| ICSI Gazette | | | May 2012 | ICSI Newsletter | [PDF]
|
| ICSI Gazette | | | September 2012 | ICSI Newsletter | [PDF]
|
| Information Hiding | M. Kirchner and D. Ghosal (eds.) | 14th International Conference, Information Hiding 2012, Berkeley, California, Revised Selected Papers, Lecture Notes in Computer Science Vol. 7692 | May 2012 | Vision | |
| Unexpected Artefacts in PRNU-Based Camera Identification: A "Dresden Image Database" Case-Study | T. Gloe, S. Pfennig, and M. Kirchner | ACM Multimedia and Security Workshop, Coventry, UK | September 2012 | Vision | [PDF]
|
| On Building Inexpensive Network Capabilities | C. Shue, A. Kalafut, M. Allman, and C. Taylor | ACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79 | April 2012 | Networking | [PDF]
|
| Fast and Accurate Inference of Local Ancestry in Latino Populations | Y. Baran, B. Pasaniuc, S. Sankararaman, D. G. Torgerson, C. Gignoux, C. Eng, W. Rodriguez-Cintron, R. Chapela, J. G. Ford, P. C. Avila, J. Rodriguez-Santana, E. G. Burchard, and E. Halperin | Bioinformatics, Vol. 28, Issue 10, pp. 1359-1367 | May 2012 | Algorithms | [PDF]
|
| Common Variation at 6p21.31 (BAK1) Influences the Risk of Chronic Lymphocytic Leukemia | S. L. Slager, C. F. Skibola,..., E. Halperin, et al. | Blood, Vol. 120, No. 4, pp. 843-846 | July 2012 | Algorithms | |
| Shark: Fast Data Analysis Using Coarse-grained Distributed Memory | C. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. Stoica | Demo, ACM SIGMOD/PODS Conference, Scottsdale, Arizona | May 2012 | Networking | [PDF]
|
| There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media | G. Friedland, B. Martinez Elizalde, H. Lei, and A. Divakaran | ICSI Technical Report TR-12-006 | April 12 2012 | ICSI Technical Reports | [PDF]
|
| Multimodal City-Identification on Flickr Videos Using Acoustic and Textual Features | H. Lei, J. Choi, and G. Friedland | ICSI Technical Report TR-12-007 | May 2012 | ICSI Technical Reports | [PDF]
|
| On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites | O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira | ICSI Technical Report TR-12-008 | May 2012 | ICSI Technical Reports | [PDF]
|
| A First Look at 1 Gbps Fiber-To-The-Home Traffic | M. Sargent, B. Stack, T. Dooner, and M. Allman | ICSI Technical Report TR-12-009 | August 2012 | ICSI Technical Reports | [PDF]
|
| Macroscopically Sustainable Networking: An Internet Quine | B. Raghavan and S. Hasan | ICSI Technical Report TR-12-010 | September 2012 | ICSI Technical Reports | [PDF]
|
| Making the Internet More Evolvable | B. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. Shenker | ICSI Technical Report TR-12-011 | September 2012 | Networking | [PDF]
|
| Speaker Diarization | G. Friedland and F. Valente | In Multimodal Signal Processing: Human Interactions in Meetings, S. Reynals, H. Bourlard, J. Carletta, and A. Popescu-Belis, eds., Cambridge University Press | June 2012 | Speech | |
| Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters | M. Zaharia, T. Das, H. Li, S. Shenker and I. Stoica | In the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MA | June 2012 | Networking | [PDF]
|
| Spectral Methods to Determine the Exact Scaling Factor of Resample Digital Images | S. Pfennig and M. Kirchner | Invited paper, "Image Forensics Techniques" special session, proceedings of the 5th International Symposium on Communications, Control, and Signal Processing (ISCCSP), Rome, Italy | May 2012 | Vision | [PDF]
|
| Source-Path-Goal: Investigating the Cross-Linguistic Potential of Frame-Semantic Text Analysis | O. Čulo and G. de Melo | it - Information Technology, Vol. 54, Issue 3, pp. 147-152 | May 2012 | AI | |
| Constructing and Utilizing Wordnets using Statistical Methods | G. de Melo and G. Weikum | Journal of Language Resources and Evaluation, Vol. 46, Issue 2, pp. 287-311 | June 2012 | AI | |
| A Perceptual Analysis of Off-Center Sound Degradation in Surround-Sound Reproduction Based on Geometrical Properties | N. Peters and S. McAdams | Journal of the Acoustical Society of America, Vol. 131, Issue. 4, pp. 3256-3256. Also in the proceedings of Acoustics 2012, Hong Kong, May 2012 | April 2012 | Other | |
| A Model-Based Approach for Analysis of Spatial Structure in Genetic Data | W.-Y. Yang, J. Novembre, E. Eskin, and E. Halperin | Nature Genetics, Vol. 44, pp. 725-731 | May 2012 | Algorithms | [PDF]
|
| Probabilistic Convergence Guarantees for Type-II Pulse-Coupled Oscillators | J. Nishimura and E. Friedman | Physical Review E, Vol. 86, Issue 2 | August 2012 | Algorithms | |
| Carat: Collaborative Energy Bug Detection | A. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. Tarkoma | Poster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, California | April 2012 | Networking | |
| Cybercasing the Joint: Language Technologies, Multimedia Retrieval, and Online Privacy | G. Friedland | Presented at the Language Technologies Institute Colloquium, Carnegie Mellon University, Pittsburgh, Pennsylvania | April 13 2012 | Speech | [PDF]
|
| Theory of Computation as an Enabling Tool for the Sciences | R. Karp | Presented at the Turing Centennial Celebration, Princeton, New Jersey. Also presented at the 9th Annual Conference on Theory and Applications of Models of Computation (TAMC 2012), Turing Centenary Meeting, Beijing, China | May 2012 | Algorithms | |
| Semi-Autonomous Car Control Using Brain Computer Interfaces | D. Goehring, D. Latotzky, M. Wang, and R. Rojas | Proceedings of the 12th International Conference of Intelligent Autonomous Systems (IAS), Juju Island, Korea | June 2012 | Speech | |
| Where did I go Wrong?: Identifying Troublesome Segments for Speaker Diarization Systems | M. T. Knox, N. Mirghafori, and G. Friedland | Proceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, Oregon | September 2012 | Speech | [PDF]
|
| Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition | B. Meyer, C. Spille, B. Kollmeier, and N. Morgan | Proceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, Oregon | September 2012 | Speech | [PDF]
|
| Longer Features: They Do a Speech Detector Good | TJ Tsai and N. Morgan | Proceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, Oregon | September 2012 | Speech | |
| A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence | B. Amann, R. Sommer, A. Sharma, and S. Hall | Proceedings of the 15th International Symposium on Attacks, Intrusions, and Detections (RAID 2012), pp. 314-333, Amsterdam, the Netherlands | September 2012 | Networking | |
| Reconstructing Boolean Models of Signaling | R. Sharan and R. M. Karp | Proceedings of the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain, pp. 261-271 | April 2012 | Algorithms | |
| CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping | Z. Wang, F. Hormozdiari, W.-Y. Yang, E. Halperin, and E. Eskin | Proceedings of the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain, pp. 326-340 | April 2012 | Algorithms | |
| Probabilistic Inference of Viral Quasispecies Subject to Recombination | O. Zagordi, A. Topfer, S. Prabhakaran, V. Roth, E. Halperin, and N. Beerenwinkel | Proceedings of the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain, pp.342-354 | April 2012 | Algorithms | [PDF]
|
| PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko | Proceedings of the 21st USENIX Security Symposium, Bellevue, Washington | August 2012 | Networking | [PDF]
|
| Prudent Practices for Designing Malware Experiments: Status Quo and Outlook | C. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van Steen | Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79 | May 2012 | Networking | [PDF]
|
| Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, Massachusetts | June 2012 | Networking | [PDF]
|
| Coreference Semantics from Web Features | M. Bansal and D. Klein | Proceedings of the 50th Annual Meeting of the Association of Computational Linguistics (ACL 2012), Jeju, Korea | July 2012 | AI | [PDF]
|
| UWN: A Large Multilingual Lexical Knowledge Base | G. de Melo and G. Weikum | Proceedings of the 50th Annual Meeting of the Association of Computational Linguistics (ACL 2012), Jeju, Korea, pp. 151-156 | July 2012 | AI | [PDF]
|
| Ontology Driven Contextual Reference Resolution in Embodied Construction Grammar | J. Oliva, J. Feldman, L. Giraldi, and E. Dodge | Proceedings of the 7th Annual Constraint Solving and Language Processing Workshop (CSLP 2012), Orléans, France | September 2012 | AI | |
| Empirical Comparisons of MASC Word Sense Annotations | G. de Melo, C. F. Baker, N. Ide, R. J. Passonneau, and C. Fellbaum | Proceedings of the 8th Conference on International Language Resources and Evaluation (LREC 2012), Istanbul, Turkey | May 2012 | AI | [PDF]
|
| The MASC Word Sense Corpus | R. Passonneau, C. Baker, C. Fellbaum, and N. Ide | Proceedings of the 8th Conference on International Language Resources and Evaluation (LREC 2012), Istanbul, Turkey, pp. 3025-3030 | May 2012 | AI | [PDF]
|
| SpatDIF: Principles, Specification, and Examples | N. Peters, J. Schacher, and T. Lossius | Proceedings of the 9th Sound and Music Computing Conference (SMC 2012), Copenhagen, Denmark | July 2012 | Other | [PDF]
|
| An Automated Testing Suite for Computer Music Environments | N. Peters, T. Lossius, and T. Place | Proceedings of the 9th Sound and Music Computing Conference (SMC 2012), Copenhagen, Denmark | July 2012 | Other | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CA | April 2012 | Networking | [PDF]
|
| PACMan: Coordinated Memory Caching for Parallel Jobs | G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, California | April 2012 | Networking | [PDF]
|
| Fabric: A Retrospective on Evolving SDN | M. Casado, T. Koponen, S. Shenker, and A. Tootoonchian | Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Helsinki, Finland | August 2012 | Networking | [PDF]
|
| Software-Defined Networking: History, Hype, and Hope | S. Shenker | Proceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012. | July 2012 | Networking | |
| Adapting Social Spam Infrastructure for Political Censorship | K. Thomas, C. Grier, and V. Paxson | Proceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, California | April 2012 | Networking | [PDF]
|
| Power SVM: Generalization with Exemplar Classification Uncertainty | W. Zhang, S. X. Yu, and S.-H. Teng | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), Providence, Rhode Island, pp. 2144-2151 | June 2012 | Vision | [PDF]
|
| Beyond Spatial Pyramids: Receptive Field Learning for Pooled Image Features | Y. Jia, C. Huang, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), Providence, Rhode Island, pp. 3370-3377 | June 2012 | Vision | [PDF]
|