Publication Search Results

TitleAuthorBibliographicDatesort ascendingGroupLinks
A Global Optimization Framework for Meeting SummarizationD. Gillick, K. Riedhammer, B. Favre, and D. Hakkani-TürProceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4769-4772April 2009Speech[PDF]

Efficient Application Placement in a Dynamic Hosting PlatformZ. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. LiberatoreProceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290April 2009Networking[PDF]

Towards Automatic Argument Diagramming of Multiparty MeetingsD. Hakkani-TürProceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4753-4756April 2009Speech[PDF]

Syntactically Informed Models for Comma PredictionB. Favre, D. Hakkani-Tür, and E. ShribergProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4697-4700April 2009Speech[PDF]

Genre Effects on Automatic Sentee Segmentation of Speech: A Comparison of Broadcast News and Broadcast ConversationsncJ. Kolar, Y. Liu, and E. ShribergProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4701-4704April 2009Speech[PDF]

Comments on Selecting Ephemeral PortsM. AllmanACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19April 2009Networking[PDF]

Spamcraft: An Inside Look At Spam Campaign OrchestrationC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, MassachusettsApril 2009Networking[PDF]

Unternehmensübergreifende RFID-Anwendungen – Eine Fallstudie aus der Möbelindustrie zur RFID-basierten AuftragsabwicklungC. Tribowski, K. Spin, O. Günther, and O. SielemannProceedings of the 11th Paderborner Frühjahrstagung (PBFT 2009), Paderborn, GermanyApril 2009Other
SNP Imputation in Association StudiesE. Halperin and D. A. StephanNature Biotechnology, Vol. 27, No. 4, pp. 349-351April 2009Algorithms[PDF]

Adaptive Concept Drift DetectionA. Dries and U. RueckertBest paper, proceedings of the 9th SIAM International Conference on Data Mining, Sparks, Nevada, pp. 235-246April 2009Algorithms[PDF]

Non-Linear Matrix FactorizationN. D. Lawrence and R. UrtasunPresented at the Learning Workshop (Snowbird), Clearwater, FloridaApril 2009Vision[PDF]

Rank Priors for Continuous Non-Linear Dimensionality ReductionR. Urtasun, A. Geiger, and T. DarrellPresented at the Learning Workshop (Snowbird), Clearwater, FloridaApril 2009Vision[PDF]

Co-Training with Noisy Perceptual ObservationsC. M. Christoudias, R. Urtasun, A. Kapoor and T. DarrellPresented at the Learning Workshop (Snowbird), Clearwater, FloridaApril 2009Vision[PDF]

The SRI NIST 2008 Speaker Recognition Evaluation SystemS. S. Kajarekar, N. Scheffer, M. Graciarena, E. Shriberg, A. Stolcke, L. Ferrer, and T. BockletProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4205-4208April 2009Speech[PDF]

Speaker Recognition Using Syllable-Based Constraints for Cepstral Frame SelectionT. Bocklet and E. ShribergProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4525-4528April 2009Speech[PDF]

Convex Perturbations for Scalable Semidefinite ProgrammingB. Kulis, S. Sra, and I. DhillonProceedings of the 12th International Conference on Artificial Intelligence and Statistics (AISTATS 2009), Clearwater Beach, Florida, pp. 296-303April 2009Vision[PDF]

Skilled in the Art of Being Idle: Reducing Energy Waste in Networked SystemsS. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. TaftProceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394April 2009Networking[PDF]

ICTD State of the Union: Where Have We Reached and Where Are We Headed?S. Nedevschi, R. Patra, and J. PalProceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, QatarApril 2009Networking[PDF]

Discriminative Pronunciation Learning Using Phonetic Decoder and Minimum-Classification-Error CriterionO. Vinyals, L. Deng, D. Yu, and A. AceroProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4445-4448April 2009Speech[PDF]

Exploiting User Feedback for Language Model Adaptation in Meeting RecognitionD. Vergyri, A. Stolcke, and G. TurProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4737-4740April 2009Speech[PDF]

Open Source vs. Closed Source Software: Towards Measuring SecurityG. Schryen and R. KaduraProceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023March 2009Networking[PDF]

Review Article: A Valency Dictionary of EnglishC. FillmoreInternational Journal of Lexicography, Vol. 22, No. 1, pp. 55-85March 2009AI[PDF]

EPCIS-Based Supply Chain Event Management—A Quantitative Comparison of Candidate System ArchitecturesC. Goebel, C. Tribowski, and O. GüntherProceedings of the International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2009), Fukuoka, Japan, pp. 494-499March 2009Other
Dynamic Network Topology Changes in Functional Modules Predict Responses to Oxidative Stress in YeastP. V. Gopalacharyulu, V. R. Velagapudi, E. Lindfors, E. Halperin, and M. OrešičMolecular BioSystems, Vol. 5, Issue 3, pp. 276-287March 2009Algorithms
Parallelizing the Web BrowserC. G. Jones, R. Liu, L. Meyerovich, K. Asanović, and R. BodikProceedings of the First USENIX Workshop on Hot Topics in Parallelism (HotPar’09), Berkeley, CaliforniaMarch 2009Architecture[PDF]

Automating Analysis of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonProceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22March 2009Networking[PDF]

Tessellation: Space-Time Partitioning in a Manycore Client OSR. Liu, K. Klues, S. Bird, S. Hofmeyr, K. Asanović, and J. KubiatowiczProceedings of the First USENIX Workshop on Hot Topics in Parallelism (HotPar’09), Berkeley, CaliforniaMarch 2009Architecture[PDF]

Lithe: Enabling Efficient Composition of Parallel LibrariesH. Pan, B. Hindman, and K. AsanovićProceedings of the First USENIX Workshop on Hot Topics in Parallelism (HotPar’09), Berkeley, CaliforniaMarch 2009Architecture[PDF]

Indirect Evidence and the Poverty of the Stimulus: The Case of Anaphoric OneS. Foraker, T. Regier, N. Khetarpal, A. Perfors, and J. TenenbaumCognitive Science, Vol. 33, No. 2, pp. 287-300March 2009AI[PDF]

Analytics for ExpertsG. FriedlandFeatured paper in ACM SIGMM Records, Vol. 1, Issue 1March 2009Speech[PDF]

Review of E. Villalon, “High-Dimensionality Data Reduction in Java”G. FriedlandACM Computing ReviewsMarch 2009Speech
Maximizing Power in Association StudiesE. Halperin and D. A. StephanNature Biotechnology, Vol. 27, Issue 3, pp. 255-256March 2009Algorithms[PDF]

ICSI GazetteMarch 2009ICSI Newsletter[PDF]

Nintendo Yes Wii CanT. LampikoskiUC Berkeley Haas School of Business MBA case studyMarch 2009Other
A Specification of a Hybrid Petri Net Semantics for the HISim SimulatorA. AmengualICSI Technical Report TR-09-003March 2009ICSI Technical Reports[PDF]

Who is "You"? Combining Linguistic and Gaze Features to Resolve Second-Person References in DialogueM. Frampton, R. Fernández, P. Ehlen, M. Christoudias, T. Darrell, and S. PetersProceedings of the 12th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2009), Athens, Greece, pp. 273-281March 2009Vision[PDF]

A computational model of attachment secure responses in the Strange SituationA. AmengualTR-09-002March 2009ICSI Technical Reports
An Investigation of the Internet’s IP-Layer ConnectivityL. Tang, J. Li, Y. Li, and S. ShenkerComputer Communications, Vol. 32, No. 5, pp. 913-926March 2009Networking
Can We Escape the Trough of Disillusionment?--A Perspective on E-learning Technology Research from the ACM Workshop on Educational Multimedia and Multimedia EducationG. Friedland, L. Knipping, W. Huerst, and M. MuhlhauserACM E-Learn JournalFebruary 2009Speech
An Exact and Efficient Triangle Intersection Test HardwareA. Raabe, J. Tietjen, and J. K. AnlaufProceedings of the International Conference on Computer Graphics Theory and Applications (GRAPP ’09), Lisbon, Portugal, pp. 355-360February 2009Architecture[PDF]

Constructing Grammar: A Computational Model of the Emergence of Early ConstructionsN. ChangUC Berkeley dissertationFebruary 2009AI[PDF]

Tiered Fault Tolerance for Long-Term IntegrityB. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282February 2009Networking[PDF]

Minuet: Rethinking Concurrency Control in Storage Area NetworksA. Ermolinskiy, D. Moon, B. Chun, and S. ShenkerProceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, CaliforniaFebruary 2009Networking[PDF]

The Value of Visibility and RFID in Transshipment Operations—A Simulation StudyC. Goebel and O. GüntherProceedings of the 9th Internationale Tagung Wirtschaftsinformatik (WI 2009) (Conference on Business Informatics), Vienna, Austria,pp. 129-138February 2009Other
Vertical Integration and Information Sharing—An Empirical Investigation in the German Apparel IndustryC. Goebel, H. Krasnova, H. Syllwasschy, and O. GüntherProceedings of the 9th Internationale Tagung Wirtschaftsinformatik (WI 2009) (Conference on Business Informatics), Vienna, Austria, pp. 399-408February 2009Other
Detecting Forged TCP Reset PacketsN. Weaver, R. Sommer, and V. PaxsonProceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, CaliforniaFebruary 2009Networking[PDF]

Hill-Climbing Ensemble Feature Selection with a Larger EnsembleD. GelbartICSI Technical Report TR-09-001February 2009ICSI Technical Reports[PDF]

Multimodal Interfaces for Automotive Applications (MIAA)C. Müller and G. FriedlandProceedings of the ACM International Conference on Intelligent User Interfaces (IUI 2009), Sanibel, Florida, pp. 493-494February 2009Speech
Supplemental Relative Clauses and Syntactic Generality (or: A Niche of Left-Adjunction Productivity: Rethinking Parenthetical as)R. Lee-GoldmanProceedings of the 35th Annual Meeting of the Berkeley Linguistics Society (BLS 2009), Berkeley, CaliforniaFebruary 2009AI[PDF]

Hill-Climbing Ensemble Feature Selection with a Larger EnsembleD. GelbartICSI Technical Report TR-09-001February 2009Speech[PDF]

Pages