Publications

Found 823 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
Conference Paper
Baswana, S., Biswas S., Doerr B., Friedrich T., Kurur P., & Neumann F. (2009).  Computing Single Source Shortest Paths Using Single-Objective Fitness Functions. 59-66.
Renals, S., Morgan N., Cohen M., Bourlard H., & Franco H. (1992).  Connectionist Probability Estimation in the Decipher Speech Recognition System. Proceedings of the IEEE International Conference on Acoustics, Speech & Signal Processing (ICASSP 1992). I601-I604.
Frik, A., Bernd J., & Alomar N. (2019).  The Contextual Preferences of Older Adults on Information Sharing. Proceeding of the 2nd annual Symposium on Applications of Contextual Integrity.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Bourlard, H., & Morgan N. (1990).  Continuous Speech Recognition Using Multilayer Perceptrons with Hidden Markov Models. Proceedings of the IEEE International Conference of Acoustics, Speech & Signal Processing (ICASSP 1990).
Morgan, N., Hermansky H., Bourlard H., Kohn P., & Wooters C. (1991).  Continuous Speech Recognition Using PLP Analysis with Multilayer Perceptrons. Proceedings of IEEE International Conference on Acoustics, Speech & Signal Processing. 49-52.
Bansal, M., & Klein D. (2012).  Coreference Semantics from Web Features.
Bensel, P., Günther O., Tribowski C., & Vogeler S. (2008).  Cost-Benefit Sharing in Cross-Company RFID Applications.
Sharan, R., Ovcharenko I., Ben-Hur A., & Karp R. M. (2003).  CRÈME: A Framework for Identifying Cis-Regulatory Modules in Human-Mouse Conserved Segments. Proceedings of the Eleventh International Conference on Intelligent Systems for Molecular Biology (ISMB'03). 1283-1291.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Curvature and Optimal Algorithms for Learning and Minimizing Submodular Functions.
Bilmes, J. A. (1998).  Data-Driven Extensions to HMM Statistical Dependencies. Proceedings of the Fifth International Conference on Spoken Language Processing (ICSLP '98). 69-72.
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  DDoS Defense by Offense. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
Barker, J., Cooke M. P., & Ellis D. P. W. (2000).  Decoding Speech in the Presence of Other Sound Sources. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Zaharia, M., Borthakur D., Sarma J. Sen, Elmeleegy K., Shenker S. J., & Stoica I. (2010).  Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling. 265-278.
Beamer, S., Asanović K., Batten C., Joshi A., & Stojanovic V. (2009).  Designing Multi-Socket Systems Using Silicon Photonics. 521-522.
Beamer, S., Asanović K., Batten C., Joshi A., & Stojanovic V. (2009).  Designing Multi-Socket Systems Using Silicon Photonics. 521-522.
McGillivary, P.., Stecca M., Maresca M., & Baglietto P. (2015).  Designing New Arctic Ships to Incorporate Cloud Computing for Improved Information Systems and Vessel Management.
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Ji, G., & Bilmes J. A. (2005).  Dialog Act Tagging Using Graphical Models. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 1, 33-36.
Morgan, N., Wu S-L., & Bourlard H. (1995).  Digit Recognition with Stochastic Perceptual Models. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).
Beamer, S., Asanović K., & Patterson D. (2012).  Direction-Optimizing Breadth-First Search.
Ben-Dor, A., Chor B., Karp R. M., & Yakhini Z. (2002).  Discovering Local Structure in Gene Expression Data: The Order Preserving Submatrix Problem. Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02).

Pages