Found 4120 results
Author Title Type [ Year(Asc)]
Souiai, M., Nieuwenhuis C., Strekalovskiy E., & Cremers D. (2013).  Convex Optimization for Scene Understanding.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Curvature and Optimal Algorithms for Learning and Minimizing Submodular Functions.
Vinyals, O., & Morgan N. (2013).  Deep vs. Wide: Depth on a Budget for Robust Speech Recognition.
Zhang, N., Farrell R., Iandola F., & Darrell T. (2013).  Deformable Part Descriptors for Fine-Grained Recognition and Attribute Prediction.
Batten, C., Joshi A., Stojanovic V., & Asanović K. (2013).  Designing Chip-Level Nanophotonic Interconnection Networks.
Javed, M., & Paxson V. (2013).  Detecting Stealthy, Distributed SSH Brute-Forcing.
Girshick, R., Song H. Oh, & Darrell T. (2013).  Discriminatively Activated Sparselets.
Beamer, S., Buluç A., Asanović K., & Patterson D. (2013).  Distributed Memory Breadth-First Search Revisited: Enabling Bottom-Up Search.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2013).  Effective Straggler Mitigation: Attack of the Clones. 185-198.
Hoffman, J., Rodner E., Donahue J., Darrell T., & Saenko K. (2013).  Efficient Learning of Domain-Invariant Image Representations.
Liu, J., Panda A., Singla A., P. Godfrey B., Schapira M., & Shenker S. (2013).  Ensuring Connectivity via Data Plane Mechanisms. 113-126.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2013).  Exploiting Innocuous Activity for Correlating Users Across Sites.
Knox, M. Tai, Mirghafori N., & Friedland G. (2013).  Exploring Methods of Improving Speaker Accuracy for Speaker Diarization.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Fast Semidifferential-based Submodular Function Optimization. 28(3), 855-863.
Graciarena, M., Alwan A., Ellis D. P. W., Franco H., Ferrer L., Hansen J. H. L., et al. (2013).  Feature Combination for Highly Channel-Degraded Speech Activity Detection.
Morgan, N., Cohen J., Parthasarathi S. Hari Krish, Chang S-Y., & Wegmann S. (2013).  Final Report: OUCH Project (Outing Unfortunate Characteristics of HMMs).
Beverly, R., & Allman M. (2013).  Findings and Implications from Data Mining the IMC Review Process. ACM SIGCOMM Computer Communication Review. 3(1), 23-29.
Marquis-Boire, M., Marczak B., Guarnieri C., & Scott-Railton J. (2013).  For Their Eyes Only: The Commercialization of Digital Spying. The Citizen Lab.
Krishnamoorthy, N., Malkarnenkar G., Mooney R., Saenko K., & Guadarrama S. (2013).  Generating Natural-Language Video Descriptions Using Text-Mined Knowledge.
de Melo, G., & Bansal M. (2013).  Good, Great, Excellent: Global Inference of Lexical Intensities. Transactions of the Association for Computational Linguistics. 279-290.
de Melo, G., & Bansal M. (2013).  Good, Great, Excellent: Global Inference of Lexical Intensities.
Guadarrama, S., Riano L., Golland D., Göhring D., Jia Y., Klein D., et al. (2013).  Grounding Spatial Relations for Human-Robot Interaction.
Cook, H., Moretó M., Bird S., Dao K., Patterson D., & Asanović K. (2013).  A Hardware Evaluation of Cache Partitioning to Improve Utilization and Energy-Efficiency while Preserving Responsiveness.
Akhawe, D., Amann J., Vallentin M., & Sommer R. (2013).  Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web.
Maire, M., Yu S. X., & Perona P. (2013).  Hierarchical Scene Annotation.