| Phrase and Word Level Strategies for Detecting Appositions in Speech | B. Favre and D. Hakkani-Tür | Proceedings of the 10th International Conference of the International Speech Communication Association (Interspeech 2009), Brighton, United Kingdom, pp. 2711-2714 | September 2009 | Speech | [PDF]
|
| ICSI-CRF: The Generation of References to the Main Subject and Named Entities Using Conditional Random Fields | B. Favre and B. Bohnet | Proceedings of the Language Generation and Summarisation (UCNLG+Sum) Workshop at the Joint Conference of the 47th Annual Meeting of the Association for Computational Linguistics and the Fourth International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing (ACL-IJCNLP 2009), Singapore, pp. 99-100 | August 2009 | Speech | [PDF]
|
| ONS Security | B. Fabian, O. Günther, and S. Spiekermann | RFID Handbook: Applications, Technology, Security, and Privacy, S. Ahson and M. Ilyas, eds., CRC Press | 2008 | Other | |
| Security Challenges of the EPC Network | B. Fabian and O. Günther | Communications of the ACM, Volume 52, Issue 7, pp. 121-125 | July 2009 | Other | |
| Taming the Wild: Acoustic Segmentation in Consumer‐Produced Videos | B. Elizalde and G. Friedland | ICSI Technical Report TR-12-016 | January 2013 | ICSI Technical Reports | [PDF]
|
| Efficiency of PET and MPEG Encoding for Video Streams: Analytical QoS Evaluations | B. E. Wolfinger | ICSI Technical Report TR-97-015 | April 1997 | ICSI Technical Reports | [PDF]
|
| Recent Work in VLSI Elements for Digital Implementations of Artificial Neural Networks | B. E. D. Kingsbury, B. Irissou, K. Asanovic, J. Wawrzynek, and N. Morgan | ICSI Technical Report TR-91-074 | December 1991 | ICSI Technical Reports | [PDF]
|
| Optimizing Monotone Functions Can Be DifficultOptimizing Monotone Functions Can Be Difficult | B. Doerr, T. Jansen, D. Sudholt, C. Winzen, and C. Zarges | Proceedings of the 11th International Conference on Parallel Problem Solving from Nature (PPSN 2010), Krakow, Poland, pp. 42-51 | September 2010 | Algorithms | |
| Quasirandom Rumor Spreading: An Experimental Analysis | B. Doerr, T. Friedrich, M. Künneman, and T. Sauerwald | Proceedings of the Workshop on Algorithm Engineering and Experiments (ALENEX09), New York, New York, pp. 145-153 | January 2009 | Algorithms | [PDF]
|
| Quasirandom Rumor Spreading: Expanders, Push vs. Pull, and Robustness | B. Doerr, T. Friedrich, and T. Sauerwald | Proceedings of the 36th International Colloquium on Automata, Languages, and Programming (ICALP 2009), Rhodes, Greece, pp. 366-377 | July 2009 | Algorithms | [PDF]
|
| Oracle Computations in Parallel Numerical Linear Algebra | B. Codenotti, M. Leoncini, and G. Resta | ICSI Technical Report TR-91-060 | October 1991 | ICSI Technical Reports | [PDF]
|
| Perturbation: An Efficient Technique for the Solution of Very Large Instances of the Euclidean TSP | B. Codenotti, G. Manzini, L. Margara, and G. Resta | ICSI Technical Report TR-93-035 | July 1993 | ICSI Technical Reports | [PDF]
|
| Fast and Efficient Parallel Algorithms for Problems in Control Theory | B. Codenotti, B. N. Datta, K. Datta, and M. Leoncini | ICSI Technical Report TR-94-025 | August 1994 | ICSI Technical Reports | [PDF]
|
| Local Properties of Some NP-Complete Problems | B. Codenotti and L. Margara | ICSI Technical Report TR-92-021 | April 1992 | ICSI Technical Reports | [PDF]
|
| Efficient Clustering Techniques for the Geometric Traveling Salesman Problem | B. Codenotti and L. Margara | ICSI Technical Report TR-92-036 | June 1992 | ICSI Technical Reports | [PDF]
|
| Tiered Fault Tolerance for Long-Term Integrity | B. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282 | February 2009 | Networking | [PDF]
|
| Learning Discriminative Temporal Patterns in Speech: Development of Novel TRAPS-Like Classifiers | B. Chen, S. Chang, and S. Sivadas | Proceedings of EUROSPEECH 2003, Geneva | September 2003 | Speech | [PDF]
|
| Learning Long-Term Temporal Features in LVCSR Using Neural Networks | B. Chen, Q. Zhu, and N. Morgan | Proceedings of International Conference on Spoken Language Processing, Jeju, Korea, October 2004. | October 2004 | Speech | [PDF]
|
| Long-Term Temporal Features for Conversational Speech Recognition | B. Chen, Q. Zhu, and N. Morgan | Proceedings of the First International Workshop on Machine Learning for Multimodal Interaction (MLMI 2004), Martigny, Switzerland | June 2004 | Speech | |
| Automatic Construction of an English-Chinese Bilingual Framenet | B. Chen and P. Fung | Proceedings of the North American Chapter of the Association for Computational Linguistics Human Language Technologies Conference (NAACL HLT 2004), Boston, Massachusetts | May 2004 | AI | |
| SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization | B. Catanzaro, S. Kamil, Y. Lee, K. Asanovic, J. Demmel, K. Keutzer, J. Shalf, K. Yelick, and A. Fox | Presented at the First Workshop on Programmable Models for Emerging Architecture (PMEA) at the 18th International Conference on Parallel Architectures and Compilation Techniques (PACT'09), Raleigh, North Carolina | September 2009 | Architecture | [PDF]
|
| Classifying Materials in the Real World | B. Caputo, E. Hayman, M. Fritz, and J.-O. Eklundh | Image and Vision Computing, Vol. 28, Issue 1, pp. 150-163 | January 2010 | Vision | [PDF]
|
| From Protocol Stack to Protocol Heap - Role-Based Architecture | B. Braden, T. Faber, and M. Handley | Proceedings of the First Workshop on Hot Topics in Networking (HotNets-I), Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| Recommendations on queue management and congestion avoidance in the internet | B. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, and L. Zhang | Request for Comments (Informational) 2309, Internet Engineering Task Force | April 1998 | Networking | |
| Synchronous Parsing of Syntactic and Semantic Structures | B. Bohnet | Proceedings of Quatrième Conférence Internationale Sur La Théorie Sens-Texte (Fourth International Conference on Meaning-Text Theory, MTT’09), Montreal, Canada | June 2009 | Speech | [PDF]
|
| Efficient Parsing of Syntactic and Semantic Dependency Structures | B. Bohnet | Presented at the 13th Conference on Computational Natural Language Learning (CoNLL-2009), Boulder, Colorado | June 2009 | Speech | [PDF]
|
| Vocabulary and Language Model Adaptation Using Information Retrieval | B. Bigi, Y. Huang, and R. De Mori | Proceedings of International Conference on Spoken Language Processing, Jeju, Korea, October 2004. | October 2004 | Speech | [PDF]
|
| Spatial and Linguistic Aspects of Visual Imagery in Sentence Processing | B. Bergen, T. S. Lindsay, T. Matlock, and S. Narayanan | Cognitive Science, Vol. 31, Issue 5, pp. 733-764 | September 2007 | AI | |
| Simulated Action in an Embodied Construction Grammar | B. Bergen, N. Chang, and S. Narayanan | Proceedings of the 26th Annual Meeting of the Cognitive Science Society, Chicago, Illinois | August 2004 | AI | |
| Simulation-based language understanding in embodied construction grammar | B. Bergen, N. Chang, and M. Paskin | In Jan-Ola Ostman, ed., Construction Grammar(s): Cognitive and Cross-language dimensions | 2000 | AI | |
| Semantic agreement and construal | B. Bergen and N. Chang | Meeting of the Linguistic Society of America, Washington, DC | 2001 | AI | |
| Spatial Schematicity of prepositions in neural grammar | B. Bergen and N. Chang | Fifth Conference on Conceptual Structure, Discourse, and Language, Santa Barbara, California | 2000 | AI | |
| Prepositional semantics in embodied construction grammar | B. Bergen and N. Chang | Fifth Berkeley-Paris Cognitive-Enunciative Conference, Berkeley, California | 2000 | AI | |
| It’s the Body, Stupid: Concept Learning According to Cognitive Science | B. Bergen and J. Feldman | ICSI Technical Report TR-06-002 | April 2006 | ICSI Technical Reports | [PDF]
|
| Embodied Concept Learning | B. Bergen and J. Feldman | In Handbook of Cognitive Science: An Embodied Approach, P. Calvo and T. Gomila, pp. 313-332, Elsevier | 2008 | AI | [PDF]
|
| Probability in phonological generalizations: Modeling optional French final consonants | B. Bergen | Proceedings of the 26th Annual Meeting of the Berkeley Linguistics Society, Berkeley, California | 2000 | AI | |
| Ramifications of phonology-syntax interactions for phonological models | B. Bergen | Proceedings of the 24th Annual Penn Linguistics Colloquium, pp. 27-36 | 2000 | AI | |
| On the Relation Between BDDs and FDDs | B. Becker, R. Drechsler, and R. Werchner | ICSI Technical Report TR-94-005 | January 1994 | ICSI Technical Reports | [PDF]
|
| On Variable Ordering of Ordered Functional Decision Diagrams | B. Becker, R. Drechsler, and M. Theobald | ICSI Technical Report TR-94-006 | January 1994 | ICSI Technical Reports | [PDF]
|
| On Distributed Representation in Word Semantics | B. B. Rieger | ICSI Technical Report TR-91-012 | January 1991 | ICSI Technical Reports | [PDF]
|
| A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence | B. Amann, R. Sommer, A. Sharma, and S. Hall | Proceedings of the 15th International Symposium on Attacks, Intrusions, and Detections (RAID 2012), pp. 314-333, Amsterdam, the Netherlands | September 2012 | Networking | |
| Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service | B. Amann, M. Vallentin, S. Hall, and R. Sommer | ICSI Technical Report TR-12-014 | November 2012 | ICSI Technical Reports | [PDF]
|
| Revisiting SSL: A Large Scale Study of the Internet's Most Trusted Protocol | B. Amann, M. Vallentin, S. Hall, and R. Sommer | ICSI Technical Report TR-12-015 | December 2012 | ICSI Technical Reports | [PDF]
|
| Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer | B Whetton, L. Vicisano, R. Kermode, M. Handley, S. Floyd, and M. Luby | Experimental Request for Comments, October 2000. | October 2000 | Networking | |
| Emerging Opportunities for Theoretical Computer Science | A.V. Aho, D.S. Johnson, R.M. Karp, S.R. Kosaraju, and others | SIGACT News, Sept. 1997, vol.28, (no.3):65-74. | 1997 | Algorithms | |
| Fast Pruning Using Principal Components | A.U. Levin, T.K. Leen, and J.E. Moody | Advances in Neural Information Processing Systems, Vol. 6, Cowan, Tesauro, and Alspector (eds), Morgan Kaufmann Publishers, San Mateo, California | 1994 | Algorithms | |
| Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM | A.F. Gomez Skarmeta and P.M. Ruiz | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| NOSIX: A Portable Switch Interface for the Network Operating System | A. Wundsam and M.Yu | ICSI Technical Report TR-12-013 | October 2012 | Networking | [PDF]
|
| The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA | A. Waterman, Y. Lee, D. Patterson, and K. Asanovic | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-62, Berkeley, California | May 2011 | Architecture | [PDF]
|
| Sorting on a Massively Parallel System Using a Library of Basic Primitives: Modeling and Experimental Results | A. Wachsmann and R. Wanka | ICSI Technical Report TR-97-028 | August 1997 | ICSI Technical Reports | [PDF]
|