Publications

Found 26 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is I  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Fast Semidifferential-based Submodular Function Optimization. 28(3), 855-863.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Curvature and Optimal Algorithms for Learning and Minimizing Submodular Functions.
Iyer, A. Pamanabha, Panda A., Chowdhury M., Akella A., Shenker S. J., & Stoica I. (2018).  Monarch: Gaining Command on Geo-Distributed Graph Analytics.. Proceedings of HotCloud 2018.
Iyer, A. Padmanabha, Panda A., Venkataraman S., Chowdhury M., Akella A., Shenker S. J., et al. (2018).  Bridging the GAP: towards approximate graph analytics. Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
Ivantysynova, L., Klafft M., Ziekow H., Günther O., & Kara S. (2009).  RFID in Manufacturing: The Investment Decision.
Ishac, J., & Allman M. (2001).  On the Performance of TCP Spoofing in Satellite Networks.
Isenburg, M. (1996).  Transmission of Multimedia Data Over Lossy Networks (Thesis).
Irani, S. (1990).  Two Results on the List Update Problem.
Irani, S. (1992).  Competitive On-line Algorithms for Paging and Graph Coloring.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
Imseng, D., & Friedland G. (2009).  Robust Speaker Diarization for Short Speech Recordings. 432-437.
Imseng, D., & Friedland G. (2010).  An Adaptive Initialization Method for Speaker Diarization Based on Prosodic Features. 4946-4949.
Imseng, D., & Friedland G. (2010).  Tuning-Robust Initialization Methods for Speaker Diarization. IEEE Transactions on Audio. 18(8), 2028-2037.
Impagliazzo, R., & Luby M. (1989).  One-Way Functions Are Essential for Complexity Based Cryptography (Extended.
Impagliazzo, R., & Luby M. (1989).  Pseudo-Random Number Generator From ANY One-Way Function.
Ikram, M., Vallina-Rodriguez N., Seneviratne S., Kaafar M. Ali, & Paxson V. (2016).  An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Proceedings of ACM Internet Measurement Conference.
Ideker, T. E., Thorsson V., & Karp R. M. (2000).  Discovery of Regulatory Interactions Through Perturbation: Inference and Experimental Design. Proceedings of Pacific Symposium on Biocomputing (PSB 2000). 302-313.
Ideker, T. E., Thorsson V., & Karp R. M. (2000).  Discovery of Rgulatory Interactions Through Perturbation: Inference and Experimental Design.
Ide, N., Baker C. F., Fellbaum C., & Passonneau R. J. (2012).  The MASC/MultiMASC Community Collaboration Project: Why You Should Be Involved and How.
ICSI (2019).  2019 Audited Financial Statement.
ICSI (2017).  2017 Audited Financial Statement.
ICSI (1990).  Proceedings of the First International Workshop on Network Operating SystemSupport for Digital Audio and Video.
ICSI (2016).  2016 Audited Financial Statement.
ICSI (2018).  2018 Audited Financial Statement.
Ibarretxe-Antuñano, I. (2001).  An Overview of Basque Locational Cases: Old Descriptions, New Approaches.

Pages