| A Discriminative Model for Identifying Spatial Cis-Regulatory Modules | E. Segal and R. Sharan | Proceedings of RECOMB 2004, pp. 141-149; also submitted to Journal of Computational Biology | January 05 2004 | Algorithms | |
| A Discriminative Model for Identifying Spatial cis-Regulatory Modules | E. Segal and R. Sharan | ICSI Technical Report TR-03-004 | October 2003 | ICSI Technical Reports | [PDF]
|
| A Digital Fountain Approach to Reliable Distribution of Bulk Data | J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege | ICSI Technical Report TR-98-013 | May 1998 | ICSI Technical Reports | [PDF]
|
| A Design-Space Exploration for CMOS Photonic Processor Networks | V. Stojanović, A. Joshi, C. Batten, Y.-J. Kwon, S. Beamer, S. Chen, and K. Asanović | Invited talk at the Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC 2010), San Diego, California | March 2010 | Architecture | |
| A Declarative Sensornet Architecture | A. Tavakoli, D. Chu, J. Hellerstein, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 55-60 | April 2007 | Networking | [PDF]
|
| A Data-oriented (and Beyond) Network Architecture | T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica | Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192 | October 2007 | Networking | [PDF]
|
| A Customisable Memory Management Framework | G. Attardi and T. Flagella | ICSI Technical Report TR-94-010 | February 1994 | ICSI Technical Reports | [PDF]
|
| A Cost Comparison of Datacenter Network Architectures | L. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, and I. Stoica | Proceedings of the 6th ACM International Conference on Emerging Networking EXperiments and Technologies, Philadelphia, Pennsylvania, article no. 16 | December 2010 | Networking | [PDF]
|
| A Cooperative Multimedia Environment with QOS Control: Architectural and Implementation Issues | M. Alfano and N. Radouniklis | ICSI Technical Report TR-96-040 | September 1996 | ICSI Technical Reports | [PDF]
|
| A Control-Theoretic Approach to Flow Control | S. Keshav | ICSI Technical Report TR-91-015 | March 1991 | ICSI Technical Reports | [PDF]
|
| A Continuous Speech Recognition System Embedding MLP into HMM | H. Bourlard and N. Morgan | Advances in Neural Information Processing Systems, Vol. II, pp. 186-193 | 1990 | Speech | |
| A Constructive Omega(t(superscript 1.26)) Lower Bound for the Ramsey Number R (3,t) | R. Cleve and P. Dagum | ICSI Technical Report TR-89-009 | February 1989 | ICSI Technical Reports | [PDF]
|
| A Constrained Combination of Discriminative and Generative Methods | M. Salzmann and R. Urtasun | Presented at the Learning Workshop, Snowbird, Utah | April 2010 | Vision | |
| A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCP | E. Blanton, M. Allman, K. Fall, and L. Wang | RFC 3517 | April 2003 | Networking | |
| A Connectionist Unification Algorithm | S. Hoelldobler | ICSI Technical Report TR-90-012 | March 1990 | ICSI Technical Reports | [PDF]
|
| A Connectionist Treatment of Negation and Inconsistency | L. Shastri and D.J. Grannes | Proceedings of the 18th Conference of the Cognitive Science Society | 1996 | AI | |
| A Connectionist Model of Visual Memory | J.A. Feldman | Parallel Models of Associative Memory, pp. 65-97, G. E. Hinton and J. A. Anderson (eds.), Lawrence Erlbaum Associates, Inc., Hillsdale, New Jersey | 1981 | AI | |
| A Connectionist Model of Unification | A. Stolcke | ICSI Technical Report TR-89-032 | May 1989 | ICSI Technical Reports | [PDF]
|
| A Connectionist Model of Planning via Back-Chaining Search | M. Garagnani, L. Shastri, and C. Wendelken | Proceedings of the 20th Workshop of the UK Planning and Scheduling Special Interest Group (PLANSIG 2001), Edinburgh, Scotland | December 2001 | AI | [PDF]
|
| A Connectionist Model of Planning via Back-Chaining Search | M. Garagnani, L. Shastri, and C. Wendelken | Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002), Fairfax, Virginia | August 2002 | AI | [PDF]
|
| A Connectionist Encoding of Parameterized Schemas and Reactive Plans | L. Shastri, D. Grannes, S. Narayanan, and J. Feldman | ICSI Technical Report TR-02-008 | October 2002 | ICSI Technical Reports | [PDF]
|
| A Connectionist Encoding of Parameterized Schemas and Reactive Plans | L. Shastri, D.J. Grannes, S. Narayanan, and J. Feldman | Proceedings of the First SMART-Symposium, Reisenburg Castle, Germany, July 1997. In GK Kraetzschmar, G Palm (eds), “Lecture Notes in Artificial Intelligence 1624,” pp. 1-28 | 1999 | AI | |
| A Connectionist Encoding of Parameterized Schemas and Reactive Plans | L. Shastri, D. Grannes, S. Narayanan, and J. Feldman | Hybrid Information Processing in Adaptive Autonomous vehicles, G.K. Kraetzschmar and G. Palm (Eds.), Springer-Verlag, Berlin; also ICSI Technical Report TR-02-008 | 2002 | AI | |
| A Connectionist Approach to Symbolic Constraint Satisfaction | H. W.Guesgen | ICSI Technical Report TR-90-018 | April 1990 | ICSI Technical Reports | [PDF]
|
| A Computationally Efficient Abstraction of Long-term Potentiation | L. Shastri | Neurocomputing, Vol. 44-46, pp. 33-41 | June 2002 | AI | [PDF]
|
| A Computational Model of Tractable Reasoning -- Taking Inspiration from Cognition | L. Shastri | Proceedings of the 13th International Joint Conference on Artificial Intelligence (IJCAI 93), France, pp. 202-207 | 1993 | Algorithms | |
| A Computational Model of Human Blood Clotting: Simulation, Analysis, Control, and Validation | J. Makin | UC Berkeley dissertation | December 2008 | AI | [PDF]
|
| A computational model of episodic memory formation in the hippocampal system | L. Shastri | Neurocomputing, Vol. 38-40, pp. 889-897 | 2001 | AI | |
| A computational model of comprehension-based construction acquisition | N. Chang | Child Language Research Forum, Stanford University | May 2004 | AI | [PDF]
|
| A computational model of attachment secure responses in the Strange Situation | A. Amengual | TR-09-002 | March 2009 | ICSI Technical Reports | |
| A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors | G. Schryen | Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (IMF 2009), Stuttgart, Germany, pp. 153-168 | September 2009 | Networking | [PDF]
|
| A Comparison of Tight Generalization Error Bounds | M. Kaariainen and J. Langford | Proceedings of the 22nd International Conference on Machine Learning (ICML 2005), Bonn, Germany, pp. 409-416 | August 2005 | Algorithms | |
| A Comparison of the AES Candidates Amenability to FPGA Implementation | N. Weaver and J. Wawrzynek | The Third Advanced Encryption Standard (AES) Candidate Conference, 2000. | 2000 | Networking | |
| A Comparison of Single- and Multi-Objective Programming Approaches to Problems with Multiple Design Objectives | S. Yaman and C.-H. Lee | Journal of Signal Processing Systems, MLSP special issue | November 2008 | Speech | [PDF]
|
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | Computer Networks, 42(2) | June 2003 | Networking | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | ACM SIGCOMM Student Poster Session, August 2002. | August 2002 | Networking | |
| A Comparison of Premotor Areas Activated by Action Observation and Action Phrases | L. Aziz-Zadeh, S. M. Wilson, and M. Iacoboni | Society for Neuroscience Abstract Viewer/Itinerary Planner, Program No. 852.14 | November 2005 | AI | |
| A Comparison of Phasing Algorithms for Trios and Unrelated Individuals | J. Marchini, D. Cutler, N. Patterson, M. Stephens, E. Eskin, E. Halperin, S. Lin, S. Qin, G. Abecassis, H. Munro, and P. Donnelly | American Journal of Human Genetics, Vol. 78, Issue 3, pp. 437-450 | March 2006 | Algorithms | |
| A Comparison of Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, P. Radoslavov, and R. Govindan | Computer Science Department, University of Southern California Technical Report No. 01-751, Los Angeles, California | July 2001 | Networking | [PDF]
|
| A Comparison of Data-Derived and Knowledge-Based Modeling of Pronunciation Variation | M. Wester and E.Fosler-Lussier | Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000), Beijing, China | October 2000 | Speech | [PDF]
|
| A Comparison of Approaches for Modeling Prosodic Features in Speaker Recognition | L. Ferrer, N. Scheffer, and E. Shriberg | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 4414-4417 | March 2010 | Speech | [PDF]
|
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | IEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482 | June 05 2004 | Networking | |
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | Proceedings of the IEEE Infocom 2001, Anchorage, Alaska, USA, April 22-26, 2001. | April 22 2001 | Networking | |
| A Comparative Large Scale Study of MLP Features for Mandarin ASR | F. Valente, M. Magimai Doss, C. Plahl, S. Ravuri, and W. Wang | Proceedings of the 11th International Conference of the International Speech Communication Association (Interspeech 2010), Makuhari, Japan, pp. 2630-2363 | September 2010 | Speech | [PDF]
|
| A Combined BIT and TIMESTAMP Algorithm for the List Update Problem | S. Albers, B. von Stengel, and R. Werchner | ICSI Technical Report TR-95-016 | April 1995 | ICSI Technical Reports | [PDF]
|
| A Combined Analytical and Search-Based Approach for the Inductive Synthesis of Functional Programs | E. Kitzelmann | Künstliche Intelligenz, Vol. 25, No. 2, pp. 179-182. Extended abstract of PhD thesis. Also in Ausgezeichnete Informatikdissertationen as "Ein kombinierter analytischer und suchbasierter Ansatz zur induktiven Synthese funktionaler Programme" (Extended abstract in German) | May 2011 | AI | [PDF]
|
| A Combinatorial Approach to Protein Docking with Flexible Side-Chains | E. Althaus, O. Kohlbacher, H.P. Lenhof, and P. Muller | Proceedings of the Fourth Annual International conference on Computational Molecular Biology (RECOMB-00), Tokyo, Japan, 2000. | 2000 | Algorithms | |
| A Cognitive Off-line Model for Motor Interpretation of Handwritten Words | C. M. Privitera | ICSI Technical Report TR-95-037 | August 1995 | ICSI Technical Reports | [PDF]
|
| A Cognitive Model of Sentence Interpretation: the Construction Grammar Approach | D. Jurafsky | ICSI Technical Report TR-93-077 | December 1993 | ICSI Technical Reports | [PDF]
|
| A Cognitive Model of Scales | S. Narayanan | To appear in the proceedings of the 12th International Cognitive Linguistics Conference (ICLC), Edmonton, Canada | June 2013 | AI | |