Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Petruck, M. R. L. (2009).  Typological Considerations in Constructing a Hebrew FrameNet. 183-205.
Gomes, B., Stoutamire D., & Weissman B. (1997).  Type-Safety and Overloading in Sather.
Shastri, L. (2000).  Types and Quantifiers in Shruti --- a connectionist model of rapid reasoning and relational processing.
Boakye, K., Vinyals O., & Friedland G. (2008).  Two's a Crowd: Improving Speaker Diarization by Automatically Identifying and Excluding Overlapped Speech Authors. Proceedings of the Annual Conference of the International Speech Communication Association (Interspeech 2008). 32-35.
Song, X., Babu N., Rave W., Majhi S., & Fettweis G. (2016).  Two-Level Spatial Multiplexing using Hybrid Beamforming Antenna Arrays for mmWave Communications. CoRR. abs/1607.08737,
Karp, R. M., & Li S-Y. R. (1975).  Two Special Cases of the Assignment Problem. Discrete Mathematics (Netherlands). 13(2), 129-142.
Irani, S. (1990).  Two Results on the List Update Problem.
Kitzelmann, E. (2011).  Two New Operators for IGOR2 to Increase Synthesis Efficiency. 49-61.
Shenker, S. J., & Breslau L. (1995).  Two Issues in Reservation Establishment. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95). 14-26.
Karbasi, M., Abdelaziz A. Hussen, & Kolossa D. (2016).  Twin-HMM-based Non-intrusive Speech Intelligibility Prediction. Proceedings of ICASSP.
de Melo, G., & Hose K. (2013).  Tutorial: Searching the Web of Data.
Fritz, M., Kruijff G.-J.., & Schiele B. (2010).  Tutor-Based Learning of Visual Categories Using Different Levels of Supervision. Computer Vision and Image Understanding. 114(5), 564-573.
Tsai, L., Wijesekera P., Reardon J., Reyes I., Chen J-W., Good N., et al. (2017).  TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences. Proceedings of SOUPS '17.
Hertzberg, J., & Thiébaux S. (1993).  Turning an Action Formalism Into a Planner–A Case Study.
Imseng, D., & Friedland G. (2010).  Tuning-Robust Initialization Methods for Speaker Diarization. IEEE Transactions on Audio. 18(8), 2028-2037.
Althaus, E., & Mehlhorn K. (2000).  TSP-Based Curve Reconstruction in Polynomial Time. Proceedings of the Eleventh Symposium on Discrete Algorithms. 686-695.
Althaus, E., & Mehlhorn K. (2001).  TSP-Based Curve Reconstruction in Polynomial Time. 31(1), 
Murali, A., Garg A., Krishnan S., Pokory F. T., Abbeel P., Darrell T., et al. (2016).  TSC-DL: Unsupervised trajectory segmentation of multi-modal surgical demonstrations with Deep Learning. IEEE International Conference on Robotics and Automation (ICRA). 4150-4157.
Yao, Z.., Gholami A.., Xu P.., Keutzer K.., & Mahoney M. (2019).  Trust Region Based Adversarial Attack on Neural Networks. Proceedings of the 32nd CVPR Conference. 11350-11359.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Levis, P., Patel N., Culler D. E., & Shenker S. J. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
ulo, O. Č., & Hansen-Schirra S. (2012).  Treebanks in translation studies - the (CroCo) Dependency Treebank.

Pages