Publications

Found 1886 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
2012
Baran, Y., Pasaniuc B., Sankararaman S., Torgerson D. G., Gignoux C., Eng C., et al. (2012).  Fast and Accurate Inference of Local Ancestry in Latino Populations. Bioinformatics. 28(10), 1359-1367.
Zaharia, M., Chowdhury M., Das T., Dave A., Ma J., McCauley M., et al. (2012).  Fast and Interactive Analytics Over Hadoop Data with Spark. USENIX ;login:. 34(4), 45-51.
Zaharia, M., Chowdhury M., Das T., Dave A., Ma J., McCauley M., et al. (2012).  Fast and Interactive Analytics Over Hadoop Data with Spark. USENIX ;login:. 34(4), 45-51.
Dhawan, M.., Samuel J.., Teixeira R., Kreibich C., Allman M., Weaver N., et al. (2012).  Fathom: A Browser-based Network Measurement Platform.
Stern, R. M., & Morgan N. (2012).  Features Based on Auditory Physiology and Perception. 193-227.
Sargent, M., Stack B., Dooner T., & Allman M. (2012).  A First Look at 1 Gbps Fiber-To-The-Home Traffic.
Sargent, M., Stack B., Dooner T., & Allman M. (2012).  A First Look at 1 Gbps Fiber-To-The-Home Traffic.
Xiong, Y., Saenko K., Darrell T., & Zickler T. (2012).  From Pixels to Physics: Probabilistic Color De-rendering.
Stern, R. M., & Morgan N. (2012).  Hearing is Believing: Biologically-Inspired Feature Extraction for Robust Automatic Speech Recognition. Signal Processing Magazine. 29(6), 34-43.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Meyer, B. T., Spille C., Kollmeier B., & Morgan N. (2012).  Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition.
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S. J., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S. J., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S. J., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Staff, ICSI. (2012).  ICSI Annual Report 2012.
Raghavan, B., Irwin D., Albrecht J., Ma J., & Streed A. (2012).  An Intermittent Energy Internet Architecture.
Sag, I. A., Boas H. C., & Kay P. (2012).  Introducing Sign-Based Construction Grammar. 1-28.
Yu, D., Hinton G., Morgan N., Chien J-T., & Sagayama S. (2012).  Introduction to the Special Section on Deep Learning for Speech and Language Processing. IEEE Transactions on Audio. 20(1), 4-6.
Amann, J., Sommer R., Sharma A., & Hall S. (2012).  A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. 314-333.
Amann, J., Sommer R., Sharma A., & Hall S. (2012).  A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. 314-333.
Raghavan, B., Koponen T., Ghodsi A., Brajkovic V., & Shenker S. J. (2012).  Making the Internet More Evolvable.
Grier, C., Ballard L., Caballero J., Chachra N., Dietrich C. J., Levchenko K., et al. (2012).  Manufacturing Compromise: The Emergence of Exploit-as-a-Service. 821-832.
Rozov, R., Halperin E., & Shamir R. (2012).  MGMR: Leveraging RNA-Seq Population Data to Optimize Expression Estimation. 13,
Haussler, D., Patterson D., Diekhans M., Fox A., Jordan M. I., Joseph A. D., et al. (2012).  A Million Cancer Genome Warehouse.
Haussler, D., Patterson D., Diekhans M., Fox A., Jordan M. I., Joseph A. D., et al. (2012).  A Million Cancer Genome Warehouse.

Pages