| Cascaded Model Adaptation for Dialog Act Segmentation and Tagging | U. Guz, G. Tur, D. Hakkani-Tür, and S. Cuendet | Journal of Computer Speech and Language, Vol. 24, Issue 2, pp. 289-306 | April 2010 | Speech | |
| A Longitudinal View of HTTP Traffic | T. Callahan, M. Allman, and V. Paxson | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| Web Timeouts and Their Implications | Z. Al-Qudah, M. Rabinovich, and M. Allman | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| Trained to Accept? A Field Experiment on Consent Dialogs | R. Boehme and S. Koepsell | Proceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406 | April 2010 | Networking | [PDF]
|
| Accurate Estimation of Expression Levels of Homologous Genes in RNA-Seq Experiments | B. Pasaniuc, N. Zaitlen, and E. Halperin | Proceedings of the Fourteenth International Conference on Research in Computational Biology (RECOMB 2010), Lisbon, Portugal, pp. 397-409. Also appears in Journal of Computational Biology (a special issue of RECOMB), Vol. 18, Issue 3, pp. 489-468, March 2011. | April 2010 | Algorithms | [PDF]
|
| Insights from the Inside: A View of Botnet Management from Infiltration | C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| On the Potential of Proactive Domain Blacklisting | M. Felegyhazi, C. Kreibich, and V. Paxson | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| A Preliminary Analysis of TCP Performance in an Enterprise Network | B. Nechaev, M. Allman, V. Paxson, and A. Gurtov | Proceedings of the 2010 Internet Network Management Workshop/Workshop on Research and Enterprise Networking (INM/WREN '10), San Jose, California | April 2010 | Networking | [PDF]
|
| Unencumbered by Success: The Usenix Security Grand Challenge Competition | N. Weaver | ICSI Technical Report TR-10-004 | April 2010 | ICSI Technical Reports | [PDF]
|
| RFC 5827: Early Retransmit for TCP and SCTP | M. Allman, K. Avrachenkov, U. Ayesta, J. Blanton, and P. Hurtig | Request for Comments 5827, Experimental | April 2010 | Networking | [PDF]
|
| FOLS: Factorized Orthogonal Latent Spaces | M. Salzmann, C. H. Ek, R. Urtasun, and T. Darrell | Presented at the Learning Workshop, Snowbird, Utah | April 2010 | Vision | |
| A Constrained Combination of Discriminative and Generative Methods | M. Salzmann and R. Urtasun | Presented at the Learning Workshop, Snowbird, Utah | April 2010 | Vision | |
| Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce | J. Hendrik Boese, A. Andrzejak, and M. Hoegqvist | Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3 | April 2010 | Networking | |
| Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling | M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. Stoica | Proceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278 | April 2010 | Networking | [PDF]
|
| Dynamic Route Recomputation Considered Harmful | M. Caesar, M. Casado, T. Koponen, J. Rexford, and S. Shenker | Computer Communication Review, Vol. 40, Issue 2 | April 2010 | Networking | [PDF]
|
| A First Look at Mobile Hand-held Device Traffic | G. Maier, F. Schneider, and A. Feldmann | Proceedings of the 11th International Conference on Passive and Active Network Measurement (PAM 2010), Zurich, Switzerland, pp. 161-170 | April 2010 | Networking | [PDF]
|
| Hedera: Dynamic Flow Scheduling for Data Center Networks | M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat | Proceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, California | April 2010 | Networking | [PDF]
|
| When to Use Bit-Wise Neutrality | T. Friedrich and F. Neumann | Natural Computing, Vol. 9, No. 1, pp. 283-294 | March 2010 | Algorithms | [PDF]
|
| Ecological Expected Utility and the Mythical Neural Code | J. Feldman | Cognitive Neurodynamics, Vol. 4, No. 1, pp. 25-35 | March 2010 | AI | [PDF]
|
| Speaker Adaptation of Language and Prosodic Models for Automatic Dialog Act Segmentation of Speech | J. Kolar, Y. Liu, and E. Shriberg | Speech Communication, Vol. 52, Issue 3, pp. 236-245 | March 2010 | Speech | |
| The "Dresden Image Database" for Benchmarking Digital Image Forensics | T. Gloe and R. Boehme | Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, Switzerland | March 2010 | Networking | |
| Privacy in Online Social Lending | R. Boehme and S. Poetzsch | Proceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28 | March 2010 | Networking | [PDF]
|
| A Design-Space Exploration for CMOS Photonic Processor Networks | V. Stojanović, A. Joshi, C. Batten, Y.-J. Kwon, S. Beamer, S. Chen, and K. Asanović | Invited talk at the Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC 2010), San Diego, California | March 2010 | Architecture | |
| An Adaptive Initialization Method for Speaker Diarization Based on Prosodic Features | D. Imseng and G. Friedland | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 4946-4949 | March 2010 | Speech | [PDF]
|
| Summarization- and Learning-Based Approaches to Information Distillation | B. Toth, D. Hakkani-Tur, and S. Yaman | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 5306-5309 | March 2010 | Speech | [PDF]
|
| Chemokine Polymorphisms and Lymphoma: A Pooled Analysis | P. M. Bracci, C. F. Skibola, L. Conde, E. Halperin, T. Lightfoot, A. Smith, R. A. Paynter, D. R. Skibola, L. Agana, E. Roman, E. Kane, and J. K. Wiencke | Leukemia and Lymphoma, Vol. 51, No. 3, pp. 497-506 | March 2010 | Algorithms | |
| Towards Lightweight Self-Configuration in Wireless Sensor Networks | B. Satzger, F. Bagci, F. Kluge, and T. Ungerer | Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), Sierre, Switzerland, pp. 791-792 | March 2010 | Algorithms | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | ACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3 | March 2010 | Networking | [PDF]
|
| Comparing the Contributions of Context and Prosody in Text-Independent Dialog Act Recognition | K. Laskowski and E. Shriberg | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 5374-5377 | March 2010 | Speech | [PDF]
|
| An FPGA-Based Simulator for Datacenter Networks | Z. Tan, K. Asanovic, and D. Patterson | Presented at the Exascale Evaluation and Research Techniques Workshop, Pittsburgh, Pennsylvania | March 2010 | Architecture | |
| A Comparison of Approaches for Modeling Prosodic Features in Speaker Recognition | L. Ferrer, N. Scheffer, and E. Shriberg | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 4414-4417 | March 2010 | Speech | [PDF]
|
| Acoustic Front-End Optimization for Bird Species Recognition | M. Graciarena, M. Delplanche, E. Shriberg, A. Stolcke, and L. Ferrer | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 293-296 | March 2010 | Speech | [PDF]
|
| Leveraging Speaker Diarization for Meeting Recognition from Distant Microphones | A. Stolcke, G. Friedland, and D. Imseng | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 4390-4393 | March 2010 | Speech | [PDF]
|
| Cover Song Detection: From High Scores to General Classification | S. Ravuri and D. Ellis | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 65-68 | March 2010 | Speech | [PDF]
|
| Evaluation of Semantic Role Labeling and Dependency Parsing of Automatic Speech Recognition Output | B. Favre, B. Bohnet, D. Hakkani-Tür | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 5342-5345 | March 2010 | Speech | [PDF]
|
| Detecting Local Semantic Concepts in Environmental Sounds Using Markov Model Based Clustering | K. Lee, D. Ellis, and A. Loui | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, March 2010 | March 2010 | Speech | [PDF]
|
| A Self-Stabilizing Algorithm for Cut Problems in Synchronous Networks | T. Sauerwald and D. Sudholt | Theoretical Computer Science, Vol. 411, Issues 14-15, pp. 1599-1612 | March 2010 | Algorithms | |
| Haplotype Inference in Complex Pedigrees | B. Kirkpatrick, E. Halperin, and R. M. Karp | Journal of Computational Biology, Vol. 17, No. 3, pp. 269-280 | March 2010 | Algorithms | |
| Guest Editors' Introduction: Proceedings of the 21st Symposium on High Performance Chips (Hot Chips 21), Stanford, California | K. Asanovic and R. Wittig | IEEE Micro, Vol. 30, No. 2, pp. 5-6 | March 2010 | Architecture | [PDF]
|
| ICSI Gazette | | | March 2010 | ICSI Newsletter | [PDF]
|
| Review of J. Nichols and B. Myers, "Creating a Lightweight User Interface Description Language: An Overview and Analysis of the Personal Universal Controller Project" | G. Friedland | ACM Computing Reviews, CR137773 | March 2010 | Speech | |
| Topology-Free Querying of Protein Interaction Networks | S. Bruckner, F. Huffner, R. M. Karp, R. Shamir, and R. Sharan | Journal of Computational Biology, Vol. 17, Issue 3, pp. 237-252 | March 2010 | Algorithms | [PDF]
|
| Torque: Topology-Free Querying of Protein Interaction Networks | S. Bruckner, F. Hüffner, R. M. Karp, R. Shamir, and R. Sharan | Journal of Computational Biology, Vol. 17, Issue 3, pp. 237-252 | March 2010 | Algorithms | |
| Language Model Combination and Adaptation Using Weighted Finite State Transducers | X. Liu, M. J. F. Gales, J. L. Hieronymus, and P. C. Woodland | Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Dallas, Texas | March 2010 | Speech | |
| Average-Case Analysis of Incremental Topological Ordering | D. Ajwani and T. Friedrich | Discrete Applied Mathematics, Vol. 158, Issue 4, pp. 240-250 | February 2010 | Algorithms | [PDF]
|
| Multi-View Semi-Supervised Learning for Dialog Act Segmentation of Speech | U. Guz, S. Cuendet, G. Tur, and D. Hakkani-Tür | IEEE Transactions on Audio, Speech and Language Processing, Vol. 18, Issue 2, pp. 320-329 | February 2010 | Speech | [PDF]
|
| Plateaus Can Be Harder in Multi-Objective Optimization | T. Friedrich, N. Hebbinghaus, and F. Neumann | Theoretical Computer Science, Vol. 411, Issue 6, pp. 854-864 | February 2010 | Algorithms | [PDF]
|
| Botnet Judo: Fighting Spam with Itself | A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. Savage | Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, California | February 2010 | Networking | [PDF]
|
| HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis | R. Sommer, N. Weaver, and V. Paxson | ICSI Technical Report TR-10-003 | February 2010 | ICSI Technical Reports | [PDF]
|
| Mātārere: A Layered Framework for Specifying Event-Based Systems | A. Voisard and H. Ziekow | ICSI Technical Report TR-10-002 | February 2010 | ICSI Technical Reports | [PDF]
|