| An Additive Latent Feature Model for Transparent Object Recognition | M. Fritz, M. Black, G. Bradski, and T. Darrell | Proceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, Canada, pp. 558-566 | December 2009 | Vision | [PDF]
|
| An Additive Latent Feature Model for Transparent Object Recognition | M. Fritz, M. Black, G. Bradski, S. Karayev, and T. Darrell | Proceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, British Columbia, Canada | December 2009 | Vision | [PDF]
|
| An Admission Control Approach for Elastic Flows in the Internet | L. Fàbrega, T. Jové, A. Bueno, and J. L. Marzo | Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001), Budapest, Hungary | June 2001 | Networking | |
| An Algebraic Approach to General Boolean Constraint Problems | H. W. Guesgen and P. B. Ladkin | ICSI Technical Report TR-90-008 | March 1990 | ICSI Technical Reports | [PDF]
|
| An ALGOL-based associative language | J.A. Feldman and P. Rovner | A.I. Memo 66, Stanford University; ; also in Communications of the ACM, Vol. 12, No. 8, August 1969, pp. 439-449. Reprinted in Introduction to Information Science, T. Saracevic (ed.), Bowker, 1971 | 1968 | AI | |
| An Algorithm for Cost-Delay Balanced Trees and Its Application to Wide Area Network Multicast | P. Radoslavov and T. Tokuda | Proceedings of the First International Conference on Worldwide Computing and Its Applications, Tsukuba, Japan | March 1997 | Networking | |
| An Algorithm to Learn Read-Once Threshold Formulas, and Some Generic Transformations Between Learning Models (Revised Version) | N. H. Bshouty, T. R. Hancock, L. Hellerstein, and M. Karpinski | ICSI Technical Report TR-93-037 | July 1993 | ICSI Technical Reports | [PDF]
|
| An Algorithm to Solve the m*n Assignment Problem in Expected Time O(mn log n)* | R. M. Karp | Networks, Vol. 10, No. 2, pp. 143-52 | 1980 | Algorithms | |
| An Alphabet-Independent Optimal Parallel Search for Three Dimensional Patterns | M. Karpinski and W. Rytter | ICSI Technical Report TR-93-070 | November 1993 | ICSI Technical Reports | [PDF]
|
| An Alternative to Checklist Theories of Meaning | C. J. Fillmore | Proceedings of the First Annual Meetings of the Berkeley Linguistics Society (BLS), Berkeley, California, pp. 123-131 | February 1975 | AI | [PDF]
|
| An Analysis of Sentence Segmentation Features for Broadcast News, Broadcast Conversations, and Meetings | S. Cuendet, E. Shriberg, B. Favre, J. Fung, and D. Hakkani-Tür | Proceedings of the SIGIR Workshop on Searching Conversational Spontaneous Speech, Amsterdam, Netherlands, pp. 43-59 | July 2007 | Speech | |
| An Analysis of the Divergence of Two Sather Dialects | D. Stoutamire, W. Zimmermann, and M. Trapp | ICSI Technical Report TR-96-037 | August 1996 | ICSI Technical Reports | [PDF]
|
| An Analysis of The Internal Structure of Large Autonomous Systems | R. Govindan and P. Radoslavov | Computer Science Department, University of Southern California Technical Report No. 02-777, Los Angeles, California | November 2002 | Networking | |
| An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks | V. Paxson | Computer Communication Review 31(3), July 2001. | July 2001 | Networking | |
| An Anticorrelation Kernel for Subsystem Training in Multiple Classifier Systems | L. Ferrer, K. Sönmez, and E. Shriberg | Journal of Machine Learning Research, Vol. 10, pp. 2079-2114 | September 2009 | Speech | [PDF]
|
| An Application of a Neural Net for Fuzzy Abductive Reasoning | M. Kaiser | ICSI Technical Report TR-93-044 | August 1993 | ICSI Technical Reports | [PDF]
|
| An Approach to Knowledge-Directed Image Analysis | J.A. Feldman, D. Ballard, and C. Brown | Proceedings of the Fifth International Joint Conference on Artificial Intelligence (IJCAI 1977), Cambridge, Massachusetts. Also TR21, Computer Science Department, University of Rochester, 1977. Also in Computer Vision Systems, A. R. Hanson and E. M. Riseman (eds.), Academic Press, New York, 1978 | August 1977 | AI | |
| An Approximation Algorithm for the Bandwidth Problem on Dense Graphs | M. Karpinski, J. Wirtgen, and A. Zelikovsky | ICSI Technical Report TR-97-016 | May 1997 | ICSI Technical Reports | [PDF]
|
| An Approximation Algorithm for the Number of Zeros of Arbitrary Polynomials over GF[q] | D. Grigoriev and M. Karpinski | ICSI Technical Report TR-91-027 | April 1991 | ICSI Technical Reports | [PDF]
|
| An Architecture for a Global Internet Host Distance Estimation Service | P. Francis, S. Jamin, V. Paxson, L. Zhang, D. Gryniewicz, and Y. Jin | Proceedings of IEEE INFOCOM, March 1999. | March 1999 | Networking | |
| An Architecture for Developing Behavioral History | M. Allman, E. Blanton, and V. Paxson | Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51 | July 2005 | Networking | [PDF]
|
| An Architecture for Energy Management in Wireless Sensor Networks | X. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36 | April 2007 | Networking | [PDF]
|
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | V. Paxson, R. Sommer, and N. Weaver | Proceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7 | May 2007 | Networking | [PDF]
|
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | R. Sommer, N. Weaver, and V. Paxson | Concurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279 | July 2009 | Networking | [PDF]
|
| An Architecture for Large-Scale Internet Measurement | V. Paxson, J. Mahdavi, A. Adams, and M. Mathis | IEEE Communications, Vol. 36, No. 8, pp. 48-54 | August 1998 | Networking | |
| An Articulatory Feature-Based Tandem Approach and Factored Observation Modeling | O. Cetin, A. Kantor, S. King, C. Bartels, M. Magimai-Doss, J. Frankel, and K. Livescu | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007), Honolulu, Hawaii, Vol. 4, pp. 645-648 | April 2007 | Speech | |
| An Assessment of Overt Malicious Activity Manifest in Residential Networks | G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin | Proceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163 | July 2011 | Networking | [PDF]
|
| An Associative Processing System for Conventional Digital Computers | J.A. Feldman and P.D. Rovner | TN-1967-19, Lincoln Laboratory, MIT, Lexington, Massachusetts | 1967 | AI | |
| An ATM Distributed Simulator for Network Management Research | J. L. Marzo, P. Vilà, L. Fàbrega, and D. Massaguer | Proceedings of the 34th Annual Simulation Symposium (SS 2001), Seattle, Washington, pp. 185-192 | April 2001 | Networking | |
| An Attentional Constraint on Spatial Meaning | T. Regier and M. Zheng | Proceedings of the 25th Annual Conference of the Cognitive Science Society, Boston, Massachusetts, p. 50 | July 2003 | AI | |
| An Automated Testing Suite for Computer Music Environments | N. Peters, T. Lossius, and T. Place | Proceedings of the 9th Sound and Music Computing Conference (SMC 2012), Copenhagen, Denmark | July 2012 | Other | [PDF]
|
| An Efficient and Accurate Graph-based Approach to Detect Population Substructure | S. Sridhar, S. Rao, and E. Halperin | Proceedings of the 11th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2007), Oakland, California, pp. 503-517 | April 2007 | Algorithms | [PDF]
|
| An efficient approximation scheme for the one-dimensional bin-packing problem | N. Karmarkar and R.M. Karp | Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, pp. 312-20 | November 1982 | Algorithms | |
| An Efficient Parallel Algorithm for Computing a Maximal Independent Set in a Hypergraph of Dimension 3 | E. Dahlhaus, M. Karpinski, and P. Kelsen | ICSI Technical Report tr-92-071 | October 1992 | ICSI Technical Reports | [PDF]
|
| An Efficient Parallel Algorithm for the 3MIS Problem | E. Dahlhaus and M. Karpinski | ICSI Technical Report TR-89-052 | September 1989 | ICSI Technical Reports | [PDF]
|
| An Efficient Parallel Algorithm for the Minimal Elimination Ordering (MEO) | E. Dahlhaus and M. Karpinski | ICSI Technical Report TR-89-024 | May 1989 | ICSI Technical Reports | [PDF]
|
| An Efficient Probabilistic Context-Free Parsing Algorithm That Computes Prefix Probabilities | A. Stolcke | ICSI Technical Report TR-93-065 | November 1993 | ICSI Technical Reports | [PDF]
|
| An Efficient Projection for L-1/L-Infinity Regularization | A. Quattoni, X. Carreras, M. Collins, and T. Darrell | Proceedings of the 26th International Conference on Machine Learning (ICML 2009), Montreal, Quebec | June 2009 | Vision | [PDF]
|
| An Elementary Proof of the Johnson-Lindenstrauss Lemma | S. Dasgupta and A. Gupta | ICSI Technical Report TR-99-006 | March 1999 | ICSI Technical Reports | [PDF]
|
| An Elitist Approach to Articulatory-Acoustic Feature Classification | S. Chang, S. Greenberg, and M. Wester | Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001), Aalborg, Denmark | September 2001 | Speech | [PDF]
|
| An Essay Concerning Robotic Understanding | J.A. Feldman | AI Magazine, Vol. 11, pp. 12-13 | 1990 | AI | |
| An Evaluation of Burst-level Bandwidth Reservation Methods in WANEnvironments | M. Yoshida, C. Ikeda, and H. Suzuki | ICSI Technical Report TR-93-078 | February 1994 | ICSI Technical Reports | [PDF]
|
| An Evaluation of TCP with Larger Initial Windows | M. Allman, C. Hayes, and S. Ostermann | ACM Computer Communication Review, Vol. 28, Issue 3 | July 1998 | Networking | |
| An Evaluation of XML-RPC | M. Allman | ACM Performance Evaluation Review, 30(4) | March 2003 | Networking | |
| An Exact and Efficient Triangle Intersection Test Hardware | A. Raabe, J. Tietjen, and J. K. Anlauf | Proceedings of the International Conference on Computer Graphics Theory and Applications (GRAPP ’09), Lisbon, Portugal, pp. 355-360 | February 2009 | Architecture | [PDF]
|
| An Examination of MBone Performance | M. Handley | USC/ISI Research Report: ISI/RR-97-450 | 1997 | Networking | |
| An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow | E. Friedman, M. Shor, S. Shenker, and B. Sopher | Games and Economic Behavior, Vol. 47, Issue 2, pp. 325-352 | May 2004 | Networking | |
| An Experimental Study of the Effects of Word Recognition Errors in Spoken Queries on the Effectiveness of an Information Retrieval System | F. Crestani | ICSI Technical Report TR-99-016 | October 1999 | ICSI Technical Reports | [PDF]
|
| An Exponential Lower Bound on the Size of Algebraic Decision Trees for MAX | D. Grigoriev, M. Karpinski, and A. C. Yao | ICSI Technical Report TR-95-066 | November 1995 | ICSI Technical Reports | [PDF]
|
| An Extended Local Connectionist Manifesto: Embracing Relational and Procedural Knowledge | L. Shastri | Behavioral and Brain Sciences, Vol. 23, No. 4, pp. 492-493 | August 2000 | AI | [PDF]
|