Publications

Found 317 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
Conference Paper
Guz, U., Cuendet S., Hakkani-Tür D., & Tur G. (2007).  Co-training Using Prosodic and Lexical Information for Sentence Segmentation. 2597-2600.
Tan, Z., Asanović K., & Patterson D. (2011).  Datacenter-Scale Network Research on FPGAs.
Rohrbach, A., Rohrbach M., Tandon N., & Schiele B. (2015).  A Dataset for Movie Description.
Donahue, J., Jia Y., Vinyals O., Hoffman J., Zhang N., Tzeng E., et al. (2014).  DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition.
Tavakoli, A., Chu D., Hellerstein J. M., Levis P., & Shenker S. (2007).  A Declarative Sensornet Architecture. 55-60.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Ideker, T. E., Thorsson V., & Karp R. M. (2000).  Discovery of Regulatory Interactions Through Perturbation: Inference and Experimental Design. Proceedings of Pacific Symposium on Biocomputing (PSB 2000). 302-313.
Yeom, S., & Tschantz M. Carl (2018).  Discriminative but Not Discriminatory: A Comparison of Fairness Definitions under Different Worldviews. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Tur, G., Shriberg E., Stolcke A., & Kajarekar S. (2007).  Duration and Pronunciation Conditioned Lexical Modeling for Speaker Verification. 2049-2052.
Estrin, D., Handley M., Helmy A., Huang P., & Thaler D. (1999).  A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast Routing. Proceedings of Infocom 1999.
Mandal, A., Vergyri D., Wang W., Zheng J., Stolcke A., Tur G., et al. (2008).  Efficient Data Selection for Machine Translation. 261-264.
Mo, L., Xu G., Kay P., & Tan L-H. (2011).  Electrophysiological Evidence for the Left-Lateralized Effect of Language on Preattentive Categorical Perception of Color. 108(34), 14026-14030.
Goebel, C., Tribowski C., & Günther O. (2009).  EPCIS-Based Supply Chain Event Management—A Quantitative Comparison of Candidate System Architectures. 494-499.
Demers, A. J., Greene D., Hauser C., Irish W., Larson J., Shenker S., et al. (1987).  Epidemic Algorithms for Replicated Database Maintenance. Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
Datta, A., Lu J., & Tschantz M. Carl (2019).  Evaluating Anti-Fingerprinting Privacy Enhancing Technologies. Proceedings of the WWW'19 (World Wide Web Conference).
Zaslavsky, N., Garvin K., Kemp C., Tishby N., & Regier T. (In Press).  Evolution and efficiency in color naming: The case of Nafaanra. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
Raabe, A., Tietjen J., & Anlauf J. K. (2009).  An Exact and Efficient Triangle Intersection Test Hardware. 355-360.
Reeder, R. W., Felt A. Porter, Consolvo S., Malkin N., Thompson C., & Egelman S. (2018).  An Experience Sampling Study of User Reactions to Browser Warnings in the Field. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Eppe, M., Trott S., & Feldman J. (2016).  Exploiting Deep Semantics and Compositionality in Natural Language for Human-Robot-Interaction. Proceedings of International Conference on Inteligent Robots and Systems (IROS 2016).
Yang, F., Tur G., & Shriberg E. (2008).  Exploiting Dialog Act Tagging and Prosodic Information for Action Item Identification. 4941-4944.
Hakkani-Tür, D., Tur G., & Levit M. (2007).  Exploiting Information Extraction Annotations for Document Retrieval in Distillation Tasks. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 330-333.

Pages