Search Results
2. Complaint Driven Training Data Debugging for Machine Learning Workflows
3. Computational Models of Argument Structure and Argument Quality for Understanding Misinformation
4. Designing Exploratory Search Systems that Stimulate Memory and Reduce Cognitive Load
5. Designing, Implementing and Programming a Massively Multithreaded Spatial Accelerator Architecture
6. Design Opportunities for Assistive and Social Technologies Situated in Space
7. Interfaces for Personalized Language Learning with Generative Language Models
8. Koopman Constrained Policy Optimization: A Koopman operator theoretic method for differentiable optimal control in robotics
9. Learning Video Representation from Self-supervision
10. New Container Architectures for Mobile, Drone, and Cloud Computing
11. Toward Annotation Efficiency in Biased Learning Settings for Natural Language Processing
12. Toward A Secure Account Recovery: Machine Learning Based User Modeling for protection of Account Recovery in a Managed Environment
13. Using Linguistic Features to Improve Prosody for Text-to-Speech
14. Algorithmic Design for Social Networks: Inequality, Bias, and Diversity
15. Beyond Worst-Case Analysis of Optimization in the Era of Machine Learning
16. Deep Self-Modeling for Robotic Systems
17. Detection, Triage, and Attribution of PII Phishing Sites
18. Efficient Machine Teaching Frameworks for Natural Language Processing
19. Efficient Neural Network Verification Using Branch and Bound
20. Efficient recovery algorithms with restricted access to strings
21. Enabling Structured Navigation of Longform Spoken Dialog with Automatic Summarization
22. Hardware-Software Co-design for Practical Memory Safety
23. Harnessing Simulated Data with Graphs
24. Internet Subscription Plans: Thresholding, Throttling, and Zero-Rating
25. Learning Mobile Manipulation
26. Learning to Edit Code : Towards Building General Purpose Models for Source Code Editing
27. Machine Learning for AI-Augmented Design Space Exploration of Computer Systems
28. Machine Learning for Gravitational-Wave Astronomy: Methods and Applications for High-Dimensional Laser Interferometry Data
29. Multi-Functional Interfaces for Accelerators
30. Multiscaling and Machine Learning Approaches to Physics Simulation
31. Resource-Efficient Methods in Machine Learning
32. Ring-LWE: Enhanced Foundations and Applications
33. Towards Generalist Robots through Visual World Modeling
34. Understanding Motivations Behind Co-Located Stranger Interactions
35. A Computational Perspective of Causal Inference and the Data Fusion Problem
36. A Secure and Formally Verified Commodity Multiprocessor Hypervisor
37. Autogenerative Networks
38. Bespoke Security for Resource Constrained Cyber-Physical Systems
39. Beyond summary statistics: extracting etiological insights from genome-wide association cohorts
40. Bridging the Gap Between People, Mobile Devices, and the Physical World
41. Detect and Repair Errors for DNN-based Software
42. Easy Encryption for Email, Photo, and Other Cloud Services
43. Identifying Speaker State from Multimodal Cues
44. Improving Robotic Manipulation via Reachability, Tactile, and Spatial Awareness
45. Improving Security Through Egalitarian Binary Recompilation
46. Learning Structured Representations for Understanding Visual and Multimedia Data
47. Methods for modeling the dynamics of microbial communities
48. New Primitives for Tackling Graph Problems and Their Applications in Parallel Computing
49. Next Generation Cloud Computing Architectures: Performance and Pricing
50. On Resilience to Computable Tampering
51. Predictive Privacy: Modeling Privacy Harms
52. Salience Estimation and Faithful Generation: Modeling Methods for Text Summarization and Generation
53. Structure and Feedback in Cloud Service API Fuzzing
54. Text Classification: Exploiting the Social Network
55. The Design, Implementation, and Evaluation of Software and Architectural Support for Nested Virtualization on Modern Architectures
56. Unsupervised Morphological Segmentation and Part-of-Speech Tagging for Low-Resource Scenarios
57. Variational Bayesian Methods for Inferring Spatial Statistics and Nonlinear Dynamics
58. XR Development with the Relay and Responder Pattern
59. A Geometric Approach to Dynamical System: Global Analysis for Non-Convex Optimization
60. Content Selection for Effective Counter-Argument Generation
61. Cryptographic approaches to security and optimization in machine learning
62. Effective Randomized Concurrency Testing with Partial Order Methods
63. Identifying and Modeling Code-Switched Language
64. Interactive, Computation Assisted Design Tools
65. Location Data: Perils, Profits, Promise
66. Making Data Storage Efficient in the Era of Cloud Computing
67. Multi-Mobile Computing
68. New Data Protection Abstractions for Emerging Mobile and Big Data Workloads
69. New Methods in Sublinear Computation for High Dimensional Problems
70. Optimizing Query Processing Under Skew
71. Preventing Code Reuse Attacks On Modern Operating Systems
72. Probabilistic Programming for Deep Learning
73. Statistical Machine Learning & Deep Neural Networks Applied to Neural Data Analysis
74. Unsupervised Representation Learning with Correlations
75. Adapting Automatic Summarization to New Sources of Information
76. Attribute-Based Encryption for Boolean Formulas
77. CacheCash: A Cryptocurrency-based Decentralized Content Delivery Network
78. Compiling Irregular Software to Specialized Hardware
79. Cross-Lingual and Low-Resource Sentiment Analysis
80. Cross-Lingual Transfer of Natural Language Processing Systems
81. Deception in Spoken Dialogue: Classification and Individual Differences
82. Design Space Exploration of Accelerators for Warehouse Scale Computing
83. Examining Techniques for Equivalent Access of Web User Interfaces for Blind and Low Vision People
84. Human Motion Anticipation and Recognition from RGB-D
85. Leveraging Text-to-Scene Generation for Language Elicitation and Documentation
86. Machine Learning Based User Modeling for Enterprise Security and Privacy Risk Mitigation
87. Multi-Scale Models to Simulate Interactions between Liquid and Thin Structures
88. Physical Plan Instrumentation in Databases: Mechanisms and Applications
89. Repurposing Software Defenses with Specialized Hardware
90. Scalable Emulation of Heterogeneous Systems
91. Security, Privacy, and Transparency Guarantees for Machine Learning Systems
92. Symbolic Model Learning: New Algorithms and Applications
93. Testing Convexity and Acyclicity, and New Constructions for Dense Graph Embeddings
94. Text-to-Speech Synthesis Using Found Data for Low-Resource Languages
95. The Digital Millennium Copyright Act and the First Amendment: Section 1201’s Disruptive Effects on the Fair Use Doctrine
96. Transparently Improving Quality of Service of Modern Applications
97. Analytical Query Execution Optimized for all Layers of Modern Hardware
98. Combining Programs to Enhance Security Software
99. Compiler-assisted Adaptive Software Testing
100. Design and performance optimization of asynchronous networks-on-chip
- « Previous
- Next »
- 1
- 2
- 3