Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Utrera, F., Kravitz E., N. Erichson B., Khanna R., & Mahoney M. (2021).  Adversarially-Trained Deep Nets Transfer Better: Illustration on Image Classification. International Conference on Learning Representations.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
Hwang, J-J., Ke T-W., Shi J., & Yu S. X. (2019).  Adversarial Structure Matching for Structured Prediction Tasks. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
Feldman, J. (2011).  Advancing Embodied Theories of Language.
Goebel, C., Tribowski C., & Günther O. (2009).  Adoption of Cross-Company RFID: An Empirical Analysis of Perceived Influence Factors.
Fàbrega, L., Jové T., Bueno A., & Marzo J. L. (2001).  An Admission Control Approach for Elastic Flows in the Internet. Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001).
Jamin, S., Shenker S. J., Zhang L., & Clark D. D. (1992).  An Admission Control Algorithm for Predictive Real-Time Service (Extended Abstract). Proceedings of the Third International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV). 349-356.
Partridge, C., & Allman M. (2015).  Addressing Ethical Considerations in Network Measurement Papers. Proceedings of ACM SIGCOMM Workshop on Ethics in Networked Systems Research.
Shriberg, E., Stolcke A., & Ravuri S. (2013).  Addressee Detection for Dialog Systems Using Temporal and Spectral Dimensions of Speaking Style.
Fritz, M., Black M., Bradski G., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition. 558-566.
Fritz, M., Black M., Bradski G., Karayev S., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition.
Nithyanand, R., Khattak S., Javed M., Vallina-Rodriguez N., Falahrastegar M., Powles J. E., et al. (2016).  Adblocking and Counter-Blocking: A Slice of the Arms Race. Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI '16).
Zhang, L., Michel S.., Nguyen K.., Rosenstein A.., Floyd S., & Jacobson V. (1998).  Adaptive Web Caching: Towards a New Global Caching Architecture. Proceedings of the Third International WWW Caching Workshop.
Jung, J., Milito R. A., & Paxson V. (2007).  On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. 175-192.
Sánchez, M. (2001).  Adaptive Power Control for Ad-Hoc Networks. Proceedings of Fifth International Conference on Sytemics Cybernetics and Informatics (SCI), 2001.
Lässig, J., & Sudholt D. (2011).  Adaptive Population Models for Offspring Populations and Parallel Evolutionary Algorithms. 181-192.
Hopfgartner, F. (2011).  Adaptive Interactive News Video Recommendation: An Example System.
Imseng, D., & Friedland G. (2010).  An Adaptive Initialization Method for Speaker Diarization Based on Prosodic Features. 4946-4949.
Satzger, B., Kramer O., & Lässig J. (2010).  Adaptive Heuristic Estimates for Automated Planning Using Regression. 576-581.
van Heeswijk, M., Miche Y., Lindh-Knuutila T., Hilbers P. A. J., Honkela T., Oja E., et al. (2009).  Adaptive Ensemble Models of Extreme Learning Machines for Time Series Prediction. 2, 305-314.
Dries, A., & Rückert U. (2009).  Adaptive Concept Drift Detection. 235-246.
Saenko, K., Kulis B., Fritz M., & Darrell T. (2010).  Adapting Visual Category Models to New Domains. 213-226.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Tzeng, E., Devin C., Hoffman J., Finn C., Abbeel P., Levine S., et al. (2016).  Adapting deep visuomotor representations with weak pairwise constraints. Workshop on the Algorithmic Foundations of Robotics (WAFR).

Pages