| CPU Accounting for Multicore Processors | C. Luque, M. Moretó, F. J. Cazorla, R. Gioiosa, A. Buyuktosunoglu, and M. Valero | IEEE Transactions on Computers. Vol. 61, Issue 2 | February 2012 | Architecture | |
| Multimodal City-Verification on Flickr Videos Using Acoustic and Textual Features | H. Lei, J. Choi, and G. Friedland | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2012), Kyoto, Japan | March 2012 | Speech | [PDF]
|
| Spectro-Temporal Gabor Features for Speaker Recognition | H. Lei, B. T. Meyer, and N. Mirghafori | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2012), Kyoto, Japan | March 2012 | Speech | [PDF]
|
| Discriminative Training for Speech Recognition is Compensating for Statistical Dependence on the HMM Framework | D. Gillick and S. Wegmann, L. Gillick | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2012), Kyoto, Japan | March 2012 | Speech | [PDF]
|
| How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection | P.-S. Huang, R. Mertens, A. Divakaran, G. Friedland, and M. Hasegawa-Johns | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2012), Kyoto, Japan | March 2012 | Speech | [PDF]
|
| Easy Does It: Robust Spectro-Temporal Many-Stream ASR Without Fine Tuning Streams | S. Ravuri and N. Morgan | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2012), Kyoto, Japan | March 2012 | Speech | |
| Articulatory Features for Expressive Speech Synthesis | A. Black, H. T. Bunnell, Y. Dou, P. Kumar, F. Metze, D. Perry, T. Polzehl, K. Prahallad, S. Steidl, and C. Vaug | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2012), Kyoto, Japan | March 2012 | Speech | [PDF]
|
| Optimal Task Assignment in Multithreaded Processors: A Statistical Approach | P. Radojkovic, V. Cakarevic, M. Moretó, J. Verdu, A. Pajuelo, F. J. Cazorla, M. Nemirovsky, and M. Valero | Architectural Support for Programming Languages and Operating Systems (ASPLOS). London, United Kingdom | March 2012 | Architecture | |
| Using Acoustic Diarization for Duplicate Detection | M. Knox, G. Friedland, and R. P. Smith | ICSI Technical Report TR-12-005 | March 2012 | ICSI Technical Reports | [PDF]
|
| The BIZ Top-Level Domain: Ten Years Later | T. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. Paxson | Proceedings of the 13th Passive and Active Measurement Conference, Vienna, Austria | March 2012 | Networking | [PDF]
|
| From AUDREY to Siri: Is Speech Recognition A Solved Problem? | R. Pieraccini | Presented at the Mobile Voice Conference, San Francisco, California | March 2012 | Speech | [PDF]
|
| Probe and Pray: Using UPnP for Home Network Measurements | L. DiCioccio, R. Teixeira, M. May, and C. Kreibich | Proceedings of the 13th Passive and Active Measurement Conference (PAM 2012), pp. 96-105, Vienna, Austria | March 2012 | Networking | [PDF]
|
| Hold-On: Protecting Against On-Path DNS Poisoning | H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson | Proceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United Kingdom | March 2012 | Networking | [PDF]
|
| Searching the Web of Data (Tutorial Abstract) | G. de Melo, K. Hose | Proceedings of the 35th European Conference on Information Retrieval (ECIR), Moscow, Russia | March 2012 | AI | |
| Probabilistic Inference of Viral Quasispecies Subject to Recombination | O. Zagordi, A. Topfer, S. Prabhakaran, V. Roth, E. Halperin, and N. Beerenwinkel | Proceedings of the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain, pp.342-354 | April 2012 | Algorithms | [PDF]
|
| On Building Inexpensive Network Capabilities | C. Shue, A. Kalafut, M. Allman, and C. Taylor | ACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79 | April 2012 | Networking | [PDF]
|
| MGMR: Leveraging RNA-Seq Population Data to Optimize Expression Estimation | R. Rozov, E. Halperin, and R. Shamir | Proceedings of the Second Annual Satellite Workshop on Massively Parallel Sequencing at the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain. Published in BMC Bioinformatics, Vol. 13, Suppl. 6:S2 | April 2012 | Algorithms | [PDF]
|
| CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping | Z. Wang, F. Hormozdiari, W.-Y. Yang, E. Halperin, and E. Eskin | Proceedings of the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain, pp. 326-340 | April 2012 | Algorithms | |
| Haplotype Reconstruction Using Perfect Phylogeny and Sequence Data | A. Efros and E. Halperin | Proceedings of the Second Annual Satellite Workshop on Massively Parallel Sequencing at the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain. Published in BMC Bioinformatics, Vol. 13, Suppl. 6:S2 | April 2012 | Algorithms | [PDF]
|
| Reconstructing Boolean Models of Signaling | R. Sharan and R. M. Karp | Proceedings of the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain, pp. 261-271 | April 2012 | Algorithms | |
| Carat: Collaborative Energy Bug Detection | A. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. Tarkoma | Poster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, California | April 2012 | Networking | |
| Adapting Social Spam Infrastructure for Political Censorship | K. Thomas, C. Grier, and V. Paxson | Proceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, California | April 2012 | Networking | [PDF]
|
| A Perceptual Analysis of Off-Center Sound Degradation in Surround-Sound Reproduction Based on Geometrical Properties | N. Peters and S. McAdams | Journal of the Acoustical Society of America, Vol. 131, Issue. 4, pp. 3256-3256. Also in the proceedings of Acoustics 2012, Hong Kong, May 2012 | April 2012 | Other | |
| On Controller Performance in Software-Defined Networks | A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood | Proceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, California | April 2012 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CA | April 2012 | Networking | [PDF]
|
| PACMan: Coordinated Memory Caching for Parallel Jobs | G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, California | April 2012 | Networking | [PDF]
|
| There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media | G. Friedland, B. Martinez Elizalde, H. Lei, and A. Divakaran | ICSI Technical Report TR-12-006 | April 12 2012 | ICSI Technical Reports | [PDF]
|
| Cybercasing the Joint: Language Technologies, Multimedia Retrieval, and Online Privacy | G. Friedland | Presented at the Language Technologies Institute Colloquium, Carnegie Mellon University, Pittsburgh, Pennsylvania | April 13 2012 | Speech | [PDF]
|
| Source-Path-Goal: Investigating the Cross-Linguistic Potential of Frame-Semantic Text Analysis | O. Čulo and G. de Melo | it - Information Technology, Vol. 54, Issue 3, pp. 147-152 | May 2012 | AI | |
| Empirical Comparisons of MASC Word Sense Annotations | G. de Melo, C. F. Baker, N. Ide, R. J. Passonneau, and C. Fellbaum | Proceedings of the 8th Conference on International Language Resources and Evaluation (LREC 2012), Istanbul, Turkey | May 2012 | AI | [PDF]
|
| Theory of Computation as an Enabling Tool for the Sciences | R. Karp | Presented at the Turing Centennial Celebration, Princeton, New Jersey. Also presented at the 9th Annual Conference on Theory and Applications of Models of Computation (TAMC 2012), Turing Centenary Meeting, Beijing, China | May 2012 | Algorithms | |
| Precedes: A Semantic Relation in FrameNet | M. R. L. Petruck and G. de Melo | Proceedings of the Workshop on Language Resources for Public Security Applications at the 8th Conference on International Language Resources and Evaluation (LREC 2012), Istanbul, Turkey, pp.45-49 | May 2012 | AI | [PDF]
|
| Fast and Accurate Inference of Local Ancestry in Latino Populations | Y. Baran, B. Pasaniuc, S. Sankararaman, D. G. Torgerson, C. Gignoux, C. Eng, W. Rodriguez-Cintron, R. Chapela, J. G. Ford, P. C. Avila, J. Rodriguez-Santana, E. G. Burchard, and E. Halperin | Bioinformatics, Vol. 28, Issue 10, pp. 1359-1367 | May 2012 | Algorithms | [PDF]
|
| An Intermittent Energy Internet Architecture | B. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. Streed | Proceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, Spain | May 2012 | Networking | [PDF]
|
| Prudent Practices for Designing Malware Experiments: Status Quo and Outlook | C. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van Steen | Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79 | May 2012 | Networking | [PDF]
|
| Multimodal City-Identification on Flickr Videos Using Acoustic and Textual Features | H. Lei, J. Choi, and G. Friedland | ICSI Technical Report TR-12-007 | May 2012 | ICSI Technical Reports | [PDF]
|
| On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites | O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira | ICSI Technical Report TR-12-008 | May 2012 | ICSI Technical Reports | [PDF]
|
| The MASC Word Sense Corpus | R. Passonneau, C. Baker, C. Fellbaum, and N. Ide | Proceedings of the 8th Conference on International Language Resources and Evaluation (LREC 2012), Istanbul, Turkey, pp. 3025-3030 | May 2012 | AI | [PDF]
|
| A Model-Based Approach for Analysis of Spatial Structure in Genetic Data | W.-Y. Yang, J. Novembre, E. Eskin, and E. Halperin | Nature Genetics, Vol. 44, pp. 725-731 | May 2012 | Algorithms | [PDF]
|
| The MASC/MultiMASC Community Collaboration Project: Why You Should Be Involved and How | N. Ide, C. Baker, C. Fellbaum, and R. Passonneau | Proceedings of the Workshop on Collaborative Resource Development and Delivery at the 8th Conference on International Language Resources and Evaluation (LREC 2012), Istanbul, Turkey | May 2012 | AI | |
| ICSI Gazette | | | May 2012 | ICSI Newsletter | [PDF]
|
| Spectral Methods to Determine the Exact Scaling Factor of Resample Digital Images | S. Pfennig and M. Kirchner | Invited paper, "Image Forensics Techniques" special session, proceedings of the 5th International Symposium on Communications, Control, and Signal Processing (ISCCSP), Rome, Italy | May 2012 | Vision | [PDF]
|
| Shark: Fast Data Analysis Using Coarse-grained Distributed Memory | C. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. Stoica | Demo, ACM SIGMOD/PODS Conference, Scottsdale, Arizona | May 2012 | Networking | [PDF]
|
| Information Hiding | M. Kirchner and D. Ghosal (eds.) | 14th International Conference, Information Hiding 2012, Berkeley, California, Revised Selected Papers, Lecture Notes in Computer Science Vol. 7692 | May 2012 | Vision | |
| Beyond Spatial Pyramids: Receptive Field Learning for Pooled Image Features | Y. Jia, C. Huang, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), Providence, Rhode Island, pp. 3370-3377 | June 2012 | Vision | [PDF]
|
| Speaker Diarization | G. Friedland and F. Valente | In Multimodal Signal Processing: Human Interactions in Meetings, S. Reynals, H. Bourlard, J. Carletta, and A. Popescu-Belis, eds., Cambridge University Press | June 2012 | Speech | |
| Pose Pooling Kernels for Sub-Category Recognition | N. Zhang, R. Farrell, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), Providence, Rhode Island, pp. 3665-3672 | June 2012 | Vision | [PDF]
|
| Power SVM: Generalization with Exemplar Classification Uncertainty | W. Zhang, S. X. Yu, and S.-H. Teng | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), Providence, Rhode Island, pp. 2144-2151 | June 2012 | Vision | [PDF]
|
| Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters | M. Zaharia, T. Das, H. Li, S. Shenker and I. Stoica | In the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MA | June 2012 | Networking | [PDF]
|
| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|