Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Fritz, M., Black M., Bradski G., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition. 558-566.
Fritz, M., Black M., Bradski G., Karayev S., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition.
Shriberg, E., Stolcke A., & Ravuri S. (2013).  Addressee Detection for Dialog Systems Using Temporal and Spectral Dimensions of Speaking Style.
Partridge, C., & Allman M. (2015).  Addressing Ethical Considerations in Network Measurement Papers. Proceedings of ACM SIGCOMM Workshop on Ethics in Networked Systems Research.
Partridge, C., & Allman M. (2016).  Addressing Ethical Considerations in Network Measurement Papers. Communications of the ACM. 59(10), 
Moody, J., Shapere A. D., & Wilczek F. (1989).  Adiabatic Effective Lagrangian.
Jamin, S., Shenker S. J., Zhang L., & Clark D. D. (1992).  An Admission Control Algorithm for Predictive Real-Time Service (Extended Abstract). Proceedings of the Third International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV). 349-356.
Fàbrega, L., Jové T., Bueno A., & Marzo J. L. (2001).  An Admission Control Approach for Elastic Flows in the Internet. Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001).
Liebeherr, J., Wrege D. E., & Ferrari D. (1994).  Admission Control in Networks with Bounded Delay Services.
Goebel, C., Tribowski C., & Günther O. (2009).  Adoption of Cross-Company RFID: An Empirical Analysis of Perceived Influence Factors.
Renals, S., Morgan N., Bourlard H., Cohen M., Franco H., Wooters C., et al. (1991).  Advances in Connectionist Speech Recognition.
Petruck, M. R. L. (2011).  Advances in Frame Semantics. Constructions and Frames. 3(1), 1-8.
Petruck, M. R. L. (2013).  Advances in Frame Semantics. 1-12.
Breslau, L. (1999).  Advances in Network Simulation.
Breslau, L. (2000).  Advances in Network Simulation. IEEE Computer. 59-67.
[Anonymous] (1991).  Advances in Neural Information Processing Systems 3. (Lippmann, R.., Moody J., & Touretzky D.., Ed.).
[Anonymous] (1992).  Advances in Neural Information Processing Systems 4. (Moody, J., Hanson S.., & Lippmann R.., Ed.).
Shastri, L. (1998).  Advances in SHRUTI: A neurally motivated model of relational knowledge representation and rapid inference using temporal synchrony..
Shastri, L. (1999).  Advances in Shruti - A Neurally Motivated Model of Relational Knowledge Representation and Rapid Inference Using Temporal Synchrony. Applied Intelligence. 11(1), 79-108.
Feldman, J. (2011).  Advancing Embodied Theories of Language.
Eddy, W. M., & Allman M. (2000).  Advantages of Parallel Processing and the Effects of Communications Time.
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
Donahue, J., Krahenbuhl P., & Darrell T. (2016).  Adversarial Feature Learning. CoRR. abs/1605.09782,
Hwang, J-J., Ke T-W., Shi J., & Yu S. X. (2019).  Adversarial Structure Matching for Structured Prediction Tasks. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.

Pages