Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Haban, D., & Shin K. G. (1989).  Application of Real-Time Monitoring to Scheduling Tasks with Random.
Fernández-Iglesias, M. J., González-Castaño F. J., Llamas-Nistal M., Pousada-Carballo J. M., & Vales-Alonso J. (2002).  On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile Terminals. Journal of Systems and Software. 60(1), 49-56.
Kaiser, M. (1993).  An Application of a Neural Net for Fuzzy Abductive Reasoning.
Mertens, R., Huang P-S., Gottlieb L., Friedland G., & Divakaran A. (2011).  On the Applicability of Speaker Diarization to Audio Concept Detection for Multimedia Retrieval. 446-451.
Weaver, N. (2020).  Apple vs FBI: Pensacola Isn’t San Bernardino. Lawfare.
Feldman, J. (1990).  Apparent Motion and Other Mysteries. 479-486.
Zaharia, M., Xin R. S., Wendell P., Das T., Armbrust M., Dave A., et al. (2016).  Apache Spark: a unified engine for big data processing. Communications of the ACM. 59(11), 56-65.
Karayev, S., Fritz M., & Darrell T. (2014).  Anytime Recognition of Objects and Scenes.
Boakye, K., Favre B., & Hakkani-Tür D. (2009).  Any Questions? Automatic Question Detection in Meetings. 485-489.
Kushilevitz, E., Micali S., & Ostrovsky R. (1993).  Any Non-Private Boolean Function Is Complete For Private Multi-Party Computations.
Gleich, D., & Mahoney M. (2014).  Anti-Differentiating Approximation Algorithms: A Case Study with Min-Cuts, Spectral, and Flow.
Ferrer, L., Sönmez K., & Shriberg E. (2009).  An Anticorrelation Kernel for Subsystem Training in Multiple Classifier Systems. Journal of Machine Learning Research. 10, 2079-2114.
Friedland, G., & Rojas R. (2008).  Anthropocentric Video Segmentation for Lecture Webcasts. EURASIP Journal on Image and Video Processing. 8(2), 
Horoba, C., & Sudholt D. (2010).  Ant Colony Optimization for Stochastic Shortest Path Problems. 1465-1472.
Narayanan, S., & Harabagiu S. (2004).  Answering Questions Using Advanced Semantics and Probabilistic Inference. Proceedings of the Pragmatics of Question Answering Workshop at the North American Chapter of the Association for Computational Linguistics Human Language Technologies Conference (NAACL HLT 2004).
Sinha, S. (2008).  Answering Questions about Complex Events.
Zhang, T.., Yao Z.., Gholami A.., Keutzer K.., Gonzalez J.., Biros G.., et al. (2019).  ANODEV2: A Coupled Neural ODE Evolution Framework. Proceedings of the 2019 NeurIPS Conference.
Eklund, R., Bates R., Kuyper C., Willingham E., & Shriberg E. (2006).  The Annotation and Analysis of Importance in Meetings.
Yu, S. X. (2012).  Angular Embedding: A Robust Quadratic Criterion. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE. 34(1), 158-173.
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Yaman, S., Tur G., Vergyri D., Hakkani-Tür D., Harper M. P., & Wang W. (2009).  Anchored Speech Recognition for Question Answering. 265-268.
Harbach, M., De Luca A., & Egelman S. (2016).  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Harbach, M., De Luca A., & Egelman S. (2016).  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. Proceedings of CHI '16.
Friedland, G. (2009).  Analytics for Experts. Featured paper in ACM SIGMM Records. 1,
Paxson, V. (2001).  An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. 31(3), 

Pages