| Speaker Adaptation of Language and Prosodic Models for Automatic Dialog Act Segmentation of Speech | J. Kolar, Y. Liu, and E. Shriberg | Speech Communication, Vol. 52, Issue 3, pp. 236-245 | March 2010 | Speech | |
| Covering Games: Approximation Through Non-Cooperation | M. Gairing | Proceedings of the Fifth Workshop on Internet and Network Economics (WINE '09), Rome, Italy, pp. 184-195 | December 2009 | Algorithms | [PDF]
|
| Efficient Broadcast on Random Geometric Graphs | M. Bradonjić, R. Elsässer, T. Friedrich, T. Sauerwald, and A. Stauffer | Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA 2010), Austin, Texas, pp. 1412-1421 | January 2010 | Algorithms | [PDF]
|
| Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems | S. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. Taft | Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394 | April 2009 | Networking | [PDF]
|
| ICTD State of the Union: Where Have We Reached and Where Are We Headed? | S. Nedevschi, R. Patra, and J. Pal | Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, Qatar | April 2009 | Networking | [PDF]
|
| Analysis of an Asymmetric Mutation Operator | T. Jansen and D. Sudholt | Evolutionary Computation, Vol. 18, No. 1, pp. 1-26 | January 2010 | Algorithms | |
| The "Dresden Image Database" for Benchmarking Digital Image Forensics | T. Gloe and R. Boehme | Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, Switzerland | March 2010 | Networking | |
| Privacy in Online Social Lending | R. Boehme and S. Poetzsch | Proceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28 | March 2010 | Networking | [PDF]
|
| Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and Practice | S. Thiem and J. Laessig | In Particle Swarm Optimization: Theory, Techniques and Applications, A. E. Olsson, ed., Nova Science Publishers, ISBN: 978-1-61668-527-0 | 2010 | Algorithms | |
| Aufträge, Partner, Kosten - Kooperation statt Konkurrenz | J. Lässig, S. Heinrich, and U. Trommler | IT&Production, Issue 10, pp. 74-76 | November 2009 | Algorithms | |
| A New Biology for the 21st Century | National Research Council of the National Academies | Report of Committee on a New Biology for the 21st Century: Ensuring the United States Leads the Coming Biology Revolution | 2010 | Algorithms | [PDF]
|
| Parallel Training of a Multi-Layer Perceptron on a GPU | C. Oei, G. Friedland, and A. Janin | ICSI Technical Report TR-09-008 | October 2009 | ICSI Technical Reports | [PDF]
|
| Botnet Judo: Fighting Spam with Itself | A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. Savage | Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, California | February 2010 | Networking | [PDF]
|
| Handling Temporal Granularity in Mobile Services | S. Pfennigschmidt and A. Voisard | Proceedings of the 2009 IEEE International Conference on Wireless and Mobile Computing, Networking, and Communications (WiMob 2009), Marrakech, Morocco, pp. 295-300 | October 2009 | Other | |
| Spatial Operations and Map Operations | M. Scholl and A. Voisard | In Encyclopedia of Database Systems, L. Ling and M. T. Ozsu, eds., pp. 2719-2725, Springer | 2009 | Other | |
| Early Warning Systems in Practice: Performance of the SAFE System in the Field | M. Klafft, T. Kraentzer, U. Meissen, and A. Voisard | Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems (ACM-GIS 2009), Seattle, Washington, pp. 436-439 | November 2009 | Other | |
| A New Perspective on Efficient and Dependable Vehicle Routing | D. Pfoser, A. Efentakis, A. Voisard, and C. Wenk | Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems (ACM-GIS 2009), Seattle, Washington, pp. 388-391 | November 2009 | Other | |
| A computational model of attachment secure responses in the Strange Situation | A. Amengual | TR-09-002 | March 2009 | ICSI Technical Reports | |
| World Color Survey | P. Kay, B. Berlin, L. Maffi, W. R. Merrifield, and R. Cook | CSLI Publications | 2010 | AI | |
| On Constructing a Trusted Path to the User | N. Weaver and M. Allman | ICSI Technical Report TR-09-009 | December 2009 | ICSI Technical Reports | [PDF]
|
| A Large-Scale Empirical Analysis of Email Spam Detection Through Transport-Level Characteristics | T. Ouyang, S. Ray, M. Allman, and M. Rabinovich | ICSI Technical Report TR-10-001 | January 2010 | ICSI Technical Reports | [PDF]
|
| A Longitudinal View of HTTP Traffic | T. Callahan, M. Allman, and V. Paxson | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| Web Timeouts and Their Implications | Z. Al-Qudah, M. Rabinovich, and M. Allman | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| A Design-Space Exploration for CMOS Photonic Processor Networks | V. Stojanović, A. Joshi, C. Batten, Y.-J. Kwon, S. Beamer, S. Chen, and K. Asanović | Invited talk at the Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC 2010), San Diego, California | March 2010 | Architecture | |
| Tuning-Robust Initialization Methods for Speaker Diarization | D. Imseng and G. Friedland | IEEE Transactions on Audio, Speech, and Language Processing, Vol. 18, Issue 8, pp. 2028-2037 | November 2010 | Speech | [PDF]
|
| An Adaptive Initialization Method for Speaker Diarization Based on Prosodic Features | D. Imseng and G. Friedland | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 4946-4949 | March 2010 | Speech | [PDF]
|
| Selected Papers from the 11th IEEE International Symposium on Multimedia (ISM2009) | G. Friedland and M.-L. Shyu, eds. | International Journal on Semantic Computing, Vol. 4, No. 2 | November 2010 | Speech | |
| Selected Papers from the Third IEEE International Conference on Semantic Computing (ICSC2009) | G. Friedland and S. C. Shen, eds. | International Journal on Semantic Computing, Vol. 3, Issue 4 | December 2009 | Speech | |
| Architectural Patterns for RFID Applications in Manufacturing | H. Ziekow, L. Ivantysynova, and O. Guenther | Proceedings of the 18th European Conference on Information Systems (ECIS 2010), Pretoria, South Africa | June 2010 | Other | |
| Summarization- and Learning-Based Approaches to Information Distillation | B. Toth, D. Hakkani-Tur, and S. Yaman | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 5306-5309 | March 2010 | Speech | [PDF]
|
| Tutor-Based Learning of Visual Categories Using Different Levels of Supervision | M. Fritz, G.-J. Kruijff, and B. Schiele | Computer Vision and Image Understanding, Vol. 114, Issue 5, pp. 564-573 | May 2010 | Vision | |
| Leveraging Genetic Variability Across Populations for the Identification of Causal Variants | N. Zaitlen, B. Pasaniuc, T. Gur, E. Zic, and E. Halperin | The American Journal of Human Genetics, Vol. 86, Issue 1, pp. 23-33 | January 2010 | Algorithms | |
| Chemokine Polymorphisms and Lymphoma: A Pooled Analysis | P. M. Bracci, C. F. Skibola, L. Conde, E. Halperin, T. Lightfoot, A. Smith, R. A. Paynter, D. R. Skibola, L. Agana, E. Roman, E. Kane, and J. K. Wiencke | Leukemia and Lymphoma, Vol. 51, No. 3, pp. 497-506 | March 2010 | Algorithms | |
| Detection of Molecular Paths Associated with Insulitis and Type 1 Diabetes in Non-Obese Diabetic Mouse | E. Lindfors, P. V. Gopalachrayulu, E. Halperin, and M. Oresic | PLoS, Vol. 4, Issue 10, e7323 | October 2009 | Algorithms | [PDF]
|
| Towards Lightweight Self-Configuration in Wireless Sensor Networks | B. Satzger, F. Bagci, F. Kluge, and T. Ungerer | Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), Sierre, Switzerland, pp. 791-792 | March 2010 | Algorithms | [PDF]
|
| Autonomous and Scalable Failure Detection in Distributed Systems | B. Satzger, A. Pietzowski, and T. Ungerer | International Journal of Autonomous and Adaptive Communications Systems, Vol. 4, No.1, pp. 61-77 | January 2011 | Algorithms | |
| A Practical Computer Immunology Approach for Self-Protection Enhanced by Optimization Techniques | A. Pietzowski, B. Satzger, W. Trumler, and T. Ungerer | Journal of Autonomic and Trusted Computing | 2010 | Algorithms | |
| An Anticorrelation Kernel for Subsystem Training in Multiple Classifier Systems | L. Ferrer, K. Sönmez, and E. Shriberg | Journal of Machine Learning Research, Vol. 10, pp. 2079-2114 | September 2009 | Speech | [PDF]
|
| The Iterated Weakest Link | R. Böhme and T. Moore | IEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55 | January 2010 | Networking | [PDF]
|
| Trained to Accept? A Field Experiment on Consent Dialogs | R. Boehme and S. Koepsell | Proceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406 | April 2010 | Networking | [PDF]
|
| Accurate Estimation of Expression Levels of Homologous Genes in RNA-Seq Experiments | B. Pasaniuc, N. Zaitlen, and E. Halperin | Proceedings of the Fourteenth International Conference on Research in Computational Biology (RECOMB 2010), Lisbon, Portugal, pp. 397-409. Also appears in Journal of Computational Biology (a special issue of RECOMB), Vol. 18, Issue 3, pp. 489-468, March 2011. | April 2010 | Algorithms | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | ACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3 | March 2010 | Networking | [PDF]
|
| A Policy Framework for the Future Internet | A. Seehra, J. Naous, M. Walfish, D. Maziéres, A. Nicolosi, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| SemEval-2010 Task 10: Linking Events and their Participants in Discourse | J. Ruppenhofer, C. Sporleder, R. Morante, C. Baker, and M. Palmer | Proceedings of the Workshop on Semantic Evaluations: Recent Achievements and Future Directions (SEW 09) at the North American Chapter of the Association for Computational Linguistics Human Language Technologies Conference (NAACL HLT 2009), Boulder, Colorado, pp. 106-111 | June 2009 | AI | [PDF]
|
| Outside the Closed World: On Using Machine Learning for Network Intrusion Detection | R. Sommer and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316 | May 2010 | Networking | [PDF]
|
| On the Price of Heterogeneity in Parallel Systems | P. Brighten Godfrey and R. M. Karp | Theory of Computing Systems, Vol. 45, No. 2, pp. 280-301 | August 2009 | Algorithms | [PDF]
|
| Composing Parallel Software Efficiently with Lithe | H. Pan, B. Hindman, and K. Asanović | Proceedings of the Programming Language Design and Implementation (PLDI 2010), Toronto, Canada, pp. 376-387 | June 2010 | Architecture | |
| Understanding Science Through the Lens of Computation | R. Karp | Presented at the Symposium on Transformational Information Engineering and Science, Singapore | January 2010 | Algorithms | |
| Three Combinatorial Problems in Computational and Genomic Biology | R. Karp | IFORS Distinguished Lecture at the Joint International Meeting of the Canadian Operational Research Society and the Institute for Operations Research and the Management Sciences (CORS-INFORMS International), Toronto, Canada | June 2009 | Algorithms | |
| Rethinking Enterprise Network Control | M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 17, No. 4, pp. 1270-1283 | August 2009 | Networking | [PDF]
|