| Constructing and Utilizing Wordnets using Statistical Methods | G. de Melo and G. Weikum | Journal of Language Resources and Evaluation, Vol. 46, Issue 2, pp. 287-311 | June 2012 | AI | |
| Common Variation at 6p21.31 (BAK1) Influences the Risk of Chronic Lymphocytic Leukemia | S. L. Slager, C. F. Skibola,..., E. Halperin, et al. | Blood, Vol. 120, No. 4, pp. 843-846 | July 2012 | Algorithms | |
| CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping | Z. Wang, F. Hormozdiari, W.-Y. Yang, E. Halperin, and E. Eskin | Proceedings of the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain, pp. 326-340 | April 2012 | Algorithms | |
| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|
| Carat: Collaborative Energy Bug Detection | A. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. Tarkoma | Poster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, California | April 2012 | Networking | |
| Beyond Spatial Pyramids: Receptive Field Learning for Pooled Image Features | Y. Jia, C. Huang, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), Providence, Rhode Island, pp. 3370-3377 | June 2012 | Vision | [PDF]
|
| An Intermittent Energy Internet Architecture | B. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. Streed | Proceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, Spain | May 2012 | Networking | [PDF]
|
| An Automated Testing Suite for Computer Music Environments | N. Peters, T. Lossius, and T. Place | Proceedings of the 9th Sound and Music Computing Conference (SMC 2012), Copenhagen, Denmark | July 2012 | Other | [PDF]
|
| Adapting Social Spam Infrastructure for Political Censorship | K. Thomas, C. Grier, and V. Paxson | Proceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, California | April 2012 | Networking | [PDF]
|
| A Perceptual Analysis of Off-Center Sound Degradation in Surround-Sound Reproduction Based on Geometrical Properties | N. Peters and S. McAdams | Journal of the Acoustical Society of America, Vol. 131, Issue. 4, pp. 3256-3256. Also in the proceedings of Acoustics 2012, Hong Kong, May 2012 | April 2012 | Other | |
| A Model-Based Approach for Analysis of Spatial Structure in Genetic Data | W.-Y. Yang, J. Novembre, E. Eskin, and E. Halperin | Nature Genetics, Vol. 44, pp. 725-731 | May 2012 | Algorithms | [PDF]
|
| A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence | B. Amann, R. Sommer, A. Sharma, and S. Hall | Proceedings of the 15th International Symposium on Attacks, Intrusions, and Detections (RAID 2012), pp. 314-333, Amsterdam, the Netherlands | September 2012 | Networking | |
| A First Look at 1 Gbps Fiber-To-The-Home Traffic | M. Sargent, B. Stack, T. Dooner, and M. Allman | ICSI Technical Report TR-12-009 | August 2012 | ICSI Technical Reports | [PDF]
|