Publication Search Results

TitleAuthorBibliographicDatesort ascendingGroupLinks
RFC 5690: Adding Acknowledgement Congestion Control to TCPS. Floyd, A. Arcia, D. Ros, and J. IyengarRequest for Comments 5690, InformationalFebruary 2010Networking[PDF]

Why Has (Reasonably Accurate) Automatic Speech Recognition Been So Hard to Achieve?S. Wegmann and L. GillickArXiv.org under CoRR abs/1003.0206February 2010Speech[PDF]

Barter Trade Improves Message Delivery in Opportunistic NetworksL. Buttyan, L. Dora, M. Felegyhazi, and I. VajdaAd Hoc Networks, Vol. 8, Issue 1, pp. 1-14January 2010Networking[PDF]

Classifying Materials in the Real WorldB. Caputo, E. Hayman, M. Fritz, and J.-O. EklundhImage and Vision Computing, Vol. 28, Issue 1, pp. 150-163January 2010Vision[PDF]

On Mixing and Edge Expansion Properties in Randomized BroadcastingT. SauerwaldAlgorithmica, Vol. 56, No. 1, pp. 51-88January 2010Algorithms
Designing Sensor-Based Event Processing InfrastructuresA. Voisard and H. ZiekowProceedings of the Hawai'i International Conference on System Sciences (HICSS-43), Koloa Kauai, Hawai'i,January 2010Other[PDF]

Quasirandom Load BalancingT. Friedrich, M. Gairing, and T. SauerwaldProceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2010), Austin, Texas, pp. 1620-1629January 2010Algorithms[PDF]

Efficient Broadcast on Random Geometric GraphsM. Bradonjić, R. Elsässer, T. Friedrich, T. Sauerwald, and A. StaufferProceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2010), Austin, Texas, pp. 1412-1421January 2010Algorithms[PDF]

Analysis of an Asymmetric Mutation OperatorT. Jansen and D. SudholtEvolutionary Computation, Vol. 18, No. 1, pp. 1-26January 2010Algorithms
A Large-Scale Empirical Analysis of Email Spam Detection Through Transport-Level CharacteristicsT. Ouyang, S. Ray, M. Allman, and M. RabinovichICSI Technical Report TR-10-001January 2010ICSI Technical Reports[PDF]

Leveraging Genetic Variability Across Populations for the Identification of Causal VariantsN. Zaitlen, B. Pasaniuc, T. Gur, E. Zic, and E. HalperinThe American Journal of Human Genetics, Vol. 86, Issue 1, pp. 23-33January 2010Algorithms
The Iterated Weakest LinkR. Böhme and T. MooreIEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55January 2010Networking[PDF]

Understanding Science Through the Lens of ComputationR. KarpPresented at the Symposium on Transformational Information Engineering and Science, SingaporeJanuary 2010Algorithms
A Graph-Based Measure of FrameNet-WordNet AlignmentO. Ferrández, M. Ellsworth, R. Muñoz, and C. F. BakerProceedings of the Second International Conference on Global Interoperability for Language Resources (ICGL 2010), Hong Kong, ChinaJanuary 2010AI
Speeding Up Random Walks with Neighborhood ExplorationP. Berenbrink, C. Cooper, R. Elsaesser, T. Radzik, and T. SauerwaldProceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2010), Austin, Texas, pp. 1422-1435January 2010Algorithms[PDF]

Reasoning over Natural Language Text by Means of FrameNet and OntologiesJ. Scheffczyk, C. F. Baker, and S. NarayananIn Ontology and the Lexicon: A Natural Language Processing Perspective, C.-R. Huang, N. Calzolari, A. Gangemi, A. Lenci, A. Oltramari, and L. Prevot, eds., pp. 53-71, Cambridge University Press 2010AI
Speaker Recognition and DiarizationG. Friedland and D. van LeeuwenIn Semantic Computing, P. Sheu, H. Yu, C. V. Ramamamoorthy, A. K. Joshi, and L. A. Zadeh, eds., pp. 115-130, IEEE Press/Wiley 2010Speech
Categorial PerceptionM. Fritz, M. Andriluka, S. Fidler, M. Stark, A. Leonardis, and B. SchieleIn Cognitive Systems, H. I. Christensen, G.-J. Kruijff, A. Sloman, and J. Wyatt, eds., Springer, pp. 131-164 2010Vision
Multi-Modal LearningD. Skocaj, M. Kristan, A. Vrecko, A. Leonardis, M. Fritz, M. Stark, B. Schiele, S. Hongeng, and J. L. WyattIn Cognitive Systems, H. I. Christensen, G.-J. Kruijff, A. Sloman, and J. Wyatt, eds., Springer, pp. 265-309 2010Vision
Language and Thought: Which Side Are You On, Anyway?T. Regier, P. Kay, A. Gilbert, and R. IvryIn Words and the Mind: How Words Capture Human Experience, B. Malt and P. Wolff, eds., pp. 165-182, Oxford University Press, 2010 2010AI
Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and PracticeS. Thiem and J. LaessigIn Particle Swarm Optimization: Theory, Techniques and Applications, A. E. Olsson, ed., Nova Science Publishers, ISBN: 978-1-61668-527-0 2010Algorithms
A New Biology for the 21st CenturyNational Research Council of the National AcademiesReport of Committee on a New Biology for the 21st Century: Ensuring the United States Leads the Coming Biology Revolution 2010Algorithms[PDF]

World Color SurveyP. Kay, B. Berlin, L. Maffi, W. R. Merrifield, and R. CookCSLI Publications 2010AI
A Practical Computer Immunology Approach for Self-Protection Enhanced by Optimization TechniquesA. Pietzowski, B. Satzger, W. Trumler, and T. UngererJournal of Autonomic and Trusted Computing 2010Algorithms
Computational Models of Figurative LanguageB. Loenneker-Rodman and S. NarayananCambridge Encyclopedia of Psycholinguistics, Cambridge University Press, 2010 2010AI
MLP-Based Feature Extraction for Speech TranscriptionN. Morgan, A. Faria, S. Ravuri, and S. ZhaoHandbook of Natural Language Processing and Machine Translation, J. Olive, ed., Springer, in press 2010Speech
Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, GermanyC. Kreibich and M. Jahnke, eds.Springer 2010Networking
Annual Report 2010ICSI Staff 2010ICSI Annual Reports[PDF]

Computationally Efficient Clustering of Audio-Visual Meeting DataH. Hung, G. Friedland, and C. YeoIn Multimedia Interaction and Intelligent User Interfaces: Principles, Methods, and Applications, M. Etho, J. Luo, and L. Shao, eds., pp. 25-59 2010Speech
On Expressing Measurement and Comparison in Japanese and EnglishY. Hasegawa, R. Lee-Goldman, K. Hirose Ohara, S. Fujii, and C. J. FillmoreIn Contrastive Studies in Construction Grammar, H. C. Boas, ed., pp. 169-198, John Benjamins Publishing Company 2010AI
Fast Similarity Search for Learned MetricsB. Kulis, P. Jain, and K. GraumanIEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 31, No. 12, pp. 2143-2157December 2009Vision[PDF]

Securing Web ContentJ. Koskela, N. Weaver, A. Gurtov, and M. AllmanProceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12December 2009Networking[PDF]

Robust Speaker Diarization for Short Speech RecordingsD. Imseng and G. FriedlandProceedings of the 11th Biannual IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2009), Merano, Italy, pp. 432-437December 2009Speech[PDF]

Using Artistic Markers and Speaker Identification for Narrative-Theme Navigation of Seinfeld EpisodesG. Friedland, L. Gottlieb, and A. JaninProceedings of the 11th IEEE International Symposium on Multimedia (ISM2009), San Diego, California, pp. 511-516December 2009Speech[PDF]

An Additive Latent Feature Model for Transparent Object RecognitionM. Fritz, M. Black, G. Bradski, and T. DarrellProceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, Canada, pp. 558-566December 2009Vision[PDF]

Learning to Hash with Binary Reconstructive EmbeddingsB. Kulis and T. DarrellProceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, Canada, pp. 1042-1050. Also appeared as EECS Department, UC Berkeley Technical Report No. UCB-EECS-2009-101, Berkeley, California, July 2009.December 2009Vision[PDF]

Analysis of Diversity-Preserving Mechanisms for Global ExplorationT. Friedrich, P. S. Oliveto, D. Sudholt, and C. WittEvolutionary Computation, Vol. 17, Issue 4, pp. 455-476, Winter 2009December 2009Algorithms[PDF]

Any Questions? Automatic Question Detection in MeetingsK. Boakye, B. Favre, and D. Hakkani-TürProceedings of the 11th Biannual IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2009), Merano, Italy, pp. 485-489December 2009Speech[PDF]

Integrating Prosodic Features in Extractive Meeting SummarizationS. Xie, D. Hakkani-Tür, B. Favre, and Y. LiuProceedings of the 11th Biannual IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2009), Merano, Italy, pp. 387-391December 2009Speech[PDF]

Covering Games: Approximation Through Non-CooperationM. GairingProceedings of the Fifth Workshop on Internet and Network Economics (WINE '09), Rome, Italy, pp. 184-195December 2009Algorithms[PDF]

On Constructing a Trusted Path to the UserN. Weaver and M. AllmanICSI Technical Report TR-09-009December 2009ICSI Technical Reports[PDF]

Selected Papers from the Third IEEE International Conference on Semantic Computing (ICSC2009)G. Friedland and S. C. Shen, eds.International Journal on Semantic Computing, Vol. 3, Issue 4December 2009Speech
Filtering Abstract Sense from Image Search ResultsK. Saenko and T. DarrellProceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, CanadaDecember 2009Vision[PDF]

Genome-Wide Association Data Reveal a Global Map of Genetic Interaction Among Protein ComplexesG. Hannum., R. Srivas., A. Guénolé, H. van Attikum, N. J. Krogan, R. M. Karp, and T. IdekerPLoS Genetics, Vol. 5, Issue 12, e1000782December 2009Algorithms[PDF]

An Additive Latent Feature Model for Transparent Object RecognitionM. Fritz, M. Black, G. Bradski, S. Karayev, and T. DarrellProceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, British Columbia, CanadaDecember 2009Vision[PDF]

On Calibrating Enterprise Switch MeasurementsB. Nechaev, V. Paxson, M. Allman, and A. GurtovProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 143-155November 2009Networking[PDF]

On Dominant Characteristics of Residential Broadband Internet TrafficG. Maier, A. Feldmann, V. Paxson, and M. AllmanProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102November 2009Networking[PDF]

Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-EngineeringJ. Caballero, P. Poosankam, C. Kreibich, and D. SongProceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634November 2009Networking[PDF]

Exploiting Process Knowledge for Event Processing in Distributed Business ApplicationsH. ZiekowProceedings of the Workshop on Information System in Distributed Environment (ISDE 2009) at the OnTheMove Federated Conferences and Workshops (OTM '09), Vilamoura, Portugal, pp. 277-281November 2009Other
High-Speed Access to RFID Data: Meeting Real-Time Requirements in Distributed Value ChainsH. Ziekow, B. Fabian, and C. MuellerProceedings of the Fourth International Workshop on Enterprise Integration, Interoperability, and Networking (EI2N 2009) at the OnTheMove Federated Conferences and Workshops (OTM '09), Vilamoura, Portugal, pp. 142-151November 2009Other

Pages