Found 182 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Roth, V. (2002).  Java Security Architecture and Extensions. Dr. Dobbs Journal.
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.
Rössner, C., & Schnorr C. P. (1994).  A Stable Integer Relation Algorithm.
Rosenfeld, A.., Feldman J., Kanal L.. N., & Winston P.. H. (1977).  AI and Pattern Recognition.
Rosario, B., Hearst M. A., & Fillmore C. J. (2002).  The Descent of Hierarchy, and Selection in Relational Semantics. Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL 2002). 247-254.
Roosta-Khorasani, F., & Mahoney M. W. (2016).  Sub-Sampled Newton Methods I: Globally Convergent Algorithms.
Roosta-Khorasani, F.., & Mahoney M. W. (2019).  Sub-Sampled Newton Methods. Mathematical Programming. 293-326.
Roosta-Khorasani, F., & Mahoney M. W. (2016).  Sub-Sampled Newton Methods II: Local Convergence Rates.
Ronen, R.., Gan I.., Modai S.., Sukacheov A.., Dror G.., Halperin E., et al. (2010).  miRNAkey: A Software for microRNA Deep Sequencing Analysis. Bioinformatics. 26(20), 2615-2616.
Ronen, A.. (2001).  On Approximating Optimal Auctions.
Ronen, B.., & Karp R. M. (1994).  An information entropy approach to the small-lot concept. IEEE Transactions on Engineering Management. 41(1), 89-92.
Ronen, T.., Shani C.., Hope T.., Petruck M.. R. L., Abend O., & Shahaf D. (2020).  Language (Re)modelling: Towards Embodied Language Understanding. Proceedings of the Association for Computational Linguistics . 58, 6268–6281.
Rojas, R. (1993).  Second Order Backpropagation - Efficient Computation of the Hessian Matrix for Neural Networks.
Rohrbach, A., Rohrbach M., Tandon N., & Schiele B. (2015).  A Dataset for Movie Description.
Rohrbach, A., Rohrbach M., Qiu W., Friedrich A., Pinkal M., & Schiele B. (2014).  Coherent Multi-Sentence Video Description with Variable Level of Detail. 8753, 184-195.
Rodriguez, N.., & Ierusalimschy R. (1994).  Side Effect Free Functions in Object-Oriented Languages.
Rodrigues, H., Santos J. Renato, Turner Y., Soares P., & Guedes D. (2011).  Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter Networks.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Transform-Based Domain Adaptation for Big Data.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Scalable Transform-Based Domain Adaptation.
Robinson, A.., Almeida L.., Boite J.., Bourlard H., Fallside F., Hochberg H.., et al. (1993).  A Neural Network Based, Speaker Independent, Large Vocabulary, Continuous Speech Recognition System: the Wernicke Project. Proceedings of the Third European Conference on Speech Communication and Technology (Eurospeech '93). 1941-1944.
Roark, B.., Liu Y., Harper M. P., Stewart R.., Lease M.., Snover M.., et al. (2006).  Reranking for Sentence Boundary Detection in Conversational Speech. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 1, 545-548.
Rizk, R., Marx D.., Schrepfer M.., Zimmermann J.., & Günther O. (2009).  Media Coverage of Online Social Network Privacy Issues in Germany - A Thematic Analysis.
Rieger, B. B. (1991).  On Distributed Representation in Word Semantics.
Riedhammer, K., Favre B., & Hakkani-Tür D. (2010).  Long Story Short - Global Unsupervised Models for Keyphrase Based Meeting Summarization. Speech Communication. 52(10), 801-815.
Riedhammer, K., Favre B., & Hakkani-Tür D. (2008).  A Keyphrase Based Approach to Interactive Meeting Summarization. 153-156.