| BPEL Remote Objects: Integrating BPEL Processes into Object-Oriented Applications | M. Ferber, S. Hunold, and T. Rauber | Proceedings of the 7th International Conference on Services Computing (IEEE SCC 2010), Miami, Florida | July 2010 | Architecture | [PDF]
|
| Brains and Robots, Two Weak Attempts at the Grand Synthesis | J.A. Feldman | Review for Cognition and Brain Theory | 1984 | AI | |
| Branch and Infer: A Unifying Framework for Integer and Nite Domain Constraint Programming | A. Bockmayr and T. Kasper | INFORMS Journal on Computing, 10(3): 287-300, 1998. | 1998 | Algorithms | |
| Brief Announcement: Prefix Hash Tree | S. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. Shenker | Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367 | July 2004 | Networking | [PDF]
|
| Bringing Devices to the Masses: A Comparative Study of the Brazilian Computador Popular and the Indian Simputer | J. Pal with R. Fonseca | http://www.sims.berkeley.edu/~joyojeet/Simputer-CP.doc | December 2003 | BCIS (archived) | [PDF]
|
| BRITE: A Flexible Generator of Internet Topologies | A. Medina and I. Matta | BU-CS-TR-2000-005. January 21, 2000. | January 21 2000 | Networking | |
| BRITE: An Approach to Universal Topology Generation | A. Medina, A. Lakhina, I. Matta, and J. Byers | Proceedings of MASCOTS 2001. IEEE Computer Society, August 2001. | August 2001 | Networking | |
| BRITE: Universal Topology Generation From a User's Perspective | A. Medina, A. Lakhina, I. Matta, and J. Byers | BU-CS-TR-2001-003. April 05, 2001. | April 05 2001 | Networking | |
| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999. | December 14 1999 | Networking | |
| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas | January 1998 | Networking | |
| Broadcasting Time Cannot be Approximated Within a Factor of 57/56-epsilon | C. Schindelhauer | ICSI Technical Report TR-00-002 | March 2000 | ICSI Technical Reports | [PDF]
|
| Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity | C. Kreibich | Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118 | April 2005 | Networking | [PDF]
|
| Buffer Space Allocation for Real-Time Channels in a Packet-Switching Network | D. Ferrari and D. C. Verma | ICSI Technical Report TR-90-022 | June 1990 | ICSI Technical Reports | [PDF]
|
| Building a Highly Accurate Mandarin Speech Recognizer | M-Y. Hwang, G. Peng, W. Wang, A. Faria, and A. Heidel | Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding, Kyoto, Japan, pp. 490-495 | December 2007 | Speech | [PDF]
|
| Building a Large Lexical Databank Which Provides Deep Semantics | C.J. Fillmore, C. Wooters, and C.F. Baker | Proceedings of the Pacific Asian Conference on Language, Information and Computation (PACLIC), Hong Kong | 2001 | AI | |
| Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic | S. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. Sommer | Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272 | October 2005 | Networking | [PDF]
|
| Building Convex Space Partitions Induced by Pairwise Interior-Disjoint Simplices | M. Pellegrini | ICSI Technical Report TR-93-039 | August 1993 | ICSI Technical Reports | [PDF]
|
| Building Efficient Wireless Sensor Networks With Low-Level Naming | J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan | Proceedings of the Symposium on Operating Systems Principles, Banff, Canada, October 2001. | October 2001 | Networking | |
| Building Extensible Networks with Rule-Based Forwarding | L. Popa, N. Egi, S. Ratnasamy, and I. Stoica | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391 | October 2010 | Networking | [PDF]
|
| Building Many-Core Processor-to-DRAM Networks with Monolithic CMOS Silicon Photonics | C. Batten, A. Joshi, J. Orcutt, A. Khilo, B. Moss, C. Holzwarth, M. Popović, H. Li, H. Smith, J. Hoyt, F. Kärtner, R. Ram, V. Stojanović, and K. Asanović | IEEE Micro, Vol. 29, Issue 4, pp. 8-21 | July 2009 | Architecture | [PDF]
|
| Building Manycore Processor-to-DRAM Networks with Monolithic Silicon Photonics | C. Batten, A. Joshi, J. Orcutt, A. Khilo, B. Moss, C. Holzwarth, M. Popovic, H. Li, H. Smith, J. Hoyt, F. Kärtner, R. Ram, V. Stojanovic, and K. Asanović | Proceedings of IEEE Symposium on High-Performance Interconnects (Hot Interconnects 2008), Stanford, California, pp. 21-30 | August 2008 | Architecture | [PDF]
|
| Building Multiple Pronunication Models for Novel Words using Exploratory Computational Phonology | G. Tajchman, E. Fosler, and D. Jurafsky | Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95), Madrid, Spain | September 1995 | Speech | [PDF]
|
| Bumptrees for Efficient Function, Constraint, and Classification Learning | S. M. Omohundro | ICSI Technical Report TR-91-009 | January 1991 | ICSI Technical Reports | [PDF]
|
| Buried Markov Models for Speech Recognition | J. Bilmes | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999), Phoenix, Arizona, pp. II-713-716 | March 1999 | Speech | [PDF]
|
| Calculations for Cosmic Axion Detection | L. Krauss, J. Moody, F. Wilczek, and D. Morris | Physical Review Letters, Vol. 55, Issue 17, pp. 1797-1800 | 1985 | Algorithms | |
| Can Conversational Word Usage Be Used to Predict Speaker Demographics? | D. Gillick | Proceedings of the 11th Internationational Conference of the International Speech Communication Association (Interspeech 2010), Makuhari, Japan | September 2010 | Speech | [PDF]
|
| Can Heterogeneity Make Gnutella Scalable? | Q. Lv, S. Ratnasamy, and S. Shenker | The First International Workshop on Peer-to-Peer Systems (IPTPS): 94-103, 2002. | 2002 | Networking | |
| Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise? | T. Ouyang, S. Ray, M. Rabinovich, and M. Allman | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Can Prosody Aid the Automatic Processing of Multi-Party Meetings? Evidence from Predicting Punctuation, Disfluencies, and Overlapping Speech | E. Shriberg, A. Stolcke, and D. Baron | Proceedings of the ISCA Tutorial and Research Workshop on Prosody in Speech Recognition and Understanding, Red Bank, New Jersey | October 2001 | Speech | [PDF]
|
| Can Software Routers Scale? | K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. Ratnasamy | Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, Washington | August 2008 | Networking | [PDF]
|
| Can We Escape the Trough of Disillusionment?--A Perspective on E-learning Technology Research from the ACM Workshop on Educational Multimedia and Multimedia Education | G. Friedland, L. Knipping, W. Huerst, and M. Muhlhauser | ACM E-Learn Journal | February 2009 | Speech | |
| Can We Utilize the Cancellation of the Most Significant Digits? | V. Pan | ICSI Technical Report TR-92-061 | December 1992 | ICSI Technical Reports | [PDF]
|
| Capacity Control for Partially Ordered Feature Sets | U. Rueckert | Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2009), Part II, Bled, Slovenia, pp. 318-333 | September 2009 | Algorithms | [PDF]
|
| Capacity Limitations in the Integration of Information Across Saccades | J.A. Feldman, M. Hayhoe, and J. Lachter | Paper presented at ARVO 1991 | 1991 | AI | |
| Capturing Long-Term User Interests in Online Television News Program | F. Hopfgartner | In TV Content Analysis: Techniques and Applications, Chapter 11, CRC Press | 2011 | AI | |
| Carat: Collaborative Energy Bug Detection | A. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. Tarkoma | Poster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, California | April 2012 | Networking | |
| Cascaded Model Adaptation for Dialog Act Segmentation and Tagging | U. Guz, G. Tur, D. Hakkani-Tür, and S. Cuendet | Journal of Computer Speech and Language, Vol. 24, Issue 2, pp. 289-306 | April 2010 | Speech | |
| Cased-Based Reasoning: A New Technology for Experience Based Construction of Knowledge Systems | K. Althoff, M. Richter, and W. Wilke | ICSI Technical Report TR-97-008 | March 1997 | ICSI Technical Reports | [PDF]
|
| Categorial Perception | M. Fritz, M. Andriluka, S. Fidler, M. Stark, A. Leonardis, and B. Schiele | In Cognitive Systems, H. I. Christensen, G.-J. Kruijff, A. Sloman, and J. Wyatt, eds., Springer, pp. 131-164 | 2010 | Vision | |
| Categorical Perception of Color is Lateralized to the Right Hemisphere in Infants, but to the Left Hemisphere in Adults | A. Franklin, G. V. Drivonikou, L. Bevis, P. Kay, and T. Regier | Proceedings of the National Academy of Sciences of the United States of America, Vol. 105, No. 9, pp. 3221-3225. DOI:10.1073/pnas.0712286105. | March 2008 | AI | [PDF]
|
| CDNN: A Context Dependent Neural Network for Continuous Speech Recognition | H. Bourlard, N. Morgan, C. Wooters, and S. Renals | Proceedings of IEEE International Conference on Acoustics, Speech & Signal Processing, San Francisco, California, pp. II-349-352 | 1992 | Speech | |
| Challenges for Theory of Computing | A. Condon, H. Edelsbrunner, E.A. Emerson, L. Fortnow, et.al. | SIGACT News, June 1999, vol.30, (no.2):62-76. | June 1999 | Algorithms | |
| Change Blindness Reveals Distinctive Featural Processing in Size, Color, and Orientation | S. X. Yu and D. Lisin | ICSI Technical Report TR-13-001 | February 2013 | ICSI Technical Reports | [PDF]
|
| Channel Groups: A Unifying Abstraction for Specifying Inter-stream Relationships | A. Gupta and M. Moran | ICSI Technical Report TR-93-015 | March 1993 | ICSI Technical Reports | [PDF]
|
| Chapter 17: The Transcription of Discourse | J. Edwards | The Handbook of Discourse Analysis, D. Shriffrin, D. Tannen and H. Hamilton, eds. Oxford: Blackwell, pp. 321-348 | 2001 | Speech | |
| Characteristics of Internet Background Radiation | R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Characterization of Video Traffic | R. Garg | ICSI Technical Report TR-95-007 | January 1995 | ICSI Technical Reports | [PDF]
|
| Characterizing the Variability of Arrival Processes with Indices of Dispersion | R. Gusella | ICSI Technical Report TR-90-051 | September 1990 | ICSI Technical Reports | [PDF]
|
| CHCL - A Connectionist Inference System for Horn Logic Based on the Connection Method and using Limited Resources | S. Hoelldobler | ICSI Technical Report TR-90-042 | August 1990 | ICSI Technical Reports | [PDF]
|
| CHCL--A Connectionist Inference System | S. Hoelldobler and F. Kurfess | ICSI Technical Report TR-91-052 | October 1991 | ICSI Technical Reports | [PDF]
|