., Keutzer K.., & Mahoney M. (2019).  Trust Region Based Adversarial Attack on Neural Networks. Proceedings of the 32nd CVPR Conference. 11350-11359.
Murali, A., Garg A., Krishnan S., Pokory F. T., Abbeel P., Darrell T., et al. (2016).  TSC-DL: Unsupervised trajectory segmentation of multi-modal surgical demonstrations with Deep Learning. IEEE International Conference on Robotics and Automation (ICRA). 4150-4157.
Althaus, E., & Mehlhorn K. (2001).  TSP-Based Curve Reconstruction in Polynomial Time. 31(1), 
Althaus, E., & Mehlhorn K. (2000).  TSP-Based Curve Reconstruction in Polynomial Time. Proceedings of the Eleventh Symposium on Discrete Algorithms. 686-695.
Imseng, D., & Friedland G. (2010).  Tuning-Robust Initialization Methods for Speaker Diarization. IEEE Transactions on Audio. 18(8), 2028-2037.
Hertzberg, J., & Thiébaux S. (1993).  Turning an Action Formalism Into a Planner–A Case Study.
Tsai, L., Wijesekera P., Reardon J., Reyes I., Chen J-W., Good N., et al. (2017).  TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences. Proceedings of SOUPS '17.
Fritz, M., Kruijff G.-J.., & Schiele B. (2010).  Tutor-Based Learning of Visual Categories Using Different Levels of Supervision. Computer Vision and Image Understanding. 114(5), 564-573.
de Melo, G., & Hose K. (2013).  Tutorial: Searching the Web of Data.
Karbasi, M., Abdelaziz A. Hussen, & Kolossa D. (2016).  Twin-HMM-based Non-intrusive Speech Intelligibility Prediction. Proceedings of ICASSP.
Shenker, S. J., & Breslau L. (1995).  Two Issues in Reservation Establishment. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95). 14-26.
Kitzelmann, E. (2011).  Two New Operators for IGOR2 to Increase Synthesis Efficiency. 49-61.
Irani, S. (1990).  Two Results on the List Update Problem.
Karp, R. M., & Li S-Y. R. (1975).  Two Special Cases of the Assignment Problem. Discrete Mathematics (Netherlands). 13(2), 129-142.

Pages