Publications

Found 198 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Chang, N., & Fischer I.. (2000).  Understanding idioms.
Chang, N., & Mok E. (2006).  Putting Context in Constructions.
Chang, S-Y., Meyer B. T., & Morgan N. (2013).  Spectro-Temporal Features for Robust Speech Recognition Using Power-Law Nonlinearity and Power-Bias Subtraction.
Chang, N., Feldman J., Porzel R., & Sanders K. (2002).  Scaling Cognitive Linguistics: Formalisms for Language Understanding.
Chang, N. (2009).  From Motion Frames to Grammar: A Usage-Based Model of a Construction Learning.
Chang, S., Greenberg S., & Wester M. (2001).  An Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Chang, N., & Maia T.. (2001).  Grounded learning of grammatical constructions. Proceedings of the Association for the Advancement of Artificial Intelligence 2001 Spring Symposium on Learning Grounded Representations.
Chang, S-Y., Morgan N., Raju A., Alwan A., & Kreiman J. (2015).  Using Fast and Slow Modulations to Model Human Hearing of Fast and Slow Speech.
Chandrayana, K.., Karp R. M., Roughan M.., Sen S.., & Zhang Y. (2004).  Search Strategies in Inter-Domain Traffic Engineering.
Chandrasekaran, K.., Karp R. M., Moreno-Centeno E.., & Vempala S.. (2011).  Algorithms for Implicit Hitting Set Problems. 614-629.
Chakraborty, R., Wang J., & Yu S. X. (2019).  SurReal: Fr'echet Mean and Distance Transform for Complex-Valued Deep Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.
Celikyilmaz, A., Hakkani-Tür D., & Tur G. (2010).  LDA Based Similarity Modeling for Question Answering. 1-9.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Graph-Based Semi-Supervised Learning for Question Semantic Labeling. 27-35.
Cebron, N.. (2010).  Refinement of Observations Under Budget Constraints in Active Learning.
Catanzaro, B., Kamil S., Lee Y., Asanović K., Demmel J., Keutzer K., et al. (2009).  SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization.
Castro, I., Panda A., Raghavan B., Shenker S. J., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Castor, A. (2021).  Did a CryptoPunk NFT Just Sell for $500 Million? Sort of, in a Transaction That Illuminates How the NFT Market Differs From the Art Market.
Castelluccia, C., Duermuth M., & Imamoglu F. (2014).  Learning from Neuroscience to Improve Internet Security. ERCIM News. 99, 46.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. ACM SIGCOMM Computer Communication Review. 37(4), 1-12.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007). 1-12.
Casado, M., Garfinkel T., Cui W., Paxson V., & Savage S. (2005).  Opportunistic Measurement: Extracting Insight from Spurious Traffic. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Casado, M., Koponen T., Ramanathan R., & Shenker S. J. (2010).  Virtualizing the Network Forwarding Plane. 1-6.

Pages