Publication Search Results

TitleAuthorBibliographicDateGroupsort ascendingLinks
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted SystemsL. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. StoicaProceedings of the USENIX Annual Technical Conference (ATC), Boston, MAJune 2012Networking[PDF]

Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. StoicaProceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CAApril 2012Networking[PDF]

Making the Internet More EvolvableB. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. ShenkerICSI Technical Report TR-12-011September 2012Networking[PDF]

Why Let Resources Idle? Aggressive Cloning of Jobs with DollyG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, MassachusettsJune 2012Networking[PDF]

PACMan: Coordinated Memory Caching for Parallel JobsG. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. StoicaProceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, CaliforniaApril 2012Networking[PDF]

Shark: Fast Data Analysis Using Coarse-grained Distributed MemoryC. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. StoicaDemo, ACM SIGMOD/PODS Conference, Scottsdale, ArizonaMay 2012Networking[PDF]

Speaker DiarizationG. Friedland and F. ValenteIn Multimodal Signal Processing: Human Interactions in Meetings, S. Reynals, H. Bourlard, J. Carletta, and A. Popescu-Belis, eds., Cambridge University PressJune 2012Speech
Multimodal Location Estimation of Consumer Media – Dealing with Sparse Training DataJ. Choi, G. Friedland, V. Ekambaram, and K. RamchandranProceedings of the IEEE International Conference on Multimedia and Expo, Melbourne, Australia, pp. 43-48July 2012Speech[PDF]

Cybercasing the Joint: Language Technologies, Multimedia Retrieval, and Online PrivacyG. FriedlandPresented at the Language Technologies Institute Colloquium, Carnegie Mellon University, Pittsburgh, PennsylvaniaApril 13 2012Speech[PDF]

Where did I go Wrong?: Identifying Troublesome Segments for Speaker Diarization SystemsM. T. Knox, N. Mirghafori, and G. FriedlandProceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, OregonSeptember 2012Speech[PDF]

Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech RecognitionB. Meyer, C. Spille, B. Kollmeier, and N. MorganProceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, OregonSeptember 2012Speech[PDF]

Longer Features: They Do a Speech Detector GoodTJ Tsai and N. MorganProceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, OregonSeptember 2012Speech
Semi-Autonomous Car Control Using Brain Computer InterfacesD. Goehring, D. Latotzky, M. Wang, and R. RojasProceedings of the 12th International Conference of Intelligent Autonomous Systems (IAS), Juju Island, KoreaJune 2012Speech

Pages