| The Syllable Re-revisited | A. Hauenstein | ICSI Technical Report TR-96-035 | August 1996 | ICSI Technical Reports | [PDF]
|
| The Surprising Variance in Shortest-Derivation Parsing | M. Bansal and D. Klein | Proceedings of the 49th annual Meeting of the Association for Computational Linguistics, Portland, Oregon | June 2011 | Speech | [PDF]
|
| The Supervisor Synthesis Problem for Unrestricted CTL is NP-complete | M. Antoniotti and B. Mishra | ICSI Technical Report TR-95-062 | November 1995 | ICSI Technical Reports | [PDF]
|
| The SuperSID Project: Exploiting High-Level Information for High-Accuracy Speaker Recognition | D. Reynolds, W. Andrews, J. Campbell, J. Navratil, B. Peskin, A. Adami, Q. Jin, D. Klusacek, J. Abramson, R. Mihaescu, J. Godfrey, D. Jones, and B. Xiang | Proceedings of ICASSP-2003, Hong Kong | April 2003 | Speech | [PDF]
|
| The Success of Open Source | S. Weber | Cambridge, MA, Harvard University Press | 2004 | BCIS (archived) | |
| The Sublogarithmic Space World | M. Liskiewicz and R. Reischuk | ICSI Technical Report TR-93-048 | August 1993 | ICSI Technical Reports | [PDF]
|
| The Structure of the Framenet Database | C.F. Baker, C. J. Fillmore, and B. Cronin | International Journal of Lexicography, Volume 16.3: 281-296. 2003. | 2003 | AI | |
| The Strengths of Weaker Identities: Opportunistic Personas | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| The Stationarity of Internet Path Properties: Routing, Loss, and Throughput | Y. Zhang, V. Paxson, and S. Shenker | ACIRI Technical Report, May 2000. | May 2000 | Networking | |
| The Stanford Hand-Eye Project--Recent Results | J.A. Feldman | Presented at IFIP Congress, Stockholm, Sweden | 1974 | AI | |
| The Stanford Hand-Eye Project | J.A. Feldman, C.M. Feldman, G. Falk, C. Grape, J. Pearlman, I. Sobel, and J.M. Tenenbaum | Proceedings of the First International Joint Conference on Artificial Intelligence (IJCAI), Washington, DC, pp. 521-526 | May 1969 | AI | |
| The SRI-ICSI Spring 2007 Meeting and Lecture Recognition System | A. Stolcke, X. Anguera, K. Boakye, O. Cetin, A. Janin, M. Magimai-Doss, C. Wooters, and J. Zheng | Proceedings of the Second International Workshop on Classification of Events, Activities, and Relationships (CLEAR 2007) and the Fifth Rich Transcription 2007 Meeting Recognition (RT 2007), Baltimore, Maryland, pp. 450-463 | May 2007 | Speech | [PDF]
|
| The SRI NIST 2010 Speaker Recognition Evaluation System | N. Scheffer, L. Ferrer, M. Graciarena, S. Kajarekar, E. Shriberg, and A. Stolcke | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 5292-5295 | May 2011 | Speech | [PDF]
|
| The SRI NIST 2008 Speaker Recognition Evaluation System | S. S. Kajarekar, N. Scheffer, M. Graciarena, E. Shriberg, A. Stolcke, L. Ferrer, and T. Bocklet | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4205-4208 | April 2009 | Speech | [PDF]
|
| The Spread of the Sapphire/Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | The Cooperative Association for Internet Data Analysis Technical Report | February 2003 | Networking | |
| The Spectro-Microscopy Electronic Notebook | S. R. Sachs, C. M. Dal Sasso Freitas, V. Markowitz, A. Talis, I-M. A. Chen, E. Szeto, and H. A. Kuno | ICSI Technical Report TR-97-002 | January 1997 | ICSI Technical Reports | [PDF]
|
| The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention | N. Weaver, V. Paxson, and J.M. Gonzalez | Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206 | February 2007 | Networking | [PDF]
|
| The Shared-Memory Language pSather on a Distributed-Memory Multiprocessor | J.A. Feldman, C.C. Lim and T. Rauber | Proceedings of the ACM Special Interest Group on Programming Languages (SIGPLAN) Workshop, pp. 17-20 | 1992 | AI | |
| The SFRA: A Corner-Turn FPGA Architecture | N. Weaver, J. Hauser and J. Wawrzynek | Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12 | February 2004 | Networking | [PDF]
|
| The Sequential GMM: A Gaussian Mixture Model Based Speaker Verification System that Captures Sequential Information | S. Stafford | M.S. Thesis, University of California at Berkeley | May 2005 | Speech | [PDF]
|
| The Science of Artificial Intelligence | J.A. Feldman | Commentary on a paper by Duda, Nilsson, and Raphael, Research Directions in Software Technology | 1977 | AI | |
| The Scale Vector-Thread Processor | R. Krashinsky, C. Batten, and K. Asanović | Winner, DAC/ISSCC Student Design Contest, Design Automation Conference, DAC/ISSCC, San Diego, California | June 2007 | Architecture | |
| The Sather Language and Libraries | S. Omohundro and C. C. Lim | ICSI Technical Report TR-92-017 | March 1992 | ICSI Technical Reports | [PDF]
|
| The Sather 1.1 Specification | D. Stoutamire and S. Omohundro | ICSI Technical Report TR-96-012 | August 1996 | ICSI Technical Reports | [PDF]
|
| The Sather 1.0 Specification | D. Stoutamire and S. Omohundro | ICSI Technical Report TR-95-057 | October 1995 | ICSI Technical Reports | [PDF]
|
| The Role of Soft Information in Trust Building: Evidence from Online Social Lending | S. Poetzsch and R. Boehme | Proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), Berlin, Germany, pp. 381-395 | June 2010 | Networking | |
| The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model | C. Wendelken | Neurocomputing, Vol. 44-46, pp. 1009-1016 | June 2002 | AI | |
| The Role of Disfluencies on Topic Classification of Human-Human Conversations | C. Boulis, J. G. Kahn, and M. Ostendorf | Proceedings of the Spoken Language Understanding Workshop Program at the 20th National Conference on Artificial Intelligence (AAAI-05), Pittsburgh, Pennsylvania | July 2005 | Speech | [PDF]
|
| The role of cortico-basal-thalamic loops in cognition: a computational model and preliminary results | S. Narayanan | Neurocomputing, Vol. 52-54, pp. 605-614, Elsevier Science, B.V. | 2003 | AI | |
| The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA | A. Waterman, Y. Lee, D. Patterson, and K. Asanovic | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-62, Berkeley, California | May 2011 | Architecture | [PDF]
|
| The Ring Array Processor (RAP): Hardware | J. Beck | ICSI Technical Report tr-90-048 | September 1990 | ICSI Technical Reports | [PDF]
|
| The Ring Array Processor (RAP): Algorithms and Architecture | N. Morgan | ICSI Technical Report TR-90-047 | September 1990 | ICSI Technical Reports | [PDF]
|
| The Restriction Scaffold Problem | A. Ben-Dor, R.M. Karp, B. Schwikowski, and R. Shamir | Journal of Computational Biology, Vol. 10, No. 3-4, pp. 385-398 | 2003 | Algorithms | |
| The Restriction Scaffold Problem | A. Ben-Dor, R.M. Karp, B Schwikowski, and R. Shamir | Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02), 2002. | 2002 | Algorithms | |
| The Reliable Multicast Design Space for Bulk Data Transfer | M. Handley, S, Floyd, B. Whetten, R. Kermode, L. Vicisano, and M. Luby | Request for Comments 2887, Informational, August 2000. | August 2000 | Networking | |
| The Relationship Between Topology and Protocol Performance: Case Studies | P. Radoslavov | PhD Dissertation, Computer Science Department, University of Southern California, December 2001. | December 2001 | Networking | |
| The Relationship Between Dialogue Acts and Hot Spots in Meetings | B. Wrede and E. Shriberg | Proceedings of IEEE Speech Recognition and Understanding Workshop, St. Thomas, U.S. Virgin Islands | December 2003 | Speech | [PDF]
|
| The Relation of Stress Accent to Pronunciation Variation in Spontaneous American English Discourse | S. Greenberg, H.M. Carvey, and L. Hitchcock | Proceedings of the International Conference on Speech Prosody 2002, Aix-en-Provence, France | April 2002 | Speech | |
| The Relation Between Stress Accent and Vocalic Identity in Spontaneous American English Discourse | S. Greenberg, S. Chang, and L. Hitchcock | Proceedings of ISCA Workshop on Prosody in Speech Recognition and Understanding, Red Bank, New Jersey | October 2001 | Speech | |
| The Relation Between Speech Intelligibility and the Complex Modulation Spectrum | S. Greenberg and T. Arai | Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001), Aalborg, Denmark | September 2001 | Speech | [PDF]
|
| The Ratio Method for Multi-View Color Constancy | T. Owens, K. Saenko, A. Chakrabarti, Y. Xiong, T. Zickler, and T. Darrell | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-23, Berkeley, California | April 2011 | Vision | [PDF]
|
| The Rank of Sparse Random Matrices Over Finite Fields | J. Blomer, R.M. Karp, and E. Welzl | Random Structures & Algorithms, July 1997, vol.10, (no.4):407-19. | July 1997 | Algorithms | |
| The Rank of Sparse Random Matrices Over Finite Fields | J. Blömer, R. Karp, and E. Welzl | ICSI Technical Report TR-96-004 | January 1996 | ICSI Technical Reports | [PDF]
|
| The Quality of Separation Between NP and Exponential Time; Reducing the Cases | G. Lischke | ICSI Technical Report TR-92-027 | April 1992 | ICSI Technical Reports | [PDF]
|
| The pSather 1.0 Manual | D. Stoutamire | ICSI Technical Report TR-95-058 | October 1995 | ICSI Technical Reports | [PDF]
|
| The Possibility of an Executable Specification Language | P. B. Ladkin | ICSI Technical Report TR-89-040 | July 1989 | ICSI Technical Reports | [PDF]
|
| The PHiPAC v1.0 Matrix-Multiply Distribution. | J. Bilmes, K. Asanovic, C.-W. Chin, and J. Demmel | ICSI Technical Report TR-98-035 | October 1998 | ICSI Technical Reports | [PDF]
|
| The Parallel Computing Laboratory at UC Berkeley: A Research Agenda Based on the Berkeley View | K. Asanovic, R. Bodik, J. Demmel, T. Keaveny, K. Keutzer, J. D. Kubiatowicz, E. A. Lee, N. Morgan, G. Necula, D. A. Patterson, K. Sen, J. Wawrzynek, D. Wessel, and K. A. Yelick | EECS Department, UC Berkeley Technical Report No. UCB/EEECS-2008-23, Berkeley, California | March 2008 | Architecture | [PDF]
|
| The Packet Pair Flow Control Protocol | S. Keshav | ICSI Technical Report TR-91-028 | May 1991 | ICSI Technical Reports | [PDF]
|
| The Origin of Power-Laws in Internet Topologies Revisited | Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | INFOCOM, 2002. | 2002 | Networking | |