Publications

Found 4089 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Asanović, K., Beck J., Johnson D., Kingsbury B., Morgan N., & Wawrzynek J. (1998).  Training Neural Networks with SPERT-II. 345-364.
Bourlard, H., Konig Y., & Morgan N. (1996).  A Training Algorithm for Statistical Sequence Recognition with Applications to Transition-Based Speech Recognition. IEEE Signal Processing Letters. 203-205.
Colombetti, M., & Dorigo M. (1993).  Training Agents to Perform Sequential Behavior.
Boehme, R., & Koepsell S.. (2010).  Trained to Accept? A Field Experiment on Consent Dialogs. 2403-2406.
Floyd, S., & Jacobson V. (1992).  On Traffic Phase Effects in Packet-Switched Gateways. Internetworking: Research and Experience. 3(3), 115-156.
Medina, A., Taft N., Salamatian K., Bhattacharyya S., & Diot C. (2002).  Traffic Matrix Estimation Techniques: Existing Techniques Compared and New Directions. Proceedings of SIGCOMM 2002.
Knightly, E. W., & Zhang H. (1994).  Traffic Characterization and Switch Utilization Using a Deterministic Bounding Interval Dependent Traffic Model.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Rehfuss, S., Wu L., & Moody J. (1996).  Trading with Committees: A Comparative Study. Proceedings of the Third International Conference on Neural Networks in the Capital Markets.
Vallina-Rodriguez, N., Sundaresan S., Razaghpanah A., Nithyanand R., Allman M., Kreibich C., et al. (2016).  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Allman, M., Barford P., Krishnamurty B., & Wang J. (2006).  Tracking the Role of Adversaries in Measuring Unwanted Traffic. Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
Bonzon, P. E. (1995).  A Tower Architecture for Meta-Level Inference Systems Based on Omega-OrderedHorn Theories.
Baumbach, J., Rahmann S., & Tauch A. (2009).  Towards the Integrated Analysis, Visualization, and Reconstruction of Microbial Gene Regulatory Networks. Briefings in Bioinformatics. 10(1), 75-83.
Feldman, J. (1978).  Towards Symbolic Models of Neural Nets.
Bourlard, H., Dupont S., Hermansky H., & Morgan N. (1996).  Towards Subband-Based Speech Recognition. Proceedings of the VIII European Signal Processing Conference (EUSIPCO '96). 1579-1582.
Lei, H. (2009).  Towards Structured Approaches to Arbitrary Data Selection and Performance Prediction for Speaker Recognition.
Li, Z., Goyal A., Chen Y., & Paxson V. (2011).  Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
Vinyals, O., & Friedland G. (2008).  Towards Semantic Analysis of Conversations: A System for the Live Identification of Speakers in Meetings. 426-431.
Mirghafori, N., Fosler-Lussier E., & Morgan N. (1996).  Towards Robustness to Fast Speech in ASR. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP-96).
Wooters, C., Fung J., Peskin B., & Anguera X. (2004).  Towards Robust Speaker Segmentation: The ICSI-SRI Fall 2004 Diarization System. Proceedings of Fall 2004 Rich Transcription Workshop (RT-04F).
Marzo, J. L., Maryni P.., & Vilà P. (2001).  Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS Case. Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001).
Ermolinskiy, A., Katti S., Shenker S., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
Ben-Dor, A., Hartman T., Schwikowski B., Sharan R., & Yakhini Z. (2003).  Towards Optimally Multiplexed Applications of Universal DNA Tag Systems. Proceedings of the Seventh Annual International Conference on Research in Computational Molecular Biology (RECOMB'03).
Ben-Dor, A., Hartman T., Karp R. M., Schwikowski B., Sharan R., & Yakhini Z. (2004).  Towards Optimally Multiplexed Applications of Universal Arrays. Journal of Computational Biology. 11, 477-493.
Cleve, R. (1990).  Towards Optimal Simulations of Formulas by Bounded-Width Programs.

Pages