Publications

Found 21 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is I  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
Iandola, F., Moskewicz M., Karayev S., Girshick R., Darrell T., & Keutzer K. (2014).  DenseNet: Implementing Efficient ConvNet Descriptor Pyramids.
Ibarretxe-Antuñano, I. (2001).  An Overview of Basque Locational Cases: Old Descriptions, New Approaches.
ICSI (2017).  2017 Audited Financial Statement.
ICSI (1990).  Proceedings of the First International Workshop on Network Operating SystemSupport for Digital Audio and Video.
ICSI (2016).  2016 Audited Financial Statement.
Ide, N., Baker C. F., Fellbaum C., & Passonneau R. J. (2012).  The MASC/MultiMASC Community Collaboration Project: Why You Should Be Involved and How.
Ideker, T. E., Thorsson V., & Karp R. M. (2000).  Discovery of Regulatory Interactions Through Perturbation: Inference and Experimental Design. Proceedings of Pacific Symposium on Biocomputing (PSB 2000). 302-313.
Ideker, T. E., Thorsson V., & Karp R. M. (2000).  Discovery of Rgulatory Interactions Through Perturbation: Inference and Experimental Design.
Ikram, M., Vallina-Rodriguez N., Seneviratne S., Kaafar M. Ali, & Paxson V. (2016).  An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Proceedings of ACM Internet Measurement Conference.
Impagliazzo, R., & Luby M. (1989).  One-Way Functions Are Essential for Complexity Based Cryptography (Extended.
Impagliazzo, R., & Luby M. (1989).  Pseudo-Random Number Generator From ANY One-Way Function.
Imseng, D., & Friedland G. (2010).  An Adaptive Initialization Method for Speaker Diarization Based on Prosodic Features. 4946-4949.
Imseng, D., & Friedland G. (2010).  Tuning-Robust Initialization Methods for Speaker Diarization. IEEE Transactions on Audio. 18(8), 2028-2037.
Imseng, D., & Friedland G. (2009).  Robust Speaker Diarization for Short Speech Recordings. 432-437.
Irani, S. (1992).  Competitive On-line Algorithms for Paging and Graph Coloring.
Irani, S. (1990).  Two Results on the List Update Problem.
Isenburg, M. (1996).  Transmission of Multimedia Data Over Lossy Networks (Thesis).
Ishac, J., & Allman M. (2001).  On the Performance of TCP Spoofing in Satellite Networks.
Ivantysynova, L., Klafft M., Ziekow H., Günther O., & Kara S. (2009).  RFID in Manufacturing: The Investment Decision.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Fast Semidifferential-based Submodular Function Optimization. 28(3), 855-863.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Curvature and Optimal Algorithms for Learning and Minimizing Submodular Functions.