Publications

Found 26 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is I  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
Iyer, A. Padmanabha, Panda A., Venkataraman S., Chowdhury M., Akella A., Shenker S., et al. (2018).  Bridging the GAP: towards approximate graph analytics. Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Fast Semidifferential-based Submodular Function Optimization. 28(3), 855-863.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Curvature and Optimal Algorithms for Learning and Minimizing Submodular Functions.
Iyer, A. Pamanabha, Panda A., Chowdhury M., Akella A., Shenker S., & Stoica I. (2018).  Monarch: Gaining Command on Geo-Distributed Graph Analytics.. Proceedings of HotCloud 2018.
Ivantysynova, L., Klafft M., Ziekow H., Günther O., & Kara S. (2009).  RFID in Manufacturing: The Investment Decision.
Ishac, J., & Allman M. (2001).  On the Performance of TCP Spoofing in Satellite Networks.
Isenburg, M. (1996).  Transmission of Multimedia Data Over Lossy Networks (Thesis).
Irani, S. (1992).  Competitive On-line Algorithms for Paging and Graph Coloring.
Irani, S. (1990).  Two Results on the List Update Problem.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
Imseng, D., & Friedland G. (2010).  Tuning-Robust Initialization Methods for Speaker Diarization. IEEE Transactions on Audio. 18(8), 2028-2037.
Imseng, D., & Friedland G. (2009).  Robust Speaker Diarization for Short Speech Recordings. 432-437.
Imseng, D., & Friedland G. (2010).  An Adaptive Initialization Method for Speaker Diarization Based on Prosodic Features. 4946-4949.
Impagliazzo, R., & Luby M. (1989).  Pseudo-Random Number Generator From ANY One-Way Function.
Impagliazzo, R., & Luby M. (1989).  One-Way Functions Are Essential for Complexity Based Cryptography (Extended.
Ikram, M., Vallina-Rodriguez N., Seneviratne S., Kaafar M. Ali, & Paxson V. (2016).  An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Proceedings of ACM Internet Measurement Conference.
Ideker, T. E., Thorsson V., & Karp R. M. (2000).  Discovery of Regulatory Interactions Through Perturbation: Inference and Experimental Design. Proceedings of Pacific Symposium on Biocomputing (PSB 2000). 302-313.
Ideker, T. E., Thorsson V., & Karp R. M. (2000).  Discovery of Rgulatory Interactions Through Perturbation: Inference and Experimental Design.
Ide, N., Baker C. F., Fellbaum C., & Passonneau R. J. (2012).  The MASC/MultiMASC Community Collaboration Project: Why You Should Be Involved and How.
ICSI (2018).  2018 Audited Financial Statement.
ICSI (2019).  2019 Audited Financial Statement.
ICSI (2017).  2017 Audited Financial Statement.
ICSI (1990).  Proceedings of the First International Workshop on Network Operating SystemSupport for Digital Audio and Video.
ICSI (2016).  2016 Audited Financial Statement.
Ibarretxe-Antuñano, I. (2001).  An Overview of Basque Locational Cases: Old Descriptions, New Approaches.

Pages