| A Global Optimization Framework for Meeting Summarization | D. Gillick, K. Riedhammer, B. Favre, and D. Hakkani-Tür | Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4769-4772 | April 2009 | Speech | [PDF]
|
| Efficient Application Placement in a Dynamic Hosting Platform | Z. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. Liberatore | Proceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290 | April 2009 | Networking | [PDF]
|
| Towards Automatic Argument Diagramming of Multiparty Meetings | D. Hakkani-Tür | Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4753-4756 | April 2009 | Speech | [PDF]
|
| Syntactically Informed Models for Comma Prediction | B. Favre, D. Hakkani-Tür, and E. Shriberg | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4697-4700 | April 2009 | Speech | [PDF]
|
| Genre Effects on Automatic Sentee Segmentation of Speech: A Comparison of Broadcast News and Broadcast Conversationsnc | J. Kolar, Y. Liu, and E. Shriberg | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4701-4704 | April 2009 | Speech | [PDF]
|
| Comments on Selecting Ephemeral Ports | M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19 | April 2009 | Networking | [PDF]
|
| Spamcraft: An Inside Look At Spam Campaign Orchestration | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, Massachusetts | April 2009 | Networking | [PDF]
|
| Unternehmensübergreifende RFID-Anwendungen – Eine Fallstudie aus der Möbelindustrie zur RFID-basierten Auftragsabwicklung | C. Tribowski, K. Spin, O. Günther, and O. Sielemann | Proceedings of the 11th Paderborner Frühjahrstagung (PBFT 2009), Paderborn, Germany | April 2009 | Other | |
| SNP Imputation in Association Studies | E. Halperin and D. A. Stephan | Nature Biotechnology, Vol. 27, No. 4, pp. 349-351 | April 2009 | Algorithms | [PDF]
|
| Adaptive Concept Drift Detection | A. Dries and U. Rueckert | Best paper, proceedings of the 9th SIAM International Conference on Data Mining, Sparks, Nevada, pp. 235-246 | April 2009 | Algorithms | [PDF]
|
| Non-Linear Matrix Factorization | N. D. Lawrence and R. Urtasun | Presented at the Learning Workshop (Snowbird), Clearwater, Florida | April 2009 | Vision | [PDF]
|
| Rank Priors for Continuous Non-Linear Dimensionality Reduction | R. Urtasun, A. Geiger, and T. Darrell | Presented at the Learning Workshop (Snowbird), Clearwater, Florida | April 2009 | Vision | [PDF]
|
| Co-Training with Noisy Perceptual Observations | C. M. Christoudias, R. Urtasun, A. Kapoor and T. Darrell | Presented at the Learning Workshop (Snowbird), Clearwater, Florida | April 2009 | Vision | [PDF]
|
| The SRI NIST 2008 Speaker Recognition Evaluation System | S. S. Kajarekar, N. Scheffer, M. Graciarena, E. Shriberg, A. Stolcke, L. Ferrer, and T. Bocklet | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4205-4208 | April 2009 | Speech | [PDF]
|
| Speaker Recognition Using Syllable-Based Constraints for Cepstral Frame Selection | T. Bocklet and E. Shriberg | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4525-4528 | April 2009 | Speech | [PDF]
|
| Convex Perturbations for Scalable Semidefinite Programming | B. Kulis, S. Sra, and I. Dhillon | Proceedings of the 12th International Conference on Artificial Intelligence and Statistics (AISTATS 2009), Clearwater Beach, Florida, pp. 296-303 | April 2009 | Vision | [PDF]
|
| Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems | S. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. Taft | Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394 | April 2009 | Networking | [PDF]
|
| ICTD State of the Union: Where Have We Reached and Where Are We Headed? | S. Nedevschi, R. Patra, and J. Pal | Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, Qatar | April 2009 | Networking | [PDF]
|
| Discriminative Pronunciation Learning Using Phonetic Decoder and Minimum-Classification-Error Criterion | O. Vinyals, L. Deng, D. Yu, and A. Acero | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4445-4448 | April 2009 | Speech | [PDF]
|
| Exploiting User Feedback for Language Model Adaptation in Meeting Recognition | D. Vergyri, A. Stolcke, and G. Tur | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4737-4740 | April 2009 | Speech | [PDF]
|
| Open Source vs. Closed Source Software: Towards Measuring Security | G. Schryen and R. Kadura | Proceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023 | March 2009 | Networking | [PDF]
|
| Review Article: A Valency Dictionary of English | C. Fillmore | International Journal of Lexicography, Vol. 22, No. 1, pp. 55-85 | March 2009 | AI | [PDF]
|
| EPCIS-Based Supply Chain Event Management—A Quantitative Comparison of Candidate System Architectures | C. Goebel, C. Tribowski, and O. Günther | Proceedings of the International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2009), Fukuoka, Japan, pp. 494-499 | March 2009 | Other | |
| Dynamic Network Topology Changes in Functional Modules Predict Responses to Oxidative Stress in Yeast | P. V. Gopalacharyulu, V. R. Velagapudi, E. Lindfors, E. Halperin, and M. Orešič | Molecular BioSystems, Vol. 5, Issue 3, pp. 276-287 | March 2009 | Algorithms | |
| Parallelizing the Web Browser | C. G. Jones, R. Liu, L. Meyerovich, K. Asanović, and R. Bodik | Proceedings of the First USENIX Workshop on Hot Topics in Parallelism (HotPar’09), Berkeley, California | March 2009 | Architecture | [PDF]
|
| Automating Analysis of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | Proceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22 | March 2009 | Networking | [PDF]
|
| Tessellation: Space-Time Partitioning in a Manycore Client OS | R. Liu, K. Klues, S. Bird, S. Hofmeyr, K. Asanović, and J. Kubiatowicz | Proceedings of the First USENIX Workshop on Hot Topics in Parallelism (HotPar’09), Berkeley, California | March 2009 | Architecture | [PDF]
|
| Lithe: Enabling Efficient Composition of Parallel Libraries | H. Pan, B. Hindman, and K. Asanović | Proceedings of the First USENIX Workshop on Hot Topics in Parallelism (HotPar’09), Berkeley, California | March 2009 | Architecture | [PDF]
|
| Indirect Evidence and the Poverty of the Stimulus: The Case of Anaphoric One | S. Foraker, T. Regier, N. Khetarpal, A. Perfors, and J. Tenenbaum | Cognitive Science, Vol. 33, No. 2, pp. 287-300 | March 2009 | AI | [PDF]
|
| Analytics for Experts | G. Friedland | Featured paper in ACM SIGMM Records, Vol. 1, Issue 1 | March 2009 | Speech | [PDF]
|
| Review of E. Villalon, “High-Dimensionality Data Reduction in Java” | G. Friedland | ACM Computing Reviews | March 2009 | Speech | |
| Maximizing Power in Association Studies | E. Halperin and D. A. Stephan | Nature Biotechnology, Vol. 27, Issue 3, pp. 255-256 | March 2009 | Algorithms | [PDF]
|
| ICSI Gazette | | | March 2009 | ICSI Newsletter | [PDF]
|
| Nintendo Yes Wii Can | T. Lampikoski | UC Berkeley Haas School of Business MBA case study | March 2009 | Other | |
| A Specification of a Hybrid Petri Net Semantics for the HISim Simulator | A. Amengual | ICSI Technical Report TR-09-003 | March 2009 | ICSI Technical Reports | [PDF]
|
| Who is "You"? Combining Linguistic and Gaze Features to Resolve Second-Person References in Dialogue | M. Frampton, R. Fernández, P. Ehlen, M. Christoudias, T. Darrell, and S. Peters | Proceedings of the 12th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2009), Athens, Greece, pp. 273-281 | March 2009 | Vision | [PDF]
|
| A computational model of attachment secure responses in the Strange Situation | A. Amengual | TR-09-002 | March 2009 | ICSI Technical Reports | |
| An Investigation of the Internet’s IP-Layer Connectivity | L. Tang, J. Li, Y. Li, and S. Shenker | Computer Communications, Vol. 32, No. 5, pp. 913-926 | March 2009 | Networking | |
| Can We Escape the Trough of Disillusionment?--A Perspective on E-learning Technology Research from the ACM Workshop on Educational Multimedia and Multimedia Education | G. Friedland, L. Knipping, W. Huerst, and M. Muhlhauser | ACM E-Learn Journal | February 2009 | Speech | |
| An Exact and Efficient Triangle Intersection Test Hardware | A. Raabe, J. Tietjen, and J. K. Anlauf | Proceedings of the International Conference on Computer Graphics Theory and Applications (GRAPP ’09), Lisbon, Portugal, pp. 355-360 | February 2009 | Architecture | [PDF]
|
| Constructing Grammar: A Computational Model of the Emergence of Early Constructions | N. Chang | UC Berkeley dissertation | February 2009 | AI | [PDF]
|
| Tiered Fault Tolerance for Long-Term Integrity | B. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282 | February 2009 | Networking | [PDF]
|
| Minuet: Rethinking Concurrency Control in Storage Area Networks | A. Ermolinskiy, D. Moon, B. Chun, and S. Shenker | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California | February 2009 | Networking | [PDF]
|
| The Value of Visibility and RFID in Transshipment Operations—A Simulation Study | C. Goebel and O. Günther | Proceedings of the 9th Internationale Tagung Wirtschaftsinformatik (WI 2009) (Conference on Business Informatics), Vienna, Austria,pp. 129-138 | February 2009 | Other | |
| Vertical Integration and Information Sharing—An Empirical Investigation in the German Apparel Industry | C. Goebel, H. Krasnova, H. Syllwasschy, and O. Günther | Proceedings of the 9th Internationale Tagung Wirtschaftsinformatik (WI 2009) (Conference on Business Informatics), Vienna, Austria, pp. 399-408 | February 2009 | Other | |
| Detecting Forged TCP Reset Packets | N. Weaver, R. Sommer, and V. Paxson | Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, California | February 2009 | Networking | [PDF]
|
| Hill-Climbing Ensemble Feature Selection with a Larger Ensemble | D. Gelbart | ICSI Technical Report TR-09-001 | February 2009 | ICSI Technical Reports | [PDF]
|
| Multimodal Interfaces for Automotive Applications (MIAA) | C. Müller and G. Friedland | Proceedings of the ACM International Conference on Intelligent User Interfaces (IUI 2009), Sanibel, Florida, pp. 493-494 | February 2009 | Speech | |
| Supplemental Relative Clauses and Syntactic Generality (or: A Niche of Left-Adjunction Productivity: Rethinking Parenthetical as) | R. Lee-Goldman | Proceedings of the 35th Annual Meeting of the Berkeley Linguistics Society (BLS 2009), Berkeley, California | February 2009 | AI | [PDF]
|
| Hill-Climbing Ensemble Feature Selection with a Larger Ensemble | D. Gelbart | ICSI Technical Report TR-09-001 | February 2009 | Speech | [PDF]
|