1996-2016人工智能各大顶级会议最佳论文best paper

来源:互联网 发布:网络代销怎么做 编辑:程序博客网 时间:2024/06/06 00:31

Best Paper Awards in Computer Science (since 1996)

原文地址: http://jeffhuang.com/best_paper_awards.html

By Conference:   AAAI   ACL   CHI   CIKM   CVPR   FOCS   FSE   ICCV   ICML   ICSE   IJCAI   INFOCOM   KDD   MOBICOM   NSDI   OSDI   PLDI   PODS   S&P   SIGCOMM   SIGIR   SIGMETRICS   SIGMOD   SODA   SOSP   STOC   UIST   VLDB   WWW

Institutions with the most Best Papers

Much of this data was entered by hand (obtained by contacting past conference organizers, retrieving cached conference websites, and searching CVs) so please email me if you notice any errors or omissions: bestpaper-AT-jeffhuang.com. I tried to collect best paper awards from the top-tier conferences in each area, but some conferences do not have such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award" and "outstanding paper award" are included but not "best student paper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL).

AAAI (Artificial Intelligence)2016Bidirectional Search That Is Guaranteed to Meet in the MiddleRobert C. Holte, University of Alberta; et al.2015From Non-Negative to General Operator Cost PartitioningFlorian Pommerening, University of Basel; et al.2014Recovering from Selection Bias in Causal and Statistical InferenceElias Bareinboim, University of California Los Angeles; et al.2013HC-Search: Learning Heuristics and Cost Functions for Structured PredictionJanardhan Rao Doppa, Oregon State University; et al.SMILe: Shuffled Multiple-Instance LearningGary Doran & Soumya Ray, Case Western Reserve University2012Learning SVM Classifiers with Indefinite KernelsSuicheng Gu & Yuhong Guo, Temple UniversityDocument Summarization Based on Data ReconstructionZhanying He, Zhejiang University; et al.2011Dynamic Resource Allocation in Conservation PlanningDaniel Golovin, California Institute of Technology; et al.Complexity of and Algorithms for Borda ManipulationJessica Davies, University of Toronto; et al.2010How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Ans...Giorgos Stoilos, Oxford University; et al.A Novel Transition Based Encoding Scheme for Planning as SatisfiabilityRuoyun Huang, Washington University in St. Louis; et al.2008How Good is Almost Perfect?Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität FreiburgOptimal False-Name-Proof Voting Rules with Costly VotingLiad Wagman & Vincent Conitzer, Duke University2007PLOW: A Collaborative Task Learning AgentJames Allen, Institute for Human and Machine Cognition; et al.Thresholded Rewards: Acting Optimally in Timed, Zero-Sum GamesColin McMillen & Manuela Veloso, Carnegie Mellon University2006Model Counting: A New Strategy for Obtaining Good BoundsCarla P. Gomes, Cornell University; et al.Towards an Axiom System for Default LogicGerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto2005The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic SelectionVincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University2004Learning and Inferring Transportation RoutinesLin Liao, University of Washington; et al.2002On Computing All Abductive ExplanationsThomas Eiter, Technische Universität Wien
Kazuhisa Makino, Osaka University2000The Game of Hex: An Automatic Theorem-Proving Approach to Game ProgrammingVadim V. Anshelevich, Vanshel Consulting1999PROVERB: The Probabilistic CruciverbalistGreg A. Keim, Duke University; et al.1998Learning Evaluation Functions for Global Optimization and Boolean SatisfiabilityJustin A. Boyan & Andrew W. Moore, Carnegie Mellon UniversityAcceleration Methods for Numeric CSPsYahia Lebbah & Olivier Lhomme, Ecole des Mines de NantesThe Interactive Museum Tour-Guide RobotWolfram Burgard, University of Bonn; et al.1997Statistical Parsing with a Context-Free Grammar and Word StatisticsEugene Charniak, Brown UniversityA Practical Algorithm for Finding Optimal TriangulationsKrill Shoikhet & Dan Geiger, TechnionFast Context Switching in Real-Time Propositional ReasoningP. Pandurang Nayak & Brian C. Williams, NASA Ames Research CenterBuilding Concept Representations from Reusable ComponentsPeter Clark, Boeing
Bruce Porter, University of Texas at Austin1996Verification of Knowledge Bases Based on Containment CheckingAlon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, Université Paris-SudA Novel Application of Theory Refinement to Student ModelingPaul T. Baffes, SciComp
Raymond J. Mooney, University of Texas at AustinPushing the Envelope: Planning, Propositional Logic, and Stochastic SearchHenry Kautz & Bart Selman, AT&T LaboratoriesACL (Natural Language Processing)2016Finding Non-Arbitrary Form-Meaning Systematicity Using String-Metric Learning for Kernel RegressionE. Darío Gutiérrez, University of California Berkeley; et al.2015Improving Evaluation of Machine Translation Quality EstimationYvette Graham, Trinity College DublinLearning Dynamic Feature Selection for Fast Sequential PredictionEmma Strubell, University of Massachusetts Amherst; et al.2014Fast and Robust Neural Network Joint Models for Statistical Machine TranslationJacob Devlin, Raytheon BBN Technologies; et al.2013Grounded Language Learning from Video Described with SentencesHaonan Yu & Jeffrey Mark Siskind, Purdue University2012String Re-writing KernelFan Bu, Tsinghua University; et al.Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic ParsingHiroyuki Shindo, NTT Communication Science Laboratories; et al.2011Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based ProjectionsDipanjan Das, Carnegie Mellon University
Slav Petrov, Google2010Beyond NomBank: A Study of Implicit Arguments for Nominal PredicatesMatthew Gerber & Joyce Y. Chai, Michigan State University2009Reinforcement Learning for Mapping Instructions to ActionsS.R.K. Branavan, Massachusetts Institute of Technology; et al.K-Best A* ParsingAdam Pauls & Dan Klein, University of California BerkeleyConcise Integer Linear Programming Formulations for Dependency ParsingAndré F.T. Martins, Instituto de Telecomunicações; et al.2008Forest Reranking: Discriminative Parsing with Non-Local FeaturesLiang Huang, University of PennsylvaniaA New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language ModelLibin Shen, BBN Technologies; et al.2007Learning synchronous grammars for semantic parsing with lambda calculusYuk Wah Wong & Raymond J. Mooney, University of Texas at Austin2006Semantic taxonomy induction from heterogenous evidenceRion Snow, Stanford University; et al.2005A Hierarchical Phrase-Based Model for Statistical Machine TranslationDavid Chiang, University of Maryland2004Finding Predominant Word Senses in Untagged TextDiana McCarthy, University of Sussex; et al.2003Accurate Unlexicalized ParsingDan Klein & Christopher D. Manning, Stanford UniversityTowards a Model of Face-to-Face GroundingYukiko I. Nakano, RISTEX; et al.2002Discriminative Training and Maximum Entropy Models for Statistical Machine TranslationFranz Josef Och & Hermann Ney, RWTH Aachen University2001Immediate-Head Parsing for Language ModelsEugene Charniak, Brown UniversityFast Decoding and Optimal Decoding for Machine TranslationUlrich Germann, University of Southern California; et al.CHI (Human-Computer Interaction)2016Building a Personalized, Auto-Calibrating Eye Tracker from User InteractionsMichael Xuelin Huang, Hong Kong Polytechnic University; et al.Finding Email in a Multi-Account, Multi-Device WorldMarta E. Cecchinato, University College London; et al.On Looking at the Vagina through LabellaTeresa Almeida, Newcastle University; et al.Enhancing Cross-Device Interaction Scripting with Interactive IllustrationsPei-Yu (Peggy) Chi, University of California Berkeley; et al.Empath: Understanding Topic Signals in Large-Scale TextEthan Fast, Stanford University; et al.The Effect of Visual Appearance on the Performance of Continuous Sliders and Visual Analogue ScalesJustin Matejka, Autodesk Research; et al.HCI Research as Problem-SolvingAntti Oulasvirta, Aalto University
Kasper Hornbæk, University of CopenhagenRapID: A Framework for Fabricating Low-Latency Interactive Objects with RFID TagsAndrew Spielberg, Massachusetts Institute of Technology; et al.Enabling Designers to Foresee Which Colors Users Cannot SeeKatharina Reinecke, University of Washington; et al.Designing Movement-based Play With Young People Using Powered WheelchairsKathrin Gerling, University of Lincoln; et al.Developing and Validating the User Burden Scale: A Tool for Assessing User Burden in Computing Sys...Hyewon Suh, University of Washington; et al.Momentary Pleasure or Lasting Meaning?: Distinguishing Eudaimonic and Hedonic User ExperiencesElisa D. Mekler, University of Basel
Kasper Hornbæk, University of CopenhagenUnderstanding and Mitigating the Effects of Device and Cloud Service Design Decisions on the Envir...Chris Preist, University of Bristol; et al.Haptic Wave: A Cross-Modal Interface for Visually Impaired Audio ProducersAtau Tanaka & Adam Parkinson, Goldsmiths"I don't Want to Wear a Screen": Probing Perceptions of and Possibilities for Dynamic Displays on ...Laura Devendorf, University of California Berkeley; et al.Dear Diary: Teens Reflect on Their Weekly Online Risk ExperiencesPamela Wisniewski, University of Central Florida; et al.Object-Oriented DrawingHaijun Xia, University of Toronto; et al.Foraging Among an Overabundance of Similar VariantsSruti Srinivasa Ragavan, Oregon State University; et al.Lock n' LoL: Group-based Limiting Assistance App to Mitigate Smartphone Distractions in Group Acti...Minsam Ko, KAIST; et al.Learn Piano with BACh: An Adaptive Learning Interface that Adjusts Task Difficulty Based on Brain ...Beste F. Yuksel, Tufts University; et al.FlexCase: Enhancing Mobile Interaction with a Flexible Sensing and Display CoverChristian Rendl, University of Applied Sciences Upper Austria; et al.Project Jacquard: Interactive Digital Textiles at ScaleIvan Poupyrev, Google; et al.Smart Touch: Improving Touch Accuracy for People with Motor Impairments with Template MatchingMartez E. Mott, University of Washington; et al.2015What Makes Interruptions Disruptive?: A Process-Model Account of the Effects of the Problem State ...Jelmer P. Borst, University of Groningen; et al.VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keybo...Keith Vertanen, Montana Tech; et al.Sharing is Caring: Assistive Technology Designs on ThingiverseErin Buehler, University of Maryland Baltimore County; et al.Tiree Energy Pulse: Exploring Renewable Energy Forecasts on the Edge of the GridWill Simm, Lancaster University; et al.Unequal Representation and Gender Stereotypes in Image Search Results for OccupationsMatthew Kay, University of Washington; et al.Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk ExposurePamela Wisniewski, Pennsylvania State University; et al.Affordance++: Allowing Objects to Communicate Dynamic UsePedro Lopes, Hasso Plattner Institute; et al.Designing Political Deliberation Environments to Support Interactions in the Public SphereBryan Semaan, Syracuse University; et al.ColourID: Improving Colour Identification for People with Impaired Colour VisionDavid R. Flatla, University of Dundee; et al.Fluid Grouping: Quantifying Group Engagement around Interactive Tabletop Exhibits in the WildFlorian Block, Harvard University; et al.Sangeet Swara: A Community-Moderated Voice Forum in Rural IndiaAditya Vashistha, University of Washington; et al.Acoustruments: Passive, Acoustically-Driven, Interactive Controls for Handheld DevicesGierad Laput, Carnegie Mellon University; et al.iSkin: Flexible, Stretchable and Visually Customizable On-Body Touch Sensors for Mobile ComputingMartin Weigel, Max Planck Institut; et al.Patina Engraver: Visualizing Activity Logs as Patina in Fashionable TrackersMoon-Hwan Lee, KAIST; et al.BaseLase: An Interactive Focus+Context Laser FloorJörg Müller, Aarhus University; et al.The Social Impact of a Robot Co-Worker in Industrial SettingsAllison Sauppé & Bilge Mutlu, University of Wisconsin"I always assumed that I wasn't really that close to [her]": Reasoning about Invisible Algorithms ...Motahhare Eslami, University of Illinois at Urbana-Champaign; et al.Understanding and Supporting Fathers and Fatherhood on Social Media SitesTawfiq Ammari & Sarita Schoenebeck, University of MichiganLightweight Relief Shearing for Enhanced Terrain Perception on Interactive MapsWesley Willett, INRIA; et al.From User-Centered to Adoption-Centered Design: A Case Study of an HCI Research Innovation Becomin...Parmit K. Chilana, University of Waterloo; et al.2014Growing Closer on Facebook: Changes in Tie Strength Through Social Network Site UseMoira Burke, Facebook
Robert Kraut, Carnegie Mellon UniversityDuet: Exploring Joint Interactions on a Smart Phone and a Smart WatchXiang Anthony Chen, Carnegie Mellon University; et al.RetroDepth: 3D Silhouette Sensing for High-Precision Input On and Above Physical SurfacesDavid Kim, Microsoft Research; et al.Estimating the Social Costs of FriendsourcingJeffrey Rzeszotarski & Meredith Morris, Microsoft ResearchHuman Values in Curating a Human Rights Media ArchiveAbigail Durrant, Newcastle University; et al.Emerging Sites of HCI Innovation: Hackerspaces, Hardware Startups & IncubatorsSilvia Lindtner, University of California Irvine; et al.Effects of Display Size and Navigation Type on a Classification TaskCan Liu, Université Paris-Sud; et al.Towards Accurate and Practical Predictive Models of Active-Vision-Based Visual SearchDavid Kieras, University of Michigan
Anthony Hornof, University of OregonReal-time Feedback for Improving Medication TakingMatthew Lee, Philips Research
Anind Dey, Carnegie Mellon UniversityMaking Sustainability Sustainable: Challenges in the Design of Eco-Interaction TechnologiesRayoung Yang, University of Michigan; et al.Consumed Endurance: A Metric to Quantify Arm Fatigue of Mid-Air InteractionsAnders Markussen, University of Copenhagen; et al.Type-Hover-Swipe in 96 Bytes: A Motion Sensing Mechanical KeyboardStuart A Taylor, Microsoft Research; et al.Structured Labeling for Facilitating Concept Evolution in Machine LearningTodd Kulesza, Oregon State University; et al.MixFab: a Mixed-Reality Environment for Personal FabricationChristian Weichel, Lancaster University; et al.Designing for Slowness, Anticipation and Re-visitation: A Long Term Field Study of the PhotoboxWilliam Odom, Carnegie Mellon University; et al."Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug WarMunmun De Choudhury, Microsoft Research; et al.Understanding Multitasking Through Parallelized Strategy Exploration and Individualized Cognitive ...Yunfeng Zhang & Anthony Hornof, University of Oregon2013Labor Dynamics in a Mobile Micro-Task MarketMohamed Musthag & Deepak Ganesan, University of Massachusetts AmherstWhat is "Critical" About Critical Design?Jeffrey Bardzell & Shaowen Bardzell, Indiana University at BloomingtonSPRWeb: Preserving Subjective Responses to Website Colour Schemes through Automatic RecolouringDavid R. Flatla, University of Saskatchewan; et al.LaserOrigami: Laser-Cutting 3D ObjectsStefanie Mueller, Hasso Plattner Institute; et al.Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI ResearchEric B. Hekler, Arizona State University; et al.Screenfinity: Extending the Perception Area of Content on Very Large Public DisplaysConstantin Schmidt, Technische Universität Berlin; et al.Reasons to Question Seven Segment DisplaysHarold Thimbleby, Swansea UniversityImproving Navigation-Based File RetrievalStephen Fitchett, University of Canterbury; et al.The Dubuque Electricity Portal: Evaluation of a City-Scale Residential Electricity Consumption Fee...Tom Erickson, IBM Research; et al.At Home with Agents: Exploring Attitudes Towards Future Smart Energy InfrastructuresTom Rodden, University of Nottingham; et al.Job Opportunities through Entertainment: Virally Spread Speech-Based Services for Low-Literate UsersAgha Ali Raza, Carnegie Mellon University; et al.IllumiRoom: Peripheral Projected Illusions for Interactive ExperiencesBrett Jones, University of Illinois at Urbana-Champaign; et al.The Efficacy of Human Post-Editing for Language TranslationSpence Green, Stanford University; et al.Analyzing User-Generated YouTube Videos to Understand Touchscreen Use by People with Motor Impairm...Lisa Anthony, University of Maryland Baltimore County; et al.Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical TurkLilly Irani, University of California Irvine
M. Six Silberman, Bureau of Economic InterpretationWebzeitgeist: Design Mining the WebRanjitha Kumar, Stanford University; et al.Weighted Graph Comparison Techniques for Brain Connectivity AnalysisBasak Alper, University of California Santa Barbara; et al.The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Arc...Xuan Zhao, Cornell University; et al.2012Uncomfortable InteractionsSteve Benford, University of Nottingham; et al.ClayVision: The (Elastic) Image of the CityYuichiro Takeuchi, Sony Computer Science Laboratories
Ken Perlin, New York UniversityRevisiting the Jacquard Loom: Threads of History and Current Patterns in HCIYlva Fernaeus, KTH Royal Institute of Technology; et al.Personas and Decision Making in the Design Process: An Ethnographic Case StudyErin Friess, University of North TexasDetecting Error-Related Negativity for Interaction DesignChi Vi & Sriram Subramanian, University of BristolObservational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobil...Niels Henze, University of Oldenburg; et al.Looking Glass: A Field Study on Noticing Interactivity of Shop WindowsJörg Müller, Technische Universität Berlin; et al.Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday ObjectsMunehiko Sato, Disney Research; et al.Affordances in HCI: Toward a Mediated Action PerspectiveVictor Kaptelinin, University of Bergen
Bonnie Nardi, University of California IrvineUsing Rhythmic Patterns as an Input MethodEmilien Ghomi, Université Paris-Sud; et al.The Normal Natural Troubles of Driving with GPSBarry Brown, Stockholm University
Eric Laurier, University of EdinburghCommunitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical KiosksKurtis Heimerl, University of California Berkeley; et al.Improving Command Selection with CommandMapsJoey Scarr, University of Canterbury; et al.Empathy, Participatory Design and People with DementiaStephen Lindsay, Newcastle University; et al.2011Usable Gestures for Blind People: Understanding Preference and PerformanceShaun K. Kane, University of Washington; et al.Effects of Community Size and Contact Rate in Synchronous Social Q&ARyen W. White, Microsoft Research; et al.Teenagers and Their Virtual Possessions: Design Opportunities and IssuesWilliam Odom, Carnegie Mellon University; et al.Enhancing Physicality in Touch Interaction with Programmable FrictionVincent Levesque, University of British Columbia; et al.Mid-air Pan-and-Zoom on Wall-sized DisplaysMathieu Nancel, Université Paris-Sud; et al.Bricolage: Example-Based Retargeting for Web DesignRanjitha Kumar, Stanford University; et al.Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual E...Thomas Erickson, IBM Research; et al.In the Shadow of Misperception: Assistive Technology Use and Social InteractionsKristen Shinohara & Jacob Wobbrock, University of WashingtonWhy is My Internet Slow?: Making Network Speeds VisibleMarshini Chetty, Georgia Institute of Technology; et al.Ease of Juggling: Studying the Effects of Manual MultitaskingAntti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto UniversityAutomics: souvenir generating photoware for theme parksAbigail Durrant, University of Nottingham; et al.Your Noise is My Command: Sensing Gestures Using the Body as an AntennaGabe Cohn, University of Washington; et al.Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Wor...Koji Yatani, University of Toronto; et al.2010Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber BundlesPatrick Baudisch, Hasso Plattner Institute; et al.Mapping the Landscape of Sustainable HCICarl DiSalvo, Georgia Institute of Technology; et al.Occlusion-Aware InterfacesDaniel Vogel & Ravin Balakrishnan, University of TorontoAvaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural IndiaNeil Patel, Stanford University; et al.How does search behavior change as search becomes more difficult?Anne Aula, Google; et al.The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Co...Brent Hecht & Darren Gergle, Northwestern UniversitySkinput: Appropriating the Body as an Input SurfaceChris Harrison, Carnegie Mellon University; et al.Mobile-izing Health Workers in Rural IndiaDivya Ramachandran, University of California Berkeley; et al.The Design of Eco-Feedback TechnologyJon Froehlich, University of Washington; et al.Feminist HCI: Taking Stock and Outlining an Agenda for DesignShaowen Bardzell, Indiana University at BloomingtonPrefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface StructureMorgan Dixon & James Fogarty, University of WashingtonUseful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of ChartsScott Bateman, University of Saskatchewan; et al.2009From Interaction to Trajectories: Designing Coherent Journeys Through User ExperiencesSteve Benford, University of Nottingham; et al.Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Ser...Jeffrey Heer, Stanford University; et al.Predicting Tie Strength With Social MediaEric Gilbert & Karrie Karahalios, University of Illinois at Urbana-ChampaignMusink: Composing Music through Augmented DrawingTheophanis Tsandilas, Université Paris-Sud; et al.Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector ExhibitsScott S. Snibbe, Sona Research
Hayes S. Raffle, Massachusetts Institute of TechnologyEphemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection PerformanceLeah Findlater, University of British Columbia; et al.Undo and Erase Events as Indicators of Usability ProblemsDavid Akers, Stanford University; et al.2008In-Car GPS Navigation: Engagement with and Disengagement from the EnvironmentGilly Leshed, Cornell University; et al.Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Inte...Krzysztof Z. Gajos, University of Washington; et al.Large Scale Analysis of Web Revisitation PatternsEytan Adar, University of Washington; et al.Designs on Dignity: Perceptions of Technology Among the HomelessChristopher A. Le Dantec & W. Keith Edwards, Georgia Institute of TechnologyThe Network in the Garden: An Empirical Analysis of Social Media in Rural LifeEric Gilbert, University of Illinois at Urbana-Champaign; et al.Multimodal collaborative handwriting training for visually-impaired peopleBeryl Plimmer, University of Auckland; et al.An Error Model for Pointing Based on Fitts' LawJacob Wobbrock, University of Washington; et al.2007Multiview: improving trust in group video conferencing through spatial faithfulnessDavid T. Nguyen & John Canny, University of California BerkeleySoftware or wetware?: discovering when and why people use digital prosthetic memoryVaiva Kalnikaité & Steve Whittaker, University of SheffieldShift: a technique for operating pen-based interfaces using touchDaniel Vogel, University of Toronto
Patrick Baudisch, Microsoft ResearchAuthoring sensor-based interactions by demonstration with direct manipulation and pattern recognit...Björn Hartmann, Stanford University; et al.Sustainable interaction design: invention & disposal, renewal & reuseEli Blevis, Indiana University at BloomingtonConsuming video on Mobile devicesKenton O'Hara, Hewlett-Packard Labs; et al.2006Trackball text entry for people with motor impairmentsJacob Wobbrock & Brad Myers, Carnegie Mellon UniversityEmbedded phenomena: supporting science learning with classroom-sized distributed simulationsTom Moher, University of Illinois at ChicagoA role for haptics in mobile interaction: initial design using a handheld tactile display prototypeJoseph Luk, University of British Columbia; et al.2005Making space for stories: ambiguity in the design of personal communication systemsPaul M. Aoki, Palo Alto Research Center
Allison Woodruff, Intel ResearchExamining Task Engagement in Sensor-Based Statistical Models of Human InterruptibilityJames Fogarty, Carnegie Mellon University; et al.Designing the spectator experienceStuart Reeves, University of Nottingham; et al.The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation areaTovi Grossman & Ravin Balakrishnan, University of TorontoCIKM (Knowledge Management)2016Vandalism Detection in WikidataStefan Heindorf, Paderborn University; et al.2015Assessing the Impact of Syntactic and Semantic Structures for Answer Passages RerankingKateryna Tymoshenko, University of Trento
Alessandro Moschitti, Qatar Computing Research Institute2014Cross-Device SearchGeorge Montanez, Carnegie Mellon University; et al.2013Penguins in Sweaters, or Serendipitous Entity Search on User-generated ContentIlaria Bordino, Yahoo! Research; et al.2012Gelling, and Melting, Large Graphs by Edge ManipulationHanghang Tong, IBM Research; et al.2011Intent-aware query similarityJiafeng Guo, Chinese Academy of Sciences; et al.2010MENTA: Inducing Multilingual Taxonomies from WikipediaGerard de Melo & Gerhard Weikum, Max Planck InstitutFACeTOR: cost-driven exploration of faceted query resultsAbhijith Kashyap, State University of New York at Buffalo; et al.2009On the Feasibility of Multi-Site Web Search EnginesRicardo Baeza-Yates, Yahoo! Research; et al.2008Learning to Link with WikipediaDavid Milne & Ian H. Witten, University of Waikato2007Autonomously Semantifying WikipediaFei Wu & Daniel S. Weld, University of Washington2006Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing IndicesSegabtian Michel, Max Planck Institut; et al.2005Towards Automatic Association of Relevant Unstructured Content with Structured Query ResultsPrasan Roy, IBM Research; et al.2004Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XMLQiankun Zhao, Nanyang Technological University; et al.CVPR (Computer Vision)2016Deep Residual Learning for Image RecognitionKaiming He, Microsoft Research; et al.2015DynamicFusion: Reconstruction and Tracking of Non-rigid Scenes in Real-TimeRichard A. Newcombe, University of Washington; et al.2014What Camera Motion Reveals About Shape with Unknown BRDFManmohan Chandraker, NEC Labs America2013Fast, Accurate Detection of 100,000 Object Classes on a Single MachineThomas Dean, Google; et al.2012A Simple Prior-free Method for Non-Rigid Structure-from-Motion FactorizationYuchao Dai, Northwestern Polytechnical University; et al.2011Real-time Human Pose Recognition in Parts from Single Depth ImagesJamie Shotton, Microsoft Research; et al.2010Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data usi...Anders Eriksson & Anton va den Hendel, University of Adelaide2009Single Image Haze Removal Using Dark Channel PriorKaiming He, The Chinese University of Hong Kong; et al.2008Global Stereo Reconstruction under Second Order Smoothness PriorsOliver Woodford, University of Oxford; et al.Beyond Sliding Windows: Object Localization by Efficient Subwindow SearchChistoph H. Lampert, Max Planck Institut; et al.2007Dynamic 3D Scene Analysis from a Moving VehicleBastian Leibe, ETH Zurich; et al.2006Putting Objects in PerspectiveDerek Hoiem, Carnegie Mellon University; et al.2005Real-Time Non-Rigid Surface DetectionJulien Pilet, École Polytechnique Fédérale de Lausanne; et al.2004Programmable Imaging using a Digital Micromirror ArrayShree K. Nayar, Columbia University; et al.2003Object Class Recognition by Unsupervised Scale-Invariant LearningRob Fergus, University of Oxford; et al.2001Morphable 3D models from videoMatthew Brand, Mitsubishi Electric Research Laboratories2000Real-Time Tracking of Non-Rigid Objects using Mean ShiftDorin Comaniciu, Siemens Corporate Research; et al.FOCS (Theory)2016Settling the Complexity of Computing Approximate Two-Player Nash EquilibriaAviad Rubinstein, University of California BerkeleyFast Learning Requires Good Memory: A Time-Space Lower Bound for Parity LearningRan Raz, Weizmann Institute of Science2015An average-case depth hierarchy theorem for Boolean circuitsBenjamin Rossman, National Institute of Informatics; et al.2014Path Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations a...Yin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology2013Navigating Central Path with Electrical Flows: from Flows to Matchings, and BackAleksander Mądry, École Polytechnique Fédérale de Lausanne2012A multi-prover interactive proof for NEXP sound against entangled proversTsuyoshi Ito, NEC Labs America
Thomas Vidick, Massachusetts Institute of TechnologyA Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2Julia Chuzhoy, Toyota Technological Institute at Chicago
Shi Li, Princeton University2011A Randomized Rounding Approach to the Traveling Salesman ProblemShayan Oveis Gharan, Stanford University; et al.A Polylogarithmic-Competitive Algorithm for the k-Server ProblemNikhil Bansal, IBM Research; et al.Approximating Graphic TSP by MatchingsTobia M¨o;mke & Ola Svensson, Royal Institute of Technology2010Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke DecompositionsMatthew Andrews, Bell LabsSubexponential Algorithms for Unique Games and Related ProblemsSanjeev Arora, Princeton University; et al.Computational Transition at the Uniqueness ThresholdAllan Sly, Microsoft Research2008Two Query PCP with Sub-Constant ErrorDana Moshkovitz & Ran Raz, Weizmann Institute of Science2007Space-Efficient Identity Based Encryption Without PairingsDan Boneh, Stanford University; et al.2006Settling the Complexity of 2-Player Nash EquilibriumXi Chen, Tsinghua University
Xiaotie Deng, City University of Hong Kong2005The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type M...Subhash A. Khot, Georgia Institute of Technology
Nisheeth K. Vishnoi, IBM ResearchCorrecting Errors Beyond the Guruswami-Sudan Radius in Polynomial TimeFarzad Parvaresh & Alexander Vardy, University of California San Diego2004Cryptography in NC0Benny Applebaum, Technion; et al.Hardness of Approximating the Shortest Vector Problem in LatticesSubhash Khot, Georgia Institute of Technology2003On the Impossibility of Dimension Reduction in L1Bo Brinkman & Moses Charikar, Princeton University2002A Dichotomy Theorem for Constraints on a Three-Element SetAndrei A. Bulatov, University of OxfordMinimizing Congestion in General NetworksHarald Räcke, Paderborn UniversityConstant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String ModelBoaz Barak, Weizmann Institute of ScienceFSE (Software Engineering)2016Foraging and Navigations Fundamentally: Developers' Predictions of Value and CostDavid Piorkowski, Oregon State University; et al.Multi-Representational Security AnalysisEunsuk Kang, University of California Berkeley; et al.Factors Influencing Code Review Processes in IndustryTobias Baum, Leibniz Universität Hannover; et al.API Code Recommendation Using Statistical Learning from Fine-grained ChangesAnh Tuan Nguyen, Iowa State University; et al.Proteus: Computing Disjunctive Loop Summary via Path Dependency AnalysisXiaofei Xie, Tianjin University; et al.Why We Refactor? Confessions of GitHub ContributorsDanilo Silva, Federal University of Minas Gerais; et al.Detecting Sensitive Data Disclosure via Bi-directional Text Correlation AnalysisJianjun Huang, Purdue University; et al.2015Optimizing energy consumption of GUIs in Android apps: a multi-objective approachMario Linares-Vásquez, College of William and Mary; et al.How Practitioners Perceive the Relevance of Software Engineering ResearchDavid Lo, Singapore Management University; et al.Effective Test Suites for Mixed Discrete-Continuous Stateflow ControllersReza Matinnejad, University of Luxembourg; et al.Modeling Readability to Improve Unit TestsErmira Daka, University of Sheffield; et al.Measure It? Manage It? Ignore It? Software Practitioners and Technical DebtNeil A. Ernst, Carnegie Mellon University; et al.A User-Guided Approach to Program AnalysisRavi Mangal, Georgia Institute of Technology; et al.MultiSE: Multi-path Symbolic Execution using Value SummariesKoushik Sen, University of California Berkeley; et al.Users Beware: Preference Inconsistencies AheadFarnaz Behrang, Georgia Institute of Technology; et al.2014Selection and Presentation Practices for Code Example SummarizationAnnie Ying & Martin Robillard, McGill UniversityAre Mutants a Valid Substitute for Real Faults in Software Testing?René Just, University of Washington; et al.AI: A Lightweight System for Tolerating Concurrency BugsMingxing Zhang, Tsinghua University; et al.Powering the Static Driver Verifier using CorralAkash Lal & Shaz Qadeer, Microsoft ResearchLearning Natural Coding ConventionsMiltiadis Allamanis, University of Edinburgh; et al.Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case StudyKlaus-Benedikt Schultis, Siemens Corporate Technology; et al.2012Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software LibrariesBradley Cossette & Robert Walker, University of CalgaryScalable Test Data Generation from Multidimensional ModelsEmina Torlak, University of California BerkeleyAssessing the Value of Branches with What-if AnalysisChristian Bird & Thomas Zimmermann, Microsoft Research2011Proactive Detection of Collaboration ConflictsYuriy Brun, University of Washington; et al.How Do Fixes Become Bugs?Zuoning Yin, University of Illinois at Urbana-Champaign; et al.Proving programs robustSwarat Chaudhuri, Rice University; et al.2010Creating and evolving developer documentation: understanding the decisions of open source contribu...Barthélémy Dagenais & Martin P. Robillard, McGill UniversityDeveloper Fluency: Achieving True Mastery in Software ProjectsMinghui Zhou, Peking University
Audris Mockus, Avaya LabsStaged Concurrent Program AnalysisNishant Sinha & Chao Wang, NEC Labs America2009Asserting and checking determinism for multithreaded programsJacob Burnim & Koushik Sen, University of California BerkeleyDarwin: an approach for debugging evolving programsDawei Qi, National University of Singapore; et al.Graph-based Mining of Multiple Object Usage PatternsTung Thanh Nguyen, Iowa State University; et al.2008What makes a good bug report?Nicolas Bettenburg, Saarland University; et al.Efficient online monitoring of web-service SLAsFranco Raimondi, University College London; et al.2007Automatic consistency assessment for query results in dynamic environmentsJamie Payton, University of North Carolina at Charlotte; et al.Globally distributed software development project performance: an empirical analysisNarayan Ramasubbu & Rajesh Krishna Balan, Singapore Management UniversityMining specifications of malicious behaviorMihai Christodorescu, University of Wisconsin; et al.Object and reference immutability using Java genericsYoav Zibin, Massachusetts Institute of Technology; et al.2006Controlling factors in evaluating path-sensitive error detection techniquesMatthew B. Dwyer, University of Nebraska-Lincoln; et al.SYNERGY: a new algorithm for property checkingBhargav S. Gulavani, Indian Institute of Technology; et al.2005Automatic Generation of Suggestions for Program InvestigationMartin P. Robillard, McGill UniversityCUTE: a concolic unit testing engine for CKoushik Sen, University of Illinois at Urbana-Champaign; et al.Context- and path-sensitive memory leak detectionYichen Xie & Alex Aiken, Stanford University2004Reasoning about partial goal satisfaction for requirements and design engineeringEmmanuel Letier & Axel van Lamsweerde, Université catholique de LouvainA classification system and analysis for aspect-oriented programsMartin Rinard, Massachusetts Institute of Technology; et al.2003Eliminating redundancies with a "composition with adaptation" meta-programming techniqueStan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong UniversityA Family of Test Adequacy Criteria for Database-Driven ApplicationsGregory M. Kapfhammer & Mary Lou Soffa, University of PittsburghPredicting problems caused by component upgradesStephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology2002Isolating Cause-Effect Chains from Computer ProgramsAndreas Zeller, Saarland UniversityICCV (Computer Vision)2015Deep Neural Decision ForestsPeter Kontschieder, Microsoft Research; et al.2013From Large Scale Image Categorization to Entry-Level CategoriesVicente Ordonez, University of North Carolina at Chapel Hill; et al.2011Relative AttributesDevi Parikh, Toyota Technological Institute at Chicago
Kristen Grauman, University of Texas at Austin2009Discriminative models for multi-class object layoutChaitanya Desai, University of California Irvine; et al.2007Population Shape Regression From Random Design DataBradley Davis, University of North Carolina at Chapel Hill; et al.2005Globally Optimal Estimates for Geometric Reconstruction ProblemsFredrik Kahl, Lund University
Didier Henrion, LAAS-CNRS2003Detecting Pedestrians using Patterns of Motion and AppearancePaul Viola, Microsoft Research; et al.Image Parsing: Unifying Segmentation, Detection and RecognitionZhuowen Tu, University of California Los Angeles; et al.Image-based Rendering using Image-based PriorsAndrew Fitzgibbon, University of Oxford; et al.2001Probabilistic Tracking with Exemplars in a Metric SpaceKentaro Toyama & Andrew Blake, Microsoft ResearchThe Space of All Stereo ImagesSteven Seitz, University of Washington1999Euclidean Reconstruction and Reprojection up to SubgroupsYi Ma, University of California Berkeley; et al.A Theory of Shape by Space CarvingKiriakos Kutulakos, University of Rochester
Steven Seitz, Carnegie Mellon University1998Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Paramet...Marc Pollefeys, Katholieke Universiteit Leuven; et al.The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image SequencesPhil Torr, Microsoft Research; et al.ICML (Machine Learning)2016Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs SamplingChristopher De Sa, Stanford University; et al.Pixel Recurrent Neural NetworksAaron Van den Oord, Google; et al.Dueling Network Architectures for Deep Reinforcement LearningZiyu Wang, Google; et al.2015A Nearly-Linear Time Framework for Graph-Structured SparsityChinmay Hegde, Massachusetts Institute of Technology; et al.Optimal and Adaptive Algorithms for Online BoostingAlina Beygelzimer, Yahoo! Research; et al.2014Understanding the Limiting Factors of Topic Modeling via Posterior Contraction AnalysisJian Tang, Peking University; et al.2013Vanishing Component AnalysisRoi Livni, The Hebrew University of Jerusalum; et al.Fast Semidifferential-based Submodular Function OptimizationRishabh Iyer, University of Washington; et al.2012Bayesian Posterior Sampling via Stochastic Gradient Fisher ScoringSungjin Ahn, University of California Irvine; et al.2011Computational Rationalization: The Inverse Equilibrium ProblemKevin Waugh, Carnegie Mellon University; et al.2010Hilbert Space Embeddings of Hidden Markov ModelsLe Song, Carnegie Mellon University; et al.2009Structure preserving embeddingBlake Shaw & Tony Jebara, Columbia University2008SVM Optimization: Inverse Dependence on Training Set SizeShai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago2007Information-theoretic metric learningJason V. Davis, University of Texas at Austin; et al.2006Trading convexity for scalabilityRonan Collobert, NEC Labs America; et al.2005A support vector method for multivariate performance measuresThorsten Joachims, Cornell University1999Least-Squares Temporal Difference LearningJustin A. Boyan, NASA Ames Research CenterICSE (Software Engineering)2016Feedback-Directed Instrumentation for Deployed JavaScript ApplicationsMagnus Madsen, University of Waterloo; et al.From Word Embeddings to Document Similarities for Improved Information Retrieval in Software Engin...Xin Ye, Ohio University Athens; et al.On the Techniques We Create, the Tools We Build, and Their Misalignments: A Study of KLEEEric F. Rizzi, Grammatech; et al.Work Practices and Challenges in Pull-Based Development: The Contributor's PerspectiveGeorgios Gousios, Radboud University Nijmegen; et al.Termination-Checking for LLVM Peephole OptimizationsDavid Menendez & Santosh Nagarakatte, Rutgers UniversityGuiding Dynamic Symbolic Execution toward Unverified Program ExecutionsMaria Christakis, ETH Zurich; et al.Efficient Large-Scale Trace Checking Using MapReduceMarcello M. Bersani, Politecnico di Milano; et al.VDTest: An Automated Framework to Support Testing for Virtual DevicesTingting Yu, University of Kentucky; et al.Energy Profiles of Java Collections ClassesSamir Hasan, Auburn University; et al.2015Alloy*: A General-Purpose Higher-Order Relational Constraint SolverAleksandar Milicevic, Massachusetts Institute of Technology; et al.How Much Up-Front? A Grounded theory of Agile ArchitectureMichael Waterman, Specialised Architecture Services Ltd; et al.Views on Internal and External Validity in Empirical Software EngineeringJanet Siegmund, University of Passau; et al.Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational F...Mathieu Lavallée & Pierre N. Robillard, Polytechnique MontréalWhen and Why Your Code Starts to Smell BadMichele Tufano, College of William and Mary; et al.CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive FixesAdrian Nistor, Chapman University; et al.2014Characterizing and Detecting Performance Bugs for Smartphone ApplicationsYepang Liu, Hong Kong University of Science and Technology; et al.Improving Automated Source Code Summarization via an Eye-Tracking Study of ProgrammersPaige Rodeghero, University of Notre Dame; et al.Understanding JavaScript Event-Based InteractionsSaba Alimadadi, University of British Columbia; et al.Coverage Is Not Strongly Correlated with Test Suite EffectivenessLaura Inozemtseva & Reid Holmes, University of WaterlooCowboys, Ankle Sprains, and Keepers of Quality: How Is Video Game Development Different from Softw...Emerson Murphy-Hill, North Carolina State University; et al.Trading Robustness for Maintainability: An Empirical Study of Evolving C# ProgramsNélio Cacho, Federal University of Rio Grande do Norte; et al.Unit Test Virtualization with VMVMJonathan Bell & Gail Kaiser, Columbia UniversityEnhancing Symbolic Execution with VeritestingThanassis Avgerinos, Carnegie Mellon University; et al.A Study and Toolkit for Asynchronous Programming in C#Semih Okur, University of Illinois at Urbana-Champaign; et al.2013Dual Ecological Measures of Focus in Software DevelopmentDaryl Posnett, University of California Davis; et al.Data Clone Detection and Visualization in SpreadsheetsFelienne Hermans, Delft University of Technology; et al.UML in PracticeMarian Petre, Open UniversityAutomatic patch generation learned from human-written patchesDongsun Kim, Hong Kong University of Science and Technology; et al.Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop CloudsWeiyi Shang, Queen's University; et al.Interaction-Based Test-Suite MinimizationDale Blue, IBM; et al.2012Understanding Integer Overflow in C/C++Will Dietz, University of Illinois at Urbana-Champaign; et al.Using Dynamic Analysis to Discover Polynomial and Array InvariantsThanhVu Nguyen, University of New Mexico; et al.Amplifying Tests to Validate Exception Handling CodePingyu Zhang & Sebastian Elbaum, University of Nebraska-LincolnPartial Models: Towards Modeling and Reasoning with UncertaintyMichalis Famelis, University of Toronto; et al.How Do Professional Developers Comprehend Software?Tobias Roehm, Technische Universität München; et al.A Tactic-Centric Approach for Automating Traceability of Quality ConcernsMehdi Mirakhorli, DePaul University; et al.Automated Detection of Client-State Manipulation VulnerabilitiesAnders Møller & Mathias Schwarz, Aarhus University2011Verifying Multi-threaded Software using SMT-based Context-Bounded Model CheckingLucas Cordeiro & Bernd Fischer, University of SouthamptonConfiguring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and ...Narayan Ramasubbu, Singapore Management University; et al.Programs, tests, and oracles: the foundations of testing revisitedMatt Staats, University of Minnesota; et al.On-demand Feature Recommendations Derived from Mining Public Product DescriptionsHoratiu Dumitru, DePaul University; et al.Run-Time Efficient Probabilistic Model CheckingAntonio Filieri, Politecnico di Milano; et al.2010A Machine Learning Approach for Tracing Regulatory Codes to Product Specific RequirementsJane Cleland-Huang, DePaul University; et al.Collaborative Reliability Prediction of Service-Oriented SystemsZibin Zheng & Michael R. Lyu, The Chinese University of Hong KongA Cut-off Approach for Bounded Verification of Parameterized SystemsQiusong Yang & Mingshu Li, Chinese Academy of SciencesTest Generation through Programming in UDITAMilos Gligoric, University of Illinois at Urbana-Champaign; et al.A Degree-of-Knowledge Model to Capture Source Code FamiliarityThomas Fritz, University of British Columbia; et al.2009How We Refactor, and How We Know ItEmerson Murphy-Hill, Portland State University; et al.Effective Static Deadlock DetectionMayur Naik, Intel Research; et al.Invariant-Based Automatic Testing of AJAX User InterfacesAli Mesbah & Arie van Deursen, Delft University of TechnologyDoes Distributed Development Affect Software Quality? An Empirical Case Study of Windows VistaChristian Bird, University of California Davis; et al.Automatically finding patches using genetic programmingWestley Weimer, University of Virginia; et al.2008Precise memory leak detection for java software using container profilingGuoqing Xu & Atanas Rountev, Ohio State UniversityDebugging reinvented: asking and answering why and why not questions about program behaviorAndrew J. Ko & Brad A. Myers, Carnegie Mellon UniversityRecommending adaptive changes for framework evolutionBarthélémy Dagenais & Martin P. Robillard, McGill UniversityPredicting Accurate and Actionable Static Analysis Warnings: An Experimental ApproachJoseph Ruthruff, University of Nebraska-Lincoln; et al.The effect of program and model structure on mc/dc test adequacy coverageAjitha Rajan, University of Minnesota; et al.2007Refactoring for Parameterizing Java ClassesAdam Kiezun, Massachusetts Institute of Technology; et al.Tracking Code Clones in Evolving SoftwareEkwa Duala-Ekoko & Martin P. Robillard, McGill UniversityMatching and Merging of Statecharts SpecificationsShiva Nejati, University of Toronto; et al.Predicting Faults from Cached HistorySunghun Kim, Massachusetts Institute of Technology; et al.2006Model-Based Development of Dynamically Adaptive SoftwareJi Zhang & Betty H.C. Cheng, Michigan State UniversityWho Should Fix This Bug?John Anvik, University of British Columbia; et al.2005Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Pe...Andrew Ko, Carnegie Mellon University; et al.Is Mutation an Appropriate Tool for Testing Experiments?James Andrews, University of Western Ontario; et al.Using Structural Context to Recommend Source Code ExamplesReid Holmes & Gail Murphy, University of British ColumbiaData Structure Repair Using Goal-Directed ReasoningBrian Demsky & Martin Rinard, Massachusetts Institute of Technology2004SNIAFL: Towards a Static Non-Interactive Approach to Feature LocationWei Zhao, Peking University; et al.Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized SystemsRohit Khare & Richard N. Taylor, University of California IrvineAn Empirical Study of Software Reuse vs. Defect-Density and StabilityParastoo Mohagheghi, Ericsson; et al.A Tool for Writing and Debugging Algebraic SpecificationsJohannes Henkel & Amer Diwan, University of ColoradoStatic Checking of Dynamically Generated Queries in Database ApplicationsCarl Gould, University of California Davis; et al.2003Precise Dynamic Slicing AlgorithmsXiangyu Zhang, University of Arizona; et al.Modular Verification of Software Components in CSagar Chaki, Carnegie Mellon University; et al.IJCAI (Artificial Intelligence)2016Hierarchical Finite State Controllers for Generalized PlanningJavier Segovia, Universitat Pompeu Fabra; et al.2015Bayesian Active Learning for Posterior EstimationKirthevasan Kandasamy, Carnegie Mellon University; et al.Recursive Decomposition for Nonconvex OptimizationAbram L. Friesen & Pedro Domingos, University of Washington2013Bayesian Optimization in High Dimensions via Random EmbeddingsZiyu Wang, University of British Columbia; et al.Flexibility and Decoupling in the Simple Temporal ProblemMichel Wilson, Delft University of Technology; et al.2011Unweighted Coalitional Manipulation Under the Borda Rule is NP-HardNadja Betzler, Technische Universität Berlin; et al.Nested Rollout Policy Adaptation for Monte Carlo Tree SearchChristopher D. Rosin, Parity ComputingOn the Decidability of Connectedness Constraints in 2D and 3D Euclidean SpacesRoman Kontchakov, Birkbeck College London; et al.2009Consequence-Driven Reasoning for Horn SHIQ OntologiesYevgeny Kazakov, University of OxfordLearning Conditional Preference Networks with QueriesFrederic Koriche, Université Montpellier II
Bruno Zanuttini, Université de Caen Basse-Normandie2007Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian NetworksMaleeha Qazi, Siemens Medical Solutions; et al.Building Structure into Local Search for SATDuc Nghia Pham, Griffith University; et al.Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Pro...Luc Mercier & Pascal Van Hentenryck, Brown University2005Learning Coordination ClassifiersYuhong Guo, University of Alberta; et al.Solving CheckersJonathan Schaeffer, University of Alberta; et al.A Probabilistic Model of Redundancy in Information ExtractionDoug Downey, University of Washington; et al.2003Approximating Game-Theoretic Optimal Strategies for Full-scale PokerDarse Billings, University of Alberta; et al.Thin Junction Tree Filters for Simultaneous Localization and MappingMark A. Paskin, University of California Berkeley2001Complexity Results for Structure-Based CausalityThomas Eiter & Thomas Lukasiewicz, Vienna University of Technology1999Learning in Natural LanguageDan Roth, University of Illinois at Urbana-ChampaignA Distributed Case-Based Reasoning Application for Engineering Sales SupportIan Watson, University of Salford
Dan Gardingen, Western Air1997Object Identification in a Bayesian ContextTimothy Huang & Stuart Russell, University of California BerkeleyTranslingual Information Retrieval: A Comparative EvaluationJaime G. Carbonell, Carnegie Mellon University; et al.Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolo...Fangzhen Lin, The Hongkong University of Science and TechnologyINFOCOM (Networking)2016Heavy-Ball: A New Approach to Tame Delay and Convergence in Wireless Network OptimizationJia Liu, Ohio State University; et al.2015The Power of Slightly More than One Sample in Randomized Load BalancingLei Ying, Arizona State University; et al.2014Joint Static and Dynamic Traffic Scheduling in Data Center NetworksZizhong Cao, Polytechnic Institute of New York University; et al.Performance Evaluation and Asymptotics for Content Delivery NetworksVirag Shah & Gustavo de Veciana, University of Texas at Austin2013On the Steady-State of Cache NetworksElisha J. Rosensweig, University of Massachusetts Amherst; et al.2012Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying frameworkCarlee Joe-Wong, Princeton University; et al.2011Dynamic right-sizing for power-proportional data centersMinghong Lin, California Institute of Technology; et al.2010On the Feasibility and Efficacy of Protection Routing in IP NetworksKin-Wah Kwong, University of Pennsylvania; et al.2009Queuing Network Models for Multi-Channel P2P Live Streaming SystemsDi Wu, Polytechnic Institute of New York University; et al.2008On the Feasibility of the Link Abstraction in (Rural) Mesh NetworksDattatraya Gokhal, Indian Navy; et al.Theoretical Results on Base Station Movement Problem for Sensor NetworksYi Shi & Y. Thomas Hou, Virginia TechUnderstanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless...Changhee Joo, Ohio State University; et al.2007Disruption free topology reconfiguration in OSPF networksPierre Francois, Université catholique de Louvain; et al.2006Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global PerspectiveGaurav Sharma, Purdue University; et al.2005Perfect Simulation and Stationarity of a Class of Mobility ModelsJean-Yves Le Boude, École Polytechnique Fédérale de Lausanne
Milan Vojnović, Microsoft Research2004Throughput-Delay Trade-Off in Wireless NetworksAbbas El Gamal, Stanford University; et al.2003User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data NetworksSem Borst, Bell Labs2002Priority Service and Max-Min FairnessPeter Marbach, University of Toronto2001Mobility increases the capacity of ad-hoc wireless networksMatthias Grossglauser, AT&T Laboratories
David Tse, University of California Berkeley2000The Chaotic Nature of TCP Congestion ControlAndrás Veres, Ericsson
Miklós Boda, Ericsson Research1999Bandwidth Sharing: Objectives and AlgorithmsLaurent Massoulié, Microsoft Research
James Robert, France Telecom1998Effective Bandwidths in Wireless Networks with Multiuser ReceiversDavid Tse, University of California Berkeley
Stephen Hanly, University of Melbourne1996An algorithm for multicast tree generation in networks with asymmetric linksRam Ramanathan, BBN TechnologiesKDD (Data Mining)2016FRAUDAR: Bounding Graph Fraud in the Face of CamouflageBryan Hooi, Carnegie Mellon University; et al.2015Efficient Algorithms for Public-Private Social NetworksFlavio Chierichetti, Sapienza University of Rome; et al.2014Reducing the Sampling Complexity of Topic ModelsAaron Li, Carnegie Mellon University; et al.2013Simple and Deterministic Matrix SketchingEdo Liberty, Yahoo! Research2012Searching and Mining Trillions of Time Series Subsequences under Dynamic Time WarpingThanawin Rakthanmanon, University of California Riverside; et al.2011Leakage in Data Mining: Formulation, Detection, and AvoidanceShachar Kaufman, Tel-Aviv University; et al.2010Large linear classification when data cannot fit in memoryHsiang-Fu Yu, National Taiwan University; et al.Connecting the dots between news articlesDafna Shahaf & Carlos Guestrin, Carnegie Mellon University2009Collaborative Filtering with Temporal DynamicsYehuda Koren, Yahoo! Research2008Fastanova: an efficient algorithm for genome-wide association studyXiang Zhang, University of North Carolina at Chapel Hill; et al.2007Predictive discrete latent factor models for large scale dyadic dataDeepak Agarwal & Srujana Merugu, Yahoo! Research2006Training linear SVMs in linear timeThorsten Joachims, Cornell University2005Graphs over time: densification laws, shrinking diameters and possible explanationsJure Leskovec, Carnegie Mellon University; et al.2004A probabilistic framework for semi-supervised clusteringSugato Basu, University of Texas at Austin; et al.2003Maximizing the spread of influence through a social networkDavid Kempe, Cornell University; et al.2002Pattern discovery in sequences under a Markov assumptionDarya Chudova & Padhraic Smyth, University of California Irvine2001Robust space transformations for distance-based operationsEdwin M. Knorr, University of British Columbia; et al.2000Hancock: a language for extracting signatures from data streamsCorinna Cortes, AT&T Laboratories; et al.1999MetaCost: a general method for making classifiers cost-sensitivePedro Domingos, Universidade Técnica de Lisboa1998Occam's Two Razors: The Sharp and the BluntPedro Domingos, Universidade Técnica de Lisboa1997Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Di...Foster Provost & Tom Fawcett, NYNEX Science and TechnologyMOBICOM (Mobile)2015CAreDroid: Adaptation Framework for Android ContextAware ApplicationsSalma Elmalaki, University of California Los Angeles; et al.2014Tagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS DevicesLei Yang, Tsinghua University; et al.2013Whole-Home Gesture Recognition Using Wireless SignalsQifan Pu, University of Washington; et al.2012Distinguishing Users with Capacitative Touch CommunicationTam Vu, Rutgers University; et al.2011Detecting Driver Phone Use Leveraging Car SpeakersJie Yang, Stevens Institute of Technology; et al.E-MiLi: Energy-Minimizing Idle Listening in Wireless NetworksXinyu Zhang & Kang G. Shin, University of Michigan2010The κ factor: inferring protocol performance using inter-link reception correlationKannan Srinivasan, Stanford University; et al.2009CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data PathVivek Shrivastava, University of Wisconsin; et al.2008Assessment of Urban-Scale Wireless Networks with a Small Number of MeasurementsJoshua Robinson, Rice University; et al.NSDI (Networking)2016Passive Wi-Fi: Bringing Low Power to Wi-Fi TransmissionsBryce Kellogg, University of Washington; et al.2015Queues Don't Matter When You Can JUMP Them!Matthew P. Grosvenor, University of Cambridge; et al.Designing Distributed Systems Using Approximate Synchrony in Data Center NetworksDan R. K. Ports, University of Washington; et al.The Design and Implementation of Open vSwitchBen Pfaff, VMware; et al.2014Software Dataplane VerificationMihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne2013Embassies: Radically Refactoring the WebJon Howell, Microsoft Research; et al.A Fault-Tolerant Engineered NetworkVincent Liu, University of Washington; et al.2012Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingMatei Zaharia, University of California Berkeley; et al.2011Design, Implementation and Evaluation of Congestion Control for Multipath TCPDamon Wischik, University College London; et al.ServerSwitch: A Programmable and High Performance Platform for Data Center NetworksGuohan Lu, Microsoft Research; et al.2010Reverse tracerouteEthan Katz-Bassett, University of Washington; et al.2009Sora: High Performance Software Radio Using General Purpose Multi-core ProcessorsKun Tan, Microsoft Research; et al.TrInc: Small Trusted Hardware for Large Distributed SystemsDave Levin, University of Maryland; et al.2008Remus: High Availability via Asynchronous Virtual Machine ReplicationBrendan Cully, University of British Columbia; et al.Consensus Routing: The Internet as a Distributed SystemJohn P. John, University of Washington; et al.2007Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems CodeCharles Killian, University of California San Diego; et al.2006Experience with an Object Reputation System for Peer-to-Peer FilesharingKevin Walsh & Emin Gün Sirer, Cornell UniversityReplay Debugging for Distributed ApplicationsDennis Geels, University of California Berkeley; et al.2005Detecting BGP Configuration Faults with Static AnalysisNick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology2004Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Netwo...Philip Levis, University of California Berkeley; et al.OSDI (Operating Systems)2016Ryoan: A Distributed Sandbox for Untrusted Computation on Secret DataTyler Hunt, University of Texas at Austin; et al.Push-Button Verification of File Systems via Crash RefinementHelgi Sigurbjarnarson, University of Washington; et al.Early Detection of Configuration Errors to Reduce Failure DamageTianyin Xu, University of California San Diego; et al.2014Shielding Applications from an Untrusted Cloud with HavenAndrew Baumann, Microsoft Research; et al.IX: A Protected Dataplane Operating System for High Throughput and Low LatencyAdam Belay, Stanford University; et al.Arrakis: The Operating System is the Control PlaneSimon Peter, University of Washington; et al.2012Spanner: Google's Globally-Distributed DatabaseJames C. Corbett, Google; et al.2010Efficient System-Enforced Deterministic ParallelismAmittai Aviram, Yale University; et al.The Turtles Project: Design and Implementation of Nested VirtualizationMuli Ben-Yehuda, IBM Research; et al.2008KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems ProgramsCristian Cadar, Stanford University; et al.Difference Engine: Harnessing Memory Redundancy in Virtual MachinesDiwaker Gupta, University of California San Diego; et al.DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Lan...Yuan Yu, Microsoft Research; et al.2006Bigtable: A Distributed Storage System for Structured DataFay Chang, Google; et al.Rethink the SyncEdmund B. Nightingale, University of Michigan; et al.2004Using Model Checking to Find Serious File System ErrorsJunfeng Yang, Stanford University; et al.Recovering Device DriversMichael M. Swift, University of Washington; et al.2002Memory Resource Management in VMware ESX ServerCarl A. Waldspurger, VMware2000Checking System Rules Using System-Specific, Programmer-Written Compiler ExtensionsDawson Engler, Stanford University; et al.1999IO-Lite: A Unified I/O Buffering and Caching SystemVivek S. Pai, Rice University; et al.1996Automatic Compiler-Inserted I/O Prefetching for Out-of-Core ApplicationsTodd C. Mowry, University of Toronto; et al.Safe Kernel Extensions Without Run-Time CheckingGeorge C. Necula & Peter Lee, Carnegie Mellon UniversityPLDI (Programming Languages)2016Assessing the limits of program-specific garbage collection performanceNicholas Jacek, University of Massachusetts Amherst; et al.Into the Depths of C: Elaborating the De Facto StandardsKayvan Memarian, University of Cambridge; et al.Transactional Data Structure LibrariesAlexander Spiegelman, Technion; et al.Types from data: Making structured data first-class citizens in F#Tomas Petricek, University of Cambridge; et al.2015Provably Correct Peephole Optimizations with AliveNuno P. Lopes, Microsoft Research; et al.Diagnosing Type Errors with ClassDanfeng Zhang, Cornell University; et al.Automatically Improving Accuracy for Floating Point ExpressionsPavel Panchekha, University of Washington; et al.2014Improving JavaScript Performance by Deconstructing the Type SystemWonsun Ahn, University of Illinois at Urbana-Champaign; et al.Compiler validation via equivalence modulo inputsVu Le, University of California Davis; et al.On Abstraction Refinement for Program Analyses in DatalogXin Zhang, Georgia Institute of Technology; et al.2013Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many ...Sriram Sankaranarayanan, University of Colorado; et al.A General Constraint-centric Scheduling Framework for Spatial ArchitecturesTony Nowatzki, University of Wisconsin; et al.Reconciling Exhaustive Pattern Matching with ObjectsChinawat Isradisaikul & Andrew C. Myers, Cornell UniversityCLAP: Recording Local Executions to Reproduce Concurrency FailuresJeff Huang, Hong Kong University of Science and Technology; et al.2012Concurrent Data Representation SynthesisPeter Hawkins, Stanford University; et al.2011Data Representation SynthesisPeter Hawkins, Stanford University; et al.2010Safe to the Last Instruction: Automated Verification of a Type-Safe Operating SystemJean Yang, Massachusetts Institute of Technology
Chris Hawblitzel, Microsoft Research2009Binary Analysis for Measurement and Attribution of Program PerformanceNathan Tallent, Rice University; et al.2007Fault-tolerant Typed Assembly LanguageFrances Perry, Princeton University; et al.The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of CodeBen Hardekopf & Calvin Lin, University of Texas at Austin2005Automatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the HeapChris Lattner & Vikram Adve, University of Illinois at Urbana-ChampaignProgramming by Sketching for Bit-Streaming ProgramsArmando Solar-Lezama, University of California Berkeley; et al.2004Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision DiagramsJohn Whaley & Monica S. Lam, Stanford University2003Automatically Proving the Correctness of Compiler OptimizationsSorin Lerner, University of Washington; et al.2000Dynamo: a transparent dynamic optimization systemVasanth Bala, Hewlett-Packard Labs; et al.1999Whole program pathsJames R. Larus, Microsoft ResearchPODS (Databases)2016FAQ: Questions Asked FrequentlyMahmoud Abo Khamis, University at Buffalo; et al.2015Parallel-Correctness and Transferability for Conjunctive QueriesTom J. Ameloot, Hasselt University; et al.2014Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Co...Tom J. Ameloot, Hasselt University; et al.2013Verification of database-driven systems via amalgamationMikołaj Bojańczyk, University of Warsaw; et al.2012Worst-case Optimal Join AlgorithmsHung Q. Ngo, University at Buffalo; et al.2011Data Exchange Beyond Complete DataMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.2010An Optimal Algorithm for the Distinct Elements ProblemDaniel M. Kane, Harvard University; et al.2009Size and Treewidth Bounds for Conjunctive QueriesGeorg Gottlob, University of Oxford; et al.2008Estimating PageRank on Graph StreamsAtish Das Sarma, Georgia Institute of Technology; et al.2007Generalized Hypertree Decompositions: NP-Hardness and Tractable VariantsGeorg Gottlob, University of Oxford; et al.2006Two-variable logic on data trees and XML reasoningMikolaj Bojanczyk, Warsaw University; et al.2005On the complexity of division and set joins in the relational algebraDirk Leinders & Jan Van den Bussche, Limburgs Universitair CentrumXML data exchange: consistency and query answeringMarcelo Arenas & Leonid Libkin, University of Toronto2004Conditional XPath, the first order complete XPath dialectMaarten Marx, University of Amsterdam2003An Information-Theoretic Approach to Normal Forms for Relational and XML DataMarcelo Arenas & Leonid Libkin, University of Toronto2002Monadic Datalog and the Expressive Power of Languages for Web Information ExtractionGeorg Gottlob & Christoph Koch, Technische Universität Wien2001Optimal aggregation algorithms for middlewareRonald Fagin, IBM Research; et al.2000Auditing Boolean attributesJon Kleinberg, Cornell University; et al.1999Exact and approximate aggregation in constraint query languagesMichael Benefikt & Leonid Libkin, Bell Labs1998A lower bound theorem for indexing schemes and its application to multidimensional range queriesVasilis Samoladas & Daniel P. Miranker, University of Texas at AustinExpressiveness of structured document query languages based on attribute grammarsFrank Neven & Jan Van den Bussche, Limburgs Universitair Centrum1997On the Complexity of Database QueriesChristos H. Papadimitriou, University of California Berkeley
Mihalis Yannakakis, Bell LabsS&P (Security and Privacy)2016A2: Analog Malicious HardwareKaiyuan Yang, University of Michigan; et al.2015Riposte: An Anonymous Messaging System Handling Millions of UsersHenry Corrigan-Gibbs, Stanford University; et al.A Messy State of the Union: Taming the Composite State Machines of TLSBenjamin Beurdouche, INRIA; et al.2014Secure Multiparty Computations on BitCoinMarcin Andrychowicz, University of Warsaw; et al.Bootstrapping Privacy Compliance in Big Data SystemsShayak Sen, Carnegie Mellon University; et al.2013Pinocchio: Nearly Practical Verifiable ComputationBryan Parno, Microsoft Research; et al.2012Don't Trust Satellite Phones: A Security Analysis of Two Satphone StandardsBenedikt Driessen, Ruhr-Universität Bochum; et al.2011Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iksAndrew M. White, University of North Carolina at Chapel Hill; et al.2010SCiFI - A System for Secure Face IdentificationMargarita Osadchy, University of Haifa; et al.2009Native Client: A Sandbox for Portable, Untrusted x86 Native CodeBennet Yee, Google; et al.2008Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power DefensesDaniel Halperin, University of Washington; et al.SIGCOMM (Networking)2016Eliminating Channel Feedback in Next-Generation Cellular NetworksDeepak Vasisht, Massachusetts Institute of Technology; et al.Inter-Technology Backscatter: Towards Internet Connectivity for Implanted DevicesVikram Iyer, University of Washington; et al.Don't Mind the Gap: Bridging Network-wide Objectives and Device-level ConfigurationsRyan Beckett, Princeton University; et al.2015Central Control Over Distributed RoutingStefano Vissicchio, Université catholique de Louvain; et al.2014Balancing Accountability and Privacy in the NetworkDavid Naylor, Carnegie Mellon University; et al.CONGA: Distributed Congestion-Aware Load Balancing for DatacentersMohammad Alizadeh, Cisco Systems; et al.2013Ambient Backscatter: Wireless Communication Out of Thin AirVincent Liu, University of Washington; et al.2012Multi-Resource Fair Queueing for Packet ProcessingAli Ghodsi, University of California Berkeley; et al.2011They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical DevicesShyamnath Gollakota, Massachusetts Institute of Technology; et al.2010Efficient Error Estimating Coding: Feasibility and ApplicationsBinbin Chen, National University of Singapore; et al.2009White Space Networking with Wi-Fi like ConnectivityParamvir Bahl, Microsoft Research; et al.2008ZigZag Decoding: Combating Hidden Terminals in Wireless NetworksShyamnath Gollakota & Dina Katabi, Massachusetts Institute of TechnologySIGIR (Information Retrieval)2016Understanding Information Need: An fMRI StudyYashar Moshfeghi, University of Glasgow; et al.2015QuickScorer: A Fast Algorithm to Rank Documents with Additive Ensembles of Regression TreesClaudio Lucchese, Istituto di Scienza e Tecnologie dell'Informazione; et al.2014Partitioned Elias-Fano IndexesGiuseppe Ottaviano, Istituto di Scienza e Tecnologie dell'Informazione
Rossano Venturini, Università di Pisa2013Beliefs and Biases in Web SearchRyen W. White, Microsoft Research2012Time-Based Calibration of Effectiveness MeasuresMark Smucker & Charles Clarke, University of Waterloo2011Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction DataMikhail Ageev, Moscow State University; et al.2010Assessing the Scenic Route: Measuring the Value of Search Trails in Web LogsRyen W. White, Microsoft Research
Jeff Huang, University of Washington2009Sources of evidence for vertical selectionJaime Arguello, Carnegie Mellon University; et al.2008Algorithmic Mediation for Collaborative Exploratory SearchJeremy Pickens, FX Palo Alto Lab; et al.2007Studying the Use of Popular Destinations to Enhance Web Search InteractionRyen W. White, Microsoft Research; et al.2006Minimal Test Collections for Retrieval EvaluationBen Carterette, University of Massachusetts Amherst; et al.2005Learning to estimate query difficulty: including applications to missing content detection and dis...Elad Yom-Tov, IBM Research; et al.2004A Formal Study of Information Retrieval HeuristicsHui Fang, University of Illinois at Urbana-Champaign; et al.2003Re-examining the potential effectiveness of interactive query expansionIan Ruthven, University of Strathclyde2002Novelty and redundancy detection in adaptive filteringYi Zhang, Carnegie Mellon University; et al.2001Temporal summaries of new topicsJames Allan, University of Massachusetts Amherst; et al.2000IR evaluation methods for retrieving highly relevant documentsKalervo Järvelin & Jaana Kekäläinen, University of Tampere1999Cross-language information retrieval based on parallel texts and automatic mining of parallel text...Jian-Yun Nie, Université de Montréal; et al.1998A theory of term weighting based on exploratory data analysisWarren R. Greiff, University of Massachusetts Amherst1997Feature selection, perceptron learning, and a usability case study for text categorizationHwee Tou Ng, DSO National Laboratories; et al.1996Retrieving spoken documents by combining multiple index sourcesGareth Jones, University of Cambridge; et al.SIGMETRICS (Performance)2016On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with FitnessBo Jiang, University of Massachusetts Amherst; et al.2015Spy vs. Spy: Rumor Source ObfuscationGiulia Fanti, University of California Berkeley; et al.2014Concave switching in single and multihop networksNeil Walton, University of Amsterdam2013Queueing System Topologies with Limited FlexibilityJohn Tsitsiklis & Kuang Xu, Massachusetts Institute of Technology2012Temperature management in data centers: why some (might) like it hotNosayba El-Sayed, University of Toronto; et al.2011Topology Discovery of Sparse Random Graphs With Few ParticipantsAnimashree Anandkumar, University of California Irvine; et al.2010Load balancing via random local search in closed and open systemsAyalvadi Ganesh, University of Bristol; et al.2009The Age of Gossip: Spatial Mean Field RegimeAugustin Chaintreau, Technicolor; et al.2008Counter Braids: A Novel Counter Architecture for Per-Flow MeasurementYi Lu, Stanford University; et al.2007Modeling the Relative Fitness of StorageMichael P. Mesnier, Intel; et al.2006Maximizing throughput in wireless networks via gossipingEytan Modiano, Massachusetts Institute of Technology; et al.2005Coupon replication systemsLaurent Massoulié & Milan Vojnović, Microsoft Research2004On performance bounds for the integration of elastic and adaptive streaming flowsThomas Bonald & Alexandre Proutiere, France Telecom1996Supporting stored video: reducing rate variability and end-to-end resource requirements through op...James D. Salehi, University of Massachusetts Amherst; et al.Exploiting process lifetime distributions for dynamic load balancingMor Harchol-Balter & Allen B. Downey, University of California BerkeleySIGMOD (Databases)2016Wander Join: Online Aggregation via Random WalksFeifei Li, University of Utah; et al.2015DBSCAN Revisited: Mis-Claim, Un-Fixability, and ApproximationJunhao Gan & Yufei Tao, Chinese University of Hong Kong2014Materialization Optimizations for Feature Selection WorkloadsCe Zhang, Stanford University; et al.2013Massive Graph TriangulationXiaocheng Hu, The Chinese University of Hong Kong; et al.2012High-Performance Complex Event Processing over XML StreamsBarzan Mozafari, Massachusetts Institute of Technology; et al.2011Entangled Queries: Enabling Declarative Data-Driven CoordinationNitin Gupta, Cornell University; et al.2010FAST: fast architecture sensitive tree search on modern CPUs and GPUsChangkyu Kim, Intel; et al.2009Generating example data for dataflow programsChristopher Olston, Yahoo! Research; et al.2008Serializable isolation for snapshot databasesMichael J. Cahill, University of Sydney; et al.Scalable Network Distance Browsing in Spatial DatabasesHanan Samet, University of Maryland; et al.2007Compiling mappings to bridge applications and databasesSergey Melnik, Microsoft Research; et al.Scalable Approximate Query Processing with the DBO EngineChristopher Jermaine, University of Florida; et al.2006To search or to crawl?: towards a query optimizer for text-centric tasksPanagiotis G. Ipeirotis, New York University; et al.2004Indexing spatio-temporal trajectories with Chebyshev polynomialsYuhan Cai & Raymond T. Ng, University of British Columbia2003Spreadsheets in RDBMS for OLAPAndrew Witkowski, Oracle; et al.2001Locally adaptive dimensionality reduction for indexing large time series databasesEamonn Keogh, University of California Irvine; et al.2000XMill: an efficient compressor for XML dataHartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories1999DynaMat: a dynamic view management system for data warehousesYannis Kotidis & Nick Roussopoulos, University of Maryland1998Efficient transparent application recovery in client-server information systemsDavid Lomet & Gerhard Weikum, Microsoft ResearchIntegrating association rule mining with relational database systems: alternatives and implicationsSunita Sarawagi, IBM Research; et al.1997Fast parallel similarity search in multimedia databasesStefan Berchtold, University of Munich; et al.1996Implementing data cubes efficientlyVenky Harinarayan, Stanford University; et al.SODA (Theory)2016An Improved Distributed Algorithm for Maximal Independent SetMohsen Ghaffari, Massachusetts Institute of TechnologyNear-Optimal Light SpannersShiri Chechik, Tel-Aviv University
Christian Wulff-Nilsen, University of Copenhagen2015The Parameterized Complexity of k-BicliqueBingkai Lin, University of Tokyo2014Polynomiality for Bin Packing with a Constant Number of Item TypesMichel X. Goemans & Thomas Rothvoß, Massachusetts Institute of TechnologyAn Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommod...Jonathan A. Kelner, Massachusetts Institute of Technology; et al.2013A Simple Algorithm for the Graph Minor Decomposition - Logic meets Structural Graph TheoryMartin Grohe, RWTH Aachen University; et al.Dynamic graph connectivity in polylogarithmic worst case timeBruce M. Kapron, University of Victoria; et al.2012Computing all maps into a sphereMartin Čadek, Masaryk University; et al.2011An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss TransformNir Ailon, Technion
Edo Liberty, Yahoo! Research2010An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman ProblemArash Asadpour, Stanford University; et al.2009Natural AlgorithmsBernard Chazelle, Princeton UniversitySOSP (Operating Systems)2015Pivot Tracing: Dynamic Causal Monitoring for Distributed SystemsJonathan Mace, Brown University; et al.Using Crash Hoare Logic for Certifying the FSCQ File SystemHaogang Chen, Massachusetts Institute of Technology; et al.Coz: Finding Code that Counts with Causal ProfilingCharlie Curtsinger, Grinnell College
Emery Berger, University of Massachusetts Amherst2013Towards optimization-safe systems: analyzing the impact of undefined behaviorXi Wang, Massachusetts Institute of Technology; et al.Naiad: A Timely Dataflow SystemDerek G. Murray, Microsoft Research; et al.The Scalable Commutativity Rule: Designing Scalable Software for Multicore ProcessorsAustin T. Clements, Massachusetts Institute of Technology; et al.2011A File is Not a File: Understanding the I/O Behavior of Apple Desktop ApplicationsTyler Harter, University of Wisconsin; et al.Cells: A Virtual Mobile Smartphone ArchitectureJeremy Andrus, Columbia University; et al.2009FAWN: A Fast Array of Wimpy NodesDavid G. Andersen, Carnegie Mellon University; et al.seL4: Formal Verification of an OS KernelGerwin Klein, NICTA; et al.RouteBricks: Exploiting Parallelism to Scale Software RoutersMihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al.2007Zyzzyva: speculative byzantine fault toleranceRamakrishna Kotla, University of Texas at Austin; et al.Sinfonia: a new paradigm for building scalable distributed systemsMarcos K. Aguilera, Hewlett-Packard Labs; et al.Secure Web Applications via Automatic PartitioningStephen Chong, Cornell University; et al.2005Speculative Execution in a Distributed File SystemEdmund B. Nightingale, University of Michigan; et al.BAR Tolerance for Cooperative ServicesAmitanand S. Aiyer, University of Texas at Austin; et al.Rx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, University of Illinois at Urbana-Champaign; et al.Vigilante: End-to-End Containment of Internet WormsManuel Costa, University of Cambridge; et al.2003Backtracking intrusionsSamuel T. King & Peter M. Chen, University of MichiganPreserving peer replicas by rate-limited sampled votingPetros Maniatis, Stanford University; et al.Improving the Reliability of Commodity Operating SystemsMichael M. Swift, University of Washington; et al.2001BASE: using abstraction to improve fault toleranceRodrigo Rodrigues, Massachusetts Institute of Technology; et al.Untrusted hosts and confidentiality: secure program partitioningSteve Zdancewic, Cornell University; et al.1999Cellular Disco: resource management using virtual clusters on shared-memory multiprocessorsKinshuk Govil, Stanford University; et al.Soft timers: efficient microsecond software timer support for network processingMohit Aron & Peter Druschel, Rice UniversityThe Click modular routerRobert Morris, Massachusetts Institute of Technology; et al.Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail se...Yasushi Saito, University of Washington; et al.1997Continuous profiling: where have all the cycles gone?Jennifer M. Anderson, Digital Equipment Corporation; et al.Disco: running commodity operating systems on scalable multiprocessorsEdouard Bugnion, Stanford University; et al.Eraser: a dynamic data race detector for multithreaded programsStefan Savage, University of Washington; et al.STOC (Theory)2016Explicit Two-Source Extractors and Resilient FunctionsEshan Chattopadhyay & David Zuckerman, University of Texas at AustinGraph Isomorphism in Quasipolynomial TimeLászló Babaí, University of ChicagoReed-Muller Codes Achieve Capacity on Erasure ChannelsShrinivas Kudekar, Qualcomm Research; et al.2015Exponential Separation of Information and Communication for Boolean FunctionsAnat Ganor, Weizmann Institute of Science; et al.2-Server PIR with sub-polynomial communicationZeev Dvir & Sivakanth Gopi, Princeton UniversityLower Bounds on the Size of Semidefinite Programming RelaxationsJames R. Lee, University of Washington; et al.2014The matching polytope has exponential extension complexityThomas Rothvoß, University of Washington2013Approximation Resistance from Pairwise Independent SubgroupsSiu On Chan, University of California BerkeleyLow Rank Approximation and Regression in Input Sparsity TimeKenneth L. Clarkson & David P. Woodruff, IBM Research2012Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower BoundsSamuel Fiorini, Université libre de Bruxelles; et al.The Cell Probe Complexity of Dynamic Range CountingKasper Larsen, Aarhus University2011Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphsPaul Christiano, Massachusetts Institute of Technology; et al.Subexponential lower bounds for randomized pivoting rules for the simplex algorithmOliver Friedmann, University of Munich; et al.2010An improved LP-based approximation for steiner treeJaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al.QIP = PSPACERahul Jain, National University of Singapore; et al.2009A constructive proof of the Lovász local lemmaRobin A. Moser, ETH ZurichPublic-Key Cryptosystems from the Worst-Case Shortest Vector ProblemChris Peikert, SRI International2008Optimal algorithms and inapproximability results for every CSP?Prasad Raghavendra, University of WashingtonOptimal hierarchical decompositions for congestion minimization in networksHarald Räcke, University of Warwick2007Faster integer multiplicationMartin Fürer, Pennsylvania State UniversityTowards 3-query locally decodable codes of subexponential lengthSergey Yekhanin, Massachusetts Institute of Technology2006The PCP theorem by gap amplificationIrit Dinur, Hebrew University2005Undirected ST-connectivity in log-spaceOmer Reingold, Weizmann Institute of Science2004Multi-linear formulas for permanent and determinant are of super-polynomial sizeRan Raz, Weizmann Institute of ScienceExpander flows, geometric embeddings and graph partitioningSanjeev Arora, Princeton University; et al.2003Derandomizing polynomial identity tests means proving circuit lower boundsValentine Kabanets & Russell Impagliazzo, University of California San DiegoNew lattice-based cryptographic constructionsOded Regev, Tel-Aviv UniversityUIST (User Interface)2016Rovables: Miniature On-Body Robots as Mobile WearablesArtem Dementyev, Massachusetts Institute of Technology; et al.proCover: Sensory Augmentation of Prosthetic Limbs Using Smart Textile CoversJoanne Leong, University of Applied Sciences Upper Austria; et al.ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch AccelerometersGierad Laput, Carnegie Mellon University; et al.Zooids: Building Blocks for Swarm User InterfacesMathieu Le Goc, Inria; et al.2015Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye MovementsAugusto Esteves, Lancaster University; et al.Webstrates: Shareable Dynamic MediaClemens Klokmose, Aarhus University; et al.Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electr...Simon Olberding, Max Planck Institut; et al.2014Sensing Techniques for Tablet+Stylus InteractionKen Hinckley, Microsoft Research; et al.PrintScreen: Fabricating Highly Customizable Thin-film Touch-DisplaysSimon Olberding, Max Planck Institut; et al.Expert Crowdsourcing with Flash TeamsDaniela Retelny, Stanford University; et al.2013PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing InterfacesLining Yao, Massachusetts Institute of Technology; et al.Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic SensingMakoto Ono, University of Tsukuba; et al.Fiberio: A Touchscreen that Senses FingerprintsChristian Holz & Patrick Baudisch, Hasso Plattner Institute2012CrowdScape: interactively visualizing user behavior and outputJeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon UniversityCliplets: juxtaposing still and dynamic imageryNeel Joshi, Microsoft Research; et al.Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Chang...Sean Follmer, Massachusetts Institute of Technology; et al.2011SideBySide: Ad-hoc Multi-user Interaction with Handheld ProjectorsKarl D.D. Willis, Carnegie Mellon University; et al.2010VizWiz: nearly real-time answers to visual questionsJeffrey P. Bigham, University of Rochester; et al.2009Mouse 2.0: Multi-touch meets the MouseNicolas Villar, Microsoft Research; et al.2008Bringing Physics to the SurfaceAndrew D. Wilson, Microsoft Research; et al.2007ThinSight: Versatile Multi-touch Sensing for Thin Form-factor DisplaysSteve Hodges, Microsoft Research; et al.2006Reflective Physical Prototyping through Integrated Design, Test, and AnalysisBjörn Hartmann, Stanford University; et al.2005Automation and Customization of Rendered Web PagesMichael Bolin, Massachusetts Institute of Technology; et al.2004Multi-Finger Gestural Interaction with 3D Volumetric DisplaysTovi Grossman, University of Toronto; et al.CrossY: A Crossing-Based Drawing ApplicationGeorg Apitz & François Guimbretière, University of Maryland2003Perceptually-Supported Image Editing of Text and GraphicsEric Saund, Palo Alto Research Center; et al.2002Clothing ManipulationTakeo Igarashi, University of Tokyo
John F. Hughes, Brown University2001Phidgets: Easy Development of Physical Interfaces through Physical WidgetsSaul Greenberg & Chester Fitchett, University of Calgary2000Sensing Techniques for Mobile InteractionKen Hinckley, Microsoft Research; et al.1996Indigo: A Local Propagation Algorithm for Inequality ConstraintsAlan Borning, University of Washington; et al.VLDB (Databases)2016Compressed Linear Algebra for Large-Scale Machine LearningAhmed Elgohary, University of Maryland; et al.2015Constructing an interactive natural language interface for relational databasesFei Li & H. V. Jagadish, University of Michigan2014M4: A Visualization-Oriented Time Series Data AggregationUwe Jugel, SAP; et al.Building Efficient Query Engines in a High-Level LanguageYannis Klonatos, École Polytechnique Fédérale de Lausanne; et al.On k-Path Covers and their ApplicationsStefan Funke, University of Stuttgart; et al.epiC: an Extensible and Scalable System for Processing Big DataDawei Jiang, National University of Singapore; et al.The Uncracked Pieces in Database CrackingFelix Martin Schuhknecht, Saarland University; et al.2013DisC Diversity: Result Diversification based on Dissimilarity and CoverageMarina Drosou & Evaggelia Pitoura, University of Ioannina2012Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story IdentificationAlbert Angel, University of Toronto; et al.2011RemusDB: Transparent High-Availability for Database SystemsUmar Farooq Minhas, University of Waterloo; et al.2010Towards Certain Fixes with Editing Rules and Master DataShuai Ma, University of Edinburgh; et al.2009A Unified Approach to Ranking in Probabilistic DatabasesJian Li, University of Maryland; et al.2008Finding Frequent Items in Data StreamsGraham Cormode & Marios Hadjieleftheriou, AT&T LaboratoriesConstrained Physical Design TuningNicolas Bruno & Surajit Chaudhuri, Microsoft Research2007Scalable Semantic Web Data Management Using Vertical PartitioningDaniel J. Abadi, Massachusetts Institute of Technology; et al.2006Trustworthy Keyword Search for Regulatory-Compliant Records RetentionSoumyadeb Mitra, University of Illinois at Urbana-Champaign; et al.2005Cache-conscious Frequent Pattern Mining on a Modern ProcessorAmol Ghoting, Ohio State University; et al.2004Model-Driven Data Acquisition in Sensor NetworksAmol Deshpande, University of California Berkeley; et al.2001Weaving Relations for Cache PerformanceAnastassia Ailamaki, Carnegie Mellon University; et al.1997Integrating Reliable Memory in DatabasesWee Teck Ng & Peter M. Chen, University of MichiganWWW (World Wide Web)2016Social Networks Under StressDaniel Romero, University of Michigan; et al.2015HypTrails: A Bayesian Approach for Comparing Hypotheses About Human Trails on the WebPhilipp Singer, GESIS - Leibniz Institute for the Social Sciences; et al.2014Efficient Estimation for High Similarities using Odd SketchesMichael Mitzenmacher, Harvard University; et al.2013No Country for Old Members: User Lifecycle and Linguistic Change in Online CommunitiesCristian Danescu-Niculescu-Mizil, Stanford University; et al.2012Counting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the StandardMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.2011Towards a theory model for product searchBeibei Li, New York University; et al.2010Factorizing personalized Markov chains for next-basket recommendationSteffen Rendle, Osaka University; et al.2009Hybrid keyword search auctionsAshish Goel, Stanford University
Kamesh Munagala, Duke University2008IRLbot: Scaling to 6 billion pages and beyondHsin-Tsang Lee, Texas A&M University; et al.2007Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganogra...Lars Backstrom, Cornell University; et al.2006Random Sampling from a Search Engine's IndexZiv Bar-Yossef & Maxim Gurevich, Technion2005Three-level caching for efficient query processing in large Web search enginesXiaohui Long & Torsten Suel, Polytechnic Institute of New York University2004Automatic detection of fragments in dynamically generated web pagesLakshmish Ramaswamy, Georgia Institute of Technology; et al.2003Scaling personalized web searchGlen Jeh & Jennifer Widom, Stanford UniversitySemTag and seeker: bootstrapping the semantic web via automated semantic annotationStephen Dill, IBM Research; et al.2002Abstracting application-level web securityDavid Scott & Richard Sharp, University of Cambridge2001Engineering Server Driven Consistency for Large Scale Dynamic Web ServicesJian Yin, University of Texas at Austin; et al.2000Graph Structure in the WebAndrei Broder, AltaVista; et al.1999Focused Crawling: A New Approach to Topic-Specific Web Resource DiscoverySoumen Chakrabarti, Indian Institute of Technology; et al.1998The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/videoKevin C. Almeroth, University of California Santa Barbara
Mostafa H. Ammar, Georgia Institute of Technology

Institutions with Best PapersMicrosoft Research46.0University of Washington38.1Massachusetts Institute of Technology34.3Carnegie Mellon University34.2Stanford University32.8University of California Berkeley25.2University of Toronto14.3Cornell University14.0University of Illinois at Urbana-Champaign13.7IBM Research12.8University of Texas at Austin12.4Google11.0University of Michigan11.0University of British Columbia10.4University of Massachusetts Amherst10.2Georgia Institute of Technology8.4University of California Irvine7.9Yahoo! Research7.9Princeton University7.6École Polytechnique Fédérale de Lausanne7.3University of Maryland7.0University of Oxford6.3Weizmann Institute of Science6.2University of Wisconsin6.0McGill University5.7University of Cambridge5.4University of California San Diego5.2Max Planck Institut5.2University of Waterloo5.0AT&T Laboratories4.9Brown University4.6Technion4.5University of Nottingham4.5Columbia University4.4Rice University4.2Hasso Plattner Institute4.0Université Paris-Sud4.0Oregon State University3.8Bell Labs3.8National University of Singapore3.7Hewlett-Packard Labs3.7NEC Labs America3.7Aarhus University3.6University of Nebraska-Lincoln3.6University of California Davis3.6University of Alberta3.5Delft University of Technology3.5University of North Carolina at Chapel Hill3.4University of California Los Angeles3.3Ohio State University3.3Technische Universität Berlin3.3Tsinghua University3.2ETH Zurich3.2DePaul University3.0Indiana University at Bloomington3.0Rutgers University3.0Purdue University3.0INRIA3.0Hong Kong University of Science and Technology2.9Newcastle University2.9Pennsylvania State University2.8Tel-Aviv University2.8Saarland University2.8Lancaster University2.8University College London2.7The Chinese University of Hong Kong2.5Polytechnic Institute of New York University2.5Université catholique de Louvain2.4Duke University2.4University of Bristol2.4Toyota Technological Institute at Chicago2.3University of Pennsylvania2.3Harvard University2.2University of Amsterdam2.2RWTH Aachen University2.2Peking University2.2Singapore Management University2.2University of Copenhagen2.1University of Saskatchewan2.1University of Calgary2.1VMware2.1Intel Research2.0KAIST2.0Universidade Técnica de Lisboa2.0BBN Technologies2.0NASA Ames Research Center2.0

Credit is given in decreasing author order as customary in many fields. First authors are given 1 point, second authors are given 0.5 points, third authors are given 0.33 points, etc. These points are then divided by the sum of points for that paper, i.e. normalizing it. This ranking may be inaccurate or incomplete, may not reflect the current state of best paper awards, and is not an official list. If you are not satisfied with the ranking listed here, please disregard it.

Back to Jeff Huang's Homepage

Brown University Human-Computer Interaction Research Group


Page last updated: 2017-01-16

阅读全文
0 0
原创粉丝点击