Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2013
Morgan, N., Cohen J., Parthasarathi S. Hari Krish, Chang S-Y., & Wegmann S. (2013).  Final Report: OUCH Project (Outing Unfortunate Characteristics of HMMs).
Beverly, R., & Allman M. (2013).  Findings and Implications from Data Mining the IMC Review Process. ACM SIGCOMM Computer Communication Review. 3(1), 23-29.
Marquis-Boire, M., Marczak B., Guarnieri C., & Scott-Railton J. (2013).  For Their Eyes Only: The Commercialization of Digital Spying. The Citizen Lab.
Krishnamoorthy, N., Malkarnenkar G., Mooney R., Saenko K., & Guadarrama S. (2013).  Generating Natural-Language Video Descriptions Using Text-Mined Knowledge.
de Melo, G., & Bansal M. (2013).  Good, Great, Excellent: Global Inference of Lexical Intensities.
de Melo, G., & Bansal M. (2013).  Good, Great, Excellent: Global Inference of Lexical Intensities. Transactions of the Association for Computational Linguistics. 279-290.
Guadarrama, S., Riano L., Golland D., Göhring D., Jia Y., Klein D., et al. (2013).  Grounding Spatial Relations for Human-Robot Interaction.
Cook, H., Moretó M., Bird S., Dao K., Patterson D., & Asanović K. (2013).  A Hardware Evaluation of Cache Partitioning to Improve Utilization and Energy-Efficiency while Preserving Responsiveness.
Akhawe, D., Amann J., Vallentin M., & Sommer R. (2013).  Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web.
Maire, M., Yu S. X., & Perona P. (2013).  Hierarchical Scene Annotation.
Bhattacharya, A. A., Culler D. E., Friedman E., Ghodsi A., Shenker S. J., & Stoica I. (2013).  Hierarchical Scheduling for Diverse Datacenter Workloads.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Makin, J., & Narayanan S. (2013).  A Hybrid-System Model of the Coagulation Cascade. 206-212.
Staff, ICSI. (2013).  ICSI Annual Report 2013.
[Anonymous] (2013).  ICSI Gazette.
Gymrek, M., McGuire A. L., Golan D., Halperin E., & Erlich Y. (2013).  Identifying Personal Genomes by Surname Inference. Science. 339(6117), 321-324.
Kirchner, M., Winkler P., & Farid H. (2013).  Impeding Forgers at Photo Inception.
Chang, S-Y., & Morgan N. (2013).  Informative Spectro-Temporal Bottleneck Features for Noise-Robust Speech Recognition.
Jegelka, S., Kapoor A., & Horvitz E. (2013).  An Interactive Approach to Solving Correspondence Problems. International Journal of Computer Vision.
Elizalde, B. Martinez, Lei H., & Friedland G. (2013).  An I-Vector Representation of Acoustic Environments for Audio-Based Video Event Detection on User Generated Content. 114-117.
Goga, O., Perito D., Lei H., Teixeira R., & Sommer R. (2013).  Large-scale Correlation of Accounts Across Social Networks.
Jia, Y., & Darrell T. (2013).  Latent Task Adaptation with Large-Scale Hierarchies.
Fayazbakhsh, S. Kaveh, Lin Y., Tootoonchian A., Ghodsi A., Koponen T., Maggs B. M., et al. (2013).  Less Pain, Most of the Gain: Incrementally Deployable ICN. 147-158.
Heller, B., Scott C., McKeown N., Shenker S. J., Wundsam A., Zeng H., et al. (2013).  Leveraging SDN Layering to Systematically Troubleshoot Networks.

Pages