| A Cognitive Model of Scales | S. Narayanan | To appear in the proceedings of the 12th International Cognitive Linguistics Conference (ICLC), Edmonton, Canada | June 2013 | AI | |
| MetaNet: A Multilingual Metaphor Repository | S. Narayanan | To appear in the proceedings of the 12th International Cognitive Linguistics Conference (ICLC), Edmonton, Canada | June 2013 | AI | |
| Exploiting Innocuous Activity for Correlating Users Across Sites | O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web | D. Akhawe, B. Amann, M. Vallentin, and R. Sommer | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Effective Straggler Mitigation: Attack of the Clones | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | To appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, Illinois | April 2013 | Networking | |
| Large-scale Correlation of Accounts Across Social Networks | O. Goga, D. Perito, H. Lei, R. Teixeira, and R. Sommer | ICSI Technical Report TR-13-002 | April 2013 | ICSI Technical Reports | [PDF]
|
| Tutorial: Searching the Web of Data | G. de Melo and K. Hose | Presented at the European Conference on Information Retrieval (ECIR), Moscow, Russia | March 2013 | AI | |
| A Hybrid-System Model of the Coagulation Cascade | J. Makin and S. Narayanan | Proceedings of the 5th International Conference on Bioinformatics and Computational Biology (BICoB2013), Honolulu, Hawaii | March 2013 | AI | |
| Communicating with Exectuable Representations | M. Schilling and S. Narayanan | Proceedings of the AAAI Spring Symposium (Designing Intelligent Robots), Stanford University, California | March 2013 | AI | |
| The Neural Binding Problem(s) | J. Feldman | Cognitive Neurodynamics, Vol. 7, Issue 1, pp. 1-11 | February 2013 | AI | [PDF]
|
| Change Blindness Reveals Distinctive Featural Processing in Size, Color, and Orientation | S. X. Yu and D. Lisin | ICSI Technical Report TR-13-001 | February 2013 | ICSI Technical Reports | [PDF]
|
| Impeding Forgers at Photo Inception | M. Kirchner, P. Winkler, and H. Farid | Proceedings of SPIE-IS&T Electronic Imaging, Media Watermarking, Security, and Forensics 2013, SPIE Vol. 8665, San Francisco, California | February 2013 | Vision | [PDF]
|
| Probabilistic Inference of Viral Quasispecies Subject to Recombination | A. Topfer, O. Zagordi, S. Prabhakaran, V. Roth, E. Halperin, and N. Beerenwinkel | Journal of Computational Biology, Vol. 20, No. 2, pp. 113-123 | February 2013 | Algorithms | |
| Taming the Wild: Acoustic Segmentation in Consumer‐Produced Videos | B. Elizalde and G. Friedland | ICSI Technical Report TR-12-016 | January 2013 | ICSI Technical Reports | [PDF]
|
| Comments on Bufferbloat | M. Allman | ACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37 | January 2013 | Networking | [PDF]
|
| Findings and Implications from Data Mining the IMC Review Process | R. Beverly and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29 | January 2013 | Networking | [PDF]
|
| Identifying Personal Genomes by Surname Inference | M. Gymrek, A. L. McGuire, D. Golan, E. Halperin, and Y. Erlich | Science, Vol. 339, No. 6117, pp. 321-324 | January 2013 | Algorithms | |
| Taxonomic Data Integration from Multilingual Wikipedia Editions | G. de Melo and G. Weikum | To appear in Knowledge and Information Systems | 2013 | AI | |
| Good, Great, Excellent: Global Inference of Lexical Intensities | G. de Melo and M. Bansal | To appear in the Transactions of the Association for Computational Linguistics | 2013 | AI | |
| Learning with Recursive Perceptual Representations | O. Vinyals, Y. Jia, L. Deng, and T. Darrell | Presented at the 26th Annual Conference on Neural Information Processing Systems (NIPS 2012), Lake Tahoe, Nevada | December 2012 | Vision | [PDF]
|
| Timely Object Recognition | S. Karayev, T. Baumgartner, M. Fritz, and T. Darrell | Presented at the 26th Annual Conference on Neural Information Processing Systems (NIPS 2012), Lake Tahoe, Nevada | December 2012 | Vision | [PDF]
|
| Encounters with Language | C. J. Fillmore | Computational Linguistics, Vol. 38, No. 4, pg.701-718 | December 2012 | AI | [PDF]
|
| Beyond Classification -- Large-Scale Gaussian Process Inference and Uncertainty Prediction | A. Freytag, E. Rodner, P. Bodesheim, and J. Denzler | Presented at the BigVision Workshop at the 26th Annual Conference on Neural Information Processing Systems (NIPS 2012), Lake Tahoe, Nevada | December 2012 | Vision | [PDF]
|
| Revisiting SSL: A Large Scale Study of the Internet's Most Trusted Protocol | B. Amann, M. Vallentin, S. Hall, and R. Sommer | ICSI Technical Report TR-12-015 | December 2012 | ICSI Technical Reports | [PDF]
|
| Markov Chains for Robust Graph-Based Commonsense Information Extraction | N. Tandon, D. Rajagopal, and G. de Melo | Demo at the 24th International Conference on Computational Linguistics (COLING), Mumbai, India | December 2012 | AI | |
| OpenWordNet-PT: An Open Brazilian WordNet for Reasoning | C. de Paiva, A. Rademaker, and G. de Melo | Demo at the 24th International Conference on Computational Linguistics (COLING), Mumbai, India | December 2012 | AI | |
| Exploiting Web Data Sources for Advanced NLP | G. de Melo | Proceedings of the 24th International Conference on Computational Linguistics (COLING), Tutorial Notes, Mumbai, India | December 2012 | AI | |
| LINDA: Distributed Web-of-Data-Scale Entity Matching | C. Boehm, G. de Melo, F. Naumann, and G. Weikum | Proceedings of the 21st ACM International Conference on Information and Knowledge Management (CIKM 2012), Maui, Hawaii | December 2012 | AI | |
| Fathom: A Browser-based Network Measurement Platform | M. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, and V. Paxson | Proceedings of the 2012 Internet Measurement Conference (IMC 2012), Boston, Massachusetts | November 2012 | Networking | [PDF]
|
| Hearing is Believing: Biologically-Inspired Feature Extraction for Robust Automatic Speech Recognition | R. M. Stern and N. Morgan | Signal Processing Magazine, Vol. 29, No. 6, pp. 34-43 | November 2012 | Speech | [PDF]
|
| Direction-Optimizing Breadth-First Search | S. Beamer, K. Asanović, and D. Patterson | Proceedings of the International Conference for High Performance Computing, Networking, Storage, and Analysis (SC12), Article No. 12, Salt Lake City, Utah | November 2012 | Architecture | |
| A Model-Based Approach for Analysis of Spatial Structure in Genetic Data | W. Yang, J. Novembre, E. Eskin, and E. Halperin | Presented at the Annual Meeting of the American Society of Human Genetics, San Francisco, California | November 2012 | Algorithms | |
| Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service | B. Amann, M. Vallentin, S. Hall, and R. Sommer | ICSI Technical Report TR-12-014 | November 2012 | ICSI Technical Reports | [PDF]
|
| Rapid Uncertainty Computation with Gaussian Processes and Histogram Intersection Kernels | A. Freytag, E. Rodner, P. Bodesheim, and J. Denzler | Proceedings of the 11th Asian Conference on Computer Vision, Daejeon, Korea. Recipient of a best paper honorable mention award. | November 2012 | Vision | [PDF]
|
| Real-Time Control of Human Coagulation | J. Makin and S. Narayanan | IET Control Theory and Applications, Vol. 6, Issue 17, pp. 2630-2643 | November 2012 | AI | |
| Name That Room: Room Identification Using Acoustic Features in a Recording | N. Peters, H. Lei, and G. Friedland | Proceedings of ACM Multimedia 2012, pp. 841-844, Nara, Japan | October 2012 | Other | [PDF]
|
| Matching Artificial Reverb Settings to Unknown Room Recordings: A Recommendation System for Reverb Plugins | N. Peters, H. Lei, and J. Choi | Proceedings of the 133th Audio Engineering Society (AES) Convention, San Francisco, California | October 2012 | Other | |
| Priceless: The Role of Payments in Abuse-Advertised Goods | D. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. Savage | Proceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North Carolina | October 2012 | Networking | |
| There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media | Benjamin Elizalde; Gerald Friedland; Howard Lei; Ajay Divakaran | Proceedings of the ACM International Workshop on Audio and Multimedia Methods for Large-Scale Video Analysis (AMVA) at ACM Multimedia 2012 (MM'12), Nara, Japan, pp. 27-32 | October 2012 | Speech | [PDF]
|
| Manufacturing Compromise: The Emergence of Exploit-as-a-Service | C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Zubair Rafique, M. Abu Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. Voelker | Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 821-832, Raleigh, North Carolina | October 2012 | Networking | [PDF]
|
| Pushing the Limits of Mechanical Turk: Qualifying the Crowd for Video Geo-Location | L. Gottlieb, J. Choi, P. Kelm, T. Sikora, and G. Friedland | Proceedings of the ACM Workshop on Crowdsourcing for Multimedia (CrowdMM 2012), held in conjunction with ACM Multimedia 2012, pp. 23-28, Nara, Japan | October 2012 | Speech | [PDF]
|
| Sparselet Models for Efficient Multiclass Object Detection | H. O. Song, S. Zickler, T. Althoff, R. Girshick, C. Geyer, M. Fritz, P. Felzenszwalb, and T. Darrell | Proceedings of the 12th European Conference on Computer Vision (ECCV 2012), pp. 802-815, Firenze, Italy | October 2012 | Vision | |
| Discovering Latent Domains for Multisource Domain Adaptation | J. Hoffman, K. Saenko, B. Kulis, and T. Darrell | Proceedings of the 12th European Conference on Computer Vision (ECCV 2012), pp. 702-715, Firenze, Italy | October 2012 | Vision | |
| Content‐based Privacy for Consumer‐Produced Multimedia | A. Janin, G. Friedland, and R. Sommer | ICSI Technical Report TR-12-012 | October 2012 | Networking | [PDF]
|
| The 2012 ICSI/Berkeley Video Location Estimation System | J. Choi, V. Ekambaram, G. Friedland, and K. Ramchandran | Presented at the MediaEval 2012 Workshop, Pisa, Italy | October 2012 | Speech | [PDF]
|
| NOSIX: A Portable Switch Interface for the Network Operating System | A. Wundsam and M.Yu | ICSI Technical Report TR-12-013 | October 2012 | Networking | [PDF]
|
| Software-Defined Internet Architecture | B. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. Shenker | Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, Washington | October 2012 | Networking | [PDF]
|
| Where did I go Wrong?: Identifying Troublesome Segments for Speaker Diarization Systems | M. T. Knox, N. Mirghafori, and G. Friedland | Proceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, Oregon | September 2012 | Speech | [PDF]
|
| Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition | B. Meyer, C. Spille, B. Kollmeier, and N. Morgan | Proceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, Oregon | September 2012 | Speech | [PDF]
|
| A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence | B. Amann, R. Sommer, A. Sharma, and S. Hall | Proceedings of the 15th International Symposium on Attacks, Intrusions, and Detections (RAID 2012), pp. 314-333, Amsterdam, the Netherlands | September 2012 | Networking | |