Publication Search Results

TitleAuthorBibliographicsort descendingDateGroupLinks
On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network SitesO. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. TeixeiraICSI Technical Report TR-12-008May 2012ICSI Technical Reports[PDF]

A First Look at 1 Gbps Fiber-To-The-Home TrafficM. Sargent, B. Stack, T. Dooner, and M. AllmanICSI Technical Report TR-12-009August 2012ICSI Technical Reports[PDF]

Macroscopically Sustainable Networking: An Internet QuineB. Raghavan and S. HasanICSI Technical Report TR-12-010September 2012ICSI Technical Reports[PDF]

Making the Internet More EvolvableB. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. ShenkerICSI Technical Report TR-12-011September 2012Networking[PDF]

Content‐based Privacy for Consumer‐Produced MultimediaA. Janin, G. Friedland, and R. SommerICSI Technical Report TR-12-012October 2012Networking[PDF]

NOSIX: A Portable Switch Interface for the Network Operating SystemA. Wundsam and M.YuICSI Technical Report TR-12-013October 2012Networking[PDF]

Extracting Certificates from Live Traffic: A Near Real Time SSL Notary ServiceB. Amann, M. Vallentin, S. Hall, and R. SommerICSI Technical Report TR-12-014November 2012ICSI Technical Reports[PDF]

Revisiting SSL: A Large Scale Study of the Internet's Most Trusted ProtocolB. Amann, M. Vallentin, S. Hall, and R. SommerICSI Technical Report TR-12-015December 2012ICSI Technical Reports[PDF]

Taming the Wild: Acoustic Segmentation in Consumer‐Produced VideosB. Elizalde and G. FriedlandICSI Technical Report TR-12-016January 2013ICSI Technical Reports[PDF]

Change Blindness Reveals Distinctive Featural Processing in Size, Color, and OrientationS. X. Yu and D. LisinICSI Technical Report TR-13-001February 2013ICSI Technical Reports[PDF]

Large-scale Correlation of Accounts Across Social NetworksO. Goga, D. Perito, H. Lei, R. Teixeira, and R. SommerICSI Technical Report TR-13-002April 2013ICSI Technical Reports[PDF]

A Minimax Arc Theorem for Reducible Flow GraphsV. RamachandranICSI Technical Report TR-87-001November 1987ICSI Technical Reports[PDF]

Future Directions in DBMS ResearchE. Neuhold and M. StonebrakerICSI Technical Report TR-88-001May 1988ICSI Technical Reports[PDF]

The Cell Tree: An Index for Geometric DatabasesO. GüntherICSI Technical Report TR-88-002June 1988ICSI Technical Reports[PDF]

Measuring with Slow ClocksH. BeilnerICSI Technical Report TR-88-003July 1988ICSI Technical Reports[PDF]

MOSIX: An Integrated UNIX for Multiprocessor WorkstationsA. Barak and R. WheelerICSI Technical Report TR-88-004October 1988ICSI Technical Reports[PDF]

Static Allocation of Periodic Tasks with Precedence Restraints in Distributed SystemsK. Shin and D.-T. PengICSI Technical Report TR-88-005October 1988ICSI Technical Reports[PDF]

Load Sharing in Distributed Real-Time Systems with Broadcast State ChangesK. Shin and Y.-C. ChangICSI Technical Report TR-88-006October 1988ICSI Technical Reports[PDF]

Monitoring and Management-Support of Distributed SystemsD. Haban, D. Wybranietz, and A. BarakICSI Technical Report TR-88-007November 1988ICSI Technical Reports[PDF]

Links Between Markov Models and Multilayer PerceptronsH. Bourlard and C. J. WellekensICSI Technical Report TR-88-008November 1988ICSI Technical Reports[PDF]

Designing Programs to Check Their WorkM. BlumICSI Technical Report TR-88-009November 1988ICSI Technical Reports[PDF]

Knowledge-Intensive Recruitment LearningJ. DiederichICSI Technical Report TR-88-010November 1988ICSI Technical Reports[PDF]

Time, Space, and Form in VisionJ. FeldmanICSI Technical Report TR-88-011December 1988ICSI Technical Reports[PDF]

Time, Space and Form in VisionJ.A. FeldmanICSI Technical Report TR-88-011. Also TR244, Computer Science Department, University of Rochester, New York 1988AI
On a Theory of Computation and Complexity Over the Real Numbers; NP Completeness, Recursive Functions and Universal MachinesL. Blum, M. Shub, and S. SmaleICSI Technical Report TR-88-012December 1988ICSI Technical Reports[PDF]

Program Correctness Checking and the Design of Programs That Check Their WorkM. Blum and S. KannanICSI Technical Report TR-88-013December 1988ICSI Technical Reports[PDF]

Guaranteeing Performance for Real-Time Communication in Wide-Area NetworksD. FerrariICSI Technical Report TR-89-001January 1989ICSI Technical Reports[PDF]

Pseudo-Random Number Generator From ANY One-Way FunctionR. Impagliazzo and M. LubyICSI Technical Report TR-89-002February 1989ICSI Technical Reports[PDF]

Parallel Search for Maximal Independence Given Minimal DependenceP. Beame and M. LubyICSI Technical Report TR-89-003February 1989ICSI Technical Reports[PDF]

Towards a Theory of Average Case ComplexityS. Ben-David, B. Chor, O. Goldreich, and M. LubyICSI Technical Report TR-89-004February 1989ICSI Technical Reports[PDF]

A Study of Password SecurityM. Luby and C. RackoffICSI Technical Report TR-89-005February 1989ICSI Technical Reports[PDF]

Fault-Tolerant Routing in Hypercube Multicomputers Using Depth-First SearchM.-S. Chen and K. G. ShinICSI Technical Report TR-89-006February 1989ICSI Technical Reports[PDF]

A Linear-Time Algorithm for Enumerating Perfect Matchings in Skew Bipartite GraphsP. DagumICSI Technical Report TR-89-007February 1989ICSI Technical Reports
Spreading Activation and Connectionist Models for Natural Language ProcessingJ. DiederichICSI Technical Report TR-89-008February 1989ICSI Technical Reports[PDF]

A Constructive Omega(t(superscript 1.26)) Lower Bound for the Ramsey Number R (3,t)R. Cleve and P. DagumICSI Technical Report TR-89-009February 1989ICSI Technical Reports[PDF]

Conceptual Hierarchies in Classical and Connectionist ArchitectureA. KobsaICSI Technical Report TR-89-010February 1989ICSI Technical Reports[PDF]

Preemptive Ensemble Motion Planning on a TreeG. N. Frederickson and D. J. GuanICSI Technical Report TR-89-011March 1989ICSI Technical Reports[PDF]

Nonpreemptive Ensemble Motion Planning on a TreeG. N. Frederickson and D. J. GuanICSI Technical Report TR-89-012March 1989ICSI Technical Reports[PDF]

The Establishment of the International Computer Science Institute in Berkeley, California: Venturing with NorbertR. KayICSI Technical Report TR-89-013March 1989ICSI Technical Reports[PDF]

Subtree Isomorphism is in Random NCP. Gibbons, R. M. Karp, G. L. Miller, and D. SorokerICSI Technical Report TR-89-014March 1989ICSI Technical Reports[PDF]

Planar Graph Decomposition and All Pairs Shortest PathsG. N. FredericksonICSI Technical Report TR-89-015March 1989ICSI Technical Reports[PDF]

Explanation and Connectionist SystemsJ. DiederichICSI Technical Report TR-89-016April 1989ICSI Technical Reports[PDF]

Generalization and Parameter Estimation in Feedforward Nets: SomeN. Morgan and H. BourlardICSI Technical Report TR-89-017April 1989ICSI Technical Reports[PDF]

A Parallel Algorithm for Maximum Matching in Planar GraphsM. Karpinski, E. Dahlhaus, and A. LingasICSI Technical Report TR-89-018April 1989ICSI Technical Reports[PDF]

A More Practical PRAM ModelP. B. GibbonsICSI Technical Report TR-89-019April 1989ICSI Technical Reports[PDF]

Multiple Network Embeddings into HypercubesA. Gupta and S. E. HambruschICSI Technical Report TR-89-020April 1989ICSI Technical Reports[PDF]

Learning Read-Once Formulas Using Membership QueriesL. Hellerstein and M. KarpinskiICSI Technical Report TR-89-021April 1989ICSI Technical Reports[PDF]

Real-Time Communication in Packet-Switching Wide-Area NetworksD. FerrariICSI Technical Report TR-89-022May 1989ICSI Technical Reports[PDF]

Approximating the Permanent of Graphs with Large FactorsP. Dagum and M. LubyICSI Technical Report TR-89-023April 1989ICSI Technical Reports[PDF]

An Efficient Parallel Algorithm for the Minimal Elimination Ordering (MEO)E. Dahlhaus and M. KarpinskiICSI Technical Report TR-89-024May 1989ICSI Technical Reports[PDF]

Pages