| Pushing the Limits of Mechanical Turk: Qualifying the Crowd for Video Geo-Location | L. Gottlieb, J. Choi, P. Kelm, T. Sikora, and G. Friedland | Proceedings of the ACM Workshop on Crowdsourcing for Multimedia (CrowdMM 2012), held in conjunction with ACM Multimedia 2012, pp. 23-28, Nara, Japan | October 2012 | Speech | [PDF]
|
| The Neural Binding Problem(s) | J. Feldman | Cognitive Neurodynamics, Vol. 7, Issue 1, pp. 1-11 | February 2013 | AI | [PDF]
|
| Fabric: A Retrospective on Evolving SDN | M. Casado, T. Koponen, S. Shenker, and A. Tootoonchian | Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Helsinki, Finland | August 2012 | Networking | [PDF]
|
| On Controller Performance in Software-Defined Networks | A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood | Proceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, California | April 2012 | Networking | [PDF]
|
| A Model-Based Approach for Analysis of Spatial Structure in Genetic Data | W. Yang, J. Novembre, E. Eskin, and E. Halperin | Presented at the Annual Meeting of the American Society of Human Genetics, San Francisco, California | November 2012 | Algorithms | |
| Macroscopically Sustainable Networking: An Internet Quine | B. Raghavan and S. Hasan | ICSI Technical Report TR-12-010 | September 2012 | ICSI Technical Reports | [PDF]
|
| Fast and Interactive Analytics Over Hadoop Data with Spark | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | USENIX ;login:, Vol. 34, No. 4, pp. 45-51 | August 2012 | Networking | [PDF]
|
| Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters | M. Zaharia, T. Das, H. Li, S. Shenker and I. Stoica | In the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MA | June 2012 | Networking | [PDF]
|
| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CA | April 2012 | Networking | [PDF]
|
| Learning with Recursive Perceptual Representations | O. Vinyals, Y. Jia, L. Deng, and T. Darrell | Presented at the 26th Annual Conference on Neural Information Processing Systems (NIPS 2012), Lake Tahoe, Nevada | December 2012 | Vision | [PDF]
|
| Timely Object Recognition | S. Karayev, T. Baumgartner, M. Fritz, and T. Darrell | Presented at the 26th Annual Conference on Neural Information Processing Systems (NIPS 2012), Lake Tahoe, Nevada | December 2012 | Vision | [PDF]
|
| Encounters with Language | C. J. Fillmore | Computational Linguistics, Vol. 38, No. 4, pg.701-718 | December 2012 | AI | [PDF]
|
| Making the Internet More Evolvable | B. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. Shenker | ICSI Technical Report TR-12-011 | September 2012 | Networking | [PDF]
|
| Probe and Pray: Using UPnP for Home Network Measurements | L. DiCioccio, R. Teixeira, M. May, and C. Kreibich | Proceedings of the 13th Passive and Active Measurement Conference (PAM 2012), pp. 96-105, Vienna, Austria | March 2012 | Networking | [PDF]
|
| Sparselet Models for Efficient Multiclass Object Detection | H. O. Song, S. Zickler, T. Althoff, R. Girshick, C. Geyer, M. Fritz, P. Felzenszwalb, and T. Darrell | Proceedings of the 12th European Conference on Computer Vision (ECCV 2012), pp. 802-815, Firenze, Italy | October 2012 | Vision | |
| Discovering Latent Domains for Multisource Domain Adaptation | J. Hoffman, K. Saenko, B. Kulis, and T. Darrell | Proceedings of the 12th European Conference on Computer Vision (ECCV 2012), pp. 702-715, Firenze, Italy | October 2012 | Vision | |
| ICSI Gazette | | | September 2012 | ICSI Newsletter | [PDF]
|
| Longer Features: They Do a Speech Detector Good | TJ Tsai and N. Morgan | Proceedings of the 13th Annual Conference of the International Speech Communication Association (InterSpeech 2012), Portland, Oregon | September 2012 | Speech | |
| Content‐based Privacy for Consumer‐Produced Multimedia | A. Janin, G. Friedland, and R. Sommer | ICSI Technical Report TR-12-012 | October 2012 | Networking | [PDF]
|
| The 2012 ICSI/Berkeley Video Location Estimation System | J. Choi, V. Ekambaram, G. Friedland, and K. Ramchandran | Presented at the MediaEval 2012 Workshop, Pisa, Italy | October 2012 | Speech | [PDF]
|
| Beyond Classification -- Large-Scale Gaussian Process Inference and Uncertainty Prediction | A. Freytag, E. Rodner, P. Bodesheim, and J. Denzler | Presented at the BigVision Workshop at the 26th Annual Conference on Neural Information Processing Systems (NIPS 2012), Lake Tahoe, Nevada | December 2012 | Vision | [PDF]
|
| NOSIX: A Portable Switch Interface for the Network Operating System | A. Wundsam and M.Yu | ICSI Technical Report TR-12-013 | October 2012 | Networking | [PDF]
|
| Unexpected Artefacts in PRNU-Based Camera Identification: A "Dresden Image Database" Case-Study | T. Gloe, S. Pfennig, and M. Kirchner | ACM Multimedia and Security Workshop, Coventry, UK | September 2012 | Vision | [PDF]
|
| Counter-Forensics: Attacking Image Forensics | R. Boehme and M. Kirchner | In Digital Image Forensics, H. T. Sencar and N. D. Memon, eds., pp. 327-366, Springer | 2012 | Vision | [PDF]
|
| Spectral Methods to Determine the Exact Scaling Factor of Resample Digital Images | S. Pfennig and M. Kirchner | Invited paper, "Image Forensics Techniques" special session, proceedings of the 5th International Symposium on Communications, Control, and Signal Processing (ISCCSP), Rome, Italy | May 2012 | Vision | [PDF]
|
| The FrameNet Constructicon | C. J. Fillmore, R. R. Lee-Goldman, and R. Rhomieux | In Sign-Based Construction Grammar, H. C. Boas and I. A. Sag, eds., Center for the Study of Language and Information | 2012 | AI | [PDF]
|
| Cleaning up the Big Mess: Discontinuous Dependencies and Complex Determiners | P. Kay and I. A. Sag | In Sign-Based Construction Grammar, H. C. Boas and I. A. Sag, eds., Center for the Study of Language and Information | 2012 | AI | |
| Hold-On: Protecting Against On-Path DNS Poisoning | H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson | Proceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United Kingdom | March 2012 | Networking | [PDF]
|
| Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community | M. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. Song | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, California | January 2012 | Networking | [PDF]
|
| Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service | B. Amann, M. Vallentin, S. Hall, and R. Sommer | ICSI Technical Report TR-12-014 | November 2012 | ICSI Technical Reports | [PDF]
|
| Rapid Uncertainty Computation with Gaussian Processes and Histogram Intersection Kernels | A. Freytag, E. Rodner, P. Bodesheim, and J. Denzler | Proceedings of the 11th Asian Conference on Computer Vision, Daejeon, Korea. Recipient of a best paper honorable mention award. | November 2012 | Vision | [PDF]
|
| Revisiting SSL: A Large Scale Study of the Internet's Most Trusted Protocol | B. Amann, M. Vallentin, S. Hall, and R. Sommer | ICSI Technical Report TR-12-015 | December 2012 | ICSI Technical Reports | [PDF]
|
| Effective Straggler Mitigation: Attack of the Clones | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | To appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, Illinois | April 2013 | Networking | |
| Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, Massachusetts | June 2012 | Networking | [PDF]
|
| PACMan: Coordinated Memory Caching for Parallel Jobs | G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, California | April 2012 | Networking | [PDF]
|
| Enabling Innovation Below the Communication API | G. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. Stoica | UC Berkeley Technical Report, UCB/EECS-2009-141 | October 2009 | Networking | [PDF]
|
| Shark: Fast Data Analysis Using Coarse-grained Distributed Memory | C. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. Stoica | Demo, ACM SIGMOD/PODS Conference, Scottsdale, Arizona | May 2012 | Networking | [PDF]
|
| Mesos: Flexible Resource Sharing for the Cloud | B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A.D. Joseph, R. Katz, S. Shenker and I. Stoica | USENIX ;login:, Vol. 36, No. 4, pp. 37-45 | August 2011 | Networking | [PDF]
|
| Spark: Cluster Computing with Working Sets | M. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. Stoica | Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, Massachusetts | June 2010 | Networking | [PDF]
|
| Software-Defined Internet Architecture | B. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. Shenker | Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, Washington | October 2012 | Networking | [PDF]
|
| Naming in Content-Oriented Architectures | A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2011), Toronto, ON, Canada | August 2011 | Networking | [PDF]
|
| Searching the Web of Data (Tutorial Abstract) | G. de Melo, K. Hose | Proceedings of the 35th European Conference on Information Retrieval (ECIR), Moscow, Russia | March 2012 | AI | |
| Taxonomic Data Integration from Multilingual Wikipedia Editions | G. de Melo and G. Weikum | To appear in Knowledge and Information Systems | 2013 | AI | |
| Markov Chains for Robust Graph-Based Commonsense Information Extraction | N. Tandon, D. Rajagopal, and G. de Melo | Demo at the 24th International Conference on Computational Linguistics (COLING), Mumbai, India | December 2012 | AI | |
| OpenWordNet-PT: An Open Brazilian WordNet for Reasoning | C. de Paiva, A. Rademaker, and G. de Melo | Demo at the 24th International Conference on Computational Linguistics (COLING), Mumbai, India | December 2012 | AI | |
| Exploiting Web Data Sources for Advanced NLP | G. de Melo | Proceedings of the 24th International Conference on Computational Linguistics (COLING), Tutorial Notes, Mumbai, India | December 2012 | AI | |
| LINDA: Distributed Web-of-Data-Scale Entity Matching | C. Boehm, G. de Melo, F. Naumann, and G. Weikum | Proceedings of the 21st ACM International Conference on Information and Knowledge Management (CIKM 2012), Maui, Hawaii | December 2012 | AI | |
| Constructing and Utilizing Wordnets using Statistical Methods | G. de Melo and G. Weikum | Journal of Language Resources and Evaluation, Vol. 46, Issue 2, pp. 287-311 | June 2012 | AI | |
| Taming the Wild: Acoustic Segmentation in Consumer‐Produced Videos | B. Elizalde and G. Friedland | ICSI Technical Report TR-12-016 | January 2013 | ICSI Technical Reports | [PDF]
|