Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
U
Morgan, N. (1994).  Using A Million Connections for Continuous Speech Recognition. 1439-1444.
Friedland, G. (2012).  Using a GPU, Online Diarization = Offline Diarization.
Frik, A., Kim J., Sanchez J. Rafael, & Ma J. (2022).  Users’ Expectations About and Use of Smartphone Privacy and Security Settings. CHI Conference on Human Factors in Computing Systems.
Helbig, H. (1997).  User-Friendly Information Retrieval in Data Bases and in the World Wide Web.
Botia, J., Ruiz P. M., & Gómez-Skarmeta A. (2004).  User-Aware Videoconference Session Control Using Software Agents. Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004).
Ruiz, P. M., Botia J., & Gómez-Skarmeta A. (2004).  User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments. Lecture Notes in Computer Science.
Lei, H., Choi J., Janin A., & Friedland G. (2011).  User Verification: Matching the Uploaders of Videos Across Accounts. 2404-2407.
Fillmore, C. J. (1986).  U-Semantics, Second Round. Quaderni di Semantica. 49-58.
Feldman, J., Pingle K.. K., Binford T.. O., Falk G., Hay A.., Pau R.., et al. (1971).  The Use of Vision and Manipulation to Solve the 'Instant Insanity' puzzle. 359-364.
Ravuri, S. (2011).  On the Use of Spectro-Temporal Features in Noise-Additive Speech.
Adams, A. K., Bu T., Cáceres R., Duffield N., Friedman T., Horowitz J., et al. (2000).  The Use of End-to-end Multicast Measurements for Characterizing Internal Network Behavior.
Gottlieb, L., & Friedland G. (2009).  On the Use of Artificial Conversation Data for Speaker Recognition in Cars. 124-128.
Sokol, J., & Widmer J. (2001).  USAIA: Ubiquitous Service Access Internet Architecture.
Patra, R., Pal J., Nedevschi S., Plauché M., & Pawar U.. S. (2007).  Usage Models of Classroom Computing in Developing Regions. Proceedings of International Conference on Information Technologies and Development (ICTD2007). 158-167.
Egelman, S. (2018).  The Usable Security & Privacy Group. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Lee, L., Fifield D., Malkin N., Iyer G., Egelman S., & Wagner D. (2017).  A Usability Evaluation of Tor Launcher. Proceedings on Privacy Enhancing Technologies 2017.
Baker, J. M., Deng L., Khudanpur S., Lee C-H., Glass J. R., Morgan N., et al. (2009).  Updated MINDS Report on Speech Recognition and Understanding, Part 2. IEEE Signal Processing Magazine. 26(4), 78-85.
Li, Z., Atre R., Huda Z. Ul, Jannesari A., & Wolf F. (2016).  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117, 282–295.
Tribowski, C., Spin K., Günther O., & Sielemann O. (2009).  Unternehmensübergreifende RFID-Anwendungen – Eine Fallstudie aus der Möbelindustrie zur RFID-basierten Auftragsabwicklung. Proceedings of the 11th Paderborner Frühjahrstagung (PBFT 2009).
Walfish, M., Balakrishnan H., & Shenker S. J. (2004).  Untangling the Web from DNS. Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004). 225-238.
Wang, X., Lian L., & Yu S. X. (2021).  Unsupervised Visual Attention and Invariance for Reinforcement Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Bansal, M., DeNero J., & Lin D. (2012).  Unsupervised Translation Sense Clustering. 773-782.
QasemiZadeh, B., Petruck M. R. L., Kallmeyer L., Candito M., Maldonado A., Osswald R., et al. (2019).  Unsupervised Lexical Semantic Frame Induction: A SemEval 2019 Task Proposal.
Saenko, K., & Darrell T. (2008).  Unsupervised Learning of Visual Sense Models for Polysemous Words. 1393-1400.
Gillick, D., Hakkani-Tür D., & Levit M. (2008).  Unsupervised Learning of Edit Parameters for Matching Name Variants. 467-470.

Pages