Publications

Found 4085 results
Author Title [ Type(Desc)] Year
Conference Paper
Hartman, T., & Sharan R. (2004).  A 1.5-Approximation Algorithm for Sorting by Transpositions and Transversals.
Wooters, C., Mirghafori N., Stolcke A., Pirinen T., Bulyko I., Gelbart D., et al. (2004).  The 2004 ICSI-SRI-UW Meeting Recognition System. 196-208.
Choi, J., Janin A., & Friedland G. (2010).  The 2010 ICSI Video Location Estimation System.
Choi, J., Lei H., & Friedland G. (2011).  The 2011 ICSI Video Location Estimation System.
Reardon, J., Feal Á., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., & Egelman S. (In Press).  50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. Proceedings of the 24th USENIX Security Symposium.
Song, X., Jans C., Landau L., Cvetkovski D., & Fettweis G. (2015).  A 60GHz LOS MIMO Backhaul Design Combining Spatial Multiplexing and Beamforming for a 100Gbps Throughput. 2015 IEEE Global Communications Conference (GLOBECOM). 1-6.
Raghavan, B. (2015).  Abstraction, Indirection, and Sevareid's Law: Towards Benign Computing.
Thom, A.., & Kramer O. (2010).  Acceleration of DBSCAN-Based Clustering with Reduced Neighborhood Evaluations. 195-202.
Faria, A. (2005).  Accent Classification for Speech Recognition. Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005). 285-293.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. (2008).  Accountable Internet Protocol (AIP). 339-350.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2018).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Pasaniuc, B., Zaitlen N., & Halperin E. (2010).  Accurate Estimation of Expression Levels of Homologous Genes in RNA-Seq Experiments. 397-409.
Lakshminarayanan, K., Caesar M., Rangan M., Anderson T., Shenker S., & Stoica I. (2007).  Achieving Convergence-Free Routing Using Failure-Carrying Packets. 241-252.
Graciarena, M., Delplanche M., Shriberg E., Stolcke A., & Ferrer L. (2010).  Acoustic Front-End Optimization for Bird Species Recognition. 293-296.
Wooters, C., & Morgan N. (1992).  Acoustic Sub-word Models in the Berkeley Restaurant Project. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 1551-1554.
Mertens, R., Lei H., Gottlieb L., Friedland G., & Divakaran A. (2011).  Acoustic Super Models for Large Scale Video Event Detection.
Wendelken, C., & Shastri L. (2003).  Acquisition of concepts and causal rules in Shruti. Proceedings of the 25th Annual Conference of the Cognitive Science Society.
Kääriäinen, M. (2005).  On Active Learning in the Non-Realizable Case. Proceedings of the Foundations of Active Learning Workshop at the 19th Annual Conference on Neural Information Processing Systems (NIPS).
Shankar, U., & Paxson V. (2003).  Active Mapping: Resisting NIDS Evasion Without Altering Traffic. Proceedings of the IEEE Symposium on Security and Privacy.
Feldman, J., Lakoff G., & Narayanan S. (2000).  Active Schemas for Generation, Recognition, and Understanding of Action. Proceedings of the First Mirror Neuron Conference.
Gomes, B., Weissman B., & Feldman J. (1998).  Active Threads: Enabling Fine-Grained Parallelism in Object-Oriented Languages. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’98).
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.

Pages