| Revisiting SSL: A Large Scale Study of the Internet's Most Trusted Protocol | B. Amann, M. Vallentin, S. Hall, and R. Sommer | ICSI Technical Report TR-12-015 | December 2012 | ICSI Technical Reports | [PDF]
|
| Markov Chains for Robust Graph-Based Commonsense Information Extraction | N. Tandon, D. Rajagopal, and G. de Melo | Demo at the 24th International Conference on Computational Linguistics (COLING), Mumbai, India | December 2012 | AI | |
| OpenWordNet-PT: An Open Brazilian WordNet for Reasoning | C. de Paiva, A. Rademaker, and G. de Melo | Demo at the 24th International Conference on Computational Linguistics (COLING), Mumbai, India | December 2012 | AI | |
| Exploiting Web Data Sources for Advanced NLP | G. de Melo | Proceedings of the 24th International Conference on Computational Linguistics (COLING), Tutorial Notes, Mumbai, India | December 2012 | AI | |
| LINDA: Distributed Web-of-Data-Scale Entity Matching | C. Boehm, G. de Melo, F. Naumann, and G. Weikum | Proceedings of the 21st ACM International Conference on Information and Knowledge Management (CIKM 2012), Maui, Hawaii | December 2012 | AI | |
| Taxonomic Data Integration from Multilingual Wikipedia Editions | G. de Melo and G. Weikum | To appear in Knowledge and Information Systems | 2013 | AI | |
| Good, Great, Excellent: Global Inference of Lexical Intensities | G. de Melo and M. Bansal | To appear in the Transactions of the Association for Computational Linguistics | 2013 | AI | |
| Taming the Wild: Acoustic Segmentation in Consumer‐Produced Videos | B. Elizalde and G. Friedland | ICSI Technical Report TR-12-016 | January 2013 | ICSI Technical Reports | [PDF]
|
| Comments on Bufferbloat | M. Allman | ACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37 | January 2013 | Networking | [PDF]
|
| Findings and Implications from Data Mining the IMC Review Process | R. Beverly and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29 | January 2013 | Networking | [PDF]
|
| Identifying Personal Genomes by Surname Inference | M. Gymrek, A. L. McGuire, D. Golan, E. Halperin, and Y. Erlich | Science, Vol. 339, No. 6117, pp. 321-324 | January 2013 | Algorithms | |
| The Neural Binding Problem(s) | J. Feldman | Cognitive Neurodynamics, Vol. 7, Issue 1, pp. 1-11 | February 2013 | AI | [PDF]
|
| Change Blindness Reveals Distinctive Featural Processing in Size, Color, and Orientation | S. X. Yu and D. Lisin | ICSI Technical Report TR-13-001 | February 2013 | ICSI Technical Reports | [PDF]
|
| Impeding Forgers at Photo Inception | M. Kirchner, P. Winkler, and H. Farid | Proceedings of SPIE-IS&T Electronic Imaging, Media Watermarking, Security, and Forensics 2013, SPIE Vol. 8665, San Francisco, California | February 2013 | Vision | [PDF]
|
| Probabilistic Inference of Viral Quasispecies Subject to Recombination | A. Topfer, O. Zagordi, S. Prabhakaran, V. Roth, E. Halperin, and N. Beerenwinkel | Journal of Computational Biology, Vol. 20, No. 2, pp. 113-123 | February 2013 | Algorithms | |
| Tutorial: Searching the Web of Data | G. de Melo and K. Hose | Presented at the European Conference on Information Retrieval (ECIR), Moscow, Russia | March 2013 | AI | |
| A Hybrid-System Model of the Coagulation Cascade | J. Makin and S. Narayanan | Proceedings of the 5th International Conference on Bioinformatics and Computational Biology (BICoB2013), Honolulu, Hawaii | March 2013 | AI | |
| Communicating with Exectuable Representations | M. Schilling and S. Narayanan | Proceedings of the AAAI Spring Symposium (Designing Intelligent Robots), Stanford University, California | March 2013 | AI | |
| Effective Straggler Mitigation: Attack of the Clones | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | To appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, Illinois | April 2013 | Networking | |
| Large-scale Correlation of Accounts Across Social Networks | O. Goga, D. Perito, H. Lei, R. Teixeira, and R. Sommer | ICSI Technical Report TR-13-002 | April 2013 | ICSI Technical Reports | [PDF]
|
| Exploiting Innocuous Activity for Correlating Users Across Sites | O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web | D. Akhawe, B. Amann, M. Vallentin, and R. Sommer | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| A Cognitive Model of Scales | S. Narayanan | To appear in the proceedings of the 12th International Cognitive Linguistics Conference (ICLC), Edmonton, Canada | June 2013 | AI | |
| MetaNet: A Multilingual Metaphor Repository | S. Narayanan | To appear in the proceedings of the 12th International Cognitive Linguistics Conference (ICLC), Edmonton, Canada | June 2013 | AI | |