| "Corpus linguistics" vs. "computer-aided armchair linguistics" | C.J. Fillmore | Directions in Corpus Linguistics: Proceedings from a 1991 Nobel Symposium on Corpus Linguistics. Stockholm: Mouton de Gruyter, pp. 35-66 | 1991 | AI | |
| "Eigenlips" for Robust Speech Recognition | C. Bregler and Y. Konig | ICSI Technical Report TR-94-002 | January 1994 | ICSI Technical Reports | [PDF]
|
| "It Wont't Happen to Me!": Self-Disclosure in Online Social Networks | H. Krasnova, E. Kolesnikova, and O. Günther | Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, California, paper 343 | August 2009 | Other | [PDF]
|
| "My Child Will be Respected": Parental Perspectives on Computers in Rural India | J. Pal, M. Lakshmanan, and K. Toyama | Proceedings of International Conference on Information Technologies and Development (ICTD2007), IEEE Computer Society/ACM, Bangalore, India, pp. 168-176 | December 2007 | BCIS (archived) | [PDF]
|
| 1.757 and 1.267-Approximation Algorithms for the Network and Rectilinear Steiner Tree Problems | M. Karpinski and A. Zelikovsky | ICSI Technical Report TR-95-010 | March 1995 | ICSI Technical Reports | [PDF]
|
| @spam: The Underground on 140 Characters or Less | C. Grier, K. Thomas, V. Paxson, and M. Zhang | Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37 | October 2010 | Networking | [PDF]
|
| A (Somewhat) New Solution to the Binding Problem | L. Barrett, J. Feldman, and L. M. Dermed | ICSI Technical Report TR-06-001 | May 2006 | ICSI Technical Reports | [PDF]
|
| A (Somewhat) New Solution to the Binding Problem | L. Barrett, J. Feldman, and L. Mac Dermed | Neural Computation, Vol. 20, Issue 9, pp. 2361-2378 (previously published as ICSI Technical Report in 2006) | September 2008 | AI | [PDF]
|
| A 1.5-Approximation Algorithm for Sorting by Transpositions and Transversals | T. Hartman and R. Sharan | Proceedings of WABI | September 05 2004 | Algorithms | |
| A Best-Fit Approach to Productive Omission of Arguments | E. Mok and J. Bryant | The 32nd Annual Meeting of the Berkeley Linguistics Society, Berkeley, California | February 2006 | AI | [PDF]
|
| A BGP-Based Mechanism for Lowest-Cost Routing | J. Feigenbaum, C.H. Papadimitriou, R. Sami, and S. Shenker | Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC 2002), Monterey, California, pp. 173-182. | July 2002 | Networking | [PDF]
|
| A Biological Grounding of Recruitment Learning and Vicinal Algorithms | L. Shastri | ICSI Technical Report TR-99-009 | April 1999 | ICSI Technical Reports | [PDF]
|
| A Branch and Cut Algorithm for the Optimal Solution of the Side Chain Placement Problem | E. Althaus, O. Kohlbacher, H.P. Lenhof, and P. Muller | Technical Report Vol.2000-1-001, Max-Planck-Institut fur Informatik: Foschungsbericht, 2000. | 2000 | Algorithms | |
| A Brief History of Scanning | M. Allman, V. Paxson, and J. Terrell | Proceedings of ACM SIGCOMM Conference on Internet Measurement, San Diego, California, pp. 77-82 | October 2007 | Networking | [PDF]
|
| A Brief History of the Association for Women in Mathematics: The Presidents' Perspectives | L. Blum | ICSI Technical Report TR-91-037 | June 1991 | ICSI Technical Reports | [PDF]
|
| A Can of RASTA Worms | H. Hermansky and N. Morgan | Proceedings of the Speech Research Symposium XIII, Johns Hopkins University, Balitmore, Maryland, pp. 343-350 | 1993 | Speech | |
| A Case for FAME: FPGA Architecture Model Execution | Z. Tan, A. Waterman, H. Cook, S. Bird, K. Asanović, and D. Patterson | Proceedings of the 37th International Symposium on Computer Architecture (ISCA 2010), Saint-Malo, France, pp. 290-301 | June 2010 | Architecture | [PDF]
|
| A Case Study in Building Layered DHT Applications | Y. Chawathe, S. Ramabhadran, S. Ratnasamy, A. LaMarca, S. Shenker, J. Hellerstein | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 97-108 | August 2005 | Networking | [PDF]
|
| A case study of SHRUTI | L. Shastri and D.J. Grannes | In Noetica: Open Forum, Vol. 2, Issue 7 | 1996 | AI | |
| A Category-Level 3-D Object Dataset: Putting the Kinect to Work | A. Janoch, S. Karayev, Y. Jia, J. Y. Barron, M. Fritz, K. Saenko, and T. Darrell | Proceedings of the First IEEE Workshop on Consumer Depth Cameras for Computer Vision at the International Conference on Computer Vision (ICCV), Barcelona, Spain, pp. 1168-1174 | November 2011 | Vision | [PDF]
|
| A Characterization of Multi-Party Interactive Multimedia Applications | C. Szyperski and G. Ventre | ICSI Technical Report TR-93-006 | January 1993 | ICSI Technical Reports | [PDF]
|
| A Characterization of Rational Amalgamation Operations | V.Cutello and J. Montero | ICSI Technical Report TR-92-033 | May 1992 | ICSI Technical Reports | [PDF]
|
| A Characterization of Space Complexity Cases and Subexponential Time Classesas Limiting Polynomially Decidable Sets | G. Ausiello, M. Protasi, and M. Angelaccio | ICSI Technical Report TR-91-046 | August 1991 | ICSI Technical Reports | [PDF]
|
| A Characterization of the Minimum Cycle Mean in a Digraph | R. M. Karp | Discrete Mathematics (Netherlands), Vol. 23, No. 3, pp. 309-11 | September 1978 | Algorithms | |
| A Cognitive Model of Scales | S. Narayanan | To appear in the proceedings of the 12th International Cognitive Linguistics Conference (ICLC), Edmonton, Canada | June 2013 | AI | |
| A Cognitive Model of Sentence Interpretation: the Construction Grammar Approach | D. Jurafsky | ICSI Technical Report TR-93-077 | December 1993 | ICSI Technical Reports | [PDF]
|
| A Cognitive Off-line Model for Motor Interpretation of Handwritten Words | C. M. Privitera | ICSI Technical Report TR-95-037 | August 1995 | ICSI Technical Reports | [PDF]
|
| A Combinatorial Approach to Protein Docking with Flexible Side-Chains | E. Althaus, O. Kohlbacher, H.P. Lenhof, and P. Muller | Proceedings of the Fourth Annual International conference on Computational Molecular Biology (RECOMB-00), Tokyo, Japan, 2000. | 2000 | Algorithms | |
| A Combined Analytical and Search-Based Approach for the Inductive Synthesis of Functional Programs | E. Kitzelmann | Künstliche Intelligenz, Vol. 25, No. 2, pp. 179-182. Extended abstract of PhD thesis. Also in Ausgezeichnete Informatikdissertationen as "Ein kombinierter analytischer und suchbasierter Ansatz zur induktiven Synthese funktionaler Programme" (Extended abstract in German) | May 2011 | AI | [PDF]
|
| A Combined BIT and TIMESTAMP Algorithm for the List Update Problem | S. Albers, B. von Stengel, and R. Werchner | ICSI Technical Report TR-95-016 | April 1995 | ICSI Technical Reports | [PDF]
|
| A Comparative Large Scale Study of MLP Features for Mandarin ASR | F. Valente, M. Magimai Doss, C. Plahl, S. Ravuri, and W. Wang | Proceedings of the 11th International Conference of the International Speech Communication Association (Interspeech 2010), Makuhari, Japan, pp. 2630-2363 | September 2010 | Speech | [PDF]
|
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | IEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482 | June 05 2004 | Networking | |
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | Proceedings of the IEEE Infocom 2001, Anchorage, Alaska, USA, April 22-26, 2001. | April 22 2001 | Networking | |
| A Comparison of Approaches for Modeling Prosodic Features in Speaker Recognition | L. Ferrer, N. Scheffer, and E. Shriberg | Proceedings of the 35th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, Texas, pp. 4414-4417 | March 2010 | Speech | [PDF]
|
| A Comparison of Data-Derived and Knowledge-Based Modeling of Pronunciation Variation | M. Wester and E.Fosler-Lussier | Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000), Beijing, China | October 2000 | Speech | [PDF]
|
| A Comparison of Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, P. Radoslavov, and R. Govindan | Computer Science Department, University of Southern California Technical Report No. 01-751, Los Angeles, California | July 2001 | Networking | [PDF]
|
| A Comparison of Phasing Algorithms for Trios and Unrelated Individuals | J. Marchini, D. Cutler, N. Patterson, M. Stephens, E. Eskin, E. Halperin, S. Lin, S. Qin, G. Abecassis, H. Munro, and P. Donnelly | American Journal of Human Genetics, Vol. 78, Issue 3, pp. 437-450 | March 2006 | Algorithms | |
| A Comparison of Premotor Areas Activated by Action Observation and Action Phrases | L. Aziz-Zadeh, S. M. Wilson, and M. Iacoboni | Society for Neuroscience Abstract Viewer/Itinerary Planner, Program No. 852.14 | November 2005 | AI | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | Computer Networks, 42(2) | June 2003 | Networking | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | ACM SIGCOMM Student Poster Session, August 2002. | August 2002 | Networking | |
| A Comparison of Single- and Multi-Objective Programming Approaches to Problems with Multiple Design Objectives | S. Yaman and C.-H. Lee | Journal of Signal Processing Systems, MLSP special issue | November 2008 | Speech | [PDF]
|
| A Comparison of the AES Candidates Amenability to FPGA Implementation | N. Weaver and J. Wawrzynek | The Third Advanced Encryption Standard (AES) Candidate Conference, 2000. | 2000 | Networking | |
| A Comparison of Tight Generalization Error Bounds | M. Kaariainen and J. Langford | Proceedings of the 22nd International Conference on Machine Learning (ICML 2005), Bonn, Germany, pp. 409-416 | August 2005 | Algorithms | |
| A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors | G. Schryen | Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (IMF 2009), Stuttgart, Germany, pp. 153-168 | September 2009 | Networking | [PDF]
|
| A computational model of attachment secure responses in the Strange Situation | A. Amengual | TR-09-002 | March 2009 | ICSI Technical Reports | |
| A computational model of comprehension-based construction acquisition | N. Chang | Child Language Research Forum, Stanford University | May 2004 | AI | [PDF]
|
| A computational model of episodic memory formation in the hippocampal system | L. Shastri | Neurocomputing, Vol. 38-40, pp. 889-897 | 2001 | AI | |
| A Computational Model of Human Blood Clotting: Simulation, Analysis, Control, and Validation | J. Makin | UC Berkeley dissertation | December 2008 | AI | [PDF]
|
| A Computational Model of Tractable Reasoning -- Taking Inspiration from Cognition | L. Shastri | Proceedings of the 13th International Joint Conference on Artificial Intelligence (IJCAI 93), France, pp. 202-207 | 1993 | Algorithms | |
| A Computationally Efficient Abstraction of Long-term Potentiation | L. Shastri | Neurocomputing, Vol. 44-46, pp. 33-41 | June 2002 | AI | [PDF]
|