| RFC 5690: Adding Acknowledgement Congestion Control to TCP | S. Floyd, A. Arcia, D. Ros, and J. Iyengar | Request for Comments 5690, Informational | February 2010 | Networking | [PDF]
|
| Why Has (Reasonably Accurate) Automatic Speech Recognition Been So Hard to Achieve? | S. Wegmann and L. Gillick | ArXiv.org under CoRR abs/1003.0206 | February 2010 | Speech | [PDF]
|
| Barter Trade Improves Message Delivery in Opportunistic Networks | L. Buttyan, L. Dora, M. Felegyhazi, and I. Vajda | Ad Hoc Networks, Vol. 8, Issue 1, pp. 1-14 | January 2010 | Networking | [PDF]
|
| Classifying Materials in the Real World | B. Caputo, E. Hayman, M. Fritz, and J.-O. Eklundh | Image and Vision Computing, Vol. 28, Issue 1, pp. 150-163 | January 2010 | Vision | [PDF]
|
| On Mixing and Edge Expansion Properties in Randomized Broadcasting | T. Sauerwald | Algorithmica, Vol. 56, No. 1, pp. 51-88 | January 2010 | Algorithms | |
| Designing Sensor-Based Event Processing Infrastructures | A. Voisard and H. Ziekow | Proceedings of the Hawai'i International Conference on System Sciences (HICSS-43), Koloa Kauai, Hawai'i, | January 2010 | Other | [PDF]
|
| Quasirandom Load Balancing | T. Friedrich, M. Gairing, and T. Sauerwald | Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2010), Austin, Texas, pp. 1620-1629 | January 2010 | Algorithms | [PDF]
|
| Efficient Broadcast on Random Geometric Graphs | M. Bradonjić, R. Elsässer, T. Friedrich, T. Sauerwald, and A. Stauffer | Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2010), Austin, Texas, pp. 1412-1421 | January 2010 | Algorithms | [PDF]
|
| Analysis of an Asymmetric Mutation Operator | T. Jansen and D. Sudholt | Evolutionary Computation, Vol. 18, No. 1, pp. 1-26 | January 2010 | Algorithms | |
| A Large-Scale Empirical Analysis of Email Spam Detection Through Transport-Level Characteristics | T. Ouyang, S. Ray, M. Allman, and M. Rabinovich | ICSI Technical Report TR-10-001 | January 2010 | ICSI Technical Reports | [PDF]
|
| Leveraging Genetic Variability Across Populations for the Identification of Causal Variants | N. Zaitlen, B. Pasaniuc, T. Gur, E. Zic, and E. Halperin | The American Journal of Human Genetics, Vol. 86, Issue 1, pp. 23-33 | January 2010 | Algorithms | |
| The Iterated Weakest Link | R. Böhme and T. Moore | IEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55 | January 2010 | Networking | [PDF]
|
| Understanding Science Through the Lens of Computation | R. Karp | Presented at the Symposium on Transformational Information Engineering and Science, Singapore | January 2010 | Algorithms | |
| A Graph-Based Measure of FrameNet-WordNet Alignment | O. Ferrández, M. Ellsworth, R. Muñoz, and C. F. Baker | Proceedings of the Second International Conference on Global Interoperability for Language Resources (ICGL 2010), Hong Kong, China | January 2010 | AI | |
| Speeding Up Random Walks with Neighborhood Exploration | P. Berenbrink, C. Cooper, R. Elsaesser, T. Radzik, and T. Sauerwald | Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2010), Austin, Texas, pp. 1422-1435 | January 2010 | Algorithms | [PDF]
|
| Reasoning over Natural Language Text by Means of FrameNet and Ontologies | J. Scheffczyk, C. F. Baker, and S. Narayanan | In Ontology and the Lexicon: A Natural Language Processing Perspective, C.-R. Huang, N. Calzolari, A. Gangemi, A. Lenci, A. Oltramari, and L. Prevot, eds., pp. 53-71, Cambridge University Press | 2010 | AI | |
| Speaker Recognition and Diarization | G. Friedland and D. van Leeuwen | In Semantic Computing, P. Sheu, H. Yu, C. V. Ramamamoorthy, A. K. Joshi, and L. A. Zadeh, eds., pp. 115-130, IEEE Press/Wiley | 2010 | Speech | |
| Categorial Perception | M. Fritz, M. Andriluka, S. Fidler, M. Stark, A. Leonardis, and B. Schiele | In Cognitive Systems, H. I. Christensen, G.-J. Kruijff, A. Sloman, and J. Wyatt, eds., Springer, pp. 131-164 | 2010 | Vision | |
| Multi-Modal Learning | D. Skocaj, M. Kristan, A. Vrecko, A. Leonardis, M. Fritz, M. Stark, B. Schiele, S. Hongeng, and J. L. Wyatt | In Cognitive Systems, H. I. Christensen, G.-J. Kruijff, A. Sloman, and J. Wyatt, eds., Springer, pp. 265-309 | 2010 | Vision | |
| Language and Thought: Which Side Are You On, Anyway? | T. Regier, P. Kay, A. Gilbert, and R. Ivry | In Words and the Mind: How Words Capture Human Experience, B. Malt and P. Wolff, eds., pp. 165-182, Oxford University Press, 2010 | 2010 | AI | |
| Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and Practice | S. Thiem and J. Laessig | In Particle Swarm Optimization: Theory, Techniques and Applications, A. E. Olsson, ed., Nova Science Publishers, ISBN: 978-1-61668-527-0 | 2010 | Algorithms | |
| A New Biology for the 21st Century | National Research Council of the National Academies | Report of Committee on a New Biology for the 21st Century: Ensuring the United States Leads the Coming Biology Revolution | 2010 | Algorithms | [PDF]
|
| World Color Survey | P. Kay, B. Berlin, L. Maffi, W. R. Merrifield, and R. Cook | CSLI Publications | 2010 | AI | |
| A Practical Computer Immunology Approach for Self-Protection Enhanced by Optimization Techniques | A. Pietzowski, B. Satzger, W. Trumler, and T. Ungerer | Journal of Autonomic and Trusted Computing | 2010 | Algorithms | |
| Computational Models of Figurative Language | B. Loenneker-Rodman and S. Narayanan | Cambridge Encyclopedia of Psycholinguistics, Cambridge University Press, 2010 | 2010 | AI | |
| MLP-Based Feature Extraction for Speech Transcription | N. Morgan, A. Faria, S. Ravuri, and S. Zhao | Handbook of Natural Language Processing and Machine Translation, J. Olive, ed., Springer, in press | 2010 | Speech | |
| Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany | C. Kreibich and M. Jahnke, eds. | Springer | 2010 | Networking | |
| Annual Report 2010 | ICSI Staff | | 2010 | ICSI Annual Reports | [PDF]
|
| Computationally Efficient Clustering of Audio-Visual Meeting Data | H. Hung, G. Friedland, and C. Yeo | In Multimedia Interaction and Intelligent User Interfaces: Principles, Methods, and Applications, M. Etho, J. Luo, and L. Shao, eds., pp. 25-59 | 2010 | Speech | |
| On Expressing Measurement and Comparison in Japanese and English | Y. Hasegawa, R. Lee-Goldman, K. Hirose Ohara, S. Fujii, and C. J. Fillmore | In Contrastive Studies in Construction Grammar, H. C. Boas, ed., pp. 169-198, John Benjamins Publishing Company | 2010 | AI | |
| Fast Similarity Search for Learned Metrics | B. Kulis, P. Jain, and K. Grauman | IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 31, No. 12, pp. 2143-2157 | December 2009 | Vision | [PDF]
|
| Securing Web Content | J. Koskela, N. Weaver, A. Gurtov, and M. Allman | Proceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12 | December 2009 | Networking | [PDF]
|
| Robust Speaker Diarization for Short Speech Recordings | D. Imseng and G. Friedland | Proceedings of the 11th Biannual IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2009), Merano, Italy, pp. 432-437 | December 2009 | Speech | [PDF]
|
| Using Artistic Markers and Speaker Identification for Narrative-Theme Navigation of Seinfeld Episodes | G. Friedland, L. Gottlieb, and A. Janin | Proceedings of the 11th IEEE International Symposium on Multimedia (ISM2009), San Diego, California, pp. 511-516 | December 2009 | Speech | [PDF]
|
| An Additive Latent Feature Model for Transparent Object Recognition | M. Fritz, M. Black, G. Bradski, and T. Darrell | Proceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, Canada, pp. 558-566 | December 2009 | Vision | [PDF]
|
| Learning to Hash with Binary Reconstructive Embeddings | B. Kulis and T. Darrell | Proceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, Canada, pp. 1042-1050. Also appeared as EECS Department, UC Berkeley Technical Report No. UCB-EECS-2009-101, Berkeley, California, July 2009. | December 2009 | Vision | [PDF]
|
| Analysis of Diversity-Preserving Mechanisms for Global Exploration | T. Friedrich, P. S. Oliveto, D. Sudholt, and C. Witt | Evolutionary Computation, Vol. 17, Issue 4, pp. 455-476, Winter 2009 | December 2009 | Algorithms | [PDF]
|
| Any Questions? Automatic Question Detection in Meetings | K. Boakye, B. Favre, and D. Hakkani-Tür | Proceedings of the 11th Biannual IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2009), Merano, Italy, pp. 485-489 | December 2009 | Speech | [PDF]
|
| Integrating Prosodic Features in Extractive Meeting Summarization | S. Xie, D. Hakkani-Tür, B. Favre, and Y. Liu | Proceedings of the 11th Biannual IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2009), Merano, Italy, pp. 387-391 | December 2009 | Speech | [PDF]
|
| Covering Games: Approximation Through Non-Cooperation | M. Gairing | Proceedings of the Fifth Workshop on Internet and Network Economics (WINE '09), Rome, Italy, pp. 184-195 | December 2009 | Algorithms | [PDF]
|
| On Constructing a Trusted Path to the User | N. Weaver and M. Allman | ICSI Technical Report TR-09-009 | December 2009 | ICSI Technical Reports | [PDF]
|
| Selected Papers from the Third IEEE International Conference on Semantic Computing (ICSC2009) | G. Friedland and S. C. Shen, eds. | International Journal on Semantic Computing, Vol. 3, Issue 4 | December 2009 | Speech | |
| Filtering Abstract Sense from Image Search Results | K. Saenko and T. Darrell | Proceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, Canada | December 2009 | Vision | [PDF]
|
| Genome-Wide Association Data Reveal a Global Map of Genetic Interaction Among Protein Complexes | G. Hannum., R. Srivas., A. Guénolé, H. van Attikum, N. J. Krogan, R. M. Karp, and T. Ideker | PLoS Genetics, Vol. 5, Issue 12, e1000782 | December 2009 | Algorithms | [PDF]
|
| An Additive Latent Feature Model for Transparent Object Recognition | M. Fritz, M. Black, G. Bradski, S. Karayev, and T. Darrell | Proceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, British Columbia, Canada | December 2009 | Vision | [PDF]
|
| On Calibrating Enterprise Switch Measurements | B. Nechaev, V. Paxson, M. Allman, and A. Gurtov | Proceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 143-155 | November 2009 | Networking | [PDF]
|
| On Dominant Characteristics of Residential Broadband Internet Traffic | G. Maier, A. Feldmann, V. Paxson, and M. Allman | Proceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102 | November 2009 | Networking | [PDF]
|
| Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering | J. Caballero, P. Poosankam, C. Kreibich, and D. Song | Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634 | November 2009 | Networking | [PDF]
|
| Exploiting Process Knowledge for Event Processing in Distributed Business Applications | H. Ziekow | Proceedings of the Workshop on Information System in Distributed Environment (ISDE 2009) at the OnTheMove Federated Conferences and Workshops (OTM '09), Vilamoura, Portugal, pp. 277-281 | November 2009 | Other | |
| High-Speed Access to RFID Data: Meeting Real-Time Requirements in Distributed Value Chains | H. Ziekow, B. Fabian, and C. Mueller | Proceedings of the Fourth International Workshop on Enterprise Integration, Interoperability, and Networking (EI2N 2009) at the OnTheMove Federated Conferences and Workshops (OTM '09), Vilamoura, Portugal, pp. 142-151 | November 2009 | Other | |