Best Paper Awards in Computer Science

Collection of best paper awards for 32 computer science conferences since 1996


This is a collection of best paper awards from conferences in each computer science subfield, starting from 1996. Originally, the broadest representative conference for each subfield were selected to be included. This data was entered by hand from sources found online (many of them no longer available), so please email bestpaper@jeffhuang.com if you notice any errors or omissions. The page is maintained annually by Jeff Huang. Thanks to contributions from Mingrui Ray Zhang (2017, 2018), Will Gierke (2019, 2020), Alice Marbach (2019, 2020), AllenAI's Dawn Howell (2019, 2020), Long Do (2021), Shaun Wallace (2021, 2022), and Joshua Yang (2023).

Caveats: Note that some conferences do not have such an award; "Distinguished paper award" and "outstanding paper award" are included but not "best student paper" or "best 10-year old paper"; at this point, it is unlikely that new additional conferences will be added due to the ongoing time commitment to prepare updates (about 10 hours a year); only each author's first affiliation is listed due to how the data was originally stored.

2023
AAAI Artificial IntelligenceMisspecification in Inverse Reinforcement LearningJoar Skalse & Alessandro Abate, University of Oxford
ACL Natural Language ProcessingDo Androids Laugh at Electric Sheep? Humor "Understanding" Benchmarks from The New Yorker Caption ContestJack Hessel, Allen Institute for Artificial Intelligence; et al.
Ana Marasovic, University of Utah
Jena D. Hwang, Allen Institute for Artificial Intelligence
Lillian Lee, Cornell University
Jeff Da, University of Washington
Rowan Zellers, OpenAI
Robert Mankoff, Air Mail and Cartoon Collections
Yejin Choi, University of Washington
What the DAAM: Interpreting Stable Diffusion Using Cross AttentionRaphael Tang, Comcast; et al.
Linqing Liu, University College London
Akshat Pandey, Comcast
Zhiying Jiang, University of Waterloo
Gefei Yang, Comcast
Karun Kumar, Comcast
Pontus Stenetorp, University College London
Jimmy Lin, University of Waterloo
Ferhan Ture, Comcast
From Pretraining Data to Language Models to Downstream Tasks: Tracking the Trails of Political Biases Leading to Unfair NLP ModelsShangbin Feng, University of Washington; et al.
Chan Young Park, Carnegie Mellon University
Yuhan Liu, Xi'an Jiaotong University
Yulia Tsvetkov, University of Washington
CHI Human-Computer InteractionBreaking Out of the Ivory Tower: A Large-scale Analysis of Patent Citations to HCI ResearchHancheng Cao, Stanford University; et al.
Yujie Lu, University of California, Santa Barbara
Yuting Deng, Carnegie Mellon University
Daniel Mcfarland, Stanford University
Michael S. Bernstein, Stanford University
Changes in Research Ethics, Openness, and Transparency in Empirical Studies between CHI 2017 and CHI 2022Kavous Salehzadeh Niksirat, University of Lausanne; et al.
Lahari Goswami, University of Lausanne
Pooja S. B. Rao, University of Lausanne
James Tyler, University of Lausanne
Alessandro Silacci, University of Lausanne
Sadiq Aliyu, University of Lausanne
Annika Aebli, University of Lausanne
Chat Wacharamanotham, Swansea University
Mauro Cherubini, University of Lausanne
ChartDetective: Easy and Accurate Interactive Data Extraction from Complex Vector ChartsDamien Masson, University of Waterloo; et al.
Sylvain Malacria, Université de Lille
Daniel Vogel, University of Waterloo
Edward Lank, University of Waterloo
Géry Casiez, Université de Lille
CiteSee: Augmenting Citations in Scientific Papers with Persistent and Personalized Historical ContextJoseph Chee Chang, Allen Institute for Artificial Intelligence; et al.
Amy X. Zhang, University of Washington
Jonathan Bragg, Allen Institute for Artificial Intelligence
Andrew Head, University of Pennsylvania
Kyle Lo, Allen Institute for Artificial Intelligence
Doug Downey, Allen Institute for Artificial Intelligence
Daniel S. Weld, University of Washington
Collaborating Across Realities: Analytical Lenses for Understanding Dyadic Collaboration in Transitional InterfacesJan-Henrik Schröder, University of Lübeck; et al.
Daniel Schacht, University of Lübeck
Niklas Peper, University of Lübeck
Anita Marie Hamurculu, University of Lübeck
Hans-Christian Jetter, University of Lübeck
Contestable Camera Cars: A Speculative Design Exploration of Public AI That Is Open and Responsive to DisputeKars Alfrink, Delft University of Technology; et al.
Ianus Keller, Delft University of Technology
Neelke Doorn, Delft University of Technology
Gerd Kortuem, Delft University of Technology
DataParticles: Block-based and Language-oriented Authoring of Animated Unit VisualizationYining Cao, University of California, San Diego; et al.
Jane L E, University of California, San Diego
Zhutian Chen, Harvard University
Haijun Xia, University of California, San Diego
Deceptive Design Patterns in Safety Technologies: A Case Study of the Citizen AppIshita Chordia, University of Washington; et al.
Lena-Phuong Tran, University of Washington
Tala June Tayebi, University of Washington
Emily Parrish, University of Washington
Sheena Erete, University of Maryland
Jason Yip, University of Washington
Alexis Hiniker, University of Washington
Disentangling Fairness Perceptions in Algorithmic Decision-Making: the Effects of Explanations, Human Oversight, and ContestabilityMireia Yurrita, Delft University of Technology; et al.
Tim Draws, Delft University of Technology
Agathe Balayn, Delft University of Technology
Dave Murray-Rust, Delft University of Technology
Nava Tintarev, Maastricht University
Alessandro Bozzon, Delft University of Technology
Envisioning the (In)Visibility of Discreet and Wearable AAC DevicesHumphrey Curtis, King's College London; et al.
Zihao You, King's College London
William Deary, King's College London
Miruna-Ioana Tudoreanu, King's College London
Timothy Neate, King's College London
Evaluating Large Language Models in Generating Synthetic HCI Research Data: a Case StudyPerttu Hämäläinen, Aalto University; et al.
Mikke Tavast, Aalto University
Anton Kunnari, University of Helsinki
FIDO2 the Rescue? Platform vs. Roaming Authentication on SmartphonesLeon Würsching, TU Darmstadt; et al.
Florentin Putz, TU Darmstadt
Steffen Haesler, TU Darmstadt
Matthias Hollick, TU Darmstadt
Full-hand Electro-Tactile Feedback without Obstructing Palmar Side of HandYudai Tanaka, University of Chicago; et al.
Alan Shen, University of Chicago
Andy Kong, University of Chicago
Pedro Lopes, University of Chicago
Going, Going, Gone: Exploring Intention Communication for Multi-User Locomotion in Virtual RealityJulian Rasch, Ludwig Maximilian University of Munich; et al.
Vladislav Dmitrievic Rusakov, Ludwig Maximilian University of Munich
Martin Schmitz, Saarland University
Florian Müller, Ludwig Maximilian University of Munich
Infrastructuring Care: How Trans and Non-Binary People Meet Health and Well-Being Needs through TechnologyLauren Wilcox, Google; et al.
Renee Shelby, Google
Rajesh Veeraraghavan, Georgetown University
Oliver L. Haimson, University of Michigan
Gabriela Cruz Erickson, Google
Michael Turken, Google
Rebecca Gulotta, Google
Investigating the Role of Context in the Delivery of Text Messages for Supporting Psychological WellbeingAnanya Bhattacharjee, University of Toronto; et al.
Joseph Jay Williams, University of Toronto
Jonah Meyerhoff, Northwestern University
Harsh Kumar, University of Toronto
Alex Mariakakis, University of Toronto
Rachel Kornfield, Northwestern University
Kaleidoscope: A Reflective Documentation Tool for a User Interface Design CourseSarah Sterman, University of California, Berkeley; et al.
Molly Jane Nicholas, University of California, Berkeley
Janaki Vivrekar, University of California, Berkeley
Jessica R Mindel, University of California, Berkeley
Eric Paulos, University of California, Berkeley
LipLearner: Customizable Silent Speech Interactions on Mobile DevicesZixiong Su, University of Tokyo; et al.
Shitao Fang, University of Tokyo
Jun Rekimoto, University of Tokyo
Paying the Price: When Intimate Partners Use Technology for Financial HarmRosanna Bellini, Cornell University
Playing with Feedback: Unpredictability, Immediacy, and Entangled Agency in the No-input Mixing DeskTom Mudd, University of Edinburgh
Probing a Community-Based Conversational Storytelling Agent to Document Digital Stories of Housing InsecurityBrett A. Halperin, University of Washington; et al.
Gary Hsieh, University of Washington
Erin McElroy, University of Texas at Austin
James Pierce, University of Washington
Daniela K. Rosner, University of Washington
Rethinking "Risk" in Algorithmic Systems Through A Computational Narrative Analysis of Casenotes in Child WelfareDevansh Saxena, Marquette University; et al.
Erina Seh-Young Moon, University of Toronto
Aryan Chaurasia, University of Toronto
Yixin Guan, University of Toronto
Shion Guha, University of Toronto
SAWSense: Using Surface Acoustic Waves for Surface-bound Event RecognitionYasha Iravantchi, University of Michigan; et al.
Yi Zhao, University of Michigan
Kenrick Kin, Meta
Alanson P. Sample, University of Michigan
Sensorimotor Simulation of Redirected Reaching using Stochastic Optimal Feedback ControlEric J Gonzalez & Sean Follmer, Stanford University
Take My Hand: Automated Hand-Based Spatial Guidance for the Visually ImpairedAdil Rahman, University of Virginia; et al.
Md Aashikur Rahman Azim, University of Virginia
Seongkook Heo, University of Virginia
The Halting problem: Video analysis of self-driving cars in trafficBarry Brown, University of Copenhagen; et al.
Mathias Broth, IKOS
Erik Vinkhuyzen, King's College London
The Nuanced Nature of Trust and Privacy Control Adoption in the Context of GoogleEhsan Ul Haque, University of Connecticut; et al.
Mohammad Maifi Hasan Khan, University of Connecticut
Md Abdullah Al Fahim, University of Connecticut
The Walking Talking Stick: Understanding Automated Note-Taking in Walking MeetingsLuke Haliburton, Ludwig Maximilian University of Munich; et al.
Natalia Bartłomiejczyk, Lodz University of Technology
Albrecht Schmidt, Ludwig Maximilian University of Munich
Paweł W. Woźniak, Chalmers University of Technology
Jasmin Niess, University of St. Gallen
Understanding Context to Capture when Reconstructing Meaningful Spaces for Remote Instruction and Connecting in XRHanuma Teja Maddali & Amanda Lazar, University of Maryland
Understanding Frontline Workers’ and Unhoused Individuals’ Perspectives on AI Used in Homeless ServicesTzu-Sheng Kuo, Carnegie Mellon University; et al.
Hong Shen, Carnegie Mellon University
Jisoo Geum, Carnegie Mellon University
Nev Jones, University of Pittsburgh
Jason I. Hong, Carnegie Mellon University
Haiyi Zhu, Carnegie Mellon University
Kenneth Holstein, Carnegie Mellon University
Understanding the Benefits and Challenges of Deploying Conversational AI Leveraging Large Language Models for Public Health InterventionEunkyung Jo, University of California, Irvine; et al.
Daniel A. Epstein, University of California, Irvine
Hyunhoon Jung, NAVER
Young-Ho Kim, NAVER
What Do We Mean When We Talk about Trust in Social Media? A Systematic ReviewYixuan Zhang, Georgia Institute of Technology; et al.
Joseph D Gaggiano, Georgia Institute of Technology
Nutchanon Yongsatianchot, Northeastern University
Nurul M Suhaimi, Universiti Malaysia Pahang
Miso Kim, Northeastern University
Yifan Sun, William & Mary
Jacqueline Griffin, Northeastern University
Andrea G Parker, Georgia Institute of Technology
Who Do We Mean When We Talk About Visualization Novices?Alyxander Burns, University of Massachusetts Amherst; et al.
Christiana Lee, University of Massachusetts Amherst
Ria Chawla, University of Massachusetts Amherst
Evan Peck, Bucknell University
Narges Mahyar, University of Massachusetts Amherst
'Treat me as your friend, not a number in your database': Co-designing with Children to Cope with Datafication OnlineGe Wang, University of Oxford; et al.
Jun Zhao, University of Oxford
Max Van Kleek, University of Oxford
Nigel Shadbolt, University of Oxford
"My Zelda Cane": Strategies Used by Blind Players to Play Visual-Centric Digital GamesDavid Gonçalves, University of Lisbon; et al.
Manuel Piçarra, University of Lisbon
Pedro Pais, University of Lisbon
João Guerreiro, University of Lisbon
André Rodrigues, University of Lisbon
CIKM Knowledge ManagementJoint Rebalancing and Charging for Shared Electric Micromobility Vehicles with Energy-informed DemandHeng Tan, Lehigh University; et al.
Yukun Yuan, University of Tennessee at Chattanooga
Shuxin Zhong, Rutgers University
Yu Yang, Lehigh University
CVPR Computer VisionVisual Programming: Compositional visual reasoning without trainingTanmay Gupta & Aniruddha Kembhavi, Allen Institute for Artificial Intelligence
Planning-oriented Autonomous DrivingYihan Hu, Shanghai AI Laboratory; et al.
Jiazhi Yang, Shanghai AI Laboratory
Li Chen, Shanghai AI Laboratory
Keyu Li, Shanghai AI Laboratory
Chonghao Sima, Shanghai AI Laboratory
Xizhou Zhu, SenseTime Research
Siqi Chai, Wuhan University
Senyao Du, Wuhan University
Tianwei Lin, Wuhan University
Wenhai Wang, Shanghai AI Laboratory
Lewei Lu, SenseTime Research
Xiaosong Jia, Shanghai AI Laboratory
Qiang Liu, Wuhan University
Jifeng Dai, Shanghai AI Laboratory
Yu Qiao, Shanghai AI Laboratory
Hongyang Li, Shanghai AI Laboratory
FOCS TheoryStrong Bounds for 3-ProgressionsZander Kelley, University of Illinois at Urbana–Champaign
Raghu Meka, University of California, Los Angeles
The Subspace Flatness Conjecture and Faster Integer ProgrammingVictor Reis & Thomas Rothvoss, University of Washington
FSE Software EngineeringRecommending Analogical APIs via Knowledge Graph EmbeddingMingwei Liu, Fudan University; et al.
Yanjun Yang, Fudan University
Yiling Lou, Fudan University
Xin Peng, Fudan University
Zhong Zhou, Fudan University
Xueying Du, Fudan University
Tianyong Yang, Fudan University
TransRacer: Function Dependence-Guided Transaction Race Detection for Smart ContractsChenyang Ma, Nanjing University of Science and Technology; et al.
Wei Song, Nanjing University of Science and Technology
Jeff Huang, Texas A&M University
LExecutor: Learning-Guided ExecutionBeatriz Souza & Michael Pradel, University of Stuttgart
A Four-Year Study of Student Contributions to OSS vs. OSS4SG with a Lightweight InterventionZihan Fang, Vanderbilt University; et al.
Madeline Endres, University of Michigan
Thomas Zimmermann, Microsoft
Denae Ford, Microsoft
Westley R Weimer, University of Michigan
Kevin Leach, Vanderbilt University
Yu Huang, Vanderbilt University
Benchmarking Robustness of AI-Enabled Multi-sensor Fusion Systems: Challenges and OpportunitiesXinyu Gao, Nanjing University; et al.
Zhijie Wang, University of Alberta
Yang Feng, Nanjing University
Lei Ma, University of Tokyo
Zhenyu Chen, Nanjing University
Baowen Xu, Nanjing University
NeuRI: Diversifying DNN Generation via Inductive Rule InferenceJiawei Liu, University of Illinois at Urbana–Champaign; et al.
Jinjun Peng, Columbia University
Yuyao Wang, Nanjing University
Lingming Zhang, University of Illinois at Urbana–Champaign
Can Machine Learning Pipelines Be Better Configured?Yibo Wang, Northeastern University; et al.
Ying Wang, Northeastern University
Tingwei Zhang, Northeastern University
Yue Yu, National University of Defense Technology
Shing-Chi Cheung, Hong Kong University of Science and Technology
Hai Yu, Northeastern University
Zhiliang Zhu, Northeastern University
An Automated Approach to Extracting Local VariablesXiaye Chi, Beijing Institute of Technology; et al.
Hui Liu, Beijing Institute of Technology
Guangjie Li, National Innovation Institute of Defense Technology
Weixiao Wang, Beijing Institute of Technology
Yunni Xia, Chongqing University
Yanjie Jiang, Beijing Institute of Technology
Yuxia Zhang, Beijing Institute of Technology
Weixing Ji, Beijing Institute of Technology
A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level TracingMin-Yih Hsu, University of California, Irvine; et al.
Felicitas Hetzelt, University of California, Irvine
David Gens, University of California, Irvine
Michael Maitland, SiFive
Michael Franz, University of California, Irvine
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware DetectorsRuoxi Sun, CSIRO's Data61; et al.
Minhui Xue, CSIRO's Data61
Gareth Tyson, Hong Kong University of Science and Technology
Tian Dong, Shanghai Jiao Tong University
Shaofeng Li, Peng Cheng Laboratory
Shuo Wang, CSIRO's Data61
Haojin Zhu, Shanghai Jiao Tong University
Seyit Camtepe, CSIRO's Data61
Surya Nepal, CSIRO's Data61
Speeding up SMT Solving via Compiler OptimizationBenjamin Mikek & Qirun Zhang, Georgia Institute of Technology
Baldur: Whole-Proof Generation and Repair with Large Language ModelsEmily First, University of Massachusetts Amherst; et al.
Markus Rabe, Augment Computing
Talia Ringer, University of Illinois at Urbana–Champaign
Yuriy Brun, University of Massachusetts Amherst
ICCV Computer VisionAdding Conditional Control to Text-to-Image Diffusion ModelsLvmin Zhang, Stanford University; et al.
Anyi Rao, Stanford University
Maneesh Agrawala, Stanford University
Passive Ultra-Wideband Single-Photon ImagingMian Wei, University of Toronto; et al.
Sotiris Nousias, University of Toronto
Rahul Gulve, University of Toronto
David B. Lindell, University of Toronto
Kiriakos N. Kutulakos, University of Toronto
ICML Machine LearningLearning-Rate-Free Learning by D-AdaptationAaron Defazio, Meta
Konstantin Mishchenko, Samsung
A Watermark for Large Language ModelsJohn Kirchenbauer, University of Maryland; et al.
Jonas Geiping, University of Maryland
Yuxin Wen, University of Maryland
Jonathan Katz, University of Maryland
Ian Miers, University of Maryland
Tom Goldstein, University of Maryland
Generalization on the Unseen, Logic Reasoning and Degree CurriculumEmmanuel Abbe, École Polytechnique Fédérale de Lausanne; et al.
Samy Bengio, Apple
Aryo Lotfi, École Polytechnique Fédérale de Lausanne
Kevin Rizk, École Polytechnique Fédérale de Lausanne
Adapting to game trees in zero-sum imperfect information gamesCôme Fiegel, CREST; et al.
Pierre Menard, ENS Lyon
Tadashi Kozuno, Omron Sinic X
Remi Munos, Deepmind
Vianney Perchet, CRITEO AI
Michal Valko, Deepmind
Self-Repellent Random Walks on General Graphs - Achieving Minimal Sampling Variance via Nonlinear Markov ChainsVishwaraj Doshi, IQVIA; et al.
Jie Hu, North Carolina State University
Do Young Eun, North Carolina State University
Bayesian Design Principles for Frequentist Sequential LearningYunbei Xu & Assaf Zeevi, Columbia University
ICSE Software EngineeringDo I Belong? Modeling Sense of Virtual Community Among Linux KernelBianca Trinkenreich, Northern Arizona University; et al.
Klaas-Jan Stol, University College Cork
Anita Sarma, Oregon State University
Daniel M German, University of Victoria
Marco Gerosa, Northern Arizona University
Igor Steinmacher, Northern Arizona University
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java ProjectsLyuye Zhang, Nanyang Technological University; et al.
Chengwei Liu, Nanyang Technological University
Zhengzi Xu, Nanyang Technological University
Sen Chen, Tianjin University
Lingling Fan, Nankai University
Lida Zhao, Nanyang Technological University
Jiahui Wu, Nanyang Technological University
Yang Liu, Nanyang Technological University
A Qualitative Study on the Implementation Design Decisions of DevelopersJenny T. Liang, Carnegie Mellon University; et al.
Maryam Arab, George Mason University
Minhyuk Ko, Virginia Tech
Amy J. Ko, University of Washington
Thomas D. LaToza, George Mason University
STILL AROUND: Experiences and Survival Strategies of Veteran Women Software DeveloperSterre van Breukelen, Eindhoven University of Technology; et al.
Ann Barcomb, University of Calgary
Sebastian Baltes, University of Adelaide
Alexander Serebrenik, Eindhoven University of Technology
Understanding and Detecting On-the-Fly Configuration BugsTeng Wang, National University of Defense Technology; et al.
Zhouyang Jia, National University of Defense Technology
Shanshan Li, National University of Defense Technology
Si Zheng, National University of Defense Technology
Yue Yu, National University of Defense Technology
Erci Xu, National University of Defense Technology
Shaoliang Peng, Hunan University
Xiangke Liao, National University of Defense Technology
Testing Database Engines via Query Plan GuidanceJinsheng Ba & Manuel Rigger, National University of Singapore
Sibyl: Improving Software Engineering Tools with SMT SelectionWill Leeson, University of Virginia; et al.
Matthew B Dwyer, University of Virginia
Antonio Filieri, Imperial College London
Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGXXinyuan Miao, Shanghai Jiao Tong University; et al.
Ziyi Lin, Alibaba Group
Shaojun Wang, Alibaba Group
Lei Yu, Alibaba Group
Sanhong Li, Alibaba Group
Zihan Wang, Shanghai Jiao Tong University
Pengbo Nie, Shanghai Jiao Tong University
Yuting Chen, Shanghai Jiao Tong University
Beijun Shen, Shanghai Jiao Tong University
He Jiang, Dalian University of Technology
Efficiency Matters: Speeding Up Automated Testing with GUI Rendering InferenceSidong Feng, Monash University; et al.
Mulong Xie, Australian National University
Chunyang Chen, Monash University
Rete: Learning Namespace Representation for Program RepairNikhil Parasaram, University College London; et al.
Earl Barr, University College London
Sergey Mechtaev, University College London
IJCAI Artificial IntelligenceLevin Tree Search with Context ModelsLaurent Orseau, Deepmind; et al.
Marcus Hutter, Deepmind
Levi H. S. Lelis, Alberta Machine Intelligence Institute
SAT-Based PAC Learning of Description Logic ConceptsBalder ten Cate, University of Amsterdam; et al.
Maurice Funk, Leipzig University
Jean Christoph Jung, Universität Dortmund
Carsten Lutz, Leipzig University
Safe Reinforcement Learning via Probabilistic Logic ShieldsWen-Chi Yang, Katholieke Universiteit Leuven; et al.
Giuseppe Marra, Katholieke Universiteit Leuven
Gavin Rens, Katholieke Universiteit Leuven
Luc De Raedt, Katholieke Universiteit Leuven
INFOCOM NetworkingMore than Enough is Too Much: Adaptive Defenses against Gradient Leakage in Production Federated LearningFei Wang, University of Toronto; et al.
Ethan Hugh, University of Toronto
Baochun Li, University of Toronto
Scalable Real-Time Bandwidth Fairness in SwitchesRobert MacDavid, Princeton University; et al.
Xiaoqi Chen, Princeton University
Jennifer Rexford, Princeton University
ISCA ArchitectureContiguitas: The Pursuit of Physical Memory Contiguity in DatacentersKaiyang Zhao, Carnegie Mellon University; et al.
Kaiwen Xue, Carnegie Mellon University
Ziqi Wang, Carnegie Mellon University
Dan Schatzberg, Meta
Leon Yang, Meta
Antonis Manousis, Meta
Johannes Weiner, Meta
Rik van Riel, Meta
Bikash Sharma, Meta
Chunqiang Tang, Meta
Dimitrios Skarlatos, Carnegie Mellon University
SCALO: An Accelerator-Rich Distributed System for Scalable Brain-Computer InterfacingKarthik Sriram, Yale University; et al.
Raghavendra Pradyumna Pothukuchi, Yale University
Michał Gerasimiuk, Yale University
Muhammed Ugur, Yale University
Oliver Ye, Yale University
Rajit Manohar, Yale University
Anurag Khandelwal, Yale University
Abhishek Bhattacharjee, Yale University
KDD Data MiningAll in One: Multi-task Prompting for Graph Neural NetworksXiangguo Sun, The Chinese University of Hong Kong; et al.
Hong Cheng, The Chinese University of Hong Kong
Jia Li, Hong Kong University of Science and Technology
Bo Liu, Southeast University
Jihong Guan, Tongji University
MOBICOM MobileAgriTera: Accurate Non-Invasive Fruit Ripeness Sensing via Sub-Terahertz Wireless SignalsSayed Saad Afzal, Massachusetts Institute of Technology; et al.
Atsutse Kludze, Princeton University
Subhajit Karmakar, Princeton University
Ranveer Chandra, Microsoft
Yasaman Ghasempour, Princeton University
The Underwater Backscatter Channel: Theory, Link Budget, and Experimental ValidationWaleed Akbar, Massachusetts Institute of Technology; et al.
Ahmed Allam, Massachusetts Institute of Technology
Fadel Adib, Massachusetts Institute of Technology
NeurIPS Machine LearningPrivacy Auditing with One (1) Training RunThomas Steinke, Google; et al.
Milad Nasr, Google
Matthew Jagielski, Google
Are Emergent Abilities of Large Language Models a Mirage?Rylan Schaeffer, Stanford University; et al.
Brando Miranda, Stanford University
Sanmi Koyejo, Stanford University
NSDI NetworkingCausalSim: A Causal Framework for Unbiased Trace-Driven SimulationAbdullah Alomar, Massachusetts Institute of Technology; et al.
Pouya Hamadanian, Massachusetts Institute of Technology
Arash Nasr-Esfahany, Massachusetts Institute of Technology
Anish Agarwal, MIT,
Mohammad Alizadeh, Massachusetts Institute of Technology
Devavrat Shah, Massachusetts Institute of Technology
Building Flexible, Low-Cost Wireless Access Networks With MagmaShaddi Hasan, Virginia Tech; et al.
Amar Padmanabhan, Databricks
Bruce Davie, Systems Approach
Jennifer Rexford, Princeton University
Ulas Kozat, Meta
Hunter Gatewood, Meta
Shruti Sanadhya, Meta
Nick Yurchenko, Meta
Tariq Al-Khasib, Meta
Oriol Batalla, Meta
Marie Bremner, Meta
Andrei Lee, Meta
Evgeniy Makeev, Meta
Scott Moeller, Meta
Alex Rodriguez, Meta
Pravin Shelar, Meta
Karthik Subraveti, Meta
Sudarshan Kandi, Meta
Alejandro Xoconostle, Meta
Praveen Kumar Ramakrishnan, Meta
Xiaochen Tian, Indepenent
Anoop Tomar, Meta
LeakyScatter: A Frequency-Agile Directional Backscatter Network Above 100 GHzAtsutse Kludze & Yasaman Ghasempour, Princeton University
DOTE: Rethinking (Predictive) WAN Traffic EngineeringYarin Perry, Hebrew University of Jerusalem; et al.
Felipe Vieira Frujeri, Microsoft
Chaim Hoch, Hebrew University of Jerusalem
Srikanth Kandula, Microsoft
Ishai Menache, Microsoft
Michael Schapira, Hebrew University of Jerusalem
Aviv Tamar, Technion – Israel Institute of Technology
OSDI Operating SystemsTriangulating Python Performance Issues with SCALENEEmery D. Berger, University of Massachusetts Amherst; et al.
Sam Stern, University of Massachusetts Amherst
Juan Altmayer Pizzorno, University of Massachusetts Amherst
Ensō: A Streaming Interface for NIC-Application CommunicationHugo Sadok, Carnegie Mellon University; et al.
Nirav Atre, Carnegie Mellon University
Zhipeng Zhao, Microsoft
Daniel S. Berger, Microsoft
James C. Hoe, Carnegie Mellon University
Aurojit Panda, New York University
Justine Sherry, Carnegie Mellon University
Ren Wang, Intel
PLDI Programming LanguagesMosaic: An Interoperable Compiler for Tensor AlgebraManya Bansal, Stanford University; et al.
Olivia Hsu, Stanford University
Kunle Olukotun, Stanford University
Fredrik Kjolstad, Stanford University
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic PrimitivesJoel Kuepper, University of Adelaide; et al.
Andres Erbsen, Massachusetts Institute of Technology
Jason Gross, Massachusetts Institute of Technology
Owen Conoly, Massachusetts Institute of Technology
Chuyue Sun, Stanford University
Samuel Tian, Massachusetts Institute of Technology
David Wu, University of Adelaide
Adam Chlipala, Massachusetts Institute of Technology
Chitchanok Chuengsatiansup, University of Melbourne
Daniel Genkin, Georgia Institute of Technology
Markus Wagner, Monash University
Yuval Yarom, Ruhr University Bochum
Synthesizing MILP Constraints for Efficient and Robust OptimizationJingbo Wang, University of Southern California; et al.
Aarti Gupta, Princeton University
Chao Wang, University of Southern California
An Automata-Based Framework for Verification and Bug Hunting in Quantum CircuitsYu-Fang Chen, Academia Sinica; et al.
Kai-Min Chung, Academia Sinica
Ondřej Lengál, Brno University of Technology
Jyun-Ao Lin, Academia Sinica
Wei-Lun Tsai, Academia Sinica
Di-De Yen, Academia Sinica
Covering All the Bases: Type-Based Verification of Test Input GeneratorsZhe Zhou, Purdue University; et al.
Ashish Mishra, Purdue University
Benjamin Delaware, Purdue University
Suresh Jagannathan, Purdue University
PODS DatabasesExtremal Fitting Problems for Conjunctive QueriesBalder Ten Cate, University of Amsterdam; et al.
Victor Dalmau, Pompeu Fabra University
Maurice Funk, Leipzig University
Carsten Lutz, Leipzig University
S&P Security and PrivacyMEGA: Malleable Encryption Goes AwryMatilda Backendal, ETH Zurich; et al.
Miro Haller, ETH Zurich
Kenneth Paterson, ETH Zurich
Practically-exploitable Cryptographic Vulnerabilities in MatrixMartin Albrecht, Royal Holloway University of London; et al.
Sofía Celi, Brave Software
Benjamin Dowling, University of Sheffield
Daniel Jones, Royal Holloway University of London
Weak Fiat-Shamir Attacks on Modern Proof SystemsQuang Dao, Carnegie Mellon University; et al.
Jim Miller, Trail of Bits
Opal Wright, Trail of Bits
Paul Grubbs, University of Michigan
Typing High-Speed Cryptography against Spectre v1Basavesh Ammanaghatta Shivakumar, Max Planck Institute for Security and Privacy; et al.
Gilles Barthe, Max Planck Institute for Security and Privacy
Benjamin Grégoire, Inria Université Côte d'Azur
Vincent Laporte, Inria Nancy
Tiago Oliviera, Max Planck Institute for Security and Privacy
Swarn Priya, Inria Université Côte d'Azur
Peter Schwabe, Max Planck Institute for Security and Privacy
Lucas Tabary-Maujean, ENS Paris-Saclay
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology GenerationsEndres Puschner, Max Planck Institute for Security and Privacy; et al.
Thorben Moos, Université catholique de Louvain
Christian Kison, Bundeskriminalamt
Steffen Becker, Ruhr University Bochum
Amir Moradi, Ruhr University Bochum
Christof Paar, Max Planck Institute for Security and Privacy
It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and DefensesSoheil Khodayari & Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security
The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the WebJannis Rautenstrauch, CISPA Helmholtz Center for Information Security; et al.
Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security
Ben Stock, CISPA Helmholtz Center for Information Security
WaVe: a verifiably secure WebAssembly sandboxing runtimeEvan Johnson, University of California, San Diego; et al.
Evan Laufer, Stanford University
Zijie Zhao, University of Illinois Urbana Champaign
Shravan Narayan, University of California, San Diego
Stefan Savage, University of California, San Diego
Deian Stefan, University of California, San Diego
Fraser Brown, Carnegie Mellon University
Characterizing Everyday Misuse of Smart Home DevicesPhoebe Moh, University of Maryland; et al.
Pubali Datta, University of Illinois Urbana Champaign
Noel Warford, University of Maryland
Adam Bates, University of Illinois Urbana Champaign
Nathan Malkin, University of Maryland
Michelle Mazurek, University of Maryland
Not Yet Another Digital ID: Privacy-preserving Humanitarian Aid DistributionBoya Wang, École Polytechnique Fédérale de Lausanne; et al.
Wouter Lueks, CISPA Helmholtz Center for Information Security
Justinas Sukaitis, International Committee of the Red Cross
Vincent Graf Narbel, International Committee of the Red Cross
Carmela Troncoso, École Polytechnique Fédérale de Lausanne
"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in KenyaCollins W. Munyendo, George Washington University; et al.
Yasemin Acar, George Washington University
Adam J. Aviv, George Washington University
Space Odyssey: An Experimental Software Security Analysis of SatellitesJohannes Willbold, Ruhr University Bochum; et al.
Moritz Schloegel, Ruhr University Bochum
Manuel Vögele, Ruhr University Bochum
Maximilian Gerhardt, Ruhr University Bochum
Thorsten Holz, CISPA Helmholtz Center for Information Security
Ali Abbasi, CISPA Helmholtz Center for Information Security
SIGCOMM NetworkingMemory Management in ActiveRMT: Towards Runtime-programmable Switches,Rajdeep Das & Alex C. Snoeren, University of California, San Diego
SIGGRAPH GraphicsSplit-Lohmann Multifocal DisplaysYingsi Qin, Carnegie Mellon University; et al.
Wei-Yu Chen, Carnegie Mellon University
Matthew O'Toole, Carnegie Mellon University
Aswin C. Sankaranarayanan, Carnegie Mellon University
Differentiable Stripe Patterns for Inverse Design of Structured SurfacesJuan Sebastian Montes Maestre, ETH Zurich; et al.
Yinwei Du, ETH Zurich
Ronan Hinchet, ETH Zurich
Stelian Coros, ETH Zurich
Bernhard Thomaszewski, ETH Zurich
Globally Consistent Normal Orientation for Point Clouds by Regularizing the Winding-number FieldRui Xu, Shandong University; et al.
Zhiyang Dou, University of Hong Kong
Ningna Wang, University of Texas at Dallas
Shiqing Xin, Shandong University
Shuangmin Chen, Qingdao University of Science and Technology
Mingyan Jiang, Shandong University
Xiaohu Guo, University of Texas at Dallas
Wenping Wang, Texas A&M University
Changhe Tu, Shandong University
3D Gaussian Splatting for Real-time Radiance Field RenderingBernhard Kerbl, Inria Université Côte d'Azur; et al.
Georgios Kopanas, Inria Université Côte d'Azur
Thomas Leimkuehler, Max Planck Institute for Informatics
George Drettakis, Inria Université Côte d'Azur
DOC: Differentiable Optimal Control for Retargeting Motions Onto Legged RobotsRuben Grandia, Disney Research; et al.
Farbod Farshidian, ETH Zurich
Espen Knoop, Disney Research
Christian Schumacher, Disney Research
Marco Hutter, ETH Zurich
Moritz Bächer, Disney Research
SIGIR Information RetrievalThe Information Retrieval Experiment PlatformMaik Fröbe, Friedrich-Schiller-Universität Jena; et al.
Jan Heinrich Reimer, Friedrich-Schiller-Universität Jena
Sean MacAvaney, University of Glasgow
Niklas Deckers, Leipzig University
Simon Reich, Leipzig University
Janek Bevendorff, Bauhaus University
Benno Stein, Bauhaus University
Matthias Hagen, Friedrich-Schiller-Universität Jena
Martin Potthast, Leipzig University
SIGMETRICS PerformanceMean-field Analysis for Load Balancing on Spatial GraphsDaan Rutten & Debankur Mukherjee, Georgia Institute of Technology
SIGMOD DatabasesDetecting Logic Bugs of Join Optimizations in DBMSXiu Tang, Zhejiang University; et al.
Sai Wu, Zhejiang Univ
Dongxiang Zhang, Zhejiang University
Feifei Li, Alibaba Group
Gang Chen, Zhejiang University
Predicate Pushdown for Data Science PipelinesCong Yan, Microsoft research; et al.
Yin Lin, University of Michigan
Yeye He, Microsoft
SODA TheoryDynamic Matching with Better-than-2 Approximation in Polylogarithmic Update TimeSayan Bhattacharya, University of Warwick; et al.
Peter Kiss, University of Warwick
Thatchaphol Saranurak, University of Michigan
David Wajc, Stanford University
Dynamic Algorithms for Maximum Matching SizeSoheil Behnezhad, Stanford University
SOSP Operating SystemsEnabling High-Performance and Secure Userspace NVM File Systems with the Trio ArchitectureDiyu Zhou, École Polytechnique Fédérale de Lausanne; et al.
Vojtech Aschenbrenner, École Polytechnique Fédérale de Lausanne
Tao Lyu, École Polytechnique Fédérale de Lausanne
Jian Zhang, Rutgers University
Sudarsun Kannan, Rutgers University
Sanidhya Kashyap, École Polytechnique Fédérale de Lausanne
TreeSLS: A Whole-system Persistent Microkernel with Tree-structured State Checkpoint on NVMFangnuo Wu, Shanghai Jiao Tong University; et al.
Mingkai Dong, Shanghai Jiao Tong University
Gequan Mo, Shanghai Jiao Tong University
Haibo Chen, Shanghai Jiao Tong University
Validating JIT Compilers via Compilation Space ExplorationCong Li, Nanjing University; et al.
Yanyan Jiang, Nanjing University
Chang Xu, Nanjing University
Zhendong Su, ETH Zurich
STOC TheoryDoubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWEWei Kai Lin, Northeastern University; et al.
Ethan Mook, Northeastern University
Daniel Wichs, Northeastern University
The Randomized k-Server Conjecture Is False!Sébastien Bubeck, Microsoft; et al.
Christian Coester, University of Oxford
Yuval Rabani, Hebrew University of Jerusalem
UIST User InterfaceGenAssist: Making Image Generation AccessibleMina Huh, University of Texas at Austin; et al.
Yi-Hao Peng, Carnegie Mellon University
Amy Pavel, University of Texas at Austin
Generative Agents: Interactive Simulacra of Human BehaviorJoon Sung Park, Stanford University; et al.
Joey O'Brien, Stanford University
Carrie J Cai, Google
Meredith Ringel Morris, Google
Percy Liang, Stanford University
Michael Bernstein, Stanford University
Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VRVivek C Nair, University of California, Berkeley; et al.
Gonzalo Munilla-Garrido, Technical University of Munich
Dawn Song, University of California, Berkeley
VLDB DatabasesAuto-Tables: Synthesizing Multi-Step Transformations to Relationalize Tables without Using ExamplesPeng Li, Georgia Institute of Technology; et al.
Yeye He, Microsoft
Cong Yan, Microsoft
Yue Wang, Microsoft
Surajit Chaudhuri, Microsoft
DBSP: Automatic Incremental View Maintenance for Rich Query LanguagesMihai Budiu, VMware Inc.; et al.
Tej Chajed, VMware Inc.
Frank McSherry, Materialize
Leonid Ryzhyk, VMware Inc.
Val Tannen, University of Pennsylvania
WWW World Wide WebSimplistic Collection and Labeling Practices Limit the Utility of Benchmark Datasets for Twitter Bot DetectionChris Hays, Massachusetts Institute of Technology; et al.
Zachary Schutzman, Massachusetts Institute of Technology
Manish Raghavan, Massachusetts Institute of Technology
Erin Walk, Massachusetts Institute of Technology
Philipp Zimmer, Massachusetts Institute of Technology
2022
AAAI Artificial IntelligenceOnline certification of preference-based fairness for personalized recommender systemsVirginie Do, Université Paris Dauphine; et al.
Sam Corbett-Davies, Meta
Jamal Atif, Université Paris Dauphine
Nicolas Usunier, Meta
ACL Natural Language ProcessingLearned Incremental Representations for ParsingNikita Kitaev, University of California, Berkeley; et al.
Thomas Lu, University of California, Berkeley
Dan Klein, University of California, Berkeley
Requirements and Motivations of Low-Resource Speech Synthesis for Language RevitalizationAidan Pine, National Research Council Canada; et al.
Dan Wells, University of Edinburgh
Nathan Brinklow, Queen's University
Patrick William Littell, National Research Council Canada
Korin Richmond, University of Edinburgh
DiBiMT: A Novel Benchmark for Measuring Word Sense Disambiguation Biases in Machine TranslationNiccolò Campolungo, Sapienza University of Rome; et al.
Federico Martelli, Sapienza University of Rome
Francesco Saina, SSML Carlo Bo
Roberto Navigli, Sapienza University of Rome
KinyaBERT: a Morphology-aware Kinyarwanda Language ModelAntoine Nzeyimana, University of Massachusetts Amherst
Andre Niyongabo Rubung, Polytechnic University of Catalonia
CHI Human-Computer InteractionAirRacket: Perceptual Design of Ungrounded, Directional Force Feedback to Improve Virtual Racket Sports ExperiencesChing-Yi Tsai, National Taiwan University; et al.
I-Lun Tsai, National Taiwan University
Chao-Jung Lai, National Taiwan University
Derrek Chow, University of Waterloo
Lauren Wei, University of Maryland
Lung-Pan Cheng, National Taiwan University
Mike Y. Chen, National Taiwan University
Care Infrastructures for Digital Security in Intimate Partner ViolenceEmily Tseng, Cornell University; et al.
Mehrnaz Sabet, Cornell University
Rosanna Bellini, Cornell University
Harkiran Kaur Sodhi, Cornell University
Thomas Ristenpart, Cornell University
Nicola Dell, Cornell University
Causality-preserving Asynchronous RealityAndreas Rene Fender & Christian Holz, ETH Zurich
Designing for the Bittersweet: Improving Sensitive Experiences with Recommender SystemsCaitlin Lustig, University of Washington; et al.
Artie Konrad, Meta
Jed R. Brubaker, University of Colorado Boulder
EmoBalloon - Conveying Emotional Arousal in Text Chats with Speech BalloonsToshiki Aoki, University of Tokyo; et al.
Rintaro Chujo, University of Tokyo
Katsufumi Matsui, University of Tokyo
Saemi Choi, Samsung
Ari Hautasaari, University of Tokyo
Including the Experiences of Physically Disabled Players in Mainstream Guidelines for Movement-Based GamesLiam Mason, University of Lincoln; et al.
Kathrin Gerling, Katholieke Universiteit Leuven
Patrick Dickinson, University of Lincoln
Jussi Holopainen, University of Lincoln
Lisa Jacobs, University of Lincoln
Kieran Hicks, University of Lincoln
Interrupting Merit, Subverting Legibility: Navigating Caste In ‘Casteless’ Worlds of ComputingPalashi Vaghela, Cornell University; et al.
Steven Jackson, Cornell University
Phoebe Sengers, Cornell University
Investigating Daily Practices of Self-care to Inform the Design of Supportive Health Technologies for Living and Ageing Well with HIVCaroline Claisse, Newcastle University; et al.
Bakita Kasadha, Terrence Higgins Trust
Simone Stumpf, University of Glasgow
Abigail C Durrant, Newcastle University
Investigating the Tradeoffs of Everyday Text-Entry Collection MethodsAndré Rodrigues, University of Lisbon; et al.
Hugo Nicolau, University of Lisbon
André R.B. Santos, University of Lisbon
Diogo Branco, University of Lisbon
Jay Rainey, Newcastle University
David Verweij, Newcastle University
Jan David Smeddinck, Newcastle University
Kyle Montague, Northumbria University
Tiago Guerreiro, University of Lisbon
Jury Learning: Integrating Dissenting Voices into Machine Learning ModelsMitchell L. Gordon, Stanford University; et al.
Michelle S. Lam, Stanford University
Joon Sung Park, Stanford University
Kayur Patel, Apple
Jeff Hancock, Stanford University
Tatsunori Hashimoto, Stanford University
Michael Bernstein, Stanford University
Math Augmentation: How Authors Enhance the Readability of Formulas using Novel Visual Design PracticesAndrew Head, Allen Institute for Artificial Intelligence; et al.
Amber Xie, University of California, Berkeley
Marti Hearst, University of California, Berkeley
Meander Coil++: A Body-scale Wireless Power Transmission Using Safe-to-body and Energy-efficient Transmitter CoilRyo Takahashi, University of Tokyo; et al.
Wakako Yukita, University of Tokyo
Tomoyuki Yokota, University of Tokyo
Takao Someya, University of Tokyo
Yoshihiro Kawahara, University of Tokyo
Mobile-Friendly Content Design for MOOCs: Challenges, Requirements, and Design OpportunitiesJeongyeon Kim, KAIST; et al.
Yubin Choi, KAIST
Meng Xia, KAIST
Juho Kim, KAIST
Mouth Haptics in VR using a Headset Ultrasound Phased ArrayVivian Shen, Carnegie Mellon University; et al.
Craig Shultz, Carnegie Mellon University
Chris Harrison, Carnegie Mellon University
Neo: Generalizing Confusion Matrix Visualization to Hierarchical and Multi-Output LabelsJochen Görtler, University of Konstanz; et al.
Fred Hohman, Apple
Dominik Moritz, Apple
Kanit Wongsuphasawat, Apple
Donghao Ren, Apple
Rahul Nair, Apple
Marc Kirchner, Apple
Kayur Patel, Apple
Squeezy-Feely: Investigating Lateral Thumb-Index Pinching as an Input ModalityMartin Schmitz, TU Darmstadt; et al.
Sebastian Günther, TU Darmstadt
Dominik Schön, TU Darmstadt
Florian Müller, Ludwig Maximilian University of Munich
Still Creepy After All These Years: The Normalization of Affective Discomfort in App UseJohn S. Seberger, Michigan State University; et al.
Irina Shklovski, University of Copenhagen
Emily Swiatek, Indiana University Bloomington
Sameer Patil, University of Utah
The TAC Toolkit: Supporting Design for User Acceptance of Health Technologies from a Macro-Temporal PerspectiveCamille Nadal, Trinity College Dublin; et al.
Shane McCully, Trinity College Dublin
Kevin Doherty, Copenhagen Center for Health Technology
Corina Sas, University of Lancaster
Gavin Doherty, Trinity College Dublin
Towards Relatable Explainable AI with the Perceptual ProcessWencan Zhang & Brian Y Lim, National University of Singapore
Weaving Stories: Toward Repertoires for Designing ThingsDoenja Oogjes, Simon Fraser University
Ron Wakkary, Eindhoven University of Technology
When Confidence Meets Accuracy: Exploring the Effects of Multiple Performance Indicators on Trust in Machine Learning ModelsAmy Rechkemmer & Ming Yin, Purdue University
Zoom Obscura: Counterfunctional Design for Video-ConferencingChris Elsden, University of Edinburgh; et al.
David Chatting, University of London
Michael Duggan, King's College London
Andrew Carl Dwyer, Durham University
Pip Thornton, University of Edinburgh
3D Printed Street Crossings: Supporting Orientation and Mobility Training with People who are Blind or have Low VisionLeona M Holloway, Monash University; et al.
Matthew Butler, Monash University
Kim Marriott, Monash University
"I Wanted to See How Bad It Was": Online Self-screening as a Critical Transition Point Among Young Adults with Common Mental Health ConditionsKaylee Payne Kruzan, Northwestern University; et al.
Jonah Meyerhoff, Northwestern University
Theresa Nguyen, Mental Health America
Madhu Reddy, University of California, Irvine
David C. Mohr, Northwestern University
Rachel Kornfield, Northwestern University
"It's Kind of Like Code-Switching": Black Older Adults' Experiences with a Voice Assistant for Health Information SeekingChristina Harrington, Carnegie Mellon University; et al.
Radhika Garg, Syracuse University
Amanda Woodward, Michigan State University
Dimitri Williams, DePaul University
CIKM Knowledge ManagementHarnessing Neighborhood Modeling and Asymmetry Preservation for Digraph Representation LearningHonglu Zhou, Rutgers University; et al.
Advith Chegu, Rutgers University
Samuel Sohn, Rutgers University
Zuohui Fu, Rutgers University
Gerard de Melo, University of Potsdam
Mubbasir Kapadia, Rutgers University
CVPR Computer VisionLearning to Solve Hard Minimal ProblemsPetr Hruby, ETH Zurich; et al.
Timothy Duff, University of Washington
Anton Leykin, Georgia Institute of Technology
Tomas Pajdla, Czech Technical University in Prague
FOCS TheoryNegative-Weight Single-Source Shortest Paths in Near-Linear TimeAaron Bernstein, Rutgers University; et al.
Danupon Nanongkai, University of Copenhagen
Christian Wulff-Nilsen, University of Copenhagen
Maximum Flow and Minimum-Cost Flow in Almost-Linear TimeLi Chen, Georgia Institute of Technology; et al.
Rasmus Kyng, ETH Zurich
Yang P. Liu, Stanford University
Richard Peng, University of Waterloo
Maximilian Probst Gutenberg, ETH Zurich
Sushant Sachdeva, University of Toronto
FSE Software EngineeringUsing Nudges to Accelerate Code Reviews at ScaleQianhua Shan, Meta; et al.
David Sukhdeo, Meta
Qianying Huang, Meta
Seth Rogers, Meta
Lawrence Chen, Meta
Elise Paradis, Meta
Peter Rigby, Concordia University
Nachiappan Nagappan, Meta
Minerva: Browser API Fuzzing with Dynamic Mod-Ref AnalysisChijin Zhou, Tsinghua University; et al.
Quan Zhang, Tsinghua University
Mingzhe Wang, Tsinghua University
Lihua Guo, Tsinghua University
Jie Liang, Tsinghua University
Zhe Liu, Nanjing University
Mathias Payer, École Polytechnique Fédérale de Lausanne
Yu Jiang, Tsinghua University
The Evolution of Type Annotations in Python: An Empirical StudyLuca Di Grazia & Michael Pradel, University of Stuttgart
Online Testing of RESTful APIs: Promises and ChallengesAlberto Martin-Lopez, University of Seville; et al.
Sergio Segura, University of Seville
Antonio Ruiz-Cortés, University of Seville
Asynchronous Technical Interviews: Reducing the Effect of Supervised Think-Aloud on Communication AbilityMahnaz (Mana) Behroozi, IBM; et al.
Chris Brown, North Carolina State University
Chris Parnin, Virginia Tech
SPINE: A Scalable Log Parser with Feedback GuidanceXuheng Wang, Tsinghua University; et al.
Xu Zhang, Microsoft
Liqun Li, Microsoft
Shilin He, Microsoft
Hongyu Zhang, University of Newcastle
Yudong Liu, Microsoft
Lingling Zheng, Microsoft
Yu Kang, Microsoft
Qingwei Lin, Microsoft
Yingnong Dang, Microsoft
Saravan Rajmohan, Microsoft
Dongmei Zhang, Microsoft
First Come First Served: The Impact of File Position on Code ReviewEnrico Fregnan, University of Zurich; et al.
Larissa Braz, University of Zurich
Marco D'Ambros, USI Lugano
Gül Calikli, University of Glasgow
Alberto Bacchelli, University of Zurich
ICML Machine LearningUnderstanding Dataset Difficulty with V-Usable InformationKawin Ethayarajh, Stanford University; et al.
Yejin Choi, Stanford University
Swabha Swayamdipta, Allen Institute for Artificial Intelligence
Do Differentiable Simulators Give Better Policy Gradients?Hyung Ju Suh, Massachusetts Institute of Technology; et al.
Max Simchowitz, Massachusetts Institute of Technology
Kaiqing Zhang, Massachusetts Institute of Technology
Russ Tedrake, Massachusetts Institute of Technology
The Importance of Non-Markovianity in Maximum State Entropy ExplorationMirco Mutti, Politecnico di Milano; et al.
Riccardo De Santi, ETH Zurich
Marcello Restelli, Politecnico di Milano
G-Mixup: Graph Data Augmentation for Graph ClassificationXiaotian Han, Texas A&M University; et al.
Zhimeng Jiang, Texas A&M University
Ninghao Liu, University of Georgia
Xia Hu, Rice University
Privacy for Free: How does Dataset Condensation Help Privacy?Tian Dong, Shanghai Jiao Tong University; et al.
Bo Zhao, University of Edinburgh
Lingjuan Lyu, Sony AI
Stable Conformal Prediction SetsEugene Ndiaye, Georgia Institute of Technology
Bayesian Model Selection, the Marginal Likelihood, and GeneralizationSanae Lotfi, New York University; et al.
Pavel Izmailov, New York University
Gregory Benton, New York University
Micah Goldblum, New York University
Andrew Wilson, New York University
Solving Stackelberg Prediction Game with Least Squares Loss via Spherically Constrained Least Squares ReformulationJiali Wang, Fudan University; et al.
Wen Huang, Xiamen University
Rujun Jiang, Fudan University
Xudong Li, Fudan University
Alex Wang, Carnegie Mellon University
Learning Mixtures of Linear Dynamical SystemsYanxi Chen & H. Vincent Poor, Princeton University
Causal Conceptions of Fairness and their ConsequencesHamed Nilforoshan, Stanford University; et al.
Johann Gaebler, Stanford University
Ravi Shroff, New York University
Sharad Goel, Harvard University
ICSE Software EngineeringTOGA: A Neural Method for Test Oracle GenerationElizabeth Dinella, University of Pennsylvania; et al.
Gabriel Ryan, Columbia University
Todd Mytkowicz, Microsoft
Shuvendu K. Lahiri, Microsoft
SymTuner: Maximizing the Power of Symbolic Execution by Adaptively Tuning External ParametersSooyoung Cha, Sungkyunkwan University; et al.
Myungho Lee, Korea University
Seokhyun Lee, Korea University
Hakjoo Oh, Korea University
What Makes a Good Commit Message?Tian Yingchen, Beijing Institute of Technology; et al.
Yuxia Zhang, Beijing Institute of Technology
Klaas-Jan Stol, University College Cork
Lin Jiang, Beijing Institute of Technology
Hui Liu, Beijing Institute of Technology
Collaboration Challenges in Building ML-Enabled Systems: Communication, Documentation, Engineering, and ProcessNadia Nahar, Carnegie Mellon University; et al.
Shurui Zhou, University of Toronto
Grace Lewis, Carnegie Mellon University
Christian Kästner, Carnegie Mellon University
Did You Miss My Comment or What?" Understanding Toxicity in Open Source DiscussionsCourtney Miller, Carnegie Mellon University; et al.
Sophie Cohen, Wesleyan University
Daniel Klug, Carnegie Mellon University
Bogdan Vasilescu, Carnegie Mellon University
Christian Kästner, Carnegie Mellon University
"This Is Damn Slick!" Estimating the Impact of Tweets on Open Source Project Popularity and New ContributorsHongbo Fang, Carnegie Mellon University; et al.
Hemank Lamba, Carnegie Mellon University
Jim Herbsleb, Carnegie Mellon University
Bogdan Vasilescu, Carnegie Mellon University
Efficient Online Testing for DNN-Enabled Systems using Surrogate-Assisted and Many-Objective OptimizationFitash Ul Haq, University of Luxembourg; et al.
Donghwan Shin, University of Luxembourg
Lionel Briand, University of Luxembourg
PUS: A Fast and Highly Efficient Solver for Inclusion-based Pointer AnalysisPeiming Liu, Texas A&M University; et al.
Yanze Li, Texas A&M University
Bradley Swain, Texas A&M University
Jeff Huang, Texas A&M University
Diversity-Driven Automated Formal VerificationEmily First & Yuriy Brun, University of Massachusetts Amherst
IJCAI Artificial IntelligenceDESPOT: Online POMDP Planning with RegularizationNan Ye, Queensland University of Technology; et al.
Adhiraj Somani, National University of Singapore
David Hsu, National University of Singapore
Wee Sun Lee, National University of Singapore
INFOCOM NetworkingChARM: NextG Spectrum Sharing Through Data-Driven Real-Time O-RAN Dynamic ControlLuca Baldesi, Northeastern University; et al.
Francesco Restuccia, Northeastern University
Tommaso Melodia, Northeastern University
PreGAN: Preemptive Migration Prediction Network for Proactive Fault-Tolerant Edge ComputingShreshth Tuli, Imperial College London; et al.
Giuliano Casale, Imperial College London
Nicholas Jennings, Loughborough University
ISCA ArchitectureNvMR: Non-Volatile Memory Renaming for Intermittent ComputingAbhishek Bhattacharyya, University of Wisconsin–Madison; et al.
Abhijith Somashekhar, Apple
Joshua San Miguel, University of Wisconsin–Madison
KDD Data MiningLearning Causal Effects on HypergraphsJing Ma, University of Virginia; et al.
Mengting Wan, Microsoft
Longqi Yang, Microsoft
Jundong Li, University of Virginia
Brent Hecht, Microsoft
Jaime Teevan, Microsoft
MOBICOM MobileMagnetoelectric Backscatter Communication for Millimeter-Sized Wireless Biomedical ImplantsZhanghao Yu, Rice University; et al.
Fatima T. Alrashdan, Rice University
Jacob T. Robinson, Rice University
Kaiyuan Yang, Rice University
NeurIPS Machine LearningIs Out-of-distribution Detection Learnable?Zhen Fang, University of Technology Sydney; et al.
Yixuan Li, University of Wisconsin–Madison
Jie Lu, University of Technology Sydney
Jiahua Dong, ETH Zurich
Bo Han, Hong Kong Baptist University
Feng Liu, University of Technology Sydney
Photorealistic Text-to-Image Diffusion Models with Deep Language UnderstandingChitwan Saharia, Google; et al.
William Chan, Google
Saurabh Saxena, Google
Lala Li, Google
Jay Whang, Google
Emily Denton, Google
Seyed Kamyar, Google
Seyed Ghasemipour, Google
Burcu Karagol Ayan, Google
S. Sara Mahdavi, Google
Raphael Gontijo-Lopes, Google
Tim Salimans, Google
Jonathan Ho, Google
David J Fleet, Google
Mohammad Norouzi, Google
Elucidating the Design Space of Diffusion-Based Generative ModelsTero Karras, NVIDIA; et al.
Miika Aittala, NVIDIA
Timo Aila, NVIDIA
Samuli Laine, NVIDIA
ProcTHOR: Large-Scale Embodied AI Using Procedural GenerationMatt Deitke, Allen Institute for Artificial Intelligence; et al.
Eli VanderBilt, Allen Institute for Artificial Intelligence
Alvaro Herrasti, Allen Institute for Artificial Intelligence
Luca Weihs, Allen Institute for Artificial Intelligence
Jordi Salvador, Allen Institute for Artificial Intelligence
Kiana Ehsani, Allen Institute for Artificial Intelligence
Winson Han, Allen Institute for Artificial Intelligence
Eric Kolve, Allen Institute for Artificial Intelligence
Ali Farhadi, University of Washington
Aniruddha Kembhavi, Allen Institute for Artificial Intelligence
Roozbeh Mottaghi, Allen Institute for Artificial Intelligence
Using natural language and program abstractions to instill human inductive biases in machinesSreejan Kumar, Princeton University; et al.
Carlos G Correa, Princeton University
Ishita Dasgupta, DeepMind
Raja Marjieh, Princeton University
Michael Hu, Princeton University
Robert D. Hawkins, Princeton University
Jonathan Cohen, Princeton University
Nathaniel Daw, Princeton University
Karthik R Narasimhan, Princeton University
Thomas L. Griffiths, Princeton University
A Neural Corpus Indexer for Document RetrievalYujing Wang, Microsoft; et al.
Yingyan Hou, Tsinghua University
Haonan Wang, University of Illinois at Urbana Champaign
Ziming Miao, Microsoft
Shibin Wu, Tsinghua University
Hao Sun, Peking University
Qi Chen, Microsoft
Yuqing Xia, Microsoft
Chengmin Chi, Microsoft
Guoshuai Zhao, Microsoft
Zheng Liu, Microsoft
Xing Xie, Microsoft
Hao Sun, Microsoft
Weiwei Deng, Microsoft
Qi Zhang, Microsoft
Mao Yang, Microsoft
High-dimensional limit theorems for SGD: Effective dynamics and critical scalingGerard Ben Arous, New York University; et al.
Reza Gheissari, Northwestern University
Aukosh Jagannath, University of Waterloo
Riemannian Score-Based Generative ModellingValentin De Bortoli, National Center for Scientific Research; et al.
Emile Mathieu, University of Cambridge
Michael John Hutchinson, University of Oxford
James Thornton, University of Oxford
Yee Whye Teh, University of Oxford
Arnaud Doucet, University of Oxford
Gradient Estimation with Discrete Stein OperatorsJiaxin Shi, Stanford University; et al.
Yuhao Zhou, Tsinghua University
Jessica Hwang, Stanford University
Michalis Titsias, Deepmind
Lester Mackey, Microsoft
An empirical analysis of compute-optimal large language model trainingJordan Hoffmann, Deepmind; et al.
Sebastian Borgeaud, Deepmind
Arthur Mensch, Deepmind
Elena Buchatskaya, Deepmind
Trevor Cai, Deepmind
Eliza Rutherford, Deepmind
Diego de las Casas, Deepmind
Lisa Anne Hendricks, Deepmind
Johannes Welbl, Deepmind
Aidan Clark, Deepmind
Tom Hennigan, Deepmind
Eric Noland, Deepmind
Katherine Millican, Deepmind
George van den Driessche, Deepmind
Bogdan Damoc, Deepmind
Aurelia Guy, Deepmind
Simon Osindero, Deepmind
Karen Simonyan, Deepmind
Erich Elsen, Deepmind
Oriol Vinyals, Deepmind
Jack William Rae, Deepmind
Laurent Sifre, Deepmind
Beyond neural scaling laws: beating power law scaling via data pruningBen Sorscher, Stanford University; et al.
Robert Geirhos, University of Tübingen
Shashank Shekhar, Meta
Surya Ganguli, Stanford University
Ari S. Morcos, Meta
On-Demand Sampling: Learning Optimally from Multiple DistributionsNika Haghtalab, University of California, Berkeley; et al.
Michael Jordan, University of California, Berkeley
Eric Zhao, University of California, Berkeley
NSDI NetworkingPacket Order Matters! Improving Application Performance by Deliberately Delaying PacketsHamid Ghasemirahni, Royal Institute of Technology; et al.
Tom Barbette, Royal Institute of Technology
Georgios P. Katsikas, Royal Institute of Technology
Alireza Farshin, Royal Institute of Technology
Amir Roozbeh, KTH Royal Institute of Technology and Ericsson Research
Massimo Girondi, Royal Institute of Technology
Marco Chiesa, Royal Institute of Technology
Gerald Q. Maguire Jr., Royal Institute of Technology
Dejan Kostić, Royal Institute of Technology
Graham: Synchronizing Clocks by Leveraging Local Clock PropertiesAli Najafi, Meta
Michael Wei, VMware Inc.
Learning to Communicate Effectively Between Battery-free DevicesKai Geissdoerfer & Marco Zimmerling, TU Dresden
OSDI Operating SystemsXRP: In-Kernel Storage Functions with eBPFYuhong Zhong, Columbia University; et al.
Haoyu Li, Columbia University
Yu Jian Wu, Columbia University
Ioannis Zarkadas, Columbia University
Jeffrey Tao, Columbia University
Evan Mesterhazy, Columbia University
Michael Makris, Columbia University
Junfeng Yang, Columbia University
Amy Tai, Google
Ryan Stutsman, University of Utah
Asaf Cidon, Columbia University
MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly RuntimeChenxi Wang, University of California, Los Angeles; et al.
Haoran Ma, University of California, Los Angeles
Shi Liu, University of California, Los Angeles
Yifan Qiao, University of California, Los Angeles
Jonathan Eyolfson, University of California, Los Angeles
Christian Navasca, University of California, Los Angeles
Shan Lu, University of Chicago
Guoqing Harry Xu, University of California, Los Angeles
PLDI Programming LanguagesFinding Typing Compiler BugsStefanos Chaliasos, Imperial College London; et al.
Thodoris Sotiropoulos, Athens University of College and Business
Diomidis Spinellis, Athens University of College and Business
Arthur Gervais, Imperial College London
Ben Livshits, Imperial College London
Dimitris Mitropoulos, University of Athens
Kleene Algebra Modulo Theories: A Framework for Concrete KATsMichael Greenberg, Stevens Institute of Technology; et al.
Ryan Beckett, Microsoft
Eric Campbel, Cornell University
Low-Latency, High-Throughput Garbage CollectionWenyu Zhao, Australian National University; et al.
Steve Blackburn, Google
Kathryn S McKinley, Google
RustHornBelt: A Semantic Foundation for Functional Verification of Rust Programs with Unsafe CodeYusuke Matsushita, The University of Tokyo; et al.
Xavier Denis, Paris-Saclay University
Jacques-Henri Jourdan, Paris-Saclay University
Derek Dreyer, Max Planck Institute for Software Systems
Synthesizing Analytical SQL Queries from Computation DemonstrationXiangyu Zhou, University of Washington; et al.
Rastislav Bodík, University of Washington
Alvin Cheung, University of California, Berkeley
Chenglong Wang, University of Washington
Visualization Question Answering Using Introspective Program SynthesisYanju Chen, University of California, Santa Barbara; et al.
Xifeng Yan, University of California, Santa Barbara
Yu Feng, University of California, Santa Barbara
PODS DatabasesConvergence of Datalog over (Pre-) SemiringsMahmoud Abo Khamis, relationalAI; et al.
Hung Q. Ngo, relationalAI
Reinhard Pichler, TU Wien
Dan Suciu, University of Washington
Yisu Remy Wang, University of Washington
Optimal Bounds for Approximate CountingJelani Nelson, University of California, Berkeley
Huacheng Yu, Princeton University
S&P Security and PrivacyFour Attacks and a Proof for TelegramMartin R. Albrecht, University of London; et al.
Lenka Mareková, University of London
Kenneth G. Paterson, ETH Zurich
Igors Stepanovs, ETH Zurich
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code ContributionsHammond Pearce, New York University; et al.
Baleegh Ahmad, New York University
Benjamin Tan, New York University
Brendan Dolan-Gavitt, New York University
Ramesh Karri, New York University
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic DevicesHaoqi Shan, University of Florida; et al.
Boyi Zhang, University of Florida
Zihao Zhan, University of Florida
Dean Sullivan, University of New Hampshire
Shuo Wang, University of Florida
Yier Jin, University of Florida
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software ProjectsDominik Wermke, CISPA; et al.
Noah Woehler, CISPA
Jan H. Klemmer, Leibniz University Hannover
Marcel Fourné, Max Planck Institute for Security and Privacy
Yasemin Acar, George Washington University
Sascha Fahl, CISPA
SIGCOMM NetworkingSoftware-Defined Network Assimilation: Bridging the Last Mile Towards Centralized Network Configuration Management with NAssimHuangxun Chen, Huawei Theory Lab; et al.
Yukai Miao, University of New South Wales
Li Chen, Zhongguancun Laboratory
Haifeng Sun, Beijing University of Posts and Telecommunications
Hong Xu, The Chinese University of Hong Kong
Libin Liu, Shandong Computer Science Center
Gong Zhang, Huawei Theory Lab
Wei Wang, Hong Kong University of Science and Technology
SIGGRAPH GraphicsImage Features Influence Reaction Time: A Learned Probabilistic Perceptual Model for Saccade LatencyBudmonde Duinkharjav, New York University; et al.
Praneeth Chakravarthula, Princeton University
Rachel Brown, NVIDIA
Anjul Patney, NVIDIA
Qi Sun, New York University
CLIPasso: Semantically Aware Object SketchingYael Vinker, Tel Aviv University; et al.
Ehsan Pajouheshgar, École Polytechnique Fédérale de Lausanne
Jessica Y. Bo, École Polytechnique Fédérale de Lausanne
Roman Christian Bachmann, École Polytechnique Fédérale de Lausanne
Amit Bermano, Tel Aviv University
Daniel Cohen-Or, Tel Aviv University
Amir Zamir, École Polytechnique Fédérale de Lausanne
Ariel Shamir, Reichman University
Instant Neural Graphics Primitives with a Multiresolution Hash EncodingThomas Müller, NVIDIA; et al.
Alex Evans, NVIDIA
Christoph Schied, NVIDIA
Alexander Keller, NVIDIA
Spelunking the Deep: Guaranteed Queries on General Neural Implicit SurfacesNicholas Sharp & Alec Jacobson, University of Toronto
DeepPhase: Periodic Autoencoders for Learning Motion Phase ManifoldsSebastian Starke, University of Edinburgh; et al.
Ian Mason, University of Edinburgh
Taku Komura, University of Hong Kong
SIGIR Information RetrievalA Non-Factoid Question-Answering TaxonomyValeriia Bolotova, RMIT University; et al.
Vladislav Blinov, Ural Federal University
Falk Scholer, RMIT University
Bruce Croft, University of Massachusetts Amherst
Mark Sanderson, RMIT University
SIGMETRICS PerformanceWISEFUSE: Workload Characterization and DAG Transformation for Serverless WorkflowsAshraf Mahgoub, Purdue University; et al.
Edgardo Barsallo Yi, Purdue University
Karthick Shankar, Carnegie Mellon University
Eshaan Minocha, Purdue University
Somali Chaterji, Purdue University
Sameh Elnikety, Microsoft
Saurabh Bagchi, Purdue University
SIGMOD DatabasesR2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign KeysWei Dong, Hong Kong University of Science and Technology; et al.
Juanru Fang, Hong Kong University of Science and Technology
Ke Yi, Hong Kong University of Science and Technology
Yuchao Tao, Duke University
Ashwin Machanavajjhala, Duke University
SODA TheoryNew Diameter-Reducing Shortcuts and Directed Hopsets: Breaking the √n BarrieShimon Kogan & Merav Parter, Weizmann Institute of Science
STOC TheoryLocally testable codes with constant rate, distance, and localityIrit Dinur, Weizmann Institute of Science; et al.
Shai Evra, Hebrew University of Jerusalem
Ron Livne, Hebrew University of Jerusalem
Alexander Lubotzky, Weizmann Institute of Science
Shahar Mozes, Hebrew University of Jerusalem
Asymptotically good Quantum and locally testable classical LDPC codesPavel Panteleev & Gleb Kalachev, Moscow State University
UIST User InterfaceCrossA11y: Identifying Video Accessibility Issues via Cross-modal GroundingXingyu 'Bruce' Liu, University of California, Los Angeles; et al.
Ruolin Wang, University of California, Los Angeles
Dingzeyu Li, Adobe
Xiang 'Anthony' Chen, University of California, Los Angeles
Amy Pavel, University of Texas at Austin
Grid-Coding: An Accessible, Efficient, and Structured Coding Paradigm for Blind and Low-Vision ProgrammersMd Ehtesham-Ul-Haque, Pennsylvania State University; et al.
Syed Mostofa Monsur, Bangladesh University of Engineering and Technology
Syed Masum Billah, Pennsylvania State University
Prototyping Soft Devices with Interactive BioplasticsMarion Koelle, University of Duisburg-Essen; et al.
Madalina Luciana Nicolae, Saarland University
Aditya Shekhar Nittala, Saarland University
Marc Teyssier, De Vinci Research Center
Jürgen Steimle, Saarland University
VLDB DatabasesSancus: Staleness-Aware Communication-Avoiding Full-Graph Decentralized Training in Large-Scale Graph Neural NetworksJingshu Peng, Hong Kong University of Science and Technology; et al.
Zhao Chen, Hong Kong University of Science and Technology
Yingxia Shao, BUPT
Yanyan Shen, Shanghai Jiao Tong University
Lei Chen, Hong Kong University of Science and Technology
Jiannong Cao, The Hong Kong Polytechnic University
Accurate Summary-based Cardinality Estimation Through the Lens of Cardinality Estimation GraphsJeremy Chen, University of Waterloo; et al.
Yuqing Huang, University of Waterloo
Mushi Wang, University of Waterloo
Semih Salihoglu, University of Waterloo
Kenneth Salem, University of Waterloo
HET: Scaling out Huge Embedding Model Training via Cache-enabled Distributed FrameworkXupeng Miao, Peking University; et al.
Hailin Zhang, Peking University
Yining Shi, Peking University
Xiaonan Nie, Peking University
Zhi Yang, Peking University
Yangyu Tao, Tencent
Bin Cui, Peking University
Hardware Acceleration of Compression and Encryption in SAP HANAMonica Chiosa, ETH Zurich; et al.
Fabio Maschi, ETH Zurich
Ingo Müller, Google
Gustavo Alonso, ETH Zurich
Norman May, SAP SE
WWW World Wide WebPaSca: a Graph Neural Architecture Search System under the Scalable ParadigmWentao Zhang, Peking University; et al.
Yu Shen, Peking University
Zheyu Lin, Peking University
Yang Li, Peking University
Xiaosen Li, Tencent
Wen Ouyang, Tencent
Yangyu Tao, Tencent
Zhi Yang, Peking University
Bin Cui, Peking University
Rewiring what-to-watch-next Recommendations to Reduce Radicalization PathwaysFrancesco Fabbri, Pompeu Fabra University; et al.
Yanhao Wang, East China Normal University
Francesco Bonchi, Fondazione ISI
Carlos Castillo, ICREA and Universitat Pompeu Fabra
Michael Mathioudakis, University of Helsinki
2021
AAAI Artificial IntelligenceInformer: Beyond Efficient Transformer for Long Sequence Time-Series ForecastingHaoyi Zhou, Beihang University; et al.
Shanghang Zhang, University of California, Berkeley
Jieqi Peng, Beihang University
Shuai Zhang, Beihang University
Jianxin Li, Beihang University
Hui Xiong, Rutgers University
Wancai Zhang, Beijing Guowang Fuda Science & Technology Development Company
Exploration-Exploitation in Multi-Agent Learning: Catastrophe Theory Meets Game TheoryStefanos Leonardos & Georgios Piliouras, Singapore University of Technology and Design
ACL Natural Language ProcessingVocabulary Learning via Optimal Transport for Neural Machine TranslationJingjing Xu, ByteDance; et al.
Hao Zhou, ByteDance
Chun Gan, ByteDance
Zaixiang Zheng, ByteDance
Lei Li, ByteDance
CHI Human-Computer InteractionWhat Do Hackathons Do? Understanding Participation in Hackathons Through Program Theory AnalysisJeanette Falk, Aarhus University; et al.
Gopinaath Kannabiran, University of Copenhagen
Nicolai Brodersen Hansen, Aalborg University
Falx: Synthesis-Powered Visualization AuthoringChenglong Wang, University of Washington; et al.
Yu Feng, University of California, Santa Barbara
Rastislav Bodik, University of Washington
Isil Dillig, University of Texas at Austin
Alvin Cheung, University of California, Berkeley
Amy J Ko, University of Washington
"Can I Not Be Suicidal on a Sunday?": Understanding Technology-Mediated Pathways to Mental Health SupportSachin R Pendse, Georgia Institute of Technology; et al.
Amit Sharma, Microsoft
Aditya Vashistha, Cornell University
Munmun De Choudhury, Georgia Institute of Technology
Neha Kumar, Georgia Institute of Technology
CapContact: Super-resolution Contact Areas from Capacitive TouchscreensPaul Streli & Christian Holz, ETH Zurich
RadarNet: Efficient Gesture Recognition Technique Utilizing a Miniaturized Radar SensorEiji Hayashi, Google; et al.
Jaime Lien, Google
Nicholas Gillian, Google
Leonardo Giusti, Google
Dave Weber, Google
Jin Yamanaka, Google
Lauren Bedal, Google
Ivan Poupyrev, Google
Screen Recognition: Creating Accessibility Metadata for Mobile Applications from PixelsXiaoyi Zhang, Apple; et al.
Lilian de Greef, Apple
Amanda Swearngin, Apple
Samuel White, Apple
Kyle Murray, Apple
Lisa Yu, Apple
Qi Shan, Apple
Jeffrey Nichols, Apple
Jason Wu, Apple
Chris Fleizach, Apple
Aaron Everitt, Apple
Jeffrey P Bigham, Apple
LGBTQ Persons' Pregnancy Loss Disclosures to Known Ties on Social Media: Disclosure Decisions and Ideal Disclosure EnvironmentsCassidy Pyle, University of Michigan; et al.
Lee Roosevelt, University of Michigan
Ashley Lacombe-Duncan, University of Michigan
Nazanin Andalibi, University of Michigan
Increasing Electrical Muscle Stimulation's Dexterity by means of Back of the Hand ActuationAkifumi Takahashi, University of Chicago; et al.
Jas Brooks, University of Chicago
Hiroyuki Kajimoto, The University of Electro-Communications
Pedro Lopes, University of Chicago
Designing Menstrual Technologies with AdolescentsMarie Louise Juul Søndergaard, Royal Institute of Technology; et al.
Marianela Ciolfi Felice, Royal Institute of Technology
Madeline Balaam, Royal Institute of Technology
The Show Must Go On: A conceptual model of conducting synchronous participatory design with children onlineKung Jin Lee, University of Washington; et al.
Wendy Roldan, University of Washington
Tian Qi Zhu, University of Washington
Harkiran Kaur Saluja, University of Washington
Sungmin Na, University of Washington
Britnie Chin, University of Washington
Yilin Zeng, University of Washington
Jin Ha Lee, University of Washington
Jason Yip, University of Washington
Building for 'We': Safety Settings for Couples with Memory ConcernsNora McDonald & Helena M. Mentis, University of Maryland, Baltimore County
Oh, Snap! A Fabrication Pipeline to Magnetically Connect Conventional and 3D-Printed ElectronicsMartin Schmitz, TU Darmstadt; et al.
Jan Riemann, TU Darmstadt
Florian Müller, TU Darmstadt
Steffen Kreis, TU Darmstadt
Max Mühlhäuser, TU Darmstadt
Getting Ourselves Together: Data-centered participatory design research & epistemic burdenJennifer Pierre, University of California, Los Angeles; et al.
Roderic Crooks, University of California, Irvine
Morgan Currie, University of Edinburgh
Britt Paris, Rutgers University
Irene Pasquetto, University of Michigan
"Everyone wants to do the model work, not the data work": Data Cascades in High-Stakes AINithya Sambasivan, Google; et al.
Shivani Kapania, Google
Hannah Highfill, Google
Diana Akrong, Google
Praveen Paritosh, Google
Lora M Aroyo, Google
Resisting the Medicalisation of Menopause: Reclaiming the Body through DesignMarianela Ciolfi Felice, Royal Institute of Technology; et al.
Marie Louise Juul Søndergaard, Royal Institute of Technology
Madeline Balaam, Royal Institute of Technology
U!Scientist: Designing for People-Powered Research in MuseumsMmachi God'sglory Obiorah, Northwestern University; et al.
James K.L. Hammerman, Terc
Becky Rother, Adler Planetarium
Will Granger, Adler Planetarium
Haley Margaret West, Northwestern University
Michael Horn, Northwestern University
Laura Trouille, Zooniverse & Adler Planetarium
"Why lose control?" A Study of Freelancers' Perspectives with Gig Economy PlatformsJuan Carlos Alvarez de la Vega, Northumbria University; et al.
Marta E. Cecchinato, Northumbria University
John Rooksby, Northumbria University
"That courage to encourage": Participation and Aspirations in Chat-based Peer Support for Youth Living with HIVNaveena Karusala, University of Washington; et al.
David Odhiambo Seeh, Kenyatta National Hospital
Cyrus Mugo, Kenyatta National Hospital
Brandon Guthrie, University of Washington
Megan A Moreno, University of Wisconsin–Madison
Grace John-Stewart, University of Washington
Irene Inwani, Kenyatta National Hospital
Richard Anderson, University of Washington
Keshet Ronen, University of Washington
The Ethics of Multiplayer Game Design and Community Management: Industry Perspectives and ChallengesLucy A. Sparrow, University of Melbourne; et al.
Martin Gibbs, University of Melbourne
Michael Arnold, University of Melbourne
Coupling Simulation and Hardware for Interactive Circuit DebuggingEvan Strasnick, Stanford University; et al.
Maneesh Agrawala, Stanford University
Sean Follmer, Stanford University
Impact of Task on Attentional Tunneling in Handheld Augmented RealityBrandon Victor Syiem, University of Melbourne; et al.
Ryan M. Kelly, University of Melbourne
Jorge Goncalves, University of Melbourne
Eduardo Velloso, University of Melbourne
Tilman Dingler, University of Melbourne
XRgonomics: Facilitating the Creation of Ergonomic 3D InterfacesJoão Marcelo Evangelista Belo, Aarhus University; et al.
Anna Maria Feit, ETH Zurich
Tiare Feuchtner, Aarhus University
Kaj Grønbæk, Aarhus University
Heuristic Evaluation of Conversational AgentsRaina Langevin, University of Washington; et al.
Ross J Lordon, Microsoft
Thi Avrahami, Rulai
Benjamin R. Cowan, University College Dublin
Tad Hirsch, Northeastern University
Gary Hsieh, University of Washington
Clandestino or Rifugiato? Anti-immigration Meta Ad Targeting in ItalyArthur Capozzi, University of Washington; et al.
Gianmarco De Francisci Morales, Microsoft
Yelena Mejova, Rulai
Corrado Monti, University College Dublin
André Panisson, Northeastern University
Daniela Paolotti, University of Washington
The Landscape and Gaps in Open Source Fairness ToolkitsMichelle Seng Ah Lee & Jatinder Singh, University of Cambridge
Understanding Data Accessibility for People with Intellectual and Developmental DisabilitiesKeke Wu, University of Colorado Boulder; et al.
Emma Petersen, University of Colorado Boulder
Tahmina Ahmad, University of Colorado Boulder
David Burlinson, University of Colorado Boulder
Shea Tanis, University of Colorado Boulder
Danielle Albers Szafir, University of Colorado Boulder
How to Evaluate Object Selection and Manipulation in VR? Guidelines from 20 Years of StudiesJoanna Bergström, University of Copenhagen; et al.
Tor-Salve Dalsgaard, University of Copenhagen
Jason Alexander, University of Bath
Kasper Hornbæk, University of Copenhagen
Designing Interactive Transfer Learning Tools for ML Non-ExpertsSwati Mishra & Jeffrey M Rzeszotarski, Cornell University
CIKM Knowledge ManagementRxNet: Rx-refill Graph Neural Network for Overprescribing DetectionJianfei Zhang, Case Western Reserve University; et al.
Ai-Te Kuo, Auburn University
Jianan Zhao, Case Western Reserve University
Qianlong Wen, Case Western Reserve University
Erin Winstanley, West Virginia University
Chuxu Zhang, Brandeis University
Yanfang Ye, Case Western Reserve University
CVPR Computer VisionGIRAFFE: Representing Scenes as Compositional Generative Neural Feature FieldsMichael Niemeyer & Andreas Geiger, Max Planck Institute for Intelligent Systems
FOCS TheorySuperpolynomial Lower Bounds Against Low-Depth Algebraic CircuitsNutan Limaye, Indian Institute of Technology Kanpur; et al.
Srikanth Srinivasan, Aarhus University
Sébastien Tavenas, Université Grenoble Alpes
FSE Software EngineeringA longitudinal analysis of bloated Java dependenciesCésar Soto-Valero, Royal Institute of Technology; et al.
Thomas Durieux, Royal Institute of Technology
Benoit Baudry, Royal Institute of Technology
AlloyMax: bringing maximum satisfaction to relational specificationsChangjian Zhang, Carnegie Mellon University; et al.
Ryan Wagner, Carnegie Mellon University
Pedro Orvalho, INESC-ID/IST
David Garlan, Carnegie Mellon University
Vasco Manquinho, INESC-ID/IST
Ruben Martins, Carnegie Mellon University
Eunsuk Kang, Carnegie Mellon University
Bias in machine learning software: why? how? what to do?Joymallya Chakraborty, North Carolina State University; et al.
Suvodeep Majumder, North Carolina State University
Tim Menzies, North Carolina State University
Efficient Module-Level Dynamic Analysis for Dynamic Languages with Module RecontextualizationNikos Vasilakis, Massachusetts Institute of Technology; et al.
Grigoris Ntousakis, TU Crete
Veit Heller, Independent Researcher
Martin C. Rinard, Massachusetts Institute of Technology
Probabilistic Delta DebuggingGuancheng Wang, Peking University; et al.
Ruobing Shen, Peking University
Junjie Chen, Tianjin University
Yingfei Xiong, Peking University
Lu Zhang, Peking University
Semantic Bug Seeding: A Learning-Based Approach for Creating Realistic BugsJibesh Patra & Michael Pradel, University of Stuttgart
SmartCommit: A Graph-Based Interactive Assistant for Activity-Oriented CommitsBo Shen, Peking University; et al.
Wei Zhang, Peking University
Christian Kästner, Carnegie Mellon University
Haiyan Zhao, Peking University
Zhao Wei, Huawei
Guangtai Liang, Huawei
Zhi Jin, Peking University
Vet: Identifying and Avoiding UI Exploration TarpitsWenyu Wang, University of Illinois at Urbana–Champaign; et al.
Wei Yang, University of Texas at Dallas
Tianyin Xu, University of Illinois at Urbana–Champaign
Tao Xie, Peking University
ICCV Computer VisionSwin Transformer: Hierarchical Vision Transformer using Shifted WindowsZe Liu, Microsoft; et al.
Yutong Lin, Microsoft
Yue Cao, Microsoft
Han Hu, Microsoft
Yixuan Wei, Microsoft
Zheng Zhang, Microsoft
Stephen Lin, Microsoft
Baining Guo, Microsoft
ICML Machine LearningUnbiased Gradient Estimation in Unrolled Computation Graphs with Persistent Evolution StrategiesPaul Vicol, University of Toronto; et al.
Luke Metz, Google
Jascha Sohl-Dickstein, Google
ICSE Software EngineeringATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android AppsXian Zhan, Hong Kong Polytechnic Institute; et al.
Lingling Fan, Nankai University
Sen Chen, Tianjin University
Feng Wu, Nanyang Technological University
Tianming Liu, Monash University
Xiapu Luo, Hong Kong Polytechnic Institute
Yang Liu, Nanyang Technological University
Automated Query Reformulation for Efficient Search Based on Query Logs from Stack OverflowKaibo Cao, Nanjing University; et al.
Chunyang Chen, Monash University
Sebastian Baltes, University of Adelaide
Christoph Treude, University of Adelaide
Xiang Chen, Nantong University
CodeShovel: Constructing Method-Level Source Code HistoriesFelix Grund, University of British Columbia; et al.
Shaiful Alam Chowdhury, University of British Columbia
Nick Bradley, University of British Columbia
Braxton Hall, University of British Columbia
Reid Holmes, University of British Columbia
Hero: On the Chaos When PATH Meets ModulesYing Wang, Northeastern University China; et al.
Liang Qiao, Northeastern University China
Chang Xu, Nanjing University
Yepang Liu, Southern University of Science and Technology
Shing-Chi Cheung, Hong Kong University of Science and Technology
Na Meng, Virginia Tech
Hai Yu, Northeastern University
Zhiliang Zhu, Northeastern University China
"How Was Your Weekend?" Software Development Teams Working From Home During COVID-19Courtney Miller, New College of Florida; et al.
Paige Rodeghero, Clemson University
Margaret-Anne Storey, University of Victoria
Denae Ford, Microsoft
Thomas Zimmermann, Microsoft
Improving Fault Localization by Integrating Value and Predicate Based Causal Inference TechniquesYigit Kucuk, Case Western Reserve University; et al.
Tim A. D. Henderson, Google
Andy Podgurski, Case Western Reserve University
Interface Compliance of Inline Assembly: Automatically Check, Patch and RefineFrédéric Recoules, Paris-Saclay University; et al.
Sébastien Bardin, Paris-Saclay University
Richard Bonichon, Tweag I/O
Matthieu Lemerre, Paris-Saclay University
Laurent Mounier, Université Grenoble Alpes
Marie-Laure Potet, Université Grenoble Alpes
JEST: N+1-version Differential Testing of Both JavaScript Engines and SpecificationJihyeok Park, KAIST; et al.
Seungmin An, KAIST
Dongjun Youn, KAIST
Gyeongwon Kim, KAIST
Sukyoung Ryu, KAIST
Program Comprehension and Code Complexity Metrics: An fMRI StudyNorman Peitek, Leibniz Institute for Neurobiology; et al.
Sven Apel, Saarland University
Chris Parnin, North Carolina State University
André Brechmann, Leibniz Institute for Neurobiology
Janet Siegmund, Chemnitz University of Technology
Synthesizing Object State Transformers for Dynamic Software UpdatesZelin Zhao, Nanjing University; et al.
Yanyan Jiang, Nanjing University
Chang Xu, Nanjing University
Tianxiao Gu, Alibaba Group
Xiaoxing Ma, Nanjing University
Traceability Transformed: Generating more Accurate Links with Pre-Trained BERT ModelsJinfeng Lin, University of Notre Dame; et al.
Yalin Liu, University of Notre Dame
Qingkai Zeng, University of Notre Dame
Meng Jiang, University of Notre Dame
Jane Cleland-Huang, University of Notre Dame
What Makes a Great Maintainer of Open Source Projects?Edson Dias, Universidade Federal do Pará; et al.
Paulo Meirelles, Reitoria da Unifesp
Fernando Castor, Federal University of Pernambuco UFPE
Igor Steinmacher, Federal University of Technology – Paraná
Igor Wiese, Federal University of Technology – Paraná
Gustavo Pinto, Universidade Federal do Pará
Why don't Developers Detect Improper Input Validation?'; DROP TABLE Papers; -Larissa Braz, University of Zurich; et al.
Enrico Fregnan, University of Zurich
Gül Calikli, University of Zurich
Alberto Bacchelli, University of Zurich
IJCAI Artificial IntelligenceKeep Your Distance: Land Division With SeparationEdith Elkind, University of Oxford; et al.
Erel Segal-Halevi, Ariel University
Warut Suksompong, National University of Singapore
On the Relation Between Approximation Fixpoint Theory and Justification TheorySimon Marynissen, Katholieke Universiteit Leuven; et al.
Bart Bogaerts, Free University of Brussels
Marc Denecker, Katholieke Universiteit Leuven
Learning Generalized Unsolvability Heuristics for Classical PlanningSimon Ståhlberg, Linköping University; et al.
Guillem Francès, Pompeu Fabra University
Jendrik Seipp, Linköping University
INFOCOM NetworkingUplink Multi-User Beamforming on Single RF Chain mmWave WLANsKeerthi Priya Dasala, Rice University; et al.
Josep M Jornet, Northeastern University
Edward W. Knightly, Rice University
mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO SystemsYongce Chen, Virginia Tech; et al.
Yubo Wu, Virginia Tech
Thomas Hou, Virginia Tech
Wenjing Lou, Virginia Tech
Exploiting Simultaneous Communications to Accelerate Data Parallel Distributed Deep LearningShaohuai Shi, Hong Kong University of Science and Technology; et al.
Xiaowen Chu, Hong Kong Baptist University
Bo Li, Hong Kong University of Science and Technology
KDD Data MiningFast and Memory-Efficient Tucker Decomposition for Answering Diverse Time Range QueriesJun-gi Jang & U Kang, Seoul National University
MOBICOM MobilemSAIL: Milligram-Scale Multi-Modal Sensor Platform for Monarch Butterfly Migration TrackingInhee Lee, University of Pittsburgh; et al.
Roger Hsiao, University of Michigan
Gordy Carichner, University of Michigan
Chin-Wei Hsu, University of Michigan
Mingyu Yang, University of Michigan
Sara Shoouri, University of Michigan
Katherine Ernst, University of Michigan
Tess Carichner, University of Michigan
Yuyang Li, University of Pittsburgh
Jaechan Lim, University of Michigan
Cole R. Julick, University of Nebraska–Lincoln
Eunseong Moon, University of Michigan
Yi Sun, University of Michigan
Jamie Phillips, University of Delaware
Kristi L. Montooth, University of Nebraska–Lincoln
Delbert A. Green II, University of Michigan
Hun-Seok Kim, University of Michigan
David Blaauw, University of Michigan
NeurIPS Machine LearningA Universal Law of Robustness via IsoperimetrySébastien Bubeck, Microsoft
Mark Sellke, Stanford University
On the Expressivity of Markov RewardDavid Abel, DeepMind; et al.
Will Dabney, DeepMind
Anna Harutyunyan, DeepMind
Mark K. Ho, Princeton University
Michael Littman, Brown University
Doina Precup, DeepMind
Satinder Singh, DeepMind
Deep Reinforcement Learning at the Edge of the Statistical PrecipiceRishabh Agarwal, Google; et al.
Max Schwarzer, Université de Montréal
Pablo Samuel Castro, Google
Aaron Courville, Université de Montréal
Marc G. Bellemare, Google
MAUVE: Measuring the Gap Between Neural Text and Human Text using Divergence FrontiersKrishna Pillutla, University of Washington; et al.
Swabha Swayamdipta, Allen Institute for Artificial Intelligence
Rowan Zellers, University of Washington
John Thickstun, Stanford University
Sean Welleck, University of Washington
Yejin Choi, Allen Institute for Artificial Intelligence
Zaid Harchaoui, University of Washington
Continuized Accelerations of Deterministic and Stochastic Gradient Descents, and of Gossip AlgorithmsMathieu Even, Inria; et al.
Raphaël Berthier, Inria
Francis Bach, Inria
Nicolas Flammarion, École Polytechnique Fédérale de Lausanne
Pierre Gaillard, Université Grenoble Alpes
Hadrien Hendrikx, Inria
Laurent Massoulié, Inria
Adrien Taylor, Inria
Moser Flow: Divergence-based Generative Modeling on ManifoldsNoam Rozen, Weizmann Institue of Science; et al.
Aditya Grover, Meta
Maximilian Nickel, Meta
Yaron Lipman, Weizmann Institue of Science
Reduced, Reused and Recycled: The Life of a Dataset in Machine Learning ResearchBernard Koch, University of California, Los Angeles; et al.
Emily Denton, Google
Alex Hanna, Google
Jacob Gates Foster, University of California, Los Angeles
ATOM3D: Tasks on Molecules in Three DimensionsRaphael John Lamarre Townshend, Stanford University; et al.
Martin Vögele, Stanford University
Patricia Adriana Suriana, Stanford University
Alexander Derry, Stanford University
Alexander Powers, Stanford University
Yianni Laloudakis, Stanford University
Sidhika Balachandar, Stanford University
Bowen Jing, Stanford University
Brandon M. Anderson, University of Chicago
Stephan Eismann, Stanford University
Risi Kondor, Flatiron Institute
Russ Altman, Stanford University
Ron O. Dror, Stanford University
NSDI NetworkingSegcache: a memory-efficient and scalable in-memory key-value cache for small objectsJuncheng Yang, Carnegie Mellon University; et al.
Yao Yue, Twitter
Rashmi Vinayak, Carnegie Mellon University
ATP: In-network Aggregation for Multi-tenant LearningChonLam Lao, Tsinghua University; et al.
Yanfang Le, University of Wisconsin–Madison
Kshiteej Mahajan, University of Wisconsin–Madison
Yixi Chen, Tsinghua University
Wenfei Wu, Tsinghua University
Aditya Akella, University of Wisconsin–Madison
Michael Swift, University of Wisconsin–Madison
OSDI Operating SystemsMAGE: Nearly Zero-Cost Virtual Memory for Secure ComputationSam Kumar, University of California, Berkeley; et al.
David E. Culler, University of California, Berkeley
Raluca Ada Popa, University of California, Berkeley
DistAI: Data-Driven Automated Invariant Learning for Distributed ProtocolsJianan Yao, Columbia University; et al.
Runzhou Tao, Columbia University
Ronghui Gu, Columbia University
Jason Nieh, Columbia University
Suman Jana, Columbia University
Gabriel Ryan, Columbia University
Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep LearningAurick Qiao, Petuum; et al.
Sang Keun Choe, Carnegie Mellon University
Suhas Jayaram Subramanya, Carnegie Mellon University
Willie Neiswanger, Petuum
Qirong Ho, Petuum
Hao Zhang, Petuum
Gregory R. Ganger, Carnegie Mellon University
Eric P. Xing, MBZUAI
PLDI Programming LanguagesAlive2: Bounded Translation Validation for LLVMNuno P. Lopes, Microsoft; et al.
Juneyoung Lee, Seoul National University
Chung-Kil Hur, Seoul National University
Zhengyang Liu, University of Utah
John Regehr, University of Utah
Cyclic Program SynthesisShachar Itzhaky, Technion – Israel Institute of Technology; et al.
Hila Peleg, Technion – Israel Institute of Technology
Nadia Polikarpova, University of California, San Diego
Reuben N. S. Rowe, Royal Holloway University of London
Ilya Sergey, Yale-NUS College
High Performance Correctly Rounded Math Libraries for 32-bit Floating Point RepresentationsJay P. Lim & Santosh Nagarakatte, Rutgers University
Perceus: Garbage Free Reference Counting with ReuseAlex Reinking, Microsoft; et al.
Ningning Xie, University of Hong Kong
Leonardo de Moura, Microsoft
Daan Leijen, Microsoft
Quantum Abstract InterpretationNengkun Yu, University of Technology Sydney
Jens Palsberg, University of California, Los Angeles
RefinedC: Automating the Foundational Verification of C Code with Refined Ownership TypesMichael Sammler, Max Planck Institute for Software Systems; et al.
Rodolphe Lepigre, Max Planck Institute for Software Systems
Robbert Krebbers, Radboud University Nijmegen
Kayvan Memarian, University Of Cambridge
Derek Dreyer, Max Planck Institute for Software Systems
Deepak Garg, Max Planck Institute for Software Systems
Specification Synthesis with Constrained Horn ClausesSumanth Prabhu, TCS Research; et al.
Grigory Fedyukovich, Florida State University
Kumar Madhukar, TCS Research
Deepak D'Souza, Indian Institute of Science Bangalore
Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical StudyXiaolei Ren, University of Texas at Arlington; et al.
Michael Ho, University of Texas at Arlington
Jiang Ming, University of Texas at Arlington
Jeff Yu Lei, University of Texas at Arlington
Li Li, Monash University
PODS DatabasesRelative Error Streaming QuantilesGraham Cormode, University of Warwick; et al.
Zohar Karnin, Amazon
Edo Liberty, Pinecone
Justin Thaler, Georgetown University
Pavel Veselý, Charles University
S&P Security and PrivacyCompositional Security for Reentrant ApplicationsEthan Cecchetti, Cornell University; et al.
Siqiu Yao, Cornell University
Haobin Ni, Cornell University
Andrew C. Myers, Cornell University
Hardware-Software Contracts for Secure SpeculationMarco Guarnieri, IMDEA Software Institute; et al.
Boris Köpf, Microsoft
Jan Reineke, Saarland University
Pepe Vila, IMDEA Software Institute
SIGCOMM NetworkingSeven Years in the Life of Hypergiants' Off-NetsPetros Gigis, University College London; et al.
Matt Calder, Microsoft
Lefteris Manassakis, FORTH-ICS
George Nomikos, FORTH-ICS
Vasileios Kotronis, FORTH-ICS
Xenofontas Dimitropoulos, FORTH-ICS
Ethan Katz-Bassett, Columbia University
Georgios Smaragdakis, Delft University of Technology
SIGIR Information RetrievalComputationally Efficient Optimization of Plackett-Luce Ranking Models for Relevance and FairnessHarrie Oosterhuis, Radboud University
SIGMETRICS PerformanceNudge: Stochastically Improving upon FCFSIsaac Grosof, Carnegie Mellon University; et al.
Kunhe Yang, Tsinghua University
Ziv Scully , Carnegie Mellon University
Mor Harchol-Balter, Carnegie Mellon University
SIGMOD DatabasesBao: Making Learned Query Optimization PracticalRyan Marcus, Massachusetts Institute of Technology; et al.
Parimarjan Negi, Massachusetts Institute of Technology
Hongzi Mao, Massachusetts Institute of Technology
Nesime Tatbul, Massachusetts Institute of Technology
Mohammad Alizadeh, Massachusetts Institute of Technology
Tim Kraska, Massachusetts Institute of Technology
DFI - The Data Flow Interface for High-Speed NetworksLasse Thostrup, TU Darmstadt; et al.
Jan Skrzypczak, Zuse Institute
Matthias Jasny, TU Darmstadt
Tobias Ziegler, TU Darmstadt
Carsten Binnig, TU Darmstadt
SODA TheorySolving Sparse Linear Systems Faster than Matrix MultiplicationRichard Peng & Santosh Vempala, Georgia Institute of Technology
SOSP Operating SystemsKangaroo: Caching Billions of Tiny Objects on Flash,Sara McAllister, Carnegie Mellon University; et al.
Benjamin Berg, Carnegie Mellon University
Julian Tutuncu-Macias, Carnegie Mellon University
Juncheng Yang, Carnegie Mellon University
Sathya Gunasekar, Meta
Jimmy Lu, Meta
Daniel Berger, University of Washington
Nathan Beckmann, Carnegie Mellon University
Gregory R. Ganger, Carnegie Mellon University
LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline ParallelismJongyul Kim, KAIST; et al.
Insu Jang, KAIST
Waleed Reda, Université catholique de Louvain
Jaeseong Im, KAIST
Marco Canini, KAUST
Dejan Kostić, Royal Institute of Technology
Youngjin Kwon, KAIST
Simon Peter, University of Texas at Austin
Emmett Witchel, University of Texas at Austin
Using Lightweight Formal Methods to Validate a Key-Value Storage Node in Amazon S3James Bornholt, Amazon; et al.
Rajeev Joshi, Amazon
Vytautas Astrauskas, ETH Zurich
Brendan Cully, Amazon
Bernhard Kragl, Amazon
Seth Markle, Amazon
Kyle Sauri, Amazon
Drew Schleit, Amazon
Grant Slatton, Amazon
Serdar Tasiran, Amazon
Jacob Van Geffen, University of Washington
Andrew Warfield, Amazon
STOC TheoryA (Slightly) Improved Approximation Algorithm for Metric TSPAnna R. Karlin, University of Washington; et al.
Nathan Klein, University of Washington
Shayan Oveis Gharan, University of Washington
The Complexity of Gradient Descent: CLS = PPAD ∩ PLSJohn Fearnley, University of Liverpool; et al.
Paul W. Goldberg, University of Oxford
Alexandros Hollender, University of Oxford
Rahul Savani, University of Liverpool
Indistinguishability Obfuscation from Well-Founded AssumptionsAayush Jain, University of California, Los Angeles; et al.
Huijia Lin, University of Washington
Amit Sahai, University of California, Los Angeles
UIST User InterfaceAltering Perceived Softness of Real Rigid Objects by Restricting Fingerpad DeformationYujie Tao, University of Chicago; et al.
Shan-Yuan Teng, University of Chicago
Pedro Lopes, University of Chicago
SoundsRide: Affordance-Synchronized Music Mixing for In-Car Audio Augmented RealityMohamed Kari, University of Duisburg-Essen; et al.
Tobias Grosse-Puppendahl, Porsche AG
Alexander Jagaciak, Porsche AG
David Bethge, Ludwig Maximilian University of Munich
Reinhard Schütte, University of Duisburg-Essen
Christian Holz, ETH Zurich
Ten Million Users and Ten Years Later: Python Tutor's Design Guidelines for Building Scalable and Sustainable Research Software in AcademiaPhilip Guo, University of California, San Diego
VLDB DatabasesScaling Attributed Network Embedding to Massive GraphsRenchi Yang, National University of Singapore; et al.
Jieming Shi, Hong Kong Polytechnic University
Xiaokui Xiao, National University of Singapore
Yin Yang, Hamad bin Khalifa University
Juncheng Liu, National University of Singapore
Sourav S Bhowmick, Nanyang Technological University
WWW World Wide WebTowards Facilitating Empathic Conversations in Online Mental Health Support: A Reinforcement Learning ApproachAshish Sharma, University of Washington; et al.
Inna W. Lin, University of Washington
Adam S. Miner, Stanford University
David C. Atkins, University of Washington
Tim Althoff, University of Washington
2020
AAAI Artificial IntelligenceWINOGRANDE: An Adversarial Winograd Schema Challenge at ScaleKeisuke Sakaguchi, Allen Institute for Artificial Intelligence; et al.
Ronan Le Bras, Allen Institute for Artificial Intelligence
Chandra Bhagavatula, Allen Institute for Artificial Intelligence
Yejin Choi, University of Washington
ACL Natural Language ProcessingBeyond Accuracy: Behavioral Testing of NLP models with ChecklistMarco Tulio Ribeiro, Microsoft; et al.
Tongshuang Wu, University of Washington
Carlos Guestrin, University of Washington
Sameer Singh, University of California, Irvine
CHI Human-Computer InteractionA Design Engineering Approach for Quantitatively Exploring Context-Aware Sentence Retrieval for Nonspeaking Individuals with Motor DisabilitiesPer Ola Kristensson, University of Cambridge; et al.
James Lilley, University of Cambridge
Rolf Black, University of Dundee
Annalu Waller, University of Dundee
Articulating Experience: Reflections from Experts Applying Micro-Phenomenology to Design Research in HCIMirjana Prpa, Simon Fraser University; et al.
Sarah Fdili-Alaoui, Laboratoire de recherche en informatique
Thecla Schiphorst, Simon Fraser University
Philippe Pasquier, Simon Fraser University
Beyond the Prototype: Understanding the Challenge of Scaling Hardware Device ProductionRushil Khurana, Carnegie Mellon University
Steve Hodges, Microsoft
Bug or Feature? Covert Impairments to Human Computer InteractionJohn V. Monaco, Naval Postgraduate School
Co-Designing Checklists to Understand Organizational Challenges and Opportunities around Fairness in AIMichael A. Madaio, Carnegie Mellon University; et al.
Luke Stark, Microsoft
Jennifer Wortman Vaughan, Microsoft
Hanna Wallach, Microsoft
Color and Animation Preferences for a Light Band eHMI in Interactions Between Automated Vehicles and PedestriansDebargha Dey, Eindhoven University of Technology; et al.
Azra Habibovic, Research Institutes of Sweden
Bastian Pflegling, Eindhoven University of Technology
Marieke Martens, Eindhoven University of Technology
Jacques Terken, Eindhoven University of Technology
Connecting Distributed Families: Camera Work for Three-party Mobile Video CallsYumei Gan, The Chinese University of Hong Kong; et al.
Christian Greiffenhagen, The Chinese University of Hong Kong
Stuart Reeves, University of Nottingham
Creating Augmented and Virtual Reality Applications: Current Practices, Challenges, and OpportunitiesNarges Ashtari, Simon Fraser University; et al.
Andrea Bunt, University of Manitoba
Joanna McGrenere, University of British Columbia
Michael Nebeling, University of Michigan
Parmit K. Chilana, Simon Fraser University
Critical Race Theory for HCIIhudiya Finda Ogbonnaya-Ogburu, University of Michigan; et al.
Angela D.R. Smith, Northwestern University
Alexandra To, Carnegie Mellon University
Kentaro Toyama, University of Michigan
Design Study "Lite" Methodology: Expediting Design Studies and Enabling the Synergy of Visualization Pedagogy and Social GoodUzma Haque Syeda, Northeastern University; et al.
Prasanth Murali, Northeastern University
Lisa Roe, Northeastern University
Becca Berkey, Northeastern University
Michelle A. Borkin, Northeastern University
Designing Ambient Narrative-Based Interfaces to Reflect and Motivate Physical ActivityElizabeth L. Murnane, Stanford University; et al.
Xin Jiang, Stanford University
Anna Kong, Stanford University
Michelle Park, Stanford University
Weili Shi, Stanford University
Connor Soohoo, Stanford University
Luke Vink, Stanford University
Iris Xia, Stanford University
Xin Yu, Stanford University
John Yang-Sammataro, Stanford University
Grace Young, Stanford University
Jenny Zhi, Stanford University
Paula Moya, Stanford University
James A. Landay, Stanford University
Designing and Evaluating Calmer, a Device for Simulating Maternal Skin-to-Skin Holding for Premature InfantsSabrina Hauser, Umeå University; et al.
Melinda J. Suto, University of British Columbia
Liisa Holsti, University of British Columbia
Manon Ranger, University of British Columbia
Karon E. MacLean, University of British Columbia
Designing Clinical AAC Tablet Applications with Adults who have Mild Intellectual DisabilitiesRyan Colin Gibson, University of Strathclyde; et al.
Mark D. Dunlop, University of Strathclyde
Matt-Mouley Bouamrane, University of Edinburgh
Revathy Nayar, University of Strathclyde
Designing Trans Technology: Defining Challenges and Envisioning Community-Centered SolutionsOliver L. Haimson, University of Michigan; et al.
Dykee Gorrell, University of Illinois at Urbana–Champaign
Denny L. Starks, University of Michigan
Zu Weinger, University of Michigan
Exploring How Game Genre in Student-Designed Games Influences Computational Thinking DevelopmentGiovanni Maria Troiano, Northeastern University; et al.
Qinyu Chen, Northeastern University
Ángela Vargas Alba, King Juan Carlos University
Gregorio Robles, King Juan Carlos University
Gillian Smith, Worcester Polytechnic Institute
Michael Cassidy, Terc
Eli Tucker-Raymond, Boston University
Gillian Puttick, Terc
Casper Harteveld, Northeastern University
Isness: Using Multi-Person VR to Design Peak Mystical Type Experiences Comparable to PsychedelicsDavid R. Glowacki, University of Bristol; et al.
Mark D. Wonnacott, University of Bristol
Rachel Freire, University of Bristol
Becca R. Glowacki, Goldsmiths, University of London
Ella M. Gale, University of Bristol
James E. Pike, ArtSci International Foundation
Tiu de Haan, ArtSci International Foundation
Mike Chatziapostolou, ArtSci International Foundation
Oussama Metatla, University of Bristol
Me vs. Super(wo)man: Effects of Customization and Identification in a VR ExergameJordan Koulouris, University of Bath; et al.
Zoe Jeffery, University of Bath
James Best, University of Bath
Eamonn O'Neill, University of Bath
Christof Lutteroth, University of Bath
Mental Models of AI Agents in a Cooperative Game SettingKaty Ilonka Gero, Columbia University; et al.
Zahra Ashktorab, IBM
Casey Dugan, IBM
Qian Pan, IBM
James Johnson, IBM
Werner Geyer, IBM
Maria Ruiz, IBM
Sarah Miller, IBM
David R. Millen, IBM
Murray Campbell, IBM
Sadhana Kumaravel, IBM
Wei Zhang, IBM
MRAT: The Mixed Reality Analytics ToolkitMichael Nebeling, University of Michigan; et al.
Maximilian Speicher, University of Michigan
Xizi Wang, University of Michigan
Shwetha Rajaram, University of Michigan
Brian D. Hall, University of Michigan
Zijian Xie, University of Michigan
Alexander R. E. Raistrick, University of Michigan
Michelle Aebersold, University of Michigan
F. Edward G. Happ, University of Michigan
Jiayin Wang, University of Michigan
Yanan Sun, University of Michigan
Lotus Zhang, University of Michigan
Leah E. Ramsier, University of Michigan
Rhea Kulkarni, University of Michigan
On Being Iterated: The Affective Demands of Design ParticipationPaul Dourish, University of California, Irvine; et al.
Christopher Lawrence, University of Technology Sydney
Tuck Wah Leong, University of Technology Sydney
Greg Wadley, University of Melbourne
PenSight: Enhanced Interaction with a Pen-Top CameraFabrice Matulic, Preferred Networks Inc; et al.
Riku Arakawa, Preferred Networks Inc
Brian Vogel, Preferred Networks Inc
Daniel Vogel, University of Waterloo
ReFind: Design, Lived Experience and Ongoingness in BereavementJayne Wallace, Northumbria University; et al.
Kyle Montague, Newcastle University
Trevor Duncan, Northumbria University
Luís P. Carvalho, Newcastle University
Nantia Koulidou, Northumbria University
Jamie Mahoney, Northumbria University
Kellie Morrissey, University of Limerick
Claire Craig, Sheffield Hallam University
Linnea Iris Groot, Newcastle University
Shaun Lawson, Northumbria University
Patrick Olivier, Monash University
Julie Trueman, Northumbria University
Helen Fishe, Sheffield Hallam University
Robots for Inclusive Play: Co-designing an Educational Game With Visually Impaired and Sighted ChildrenOussama Metatla, University of Bristol; et al.
Sandra Bardot, University of Toulouse
Clare Cullen, University of Bristol
Marcos Serrano, University of Toulouse
Christophe Jouffrais, National Center for Scientific Research
Techniques for Flexible Responsive Visualization DesignJane Hoffswell, University of Washington; et al.
Wilmot Li, Adobe
Zhicheng Liu, Adobe
texSketch: Active Diagramming through Pen-and-Ink AnnotationsHariharan Subramonyam, University of Michigan; et al.
Colleen Seifert, University of Michigan
Priti Shah, University of Michigan
Eytan Adar, University of Michigan
The Role of Everyday Sounds in Advanced Dementia CareMaarten Houben, Eindhoven University of Technology; et al.
Rens Brankaert, Eindhoven University of Technology
Saskia Bakker, Philips
Gail Kenning, University of Technology Sydney
Inge Bongers, Tilburg University
Berry Eggen, Eindhoven University of Technology
Touching and Being in Touch with the Menstruating BodyNadia Campo Woytuk, Royal Institute of Technology; et al.
Marie Louise Juul Søndergaard, Royal Institute of Technology
Marianela Ciolfi Felice, Royal Institute of Technology
Madeline Balaam, Royal Institute of Technology
Transparency of CHI Research Artifacts: Results of a Self-Reported SurveyChat Wacharamanotham, University of Zurich; et al.
Lukas Eisenring, University of Zurich
Steve Haroz, Paris-Saclay University
Florian Echtler, Bauhaus University
Trigeminal-based Temperature IllusionsJas Brooks, University of Chicago; et al.
Steven Nagels, University of Chicago
Pedro Lopes, University of Chicago
Wireality: Enabling Complex Tangible Geometries in Virtual Reality with Worn Multi-String HapticsCathy Fang, Carnegie Mellon University; et al.
Yang Zhang, Carnegie Mellon University
Matthew Dworman, Carnegie Mellon University
Chris Harrison, Carnegie Mellon University
Wrex: A Unified Programming-by-Example Interaction for Synthesizing Readable Code for Data ScientistsIan Drosos, University of California, San Diego; et al.
Titus Barik, Microsoft
Philip J. Guo, University of California, San Diego
Robert DeLine, Microsoft
Sumit Gulwani, Microsoft
CIKM Knowledge ManagementDo People and Neural Nets Pay Attention to the Same Words: Studying Eye-tracking Data for Non-factoid QA EvaluationValeria Bolotova, RMIT University; et al.
Vladislav Blinov, Ural Federal University
Yukun Zheng, Tsinghua University
W Bruce Croft, University of Massachusetts
Falk Scholer, RMIT University
Mark Sanderson, RMIT University
FANG: Leveraging Social Context for Fake News Detection Using Graph RepresentationVan Hoang Nguyen, National University of Singapore; et al.
Kazunari Sugiyama, Kyoto University
Preslav Nakov, Qatar Computing Research Institute
Min Yen Kan, National University of Singapore
CVPR Computer VisionUnsupervised Learning of Probably Symmetric Deformable 3D Objects from Images in the WildShangzhe Wu, University of Oxford; et al.
Christian Rupprecht, University of Oxford
Andrea Vedaldi, University of Oxford
FOCS TheoryAn Equivalence Between Private Classification and Online PredictionMark Bun, Boston University; et al.
Roi Livni, Tel Aviv University
Shay Moran, Google
Edge-Weighted Online Bipartite MatchingMatthew Fahrbach, Google; et al.
Zhiyi Huang, The University of Hong Kong
Runzhou Tao, Columbia University
Morteza Zadimoghaddam, Google
A New Minimax Theorem for Randomized AlgorithmsShalev Ben-David & Eric Blais, University of Waterloo
FSE Software EngineeringA Principled Approach to GraphQL Query Cost AnalysisAlan Cha, IBM; et al.
Erik Wittern, IBM
Guillaume Baudart, IBM
James C. Davis, Purdue University
Louis Mandel, IBM
Jim Alain Laredo, IBM
Boosting fuzzer efficiency: an information theoretic perspectiveMarcel Bohme, Monash University; et al.
Valentin J. Manes, KAIST
Sang-kil Cha, KAIST
Community expectations for research artifacts and evaluation processesBen Hermann, University of Poderborn; et al.
Stefan Winter, TU Darmstadt
Janet Siegmund, TU Chemnitz
Deep learning library testing via effective model generationZan Wang, Tianjin University; et al.
Ming Yan, Tianjin University
Junjie Chen, Tianjin University
Shuang Liu, Tianjin University
Dongdi Zhang, Tianjin University
Detecting numerical bugs in neural network architecturesYuhao Zhang, Peking University; et al.
Luyao Ren, Peking University
Liqian Chen, National University of Defense Technology
Yingfei Xiong, Peking University
S. C. Cheung, Hong Kong University of Science and Technology
Tao Xie, Peking University
On decomposing a deep neural network into modulesRangeet Pan & Hridesh Rajan, Iowa State University
Testing self-adaptive software with probabilistic guarantees on performance metricsClaudio Mandrioli, Lund University
Martina Maggio, Saarland University
ICML Machine LearningOn Learning Sets of Symmetric ElementsHaggai Maron, NVIDIA; et al.
Or Litany, Stanford University
Gal Chechik, Stanford University
Ethan Fetaya, Stanford University
Tuning-free Plug-and-Play Proximal Algorithm for Inverse Imaging ProblemsKiaxuan Wei, Beijing Institute of Technology; et al.
Angelica Aviles-Rivero, University of Cambridge
Jingwei Liang, University of Cambridge
Ying Fu, Beijing Institute of Technology
Carola-Bibiane Schonlieb, University of Cambridge
Hua Huang, Beijing Institute of Technology
ICSE Software EngineeringA Machine Learning Approach for Vulnerability CurationChen Yang, Veracode Inc.; et al.
Andrew Santosa, Veracode Inc.
Ang Ming Yi, Singapore Management University
Abishek Sharma, Singapore Management University
Asankhaya Sharma, Veracode Inc.
David Lo, Singapore Management University
Traceability Support for Multi-Lingual Software ProjectsYalin Liu, University of Notre Dame; et al.
Jinfeng Lin, University of Notre Dame
Jane Cleland-Huang, University of Notre Dame
Ethical Mining - A Case Study on MSR Mining ChallengesNicolas Gold & Jens Krinke, University of College London
White Box Fairness Testing through Adversarial SamplingPeixin Zhang, Zhejiang University; et al.
Jingyi Wang, National University of Singapore
Jun Sun, Singapore Management University
Guoliang Dong, Zhejiang University
Xinyu Wang, Zhejiang University
Xingen Wang, Zhejiang University
Jin Song Dong, National University of Singapore
Dai Ting, Huawei
An Empirical Study on Program Failures of Deep Learning JobsRu Zhang, Microsoft; et al.
Wencong Xiao, Alibaba Group
Hongyu Zhang, University of Newcastle Australia
Yu Liu, Microsoft
Haoxiang Lin, Microsoft
Mao Yang, Microsoft
Towards the Use of the Readily Available Tests from the Release Pipeline as Performance Tests. Are we There Yet?Zishuo Ding, Concordia University; et al.
Jinfu Chen, Concordia University
Weiyi Shang, Concordia University
A Tale from the Trenches: Cognitive Biases and Software DevelopmentSouti Chattopadhyay, Oregon State University; et al.
Nicholas Nelson, Oregon State University
Audrey Au, Oregon State University
Natalia Morales, Oregon State University
Christopher Sanchez, Oregon State University
Rahul Pandita, Phase Change Software
Anita Sarma, Oregon State University
Time-travel Testing of Android AppsZhen Dong, National University of Singapore; et al.
Marcel Bohme, Monash University
Lucia Cojocaru, Politechnica University
Abhik Roychoudhury, National University of Singapore
Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language?Nischal Shrestha, North Carolina State University; et al.
Colton Botta, North Carolina State University
Titus Barik, Microsoft
Chris Parnin, North Carolina State University
Big Code!= Big Vocabulary: Open-Vocabulary Models for Source codeRafael-Michael Karampatsis, University of Edinburgh; et al.
Hlib Babii, Free University of Bozen-Bolzano
Romain Robbes, Free University of Bozen-Bolzano
Charles Sutton, Google
Andrea Janes, Free University of Bozen-Bolzano
Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep LearningJieshan Chen, Australian National University; et al.
Chunyang Chen, Monash University
Zhenchang Xing, Australian National University
Xiwei Xu, CSIRO's Data61
Liming Zhu, CSIRO's Data61
Guoqiang Li, Shanghai Jiao Tong University
Jinshui Wang, Fujian University of Technology
Translating Video Recordings of Mobile App Usages into Replayable ScenariosCarlos Bernal-Cardenas, College of William & Mary; et al.
Nathan Cooper, College of William & Mary
Kevin Moran, College of William & Mary
Oscar Chaparro, College of William & Mary
Adrian Marcus, University of Texas at Dallas
Denys Poshyvanyk, College of William & Mary
IJCAI Artificial IntelligenceSynthesizing Aspect-Driven Recommendation Explanations from ReviewsTrung-Hoang Le & Hady W. Lauw, Singapore Management University
A Multi-Objective Approach to Mitigate Negative Side EffectsSandy Saisubramanian, University of Massachusetts; et al.
Ece Kamar, Microsoft
Shlomo Zilberstein, University of Massachusetts
INFOCOM NetworkingPush the Limit of Acoustic Gesture RecognitionYanwen Wang, Hong Kong Polytechnic University; et al.
Jiaxing Shen, Hong Kong Polytechnic University
Yuanqing Zheng, Hong Kong Polytechnic University
On the Power of Randomization for Scheduling Real-Time Traffic in Wireless NetworksChristos Tsanikidis & Javad Ghaderi, Columbia University
Reducing the Service Function Chain Backup Cost over the Edge and Cloud by a Self-Adapting SchemeXiaojun Shang, Stony Brook University; et al.
Yaodong Huang, Stony Brook University
Zhenhua Liu, Stony Brook University
Yuanyuan Yang, Stony Brook University
KDD Data MiningOn Sampled Metrics for Item RecommendationWalid Krichene & Steffen Rendle, Google
MOBICOM MobileHummingbird: Energy Efficient GPS Receiver for Small SatellitesSujay Narayana, Delft University of Technology; et al.
R Venkatesha Prasad, Delft University of Technology
Vijay S Rao, Delft University of Technology
Luca Mottola, Politecnico di Milano
T Venkata Prabhakar, Indian Institute of Science Bangalore
M-Cube: a millimeter-wave massive MIMO software radioRenjie Zhao, University of California, San Diego; et al.
Timothy Woodford, University of California, San Diego
Teng Wei, University of California, San Diego
Kun Qian, University of California, San Diego
Xinyu Zhang, University of California, San Diego
NeurIPS Machine LearningNo-Regret Learning Dynamics for Extensive-Form Correlated EquilibriumAndrea Celli, Politecnico di Milano; et al.
Alberto Marchesi, Politecnico di Milano
Gabriele Farine, Carnegie Mellon University
Nicola Gatti, Politecnico di Milano
Improved guarantees and a multiple-descent curve for the Column Subset Selection Problem and the Nyström methodMichal Derezinski, University of California, Berkeley; et al.
Rajiv Khanna, University of California, Berkeley
Michael W. Mahoney, University of California, Berkeley
Language Models are Few-Shot LearnersTom B. Brown, Open AI; et al.
Benjamin Mann, Open AI
Nick Ryder, Open AI
Melanie Subbiah, Open AI
Jared D. Kaplan, Johns Hopkins University
NSDI NetworkingUnderstanding, Detecting and Localizing Partial Failures in Large System SoftwareChang Lou, Johns Hopkins University; et al.
Peng Huang, Johns Hopkins University
Scott Smith, Johns Hopkins University
AmphiLight: Direct Air-Water Communication with Laser LightCharles J. Carver, Dartmouth College; et al.
Zhao Tian, Dartmouth College
Hongyong Zhang, Dartmouth College
Kofi M. Odame, Dartmouth College
Alberto Quattrini Li, Dartmouth College
Xia Zhou, Dartmouth College
OSDI Operating SystemshXDP: Efficient Software Packet Processing on FPGA NICsMarco Spaziani Brunella, Axbryd; et al.
Giacomo Belocchi, Axbryd
Marco Bonola, Axbryd
Salvatore Pontarelli, Axbryd
Giuseppe Siracusano, NEC Laboratories Europe
Giuseppe Bianchi, University of Rome Tor Vergata
Aniello Cammarano, University of Rome Tor Vergata
Alessandro Palumbo, University of Rome Tor Vergata
Luca Petrucci, University of Rome Tor Vergata
Roberto Bifulco, NEC Laboratories Europe
Byzantine Ordered Consensus without Byzantine OligarchyYunhao Zhang, Cornell University; et al.
Srinath Setty, Microsoft
Qi Chen, Microsoft
Lidong Zhou, Microsoft
Lorenzo Alvisi, Cornell University
Virtual Consensus in DelosMahesh Balakrishnan, Meta; et al.
Jason Flinn, Meta
Chen Shen, Meta
Mihir Dharamshi, Meta
Ahmed Jafri, Meta
Xiao Shi, Meta
Santosh Ghosh, Meta
Hazem Hassan, Meta
Aaryaman Sagar, Meta
Rhed Shi, Meta
Jingming Liu, Meta
Filip Gruszczynski, Meta
Xianan Zhang, Meta
Huy Hoang, Meta
Ahmed Yossef, Meta
Francois Richard, Meta
Yee Jiun Song, Meta
PLDI Programming LanguagesData-Driven Inference of Representation InvariantsAnders Miltner, Princeton University; et al.
Saswat Padhi, University of California, Los Angeles
Todd Millstein, University of California, Los Angeles
David Walker, Princeton University
Armada: Low-Effort Verification of High-Performance Concurrent ProgramsJacob R. Lorch, Microsoft; et al.
Yixuan Chen, University of Michigan
Manos Kapritsos, University of Michigan
Bryan Parno, Carnegie Mellon University
Shaz Qadeer, Novi
Upamanyu Sharma, University of Michigan
James R. Wilcox, Certora
Xueyuan Zhao, Carnegie Mellon University
Validating SMT Solvers via Semantic FusionDominik Winterer, ETH Zurich; et al.
Chengyu Zhang, East China Normal University
Zhendong Su, ETH Zurich
From Folklore to Fact: Comparing Implementations of Stacks and ContinuationsKavon Farvardin & John Reppy, University of Chicago
Fast Graph Simplification for Interleaved Dyck-ReachabilityYuanbo Li, Georgia Institute of Technology; et al.
Qirun Zhang, Georgia Institute of Technology
Thomas Reps, University of Wisconsin–Madison
PODS DatabasesA Framework for Adversarially Robust Streaming AlgorithmsOmri Ben-Eliezer, Tel Aviv University; et al.
Rajesh Jayaram, Carnegie Mellon University
David P. Woodruff, Carnegie Mellon University
Eylon Yogev, Boston University
S&P Security and PrivacyTRRespass: Exploiting the Many Sides of Target Row RefreshPietro Frigo, Vrije Universiteit Amsterdam; et al.
Emanuele Vannacci, Vrije Universiteit Amsterdam
Hasan Hassan, ETH Zurich
Victor van der Veen, Qualcomm
Onur Mutlu, ETH Zurich
Cristiano Giuffrida, Vrije Universiteit Amsterdam
Herbert Bos, Vrije Universiteit Amsterdam
Kaveh Razavi, Vrije Universiteit Amsterdam
SIGCOMM NetworkingRouting on Multiple Optimality CriteriaJoão Luís Sobrinho & Miguel Alves Ferreira, University of Lisbon
SIGIR Information RetrievalControlling Fairness and Bias in Dynamic Learning-to-rankMarco Morik, Technical University of Berlin; et al.
Ashudeep Singh, Cornell University
Jessica Hong, Cornell University
Thorsten Joachims, Cornell University
SIGMETRICS PerformanceRateless Codes for Near-Perfect Load Balancing in Distributed Matrix-Vector MultiplicationAnkur Mallik, Carnegie Mellon University; et al.
Malhar Chaudhari, Oracle Corporation
Utsav Sheth, Automation Anywhere
Ganesh Palanikumar, Apple
Gauri Joshi, Carnegie Mellon University
SIGMOD DatabasesShapeSearch: A Flexible and Efficient System for Shape-based Exploration of TrendlinesTarique Siddiqui, University of Illinois at Urbana–Champaign; et al.
Paul Luh, University of Illinois at Urbana–Champaign
Zesheng Wang, University of Illinois at Urbana–Champaign
Karrie Karahalios, University of Illinois at Urbana–Champaign
Aditya Parameswaran, University of Illinois at Urbana–Champaign
Pump Up the Volume: Processing Large Data on GPUs with Fast InterconnectsClemens Lutz, DFKI GmbH; et al.
Sebastian Breß, Technical University of Berlin
Steffen Zeuch, DFKI GmbH
Tilmann Rabl, HPI Check
Volker Markl, DFKI GmbH
SODA TheoryChasing Convex Bodies OptimallyMark Sellke, Stanford University
Chasing Convex Bodies with Linear Competitive RatioC.J. Argue, Carnegie Mellon University; et al.
Anupam Gupta, Carnegie Mellon University
Guru Guruganesh, Google
Ziye Tang, Carnegie Mellon University
STOC TheoryImproved Bounds for The Sunflower LemmaRyan Alweiss, Princeton University; et al.
Shachar Lovett, University of California, San Diego
Kewen Wu, Peking University
Jiapeng Zheng, Harvard University
UIST User InterfaceHandMorph: A Passive Exoskeleton that Miniaturizes GraspJun Nishida, University of Chicago; et al.
Soichiro Matsuda, University of Tsukuba
Hiroshi Matsui, Ruhr-University Bochum
Shan-Yuan Teng, University of Chicago
Ziwei Liu, University of Chicago
Kenji Suzuki, University of Tsukuba
Pedro Lopes, University of Chicago
VLDB DatabasesOpportunities for optimism in contended main-memory multicore transactionsYihe Huang, Harvard University; et al.
William Qian, Harvard University
Eddie Kohler, Harvard University
Barbara Liskov, Massachusetts Institute of Technology
Liuba Shrira, Brandeis University
WWW World Wide WebOpen Intent Extraction from Natural Language InteractionsNikhita Vedula, Ohio State University; et al.
Nedim Lipka, Adobe
Pranav Maneriker, Ohio State University
Srinivasan Parthasarathy, Ohio State University
2019
AAAI Artificial IntelligenceHow to Combine Tree-Search Methods in Reinforcement LearningYonathan Efroni, Technion – Israel Institute of Technology; et al.
Gal Dalal, Technion – Israel Institute of Technology
Bruno Scherrer, Inria
Shie Mannor, Technion – Israel Institute of Technology
ACL Natural Language ProcessingBridging the Gap between Training and Inference for Neural Machine TranslationWen Zhang, Chinese Academy of Sciences; et al.
Yang Feng, Chinese Academy of Sciences
Fandong Meng, Tencent
Di You, Worcester Polytechnic Institute
Qun Liu, Huawei
CHI Human-Computer Interaction"Occupational Therapy is Making": Design Iteration and Digital Fabrication in Occupational TherapyMegan Hofmann, Carnegie Mellon University; et al.
Kristin Williams, Carnegie Mellon University
Toni Kaplan, Carnegie Mellon University
Stephanie Valencia, Carnegie Mellon University
Gabriella Han, Carnegie Mellon University
Scott E Hudson, Carnegie Mellon University
Jennifer Mankoff, University of Washington
Patrick Carrington, Carnegie Mellon University
"I feel it is my responsibility to stream": Streaming and Engaging with Intangible Cultural Heritage through LivestreamingZhicong Lu, University of Toronto; et al.
Michelle Annett, MishMashMakers
Mingming Fan, University of Toronto
Daniel Wigdor, University of Toronto
Guerilla Warfare and the Use of New (and Some Old) Technology: Lessons from FARC's Armed Struggle in ColombiaDébora De Castro Leal, University of Siegen; et al.
Max Krüger, University of Siegen
Kaoru Misaki, University of Siegen
Dave William Randall, University of Siegen
Volker Wulf, Institute of Information Systems
Investigating Slowness as a Frame to Design Longer-Term Experiences with Personal Data: A Field Study of OllyWilliam Odom, Simon Fraser University; et al.
Ron Wakkary, Eindhoven University of Technology
Jeroen Hol, Eindhoven University of Technology
Bram Naus, Eindhoven University of Technology
Pepijn Verburg, Eindhoven University of Technology
Tal Amram, Simon Fraser University
Amy Chen, Simon Fraser University
Engagement with Mental Health Screening on Mobile Devices: Results from an Antenatal Feasibility StudyKevin Doherty, Trinity College Dublin; et al.
José Marcano Belisario, Imperial College London
Martin Cohn, Imperial College London
Nikolaos Mastellos, Imperial College London
Cecily Morrison, Microsoft
Josip Car, Imperial College London
Gavin Doherty, Trinity College Dublin
Anchored Audio Sampling: A Seamless Method for Exploring Children's Thoughts During Deployment StudiesAlexis Hiniker, University of Washington; et al.
Jon E. Froehlich, University of Washington
Mingrui Zhang, University of Washington
Nikolaos Mastellos, University of Washington
Unremarkable AI: Fitting Intelligent Decision Support into Critical, Clinical Decision-Making ProcessesQian Yang, Carnegie Mellon University; et al.
Aaron Steinfeld, Carnegie Mellon University
John Zimmerman, Carnegie Mellon University
Online grocery delivery services: An opportunity to address food disparities in transportation-scarce areasTawanna Dillahunt, University of Michigan; et al.
Sylvia Simioni, University of Michigan
Xuecong Xu, University of Michigan
Voice User Interfaces in Schools: Co-designing for Inclusion With Visually-Impaired and Sighted PupilsOussama Metatla, University of Bristol; et al.
Alison Oldfield, University of Bristol
Taimur Ahmed, University of Bristol
Antonis Vafeas, University of Bristol
Sunny Miglani, University of Bristol
Increasing the Transparency of Research Papers with Explorable Multiverse AnalysesPierre Dragicevic, Inria; et al.
Yvonne Jansen, CNRS - Sorbonne Université
Abhraneel Sarma, University of Michigan
Matthew Kay, University of Michigan
Fanny Chevalier, University of Toronto
Geppetto: Enabling Semantic Design of Expressive Robot BehaviorsRuta Desai, Carnegie Mellon University; et al.
Fraser Anderson, Autodesk
Justin Matejka, Autodesk
Stelian Coros, ETH Zurich
James L. McCann, Carnegie Mellon University
George Fitzmaurice, Autodesk
Tovi Grossman, Autodesk
Project Sidewalk: A Web-based Crowdsourcing Tool for Collecting Sidewalk Accessibility Data At ScaleManaswi Saha, University of Washington; et al.
Michael Saugstad, University of Washington
Hanuma Teja Maddali, University of Maryland
Aileen Zeng, University of Washington
Ryan Holland, Montgomery Blair High School
Steven Bower, University of Maryland
Aditya Dash, University of Maryland
Sage Chen, University of Michigan
Anthony Li, University of Maryland
Kotaro Hara, Singapore Management University
Jon E. Froehlich, University of Washington
Touchstone2: An Interactive Environment for Exploring Trade-offs in HCI Experiment DesignAlexander Eiselmayer, University of Zurich; et al.
Chat Wacharamanotham, University of Zurich
Michel Beaudouin-Lafon, University of Paris-Sud
Wendy E Mackay, University of Paris-Sud
AffinityLens: Data-Assisted Affinity Diagramming with Augmented RealityHariharan Subramonyam, University of Michigan; et al.
Steven Mark Drucker, Microsoft
Eytan Adar, University of Michigan
A Translational Science Model for HCILucas Colusso, University of Washington; et al.
Ridley Jones, University of Washington
Sean A. Munson, University of Washington
Gary Hsieh, University of Washington
A Tale of Two Perspectives: A Conceptual Framework of User Expectations and Experiences of Instructional Fitness AppsAhed Aladwan, University of Melbourne; et al.
Ryan M Kelly, University of Melbourne
Steven Baker, University of Melbourne
Eduardo Velloso, University of Melbourne
Street-Level Algorithms: A Theory At The Gaps Between Policy and DecisionsAli Alkhatib & Michael Bernstein, Stanford University
Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Safe OnlineKarla A. Badillo-Urquiola, University of Central Florida; et al.
Xinru Woo Page, Bentley University
Pamela J. Wisniewski, University of Central Florida
Protection, Productivity and Pleasure in the Smart Home: Emerging Expectations and Gendered Insights from Australian Early AdoptersYolande A. A. Strengers, Monash University; et al.
Jenny Kennedy, RMIT University
Paula Arcari, RMIT University
Larissa Nicholls, RMIT University
Melissa Gregg, Intel
Detecting Personality Traits Using Eye-Tracking DataShlomo Berkovsky, CSIRO's Data61; et al.
Ronnie Taib, CSIRO's Data61
Irena Koprinska, University of Sydney
Eileen Wang, University of Sydney
Yucheng Zeng, University of Sydney
Jingjie Li, University of Wisconsin–Madison
Sabina Kleitman, University of Sydney
ReType: Quick Text Editing with Keyboard and GazeShyamli Sindhwani, University of Auckland; et al.
Christof Lutteroth, University of Bath
Gerald Weber, University of Auckland
Data is Personal: Attitudes and Perceptions of Data Visualization in Rural PennsylvaniaShyamli Sindhwani, University of Auckland; et al.
Christof Lutteroth, University of Bath
Gerald Weber, University of Auckland
PicMe: Interactive Visual Guidance for Taking Requested Photo CompositionMinju Kim, KAIST
Jungjin Lee, KAI Inc
Managing Messes in Computational NotebooksAndrew Head, University of California, Berkeley; et al.
Titus Barik, Microsoft
Fred Hohman, Georgia Institute of Technology
Steven Mark Drucker, Microsoft
Robert DeLine, Microsoft
A Framework for the Experience of Meaning in Human-Computer InteractionElisa D Mekler, Aalto University
Kasper Hornbæk, University of Copenhagen
Managerial Visions: Stories of Upgrading and Maintaining the Public Restroom with IoTSarah E. Fox, University of California, San Diego; et al.
Kiley Sobel, University of Washington
Daniela K. Rosner, University of Washington
Social Play in an Exergame: How the Need to Belong Predicts AdherenceMaximus D Kaos, Queen's University; et al.
Ryan E Rhodes, University of Victoria
Perttu Hamalainen, Aalto University
T. C. Nicholas Graham, Queen's University
'Think secure from the beginning': A Survey with Software DevelopersHala Assal & Sonia Chiasson, Carleton University
"They Don't Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South AsiaNithya Sambasivan, Google; et al.
Amna Batool, Information Technology University
Nova Ahmed, North South University
Tara Lynn Matthews, Independent Researcher
Kurt Thomas, Google
Laura Sanely Gaytan-Lugo, University of Colima
Elie Bursztein, Google
Elizabeth F. Churchill, Google
Sunny Consolvo, Google
CIKM Knowledge ManagementAutoGRD: Model Recommendation Through Graphical Dataset RepresentationNoy Cohen-Shapira, Ben-Gurion University of the Negev; et al.
Lior Rokach, Ben-Gurion University of the Negev
Bracha Shapira, Ben-Gurion University of the Negev
Gilad Katz, Ben-Gurion University of the Negev
Roman Vainshtein, Ben-Gurion University of the Negev
CVPR Computer VisionA Theory of Fermat Paths for Non-Line-of-Sight Shape ReconstructionShumian Xin, Carnegie Mellon University; et al.
Sotiris Nousias, University College London
Kiriakos N. Kutulakos, University of Toronto
Aswin C. Sankaranarayanan, Carnegie Mellon University
Srinivasa G. Narasimhan, Carnegie Mellon University
Ioannis Gkioulekas, Carnegie Mellon University
FOCS TheoryLower bounds for maximal matchings and maximal independent setsAlkida Balliu, Aalto University; et al.
Sebastian Brandt, ETH Zurich
Juho Hirvonen, Aalto University
Dennis Olivetti, Aalto University
Mikaël Rabie, Aalto University
Jukka Suomela, Aalto University
NEEXP ⊆ MIP*Anand Natarajan, California Institute of Technology
John Wright, Massachusetts Institute of Technology
Automating Resolution is NP-HardAlbert Atserias & Moritz Müller, Polytechnic University of Catalonia
FSE Software EngineeringEmpirical Review of Java Program Repair Tools: A Large-Scale Experiment on 2,141 Bugs and 23,551 Repair AttemptsThomas Durieux, University of Lisbon; et al.
Fernanda Madeiral, Universidade Federal de Uberlândia
Matias Martinez, University Polytechnique Hauts-de-France
Rui Abreu, University of Lisbon
Generating Automated and Online Test Oracles for Simulink Models with Continuous and Uncertain BehaviorsClaudio Menghi, University of Luxembourg; et al.
Shiva Nejati, University of Luxembourg
Khouloud Gaaloul, University of Luxembourg
Lionel C. Briand, University of Luxembourg
The Importance of Accounting for Real-World Labelling When Predicting Software VulnerabilitiesMatthieu Jimenez, University of Luxembourg; et al.
Renaud Rwemalika, University of Luxembourg
Mike Papadakis, University of Luxembourg
Federica Sarro, University College London
Yves Le Traon, University of Luxembourg
Mark Harman, University College London
Assessing the Quality of the Steps to Reproduce in Bug ReportsOscar Chaparro, College of William & Mary; et al.
Carlos Bernal-Cárdenas, College of William & Mary
Jing Lu, University of Texas at Dallas
Kevin Moran, College of William & Mary
Andrian Marcus, University of Texas at Dallas
Massimiliano Di Penta, University of Sannio
Denys Poshyvanyk, College of William & Mary
Vincent Ng, University of Texas at Dallas
A Framework for Writing Trigger-Action Todo Comments in Executable FormatPengyu Nie, University of Texas at Austin; et al.
Rishabh Rai, University of Texas at Austin
Junyi Jessy Li, University of Texas at Austin
Sarfraz Khurshid, University of Texas at Austin
Raymond J. Mooney, University of Texas at Austin
Milos Gligoric , University of Texas at Austin
A Statistics-based Performance Testing Methodology for Cloud ApplicationsSen He, University of Texas at San Antonio; et al.
Glenna Manns, University of Virginia
John Saunders, University of Virginia
Wei Wang, University of Texas at San Antonio
Lori Pollock, University of Delaware
Mary Lou Soffa, University of Virginia
ICCV Computer VisionSinGAN: Learning a Generative Model from a Single Natural ImageTamar Rott Shaham, Technion – Israel Institute of Technology; et al.
Tali Dekel, Google
Tomar Michaeli, Technion – Israel Institute of Technology
ICML Machine LearningChallenging Common Assumptions in the Unsupervised Learning of Disentangled RepresentationsFrancesco Locatello, ETH Zurich; et al.
Stefan Bauer, Max Planck Institute for Intelligent Systems
Mario Lucic, Google
Gunnar Rätsch, ETH Zurich
Sylvain Gelly, Google
Bernhard Schölkopf, Max Planck Institute for Intelligent Systems
Olivier Bachem, Google
Rates of Convergence for Sparse Variational Gaussian Process RegressionDavid R. Burt, University of Cambridge; et al.
Carl E. Rasmussen, University of Cambridge
Mark van der Wilk, PROWLER.io
ICSE Software EngineeringDetecting incorrect build rulesNandor Licker & Andrew Rice, University of Cambridge
Distilling Neural Representations of Data Structure Manipulation using fMRI and fNIRSYu Huang, University of Michigan; et al.
Xinyu Liu, University of Michigan
Tyan Krueger, University of Michigan
Tyler Santander, University of Michigan
Xiaosu Hu, University of Michigan
Kevin Leach, University of Michigan
Westley Weimer, University of Michigan
Do Developers Discover New Tools On The Toilet?Emerson Murphy-Hill, Google; et al.
Edward K. Smith, Bloomberg L.P.
Caitlin Sadowski, Google
Ciara Jaspan, Google
Collin Winter, Waymo
Matthew Jorde, Google
Andrea Knight, Google
Andrew Trenk, Google
Steve Gross, Google
Going Farther Together: The Impact of Social Capital on Sustained Participation in Open SourceHuilian Sophie Qiu, Carnegie Mellon University; et al.
Alexander Nolte, University of Tartu
Anita Brown, Bryn Mawr College
Alexander Serebrenik, Eindhoven University of Technology
Bogdan Vasilescu, Carnegie Mellon University
iSENSE: Completion-Aware Crowdtesting ManagementJunjie Wang, Chinese Academy of Sciences; et al.
Ye Wang, Stevens Institute of Technology
Rahul Krishna, North Carolina State University
Tim Menzies, North Carolina State University
Qing Wang, Software Chinese Academy of Sciences
Redundant Loads: A Software Inefficiency IndicatorPengfei Su, College of William & Mary; et al.
Sasha Wen, College of William & Mary
Hailong Yang, Beihang University
Milind Chabbi, IBM
Xu Liu, College of William & Mary
Resource-Aware Program Analysis Via Online Abstraction CoarseningKihong Heo, University of Pennsylvania; et al.
Hakjoo Oh, Korea University
Hongseok Yang, KAIST
Scalable Approaches for Test Suite ReductionEmilio Cruciani, Gran Sasso Science Institute; et al.
Breno Miranda, Federal University of Pernambuco
Roberto Verdecchia, Gran Sasso Science Institute
Antonia Bertolino, ISTI - Consiglio Nazionale delle Ricerche
SMOKE: Scalable Path-Sensitive Memory Leak Detection for Millions of Lines of CodeGang Fan, Hong Kong University of Science and Technology; et al.
Rongxin Wu, Hong Kong University of Science and Technology
Qingkai Shi, Hong Kong University of Science and Technology
Xiao Xiao, Sourcebrella Inc.
Jinguo Zhou, Sourcebrella Inc.
Charles Zhang, Hong Kong University of Science and Technology
The Seven Sins: Security Smells in Infrastructure as Code ScriptsAkond Rahman, North Carolina State University; et al.
Chris Parnin, North Carolina State University
Laurie Williams, North Carolina State University
View-Centric Performance Optimization for Database-Backed Web ApplicationsJunwen Yang, University of Chicago; et al.
Cong Yan, University of Washington
Chengcheng Wan, University of Chicago
Shan Lu, University of Chicago
Alvin Cheung, University of Washington
IJCAI Artificial IntelligenceBoosting for Comparison-Based LearningMichael Perrot & Ulrike von Luxburg, Max Planck Institute for Intelligent Systems
INFOCOM NetworkingCombinatorial Sleeping Bandits with Fairness ConstraintsFengjiao Li, Iowa State University; et al.
Jia Liu, Iowa State University
Bo Ji, Iowa State University
RF-Mehndi: A Fingertip Profiled RF IdentifierCui Zhao, Xi'an Jiaotong University; et al.
Zhenjiang Li, City University of Hong Kong
Han Ding, Xi'an Jiaotong University
Jinsong Han, Zhejiang University
Wei Xi, Xi'an Jiaotong University
Ting Liu, Xi'an Jiaotong University
Ruowei Gui, Xi'an Jiaotong University
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable ChannelsGuocong Quan, Ohio State University; et al.
Jian Tan, Ohio State University
Atilla Eryilmaz, Ohio State University
KDD Data MiningOptimizing Impression Counts for Outdoor AdvertisingYipeng Zhang, RMIT University; et al.
Yuchen Li, Singapore Management University
Zhifeng Bao, RMIT University
Songsong Mo, Wuhan University
Ping Zhang, Huawei
MOBICOM MobileeBP: A Wearable System For Frequent and Comfortable Blood Pressure Monitoring From User's EarNam Bui, University of Colorado Boulder; et al.
Nhat van Pham, University of Colorado Boulder
Jessica Jacqueline Barnitz, University of Colorado Boulder
Zhanan Zou, University of Colorado Boulder
Phuc Nguyen, University of Colorado Boulder
Anh-Hoang Truong, University of Colorado Boulder
Taeho Kim, University of Colorado Boulder
Nicholas Farrow, University of Colorado Boulder
Anh Nguyen, University of Colorado Boulder
Jianliang Xiao, University of Colorado Boulder
Robin R. Deterding, Children's Hospital Colorado
Thang N. Dinh, University of Colorado Boulder
Tam Vu, University of Colorado Boulder
FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device InteractionSangeun Oh, KAIST; et al.
Ahyeon Kim, KAIST
Sunjae Lee, KAIST
Kilho Lee, KAIST
Dae R. Jeong, KAIST
Steve Ko, University at Buffalo
Insik Shin, KAIST
NeurIPS Machine LearningDistribution-Independent PAC Learning of Halfspaces with Massart NoiseIlias Diakonikolas, University of Southern California; et al.
Themis Gouleakis, Max Planck Institute for Informatics
Christos Tzamos, University of Wisconsin–Madison
NSDI NetworkingDatacenter RPCs can be General and FastZhenpeng Chen, Peking University; et al.
Ziniu Hu, University of California, Los Angeles
Xuan Lu, Peking University
Qiaozhu Mei, University of Michigan
Xuanzhe Liu, Peking University
Understanding Lifecycle Management Complexity of Datacenter TopologiesMingyang Zhang, University of Southern California; et al.
Radhika Naranjan Mysore, VMware Inc.
Sucha Supittayapornpong, University of Southern California
Ramesh Govindan, University of Southern California
PLDI Programming LanguagesLow-Latency Graph Streaming using Compressed Purely-Functional TreesLaxman Dhulipala, Carnegie Mellon University; et al.
Guy E. Blelloch, Carnegie Mellon University
Julian Shun, Massachusetts Institute of Technology
Continuously Reasoning about Programs using Differential Bayesian InferenceKihong Heo, University of Pennsylvania; et al.
Mukund Raghothaman, University of Pennsylvania
Xujie Si, University of Pennsylvania
Mayur Naik, University of Pennsylvania
Towards Certified Separate Compilation for Concurrent ProgramsHanru Jiang, University of Science and Technology of China; et al.
Hongjin Liang, Nanjing University
Siyang Xiao, University of Science and Technology of China
Junpeng Zha, University of Science and Technology of China
Xinyu Feng, Nanjing University
An Inductive Synthesis Framework for Verifiable Reinforcement LearningHe Zhu, Rutgers University; et al.
Zikang Xiong, Purdue University
Stephen Magill, Purdue University
Suresh Jagannathan, Purdue University
A Typed, Algebraic Approach to ParsingNeel Krishnaswami & Jeremy Yallop, University of Cambridge
Optimization and Abstraction: A Synergistic Approach for Analyzing Neural Network RobustnessGreg Anderson, University of Texas at Austin; et al.
Shankara Pailoor, University of Texas at Austin
Isil Dillig, University of Texas at Austin
Swarat Chaudhuri, Rice University
PODS DatabasesInterventional Fairness: Causal Database Repair for Algorithmic FairnessBabak Salimi, University of Washington; et al.
Luke Rodriguez, University of Washington
Bill Howe, University of Washington
Dan Suciu, University of Washington
S&P Security and PrivacySpectre Attacks: Exploiting Speculative ExecutionPaul Kocher, Independent Researcher; et al.
Jann Horn, Google
Anders Fogh, G DATA Advanced Analytics
Daniel Genkin, University of Pennsylvania
Daniel Gruss, Graz University of Technology
Werner Haas, Cyberus Technology
Mike Hamburg, Rambus
Moritz Lipp, Graz University of Technology
Stefan Mangard, Graz University of Technology
Thomas Prescher, Cyberus Technology
Michael Schwarz, Graz University of Technology
Yuval Yarom, University of Adelaide
SIGCOMM NetworkingUnderwater Backscatter NetworkingJunsu Jang & Fadel Abib, Massachusetts Institute of Technology
SIGIR Information RetrievalVariance Reduction in Gradient Exploration for Online Learning to RankHuazheng Wang, University of Virginia; et al.
Sunwoo Kim, University of Virginia
Eric McCord-Snook, University of Virginia
Qingyun Wu, University of Virginia
Hongning Wang, University of Virginia
SIGMETRICS PerformanceComputationally Efficient Estimation of the Spectral Gap of a Markov ChainRichard Combes, Concours Centrale-Supélec
Mikael Touati, Orange Labs
SIGMOD DatabasesInterventional Fairness: Causal Database Repair for Algorithmic FairnessBabak Salimi, University of Washington; et al.
Luke Rodriguez, University of Washington
Bill Howe, University of Washington
Dan Suciu, University of Washington
SODA TheorySublinear Algorithms for (∆ + 1) Vertex ColoringSepehr Assadi, University of Pennsylvania; et al.
Yu Chen, University of Pennsylvania
Sanjeev Khanna, University of Pennsylvania
SOSP Operating SystemsScaling symbolic evaluation for automated verification of systems code with ServalLuke Nelson, University of Washington; et al.
James Bornhold, University of Washington
Ronghui Gu, Columbia University
Andrew Baumann, Microsoft
Emina Torlak, University of Washington
Xi Wang, University of Washington
Efficient Scalable Thread-Safety-Violation DetectionGuangpu Li, University of Chicago; et al.
Shan Lu, University of Chicago
Madanlal Musuvathi, Microsoft
Suman Nath, Microsoft
Rohan Padhye, University of California, San Diego
STOC TheoryThe Reachability Problem for Petri Nets is Not ElementaryWojciech Czerwinski, University of Warsaw; et al.
Slawomir Lasota, University of Warsaw
Ranko Lazic, University of Warsaw
Jerome Leroux, National Center for Scientific Research
Filip Mazowiecki, University of Bordeaux
Oracle Separation of BPQ and PHRan Raz, Princeton University
Avishay Tal, Stanford University
Log-Concave Polynomials II: High-Dimensional Walks and an FPRAS for Counting Basis of a MatroidNima Anari, Stanford University; et al.
Kuikui Liu, University of Washington
Shayan Oveis Gharan, University of Washington
Cynthia Vinzant, North Carolina State University
UIST User InterfaceTipText: Eyes-Free Text Entry on a Fingertip KeyboardZheer Xu, Dartmouth College; et al.
Pui Chung Wong, Dartmouth College
Jun Gong, Dartmouth College
Te-Yen Wu, Dartmouth College
Aditya Nittala, Saarland University
Xiaojun Bi, Stony Brook University
Jürgen Steimle, Saarland University
Hongbo Fu, City University of Hong Kong
Kening Zhu, City University of Hong Kong
Xing-Dong Yang, Dartmouth College
VLDB DatabasesFine-Grained, Secure and Efficient Data Provenance for BlockchainPingcheng Ruan, National University of Singapore; et al.
Gang Chen, Zhejiang University
Tien Tuan Anh Dinh, National University of Singapore
Qian Lin, National University of Singapore
Beng Chin Ooi, National University of Singapore
WWW World Wide WebEmoji-Powered Representation Learning for Cross-Lingual Sentiment ClassificationZhenpeng Chen, Peking University; et al.
Ziniu Hu, University of California, Los Angeles
Xuan Lu, Peking University
Qiaozhu Mei, University of Michigan
Xuanzhe Liu, Peking University
OUTGUARD: Detecting In-Browser Covert Cryptocurrency Mining in the WildAmin Kharraz, University of Illinois at Urbana–Champaign; et al.
Zane Ma, University of Illinois at Urbana–Champaign
Paul Murley, University of Illinois at Urbana–Champaign
Charles Lever, Georgia Institute of Technology
Joshua Mason, University of Illinois at Urbana–Champaign
Andrew Miller, University of Illinois at Urbana–Champaign
Nikita Borisov, University of Illinois at Urbana–Champaign
Manos Antonakakis, Georgia Institute of Technology
Michael Donald Bailey, University of Illinois at Urbana–Champaign
2018
AAAI Artificial IntelligenceMemory-Augmented Monte Carlo Tree SearchChenjun Xiao, University of Alberta; et al.
Jincheng Mei, University of Alberta
Martin Müller, University of Alberta
ACL Natural Language ProcessingFinding syntax in human encephalography with beam searchJohn Hale, Cornell University; et al.
Chris Dyer, DeepMind
Adhiguna Kuncoro, University of Oxford
Jonathan R. Brennan, University of Michigan
Learning to Ask Good Questions: Ranking Clarification Questions using Neural Expected Value of Perfect InformationSudha Rao & Hal Daumé III, University of Maryland
Let's do it "again": A First Computational Approach to Detecting Adverbial Presupposition TriggersAndre Cianflone, McGill University; et al.
Yulan Feng, McGill University
Jad Kabbara, McGill University
Jackie Chi Kit Cheung, McGill University
CHI Human-Computer InteractionAgile 3D Sketching with Air ScaffoldingYongkwan Kim, KAIST; et al.
Sang-Gyun An, KAIST
Joon Hyub Lee, KAIST
Seok-Hyung Bae, KAIST
Pinpointing: Precise Head- and Eye-Based Target Selection for Augmented RealityMikko Kytö, Aalto University; et al.
Barrett Ens, University of South Australia
Thammathip Piumsomboon, University of South Australia
Gun A. Lee, University of South Australia
Mark Billinghurst, University of South Australia
Data Illustrator: Augmenting Vector Design Tools with Lazy Data Binding for Expressive Visualization AuthoringZhicheng Liu, Adobe; et al.
John Thompson, Georgia Institute of Technology
Alan Wilson, Adobe Systems Inc.
Mira Dontcheva, Adobe
James Delorey, Adobe Systems Inc.
Sam Grigg, Adobe Systems Inc.
Bernard Kerr, Adobe Systems Inc.
John Stasko, Georgia Institute of Technology
"A Stalker's Paradise": How Intimate Partner Abusers Exploit TechnologyDiana Freed, Cornell University; et al.
Jackeline Palmer, Hunter College
Diana Minchala, City College of New York
Karen Levy, Cornell University
Thomas Ristenpart, Cornell University
Nicola Dell, Cornell University
Keeping a Low Profile? Technology, Risk and Privacy among Undocumented ImmigrantsTamy Guberek, University of Michigan; et al.
Allison McDonald, University of Michigan
Sylvia Simioni, University of Michigan
Abraham H. Mhaidli, University of Michigan
Kentaro Toyama, University of Michigan
Florian Schaub, University of Michigan
Streets for People: Engaging Children in Placemaking Through a Socio-technical ProcessSean Peacock, Newcastle University; et al.
Robert Anderson, Newcastle University
Clara Crivellaro, Newcastle University
Addressing Age-Related Bias in Sentiment AnalysisMark Diaz, Northwestern University; et al.
Isaac Johnson, Northwestern University
Amanda Lazar, University of Maryland
Anne Marie Piper, Northwestern University
Darren Gergle, Northwestern University
From Her Story, to Our Story: Digital Storytelling as Public Engagement around Abortion Rights Advocacy in IrelandLydia Michie, Newcastle University; et al.
Madeline Balaam, Royal Institute of Technology
John McCarthy, University College Cork
Timur Osadchiy, Newcastle University
Kellie Morrissey, Newcastle University
Gender Recognition or Gender Reductionism?: The Social Implications of Embedded Gender Recognition SystemsFoad Hamidi, University of Maryland; et al.
Morgan Klaus Scheuerman, University of Maryland
Stacy M. Branham, University of Maryland
How Relevant are Incidental Power Poses for HCI?Yvonne Jansen, Sorbonne University
Kasper Hornbæk, University of Copenhagen
Voice Interfaces in Everyday LifeMartin Porcheron, University of Nottingham; et al.
Joel E. Fischer, University of Nottingham
Stuart Reeves, University of Nottingham
Sarah Sharples, University of Nottingham
Examining Wikipedia With a Broader Lens: Quantifying the Value of Wikipedia's Relationships with Other Large-Scale Online CommunitiesNicholas Vincent, Northwestern University; et al.
Isaac Johnson, Northwestern University
Brent Hecht, Northwestern University
Let's Talk About Race: Identity, Chatbots, and AIAri Schlesinger, Georgia Institute of Technology; et al.
Kenton P. O'Hara, Microsoft
Alex S. Taylor, City, University of London
Semi-Automated Coding for Qualitative Research: A User-Centered Inquiry and Initial PrototypesMegh Marathe & Kentaro Toyama, University of Michigan
Wall++: Room-Scale Interactive and Context-Aware SensingYang Zhang, Carnegie Mellon University; et al.
Chouchang (Jack) Yang, Disney Research
Scott E. Hudson, Carnegie Mellon University
Chris Harrison, Carnegie Mellon University
Alanson Sample, Disney Research
HARK No More: On the Preregistration of CHI ExperimentsAndy Cockburn, University of Canterbury; et al.
Carl Gutwin, University of Saskatchewan
Alan Dix, University of Birmingham
Making as Expression: Informing Design with People with Complex Communication Needs through Art TherapyAmanda Lazar, University of Maryland; et al.
Jessica L. Feuston, Northwestern University
Caroline Edasis, Mather LifeWays
Anne Marie Piper, Northwestern University
Expressive Time Series Querying with Hand-Drawn Scale-Free SketchesMiro Mannino & Azza Abouzied, New York University
Project Zanzibar: A Portable and Flexible Tangible Interaction PlatformNicolas Villar, Microsoft; et al.
Daniel Cletheroe, Microsoft
Greg Saul, Microsoft
Christian Holz, Microsoft
Tim Regan, Microsoft
Oscar Salandin, Microsoft
Misha Sra, Microsoft
Hui-Shyong Yeo, Microsoft
William Field, Microsoft
Haiyan Zhang, Microsoft
Experiencing the Body as PlayFlorian 'Floyd' Mueller, RMIT University; et al.
Richard Byrne, RMIT University
Josh Andres, RMIT University
Rakesh Patibanda, RMIT University
Making Core Memory: Design Inquiry into Gendered Legacies of Engineering and CraftworkDaniela K. Rosner, University of Washington; et al.
Samantha Shorey, University of Washington
Brock R. Craft, University of Washington
Helen Remick, Independent Researcher
Design for Collaborative Survival: An Inquiry into Human-Fungi RelationshipsJen Liu, University of Colorado Boulder; et al.
Daragh Byrne, Carnegie Mellon University
Laura Devendorf, University of Colorado Boulder
Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in BangladeshSharifa Sultana, Cornell University; et al.
François Guimbretière, Cornell University
Phoebe Sengers, Cornell University
Nicola Dell, Cornell University
Hoarding and Minimalism: Tendencies in Digital Data PreservationFrancesco Vitale, University of British Columbia; et al.
Izabelle Janzen, University of British Columbia
Joanna McGrenere, University of British Columbia
Extending Manual Drawing Practices with Artist-Centric Programming ToolsJennifer Jacobs, Massachusetts Institute of Technology; et al.
Joel Brandt, Adobe
Radomír Mech, Adobe
Mitchel Resnick, Massachusetts Institute of Technology
CIKM Knowledge ManagementRelevance estimation with multiple information sources on search engine result pagesJunqi Zhang, Tsinghua University; et al.
Yiqun Liu, Tsinghua University
Shaoping Ma, Tsinghua University
Qi Tian, University of Texas at San Antonio
CVPR Computer VisionTaskonomy: Disentangling Task Transfer LearningAmir R. Zamir, Stanford University; et al.
Alexander Sax, Stanford University
William Shen, Stanford University
Leonidas Guibas, Stanford University
Jitendra Malik, University of California, Berkeley
Silvio Savarese, Stanford University
FOCS TheoryClassical Verification of Quantum ComputationUrmila Mahadev, University of California, Berkeley
Pseudorandom Sets in Grassmann Graph have Near-Perfect ExpansionSubhash Khot, New York University; et al.
Dor Minzer, Tel Aviv University
Muli Safra, Tel Aviv University
Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic TimeDiptarka Chakraborty, Computer Science Institute of Charles University; et al.
Debarati Das, Computer Science Institute of Charles University
Elazar Goldenberg, The Academic College of Tel Aviv-Yaffo
Michal Koucký, Computer Science Institute of Charles University
Michael Saks, Rutgers University
FSE Software EngineeringThe Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the Ecosystem ScaleJames C. Davis, Virginia Tech; et al.
Christy A. Coghlan, Virginia Tech
Francisco Servant, Virginia Tech
Dongyoon Lee, Virginia Tech
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing LeaksShengjian (Daniel) Guo, Virginia Tech; et al.
Meng Wu, Virginia Tech
Chao Wang, University of Southern California
Data Race Detection on Compressed TracesDileep Kini, University of Illinois at Urbana–Champaign; et al.
Umang Mathur, University of Illinois at Urbana–Champaign
Mahesh Viswanathan, University of Illinois at Urbana–Champaign
Do Android Taint Analysis Tools Keep Their Promises?Felix Pauck, University of Paderborn; et al.
Eric Bodden, University of Paderborn
Heike Wehrheim, University of Paderborn
An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed SystemsYu Gao, Chinese Academy of Sciences; et al.
Wensheng Dou, Chinese Academy of Sciences
Feng Qin, Ohio State University
Chushu Gao, Chinese Academy of Sciences
Dong Wang, Chinese Academy of Sciences
Jun Wei, Chinese Academy of Sciences
Ruirui Huang, Alibaba Group
Li Zhou, Alibaba Group
Yongming Wu, Alibaba Group
Oreo: Detection of Clones in the Twilight ZoneVaibhav Saini, University of California, Irvine; et al.
Farima Farmahinifarahani, University of California, Irvine
Yadong Lu, University of California, Irvine
Pierre Baldi, University of California, Irvine
Crista Lopes, University of California, Irvine
ICML Machine LearningObfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial ExamplesAnish Athalye, Massachusetts Institute of Technology; et al.
Nicholas Carlini, University of California, Berkeley
David Wagner, University of California, Berkeley
Delayed Impact of Fair Machine LearningLydia T. Liu, University of California, Berkeley; et al.
Sarah Dean, University of California, Berkeley
Esther Rolf, University of California, Berkeley
Max Simchowitz, University of California, Berkeley
Moritz Hardt, University of California, Berkeley
ICSE Software EngineeringLarge-Scale Analysis of Framework-Specific Exceptions in Android AppsLingling Fan, East China Normal University; et al.
Ting Su, Nanyang Technological University
Sen Chen, East China Normal University
Guozhu Meng, Chinese Academy of Sciences
Yang Liu, Nanyang Technological University
Lihua Xu, East China Normal University
Geguang Pu, East China Normal University
Zhendong Su, University of California, Davis
Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-After-Free VulnerabilitiesHua Yan, University of New South Wales; et al.
Yulei Sui, University of Technology Sydney
Shiping Chen, CSIRO's Data61
Jingling Xue, University of New South Wales
Identifying Design Problems in the Source Code: A Grounded TheoryLeonardo Sousa, Pontifical Catholic University of Rio de Janeiro; et al.
Anderson Oliveira, Pontifical Catholic University of Rio de Janeiro
Willian Oizumi, Pontifical Catholic University of Rio de Janeiro
Simone Barbosa, Pontifical Catholic University of Rio de Janeiro
Alessandro Garcia, Pontifical Catholic University of Rio de Janeiro
Jaejoon Lee, University of Lancaster
Marcos Kalinowski, Pontifical Catholic University of Rio de Janeiro
Rafael de Mello, Pontifical Catholic University of Rio de Janeiro
Baldoino Fonseca, Universidade Federal de Alagoas
Roberto Oliveira, Pontifical Catholic University of Rio de Janeiro
Carlos Lucena, Pontifical Catholic University of Rio de Janeiro
Rodrigo Paes, Pontifical Catholic University of Rio de Janeiro
Static Automated Program Repair for Heap PropertiesRijnard van Tonder & Claire Le Goues, Carnegie Mellon University
Automated Localization for Unreproducible BuildsZhilei Ren, Dalian University of Technology; et al.
He Jiang, Dalian University of Technology
Jifeng Xuan, Wuhan University
Zijiang Yang, Western Michigan University
Generalized Data Structure SynthesisCalvin Loncaric, University of Washington; et al.
Michael D. Ernst, University of Washington
Emina Torlak, University of Washington
Traceability in the Wild: Automatically Augmenting Incomplete Trace linksMichael Rath, Technical University Ilmenau; et al.
Jacob Rendall, University of Notre Dame
Jin L. C. Guo, McGill University
Jane Cleland-Huang, University of Notre Dame
Patrick Mäder, Technical University Ilmenau
Towards Optimal Concolic TestingXinyu Wang, Zhejiang University; et al.
Jun Sun, Singapore University of Technology and Design
Zhenbang Chen, National University of Defense Technology
Peixin Zhang, Zhejiang University
Jingyi Wang, Singapore University of Technology and Design
Yun Lin, National University of Singapore
IJCAI Artificial IntelligenceSentiGAN: Generating Sentimental Texts via Mixture Adversarial NetworksKe Wang & Xiaojun Wan, Peking University
Reasoning about Consensus when Opinions Diffuse through Majority DynamicsVincenzo Auletta, University of Salerno; et al.
Diodato Ferraioli, University of Salerno
Gianluigi Greco, University of Calabria
R-SVM+: Robust Learning with Privileged InformationXue Li, Wuhan University; et al.
Bo Du, Wuhan University
Chang Xu, University of Sydney
Yipeng Zhang, Wuhan University
Lefei Zhang, Wuhan University
Dacheng Tao, University of Sydney
From Conjunctive Queries to Instance Queries in Ontology-Mediated QueryingCristina Feier, University of Bremen; et al.
Carsten Lutz, University of Bremen
Frank Wolte, University of Liverpool
What game are we playing? End-to-end learning in normal and extensive form gamesChun Kai Ling, Carnegie Mellon University; et al.
Fei Fang, Carnegie Mellon University
J. Zico Kolter, Carnegie Mellon University
Commonsense Knowledge Aware Conversation Generation with Graph AttentionHao Zhou, Tsinghua University; et al.
Tom Young, Beijing Institute of Technology
Minlie Huang, Tsinghua University
Haizhou Zhao, Sogou
Jingfang Xu, Sogou
Xiaoyan Zhu, Tsinghua University
A Degeneracy Framework for Graph SimilarityGiannis Nikolentzos, École Polytechnique; et al.
Polykarpos Meladianos, Athens University of Economics and Business
Stratis Limnios, École Polytechnique
Michalis Vazirgiannis, École Polytechnique
INFOCOM NetworkingUnderstanding Ethereum via Graph AnalysisTing Chen, University of Electronic Science and Technology of China; et al.
Yuxiao Zhu, Guangdong University of Technology
Zihao Li, University of Electronic Science and Technology of China
Jiachi Chen, Hong Kong Polytechnic University
Xiaoqi Li, Hong Kong Polytechnic University
Xiapu Luo, Hong Kong Polytechnic University
Xiaodong Lin, Wilfrid Laurier University
Xiaosong Zhang, University of Electronic Science and Technology of China
WiFED: WiFi Friendly Energy Delivery with Distributed BeamformingSubhramoy Mohanti, Northeastern University; et al.
Elif Bozkaya, Istanbul Technical University
M. Yousof Naderi, Northeastern University
Berk Canberk, Istanbul Technical University
Kaushik Chowdhury, Northeastern University
Optimizing Age of Information in Wireless Networks with Throughput ConstraintsIgor Kadota, Massachusetts Institute of Technology; et al.
Abhishek Sinha, Massachusetts Institute of Technology
Eytan Modiano, Massachusetts Institute of Technology
KDD Data MiningAdversarial Attacks on Neural Networks for Graph DataDaniel Zügner, Technical University of Munich; et al.
Amir Akbarnejad, Technical University of Munich
Stephan Günnemann, Technical University of Munich
MOBICOM MobileSkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE NetworksMehrdad Moradi, University of Michigan; et al.
Karthikeyan Sundaresan, NEC Labs America
Eugene Chai, NEC Labs America
Sampath Rangarajan, NEC Labs America
Z. Morley Mao, University of Michigan
NeurIPS Machine LearningNon-delusional Q-learning and Value-iterationTyler Lu, Google; et al.
Dale Schuurmans, Google
Craig Boutilier, Google
Optimal Algorithms for Non-Smooth Distributed Optimization in NetworksKevin Scaman, Huawei; et al.
Francis Bach, Inria
Sébastien Bubeck, Microsoft
Yin Tat Lee, Microsoft
Laurent Massoulié, Inria
Nearly Tight Sample Complexity Bounds for Learning Mixtures of Gaussians via Sample Compression SchemesHassan Ashtiani, McMaster University; et al.
Shai Ben-David, University of Waterloo
Nick Harvey, University of British Columbia
Christopher Liaw, University of British Columbia
Abbas Mehrabian, McGill University
Yaniv Plan, University of British Columbia
Neural Ordinary Differential EquationsTian Qi Chen, University of Toronto; et al.
Yulia Rubanova, University of Toronto
Jesse Bettencourt, University of Toronto
David Duvenaud, University of Toronto
NSDI NetworkingNetChain: Scale-Free Sub-RTT CoordinationXin Jin, Johns Hopkins University; et al.
Xiaozhou Li, Barefoot Networks
Haoyu Zhang, Princeton University
Nate Foster, Cornell University
Jeongkeun Lee, Barefoot Networks
Robert Soulé, University of Lugano
Changhoon Kim, Barefoot Networks
Ion Stoica, University of California, Berkeley
OSDI Operating SystemsREPT: Reverse Debugging of Failures in Deployed SoftwareWeidong Cui, Microsoft; et al.
Xinyang Ge, Microsoft
Baris Kasikci, University of Michigan
Ben Niu, Microsoft
Upamanyu Sharma, University of Michigan
Ruoyu Wang, Arizona State University
Insu Yun, Georgia Institute of Technology
LegoOS: A Disseminated, Distributed OS for Hardware Resource DisaggregationYizhou Shan, Purdue University; et al.
Yutong Huang, Purdue University
Yilun Chen, Purdue University
Yiying Zhang, Purdue University
Orca: Differential Bug Localization in Large-Scale ServicesRanjita Bhagwan, Microsoft; et al.
Rahul Kumar, Microsoft
Chandra Sekhar Maddila, Microsoft
Adithya Abraham Philip, Microsoft
PLDI Programming LanguagesProgram synthesis using conflict-driven learningYu Feng, University of Texas at Austin; et al.
Ruben Martins, Carnegie Mellon University
Osbert Bastani, Massachusetts Institute of Technology
Isil Dillig, University of Texas at Austin
A data-driven CHC solverHe Zhu, Galois; et al.
Stephen Magill, Galois
Suresh Jagannathan, Purdue University
The Semantics of Transactions and Weak Memory in x86, Power, ARM, and C++Nathan Chong, weapon; et al.
Tyler Sorensen, Imperial College London
John Wickerson, Imperial College London
PODS DatabasesEntity Matching with Active Monotone ClassificationYufei Tao, The Chinese University of Hong Kong
S&P Security and PrivacyOn Enforcing the Digital Immunity of a Large Humanitarian OrganizationStevens Le Blond, École Polytechnique Fédérale de Lausanne; et al.
Alejandro Cuevas, École Polytechnique Fédérale de Lausanne
Juan Ramón Troncoso-Pastoriza, École Polytechnique Fédérale de Lausanne
Philipp Jovanovic, École Polytechnique Fédérale de Lausanne
Bryan Ford, École Polytechnique Fédérale de Lausanne
Jean-Pierre Hubaux, École Polytechnique Fédérale de Lausanne
DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and PracticeVincent Cheval, Inria; et al.
Steve Kremer, Inria
Itsaka Rakotonirina, Inria
SIGCOMM NetworkingInferring Persistent Interdomain CongestionAmogh Dhamdhere, University of California, San Diego; et al.
David D. Clark, Massachusetts Institute of Technology
Alexander Gamero-Garrido, University of California, San Diego
Matthew Luckie, University of Waikato
Ricky K. P. Mok, University of California, San Diego
Gautam Akiwate, University of California, San Diego
Kabir Gogia, University of California, San Diego
Vaibhav Bajpai, Technical University of Munich
Alex C. Snoeren, University of California, San Diego
kc claffy, University of California, San Diego
SIGIR Information RetrievalShould I Follow the Crowd? A Probabilistic Analysis of the Effectiveness of Popularity in Recommender SystemsRocío Cañamares & Pablo Castells, Autonomous University of Madrid
SIGMETRICS PerformanceA Refined Mean Field ApproximationNicolas Gast, Inria
Benny Van Houdt, University of Antwerp
SIGMOD DatabasesSuRF: Practical Range Query Filtering with Fast Succinct TriesHuanchen Zhang, Carnegie Mellon University; et al.
Hyeontaek Lim, Carnegie Mellon University
Viktor Leis, Technical University of Munich
David G. Andersen, Carnegie Mellon University
Michael Kaminsky, Intel
Kimberly Keeton, Hewlett Packard
Andrew Pavlo, Carnegie Mellon University
SODA TheoryApproaching 3/2 for the s-t-path TSPVera Traub & Jens Vygen, University of Bonn
Online Bipartite Matching with Amortized O(log2 N)ReplacementsAaron Bernstein, Technical University of Berlin; et al.
Jacob Holm, University of Copenhagen
Eva Rotenberg, Technical University of Denmark
STOC TheoryA Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman ProblemOla Svensson, École Polytechnique Fédérale de Lausanne; et al.
Jakub Tarnawski, École Polytechnique Fédérale de Lausanne
László A. Végh, London School of Economics and Political Science
UIST User InterfaceAuthoring and Verifying Human-Robot InteractionsDavid Porfirio, University of Wisconsin–Madison; et al.
Allison Sauppé, University of Wisconsin–La Crosse
Aws Albarghouthi, University of Wisconsin–Madison
Bilge Mutlu, University of Wisconsin–Madison
Porta: Profiling Software Tutorials Using Operating-System-Wide Activity TracingAlok Mysore & Philip J. Guo, University of California, San Diego
RESi: A Highly Flexible, Pressure-Sensitive, Imperceptible Textile Interface Based on Resistive YarnsPatrick Parzer, University of Applied Sciences Upper Austria; et al.
Florian Perteneder, University of Applied Sciences Upper Austria
Kathrin Probst, University of Applied Sciences Upper Austria
Christian Rendl, University of Applied Sciences Upper Austria
Joanne Leong, University of Applied Sciences Upper Austria
Sarah Schuetz, University of Applied Sciences Upper Austria
Anita Vogl, University of Applied Sciences Upper Austria
Reinhard Schwoediauer, Johannes Kepler University Linz
Martin Kaltenbrunner, Johannes Kepler University Linz
Siegfried Bauer, Johannes Kepler University Linz
Michael Haller, University of Applied Sciences Upper Austria
VLDB DatabasesThe Ubiquity of Large Graphs and Surprising Challenges of Graph Processing: Extended SurveySiddhartha Sahu, University of Waterloo; et al.
Amine Mhedhbi, University of Waterloo
Semih Salihoglu, University of Waterloo
Jimmy Lin, University of Waterloo
M. Tamer Özsu, University of Waterloo
WWW World Wide WebHighLife: Higher-arity Fact HarvestingPatrick Ernst, Saarland Informatics CampusSaarbrücken; et al.
Amy Siu, Saarland Informatics CampusSaarbrücken
Gerhard Weikum, Saarland Informatics CampusSaarbrücken
2017
AAAI Artificial IntelligenceLabel-Free Supervision of Neural Networks with Physics and Domain KnowledgeRussell Stewart & Stefano Ermon, Stanford University
ACL Natural Language ProcessingProbabilistic Typology: Deep Generative Models of Vowel InventoriesRyan Cotterell & Jason Eisner, Johns Hopkins University
CHI Human-Computer InteractionKinecting with Orangutans: Zoo Visitors' Empathetic Responses to Animals' Use of Interactive TechnologySarah Webber, University of Melbourne; et al.
Marcus Carter, University of Melbourne
Sally Sherwen, Zoos Victoria
Wally Smith, University of Melbourne
Zaher Joukhadar, University of Melbourne
Frank Vetere, University of Melbourne
Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing, Actuation, and InteractionViirj Kan, Massachusetts Institute of Technology; et al.
Emma Vargo, Massachusetts Institute of Technology
Noa Machover, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology
Serena Pan, Massachusetts Institute of Technology
Weixuan Chen, Massachusetts Institute of Technology
Yasuaki Kakehi, Keio University
Understanding Public Evaluation: Quantifying Experimenter InterventionJulie R. Williamson & John Williamson, University of Glasgow
Designing Gamified Applications that Make Safe Driving More EngagingFabius Steinberger, Queensland University of Technology; et al.
Ronald Schroeter, Queensland University of Technology
Marcus Foth, Queensland University of Technology
Daniel Johnson, Queensland University of Technology
Illumination Aesthetics: Light as a Creative Material within Computational DesignCesar Torres, University of California, Berkeley; et al.
Jasper O'Leary, University of California, Berkeley
Molly Nicholas, University of California, Berkeley
Eric Paulos, University of California, Berkeley
Empowered participation: How Citizens Use Technology in Local GovernanceSheena Erete, DePaul University
Jennifer O. Burrell, MadX LLC
Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner AbuseTara Matthews, Google; et al.
Kathleen O'Leary, University of Washington
Anna Turner, Google
Manya Sleeper, Google
Jill Palzkill Woelfer, Google
Martin Shelton, Google
Cori Manthorne, Community Overcoming Relationship Abuse
Elizabeth F. Churchill, Google
Sunny Consolvo, Google
ShareVR: Enabling Co-Located Experiences for Virtual Reality between HMD and Non-HMD UsersJan Gugenheimer, University of Ulm; et al.
Evgeny Stemasov, University of Ulm
Julian Frommel, University of Ulm
Enrico Rukzio, University of Ulm
Examining Menstrual Tracking to Inform the Design of Personal Informatics ToolsDaniel A. Epstein, University of Washington; et al.
Nicole B. Lee, Independent Researcher
Jennifer H. Kang, University of Washington
Elena Agapie, University of Washington
Jessica Schroeder, University of Washington
Laura R. Pina, University of Washington
James Fogarty, University of Washington
Julie A. Kientz, University of Washington
Sean Munson, University of Washington
Explaining the Gap: Visualizing One's Predictions Improves Recall and Comprehension of DataYea-Seul Kim, University of Washington; et al.
Katharina Reinecke, University of Washington
Jessica Hullman, University of Washington
mHealth for Maternal Mental Health: Everyday Wisdom in Ethical DesignMarguerite Barry, Trinity College Dublin; et al.
Kevin Doherty, Trinity College Dublin
Jose Marcano Belisario, Imperial College London
Josip Car, Imperial College London
Cecily Morrison, Imperial College London
Gavin Doherty, Trinity College Dublin
A Critical Lens on Dementia and Design in HCIAmanda Lazar, Northwestern University; et al.
Caroline Edasis, Mather LifeWays
Anne Marie Piper, Northwestern University
What Is Interaction?Kasper Hornbæk, University of Copenhagen
Antti Oulasvirta, Aalto University
BIGnav: Bayesian Information Gain for Guiding Multiscale NavigationWanyu Liu, Paris-Saclay University; et al.
Rafael Lucas D'Oliveira, University of Campinas
Michel Beaudouin-Lafon, Paris-Saclay University
Olivier Rioul, Paris-Saclay University
Modelling Learning of New Keyboard LayoutsJussi P. P. Jokinen, Aalto University; et al.
Sayan Sarcar, Kochi University of Technology
Antti Oulasvirta, Aalto University
Chaklam Silpasuwanchai, Kochi University of Technology
Zhenxin Wang, Kochi University of Technology
Xiangshi Ren, Kochi University of Technology
Flash Organizations: Crowdsourcing Complex Work by Structuring Crowds As OrganizationsMelissa A. Valentine, Stanford University; et al.
Daniela Retelny, Stanford University
Alexandra To, Carnegie Mellon University
Negar Rahmati, Stanford University
Tulsee Doshi, Stanford University
Michael Bernstein, Stanford University
Reflective Practicum: A Framework of Sensitising Concepts to Design for Transformative ReflectionPetr Slovák, TU Wien; et al.
Christopher Frauenberger, TU Wien
Geraldine Fitzpatrick, TU Wien
Fingertip Tactile Devices for Virtual Object Manipulation and ExplorationSamuel B. Schorr & Allison M. Okamura, Stanford University
What Can Be Predicted from Six Seconds of Driver Glances?Lex Fridman, Massachusetts Institute of Technology; et al.
Heishiro, Toyoda Toyota Collaborative Safety Research Center
Sean Seaman, Touchstone Evaluations
Bobbie Seppelt, Touchstone Evaluations
Linda Angell, Touchstone Evaluations
Joonbum Lee, Massachusetts Institute of Technology
Bruce Mehler, Massachusetts Institute of Technology
Bryan Reimer, Massachusetts Institute of Technology
Design and Evaluation of a Data-Driven Password MeterBlase Ur, University of Chicago; et al.
Felicia Alfieri, Carnegie Mellon University
Maung Aung, Carnegie Mellon University
Lujo Bauer, Carnegie Mellon University
Nicolas Christin, Carnegie Mellon University
Jessica Colnago, Carnegie Mellon University
Lorrie Faith Cranor, Carnegie Mellon University
Henry Dixon, Carnegie Mellon University
Pardis Emami Naeini, Carnegie Mellon University
Hana Habib, Carnegie Mellon University
Noah Johnson, Carnegie Mellon University
William Melicher, Carnegie Mellon University
You Want Me to Work with Who?: Stakeholder Perceptions of Automated Team Formation in Project-based CoursesFarnaz Jahanbakhsh, University of Illinois at Urbana–Champaign; et al.
Wai-Tat Fu, University of Illinois at Urbana–Champaign
Karrie Karahalios, University of Illinois at Urbana–Champaign
Darko Marinov, University of Illinois at Urbana–Champaign
Brian Bailey, University of Illinois at Urbana–Champaign
Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing Actuation and InteractionViirj Kan, Massachusetts Institute of Technology; et al.
Emma Vargo, Massachusetts Institute of Technology
Noa Machover, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology
Serena Pan, Massachusetts Institute of Technology
Weixuan Chen, Massachusetts Institute of Technology
Yasuaki Kakehi, Massachusetts Institute of Technology
CIKM Knowledge ManagementHike: A Hybrid Human-Machine Method for Entity Alignment in Large-Scale Knowledge BasesYan Zhuang, Tsinghua University; et al.
Guoliang Li, Tsinghua University
Zhuojian Zhong, Tsinghua University
Jianhua Feng, Tsinghua University
CVPR Computer VisionDensely Connected Convolutional NetworksZhuang Liu, Tsinghua University; et al.
Gao Huang, Cornell University
Laurens van der Maaten, Meta
Kilian Q. Weinberger, Cornell University
Learning from Simulated and Unsupervised Images through Adversarial TrainingAshish Shrivastava, Apple; et al.
Tomas Pfister, Apple
Oncel Tuzel, Apple
Josh Susskind, Apple
Wenda Wang, Apple
Russ Webb, Apple
FOCS TheoryA dichotomy theorem for nonuniform CSPsAndrei A. Bulatov, Simon Fraser University
The Proof of CSP Dichotomy ConjectureDmitriy Zhuk, Moscow State University
The Matching Problem in General Graphs is in Quasi-NCOla Svensson & Jakub Tarnawski, École Polytechnique Fédérale de Lausanne
FSE Software EngineeringThe Power of "Why" and "Why Not": Enriching Scenario Exploration with ProvenanceTim Nelson, Brown University; et al.
Natasha Danas, Brown University
Daniel J. Dougherty, Worcester Polytechnic Institute
Shriram Krishnamurthi, Brown University
Understanding Misunderstandings in Source CodeDan Gopstein, New York University; et al.
Jake Iannacone, New York University
Yu Yan, Pennsylvania State University
Lois DeLong, New York University
Yanyan Zhuang, University of Colorado Boulder
Martin K.-C. Yeh, Pennsylvania State University
Justin Cappos, New York University
Trade-Offs in Continuous Integration: Assurance, Security, and FlexibilityMichael Hilton, Oregon State University; et al.
Nicholas Nelson, Oregon State University
Timothy Tunnell, University of Illinois at Urbana–Champaign
Darko Marinov, University of Illinois at Urbana–Champaign
Danny Dig, Oregon State University
Cooperative Kernels: GPU Multitasking for Blocking AlgorithmsTyler Sorensen, Imperial College London; et al.
Hugues Evrard, Imperial College London
Alastair F. Donaldson, Imperial College London
Fairness Testing: Testing Software for DiscriminationSainyam Galhotra, University of Massachusetts Amherst; et al.
Yuriy Brun, University of Massachusetts Amherst
Alexandra Meliou, University of Massachusetts Amherst
Discovering Relational SpecificationsCalvin Smith, University of Wisconsin–Madison; et al.
Gabriel Ferns, University of Wisconsin–Madison
Aws Albarghouthi, University of Wisconsin–Madison
Automatically Diagnosing and Repairing Error Handling Bugs in CYuchi Tian & Baishakhi Ray, University of Virginia
ICCV Computer VisionMask R-CNNKaiming He, Meta; et al.
Georgia Gkioxari, Meta
Piotr Dollar, Meta
Ross Girshick, Meta
ICML Machine LearningUnderstanding Black-box Predictions via Influence FunctionsPang Wei Koh & Percy Liang, Stanford University
ICSE Software EngineeringClone Refactoring with Lambda ExpressionsNikolaos Tsantalis, Concordia University; et al.
Davood Mazinanian, Concordia University
Shahriar Rostami, Concordia University
A Grounded Theory of Agile Transitions in PracticeRashina Hoda, University of Auckland
James Noble Victoria, Victoria University of Wellington
Code Defenders: Crowdsourcing Effective Tests and Subtle Mutants with a Mutation Testing GameJosé Miguel Rojas, University of Sheffield; et al.
Thomas D. White, University of Sheffield
Benjamin S. Clegg, University of Sheffield
Gordon Fraser, University of Sheffield
Decoding the representation of code in the brain: An fMRI study of code review and expertiseBenjamin Floyd, University of Virginia; et al.
Tyler Santander, University of Virginia
Westley Weimer, University of Virginia
Challenges for Static Analysis of Java Reflection - Literature Review and Empirical StudyDavy Landman, Centrum Wiskunde & Informatica; et al.
Alexander Serebrenik, Centrum Wiskunde & Informatica
Jurgen J. Vinju, Centrum Wiskunde & Informatica
Optimizing Test Placement for Module-Level Regression TestingAugust Shi, University of Illinois at Urbana–Champaign; et al.
Suresh Thummalapenta, Microsoft
Shuvendu K. Lahiri, Microsoft
Nikolaj Bjorner, Microsoft
Jacek Czerwonka, Microsoft
IJCAI Artificial IntelligenceFoundations of Declarative Data Analysis Using Limit Datalog ProgramsMark Kaminski, University of Oxford; et al.
Bernardo Cuenca Grau, University of Oxford
Egor V. Kostylev, University of Oxford
Boris Motik, University of Oxford
Ian Horrocks, University of Oxford
INFOCOM NetworkingOne Step at a Time: Optimizing SDN Upgrades in ISP NetworksKonstantinos Poularakis, Yale University; et al.
George Iosifidis, Yale University
Georgios Smaragdakis, Massachusetts Institute of Technology
Leandros Tassiulas, Yale University
KDD Data MiningAccelerating Innovation Through Analogy MiningTom Hope, Hebrew University of Jerusalem; et al.
Joel Chan, Carnegie Mellon University
Aniket Kittur, Carnegie Mellon University
Dafna Shahaf, Hebrew University of Jerusalem
MOBICOM MobileWEBee: Physical-Layer Cross-Technology Communication via EmulationZhijun Li & Tian He, University of Minnesota
NeurIPS Machine LearningSafe and Nested Subgame Solving for Imperfect-Information GamesNoam Brown & Tuomas Sandholm, Carnegie Mellon University
Variance-based Regularization with Convex ObjectivesHongseok Namkoong & John Duchi, Stanford University
A Linear-Time Kernel Goodness-of-Fit TestWittawat Jitkrittum, University College London; et al.
Wenkai Xu, University College London
Zoltan Szabo, École Polytechnique
Kenji Fukumizu, The Institute of Statistical Mathematics
Arthur Gretton, University College London
NSDI NetworkingmOS: A Reusable Networking Stack for Flow Monitoring MiddleboxesMuhammad Asim Jamshed, KAIST; et al.
YoungGyoun Moon, KAIST
Donghwi Kim, KAIST
Dongsu Han, KAIST
KyoungSoo Park, KAIST
PLDI Programming LanguagesLow Overhead Dynamic Binary Translation on ARMAmanieu D'Antras, University of Manchester; et al.
Cosmin Gorgovan, University of Manchester
Jim Garside, University of Manchester
Mikel Luján, University of Manchester
Repairing sequential consistency in C/C++11Ori Lahav, Max Planck Institute for Software Systems; et al.
Viktor Vafeiadis, Max Planck Institute for Software Systems
Jeehoon Kang, Seoul National University
Chung-Kil Hur, Seoul National University
Derek Dreyer, Max Planck Institute for Software Systems
Compiling without continuationsLuke Maurer, University of Oregon; et al.
Paul Downen, University of Oregon
Zena M. Ariola, University of Oregon
Simon Peyton Jones, Microsoft
Bringing the web up to speed with WebAssemblyAndreas Haas, Google; et al.
Andreas Rossberg, Google
Derek L. Schuff, Google
Ben L. Titzer, Google
Michael Holman, Microsoft
Dan Gohman, Mozilla Corporation
Luke Wagner, Mozilla Corporation
Alon Zakai, Mozilla Corporation
JF Bastien, Apple
PODS DatabasesDichotomies in Ontology-Mediated Querying with the Guarded FragmentAndré Hernich, University of Liverpool; et al.
Carsten Lutz, University of Bremen
Fabio Papacchini, University of Liverpool
Frank Wolter, University of Liverpool
S&P Security and PrivacyVerified Models and Reference Implementations for the TLS 1.3 Standard CandidateKarthikeyan Bhargavan, Inria; et al.
Bruno Blanchet, Inria
Nadim Kobeissi, Inria
SIGCOMM NetworkingRe-architecting datacenter networks and stacks for low latency and high performanceMark Handley, University College London; et al.
Costin Raiciu, Politehnica University of Bucharest
Alexandru Agache, Politehnica University of Bucharest
Andrei Voinescu, Politehnica University of Bucharest
Andrew Moore, University of Cambridge
Gianni Antichi, University of Cambridge
Marcin Wójcik, University of Cambridge
Language-directed hardware design for network performance monitoringSrinivas Narayana, Massachusetts Institute of Technology; et al.
Anirudh Sivaraman, Massachusetts Institute of Technology
Vikram Nathan, Massachusetts Institute of Technology
Prateesh Goyal, Massachusetts Institute of Technology
Venkat Arun, Indian Institute of Technology Guwahati
Mohammad Alizadeh, Massachusetts Institute of Technology
Vimalkumar Jeyakumar, Cisco Systems
Changhoon Kim, Barefoot Networks
SIGIR Information RetrievalBitFunnel: Revisiting Signatures for SearchBob Goodwin, Microsoft; et al.
Michael Hopcroft, Microsoft
Dan Luu, Microsoft
Alex Clemmer, Heptio
Mihaela Curmei, Microsoft
Sameh Elnikety, Microsoft
Yuxiong He, Microsoft
SIGMETRICS PerformanceAccelerating Performance Inference over Closed Systems by Asymptotic MethodsGiuliano Casale, Imperial College London
SIGMOD DatabasesParallelizing Sequential Graph ComputationsWenfei Fan, University of Edinburgh; et al.
Jingbo Xu, University of Edinburgh
Yinghui Wu, Washington State University
Wenyuan Yu, Beihang University
Jiaxin Jiang, Hong Kong Baptist University
Zeyu Zheng, Peking University
Bohan Zhang, Peking University
Yang Cao, University of Edinburgh
Chao Tian, University of Edinburgh
SODA TheorySubquadratic Algorithms for the Diameter and the Sum of Pairwise Distances in Planar GraphsSergio Cabello, University of Ljubljana
A (2 + Є) Approximation for Maximum Weight Matching in the Semi-Streaming ModelAmi Paz, Institut de Recherche en Informatique Fondamentale
Gregory Schwartzman, National Institute of Informatics
SOSP Operating SystemsThe Efficient Server Audit Problem, Deduplicated Re-execution, and the WebCheng Tan, New York University; et al.
Lingfan Yu, New York University
Joshua B. Leners, Two Sigma
Michael Walfish, New York University
DeepXplore: Automated Whitebox Testing of Deep Learning SystemsKexin Pei, Columbia University; et al.
Yinzhi Cao, Lehigh University
Junfeng Yang, Columbia University
Suman Jana, Columbia University
STOC TheoryExplicit, Almost Optimal, Epsilon-Balanced CodesAmnon Ta-Shma, Tel Aviv University
Deciding Parity Games in Quasipolynomial TimeCristian S. Calude, University of Auckland; et al.
Sanjay Jain, National University of Singapore
Bakhadyr Khoussainov, University of Auckland
Wei Li, National University of Singapore
Frank Stephan, National University of Singapore
A Weighted Linear Matroid Parity AlgorithmSatoru Iwata, University of Tokyo
Yusuke Kobayashi, University of Tsukuba
UIST User InterfaceTriggering Artwork Swaps for Live AnimationNora S. Willett, Princeton University; et al.
Wilmot Li, Adobe
Jovan Popovic, Adobe
Adam Finkelstein, Princeton University
Grabity: A Wearable Haptic Interface for Simulating Weight and Grasping in Virtual RealityInrak Choi, Stanford University; et al.
Heather Culbertson, Stanford University
Mark R. Miller, Stanford University
Alex Olwal, Google
Sean Follmer, Stanford University
AirCode: Unobtrusive Physical Tags for Digital FabricationDingzeyu Li, Columbia University; et al.
Avinash S. Nair, Columbia University
Shree K. Nayar, Columbia University
Changxi Zheng, Columbia University
VLDB DatabasesProvenance for Natural Language QueriesDaniel Deutch, Tel Aviv University; et al.
Nave Frost, Tel Aviv University
Amir Gilad, Tel Aviv University
2016
AAAI Artificial IntelligenceBidirectional Search That Is Guaranteed to Meet in the MiddleRobert C. Holte, University of Alberta; et al.
Ariel Felner, Ben-Gurion University of the Negev
Guni Sharon, Ben-Gurion University of the Negev
Nathan R. Sturtevant, University of Denver
ACL Natural Language ProcessingFinding Non-Arbitrary Form-Meaning Systematicity Using String-Metric Learning for Kernel RegressionE. Darío Gutiérrez, University of California, Berkeley; et al.
Roger Levy, Massachusetts Institute of Technology
Benjamin K. Bergen, University of California, San Diego
CHI Human-Computer InteractionThe Effect of Visual Appearance on the Performance of Continuous Sliders and Visual Analogue ScalesJustin Matejka, Autodesk; et al.
Michael Glueck, Autodesk
Tovi Grossman, Autodesk
George Fitzmaurice, Autodesk
Designing Movement-based Play With Young People Using Powered WheelchairsKathrin Gerling, University of Lincoln; et al.
Kieran Hicks, University of Lincoln
Michael Kalyn, University of Lincoln
Adam Evans, University of Copenhagen
Conor Linehan, University College Cork
Object-Oriented DrawingHaijun Xia, University of Toronto; et al.
Bruno Araujo, University of Toronto
Tovi Grossman, Autodesk
Daniel Wigdor, University of Toronto
Enabling Designers to Foresee Which Colors Users Cannot SeeKatharina Reinecke, University of Washington; et al.
David R. Flatla, University of Dundee
Christopher Brooks, University of Michigan
On Looking at the Vagina through LabellaTeresa Almeida, Newcastle University; et al.
Rob Comber, Newcastle University
Gavin Wood, Newcastle University
Dean Saraf, Newcastle University
Madeline Balaam, Newcastle University
Project Jacquard: Interactive Digital Textiles at ScaleIvan Poupyrev, Google; et al.
Nan-Wei Gong, Google
Shiho Fukuhara, Google
Mustafa Emre Karagozler, Google
Carsten Schwesig, Google
Karen E. Robinson, Google
"I don't Want to Wear a Screen": Probing Perceptions of and Possibilities for Dynamic Displays on ClothingLaura Devendorf, University of California, Berkeley; et al.
Joanne Lo, University of California, Berkeley
Noura Howell, University of California, Berkeley
Jung Lin Lee, University of California, Berkeley
Nan-Wei Gong, Google
M. Emre Karagozler, Google
Shiho Fukuhara, Google
Ivan Poupyrev, Google
Eric Paulos, University of California, Berkeley
Kimiko Ryokai, University of California, Berkeley
Momentary Pleasure or Lasting Meaning?: Distinguishing Eudaimonic and Hedonic User ExperiencesElisa D. Mekler, University of Basel
Kasper Hornbæk, University of Copenhagen
RapID: A Framework for Fabricating Low-Latency Interactive Objects with RFID TagsAndrew Spielberg, Massachusetts Institute of Technology; et al.
Alanson Sample, Disney Research
Scott E. Hudson, Carnegie Mellon University
Jennifer Mankoff, Carnegie Mellon University
James McCann, Disney Research
HCI Research as Problem-SolvingAntti Oulasvirta, Aalto University
Kasper Hornbæk, University of Copenhagen
Haptic Wave: A Cross-Modal Interface for Visually Impaired Audio ProducersAtau Tanaka & Adam Parkinson, Goldsmiths, University of London
FlexCase: Enhancing Mobile Interaction with a Flexible Sensing and Display CoverChristian Rendl, University of Applied Sciences Upper Austria; et al.
David Kim, Microsoft
Patrick Parzer, University of Applied Sciences Upper Austria
Sean Fanello, Microsoft
Martin Zirkl, Institute of Surface Technologies and Photonics
Gregor Scheipl, Joanneum Research Forschungsgesellschaft m.b.H
Michael Haller, University of Applied Sciences Upper Austria
Shahram Izadi, Microsoft
Dear Diary: Teens Reflect on Their Weekly Online Risk ExperiencesPamela Wisniewski, University of Central Florida; et al.
Heng Xu, Pennsylvania State University
Mary Beth Rosson, Pennsylvania State University
Daniel F. Perkins, Pennsylvania State University
John M. Carroll, Pennsylvania State University
Understanding and Mitigating the Effects of Device and Cloud Service Design Decisions on the Environmental Footprint of Digital InfrastructureChris Preist, University of Bristol; et al.
Daniel Schien, University of Bristol
Eli Blevis, Indiana University Bloomington
Enhancing Cross-Device Interaction Scripting with Interactive IllustrationsPei-Yu (Peggy) Chi, University of California, Berkeley; et al.
Yang Li, Google
Björn Hartmann, University of California, Berkeley
Learn Piano with BACh: An Adaptive Learning Interface that Adjusts Task Difficulty Based on Brain StateBeste F. Yuksel, Tufts University; et al.
Kurt B. Oleson, Tufts University
Lane Harrison, Worcester Polytechnic Institute
Evan M. Peck, Bucknell University
Daniel Afergan, Tufts University
Remco Chang, Tufts University
Robert JK Jacob, Tufts University
Smart Touch: Improving Touch Accuracy for People with Motor Impairments with Template MatchingMartez E. Mott, University of Washington; et al.
Radu-Daniel Vatavu, Ștefan cel Mare University of Suceava
Shaun K. Kane, University of Colorado Boulder
Jacob O. Wobbrock, University of Washington
Building a Personalized, Auto-Calibrating Eye Tracker from User InteractionsMichael Xuelin Huang, Hong Kong Polytechnic University; et al.
Tiffany C.K. Kwok, Hong Kong Polytechnic University
Grace Ngai, Hong Kong Polytechnic University
Stephen C.F. Chan, Hong Kong Polytechnic University
Hong Va Leong, Hong Kong Polytechnic University
Developing and Validating the User Burden Scale: A Tool for Assessing User Burden in Computing SystemsHyewon Suh, University of Washington; et al.
Nina Shahriaree, University of Washington
Eric B. Hekler, Arizona State University
Julie A. Kientz, University of Washington
Foraging Among an Overabundance of Similar VariantsSruti Srinivasa Ragavan, Oregon State University; et al.
Sandeep Kaur Kuttal, Oregon State University
Charles Hill, Oregon State University
Anita Sarma, Oregon State University
David Piorkowski, Oregon State University
Margaret Burnett, Oregon State University
Finding Email in a Multi-Account, Multi-Device WorldMarta E. Cecchinato, University College London; et al.
Abigail Sellen, Microsoft
Milad Shokouhi, Microsoft
Gavin Smyth, Microsoft
Empath: Understanding Topic Signals in Large-Scale TextEthan Fast, Stanford University; et al.
Binbin Chen, Stanford University
Michael Bernstein, Stanford University
Lock n' LoL: Group-based Limiting Assistance App to Mitigate Smartphone Distractions in Group ActivitiesMinsam Ko, KAIST; et al.
Seungwoo Choi, KAIST
Koji Yatani, University of Tokyo
Uichin Lee, KAIST
CIKM Knowledge ManagementVandalism Detection in WikidataStefan Heindorf, University of Paderborn; et al.
Martin Potthast, Bauhaus University
Benno Stein, Bauhaus University
Gregor Engels, University of Paderborn
CVPR Computer VisionDeep Residual Learning for Image RecognitionKaiming He, Microsoft; et al.
Xiangyu Zhang, Microsoft
Shaoqing Ren, Microsoft
Jian Sun, Microsoft
FOCS TheorySettling the Complexity of Computing Approximate Two-Player Nash EquilibriaAviad Rubinstein, University of California, Berkeley
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity LearningRan Raz, Weizmann Institute of Science
FSE Software EngineeringAPI Code Recommendation Using Statistical Learning from Fine-grained ChangesAnh Tuan Nguyen, Iowa State University; et al.
Michael Hilton, Oregon State University
Mihai Codoban, Microsoft
Hoan Anh Nguyen, Iowa State University
Lily Mast, University of Evansville
Eli Rademacher, Oregon State University
Tien N. Nguyen, Iowa State University
Danny Dig, Oregon State University
Detecting Sensitive Data Disclosure via Bi-directional Text Correlation AnalysisJianjun Huang, Purdue University; et al.
Xiangyu Zhang, Purdue University
Lin Tan, University of Waterloo
Factors Influencing Code Review Processes in IndustryTobias Baum, Leibniz University Hannover; et al.
Olga Liskin, Leibniz University Hannover
Kai Niklas, Leibniz University Hannover
Kurt Schneider, Leibniz University Hannover
Foraging and Navigations Fundamentally: Developers' Predictions of Value and CostDavid Piorkowski, Oregon State University; et al.
Austin Z. Henley, University of Memphis
Tahmid Nabi, Oregon State University
Scott D. Fleming, University of Memphis
Christopher Scaffidi, Oregon State University
Margaret Burnett, Oregon State University
Multi-Representational Security AnalysisEunsuk Kang, University of California, Berkeley; et al.
Aleksandar Milicevic, Microsoft
Daniel Jackson, Massachusetts Institute of Technology
Proteus: Computing Disjunctive Loop Summary via Path Dependency AnalysisXiaofei Xie, Tianjin University; et al.
Bihuan Chen, Nanyang Technological University
Yang Liu, Nanyang Technological University
Wei Le, Iowa State University
Xiaohong Li, Tianjin University
Why We Refactor? Confessions of GitHub ContributorsDanilo Silva, Federal University of Minas Gerais; et al.
Nikolaos Tsantalis, Concordia University
Marco Tulio Valente, Federal University of Minas Gerais
ICML Machine LearningDueling Network Architectures for Deep Reinforcement LearningZiyu Wang, Google; et al.
Tom Schaul, Google
Matteo Hessel, Google
Hado van Hasselt, Google
Marc Lanctot, Google
Nando de Freitas, University of Oxford
Pixel Recurrent Neural NetworksAaron Van den Oord, Google; et al.
Nal Kalchbrenner, Google
Koray Kavukcuoglu, Google
Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs SamplingChristopher De Sa, Stanford University; et al.
Chris Re, Stanford University
Kunle Olukotun, Stanford University
ICSE Software EngineeringEfficient Large-Scale Trace Checking Using MapReduceMarcello M. Bersani, Politecnico di Milano; et al.
Domenico Bianculli, University of Luxembourg
Carlo Ghezzi, Politecnico di Milano
Srđan Krstić, Politecnico di Milano
Pierluigi San Pietro, Politecnico di Milano
Energy Profiles of Java Collections ClassesSamir Hasan, Auburn University; et al.
Zachary King, Auburn University
Munawar Hafiz, Auburn University
Mohammed Sayagh, Polytechnique Montréal
Bram Adams, Polytechnique Montréal
Abram Hindle, University of Alberta
Feedback-Directed Instrumentation for Deployed JavaScript ApplicationsMagnus Madsen, University of Waterloo; et al.
Frank Tip, Samsung
Esben Andreasen, Aarhus University
Koushik Sen, University of California, Berkeley
Anders Møller, Aarhus University
From Word Embeddings to Document Similarities for Improved Information Retrieval in Software EngineeringXin Ye, Ohio University; et al.
Hui Shen, Ohio University
Xiao Ma, Ohio University
Razvan Bunescu, Ohio University
Chang Liu, Ohio University
Guiding Dynamic Symbolic Execution toward Unverified Program ExecutionsMaria Christakis, ETH Zurich; et al.
Peter Müller, ETH Zurich
Valentin Wüstholz, ETH Zurich
On the Techniques We Create, the Tools We Build, and Their Misalignments: A Study of KLEEEric F. Rizzi, GrammaTech; et al.
Sebastian Elbaum, University of Nebraska–Lincoln
Matthew B. Dwyer, University of Nebraska–Lincoln
Termination-Checking for LLVM Peephole OptimizationsDavid Menendez & Santosh Nagarakatte, Rutgers University
VDTest: An Automated Framework to Support Testing for Virtual DevicesTingting Yu, University of Kentucky; et al.
Xiao Qu, ABB Switzerland Ltd Corporate Research
Myra B. Cohen, University of Nebraska–Lincoln
Work Practices and Challenges in Pull-Based Development: The Contributor's PerspectiveGeorgios Gousios, Radboud University Nijmegen; et al.
Margaret-Anne Storey, University of Victoria
Alberto Bacchelli, Delft University of Technology
IJCAI Artificial IntelligenceHierarchical Finite State Controllers for Generalized PlanningJavier Segovia, Pompeu Fabra University; et al.
Sergio Jiménez, Pompeu Fabra University
Anders Jonsson, Pompeu Fabra University
INFOCOM NetworkingHeavy-Ball: A New Approach to Tame Delay and Convergence in Wireless Network OptimizationJia Liu, Ohio State University; et al.
Atilla Eryilmaz, Ohio State University
Ness B. Shroff, Ohio State University
Elizabeth Serena Bentley, Air Force Research Laboratory
KDD Data MiningFRAUDAR: Bounding Graph Fraud in the Face of CamouflageBryan Hooi, Carnegie Mellon University; et al.
Hyun Ah Song, Carnegie Mellon University
Alex Beutel, Carnegie Mellon University
Neil Shah, Carnegie Mellon University
Kijung Shin, Carnegie Mellon University
Christos Faloutsos, Carnegie Mellon University
NeurIPS Machine LearningValue Iteration NetworksAviv Tamar, University of California, Berkeley; et al.
Yi Wu, University of California, Berkeley
Garrett Thomas, University of California, Berkeley
Sergey Levine, University of California, Berkeley
Pieter Abbeel, University of California, Berkeley
NSDI NetworkingPassive Wi-Fi: Bringing Low Power to Wi-Fi TransmissionsBryce Kellogg, University of Washington; et al.
Vamsi Talla, University of Washington
Shyamnath Gollakota, University of Washington
Joshua R. Smith, University of Washington
OSDI Operating SystemsRyoan: A Distributed Sandbox for Untrusted Computation on Secret DataTyler Hunt, University of Texas at Austin; et al.
Zhiting Zhu, University of Texas at Austin
Yuanzhong Xu, University of Texas at Austin
Simon Peter, University of Texas at Austin
Emmett Witchel, University of Texas at Austin
Early Detection of Configuration Errors to Reduce Failure DamageTianyin Xu, University of California, San Diego; et al.
Xinxin Jin, University of California, San Diego
Peng Huang, University of California, San Diego
Yuanyuan Zhou, University of California, San Diego
Shan Lu, University of Chicago
Long Jin, University of California, San Diego
Shankar Pasupathy, NetApp
Push-Button Verification of File Systems via Crash RefinementHelgi Sigurbjarnarson, University of Washington; et al.
James Bornholt, University of Washington
Emina Torlak, University of Washington
Xi Wang, University of Washington
PLDI Programming LanguagesInto the Depths of C: Elaborating the De Facto StandardsKayvan Memarian, University of Cambridge; et al.
Justus Matthiesen, University of Cambridge
James Lingard, University of Cambridge
Kyndylan Nienhuis, University of Cambridge
David Chisnall, University of Cambridge
Robert N. M. Watson, University of Cambridge
Peter Sewell, University of Cambridge
Transactional Data Structure LibrariesAlexander Spiegelman, Technion – Israel Institute of Technology; et al.
Guy Golan-Gueta, Yahoo
Idit Keidar, Technion – Israel Institute of Technology
Types from data: Making structured data first-class citizens in F#Tomas Petricek, University of Cambridge; et al.
Gustavo Guerra, Microsoft
Don Syme, Microsoft
Assessing the limits of program-specific garbage collection performanceNicholas Jacek, University of Massachusetts Amherst; et al.
Meng-Chieh Chiu, University of Massachusetts Amherst
Benjamin Marlin, University of Massachusetts Amherst
Eliot Moss, University of Massachusetts Amherst
PODS DatabasesFAQ: Questions Asked FrequentlyMahmoud Abo Khamis, University at Buffalo; et al.
Hung Q. Ngo, University at Buffalo
Atri Rudra, University at Buffalo
S&P Security and PrivacyA2: Analog Malicious HardwareKaiyuan Yang, University of Michigan; et al.
Matthew Hicks, University of Michigan
Qing Dong, University of Michigan
Todd Austin, University of Michigan
Dennis Sylvester, University of Michigan
SIGCOMM NetworkingDon't Mind the Gap: Bridging Network-wide Objectives and Device-level ConfigurationsRyan Beckett, Princeton University; et al.
Ratul Mahajan, Microsoft
Todd Millstein, University of California, Los Angeles
Jitendra Padhye, Microsoft
David Walker, Princeton University
Eliminating Channel Feedback in Next-Generation Cellular NetworksDeepak Vasisht, Massachusetts Institute of Technology; et al.
Swarun Kumar, Carnegie Mellon University
Hariharan Rahul, Massachusetts Institute of Technology
Dina Katabi, Massachusetts Institute of Technology
Inter-Technology Backscatter: Towards Internet Connectivity for Implanted DevicesVikram Iyer, University of Washington; et al.
Vamsi Talla, University of Washington
Bryce Kellogg, University of Washington
Shyamnath Gollakota, University of Washington
Joshua Smith, University of Washington
SIGIR Information RetrievalUnderstanding Information Need: An fMRI StudyYashar Moshfeghi, University of Glasgow; et al.
Peter Triantafillou, University of Glasgow
Frank E. Pollick, University of Glasgow
SIGMETRICS PerformanceOn the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with FitnessBo Jiang, University of Massachusetts Amherst; et al.
Daniel R. Figueiredo, Federal University of Rio de Janeiro
Bruno Ribeiro, Purdue University
Don Towsley, University of Massachusetts Amherst
SIGMOD DatabasesWander Join: Online Aggregation via Random WalksFeifei Li, University of Utah; et al.
Bin Wu, Hong Kong University of Science and Technology
Ke Yi, Hong Kong University of Science and Technology
Zhuoyue Zhao, Shanghai Jiao Tong University
SODA TheoryAn Improved Distributed Algorithm for Maximal Independent SetMohsen Ghaffari, Massachusetts Institute of Technology
Near-Optimal Light SpannersShiri Chechik, Tel Aviv University
Christian Wulff-Nilsen, University of Copenhagen
STOC TheoryReed-Muller Codes Achieve Capacity on Erasure ChannelsShrinivas Kudekar, Qualcomm; et al.
Santhosh Kumar, Texas A&M University
Marco Mondelli, École Polytechnique Fédérale de Lausanne
Henry D. Pfister, Duke University
Eren Sasoglu, Intel
Rudiger Urbanke, École Polytechnique Fédérale de Lausanne
Explicit Two-Source Extractors and Resilient FunctionsEshan Chattopadhyay & David Zuckerman, University of Texas at Austin
Graph Isomorphism in Quasipolynomial TimeLászló Babaí, University of Chicago
UIST User InterfaceRovables: Miniature On-Body Robots as Mobile WearablesArtem Dementyev, Massachusetts Institute of Technology; et al.
Hsin-Liu (Cindy) Kao, Massachusetts Institute of Technology
Inrak Choi, Stanford University
Deborah Ajilo, Massachusetts Institute of Technology
Maggie Xu, Stanford University
Joseph Paradiso, Massachusetts Institute of Technology
Chris Schmandt, Massachusetts Institute of Technology
Sean Follmer, Stanford University
Zooids: Building Blocks for Swarm User InterfacesMathieu Le Goc, Inria; et al.
Lawrence H. Kim, Stanford University
Ali Parsaei, Stanford University
Jean-Daniel Fekete, Inria
Pierre Dragicevic, Inria
Sean Follmer, Stanford University
proCover: Sensory Augmentation of Prosthetic Limbs Using Smart Textile CoversJoanne Leong, University of Applied Sciences Upper Austria; et al.
Patrick Parzer, University of Applied Sciences Upper Austria
Florian Perteneder, University of Applied Sciences Upper Austria
Teo Babic, University of Applied Sciences Upper Austria
Christian Rendl, University of Applied Sciences Upper Austria
Anita Vogl, University of Applied Sciences Upper Austria
Hubert Egger, University of Applied Sciences Upper Austria
Alex Olwal, Google
Michael Haller, University of Applied Sciences Upper Austria
ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch AccelerometersGierad Laput, Carnegie Mellon University; et al.
Robert Xiao, Carnegie Mellon University
Chris Harrison, Carnegie Mellon University
VLDB DatabasesCompressed Linear Algebra for Large-Scale Machine LearningAhmed Elgohary, University of Maryland; et al.
Matthias Boehm, IBM
Peter Haas, IBM
Fred Reiss, IBM
Berthold Reinwald, IBM
WWW World Wide WebSocial Networks Under StressDaniel Romero, University of Michigan; et al.
Brian Uzzi, Northwestern University
Jon Kleinberg, Cornell University
2015
AAAI Artificial IntelligenceFrom Non-Negative to General Operator Cost PartitioningFlorian Pommerening, University of Basel; et al.
Malte Helmert, University of Basel
Gabriele Röger, University of Basel
Jendrik Seipp, University of Basel
ACL Natural Language ProcessingLearning Dynamic Feature Selection for Fast Sequential PredictionEmma Strubell, University of Massachusetts Amherst; et al.
Luke Vilnis, University of Massachusetts Amherst
Kate Silverstein, University of Massachusetts Amherst
Andrew McCallum, University of Massachusetts Amherst
Improving Evaluation of Machine Translation Quality EstimationYvette Graham, Trinity College Dublin
CHI Human-Computer InteractionAffordance++: Allowing Objects to Communicate Dynamic UsePedro Lopes, Hasso Plattner Institute; et al.
Patrik Jonell, Hasso Plattner Institute
Patrick Baudisch, Hasso Plattner Institute
VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboard InputKeith Vertanen, Montana Technological University; et al.
Haythem Memmi, Montana Technological University
Justin Emge, Montana Technological University
Shyam Reyal, University of St Andrews
Per Ola Kristensson, University of Cambridge
What Makes Interruptions Disruptive?: A Process-Model Account of the Effects of the Problem State Bottleneck on Task Interruption and ResumptionJelmer P. Borst, University of Groningen; et al.
Niels A. Taatgen, University of Groningen
Hedderik van Rijn, University of Groningen
Lightweight Relief Shearing for Enhanced Terrain Perception on Interactive MapsWesley Willett, Inria; et al.
Bernhard Jenny, Oregon State University
Tobias Isenberg, Inria
Pierre Dragicevic, Inria
The Social Impact of a Robot Co-Worker in Industrial SettingsAllison Sauppé & Bilge Mutlu, University of Wisconsin–Madison
Sangeet Swara: A Community-Moderated Voice Forum in Rural IndiaAditya Vashistha, University of Washington; et al.
Edward Cutrell, Microsoft
Gaetano Borriello, University of Washington
William Thies, Microsoft
Understanding and Supporting Fathers and Fatherhood on Social Media SitesTawfiq Ammari & Sarita Schoenebeck, University of Michigan
Patina Engraver: Visualizing Activity Logs as Patina in Fashionable TrackersMoon-Hwan Lee, KAIST; et al.
Seijin Cha, KAIST
Tek-Jin Nam, KAIST
Fluid Grouping: Quantifying Group Engagement around Interactive Tabletop Exhibits in the WildFlorian Block, Harvard University; et al.
James Hammerman, Terc
Michael Horn, Northwestern University
Amy Spiegel, University of Nebraska–Lincoln
Jonathan Christiansen, Terc
Brenda Phillips, Harvard University
Judy Diamond, Bulletin of the University of Nebraska State Museum
E. Margaret Evans, University of Michigan
Chia Shen, Harvard University
Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk ExposurePamela Wisniewski, Pennsylvania State University; et al.
Haiyan Jia, Pennsylvania State University
Na Wang, Pennsylvania State University
Saijing Zheng, Pennsylvania State University
Heng Xu, Pennsylvania State University
Mary Beth Rosson, Pennsylvania State University
John Carroll, Pennsylvania State University
BaseLase: An Interactive Focus+Context Laser FloorJörg Müller, Aarhus University; et al.
Dieter Eberle, Technical University of Berlin
Constantin Schmidt, Technical University of Berlin
Tiree Energy Pulse: Exploring Renewable Energy Forecasts on the Edge of the GridWill Simm, University of Lancaster; et al.
Maria Angela Ferrario, University of Lancaster
Adrian Friday, University of Lancaster
Peter Newman, University of Lancaster
Stephen Forshaw, University of Lancaster
Mike Hazas, University of Lancaster
Alan Dix, University of Lancaster
iSkin: Flexible, Stretchable and Visually Customizable On-Body Touch Sensors for Mobile ComputingMartin Weigel, Max Planck Institute for Informatics; et al.
Tong Lu, Carnegie Mellon University
Gilles Bailly, Télécom Paris
Antti Oulasvirta, Aalto University
Carmel Majidi, Carnegie Mellon University
Jürgen Steimle, Max Planck Institute for Informatics
Designing Political Deliberation Environments to Support Interactions in the Public SphereBryan Semaan, Syracuse University; et al.
Heather Faucett, University of California, Irvine
Scott P. Robertson, University of Hawaii at Manoa
Misa Maruyama, University of Hawaii at Manoa
Sara Douglas, University of Hawaii at Manoa
From User-Centered to Adoption-Centered Design: A Case Study of an HCI Research Innovation Becoming a ProductParmit K. Chilana, University of Waterloo; et al.
Andrew J. Ko, University of Washington
Jacob Wobbrock, University of Washington
Acoustruments: Passive, Acoustically-Driven, Interactive Controls for Handheld DevicesGierad Laput, Carnegie Mellon University; et al.
Eric Brockmeyer, Disney Research
Scott E. Hudson, Carnegie Mellon University
Chris Harrison, Carnegie Mellon University
The Heart Work of Wikipedia: Gendered, Emotional Labor in the World's Largest Online EncyclopediaAmanda Menking, University of Washington
Ingrid Erickson, Rutgers University
Unequal Representation and Gender Stereotypes in Image Search Results for OccupationsMatthew Kay, University of Washington; et al.
Cynthia Matuszek, University of Maryland, Baltimore County
Sean A. Munson, University of Washington
Sharing is Caring: Assistive Technology Designs on ThingiverseErin Buehler, University of Maryland, Baltimore County; et al.
Stacy Branham, University of Maryland, Baltimore County
Abdullah Ali, University of Maryland, Baltimore County
Jeremy J. Chang, University of Maryland, Baltimore County
Megan Kelly Hofmann, Colorado State University
Amy Hurst, University of Maryland, Baltimore County
Shaun K. Kane, University of Maryland, Baltimore County
"I always assumed that I wasn't really that close to [her]": Reasoning about Invisible Algorithms in News FeedsMotahhare Eslami, University of Illinois at Urbana–Champaign; et al.
Aimee Rickman, California State University
Kristen Vaccaro, University of Illinois at Urbana–Champaign
Amirhossein Aleyasen, University of Illinois at Urbana–Champaign
Andy Vuong, University of Illinois at Urbana–Champaign
Karrie Karahalios, University of Illinois at Urbana–Champaign
Kevin Hamilton, University of Illinois at Urbana–Champaign
Christian Sandvig, University of Michigan
ColourID: Improving Colour Identification for People with Impaired Colour VisionDavid R. Flatla, University of Dundee; et al.
Alan R. Andrade, University of Dundee
Ross D. Teviotdale, University of Dundee
Dylan L. Knowles, University of Saskatchewan
Craig Stewart, University of Dundee
CIKM Knowledge ManagementAssessing the Impact of Syntactic and Semantic Structures for Answer Passages RerankingKateryna Tymoshenko, University of Trento
Alessandro Moschitti, Qatar Computing Research Institute
CVPR Computer VisionDynamicFusion: Reconstruction and Tracking of Non-rigid Scenes in Real-TimeRichard A. Newcombe, University of Washington; et al.
Dieter Fox, University of Washington
Steven M. Seitz, University of Washington
FOCS TheoryAn average-case depth hierarchy theorem for Boolean circuitsBenjamin Rossman, National Institute of Informatics; et al.
Rocco A. Servedio, Columbia University
Li-Yang Tan, University of California, Berkeley
FSE Software EngineeringHow Practitioners Perceive the Relevance of Software Engineering ResearchDavid Lo, Singapore Management University; et al.
Nachiappan Nagappan, Microsoft
Thomas Zimmermann, Microsoft
Effective Test Suites for Mixed Discrete-Continuous Stateflow ControllersReza Matinnejad, University of Luxembourg; et al.
Shiva Nejati, University of Luxembourg
Lionel C. Briand, University of Luxembourg
Thomas Bruckmann, Delphi Automotive Systems
MultiSE: Multi-path Symbolic Execution using Value SummariesKoushik Sen, University of California, Berkeley; et al.
George Necula, University of California, Berkeley
Liang Gong, University of California, Berkeley
Wontae Choi, University of California, Berkeley
Modeling Readability to Improve Unit TestsErmira Daka, University of Sheffield; et al.
José Campos, University of Sheffield
Gordon Fraser, University of Sheffield
Jonathan Dorn, University of Virginia
Westley Weimer, University of Virginia
Optimizing energy consumption of GUIs in Android apps: a multi-objective approachMario Linares-Vásquez, College of William & Mary; et al.
Gabriele Bavota, Free University of Bozen-Bolzano
Carlos Eduardo Bernal Cárdenas, College of William & Mary
Rocco Oliveto, University of Molise
Massimiliano Di Penta, University of Sannio
Denys Poshyvanyk, College of William & Mary
Measure It? Manage It? Ignore It? Software Practitioners and Technical DebtNeil A. Ernst, Carnegie Mellon University; et al.
Stephany Bellomo, Carnegie Mellon University
Ipek Ozkaya, Carnegie Mellon University
Robert L. Nord, Carnegie Mellon University
Ian Gorton, Carnegie Mellon University
A User-Guided Approach to Program AnalysisRavi Mangal, Georgia Institute of Technology; et al.
Xin Zhang, Georgia Institute of Technology
Aditya V. Nori, Microsoft
Mayur Naik, Georgia Institute of Technology
Users Beware: Preference Inconsistencies AheadFarnaz Behrang, Georgia Institute of Technology; et al.
Myra B. Cohen, University of Nebraska–Lincoln
Alessandro Orso, Georgia Institute of Technology
ICCV Computer VisionDeep Neural Decision ForestsPeter Kontschieder, Microsoft; et al.
Madalina Fiterau, Carnegie Mellon University
Antonio Criminisi, Microsoft
Samuel Rota Bulò, Microsoft
ICML Machine LearningOptimal and Adaptive Algorithms for Online BoostingAlina Beygelzimer, Yahoo; et al.
Satyen Kale, Yahoo
Haipeng Luo, Princeton University
A Nearly-Linear Time Framework for Graph-Structured SparsityChinmay Hegde, Massachusetts Institute of Technology; et al.
Piotr Indyk, Massachusetts Institute of Technology
Ludwig Schmid, Massachusetts Institute of Technology
ICSE Software EngineeringViews on Internal and External Validity in Empirical Software EngineeringJanet Siegmund, University of Passau; et al.
Norbert Siegmund, University of Passau
Sven Apel, University of Passau
How Much Up-Front? A Grounded theory of Agile ArchitectureMichael Waterman, Specialised Architecture Services Ltd; et al.
James Noble, Victoria University of Wellington
George Allan, Victoria University of Wellington
When and Why Your Code Starts to Smell BadMichele Tufano, College of William & Mary; et al.
Fabio Palomba, University of Salerno
Gabriele Bavota, Free University of Bozen-Bolzano
Rocco Oliveto, University of Molise
Massimiliano Di Penta, University of Sannio
Andrea De Lucia, University of Salerno
Denys Poshyvanyk, College of William & Mary
Alloy*: A General-Purpose Higher-Order Relational Constraint SolverAleksandar Milicevic, Massachusetts Institute of Technology; et al.
Joseph P. Near, Massachusetts Institute of Technology
Eunsuk Kang, Massachusetts Institute of Technology
Daniel Jackson, Massachusetts Institute of Technology
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Factors on Software QualityMathieu Lavallée & Pierre N. Robillard, Polytechnique Montréal
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive FixesAdrian Nistor, Chapman University; et al.
Po-Chun Chang, University of Wisconsin–Madison
Cosmin Radoi, University of Illinois at Urbana–Champaign
Shan Lu, University of Chicago
IJCAI Artificial IntelligenceRecursive Decomposition for Nonconvex OptimizationAbram L. Friesen & Pedro Domingos, University of Washington
Bayesian Active Learning for Posterior EstimationKirthevasan Kandasamy, Carnegie Mellon University; et al.
Jeff Schneider, Carnegie Mellon University
Barnabas Poczos, Carnegie Mellon University
INFOCOM NetworkingThe Power of Slightly More than One Sample in Randomized Load BalancingLei Ying, Arizona State University; et al.
R. Srikant, University of Illinois at Urbana–Champaign
Xiaohan Kang, Arizona State University
KDD Data MiningEfficient Algorithms for Public-Private Social NetworksFlavio Chierichetti, Sapienza University of Rome; et al.
Alessandro Epasto, Brown University
Ravi Kumar, Google
Silvio Lattanzi, Google
Vahab Mirrokni, Google
MOBICOM MobileCAreDroid: Adaptation Framework for Android ContextAware ApplicationsSalma Elmalaki, University of California, Los Angeles; et al.
Lucas Wanner, University of California, Los Angeles
Mani Srivastava, University of California, Los Angeles
NeurIPS Machine LearningCompetitive Distribution Estimation: Why is Good-Turing GoodAlon Orlitsky & Ananda Suresh, University of California, San Diego
Fast Convergence of Regularized Learning in GamesVasilis Syrgkanis, Microsoft; et al.
Alekh Agarwal, Microsoft
Haipeng Luo, Princeton University
Robert Schapire, Microsoft
NSDI NetworkingThe Design and Implementation of Open vSwitchBen Pfaff, VMware Inc.; et al.
Justin Pettit, VMware Inc.
Teemu Koponen, VMware Inc.
Ethan J. Jackson, VMware Inc.
Andy Zhou, VMware Inc.
Jarno Rajahalme, VMware Inc.
Jesse Gross, VMware Inc.
Alex Wang, VMware Inc.
Jonathan Stringer, VMware Inc.
Pravin Shelar, VMware Inc.
Keith Amidon, Awake Networks
Martín Casado, VMware Inc.
Queues Don't Matter When You Can JUMP Them!Matthew P. Grosvenor, University of Cambridge; et al.
Malte Schwarzkopf, University of Cambridge
Ionel Gog, University of Cambridge
Robert N. M. Watson, University of Cambridge
Andrew W. Moore, University of Cambridge
Steven Hand, University of Cambridge
Jon Crowcroft, University of Cambridge
Designing Distributed Systems Using Approximate Synchrony in Data Center NetworksDan R. K. Ports, University of Washington; et al.
Jialin Li, University of Washington
Vincent Liu, University of Washington
Naveen Kr. Sharma, University of Washington
Arvind Krishnamurthy, University of Washington
PLDI Programming LanguagesAutomatically Improving Accuracy for Floating Point ExpressionsPavel Panchekha, University of Washington; et al.
Alex Sanchez-Stern, University of Washington
James R. Wilcox, University of Washington
Zachary Tatlock, University of Washington
Diagnosing Type Errors with ClassDanfeng Zhang, Cornell University; et al.
Andrew C. Myers, Cornell University
Dimitrios Vytiniotis, Microsoft
Simon Peyton-Jones, Microsoft
Provably Correct Peephole Optimizations with AliveNuno P. Lopes, Microsoft; et al.
David Menendez, Rutgers University
Santosh Nagarakatte, Rutgers University
John Regehr, University of Utah
PODS DatabasesParallel-Correctness and Transferability for Conjunctive QueriesTom J. Ameloot, Hasselt University; et al.
Gaetano Geck, TU Dortmund
Bas Ketsman, Hasselt University
Frank Neven, Hasselt University
Thomas Schwentick, TU Dortmund
S&P Security and PrivacyA Messy State of the Union: Taming the Composite State Machines of TLSBenjamin Beurdouche, Inria; et al.
Karthikeyan Bhargavan, Inria
Antoine Delignat-Lavaud, Inria
Cédric Fournet, Microsoft
Markulf Kohlweiss, Microsoft
Alfredo Pironti, Inria
Pierre-Yves Strub, IMDEA Nanoscience Institute
Jean Karim Zinzindohoue, Inria
Riposte: An Anonymous Messaging System Handling Millions of UsersHenry Corrigan-Gibbs, Stanford University; et al.
Dan Boneh, Stanford University
David Mazières, Stanford University
SIGCOMM NetworkingCentral Control Over Distributed RoutingStefano Vissicchio, Université catholique de Louvain; et al.
Olivier Tilmans, Université catholique de Louvain
Laurent Vanbever, ETH Zurich
Jennifer Rexford, Princeton University
SIGIR Information RetrievalQuickScorer: A Fast Algorithm to Rank Documents with Additive Ensembles of Regression TreesClaudio Lucchese, Istituto di Scienza e Tecnologie dell'Informazione; et al.
Franco Maria Nardini, Istituto di Scienza e Tecnologie dell'Informazione
Salvatore Orlando, IUAV University of Venice
Raffaele Perego, Istituto di Scienza e Tecnologie dell'Informazione
Nicola Tonellotto, Istituto di Scienza e Tecnologie dell'Informazione
Rossano Venturini, Istituto di Scienza e Tecnologie dell'Informazione
SIGMETRICS PerformanceSpy vs. Spy: Rumor Source ObfuscationGiulia Fanti, University of California, Berkeley; et al.
Peter Kairouz, University of Illinois at Urbana–Champaign
Sewoong Oh, University of Illinois at Urbana–Champaign
Pramod Viswanath, University of Illinois at Urbana–Champaign
SIGMOD DatabasesDBSCAN Revisited: Mis-Claim, Un-Fixability, and ApproximationJunhao Gan & Yufei Tao, The Chinese University of Hong Kong
SODA TheoryThe Parameterized Complexity of k-BicliqueBingkai Lin, University of Tokyo
SOSP Operating SystemsPivot Tracing: Dynamic Causal Monitoring for Distributed SystemsJonathan Mace, Brown University; et al.
Ryan Roelke, Brown University
Rodrigo Fonseca, Brown University
Using Crash Hoare Logic for Certifying the FSCQ File SystemHaogang Chen, Massachusetts Institute of Technology; et al.
Daniel Ziegler, Massachusetts Institute of Technology
Tej Chajed, Massachusetts Institute of Technology
Adam Chlipala, Massachusetts Institute of Technology
M. Frans Kaashoek, Massachusetts Institute of Technology
Nickolai Zeldovich, Massachusetts Institute of Technology
Coz: Finding Code that Counts with Causal ProfilingCharlie Curtsinger, Grinnell College
Emery Berger, University of Massachusetts Amherst
STOC TheoryExponential Separation of Information and Communication for Boolean FunctionsAnat Ganor, Weizmann Institute of Science; et al.
Gillat Kol, Princeton University
Ran Raz, Weizmann Institute of Science
Lower Bounds on the Size of Semidefinite Programming RelaxationsJames R. Lee, University of Washington; et al.
Prasad Raghavendra, University of California, Berkeley
David Steurer, Cornell University
2-Server PIR with sub-polynomial communicationZeev Dvir & Sivakanth Gopi, Princeton University
UIST User InterfaceFoldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed ElectronicsSimon Olberding, Max Planck Institute for Informatics; et al.
Sergio Soto Ortega, Max Planck Institute for Informatics
Klaus Hildebrandt, Max Planck Institute for Informatics
Jurgen Steimle, Max Planck Institute for Informatics
Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye MovementsAugusto Esteves, University of Lancaster; et al.
Eduardo Velloso, University of Lancaster
Andreas Bulling, Max Planck Institute for Informatics
Hans Gellersen, University of Lancaster
Webstrates: Shareable Dynamic MediaClemens Klokmose, Aarhus University; et al.
James Eagan, Télécom Paris
Siemen Baader, Aarhus University
Wendy Mackay, Inria
Michel Beaudouin-Lafon, University of Paris-Sud
VLDB DatabasesConstructing an interactive natural language interface for relational databasesFei Li & H. V. Jagadish, University of Michigan
WWW World Wide WebHypTrails: A Bayesian Approach for Comparing Hypotheses About Human Trails on the WebPhilipp Singer, GESIS - Leibniz-Institute for the Social Sciences, Mannheim; et al.
Denis Helic, Graz University of Technology
Andreas Hotho, University of Würzburg
Markus Strohmaier, GESIS - Leibniz-Institute for the Social Sciences, Mannheim
2014
AAAI Artificial IntelligenceRecovering from Selection Bias in Causal and Statistical InferenceElias Bareinboim, University of California, Los Angeles; et al.
Jin Tian, Iowa State University
Judea Pearl, University of California, Los Angeles
ACL Natural Language ProcessingFast and Robust Neural Network Joint Models for Statistical Machine TranslationJacob Devlin, BBN Technologies; et al.
Rabih Zbib, BBN Technologies
Zhongqiang Huang, BBN Technologies
Thomas Lamar, BBN Technologies
Richard Schwartz, BBN Technologies
John Makhoul, BBN Technologies
CHI Human-Computer InteractionConsumed Endurance: A Metric to Quantify Arm Fatigue of Mid-Air InteractionsAnders Markussen, University of Copenhagen; et al.
Mikkel Jakobsen, University of Copenhagen
Kasper Hornbaek, University of Copenhagen
Duet: Exploring Joint Interactions on a Smart Phone and a Smart WatchXiang Anthony Chen, Carnegie Mellon University; et al.
Tovi Grossman, Autodesk
Daniel Wigdor, University of Toronto
George Fitzmaurice, Autodesk
Type-Hover-Swipe in 96 Bytes: A Motion Sensing Mechanical KeyboardStuart A Taylor, Microsoft; et al.
Cem Keskin, Microsoft
Otmar Hilliges, ETH Zurich
Shahram Izadi, Microsoft
John Helmes, Microsoft
Effects of Display Size and Navigation Type on a Classification TaskCan Liu, University of Paris-Sud; et al.
Olivier Chapuis, University of Paris-Sud
Michel Beaudouin-Lafon, University of Paris-Sud
Eric Lecolinet, Télécom Paris
Wendy Mackay, Inria
George Fitzmaurice, Autodesk
MixFab: a Mixed-Reality Environment for Personal FabricationChristian Weichel, University of Lancaster; et al.
Manfred Lau, University of Lancaster
David Kim, Microsoft
Nicolas Villar, Microsoft
Hans W Gellersen, University of Lancaster
Growing Closer on Meta: Changes in Tie Strength Through Social Network Site UseMoira Burke, Meta
Robert Kraut, Carnegie Mellon University
Emerging Sites of HCI Innovation: Hackerspaces, Hardware Startups & IncubatorsSilvia Lindtner, University of California, Irvine; et al.
Garnet Hertz, University of California, Irvine
Paul Dourish, University of California, Irvine
Designing for Slowness, Anticipation and Re-visitation: A Long Term Field Study of the PhotoboxWilliam Odom, Carnegie Mellon University; et al.
Abigail Sellen, Microsoft
Richard Banks, Microsoft
David Kirk, Newcastle University
Tim Regan, Microsoft
Mark Selby, University of Nottingham
Jodi Forlizzi, Carnegie Mellon University
John Zimmerman, Carnegie Mellon University
Estimating the Social Costs of FriendsourcingJeffrey Rzeszotarski & Meredith Morris, Microsoft
Human Values in Curating a Human Rights Media ArchiveAbigail Durrant, Newcastle University; et al.
David Kirk, Newcastle University
Stuart Reeves, University of Nottingham
"Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug WarMunmun De Choudhury, Microsoft; et al.
Andres Monroy-Hernandez, Microsoft
Gloria Mark, University of California, Irvine
Real-time Feedback for Improving Medication TakingMatthew Lee, Philips
Anind Dey, Carnegie Mellon University
Structured Labeling for Facilitating Concept Evolution in Machine LearningTodd Kulesza, Oregon State University; et al.
Saleema Amershi, Microsoft
Rich Caruana, Microsoft
Danyel Fisher, Microsoft
Denis Charles, Microsoft
Towards Accurate and Practical Predictive Models of Active-Vision-Based Visual SearchDavid Kieras, University of Michigan
Anthony Hornof, University of Oregon
RetroDepth: 3D Silhouette Sensing for High-Precision Input On and Above Physical SurfacesDavid Kim, Microsoft; et al.
Shahram Izadi, Microsoft
Jakub Dostal, University of St Andrews
Christoph Rhemann, Microsoft
Cem Keskin, Microsoft
Christopher Zach, Microsoft
Jamie Shotton, Microsoft
Timothy Large, Microsoft
Steven Bathiche, Microsoft
Matthias Niessner, Stanford University
D. Alex Butler, Microsoft
Sean Fanello, Istituto Italiano di Tecnologia
Vivek Pradeep, Microsoft
Understanding Multitasking Through Parallelized Strategy Exploration and Individualized Cognitive ModelingYunfeng Zhang & Anthony Hornof, University of Oregon
Making Sustainability Sustainable: Challenges in the Design of Eco-Interaction TechnologiesRayoung Yang, University of Michigan; et al.
Mark Newman, University of Michigan
Jodi Forlizzi, Carnegie Mellon University
CIKM Knowledge ManagementCross-Device SearchGeorge Montanez, Carnegie Mellon University; et al.
Ryen White, Microsoft
Xiao Huang, Microsoft
CVPR Computer VisionWhat Camera Motion Reveals About Shape with Unknown BRDFManmohan Chandraker, NEC Labs America
FOCS TheoryPath Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations and Faster Algorithms for Maximum FlowYin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology
FSE Software EngineeringArchitecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case StudyKlaus-Benedikt Schultis, Siemens; et al.
Christoph Elsner, Siemens
Daniel Lohmann, University of Erlangen-Nuremberg
Selection and Presentation Practices for Code Example SummarizationAnnie Ying & Martin Robillard, McGill University
Learning Natural Coding ConventionsMiltiadis Allamanis, University of Edinburgh; et al.
Earl T. Barr, University College London
Christian Bird, Microsoft
Charles Sutton, University of Edinburgh
AI: A Lightweight System for Tolerating Concurrency BugsMingxing Zhang, Tsinghua University; et al.
Yongwei Wu, Tsinghua University
Shan Lu, University of Wisconsin–Madison
Shanxiang Qi, University of Illinois at Urbana–Champaign
Jinglei Ren, Tsinghua University
Weimin Zheng, Tsinghua University
Powering the Static Driver Verifier using CorralAkash Lal & Shaz Qadeer, Microsoft
Are Mutants a Valid Substitute for Real Faults in Software Testing?René Just, University of Washington; et al.
Darioush Jalali, University of Washington
Laura Inozemtseva, University of Waterloo
Michael Ernst, University of Washington
Reid Holmes, University of Waterloo
Gordon Fraser, University of Sheffield
ICML Machine LearningUnderstanding the Limiting Factors of Topic Modeling via Posterior Contraction AnalysisJian Tang, Peking University; et al.
Zhaoshi Meng, University of Michigan
XuanLong Nguyen, University of Michigan
Qiaozhu Mei, University of Michigan
Ming Zhang, Peking University
ICSE Software EngineeringA Study and Toolkit for Asynchronous Programming in C#Semih Okur, University of Illinois at Urbana–Champaign; et al.
David L. Hartveld, Delft University of Technology
Danny Dig, Oregon State University
Arie van Deursen, Delft University of Technology
Characterizing and Detecting Performance Bugs for Smartphone ApplicationsYepang Liu, Hong Kong University of Science and Technology; et al.
Chang Xu, Nanjing University
Shing-Chi Cheung, Hong Kong University of Science and Technology
Coverage Is Not Strongly Correlated with Test Suite EffectivenessLaura Inozemtseva & Reid Holmes, University of Waterloo
Cowboys, Ankle Sprains, and Keepers of Quality: How Is Video Game Development Different from Software Development?Emerson Murphy-Hill, North Carolina State University; et al.
Thomas Zimmermann, Microsoft
Nachiappan Nagappan, Microsoft
Enhancing Symbolic Execution with VeritestingThanassis Avgerinos, Carnegie Mellon University; et al.
Alexandre Rebert, Carnegie Mellon University
Sang Kil Cha, Carnegie Mellon University
David Brumley, Carnegie Mellon University
Improving Automated Source Code Summarization via an Eye-Tracking Study of ProgrammersPaige Rodeghero, University of Notre Dame; et al.
Collin McMillan, University of Notre Dame
Paul W. McBurney, University of Notre Dame
Nigel Bosch, University of Notre Dame
Sidney D'Mello, University of Notre Dame
Trading Robustness for Maintainability: An Empirical Study of Evolving C# ProgramsNélio Cacho, Universidade Federal do Rio Grande do Norte; et al.
Thiago César, Universidade Federal do Rio Grande do Norte
Thomas Filipe, Universidade Federal do Rio Grande do Norte
Eliezio Soares, Universidade Federal do Rio Grande do Norte
Arthur Cassio, Universidade Federal do Rio Grande do Norte
Rafael Souza, Universidade Federal do Rio Grande do Norte
Israel Garcia, Universidade Federal do Rio Grande do Norte
Eiji Adachi Barbosa, Pontifical Catholic University of Rio de Janeiro
Alessandro Garcia, Pontifical Catholic University of Rio de Janeiro
Understanding JavaScript Event-Based InteractionsSaba Alimadadi, University of British Columbia; et al.
Sheldon Sequeira, University of British Columbia
Ali Mesbah, University of British Columbia
Karthik Pattabiraman, University of British Columbia
Unit Test Virtualization with VMVMJonathan Bell & Gail Kaiser, Columbia University
INFOCOM NetworkingJoint Static and Dynamic Traffic Scheduling in Data Center NetworksZizhong Cao, New York University Tandon School of Engineering; et al.
M. Kodialam, Bell Labs
T. V. Lakshman, Bell Labs
Performance Evaluation and Asymptotics for Content Delivery NetworksVirag Shah & Gustavo de Veciana, University of Texas at Austin
KDD Data MiningReducing the Sampling Complexity of Topic ModelsAaron Li, Carnegie Mellon University; et al.
Amr Ahmed, Google
Sujith Ravi, Google
Alexander Smola, Carnegie Mellon University
MOBICOM MobileTagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS DevicesLei Yang, Tsinghua University; et al.
Yekui Chen, Tsinghua University
Xiang-Yang Li, Illinois Institute of Technology
Chaowei Xiao, Tsinghua University
Mo Li, Nanyang Technological University
Yunhao Liu, Tsinghua University
NeurIPS Machine LearningAsymmetric LSH (ALSH) for Sublinear Time Maximum Inner Product Search (MIPS)Anshumali Shrivastava, Cornell University
Ping Li, Rutgers University
A* SamplingChristopher Maddison, University of Toronto; et al.
Daniel Tarlow, Microsoft
Tom Minka, Microsoft
NSDI NetworkingSoftware Dataplane VerificationMihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne
OSDI Operating SystemsArrakis: The Operating System is the Control PlaneSimon Peter, University of Washington; et al.
Jialin Li, University of Washington
Irene Zhang, University of Washington
Dan Ports, University of Washington
Doug Woos, University of Washington
Arvind Krishnamurthy, University of Washington
Thomas Anderson, University of Washington
Timothy Roscoe, ETH Zurich
Shielding Applications from an Untrusted Cloud with HavenAndrew Baumann, Microsoft; et al.
Marcus Peinado, Microsoft
Galen Hunt, Microsoft
IX: A Protected Dataplane Operating System for High Throughput and Low LatencyAdam Belay, Stanford University; et al.
George Prekas, École Polytechnique Fédérale de Lausanne
Ana Klimovic, Stanford University
Samuel Grossman, Stanford University
Christos Kozyrakis, Stanford University
Edouard Bugnion, École Polytechnique Fédérale de Lausanne
PLDI Programming LanguagesCompiler validation via equivalence modulo inputsVu Le, University of California, Davis; et al.
Mehrdad Afshari, University of California, Davis
Zhendong Su, University of California, Davis
Improving JavaScript Performance by Deconstructing the Type SystemWonsun Ahn, University of Illinois at Urbana–Champaign; et al.
Jiho Choi, University of Illinois at Urbana–Champaign
Thomas Shull, University of Illinois at Urbana–Champaign
María Garzarín, University of Illinois at Urbana–Champaign
Josep Torrellas, University of Illinois at Urbana–Champaign
On Abstraction Refinement for Program Analyses in DatalogXin Zhang, Georgia Institute of Technology; et al.
Ravi Mangal, Georgia Institute of Technology
Radu Grigore, University of Oxford
Mayur Naik, Georgia Institute of Technology
Hongseok Yang, University of Oxford
PODS DatabasesWeaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-ConjectureTom J. Ameloot, Hasselt University; et al.
Bas Ketsman, Hasselt University
Frank Neven, Hasselt University
Daniel Zinn, LogicBlox
S&P Security and PrivacySecure Multiparty Computations on BitCoinMarcin Andrychowicz, University of Warsaw; et al.
Stefan Dziembowski, University of Warsaw
Daniel Malinowski, University of Warsaw
Łukasz Mazurek, University of Warsaw
SIGCOMM NetworkingBalancing Accountability and Privacy in the NetworkDavid Naylor, Carnegie Mellon University; et al.
Matthew K. Mukerjee, Carnegie Mellon University
Peter Steenkiste, Carnegie Mellon University
CONGA: Distributed Congestion-Aware Load Balancing for DatacentersMohammad Alizadeh, Cisco Systems; et al.
Tom Edsall, Cisco Systems
Sarang Dharmapurikar, Cisco Systems
Ramanan Vaidyanathan, Cisco Systems
Kevin Chu, Cisco Systems
Andy Fingerhut, Google
Terry Lam, Cisco Systems
Francis Matus, Cisco Systems
Rong Pan, Cisco Systems
Navindra Yadav, Cisco Systems
George Varghese, Microsoft
SIGIR Information RetrievalPartitioned Elias-Fano IndexesGiuseppe Ottaviano, Istituto di Scienza e Tecnologie dell'Informazione
Rossano Venturini, University of Pisa
SIGMETRICS PerformanceConcave switching in single and multihop networksNeil Walton, University of Amsterdam
SIGMOD DatabasesMaterialization Optimizations for Feature Selection WorkloadsCe Zhang, Stanford University; et al.
Arun Kumar, University of Wisconsin–Madison
Christopher Ré, Stanford University
SODA TheoryPolynomiality for Bin Packing with a Constant Number of Item TypesMichel X. Goemans & Thomas Rothvoß, Massachusetts Institute of Technology
An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommodity GeneralizationsJonathan A. Kelner, Massachusetts Institute of Technology; et al.
Yin Tat Lee, Massachusetts Institute of Technology
Lorenzo Orecchia, Massachusetts Institute of Technology
Aaron Sidford, Massachusetts Institute of Technology
STOC TheoryThe matching polytope has exponential extension complexityThomas Rothvoß, University of Washington
UIST User InterfaceSensing Techniques for Tablet+Stylus InteractionKen Hinckley, Microsoft; et al.
Michel Pahud, Microsoft
Hrvoje Benko, Microsoft
Pourang Irani, Microsoft
Marcel Gavriliu, Microsoft
François Guimbretière, Microsoft
Xiang Anthony Chen, Microsoft
Fabrice Matulic, Microsoft
William Buxton, Microsoft
Andrew Wilson, Microsoft
Expert Crowdsourcing with Flash TeamsDaniela Retelny, Stanford University; et al.
Sébastien Robaszkiewicz, Stanford University
Alexandra To, Stanford University
Walter Lasecki, University of Rochester
Jay Patel, Stanford University
Negar Rahmati, Stanford University
Tulsee Doshi, Stanford University
Melissa Valentine, Stanford University
Michael Bernstein, Stanford University
PrintScreen: Fabricating Highly Customizable Thin-film Touch-DisplaysSimon Olberding, Max Planck Institute for Informatics; et al.
Michael Wessely, Max Planck Institute for Informatics
Jürgen Steimle, Max Planck Institute for Informatics
VLDB DatabasesThe Uncracked Pieces in Database CrackingFelix Martin Schuhknecht, Saarland University; et al.
Alekh Jindal, Massachusetts Institute of Technology
Jens Dittrich, Saarland University
epiC: an Extensible and Scalable System for Processing Big DataDawei Jiang, National University of Singapore; et al.
Gang Chen, Zhejiang University
Beng Chin Ooi, National University of Singapore
Kian-Lee Tan, National University of Singapore
Sai Wu, Zhejiang University
M4: A Visualization-Oriented Time Series Data AggregationUwe Jugel, SAP SE; et al.
Zbigniew Jerzak, SAP SE
Gregor Hackenbroich, SAP SE
Volker Markl, Technical University of Berlin
Building Efficient Query Engines in a High-Level LanguageYannis Klonatos, École Polytechnique Fédérale de Lausanne; et al.
Christoph Koch, École Polytechnique Fédérale de Lausanne
Tiark Rompf, École Polytechnique Fédérale de Lausanne
Hassan Chaf, Oracle Corporation
On k-Path Covers and their ApplicationsStefan Funke, University of Stuttgart; et al.
André Nusser, University of Stuttgart
Sabine Storandt, University of Stuttgart
WWW World Wide WebEfficient Estimation for High Similarities using Odd SketchesMichael Mitzenmacher, Harvard University; et al.
Rasmus Pagh, IT University of Copenhagen
Ninh Pham, IT University of Copenhagen
2013
AAAI Artificial IntelligenceSMILe: Shuffled Multiple-Instance LearningGary Doran & Soumya Ray, Case Western Reserve University
HC-Search: Learning Heuristics and Cost Functions for Structured PredictionJanardhan Rao Doppa, Oregon State University; et al.
Alan Fern, Oregon State University
Prasad Tadepalli, Oregon State University
ACL Natural Language ProcessingGrounded Language Learning from Video Described with SentencesHaonan Yu & Jeffrey Mark Siskind, Purdue University
CHI Human-Computer InteractionWeighted Graph Comparison Techniques for Brain Connectivity AnalysisBasak Alper, University of California, Santa Barbara; et al.
Benjamin Bach, Inria
Nathalie Riche, Microsoft
Tobias Isenberg, Inria
Jean-Daniel Fekete, Inria
Analyzing User-Generated YouTube Videos to Understand Touchscreen Use by People with Motor ImpairmentsLisa Anthony, University of Maryland, Baltimore County; et al.
YooJin Kim, University of Maryland
Leah Findlater, University of Maryland
What is "Critical" About Critical Design?Jeffrey Bardzell & Shaowen Bardzell, Indiana University Bloomington
The Dubuque Electricity Portal: Evaluation of a City-Scale Residential Electricity Consumption Feedback SystemTom Erickson, IBM; et al.
Ming Li, IBM
Younghun Kim, IBM
Ajay Deshpande, IBM
Sambit Sahu, IBM
Tian Chao, IBM
Piyawadee Sukaviriya, IBM
Milind Naphade, IBM
Improving Navigation-Based File RetrievalStephen Fitchett, University of Canterbury; et al.
Andy Cockburn, University of Canterbury
Carl Gutwin, University of Saskatchewan
SPRWeb: Preserving Subjective Responses to Website Colour Schemes through Automatic RecolouringDavid R. Flatla, University of Saskatchewan; et al.
Katharina Reinecke, Harvard University
Carl Gutwin, University of Saskatchewan
Krzysztof Z. Gajos, Harvard University
The Efficacy of Human Post-Editing for Language TranslationSpence Green, Stanford University; et al.
Jeffrey Heer, Stanford University
Christopher D. Manning, Stanford University
Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI ResearchEric B. Hekler, Arizona State University; et al.
Predrag Klasnja, University of Michigan
Jon Froehlich, University of Maryland
Matthew P. Buman, University of Maryland
Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical TurkLilly Irani, University of California, Irvine
M. Six Silberman, Bureau of Economic Interpretation
IllumiRoom: Peripheral Projected Illusions for Interactive ExperiencesBrett Jones, University of Illinois at Urbana–Champaign; et al.
Hrvoje Benko, Microsoft
Eyal Ofek, Microsoft
Andrew D. Wilson, Microsoft
Webzeitgeist: Design Mining the WebRanjitha Kumar, Stanford University; et al.
Arvind Satyanarayan, Stanford University
Cesar Torres, Stanford University
Maxine Lim, Stanford University
Salman Ahmad, Massachusetts Institute of Technology
Scott R. Klemmer, Stanford University
Jerry O. Talton, Intel
LaserOrigami: Laser-Cutting 3D ObjectsStefanie Mueller, Hasso Plattner Institute; et al.
Bastian Kruck, Hasso Plattner Institute
Patrick Baudisch, Hasso Plattner Institute
Labor Dynamics in a Mobile Micro-Task MarketMohamed Musthag & Deepak Ganesan, University of Massachusetts Amherst
Job Opportunities through Entertainment: Virally Spread Speech-Based Services for Low-Literate UsersAgha Ali Raza, Carnegie Mellon University; et al.
Farhan Ul Haq, Lahore University of Management Sciences
Zain Tariq, Lahore University of Management Sciences
Mansoor Pervaiz, Northeastern University
Samia Razaq, Lahore University of Management Sciences
Umar Saif, Lahore University of Management Sciences
Roni Rosenfeld, Carnegie Mellon University
At Home with Agents: Exploring Attitudes Towards Future Smart Energy InfrastructuresTom Rodden, University of Nottingham; et al.
Joel E. Fischer, University of Nottingham
Nadia Pantidi, University of Nottingham
Khaled Bachour, University of Nottingham
Stuart Moran, University of Nottingham
Screenfinity: Extending the Perception Area of Content on Very Large Public DisplaysConstantin Schmidt, Technical University of Berlin; et al.
Jörg Müller, Technical University of Berlin
Gilles Bailly, Technical University of Berlin
Reasons to Question Seven Segment DisplaysHarold Thimbleby, Swansea University
The Many Faces of Meta: Experiencing Social Media as Performance, Exhibition, and Personal ArchiveXuan Zhao, Cornell University; et al.
Niloufar Salehi, Cornell University
Sasha Naranjit, Cornell University
Sara Alwaalan, Cornell University
Stephen Voida, Cornell University
Dan Cosley, Cornell University
CIKM Knowledge ManagementPenguins in Sweaters, or Serendipitous Entity Search on User-generated ContentIlaria Bordino, Yahoo; et al.
Yelena Mejova, Yahoo
Mounia Lalmas, Yahoo
CVPR Computer VisionFast, Accurate Detection of 100,000 Object Classes on a Single MachineThomas Dean, Google; et al.
Mark A. Ruzon, Google
Mark Segal, Google
Jonathon Shlens, Google
Sudheendra Vijayanarasimhan, Google
Jay Yagnik, Google
FOCS TheoryNavigating Central Path with Electrical Flows: from Flows to Matchings, and BackAleksander Mądry, École Polytechnique Fédérale de Lausanne
On Kinetic Delaunay Triangulations: A Near Quadratic Bound for Unit Speed MotionsNatan Rubin, University of Paris VI: Pierre-and-Marie-Curie University
ICCV Computer VisionFrom Large Scale Image Categorization to Entry-Level CategoriesVicente Ordonez, University of North Carolina at Chapel Hill; et al.
Jia Deng, Stanford University
Yejin Choi, Stony Brook University
Alexander Berg, University of North Carolina at Chapel Hill
Tamara Berg, University of North Carolina at Chapel Hill
ICML Machine LearningFast Semidifferential-based Submodular Function OptimizationRishabh Iyer, University of Washington; et al.
Stefanie Jegelka, University of California, Berkeley
Jeff Bilmes, University of Washington
Vanishing Component AnalysisRoi Livni, The Hebrew University of Jerusalum; et al.
David Lehavi, Hewlett Packard
Sagi Schein, Hewlett Packard
Hila Nachlieli, Hewlett Packard
Shai Shalev Shwartz, The Hebrew University of Jerusalum
Amir Globerson, The Hebrew University of Jerusalum
ICSE Software EngineeringData Clone Detection and Visualization in SpreadsheetsFelienne Hermans, Delft University of Technology; et al.
Ben Sedee, Delft University of Technology
Martin Pinzger, Delft University of Technology
Arie van Deursen, Delft University of Technology
Interaction-Based Test-Suite MinimizationDale Blue, IBM; et al.
Itai Segall, IBM
Rachel Tzoref-Brill, IBM
Aviad Zlotnick, IBM
Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop CloudsWeiyi Shang, Queen's University; et al.
Zhen Ming Jiang, Queen's University
Hadi Hemmati, Queen's University
Bram Adams, Polytechnique Montréal
Ahmed E. Hassan, Queen's University
Patrick Martin, Queen's University
UML in PracticeMarian Petre, The Open University
Dual Ecological Measures of Focus in Software DevelopmentDaryl Posnett, University of California, Davis; et al.
Raissa D'Souza, University of California, Davis
Premkumar Devanbu, University of California, Davis
Vladimir Filkov, University of California, Davis
Automatic patch generation learned from human-written patchesDongsun Kim, Hong Kong University of Science and Technology; et al.
Jaechang Nam, Hong Kong University of Science and Technology
Jaewoo Song, Hong Kong University of Science and Technology
Sunghun Kim, Hong Kong University of Science and Technology
IJCAI Artificial IntelligenceFlexibility and Decoupling in the Simple Temporal ProblemMichel Wilson, Delft University of Technology; et al.
Tomas Klos, Delft University of Technology
Cees Witteveen, Delft University of Technology
Bob Huisman, Delft University of Technology
Bayesian Optimization in High Dimensions via Random EmbeddingsZiyu Wang, University of British Columbia; et al.
Masrour Zoghi, University of Amsterdam
Frank Hutter, Freiberg University of Mining and Technology
David Matheson, University of British Columbia
Nando de Freitas, University of British Columbia
INFOCOM NetworkingOn the Steady-State of Cache NetworksElisha J. Rosensweig, University of Massachusetts Amherst; et al.
Daniel S. Menasche, University of Massachusetts Amherst
Jim Kurose, University of Massachusetts Amherst
KDD Data MiningSimple and Deterministic Matrix SketchingEdo Liberty, Yahoo
MOBICOM MobileWhole-Home Gesture Recognition Using Wireless SignalsQifan Pu, University of Washington; et al.
Sidhant Gupta, University of Washington
Shyamnath Gollakota, University of Washington
Shwetak Patel, University of Washington
NeurIPS Machine LearningA memory frontier for complex synapsesSubhaneil Lahiri & Surya Ganguli, Stanford University
Submodular Optimization with Submodular Cover and Submodular Knapsack ConstraintsRishabh Iyer & Jeff Bilmes, University of Washington
Scalable Influence Estimation in Continuous-Time Diffusion NetworksNan Du, Georgia Institute of Technology; et al.
Le Song, Georgia Institute of Technology
Manuel Gomez-Rodriguez, Max Planck Institute for Intelligent Systems
Hongyuan Zha, Georgia Institute of Technology
NSDI NetworkingA Fault-Tolerant Engineered NetworkVincent Liu, University of Washington; et al.
Daniel Halperin, University of Washington
Arvind Krishnamurthy, University of Washington
Thomas Anderson, University of Washington
Embassies: Radically Refactoring the WebJon Howell, Microsoft; et al.
Bryan Parno, Microsoft
John R. Douceur, Microsoft
PLDI Programming LanguagesA General Constraint-centric Scheduling Framework for Spatial ArchitecturesTony Nowatzki, University of Wisconsin–Madison; et al.
Michael Sartin-Tarm, University of Wisconsin–Madison
Lorenzo De Carli, University of Wisconsin–Madison
Karthikeyan Sankaralingam, University of Wisconsin–Madison
Cristian Estan, Broadcom
Behnam Robatmili, Qualcomm
CLAP: Recording Local Executions to Reproduce Concurrency FailuresJeff Huang, Hong Kong University of Science and Technology; et al.
Charles Zhang, Hong Kong University of Science and Technology
Julian Dolby, IBM
Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many PathsSriram Sankaranarayanan, University of Colorado Boulder; et al.
Aleksandar Chakarov, University of Colorado Boulder
Sumit Gulwani, Microsoft
Reconciling Exhaustive Pattern Matching with ObjectsChinawat Isradisaikul & Andrew C. Myers, Cornell University
PODS DatabasesVerification of database-driven systems via amalgamationMikołaj Bojańczyk, University of Warsaw; et al.
Luc Segoufin, Inria
Szymon Toruńczyk, University of Warsaw
S&P Security and PrivacyPinocchio: Nearly Practical Verifiable ComputationBryan Parno, Microsoft; et al.
Craig Gentry, IBM
Jon Howell, Microsoft
Mariana Raykova, IBM
SIGCOMM NetworkingAmbient Backscatter: Wireless Communication Out of Thin AirVincent Liu, University of Washington; et al.
Aaron Parks, University of Washington
Vamsi Talla, University of Washington
Shyamnath Gollakota, University of Washington
David Wetherall, University of Washington
Joshua R. Smith, University of Washington
SIGIR Information RetrievalBeliefs and Biases in Web SearchRyen W. White, Microsoft
SIGMETRICS PerformanceQueueing System Topologies with Limited FlexibilityJohn Tsitsiklis & Kuang Xu, Massachusetts Institute of Technology
SIGMOD DatabasesMassive Graph TriangulationXiaocheng Hu, The Chinese University of Hong Kong; et al.
Yufei Tao, The Chinese University of Hong Kong
Chin-Wan Chung, KAIST
SODA TheoryA Simple Algorithm for the Graph Minor Decomposition - Logic meets Structural Graph TheoryMartin Grohe, RWTH Aachen University; et al.
Ken-ichi Kawarabayashi, National Institute of Informatics
Bruce Reed, McGill University
Dynamic graph connectivity in polylogarithmic worst case timeBruce M. Kapron, University of Victoria; et al.
Valerie King, University of Victoria
Ben Mountjoy, University of Victoria
SOSP Operating SystemsThe Scalable Commutativity Rule: Designing Scalable Software for Multicore ProcessorsAustin T. Clements, Massachusetts Institute of Technology; et al.
M. Frans Kaashoek, Massachusetts Institute of Technology
Nickolai Zeldovich, Massachusetts Institute of Technology
Robert T. Morris, Massachusetts Institute of Technology
Eddie Kohler, Harvard University
Towards optimization-safe systems: analyzing the impact of undefined behaviorXi Wang, Massachusetts Institute of Technology; et al.
Nickolai Zeldovich, Massachusetts Institute of Technology
M. Frans Kaashoek, Massachusetts Institute of Technology
Armando Solar-Lezama, Massachusetts Institute of Technology
Naiad: A Timely Dataflow SystemDerek G. Murray, Microsoft; et al.
Frank McSherry, Microsoft
Rebecca Isaacs, Microsoft
Michael Isard, Microsoft
Paul Barham, Microsoft
Martíın Abadi, Microsoft
STOC TheoryApproximation Resistance from Pairwise Independent SubgroupsSiu On Chan, University of California, Berkeley
Low Rank Approximation and Regression in Input Sparsity TimeKenneth L. Clarkson & David P. Woodruff, IBM
UIST User InterfacePneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing InterfacesLining Yao, Massachusetts Institute of Technology; et al.
Ryuma Niiyama, Massachusetts Institute of Technology
Jifei Ou, Massachusetts Institute of Technology
Sean Follmer, Massachusetts Institute of Technology
Clark Della Silva, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology
Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic SensingMakoto Ono, University of Tsukuba; et al.
Buntarou Shizuki, University of Tsukuba
Jiro Tanaka, University of Tsukuba
Fiberio: A Touchscreen that Senses FingerprintsChristian Holz & Patrick Baudisch, Hasso Plattner Institute
VLDB DatabasesDisC Diversity: Result Diversification based on Dissimilarity and CoverageMarina Drosou & Evaggelia Pitoura, University of Ioannina
WWW World Wide WebNo Country for Old Members: User Lifecycle and Linguistic Change in Online CommunitiesCristian Danescu-Niculescu-Mizil, Stanford University; et al.
Robert West, Stanford University
Dan Jurafsky, Stanford University
Jure Leskovec, Stanford University
Christopher Potts, Stanford University
2012
AAAI Artificial IntelligenceLearning SVM Classifiers with Indefinite KernelsSuicheng Gu & Yuhong Guo, Temple University
Document Summarization Based on Data ReconstructionZhanying He, Zhejiang University; et al.
Chun Chen, Zhejiang University
Jiajun Bu, Zhejiang University
Can Wang, Zhejiang University
Lijan Zhang, Zhejiang University
Deng Cai, Zhejiang University
Xiaofei He, Zhejiang University
ACL Natural Language ProcessingBayesian Symbol-Refined Tree Substitution Grammars for Syntactic ParsingHiroyuki Shindo, NTT Communication Science Laboratories; et al.
Yusuke Miyao, National Institute of Informatics
Akinori Fujino, NTT Communication Science Laboratories
Masaaki Nagata, NTT Communication Science Laboratories
CHI Human-Computer InteractionObservational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobile DevicesNiels Henze, University of Oldenburg; et al.
Enrico Rukzio, University of Duisburg-Essen
Susanne Boll, University of Oldenburg
The Normal Natural Troubles of Driving with GPSBarry Brown, Stockholm University
Eric Laurier, University of Edinburgh
Improving Command Selection with CommandMapsJoey Scarr, University of Canterbury; et al.
Andy Cockburn, University of Canterbury
Carl Gutwin, University of Saskatchewan
Andrea Bunt, University of Manitoba
Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical KiosksKurtis Heimerl, University of California, Berkeley; et al.
Brian Gawalt, University of California, Berkeley
Kuang Chen, University of California, Berkeley
Tapan S. Parikh, University of California, Berkeley
Björn Hartmann, University of California, Berkeley
Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday ObjectsMunehiko Sato, Disney Research; et al.
Ivan Poupyrev, Disney Research
Chris Harrison, Disney Research
Detecting Error-Related Negativity for Interaction DesignChi Vi & Sriram Subramanian, University of Bristol
Empathy, Participatory Design and People with DementiaStephen Lindsay, Newcastle University; et al.
Katie Britain, Newcastle University
Daniel Jackson, Newcastle University
Cassim Ladha, Newcastle University
Karim Ladha, Newcastle University
Patrick Olivier, Newcastle University
Looking Glass: A Field Study on Noticing Interactivity of Shop WindowsJörg Müller, Technical University of Berlin; et al.
Robert Walter, Technical University of Berlin
Gilles Bailly, Technical University of Berlin
Michael Nischt, Technical University of Berlin
Florian Alt, University of Stuttgart
Affordances in HCI: Toward a Mediated Action PerspectiveVictor Kaptelinin, University of Bergen
Bonnie Nardi, University of California, Irvine
Personas and Decision Making in the Design Process: An Ethnographic Case StudyErin Friess, University of North Texas
Using Rhythmic Patterns as an Input MethodEmilien Ghomi, University of Paris-Sud; et al.
Guillaume Faure, University of Paris-Sud
Stephane Huot, University of Paris-Sud
Olivier Chapuis, University of Paris-Sud
Michel Beaudouin-Lafon, University of Paris-Sud
Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCIYlva Fernaeus, Royal Institute of Technology; et al.
Martin Jonssonm, Södertörn University
Jakob Tholanderm, Stockholm University
Uncomfortable InteractionsSteve Benford, University of Nottingham; et al.
Chris Greenhalgh, University of Nottingham
Gabriella Giannachi, University of Exeter
Brendan Walker, University of Nottingham
Joe Marshall, University of Nottingham
Tom Rodden, University of Nottingham
ClayVision: The (Elastic) Image of the CityYuichiro Takeuchi, Sony
Ken Perlin, New York University
CIKM Knowledge ManagementGelling, and Melting, Large Graphs by Edge ManipulationHanghang Tong, IBM; et al.
B. Aditya Prakash, Virginia Tech
Tina Eliassi-Rad, Rutgers University
Michalis Faloutsos, University of California, Riverside
Christos Faloutsos, Carnegie Mellon University
CVPR Computer VisionA Simple Prior-free Method for Non-Rigid Structure-from-Motion FactorizationYuchao Dai, Northwestern Polytechnical University; et al.
Hongdong Li, Australian National University
Mingyi He, Northwestern Polytechnical University
FOCS TheoryA Polylogarithmic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2Julia Chuzhoy, Toyota Technological Institute at Chicago
Shi Li, Princeton University
A multi-prover interactive proof for NEXP sound against entangled proversTsuyoshi Ito, NEC Labs America
Thomas Vidick, Massachusetts Institute of Technology
FSE Software EngineeringSeeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software LibrariesBradley Cossette & Robert Walker, University of Calgary
Scalable Test Data Generation from Multidimensional ModelsEmina Torlak, University of California, Berkeley
Assessing the Value of Branches with What-if AnalysisChristian Bird & Thomas Zimmermann, Microsoft
ICML Machine LearningBayesian Posterior Sampling via Stochastic Gradient Fisher ScoringSungjin Ahn, University of California, Irvine; et al.
Anoop Korattikara, University of California, Irvine
Max Welling, University of California, Irvine
ICSE Software EngineeringAmplifying Tests to Validate Exception Handling CodePingyu Zhang & Sebastian Elbaum, University of Nebraska–Lincoln
A Tactic-Centric Approach for Automating Traceability of Quality ConcernsMehdi Mirakhorli, DePaul University; et al.
Yonghee Shin, DePaul University
Jane Cleland-Huang, DePaul University
Murat Cinar, DePaul University
Using Dynamic Analysis to Discover Polynomial and Array InvariantsThanhVu Nguyen, University of New Mexico; et al.
Deepak Kapur, University of New Mexico
Westley Weimer, University of New Mexico
Stephanie Forrest, University of New Mexico
Automated Detection of Client-State Manipulation VulnerabilitiesAnders Møller & Mathias Schwarz, Aarhus University
Understanding Integer Overflow in C/C++Will Dietz, University of Illinois at Urbana–Champaign; et al.
Peng Li, University of Utah
John Regehr, University of Utah
Vikram Adve, University of Illinois at Urbana–Champaign
How Do Professional Developers Comprehend Software?Tobias Roehm, Technical University of Munich; et al.
Rebecca Tiarks, University of Bremen
Rainer Koschke, University of Bremen
Walid Maalej, Technical University of Munich
Partial Models: Towards Modeling and Reasoning with UncertaintyMichalis Famelis, University of Toronto; et al.
Rick Salay, University of Toronto
Marsha Chechik, University of Toronto
INFOCOM NetworkingMulti-resource allocation: Fairness-efficiency tradeoffs in a unifying frameworkCarlee Joe-Wong, Princeton University; et al.
Soumya Sen, Princeton University
Tian Lan, George Washington University
Mung Chiang, Princeton University
KDD Data MiningSearching and Mining Trillions of Time Series Subsequences under Dynamic Time WarpingThanawin Rakthanmanon, University of California, Riverside; et al.
Bilson Campana, University of California, Riverside
Abdullah Mueen, University of California, Riverside
Gustavo Batista, University of São Paulo
Brandon Westover, Brigham and Women's Hospital
Qiang Zhu, University of California, Riverside
Jesin Zakaria, University of California, Riverside
Eamonn Keogh, University of California, Riverside
MOBICOM MobileDistinguishing Users with Capacitative Touch CommunicationTam Vu, Rutgers University; et al.
Akash Baid, Rutgers University
Simon Gao, Rutgers University
Marco Gruteser, Rutgers University
Richard Howard, Rutgers University
Janne Lindqvist, Rutgers University
Predag Spasojevic, Rutgers University
Jeffrey Walling, Rutgers University
NSDI NetworkingResilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingMatei Zaharia, University of California, Berkeley; et al.
Mosharaf Chowdhury, University of California, Berkeley
Tathagata Das, University of California, Berkeley
Ankur Dave, University of California, Berkeley
Justin Ma, University of California, Berkeley
Murphy McCauley, University of California, Berkeley
Michael J. Franklin, University of California, Berkeley
Scott Shenker, University of California, Berkeley
Ion Stoica, University of California, Berkeley
OSDI Operating SystemsSpanner: Google's Globally-Distributed DatabaseJames C. Corbett, Google; et al.
Jeffrey Dean, Google
Michael Epstein, Google
Andrew Fikes, Google
Christopher Frost, Google
JJ Furman, Google
Sanjay Ghemawat, Google
Andrey Gubarev, Google
Christopher Heiser, Google
Peter Hochschild, Google
Wilson Hsieh, Google
Sebastian Kanthak, Google
Eugene Kogan, Google
Hongyi Li, Google
Alexander Lloyd, Google
Sergey Melnik, Google
David Mwaura, Google
David Nagle, Google
Sean Quinlan, Google
Rajesh Rao, Google
Lindsay Rolig, Google
Yasushi Saito, Google
Michal Szymaniak, Google
Christopher Taylor, Google
Ruth Wang, Google
Dale Woodford, Google
PLDI Programming LanguagesConcurrent Data Representation SynthesisPeter Hawkins, Stanford University; et al.
Alex Aiken, Stanford University
Kathleen Fisher, Tufts University
Martin Rinard, Massachusetts Institute of Technology
Mooly Sagiv, Tel Aviv University
PODS DatabasesWorst-case Optimal Join AlgorithmsHung Q. Ngo, University at Buffalo; et al.
Ely Porat, Bar-Ilan University
Christopher Ré, University of Wisconsin–Madison
Atri Rudra, University at Buffalo
S&P Security and PrivacyDon't Trust Satellite Phones: A Security Analysis of Two Satphone StandardsBenedikt Driessen, Ruhr University Bochum; et al.
Ralf Hund, Ruhr University Bochum
Carsten Willems, Ruhr University Bochum
Christof Paar, Ruhr University Bochum
Thorsten Holz, Ruhr University Bochum
SIGCOMM NetworkingMulti-Resource Fair Queueing for Packet ProcessingAli Ghodsi, University of California, Berkeley; et al.
Vyas Sekar, Intel
Matei Zaharia, University of California, Berkeley
Ion Stoica, University of California, Berkeley
SIGIR Information RetrievalTime-Based Calibration of Effectiveness MeasuresMark Smucker & Charles Clarke, University of Waterloo
SIGMETRICS PerformanceTemperature management in data centers: why some (might) like it hotNosayba El-Sayed, University of Toronto; et al.
Ioan Stefanovici, University of Toronto
George Amvrosiadis, University of Toronto
Andy A. Hwang, University of Toronto
Bianca Schroeder, University of Toronto
SIGMOD DatabasesHigh-Performance Complex Event Processing over XML StreamsBarzan Mozafari, Massachusetts Institute of Technology; et al.
Kai Zeng, University of California, Los Angeles
Carlo Zaniolo, University of California, Los Angeles
SODA TheoryComputing all maps into a sphereMartin Čadek, Masaryk University; et al.
Marek Krčál, Charles University
Jiří Matoušel, Charles University
Francis Sergeraert, Joseph Fourier University
Lukáš Vokřínel, Masaryk University
Uli Wagner, ETH Zurich
STOC TheoryLinear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower BoundsSamuel Fiorini, Free University of Brussels; et al.
Serge Massar, Free University of Brussels
Sebastian Pokutta, University of Erlangen-Nuremberg
Hans Tiwary, Free University of Brussels
Ronald de Wolf, Centrum Wiskunde & Informatica
The Cell Probe Complexity of Dynamic Range CountingKasper Larsen, Aarhus University
UIST User InterfaceJamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Changing DevicesSean Follmer, Massachusetts Institute of Technology; et al.
Daniel Leithinger, Massachusetts Institute of Technology
Alex Olwal, Massachusetts Institute of Technology
Nadia Cheng, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology
Cliplets: juxtaposing still and dynamic imageryNeel Joshi, Microsoft; et al.
Sisil Mehta, Georgia Institute of Technology
Steven Drucker, Microsoft
Eric Stollnitz, Microsoft
Hugues Hoppe, Microsoft
Matt Uyttendaele, Microsoft
Michael Cohen, Microsoft
CrowdScape: interactively visualizing user behavior and outputJeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University
VLDB DatabasesDense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story IdentificationAlbert Angel, University of Toronto; et al.
Nick Koudas, University of Toronto
Nikos Sarkas, University of Toronto
Divesh Srivastava, AT&T Laboratories
WWW World Wide WebCounting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the StandardMarcelo Arenas, Pontifical Catholic University of Chile; et al.
Sebastián Conca, Pontifical Catholic University of Chile
Jorge Pérez, University of Chile
2011
AAAI Artificial IntelligenceComplexity of and Algorithms for Borda ManipulationJessica Davies, University of Toronto; et al.
George Katsirelos, University of Paris-Sud
Nina Narodytska, University of New South Wales
Toby Walsh, National ICT Australia
Dynamic Resource Allocation in Conservation PlanningDaniel Golovin, California Institute of Technology; et al.
Andreas Krause, ETH Zurich
Beth Gardner, North Carolina State University
Sarah J. Converse, Patuxent Wildlife Research Center
Steve Morey, United States Fish and Wildlife Service
ACL Natural Language ProcessingUnsupervised Part-of-Speech Tagging with Bilingual Graph-Based ProjectionsDipanjan Das, Carnegie Mellon University
Slav Petrov, Google
CHI Human-Computer InteractionBricolage: Example-Based Retargeting for Web DesignRanjitha Kumar, Stanford University; et al.
Jerry Talton, Stanford University
Salman Ahmad, Stanford University
Scott Klemmer, Stanford University
Teenagers and Their Virtual Possessions: Design Opportunities and IssuesWilliam Odom, Carnegie Mellon University; et al.
John Zimmerman, Carnegie Mellon University
Jodi Forlizzi, Carnegie Mellon University
Mid-air Pan-and-Zoom on Wall-sized DisplaysMathieu Nancel, University of Paris-Sud; et al.
Julie Wagner, Inria
Emmanuel Pietriga, Inria
Olivier Chapuis, University of Paris-Sud
Wendy Mackay, Inria
Why is My Internet Slow?: Making Network Speeds VisibleMarshini Chetty, Georgia Institute of Technology; et al.
David Haslem, Orange Sparkle Ball
Andrew Baird, Amazon
Ugochi Ofoha, Georgia Institute of Technology
Bethany Sumner, Georgia Institute of Technology
Rebecca Grinter, Georgia Institute of Technology
Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual EnvironmentThomas Erickson, IBM; et al.
N. Sadat Shami, IBM
Wendy A. Kellogg, IBM
David W. Levine, IBM
Your Noise is My Command: Sensing Gestures Using the Body as an AntennaGabe Cohn, University of Washington; et al.
Daniel Morris, Microsoft
Shwetak N. Patel, University of Washington
Desney Tan, Microsoft
Enhancing Physicality in Touch Interaction with Programmable FrictionVincent Levesque, University of British Columbia; et al.
Louise Oram, University of British Columbia
Karon MacLean, University of British Columbia
Andy Cockburn, University of Canterbury
Nicholas D. Marchuk, Northwestern University
Dan Johnson, Northwestern University
J. Edward Colgate, Northwestern University
Usable Gestures for Blind People: Understanding Preference and PerformanceShaun K. Kane, University of Washington; et al.
Jacob Wobbrock, University of Washington
Richard E. Ladner, University of Washington
Automics: souvenir generating photoware for theme parksAbigail Durrant, University of Nottingham; et al.
Duncan Rowland, University of Lincoln
David Kirk, University of Nottingham
Steve Benford, University of Nottingham
Joel E. Fischer, University of Nottingham
Derek McAuley, University of Nottingham
Michael A. Peshkin, Northwestern University
Effects of Community Size and Contact Rate in Synchronous Social Q&ARyen W. White, Microsoft; et al.
Matthew Richardson, Microsoft
Yandong Liu, Carnegie Mellon University
Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Word PairsKoji Yatani, University of Toronto; et al.
Michael Novati, University of Toronto
Andrew Trusty, University of Toronto
Khai N. Truong, University of Toronto
In the Shadow of Misperception: Assistive Technology Use and Social InteractionsKristen Shinohara & Jacob Wobbrock, University of Washington
Ease of Juggling: Studying the Effects of Manual MultitaskingAntti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University
CIKM Knowledge ManagementIntent-aware query similarityJiafeng Guo, Chinese Academy of Sciences; et al.
Xueqi Cheng, Chinese Academy of Sciences
Gu Su, Microsoft
Xiaofei Zhu, Chinese Academy of Sciences
CVPR Computer VisionReal-time Human Pose Recognition in Parts from Single Depth ImagesJamie Shotton, Microsoft; et al.
Andrew Fitzgibbon, Microsoft
Mat Cook, Microsoft
Toby Sharp, Microsoft
Mark Finocchio, Microsoft
Richard Moore, Microsoft
Alex Kipman, Microsoft
Andrew Blake, Microsoft
FOCS TheoryA Randomized Rounding Approach to the Traveling Salesman ProblemShayan Oveis Gharan, Stanford University; et al.
Amin Saberi, Stanford University
Mohit Singh, McGill University
Approximating Graphic TSP by MatchingsTobia Mömke & Ola Svensson, Royal Institute of Technology
A Polylogarithmic-Competitive Algorithm for the k-Server ProblemNikhil Bansal, IBM; et al.
Niv Buchbinder, The Open University
Aleksander Mądry, Massachusetts Institute of Technology
Joseph Naor, Technion – Israel Institute of Technology
FSE Software EngineeringProving programs robustSwarat Chaudhuri, Rice University; et al.
Sumit Gulwani, Microsoft
Roberto Lublinerman, Pennsylvania State University
Sara Navidpour, Pennsylvania State University
How Do Fixes Become Bugs?Zuoning Yin, University of Illinois at Urbana–Champaign; et al.
Ding Yuan, University of Illinois at Urbana–Champaign
Yuanyuan Zhou, University of California, San Diego
Shankar Pasupathy, NetApp
Lakshmi Bairavasundaram, NetApp
Proactive Detection of Collaboration ConflictsYuriy Brun, University of Washington; et al.
Reid Holmes, University of Waterloo
Michael D. Ernst, University of Washington
David Notkin, University of Washington
ICCV Computer VisionRelative AttributesDevi Parikh, Toyota Technological Institute at Chicago
Kristen Grauman, University of Texas at Austin
ICML Machine LearningComputational Rationalization: The Inverse Equilibrium ProblemKevin Waugh, Carnegie Mellon University; et al.
Brian Ziebart, Carnegie Mellon University
Drew Bagnell, Carnegie Mellon University
ICSE Software EngineeringRun-Time Efficient Probabilistic Model CheckingAntonio Filieri, Politecnico di Milano; et al.
Carlo Ghezzi, Politecnico di Milano
Giordano Tamburrelli, Politecnico di Milano
Verifying Multi-threaded Software using SMT-based Context-Bounded Model CheckingLucas Cordeiro & Bernd Fischer, University of Southampton
Programs, tests, and oracles: the foundations of testing revisitedMatt Staats, University of Minnesota; et al.
Michael W. Whalen, University of Minnesota
Mats P.E. Heimdahl, University of Minnesota
On-demand Feature Recommendations Derived from Mining Public Product DescriptionsHoratiu Dumitru, DePaul University; et al.
Marek Gibiec, DePaul University
Negar Hariri, DePaul University
Jane Cleland-Huang, DePaul University
Bamshad Mobasher, DePaul University
Carlos Castro-Herrera, DePaul University
Mehdi Mirakhorli, DePaul University
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and ProfitsNarayan Ramasubbu, Singapore Management University; et al.
Marcelo Cataldo, Carnegie Mellon University
Rajesh Krishna Balan, Singapore Management University
James D. Herbsleb, Carnegie Mellon University
IJCAI Artificial IntelligenceNested Rollout Policy Adaptation for Monte Carlo Tree SearchChristopher D. Rosin, Parity Computing
Unweighted Coalitional Manipulation Under the Borda Rule is NP-HardNadja Betzler, Technical University of Berlin; et al.
Rolf Niedermeier, Technical University of Berlin
Gerhard J. Woeginger, Eindhoven University of Technology
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean SpacesRoman Kontchakov, Birkbeck College London; et al.
Yavor Nenov, University of Manchester
Ian Pratt-Hartmann, University of Manchester
Michael Zakharyaschev, Birkbeck College London
INFOCOM NetworkingDynamic right-sizing for power-proportional data centersMinghong Lin, California Institute of Technology; et al.
Adam Wierman, California Institute of Technology
Lachlan Andrew, Swinburne University of Technology
Eno Thereska, Microsoft
KDD Data MiningLeakage in Data Mining: Formulation, Detection, and AvoidanceShachar Kaufman, Tel Aviv University; et al.
Saharon Rosset, Tel Aviv University
Claudia Perlich, Media6Degrees
MOBICOM MobileE-MiLi: Energy-Minimizing Idle Listening in Wireless NetworksXinyu Zhang & Kang G. Shin, University of Michigan
Detecting Driver Phone Use Leveraging Car SpeakersJie Yang, Stevens Institute of Technology; et al.
Simon Sdhom, Stevens Institute of Technology
Gayathri Chandrasekaran, Rutgers University
Tam Vu, Stevens Institute of Technology
Hongbo Liu, Stevens Institute of Technology
Nicolae Cecan, Rutgers University
Yingying Chen, Stevens Institute of Technology
Marco Gruteser, Rutgers University
Richard P. Martin, Rutgers University
NSDI NetworkingServerSwitch: A Programmable and High Performance Platform for Data Center NetworksGuohan Lu, Microsoft; et al.
Chuanxiong Guo, Microsoft
Yulong Li, Microsoft
Zhiqiang Zhou, Tsinghua University
Tong Yuan, Microsoft
Haitao Wu, Microsoft
Yongqiang Xiong, Microsoft
Rui Gao, Microsoft
Yongguang Zhang, Microsoft
Design, Implementation and Evaluation of Congestion Control for Multipath TCPDamon Wischik, University College London; et al.
Costin Raiciu, University College London
Adam Greenhalgh, University College London
Mark Handley, University College London
PLDI Programming LanguagesData Representation SynthesisPeter Hawkins, Stanford University; et al.
Alex Aiken, Stanford University
Kathleen Fisher, Tufts University
Martin Rinard, Massachusetts Institute of Technology
Mooly Sagiv, Tel Aviv University
PODS DatabasesData Exchange Beyond Complete DataMarcelo Arenas, Pontifical Catholic University of Chile; et al.
Jorge Pérez, University of Chile
Juan Reutter, University of Edinburgh
S&P Security and PrivacyPhonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iksAndrew M. White, University of North Carolina at Chapel Hill; et al.
Austin Matthews, University of North Carolina at Chapel Hill
Kevin Snow, University of North Carolina at Chapel Hill
Fabian Monrose, University of North Carolina at Chapel Hill
SIGCOMM NetworkingThey Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical DevicesShyamnath Gollakota, Massachusetts Institute of Technology; et al.
Haitham Hassanieh, Massachusetts Institute of Technology
Benjamin Ransford, University of Massachusetts Amherst
Dina Katabi, Massachusetts Institute of Technology
Kevin Fu, University of Massachusetts Amherst
SIGIR Information RetrievalFind It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction DataMikhail Ageev, Moscow State University; et al.
Qi Guo, Emory University
Dmitry Lagun, Emory University
Eugene Agichtein, Emory University
SIGMETRICS PerformanceTopology Discovery of Sparse Random Graphs With Few ParticipantsAnimashree Anandkumar, University of California, Irvine; et al.
Avinatan Hassidim, Google
Jonathan Kelner, Massachusetts Institute of Technology
SIGMOD DatabasesEntangled Queries: Enabling Declarative Data-Driven CoordinationNitin Gupta, Cornell University; et al.
Lucja Kot, Cornell University
Sudip Roy, Cornell University
Gabriel Bender, Cornell University
Johannes Gehrke, Cornell University
Christoph Koch, École Polytechnique Fédérale de Lausanne
SODA TheoryAn Almost Optimal Unrestricted Fast Johnson-Lindenstrauss TransformNir Ailon, Technion – Israel Institute of Technology
Edo Liberty, Yahoo
SOSP Operating SystemsCells: A Virtual Mobile Smartphone ArchitectureJeremy Andrus, Columbia University; et al.
Christoffer Dall, Columbia University
Alexander Van't Hof, Columbia University
Oren Laadan, Columbia University
Jason Nieh, Columbia University
A File is Not a File: Understanding the I/O Behavior of Apple Desktop ApplicationsTyler Harter, University of Wisconsin–Madison; et al.
Chris Dragga, University of Wisconsin–Madison
Michael Vaughn, University of Wisconsin–Madison
Andrea C. Arpaci-Dusseau, University of Wisconsin–Madison
Remzi H. Arpaci-Dusseau, University of Wisconsin–Madison
STOC TheoryElectrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphsPaul Christiano, Massachusetts Institute of Technology; et al.
Jonathan A. Kelner, Massachusetts Institute of Technology
Aleksander Mądry, Massachusetts Institute of Technology
Daniel A. Spielman, Yale University
Shang-Hua Teng, University of Southern California
Subexponential lower bounds for randomized pivoting rules for the simplex algorithmOliver Friedmann, Ludwig Maximilian University of Munich; et al.
Thomas Dueholm Hansen, Aarhus University
Uri Zwick, Tel Aviv University
UIST User InterfaceSideBySide: Ad-hoc Multi-user Interaction with Handheld ProjectorsKarl D.D. Willis, Carnegie Mellon University; et al.
Ivan Poupyrev, Disney Research
Scott E. Hudson, Carnegie Mellon University
Moshe Mahler, Disney Research
VLDB DatabasesRemusDB: Transparent High-Availability for Database SystemsUmar Farooq Minhas, University of Waterloo; et al.
Shriram Rajagopalan, University of British Columbia
Brendan Cully, University of British Columbia
Ashraf Aboulnaga, University of Waterloo
Ken Salem, University of Waterloo
Andrew Warfield, University of British Columbia
WWW World Wide WebTowards a theory model for product searchBeibei Li, New York University; et al.
Anindya Ghose, New York University
Panagiotis G. Ipeirotis, New York University
2010
AAAI Artificial IntelligenceA Novel Transition Based Encoding Scheme for Planning as SatisfiabilityRuoyun Huang, Washington University in St. Louis; et al.
Yixin Chen, Washington University in St. Louis
Weixiong Zhang, Washington University in St. Louis
How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Answering SystemsGiorgos Stoilos, University of Oxford; et al.
Bernardo Cuenca Grau, University of Oxford
Ian Horrocks, University of Oxford
ACL Natural Language ProcessingBeyond NomBank: A Study of Implicit Arguments for Nominal PredicatesMatthew Gerber & Joyce Y. Chai, Michigan State University
CHI Human-Computer InteractionHow does search behavior change as search becomes more difficult?Anne Aula, Google; et al.
Rehan M. Khan, Google
Zhiwei Guan, Google
The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual ContextBrent Hecht & Darren Gergle, Northwestern University
Occlusion-Aware InterfacesDaniel Vogel & Ravin Balakrishnan, University of Toronto
Skinput: Appropriating the Body as an Input SurfaceChris Harrison, Carnegie Mellon University; et al.
Desney Tan, Microsoft
Dan Morris, Microsoft
Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural IndiaNeil Patel, Stanford University; et al.
Deepti Chittamuru, University of California, Berkeley
Anupam Jain, IBM
Paresh Dave, LLC Center for Information and Legal Support for the Development of the Arctic
Tapan S. Parikh, University of California, Berkeley
Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber BundlesPatrick Baudisch, Hasso Plattner Institute; et al.
Torsten Becker, Hasso Plattner Institute
Frederik Rudeck, Hasso Plattner Institute
Feminist HCI: Taking Stock and Outlining an Agenda for DesignShaowen Bardzell, Indiana University Bloomington
Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface StructureMorgan Dixon & James Fogarty, University of Washington
Mobile-izing Health Workers in Rural IndiaDivya Ramachandran, University of California, Berkeley; et al.
John Canny, University of California, Berkeley
Prabhu Dutta Das, Dhirubhai Ambani Institute of Information and Communication Technology
Edward Cutrell, Microsoft
Mapping the Landscape of Sustainable HCICarl DiSalvo, Georgia Institute of Technology; et al.
Phoebe Sengers, Cornell University
Hrönn Brynjarsdóttir, Cornell University
The Design of Eco-Feedback TechnologyJon Froehlich, University of Washington; et al.
Leah Findlater, University of Washington
James Landay, University of Washington
Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of ChartsScott Bateman, University of Saskatchewan; et al.
Regan L. Mandryk, University of Saskatchewan
Carl Gutwin, University of Saskatchewan
Aaron Genest, University of Saskatchewan
David McDine, University of Saskatchewan
Christopher Brooks, University of Saskatchewan
CIKM Knowledge ManagementMENTA: Inducing Multilingual Taxonomies from WikipediaGerard de Melo & Gerhard Weikum, Max Planck Institute for Informatics
FACeTOR: cost-driven exploration of faceted query resultsAbhijith Kashyap, University at Buffalo; et al.
Vagelis Hristidis, Florida International University
Michalis Petropoulos, University at Buffalo
CVPR Computer VisionEfficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data using the L1 NormAnders Eriksson & Anton va den Hendel, University of Adelaide
FOCS TheorySubexponential Algorithms for Unique Games and Related ProblemsSanjeev Arora, Princeton University; et al.
Boaz Barak, Princeton University
David Steurer, Princeton University
Computational Transition at the Uniqueness ThresholdAllan Sly, Microsoft
Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke DecompositionsMatthew Andrews, Bell Labs
FSE Software EngineeringStaged Concurrent Program AnalysisNishant Sinha & Chao Wang, NEC Labs America
Developer Fluency: Achieving True Mastery in Software ProjectsMinghui Zhou, Peking University
Audris Mockus, Avaya Labs
Creating and evolving developer documentation: understanding the decisions of open source contributorsBarthélémy Dagenais & Martin P. Robillard, McGill University
ICML Machine LearningHilbert Space Embeddings of Hidden Markov ModelsLe Song, Carnegie Mellon University; et al.
Byron Boots, Carnegie Mellon University
Sajid M. Siddiqi, Google
Geoffrey Gordon, Carnegie Mellon University
Alex Smola, Yahoo
ICSE Software EngineeringCollaborative Reliability Prediction of Service-Oriented SystemsZibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong
A Degree-of-Knowledge Model to Capture Source Code FamiliarityThomas Fritz, University of British Columbia; et al.
Jingwen Ou, University of British Columbia
Gail C. Murphy, University of British Columbia
Emerson Murphy-Hill, University of British Columbia
A Machine Learning Approach for Tracing Regulatory Codes to Product Specific RequirementsJane Cleland-Huang, DePaul University; et al.
Adam Czauderna, DePaul University
John Emenecker, DePaul University
Marek Gibiec, DePaul University
A Cut-off Approach for Bounded Verification of Parameterized SystemsQiusong Yang & Mingshu Li, Chinese Academy of Sciences
Test Generation through Programming in UDITAMilos Gligoric, University of Illinois at Urbana–Champaign; et al.
Tihomir Gvero, École Polytechnique Fédérale de Lausanne
Vilas Jagannath, University of Illinois at Urbana–Champaign
Sarfraz Khurshid, University of Texas at Austin
Viktor Kuncak, École Polytechnique Fédérale de Lausanne
Darko Marinov, University of Illinois at Urbana–Champaign
INFOCOM NetworkingOn the Feasibility and Efficacy of Protection Routing in IP NetworksKin-Wah Kwong, University of Pennsylvania; et al.
Lixin Gao, University of Massachusetts Amherst
Roch Guérin, University of Pennsylvania
Zhi-Li Zhang, University of Minnesota
KDD Data MiningConnecting the dots between news articlesDafna Shahaf & Carlos Guestrin, Carnegie Mellon University
Large linear classification when data cannot fit in memoryHsiang-Fu Yu, National Taiwan University; et al.
Cho-Jui Hsieh, National Taiwan University
Kai-Wei Chang, National Taiwan University
Chih-Jen Lin, National Taiwan University
MOBICOM MobileThe κ Factor: Inferring Protocol Performance UsingInter-link Reception CorrelationKannan Srinivasan, Stanford University; et al.
Mayank Jain, Stanford University
Jung Il Choi, Stanford University
Tahir Azim, Stanford University
Edward S. Kim, University of Southern California
Philip Levis, Stanford University
Bhaskar Krishnamachari, University of Southern California
NSDI NetworkingReverse tracerouteEthan Katz-Bassett, University of Washington; et al.
Harsha V. Madhyastha, University of California, San Diego
Vijay Kumar Adhikari, University of Minnesota
Colin Scott, University of Washington
Justine Sherry, University of Washington
Peter van Wesep, University of Washington
Thomas Anderson, University of Washington
Arvind Krishnamurthy, University of Washington
OSDI Operating SystemsEfficient System-Enforced Deterministic ParallelismAmittai Aviram, Yale University; et al.
Shu-Chun Weng, Yale University
Sen Hu, Yale University
Bryan Ford, Yale University
The Turtles Project: Design and Implementation of Nested VirtualizationMuli Ben-Yehuda, IBM; et al.
Michael D. Day, IBM
Zvi Dubitzky, IBM
Michael Factor, IBM
Nadav Har'El, IBM
Abel Gordon, IBM
Anthony Liguori, IBM
Orit Wasserman, IBM
Ben-Ami Yassour, IBM
PLDI Programming LanguagesSafe to the Last Instruction: Automated Verification of a Type-Safe Operating SystemJean Yang, Massachusetts Institute of Technology
Chris Hawblitzel, Microsoft
PODS DatabasesAn Optimal Algorithm for the Distinct Elements ProblemDaniel M. Kane, Harvard University; et al.
Jelani Nelson, Massachusetts Institute of Technology
David P. Woodruff, IBM
S&P Security and PrivacySCiFI - A System for Secure Face IdentificationMargarita Osadchy, University of Haifa; et al.
Benny Pinkas, University of Haifa
Ayman Jarrous, University of Haifa
Boaz Moskovich, University of Haifa
SIGCOMM NetworkingEfficient Error Estimating Coding: Feasibility and ApplicationsBinbin Chen, National University of Singapore; et al.
Ziling Chou, National University of Singapore
Yuda Zhao, National University of Singapore
Haifeng Yu, National University of Singapore
SIGIR Information RetrievalAssessing the Scenic Route: Measuring the Value of Search Trails in Web LogsRyen W. White, Microsoft
Jeff Huang, University of Washington
SIGMETRICS PerformanceLoad balancing via random local search in closed and open systemsAyalvadi Ganesh, University of Bristol; et al.
Sarah Lilienthal, University of Cambridge
D. Manjunath, Indian Institute of Technology Kanpur
Alexandre Proutière, Microsoft
Florian Simatos, Inria
SIGMOD DatabasesFAST: fast architecture sensitive tree search on modern CPUs and GPUsChangkyu Kim, Intel; et al.
Jatin Chhugani, Intel
Nadathur Satish, Intel
Eric Sedlar, Oracle Corporation
Anthony D. Nguyen, Intel
Tim Kaldewey, Oracle Corporation
Victor W. Lee, Intel
Scott A. Brandt, University of California, Santa Cruz
Pradeep Dubey, Intel
SODA TheoryAn O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman ProblemArash Asadpour, Stanford University; et al.
Michel X. Goemans, Massachusetts Institute of Technology
Aleksander Mądry, Massachusetts Institute of Technology
Shayan Oveis Gharan, Stanford University
Amin Saberi, Stanford University
STOC TheoryQIP = PSPACERahul Jain, National University of Singapore; et al.
Zhengfeng Ji, Perimeter Institute for Theoretical Physics
Sarvagya Upadhyay, University of Waterloo
John Watrous, University of Waterloo
An improved LP-based approximation for steiner treeJaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al.
Fabrizio Grandoni, Tor Vergata University of Rome
Thomas Rothvoß, École Polytechnique Fédérale de Lausanne
Laura Sanità, École Polytechnique Fédérale de Lausanne
UIST User InterfaceVizWiz: nearly real-time answers to visual questionsJeffrey P. Bigham, University of Rochester; et al.
Chandrika Jayant, University of Washington
Hanjie Ji, University of Rochester
Greg Little, Massachusetts Institute of Technology
Andrew Miller, University of Central Florida
Robert C. Miller, Massachusetts Institute of Technology
Robin Miller, University of Rochester
Aubrey Tatarowicz, Massachusetts Institute of Technology
Brandyn White, University of Maryland
Samual White, University of Rochester
Tom Yeh, University of Maryland
VLDB DatabasesTowards Certain Fixes with Editing Rules and Master DataShuai Ma, University of Edinburgh; et al.
Wenfei Fan, University of Edinburgh
Jianzhong Li, Harbin Institute of Technology
Wenyuan Yu, University of Edinburgh
Nan Tang, University of Edinburgh
WWW World Wide WebFactorizing personalized Markov chains for next-basket recommendationSteffen Rendle, Osaka University; et al.
Christoph Freudenthaler, University of Hildesheim
Lars Schmidt-Thieme, University of Hildesheim
2009
ACL Natural Language ProcessingK-Best A* ParsingAdam Pauls & Dan Klein, University of California, Berkeley
Reinforcement Learning for Mapping Instructions to ActionsS.R.K. Branavan, Massachusetts Institute of Technology; et al.
Harr Chen, Massachusetts Institute of Technology
Luke S. Zettlemoyer, Massachusetts Institute of Technology
Regina Barzilay, Massachusetts Institute of Technology
Concise Integer Linear Programming Formulations for Dependency ParsingAndré F.T. Martins, Telecommunications Institute; et al.
Noah A. Smith, Carnegie Mellon University
Eric P. Xing, Carnegie Mellon University
CHI Human-Computer InteractionPredicting Tie Strength With Social MediaEric Gilbert & Karrie Karahalios, University of Illinois at Urbana–Champaign
Undo and Erase Events as Indicators of Usability ProblemsDavid Akers, Stanford University; et al.
Matthew Simpson, Google
Robin Jeffries, Google
Terry Winograd, Stanford University
From Interaction to Trajectories: Designing Coherent Journeys Through User ExperiencesSteve Benford, University of Nottingham; et al.
Gabriella Giannachi, University of Exeter
Boriana Koleva, University of Nottingham
Tom Rodden, University of Nottingham
Musink: Composing Music through Augmented DrawingTheophanis Tsandilas, University of Paris-Sud; et al.
Catherine Letondal, University of Paris-Sud
Wendy Mackay, University of Paris-Sud
Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Series VisualizationsJeffrey Heer, Stanford University; et al.
Nicholas Kong, University of California, Berkeley
Maneesh Agrawala, University of California, Berkeley
Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector ExhibitsScott S. Snibbe, Sona Research
Hayes S. Raffle, Massachusetts Institute of Technology
Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection PerformanceLeah Findlater, University of British Columbia; et al.
Karyn Moffatt, University of British Columbia
Joanna McGrenere, University of British Columbia
Jessica Dawson, University of British Columbia
CIKM Knowledge ManagementOn the Feasibility of Multi-Site Web Search EnginesRicardo Baeza-Yates, Yahoo; et al.
Aristides Gionis, Yahoo
Flavio Junqueira, Yahoo
Vassilis Plachouras, Yahoo
Luca Telloli, Yahoo
CVPR Computer VisionSingle Image Haze Removal Using Dark Channel PriorKaiming He, The Chinese University of Hong Kong; et al.
Jian Sun, Microsoft
Xiaoou Tang, The Chinese University of Hong Kong
FSE Software EngineeringAsserting and checking determinism for multithreaded programsJacob Burnim & Koushik Sen, University of California, Berkeley
Darwin: an approach for debugging evolving programsDawei Qi, National University of Singapore; et al.
Abhik Roychoudhury, National University of Singapore
Zhenkai Liang, National University of Singapore
Kapil Vaswani, Microsoft
Graph-based Mining of Multiple Object Usage PatternsTung Thanh Nguyen, Iowa State University; et al.
Hoan Anh Nguyen, Iowa State University
Nam H. Pham, Iowa State University
Jafar M. Al-Kofahi, Iowa State University
Tien N. Nguyen, Iowa State University
ICCV Computer VisionDiscriminative models for multi-class object layoutChaitanya Desai, University of California, Irvine; et al.
Deva Ramanan, University of California, Irvine
Charless Fowlkes, University of California, Irvine
ICML Machine LearningStructure preserving embeddingBlake Shaw & Tony Jebara, Columbia University
ICSE Software EngineeringEffective Static Deadlock DetectionMayur Naik, Intel; et al.
Chang-Seo Park, University of California, Berkeley
Koushik Sen, University of California, Berkeley
David Gay, Intel
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows VistaChristian Bird, University of California, Davis; et al.
Nachiappan Nagappan, Microsoft
Premkumar Devanbu, University of California, Davis
Harald Gall, University of Zurich
Brendan Murphy, Microsoft
How We Refactor, and How We Know ItEmerson Murphy-Hill, Portland State University; et al.
Chris Parnin, Georgia Institute of Technology
Andrew P. Black, Portland State University
Automatically finding patches using genetic programmingWestley Weimer, University of Virginia; et al.
ThanhVu Nguyen, University of New Mexico
Claire Le Goues, University of Virginia
Stephanie Forrest, University of New Mexico
Invariant-Based Automatic Testing of AJAX User InterfacesAli Mesbah & Arie van Deursen, Delft University of Technology
IJCAI Artificial IntelligenceLearning Conditional Preference Networks with QueriesFrederic Koriche, Montpellier 2 University
Bruno Zanuttini, Université de Caen Basse-Normandie
Consequence-Driven Reasoning for Horn SHIQ OntologiesYevgeny Kazakov, University of Oxford
INFOCOM NetworkingQueuing Network Models for Multi-Channel P2P Live Streaming SystemsDi Wu, New York University Tandon School of Engineering; et al.
Yong Liu, New York University Tandon School of Engineering
Keith W. Ross, New York University Tandon School of Engineering
KDD Data MiningCollaborative Filtering with Temporal DynamicsYehuda Koren, Yahoo
MOBICOM MobileCENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data PathVivek Shrivastava, University of Wisconsin–Madison; et al.
Nabeel Ahmed, University of Waterloo
Shravan Rayanchu, University of Wisconsin–Madison
Suman Banerjee, University of Wisconsin–Madison
Srinivasan Keshav, University of Waterloo
Konstantina Papagiannaki, Intel
Arunesh Mishra, Google
NSDI NetworkingTrInc: Small Trusted Hardware for Large Distributed SystemsDave Levin, University of Maryland; et al.
John R. Douceur, Microsoft
Jacob R. Lorch, Microsoft
Thomas Moscibroda, Microsoft
Sora: High Performance Software Radio Using General Purpose Multi-core ProcessorsKun Tan, Microsoft; et al.
Jiansong Zhang, Microsoft
Ji Fang, Beijing Jiaotong University
He Liu, Tsinghua University
Yusheng Ye, Tsinghua University
Shen Wang, Tsinghua University
Yongguang Zhang, Microsoft
Haitao Wu, Microsoft
Wei Wang, Microsoft
Geoffrey M. Voelker, University of California, San Diego
PLDI Programming LanguagesBinary Analysis for Measurement and Attribution of Program PerformanceNathan Tallent, Rice University; et al.
John Mellor-Crummey, Rice University
Michael Fagan, Rice University
PODS DatabasesSize and Treewidth Bounds for Conjunctive QueriesGeorg Gottlob, University of Oxford; et al.
Stephanie Lee, University of Oxford
Gregory Valient, University of California, Berkeley
S&P Security and PrivacyNative Client: A Sandbox for Portable, Untrusted x86 Native CodeBennet Yee, Google; et al.
David Sehr, Google
Gregory Dardyk, Google
Bradley Chen, Google
Robert Muth, Google
Tavis Ormandy, Google
Shiki Okasaka, Google
Neha Narula, Google
Nicholas Fullagar, Google
SIGCOMM NetworkingWhite Space Networking with Wi-Fi like ConnectivityParamvir Bahl, Microsoft; et al.
Ranveer Chandra, Microsoft
Thomas Moscibroda, Microsoft
Rohan Murty, Harvard University
Matt Welsh, Harvard University
SIGIR Information RetrievalSources of evidence for vertical selectionJaime Arguello, Carnegie Mellon University; et al.
Fernando Diaz, Yahoo
Jamie Callan, Carnegie Mellon University
Jean-Francois Crespo, Yahoo
SIGMETRICS PerformanceThe Age of Gossip: Spatial Mean Field RegimeAugustin Chaintreau, Technicolor; et al.
Jean-Yves Le Boudec, École Polytechnique Fédérale de Lausanne
Nikodin Ristanovic, École Polytechnique Fédérale de Lausanne
SIGMOD DatabasesGenerating example data for dataflow programsChristopher Olston, Yahoo; et al.
Shubham Chopra, Yahoo
Utkarsh Srivastava, Yahoo
SODA TheoryNatural AlgorithmsBernard Chazelle, Princeton University
SOSP Operating SystemsFAWN: A Fast Array of Wimpy NodesDavid G. Andersen, Carnegie Mellon University; et al.
Jason Franklin, Carnegie Mellon University
Michael Kaminsky, Intel
Amar Phanishayee, Carnegie Mellon University
Lawrence Tan, Carnegie Mellon University
Vijay Vasudevan, Carnegie Mellon University
RouteBricks: Exploiting Parallelism to Scale Software RoutersMihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al.
Norbert Egi, University of Lancaster
Katerina Argyraki, École Polytechnique Fédérale de Lausanne
Byung-Gon Chun, Intel
Kevin Fall, Intel
Gianluca Iannaccone, Intel
Allan Knies, Intel
Maziar Manesh, Intel
Sylvia Ratnasamy, Intel
seL4: Formal Verification of an OS KernelGerwin Klein, National ICT Australia; et al.
Kevin Elphinstone, National ICT Australia
Gernot Heiser, National ICT Australia
June Andronick, National ICT Australia
David Cock, National ICT Australia
Philip Derrin, National ICT Australia
Dhammika Elkaduwe, National ICT Australia
Kai Engelhardt, National ICT Australia
Rafal Kolanski, National ICT Australia
Michael Norrish, National ICT Australia
Thomas Sewell, National ICT Australia
Harvey Tuch, National ICT Australia
Simon Winwood, National ICT Australia
STOC TheoryA constructive proof of the Lovász local lemmaRobin A. Moser, ETH Zurich
Public-Key Cryptosystems from the Worst-Case Shortest Vector ProblemChris Peikert, SRI International
UIST User InterfaceMouse 2.0: Multi-touch meets the MouseNicolas Villar, Microsoft; et al.
Shahram Izadi, Microsoft
Dan Rosenfeld, Microsoft
Hrvoje Benko, Microsoft
John Helmes, Microsoft
Jonathan Westhues, Microsoft
Steve Hodges, Microsoft
Eyal Ofek, Microsoft
Alex Butler, Microsoft
Xiang Cao, Microsoft
Billy Chen, Microsoft
VLDB DatabasesA Unified Approach to Ranking in Probabilistic DatabasesJian Li, University of Maryland; et al.
Barna Saha, University of Maryland
Amol Deshpande, University of Maryland
WWW World Wide WebHybrid keyword search auctionsAshish Goel, Stanford University
Kamesh Munagala, Duke University
2008
AAAI Artificial IntelligenceOptimal False-Name-Proof Voting Rules with Costly VotingLiad Wagman & Vincent Conitzer, Duke University
How Good is Almost Perfect?Malte Helmert & Gabriele Röger, University of Freiburg
ACL Natural Language ProcessingA New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language ModelLibin Shen, BBN Technologies; et al.
Jinxi Xu, BBN Technologies
Ralph Weischedel, BBN Technologies
Forest Reranking: Discriminative Parsing with Non-Local FeaturesLiang Huang, University of Pennsylvania
CHI Human-Computer InteractionAn Error Model for Pointing Based on Fitts' LawJacob Wobbrock, University of Washington; et al.
Edward Cutrell, Microsoft
Susumu Harada, University of Washington
I. Scott MacKenzie, University of York
Designs on Dignity: Perceptions of Technology Among the HomelessChristopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology
Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based InterfacesKrzysztof Z. Gajos, University of Washington; et al.
Jacob Wobbrock, University of Washington
Daniel S. Weld, University of Washington
In-Car GPS Navigation: Engagement with and Disengagement from the EnvironmentGilly Leshed, Cornell University; et al.
Theresa Velden, Cornell University
Oya Rieger, Cornell University
Blazej Kot, Cornell University
Phoebe Sengers, Cornell University
Large Scale Analysis of Web Revisitation PatternsEytan Adar, University of Washington; et al.
Jaime Teevan, Microsoft
Susan T. Dumais, Microsoft
Multimodal collaborative handwriting training for visually-impaired peopleBeryl Plimmer, University of Auckland; et al.
Andrew Crossan, University of Glasgow
Stephen A. Brewster, University of Glasgow
Rachel Blagojevic, University of Auckland
The Network in the Garden: An Empirical Analysis of Social Media in Rural LifeEric Gilbert, University of Illinois at Urbana–Champaign; et al.
Karrie Karahalios, University of Illinois at Urbana–Champaign
Christian Sandvig, University of Illinois at Urbana–Champaign
CIKM Knowledge ManagementLearning to Link with WikipediaDavid Milne & Ian H. Witten, University of Waikato
CVPR Computer VisionBeyond Sliding Windows: Object Localization by Efficient Subwindow SearchChistoph H. Lampert, Max Planck Institute for Biological Cybernetics; et al.
Matthew B. Blaschko, Max Planck Institute for Biological Cybernetics
Thomas Hodmann, Google
Global Stereo Reconstruction under Second Order Smoothness PriorsOliver Woodford, University of Oxford; et al.
Ian Reid, Oxford Brookes University
Philip Torr, University of Oxford
Andrew Fitzgibbon, Microsoft
FOCS TheoryTwo Query PCP with Sub-Constant ErrorDana Moshkovitz & Ran Raz, Weizmann Institute of Science
FSE Software EngineeringEfficient online monitoring of web-service SLAsFranco Raimondi, University College London; et al.
James Skene, University College London
Wolfgang Emmerich, University College London
What makes a good bug report?Nicolas Bettenburg, Saarland University; et al.
Sascha Just, Saarland University
Adrian Schröter, University of Victoria
Cathrin Weiss, University of Zurich
Rahul Premraj, Saarland University
Thomas Zimmermann, University of Calgary
ICML Machine LearningSVM Optimization: Inverse Dependence on Training Set SizeShai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago
ICSE Software EngineeringRecommending adaptive changes for framework evolutionBarthélémy Dagenais & Martin P. Robillard, McGill University
Precise memory leak detection for java software using container profilingGuoqing Xu & Atanas Rountev, Ohio State University
Debugging Reinvented: Asking and Answering Why and Why Not Questions about Program BehaviorAndrew J. Ko & Brad A. Myers, Carnegie Mellon University
The Effect of Program and Model Structure on MC/DC Test Adequacy CoverageAjitha Rajan, University of Minnesota; et al.
Michael W. Whalen, Rockwell Collins
Mats P.E. Heimdahl, University of Minnesota
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental ApproachJoseph Ruthruff, University of Nebraska–Lincoln; et al.
John Penix, Google
J. David Morgenthaler, Google
Sebastian Elbaum, University of Nebraska–Lincoln
Gregg Rothermel, University of Nebraska–Lincoln
INFOCOM NetworkingTheoretical Results on Base Station Movement Problem for Sensor NetworksYi Shi & Y. Thomas Hou, Virginia Tech
On the Feasibility of the Link Abstraction in (Rural) Mesh NetworksDattatraya Gokhal, Indian Navy; et al.
Sayandeep Sen, University of Wisconsin–Madison
Kameswari Chebrolu, Indian Institute of Technology Kanpur
Bhaskaran Rama, Indian Institute of Technology Kanpur
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless NetworksChanghee Joo, Ohio State University; et al.
Xiaojun Lin, Purdue University
Ness B. Shroff, Ohio State University
KDD Data MiningFastanova: an efficient algorithm for genome-wide association studyXiang Zhang, University of North Carolina at Chapel Hill; et al.
Fei Zou, University of North Carolina at Chapel Hill
Wei Wang, University of North Carolina at Chapel Hill
MOBICOM MobileAssessment of Urban-Scale Wireless Networks with a Small Number of MeasurementsJoshua Robinson, Rice University; et al.
Ram Swaminathan, Hewlett Packard
Edward W. Knightly, Rice University
NSDI NetworkingRemus: High Availability via Asynchronous Virtual Machine ReplicationBrendan Cully, University of British Columbia; et al.
Geoffrey Lefebvre, University of British Columbia
Dutch Meyer, University of British Columbia
Mike Feeley, University of British Columbia
Norm Hutchinson, University of British Columbia
Andrew Warfield, University of British Columbia
Consensus Routing: The Internet as a Distributed SystemJohn P. John, University of Washington; et al.
Ethan Katz-Bassett, University of Washington
Arvind Krishnamurthy, University of Washington
Thomas Anderson, University of Washington
Arun Venkataramani, University of Massachusetts Amherst
OSDI Operating SystemsKLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems ProgramsCristian Cadar, Stanford University; et al.
Daniel Dunbar, Stanford University
Dawson Engler, Stanford University
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level LanguageYuan Yu, Microsoft; et al.
Michael Isard, Microsoft
Dennis Fetterly, Microsoft
Mihai Budiu, Microsoft
Úlfar Erlingsson, Microsoft
Pradeep Kumar Gunda, Microsoft
Jon Currey, Microsoft
Difference Engine: Harnessing Memory Redundancy in Virtual MachinesDiwaker Gupta, University of California, San Diego; et al.
Sangmin Lee, University of Texas at Austin
Michael Vrable, University of California, San Diego
Stefan Savage, University of California, San Diego
Alex C. Snoeren, University of California, San Diego
George Varghese, University of California, San Diego
Geoffrey M. Voelker, University of California, San Diego
Amin Vahdat, University of California, San Diego
PODS DatabasesEstimating PageRank on Graph StreamsAtish Das Sarma, Georgia Institute of Technology; et al.
Sreenivas Gollapudi, Microsoft
Rina Panigrahy, Microsoft
S&P Security and PrivacyPacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power DefensesDaniel Halperin, University of Washington; et al.
Thomas S. Heydt-Benjamin, University of Massachusetts Amherst
Benjamin Ransford, University of Massachusetts Amherst
Shane S. Clark, University of Massachusetts Amherst
Benessa Defend, University of Massachusetts Amherst
Will Morgan, University of Massachusetts Amherst
Kevin Fu, University of Massachusetts Amherst
Tadayoshi Kohno, University of Washington
William H. Maisel, Harvard University
SIGCOMM NetworkingZigZag Decoding: Combating Hidden Terminals in Wireless NetworksShyamnath Gollakota & Dina Katabi, Massachusetts Institute of Technology
SIGIR Information RetrievalAlgorithmic Mediation for Collaborative Exploratory SearchJeremy Pickens, FX Palo Alto Lab; et al.
Gene Golovchinsky, FX Palo Alto Lab
Chirag Shah, University of North Carolina at Chapel Hill
Pernilla Qvarfordt, FX Palo Alto Lab
Maribeth Back, FX Palo Alto Lab
SIGMETRICS PerformanceCounter Braids: A Novel Counter Architecture for Per-Flow MeasurementYi Lu, Stanford University; et al.
Andrea Montanari, Stanford University
Balaji Prabhakar, Stanford University
Sarang Dharmapurikar, Cisco Systems
Abdul Kabbani, Stanford University
SIGMOD DatabasesSerializable isolation for snapshot databasesMichael J. Cahill, University of Sydney; et al.
Uwe Röhm, University of Sydney
Alan D. Fekete, University of Sydney
Scalable Network Distance Browsing in Spatial DatabasesHanan Samet, University of Maryland; et al.
Jagan Sankaranarayanan, University of Maryland
Houman Alborzi, University of Maryland
STOC TheoryOptimal hierarchical decompositions for congestion minimization in networksHarald Räcke, University of Warwick
Optimal algorithms and inapproximability results for every CSP?Prasad Raghavendra, University of Washington
UIST User InterfaceBringing Physics to the SurfaceAndrew D. Wilson, Microsoft; et al.
Shahram Izadi, Microsoft
Otmar Hilliges, Microsoft
Armando Garcia-Mendoza, Microsoft
David Kirk, Microsoft
VLDB DatabasesFinding Frequent Items in Data StreamsGraham Cormode & Marios Hadjieleftheriou, AT&T Laboratories
Constrained Physical Design TuningNicolas Bruno & Surajit Chaudhuri, Microsoft
WWW World Wide WebIRLbot: Scaling to 6 billion pages and beyondHsin-Tsang Lee, Texas A&M University; et al.
Derek Leonard, Texas A&M University
Xiaoming Wang, Texas A&M University
Dmitri Loguinov, Texas A&M University
2007
AAAI Artificial IntelligencePLOW: A Collaborative Task Learning AgentJames Allen, Florida Institute for Human and Machine Cognition; et al.
Nathanael Chambers, Stanford University
George Ferguson, University of Rochester
Lucian Galescu, Florida Institute for Human and Machine Cognition
Hyuckchul Jung, Florida Institute for Human and Machine Cognition
Mary Swift, University of Rochester
William Taysom, Florida Institute for Human and Machine Cognition
Thresholded Rewards: Acting Optimally in Timed, Zero-Sum GamesColin McMillen & Manuela Veloso, Carnegie Mellon University
ACL Natural Language ProcessingLearning synchronous grammars for semantic parsing with lambda calculusYuk Wah Wong & Raymond J. Mooney, University of Texas at Austin
CHI Human-Computer InteractionAuthoring sensor-based interactions by demonstration with direct manipulation and pattern recognitionBjörn Hartmann, Stanford University; et al.
Leith Abdulla, Stanford University
Manas Mittal, Massachusetts Institute of Technology
Scott R. Klemmer, Stanford University
Consuming video on Mobile devicesKenton O'Hara, Hewlett Packard; et al.
April Slayden Mitchell, Hewlett Packard
Alex Vorbau, Hewlett Packard
Multiview: improving trust in group video conferencing through spatial faithfulnessDavid T. Nguyen & John Canny, University of California, Berkeley
Shift: a technique for operating pen-based interfaces using touchDaniel Vogel, University of Toronto
Patrick Baudisch, Microsoft
Software or wetware?: discovering when and why people use digital prosthetic memoryVaiva Kalnikaité & Steve Whittaker, University of Sheffield
Sustainable interaction design: invention & disposal, renewal & reuseEli Blevis, Indiana University Bloomington
CIKM Knowledge ManagementAutonomously Semantifying WikipediaFei Wu & Daniel S. Weld, University of Washington
CVPR Computer VisionDynamic 3D Scene Analysis from a Moving VehicleBastian Leibe, ETH Zurich; et al.
Nico Cornelis, Katholieke Universiteit Leuven
Kurt COrnelis, Katholieke Universiteit Leuven
Luc Van Gool, ETH Zurich
FOCS TheorySpace-Efficient Identity Based Encryption Without PairingsDan Boneh, Stanford University; et al.
Craig Gentry, Stanford University
Michael Hamburg, Stanford University
FSE Software EngineeringGlobally distributed software development project performance: an empirical analysisNarayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University
Mining specifications of malicious behaviorMihai Christodorescu, University of Wisconsin–Madison; et al.
Somesh Jha, University of Wisconsin–Madison
Christopher Kruegel, TU Wien
Automatic consistency assessment for query results in dynamic environmentsJamie Payton, University of North Carolina at Charlotte; et al.
Christine Julien, University of Texas at Austin
Gruia-Catalin Roman, Washington University in St. Louis
Object and reference immutability using Java genericsYoav Zibin, Massachusetts Institute of Technology; et al.
Alex Potanin, Victoria University of Wellington
Mahmood Ali, Massachusetts Institute of Technology
Shay Artzi, Massachusetts Institute of Technology
Adam Kieżun, Massachusetts Institute of Technology
Michael D. Ernst, Massachusetts Institute of Technology
ICCV Computer VisionPopulation Shape Regression From Random Design DataBradley Davis, University of North Carolina at Chapel Hill; et al.
P. Thomas Fletcher, University of Utah
Elizabeth Bullitt, University of North Carolina at Chapel Hill
Sarang Joshi, University of Utah
ICML Machine LearningInformation-theoretic metric learningJason V. Davis, University of Texas at Austin; et al.
Brian Kulis, University of Texas at Austin
Prateek Jain, University of Texas at Austin
Suvrit Sra, University of Texas at Austin
Inderjit S. Dhillon, University of Texas at Austin
ICSE Software EngineeringTracking Code Clones in Evolving SoftwareEkwa Duala-Ekoko & Martin P. Robillard, McGill University
Predicting Faults from Cached HistorySunghun Kim, Massachusetts Institute of Technology; et al.
Thomas Zimmermann, Saarland University
E. James Whitehead Jr., University of California, Santa Cruz
Andreas Zeller, Saarland University
Matching and Merging of Statecharts SpecificationsShiva Nejati, University of Toronto; et al.
Mehrdad Sabetzadeh, University of Toronto
Marsha Chechik, University of Toronto
Steve Easterbrook, University of Toronto
Pamela Zave, AT&T Laboratories
Refactoring for Parameterizing Java ClassesAdam Kiezun, Massachusetts Institute of Technology; et al.
Michael D. Ernst, Massachusetts Institute of Technology
Frank Tip, IBM
Robert M. Fuhrer, IBM
IJCAI Artificial IntelligenceAutomated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian NetworksMaleeha Qazi, Siemens; et al.
Glenn Fung, Siemens
Sriram Krishnan, Siemens
Romer Rosales, Siemens
Harald Steck, Siemens
R. Bharat Rao, Siemens
Don Polderman, Erasmus MC
Dhanalakshmi Chandrasekaran, Independent Researcher
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer ProgramsLuc Mercier & Pascal Van Hentenryck, Brown University
Building Structure into Local Search for SATDuc Nghia Pham, Griffith University; et al.
John Thornton, Griffith University
Abdul Sattar, Griffith University
INFOCOM NetworkingDisruption free topology reconfiguration in OSPF networksPierre Francois, Université catholique de Louvain; et al.
Mike Shand, Cisco Systems
Olicier Bonaventure, Université catholique de Louvain
KDD Data MiningPredictive discrete latent factor models for large scale dyadic dataDeepak Agarwal & Srujana Merugu, Yahoo
NSDI NetworkingLife, Death, and the Critical Transition: Finding Liveness Bugs in Systems CodeCharles Killian, University of California, San Diego; et al.
James W. Anderson, University of California, San Diego
Ranjit Jhala, University of California, San Diego
Amin Vahdat, University of California, San Diego
PLDI Programming LanguagesFault-tolerant Typed Assembly LanguageFrances Perry, Princeton University; et al.
Lester Mackey, Princeton University
George A. Reis, Princeton University
Jay Ligatti, University of South Florida
David I. August, Princeton University
David Walker, Princeton University
The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of CodeBen Hardekopf & Calvin Lin, University of Texas at Austin
PODS DatabasesGeneralized Hypertree Decompositions: NP-Hardness and Tractable VariantsGeorg Gottlob, University of Oxford; et al.
Zoltan Miklos, University of Oxford
Thomas Schwentick, TU Dortmund
SIGIR Information RetrievalStudying the Use of Popular Destinations to Enhance Web Search InteractionRyen W. White, Microsoft; et al.
Mikhail Bilenko, Microsoft
Silviu Cucerzan, Microsoft
SIGMETRICS PerformanceModeling the Relative Fitness of StorageMichael P. Mesnier, Intel; et al.
Matthew Wachs, Carnegie Mellon University
Raja R. Sambasivan, Carnegie Mellon University
Alice X. Zheng, Carnegie Mellon University
Gregory R. Ganger, Carnegie Mellon University
SIGMOD DatabasesCompiling mappings to bridge applications and databasesSergey Melnik, Microsoft; et al.
Atul Adya, Microsoft
Philip A. Bernstein, Microsoft
Scalable Approximate Query Processing with the DBO EngineChristopher Jermaine, University of Florida; et al.
Subramanian Arumugam, University of Florida
Abhijit Pol, University of Florida
Alin Dobra, University of Florida
SOSP Operating SystemsSinfonia: a new paradigm for building scalable distributed systemsMarcos K. Aguilera, Hewlett Packard; et al.
Arif Merchant, Hewlett Packard
Mehul Shah, Hewlett Packard
Alistair Veitch, Hewlett Packard
Christos Karamanolis, VMware Inc.
Zyzzyva: speculative byzantine fault toleranceRamakrishna Kotla, University of Texas at Austin; et al.
Lorenzo Alvisi, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Allen Clement, University of Texas at Austin
Edmund Wong, University of Texas at Austin
Secure Web Applications via Automatic PartitioningStephen Chong, Cornell University; et al.
Jed Liu, Cornell University
Andrew C. Myers, Cornell University
Xin Qi, Cornell University
K. Vikram, Cornell University
Lantian Zheng, Cornell University
Xin Zheng, Cornell University
STOC TheoryFaster integer multiplicationMartin Fürer, Pennsylvania State University
Towards 3-query locally decodable codes of subexponential lengthSergey Yekhanin, Massachusetts Institute of Technology
UIST User InterfaceThinSight: Versatile Multi-touch Sensing for Thin Form-factor DisplaysSteve Hodges, Microsoft; et al.
Shahram Izadi, Microsoft
Alex Butler, Microsoft
Alban Rrustemi, Microsoft
Bill Buxton, Microsoft
VLDB DatabasesScalable Semantic Web Data Management Using Vertical PartitioningDaniel J. Abadi, Massachusetts Institute of Technology; et al.
Adam Marcus, Massachusetts Institute of Technology
Samuel R. Madden, Massachusetts Institute of Technology
Kate Hollenbach, Massachusetts Institute of Technology
WWW World Wide WebWherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganographyLars Backstrom, Cornell University; et al.
Cynthia Dwork, Microsoft
Jon Kleinberg, Cornell University
2006
AAAI Artificial IntelligenceModel Counting: A New Strategy for Obtaining Good BoundsCarla P. Gomes, Cornell University; et al.
Ashish Sabharwal, Cornell University
Bart Selman, Cornell University
Towards an Axiom System for Default LogicGerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto
ACL Natural Language ProcessingSemantic taxonomy induction from heterogenous evidenceRion Snow, Stanford University; et al.
Daniel Jurafsky, Stanford University
Andrew Y. Ng, Stanford University
CHI Human-Computer InteractionTrackball text entry for people with motor impairmentsJacob Wobbrock & Brad Myers, Carnegie Mellon University
Embedded phenomena: supporting science learning with classroom-sized distributed simulationsTom Moher, University of Illinois at Chicago
A role for haptics in mobile interaction: initial design using a handheld tactile display prototypeJoseph Luk, University of British Columbia; et al.
Jérôme Pasquero, McGill University
Shannon Little, University of British Columbia
Karon MacLean, University of British Columbia
Vincent Lévesque, McGill University
Vincent Hayward, McGill University
CIKM Knowledge ManagementDiscovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing IndicesSegabtian Michel, Max Planck Institute for Informatics; et al.
Matthias Bender, Max Planck Institute for Informatics
Nikos Ntarmos, RACTI
Peter Triantafillou, RACTI
Gerhard Weikum, Max Planck Institute for Informatics
Christian Zimmer, Max Planck Institute for Informatics
CVPR Computer VisionPutting Objects in PerspectiveDerek Hoiem, Carnegie Mellon University; et al.
Alexei Efros, Carnegie Mellon University
Martial Hebert, Carnegie Mellon University
FOCS TheorySettling the Complexity of 2-Player Nash EquilibriumXi Chen, Tsinghua University
Xiaotie Deng, City University of Hong Kong
FSE Software EngineeringControlling factors in evaluating path-sensitive error detection techniquesMatthew B. Dwyer, University of Nebraska–Lincoln; et al.
Suzette Person, University of Nebraska–Lincoln
Sebastian Elbaum, University of Nebraska–Lincoln
SYNERGY: a new algorithm for property checkingBhargav S. Gulavani, Indian Institute of Technology Kanpur; et al.
Thomas A. Henzinger, École Polytechnique Fédérale de Lausanne
Yamini Kannan, Microsoft
Aditya V. Nori, Microsoft
Sriram K. Rajamani, Microsoft
ICML Machine LearningTrading convexity for scalabilityRonan Collobert, NEC Labs America; et al.
Fabian Sinz, NEC Labs America
Jason Weston, NEC Labs America
Léon Bottou, NEC Labs America
ICSE Software EngineeringModel-Based Development of Dynamically Adaptive SoftwareJi Zhang & Betty H.C. Cheng, Michigan State University
Who Should Fix This Bug?John Anvik, University of British Columbia; et al.
Lyndon Hiew, University of British Columbia
Gail C. Murphy, University of British Columbia
INFOCOM NetworkingDelay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global PerspectiveGaurav Sharma, Purdue University; et al.
Ravi Mazumdar, University of Waterloo
Ness Shroff, Purdue University
KDD Data MiningTraining linear SVMs in linear timeThorsten Joachims, Cornell University
NSDI NetworkingExperience with an Object Reputation System for Peer-to-Peer FilesharingKevin Walsh & Emin Gün Sirer, Cornell University
Availability of Multi-Object OperationsHaifeng Yu, Intel; et al.
Phillip B. Gibbons, Intel
Suman Nath, Microsoft
OSDI Operating SystemsRethink the SyncEdmund B. Nightingale, University of Michigan; et al.
Kaushik Veeraraghavan, University of Michigan
Peter M. Chen, University of Michigan
Jason Flinn, University of Michigan
Bigtable: A Distributed Storage System for Structured DataFay Chang, Google; et al.
Jeffrey Dean, Google
Sanjay Ghemawat, Google
Wilson C. Hsieh, Google
Deborah A. Wallach, Google
Mike Burrows, Google
Tushar Chandra, Google
Andrew Fikes, Google
Robert E. Gruber, Google
PODS DatabasesTwo-variable logic on data trees and XML reasoningMikolaj Bojanczyk, University of Warsaw; et al.
Claire David, Paris-Sorbonne University - Paris IV
Anca Muscholl, Paris-Sorbonne University - Paris IV
Thomas Schwentick, TU Dortmund
Luc Segoufin, Paris-Sorbonne University - Paris IV
SIGIR Information RetrievalMinimal Test Collections for Retrieval EvaluationBen Carterette, University of Massachusetts Amherst; et al.
James Allan, University of Massachusetts Amherst
Ramesh Sitaraman, University of Massachusetts Amherst
SIGMETRICS PerformanceMaximizing throughput in wireless networks via gossipingEytan Modiano, Massachusetts Institute of Technology; et al.
Devavrat Shah, Massachusetts Institute of Technology
Gil Zussman, Massachusetts Institute of Technology
SIGMOD DatabasesTo search or to crawl?: towards a query optimizer for text-centric tasksPanagiotis G. Ipeirotis, New York University; et al.
Eugene Agichtein, Microsoft
Pranay Jain, Columbia University
Luis Gravano, Columbia University
STOC TheoryThe PCP theorem by gap amplificationIrit Dinur, Hebrew University of Jerusalem
UIST User InterfaceReflective Physical Prototyping through Integrated Design, Test, and AnalysisBjörn Hartmann, Stanford University; et al.
Scott Klemmer, Stanford University
Michael Bernstein, Stanford University
Leith Abdulla, Stanford University
Brandon Burr, Stanford University
Avi Robinson-Mosher, Stanford University
Jennifer Gee, Stanford University
VLDB DatabasesTrustworthy Keyword Search for Regulatory-Compliant Records RetentionSoumyadeb Mitra, University of Illinois at Urbana–Champaign; et al.
Windsor W. Hsu, University of Illinois at Urbana–Champaign
Marianne Winslett, University of Illinois at Urbana–Champaign
WWW World Wide WebRandom Sampling from a Search Engine's IndexZiv Bar-Yossef & Maxim Gurevich, Technion – Israel Institute of Technology
2005
AAAI Artificial IntelligenceThe Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic SelectionVincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University
ACL Natural Language ProcessingA Hierarchical Phrase-Based Model for Statistical Machine TranslationDavid Chiang, University of Maryland
CHI Human-Computer InteractionThe bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation areaTovi Grossman & Ravin Balakrishnan, University of Toronto
Designing the spectator experienceStuart Reeves, University of Nottingham; et al.
Steve Benford, University of Nottingham
Claire O'Malley, University of Nottingham
Mike Fraser, University of Bristol
Examining Task Engagement in Sensor-Based Statistical Models of Human InterruptibilityJames Fogarty, Carnegie Mellon University; et al.
Andrew J. Ko, Carnegie Mellon University
Htet Htet Aung, Carnegie Mellon University
Elspeth Golden, Carnegie Mellon University
Karen P. Tang, Carnegie Mellon University
Scott E. Hudson, Carnegie Mellon University
Making space for stories: ambiguity in the design of personal communication systemsPaul M. Aoki, PARC
Allison Woodruff, Intel
CIKM Knowledge ManagementTowards Automatic Association of Relevant Unstructured Content with Structured Query ResultsPrasan Roy, IBM; et al.
Mukesh Mohania, IBM
Bhuvan Bamba, Georgia Institute of Technology
Shree Raman, University of Massachusetts Amherst
CVPR Computer VisionReal-Time Non-Rigid Surface DetectionJulien Pilet, École Polytechnique Fédérale de Lausanne; et al.
Vincent Lepetit, École Polytechnique Fédérale de Lausanne
Pascal Fua, École Polytechnique Fédérale de Lausanne
FOCS TheoryThe Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type Metrics into L1Subhash A. Khot, Georgia Institute of Technology
Nisheeth K. Vishnoi, IBM
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial TimeFarzad Parvaresh & Alexander Vardy, University of California, San Diego
FSE Software EngineeringAutomatic Generation of Suggestions for Program InvestigationMartin P. Robillard, McGill University
Context- and path-sensitive memory leak detectionYichen Xie & Alex Aiken, Stanford University
CUTE: a concolic unit testing engine for CKoushik Sen, University of Illinois at Urbana–Champaign; et al.
Darko Marinov, University of Illinois at Urbana–Champaign
Gul Agha, University of Illinois at Urbana–Champaign
ICCV Computer VisionGlobally Optimal Estimates for Geometric Reconstruction ProblemsFredrik Kahl, Lund University
Didier Henrion, Laboratory for Analysis and Architecture of Systems
ICML Machine LearningA support vector method for multivariate performance measuresThorsten Joachims, Cornell University
ICSE Software EngineeringData Structure Repair Using Goal-Directed ReasoningBrian Demsky & Martin Rinard, Massachusetts Institute of Technology
Using Structural Context to Recommend Source Code ExamplesReid Holmes & Gail Murphy, University of British Columbia
Is Mutation an Appropriate Tool for Testing Experiments?James Andrews, University of Western Ontario; et al.
Lionel Briand, Carleton University
Yvan Labiche, Carleton University
Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Perfective Maintenance TasksAndrew Ko, Carnegie Mellon University; et al.
Htet Htet Aung, Carnegie Mellon University
Brad Myers, Carnegie Mellon University
IJCAI Artificial IntelligenceLearning Coordination ClassifiersYuhong Guo, University of Alberta; et al.
Russell Greiner, University of Alberta
Dale Schuurmans, University of Alberta
Solving CheckersJonathan Schaeffer, University of Alberta; et al.
Yngvi Bjornsson, University of Alberta
Neil Burch, University of Alberta
Akihiro Kishimoto, University of Alberta
Martin Muller, University of Alberta
Robert Lake, University of Alberta
Paul Lu, University of Alberta
Steve Sutphen, University of Alberta
A Probabilistic Model of Redundancy in Information ExtractionDoug Downey, University of Washington; et al.
Oren Etzioni, University of Washington
Stephen Soderland, University of Washington
INFOCOM NetworkingPerfect Simulation and Stationarity of a Class of Mobility ModelsJean-Yves Le Boude, École Polytechnique Fédérale de Lausanne
Milan Vojnović, Microsoft
KDD Data MiningGraphs over time: densification laws, shrinking diameters and possible explanationsJure Leskovec, Carnegie Mellon University; et al.
Jon Kleinberg, Cornell University
Christos Faloutsos, Carnegie Mellon University
NSDI NetworkingDetecting BGP Configuration Faults with Static AnalysisNick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology
PLDI Programming LanguagesAutomatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the HeapChris Lattner & Vikram Adve, University of Illinois at Urbana–Champaign
Programming by Sketching for Bit-Streaming ProgramsArmando Solar-Lezama, University of California, Berkeley; et al.
Rodric Rabbah, Massachusetts Institute of Technology
Rastislav Bodik, University of California, Berkeley
Kemal Ebcioğlu, IBM
PODS DatabasesOn the complexity of division and set joins in the relational algebraDirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum
XML data exchange: consistency and query answeringMarcelo Arenas & Leonid Libkin, University of Toronto
SIGIR Information RetrievalLearning to estimate query difficulty: including applications to missing content detection and distributed information retrievalElad Yom-Tov, IBM; et al.
Shai Fine, IBM
David Carmel, IBM
Adam Darlow, IBM
SIGMETRICS PerformanceCoupon replication systemsLaurent Massoulié & Milan Vojnović, Microsoft
SOSP Operating SystemsRx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, University of Illinois at Urbana–Champaign; et al.
Joseph Tucek, University of Illinois at Urbana–Champaign
Jagadeesan Sundaresan, University of Illinois at Urbana–Champaign
Yuanyuan Zhou, University of Illinois at Urbana–Champaign
BAR Tolerance for Cooperative ServicesAmitanand S. Aiyer, University of Texas at Austin; et al.
Lorenzo Alvisi, University of Texas at Austin
Allen Clement, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Jean-Philippe Martin, University of Texas at Austin
Carl Porth, University of Texas at Austin
Speculative Execution in a Distributed File SystemEdmund B. Nightingale, University of Michigan; et al.
Peter M. Chen, University of Michigan
Jason Flinn, University of Michigan
Vigilante: End-to-End Containment of Internet WormsManuel Costa, University of Cambridge; et al.
Jon Crowcroft, University of Cambridge
Miguel Castro, Microsoft
Antony Rowstron, Microsoft
Lidong Zhou, Microsoft
Lintao Zhang, Microsoft
Paul Barham, Microsoft
STOC TheoryUndirected ST-connectivity in log-spaceOmer Reingold, Weizmann Institute of Science
UIST User InterfaceAutomation and Customization of Rendered Web PagesMichael Bolin, Massachusetts Institute of Technology; et al.
Matthew Webber, Massachusetts Institute of Technology
Philip Rha, Massachusetts Institute of Technology
Tom Wilson, Massachusetts Institute of Technology
Robert C. Miller, Massachusetts Institute of Technology
VLDB DatabasesCache-conscious Frequent Pattern Mining on a Modern ProcessorAmol Ghoting, Ohio State University; et al.
Gregory Buehrer, Ohio State University
Srinivasan Parthasarathy, Ohio State University
Daehyun Kim, Intel
Anthony D. Nguyen, Intel
Yen-Kuang Chen, Intel
Pradeep Dubey, Intel
WWW World Wide WebThree-level caching for efficient query processing in large Web search enginesXiaohui Long & Torsten Suel, New York University Tandon School of Engineering
2004
AAAI Artificial IntelligenceLearning and Inferring Transportation RoutinesLin Liao, University of Washington; et al.
Dieter Fox, University of Washington
Henry Kautz, University of Washington
ACL Natural Language ProcessingFinding Predominant Word Senses in Untagged TextDiana McCarthy, University of Sussex; et al.
Rob Koeling, University of Sussex
Julie Weeds, University of Sussex
John Carroll, University of Sussex
CIKM Knowledge ManagementDiscovering Frequently Changing Structures from Historical Structural Deltas of Unordered XMLQiankun Zhao, Nanyang Technological University; et al.
Sourav S Bhowmick, Nanyang Technological University
Mukesh Mohania, IBM
Yahiko Kambayashi, Kyoto University
CVPR Computer VisionProgrammable Imaging using a Digital Micromirror ArrayShree K. Nayar, Columbia University; et al.
Vlad Branzoi, Columbia University
Terry E. Boult, University of Colorado Boulder
FOCS TheoryHardness of Approximating the Shortest Vector Problem in LatticesSubhash Khot, Georgia Institute of Technology
Cryptography in NC0Benny Applebaum, Technion – Israel Institute of Technology; et al.
Yuval Ishai, Technion – Israel Institute of Technology
Eyal Kushilevitz, Technion – Israel Institute of Technology
FSE Software EngineeringA Classification System and Analysis for Aspect-Oriented ProgramsMartin Rinard, Massachusetts Institute of Technology; et al.
Alexandru Salcianu, Massachusetts Institute of Technology
Suhabe Bugrara, Massachusetts Institute of Technology
Reasoning about partial goal satisfaction for requirements and design engineeringEmmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain
ICSE Software EngineeringSNIAFL: Towards a Static Non-Interactive Approach to Feature LocationWei Zhao, Peking University; et al.
Lu Zhang, Peking University
Yin Liu, Peking University
Jiasu Sun, Peking University
Fuqing Yang, Peking University
An Empirical Study of Software Reuse vs. Defect-Density and StabilityParastoo Mohagheghi, Ericsson; et al.
Reidar Conradi, Norwegian University of Science and Technology
Ole M. Killi, Norwegian University of Science and Technology
Henrik Schwarz, Norwegian University of Science and Technology
Static Checking of Dynamically Generated Queries in Database ApplicationsCarl Gould, University of California, Davis; et al.
Zhendong Su, University of California, Davis
Premkumar Devanbu, University of California, Davis
A Tool for Writing and Debugging Algebraic SpecificationsJohannes Henkel & Amer Diwan, University of Colorado Boulder
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized SystemsRohit Khare & Richard N. Taylor, University of California, Irvine
INFOCOM NetworkingThroughput-Delay Trade-Off in Wireless NetworksAbbas El Gamal, Stanford University; et al.
James Mammen, Stanford University
Balaji Prabhakar, Stanford University
Devavrat Shah, Stanford University
KDD Data MiningA probabilistic framework for semi-supervised clusteringSugato Basu, University of Texas at Austin; et al.
Mikhail Bilenko, University of Texas at Austin
Raymond J. Mooney, University of Texas at Austin
NSDI NetworkingTrickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor NetworksPhilip Levis, University of California, Berkeley; et al.
Neil Patel, University of California, Berkeley
David Culler, University of California, Berkeley
Scott Shenker, University of California, Berkeley
OSDI Operating SystemsRecovering Device DriversMichael M. Swift, University of Washington; et al.
Muthukaruppan Annamalai, University of Washington
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington
Using Model Checking to Find Serious File System ErrorsJunfeng Yang, Stanford University; et al.
Paul Twohey, Stanford University
Dawson Engler, Stanford University
Madanlal Musuvathi, Microsoft
PLDI Programming LanguagesCloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision DiagramsJohn Whaley & Monica S. Lam, Stanford University
PODS DatabasesConditional XPath, the first order complete XPath dialectMaarten Marx, University of Amsterdam
SIGIR Information RetrievalA Formal Study of Information Retrieval HeuristicsHui Fang, University of Illinois at Urbana–Champaign; et al.
Tao Tao, University of Illinois at Urbana–Champaign
ChengXiang Zhai, University of Illinois at Urbana–Champaign
SIGMETRICS PerformanceOn performance bounds for the integration of elastic and adaptive streaming flowsThomas Bonald & Alexandre Proutiere, France Telecom
SIGMOD DatabasesIndexing spatio-temporal trajectories with Chebyshev polynomialsYuhan Cai & Raymond T. Ng, University of British Columbia
STOC TheoryExpander flows, geometric embeddings and graph partitioningSanjeev Arora, Princeton University; et al.
Satish Rao, University of California, Berkeley
Umesh Vazirani, University of California, Berkeley
Multi-linear formulas for permanent and determinant are of super-polynomial sizeRan Raz, Weizmann Institute of Science
UIST User InterfaceMulti-Finger Gestural Interaction with 3D Volumetric DisplaysTovi Grossman, University of Toronto; et al.
Daniel Wigdor, University of Toronto
Ravin Balakrishnan, University of Toronto
CrossY: A Crossing-Based Drawing ApplicationGeorg Apitz & François Guimbretière, University of Maryland
VLDB DatabasesModel-Driven Data Acquisition in Sensor NetworksAmol Deshpande, University of California, Berkeley; et al.
Carlos Guestrin, Intel
Samuel R. Madden, Massachusetts Institute of Technology
Joseph M. Hellerstein, University of California, Berkeley
Wei Hong, Intel
WWW World Wide WebAutomatic detection of fragments in dynamically generated web pagesLakshmish Ramaswamy, Georgia Institute of Technology; et al.
Arun Iyengar, IBM
Ling Liu, Georgia Institute of Technology
Fred Douglis, IBM
2003
ACL Natural Language ProcessingTowards a Model of Face-to-Face GroundingYukiko I. Nakano, Research Institute of Science and Technology for Society; et al.
Gabe Reinstein, Massachusetts Institute of Technology
Tom Stocky, Massachusetts Institute of Technology
Justine Cassell, Massachusetts Institute of Technology
Accurate Unlexicalized ParsingDan Klein & Christopher D. Manning, Stanford University
CVPR Computer VisionObject Class Recognition by Unsupervised Scale-Invariant LearningRob Fergus, University of Oxford; et al.
Pietro Perona, California Institute of Technology
Andrew Zisserman, University of Oxford
FOCS TheoryOn the Impossibility of Dimension Reduction in L1Bo Brinkman & Moses Charikar, Princeton University
FSE Software EngineeringPredicting Problems Caused by Component UpgradesStephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology
A Family of Test Adequacy Criteria for Database-Driven ApplicationsGregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh
Eliminating redundancies with a "composition with adaptation" meta-programming techniqueStan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong University
ICCV Computer VisionImage-based Rendering using Image-based PriorsAndrew Fitzgibbon, University of Oxford; et al.
Yonatan Wexler, Weizmann Institute of Science
Andrew Zisserman, University of Oxford
Image Parsing: Unifying Segmentation, Detection and RecognitionZhuowen Tu, University of California, Los Angeles; et al.
Xiangrong Chen, University of California, Los Angeles
Alan L. Yuille, University of California, Los Angeles
Song-Chun Zhu, University of California, Los Angeles
Detecting Pedestrians using Patterns of Motion and AppearancePaul Viola, Microsoft; et al.
Michael J. Jones, Mitsubishi Electric Research Laboratories
Daniel Snow, Mitsubishi Electric Research Laboratories
ICSE Software EngineeringPrecise Dynamic Slicing AlgorithmsXiangyu Zhang, University of Arizona; et al.
Rajiv Gupta, University of Arizona
Youtao Zhang, University of Arizona
Modular Verification of Software Components in CSagar Chaki, Carnegie Mellon University; et al.
Edmund Clarke, Carnegie Mellon University
Alex Groce, Carnegie Mellon University
Somesh Jha, University of Wisconsin–Madison
Helmut Veith, TU Wien
IJCAI Artificial IntelligenceThin Junction Tree Filters for Simultaneous Localization and MappingMark A. Paskin, University of California, Berkeley
Approximating Game-Theoretic Optimal Strategies for Full-scale PokerDarse Billings, University of Alberta; et al.
Neil Burch, University of Alberta
Aaron Davidson, University of Alberta
Robert Holte, University of Alberta
Jonathan Schaeffer, University of Alberta
Terence Schauenberg, University of Alberta
Duane Szafron, University of Alberta
INFOCOM NetworkingUser-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data NetworksSem Borst, Bell Labs
KDD Data MiningMaximizing the spread of influence through a social networkDavid Kempe, Cornell University; et al.
Jon Kleinberg, Cornell University
Éva Tardos, Cornell University
PLDI Programming LanguagesAutomatically Proving the Correctness of Compiler OptimizationsSorin Lerner, University of Washington; et al.
Todd Millstein, University of Washington
Craig Chambers, University of Washington
PODS DatabasesAn Information-Theoretic Approach to Normal Forms for Relational and XML DataMarcelo Arenas & Leonid Libkin, University of Toronto
SIGIR Information RetrievalRe-examining the potential effectiveness of interactive query expansionIan Ruthven, University of Strathclyde
SIGMOD DatabasesSpreadsheets in RDBMS for OLAPAndrew Witkowski, Oracle Corporation; et al.
Srikanth Bellakonda, Oracle Corporation
Tolga Bozkaya, Oracle Corporation
Gregory Dorman, Oracle Corporation
Nathan Folkert, Oracle Corporation
Abhinav Gupta, Oracle Corporation
Lei Shen, Oracle Corporation
Sankar Subramanian, Oracle Corporation
SOSP Operating SystemsImproving the Reliability of Commodity Operating SystemsMichael M. Swift, University of Washington; et al.
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington
Preserving peer replicas by rate-limited sampled votingPetros Maniatis, Stanford University; et al.
David S. H. Rosenthal, Stanford University
Mema Roussopoulos, Stanford University
Mary Baker, Stanford University
TJ Giuli, Stanford University
Yanto Muliadi, Stanford University
Backtracking intrusionsSamuel T. King & Peter M. Chen, University of Michigan
STOC TheoryDerandomizing polynomial identity tests means proving circuit lower boundsValentine Kabanets & Russell Impagliazzo, University of California, San Diego
New lattice-based cryptographic constructionsOded Regev, Tel Aviv University
UIST User InterfacePerceptually-Supported Image Editing of Text and GraphicsEric Saund, PARC; et al.
David Fleet, PARC
Daniel Larner, PARC
James Mahoney, PARC
WWW World Wide WebScaling personalized web searchGlen Jeh & Jennifer Widom, Stanford University
SemTag and seeker: bootstrapping the semantic web via automated semantic annotationStephen Dill, IBM; et al.
Nadav Eiron, IBM
David Gibson, IBM
Daniel Gruhl, IBM
R. Guha, IBM
Anant Jhingran, IBM
Tapas Kanungo, IBM
Sridhar Rajagopalan, IBM
Andrew Tomkins, IBM
John A. Tomlin, IBM
Jason Y. Zien, IBM
2002
AAAI Artificial IntelligenceOn Computing All Abductive ExplanationsThomas Eiter, TU Wien
Kazuhisa Makino, Osaka University
ACL Natural Language ProcessingDiscriminative Training and Maximum Entropy Models for Statistical Machine TranslationFranz Josef Och & Hermann Ney, RWTH Aachen University
FOCS TheoryConstant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String ModelBoaz Barak, Weizmann Institute of Science
Minimizing Congestion in General NetworksHarald Räcke, University of Paderborn
A Dichotomy Theorem for Constraints on a Three-Element SetAndrei A. Bulatov, University of Oxford
FSE Software EngineeringIsolating Cause-Effect Chains from Computer ProgramsAndreas Zeller, Saarland University
INFOCOM NetworkingPriority Service and Max-Min FairnessPeter Marbach, University of Toronto
KDD Data MiningPattern discovery in sequences under a Markov assumptionDarya Chudova & Padhraic Smyth, University of California, Irvine
OSDI Operating SystemsMemory Resource Management in VMware ESX ServerCarl A. Waldspurger, VMware Inc.
PODS DatabasesMonadic Datalog and the Expressive Power of Languages for Web Information ExtractionGeorg Gottlob & Christoph Koch, TU Wien
SIGIR Information RetrievalNovelty and redundancy detection in adaptive filteringYi Zhang, Carnegie Mellon University; et al.
Jamie Callan, Carnegie Mellon University
Thomas Minka, Carnegie Mellon University
UIST User InterfaceClothing ManipulationTakeo Igarashi, University of Tokyo
John F. Hughes, Brown University
WWW World Wide WebAbstracting application-level web securityDavid Scott & Richard Sharp, University of Cambridge
2001
ACL Natural Language ProcessingFast Decoding and Optimal Decoding for Machine TranslationUlrich Germann, University of Southern California; et al.
Michael Jahr, Stanford University
Kevin Knight, University of Southern California
Daniel Marcu, University of Southern California
Kenji Yamada, University of Southern California
Immediate-Head Parsing for Language ModelsEugene Charniak, Brown University
CVPR Computer VisionMorphable 3D models from videoMatthew Brand, Mitsubishi Electric Research Laboratories
ICCV Computer VisionProbabilistic Tracking with Exemplars in a Metric SpaceKentaro Toyama & Andrew Blake, Microsoft
The Space of All Stereo ImagesSteven Seitz, University of Washington
IJCAI Artificial IntelligenceComplexity Results for Structure-Based CausalityThomas Eiter & Thomas Lukasiewicz, TU Wien
INFOCOM NetworkingMobility increases the capacity of ad-hoc wireless networksMatthias Grossglauser, AT&T Laboratories
David Tse, University of California, Berkeley
KDD Data MiningRobust space transformations for distance-based operationsEdwin M. Knorr, University of British Columbia; et al.
Raymond T. Ng, University of British Columbia
Ruben H. Zamar, University of British Columbia
PODS DatabasesOptimal aggregation algorithms for middlewareRonald Fagin, IBM; et al.
Amnon Lotem, University of Maryland
Moni Naor, Weizmann Institute of Science
SIGIR Information RetrievalTemporal summaries of new topicsJames Allan, University of Massachusetts Amherst; et al.
Rahul Gupta, University of Massachusetts Amherst
Vikas Khandelwal, University of Massachusetts Amherst
SIGMOD DatabasesLocally adaptive dimensionality reduction for indexing large time series databasesEamonn Keogh, University of California, Irvine; et al.
Kaushik Chakrabarti, University of California, Irvine
Michael Pazzani, University of California, Irvine
Sharad Mehrotra, University of California, Irvine
SOSP Operating SystemsUntrusted hosts and confidentiality: secure program partitioningSteve Zdancewic, Cornell University; et al.
Lantian Zheng, Cornell University
Nathaniel Nystrom, Cornell University
Andrew C. Myers, Cornell University
BASE: using abstraction to improve fault toleranceRodrigo Rodrigues, Massachusetts Institute of Technology; et al.
Miguel Castro, Microsoft
Barbara Liskov, Massachusetts Institute of Technology
UIST User InterfacePhidgets: Easy Development of Physical Interfaces through Physical WidgetsSaul Greenberg & Chester Fitchett, University of Calgary
VLDB DatabasesWeaving Relations for Cache PerformanceAnastassia Ailamaki, Carnegie Mellon University; et al.
David J. DeWitt, University of Wisconsin–Madison
Mark D. Hill, University of Wisconsin–Madison
Marios Skounakis, University of Wisconsin–Madison
WWW World Wide WebEngineering Server Driven Consistency for Large Scale Dynamic Web ServicesJian Yin, University of Texas at Austin; et al.
Lorenzo Alvisi, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Arun Iyengar, IBM
2000
AAAI Artificial IntelligenceThe Game of Hex: An Automatic Theorem-Proving Approach to Game ProgrammingVadim V. Anshelevich, Vanshel Consulting
Automatic Invention of Integer SequencesSimon Colton, University of Edinburgh; et al.
Alan Bundy, University of Edinburgh
Toby Walsh, University of York
Statistics-Based Summarization -- Step One: Sentence CompressionKevin Knight & Daniel Marcu, University of Southern California
Local Search Characteristics of Incomplete SAT ProceduresDale Schuurmans & Finnegan Southey, University of Waterloo
CVPR Computer VisionReal-Time Tracking of Non-Rigid Objects using Mean ShiftDorin Comaniciu, Siemens; et al.
Visvanathan Ramesh, Siemens
Peter Meer, Rutgers University
INFOCOM NetworkingThe Chaotic Nature of TCP Congestion ControlAndrás Veres & Miklós Boda, Ericsson
KDD Data MiningHancock: a language for extracting signatures from data streamsCorinna Cortes, AT&T Laboratories; et al.
Kathleen Fisher, AT&T Laboratories
Daryl Pregibon, AT&T Laboratories
Anne Rogers, AT&T Laboratories
OSDI Operating SystemsChecking System Rules Using System-Specific, Programmer-Written Compiler ExtensionsDawson Engler, Stanford University; et al.
Benjamin Chelf, Stanford University
Andy Chou, Stanford University
Seth Hallem, Stanford University
PLDI Programming LanguagesDynamo: a transparent dynamic optimization systemVasanth Bala, Hewlett Packard; et al.
Evelyn Duesterwald, Hewlett Packard
Sanjeev Banerjia, InCert
PODS DatabasesAuditing Boolean attributesJon Kleinberg, Cornell University; et al.
Christos Papadimitriou, University of California, Berkeley
Prabhakar Raghavan, IBM
SIGIR Information RetrievalIR evaluation methods for retrieving highly relevant documentsKalervo Järvelin & Jaana Kekäläinen, University of Tampere
SIGMOD DatabasesXMill: an efficient compressor for XML dataHartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories
UIST User InterfaceSensing Techniques for Mobile InteractionKen Hinckley, Microsoft; et al.
Jeff Pierce, Microsoft
Mike Sinclair, Microsoft
Eric Horvitz, Microsoft
WWW World Wide WebGraph Structure in the WebAndrei Broder, AltaVista; et al.
Ravi Kumar, IBM
Farzin Maghoul, AltaVista
Prabhakar Raghavan, IBM
Sridhar Rajagopalan, IBM
Raymie Stata, Compaq Systems Research Center
Andrew Tomkins, IBM
Janet Wiener, Compaq Systems Research Center
1999
AAAI Artificial IntelligencePROVERB: The Probabilistic CruciverbalistGreg A. Keim, Duke University; et al.
Noam M. Shazeer, Duke University
Michael L. Littman, Duke University
Sushant Agarwal, Duke University
Catherine M. Cheves, Duke University
Joseph Fitzgerald, Duke University
Jason Grosland, Duke University
Fan Jiang, Duke University
Shannon Pollard, Duke University
Karl Weinmeister, Duke University
ICCV Computer VisionA Theory of Shape by Space CarvingKiriakos Kutulakos, University of Rochester
Steven Seitz, Carnegie Mellon University
Euclidean Reconstruction and Reprojection up to SubgroupsYi Ma, University of California, Berkeley; et al.
Stefano Soatto, Washington University in St. Louis
Jana Kosecka, University of California, Berkeley
Shankar Sastry, University of California, Berkeley
ICML Machine LearningLeast-Squares Temporal Difference LearningJustin A. Boyan, NASA
IJCAI Artificial IntelligenceA Distributed Case-Based Reasoning Application for Engineering Sales SupportIan Watson, University of Salford
Dan Gardingen, Western Air
Learning in Natural LanguageDan Roth, University of Illinois at Urbana–Champaign
INFOCOM NetworkingBandwidth Sharing: Objectives and AlgorithmsLaurent Massoulié, Microsoft
James Robert, France Telecom
KDD Data MiningMetaCost: a general method for making classifiers cost-sensitivePedro Domingos, Universidade Técnica de Lisboa
OSDI Operating SystemsIO-Lite: A Unified I/O Buffering and Caching SystemVivek S. Pai, Rice University; et al.
Peter Druschel, Rice University
Willy Zwaenepoel, Rice University
PLDI Programming LanguagesWhole program pathsJames R. Larus, Microsoft
PODS DatabasesExact and approximate aggregation in constraint query languagesMichael Benefikt & Leonid Libkin, Bell Labs
SIGIR Information RetrievalCross-language information retrieval based on parallel texts and automatic mining of parallel texts from the WebJian-Yun Nie, Université de Montréal; et al.
Michel Simard, Université de Montréal
Pierre Isabelle, Université de Montréal
Richard Durand, Université de Montréal
SIGMOD DatabasesDynaMat: a dynamic view management system for data warehousesYannis Kotidis & Nick Roussopoulos, University of Maryland
SOSP Operating SystemsManageability, availability and performance in Porcupine: a highly scalable, cluster-based mail serviceYasushi Saito, University of Washington; et al.
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington
Cellular Disco: resource management using virtual clusters on shared-memory multiprocessorsKinshuk Govil, Stanford University; et al.
Dan Teodosiu, Hewlett Packard
Yongqiang Huang, Stanford University
Mendel Rosenblum, Stanford University
The Click modular routerRobert Morris, Massachusetts Institute of Technology; et al.
Eddie Kohler, Massachusetts Institute of Technology
John Jannotti, Massachusetts Institute of Technology
M. Frans Kaashoek, Massachusetts Institute of Technology
Soft timers: efficient microsecond software timer support for network processingMohit Aron & Peter Druschel, Rice University
WWW World Wide WebFocused Crawling: A New Approach to Topic-Specific Web Resource DiscoverySoumen Chakrabarti, Indian Institute of Technology Kanpur; et al.
Martin van den Berg, FX Palo Alto Lab
Byron Dom, IBM
1998
AAAI Artificial IntelligenceLearning Evaluation Functions for Global Optimization and Boolean SatisfiabilityJustin A. Boyan & Andrew W. Moore, Carnegie Mellon University
The Interactive Museum Tour-Guide RobotWolfram Burgard, University of Bonn; et al.
Armin B. Cremers, University of Bonn
Dieter Fox, University of Bonn
Dirk Hähnel, University of Bonn
Gerhard Lakemeyer, RWTH Aachen University
Dirk Schulz, University of Bonn
Walter Steiner, University of Bonn
Sebastian Thrun, Carnegie Mellon University
Acceleration Methods for Numeric CSPsYahia Lebbah & Olivier Lhomme, École des Mines de Nantes
ICCV Computer VisionSelf-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera ParametersMarc Pollefeys, Katholieke Universiteit Leuven; et al.
Reinhard Koch, Katholieke Universiteit Leuven
Luc Van Gool, Katholieke Universiteit Leuven
The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image SequencesPhil Torr, Microsoft; et al.
Andrew Fitzgibbon, University of Oxford
Andrew Zisserman, University of Oxford
INFOCOM NetworkingEffective Bandwidths in Wireless Networks with Multiuser ReceiversDavid Tse, University of California, Berkeley
Stephen Hanly, University of Melbourne
KDD Data MiningOccam's Two Razors: The Sharp and the BluntPedro Domingos, Universidade Técnica de Lisboa
PODS DatabasesExpressiveness of structured document query languages based on attribute grammarsFrank Neven & Jan Van den Bussche, Limburgs Universitair Centrum
A lower bound theorem for indexing schemes and its application to multidimensional range queriesVasilis Samoladas & Daniel P. Miranker, University of Texas at Austin
SIGIR Information RetrievalA theory of term weighting based on exploratory data analysisWarren R. Greiff, University of Massachusetts Amherst
SIGMOD DatabasesEfficient transparent application recovery in client-server information systemsDavid Lomet & Gerhard Weikum, Microsoft
Integrating association rule mining with relational database systems: alternatives and implicationsSunita Sarawagi, IBM; et al.
Shiby Thomas, University of Florida
Rakesh Agrawal, IBM
WWW World Wide WebThe Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/videoKevin C. Almeroth, University of California, Santa Barbara
Mostafa H. Ammar, Georgia Institute of Technology
1997
AAAI Artificial IntelligenceStatistical Parsing with a Context-Free Grammar and Word StatisticsEugene Charniak, Brown University
Building Concept Representations from Reusable ComponentsPeter Clark, Boeing
Bruce Porter, University of Texas at Austin
Fast Context Switching in Real-Time Propositional ReasoningP. Pandurang Nayak & Brian C. Williams, NASA
A Practical Algorithm for Finding Optimal TriangulationsKrill Shoikhet & Dan Geiger, Technion – Israel Institute of Technology
IJCAI Artificial IntelligenceTranslingual Information Retrieval: A Comparative EvaluationJaime G. Carbonell, Carnegie Mellon University; et al.
Yiming Yang, Carnegie Mellon University
Robert E. Frederking, Carnegie Mellon University
Ralf D. Brown, Carnegie Mellon University
Yibing Geng, Carnegie Mellon University
Danny Lee, Carnegie Mellon University
Object Identification in a Bayesian ContextTimothy Huang & Stuart Russell, University of California, Berkeley
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolog Cut OperatorFangzhen Lin, Hong Kong University of Science and Technology
KDD Data MiningAnalysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost DistributionsFoster Provost & Tom Fawcett, NYNEX Science and Technology
PODS DatabasesOn the Complexity of Database QueriesChristos H. Papadimitriou, University of California, Berkeley
Mihalis Yannakakis, Bell Labs
SIGIR Information RetrievalFeature selection, perceptron learning, and a usability case study for text categorizationHwee Tou Ng, Defence Science Organisation; et al.
Wei Boon Goh, Ministry of Defence
Kok Leong Low, Ministry of Defence
SIGMOD DatabasesFast parallel similarity search in multimedia databasesStefan Berchtold, Ludwig Maximilian University of Munich; et al.
Christian Böml, Ludwig Maximilian University of Munich
Bernhard Braunmüller, Ludwig Maximilian University of Munich
Daniel A. Keim, Ludwig Maximilian University of Munich
Hans-Peter Kriegel, Ludwig Maximilian University of Munich
SOSP Operating SystemsEraser: a dynamic data race detector for multithreaded programsStefan Savage, University of Washington; et al.
Michael Burrows, Digital Equipment Corporation
Greg Nelson, Digital Equipment Corporation
Patrick Sobalvarro, Digital Equipment Corporation
Thomas Anderson, University of California, Berkeley
Continuous profiling: where have all the cycles gone?Jennifer M. Anderson, Digital Equipment Corporation; et al.
Lance M. Berc, Digital Equipment Corporation
Jeffrey Dean, Digital Equipment Corporation
Sanjay Ghemawat, Digital Equipment Corporation
Monika R. Henzinger, Digital Equipment Corporation
Shun-Tak A. Leung, Digital Equipment Corporation
Richard L. Sites, Digital Equipment Corporation
Mark T. Vandevoorde, Digital Equipment Corporation
Carl A. Waldspurger, Digital Equipment Corporation
William E. Weihl, Digital Equipment Corporation
Disco: running commodity operating systems on scalable multiprocessorsEdouard Bugnion, Stanford University; et al.
Scott Devine, Stanford University
Mendel Rosenblum, Stanford University
VLDB DatabasesIntegrating Reliable Memory in DatabasesWee Teck Ng & Peter M. Chen, University of Michigan
1996
AAAI Artificial IntelligenceA Novel Application of Theory Refinement to Student ModelingPaul T. Baffes, SciComp
Raymond J. Mooney, University of Texas at Austin
Pushing the Envelope: Planning, Propositional Logic, and Stochastic SearchHenry Kautz & Bart Selman, AT&T Laboratories
Verification of Knowledge Bases Based on Containment CheckingAlon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, University of Paris-Sud
INFOCOM NetworkingAn algorithm for multicast tree generation in networks with asymmetric linksRam Ramanathan, BBN Technologies
OSDI Operating SystemsAutomatic Compiler-Inserted I/O Prefetching for Out-of-Core ApplicationsTodd C. Mowry, University of Toronto; et al.
Angela K. Demke, University of Toronto
Orran Krieger, University of Toronto
Safe Kernel Extensions Without Run-Time CheckingGeorge C. Necula & Peter Lee, Carnegie Mellon University
SIGIR Information RetrievalRetrieving spoken documents by combining multiple index sourcesGareth Jones, University of Cambridge; et al.
Jonathan Foote, University of Cambridge
Karen Spärck Jones, University of Cambridge
Steve Young, University of Cambridge
SIGMETRICS PerformanceSupporting stored video: reducing rate variability and end-to-end resource requirements through optimal smoothingJames D. Salehi, University of Massachusetts Amherst; et al.
Zhi-Li Zhang, University of Massachusetts Amherst
James F. Kurose, University of Massachusetts Amherst
Don Towsley, University of Massachusetts Amherst
Exploiting Process Lifetime Distributions for Dynamic Load BalancingMor Harchol-Balter & Allen B. Downey, University of California, Berkeley
SIGMOD DatabasesImplementing data cubes efficientlyVenky Harinarayan, Stanford University; et al.
Anand Rajaraman, Stanford University
Jeffrey D. Ullman, Stanford University
Fast Subsequence Matching in Time-Series DatabasesChristos Faloutsos, University of Maryland; et al.
M. Ranganathan, University of Maryland
Yannis Manolopoulos, University of Maryland
UIST User InterfaceIndigo: A Local Propagation Algorithm for Inequality ConstraintsAlan Borning, University of Washington; et al.
Richard Anderson, University of Washington
Bjorn Freeman-Benson, Object Technology International