| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CA | April 2012 | Networking | [PDF]
|
| Making the Internet More Evolvable | B. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. Shenker | ICSI Technical Report TR-12-011 | September 2012 | Networking | [PDF]
|
| Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, Massachusetts | June 2012 | Networking | [PDF]
|
| PACMan: Coordinated Memory Caching for Parallel Jobs | G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, California | April 2012 | Networking | [PDF]
|
| Shark: Fast Data Analysis Using Coarse-grained Distributed Memory | C. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. Stoica | Demo, ACM SIGMOD/PODS Conference, Scottsdale, Arizona | May 2012 | Networking | [PDF]
|
| Speaker Diarization | G. Friedland and F. Valente | In Multimodal Signal Processing: Human Interactions in Meetings, S. Reynals, H. Bourlard, J. Carletta, and A. Popescu-Belis, eds., Cambridge University Press | June 2012 | Speech | |
| Multimodal Location Estimation of Consumer Media – Dealing with Sparse Training Data | J. Choi, G. Friedland, V. Ekambaram, and K. Ramchandran | Proceedings of the IEEE International Conference on Multimedia and Expo, Melbourne, Australia, pp. 43-48 | July 2012 | Speech | [PDF]
|
| Cybercasing the Joint: Language Technologies, Multimedia Retrieval, and Online Privacy | G. Friedland | Presented at the Language Technologies Institute Colloquium, Carnegie Mellon University, Pittsburgh, Pennsylvania | April 13 2012 | Speech | [PDF]
|
| Where did I go Wrong?: Identifying Troublesome Segments for Speaker Diarization Systems | M. T. Knox, N. Mirghafori, and G. Friedland | Proceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, Oregon | September 2012 | Speech | [PDF]
|
| Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition | B. Meyer, C. Spille, B. Kollmeier, and N. Morgan | Proceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, Oregon | September 2012 | Speech | [PDF]
|
| Longer Features: They Do a Speech Detector Good | TJ Tsai and N. Morgan | Proceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, Oregon | September 2012 | Speech | |
| Semi-Autonomous Car Control Using Brain Computer Interfaces | D. Goehring, D. Latotzky, M. Wang, and R. Rojas | Proceedings of the 12th International Conference of Intelligent Autonomous Systems (IAS), Juju Island, Korea | June 2012 | Speech | |