Publications

Found 4137 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Boakye, K., Trueba-Hornero B.., Vinyals O., & Friedland G. (2008).  Overlapped Speech Detection for Improved Speaker Diarization in Multiparty Meetings. 4353-4356.
Boakye, K., Vinyals O., & Friedland G. (2008).  Two's a Crowd: Improving Speaker Diarization by Automatically Identifying and Excluding Overlapped Speech Authors. Proceedings of the Annual Conference of the International Speech Communication Association (Interspeech 2008). 32-35.
Boakye, K. (2005).  Speaker Recogntion in the Text-Independent Domain Using Keyword Hidden Markov Models.
Boakye, K., & Peskin B. (2004).  Text-Constrained Speaker Recognition on a Text-Independent Task. Proceedings of the Speaker and Language Recognition Workshop (Odyssey 2004).
Boakye, K., Vinyals O., & Friedland G. (2011).  Improved Overlapped Speech Handling for Speaker Diarization. 941-944.
Boas, H. C. (2005).  Semantic Frames as Interlingual representations for Multilingual Lexical Databases. International Journal of Lexicography. 445-478.
Boas, H. C. (2002).  Bilingual FrameNet Dictionaries for Machine Translation. Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002). IV, 1364-1371.
Boas, H. C. (2001).  Frame Semantics as a framework for describing polysemy and syntactic structures of English and German motion verbs in contrastive computational lexicography. Proceedings of the Corpus Linguistics 2001 Conference.
Böcking, S. (1995).  Communication Performance Models.
Bocklet, T., & Shriberg E. (2009).  Speaker Recognition Using Syllable-Based Constraints for Cepstral Frame Selection. 4525-4528.
Bockmayr, A.., & Kasper T.. (1998).  Branch and Infer: A Unifying Framework for Integer and Nite Domain Constraint Programming.
Boehm, H-J.., Demers A. J., & Shenker S. (1991).  Mostly Parallel Garbage Collection. Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI '91). 157-164.
Boehme, R. (2010).  Towards Insurable Network Architectures. Journal of Information Technology. 52(5), 290-293.
Boehme, R., & Koepsell S.. (2010).  Trained to Accept? A Field Experiment on Consent Dialogs. 2403-2406.
Boehme, R., & Pötzsch S. (2010).  Privacy in Online Social Lending. 23-28.
Boehme, R., & Felegyhazi M. (2010).  Optimal Information Security Investment with Penetration Testing.
Boehme, R., & Schwartz G. (2010).  Modeling Cyber-Insurance: Towards a Unifying Framework.
Boehme, R., & Kirchner M. (2012).  Counter-Forensics: Attacking Image Forensics. 327-366.
J. Boese, H., Andrzejak A.., & Hoegqvist M.. (2010).  Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce. Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010).
Böhm, C., de Melo G., Naumann F., & Weikum G. (2012).  LINDA: Distributed Web-of-Data-Scale Entity Matching. 2104-2108.
Böhme, R.., & Moore T.. (2010).  The Iterated Weakest Link. IEEE Security and Privacy. 9(1), 53-55.
Bohnet, B. (2009).  Synchronous Parsing of Syntactic and Semantic Structures.
Bohnet, B. (2009).  Efficient Parsing of Syntactic and Semantic Dependency Structures.
Bonzon, P. E. (1995).  A Tower Architecture for Meta-Level Inference Systems Based on Omega-OrderedHorn Theories.
Borghoff, U. M., Roedig P.., Scheffczyk J., & Schmitz L.. (2006).  Long-Term Preservation of Digital Documents: Principles and Practices.

Pages