Ruoming Pang

According to our database1, Ruoming Pang authored at least 24 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




NAS-FPN: Learning Scalable Feature Pyramid Architecture for Object Detection.
CoRR, 2019

Lingvo: a Modular and Scalable Framework for Sequence-to-Sequence Modeling.
CoRR, 2019

Domain Adaptive Transfer Learning with Specialist Models.
CoRR, 2018

Streaming End-to-end Speech Recognition For Mobile Devices.
CoRR, 2018

Hierarchical Generative Modeling for Controllable Speech Synthesis.
CoRR, 2018

MnasNet: Platform-Aware Neural Architecture Search for Mobile.
CoRR, 2018

Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis.
CoRR, 2018

Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Compression of End-to-End Models.
Proceedings of the Interspeech 2018, 2018

Natural TTS Synthesis by Conditioning Wavenet on MEL Spectrogram Predictions.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Natural TTS Synthesis by Conditioning WaveNet on Mel Spectrogram Predictions.
CoRR, 2017

The devil and packet trace anonymization.
Computer Communication Review, 2006

Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

binpac: a yacc for writing application protocol parsers.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

Part I: A Theory for Deadlock-Free Dynamic Network Reconfiguration.
IEEE Trans. Parallel Distrib. Syst., 2005

A First Look at Modern Enterprise Traffic.
Proceedings of the 5th Internet Measurement Conference, 2005

The dark side of the Web: an open proxy's view.
Computer Communication Review, 2004

Reliability and Security in the CoDeeN Content Distribution Network.
Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27, 2004

Characteristics of internet background radiation.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

Deadlock-Free Dynamic Reconfiguration Schemes for Increased Network Dependability.
IEEE Trans. Parallel Distrib. Syst., 2003

A high-level programming environment for packet trace anonymization and transformation.
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, 2003

Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software.
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002

Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
Proceedings of the Information Hiding, 5th International Workshop, 2002

The Double Scheme: Deadlock-Free Dynamic Reconfiguration of Cut-Through Networks.
Proceedings of the 2000 International Conference on Parallel Processing, 2000