Found 4214 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Yang, J., Chow Y-L., Re C., & Mahoney M. W. (2015).  Weighted SGD for ℓp Regression with Randomized Preconditioning. Proceedings of the 27th Annual SODA Conference. 558-569.
Leen, T. K., & Moody J. (1993).  Weight-Space Probability Densities and Equilibria in Stochastic Learning.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Fillmore, L. Wong, & Fillmore C. J. (2013).  What Does Text Complexity Mean for English Learners and Language Minority Students?. 1-11.
Weaver, N. (2021).  What Happened in the Kaseya VSA Incident?. Lawfare.
Moody, J., & Wu L. (1997).  What is the True Price? -- State Space Models for High Frequency FX Rates.
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
Feldman, J. (1989).  What Lies Ahead.
Allman, M. (2008).  What Ought a Program Committee to Do?.
Scott, C., Wundsam A., Zarifis K., & Shenker S. J. (2012).  What, Where, and When: Software Fault Localization for SDN.
Elizalde, B. Martinez, Friedland G., & Ni K. (2013).  What You Hear Is What You Get: Audio-Based Video Content Analysis.
Kulis, B., Saenko K., & Darrell T. (2011).  What You Saw is Not What You Get: Domain Adaptation Using Asymmetric Kernel Transforms. 1785-1792.
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.
Morgan, N. (2002).  What's New in Government-Sponsored Speech Recognition Research. Speech Technology Magazine. 7,
Faria, A., & Morgan N. (2008).  When a Mismatch Can Be Good: Large Vocabulary Speech Recognition Trained with Idealized Tandem Features. 1574-1577.
Marczak, B., Scott-Railton J., Marquis-Boire M., & Paxson V. (2014).  When Governments Hack Opponents: A Look at Actors and Technology.
Frieze, A., Karp R. M., & Reed B. (1992).  When is the Assignment Bound Tight for the Asymmetric Traveling-Salesman Problem?.
Frieze, A., Karp R. M., & Reed B. (1995).  When is the assignment bound tight for the asymmetric traveling-salesman problem?. SIAM Journal on Computing. 24(3), 484-493.
Bailey, D. R. (1997).  When Push Comes to Shove: A Computational Model of the Role of Motor Control in the Acquisition of Action Verbs.
Bailey, D. R. (1997).  When Push Comes to Shove: A Computational Model of the Role of Motor Control in the Acquisition of Action Verbs.
Friedrich, T., & Neumann F. (2010).  When to Use Bit-Wise Neutrality. Natural Computing. 9(1), 283-294.
Knox, M. Tai, Mirghafori N., & Friedland G. (2012).  Where did I go Wrong?: Identifying Troublesome Segments for Speaker Diarization Systems.
Bryant, J., Chang N., Porzel R., & Sanders K. (2001).  Where is natural language understanding? Toward context-dependent utterance interpretation. Proceedings of the 7th Annual Conference on Architectures and Mechanisms for Language Processing AMLaP.
Willinger, W., & Paxson V. (1998).  Where Mathematics Meets the Internet. Notices of the American Mathematical Society. 45(8), 961-970.
Choi, J., Larson M., Li X., Friedland G., & Hanjalic A. (2016).  Where to be wary: The impact of widespread photo-taking and image enhancement practices on users' geo-privacy.