| Automatic Speech Recognition with an Adaptation Model Motivated by Auditory Processing | M. Holmberg, D. Gelbart, and W. Hemmert | IEEE Transactions on Speech and Audio Processing, Vol. 14, Issue 1, pp. 44-49 | January 2006 | Speech | [PDF]
|
| Automatic Speech Recognition with Neural Spike Trains | M. Holmberg, D. Gelbart, U. Ramacher, and W. Hemmert | Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005), Lisboa, Portugal | September 2005 | Speech | [PDF]
|
| Automatic Tagging and Geo-Tagging in Video Collections and Communities | M. Larson, M. Soleymani, P. Serdyukov, S. Rudinac, C. Wartena, V. Murdock, G. Friedland, R. Ordelman, and G. J. F. Jones | Proceedings of the ACM International Conference on Multimedia Retrieval (ICMR 2011), Trento, Italy, April 2011 | April 2011 | Speech | [PDF]
|
| Automatic Transcription of Prosodic Stress for Spontaneous English Discourse | R. Silipo and S. Greenberg | Proceedings of the International Congress of Phonetic Sciences, San Francisco, California, Vol. 3, pp. 2351-2354 | August 1999 | Speech | [PDF]
|
| Automatic Weighting for the Combination of TDOA and Acoustic Features in Speaker Diarization for Meetings | X. Anguera, C. Wooters, J. Pardo, and J. Hernando | Proceedings of International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007), Honolulu, Hawaii, Vol. 4, pp. 241-244 | April 2007 | Speech | [PDF]
|
| Automatic Worst Case Complexity Analysis of Parallel Programs | W. Zimmermann | ICSI Technical Report TR-90-066 | December 1990 | ICSI Technical Reports | [PDF]
|
| Automatically Generated Prosodic Cues to Lexically Ambiguous Dialog Acts in Multiparty Meetings | S. Bhagat, H. Carvey, and E. Shriberg | Proceedings of the 15th International Congress of Phonetic Sciences (ICPhS 2003), Barcelona, Spain | August 2003 | Speech | [PDF]
|
| Automating Analysis of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | Proceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22 | March 2009 | Networking | [PDF]
|
| Autonomous and Scalable Failure Detection in Distributed Systems | B. Satzger, A. Pietzowski, and T. Ungerer | International Journal of Autonomous and Adaptive Communications Systems, Vol. 4, No.1, pp. 61-77 | January 2011 | Algorithms | |
| Autoregressive Modeling of Hilbert Envelopes for Wide-Band Audio Coding | S. Ganapathy, P. Motlicek, H. Hermansky, and H. Garudadri | Proceedings of 124th Convention of Audio Engineering Society (AES), Amsterdam, the Netherlands, paper 7481 | May 2008 | Speech | |
| Average Case Analyses of List Update Algorithms, with Applications to Data Compression | S. Albers and M. Mitzenmacher | ICSI Technical Report TR-95-039 | August 1995 | ICSI Technical Reports | [PDF]
|
| Average case analysis of a heuristic for the assignment problem | R.M. Karp, A.H.G. Rinnooy Kan, and R.V. Vohra | Mathematics of Operations Research, Vol. 19, No. 3, pp. 513-22 | August 1994 | Algorithms | |
| Average Case Analysis of Dynamic Graph Algorithms | D. Alberts and M. R. Henzinger | ICSI Technical Report TR-95-020 | May 1995 | ICSI Technical Reports | [PDF]
|
| Average Update Times for Fully-Dynamic All-Pairs Shortest Paths | T. Friedrich and N. Hebbinghaus | Proceedings of International Symposium on Algorithms and Computation (ISAAC), Gold Coast, Australia, pp. 693-704 | December 2008 | Algorithms | [PDF]
|
| Average-Case Analysis of Incremental Topological Ordering | D. Ajwani and T. Friedrich | Discrete Applied Mathematics, Vol. 158, Issue 4, pp. 240-250 | February 2010 | Algorithms | [PDF]
|
| Avoiding Forbidden Submatrices by Row Deletions | S. Wernicke, J. Alber, J. Gramm, J. Guo, and R. Niedermeier | Proceedings of SOFSEM 04, LNCS, Vol. 2832, pp. 349-360, Springer | January 05 2004 | Algorithms | |
| Background to Framenet | C.J. Fillmore, C.R. Johnson, and M.R.L. Petruck | International Journal of Lexicography, Vol 16.3: 235-250. 2003. | 2003 | AI | |
| Backoff Model Training Using Partially Observed Data: Application to Dialog Act Tagging | G. Ji and J. Bilmes | Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2006), New York City, New York, pp. 280-287 | June 2006 | Speech | [PDF]
|
| Backwards Analysis of Randomized Geometric Algorithms | R. Seidel | ICSI Technical Report TR-92-014 | February 1992 | ICSI Technical Reports | [PDF]
|
| Bad-Mouthing Frames | J.A. Feldman | Proceedings of the First Conference on Theoretical Issues in Natural Language Processing, Cambridge, Massachusetts | June 1975 | AI | |
| Balancing the Traffic Load in Wireless Networks with Curveball Routing | L. Popa, A. Rostami, R. M. Karp, C. Papadimitriou, and I. Stoica | Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007), Montreal, Canada | September 2007 | Algorithms | |
| Barter Trade Improves Message Delivery in Opportunistic Networks | L. Buttyan, L. Dora, M. Felegyhazi, and I. Vajda | Ad Hoc Networks, Vol. 8, Issue 1, pp. 1-14 | January 2010 | Networking | [PDF]
|
| Bayesian Haplotype Inference via the Dirichlet Process | E.P. Xing, R. Sharan, and M.I. Jordan | Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNP and Haplotypes, pp. 99-112; Also In Proceedings of ICML 2004 | January 05 2004 | Algorithms | |
| Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets | R. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. Stoica | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342 | May 2005 | Networking | [PDF]
|
| Beamforming using a spherical microphone array based on legacy microphone characteristics | N. Peters and A. W. Schmeder | Proceedings of the International Conference on Spatial Audio (ICSA 2011), Detmold, Germany | November 2011 | Other | [PDF]
|
| Behavior and Performance Analysis of Distributed Systems Using a Hybrid | D. Haban and D. Wybranietz | ICSI Technical Report TR-89-029 | May 1989 | ICSI Technical Reports | [PDF]
|
| Best Papers from the 10th IEEE International Symposium on Multimedia | G. Friedland and S.-C. Shen, eds. | International Journal on Semantic Computing (IJSC), World Scientific, Vol. 3, Issue 2 | June 2009 | Speech | |
| Best Papers from the Second IEEE International Conference on Semantic Computing (IJSC) | G. Friedland and C. Martell, eds. | International Journal on Semantic Computing (IJSC), Vol. 2, Issue 3 | September 2008 | Speech | |
| Best-Effort versus Reservations: A Simple Comparative Analysis | L. Breslau and S. Shenker | ACM Computer Communication Review, Vol. 28, pp. 3-16 | September 1998 | Networking | |
| Best-First Model Merging for Dynamic Learning and Recognition | S. M. Omohundro | ICSI Technical Report TR-92-004 | January 1992 | ICSI Technical Reports | [PDF]
|
| Best-First Model Merging for Hidden Markov Model Induction | A. Stolcke and S. M. Omohundro | ICSI Technical Report TR-94-003 | January 1994 | ICSI Technical Reports | [PDF]
|
| Better Word Alignments with Supervised ITG Models | A. Haghighi, J. Blitzer, J. DeNero, and D. Klein | Proceedings of the Joint Conference of the 47th Annual Meeting of the Association for Computational Linguistics and the Fourth International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing (ACL-IJCNLP 2009), Singapore | August 2009 | Speech | [PDF]
|
| Beyond Classification -- Large-Scale Gaussian Process Inference and Uncertainty Prediction | A. Freytag, E. Rodner, P. Bodesheim, and J. Denzler | Presented at the BigVision Workshop at the 26th Annual Conference on Neural Information Processing Systems (NIPS 2012), Lake Tahoe, Nevada | December 2012 | Vision | [PDF]
|
| Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce | J. Hendrik Boese, A. Andrzejak, and M. Hoegqvist | Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3 | April 2010 | Networking | |
| Beyond Pilots: Keeping Rural Wireless Networks Alive | S. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. Brewer | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California | April 2008 | Networking | [PDF]
|
| Beyond Spatial Pyramids: Receptive Field Learning for Pooled Image Features | Y. Jia, C. Huang, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), Providence, Rhode Island, pp. 3370-3377 | June 2012 | Vision | [PDF]
|
| Beyond Syntactic Valence: FrameNet Markup of Example Sentences in a Slovenian-German Online Dictionary | B. Loenneker-Rodman | Proceedings of Fourth International Seminar on Computer Treatment of Slavic and East European Languages (Slovko 2007), Bratislava, Slovakia, pp. 152-164 | October 2007 | AI | [PDF]
|
| Big Dumb Neural Nets: A Working Brute Force Approach to Speech Recognition | N. Morgan | Proceedings of the International Conference on Neural Networks, Vol. VII, pp. 4462-4465 | 1994 | Speech | |
| Bilingual FrameNet Dictionaries for Machine Translation | H. C. Boas | Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002), Las Palmas, Spain, Vol. IV, pp. 1364-1371 | May 2002 | AI | [PDF]
|
| binpac: A yacc for Writing Application Protocol Parsers | R. Pang, V. Paxson, R. Sommer, and L. Peterson | Proceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300 | October 2006 | Networking | [PDF]
|
| Biological grounding of recruitment learning and vicinal algorithms in long-term potentiation | L. Shastri | In Emergent neural computational architectures based on neuroscience, J. Austin, S. Wermter, and D. Wilshaw (Eds.), pp. 348-367, Springer-Verlag | 2001 | AI | |
| Bird Species Recognition Combining Acoustic and Sequence Modeling | M. Graciarena, M. Delplanche, E. Shriberg, and A. Stolcke | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 341-344 | May 2011 | Speech | [PDF]
|
| Birdlets: Subordinate Categorization Using Volumetric Primitives and Pose-Normalized Appearance | R. Farrell, O. Oza, N. Zhang, V. Morariu, T. Darrell, and L. Davis | Proceedings of the International Conference on Computer Vision (ICCV), Barcelona, Spain, pp. 161-168 | November 2011 | Vision | [PDF]
|
| Black Box Cryptanalysis of Hash Networks Based on Multipermutations | C. P. Schnorr and S. Vaudenay | ICSI Technical Report TR-94-017 | April 1994 | ICSI Technical Reports | [PDF]
|
| Block Korkin-Zolotarev Bases and Successive Minima | C. P. Schnorr | ICSI Technical Report tr-92-063 | September 1992 | ICSI Technical Reports | [PDF]
|
| Book Review, Crangle and Suppes, “Language Learning" | J. Feldman | Computational Linguistics | 1996 | AI | |
| Boolean Circuit Complexity of Algebraic Interpolation Problems | M. Karpinski | ICSI Technical Report TR-89-027 | May 1989 | ICSI Technical Reports | [PDF]
|
| Boot Algebras | D. Schuett, U. Eckhardt, and P. Suda | ICSI Technical Report TR-92-039 | June 1992 | ICSI Technical Reports | [PDF]
|
| Botnet Judo: Fighting Spam with Itself | A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. Savage | Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, California | February 2010 | Networking | [PDF]
|
| Bounded branching process and AND/OR tree evaluation | R. M. Karp and Y. Zhang | Random Structures & Algorithms, Vol. 7, No. 2, pp. 97-116 | September 1995 | Algorithms | |