Publication Search Results

TitleAuthorBibliographicDatesort ascendingGroupLinks
Cascaded Model Adaptation for Dialog Act Segmentation and TaggingU. Guz, G. Tur, D. Hakkani-Tür, and S. CuendetJournal of Computer Speech and Language, Vol. 24, Issue 2, pp. 289-306April 2010Speech
A Longitudinal View of HTTP TrafficT. Callahan, M. Allman, and V. PaxsonProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

Web Timeouts and Their ImplicationsZ. Al-Qudah, M. Rabinovich, and M. AllmanProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

Trained to Accept? A Field Experiment on Consent DialogsR. Boehme and S. KoepsellProceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406April 2010Networking[PDF]

Accurate Estimation of Expression Levels of Homologous Genes in RNA-Seq ExperimentsB. Pasaniuc, N. Zaitlen, and E. HalperinProceedings of the Fourteenth International Conference on Research in Computational Biology (RECOMB 2010), Lisbon, Portugal, pp. 397-409. Also appears in Journal of Computational Biology (a special issue of RECOMB), Vol. 18, Issue 3, pp. 489-468, March 2011.April 2010Algorithms[PDF]

Insights from the Inside: A View of Botnet Management from InfiltrationC. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. SongProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

On the Potential of Proactive Domain BlacklistingM. Felegyhazi, C. Kreibich, and V. PaxsonProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

A Preliminary Analysis of TCP Performance in an Enterprise NetworkB. Nechaev, M. Allman, V. Paxson, and A. GurtovProceedings of the 2010 Internet Network Management Workshop/Workshop on Research and Enterprise Networking (INM/WREN '10), San Jose, CaliforniaApril 2010Networking[PDF]

Unencumbered by Success: The Usenix Security Grand Challenge CompetitionN. WeaverICSI Technical Report TR-10-004April 2010ICSI Technical Reports[PDF]

RFC 5827: Early Retransmit for TCP and SCTPM. Allman, K. Avrachenkov, U. Ayesta, J. Blanton, and P. HurtigRequest for Comments 5827, ExperimentalApril 2010Networking[PDF]

FOLS: Factorized Orthogonal Latent SpacesM. Salzmann, C. H. Ek, R. Urtasun, and T. DarrellPresented at the Learning Workshop, Snowbird, UtahApril 2010Vision
A Constrained Combination of Discriminative and Generative MethodsM. Salzmann and R. UrtasunPresented at the Learning Workshop, Snowbird, UtahApril 2010Vision
Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-ReduceJ. Hendrik Boese, A. Andrzejak, and M. HoegqvistProceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3April 2010Networking
Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster SchedulingM. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. StoicaProceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278April 2010Networking[PDF]

Dynamic Route Recomputation Considered HarmfulM. Caesar, M. Casado, T. Koponen, J. Rexford, and S. ShenkerComputer Communication Review, Vol. 40, Issue 2April 2010Networking[PDF]

A First Look at Mobile Hand-held Device TrafficG. Maier, F. Schneider, and A. FeldmannProceedings of the 11th International Conference on Passive and Active Network Measurement (PAM 2010), Zurich, Switzerland, pp. 161-170April 2010Networking[PDF]

Hedera: Dynamic Flow Scheduling for Data Center NetworksM. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. VahdatProceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CaliforniaApril 2010Networking[PDF]

When to Use Bit-Wise NeutralityT. Friedrich and F. NeumannNatural Computing, Vol. 9, No. 1, pp. 283-294March 2010Algorithms[PDF]

Ecological Expected Utility and the Mythical Neural CodeJ. FeldmanCognitive Neurodynamics, Vol. 4, No. 1, pp. 25-35March 2010AI[PDF]

Speaker Adaptation of Language and Prosodic Models for Automatic Dialog Act Segmentation of SpeechJ. Kolar, Y. Liu, and E. ShribergSpeech Communication, Vol. 52, Issue 3, pp. 236-245March 2010Speech
The "Dresden Image Database" for Benchmarking Digital Image ForensicsT. Gloe and R. BoehmeProceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, SwitzerlandMarch 2010Networking
Privacy in Online Social LendingR. Boehme and S. PoetzschProceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28March 2010Networking[PDF]

A Design-Space Exploration for CMOS Photonic Processor NetworksV. Stojanović, A. Joshi, C. Batten, Y.-J. Kwon, S. Beamer, S. Chen, and K. AsanovićInvited talk at the Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC 2010), San Diego, CaliforniaMarch 2010Architecture
An Adaptive Initialization Method for Speaker Diarization Based on Prosodic FeaturesD. Imseng and G. FriedlandProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 4946-4949March 2010Speech[PDF]

Summarization- and Learning-Based Approaches to Information DistillationB. Toth, D. Hakkani-Tur, and S. YamanProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 5306-5309March 2010Speech[PDF]

Chemokine Polymorphisms and Lymphoma: A Pooled AnalysisP. M. Bracci, C. F. Skibola, L. Conde, E. Halperin, T. Lightfoot, A. Smith, R. A. Paynter, D. R. Skibola, L. Agana, E. Roman, E. Kane, and J. K. WienckeLeukemia and Lymphoma, Vol. 51, No. 3, pp. 497-506March 2010Algorithms
Towards Lightweight Self-Configuration in Wireless Sensor NetworksB. Satzger, F. Bagci, F. Kluge, and T. UngererProceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), Sierre, Switzerland, pp. 791-792March 2010Algorithms[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3March 2010Networking[PDF]

Comparing the Contributions of Context and Prosody in Text-Independent Dialog Act RecognitionK. Laskowski and E. ShribergProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 5374-5377March 2010Speech[PDF]

An FPGA-Based Simulator for Datacenter NetworksZ. Tan, K. Asanovic, and D. PattersonPresented at the Exascale Evaluation and Research Techniques Workshop, Pittsburgh, PennsylvaniaMarch 2010Architecture
A Comparison of Approaches for Modeling Prosodic Features in Speaker RecognitionL. Ferrer, N. Scheffer, and E. ShribergProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 4414-4417March 2010Speech[PDF]

Acoustic Front-End Optimization for Bird Species RecognitionM. Graciarena, M. Delplanche, E. Shriberg, A. Stolcke, and L. FerrerProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 293-296March 2010Speech[PDF]

Leveraging Speaker Diarization for Meeting Recognition from Distant MicrophonesA. Stolcke, G. Friedland, and D. ImsengProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 4390-4393March 2010Speech[PDF]

Cover Song Detection: From High Scores to General ClassificationS. Ravuri and D. EllisProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 65-68March 2010Speech[PDF]

Evaluation of Semantic Role Labeling and Dependency Parsing of Automatic Speech Recognition OutputB. Favre, B. Bohnet, D. Hakkani-TürProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 5342-5345March 2010Speech[PDF]

Detecting Local Semantic Concepts in Environmental Sounds Using Markov Model Based ClusteringK. Lee, D. Ellis, and A. LouiProceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, March 2010March 2010Speech[PDF]

A Self-Stabilizing Algorithm for Cut Problems in Synchronous NetworksT. Sauerwald and D. SudholtTheoretical Computer Science, Vol. 411, Issues 14-15, pp. 1599-1612March 2010Algorithms
Haplotype Inference in Complex PedigreesB. Kirkpatrick, E. Halperin, and R. M. KarpJournal of Computational Biology, Vol. 17, No. 3, pp. 269-280March 2010Algorithms
Guest Editors' Introduction: Proceedings of the 21st Symposium on High Performance Chips (Hot Chips 21), Stanford, CaliforniaK. Asanovic and R. WittigIEEE Micro, Vol. 30, No. 2, pp. 5-6March 2010Architecture[PDF]

ICSI GazetteMarch 2010ICSI Newsletter[PDF]

Review of J. Nichols and B. Myers, "Creating a Lightweight User Interface Description Language: An Overview and Analysis of the Personal Universal Controller Project"G. FriedlandACM Computing Reviews, CR137773March 2010Speech
Topology-Free Querying of Protein Interaction NetworksS. Bruckner, F. Huffner, R. M. Karp, R. Shamir, and R. SharanJournal of Computational Biology, Vol. 17, Issue 3, pp. 237-252March 2010Algorithms[PDF]

Torque: Topology-Free Querying of Protein Interaction NetworksS. Bruckner, F. Hüffner, R. M. Karp, R. Shamir, and R. SharanJournal of Computational Biology, Vol. 17, Issue 3, pp. 237-252March 2010Algorithms
Language Model Combination and Adaptation Using Weighted Finite State TransducersX. Liu, M. J. F. Gales, J. L. Hieronymus, and P. C. WoodlandProceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Dallas, TexasMarch 2010Speech
Average-Case Analysis of Incremental Topological OrderingD. Ajwani and T. FriedrichDiscrete Applied Mathematics, Vol. 158, Issue 4, pp. 240-250February 2010Algorithms[PDF]

Multi-View Semi-Supervised Learning for Dialog Act Segmentation of SpeechU. Guz, S. Cuendet, G. Tur, and D. Hakkani-TürIEEE Transactions on Audio, Speech and Language Processing, Vol. 18, Issue 2, pp. 320-329February 2010Speech[PDF]

Plateaus Can Be Harder in Multi-Objective OptimizationT. Friedrich, N. Hebbinghaus, and F. NeumannTheoretical Computer Science, Vol. 411, Issue 6, pp. 854-864February 2010Algorithms[PDF]

Botnet Judo: Fighting Spam with ItselfA. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. SavageProceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, CaliforniaFebruary 2010Networking[PDF]

HILTI: An Abstract Execution Environment for High-Performance Network Traffic AnalysisR. Sommer, N. Weaver, and V. PaxsonICSI Technical Report TR-10-003February 2010ICSI Technical Reports[PDF]

Mātārere: A Layered Framework for Specifying Event-Based SystemsA. Voisard and H. ZiekowICSI Technical Report TR-10-002February 2010ICSI Technical Reports[PDF]

Pages