421![IBM Research TRECVID-2008 Video Retrieval System Apostol Natsev∗, Wei Jiang†, Michele Merler†, John R. Smith∗, Jelena Teˇsi´c∗, Lexing Xie∗, Rong Yan∗ Abstract In this paper, we describe the IBM Research IBM Research TRECVID-2008 Video Retrieval System Apostol Natsev∗, Wei Jiang†, Michele Merler†, John R. Smith∗, Jelena Teˇsi´c∗, Lexing Xie∗, Rong Yan∗ Abstract In this paper, we describe the IBM Research](https://www.pdfsearch.io/img/82be3d18cd8556847edacfb2cb98a3b6.jpg) | Add to Reading ListSource URL: www-nlpir.nist.govLanguage: English - Date: 2008-12-03 08:53:54
|
---|
422![IMPACT OF SINGLE-MICROPHONE DEREVERBERATION ON DNN-BASED MEETING TRANSCRIPTION SYSTEMS Takuya Yoshioka†,‡ , Xie Chen† , Mark J. F. Gales† †Cambridge University Engineering Department, Cambridge, UK ‡NTT Commu IMPACT OF SINGLE-MICROPHONE DEREVERBERATION ON DNN-BASED MEETING TRANSCRIPTION SYSTEMS Takuya Yoshioka†,‡ , Xie Chen† , Mark J. F. Gales† †Cambridge University Engineering Department, Cambridge, UK ‡NTT Commu](https://www.pdfsearch.io/img/b524288f0338989a9938131a48cf60f2.jpg) | Add to Reading ListSource URL: mi.eng.cam.ac.ukLanguage: English - Date: 2014-03-11 09:25:13
|
---|
423![Noname manuscript No. (will be inserted by the editor) One-Round Deniable Key Exchange with Perfect Forward Security Weiqiang Wen · Libin Wang · Min Xie Noname manuscript No. (will be inserted by the editor) One-Round Deniable Key Exchange with Perfect Forward Security Weiqiang Wen · Libin Wang · Min Xie](https://www.pdfsearch.io/img/921c4fe15d213acd2495000416a140ea.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-08-25 04:54:02
|
---|
424![IBM Research TRECVID-2007 Video Retrieval System Murray Campbell∗, Alexander Haubold†, Ming Liu‡, Apostol (Paul) Natsev∗, John R. Smith∗, Jelena Teˇsi´c∗, Lexing Xie∗, Rong Yan∗, Jun Yang§ Abstract In IBM Research TRECVID-2007 Video Retrieval System Murray Campbell∗, Alexander Haubold†, Ming Liu‡, Apostol (Paul) Natsev∗, John R. Smith∗, Jelena Teˇsi´c∗, Lexing Xie∗, Rong Yan∗, Jun Yang§ Abstract In](https://www.pdfsearch.io/img/43ff4e02e9e30f63fbc76078ef96a58f.jpg) | Add to Reading ListSource URL: www-nlpir.nist.govLanguage: English - Date: 2007-11-28 11:17:04
|
---|
425![BJTU TRECVID 2007 Video Search Shikui Wei, Yao Zhao, Zhenfeng Zhu, Nan Liu , Yufeng Zhao, Fang Wang, Xie Lin Institute of Information Science, Beijing Jiaotong University, Beijing, 100044, China E-mail: [removed] BJTU TRECVID 2007 Video Search Shikui Wei, Yao Zhao, Zhenfeng Zhu, Nan Liu , Yufeng Zhao, Fang Wang, Xie Lin Institute of Information Science, Beijing Jiaotong University, Beijing, 100044, China E-mail: [removed]](https://www.pdfsearch.io/img/6c1ca740beddec87361270a37d0d8b05.jpg) | Add to Reading ListSource URL: www-nlpir.nist.govLanguage: English - Date: 2007-11-28 11:17:10
|
---|
426![PAUL BLAINEY is a core member at the Broad Institute of MIT and Harvard and an assistant professor in the Department of Biological Engineering at MIT. An expert in microfluidic systems for studies of individual molecules PAUL BLAINEY is a core member at the Broad Institute of MIT and Harvard and an assistant professor in the Department of Biological Engineering at MIT. An expert in microfluidic systems for studies of individual molecules](https://www.pdfsearch.io/img/c17f1e2decaf4fc98e6757d37ff198b6.jpg) | Add to Reading ListSource URL: www.broadinstitute.orgLanguage: English - Date: 2013-01-07 16:43:28
|
---|
427![Pipelined Back-Propagation for Context-Dependent Deep Neural Networks Xie Chen1,3 , Adam Eversole2 , Gang Li1 , Dong Yu2 , and Frank Seide1 1 Microsoft Research Asia, Beijing, P.R.C. 2 Pipelined Back-Propagation for Context-Dependent Deep Neural Networks Xie Chen1,3 , Adam Eversole2 , Gang Li1 , Dong Yu2 , and Frank Seide1 1 Microsoft Research Asia, Beijing, P.R.C. 2](https://www.pdfsearch.io/img/904e2aaeecea79911dc79a3524e339d4.jpg) | Add to Reading ListSource URL: mi.eng.cam.ac.ukLanguage: English - Date: 2013-07-09 06:18:12
|
---|
428![HMMs for Optimal Detection of Cybernet Attacks Justin Grana David Wolpert Joshua Neil Dongping Xie HMMs for Optimal Detection of Cybernet Attacks Justin Grana David Wolpert Joshua Neil Dongping Xie](https://www.pdfsearch.io/img/f6d4f20ae5bef204de6bbe7cafef1511.jpg) | Add to Reading ListSource URL: www.santafe.eduLanguage: English - Date: 2014-06-26 15:35:33
|
---|
429![Statistics Canada – Catalogue no[removed]XIE, Vol. 25, no. 3 Canada’s Shelters for Abused Women, [removed]by Andrea Taylor-Butts Highlights Statistics Canada – Catalogue no[removed]XIE, Vol. 25, no. 3 Canada’s Shelters for Abused Women, [removed]by Andrea Taylor-Butts Highlights](https://www.pdfsearch.io/img/1acfd881beca30edca218b7efc818835.jpg) | Add to Reading ListSource URL: publications.gc.caLanguage: English - Date: 2005-06-15 09:03:54
|
---|
430![Package ‘R2SWF’ July 2, 2014 Version 0.8 Title Convert R Graphics to Flash Animations Date[removed]Author Yixuan Qiu, Yihui Xie, Cameron Bracken and authors of included Package ‘R2SWF’ July 2, 2014 Version 0.8 Title Convert R Graphics to Flash Animations Date[removed]Author Yixuan Qiu, Yihui Xie, Cameron Bracken and authors of included](https://www.pdfsearch.io/img/e23470518c9139850cbd30d5d7e4761f.jpg) | Add to Reading ListSource URL: cran.r-project.orgLanguage: English - Date: 2014-07-02 10:15:40
|
---|