Publications

Found 4089 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Harbach, M., De Luca A., & Egelman S. (2016).  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Yaman, S., Tur G., Vergyri D., Hakkani-Tür D., Harper M. P., & Wang W. (2009).  Anchored Speech Recognition for Question Answering. 265-268.
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Yu, S. X. (2012).  Angular Embedding: A Robust Quadratic Criterion. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE. 34(1), 158-173.
Eklund, R., Bates R., Kuyper C., Willingham E., & Shriberg E. (2006).  The Annotation and Analysis of Importance in Meetings.
Sinha, S. (2008).  Answering Questions about Complex Events.
Narayanan, S., & Harabagiu S. (2004).  Answering Questions Using Advanced Semantics and Probabilistic Inference. Proceedings of the Pragmatics of Question Answering Workshop at the North American Chapter of the Association for Computational Linguistics Human Language Technologies Conference (NAACL HLT 2004).
Horoba, C., & Sudholt D. (2010).  Ant Colony Optimization for Stochastic Shortest Path Problems. 1465-1472.
Friedland, G., & Rojas R. (2008).  Anthropocentric Video Segmentation for Lecture Webcasts. EURASIP Journal on Image and Video Processing. 8(2), 
Ferrer, L., Sönmez K., & Shriberg E. (2009).  An Anticorrelation Kernel for Subsystem Training in Multiple Classifier Systems. Journal of Machine Learning Research. 10, 2079-2114.
Gleich, D., & Mahoney M. W. (2014).  Anti-Differentiating Approximation Algorithms: A Case Study with Min-Cuts, Spectral, and Flow.
Kushilevitz, E., Micali S., & Ostrovsky R. (1993).  Any Non-Private Boolean Function Is Complete For Private Multi-Party Computations.
Boakye, K., Favre B., & Hakkani-Tür D. (2009).  Any Questions? Automatic Question Detection in Meetings. 485-489.
Karayev, S., Fritz M., & Darrell T. (2014).  Anytime Recognition of Objects and Scenes.
Zaharia, M., Xin R. S., Wendell P., Das T., Armbrust M., Dave A., et al. (2016).  Apache Spark: a unified engine for big data processing. Communications of the ACM. 59(11), 56-65.
Feldman, J. (1990).  Apparent Motion and Other Mysteries. 479-486.
Mertens, R., Huang P-S., Gottlieb L., Friedland G., & Divakaran A. (2011).  On the Applicability of Speaker Diarization to Audio Concept Detection for Multimedia Retrieval. 446-451.
Kaiser, M. (1993).  An Application of a Neural Net for Fuzzy Abductive Reasoning.
Fernández-Iglesias, M. J., González-Castaño F. J., Llamas-Nistal M., Pousada-Carballo J. M., & Vales-Alonso J. (2002).  On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile Terminals. Journal of Systems and Software. 60(1), 49-56.
Haban, D., & Shin K. G. (1989).  Application of Real-Time Monitoring to Scheduling Tasks with Random.
Eppe, M., Trott S., Raghuram V., Feldman J., & Janin A. (2016).  Application-Independent and Integration-Friendly Natural Language Understanding. Proceedings of Global Conference on Artificial Intelligence (GCAI 2016), EPiC Series in Computing.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. (2001).  Application-Level Multicast Using Content-Addressable Networks. 2233, 14-29.
Lei, H. (2007).  Applications of Keyword-Constraining in Speaker Recognition.
Hirsch, M. D. (1990).  Applications of Topology to Lower Bound Estimates in Computer Science.
Botia, J., Valdes M.., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions. Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy. 467-470.

Pages