Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2012
Choi, J., Ekambaram V., Friedland G., & Ramchandran K. (2012).  The 2012 ICSI/Berkeley Video Location Estimation System.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Yu, S. X. (2012).  Angular Embedding: A Robust Quadratic Criterion. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE. 34(1), 158-173.
Black, A. W., H. Bunnell T., Dou Y., Kumar P., Metze F., Perry D., et al. (2012).  Articulatory Features for Expressive Speech Synthesis.
Friedman, E. (2012).  Asymmetric Cost Sharing Mechanisms. Games and Economic Behavior. 75(1), 139-151.
Peters, N., Lossius T., & Place T. (2012).  An Automated Testing Suite for Computer Music Environments.
Freytag, A., Rodner E., Bodesheim P., & Denzler J. (2012).  Beyond Classification -- Large-Scale Gaussian Process Inference and Uncertainty Prediction.
Jia, Y., Huang C., & Darrell T. (2012).  Beyond Spatial Pyramids: Receptive Field Learning for Pooled Image Features. 3370-3377.
Halvorson, T., Szurdi J., Maier G., Felegyhazi M., Kreibich C., Weaver N., et al. (2012).  The BIZ Top-Level Domain: Ten Years Later.
Feigenbaum, J., P. Godfrey B., Panda A., Schapira M., Shenker S. J., & Singla A. (2012).  Brief Announcement: On the Resilience of Routing Tables. 237-238.
Bell, O., Allman M., & Kuperman B. (2012).  On Browser-Level Event Logging.
Shue, C., Kalafut A., Allman M., & Taylor C. (2012).  On Building Inexpensive Network Capabilities. ACM SIGCOMM Computer Communication Review. 42(2), 72-79.
Oliner, A. J., Iyer A. P., Lagerspetz E., Stoica I., & Tarkoma S. (2012).  Carat: Collaborative Energy Bug Detection.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Kay, P., & Sag I. A. (2012).  Cleaning up the Big Mess: Discontinuous Dependencies and Complex Determiners.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Wang, Z., Hormozdiari F., Yang W-Y., Halperin E., & Eskin E. (2012).  CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping. 326-340.
Slager, S.. L., Skibola C. F., & Halperin E. (2012).  Common Variation at 6p21.31 (BAK1) Influences the Risk of Chronic Lymphocytic Leukemia. Blood. 120(4), 843-846.
Kirkpatrick, B., Reshef Y., Finucane H., Jiang H., Zhu B., & Karp R. M. (2012).  Comparing Pedigree Graphs. Journal of Computational Biology. 19(9), 998-1014.
Lönneker-Rodman, B., & Narayanan S. (2012).  Computational Models of Figurative Language.
de Melo, G., & Weikum G. (2012).  Constructing and Utilizing Wordnets using Statistical Methods. Journal of Language Resources and Evaluation. 46(2), 287-311.
Janin, A., Friedland G., & Sommer R. (2012).  Content?based Privacy for Consumer?Produced Multimedia.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Tootoonchian, A., Gorbunov S., Ganjali Y., Casado M., & Sherwood R. (2012).  On Controller Performance in Software-Defined Networks.
Bansal, M., & Klein D. (2012).  Coreference Semantics from Web Features.

Pages