| Machine Symbol Grounding and Optimization | O. Kramer | Proceedings of the Third International Conference on Agents and Artificial Intelligence (ICAART 2011), Rome, Italy | January 2011 | Algorithms | [PDF]
|
| Failure correction techniques for large disk arrays | G.A. Gibson, L. Hellerstein, R. M. Karp, R.H. Katz, and D.A. Patterson | Proceedings of the Third International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-III), Boston, Massachusetts, pp.123-32 | April 1989 | Algorithms | |
| Explaining the Structure of FrameNet with Concept Lattices | F.J. Valverde-Albacete | Proceedings of the Third International Conference on Formal Concept Analysis (ICFCA 2005), Lens, France, pp. 79-94 | February 2005 | AI | |
| An Intermittent Energy Internet Architecture | B. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. Streed | Proceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, Spain | May 2012 | Networking | [PDF]
|
| Fast and Intuitive Clustering of Web Documents | O. Zamir, O. Etzioni, O. Madani, and R.M. Karp | Proceedings of the Third International Conference on Knowledge Discovery and Data Mining. 14-17 Aug. 1997. Edited by: Heckerman, D.; Mannila, H.; Pregibon, D.; Uthurusamy, R. Menlo Park, CA, USA: AAAI Press, 1997. p. 287-90. | August 1997 | Algorithms | |
| Seeing Arguments Through Transparent Structures | C.J. Fillmore, C.F. Baker, and H. Sato | Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002), Las Palmas, Spain, pp. 787-91 | May 2002 | AI | [PDF]
|
| The FrameNet Database and Software Tools | C. J. Fillmore, C. F. Baker, and H. Sato | Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002), Las Palmas, Spain, pp. 1157-1160 | May 2002 | AI | [PDF]
|
| Bilingual FrameNet Dictionaries for Machine Translation | H. C. Boas | Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002), Las Palmas, Spain, Vol. IV, pp. 1364-1371 | May 2002 | AI | [PDF]
|
| Designing a Connectionist Network Supercomputer | J. Feldman et. al | Proceedings of the Third International Conference on Microelectronics for Neural Networks, Edinburgh, Scotland, United Kingdom, pp. 253-262. UnivEd Technologies Ltd., University of Edinburgh. | April 1993 | AI | |
| Improved Estimates for the Rescaled Range and Hurst Exponents | J. Moody and L. Wu | Proceedings of the Third International Conference on Neural Networks in Financial Engineering, London, pp. 537-553 | October 1996 | Algorithms | |
| Trading with Committees: A Comparative Study | S. Rehfuss, L. Wu, and J. Moody | Proceedings of the Third International Conference on Neural Networks in the Capital Markets, London, United Kingdom | October 1996 | Algorithms | |
| Modeling Dynamics in Connectionist Speech Recognition - the Time Index Model | Y. Konig and N. Morgan | Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94), Yokohama, Japan, pp. 1523-1526 | September 1994 | Speech | [PDF]
|
| Stochastic Perceptual Auditory-Event-Based Models for Speech Recognition | N. Morgan, H. Bourlard, S. Greenberg, and H. Hermansky | Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94), Yokohama, Japan, pp. 1943-1946 | 1994 | Speech | [PDF]
|
| Multiple-Pronunciation Lexical Modeling in a Speaker Independent Speech Understanding System | C. Wooters and A. Stolcke | Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94), Yokohama, Japan, pp. 1963-1966 | September 1994 | Speech | [PDF]
|
| The Berkeley Restaurant Project | D. Jurafsky, C. Wooters, G. Tajchman, J. Segal, A. Stolcke, E. Fosler, and N. Morgan | Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94), Yokohama, Japan, pp. 2139-2142 | September 1994 | Speech | [PDF]
|
| The Role of Soft Information in Trust Building: Evidence from Online Social Lending | S. Poetzsch and R. Boehme | Proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), Berlin, Germany, pp. 381-395 | June 2010 | Networking | |
| Soft Computing in Shruti -- A neurally plausible model of reflexive reasoning and relational information processing | L. Shastri and C. Wendelken | Proceedings of the Third International Symposium on Soft Computing, Genova, Italy, pp. 741-747 | June 1999 | AI | |
| Narrative-Theme Navigation for Sitcoms Supported by Fan-Generated Scripts | G. Friedland, L. Gottlieb, and A. Janin | Proceedings of the Third International Workshop on Automated Information Extraction in Media Production (AIEMPro '10) at the ACM International Conference on Multimedia (ACM Multimedia 2010), Florence, Italy, pp. 3-8 | October 2010 | Speech | [PDF]
|
| A Dynamic Multilevel MPLS Protection Domain | E. Calle, T. Jové, P. Vilà, and J. L. Marzo | Proceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001), Budapest, Hungary | October 2001 | Networking | |
| Total Latency in Singleton Congestion Games | M. Gairing and F. Schoppmann | Proceedings of the Third International Workshop on Internet and Network Economics (WINE 2007), San Diego, California, pp. 381-387 | December 2007 | Algorithms | |
| Spurring Adoption of DHTs with OpenHash, a Public DHT Service | B. Karp, S. Ratnasamy, S. Rhea, and S. Shenker | Proceedings of the Third International Workshop on Peer-to-Peer Systems, San Diego, California | February 2004 | Networking | [PDF]
|
| Adaptive Web Caching: Towards a New Global Caching Architecture | L. Zhang, S. Michel, K. Nguyen, A. Rosenstein, S. Floyd, and V. Jacobson | Proceedings of the Third International WWW Caching Workshop | June 1998 | Networking | |
| Overlap in Meetings: ASR Effects and Analysis by Dialog Factors, Speakers, and Collection Site | O. Cetin and E. Shriberg | Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006), Washington DC, pp. 212-224 | May 2006 | Speech | [PDF]
|
| Automatic Cluster Complexity and Quantity Selection: Towards Robust Speaker Diarization | X. Anguera, C. Wooters, and J. Hernando | Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006), Washington DC, pp. 248-256 | May 2006 | Speech | [PDF]
|
| Speaker Diarization for Multi-Microphone Meetings Using Only Between-Channel Differences | J.M. Pardo, X Anguera, and C. Wooters | Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006), Washington DC, pp. 257-264 | May 2006 | Speech | [PDF]
|
| WordNet and FrameNet as Complementary Resources for Annotation | C. F. Baker and C. Fellbaum | Proceedings of the Third Linguistic Annotation Workshop (LAW III), Suntec, Singapore, pp. 125-129 | August 2009 | AI | [PDF]
|
| OCALA: An Architecture for Supporting Legacy Applications Over Overlays | D. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. Wehrle | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280 | May 2006 | Networking | [PDF]
|
| Distributed Quota Enforcement for Spam Control | M. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296 | May 2006 | Networking | [PDF]
|
| Practical Data-Centric Storage | C. T. Ee, S. Ratnasamy, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338 | May 2006 | Networking | [PDF]
|
| The Datacenter Needs an Operating System | M. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| CUDA-Level Performance with Python-Level Productivity for Gaussian Mixture Model Applications | H. Cook, E. Gonina, S. Kamil, G. Friedland, D. Patterson, and A. Fox | Proceedings of the Third USENIX Workshop on Hot Topics in Parallelism (HotPar ’11), Berkeley, California | May 2011 | Speech | [PDF]
|
| Principles for Developing Comprehensive Network Visibility | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, California | July 2008 | Networking | [PDF]
|
| Insights from the Inside: A View of Botnet Management from Infiltration | C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| On the Potential of Proactive Domain Blacklisting | M. Felegyhazi, C. Kreibich, and V. Paxson | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| A generalization of binary search | R. M. Karp. Edited by: F. Dehne, J.R. Sack, N. Santoro, and S. Whitesides | Proceedings of the Third Workshop on Algorithms and Data Structures (WADS'93), Montreal, Quebec, Canada, pp. 27-34 | August 1993 | Algorithms | |
| Idetifying Blocks and Sub-Populations in Noisy SNP Data | G. Kimmel, R. Sharan, and R. Shamir | Proceedings of the Third Workshop on Algorithms in Bioinformatics (WABI'03), pp. 303-319 | 2003 | Algorithms | |
| Towards an Economic Analysis of Trusted Systems (Position Paper) | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Providing Packet Obituaries | K. Argyraki, P. Maniatis, D. Cheriton, and Scott Shenker | Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter Networks | H. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. Guedes | Proceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Approximation Algorithms for Data Management in Networks | C. Krick, H. Racke, and M. Westermann | Proceedings of the Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA) pp. 237-246, 2001. | 2001 | Algorithms | |
| On the Complexity of Unsatisfiability Proofs for Random k-CNF Formulas | P. Beame, R.M. Karp, T. Pitassi, and M. Saks | Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing. May 1998. New York, New York, USA: ACM, 1998. p. 561-71. | May 1998 | Algorithms | |
| Refinement of Observations Under Budget Constraints in Active Learning | N. Cebron | Proceedings of the Towards Closing the Loop: Active Learning for Robotics Workshop at the 2010 Robotics: Science and Systems Conference (RSS 2010), Zaragoza, Spain | June 2010 | Vision | [PDF]
|
| Spectro-temporal Gabor Features as a Front End for Automatic Speech Recognition | M. Kleinschmidt | Proceedings of the Triennial Forum Acusticum 2002, Seville, Spain | September 2002 | Speech | [PDF]
|
| Integrality Ratio for Group Steiner Trees and Directed Steiner Trees | E. Halperin, G. Kortsarz, R. Krauthgamer, A. Srinivasan, and N. Wang | Proceedings of the Twelfth Symposium on Discrete Algorithms (SODA), 275-284 | 2003 | Algorithms | |
| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|
| Diverse Replication for Single-Machine Byzantine-Fault Tolerance | B.-C. Chun, P. Maniatis, and S. Shenker | Proceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292 | June 2008 | Networking | [PDF]
|
| Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity | C. Kreibich | Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118 | April 2005 | Networking | [PDF]
|
| On Controller Performance in Software-Defined Networks | A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood | Proceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, California | April 2012 | Networking | [PDF]
|
| Hedera: Dynamic Flow Scheduling for Data Center Networks | M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat | Proceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, California | April 2010 | Networking | [PDF]
|
| Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al Encaminar | C.M. Yago, P. M. Ruiz, and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |