Best Paper Awards in Computer Science (since 1996)

By Conference:   AAAI   ACL   CHI   CIKM   CVPR   FOCS   FSE   ICCV   ICML   ICSE   IJCAI   INFOCOM   KDD   MOBICOM   NSDI   OSDI   PLDI   PODS   S&P   SIGCOMM   SIGIR   SIGMETRICS   SIGMOD   SODA   SOSP   STOC   UIST   VLDB   WWW

Institutions with the most Best Papers

Much of this data was entered by hand (obtained by contacting past conference organizers, retrieving cached conference websites, and searching CVs) so please email me if you notice any errors or omissions: bestpaper-AT-jeffhuang.com. I tried to collect best paper awards from the top-tier conferences in each area, but some conferences do not have such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award" and "outstanding paper award" are included but not "best student paper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL).

AAAI (Artificial Intelligence)
2013HC-Search: Learning Heuristics and Cost Functions for Structured PredictionJanardhan Rao Doppa, Oregon State University; et al.
Alan Fern, Oregon State University
Prasad Tadepalli, Oregon State University
SMILe: Shuffled Multiple-Instance LearningGary Doran & Soumya Ray, Case Western Reserve University
2012Learning SVM Classifiers with Indefinite KernelsSuicheng Gu & Yuhong Guo, Temple University
Document Summarization Based on Data ReconstructionZhanying He, Zhejiang University; et al.
Chun Chen, Zhejiang University
Jiajun Bu, Zhejiang University
Can Wang, Zhejiang University
Lijan Zhang, Zhejiang University
Deng Cai, Zhejiang University
Xiaofei He, Zhejiang University
2011Dynamic Resource Allocation in Conservation PlanningDaniel Golovin, California Institute of Technology; et al.
Andreas Krause, ETH Zurich
Beth Gardner, North Carolina State University
Sarah J. Converse, Patuxent Wildlife Research Center
Steve Morey, U.S. Fish and Wildlife Service
Complexity of and Algorithms for Borda ManipulationJessica Davies, University of Toronto; et al.
George Katsirelos, Université Paris-Sud
Nina Narodytska, University of New South Wales
Toby Walsh, NICTA
2010How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Ans...Giorgos Stoilos, Oxford University; et al.
Bernardo Cuenca Grau, Oxford University
Ian Horrocks, Oxford University
A Novel Transition Based Encoding Scheme for Planning as SatisfiabilityRuoyun Huang, Washington University in St. Louis; et al.
Yixin Chen, Washington University in St. Louis
Weixiong Zhang, Washington University in St. Louis
2008How Good is Almost Perfect?Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg
Optimal False-Name-Proof Voting Rules with Costly VotingLiad Wagman & Vincent Conitzer, Duke University
2007PLOW: A Collaborative Task Learning AgentJames Allen, Institute for Human and Machine Cognition; et al.
Nathanael Chambers, Stanford University
George Ferguson, University of Rochester
Lucian Galescu, Institute for Human and Machine Cognition
Hyuckchul Jung, Institute for Human and Machine Cognition
Mary Swift, University of Rochester
William Taysom, Institute for Human and Machine Cognition
Thresholded Rewards: Acting Optimally in Timed, Zero-Sum GamesColin McMillen & Manuela Veloso, Carnegie Mellon University
2006Model Counting: A New Strategy for Obtaining Good BoundsCarla P. Gomes, Cornell University; et al.
Ashish Sabharwal, Cornell University
Bart Selman, Cornell University
Towards an Axiom System for Default LogicGerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto
2005The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic SelectionVincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University
2004Learning and Inferring Transportation RoutinesLin Liao, University of Washington; et al.
Dieter Fox, University of Washington
Henry Kautz, University of Washington
2002On Computing All Abductive ExplanationsThomas Eiter, Technische Universität Wien
Kazuhisa Makino, Osaka University
2000The Game of Hex: An Automatic Theorem-Proving Approach to Game ProgrammingVadim V. Anshelevich, Vanshel Consulting
1999PROVERB: The Probabilistic CruciverbalistGreg A. Keim, Duke University; et al.
Noam M. Shazeer, Duke University
Michael L. Littman, Duke University
Sushant Agarwal, Duke University
Catherine M. Cheves, Duke University
Joseph Fitzgerald, Duke University
Jason Grosland, Duke University
Fan Jiang, Duke University
Shannon Pollard, Duke University
Karl Weinmeister, Duke University
1998Learning Evaluation Functions for Global Optimization and Boolean SatisfiabilityJustin A. Boyan & Andrew W. Moore, Carnegie Mellon University
Acceleration Methods for Numeric CSPsYahia Lebbah & Olivier Lhomme, Ecole des Mines de Nantes
The Interactive Museum Tour-Guide RobotWolfram Burgard, University of Bonn; et al.
Armin B. Cremers, University of Bonn
Dieter Fox, University of Bonn
Dirk Hähnel, University of Bonn
Gerhard Lakemeyer, Aachen University of Technology
Dirk Schulz, University of Bonn
Walter Steiner, University of Bonn
Sebastian Thrun, Carnegie Mellon University
1997Statistical Parsing with a Context-Free Grammar and Word StatisticsEugene Charniak, Brown University
A Practical Algorithm for Finding Optimal TriangulationsKrill Shoikhet & Dan Geiger, Technion
Fast Context Switching in Real-Time Propositional ReasoningP. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center
Building Concept Representations from Reusable ComponentsPeter Clark, Boeing
Bruce Porter, University of Texas at Austin
1996Verification of Knowledge Bases Based on Containment CheckingAlon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, Université Paris-Sud
A Novel Application of Theory Refinement to Student ModelingPaul T. Baffes, SciComp
Raymond J. Mooney, University of Texas at Austin
Pushing the Envelope: Planning, Propositional Logic, and Stochastic SearchHenry Kautz & Bart Selman, AT&T Laboratories
ACL (Natural Language Processing)
2014Fast and Robust Neural Network Joint Models for Statistical Machine TranslationJacob Devlin, Raytheon BBN Technologies; et al.
Rabih Zbib, Raytheon BBN Technologies
Zhongqiang Huang, Raytheon BBN Technologies
Thomas Lamar, Raytheon BBN Technologies
Richard Schwartz, Raytheon BBN Technologies
John Makhoul, Raytheon BBN Technologies
2013Grounded Language Learning from Video Described with SentencesHaonan Yu & Jeffrey Mark Siskind, Purdue University
2012String Re-writing KernelFan Bu, Tsinghua University; et al.
Hang Li, Microsoft Research
Xiaoyan Zhu, Tsinghua University
Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic ParsingHiroyuki Shindo, NTT Communication Science Laboratories; et al.
Yusuke Miyao, National Institute of Informatics
Akinori Fujino, NTT Communication Science Laboratories
Masaaki Nagata, NTT Communication Science Laboratories
2011Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based ProjectionsDipanjan Das, Carnegie Mellon University
Slav Petrov, Google
2010Beyond NomBank: A Study of Implicit Arguments for Nominal PredicatesMatthew Gerber & Joyce Y. Chai, Michigan State University
2009Reinforcement Learning for Mapping Instructions to ActionsS.R.K. Branavan, Massachusetts Institute of Technology; et al.
Harr Chen, Massachusetts Institute of Technology
Luke S. Zettlemoyer, Massachusetts Institute of Technology
Regina Barzilay, Massachusetts Institute of Technology
K-Best A* ParsingAdam Pauls & Dan Klein, University of California Berkeley
Concise Integer Linear Programming Formulations for Dependency ParsingAndré F.T. Martins, Instituto de Telecomunicações; et al.
Noah A. Smith, Carnegie Mellon University
Eric P. Xing, Carnegie Mellon University
2008Forest Reranking: Discriminative Parsing with Non-Local FeaturesLiang Huang, University of Pennsylvania
A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language ModelLibin Shen, BBN Technologies; et al.
Jinxi Xu, BBN Technologies
Ralph Weischedel, BBN Technologies
2007Learning synchronous grammars for semantic parsing with lambda calculusYuk Wah Wong & Raymond J. Mooney, University of Texas at Austin
2006Semantic taxonomy induction from heterogenous evidenceRion Snow, Stanford University; et al.
Daniel Jurafsky, Stanford University
Andrew Y. Ng, Stanford University
2005A Hierarchical Phrase-Based Model for Statistical Machine TranslationDavid Chiang, University of Maryland
2004Finding Predominant Word Senses in Untagged TextDiana McCarthy, University of Sussex; et al.
Rob Koeling, University of Sussex
Julie Weeds, University of Sussex
John Carroll, University of Sussex
2003Accurate Unlexicalized ParsingDan Klein & Christopher D. Manning, Stanford University
Towards a Model of Face-to-Face GroundingYukiko I. Nakano, RISTEX; et al.
Gabe Reinstein, Massachusetts Institute of Technology
Tom Stocky, Massachusetts Institute of Technology
Justine Cassell, Massachusetts Institute of Technology
2002Discriminative Training and Maximum Entropy Models for Statistical Machine TranslationFranz Josef Och & Hermann Ney, RWTH Aachen University
2001Immediate-Head Parsing for Language ModelsEugene Charniak, Brown University
Fast Decoding and Optimal Decoding for Machine TranslationUlrich Germann, University of Southern California; et al.
Michael Jahr, Stanford University
Kevin Knight, University of Southern California
Daniel Marcu, University of Southern California
Kenji Yamada, University of Southern California
CHI (Human-Computer Interaction)
2014Growing Closer on Facebook: Changes in Tie Strength Through Social Network Site UseMoira Burke, Facebook
Robert Kraut, Carnegie Mellon University
Duet: Exploring Joint Interactions on a Smart Phone and a Smart WatchXiang Anthony Chen, Carnegie Mellon University; et al.
Tovi Grossman, Autodesk Research
Daniel Wigdor, University of Toronto
George Fitzmaurice, Autodesk Research
RetroDepth: 3D Silhouette Sensing for High-Precision Input On and Above Physical SurfacesDavid Kim, Microsoft Research; et al.
Shahram Izadi, Microsoft Research
Jakub Dostal, University of St Andrews
Christoph Rhemann, Microsoft Research
Cem Keskin, Microsoft Research
Christopher Zach, Microsoft Research
Jamie Shotton, Microsoft Research
Timothy Large, Microsoft Research
Steven Bathiche, Microsoft
Matthias Niessner, Stanford University
D. Alex Butler, Microsoft Research
Sean Fanello, Istituto Italiano di Tecnologia
Vivek Pradeep, Microsoft
Estimating the Social Costs of FriendsourcingJeffrey Rzeszotarski & Meredith Morris, Microsoft Research
Human Values in Curating a Human Rights Media ArchiveAbigail Durrant, Newcastle University; et al.
David Kirk, Newcastle University
Stuart Reeves, University of Nottingham
Effects of Display Size and Navigation Type on a Classification TaskCan Liu, Université Paris-Sud; et al.
Olivier Chapuis, Université Paris-Sud
Michel Beaudouin-Lafon, Université Paris-Sud
Eric Lecolinet, Telecom ParisTech
Wendy Mackay, INRIA
George Fitzmaurice, Autodesk Research
Towards Accurate and Practical Predictive Models of Active-Vision-Based Visual SearchDavid Kieras, University of Michigan
Anthony Hornof, University of Oregon
Real-time Feedback for Improving Medication TakingMatthew Lee, Philips Research
Anind Dey, Carnegie Mellon University
Making Sustainability Sustainable: Challenges in the Design of Eco-Interaction TechnologiesRayoung Yang, University of Michigan; et al.
Mark Newman, University of Michigan
Jodi Forlizzi, Carnegie Mellon University
Consumed Endurance: A Metric to Quantify Arm Fatigue of Mid-Air InteractionsAnders Markussen, University of Copenhagen; et al.
Mikkel Jakobsen, University of Copenhagen
Kasper Hornbaek, University of Copenhagen
Type-Hover-Swipe in 96 Bytes: A Motion Sensing Mechanical KeyboardStuart A Taylor, Microsoft Research; et al.
Cem Keskin, Microsoft Research
Otmar Hilliges, ETH Zurich
Shahram Izadi, Microsoft Research
John Helmes, Microsoft Research
Structured Labeling for Facilitating Concept Evolution in Machine LearningTodd Kulesza, Oregon State University; et al.
Saleema Amershi, Microsoft Research
Rich Caruana, Microsoft Research
Danyel Fisher, Microsoft Research
Denis Charles, Microsoft Research
Emerging Sites of HCI Innovation: Hackerspaces, Hardware Startups & IncubatorsSilvia Lindtner, University of California Irvine; et al.
Garnet Hertz, University of California Irvine
Paul Dourish, University of California Irvine
MixFab: a Mixed-Reality Environment for Personal FabricationChristian Weichel, Lancaster University; et al.
Manfred Lau, Lancaster University
David Kim, Microsoft Research
Nicolas Villar, Microsoft Research
Hans W Gellersen, Lancaster University
Designing for Slowness, Anticipation and Re-visitation: A Long Term Field Study of the PhotoboxWilliam Odom, Carnegie Mellon University; et al.
Abigail Sellen, Microsoft Research
Richard Banks, Microsoft Research
David Kirk, Newcastle University
Tim Regan, Microsoft
Mark Selby, University of Nottingham
Jodi Forlizzi, Carnegie Mellon University
John Zimmerman, Carnegie Mellon University
"Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug WarMunmun De Choudhury, Microsoft Research; et al.
Andres Monroy-Hernandez, Microsoft Research
Gloria Mark, University of California Irvine
Understanding Multitasking Through Parallelized Strategy Exploration and Individualized Cognitive ...Yunfeng Zhang & Anthony Hornof, University of Oregon
2013Labor Dynamics in a Mobile Micro-Task MarketMohamed Musthag & Deepak Ganesan, University of Massachusetts Amherst
What is "Critical" About Critical Design?Jeffrey Bardzell & Shaowen Bardzell, Indiana University at Bloomington
SPRWeb: Preserving Subjective Responses to Website Colour Schemes through Automatic RecolouringDavid R. Flatla, University of Saskatchewan; et al.
Katharina Reinecke, Harvard University
Carl Gutwin, University of Saskatchewan
Krzysztof Z. Gajos, Harvard University
LaserOrigami: Laser-Cutting 3D ObjectsStefanie Mueller, Hasso Plattner Institute; et al.
Bastian Kruck, Hasso Plattner Institute
Patrick Baudisch, Hasso Plattner Institute
Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI ResearchEric B. Hekler, Arizona State University; et al.
Predrag Klasnja, University of Michigan
Jon Froehlich, University of Maryland
Matthew P. Buman, University of Maryland
Screenfinity: Extending the Perception Area of Content on Very Large Public DisplaysConstantin Schmidt, Technische Universität Berlin; et al.
Jörg Müller, Technische Universität Berlin
Gilles Bailly, Technische Universität Berlin
Reasons to Question Seven Segment DisplaysHarold Thimbleby, Swansea University
Improving Navigation-Based File RetrievalStephen Fitchett, University of Canterbury; et al.
Andy Cockburn, University of Canterbury
Carl Gutwin, University of Saskatchewan
The Dubuque Electricity Portal: Evaluation of a City-Scale Residential Electricity Consumption Fee...Tom Erickson, IBM Research; et al.
Ming Li, IBM Research
Younghun Kim, IBM Research
Ajay Deshpande, IBM Research
Sambit Sahu, IBM Research
Tian Chao, IBM Research
Piyawadee Sukaviriya, IBM Research
Milind Naphade, IBM Research
At Home with Agents: Exploring Attitudes Towards Future Smart Energy InfrastructuresTom Rodden, University of Nottingham; et al.
Joel E. Fischer, University of Nottingham
Nadia Pantidi, University of Nottingham
Khaled Bachour, University of Nottingham
Stuart Moran, University of Nottingham
Job Opportunities through Entertainment: Virally Spread Speech-Based Services for Low-Literate UsersAgha Ali Raza, Carnegie Mellon University; et al.
Farhan Ul Haq, Lahore University of Management Sciences
Zain Tariq, Lahore University of Management Sciences
Mansoor Pervaiz, Northeastern University
Samia Razaq, Lahore University of Management Sciences
Umar Saif, Lahore University of Management Sciences
Roni Rosenfeld, Carnegie Mellon University
IllumiRoom: Peripheral Projected Illusions for Interactive ExperiencesBrett Jones, University of Illinois at Urbana-Champaign; et al.
Hrvoje Benko, Microsoft Research
Eyal Ofek, Microsoft Research
Andrew D. Wilson, Microsoft Research
The Efficacy of Human Post-Editing for Language TranslationSpence Green, Stanford University; et al.
Jeffrey Heer, Stanford University
Christopher D. Manning, Stanford University
Analyzing User-Generated YouTube Videos to Understand Touchscreen Use by People with Motor Impairm...Lisa Anthony, University of Maryland Baltimore County; et al.
YooJin Kim, University of Maryland
Leah Findlater, University of Maryland
Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical TurkLilly Irani, University of California Irvine
M. Six Silberman, Bureau of Economic Interpretation
Webzeitgeist: Design Mining the WebRanjitha Kumar, Stanford University; et al.
Arvind Satyanarayan, Stanford University
Cesar Torres, Stanford University
Maxine Lim, Stanford University
Salman Ahmad, Massachusetts Institute of Technology
Scott R. Klemmer, Stanford University
Jerry O. Talton, Intel
Weighted Graph Comparison Techniques for Brain Connectivity AnalysisBasak Alper, University of California Santa Barbara; et al.
Benjamin Bach, INRIA
Nathalie Riche, Microsoft Research
Tobias Isenberg, INRIA
Jean-Daniel Fekete, INRIA
The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Arc...Xuan Zhao, Cornell University; et al.
Niloufar Salehi, Cornell University
Sasha Naranjit, Cornell University
Sara Alwaalan, Cornell University
Stephen Voida, Cornell University
Dan Cosley, Cornell University
2012Uncomfortable InteractionsSteve Benford, University of Nottingham; et al.
Chris Greenhalgh, University of Nottingham
Gabriella Giannachi, University of Exeter
Brendan Walker, University of Nottingham
Joe Marshall, University of Nottingham
Tom Rodden, University of Nottingham
ClayVision: The (Elastic) Image of the CityYuichiro Takeuchi, Sony Computer Science Laboratories
Ken Perlin, New York University
Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCIYlva Fernaeus, KTH Royal Institute of Technology; et al.
Martin Jonssonm, Södertörn University
Jakob Tholanderm, Stockholm University
Personas and Decision Making in the Design Process: An Ethnographic Case StudyErin Friess, University of North Texas
Detecting Error-Related Negativity for Interaction DesignChi Vi & Sriram Subramanian, University of Bristol
Observational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobil...Niels Henze, University of Oldenburg; et al.
Enrico Rukzio, University of Duisburg-Essen
Susanne Boll, University of Oldenburg
Looking Glass: A Field Study on Noticing Interactivity of Shop WindowsJörg Müller, Technische Universität Berlin; et al.
Robert Walter, Technische Universität Berlin
Gilles Bailly, Technische Universität Berlin
Michael Nischt, Technische Universität Berlin
Florian Alt, University of Stuttgart
Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday ObjectsMunehiko Sato, Disney Research; et al.
Ivan Poupyrev, Disney Research
Chris Harrison, Disney Research
Affordances in HCI: Toward a Mediated Action PerspectiveVictor Kaptelinin, University of Bergen
Bonnie Nardi, University of California Irvine
Using Rhythmic Patterns as an Input MethodEmilien Ghomi, Université Paris-Sud; et al.
Guillaume Faure, Université Paris-Sud
Stephane Huot, Université Paris-Sud
Olivier Chapuis, Université Paris-Sud
Michel Beaudouin-Lafon, Université Paris-Sud
The Normal Natural Troubles of Driving with GPSBarry Brown, Stockholm University
Eric Laurier, University of Edinburgh
Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical KiosksKurtis Heimerl, University of California Berkeley; et al.
Brian Gawalt, University of California Berkeley
Kuang Chen, University of California Berkeley
Tapan S. Parikh, University of California Berkeley
Björn Hartmann, University of California Berkeley
Improving Command Selection with CommandMapsJoey Scarr, University of Canterbury; et al.
Andy Cockburn, University of Canterbury
Carl Gutwin, University of Saskatchewan
Andrea Bunt, University of Manitoba
Empathy, Participatory Design and People with DementiaStephen Lindsay, Newcastle University; et al.
Katie Britain, Newcastle University
Daniel Jackson, Newcastle University
Cassim Ladha, Newcastle University
Karim Ladha, Newcastle University
Patrick Olivier, Newcastle University
2011Usable Gestures for Blind People: Understanding Preference and PerformanceShaun K. Kane, University of Washington; et al.
Jacob O. Wobbrock, University of Washington
Richard E. Ladner, University of Washington
Effects of Community Size and Contact Rate in Synchronous Social Q&ARyen W. White, Microsoft Research; et al.
Matthew Richardson, Microsoft Research
Yandong Liu, Carnegie Mellon University
Teenagers and Their Virtual Possessions: Design Opportunities and IssuesWilliam Odom, Carnegie Mellon University; et al.
John Zimmerman, Carnegie Mellon University
Jodi Forlizzi, Carnegie Mellon University
Enhancing Physicality in Touch Interaction with Programmable FrictionVincent Levesque, University of British Columbia; et al.
Louise Oram, University of British Columbia
Karon MacLean, University of British Columbia
Andy Cockburn, University of Canterbury
Nicholas D. Marchuk, Northwestern University
Dan Johnson, Northwestern University
J. Edward Colgate, Northwestern University
Mid-air Pan-and-Zoom on Wall-sized DisplaysMathieu Nancel, Université Paris-Sud; et al.
Julie Wagner, INRIA
Emmanuel Pietriga, INRIA
Olivier Chapuis, Université Paris-Sud
Wendy Mackay, INRIA
Bricolage: Example-Based Retargeting for Web DesignRanjitha Kumar, Stanford University; et al.
Jerry Talton, Stanford University
Salman Ahmad, Stanford University
Scott Klemmer, Stanford University
Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual E...Thomas Erickson, IBM Research; et al.
N. Sadat Shami, IBM Research
Wendy A. Kellogg, IBM Research
David W. Levine, IBM Research
In the Shadow of Misperception: Assistive Technology Use and Social InteractionsKristen Shinohara & Jacob O. Wobbrock, University of Washington
Why is My Internet Slow?: Making Network Speeds VisibleMarshini Chetty, Georgia Institute of Technology; et al.
David Haslem, Orange Sparkle Ball
Andrew Baird, Amazon
Ugochi Ofoha, Georgia Institute of Technology
Bethany Sumner, Georgia Institute of Technology
Rebecca Grinter, Georgia Institute of Technology
Ease of Juggling: Studying the Effects of Manual MultitaskingAntti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University
Automics: souvenir generating photoware for theme parksAbigail Durrant, University of Nottingham; et al.
Duncan Rowland, University of Lincoln
David Kirk, University of Nottingham
Steve Benford, University of Nottingham
Joel E. Fischer, University of Nottingham
Derek McAuley, University of Nottingham
Michael A. Peshkin, Northwestern University
Your Noise is My Command: Sensing Gestures Using the Body as an AntennaGabe Cohn, University of Washington; et al.
Daniel Morris, Microsoft Research
Shwetak N. Patel, University of Washington
Desney Tan, Microsoft Research
Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Wor...Koji Yatani, University of Toronto; et al.
Michael Novati, University of Toronto
Andrew Trusty, University of Toronto
Khai N. Truong, University of Toronto
2010Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber BundlesPatrick Baudisch, Hasso Plattner Institute; et al.
Torsten Becker, Hasso Plattner Institute
Frederik Rudeck, Hasso Plattner Institute
Mapping the Landscape of Sustainable HCICarl DiSalvo, Georgia Institute of Technology; et al.
Phoebe Sengers, Cornell University
Hrönn Brynjarsdóttir, Cornell University
Occlusion-Aware InterfacesDaniel Vogel & Ravin Balakrishnan, University of Toronto
Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural IndiaNeil Patel, Stanford University; et al.
Deepti Chittamuru, University of California Berkeley
Anupam Jain, IBM Research
Paresh Dave, Development Support Center
Tapan S. Parikh, University of California Berkeley
How does search behavior change as search becomes more difficult?Anne Aula, Google; et al.
Rehan M. Khan, Google
Zhiwei Guan, Google
The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Co...Brent Hecht & Darren Gergle, Northwestern University
Skinput: Appropriating the Body as an Input SurfaceChris Harrison, Carnegie Mellon University; et al.
Desney Tan, Microsoft Research
Dan Morris, Microsoft Research
Mobile-izing Health Workers in Rural IndiaDivya Ramachandran, University of California Berkeley; et al.
John Canny, University of California Berkeley
Prabhu Dutta Das, Dhirubhai Ambani Institute of Information and Communications Technology
Edward Cutrell, Microsoft Research
The Design of Eco-Feedback TechnologyJon Froehlich, University of Washington; et al.
Leah Findlater, University of Washington
James Landay, University of Washington
Feminist HCI: Taking Stock and Outlining an Agenda for DesignShaowen Bardzell, Indiana University at Bloomington
Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface StructureMorgan Dixon & James Fogarty, University of Washington
Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of ChartsScott Bateman, University of Saskatchewan; et al.
Regan L. Mandryk, University of Saskatchewan
Carl Gutwin, University of Saskatchewan
Aaron Genest, University of Saskatchewan
David McDine, University of Saskatchewan
Christopher Brooks, University of Saskatchewan
2009From Interaction to Trajectories: Designing Coherent Journeys Through User ExperiencesSteve Benford, University of Nottingham; et al.
Gabriella Giannachi, University of Exeter
Boriana Koleva, University of Nottingham
Tom Rodden, University of Nottingham
Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Ser...Jeffrey Heer, Stanford University; et al.
Nicholas Kong, University of California Berkeley
Maneesh Agrawala, University of California Berkeley
Predicting Tie Strength With Social MediaEric Gilbert & Karrie Karahalios, University of Illinois at Urbana-Champaign
Musink: Composing Music through Augmented DrawingTheophanis Tsandilas, Université Paris-Sud; et al.
Catherine Letondal, Université Paris-Sud
Wendy Mackay, Université Paris-Sud
Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector ExhibitsScott S. Snibbe, Sona Research
Hayes S. Raffle, Massachusetts Institute of Technology
Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection PerformanceLeah Findlater, University of British Columbia; et al.
Karyn Moffatt, University of British Columbia
Joanna McGrenere, University of British Columbia
Jessica Dawson, University of British Columbia
Undo and Erase Events as Indicators of Usability ProblemsDavid Akers, Stanford University; et al.
Matthew Simpson, Google
Robin Jeffries, Google
Terry Winograd, Stanford University
2008In-Car GPS Navigation: Engagement with and Disengagement from the EnvironmentGilly Leshed, Cornell University; et al.
Theresa Velden, Cornell University
Oya Rieger, Cornell University
Blazej Kot, Cornell University
Phoebe Sengers, Cornell University
Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Inte...Krzysztof Z. Gajos, University of Washington; et al.
Jacob O. Wobbrock, University of Washington
Daniel S. Weld, University of Washington
Large Scale Analysis of Web Revisitation PatternsEytan Adar, University of Washington; et al.
Jaime Teevan, Microsoft Research
Susan T. Dumais, Microsoft Research
Designs on Dignity: Perceptions of Technology Among the HomelessChristopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology
The Network in the Garden: An Empirical Analysis of Social Media in Rural LifeEric Gilbert, University of Illinois at Urbana-Champaign; et al.
Karrie Karahalios, University of Illinois at Urbana-Champaign
Christian Sandvig, University of Illinois at Urbana-Champaign
Multimodal collaborative handwriting training for visually-impaired peopleBeryl Plimmer, University of Auckland; et al.
Andrew Crossan, University of Glasgow
Stephen A. Brewster, University of Glasgow
Rachel Blagojevic, University of Auckland
An Error Model for Pointing Based on Fitts' LawJacob O. Wobbrock, University of Washington; et al.
Edward Cutrell, Microsoft Research
Susumu Harada, University of Washington
I. Scott MacKenzie, York University
2007Multiview: improving trust in group video conferencing through spatial faithfulnessDavid T. Nguyen & John Canny, University of California Berkeley
Software or wetware?: discovering when and why people use digital prosthetic memoryVaiva Kalnikaité & Steve Whittaker, University of Sheffield
Shift: a technique for operating pen-based interfaces using touchDaniel Vogel, University of Toronto
Patrick Baudisch, Microsoft Research
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognit...Björn Hartmann, Stanford University; et al.
Leith Abdulla, Stanford University
Manas Mittal, Massachusetts Institute of Technology
Scott R. Klemmer, Stanford University
Sustainable interaction design: invention & disposal, renewal & reuseEli Blevis, Indiana University at Bloomington
Consuming video on Mobile devicesKenton O'Hara, Hewlett-Packard Labs; et al.
April Slayden Mitchell, Hewlett-Packard Labs
Alex Vorbau, Hewlett-Packard Labs
2006Trackball text entry for people with motor impairmentsJacob O. Wobbrock & Brad Myers, Carnegie Mellon University
Embedded phenomena: supporting science learning with classroom-sized distributed simulationsTom Moher, University of Illinois at Chicago
A role for haptics in mobile interaction: initial design using a handheld tactile display prototypeJoseph Luk, University of British Columbia; et al.
Jérôme Pasquero, McGill University
Shannon Little, University of British Columbia
Karon MacLean, University of British Columbia
Vincent Lévesque, McGill University
Vincent Hayward, McGill University
2005Making space for stories: ambiguity in the design of personal communication systemsPaul M. Aoki, Palo Alto Research Center
Allison Woodruff, Intel Research
Examining Task Engagement in Sensor-Based Statistical Models of Human InterruptibilityJames Fogarty, Carnegie Mellon University; et al.
Andrew J. Ko, Carnegie Mellon University
Htet Htet Aung, Carnegie Mellon University
Elspeth Golden, Carnegie Mellon University
Karen P. Tang, Carnegie Mellon University
Scott E. Hudson, Carnegie Mellon University
Designing the spectator experienceStuart Reeves, University of Nottingham; et al.
Steve Benford, University of Nottingham
Claire O'Malley, University of Nottingham
Mike Fraser, University of Bristol
The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation areaTovi Grossman & Ravin Balakrishnan, University of Toronto
CIKM (Knowledge Management)
2013Penguins in Sweaters, or Serendipitous Entity Search on User-generated ContentIlaria Bordino, Yahoo! Research; et al.
Yelena Mejova, Yahoo! Research
Mounia Lalmas, Yahoo! Research
2012Gelling, and Melting, Large Graphs by Edge ManipulationHanghang Tong, IBM Research; et al.
B. Aditya Prakash, Virginia Tech
Tina Eliassi-Rad, Rutgers University
Michalis Faloutsos, University of California Riverside
Christos Faloutsos, Carnegie Mellon University
2011Intent-aware query similarityJiafeng Guo, Chinese Academy of Sciences; et al.
Xueqi Cheng, Chinese Academy of Sciences
Gu Su, Microsoft Research
Xiaofei Zhu, Chinese Academy of Sciences
2010MENTA: Inducing Multilingual Taxonomies from WikipediaGerard de Melo & Gerhard Weikum, Max Planck Institut
FACeTOR: cost-driven exploration of faceted query resultsAbhijith Kashyap, State University of New York at Buffalo; et al.
Vagelis Hristidis, Florida International University
Michalis Petropoulos, State University of New York at Buffalo
2009On the Feasibility of Multi-Site Web Search EnginesRicardo Baeza-Yates, Yahoo! Research; et al.
Aristides Gionis, Yahoo! Research
Flavio Junqueira, Yahoo! Research
Vassilis Plachouras, Yahoo! Research
Luca Telloli, Yahoo! Research
2008Learning to Link with WikipediaDavid Milne & Ian H. Witten, University of Waikato
2007Autonomously Semantifying WikipediaFei Wu & Daniel S. Weld, University of Washington
2006Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing IndicesSegabtian Michel, Max Planck Institut; et al.
Matthias Bender, Max Planck Institut
Nikos Ntarmos, RACTI and University of Patras
Peter Triantafillou, RACTI and University of Patras
Gerhard Weikum, Max Planck Institut
Christian Zimmer, Max Planck Institut
2005Towards Automatic Association of Relevant Unstructured Content with Structured Query ResultsPrasan Roy, IBM Research; et al.
Mukesh Mohania, IBM Research
Bhuvan Bamba, Georgia Institute of Technology
Shree Raman, University of Massachusetts Amherst
2004Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XMLQiankun Zhao, Nanyang Technological University; et al.
Sourav S Bhowmick, Nanyang Technological University
Mukesh Mohania, IBM Research
Yahiko Kambayashi, Kyoto University
CVPR (Computer Vision)
2014What Camera Motion Reveals About Shape with Unknown BRDFManmohan Chandraker, NEC Labs America
2013Fast, Accurate Detection of 100,000 Object Classes on a Single MachineThomas Dean, Google; et al.
Mark A. Ruzon, Google
Mark Segal, Google
Jonathon Shlens, Google
Sudheendra Vijayanarasimhan, Google
Jay Yagnik, Google
2012A Simple Prior-free Method for Non-Rigid Structure-from-Motion FactorizationYuchao Dai, Northwestern Polytechnical University; et al.
Hongdong Li, Australian National University
Mingyi He, Northwestern Polytechnical University
2011Real-time Human Pose Recognition in Parts from Single Depth ImagesJamie Shotton, Microsoft Research; et al.
Andrew Fitzgibbon, Microsoft Research
Mat Cook, Microsoft Research
Toby Sharp, Microsoft Research
Mark Finocchio, Microsoft Research
Richard Moore, Microsoft Research
Alex Kipman, Microsoft Research
Andrew Blake, Microsoft Research
2010Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data usi...Anders Eriksson & Anton va den Hendel, University of Adelaide
2009Single Image Haze Removal Using Dark Channel PriorKaiming He, The Chinese University of Hong Kong; et al.
Jian Sun, Microsoft Research
Xiaoou Tang, The Chinese University of Hong Kong
2008Global Stereo Reconstruction under Second Order Smoothness PriorsOliver Woodford, University of Oxford; et al.
Ian Reid, Oxford Brookes University
Philip Torr, University of Oxford
Andrew Fitzgibbon, Microsoft Research
Beyond Sliding Windows: Object Localization by Efficient Subwindow SearchChistoph H. Lampert, Max Planck Institut; et al.
Matthew B. Blaschko, Max Planck Institut
Thomas Hodmann, Google
2007Dynamic 3D Scene Analysis from a Moving VehicleBastian Leibe, ETH Zurich; et al.
Nico Cornelis, Katholieke Universiteit Leuven
Kurt COrnelis, Katholieke Universiteit Leuven
Luc Van Gool, ETH Zurich
2006Putting Objects in PerspectiveDerek Hoiem, Carnegie Mellon University; et al.
Alexei Efros, Carnegie Mellon University
Martial Hebert, Carnegie Mellon University
2005Real-Time Non-Rigid Surface DetectionJulien Pilet, École Polytechnique Fédérale de Lausanne; et al.
Vincent Lepetit, École Polytechnique Fédérale de Lausanne
Pascal Fua, École Polytechnique Fédérale de Lausanne
2004Programmable Imaging using a Digital Micromirror ArrayShree K. Nayar, Columbia University; et al.
Vlad Branzoi, Columbia University
Terry E. Boult, University of Colorado
2003Object Class Recognition by Unsupervised Scale-Invariant LearningRob Fergus, University of Oxford; et al.
Pietro Perona, California Institute of Technology
Andrew Zisserman, University of Oxford
2001Morphable 3D models from videoMatthew Brand, Mitsubishi Electric Research Laboratories
2000Real-Time Tracking of Non-Rigid Objects using Mean ShiftDorin Comaniciu, Siemens Corporate Research; et al.
Visvanathan Ramesh, Siemens Corporate Research
Peter Meer, Rutgers University
FOCS (Theory)
2013Navigating Central Path with Electrical Flows: from Flows to Matchings, and BackAleksander Mądry, École Polytechnique Fédérale de Lausanne
2012A multi-prover interactive proof for NEXP sound against entangled proversTsuyoshi Ito, NEC Labs America
Thomas Vidick, Massachusetts Institute of Technology
A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2Julia Chuzhoy, Toyota Technological Institute at Chicago
Shi Li, Princeton University
2011A Randomized Rounding Approach to the Traveling Salesman ProblemShayan Oveis Gharan, Stanford University; et al.
Amin Saberi, Stanford University
Mohit Singh, McGill University
A Polylogarithmic-Competitive Algorithm for the k-Server ProblemNikhil Bansal, IBM Research; et al.
Niv Buchbinder, Open University
Aleksander Mądry, Massachusetts Institute of Technology
Joseph Naor, Technion
Approximating Graphic TSP by MatchingsTobia M¨o;mke & Ola Svensson, Royal Institute of Technology
2010Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke DecompositionsMatthew Andrews, Bell Labs
Subexponential Algorithms for Unique Games and Related ProblemsSanjeev Arora, Princeton University; et al.
Boaz Barak, Princeton University
David Steurer, Princeton University
Computational Transition at the Uniqueness ThresholdAllan Sly, Microsoft Research
2008Two Query PCP with Sub-Constant ErrorDana Moshkovitz & Ran Raz, Weizmann Institute of Science
2007Space-Efficient Identity Based Encryption Without PairingsDan Boneh, Stanford University; et al.
Craig Gentry, Stanford University
Michael Hamburg, Stanford University
2006Settling the Complexity of 2-Player Nash EquilibriumXi Chen, Tsinghua University
Xiaotie Deng, City University of Hong Kong
2005The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type M...Subhash A. Khot, Georgia Institute of Technology
Nisheeth K. Vishnoi, IBM Research
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial TimeFarzad Parvaresh & Alexander Vardy, University of California San Diego
2004Cryptography in NC0Benny Applebaum, Technion; et al.
Yuval Ishai, Technion
Eyal Kushilevitz, Technion
Hardness of Approximating the Shortest Vector Problem in LatticesSubhash Khot, Georgia Institute of Technology
2003On the Impossibility of Dimension Reduction in L1Bo Brinkman & Moses Charikar, Princeton University
2002A Dichotomy Theorem for Constraints on a Three-Element SetAndrei A. Bulatov, University of Oxford
Minimizing Congestion in General NetworksHarald Räcke, Paderborn University
Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String ModelBoaz Barak, Weizmann Institute of Science
FSE (Software Engineering)
2012Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software LibrariesBradley Cossette & Robert Walker, University of Calgary
Scalable Test Data Generation from Multidimensional ModelsEmina Torlak, University of California Berkeley
Assessing the Value of Branches with What-if AnalysisChristian Bird & Thomas Zimmermann, Microsoft Research
2011Proactive Detection of Collaboration ConflictsYuriy Brun, University of Washington; et al.
Reid Holmes, University of Waterloo
Michael D. Ernst, University of Washington
David Notkin, University of Washington
How Do Fixes Become Bugs?Zuoning Yin, University of Illinois at Urbana-Champaign; et al.
Ding Yuan, University of Illinois at Urbana-Champaign
Yuanyuan Zhou, University of California San Diego
Shankar Pasupathy, NetApp
Lakshmi Bairavasundaram, NetApp
Proving programs robustSwarat Chaudhuri, Rice University; et al.
Sumit Gulwani, Microsoft Research
Roberto Lublinerman, Pennsylvania State University
Sara Navidpour, Pennsylvania State University
2010Creating and evolving developer documentation: understanding the decisions of open source contribu...Barthélémy Dagenais & Martin P. Robillard, McGill University
Developer Fluency: Achieving True Mastery in Software ProjectsMinghui Zhou, Peking University
Audris Mockus, Avaya Labs
Staged Concurrent Program AnalysisNishant Sinha & Chao Wang, NEC Labs America
2009Asserting and checking determinism for multithreaded programsJacob Burnim & Koushik Sen, University of California Berkeley
Darwin: an approach for debugging evolving programsDawei Qi, National University of Singapore; et al.
Abhik Roychoudhury, National University of Singapore
Zhenkai Liang, National University of Singapore
Kapil Vaswani, Microsoft Research
Graph-based Mining of Multiple Object Usage PatternsTung Thanh Nguyen, Iowa State University; et al.
Hoan Anh Nguyen, Iowa State University
Nam H. Pham, Iowa State University
Jafar M. Al-Kofahi, Iowa State University
Tien N. Nguyen, Iowa State University
2008What makes a good bug report?Nicolas Bettenburg, Saarland University; et al.
Sascha Just, Saarland University
Adrian Schröter, University of Victoria
Cathrin Weiss, University of Zurich
Rahul Premraj, Saarland University
Thomas Zimmermann, University of Calgary
Efficient online monitoring of web-service SLAsFranco Raimondi, University College London; et al.
James Skene, University College London
Wolfgang Emmerich, University College London
2007Automatic consistency assessment for query results in dynamic environmentsJamie Payton, University of North Carolina at Charlotte; et al.
Christine Julien, University of Texas at Austin
Gruia-Catalin Roman, Washington University in St. Louis
Globally distributed software development project performance: an empirical analysisNarayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University
Mining specifications of malicious behaviorMihai Christodorescu, University of Wisconsin; et al.
Somesh Jha, University of Wisconsin
Christopher Kruegel, Vienna University of Technology
Object and reference immutability using Java genericsYoav Zibin, Massachusetts Institute of Technology; et al.
Alex Potanin, Victoria University of Wellington
Mahmood Ali, Massachusetts Institute of Technology
Shay Artzi, Massachusetts Institute of Technology
Adam Kieżun, Massachusetts Institute of Technology
Michael D. Ernst, Massachusetts Institute of Technology
2006Controlling factors in evaluating path-sensitive error detection techniquesMatthew B. Dwyer, University of Nebraska-Lincoln; et al.
Suzette Person, University of Nebraska-Lincoln
Sebastian Elbaum, University of Nebraska-Lincoln
SYNERGY: a new algorithm for property checkingBhargav S. Gulavani, Indian Institute of Technology; et al.
Thomas A. Henzinger, École Polytechnique Fédérale de Lausanne
Yamini Kannan, Microsoft Research
Aditya V. Nori, Microsoft Research
Sriram K. Rajamani, Microsoft Research
2005Automatic Generation of Suggestions for Program InvestigationMartin P. Robillard, McGill University
CUTE: a concolic unit testing engine for CKoushik Sen, University of Illinois at Urbana-Champaign; et al.
Darko Marinov, University of Illinois at Urbana-Champaign
Gul Agha, University of Illinois at Urbana-Champaign
Context- and path-sensitive memory leak detectionYichen Xie & Alex Aiken, Stanford University
2004Reasoning about partial goal satisfaction for requirements and design engineeringEmmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain
A classification system and analysis for aspect-oriented programsMartin Rinard, Massachusetts Institute of Technology; et al.
Alexandru Salcianu, Massachusetts Institute of Technology
Suhabe Bugrara, Massachusetts Institute of Technology
2003Eliminating redundancies with a "composition with adaptation" meta-programming techniqueStan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong University
A Family of Test Adequacy Criteria for Database-Driven ApplicationsGregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh
Predicting problems caused by component upgradesStephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology
2002Isolating Cause-Effect Chains from Computer ProgramsAndreas Zeller, Saarland University
ICCV (Computer Vision)
2013From Large Scale Image Categorization to Entry-Level CategoriesVicente Ordonez, University of North Carolina at Chapel Hill; et al.
Jia Deng, Stanford University
Yejin Choi, Stony Brook University
Alexander Berg, University of North Carolina at Chapel Hill
Tamara Berg, University of North Carolina at Chapel Hill
2011Relative AttributesDevi Parikh, Toyota Technological Institute at Chicago
Kristen Grauman, University of Texas at Austin
2009Discriminative models for multi-class object layoutChaitanya Desai, University of California Irvine; et al.
Deva Ramanan, University of California Irvine
Charless Fowlkes, University of California Irvine
2007Population Shape Regression From Random Design DataBradley Davis, University of North Carolina at Chapel Hill; et al.
P. Thomas Fletcher, University of Utah
Elizabeth Bullitt, University of North Carolina at Chapel Hill
Sarang Joshi, University of Utah
2005Globally Optimal Estimates for Geometric Reconstruction ProblemsFredrik Kahl, Lund University
Didier Henrion, LAAS-CNRS
2003Detecting Pedestrians using Patterns of Motion and AppearancePaul Viola, Microsoft Research; et al.
Michael J. Jones, Mitsubishi Electric Research Laboratories
Daniel Snow, Mitsubishi Electric Research Laboratories
Image Parsing: Unifying Segmentation, Detection and RecognitionZhuowen Tu, University of California Los Angeles; et al.
Xiangrong Chen, University of California Los Angeles
Alan L. Yuille, University of California Los Angeles
Song-Chun Zhu, University of California Los Angeles
Image-based Rendering using Image-based PriorsAndrew Fitzgibbon, University of Oxford; et al.
Yonatan Wexler, Weizmann Institute of Science
Andrew Zisserman, University of Oxford
2001Probabilistic Tracking with Exemplars in a Metric SpaceKentaro Toyama & Andrew Blake, Microsoft Research
The Space of All Stereo ImagesSteven Seitz, University of Washington
1999Euclidean Reconstruction and Reprojection up to SubgroupsYi Ma, University of California Berkeley; et al.
Stefano Soatto, Washington University in St. Louis
Jana Kosecka, University of California Berkeley
Shankar Sastry, University of California Berkeley
A Theory of Shape by Space CarvingKiriakos Kutulakos, University of Rochester
Steven Seitz, Carnegie Mellon University
1998Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Paramet...Marc Pollefeys, Katholieke Universiteit Leuven; et al.
Reinhard Koch, Katholieke Universiteit Leuven
Luc Van Gool, Katholieke Universiteit Leuven
The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image SequencesPhil Torr, Microsoft Research; et al.
Andrew Fitzgibbon, University of Oxford
Andrew Zisserman, University of Oxford
ICML (Machine Learning)
2014Understanding the Limiting Factors of Topic Modeling via Posterior Contraction AnalysisJian Tang, Peking University; et al.
Zhaoshi Meng, University of Michigan
XuanLong Nguyen, University of Michigan
Qiaozhu Mei, University of Michigan
Ming Zhang, Peking University
2013Vanishing Component AnalysisRoi Livni, The Hebrew University of Jerusalum; et al.
David Lehavi, Hewlett-Packard Labs
Sagi Schein, Hewlett-Packard Labs
Hila Nachlieli, Hewlett-Packard Labs
Shai Shalev Shwartz, The Hebrew University of Jerusalum
Amir Globerson, The Hebrew University of Jerusalum
Fast Semidifferential-based Submodular Function OptimizationRishabh Iyer, University of Washington; et al.
Stefanie Jegelka, University of California Berkeley
Jeff Bilmes, University of Washington
2012Bayesian Posterior Sampling via Stochastic Gradient Fisher ScoringSungjin Ahn, University of California Irvine; et al.
Anoop Korattikara, University of California Irvine
Max Welling, University of California Irvine
2011Computational Rationalization: The Inverse Equilibrium ProblemKevin Waugh, Carnegie Mellon University; et al.
Brian Ziebart, Carnegie Mellon University
Drew Bagnell, Carnegie Mellon University
2010Hilbert Space Embeddings of Hidden Markov ModelsLe Song, Carnegie Mellon University; et al.
Byron Boots, Carnegie Mellon University
Sajid M. Siddiqi, Google
Geoffrey Gordon, Carnegie Mellon University
Alex Smola, Yahoo! Research
2009Structure preserving embeddingBlake Shaw & Tony Jebara, Columbia University
2008SVM Optimization: Inverse Dependence on Training Set SizeShai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago
2007Information-theoretic metric learningJason V. Davis, University of Texas at Austin; et al.
Brian Kulis, University of Texas at Austin
Prateek Jain, University of Texas at Austin
Suvrit Sra, University of Texas at Austin
Inderjit S. Dhillon, University of Texas at Austin
2006Trading convexity for scalabilityRonan Collobert, NEC Labs America; et al.
Fabian Sinz, NEC Labs America
Jason Weston, NEC Labs America
Léon Bottou, NEC Labs America
2005A support vector method for multivariate performance measuresThorsten Joachims, Cornell University
1999Least-Squares Temporal Difference LearningJustin A. Boyan, NASA Ames Research Center
ICSE (Software Engineering)
2014Characterizing and Detecting Performance Bugs for Smartphone ApplicationsYepang Liu, Hong Kong University of Science and Technology; et al.
Chang Xu, Nanjing University
Shing-Chi Cheung, Hong Kong University of Science and Technology
Improving Automated Source Code Summarization via an Eye-Tracking Study of ProgrammersPaige Rodeghero, University of Notre Dame; et al.
Collin McMillan, University of Notre Dame
Paul W. McBurney, University of Notre Dame
Nigel Bosch, University of Notre Dame
Sidney D'Mello, University of Notre Dame
Understanding JavaScript Event-Based InteractionsSaba Alimadadi, University of British Columbia; et al.
Sheldon Sequeira, University of British Columbia
Ali Mesbah, University of British Columbia
Karthik Pattabiraman, University of British Columbia
Coverage Is Not Strongly Correlated with Test Suite EffectivenessLaura Inozemtseva & Reid Holmes, University of Waterloo
Cowboys, Ankle Sprains, and Keepers of Quality: How Is Video Game Development Different from Softw...Emerson Murphy-Hill, North Carolina State University; et al.
Thomas Zimmermann, Microsoft Research
Nachiappan Nagappan, Microsoft Research
Trading Robustness for Maintainability: An Empirical Study of Evolving C# ProgramsNélio Cacho, Federal University of Rio Grande do Norte; et al.
Thiago César, Federal University of Rio Grande do Norte
Thomas Filipe, Federal University of Rio Grande do Norte
Eliezio Soares, Federal University of Rio Grande do Norte
Arthur Cassio, Federal University of Rio Grande do Norte
Rafael Souza, Federal University of Rio Grande do Norte
Israel Garcia, Federal University of Rio Grande do Norte
Eiji Adachi Barbosa, Pontifical Catholic University of Rio de Janeiro
Alessandro Garcia, Pontifical Catholic University of Rio de Janeiro
Unit Test Virtualization with VMVMJonathan Bell & Gail Kaiser, Columbia University
Enhancing Symbolic Execution with VeritestingThanassis Avgerinos, Carnegie Mellon University; et al.
Alexandre Rebert, Carnegie Mellon University
Sang Kil Cha, Carnegie Mellon University
David Brumley, Carnegie Mellon University
A Study and Toolkit for Asynchronous Programming in C#Semih Okur, University of Illinois at Urbana-Champaign; et al.
David L. Hartveld, Delft University of Technology
Danny Dig, Oregon State University
Arie van Deursen, Delft University of Technology
2013Dual Ecological Measures of Focus in Software DevelopmentDaryl Posnett, University of California Davis; et al.
Raissa D'Souza, University of California Davis
Premkumar Devanbu, University of California Davis
Vladimir Filkov, University of California Davis
Data Clone Detection and Visualization in SpreadsheetsFelienne Hermans, Delft University of Technology; et al.
Ben Sedee, Delft University of Technology
Martin Pinzger, Delft University of Technology
Arie van Deursen, Delft University of Technology
UML in PracticeMarian Petre, Open University
Automatic patch generation learned from human-written patchesDongsun Kim, Hong Kong University of Science and Technology; et al.
Jaechang Nam, Hong Kong University of Science and Technology
Jaewoo Song, Hong Kong University of Science and Technology
Sunghun Kim, Hong Kong University of Science and Technology
Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop CloudsWeiyi Shang, Queen's University; et al.
Zhen Ming Jiang, Queen's University
Hadi Hemmati, Queen's University
Bram Adams, Polytechnique Montréal
Ahmed E. Hassan, Queen's University
Patrick Martin, Queen's University
Interaction-Based Test-Suite MinimizationDale Blue, IBM; et al.
Itai Segall, IBM Research
Rachel Tzoref-Brill, IBM Research
Aviad Zlotnick, IBM Research
2012Understanding Integer Overflow in C/C++Will Dietz, University of Illinois at Urbana-Champaign; et al.
Peng Li, University of Utah
John Regehr, University of Utah
Vikram Adve, University of Illinois at Urbana-Champaign
Using Dynamic Analysis to Discover Polynomial and Array InvariantsThanhVu Nguyen, University of New Mexico; et al.
Deepak Kapur, University of New Mexico
Westley Weimer, University of New Mexico
Stephanie Forrest, University of New Mexico
Amplifying Tests to Validate Exception Handling CodePingyu Zhang & Sebastian Elbaum, University of Nebraska-Lincoln
Partial Models: Towards Modeling and Reasoning with UncertaintyMichalis Famelis, University of Toronto; et al.
Rick Salay, University of Toronto
Marsha Chechik, University of Toronto
How Do Professional Developers Comprehend Software?Tobias Roehm, Technische Universität München; et al.
Rebecca Tiarks, University of Bremen
Rainer Koschke, University of Bremen
Walid Maalej, Technische Universität München
A Tactic-Centric Approach for Automating Traceability of Quality ConcernsMehdi Mirakhorli, DePaul University; et al.
Yonghee Shin, DePaul University
Jane Cleland-Huang, DePaul University
Murat Cinar, DePaul University
Automated Detection of Client-State Manipulation VulnerabilitiesAnders Møller & Mathias Schwarz, Aarhus University
2011Verifying Multi-threaded Software using SMT-based Context-Bounded Model CheckingLucas Cordeiro & Bernd Fischer, University of Southampton
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and ...Narayan Ramasubbu, Singapore Management University; et al.
Marcelo Cataldo, Carnegie Mellon University
Rajesh Krishna Balan, Singapore Management University
James D. Herbsleb, Carnegie Mellon University
Programs, tests, and oracles: the foundations of testing revisitedMatt Staats, University of Minnesota; et al.
Michael W. Whalen, University of Minnesota
Mats P.E. Heimdahl, University of Minnesota
On-demand Feature Recommendations Derived from Mining Public Product DescriptionsHoratiu Dumitru, DePaul University; et al.
Marek Gibiec, DePaul University
Negar Hariri, DePaul University
Jane Cleland-Huang, DePaul University
Bamshad Mobasher, DePaul University
Carlos Castro-Herrera, DePaul University
Mehdi Mirakhorli, DePaul University
Run-Time Efficient Probabilistic Model CheckingAntonio Filieri, Politecnico di Milano; et al.
Carlo Ghezzi, Politecnico di Milano
Giordano Tamburrelli, Politecnico di Milano
2010A Machine Learning Approach for Tracing Regulatory Codes to Product Specific RequirementsJane Cleland-Huang, DePaul University; et al.
Adam Czauderna, DePaul University
John Emenecker, DePaul University
Marek Gibiec, DePaul University
Collaborative Reliability Prediction of Service-Oriented SystemsZibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong
A Cut-off Approach for Bounded Verification of Parameterized SystemsQiusong Yang & Mingshu Li, Chinese Academy of Sciences
Test Generation through Programming in UDITAMilos Gligoric, University of Illinois at Urbana-Champaign; et al.
Tihomir Gvero, École Polytechnique Fédérale de Lausanne
Vilas Jagannath, University of Illinois at Urbana-Champaign
Sarfraz Khurshid, University of Texas at Austin
Viktor Kuncak, École Polytechnique Fédérale de Lausanne
Darko Marinov, University of Illinois at Urbana-Champaign
A Degree-of-Knowledge Model to Capture Source Code FamiliarityThomas Fritz, University of British Columbia; et al.
Jingwen Ou, University of British Columbia
Gail C. Murphy, University of British Columbia
Emerson Murphy-Hill, University of British Columbia
2009How We Refactor, and How We Know ItEmerson Murphy-Hill, Portland State University; et al.
Chris Parnin, Georgia Institute of Technology
Andrew P. Black, Portland State University
Effective Static Deadlock DetectionMayur Naik, Intel Research; et al.
Chang-Seo Park, University of California Berkeley
Koushik Sen, University of California Berkeley
David Gay, Intel Research
Invariant-Based Automatic Testing of AJAX User InterfacesAli Mesbah & Arie van Deursen, Delft University of Technology
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows VistaChristian Bird, University of California Davis; et al.
Nachiappan Nagappan, Microsoft Research
Premkumar Devanbu, University of California Davis
Harald Gall, University of Zurich
Brendan Murphy, Microsoft Research
Automatically finding patches using genetic programmingWestley Weimer, University of Virginia; et al.
ThanhVu Nguyen, University of New Mexico
Claire Le Goues, University of Virginia
Stephanie Forrest, University of New Mexico
2008Precise memory leak detection for java software using container profilingGuoqing Xu & Atanas Rountev, Ohio State University
Debugging reinvented: asking and answering why and why not questions about program behaviorAndrew J. Ko & Brad A. Myers, Carnegie Mellon University
Recommending adaptive changes for framework evolutionBarthélémy Dagenais & Martin P. Robillard, McGill University
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental ApproachJoseph Ruthruff, University of Nebraska-Lincoln; et al.
John Penix, Google
J. David Morgenthaler, Google
Sebastian Elbaum, University of Nebraska-Lincoln
Gregg Rothermel, University of Nebraska-Lincoln
The effect of program and model structure on mc/dc test adequacy coverageAjitha Rajan, University of Minnesota; et al.
Michael W. Whalen, Rockwell Collins
Mats P.E. Heimdahl, University of Minnesota
2007Refactoring for Parameterizing Java ClassesAdam Kiezun, Massachusetts Institute of Technology; et al.
Michael D. Ernst, Massachusetts Institute of Technology
Frank Tip, IBM Research
Robert M. Fuhrer, IBM Research
Tracking Code Clones in Evolving SoftwareEkwa Duala-Ekoko & Martin P. Robillard, McGill University
Matching and Merging of Statecharts SpecificationsShiva Nejati, University of Toronto; et al.
Mehrdad Sabetzadeh, University of Toronto
Marsha Chechik, University of Toronto
Steve Easterbrook, University of Toronto
Pamela Zave, AT&T Laboratories
Predicting Faults from Cached HistorySunghun Kim, Massachusetts Institute of Technology; et al.
Thomas Zimmermann, Saarland University
E. James Whitehead Jr., University of California Santa Cruz
Andreas Zeller, Saarland University
2006Model-Based Development of Dynamically Adaptive SoftwareJi Zhang & Betty H.C. Cheng, Michigan State University
Who Should Fix This Bug?John Anvik, University of British Columbia; et al.
Lyndon Hiew, University of British Columbia
Gail C. Murphy, University of British Columbia
2005Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Pe...Andrew Ko, Carnegie Mellon University; et al.
Htet Htet Aung, Carnegie Mellon University
Brad Myers, Carnegie Mellon University
Is Mutation an Appropriate Tool for Testing Experiments?James Andrews, University of Western Ontario; et al.
Lionel Briand, Carleton University
Yvan Labiche, Carleton University
Using Structural Context to Recommend Source Code ExamplesReid Holmes & Gail Murphy, University of British Columbia
Data Structure Repair Using Goal-Directed ReasoningBrian Demsky & Martin Rinard, Massachusetts Institute of Technology
2004SNIAFL: Towards a Static Non-Interactive Approach to Feature LocationWei Zhao, Peking University; et al.
Lu Zhang, Peking University
Yin Liu, Peking University
Jiasu Sun, Peking University
Fuqing Yang, Peking University
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized SystemsRohit Khare & Richard N. Taylor, University of California Irvine
An Empirical Study of Software Reuse vs. Defect-Density and StabilityParastoo Mohagheghi, Ericsson; et al.
Reidar Conradi, Norwegian University of Science and Technology
Ole M. Killi, Norwegian University of Science and Technology
Henrik Schwarz, Norwegian University of Science and Technology
A Tool for Writing and Debugging Algebraic SpecificationsJohannes Henkel & Amer Diwan, University of Colorado
Static Checking of Dynamically Generated Queries in Database ApplicationsCarl Gould, University of California Davis; et al.
Zhendong Su, University of California Davis
Premkumar Devanbu, University of California Davis
2003Precise Dynamic Slicing AlgorithmsXiangyu Zhang, University of Arizona; et al.
Rajiv Gupta, University of Arizona
Youtao Zhang, University of Arizona
Modular Verification of Software Components in CSagar Chaki, Carnegie Mellon University; et al.
Edmund Clarke, Carnegie Mellon University
Alex Groce, Carnegie Mellon University
Somesh Jha, University of Wisconsin
Helmut Veith, Technische Universität Wien
IJCAI (Artificial Intelligence)
2013Bayesian Optimization in High Dimensions via Random EmbeddingsZiyu Wang, University of British Columbia; et al.
Masrour Zoghi, University of Amsterdam
Frank Hutter, Freiberg University
David Matheson, University of British Columbia
Nando de Freitas, University of British Columbia
Flexibility and Decoupling in the Simple Temporal ProblemMichel Wilson, Delft University of Technology; et al.
Tomas Klos, Delft University of Technology
Cees Witteveen, Delft University of Technology
Bob Huisman, Delft University of Technology
2011Unweighted Coalitional Manipulation Under the Borda Rule is NP-HardNadja Betzler, Technische Universität Berlin; et al.
Rolf Niedermeier, Technische Universität Berlin
Gerhard J. Woeginger, Technische Universität Eindhoven
Nested Rollout Policy Adaptation for Monte Carlo Tree SearchChristopher D. Rosin, Parity Computing
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean SpacesRoman Kontchakov, Birkbeck College London; et al.
Yavor Nenov, University of Manchester
Ian Pratt-Hartmann, University of Manchester
Michael Zakharyaschev, Birkbeck College London
2009Consequence-Driven Reasoning for Horn SHIQ OntologiesYevgeny Kazakov, University of Oxford
Learning Conditional Preference Networks with QueriesFrederic Koriche, Université Montpellier II
Bruno Zanuttini, Université de Caen Basse-Normandie
2007Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian NetworksMaleeha Qazi, Siemens Medical Solutions; et al.
Glenn Fung, Siemens Medical Solutions
Sriram Krishnan, Siemens Medical Solutions
Romer Rosales, Siemens Medical Solutions
Harald Steck, Siemens Medical Solutions
R. Bharat Rao, Siemens Medical Solutions
Don Polderman, Erasmus University Medical Center
Dhanalakshmi Chandrasekaran, No Affiliation
Building Structure into Local Search for SATDuc Nghia Pham, Griffith University; et al.
John Thornton, Griffith University
Abdul Sattar, Griffith University
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Pro...Luc Mercier & Pascal Van Hentenryck, Brown University
2005Learning Coordination ClassifiersYuhong Guo, University of Alberta; et al.
Russell Greiner, University of Alberta
Dale Schuurmans, University of Alberta
Solving CheckersJonathan Schaeffer, University of Alberta; et al.
Yngvi Bjornsson, University of Alberta
Neil Burch, University of Alberta
Akihiro Kishimoto, University of Alberta
Martin Muller, University of Alberta
Robert Lake, University of Alberta
Paul Lu, University of Alberta
Steve Sutphen, University of Alberta
A Probabilistic Model of Redundancy in Information ExtractionDoug Downey, University of Washington; et al.
Oren Etzioni, University of Washington
Stephen Soderland, University of Washington
2003Approximating Game-Theoretic Optimal Strategies for Full-scale PokerDarse Billings, University of Alberta; et al.
Neil Burch, University of Alberta
Aaron Davidson, University of Alberta
Robert Holte, University of Alberta
Jonathan Schaeffer, University of Alberta
Terence Schauenberg, University of Alberta
Duane Szafron, University of Alberta
Thin Junction Tree Filters for Simultaneous Localization and MappingMark A. Paskin, University of California Berkeley
2001Complexity Results for Structure-Based CausalityThomas Eiter & Thomas Lukasiewicz, Vienna University of Technology
1999Learning in Natural LanguageDan Roth, University of Illinois at Urbana-Champaign
A Distributed Case-Based Reasoning Application for Engineering Sales SupportIan Watson, University of Salford
Dan Gardingen, Western Air
1997Object Identification in a Bayesian ContextTimothy Huang & Stuart Russell, University of California Berkeley
Translingual Information Retrieval: A Comparative EvaluationJaime G. Carbonell, Carnegie Mellon University; et al.
Yiming Yang, Carnegie Mellon University
Robert E. Frederking, Carnegie Mellon University
Ralf D. Brown, Carnegie Mellon University
Yibing Geng, Carnegie Mellon University
Danny Lee, Carnegie Mellon University
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolo...Fangzhen Lin, The Hongkong University of Science and Technology
INFOCOM (Networking)
2014Joint Static and Dynamic Traffic Scheduling in Data Center NetworksZizhong Cao, Polytechnic Institute of New York University; et al.
M. Kodialam, Bell Labs
T. V. Lakshman, Bell Labs
Performance Evaluation and Asymptotics for Content Delivery NetworksVirag Shah & Gustavo de Veciana, University of Texas at Austin
2013On the Steady-State of Cache NetworksElisha J. Rosensweig, University of Massachusetts Amherst; et al.
Daniel S. Menasche, University of Massachusetts Amherst
Jim Kurose, University of Massachusetts Amherst
2012Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying frameworkCarlee Joe-Wong, Princeton University; et al.
Soumya Sen, Princeton University
Tian Lan, George Washington University
Mung Chiang, Princeton University
2011Dynamic right-sizing for power-proportional data centersMinghong Lin, California Institute of Technology; et al.
Adam Wierman, California Institute of Technology
Lachlan Andrew, Swinburne University of Technology
Eno Thereska, Microsoft Research
2010On the Feasibility and Efficacy of Protection Routing in IP NetworksKin-Wah Kwong, University of Pennsylvania; et al.
Lixin Gao, University of Massachusetts Amherst
Roch Guérin, University of Pennsylvania
Zhi-Li Zhang, University of Minnesota
2009Queuing Network Models for Multi-Channel P2P Live Streaming SystemsDi Wu, Polytechnic Institute of New York University; et al.
Yong Liu, Polytechnic Institute of New York University
Keith W. Ross, Polytechnic Institute of New York University
2008On the Feasibility of the Link Abstraction in (Rural) Mesh NetworksDattatraya Gokhal, Indian Navy; et al.
Sayandeep Sen, University of Wisconsin
Kameswari Chebrolu, Indian Institute of Technology
Bhaskaran Rama, Indian Institute of Technology
Theoretical Results on Base Station Movement Problem for Sensor NetworksYi Shi & Y. Thomas Hou, Virginia Tech
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless...Changhee Joo, Ohio State University; et al.
Xiaojun Lin, Purdue University
Ness B. Shroff, Ohio State University
2007Disruption free topology reconfiguration in OSPF networksPierre Francois, Université catholique de Louvain; et al.
Mike Shand, Cisco Systems
Olicier Bonaventure, Université catholique de Louvain
2006Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global PerspectiveGaurav Sharma, Purdue University; et al.
Ravi Mazumdar, University of Waterloo
Ness Shroff, Purdue University
2005Perfect Simulation and Stationarity of a Class of Mobility ModelsJean-Yves Le Boude, École Polytechnique Fédérale de Lausanne
Milan Vojnović, Microsoft Research
2004Throughput-Delay Trade-Off in Wireless NetworksAbbas El Gamal, Stanford University; et al.
James Mammen, Stanford University
Balaji Prabhakar, Stanford University
Devavrat Shah, Stanford University
2003User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data NetworksSem Borst, Bell Labs
2002Priority Service and Max-Min FairnessPeter Marbach, University of Toronto
2001Mobility increases the capacity of ad-hoc wireless networksMatthias Grossglauser, AT&T Laboratories
David Tse, University of California Berkeley
2000The Chaotic Nature of TCP Congestion ControlAndrás Veres, Ericsson
Miklós Boda, Ericsson Research
1999Bandwidth Sharing: Objectives and AlgorithmsLaurent Massoulié, Microsoft Research
James Robert, France Telecom
1998Effective Bandwidths in Wireless Networks with Multiuser ReceiversDavid Tse, University of California Berkeley
Stephen Hanly, University of Melbourne
1996An algorithm for multicast tree generation in networks with asymmetric linksRam Ramanathan, BBN Technologies
KDD (Data Mining)
2013Simple and Deterministic Matrix SketchingEdo Liberty, Yahoo! Research
2012Searching and Mining Trillions of Time Series Subsequences under Dynamic Time WarpingThanawin Rakthanmanon, University of California Riverside; et al.
Bilson Campana, University of California Riverside
Abdullah Mueen, University of California Riverside
Gustavo Batista, University of São Paulo
Brandon Westover, Brigham and Women's Hospital
Qiang Zhu, University of California Riverside
Jesin Zakaria, University of California Riverside
Eamonn Keogh, University of California Riverside
2011Leakage in Data Mining: Formulation, Detection, and AvoidanceShachar Kaufman, Tel-Aviv University; et al.
Saharon Rosset, Tel-Aviv University
Claudia Perlich, Media6Degrees
2010Large linear classification when data cannot fit in memoryHsiang-Fu Yu, National Taiwan University; et al.
Cho-Jui Hsieh, National Taiwan University
Kai-Wei Chang, National Taiwan University
Chih-Jen Lin, National Taiwan University
Connecting the dots between news articlesDafna Shahaf & Carlos Guestrin, Carnegie Mellon University
2009Collaborative Filtering with Temporal DynamicsYehuda Koren, Yahoo! Research
2008Fastanova: an efficient algorithm for genome-wide association studyXiang Zhang, University of North Carolina at Chapel Hill; et al.
Fei Zou, University of North Carolina at Chapel Hill
Wei Wang, University of North Carolina at Chapel Hill
2007Predictive discrete latent factor models for large scale dyadic dataDeepak Agarwal & Srujana Merugu, Yahoo! Research
2006Training linear SVMs in linear timeThorsten Joachims, Cornell University
2005Graphs over time: densification laws, shrinking diameters and possible explanationsJure Leskovec, Carnegie Mellon University; et al.
Jon Kleinberg, Cornell University
Christos Faloutsos, Carnegie Mellon University
2004A probabilistic framework for semi-supervised clusteringSugato Basu, University of Texas at Austin; et al.
Mikhail Bilenko, University of Texas at Austin
Raymond J. Mooney, University of Texas at Austin
2003Maximizing the spread of influence through a social networkDavid Kempe, Cornell University; et al.
Jon Kleinberg, Cornell University
Éva Tardos, Cornell University
2002Pattern discovery in sequences under a Markov assumptionDarya Chudova & Padhraic Smyth, University of California Irvine
2001Robust space transformations for distance-based operationsEdwin M. Knorr, University of British Columbia; et al.
Raymond T. Ng, University of British Columbia
Ruben H. Zamar, University of British Columbia
2000Hancock: a language for extracting signatures from data streamsCorinna Cortes, AT&T Laboratories; et al.
Kathleen Fisher, AT&T Laboratories
Daryl Pregibon, AT&T Laboratories
Anne Rogers, AT&T Laboratories
1999MetaCost: a general method for making classifiers cost-sensitivePedro Domingos, Universidade Técnica de Lisboa
1998Occam's Two Razors: The Sharp and the BluntPedro Domingos, Universidade Técnica de Lisboa
1997Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Di...Foster Provost & Tom Fawcett, NYNEX Science and Technology
MOBICOM (Mobile)
2013Whole-Home Gesture Recognition Using Wireless SignalsQifan Pu, University of Washington; et al.
Sidhant Gupta, University of Washington
Shyamnath Gollakota, University of Washington
Shwetak Patel, University of Washington
2012Distinguishing Users with Capacitative Touch CommunicationTam Vu, Rutgers University; et al.
Akash Baid, Rutgers University
Simon Gao, Rutgers University
Marco Gruteser, Rutgers University
Richard Howard, Rutgers University
Janne Lindqvist, Rutgers University
Predag Spasojevic, Rutgers University
Jeffrey Walling, Rutgers University
2011Detecting Driver Phone Use Leveraging Car SpeakersJie Yang, Stevens Institute of Technology; et al.
Simon Sdhom, Stevens Institute of Technology
Gayathri Chandrasekaran, Rutgers University
Tam Vu, Stevens Institute of Technology
Hongbo Liu, Stevens Institute of Technology
Nicolae Cecan, Rutgers University
Yingying Chen, Stevens Institute of Technology
Marco Gruteser, Rutgers University
Richard P. Martin, Rutgers University
E-MiLi: Energy-Minimizing Idle Listening in Wireless NetworksXinyu Zhang & Kang G. Shin, University of Michigan
2010The κ factor: inferring protocol performance using inter-link reception correlationKannan Srinivasan, Stanford University; et al.
Mayank Jain, Stanford University
Jung Il Choi, Stanford University
Tahir Azim, Stanford University
Edward S. Kim, University of Southern California
Philip Levis, Stanford University
Bhaskar Krishnamachari, University of Southern California
2009CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data PathVivek Shrivastava, University of Wisconsin; et al.
Nabeel Ahmed, University of Waterloo
Shravan Rayanchu, University of Wisconsin
Suman Banerjee, University of Wisconsin
Srinivasan Keshav, University of Waterloo
Konstantina Papagiannaki, Intel Research
Arunesh Mishra, Google
2008Assessment of Urban-Scale Wireless Networks with a Small Number of MeasurementsJoshua Robinson, Rice University; et al.
Ram Swaminathan, Hewlett-Packard Labs
Edward W. Knightly, Rice University
NSDI (Networking)
2014Software Dataplane VerificationMihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne
2013Embassies: Radically Refactoring the WebJon Howell, Microsoft Research; et al.
Bryan Parno, Microsoft Research
John R. Douceur, Microsoft Research
A Fault-Tolerant Engineered NetworkVincent Liu, University of Washington; et al.
Daniel Halperin, University of Washington
Arvind Krishnamurthy, University of Washington
Thomas Anderson, University of Washington
2012Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingMatei Zaharia, University of California Berkeley; et al.
Mosharaf Chowdhury, University of California Berkeley
Tathagata Das, University of California Berkeley
Ankur Dave, University of California Berkeley
Justin Ma, University of California Berkeley
Murphy McCauley, University of California Berkeley
Michael J. Franklin, University of California Berkeley
Scott Shenker, University of California Berkeley
Ion Stoica, University of California Berkeley
2011Design, Implementation and Evaluation of Congestion Control for Multipath TCPDamon Wischik, University College London; et al.
Costin Raiciu, University College London
Adam Greenhalgh, University College London
Mark Handley, University College London
ServerSwitch: A Programmable and High Performance Platform for Data Center NetworksGuohan Lu, Microsoft Research; et al.
Chuanxiong Guo, Microsoft Research
Yulong Li, Microsoft Research
Zhiqiang Zhou, Tsinghua University
Tong Yuan, Microsoft Research
Haitao Wu, Microsoft Research
Yongqiang Xiong, Microsoft Research
Rui Gao, Microsoft Research
Yongguang Zhang, Microsoft Research
2010Reverse tracerouteEthan Katz-Bassett, University of Washington; et al.
Harsha V. Madhyastha, University of California San Diego
Vijay Kumar Adhikari, University of Minnesota
Colin Scott, University of Washington
Justine Sherry, University of Washington
Peter van Wesep, University of Washington
Thomas Anderson, University of Washington
Arvind Krishnamurthy, University of Washington
2009Sora: High Performance Software Radio Using General Purpose Multi-core ProcessorsKun Tan, Microsoft Research; et al.
Jiansong Zhang, Microsoft Research
Ji Fang, Beijing Jiaotong University
He Liu, Tsinghua University
Yusheng Ye, Tsinghua University
Shen Wang, Tsinghua University
Yongguang Zhang, Microsoft Research
Haitao Wu, Microsoft Research
Wei Wang, Microsoft Research
Geoffrey M. Voelker, University of California San Diego
TrInc: Small Trusted Hardware for Large Distributed SystemsDave Levin, University of Maryland; et al.
John R. Douceur, Microsoft Research
Jacob R. Lorch, Microsoft Research
Thomas Moscibroda, Microsoft Research
2008Remus: High Availability via Asynchronous Virtual Machine ReplicationBrendan Cully, University of British Columbia; et al.
Geoffrey Lefebvre, University of British Columbia
Dutch Meyer, University of British Columbia
Mike Feeley, University of British Columbia
Norm Hutchinson, University of British Columbia
Andrew Warfield, University of British Columbia
Consensus Routing: The Internet as a Distributed SystemJohn P. John, University of Washington; et al.
Ethan Katz-Bassett, University of Washington
Arvind Krishnamurthy, University of Washington
Thomas Anderson, University of Washington
Arun Venkataramani, University of Massachusetts Amherst
2007Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems CodeCharles Killian, University of California San Diego; et al.
James W. Anderson, University of California San Diego
Ranjit Jhala, University of California San Diego
Amin Vahdat, University of California San Diego
2006Experience with an Object Reputation System for Peer-to-Peer FilesharingKevin Walsh & Emin Gün Sirer, Cornell University
Replay Debugging for Distributed ApplicationsDennis Geels, University of California Berkeley; et al.
Gautam Altekar, University of California Berkeley
Scott Shenker, University of California Berkeley
Ion Stoica, University of California Berkeley
2005Detecting BGP Configuration Faults with Static AnalysisNick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology
2004Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Netwo...Philip Levis, University of California Berkeley; et al.
Neil Patel, University of California Berkeley
David Culler, University of California Berkeley
Scott Shenker, University of California Berkeley
OSDI (Operating Systems)
2012Spanner: Google's Globally-Distributed DatabaseJames C. Corbett, Google; et al.
Jeffrey Dean, Google
Michael Epstein, Google
Andrew Fikes, Google
Christopher Frost, Google
JJ Furman, Google
Sanjay Ghemawat, Google
Andrey Gubarev, Google
Christopher Heiser, Google
Peter Hochschild, Google
Wilson Hsieh, Google
Sebastian Kanthak, Google
Eugene Kogan, Google
Hongyi Li, Google
Alexander Lloyd, Google
Sergey Melnik, Google
David Mwaura, Google
David Nagle, Google
Sean Quinlan, Google
Rajesh Rao, Google
Lindsay Rolig, Google
Yasushi Saito, Google
Michal Szymaniak, Google
Christopher Taylor, Google
Ruth Wang, Google
Dale Woodford, Google
2010Efficient System-Enforced Deterministic ParallelismAmittai Aviram, Yale University; et al.
Shu-Chun Weng, Yale University
Sen Hu, Yale University
Bryan Ford, Yale University
The Turtles Project: Design and Implementation of Nested VirtualizationMuli Ben-Yehuda, IBM Research; et al.
Michael D. Day, IBM
Zvi Dubitzky, IBM Research
Michael Factor, IBM Research
Nadav Har'El, IBM Research
Abel Gordon, IBM Research
Anthony Liguori, IBM
Orit Wasserman, IBM Research
Ben-Ami Yassour, IBM Research
2008KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems ProgramsCristian Cadar, Stanford University; et al.
Daniel Dunbar, Stanford University
Dawson Engler, Stanford University
Difference Engine: Harnessing Memory Redundancy in Virtual MachinesDiwaker Gupta, University of California San Diego; et al.
Sangmin Lee, University of Texas at Austin
Michael Vrable, University of California San Diego
Stefan Savage, University of California San Diego
Alex C. Snoeren, University of California San Diego
George Varghese, University of California San Diego
Geoffrey M. Voelker, University of California San Diego
Amin Vahdat, University of California San Diego
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Lan...Yuan Yu, Microsoft Research; et al.
Michael Isard, Microsoft Research
Dennis Fetterly, Microsoft Research
Mihai Budiu, Microsoft Research
Úlfar Erlingsson, Microsoft Research
Pradeep Kumar Gunda, Microsoft Research
Jon Currey, Microsoft Research
2006Bigtable: A Distributed Storage System for Structured DataFay Chang, Google; et al.
Jeffrey Dean, Google
Sanjay Ghemawat, Google
Wilson C. Hsieh, Google
Deborah A. Wallach, Google
Mike Burrows, Google
Tushar Chandra, Google
Andrew Fikes, Google
Robert E. Gruber, Google
Rethink the SyncEdmund B. Nightingale, University of Michigan; et al.
Kaushik Veeraraghavan, University of Michigan
Peter M. Chen, University of Michigan
Jason Flinn, University of Michigan
2004Using Model Checking to Find Serious File System ErrorsJunfeng Yang, Stanford University; et al.
Paul Twohey, Stanford University
Dawson Engler, Stanford University
Madanlal Musuvathi, Microsoft Research
Recovering Device DriversMichael M. Swift, University of Washington; et al.
Muthukaruppan Annamalai, University of Washington
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington
2002Memory Resource Management in VMware ESX ServerCarl A. Waldspurger, VMware
2000Checking System Rules Using System-Specific, Programmer-Written Compiler ExtensionsDawson Engler, Stanford University; et al.
Benjamin Chelf, Stanford University
Andy Chou, Stanford University
Seth Hallem, Stanford University
1999IO-Lite: A Unified I/O Buffering and Caching SystemVivek S. Pai, Rice University; et al.
Peter Druschel, Rice University
Willy Zwaenepoel, Rice University
1996Automatic Compiler-Inserted I/O Prefetching for Out-of-Core ApplicationsTodd C. Mowry, University of Toronto; et al.
Angela K. Demke, University of Toronto
Orran Krieger, University of Toronto
Safe Kernel Extensions Without Run-Time CheckingGeorge C. Necula & Peter Lee, Carnegie Mellon University
PLDI (Programming Languages)
2013Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many ...Sriram Sankaranarayanan, University of Colorado; et al.
Aleksandar Chakarov, University of Colorado
Sumit Gulwani, Microsoft Research
A General Constraint-centric Scheduling Framework for Spatial ArchitecturesTony Nowatzki, University of Wisconsin; et al.
Michael Sartin-Tarm, University of Wisconsin
Lorenzo De Carli, University of Wisconsin
Karthikeyan Sankaralingam, University of Wisconsin
Cristian Estan, Broadcom
Behnam Robatmili, Qualcomm Research
Reconciling Exhaustive Pattern Matching with ObjectsChinawat Isradisaikul & Andrew C. Myers, Cornell University
CLAP: Recording Local Executions to Reproduce Concurrency FailuresJeff Huang, Hong Kong University of Science and Technology; et al.
Charles Zhang, Hong Kong University of Science and Technology
Julian Dolby, IBM Research
2012Concurrent Data Representation SynthesisPeter Hawkins, Stanford University; et al.
Alex Aiken, Stanford University
Kathleen Fisher, Tufts University
Martin Rinard, Massachusetts Institute of Technology
Mooly Sagiv, Tel-Aviv University
2011Data Representation SynthesisPeter Hawkins, Stanford University; et al.
Alex Aiken, Stanford University
Kathleen Fisher, Tufts University
Martin Rinard, Massachusetts Institute of Technology
Mooly Sagiv, Tel-Aviv University
2010Safe to the Last Instruction: Automated Verification of a Type-Safe Operating SystemJean Yang, Massachusetts Institute of Technology
Chris Hawblitzel, Microsoft Research
2009Binary Analysis for Measurement and Attribution of Program PerformanceNathan Tallent, Rice University; et al.
John Mellor-Crummey, Rice University
Michael Fagan, Rice University
2007Fault-tolerant Typed Assembly LanguageFrances Perry, Princeton University; et al.
Lester Mackey, Princeton University
George A. Reis, Princeton University
Jay Ligatti, University of South Florida
David I. August, Princeton University
David Walker, Princeton University
The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of CodeBen Hardekopf & Calvin Lin, University of Texas at Austin
2005Automatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the HeapChris Lattner & Vikram Adve, University of Illinois at Urbana-Champaign
Programming by Sketching for Bit-Streaming ProgramsArmando Solar-Lezama, University of California Berkeley; et al.
Rodric Rabbah, Massachusetts Institute of Technology
Rastislav Bodik, University of California Berkeley
Kemal Ebcioğlu, IBM Research
2004Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision DiagramsJohn Whaley & Monica S. Lam, Stanford University
2003Automatically Proving the Correctness of Compiler OptimizationsSorin Lerner, University of Washington; et al.
Todd Millstein, University of Washington
Craig Chambers, University of Washington
2000Dynamo: a transparent dynamic optimization systemVasanth Bala, Hewlett-Packard Labs; et al.
Evelyn Duesterwald, Hewlett-Packard Labs
Sanjeev Banerjia, InCert
1999Whole program pathsJames R. Larus, Microsoft Research
PODS (Databases)
2014Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Co...Tom J. Ameloot, Hasselt University; et al.
Bas Ketsman, Hasselt University
Frank Neven, Hasselt University
Daniel Zinn, LogicBlox
2013Verification of database-driven systems via amalgamationMikołaj Bojańczyk, University of Warsaw; et al.
Luc Segoufin, INRIA
Szymon Toruńczyk, University of Warsaw
2012Worst-case Optimal Join AlgorithmsHung Q. Ngo, University at Buffalo; et al.
Ely Porat, Bar-Ilan University
Christopher Ré, University of Wisconsin
Atri Rudra, University at Buffalo
2011Data Exchange Beyond Complete DataMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.
Jorge Pérez, Universidad de Chile
Juan Reutter, University of Edinburgh
2010An Optimal Algorithm for the Distinct Elements ProblemDaniel M. Kane, Harvard University; et al.
Jelani Nelson, Massachusetts Institute of Technology
David P. Woodruff, IBM Research
2009Size and Treewidth Bounds for Conjunctive QueriesGeorg Gottlob, University of Oxford; et al.
Stephanie Lee, University of Oxford
Gregory Valient, University of California Berkeley
2008Estimating PageRank on Graph StreamsAtish Das Sarma, Georgia Institute of Technology; et al.
Sreenivas Gollapudi, Microsoft Research
Rina Panigrahy, Microsoft Research
2007Generalized Hypertree Decompositions: NP-Hardness and Tractable VariantsGeorg Gottlob, University of Oxford; et al.
Zoltan Miklos, University of Oxford
Thomas Schwentick, Universität Dortmund
2006Two-variable logic on data trees and XML reasoningMikolaj Bojanczyk, Warsaw University; et al.
Claire David, Université Paris
Anca Muscholl, Université Paris
Thomas Schwentick, Universität Dortmund
Luc Segoufin, Université Paris
2005On the complexity of division and set joins in the relational algebraDirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum
XML data exchange: consistency and query answeringMarcelo Arenas & Leonid Libkin, University of Toronto
2004Conditional XPath, the first order complete XPath dialectMaarten Marx, University of Amsterdam
2003An Information-Theoretic Approach to Normal Forms for Relational and XML DataMarcelo Arenas & Leonid Libkin, University of Toronto
2002Monadic Datalog and the Expressive Power of Languages for Web Information ExtractionGeorg Gottlob & Christoph Koch, Technische Universität Wien
2001Optimal aggregation algorithms for middlewareRonald Fagin, IBM Research; et al.
Amnon Lotem, University of Maryland
Moni Naor, Weizmann Institute of Science
2000Auditing Boolean attributesJon Kleinberg, Cornell University; et al.
Christos Papadimitriou, University of California Berkeley
Prabhakar Raghavan, IBM Research
1999Exact and approximate aggregation in constraint query languagesMichael Benefikt & Leonid Libkin, Bell Labs
1998A lower bound theorem for indexing schemes and its application to multidimensional range queriesVasilis Samoladas & Daniel P. Miranker, University of Texas at Austin
Expressiveness of structured document query languages based on attribute grammarsFrank Neven & Jan Van den Bussche, Limburgs Universitair Centrum
1997On the Complexity of Database QueriesChristos H. Papadimitriou, University of California Berkeley
Mihalis Yannakakis, Bell Labs
S&P (Security and Privacy)
2014Bootstrapping Privacy Compliance in Big Data SystemsShayak Sen, Carnegie Mellon University; et al.
Saikat Guha, Microsoft Research
Anupam Datta, Carnegie Mellon University
Sriram K. Rajamani, Microsoft Research
Janice Tsai, Microsoft Research
Jeannette M. Wing, Microsoft Research
Secure Multiparty Computations on BitCoin Marcin AndryMarcin Andrychowicz, University of Warsaw; et al.
Stefan Dziembowski, University of Warsaw
Daniel Malinowski, University of Warsaw
Łukasz Mazurek, University of Warsaw
2013Pinocchio: Nearly Practical Verifiable ComputationBryan Parno, Microsoft Research; et al.
Craig Gentry, IBM Research
Jon Howell, Microsoft Research
Mariana Raykova, IBM Research
2012Don't Trust Satellite Phones: A Security Analysis of Two Satphone StandardsBenedikt Driessen, Ruhr-Universität Bochum; et al.
Ralf Hund, Ruhr-Universität Bochum
Carsten Willems, Ruhr-Universität Bochum
Christof Paar, Ruhr-Universität Bochum
Thorsten Holz, Ruhr-Universität Bochum
2011Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iksAndrew M. White, University of North Carolina at Chapel Hill; et al.
Austin Matthews, University of North Carolina at Chapel Hill
Kevin Snow, University of North Carolina at Chapel Hill
Fabian Monrose, University of North Carolina at Chapel Hill
2010SCiFI - A System for Secure Face IdentificationMargarita Osadchy, University of Haifa; et al.
Benny Pinkas, University of Haifa
Ayman Jarrous, University of Haifa
Boaz Moskovich, University of Haifa
2009Native Client: A Sandbox for Portable, Untrusted x86 Native CodeBennet Yee, Google; et al.
David Sehr, Google
Gregory Dardyk, Google
Bradley Chen, Google
Robert Muth, Google
Tavis Ormandy, Google
Shiki Okasaka, Google
Neha Narula, Google
Nicholas Fullagar, Google
2008Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power DefensesDaniel Halperin, University of Washington; et al.
Thomas S. Heydt-Benjamin, University of Massachusetts Amherst
Benjamin Ransford, University of Massachusetts Amherst
Shane S. Clark, University of Massachusetts Amherst
Benessa Defend, University of Massachusetts Amherst
Will Morgan, University of Massachusetts Amherst
Kevin Fu, University of Massachusetts Amherst
Tadayoshi Kohno, University of Washington
William H. Maisel, Harvard University
SIGCOMM (Networking)
2013Ambient Backscatter: Wireless Communication Out of Thin AirVincent Liu, University of Washington; et al.
Aaron Parks, University of Washington
Vamsi Talla, University of Washington
Shyamnath Gollakota, University of Washington
David Wetherall, University of Washington
Joshua R. Smith, University of Washington
2012Multi-Resource Fair Queueing for Packet ProcessingAli Ghodsi, University of California Berkeley; et al.
Vyas Sekar, Intel Research
Matei Zaharia, University of California Berkeley
Ion Stoica, University of California Berkeley
2011They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical DevicesShyamnath Gollakota, Massachusetts Institute of Technology; et al.
Haitham Hassanieh, Massachusetts Institute of Technology
Benjamin Ransford, University of Massachusetts Amherst
Dina Katabi, Massachusetts Institute of Technology
Kevin Fu, University of Massachusetts Amherst
2010Efficient Error Estimating Coding: Feasibility and ApplicationsBinbin Chen, National University of Singapore; et al.
Ziling Chou, National University of Singapore
Yuda Zhao, National University of Singapore
Haifeng Yu, National University of Singapore
2009White Space Networking with Wi-Fi like ConnectivityParamvir Bahl, Microsoft Research; et al.
Ranveer Chandra, Microsoft Research
Thomas Moscibroda, Microsoft Research
Rohan Murty, Harvard University
Matt Welsh, Harvard University
2008ZigZag Decoding: Combating Hidden Terminals in Wireless NetworksShyamnath Gollakota & Dina Katabi, Massachusetts Institute of Technology
SIGIR (Information Retrieval)
2014Partitioned Elias-Fano IndexesGiuseppe Ottaviano, Istituto di Scienza e Tecnologie dell'Informazione
Rossano Venturini, Università di Pisa
2013Beliefs and Biases in Web SearchRyen W. White, Microsoft Research
2012Time-Based Calibration of Effectiveness MeasuresMark Smucker & Charles Clarke, University of Waterloo
2011Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction DataMikhail Ageev, Moscow State University; et al.
Qi Guo, Emory University
Dmitry Lagun, Emory University
Eugene Agichtein, Emory University
2010Assessing the Scenic Route: Measuring the Value of Search Trails in Web LogsRyen W. White, Microsoft Research
Jeff Huang, University of Washington
2009Sources of evidence for vertical selectionJaime Arguello, Carnegie Mellon University; et al.
Fernando Diaz, Yahoo! Research
Jamie Callan, Carnegie Mellon University
Jean-Francois Crespo, Yahoo! Research
2008Algorithmic Mediation for Collaborative Exploratory SearchJeremy Pickens, FX Palo Alto Lab; et al.
Gene Golovchinsky, FX Palo Alto Lab
Chirag Shah, University of North Carolina at Chapel Hill
Pernilla Qvarfordt, FX Palo Alto Lab
Maribeth Back, FX Palo Alto Lab
2007Studying the Use of Popular Destinations to Enhance Web Search InteractionRyen W. White, Microsoft Research; et al.
Mikhail Bilenko, Microsoft Research
Silviu Cucerzan, Microsoft Research
2006Minimal Test Collections for Retrieval EvaluationBen Carterette, University of Massachusetts Amherst; et al.
James Allan, University of Massachusetts Amherst
Ramesh Sitaraman, University of Massachusetts Amherst
2005Learning to estimate query difficulty: including applications to missing content detection and dis...Elad Yom-Tov, IBM Research; et al.
Shai Fine, IBM Research
David Carmel, IBM Research
Adam Darlow, IBM Research
2004A Formal Study of Information Retrieval HeuristicsHui Fang, University of Illinois at Urbana-Champaign; et al.
Tao Tao, University of Illinois at Urbana-Champaign
ChengXiang Zhai, University of Illinois at Urbana-Champaign
2003Re-examining the potential effectiveness of interactive query expansionIan Ruthven, University of Strathclyde
2002Novelty and redundancy detection in adaptive filteringYi Zhang, Carnegie Mellon University; et al.
Jamie Callan, Carnegie Mellon University
Thomas Minka, Carnegie Mellon University
2001Temporal summaries of new topicsJames Allan, University of Massachusetts Amherst; et al.
Rahul Gupta, University of Massachusetts Amherst
Vikas Khandelwal, University of Massachusetts Amherst
2000IR evaluation methods for retrieving highly relevant documentsKalervo Järvelin & Jaana Kekäläinen, University of Tampere
1999Cross-language information retrieval based on parallel texts and automatic mining of parallel text...Jian-Yun Nie, Université de Montréal; et al.
Michel Simard, Université de Montréal
Pierre Isabelle, Université de Montréal
Richard Durand, Université de Montréal
1998A theory of term weighting based on exploratory data analysisWarren R. Greiff, University of Massachusetts Amherst
1997Feature selection, perceptron learning, and a usability case study for text categorizationHwee Tou Ng, DSO National Laboratories; et al.
Wei Boon Goh, Ministry of Defence
Kok Leong Low, Ministry of Defence
1996Retrieving spoken documents by combining multiple index sourcesGareth Jones, University of Cambridge; et al.
Jonathan Foote, University of Cambridge
Karen Spärck Jones, University of Cambridge
Steve Young, University of Cambridge
SIGMETRICS (Performance)
2014Concave switching in single and multihop networksNeil Walton, University of Amsterdam
2013Queueing System Topologies with Limited FlexibilityJohn Tsitsiklis & Kuang Xu, Massachusetts Institute of Technology
2012Temperature management in data centers: why some (might) like it hotNosayba El-Sayed, University of Toronto; et al.
Ioan Stefanovici, University of Toronto
George Amvrosiadis, University of Toronto
Andy A. Hwang, University of Toronto
Bianca Schroeder, University of Toronto
2011Topology Discovery of Sparse Random Graphs With Few ParticipantsAnimashree Anandkumar, University of California Irvine; et al.
Avinatan Hassidim, Google
Jonathan Kelner, Massachusetts Institute of Technology
2010Load balancing via random local search in closed and open systemsAyalvadi Ganesh, University of Bristol; et al.
Sarah Lilienthal, Cambridge University
D. Manjunath, Indian Institute of Technology
Alexandre Proutière, Microsoft Research
Florian Simatos, INRIA
2009The Age of Gossip: Spatial Mean Field RegimeAugustin Chaintreau, Technicolor; et al.
Jean-Yves Le Boudec, École Polytechnique Fédérale de Lausanne
Nikodin Ristanovic, École Polytechnique Fédérale de Lausanne
2008Counter Braids: A Novel Counter Architecture for Per-Flow MeasurementYi Lu, Stanford University; et al.
Andrea Montanari, Stanford University
Balaji Prabhakar, Stanford University
Sarang Dharmapurikar, Cisco Systems
Abdul Kabbani, Stanford University
2007Modeling the Relative Fitness of StorageMichael P. Mesnier, Intel; et al.
Matthew Wachs, Carnegie Mellon University
Raja R. Sambasivan, Carnegie Mellon University
Alice X. Zheng, Carnegie Mellon University
Gregory R. Ganger, Carnegie Mellon University
2006Maximizing throughput in wireless networks via gossipingEytan Modiano, Massachusetts Institute of Technology; et al.
Devavrat Shah, Massachusetts Institute of Technology
Gil Zussman, Massachusetts Institute of Technology
2005Coupon replication systemsLaurent Massoulié & Milan Vojnović, Microsoft Research
2004On performance bounds for the integration of elastic and adaptive streaming flowsThomas Bonald & Alexandre Proutiere, France Telecom
1996Supporting stored video: reducing rate variability and end-to-end resource requirements through op...James D. Salehi, University of Massachusetts Amherst; et al.
Zhi-Li Zhang, University of Massachusetts Amherst
James F. Kurose, University of Massachusetts Amherst
Don Towsley, University of Massachusetts Amherst
Exploiting process lifetime distributions for dynamic load balancingMor Harchol-Balter & Allen B. Downey, University of California Berkeley
SIGMOD (Databases)
2014Materialization Optimizations for Feature Selection WorkloadsCe Zhang, Stanford University; et al.
Arun Kumar, University of Wisconsin
Christopher Ré, Stanford University
2013Massive Graph TriangulationXiaocheng Hu, The Chinese University of Hong Kong; et al.
Yufei Tao, The Chinese University of Hong Kong
Chin-Wan Chung, KAIST
2012High-Performance Complex Event Processing over XML StreamsBarzan Mozafari, Massachusetts Institute of Technology; et al.
Kai Zeng, University of California Los Angeles
Carlo Zaniolo, University of California Los Angeles
2011Entangled Queries: Enabling Declarative Data-Driven CoordinationNitin Gupta, Cornell University; et al.
Lucja Kot, Cornell University
Sudip Roy, Cornell University
Gabriel Bender, Cornell University
Johannes Gehrke, Cornell University
Christoph Koch, École Polytechnique Fédérale de Lausanne
2010FAST: fast architecture sensitive tree search on modern CPUs and GPUsChangkyu Kim, Intel; et al.
Jatin Chhugani, Intel
Nadathur Satish, Intel
Eric Sedlar, Oracle
Anthony D. Nguyen, Intel
Tim Kaldewey, Oracle
Victor W. Lee, Intel
Scott A. Brandt, University of California Santa Cruz
Pradeep Dubey, Intel
2009Generating example data for dataflow programsChristopher Olston, Yahoo! Research; et al.
Shubham Chopra, Yahoo! Research
Utkarsh Srivastava, Yahoo! Research
2008Serializable isolation for snapshot databasesMichael J. Cahill, University of Sydney; et al.
Uwe Röhm, University of Sydney
Alan D. Fekete, University of Sydney
Scalable Network Distance Browsing in Spatial DatabasesHanan Samet, University of Maryland; et al.
Jagan Sankaranarayanan, University of Maryland
Houman Alborzi, University of Maryland
2007Compiling mappings to bridge applications and databasesSergey Melnik, Microsoft Research; et al.
Atul Adya, Microsoft
Philip A. Bernstein, Microsoft Research
Scalable Approximate Query Processing with the DBO EngineChristopher Jermaine, University of Florida; et al.
Subramanian Arumugam, University of Florida
Abhijit Pol, University of Florida
Alin Dobra, University of Florida
2006To search or to crawl?: towards a query optimizer for text-centric tasksPanagiotis G. Ipeirotis, New York University; et al.
Eugene Agichtein, Microsoft Research
Pranay Jain, Columbia University
Luis Gravano, Columbia University
2004Indexing spatio-temporal trajectories with Chebyshev polynomialsYuhan Cai & Raymond T. Ng, University of British Columbia
2003Spreadsheets in RDBMS for OLAPAndrew Witkowski, Oracle; et al.
Srikanth Bellakonda, Oracle
Tolga Bozkaya, Oracle
Gregory Dorman, Oracle
Nathan Folkert, Oracle
Abhinav Gupta, Oracle
Lei Shen, Oracle
Sankar Subramanian, Oracle
2001Locally adaptive dimensionality reduction for indexing large time series databasesEamonn Keogh, University of California Irvine; et al.
Kaushik Chakrabarti, University of California Irvine
Michael Pazzani, University of California Irvine
Sharad Mehrotra, University of California Irvine
2000XMill: an efficient compressor for XML dataHartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories
1999DynaMat: a dynamic view management system for data warehousesYannis Kotidis & Nick Roussopoulos, University of Maryland
1998Efficient transparent application recovery in client-server information systemsDavid Lomet & Gerhard Weikum, Microsoft Research
Integrating association rule mining with relational database systems: alternatives and implicationsSunita Sarawagi, IBM Research; et al.
Shiby Thomas, University of Florida
Rakesh Agrawal, IBM Research
1997Fast parallel similarity search in multimedia databasesStefan Berchtold, University of Munich; et al.
Christian Böml, University of Munich
Bernhard Braunmüller, University of Munich
Daniel A. Keim, University of Munich
Hans-Peter Kriegel, University of Munich
1996Implementing data cubes efficientlyVenky Harinarayan, Stanford University; et al.
Anand Rajaraman, Stanford University
Jeffrey D. Ullman, Stanford University
SODA (Theory)
2014Polynomiality for Bin Packing with a Constant Number of Item TypesMichel X. Goemans & Thomas Rothvosß, Massachusetts Institute of Technology
An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommod...Jonathan A. Kelner, Massachusetts Institute of Technology; et al.
Yin Tat Lee, Massachusetts Institute of Technology
Lorenzo Orecchia, Massachusetts Institute of Technology
Aaron Sidford, Massachusetts Institute of Technology
2013A Simple Algorithm for the Graph Minor Decomposition - Logic meets Structural Graph TheoryMartin Grohe, RWTH Aachen University; et al.
Ken-ichi Kawarabayashi, National Institute of Informatics
Bruce Reed, McGill University
Dynamic graph connectivity in polylogarithmic worst case timeBruce M. Kapron, University of Victoria; et al.
Valerie King, University of Victoria
Ben Mountjoy, University of Victoria
2012Computing all maps into a sphereMartin Čadek, Masaryk University; et al.
Marek Krčál, Charles University
Jiří Matoušel, Charles University
Francis Sergeraert, Université Joseph Fourier
Lukáš Vokřínel, Masaryk University
Uli Wagner, Charles University
2011An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss TransformNir Ailon, Technion
Edo Liberty, Yahoo! Research
2010An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman ProblemArash Asadpour, Stanford University; et al.
Michel X. Goemans, Massachusetts Institute of Technology
Aleksander Mądry, Massachusetts Institute of Technology
Shayan Oveis Gharan, Stanford University
Amin Saberi, Stanford University
2009Natural AlgorithmsBernard Chazelle, Princeton University
SOSP (Operating Systems)
2013Towards optimization-safe systems: analyzing the impact of undefined behaviorXi Wang, Massachusetts Institute of Technology; et al.
Nickolai Zeldovich, Massachusetts Institute of Technology
M. Frans Kaashoek, Massachusetts Institute of Technology
Armando Solar-Lezama, Massachusetts Institute of Technology
Naiad: A Timely Dataflow SystemDerek G. Murray, Microsoft Research; et al.
Frank McSherry, Microsoft Research
Rebecca Isaacs, Microsoft Research
Michael Isard, Microsoft Research
Paul Barham, Microsoft Research
Martíın Abadi, Microsoft Research
The Scalable Commutativity Rule: Designing Scalable Software for Multicore ProcessorsAustin T. Clements, Massachusetts Institute of Technology; et al.
M. Frans Kaashoek, Massachusetts Institute of Technology
Nickolai Zeldovich, Massachusetts Institute of Technology
Robert T. Morris, Massachusetts Institute of Technology
Eddie Kohler, Harvard University
2011A File is Not a File: Understanding the I/O Behavior of Apple Desktop ApplicationsTyler Harter, University of Wisconsin; et al.
Chris Dragga, University of Wisconsin
Michael Vaughn, University of Wisconsin
Andrea C. Arpaci-Dusseau, University of Wisconsin
Remzi H. Arpaci-Dusseau, University of Wisconsin
Cells: A Virtual Mobile Smartphone ArchitectureJeremy Andrus, Columbia University; et al.
Christoffer Dall, Columbia University
Alexander Van't Hof, Columbia University
Oren Laadan, Columbia University
Jason Nieh, Columbia University
2009FAWN: A Fast Array of Wimpy NodesDavid G. Andersen, Carnegie Mellon University; et al.
Jason Franklin, Carnegie Mellon University
Michael Kaminsky, Intel Research
Amar Phanishayee, Carnegie Mellon University
Lawrence Tan, Carnegie Mellon University
Vijay Vasudevan, Carnegie Mellon University
seL4: Formal Verification of an OS KernelGerwin Klein, NICTA; et al.
Kevin Elphinstone, NICTA
Gernot Heiser, NICTA
June Andronick, NICTA
David Cock, NICTA
Philip Derrin, NICTA
Dhammika Elkaduwe, NICTA
Kai Engelhardt, NICTA
Rafal Kolanski, NICTA
Michael Norrish, NICTA
Thomas Sewell, NICTA
Harvey Tuch, NICTA
Simon Winwood, NICTA
RouteBricks: Exploiting Parallelism to Scale Software RoutersMihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al.
Norbert Egi, Lancaster University
Katerina Argyraki, École Polytechnique Fédérale de Lausanne
Byung-Gon Chun, Intel Research
Kevin Fall, Intel Research
Gianluca Iannaccone, Intel Research
Allan Knies, Intel Research
Maziar Manesh, Intel Research
Sylvia Ratnasamy, Intel Research
2007Zyzzyva: speculative byzantine fault toleranceRamakrishna Kotla, University of Texas at Austin; et al.
Lorenzo Alvisi, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Allen Clement, University of Texas at Austin
Edmund Wong, University of Texas at Austin
Sinfonia: a new paradigm for building scalable distributed systemsMarcos K. Aguilera, Hewlett-Packard Labs; et al.
Arif Merchant, Hewlett-Packard Labs
Mehul Shah, Hewlett-Packard Labs
Alistair Veitch, Hewlett-Packard Labs
Christos Karamanolis, VMware
Secure Web Applications via Automatic PartitioningStephen Chong, Cornell University; et al.
Jed Liu, Cornell University
Andrew C. Myers, Cornell University
Xin Qi, Cornell University
K. Vikram, Cornell University
Lantian Zheng, Cornell University
Xin Zheng, Cornell University
2005Speculative Execution in a Distributed File SystemEdmund B. Nightingale, University of Michigan; et al.
Peter M. Chen, University of Michigan
Jason Flinn, University of Michigan
BAR Tolerance for Cooperative ServicesAmitanand S. Aiyer, University of Texas at Austin; et al.
Lorenzo Alvisi, University of Texas at Austin
Allen Clement, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Jean-Philippe Martin, University of Texas at Austin
Carl Porth, University of Texas at Austin
Rx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, University of Illinois at Urbana-Champaign; et al.
Joseph Tucek, University of Illinois at Urbana-Champaign
Jagadeesan Sundaresan, University of Illinois at Urbana-Champaign
Yuanyuan Zhou, University of Illinois at Urbana-Champaign
Vigilante: End-to-End Containment of Internet WormsManuel Costa, University of Cambridge; et al.
Jon Crowcroft, University of Cambridge
Miguel Castro, Microsoft Research
Antony Rowstron, Microsoft Research
Lidong Zhou, Microsoft Research
Lintao Zhang, Microsoft Research
Paul Barham, Microsoft Research
2003Backtracking intrusionsSamuel T. King & Peter M. Chen, University of Michigan
Preserving peer replicas by rate-limited sampled votingPetros Maniatis, Stanford University; et al.
David S. H. Rosenthal, Stanford University
Mema Roussopoulos, Stanford University
Mary Baker, Stanford University
TJ Giuli, Stanford University
Yanto Muliadi, Stanford University
Improving the Reliability of Commodity Operating SystemsMichael M. Swift, University of Washington; et al.
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington
2001BASE: using abstraction to improve fault toleranceRodrigo Rodrigues, Massachusetts Institute of Technology; et al.
Miguel Castro, Microsoft Research
Barbara Liskov, Massachusetts Institute of Technology
Untrusted hosts and confidentiality: secure program partitioningSteve Zdancewic, Cornell University; et al.
Lantian Zheng, Cornell University
Nathaniel Nystrom, Cornell University
Andrew C. Myers, Cornell University
1999Cellular Disco: resource management using virtual clusters on shared-memory multiprocessorsKinshuk Govil, Stanford University; et al.
Dan Teodosiu, Hewlett-Packard Labs
Yongqiang Huang, Stanford University
Mendel Rosenblum, Stanford University
Soft timers: efficient microsecond software timer support for network processingMohit Aron & Peter Druschel, Rice University
The Click modular routerRobert Morris, Massachusetts Institute of Technology; et al.
Eddie Kohler, Massachusetts Institute of Technology
John Jannotti, Massachusetts Institute of Technology
M. Frans Kaashoek, Massachusetts Institute of Technology
Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail se...Yasushi Saito, University of Washington; et al.
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington
1997Continuous profiling: where have all the cycles gone?Jennifer M. Anderson, Digital Equipment Corporation; et al.
Lance M. Berc, Digital Equipment Corporation
Jeffrey Dean, Digital Equipment Corporation
Sanjay Ghemawat, Digital Equipment Corporation
Monika R. Henzinger, Digital Equipment Corporation
Shun-Tak A. Leung, Digital Equipment Corporation
Richard L. Sites, Digital Equipment Corporation
Mark T. Vandevoorde, Digital Equipment Corporation
Carl A. Waldspurger, Digital Equipment Corporation
William E. Weihl, Digital Equipment Corporation
Disco: running commodity operating systems on scalable multiprocessorsEdouard Bugnion, Stanford University; et al.
Scott Devine, Stanford University
Mendel Rosenblum, Stanford University
Eraser: a dynamic data race detector for multithreaded programsStefan Savage, University of Washington; et al.
Michael Burrows, Digital Equipment Corporation
Greg Nelson, Digital Equipment Corporation
Patrick Sobalvarro, Digital Equipment Corporation
Thomas Anderson, University of California Berkeley
STOC (Theory)
2014The matching polytope has exponential extension complexityThomas Rothvosß, Massachusetts Institute of Technology
2013Approximation Resistance from Pairwise Independent SubgroupsSiu On Chan, University of California Berkeley
Low Rank Approximation and Regression in Input Sparsity TimeKenneth L. Clarkson & David P. Woodruff, IBM Research
2012Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower BoundsSamuel Fiorini, Université libre de Bruxelles; et al.
Serge Massar, Université libre de Bruxelles
Sebastian Pokutta, Universität Erlangen Nürnberg
Hans Tiwary, Université libre de Bruxelles
Ronald de Wolf, Centrum Wiskunde & Informatica
The Cell Probe Complexity of Dynamic Range CountingKasper Larsen, Aarhus University
2011Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphsPaul Christiano, Massachusetts Institute of Technology; et al.
Jonathan A. Kelner, Massachusetts Institute of Technology
Aleksander Mądry, Massachusetts Institute of Technology
Daniel A. Spielman, Yale University
Shang-Hua Teng, University of Southern California
Subexponential lower bounds for randomized pivoting rules for the simplex algorithmOliver Friedmann, University of Munich; et al.
Thomas Dueholm Hansen, Aarhus University
Uri Zwick, Tel-Aviv University
2010An improved LP-based approximation for steiner treeJaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al.
Fabrizio Grandoni, University of Tor Vergata
Thomas Rothvoß, École Polytechnique Fédérale de Lausanne
Laura Sanità, École Polytechnique Fédérale de Lausanne
QIP = PSPACERahul Jain, National University of Singapore; et al.
Zhengfeng Ji, Perimeter Institute for Theoretical Physics
Sarvagya Upadhyay, University of Waterloo
John Watrous, University of Waterloo
2009A constructive proof of the Lovász local lemmaRobin A. Moser, ETH Zurich
Public-Key Cryptosystems from the Worst-Case Shortest Vector ProblemChris Peikert, SRI International
2008Optimal algorithms and inapproximability results for every CSP?Prasad Raghavendra, University of Washington
Optimal hierarchical decompositions for congestion minimization in networksHarald Räcke, University of Warwick
2007Faster integer multiplicationMartin Fürer, Pennsylvania State University
Towards 3-query locally decodable codes of subexponential lengthSergey Yekhanin, Massachusetts Institute of Technology
2006The PCP theorem by gap amplificationIrit Dinur, Hebrew University
2005Undirected ST-connectivity in log-spaceOmer Reingold, Weizmann Institute of Science
2004Multi-linear formulas for permanent and determinant are of super-polynomial sizeRan Raz, Weizmann Institute of Science
Expander flows, geometric embeddings and graph partitioningSanjeev Arora, Princeton University; et al.
Satish Rao, University of California Berkeley
Umesh Vazirani, University of California Berkeley
2003Derandomizing polynomial identity tests means proving circuit lower boundsValentine Kabanets & Russell Impagliazzo, University of California San Diego
New lattice-based cryptographic constructionsOded Regev, Tel-Aviv University
UIST (User Interface)
2013PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing InterfacesLining Yao, Massachusetts Institute of Technology; et al.
Ryuma Niiyama, Massachusetts Institute of Technology
Jifei Ou, Massachusetts Institute of Technology
Sean Follmer, Massachusetts Institute of Technology
Clark Della Silva, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology
Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic SensingMakoto Ono, University of Tsukuba; et al.
Buntarou Shizuki, University of Tsukuba
Jiro Tanaka, University of Tsukuba
Fiberio: A Touchscreen that Senses FingerprintsChristian Holz & Patrick Baudisch, Hasso Plattner Institute
2012CrowdScape: interactively visualizing user behavior and outputJeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University
Cliplets: juxtaposing still and dynamic imageryNeel Joshi, Microsoft Research; et al.
Sisil Mehta, Georgia Institute of Technology
Steven Drucker, Microsoft Research
Eric Stollnitz, Microsoft Research
Hugues Hoppe, Microsoft Research
Matt Uyttendaele, Microsoft
Michael Cohen, Microsoft Research
Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Chang...Sean Follmer, Massachusetts Institute of Technology; et al.
Daniel Leithinger, Massachusetts Institute of Technology
Alex Olwal, Massachusetts Institute of Technology
Nadia Cheng, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology
2011SideBySide: Ad-hoc Multi-user Interaction with Handheld ProjectorsKarl D.D. Willis, Carnegie Mellon University; et al.
Ivan Poupyrev, Disney Research
Scott E. Hudson, Carnegie Mellon University
Moshe Mahler, Disney Research
2010VizWiz: nearly real-time answers to visual questionsJeffrey P. Bigham, University of Rochester; et al.
Chandrika Jayant, University of Washington
Hanjie Ji, University of Rochester
Greg Little, Massachusetts Institute of Technology
Andrew Miller, University of Central Florida
Robert C. Miller, Massachusetts Institute of Technology
Robin Miller, University of Rochester
Aubrey Tatarowicz, Massachusetts Institute of Technology
Brandyn White, University of Maryland
Samual White, University of Rochester
Tom Yeh, University of Maryland
2009Mouse 2.0: Multi-touch meets the MouseNicolas Villar, Microsoft Research; et al.
Shahram Izadi, Microsoft Research
Dan Rosenfeld, Microsoft
Hrvoje Benko, Microsoft Research
John Helmes, Microsoft Research
Jonathan Westhues, Microsoft Research
Steve Hodges, Microsoft Research
Eyal Ofek, Microsoft
Alex Butler, Microsoft Research
Xiang Cao, Microsoft Research
Billy Chen, Microsoft
2008Bringing Physics to the SurfaceAndrew D. Wilson, Microsoft Research; et al.
Shahram Izadi, Microsoft Research
Otmar Hilliges, Microsoft Research
Armando Garcia-Mendoza, Microsoft Research
David Kirk, Microsoft Research
2007ThinSight: Versatile Multi-touch Sensing for Thin Form-factor DisplaysSteve Hodges, Microsoft Research; et al.
Shahram Izadi, Microsoft Research
Alex Butler, Microsoft Research
Alban Rrustemi, Microsoft Research
Bill Buxton, Microsoft Research
2006Reflective Physical Prototyping through Integrated Design, Test, and AnalysisBjörn Hartmann, Stanford University; et al.
Scott Klemmer, Stanford University
Michael Bernstein, Stanford University
Leith Abdulla, Stanford University
Brandon Burr, Stanford University
Avi Robinson-Mosher, Stanford University
Jennifer Gee, Stanford University
2005Automation and Customization of Rendered Web PagesMichael Bolin, Massachusetts Institute of Technology; et al.
Matthew Webber, Massachusetts Institute of Technology
Philip Rha, Massachusetts Institute of Technology
Tom Wilson, Massachusetts Institute of Technology
Robert C. Miller, Massachusetts Institute of Technology
2004Multi-Finger Gestural Interaction with 3D Volumetric DisplaysTovi Grossman, University of Toronto; et al.
Daniel Wigdor, University of Toronto
Ravin Balakrishnan, University of Toronto
CrossY: A Crossing-Based Drawing ApplicationGeorg Apitz & François Guimbretière, University of Maryland
2003Perceptually-Supported Image Editing of Text and GraphicsEric Saund, Palo Alto Research Center; et al.
David Fleet, Palo Alto Research Center
Daniel Larner, Palo Alto Research Center
James Mahoney, Palo Alto Research Center
2002Clothing ManipulationTakeo Igarashi, University of Tokyo
John F. Hughes, Brown University
2001Phidgets: Easy Development of Physical Interfaces through Physical WidgetsSaul Greenberg & Chester Fitchett, University of Calgary
2000Sensing Techniques for Mobile InteractionKen Hinckley, Microsoft Research; et al.
Jeff Pierce, Microsoft Research
Mike Sinclair, Microsoft Research
Eric Horvitz, Microsoft Research
1996Indigo: A Local Propagation Algorithm for Inequality ConstraintsAlan Borning, University of Washington; et al.
Richard Anderson, University of Washington
Bjorn Freeman-Benson, Object Technology International
VLDB (Databases)
2013DisC Diversity: Result Diversification based on Dissimilarity and CoverageMarina Drosou & Evaggelia Pitoura, University of Ioannina
2012Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story IdentificationAlbert Angel, University of Toronto; et al.
Nick Koudas, University of Toronto
Nikos Sarkas, University of Toronto
Divesh Srivastava, AT&T Laboratories
2011RemusDB: Transparent High-Availability for Database SystemsUmar Farooq Minhas, University of Waterloo; et al.
Shriram Rajagopalan, University of British Columbia
Brendan Cully, University of British Columbia
Ashraf Aboulnaga, University of Waterloo
Ken Salem, University of Waterloo
Andrew Warfield, University of British Columbia
2010Towards Certain Fixes with Editing Rules and Master DataShuai Ma, University of Edinburgh; et al.
Wenfei Fan, University of Edinburgh
Jianzhong Li, Harbin Institute of Technology
Wenyuan Yu, University of Edinburgh
Nan Tang, University of Edinburgh
2009A Unified Approach to Ranking in Probabilistic DatabasesJian Li, University of Maryland; et al.
Barna Saha, University of Maryland
Amol Deshpande, University of Maryland
2008Finding Frequent Items in Data StreamsGraham Cormode & Marios Hadjieleftheriou, AT&T Laboratories
Constrained Physical Design TuningNicolas Bruno & Surajit Chaudhuri, Microsoft Research
2007Scalable Semantic Web Data Management Using Vertical PartitioningDaniel J. Abadi, Massachusetts Institute of Technology; et al.
Adam Marcus, Massachusetts Institute of Technology
Samuel R. Madden, Massachusetts Institute of Technology
Kate Hollenbach, Massachusetts Institute of Technology
2006Trustworthy Keyword Search for Regulatory-Compliant Records RetentionSoumyadeb Mitra, University of Illinois at Urbana-Champaign; et al.
Windsor W. Hsu, University of Illinois at Urbana-Champaign
Marianne Winslett, University of Illinois at Urbana-Champaign
2005Cache-conscious Frequent Pattern Mining on a Modern ProcessorAmol Ghoting, Ohio State University; et al.
Gregory Buehrer, Ohio State University
Srinivasan Parthasarathy, Ohio State University
Daehyun Kim, Intel
Anthony D. Nguyen, Intel
Yen-Kuang Chen, Intel
Pradeep Dubey, Intel
2004Model-Driven Data Acquisition in Sensor NetworksAmol Deshpande, University of California Berkeley; et al.
Carlos Guestrin, Intel Research
Samuel R. Madden, Massachusetts Institute of Technology
Joseph M. Hellerstein, University of California Berkeley
Wei Hong, Intel Research
2001Weaving Relations for Cache PerformanceAnastassia Ailamaki, Carnegie Mellon University; et al.
David J. DeWitt, University of Wisconsin
Mark D. Hill, University of Wisconsin
Marios Skounakis, University of Wisconsin
1997Integrating Reliable Memory in DatabasesWee Teck Ng & Peter M. Chen, University of Michigan
WWW (World Wide Web)
2014Efficient Estimation for High Similarities using Odd SketchesMichael Mitzenmacher, Harvard University; et al.
Rasmus Pagh, IT University of Copenhagen
Ninh Pham, IT University of Copenhagen
2013No Country for Old Members: User Lifecycle and Linguistic Change in Online CommunitiesCristian Danescu-Niculescu-Mizil, Stanford University; et al.
Robert West, Stanford University
Dan Jurafsky, Stanford University
Jure Leskovec, Stanford University
Christopher Potts, Stanford University
2012Counting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the StandardMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.
Sebastián Conca, Pontificia Universidad Católica de Chile
Jorge Pérez, Universidad de Chile
2011Towards a theory model for product searchBeibei Li, New York University; et al.
Anindya Ghose, New York University
Panagiotis G. Ipeirotis, New York University
2010Factorizing personalized Markov chains for next-basket recommendationSteffen Rendle, Osaka University; et al.
Christoph Freudenthaler, University of Hildesheim
Lars Schmidt-Thieme, University of Hildesheim
2009Hybrid keyword search auctionsAshish Goel, Stanford University
Kamesh Munagala, Duke University
2008IRLbot: Scaling to 6 billion pages and beyondHsin-Tsang Lee, Texas A&M University; et al.
Derek Leonard, Texas A&M University
Xiaoming Wang, Texas A&M University
Dmitri Loguinov, Texas A&M University
2007Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganogra...Lars Backstrom, Cornell University; et al.
Cynthia Dwork, Microsoft Research
Jon Kleinberg, Cornell University
2006Random Sampling from a Search Engine's IndexZiv Bar-Yossef & Maxim Gurevich, Technion
2005Three-level caching for efficient query processing in large Web search enginesXiaohui Long & Torsten Suel, Polytechnic Institute of New York University
2004Automatic detection of fragments in dynamically generated web pagesLakshmish Ramaswamy, Georgia Institute of Technology; et al.
Arun Iyengar, IBM Research
Ling Liu, Georgia Institute of Technology
Fred Douglis, IBM Research
2003Scaling personalized web searchGlen Jeh & Jennifer Widom, Stanford University
SemTag and seeker: bootstrapping the semantic web via automated semantic annotationStephen Dill, IBM Research; et al.
Nadav Eiron, IBM Research
David Gibson, IBM Research
Daniel Gruhl, IBM Research
R. Guha, IBM Research
Anant Jhingran, IBM Research
Tapas Kanungo, IBM Research
Sridhar Rajagopalan, IBM Research
Andrew Tomkins, IBM Research
John A. Tomlin, IBM Research
Jason Y. Zien, IBM Research
2002Abstracting application-level web securityDavid Scott & Richard Sharp, University of Cambridge
2001Engineering Server Driven Consistency for Large Scale Dynamic Web ServicesJian Yin, University of Texas at Austin; et al.
Lorenzo Alvisi, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Arun Iyengar, IBM Research
2000Graph Structure in the WebAndrei Broder, AltaVista; et al.
Ravi Kumar, IBM Research
Farzin Maghoul, AltaVista
Prabhakar Raghavan, IBM Research
Sridhar Rajagopalan, IBM Research
Raymie Stata, Compaq Systems Research Center
Andrew Tomkins, IBM Research
Janet Wiener, Compaq Systems Research Center
1999Focused Crawling: A New Approach to Topic-Specific Web Resource DiscoverySoumen Chakrabarti, Indian Institute of Technology; et al.
Martin van den Berg, FX Palo Alto Lab
Byron Dom, IBM Research
1998The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/videoKevin C. Almeroth, University of California Santa Barbara
Mostafa H. Ammar, Georgia Institute of Technology


Institutions with Best Papers
Microsoft Research37.9
Massachusetts Institute of Technology27.6
Stanford University27.5
Carnegie Mellon University26.3
University of Washington24.1
University of California Berkeley19.5
University of Toronto13.4
Cornell University12.9
IBM Research12.2
University of Illinois at Urbana-Champaign10.8
University of Texas at Austin10.4
University of British Columbia10.4
University of California Irvine7.7
University of Massachusetts Amherst7.2
University of Michigan7.2
Yahoo! Research6.8
Google6.8
University of Maryland6.6
University of Oxford6.2
Georgia Institute of Technology6.0
École Polytechnique Fédérale de Lausanne5.9
Princeton University5.6
AT&T Laboratories4.9
McGill University4.7
University of Wisconsin4.6
University of Nottingham4.5
Weizmann Institute of Science4.5
Rice University4.2
University of California San Diego4.2
Columbia University4.1
Université Paris-Sud3.9
Bell Labs3.8
Technion3.8
Hewlett-Packard Labs3.7
NEC Labs America3.7
University of Waterloo3.7
University of North Carolina at Chapel Hill3.4
Delft University of Technology3.4
Brown University3.3
National University of Singapore3.0
DePaul University3.0
Hasso Plattner Institute3.0
University of Alberta3.0
Indiana University at Bloomington3.0
Technische Universität Berlin2.7
University of Nebraska-Lincoln2.6
University of California Davis2.6
Max Planck Institut2.6
University of Cambridge2.6
Polytechnic Institute of New York University2.5
The Chinese University of Hong Kong2.5
Hong Kong University of Science and Technology2.5
Ohio State University2.4
Duke University2.3
Toyota Technological Institute at Chicago2.3
University of Pennsylvania2.3
Aarhus University2.3
University of Amsterdam2.2
RWTH Aachen University2.2
Peking University2.2
Tel-Aviv University2.2
University of Calgary2.1
Saarland University2.1
Intel Research2.0
University College London2.0
Universidade Técnica de Lisboa2.0
BBN Technologies2.0
NASA Ames Research Center2.0
Purdue University2.0

Credit is given in decreasing author order as customary in many fields. First authors are given 1 point, second authors are given 0.5 points, third authors are given 0.33 points, etc. These points are then divided by the sum of points for that paper, i.e. normalizing it. This ranking may be inaccurate or incomplete, may not reflect the current state of best paper awards, and is not an official list. If you are not satisfied with the ranking listed here, please disregard it.

There is a visualization for filtering these papers by institution, year, and conference (thanks to David Karger)


Back to Jeff Huang's Homepage


Page last updated: 2014-07-14