Publications
Found 983 results
Author [ Title![(Asc)](https://icsi.berkeley.edu/icsi/sites/all/modules/biblio/misc/arrow-asc.png)
Filters: First Letter Of Last Name is M [Clear All Filters]
(2007).
Prosodic and Other Long-Term Features for Speaker Diarization.
IEEE Transactions on Audio. 17(5), 985-993.
(2009). A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions.
Proceedings of CHI '19.
(2019). A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions.
Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2019).
(2019).
(2013). Progress in Meeting Recognition: The ICSI-SRI-UW Spring 2004 Evaluation System.
NIST ICASSP 2004 Meeting Recognition Workshop.
(2004).
(2000). Programming Language Optimizations for Modular Router Configurations.
Proceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X).
(2002). Profit Maximizing Multicast Pricing by Approximating Fixed Points (Extended Abstract).
Proceedings of the Fourth ACM Conference on Electronic Commerce (EC '03). 218-219.
(2003). Profiling Underground Merchants Based on Network Behavior.
Proceedings of APWG eCrime 2016.
(2016).
(1992).
(2012). Probability Estimation by Feed-forward Networks in Continuous Speech Recognition.
Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 309-318.
(1991).
(1991). Probabilistic Behavior of a Naive Coloring Algorithm on Random Graphs.
Bulletin of the Operations Research Society of America. 23,
(1975).
(1975). Probabilistic analysis of network flow algorithms.
Mathematics of Operations Research. 18(1), 71-97.
(1993).
(1992).
(2012). Price Behavior and Hurst Exponents of Tick-By-Tick Interbank Foreign Exchange Rates.
Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
(1995).
(1994). Predicting the U.S. Index of Industrial Production.
Proceedings of Parallel Applications in Statistics and Economics '93. 3(6), 791-794.
(1993).
(1999). PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of ACM CCS.
(2016).
(2010).