Search Results
2. VastMM-Tag: Semantic Indexing and Browsing of Videos for E-Learning
3. Variational Bayesian Methods for Inferring Spatial Statistics and Nonlinear Dynamics
4. Utilizing Runtime Information for Accurate Root Cause Identification in Performance Diagnosis
5. Using Machine Learning to improve Internet Privacy
6. Using Linguistic Features to Improve Prosody for Text-to-Speech
7. User Interfaces for Patient-Centered Communication of Health Status and Care Progress
8. Unsupervised Representation Learning with Correlations
9. Unsupervised Morphological Segmentation and Part-of-Speech Tagging for Low-Resource Scenarios
10. Unmediated Interaction: Communicating with Computers and Embedded Devices as If They Are Not There
11. Understanding Flaws in the Deployment and Implementation of Web Encryption
12. Uncovering Features in Behaviorally Similar Programs
13. Unconditional Lower Bounds in Complexity Theory
14. Transparently Improving Quality of Service of Modern Applications
15. Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication
16. Tradeoffs and Limits in Computational Imaging
17. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings
18. Towards Trouble-Free Networks for End Users
19. Towards Self-Managing Networked Cyber-Physical Systems
20. Towards Generalist Robots through Visual World Modeling
21. Towards Effective Masquerade Attack Detection
22. Towards Causal Reinforcement Learning
23. Towards a Common System Architecture for Dynamically Deploying Network Services in Routers and End Hosts
24. Toward A Secure Account Recovery: Machine Learning Based User Modeling for protection of Account Recovery in a Managed Environment
25. Toward a Robust and Universal Crowd Labeling Framework
26. Toward Annotation Efficiency in Biased Learning Settings for Natural Language Processing
27. THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
28. The Design, Implementation, and Evaluation of Software and Architectural Support for Nested Virtualization on Modern Architectures
29. The Design, Implementation, and Evaluation of Software and Architectural Support for ARM Virtualization
30. The Cost of Sharing Information in a Social World
31. Text-to-Speech Synthesis Using Found Data for Low-Resource Languages
32. Text Classification: Exploiting the Social Network
33. Testing Convexity and Acyclicity, and New Constructions for Dense Graph Embeddings
34. Techniques for Efficient and Effective Mobile Testing
35. Synthesis, Editing, and Rendering of Multiscale Textures
36. Symbolic Model Learning: New Algorithms and Applications
37. Surface-Only Simulation of Fluids
38. Supporting Multi-User Interaction in Co-Located and Remote Augmented Reality by Improving Reference Performance and Decreasing Physical Interference
39. Supervised Design-Space Exploration
40. Structure Preserving and Scalable Simulation of Colliding Systems
41. Structure and Feedback in Cloud Service API Fuzzing
42. Statistical Machine Learning & Deep Neural Networks Applied to Neural Data Analysis
43. Stable Multithreading: A New Paradigm for Reliable and Secure Threads
44. Stable and Semantic Robotic Grasping Using Tactile Feedback
45. Spectral Methods for Natural Language Processing
46. Sound and Precise Analysis of Multithreaded Programs through Schedule Specialization and Execution Filters
47. Some Aspects of Noncommutativity in Polynomial Optimization
48. Social Power in Interactions: Computational Analysis and Detection of Power Relations
49. Social Network Extraction from Text
50. Social Addictive Gameful Engineering (SAGE): A Game-based Learning and Assessment System for Computational Thinking
51. Simulation Based Testing for Autonomous Driving Systems
52. "Seeing Red" or "Tickled Pink"? Investigating the Power of Language and Vision Models through Color, Emotion, and Metaphor
53. Security, Privacy, and Transparency Guarantees for Machine Learning Systems
54. Security Policy Definition and Enforcement in Distributed Systems
55. Security Engineering of Hardware-Software Interfaces
56. Secure Computation Towards Practical Applications
57. Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?
58. Scaling up VoIP: Transport Protocols and Controlling Unwanted Communication Requests
59. Scalable System-on-Chip Design
60. Scalable Emulation of Heterogeneous Systems
61. Sandboxed, Online Debugging of Production Bugs for SOA Systems
62. Salience Estimation and Faithful Generation: Modeling Methods for Text Summarization and Generation
63. Robust Machine Learning by Integrating Context
64. Ring-LWE: Enhanced Foundations and Applications
65. Resource-Efficient Methods in Machine Learning
66. Repurposing Software Defenses with Specialized Hardware
67. Reducing Third Parties in the Network through Client-Side Intelligence
68. Record and vPlay: Problem Determination with Virtual Replay Across Heterogeneous Systems
69. Recognition and Manipulation of Deformable Objects Using Predictive Thin Shell Modeling
70. Ranking for Scalable Information Extraction
71. Quantum Algorithms for Scientific Computing and Approximate Optimization
72. Quantum Algorithms and Complexity for Numerical Problems
73. Quantifying recent variation and relatedness in human populations
74. Protecting Commodity Operating Systems through Strong Kernel Isolation
75. Property Testing of Boolean Function
76. Property Testing and Probability Distributions: New Techniques, New Models, and New Goals
77. Producing Trustworthy Hardware Using Untrusted Components, Personnel and Resources
78. Probabilistic Programming for Deep Learning
79. Private, Distributed, and Scalable Content Providers
80. Preventing Code Reuse Attacks On Modern Operating Systems
81. Population Genetics of Identity By Descent
82. Point Spread Function Engineering for Scene Recovery
83. Pivot-based Statistical Machine Translation for Morphologically Rich Languages
84. Physical Plan Instrumentation in Databases: Mechanisms and Applications
85. Perspective Identification in Informal Text
86. Personalized Navigation Instruments for Map User Interfaces
87. Pattern Mining and Concept Discovery for Multimodal Content Analysis
88. Painting Pictures with Words - From Theory to System
89. Overcoming the Intuition Wall: Measurement and Analysis in Computer Architecture
90. Optimizing Query Processing Under Skew
91. On the isomorphism testing of graphs
92. On the Complexity of Market Equilibria and Revenue Maximization
93. On SIP Server Clusters and the Migration to Cloud Computing Platforms
94. On Resilience to Computable Tampering
95. On Multicast in Asynchronous Networks-on-Chip: Techniques, Architectures, and FPGA Implementation
96. On Efficiency and Accuracy of Data Flow Tracking Systems
97. On Black-Box Complexity and Adaptive, Universal Composability of Cryptographic Tasks
98. Object Part Localization Using Exemplar-based Models
99. Next Generation Emergency Call System with Enhanced Indoor Positioning
100. Next Generation Cloud Computing Architectures: Performance and Pricing
- « Previous
- Next »
- 1
- 2
- 3