| Implications of Netalyzr's DNS Measurements | N. Weaver, C. Kreibich, B. Nechaev, and V. Paxson | Proceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United Kingdom | April 2011 | Networking | [PDF]
|
| The Ratio Method for Multi-View Color Constancy | T. Owens, K. Saenko, A. Chakrabarti, Y. Xiong, T. Zickler, and T. Darrell | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-23, Berkeley, California | April 2011 | Vision | [PDF]
|
| Metric Learning for Reinforcement Learning Agents | M. E. Taylor, B. Kulis, and F. Sha | Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), Taipei, Taiwan | May 2011 | Vision | [PDF]
|
| CUDA-Level Performance with Python-Level Productivity for Gaussian Mixture Model Applications | H. Cook, E. Gonina, S. Kamil, G. Friedland, D. Patterson, and A. Fox | Proceedings of the Third USENIX Workshop on Hot Topics in Parallelism (HotPar ’11), Berkeley, California | May 2011 | Speech | [PDF]
|
| User Verification: Matching the Uploaders of Videos Across Accounts | H. Lei, J. Choi, A. Janin, and G. Friedland | Proceedings of the IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 2404-2407 | May 2011 | Speech | [PDF]
|
| Algorithms to Detect Multiprotein Modularity Conserved During Evolution | L. Hodgkinson and R. M. Karp | Proceedings of the 7th International Symposium on Bioinformatics Research
and Applications (ISBRA 2011), Changsha, China. Also in IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2011. | May 2011 | Algorithms | [PDF]
|
| Click Trajectories: End-to-End Analysis of the Spam Value Chain | K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage | Proceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, California | May 2011 | Networking | [PDF]
|
| The SRI NIST 2010 Speaker Recognition Evaluation System | N. Scheffer, L. Ferrer, M. Graciarena, S. Kajarekar, E. Shriberg, and A. Stolcke | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 5292-5295 | May 2011 | Speech | [PDF]
|
| The IBM 2009 GALE Arabic Speech Transcription System | B. Kingsbury, H. Soltau, G. Saon, S. Chu, H.-K. Kuo, L. Mangu, S. Ravuri, A. Janin, and N. Morgan | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 4672-4675 | May 2011 | Speech | [PDF]
|
| Language-Independent Constrained Cepstral Features for Speaker Recognition | E. Shriberg and A. Stolcke | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 5296-5299 | May 2011 | Speech | [PDF]
|
| Bird Species Recognition Combining Acoustic and Sequence Modeling | M. Graciarena, M. Delplanche, E. Shriberg, and A. Stolcke | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 341-344 | May 2011 | Speech | [PDF]
|
| Design and Evaluation of a Real-Time URL Spam Filtering Service | K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song | Proceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464 | May 2011 | Networking | [PDF]
|
| Making the Most from Multiple Microphones in Meeting Recognition | A. Stolcke | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 4992-4995 | May 2011 | Speech | [PDF]
|
| Associating Children’s Non-Verbal and Verbal Behaviour: Body Movements, Emotions, and Laughter in a Human-Robot Interaction | A. Batliner, S. Steidl, and E. Nöth | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 22-27 | May 2011 | Speech | [PDF]
|
| Comparing Multilayer Perceptron to Deep Belief Network Tandem Features for Robust ASR | O. Vinyals and S. Ravuri | Proceedings of the 36th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '11), Prague, Czech Republic | May 2011 | Speech | [PDF]
|
| GQ: Practical Containment for Measuring Modern Malware Systems | C. Kreibich, N. Weaver, C. Kanich, W. Cui, and V. Paxson | ICSI Technical Report TR-11-002 | May 2011 | ICSI Technical Reports | [PDF]
|
| Disk-Locality in Datacenter Computing Considered Irrelevant | G. Anantharayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, California | May 2011 | Networking | [PDF]
|
| The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA | A. Waterman, Y. Lee, D. Patterson, and K. Asanovic | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-62, Berkeley, California | May 2011 | Architecture | [PDF]
|
| Estimating Dominance in Multi-Party Meetings Using Speaker Diarization from a Single Microphone | H. Hung, Y. Huang, G. Friedland, and D. Gatica-Perez | IEEE Transactions on Audio, Speech and Language Processing, Vol. 19, No. 4, pp. 847–860 | May 2011 | Speech | |
| Review of F. V. Fomin and D. Kratsch, "Exact Exponential Algorithms" | M. Mnich | Operations Research Letters, Vol. 39, No. 3, pp. 229-230 | May 2011 | Algorithms | |
| Combinatorial Games with a Pass: A Dynamical Systems Approach | R. Morrison, E. Friedman, and A. Landsberg | Proceedings of the 4th International Conference on Chaotic Modeling, Simulation, and Applications (CHAOS2011), Agios Nikolaos, Greece | May 2011 | Algorithms | [PDF]
|
| Robust Convergence in Pulse Coupled Oscillators with Delays | J. Nishimura and E. Friedman | In Physical Review Letters, Vol. 106, No. 19, DOI:10.1103/PhysRevLett.106.194101 | May 2011 | Algorithms | |
| Parametrized Shape Models for Clothing | S. Miller, M. Fritz, T. Darrell, and P. Abbeel | Proceedings of the 2011 IEEE International Conference on Robotics and Automation (ICRA 2011), Shanghai, China | May 2011 | Vision | [PDF]
|
| A Combined Analytical and Search-Based Approach for the Inductive Synthesis of Functional Programs | E. Kitzelmann | Künstliche Intelligenz, Vol. 25, No. 2, pp. 179-182. Extended abstract of PhD thesis. Also in Ausgezeichnete Informatikdissertationen as "Ein kombinierter analytischer und suchbasierter Ansatz zur induktiven Synthese funktionaler Programme" (Extended abstract in German) | May 2011 | AI | [PDF]
|
| Improving Energy Efficiency and Reducing Code Size with RISC-V Compressed | A. S. Waterman | UC Berkeley Master's thesis, Berkeley, California. Also EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-63, Berkeley, California | May 2011 | Architecture | [PDF]
|
| Computing TCP's Retransmission Timer | V. Paxson, M. Allman, J. Chu, and M. Sargent | RFC 6298 | June 2011 | Networking | [PDF]
|
| Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators | Y. Lee, R. Avizienis, A. Bishara, R. Xia, D. Lockhart, C. Batten, and K. Asanovic | Proceedings of the International Symposium on Computer Architecture (ISCA-2011), pp. 129-140, San Jose, California | June 2011 | Architecture | [PDF]
|
| What You Saw is Not What You Get: Domain Adaptation Using Asymmetric Kernel Transforms | B. Kulis, K. Saenko, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2011), Colorado Springs, Colorado, pp. 1785-1792 | June 2011 | Vision | [PDF]
|
| A Probabilistic Model for Recursive Factorized Image Features | S. Karayev, M. Fritz, S. Fidler, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2011), pp. 401-408, Colorado Springs, Colorado | June 2011 | Vision | [PDF]
|
| Jellyfish: Networking Data Centers Randomly | A. Singla, C.-Y. Hong, L. Popa, and P. Brighten Godfrey | Proceedings the Third USENIX Workshop on Hot Topics in Cloud Computing (USENIX HotCloud ‘11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter Networks | H. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. Guedes | Proceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| How Good Is the Crowd at "Real" WSD? | J. Hong and C. F. Baker | Proceedings of the Fifth Linguistic Annotation Workshop (LAW-V), Portland, Oregon | June 2011 | Speech | [PDF]
|
| Computing Security in the Developing World: A Case for Multidisciplinary Research | Y. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. Brewer | Proceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C. | June 2011 | Networking | [PDF]
|
| Learning Object Color Models from Multi- View Constraints | T. Owens, K. Saenko, A. Chakrabarti, Y. Xiong, T. Zickler, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2011), Colorado Springs, Colorado, pp. 169–176 | June 2011 | Vision | [PDF]
|
| The Datacenter Needs an Operating System | M. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Supervised Hierarchical Pitman-Yor Process for Natural Scene Segmentation | A. Shyr, T. Darrell, M. Jordan, and R. Urtasun | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2011), Colorado Springs, Colorado | June 2011 | Vision | [PDF]
|
| Planar k-Path in Subexponential Time and Polynomial Space | D. Lokshtanov, M. Mnich, and S. Saurabh | Proceedings of the 37th International Workshop on Graph-Theoretic Concepts in Computer Science (WG '11), Teplá-Klášter, Czech Republic | June 2011 | Algorithms | |
| Review of J. Ajmera, et al., "Two-Stream Indexing for Spoken Web Search" | G. Friedland | ACM Computing Reviews, CR139192 | June 2011 | Speech | |
| Gappy Phrasal Alignment by Agreement | M. Bansal, C. Quirk, and R. C. Moore | Proceedings of the 49th annual Meeting of the Association for Computational Linguistics, pp. 1308-1317 Portland, Oregon | June 2011 | Speech | [PDF]
|
| The Surprising Variance in Shortest-Derivation Parsing | M. Bansal and D. Klein | Proceedings of the 49th annual Meeting of the Association for Computational Linguistics, Portland, Oregon | June 2011 | Speech | [PDF]
|
| Web-Scale Features for Full-Scale Parsing | M. Bansal and D. Klein | Proceedings of the 49th annual Meeting of the Association for Computational Linguistics, pp. 693-702, Portland, Oregon | June 2011 | Speech | [PDF]
|
| An Assessment of Overt Malicious Activity Manifest in Residential Networks | G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin | Proceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163 | July 2011 | Networking | [PDF]
|
| What's Clicking What? Techniques and Innovations of Today's Clickbots | B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson | Proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183 | July 2011 | Networking | [PDF]
|
| Editorial: Architecting for Innovation | T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. Kuptsov | ACM SIGCOMM Computer Communications Review, Vol. 41, No. 3 | July 2011 | Networking | [PDF]
|
| Real-Time Musical Applications on an Experimental Operating System for Multi-Core Processors | J. Colmenares, I. Saxton, E. Battenberg, R. Avizienis, N. Peters, K. Asanovic, J. Kubiatowicz, and D. Wessel | Proceedings of the International Computer Music Conference (ICMC 2011), Huddersfield, England | July 2011 | Other | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, California | July 2011 | Networking | [PDF]
|
| A Search for Overlapping Genetic Susceptibility Loci Between Non-Hodgkin Lymphoma and Autoimmune Diseases | L. Conde, P. M. Bracci, E. Halperin, and C. F. Skibola | Genomics, Vol. 98, No. 1, pp. 9-14 | July 2011 | Algorithms | |
| Domination When the Stars Are Out | D. Hermelin, M. Mnich, E. J. van Leeuwen, and G. J. Woeginger | Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP 2011), pp. 432-473, Zurich, Switzerland | July 2011 | Algorithms | |
| Review of A. Rahman, et al., "Spatial-Geometric Approach to Physical Mobile Interaction Based on Accelerometer and IR Sensory Data Fusion" | G. Friedland | ACM Computing Reviews, CR139264 | July 2011 | Speech | |
| Two New Operators for IGOR2 to Increase Synthesis Efficiency | E. Kitzelmann | Proceedings of the Fourth International Workshop on Approaches and Applications of Inductive Programming (AAIP 2011), Odense, Denmark, pp. 49-61 | July 2011 | AI | [PDF]
|