Publications

Found 714 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
Conference Paper
Feldman, J., Feldman C.. M., Falk G., Grape C.., Pearlman J.., Sobel I., et al. (1969).  The Stanford Hand-Eye Project. Proceedings of the First International Joint Conference on Artificial Intelligence (IJCAI). 521-526.
Morgan, N., Bourlard H., Greenberg S., & Hermansky H. (1994).  Stochastic Perceptual Auditory-Event-Based Models for Speech Recognition. Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94). 1943-1946.
Morgan, N., Bourlard H., Greenberg S., Hermansky H., & Wu S-L. (1995).  Stochastic Perceptual Models of Speech. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 95).
Good, N., Grossklags J.., Dhamija R.., & Thaw D. (2005).  Stopping Spyware at the Gate: A User Study of Privacy, Notice, and Spyware. Proceedings of the Symposium On Usable Privacy and Security (SOUPS 2005). 43-52.
Good, N., Grossklags J.., Dhamija R.., & Thaw D. (2005).  Stopping Spyware at the Gate: A User Study of Privacy, Notice, and Spyware. Proceedings of the Symposium On Usable Privacy and Security (SOUPS 2005). 43-52.
Tribowski, C., Spin K., Günther O., & Sielemann O. (2009).  Storing Data on RFID Tags: A Standards-Based Approach.
Friedman, E., Ghodsi A., & Psomas C-A. (2014).  Strategyproof Allocation of Discrete Jobs on Multiple Machines. 529-546.
Razaghpanah, A., Niaki A. Akhavan, Vallina-Rodriguez N., Sundaresan S., Amann J., & Gill P. (2017).  Studying TLS Usage in Android Apps.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1988).  Subtree isomorphism is in random NC. Proceedings of the Third Aegean Workshop on Computing, VLSI Algorithms and Architectures (AWOC 88). 43-52.
Reynolds, D., Andrews W., Campbell J., Navratil J., Peskin B., Adami A., et al. (2003).  The SuperSID Project: Exploiting High-Level Information for High-Accuracy Speaker Recognition. Proceedings of ICASSP-2003.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Shastri, L., Chang S., & Greenberg S. (1999).  Syllable Detection and Segmentation Using Temporal Flow Neural Networks. Proceedings of the International Congress of Phonetic Sciences. 3, 1721-1724.
Ferrer, L., Graciarena M., Zymnis A.., & Shriberg E. (2008).  System Combination Using Auxiliary Information for Speaker Verification. 4853-4856.
Vallina, P.., Feal Á., Gamba J.., Vallina-Rodriguez N., & Anta A.F.. (2019).  Tales From the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. Proceedings of the Internet Measurement Conference. 245-258.
Allman, M., Griner J., & Richard A.. (2000).  TCP Behavior in Networks with Dynamic Propagation Delay. Proceedings of Globecom 2000.
Egelman, S., Bernd J., Friedland G., & Garcia D. D. (2016).  The Teaching Privacy Curriculum. Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE ’16), Memphis, TN. 591-596.
Silipo, R., Greenberg S., & Arai T. (1999).  Temporal Constraints on Speech Intelligibility as Deduced From Exceedingly Sparse Spectral Representations. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Ganapathy, S., Motlicek P., Hermansky H., & Garudadri H. (2008).  Temporal Masking for Bit-Rate Reduction in Audio Codec based on Frequency Domain Linear Prediction. 4781-4784.
Ganapathy, S., Motlicek P., Hermansky H., & Garudadri H. (2008).  Temporal Masking for Bit-Rate Reduction in Audio Codec based on Frequency Domain Linear Prediction. 4781-4784.
Arai, T., & Greenberg S. (1997).  The Temporal Properties of Spoken Japanese Are Similar to Those of English. Proceedings of the Fifth European Conference on Speech Communication and Technology (Eurospeech '97). 2, 1011-1014.
Colmenares, J. A., Eads G., Hofmeyr S., Bird S., Moretó M., Chou D., et al. (2013).  Tessellation: Refactoring the OS around Explicit Resource Containers with Continuous Adaptation.
Chuzhoy, J., Guha S., Halperin E., Khanna S., Kortsarz G., & Naor S.. (2004).  Tight Lower Bounds for the Asymetric k-Center Problem. Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC04).
Gildea, D., & Hofmann T. (1999).  Topic-Based Language Models Using EM. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Urtasun, R., Fleet D. J., Geiger A., Popović J., Darrell T., & Lawrence N. D. (2008).  Topologically-Constrained Latent Variable Models. 1080-1087.
Radoslavov, P., Govindan R., & Estrin D. (2001).  Topology-Informed Internet Replica Placement. Proceedings of the Sixth International Workshop on Web Caching and Content Distribution.

Pages