Publication Search Results

Titlesort descendingAuthorBibliographicDateGroupLinks
Automatic Speech Recognition with an Adaptation Model Motivated by Auditory ProcessingM. Holmberg, D. Gelbart, and W. HemmertIEEE Transactions on Speech and Audio Processing, Vol. 14, Issue 1, pp. 44-49January 2006Speech[PDF]

Automatic Speech Recognition with Neural Spike TrainsM. Holmberg, D. Gelbart, U. Ramacher, and W. HemmertProceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005), Lisboa, PortugalSeptember 2005Speech[PDF]

Automatic Tagging and Geo-Tagging in Video Collections and CommunitiesM. Larson, M. Soleymani, P. Serdyukov, S. Rudinac, C. Wartena, V. Murdock, G. Friedland, R. Ordelman, and G. J. F. JonesProceedings of the ACM International Conference on Multimedia Retrieval (ICMR 2011), Trento, Italy, April 2011April 2011Speech[PDF]

Automatic Transcription of Prosodic Stress for Spontaneous English DiscourseR. Silipo and S. GreenbergProceedings of the International Congress of Phonetic Sciences, San Francisco, California, Vol. 3, pp. 2351-2354August 1999Speech[PDF]

Automatic Weighting for the Combination of TDOA and Acoustic Features in Speaker Diarization for MeetingsX. Anguera, C. Wooters, J. Pardo, and J. HernandoProceedings of International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007), Honolulu, Hawaii, Vol. 4, pp. 241-244April 2007Speech[PDF]

Automatic Worst Case Complexity Analysis of Parallel ProgramsW. ZimmermannICSI Technical Report TR-90-066December 1990ICSI Technical Reports[PDF]

Automatically Generated Prosodic Cues to Lexically Ambiguous Dialog Acts in Multiparty MeetingsS. Bhagat, H. Carvey, and E. ShribergProceedings of the 15th International Congress of Phonetic Sciences (ICPhS 2003), Barcelona, SpainAugust 2003Speech[PDF]

Automating Analysis of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonProceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22March 2009Networking[PDF]

Autonomous and Scalable Failure Detection in Distributed SystemsB. Satzger, A. Pietzowski, and T. UngererInternational Journal of Autonomous and Adaptive Communications Systems, Vol. 4, No.1, pp. 61-77January 2011Algorithms
Autoregressive Modeling of Hilbert Envelopes for Wide-Band Audio CodingS. Ganapathy, P. Motlicek, H. Hermansky, and H. GarudadriProceedings of 124th Convention of Audio Engineering Society (AES), Amsterdam, the Netherlands, paper 7481May 2008Speech
Average Case Analyses of List Update Algorithms, with Applications to Data CompressionS. Albers and M. MitzenmacherICSI Technical Report TR-95-039August 1995ICSI Technical Reports[PDF]

Average case analysis of a heuristic for the assignment problemR.M. Karp, A.H.G. Rinnooy Kan, and R.V. VohraMathematics of Operations Research, Vol. 19, No. 3, pp. 513-22August 1994Algorithms
Average Case Analysis of Dynamic Graph AlgorithmsD. Alberts and M. R. HenzingerICSI Technical Report TR-95-020May 1995ICSI Technical Reports[PDF]

Average Update Times for Fully-Dynamic All-Pairs Shortest PathsT. Friedrich and N. HebbinghausProceedings of International Symposium on Algorithms and Computation (ISAAC), Gold Coast, Australia, pp. 693-704December 2008Algorithms[PDF]

Average-Case Analysis of Incremental Topological OrderingD. Ajwani and T. FriedrichDiscrete Applied Mathematics, Vol. 158, Issue 4, pp. 240-250February 2010Algorithms[PDF]

Avoiding Forbidden Submatrices by Row DeletionsS. Wernicke, J. Alber, J. Gramm, J. Guo, and R. NiedermeierProceedings of SOFSEM 04, LNCS, Vol. 2832, pp. 349-360, SpringerJanuary 05 2004Algorithms
Background to FramenetC.J. Fillmore, C.R. Johnson, and M.R.L. PetruckInternational Journal of Lexicography, Vol 16.3: 235-250. 2003. 2003AI
Backoff Model Training Using Partially Observed Data: Application to Dialog Act TaggingG. Ji and J. BilmesProceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2006), New York City, New York, pp. 280-287June 2006Speech[PDF]

Backwards Analysis of Randomized Geometric AlgorithmsR. SeidelICSI Technical Report TR-92-014February 1992ICSI Technical Reports[PDF]

Bad-Mouthing FramesJ.A. FeldmanProceedings of the First Conference on Theoretical Issues in Natural Language Processing, Cambridge, MassachusettsJune 1975AI
Balancing the Traffic Load in Wireless Networks with Curveball RoutingL. Popa, A. Rostami, R. M. Karp, C. Papadimitriou, and I. StoicaProceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007), Montreal, CanadaSeptember 2007Algorithms
Barter Trade Improves Message Delivery in Opportunistic NetworksL. Buttyan, L. Dora, M. Felegyhazi, and I. VajdaAd Hoc Networks, Vol. 8, Issue 1, pp. 1-14January 2010Networking[PDF]

Bayesian Haplotype Inference via the Dirichlet ProcessE.P. Xing, R. Sharan, and M.I. JordanProceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNP and Haplotypes, pp. 99-112; Also In Proceedings of ICML 2004January 05 2004Algorithms
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless SensornetsR. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. StoicaProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342May 2005Networking[PDF]

Beamforming using a spherical microphone array based on legacy microphone characteristicsN. Peters and A. W. SchmederProceedings of the International Conference on Spatial Audio (ICSA 2011), Detmold, GermanyNovember 2011Other[PDF]

Behavior and Performance Analysis of Distributed Systems Using a HybridD. Haban and D. WybranietzICSI Technical Report TR-89-029May 1989ICSI Technical Reports[PDF]

Best Papers from the 10th IEEE International Symposium on MultimediaG. Friedland and S.-C. Shen, eds.International Journal on Semantic Computing (IJSC), World Scientific, Vol. 3, Issue 2June 2009Speech
Best Papers from the Second IEEE International Conference on Semantic Computing (IJSC)G. Friedland and C. Martell, eds.International Journal on Semantic Computing (IJSC), Vol. 2, Issue 3September 2008Speech
Best-Effort versus Reservations: A Simple Comparative AnalysisL. Breslau and S. ShenkerACM Computer Communication Review, Vol. 28, pp. 3-16September 1998Networking
Best-First Model Merging for Dynamic Learning and RecognitionS. M. OmohundroICSI Technical Report TR-92-004January 1992ICSI Technical Reports[PDF]

Best-First Model Merging for Hidden Markov Model InductionA. Stolcke and S. M. OmohundroICSI Technical Report TR-94-003January 1994ICSI Technical Reports[PDF]

Better Word Alignments with Supervised ITG ModelsA. Haghighi, J. Blitzer, J. DeNero, and D. KleinProceedings of the Joint Conference of the 47th Annual Meeting of the Association for Computational Linguistics and the Fourth International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing (ACL-IJCNLP 2009), SingaporeAugust 2009Speech[PDF]

Beyond Classification -- Large-Scale Gaussian Process Inference and Uncertainty PredictionA. Freytag, E. Rodner, P. Bodesheim, and J. DenzlerPresented at the BigVision Workshop at the 26th Annual Conference on Neural Information Processing Systems (NIPS 2012), Lake Tahoe, NevadaDecember 2012Vision[PDF]

Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-ReduceJ. Hendrik Boese, A. Andrzejak, and M. HoegqvistProceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3April 2010Networking
Beyond Pilots: Keeping Rural Wireless Networks AliveS. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. BrewerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, CaliforniaApril 2008Networking[PDF]

Beyond Spatial Pyramids: Receptive Field Learning for Pooled Image FeaturesY. Jia, C. Huang, and T. DarrellProceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), Providence, Rhode Island, pp. 3370-3377June 2012Vision[PDF]

Beyond Syntactic Valence: FrameNet Markup of Example Sentences in a Slovenian-German Online DictionaryB. Loenneker-RodmanProceedings of Fourth International Seminar on Computer Treatment of Slavic and East European Languages (Slovko 2007), Bratislava, Slovakia, pp. 152-164October 2007AI[PDF]

Big Dumb Neural Nets: A Working Brute Force Approach to Speech RecognitionN. MorganProceedings of the International Conference on Neural Networks, Vol. VII, pp. 4462-4465 1994Speech
Bilingual FrameNet Dictionaries for Machine TranslationH. C. BoasProceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002), Las Palmas, Spain, Vol. IV, pp. 1364-1371May 2002AI[PDF]

binpac: A yacc for Writing Application Protocol ParsersR. Pang, V. Paxson, R. Sommer, and L. PetersonProceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300October 2006Networking[PDF]

Biological grounding of recruitment learning and vicinal algorithms in long-term potentiationL. ShastriIn Emergent neural computational architectures based on neuroscience, J. Austin, S. Wermter, and D. Wilshaw (Eds.), pp. 348-367, Springer-Verlag 2001AI
Bird Species Recognition Combining Acoustic and Sequence ModelingM. Graciarena, M. Delplanche, E. Shriberg, and A. StolckeProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 341-344May 2011Speech[PDF]

Birdlets: Subordinate Categorization Using Volumetric Primitives and Pose-Normalized AppearanceR. Farrell, O. Oza, N. Zhang, V. Morariu, T. Darrell, and L. DavisProceedings of the International Conference on Computer Vision (ICCV), Barcelona, Spain, pp. 161-168November 2011Vision[PDF]

Black Box Cryptanalysis of Hash Networks Based on MultipermutationsC. P. Schnorr and S. VaudenayICSI Technical Report TR-94-017April 1994ICSI Technical Reports[PDF]

Block Korkin-Zolotarev Bases and Successive MinimaC. P. SchnorrICSI Technical Report tr-92-063September 1992ICSI Technical Reports[PDF]

Book Review, Crangle and Suppes, “Language Learning"J. FeldmanComputational Linguistics 1996AI
Boolean Circuit Complexity of Algebraic Interpolation ProblemsM. KarpinskiICSI Technical Report TR-89-027May 1989ICSI Technical Reports[PDF]

Boot AlgebrasD. Schuett, U. Eckhardt, and P. SudaICSI Technical Report TR-92-039June 1992ICSI Technical Reports[PDF]

Botnet Judo: Fighting Spam with ItselfA. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. SavageProceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, CaliforniaFebruary 2010Networking[PDF]

Bounded branching process and AND/OR tree evaluationR. M. Karp and Y. ZhangRandom Structures & Algorithms, Vol. 7, No. 2, pp. 97-116September 1995Algorithms

Pages