Ruoming Pang

According to our database1, Ruoming Pang authored at least 32 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Two-Pass End-to-End Speech Recognition.
CoRR, 2019

Monotonic Infinite Lookback Attention for Simultaneous Machine Translation.
CoRR, 2019

Searching for MobileNetV3.
CoRR, 2019

NAS-FPN: Learning Scalable Feature Pyramid Architecture for Object Detection.
CoRR, 2019

Lingvo: a Modular and Scalable Framework for Sequence-to-Sequence Modeling.
CoRR, 2019

Zanzibar: Google's Consistent, Global Authorization System.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

Hierarchical Generative Modeling for Controllable Speech Synthesis.
Proceedings of the 7th International Conference on Learning Representations, 2019

Streaming End-to-end Speech Recognition for Mobile Devices.
Proceedings of the IEEE International Conference on Acoustics, 2019

Semi-supervised Training for End-to-end Models via Weak Distillation.
Proceedings of the IEEE International Conference on Acoustics, 2019

Monotonic Infinite Lookback Attention for Simultaneous Machine Translation.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
Domain Adaptive Transfer Learning with Specialist Models.
CoRR, 2018

Streaming End-to-end Speech Recognition For Mobile Devices.
CoRR, 2018

Hierarchical Generative Modeling for Controllable Speech Synthesis.
CoRR, 2018

MnasNet: Platform-Aware Neural Architecture Search for Mobile.
CoRR, 2018

Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis.
CoRR, 2018

Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Compression of End-to-End Models.
Proceedings of the Interspeech 2018, 2018

Natural TTS Synthesis by Conditioning Wavenet on MEL Spectrogram Predictions.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2017
Natural TTS Synthesis by Conditioning WaveNet on Mel Spectrogram Predictions.
CoRR, 2017

2006
The devil and packet trace anonymization.
Computer Communication Review, 2006

Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

binpac: a yacc for writing application protocol parsers.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2005
Part I: A Theory for Deadlock-Free Dynamic Network Reconfiguration.
IEEE Trans. Parallel Distrib. Syst., 2005

A First Look at Modern Enterprise Traffic.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
The dark side of the Web: an open proxy's view.
Computer Communication Review, 2004

Reliability and Security in the CoDeeN Content Distribution Network.
Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27, 2004

Characteristics of internet background radiation.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2003
Deadlock-Free Dynamic Reconfiguration Schemes for Increased Network Dependability.
IEEE Trans. Parallel Distrib. Syst., 2003

A high-level programming environment for packet trace anonymization and transformation.
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, 2003

2002
Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software.
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002

Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2000
The Double Scheme: Deadlock-Free Dynamic Reconfiguration of Cut-Through Networks.
Proceedings of the 2000 International Conference on Parallel Processing, 2000


  Loading...