Publications

Found 4132 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Boakye, K., & Stolcke A. (2006).  Improved Speech Activity Detection Using Cross-Channel Features for Recognition of Multiparty Meetings. Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006). 1962-1965.
Boakye, K., Trueba-Hornero B.., Vinyals O., & Friedland G. (2008).  Overlapped Speech Detection for Improved Speaker Diarization in Multiparty Meetings. 4353-4356.
Boakye, K., Vinyals O., & Friedland G. (2008).  Two's a Crowd: Improving Speaker Diarization by Automatically Identifying and Excluding Overlapped Speech Authors. Proceedings of the Annual Conference of the International Speech Communication Association (Interspeech 2008). 32-35.
Boakye, K. (2005).  Speaker Recogntion in the Text-Independent Domain Using Keyword Hidden Markov Models.
Boas, H. C. (2005).  Semantic Frames as Interlingual representations for Multilingual Lexical Databases. International Journal of Lexicography. 445-478.
Boas, H. C. (2001).  Frame Semantics as a framework for describing polysemy and syntactic structures of English and German motion verbs in contrastive computational lexicography. Proceedings of the Corpus Linguistics 2001 Conference.
Boas, H. C. (2002).  Bilingual FrameNet Dictionaries for Machine Translation. Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002). IV, 1364-1371.
Böcking, S. (1995).  Communication Performance Models.
Bocklet, T., & Shriberg E. (2009).  Speaker Recognition Using Syllable-Based Constraints for Cepstral Frame Selection. 4525-4528.
Bockmayr, A.., & Kasper T.. (1998).  Branch and Infer: A Unifying Framework for Integer and Nite Domain Constraint Programming.
Boehm, H-J.., Demers A. J., & Shenker S. (1991).  Mostly Parallel Garbage Collection. Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI '91). 157-164.
Boehme, R., & Kirchner M. (2012).  Counter-Forensics: Attacking Image Forensics. 327-366.
Boehme, R. (2010).  Towards Insurable Network Architectures. Journal of Information Technology. 52(5), 290-293.
Boehme, R., & Pötzsch S. (2010).  Privacy in Online Social Lending. 23-28.
Boehme, R., & Koepsell S.. (2010).  Trained to Accept? A Field Experiment on Consent Dialogs. 2403-2406.
Boehme, R., & Felegyhazi M. (2010).  Optimal Information Security Investment with Penetration Testing.
Boehme, R., & Schwartz G. (2010).  Modeling Cyber-Insurance: Towards a Unifying Framework.
J. Boese, H., Andrzejak A.., & Hoegqvist M.. (2010).  Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce. Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010).
Böhm, C., de Melo G., Naumann F., & Weikum G. (2012).  LINDA: Distributed Web-of-Data-Scale Entity Matching. 2104-2108.
Böhme, R.., & Moore T.. (2010).  The Iterated Weakest Link. IEEE Security and Privacy. 9(1), 53-55.
Bohnet, B. (2009).  Efficient Parsing of Syntactic and Semantic Dependency Structures.
Bohnet, B. (2009).  Synchronous Parsing of Syntactic and Semantic Structures.
Bonzon, P. E. (1995).  A Tower Architecture for Meta-Level Inference Systems Based on Omega-OrderedHorn Theories.
Borghoff, U. M., Roedig P.., Scheffczyk J., & Schmitz L.. (2006).  Long-Term Preservation of Digital Documents: Principles and Practices.
Bornscheuer, S-E., & Thielscher M. (1996).  Explicit and Implicit Indeterminism: Reasoning About Uncertain and Contradictory Specifications of Dynamic Systems.

Pages