Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2012
Baran, Y., Pasaniuc B., Sankararaman S., Torgerson D. G., Gignoux C., Eng C., et al. (2012).  Fast and Accurate Inference of Local Ancestry in Latino Populations. Bioinformatics. 28(10), 1359-1367.
Zaharia, M., Chowdhury M., Das T., Dave A., Ma J., McCauley M., et al. (2012).  Fast and Interactive Analytics Over Hadoop Data with Spark. USENIX ;login:. 34(4), 45-51.
Dhawan, M.., Samuel J.., Teixeira R., Kreibich C., Allman M., Weaver N., et al. (2012).  Fathom: A Browser-based Network Measurement Platform.
Stern, R. M., & Morgan N. (2012).  Features Based on Auditory Physiology and Perception. 193-227.
Sargent, M., Stack B., Dooner T., & Allman M. (2012).  A First Look at 1 Gbps Fiber-To-The-Home Traffic.
Fillmore, C. J., Lee-Goldman R., & Rhodes R. (2012).  The FrameNet Constructicon.
Pieraccini, R. (2012).  From AUDREY to Siri: Is Speech Recognition A Solved Problem?.
Xiong, Y., Saenko K., Darrell T., & Zickler T. (2012).  From Pixels to Physics: Probabilistic Color De-rendering.
Miller, S., van den Berg J., Fritz M., Darrell T., Goldberg K., & Abbeel P. (2012).  A Geometric Approach to Robotic Laundry Folding. International Journal of Robotics Research. 31(2), 249-267.
Lee, J. W., Ng M. Cheuk, & Asanović K. (2012).  Globally-Synchronized Frames for Guaranteed Quality-of-Service in On-Chip Networks. Journal of Parallel and Distributed Computing. 72(11), 1401-1411.
Maas, M., Reames P., Morlan J., Asanović K., Joseph A. D., & Kubiatowicz J. D. (2012).  GPUs: An Opportunity for Offloading Garbage Collection.
Efros, A., & Halperin E. (2012).  Haplotype Reconstruction Using Perfect Phylogeny and Sequence Data. 13,
Stern, R. M., & Morgan N. (2012).  Hearing is Believing: Biologically-Inspired Feature Extraction for Robust Automatic Speech Recognition. Signal Processing Magazine. 29(6), 34-43.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Duan, H., Weaver N., Zhao Z., Hu M., Liang J., Jiang J., et al. (2012).  Hold-On: Protecting Against On-Path DNS Poisoning.
Meyer, B. T., Spille C., Kollmeier B., & Morgan N. (2012).  Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition.
Huang, P-S., Mertens R., Divakaran A., Friedland G., & Hasegawa-Johnson M. (2012).  How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection. 505-508.
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S. J., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Staff, ICSI. (2012).  ICSI Annual Report 2012.
[Anonymous] (2012).  ICSI Gazette.
[Anonymous] (2012).  ICSI Gazette.
Friedland, G., Janin A., Imseng D., Anguera X., Gottlieb L., Huijbregts M., et al. (2012).  The ICSI RT-09 Speaker Diarization System. IEEE Transactions on Audio. 20(2), 371-381.
Kirchner, M., & Ghosal D. (2012).  Information Hiding.
Raghavan, B., Irwin D., Albrecht J., Ma J., & Streed A. (2012).  An Intermittent Energy Internet Architecture.
Sag, I. A., Boas H. C., & Kay P. (2012).  Introducing Sign-Based Construction Grammar. 1-28.

Pages