| Emergent Constraints on Word-Learning: A Computational Review | T. Regier | Trends in Cognitive Sciences, Vol. 7, Issue 6, pp. 263-268 | June 2003 | AI | |
| Constraining Computational Models of Cognition | T. Regier | Encyclopedia of Cognitive Science, L. Nadel, ed., pp. 611-615, Macmillan | 2003 | AI | |
| Reduplication and the Arbitrariness of the Sign | T. Regier | Proceedings of the 20th Annual Conference of the Cognitive Science Society (CogSci 1998), Madison, Wisconsin, pp. 887-892 | August 1998 | AI | |
| Detecting Excess Radical Replacements in Phylogenetic Trees | T. Pupko, R. Sharan, M. Hasegawa, R. Shamir, and D. Graur | Gene, 319, pp. 127-135 | 2003 | Algorithms | |
| Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation | T. Pirinen, J. Yli-Hietanen, P. Pertilä, and A. Visa | Proceedings of IEEE ISCAS, Vancouver | May 2004 | Speech | [PDF]
|
| Time Delay Based Failure-Robust Direction of Arrival Estimation | T. Pirinen and J. Yli-Hietanen | Proceedings of IEEE SAM 2004, Sitges, Barcelona, Spain. | July 2004 | Speech | [PDF]
|
| Multispeaker Speech Activity Detection for the ICSI Meeting Recorder | T. Pfau, D. Ellis, and A. Stolcke | Proceedings of Automatic Speech Recognition and Understanding Workshop (ASRU 2001),
Madonna di Campiglio, Italy, pp. 107-110 | December 2001 | Speech | [PDF]
|
| Learning Object Color Models from Multi- View Constraints | T. Owens, K. Saenko, A. Chakrabarti, Y. Xiong, T. Zickler, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2011), Colorado Springs, Colorado, pp. 169–176 | June 2011 | Vision | [PDF]
|
| The Ratio Method for Multi-View Color Constancy | T. Owens, K. Saenko, A. Chakrabarti, Y. Xiong, T. Zickler, and T. Darrell | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-23, Berkeley, California | April 2011 | Vision | [PDF]
|
| Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise? | T. Ouyang, S. Ray, M. Rabinovich, and M. Allman | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| A Large-Scale Empirical Analysis of Email Spam Detection Through Transport-Level Characteristics | T. Ouyang, S. Ray, M. Allman, and M. Rabinovich | ICSI Technical Report TR-10-001 | January 2010 | ICSI Technical Reports | [PDF]
|
| Analysis of Composite Corridors | T. Nakamura and E. Berlekamp | ICSI Technical Report TR-02-005 | February 2002 | ICSI Technical Reports | [PDF]
|
| On Semi-Algebraic Decision Complexity | T. Lickteig | ICSI Technical Report TR-90-052 | September 1990 | ICSI Technical Reports | [PDF]
|
| Stochastic Manhattan Learning: Time-Evolution Operator for the Ensemble Dynamics | T. Leen and J. Moody | Physical Review E, 1997. | 1997 | Algorithms | |
| Nintendo Yes Wii Can | T. Lampikoski | UC Berkeley Haas School of Business MBA case study | March 2009 | Other | |
| Practical Declarative Network Management | T. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. Shenker | Proceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683 | August 2009 | Networking | [PDF]
|
| How to Analyze Various Consumer Data in the Future? | T. Kotro, T. Lindh-Knuutila, and E. Hiltunen | Presented at the 11th International Conference of Finland Futures Research Centre and Finland Futures Academy, Tampere, Finland, pp. 135-143 | May 2009 | AI | [PDF]
|
| Editorial: Architecting for Innovation | T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. Kuptsov | ACM SIGCOMM Computer Communications Review, Vol. 41, No. 3 | July 2011 | Networking | [PDF]
|
| A Data-oriented (and Beyond) Network Architecture | T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica | Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192 | October 2007 | Networking | [PDF]
|
| Onix: A Distributed Control Platform for Large-scale Production Networks | T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. Shenker | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 351-364 | October 2010 | Networking | [PDF]
|
| Simple Max-Min Ant Systems and the Optimization of Linear Pseudo-Boolean Functions | T. Koetzing, F. Neumann, D. Sudholt, and M. Wagner | Proceedings of the 11th Foundations of Genetic Algorithms Workshop (FOGA XI), pp. 209-218, Schwarzenberg, Austria | January 2011 | Algorithms | [PDF]
|
| Inductive Learning of Compact Rule Sets by Using Effcient Hypotheses Reduction | T. Koch | ICSI Technical Report TR-92-069 | September 1992 | ICSI Technical Reports | [PDF]
|
| Mapping Clones with a Given Ordering or Interleaving | T. Jiang and R.M. Karp | Algorithmica, July 1998, vol.21, (no.3):262-84. | 1998 | Algorithms | |
| Mapping Clones with a Given Ordering or Interleaving | T. Jiang and R.M. Karp | Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms. Jan. 1997. New York, NY, USA: ACM, 1997. p. 400-9. | January 1997 | Algorithms | |
| Analysis of an Asymmetric Mutation Operator | T. Jansen and D. Sudholt | Evolutionary Computation, Vol. 18, No. 1, pp. 1-26 | January 2010 | Algorithms | |
| Unsupervised Learning from Dyadic Data | T. Hofmann and J. Puzicha | ICSI Technical Report TR-98-042 | December 1998 | ICSI Technical Reports | [PDF]
|
| NS-3 Project Goals | T. Henderson, S. Roy, S. Floyd, and G. Riley | Proceedings of the Workshop on NS-2 (WNS2 2006), Pisa, Italy, article 13 | October 2006 | Networking | [PDF]
|
| Recognition and Visualization of Music Sequences Using Self-Organizing Feature Maps | T. Hein and O. Kramer | Proceedings of the 33rd Annual German Conference on AI: Advances in Artificial Intelligence (KI 2010), Kralsruhe, Germany, pp. 160-167 | September 2010 | Algorithms | |
| A 1.5-Approximation Algorithm for Sorting by Transpositions and Transversals | T. Hartman and R. Sharan | Proceedings of WABI | September 05 2004 | Algorithms | |
| The BIZ Top-Level Domain: Ten Years Later | T. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. Paxson | Proceedings of the 13th Passive and Active Measurement Conference, Vienna, Austria | March 2012 | Networking | [PDF]
|
| Unexpected Artefacts in PRNU-Based Camera Identification: A "Dresden Image Database" Case-Study | T. Gloe, S. Pfennig, and M. Kirchner | ACM Multimedia and Security Workshop, Coventry, UK | September 2012 | Vision | [PDF]
|
| The "Dresden Image Database" for Benchmarking Digital Image Forensics | T. Gloe and R. Boehme | Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, Switzerland | March 2010 | Networking | |
| Face Recognition: a Summary of 1995 - 1997 | T. Fromherz | ICSI Technical Report TR-98-027 | August 1998 | ICSI Technical Reports | [PDF]
|
| Smoothed Analysis of Balancing Networks | T. Friedrich, T. Sauerwald, and D. Vilenchik | Proceedings of the 36th International Colloquium on Automata, Languages, and Programming (ICALP 2009), Rhodes, Greece, pp. 472-483 | July 2009 | Algorithms | [PDF]
|
| Smoothed Analysis of Balancing Networks | T. Friedrich, T. Sauerwald, and D. Vilenchik | In Random Structures and Algorithms, Vol. 39, No. 1, pp. 115-138, DOI: 10.1002/rsa.20341 | August 2010 | Algorithms | |
| Analysis of Diversity-Preserving Mechanisms for Global Exploration | T. Friedrich, P. S. Oliveto, D. Sudholt, and C. Witt | Evolutionary Computation, Vol. 17, Issue 4, pp. 455-476, Winter 2009 | December 2009 | Algorithms | [PDF]
|
| Plateaus Can Be Harder in Multi-Objective Optimization | T. Friedrich, N. Hebbinghaus, and F. Neumann | Theoretical Computer Science, Vol. 411, Issue 6, pp. 854-864 | February 2010 | Algorithms | [PDF]
|
| Quasirandom Load Balancing | T. Friedrich, M. Gairing, and T. Sauerwald | Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2010), Austin, Texas, pp. 1620-1629 | January 2010 | Algorithms | [PDF]
|
| Approximating Covering Problems by Randomized Search Heuristics using Multi-Objective Models | T. Friedrich, J. He, N. Hebbinghaus, F. Neumann, and C. Witt | Evolutionary Computation, Vol. 18, No. 4, pp. 617-633, Winter 2010 | December 2010 | Algorithms | [PDF]
|
| Multiplicative Approximations and the Hypervolume Indicator | T. Friedrich, C. Horoba, and F. Neumann | Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2009), Montreal, Canada, pp. 571-578 | July 2009 | Algorithms | [PDF]
|
| Near-Perfect Load Balancing by Randomized Rounding | T. Friedrich and T. Sauerwald | Proceedings of the 41st ACM Symposium on Theory of Computing (STOC 2009), Bethesda, Maryland, pp. 121-130 | May 2009 | Algorithms | [PDF]
|
| Average Update Times for Fully-Dynamic All-Pairs Shortest Paths | T. Friedrich and N. Hebbinghaus | Proceedings of International Symposium on Algorithms and Computation (ISAAC), Gold Coast, Australia, pp. 693-704 | December 2008 | Algorithms | [PDF]
|
| When to Use Bit-Wise Neutrality | T. Friedrich and F. Neumann | Natural Computing, Vol. 9, No. 1, pp. 283-294 | March 2010 | Algorithms | [PDF]
|
| A Longitudinal View of HTTP Traffic | T. Callahan, M. Allman, and V. Paxson | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| Psst, Over Here: Communicating Without Fixed Infrastructure | T. Callahan, M. Allman, and M. Rabinovich | ICSI Technical Report TR-12-002. Also presented at the 31st International Conference on Computer Communications (INFOCOM 2012) Mini-Conference, Orlando, Florida, March 2012. | January 2012 | ICSI Technical Reports | [PDF]
|
| Speaker Recognition Using Syllable-Based Constraints for Cepstral Frame Selection | T. Bocklet and E. Shriberg | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4525-4528 | April 2009 | Speech | [PDF]
|
| Optimization Problems: Expressibility, Approximation Properties and Expected Asymptotic Growth of Optimal Solutions | T. Behrendt, K. Compton, and E. Graedel | ICSI Technical Report TR-93-002 | January 1993 | ICSI Technical Reports | [PDF]
|
| Syllable Intelligibility for Temporally-Filtered LPC Cepstral Trajectories | T. Arai, M. Pavel, H. Hermansky, and C. Avendano | Journal of the Acoustical Society of America, Vol. 105, No. 5, pp. 2783-2791 | May 1999 | Speech | [PDF]
|
| Speech Intelligibility in the Presence of Cross-Channel Spectral Asynchrony | T. Arai and S. Greenberg | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-98), Seattle, Washington, pp. 933-936 | May 1998 | Speech | [PDF]
|
| The Temporal Properties of Spoken Japanese Are Similar to Those of English | T. Arai and S. Greenberg | Proceedings of the Fifth European Conference on Speech Communication and Technology (Eurospeech '97), Rhodes, Greece, Vol. 2, pp. 1011-1014 | September 1997 | Speech | [PDF]
|