Publication Search Results

TitleAuthorBibliographicDatesort descendingGroupLinks
Where did I go Wrong?: Identifying Troublesome Segments for Speaker Diarization SystemsM. T. Knox, N. Mirghafori, and G. FriedlandProceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, OregonSeptember 2012Speech[PDF]

Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech RecognitionB. Meyer, C. Spille, B. Kollmeier, and N. MorganProceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, OregonSeptember 2012Speech[PDF]

A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time IntelligenceB. Amann, R. Sommer, A. Sharma, and S. HallProceedings of the 15th International Symposium on Attacks, Intrusions, and Detections (RAID 2012), pp. 314-333, Amsterdam, the NetherlandsSeptember 2012Networking
Ontology Driven Contextual Reference Resolution in Embodied Construction GrammarJ. Oliva, J. Feldman, L. Giraldi, and E. DodgeProceedings of the 7th Annual Constraint Solving and Language Processing Workshop (CSLP 2012), Orléans, FranceSeptember 2012AI
Macroscopically Sustainable Networking: An Internet QuineB. Raghavan and S. HasanICSI Technical Report TR-12-010September 2012ICSI Technical Reports[PDF]

Making the Internet More EvolvableB. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. ShenkerICSI Technical Report TR-12-011September 2012Networking[PDF]

ICSI GazetteSeptember 2012ICSI Newsletter[PDF]

Longer Features: They Do a Speech Detector GoodTJ Tsai and N. MorganProceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, OregonSeptember 2012Speech
Unexpected Artefacts in PRNU-Based Camera Identification: A "Dresden Image Database" Case-StudyT. Gloe, S. Pfennig, and M. KirchnerACM Multimedia and Security Workshop, Coventry, UKSeptember 2012Vision[PDF]