Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Karayev, S., Fritz M., & Darrell T. (2014).  Anytime Recognition of Objects and Scenes.
Zaharia, M., Xin R. S., Wendell P., Das T., Armbrust M., Dave A., et al. (2016).  Apache Spark: a unified engine for big data processing. Communications of the ACM. 59(11), 56-65.
Feldman, J. (1990).  Apparent Motion and Other Mysteries. 479-486.
Weaver, N. (2020).  Apple vs FBI: Pensacola Isn’t San Bernardino. Lawfare.
Mertens, R., Huang P-S., Gottlieb L., Friedland G., & Divakaran A. (2011).  On the Applicability of Speaker Diarization to Audio Concept Detection for Multimedia Retrieval. 446-451.
Kaiser, M. (1993).  An Application of a Neural Net for Fuzzy Abductive Reasoning.
Fernández-Iglesias, M. J., González-Castaño F. J., Llamas-Nistal M., Pousada-Carballo J. M., & Vales-Alonso J. (2002).  On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile Terminals. Journal of Systems and Software. 60(1), 49-56.
Haban, D., & Shin K. G. (1989).  Application of Real-Time Monitoring to Scheduling Tasks with Random.
Liu, X., Meneghin M., & Shapiro V. (2021).  An application programming interface for multiscale shape-material modeling. Advances in Engineering Software. 161,
Eppe, M., Trott S., Raghuram V., Feldman J., & Janin A. (2016).  Application-Independent and Integration-Friendly Natural Language Understanding. Proceedings of Global Conference on Artificial Intelligence (GCAI 2016), EPiC Series in Computing.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. J. (2001).  Application-Level Multicast Using Content-Addressable Networks. 2233, 14-29.
Lei, H. (2007).  Applications of Keyword-Constraining in Speaker Recognition.
Hirsch, M. D. (1990).  Applications of Topology to Lower Bound Estimates in Computer Science.
Botia, J., Valdes M.., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions. Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy. 467-470.
Ma, K. W. (1995).  Applying Large Vocabulary Hybrid HMM-MLP Methods to Telephone Recognition of Digits and Natural Numbers.
Tavakoli, A., Casado M., Koponen T., & Shenker S. J. (2009).  Applying NOX to the Datacenter.
Hößler, T., Scheuvens L., Franchi N., Simsek M., & Fettweis G. (2017).  Applying Reliability Theory for Future Wireless Communication Networks. Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
Feldman, J., Ballard D. Harry, & Brown C. M. (1977).  An Approach to Knowledge-Directed Image Analysis.
Feldman, J., Ballard D. Harry, & Brown C. M. (1977).  An Approach to Knowledge-Directed Image Analysis.
Feldman, J., Ballard D. Harry, & Brown C. M. (1978).  An Approach to Knowledge-Directed Image Analysis.
Berman, P., Fößmeier U., Karpinski M., Kaufmann M., & Zelikovsky A. (1994).  Approaching the 5/4-Approximation for Rectilinear Steiner Trees.
Pan, V. (1992).  Approximate Evaluation of a Polynomial on a Set of Real Points.
Pan, R., Prabhakar B., Breslau L., & Shenker S. J. (2003).  Approximate Fair Allocation of Link Bandwidth. 36-43.
Pan, R., Breslau L., Prabhakar B., & Shenker S. J. (2003).  Approximate Fairness Through Differential Dropping. ACM SIGCOMM Computer Communication Review. 33(2), 23-39.
Heun, V. (1998).  Approximate Protein Folding in the HP Side Chain Model on Extended Cubic Lattices.

Pages