| Towards a Frame-Based Organization of the Lexicon: The Semantics of RISK and Its Neighbors | C. J. Fillmore and B. T. S. Atkins | In Frames, Fields, and Contrast: New Essays in Semantics and Lexical Organization, A. Lehrer and E. Kittay, eds., pp. 75-102, Lawrence Erlbaum Associates | 1992 | AI | [PDF]
|
| A Frames Approach to Semantic Analysis | C. J. Fillmore and C. F. Baker | In The Oxford Handbook of Linguistic Analysis, B. Heine and H. Narrog, eds., pp. 313-340, Oxford University Press | 2009 | AI | [PDF]
|
| The FrameNet Database and Software Tools | C. J. Fillmore, C. F. Baker, and H. Sato | Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002), Las Palmas, Spain, pp. 1157-1160 | May 2002 | AI | [PDF]
|
| FrameNet as a "Net" | C. J. Fillmore, C. F. Baker, and H. Sato | Proceedings of the Fourth International Conference on Language Resources and Evaluation (LREC 2004), Lisbon, Portugal, pp. 1091-1094 | May 2004 | AI | [PDF]
|
| The FrameNet Constructicon | C. J. Fillmore, R. R. Lee-Goldman, and R. Rhomieux | In Sign-Based Construction Grammar, H. C. Boas and I. A. Sag, eds., Center for the Study of Language and Information | 2012 | AI | [PDF]
|
| An Investigation Into Fault Recovery in Guaranteed Performance Service Connections | C. J. Parris and A. Banerjea | ICSI Technical Report TR-93-054 | October 1993 | ICSI Technical Reports | [PDF]
|
| A Resource Based Pricing Policy for Real-Time Channels in a Packet-Switching Network | C. J. Parris and D. Ferrari | ICSI Technical Report TR-92-018 | March 1992 | ICSI Technical Reports | [PDF]
|
| A Framework for the Study of Pricing in Integrated Networks | C. J. Parris, S. Keshav, and D. Ferrari | ICSI Technical Report TR-92-016 | March 1992 | ICSI Technical Reports | [PDF]
|
| Spamalytics: An Empirical Analysis of Spam Marketing Conversion | C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009 | October 2008 | Networking | [PDF]
|
| Show Me the Money: Characterizing Spam-Advertised Revenue | C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. Savage | Proceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| Parsing Neural Networks Combining Symbolic and Connectionist Approaches | C. Kemke | ICSI Technical Report TR-94-021 | May 1994 | ICSI Technical Reports | [PDF]
|
| Matchings in Lattice Graphs (Preliminary Version) | C. Kenyon, D. Randall, and A. Sinclair | ICSI Technical Report TR-93-019 | March 1993 | ICSI Technical Reports | [PDF]
|
| Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity | C. Kreibich | Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118 | April 2005 | Networking | [PDF]
|
| Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany | C. Kreibich and M. Jahnke, eds. | Springer | 2010 | Networking | |
| Policy-Controlled Event Management for Distributed Intrusion Detection | C. Kreibich and R. Sommer | Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391 | June 2005 | Networking | [PDF]
|
| On the Spam Campaign Trail | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, California | April 2008 | Networking | [PDF]
|
| Spamcraft: An Inside Look At Spam Campaign Orchestration | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, Massachusetts | April 2009 | Networking | [PDF]
|
| Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance | C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson | ICSI Technical Report TR-10-006 | May 2010 | ICSI Technical Reports | [PDF]
|
| Netalyzr: Illuminating The Edge Network | C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson | Proceedings of the Internet Measurement Conference (IMC 2010), Melbourne, Australia, pp. 246-259 | November 2010 | Networking | [PDF]
|
| GQ: Practical Containment for Measuring Modern Malware Systems | C. Kreibich, N. Weaver, C. Kanich, W. Cui, and V. Paxson | ICSI Technical Report TR-11-002 | May 2011 | ICSI Technical Reports | [PDF]
|
| GQ: Practical Containment for Measuring Modern Malware Systems | C. Kreibich, N. Weaver, C. Kanich, W. Cui, V. Paxson | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002. | November 2011 | Networking | |
| Experiences from Netalyzr with Engaging Users in End-System Measurement | C. Kreibich, N. Weaver, G. Maier, B. Nechaev, and V. Paxson | Proceedings of ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), pp. 25-30, Toronto, Canada. | August 2011 | Networking | [PDF]
|
| Approximation Algorithms for Data Management in Networks | C. Krick, H. Racke, and M. Westermann | Proceedings of the Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA) pp. 237-246, 2001. | 2001 | Algorithms | |
| Approximation Algorithms for Data Management in Networks | C. Krick, H. Racke, and M. Westermann | Theory of Computing Systems, 2001. | 2001 | Algorithms | |
| Hierarchical Encoding of MPEG Sequences Using Priority Encoding Transmission (PET) | C. Leicher | ICSI Technical Report TR-94-058 | November 1994 | ICSI Technical Reports | [PDF]
|
| CPU Accounting for Multicore Processors | C. Luque, M. Moretó, F. J. Cazorla, R. Gioiosa, A. Buyuktosunoglu, and M. Valero | IEEE Transactions on Computers. Vol. 61, Issue 2 | February 2012 | Architecture | |
| Co-Training with Noisy Perceptual Observations | C. M. Christoudias, R. Urtasun, A. Kapoor and T. Darrell | Presented at the Learning Workshop (Snowbird), Clearwater, Florida | April 2009 | Vision | [PDF]
|
| Co-Training with Noisy Perceptual Observations | C. M. Christoudias, R. Urtasun, A. Kapoor, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Miami, Florida, pp. 2844-2851 | June 2009 | Vision | [PDF]
|
| Multi-View Learning in the Presence of View Disagreement | C. M. Christoudias, R. Urtasun, and T. Darrell | Proceedings of Conference on Uncertainty in Artificial Intelligence (UAI), Helsinki, Finland | July 2008 | Vision | [PDF]
|
| Unsupervised Feature Selection via Distributed Coding for Multi-view Object Recognition | C. M. Christoudias, R. Urtasun, and T. Darrell | Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Anchorage, Alaska | June 2008 | Vision | [PDF]
|
| Positional Logic Algebra - PLA - A Fascinating Alternative Approach | C. M. Hamann and L. Chtcherbanski | ICSI Technical Report TR-97-039 | September 1997 | ICSI Technical Reports | [PDF]
|
| Protocols for Providing Performance Guarantees in a Packet Switching Internet | C. M. Lowery | ICSI Technical Report TR-91-002 | January 1991 | ICSI Technical Reports | [PDF]
|
| A Cognitive Off-line Model for Motor Interpretation of Handwritten Words | C. M. Privitera | ICSI Technical Report TR-95-037 | August 1995 | ICSI Technical Reports | [PDF]
|
| Detecting and Analyzing Automated Activity on Twitter | C. M. Zhang and V. Paxson | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Active Learning Under Arbitrary Distributions | C. Monteleoni and M. Kaariainen | Poster at the Value of Information in Inference, Learning, and Decision-Making Workshop at the 19th Annual Conference on Neural Information Processing Systems (NIPS), Vancouver, Canada | December 2005 | Algorithms | |
| Combining Short-term Cepstral and Long-term Pitch Features for Automatic Recognition of Speaker Age | C. Müller and F. Burkhardt | Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007), Antwerp, Belgium, pp. 2277-2280 | August 2007 | Speech | |
| Multimodal Interfaces for Automotive Applications (MIAA) | C. Müller and G. Friedland | Proceedings of the ACM International Conference on Intelligent User Interfaces (IUI 2009), Sanibel, Florida, pp. 493-494 | February 2009 | Speech | |
| Speech-Overlapped Acoustic Event Detection for Automotive Applications | C. Müller, J. I. Biel, E. Kim, and D. Rosario | Proceedings of the Annual Conference of the International Speech Communication Association (Interspeech 2008), Brisbane, Australia, pp. 2590-2593 | September 2008 | Speech | [PDF]
|
| Using Strongly Typed Networking to Architect for Tussle | C. Muthukrishnan, V. Paxson, M. Allman, and A. Akella | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9 | October 2010 | Networking | [PDF]
|
| Recognition of Handwritten Digits and Human Faces by Convolutional Neural Networks | C. Neubauer | ICSI Technical Report TR-96-058 | December 1996 | ICSI Technical Reports | [PDF]
|
| Parallel Training of a Multi-Layer Perceptron on a GPU | C. Oei, G. Friedland, and A. Janin | ICSI Technical Report TR-09-008 | October 2009 | ICSI Technical Reports | [PDF]
|
| Block Korkin-Zolotarev Bases and Successive Minima | C. P. Schnorr | ICSI Technical Report tr-92-063 | September 1992 | ICSI Technical Reports | [PDF]
|
| Black Box Cryptanalysis of Hash Networks Based on Multipermutations | C. P. Schnorr and S. Vaudenay | ICSI Technical Report TR-94-017 | April 1994 | ICSI Technical Reports | [PDF]
|
| A Dynamic Connection Management Scheme for Guaranteed Performance Services in Packet-Switching Integrated Services Networks | C. Parris and D. Ferrari | ICSI Technical Report TR-93-005 | January 1993 | ICSI Technical Reports | [PDF]
|
| Graceful Adaptation of Guaranteed Performance Service Connections | C. Parris, G. Ventre, and H. Zhang | ICSI Technical Report TR-93-011 | March 1993 | ICSI Technical Reports | [PDF]
|
| A Mechanism for Dynamic Re-routing of Real-time Channels | C. Parris, H. Zhang, and D. Ferrari | ICSI Technical Report TR-92-053 | August 1992 | ICSI Technical Reports | [PDF]
|
| A Swifter Start for TCP | C. Partridge, D. Rockwell, M. Allman, R. Krishnan, and J.P.G. Sterbenz | Technical Report No. 8339, BBN Technologies, March 2002 | March 2002 | Networking | |
| Report of the NSF Scalable Information Infrastructure Workshop | C. Partridge, et al. | | October 07 1998 | Networking | |
| The Internet Under Crisis Conditions: Learning From September 11 | C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. Briscoe | Computer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC | 2002 | Networking | [PDF]
|
| Automatic Data Selection for MLP-Based Feature Extraction for ASR | C. Pelaez-Moreno, Q. Zhu, B. Chen, and N. Morgan | Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005), Lisboa, Portugal, pp. 229-232 | September 2005 | Speech | [PDF]
|