Publication Search Results

Titlesort descendingAuthorBibliographicDateGroupLinks
BPEL Remote Objects: Integrating BPEL Processes into Object-Oriented ApplicationsM. Ferber, S. Hunold, and T. RauberProceedings of the 7th International Conference on Services Computing (IEEE SCC 2010), Miami, FloridaJuly 2010Architecture[PDF]

Brains and Robots, Two Weak Attempts at the Grand SynthesisJ.A. FeldmanReview for Cognition and Brain Theory 1984AI
Branch and Infer: A Unifying Framework for Integer and Nite Domain Constraint ProgrammingA. Bockmayr and T. KasperINFORMS Journal on Computing, 10(3): 287-300, 1998. 1998Algorithms
Brief Announcement: Prefix Hash TreeS. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367July 2004Networking[PDF]

Bringing Devices to the Masses: A Comparative Study of the Brazilian Computador Popular and the Indian SimputerJ. Pal with R. Fonsecahttp://www.sims.berkeley.edu/~joyojeet/Simputer-CP.docDecember 2003BCIS (archived)[PDF]

BRITE: A Flexible Generator of Internet TopologiesA. Medina and I. MattaBU-CS-TR-2000-005. January 21, 2000.January 21 2000Networking
BRITE: An Approach to Universal Topology GenerationA. Medina, A. Lakhina, I. Matta, and J. ByersProceedings of MASCOTS 2001. IEEE Computer Society, August 2001.August 2001Networking
BRITE: Universal Topology Generation From a User's PerspectiveA. Medina, A. Lakhina, I. Matta, and J. ByersBU-CS-TR-2001-003. April 05, 2001.April 05 2001Networking
Bro: A System for Detecting Network Intruders in Real-TimeV. PaxsonComputer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999.December 14 1999Networking
Bro: A System for Detecting Network Intruders in Real-TimeV. PaxsonProceedings of the 7th USENIX Security Symposium, San Antonio, TexasJanuary 1998Networking
Broadcasting Time Cannot be Approximated Within a Factor of 57/56-epsilonC. SchindelhauerICSI Technical Report TR-00-002March 2000ICSI Technical Reports[PDF]

Brooery: A Graphical Environment for Analysis of Security-Relevant Network ActivityC. KreibichProceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118April 2005Networking[PDF]

Buffer Space Allocation for Real-Time Channels in a Packet-Switching NetworkD. Ferrari and D. C. VermaICSI Technical Report TR-90-022June 1990ICSI Technical Reports[PDF]

Building a Highly Accurate Mandarin Speech RecognizerM-Y. Hwang, G. Peng, W. Wang, A. Faria, and A. HeidelProceedings of IEEE Workshop on Automatic Speech Recognition and Understanding, Kyoto, Japan, pp. 490-495December 2007Speech[PDF]

Building a Large Lexical Databank Which Provides Deep SemanticsC.J. Fillmore, C. Wooters, and C.F. BakerProceedings of the Pacific Asian Conference on Language, Information and Computation (PACLIC), Hong Kong 2001AI
Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network TrafficS. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. SommerProceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272October 2005Networking[PDF]

Building Convex Space Partitions Induced by Pairwise Interior-Disjoint SimplicesM. PellegriniICSI Technical Report TR-93-039August 1993ICSI Technical Reports[PDF]

Building Efficient Wireless Sensor Networks With Low-Level NamingJ. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. GanesanProceedings of the Symposium on Operating Systems Principles, Banff, Canada, October 2001.October 2001Networking
Building Extensible Networks with Rule-Based ForwardingL. Popa, N. Egi, S. Ratnasamy, and I. StoicaProceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391October 2010Networking[PDF]

Building Many-Core Processor-to-DRAM Networks with Monolithic CMOS Silicon PhotonicsC. Batten, A. Joshi, J. Orcutt, A. Khilo, B. Moss, C. Holzwarth, M. Popović, H. Li, H. Smith, J. Hoyt, F. Kärtner, R. Ram, V. Stojanović, and K. AsanovićIEEE Micro, Vol. 29, Issue 4, pp. 8-21July 2009Architecture[PDF]

Building Manycore Processor-to-DRAM Networks with Monolithic Silicon PhotonicsC. Batten, A. Joshi, J. Orcutt, A. Khilo, B. Moss, C. Holzwarth, M. Popovic, H. Li, H. Smith, J. Hoyt, F. Kärtner, R. Ram, V. Stojanovic, and K. AsanovićProceedings of IEEE Symposium on High-Performance Interconnects (Hot Interconnects 2008), Stanford, California, pp. 21-30August 2008Architecture[PDF]

Building Multiple Pronunication Models for Novel Words using Exploratory Computational PhonologyG. Tajchman, E. Fosler, and D. JurafskyProceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95), Madrid, SpainSeptember 1995Speech[PDF]

Bumptrees for Efficient Function, Constraint, and Classification LearningS. M. OmohundroICSI Technical Report TR-91-009January 1991ICSI Technical Reports[PDF]

Buried Markov Models for Speech RecognitionJ. BilmesProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999), Phoenix, Arizona, pp. II-713-716March 1999Speech[PDF]

Calculations for Cosmic Axion DetectionL. Krauss, J. Moody, F. Wilczek, and D. MorrisPhysical Review Letters, Vol. 55, Issue 17, pp. 1797-1800 1985Algorithms
Can Conversational Word Usage Be Used to Predict Speaker Demographics?D. GillickProceedings of the 11th Internationational Conference of the International Speech Communication Association (Interspeech 2010), Makuhari, JapanSeptember 2010Speech[PDF]

Can Heterogeneity Make Gnutella Scalable?Q. Lv, S. Ratnasamy, and S. ShenkerThe First International Workshop on Peer-to-Peer Systems (IPTPS): 94-103, 2002. 2002Networking
Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?T. Ouyang, S. Ray, M. Rabinovich, and M. AllmanProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Can Prosody Aid the Automatic Processing of Multi-Party Meetings? Evidence from Predicting Punctuation, Disfluencies, and Overlapping SpeechE. Shriberg, A. Stolcke, and D. BaronProceedings of the ISCA Tutorial and Research Workshop on Prosody in Speech Recognition and Understanding, Red Bank, New JerseyOctober 2001Speech[PDF]

Can Software Routers Scale?K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. RatnasamyProceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, WashingtonAugust 2008Networking[PDF]

Can We Escape the Trough of Disillusionment?--A Perspective on E-learning Technology Research from the ACM Workshop on Educational Multimedia and Multimedia EducationG. Friedland, L. Knipping, W. Huerst, and M. MuhlhauserACM E-Learn JournalFebruary 2009Speech
Can We Utilize the Cancellation of the Most Significant Digits?V. PanICSI Technical Report TR-92-061December 1992ICSI Technical Reports[PDF]

Capacity Control for Partially Ordered Feature SetsU. RueckertProceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2009), Part II, Bled, Slovenia, pp. 318-333September 2009Algorithms[PDF]

Capacity Limitations in the Integration of Information Across SaccadesJ.A. Feldman, M. Hayhoe, and J. LachterPaper presented at ARVO 1991 1991AI
Capturing Long-Term User Interests in Online Television News ProgramF. HopfgartnerIn TV Content Analysis: Techniques and Applications, Chapter 11, CRC Press 2011AI
Carat: Collaborative Energy Bug DetectionA. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. TarkomaPoster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, CaliforniaApril 2012Networking
Cascaded Model Adaptation for Dialog Act Segmentation and TaggingU. Guz, G. Tur, D. Hakkani-Tür, and S. CuendetJournal of Computer Speech and Language, Vol. 24, Issue 2, pp. 289-306April 2010Speech
Cased-Based Reasoning: A New Technology for Experience Based Construction of Knowledge SystemsK. Althoff, M. Richter, and W. WilkeICSI Technical Report TR-97-008March 1997ICSI Technical Reports[PDF]

Categorial PerceptionM. Fritz, M. Andriluka, S. Fidler, M. Stark, A. Leonardis, and B. SchieleIn Cognitive Systems, H. I. Christensen, G.-J. Kruijff, A. Sloman, and J. Wyatt, eds., Springer, pp. 131-164 2010Vision
Categorical Perception of Color is Lateralized to the Right Hemisphere in Infants, but to the Left Hemisphere in AdultsA. Franklin, G. V. Drivonikou, L. Bevis, P. Kay, and T. RegierProceedings of the National Academy of Sciences of the United States of America, Vol. 105, No. 9, pp. 3221-3225. DOI:10.1073/pnas.0712286105.March 2008AI[PDF]

CDNN: A Context Dependent Neural Network for Continuous Speech RecognitionH. Bourlard, N. Morgan, C. Wooters, and S. RenalsProceedings of IEEE International Conference on Acoustics, Speech & Signal Processing, San Francisco, California, pp. II-349-352 1992Speech
Challenges for Theory of ComputingA. Condon, H. Edelsbrunner, E.A. Emerson, L. Fortnow, et.al.SIGACT News, June 1999, vol.30, (no.2):62-76.June 1999Algorithms
Change Blindness Reveals Distinctive Featural Processing in Size, Color, and OrientationS. X. Yu and D. LisinICSI Technical Report TR-13-001February 2013ICSI Technical Reports[PDF]

Channel Groups: A Unifying Abstraction for Specifying Inter-stream RelationshipsA. Gupta and M. MoranICSI Technical Report TR-93-015March 1993ICSI Technical Reports[PDF]

Chapter 17: The Transcription of DiscourseJ. EdwardsThe Handbook of Discourse Analysis, D. Shriffrin, D. Tannen and H. Hamilton, eds. Oxford: Blackwell, pp. 321-348 2001Speech
Characteristics of Internet Background RadiationR. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. PetersonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

Characterization of Video TrafficR. GargICSI Technical Report TR-95-007January 1995ICSI Technical Reports[PDF]

Characterizing the Variability of Arrival Processes with Indices of DispersionR. GusellaICSI Technical Report TR-90-051September 1990ICSI Technical Reports[PDF]

CHCL - A Connectionist Inference System for Horn Logic Based on the Connection Method and using Limited ResourcesS. HoelldoblerICSI Technical Report TR-90-042August 1990ICSI Technical Reports[PDF]

CHCL--A Connectionist Inference SystemS. Hoelldobler and F. KurfessICSI Technical Report TR-91-052October 1991ICSI Technical Reports[PDF]

Pages