Publications

Found 4258 results
Author Title Type [ Year(Desc)]
2005
Balakrishnan, H., Shenker S. J., & Walfish M. (2005).  Peering Peer-to-Peer Providers. Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05). 104-114.
Cohen, E., Halperin E., & Kaplan H.. (2005).  Performance Aspects of Distributed Caches Using TTL-Based Consistency. Theoretical Computer Science. 331(1), 73-96.
Kim, Y-J., Govindan R., Karp B., & Shenker S. J. (2005).  On the Pitfalls of Geographic Face Routing. Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing. 34-43.
Kreibich, C., & Sommer R. (2005).  Policy-Controlled Event Management for Distributed Intrusion Detection. Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
Adler, I., Ahn H-S., Karp R. M., & Ross S. M. (2005).  A Probabilistic Model for the Survivability of Cells. Journal of Applied Probability. 42(4), 919-931.
Morgan, N., Zhu Q., Stolcke A., Sönmez K., Sivadas S., Shinozaki T., et al. (2005).  Pushing the Envelope - Aside. IEEE Signal Processing Magazine. 22(5), 81-88.
Boulis, C., & Ostendorf M. (2005).  A Quantitative Analysis of Lexical Differences Between Genders in Telephone Conversations. Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics (ACL 2005). 435-442.
Gómez-Skarmeta, A., & Ruiz P. M. (2005).  Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM. Proceedings of the V Jornadas de Ingenieria Telematica.
Subramanian, L., Katz R. H., Roth V., Shenker S. J., & Stoica I. (2005).  Reliable Broadcast in Unknown Fixed-Identity Networks. Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005). 342-351.
Karp, R. M. (2005).  Report of the SIGACT Committee on funding for Theoretical Computer Science.
Anguera, X., Wooters C., Peskin B., & Aguilo M. (2005).  Robust Speaker Segmentation for Meetings: The ICSI-SRI Spring 2005 Diarization System. Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005). 402-414.
Dharmapurikar, S., & Paxson V. (2005).  Robust TCP Reassembly in the Presence of Adversaries. Proceedings of the 14th Conference on USENIX Security Symposium (Security '05). 65-80.
Boulis, C., Kahn J. G., & Ostendorf M. (2005).  The Role of Disfluencies on Topic Classification of Human-Human Conversations. Proceedings of the Spoken Language Understanding Workshop Program at the 20th National Conference on Artificial Intelligence (AAAI-05).
Galera, F.. J., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Security Extensions to MMARP Through Cryptographically Generated Addresses. Lecture Notes on Informatics. P-68,
Boas, H. C. (2005).  Semantic Frames as Interlingual representations for Multilingual Lexical Databases. International Journal of Lexicography. 445-478.
Kääriäinen, M. (2005).  Semi-Supervised Model Selection Based on Cross-Validation.
Stafford, S. (2005).  The Sequential GMM: A Gaussian Mixture Model Based Speaker Verification System that Captures Sequential Information.
Kannan, J., Yang B., Shenker S. J., Sharma P., Banerjee S., Basu S., et al. (2005).  Smartseer: Continuous Queries over Citeseer.
Gillick, D., Stafford S., & Peskin B. (2005).  Speaker Detection Without Models. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 757-760.
Anguera, X., Wooters C., & Hernando J. (2005).  Speaker Diarization for Multi-Party Meetings Using Acoustic Fusion. Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2005). 426-461.
Boakye, K. (2005).  Speaker Recogntion in the Text-Independent Domain Using Keyword Hidden Markov Models.
Rayner, M., Hockey B. Ann, Renders J-M., Chatzichrisafis N., & Farrell K. (2005).  Spoken Language Processing in the Clarissa Procedure Browser.
Shriberg, E. (2005).  Spontaneous Speech: How People Really Talk, and Why Engineers Should Care. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 1781-1784.
Good, N., Grossklags J.., Dhamija R.., & Thaw D. (2005).  Stopping Spyware at the Gate: A User Study of Privacy, Notice, and Spyware. Proceedings of the Symposium On Usable Privacy and Security (SOUPS 2005). 43-52.
Liu, Y., Shriberg E., Stolcke A., Peskin B., Ang J., Hillard D., et al. (2005).  Structural Metadata Research in the EARS Program. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 957-960.

Pages