By Conference: AAAI ACL CHI CIKM CVPR FOCS FSE ICCV ICML ICSE IJCAI INFOCOM KDD MOBICOM NeurIPS NSDI OSDI PLDI PODS S&P SIGCOMM SIGIR SIGMETRICS SIGMOD SODA SOSP STOC UIST VLDB WWW
Institutions with the most Best Papers
Much of this data was entered by hand (obtained by contacting past conference organizers, retrieving cached conference websites, and searching CVs) so please email me if you notice any errors or omissions: bestpaper-AT-jeffhuang.com. I (Jeff Huang) tried to collect best paper awards from the top-tier conferences in each area, but some conferences do not have such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award" and "outstanding paper award" are included but not "best student paper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL). The list of papers for years 2017 and 2018 were collected by Mingrui Ray Zhang and for 2019 by Willi Gierke.
AAAI (Artificial Intelligence) | ||
2019 | How to Combine Tree-Search Methods in Reinforcement Learning | Yonathan Efroni, Technion; et al. Bruno Scherrer, INRIA Shie Mannor, Technion |
2018 | Memory-Augmented Monte Carlo Tree Search | Chenjun Xiao, University of Alberta; et al. Martin Müller, University of Alberta |
2017 | Label-Free Supervision of Neural Networks with Physics and Domain Knowledge | Russell Stewart & Stefano Ermon, Stanford University |
2016 | Bidirectional Search That Is Guaranteed to Meet in the Middle | Robert C. Holte, University of Alberta; et al. Guni Sharon, Ben-Gurion University Nathan R. Sturtevant, University of Denver |
2015 | From Non-Negative to General Operator Cost Partitioning | Florian Pommerening, University of Basel; et al. Gabriele Röger, University of Basel Jendrik Seipp, University of Basel |
2014 | Recovering from Selection Bias in Causal and Statistical Inference | Elias Bareinboim, University of California Los Angeles; et al. Judea Pearl, University of California Los Angeles |
2013 | SMILe: Shuffled Multiple-Instance Learning | Gary Doran & Soumya Ray, Case Western Reserve University |
HC-Search: Learning Heuristics and Cost Functions for Structured Prediction | Janardhan Rao Doppa, Oregon State University; et al. Prasad Tadepalli, Oregon State University | |
2012 | Learning SVM Classifiers with Indefinite Kernels | Suicheng Gu & Yuhong Guo, Temple University |
Document Summarization Based on Data Reconstruction | Zhanying He, Zhejiang University; et al. Jiajun Bu, Zhejiang University Can Wang, Zhejiang University Lijan Zhang, Zhejiang University Deng Cai, Zhejiang University Xiaofei He, Zhejiang University | |
2011 | Complexity of and Algorithms for Borda Manipulation | Jessica Davies, University of Toronto; et al. Nina Narodytska, University of New South Wales Toby Walsh, NICTA |
Dynamic Resource Allocation in Conservation Planning | Daniel Golovin, California Institute of Technology; et al. Beth Gardner, North Carolina State University Sarah J. Converse, Patuxent Wildlife Research Center Steve Morey, U.S. Fish and Wildlife Service | |
2010 | A Novel Transition Based Encoding Scheme for Planning as Satisfiability | Ruoyun Huang, Washington University in St. Louis; et al. Weixiong Zhang, Washington University in St. Louis |
How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Answ... | Giorgos Stoilos, Oxford University; et al. Ian Horrocks, Oxford University | |
2008 | Optimal False-Name-Proof Voting Rules with Costly Voting | Liad Wagman & Vincent Conitzer, Duke University |
How Good is Almost Perfect? | Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg | |
2007 | PLOW: A Collaborative Task Learning Agent | James Allen, Institute for Human and Machine Cognition; et al. George Ferguson, University of Rochester Lucian Galescu, Institute for Human and Machine Cognition Hyuckchul Jung, Institute for Human and Machine Cognition Mary Swift, University of Rochester William Taysom, Institute for Human and Machine Cognition |
Thresholded Rewards: Acting Optimally in Timed,Zero-Sum Games | Colin McMillen & Manuela Veloso, Carnegie Mellon University | |
2006 | Model Counting: A New Strategy for Obtaining Good Bounds | Carla P. Gomes, Cornell University; et al. Bart Selman, Cornell University |
Towards an Axiom System for Default Logic | Gerhard Lakemeyer, RWTH Aachen University Hector J. Levesque, University of Toronto | |
2005 | The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic Selection | Vincent A. Cicirello, Drexel University Stephen F. Smith, Carnegie Mellon University |
2004 | Learning and Inferring Transportation Routines | Lin Liao, University of Washington; et al. Henry Kautz, University of Washington |
2002 | On Computing All Abductive Explanations | Thomas Eiter, Technische Universität Wien Kazuhisa Makino, Osaka University |
2000 | The Game of Hex: An Automatic Theorem-Proving Approach to Game Programming | Vadim V. Anshelevich, Vanshel Consulting |
1999 | PROVERB: The Probabilistic Cruciverbalist | Greg A. Keim, Duke University; et al. Michael L. Littman, Duke University Sushant Agarwal, Duke University Catherine M. Cheves, Duke University Joseph Fitzgerald, Duke University Jason Grosland, Duke University Fan Jiang, Duke University Shannon Pollard, Duke University Karl Weinmeister, Duke University |
1998 | Learning Evaluation Functions for Global Optimization and Boolean Satisfiability | Justin A. Boyan & Andrew W. Moore, Carnegie Mellon University |
The Interactive Museum Tour-Guide Robot | Wolfram Burgard, University of Bonn; et al. Dieter Fox, University of Bonn Dirk Hähnel, University of Bonn Gerhard Lakemeyer, Aachen University of Technology Dirk Schulz, University of Bonn Walter Steiner, University of Bonn Sebastian Thrun, Carnegie Mellon University | |
Acceleration Methods for Numeric CSPs | Yahia Lebbah & Olivier Lhomme, Ecole des Mines de Nantes | |
1997 | Statistical Parsing with a Context-Free Grammar and Word Statistics | Eugene Charniak, Brown University |
Building Concept Representations from Reusable Components | Peter Clark, Boeing Bruce Porter, University of Texas at Austin | |
Fast Context Switching in Real-Time Propositional Reasoning | P. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center | |
A Practical Algorithm for Finding Optimal Triangulations | Krill Shoikhet & Dan Geiger, Technion | |
1996 | A Novel Application of Theory Refinement to Student Modeling | Paul T. Baffes, SciComp Raymond J. Mooney, University of Texas at Austin |
Pushing the Envelope: Planning,Propositional Logic,and Stochastic Search | Henry Kautz & Bart Selman, AT&T Laboratories | |
Verification of Knowledge Bases Based on Containment Checking | Alon Y. Levy, AT&T Laboratories Marie-Christine Rousset, Université Paris-Sud | ACL (Natural Language Processing) |
2019 | Bridging the Gap between Training and Inference for Neural Machine Translation. | Wen Zhang, Chinese Academy of Sciences and University of Chinese Academy of Sciences; et al. Fandong Meng, Pattern Recognition Center and WeChat AI and Tencent Inc Di You, Worcester Polytechnic Institute Qun Liu, Huawei Noah’s Ark Lab |
2018 | Finding syntax in human encephalography with beam search | John Hale, Cornell University; et al. Adhiguna Kuncoro, University of Oxford Jonathan R. Brennan, University of Michigan |
2017 | Probabilistic Typology: Deep Generative Models of Vowel Inventories | Ryan Cotterell & Jason Eisner, Johns Hopkins University |
2016 | Finding Non-Arbitrary Form-Meaning Systematicity Using String-Metric Learning for Kernel Regression | E. Darío Gutiérrez, University of California Berkeley; et al. Benjamin K. Bergen, University of California San Diego |
2015 | Learning Dynamic Feature Selection for Fast Sequential Prediction | Emma Strubell, University of Massachusetts Amherst; et al. Kate Silverstein, University of Massachusetts Amherst Andrew McCallum, University of Massachusetts Amherst |
Improving Evaluation of Machine Translation Quality Estimation | Yvette Graham, Trinity College Dublin | |
2014 | Fast and Robust Neural Network Joint Models for Statistical Machine Translation | Jacob Devlin, Raytheon BBN Technologies; et al. Zhongqiang Huang, Raytheon BBN Technologies Thomas Lamar, Raytheon BBN Technologies Richard Schwartz, Raytheon BBN Technologies John Makhoul, Raytheon BBN Technologies |
2013 | Grounded Language Learning from Video Described with Sentences | Haonan Yu & Jeffrey Mark Siskind, Purdue University |
2012 | Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic Parsing | Hiroyuki Shindo, NTT Communication Science Laboratories; et al. Akinori Fujino, NTT Communication Science Laboratories Masaaki Nagata, NTT Communication Science Laboratories |
String Re-writing Kernel | Fan Bu, Tsinghua University; et al. Xiaoyan Zhu, Tsinghua University | |
2011 | Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based Projections | Dipanjan Das, Carnegie Mellon University Slav Petrov, Google |
2010 | Beyond NomBank: A Study of Implicit Arguments for Nominal Predicates | Matthew Gerber & Joyce Y. Chai, Michigan State University |
2009 | K-Best A* Parsing | Adam Pauls & Dan Klein, University of California Berkeley |
Reinforcement Learning for Mapping Instructions to Actions | S.R.K. Branavan, Massachusetts Institute of Technology; et al. Luke S. Zettlemoyer, Massachusetts Institute of Technology Regina Barzilay, Massachusetts Institute of Technology | |
Concise Integer Linear Programming Formulations for Dependency Parsing | André F.T. Martins, Instituto de Telecomunicações; et al. Eric P. Xing, Carnegie Mellon University | |
2008 | A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language Model | Libin Shen, BBN Technologies; et al. Ralph Weischedel, BBN Technologies |
Forest Reranking: Discriminative Parsing with Non-Local Features | Liang Huang, University of Pennsylvania | |
2007 | Learning synchronous grammars for semantic parsing with lambda calculus | Yuk Wah Wong & Raymond J. Mooney, University of Texas at Austin |
2006 | Semantic taxonomy induction from heterogenous evidence | Rion Snow, Stanford University; et al. Andrew Y. Ng, Stanford University |
2005 | A Hierarchical Phrase-Based Model for Statistical Machine Translation | David Chiang, University of Maryland |
2004 | Finding Predominant Word Senses in Untagged Text | Diana McCarthy, University of Sussex; et al. Julie Weeds, University of Sussex John Carroll, University of Sussex |
2003 | Towards a Model of Face-to-Face Grounding | Yukiko I. Nakano, RISTEX; et al. Tom Stocky, Massachusetts Institute of Technology Justine Cassell, Massachusetts Institute of Technology |
Accurate Unlexicalized Parsing | Dan Klein & Christopher D. Manning, Stanford University | |
2002 | Discriminative Training and Maximum Entropy Models for Statistical Machine Translation | Franz Josef Och & Hermann Ney, RWTH Aachen University |
2001 | Fast Decoding and Optimal Decoding for Machine Translation | Ulrich Germann, University of Southern California; et al. Kevin Knight, University of Southern California Daniel Marcu, University of Southern California Kenji Yamada, University of Southern California |
Immediate-Head Parsing for Language Models | Eugene Charniak, Brown University | CHI (Human-Computer Interaction) |
2019 | “Occupational Therapy is Making”: Design Iteration and Digital Fabrication in Occupational Therapy | Megan Hofmann, Carnegie Mellon University; et al. Toni Kaplan, Carnegie Mellon University Stephanie Valencia, Carnegie Mellon University Gabriella Han, Carnegie Mellon University Scott E Hudson, Carnegie Mellon University Jennifer Mankoff, University of Washington Patrick Carrington, Carnegie Mellon University |
“I feel it is my responsibility to stream”: Streaming and Engaging with Intangible Cultural Heritag... | Zhicong Lu, University of Toronto; et al. Mingming Fan, University of Toronto Daniel Wigdor, University of Toronto | |
Guerilla Warfare and the Use of New (and Some Old) Technology: Lessons from FARC’s Armed Struggle i... | Débora de Castro Leal, University of Siegen; et al. Kaoru Misaki, University of Siegen David Randall, University of Siegen Volker Wulf, Institute of Information Systems and New Media | |
Investigating Slowness as a Frame to Design Longer-Term Experiences with Personal Data: A Field Stu... | William Odom, Simon Fraser University; et al. Jeroen Hol, Eindhoven University of Technology Bram Naus, Eindhoven University of Technology Pepijn Verburg, Eindhoven University of Technology Tal Amram, Simon Fraser University Amy Yo Sue Chen, Simon Fraser University | |
Engagement with Mental Health Screening on Mobile Devices: Results from an Antenatal Feasibility St... | Kevin Doherty, Trinity College Dublin; et al. Martin Cohn, Imperial College London Nikolaos Mastellos, Imperial College London Cecily Morrison, Microsoft Research Cambridge Josip Car, Imperial College London Gavin Doherty, Trinity College Dublin | |
Anchored Audio Sampling: A Seamless Method for Exploring Children’s Thoughts During Deployment Stud... | Alexis Hiniker, University of Washington; et al. Mingrui Ray Zhang, University of Washington Erin Beneteau, University of Washington | |
Unremarkable AI: Fitting Intelligent Decision Support into Critical,Clinical Decision-Making Proces... | Qian Yang, Carnegie Mellon University; et al. John Zimmerman, Carnegie Mellon University | |
Online grocery delivery services: An opportunity to address food disparities in transportation-scar... | Tawanna R Dillahunt, University of Michigan; et al. Xuecong Xu, University of Michigan | |
Voice User Interfaces in Schools: Co-designing for Inclusion With Visually-Impaired and Sighted Pup... | Oussama Metatla, University of Bristol; et al. Taimur Ahmed, University of Bristol Antonis Vafeas, University of Bristol Sunny Miglani, University of Bristol | |
Increasing the Transparency of Research Papers with Explorable Multiverse Analyses | Pierre Dragicevic, Inria; et al. Abhraneel Sarma, University of Michigan Matthew Kay, University of Michigan Fanny Chevalier, University of Toronto | |
Geppetto: Enabling Semantic Design of Expressive Robot Behaviors | Ruta Desai, Carnegie Mellon University; et al. Justin Matejka, Autodesk Research Stelian Coros, Carnegie Mellon University James Lewis McCann, Carnegie Mellon University George Fitzmaurice, Autodesk Research Tovi Grossman, Autodesk Research | |
Project Sidewalk: A Web-based Crowdsourcing Tool for Collecting Sidewalk Accessibility Data At Scal... | Manaswi Saha, University of Washington; et al. Hanuma Teja Maddali, University of Maryland Aileen Zeng, University of Washington Ryan Holland, Montgomery Blair High School Steven Bower, University of Maryland Aditya Dash, University of Maryland Sage Chen, University of Michigan Anthony Li, University of Maryland Kotaro Hara, Singapore Management University Jon Froehlich, University of Washington | |
Touchstone2: An Interactive Environment for Exploring Trade-offs in HCI Experiment Design | Alexander Eiselmayer, University of Zurich; et al. Michel Beaudouin-Lafon, Université Paris-Saclay Wendy Elizabeth Mackay, Université Paris-Saclay | |
AffinityLens: Data-Assisted Affinity Diagramming with Augmented Reality | Hariharan Subramonyam, University of Michigan; et al. Eytan Adar, University of Michigan | |
A Translational Science Model for HCI | Lucas Franco Colusso, University of Washington; et al. Sean A. Munson, University of Washington Gary Hsieh, University of Washington | |
A Tale of Two Perspectives: A Conceptual Framework of User Expectations and Experiences of Instruct... | Ahed Aladwan, The University of Melbourne; et al. Steven Baker, The University of Melbourne Eduardo Velloso, The University of Melbourne | |
Street-Level Algorithms: A Theory At The Gaps Between Policy and Decisions | Ali Alkhatib & Michael Bernstein, Stanford University | |
Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Sa... | Karla Badillo-Urquiola, University of Central Florida; et al. Pamela J. Wisniewski, University of Central Florida | |
Protection,Productivity and Pleasure in the Smart Home: Emerging Expectations and Gendered Insights... | Yolande Strengers, Monash University; et al. Paula Arcari, RMIT University Larissa Nicholls, RMIT University Mel Gregg, Intel Corporation | |
Detecting Personality Traits Using Eye-Tracking Data | Shlomo Berkovsky, Macquarie University; et al. Irena Koprinska, University of Sydney Eileen Wang, University of Sydney Yucheng Zeng, University of Sydney Jingjie Li, University of Wisconsin–Madison Sabina Kleitman, University of Sydney | |
ReType: Quick Text Editing with Keyboard and Gaze | Shyamli Sindhwani, University of Auckland; et al. Gerald Weber, University of Auckland | |
Data is Personal: Attitudes and Perceptions of Data Visualization in Rural Pennsylvania | Evan Peck, Bucknell University; et al. Sofia E Ayuso, Bucknell University | |
PicMe: Interactive Visual Guidance for Taking Requested Photo Composition | Minju Kim, Korea Advanced Institute of Science and Technology Jungjin Lee, KAI Inc. | |
Managing Messes in Computational Notebooks | Andrew Head, UC Berkeley; et al. Titus Barik, Microsoft Steven Drucker, Microsoft Research Robert DeLine, Microsoft Research | |
A Framework for the Experience of Meaning in Human-Computer Interaction | Elisa D Mekler, University of Basel Kasper Hornbæk, University of Copenhagen | |
Managerial Visions: Stories of upgrading and maintaining the public restroom with IoT | Sarah Fox, University of California San Diego; et al. Daniela Rosner, University of Washington | |
Social Play in an Exergame: How the Need to Belong Predicts Adherence | Maximus D. Kaos, Queen’s University and Aalto University; et al. Perttu Hätmätlätinen, Aalto University T.C. Nicholas Graham, Queen’s University | |
“Think secure from the beginning”: A Survey with Software Developers | Hala Assal & Sonia Chiasson, Carleton University | |
“They don’t leave us alone anywhere we go”: Gender and Digital Abuse in South Asia | Nithya Sambasivan, Google; et al. Nova Ahmed, North South University Tara Matthews, Independent Researcher Kurt Thomas, Google Laura Sanely Gaytán-Lugo, Universidad de Colima David Nemer, University of Kentucky Elie Bursztein, Google Elizabeth Churchill, Google Sunny Consolvo, Google | |
2018 | Agile 3D Sketching with Air Scaffolding | Yongkwan Kim, KAIST; et al. Joon Hyub Lee, KAIST Seok-Hyung Bae, KAIST |
Pinpointing: Precise Head- and Eye-Based Target Selection for Augmented Reality | Mikko Kytö, Aalto University; et al. Thammathip Piumsomboon, University of South Australia Gun A. Lee, University of South Australia Mark Billinghurst, University of South Australia | |
Data Illustrator: Augmenting Vector Design Tools with Lazy Data Binding for Expressive Visualizatio... | Zhicheng Liu, Adobe Research; et al. Alan Wilson, Adobe Systems Inc. Mira Dontcheva, Adobe Research James Delorey, Adobe Systems Inc. Sam Grigg, Adobe Systems Inc. Bernard Kerr, Adobe Systems Inc. John Stasko, Georgia Institute of Technology | |
“A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology | Diana Freed, Cornell Tech; et al. Diana Minchala, City College of New York Karen Levy, Cornell University Thomas Ristenpart, Cornell Tech Nicola Dell, Cornell Tech | |
Keeping a Low Profile? Technology,Risk and Privacy among Undocumented Immigrants | Tamy Guberek, University of Michigan; et al. Sylvia Simioni, University of Michigan Abraham H. Mhaidli, University of Michigan Kentaro Toyama, University of Michigan Florian Schaub, University of Michigan | |
Streets for People: Engaging Children in Placemaking Through a Socio-technical Process | Sean Peacock, Newcastle University; et al. Clara Crivellaro, Newcastle University | |
Addressing Age-Related Bias in Sentiment Analysis | Mark Diaz, Northwestern University; et al. Amanda Lazar, University of Maryland Anne Marie Piper, Northwestern University Darren Gergle, Northwestern University | |
Gender Recognition or Gender Reductionism?: The Social Implications of Embedded Gender Recognition ... | Foad Hamidi, University of Maryland; et al. Stacy M. Branham, University of Maryland | |
How Relevant are Incidental Power Poses for HCI? | Yvonne Jansen, Sorbonne Université Kasper Hornbæk, University of Copenhagen | |
Voice Interfaces in Everyday Life | Martin Porcheron, University of Nottingham; et al. Stuart Reeves, The University of Nottingham Sarah Sharples, University of Nottingham | |
Examining Wikipedia With a Broader Lens: Quantifying the Value of Wikipedia's Relationships with Ot... | Nicholas Vincent, Northwestern University; et al. Brent Hecht, Northwestern University | |
Let's Talk About Race: Identity,Chatbots,and AI | Ari Schlesinger, Georgia Institute of Technology; et al. Alex S. Taylor, City University of London | |
Semi-Automated Coding for Qualitative Research: A User-Centered Inquiry and Initial Prototypes | Megh Marathe & Kentaro Toyama, University of Michigan | |
Wall++: Room-Scale Interactive and Context-Aware Sensing | Yang Zhang, Carnegie Mellon University; et al. Scott E. Hudson, Carnegie Mellon University Chris Harrison, Carnegie Mellon University Alanson Sample, Disney Research | |
HARK No More: On the Preregistration of CHI Experiments | Andy Cockburn, University of Canterbury; et al. Alan Dix, University of Birmingham | |
Making as Expression: Informing Design with People with Complex Communication Needs through Art The... | Amanda Lazar, University of Maryland; et al. Caroline Edasis, Mather LifeWays Anne Marie Piper, Northwestern University | |
Expressive Time Series Querying with Hand-Drawn Scale-Free Sketches | Miro Mannino & Azza Abouzied, New York University | |
Project Zanzibar: A Portable and Flexible Tangible Interaction Platform | Nicolas Villar, Microsoft Research; et al. Greg Saul, Microsoft Research Christian Holz, Microsoft Research Tim Regan, Microsoft Research Oscar Salandin, Microsoft Researcch Misha Sra, Microsoft Research Hui-Shyong Yeo, Microsoft Research William Field, Microsoft Research Haiyan Zhang, Microsoft Research | |
Experiencing the Body as Play | Florian 'Floyd' Mueller, RMIT University; et al. Josh Andres, RMIT University Rakesh Patibanda, RMIT University | |
Making Core Memory: Design Inquiry into Gendered Legacies of Engineering and Craftwork | Daniela K. Rosner, University of Washington; et al. Brock R. Craft, University of Washington Helen Remick, Self-employed | |
Design for Collaborative Survival: An Inquiry into Human-Fungi Relationships | Jen Liu, University of Colorado Boulder; et al. Laura Devendorf, University of Colorado Boulder | |
Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in B... | Sharifa Sultana, Cornell University; et al. Phoebe Sengers, Cornell University Nicola Dell, Cornell Tech | |
Hoarding and Minimalism: Tendencies in Digital Data Preservation | Francesco Vitale, University of British Columbia; et al. Joanna McGrenere, University of British Columbia | |
Extending Manual Drawing Practices with Artist-Centric Programming Tools | Jennifer, Jacobs Massachusetts Institute of Technology; et al. Radomír Mech, Adobe Research Mitchel Resnick, Massachusetts Institute of Technology | |
2017 | Kinecting with Orangutans: Zoo Visitors' Empathetic Responses to Animals' Use of Interactive Techno... | Sarah Webber, University of Melbourne; et al. Sally Sherwen, Zoos Victoria Wally Smith, University of Melbourne Zaher Joukhadar, University of Melbourne Frank Vetere, University of Melbourne |
Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing,A... | Viirj Kan, Massachusetts Institute of Technology; et al. Noa Machover, Massachusetts Institute of Technology Hiroshi Ishii, Massachusetts Institute of Technology Serena Pan, Massachusetts Institute of Technology Weixuan Chen, Massachusetts Institute of Technology Yasuaki Kakehi, Keio University | |
Understanding Public Evaluation: Quantifying Experimenter Intervention | Julie R. Williamson & John Williamson, University of Glasgow | |
Designing Gamified Applications that Make Safe Driving More Engaging | Fabius Steinberger, Queensland University of Technology; et al. Marcus Foth, Queensland University of Technology Daniel Johnson, Queensland University of Technology | |
Illumination Aesthetics: Light as a Creative Material within Computational Design | Cesar Torres, University of California Berkeley; et al. Molly Nicholas, University of California Berkeley Eric Paulos, University of California Berkeley | |
Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse | Tara Matthews, Google; et al. Anna Turner, Google Manya Sleeper, Google Jill Palzkill Woelfer, Google Martin Shelton, Google Cori Manthorne, Community Overcoming Relationship Abuse Elizabeth F. Churchill, Google Sunny Consolvo, Google | |
ShareVR: Enabling Co-Located Experiences for Virtual Reality between HMD and Non-HMD Users | Jan Gugenheimer, Ulm University; et al. Julian Frommel, Ulm University Enrico Rukzio, Ulm University | |
Examining Menstrual Tracking to Inform the Design of Personal Informatics Tools | Daniel A. Epstein, University of Washington; et al. Jennifer H. Kang, University of Washington Elena Agapie, University of Washington Jessica Schroeder, University of Washington Laura R. Pina, University of Washington James Fogarty, University of Washington Julie A. Kientz, University of Washington Sean Munson, University of Washington | |
Explaining the Gap: Visualizing One's Predictions Improves Recall and Comprehension of Data | Yea-Seul Kim, University of Washington; et al. Jessica Hullman, University of Washington | |
mHealth for Maternal Mental Health: Everyday Wisdom in Ethical Design | Marguerite Barry, Trinity College Dublin; et al. Jose Marcano Belisario, Imperial College London Josip Car, Imperial College London Cecily Morrison, Imperial College London Gavin Doherty, Trinity College Dublin | |
A Critical Lens on Dementia and Design in HCI | Amanda Lazar, Northwestern University; et al. Anne Marie Piper, Northwestern University | |
What Is Interaction? | Kasper Hornbæk, University of Copenhagen Antti Oulasvirta, Aalto University | |
BIGnav: Bayesian Information Gain for Guiding Multiscale Navigation | Wanyu Liu, Université Paris-Saclay; et al. Michel Beaudouin-Lafon, Université Paris-Saclay Olivier Rioul, Université Paris-Saclay | |
Modelling Learning of New Keyboard Layouts | Jussi P. P. Jokinen, Aalto University; et al. Antti Oulasvirta, Aalto University Chaklam Silpasuwanchai, Kochi University of Technology Zhenxin Wang, Kochi University of Technology Xiangshi Ren, Kochi University of Technology | |
Flash Organizations: Crowdsourcing Complex Work by Structuring Crowds As Organizations | Melissa A. Valentine, Stanford University; et al. Alexandra To, Carnegie Mellon University Negar Rahmati, Stanford University Tulsee Doshi, Stanford University Michael S. Bernstein, Stanford University | |
Reflective Practicum: A Framework of Sensitising Concepts to Design for Transformative Reflection | Petr Slovák, Vienna University of Technology; et al. Geraldine Fitzpatrick, Vienna University of Technology | |
What Can Be Predicted from Six Seconds of Driver Glances? | Lex Fridman, Massachusetts Institute of Technology; et al. Sean Seaman, Touchstone Evaluations Bobbie Seppelt, Touchstone Evaluations Linda Angell, Touchstone Evaluations Joonbum Lee, Massachusetts Institute of Technology Bruce Mehler, Massachusetts Institute of Technology Bryan Reimer, Massachusetts Institute of Technology | |
Design and Evaluation of a Data-Driven Password Meter | Blase Ur, University of Chicago; et al. Maung Aung, Carnegie Mellon University Lujo Bauer, Carnegie Mellon University Nicolas Christin, Carnegie Mellon University Jessica Colnago, Carnegie Mellon University Lorrie Faith Cranor, Carnegie Mellon University Henry Dixon, Carnegie Mellon University Pardis Emami Naeini, Carnegie Mellon University Hana Habib, Carnegie Mellon University Noah Johnson, Carnegie Mellon University William Melicher, Carnegie Mellon University | |
You Want Me to Work with Who?: Stakeholder Perceptions of Automated Team Formation in Project-based... | Farnaz Jahanbakhsh, University of Illinois at Urbana-Champaign; et al. Karrie Karahalios, University of Illinois at Urbana-Champaign Darko Marinov, University of Illinois at Urbana-Champaign Brian Bailey, University of Illinois at Urbana-Champaign | |
Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing A... | Viirj Kan, Massachusetts Institute of Technology; et al. Noa Machover, Massachusetts Institute of Technology Hiroshi Ishii, Massachusetts Institute of Technology Serena Pan, Massachusetts Institute of Technology Weixuan Chen, Massachusetts Institute of Technology Yasuaki Kakehi, Massachusetts Institute of Technology | |
2016 | The Effect of Visual Appearance on the Performance of Continuous Sliders and Visual Analogue Scales | Justin Matejka, Autodesk Research; et al. Tovi Grossman, Autodesk Research George Fitzmaurice, Autodesk Research |
Designing Movement-based Play With Young People Using Powered Wheelchairs | Kathrin Gerling, University of Lincoln; et al. Michael Kalyn, University of Lincoln Adam Evans, University of Copenhagen Conor Linehan, University College Cork | |
Object-Oriented Drawing | Haijun Xia, University of Toronto; et al. Tovi Grossman, Autodesk Research Daniel Wigdor, University of Toronto | |
Enabling Designers to Foresee Which Colors Users Cannot See | Katharina Reinecke, University of Washington; et al. Christopher Brooks, University of Michigan | |
On Looking at the Vagina through Labella | Teresa Almeida, Newcastle University; et al. Gavin Wood, Newcastle University Dean Saraf, Newcastle University Madeline Balaam, Newcastle University | |
Project Jacquard: Interactive Digital Textiles at Scale | Ivan Poupyrev, Google; et al. Shiho Fukuhara, Google Mustafa Emre Karagozler, Google Carsten Schwesig, Google Karen E. Robinson, Google | |
"I don't Want to Wear a Screen": Probing Perceptions of and Possibilities for Dynamic Displays on C... | Laura Devendorf, University of California Berkeley; et al. Noura Howell, University of California Berkeley Jung Lin Lee, University of California Berkeley Nan-Wei Gong, Google M. Emre Karagozler, Google Shiho Fukuhara, Google Ivan Poupyrev, Google Eric Paulos, University of California Berkeley Kimiko Ryokai, University of California Berkeley | |
Momentary Pleasure or Lasting Meaning?: Distinguishing Eudaimonic and Hedonic User Experiences | Elisa D. Mekler, University of Basel Kasper Hornbæk, University of Copenhagen | |
RapID: A Framework for Fabricating Low-Latency Interactive Objects with RFID Tags | Andrew Spielberg, Massachusetts Institute of Technology; et al. Scott E. Hudson, Carnegie Mellon University Jennifer Mankoff, Carnegie Mellon University James McCann, Disney Research | |
HCI Research as Problem-Solving | Antti Oulasvirta, Aalto University Kasper Hornbæk, University of Copenhagen | |
Haptic Wave: A Cross-Modal Interface for Visually Impaired Audio Producers | Atau Tanaka & Adam Parkinson, Goldsmiths | |
FlexCase: Enhancing Mobile Interaction with a Flexible Sensing and Display Cover | Christian Rendl, University of Applied Sciences Upper Austria; et al. Patrick Parzer, University of Applied Sciences Upper Austria Sean Fanello, Microsoft Research Martin Zirkl, Institute of Surface Technologies and Photonics Gregor Scheipl, Joanneum Research Forschungsgesellschaft m.b.H Michael Haller, University of Applied Sciences Upper Austria Shahram Izadi, Microsoft Research | |
Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences | Pamela Wisniewski, University of Central Florida; et al. Mary Beth Rosson, Pennsylvania State University Daniel F. Perkins, Pennsylvania State University John M. Carroll, Pennsylvania State University | |
Understanding and Mitigating the Effects of Device and Cloud Service Design Decisions on the Enviro... | Chris Preist, University of Bristol; et al. Eli Blevis, Indiana University Bloomington | |
Enhancing Cross-Device Interaction Scripting with Interactive Illustrations | Pei-Yu (Peggy) Chi, University of California Berkeley; et al. Björn Hartmann, University of California Berkeley | |
Learn Piano with BACh: An Adaptive Learning Interface that Adjusts Task Difficulty Based on Brain S... | Beste F. Yuksel, Tufts University; et al. Lane Harrison, Worcester Polytechnic Institute Evan M. Peck, Bucknell University Daniel Afergan, Tufts University Remco Chang, Tufts University Robert JK Jacob, Tufts University | |
Smart Touch: Improving Touch Accuracy for People with Motor Impairments with Template Matching | Martez E. Mott, University of Washington; et al. Shaun K. Kane, University of Colorado Boulder Jacob O. Wobbrock, University of Washington | |
Building a Personalized,Auto-Calibrating Eye Tracker from User Interactions | Michael Xuelin Huang, Hong Kong Polytechnic University; et al. Grace Ngai, Hong Kong Polytechnic University Stephen C.F. Chan, Hong Kong Polytechnic University Hong Va Leong, Hong Kong Polytechnic University | |
Developing and Validating the User Burden Scale: A Tool for Assessing User Burden in Computing Syst... | Hyewon Suh, University of Washington; et al. Eric B. Hekler, Arizona State University Julie A. Kientz, University of Washington | |
Foraging Among an Overabundance of Similar Variants | Sruti Srinivasa Ragavan, Oregon State University; et al. Charles Hill, Oregon State University Anita Sarma, Oregon State University David Piorkowski, Oregon State University Margaret Burnett, Oregon State University | |
Finding Email in a Multi-Account,Multi-Device World | Marta E. Cecchinato, University College London; et al. Milad Shokouhi, Microsoft Research Gavin Smyth, Microsoft Research | |
Empath: Understanding Topic Signals in Large-Scale Text | Ethan Fast, Stanford University; et al. Michael Bernstein, Stanford University | |
Lock n' LoL: Group-based Limiting Assistance App to Mitigate Smartphone Distractions in Group Activ... | Minsam Ko, KAIST; et al. Koji Yatani, University of Tokyo Uichin Lee, KAIST | |
2015 | Affordance++: Allowing Objects to Communicate Dynamic Use | Pedro Lopes, Hasso Plattner Institute; et al. Patrick Baudisch, Hasso Plattner Institute |
VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboa... | Keith Vertanen, Montana Tech; et al. Justin Emge, Montana Tech Shyam Reyal, University of St Andrews Per Ola Kristensson, University of Cambridge | |
What Makes Interruptions Disruptive?: A Process-Model Account of the Effects of the Problem State B... | Jelmer P. Borst, University of Groningen; et al. Hedderik van Rijn, University of Groningen | |
Lightweight Relief Shearing for Enhanced Terrain Perception on Interactive Maps | Wesley Willett, INRIA; et al. Tobias Isenberg, INRIA Pierre Dragicevic, INRIA | |
The Social Impact of a Robot Co-Worker in Industrial Settings | Allison Sauppé & Bilge Mutlu, University of Wisconsin | |
Sangeet Swara: A Community-Moderated Voice Forum in Rural India | Aditya Vashistha, University of Washington; et al. Gaetano Borriello, University of Washington William Thies, Microsoft Research | |
Understanding and Supporting Fathers and Fatherhood on Social Media Sites | Tawfiq Ammari & Sarita Schoenebeck, University of Michigan | |
Patina Engraver: Visualizing Activity Logs as Patina in Fashionable Trackers | Moon-Hwan Lee, KAIST; et al. Tek-Jin Nam, KAIST | |
Fluid Grouping: Quantifying Group Engagement around Interactive Tabletop Exhibits in the Wild | Florian Block, Harvard University; et al. Michael Horn, Northwestern University Amy Spiegel, University of Nebraska-Lincoln Jonathan Christiansen, TERC Brenda Phillips, Harvard University Judy Diamond, University of Nebraska State Museum E. Margaret Evans, University of Michigan Chia Shen, Harvard University | |
Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure | Pamela Wisniewski, Pennsylvania State University; et al. Na Wang, Pennsylvania State University Saijing Zheng, Pennsylvania State University Heng Xu, Pennsylvania State University Mary Beth Rosson, Pennsylvania State University John Carroll, Pennsylvania State University | |
BaseLase: An Interactive Focus+Context Laser Floor | Jörg Müller, Aarhus University; et al. Constantin Schmidt, Technische Universität Berlin | |
Tiree Energy Pulse: Exploring Renewable Energy Forecasts on the Edge of the Grid | Will Simm, Lancaster University; et al. Adrian Friday, Lancaster University Peter Newman, Lancaster University Stephen Forshaw, Lancaster University Mike Hazas, Lancaster University Alan Dix, Lancaster University | |
iSkin: Flexible,Stretchable and Visually Customizable On-Body Touch Sensors for Mobile Computing | Martin Weigel, Max Planck Institut; et al. Gilles Bailly, Telecom ParisTech Antti Oulasvirta, Aalto University Carmel Majidi, Carnegie Mellon University Jürgen Steimle, Max Planck Institut | |
Designing Political Deliberation Environments to Support Interactions in the Public Sphere | Bryan Semaan, Syracuse University; et al. Scott P. Robertson, University of Hawaii at Manoa Misa Maruyama, University of Hawaii at Manoa Sara Douglas, University of Hawaii at Manoa | |
From User-Centered to Adoption-Centered Design: A Case Study of an HCI Research Innovation Becoming... | Parmit K. Chilana, University of Waterloo; et al. Jacob Wobbrock, University of Washington | |
Acoustruments: Passive,Acoustically-Driven,Interactive Controls for Handheld Devices | Gierad Laput, Carnegie Mellon University; et al. Scott E. Hudson, Carnegie Mellon University Chris Harrison, Carnegie Mellon University | |
Unequal Representation and Gender Stereotypes in Image Search Results for Occupations | Matthew Kay, University of Washington; et al. Sean A. Munson, University of Washington | |
Sharing is Caring: Assistive Technology Designs on Thingiverse | Erin Buehler, University of Maryland Baltimore County; et al. Abdullah Ali, University of Maryland Baltimore County Jeremy J. Chang, University of Maryland Baltimore County Megan Kelly Hofmann, Colorado State University Amy Hurst, University of Maryland Baltimore County Shaun K. Kane, University of Maryland Baltimore County | |
"I always assumed that I wasn't really that close to [her]": Reasoning about Invisible Algorithms i... | Motahhare Eslami, University of Illinois at Urbana-Champaign; et al. Kristen Vaccaro, University of Illinois at Urbana-Champaign Amirhossein Aleyasen, University of Illinois at Urbana-Champaign Andy Vuong, University of Illinois at Urbana-Champaign Karrie Karahalios, University of Illinois at Urbana-Champaign Kevin Hamilton, University of Illinois at Urbana-Champaign Christian Sandvig, University of Michigan | |
ColourID: Improving Colour Identification for People with Impaired Colour Vision | David R. Flatla, University of Dundee; et al. Ross D. Teviotdale, University of Dundee Dylan L. Knowles, University of Saskatchewan Craig Stewart, University of Dundee | |
2014 | Consumed Endurance: A Metric to Quantify Arm Fatigue of Mid-Air Interactions | Anders Markussen, University of Copenhagen; et al. Kasper Hornbaek, University of Copenhagen |
Duet: Exploring Joint Interactions on a Smart Phone and a Smart Watch | Xiang Anthony Chen, Carnegie Mellon University; et al. Daniel Wigdor, University of Toronto George Fitzmaurice, Autodesk Research | |
Type-Hover-Swipe in 96 Bytes: A Motion Sensing Mechanical Keyboard | Stuart A Taylor, Microsoft Research; et al. Otmar Hilliges, ETH Zurich Shahram Izadi, Microsoft Research John Helmes, Microsoft Research | |
Effects of Display Size and Navigation Type on a Classification Task | Can Liu, Université Paris-Sud; et al. Michel Beaudouin-Lafon, Université Paris-Sud Eric Lecolinet, Telecom ParisTech Wendy Mackay, INRIA George Fitzmaurice, Autodesk Research | |
MixFab: a Mixed-Reality Environment for Personal Fabrication | Christian Weichel, Lancaster University; et al. David Kim, Microsoft Research Nicolas Villar, Microsoft Research Hans W Gellersen, Lancaster University | |
Growing Closer on Facebook: Changes in Tie Strength Through Social Network Site Use | Moira Burke, Facebook Robert Kraut, Carnegie Mellon University | |
Emerging Sites of HCI Innovation: Hackerspaces,Hardware Startups & Incubators | Silvia Lindtner, University of California Irvine; et al. Paul Dourish, University of California Irvine | |
Designing for Slowness,Anticipation and Re-visitation: A Long Term Field Study of the Photobox | William Odom, Carnegie Mellon University; et al. Richard Banks, Microsoft Research David Kirk, Newcastle University Tim Regan, Microsoft Mark Selby, University of Nottingham Jodi Forlizzi, Carnegie Mellon University John Zimmerman, Carnegie Mellon University | |
Estimating the Social Costs of Friendsourcing | Jeffrey Rzeszotarski & Meredith Morris, Microsoft Research | |
Human Values in Curating a Human Rights Media Archive | Abigail Durrant, Newcastle University; et al. Stuart Reeves, University of Nottingham | |
"Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug War | Munmun De Choudhury, Microsoft Research; et al. Gloria Mark, University of California Irvine | |
Real-time Feedback for Improving Medication Taking | Matthew Lee, Philips Research Anind Dey, Carnegie Mellon University | |
Structured Labeling for Facilitating Concept Evolution in Machine Learning | Todd Kulesza, Oregon State University; et al. Rich Caruana, Microsoft Research Danyel Fisher, Microsoft Research Denis Charles, Microsoft Research | |
Towards Accurate and Practical Predictive Models of Active-Vision-Based Visual Search | David Kieras, University of Michigan Anthony Hornof, University of Oregon | |
RetroDepth: 3D Silhouette Sensing for High-Precision Input On and Above Physical Surfaces | David Kim, Microsoft Research; et al. Jakub Dostal, University of St Andrews Christoph Rhemann, Microsoft Research Cem Keskin, Microsoft Research Christopher Zach, Microsoft Research Jamie Shotton, Microsoft Research Timothy Large, Microsoft Research Steven Bathiche, Microsoft Matthias Niessner, Stanford University D. Alex Butler, Microsoft Research Sean Fanello, Istituto Italiano di Tecnologia Vivek Pradeep, Microsoft | |
Understanding Multitasking Through Parallelized Strategy Exploration and Individualized Cognitive M... | Yunfeng Zhang & Anthony Hornof, University of Oregon | |
Making Sustainability Sustainable: Challenges in the Design of Eco-Interaction Technologies | Rayoung Yang, University of Michigan; et al. Jodi Forlizzi, Carnegie Mellon University | |
2013 | Weighted Graph Comparison Techniques for Brain Connectivity Analysis | Basak Alper, University of California Santa Barbara; et al. Nathalie Riche, Microsoft Research Tobias Isenberg, INRIA Jean-Daniel Fekete, INRIA |
Analyzing User-Generated YouTube Videos to Understand Touchscreen Use by People with Motor Impairme... | Lisa Anthony, University of Maryland Baltimore County; et al. Leah Findlater, University of Maryland | |
What is "Critical" About Critical Design? | Jeffrey Bardzell & Shaowen Bardzell, Indiana University at Bloomington | |
The Dubuque Electricity Portal: Evaluation of a City-Scale Residential Electricity Consumption Feed... | Tom Erickson, IBM Research; et al. Younghun Kim, IBM Research Ajay Deshpande, IBM Research Sambit Sahu, IBM Research Tian Chao, IBM Research Piyawadee Sukaviriya, IBM Research Milind Naphade, IBM Research | |
Improving Navigation-Based File Retrieval | Stephen Fitchett, University of Canterbury; et al. Carl Gutwin, University of Saskatchewan | |
SPRWeb: Preserving Subjective Responses to Website Colour Schemes through Automatic Recolouring | David R. Flatla, University of Saskatchewan; et al. Carl Gutwin, University of Saskatchewan Krzysztof Z. Gajos, Harvard University | |
The Efficacy of Human Post-Editing for Language Translation | Spence Green, Stanford University; et al. Christopher D. Manning, Stanford University | |
Mind the Theoretical Gap: Interpreting,Using,and Developing Behavioral Theory in HCI Research | Eric B. Hekler, Arizona State University; et al. Jon Froehlich, University of Maryland Matthew P. Buman, University of Maryland | |
Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical Turk | Lilly Irani, University of California Irvine M. Six Silberman, Bureau of Economic Interpretation | |
IllumiRoom: Peripheral Projected Illusions for Interactive Experiences | Brett Jones, University of Illinois at Urbana-Champaign; et al. Eyal Ofek, Microsoft Research Andrew D. Wilson, Microsoft Research | |
Webzeitgeist: Design Mining the Web | Ranjitha Kumar, Stanford University; et al. Cesar Torres, Stanford University Maxine Lim, Stanford University Salman Ahmad, Massachusetts Institute of Technology Scott R. Klemmer, Stanford University Jerry O. Talton, Intel | |
LaserOrigami: Laser-Cutting 3D Objects | Stefanie Mueller, Hasso Plattner Institute; et al. Patrick Baudisch, Hasso Plattner Institute | |
Labor Dynamics in a Mobile Micro-Task Market | Mohamed Musthag & Deepak Ganesan, University of Massachusetts Amherst | |
Job Opportunities through Entertainment: Virally Spread Speech-Based Services for Low-Literate User... | Agha Ali Raza, Carnegie Mellon University; et al. Zain Tariq, Lahore University of Management Sciences Mansoor Pervaiz, Northeastern University Samia Razaq, Lahore University of Management Sciences Umar Saif, Lahore University of Management Sciences Roni Rosenfeld, Carnegie Mellon University | |
At Home with Agents: Exploring Attitudes Towards Future Smart Energy Infrastructures | Tom Rodden, University of Nottingham; et al. Nadia Pantidi, University of Nottingham Khaled Bachour, University of Nottingham Stuart Moran, University of Nottingham | |
Screenfinity: Extending the Perception Area of Content on Very Large Public Displays | Constantin Schmidt, Technische Universität Berlin; et al. Gilles Bailly, Technische Universität Berlin | |
Reasons to Question Seven Segment Displays | Harold Thimbleby, Swansea University | |
The Many Faces of Facebook: Experiencing Social Media as Performance,Exhibition,and Personal Archiv... | Xuan Zhao, Cornell University; et al. Sasha Naranjit, Cornell University Sara Alwaalan, Cornell University Stephen Voida, Cornell University Dan Cosley, Cornell University | |
2012 | Observational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobile... | Niels Henze, University of Oldenburg; et al. Susanne Boll, University of Oldenburg |
The Normal Natural Troubles of Driving with GPS | Barry Brown, Stockholm University Eric Laurier, University of Edinburgh | |
Improving Command Selection with CommandMaps | Joey Scarr, University of Canterbury; et al. Carl Gutwin, University of Saskatchewan Andrea Bunt, University of Manitoba | |
Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical Kiosks | Kurtis Heimerl, University of California Berkeley; et al. Kuang Chen, University of California Berkeley Tapan S. Parikh, University of California Berkeley Björn Hartmann, University of California Berkeley | |
Touché: Enhancing Touch Interaction on Humans,Screens,Liquids,and Everyday Objects | Munehiko Sato, Disney Research; et al. Chris Harrison, Disney Research | |
Detecting Error-Related Negativity for Interaction Design | Chi Vi & Sriram Subramanian, University of Bristol | |
Empathy,Participatory Design and People with Dementia | Stephen Lindsay, Newcastle University; et al. Daniel Jackson, Newcastle University Cassim Ladha, Newcastle University Karim Ladha, Newcastle University Patrick Olivier, Newcastle University | |
Looking Glass: A Field Study on Noticing Interactivity of Shop Windows | Jörg Müller, Technische Universität Berlin; et al. Gilles Bailly, Technische Universität Berlin Michael Nischt, Technische Universität Berlin Florian Alt, University of Stuttgart | |
Affordances in HCI: Toward a Mediated Action Perspective | Victor Kaptelinin, University of Bergen Bonnie Nardi, University of California Irvine | |
Personas and Decision Making in the Design Process: An Ethnographic Case Study | Erin Friess, University of North Texas | |
Using Rhythmic Patterns as an Input Method | Emilien Ghomi, Université Paris-Sud; et al. Stephane Huot, Université Paris-Sud Olivier Chapuis, Université Paris-Sud Michel Beaudouin-Lafon, Université Paris-Sud | |
Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCI | Ylva Fernaeus, KTH Royal Institute of Technology; et al. Jakob Tholanderm, Stockholm University | |
Uncomfortable Interactions | Steve Benford, University of Nottingham; et al. Gabriella Giannachi, University of Exeter Brendan Walker, University of Nottingham Joe Marshall, University of Nottingham Tom Rodden, University of Nottingham | |
ClayVision: The (Elastic) Image of the City | Yuichiro Takeuchi, Sony Computer Science Laboratories Ken Perlin, New York University | |
2011 | Bricolage: Example-Based Retargeting for Web Design | Ranjitha Kumar, Stanford University; et al. Salman Ahmad, Stanford University Scott Klemmer, Stanford University |
Teenagers and Their Virtual Possessions: Design Opportunities and Issues | William Odom, Carnegie Mellon University; et al. Jodi Forlizzi, Carnegie Mellon University | |
Mid-air Pan-and-Zoom on Wall-sized Displays | Mathieu Nancel, Université Paris-Sud; et al. Emmanuel Pietriga, INRIA Olivier Chapuis, Université Paris-Sud Wendy Mackay, INRIA | |
Why is My Internet Slow?: Making Network Speeds Visible | Marshini Chetty, Georgia Institute of Technology; et al. Andrew Baird, Amazon Ugochi Ofoha, Georgia Institute of Technology Bethany Sumner, Georgia Institute of Technology Rebecca Grinter, Georgia Institute of Technology | |
Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual En... | Thomas Erickson, IBM Research; et al. Wendy A. Kellogg, IBM Research David W. Levine, IBM Research | |
Your Noise is My Command: Sensing Gestures Using the Body as an Antenna | Gabe Cohn, University of Washington; et al. Shwetak N. Patel, University of Washington Desney Tan, Microsoft Research | |
Enhancing Physicality in Touch Interaction with Programmable Friction | Vincent Levesque, University of British Columbia; et al. Karon MacLean, University of British Columbia Andy Cockburn, University of Canterbury Nicholas D. Marchuk, Northwestern University Dan Johnson, Northwestern University J. Edward Colgate, Northwestern University | |
Usable Gestures for Blind People: Understanding Preference and Performance | Shaun K. Kane, University of Washington; et al. Richard E. Ladner, University of Washington | |
Automics: souvenir generating photoware for theme parks | Abigail Durrant, University of Nottingham; et al. David Kirk, University of Nottingham Steve Benford, University of Nottingham Joel E. Fischer, University of Nottingham Derek McAuley, University of Nottingham Michael A. Peshkin, Northwestern University | |
Effects of Community Size and Contact Rate in Synchronous Social Q&A | Ryen W. White, Microsoft Research; et al. Yandong Liu, Carnegie Mellon University | |
Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Word... | Koji Yatani, University of Toronto; et al. Andrew Trusty, University of Toronto Khai N. Truong, University of Toronto | |
In the Shadow of Misperception: Assistive Technology Use and Social Interactions | Kristen Shinohara & Jacob Wobbrock, University of Washington | |
Ease of Juggling: Studying the Effects of Manual Multitasking | Antti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University | |
2010 | How does search behavior change as search becomes more difficult? | Anne Aula, Google; et al. Zhiwei Guan, Google |
The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Con... | Brent Hecht & Darren Gergle, Northwestern University | |
Occlusion-Aware Interfaces | Daniel Vogel & Ravin Balakrishnan, University of Toronto | |
Skinput: Appropriating the Body as an Input Surface | Chris Harrison, Carnegie Mellon University; et al. Dan Morris, Microsoft Research | |
Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural India | Neil Patel, Stanford University; et al. Anupam Jain, IBM Research Paresh Dave, Development Support Center Tapan S. Parikh, University of California Berkeley | |
Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber Bundles | Patrick Baudisch, Hasso Plattner Institute; et al. Frederik Rudeck, Hasso Plattner Institute | |
Feminist HCI: Taking Stock and Outlining an Agenda for Design | Shaowen Bardzell, Indiana University at Bloomington | |
Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface Structur... | Morgan Dixon & James Fogarty, University of Washington | |
Mobile-izing Health Workers in Rural India | Divya Ramachandran, University of California Berkeley; et al. Prabhu Dutta Das, Dhirubhai Ambani Institute of Information and Communications Technology Edward Cutrell, Microsoft Research | |
Mapping the Landscape of Sustainable HCI | Carl DiSalvo, Georgia Institute of Technology; et al. Hrönn Brynjarsdóttir, Cornell University | |
The Design of Eco-Feedback Technology | Jon Froehlich, University of Washington; et al. James Landay, University of Washington | |
Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of Charts | Scott Bateman, University of Saskatchewan; et al. Carl Gutwin, University of Saskatchewan Aaron Genest, University of Saskatchewan David McDine, University of Saskatchewan Christopher Brooks, University of Saskatchewan | |
2009 | Predicting Tie Strength With Social Media | Eric Gilbert & Karrie Karahalios, University of Illinois at Urbana-Champaign |
Undo and Erase Events as Indicators of Usability Problems | David Akers, Stanford University; et al. Robin Jeffries, Google Terry Winograd, Stanford University | |
From Interaction to Trajectories: Designing Coherent Journeys Through User Experiences | Steve Benford, University of Nottingham; et al. Boriana Koleva, University of Nottingham Tom Rodden, University of Nottingham | |
Musink: Composing Music through Augmented Drawing | Theophanis Tsandilas, Université Paris-Sud; et al. Wendy Mackay, Université Paris-Sud | |
Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Seri... | Jeffrey Heer, Stanford University; et al. Maneesh Agrawala, University of California Berkeley | |
Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector Exhibit... | Scott S. Snibbe, Sona Research Hayes S. Raffle, Massachusetts Institute of Technology | |
Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection Performance | Leah Findlater, University of British Columbia; et al. Joanna McGrenere, University of British Columbia Jessica Dawson, University of British Columbia | |
2008 | An Error Model for Pointing Based on Fitts' Law | Jacob Wobbrock, University of Washington; et al. Susumu Harada, University of Washington I. Scott MacKenzie, York University |
Designs on Dignity: Perceptions of Technology Among the Homeless | Christopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology | |
Improving the Performance of Motor-Impaired Users with Automatically-Generated,Ability-Based Interf... | Krzysztof Z. Gajos, University of Washington; et al. Daniel S. Weld, University of Washington | |
In-Car GPS Navigation: Engagement with and Disengagement from the Environment | Gilly Leshed, Cornell University; et al. Oya Rieger, Cornell University Blazej Kot, Cornell University Phoebe Sengers, Cornell University | |
Large Scale Analysis of Web Revisitation Patterns | Eytan Adar, University of Washington; et al. Susan T. Dumais, Microsoft Research | |
Multimodal collaborative handwriting training for visually-impaired people | Beryl Plimmer, University of Auckland; et al. Stephen A. Brewster, University of Glasgow Rachel Blagojevic, University of Auckland | |
The Network in the Garden: An Empirical Analysis of Social Media in Rural Life | Eric Gilbert, University of Illinois at Urbana-Champaign; et al. Christian Sandvig, University of Illinois at Urbana-Champaign | |
2007 | Authoring sensor-based interactions by demonstration with direct manipulation and pattern recogniti... | Björn Hartmann, Stanford University; et al. Manas Mittal, Massachusetts Institute of Technology Scott R. Klemmer, Stanford University |
Consuming video on Mobile devices | Kenton O'Hara, Hewlett-Packard Labs; et al. Alex Vorbau, Hewlett-Packard Labs | |
Multiview: improving trust in group video conferencing through spatial faithfulness | David T. Nguyen & John Canny, University of California Berkeley | |
Shift: a technique for operating pen-based interfaces using touch | Daniel Vogel, University of Toronto Patrick Baudisch, Microsoft Research | |
Software or wetware?: discovering when and why people use digital prosthetic memory | Vaiva Kalnikaité & Steve Whittaker, University of Sheffield | |
Sustainable interaction design: invention & disposal,renewal & reuse | Eli Blevis, Indiana University at Bloomington | |
2006 | Trackball text entry for people with motor impairments | Jacob Wobbrock & Brad Myers, Carnegie Mellon University |
Embedded phenomena: supporting science learning with classroom-sized distributed simulations | Tom Moher, University of Illinois at Chicago | |
A role for haptics in mobile interaction: initial design using a handheld tactile display prototype | Joseph Luk, University of British Columbia; et al. Shannon Little, University of British Columbia Karon MacLean, University of British Columbia Vincent Lévesque, McGill University Vincent Hayward, McGill University | |
2005 | The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation area | Tovi Grossman & Ravin Balakrishnan, University of Toronto |
Designing the spectator experience | Stuart Reeves, University of Nottingham; et al. Claire O'Malley, University of Nottingham Mike Fraser, University of Bristol | |
Examining Task Engagement in Sensor-Based Statistical Models of Human Interruptibility | James Fogarty, Carnegie Mellon University; et al. Htet Htet Aung, Carnegie Mellon University Elspeth Golden, Carnegie Mellon University Karen P. Tang, Carnegie Mellon University Scott E. Hudson, Carnegie Mellon University | |
Making space for stories: ambiguity in the design of personal communication systems | Paul M. Aoki, Palo Alto Research Center Allison Woodruff, Intel Research | CIKM (Knowledge Management) |
2019 | AutoGRD: Model Recommendation Through Graphical Dataset Representation | Noy Cohen, Ben Gurion University of the Negev; et al. Bracha Shapira, Ben Gurion University of the Negev Gilad Katz, Ben Gurion University of the Negev Roman Vainshtein, Ben Gurion University of the Negev |
2018 | Relevance estimation with multiple information sources on search engine result pages | Junqi Zhang, Tsinghua University; et al. Shaoping Ma, Tsinghua University Qi Tian, University of Texas at San Antonio |
2017 | Hike: A Hybrid Human-Machine Method for Entity Alignment in Large-Scale Knowledge Bases | Yan Zhuang, Tsinghua University; et al. Zhuojian Zhong, Tsinghua University Jianhua Feng, Tsinghua University |
2016 | Vandalism Detection in Wikidata | Stefan Heindorf, Paderborn University; et al. Benno Stein, Bauhaus-Universität Weimar Gregor Engels, Paderborn University |
2015 | Assessing the Impact of Syntactic and Semantic Structures for Answer Passages Reranking | Kateryna Tymoshenko, University of Trento Alessandro Moschitti, Qatar Computing Research Institute |
2014 | Cross-Device Search | George Montanez, Carnegie Mellon University; et al. Xiao Huang, Microsoft |
2013 | Penguins in Sweaters,or Serendipitous Entity Search on User-generated Content | Ilaria Bordino, Yahoo! Research; et al. Mounia Lalmas, Yahoo! Research |
2012 | Gelling,and Melting,Large Graphs by Edge Manipulation | Hanghang Tong, IBM Research; et al. Tina Eliassi-Rad, Rutgers University Michalis Faloutsos, University of California Riverside Christos Faloutsos, Carnegie Mellon University |
2011 | Intent-aware query similarity | Jiafeng Guo, Chinese Academy of Sciences; et al. Gu Su, Microsoft Research Xiaofei Zhu, Chinese Academy of Sciences |
2010 | MENTA: Inducing Multilingual Taxonomies from Wikipedia | Gerard de Melo & Gerhard Weikum, Max Planck Institut |
FACeTOR: cost-driven exploration of faceted query results | Abhijith Kashyap, State University of New York at Buffalo; et al. Michalis Petropoulos, State University of New York at Buffalo | |
2009 | On the Feasibility of Multi-Site Web Search Engines | Ricardo Baeza-Yates, Yahoo! Research; et al. Flavio Junqueira, Yahoo! Research Vassilis Plachouras, Yahoo! Research Luca Telloli, Yahoo! Research |
2008 | Learning to Link with Wikipedia | David Milne & Ian H. Witten, University of Waikato |
2007 | Autonomously Semantifying Wikipedia | Fei Wu & Daniel S. Weld, University of Washington |
2006 | Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing Indice... | Segabtian Michel, Max Planck Institut; et al. Nikos Ntarmos, RACTI and University of Patras Peter Triantafillou, RACTI and University of Patras Gerhard Weikum, Max Planck Institut Christian Zimmer, Max Planck Institut |
2005 | Towards Automatic Association of Relevant Unstructured Content with Structured Query Results | Prasan Roy, IBM Research; et al. Bhuvan Bamba, Georgia Institute of Technology Shree Raman, University of Massachusetts Amherst |
2004 | Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XML | Qiankun Zhao, Nanyang Technological University; et al. Mukesh Mohania, IBM Research Yahiko Kambayashi, Kyoto University | CVPR (Computer Vision) |
2019 | A Theory of Fermat Paths for Non-Line-of-Sight Shape Reconstruction | Shumian Xin, Carnegie Mellon University; et al. Kiriakos N. Kutulakos, University of Toronto Aswin C. Sankaranarayanan, Carnegie Mellon University Srinivasa G. Narasimhan, Carnegie Mellon University Ioannis Gkioulekas, Carnegie Mellon University |
2018 | Taskonomy: Disentangling Task Transfer Learning | Amir R. Zamir, Stanford University; et al. William Shen, Stanford University Leonidas Guibas, Stanford University Jitendra Malik, University of California Berkeley Silvio Savarese, Stanford University |
2017 | Densely Connected Convolutional Networks | Zhuang Liu, Tsinghua University; et al. Laurens van der Maaten, Facebook AI Research Kilian Q. Weinberger, Cornell University |
Learning from Simulated and Unsupervised Images through Adversarial Training | Ashish Shrivastava, Apple Inc.; et al. Oncel Tuzel, Apple Inc. Josh Susskind, Apple Inc. Wenda Wang, Apple Inc. Russ Webb, Apple Inc. | |
2016 | Deep Residual Learning for Image Recognition | Kaiming He, Microsoft Research; et al. Shaoqing Ren, Microsoft Research Jian Sun, Microsoft Research |
2015 | DynamicFusion: Reconstruction and Tracking of Non-rigid Scenes in Real-Time | Richard A. Newcombe, University of Washington; et al. Steven M. Seitz, University of Washington |
2014 | What Camera Motion Reveals About Shape with Unknown BRDF | Manmohan Chandraker, NEC Labs America |
2013 | Fast,Accurate Detection of 100,000 Object Classes on a Single Machine | Thomas Dean, Google; et al. Mark Segal, Google Jonathon Shlens, Google Sudheendra Vijayanarasimhan, Google Jay Yagnik, Google |
2012 | A Simple Prior-free Method for Non-Rigid Structure-from-Motion Factorization | Yuchao Dai, Northwestern Polytechnical University; et al. Mingyi He, Northwestern Polytechnical University |
2011 | Real-time Human Pose Recognition in Parts from Single Depth Images | Jamie Shotton, Microsoft Research; et al. Mat Cook, Microsoft Research Toby Sharp, Microsoft Research Mark Finocchio, Microsoft Research Richard Moore, Microsoft Research Alex Kipman, Microsoft Research Andrew Blake, Microsoft Research |
2010 | Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data usin... | Anders Eriksson & Anton va den Hendel, University of Adelaide |
2009 | Single Image Haze Removal Using Dark Channel Prior | Kaiming He, The Chinese University of Hong Kong; et al. Xiaoou Tang, The Chinese University of Hong Kong |
2008 | Beyond Sliding Windows: Object Localization by Efficient Subwindow Search | Chistoph H. Lampert, Max Planck Institut; et al. Thomas Hodmann, Google |
Global Stereo Reconstruction under Second Order Smoothness Priors | Oliver Woodford, University of Oxford; et al. Philip Torr, University of Oxford Andrew Fitzgibbon, Microsoft Research | |
2007 | Dynamic 3D Scene Analysis from a Moving Vehicle | Bastian Leibe, ETH Zurich; et al. Kurt COrnelis, Katholieke Universiteit Leuven Luc Van Gool, ETH Zurich |
2006 | Putting Objects in Perspective | Derek Hoiem, Carnegie Mellon University; et al. Martial Hebert, Carnegie Mellon University |
2005 | Real-Time Non-Rigid Surface Detection | Julien Pilet, École Polytechnique Fédérale de Lausanne; et al. Pascal Fua, École Polytechnique Fédérale de Lausanne |
2004 | Programmable Imaging using a Digital Micromirror Array | Shree K. Nayar, Columbia University; et al. Terry E. Boult, University of Colorado |
2003 | Object Class Recognition by Unsupervised Scale-Invariant Learning | Rob Fergus, University of Oxford; et al. Andrew Zisserman, University of Oxford |
2001 | Morphable 3D models from video | Matthew Brand, Mitsubishi Electric Research Laboratories |
2000 | Real-Time Tracking of Non-Rigid Objects using Mean Shift | Dorin Comaniciu, Siemens Corporate Research; et al. Peter Meer, Rutgers University | FOCS (Theory) |
2019 | Lower bounds for maximal matchings and maximal independent sets | Alkida Balliu, Aalto University; et al. Juho Hirvonen, Aalto University Dennis Olivetti, Aalto University Mikaël Rabie, Aalto University and University Paris Sorbonne Jukka Suomela, Aalto University |
NEEXP ⊆ MIP* | Anand Natarajan, California Institute of Technology John Wright, Massachusetts Institute of Technology | |
Automating Resolution is NP-Hard | Albert Atserias & Moritz Müller, Universitat Politecnica de Catalunya | |
2018 | Classical Verification of Quantum Computation | Urmila Mahadev, University of California Berkeley |
Pseudorandom Sets in Grassmann Graph have Near-Perfect Expansion | Subhash Khot, New York University; et al. Muli Safra, Tel-Aviv University | |
Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic Time | Diptarka Chakraborty, Computer Science Institute of Charles University; et al. Elazar Goldenberg, The Academic College Of Tel Aviv-Yaffo Michal Koucký, Computer Science Institute of Charles University Michael Saks, Rutgers University | |
2017 | A dichotomy theorem for nonuniform CSPs | Andrei A. Bulatov, Simon Fraser University |
The Proof of CSP Dichotomy Conjecture | Dmitriy Zhuk, Lomonosov Moscow State University | |
The Matching Problem in General Graphs is in Quasi-NC | Ola Svensson & Jakub Tarnawski, École polytechnique fédérale de Lausanne | |
2016 | Settling the Complexity of Computing Approximate Two-Player Nash Equilibria | Aviad Rubinstein, University of California Berkeley |
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning | Ran Raz, Weizmann Institute of Science | |
2015 | An average-case depth hierarchy theorem for Boolean circuits | Benjamin Rossman, National Institute of Informatics; et al. Li-Yang Tan, University of California Berkeley |
2014 | Path Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations an... | Yin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology |
2013 | Navigating Central Path with Electrical Flows: from Flows to Matchings,and Back | Aleksander Mądry, École Polytechnique Fédérale de Lausanne |
2012 | A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2 | Julia Chuzhoy, Toyota Technological Institute at Chicago Shi Li, Princeton University |
A multi-prover interactive proof for NEXP sound against entangled provers | Tsuyoshi Ito, NEC Labs America Thomas Vidick, Massachusetts Institute of Technology | |
2011 | A Randomized Rounding Approach to the Traveling Salesman Problem | Shayan Oveis Gharan, Stanford University; et al. Mohit Singh, McGill University |
Approximating Graphic TSP by Matchings | Tobia M¨o;mke & Ola Svensson, Royal Institute of Technology | |
A Polylogarithmic-Competitive Algorithm for the k-Server Problem | Nikhil Bansal, IBM Research; et al. Aleksander Mądry, Massachusetts Institute of Technology Joseph Naor, Technion | |
2010 | Subexponential Algorithms for Unique Games and Related Problems | Sanjeev Arora, Princeton University; et al. David Steurer, Princeton University |
Computational Transition at the Uniqueness Threshold | Allan Sly, Microsoft Research | |
Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke Decompositions | Matthew Andrews, Bell Labs | |
2008 | Two Query PCP with Sub-Constant Error | Dana Moshkovitz & Ran Raz, Weizmann Institute of Science |
2007 | Space-Efficient Identity Based Encryption Without Pairings | Dan Boneh, Stanford University; et al. Michael Hamburg, Stanford University |
2006 | Settling the Complexity of 2-Player Nash Equilibrium | Xi Chen, Tsinghua University Xiaotie Deng, City University of Hong Kong |
2005 | The Unique Games Conjecture,Integrality Gap for Cut Problems and Embeddability of Negative Type Met... | Subhash A. Khot, Georgia Institute of Technology Nisheeth K. Vishnoi, IBM Research |
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time | Farzad Parvaresh & Alexander Vardy, University of California San Diego | |
2004 | Hardness of Approximating the Shortest Vector Problem in Lattices | Subhash Khot, Georgia Institute of Technology |
Cryptography in NC0 | Benny Applebaum, Technion; et al. Eyal Kushilevitz, Technion | |
2003 | On the Impossibility of Dimension Reduction in L1 | Bo Brinkman & Moses Charikar, Princeton University |
2002 | Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model | Boaz Barak, Weizmann Institute of Science |
Minimizing Congestion in General Networks | Harald Räcke, Paderborn University | |
A Dichotomy Theorem for Constraints on a Three-Element Set | Andrei A. Bulatov, University of Oxford | FSE (Software Engineering) |
2019 | The importance of accounting for real-world labelling when predicting software vulnerabilities | Matthieu Jimenez, University of Luxembourg; et al. Mike Papadakis, University of Luxembourg Federica Sarro, University College London Yves Le Le Traon, University of Luxembourg Mark Harman, University College London and Facebook |
2018 | The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the E... | James C. Davis, Virginia Tech; et al. Francisco Servant, Virginia Tech Dongyoon Lee, Virginia Tech |
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks | Shengjian (Daniel) Guo, Virginia Tech; et al. Chao Wang, University of Southern California | |
Data Race Detection on Compressed Traces | Dileep Kini, University of Illinois at Urbana-Champaign; et al. Mahesh Viswanathan, University of Illinois at Urbana-Champaign | |
Do Android Taint Analysis Tools Keep Their Promises? | Felix Pauck, Paderborn University; et al. Heike Wehrheim, Paderborn University | |
An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems | Yu Gao, Chinese Academy of Sciences; et al. Feng Qin, Ohio State University Chushu Gao, Chinese Academy of Sciences Dong Wang, Chinese Academy of Sciences Jun Wei, Chinese Academy of Sciences Ruirui Huang, Alibaba Group Li Zhou, Alibaba Group Yongming Wu, Alibaba Group | |
Oreo: Detection of Clones in the Twilight Zone | Vaibhav Saini, University of California Irvine; et al. Yadong Lu, University of California Irvine Pierre Baldi, University of California Irvine Crista Lopes, University of California Irvine | |
2017 | The Power of "Why" and "Why Not": Enriching Scenario Exploration with Provenance | Tim Nelson, Brown University; et al. Daniel J. Dougherty, Worcester Polytechnic Institute Shriram Krishnamurthi, Brown University |
Understanding Misunderstandings in Source Code | Dan Gopstein, New York University; et al. Yu Yan, Pennsylvania State University Lois DeLong, New York University Yanyan Zhuang, University of Colorado Martin K.-C. Yeh, Pennsylvania State University Justin Cappos, New York University | |
Trade-Offs in Continuous Integration: Assurance,Security,and Flexibility | Michael Hilton, Oregon State University; et al. Timothy Tunnell, University of Illinois at Urbana-Champaign Darko Marinov, University of Illinois at Urbana-Champaign Danny Dig, Oregon State University | |
Cooperative Kernels: GPU Multitasking for Blocking Algorithms | Tyler Sorensen, Imperial College London; et al. Alastair F. Donaldson, Imperial College London | |
Fairness Testing: Testing Software for Discrimination | Sainyam Galhotra, University of Massachusetts Amherst; et al. Alexandra Meliou, University of Massachusetts Amherst | |
Discovering Relational Specifications | Calvin Smith, University of Wisconsin-Madison; et al. Aws Albarghouthi, University of Wisconsin-Madison | |
Automatically Diagnosing and Repairing Error Handling Bugs in C | Yuchi Tian & Baishakhi Ray, University of Virginia | |
2016 | API Code Recommendation Using Statistical Learning from Fine-grained Changes | Anh Tuan Nguyen, Iowa State University; et al. Mihai Codoban, Microsoft Hoan Anh Nguyen, Iowa State University Lily Mast, University of Evansville Eli Rademacher, Oregon State University Tien N. Nguyen, Iowa State University Danny Dig, Oregon State University |
Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis | Jianjun Huang, Purdue University; et al. Lin Tan, University of Waterloo | |
Factors Influencing Code Review Processes in Industry | Tobias Baum, Leibniz Universität Hannover; et al. Kai Niklas, Leibniz Universität Hannover Kurt Schneider, Leibniz Universität Hannover | |
Foraging and Navigations Fundamentally: Developers' Predictions of Value and Cost | David Piorkowski, Oregon State University; et al. Tahmid Nabi, Oregon State University Scott D. Fleming, University of Memphis Christopher Scaffidi, Oregon State University Margaret Burnett, Oregon State University | |
Multi-Representational Security Analysis | Eunsuk Kang, University of California Berkeley; et al. Daniel Jackson, Massachusetts Institute of Technology | |
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis | Xiaofei Xie, Tianjin University; et al. Yang Liu, Nanyang Technological University Wei Le, Iowa State University Xiaohong Li, Tianjin University | |
Why We Refactor? Confessions of GitHub Contributors | Danilo Silva, Federal University of Minas Gerais; et al. Marco Tulio Valente, Federal University of Minas Gerais | |
2015 | How Practitioners Perceive the Relevance of Software Engineering Research | David Lo, Singapore Management University; et al. Thomas Zimmermann, Microsoft Research |
Effective Test Suites for Mixed Discrete-Continuous Stateflow Controllers | Reza Matinnejad, University of Luxembourg; et al. Lionel C. Briand, University of Luxembourg Thomas Bruckmann, Delphi Automotive Systems | |
MultiSE: Multi-path Symbolic Execution using Value Summaries | Koushik Sen, University of California Berkeley; et al. Liang Gong, University of California Berkeley Wontae Choi, University of California Berkeley | |
Modeling Readability to Improve Unit Tests | Ermira Daka, University of Sheffield; et al. Gordon Fraser, University of Sheffield Jonathan Dorn, University of Virginia Westley Weimer, University of Virginia | |
Optimizing energy consumption of GUIs in Android apps: a multi-objective approach | Mario Linares-Vásquez, College of William and Mary; et al. Carlos Eduardo Bernal Cárdenas, College of William and Mary Rocco Oliveto, University of Molise Massimiliano Di Penta, University of Sannio Denys Poshyvanyk, College of William and Mary | |
Measure It? Manage It? Ignore It? Software Practitioners and Technical Debt | Neil A. Ernst, Carnegie Mellon University; et al. Ipek Ozkaya, Carnegie Mellon University Robert L. Nord, Carnegie Mellon University Ian Gorton, Carnegie Mellon University | |
A User-Guided Approach to Program Analysis | Ravi Mangal, Georgia Institute of Technology; et al. Aditya V. Nori, Microsoft Research Mayur Naik, Georgia Institute of Technology | |
Users Beware: Preference Inconsistencies Ahead | Farnaz Behrang, Georgia Institute of Technology; et al. Alessandro Orso, Georgia Institute of Technology | |
2014 | Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case Study | Klaus-Benedikt Schultis, Siemens Corporate Technology; et al. Daniel Lohmann, Friedrich-Alexander University |
Selection and Presentation Practices for Code Example Summarization | Annie Ying & Martin Robillard, McGill University | |
Learning Natural Coding Conventions | Miltiadis Allamanis, University of Edinburgh; et al. Christian Bird, Microsoft Research Charles Sutton, University of Edinburgh | |
AI: A Lightweight System for Tolerating Concurrency Bugs | Mingxing Zhang, Tsinghua University; et al. Shan Lu, University of Wisconsin Shanxiang Qi, University of Illinois at Urbana-Champaign Jinglei Ren, Tsinghua University Weimin Zheng, Tsinghua University | |
Powering the Static Driver Verifier using Corral | Akash Lal & Shaz Qadeer, Microsoft Research | |
Are Mutants a Valid Substitute for Real Faults in Software Testing? | René Just, University of Washington; et al. Laura Inozemtseva, University of Waterloo Michael Ernst, University of Washington Reid Holmes, University of Waterloo Gordon Fraser, University of Sheffield | |
2012 | Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software Libraries | Bradley Cossette & Robert Walker, University of Calgary |
Scalable Test Data Generation from Multidimensional Models | Emina Torlak, University of California Berkeley | |
Assessing the Value of Branches with What-if Analysis | Christian Bird & Thomas Zimmermann, Microsoft Research | |
2011 | Proving programs robust | Swarat Chaudhuri, Rice University; et al. Roberto Lublinerman, Pennsylvania State University Sara Navidpour, Pennsylvania State University |
How Do Fixes Become Bugs? | Zuoning Yin, University of Illinois at Urbana-Champaign; et al. Yuanyuan Zhou, University of California San Diego Shankar Pasupathy, NetApp Lakshmi Bairavasundaram, NetApp | |
Proactive Detection of Collaboration Conflicts | Yuriy Brun, University of Washington; et al. Michael D. Ernst, University of Washington David Notkin, University of Washington | |
2010 | Staged Concurrent Program Analysis | Nishant Sinha & Chao Wang, NEC Labs America |
Developer Fluency: Achieving True Mastery in Software Projects | Minghui Zhou, Peking University Audris Mockus, Avaya Labs | |
Creating and evolving developer documentation: understanding the decisions of open source contribut... | Barthélémy Dagenais & Martin P. Robillard, McGill University | |
2009 | Asserting and checking determinism for multithreaded programs | Jacob Burnim & Koushik Sen, University of California Berkeley |
Darwin: an approach for debugging evolving programs | Dawei Qi, National University of Singapore; et al. Zhenkai Liang, National University of Singapore Kapil Vaswani, Microsoft Research | |
Graph-based Mining of Multiple Object Usage Patterns | Tung Thanh Nguyen, Iowa State University; et al. Nam H. Pham, Iowa State University Jafar M. Al-Kofahi, Iowa State University Tien N. Nguyen, Iowa State University | |
2008 | Efficient online monitoring of web-service SLAs | Franco Raimondi, University College London; et al. Wolfgang Emmerich, University College London |
What makes a good bug report? | Nicolas Bettenburg, Saarland University; et al. Adrian Schröter, University of Victoria Cathrin Weiss, University of Zurich Rahul Premraj, Saarland University Thomas Zimmermann, University of Calgary | |
2007 | Globally distributed software development project performance: an empirical analysis | Narayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University |
Mining specifications of malicious behavior | Mihai Christodorescu, University of Wisconsin; et al. Christopher Kruegel, Vienna University of Technology | |
Automatic consistency assessment for query results in dynamic environments | Jamie Payton, University of North Carolina at Charlotte; et al. Gruia-Catalin Roman, Washington University in St. Louis | |
Object and reference immutability using Java generics | Yoav Zibin, Massachusetts Institute of Technology; et al. Mahmood Ali, Massachusetts Institute of Technology Shay Artzi, Massachusetts Institute of Technology Adam Kieżun, Massachusetts Institute of Technology Michael D. Ernst, Massachusetts Institute of Technology | |
2006 | Controlling factors in evaluating path-sensitive error detection techniques | Matthew B. Dwyer, University of Nebraska-Lincoln; et al. Sebastian Elbaum, University of Nebraska-Lincoln |
SYNERGY: a new algorithm for property checking | Bhargav S. Gulavani, Indian Institute of Technology; et al. Yamini Kannan, Microsoft Research Aditya V. Nori, Microsoft Research Sriram K. Rajamani, Microsoft Research | |
2005 | Automatic Generation of Suggestions for Program Investigation | Martin P. Robillard, McGill University |
Context- and path-sensitive memory leak detection | Yichen Xie & Alex Aiken, Stanford University | |
CUTE: a concolic unit testing engine for C | Koushik Sen, University of Illinois at Urbana-Champaign; et al. Gul Agha, University of Illinois at Urbana-Champaign | |
2004 | A classification system and analysis for aspect-oriented programs | Martin Rinard, Massachusetts Institute of Technology; et al. Suhabe Bugrara, Massachusetts Institute of Technology |
Reasoning about partial goal satisfaction for requirements and design engineering | Emmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain | |
2003 | Predicting problems caused by component upgrades | Stephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology |
A Family of Test Adequacy Criteria for Database-Driven Applications | Gregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh | |
Eliminating redundancies with a "composition with adaptation" meta-programming technique | Stan Jarzabek, National University of Singapore Li Shubiao, Xi'an Jiaotong University | |
2002 | Isolating Cause-Effect Chains from Computer Programs | Andreas Zeller, Saarland University | ICCV (Computer Vision) |
2019 | SinGAN: Learning a Generative Model from a Single Natural Image | Tamar Rott Shaham, Israel Institute of Technology; et al. Tali Dekel, Google |
2017 | Mask R-CNN | Kaiming He, Facebook AI Research; et al. Piotr Dollar, Facebook AI Research Ross Girshick, Facebook AI Research |
2015 | Deep Neural Decision Forests | Peter Kontschieder, Microsoft Research; et al. Antonio Criminisi, Microsoft Research Samuel Rota Bulò, Microsoft Research |
2013 | From Large Scale Image Categorization to Entry-Level Categories | Vicente Ordonez, University of North Carolina at Chapel Hill; et al. Yejin Choi, Stony Brook University Alexander Berg, University of North Carolina at Chapel Hill Tamara Berg, University of North Carolina at Chapel Hill |
2011 | Relative Attributes | Devi Parikh, Toyota Technological Institute at Chicago Kristen Grauman, University of Texas at Austin |
2009 | Discriminative models for multi-class object layout | Chaitanya Desai, University of California Irvine; et al. Charless Fowlkes, University of California Irvine |
2007 | Population Shape Regression From Random Design Data | Bradley Davis, University of North Carolina at Chapel Hill; et al. Elizabeth Bullitt, University of North Carolina at Chapel Hill Sarang Joshi, University of Utah |
2005 | Globally Optimal Estimates for Geometric Reconstruction Problems | Fredrik Kahl, Lund University Didier Henrion, LAAS-CNRS |
2003 | Image-based Rendering using Image-based Priors | Andrew Fitzgibbon, University of Oxford; et al. Andrew Zisserman, University of Oxford |
Image Parsing: Unifying Segmentation,Detection and Recognition | Zhuowen Tu, University of California Los Angeles; et al. Alan L. Yuille, University of California Los Angeles Song-Chun Zhu, University of California Los Angeles | |
Detecting Pedestrians using Patterns of Motion and Appearance | Paul Viola, Microsoft Research; et al. Daniel Snow, Mitsubishi Electric Research Laboratories | |
2001 | Probabilistic Tracking with Exemplars in a Metric Space | Kentaro Toyama & Andrew Blake, Microsoft Research |
The Space of All Stereo Images | Steven Seitz, University of Washington | |
1999 | A Theory of Shape by Space Carving | Kiriakos Kutulakos, University of Rochester Steven Seitz, Carnegie Mellon University |
Euclidean Reconstruction and Reprojection up to Subgroups | Yi Ma, University of California Berkeley; et al. Jana Kosecka, University of California Berkeley Shankar Sastry, University of California Berkeley | |
1998 | Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Paramete... | Marc Pollefeys, Katholieke Universiteit Leuven; et al. Luc Van Gool, Katholieke Universiteit Leuven |
The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image Sequences | Phil Torr, Microsoft Research; et al. Andrew Zisserman, University of Oxford | ICML (Machine Learning) |
2019 | Challenging Common Assumptions in the Unsupervised Learning of Disentangled Representations | Francesco Locatello ETH Zurich, Max-Planck Institute for Intelligent Systems; et al. Mario Lucic, Google Gunnar Rättsch, ETH Zurich Sylvain Gelly, Google Bernhard Schötlkopf, Max-Planck Institute for Intelligent Systems Olivier Bachem, Google |
Rates of Convergence for Sparse Variational Gaussian Process Regression | David R. Burt, University of Cambridge; et al. Mark van der Wilk, PROWLER.io | |
2018 | Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples | Anish Athalye, Massachusetts Institute of Technology; et al. David Wagner, University of California Berkeley |
Delayed Impact of Fair Machine Learning | Lydia T. Liu, University of California Berkeley; et al. Esther Rolf, University of California Berkeley Max Simchowitz, University of California Berkeley Moritz Hardt, University of California Berkeley | |
2017 | Understanding Black-box Predictions via Influence Functions | Pang Wei Koh & Percy Liang, Stanford University |
2016 | Dueling Network Architectures for Deep Reinforcement Learning | Ziyu Wang, Google; et al. Matteo Hessel, Google Hado van Hasselt, Google Marc Lanctot, Google Nando de Freitas, University of Oxford |
Pixel Recurrent Neural Networks | Aaron Van den Oord, Google; et al. Koray Kavukcuoglu, Google | |
Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs Sampling | Christopher De Sa, Stanford University; et al. Kunle Olukotun, Stanford University | |
2015 | Optimal and Adaptive Algorithms for Online Boosting | Alina Beygelzimer, Yahoo! Research; et al. Haipeng Luo, Princeton University |
A Nearly-Linear Time Framework for Graph-Structured Sparsity | Chinmay Hegde, Massachusetts Institute of Technology; et al. Ludwig Schmid, Massachusetts Institute of Technology | |
2014 | Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis | Jian Tang, Peking University; et al. XuanLong Nguyen, University of Michigan Qiaozhu Mei, University of Michigan Ming Zhang, Peking University |
2013 | Fast Semidifferential-based Submodular Function Optimization | Rishabh Iyer, University of Washington; et al. Jeff Bilmes, University of Washington |
Vanishing Component Analysis | Roi Livni, The Hebrew University of Jerusalum; et al. Sagi Schein, Hewlett-Packard Labs Hila Nachlieli, Hewlett-Packard Labs Shai Shalev Shwartz, The Hebrew University of Jerusalum Amir Globerson, The Hebrew University of Jerusalum | |
2012 | Bayesian Posterior Sampling via Stochastic Gradient Fisher Scoring | Sungjin Ahn, University of California Irvine; et al. Max Welling, University of California Irvine |
2011 | Computational Rationalization: The Inverse Equilibrium Problem | Kevin Waugh, Carnegie Mellon University; et al. Drew Bagnell, Carnegie Mellon University |
2010 | Hilbert Space Embeddings of Hidden Markov Models | Le Song, Carnegie Mellon University; et al. Sajid M. Siddiqi, Google Geoffrey Gordon, Carnegie Mellon University Alex Smola, Yahoo! Research |
2009 | Structure preserving embedding | Blake Shaw & Tony Jebara, Columbia University |
2008 | SVM Optimization: Inverse Dependence on Training Set Size | Shai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago |
2007 | Information-theoretic metric learning | Jason V. Davis, University of Texas at Austin; et al. Prateek Jain, University of Texas at Austin Suvrit Sra, University of Texas at Austin Inderjit S. Dhillon, University of Texas at Austin |
2006 | Trading convexity for scalability | Ronan Collobert, NEC Labs America; et al. Jason Weston, NEC Labs America Léon Bottou, NEC Labs America |
2005 | A support vector method for multivariate performance measures | Thorsten Joachims, Cornell University |
1999 | Least-Squares Temporal Difference Learning | Justin A. Boyan, NASA Ames Research Center | ICSE (Software Engineering) |
2019 | Defeating Denial-of-Service Attacks in a Self-Managing N-Variant SystemBest Paper AwardLong Paper | Jessica Jones, Arizona State University; et al. Jack Davidson, University of Virginia Stephanie Forrest, Arizona State University |
2018 | Spatio-Temporal Context Reduction: A Pointer-Analysis- Based Static Approach for Detecting Use-Afte... | Hua Yan, University of New South Wales; et al. Shiping Chen, CSIRO Jingling Xue, University of New South Wales |
Identifying Design Problems in the Source Code: A Grounded Theory | Leonardo Sousa, PUC-Rio; et al. Willian Oizumi, PUC-Rio Simone Barbosa, PUC-Rio Alessandro Garcia, PUC-Rio Jaejoon Lee, Lancaster University Marcos Kalinowski, PUC-Rio Rafael de Mello, PUC-Rio Baldoino Fonseca, UFAL Roberto Oliveira, PUC-Rio Carlos Lucena, PUC-Rio Rodrigo Paes, PUC-Rio | |
Static Automated Program Repair for Heap Properties | Rijnard van Tonder & Claire Le Goues, Carnegie Mellon University | |
Automated Localization for Unreproducible Builds | Zhilei Ren, Dalian University of Technology; et al. Jifeng Xuan, Wuhan University Zijiang Yang, Western Michigan University | |
Large-Scale Analysis of Framework-Specific Exceptions in Android Apps | Lingling Fan, East China Normal University; et al. Sen Chen, East China Normal University Guozhu Meng, Chinese Academy of Sciences Yang Liu, Nanyang Technological University Lihua Xu, East China Normal University Geguang Pu, East China Normal University Zhendong Su, University of California | |
Generalized Data Structure Synthesis | Calvin Loncaric, University of Washington; et al. Emina Torlak, University of Washington | |
Traceability in the Wild: Automatically Augmenting Incomplete Trace links | Michael Rath, Technical University Ilmenau; et al. Jin L. C. Guo, McGill University Jane Cleland-Huang, University of Notre Dame Patrick Mätder, Technical University Ilmenau | |
Towards Optimal Concolic Testing | Xinyu Wang, Zhejiang University; et al. Zhenbang Chen, National University of Defense Technology Peixin Zhang, Zhejiang University Jingyi Wang, Singapore University of Technology and Design Yun Lin, National University of Singapore | |
2017 | Clone Refactoring with Lambda Expressions | Nikolaos Tsantalis, Concordia University; et al. Shahriar Rostami, Concordia University |
A Grounded Theory of Agile Transitions in Practice | Rashina Hoda, The University of Auckland James Noble Victoria, University of Wellington | |
Code Defenders: Crowdsourcing Effective Tests and Subtle Mutants with a Mutation Testing Game | José Miguel Rojas, The University of Sheffield; et al. Benjamin S. Clegg, The University of Sheffield Gordon Fraser, The University of Sheffield | |
Decoding the representation of code in the brain: An fMRI study of code review and expertise | Benjamin Floyd, University of Virginia; et al. Westley Weimer, University of Virginia | |
Challenges for Static Analysis of Java Reflection - Literature Review and Empirical Study | Davy Landman, Centrum Wiskunde & Informatica; et al. Jurgen J. Vinju, Centrum Wiskunde & Informatica | |
Optimizing Test Placement for Module-Level Regression Testing | August Shi, University of Illinois at Urbana-Champaign; et al. Shuvendu K. Lahiri, Microsoft Research Nikolaj Bjorner, Microsoft Research Jacek Czerwonka, Microsoft Corporation | |
2016 | Efficient Large-Scale Trace Checking Using MapReduce | Marcello M. Bersani, Politecnico di Milano; et al. Carlo Ghezzi, Politecnico di Milano Srđan Krstić, Politecnico di Milano Pierluigi San Pietro, Politecnico di Milano |
Energy Profiles of Java Collections Classes | Samir Hasan, Auburn University; et al. Munawar Hafiz, Auburn University Mohammed Sayagh, Polytechnique Montréal Bram Adams, Polytechnique Montréal Abram Hindle, University of Alberta | |
Feedback-Directed Instrumentation for Deployed JavaScript Applications | Magnus Madsen, University of Waterloo; et al. Esben Andreasen, Aarhus University Koushik Sen, University of California Berkeley Anders Møller, Aarhus University | |
From Word Embeddings to Document Similarities for Improved Information Retrieval in Software Engine... | Xin Ye, Ohio University Athens; et al. Xiao Ma, Ohio University Athens Razvan Bunescu, Ohio University Athens Chang Liu, Ohio University Athens | |
Guiding Dynamic Symbolic Execution toward Unverified Program Executions | Maria Christakis, ETH Zurich; et al. Valentin Wüstholz, ETH Zurich | |
On the Techniques We Create,the Tools We Build,and Their Misalignments: A Study of KLEE | Eric F. Rizzi, Grammatech; et al. Matthew B. Dwyer, University of Nebraska-Lincoln | |
Termination-Checking for LLVM Peephole Optimizations | David Menendez & Santosh Nagarakatte, Rutgers University | |
VDTest: An Automated Framework to Support Testing for Virtual Devices | Tingting Yu, University of Kentucky; et al. Myra B. Cohen, University of Nebraska-Lincoln | |
Work Practices and Challenges in Pull-Based Development: The Contributor's Perspective | Georgios Gousios, Radboud University Nijmegen; et al. Alberto Bacchelli, Delft University of Technology | |
2015 | Views on Internal and External Validity in Empirical Software Engineering | Janet Siegmund, University of Passau; et al. Sven Apel, University of Passau |
How Much Up-Front? A Grounded theory of Agile Architecture | Michael Waterman, Specialised Architecture Services Ltd; et al. George Allan, Victoria University of Wellington | |
When and Why Your Code Starts to Smell Bad | Michele Tufano, College of William and Mary; et al. Gabriele Bavota, Free University of Bozen-Bolzano Rocco Oliveto, University of Molise Massimiliano Di Penta, University of Sannio Andrea De Lucia, University of Salerno Denys Poshyvanyk, College of William and Mary | |
Alloy*: A General-Purpose Higher-Order Relational Constraint Solver | Aleksandar Milicevic, Massachusetts Institute of Technology; et al. Eunsuk Kang, Massachusetts Institute of Technology Daniel Jackson, Massachusetts Institute of Technology | |
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Fa... | Mathieu Lavallée & Pierre N. Robillard, Polytechnique Montréal | |
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes | Adrian Nistor, Chapman University; et al. Cosmin Radoi, University of Illinois at Urbana-Champaign Shan Lu, University of Chicago | |
2014 | A Study and Toolkit for Asynchronous Programming in C# | Semih Okur, University of Illinois at Urbana-Champaign; et al. Danny Dig, Oregon State University Arie van Deursen, Delft University of Technology |
Characterizing and Detecting Performance Bugs for Smartphone Applications | Yepang Liu, Hong Kong University of Science and Technology; et al. Shing-Chi Cheung, Hong Kong University of Science and Technology | |
Coverage Is Not Strongly Correlated with Test Suite Effectiveness | Laura Inozemtseva & Reid Holmes, University of Waterloo | |
Cowboys,Ankle Sprains,and Keepers of Quality: How Is Video Game Development Different from Software... | Emerson Murphy-Hill, North Carolina State University; et al. Nachiappan Nagappan, Microsoft Research | |
Enhancing Symbolic Execution with Veritesting | Thanassis Avgerinos, Carnegie Mellon University; et al. Sang Kil Cha, Carnegie Mellon University David Brumley, Carnegie Mellon University | |
Improving Automated Source Code Summarization via an Eye-Tracking Study of Programmers | Paige Rodeghero, University of Notre Dame; et al. Paul W. McBurney, University of Notre Dame Nigel Bosch, University of Notre Dame Sidney D'Mello, University of Notre Dame | |
Trading Robustness for Maintainability: An Empirical Study of Evolving C# Programs | Nélio Cacho, Federal University of Rio Grande do Norte; et al. Thomas Filipe, Federal University of Rio Grande do Norte Eliezio Soares, Federal University of Rio Grande do Norte Arthur Cassio, Federal University of Rio Grande do Norte Rafael Souza, Federal University of Rio Grande do Norte Israel Garcia, Federal University of Rio Grande do Norte Eiji Adachi Barbosa, Pontifical Catholic University of Rio de Janeiro Alessandro Garcia, Pontifical Catholic University of Rio de Janeiro | |
Understanding JavaScript Event-Based Interactions | Saba Alimadadi, University of British Columbia; et al. Ali Mesbah, University of British Columbia Karthik Pattabiraman, University of British Columbia | |
Unit Test Virtualization with VMVM | Jonathan Bell & Gail Kaiser, Columbia University | |
2013 | Data Clone Detection and Visualization in Spreadsheets | Felienne Hermans, Delft University of Technology; et al. Martin Pinzger, Delft University of Technology Arie van Deursen, Delft University of Technology |
Interaction-Based Test-Suite Minimization | Dale Blue, IBM; et al. Rachel Tzoref-Brill, IBM Research Aviad Zlotnick, IBM Research | |
Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop Clouds | Weiyi Shang, Queen's University; et al. Hadi Hemmati, Queen's University Bram Adams, Polytechnique Montréal Ahmed E. Hassan, Queen's University Patrick Martin, Queen's University | |
UML in Practice | Marian Petre, Open University | |
Dual Ecological Measures of Focus in Software Development | Daryl Posnett, University of California Davis; et al. Premkumar Devanbu, University of California Davis Vladimir Filkov, University of California Davis | |
Automatic patch generation learned from human-written patches | Dongsun Kim, Hong Kong University of Science and Technology; et al. Jaewoo Song, Hong Kong University of Science and Technology Sunghun Kim, Hong Kong University of Science and Technology | |
2012 | Amplifying Tests to Validate Exception Handling Code | Pingyu Zhang & Sebastian Elbaum, University of Nebraska-Lincoln |
A Tactic-Centric Approach for Automating Traceability of Quality Concerns | Mehdi Mirakhorli, DePaul University; et al. Jane Cleland-Huang, DePaul University Murat Cinar, DePaul University | |
Using Dynamic Analysis to Discover Polynomial and Array Invariants | ThanhVu Nguyen, University of New Mexico; et al. Westley Weimer, University of New Mexico Stephanie Forrest, University of New Mexico | |
Automated Detection of Client-State Manipulation Vulnerabilities | Anders Møller & Mathias Schwarz, Aarhus University | |
Understanding Integer Overflow in C/C++ | Will Dietz, University of Illinois at Urbana-Champaign; et al. John Regehr, University of Utah Vikram Adve, University of Illinois at Urbana-Champaign | |
How Do Professional Developers Comprehend Software? | Tobias Roehm, Technische Universität München; et al. Rainer Koschke, University of Bremen Walid Maalej, Technische Universität München | |
Partial Models: Towards Modeling and Reasoning with Uncertainty | Michalis Famelis, University of Toronto; et al. Marsha Chechik, University of Toronto | |
2011 | Run-Time Efficient Probabilistic Model Checking | Antonio Filieri, Politecnico di Milano; et al. Giordano Tamburrelli, Politecnico di Milano |
Verifying Multi-threaded Software using SMT-based Context-Bounded Model Checking | Lucas Cordeiro & Bernd Fischer, University of Southampton | |
Programs,tests,and oracles: the foundations of testing revisited | Matt Staats, University of Minnesota; et al. Mats P.E. Heimdahl, University of Minnesota | |
On-demand Feature Recommendations Derived from Mining Public Product Descriptions | Horatiu Dumitru, DePaul University; et al. Negar Hariri, DePaul University Jane Cleland-Huang, DePaul University Bamshad Mobasher, DePaul University Carlos Castro-Herrera, DePaul University Mehdi Mirakhorli, DePaul University | |
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity,Quality,and Pro... | Narayan Ramasubbu, Singapore Management University; et al. Rajesh Krishna Balan, Singapore Management University James D. Herbsleb, Carnegie Mellon University | |
2010 | Collaborative Reliability Prediction of Service-Oriented Systems | Zibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong |
A Degree-of-Knowledge Model to Capture Source Code Familiarity | Thomas Fritz, University of British Columbia; et al. Gail C. Murphy, University of British Columbia Emerson Murphy-Hill, University of British Columbia | |
A Machine Learning Approach for Tracing Regulatory Codes to Product Specific Requirements | Jane Cleland-Huang, DePaul University; et al. John Emenecker, DePaul University Marek Gibiec, DePaul University | |
A Cut-off Approach for Bounded Verification of Parameterized Systems | Qiusong Yang & Mingshu Li, Chinese Academy of Sciences | |
Test Generation through Programming in UDITA | Milos Gligoric, University of Illinois at Urbana-Champaign; et al. Vilas Jagannath, University of Illinois at Urbana-Champaign Sarfraz Khurshid, University of Texas at Austin Viktor Kuncak, École Polytechnique Fédérale de Lausanne Darko Marinov, University of Illinois at Urbana-Champaign | |
2009 | Effective Static Deadlock Detection | Mayur Naik, Intel Research; et al. Koushik Sen, University of California Berkeley David Gay, Intel Research |
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows Vista | Christian Bird, University of California Davis; et al. Premkumar Devanbu, University of California Davis Harald Gall, University of Zurich Brendan Murphy, Microsoft Research | |
How We Refactor,and How We Know It | Emerson Murphy-Hill, Portland State University; et al. Andrew P. Black, Portland State University | |
Automatically finding patches using genetic programming | Westley Weimer, University of Virginia; et al. Claire Le Goues, University of Virginia Stephanie Forrest, University of New Mexico | |
Invariant-Based Automatic Testing of AJAX User Interfaces | Ali Mesbah & Arie van Deursen, Delft University of Technology | |
2008 | Recommending adaptive changes for framework evolution | Barthélémy Dagenais & Martin P. Robillard, McGill University |
Precise memory leak detection for java software using container profiling | Guoqing Xu & Atanas Rountev, Ohio State University | |
Debugging reinvented: asking and answering why and why not questions about program behavior | Andrew J. Ko & Brad A. Myers, Carnegie Mellon University | |
The effect of program and model structure on mc/dc test adequacy coverage | Ajitha Rajan, University of Minnesota; et al. Mats P.E. Heimdahl, University of Minnesota | |
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental Approach | Joseph Ruthruff, University of Nebraska-Lincoln; et al. J. David Morgenthaler, Google Sebastian Elbaum, University of Nebraska-Lincoln Gregg Rothermel, University of Nebraska-Lincoln | |
2007 | Tracking Code Clones in Evolving Software | Ekwa Duala-Ekoko & Martin P. Robillard, McGill University |
Predicting Faults from Cached History | Sunghun Kim, Massachusetts Institute of Technology; et al. E. James Whitehead Jr., University of California Santa Cruz Andreas Zeller, Saarland University | |
Matching and Merging of Statecharts Specifications | Shiva Nejati, University of Toronto; et al. Marsha Chechik, University of Toronto Steve Easterbrook, University of Toronto Pamela Zave, AT&T Laboratories | |
Refactoring for Parameterizing Java Classes | Adam Kiezun, Massachusetts Institute of Technology; et al. Frank Tip, IBM Research Robert M. Fuhrer, IBM Research | |
2006 | Model-Based Development of Dynamically Adaptive Software | Ji Zhang & Betty H.C. Cheng, Michigan State University |
Who Should Fix This Bug? | John Anvik, University of British Columbia; et al. Gail C. Murphy, University of British Columbia | |
2005 | Data Structure Repair Using Goal-Directed Reasoning | Brian Demsky & Martin Rinard, Massachusetts Institute of Technology |
Using Structural Context to Recommend Source Code Examples | Reid Holmes & Gail Murphy, University of British Columbia | |
Is Mutation an Appropriate Tool for Testing Experiments? | James Andrews, University of Western Ontario; et al. Yvan Labiche, Carleton University | |
Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Per... | Andrew Ko, Carnegie Mellon University; et al. Brad Myers, Carnegie Mellon University | |
2004 | SNIAFL: Towards a Static Non-Interactive Approach to Feature Location | Wei Zhao, Peking University; et al. Yin Liu, Peking University Jiasu Sun, Peking University Fuqing Yang, Peking University |
An Empirical Study of Software Reuse vs. Defect-Density and Stability | Parastoo Mohagheghi, Ericsson; et al. Ole M. Killi, Norwegian University of Science and Technology Henrik Schwarz, Norwegian University of Science and Technology | |
Static Checking of Dynamically Generated Queries in Database Applications | Carl Gould, University of California Davis; et al. Premkumar Devanbu, University of California Davis | |
A Tool for Writing and Debugging Algebraic Specifications | Johannes Henkel & Amer Diwan, University of Colorado | |
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized Systems | Rohit Khare & Richard N. Taylor, University of California Irvine | |
2003 | Precise Dynamic Slicing Algorithms | Xiangyu Zhang, University of Arizona; et al. Youtao Zhang, University of Arizona |
Modular Verification of Software Components in C | Sagar Chaki, Carnegie Mellon University; et al. Alex Groce, Carnegie Mellon University Somesh Jha, University of Wisconsin Helmut Veith, Technische Universität Wien | IJCAI (Artificial Intelligence) |
2019 | Boosting for Comparison-Based Learning | Michaël Perrot, Max-Planck Institute for Intelligent Systems Ulrike von Luxburg, Max-Planck Institute for Intelligent Systems and University of Tubingen |
2018 | SentiGAN: Generating Sentimental Texts via Mixture Adversarial Networks | Ke Wang & Xiaojun Wan, Peking University |
Reasoning about Consensus when Opinions Diffuse through Majority Dynamics | Vincenzo Auletta, University of Salerno; et al. Gianluigi Greco, University of Calabria | |
R-SVM+: Robust Learning with Privileged Information | Xue Li, Wuhan University; et al. Chang Xu, University of Sydney Yipeng Zhang, Wuhan University Lefei Zhang, Wuhan University Dacheng Tao, University of Sydney | |
From Conjunctive Queries to Instance Queries in Ontology-Mediated Querying | Cristina Feier, University of Bremen; et al. Frank Wolte, University of Liverpool | |
What game are we playing? End-to-end learning in normal and extensive form games | Chun Kai Ling, Carnegie Mellon University; et al. J. Zico Kolter, Carnegie Mellon University | |
Commonsense Knowledge Aware Conversation Generation with Graph Attention | Hao Zhou, Tsinghua University; et al. Minlie Huang, Tsinghua University Haizhou Zhao, Sogou Inc. Jingfang Xu, Sogou Inc. Xiaoyan Zhu, Tsinghua University | |
A Degeneracy Framework for Graph Similarity | Giannis Nikolentzos, École Polytechnique; et al. Stratis Limnios, École Polytechnique Michalis Vazirgiannis, École Polytechnique | |
2017 | Foundations of Declarative Data Analysis Using Limit Datalog Programs | Mark Kaminski, University of Oxford; et al. Egor V. Kostylev, University of Oxford Boris Motik, University of Oxford Ian Horrocks, University of Oxford |
2016 | Hierarchical Finite State Controllers for Generalized Planning | Javier Segovia, Universitat Pompeu Fabra; et al. Anders Jonsson, Universitat Pompeu Fabra |
2015 | Recursive Decomposition for Nonconvex Optimization | Abram L. Friesen & Pedro Domingos, University of Washington |
Bayesian Active Learning for Posterior Estimation | Kirthevasan Kandasamy, Carnegie Mellon University; et al. Barnabas Poczos, Carnegie Mellon University | |
2013 | Flexibility and Decoupling in the Simple Temporal Problem | Michel Wilson, Delft University of Technology; et al. Cees Witteveen, Delft University of Technology Bob Huisman, Delft University of Technology |
Bayesian Optimization in High Dimensions via Random Embeddings | Ziyu Wang, University of British Columbia; et al. Frank Hutter, Freiberg University David Matheson, University of British Columbia Nando de Freitas, University of British Columbia | |
2011 | Nested Rollout Policy Adaptation for Monte Carlo Tree Search | Christopher D. Rosin, Parity Computing |
Unweighted Coalitional Manipulation Under the Borda Rule is NP-Hard | Nadja Betzler, Technische Universität Berlin; et al. Gerhard J. Woeginger, Technische Universität Eindhoven | |
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean Spaces | Roman Kontchakov, Birkbeck College London; et al. Ian Pratt-Hartmann, University of Manchester Michael Zakharyaschev, Birkbeck College London | |
2009 | Learning Conditional Preference Networks with Queries | Frederic Koriche, Université Montpellier II Bruno Zanuttini, Université de Caen Basse-Normandie |
Consequence-Driven Reasoning for Horn SHIQ Ontologies | Yevgeny Kazakov, University of Oxford | |
2007 | Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian Networks | Maleeha Qazi, Siemens Medical Solutions; et al. Sriram Krishnan, Siemens Medical Solutions Romer Rosales, Siemens Medical Solutions Harald Steck, Siemens Medical Solutions R. Bharat Rao, Siemens Medical Solutions Don Polderman, Erasmus University Medical Center Dhanalakshmi Chandrasekaran, No Affiliation |
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Prog... | Luc Mercier & Pascal Van Hentenryck, Brown University | |
Building Structure into Local Search for SAT | Duc Nghia Pham, Griffith University; et al. Abdul Sattar, Griffith University | |
2005 | Learning Coordination Classifiers | Yuhong Guo, University of Alberta; et al. Dale Schuurmans, University of Alberta |
Solving Checkers | Jonathan Schaeffer, University of Alberta; et al. Neil Burch, University of Alberta Akihiro Kishimoto, University of Alberta Martin Muller, University of Alberta Robert Lake, University of Alberta Paul Lu, University of Alberta Steve Sutphen, University of Alberta | |
A Probabilistic Model of Redundancy in Information Extraction | Doug Downey, University of Washington; et al. Stephen Soderland, University of Washington | |
2003 | Thin Junction Tree Filters for Simultaneous Localization and Mapping | Mark A. Paskin, University of California Berkeley |
Approximating Game-Theoretic Optimal Strategies for Full-scale Poker | Darse Billings, University of Alberta; et al. Aaron Davidson, University of Alberta Robert Holte, University of Alberta Jonathan Schaeffer, University of Alberta Terence Schauenberg, University of Alberta Duane Szafron, University of Alberta | |
2001 | Complexity Results for Structure-Based Causality | Thomas Eiter & Thomas Lukasiewicz, Vienna University of Technology |
1999 | A Distributed Case-Based Reasoning Application for Engineering Sales Support | Ian Watson, University of Salford Dan Gardingen, Western Air |
Learning in Natural Language | Dan Roth, University of Illinois at Urbana-Champaign | |
1997 | Translingual Information Retrieval: A Comparative Evaluation | Jaime G. Carbonell, Carnegie Mellon University; et al. Robert E. Frederking, Carnegie Mellon University Ralf D. Brown, Carnegie Mellon University Yibing Geng, Carnegie Mellon University Danny Lee, Carnegie Mellon University |
Object Identification in a Bayesian Context | Timothy Huang & Stuart Russell, University of California Berkeley | |
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolog... | Fangzhen Lin, The Hongkong University of Science and Technology | INFOCOM (Networking) |
2019 | RF-Mehndi: A Fingertip Profiled RF Identifier | Cui Zhao, Jiaotong University; et al. Han Ding, Jiaotong University Jinsong Han, Zhejiang University and Institute of Cyber Security Research Wei Xi, Jiaotong University Ting Liu, Jiaotong University Ruowei Gui, Jiaotong University |
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels | Guocong Quan, Ohio State University; et al. Atilla Eryilmaz, Ohio State University | |
Combinatorial Sleeping Bandits with Fairness Constraints | Fengjiao Li, Temple University; et al. Bo Ji, Temple University | |
2018 | Understanding Ethereum via Graph Analysis | Ting Chen, University of Electronic Science and Technology of China; et al. Zihao Li, University of Electronic Science and Technology of China Jiachi Chen, Hong Kong Polytechnic University Xiaoqi Li, Hong Kong Polytechnic University Xiapu Luo, Hong Kong Polytechnic University Xiaodong Lin, Wilfrid Laurier University Xiaosong Zhang, University of Electronic Science and Technology of China |
WiFED: WiFi Friendly Energy Delivery with Distributed Beamforming | Subhramoy Mohanti, Northeastern University; et al. M. Yousof Naderi, Northeastern University Berk Canberk, Istanbul Technical University Kaushik Chowdhury, Northeastern University | |
Optimizing Age of Information in Wireless Networks with Throughput Constraints | Igor Kadota, Massachusetts Institute of Technology; et al. Eytan Modiano, Massachusetts Institute of Technology | |
2017 | One Step at a Time: Optimizing SDN Upgrades in ISP Networks | Konstantinos Poularakis, Yale University; et al. Georgios Smaragdakis, Massachusetts Institute of Technology Leandros Tassiulas, Yale University |
2016 | Heavy-Ball: A New Approach to Tame Delay and Convergence in Wireless Network Optimization | Jia Liu, Ohio State University; et al. Ness B. Shroff, Ohio State University Elizabeth Serena Bentley, Air Force Research Laboratory |
2015 | The Power of Slightly More than One Sample in Randomized Load Balancing | Lei Ying, Arizona State University; et al. Xiaohan Kang, Arizona State University |
2014 | Joint Static and Dynamic Traffic Scheduling in Data Center Networks | Zizhong Cao, Polytechnic Institute of New York University; et al. T. V. Lakshman, Bell Labs |
Performance Evaluation and Asymptotics for Content Delivery Networks | Virag Shah & Gustavo de Veciana, University of Texas at Austin | |
2013 | On the Steady-State of Cache Networks | Elisha J. Rosensweig, University of Massachusetts Amherst; et al. Jim Kurose, University of Massachusetts Amherst |
2012 | Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework | Carlee Joe-Wong, Princeton University; et al. Tian Lan, George Washington University Mung Chiang, Princeton University |
2011 | Dynamic right-sizing for power-proportional data centers | Minghong Lin, California Institute of Technology; et al. Lachlan Andrew, Swinburne University of Technology Eno Thereska, Microsoft Research |
2010 | On the Feasibility and Efficacy of Protection Routing in IP Networks | Kin-Wah Kwong, University of Pennsylvania; et al. Roch Guérin, University of Pennsylvania Zhi-Li Zhang, University of Minnesota |
2009 | Queuing Network Models for Multi-Channel P2P Live Streaming Systems | Di Wu, Polytechnic Institute of New York University; et al. Keith W. Ross, Polytechnic Institute of New York University |
2008 | Theoretical Results on Base Station Movement Problem for Sensor Networks | Yi Shi & Y. Thomas Hou, Virginia Tech |
On the Feasibility of the Link Abstraction in (Rural) Mesh Networks | Dattatraya Gokhal, Indian Navy; et al. Kameswari Chebrolu, Indian Institute of Technology Bhaskaran Rama, Indian Institute of Technology | |
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless ... | Changhee Joo, Ohio State University; et al. Ness B. Shroff, Ohio State University | |
2007 | Disruption free topology reconfiguration in OSPF networks | Pierre Francois, Université catholique de Louvain; et al. Olicier Bonaventure, Université catholique de Louvain |
2006 | Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective | Gaurav Sharma, Purdue University; et al. Ness Shroff, Purdue University |
2005 | Perfect Simulation and Stationarity of a Class of Mobility Models | Jean-Yves Le Boude, École Polytechnique Fédérale de Lausanne Milan Vojnović, Microsoft Research |
2004 | Throughput-Delay Trade-Off in Wireless Networks | Abbas El Gamal, Stanford University; et al. Balaji Prabhakar, Stanford University Devavrat Shah, Stanford University |
2003 | User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks | Sem Borst, Bell Labs |
2002 | Priority Service and Max-Min Fairness | Peter Marbach, University of Toronto |
2001 | Mobility increases the capacity of ad-hoc wireless networks | Matthias Grossglauser, AT&T Laboratories David Tse, University of California Berkeley |
2000 | The Chaotic Nature of TCP Congestion Control | András Veres, Ericsson Miklós Boda, Ericsson Research |
1999 | Bandwidth Sharing: Objectives and Algorithms | Laurent Massoulié, Microsoft Research James Robert, France Telecom |
1998 | Effective Bandwidths in Wireless Networks with Multiuser Receivers | David Tse, University of California Berkeley Stephen Hanly, University of Melbourne |
1996 | An algorithm for multicast tree generation in networks with asymmetric links | Ram Ramanathan, BBN Technologies | KDD (Data Mining) |
2019 | Network Density of States | Kun Dong, Cornell; et al. David Bindel, Cornell |
2018 | Adversarial Attacks on Neural Networks for Graph Data | Daniel Zügner, Technical University of Munich; et al. Stephan Günnemann, Technical University of Munich |
2017 | Accelerating Innovation Through Analogy Mining | Tom Hope, Hebrew University of Jerusalem; et al. Aniket Kittur, Carnegie Mellon University Dafna Shahaf, Hebrew University of Jerusalem |
2016 | FRAUDAR: Bounding Graph Fraud in the Face of Camouflage | Bryan Hooi, Carnegie Mellon University; et al. Alex Beutel, Carnegie Mellon University Neil Shah, Carnegie Mellon University Kijung Shin, Carnegie Mellon University Christos Faloutsos, Carnegie Mellon University |
2015 | Efficient Algorithms for Public-Private Social Networks | Flavio Chierichetti, Sapienza University of Rome; et al. Ravi Kumar, Google Silvio Lattanzi, Google Vahab Mirrokni, Google |
2014 | Reducing the Sampling Complexity of Topic Models | Aaron Li, Carnegie Mellon University; et al. Sujith Ravi, Google Alexander Smola, Carnegie Mellon University |
2013 | Simple and Deterministic Matrix Sketching | Edo Liberty, Yahoo! Research |
2012 | Searching and Mining Trillions of Time Series Subsequences under Dynamic Time Warping | Thanawin Rakthanmanon, University of California Riverside; et al. Abdullah Mueen, University of California Riverside Gustavo Batista, University of São Paulo Brandon Westover, Brigham and Women's Hospital Qiang Zhu, University of California Riverside Jesin Zakaria, University of California Riverside Eamonn Keogh, University of California Riverside |
2011 | Leakage in Data Mining: Formulation,Detection,and Avoidance | Shachar Kaufman, Tel-Aviv University; et al. Claudia Perlich, Media6Degrees |
2010 | Connecting the dots between news articles | Dafna Shahaf & Carlos Guestrin, Carnegie Mellon University |
Large linear classification when data cannot fit in memory | Hsiang-Fu Yu, National Taiwan University; et al. Kai-Wei Chang, National Taiwan University Chih-Jen Lin, National Taiwan University | |
2009 | Collaborative Filtering with Temporal Dynamics | Yehuda Koren, Yahoo! Research |
2008 | Fastanova: an efficient algorithm for genome-wide association study | Xiang Zhang, University of North Carolina at Chapel Hill; et al. Wei Wang, University of North Carolina at Chapel Hill |
2007 | Predictive discrete latent factor models for large scale dyadic data | Deepak Agarwal & Srujana Merugu, Yahoo! Research |
2006 | Training linear SVMs in linear time | Thorsten Joachims, Cornell University |
2005 | Graphs over time: densification laws,shrinking diameters and possible explanations | Jure Leskovec, Carnegie Mellon University; et al. Christos Faloutsos, Carnegie Mellon University |
2004 | A probabilistic framework for semi-supervised clustering | Sugato Basu, University of Texas at Austin; et al. Raymond J. Mooney, University of Texas at Austin |
2003 | Maximizing the spread of influence through a social network | David Kempe, Cornell University; et al. Éva Tardos, Cornell University |
2002 | Pattern discovery in sequences under a Markov assumption | Darya Chudova & Padhraic Smyth, University of California Irvine |
2001 | Robust space transformations for distance-based operations | Edwin M. Knorr, University of British Columbia; et al. Ruben H. Zamar, University of British Columbia |
2000 | Hancock: a language for extracting signatures from data streams | Corinna Cortes, AT&T Laboratories; et al. Daryl Pregibon, AT&T Laboratories Anne Rogers, AT&T Laboratories |
1999 | MetaCost: a general method for making classifiers cost-sensitive | Pedro Domingos, Universidade Técnica de Lisboa |
1998 | Occam's Two Razors: The Sharp and the Blunt | Pedro Domingos, Universidade Técnica de Lisboa |
1997 | Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Dis... | Foster Provost & Tom Fawcett, NYNEX Science and Technology | MOBICOM (Mobile) |
2019 | eBP: A Wearable System For Frequent and Comfortable Blood Pressure Monitoring From User’s Ear | Nam Bui, University of Colorado Boulder; et al. Jessica Jacqueline Barnitz, University of Colorado Boulder Phuc Nguyen, University of Colorado Boulder Hoang Truong, University of Colorado Boulder Taeho Kim, University of Colorado Boulder Anh Nguyen, University of Colorado Boulder Zhanan Zou, University of Colorado Boulder Nicholas Farrow, University of Colorado Boulder Jianliang Xiao, University of Colorado Boulder Robin Deterding, Children's Hospital Colorado Thang Dinh, Virginia Commonwealth University Tam Vu, University of Colorado Boulder |
FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device Interaction | Sangeun Oh, KAIST; et al. Sunjae Lee, KAIST Kilho Lee, KAIST Dae R. Jeong, KAIST Steven Y. Ko, University at Buffalo and The State University of New York Insik Shin, KAIST | |
2018 | SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks | Mehrdad Moradi, University of Michigan; et al. Eugene Chai, NEC Labs America Sampath Rangarajan, NEC Labs America Z. Morley Mao, University of Michigan |
2017 | WEBee: Physical-Layer Cross-Technology Communication via Emulation | Zhijun Li & Tian He, University of Minnesota |
2015 | CAreDroid: Adaptation Framework for Android ContextAware Applications | Salma Elmalaki, University of California Los Angeles; et al. Mani Srivastava, University of California Los Angeles |
2014 | Tagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS Devices | Lei Yang, Tsinghua University; et al. Xiang-Yang Li, Illinois Institute of Technology Chaowei Xiao, Tsinghua University Mo Li, Nanyang Technological University Yunhao Liu, Tsinghua University |
2013 | Whole-Home Gesture Recognition Using Wireless Signals | Qifan Pu, University of Washington; et al. Shyamnath Gollakota, University of Washington Shwetak Patel, University of Washington |
2012 | Distinguishing Users with Capacitative Touch Communication | Tam Vu, Rutgers University; et al. Simon Gao, Rutgers University Marco Gruteser, Rutgers University Richard Howard, Rutgers University Janne Lindqvist, Rutgers University Predag Spasojevic, Rutgers University Jeffrey Walling, Rutgers University |
2011 | E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks | Xinyu Zhang & Kang G. Shin, University of Michigan |
Detecting Driver Phone Use Leveraging Car Speakers | Jie Yang, Stevens Institute of Technology; et al. Gayathri Chandrasekaran, Rutgers University Tam Vu, Stevens Institute of Technology Hongbo Liu, Stevens Institute of Technology Nicolae Cecan, Rutgers University Yingying Chen, Stevens Institute of Technology Marco Gruteser, Rutgers University Richard P. Martin, Rutgers University | |
2010 | The κ factor: inferring protocol performance using inter-link reception correlation | Kannan Srinivasan, Stanford University; et al. Jung Il Choi, Stanford University Tahir Azim, Stanford University Edward S. Kim, University of Southern California Philip Levis, Stanford University Bhaskar Krishnamachari, University of Southern California |
2009 | CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data Path | Vivek Shrivastava, University of Wisconsin; et al. Shravan Rayanchu, University of Wisconsin Suman Banerjee, University of Wisconsin Srinivasan Keshav, University of Waterloo Konstantina Papagiannaki, Intel Research Arunesh Mishra, Google | NeurIPS (Machine Learning) |
2019 | Distribution-Independent PAC Learning of Halfspaces with Massart Noise | Ilias Diakonikolas, University of Southern California; et al. Christos Tzamos, University of Wisconsin-Madison |
2018 | Non-delusional Q-learning and Value-iteration | Tyler Lu, Google AI; et al. Craig Boutilier, Google AI |
Optimal Algorithms for Non-Smooth Distributed Optimization in Networks | Kevin Scaman, Huawei Noah’s Ark Lab; et al. Sébastien Bubeck, Microsoft Research Yin Tat Lee, Microsoft Research and University of Washington Laurent Massoulié, INRIA and MSR-INRIA Joint Centre | |
Nearly Tight Sample Complexity Bounds for Learning Mixtures of Gaussians via Sample Compression Sch... | Hassan Ashtiani, McMaster University and Vector Institute; et al. Nick Harvey, University of British Columbia Christopher Liaw, University of British Columbia Abbas Mehrabian, McGill University Yaniv Plan, University of British Columbia | |
Neural Ordinary Differential Equations | Tian Qi Chen, University of Toronto and Vector Institute; et al. Jesse Bettencourt, University of Toronto and Vector Institute David Duvenaud, University of Toronto and Vector Institute | |
2017 | Safe and Nested Subgame Solving for Imperfect-Information Games | Noam Brown & Tuomas Sandholm, Carnegie Mellon University |
Variance-based Regularization with Convex Objectives | Hongseok Namkoong & John Duchi, Stanford University | |
A Linear-Time Kernel Goodness-of-Fit Test | Wittawat Jitkrittum, University College London; et al. Zoltan Szabo, École Polytechnique Kenji Fukumizu, The Institute of Statistical Mathematics Arthur Gretton, University College London | |
2016 | Value Iteration Networks | Aviv Tamar, University of California Berkeley; et al. Garrett Thomas, University of California Berkeley Sergey Levine, University of California Berkeley Pieter Abbeel, University of California Berkeley |
2015 | Competitive Distribution Estimation: Why is Good-Turing Good | Alon Orlitsky & Ananda Suresh, University of California San Diego |
Fast Convergence of Regularized Learning in Games » | Vasilis Syrgkanis, Microsoft Research; et al. Haipeng Luo, Princeton University Robert Schapire, Microsoft Research | |
2014 | Asymmetric LSH (ALSH) for Sublinear Time Maximum Inner Product Search (MIPS) | Anshumali Shrivastava, Cornell University Ping Li, Rutgers University |
A* Sampling | Christopher Maddison, University of Toronto; et al. Tom Minka, Microsoft Research | |
2013 | A memory frontier for complex synapses | Subhaneil Lahiri & Surya Ganguli, Stanford University |
Submodular Optimization with Submodular Cover and Submodular Knapsack Constraints | Rishabh Iyer & Jeff Bilmes, University of Washington | |
Scalable Influence Estimation in Continuous-Time Diffusion Networks | Nan Du, Georgia Tech; et al. Manuel Gomez-Rodriguez, Max-Planck Institute for Intelligent Systems Hongyuan Zha, Georgia Tech | NSDI (Networking) |
2019 | Datacenter RPCs can be General and Fast | Anuj Kalia, Carnegie Mellon University; et al. David Andersen, Carnegie Mellon University |
2018 | NetChain: Scale-Free Sub-RTT Coordination | Xin Jin, Johns Hopkins University; et al. Haoyu Zhang, Princeton University Nate Foster, Cornell University Jeongkeun Lee, Barefoot Networks Robert Soulé, Università della Svizzera italiana Changhoon Kim, Barefoot Networks Ion Stoica, University of California Berkeley |
2017 | mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes | Muhammad Asim Jamshed, KAIST; et al. Donghwi Kim, KAIST Dongsu Han, KAIST KyoungSoo Park, KAIST |
2016 | Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions | Bryce Kellogg, University of Washington; et al. Shyamnath Gollakota, University of Washington Joshua R. Smith, University of Washington |
2015 | The Design and Implementation of Open vSwitch | Ben Pfaff, VMware; et al. Teemu Koponen, VMware Ethan J. Jackson, VMware Andy Zhou, VMware Jarno Rajahalme, VMware Jesse Gross, VMware Alex Wang, VMware Jonathan Stringer, VMware Pravin Shelar, VMware Keith Amidon, Awake Networks Martín Casado, VMware |
Queues Don't Matter When You Can JUMP Them! | Matthew P. Grosvenor, University of Cambridge; et al. Ionel Gog, University of Cambridge Robert N. M. Watson, University of Cambridge Andrew W. Moore, University of Cambridge Steven Hand, University of Cambridge Jon Crowcroft, University of Cambridge | |
Designing Distributed Systems Using Approximate Synchrony in Data Center Networks | Dan R. K. Ports, University of Washington; et al. Vincent Liu, University of Washington Naveen Kr. Sharma, University of Washington Arvind Krishnamurthy, University of Washington | |
2014 | Software Dataplane Verification | Mihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne |
2013 | A Fault-Tolerant Engineered Network | Vincent Liu, University of Washington; et al. Arvind Krishnamurthy, University of Washington Thomas Anderson, University of Washington |
Embassies: Radically Refactoring the Web | Jon Howell, Microsoft Research; et al. John R. Douceur, Microsoft Research | |
2012 | Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | Matei Zaharia, University of California Berkeley; et al. Tathagata Das, University of California Berkeley Ankur Dave, University of California Berkeley Justin Ma, University of California Berkeley Murphy McCauley, University of California Berkeley Michael J. Franklin, University of California Berkeley Scott Shenker, University of California Berkeley Ion Stoica, University of California Berkeley |
2011 | ServerSwitch: A Programmable and High Performance Platform for Data Center Networks | Guohan Lu, Microsoft Research; et al. Yulong Li, Microsoft Research Zhiqiang Zhou, Tsinghua University Tong Yuan, Microsoft Research Haitao Wu, Microsoft Research Yongqiang Xiong, Microsoft Research Rui Gao, Microsoft Research Yongguang Zhang, Microsoft Research |
Design,Implementation and Evaluation of Congestion Control for Multipath TCP | Damon Wischik, University College London; et al. Adam Greenhalgh, University College London Mark Handley, University College London | |
2010 | Reverse traceroute | Ethan Katz-Bassett, University of Washington; et al. Vijay Kumar Adhikari, University of Minnesota Colin Scott, University of Washington Justine Sherry, University of Washington Peter van Wesep, University of Washington Thomas Anderson, University of Washington Arvind Krishnamurthy, University of Washington |
2009 | TrInc: Small Trusted Hardware for Large Distributed Systems | Dave Levin, University of Maryland; et al. Jacob R. Lorch, Microsoft Research Thomas Moscibroda, Microsoft Research |
Sora: High Performance Software Radio Using General Purpose Multi-core Processors | Kun Tan, Microsoft Research; et al. Ji Fang, Beijing Jiaotong University He Liu, Tsinghua University Yusheng Ye, Tsinghua University Shen Wang, Tsinghua University Yongguang Zhang, Microsoft Research Haitao Wu, Microsoft Research Wei Wang, Microsoft Research Geoffrey M. Voelker, University of California San Diego | |
2008 | Remus: High Availability via Asynchronous Virtual Machine Replication | Brendan Cully, University of British Columbia; et al. Dutch Meyer, University of British Columbia Mike Feeley, University of British Columbia Norm Hutchinson, University of British Columbia Andrew Warfield, University of British Columbia |
Consensus Routing: The Internet as a Distributed System | John P. John, University of Washington; et al. Arvind Krishnamurthy, University of Washington Thomas Anderson, University of Washington Arun Venkataramani, University of Massachusetts Amherst | |
2007 | Life,Death,and the Critical Transition: Finding Liveness Bugs in Systems Code | Charles Killian, University of California San Diego; et al. Ranjit Jhala, University of California San Diego Amin Vahdat, University of California San Diego |
2006 | Experience with an Object Reputation System for Peer-to-Peer Filesharing | Kevin Walsh & Emin Gün Sirer, Cornell University |
Replay Debugging for Distributed Applications | Dennis Geels, University of California Berkeley; et al. Scott Shenker, University of California Berkeley Ion Stoica, University of California Berkeley | |
2005 | Detecting BGP Configuration Faults with Static Analysis | Nick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology |
2004 | Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networ... | Philip Levis, University of California Berkeley; et al. David Culler, University of California Berkeley Scott Shenker, University of California Berkeley | OSDI (Operating Systems) |
2018 | REPT: Reverse Debugging of Failures in Deployed Software | Weidong Cui, Microsoft Research; et al. Baris Kasikci, University of Michigan Ben Niu, Microsoft Research Upamanyu Sharma, University of Michigan Ruoyu Wang, Arizona State University Insu Yun, Georgia Institute of Technology |
LegoOS: A Disseminated,Distributed OS for Hardware Resource Disaggregation | Yizhou Shan, Purdue University; et al. Yilun Chen, Purdue University Yiying Zhang, Purdue University | |
Orca: Differential Bug Localization in Large-Scale Services | Ranjita Bhagwan, Microsoft Research; et al. Chandra Sekhar Maddila, Microsoft Research Adithya Abraham Philip, Microsoft Research | |
2016 | Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data | Tyler Hunt, University of Texas at Austin; et al. Yuanzhong Xu, University of Texas at Austin Simon Peter, University of Texas at Austin Emmett Witchel, University of Texas at Austin |
Early Detection of Configuration Errors to Reduce Failure Damage | Tianyin Xu, University of California San Diego; et al. Peng Huang, University of California San Diego Yuanyuan Zhou, University of California San Diego Shan Lu, University of Chicago Long Jin, University of California San Diego Shankar Pasupathy, NetApp | |
Push-Button Verification of File Systems via Crash Refinement | Helgi Sigurbjarnarson, University of Washington; et al. Emina Torlak, University of Washington Xi Wang, University of Washington | |
2014 | Arrakis: The Operating System is the Control Plane | Simon Peter, University of Washington; et al. Irene Zhang, University of Washington Dan Ports, University of Washington Doug Woos, University of Washington Arvind Krishnamurthy, University of Washington Thomas Anderson, University of Washington Timothy Roscoe, ETH Zurich |
Shielding Applications from an Untrusted Cloud with Haven | Andrew Baumann, Microsoft Research; et al. Galen Hunt, Microsoft Research | |
IX: A Protected Dataplane Operating System for High Throughput and Low Latency | Adam Belay, Stanford University; et al. Ana Klimovic, Stanford University Samuel Grossman, Stanford University Christos Kozyrakis, Stanford University Edouard Bugnion, École Polytechnique Fédérale de Lausanne | |
2012 | Spanner: Google's Globally-Distributed Database | James C. Corbett, Google; et al. Michael Epstein, Google Andrew Fikes, Google Christopher Frost, Google JJ Furman, Google Sanjay Ghemawat, Google Andrey Gubarev, Google Christopher Heiser, Google Peter Hochschild, Google Wilson Hsieh, Google Sebastian Kanthak, Google Eugene Kogan, Google Hongyi Li, Google Alexander Lloyd, Google Sergey Melnik, Google David Mwaura, Google David Nagle, Google Sean Quinlan, Google Rajesh Rao, Google Lindsay Rolig, Google Yasushi Saito, Google Michal Szymaniak, Google Christopher Taylor, Google Ruth Wang, Google Dale Woodford, Google |
2010 | Efficient System-Enforced Deterministic Parallelism | Amittai Aviram, Yale University; et al. Sen Hu, Yale University Bryan Ford, Yale University |
The Turtles Project: Design and Implementation of Nested Virtualization | Muli Ben-Yehuda, IBM Research; et al. Zvi Dubitzky, IBM Research Michael Factor, IBM Research Nadav Har'El, IBM Research Abel Gordon, IBM Research Anthony Liguori, IBM Orit Wasserman, IBM Research Ben-Ami Yassour, IBM Research | |
2008 | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs | Cristian Cadar, Stanford University; et al. Dawson Engler, Stanford University |
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Lang... | Yuan Yu, Microsoft Research; et al. Dennis Fetterly, Microsoft Research Mihai Budiu, Microsoft Research Úlfar Erlingsson, Microsoft Research Pradeep Kumar Gunda, Microsoft Research Jon Currey, Microsoft Research | |
Difference Engine: Harnessing Memory Redundancy in Virtual Machines | Diwaker Gupta, University of California San Diego; et al. Michael Vrable, University of California San Diego Stefan Savage, University of California San Diego Alex C. Snoeren, University of California San Diego George Varghese, University of California San Diego Geoffrey M. Voelker, University of California San Diego Amin Vahdat, University of California San Diego | |
2006 | Rethink the Sync | Edmund B. Nightingale, University of Michigan; et al. Peter M. Chen, University of Michigan Jason Flinn, University of Michigan |
Bigtable: A Distributed Storage System for Structured Data | Fay Chang, Google; et al. Sanjay Ghemawat, Google Wilson C. Hsieh, Google Deborah A. Wallach, Google Mike Burrows, Google Tushar Chandra, Google Andrew Fikes, Google Robert E. Gruber, Google | |
2004 | Recovering Device Drivers | Michael M. Swift, University of Washington; et al. Brian N. Bershad, University of Washington Henry M. Levy, University of Washington |
Using Model Checking to Find Serious File System Errors | Junfeng Yang, Stanford University; et al. Dawson Engler, Stanford University Madanlal Musuvathi, Microsoft Research | |
2002 | Memory Resource Management in VMware ESX Server | Carl A. Waldspurger, VMware |
2000 | Checking System Rules Using System-Specific,Programmer-Written Compiler Extensions | Dawson Engler, Stanford University; et al. Andy Chou, Stanford University Seth Hallem, Stanford University |
1999 | IO-Lite: A Unified I/O Buffering and Caching System | Vivek S. Pai, Rice University; et al. Willy Zwaenepoel, Rice University |
1996 | Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications | Todd C. Mowry, University of Toronto; et al. Orran Krieger, University of Toronto |
Safe Kernel Extensions Without Run-Time Checking | George C. Necula & Peter Lee, Carnegie Mellon University | PLDI (Programming Languages) |
2019 | An Inductive Synthesis Framework for Verifiable Reinforcement Learning | He Zhu, Galois Inc.; et al. Stephen Magill, Galois Inc. Suresh Jagannathan, Purdue University |
Low-Latency Graph Streaming Using Compressed Purely-Functional Trees | Laxman Dhulipala, Carnegie Mellon University; et al. Guy Blelloch, Carnegie Mellon University | |
2018 | Program synthesis using conflict-driven learning | Yu Feng, University of Texas at Austin; et al. Osbert Bastani, Massachusetts Institute of Technology Isil Dillig, University of Texas at Austin |
A data-driven CHC solver | He Zhu, Galois; et al. Suresh Jagannathan, Purdue University | |
The semantics of transactions and weak memory in x86,Power,ARM,and C++ | Nathan Chong, ARM; et al. John Wickerson, Imperial College London | |
2017 | Low Overhead Dynamic Binary Translation on ARM | Amanieu D'Antras, University of Manchester; et al. Jim Garside, University of Manchester Mikel Luján, University of Manchester |
Repairing sequential consistency in C/C++11 | Ori Lahav, MPI-SWS; et al. Jeehoon Kang, Seoul National University Chung-Kil Hur, Seoul National University Derek Dreyer, MPI-SWS | |
Compiling without continuations | Luke Maurer, University of Oregon; et al. Zena M. Ariola, University of Oregon Simon Peyton Jones, Microsoft Research | |
Bringing the web up to speed with WebAssembly | Andreas Haas, Google; et al. Derek L. Schuff, Google Ben L. Titzer, Google Michael Holman, Microsoft Dan Gohman, Mozilla Luke Wagner, Mozilla Alon Zakai, Mozilla JF Bastien, Apple | |
2016 | Into the Depths of C: Elaborating the De Facto Standards | Kayvan Memarian, University of Cambridge; et al. James Lingard, University of Cambridge Kyndylan Nienhuis, University of Cambridge David Chisnall, University of Cambridge Robert N. M. Watson, University of Cambridge Peter Sewell, University of Cambridge |
Transactional Data Structure Libraries | Alexander Spiegelman, Technion; et al. Idit Keidar, Technion | |
Types from data: Making structured data first-class citizens in F# | Tomas Petricek, University of Cambridge; et al. Don Syme, Microsoft Research | |
Assessing the limits of program-specific garbage collection performance | Nicholas Jacek, University of Massachusetts Amherst; et al. Benjamin Marlin, University of Massachusetts Amherst Eliot Moss, University of Massachusetts Amherst | |
2015 | Automatically Improving Accuracy for Floating Point Expressions | Pavel Panchekha, University of Washington; et al. James R. Wilcox, University of Washington Zachary Tatlock, University of Washington |
Diagnosing Type Errors with Class | Danfeng Zhang, Cornell University; et al. Dimitrios Vytiniotis, Microsoft Research Simon Peyton-Jones, Microsoft Research | |
Provably Correct Peephole Optimizations with Alive | Nuno P. Lopes, Microsoft Research; et al. Santosh Nagarakatte, Rutgers University John Regehr, University of Utah | |
2014 | Compiler validation via equivalence modulo inputs | Vu Le, University of California Davis; et al. Zhendong Su, University of California Davis |
Improving JavaScript Performance by Deconstructing the Type System | Wonsun Ahn, University of Illinois at Urbana-Champaign; et al. Thomas Shull, University of Illinois at Urbana-Champaign María Garzarín, University of Illinois at Urbana-Champaign Josep Torrellas, University of Illinois at Urbana-Champaign | |
On Abstraction Refinement for Program Analyses in Datalog | Xin Zhang, Georgia Institute of Technology; et al. Radu Grigore, Oxford University Mayur Naik, Georgia Institute of Technology Hongseok Yang, Oxford University | |
2013 | A General Constraint-centric Scheduling Framework for Spatial Architectures | Tony Nowatzki, University of Wisconsin; et al. Lorenzo De Carli, University of Wisconsin Karthikeyan Sankaralingam, University of Wisconsin Cristian Estan, Broadcom Behnam Robatmili, Qualcomm Research |
CLAP: Recording Local Executions to Reproduce Concurrency Failures | Jeff Huang, Hong Kong University of Science and Technology; et al. Julian Dolby, IBM Research | |
Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many P... | Sriram Sankaranarayanan, University of Colorado; et al. Sumit Gulwani, Microsoft Research | |
Reconciling Exhaustive Pattern Matching with Objects | Chinawat Isradisaikul & Andrew C. Myers, Cornell University | |
2012 | Concurrent Data Representation Synthesis | Peter Hawkins, Stanford University; et al. Kathleen Fisher, Tufts University Martin Rinard, Massachusetts Institute of Technology Mooly Sagiv, Tel-Aviv University |
2011 | Data Representation Synthesis | Peter Hawkins, Stanford University; et al. Kathleen Fisher, Tufts University Martin Rinard, Massachusetts Institute of Technology Mooly Sagiv, Tel-Aviv University |
2010 | Safe to the Last Instruction: Automated Verification of a Type-Safe Operating System | Jean Yang, Massachusetts Institute of Technology Chris Hawblitzel, Microsoft Research |
2009 | Binary Analysis for Measurement and Attribution of Program Performance | Nathan Tallent, Rice University; et al. Michael Fagan, Rice University |
2007 | Fault-tolerant Typed Assembly Language | Frances Perry, Princeton University; et al. George A. Reis, Princeton University Jay Ligatti, University of South Florida David I. August, Princeton University David Walker, Princeton University |
The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of Code | Ben Hardekopf & Calvin Lin, University of Texas at Austin | |
2005 | Automatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the Heap | Chris Lattner & Vikram Adve, University of Illinois at Urbana-Champaign |
Programming by Sketching for Bit-Streaming Programs | Armando Solar-Lezama, University of California Berkeley; et al. Rastislav Bodik, University of California Berkeley Kemal Ebcioğlu, IBM Research | |
2004 | Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams | John Whaley & Monica S. Lam, Stanford University |
2003 | Automatically Proving the Correctness of Compiler Optimizations | Sorin Lerner, University of Washington; et al. Craig Chambers, University of Washington |
2000 | Dynamo: a transparent dynamic optimization system | Vasanth Bala, Hewlett-Packard Labs; et al. Sanjeev Banerjia, InCert |
1999 | Whole program paths | James R. Larus, Microsoft Research | PODS (Databases) |
2019 | Interventional Fairness : Causal Database Repair for Algorithmic Fairness | Babak Salimi, University of Washington; et al. Bill Howe, University of Washington Dan Suciu, University of Washington |
2018 | Entity Matching with Active Monotone Classification | Yufei Tao, Chinese University of Hong Kong |
2017 | Dichotomies in Ontology-Mediated Querying with the Guarded Fragment | André Hernich, University of Liverpool; et al. Fabio Papacchini, University of Liverpool Frank Wolter, University of Liverpool |
2016 | FAQ: Questions Asked Frequently | Mahmoud Abo Khamis, University at Buffalo; et al. Atri Rudra, University at Buffalo |
2015 | Parallel-Correctness and Transferability for Conjunctive Queries | Tom J. Ameloot, Hasselt University; et al. Bas Ketsman, Hasselt University Frank Neven, Hasselt University Thomas Schwentick, Universität Dortmund |
2014 | Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Con... | Tom J. Ameloot, Hasselt University; et al. Frank Neven, Hasselt University Daniel Zinn, LogicBlox |
2013 | Verification of database-driven systems via amalgamation | Mikołaj Bojańczyk, University of Warsaw; et al. Szymon Toruńczyk, University of Warsaw |
2012 | Worst-case Optimal Join Algorithms | Hung Q. Ngo, University at Buffalo; et al. Christopher Ré, University of Wisconsin Atri Rudra, University at Buffalo |
2011 | Data Exchange Beyond Complete Data | Marcelo Arenas, Pontificia Universidad Católica de Chile; et al. Juan Reutter, University of Edinburgh |
2010 | An Optimal Algorithm for the Distinct Elements Problem | Daniel M. Kane, Harvard University; et al. David P. Woodruff, IBM Research |
2009 | Size and Treewidth Bounds for Conjunctive Queries | Georg Gottlob, University of Oxford; et al. Gregory Valient, University of California Berkeley |
2008 | Estimating PageRank on Graph Streams | Atish Das Sarma, Georgia Institute of Technology; et al. Rina Panigrahy, Microsoft Research |
2007 | Generalized Hypertree Decompositions: NP-Hardness and Tractable Variants | Georg Gottlob, University of Oxford; et al. Thomas Schwentick, Universität Dortmund |
2006 | Two-variable logic on data trees and XML reasoning | Mikolaj Bojanczyk, Warsaw University; et al. Anca Muscholl, Université Paris Thomas Schwentick, Universität Dortmund Luc Segoufin, Université Paris |
2005 | On the complexity of division and set joins in the relational algebra | Dirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum |
XML data exchange: consistency and query answering | Marcelo Arenas & Leonid Libkin, University of Toronto | |
2004 | Conditional XPath,the first order complete XPath dialect | Maarten Marx, University of Amsterdam |
2003 | An Information-Theoretic Approach to Normal Forms for Relational and XML Data | Marcelo Arenas & Leonid Libkin, University of Toronto |
2002 | Monadic Datalog and the Expressive Power of Languages for Web Information Extraction | Georg Gottlob & Christoph Koch, Technische Universität Wien |
2001 | Optimal aggregation algorithms for middleware | Ronald Fagin, IBM Research; et al. Moni Naor, Weizmann Institute of Science |
2000 | Auditing Boolean attributes | Jon Kleinberg, Cornell University; et al. Prabhakar Raghavan, IBM Research |
1999 | Exact and approximate aggregation in constraint query languages | Michael Benefikt & Leonid Libkin, Bell Labs |
1998 | Expressiveness of structured document query languages based on attribute grammars | Frank Neven & Jan Van den Bussche, Limburgs Universitair Centrum |
A lower bound theorem for indexing schemes and its application to multidimensional range queries | Vasilis Samoladas & Daniel P. Miranker, University of Texas at Austin | |
1997 | On the Complexity of Database Queries | Christos H. Papadimitriou, University of California Berkeley Mihalis Yannakakis, Bell Labs | S&P (Security and Privacy) |
2019 | Spectre Attacks: Exploiting Speculative Execution | Paul Kocher, Independent; et al. Anders Fogh, G DATA Advanced Analytics Daniel Genkin, University of Pennsylvania and University of Maryland Daniel Gruss, Graz University of Technology Werner Haas, Cyberus Technology Mike Hamburg, Rambus Moritz Lipp, Graz University of Technology Stefan Mangard, Graz University of Technology Thomas Prescher, Cyberus Technology Michael Schwarz, Graz University of Technology Yuval Yarom, University of Adelaide and Data61 |
2018 | On Enforcing the Digital Immunity of a Large Humanitarian Organization | Stevens Le Blond, École Polytechnique Fédérale de Lausanne; et al. Juan Ramón Troncoso-Pastoriza, École Polytechnique Fédérale de Lausanne Philipp Jovanovic, École Polytechnique Fédérale de Lausanne Bryan Ford, École Polytechnique Fédérale de Lausanne Jean-Pierre Hubaux, École Polytechnique Fédérale de Lausanne |
DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice | Vincent Cheval, Inria; et al. Itsaka Rakotonirina, Inria | |
2017 | Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate | Karthikeyan Bhargavan, INRIA; et al. Nadim Kobeissi, INRIA |
2016 | A2: Analog Malicious Hardware | Kaiyuan Yang, University of Michigan; et al. Qing Dong, University of Michigan Todd Austin, University of Michigan Dennis Sylvester, University of Michigan |
2015 | A Messy State of the Union: Taming the Composite State Machines of TLS | Benjamin Beurdouche, INRIA; et al. Antoine Delignat-Lavaud, INRIA Cédric Fournet, Microsoft Research Markulf Kohlweiss, Microsoft Research Alfredo Pironti, INRIA Pierre-Yves Strub, IMDEA Jean Karim Zinzindohoue, INRIA |
Riposte: An Anonymous Messaging System Handling Millions of Users | Henry Corrigan-Gibbs, Stanford University; et al. David Mazières, Stanford University | |
2014 | Secure Multiparty Computations on BitCoin | Marcin Andrychowicz, University of Warsaw; et al. Daniel Malinowski, University of Warsaw Łukasz Mazurek, University of Warsaw |
Bootstrapping Privacy Compliance in Big Data Systems | Shayak Sen, Carnegie Mellon University; et al. Anupam Datta, Carnegie Mellon University Sriram K. Rajamani, Microsoft Research Janice Tsai, Microsoft Research Jeannette M. Wing, Microsoft Research | |
2013 | Pinocchio: Nearly Practical Verifiable Computation | Bryan Parno, Microsoft Research; et al. Jon Howell, Microsoft Research Mariana Raykova, IBM Research |
2012 | Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards | Benedikt Driessen, Ruhr-Universität Bochum; et al. Carsten Willems, Ruhr-Universität Bochum Christof Paar, Ruhr-Universität Bochum Thorsten Holz, Ruhr-Universität Bochum |
2011 | Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks | Andrew M. White, University of North Carolina at Chapel Hill; et al. Kevin Snow, University of North Carolina at Chapel Hill Fabian Monrose, University of North Carolina at Chapel Hill |
2010 | SCiFI - A System for Secure Face Identification | Margarita Osadchy, University of Haifa; et al. Ayman Jarrous, University of Haifa Boaz Moskovich, University of Haifa |
2009 | Native Client: A Sandbox for Portable,Untrusted x86 Native Code | Bennet Yee, Google; et al. Gregory Dardyk, Google Bradley Chen, Google Robert Muth, Google Tavis Ormandy, Google Shiki Okasaka, Google Neha Narula, Google Nicholas Fullagar, Google |
2008 | Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses | Daniel Halperin, University of Washington; et al. Benjamin Ransford, University of Massachusetts Amherst Shane S. Clark, University of Massachusetts Amherst Benessa Defend, University of Massachusetts Amherst Will Morgan, University of Massachusetts Amherst Kevin Fu, University of Massachusetts Amherst Tadayoshi Kohno, University of Washington William H. Maisel, Harvard University | SIGCOMM (Networking) |
2019 | Underwater Backscatter Networking | Junsu Jang & Fadel Adib, MIT |
2018 | Inferring Persistent Interdomain Congestion | Saksham Agarwal, Cornell University; et al. Akshay Narayan, Massachusetts Institute of Technology Rachit Agarwal, Cornell University David Shmoys, Cornell University Amin Vahdat, Google |
2017 | Re-architecting datacenter networks and stacks for low latency and high performance | Mark Handley, University College London; et al. Alexandru Agache, University Politehnica of Bucharest Andrei Voinescu, University Politehnica of Bucharest Andrew Moore, University of Cambridge Gianni Antichi, University of Cambridge Marcin Wójcik, University of Cambridge |
Language-directed hardware design for network performance monitoring | Srinivas Narayana, Massachusetts Institute of Technology; et al. Vikram Nathan, Massachusetts Institute of Technology Prateesh Goyal, Massachusetts Institute of Technology Venkat Arun, IIT Guwahati Mohammad Alizadeh, Massachusetts Institute of Technology Vimalkumar Jeyakumar, Cisco Systems Changhoon Kim, Barefoot Networks | |
2016 | Don't Mind the Gap: Bridging Network-wide Objectives and Device-level Configurations | Ryan Beckett, Princeton University; et al. Todd Millstein, University of California Los Angeles Jitendra Padhye, Microsoft David Walker, Princeton University) |
Eliminating Channel Feedback in Next-Generation Cellular Networks | Deepak Vasisht, Massachusetts Institute of Technology; et al. Hariharan Rahul, Massachusetts Institute of Technology Dina Katabi, Massachusetts Institute of Technology | |
Inter-Technology Backscatter: Towards Internet Connectivity for Implanted Devices | Vikram Iyer, University of Washington; et al. Bryce Kellogg, University of Washington Shyamnath Gollakota, University of Washington Joshua Smith, University of Washington | |
2015 | Central Control Over Distributed Routing | Stefano Vissicchio, Université catholique de Louvain; et al. Laurent Vanbever, ETH Zurich Jennifer Rexford, Princeton University |
2014 | Balancing Accountability and Privacy in the Network | David Naylor, Carnegie Mellon University; et al. Peter Steenkiste, Carnegie Mellon University |
CONGA: Distributed Congestion-Aware Load Balancing for Datacenters | Mohammad Alizadeh, Cisco Systems; et al. Sarang Dharmapurikar, Cisco Systems Ramanan Vaidyanathan, Cisco Systems Kevin Chu, Cisco Systems Andy Fingerhut, Google Terry Lam, Cisco Systems Francis Matus, Cisco Systems Rong Pan, Cisco Systems Navindra Yadav, Cisco Systems George Varghese, Microsoft | |
2013 | Ambient Backscatter: Wireless Communication Out of Thin Air | Vincent Liu, University of Washington; et al. Vamsi Talla, University of Washington Shyamnath Gollakota, University of Washington David Wetherall, University of Washington Joshua R. Smith, University of Washington |
2012 | Multi-Resource Fair Queueing for Packet Processing | Ali Ghodsi, University of California Berkeley; et al. Matei Zaharia, University of California Berkeley Ion Stoica, University of California Berkeley |
2011 | They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices | Shyamnath Gollakota, Massachusetts Institute of Technology; et al. Benjamin Ransford, University of Massachusetts Amherst Dina Katabi, Massachusetts Institute of Technology Kevin Fu, University of Massachusetts Amherst |
2010 | Efficient Error Estimating Coding: Feasibility and Applications | Binbin Chen, National University of Singapore; et al. Yuda Zhao, National University of Singapore Haifeng Yu, National University of Singapore |
2009 | White Space Networking with Wi-Fi like Connectivity | Paramvir Bahl, Microsoft Research; et al. Thomas Moscibroda, Microsoft Research Rohan Murty, Harvard University Matt Welsh, Harvard University |
2008 | ZigZag Decoding: Combating Hidden Terminals in Wireless Networks | Shyamnath Gollakota & Dina Katabi, Massachusetts Institute of Technology | SIGIR (Information Retrieval) |
2019 | Variance Reduction in Gradient Exploration for Online Learning to Rank | Huazheng Wang, University of Virginia; et al. Eric McCord-Snook, University of Virginia Qingyun Wu, University of Virginia Hongning Wang, University of Virginia |
2018 | Should I Follow the Crowd? A Probabilistic Analysis of the Effectiveness of Popularity in Recommend... | Rocío Cañamares & Pablo Castells, Universidad Autónoma de Madrid |
2017 | BitFunnel: Revisiting Signatures for Search | Bob Goodwin, Microsoft; et al. Dan Luu, Microsoft Alex Clemmer, Heptio Mihaela Curmei, Microsoft Sameh Elnikety, Microsoft Yuxiong He, Microsoft |
2016 | Understanding Information Need: An fMRI Study | Yashar Moshfeghi, University of Glasgow; et al. Frank E. Pollick, University of Glasgow |
2015 | QuickScorer: A Fast Algorithm to Rank Documents with Additive Ensembles of Regression Trees | Claudio Lucchese, Istituto di Scienza e Tecnologie dell'Informazione; et al. Salvatore Orlando, Università di Venezia Raffaele Perego, Istituto di Scienza e Tecnologie dell'Informazione Nicola Tonellotto, Istituto di Scienza e Tecnologie dell'Informazione Rossano Venturini, Istituto di Scienza e Tecnologie dell'Informazione |
2014 | Partitioned Elias-Fano Indexes | Giuseppe Ottaviano, Istituto di Scienza e Tecnologie dell'Informazione Rossano Venturini, Università di Pisa |
2013 | Beliefs and Biases in Web Search | Ryen W. White, Microsoft Research |
2012 | Time-Based Calibration of Effectiveness Measures | Mark Smucker & Charles Clarke, University of Waterloo |
2011 | Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction Dat... | Mikhail Ageev, Moscow State University; et al. Dmitry Lagun, Emory University Eugene Agichtein, Emory University |
2010 | Assessing the Scenic Route: Measuring the Value of Search Trails in Web Logs | Ryen W. White, Microsoft Research Jeff Huang, University of Washington |
2009 | Sources of evidence for vertical selection | Jaime Arguello, Carnegie Mellon University; et al. Jamie Callan, Carnegie Mellon University Jean-Francois Crespo, Yahoo! Research |
2008 | Algorithmic Mediation for Collaborative Exploratory Search | Jeremy Pickens, FX Palo Alto Lab; et al. Chirag Shah, University of North Carolina at Chapel Hill Pernilla Qvarfordt, FX Palo Alto Lab Maribeth Back, FX Palo Alto Lab |
2007 | Studying the Use of Popular Destinations to Enhance Web Search Interaction | Ryen W. White, Microsoft Research; et al. Silviu Cucerzan, Microsoft Research |
2006 | Minimal Test Collections for Retrieval Evaluation | Ben Carterette, University of Massachusetts Amherst; et al. Ramesh Sitaraman, University of Massachusetts Amherst |
2005 | Learning to estimate query difficulty: including applications to missing content detection and dist... | Elad Yom-Tov, IBM Research; et al. David Carmel, IBM Research Adam Darlow, IBM Research |
2004 | A Formal Study of Information Retrieval Heuristics | Hui Fang, University of Illinois at Urbana-Champaign; et al. ChengXiang Zhai, University of Illinois at Urbana-Champaign |
2003 | Re-examining the potential effectiveness of interactive query expansion | Ian Ruthven, University of Strathclyde |
2002 | Novelty and redundancy detection in adaptive filtering | Yi Zhang, Carnegie Mellon University; et al. Thomas Minka, Carnegie Mellon University |
2001 | Temporal summaries of new topics | James Allan, University of Massachusetts Amherst; et al. Vikas Khandelwal, University of Massachusetts Amherst |
2000 | IR evaluation methods for retrieving highly relevant documents | Kalervo Järvelin & Jaana Kekäläinen, University of Tampere |
1999 | Cross-language information retrieval based on parallel texts and automatic mining of parallel texts... | Jian-Yun Nie, Université de Montréal; et al. Pierre Isabelle, Université de Montréal Richard Durand, Université de Montréal |
1998 | A theory of term weighting based on exploratory data analysis | Warren R. Greiff, University of Massachusetts Amherst |
1997 | Feature selection,perceptron learning,and a usability case study for text categorization | Hwee Tou Ng, DSO National Laboratories; et al. Kok Leong Low, Ministry of Defence |
1996 | Retrieving spoken documents by combining multiple index sources | Gareth Jones, University of Cambridge; et al. Karen Spärck Jones, University of Cambridge Steve Young, University of Cambridge | SIGMETRICS (Performance) |
2019 | Computationally Efficient Estimation of the Spectral Gap of a Markov Chain | Richard Combes, Centrale-Supelec Mikael Touati, Orange Labs |
2018 | A Refined Mean Field Approximation | Nicolas Gast, Inria Benny Van Houdt, University of Antwerp |
2017 | Accelerating Performance Inference over Closed Systems by Asymptotic Methods | Giuliano Casale, Imperial College London |
2016 | On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with Fitness | Bo Jiang, University of Massachusetts Amherst; et al. Bruno Ribeiro, Purdue University Don Towsley, University of Massachusetts Amherst |
2015 | Spy vs. Spy: Rumor Source Obfuscation | Giulia Fanti, University of California Berkeley; et al. Sewoong Oh, University of Illinois at Urbana-Champaign Pramod Viswanath, University of Illinois at Urbana-Champaign |
2014 | Concave switching in single and multihop networks | Neil Walton, University of Amsterdam |
2013 | Queueing System Topologies with Limited Flexibility | John Tsitsiklis & Kuang Xu, Massachusetts Institute of Technology |
2012 | Temperature management in data centers: why some (might) like it hot | Nosayba El-Sayed, University of Toronto; et al. George Amvrosiadis, University of Toronto Andy A. Hwang, University of Toronto Bianca Schroeder, University of Toronto |
2011 | Topology Discovery of Sparse Random Graphs With Few Participants | Animashree Anandkumar, University of California Irvine; et al. Jonathan Kelner, Massachusetts Institute of Technology |
2010 | Load balancing via random local search in closed and open systems | Ayalvadi Ganesh, University of Bristol; et al. D. Manjunath, Indian Institute of Technology Alexandre Proutière, Microsoft Research Florian Simatos, INRIA |
2009 | The Age of Gossip: Spatial Mean Field Regime | Augustin Chaintreau, Technicolor; et al. Nikodin Ristanovic, École Polytechnique Fédérale de Lausanne |
2008 | Counter Braids: A Novel Counter Architecture for Per-Flow Measurement | Yi Lu, Stanford University; et al. Balaji Prabhakar, Stanford University Sarang Dharmapurikar, Cisco Systems Abdul Kabbani, Stanford University |
2007 | Modeling the Relative Fitness of Storage | Michael P. Mesnier, Intel; et al. Raja R. Sambasivan, Carnegie Mellon University Alice X. Zheng, Carnegie Mellon University Gregory R. Ganger, Carnegie Mellon University |
2006 | Maximizing throughput in wireless networks via gossiping | Eytan Modiano, Massachusetts Institute of Technology; et al. Gil Zussman, Massachusetts Institute of Technology |
2005 | Coupon replication systems | Laurent Massoulié & Milan Vojnović, Microsoft Research |
2004 | On performance bounds for the integration of elastic and adaptive streaming flows | Thomas Bonald & Alexandre Proutiere, France Telecom |
1996 | Supporting stored video: reducing rate variability and end-to-end resource requirements through opt... | James D. Salehi, University of Massachusetts Amherst; et al. James F. Kurose, University of Massachusetts Amherst Don Towsley, University of Massachusetts Amherst |
Exploiting process lifetime distributions for dynamic load balancing | Mor Harchol-Balter & Allen B. Downey, University of California Berkeley | SIGMOD (Databases) |
2019 | Interventional Fairness : Causal Database Repair for Algorithmic Fairness | Babak Salimi, University of Washington; et al. Bill Howe, Allen School of Computer Science Dan Suciu, University of Washington |
2018 | SuRF:Practical Range Query Filtering with Fast Succinct Tries | Huanchen Zhang, Carnegie Mellon University; et al. Viktor Leis, TU München David G. Andersen, Carnegie Mellon University Michael Kaminsky, Intel Labs Kimberly Keeton, Hewlett Packard Enterprise Andrew Pavlo, Carnegie Mellon University |
2017 | Parallelizing Sequential Graph Computations | Wenfei Fan, University of Edinburgh; et al. Yinghui Wu, Washington State University Wenyuan Yu, Beihang University Jiaxin Jiang, Hong Kong Baptist University Zeyu Zheng, Peking University Bohan Zhang, Peking University Yang Cao, University of Edinburgh Chao Tian, University of Edinburgh |
2016 | Wander Join: Online Aggregation via Random Walks | Feifei Li, University of Utah; et al. Ke Yi, Hong Kong University of Science and Technology Zhuoyue Zhao, Shanghai Jiao Tong University |
2015 | DBSCAN Revisited: Mis-Claim,Un-Fixability,and Approximation | Junhao Gan & Yufei Tao, Chinese University of Hong Kong |
2014 | Materialization Optimizations for Feature Selection Workloads | Ce Zhang, Stanford University; et al. Christopher Ré, Stanford University |
2013 | Massive Graph Triangulation | Xiaocheng Hu, The Chinese University of Hong Kong; et al. Chin-Wan Chung, KAIST |
2012 | High-Performance Complex Event Processing over XML Streams | Barzan Mozafari, Massachusetts Institute of Technology; et al. Carlo Zaniolo, University of California Los Angeles |
2011 | Entangled Queries: Enabling Declarative Data-Driven Coordination | Nitin Gupta, Cornell University; et al. Sudip Roy, Cornell University Gabriel Bender, Cornell University Johannes Gehrke, Cornell University Christoph Koch, École Polytechnique Fédérale de Lausanne |
2010 | FAST: fast architecture sensitive tree search on modern CPUs and GPUs | Changkyu Kim, Intel; et al. Nadathur Satish, Intel Eric Sedlar, Oracle Anthony D. Nguyen, Intel Tim Kaldewey, Oracle Victor W. Lee, Intel Scott A. Brandt, University of California Santa Cruz Pradeep Dubey, Intel |
2009 | Generating example data for dataflow programs | Christopher Olston, Yahoo! Research; et al. Utkarsh Srivastava, Yahoo! Research |
2008 | Serializable isolation for snapshot databases | Michael J. Cahill, University of Sydney; et al. Alan D. Fekete, University of Sydney |
Scalable Network Distance Browsing in Spatial Databases | Hanan Samet, University of Maryland; et al. Houman Alborzi, University of Maryland | |
2007 | Compiling mappings to bridge applications and databases | Sergey Melnik, Microsoft Research; et al. Philip A. Bernstein, Microsoft Research |
Scalable Approximate Query Processing with the DBO Engine | Christopher Jermaine, University of Florida; et al. Abhijit Pol, University of Florida Alin Dobra, University of Florida | |
2006 | To search or to crawl?: towards a query optimizer for text-centric tasks | Panagiotis G. Ipeirotis, New York University; et al. Pranay Jain, Columbia University Luis Gravano, Columbia University |
2004 | Indexing spatio-temporal trajectories with Chebyshev polynomials | Yuhan Cai & Raymond T. Ng, University of British Columbia |
2003 | Spreadsheets in RDBMS for OLAP | Andrew Witkowski, Oracle; et al. Tolga Bozkaya, Oracle Gregory Dorman, Oracle Nathan Folkert, Oracle Abhinav Gupta, Oracle Lei Shen, Oracle Sankar Subramanian, Oracle |
2001 | Locally adaptive dimensionality reduction for indexing large time series databases | Eamonn Keogh, University of California Irvine; et al. Michael Pazzani, University of California Irvine Sharad Mehrotra, University of California Irvine |
2000 | XMill: an efficient compressor for XML data | Hartmut Liefke, University of Pennsylvania Dan Suciu, AT&T Laboratories |
1999 | DynaMat: a dynamic view management system for data warehouses | Yannis Kotidis & Nick Roussopoulos, University of Maryland |
1998 | Efficient transparent application recovery in client-server information systems | David Lomet & Gerhard Weikum, Microsoft Research |
Integrating association rule mining with relational database systems: alternatives and implications | Sunita Sarawagi, IBM Research; et al. Rakesh Agrawal, IBM Research | |
1997 | Fast parallel similarity search in multimedia databases | Stefan Berchtold, University of Munich; et al. Bernhard Braunmüller, University of Munich Daniel A. Keim, University of Munich Hans-Peter Kriegel, University of Munich |
1996 | Implementing data cubes efficiently | Venky Harinarayan, Stanford University; et al. Jeffrey D. Ullman, Stanford University | SODA (Theory) |
2019 | Sublinear Algorithms for (Δ + 1) Vertex Coloring | Sepehr Assadi, University of Pennsylvania; et al. Sanjeev Khanna, University of Pennsylvania |
2018 | Approaching 3/2 for the s-t-path TSP | Vera Traub & Jens Vygen, Universität Bonn |
Online Bipartite Matching with Amortized O(log2 N)Replacements | Aaron Bernstein, Technical University of Berlin; et al. Eva Rotenberg, Technical University of Denmark | |
2017 | Subquadratic Algorithms for the Diameter and the Sum of Pairwise Distances in Planar Graphs | Sergio Cabello, University of Ljubljana |
A (2 + Є) Approximation for Maximum Weight Matching in the Semi-Streaming Model | Ami Paz, IRIF Gregory Schwartzman, National Institute of Informatics | |
2016 | An Improved Distributed Algorithm for Maximal Independent Set | Mohsen Ghaffari, Massachusetts Institute of Technology |
Near-Optimal Light Spanners | Shiri Chechik, Tel-Aviv University Christian Wulff-Nilsen, University of Copenhagen | |
2015 | The Parameterized Complexity of k-Biclique | Bingkai Lin, University of Tokyo |
2014 | Polynomiality for Bin Packing with a Constant Number of Item Types | Michel X. Goemans & Thomas Rothvoß, Massachusetts Institute of Technology |
An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs,and its Multicommodit... | Jonathan A. Kelner, Massachusetts Institute of Technology; et al. Lorenzo Orecchia, Massachusetts Institute of Technology Aaron Sidford, Massachusetts Institute of Technology | |
2013 | A Simple Algorithm for the Graph Minor Decomposition - Logic meets Structural Graph Theory | Martin Grohe, RWTH Aachen University; et al. Bruce Reed, McGill University |
Dynamic graph connectivity in polylogarithmic worst case time | Bruce M. Kapron, University of Victoria; et al. Ben Mountjoy, University of Victoria | |
2012 | Computing all maps into a sphere | Martin Čadek, Masaryk University; et al. Jiří Matoušel, Charles University Francis Sergeraert, Université Joseph Fourier Lukáš Vokřínel, Masaryk University Uli Wagner, ETH Zurich |
2011 | An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss Transform | Nir Ailon, Technion Edo Liberty, Yahoo! Research |
2010 | An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem | Arash Asadpour, Stanford University; et al. Aleksander Mądry, Massachusetts Institute of Technology Shayan Oveis Gharan, Stanford University Amin Saberi, Stanford University |
2009 | Natural Algorithms | Bernard Chazelle, Princeton University | SOSP (Operating Systems) |
2019 | Efficient and Scalable Thread-Safety Violation Detection | Guangpu Li, University of Chicago; et al. Madanlal Musuvathi, Microsoft Research Suman Nath, Microsoft Research Rohan Padhye, University of California Berkeley |
Scaling symbolic evaluation for automated verification of systems code with Serval | Luke Nelson, University of Washington; et al. Ronghui Gu, Columbia University Andrew Baumann, Microsoft Research Emina Torlak, University of Washington Xi Wang, University of Washington | |
2017 | The Efficient Server Audit Problem,Deduplicated Re-execution,and the Web | Cheng Tan, New York University; et al. Joshua B. Leners, Two Sigma Investments Michael Walfish, New York University |
DeepXplore: Automated Whitebox Testing of Deep Learning Systems | Kexin Pei, Columbia University; et al. Junfeng Yang, Columbia University Suman Jana, Columbia University | |
2015 | Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems | Jonathan Mace, Brown University; et al. Rodrigo Fonseca, Brown University |
Using Crash Hoare Logic for Certifying the FSCQ File System | Haogang Chen, Massachusetts Institute of Technology; et al. Tej Chajed, Massachusetts Institute of Technology Adam Chlipala, Massachusetts Institute of Technology M. Frans Kaashoek, Massachusetts Institute of Technology Nickolai Zeldovich, Massachusetts Institute of Technology | |
Coz: Finding Code that Counts with Causal Profiling | Charlie Curtsinger, Grinnell College Emery Berger, University of Massachusetts Amherst | |
2013 | The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors | Austin T. Clements, Massachusetts Institute of Technology; et al. Nickolai Zeldovich, Massachusetts Institute of Technology Robert T. Morris, Massachusetts Institute of Technology Eddie Kohler, Harvard University |
Towards optimization-safe systems: analyzing the impact of undefined behavior | Xi Wang, Massachusetts Institute of Technology; et al. M. Frans Kaashoek, Massachusetts Institute of Technology Armando Solar-Lezama, Massachusetts Institute of Technology | |
Naiad: A Timely Dataflow System | Derek G. Murray, Microsoft Research; et al. Rebecca Isaacs, Microsoft Research Michael Isard, Microsoft Research Paul Barham, Microsoft Research Martíın Abadi, Microsoft Research | |
2011 | Cells: A Virtual Mobile Smartphone Architecture | Jeremy Andrus, Columbia University; et al. Alexander Van't Hof, Columbia University Oren Laadan, Columbia University Jason Nieh, Columbia University |
A File is Not a File: Understanding the I/O Behavior of Apple Desktop Applications | Tyler Harter, University of Wisconsin; et al. Michael Vaughn, University of Wisconsin Andrea C. Arpaci-Dusseau, University of Wisconsin Remzi H. Arpaci-Dusseau, University of Wisconsin | |
2009 | FAWN: A Fast Array of Wimpy Nodes | David G. Andersen, Carnegie Mellon University; et al. Michael Kaminsky, Intel Research Amar Phanishayee, Carnegie Mellon University Lawrence Tan, Carnegie Mellon University Vijay Vasudevan, Carnegie Mellon University |
RouteBricks: Exploiting Parallelism to Scale Software Routers | Mihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al. Katerina Argyraki, École Polytechnique Fédérale de Lausanne Byung-Gon Chun, Intel Research Kevin Fall, Intel Research Gianluca Iannaccone, Intel Research Allan Knies, Intel Research Maziar Manesh, Intel Research Sylvia Ratnasamy, Intel Research | |
seL4: Formal Verification of an OS Kernel | Gerwin Klein, NICTA; et al. Gernot Heiser, NICTA June Andronick, NICTA David Cock, NICTA Philip Derrin, NICTA Dhammika Elkaduwe, NICTA Kai Engelhardt, NICTA Rafal Kolanski, NICTA Michael Norrish, NICTA Thomas Sewell, NICTA Harvey Tuch, NICTA Simon Winwood, NICTA | |
2007 | Sinfonia: a new paradigm for building scalable distributed systems | Marcos K. Aguilera, Hewlett-Packard Labs; et al. Mehul Shah, Hewlett-Packard Labs Alistair Veitch, Hewlett-Packard Labs Christos Karamanolis, VMware |
Zyzzyva: speculative byzantine fault tolerance | Ramakrishna Kotla, University of Texas at Austin; et al. Mike Dahlin, University of Texas at Austin Allen Clement, University of Texas at Austin Edmund Wong, University of Texas at Austin | |
Secure Web Applications via Automatic Partitioning | Stephen Chong, Cornell University; et al. Andrew C. Myers, Cornell University Xin Qi, Cornell University K. Vikram, Cornell University Lantian Zheng, Cornell University Xin Zheng, Cornell University | |
2005 | Rx: treating bugs as allergies - a safe method to survive software failures | Feng Qin, University of Illinois at Urbana-Champaign; et al. Jagadeesan Sundaresan, University of Illinois at Urbana-Champaign Yuanyuan Zhou, University of Illinois at Urbana-Champaign |
BAR Tolerance for Cooperative Services | Amitanand S. Aiyer, University of Texas at Austin; et al. Allen Clement, University of Texas at Austin Mike Dahlin, University of Texas at Austin Jean-Philippe Martin, University of Texas at Austin Carl Porth, University of Texas at Austin | |
Speculative Execution in a Distributed File System | Edmund B. Nightingale, University of Michigan; et al. Jason Flinn, University of Michigan | |
Vigilante: End-to-End Containment of Internet Worms | Manuel Costa, University of Cambridge; et al. Miguel Castro, Microsoft Research Antony Rowstron, Microsoft Research Lidong Zhou, Microsoft Research Lintao Zhang, Microsoft Research Paul Barham, Microsoft Research | |
2003 | Improving the Reliability of Commodity Operating Systems | Michael M. Swift, University of Washington; et al. Henry M. Levy, University of Washington |
Preserving peer replicas by rate-limited sampled voting | Petros Maniatis, Stanford University; et al. Mema Roussopoulos, Stanford University Mary Baker, Stanford University TJ Giuli, Stanford University Yanto Muliadi, Stanford University | |
Backtracking intrusions | Samuel T. King & Peter M. Chen, University of Michigan | |
2001 | Untrusted hosts and confidentiality: secure program partitioning | Steve Zdancewic, Cornell University; et al. Nathaniel Nystrom, Cornell University Andrew C. Myers, Cornell University |
BASE: using abstraction to improve fault tolerance | Rodrigo Rodrigues, Massachusetts Institute of Technology; et al. Barbara Liskov, Massachusetts Institute of Technology | |
1999 | Manageability,availability and performance in Porcupine: a highly scalable,cluster-based mail servi... | Yasushi Saito, University of Washington; et al. Henry M. Levy, University of Washington |
Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors | Kinshuk Govil, Stanford University; et al. Yongqiang Huang, Stanford University Mendel Rosenblum, Stanford University | |
The Click modular router | Robert Morris, Massachusetts Institute of Technology; et al. John Jannotti, Massachusetts Institute of Technology M. Frans Kaashoek, Massachusetts Institute of Technology | |
Soft timers: efficient microsecond software timer support for network processing | Mohit Aron & Peter Druschel, Rice University | |
1997 | Eraser: a dynamic data race detector for multithreaded programs | Stefan Savage, University of Washington; et al. Greg Nelson, Digital Equipment Corporation Patrick Sobalvarro, Digital Equipment Corporation Thomas Anderson, University of California Berkeley |
Continuous profiling: where have all the cycles gone? | Jennifer M. Anderson, Digital Equipment Corporation; et al. Jeffrey Dean, Digital Equipment Corporation Sanjay Ghemawat, Digital Equipment Corporation Monika R. Henzinger, Digital Equipment Corporation Shun-Tak A. Leung, Digital Equipment Corporation Richard L. Sites, Digital Equipment Corporation Mark T. Vandevoorde, Digital Equipment Corporation Carl A. Waldspurger, Digital Equipment Corporation William E. Weihl, Digital Equipment Corporation | |
Disco: running commodity operating systems on scalable multiprocessors | Edouard Bugnion, Stanford University; et al. Mendel Rosenblum, Stanford University | STOC (Theory) |
2019 | The Reachability Problem for Petri Nets is Not Elementary | Wojciech Czerwinski, University of Warsaw; et al. Ranko Lazic, University of Warwick Jerome Leroux, CNRS and University of Bordeaux Filip Mazowiecki, University of Bordeaux |
2018 | A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem | Ola Svensson, École Polytechnique Fédérale de Lausanne; et al. László A. Végh, London School of Economics |
2017 | Explicit,Almost Optimal,Epsilon-Balanced Codes | Amnon Ta-Shma, Tel-Aviv University |
Deciding Parity Games in Quasipolynomial Time | Cristian S. Calude, University of Auckland; et al. Bakhadyr Khoussainov, University of Auckland Wei Li, National University of Singapore Frank Stephan, National University of Singapore | |
A Weighted Linear Matroid Parity Algorithm | Satoru Iwata, University of Tokyo Yusuke Kobayashi, University of Tsukuba | |
2016 | Reed-Muller Codes Achieve Capacity on Erasure Channels | Shrinivas Kudekar, Qualcomm Research; et al. Marco Mondelli, École Polytechnique Fédérale de Lausanne Henry D. Pfister, Duke University Eren Sasoglu, Intel Rudiger Urbanke, École Polytechnique Fédérale de Lausanne |
Explicit Two-Source Extractors and Resilient Functions | Eshan Chattopadhyay & David Zuckerman, University of Texas at Austin | |
Graph Isomorphism in Quasipolynomial Time | László Babaí, University of Chicago | |
2015 | Exponential Separation of Information and Communication for Boolean Functions | Anat Ganor, Weizmann Institute of Science; et al. Ran Raz, Weizmann Institute of Science |
Lower Bounds on the Size of Semidefinite Programming Relaxations | James R. Lee, University of Washington; et al. David Steurer, Cornell University | |
2-Server PIR with sub-polynomial communication | Zeev Dvir & Sivakanth Gopi, Princeton University | |
2014 | The matching polytope has exponential extension complexity | Thomas Rothvoß, University of Washington |
2013 | Approximation Resistance from Pairwise Independent Subgroups | Siu On Chan, University of California Berkeley |
Low Rank Approximation and Regression in Input Sparsity Time | Kenneth L. Clarkson & David P. Woodruff, IBM Research | |
2012 | Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower Bounds | Samuel Fiorini, Université libre de Bruxelles; et al. Sebastian Pokutta, Universität Erlangen Nürnberg Hans Tiwary, Université libre de Bruxelles Ronald de Wolf, Centrum Wiskunde & Informatica |
The Cell Probe Complexity of Dynamic Range Counting | Kasper Larsen, Aarhus University | |
2011 | Electrical flows,laplacian systems,and faster approximation of maximum flow in undirected graphs | Paul Christiano, Massachusetts Institute of Technology; et al. Aleksander Mądry, Massachusetts Institute of Technology Daniel A. Spielman, Yale University Shang-Hua Teng, University of Southern California |
Subexponential lower bounds for randomized pivoting rules for the simplex algorithm | Oliver Friedmann, University of Munich; et al. Uri Zwick, Tel-Aviv University | |
2010 | QIP = PSPACE | Rahul Jain, National University of Singapore; et al. Sarvagya Upadhyay, University of Waterloo John Watrous, University of Waterloo |
An improved LP-based approximation for steiner tree | Jaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al. Thomas Rothvoß, École Polytechnique Fédérale de Lausanne Laura Sanità, École Polytechnique Fédérale de Lausanne | |
2009 | A constructive proof of the Lovász local lemma | Robin A. Moser, ETH Zurich |
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem | Chris Peikert, SRI International | |
2008 | Optimal hierarchical decompositions for congestion minimization in networks | Harald Räcke, University of Warwick |
Optimal algorithms and inapproximability results for every CSP? | Prasad Raghavendra, University of Washington | |
2007 | Faster integer multiplication | Martin Fürer, Pennsylvania State University |
Towards 3-query locally decodable codes of subexponential length | Sergey Yekhanin, Massachusetts Institute of Technology | |
2006 | The PCP theorem by gap amplification | Irit Dinur, Hebrew University |
2005 | Undirected ST-connectivity in log-space | Omer Reingold, Weizmann Institute of Science |
2004 | Expander flows,geometric embeddings and graph partitioning | Sanjeev Arora, Princeton University; et al. Umesh Vazirani, University of California Berkeley |
Multi-linear formulas for permanent and determinant are of super-polynomial size | Ran Raz, Weizmann Institute of Science | |
2003 | Derandomizing polynomial identity tests means proving circuit lower bounds | Valentine Kabanets & Russell Impagliazzo, University of California San Diego |
New lattice-based cryptographic constructions | Oded Regev, Tel-Aviv University | UIST (User Interface) |
2019 | TipText: Eyes-Free Text Entry on a Fingertip Keyboard | Zheer Xu, Dartmouth College; et al. Jun Gong, Dartmouth College Te-Yen Wu, Dartmouth College Aditya Nittala, Saarland University Xiaojun Bi, Stony Brook University Jürgen Steimle, Saarland University Hongbo Fu, City University of Hong Kong Kening Zhu, City University of Hong Kong Xing-Dong Yang, Dartmouth College |
Soft Inkjet Circuits: Rapid Multi-Material Fabrication of Soft Circuits using a Commodity Inkjet Pr... | Arshad Khan, Saarland University; et al. Tobias Kraus, Leibniz Institute for New Materials and Saarland University Jürgen Steimle, Saarland University | |
Photo-Chromeleon: Re-Programmable Multi-Color Textures Using Photochromic Dyes | Yuhua Jin, Massachusetts Institute of Technology; et al. Michael Wessely, Massachusetts Institute of Technology Aradhana Adhikari, Massachusetts Institute of Technology Katarina Bulovic, Massachusetts Institute of Technology Parinya Punpongsanon, Massachusetts Institute of Technology Stefanie Mueller, Massachusetts Institute of Technology | |
2018 | Authoring and Verifying Human-Robot Interactions | David Porfirio, University of Wisconsin-Madison; et al. Aws Albarghouthi, University of Wisconsin-Madison Bilge Mutlu, University of Wisconsin-Madison |
Porta: Profiling Software Tutorials Using Operating-System-Wide Activity Tracing | Alok Mysore & Philip J. Guo, University of California San Diego | |
RESi: A Highly Flexible,Pressure-Sensitive,Imperceptible Textile Interface Based on Resistive Yarns | Patrick Parzer, University of Applied Sciences Upper Austria; et al. Kathrin Probst, University of Applied Sciences Upper Austria Christian Rendl, University of Applied Sciences Upper Austria Joanne Leong, University of Applied Sciences Upper Austria Sarah Schuetz, University of Applied Sciences Upper Austria Anita Vogl, University of Applied Sciences Upper Austria Reinhard Schwoediauer, Johannes Kepler University Martin Kaltenbrunner, Johannes Kepler University Siegfried Bauer, Johannes Kepler University Michael Haller, University of Applied Sciences Upper Austria | |
2017 | Triggering Artwork Swaps for Live Animation | Nora S. Willett, Princeton University; et al. Jovan Popovic, Adobe Research Adam Finkelstein, Princeton University |
Grabity: A Wearable Haptic Interface for Simulating Weight and Grasping in Virtual Reality | Inrak Choi, Stanford University; et al. Mark R. Miller, Stanford University Alex Olwal, Google Sean Follmer, Stanford University | |
AirCode: Unobtrusive Physical Tags for Digital Fabrication | Dingzeyu Li, Columbia University; et al. Shree K. Nayar, Columbia University Changxi Zheng, Columbia University | |
2016 | Rovables: Miniature On-Body Robots as Mobile Wearables | Artem Dementyev, Massachusetts Institute of Technology; et al. Inrak Choi, Stanford University Deborah Ajilo, Massachusetts Institute of Technology Maggie Xu, Stanford University Joseph Paradiso, Massachusetts Institute of Technology Chris Schmandt, Massachusetts Institute of Technology Sean Follmer, Stanford University |
Zooids: Building Blocks for Swarm User Interfaces | Mathieu Le Goc, INRIA; et al. Ali Parsaei, Stanford University Jean-Daniel Fekete, INRIA Pierre Dragicevic, INRIA Sean Follmer, Stanford University | |
proCover: Sensory Augmentation of Prosthetic Limbs Using Smart Textile Covers | Joanne Leong, University of Applied Sciences Upper Austria; et al. Florian Perteneder, University of Applied Sciences Upper Austria Teo Babic, University of Applied Sciences Upper Austria Christian Rendl, University of Applied Sciences Upper Austria Anita Vogl, University of Applied Sciences Upper Austria Hubert Egger, University of Applied Sciences Upper Austria Alex Olwal, Google Michael Haller, University of Applied Sciences Upper Austria | |
ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch Accelerometers | Gierad Laput, Carnegie Mellon University; et al. Chris Harrison, Carnegie Mellon University | |
2015 | Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electro... | Simon Olberding, Max Planck Institut; et al. Klaus Hildebrandt, Max Planck Institut Jurgen Steimle, Max Planck Institut |
Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye Movements | Augusto Esteves, Lancaster University; et al. Andreas Bulling, Max Planck Institut Hans Gellersen, Lancaster University | |
Webstrates: Shareable Dynamic Media | Clemens Klokmose, Aarhus University; et al. Siemen Baader, Aarhus University Wendy Mackay, INRIA Michel Beaudouin-Lafon, Université Paris-Sud | |
2014 | Sensing Techniques for Tablet+Stylus Interaction | Ken Hinckley, Microsoft Research; et al. Hrvoje Benko, Microsoft Research Pourang Irani, Microsoft Research Marcel Gavriliu, Microsoft Research François Guimbretière, Microsoft Research Xiang Anthony Chen, Microsoft Research Fabrice Matulic, Microsoft Research William Buxton, Microsoft Research Andrew Wilson, Microsoft Research |
Expert Crowdsourcing with Flash Teams | Daniela Retelny, Stanford University; et al. Alexandra To, Stanford University Walter Lasecki, University of Rochester Jay Patel, Stanford University Negar Rahmati, Stanford University Tulsee Doshi, Stanford University Melissa Valentine, Stanford University Michael Bernstein, Stanford University | |
PrintScreen: Fabricating Highly Customizable Thin-film Touch-Displays | Simon Olberding, Max Planck Institut; et al. Jürgen Steimle, Max Planck Institut | |
2013 | PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing Interfaces | Lining Yao, Massachusetts Institute of Technology; et al. Jifei Ou, Massachusetts Institute of Technology Sean Follmer, Massachusetts Institute of Technology Clark Della Silva, Massachusetts Institute of Technology Hiroshi Ishii, Massachusetts Institute of Technology |
Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic Sensing | Makoto Ono, University of Tsukuba; et al. Jiro Tanaka, University of Tsukuba | |
Fiberio: A Touchscreen that Senses Fingerprints | Christian Holz & Patrick Baudisch, Hasso Plattner Institute | |
2012 | Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Changi... | Sean Follmer, Massachusetts Institute of Technology; et al. Alex Olwal, Massachusetts Institute of Technology Nadia Cheng, Massachusetts Institute of Technology Hiroshi Ishii, Massachusetts Institute of Technology |
Cliplets: juxtaposing still and dynamic imagery | Neel Joshi, Microsoft Research; et al. Steven Drucker, Microsoft Research Eric Stollnitz, Microsoft Research Hugues Hoppe, Microsoft Research Matt Uyttendaele, Microsoft Michael Cohen, Microsoft Research | |
CrowdScape: interactively visualizing user behavior and output | Jeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University | |
2011 | SideBySide: Ad-hoc Multi-user Interaction with Handheld Projectors | Karl D.D. Willis, Carnegie Mellon University; et al. Scott E. Hudson, Carnegie Mellon University Moshe Mahler, Disney Research |
2010 | VizWiz: nearly real-time answers to visual questions | Jeffrey P. Bigham, University of Rochester; et al. Hanjie Ji, University of Rochester Greg Little, Massachusetts Institute of Technology Andrew Miller, University of Central Florida Robert C. Miller, Massachusetts Institute of Technology Robin Miller, University of Rochester Aubrey Tatarowicz, Massachusetts Institute of Technology Brandyn White, University of Maryland Samual White, University of Rochester Tom Yeh, University of Maryland |
2009 | Mouse 2.0: Multi-touch meets the Mouse | Nicolas Villar, Microsoft Research; et al. Dan Rosenfeld, Microsoft Hrvoje Benko, Microsoft Research John Helmes, Microsoft Research Jonathan Westhues, Microsoft Research Steve Hodges, Microsoft Research Eyal Ofek, Microsoft Alex Butler, Microsoft Research Xiang Cao, Microsoft Research Billy Chen, Microsoft |
2008 | Bringing Physics to the Surface | Andrew D. Wilson, Microsoft Research; et al. Otmar Hilliges, Microsoft Research Armando Garcia-Mendoza, Microsoft Research David Kirk, Microsoft Research |
2007 | ThinSight: Versatile Multi-touch Sensing for Thin Form-factor Displays | Steve Hodges, Microsoft Research; et al. Alex Butler, Microsoft Research Alban Rrustemi, Microsoft Research Bill Buxton, Microsoft Research |
2006 | Reflective Physical Prototyping through Integrated Design,Test,and Analysis | Björn Hartmann, Stanford University; et al. Michael Bernstein, Stanford University Leith Abdulla, Stanford University Brandon Burr, Stanford University Avi Robinson-Mosher, Stanford University Jennifer Gee, Stanford University |
2005 | Automation and Customization of Rendered Web Pages | Michael Bolin, Massachusetts Institute of Technology; et al. Philip Rha, Massachusetts Institute of Technology Tom Wilson, Massachusetts Institute of Technology Robert C. Miller, Massachusetts Institute of Technology |
2004 | Multi-Finger Gestural Interaction with 3D Volumetric Displays | Tovi Grossman, University of Toronto; et al. Ravin Balakrishnan, University of Toronto |
CrossY: A Crossing-Based Drawing Application | Georg Apitz & François Guimbretière, University of Maryland | |
2003 | Perceptually-Supported Image Editing of Text and Graphics | Eric Saund, Palo Alto Research Center; et al. Daniel Larner, Palo Alto Research Center James Mahoney, Palo Alto Research Center |
2002 | Clothing Manipulation | Takeo Igarashi, University of Tokyo John F. Hughes, Brown University |
2001 | Phidgets: Easy Development of Physical Interfaces through Physical Widgets | Saul Greenberg & Chester Fitchett, University of Calgary |
2000 | Sensing Techniques for Mobile Interaction | Ken Hinckley, Microsoft Research; et al. Mike Sinclair, Microsoft Research Eric Horvitz, Microsoft Research |
1996 | Indigo: A Local Propagation Algorithm for Inequality Constraints | Alan Borning, University of Washington; et al. Bjorn Freeman-Benson, Object Technology International | VLDB (Databases) |
2019 | Fine-Grained,Secure and Efficient Data Provenance on Blockchain Systems | Pingcheng Ruan, National University of Singapore; et al. Tien Tuan Anh Dinh, National University of Singapore Qian Lin, National University of Singapore Beng Chin Ooi, National University of Singapore Meihui Zhang, Beijing Institute of Technology |
2018 | The Ubiquity of Large Graphs and Surprising Challenges of Graph Processing: Extended Survey | Siddhartha Sahu, University of Waterloo; et al. Semih Salihoglu, University of Waterloo Jimmy Lin, University of Waterloo M. Tamer ötzsu, University of Waterloo |
2017 | Provenance for Natural Language Queries | Daniel Deutch, Tel-Aviv University; et al. Amir Gilad, Tel-Aviv University |
2016 | Compressed Linear Algebra for Large-Scale Machine Learning | Ahmed Elgohary, University of Maryland; et al. Peter Haas, IBM Research Fred Reiss, IBM Research Berthold Reinwald, IBM Research |
2015 | Constructing an interactive natural language interface for relational databases | Fei Li & H. V. Jagadish, University of Michigan |
2014 | The Uncracked Pieces in Database Cracking | Felix Martin Schuhknecht, Saarland University; et al. Jens Dittrich, Saarland University |
epiC: an Extensible and Scalable System for Processing Big Data | Dawei Jiang, National University of Singapore; et al. Beng Chin Ooi, National University of Singapore Kian-Lee Tan, National University of Singapore Sai Wu, Zhejiang University | |
M4: A Visualization-Oriented Time Series Data Aggregation | Uwe Jugel, SAP; et al. Gregor Hackenbroich, SAP Volker Markl, Technische Universität Berlin | |
Building Efficient Query Engines in a High-Level Language | Yannis Klonatos, École Polytechnique Fédérale de Lausanne; et al. Tiark Rompf, École Polytechnique Fédérale de Lausanne Hassan Chaf, Oracle | |
On k-Path Covers and their Applications | Stefan Funke, University of Stuttgart; et al. Sabine Storandt, University of Stuttgart | |
2013 | DisC Diversity: Result Diversification based on Dissimilarity and Coverage | Marina Drosou & Evaggelia Pitoura, University of Ioannina |
2012 | Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification | Albert Angel, University of Toronto; et al. Nikos Sarkas, University of Toronto Divesh Srivastava, AT&T Laboratories |
2011 | RemusDB: Transparent High-Availability for Database Systems | Umar Farooq Minhas, University of Waterloo; et al. Brendan Cully, University of British Columbia Ashraf Aboulnaga, University of Waterloo Ken Salem, University of Waterloo Andrew Warfield, University of British Columbia |
2010 | Towards Certain Fixes with Editing Rules and Master Data | Shuai Ma, University of Edinburgh; et al. Jianzhong Li, Harbin Institute of Technology Wenyuan Yu, University of Edinburgh Nan Tang, University of Edinburgh |
2009 | A Unified Approach to Ranking in Probabilistic Databases | Jian Li, University of Maryland; et al. Amol Deshpande, University of Maryland |
2008 | Finding Frequent Items in Data Streams | Graham Cormode & Marios Hadjieleftheriou, AT&T Laboratories |
Constrained Physical Design Tuning | Nicolas Bruno & Surajit Chaudhuri, Microsoft Research | |
2007 | Scalable Semantic Web Data Management Using Vertical Partitioning | Daniel J. Abadi, Massachusetts Institute of Technology; et al. Samuel R. Madden, Massachusetts Institute of Technology Kate Hollenbach, Massachusetts Institute of Technology |
2006 | Trustworthy Keyword Search for Regulatory-Compliant Records Retention | Soumyadeb Mitra, University of Illinois at Urbana-Champaign; et al. Marianne Winslett, University of Illinois at Urbana-Champaign |
2005 | Cache-conscious Frequent Pattern Mining on a Modern Processor | Amol Ghoting, Ohio State University; et al. Srinivasan Parthasarathy, Ohio State University Daehyun Kim, Intel Anthony D. Nguyen, Intel Yen-Kuang Chen, Intel Pradeep Dubey, Intel |
2004 | Model-Driven Data Acquisition in Sensor Networks | Amol Deshpande, University of California Berkeley; et al. Samuel R. Madden, Massachusetts Institute of Technology Joseph M. Hellerstein, University of California Berkeley Wei Hong, Intel Research |
2001 | Weaving Relations for Cache Performance | Anastassia Ailamaki, Carnegie Mellon University; et al. Mark D. Hill, University of Wisconsin Marios Skounakis, University of Wisconsin |
1997 | Integrating Reliable Memory in Databases | Wee Teck Ng & Peter M. Chen, University of Michigan | WWW (World Wide Web) |
2019 | Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild | Amin Kharraz, University of Illinois Urbana-Champaign; et al. Paul Murley, University of Illinois Urbana-Champaign Charles Lever, Georgia Institute of Technology Joshua Mason, University of Illinois Urbana-Champaign Andrew Miller, University of Illinois Urbana-Champaign Nikita Borisov, University of Illinois Urbana-Champaign Manos Antonakakis, Georgia Institute of Technology Michael Bailey, University of Illinois Urbana-Champaign |
2018 | HighLife: Higher-arity Fact Harvesting | Patrick Ernst, Saarland Informatics CampusSaarbrücken; et al. Gerhard Weikum, Saarland Informatics CampusSaarbrücken |
2016 | Social Networks Under Stress | Daniel Romero, University of Michigan; et al. Jon Kleinberg, Cornell University |
2015 | HypTrails: A Bayesian Approach for Comparing Hypotheses About Human Trails on the Web | Philipp Singer, GESIS - Leibniz Institute for the Social Sciences; et al. Andreas Hotho, University of Würzburg Markus Strohmaier, GESIS - Leibniz Institute for the Social Sciences |
2014 | Efficient Estimation for High Similarities using Odd Sketches | Michael Mitzenmacher, Harvard University; et al. Ninh Pham, IT University of Copenhagen |
2013 | No Country for Old Members: User Lifecycle and Linguistic Change in Online Communities | Cristian Danescu-Niculescu-Mizil, Stanford University; et al. Dan Jurafsky, Stanford University Jure Leskovec, Stanford University Christopher Potts, Stanford University |
2012 | Counting Beyond a Yottabyte,or how SPARQL 1.1 Property Paths will Prevent Adoption of the Standard | Marcelo Arenas, Pontificia Universidad Católica de Chile; et al. Jorge Pérez, Universidad de Chile |
2011 | Towards a theory model for product search | Beibei Li, New York University; et al. Panagiotis G. Ipeirotis, New York University |
2010 | Factorizing personalized Markov chains for next-basket recommendation | Steffen Rendle, Osaka University; et al. Lars Schmidt-Thieme, University of Hildesheim |
2009 | Hybrid keyword search auctions | Ashish Goel, Stanford University Kamesh Munagala, Duke University |
2008 | IRLbot: Scaling to 6 billion pages and beyond | Hsin-Tsang Lee, Texas A&M University; et al. Xiaoming Wang, Texas A&M University Dmitri Loguinov, Texas A&M University |
2007 | Wherefore art thou r3579x?: anonymized social networks,hidden patterns,and structural steganography | Lars Backstrom, Cornell University; et al. Jon Kleinberg, Cornell University |
2006 | Random Sampling from a Search Engine's Index | Ziv Bar-Yossef & Maxim Gurevich, Technion |
2005 | Three-level caching for efficient query processing in large Web search engines | Xiaohui Long & Torsten Suel, Polytechnic Institute of New York University |
2004 | Automatic detection of fragments in dynamically generated web pages | Lakshmish Ramaswamy, Georgia Institute of Technology; et al. Ling Liu, Georgia Institute of Technology Fred Douglis, IBM Research |
2003 | Scaling personalized web search | Glen Jeh & Jennifer Widom, Stanford University |
SemTag and seeker: bootstrapping the semantic web via automated semantic annotation | Stephen Dill, IBM Research; et al. David Gibson, IBM Research Daniel Gruhl, IBM Research R. Guha, IBM Research Anant Jhingran, IBM Research Tapas Kanungo, IBM Research Sridhar Rajagopalan, IBM Research Andrew Tomkins, IBM Research John A. Tomlin, IBM Research Jason Y. Zien, IBM Research | |
2002 | Abstracting application-level web security | David Scott & Richard Sharp, University of Cambridge |
2001 | Engineering Server Driven Consistency for Large Scale Dynamic Web Services | Jian Yin, University of Texas at Austin; et al. Mike Dahlin, University of Texas at Austin Arun Iyengar, IBM Research |
2000 | Graph Structure in the Web | Andrei Broder, AltaVista; et al. Farzin Maghoul, AltaVista Prabhakar Raghavan, IBM Research Sridhar Rajagopalan, IBM Research Raymie Stata, Compaq Systems Research Center Andrew Tomkins, IBM Research Janet Wiener, Compaq Systems Research Center |
1999 | Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery | Soumen Chakrabarti, Indian Institute of Technology; et al. Byron Dom, IBM Research |
1998 | The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/video | Kevin C. Almeroth, University of California Santa Barbara Mostafa H. Ammar, Georgia Institute of Technology |
Institutions with Best Papers | |
Microsoft Research | 51.5 |
University of Washington | 48.7 |
Carnegie Mellon University | 45.2 |
Massachusetts Institute of Technology | 41.0 |
Stanford University | 40.5 |
University of California Berkeley | 29.8 |
Cornell University | 17.4 |
University of Illinois at Urbana-Champaign | 16.3 |
University of Toronto | 16.0 |
University of Michigan | 15.9 |
13.8 | |
University of Texas at Austin | 13.0 |
IBM Research | 12.8 |
University of British Columbia | 11.7 |
University of Massachusetts Amherst | 11.2 |
Georgia Institute of Technology | 9.5 |
École Polytechnique Fédérale de Lausanne | 9.1 |
University of California Irvine | 8.9 |
University of Maryland | 8.9 |
Princeton University | 8.5 |
Yahoo! Research | 7.9 |
University of California San Diego | 7.8 |
University of Oxford | 7.4 |
Columbia University | 6.3 |
University of Waterloo | 6.2 |
Tsinghua University | 6.2 |
Weizmann Institute of Science | 6.2 |
University of Cambridge | 6.2 |
University of Wisconsin | 6.0 |
McGill University | 5.9 |
Brown University | 5.4 |
Technion | 5.4 |
University of Nottingham | 5.3 |
Tel-Aviv University | 5.3 |
Max Planck Institut | 5.2 |
KAIST | 5.0 |
INRIA | 4.9 |
National University of Singapore | 4.9 |
New York University | 4.9 |
AT&T Laboratories | 4.9 |
Northwestern University | 4.6 |
Oregon State University | 4.6 |
University of Alberta | 4.5 |
Purdue University | 4.5 |
Ohio State University | 4.4 |
University of Virginia | 4.2 |
NEC Labs America | 4.1 |
Hasso Plattner Institute | 4.0 |
Aalto University | 4.0 |
Université Paris-Sud | 4.0 |
University College London | 4.0 |
Newcastle University | 3.9 |
Bell Labs | 3.8 |
Saarland University | 3.7 |
University of Copenhagen | 3.7 |
Aarhus University | 3.6 |
University of Nebraska-Lincoln | 3.6 |
University of California Davis | 3.6 |
Delft University of Technology | 3.5 |
ETH Zurich | 3.5 |
Rice University | 3.5 |
University of North Carolina at Chapel Hill | 3.4 |
Hewlett-Packard Labs | 3.4 |
Rutgers University | 3.4 |
University of Bristol | 3.4 |
University of California Los Angeles | 3.3 |
University of Pennsylvania | 3.3 |
Technische Universität Berlin | 3.3 |
Peking University | 3.3 |
Imperial College London | 3.3 |
Virginia Tech | 3.0 |
Pennsylvania State University | 3.0 |
Indiana University at Bloomington | 3.0 |
DePaul University | 3.0 |
Microsoft | 3.0 |
University of Minnesota | 3.0 |
Hong Kong University of Science and Technology | 2.9 |
Lancaster University | 2.8 |
Chinese Academy of Sciences | 2.7 |
Paderborn University | 2.6 |
University of Edinburgh | 2.6 |
The Chinese University of Hong Kong | 2.5 |
Polytechnic Institute of New York University | 2.5 |
University of Tokyo | 2.5 |
Université catholique de Louvain | 2.4 |
Duke University | 2.4 |
University of Glasgow | 2.4 |
University of Applied Sciences Upper Austria | 2.4 |
University of Warsaw | 2.4 |
University of Saskatchewan | 2.4 |
University of Basel | 2.3 |
Toyota Technological Institute at Chicago | 2.3 |
Harvard University | 2.2 |
University of Amsterdam | 2.2 |
Singapore Management University | 2.2 |
University of Oregon | 2.2 |
Disney Research | 2.2 |
RWTH Aachen University | 2.2 |
Vienna University of Technology | 2.2 |
University of Canterbury | 2.2 |
University of Chicago | 2.2 |
Iowa State University | 2.2 |
Trinity College Dublin | 2.1 |
Inria | 2.1 |
California Institute of Technology | 2.1 |
University of Colorado | 2.1 |
University of Calgary | 2.1 |
VMware | 2.1 |
Intel Research | 2.0 |
Arizona State University | 2.0 |
Autodesk Research | 2.0 |
Zhejiang University | 2.0 |
NASA Ames Research Center | 2.0 |
Michigan State University | 2.0 |
BBN Technologies | 2.0 |
Universidade Técnica de Lisboa | 2.0 |
Chinese University of Hong Kong | 2.0 |
Limburgs Universitair Centrum | 2.0 |
Credit is given in decreasing author order as customary in many fields. First authors are given 1 point, second authors are given 0.5 points, third authors are given 0.33 points, etc. These points are then divided by the sum of points for that paper, i.e. normalizing it. This ranking may be inaccurate or incomplete, may not reflect the current state of best paper awards, and is not an official list. If you are not satisfied with the ranking listed here, please disregard it.
Back to Jeff Huang's Homepage
Brown University Human-Computer Interaction Research Group
Page last updated: 2019-02-21