Found 259 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Lee-Goldman, R., Rhodes R., & Ellsworth M. (2009).  Determination and Modification: Interaction and Interpretation.
Sarolahti, P., Allman M., & Floyd S. (2007).  Determining an Appropriate Sending Rate Over an Underutilized Network Path. 51(7), 1815-1832.
Knightly, E. W. (1996).  Determining Priority Queue Performance from Second Moment Traffic Characterizations.
Luby, M., & Velickovic B. (1993).  On Deterministic Approximation of DNF.
Giammarresi, D., & Montalbano R. (1996).  Deterministic Generalized Automata.
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Hopfgartner, F., & Jose J. M. (2011).  Development of a Test Collection for Studying Long-Term User Modelling. Proceedings of the Workshop Information Retrieval (LWA'11).
Adamo, J-M. (1994).  Development of Parallel BLAS with ARCH Object-Oriented Parallel Library, Implementation on CM-5.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Pal, J. (2003).  The Developmental Promise of Information and Communications Technology in India.
Morgan, N., Asanović K., Kingsbury B., & Wawrzynek J. (1990).  Developments in Digital VLSI Design for Artificial Neural Networks.
[Anonymous] (2001).  Developments in Forecast Combination and Portfolio Choice. (Dunis, C.., Timmermann A.., & Moody J., Ed.).
Pang, R., Allman M., Paxson V., & Lee J. (2006).  The Devil and Packet Trace Anonymization. Computer Communication Review. 36(1), 29-38.
Wöhlke, G. (1994).  Dextrous Object Manipulation with Robot Hands Including Rolling and Slipping: Improved Motion & Force Computation Method.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Friedland, G., Yeo C., & Hung H. (2010).  Dialocalizaton: Acoustic Speaker Diarization and Visual Localization as Joint Optimization Problem. ACM Transactions on Multimedia Computing. 6(4), 
Ji, G., & Bilmes J. A. (2005).  Dialog Act Tagging Using Graphical Models. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 1, 33-36.
Rüttgers, M. (1997).  Differential Evolution: A Method for Optimization of Real Scheduling Problems.
Storn, R., & Price K. (1995).  Differential Evolution - A Simple and Efficient Adaptive Scheme for Global Optimization Over Continuous Spaces.
Storn, R. (1995).  Differential Evolution Design of an IIR-Filter with Requirements for Magnitude and Group Delay.
Tschantz, M. Carl, Sen S., & Datta A. (2017).  Differential Privacy as a Causal Property.
Floyd, S., & Paxson V. (2001).  Difficulties in Simulating the Internet. IEEE/ACM Transactions on Networking. 9(4), 392-403.
Greenstein, B., Estrin D., Govindan R., Ratnasamy S., & Shenker S. (2003).  DIFS: A Distributed Index for Features in Sensor Networks. Proceedings of the First IEEE Workshop on Sensor Networks Protocols and Applications 2003 (SNPA). 163-173.
Greenstein, B., Estrin D., Govindan R., Ratnasamy S., & Shenker S. (2003).  DIFS: A Distributed Index for Features in Sensor Networks. Elsevier Journal of Ad Hoc Networks. 1,
Morgan, N., Wu S-L., & Bourlard H. (1995).  Digit Recognition with Stochastic Perceptual Models. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).