Publication Search Results

TitleAuthorBibliographicDateGroupLinkssort descending
Speaker Adaptation of Language and Prosodic Models for Automatic Dialog Act Segmentation of SpeechJ. Kolar, Y. Liu, and E. ShribergSpeech Communication, Vol. 52, Issue 3, pp. 236-245March 2010Speech
Covering Games: Approximation Through Non-CooperationM. GairingProceedings of the Fifth Workshop on Internet and Network Economics (WINE '09), Rome, Italy, pp. 184-195December 2009Algorithms[PDF]

Efficient Broadcast on Random Geometric GraphsM. Bradonjić, R. Elsässer, T. Friedrich, T. Sauerwald, and A. StaufferProceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2010), Austin, Texas, pp. 1412-1421January 2010Algorithms[PDF]

Skilled in the Art of Being Idle: Reducing Energy Waste in Networked SystemsS. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. TaftProceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394April 2009Networking[PDF]

ICTD State of the Union: Where Have We Reached and Where Are We Headed?S. Nedevschi, R. Patra, and J. PalProceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, QatarApril 2009Networking[PDF]

Analysis of an Asymmetric Mutation OperatorT. Jansen and D. SudholtEvolutionary Computation, Vol. 18, No. 1, pp. 1-26January 2010Algorithms
The "Dresden Image Database" for Benchmarking Digital Image ForensicsT. Gloe and R. BoehmeProceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, SwitzerlandMarch 2010Networking
Privacy in Online Social LendingR. Boehme and S. PoetzschProceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28March 2010Networking[PDF]

Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and PracticeS. Thiem and J. LaessigIn Particle Swarm Optimization: Theory, Techniques and Applications, A. E. Olsson, ed., Nova Science Publishers, ISBN: 978-1-61668-527-0 2010Algorithms
Aufträge, Partner, Kosten - Kooperation statt KonkurrenzJ. Lässig, S. Heinrich, and U. TrommlerIT&Production, Issue 10, pp. 74-76November 2009Algorithms
A New Biology for the 21st CenturyNational Research Council of the National AcademiesReport of Committee on a New Biology for the 21st Century: Ensuring the United States Leads the Coming Biology Revolution 2010Algorithms[PDF]

Parallel Training of a Multi-Layer Perceptron on a GPUC. Oei, G. Friedland, and A. JaninICSI Technical Report TR-09-008October 2009ICSI Technical Reports[PDF]

Botnet Judo: Fighting Spam with ItselfA. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. SavageProceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, CaliforniaFebruary 2010Networking[PDF]

Handling Temporal Granularity in Mobile ServicesS. Pfennigschmidt and A. VoisardProceedings of the 2009 IEEE International Conference on Wireless and Mobile Computing, Networking, and Communications (WiMob 2009), Marrakech, Morocco, pp. 295-300October 2009Other
Spatial Operations and Map OperationsM. Scholl and A. VoisardIn Encyclopedia of Database Systems, L. Ling and M. T. Ozsu, eds., pp. 2719-2725, Springer 2009Other
Early Warning Systems in Practice: Performance of the SAFE System in the FieldM. Klafft, T. Kraentzer, U. Meissen, and A. VoisardProceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems (ACM-GIS 2009), Seattle, Washington, pp. 436-439November 2009Other
A New Perspective on Efficient and Dependable Vehicle RoutingD. Pfoser, A. Efentakis, A. Voisard, and C. WenkProceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems (ACM-GIS 2009), Seattle, Washington, pp. 388-391November 2009Other
A computational model of attachment secure responses in the Strange SituationA. AmengualTR-09-002March 2009ICSI Technical Reports
World Color SurveyP. Kay, B. Berlin, L. Maffi, W. R. Merrifield, and R. CookCSLI Publications 2010AI
On Constructing a Trusted Path to the UserN. Weaver and M. AllmanICSI Technical Report TR-09-009December 2009ICSI Technical Reports[PDF]

A Large-Scale Empirical Analysis of Email Spam Detection Through Transport-Level CharacteristicsT. Ouyang, S. Ray, M. Allman, and M. RabinovichICSI Technical Report TR-10-001January 2010ICSI Technical Reports[PDF]

A Longitudinal View of HTTP TrafficT. Callahan, M. Allman, and V. PaxsonProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

Web Timeouts and Their ImplicationsZ. Al-Qudah, M. Rabinovich, and M. AllmanProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

A Design-Space Exploration for CMOS Photonic Processor NetworksV. Stojanović, A. Joshi, C. Batten, Y.-J. Kwon, S. Beamer, S. Chen, and K. AsanovićInvited talk at the Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC 2010), San Diego, CaliforniaMarch 2010Architecture
Tuning-Robust Initialization Methods for Speaker DiarizationD. Imseng and G. FriedlandIEEE Transactions on Audio, Speech, and Language Processing, Vol. 18, Issue 8, pp. 2028-2037November 2010Speech[PDF]

An Adaptive Initialization Method for Speaker Diarization Based on Prosodic FeaturesD. Imseng and G. FriedlandProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 4946-4949March 2010Speech[PDF]

Selected Papers from the 11th IEEE International Symposium on Multimedia (ISM2009)G. Friedland and M.-L. Shyu, eds.International Journal on Semantic Computing, Vol. 4, No. 2November 2010Speech
Selected Papers from the Third IEEE International Conference on Semantic Computing (ICSC2009)G. Friedland and S. C. Shen, eds.International Journal on Semantic Computing, Vol. 3, Issue 4December 2009Speech
Architectural Patterns for RFID Applications in ManufacturingH. Ziekow, L. Ivantysynova, and O. GuentherProceedings of the 18th European Conference on Information Systems (ECIS 2010), Pretoria, South AfricaJune 2010Other
Summarization- and Learning-Based Approaches to Information DistillationB. Toth, D. Hakkani-Tur, and S. YamanProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 5306-5309March 2010Speech[PDF]

Tutor-Based Learning of Visual Categories Using Different Levels of SupervisionM. Fritz, G.-J. Kruijff, and B. SchieleComputer Vision and Image Understanding, Vol. 114, Issue 5, pp. 564-573May 2010Vision
Leveraging Genetic Variability Across Populations for the Identification of Causal VariantsN. Zaitlen, B. Pasaniuc, T. Gur, E. Zic, and E. HalperinThe American Journal of Human Genetics, Vol. 86, Issue 1, pp. 23-33January 2010Algorithms
Chemokine Polymorphisms and Lymphoma: A Pooled AnalysisP. M. Bracci, C. F. Skibola, L. Conde, E. Halperin, T. Lightfoot, A. Smith, R. A. Paynter, D. R. Skibola, L. Agana, E. Roman, E. Kane, and J. K. WienckeLeukemia and Lymphoma, Vol. 51, No. 3, pp. 497-506March 2010Algorithms
Detection of Molecular Paths Associated with Insulitis and Type 1 Diabetes in Non-Obese Diabetic MouseE. Lindfors, P. V. Gopalachrayulu, E. Halperin, and M. OresicPLoS, Vol. 4, Issue 10, e7323October 2009Algorithms[PDF]

Towards Lightweight Self-Configuration in Wireless Sensor NetworksB. Satzger, F. Bagci, F. Kluge, and T. UngererProceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), Sierre, Switzerland, pp. 791-792March 2010Algorithms[PDF]

Autonomous and Scalable Failure Detection in Distributed SystemsB. Satzger, A. Pietzowski, and T. UngererInternational Journal of Autonomous and Adaptive Communications Systems, Vol. 4, No.1, pp. 61-77January 2011Algorithms
A Practical Computer Immunology Approach for Self-Protection Enhanced by Optimization TechniquesA. Pietzowski, B. Satzger, W. Trumler, and T. UngererJournal of Autonomic and Trusted Computing 2010Algorithms
An Anticorrelation Kernel for Subsystem Training in Multiple Classifier SystemsL. Ferrer, K. Sönmez, and E. ShribergJournal of Machine Learning Research, Vol. 10, pp. 2079-2114September 2009Speech[PDF]

The Iterated Weakest LinkR. Böhme and T. MooreIEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55January 2010Networking[PDF]

Trained to Accept? A Field Experiment on Consent DialogsR. Boehme and S. KoepsellProceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406April 2010Networking[PDF]

Accurate Estimation of Expression Levels of Homologous Genes in RNA-Seq ExperimentsB. Pasaniuc, N. Zaitlen, and E. HalperinProceedings of the Fourteenth International Conference on Research in Computational Biology (RECOMB 2010), Lisbon, Portugal, pp. 397-409. Also appears in Journal of Computational Biology (a special issue of RECOMB), Vol. 18, Issue 3, pp. 489-468, March 2011.April 2010Algorithms[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3March 2010Networking[PDF]

A Policy Framework for the Future InternetA. Seehra, J. Naous, M. Walfish, D. Maziéres, A. Nicolosi, and S. ShenkerProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

SemEval-2010 Task 10: Linking Events and their Participants in DiscourseJ. Ruppenhofer, C. Sporleder, R. Morante, C. Baker, and M. PalmerProceedings of the Workshop on Semantic Evaluations: Recent Achievements and Future Directions (SEW 09) at the North American Chapter of the Association for Computational Linguistics Human Language Technologies Conference (NAACL HLT 2009), Boulder, Colorado, pp. 106-111June 2009AI[PDF]

Outside the Closed World: On Using Machine Learning for Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316May 2010Networking[PDF]

On the Price of Heterogeneity in Parallel SystemsP. Brighten Godfrey and R. M. KarpTheory of Computing Systems, Vol. 45, No. 2, pp. 280-301August 2009Algorithms[PDF]

Composing Parallel Software Efficiently with LitheH. Pan, B. Hindman, and K. AsanovićProceedings of the Programming Language Design and Implementation (PLDI 2010), Toronto, Canada, pp. 376-387June 2010Architecture
Understanding Science Through the Lens of ComputationR. KarpPresented at the Symposium on Transformational Information Engineering and Science, SingaporeJanuary 2010Algorithms
Three Combinatorial Problems in Computational and Genomic BiologyR. KarpIFORS Distinguished Lecture at the Joint International Meeting of the Canadian Operational Research Society and the Institute for Operations Research and the Management Sciences (CORS-INFORMS International), Toronto, CanadaJune 2009Algorithms
Rethinking Enterprise Network ControlM. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 17, No. 4, pp. 1270-1283August 2009Networking[PDF]

Pages