Publication Search Results

Titlesort ascendingAuthorBibliographicDateGroupLinks
Constructing and Utilizing Wordnets using Statistical MethodsG. de Melo and G. WeikumJournal of Language Resources and Evaluation, Vol. 46, Issue 2, pp. 287-311June 2012AI
Common Variation at 6p21.31 (BAK1) Influences the Risk of Chronic Lymphocytic LeukemiaS. L. Slager, C. F. Skibola,..., E. Halperin, et al.Blood, Vol. 120, No. 4, pp. 843-846July 2012Algorithms
CNVeM: Copy Number Variation Detection Using Uncertainty of Read MappingZ. Wang, F. Hormozdiari, W.-Y. Yang, E. Halperin, and E. EskinProceedings of the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain, pp. 326-340April 2012Algorithms
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted SystemsL. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. StoicaProceedings of the USENIX Annual Technical Conference (ATC), Boston, MAJune 2012Networking[PDF]

Carat: Collaborative Energy Bug DetectionA. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. TarkomaPoster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, CaliforniaApril 2012Networking
Beyond Spatial Pyramids: Receptive Field Learning for Pooled Image FeaturesY. Jia, C. Huang, and T. DarrellProceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), Providence, Rhode Island, pp. 3370-3377June 2012Vision[PDF]

An Intermittent Energy Internet ArchitectureB. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. StreedProceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, SpainMay 2012Networking[PDF]

An Automated Testing Suite for Computer Music EnvironmentsN. Peters, T. Lossius, and T. PlaceProceedings of the 9th Sound and Music Computing Conference (SMC 2012), Copenhagen, DenmarkJuly 2012Other[PDF]

Adapting Social Spam Infrastructure for Political CensorshipK. Thomas, C. Grier, and V. PaxsonProceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, CaliforniaApril 2012Networking[PDF]

A Perceptual Analysis of Off-Center Sound Degradation in Surround-Sound Reproduction Based on Geometrical PropertiesN. Peters and S. McAdamsJournal of the Acoustical Society of America, Vol. 131, Issue. 4, pp. 3256-3256. Also in the proceedings of Acoustics 2012, Hong Kong, May 2012April 2012Other
A Model-Based Approach for Analysis of Spatial Structure in Genetic DataW.-Y. Yang, J. Novembre, E. Eskin, and E. HalperinNature Genetics, Vol. 44, pp. 725-731May 2012Algorithms[PDF]

A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time IntelligenceB. Amann, R. Sommer, A. Sharma, and S. HallProceedings of the 15th International Symposium on Attacks, Intrusions, and Detections (RAID 2012), pp. 314-333, Amsterdam, the NetherlandsSeptember 2012Networking
A First Look at 1 Gbps Fiber-To-The-Home TrafficM. Sargent, B. Stack, T. Dooner, and M. AllmanICSI Technical Report TR-12-009August 2012ICSI Technical Reports[PDF]

Pages