| Load Balancing in Structured P2P Systems | A. Rao, K. Lakshminaryanan, S. Surana, R. M. Karp, and I. Stoica | Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, California | February 2003 | Networking | [PDF]
|
| Load Balancing in Structured P2P Systems | A. Rao, K. Lakshminarayanan, S. Surana, R.M. Karp, and I. Stoica | Second International Workshop on Peer-to-Peer Systems | 2003 | Algorithms | |
| An Exact and Efficient Triangle Intersection Test Hardware | A. Raabe, J. Tietjen, and J. K. Anlauf | Proceedings of the International Conference on Computer Graphics Theory and Applications (GRAPP ’09), Lisbon, Portugal, pp. 355-360 | February 2009 | Architecture | [PDF]
|
| High-Level Reconfiguration Modelling | A. Raabe and A. Felke | Languages for Embedded Systems and Their Applications, M. Radetzki, ed., pp. 227-240, Springer | 2009 | Architecture | |
| A SYSTEMC Language Extension for High-Level Reconfiguration Modeling | A. Raabe and A. Felke | Proceedings of Forum on Specification, Verification, and Design Languages (FDL 08), Stuttgart, Germany, pp. 55-60 | September 2008 | Architecture | [PDF]
|
| An Efficient Projection for L-1/L-Infinity Regularization | A. Quattoni, X. Carreras, M. Collins, and T. Darrell | Proceedings of the 26th International Conference on Machine Learning (ICML 2009), Montreal, Quebec | June 2009 | Vision | [PDF]
|
| Transfer Learning for Image Classification with Sparse Prototype Representations | A. Quattoni, M. Collins, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Anchorage, Alaska | June 2008 | Vision | [PDF]
|
| MICO: A CORBA 2.2 Compliant Implementation | A. Puder and K. Roemer | ICSI Technical Report TR-98-031 | September 1998 | ICSI Technical Reports | [PDF]
|
| Botnet Judo: Fighting Spam with Itself | A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. Savage | Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, California | February 2010 | Networking | [PDF]
|
| A Practical Computer Immunology Approach for Self-Protection Enhanced by Optimization Techniques | A. Pietzowski, B. Satzger, W. Trumler, and T. Ungerer | Journal of Autonomic and Trusted Computing | 2010 | Algorithms | |
| Constructive Deterministic PRAM Simulation on a Mesh-Connected Computer | A. Pietracaprina, G. Pucci, and J. F. Sibeyn | ICSI Technical Report TR-93-059 | October 1993 | ICSI Technical Reports | [PDF]
|
| Discrete Prediction Games with Arbitrary Feedback and Loss | A. Piccolboni and C. Schindelhauer | Universitat zu Lubeck Technical Report No. AIIM-TR-A-00-18 | November 2000 | Algorithms | |
| Poverty of the Stimulus? A Rational Approach | A. Perfors, J. Tenenbaum, and T. Regier | Proceedings of the 28th Annual Conference of the Cognitive Science Society (CogSci 2006), Vancouver, Canada, pp. 663--668 | July 2006 | AI | |
| Consensus Training for Consensus Decoding in Machine Translation | A. Pauls, J. DeNero, and D. Klein | Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing, Singapore, pp. 1418-1427 | August 2009 | Speech | [PDF]
|
| Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications | A. Parker, S. Reddy, T. Schmid, K. Chang, G. Saurabh, M. Srivastava, M. Hansen, J. Burke, D. Estrin, M. Allman, and V. Paxson | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 37-42 | November 2006 | Networking | [PDF]
|
| Learning Topology-Preserving Maps Using Self-Supervised Backpropagation on a Parallel Machine | A. Ossen | ICSI Technical Report TR-92-059 | September 1992 | ICSI Technical Reports | [PDF]
|
| Computing Irreducible Representations of Supersolvable Groups over Small Finite Fields | A. Omrani and A. Shokrollahi | ICSI Technical Report TR-96-005 | January 1996 | ICSI Technical Reports | [PDF]
|
| Within-Class Covariance Normalization for SVM-Based Speaker Recognition | A. O. Hatch, S. Kajarekar, and A. Stolcke | Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006), Pittsburgh, Pennsylvania, pp. 1471-1474 | September 2006 | Speech | [PDF]
|
| Improved Phonetic Speaker Recognition Using Lattice Decoding | A. O. Hatch, B. Peskin, and A. Stolcke | Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), Philadelphia, Pennsylvania, pp. 169-172 | March 2005 | Speech | [PDF]
|
| Combining Feature Sets with Support Vector Machines: Application to Speaker Recognition | A. O. Hatch, A. Stolcke, and B. Peskin | Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2005), San Juan, Puerto Rico, pp. 75-79 | November 2005 | Speech | [PDF]
|
| Generalized Linear Kernels for One-Versus-All Classification: Application to Speaker Recognition | A. O. Hatch and A. Stolcke | Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006), Toulouse, France, pp. 585-588 | May 2006 | Speech | [PDF]
|
| The Virtual Gallery (TVIG) - 3D Visualization of a Queryable Art-database on the Internet | A. Mueller and E. Neuhold | ICSI Technical Report TR-98-039 | August 1998 | ICSI Technical Reports | [PDF]
|
| Posted Price Profit Maximization for Multicast by Approximating Fixed Points | A. Mehta, S. Shenker, and V. Vazirani | Journal of Algorithms, Vol. 58, Issue 2, pp. 150-164 | February 2006 | Networking | |
| Traffic Matrix Estimation Techniques: Existing Techniques Compared and New Directions | A. Medina, N. Taft, K.Salamatian, S. Bhattacharyyam, and C. Diot | Proceedings of SIGCOMM 2002, Pittsburgh, Pennsylvania. August 2002. | August 2002 | Networking | |
| Comparative Analysis of Traffic Matrix Estimation Methods | A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, and C. Diot | DIMACS Workshop on Internet and WWW Measurement, Mapping and Modeling. February 13-15 2002. | February 13 2002 | Networking | |
| Measuring Interactions Between Transport Protocols and Middleboxes | A. Medina, M. Allman, and S. Floyd | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 336-341 | October 2004 | Networking | [PDF]
|
| Measuring the Evolution of Transport Protocols in the Internet | A. Medina, M. Allman, and S. Floyd | ACM Computer Communication Review, Vol. 35, Issue 2, pp. 37-52. DOI:http://doi.acm.org/10.1145/1064413.1064418 | April 2005 | Networking | [PDF]
|
| On the Convergence of Statistical Techniques for Estimating Network Traffic Demands | A. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. Diot | Submitted for publication 2003 | February 2003 | Networking | |
| On the Origin of Power Laws in Internet Topologies | A. Medina, I. Matta, and J. Byers | ACM Computer Communications Review, April 2000. Also BU-CS-TR-2000-004. January 21, 2000. | April 2000 | Networking | |
| A Taxonomy of Traffic Matrices | A. Medina, C. Fraleigh, N. Taft, S. Battacharyya, and C. Diot | SPIE Workshop on Scalability and Traffic Control in IP Networks II. Boston, Massachusetts. July 29-August 1, 2002. | July 2002 | Networking | |
| BRITE: An Approach to Universal Topology Generation | A. Medina, A. Lakhina, I. Matta, and J. Byers | Proceedings of MASCOTS 2001. IEEE Computer Society, August 2001. | August 2001 | Networking | |
| BRITE: Universal Topology Generation From a User's Perspective | A. Medina, A. Lakhina, I. Matta, and J. Byers | BU-CS-TR-2001-003. April 05, 2001. | April 05 2001 | Networking | |
| BRITE: A Flexible Generator of Internet Topologies | A. Medina and I. Matta | BU-CS-TR-2000-005. January 21, 2000. | January 21 2000 | Networking | |
| JAM: A Java Toolkit for Traffic Analyzing and Monitoring | A. März and R. Ulrich | ICSI Technical Report TR-96-029 | August 1996 | ICSI Technical Reports | [PDF]
|
| Using Contiguous Bi-Clustering for Data Driven Temporal Analysis of fMRI Based Functional Connectivity | A. Maron-Katz, E. B. Simon, Y. Jacob, K. Rosenberg, R. M. Karp, T. Hendler, and R. Shamir | Proceedings of the 4th Annual INCF Neuroinformatics Congress, Boston, Massachusetts | September 2011 | Algorithms | [PDF]
|
| On-Line Graph Algorithms for Incremental Compilation | A. Marchetti-Spaccamela, U. Nanni, and H. Rohnert | ICSI Technical Report TR-92-056 | August 1992 | ICSI Technical Reports | [PDF]
|
| IETF Criteria for Evaluating Reliable Multicast Transport and Application Protocols | A. Mankin, A. Romanow, S. Bradner, and V. Paxson | RFC 2357, Informational | June 1998 | Networking | |
| Efficient Data Selection for Machine Translation | A. Mandal, D. Vergyri, W. Wang, J. Zheng, A. Stolcke, G. Tür, D. Hakkani-Tür, and N. Fazil Ayan | Proceedings of IEEE/ACL Workshop on Spoken Language Technologies (SLT), Goa, India, pp. 261-264 | December 2008 | Speech | [PDF]
|
| Myhill Nerode Theorem for Recognizable Tree Series --- Revisited | A. Maletti | Proceedings of 8th International Conference on Latin American Theoretical Informatics (LATIN), Rio de Janeiro, Brazil, pp. 106-120 | April 2008 | AI | [PDF]
|
| Minimizing Deterministic Weighted Tree Automata | A. Maletti | Proceedings of the 2nd International Conference on Language and Automata: Theory and Applications (LATA 2008), Tarragona, Spain, pp. 357-372 | March 2008 | AI | [PDF]
|
| Visualizing Large-Screen Electronic Chalkboard Content on Handheld Devices | A. Lüning, G. Friedland, L. Knipping, and R. Rojas | Proceedings of the Second IEEE International Workshop on Multimedia Technologies for E-Learning at 9th IEEE Symposium on Multimedia, Taichung, Taiwan, pp. 369-375 | December 2007 | Speech | |
| Whorf Hypothesis Is Supported in the Right Visual Field but Not The Left | A. L. Gilbert, T. Regier, P. Kay, and R. B. Ivry | Proceedings of the National Academy of Sciences of the United States of America, Vol. 103, No. 2, pp. 489-494. DOI:10.1073/pnas.0509868103. | January 2006 | AI | [PDF]
|
| RFC 5562: Adding Explicit Congestion Notification (ECN) Capability to TCP's SYN/ACK Packets | A. Kuzmanovic, S. Floyd, and K. K. Ramakrishnan | Request for Comments 5562, Experimental | July 2009 | Networking | [PDF]
|
| Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event | A. Kumar, V. Paxson, and N. Weaver | Proceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 351-364 | October 2005 | Networking | [PDF]
|
| Genotype Is a Stronger Determinant than Sex of the Mouse Gut Microbiota | A. Kovacs, N. Ben-Jacob, H. Tayem, E. Halperin, F. A. Iraqi, and U. Gophna | Microbial Ecology, Vol. 61, No. 2, pp. 423-428 | February 2011 | Algorithms | |
| Conceptual Hierarchies in Classical and Connectionist Architecture | A. Kobsa | ICSI Technical Report TR-89-010 | February 1989 | ICSI Technical Reports | [PDF]
|
| Gaussian Processes for Object Categorization | A. Kapoor, K. Graumann, R. Urtasun, and T. Darrell | International Journal of Computer Vision, Vol. 88, No. 2, pp. 169-188 | June 2010 | Vision | [PDF]
|
| Silicon-Photonic Clos Networks for Global On-Chip Communication | A. Joshi, C. Batten, Y.-J. Kwon, S. Beamer, I. Shamim, K. Asanović, and V. Stojanović | Proceedings of the 3rd ACM/IEEE International Symposium on Networks-on-Chips (NoCS 2009), San Diego, California, pp. 124-133 | May 2009 | Architecture | [PDF]
|
| A Category-Level 3-D Object Dataset: Putting the Kinect to Work | A. Janoch, S. Karayev, Y. Jia, J. Y. Barron, M. Fritz, K. Saenko, and T. Darrell | Proceedings of the First IEEE Workshop on Consumer Depth Cameras for Computer Vision at the International Conference on Computer Vision (ICCV), Barcelona, Spain, pp. 1168-1174 | November 2011 | Vision | [PDF]
|
| Joke-O-Mat HD: Browsing Sitcoms with Human Derived Transcripts | A. Janin, L. Gottlieb, and G. Friedland | Proceedings of the ACM International Conference on Multimedia (ACM Multimedia 2010), Florence, Italy, pp. 1591-1594 | October 2010 | Speech | [PDF]
|