Publications

Found 983 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Conference Paper
Thompson, C.., Levy R.., & Manning C.. (2003).  A Generative Model for Semantic Role Labeling. Proceedings of the 14th European Conference on Machine Learning (ECML 2006). 397-408.
Knox, M. Tai, Morgan N., & Mirghafori N. (2008).  Getting the Last Laugh: Automatic Laughter Segmentation in Meetings. 797-800.
Knox, M. Tai, Morgan N., & Mirghafori N. (2008).  Getting the Last Laugh: Automatic Laughter Segmentation in Meetings. 797-800.
Kylasa, S.. B., Roosta-Khorasani F.., Mahoney M., & Grama A.. (2019).  GPU Accelerated Sub-Sampled Newton's Method. Proceedings of the 2019 SDM Conference. 702-710.
Maas, M., Reames P., Morlan J., Asanović K., Joseph A. D., & Kubiatowicz J. D. (2012).  GPUs: An Opportunity for Offloading Garbage Collection.
Maas, M., Reames P., Morlan J., Asanović K., Joseph A. D., & Kubiatowicz J. D. (2012).  GPUs: An Opportunity for Offloading Garbage Collection.
Ferrandez, O.., Ellsworth M., Muñoz R., & Baker C. F. (2010).  A Graph-Based Measure of FrameNet-WordNet Alignment. Proceedings of the Second International Conference on Global Interoperability for Language Resources (ICGL 2010).
Chang, N., & Maia T.. (2001).  Grounded learning of grammatical constructions. Proceedings of the Association for the Advancement of Artificial Intelligence 2001 Spring Symposium on Learning Grounded Representations.
Freedman, M. J., Stoica I., Mazieres D.., & Shenker S. J. (2006).  Group Therapy for Systems: Using link attestations to manage failures. Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006).
Cook, H., Moretó M., Bird S., Dao K., Patterson D., & Asanović K. (2013).  A Hardware Evaluation of Cache Partitioning to Improve Utilization and Energy-Efficiency while Preserving Responsiveness.
Dong, Z.., Yao Z.., Gholami A.., Mahoney M., & Keutzer K.. (2019).  HAWQ: Hessian AWare Quantization of Neural Networks with Mixed-Precision. Proceedings of ICCV 2019.
Yao, Z., Dong Z., Zheng Z., Gholami A., Yu J., Tan E., et al. (2021).  HAWQV3: Dyadic Neural Network Quantization.
Martin, C.. H., & Mahoney M. (2020).  Heavy-Tailed Universality Predicts Trends in Test Accuracies for Very Large Pre-Trained Deep Neural Networks. Proceedings of 2020 SDM Conference.
Martin, C.. H., & Mahoney M. (2020).  Heavy-Tailed Universality Predicts Trends in Test Accuracies for Very Large Pre-Trained Deep Neural Networks. Proceedings of 2020 SDM Conference.
Yao, Z.., Gholami A.., Lei Q.., Keutzer K.., & Mahoney M. (2018).  Hessian-based Analysis of Large Batch Training and Robustness to Adversaries. Proceedings of the 2018 NeurIPS Conference. 4954-4964.
Valente, F., Magimai-Doss M., Plahl C., & Ravuri S. (2009).  Hierarchical Processing of the Modulation Spectrum for GALE Mandarin LVCSR System. 2963-2966.
Maire, M., Yu S. X., & Perona P. (2013).  Hierarchical Scene Annotation.
Ziekow, H., Fabian B., & Müller C. (2009).  High-Speed Access to RFID Data: Meeting Real-Time Requirements in Distributed Value Chains. 142-151.
Gelbart, D., Morgan N., & Tsymbal A.. (2009).  Hill-Climbing Feature Selection for Multi-Stream ASR. 2967-2970.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next-Generation Interdomain Routing Protocol. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 13-24.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. J. (2007).  Holding the Internet Accountable. 1-7.
Meyer, B. T., Spille C., Kollmeier B., & Morgan N. (2012).  Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition.
Meyer, B. T., Spille C., Kollmeier B., & Morgan N. (2012).  Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition.
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
Huang, P-S., Mertens R., Divakaran A., Friedland G., & Hasegawa-Johnson M. (2012).  How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection. 505-508.

Pages