Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Bourlard, H., Dupont S., Hermansky H., & Morgan N. (1996).  Towards Subband-Based Speech Recognition. Proceedings of the VIII European Signal Processing Conference (EUSIPCO '96). 1579-1582.
Feldman, J. (1978).  Towards Symbolic Models of Neural Nets.
Baumbach, J., Rahmann S., & Tauch A. (2009).  Towards the Integrated Analysis, Visualization, and Reconstruction of Microbial Gene Regulatory Networks. Briefings in Bioinformatics. 10(1), 75-83.
Bonzon, P. E. (1995).  A Tower Architecture for Meta-Level Inference Systems Based on Omega-OrderedHorn Theories.
Holz, R., Hiller J., Amann J., Razaghpanah A., Hohleld O., Vallina-Rodriguez N., et al. (2020).  Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization. ACM SIGCOMM Computer Communication Review. 50(3), 3-15.
Allman, M., Barford P., Krishnamurty B., & Wang J. (2006).  Tracking the Role of Adversaries in Measuring Unwanted Traffic. Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
Vallina-Rodriguez, N., Sundaresan S., Razaghpanah A., Nithyanand R., Allman M., Kreibich C., et al. (2016).  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Rehfuss, S., Wu L., & Moody J. (1996).  Trading with Committees: A Comparative Study. Proceedings of the Third International Conference on Neural Networks in the Capital Markets.
Martin, C.. H., & Mahoney M. (2019).  Traditional and Heavy-Tailed Self Regularization in Neural Network Models. Proceeding of the 36th ICML Conference. 4284-4293.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Knightly, E. W., & Zhang H. (1994).  Traffic Characterization and Switch Utilization Using a Deterministic Bounding Interval Dependent Traffic Model.
Medina, A., Taft N., Salamatian K., Bhattacharyya S., & Diot C. (2002).  Traffic Matrix Estimation Techniques: Existing Techniques Compared and New Directions. Proceedings of SIGCOMM 2002.
Floyd, S., & Jacobson V. (1992).  On Traffic Phase Effects in Packet-Switched Gateways. Internetworking: Research and Experience. 3(3), 115-156.
Boehme, R., & Koepsell S.. (2010).  Trained to Accept? A Field Experiment on Consent Dialogs. 2403-2406.
Colombetti, M., & Dorigo M. (1993).  Training Agents to Perform Sequential Behavior.
Bourlard, H., Konig Y., & Morgan N. (1996).  A Training Algorithm for Statistical Sequence Recognition with Applications to Transition-Based Speech Recognition. IEEE Signal Processing Letters. 203-205.
Asanović, K., Beck J., Johnson D., Kingsbury B., Morgan N., & Wawrzynek J. (1998).  Training Neural Networks with SPERT-II. 345-364.
Asanović, K. (2007).  Transactors for Parallel Hardware and Software Co-design. Proceedings of the IEEE International High Level Design Validation and Test Workshop 2007 (HLDVT-2007). 140-142.
Quattoni, A., Collins M., & Darrell T. (2008).  Transfer Learning for Image Classification with Sparse Prototype Representations.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Transform-Based Domain Adaptation for Big Data.
S. McCormick, T., Pinedo M. L., Shenker S. J., & Wolf B. (1991).  Transient Behavior in a Flexible Assembly System. International Journal of Flexible Manufacturing Systems. 27-44.
Morgan, N., Konig Y., Wu S-L., & Bourlard H. (1995).  Transition-Based Statistical Training for ASR. IEEE Snowbird Workshop '95.
Karp, R. M. (1989).  The Transitive Closure of a Random Digraph.
Gibbons, P. B., Karp R. M., Ramachandran V., Soroker D., & Tarjan R.. (1991).  Transitive Compaction in Parallel via Branchings. Journal of Algorithms. 12(1), 110-125.
Venugopalan, S., Xu H., Donahue J., Rohrbach M., Mooney R., & Saenko K. (2015).  Translating Videos to Natural Language Using Deep Recurrent Neural Networks.

Pages