Publications

Found 983 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Conference Paper
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Hébert, M., & Mirghafori N. (2004).  Desperately Seeking Impostors: Data-Mining for Competitive Impostor Testing in a Text-Dependent Speaker Verification System. Proceedings of IEEE ICASSP.
McGillivary, P.., Stecca M., Maresca M., & Baglietto P. (2015).  Designing New Arctic Ships to Incorporate Cloud Computing for Improved Information Systems and Vessel Management.
McGillivary, P.., Stecca M., Maresca M., & Baglietto P. (2015).  Designing New Arctic Ships to Incorporate Cloud Computing for Improved Information Systems and Vessel Management.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Girshick, R., Iandola F., Darrell T., & Malik J. (2015).  Deformable Part Models are Convolutional Neural Networks. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 437-446.
McCauley, M., Zhao M., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. (2016).  The Deforestation of L2.
Vinyals, O., & Morgan N. (2013).  Deep vs. Wide: Depth on a Budget for Robust Speech Recognition.
Hendricks, L. Anne, Venugopalan S., Rohrbach M., Mooney R., Saenko K., & Darrell T. (2016).  Deep Compositional Captioning: Describing Novel Object Categories Without Paired Training Data. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1-10.
Alizadeh, M., Yang S., Katti S., McKeown N., Prabhakar B., & Shenker S. J. (2012).  Deconstructing Datacenter Packet Transport. 133-138.
Mushtaq, A., Mittal R., McCauley J., Alizadeh M., Ratnasamy S., & Shenker S. J. (2019).  Datacenter congestion control: identifying what is essential and making it practical. ACM SIGCOMM Computer Communication Review. 49(3), 32-38.
Mushtaq, A., Mittal R., McCauley J., Alizadeh M., Ratnasamy S., & Shenker S. J. (2019).  Datacenter congestion control: identifying what is essential and making it practical. ACM SIGCOMM Computer Communication Review. 49(3), 32-38.
Mushtaq, A., Mittal R., McCauley J., Alizadeh M., Ratnasamy S., & Shenker S. J. (2019).  Datacenter congestion control: identifying what is essential and making it practical. ACM SIGCOMM Computer Communication Review. 49(3), 32-38.
Lei, H., & Mirghafori N. (2011).  Data Selection with Kurtosis and Nasality features for Speaker Recognition. 2753-2756.
Morgan, N. (1994).  Current Research in Acoustically Robust Speech Recognition. Proceedings of American Voice Input/Output Society (AVIOS). 207-214.
Stolcke, A., Grezl F., Hwang M-Y., Lei X., Morgan N., & Vergyri D. (2006).  Cross-Domain and Cross-Language Portability of Acoustic Features Estimated by Multilayer Perceptrons. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 321-324.
Adams, A. K., Mahdavi J., Mathis M., & Paxson V. (1998).  Creating a Scalable Architecture for Internet Measurement. Proceedings of the Internet Summit (INET '98).
Adams, A. K., Mahdavi J., Mathis M., & Paxson V. (1998).  Creating a Scalable Architecture for Internet Measurement. Proceedings of the Internet Summit (INET '98).
Faria, A., & Morgan N. (2008).  Corrected Tandem Features for Acoustic Model Training. 4737-4740.
Morgan, N., Hermansky H., Bourlard H., Kohn P., & Wooters C. (1991).  Continuous Speech Recognition Using PLP Analysis with Multilayer Perceptrons. Proceedings of IEEE International Conference on Acoustics, Speech & Signal Processing. 49-52.
Bourlard, H., & Morgan N. (1990).  Continuous Speech Recognition Using Multilayer Perceptrons with Hidden Markov Models. Proceedings of the IEEE International Conference of Acoustics, Speech & Signal Processing (ICASSP 1990).
Franco, H., Cohen M., Morgan N., Rumelhart D., & Abrash V. (1992).  Context-Dependent Connectionist Probability Estimation in a Hybrid HMM-Neural Net Speech Recognition System. Proceedings of the International Joint Conference on Neural Networks.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Sharan, R., Sutharan S., Kelley R. M., Kuhn T., McCuine S., Sittler T., et al. (2005).  Conserved Patterns of Protein Interaction in Multiple Species. Proceedings of National Academy of Science. 102(6), 1974-1979.
Wooters, C., & Morgan N. (1992).  Connectionist-Based Acoustic Word Models. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 157-163.

Pages