Publication Search Results

Titlesort descendingAuthorBibliographicDateGroupLinks
The Sather 1.1 SpecificationD. Stoutamire and S. OmohundroICSI Technical Report TR-96-012August 1996ICSI Technical Reports[PDF]

The Sather Language and LibrariesS. Omohundro and C. C. LimICSI Technical Report TR-92-017March 1992ICSI Technical Reports[PDF]

The Scale Vector-Thread ProcessorR. Krashinsky, C. Batten, and K. AsanovićWinner, DAC/ISSCC Student Design Contest, Design Automation Conference, DAC/ISSCC, San Diego, CaliforniaJune 2007Architecture
The Science of Artificial IntelligenceJ.A. FeldmanCommentary on a paper by Duda, Nilsson, and Raphael, Research Directions in Software Technology 1977AI
The Sequential GMM: A Gaussian Mixture Model Based Speaker Verification System that Captures Sequential InformationS. StaffordM.S. Thesis, University of California at BerkeleyMay 2005Speech[PDF]

The SFRA: A Corner-Turn FPGA ArchitectureN. Weaver, J. Hauser and J. WawrzynekProceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12February 2004Networking[PDF]

The Shared-Memory Language pSather on a Distributed-Memory MultiprocessorJ.A. Feldman, C.C. Lim and T. RauberProceedings of the ACM Special Interest Group on Programming Languages (SIGPLAN) Workshop, pp. 17-20 1992AI
The Shunt: An FPGA-Based Accelerator for Network Intrusion PreventionN. Weaver, V. Paxson, and J.M. GonzalezProceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206February 2007Networking[PDF]

The Spectro-Microscopy Electronic NotebookS. R. Sachs, C. M. Dal Sasso Freitas, V. Markowitz, A. Talis, I-M. A. Chen, E. Szeto, and H. A. KunoICSI Technical Report TR-97-002January 1997ICSI Technical Reports[PDF]

The Spread of the Sapphire/Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverThe Cooperative Association for Internet Data Analysis Technical ReportFebruary 2003Networking
The SRI NIST 2008 Speaker Recognition Evaluation SystemS. S. Kajarekar, N. Scheffer, M. Graciarena, E. Shriberg, A. Stolcke, L. Ferrer, and T. BockletProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4205-4208April 2009Speech[PDF]

The SRI NIST 2010 Speaker Recognition Evaluation SystemN. Scheffer, L. Ferrer, M. Graciarena, S. Kajarekar, E. Shriberg, and A. StolckeProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 5292-5295May 2011Speech[PDF]

The SRI-ICSI Spring 2007 Meeting and Lecture Recognition SystemA. Stolcke, X. Anguera, K. Boakye, O. Cetin, A. Janin, M. Magimai-Doss, C. Wooters, and J. ZhengProceedings of the Second International Workshop on Classification of Events, Activities, and Relationships (CLEAR 2007) and the Fifth Rich Transcription 2007 Meeting Recognition (RT 2007), Baltimore, Maryland, pp. 450-463May 2007Speech[PDF]

The Stanford Hand-Eye ProjectJ.A. Feldman, C.M. Feldman, G. Falk, C. Grape, J. Pearlman, I. Sobel, and J.M. TenenbaumProceedings of the First International Joint Conference on Artificial Intelligence (IJCAI), Washington, DC, pp. 521-526May 1969AI
The Stanford Hand-Eye Project--Recent ResultsJ.A. FeldmanPresented at IFIP Congress, Stockholm, Sweden 1974AI
The Stationarity of Internet Path Properties: Routing, Loss, and ThroughputY. Zhang, V. Paxson, and S. ShenkerACIRI Technical Report, May 2000.May 2000Networking
The Strengths of Weaker Identities: Opportunistic PersonasM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, MassachusettsAugust 2007Networking[PDF]

The Structure of the Framenet DatabaseC.F. Baker, C. J. Fillmore, and B. CroninInternational Journal of Lexicography, Volume 16.3: 281-296. 2003. 2003AI
The Sublogarithmic Space WorldM. Liskiewicz and R. ReischukICSI Technical Report TR-93-048August 1993ICSI Technical Reports[PDF]

The Success of Open SourceS. WeberCambridge, MA, Harvard University Press 2004BCIS (archived)
The SuperSID Project: Exploiting High-Level Information for High-Accuracy Speaker RecognitionD. Reynolds, W. Andrews, J. Campbell, J. Navratil, B. Peskin, A. Adami, Q. Jin, D. Klusacek, J. Abramson, R. Mihaescu, J. Godfrey, D. Jones, and B. XiangProceedings of ICASSP-2003, Hong KongApril 2003Speech[PDF]

The Supervisor Synthesis Problem for Unrestricted CTL is NP-completeM. Antoniotti and B. MishraICSI Technical Report TR-95-062November 1995ICSI Technical Reports[PDF]

The Surprising Variance in Shortest-Derivation ParsingM. Bansal and D. KleinProceedings of the 49th annual Meeting of the Association for Computational Linguistics, Portland, OregonJune 2011Speech[PDF]

The Syllable Re-revisitedA. HauensteinICSI Technical Report TR-96-035August 1996ICSI Technical Reports[PDF]

The Synchronization of Periodic Routing MessagesS. Floyd and V. JacobsonIEEE/ACM Transactions on Networking, Vol. 2, No. 2, pp. 122-136April 1994Networking[PDF]

The Temporal Properties of Spoken Japanese Are Similar to Those of EnglishT. Arai and S. GreenbergProceedings of the Fifth European Conference on Speech Communication and Technology (Eurospeech '97), Rhodes, Greece, Vol. 2, pp. 1011-1014September 1997Speech[PDF]

The Top Speed of Flash WormsS. Staniford, D. Moore, V. Paxson, and N. WeaverProceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, VirginiaOctober 2004Networking[PDF]

The Transitive Closure of a Random DigraphR. M. KarpICSI Technical Report TR-89-047August 1989ICSI Technical Reports[PDF]

The Uninvited Guest: Information's Role in Guiding the Production of Spontaneous SpeechS. Greenberg and E. Fosler-LussierProceedings of the Crest Workshop on Models of Speech Production: Motor Planning and Articulatory Modelling, Kloster Seeon, GermanyMay 2000Speech[PDF]

The Use of End-to-end Multicast Measurements for Characterizing Internal Network BehaviorA. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S.B. Moon, V. Paxson, and D. TowsleyIEEE Communications, 38(5), May 2000.April 2000Networking
The Use of Vision and Manipulation to Solve theJ.A. Feldman, K.K. Pingle, T.O. Binford, G. Falk, A. Hay, R. Pau, R.F. Sproull, and J.M. TenenbaumProceedings of the Second International Joint Conferences on Artificial Intelligence (IJCAI 1971), London, UK, pp. 359-364September 1971AI
The Value of Auditory Offset Adaptation and Appropriate Acoustic ModelingH. Wang, D. Gelbart, H.G. Hirsch, and W. HemmertProceedings of the 9th Annual Conference of the International Speech Communication Association (Interspeech 2008), Brisbane, Australia, pp. 902-905September 2008Speech[PDF]

The Value of Visibility and RFID in Transshipment Operations—A Simulation StudyC. Goebel and O. GüntherProceedings of the 9th Internationale Tagung Wirtschaftsinformatik (WI 2009) (Conference on Business Informatics), Vienna, Austria,pp. 129-138February 2009Other
The Virtual Gallery (TVIG) - 3D Visualization of a Queryable Art-database on the InternetA. Mueller and E. NeuholdICSI Technical Report TR-98-039August 1998ICSI Technical Reports[PDF]

The Voice Mail Digits and Their Performance on ICSI's Hybrid HMM/ANN SystemR. KlischICSI Technical Report TR-96-013April 1996ICSI Technical Reports[PDF]

The Weft: A Representation for Periodic SoundsD. EllisThe 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997), Munich, Germany, Vol. 2, pp. 1307-1310April 1997Speech[PDF]

The Weighted Coupon Collector's Problem and ApplicationsP. Berenbrink and T. SauerwaldProceedings of the 15th International Computing and Combinatorics Conference (COCOON 2009), Niagra Falls, New York, pp. 449-458July 2009Algorithms
The Weighted List Update Problem and the Lazy AdversaryF. d'Amore, A. Marchetti-Spaccamela, and U. NanniICSI Technical Report TR-92-011February 1992ICSI Technical Reports[PDF]

The World Color Survey Database: History and UseR.S. Cook, P. Kay, and T. RegierHandbook of Categorisation in the Cognitive Sciences, H. Cohen and C. Lefebvre, eds., pp. 224-242, Elsevier 2005AI
Theoretical improvements in algorithmic efficiency for network flow problemsJ. Edmonds and R. M. KarpJournal of the Association for Computing Machinery, Vol. 19, No. 2, p. 248-64April 1972Algorithms
Theory of Computation as an Enabling Tool for the SciencesR. KarpPresented at the Turing Centennial Celebration, Princeton, New Jersey. Also presented at the 9th Annual Conference on Theory and Applications of Models of Computation (TAMC 2012), Turing Centenary Meeting, Beijing, ChinaMay 2012Algorithms
Therapy Plan Generation in Complex Dynamic EnvironmentsO. Arnold and K. P. JantkeICSI Technical Report tr-94-054October 1994ICSI Technical Reports[PDF]

There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced MediaG. Friedland, B. Martinez Elizalde, H. Lei, and A. DivakaranICSI Technical Report TR-12-006April 12 2012ICSI Technical Reports[PDF]

There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced MediaBenjamin Elizalde; Gerald Friedland; Howard Lei; Ajay DivakaranProceedings of the ACM International Workshop on Audio and Multimedia Methods for Large-Scale Video Analysis (AMVA) at ACM Multimedia 2012 (MM'12), Nara, Japan, pp. 27-32October 2012Speech[PDF]

Thoughts on ReviewingM. AllmanACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50April 2008Networking[PDF]

Thread Migration with Active ThreadsM. HoltkampICSI Technical Report TR-97-038September 1997ICSI Technical Reports[PDF]

Three Combinatorial Problems in Computational and Genomic BiologyR. KarpIFORS Distinguished Lecture at the Joint International Meeting of the Canadian Operational Research Society and the Institute for Operations Research and the Management Sciences (CORS-INFORMS International), Toronto, CanadaJune 2009Algorithms
Tiered Fault Tolerance for Long-Term IntegrityB. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282February 2009Networking[PDF]

Tight Bounds for the Cover Time of Multiple Random WalksR. Elsässer and T. SauerwaldProceedings of the 36th International Colloquium on Automata, Languages, and Programming (ICALP 2009), Rhodes, Greece, pp. 415-426July 2009Algorithms[PDF]

Tight Lower Bounds for the Asymetric k-Center ProblemJ. Chuzhoy, S. Guha, E. Halperin, S. Khanna, G. Kortsarz and S. NaorIn Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC04)January 05 2004Algorithms

Pages