| The Sather 1.1 Specification | D. Stoutamire and S. Omohundro | ICSI Technical Report TR-96-012 | August 1996 | ICSI Technical Reports | [PDF]
|
| The Sather Language and Libraries | S. Omohundro and C. C. Lim | ICSI Technical Report TR-92-017 | March 1992 | ICSI Technical Reports | [PDF]
|
| The Scale Vector-Thread Processor | R. Krashinsky, C. Batten, and K. Asanović | Winner, DAC/ISSCC Student Design Contest, Design Automation Conference, DAC/ISSCC, San Diego, California | June 2007 | Architecture | |
| The Science of Artificial Intelligence | J.A. Feldman | Commentary on a paper by Duda, Nilsson, and Raphael, Research Directions in Software Technology | 1977 | AI | |
| The Sequential GMM: A Gaussian Mixture Model Based Speaker Verification System that Captures Sequential Information | S. Stafford | M.S. Thesis, University of California at Berkeley | May 2005 | Speech | [PDF]
|
| The SFRA: A Corner-Turn FPGA Architecture | N. Weaver, J. Hauser and J. Wawrzynek | Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12 | February 2004 | Networking | [PDF]
|
| The Shared-Memory Language pSather on a Distributed-Memory Multiprocessor | J.A. Feldman, C.C. Lim and T. Rauber | Proceedings of the ACM Special Interest Group on Programming Languages (SIGPLAN) Workshop, pp. 17-20 | 1992 | AI | |
| The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention | N. Weaver, V. Paxson, and J.M. Gonzalez | Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206 | February 2007 | Networking | [PDF]
|
| The Spectro-Microscopy Electronic Notebook | S. R. Sachs, C. M. Dal Sasso Freitas, V. Markowitz, A. Talis, I-M. A. Chen, E. Szeto, and H. A. Kuno | ICSI Technical Report TR-97-002 | January 1997 | ICSI Technical Reports | [PDF]
|
| The Spread of the Sapphire/Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | The Cooperative Association for Internet Data Analysis Technical Report | February 2003 | Networking | |
| The SRI NIST 2008 Speaker Recognition Evaluation System | S. S. Kajarekar, N. Scheffer, M. Graciarena, E. Shriberg, A. Stolcke, L. Ferrer, and T. Bocklet | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2009), Taipei, Taiwan, pp. 4205-4208 | April 2009 | Speech | [PDF]
|
| The SRI NIST 2010 Speaker Recognition Evaluation System | N. Scheffer, L. Ferrer, M. Graciarena, S. Kajarekar, E. Shriberg, and A. Stolcke | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, pp. 5292-5295 | May 2011 | Speech | [PDF]
|
| The SRI-ICSI Spring 2007 Meeting and Lecture Recognition System | A. Stolcke, X. Anguera, K. Boakye, O. Cetin, A. Janin, M. Magimai-Doss, C. Wooters, and J. Zheng | Proceedings of the Second International Workshop on Classification of Events, Activities, and Relationships (CLEAR 2007) and the Fifth Rich Transcription 2007 Meeting Recognition (RT 2007), Baltimore, Maryland, pp. 450-463 | May 2007 | Speech | [PDF]
|
| The Stanford Hand-Eye Project | J.A. Feldman, C.M. Feldman, G. Falk, C. Grape, J. Pearlman, I. Sobel, and J.M. Tenenbaum | Proceedings of the First International Joint Conference on Artificial Intelligence (IJCAI), Washington, DC, pp. 521-526 | May 1969 | AI | |
| The Stanford Hand-Eye Project--Recent Results | J.A. Feldman | Presented at IFIP Congress, Stockholm, Sweden | 1974 | AI | |
| The Stationarity of Internet Path Properties: Routing, Loss, and Throughput | Y. Zhang, V. Paxson, and S. Shenker | ACIRI Technical Report, May 2000. | May 2000 | Networking | |
| The Strengths of Weaker Identities: Opportunistic Personas | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| The Structure of the Framenet Database | C.F. Baker, C. J. Fillmore, and B. Cronin | International Journal of Lexicography, Volume 16.3: 281-296. 2003. | 2003 | AI | |
| The Sublogarithmic Space World | M. Liskiewicz and R. Reischuk | ICSI Technical Report TR-93-048 | August 1993 | ICSI Technical Reports | [PDF]
|
| The Success of Open Source | S. Weber | Cambridge, MA, Harvard University Press | 2004 | BCIS (archived) | |
| The SuperSID Project: Exploiting High-Level Information for High-Accuracy Speaker Recognition | D. Reynolds, W. Andrews, J. Campbell, J. Navratil, B. Peskin, A. Adami, Q. Jin, D. Klusacek, J. Abramson, R. Mihaescu, J. Godfrey, D. Jones, and B. Xiang | Proceedings of ICASSP-2003, Hong Kong | April 2003 | Speech | [PDF]
|
| The Supervisor Synthesis Problem for Unrestricted CTL is NP-complete | M. Antoniotti and B. Mishra | ICSI Technical Report TR-95-062 | November 1995 | ICSI Technical Reports | [PDF]
|
| The Surprising Variance in Shortest-Derivation Parsing | M. Bansal and D. Klein | Proceedings of the 49th annual Meeting of the Association for Computational Linguistics, Portland, Oregon | June 2011 | Speech | [PDF]
|
| The Syllable Re-revisited | A. Hauenstein | ICSI Technical Report TR-96-035 | August 1996 | ICSI Technical Reports | [PDF]
|
| The Synchronization of Periodic Routing Messages | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 2, No. 2, pp. 122-136 | April 1994 | Networking | [PDF]
|
| The Temporal Properties of Spoken Japanese Are Similar to Those of English | T. Arai and S. Greenberg | Proceedings of the Fifth European Conference on Speech Communication and Technology (Eurospeech '97), Rhodes, Greece, Vol. 2, pp. 1011-1014 | September 1997 | Speech | [PDF]
|
| The Top Speed of Flash Worms | S. Staniford, D. Moore, V. Paxson, and N. Weaver | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| The Transitive Closure of a Random Digraph | R. M. Karp | ICSI Technical Report TR-89-047 | August 1989 | ICSI Technical Reports | [PDF]
|
| The Uninvited Guest: Information's Role in Guiding the Production of Spontaneous Speech | S. Greenberg and E. Fosler-Lussier | Proceedings of the Crest Workshop on Models of Speech Production: Motor Planning and Articulatory Modelling, Kloster Seeon, Germany | May 2000 | Speech | [PDF]
|
| The Use of End-to-end Multicast Measurements for Characterizing Internal Network Behavior | A. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S.B. Moon, V. Paxson, and D. Towsley | IEEE Communications, 38(5), May 2000. | April 2000 | Networking | |
| The Use of Vision and Manipulation to Solve the | J.A. Feldman, K.K. Pingle, T.O. Binford, G. Falk, A. Hay, R. Pau, R.F. Sproull, and J.M. Tenenbaum | Proceedings of the Second International Joint Conferences on Artificial Intelligence (IJCAI 1971), London, UK, pp. 359-364 | September 1971 | AI | |
| The Value of Auditory Offset Adaptation and Appropriate Acoustic Modeling | H. Wang, D. Gelbart, H.G. Hirsch, and W. Hemmert | Proceedings of the 9th Annual Conference of the International Speech Communication Association (Interspeech 2008), Brisbane, Australia, pp. 902-905 | September 2008 | Speech | [PDF]
|
| The Value of Visibility and RFID in Transshipment Operations—A Simulation Study | C. Goebel and O. Günther | Proceedings of the 9th Internationale Tagung Wirtschaftsinformatik (WI 2009) (Conference on Business Informatics), Vienna, Austria,pp. 129-138 | February 2009 | Other | |
| The Virtual Gallery (TVIG) - 3D Visualization of a Queryable Art-database on the Internet | A. Mueller and E. Neuhold | ICSI Technical Report TR-98-039 | August 1998 | ICSI Technical Reports | [PDF]
|
| The Voice Mail Digits and Their Performance on ICSI's Hybrid HMM/ANN System | R. Klisch | ICSI Technical Report TR-96-013 | April 1996 | ICSI Technical Reports | [PDF]
|
| The Weft: A Representation for Periodic Sounds | D. Ellis | The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997), Munich, Germany, Vol. 2, pp. 1307-1310 | April 1997 | Speech | [PDF]
|
| The Weighted Coupon Collector's Problem and Applications | P. Berenbrink and T. Sauerwald | Proceedings of the 15th International Computing and Combinatorics Conference (COCOON 2009), Niagra Falls, New York, pp. 449-458 | July 2009 | Algorithms | |
| The Weighted List Update Problem and the Lazy Adversary | F. d'Amore, A. Marchetti-Spaccamela, and U. Nanni | ICSI Technical Report TR-92-011 | February 1992 | ICSI Technical Reports | [PDF]
|
| The World Color Survey Database: History and Use | R.S. Cook, P. Kay, and T. Regier | Handbook of Categorisation in the Cognitive Sciences, H. Cohen and C. Lefebvre, eds., pp. 224-242, Elsevier | 2005 | AI | |
| Theoretical improvements in algorithmic efficiency for network flow problems | J. Edmonds and R. M. Karp | Journal of the Association for Computing Machinery, Vol. 19, No. 2, p. 248-64 | April 1972 | Algorithms | |
| Theory of Computation as an Enabling Tool for the Sciences | R. Karp | Presented at the Turing Centennial Celebration, Princeton, New Jersey. Also presented at the 9th Annual Conference on Theory and Applications of Models of Computation (TAMC 2012), Turing Centenary Meeting, Beijing, China | May 2012 | Algorithms | |
| Therapy Plan Generation in Complex Dynamic Environments | O. Arnold and K. P. Jantke | ICSI Technical Report tr-94-054 | October 1994 | ICSI Technical Reports | [PDF]
|
| There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media | G. Friedland, B. Martinez Elizalde, H. Lei, and A. Divakaran | ICSI Technical Report TR-12-006 | April 12 2012 | ICSI Technical Reports | [PDF]
|
| There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media | Benjamin Elizalde; Gerald Friedland; Howard Lei; Ajay Divakaran | Proceedings of the ACM International Workshop on Audio and Multimedia Methods for Large-Scale Video Analysis (AMVA) at ACM Multimedia 2012 (MM'12), Nara, Japan, pp. 27-32 | October 2012 | Speech | [PDF]
|
| Thoughts on Reviewing | M. Allman | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50 | April 2008 | Networking | [PDF]
|
| Thread Migration with Active Threads | M. Holtkamp | ICSI Technical Report TR-97-038 | September 1997 | ICSI Technical Reports | [PDF]
|
| Three Combinatorial Problems in Computational and Genomic Biology | R. Karp | IFORS Distinguished Lecture at the Joint International Meeting of the Canadian Operational Research Society and the Institute for Operations Research and the Management Sciences (CORS-INFORMS International), Toronto, Canada | June 2009 | Algorithms | |
| Tiered Fault Tolerance for Long-Term Integrity | B. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282 | February 2009 | Networking | [PDF]
|
| Tight Bounds for the Cover Time of Multiple Random Walks | R. Elsässer and T. Sauerwald | Proceedings of the 36th International Colloquium on Automata, Languages, and Programming (ICALP 2009), Rhodes, Greece, pp. 415-426 | July 2009 | Algorithms | [PDF]
|
| Tight Lower Bounds for the Asymetric k-Center Problem | J. Chuzhoy, S. Guha, E. Halperin, S. Khanna, G. Kortsarz and S. Naor | In Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC04) | January 05 2004 | Algorithms | |