Publications

Found 296 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is P  [Clear All Filters]
2008
Anand, A.., Gupta A., Akella A., Seshan S., & Shenker S. J. (2008).  Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. 219-230.
Riedhammer, K., Gillick D., Favre B., & Hakkani-Tür D. (2008).  Packing the Meeting Summarization Knapsack. 2434-2437.
Ellsworth, M., Lee-Goldman R., & Rhodes R. (2008).  A Paradox of English Determination: The Construction of Complex Number Expressions.
Asanović, K., Bodik R., Demmel J., Keaveny T., Keutzer K., Kubiatowicz J. D., et al. (2008).  The Parallel Computing Laboratory at UC Berkeley: A Research Agenda Based on the Berkeley View.
P. Godfrey, B., Shenker S. J., & Stoica I. (2008).  Pathlet Routing. 97-102.
Motlicek, P., Ganapathy S., Hermansky H., Garudadri H., & Athineos M. (2008).  Perceptually Motivated Sub-Band Decomposition for FDLP Audio Coding. 435-442.
Garg, N. P., & Weber I.. (2008).  Personalized, Interactive Tag Recommendation for Flickr. 67-74.
Yeh, T., Lee J. J., & Darrell T. (2008).  Photo-Based Question Answering. 389-398.
Skibola, C. F., Bracci P. M., Halperin E., Nieters A., Hubbard A., Paynter R. A., et al. (2008).  Polymorphisms in the Estrogen Receptor 1 and Vitamin C and Matrix Metalloproteinase Gene Families Are Associated with Susceptibility to Lymphoma. PLoS ONE. 3(7), 
Schryen, G. (2008).  Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. 37-50.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2008).  Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Gürses, S., Rizk R., & Günther O. (2008).  Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
Daskalakis, C., Dimakis A.. G., Karp R. M., & Wainwright M.. J. (2008).  Probabilistic Analysis of Linear Programming Decoding. IEEE Transactions on Information Theory. 54(8), 3565-3578.
Favre, B., Grishman R., Hillard D., Ji H., Hakkani-Tür D., & Ostendorf M. (2008).  Punctuating Speech For Information Extraction. 5013-5016.
2007
Ferrer, L., Shriberg E., Kajarekar S., & Sönmez K. (2007).  Parameterization of Prosodic Feature Distributions for SVM Modeling in Speaker Recognition. Proceedings of International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 233-236.
Allman, M. (2007).  Personal Namespaces. Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
Dutta, P., Culler D. E., & Shenker S. J. (2007).  Procrastination Might Lead to a Longer and More Useful Life. 1-7.
Fung, J., Hakkani-Tür D., Magimai-Doss M., Shriberg E., Cuendet S., & Mirghafori N. (2007).  Prosodic Features and Feature Selection for Multi-lingual Sentence Segmentation. 2585-2588.
2006
Stoll, L. (2006).  Phonetic- and Speaker-Discriminant Features for Speaker Recognition.
Mehta, A., Shenker S. J., & Vazirani V. V. (2006).  Posted Price Profit Maximization for Multicast by Approximating Fixed Points. Journal of Algorithms. 58(2), 150-164.
Perfors, A., Tenenbaum J., & Regier T. (2006).  Poverty of the Stimulus? A Rational Approach. Proceedings of the 28th Annual Conference of the Cognitive Science Society (CogSci 2006).
Ee, C. Tien, Ratnasamy S., & Shenker S. J. (2006).  Practical Data-Centric Storage. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
Cui, W., Paxson V., Weaver N., & Katz R. H. (2006).  Protocol-Independent Adaptive Replay of Application Dialog. Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06).
Anguera, X., Wooters C., & Hernando J. (2006).  Purity Algorithms for Speaker Diarization of Meetings Data. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006).

Pages