Found 4169 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Venugopalan, S., Xu H., Donahue J., Rohrbach M., Mooney R., & Saenko K. (2015).  Translating Videos to Natural Language Using Deep Recurrent Neural Networks.
Gibbons, P. B., Karp R. M., Ramachandran V., Soroker D., & Tarjan R.. (1991).  Transitive Compaction in Parallel via Branchings. Journal of Algorithms. 12(1), 110-125.
Karp, R. M. (1989).  The Transitive Closure of a Random Digraph.
Morgan, N., Konig Y., Wu S-L., & Bourlard H. (1995).  Transition-Based Statistical Training for ASR. IEEE Snowbird Workshop '95.
S. McCormick, T., Pinedo M. L., Shenker S., & Wolf B. (1991).  Transient Behavior in a Flexible Assembly System. International Journal of Flexible Manufacturing Systems. 27-44.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Transform-Based Domain Adaptation for Big Data.
Quattoni, A., Collins M., & Darrell T. (2008).  Transfer Learning for Image Classification with Sparse Prototype Representations.
Asanović, K. (2007).  Transactors for Parallel Hardware and Software Co-design. Proceedings of the IEEE International High Level Design Validation and Test Workshop 2007 (HLDVT-2007). 140-142.
Asanović, K., Beck J., Johnson D., Kingsbury B., Morgan N., & Wawrzynek J. (1998).  Training Neural Networks with SPERT-II. 345-364.
Bourlard, H., Konig Y., & Morgan N. (1996).  A Training Algorithm for Statistical Sequence Recognition with Applications to Transition-Based Speech Recognition. IEEE Signal Processing Letters. 203-205.
Colombetti, M., & Dorigo M. (1993).  Training Agents to Perform Sequential Behavior.
Boehme, R., & Koepsell S.. (2010).  Trained to Accept? A Field Experiment on Consent Dialogs. 2403-2406.
Floyd, S., & Jacobson V. (1992).  On Traffic Phase Effects in Packet-Switched Gateways. Internetworking: Research and Experience. 3(3), 115-156.
Medina, A., Taft N., Salamatian K., Bhattacharyya S., & Diot C. (2002).  Traffic Matrix Estimation Techniques: Existing Techniques Compared and New Directions. Proceedings of SIGCOMM 2002.
Knightly, E. W., & Zhang H. (1994).  Traffic Characterization and Switch Utilization Using a Deterministic Bounding Interval Dependent Traffic Model.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Martin, C.. H., & Mahoney M. W. (2019).  Traditional and Heavy-Tailed Self Regularization in Neural Network Models. Proceeding of the 36th ICML Conference. 4284-4293.
Rehfuss, S., Wu L., & Moody J. (1996).  Trading with Committees: A Comparative Study. Proceedings of the Third International Conference on Neural Networks in the Capital Markets.
Vallina-Rodriguez, N., Sundaresan S., Razaghpanah A., Nithyanand R., Allman M., Kreibich C., et al. (2016).  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Allman, M., Barford P., Krishnamurty B., & Wang J. (2006).  Tracking the Role of Adversaries in Measuring Unwanted Traffic. Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
Bonzon, P. E. (1995).  A Tower Architecture for Meta-Level Inference Systems Based on Omega-OrderedHorn Theories.
Baumbach, J., Rahmann S., & Tauch A. (2009).  Towards the Integrated Analysis, Visualization, and Reconstruction of Microbial Gene Regulatory Networks. Briefings in Bioinformatics. 10(1), 75-83.
Feldman, J. (1978).  Towards Symbolic Models of Neural Nets.
Bourlard, H., Dupont S., Hermansky H., & Morgan N. (1996).  Towards Subband-Based Speech Recognition. Proceedings of the VIII European Signal Processing Conference (EUSIPCO '96). 1579-1582.
Lei, H. (2009).  Towards Structured Approaches to Arbitrary Data Selection and Performance Prediction for Speaker Recognition.