Publications

Found 1886 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
2010
Neumann, F., Sudholt D., & Witt C. (2010).  A Few Ants Are Enough: ACO with Iteration-Best Update. 63-70.
Satopaa, V.., Albrecht J., Irwin D., & Raghavan B. (2010).  Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System Behavior.
Maier, G., Schneider F., & Feldmann A. (2010).  A First Look at Mobile Hand-held Device Traffic. 161-170.
Salzmann, M., Ek C. Henrik, Urtasun R., & Darrell T. (2010).  FOLS: Factorized Orthogonal Latent Spaces.
Sudholt, D. (2010).  General Lower Bounds for the Running Time of Evolutionary Algorithms. 124-133.
Lässig, J., & Sudholt D. (2010).  General Scheme for Analyzing Running Times of Parallel Evolutionary Algorithms. 234-243.
Pasaniuc, B., Avinery R.., Gur T., Skibola C. F., Bracci P. M., & Halperin E. (2010).  A Generic Coalescent-Based Framework for the Selection of a Reference Panel for Imputation. Genetic Epidemiology. 34(8), 773-782.
Srivas, R., Hannum G., Guénolé A., van Attikum H., Krogan N. J., Karp R. M., et al. (2010).  Genome-Wide Association Data Reveal a Global Map of Genetic Interactions among Protein Complexes.
Conde, L., Halperin E., Akers N.. K., Brown K. M., Smedby K.. E., & Rothman N.. (2010).  Genome-Wide Association Study of Follicular Lymphoma Identifies a Risk Locus at 6p21.32. Nature Genetics. 42(8), 661-664.
Sankararaman, S., Obozinski G., Jordan M. I., & Halperin E. (2010).  Genomic Privacy and Limits of Individual Detection in a Pool.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Stoll, L., & Doddington G. (2010).  Hunting for Wolves in Speaker Recognition. 159-164.
Staff, ICSI. (2010).  ICSI Annual Report 2010.
Stolcke, A., Akbacak M., Ferrer L., Kajarekar S., Richey C., Scheffer N., et al. (2010).  Improving Language Recognition with Multilingual Phone Recognition and Speaker Adaptation Transforms. 256-262.
Stolcke, A., Akbacak M., Ferrer L., Kajarekar S., Richey C., Scheffer N., et al. (2010).  Improving Language Recognition with Multilingual Phone Recognition and Speaker Adaptation Transforms. 256-262.
Stolcke, A., Akbacak M., Ferrer L., Kajarekar S., Richey C., Scheffer N., et al. (2010).  Improving Language Recognition with Multilingual Phone Recognition and Speaker Adaptation Transforms. 256-262.
P. Godfrey, B., Schapira M., Zohar A.., & Shenker S. J. (2010).  Incentive Compatibility and Dynamics of Congestion Control. ACM SIGMETRICS Performance Evaluation Review. 36(1), 95-106.
P. Godfrey, B., Schapira M., Zohar A.., & Shenker S. J. (2010).  Incentive Compatibility and Dynamics of Congestion Control. ACM SIGMETRICS Performance Evaluation Review. 36(1), 95-106.
Cho, C.. Y., Caballero J., Grier C., Paxson V., & Song D. (2010).  Insights from the Inside: A View of Botnet Management from Infiltration.
Hunold, S., Hoffmann R.., & Suter F.. (2010).  Jedule: A Tool for Visualizing Schedules of Parallel Applications. 169-178.
Satzger, B., & Kramer O. (2010).  Learning Heuristic Functions for State-Space Planing. Proceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010).
C. Christoudias, M., Urtasun R., Salzmann M., & Darrell T. (2010).  Learning to Recognize Objects from Unseen Modalities. 677-691.
Stolcke, A., Friedland G., & Imseng D. (2010).  Leveraging Speaker Diarization for Meeting Recognition from Distant Microphones. 4390-4393.
Kramer, O., Satzger B., & Lässig J. (2010).  Managing Energy in a Virtual Power Plant Using Learning Classifier Systems.

Pages