Publications

Found 519 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Fung, J., Hakkani-Tür D., Magimai-Doss M., Shriberg E., Cuendet S., & Mirghafori N. (2007).  Prosodic Features and Feature Selection for Multi-lingual Sentence Segmentation. 2585-2588.
Fukui, A., Park D. Huk, Yang D., Rohrbach A., Darrell T., & Rohrbach M. (2016).  Multimodal Compact Bilinear Pooling for Visual Question Answering and Visual Grounding. CoRR. abs/1606.01847,
Fromherz, T. (1998).  Face Recognition: a Summary of 1995 - 1997.
Frohberg, W. (1996).  Fractal Behavior of Video and Data Traffic.
Frohberg, W., & Ulrich R. (1996).  Reservoir-based ABR Servive in ATM Networks.
Fritzke, B. (1993).  Kohonen Feature Maps and Growing Cell Structures - a Performance Comparison.
Fritzke, B. (1993).  Growing Cell Structures - a Self-Organizing Network for Unsupervised and Supervised Learning.
Fritz, M., Black M., Bradski G., Karayev S., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition.
Fritz, M., Saenko K., & Darrell T. (2010).  Size Matters: Metric Visual Search Constraints from Monocular Metadata. 622-630.
Fritz, M., Andriluka M., Fidler S., Stark M., Leonardis A., & Schiele B. (2010).  Categorial Perception. 131-164.
Fritz, M., & Schiele B. (2009).  Towards Integration of Different Paradigms in Modeling, Representation and Learning of Visual Categories. 324-347.
[Anonymous] (2009).  Proceedings of the 7th International Conference on Computer Vision Systems (ICVS 2009), Liege, Belgium. (Fritz, M., Schiele B., & Piater J.. H., Ed.).
Fritz, M., Kruijff G.-J.., & Schiele B. (2010).  Tutor-Based Learning of Visual Categories Using Different Levels of Supervision. Computer Vision and Image Understanding. 114(5), 564-573.
Fritz, M., & Schiele B. (2008).  Decomposition, Discovery, and Detection of Visual Categories Using Topic Models.
Fritz, M., Black M., Bradski G., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition. 558-566.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Frik, A., Egelman S., Harbach M., Malkin N., & Peer E. (2018).  Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias. Proceedings of WEIS '18.
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2019).
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of CHI '19.
Frik, A., Kim J., Sanchez J. Rafael, & Ma J. (2022).  Users’ Expectations About and Use of Smartphone Privacy and Security Settings. CHI Conference on Human Factors in Computing Systems.
Frik, A., Bernd J., & Alomar N. (2019).  The Contextual Preferences of Older Adults on Information Sharing. Proceeding of the 2nd annual Symposium on Applications of Contextual Integrity.
Frieze, A., Karp R. M., & Reed B. (1992).  When is the Assignment Bound Tight for the Asymmetric Traveling-Salesman Problem?.
Frieze, A., Karp R. M., & Reed B. (1995).  When is the assignment bound tight for the asymmetric traveling-salesman problem?. SIAM Journal on Computing. 24(3), 484-493.
Friedrich, T., & Neumann F. (2010).  When to Use Bit-Wise Neutrality. Natural Computing. 9(1), 283-294.

Pages