Best Paper Awards in Computer Science (since 1996)

By Conference:   AAAI   ACL   CHI   CIKM   CVPR   FOCS   FSE   ICCV   ICML   ICSE   IJCAI   INFOCOM   KDD   MOBICOM   NeurIPS   NSDI   OSDI   PLDI   PODS   S&P   SIGCOMM   SIGIR   SIGMETRICS   SIGMOD   SODA   SOSP   STOC   UIST   VLDB   WWW  

Institutions with the most Best Papers

Much of this data was entered by hand (obtained by contacting past conference organizers, retrieving cached conference websites, and searching CVs) so please email me if you notice any errors or omissions: bestpaper-AT-jeffhuang.com. I (Jeff Huang) tried to collect best paper awards from the top-tier conferences in each area, but some conferences do not have such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award" and "outstanding paper award" are included but not "best student paper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL). The list of papers for years 2017 and 2018 were collected by Mingrui Ray Zhang and for 2019 by Willi Gierke.

AAAI (Artificial Intelligence)
2019How to Combine Tree-Search Methods in Reinforcement LearningYonathan Efroni, Technion; et al.
Bruno Scherrer, INRIA
Shie Mannor, Technion
2018Memory-Augmented Monte Carlo Tree SearchChenjun Xiao, University of Alberta; et al.
Martin Müller, University of Alberta
2017Label-Free Supervision of Neural Networks with Physics and Domain KnowledgeRussell Stewart & Stefano Ermon, Stanford University
2016Bidirectional Search That Is Guaranteed to Meet in the MiddleRobert C. Holte, University of Alberta; et al.
Guni Sharon, Ben-Gurion University
Nathan R. Sturtevant, University of Denver
2015From Non-Negative to General Operator Cost PartitioningFlorian Pommerening, University of Basel; et al.
Gabriele Röger, University of Basel
Jendrik Seipp, University of Basel
2014Recovering from Selection Bias in Causal and Statistical InferenceElias Bareinboim, University of California Los Angeles; et al.
Judea Pearl, University of California Los Angeles
2013SMILe: Shuffled Multiple-Instance LearningGary Doran & Soumya Ray, Case Western Reserve University
HC-Search: Learning Heuristics and Cost Functions for Structured PredictionJanardhan Rao Doppa, Oregon State University; et al.
Prasad Tadepalli, Oregon State University
2012Learning SVM Classifiers with Indefinite KernelsSuicheng Gu & Yuhong Guo, Temple University
Document Summarization Based on Data ReconstructionZhanying He, Zhejiang University; et al.
Jiajun Bu, Zhejiang University
Can Wang, Zhejiang University
Lijan Zhang, Zhejiang University
Deng Cai, Zhejiang University
Xiaofei He, Zhejiang University
2011Complexity of and Algorithms for Borda ManipulationJessica Davies, University of Toronto; et al.
Nina Narodytska, University of New South Wales
Toby Walsh, NICTA
Dynamic Resource Allocation in Conservation PlanningDaniel Golovin, California Institute of Technology; et al.
Beth Gardner, North Carolina State University
Sarah J. Converse, Patuxent Wildlife Research Center
Steve Morey, U.S. Fish and Wildlife Service
2010A Novel Transition Based Encoding Scheme for Planning as SatisfiabilityRuoyun Huang, Washington University in St. Louis; et al.
Weixiong Zhang, Washington University in St. Louis
How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Answ...Giorgos Stoilos, Oxford University; et al.
Ian Horrocks, Oxford University
2008Optimal False-Name-Proof Voting Rules with Costly VotingLiad Wagman & Vincent Conitzer, Duke University
How Good is Almost Perfect?Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg
2007PLOW: A Collaborative Task Learning AgentJames Allen, Institute for Human and Machine Cognition; et al.
George Ferguson, University of Rochester
Lucian Galescu, Institute for Human and Machine Cognition
Hyuckchul Jung, Institute for Human and Machine Cognition
Mary Swift, University of Rochester
William Taysom, Institute for Human and Machine Cognition
Thresholded Rewards: Acting Optimally in Timed,Zero-Sum GamesColin McMillen & Manuela Veloso, Carnegie Mellon University
2006Model Counting: A New Strategy for Obtaining Good BoundsCarla P. Gomes, Cornell University; et al.
Bart Selman, Cornell University
Towards an Axiom System for Default LogicGerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto
2005The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic SelectionVincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University
2004Learning and Inferring Transportation RoutinesLin Liao, University of Washington; et al.
Henry Kautz, University of Washington
2002On Computing All Abductive ExplanationsThomas Eiter, Technische Universität Wien
Kazuhisa Makino, Osaka University
2000The Game of Hex: An Automatic Theorem-Proving Approach to Game ProgrammingVadim V. Anshelevich, Vanshel Consulting
1999PROVERB: The Probabilistic CruciverbalistGreg A. Keim, Duke University; et al.
Michael L. Littman, Duke University
Sushant Agarwal, Duke University
Catherine M. Cheves, Duke University
Joseph Fitzgerald, Duke University
Jason Grosland, Duke University
Fan Jiang, Duke University
Shannon Pollard, Duke University
Karl Weinmeister, Duke University
1998Learning Evaluation Functions for Global Optimization and Boolean SatisfiabilityJustin A. Boyan & Andrew W. Moore, Carnegie Mellon University
The Interactive Museum Tour-Guide RobotWolfram Burgard, University of Bonn; et al.
Dieter Fox, University of Bonn
Dirk Hähnel, University of Bonn
Gerhard Lakemeyer, Aachen University of Technology
Dirk Schulz, University of Bonn
Walter Steiner, University of Bonn
Sebastian Thrun, Carnegie Mellon University
Acceleration Methods for Numeric CSPsYahia Lebbah & Olivier Lhomme, Ecole des Mines de Nantes
1997Statistical Parsing with a Context-Free Grammar and Word StatisticsEugene Charniak, Brown University
Building Concept Representations from Reusable ComponentsPeter Clark, Boeing
Bruce Porter, University of Texas at Austin
Fast Context Switching in Real-Time Propositional ReasoningP. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center
A Practical Algorithm for Finding Optimal TriangulationsKrill Shoikhet & Dan Geiger, Technion
1996A Novel Application of Theory Refinement to Student ModelingPaul T. Baffes, SciComp
Raymond J. Mooney, University of Texas at Austin
Pushing the Envelope: Planning,Propositional Logic,and Stochastic SearchHenry Kautz & Bart Selman, AT&T Laboratories
Verification of Knowledge Bases Based on Containment CheckingAlon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, Université Paris-Sud
ACL (Natural Language Processing)
2019Bridging the Gap between Training and Inference for Neural Machine Translation.Wen Zhang, Chinese Academy of Sciences and University of Chinese Academy of Sciences; et al.
Fandong Meng, Pattern Recognition Center and WeChat AI and Tencent Inc
Di You, Worcester Polytechnic Institute
Qun Liu, Huawei Noah’s Ark Lab
2018Finding syntax in human encephalography with beam searchJohn Hale, Cornell University; et al.
Adhiguna Kuncoro, University of Oxford
Jonathan R. Brennan, University of Michigan
2017Probabilistic Typology: Deep Generative Models of Vowel InventoriesRyan Cotterell & Jason Eisner, Johns Hopkins University
2016Finding Non-Arbitrary Form-Meaning Systematicity Using String-Metric Learning for Kernel RegressionE. Darío Gutiérrez, University of California Berkeley; et al.
Benjamin K. Bergen, University of California San Diego
2015Learning Dynamic Feature Selection for Fast Sequential PredictionEmma Strubell, University of Massachusetts Amherst; et al.
Kate Silverstein, University of Massachusetts Amherst
Andrew McCallum, University of Massachusetts Amherst
Improving Evaluation of Machine Translation Quality EstimationYvette Graham, Trinity College Dublin
2014Fast and Robust Neural Network Joint Models for Statistical Machine TranslationJacob Devlin, Raytheon BBN Technologies; et al.
Zhongqiang Huang, Raytheon BBN Technologies
Thomas Lamar, Raytheon BBN Technologies
Richard Schwartz, Raytheon BBN Technologies
John Makhoul, Raytheon BBN Technologies
2013Grounded Language Learning from Video Described with SentencesHaonan Yu & Jeffrey Mark Siskind, Purdue University
2012Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic ParsingHiroyuki Shindo, NTT Communication Science Laboratories; et al.
Akinori Fujino, NTT Communication Science Laboratories
Masaaki Nagata, NTT Communication Science Laboratories
String Re-writing KernelFan Bu, Tsinghua University; et al.
Xiaoyan Zhu, Tsinghua University
2011Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based ProjectionsDipanjan Das, Carnegie Mellon University
Slav Petrov, Google
2010Beyond NomBank: A Study of Implicit Arguments for Nominal PredicatesMatthew Gerber & Joyce Y. Chai, Michigan State University
2009K-Best A* ParsingAdam Pauls & Dan Klein, University of California Berkeley
Reinforcement Learning for Mapping Instructions to ActionsS.R.K. Branavan, Massachusetts Institute of Technology; et al.
Luke S. Zettlemoyer, Massachusetts Institute of Technology
Regina Barzilay, Massachusetts Institute of Technology
Concise Integer Linear Programming Formulations for Dependency ParsingAndré F.T. Martins, Instituto de Telecomunicações; et al.
Eric P. Xing, Carnegie Mellon University
2008A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language ModelLibin Shen, BBN Technologies; et al.
Ralph Weischedel, BBN Technologies
Forest Reranking: Discriminative Parsing with Non-Local FeaturesLiang Huang, University of Pennsylvania
2007Learning synchronous grammars for semantic parsing with lambda calculusYuk Wah Wong & Raymond J. Mooney, University of Texas at Austin
2006Semantic taxonomy induction from heterogenous evidenceRion Snow, Stanford University; et al.
Andrew Y. Ng, Stanford University
2005A Hierarchical Phrase-Based Model for Statistical Machine TranslationDavid Chiang, University of Maryland
2004Finding Predominant Word Senses in Untagged TextDiana McCarthy, University of Sussex; et al.
Julie Weeds, University of Sussex
John Carroll, University of Sussex
2003Towards a Model of Face-to-Face GroundingYukiko I. Nakano, RISTEX; et al.
Tom Stocky, Massachusetts Institute of Technology
Justine Cassell, Massachusetts Institute of Technology
Accurate Unlexicalized ParsingDan Klein & Christopher D. Manning, Stanford University
2002Discriminative Training and Maximum Entropy Models for Statistical Machine TranslationFranz Josef Och & Hermann Ney, RWTH Aachen University
2001Fast Decoding and Optimal Decoding for Machine TranslationUlrich Germann, University of Southern California; et al.
Kevin Knight, University of Southern California
Daniel Marcu, University of Southern California
Kenji Yamada, University of Southern California
Immediate-Head Parsing for Language ModelsEugene Charniak, Brown University
CHI (Human-Computer Interaction)
2019“Occupational Therapy is Making”: Design Iteration and Digital Fabrication in Occupational TherapyMegan Hofmann, Carnegie Mellon University; et al.
Toni Kaplan, Carnegie Mellon University
Stephanie Valencia, Carnegie Mellon University
Gabriella Han, Carnegie Mellon University
Scott E Hudson, Carnegie Mellon University
Jennifer Mankoff, University of Washington
Patrick Carrington, Carnegie Mellon University
“I feel it is my responsibility to stream”: Streaming and Engaging with Intangible Cultural Heritag...Zhicong Lu, University of Toronto; et al.
Mingming Fan, University of Toronto
Daniel Wigdor, University of Toronto
Guerilla Warfare and the Use of New (and Some Old) Technology: Lessons from FARC’s Armed Struggle i...Débora de Castro Leal, University of Siegen; et al.
Kaoru Misaki, University of Siegen
David Randall, University of Siegen
Volker Wulf, Institute of Information Systems and New Media
Investigating Slowness as a Frame to Design Longer-Term Experiences with Personal Data: A Field Stu...William Odom, Simon Fraser University; et al.
Jeroen Hol, Eindhoven University of Technology
Bram Naus, Eindhoven University of Technology
Pepijn Verburg, Eindhoven University of Technology
Tal Amram, Simon Fraser University
Amy Yo Sue Chen, Simon Fraser University
Engagement with Mental Health Screening on Mobile Devices: Results from an Antenatal Feasibility St...Kevin Doherty, Trinity College Dublin; et al.
Martin Cohn, Imperial College London
Nikolaos Mastellos, Imperial College London
Cecily Morrison, Microsoft Research Cambridge
Josip Car, Imperial College London
Gavin Doherty, Trinity College Dublin
Anchored Audio Sampling: A Seamless Method for Exploring Children’s Thoughts During Deployment Stud...Alexis Hiniker, University of Washington; et al.
Mingrui Ray Zhang, University of Washington
Erin Beneteau, University of Washington
Unremarkable AI: Fitting Intelligent Decision Support into Critical,Clinical Decision-Making Proces...Qian Yang, Carnegie Mellon University; et al.
John Zimmerman, Carnegie Mellon University
Online grocery delivery services: An opportunity to address food disparities in transportation-scar...Tawanna R Dillahunt, University of Michigan; et al.
Xuecong Xu, University of Michigan
Voice User Interfaces in Schools: Co-designing for Inclusion With Visually-Impaired and Sighted Pup...Oussama Metatla, University of Bristol; et al.
Taimur Ahmed, University of Bristol
Antonis Vafeas, University of Bristol
Sunny Miglani, University of Bristol
Increasing the Transparency of Research Papers with Explorable Multiverse AnalysesPierre Dragicevic, Inria; et al.
Abhraneel Sarma, University of Michigan
Matthew Kay, University of Michigan
Fanny Chevalier, University of Toronto
Geppetto: Enabling Semantic Design of Expressive Robot BehaviorsRuta Desai, Carnegie Mellon University; et al.
Justin Matejka, Autodesk Research
Stelian Coros, Carnegie Mellon University
James Lewis McCann, Carnegie Mellon University
George Fitzmaurice, Autodesk Research
Tovi Grossman, Autodesk Research
Project Sidewalk: A Web-based Crowdsourcing Tool for Collecting Sidewalk Accessibility Data At Scal...Manaswi Saha, University of Washington; et al.
Hanuma Teja Maddali, University of Maryland
Aileen Zeng, University of Washington
Ryan Holland, Montgomery Blair High School
Steven Bower, University of Maryland
Aditya Dash, University of Maryland
Sage Chen, University of Michigan
Anthony Li, University of Maryland
Kotaro Hara, Singapore Management University
Jon Froehlich, University of Washington
Touchstone2: An Interactive Environment for Exploring Trade-offs in HCI Experiment DesignAlexander Eiselmayer, University of Zurich; et al.
Michel Beaudouin-Lafon, Université Paris-Saclay
Wendy Elizabeth Mackay, Université Paris-Saclay
AffinityLens: Data-Assisted Affinity Diagramming with Augmented RealityHariharan Subramonyam, University of Michigan; et al.
Eytan Adar, University of Michigan
A Translational Science Model for HCILucas Franco Colusso, University of Washington; et al.
Sean A. Munson, University of Washington
Gary Hsieh, University of Washington
A Tale of Two Perspectives: A Conceptual Framework of User Expectations and Experiences of Instruct...Ahed Aladwan, The University of Melbourne; et al.
Steven Baker, The University of Melbourne
Eduardo Velloso, The University of Melbourne
Street-Level Algorithms: A Theory At The Gaps Between Policy and DecisionsAli Alkhatib & Michael Bernstein, Stanford University
Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Sa...Karla Badillo-Urquiola, University of Central Florida; et al.
Pamela J. Wisniewski, University of Central Florida
Protection,Productivity and Pleasure in the Smart Home: Emerging Expectations and Gendered Insights...Yolande Strengers, Monash University; et al.
Paula Arcari, RMIT University
Larissa Nicholls, RMIT University
Mel Gregg, Intel Corporation
Detecting Personality Traits Using Eye-Tracking DataShlomo Berkovsky, Macquarie University; et al.
Irena Koprinska, University of Sydney
Eileen Wang, University of Sydney
Yucheng Zeng, University of Sydney
Jingjie Li, University of Wisconsin–Madison
Sabina Kleitman, University of Sydney
ReType: Quick Text Editing with Keyboard and GazeShyamli Sindhwani, University of Auckland; et al.
Gerald Weber, University of Auckland
Data is Personal: Attitudes and Perceptions of Data Visualization in Rural PennsylvaniaEvan Peck, Bucknell University; et al.
Sofia E Ayuso, Bucknell University
PicMe: Interactive Visual Guidance for Taking Requested Photo CompositionMinju Kim, Korea Advanced Institute of Science and Technology
Jungjin Lee, KAI Inc.
Managing Messes in Computational NotebooksAndrew Head, UC Berkeley; et al.
Titus Barik, Microsoft
Steven Drucker, Microsoft Research
Robert DeLine, Microsoft Research
A Framework for the Experience of Meaning in Human-Computer InteractionElisa D Mekler, University of Basel
Kasper Hornbæk, University of Copenhagen
Managerial Visions: Stories of upgrading and maintaining the public restroom with IoTSarah Fox, University of California San Diego; et al.
Daniela Rosner, University of Washington
Social Play in an Exergame: How the Need to Belong Predicts AdherenceMaximus D. Kaos, Queen’s University and Aalto University; et al.
Perttu Hätmätlätinen, Aalto University
T.C. Nicholas Graham, Queen’s University
“Think secure from the beginning”: A Survey with Software DevelopersHala Assal & Sonia Chiasson, Carleton University
“They don’t leave us alone anywhere we go”: Gender and Digital Abuse in South AsiaNithya Sambasivan, Google; et al.
Nova Ahmed, North South University
Tara Matthews, Independent Researcher
Kurt Thomas, Google
Laura Sanely Gaytán-Lugo, Universidad de Colima
David Nemer, University of Kentucky
Elie Bursztein, Google
Elizabeth Churchill, Google
Sunny Consolvo, Google
2018Agile 3D Sketching with Air ScaffoldingYongkwan Kim, KAIST; et al.
Joon Hyub Lee, KAIST
Seok-Hyung Bae, KAIST
Pinpointing: Precise Head- and Eye-Based Target Selection for Augmented RealityMikko Kytö, Aalto University; et al.
Thammathip Piumsomboon, University of South Australia
Gun A. Lee, University of South Australia
Mark Billinghurst, University of South Australia
Data Illustrator: Augmenting Vector Design Tools with Lazy Data Binding for Expressive Visualizatio...Zhicheng Liu, Adobe Research; et al.
Alan Wilson, Adobe Systems Inc.
Mira Dontcheva, Adobe Research
James Delorey, Adobe Systems Inc.
Sam Grigg, Adobe Systems Inc.
Bernard Kerr, Adobe Systems Inc.
John Stasko, Georgia Institute of Technology
“A Stalker's Paradise”: How Intimate Partner Abusers Exploit TechnologyDiana Freed, Cornell Tech; et al.
Diana Minchala, City College of New York
Karen Levy, Cornell University
Thomas Ristenpart, Cornell Tech
Nicola Dell, Cornell Tech
Keeping a Low Profile? Technology,Risk and Privacy among Undocumented ImmigrantsTamy Guberek, University of Michigan; et al.
Sylvia Simioni, University of Michigan
Abraham H. Mhaidli, University of Michigan
Kentaro Toyama, University of Michigan
Florian Schaub, University of Michigan
Streets for People: Engaging Children in Placemaking Through a Socio-technical ProcessSean Peacock, Newcastle University; et al.
Clara Crivellaro, Newcastle University
Addressing Age-Related Bias in Sentiment AnalysisMark Diaz, Northwestern University; et al.
Amanda Lazar, University of Maryland
Anne Marie Piper, Northwestern University
Darren Gergle, Northwestern University
Gender Recognition or Gender Reductionism?: The Social Implications of Embedded Gender Recognition ...Foad Hamidi, University of Maryland; et al.
Stacy M. Branham, University of Maryland
How Relevant are Incidental Power Poses for HCI?Yvonne Jansen, Sorbonne Université
Kasper Hornbæk, University of Copenhagen
Voice Interfaces in Everyday LifeMartin Porcheron, University of Nottingham; et al.
Stuart Reeves, The University of Nottingham
Sarah Sharples, University of Nottingham
Examining Wikipedia With a Broader Lens: Quantifying the Value of Wikipedia's Relationships with Ot...Nicholas Vincent, Northwestern University; et al.
Brent Hecht, Northwestern University
Let's Talk About Race: Identity,Chatbots,and AIAri Schlesinger, Georgia Institute of Technology; et al.
Alex S. Taylor, City University of London
Semi-Automated Coding for Qualitative Research: A User-Centered Inquiry and Initial PrototypesMegh Marathe & Kentaro Toyama, University of Michigan
Wall++: Room-Scale Interactive and Context-Aware SensingYang Zhang, Carnegie Mellon University; et al.
Scott E. Hudson, Carnegie Mellon University
Chris Harrison, Carnegie Mellon University
Alanson Sample, Disney Research
HARK No More: On the Preregistration of CHI ExperimentsAndy Cockburn, University of Canterbury; et al.
Alan Dix, University of Birmingham
Making as Expression: Informing Design with People with Complex Communication Needs through Art The...Amanda Lazar, University of Maryland; et al.
Caroline Edasis, Mather LifeWays
Anne Marie Piper, Northwestern University
Expressive Time Series Querying with Hand-Drawn Scale-Free SketchesMiro Mannino & Azza Abouzied, New York University
Project Zanzibar: A Portable and Flexible Tangible Interaction PlatformNicolas Villar, Microsoft Research; et al.
Greg Saul, Microsoft Research
Christian Holz, Microsoft Research
Tim Regan, Microsoft Research
Oscar Salandin, Microsoft Researcch
Misha Sra, Microsoft Research
Hui-Shyong Yeo, Microsoft Research
William Field, Microsoft Research
Haiyan Zhang, Microsoft Research
Experiencing the Body as PlayFlorian 'Floyd' Mueller, RMIT University; et al.
Josh Andres, RMIT University
Rakesh Patibanda, RMIT University
Making Core Memory: Design Inquiry into Gendered Legacies of Engineering and CraftworkDaniela K. Rosner, University of Washington; et al.
Brock R. Craft, University of Washington
Helen Remick, Self-employed
Design for Collaborative Survival: An Inquiry into Human-Fungi RelationshipsJen Liu, University of Colorado Boulder; et al.
Laura Devendorf, University of Colorado Boulder
Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in B...Sharifa Sultana, Cornell University; et al.
Phoebe Sengers, Cornell University
Nicola Dell, Cornell Tech
Hoarding and Minimalism: Tendencies in Digital Data PreservationFrancesco Vitale, University of British Columbia; et al.
Joanna McGrenere, University of British Columbia
Extending Manual Drawing Practices with Artist-Centric Programming ToolsJennifer, Jacobs Massachusetts Institute of Technology; et al.
Radomír Mech, Adobe Research
Mitchel Resnick, Massachusetts Institute of Technology
2017Kinecting with Orangutans: Zoo Visitors' Empathetic Responses to Animals' Use of Interactive Techno...Sarah Webber, University of Melbourne; et al.
Sally Sherwen, Zoos Victoria
Wally Smith, University of Melbourne
Zaher Joukhadar, University of Melbourne
Frank Vetere, University of Melbourne
Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing,A...Viirj Kan, Massachusetts Institute of Technology; et al.
Noa Machover, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology
Serena Pan, Massachusetts Institute of Technology
Weixuan Chen, Massachusetts Institute of Technology
Yasuaki Kakehi, Keio University
Understanding Public Evaluation: Quantifying Experimenter InterventionJulie R. Williamson & John Williamson, University of Glasgow
Designing Gamified Applications that Make Safe Driving More EngagingFabius Steinberger, Queensland University of Technology; et al.
Marcus Foth, Queensland University of Technology
Daniel Johnson, Queensland University of Technology
Illumination Aesthetics: Light as a Creative Material within Computational DesignCesar Torres, University of California Berkeley; et al.
Molly Nicholas, University of California Berkeley
Eric Paulos, University of California Berkeley
Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner AbuseTara Matthews, Google; et al.
Anna Turner, Google
Manya Sleeper, Google
Jill Palzkill Woelfer, Google
Martin Shelton, Google
Cori Manthorne, Community Overcoming Relationship Abuse
Elizabeth F. Churchill, Google
Sunny Consolvo, Google
ShareVR: Enabling Co-Located Experiences for Virtual Reality between HMD and Non-HMD UsersJan Gugenheimer, Ulm University; et al.
Julian Frommel, Ulm University
Enrico Rukzio, Ulm University
Examining Menstrual Tracking to Inform the Design of Personal Informatics ToolsDaniel A. Epstein, University of Washington; et al.
Jennifer H. Kang, University of Washington
Elena Agapie, University of Washington
Jessica Schroeder, University of Washington
Laura R. Pina, University of Washington
James Fogarty, University of Washington
Julie A. Kientz, University of Washington
Sean Munson, University of Washington
Explaining the Gap: Visualizing One's Predictions Improves Recall and Comprehension of DataYea-Seul Kim, University of Washington; et al.
Jessica Hullman, University of Washington
mHealth for Maternal Mental Health: Everyday Wisdom in Ethical DesignMarguerite Barry, Trinity College Dublin; et al.
Jose Marcano Belisario, Imperial College London
Josip Car, Imperial College London
Cecily Morrison, Imperial College London
Gavin Doherty, Trinity College Dublin
A Critical Lens on Dementia and Design in HCIAmanda Lazar, Northwestern University; et al.
Anne Marie Piper, Northwestern University
What Is Interaction?Kasper Hornbæk, University of Copenhagen
Antti Oulasvirta, Aalto University
BIGnav: Bayesian Information Gain for Guiding Multiscale NavigationWanyu Liu, Université Paris-Saclay; et al.
Michel Beaudouin-Lafon, Université Paris-Saclay
Olivier Rioul, Université Paris-Saclay
Modelling Learning of New Keyboard LayoutsJussi P. P. Jokinen, Aalto University; et al.
Antti Oulasvirta, Aalto University
Chaklam Silpasuwanchai, Kochi University of Technology
Zhenxin Wang, Kochi University of Technology
Xiangshi Ren, Kochi University of Technology
Flash Organizations: Crowdsourcing Complex Work by Structuring Crowds As OrganizationsMelissa A. Valentine, Stanford University; et al.
Alexandra To, Carnegie Mellon University
Negar Rahmati, Stanford University
Tulsee Doshi, Stanford University
Michael S. Bernstein, Stanford University
Reflective Practicum: A Framework of Sensitising Concepts to Design for Transformative ReflectionPetr Slovák, Vienna University of Technology; et al.
Geraldine Fitzpatrick, Vienna University of Technology
What Can Be Predicted from Six Seconds of Driver Glances?Lex Fridman, Massachusetts Institute of Technology; et al.
Sean Seaman, Touchstone Evaluations
Bobbie Seppelt, Touchstone Evaluations
Linda Angell, Touchstone Evaluations
Joonbum Lee, Massachusetts Institute of Technology
Bruce Mehler, Massachusetts Institute of Technology
Bryan Reimer, Massachusetts Institute of Technology
Design and Evaluation of a Data-Driven Password MeterBlase Ur, University of Chicago; et al.
Maung Aung, Carnegie Mellon University
Lujo Bauer, Carnegie Mellon University
Nicolas Christin, Carnegie Mellon University
Jessica Colnago, Carnegie Mellon University
Lorrie Faith Cranor, Carnegie Mellon University
Henry Dixon, Carnegie Mellon University
Pardis Emami Naeini, Carnegie Mellon University
Hana Habib, Carnegie Mellon University
Noah Johnson, Carnegie Mellon University
William Melicher, Carnegie Mellon University
You Want Me to Work with Who?: Stakeholder Perceptions of Automated Team Formation in Project-based...Farnaz Jahanbakhsh, University of Illinois at Urbana-Champaign; et al.
Karrie Karahalios, University of Illinois at Urbana-Champaign
Darko Marinov, University of Illinois at Urbana-Champaign
Brian Bailey, University of Illinois at Urbana-Champaign
Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing A...Viirj Kan, Massachusetts Institute of Technology; et al.
Noa Machover, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology
Serena Pan, Massachusetts Institute of Technology
Weixuan Chen, Massachusetts Institute of Technology
Yasuaki Kakehi, Massachusetts Institute of Technology
2016The Effect of Visual Appearance on the Performance of Continuous Sliders and Visual Analogue ScalesJustin Matejka, Autodesk Research; et al.
Tovi Grossman, Autodesk Research
George Fitzmaurice, Autodesk Research
Designing Movement-based Play With Young People Using Powered WheelchairsKathrin Gerling, University of Lincoln; et al.
Michael Kalyn, University of Lincoln
Adam Evans, University of Copenhagen
Conor Linehan, University College Cork
Object-Oriented DrawingHaijun Xia, University of Toronto; et al.
Tovi Grossman, Autodesk Research
Daniel Wigdor, University of Toronto
Enabling Designers to Foresee Which Colors Users Cannot SeeKatharina Reinecke, University of Washington; et al.
Christopher Brooks, University of Michigan
On Looking at the Vagina through LabellaTeresa Almeida, Newcastle University; et al.
Gavin Wood, Newcastle University
Dean Saraf, Newcastle University
Madeline Balaam, Newcastle University
Project Jacquard: Interactive Digital Textiles at ScaleIvan Poupyrev, Google; et al.
Shiho Fukuhara, Google
Mustafa Emre Karagozler, Google
Carsten Schwesig, Google
Karen E. Robinson, Google
"I don't Want to Wear a Screen": Probing Perceptions of and Possibilities for Dynamic Displays on C...Laura Devendorf, University of California Berkeley; et al.
Noura Howell, University of California Berkeley
Jung Lin Lee, University of California Berkeley
Nan-Wei Gong, Google
M. Emre Karagozler, Google
Shiho Fukuhara, Google
Ivan Poupyrev, Google
Eric Paulos, University of California Berkeley
Kimiko Ryokai, University of California Berkeley
Momentary Pleasure or Lasting Meaning?: Distinguishing Eudaimonic and Hedonic User ExperiencesElisa D. Mekler, University of Basel
Kasper Hornbæk, University of Copenhagen
RapID: A Framework for Fabricating Low-Latency Interactive Objects with RFID TagsAndrew Spielberg, Massachusetts Institute of Technology; et al.
Scott E. Hudson, Carnegie Mellon University
Jennifer Mankoff, Carnegie Mellon University
James McCann, Disney Research
HCI Research as Problem-SolvingAntti Oulasvirta, Aalto University
Kasper Hornbæk, University of Copenhagen
Haptic Wave: A Cross-Modal Interface for Visually Impaired Audio ProducersAtau Tanaka & Adam Parkinson, Goldsmiths
FlexCase: Enhancing Mobile Interaction with a Flexible Sensing and Display CoverChristian Rendl, University of Applied Sciences Upper Austria; et al.
Patrick Parzer, University of Applied Sciences Upper Austria
Sean Fanello, Microsoft Research
Martin Zirkl, Institute of Surface Technologies and Photonics
Gregor Scheipl, Joanneum Research Forschungsgesellschaft m.b.H
Michael Haller, University of Applied Sciences Upper Austria
Shahram Izadi, Microsoft Research
Dear Diary: Teens Reflect on Their Weekly Online Risk ExperiencesPamela Wisniewski, University of Central Florida; et al.
Mary Beth Rosson, Pennsylvania State University
Daniel F. Perkins, Pennsylvania State University
John M. Carroll, Pennsylvania State University
Understanding and Mitigating the Effects of Device and Cloud Service Design Decisions on the Enviro...Chris Preist, University of Bristol; et al.
Eli Blevis, Indiana University Bloomington
Enhancing Cross-Device Interaction Scripting with Interactive IllustrationsPei-Yu (Peggy) Chi, University of California Berkeley; et al.
Björn Hartmann, University of California Berkeley
Learn Piano with BACh: An Adaptive Learning Interface that Adjusts Task Difficulty Based on Brain S...Beste F. Yuksel, Tufts University; et al.
Lane Harrison, Worcester Polytechnic Institute
Evan M. Peck, Bucknell University
Daniel Afergan, Tufts University
Remco Chang, Tufts University
Robert JK Jacob, Tufts University
Smart Touch: Improving Touch Accuracy for People with Motor Impairments with Template MatchingMartez E. Mott, University of Washington; et al.
Shaun K. Kane, University of Colorado Boulder
Jacob O. Wobbrock, University of Washington
Building a Personalized,Auto-Calibrating Eye Tracker from User InteractionsMichael Xuelin Huang, Hong Kong Polytechnic University; et al.
Grace Ngai, Hong Kong Polytechnic University
Stephen C.F. Chan, Hong Kong Polytechnic University
Hong Va Leong, Hong Kong Polytechnic University
Developing and Validating the User Burden Scale: A Tool for Assessing User Burden in Computing Syst...Hyewon Suh, University of Washington; et al.
Eric B. Hekler, Arizona State University
Julie A. Kientz, University of Washington
Foraging Among an Overabundance of Similar VariantsSruti Srinivasa Ragavan, Oregon State University; et al.
Charles Hill, Oregon State University
Anita Sarma, Oregon State University
David Piorkowski, Oregon State University
Margaret Burnett, Oregon State University
Finding Email in a Multi-Account,Multi-Device WorldMarta E. Cecchinato, University College London; et al.
Milad Shokouhi, Microsoft Research
Gavin Smyth, Microsoft Research
Empath: Understanding Topic Signals in Large-Scale TextEthan Fast, Stanford University; et al.
Michael Bernstein, Stanford University
Lock n' LoL: Group-based Limiting Assistance App to Mitigate Smartphone Distractions in Group Activ...Minsam Ko, KAIST; et al.
Koji Yatani, University of Tokyo
Uichin Lee, KAIST
2015Affordance++: Allowing Objects to Communicate Dynamic UsePedro Lopes, Hasso Plattner Institute; et al.
Patrick Baudisch, Hasso Plattner Institute
VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboa...Keith Vertanen, Montana Tech; et al.
Justin Emge, Montana Tech
Shyam Reyal, University of St Andrews
Per Ola Kristensson, University of Cambridge
What Makes Interruptions Disruptive?: A Process-Model Account of the Effects of the Problem State B...Jelmer P. Borst, University of Groningen; et al.
Hedderik van Rijn, University of Groningen
Lightweight Relief Shearing for Enhanced Terrain Perception on Interactive MapsWesley Willett, INRIA; et al.
Tobias Isenberg, INRIA
Pierre Dragicevic, INRIA
The Social Impact of a Robot Co-Worker in Industrial SettingsAllison Sauppé & Bilge Mutlu, University of Wisconsin
Sangeet Swara: A Community-Moderated Voice Forum in Rural IndiaAditya Vashistha, University of Washington; et al.
Gaetano Borriello, University of Washington
William Thies, Microsoft Research
Understanding and Supporting Fathers and Fatherhood on Social Media SitesTawfiq Ammari & Sarita Schoenebeck, University of Michigan
Patina Engraver: Visualizing Activity Logs as Patina in Fashionable TrackersMoon-Hwan Lee, KAIST; et al.
Tek-Jin Nam, KAIST
Fluid Grouping: Quantifying Group Engagement around Interactive Tabletop Exhibits in the WildFlorian Block, Harvard University; et al.
Michael Horn, Northwestern University
Amy Spiegel, University of Nebraska-Lincoln
Jonathan Christiansen, TERC
Brenda Phillips, Harvard University
Judy Diamond, University of Nebraska State Museum
E. Margaret Evans, University of Michigan
Chia Shen, Harvard University
Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk ExposurePamela Wisniewski, Pennsylvania State University; et al.
Na Wang, Pennsylvania State University
Saijing Zheng, Pennsylvania State University
Heng Xu, Pennsylvania State University
Mary Beth Rosson, Pennsylvania State University
John Carroll, Pennsylvania State University
BaseLase: An Interactive Focus+Context Laser FloorJörg Müller, Aarhus University; et al.
Constantin Schmidt, Technische Universität Berlin
Tiree Energy Pulse: Exploring Renewable Energy Forecasts on the Edge of the GridWill Simm, Lancaster University; et al.
Adrian Friday, Lancaster University
Peter Newman, Lancaster University
Stephen Forshaw, Lancaster University
Mike Hazas, Lancaster University
Alan Dix, Lancaster University
iSkin: Flexible,Stretchable and Visually Customizable On-Body Touch Sensors for Mobile ComputingMartin Weigel, Max Planck Institut; et al.
Gilles Bailly, Telecom ParisTech
Antti Oulasvirta, Aalto University
Carmel Majidi, Carnegie Mellon University
Jürgen Steimle, Max Planck Institut
Designing Political Deliberation Environments to Support Interactions in the Public SphereBryan Semaan, Syracuse University; et al.
Scott P. Robertson, University of Hawaii at Manoa
Misa Maruyama, University of Hawaii at Manoa
Sara Douglas, University of Hawaii at Manoa
From User-Centered to Adoption-Centered Design: A Case Study of an HCI Research Innovation Becoming...Parmit K. Chilana, University of Waterloo; et al.
Jacob Wobbrock, University of Washington
Acoustruments: Passive,Acoustically-Driven,Interactive Controls for Handheld DevicesGierad Laput, Carnegie Mellon University; et al.
Scott E. Hudson, Carnegie Mellon University
Chris Harrison, Carnegie Mellon University
Unequal Representation and Gender Stereotypes in Image Search Results for OccupationsMatthew Kay, University of Washington; et al.
Sean A. Munson, University of Washington
Sharing is Caring: Assistive Technology Designs on ThingiverseErin Buehler, University of Maryland Baltimore County; et al.
Abdullah Ali, University of Maryland Baltimore County
Jeremy J. Chang, University of Maryland Baltimore County
Megan Kelly Hofmann, Colorado State University
Amy Hurst, University of Maryland Baltimore County
Shaun K. Kane, University of Maryland Baltimore County
"I always assumed that I wasn't really that close to [her]": Reasoning about Invisible Algorithms i...Motahhare Eslami, University of Illinois at Urbana-Champaign; et al.
Kristen Vaccaro, University of Illinois at Urbana-Champaign
Amirhossein Aleyasen, University of Illinois at Urbana-Champaign
Andy Vuong, University of Illinois at Urbana-Champaign
Karrie Karahalios, University of Illinois at Urbana-Champaign
Kevin Hamilton, University of Illinois at Urbana-Champaign
Christian Sandvig, University of Michigan
ColourID: Improving Colour Identification for People with Impaired Colour VisionDavid R. Flatla, University of Dundee; et al.
Ross D. Teviotdale, University of Dundee
Dylan L. Knowles, University of Saskatchewan
Craig Stewart, University of Dundee
2014Consumed Endurance: A Metric to Quantify Arm Fatigue of Mid-Air InteractionsAnders Markussen, University of Copenhagen; et al.
Kasper Hornbaek, University of Copenhagen
Duet: Exploring Joint Interactions on a Smart Phone and a Smart WatchXiang Anthony Chen, Carnegie Mellon University; et al.
Daniel Wigdor, University of Toronto
George Fitzmaurice, Autodesk Research
Type-Hover-Swipe in 96 Bytes: A Motion Sensing Mechanical KeyboardStuart A Taylor, Microsoft Research; et al.
Otmar Hilliges, ETH Zurich
Shahram Izadi, Microsoft Research
John Helmes, Microsoft Research
Effects of Display Size and Navigation Type on a Classification TaskCan Liu, Université Paris-Sud; et al.
Michel Beaudouin-Lafon, Université Paris-Sud
Eric Lecolinet, Telecom ParisTech
Wendy Mackay, INRIA
George Fitzmaurice, Autodesk Research
MixFab: a Mixed-Reality Environment for Personal FabricationChristian Weichel, Lancaster University; et al.
David Kim, Microsoft Research
Nicolas Villar, Microsoft Research
Hans W Gellersen, Lancaster University
Growing Closer on Facebook: Changes in Tie Strength Through Social Network Site UseMoira Burke, Facebook
Robert Kraut, Carnegie Mellon University
Emerging Sites of HCI Innovation: Hackerspaces,Hardware Startups & IncubatorsSilvia Lindtner, University of California Irvine; et al.
Paul Dourish, University of California Irvine
Designing for Slowness,Anticipation and Re-visitation: A Long Term Field Study of the PhotoboxWilliam Odom, Carnegie Mellon University; et al.
Richard Banks, Microsoft Research
David Kirk, Newcastle University
Tim Regan, Microsoft
Mark Selby, University of Nottingham
Jodi Forlizzi, Carnegie Mellon University
John Zimmerman, Carnegie Mellon University
Estimating the Social Costs of FriendsourcingJeffrey Rzeszotarski & Meredith Morris, Microsoft Research
Human Values in Curating a Human Rights Media ArchiveAbigail Durrant, Newcastle University; et al.
Stuart Reeves, University of Nottingham
"Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug WarMunmun De Choudhury, Microsoft Research; et al.
Gloria Mark, University of California Irvine
Real-time Feedback for Improving Medication TakingMatthew Lee, Philips Research
Anind Dey, Carnegie Mellon University
Structured Labeling for Facilitating Concept Evolution in Machine LearningTodd Kulesza, Oregon State University; et al.
Rich Caruana, Microsoft Research
Danyel Fisher, Microsoft Research
Denis Charles, Microsoft Research
Towards Accurate and Practical Predictive Models of Active-Vision-Based Visual SearchDavid Kieras, University of Michigan
Anthony Hornof, University of Oregon
RetroDepth: 3D Silhouette Sensing for High-Precision Input On and Above Physical SurfacesDavid Kim, Microsoft Research; et al.
Jakub Dostal, University of St Andrews
Christoph Rhemann, Microsoft Research
Cem Keskin, Microsoft Research
Christopher Zach, Microsoft Research
Jamie Shotton, Microsoft Research
Timothy Large, Microsoft Research
Steven Bathiche, Microsoft
Matthias Niessner, Stanford University
D. Alex Butler, Microsoft Research
Sean Fanello, Istituto Italiano di Tecnologia
Vivek Pradeep, Microsoft
Understanding Multitasking Through Parallelized Strategy Exploration and Individualized Cognitive M...Yunfeng Zhang & Anthony Hornof, University of Oregon
Making Sustainability Sustainable: Challenges in the Design of Eco-Interaction TechnologiesRayoung Yang, University of Michigan; et al.
Jodi Forlizzi, Carnegie Mellon University
2013Weighted Graph Comparison Techniques for Brain Connectivity AnalysisBasak Alper, University of California Santa Barbara; et al.
Nathalie Riche, Microsoft Research
Tobias Isenberg, INRIA
Jean-Daniel Fekete, INRIA
Analyzing User-Generated YouTube Videos to Understand Touchscreen Use by People with Motor Impairme...Lisa Anthony, University of Maryland Baltimore County; et al.
Leah Findlater, University of Maryland
What is "Critical" About Critical Design?Jeffrey Bardzell & Shaowen Bardzell, Indiana University at Bloomington
The Dubuque Electricity Portal: Evaluation of a City-Scale Residential Electricity Consumption Feed...Tom Erickson, IBM Research; et al.
Younghun Kim, IBM Research
Ajay Deshpande, IBM Research
Sambit Sahu, IBM Research
Tian Chao, IBM Research
Piyawadee Sukaviriya, IBM Research
Milind Naphade, IBM Research
Improving Navigation-Based File RetrievalStephen Fitchett, University of Canterbury; et al.
Carl Gutwin, University of Saskatchewan
SPRWeb: Preserving Subjective Responses to Website Colour Schemes through Automatic RecolouringDavid R. Flatla, University of Saskatchewan; et al.
Carl Gutwin, University of Saskatchewan
Krzysztof Z. Gajos, Harvard University
The Efficacy of Human Post-Editing for Language TranslationSpence Green, Stanford University; et al.
Christopher D. Manning, Stanford University
Mind the Theoretical Gap: Interpreting,Using,and Developing Behavioral Theory in HCI ResearchEric B. Hekler, Arizona State University; et al.
Jon Froehlich, University of Maryland
Matthew P. Buman, University of Maryland
Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical TurkLilly Irani, University of California Irvine
M. Six Silberman, Bureau of Economic Interpretation
IllumiRoom: Peripheral Projected Illusions for Interactive ExperiencesBrett Jones, University of Illinois at Urbana-Champaign; et al.
Eyal Ofek, Microsoft Research
Andrew D. Wilson, Microsoft Research
Webzeitgeist: Design Mining the WebRanjitha Kumar, Stanford University; et al.
Cesar Torres, Stanford University
Maxine Lim, Stanford University
Salman Ahmad, Massachusetts Institute of Technology
Scott R. Klemmer, Stanford University
Jerry O. Talton, Intel
LaserOrigami: Laser-Cutting 3D ObjectsStefanie Mueller, Hasso Plattner Institute; et al.
Patrick Baudisch, Hasso Plattner Institute
Labor Dynamics in a Mobile Micro-Task MarketMohamed Musthag & Deepak Ganesan, University of Massachusetts Amherst
Job Opportunities through Entertainment: Virally Spread Speech-Based Services for Low-Literate User...Agha Ali Raza, Carnegie Mellon University; et al.
Zain Tariq, Lahore University of Management Sciences
Mansoor Pervaiz, Northeastern University
Samia Razaq, Lahore University of Management Sciences
Umar Saif, Lahore University of Management Sciences
Roni Rosenfeld, Carnegie Mellon University
At Home with Agents: Exploring Attitudes Towards Future Smart Energy InfrastructuresTom Rodden, University of Nottingham; et al.
Nadia Pantidi, University of Nottingham
Khaled Bachour, University of Nottingham
Stuart Moran, University of Nottingham
Screenfinity: Extending the Perception Area of Content on Very Large Public DisplaysConstantin Schmidt, Technische Universität Berlin; et al.
Gilles Bailly, Technische Universität Berlin
Reasons to Question Seven Segment DisplaysHarold Thimbleby, Swansea University
The Many Faces of Facebook: Experiencing Social Media as Performance,Exhibition,and Personal Archiv...Xuan Zhao, Cornell University; et al.
Sasha Naranjit, Cornell University
Sara Alwaalan, Cornell University
Stephen Voida, Cornell University
Dan Cosley, Cornell University
2012Observational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobile...Niels Henze, University of Oldenburg; et al.
Susanne Boll, University of Oldenburg
The Normal Natural Troubles of Driving with GPSBarry Brown, Stockholm University
Eric Laurier, University of Edinburgh
Improving Command Selection with CommandMapsJoey Scarr, University of Canterbury; et al.
Carl Gutwin, University of Saskatchewan
Andrea Bunt, University of Manitoba
Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical KiosksKurtis Heimerl, University of California Berkeley; et al.
Kuang Chen, University of California Berkeley
Tapan S. Parikh, University of California Berkeley
Björn Hartmann, University of California Berkeley
Touché: Enhancing Touch Interaction on Humans,Screens,Liquids,and Everyday ObjectsMunehiko Sato, Disney Research; et al.
Chris Harrison, Disney Research
Detecting Error-Related Negativity for Interaction DesignChi Vi & Sriram Subramanian, University of Bristol
Empathy,Participatory Design and People with DementiaStephen Lindsay, Newcastle University; et al.
Daniel Jackson, Newcastle University
Cassim Ladha, Newcastle University
Karim Ladha, Newcastle University
Patrick Olivier, Newcastle University
Looking Glass: A Field Study on Noticing Interactivity of Shop WindowsJörg Müller, Technische Universität Berlin; et al.
Gilles Bailly, Technische Universität Berlin
Michael Nischt, Technische Universität Berlin
Florian Alt, University of Stuttgart
Affordances in HCI: Toward a Mediated Action PerspectiveVictor Kaptelinin, University of Bergen
Bonnie Nardi, University of California Irvine
Personas and Decision Making in the Design Process: An Ethnographic Case StudyErin Friess, University of North Texas
Using Rhythmic Patterns as an Input MethodEmilien Ghomi, Université Paris-Sud; et al.
Stephane Huot, Université Paris-Sud
Olivier Chapuis, Université Paris-Sud
Michel Beaudouin-Lafon, Université Paris-Sud
Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCIYlva Fernaeus, KTH Royal Institute of Technology; et al.
Jakob Tholanderm, Stockholm University
Uncomfortable InteractionsSteve Benford, University of Nottingham; et al.
Gabriella Giannachi, University of Exeter
Brendan Walker, University of Nottingham
Joe Marshall, University of Nottingham
Tom Rodden, University of Nottingham
ClayVision: The (Elastic) Image of the CityYuichiro Takeuchi, Sony Computer Science Laboratories
Ken Perlin, New York University
2011Bricolage: Example-Based Retargeting for Web DesignRanjitha Kumar, Stanford University; et al.
Salman Ahmad, Stanford University
Scott Klemmer, Stanford University
Teenagers and Their Virtual Possessions: Design Opportunities and IssuesWilliam Odom, Carnegie Mellon University; et al.
Jodi Forlizzi, Carnegie Mellon University
Mid-air Pan-and-Zoom on Wall-sized DisplaysMathieu Nancel, Université Paris-Sud; et al.
Emmanuel Pietriga, INRIA
Olivier Chapuis, Université Paris-Sud
Wendy Mackay, INRIA
Why is My Internet Slow?: Making Network Speeds VisibleMarshini Chetty, Georgia Institute of Technology; et al.
Andrew Baird, Amazon
Ugochi Ofoha, Georgia Institute of Technology
Bethany Sumner, Georgia Institute of Technology
Rebecca Grinter, Georgia Institute of Technology
Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual En...Thomas Erickson, IBM Research; et al.
Wendy A. Kellogg, IBM Research
David W. Levine, IBM Research
Your Noise is My Command: Sensing Gestures Using the Body as an AntennaGabe Cohn, University of Washington; et al.
Shwetak N. Patel, University of Washington
Desney Tan, Microsoft Research
Enhancing Physicality in Touch Interaction with Programmable FrictionVincent Levesque, University of British Columbia; et al.
Karon MacLean, University of British Columbia
Andy Cockburn, University of Canterbury
Nicholas D. Marchuk, Northwestern University
Dan Johnson, Northwestern University
J. Edward Colgate, Northwestern University
Usable Gestures for Blind People: Understanding Preference and PerformanceShaun K. Kane, University of Washington; et al.
Richard E. Ladner, University of Washington
Automics: souvenir generating photoware for theme parksAbigail Durrant, University of Nottingham; et al.
David Kirk, University of Nottingham
Steve Benford, University of Nottingham
Joel E. Fischer, University of Nottingham
Derek McAuley, University of Nottingham
Michael A. Peshkin, Northwestern University
Effects of Community Size and Contact Rate in Synchronous Social Q&ARyen W. White, Microsoft Research; et al.
Yandong Liu, Carnegie Mellon University
Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Word...Koji Yatani, University of Toronto; et al.
Andrew Trusty, University of Toronto
Khai N. Truong, University of Toronto
In the Shadow of Misperception: Assistive Technology Use and Social InteractionsKristen Shinohara & Jacob Wobbrock, University of Washington
Ease of Juggling: Studying the Effects of Manual MultitaskingAntti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University
2010How does search behavior change as search becomes more difficult?Anne Aula, Google; et al.
Zhiwei Guan, Google
The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Con...Brent Hecht & Darren Gergle, Northwestern University
Occlusion-Aware InterfacesDaniel Vogel & Ravin Balakrishnan, University of Toronto
Skinput: Appropriating the Body as an Input SurfaceChris Harrison, Carnegie Mellon University; et al.
Dan Morris, Microsoft Research
Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural IndiaNeil Patel, Stanford University; et al.
Anupam Jain, IBM Research
Paresh Dave, Development Support Center
Tapan S. Parikh, University of California Berkeley
Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber BundlesPatrick Baudisch, Hasso Plattner Institute; et al.
Frederik Rudeck, Hasso Plattner Institute
Feminist HCI: Taking Stock and Outlining an Agenda for DesignShaowen Bardzell, Indiana University at Bloomington
Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface Structur...Morgan Dixon & James Fogarty, University of Washington
Mobile-izing Health Workers in Rural IndiaDivya Ramachandran, University of California Berkeley; et al.
Prabhu Dutta Das, Dhirubhai Ambani Institute of Information and Communications Technology
Edward Cutrell, Microsoft Research
Mapping the Landscape of Sustainable HCICarl DiSalvo, Georgia Institute of Technology; et al.
Hrönn Brynjarsdóttir, Cornell University
The Design of Eco-Feedback TechnologyJon Froehlich, University of Washington; et al.
James Landay, University of Washington
Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of ChartsScott Bateman, University of Saskatchewan; et al.
Carl Gutwin, University of Saskatchewan
Aaron Genest, University of Saskatchewan
David McDine, University of Saskatchewan
Christopher Brooks, University of Saskatchewan
2009Predicting Tie Strength With Social MediaEric Gilbert & Karrie Karahalios, University of Illinois at Urbana-Champaign
Undo and Erase Events as Indicators of Usability ProblemsDavid Akers, Stanford University; et al.
Robin Jeffries, Google
Terry Winograd, Stanford University
From Interaction to Trajectories: Designing Coherent Journeys Through User ExperiencesSteve Benford, University of Nottingham; et al.
Boriana Koleva, University of Nottingham
Tom Rodden, University of Nottingham
Musink: Composing Music through Augmented DrawingTheophanis Tsandilas, Université Paris-Sud; et al.
Wendy Mackay, Université Paris-Sud
Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Seri...Jeffrey Heer, Stanford University; et al.
Maneesh Agrawala, University of California Berkeley
Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector Exhibit...Scott S. Snibbe, Sona Research
Hayes S. Raffle, Massachusetts Institute of Technology
Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection PerformanceLeah Findlater, University of British Columbia; et al.
Joanna McGrenere, University of British Columbia
Jessica Dawson, University of British Columbia
2008An Error Model for Pointing Based on Fitts' LawJacob Wobbrock, University of Washington; et al.
Susumu Harada, University of Washington
I. Scott MacKenzie, York University
Designs on Dignity: Perceptions of Technology Among the HomelessChristopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology
Improving the Performance of Motor-Impaired Users with Automatically-Generated,Ability-Based Interf...Krzysztof Z. Gajos, University of Washington; et al.
Daniel S. Weld, University of Washington
In-Car GPS Navigation: Engagement with and Disengagement from the EnvironmentGilly Leshed, Cornell University; et al.
Oya Rieger, Cornell University
Blazej Kot, Cornell University
Phoebe Sengers, Cornell University
Large Scale Analysis of Web Revisitation PatternsEytan Adar, University of Washington; et al.
Susan T. Dumais, Microsoft Research
Multimodal collaborative handwriting training for visually-impaired peopleBeryl Plimmer, University of Auckland; et al.
Stephen A. Brewster, University of Glasgow
Rachel Blagojevic, University of Auckland
The Network in the Garden: An Empirical Analysis of Social Media in Rural LifeEric Gilbert, University of Illinois at Urbana-Champaign; et al.
Christian Sandvig, University of Illinois at Urbana-Champaign
2007Authoring sensor-based interactions by demonstration with direct manipulation and pattern recogniti...Björn Hartmann, Stanford University; et al.
Manas Mittal, Massachusetts Institute of Technology
Scott R. Klemmer, Stanford University
Consuming video on Mobile devicesKenton O'Hara, Hewlett-Packard Labs; et al.
Alex Vorbau, Hewlett-Packard Labs
Multiview: improving trust in group video conferencing through spatial faithfulnessDavid T. Nguyen & John Canny, University of California Berkeley
Shift: a technique for operating pen-based interfaces using touchDaniel Vogel, University of Toronto
Patrick Baudisch, Microsoft Research
Software or wetware?: discovering when and why people use digital prosthetic memoryVaiva Kalnikaité & Steve Whittaker, University of Sheffield
Sustainable interaction design: invention & disposal,renewal & reuseEli Blevis, Indiana University at Bloomington
2006Trackball text entry for people with motor impairmentsJacob Wobbrock & Brad Myers, Carnegie Mellon University
Embedded phenomena: supporting science learning with classroom-sized distributed simulationsTom Moher, University of Illinois at Chicago
A role for haptics in mobile interaction: initial design using a handheld tactile display prototypeJoseph Luk, University of British Columbia; et al.
Shannon Little, University of British Columbia
Karon MacLean, University of British Columbia
Vincent Lévesque, McGill University
Vincent Hayward, McGill University
2005The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation areaTovi Grossman & Ravin Balakrishnan, University of Toronto
Designing the spectator experienceStuart Reeves, University of Nottingham; et al.
Claire O'Malley, University of Nottingham
Mike Fraser, University of Bristol
Examining Task Engagement in Sensor-Based Statistical Models of Human InterruptibilityJames Fogarty, Carnegie Mellon University; et al.
Htet Htet Aung, Carnegie Mellon University
Elspeth Golden, Carnegie Mellon University
Karen P. Tang, Carnegie Mellon University
Scott E. Hudson, Carnegie Mellon University
Making space for stories: ambiguity in the design of personal communication systemsPaul M. Aoki, Palo Alto Research Center
Allison Woodruff, Intel Research
CIKM (Knowledge Management)
2019AutoGRD: Model Recommendation Through Graphical Dataset RepresentationNoy Cohen, Ben Gurion University of the Negev; et al.
Bracha Shapira, Ben Gurion University of the Negev
Gilad Katz, Ben Gurion University of the Negev
Roman Vainshtein, Ben Gurion University of the Negev
2018Relevance estimation with multiple information sources on search engine result pagesJunqi Zhang, Tsinghua University; et al.
Shaoping Ma, Tsinghua University
Qi Tian, University of Texas at San Antonio
2017Hike: A Hybrid Human-Machine Method for Entity Alignment in Large-Scale Knowledge BasesYan Zhuang, Tsinghua University; et al.
Zhuojian Zhong, Tsinghua University
Jianhua Feng, Tsinghua University
2016Vandalism Detection in WikidataStefan Heindorf, Paderborn University; et al.
Benno Stein, Bauhaus-Universität Weimar
Gregor Engels, Paderborn University
2015Assessing the Impact of Syntactic and Semantic Structures for Answer Passages RerankingKateryna Tymoshenko, University of Trento
Alessandro Moschitti, Qatar Computing Research Institute
2014Cross-Device SearchGeorge Montanez, Carnegie Mellon University; et al.
Xiao Huang, Microsoft
2013Penguins in Sweaters,or Serendipitous Entity Search on User-generated ContentIlaria Bordino, Yahoo! Research; et al.
Mounia Lalmas, Yahoo! Research
2012Gelling,and Melting,Large Graphs by Edge ManipulationHanghang Tong, IBM Research; et al.
Tina Eliassi-Rad, Rutgers University
Michalis Faloutsos, University of California Riverside
Christos Faloutsos, Carnegie Mellon University
2011Intent-aware query similarityJiafeng Guo, Chinese Academy of Sciences; et al.
Gu Su, Microsoft Research
Xiaofei Zhu, Chinese Academy of Sciences
2010MENTA: Inducing Multilingual Taxonomies from WikipediaGerard de Melo & Gerhard Weikum, Max Planck Institut
FACeTOR: cost-driven exploration of faceted query resultsAbhijith Kashyap, State University of New York at Buffalo; et al.
Michalis Petropoulos, State University of New York at Buffalo
2009On the Feasibility of Multi-Site Web Search EnginesRicardo Baeza-Yates, Yahoo! Research; et al.
Flavio Junqueira, Yahoo! Research
Vassilis Plachouras, Yahoo! Research
Luca Telloli, Yahoo! Research
2008Learning to Link with WikipediaDavid Milne & Ian H. Witten, University of Waikato
2007Autonomously Semantifying WikipediaFei Wu & Daniel S. Weld, University of Washington
2006Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing Indice...Segabtian Michel, Max Planck Institut; et al.
Nikos Ntarmos, RACTI and University of Patras
Peter Triantafillou, RACTI and University of Patras
Gerhard Weikum, Max Planck Institut
Christian Zimmer, Max Planck Institut
2005Towards Automatic Association of Relevant Unstructured Content with Structured Query ResultsPrasan Roy, IBM Research; et al.
Bhuvan Bamba, Georgia Institute of Technology
Shree Raman, University of Massachusetts Amherst
2004Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XMLQiankun Zhao, Nanyang Technological University; et al.
Mukesh Mohania, IBM Research
Yahiko Kambayashi, Kyoto University
CVPR (Computer Vision)
2019A Theory of Fermat Paths for Non-Line-of-Sight Shape ReconstructionShumian Xin, Carnegie Mellon University; et al.
Kiriakos N. Kutulakos, University of Toronto
Aswin C. Sankaranarayanan, Carnegie Mellon University
Srinivasa G. Narasimhan, Carnegie Mellon University
Ioannis Gkioulekas, Carnegie Mellon University
2018Taskonomy: Disentangling Task Transfer LearningAmir R. Zamir, Stanford University; et al.
William Shen, Stanford University
Leonidas Guibas, Stanford University
Jitendra Malik, University of California Berkeley
Silvio Savarese, Stanford University
2017Densely Connected Convolutional NetworksZhuang Liu, Tsinghua University; et al.
Laurens van der Maaten, Facebook AI Research
Kilian Q. Weinberger, Cornell University
Learning from Simulated and Unsupervised Images through Adversarial TrainingAshish Shrivastava, Apple Inc.; et al.
Oncel Tuzel, Apple Inc.
Josh Susskind, Apple Inc.
Wenda Wang, Apple Inc.
Russ Webb, Apple Inc.
2016Deep Residual Learning for Image RecognitionKaiming He, Microsoft Research; et al.
Shaoqing Ren, Microsoft Research
Jian Sun, Microsoft Research
2015DynamicFusion: Reconstruction and Tracking of Non-rigid Scenes in Real-TimeRichard A. Newcombe, University of Washington; et al.
Steven M. Seitz, University of Washington
2014What Camera Motion Reveals About Shape with Unknown BRDFManmohan Chandraker, NEC Labs America
2013Fast,Accurate Detection of 100,000 Object Classes on a Single MachineThomas Dean, Google; et al.
Mark Segal, Google
Jonathon Shlens, Google
Sudheendra Vijayanarasimhan, Google
Jay Yagnik, Google
2012A Simple Prior-free Method for Non-Rigid Structure-from-Motion FactorizationYuchao Dai, Northwestern Polytechnical University; et al.
Mingyi He, Northwestern Polytechnical University
2011Real-time Human Pose Recognition in Parts from Single Depth ImagesJamie Shotton, Microsoft Research; et al.
Mat Cook, Microsoft Research
Toby Sharp, Microsoft Research
Mark Finocchio, Microsoft Research
Richard Moore, Microsoft Research
Alex Kipman, Microsoft Research
Andrew Blake, Microsoft Research
2010Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data usin...Anders Eriksson & Anton va den Hendel, University of Adelaide
2009Single Image Haze Removal Using Dark Channel PriorKaiming He, The Chinese University of Hong Kong; et al.
Xiaoou Tang, The Chinese University of Hong Kong
2008Beyond Sliding Windows: Object Localization by Efficient Subwindow SearchChistoph H. Lampert, Max Planck Institut; et al.
Thomas Hodmann, Google
Global Stereo Reconstruction under Second Order Smoothness PriorsOliver Woodford, University of Oxford; et al.
Philip Torr, University of Oxford
Andrew Fitzgibbon, Microsoft Research
2007Dynamic 3D Scene Analysis from a Moving VehicleBastian Leibe, ETH Zurich; et al.
Kurt COrnelis, Katholieke Universiteit Leuven
Luc Van Gool, ETH Zurich
2006Putting Objects in PerspectiveDerek Hoiem, Carnegie Mellon University; et al.
Martial Hebert, Carnegie Mellon University
2005Real-Time Non-Rigid Surface DetectionJulien Pilet, École Polytechnique Fédérale de Lausanne; et al.
Pascal Fua, École Polytechnique Fédérale de Lausanne
2004Programmable Imaging using a Digital Micromirror ArrayShree K. Nayar, Columbia University; et al.
Terry E. Boult, University of Colorado
2003Object Class Recognition by Unsupervised Scale-Invariant LearningRob Fergus, University of Oxford; et al.
Andrew Zisserman, University of Oxford
2001Morphable 3D models from videoMatthew Brand, Mitsubishi Electric Research Laboratories
2000Real-Time Tracking of Non-Rigid Objects using Mean ShiftDorin Comaniciu, Siemens Corporate Research; et al.
Peter Meer, Rutgers University
FOCS (Theory)
2019Lower bounds for maximal matchings and maximal independent setsAlkida Balliu, Aalto University; et al.
Juho Hirvonen, Aalto University
Dennis Olivetti, Aalto University
Mikaël Rabie, Aalto University and University Paris Sorbonne
Jukka Suomela, Aalto University
NEEXP ⊆ MIP*Anand Natarajan, California Institute of Technology
John Wright, Massachusetts Institute of Technology
Automating Resolution is NP-HardAlbert Atserias & Moritz Müller, Universitat Politecnica de Catalunya
2018Classical Verification of Quantum ComputationUrmila Mahadev, University of California Berkeley
Pseudorandom Sets in Grassmann Graph have Near-Perfect ExpansionSubhash Khot, New York University; et al.
Muli Safra, Tel-Aviv University
Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic TimeDiptarka Chakraborty, Computer Science Institute of Charles University; et al.
Elazar Goldenberg, The Academic College Of Tel Aviv-Yaffo
Michal Koucký, Computer Science Institute of Charles University
Michael Saks, Rutgers University
2017A dichotomy theorem for nonuniform CSPsAndrei A. Bulatov, Simon Fraser University
The Proof of CSP Dichotomy ConjectureDmitriy Zhuk, Lomonosov Moscow State University
The Matching Problem in General Graphs is in Quasi-NCOla Svensson & Jakub Tarnawski, École polytechnique fédérale de Lausanne
2016Settling the Complexity of Computing Approximate Two-Player Nash EquilibriaAviad Rubinstein, University of California Berkeley
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity LearningRan Raz, Weizmann Institute of Science
2015An average-case depth hierarchy theorem for Boolean circuitsBenjamin Rossman, National Institute of Informatics; et al.
Li-Yang Tan, University of California Berkeley
2014Path Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations an...Yin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology
2013Navigating Central Path with Electrical Flows: from Flows to Matchings,and BackAleksander Mądry, École Polytechnique Fédérale de Lausanne
2012A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2Julia Chuzhoy, Toyota Technological Institute at Chicago
Shi Li, Princeton University
A multi-prover interactive proof for NEXP sound against entangled proversTsuyoshi Ito, NEC Labs America
Thomas Vidick, Massachusetts Institute of Technology
2011A Randomized Rounding Approach to the Traveling Salesman ProblemShayan Oveis Gharan, Stanford University; et al.
Mohit Singh, McGill University
Approximating Graphic TSP by MatchingsTobia M¨o;mke & Ola Svensson, Royal Institute of Technology
A Polylogarithmic-Competitive Algorithm for the k-Server ProblemNikhil Bansal, IBM Research; et al.
Aleksander Mądry, Massachusetts Institute of Technology
Joseph Naor, Technion
2010Subexponential Algorithms for Unique Games and Related ProblemsSanjeev Arora, Princeton University; et al.
David Steurer, Princeton University
Computational Transition at the Uniqueness ThresholdAllan Sly, Microsoft Research
Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke DecompositionsMatthew Andrews, Bell Labs
2008Two Query PCP with Sub-Constant ErrorDana Moshkovitz & Ran Raz, Weizmann Institute of Science
2007Space-Efficient Identity Based Encryption Without PairingsDan Boneh, Stanford University; et al.
Michael Hamburg, Stanford University
2006Settling the Complexity of 2-Player Nash EquilibriumXi Chen, Tsinghua University
Xiaotie Deng, City University of Hong Kong
2005The Unique Games Conjecture,Integrality Gap for Cut Problems and Embeddability of Negative Type Met...Subhash A. Khot, Georgia Institute of Technology
Nisheeth K. Vishnoi, IBM Research
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial TimeFarzad Parvaresh & Alexander Vardy, University of California San Diego
2004Hardness of Approximating the Shortest Vector Problem in LatticesSubhash Khot, Georgia Institute of Technology
Cryptography in NC0Benny Applebaum, Technion; et al.
Eyal Kushilevitz, Technion
2003On the Impossibility of Dimension Reduction in L1Bo Brinkman & Moses Charikar, Princeton University
2002Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String ModelBoaz Barak, Weizmann Institute of Science
Minimizing Congestion in General NetworksHarald Räcke, Paderborn University
A Dichotomy Theorem for Constraints on a Three-Element SetAndrei A. Bulatov, University of Oxford
FSE (Software Engineering)
2019The importance of accounting for real-world labelling when predicting software vulnerabilities Matthieu Jimenez, University of Luxembourg; et al.
Mike Papadakis, University of Luxembourg
Federica Sarro, University College London
Yves Le Le Traon, University of Luxembourg
Mark Harman, University College London and Facebook
2018The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the E...James C. Davis, Virginia Tech; et al.
Francisco Servant, Virginia Tech
Dongyoon Lee, Virginia Tech
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing LeaksShengjian (Daniel) Guo, Virginia Tech; et al.
Chao Wang, University of Southern California
Data Race Detection on Compressed TracesDileep Kini, University of Illinois at Urbana-Champaign; et al.
Mahesh Viswanathan, University of Illinois at Urbana-Champaign
Do Android Taint Analysis Tools Keep Their Promises?Felix Pauck, Paderborn University; et al.
Heike Wehrheim, Paderborn University
An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed SystemsYu Gao, Chinese Academy of Sciences; et al.
Feng Qin, Ohio State University
Chushu Gao, Chinese Academy of Sciences
Dong Wang, Chinese Academy of Sciences
Jun Wei, Chinese Academy of Sciences
Ruirui Huang, Alibaba Group
Li Zhou, Alibaba Group
Yongming Wu, Alibaba Group
Oreo: Detection of Clones in the Twilight ZoneVaibhav Saini, University of California Irvine; et al.
Yadong Lu, University of California Irvine
Pierre Baldi, University of California Irvine
Crista Lopes, University of California Irvine
2017The Power of "Why" and "Why Not": Enriching Scenario Exploration with ProvenanceTim Nelson, Brown University; et al.
Daniel J. Dougherty, Worcester Polytechnic Institute
Shriram Krishnamurthi, Brown University
Understanding Misunderstandings in Source CodeDan Gopstein, New York University; et al.
Yu Yan, Pennsylvania State University
Lois DeLong, New York University
Yanyan Zhuang, University of Colorado
Martin K.-C. Yeh, Pennsylvania State University
Justin Cappos, New York University
Trade-Offs in Continuous Integration: Assurance,Security,and FlexibilityMichael Hilton, Oregon State University; et al.
Timothy Tunnell, University of Illinois at Urbana-Champaign
Darko Marinov, University of Illinois at Urbana-Champaign
Danny Dig, Oregon State University
Cooperative Kernels: GPU Multitasking for Blocking AlgorithmsTyler Sorensen, Imperial College London; et al.
Alastair F. Donaldson, Imperial College London
Fairness Testing: Testing Software for DiscriminationSainyam Galhotra, University of Massachusetts Amherst; et al.
Alexandra Meliou, University of Massachusetts Amherst
Discovering Relational SpecificationsCalvin Smith, University of Wisconsin-Madison; et al.
Aws Albarghouthi, University of Wisconsin-Madison
Automatically Diagnosing and Repairing Error Handling Bugs in CYuchi Tian & Baishakhi Ray, University of Virginia
2016API Code Recommendation Using Statistical Learning from Fine-grained ChangesAnh Tuan Nguyen, Iowa State University; et al.
Mihai Codoban, Microsoft
Hoan Anh Nguyen, Iowa State University
Lily Mast, University of Evansville
Eli Rademacher, Oregon State University
Tien N. Nguyen, Iowa State University
Danny Dig, Oregon State University
Detecting Sensitive Data Disclosure via Bi-directional Text Correlation AnalysisJianjun Huang, Purdue University; et al.
Lin Tan, University of Waterloo
Factors Influencing Code Review Processes in IndustryTobias Baum, Leibniz Universität Hannover; et al.
Kai Niklas, Leibniz Universität Hannover
Kurt Schneider, Leibniz Universität Hannover
Foraging and Navigations Fundamentally: Developers' Predictions of Value and CostDavid Piorkowski, Oregon State University; et al.
Tahmid Nabi, Oregon State University
Scott D. Fleming, University of Memphis
Christopher Scaffidi, Oregon State University
Margaret Burnett, Oregon State University
Multi-Representational Security AnalysisEunsuk Kang, University of California Berkeley; et al.
Daniel Jackson, Massachusetts Institute of Technology
Proteus: Computing Disjunctive Loop Summary via Path Dependency AnalysisXiaofei Xie, Tianjin University; et al.
Yang Liu, Nanyang Technological University
Wei Le, Iowa State University
Xiaohong Li, Tianjin University
Why We Refactor? Confessions of GitHub ContributorsDanilo Silva, Federal University of Minas Gerais; et al.
Marco Tulio Valente, Federal University of Minas Gerais
2015How Practitioners Perceive the Relevance of Software Engineering ResearchDavid Lo, Singapore Management University; et al.
Thomas Zimmermann, Microsoft Research
Effective Test Suites for Mixed Discrete-Continuous Stateflow ControllersReza Matinnejad, University of Luxembourg; et al.
Lionel C. Briand, University of Luxembourg
Thomas Bruckmann, Delphi Automotive Systems
MultiSE: Multi-path Symbolic Execution using Value SummariesKoushik Sen, University of California Berkeley; et al.
Liang Gong, University of California Berkeley
Wontae Choi, University of California Berkeley
Modeling Readability to Improve Unit TestsErmira Daka, University of Sheffield; et al.
Gordon Fraser, University of Sheffield
Jonathan Dorn, University of Virginia
Westley Weimer, University of Virginia
Optimizing energy consumption of GUIs in Android apps: a multi-objective approachMario Linares-Vásquez, College of William and Mary; et al.
Carlos Eduardo Bernal Cárdenas, College of William and Mary
Rocco Oliveto, University of Molise
Massimiliano Di Penta, University of Sannio
Denys Poshyvanyk, College of William and Mary
Measure It? Manage It? Ignore It? Software Practitioners and Technical DebtNeil A. Ernst, Carnegie Mellon University; et al.
Ipek Ozkaya, Carnegie Mellon University
Robert L. Nord, Carnegie Mellon University
Ian Gorton, Carnegie Mellon University
A User-Guided Approach to Program AnalysisRavi Mangal, Georgia Institute of Technology; et al.
Aditya V. Nori, Microsoft Research
Mayur Naik, Georgia Institute of Technology
Users Beware: Preference Inconsistencies AheadFarnaz Behrang, Georgia Institute of Technology; et al.
Alessandro Orso, Georgia Institute of Technology
2014Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case StudyKlaus-Benedikt Schultis, Siemens Corporate Technology; et al.
Daniel Lohmann, Friedrich-Alexander University
Selection and Presentation Practices for Code Example SummarizationAnnie Ying & Martin Robillard, McGill University
Learning Natural Coding ConventionsMiltiadis Allamanis, University of Edinburgh; et al.
Christian Bird, Microsoft Research
Charles Sutton, University of Edinburgh
AI: A Lightweight System for Tolerating Concurrency BugsMingxing Zhang, Tsinghua University; et al.
Shan Lu, University of Wisconsin
Shanxiang Qi, University of Illinois at Urbana-Champaign
Jinglei Ren, Tsinghua University
Weimin Zheng, Tsinghua University
Powering the Static Driver Verifier using CorralAkash Lal & Shaz Qadeer, Microsoft Research
Are Mutants a Valid Substitute for Real Faults in Software Testing?René Just, University of Washington; et al.
Laura Inozemtseva, University of Waterloo
Michael Ernst, University of Washington
Reid Holmes, University of Waterloo
Gordon Fraser, University of Sheffield
2012Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software LibrariesBradley Cossette & Robert Walker, University of Calgary
Scalable Test Data Generation from Multidimensional ModelsEmina Torlak, University of California Berkeley
Assessing the Value of Branches with What-if AnalysisChristian Bird & Thomas Zimmermann, Microsoft Research
2011Proving programs robustSwarat Chaudhuri, Rice University; et al.
Roberto Lublinerman, Pennsylvania State University
Sara Navidpour, Pennsylvania State University
How Do Fixes Become Bugs?Zuoning Yin, University of Illinois at Urbana-Champaign; et al.
Yuanyuan Zhou, University of California San Diego
Shankar Pasupathy, NetApp
Lakshmi Bairavasundaram, NetApp
Proactive Detection of Collaboration ConflictsYuriy Brun, University of Washington; et al.
Michael D. Ernst, University of Washington
David Notkin, University of Washington
2010Staged Concurrent Program AnalysisNishant Sinha & Chao Wang, NEC Labs America
Developer Fluency: Achieving True Mastery in Software ProjectsMinghui Zhou, Peking University
Audris Mockus, Avaya Labs
Creating and evolving developer documentation: understanding the decisions of open source contribut...Barthélémy Dagenais & Martin P. Robillard, McGill University
2009Asserting and checking determinism for multithreaded programsJacob Burnim & Koushik Sen, University of California Berkeley
Darwin: an approach for debugging evolving programsDawei Qi, National University of Singapore; et al.
Zhenkai Liang, National University of Singapore
Kapil Vaswani, Microsoft Research
Graph-based Mining of Multiple Object Usage PatternsTung Thanh Nguyen, Iowa State University; et al.
Nam H. Pham, Iowa State University
Jafar M. Al-Kofahi, Iowa State University
Tien N. Nguyen, Iowa State University
2008Efficient online monitoring of web-service SLAsFranco Raimondi, University College London; et al.
Wolfgang Emmerich, University College London
What makes a good bug report?Nicolas Bettenburg, Saarland University; et al.
Adrian Schröter, University of Victoria
Cathrin Weiss, University of Zurich
Rahul Premraj, Saarland University
Thomas Zimmermann, University of Calgary
2007Globally distributed software development project performance: an empirical analysisNarayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University
Mining specifications of malicious behaviorMihai Christodorescu, University of Wisconsin; et al.
Christopher Kruegel, Vienna University of Technology
Automatic consistency assessment for query results in dynamic environmentsJamie Payton, University of North Carolina at Charlotte; et al.
Gruia-Catalin Roman, Washington University in St. Louis
Object and reference immutability using Java genericsYoav Zibin, Massachusetts Institute of Technology; et al.
Mahmood Ali, Massachusetts Institute of Technology
Shay Artzi, Massachusetts Institute of Technology
Adam Kieżun, Massachusetts Institute of Technology
Michael D. Ernst, Massachusetts Institute of Technology
2006Controlling factors in evaluating path-sensitive error detection techniquesMatthew B. Dwyer, University of Nebraska-Lincoln; et al.
Sebastian Elbaum, University of Nebraska-Lincoln
SYNERGY: a new algorithm for property checkingBhargav S. Gulavani, Indian Institute of Technology; et al.
Yamini Kannan, Microsoft Research
Aditya V. Nori, Microsoft Research
Sriram K. Rajamani, Microsoft Research
2005Automatic Generation of Suggestions for Program InvestigationMartin P. Robillard, McGill University
Context- and path-sensitive memory leak detectionYichen Xie & Alex Aiken, Stanford University
CUTE: a concolic unit testing engine for CKoushik Sen, University of Illinois at Urbana-Champaign; et al.
Gul Agha, University of Illinois at Urbana-Champaign
2004A classification system and analysis for aspect-oriented programsMartin Rinard, Massachusetts Institute of Technology; et al.
Suhabe Bugrara, Massachusetts Institute of Technology
Reasoning about partial goal satisfaction for requirements and design engineeringEmmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain
2003Predicting problems caused by component upgradesStephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology
A Family of Test Adequacy Criteria for Database-Driven ApplicationsGregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh
Eliminating redundancies with a "composition with adaptation" meta-programming techniqueStan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong University
2002Isolating Cause-Effect Chains from Computer ProgramsAndreas Zeller, Saarland University
ICCV (Computer Vision)
2019SinGAN: Learning a Generative Model from a Single Natural ImageTamar Rott Shaham, Israel Institute of Technology; et al.
Tali Dekel, Google
2017Mask R-CNNKaiming He, Facebook AI Research; et al.
Piotr Dollar, Facebook AI Research
Ross Girshick, Facebook AI Research
2015Deep Neural Decision ForestsPeter Kontschieder, Microsoft Research; et al.
Antonio Criminisi, Microsoft Research
Samuel Rota Bulò, Microsoft Research
2013From Large Scale Image Categorization to Entry-Level CategoriesVicente Ordonez, University of North Carolina at Chapel Hill; et al.
Yejin Choi, Stony Brook University
Alexander Berg, University of North Carolina at Chapel Hill
Tamara Berg, University of North Carolina at Chapel Hill
2011Relative AttributesDevi Parikh, Toyota Technological Institute at Chicago
Kristen Grauman, University of Texas at Austin
2009Discriminative models for multi-class object layoutChaitanya Desai, University of California Irvine; et al.
Charless Fowlkes, University of California Irvine
2007Population Shape Regression From Random Design DataBradley Davis, University of North Carolina at Chapel Hill; et al.
Elizabeth Bullitt, University of North Carolina at Chapel Hill
Sarang Joshi, University of Utah
2005Globally Optimal Estimates for Geometric Reconstruction ProblemsFredrik Kahl, Lund University
Didier Henrion, LAAS-CNRS
2003Image-based Rendering using Image-based PriorsAndrew Fitzgibbon, University of Oxford; et al.
Andrew Zisserman, University of Oxford
Image Parsing: Unifying Segmentation,Detection and RecognitionZhuowen Tu, University of California Los Angeles; et al.
Alan L. Yuille, University of California Los Angeles
Song-Chun Zhu, University of California Los Angeles
Detecting Pedestrians using Patterns of Motion and AppearancePaul Viola, Microsoft Research; et al.
Daniel Snow, Mitsubishi Electric Research Laboratories
2001Probabilistic Tracking with Exemplars in a Metric SpaceKentaro Toyama & Andrew Blake, Microsoft Research
The Space of All Stereo ImagesSteven Seitz, University of Washington
1999A Theory of Shape by Space CarvingKiriakos Kutulakos, University of Rochester
Steven Seitz, Carnegie Mellon University
Euclidean Reconstruction and Reprojection up to SubgroupsYi Ma, University of California Berkeley; et al.
Jana Kosecka, University of California Berkeley
Shankar Sastry, University of California Berkeley
1998Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Paramete...Marc Pollefeys, Katholieke Universiteit Leuven; et al.
Luc Van Gool, Katholieke Universiteit Leuven
The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image SequencesPhil Torr, Microsoft Research; et al.
Andrew Zisserman, University of Oxford
ICML (Machine Learning)
2019Challenging Common Assumptions in the Unsupervised Learning of Disentangled RepresentationsFrancesco Locatello ETH Zurich, Max-Planck Institute for Intelligent Systems; et al.
Mario Lucic, Google
Gunnar Rättsch, ETH Zurich
Sylvain Gelly, Google
Bernhard Schötlkopf, Max-Planck Institute for Intelligent Systems
Olivier Bachem, Google
Rates of Convergence for Sparse Variational Gaussian Process RegressionDavid R. Burt, University of Cambridge; et al.
Mark van der Wilk, PROWLER.io
2018Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial ExamplesAnish Athalye, Massachusetts Institute of Technology; et al.
David Wagner, University of California Berkeley
Delayed Impact of Fair Machine LearningLydia T. Liu, University of California Berkeley; et al.
Esther Rolf, University of California Berkeley
Max Simchowitz, University of California Berkeley
Moritz Hardt, University of California Berkeley
2017Understanding Black-box Predictions via Influence FunctionsPang Wei Koh & Percy Liang, Stanford University
2016Dueling Network Architectures for Deep Reinforcement LearningZiyu Wang, Google; et al.
Matteo Hessel, Google
Hado van Hasselt, Google
Marc Lanctot, Google
Nando de Freitas, University of Oxford
Pixel Recurrent Neural NetworksAaron Van den Oord, Google; et al.
Koray Kavukcuoglu, Google
Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs SamplingChristopher De Sa, Stanford University; et al.
Kunle Olukotun, Stanford University
2015Optimal and Adaptive Algorithms for Online BoostingAlina Beygelzimer, Yahoo! Research; et al.
Haipeng Luo, Princeton University
A Nearly-Linear Time Framework for Graph-Structured SparsityChinmay Hegde, Massachusetts Institute of Technology; et al.
Ludwig Schmid, Massachusetts Institute of Technology
2014Understanding the Limiting Factors of Topic Modeling via Posterior Contraction AnalysisJian Tang, Peking University; et al.
XuanLong Nguyen, University of Michigan
Qiaozhu Mei, University of Michigan
Ming Zhang, Peking University
2013Fast Semidifferential-based Submodular Function OptimizationRishabh Iyer, University of Washington; et al.
Jeff Bilmes, University of Washington
Vanishing Component AnalysisRoi Livni, The Hebrew University of Jerusalum; et al.
Sagi Schein, Hewlett-Packard Labs
Hila Nachlieli, Hewlett-Packard Labs
Shai Shalev Shwartz, The Hebrew University of Jerusalum
Amir Globerson, The Hebrew University of Jerusalum
2012Bayesian Posterior Sampling via Stochastic Gradient Fisher ScoringSungjin Ahn, University of California Irvine; et al.
Max Welling, University of California Irvine
2011Computational Rationalization: The Inverse Equilibrium ProblemKevin Waugh, Carnegie Mellon University; et al.
Drew Bagnell, Carnegie Mellon University
2010Hilbert Space Embeddings of Hidden Markov ModelsLe Song, Carnegie Mellon University; et al.
Sajid M. Siddiqi, Google
Geoffrey Gordon, Carnegie Mellon University
Alex Smola, Yahoo! Research
2009Structure preserving embeddingBlake Shaw & Tony Jebara, Columbia University
2008SVM Optimization: Inverse Dependence on Training Set SizeShai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago
2007Information-theoretic metric learningJason V. Davis, University of Texas at Austin; et al.
Prateek Jain, University of Texas at Austin
Suvrit Sra, University of Texas at Austin
Inderjit S. Dhillon, University of Texas at Austin
2006Trading convexity for scalabilityRonan Collobert, NEC Labs America; et al.
Jason Weston, NEC Labs America
Léon Bottou, NEC Labs America
2005A support vector method for multivariate performance measuresThorsten Joachims, Cornell University
1999Least-Squares Temporal Difference LearningJustin A. Boyan, NASA Ames Research Center
ICSE (Software Engineering)
2019Defeating Denial-of-Service Attacks in a Self-Managing N-Variant SystemBest Paper AwardLong PaperJessica Jones, Arizona State University; et al.
Jack Davidson, University of Virginia
Stephanie Forrest, Arizona State University
2018Spatio-Temporal Context Reduction: A Pointer-Analysis- Based Static Approach for Detecting Use-Afte...Hua Yan, University of New South Wales; et al.
Shiping Chen, CSIRO
Jingling Xue, University of New South Wales
Identifying Design Problems in the Source Code: A Grounded TheoryLeonardo Sousa, PUC-Rio; et al.
Willian Oizumi, PUC-Rio
Simone Barbosa, PUC-Rio
Alessandro Garcia, PUC-Rio
Jaejoon Lee, Lancaster University
Marcos Kalinowski, PUC-Rio
Rafael de Mello, PUC-Rio
Baldoino Fonseca, UFAL
Roberto Oliveira, PUC-Rio
Carlos Lucena, PUC-Rio
Rodrigo Paes, PUC-Rio
Static Automated Program Repair for Heap PropertiesRijnard van Tonder & Claire Le Goues, Carnegie Mellon University
Automated Localization for Unreproducible BuildsZhilei Ren, Dalian University of Technology; et al.
Jifeng Xuan, Wuhan University
Zijiang Yang, Western Michigan University
Large-Scale Analysis of Framework-Specific Exceptions in Android AppsLingling Fan, East China Normal University; et al.
Sen Chen, East China Normal University
Guozhu Meng, Chinese Academy of Sciences
Yang Liu, Nanyang Technological University
Lihua Xu, East China Normal University
Geguang Pu, East China Normal University
Zhendong Su, University of California
Generalized Data Structure SynthesisCalvin Loncaric, University of Washington; et al.
Emina Torlak, University of Washington
Traceability in the Wild: Automatically Augmenting Incomplete Trace linksMichael Rath, Technical University Ilmenau; et al.
Jin L. C. Guo, McGill University
Jane Cleland-Huang, University of Notre Dame
Patrick Mätder, Technical University Ilmenau
Towards Optimal Concolic TestingXinyu Wang, Zhejiang University; et al.
Zhenbang Chen, National University of Defense Technology
Peixin Zhang, Zhejiang University
Jingyi Wang, Singapore University of Technology and Design
Yun Lin, National University of Singapore
2017Clone Refactoring with Lambda ExpressionsNikolaos Tsantalis, Concordia University; et al.
Shahriar Rostami, Concordia University
A Grounded Theory of Agile Transitions in PracticeRashina Hoda, The University of Auckland
James Noble Victoria, University of Wellington
Code Defenders: Crowdsourcing Effective Tests and Subtle Mutants with a Mutation Testing GameJosé Miguel Rojas, The University of Sheffield; et al.
Benjamin S. Clegg, The University of Sheffield
Gordon Fraser, The University of Sheffield
Decoding the representation of code in the brain: An fMRI study of code review and expertiseBenjamin Floyd, University of Virginia; et al.
Westley Weimer, University of Virginia
Challenges for Static Analysis of Java Reflection - Literature Review and Empirical StudyDavy Landman, Centrum Wiskunde & Informatica; et al.
Jurgen J. Vinju, Centrum Wiskunde & Informatica
Optimizing Test Placement for Module-Level Regression TestingAugust Shi, University of Illinois at Urbana-Champaign; et al.
Shuvendu K. Lahiri, Microsoft Research
Nikolaj Bjorner, Microsoft Research
Jacek Czerwonka, Microsoft Corporation
2016Efficient Large-Scale Trace Checking Using MapReduceMarcello M. Bersani, Politecnico di Milano; et al.
Carlo Ghezzi, Politecnico di Milano
Srđan Krstić, Politecnico di Milano
Pierluigi San Pietro, Politecnico di Milano
Energy Profiles of Java Collections ClassesSamir Hasan, Auburn University; et al.
Munawar Hafiz, Auburn University
Mohammed Sayagh, Polytechnique Montréal
Bram Adams, Polytechnique Montréal
Abram Hindle, University of Alberta
Feedback-Directed Instrumentation for Deployed JavaScript ApplicationsMagnus Madsen, University of Waterloo; et al.
Esben Andreasen, Aarhus University
Koushik Sen, University of California Berkeley
Anders Møller, Aarhus University
From Word Embeddings to Document Similarities for Improved Information Retrieval in Software Engine...Xin Ye, Ohio University Athens; et al.
Xiao Ma, Ohio University Athens
Razvan Bunescu, Ohio University Athens
Chang Liu, Ohio University Athens
Guiding Dynamic Symbolic Execution toward Unverified Program ExecutionsMaria Christakis, ETH Zurich; et al.
Valentin Wüstholz, ETH Zurich
On the Techniques We Create,the Tools We Build,and Their Misalignments: A Study of KLEEEric F. Rizzi, Grammatech; et al.
Matthew B. Dwyer, University of Nebraska-Lincoln
Termination-Checking for LLVM Peephole OptimizationsDavid Menendez & Santosh Nagarakatte, Rutgers University
VDTest: An Automated Framework to Support Testing for Virtual DevicesTingting Yu, University of Kentucky; et al.
Myra B. Cohen, University of Nebraska-Lincoln
Work Practices and Challenges in Pull-Based Development: The Contributor's PerspectiveGeorgios Gousios, Radboud University Nijmegen; et al.
Alberto Bacchelli, Delft University of Technology
2015Views on Internal and External Validity in Empirical Software EngineeringJanet Siegmund, University of Passau; et al.
Sven Apel, University of Passau
How Much Up-Front? A Grounded theory of Agile ArchitectureMichael Waterman, Specialised Architecture Services Ltd; et al.
George Allan, Victoria University of Wellington
When and Why Your Code Starts to Smell BadMichele Tufano, College of William and Mary; et al.
Gabriele Bavota, Free University of Bozen-Bolzano
Rocco Oliveto, University of Molise
Massimiliano Di Penta, University of Sannio
Andrea De Lucia, University of Salerno
Denys Poshyvanyk, College of William and Mary
Alloy*: A General-Purpose Higher-Order Relational Constraint SolverAleksandar Milicevic, Massachusetts Institute of Technology; et al.
Eunsuk Kang, Massachusetts Institute of Technology
Daniel Jackson, Massachusetts Institute of Technology
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Fa...Mathieu Lavallée & Pierre N. Robillard, Polytechnique Montréal
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive FixesAdrian Nistor, Chapman University; et al.
Cosmin Radoi, University of Illinois at Urbana-Champaign
Shan Lu, University of Chicago
2014A Study and Toolkit for Asynchronous Programming in C#Semih Okur, University of Illinois at Urbana-Champaign; et al.
Danny Dig, Oregon State University
Arie van Deursen, Delft University of Technology
Characterizing and Detecting Performance Bugs for Smartphone ApplicationsYepang Liu, Hong Kong University of Science and Technology; et al.
Shing-Chi Cheung, Hong Kong University of Science and Technology
Coverage Is Not Strongly Correlated with Test Suite EffectivenessLaura Inozemtseva & Reid Holmes, University of Waterloo
Cowboys,Ankle Sprains,and Keepers of Quality: How Is Video Game Development Different from Software...Emerson Murphy-Hill, North Carolina State University; et al.
Nachiappan Nagappan, Microsoft Research
Enhancing Symbolic Execution with VeritestingThanassis Avgerinos, Carnegie Mellon University; et al.
Sang Kil Cha, Carnegie Mellon University
David Brumley, Carnegie Mellon University
Improving Automated Source Code Summarization via an Eye-Tracking Study of ProgrammersPaige Rodeghero, University of Notre Dame; et al.
Paul W. McBurney, University of Notre Dame
Nigel Bosch, University of Notre Dame
Sidney D'Mello, University of Notre Dame
Trading Robustness for Maintainability: An Empirical Study of Evolving C# ProgramsNélio Cacho, Federal University of Rio Grande do Norte; et al.
Thomas Filipe, Federal University of Rio Grande do Norte
Eliezio Soares, Federal University of Rio Grande do Norte
Arthur Cassio, Federal University of Rio Grande do Norte
Rafael Souza, Federal University of Rio Grande do Norte
Israel Garcia, Federal University of Rio Grande do Norte
Eiji Adachi Barbosa, Pontifical Catholic University of Rio de Janeiro
Alessandro Garcia, Pontifical Catholic University of Rio de Janeiro
Understanding JavaScript Event-Based InteractionsSaba Alimadadi, University of British Columbia; et al.
Ali Mesbah, University of British Columbia
Karthik Pattabiraman, University of British Columbia
Unit Test Virtualization with VMVMJonathan Bell & Gail Kaiser, Columbia University
2013Data Clone Detection and Visualization in SpreadsheetsFelienne Hermans, Delft University of Technology; et al.
Martin Pinzger, Delft University of Technology
Arie van Deursen, Delft University of Technology
Interaction-Based Test-Suite MinimizationDale Blue, IBM; et al.
Rachel Tzoref-Brill, IBM Research
Aviad Zlotnick, IBM Research
Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop CloudsWeiyi Shang, Queen's University; et al.
Hadi Hemmati, Queen's University
Bram Adams, Polytechnique Montréal
Ahmed E. Hassan, Queen's University
Patrick Martin, Queen's University
UML in PracticeMarian Petre, Open University
Dual Ecological Measures of Focus in Software DevelopmentDaryl Posnett, University of California Davis; et al.
Premkumar Devanbu, University of California Davis
Vladimir Filkov, University of California Davis
Automatic patch generation learned from human-written patchesDongsun Kim, Hong Kong University of Science and Technology; et al.
Jaewoo Song, Hong Kong University of Science and Technology
Sunghun Kim, Hong Kong University of Science and Technology
2012Amplifying Tests to Validate Exception Handling CodePingyu Zhang & Sebastian Elbaum, University of Nebraska-Lincoln
A Tactic-Centric Approach for Automating Traceability of Quality ConcernsMehdi Mirakhorli, DePaul University; et al.
Jane Cleland-Huang, DePaul University
Murat Cinar, DePaul University
Using Dynamic Analysis to Discover Polynomial and Array InvariantsThanhVu Nguyen, University of New Mexico; et al.
Westley Weimer, University of New Mexico
Stephanie Forrest, University of New Mexico
Automated Detection of Client-State Manipulation VulnerabilitiesAnders Møller & Mathias Schwarz, Aarhus University
Understanding Integer Overflow in C/C++Will Dietz, University of Illinois at Urbana-Champaign; et al.
John Regehr, University of Utah
Vikram Adve, University of Illinois at Urbana-Champaign
How Do Professional Developers Comprehend Software?Tobias Roehm, Technische Universität München; et al.
Rainer Koschke, University of Bremen
Walid Maalej, Technische Universität München
Partial Models: Towards Modeling and Reasoning with UncertaintyMichalis Famelis, University of Toronto; et al.
Marsha Chechik, University of Toronto
2011Run-Time Efficient Probabilistic Model CheckingAntonio Filieri, Politecnico di Milano; et al.
Giordano Tamburrelli, Politecnico di Milano
Verifying Multi-threaded Software using SMT-based Context-Bounded Model CheckingLucas Cordeiro & Bernd Fischer, University of Southampton
Programs,tests,and oracles: the foundations of testing revisitedMatt Staats, University of Minnesota; et al.
Mats P.E. Heimdahl, University of Minnesota
On-demand Feature Recommendations Derived from Mining Public Product DescriptionsHoratiu Dumitru, DePaul University; et al.
Negar Hariri, DePaul University
Jane Cleland-Huang, DePaul University
Bamshad Mobasher, DePaul University
Carlos Castro-Herrera, DePaul University
Mehdi Mirakhorli, DePaul University
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity,Quality,and Pro...Narayan Ramasubbu, Singapore Management University; et al.
Rajesh Krishna Balan, Singapore Management University
James D. Herbsleb, Carnegie Mellon University
2010Collaborative Reliability Prediction of Service-Oriented SystemsZibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong
A Degree-of-Knowledge Model to Capture Source Code FamiliarityThomas Fritz, University of British Columbia; et al.
Gail C. Murphy, University of British Columbia
Emerson Murphy-Hill, University of British Columbia
A Machine Learning Approach for Tracing Regulatory Codes to Product Specific RequirementsJane Cleland-Huang, DePaul University; et al.
John Emenecker, DePaul University
Marek Gibiec, DePaul University
A Cut-off Approach for Bounded Verification of Parameterized SystemsQiusong Yang & Mingshu Li, Chinese Academy of Sciences
Test Generation through Programming in UDITAMilos Gligoric, University of Illinois at Urbana-Champaign; et al.
Vilas Jagannath, University of Illinois at Urbana-Champaign
Sarfraz Khurshid, University of Texas at Austin
Viktor Kuncak, École Polytechnique Fédérale de Lausanne
Darko Marinov, University of Illinois at Urbana-Champaign
2009Effective Static Deadlock DetectionMayur Naik, Intel Research; et al.
Koushik Sen, University of California Berkeley
David Gay, Intel Research
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows VistaChristian Bird, University of California Davis; et al.
Premkumar Devanbu, University of California Davis
Harald Gall, University of Zurich
Brendan Murphy, Microsoft Research
How We Refactor,and How We Know ItEmerson Murphy-Hill, Portland State University; et al.
Andrew P. Black, Portland State University
Automatically finding patches using genetic programmingWestley Weimer, University of Virginia; et al.
Claire Le Goues, University of Virginia
Stephanie Forrest, University of New Mexico
Invariant-Based Automatic Testing of AJAX User InterfacesAli Mesbah & Arie van Deursen, Delft University of Technology
2008Recommending adaptive changes for framework evolutionBarthélémy Dagenais & Martin P. Robillard, McGill University
Precise memory leak detection for java software using container profilingGuoqing Xu & Atanas Rountev, Ohio State University
Debugging reinvented: asking and answering why and why not questions about program behaviorAndrew J. Ko & Brad A. Myers, Carnegie Mellon University
The effect of program and model structure on mc/dc test adequacy coverageAjitha Rajan, University of Minnesota; et al.
Mats P.E. Heimdahl, University of Minnesota
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental ApproachJoseph Ruthruff, University of Nebraska-Lincoln; et al.
J. David Morgenthaler, Google
Sebastian Elbaum, University of Nebraska-Lincoln
Gregg Rothermel, University of Nebraska-Lincoln
2007Tracking Code Clones in Evolving SoftwareEkwa Duala-Ekoko & Martin P. Robillard, McGill University
Predicting Faults from Cached HistorySunghun Kim, Massachusetts Institute of Technology; et al.
E. James Whitehead Jr., University of California Santa Cruz
Andreas Zeller, Saarland University
Matching and Merging of Statecharts SpecificationsShiva Nejati, University of Toronto; et al.
Marsha Chechik, University of Toronto
Steve Easterbrook, University of Toronto
Pamela Zave, AT&T Laboratories
Refactoring for Parameterizing Java ClassesAdam Kiezun, Massachusetts Institute of Technology; et al.
Frank Tip, IBM Research
Robert M. Fuhrer, IBM Research
2006Model-Based Development of Dynamically Adaptive SoftwareJi Zhang & Betty H.C. Cheng, Michigan State University
Who Should Fix This Bug?John Anvik, University of British Columbia; et al.
Gail C. Murphy, University of British Columbia
2005Data Structure Repair Using Goal-Directed ReasoningBrian Demsky & Martin Rinard, Massachusetts Institute of Technology
Using Structural Context to Recommend Source Code ExamplesReid Holmes & Gail Murphy, University of British Columbia
Is Mutation an Appropriate Tool for Testing Experiments?James Andrews, University of Western Ontario; et al.
Yvan Labiche, Carleton University
Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Per...Andrew Ko, Carnegie Mellon University; et al.
Brad Myers, Carnegie Mellon University
2004SNIAFL: Towards a Static Non-Interactive Approach to Feature LocationWei Zhao, Peking University; et al.
Yin Liu, Peking University
Jiasu Sun, Peking University
Fuqing Yang, Peking University
An Empirical Study of Software Reuse vs. Defect-Density and StabilityParastoo Mohagheghi, Ericsson; et al.
Ole M. Killi, Norwegian University of Science and Technology
Henrik Schwarz, Norwegian University of Science and Technology
Static Checking of Dynamically Generated Queries in Database ApplicationsCarl Gould, University of California Davis; et al.
Premkumar Devanbu, University of California Davis
A Tool for Writing and Debugging Algebraic SpecificationsJohannes Henkel & Amer Diwan, University of Colorado
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized SystemsRohit Khare & Richard N. Taylor, University of California Irvine
2003Precise Dynamic Slicing AlgorithmsXiangyu Zhang, University of Arizona; et al.
Youtao Zhang, University of Arizona
Modular Verification of Software Components in CSagar Chaki, Carnegie Mellon University; et al.
Alex Groce, Carnegie Mellon University
Somesh Jha, University of Wisconsin
Helmut Veith, Technische Universität Wien
IJCAI (Artificial Intelligence)
2019Boosting for Comparison-Based LearningMichaël Perrot, Max-Planck Institute for Intelligent Systems
Ulrike von Luxburg, Max-Planck Institute for Intelligent Systems and University of Tubingen
2018SentiGAN: Generating Sentimental Texts via Mixture Adversarial NetworksKe Wang & Xiaojun Wan, Peking University
Reasoning about Consensus when Opinions Diffuse through Majority DynamicsVincenzo Auletta, University of Salerno; et al.
Gianluigi Greco, University of Calabria
R-SVM+: Robust Learning with Privileged InformationXue Li, Wuhan University; et al.
Chang Xu, University of Sydney
Yipeng Zhang, Wuhan University
Lefei Zhang, Wuhan University
Dacheng Tao, University of Sydney
From Conjunctive Queries to Instance Queries in Ontology-Mediated QueryingCristina Feier, University of Bremen; et al.
Frank Wolte, University of Liverpool
What game are we playing? End-to-end learning in normal and extensive form gamesChun Kai Ling, Carnegie Mellon University; et al.
J. Zico Kolter, Carnegie Mellon University
Commonsense Knowledge Aware Conversation Generation with Graph AttentionHao Zhou, Tsinghua University; et al.
Minlie Huang, Tsinghua University
Haizhou Zhao, Sogou Inc.
Jingfang Xu, Sogou Inc.
Xiaoyan Zhu, Tsinghua University
A Degeneracy Framework for Graph SimilarityGiannis Nikolentzos, École Polytechnique; et al.
Stratis Limnios, École Polytechnique
Michalis Vazirgiannis, École Polytechnique
2017Foundations of Declarative Data Analysis Using Limit Datalog ProgramsMark Kaminski, University of Oxford; et al.
Egor V. Kostylev, University of Oxford
Boris Motik, University of Oxford
Ian Horrocks, University of Oxford
2016Hierarchical Finite State Controllers for Generalized PlanningJavier Segovia, Universitat Pompeu Fabra; et al.
Anders Jonsson, Universitat Pompeu Fabra
2015Recursive Decomposition for Nonconvex OptimizationAbram L. Friesen & Pedro Domingos, University of Washington
Bayesian Active Learning for Posterior EstimationKirthevasan Kandasamy, Carnegie Mellon University; et al.
Barnabas Poczos, Carnegie Mellon University
2013Flexibility and Decoupling in the Simple Temporal ProblemMichel Wilson, Delft University of Technology; et al.
Cees Witteveen, Delft University of Technology
Bob Huisman, Delft University of Technology
Bayesian Optimization in High Dimensions via Random EmbeddingsZiyu Wang, University of British Columbia; et al.
Frank Hutter, Freiberg University
David Matheson, University of British Columbia
Nando de Freitas, University of British Columbia
2011Nested Rollout Policy Adaptation for Monte Carlo Tree SearchChristopher D. Rosin, Parity Computing
Unweighted Coalitional Manipulation Under the Borda Rule is NP-HardNadja Betzler, Technische Universität Berlin; et al.
Gerhard J. Woeginger, Technische Universität Eindhoven
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean SpacesRoman Kontchakov, Birkbeck College London; et al.
Ian Pratt-Hartmann, University of Manchester
Michael Zakharyaschev, Birkbeck College London
2009Learning Conditional Preference Networks with QueriesFrederic Koriche, Université Montpellier II
Bruno Zanuttini, Université de Caen Basse-Normandie
Consequence-Driven Reasoning for Horn SHIQ OntologiesYevgeny Kazakov, University of Oxford
2007Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian NetworksMaleeha Qazi, Siemens Medical Solutions; et al.
Sriram Krishnan, Siemens Medical Solutions
Romer Rosales, Siemens Medical Solutions
Harald Steck, Siemens Medical Solutions
R. Bharat Rao, Siemens Medical Solutions
Don Polderman, Erasmus University Medical Center
Dhanalakshmi Chandrasekaran, No Affiliation
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Prog...Luc Mercier & Pascal Van Hentenryck, Brown University
Building Structure into Local Search for SATDuc Nghia Pham, Griffith University; et al.
Abdul Sattar, Griffith University
2005Learning Coordination ClassifiersYuhong Guo, University of Alberta; et al.
Dale Schuurmans, University of Alberta
Solving CheckersJonathan Schaeffer, University of Alberta; et al.
Neil Burch, University of Alberta
Akihiro Kishimoto, University of Alberta
Martin Muller, University of Alberta
Robert Lake, University of Alberta
Paul Lu, University of Alberta
Steve Sutphen, University of Alberta
A Probabilistic Model of Redundancy in Information ExtractionDoug Downey, University of Washington; et al.
Stephen Soderland, University of Washington
2003Thin Junction Tree Filters for Simultaneous Localization and MappingMark A. Paskin, University of California Berkeley
Approximating Game-Theoretic Optimal Strategies for Full-scale PokerDarse Billings, University of Alberta; et al.
Aaron Davidson, University of Alberta
Robert Holte, University of Alberta
Jonathan Schaeffer, University of Alberta
Terence Schauenberg, University of Alberta
Duane Szafron, University of Alberta
2001Complexity Results for Structure-Based CausalityThomas Eiter & Thomas Lukasiewicz, Vienna University of Technology
1999A Distributed Case-Based Reasoning Application for Engineering Sales SupportIan Watson, University of Salford
Dan Gardingen, Western Air
Learning in Natural LanguageDan Roth, University of Illinois at Urbana-Champaign
1997Translingual Information Retrieval: A Comparative EvaluationJaime G. Carbonell, Carnegie Mellon University; et al.
Robert E. Frederking, Carnegie Mellon University
Ralf D. Brown, Carnegie Mellon University
Yibing Geng, Carnegie Mellon University
Danny Lee, Carnegie Mellon University
Object Identification in a Bayesian ContextTimothy Huang & Stuart Russell, University of California Berkeley
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolog...Fangzhen Lin, The Hongkong University of Science and Technology
INFOCOM (Networking)
2019RF-Mehndi: A Fingertip Profiled RF IdentifierCui Zhao, Jiaotong University; et al.
Han Ding, Jiaotong University
Jinsong Han, Zhejiang University and Institute of Cyber Security Research
Wei Xi, Jiaotong University
Ting Liu, Jiaotong University
Ruowei Gui, Jiaotong University
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable ChannelsGuocong Quan, Ohio State University; et al.
Atilla Eryilmaz, Ohio State University
Combinatorial Sleeping Bandits with Fairness ConstraintsFengjiao Li, Temple University; et al.
Bo Ji, Temple University
2018Understanding Ethereum via Graph AnalysisTing Chen, University of Electronic Science and Technology of China; et al.
Zihao Li, University of Electronic Science and Technology of China
Jiachi Chen, Hong Kong Polytechnic University
Xiaoqi Li, Hong Kong Polytechnic University
Xiapu Luo, Hong Kong Polytechnic University
Xiaodong Lin, Wilfrid Laurier University
Xiaosong Zhang, University of Electronic Science and Technology of China
WiFED: WiFi Friendly Energy Delivery with Distributed BeamformingSubhramoy Mohanti, Northeastern University; et al.
M. Yousof Naderi, Northeastern University
Berk Canberk, Istanbul Technical University
Kaushik Chowdhury, Northeastern University
Optimizing Age of Information in Wireless Networks with Throughput ConstraintsIgor Kadota, Massachusetts Institute of Technology; et al.
Eytan Modiano, Massachusetts Institute of Technology
2017One Step at a Time: Optimizing SDN Upgrades in ISP NetworksKonstantinos Poularakis, Yale University; et al.
Georgios Smaragdakis, Massachusetts Institute of Technology
Leandros Tassiulas, Yale University
2016Heavy-Ball: A New Approach to Tame Delay and Convergence in Wireless Network OptimizationJia Liu, Ohio State University; et al.
Ness B. Shroff, Ohio State University
Elizabeth Serena Bentley, Air Force Research Laboratory
2015The Power of Slightly More than One Sample in Randomized Load BalancingLei Ying, Arizona State University; et al.
Xiaohan Kang, Arizona State University
2014Joint Static and Dynamic Traffic Scheduling in Data Center NetworksZizhong Cao, Polytechnic Institute of New York University; et al.
T. V. Lakshman, Bell Labs
Performance Evaluation and Asymptotics for Content Delivery NetworksVirag Shah & Gustavo de Veciana, University of Texas at Austin
2013On the Steady-State of Cache NetworksElisha J. Rosensweig, University of Massachusetts Amherst; et al.
Jim Kurose, University of Massachusetts Amherst
2012Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying frameworkCarlee Joe-Wong, Princeton University; et al.
Tian Lan, George Washington University
Mung Chiang, Princeton University
2011Dynamic right-sizing for power-proportional data centersMinghong Lin, California Institute of Technology; et al.
Lachlan Andrew, Swinburne University of Technology
Eno Thereska, Microsoft Research
2010On the Feasibility and Efficacy of Protection Routing in IP NetworksKin-Wah Kwong, University of Pennsylvania; et al.
Roch Guérin, University of Pennsylvania
Zhi-Li Zhang, University of Minnesota
2009Queuing Network Models for Multi-Channel P2P Live Streaming SystemsDi Wu, Polytechnic Institute of New York University; et al.
Keith W. Ross, Polytechnic Institute of New York University
2008Theoretical Results on Base Station Movement Problem for Sensor NetworksYi Shi & Y. Thomas Hou, Virginia Tech
On the Feasibility of the Link Abstraction in (Rural) Mesh NetworksDattatraya Gokhal, Indian Navy; et al.
Kameswari Chebrolu, Indian Institute of Technology
Bhaskaran Rama, Indian Institute of Technology
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless ...Changhee Joo, Ohio State University; et al.
Ness B. Shroff, Ohio State University
2007Disruption free topology reconfiguration in OSPF networksPierre Francois, Université catholique de Louvain; et al.
Olicier Bonaventure, Université catholique de Louvain
2006Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global PerspectiveGaurav Sharma, Purdue University; et al.
Ness Shroff, Purdue University
2005Perfect Simulation and Stationarity of a Class of Mobility ModelsJean-Yves Le Boude, École Polytechnique Fédérale de Lausanne
Milan Vojnović, Microsoft Research
2004Throughput-Delay Trade-Off in Wireless NetworksAbbas El Gamal, Stanford University; et al.
Balaji Prabhakar, Stanford University
Devavrat Shah, Stanford University
2003User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data NetworksSem Borst, Bell Labs
2002Priority Service and Max-Min FairnessPeter Marbach, University of Toronto
2001Mobility increases the capacity of ad-hoc wireless networksMatthias Grossglauser, AT&T Laboratories
David Tse, University of California Berkeley
2000The Chaotic Nature of TCP Congestion ControlAndrás Veres, Ericsson
Miklós Boda, Ericsson Research
1999Bandwidth Sharing: Objectives and AlgorithmsLaurent Massoulié, Microsoft Research
James Robert, France Telecom
1998Effective Bandwidths in Wireless Networks with Multiuser ReceiversDavid Tse, University of California Berkeley
Stephen Hanly, University of Melbourne
1996An algorithm for multicast tree generation in networks with asymmetric linksRam Ramanathan, BBN Technologies
KDD (Data Mining)
2019Network Density of StatesKun Dong, Cornell; et al.
David Bindel, Cornell
2018Adversarial Attacks on Neural Networks for Graph DataDaniel Zügner, Technical University of Munich; et al.
Stephan Günnemann, Technical University of Munich
2017Accelerating Innovation Through Analogy MiningTom Hope, Hebrew University of Jerusalem; et al.
Aniket Kittur, Carnegie Mellon University
Dafna Shahaf, Hebrew University of Jerusalem
2016FRAUDAR: Bounding Graph Fraud in the Face of CamouflageBryan Hooi, Carnegie Mellon University; et al.
Alex Beutel, Carnegie Mellon University
Neil Shah, Carnegie Mellon University
Kijung Shin, Carnegie Mellon University
Christos Faloutsos, Carnegie Mellon University
2015Efficient Algorithms for Public-Private Social NetworksFlavio Chierichetti, Sapienza University of Rome; et al.
Ravi Kumar, Google
Silvio Lattanzi, Google
Vahab Mirrokni, Google
2014Reducing the Sampling Complexity of Topic ModelsAaron Li, Carnegie Mellon University; et al.
Sujith Ravi, Google
Alexander Smola, Carnegie Mellon University
2013Simple and Deterministic Matrix SketchingEdo Liberty, Yahoo! Research
2012Searching and Mining Trillions of Time Series Subsequences under Dynamic Time WarpingThanawin Rakthanmanon, University of California Riverside; et al.
Abdullah Mueen, University of California Riverside
Gustavo Batista, University of São Paulo
Brandon Westover, Brigham and Women's Hospital
Qiang Zhu, University of California Riverside
Jesin Zakaria, University of California Riverside
Eamonn Keogh, University of California Riverside
2011Leakage in Data Mining: Formulation,Detection,and AvoidanceShachar Kaufman, Tel-Aviv University; et al.
Claudia Perlich, Media6Degrees
2010Connecting the dots between news articlesDafna Shahaf & Carlos Guestrin, Carnegie Mellon University
Large linear classification when data cannot fit in memoryHsiang-Fu Yu, National Taiwan University; et al.
Kai-Wei Chang, National Taiwan University
Chih-Jen Lin, National Taiwan University
2009Collaborative Filtering with Temporal DynamicsYehuda Koren, Yahoo! Research
2008Fastanova: an efficient algorithm for genome-wide association studyXiang Zhang, University of North Carolina at Chapel Hill; et al.
Wei Wang, University of North Carolina at Chapel Hill
2007Predictive discrete latent factor models for large scale dyadic dataDeepak Agarwal & Srujana Merugu, Yahoo! Research
2006Training linear SVMs in linear timeThorsten Joachims, Cornell University
2005Graphs over time: densification laws,shrinking diameters and possible explanationsJure Leskovec, Carnegie Mellon University; et al.
Christos Faloutsos, Carnegie Mellon University
2004A probabilistic framework for semi-supervised clusteringSugato Basu, University of Texas at Austin; et al.
Raymond J. Mooney, University of Texas at Austin
2003Maximizing the spread of influence through a social networkDavid Kempe, Cornell University; et al.
Éva Tardos, Cornell University
2002Pattern discovery in sequences under a Markov assumptionDarya Chudova & Padhraic Smyth, University of California Irvine
2001Robust space transformations for distance-based operationsEdwin M. Knorr, University of British Columbia; et al.
Ruben H. Zamar, University of British Columbia
2000Hancock: a language for extracting signatures from data streamsCorinna Cortes, AT&T Laboratories; et al.
Daryl Pregibon, AT&T Laboratories
Anne Rogers, AT&T Laboratories
1999MetaCost: a general method for making classifiers cost-sensitivePedro Domingos, Universidade Técnica de Lisboa
1998Occam's Two Razors: The Sharp and the BluntPedro Domingos, Universidade Técnica de Lisboa
1997Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Dis...Foster Provost & Tom Fawcett, NYNEX Science and Technology
MOBICOM (Mobile)
2019eBP: A Wearable System For Frequent and Comfortable Blood Pressure Monitoring From User’s EarNam Bui, University of Colorado Boulder; et al.
Jessica Jacqueline Barnitz, University of Colorado Boulder
Phuc Nguyen, University of Colorado Boulder
Hoang Truong, University of Colorado Boulder
Taeho Kim, University of Colorado Boulder
Anh Nguyen, University of Colorado Boulder
Zhanan Zou, University of Colorado Boulder
Nicholas Farrow, University of Colorado Boulder
Jianliang Xiao, University of Colorado Boulder
Robin Deterding, Children's Hospital Colorado
Thang Dinh, Virginia Commonwealth University
Tam Vu, University of Colorado Boulder
FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device InteractionSangeun Oh, KAIST; et al.
Sunjae Lee, KAIST
Kilho Lee, KAIST
Dae R. Jeong, KAIST
Steven Y. Ko, University at Buffalo and The State University of New York
Insik Shin, KAIST
2018SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE NetworksMehrdad Moradi, University of Michigan; et al.
Eugene Chai, NEC Labs America
Sampath Rangarajan, NEC Labs America
Z. Morley Mao, University of Michigan
2017WEBee: Physical-Layer Cross-Technology Communication via EmulationZhijun Li & Tian He, University of Minnesota
2015CAreDroid: Adaptation Framework for Android ContextAware ApplicationsSalma Elmalaki, University of California Los Angeles; et al.
Mani Srivastava, University of California Los Angeles
2014Tagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS DevicesLei Yang, Tsinghua University; et al.
Xiang-Yang Li, Illinois Institute of Technology
Chaowei Xiao, Tsinghua University
Mo Li, Nanyang Technological University
Yunhao Liu, Tsinghua University
2013Whole-Home Gesture Recognition Using Wireless SignalsQifan Pu, University of Washington; et al.
Shyamnath Gollakota, University of Washington
Shwetak Patel, University of Washington
2012Distinguishing Users with Capacitative Touch CommunicationTam Vu, Rutgers University; et al.
Simon Gao, Rutgers University
Marco Gruteser, Rutgers University
Richard Howard, Rutgers University
Janne Lindqvist, Rutgers University
Predag Spasojevic, Rutgers University
Jeffrey Walling, Rutgers University
2011E-MiLi: Energy-Minimizing Idle Listening in Wireless NetworksXinyu Zhang & Kang G. Shin, University of Michigan
Detecting Driver Phone Use Leveraging Car SpeakersJie Yang, Stevens Institute of Technology; et al.
Gayathri Chandrasekaran, Rutgers University
Tam Vu, Stevens Institute of Technology
Hongbo Liu, Stevens Institute of Technology
Nicolae Cecan, Rutgers University
Yingying Chen, Stevens Institute of Technology
Marco Gruteser, Rutgers University
Richard P. Martin, Rutgers University
2010The κ factor: inferring protocol performance using inter-link reception correlationKannan Srinivasan, Stanford University; et al.
Jung Il Choi, Stanford University
Tahir Azim, Stanford University
Edward S. Kim, University of Southern California
Philip Levis, Stanford University
Bhaskar Krishnamachari, University of Southern California
2009CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data PathVivek Shrivastava, University of Wisconsin; et al.
Shravan Rayanchu, University of Wisconsin
Suman Banerjee, University of Wisconsin
Srinivasan Keshav, University of Waterloo
Konstantina Papagiannaki, Intel Research
Arunesh Mishra, Google
NeurIPS (Machine Learning)
2019Distribution-Independent PAC Learning of Halfspaces with Massart NoiseIlias Diakonikolas, University of Southern California; et al.
Christos Tzamos, University of Wisconsin-Madison
2018Non-delusional Q-learning and Value-iterationTyler Lu, Google AI; et al.
Craig Boutilier, Google AI
Optimal Algorithms for Non-Smooth Distributed Optimization in NetworksKevin Scaman, Huawei Noah’s Ark Lab; et al.
Sébastien Bubeck, Microsoft Research
Yin Tat Lee, Microsoft Research and University of Washington
Laurent Massoulié, INRIA and MSR-INRIA Joint Centre
Nearly Tight Sample Complexity Bounds for Learning Mixtures of Gaussians via Sample Compression Sch...Hassan Ashtiani, McMaster University and Vector Institute; et al.
Nick Harvey, University of British Columbia
Christopher Liaw, University of British Columbia
Abbas Mehrabian, McGill University
Yaniv Plan, University of British Columbia
Neural Ordinary Differential EquationsTian Qi Chen, University of Toronto and Vector Institute; et al.
Jesse Bettencourt, University of Toronto and Vector Institute
David Duvenaud, University of Toronto and Vector Institute
2017Safe and Nested Subgame Solving for Imperfect-Information GamesNoam Brown & Tuomas Sandholm, Carnegie Mellon University
Variance-based Regularization with Convex ObjectivesHongseok Namkoong & John Duchi, Stanford University
A Linear-Time Kernel Goodness-of-Fit TestWittawat Jitkrittum, University College London; et al.
Zoltan Szabo, École Polytechnique
Kenji Fukumizu, The Institute of Statistical Mathematics
Arthur Gretton, University College London
2016 Value Iteration NetworksAviv Tamar, University of California Berkeley; et al.
Garrett Thomas, University of California Berkeley
Sergey Levine, University of California Berkeley
Pieter Abbeel, University of California Berkeley
2015Competitive Distribution Estimation: Why is Good-Turing GoodAlon Orlitsky & Ananda Suresh, University of California San Diego
Fast Convergence of Regularized Learning in Games »Vasilis Syrgkanis, Microsoft Research; et al.
Haipeng Luo, Princeton University
Robert Schapire, Microsoft Research
2014Asymmetric LSH (ALSH) for Sublinear Time Maximum Inner Product Search (MIPS)Anshumali Shrivastava, Cornell University
Ping Li, Rutgers University
A* SamplingChristopher Maddison, University of Toronto; et al.
Tom Minka, Microsoft Research
2013A memory frontier for complex synapsesSubhaneil Lahiri & Surya Ganguli, Stanford University
Submodular Optimization with Submodular Cover and Submodular Knapsack ConstraintsRishabh Iyer & Jeff Bilmes, University of Washington
Scalable Influence Estimation in Continuous-Time Diffusion NetworksNan Du, Georgia Tech; et al.
Manuel Gomez-Rodriguez, Max-Planck Institute for Intelligent Systems
Hongyuan Zha, Georgia Tech
NSDI (Networking)
2019Datacenter RPCs can be General and FastAnuj Kalia, Carnegie Mellon University; et al.
David Andersen, Carnegie Mellon University
2018NetChain: Scale-Free Sub-RTT CoordinationXin Jin, Johns Hopkins University; et al.
Haoyu Zhang, Princeton University
Nate Foster, Cornell University
Jeongkeun Lee, Barefoot Networks
Robert Soulé, Università della Svizzera italiana
Changhoon Kim, Barefoot Networks
Ion Stoica, University of California Berkeley
2017mOS: A Reusable Networking Stack for Flow Monitoring MiddleboxesMuhammad Asim Jamshed, KAIST; et al.
Donghwi Kim, KAIST
Dongsu Han, KAIST
KyoungSoo Park, KAIST
2016Passive Wi-Fi: Bringing Low Power to Wi-Fi TransmissionsBryce Kellogg, University of Washington; et al.
Shyamnath Gollakota, University of Washington
Joshua R. Smith, University of Washington
2015The Design and Implementation of Open vSwitchBen Pfaff, VMware; et al.
Teemu Koponen, VMware
Ethan J. Jackson, VMware
Andy Zhou, VMware
Jarno Rajahalme, VMware
Jesse Gross, VMware
Alex Wang, VMware
Jonathan Stringer, VMware
Pravin Shelar, VMware
Keith Amidon, Awake Networks
Martín Casado, VMware
Queues Don't Matter When You Can JUMP Them!Matthew P. Grosvenor, University of Cambridge; et al.
Ionel Gog, University of Cambridge
Robert N. M. Watson, University of Cambridge
Andrew W. Moore, University of Cambridge
Steven Hand, University of Cambridge
Jon Crowcroft, University of Cambridge
Designing Distributed Systems Using Approximate Synchrony in Data Center NetworksDan R. K. Ports, University of Washington; et al.
Vincent Liu, University of Washington
Naveen Kr. Sharma, University of Washington
Arvind Krishnamurthy, University of Washington
2014Software Dataplane VerificationMihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne
2013A Fault-Tolerant Engineered NetworkVincent Liu, University of Washington; et al.
Arvind Krishnamurthy, University of Washington
Thomas Anderson, University of Washington
Embassies: Radically Refactoring the WebJon Howell, Microsoft Research; et al.
John R. Douceur, Microsoft Research
2012Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingMatei Zaharia, University of California Berkeley; et al.
Tathagata Das, University of California Berkeley
Ankur Dave, University of California Berkeley
Justin Ma, University of California Berkeley
Murphy McCauley, University of California Berkeley
Michael J. Franklin, University of California Berkeley
Scott Shenker, University of California Berkeley
Ion Stoica, University of California Berkeley
2011ServerSwitch: A Programmable and High Performance Platform for Data Center NetworksGuohan Lu, Microsoft Research; et al.
Yulong Li, Microsoft Research
Zhiqiang Zhou, Tsinghua University
Tong Yuan, Microsoft Research
Haitao Wu, Microsoft Research
Yongqiang Xiong, Microsoft Research
Rui Gao, Microsoft Research
Yongguang Zhang, Microsoft Research
Design,Implementation and Evaluation of Congestion Control for Multipath TCPDamon Wischik, University College London; et al.
Adam Greenhalgh, University College London
Mark Handley, University College London
2010Reverse tracerouteEthan Katz-Bassett, University of Washington; et al.
Vijay Kumar Adhikari, University of Minnesota
Colin Scott, University of Washington
Justine Sherry, University of Washington
Peter van Wesep, University of Washington
Thomas Anderson, University of Washington
Arvind Krishnamurthy, University of Washington
2009TrInc: Small Trusted Hardware for Large Distributed SystemsDave Levin, University of Maryland; et al.
Jacob R. Lorch, Microsoft Research
Thomas Moscibroda, Microsoft Research
Sora: High Performance Software Radio Using General Purpose Multi-core ProcessorsKun Tan, Microsoft Research; et al.
Ji Fang, Beijing Jiaotong University
He Liu, Tsinghua University
Yusheng Ye, Tsinghua University
Shen Wang, Tsinghua University
Yongguang Zhang, Microsoft Research
Haitao Wu, Microsoft Research
Wei Wang, Microsoft Research
Geoffrey M. Voelker, University of California San Diego
2008Remus: High Availability via Asynchronous Virtual Machine ReplicationBrendan Cully, University of British Columbia; et al.
Dutch Meyer, University of British Columbia
Mike Feeley, University of British Columbia
Norm Hutchinson, University of British Columbia
Andrew Warfield, University of British Columbia
Consensus Routing: The Internet as a Distributed SystemJohn P. John, University of Washington; et al.
Arvind Krishnamurthy, University of Washington
Thomas Anderson, University of Washington
Arun Venkataramani, University of Massachusetts Amherst
2007Life,Death,and the Critical Transition: Finding Liveness Bugs in Systems CodeCharles Killian, University of California San Diego; et al.
Ranjit Jhala, University of California San Diego
Amin Vahdat, University of California San Diego
2006Experience with an Object Reputation System for Peer-to-Peer FilesharingKevin Walsh & Emin Gün Sirer, Cornell University
Replay Debugging for Distributed ApplicationsDennis Geels, University of California Berkeley; et al.
Scott Shenker, University of California Berkeley
Ion Stoica, University of California Berkeley
2005Detecting BGP Configuration Faults with Static AnalysisNick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology
2004Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networ...Philip Levis, University of California Berkeley; et al.
David Culler, University of California Berkeley
Scott Shenker, University of California Berkeley
OSDI (Operating Systems)
2018REPT: Reverse Debugging of Failures in Deployed SoftwareWeidong Cui, Microsoft Research; et al.
Baris Kasikci, University of Michigan
Ben Niu, Microsoft Research
Upamanyu Sharma, University of Michigan
Ruoyu Wang, Arizona State University
Insu Yun, Georgia Institute of Technology
LegoOS: A Disseminated,Distributed OS for Hardware Resource DisaggregationYizhou Shan, Purdue University; et al.
Yilun Chen, Purdue University
Yiying Zhang, Purdue University
Orca: Differential Bug Localization in Large-Scale ServicesRanjita Bhagwan, Microsoft Research; et al.
Chandra Sekhar Maddila, Microsoft Research
Adithya Abraham Philip, Microsoft Research
2016Ryoan: A Distributed Sandbox for Untrusted Computation on Secret DataTyler Hunt, University of Texas at Austin; et al.
Yuanzhong Xu, University of Texas at Austin
Simon Peter, University of Texas at Austin
Emmett Witchel, University of Texas at Austin
Early Detection of Configuration Errors to Reduce Failure DamageTianyin Xu, University of California San Diego; et al.
Peng Huang, University of California San Diego
Yuanyuan Zhou, University of California San Diego
Shan Lu, University of Chicago
Long Jin, University of California San Diego
Shankar Pasupathy, NetApp
Push-Button Verification of File Systems via Crash RefinementHelgi Sigurbjarnarson, University of Washington; et al.
Emina Torlak, University of Washington
Xi Wang, University of Washington
2014Arrakis: The Operating System is the Control PlaneSimon Peter, University of Washington; et al.
Irene Zhang, University of Washington
Dan Ports, University of Washington
Doug Woos, University of Washington
Arvind Krishnamurthy, University of Washington
Thomas Anderson, University of Washington
Timothy Roscoe, ETH Zurich
Shielding Applications from an Untrusted Cloud with HavenAndrew Baumann, Microsoft Research; et al.
Galen Hunt, Microsoft Research
IX: A Protected Dataplane Operating System for High Throughput and Low LatencyAdam Belay, Stanford University; et al.
Ana Klimovic, Stanford University
Samuel Grossman, Stanford University
Christos Kozyrakis, Stanford University
Edouard Bugnion, École Polytechnique Fédérale de Lausanne
2012Spanner: Google's Globally-Distributed DatabaseJames C. Corbett, Google; et al.
Michael Epstein, Google
Andrew Fikes, Google
Christopher Frost, Google
JJ Furman, Google
Sanjay Ghemawat, Google
Andrey Gubarev, Google
Christopher Heiser, Google
Peter Hochschild, Google
Wilson Hsieh, Google
Sebastian Kanthak, Google
Eugene Kogan, Google
Hongyi Li, Google
Alexander Lloyd, Google
Sergey Melnik, Google
David Mwaura, Google
David Nagle, Google
Sean Quinlan, Google
Rajesh Rao, Google
Lindsay Rolig, Google
Yasushi Saito, Google
Michal Szymaniak, Google
Christopher Taylor, Google
Ruth Wang, Google
Dale Woodford, Google
2010Efficient System-Enforced Deterministic ParallelismAmittai Aviram, Yale University; et al.
Sen Hu, Yale University
Bryan Ford, Yale University
The Turtles Project: Design and Implementation of Nested VirtualizationMuli Ben-Yehuda, IBM Research; et al.
Zvi Dubitzky, IBM Research
Michael Factor, IBM Research
Nadav Har'El, IBM Research
Abel Gordon, IBM Research
Anthony Liguori, IBM
Orit Wasserman, IBM Research
Ben-Ami Yassour, IBM Research
2008KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems ProgramsCristian Cadar, Stanford University; et al.
Dawson Engler, Stanford University
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Lang...Yuan Yu, Microsoft Research; et al.
Dennis Fetterly, Microsoft Research
Mihai Budiu, Microsoft Research
Úlfar Erlingsson, Microsoft Research
Pradeep Kumar Gunda, Microsoft Research
Jon Currey, Microsoft Research
Difference Engine: Harnessing Memory Redundancy in Virtual MachinesDiwaker Gupta, University of California San Diego; et al.
Michael Vrable, University of California San Diego
Stefan Savage, University of California San Diego
Alex C. Snoeren, University of California San Diego
George Varghese, University of California San Diego
Geoffrey M. Voelker, University of California San Diego
Amin Vahdat, University of California San Diego
2006Rethink the SyncEdmund B. Nightingale, University of Michigan; et al.
Peter M. Chen, University of Michigan
Jason Flinn, University of Michigan
Bigtable: A Distributed Storage System for Structured DataFay Chang, Google; et al.
Sanjay Ghemawat, Google
Wilson C. Hsieh, Google
Deborah A. Wallach, Google
Mike Burrows, Google
Tushar Chandra, Google
Andrew Fikes, Google
Robert E. Gruber, Google
2004Recovering Device DriversMichael M. Swift, University of Washington; et al.
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington
Using Model Checking to Find Serious File System ErrorsJunfeng Yang, Stanford University; et al.
Dawson Engler, Stanford University
Madanlal Musuvathi, Microsoft Research
2002Memory Resource Management in VMware ESX ServerCarl A. Waldspurger, VMware
2000Checking System Rules Using System-Specific,Programmer-Written Compiler ExtensionsDawson Engler, Stanford University; et al.
Andy Chou, Stanford University
Seth Hallem, Stanford University
1999IO-Lite: A Unified I/O Buffering and Caching SystemVivek S. Pai, Rice University; et al.
Willy Zwaenepoel, Rice University
1996Automatic Compiler-Inserted I/O Prefetching for Out-of-Core ApplicationsTodd C. Mowry, University of Toronto; et al.
Orran Krieger, University of Toronto
Safe Kernel Extensions Without Run-Time CheckingGeorge C. Necula & Peter Lee, Carnegie Mellon University
PLDI (Programming Languages)
2019An Inductive Synthesis Framework for Verifiable Reinforcement LearningHe Zhu, Galois Inc.; et al.
Stephen Magill, Galois Inc.
Suresh Jagannathan, Purdue University
Low-Latency Graph Streaming Using Compressed Purely-Functional TreesLaxman Dhulipala, Carnegie Mellon University; et al.
Guy Blelloch, Carnegie Mellon University
2018Program synthesis using conflict-driven learningYu Feng, University of Texas at Austin; et al.
Osbert Bastani, Massachusetts Institute of Technology
Isil Dillig, University of Texas at Austin
A data-driven CHC solverHe Zhu, Galois; et al.
Suresh Jagannathan, Purdue University
The semantics of transactions and weak memory in x86,Power,ARM,and C++Nathan Chong, ARM; et al.
John Wickerson, Imperial College London
2017Low Overhead Dynamic Binary Translation on ARMAmanieu D'Antras, University of Manchester; et al.
Jim Garside, University of Manchester
Mikel Luján, University of Manchester
Repairing sequential consistency in C/C++11Ori Lahav, MPI-SWS; et al.
Jeehoon Kang, Seoul National University
Chung-Kil Hur, Seoul National University
Derek Dreyer, MPI-SWS
Compiling without continuationsLuke Maurer, University of Oregon; et al.
Zena M. Ariola, University of Oregon
Simon Peyton Jones, Microsoft Research
Bringing the web up to speed with WebAssemblyAndreas Haas, Google; et al.
Derek L. Schuff, Google
Ben L. Titzer, Google
Michael Holman, Microsoft
Dan Gohman, Mozilla
Luke Wagner, Mozilla
Alon Zakai, Mozilla
JF Bastien, Apple
2016Into the Depths of C: Elaborating the De Facto StandardsKayvan Memarian, University of Cambridge; et al.
James Lingard, University of Cambridge
Kyndylan Nienhuis, University of Cambridge
David Chisnall, University of Cambridge
Robert N. M. Watson, University of Cambridge
Peter Sewell, University of Cambridge
Transactional Data Structure LibrariesAlexander Spiegelman, Technion; et al.
Idit Keidar, Technion
Types from data: Making structured data first-class citizens in F#Tomas Petricek, University of Cambridge; et al.
Don Syme, Microsoft Research
Assessing the limits of program-specific garbage collection performanceNicholas Jacek, University of Massachusetts Amherst; et al.
Benjamin Marlin, University of Massachusetts Amherst
Eliot Moss, University of Massachusetts Amherst
2015Automatically Improving Accuracy for Floating Point ExpressionsPavel Panchekha, University of Washington; et al.
James R. Wilcox, University of Washington
Zachary Tatlock, University of Washington
Diagnosing Type Errors with ClassDanfeng Zhang, Cornell University; et al.
Dimitrios Vytiniotis, Microsoft Research
Simon Peyton-Jones, Microsoft Research
Provably Correct Peephole Optimizations with AliveNuno P. Lopes, Microsoft Research; et al.
Santosh Nagarakatte, Rutgers University
John Regehr, University of Utah
2014Compiler validation via equivalence modulo inputsVu Le, University of California Davis; et al.
Zhendong Su, University of California Davis
Improving JavaScript Performance by Deconstructing the Type SystemWonsun Ahn, University of Illinois at Urbana-Champaign; et al.
Thomas Shull, University of Illinois at Urbana-Champaign
María Garzarín, University of Illinois at Urbana-Champaign
Josep Torrellas, University of Illinois at Urbana-Champaign
On Abstraction Refinement for Program Analyses in DatalogXin Zhang, Georgia Institute of Technology; et al.
Radu Grigore, Oxford University
Mayur Naik, Georgia Institute of Technology
Hongseok Yang, Oxford University
2013A General Constraint-centric Scheduling Framework for Spatial ArchitecturesTony Nowatzki, University of Wisconsin; et al.
Lorenzo De Carli, University of Wisconsin
Karthikeyan Sankaralingam, University of Wisconsin
Cristian Estan, Broadcom
Behnam Robatmili, Qualcomm Research
CLAP: Recording Local Executions to Reproduce Concurrency FailuresJeff Huang, Hong Kong University of Science and Technology; et al.
Julian Dolby, IBM Research
Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many P...Sriram Sankaranarayanan, University of Colorado; et al.
Sumit Gulwani, Microsoft Research
Reconciling Exhaustive Pattern Matching with ObjectsChinawat Isradisaikul & Andrew C. Myers, Cornell University
2012Concurrent Data Representation SynthesisPeter Hawkins, Stanford University; et al.
Kathleen Fisher, Tufts University
Martin Rinard, Massachusetts Institute of Technology
Mooly Sagiv, Tel-Aviv University
2011Data Representation SynthesisPeter Hawkins, Stanford University; et al.
Kathleen Fisher, Tufts University
Martin Rinard, Massachusetts Institute of Technology
Mooly Sagiv, Tel-Aviv University
2010Safe to the Last Instruction: Automated Verification of a Type-Safe Operating SystemJean Yang, Massachusetts Institute of Technology
Chris Hawblitzel, Microsoft Research
2009Binary Analysis for Measurement and Attribution of Program PerformanceNathan Tallent, Rice University; et al.
Michael Fagan, Rice University
2007Fault-tolerant Typed Assembly LanguageFrances Perry, Princeton University; et al.
George A. Reis, Princeton University
Jay Ligatti, University of South Florida
David I. August, Princeton University
David Walker, Princeton University
The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of CodeBen Hardekopf & Calvin Lin, University of Texas at Austin
2005Automatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the HeapChris Lattner & Vikram Adve, University of Illinois at Urbana-Champaign
Programming by Sketching for Bit-Streaming ProgramsArmando Solar-Lezama, University of California Berkeley; et al.
Rastislav Bodik, University of California Berkeley
Kemal Ebcioğlu, IBM Research
2004Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision DiagramsJohn Whaley & Monica S. Lam, Stanford University
2003Automatically Proving the Correctness of Compiler OptimizationsSorin Lerner, University of Washington; et al.
Craig Chambers, University of Washington
2000Dynamo: a transparent dynamic optimization systemVasanth Bala, Hewlett-Packard Labs; et al.
Sanjeev Banerjia, InCert
1999Whole program pathsJames R. Larus, Microsoft Research
PODS (Databases)
2019Interventional Fairness : Causal Database Repair for Algorithmic FairnessBabak Salimi, University of Washington; et al.
Bill Howe, University of Washington
Dan Suciu, University of Washington
2018Entity Matching with Active Monotone ClassificationYufei Tao, Chinese University of Hong Kong
2017Dichotomies in Ontology-Mediated Querying with the Guarded FragmentAndré Hernich, University of Liverpool; et al.
Fabio Papacchini, University of Liverpool
Frank Wolter, University of Liverpool
2016FAQ: Questions Asked FrequentlyMahmoud Abo Khamis, University at Buffalo; et al.
Atri Rudra, University at Buffalo
2015Parallel-Correctness and Transferability for Conjunctive QueriesTom J. Ameloot, Hasselt University; et al.
Bas Ketsman, Hasselt University
Frank Neven, Hasselt University
Thomas Schwentick, Universität Dortmund
2014Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Con...Tom J. Ameloot, Hasselt University; et al.
Frank Neven, Hasselt University
Daniel Zinn, LogicBlox
2013Verification of database-driven systems via amalgamationMikołaj Bojańczyk, University of Warsaw; et al.
Szymon Toruńczyk, University of Warsaw
2012Worst-case Optimal Join AlgorithmsHung Q. Ngo, University at Buffalo; et al.
Christopher Ré, University of Wisconsin
Atri Rudra, University at Buffalo
2011Data Exchange Beyond Complete DataMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.
Juan Reutter, University of Edinburgh
2010An Optimal Algorithm for the Distinct Elements ProblemDaniel M. Kane, Harvard University; et al.
David P. Woodruff, IBM Research
2009Size and Treewidth Bounds for Conjunctive QueriesGeorg Gottlob, University of Oxford; et al.
Gregory Valient, University of California Berkeley
2008Estimating PageRank on Graph StreamsAtish Das Sarma, Georgia Institute of Technology; et al.
Rina Panigrahy, Microsoft Research
2007Generalized Hypertree Decompositions: NP-Hardness and Tractable VariantsGeorg Gottlob, University of Oxford; et al.
Thomas Schwentick, Universität Dortmund
2006Two-variable logic on data trees and XML reasoningMikolaj Bojanczyk, Warsaw University; et al.
Anca Muscholl, Université Paris
Thomas Schwentick, Universität Dortmund
Luc Segoufin, Université Paris
2005On the complexity of division and set joins in the relational algebraDirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum
XML data exchange: consistency and query answeringMarcelo Arenas & Leonid Libkin, University of Toronto
2004Conditional XPath,the first order complete XPath dialectMaarten Marx, University of Amsterdam
2003An Information-Theoretic Approach to Normal Forms for Relational and XML DataMarcelo Arenas & Leonid Libkin, University of Toronto
2002Monadic Datalog and the Expressive Power of Languages for Web Information ExtractionGeorg Gottlob & Christoph Koch, Technische Universität Wien
2001Optimal aggregation algorithms for middlewareRonald Fagin, IBM Research; et al.
Moni Naor, Weizmann Institute of Science
2000Auditing Boolean attributesJon Kleinberg, Cornell University; et al.
Prabhakar Raghavan, IBM Research
1999Exact and approximate aggregation in constraint query languagesMichael Benefikt & Leonid Libkin, Bell Labs
1998Expressiveness of structured document query languages based on attribute grammarsFrank Neven & Jan Van den Bussche, Limburgs Universitair Centrum
A lower bound theorem for indexing schemes and its application to multidimensional range queriesVasilis Samoladas & Daniel P. Miranker, University of Texas at Austin
1997On the Complexity of Database QueriesChristos H. Papadimitriou, University of California Berkeley
Mihalis Yannakakis, Bell Labs
S&P (Security and Privacy)
2019Spectre Attacks: Exploiting Speculative ExecutionPaul Kocher, Independent; et al.
Anders Fogh, G DATA Advanced Analytics
Daniel Genkin, University of Pennsylvania and University of Maryland
Daniel Gruss, Graz University of Technology
Werner Haas, Cyberus Technology
Mike Hamburg, Rambus
Moritz Lipp, Graz University of Technology
Stefan Mangard, Graz University of Technology
Thomas Prescher, Cyberus Technology
Michael Schwarz, Graz University of Technology
Yuval Yarom, University of Adelaide and Data61
2018On Enforcing the Digital Immunity of a Large Humanitarian OrganizationStevens Le Blond, École Polytechnique Fédérale de Lausanne; et al.
Juan Ramón Troncoso-Pastoriza, École Polytechnique Fédérale de Lausanne
Philipp Jovanovic, École Polytechnique Fédérale de Lausanne
Bryan Ford, École Polytechnique Fédérale de Lausanne
Jean-Pierre Hubaux, École Polytechnique Fédérale de Lausanne
DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and PracticeVincent Cheval, Inria; et al.
Itsaka Rakotonirina, Inria
2017Verified Models and Reference Implementations for the TLS 1.3 Standard CandidateKarthikeyan Bhargavan, INRIA; et al.
Nadim Kobeissi, INRIA
2016A2: Analog Malicious HardwareKaiyuan Yang, University of Michigan; et al.
Qing Dong, University of Michigan
Todd Austin, University of Michigan
Dennis Sylvester, University of Michigan
2015A Messy State of the Union: Taming the Composite State Machines of TLSBenjamin Beurdouche, INRIA; et al.
Antoine Delignat-Lavaud, INRIA
Cédric Fournet, Microsoft Research
Markulf Kohlweiss, Microsoft Research
Alfredo Pironti, INRIA
Pierre-Yves Strub, IMDEA
Jean Karim Zinzindohoue, INRIA
Riposte: An Anonymous Messaging System Handling Millions of UsersHenry Corrigan-Gibbs, Stanford University; et al.
David Mazières, Stanford University
2014Secure Multiparty Computations on BitCoinMarcin Andrychowicz, University of Warsaw; et al.
Daniel Malinowski, University of Warsaw
Łukasz Mazurek, University of Warsaw
Bootstrapping Privacy Compliance in Big Data SystemsShayak Sen, Carnegie Mellon University; et al.
Anupam Datta, Carnegie Mellon University
Sriram K. Rajamani, Microsoft Research
Janice Tsai, Microsoft Research
Jeannette M. Wing, Microsoft Research
2013Pinocchio: Nearly Practical Verifiable ComputationBryan Parno, Microsoft Research; et al.
Jon Howell, Microsoft Research
Mariana Raykova, IBM Research
2012Don't Trust Satellite Phones: A Security Analysis of Two Satphone StandardsBenedikt Driessen, Ruhr-Universität Bochum; et al.
Carsten Willems, Ruhr-Universität Bochum
Christof Paar, Ruhr-Universität Bochum
Thorsten Holz, Ruhr-Universität Bochum
2011Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iksAndrew M. White, University of North Carolina at Chapel Hill; et al.
Kevin Snow, University of North Carolina at Chapel Hill
Fabian Monrose, University of North Carolina at Chapel Hill
2010SCiFI - A System for Secure Face IdentificationMargarita Osadchy, University of Haifa; et al.
Ayman Jarrous, University of Haifa
Boaz Moskovich, University of Haifa
2009Native Client: A Sandbox for Portable,Untrusted x86 Native CodeBennet Yee, Google; et al.
Gregory Dardyk, Google
Bradley Chen, Google
Robert Muth, Google
Tavis Ormandy, Google
Shiki Okasaka, Google
Neha Narula, Google
Nicholas Fullagar, Google
2008Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power DefensesDaniel Halperin, University of Washington; et al.
Benjamin Ransford, University of Massachusetts Amherst
Shane S. Clark, University of Massachusetts Amherst
Benessa Defend, University of Massachusetts Amherst
Will Morgan, University of Massachusetts Amherst
Kevin Fu, University of Massachusetts Amherst
Tadayoshi Kohno, University of Washington
William H. Maisel, Harvard University
SIGCOMM (Networking)
2019Underwater Backscatter Networking Junsu Jang & Fadel Adib, MIT
2018Inferring Persistent Interdomain CongestionSaksham Agarwal, Cornell University; et al.
Akshay Narayan, Massachusetts Institute of Technology
Rachit Agarwal, Cornell University
David Shmoys, Cornell University
Amin Vahdat, Google
2017Re-architecting datacenter networks and stacks for low latency and high performanceMark Handley, University College London; et al.
Alexandru Agache, University Politehnica of Bucharest
Andrei Voinescu, University Politehnica of Bucharest
Andrew Moore, University of Cambridge
Gianni Antichi, University of Cambridge
Marcin Wójcik, University of Cambridge
Language-directed hardware design for network performance monitoringSrinivas Narayana, Massachusetts Institute of Technology; et al.
Vikram Nathan, Massachusetts Institute of Technology
Prateesh Goyal, Massachusetts Institute of Technology
Venkat Arun, IIT Guwahati
Mohammad Alizadeh, Massachusetts Institute of Technology
Vimalkumar Jeyakumar, Cisco Systems
Changhoon Kim, Barefoot Networks
2016Don't Mind the Gap: Bridging Network-wide Objectives and Device-level ConfigurationsRyan Beckett, Princeton University; et al.
Todd Millstein, University of California Los Angeles
Jitendra Padhye, Microsoft
David Walker, Princeton University)
Eliminating Channel Feedback in Next-Generation Cellular NetworksDeepak Vasisht, Massachusetts Institute of Technology; et al.
Hariharan Rahul, Massachusetts Institute of Technology
Dina Katabi, Massachusetts Institute of Technology
Inter-Technology Backscatter: Towards Internet Connectivity for Implanted DevicesVikram Iyer, University of Washington; et al.
Bryce Kellogg, University of Washington
Shyamnath Gollakota, University of Washington
Joshua Smith, University of Washington
2015Central Control Over Distributed RoutingStefano Vissicchio, Université catholique de Louvain; et al.
Laurent Vanbever, ETH Zurich
Jennifer Rexford, Princeton University
2014Balancing Accountability and Privacy in the NetworkDavid Naylor, Carnegie Mellon University; et al.
Peter Steenkiste, Carnegie Mellon University
CONGA: Distributed Congestion-Aware Load Balancing for DatacentersMohammad Alizadeh, Cisco Systems; et al.
Sarang Dharmapurikar, Cisco Systems
Ramanan Vaidyanathan, Cisco Systems
Kevin Chu, Cisco Systems
Andy Fingerhut, Google
Terry Lam, Cisco Systems
Francis Matus, Cisco Systems
Rong Pan, Cisco Systems
Navindra Yadav, Cisco Systems
George Varghese, Microsoft
2013Ambient Backscatter: Wireless Communication Out of Thin AirVincent Liu, University of Washington; et al.
Vamsi Talla, University of Washington
Shyamnath Gollakota, University of Washington
David Wetherall, University of Washington
Joshua R. Smith, University of Washington
2012Multi-Resource Fair Queueing for Packet ProcessingAli Ghodsi, University of California Berkeley; et al.
Matei Zaharia, University of California Berkeley
Ion Stoica, University of California Berkeley
2011They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical DevicesShyamnath Gollakota, Massachusetts Institute of Technology; et al.
Benjamin Ransford, University of Massachusetts Amherst
Dina Katabi, Massachusetts Institute of Technology
Kevin Fu, University of Massachusetts Amherst
2010Efficient Error Estimating Coding: Feasibility and ApplicationsBinbin Chen, National University of Singapore; et al.
Yuda Zhao, National University of Singapore
Haifeng Yu, National University of Singapore
2009White Space Networking with Wi-Fi like ConnectivityParamvir Bahl, Microsoft Research; et al.
Thomas Moscibroda, Microsoft Research
Rohan Murty, Harvard University
Matt Welsh, Harvard University
2008ZigZag Decoding: Combating Hidden Terminals in Wireless NetworksShyamnath Gollakota & Dina Katabi, Massachusetts Institute of Technology
SIGIR (Information Retrieval)
2019Variance Reduction in Gradient Exploration for Online Learning to RankHuazheng Wang, University of Virginia; et al.
Eric McCord-Snook, University of Virginia
Qingyun Wu, University of Virginia
Hongning Wang, University of Virginia
2018Should I Follow the Crowd? A Probabilistic Analysis of the Effectiveness of Popularity in Recommend...Rocío Cañamares & Pablo Castells, Universidad Autónoma de Madrid
2017BitFunnel: Revisiting Signatures for SearchBob Goodwin, Microsoft; et al.
Dan Luu, Microsoft
Alex Clemmer, Heptio
Mihaela Curmei, Microsoft
Sameh Elnikety, Microsoft
Yuxiong He, Microsoft
2016Understanding Information Need: An fMRI StudyYashar Moshfeghi, University of Glasgow; et al.
Frank E. Pollick, University of Glasgow
2015QuickScorer: A Fast Algorithm to Rank Documents with Additive Ensembles of Regression TreesClaudio Lucchese, Istituto di Scienza e Tecnologie dell'Informazione; et al.
Salvatore Orlando, Università di Venezia
Raffaele Perego, Istituto di Scienza e Tecnologie dell'Informazione
Nicola Tonellotto, Istituto di Scienza e Tecnologie dell'Informazione
Rossano Venturini, Istituto di Scienza e Tecnologie dell'Informazione
2014Partitioned Elias-Fano IndexesGiuseppe Ottaviano, Istituto di Scienza e Tecnologie dell'Informazione
Rossano Venturini, Università di Pisa
2013Beliefs and Biases in Web SearchRyen W. White, Microsoft Research
2012Time-Based Calibration of Effectiveness MeasuresMark Smucker & Charles Clarke, University of Waterloo
2011Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction Dat...Mikhail Ageev, Moscow State University; et al.
Dmitry Lagun, Emory University
Eugene Agichtein, Emory University
2010Assessing the Scenic Route: Measuring the Value of Search Trails in Web LogsRyen W. White, Microsoft Research
Jeff Huang, University of Washington
2009Sources of evidence for vertical selectionJaime Arguello, Carnegie Mellon University; et al.
Jamie Callan, Carnegie Mellon University
Jean-Francois Crespo, Yahoo! Research
2008Algorithmic Mediation for Collaborative Exploratory SearchJeremy Pickens, FX Palo Alto Lab; et al.
Chirag Shah, University of North Carolina at Chapel Hill
Pernilla Qvarfordt, FX Palo Alto Lab
Maribeth Back, FX Palo Alto Lab
2007Studying the Use of Popular Destinations to Enhance Web Search InteractionRyen W. White, Microsoft Research; et al.
Silviu Cucerzan, Microsoft Research
2006Minimal Test Collections for Retrieval EvaluationBen Carterette, University of Massachusetts Amherst; et al.
Ramesh Sitaraman, University of Massachusetts Amherst
2005Learning to estimate query difficulty: including applications to missing content detection and dist...Elad Yom-Tov, IBM Research; et al.
David Carmel, IBM Research
Adam Darlow, IBM Research
2004A Formal Study of Information Retrieval HeuristicsHui Fang, University of Illinois at Urbana-Champaign; et al.
ChengXiang Zhai, University of Illinois at Urbana-Champaign
2003Re-examining the potential effectiveness of interactive query expansionIan Ruthven, University of Strathclyde
2002Novelty and redundancy detection in adaptive filteringYi Zhang, Carnegie Mellon University; et al.
Thomas Minka, Carnegie Mellon University
2001Temporal summaries of new topicsJames Allan, University of Massachusetts Amherst; et al.
Vikas Khandelwal, University of Massachusetts Amherst
2000IR evaluation methods for retrieving highly relevant documentsKalervo Järvelin & Jaana Kekäläinen, University of Tampere
1999Cross-language information retrieval based on parallel texts and automatic mining of parallel texts...Jian-Yun Nie, Université de Montréal; et al.
Pierre Isabelle, Université de Montréal
Richard Durand, Université de Montréal
1998A theory of term weighting based on exploratory data analysisWarren R. Greiff, University of Massachusetts Amherst
1997Feature selection,perceptron learning,and a usability case study for text categorizationHwee Tou Ng, DSO National Laboratories; et al.
Kok Leong Low, Ministry of Defence
1996Retrieving spoken documents by combining multiple index sourcesGareth Jones, University of Cambridge; et al.
Karen Spärck Jones, University of Cambridge
Steve Young, University of Cambridge
SIGMETRICS (Performance)
2019Computationally Efficient Estimation of the Spectral Gap of a Markov ChainRichard Combes, Centrale-Supelec
Mikael Touati, Orange Labs
2018A Refined Mean Field ApproximationNicolas Gast, Inria
Benny Van Houdt, University of Antwerp
2017Accelerating Performance Inference over Closed Systems by Asymptotic MethodsGiuliano Casale, Imperial College London
2016On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with FitnessBo Jiang, University of Massachusetts Amherst; et al.
Bruno Ribeiro, Purdue University
Don Towsley, University of Massachusetts Amherst
2015Spy vs. Spy: Rumor Source ObfuscationGiulia Fanti, University of California Berkeley; et al.
Sewoong Oh, University of Illinois at Urbana-Champaign
Pramod Viswanath, University of Illinois at Urbana-Champaign
2014Concave switching in single and multihop networksNeil Walton, University of Amsterdam
2013Queueing System Topologies with Limited FlexibilityJohn Tsitsiklis & Kuang Xu, Massachusetts Institute of Technology
2012Temperature management in data centers: why some (might) like it hotNosayba El-Sayed, University of Toronto; et al.
George Amvrosiadis, University of Toronto
Andy A. Hwang, University of Toronto
Bianca Schroeder, University of Toronto
2011Topology Discovery of Sparse Random Graphs With Few ParticipantsAnimashree Anandkumar, University of California Irvine; et al.
Jonathan Kelner, Massachusetts Institute of Technology
2010Load balancing via random local search in closed and open systemsAyalvadi Ganesh, University of Bristol; et al.
D. Manjunath, Indian Institute of Technology
Alexandre Proutière, Microsoft Research
Florian Simatos, INRIA
2009The Age of Gossip: Spatial Mean Field RegimeAugustin Chaintreau, Technicolor; et al.
Nikodin Ristanovic, École Polytechnique Fédérale de Lausanne
2008Counter Braids: A Novel Counter Architecture for Per-Flow MeasurementYi Lu, Stanford University; et al.
Balaji Prabhakar, Stanford University
Sarang Dharmapurikar, Cisco Systems
Abdul Kabbani, Stanford University
2007Modeling the Relative Fitness of StorageMichael P. Mesnier, Intel; et al.
Raja R. Sambasivan, Carnegie Mellon University
Alice X. Zheng, Carnegie Mellon University
Gregory R. Ganger, Carnegie Mellon University
2006Maximizing throughput in wireless networks via gossipingEytan Modiano, Massachusetts Institute of Technology; et al.
Gil Zussman, Massachusetts Institute of Technology
2005Coupon replication systemsLaurent Massoulié & Milan Vojnović, Microsoft Research
2004On performance bounds for the integration of elastic and adaptive streaming flowsThomas Bonald & Alexandre Proutiere, France Telecom
1996Supporting stored video: reducing rate variability and end-to-end resource requirements through opt...James D. Salehi, University of Massachusetts Amherst; et al.
James F. Kurose, University of Massachusetts Amherst
Don Towsley, University of Massachusetts Amherst
Exploiting process lifetime distributions for dynamic load balancingMor Harchol-Balter & Allen B. Downey, University of California Berkeley
SIGMOD (Databases)
2019Interventional Fairness : Causal Database Repair for Algorithmic FairnessBabak Salimi, University of Washington; et al.
Bill Howe, Allen School of Computer Science
Dan Suciu, University of Washington
2018SuRF:Practical Range Query Filtering with Fast Succinct TriesHuanchen Zhang, Carnegie Mellon University; et al.
Viktor Leis, TU München
David G. Andersen, Carnegie Mellon University
Michael Kaminsky, Intel Labs
Kimberly Keeton, Hewlett Packard Enterprise
Andrew Pavlo, Carnegie Mellon University
2017Parallelizing Sequential Graph ComputationsWenfei Fan, University of Edinburgh; et al.
Yinghui Wu, Washington State University
Wenyuan Yu, Beihang University
Jiaxin Jiang, Hong Kong Baptist University
Zeyu Zheng, Peking University
Bohan Zhang, Peking University
Yang Cao, University of Edinburgh
Chao Tian, University of Edinburgh
2016Wander Join: Online Aggregation via Random WalksFeifei Li, University of Utah; et al.
Ke Yi, Hong Kong University of Science and Technology
Zhuoyue Zhao, Shanghai Jiao Tong University
2015DBSCAN Revisited: Mis-Claim,Un-Fixability,and ApproximationJunhao Gan & Yufei Tao, Chinese University of Hong Kong
2014Materialization Optimizations for Feature Selection WorkloadsCe Zhang, Stanford University; et al.
Christopher Ré, Stanford University
2013Massive Graph TriangulationXiaocheng Hu, The Chinese University of Hong Kong; et al.
Chin-Wan Chung, KAIST
2012High-Performance Complex Event Processing over XML StreamsBarzan Mozafari, Massachusetts Institute of Technology; et al.
Carlo Zaniolo, University of California Los Angeles
2011Entangled Queries: Enabling Declarative Data-Driven CoordinationNitin Gupta, Cornell University; et al.
Sudip Roy, Cornell University
Gabriel Bender, Cornell University
Johannes Gehrke, Cornell University
Christoph Koch, École Polytechnique Fédérale de Lausanne
2010FAST: fast architecture sensitive tree search on modern CPUs and GPUsChangkyu Kim, Intel; et al.
Nadathur Satish, Intel
Eric Sedlar, Oracle
Anthony D. Nguyen, Intel
Tim Kaldewey, Oracle
Victor W. Lee, Intel
Scott A. Brandt, University of California Santa Cruz
Pradeep Dubey, Intel
2009Generating example data for dataflow programsChristopher Olston, Yahoo! Research; et al.
Utkarsh Srivastava, Yahoo! Research
2008Serializable isolation for snapshot databasesMichael J. Cahill, University of Sydney; et al.
Alan D. Fekete, University of Sydney
Scalable Network Distance Browsing in Spatial DatabasesHanan Samet, University of Maryland; et al.
Houman Alborzi, University of Maryland
2007Compiling mappings to bridge applications and databasesSergey Melnik, Microsoft Research; et al.
Philip A. Bernstein, Microsoft Research
Scalable Approximate Query Processing with the DBO EngineChristopher Jermaine, University of Florida; et al.
Abhijit Pol, University of Florida
Alin Dobra, University of Florida
2006To search or to crawl?: towards a query optimizer for text-centric tasksPanagiotis G. Ipeirotis, New York University; et al.
Pranay Jain, Columbia University
Luis Gravano, Columbia University
2004Indexing spatio-temporal trajectories with Chebyshev polynomialsYuhan Cai & Raymond T. Ng, University of British Columbia
2003Spreadsheets in RDBMS for OLAPAndrew Witkowski, Oracle; et al.
Tolga Bozkaya, Oracle
Gregory Dorman, Oracle
Nathan Folkert, Oracle
Abhinav Gupta, Oracle
Lei Shen, Oracle
Sankar Subramanian, Oracle
2001Locally adaptive dimensionality reduction for indexing large time series databasesEamonn Keogh, University of California Irvine; et al.
Michael Pazzani, University of California Irvine
Sharad Mehrotra, University of California Irvine
2000XMill: an efficient compressor for XML dataHartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories
1999DynaMat: a dynamic view management system for data warehousesYannis Kotidis & Nick Roussopoulos, University of Maryland
1998Efficient transparent application recovery in client-server information systemsDavid Lomet & Gerhard Weikum, Microsoft Research
Integrating association rule mining with relational database systems: alternatives and implicationsSunita Sarawagi, IBM Research; et al.
Rakesh Agrawal, IBM Research
1997Fast parallel similarity search in multimedia databasesStefan Berchtold, University of Munich; et al.
Bernhard Braunmüller, University of Munich
Daniel A. Keim, University of Munich
Hans-Peter Kriegel, University of Munich
1996Implementing data cubes efficientlyVenky Harinarayan, Stanford University; et al.
Jeffrey D. Ullman, Stanford University
SODA (Theory)
2019Sublinear Algorithms for (Δ + 1) Vertex ColoringSepehr Assadi, University of Pennsylvania; et al.
Sanjeev Khanna, University of Pennsylvania
2018Approaching 3/2 for the s-t-path TSPVera Traub & Jens Vygen, Universität Bonn
Online Bipartite Matching with Amortized O(log2 N)ReplacementsAaron Bernstein, Technical University of Berlin; et al.
Eva Rotenberg, Technical University of Denmark
2017Subquadratic Algorithms for the Diameter and the Sum of Pairwise Distances in Planar GraphsSergio Cabello, University of Ljubljana
A (2 + Є) Approximation for Maximum Weight Matching in the Semi-Streaming ModelAmi Paz, IRIF
Gregory Schwartzman, National Institute of Informatics
2016An Improved Distributed Algorithm for Maximal Independent SetMohsen Ghaffari, Massachusetts Institute of Technology
Near-Optimal Light SpannersShiri Chechik, Tel-Aviv University
Christian Wulff-Nilsen, University of Copenhagen
2015The Parameterized Complexity of k-BicliqueBingkai Lin, University of Tokyo
2014Polynomiality for Bin Packing with a Constant Number of Item TypesMichel X. Goemans & Thomas Rothvoß, Massachusetts Institute of Technology
An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs,and its Multicommodit...Jonathan A. Kelner, Massachusetts Institute of Technology; et al.
Lorenzo Orecchia, Massachusetts Institute of Technology
Aaron Sidford, Massachusetts Institute of Technology
2013A Simple Algorithm for the Graph Minor Decomposition - Logic meets Structural Graph TheoryMartin Grohe, RWTH Aachen University; et al.
Bruce Reed, McGill University
Dynamic graph connectivity in polylogarithmic worst case timeBruce M. Kapron, University of Victoria; et al.
Ben Mountjoy, University of Victoria
2012Computing all maps into a sphereMartin Čadek, Masaryk University; et al.
Jiří Matoušel, Charles University
Francis Sergeraert, Université Joseph Fourier
Lukáš Vokřínel, Masaryk University
Uli Wagner, ETH Zurich
2011An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss TransformNir Ailon, Technion
Edo Liberty, Yahoo! Research
2010An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman ProblemArash Asadpour, Stanford University; et al.
Aleksander Mądry, Massachusetts Institute of Technology
Shayan Oveis Gharan, Stanford University
Amin Saberi, Stanford University
2009Natural AlgorithmsBernard Chazelle, Princeton University
SOSP (Operating Systems)
2019Efficient and Scalable Thread-Safety Violation DetectionGuangpu Li, University of Chicago; et al.
Madanlal Musuvathi, Microsoft Research
Suman Nath, Microsoft Research
Rohan Padhye, University of California Berkeley
Scaling symbolic evaluation for automated verification of systems code with ServalLuke Nelson, University of Washington; et al.
Ronghui Gu, Columbia University
Andrew Baumann, Microsoft Research
Emina Torlak, University of Washington
Xi Wang, University of Washington
2017The Efficient Server Audit Problem,Deduplicated Re-execution,and the WebCheng Tan, New York University; et al.
Joshua B. Leners, Two Sigma Investments
Michael Walfish, New York University
DeepXplore: Automated Whitebox Testing of Deep Learning SystemsKexin Pei, Columbia University; et al.
Junfeng Yang, Columbia University
Suman Jana, Columbia University
2015Pivot Tracing: Dynamic Causal Monitoring for Distributed SystemsJonathan Mace, Brown University; et al.
Rodrigo Fonseca, Brown University
Using Crash Hoare Logic for Certifying the FSCQ File SystemHaogang Chen, Massachusetts Institute of Technology; et al.
Tej Chajed, Massachusetts Institute of Technology
Adam Chlipala, Massachusetts Institute of Technology
M. Frans Kaashoek, Massachusetts Institute of Technology
Nickolai Zeldovich, Massachusetts Institute of Technology
Coz: Finding Code that Counts with Causal ProfilingCharlie Curtsinger, Grinnell College
Emery Berger, University of Massachusetts Amherst
2013The Scalable Commutativity Rule: Designing Scalable Software for Multicore ProcessorsAustin T. Clements, Massachusetts Institute of Technology; et al.
Nickolai Zeldovich, Massachusetts Institute of Technology
Robert T. Morris, Massachusetts Institute of Technology
Eddie Kohler, Harvard University
Towards optimization-safe systems: analyzing the impact of undefined behaviorXi Wang, Massachusetts Institute of Technology; et al.
M. Frans Kaashoek, Massachusetts Institute of Technology
Armando Solar-Lezama, Massachusetts Institute of Technology
Naiad: A Timely Dataflow SystemDerek G. Murray, Microsoft Research; et al.
Rebecca Isaacs, Microsoft Research
Michael Isard, Microsoft Research
Paul Barham, Microsoft Research
Martíın Abadi, Microsoft Research
2011Cells: A Virtual Mobile Smartphone ArchitectureJeremy Andrus, Columbia University; et al.
Alexander Van't Hof, Columbia University
Oren Laadan, Columbia University
Jason Nieh, Columbia University
A File is Not a File: Understanding the I/O Behavior of Apple Desktop ApplicationsTyler Harter, University of Wisconsin; et al.
Michael Vaughn, University of Wisconsin
Andrea C. Arpaci-Dusseau, University of Wisconsin
Remzi H. Arpaci-Dusseau, University of Wisconsin
2009FAWN: A Fast Array of Wimpy NodesDavid G. Andersen, Carnegie Mellon University; et al.
Michael Kaminsky, Intel Research
Amar Phanishayee, Carnegie Mellon University
Lawrence Tan, Carnegie Mellon University
Vijay Vasudevan, Carnegie Mellon University
RouteBricks: Exploiting Parallelism to Scale Software RoutersMihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al.
Katerina Argyraki, École Polytechnique Fédérale de Lausanne
Byung-Gon Chun, Intel Research
Kevin Fall, Intel Research
Gianluca Iannaccone, Intel Research
Allan Knies, Intel Research
Maziar Manesh, Intel Research
Sylvia Ratnasamy, Intel Research
seL4: Formal Verification of an OS KernelGerwin Klein, NICTA; et al.
Gernot Heiser, NICTA
June Andronick, NICTA
David Cock, NICTA
Philip Derrin, NICTA
Dhammika Elkaduwe, NICTA
Kai Engelhardt, NICTA
Rafal Kolanski, NICTA
Michael Norrish, NICTA
Thomas Sewell, NICTA
Harvey Tuch, NICTA
Simon Winwood, NICTA
2007Sinfonia: a new paradigm for building scalable distributed systemsMarcos K. Aguilera, Hewlett-Packard Labs; et al.
Mehul Shah, Hewlett-Packard Labs
Alistair Veitch, Hewlett-Packard Labs
Christos Karamanolis, VMware
Zyzzyva: speculative byzantine fault toleranceRamakrishna Kotla, University of Texas at Austin; et al.
Mike Dahlin, University of Texas at Austin
Allen Clement, University of Texas at Austin
Edmund Wong, University of Texas at Austin
Secure Web Applications via Automatic PartitioningStephen Chong, Cornell University; et al.
Andrew C. Myers, Cornell University
Xin Qi, Cornell University
K. Vikram, Cornell University
Lantian Zheng, Cornell University
Xin Zheng, Cornell University
2005Rx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, University of Illinois at Urbana-Champaign; et al.
Jagadeesan Sundaresan, University of Illinois at Urbana-Champaign
Yuanyuan Zhou, University of Illinois at Urbana-Champaign
BAR Tolerance for Cooperative ServicesAmitanand S. Aiyer, University of Texas at Austin; et al.
Allen Clement, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Jean-Philippe Martin, University of Texas at Austin
Carl Porth, University of Texas at Austin
Speculative Execution in a Distributed File SystemEdmund B. Nightingale, University of Michigan; et al.
Jason Flinn, University of Michigan
Vigilante: End-to-End Containment of Internet WormsManuel Costa, University of Cambridge; et al.
Miguel Castro, Microsoft Research
Antony Rowstron, Microsoft Research
Lidong Zhou, Microsoft Research
Lintao Zhang, Microsoft Research
Paul Barham, Microsoft Research
2003Improving the Reliability of Commodity Operating SystemsMichael M. Swift, University of Washington; et al.
Henry M. Levy, University of Washington
Preserving peer replicas by rate-limited sampled votingPetros Maniatis, Stanford University; et al.
Mema Roussopoulos, Stanford University
Mary Baker, Stanford University
TJ Giuli, Stanford University
Yanto Muliadi, Stanford University
Backtracking intrusionsSamuel T. King & Peter M. Chen, University of Michigan
2001Untrusted hosts and confidentiality: secure program partitioningSteve Zdancewic, Cornell University; et al.
Nathaniel Nystrom, Cornell University
Andrew C. Myers, Cornell University
BASE: using abstraction to improve fault toleranceRodrigo Rodrigues, Massachusetts Institute of Technology; et al.
Barbara Liskov, Massachusetts Institute of Technology
1999Manageability,availability and performance in Porcupine: a highly scalable,cluster-based mail servi...Yasushi Saito, University of Washington; et al.
Henry M. Levy, University of Washington
Cellular Disco: resource management using virtual clusters on shared-memory multiprocessorsKinshuk Govil, Stanford University; et al.
Yongqiang Huang, Stanford University
Mendel Rosenblum, Stanford University
The Click modular routerRobert Morris, Massachusetts Institute of Technology; et al.
John Jannotti, Massachusetts Institute of Technology
M. Frans Kaashoek, Massachusetts Institute of Technology
Soft timers: efficient microsecond software timer support for network processingMohit Aron & Peter Druschel, Rice University
1997Eraser: a dynamic data race detector for multithreaded programsStefan Savage, University of Washington; et al.
Greg Nelson, Digital Equipment Corporation
Patrick Sobalvarro, Digital Equipment Corporation
Thomas Anderson, University of California Berkeley
Continuous profiling: where have all the cycles gone?Jennifer M. Anderson, Digital Equipment Corporation; et al.
Jeffrey Dean, Digital Equipment Corporation
Sanjay Ghemawat, Digital Equipment Corporation
Monika R. Henzinger, Digital Equipment Corporation
Shun-Tak A. Leung, Digital Equipment Corporation
Richard L. Sites, Digital Equipment Corporation
Mark T. Vandevoorde, Digital Equipment Corporation
Carl A. Waldspurger, Digital Equipment Corporation
William E. Weihl, Digital Equipment Corporation
Disco: running commodity operating systems on scalable multiprocessorsEdouard Bugnion, Stanford University; et al.
Mendel Rosenblum, Stanford University
STOC (Theory)
2019The Reachability Problem for Petri Nets is Not ElementaryWojciech Czerwinski, University of Warsaw; et al.
Ranko Lazic, University of Warwick
Jerome Leroux, CNRS and University of Bordeaux
Filip Mazowiecki, University of Bordeaux
2018A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman ProblemOla Svensson, École Polytechnique Fédérale de Lausanne; et al.
László A. Végh, London School of Economics
2017Explicit,Almost Optimal,Epsilon-Balanced CodesAmnon Ta-Shma, Tel-Aviv University
Deciding Parity Games in Quasipolynomial TimeCristian S. Calude, University of Auckland; et al.
Bakhadyr Khoussainov, University of Auckland
Wei Li, National University of Singapore
Frank Stephan, National University of Singapore
A Weighted Linear Matroid Parity AlgorithmSatoru Iwata, University of Tokyo
Yusuke Kobayashi, University of Tsukuba
2016Reed-Muller Codes Achieve Capacity on Erasure ChannelsShrinivas Kudekar, Qualcomm Research; et al.
Marco Mondelli, École Polytechnique Fédérale de Lausanne
Henry D. Pfister, Duke University
Eren Sasoglu, Intel
Rudiger Urbanke, École Polytechnique Fédérale de Lausanne
Explicit Two-Source Extractors and Resilient FunctionsEshan Chattopadhyay & David Zuckerman, University of Texas at Austin
Graph Isomorphism in Quasipolynomial TimeLászló Babaí, University of Chicago
2015Exponential Separation of Information and Communication for Boolean FunctionsAnat Ganor, Weizmann Institute of Science; et al.
Ran Raz, Weizmann Institute of Science
Lower Bounds on the Size of Semidefinite Programming RelaxationsJames R. Lee, University of Washington; et al.
David Steurer, Cornell University
2-Server PIR with sub-polynomial communicationZeev Dvir & Sivakanth Gopi, Princeton University
2014The matching polytope has exponential extension complexityThomas Rothvoß, University of Washington
2013Approximation Resistance from Pairwise Independent SubgroupsSiu On Chan, University of California Berkeley
Low Rank Approximation and Regression in Input Sparsity TimeKenneth L. Clarkson & David P. Woodruff, IBM Research
2012Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower BoundsSamuel Fiorini, Université libre de Bruxelles; et al.
Sebastian Pokutta, Universität Erlangen Nürnberg
Hans Tiwary, Université libre de Bruxelles
Ronald de Wolf, Centrum Wiskunde & Informatica
The Cell Probe Complexity of Dynamic Range CountingKasper Larsen, Aarhus University
2011Electrical flows,laplacian systems,and faster approximation of maximum flow in undirected graphsPaul Christiano, Massachusetts Institute of Technology; et al.
Aleksander Mądry, Massachusetts Institute of Technology
Daniel A. Spielman, Yale University
Shang-Hua Teng, University of Southern California
Subexponential lower bounds for randomized pivoting rules for the simplex algorithmOliver Friedmann, University of Munich; et al.
Uri Zwick, Tel-Aviv University
2010QIP = PSPACERahul Jain, National University of Singapore; et al.
Sarvagya Upadhyay, University of Waterloo
John Watrous, University of Waterloo
An improved LP-based approximation for steiner treeJaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al.
Thomas Rothvoß, École Polytechnique Fédérale de Lausanne
Laura Sanità, École Polytechnique Fédérale de Lausanne
2009A constructive proof of the Lovász local lemmaRobin A. Moser, ETH Zurich
Public-Key Cryptosystems from the Worst-Case Shortest Vector ProblemChris Peikert, SRI International
2008Optimal hierarchical decompositions for congestion minimization in networksHarald Räcke, University of Warwick
Optimal algorithms and inapproximability results for every CSP?Prasad Raghavendra, University of Washington
2007Faster integer multiplicationMartin Fürer, Pennsylvania State University
Towards 3-query locally decodable codes of subexponential lengthSergey Yekhanin, Massachusetts Institute of Technology
2006The PCP theorem by gap amplificationIrit Dinur, Hebrew University
2005Undirected ST-connectivity in log-spaceOmer Reingold, Weizmann Institute of Science
2004Expander flows,geometric embeddings and graph partitioningSanjeev Arora, Princeton University; et al.
Umesh Vazirani, University of California Berkeley
Multi-linear formulas for permanent and determinant are of super-polynomial sizeRan Raz, Weizmann Institute of Science
2003Derandomizing polynomial identity tests means proving circuit lower boundsValentine Kabanets & Russell Impagliazzo, University of California San Diego
New lattice-based cryptographic constructionsOded Regev, Tel-Aviv University
UIST (User Interface)
2019TipText: Eyes-Free Text Entry on a Fingertip KeyboardZheer Xu, Dartmouth College; et al.
Jun Gong, Dartmouth College
Te-Yen Wu, Dartmouth College
Aditya Nittala, Saarland University
Xiaojun Bi, Stony Brook University
Jürgen Steimle, Saarland University
Hongbo Fu, City University of Hong Kong
Kening Zhu, City University of Hong Kong
Xing-Dong Yang, Dartmouth College
Soft Inkjet Circuits: Rapid Multi-Material Fabrication of Soft Circuits using a Commodity Inkjet Pr...Arshad Khan, Saarland University; et al.
Tobias Kraus, Leibniz Institute for New Materials and Saarland University
Jürgen Steimle, Saarland University
Photo-Chromeleon: Re-Programmable Multi-Color Textures Using Photochromic DyesYuhua Jin, Massachusetts Institute of Technology; et al.
Michael Wessely, Massachusetts Institute of Technology
Aradhana Adhikari, Massachusetts Institute of Technology
Katarina Bulovic, Massachusetts Institute of Technology
Parinya Punpongsanon, Massachusetts Institute of Technology
Stefanie Mueller, Massachusetts Institute of Technology
2018Authoring and Verifying Human-Robot InteractionsDavid Porfirio, University of Wisconsin-Madison; et al.
Aws Albarghouthi, University of Wisconsin-Madison
Bilge Mutlu, University of Wisconsin-Madison
Porta: Profiling Software Tutorials Using Operating-System-Wide Activity TracingAlok Mysore & Philip J. Guo, University of California San Diego
RESi: A Highly Flexible,Pressure-Sensitive,Imperceptible Textile Interface Based on Resistive YarnsPatrick Parzer, University of Applied Sciences Upper Austria; et al.
Kathrin Probst, University of Applied Sciences Upper Austria
Christian Rendl, University of Applied Sciences Upper Austria
Joanne Leong, University of Applied Sciences Upper Austria
Sarah Schuetz, University of Applied Sciences Upper Austria
Anita Vogl, University of Applied Sciences Upper Austria
Reinhard Schwoediauer, Johannes Kepler University
Martin Kaltenbrunner, Johannes Kepler University
Siegfried Bauer, Johannes Kepler University
Michael Haller, University of Applied Sciences Upper Austria
2017Triggering Artwork Swaps for Live AnimationNora S. Willett, Princeton University; et al.
Jovan Popovic, Adobe Research
Adam Finkelstein, Princeton University
Grabity: A Wearable Haptic Interface for Simulating Weight and Grasping in Virtual RealityInrak Choi, Stanford University; et al.
Mark R. Miller, Stanford University
Alex Olwal, Google
Sean Follmer, Stanford University
AirCode: Unobtrusive Physical Tags for Digital FabricationDingzeyu Li, Columbia University; et al.
Shree K. Nayar, Columbia University
Changxi Zheng, Columbia University
2016Rovables: Miniature On-Body Robots as Mobile WearablesArtem Dementyev, Massachusetts Institute of Technology; et al.
Inrak Choi, Stanford University
Deborah Ajilo, Massachusetts Institute of Technology
Maggie Xu, Stanford University
Joseph Paradiso, Massachusetts Institute of Technology
Chris Schmandt, Massachusetts Institute of Technology
Sean Follmer, Stanford University
Zooids: Building Blocks for Swarm User InterfacesMathieu Le Goc, INRIA; et al.
Ali Parsaei, Stanford University
Jean-Daniel Fekete, INRIA
Pierre Dragicevic, INRIA
Sean Follmer, Stanford University
proCover: Sensory Augmentation of Prosthetic Limbs Using Smart Textile CoversJoanne Leong, University of Applied Sciences Upper Austria; et al.
Florian Perteneder, University of Applied Sciences Upper Austria
Teo Babic, University of Applied Sciences Upper Austria
Christian Rendl, University of Applied Sciences Upper Austria
Anita Vogl, University of Applied Sciences Upper Austria
Hubert Egger, University of Applied Sciences Upper Austria
Alex Olwal, Google
Michael Haller, University of Applied Sciences Upper Austria
ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch AccelerometersGierad Laput, Carnegie Mellon University; et al.
Chris Harrison, Carnegie Mellon University
2015Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electro...Simon Olberding, Max Planck Institut; et al.
Klaus Hildebrandt, Max Planck Institut
Jurgen Steimle, Max Planck Institut
Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye MovementsAugusto Esteves, Lancaster University; et al.
Andreas Bulling, Max Planck Institut
Hans Gellersen, Lancaster University
Webstrates: Shareable Dynamic MediaClemens Klokmose, Aarhus University; et al.
Siemen Baader, Aarhus University
Wendy Mackay, INRIA
Michel Beaudouin-Lafon, Université Paris-Sud
2014Sensing Techniques for Tablet+Stylus InteractionKen Hinckley, Microsoft Research; et al.
Hrvoje Benko, Microsoft Research
Pourang Irani, Microsoft Research
Marcel Gavriliu, Microsoft Research
François Guimbretière, Microsoft Research
Xiang Anthony Chen, Microsoft Research
Fabrice Matulic, Microsoft Research
William Buxton, Microsoft Research
Andrew Wilson, Microsoft Research
Expert Crowdsourcing with Flash TeamsDaniela Retelny, Stanford University; et al.
Alexandra To, Stanford University
Walter Lasecki, University of Rochester
Jay Patel, Stanford University
Negar Rahmati, Stanford University
Tulsee Doshi, Stanford University
Melissa Valentine, Stanford University
Michael Bernstein, Stanford University
PrintScreen: Fabricating Highly Customizable Thin-film Touch-DisplaysSimon Olberding, Max Planck Institut; et al.
Jürgen Steimle, Max Planck Institut
2013PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing InterfacesLining Yao, Massachusetts Institute of Technology; et al.
Jifei Ou, Massachusetts Institute of Technology
Sean Follmer, Massachusetts Institute of Technology
Clark Della Silva, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology
Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic SensingMakoto Ono, University of Tsukuba; et al.
Jiro Tanaka, University of Tsukuba
Fiberio: A Touchscreen that Senses FingerprintsChristian Holz & Patrick Baudisch, Hasso Plattner Institute
2012Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Changi...Sean Follmer, Massachusetts Institute of Technology; et al.
Alex Olwal, Massachusetts Institute of Technology
Nadia Cheng, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology
Cliplets: juxtaposing still and dynamic imageryNeel Joshi, Microsoft Research; et al.
Steven Drucker, Microsoft Research
Eric Stollnitz, Microsoft Research
Hugues Hoppe, Microsoft Research
Matt Uyttendaele, Microsoft
Michael Cohen, Microsoft Research
CrowdScape: interactively visualizing user behavior and outputJeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University
2011SideBySide: Ad-hoc Multi-user Interaction with Handheld ProjectorsKarl D.D. Willis, Carnegie Mellon University; et al.
Scott E. Hudson, Carnegie Mellon University
Moshe Mahler, Disney Research
2010VizWiz: nearly real-time answers to visual questionsJeffrey P. Bigham, University of Rochester; et al.
Hanjie Ji, University of Rochester
Greg Little, Massachusetts Institute of Technology
Andrew Miller, University of Central Florida
Robert C. Miller, Massachusetts Institute of Technology
Robin Miller, University of Rochester
Aubrey Tatarowicz, Massachusetts Institute of Technology
Brandyn White, University of Maryland
Samual White, University of Rochester
Tom Yeh, University of Maryland
2009Mouse 2.0: Multi-touch meets the MouseNicolas Villar, Microsoft Research; et al.
Dan Rosenfeld, Microsoft
Hrvoje Benko, Microsoft Research
John Helmes, Microsoft Research
Jonathan Westhues, Microsoft Research
Steve Hodges, Microsoft Research
Eyal Ofek, Microsoft
Alex Butler, Microsoft Research
Xiang Cao, Microsoft Research
Billy Chen, Microsoft
2008Bringing Physics to the SurfaceAndrew D. Wilson, Microsoft Research; et al.
Otmar Hilliges, Microsoft Research
Armando Garcia-Mendoza, Microsoft Research
David Kirk, Microsoft Research
2007ThinSight: Versatile Multi-touch Sensing for Thin Form-factor DisplaysSteve Hodges, Microsoft Research; et al.
Alex Butler, Microsoft Research
Alban Rrustemi, Microsoft Research
Bill Buxton, Microsoft Research
2006Reflective Physical Prototyping through Integrated Design,Test,and AnalysisBjörn Hartmann, Stanford University; et al.
Michael Bernstein, Stanford University
Leith Abdulla, Stanford University
Brandon Burr, Stanford University
Avi Robinson-Mosher, Stanford University
Jennifer Gee, Stanford University
2005Automation and Customization of Rendered Web PagesMichael Bolin, Massachusetts Institute of Technology; et al.
Philip Rha, Massachusetts Institute of Technology
Tom Wilson, Massachusetts Institute of Technology
Robert C. Miller, Massachusetts Institute of Technology
2004Multi-Finger Gestural Interaction with 3D Volumetric DisplaysTovi Grossman, University of Toronto; et al.
Ravin Balakrishnan, University of Toronto
CrossY: A Crossing-Based Drawing ApplicationGeorg Apitz & François Guimbretière, University of Maryland
2003Perceptually-Supported Image Editing of Text and GraphicsEric Saund, Palo Alto Research Center; et al.
Daniel Larner, Palo Alto Research Center
James Mahoney, Palo Alto Research Center
2002Clothing ManipulationTakeo Igarashi, University of Tokyo
John F. Hughes, Brown University
2001Phidgets: Easy Development of Physical Interfaces through Physical WidgetsSaul Greenberg & Chester Fitchett, University of Calgary
2000Sensing Techniques for Mobile InteractionKen Hinckley, Microsoft Research; et al.
Mike Sinclair, Microsoft Research
Eric Horvitz, Microsoft Research
1996Indigo: A Local Propagation Algorithm for Inequality ConstraintsAlan Borning, University of Washington; et al.
Bjorn Freeman-Benson, Object Technology International
VLDB (Databases)
2019Fine-Grained,Secure and Efficient Data Provenance on Blockchain SystemsPingcheng Ruan, National University of Singapore; et al.
Tien Tuan Anh Dinh, National University of Singapore
Qian Lin, National University of Singapore
Beng Chin Ooi, National University of Singapore
Meihui Zhang, Beijing Institute of Technology
2018The Ubiquity of Large Graphs and Surprising Challenges of Graph Processing: Extended SurveySiddhartha Sahu, University of Waterloo; et al.
Semih Salihoglu, University of Waterloo
Jimmy Lin, University of Waterloo
M. Tamer ötzsu, University of Waterloo
2017Provenance for Natural Language QueriesDaniel Deutch, Tel-Aviv University; et al.
Amir Gilad, Tel-Aviv University
2016Compressed Linear Algebra for Large-Scale Machine LearningAhmed Elgohary, University of Maryland; et al.
Peter Haas, IBM Research
Fred Reiss, IBM Research
Berthold Reinwald, IBM Research
2015Constructing an interactive natural language interface for relational databasesFei Li & H. V. Jagadish, University of Michigan
2014The Uncracked Pieces in Database CrackingFelix Martin Schuhknecht, Saarland University; et al.
Jens Dittrich, Saarland University
epiC: an Extensible and Scalable System for Processing Big DataDawei Jiang, National University of Singapore; et al.
Beng Chin Ooi, National University of Singapore
Kian-Lee Tan, National University of Singapore
Sai Wu, Zhejiang University
M4: A Visualization-Oriented Time Series Data AggregationUwe Jugel, SAP; et al.
Gregor Hackenbroich, SAP
Volker Markl, Technische Universität Berlin
Building Efficient Query Engines in a High-Level LanguageYannis Klonatos, École Polytechnique Fédérale de Lausanne; et al.
Tiark Rompf, École Polytechnique Fédérale de Lausanne
Hassan Chaf, Oracle
On k-Path Covers and their ApplicationsStefan Funke, University of Stuttgart; et al.
Sabine Storandt, University of Stuttgart
2013DisC Diversity: Result Diversification based on Dissimilarity and CoverageMarina Drosou & Evaggelia Pitoura, University of Ioannina
2012Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story IdentificationAlbert Angel, University of Toronto; et al.
Nikos Sarkas, University of Toronto
Divesh Srivastava, AT&T Laboratories
2011RemusDB: Transparent High-Availability for Database SystemsUmar Farooq Minhas, University of Waterloo; et al.
Brendan Cully, University of British Columbia
Ashraf Aboulnaga, University of Waterloo
Ken Salem, University of Waterloo
Andrew Warfield, University of British Columbia
2010Towards Certain Fixes with Editing Rules and Master DataShuai Ma, University of Edinburgh; et al.
Jianzhong Li, Harbin Institute of Technology
Wenyuan Yu, University of Edinburgh
Nan Tang, University of Edinburgh
2009A Unified Approach to Ranking in Probabilistic DatabasesJian Li, University of Maryland; et al.
Amol Deshpande, University of Maryland
2008Finding Frequent Items in Data StreamsGraham Cormode & Marios Hadjieleftheriou, AT&T Laboratories
Constrained Physical Design TuningNicolas Bruno & Surajit Chaudhuri, Microsoft Research
2007Scalable Semantic Web Data Management Using Vertical PartitioningDaniel J. Abadi, Massachusetts Institute of Technology; et al.
Samuel R. Madden, Massachusetts Institute of Technology
Kate Hollenbach, Massachusetts Institute of Technology
2006Trustworthy Keyword Search for Regulatory-Compliant Records RetentionSoumyadeb Mitra, University of Illinois at Urbana-Champaign; et al.
Marianne Winslett, University of Illinois at Urbana-Champaign
2005Cache-conscious Frequent Pattern Mining on a Modern ProcessorAmol Ghoting, Ohio State University; et al.
Srinivasan Parthasarathy, Ohio State University
Daehyun Kim, Intel
Anthony D. Nguyen, Intel
Yen-Kuang Chen, Intel
Pradeep Dubey, Intel
2004Model-Driven Data Acquisition in Sensor NetworksAmol Deshpande, University of California Berkeley; et al.
Samuel R. Madden, Massachusetts Institute of Technology
Joseph M. Hellerstein, University of California Berkeley
Wei Hong, Intel Research
2001Weaving Relations for Cache PerformanceAnastassia Ailamaki, Carnegie Mellon University; et al.
Mark D. Hill, University of Wisconsin
Marios Skounakis, University of Wisconsin
1997Integrating Reliable Memory in DatabasesWee Teck Ng & Peter M. Chen, University of Michigan
WWW (World Wide Web)
2019Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the WildAmin Kharraz, University of Illinois Urbana-Champaign; et al.
Paul Murley, University of Illinois Urbana-Champaign
Charles Lever, Georgia Institute of Technology
Joshua Mason, University of Illinois Urbana-Champaign
Andrew Miller, University of Illinois Urbana-Champaign
Nikita Borisov, University of Illinois Urbana-Champaign
Manos Antonakakis, Georgia Institute of Technology
Michael Bailey, University of Illinois Urbana-Champaign
2018HighLife: Higher-arity Fact HarvestingPatrick Ernst, Saarland Informatics CampusSaarbrücken; et al.
Gerhard Weikum, Saarland Informatics CampusSaarbrücken
2016Social Networks Under StressDaniel Romero, University of Michigan; et al.
Jon Kleinberg, Cornell University
2015HypTrails: A Bayesian Approach for Comparing Hypotheses About Human Trails on the WebPhilipp Singer, GESIS - Leibniz Institute for the Social Sciences; et al.
Andreas Hotho, University of Würzburg
Markus Strohmaier, GESIS - Leibniz Institute for the Social Sciences
2014Efficient Estimation for High Similarities using Odd SketchesMichael Mitzenmacher, Harvard University; et al.
Ninh Pham, IT University of Copenhagen
2013No Country for Old Members: User Lifecycle and Linguistic Change in Online CommunitiesCristian Danescu-Niculescu-Mizil, Stanford University; et al.
Dan Jurafsky, Stanford University
Jure Leskovec, Stanford University
Christopher Potts, Stanford University
2012Counting Beyond a Yottabyte,or how SPARQL 1.1 Property Paths will Prevent Adoption of the StandardMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.
Jorge Pérez, Universidad de Chile
2011Towards a theory model for product searchBeibei Li, New York University; et al.
Panagiotis G. Ipeirotis, New York University
2010Factorizing personalized Markov chains for next-basket recommendationSteffen Rendle, Osaka University; et al.
Lars Schmidt-Thieme, University of Hildesheim
2009Hybrid keyword search auctionsAshish Goel, Stanford University
Kamesh Munagala, Duke University
2008IRLbot: Scaling to 6 billion pages and beyondHsin-Tsang Lee, Texas A&M University; et al.
Xiaoming Wang, Texas A&M University
Dmitri Loguinov, Texas A&M University
2007Wherefore art thou r3579x?: anonymized social networks,hidden patterns,and structural steganographyLars Backstrom, Cornell University; et al.
Jon Kleinberg, Cornell University
2006Random Sampling from a Search Engine's IndexZiv Bar-Yossef & Maxim Gurevich, Technion
2005Three-level caching for efficient query processing in large Web search enginesXiaohui Long & Torsten Suel, Polytechnic Institute of New York University
2004Automatic detection of fragments in dynamically generated web pagesLakshmish Ramaswamy, Georgia Institute of Technology; et al.
Ling Liu, Georgia Institute of Technology
Fred Douglis, IBM Research
2003Scaling personalized web searchGlen Jeh & Jennifer Widom, Stanford University
SemTag and seeker: bootstrapping the semantic web via automated semantic annotationStephen Dill, IBM Research; et al.
David Gibson, IBM Research
Daniel Gruhl, IBM Research
R. Guha, IBM Research
Anant Jhingran, IBM Research
Tapas Kanungo, IBM Research
Sridhar Rajagopalan, IBM Research
Andrew Tomkins, IBM Research
John A. Tomlin, IBM Research
Jason Y. Zien, IBM Research
2002Abstracting application-level web securityDavid Scott & Richard Sharp, University of Cambridge
2001Engineering Server Driven Consistency for Large Scale Dynamic Web ServicesJian Yin, University of Texas at Austin; et al.
Mike Dahlin, University of Texas at Austin
Arun Iyengar, IBM Research
2000Graph Structure in the WebAndrei Broder, AltaVista; et al.
Farzin Maghoul, AltaVista
Prabhakar Raghavan, IBM Research
Sridhar Rajagopalan, IBM Research
Raymie Stata, Compaq Systems Research Center
Andrew Tomkins, IBM Research
Janet Wiener, Compaq Systems Research Center
1999Focused Crawling: A New Approach to Topic-Specific Web Resource DiscoverySoumen Chakrabarti, Indian Institute of Technology; et al.
Byron Dom, IBM Research
1998The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/videoKevin C. Almeroth, University of California Santa Barbara
Mostafa H. Ammar, Georgia Institute of Technology


Institutions with Best Papers
Microsoft Research51.5
University of Washington48.7
Carnegie Mellon University45.2
Massachusetts Institute of Technology41.0
Stanford University40.5
University of California Berkeley29.8
Cornell University17.4
University of Illinois at Urbana-Champaign16.3
University of Toronto16.0
University of Michigan15.9
Google13.8
University of Texas at Austin13.0
IBM Research12.8
University of British Columbia11.7
University of Massachusetts Amherst11.2
Georgia Institute of Technology9.5
École Polytechnique Fédérale de Lausanne9.1
University of California Irvine8.9
University of Maryland8.9
Princeton University8.5
Yahoo! Research7.9
University of California San Diego7.8
University of Oxford7.4
Columbia University6.3
University of Waterloo6.2
Tsinghua University6.2
Weizmann Institute of Science6.2
University of Cambridge6.2
University of Wisconsin6.0
McGill University5.9
Brown University5.4
Technion5.4
University of Nottingham5.3
Tel-Aviv University5.3
Max Planck Institut5.2
KAIST5.0
INRIA4.9
National University of Singapore4.9
New York University4.9
AT&T Laboratories4.9
Northwestern University4.6
Oregon State University4.6
University of Alberta4.5
Purdue University4.5
Ohio State University4.4
University of Virginia4.2
NEC Labs America4.1
Hasso Plattner Institute4.0
Aalto University4.0
Université Paris-Sud4.0
University College London4.0
Newcastle University3.9
Bell Labs3.8
Saarland University3.7
University of Copenhagen3.7
Aarhus University3.6
University of Nebraska-Lincoln3.6
University of California Davis3.6
Delft University of Technology3.5
ETH Zurich3.5
Rice University3.5
University of North Carolina at Chapel Hill3.4
Hewlett-Packard Labs3.4
Rutgers University3.4
University of Bristol3.4
University of California Los Angeles3.3
University of Pennsylvania3.3
Technische Universität Berlin3.3
Peking University3.3
Imperial College London3.3
Virginia Tech3.0
Pennsylvania State University3.0
Indiana University at Bloomington3.0
DePaul University3.0
Microsoft3.0
University of Minnesota3.0
Hong Kong University of Science and Technology2.9
Lancaster University2.8
Chinese Academy of Sciences2.7
Paderborn University2.6
University of Edinburgh2.6
The Chinese University of Hong Kong2.5
Polytechnic Institute of New York University2.5
University of Tokyo2.5
Université catholique de Louvain2.4
Duke University2.4
University of Glasgow2.4
University of Applied Sciences Upper Austria2.4
University of Warsaw2.4
University of Saskatchewan2.4
University of Basel2.3
Toyota Technological Institute at Chicago2.3
Harvard University2.2
University of Amsterdam2.2
Singapore Management University2.2
University of Oregon2.2
Disney Research2.2
RWTH Aachen University2.2
Vienna University of Technology2.2
University of Canterbury2.2
University of Chicago2.2
Iowa State University2.2
Trinity College Dublin2.1
Inria2.1
California Institute of Technology2.1
University of Colorado2.1
University of Calgary2.1
VMware2.1
Intel Research2.0
Arizona State University2.0
Autodesk Research2.0
Zhejiang University2.0
NASA Ames Research Center2.0
Michigan State University2.0
BBN Technologies2.0
Universidade Técnica de Lisboa2.0
Chinese University of Hong Kong2.0
Limburgs Universitair Centrum2.0

Credit is given in decreasing author order as customary in many fields. First authors are given 1 point, second authors are given 0.5 points, third authors are given 0.33 points, etc. These points are then divided by the sum of points for that paper, i.e. normalizing it. This ranking may be inaccurate or incomplete, may not reflect the current state of best paper awards, and is not an official list. If you are not satisfied with the ranking listed here, please disregard it.

Back to Jeff Huang's Homepage

Brown University Human-Computer Interaction Research Group


Page last updated: 2019-02-21