default search action
James B. Wendt
Person information
- affiliation: Google, Mountain View, CA, USA
- affiliation: University of California, Los Angeles, Department of Computer Science, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Eunjeong Hwang, Yichao Zhou, James B. Wendt, Beliz Gunel, Nguyen Vo, Jing Xie, Sandeep Tata:
Enhancing Incremental Summarization with Structured Representations. EMNLP (Findings) 2024: 3830-3842 - [c25]Jing Xie, James B. Wendt, Yichao Zhou, Seth Ebner, Sandeep Tata:
FieldSwap: Data Augmentation for Effective Form-Like Document Extraction. ICDE 2024: 4722-4732 - [i7]Beliz Gunel, James B. Wendt, Jing Xie, Yichao Zhou, Nguyen Vo, Zachary Fisher, Sandeep Tata:
STRUM-LLM: Attributed and Structured Contrastive Summarization. CoRR abs/2403.19710 (2024) - [i6]Eunjeong Hwang, Yichao Zhou, Beliz Gunel, James Bradley Wendt, Sandeep Tata:
SUMIE: A Synthetic Benchmark for Incremental Entity Summarization. CoRR abs/2406.05079 (2024) - [i5]Eunjeong Hwang, Yichao Zhou, James Bradley Wendt, Beliz Gunel, Nguyen Vo, Jing Xie, Sandeep Tata:
Enhancing Incremental Summarization with Structured Representations. CoRR abs/2407.15021 (2024) - 2023
- [c24]Yichao Zhou, James B. Wendt, Navneet Potti, Jing Xie, Sandeep Tata:
Selective Labeling: How to Radically Lower Data-Labeling Costs for Document Extraction Models. EMNLP 2023: 3847-3860 - 2022
- [i4]Beliz Gunel, Navneet Potti, Sandeep Tata, James B. Wendt, Marc Najork, Jing Xie:
Data-Efficient Information Extraction from Form-Like Documents. CoRR abs/2201.02647 (2022) - [i3]Yichao Zhou, James B. Wendt, Navneet Potti, Jing Xie, Sandeep Tata:
Radically Lower Data-Labeling Costs for Visually Rich Document Extraction Models. CoRR abs/2210.16391 (2022) - [i2]Jing Xie, James B. Wendt, Yichao Zhou, Seth Ebner, Sandeep Tata:
An Augmentation Strategy for Visually Rich Documents. CoRR abs/2212.10047 (2022) - 2021
- [j3]Sandeep Tata, Navneet Potti, James B. Wendt, Lauro Beltrão Costa, Marc Najork, Beliz Gunel:
Glean: Structured Extractions from Templatic Documents. Proc. VLDB Endow. 14(6): 997-1005 (2021) - 2020
- [c23]Bodhisattwa Prasad Majumder, Navneet Potti, Sandeep Tata, James Bradley Wendt, Qi Zhao, Marc Najork:
Representation Learning for Information Extraction from Form-like Documents. ACL 2020: 6495-6504 - [c22]Ying Sheng, Nguyen Vo, James B. Wendt, Sandeep Tata, Marc Najork:
Migrating a Privacy-Safe Information Extraction System to a Software 2.0 Design. CIDR 2020
2010 – 2019
- 2019
- [j2]Michael J. Whittaker, Nick Edmonds, Sandeep Tata, James B. Wendt, Marc Najork:
Online Template Induction for Machine-Generated Emails. Proc. VLDB Endow. 12(11): 1235-1248 (2019) - [c21]Furkan Kocayusufoglu, Ying Sheng, Nguyen Vo, James B. Wendt, Qi Zhao, Sandeep Tata, Marc Najork:
RiSER: Learning Better Representations for Richly Structured Emails. WWW 2019: 886-895 - 2018
- [c20]Yu Sun, Lluis Garcia Pueyo, James B. Wendt, Marc Najork, Andrei Z. Broder:
Learning Effective Embeddings for Machine Generated Emails with Applications to Email Category Prediction. IEEE BigData 2018: 1846-1855 - [c19]Ying Sheng, Sandeep Tata, James B. Wendt, Jing Xie, Qi Zhao, Marc Najork:
Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email. KDD 2018: 734-743 - [c18]Navneet Potti, James B. Wendt, Qi Zhao, Sandeep Tata, Marc Najork:
Hidden in Plain Sight: Classifying Emails Using Embedded Image Contents. WWW 2018: 1865-1874 - 2017
- [c17]Aston Zhang, Lluis Garcia Pueyo, James B. Wendt, Marc Najork, Andrei Z. Broder:
Email Category Prediction. WWW (Companion Volume) 2017: 495-503 - [c16]Julia Proskurnia, Marc-Allen Cartright, Lluis Garcia Pueyo, Ivo Krka, James B. Wendt, Tobias Kaufmann, Balint Miklos:
Template Induction over Unstructured Email Corpora. WWW 2017: 1521-1530 - 2016
- [c15]James B. Wendt, Michael Bendersky, Lluis Garcia Pueyo, Vanja Josifovski, Balint Miklos, Ivo Krka, Amitabh Saikia, Jie Yang, Marc-Allen Cartright, Sujith Ravi:
Hierarchical Label Propagation and Discovery for Machine Generated Email. WSDM 2016: 317-326 - 2015
- [b1]James Bradley Wendt:
Hardware Design Techniques for Securing and Synthesizing Resource-Constrained IoT Systems. University of California, Los Angeles, USA, 2015 - [j1]Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan R. McDonald, Garrett S. Rose, Bryant T. Wysocki:
Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications. Proc. IEEE 103(5): 829-849 (2015) - [c14]James B. Wendt, Nathaniel A. Conos, Miodrag Potkonjak:
Multiple constant multiplication implementations in near-threshold computing systems. ICASSP 2015: 1071-1075 - [c13]Jia Guo, James B. Wendt, Miodrag Potkonjak:
Learning-Based Localized Offloading with Resource-Constrained Data Centers. ICCAC 2015: 212-215 - 2014
- [c12]Teng Xu, James B. Wendt, Miodrag Potkonjak:
Secure remote sensing and communication using digital pufs. ANCS 2014: 173-184 - [c11]Sheng Wei, James B. Wendt, Ani Nahapetian, Miodrag Potkonjak:
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels. DAC 2014: 90:1-90:6 - [c10]James B. Wendt, Farinaz Koushanfar, Miodrag Potkonjak:
Techniques for Foundry Identification. DAC 2014: 208:1-208:6 - [c9]Masoud Rostami, James B. Wendt, Miodrag Potkonjak, Farinaz Koushanfar:
Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security. DATE 2014: 1-6 - [c8]James B. Wendt, Miodrag Potkonjak:
Hardware obfuscation using PUF-based logic. ICCAD 2014: 270-277 - [c7]Teng Xu, James B. Wendt, Miodrag Potkonjak:
Security of IoT systems: design challenges and opportunities. ICCAD 2014: 417-423 - [c6]Teng Xu, James B. Wendt, Miodrag Potkonjak:
Matched Digital PUFs for Low Power Security in Implantable Medical Devices. ICHI 2014: 33-38 - [c5]Vishwa Goudar, James B. Wendt, Miodrag Potkonjak, Zhi Ren, Paul Brochu, Qibing Pei:
Leveraging human gait characteristics towards self-sustained operation of low-power mobile devices. WF-IoT 2014: 468-473 - 2013
- [c4]James B. Wendt, Miodrag Potkonjak:
The bidirectional polyomino partitioned PPUF as a hardware security primitive. GlobalSIP 2013: 257-260 - [c3]Teng Xu, James B. Wendt, Miodrag Potkonjak:
Digital bimodal function: An ultra-low energy security primitive. ISLPED 2013: 292-296 - 2012
- [c2]James B. Wendt, Saro Meguerdichian, Hyduke Noshadi, Miodrag Potkonjak:
Energy and Cost Reduction in Localized Multisensory Systems through Application-Driven Compression. DCC 2012: 411 - [c1]James B. Wendt, Saro Meguerdichian, Hyduke Noshadi, Miodrag Potkonjak:
Semantics-driven sensor configuration for energy reduction in medical sensor networks. ISLPED 2012: 303-308 - [i1]Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan R. McDonald, Garrett S. Rose, Bryant T. Wysocki:
Nanoelectronic Solutions for Hardware Security. IACR Cryptol. ePrint Arch. 2012: 575 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint