Publications

Found 315 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Friedland, G., & Rojas R. (2008).  Anthropocentric Video Segmentation for Lecture Webcasts. EURASIP Journal on Image and Video Processing. 8(2), 
Ferrer, L., Sönmez K., & Shriberg E. (2009).  An Anticorrelation Kernel for Subsystem Training in Multiple Classifier Systems. Journal of Machine Learning Research. 10, 2079-2114.
Gleich, D., & Mahoney M. (2014).  Anti-Differentiating Approximation Algorithms: A Case Study with Min-Cuts, Spectral, and Flow.
Kushilevitz, E., Micali S., & Ostrovsky R. (1993).  Any Non-Private Boolean Function Is Complete For Private Multi-Party Computations.
Boakye, K., Favre B., & Hakkani-Tür D. (2009).  Any Questions? Automatic Question Detection in Meetings. 485-489.
Karayev, S., Fritz M., & Darrell T. (2014).  Anytime Recognition of Objects and Scenes.
Zaharia, M., Xin R. S., Wendell P., Das T., Armbrust M., Dave A., et al. (2016).  Apache Spark: a unified engine for big data processing. Communications of the ACM. 59(11), 56-65.
Feldman, J. (1990).  Apparent Motion and Other Mysteries. 479-486.
Weaver, N. (2020).  Apple vs FBI: Pensacola Isn’t San Bernardino. Lawfare.
Mertens, R., Huang P-S., Gottlieb L., Friedland G., & Divakaran A. (2011).  On the Applicability of Speaker Diarization to Audio Concept Detection for Multimedia Retrieval. 446-451.
Kaiser, M. (1993).  An Application of a Neural Net for Fuzzy Abductive Reasoning.
Fernández-Iglesias, M. J., González-Castaño F. J., Llamas-Nistal M., Pousada-Carballo J. M., & Vales-Alonso J. (2002).  On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile Terminals. Journal of Systems and Software. 60(1), 49-56.
Haban, D., & Shin K. G. (1989).  Application of Real-Time Monitoring to Scheduling Tasks with Random.
Liu, X., Meneghin M., & Shapiro V. (2021).  An application programming interface for multiscale shape-material modeling. Advances in Engineering Software. 161,
Eppe, M., Trott S., Raghuram V., Feldman J., & Janin A. (2016).  Application-Independent and Integration-Friendly Natural Language Understanding. Proceedings of Global Conference on Artificial Intelligence (GCAI 2016), EPiC Series in Computing.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. J. (2001).  Application-Level Multicast Using Content-Addressable Networks. 2233, 14-29.
Lei, H. (2007).  Applications of Keyword-Constraining in Speaker Recognition.
Hirsch, M. D. (1990).  Applications of Topology to Lower Bound Estimates in Computer Science.
Botia, J., Valdes M.., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions. Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy. 467-470.
Ma, K. W. (1995).  Applying Large Vocabulary Hybrid HMM-MLP Methods to Telephone Recognition of Digits and Natural Numbers.
Tavakoli, A., Casado M., Koponen T., & Shenker S. J. (2009).  Applying NOX to the Datacenter.
Hößler, T., Scheuvens L., Franchi N., Simsek M., & Fettweis G. (2017).  Applying Reliability Theory for Future Wireless Communication Networks. Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
Feldman, J., Ballard D. Harry, & Brown C. M. (1977).  An Approach to Knowledge-Directed Image Analysis.
Feldman, J., Ballard D. Harry, & Brown C. M. (1977).  An Approach to Knowledge-Directed Image Analysis.
Feldman, J., Ballard D. Harry, & Brown C. M. (1978).  An Approach to Knowledge-Directed Image Analysis.

Pages