| Designing Extensible IP Router Software | M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 189-202 | May 2005 | Networking | [PDF]
|
| Geographic Routing Made Practical | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 217-230 | May 2005 | Networking | [PDF]
|
| Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets | R. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. Stoica | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342 | May 2005 | Networking | [PDF]
|
| Opportunities and Challenges of Parallelizing Speech Recognition | J. Chong, G. Friedland, A. Janin, and N. Morgan | Proceedings of the Second USENIX Workshop on Hot Topics in Parallelism (HotPar '10), Berkeley, California | June 2010 | Speech | [PDF]
|
| Resource Management in the Tessellation Manycore OS | J. A. Colmenares, S. Bird, H. Cook, P. Pearce, D. Zhu, J. Shalf, K. Asanović, and J. Kubiatowicz | Proceedings of the Second USENIX Workshop on Hot Topics in Parallelism (HotPar'10), Berkeley, California | June 2010 | Architecture | [PDF]
|
| Spamcraft: An Inside Look At Spam Campaign Orchestration | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, Massachusetts | April 2009 | Networking | [PDF]
|
| Experiments on Curve Reconstruction | E. Althaus, K. Melhorn. S Naher, and S. Schirra | Proceedings of the Second Workshop Algorithm Engineering and Experiments (ALENEX00). Lecture Notes in Computer Science, Springer-Verlag, 2000. | 2000 | Algorithms | |
| Fixing the Embarrassing Slowness of OpenDHT on PlanetLab | S. Rhea, B.-G. Chun, J. Kubiatowicz, and S. Shenker | Proceedings of the Second Workshop on Real, Large Distributed Systems (WORLDS '05), San Francisco, California, pp. 25-30 | December 2005 | Networking | [PDF]
|
| Routing as a Service | K. Lakshminarayanan, I. Stoica, and S. Shenker | Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004), Tahoe City, California | January 2004 | Networking | [PDF]
|
| The Click Modular Router | R. Morris, E. Kohler, J. Jannotti, and M.F. Kaashoek | Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP '99) , Kiawah Island, South Carolina, December 1999, pages 217-231. | December 1999 | Networking | |
| Towards Optimally Multiplexed Applications of Universal DNA Tag Systems | A. Ben-Dor, T. Hartman, B. Schwikowski, R. Sharan, and Z. Yakhini | Proceedings of the Seventh Annual International Conference on Research in Computational Molecular Biology (RECOMB'03), ACM Press, 48-56 | 2003 | Algorithms | |
| Large Scale Reconstruction of Haplotypes from Genotype Data | E. Eskin, E. Halperin, and R.M. Karp | Proceedings of the Seventh Conference on Research in Computational Biology (RECOMB), 104-113 | 2003 | Algorithms | |
| Satellite Network Performance Measurements Using Simulated Multi-User Internet Traffic | H. Kruse, M. Allman, J. Griner, S. Ostermann, and E. Helvey | Proceedings of the Seventh International Conference on Telecommunication Systems. March 1999. | March 1999 | Networking | |
| Text Classification by Augmenting the Bag-of-Words Representation with Redundancy-Compensated Bigrams | C. Boulis and M. Ostendof | Proceedings of the SIAM International Conference on Data Mining at the Workshop on Feature Selection in Data Mining (SIAM-FSDM 2005), Newport Beach, California | April 2005 | Speech | [PDF]
|
| An Analysis of Sentence Segmentation Features for Broadcast News, Broadcast Conversations, and Meetings | S. Cuendet, E. Shriberg, B. Favre, J. Fung, and D. Hakkani-Tür | Proceedings of the SIGIR Workshop on Searching Conversational Spontaneous Speech, Amsterdam, Netherlands, pp. 43-59 | July 2007 | Speech | |
| A frame-semantic approach to semantic annotation | J.B. Lowe, C.F. Baker, and C.J. Fillmore | Proceedings of the SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How?, Washington, D.C., in conjunction with the Fifth Conference on Applied Natural Language Processing (ANLP 97) | April 04 1997 | AI | |
| Discovering Local Structure in Gene Expression Data: The Order Preserving Submatrix Problem | A. Ben-Dor, B. Chor, R.M. Karp, and Z. Yakhini | Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02) | 2002 | Algorithms | |
| The Restriction Scaffold Problem | A. Ben-Dor, R.M. Karp, B Schwikowski, and R. Shamir | Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02), 2002. | 2002 | Algorithms | |
| Topology-Informed Internet Replica Placement | P. Radoslavov, R. Govindan, and D. Estrin | Proceedings of the Sixth International Workshop on Web Caching and Content Distribution, Boston University, Boston, Massachusetts, USA, June 20-22, 2001. | June 20 2001 | Networking | |
| On the Performance of TCP-Based Data Transfers on a Faded Ka-Band Satellite Link | H. Kruse, S. Ostermann, and M. Allman | Proceedings of the Sixth Ka-Band Utilization Conference, June 2000. | June 2000 | Networking | |
| On the Impact of Bursting on TCP Performance | E. Blanton and M. Allman | Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, Massachusetts | March 2005 | Networking | [PDF]
|
| Text-Constrained Speaker Recognition on a Text-Independent Task | K. Boakye and B. Peskin | Proceedings of the Speaker and Language Recognition Workshop (Odyssey 2004), Toledo, Spain | May 2004 | Speech | [PDF]
|
| Modeling NERFs for Speaker Recognition | S. Kajarekar, L. Ferrer, K. Sonmez, J. Zheng, E. Shriberg, and A. Stolcke | Proceedings of the Speaker and Language Recognition Workshop (Odyssey 2004), Toledo, Spain, pp. 51-56 | May 2004 | Speech | [PDF]
|
| Hunting for Wolves in Speaker Recognition | L. Stoll and G. Doddington | Proceedings of the Speaker and Language Recognition Workshop (Odyssey 2010), Brno, Czech Republic, pp. 159-164 | June 2010 | Speech | [PDF]
|
| Multiple-State Context-Dependent Phonetic Modeling with MLPs | M. Cohen, H. Franco, N. Morgan, D. Rumelhart, and V. Abrash | Proceedings of the Speech Research Symposium XII, Rutgers University, Camden, New Jersey | 1992 | Speech | |
| RelAtive SpecTrAl (RASTA) Processing in Speech Analysis | H. Hermansky and N. Morgan | Proceedings of the Speech Research Symposium XII, Rutgers University, Camden, New Jersey | 1992 | Speech | |
| A Can of RASTA Worms | H. Hermansky and N. Morgan | Proceedings of the Speech Research Symposium XIII, Johns Hopkins University, Balitmore, Maryland, pp. 343-350 | 1993 | Speech | |
| The Berkeley Restaurant Project | C. Wooters, D. Jurafsky, G. Tajchman, and N. Morgan | Proceedings of the Speech Research Symposium XIII, Johns Hopkins University, Baltimore, Maryland, pp. 119-128 | 1993 | Speech | |
| The Role of Disfluencies on Topic Classification of Human-Human Conversations | C. Boulis, J. G. Kahn, and M. Ostendorf | Proceedings of the Spoken Language Understanding Workshop Program at the 20th National Conference on Artificial Intelligence (AAAI-05), Pittsburgh, Pennsylvania | July 2005 | Speech | [PDF]
|
| Building Efficient Wireless Sensor Networks With Low-Level Naming | J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan | Proceedings of the Symposium on Operating Systems Principles, Banff, Canada, October 2001. | October 2001 | Networking | |
| Stopping Spyware at the Gate: A User Study of Privacy, Notice, and Spyware | N. Good, J. Grossklags, R. Dhamija, D. Thaw, et. al. | Proceedings of the Symposium On Usable Privacy and Security (SOUPS 2005), Pittsburgh, Pennsylvania, pp. 43-52 | July 2005 | BCIS (archived) | [PDF]
|
| Computational Constraints on Higher Neural Representations | J.A. Feldman | Proceedings of the System Development Foundation Symposium on Computational Neuroscience, E. Schwartz (ed.), Bradford Books/MIT Press | April 1988 | AI | |
| The FrameNet Database and Software Tools | J. Ruppenhofer, C.F. Baker, and C.J. Fillmore | Proceedings of the Tenth EURALEX International Congress (EURALEX 2010), Copenhagen, Denmark, Vol. I, pp. 371-375 | August 2002 | AI | [PDF]
|
| Programming Language Optimizations for Modular Router Configurations | E. Kohler, R. Morris, and B. Chen | Proceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, October 2002, pages 251-263. | October 2002 | Networking | |
| Seamless Multimedia Communications in Heterogeneous Mobile Access Networks | P. M. Ruiz, J.A. Botia, A. Gomez-Skarmeta | Proceedings of the TERENA Networking Conference (TNC 2004), Rhodes, Greece | June 2004 | Networking | [PDF]
|
| FrameNet Meets the Semantic Web: A DAML+OIL Frame Representation | S. Narayanan, C.J. Fillmore, C.F. Baker, and M.R.L. Petruck | Proceedings of the The Eighteenth National Conference on Artificial Intelligence. Edmonton, Canada | 2002 | AI | |
| Real Language Learning | J. Feldman | Proceedings of the the Grammatical Inference, 4th International Colloquium (ICGI 1998), Ames, Iowa, pp. 114-125 | July 1998 | AI | |
| Neural Networks for Statistical Inference: Generalizations with Applications to Speech Recognition | H. Bourlard and N. Morgan | Proceedings of the the International Joint Conference on Neural Networks (IJCNN '91), Singapore | 1991 | Speech | |
| Approximation and Collusion in Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Proceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001), Tampa, Florida, pp. 253-255 | October 2001 | Networking | |
| A Unifying Link Abstraction for Wireless Sensor Networks | J. Polastre, J. Hui, P. Levis, J. Zhao, D. Culler, S. Shenker, and I. Stoica | Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), San Diego, California, pp. 76-89 | November 2005 | Networking | |
| Overcoming the Internet Impasse through Virtualization | L. Peterson, S. Shenker, and J.Turner | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. Stoica | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Reduced State Routing in the Internet | R. Gummadi, N. Kothari, Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Subtree isomorphism is in random NC | P.B. Gibbons, R. M. Karp, G.L. Miller, and D. Soroker. Edited by J.H. Reif | Proceedings of the Third Aegean Workshop on Computing, VLSI Algorithms and Architectures (AWOC 88), Corfu, Greece, pp. 43-52 | July 1988 | Algorithms | |
| GMR: Geographic Multicast Routing for Wireless Sensor Networks | J.A. Sanchez, P. M. Ruiz, and I. Stojmenovic | Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Networks (IEEE SECON 2006), Reston, Virginia | September 2006 | Networking | |
| A Neural Network Based, Speaker Independent, Large Vocabulary, Continuous Speech Recognition System: the Wernicke Project | A. Robinson, L. Almeida, J. Boite, H. Bourlard, F. Fallside, H. Hochberg, D. Kershaw, P. Kohn, Y. Konig, N. Morgan, J. Neto, S. Renals, M. Saerens, and C. Wooters | Proceedings of the Third European Conference on Speech Communication and Technology (Eurospeech '93), Berlin, Germany, pp. 1941-1944 | 1993 | Speech | |
| Towards Structured Approaches to Arbitrary Data Selection and Performance Prediction for Speaker Recognition | H. Lei | Proceedings of the Third IAPR/IEEE International Conference on Biometrics (ICB 2009), Alghero, Italy | June 2009 | Speech | [PDF]
|
| Simulation-Based Evolutionary Optimization of Complex Multi-Location Inventory Models | C. A. Hochmuth, J. Laessig, and S. Thiem | Proceedings of the Third IEEE International Conference on Computer Science and Information Technology (IEEE ICCSIT 2010), pp. 703-708, Chengdu, China | July 2010 | Algorithms | [PDF]
|
| On the Use of Artificial Conversation Data for Speaker Recognition in Cars | L. Gottlieb and G. Friedland | Proceedings of the Third IEEE International Conference on Semantic Computing (ICSC-2009), Berkeley, California, pp. 124-128 | September 2009 | Speech | [PDF]
|
| UbiMASS - Ubiquitous Mobile Agent System for Wireless Sensor Networks | F. Bagci, J. Wolf, B. Satzger, and T. Ungerer | Proceedings of the Third IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2010), Newport Beach, California, pp. 245-252 | June 2010 | Algorithms | [PDF]
|