Found 357 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Kääriäinen, M., & Langford J. (2006).  Lower Bounds for Reductions.
Kääriäinen, M. (2005).  On Active Learning in the Non-Realizable Case. Proceedings of the Foundations of Active Learning Workshop at the 19th Annual Conference on Neural Information Processing Systems (NIPS).
Kääriäinen, M., & Langford J. (2005).  A Comparison of Tight Generalization Error Bounds. Proceedings of the 22nd International Conference on Machine Learning (ICML 2005). 409-416.
Kääriäinen, M. (2005).  Semi-Supervised Model Selection Based on Cross-Validation.
Kääriäinen, M. (2005).  Generalization Error Bounds Using Unlabeled Data. Proceedings of the 18th Annual Conference on Learning Theory (COLT 2005). 127-142.
Kadanoff, L. P., & Shenker S. (1982).  Critical Behavior of a KAM Surface: I. Empirical Results. Journal of Physical Statistics. 27(4), 631-656.
Kadanoff, L. P., & Shenker S. (1981).  Band to Band Hopping in One-Dimensional Maps. Journal of Physics A: Mathematical and General. 14(2), L23-26.
Kaiser, M. (1993).  Towards a Cognitively Based Approach of a Description of Spatial Deixis.
Kaiser, M. (1993).  An Application of a Neural Net for Fuzzy Abductive Reasoning.
Kajarekar, S., Ferrer L., Sönmez K., Zheng J., Shriberg E., & Stolcke A. (2004).  Modeling NERFs for Speaker Recognition. Proceedings of the Speaker and Language Recognition Workshop (Odyssey 2004). 51-56.
Kajarekar, S., Ferrer L., Venkataraman A., Sönmez K., Shriberg E., Stolcke A., et al. (2003).  Speaker Recognition Using Prosodic and Lexical Features. Proceedings of the IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2003). 19-24.
Kajarekar, S., Scheffer N., Graciarena M., Shriberg E., Stolcke A., Ferrer L., et al. (2009).  The SRI NIST 2008 Speaker Recognition Evaluation System. 4205-4208.
Kajarekar, S., Yegnanarayana B.., & Hermansky H. (2001).  A Study of Two Dimensional Linear Descriminants For ASR. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001).
Kalfa, W. (1992).  Proposal of an External Processor Scheduling in Micro-Kernel Based Operating Systems.
Kamangar, K.., Hakkani-Tür D., Tur G., & Levit M. (2008).  An Iterative Unsupervised Learning Method for Information Distillation. 4949-4952.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 3-14.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 52(9), 99-107.
Kanich, C., Weaver N., McCoy D., Halvorson T., Kreibich C., Levchenko K., et al. (2011).  Show Me the Money: Characterizing Spam-Advertised Revenue.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2005).  Detecting Hidden Causality in Network Connections.
Kannan, S. (1989).  Program Checkers for Algebraic Problems (Thesis).
Kannan, S. (1989).  Program Checkers for Algebraic Problems.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2006).  Semi-Automated Discovery of Application Session Structure. Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 119-132.
Kannan, J. Kumar, Caesar M., Stoica I., & Shenker S. (2007).  On the Consistency of DHT-Based Routing.
Kannan, J., Yang B., Shenker S., Sharma P., Banerjee S., Basu S., et al. (2005).  Smartseer: Continuous Queries over Citeseer.
Kantchelian, A., Tschantz M. Carl, Afroz S., Miller B., Shankar V., Bachwani R., et al. (2015).  Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.