Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Renals, S., & Ellis D. P. W. (2003).  Audio Information Access from Meeting Rooms. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2003).
Elizalde, B. Martinez, Ravanelli M., & Friedland G. (2013).  Audio Concept Ranking for Video Event Detection on User-Generated Content.
Chun, B-G., Maniatis P., Shenker S. J., & Kubiatowicz J. D. (2007).  Attested Append-Only Memory: Making Adversaries Stick to their Word. 189-204.
Regier, T., & Zheng M. (2003).  An Attentional Constraint on Spatial Meaning. Proceedings of the 25th Annual Conference of the Cognitive Science Society. 50.
Marzo, J. L., Vilà P., Fàbrega L., & Massaguer D.. (2001).  An ATM Distributed Simulator for Network Management Research. Proceedings of the 34th Annual Simulation Symposium (SS 2001). 185-192.
Greenberg, A.., Shenker S. J., & Stolyar A.. (1996).  Asynchronous Updates in Large Parallel Systems. Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 91-103.
Dutta, P., Culler D. E., & Shenker S. J. (2008).  Asynchronous Neighbor Discovery: Finding Needles of Connectivity in Haystacks of Time. 531-532.
DeNero, J., Pauls A., & Klein D. (2009).  Asynchronous Binarization for Synchronous Grammars.
Mitzel, D. J., & Shenker S. J. (1994).  Asymptotic Resource Consumption in Multicast Reservation Styles. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 226-233.
Raman, S., McCanne S., & Shenker S. J. (1998).  Asymptotic Behavior of Global Recovery in SRM. Proceedings of the 1998 ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems. 90-99.
Shenker, S. J., & Weinrib A. (1988).  Asymptotic Analysis of Large Heterogeneous Queuing Systems. Proceedings of the 1988 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '88). 56-62.
Batliner, A., Steidl S., & Nöth E.. (2011).  Associating Children’s Non-Verbal and Verbal Behaviour: Body Movements, Emotions, and Laughter in a Human-Robot Interaction. 22-27.
Maier, G., Feldmann A., Paxson V., Sommer R., & Vallentin M. (2011).  An Assessment of Overt Malicious Activity Manifest in Residential Networks.
Plane, A. C., Redmiles E. M., Mazurek M. L., & Tschantz M. Carl (2017).  Assessing user perceptions of online targeted advertising. Proceedings of USENIX Security 2017.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Feldman, J., Brown C. M., Ellis C. S., LeBlanc T. J., & Peterson G. L. (1985).  Artificial Intelligence Research on the Butterfly Multicomputer. Proceedings of the Workshop on Artificial Intelligence and Distributed Problem Solving. 109-118.
Black, A. W., H. Bunnell T., Dou Y., Kumar P., Metze F., Perry D., et al. (2012).  Articulatory Features for Expressive Speech Synthesis.
etin, Ö. Ç., Kantor A., King S., Bartels C., Magimai-Doss M., Frankel J., et al. (2007).  An Articulatory Feature-Based Tandem Approach and Factored Observation Modeling. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 645-648.
Livescu, K., etin Ö. Ç., Hasegawa-Johnson M., King S., Bartels C., Borges N., et al. (2007).  Articulatory Feature-Based Methods for Acoustic and Audio-Visual Speech Recognition: Summary from the 2006 Jhu Summer Workshop.
Tsai, T.. J. (2015).  Are You TED Talk Material? Comparing Prosody in Professors and TED Speakers.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Huebsch, R., Chun B., Hellerstein J. M., Loo B. Thau, Maniatis P., Roscoe T., et al. (2005).  The Architecture of PIER: An Internet-Scale Query Processor. Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
Paxson, V., Sommer R., & Weaver N. (2007).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. 1-7.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 31-36.

Pages