| A Study of Users' Perception of Relevance of Spoken Documents | T. Tombros and F. Crestani | ICSI Technical Report TR-99-013 | July 1999 | ICSI Technical Reports | [PDF]
|
| A Survey of Fuzzy Clustering Algorithms for Pattern Recognition | A. Baraldi and P. Blonda | ICSI Technical Report TR-98-038 | October 1998 | ICSI Technical Reports | [PDF]
|
| A Survey of Grammatical Inference | J.A. Feldman and A. Biermann | Proceedings of the International Congress on Pattern Recognition, Honolulu, Hawaii. Also in Frontiers of Pattern Recognition, S. Watanabe (ed.), Academic Press, 1972 | January 1971 | AI | |
| A Survey of Optical Fibers in Communication | R. Govindan, S. Keshav, and D. C. Verma | ICSI Technical Report TR-89-034 | May 1989 | ICSI Technical Reports | [PDF]
|
| A Survey of Support for Implementing Debuggers | V. Paxson | CS 262 class project, University of California, Berkeley | October 1990 | Networking | [PDF]
|
| A Swifter Start for TCP | C. Partridge, D. Rockwell, M. Allman, R. Krishnan, and J.P.G. Sterbenz | Technical Report No. 8339, BBN Technologies, March 2002 | March 2002 | Networking | |
| A Syllable, Articulatory-Feature, and Stress-Accent Model of Speech Recognition | S. Chang | ICSI Technical Report TR-02-007 | September 2002 | ICSI Technical Reports | [PDF]
|
| A Syllable, Articulatory-Feature, and Stress-Accent Model of Speech Recognition | S. Chang | Ph.D. Thesis, University of California at Berkeley. Also ICSI Technical Report TR-02-007 | September 2002 | Speech | [PDF]
|
| A Symbolic Complexity Analysis of Connectionist Algorithms for Distributed-Memory Machines | J. Bachrach | ICSI Technical Report TR-92-043 | July 1992 | ICSI Technical Reports | [PDF]
|
| A SYSTEMC Language Extension for High-Level Reconfiguration Modeling | A. Raabe and A. Felke | Proceedings of Forum on Specification, Verification, and Design Languages (FDL 08), Stuttgart, Germany, pp. 55-60 | September 2008 | Architecture | [PDF]
|
| A Tagging Method for Distributed Constraint Satisfaction | H. W. Guesgen | ICSI Technical Report TR-89-037 | June 1989 | ICSI Technical Reports | [PDF]
|
| A Taxonomy of Computer Worms | N. Weaver, V. Paxson, S. Staniford, and R. Cunningham | Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003), Washington, DC, pp. 11-18 | October 2003 | Networking | [PDF]
|
| A Taxonomy of Traffic Matrices | A. Medina, C. Fraleigh, N. Taft, S. Battacharyya, and C. Diot | SPIE Workshop on Scalability and Traffic Control in IP Networks II. Boston, Massachusetts. July 29-August 1, 2002. | July 2002 | Networking | |
| A Temporal Extension of the Four Frames Model | J.A. Feldman | Models of Brain Function, pp. 423-441, Rodney M. J. Cotterill (ed.), Cambridge University Press | 1989 | AI | |
| A Testbed for the Miniature Language L0 | J.A. Feldman, S. Weber, and A. Stolcke | Proceedings of the Fifth Rocky Mountain Conference on Artificial Intelligence, New Mexico State University, Las Cruces, New Mexico | June 1990 | AI | |
| A Text-constrained Prosodic System for Speaker Verification | E. Shriberg and L. Ferrer | Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007), Antwerp, Belgium, pp. 1226-1229 | August 2007 | Speech | [PDF]
|
| A Theory of Computation and Complexity Over the Real Numbers | L. Blum | ICSI Technical Report TR-90-058 | October 1990 | ICSI Technical Reports | [PDF]
|
| A Time-Sensitive Actor Framework in Java for the Development of Multimedia Systems over the Internet MBone | G. Fortino, L. Nigro, and A. Albanese | ICSI Technical Report TR-99-007 | March 1999 | ICSI Technical Reports | [PDF]
|
| A Tool for Debugging Internet Multicast Routing | D. Agarwal and S. Floyd | Proceedings of the 22nd Annual ACM Computer Science Conference (CSC '94), Phoenix, Arizona | March 1994 | Networking | |
| A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems | L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson | Proceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278 | July 2008 | Networking | [PDF]
|
| A Tower Architecture for Meta-Level Inference Systems Based on Omega-OrderedHorn Theories | P. E. Bonzon | ICSI Technical Report TR-95-002 | January 1995 | ICSI Technical Reports | [PDF]
|
| A Training Algorithm for Statistical Sequence Recognition with Applications to Transition-Based Speech Recognition | H. Bourlard, Y. Konig, and N. Morgan | IEEE Signal Processing Letters, pp. 203-205 | July 1996 | Speech | |
| A Unifying Link Abstraction for Wireless Sensor Networks | J. Polastre, J. Hui, P. Levis, J. Zhao, D. Culler, S. Shenker, and I. Stoica | Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), San Diego, California, pp. 76-89 | November 2005 | Networking | |
| A View of the Parallel Computing Landscape | K. Asanović, R. Bodik, J. Demmel, T. Keaveny, K. Keutzer, J. D. Kubiatowicz, N. Morgan, D. A. Patterson, K. Sen, J. Wawrzynek, D. Wessel, and K. A. Yelick | Communications of the ACM, Vol. 52, No. 10, pp. 56-67 | October 2009 | Architecture | [PDF]
|
| A View of the Parallel Computing Landscape | K. Asanović, R. Bodik, J. Demmel, T. Keaveny, K. Keutzer, J. D. Kubiatowicz, N. Morgan, D. A. Patterson, K. Sen, J. Wawrzynek, D. Wessel, and K. A. Yelick | Communications of the ACM, Vol. 52, No. 10, pp. 56-67 | October 2009 | Speech | [PDF]
|
| A Virtual Spanner for Efficient Face Routing in Multihop Wireless Networks | H. Tejeda, E. Chavez, J.A. Sanchez, and P. M. Ruiz | Lecture Notes in Computer Science, Vol. 4217, pp. 459–470 | September 2006 | Networking | |
| A Voice-Enabled Procedure Browser for the International Space Station | M. Rayner, B.A. Hockey, N. Chatzichrisafis, K. Farrell, and J.M. Renders | Proceedings of the 43rd Annual Meeting of the Association for Computational Linguistics (ACL 2005), Ann Arbor, Michigan, pp. 29-32 (interactive poster and demo track) | June 2005 | Speech | |
| A Way of Looking at Things | J.A. Feldman | Hebrew University, Computer Science Department | February 1971 | AI | |
| A Web Server's View of the Transport Layer | M. Allman | ACM Computer Communication Review, 30(5), October 2000. | October 2000 | Networking | |
| A Worst-Case Worm | N. Weaver and V. Paxson | Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| A* Based Joint Segmentation and Classification of Dialog Acts in Multi-Party Meetings | M. Zimmermann, Y. Liu, E. Shriberg, and A. Stolcke | Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2005), San Juan, Puerto Rico, pp. 215-219 | November 2005 | Speech | [PDF]
|
| Abstraction and Decoposition in Open GIS | A. Voisard and H. Schweppe | ICSI Technical Report TR-97-006 | March 1997 | ICSI Technical Reports | [PDF]
|
| Accelerated Solution of the Tridiagonal Symmetric Eigenvalue Problem | V. Pan | ICSI Technical Report TR-93-016 | March 1993 | ICSI Technical Reports | [PDF]
|
| Acceleration of DBSCAN-Based Clustering with Reduced Neighborhood Evaluations | A. Thom and O. Kramer | Proceedings of the 33rd Annual German Conference on AI: Advances in Artificial Intelligence (KI 2010), Kralsruhe, Germany, pp. 195-202 | September 2010 | Algorithms | |
| Accent Classification for Speech Recognition | A. Faria | Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005), Edinburgh, UK, pp. 285-293 | July 2005 | Speech | [PDF]
|
| Accessing and Customizing Services in Distributed Systems | R. G. Herrtwich and U. W. Brandenburg | ICSI Technical Report TR-89-059 | October 1989 | ICSI Technical Reports | [PDF]
|
| Accountable Internet Protocol (AIP) | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 339-350 | August 2008 | Networking | [PDF]
|
| Accurate Estimation of Expression Levels of Homologous Genes in RNA-Seq Experiments | B. Pasaniuc, N. Zaitlen, and E. Halperin | Proceedings of the Fourteenth International Conference on Research in Computational Biology (RECOMB 2010), Lisbon, Portugal, pp. 397-409. Also appears in Journal of Computational Biology (a special issue of RECOMB), Vol. 18, Issue 3, pp. 489-468, March 2011. | April 2010 | Algorithms | [PDF]
|
| Achieving Convergence-Free Routing Using Failure-Carrying Packets | K. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 241 - 252 | August 2007 | Networking | [PDF]
|
| Achieving Fairness Through Selective Early Dropping | J. Scott and R.M. Karp | preprint 2004. | 2004 | Networking | |
| Acoustic Beamforming for Speaker Diarization of Meetings | X. Anguera, C. Wooters, and J. Hernando | IEEE Transactions on Audio, Speech and Language Processing, Vol. 15, Issue 7, IEEE Computer Society, California, pp. 2011-2022 | September 2007 | Speech | |
| Acoustic Change Detection and Clustering on Broadcast News | J. Ferreiros and D. Ellis | ICSI Technical Report TR-00-006 | March 2000 | ICSI Technical Reports | [PDF]
|
| Acoustic Front-End Optimization for Bird Species Recognition | M. Graciarena, M. Delplanche, E. Shriberg, A. Stolcke, and L. Ferrer | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 293-296 | March 2010 | Speech | [PDF]
|
| Acoustic Stress and Topic Detection in American English Spoken Sentences | R. Silipo and F. Crestani | ICSI Technical Report TR-00-005 | March 2000 | ICSI Technical Reports | [PDF]
|
| Acoustic Sub-word Models in the Berkeley Restaurant Project | C. Wooters and N. Morgan | Proceedings of the International Conference on Spoken Language Processing (ICSLP'92), pp. 1551-1554 | 1992 | Speech | |
| Acoustic Super Models for Large Scale Video Event Detection | R. Mertens, H. Lei, L. Gottlieb, G. Friedland, and A. Divakaran | Proceedings of the ACM International Workshop on Events in Multimedia (EiMM11), Scottsdale, Arizona | November 2011 | Speech | [PDF]
|
| Acquisition of concepts and causal rules in Shruti | C. Wendelken and L. Shastri | Proceedings of the 25th Annual Conference of the Cognitive Science Society, Boston, Massachusetts | 2003 | AI | |
| Active Learning Under Arbitrary Distributions | C. Monteleoni and M. Kaariainen | Poster at the Value of Information in Inference, Learning, and Decision-Making Workshop at the 19th Annual Conference on Neural Information Processing Systems (NIPS), Vancouver, Canada | December 2005 | Algorithms | |
| Active Mapping: Resisting NIDS Evasion Without Altering Traffic | U. Shankar and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California | May 2003 | Networking | [PDF]
|
| Active Schemas for Generation, Recognition, and Understanding of Action | J. Feldman, G. Lakoff, and S. Narayanan | Proceedings of the First Mirror Neuron Conference | 2000 | AI | |