Best Paper Awards in Computer Science
Collection of best paper awards for 32 computer science conferences since 1996
This is a collection of best paper awards from conferences in each computer science subfield, starting from 1996. Originally, the broadest representative conference for each subfield were selected to be included. This data was entered by hand from sources found online (many of them no longer available), so please email bestpaper@jeffhuang.com if you notice any errors or omissions. The page is maintained annually by Jeff Huang. Thanks to contributions from Mingrui Ray Zhang (2017, 2018), Will Gierke (2019, 2020), Alice Marbach (2019, 2020), AllenAI's Dawn Howell (2019, 2020), Long Do (2021), Shaun Wallace (2021, 2022), and Joshua Yang (2023).
Caveats: Note that some conferences do not have such an award; "Distinguished paper award" and "outstanding paper award" are included but not "best student paper" or "best 10-year old paper"; at this point, it is unlikely that new additional conferences will be added due to the ongoing time commitment to prepare updates (about 10 hours a year); only each author's first affiliation is listed due to how the data was originally stored.
2023 | ||
---|---|---|
AAAI Artificial Intelligence | Misspecification in Inverse Reinforcement Learning | Joar Skalse & Alessandro Abate, University of Oxford |
ACL Natural Language Processing | Do Androids Laugh at Electric Sheep? Humor "Understanding" Benchmarks from The New Yorker Caption Contest | Jack Hessel, Allen Institute for Artificial Intelligence; et al. Ana Marasovic, University of Utah Jena D. Hwang, Allen Institute for Artificial Intelligence Lillian Lee, Cornell University Jeff Da, University of Washington Rowan Zellers, OpenAI Robert Mankoff, Air Mail and Cartoon Collections Yejin Choi, University of Washington |
What the DAAM: Interpreting Stable Diffusion Using Cross Attention | Raphael Tang, Comcast; et al. Linqing Liu, University College London Akshat Pandey, Comcast Zhiying Jiang, University of Waterloo Gefei Yang, Comcast Karun Kumar, Comcast Pontus Stenetorp, University College London Jimmy Lin, University of Waterloo Ferhan Ture, Comcast | |
From Pretraining Data to Language Models to Downstream Tasks: Tracking the Trails of Political Biases Leading to Unfair NLP Models | Shangbin Feng, University of Washington; et al. Chan Young Park, Carnegie Mellon University Yuhan Liu, Xi'an Jiaotong University Yulia Tsvetkov, University of Washington | |
CHI Human-Computer Interaction | Breaking Out of the Ivory Tower: A Large-scale Analysis of Patent Citations to HCI Research | Hancheng Cao, Stanford University; et al. Yujie Lu, University of California, Santa Barbara Yuting Deng, Carnegie Mellon University Daniel Mcfarland, Stanford University Michael S. Bernstein, Stanford University |
Changes in Research Ethics, Openness, and Transparency in Empirical Studies between CHI 2017 and CHI 2022 | Kavous Salehzadeh Niksirat, University of Lausanne; et al. Lahari Goswami, University of Lausanne Pooja S. B. Rao, University of Lausanne James Tyler, University of Lausanne Alessandro Silacci, University of Lausanne Sadiq Aliyu, University of Lausanne Annika Aebli, University of Lausanne Chat Wacharamanotham, Swansea University Mauro Cherubini, University of Lausanne | |
ChartDetective: Easy and Accurate Interactive Data Extraction from Complex Vector Charts | Damien Masson, University of Waterloo; et al. Sylvain Malacria, Université de Lille Daniel Vogel, University of Waterloo Edward Lank, University of Waterloo Géry Casiez, Université de Lille | |
CiteSee: Augmenting Citations in Scientific Papers with Persistent and Personalized Historical Context | Joseph Chee Chang, Allen Institute for Artificial Intelligence; et al. Amy X. Zhang, University of Washington Jonathan Bragg, Allen Institute for Artificial Intelligence Andrew Head, University of Pennsylvania Kyle Lo, Allen Institute for Artificial Intelligence Doug Downey, Allen Institute for Artificial Intelligence Daniel S. Weld, University of Washington | |
Collaborating Across Realities: Analytical Lenses for Understanding Dyadic Collaboration in Transitional Interfaces | Jan-Henrik Schröder, University of Lübeck; et al. Daniel Schacht, University of Lübeck Niklas Peper, University of Lübeck Anita Marie Hamurculu, University of Lübeck Hans-Christian Jetter, University of Lübeck | |
Contestable Camera Cars: A Speculative Design Exploration of Public AI That Is Open and Responsive to Dispute | Kars Alfrink, Delft University of Technology; et al. Ianus Keller, Delft University of Technology Neelke Doorn, Delft University of Technology Gerd Kortuem, Delft University of Technology | |
DataParticles: Block-based and Language-oriented Authoring of Animated Unit Visualization | Yining Cao, University of California, San Diego; et al. Jane L E, University of California, San Diego Zhutian Chen, Harvard University Haijun Xia, University of California, San Diego | |
Deceptive Design Patterns in Safety Technologies: A Case Study of the Citizen App | Ishita Chordia, University of Washington; et al. Lena-Phuong Tran, University of Washington Tala June Tayebi, University of Washington Emily Parrish, University of Washington Sheena Erete, University of Maryland Jason Yip, University of Washington Alexis Hiniker, University of Washington | |
Disentangling Fairness Perceptions in Algorithmic Decision-Making: the Effects of Explanations, Human Oversight, and Contestability | Mireia Yurrita, Delft University of Technology; et al. Tim Draws, Delft University of Technology Agathe Balayn, Delft University of Technology Dave Murray-Rust, Delft University of Technology Nava Tintarev, Maastricht University Alessandro Bozzon, Delft University of Technology | |
Envisioning the (In)Visibility of Discreet and Wearable AAC Devices | Humphrey Curtis, King's College London; et al. Zihao You, King's College London William Deary, King's College London Miruna-Ioana Tudoreanu, King's College London Timothy Neate, King's College London | |
Evaluating Large Language Models in Generating Synthetic HCI Research Data: a Case Study | Perttu Hämäläinen, Aalto University; et al. Mikke Tavast, Aalto University Anton Kunnari, University of Helsinki | |
FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones | Leon Würsching, TU Darmstadt; et al. Florentin Putz, TU Darmstadt Steffen Haesler, TU Darmstadt Matthias Hollick, TU Darmstadt | |
Full-hand Electro-Tactile Feedback without Obstructing Palmar Side of Hand | Yudai Tanaka, University of Chicago; et al. Alan Shen, University of Chicago Andy Kong, University of Chicago Pedro Lopes, University of Chicago | |
Going, Going, Gone: Exploring Intention Communication for Multi-User Locomotion in Virtual Reality | Julian Rasch, Ludwig Maximilian University of Munich; et al. Vladislav Dmitrievic Rusakov, Ludwig Maximilian University of Munich Martin Schmitz, Saarland University Florian Müller, Ludwig Maximilian University of Munich | |
Infrastructuring Care: How Trans and Non-Binary People Meet Health and Well-Being Needs through Technology | Lauren Wilcox, Google; et al. Renee Shelby, Google Rajesh Veeraraghavan, Georgetown University Oliver L. Haimson, University of Michigan Gabriela Cruz Erickson, Google Michael Turken, Google Rebecca Gulotta, Google | |
Investigating the Role of Context in the Delivery of Text Messages for Supporting Psychological Wellbeing | Ananya Bhattacharjee, University of Toronto; et al. Joseph Jay Williams, University of Toronto Jonah Meyerhoff, Northwestern University Harsh Kumar, University of Toronto Alex Mariakakis, University of Toronto Rachel Kornfield, Northwestern University | |
Kaleidoscope: A Reflective Documentation Tool for a User Interface Design Course | Sarah Sterman, University of California, Berkeley; et al. Molly Jane Nicholas, University of California, Berkeley Janaki Vivrekar, University of California, Berkeley Jessica R Mindel, University of California, Berkeley Eric Paulos, University of California, Berkeley | |
LipLearner: Customizable Silent Speech Interactions on Mobile Devices | Zixiong Su, University of Tokyo; et al. Shitao Fang, University of Tokyo Jun Rekimoto, University of Tokyo | |
Paying the Price: When Intimate Partners Use Technology for Financial Harm | Rosanna Bellini, Cornell University | |
Playing with Feedback: Unpredictability, Immediacy, and Entangled Agency in the No-input Mixing Desk | Tom Mudd, University of Edinburgh | |
Probing a Community-Based Conversational Storytelling Agent to Document Digital Stories of Housing Insecurity | Brett A. Halperin, University of Washington; et al. Gary Hsieh, University of Washington Erin McElroy, University of Texas at Austin James Pierce, University of Washington Daniela K. Rosner, University of Washington | |
Rethinking "Risk" in Algorithmic Systems Through A Computational Narrative Analysis of Casenotes in Child Welfare | Devansh Saxena, Marquette University; et al. Erina Seh-Young Moon, University of Toronto Aryan Chaurasia, University of Toronto Yixin Guan, University of Toronto Shion Guha, University of Toronto | |
SAWSense: Using Surface Acoustic Waves for Surface-bound Event Recognition | Yasha Iravantchi, University of Michigan; et al. Yi Zhao, University of Michigan Kenrick Kin, Meta Alanson P. Sample, University of Michigan | |
Sensorimotor Simulation of Redirected Reaching using Stochastic Optimal Feedback Control | Eric J Gonzalez & Sean Follmer, Stanford University | |
Take My Hand: Automated Hand-Based Spatial Guidance for the Visually Impaired | Adil Rahman, University of Virginia; et al. Md Aashikur Rahman Azim, University of Virginia Seongkook Heo, University of Virginia | |
The Halting problem: Video analysis of self-driving cars in traffic | Barry Brown, University of Copenhagen; et al. Mathias Broth, IKOS Erik Vinkhuyzen, King's College London | |
The Nuanced Nature of Trust and Privacy Control Adoption in the Context of Google | Ehsan Ul Haque, University of Connecticut; et al. Mohammad Maifi Hasan Khan, University of Connecticut Md Abdullah Al Fahim, University of Connecticut | |
The Walking Talking Stick: Understanding Automated Note-Taking in Walking Meetings | Luke Haliburton, Ludwig Maximilian University of Munich; et al. Natalia Bartłomiejczyk, Lodz University of Technology Albrecht Schmidt, Ludwig Maximilian University of Munich Paweł W. Woźniak, Chalmers University of Technology Jasmin Niess, University of St. Gallen | |
Understanding Context to Capture when Reconstructing Meaningful Spaces for Remote Instruction and Connecting in XR | Hanuma Teja Maddali & Amanda Lazar, University of Maryland | |
Understanding Frontline Workers’ and Unhoused Individuals’ Perspectives on AI Used in Homeless Services | Tzu-Sheng Kuo, Carnegie Mellon University; et al. Hong Shen, Carnegie Mellon University Jisoo Geum, Carnegie Mellon University Nev Jones, University of Pittsburgh Jason I. Hong, Carnegie Mellon University Haiyi Zhu, Carnegie Mellon University Kenneth Holstein, Carnegie Mellon University | |
Understanding the Benefits and Challenges of Deploying Conversational AI Leveraging Large Language Models for Public Health Intervention | Eunkyung Jo, University of California, Irvine; et al. Daniel A. Epstein, University of California, Irvine Hyunhoon Jung, NAVER Young-Ho Kim, NAVER | |
What Do We Mean When We Talk about Trust in Social Media? A Systematic Review | Yixuan Zhang, Georgia Institute of Technology; et al. Joseph D Gaggiano, Georgia Institute of Technology Nutchanon Yongsatianchot, Northeastern University Nurul M Suhaimi, Universiti Malaysia Pahang Miso Kim, Northeastern University Yifan Sun, William & Mary Jacqueline Griffin, Northeastern University Andrea G Parker, Georgia Institute of Technology | |
Who Do We Mean When We Talk About Visualization Novices? | Alyxander Burns, University of Massachusetts Amherst; et al. Christiana Lee, University of Massachusetts Amherst Ria Chawla, University of Massachusetts Amherst Evan Peck, Bucknell University Narges Mahyar, University of Massachusetts Amherst | |
'Treat me as your friend, not a number in your database': Co-designing with Children to Cope with Datafication Online | Ge Wang, University of Oxford; et al. Jun Zhao, University of Oxford Max Van Kleek, University of Oxford Nigel Shadbolt, University of Oxford | |
"My Zelda Cane": Strategies Used by Blind Players to Play Visual-Centric Digital Games | David Gonçalves, University of Lisbon; et al. Manuel Piçarra, University of Lisbon Pedro Pais, University of Lisbon João Guerreiro, University of Lisbon André Rodrigues, University of Lisbon | |
CIKM Knowledge Management | Joint Rebalancing and Charging for Shared Electric Micromobility Vehicles with Energy-informed Demand | Heng Tan, Lehigh University; et al. Yukun Yuan, University of Tennessee at Chattanooga Shuxin Zhong, Rutgers University Yu Yang, Lehigh University |
CVPR Computer Vision | Visual Programming: Compositional visual reasoning without training | Tanmay Gupta & Aniruddha Kembhavi, Allen Institute for Artificial Intelligence |
Planning-oriented Autonomous Driving | Yihan Hu, Shanghai AI Laboratory; et al. Jiazhi Yang, Shanghai AI Laboratory Li Chen, Shanghai AI Laboratory Keyu Li, Shanghai AI Laboratory Chonghao Sima, Shanghai AI Laboratory Xizhou Zhu, SenseTime Research Siqi Chai, Wuhan University Senyao Du, Wuhan University Tianwei Lin, Wuhan University Wenhai Wang, Shanghai AI Laboratory Lewei Lu, SenseTime Research Xiaosong Jia, Shanghai AI Laboratory Qiang Liu, Wuhan University Jifeng Dai, Shanghai AI Laboratory Yu Qiao, Shanghai AI Laboratory Hongyang Li, Shanghai AI Laboratory | |
FOCS Theory | Strong Bounds for 3-Progressions | Zander Kelley, University of Illinois at Urbana–Champaign Raghu Meka, University of California, Los Angeles |
The Subspace Flatness Conjecture and Faster Integer Programming | Victor Reis & Thomas Rothvoss, University of Washington | |
FSE Software Engineering | Recommending Analogical APIs via Knowledge Graph Embedding | Mingwei Liu, Fudan University; et al. Yanjun Yang, Fudan University Yiling Lou, Fudan University Xin Peng, Fudan University Zhong Zhou, Fudan University Xueying Du, Fudan University Tianyong Yang, Fudan University |
TransRacer: Function Dependence-Guided Transaction Race Detection for Smart Contracts | Chenyang Ma, Nanjing University of Science and Technology; et al. Wei Song, Nanjing University of Science and Technology Jeff Huang, Texas A&M University | |
LExecutor: Learning-Guided Execution | Beatriz Souza & Michael Pradel, University of Stuttgart | |
A Four-Year Study of Student Contributions to OSS vs. OSS4SG with a Lightweight Intervention | Zihan Fang, Vanderbilt University; et al. Madeline Endres, University of Michigan Thomas Zimmermann, Microsoft Denae Ford, Microsoft Westley R Weimer, University of Michigan Kevin Leach, Vanderbilt University Yu Huang, Vanderbilt University | |
Benchmarking Robustness of AI-Enabled Multi-sensor Fusion Systems: Challenges and Opportunities | Xinyu Gao, Nanjing University; et al. Zhijie Wang, University of Alberta Yang Feng, Nanjing University Lei Ma, University of Tokyo Zhenyu Chen, Nanjing University Baowen Xu, Nanjing University | |
NeuRI: Diversifying DNN Generation via Inductive Rule Inference | Jiawei Liu, University of Illinois at Urbana–Champaign; et al. Jinjun Peng, Columbia University Yuyao Wang, Nanjing University Lingming Zhang, University of Illinois at Urbana–Champaign | |
Can Machine Learning Pipelines Be Better Configured? | Yibo Wang, Northeastern University; et al. Ying Wang, Northeastern University Tingwei Zhang, Northeastern University Yue Yu, National University of Defense Technology Shing-Chi Cheung, Hong Kong University of Science and Technology Hai Yu, Northeastern University Zhiliang Zhu, Northeastern University | |
An Automated Approach to Extracting Local Variables | Xiaye Chi, Beijing Institute of Technology; et al. Hui Liu, Beijing Institute of Technology Guangjie Li, National Innovation Institute of Defense Technology Weixiao Wang, Beijing Institute of Technology Yunni Xia, Chongqing University Yanjie Jiang, Beijing Institute of Technology Yuxia Zhang, Beijing Institute of Technology Weixing Ji, Beijing Institute of Technology | |
A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing | Min-Yih Hsu, University of California, Irvine; et al. Felicitas Hetzelt, University of California, Irvine David Gens, University of California, Irvine Michael Maitland, SiFive Michael Franz, University of California, Irvine | |
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors | Ruoxi Sun, CSIRO's Data61; et al. Minhui Xue, CSIRO's Data61 Gareth Tyson, Hong Kong University of Science and Technology Tian Dong, Shanghai Jiao Tong University Shaofeng Li, Peng Cheng Laboratory Shuo Wang, CSIRO's Data61 Haojin Zhu, Shanghai Jiao Tong University Seyit Camtepe, CSIRO's Data61 Surya Nepal, CSIRO's Data61 | |
Speeding up SMT Solving via Compiler Optimization | Benjamin Mikek & Qirun Zhang, Georgia Institute of Technology | |
Baldur: Whole-Proof Generation and Repair with Large Language Models | Emily First, University of Massachusetts Amherst; et al. Markus Rabe, Augment Computing Talia Ringer, University of Illinois at Urbana–Champaign Yuriy Brun, University of Massachusetts Amherst | |
ICCV Computer Vision | Adding Conditional Control to Text-to-Image Diffusion Models | Lvmin Zhang, Stanford University; et al. Anyi Rao, Stanford University Maneesh Agrawala, Stanford University |
Passive Ultra-Wideband Single-Photon Imaging | Mian Wei, University of Toronto; et al. Sotiris Nousias, University of Toronto Rahul Gulve, University of Toronto David B. Lindell, University of Toronto Kiriakos N. Kutulakos, University of Toronto | |
ICML Machine Learning | Learning-Rate-Free Learning by D-Adaptation | Aaron Defazio, Meta Konstantin Mishchenko, Samsung |
A Watermark for Large Language Models | John Kirchenbauer, University of Maryland; et al. Jonas Geiping, University of Maryland Yuxin Wen, University of Maryland Jonathan Katz, University of Maryland Ian Miers, University of Maryland Tom Goldstein, University of Maryland | |
Generalization on the Unseen, Logic Reasoning and Degree Curriculum | Emmanuel Abbe, École Polytechnique Fédérale de Lausanne; et al. Samy Bengio, Apple Aryo Lotfi, École Polytechnique Fédérale de Lausanne Kevin Rizk, École Polytechnique Fédérale de Lausanne | |
Adapting to game trees in zero-sum imperfect information games | Côme Fiegel, CREST; et al. Pierre Menard, ENS Lyon Tadashi Kozuno, Omron Sinic X Remi Munos, Deepmind Vianney Perchet, CRITEO AI Michal Valko, Deepmind | |
Self-Repellent Random Walks on General Graphs - Achieving Minimal Sampling Variance via Nonlinear Markov Chains | Vishwaraj Doshi, IQVIA; et al. Jie Hu, North Carolina State University Do Young Eun, North Carolina State University | |
Bayesian Design Principles for Frequentist Sequential Learning | Yunbei Xu & Assaf Zeevi, Columbia University | |
ICSE Software Engineering | Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel | Bianca Trinkenreich, Northern Arizona University; et al. Klaas-Jan Stol, University College Cork Anita Sarma, Oregon State University Daniel M German, University of Victoria Marco Gerosa, Northern Arizona University Igor Steinmacher, Northern Arizona University |
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects | Lyuye Zhang, Nanyang Technological University; et al. Chengwei Liu, Nanyang Technological University Zhengzi Xu, Nanyang Technological University Sen Chen, Tianjin University Lingling Fan, Nankai University Lida Zhao, Nanyang Technological University Jiahui Wu, Nanyang Technological University Yang Liu, Nanyang Technological University | |
A Qualitative Study on the Implementation Design Decisions of Developers | Jenny T. Liang, Carnegie Mellon University; et al. Maryam Arab, George Mason University Minhyuk Ko, Virginia Tech Amy J. Ko, University of Washington Thomas D. LaToza, George Mason University | |
STILL AROUND: Experiences and Survival Strategies of Veteran Women Software Developer | Sterre van Breukelen, Eindhoven University of Technology; et al. Ann Barcomb, University of Calgary Sebastian Baltes, University of Adelaide Alexander Serebrenik, Eindhoven University of Technology | |
Understanding and Detecting On-the-Fly Configuration Bugs | Teng Wang, National University of Defense Technology; et al. Zhouyang Jia, National University of Defense Technology Shanshan Li, National University of Defense Technology Si Zheng, National University of Defense Technology Yue Yu, National University of Defense Technology Erci Xu, National University of Defense Technology Shaoliang Peng, Hunan University Xiangke Liao, National University of Defense Technology | |
Testing Database Engines via Query Plan Guidance | Jinsheng Ba & Manuel Rigger, National University of Singapore | |
Sibyl: Improving Software Engineering Tools with SMT Selection | Will Leeson, University of Virginia; et al. Matthew B Dwyer, University of Virginia Antonio Filieri, Imperial College London | |
Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGX | Xinyuan Miao, Shanghai Jiao Tong University; et al. Ziyi Lin, Alibaba Group Shaojun Wang, Alibaba Group Lei Yu, Alibaba Group Sanhong Li, Alibaba Group Zihan Wang, Shanghai Jiao Tong University Pengbo Nie, Shanghai Jiao Tong University Yuting Chen, Shanghai Jiao Tong University Beijun Shen, Shanghai Jiao Tong University He Jiang, Dalian University of Technology | |
Efficiency Matters: Speeding Up Automated Testing with GUI Rendering Inference | Sidong Feng, Monash University; et al. Mulong Xie, Australian National University Chunyang Chen, Monash University | |
Rete: Learning Namespace Representation for Program Repair | Nikhil Parasaram, University College London; et al. Earl Barr, University College London Sergey Mechtaev, University College London | |
IJCAI Artificial Intelligence | Levin Tree Search with Context Models | Laurent Orseau, Deepmind; et al. Marcus Hutter, Deepmind Levi H. S. Lelis, Alberta Machine Intelligence Institute |
SAT-Based PAC Learning of Description Logic Concepts | Balder ten Cate, University of Amsterdam; et al. Maurice Funk, Leipzig University Jean Christoph Jung, Universität Dortmund Carsten Lutz, Leipzig University | |
Safe Reinforcement Learning via Probabilistic Logic Shields | Wen-Chi Yang, Katholieke Universiteit Leuven; et al. Giuseppe Marra, Katholieke Universiteit Leuven Gavin Rens, Katholieke Universiteit Leuven Luc De Raedt, Katholieke Universiteit Leuven | |
INFOCOM Networking | More than Enough is Too Much: Adaptive Defenses against Gradient Leakage in Production Federated Learning | Fei Wang, University of Toronto; et al. Ethan Hugh, University of Toronto Baochun Li, University of Toronto |
Scalable Real-Time Bandwidth Fairness in Switches | Robert MacDavid, Princeton University; et al. Xiaoqi Chen, Princeton University Jennifer Rexford, Princeton University | |
ISCA Architecture | Contiguitas: The Pursuit of Physical Memory Contiguity in Datacenters | Kaiyang Zhao, Carnegie Mellon University; et al. Kaiwen Xue, Carnegie Mellon University Ziqi Wang, Carnegie Mellon University Dan Schatzberg, Meta Leon Yang, Meta Antonis Manousis, Meta Johannes Weiner, Meta Rik van Riel, Meta Bikash Sharma, Meta Chunqiang Tang, Meta Dimitrios Skarlatos, Carnegie Mellon University |
SCALO: An Accelerator-Rich Distributed System for Scalable Brain-Computer Interfacing | Karthik Sriram, Yale University; et al. Raghavendra Pradyumna Pothukuchi, Yale University Michał Gerasimiuk, Yale University Muhammed Ugur, Yale University Oliver Ye, Yale University Rajit Manohar, Yale University Anurag Khandelwal, Yale University Abhishek Bhattacharjee, Yale University | |
KDD Data Mining | All in One: Multi-task Prompting for Graph Neural Networks | Xiangguo Sun, The Chinese University of Hong Kong; et al. Hong Cheng, The Chinese University of Hong Kong Jia Li, Hong Kong University of Science and Technology Bo Liu, Southeast University Jihong Guan, Tongji University |
MOBICOM Mobile | AgriTera: Accurate Non-Invasive Fruit Ripeness Sensing via Sub-Terahertz Wireless Signals | Sayed Saad Afzal, Massachusetts Institute of Technology; et al. Atsutse Kludze, Princeton University Subhajit Karmakar, Princeton University Ranveer Chandra, Microsoft Yasaman Ghasempour, Princeton University |
The Underwater Backscatter Channel: Theory, Link Budget, and Experimental Validation | Waleed Akbar, Massachusetts Institute of Technology; et al. Ahmed Allam, Massachusetts Institute of Technology Fadel Adib, Massachusetts Institute of Technology | |
NeurIPS Machine Learning | Privacy Auditing with One (1) Training Run | Thomas Steinke, Google; et al. Milad Nasr, Google Matthew Jagielski, Google |
Are Emergent Abilities of Large Language Models a Mirage? | Rylan Schaeffer, Stanford University; et al. Brando Miranda, Stanford University Sanmi Koyejo, Stanford University | |
NSDI Networking | CausalSim: A Causal Framework for Unbiased Trace-Driven Simulation | Abdullah Alomar, Massachusetts Institute of Technology; et al. Pouya Hamadanian, Massachusetts Institute of Technology Arash Nasr-Esfahany, Massachusetts Institute of Technology Anish Agarwal, MIT, Mohammad Alizadeh, Massachusetts Institute of Technology Devavrat Shah, Massachusetts Institute of Technology |
Building Flexible, Low-Cost Wireless Access Networks With Magma | Shaddi Hasan, Virginia Tech; et al. Amar Padmanabhan, Databricks Bruce Davie, Systems Approach Jennifer Rexford, Princeton University Ulas Kozat, Meta Hunter Gatewood, Meta Shruti Sanadhya, Meta Nick Yurchenko, Meta Tariq Al-Khasib, Meta Oriol Batalla, Meta Marie Bremner, Meta Andrei Lee, Meta Evgeniy Makeev, Meta Scott Moeller, Meta Alex Rodriguez, Meta Pravin Shelar, Meta Karthik Subraveti, Meta Sudarshan Kandi, Meta Alejandro Xoconostle, Meta Praveen Kumar Ramakrishnan, Meta Xiaochen Tian, Indepenent Anoop Tomar, Meta | |
LeakyScatter: A Frequency-Agile Directional Backscatter Network Above 100 GHz | Atsutse Kludze & Yasaman Ghasempour, Princeton University | |
DOTE: Rethinking (Predictive) WAN Traffic Engineering | Yarin Perry, Hebrew University of Jerusalem; et al. Felipe Vieira Frujeri, Microsoft Chaim Hoch, Hebrew University of Jerusalem Srikanth Kandula, Microsoft Ishai Menache, Microsoft Michael Schapira, Hebrew University of Jerusalem Aviv Tamar, Technion – Israel Institute of Technology | |
OSDI Operating Systems | Triangulating Python Performance Issues with SCALENE | Emery D. Berger, University of Massachusetts Amherst; et al. Sam Stern, University of Massachusetts Amherst Juan Altmayer Pizzorno, University of Massachusetts Amherst |
Ensō: A Streaming Interface for NIC-Application Communication | Hugo Sadok, Carnegie Mellon University; et al. Nirav Atre, Carnegie Mellon University Zhipeng Zhao, Microsoft Daniel S. Berger, Microsoft James C. Hoe, Carnegie Mellon University Aurojit Panda, New York University Justine Sherry, Carnegie Mellon University Ren Wang, Intel | |
PLDI Programming Languages | Mosaic: An Interoperable Compiler for Tensor Algebra | Manya Bansal, Stanford University; et al. Olivia Hsu, Stanford University Kunle Olukotun, Stanford University Fredrik Kjolstad, Stanford University |
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives | Joel Kuepper, University of Adelaide; et al. Andres Erbsen, Massachusetts Institute of Technology Jason Gross, Massachusetts Institute of Technology Owen Conoly, Massachusetts Institute of Technology Chuyue Sun, Stanford University Samuel Tian, Massachusetts Institute of Technology David Wu, University of Adelaide Adam Chlipala, Massachusetts Institute of Technology Chitchanok Chuengsatiansup, University of Melbourne Daniel Genkin, Georgia Institute of Technology Markus Wagner, Monash University Yuval Yarom, Ruhr University Bochum | |
Synthesizing MILP Constraints for Efficient and Robust Optimization | Jingbo Wang, University of Southern California; et al. Aarti Gupta, Princeton University Chao Wang, University of Southern California | |
An Automata-Based Framework for Verification and Bug Hunting in Quantum Circuits | Yu-Fang Chen, Academia Sinica; et al. Kai-Min Chung, Academia Sinica Ondřej Lengál, Brno University of Technology Jyun-Ao Lin, Academia Sinica Wei-Lun Tsai, Academia Sinica Di-De Yen, Academia Sinica | |
Covering All the Bases: Type-Based Verification of Test Input Generators | Zhe Zhou, Purdue University; et al. Ashish Mishra, Purdue University Benjamin Delaware, Purdue University Suresh Jagannathan, Purdue University | |
PODS Databases | Extremal Fitting Problems for Conjunctive Queries | Balder Ten Cate, University of Amsterdam; et al. Victor Dalmau, Pompeu Fabra University Maurice Funk, Leipzig University Carsten Lutz, Leipzig University |
S&P Security and Privacy | MEGA: Malleable Encryption Goes Awry | Matilda Backendal, ETH Zurich; et al. Miro Haller, ETH Zurich Kenneth Paterson, ETH Zurich |
Practically-exploitable Cryptographic Vulnerabilities in Matrix | Martin Albrecht, Royal Holloway University of London; et al. Sofía Celi, Brave Software Benjamin Dowling, University of Sheffield Daniel Jones, Royal Holloway University of London | |
Weak Fiat-Shamir Attacks on Modern Proof Systems | Quang Dao, Carnegie Mellon University; et al. Jim Miller, Trail of Bits Opal Wright, Trail of Bits Paul Grubbs, University of Michigan | |
Typing High-Speed Cryptography against Spectre v1 | Basavesh Ammanaghatta Shivakumar, Max Planck Institute for Security and Privacy; et al. Gilles Barthe, Max Planck Institute for Security and Privacy Benjamin Grégoire, Inria Université Côte d'Azur Vincent Laporte, Inria Nancy Tiago Oliviera, Max Planck Institute for Security and Privacy Swarn Priya, Inria Université Côte d'Azur Peter Schwabe, Max Planck Institute for Security and Privacy Lucas Tabary-Maujean, ENS Paris-Saclay | |
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations | Endres Puschner, Max Planck Institute for Security and Privacy; et al. Thorben Moos, Université catholique de Louvain Christian Kison, Bundeskriminalamt Steffen Becker, Ruhr University Bochum Amir Moradi, Ruhr University Bochum Christof Paar, Max Planck Institute for Security and Privacy | |
It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses | Soheil Khodayari & Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security | |
The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web | Jannis Rautenstrauch, CISPA Helmholtz Center for Information Security; et al. Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security Ben Stock, CISPA Helmholtz Center for Information Security | |
WaVe: a verifiably secure WebAssembly sandboxing runtime | Evan Johnson, University of California, San Diego; et al. Evan Laufer, Stanford University Zijie Zhao, University of Illinois Urbana Champaign Shravan Narayan, University of California, San Diego Stefan Savage, University of California, San Diego Deian Stefan, University of California, San Diego Fraser Brown, Carnegie Mellon University | |
Characterizing Everyday Misuse of Smart Home Devices | Phoebe Moh, University of Maryland; et al. Pubali Datta, University of Illinois Urbana Champaign Noel Warford, University of Maryland Adam Bates, University of Illinois Urbana Champaign Nathan Malkin, University of Maryland Michelle Mazurek, University of Maryland | |
Not Yet Another Digital ID: Privacy-preserving Humanitarian Aid Distribution | Boya Wang, École Polytechnique Fédérale de Lausanne; et al. Wouter Lueks, CISPA Helmholtz Center for Information Security Justinas Sukaitis, International Committee of the Red Cross Vincent Graf Narbel, International Committee of the Red Cross Carmela Troncoso, École Polytechnique Fédérale de Lausanne | |
"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya | Collins W. Munyendo, George Washington University; et al. Yasemin Acar, George Washington University Adam J. Aviv, George Washington University | |
Space Odyssey: An Experimental Software Security Analysis of Satellites | Johannes Willbold, Ruhr University Bochum; et al. Moritz Schloegel, Ruhr University Bochum Manuel Vögele, Ruhr University Bochum Maximilian Gerhardt, Ruhr University Bochum Thorsten Holz, CISPA Helmholtz Center for Information Security Ali Abbasi, CISPA Helmholtz Center for Information Security | |
SIGCOMM Networking | Memory Management in ActiveRMT: Towards Runtime-programmable Switches, | Rajdeep Das & Alex C. Snoeren, University of California, San Diego |
SIGGRAPH Graphics | Split-Lohmann Multifocal Displays | Yingsi Qin, Carnegie Mellon University; et al. Wei-Yu Chen, Carnegie Mellon University Matthew O'Toole, Carnegie Mellon University Aswin C. Sankaranarayanan, Carnegie Mellon University |
Differentiable Stripe Patterns for Inverse Design of Structured Surfaces | Juan Sebastian Montes Maestre, ETH Zurich; et al. Yinwei Du, ETH Zurich Ronan Hinchet, ETH Zurich Stelian Coros, ETH Zurich Bernhard Thomaszewski, ETH Zurich | |
Globally Consistent Normal Orientation for Point Clouds by Regularizing the Winding-number Field | Rui Xu, Shandong University; et al. Zhiyang Dou, University of Hong Kong Ningna Wang, University of Texas at Dallas Shiqing Xin, Shandong University Shuangmin Chen, Qingdao University of Science and Technology Mingyan Jiang, Shandong University Xiaohu Guo, University of Texas at Dallas Wenping Wang, Texas A&M University Changhe Tu, Shandong University | |
3D Gaussian Splatting for Real-time Radiance Field Rendering | Bernhard Kerbl, Inria Université Côte d'Azur; et al. Georgios Kopanas, Inria Université Côte d'Azur Thomas Leimkuehler, Max Planck Institute for Informatics George Drettakis, Inria Université Côte d'Azur | |
DOC: Differentiable Optimal Control for Retargeting Motions Onto Legged Robots | Ruben Grandia, Disney Research; et al. Farbod Farshidian, ETH Zurich Espen Knoop, Disney Research Christian Schumacher, Disney Research Marco Hutter, ETH Zurich Moritz Bächer, Disney Research | |
SIGIR Information Retrieval | The Information Retrieval Experiment Platform | Maik Fröbe, Friedrich-Schiller-Universität Jena; et al. Jan Heinrich Reimer, Friedrich-Schiller-Universität Jena Sean MacAvaney, University of Glasgow Niklas Deckers, Leipzig University Simon Reich, Leipzig University Janek Bevendorff, Bauhaus University Benno Stein, Bauhaus University Matthias Hagen, Friedrich-Schiller-Universität Jena Martin Potthast, Leipzig University |
SIGMETRICS Performance | Mean-field Analysis for Load Balancing on Spatial Graphs | Daan Rutten & Debankur Mukherjee, Georgia Institute of Technology |
SIGMOD Databases | Detecting Logic Bugs of Join Optimizations in DBMS | Xiu Tang, Zhejiang University; et al. Sai Wu, Zhejiang Univ Dongxiang Zhang, Zhejiang University Feifei Li, Alibaba Group Gang Chen, Zhejiang University |
Predicate Pushdown for Data Science Pipelines | Cong Yan, Microsoft research; et al. Yin Lin, University of Michigan Yeye He, Microsoft | |
SODA Theory | Dynamic Matching with Better-than-2 Approximation in Polylogarithmic Update Time | Sayan Bhattacharya, University of Warwick; et al. Peter Kiss, University of Warwick Thatchaphol Saranurak, University of Michigan David Wajc, Stanford University |
Dynamic Algorithms for Maximum Matching Size | Soheil Behnezhad, Stanford University | |
SOSP Operating Systems | Enabling High-Performance and Secure Userspace NVM File Systems with the Trio Architecture | Diyu Zhou, École Polytechnique Fédérale de Lausanne; et al. Vojtech Aschenbrenner, École Polytechnique Fédérale de Lausanne Tao Lyu, École Polytechnique Fédérale de Lausanne Jian Zhang, Rutgers University Sudarsun Kannan, Rutgers University Sanidhya Kashyap, École Polytechnique Fédérale de Lausanne |
TreeSLS: A Whole-system Persistent Microkernel with Tree-structured State Checkpoint on NVM | Fangnuo Wu, Shanghai Jiao Tong University; et al. Mingkai Dong, Shanghai Jiao Tong University Gequan Mo, Shanghai Jiao Tong University Haibo Chen, Shanghai Jiao Tong University | |
Validating JIT Compilers via Compilation Space Exploration | Cong Li, Nanjing University; et al. Yanyan Jiang, Nanjing University Chang Xu, Nanjing University Zhendong Su, ETH Zurich | |
STOC Theory | Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE | Wei Kai Lin, Northeastern University; et al. Ethan Mook, Northeastern University Daniel Wichs, Northeastern University |
The Randomized k-Server Conjecture Is False! | Sébastien Bubeck, Microsoft; et al. Christian Coester, University of Oxford Yuval Rabani, Hebrew University of Jerusalem | |
UIST User Interface | GenAssist: Making Image Generation Accessible | Mina Huh, University of Texas at Austin; et al. Yi-Hao Peng, Carnegie Mellon University Amy Pavel, University of Texas at Austin |
Generative Agents: Interactive Simulacra of Human Behavior | Joon Sung Park, Stanford University; et al. Joey O'Brien, Stanford University Carrie J Cai, Google Meredith Ringel Morris, Google Percy Liang, Stanford University Michael Bernstein, Stanford University | |
Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR | Vivek C Nair, University of California, Berkeley; et al. Gonzalo Munilla-Garrido, Technical University of Munich Dawn Song, University of California, Berkeley | |
VLDB Databases | Auto-Tables: Synthesizing Multi-Step Transformations to Relationalize Tables without Using Examples | Peng Li, Georgia Institute of Technology; et al. Yeye He, Microsoft Cong Yan, Microsoft Yue Wang, Microsoft Surajit Chaudhuri, Microsoft |
DBSP: Automatic Incremental View Maintenance for Rich Query Languages | Mihai Budiu, VMware Inc.; et al. Tej Chajed, VMware Inc. Frank McSherry, Materialize Leonid Ryzhyk, VMware Inc. Val Tannen, University of Pennsylvania | |
WWW World Wide Web | Simplistic Collection and Labeling Practices Limit the Utility of Benchmark Datasets for Twitter Bot Detection | Chris Hays, Massachusetts Institute of Technology; et al. Zachary Schutzman, Massachusetts Institute of Technology Manish Raghavan, Massachusetts Institute of Technology Erin Walk, Massachusetts Institute of Technology Philipp Zimmer, Massachusetts Institute of Technology |
2022 | ||
---|---|---|
AAAI Artificial Intelligence | Online certification of preference-based fairness for personalized recommender systems | Virginie Do, Université Paris Dauphine; et al. Sam Corbett-Davies, Meta Jamal Atif, Université Paris Dauphine Nicolas Usunier, Meta |
ACL Natural Language Processing | Learned Incremental Representations for Parsing | Nikita Kitaev, University of California, Berkeley; et al. Thomas Lu, University of California, Berkeley Dan Klein, University of California, Berkeley |
Requirements and Motivations of Low-Resource Speech Synthesis for Language Revitalization | Aidan Pine, National Research Council Canada; et al. Dan Wells, University of Edinburgh Nathan Brinklow, Queen's University Patrick William Littell, National Research Council Canada Korin Richmond, University of Edinburgh | |
DiBiMT: A Novel Benchmark for Measuring Word Sense Disambiguation Biases in Machine Translation | Niccolò Campolungo, Sapienza University of Rome; et al. Federico Martelli, Sapienza University of Rome Francesco Saina, SSML Carlo Bo Roberto Navigli, Sapienza University of Rome | |
KinyaBERT: a Morphology-aware Kinyarwanda Language Model | Antoine Nzeyimana, University of Massachusetts Amherst Andre Niyongabo Rubung, Polytechnic University of Catalonia | |
CHI Human-Computer Interaction | AirRacket: Perceptual Design of Ungrounded, Directional Force Feedback to Improve Virtual Racket Sports Experiences | Ching-Yi Tsai, National Taiwan University; et al. I-Lun Tsai, National Taiwan University Chao-Jung Lai, National Taiwan University Derrek Chow, University of Waterloo Lauren Wei, University of Maryland Lung-Pan Cheng, National Taiwan University Mike Y. Chen, National Taiwan University |
Care Infrastructures for Digital Security in Intimate Partner Violence | Emily Tseng, Cornell University; et al. Mehrnaz Sabet, Cornell University Rosanna Bellini, Cornell University Harkiran Kaur Sodhi, Cornell University Thomas Ristenpart, Cornell University Nicola Dell, Cornell University | |
Causality-preserving Asynchronous Reality | Andreas Rene Fender & Christian Holz, ETH Zurich | |
Designing for the Bittersweet: Improving Sensitive Experiences with Recommender Systems | Caitlin Lustig, University of Washington; et al. Artie Konrad, Meta Jed R. Brubaker, University of Colorado Boulder | |
EmoBalloon - Conveying Emotional Arousal in Text Chats with Speech Balloons | Toshiki Aoki, University of Tokyo; et al. Rintaro Chujo, University of Tokyo Katsufumi Matsui, University of Tokyo Saemi Choi, Samsung Ari Hautasaari, University of Tokyo | |
Including the Experiences of Physically Disabled Players in Mainstream Guidelines for Movement-Based Games | Liam Mason, University of Lincoln; et al. Kathrin Gerling, Katholieke Universiteit Leuven Patrick Dickinson, University of Lincoln Jussi Holopainen, University of Lincoln Lisa Jacobs, University of Lincoln Kieran Hicks, University of Lincoln | |
Interrupting Merit, Subverting Legibility: Navigating Caste In ‘Casteless’ Worlds of Computing | Palashi Vaghela, Cornell University; et al. Steven Jackson, Cornell University Phoebe Sengers, Cornell University | |
Investigating Daily Practices of Self-care to Inform the Design of Supportive Health Technologies for Living and Ageing Well with HIV | Caroline Claisse, Newcastle University; et al. Bakita Kasadha, Terrence Higgins Trust Simone Stumpf, University of Glasgow Abigail C Durrant, Newcastle University | |
Investigating the Tradeoffs of Everyday Text-Entry Collection Methods | André Rodrigues, University of Lisbon; et al. Hugo Nicolau, University of Lisbon André R.B. Santos, University of Lisbon Diogo Branco, University of Lisbon Jay Rainey, Newcastle University David Verweij, Newcastle University Jan David Smeddinck, Newcastle University Kyle Montague, Northumbria University Tiago Guerreiro, University of Lisbon | |
Jury Learning: Integrating Dissenting Voices into Machine Learning Models | Mitchell L. Gordon, Stanford University; et al. Michelle S. Lam, Stanford University Joon Sung Park, Stanford University Kayur Patel, Apple Jeff Hancock, Stanford University Tatsunori Hashimoto, Stanford University Michael Bernstein, Stanford University | |
Math Augmentation: How Authors Enhance the Readability of Formulas using Novel Visual Design Practices | Andrew Head, Allen Institute for Artificial Intelligence; et al. Amber Xie, University of California, Berkeley Marti Hearst, University of California, Berkeley | |
Meander Coil++: A Body-scale Wireless Power Transmission Using Safe-to-body and Energy-efficient Transmitter Coil | Ryo Takahashi, University of Tokyo; et al. Wakako Yukita, University of Tokyo Tomoyuki Yokota, University of Tokyo Takao Someya, University of Tokyo Yoshihiro Kawahara, University of Tokyo | |
Mobile-Friendly Content Design for MOOCs: Challenges, Requirements, and Design Opportunities | Jeongyeon Kim, KAIST; et al. Yubin Choi, KAIST Meng Xia, KAIST Juho Kim, KAIST | |
Mouth Haptics in VR using a Headset Ultrasound Phased Array | Vivian Shen, Carnegie Mellon University; et al. Craig Shultz, Carnegie Mellon University Chris Harrison, Carnegie Mellon University | |
Neo: Generalizing Confusion Matrix Visualization to Hierarchical and Multi-Output Labels | Jochen Görtler, University of Konstanz; et al. Fred Hohman, Apple Dominik Moritz, Apple Kanit Wongsuphasawat, Apple Donghao Ren, Apple Rahul Nair, Apple Marc Kirchner, Apple Kayur Patel, Apple | |
Squeezy-Feely: Investigating Lateral Thumb-Index Pinching as an Input Modality | Martin Schmitz, TU Darmstadt; et al. Sebastian Günther, TU Darmstadt Dominik Schön, TU Darmstadt Florian Müller, Ludwig Maximilian University of Munich | |
Still Creepy After All These Years: The Normalization of Affective Discomfort in App Use | John S. Seberger, Michigan State University; et al. Irina Shklovski, University of Copenhagen Emily Swiatek, Indiana University Bloomington Sameer Patil, University of Utah | |
The TAC Toolkit: Supporting Design for User Acceptance of Health Technologies from a Macro-Temporal Perspective | Camille Nadal, Trinity College Dublin; et al. Shane McCully, Trinity College Dublin Kevin Doherty, Copenhagen Center for Health Technology Corina Sas, University of Lancaster Gavin Doherty, Trinity College Dublin | |
Towards Relatable Explainable AI with the Perceptual Process | Wencan Zhang & Brian Y Lim, National University of Singapore | |
Weaving Stories: Toward Repertoires for Designing Things | Doenja Oogjes, Simon Fraser University Ron Wakkary, Eindhoven University of Technology | |
When Confidence Meets Accuracy: Exploring the Effects of Multiple Performance Indicators on Trust in Machine Learning Models | Amy Rechkemmer & Ming Yin, Purdue University | |
Zoom Obscura: Counterfunctional Design for Video-Conferencing | Chris Elsden, University of Edinburgh; et al. David Chatting, University of London Michael Duggan, King's College London Andrew Carl Dwyer, Durham University Pip Thornton, University of Edinburgh | |
3D Printed Street Crossings: Supporting Orientation and Mobility Training with People who are Blind or have Low Vision | Leona M Holloway, Monash University; et al. Matthew Butler, Monash University Kim Marriott, Monash University | |
"I Wanted to See How Bad It Was": Online Self-screening as a Critical Transition Point Among Young Adults with Common Mental Health Conditions | Kaylee Payne Kruzan, Northwestern University; et al. Jonah Meyerhoff, Northwestern University Theresa Nguyen, Mental Health America Madhu Reddy, University of California, Irvine David C. Mohr, Northwestern University Rachel Kornfield, Northwestern University | |
"It's Kind of Like Code-Switching": Black Older Adults' Experiences with a Voice Assistant for Health Information Seeking | Christina Harrington, Carnegie Mellon University; et al. Radhika Garg, Syracuse University Amanda Woodward, Michigan State University Dimitri Williams, DePaul University | |
CIKM Knowledge Management | Harnessing Neighborhood Modeling and Asymmetry Preservation for Digraph Representation Learning | Honglu Zhou, Rutgers University; et al. Advith Chegu, Rutgers University Samuel Sohn, Rutgers University Zuohui Fu, Rutgers University Gerard de Melo, University of Potsdam Mubbasir Kapadia, Rutgers University |
CVPR Computer Vision | Learning to Solve Hard Minimal Problems | Petr Hruby, ETH Zurich; et al. Timothy Duff, University of Washington Anton Leykin, Georgia Institute of Technology Tomas Pajdla, Czech Technical University in Prague |
FOCS Theory | Negative-Weight Single-Source Shortest Paths in Near-Linear Time | Aaron Bernstein, Rutgers University; et al. Danupon Nanongkai, University of Copenhagen Christian Wulff-Nilsen, University of Copenhagen |
Maximum Flow and Minimum-Cost Flow in Almost-Linear Time | Li Chen, Georgia Institute of Technology; et al. Rasmus Kyng, ETH Zurich Yang P. Liu, Stanford University Richard Peng, University of Waterloo Maximilian Probst Gutenberg, ETH Zurich Sushant Sachdeva, University of Toronto | |
FSE Software Engineering | Using Nudges to Accelerate Code Reviews at Scale | Qianhua Shan, Meta; et al. David Sukhdeo, Meta Qianying Huang, Meta Seth Rogers, Meta Lawrence Chen, Meta Elise Paradis, Meta Peter Rigby, Concordia University Nachiappan Nagappan, Meta |
Minerva: Browser API Fuzzing with Dynamic Mod-Ref Analysis | Chijin Zhou, Tsinghua University; et al. Quan Zhang, Tsinghua University Mingzhe Wang, Tsinghua University Lihua Guo, Tsinghua University Jie Liang, Tsinghua University Zhe Liu, Nanjing University Mathias Payer, École Polytechnique Fédérale de Lausanne Yu Jiang, Tsinghua University | |
The Evolution of Type Annotations in Python: An Empirical Study | Luca Di Grazia & Michael Pradel, University of Stuttgart | |
Online Testing of RESTful APIs: Promises and Challenges | Alberto Martin-Lopez, University of Seville; et al. Sergio Segura, University of Seville Antonio Ruiz-Cortés, University of Seville | |
Asynchronous Technical Interviews: Reducing the Effect of Supervised Think-Aloud on Communication Ability | Mahnaz (Mana) Behroozi, IBM; et al. Chris Brown, North Carolina State University Chris Parnin, Virginia Tech | |
SPINE: A Scalable Log Parser with Feedback Guidance | Xuheng Wang, Tsinghua University; et al. Xu Zhang, Microsoft Liqun Li, Microsoft Shilin He, Microsoft Hongyu Zhang, University of Newcastle Yudong Liu, Microsoft Lingling Zheng, Microsoft Yu Kang, Microsoft Qingwei Lin, Microsoft Yingnong Dang, Microsoft Saravan Rajmohan, Microsoft Dongmei Zhang, Microsoft | |
First Come First Served: The Impact of File Position on Code Review | Enrico Fregnan, University of Zurich; et al. Larissa Braz, University of Zurich Marco D'Ambros, USI Lugano Gül Calikli, University of Glasgow Alberto Bacchelli, University of Zurich | |
ICML Machine Learning | Understanding Dataset Difficulty with V-Usable Information | Kawin Ethayarajh, Stanford University; et al. Yejin Choi, Stanford University Swabha Swayamdipta, Allen Institute for Artificial Intelligence |
Do Differentiable Simulators Give Better Policy Gradients? | Hyung Ju Suh, Massachusetts Institute of Technology; et al. Max Simchowitz, Massachusetts Institute of Technology Kaiqing Zhang, Massachusetts Institute of Technology Russ Tedrake, Massachusetts Institute of Technology | |
The Importance of Non-Markovianity in Maximum State Entropy Exploration | Mirco Mutti, Politecnico di Milano; et al. Riccardo De Santi, ETH Zurich Marcello Restelli, Politecnico di Milano | |
G-Mixup: Graph Data Augmentation for Graph Classification | Xiaotian Han, Texas A&M University; et al. Zhimeng Jiang, Texas A&M University Ninghao Liu, University of Georgia Xia Hu, Rice University | |
Privacy for Free: How does Dataset Condensation Help Privacy? | Tian Dong, Shanghai Jiao Tong University; et al. Bo Zhao, University of Edinburgh Lingjuan Lyu, Sony AI | |
Stable Conformal Prediction Sets | Eugene Ndiaye, Georgia Institute of Technology | |
Bayesian Model Selection, the Marginal Likelihood, and Generalization | Sanae Lotfi, New York University; et al. Pavel Izmailov, New York University Gregory Benton, New York University Micah Goldblum, New York University Andrew Wilson, New York University | |
Solving Stackelberg Prediction Game with Least Squares Loss via Spherically Constrained Least Squares Reformulation | Jiali Wang, Fudan University; et al. Wen Huang, Xiamen University Rujun Jiang, Fudan University Xudong Li, Fudan University Alex Wang, Carnegie Mellon University | |
Learning Mixtures of Linear Dynamical Systems | Yanxi Chen & H. Vincent Poor, Princeton University | |
Causal Conceptions of Fairness and their Consequences | Hamed Nilforoshan, Stanford University; et al. Johann Gaebler, Stanford University Ravi Shroff, New York University Sharad Goel, Harvard University | |
ICSE Software Engineering | TOGA: A Neural Method for Test Oracle Generation | Elizabeth Dinella, University of Pennsylvania; et al. Gabriel Ryan, Columbia University Todd Mytkowicz, Microsoft Shuvendu K. Lahiri, Microsoft |
SymTuner: Maximizing the Power of Symbolic Execution by Adaptively Tuning External Parameters | Sooyoung Cha, Sungkyunkwan University; et al. Myungho Lee, Korea University Seokhyun Lee, Korea University Hakjoo Oh, Korea University | |
What Makes a Good Commit Message? | Tian Yingchen, Beijing Institute of Technology; et al. Yuxia Zhang, Beijing Institute of Technology Klaas-Jan Stol, University College Cork Lin Jiang, Beijing Institute of Technology Hui Liu, Beijing Institute of Technology | |
Collaboration Challenges in Building ML-Enabled Systems: Communication, Documentation, Engineering, and Process | Nadia Nahar, Carnegie Mellon University; et al. Shurui Zhou, University of Toronto Grace Lewis, Carnegie Mellon University Christian Kästner, Carnegie Mellon University | |
Did You Miss My Comment or What?" Understanding Toxicity in Open Source Discussions | Courtney Miller, Carnegie Mellon University; et al. Sophie Cohen, Wesleyan University Daniel Klug, Carnegie Mellon University Bogdan Vasilescu, Carnegie Mellon University Christian Kästner, Carnegie Mellon University | |
"This Is Damn Slick!" Estimating the Impact of Tweets on Open Source Project Popularity and New Contributors | Hongbo Fang, Carnegie Mellon University; et al. Hemank Lamba, Carnegie Mellon University Jim Herbsleb, Carnegie Mellon University Bogdan Vasilescu, Carnegie Mellon University | |
Efficient Online Testing for DNN-Enabled Systems using Surrogate-Assisted and Many-Objective Optimization | Fitash Ul Haq, University of Luxembourg; et al. Donghwan Shin, University of Luxembourg Lionel Briand, University of Luxembourg | |
PUS: A Fast and Highly Efficient Solver for Inclusion-based Pointer Analysis | Peiming Liu, Texas A&M University; et al. Yanze Li, Texas A&M University Bradley Swain, Texas A&M University Jeff Huang, Texas A&M University | |
Diversity-Driven Automated Formal Verification | Emily First & Yuriy Brun, University of Massachusetts Amherst | |
IJCAI Artificial Intelligence | DESPOT: Online POMDP Planning with Regularization | Nan Ye, Queensland University of Technology; et al. Adhiraj Somani, National University of Singapore David Hsu, National University of Singapore Wee Sun Lee, National University of Singapore |
INFOCOM Networking | ChARM: NextG Spectrum Sharing Through Data-Driven Real-Time O-RAN Dynamic Control | Luca Baldesi, Northeastern University; et al. Francesco Restuccia, Northeastern University Tommaso Melodia, Northeastern University |
PreGAN: Preemptive Migration Prediction Network for Proactive Fault-Tolerant Edge Computing | Shreshth Tuli, Imperial College London; et al. Giuliano Casale, Imperial College London Nicholas Jennings, Loughborough University | |
ISCA Architecture | NvMR: Non-Volatile Memory Renaming for Intermittent Computing | Abhishek Bhattacharyya, University of Wisconsin–Madison; et al. Abhijith Somashekhar, Apple Joshua San Miguel, University of Wisconsin–Madison |
KDD Data Mining | Learning Causal Effects on Hypergraphs | Jing Ma, University of Virginia; et al. Mengting Wan, Microsoft Longqi Yang, Microsoft Jundong Li, University of Virginia Brent Hecht, Microsoft Jaime Teevan, Microsoft |
MOBICOM Mobile | Magnetoelectric Backscatter Communication for Millimeter-Sized Wireless Biomedical Implants | Zhanghao Yu, Rice University; et al. Fatima T. Alrashdan, Rice University Jacob T. Robinson, Rice University Kaiyuan Yang, Rice University |
NeurIPS Machine Learning | Is Out-of-distribution Detection Learnable? | Zhen Fang, University of Technology Sydney; et al. Yixuan Li, University of Wisconsin–Madison Jie Lu, University of Technology Sydney Jiahua Dong, ETH Zurich Bo Han, Hong Kong Baptist University Feng Liu, University of Technology Sydney |
Photorealistic Text-to-Image Diffusion Models with Deep Language Understanding | Chitwan Saharia, Google; et al. William Chan, Google Saurabh Saxena, Google Lala Li, Google Jay Whang, Google Emily Denton, Google Seyed Kamyar, Google Seyed Ghasemipour, Google Burcu Karagol Ayan, Google S. Sara Mahdavi, Google Raphael Gontijo-Lopes, Google Tim Salimans, Google Jonathan Ho, Google David J Fleet, Google Mohammad Norouzi, Google | |
Elucidating the Design Space of Diffusion-Based Generative Models | Tero Karras, NVIDIA; et al. Miika Aittala, NVIDIA Timo Aila, NVIDIA Samuli Laine, NVIDIA | |
ProcTHOR: Large-Scale Embodied AI Using Procedural Generation | Matt Deitke, Allen Institute for Artificial Intelligence; et al. Eli VanderBilt, Allen Institute for Artificial Intelligence Alvaro Herrasti, Allen Institute for Artificial Intelligence Luca Weihs, Allen Institute for Artificial Intelligence Jordi Salvador, Allen Institute for Artificial Intelligence Kiana Ehsani, Allen Institute for Artificial Intelligence Winson Han, Allen Institute for Artificial Intelligence Eric Kolve, Allen Institute for Artificial Intelligence Ali Farhadi, University of Washington Aniruddha Kembhavi, Allen Institute for Artificial Intelligence Roozbeh Mottaghi, Allen Institute for Artificial Intelligence | |
Using natural language and program abstractions to instill human inductive biases in machines | Sreejan Kumar, Princeton University; et al. Carlos G Correa, Princeton University Ishita Dasgupta, DeepMind Raja Marjieh, Princeton University Michael Hu, Princeton University Robert D. Hawkins, Princeton University Jonathan Cohen, Princeton University Nathaniel Daw, Princeton University Karthik R Narasimhan, Princeton University Thomas L. Griffiths, Princeton University | |
A Neural Corpus Indexer for Document Retrieval | Yujing Wang, Microsoft; et al. Yingyan Hou, Tsinghua University Haonan Wang, University of Illinois at Urbana Champaign Ziming Miao, Microsoft Shibin Wu, Tsinghua University Hao Sun, Peking University Qi Chen, Microsoft Yuqing Xia, Microsoft Chengmin Chi, Microsoft Guoshuai Zhao, Microsoft Zheng Liu, Microsoft Xing Xie, Microsoft Hao Sun, Microsoft Weiwei Deng, Microsoft Qi Zhang, Microsoft Mao Yang, Microsoft | |
High-dimensional limit theorems for SGD: Effective dynamics and critical scaling | Gerard Ben Arous, New York University; et al. Reza Gheissari, Northwestern University Aukosh Jagannath, University of Waterloo | |
Riemannian Score-Based Generative Modelling | Valentin De Bortoli, National Center for Scientific Research; et al. Emile Mathieu, University of Cambridge Michael John Hutchinson, University of Oxford James Thornton, University of Oxford Yee Whye Teh, University of Oxford Arnaud Doucet, University of Oxford | |
Gradient Estimation with Discrete Stein Operators | Jiaxin Shi, Stanford University; et al. Yuhao Zhou, Tsinghua University Jessica Hwang, Stanford University Michalis Titsias, Deepmind Lester Mackey, Microsoft | |
An empirical analysis of compute-optimal large language model training | Jordan Hoffmann, Deepmind; et al. Sebastian Borgeaud, Deepmind Arthur Mensch, Deepmind Elena Buchatskaya, Deepmind Trevor Cai, Deepmind Eliza Rutherford, Deepmind Diego de las Casas, Deepmind Lisa Anne Hendricks, Deepmind Johannes Welbl, Deepmind Aidan Clark, Deepmind Tom Hennigan, Deepmind Eric Noland, Deepmind Katherine Millican, Deepmind George van den Driessche, Deepmind Bogdan Damoc, Deepmind Aurelia Guy, Deepmind Simon Osindero, Deepmind Karen Simonyan, Deepmind Erich Elsen, Deepmind Oriol Vinyals, Deepmind Jack William Rae, Deepmind Laurent Sifre, Deepmind | |
Beyond neural scaling laws: beating power law scaling via data pruning | Ben Sorscher, Stanford University; et al. Robert Geirhos, University of Tübingen Shashank Shekhar, Meta Surya Ganguli, Stanford University Ari S. Morcos, Meta | |
On-Demand Sampling: Learning Optimally from Multiple Distributions | Nika Haghtalab, University of California, Berkeley; et al. Michael Jordan, University of California, Berkeley Eric Zhao, University of California, Berkeley | |
NSDI Networking | Packet Order Matters! Improving Application Performance by Deliberately Delaying Packets | Hamid Ghasemirahni, Royal Institute of Technology; et al. Tom Barbette, Royal Institute of Technology Georgios P. Katsikas, Royal Institute of Technology Alireza Farshin, Royal Institute of Technology Amir Roozbeh, KTH Royal Institute of Technology and Ericsson Research Massimo Girondi, Royal Institute of Technology Marco Chiesa, Royal Institute of Technology Gerald Q. Maguire Jr., Royal Institute of Technology Dejan Kostić, Royal Institute of Technology |
Graham: Synchronizing Clocks by Leveraging Local Clock Properties | Ali Najafi, Meta Michael Wei, VMware Inc. | |
Learning to Communicate Effectively Between Battery-free Devices | Kai Geissdoerfer & Marco Zimmerling, TU Dresden | |
OSDI Operating Systems | XRP: In-Kernel Storage Functions with eBPF | Yuhong Zhong, Columbia University; et al. Haoyu Li, Columbia University Yu Jian Wu, Columbia University Ioannis Zarkadas, Columbia University Jeffrey Tao, Columbia University Evan Mesterhazy, Columbia University Michael Makris, Columbia University Junfeng Yang, Columbia University Amy Tai, Google Ryan Stutsman, University of Utah Asaf Cidon, Columbia University |
MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly Runtime | Chenxi Wang, University of California, Los Angeles; et al. Haoran Ma, University of California, Los Angeles Shi Liu, University of California, Los Angeles Yifan Qiao, University of California, Los Angeles Jonathan Eyolfson, University of California, Los Angeles Christian Navasca, University of California, Los Angeles Shan Lu, University of Chicago Guoqing Harry Xu, University of California, Los Angeles | |
PLDI Programming Languages | Finding Typing Compiler Bugs | Stefanos Chaliasos, Imperial College London; et al. Thodoris Sotiropoulos, Athens University of College and Business Diomidis Spinellis, Athens University of College and Business Arthur Gervais, Imperial College London Ben Livshits, Imperial College London Dimitris Mitropoulos, University of Athens |
Kleene Algebra Modulo Theories: A Framework for Concrete KATs | Michael Greenberg, Stevens Institute of Technology; et al. Ryan Beckett, Microsoft Eric Campbel, Cornell University | |
Low-Latency, High-Throughput Garbage Collection | Wenyu Zhao, Australian National University; et al. Steve Blackburn, Google Kathryn S McKinley, Google | |
RustHornBelt: A Semantic Foundation for Functional Verification of Rust Programs with Unsafe Code | Yusuke Matsushita, The University of Tokyo; et al. Xavier Denis, Paris-Saclay University Jacques-Henri Jourdan, Paris-Saclay University Derek Dreyer, Max Planck Institute for Software Systems | |
Synthesizing Analytical SQL Queries from Computation Demonstration | Xiangyu Zhou, University of Washington; et al. Rastislav Bodík, University of Washington Alvin Cheung, University of California, Berkeley Chenglong Wang, University of Washington | |
Visualization Question Answering Using Introspective Program Synthesis | Yanju Chen, University of California, Santa Barbara; et al. Xifeng Yan, University of California, Santa Barbara Yu Feng, University of California, Santa Barbara | |
PODS Databases | Convergence of Datalog over (Pre-) Semirings | Mahmoud Abo Khamis, relationalAI; et al. Hung Q. Ngo, relationalAI Reinhard Pichler, TU Wien Dan Suciu, University of Washington Yisu Remy Wang, University of Washington |
Optimal Bounds for Approximate Counting | Jelani Nelson, University of California, Berkeley Huacheng Yu, Princeton University | |
S&P Security and Privacy | Four Attacks and a Proof for Telegram | Martin R. Albrecht, University of London; et al. Lenka Mareková, University of London Kenneth G. Paterson, ETH Zurich Igors Stepanovs, ETH Zurich |
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions | Hammond Pearce, New York University; et al. Baleegh Ahmad, New York University Benjamin Tan, New York University Brendan Dolan-Gavitt, New York University Ramesh Karri, New York University | |
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices | Haoqi Shan, University of Florida; et al. Boyi Zhang, University of Florida Zihao Zhan, University of Florida Dean Sullivan, University of New Hampshire Shuo Wang, University of Florida Yier Jin, University of Florida | |
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects | Dominik Wermke, CISPA; et al. Noah Woehler, CISPA Jan H. Klemmer, Leibniz University Hannover Marcel Fourné, Max Planck Institute for Security and Privacy Yasemin Acar, George Washington University Sascha Fahl, CISPA | |
SIGCOMM Networking | Software-Defined Network Assimilation: Bridging the Last Mile Towards Centralized Network Configuration Management with NAssim | Huangxun Chen, Huawei Theory Lab; et al. Yukai Miao, University of New South Wales Li Chen, Zhongguancun Laboratory Haifeng Sun, Beijing University of Posts and Telecommunications Hong Xu, The Chinese University of Hong Kong Libin Liu, Shandong Computer Science Center Gong Zhang, Huawei Theory Lab Wei Wang, Hong Kong University of Science and Technology |
SIGGRAPH Graphics | Image Features Influence Reaction Time: A Learned Probabilistic Perceptual Model for Saccade Latency | Budmonde Duinkharjav, New York University; et al. Praneeth Chakravarthula, Princeton University Rachel Brown, NVIDIA Anjul Patney, NVIDIA Qi Sun, New York University |
CLIPasso: Semantically Aware Object Sketching | Yael Vinker, Tel Aviv University; et al. Ehsan Pajouheshgar, École Polytechnique Fédérale de Lausanne Jessica Y. Bo, École Polytechnique Fédérale de Lausanne Roman Christian Bachmann, École Polytechnique Fédérale de Lausanne Amit Bermano, Tel Aviv University Daniel Cohen-Or, Tel Aviv University Amir Zamir, École Polytechnique Fédérale de Lausanne Ariel Shamir, Reichman University | |
Instant Neural Graphics Primitives with a Multiresolution Hash Encoding | Thomas Müller, NVIDIA; et al. Alex Evans, NVIDIA Christoph Schied, NVIDIA Alexander Keller, NVIDIA | |
Spelunking the Deep: Guaranteed Queries on General Neural Implicit Surfaces | Nicholas Sharp & Alec Jacobson, University of Toronto | |
DeepPhase: Periodic Autoencoders for Learning Motion Phase Manifolds | Sebastian Starke, University of Edinburgh; et al. Ian Mason, University of Edinburgh Taku Komura, University of Hong Kong | |
SIGIR Information Retrieval | A Non-Factoid Question-Answering Taxonomy | Valeriia Bolotova, RMIT University; et al. Vladislav Blinov, Ural Federal University Falk Scholer, RMIT University Bruce Croft, University of Massachusetts Amherst Mark Sanderson, RMIT University |
SIGMETRICS Performance | WISEFUSE: Workload Characterization and DAG Transformation for Serverless Workflows | Ashraf Mahgoub, Purdue University; et al. Edgardo Barsallo Yi, Purdue University Karthick Shankar, Carnegie Mellon University Eshaan Minocha, Purdue University Somali Chaterji, Purdue University Sameh Elnikety, Microsoft Saurabh Bagchi, Purdue University |
SIGMOD Databases | R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys | Wei Dong, Hong Kong University of Science and Technology; et al. Juanru Fang, Hong Kong University of Science and Technology Ke Yi, Hong Kong University of Science and Technology Yuchao Tao, Duke University Ashwin Machanavajjhala, Duke University |
SODA Theory | New Diameter-Reducing Shortcuts and Directed Hopsets: Breaking the √n Barrie | Shimon Kogan & Merav Parter, Weizmann Institute of Science |
STOC Theory | Locally testable codes with constant rate, distance, and locality | Irit Dinur, Weizmann Institute of Science; et al. Shai Evra, Hebrew University of Jerusalem Ron Livne, Hebrew University of Jerusalem Alexander Lubotzky, Weizmann Institute of Science Shahar Mozes, Hebrew University of Jerusalem |
Asymptotically good Quantum and locally testable classical LDPC codes | Pavel Panteleev & Gleb Kalachev, Moscow State University | |
UIST User Interface | CrossA11y: Identifying Video Accessibility Issues via Cross-modal Grounding | Xingyu 'Bruce' Liu, University of California, Los Angeles; et al. Ruolin Wang, University of California, Los Angeles Dingzeyu Li, Adobe Xiang 'Anthony' Chen, University of California, Los Angeles Amy Pavel, University of Texas at Austin |
Grid-Coding: An Accessible, Efficient, and Structured Coding Paradigm for Blind and Low-Vision Programmers | Md Ehtesham-Ul-Haque, Pennsylvania State University; et al. Syed Mostofa Monsur, Bangladesh University of Engineering and Technology Syed Masum Billah, Pennsylvania State University | |
Prototyping Soft Devices with Interactive Bioplastics | Marion Koelle, University of Duisburg-Essen; et al. Madalina Luciana Nicolae, Saarland University Aditya Shekhar Nittala, Saarland University Marc Teyssier, De Vinci Research Center Jürgen Steimle, Saarland University | |
VLDB Databases | Sancus: Staleness-Aware Communication-Avoiding Full-Graph Decentralized Training in Large-Scale Graph Neural Networks | Jingshu Peng, Hong Kong University of Science and Technology; et al. Zhao Chen, Hong Kong University of Science and Technology Yingxia Shao, BUPT Yanyan Shen, Shanghai Jiao Tong University Lei Chen, Hong Kong University of Science and Technology Jiannong Cao, The Hong Kong Polytechnic University |
Accurate Summary-based Cardinality Estimation Through the Lens of Cardinality Estimation Graphs | Jeremy Chen, University of Waterloo; et al. Yuqing Huang, University of Waterloo Mushi Wang, University of Waterloo Semih Salihoglu, University of Waterloo Kenneth Salem, University of Waterloo | |
HET: Scaling out Huge Embedding Model Training via Cache-enabled Distributed Framework | Xupeng Miao, Peking University; et al. Hailin Zhang, Peking University Yining Shi, Peking University Xiaonan Nie, Peking University Zhi Yang, Peking University Yangyu Tao, Tencent Bin Cui, Peking University | |
Hardware Acceleration of Compression and Encryption in SAP HANA | Monica Chiosa, ETH Zurich; et al. Fabio Maschi, ETH Zurich Ingo Müller, Google Gustavo Alonso, ETH Zurich Norman May, SAP SE | |
WWW World Wide Web | PaSca: a Graph Neural Architecture Search System under the Scalable Paradigm | Wentao Zhang, Peking University; et al. Yu Shen, Peking University Zheyu Lin, Peking University Yang Li, Peking University Xiaosen Li, Tencent Wen Ouyang, Tencent Yangyu Tao, Tencent Zhi Yang, Peking University Bin Cui, Peking University |
Rewiring what-to-watch-next Recommendations to Reduce Radicalization Pathways | Francesco Fabbri, Pompeu Fabra University; et al. Yanhao Wang, East China Normal University Francesco Bonchi, Fondazione ISI Carlos Castillo, ICREA and Universitat Pompeu Fabra Michael Mathioudakis, University of Helsinki |
2021 | ||
---|---|---|
AAAI Artificial Intelligence | Informer: Beyond Efficient Transformer for Long Sequence Time-Series Forecasting | Haoyi Zhou, Beihang University; et al. Shanghang Zhang, University of California, Berkeley Jieqi Peng, Beihang University Shuai Zhang, Beihang University Jianxin Li, Beihang University Hui Xiong, Rutgers University Wancai Zhang, Beijing Guowang Fuda Science & Technology Development Company |
Exploration-Exploitation in Multi-Agent Learning: Catastrophe Theory Meets Game Theory | Stefanos Leonardos & Georgios Piliouras, Singapore University of Technology and Design | |
ACL Natural Language Processing | Vocabulary Learning via Optimal Transport for Neural Machine Translation | Jingjing Xu, ByteDance; et al. Hao Zhou, ByteDance Chun Gan, ByteDance Zaixiang Zheng, ByteDance Lei Li, ByteDance |
CHI Human-Computer Interaction | What Do Hackathons Do? Understanding Participation in Hackathons Through Program Theory Analysis | Jeanette Falk, Aarhus University; et al. Gopinaath Kannabiran, University of Copenhagen Nicolai Brodersen Hansen, Aalborg University |
Falx: Synthesis-Powered Visualization Authoring | Chenglong Wang, University of Washington; et al. Yu Feng, University of California, Santa Barbara Rastislav Bodik, University of Washington Isil Dillig, University of Texas at Austin Alvin Cheung, University of California, Berkeley Amy J Ko, University of Washington | |
"Can I Not Be Suicidal on a Sunday?": Understanding Technology-Mediated Pathways to Mental Health Support | Sachin R Pendse, Georgia Institute of Technology; et al. Amit Sharma, Microsoft Aditya Vashistha, Cornell University Munmun De Choudhury, Georgia Institute of Technology Neha Kumar, Georgia Institute of Technology | |
CapContact: Super-resolution Contact Areas from Capacitive Touchscreens | Paul Streli & Christian Holz, ETH Zurich | |
RadarNet: Efficient Gesture Recognition Technique Utilizing a Miniaturized Radar Sensor | Eiji Hayashi, Google; et al. Jaime Lien, Google Nicholas Gillian, Google Leonardo Giusti, Google Dave Weber, Google Jin Yamanaka, Google Lauren Bedal, Google Ivan Poupyrev, Google | |
Screen Recognition: Creating Accessibility Metadata for Mobile Applications from Pixels | Xiaoyi Zhang, Apple; et al. Lilian de Greef, Apple Amanda Swearngin, Apple Samuel White, Apple Kyle Murray, Apple Lisa Yu, Apple Qi Shan, Apple Jeffrey Nichols, Apple Jason Wu, Apple Chris Fleizach, Apple Aaron Everitt, Apple Jeffrey P Bigham, Apple | |
LGBTQ Persons' Pregnancy Loss Disclosures to Known Ties on Social Media: Disclosure Decisions and Ideal Disclosure Environments | Cassidy Pyle, University of Michigan; et al. Lee Roosevelt, University of Michigan Ashley Lacombe-Duncan, University of Michigan Nazanin Andalibi, University of Michigan | |
Increasing Electrical Muscle Stimulation's Dexterity by means of Back of the Hand Actuation | Akifumi Takahashi, University of Chicago; et al. Jas Brooks, University of Chicago Hiroyuki Kajimoto, The University of Electro-Communications Pedro Lopes, University of Chicago | |
Designing Menstrual Technologies with Adolescents | Marie Louise Juul Søndergaard, Royal Institute of Technology; et al. Marianela Ciolfi Felice, Royal Institute of Technology Madeline Balaam, Royal Institute of Technology | |
The Show Must Go On: A conceptual model of conducting synchronous participatory design with children online | Kung Jin Lee, University of Washington; et al. Wendy Roldan, University of Washington Tian Qi Zhu, University of Washington Harkiran Kaur Saluja, University of Washington Sungmin Na, University of Washington Britnie Chin, University of Washington Yilin Zeng, University of Washington Jin Ha Lee, University of Washington Jason Yip, University of Washington | |
Building for 'We': Safety Settings for Couples with Memory Concerns | Nora McDonald & Helena M. Mentis, University of Maryland, Baltimore County | |
Oh, Snap! A Fabrication Pipeline to Magnetically Connect Conventional and 3D-Printed Electronics | Martin Schmitz, TU Darmstadt; et al. Jan Riemann, TU Darmstadt Florian Müller, TU Darmstadt Steffen Kreis, TU Darmstadt Max Mühlhäuser, TU Darmstadt | |
Getting Ourselves Together: Data-centered participatory design research & epistemic burden | Jennifer Pierre, University of California, Los Angeles; et al. Roderic Crooks, University of California, Irvine Morgan Currie, University of Edinburgh Britt Paris, Rutgers University Irene Pasquetto, University of Michigan | |
"Everyone wants to do the model work, not the data work": Data Cascades in High-Stakes AI | Nithya Sambasivan, Google; et al. Shivani Kapania, Google Hannah Highfill, Google Diana Akrong, Google Praveen Paritosh, Google Lora M Aroyo, Google | |
Resisting the Medicalisation of Menopause: Reclaiming the Body through Design | Marianela Ciolfi Felice, Royal Institute of Technology; et al. Marie Louise Juul Søndergaard, Royal Institute of Technology Madeline Balaam, Royal Institute of Technology | |
U!Scientist: Designing for People-Powered Research in Museums | Mmachi God'sglory Obiorah, Northwestern University; et al. James K.L. Hammerman, Terc Becky Rother, Adler Planetarium Will Granger, Adler Planetarium Haley Margaret West, Northwestern University Michael Horn, Northwestern University Laura Trouille, Zooniverse & Adler Planetarium | |
"Why lose control?" A Study of Freelancers' Perspectives with Gig Economy Platforms | Juan Carlos Alvarez de la Vega, Northumbria University; et al. Marta E. Cecchinato, Northumbria University John Rooksby, Northumbria University | |
"That courage to encourage": Participation and Aspirations in Chat-based Peer Support for Youth Living with HIV | Naveena Karusala, University of Washington; et al. David Odhiambo Seeh, Kenyatta National Hospital Cyrus Mugo, Kenyatta National Hospital Brandon Guthrie, University of Washington Megan A Moreno, University of Wisconsin–Madison Grace John-Stewart, University of Washington Irene Inwani, Kenyatta National Hospital Richard Anderson, University of Washington Keshet Ronen, University of Washington | |
The Ethics of Multiplayer Game Design and Community Management: Industry Perspectives and Challenges | Lucy A. Sparrow, University of Melbourne; et al. Martin Gibbs, University of Melbourne Michael Arnold, University of Melbourne | |
Coupling Simulation and Hardware for Interactive Circuit Debugging | Evan Strasnick, Stanford University; et al. Maneesh Agrawala, Stanford University Sean Follmer, Stanford University | |
Impact of Task on Attentional Tunneling in Handheld Augmented Reality | Brandon Victor Syiem, University of Melbourne; et al. Ryan M. Kelly, University of Melbourne Jorge Goncalves, University of Melbourne Eduardo Velloso, University of Melbourne Tilman Dingler, University of Melbourne | |
XRgonomics: Facilitating the Creation of Ergonomic 3D Interfaces | João Marcelo Evangelista Belo, Aarhus University; et al. Anna Maria Feit, ETH Zurich Tiare Feuchtner, Aarhus University Kaj Grønbæk, Aarhus University | |
Heuristic Evaluation of Conversational Agents | Raina Langevin, University of Washington; et al. Ross J Lordon, Microsoft Thi Avrahami, Rulai Benjamin R. Cowan, University College Dublin Tad Hirsch, Northeastern University Gary Hsieh, University of Washington | |
Clandestino or Rifugiato? Anti-immigration Meta Ad Targeting in Italy | Arthur Capozzi, University of Washington; et al. Gianmarco De Francisci Morales, Microsoft Yelena Mejova, Rulai Corrado Monti, University College Dublin André Panisson, Northeastern University Daniela Paolotti, University of Washington | |
The Landscape and Gaps in Open Source Fairness Toolkits | Michelle Seng Ah Lee & Jatinder Singh, University of Cambridge | |
Understanding Data Accessibility for People with Intellectual and Developmental Disabilities | Keke Wu, University of Colorado Boulder; et al. Emma Petersen, University of Colorado Boulder Tahmina Ahmad, University of Colorado Boulder David Burlinson, University of Colorado Boulder Shea Tanis, University of Colorado Boulder Danielle Albers Szafir, University of Colorado Boulder | |
How to Evaluate Object Selection and Manipulation in VR? Guidelines from 20 Years of Studies | Joanna Bergström, University of Copenhagen; et al. Tor-Salve Dalsgaard, University of Copenhagen Jason Alexander, University of Bath Kasper Hornbæk, University of Copenhagen | |
Designing Interactive Transfer Learning Tools for ML Non-Experts | Swati Mishra & Jeffrey M Rzeszotarski, Cornell University | |
CIKM Knowledge Management | RxNet: Rx-refill Graph Neural Network for Overprescribing Detection | Jianfei Zhang, Case Western Reserve University; et al. Ai-Te Kuo, Auburn University Jianan Zhao, Case Western Reserve University Qianlong Wen, Case Western Reserve University Erin Winstanley, West Virginia University Chuxu Zhang, Brandeis University Yanfang Ye, Case Western Reserve University |
CVPR Computer Vision | GIRAFFE: Representing Scenes as Compositional Generative Neural Feature Fields | Michael Niemeyer & Andreas Geiger, Max Planck Institute for Intelligent Systems |
FOCS Theory | Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits | Nutan Limaye, Indian Institute of Technology Kanpur; et al. Srikanth Srinivasan, Aarhus University Sébastien Tavenas, Université Grenoble Alpes |
FSE Software Engineering | A longitudinal analysis of bloated Java dependencies | César Soto-Valero, Royal Institute of Technology; et al. Thomas Durieux, Royal Institute of Technology Benoit Baudry, Royal Institute of Technology |
AlloyMax: bringing maximum satisfaction to relational specifications | Changjian Zhang, Carnegie Mellon University; et al. Ryan Wagner, Carnegie Mellon University Pedro Orvalho, INESC-ID/IST David Garlan, Carnegie Mellon University Vasco Manquinho, INESC-ID/IST Ruben Martins, Carnegie Mellon University Eunsuk Kang, Carnegie Mellon University | |
Bias in machine learning software: why? how? what to do? | Joymallya Chakraborty, North Carolina State University; et al. Suvodeep Majumder, North Carolina State University Tim Menzies, North Carolina State University | |
Efficient Module-Level Dynamic Analysis for Dynamic Languages with Module Recontextualization | Nikos Vasilakis, Massachusetts Institute of Technology; et al. Grigoris Ntousakis, TU Crete Veit Heller, Independent Researcher Martin C. Rinard, Massachusetts Institute of Technology | |
Probabilistic Delta Debugging | Guancheng Wang, Peking University; et al. Ruobing Shen, Peking University Junjie Chen, Tianjin University Yingfei Xiong, Peking University Lu Zhang, Peking University | |
Semantic Bug Seeding: A Learning-Based Approach for Creating Realistic Bugs | Jibesh Patra & Michael Pradel, University of Stuttgart | |
SmartCommit: A Graph-Based Interactive Assistant for Activity-Oriented Commits | Bo Shen, Peking University; et al. Wei Zhang, Peking University Christian Kästner, Carnegie Mellon University Haiyan Zhao, Peking University Zhao Wei, Huawei Guangtai Liang, Huawei Zhi Jin, Peking University | |
Vet: Identifying and Avoiding UI Exploration Tarpits | Wenyu Wang, University of Illinois at Urbana–Champaign; et al. Wei Yang, University of Texas at Dallas Tianyin Xu, University of Illinois at Urbana–Champaign Tao Xie, Peking University | |
ICCV Computer Vision | Swin Transformer: Hierarchical Vision Transformer using Shifted Windows | Ze Liu, Microsoft; et al. Yutong Lin, Microsoft Yue Cao, Microsoft Han Hu, Microsoft Yixuan Wei, Microsoft Zheng Zhang, Microsoft Stephen Lin, Microsoft Baining Guo, Microsoft |
ICML Machine Learning | Unbiased Gradient Estimation in Unrolled Computation Graphs with Persistent Evolution Strategies | Paul Vicol, University of Toronto; et al. Luke Metz, Google Jascha Sohl-Dickstein, Google |
ICSE Software Engineering | ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Apps | Xian Zhan, Hong Kong Polytechnic Institute; et al. Lingling Fan, Nankai University Sen Chen, Tianjin University Feng Wu, Nanyang Technological University Tianming Liu, Monash University Xiapu Luo, Hong Kong Polytechnic Institute Yang Liu, Nanyang Technological University |
Automated Query Reformulation for Efficient Search Based on Query Logs from Stack Overflow | Kaibo Cao, Nanjing University; et al. Chunyang Chen, Monash University Sebastian Baltes, University of Adelaide Christoph Treude, University of Adelaide Xiang Chen, Nantong University | |
CodeShovel: Constructing Method-Level Source Code Histories | Felix Grund, University of British Columbia; et al. Shaiful Alam Chowdhury, University of British Columbia Nick Bradley, University of British Columbia Braxton Hall, University of British Columbia Reid Holmes, University of British Columbia | |
Hero: On the Chaos When PATH Meets Modules | Ying Wang, Northeastern University China; et al. Liang Qiao, Northeastern University China Chang Xu, Nanjing University Yepang Liu, Southern University of Science and Technology Shing-Chi Cheung, Hong Kong University of Science and Technology Na Meng, Virginia Tech Hai Yu, Northeastern University Zhiliang Zhu, Northeastern University China | |
"How Was Your Weekend?" Software Development Teams Working From Home During COVID-19 | Courtney Miller, New College of Florida; et al. Paige Rodeghero, Clemson University Margaret-Anne Storey, University of Victoria Denae Ford, Microsoft Thomas Zimmermann, Microsoft | |
Improving Fault Localization by Integrating Value and Predicate Based Causal Inference Techniques | Yigit Kucuk, Case Western Reserve University; et al. Tim A. D. Henderson, Google Andy Podgurski, Case Western Reserve University | |
Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine | Frédéric Recoules, Paris-Saclay University; et al. Sébastien Bardin, Paris-Saclay University Richard Bonichon, Tweag I/O Matthieu Lemerre, Paris-Saclay University Laurent Mounier, Université Grenoble Alpes Marie-Laure Potet, Université Grenoble Alpes | |
JEST: N+1-version Differential Testing of Both JavaScript Engines and Specification | Jihyeok Park, KAIST; et al. Seungmin An, KAIST Dongjun Youn, KAIST Gyeongwon Kim, KAIST Sukyoung Ryu, KAIST | |
Program Comprehension and Code Complexity Metrics: An fMRI Study | Norman Peitek, Leibniz Institute for Neurobiology; et al. Sven Apel, Saarland University Chris Parnin, North Carolina State University André Brechmann, Leibniz Institute for Neurobiology Janet Siegmund, Chemnitz University of Technology | |
Synthesizing Object State Transformers for Dynamic Software Updates | Zelin Zhao, Nanjing University; et al. Yanyan Jiang, Nanjing University Chang Xu, Nanjing University Tianxiao Gu, Alibaba Group Xiaoxing Ma, Nanjing University | |
Traceability Transformed: Generating more Accurate Links with Pre-Trained BERT Models | Jinfeng Lin, University of Notre Dame; et al. Yalin Liu, University of Notre Dame Qingkai Zeng, University of Notre Dame Meng Jiang, University of Notre Dame Jane Cleland-Huang, University of Notre Dame | |
What Makes a Great Maintainer of Open Source Projects? | Edson Dias, Universidade Federal do Pará; et al. Paulo Meirelles, Reitoria da Unifesp Fernando Castor, Federal University of Pernambuco UFPE Igor Steinmacher, Federal University of Technology – Paraná Igor Wiese, Federal University of Technology – Paraná Gustavo Pinto, Universidade Federal do Pará | |
Why don't Developers Detect Improper Input Validation?'; DROP TABLE Papers; - | Larissa Braz, University of Zurich; et al. Enrico Fregnan, University of Zurich Gül Calikli, University of Zurich Alberto Bacchelli, University of Zurich | |
IJCAI Artificial Intelligence | Keep Your Distance: Land Division With Separation | Edith Elkind, University of Oxford; et al. Erel Segal-Halevi, Ariel University Warut Suksompong, National University of Singapore |
On the Relation Between Approximation Fixpoint Theory and Justification Theory | Simon Marynissen, Katholieke Universiteit Leuven; et al. Bart Bogaerts, Free University of Brussels Marc Denecker, Katholieke Universiteit Leuven | |
Learning Generalized Unsolvability Heuristics for Classical Planning | Simon Ståhlberg, Linköping University; et al. Guillem Francès, Pompeu Fabra University Jendrik Seipp, Linköping University | |
INFOCOM Networking | Uplink Multi-User Beamforming on Single RF Chain mmWave WLANs | Keerthi Priya Dasala, Rice University; et al. Josep M Jornet, Northeastern University Edward W. Knightly, Rice University |
mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO Systems | Yongce Chen, Virginia Tech; et al. Yubo Wu, Virginia Tech Thomas Hou, Virginia Tech Wenjing Lou, Virginia Tech | |
Exploiting Simultaneous Communications to Accelerate Data Parallel Distributed Deep Learning | Shaohuai Shi, Hong Kong University of Science and Technology; et al. Xiaowen Chu, Hong Kong Baptist University Bo Li, Hong Kong University of Science and Technology | |
KDD Data Mining | Fast and Memory-Efficient Tucker Decomposition for Answering Diverse Time Range Queries | Jun-gi Jang & U Kang, Seoul National University |
MOBICOM Mobile | mSAIL: Milligram-Scale Multi-Modal Sensor Platform for Monarch Butterfly Migration Tracking | Inhee Lee, University of Pittsburgh; et al. Roger Hsiao, University of Michigan Gordy Carichner, University of Michigan Chin-Wei Hsu, University of Michigan Mingyu Yang, University of Michigan Sara Shoouri, University of Michigan Katherine Ernst, University of Michigan Tess Carichner, University of Michigan Yuyang Li, University of Pittsburgh Jaechan Lim, University of Michigan Cole R. Julick, University of Nebraska–Lincoln Eunseong Moon, University of Michigan Yi Sun, University of Michigan Jamie Phillips, University of Delaware Kristi L. Montooth, University of Nebraska–Lincoln Delbert A. Green II, University of Michigan Hun-Seok Kim, University of Michigan David Blaauw, University of Michigan |
NeurIPS Machine Learning | A Universal Law of Robustness via Isoperimetry | Sébastien Bubeck, Microsoft Mark Sellke, Stanford University |
On the Expressivity of Markov Reward | David Abel, DeepMind; et al. Will Dabney, DeepMind Anna Harutyunyan, DeepMind Mark K. Ho, Princeton University Michael Littman, Brown University Doina Precup, DeepMind Satinder Singh, DeepMind | |
Deep Reinforcement Learning at the Edge of the Statistical Precipice | Rishabh Agarwal, Google; et al. Max Schwarzer, Université de Montréal Pablo Samuel Castro, Google Aaron Courville, Université de Montréal Marc G. Bellemare, Google | |
MAUVE: Measuring the Gap Between Neural Text and Human Text using Divergence Frontiers | Krishna Pillutla, University of Washington; et al. Swabha Swayamdipta, Allen Institute for Artificial Intelligence Rowan Zellers, University of Washington John Thickstun, Stanford University Sean Welleck, University of Washington Yejin Choi, Allen Institute for Artificial Intelligence Zaid Harchaoui, University of Washington | |
Continuized Accelerations of Deterministic and Stochastic Gradient Descents, and of Gossip Algorithms | Mathieu Even, Inria; et al. Raphaël Berthier, Inria Francis Bach, Inria Nicolas Flammarion, École Polytechnique Fédérale de Lausanne Pierre Gaillard, Université Grenoble Alpes Hadrien Hendrikx, Inria Laurent Massoulié, Inria Adrien Taylor, Inria | |
Moser Flow: Divergence-based Generative Modeling on Manifolds | Noam Rozen, Weizmann Institue of Science; et al. Aditya Grover, Meta Maximilian Nickel, Meta Yaron Lipman, Weizmann Institue of Science | |
Reduced, Reused and Recycled: The Life of a Dataset in Machine Learning Research | Bernard Koch, University of California, Los Angeles; et al. Emily Denton, Google Alex Hanna, Google Jacob Gates Foster, University of California, Los Angeles | |
ATOM3D: Tasks on Molecules in Three Dimensions | Raphael John Lamarre Townshend, Stanford University; et al. Martin Vögele, Stanford University Patricia Adriana Suriana, Stanford University Alexander Derry, Stanford University Alexander Powers, Stanford University Yianni Laloudakis, Stanford University Sidhika Balachandar, Stanford University Bowen Jing, Stanford University Brandon M. Anderson, University of Chicago Stephan Eismann, Stanford University Risi Kondor, Flatiron Institute Russ Altman, Stanford University Ron O. Dror, Stanford University | |
NSDI Networking | Segcache: a memory-efficient and scalable in-memory key-value cache for small objects | Juncheng Yang, Carnegie Mellon University; et al. Yao Yue, Twitter Rashmi Vinayak, Carnegie Mellon University |
ATP: In-network Aggregation for Multi-tenant Learning | ChonLam Lao, Tsinghua University; et al. Yanfang Le, University of Wisconsin–Madison Kshiteej Mahajan, University of Wisconsin–Madison Yixi Chen, Tsinghua University Wenfei Wu, Tsinghua University Aditya Akella, University of Wisconsin–Madison Michael Swift, University of Wisconsin–Madison | |
OSDI Operating Systems | MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation | Sam Kumar, University of California, Berkeley; et al. David E. Culler, University of California, Berkeley Raluca Ada Popa, University of California, Berkeley |
DistAI: Data-Driven Automated Invariant Learning for Distributed Protocols | Jianan Yao, Columbia University; et al. Runzhou Tao, Columbia University Ronghui Gu, Columbia University Jason Nieh, Columbia University Suman Jana, Columbia University Gabriel Ryan, Columbia University | |
Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep Learning | Aurick Qiao, Petuum; et al. Sang Keun Choe, Carnegie Mellon University Suhas Jayaram Subramanya, Carnegie Mellon University Willie Neiswanger, Petuum Qirong Ho, Petuum Hao Zhang, Petuum Gregory R. Ganger, Carnegie Mellon University Eric P. Xing, MBZUAI | |
PLDI Programming Languages | Alive2: Bounded Translation Validation for LLVM | Nuno P. Lopes, Microsoft; et al. Juneyoung Lee, Seoul National University Chung-Kil Hur, Seoul National University Zhengyang Liu, University of Utah John Regehr, University of Utah |
Cyclic Program Synthesis | Shachar Itzhaky, Technion – Israel Institute of Technology; et al. Hila Peleg, Technion – Israel Institute of Technology Nadia Polikarpova, University of California, San Diego Reuben N. S. Rowe, Royal Holloway University of London Ilya Sergey, Yale-NUS College | |
High Performance Correctly Rounded Math Libraries for 32-bit Floating Point Representations | Jay P. Lim & Santosh Nagarakatte, Rutgers University | |
Perceus: Garbage Free Reference Counting with Reuse | Alex Reinking, Microsoft; et al. Ningning Xie, University of Hong Kong Leonardo de Moura, Microsoft Daan Leijen, Microsoft | |
Quantum Abstract Interpretation | Nengkun Yu, University of Technology Sydney Jens Palsberg, University of California, Los Angeles | |
RefinedC: Automating the Foundational Verification of C Code with Refined Ownership Types | Michael Sammler, Max Planck Institute for Software Systems; et al. Rodolphe Lepigre, Max Planck Institute for Software Systems Robbert Krebbers, Radboud University Nijmegen Kayvan Memarian, University Of Cambridge Derek Dreyer, Max Planck Institute for Software Systems Deepak Garg, Max Planck Institute for Software Systems | |
Specification Synthesis with Constrained Horn Clauses | Sumanth Prabhu, TCS Research; et al. Grigory Fedyukovich, Florida State University Kumar Madhukar, TCS Research Deepak D'Souza, Indian Institute of Science Bangalore | |
Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study | Xiaolei Ren, University of Texas at Arlington; et al. Michael Ho, University of Texas at Arlington Jiang Ming, University of Texas at Arlington Jeff Yu Lei, University of Texas at Arlington Li Li, Monash University | |
PODS Databases | Relative Error Streaming Quantiles | Graham Cormode, University of Warwick; et al. Zohar Karnin, Amazon Edo Liberty, Pinecone Justin Thaler, Georgetown University Pavel Veselý, Charles University |
S&P Security and Privacy | Compositional Security for Reentrant Applications | Ethan Cecchetti, Cornell University; et al. Siqiu Yao, Cornell University Haobin Ni, Cornell University Andrew C. Myers, Cornell University |
Hardware-Software Contracts for Secure Speculation | Marco Guarnieri, IMDEA Software Institute; et al. Boris Köpf, Microsoft Jan Reineke, Saarland University Pepe Vila, IMDEA Software Institute | |
SIGCOMM Networking | Seven Years in the Life of Hypergiants' Off-Nets | Petros Gigis, University College London; et al. Matt Calder, Microsoft Lefteris Manassakis, FORTH-ICS George Nomikos, FORTH-ICS Vasileios Kotronis, FORTH-ICS Xenofontas Dimitropoulos, FORTH-ICS Ethan Katz-Bassett, Columbia University Georgios Smaragdakis, Delft University of Technology |
SIGIR Information Retrieval | Computationally Efficient Optimization of Plackett-Luce Ranking Models for Relevance and Fairness | Harrie Oosterhuis, Radboud University |
SIGMETRICS Performance | Nudge: Stochastically Improving upon FCFS | Isaac Grosof, Carnegie Mellon University; et al. Kunhe Yang, Tsinghua University Ziv Scully , Carnegie Mellon University Mor Harchol-Balter, Carnegie Mellon University |
SIGMOD Databases | Bao: Making Learned Query Optimization Practical | Ryan Marcus, Massachusetts Institute of Technology; et al. Parimarjan Negi, Massachusetts Institute of Technology Hongzi Mao, Massachusetts Institute of Technology Nesime Tatbul, Massachusetts Institute of Technology Mohammad Alizadeh, Massachusetts Institute of Technology Tim Kraska, Massachusetts Institute of Technology |
DFI - The Data Flow Interface for High-Speed Networks | Lasse Thostrup, TU Darmstadt; et al. Jan Skrzypczak, Zuse Institute Matthias Jasny, TU Darmstadt Tobias Ziegler, TU Darmstadt Carsten Binnig, TU Darmstadt | |
SODA Theory | Solving Sparse Linear Systems Faster than Matrix Multiplication | Richard Peng & Santosh Vempala, Georgia Institute of Technology |
SOSP Operating Systems | Kangaroo: Caching Billions of Tiny Objects on Flash, | Sara McAllister, Carnegie Mellon University; et al. Benjamin Berg, Carnegie Mellon University Julian Tutuncu-Macias, Carnegie Mellon University Juncheng Yang, Carnegie Mellon University Sathya Gunasekar, Meta Jimmy Lu, Meta Daniel Berger, University of Washington Nathan Beckmann, Carnegie Mellon University Gregory R. Ganger, Carnegie Mellon University |
LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism | Jongyul Kim, KAIST; et al. Insu Jang, KAIST Waleed Reda, Université catholique de Louvain Jaeseong Im, KAIST Marco Canini, KAUST Dejan Kostić, Royal Institute of Technology Youngjin Kwon, KAIST Simon Peter, University of Texas at Austin Emmett Witchel, University of Texas at Austin | |
Using Lightweight Formal Methods to Validate a Key-Value Storage Node in Amazon S3 | James Bornholt, Amazon; et al. Rajeev Joshi, Amazon Vytautas Astrauskas, ETH Zurich Brendan Cully, Amazon Bernhard Kragl, Amazon Seth Markle, Amazon Kyle Sauri, Amazon Drew Schleit, Amazon Grant Slatton, Amazon Serdar Tasiran, Amazon Jacob Van Geffen, University of Washington Andrew Warfield, Amazon | |
STOC Theory | A (Slightly) Improved Approximation Algorithm for Metric TSP | Anna R. Karlin, University of Washington; et al. Nathan Klein, University of Washington Shayan Oveis Gharan, University of Washington |
The Complexity of Gradient Descent: CLS = PPAD ∩ PLS | John Fearnley, University of Liverpool; et al. Paul W. Goldberg, University of Oxford Alexandros Hollender, University of Oxford Rahul Savani, University of Liverpool | |
Indistinguishability Obfuscation from Well-Founded Assumptions | Aayush Jain, University of California, Los Angeles; et al. Huijia Lin, University of Washington Amit Sahai, University of California, Los Angeles | |
UIST User Interface | Altering Perceived Softness of Real Rigid Objects by Restricting Fingerpad Deformation | Yujie Tao, University of Chicago; et al. Shan-Yuan Teng, University of Chicago Pedro Lopes, University of Chicago |
SoundsRide: Affordance-Synchronized Music Mixing for In-Car Audio Augmented Reality | Mohamed Kari, University of Duisburg-Essen; et al. Tobias Grosse-Puppendahl, Porsche AG Alexander Jagaciak, Porsche AG David Bethge, Ludwig Maximilian University of Munich Reinhard Schütte, University of Duisburg-Essen Christian Holz, ETH Zurich | |
Ten Million Users and Ten Years Later: Python Tutor's Design Guidelines for Building Scalable and Sustainable Research Software in Academia | Philip Guo, University of California, San Diego | |
VLDB Databases | Scaling Attributed Network Embedding to Massive Graphs | Renchi Yang, National University of Singapore; et al. Jieming Shi, Hong Kong Polytechnic University Xiaokui Xiao, National University of Singapore Yin Yang, Hamad bin Khalifa University Juncheng Liu, National University of Singapore Sourav S Bhowmick, Nanyang Technological University |
WWW World Wide Web | Towards Facilitating Empathic Conversations in Online Mental Health Support: A Reinforcement Learning Approach | Ashish Sharma, University of Washington; et al. Inna W. Lin, University of Washington Adam S. Miner, Stanford University David C. Atkins, University of Washington Tim Althoff, University of Washington |
2020 | ||
---|---|---|
AAAI Artificial Intelligence | WINOGRANDE: An Adversarial Winograd Schema Challenge at Scale | Keisuke Sakaguchi, Allen Institute for Artificial Intelligence; et al. Ronan Le Bras, Allen Institute for Artificial Intelligence Chandra Bhagavatula, Allen Institute for Artificial Intelligence Yejin Choi, University of Washington |
ACL Natural Language Processing | Beyond Accuracy: Behavioral Testing of NLP models with Checklist | Marco Tulio Ribeiro, Microsoft; et al. Tongshuang Wu, University of Washington Carlos Guestrin, University of Washington Sameer Singh, University of California, Irvine |
CHI Human-Computer Interaction | A Design Engineering Approach for Quantitatively Exploring Context-Aware Sentence Retrieval for Nonspeaking Individuals with Motor Disabilities | Per Ola Kristensson, University of Cambridge; et al. James Lilley, University of Cambridge Rolf Black, University of Dundee Annalu Waller, University of Dundee |
Articulating Experience: Reflections from Experts Applying Micro-Phenomenology to Design Research in HCI | Mirjana Prpa, Simon Fraser University; et al. Sarah Fdili-Alaoui, Laboratoire de recherche en informatique Thecla Schiphorst, Simon Fraser University Philippe Pasquier, Simon Fraser University | |
Beyond the Prototype: Understanding the Challenge of Scaling Hardware Device Production | Rushil Khurana, Carnegie Mellon University Steve Hodges, Microsoft | |
Bug or Feature? Covert Impairments to Human Computer Interaction | John V. Monaco, Naval Postgraduate School | |
Co-Designing Checklists to Understand Organizational Challenges and Opportunities around Fairness in AI | Michael A. Madaio, Carnegie Mellon University; et al. Luke Stark, Microsoft Jennifer Wortman Vaughan, Microsoft Hanna Wallach, Microsoft | |
Color and Animation Preferences for a Light Band eHMI in Interactions Between Automated Vehicles and Pedestrians | Debargha Dey, Eindhoven University of Technology; et al. Azra Habibovic, Research Institutes of Sweden Bastian Pflegling, Eindhoven University of Technology Marieke Martens, Eindhoven University of Technology Jacques Terken, Eindhoven University of Technology | |
Connecting Distributed Families: Camera Work for Three-party Mobile Video Calls | Yumei Gan, The Chinese University of Hong Kong; et al. Christian Greiffenhagen, The Chinese University of Hong Kong Stuart Reeves, University of Nottingham | |
Creating Augmented and Virtual Reality Applications: Current Practices, Challenges, and Opportunities | Narges Ashtari, Simon Fraser University; et al. Andrea Bunt, University of Manitoba Joanna McGrenere, University of British Columbia Michael Nebeling, University of Michigan Parmit K. Chilana, Simon Fraser University | |
Critical Race Theory for HCI | Ihudiya Finda Ogbonnaya-Ogburu, University of Michigan; et al. Angela D.R. Smith, Northwestern University Alexandra To, Carnegie Mellon University Kentaro Toyama, University of Michigan | |
Design Study "Lite" Methodology: Expediting Design Studies and Enabling the Synergy of Visualization Pedagogy and Social Good | Uzma Haque Syeda, Northeastern University; et al. Prasanth Murali, Northeastern University Lisa Roe, Northeastern University Becca Berkey, Northeastern University Michelle A. Borkin, Northeastern University | |
Designing Ambient Narrative-Based Interfaces to Reflect and Motivate Physical Activity | Elizabeth L. Murnane, Stanford University; et al. Xin Jiang, Stanford University Anna Kong, Stanford University Michelle Park, Stanford University Weili Shi, Stanford University Connor Soohoo, Stanford University Luke Vink, Stanford University Iris Xia, Stanford University Xin Yu, Stanford University John Yang-Sammataro, Stanford University Grace Young, Stanford University Jenny Zhi, Stanford University Paula Moya, Stanford University James A. Landay, Stanford University | |
Designing and Evaluating Calmer, a Device for Simulating Maternal Skin-to-Skin Holding for Premature Infants | Sabrina Hauser, Umeå University; et al. Melinda J. Suto, University of British Columbia Liisa Holsti, University of British Columbia Manon Ranger, University of British Columbia Karon E. MacLean, University of British Columbia | |
Designing Clinical AAC Tablet Applications with Adults who have Mild Intellectual Disabilities | Ryan Colin Gibson, University of Strathclyde; et al. Mark D. Dunlop, University of Strathclyde Matt-Mouley Bouamrane, University of Edinburgh Revathy Nayar, University of Strathclyde | |
Designing Trans Technology: Defining Challenges and Envisioning Community-Centered Solutions | Oliver L. Haimson, University of Michigan; et al. Dykee Gorrell, University of Illinois at Urbana–Champaign Denny L. Starks, University of Michigan Zu Weinger, University of Michigan | |
Exploring How Game Genre in Student-Designed Games Influences Computational Thinking Development | Giovanni Maria Troiano, Northeastern University; et al. Qinyu Chen, Northeastern University Ángela Vargas Alba, King Juan Carlos University Gregorio Robles, King Juan Carlos University Gillian Smith, Worcester Polytechnic Institute Michael Cassidy, Terc Eli Tucker-Raymond, Boston University Gillian Puttick, Terc Casper Harteveld, Northeastern University | |
Isness: Using Multi-Person VR to Design Peak Mystical Type Experiences Comparable to Psychedelics | David R. Glowacki, University of Bristol; et al. Mark D. Wonnacott, University of Bristol Rachel Freire, University of Bristol Becca R. Glowacki, Goldsmiths, University of London Ella M. Gale, University of Bristol James E. Pike, ArtSci International Foundation Tiu de Haan, ArtSci International Foundation Mike Chatziapostolou, ArtSci International Foundation Oussama Metatla, University of Bristol | |
Me vs. Super(wo)man: Effects of Customization and Identification in a VR Exergame | Jordan Koulouris, University of Bath; et al. Zoe Jeffery, University of Bath James Best, University of Bath Eamonn O'Neill, University of Bath Christof Lutteroth, University of Bath | |
Mental Models of AI Agents in a Cooperative Game Setting | Katy Ilonka Gero, Columbia University; et al. Zahra Ashktorab, IBM Casey Dugan, IBM Qian Pan, IBM James Johnson, IBM Werner Geyer, IBM Maria Ruiz, IBM Sarah Miller, IBM David R. Millen, IBM Murray Campbell, IBM Sadhana Kumaravel, IBM Wei Zhang, IBM | |
MRAT: The Mixed Reality Analytics Toolkit | Michael Nebeling, University of Michigan; et al. Maximilian Speicher, University of Michigan Xizi Wang, University of Michigan Shwetha Rajaram, University of Michigan Brian D. Hall, University of Michigan Zijian Xie, University of Michigan Alexander R. E. Raistrick, University of Michigan Michelle Aebersold, University of Michigan F. Edward G. Happ, University of Michigan Jiayin Wang, University of Michigan Yanan Sun, University of Michigan Lotus Zhang, University of Michigan Leah E. Ramsier, University of Michigan Rhea Kulkarni, University of Michigan | |
On Being Iterated: The Affective Demands of Design Participation | Paul Dourish, University of California, Irvine; et al. Christopher Lawrence, University of Technology Sydney Tuck Wah Leong, University of Technology Sydney Greg Wadley, University of Melbourne | |
PenSight: Enhanced Interaction with a Pen-Top Camera | Fabrice Matulic, Preferred Networks Inc; et al. Riku Arakawa, Preferred Networks Inc Brian Vogel, Preferred Networks Inc Daniel Vogel, University of Waterloo | |
ReFind: Design, Lived Experience and Ongoingness in Bereavement | Jayne Wallace, Northumbria University; et al. Kyle Montague, Newcastle University Trevor Duncan, Northumbria University Luís P. Carvalho, Newcastle University Nantia Koulidou, Northumbria University Jamie Mahoney, Northumbria University Kellie Morrissey, University of Limerick Claire Craig, Sheffield Hallam University Linnea Iris Groot, Newcastle University Shaun Lawson, Northumbria University Patrick Olivier, Monash University Julie Trueman, Northumbria University Helen Fishe, Sheffield Hallam University | |
Robots for Inclusive Play: Co-designing an Educational Game With Visually Impaired and Sighted Children | Oussama Metatla, University of Bristol; et al. Sandra Bardot, University of Toulouse Clare Cullen, University of Bristol Marcos Serrano, University of Toulouse Christophe Jouffrais, National Center for Scientific Research | |
Techniques for Flexible Responsive Visualization Design | Jane Hoffswell, University of Washington; et al. Wilmot Li, Adobe Zhicheng Liu, Adobe | |
texSketch: Active Diagramming through Pen-and-Ink Annotations | Hariharan Subramonyam, University of Michigan; et al. Colleen Seifert, University of Michigan Priti Shah, University of Michigan Eytan Adar, University of Michigan | |
The Role of Everyday Sounds in Advanced Dementia Care | Maarten Houben, Eindhoven University of Technology; et al. Rens Brankaert, Eindhoven University of Technology Saskia Bakker, Philips Gail Kenning, University of Technology Sydney Inge Bongers, Tilburg University Berry Eggen, Eindhoven University of Technology | |
Touching and Being in Touch with the Menstruating Body | Nadia Campo Woytuk, Royal Institute of Technology; et al. Marie Louise Juul Søndergaard, Royal Institute of Technology Marianela Ciolfi Felice, Royal Institute of Technology Madeline Balaam, Royal Institute of Technology | |
Transparency of CHI Research Artifacts: Results of a Self-Reported Survey | Chat Wacharamanotham, University of Zurich; et al. Lukas Eisenring, University of Zurich Steve Haroz, Paris-Saclay University Florian Echtler, Bauhaus University | |
Trigeminal-based Temperature Illusions | Jas Brooks, University of Chicago; et al. Steven Nagels, University of Chicago Pedro Lopes, University of Chicago | |
Wireality: Enabling Complex Tangible Geometries in Virtual Reality with Worn Multi-String Haptics | Cathy Fang, Carnegie Mellon University; et al. Yang Zhang, Carnegie Mellon University Matthew Dworman, Carnegie Mellon University Chris Harrison, Carnegie Mellon University | |
Wrex: A Unified Programming-by-Example Interaction for Synthesizing Readable Code for Data Scientists | Ian Drosos, University of California, San Diego; et al. Titus Barik, Microsoft Philip J. Guo, University of California, San Diego Robert DeLine, Microsoft Sumit Gulwani, Microsoft | |
CIKM Knowledge Management | Do People and Neural Nets Pay Attention to the Same Words: Studying Eye-tracking Data for Non-factoid QA Evaluation | Valeria Bolotova, RMIT University; et al. Vladislav Blinov, Ural Federal University Yukun Zheng, Tsinghua University W Bruce Croft, University of Massachusetts Falk Scholer, RMIT University Mark Sanderson, RMIT University |
FANG: Leveraging Social Context for Fake News Detection Using Graph Representation | Van Hoang Nguyen, National University of Singapore; et al. Kazunari Sugiyama, Kyoto University Preslav Nakov, Qatar Computing Research Institute Min Yen Kan, National University of Singapore | |
CVPR Computer Vision | Unsupervised Learning of Probably Symmetric Deformable 3D Objects from Images in the Wild | Shangzhe Wu, University of Oxford; et al. Christian Rupprecht, University of Oxford Andrea Vedaldi, University of Oxford |
FOCS Theory | An Equivalence Between Private Classification and Online Prediction | Mark Bun, Boston University; et al. Roi Livni, Tel Aviv University Shay Moran, Google |
Edge-Weighted Online Bipartite Matching | Matthew Fahrbach, Google; et al. Zhiyi Huang, The University of Hong Kong Runzhou Tao, Columbia University Morteza Zadimoghaddam, Google | |
A New Minimax Theorem for Randomized Algorithms | Shalev Ben-David & Eric Blais, University of Waterloo | |
FSE Software Engineering | A Principled Approach to GraphQL Query Cost Analysis | Alan Cha, IBM; et al. Erik Wittern, IBM Guillaume Baudart, IBM James C. Davis, Purdue University Louis Mandel, IBM Jim Alain Laredo, IBM |
Boosting fuzzer efficiency: an information theoretic perspective | Marcel Bohme, Monash University; et al. Valentin J. Manes, KAIST Sang-kil Cha, KAIST | |
Community expectations for research artifacts and evaluation processes | Ben Hermann, University of Poderborn; et al. Stefan Winter, TU Darmstadt Janet Siegmund, TU Chemnitz | |
Deep learning library testing via effective model generation | Zan Wang, Tianjin University; et al. Ming Yan, Tianjin University Junjie Chen, Tianjin University Shuang Liu, Tianjin University Dongdi Zhang, Tianjin University | |
Detecting numerical bugs in neural network architectures | Yuhao Zhang, Peking University; et al. Luyao Ren, Peking University Liqian Chen, National University of Defense Technology Yingfei Xiong, Peking University S. C. Cheung, Hong Kong University of Science and Technology Tao Xie, Peking University | |
On decomposing a deep neural network into modules | Rangeet Pan & Hridesh Rajan, Iowa State University | |
Testing self-adaptive software with probabilistic guarantees on performance metrics | Claudio Mandrioli, Lund University Martina Maggio, Saarland University | |
ICML Machine Learning | On Learning Sets of Symmetric Elements | Haggai Maron, NVIDIA; et al. Or Litany, Stanford University Gal Chechik, Stanford University Ethan Fetaya, Stanford University |
Tuning-free Plug-and-Play Proximal Algorithm for Inverse Imaging Problems | Kiaxuan Wei, Beijing Institute of Technology; et al. Angelica Aviles-Rivero, University of Cambridge Jingwei Liang, University of Cambridge Ying Fu, Beijing Institute of Technology Carola-Bibiane Schonlieb, University of Cambridge Hua Huang, Beijing Institute of Technology | |
ICSE Software Engineering | A Machine Learning Approach for Vulnerability Curation | Chen Yang, Veracode Inc.; et al. Andrew Santosa, Veracode Inc. Ang Ming Yi, Singapore Management University Abishek Sharma, Singapore Management University Asankhaya Sharma, Veracode Inc. David Lo, Singapore Management University |
Traceability Support for Multi-Lingual Software Projects | Yalin Liu, University of Notre Dame; et al. Jinfeng Lin, University of Notre Dame Jane Cleland-Huang, University of Notre Dame | |
Ethical Mining - A Case Study on MSR Mining Challenges | Nicolas Gold & Jens Krinke, University of College London | |
White Box Fairness Testing through Adversarial Sampling | Peixin Zhang, Zhejiang University; et al. Jingyi Wang, National University of Singapore Jun Sun, Singapore Management University Guoliang Dong, Zhejiang University Xinyu Wang, Zhejiang University Xingen Wang, Zhejiang University Jin Song Dong, National University of Singapore Dai Ting, Huawei | |
An Empirical Study on Program Failures of Deep Learning Jobs | Ru Zhang, Microsoft; et al. Wencong Xiao, Alibaba Group Hongyu Zhang, University of Newcastle Australia Yu Liu, Microsoft Haoxiang Lin, Microsoft Mao Yang, Microsoft | |
Towards the Use of the Readily Available Tests from the Release Pipeline as Performance Tests. Are we There Yet? | Zishuo Ding, Concordia University; et al. Jinfu Chen, Concordia University Weiyi Shang, Concordia University | |
A Tale from the Trenches: Cognitive Biases and Software Development | Souti Chattopadhyay, Oregon State University; et al. Nicholas Nelson, Oregon State University Audrey Au, Oregon State University Natalia Morales, Oregon State University Christopher Sanchez, Oregon State University Rahul Pandita, Phase Change Software Anita Sarma, Oregon State University | |
Time-travel Testing of Android Apps | Zhen Dong, National University of Singapore; et al. Marcel Bohme, Monash University Lucia Cojocaru, Politechnica University Abhik Roychoudhury, National University of Singapore | |
Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language? | Nischal Shrestha, North Carolina State University; et al. Colton Botta, North Carolina State University Titus Barik, Microsoft Chris Parnin, North Carolina State University | |
Big Code!= Big Vocabulary: Open-Vocabulary Models for Source code | Rafael-Michael Karampatsis, University of Edinburgh; et al. Hlib Babii, Free University of Bozen-Bolzano Romain Robbes, Free University of Bozen-Bolzano Charles Sutton, Google Andrea Janes, Free University of Bozen-Bolzano | |
Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep Learning | Jieshan Chen, Australian National University; et al. Chunyang Chen, Monash University Zhenchang Xing, Australian National University Xiwei Xu, CSIRO's Data61 Liming Zhu, CSIRO's Data61 Guoqiang Li, Shanghai Jiao Tong University Jinshui Wang, Fujian University of Technology | |
Translating Video Recordings of Mobile App Usages into Replayable Scenarios | Carlos Bernal-Cardenas, College of William & Mary; et al. Nathan Cooper, College of William & Mary Kevin Moran, College of William & Mary Oscar Chaparro, College of William & Mary Adrian Marcus, University of Texas at Dallas Denys Poshyvanyk, College of William & Mary | |
IJCAI Artificial Intelligence | Synthesizing Aspect-Driven Recommendation Explanations from Reviews | Trung-Hoang Le & Hady W. Lauw, Singapore Management University |
A Multi-Objective Approach to Mitigate Negative Side Effects | Sandy Saisubramanian, University of Massachusetts; et al. Ece Kamar, Microsoft Shlomo Zilberstein, University of Massachusetts | |
INFOCOM Networking | Push the Limit of Acoustic Gesture Recognition | Yanwen Wang, Hong Kong Polytechnic University; et al. Jiaxing Shen, Hong Kong Polytechnic University Yuanqing Zheng, Hong Kong Polytechnic University |
On the Power of Randomization for Scheduling Real-Time Traffic in Wireless Networks | Christos Tsanikidis & Javad Ghaderi, Columbia University | |
Reducing the Service Function Chain Backup Cost over the Edge and Cloud by a Self-Adapting Scheme | Xiaojun Shang, Stony Brook University; et al. Yaodong Huang, Stony Brook University Zhenhua Liu, Stony Brook University Yuanyuan Yang, Stony Brook University | |
KDD Data Mining | On Sampled Metrics for Item Recommendation | Walid Krichene & Steffen Rendle, Google |
MOBICOM Mobile | Hummingbird: Energy Efficient GPS Receiver for Small Satellites | Sujay Narayana, Delft University of Technology; et al. R Venkatesha Prasad, Delft University of Technology Vijay S Rao, Delft University of Technology Luca Mottola, Politecnico di Milano T Venkata Prabhakar, Indian Institute of Science Bangalore |
M-Cube: a millimeter-wave massive MIMO software radio | Renjie Zhao, University of California, San Diego; et al. Timothy Woodford, University of California, San Diego Teng Wei, University of California, San Diego Kun Qian, University of California, San Diego Xinyu Zhang, University of California, San Diego | |
NeurIPS Machine Learning | No-Regret Learning Dynamics for Extensive-Form Correlated Equilibrium | Andrea Celli, Politecnico di Milano; et al. Alberto Marchesi, Politecnico di Milano Gabriele Farine, Carnegie Mellon University Nicola Gatti, Politecnico di Milano |
Improved guarantees and a multiple-descent curve for the Column Subset Selection Problem and the Nyström method | Michal Derezinski, University of California, Berkeley; et al. Rajiv Khanna, University of California, Berkeley Michael W. Mahoney, University of California, Berkeley | |
Language Models are Few-Shot Learners | Tom B. Brown, Open AI; et al. Benjamin Mann, Open AI Nick Ryder, Open AI Melanie Subbiah, Open AI Jared D. Kaplan, Johns Hopkins University | |
NSDI Networking | Understanding, Detecting and Localizing Partial Failures in Large System Software | Chang Lou, Johns Hopkins University; et al. Peng Huang, Johns Hopkins University Scott Smith, Johns Hopkins University |
AmphiLight: Direct Air-Water Communication with Laser Light | Charles J. Carver, Dartmouth College; et al. Zhao Tian, Dartmouth College Hongyong Zhang, Dartmouth College Kofi M. Odame, Dartmouth College Alberto Quattrini Li, Dartmouth College Xia Zhou, Dartmouth College | |
OSDI Operating Systems | hXDP: Efficient Software Packet Processing on FPGA NICs | Marco Spaziani Brunella, Axbryd; et al. Giacomo Belocchi, Axbryd Marco Bonola, Axbryd Salvatore Pontarelli, Axbryd Giuseppe Siracusano, NEC Laboratories Europe Giuseppe Bianchi, University of Rome Tor Vergata Aniello Cammarano, University of Rome Tor Vergata Alessandro Palumbo, University of Rome Tor Vergata Luca Petrucci, University of Rome Tor Vergata Roberto Bifulco, NEC Laboratories Europe |
Byzantine Ordered Consensus without Byzantine Oligarchy | Yunhao Zhang, Cornell University; et al. Srinath Setty, Microsoft Qi Chen, Microsoft Lidong Zhou, Microsoft Lorenzo Alvisi, Cornell University | |
Virtual Consensus in Delos | Mahesh Balakrishnan, Meta; et al. Jason Flinn, Meta Chen Shen, Meta Mihir Dharamshi, Meta Ahmed Jafri, Meta Xiao Shi, Meta Santosh Ghosh, Meta Hazem Hassan, Meta Aaryaman Sagar, Meta Rhed Shi, Meta Jingming Liu, Meta Filip Gruszczynski, Meta Xianan Zhang, Meta Huy Hoang, Meta Ahmed Yossef, Meta Francois Richard, Meta Yee Jiun Song, Meta | |
PLDI Programming Languages | Data-Driven Inference of Representation Invariants | Anders Miltner, Princeton University; et al. Saswat Padhi, University of California, Los Angeles Todd Millstein, University of California, Los Angeles David Walker, Princeton University |
Armada: Low-Effort Verification of High-Performance Concurrent Programs | Jacob R. Lorch, Microsoft; et al. Yixuan Chen, University of Michigan Manos Kapritsos, University of Michigan Bryan Parno, Carnegie Mellon University Shaz Qadeer, Novi Upamanyu Sharma, University of Michigan James R. Wilcox, Certora Xueyuan Zhao, Carnegie Mellon University | |
Validating SMT Solvers via Semantic Fusion | Dominik Winterer, ETH Zurich; et al. Chengyu Zhang, East China Normal University Zhendong Su, ETH Zurich | |
From Folklore to Fact: Comparing Implementations of Stacks and Continuations | Kavon Farvardin & John Reppy, University of Chicago | |
Fast Graph Simplification for Interleaved Dyck-Reachability | Yuanbo Li, Georgia Institute of Technology; et al. Qirun Zhang, Georgia Institute of Technology Thomas Reps, University of Wisconsin–Madison | |
PODS Databases | A Framework for Adversarially Robust Streaming Algorithms | Omri Ben-Eliezer, Tel Aviv University; et al. Rajesh Jayaram, Carnegie Mellon University David P. Woodruff, Carnegie Mellon University Eylon Yogev, Boston University |
S&P Security and Privacy | TRRespass: Exploiting the Many Sides of Target Row Refresh | Pietro Frigo, Vrije Universiteit Amsterdam; et al. Emanuele Vannacci, Vrije Universiteit Amsterdam Hasan Hassan, ETH Zurich Victor van der Veen, Qualcomm Onur Mutlu, ETH Zurich Cristiano Giuffrida, Vrije Universiteit Amsterdam Herbert Bos, Vrije Universiteit Amsterdam Kaveh Razavi, Vrije Universiteit Amsterdam |
SIGCOMM Networking | Routing on Multiple Optimality Criteria | João Luís Sobrinho & Miguel Alves Ferreira, University of Lisbon |
SIGIR Information Retrieval | Controlling Fairness and Bias in Dynamic Learning-to-rank | Marco Morik, Technical University of Berlin; et al. Ashudeep Singh, Cornell University Jessica Hong, Cornell University Thorsten Joachims, Cornell University |
SIGMETRICS Performance | Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix-Vector Multiplication | Ankur Mallik, Carnegie Mellon University; et al. Malhar Chaudhari, Oracle Corporation Utsav Sheth, Automation Anywhere Ganesh Palanikumar, Apple Gauri Joshi, Carnegie Mellon University |
SIGMOD Databases | ShapeSearch: A Flexible and Efficient System for Shape-based Exploration of Trendlines | Tarique Siddiqui, University of Illinois at Urbana–Champaign; et al. Paul Luh, University of Illinois at Urbana–Champaign Zesheng Wang, University of Illinois at Urbana–Champaign Karrie Karahalios, University of Illinois at Urbana–Champaign Aditya Parameswaran, University of Illinois at Urbana–Champaign |
Pump Up the Volume: Processing Large Data on GPUs with Fast Interconnects | Clemens Lutz, DFKI GmbH; et al. Sebastian Breß, Technical University of Berlin Steffen Zeuch, DFKI GmbH Tilmann Rabl, HPI Check Volker Markl, DFKI GmbH | |
SODA Theory | Chasing Convex Bodies Optimally | Mark Sellke, Stanford University |
Chasing Convex Bodies with Linear Competitive Ratio | C.J. Argue, Carnegie Mellon University; et al. Anupam Gupta, Carnegie Mellon University Guru Guruganesh, Google Ziye Tang, Carnegie Mellon University | |
STOC Theory | Improved Bounds for The Sunflower Lemma | Ryan Alweiss, Princeton University; et al. Shachar Lovett, University of California, San Diego Kewen Wu, Peking University Jiapeng Zheng, Harvard University |
UIST User Interface | HandMorph: A Passive Exoskeleton that Miniaturizes Grasp | Jun Nishida, University of Chicago; et al. Soichiro Matsuda, University of Tsukuba Hiroshi Matsui, Ruhr-University Bochum Shan-Yuan Teng, University of Chicago Ziwei Liu, University of Chicago Kenji Suzuki, University of Tsukuba Pedro Lopes, University of Chicago |
VLDB Databases | Opportunities for optimism in contended main-memory multicore transactions | Yihe Huang, Harvard University; et al. William Qian, Harvard University Eddie Kohler, Harvard University Barbara Liskov, Massachusetts Institute of Technology Liuba Shrira, Brandeis University |
WWW World Wide Web | Open Intent Extraction from Natural Language Interactions | Nikhita Vedula, Ohio State University; et al. Nedim Lipka, Adobe Pranav Maneriker, Ohio State University Srinivasan Parthasarathy, Ohio State University |
2019 | ||
---|---|---|
AAAI Artificial Intelligence | How to Combine Tree-Search Methods in Reinforcement Learning | Yonathan Efroni, Technion – Israel Institute of Technology; et al. Gal Dalal, Technion – Israel Institute of Technology Bruno Scherrer, Inria Shie Mannor, Technion – Israel Institute of Technology |
ACL Natural Language Processing | Bridging the Gap between Training and Inference for Neural Machine Translation | Wen Zhang, Chinese Academy of Sciences; et al. Yang Feng, Chinese Academy of Sciences Fandong Meng, Tencent Di You, Worcester Polytechnic Institute Qun Liu, Huawei |
CHI Human-Computer Interaction | "Occupational Therapy is Making": Design Iteration and Digital Fabrication in Occupational Therapy | Megan Hofmann, Carnegie Mellon University; et al. Kristin Williams, Carnegie Mellon University Toni Kaplan, Carnegie Mellon University Stephanie Valencia, Carnegie Mellon University Gabriella Han, Carnegie Mellon University Scott E Hudson, Carnegie Mellon University Jennifer Mankoff, University of Washington Patrick Carrington, Carnegie Mellon University |
"I feel it is my responsibility to stream": Streaming and Engaging with Intangible Cultural Heritage through Livestreaming | Zhicong Lu, University of Toronto; et al. Michelle Annett, MishMashMakers Mingming Fan, University of Toronto Daniel Wigdor, University of Toronto | |
Guerilla Warfare and the Use of New (and Some Old) Technology: Lessons from FARC's Armed Struggle in Colombia | Débora De Castro Leal, University of Siegen; et al. Max Krüger, University of Siegen Kaoru Misaki, University of Siegen Dave William Randall, University of Siegen Volker Wulf, Institute of Information Systems | |
Investigating Slowness as a Frame to Design Longer-Term Experiences with Personal Data: A Field Study of Olly | William Odom, Simon Fraser University; et al. Ron Wakkary, Eindhoven University of Technology Jeroen Hol, Eindhoven University of Technology Bram Naus, Eindhoven University of Technology Pepijn Verburg, Eindhoven University of Technology Tal Amram, Simon Fraser University Amy Chen, Simon Fraser University | |
Engagement with Mental Health Screening on Mobile Devices: Results from an Antenatal Feasibility Study | Kevin Doherty, Trinity College Dublin; et al. José Marcano Belisario, Imperial College London Martin Cohn, Imperial College London Nikolaos Mastellos, Imperial College London Cecily Morrison, Microsoft Josip Car, Imperial College London Gavin Doherty, Trinity College Dublin | |
Anchored Audio Sampling: A Seamless Method for Exploring Children's Thoughts During Deployment Studies | Alexis Hiniker, University of Washington; et al. Jon E. Froehlich, University of Washington Mingrui Zhang, University of Washington Nikolaos Mastellos, University of Washington | |
Unremarkable AI: Fitting Intelligent Decision Support into Critical, Clinical Decision-Making Processes | Qian Yang, Carnegie Mellon University; et al. Aaron Steinfeld, Carnegie Mellon University John Zimmerman, Carnegie Mellon University | |
Online grocery delivery services: An opportunity to address food disparities in transportation-scarce areas | Tawanna Dillahunt, University of Michigan; et al. Sylvia Simioni, University of Michigan Xuecong Xu, University of Michigan | |
Voice User Interfaces in Schools: Co-designing for Inclusion With Visually-Impaired and Sighted Pupils | Oussama Metatla, University of Bristol; et al. Alison Oldfield, University of Bristol Taimur Ahmed, University of Bristol Antonis Vafeas, University of Bristol Sunny Miglani, University of Bristol | |
Increasing the Transparency of Research Papers with Explorable Multiverse Analyses | Pierre Dragicevic, Inria; et al. Yvonne Jansen, CNRS - Sorbonne Université Abhraneel Sarma, University of Michigan Matthew Kay, University of Michigan Fanny Chevalier, University of Toronto | |
Geppetto: Enabling Semantic Design of Expressive Robot Behaviors | Ruta Desai, Carnegie Mellon University; et al. Fraser Anderson, Autodesk Justin Matejka, Autodesk Stelian Coros, ETH Zurich James L. McCann, Carnegie Mellon University George Fitzmaurice, Autodesk Tovi Grossman, Autodesk | |
Project Sidewalk: A Web-based Crowdsourcing Tool for Collecting Sidewalk Accessibility Data At Scale | Manaswi Saha, University of Washington; et al. Michael Saugstad, University of Washington Hanuma Teja Maddali, University of Maryland Aileen Zeng, University of Washington Ryan Holland, Montgomery Blair High School Steven Bower, University of Maryland Aditya Dash, University of Maryland Sage Chen, University of Michigan Anthony Li, University of Maryland Kotaro Hara, Singapore Management University Jon E. Froehlich, University of Washington | |
Touchstone2: An Interactive Environment for Exploring Trade-offs in HCI Experiment Design | Alexander Eiselmayer, University of Zurich; et al. Chat Wacharamanotham, University of Zurich Michel Beaudouin-Lafon, University of Paris-Sud Wendy E Mackay, University of Paris-Sud | |
AffinityLens: Data-Assisted Affinity Diagramming with Augmented Reality | Hariharan Subramonyam, University of Michigan; et al. Steven Mark Drucker, Microsoft Eytan Adar, University of Michigan | |
A Translational Science Model for HCI | Lucas Colusso, University of Washington; et al. Ridley Jones, University of Washington Sean A. Munson, University of Washington Gary Hsieh, University of Washington | |
A Tale of Two Perspectives: A Conceptual Framework of User Expectations and Experiences of Instructional Fitness Apps | Ahed Aladwan, University of Melbourne; et al. Ryan M Kelly, University of Melbourne Steven Baker, University of Melbourne Eduardo Velloso, University of Melbourne | |
Street-Level Algorithms: A Theory At The Gaps Between Policy and Decisions | Ali Alkhatib & Michael Bernstein, Stanford University | |
Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Safe Online | Karla A. Badillo-Urquiola, University of Central Florida; et al. Xinru Woo Page, Bentley University Pamela J. Wisniewski, University of Central Florida | |
Protection, Productivity and Pleasure in the Smart Home: Emerging Expectations and Gendered Insights from Australian Early Adopters | Yolande A. A. Strengers, Monash University; et al. Jenny Kennedy, RMIT University Paula Arcari, RMIT University Larissa Nicholls, RMIT University Melissa Gregg, Intel | |
Detecting Personality Traits Using Eye-Tracking Data | Shlomo Berkovsky, CSIRO's Data61; et al. Ronnie Taib, CSIRO's Data61 Irena Koprinska, University of Sydney Eileen Wang, University of Sydney Yucheng Zeng, University of Sydney Jingjie Li, University of Wisconsin–Madison Sabina Kleitman, University of Sydney | |
ReType: Quick Text Editing with Keyboard and Gaze | Shyamli Sindhwani, University of Auckland; et al. Christof Lutteroth, University of Bath Gerald Weber, University of Auckland | |
Data is Personal: Attitudes and Perceptions of Data Visualization in Rural Pennsylvania | Shyamli Sindhwani, University of Auckland; et al. Christof Lutteroth, University of Bath Gerald Weber, University of Auckland | |
PicMe: Interactive Visual Guidance for Taking Requested Photo Composition | Minju Kim, KAIST Jungjin Lee, KAI Inc | |
Managing Messes in Computational Notebooks | Andrew Head, University of California, Berkeley; et al. Titus Barik, Microsoft Fred Hohman, Georgia Institute of Technology Steven Mark Drucker, Microsoft Robert DeLine, Microsoft | |
A Framework for the Experience of Meaning in Human-Computer Interaction | Elisa D Mekler, Aalto University Kasper Hornbæk, University of Copenhagen | |
Managerial Visions: Stories of Upgrading and Maintaining the Public Restroom with IoT | Sarah E. Fox, University of California, San Diego; et al. Kiley Sobel, University of Washington Daniela K. Rosner, University of Washington | |
Social Play in an Exergame: How the Need to Belong Predicts Adherence | Maximus D Kaos, Queen's University; et al. Ryan E Rhodes, University of Victoria Perttu Hamalainen, Aalto University T. C. Nicholas Graham, Queen's University | |
'Think secure from the beginning': A Survey with Software Developers | Hala Assal & Sonia Chiasson, Carleton University | |
"They Don't Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South Asia | Nithya Sambasivan, Google; et al. Amna Batool, Information Technology University Nova Ahmed, North South University Tara Lynn Matthews, Independent Researcher Kurt Thomas, Google Laura Sanely Gaytan-Lugo, University of Colima Elie Bursztein, Google Elizabeth F. Churchill, Google Sunny Consolvo, Google | |
CIKM Knowledge Management | AutoGRD: Model Recommendation Through Graphical Dataset Representation | Noy Cohen-Shapira, Ben-Gurion University of the Negev; et al. Lior Rokach, Ben-Gurion University of the Negev Bracha Shapira, Ben-Gurion University of the Negev Gilad Katz, Ben-Gurion University of the Negev Roman Vainshtein, Ben-Gurion University of the Negev |
CVPR Computer Vision | A Theory of Fermat Paths for Non-Line-of-Sight Shape Reconstruction | Shumian Xin, Carnegie Mellon University; et al. Sotiris Nousias, University College London Kiriakos N. Kutulakos, University of Toronto Aswin C. Sankaranarayanan, Carnegie Mellon University Srinivasa G. Narasimhan, Carnegie Mellon University Ioannis Gkioulekas, Carnegie Mellon University |
FOCS Theory | Lower bounds for maximal matchings and maximal independent sets | Alkida Balliu, Aalto University; et al. Sebastian Brandt, ETH Zurich Juho Hirvonen, Aalto University Dennis Olivetti, Aalto University Mikaël Rabie, Aalto University Jukka Suomela, Aalto University |
NEEXP ⊆ MIP* | Anand Natarajan, California Institute of Technology John Wright, Massachusetts Institute of Technology | |
Automating Resolution is NP-Hard | Albert Atserias & Moritz Müller, Polytechnic University of Catalonia | |
FSE Software Engineering | Empirical Review of Java Program Repair Tools: A Large-Scale Experiment on 2,141 Bugs and 23,551 Repair Attempts | Thomas Durieux, University of Lisbon; et al. Fernanda Madeiral, Universidade Federal de Uberlândia Matias Martinez, University Polytechnique Hauts-de-France Rui Abreu, University of Lisbon |
Generating Automated and Online Test Oracles for Simulink Models with Continuous and Uncertain Behaviors | Claudio Menghi, University of Luxembourg; et al. Shiva Nejati, University of Luxembourg Khouloud Gaaloul, University of Luxembourg Lionel C. Briand, University of Luxembourg | |
The Importance of Accounting for Real-World Labelling When Predicting Software Vulnerabilities | Matthieu Jimenez, University of Luxembourg; et al. Renaud Rwemalika, University of Luxembourg Mike Papadakis, University of Luxembourg Federica Sarro, University College London Yves Le Traon, University of Luxembourg Mark Harman, University College London | |
Assessing the Quality of the Steps to Reproduce in Bug Reports | Oscar Chaparro, College of William & Mary; et al. Carlos Bernal-Cárdenas, College of William & Mary Jing Lu, University of Texas at Dallas Kevin Moran, College of William & Mary Andrian Marcus, University of Texas at Dallas Massimiliano Di Penta, University of Sannio Denys Poshyvanyk, College of William & Mary Vincent Ng, University of Texas at Dallas | |
A Framework for Writing Trigger-Action Todo Comments in Executable Format | Pengyu Nie, University of Texas at Austin; et al. Rishabh Rai, University of Texas at Austin Junyi Jessy Li, University of Texas at Austin Sarfraz Khurshid, University of Texas at Austin Raymond J. Mooney, University of Texas at Austin Milos Gligoric , University of Texas at Austin | |
A Statistics-based Performance Testing Methodology for Cloud Applications | Sen He, University of Texas at San Antonio; et al. Glenna Manns, University of Virginia John Saunders, University of Virginia Wei Wang, University of Texas at San Antonio Lori Pollock, University of Delaware Mary Lou Soffa, University of Virginia | |
ICCV Computer Vision | SinGAN: Learning a Generative Model from a Single Natural Image | Tamar Rott Shaham, Technion – Israel Institute of Technology; et al. Tali Dekel, Google Tomar Michaeli, Technion – Israel Institute of Technology |
ICML Machine Learning | Challenging Common Assumptions in the Unsupervised Learning of Disentangled Representations | Francesco Locatello, ETH Zurich; et al. Stefan Bauer, Max Planck Institute for Intelligent Systems Mario Lucic, Google Gunnar Rätsch, ETH Zurich Sylvain Gelly, Google Bernhard Schölkopf, Max Planck Institute for Intelligent Systems Olivier Bachem, Google |
Rates of Convergence for Sparse Variational Gaussian Process Regression | David R. Burt, University of Cambridge; et al. Carl E. Rasmussen, University of Cambridge Mark van der Wilk, PROWLER.io | |
ICSE Software Engineering | Detecting incorrect build rules | Nandor Licker & Andrew Rice, University of Cambridge |
Distilling Neural Representations of Data Structure Manipulation using fMRI and fNIRS | Yu Huang, University of Michigan; et al. Xinyu Liu, University of Michigan Tyan Krueger, University of Michigan Tyler Santander, University of Michigan Xiaosu Hu, University of Michigan Kevin Leach, University of Michigan Westley Weimer, University of Michigan | |
Do Developers Discover New Tools On The Toilet? | Emerson Murphy-Hill, Google; et al. Edward K. Smith, Bloomberg L.P. Caitlin Sadowski, Google Ciara Jaspan, Google Collin Winter, Waymo Matthew Jorde, Google Andrea Knight, Google Andrew Trenk, Google Steve Gross, Google | |
Going Farther Together: The Impact of Social Capital on Sustained Participation in Open Source | Huilian Sophie Qiu, Carnegie Mellon University; et al. Alexander Nolte, University of Tartu Anita Brown, Bryn Mawr College Alexander Serebrenik, Eindhoven University of Technology Bogdan Vasilescu, Carnegie Mellon University | |
iSENSE: Completion-Aware Crowdtesting Management | Junjie Wang, Chinese Academy of Sciences; et al. Ye Wang, Stevens Institute of Technology Rahul Krishna, North Carolina State University Tim Menzies, North Carolina State University Qing Wang, Software Chinese Academy of Sciences | |
Redundant Loads: A Software Inefficiency Indicator | Pengfei Su, College of William & Mary; et al. Sasha Wen, College of William & Mary Hailong Yang, Beihang University Milind Chabbi, IBM Xu Liu, College of William & Mary | |
Resource-Aware Program Analysis Via Online Abstraction Coarsening | Kihong Heo, University of Pennsylvania; et al. Hakjoo Oh, Korea University Hongseok Yang, KAIST | |
Scalable Approaches for Test Suite Reduction | Emilio Cruciani, Gran Sasso Science Institute; et al. Breno Miranda, Federal University of Pernambuco Roberto Verdecchia, Gran Sasso Science Institute Antonia Bertolino, ISTI - Consiglio Nazionale delle Ricerche | |
SMOKE: Scalable Path-Sensitive Memory Leak Detection for Millions of Lines of Code | Gang Fan, Hong Kong University of Science and Technology; et al. Rongxin Wu, Hong Kong University of Science and Technology Qingkai Shi, Hong Kong University of Science and Technology Xiao Xiao, Sourcebrella Inc. Jinguo Zhou, Sourcebrella Inc. Charles Zhang, Hong Kong University of Science and Technology | |
The Seven Sins: Security Smells in Infrastructure as Code Scripts | Akond Rahman, North Carolina State University; et al. Chris Parnin, North Carolina State University Laurie Williams, North Carolina State University | |
View-Centric Performance Optimization for Database-Backed Web Applications | Junwen Yang, University of Chicago; et al. Cong Yan, University of Washington Chengcheng Wan, University of Chicago Shan Lu, University of Chicago Alvin Cheung, University of Washington | |
IJCAI Artificial Intelligence | Boosting for Comparison-Based Learning | Michael Perrot & Ulrike von Luxburg, Max Planck Institute for Intelligent Systems |
INFOCOM Networking | Combinatorial Sleeping Bandits with Fairness Constraints | Fengjiao Li, Iowa State University; et al. Jia Liu, Iowa State University Bo Ji, Iowa State University |
RF-Mehndi: A Fingertip Profiled RF Identifier | Cui Zhao, Xi'an Jiaotong University; et al. Zhenjiang Li, City University of Hong Kong Han Ding, Xi'an Jiaotong University Jinsong Han, Zhejiang University Wei Xi, Xi'an Jiaotong University Ting Liu, Xi'an Jiaotong University Ruowei Gui, Xi'an Jiaotong University | |
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels | Guocong Quan, Ohio State University; et al. Jian Tan, Ohio State University Atilla Eryilmaz, Ohio State University | |
KDD Data Mining | Optimizing Impression Counts for Outdoor Advertising | Yipeng Zhang, RMIT University; et al. Yuchen Li, Singapore Management University Zhifeng Bao, RMIT University Songsong Mo, Wuhan University Ping Zhang, Huawei |
MOBICOM Mobile | eBP: A Wearable System For Frequent and Comfortable Blood Pressure Monitoring From User's Ear | Nam Bui, University of Colorado Boulder; et al. Nhat van Pham, University of Colorado Boulder Jessica Jacqueline Barnitz, University of Colorado Boulder Zhanan Zou, University of Colorado Boulder Phuc Nguyen, University of Colorado Boulder Anh-Hoang Truong, University of Colorado Boulder Taeho Kim, University of Colorado Boulder Nicholas Farrow, University of Colorado Boulder Anh Nguyen, University of Colorado Boulder Jianliang Xiao, University of Colorado Boulder Robin R. Deterding, Children's Hospital Colorado Thang N. Dinh, University of Colorado Boulder Tam Vu, University of Colorado Boulder |
FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device Interaction | Sangeun Oh, KAIST; et al. Ahyeon Kim, KAIST Sunjae Lee, KAIST Kilho Lee, KAIST Dae R. Jeong, KAIST Steve Ko, University at Buffalo Insik Shin, KAIST | |
NeurIPS Machine Learning | Distribution-Independent PAC Learning of Halfspaces with Massart Noise | Ilias Diakonikolas, University of Southern California; et al. Themis Gouleakis, Max Planck Institute for Informatics Christos Tzamos, University of Wisconsin–Madison |
NSDI Networking | Datacenter RPCs can be General and Fast | Zhenpeng Chen, Peking University; et al. Ziniu Hu, University of California, Los Angeles Xuan Lu, Peking University Qiaozhu Mei, University of Michigan Xuanzhe Liu, Peking University |
Understanding Lifecycle Management Complexity of Datacenter Topologies | Mingyang Zhang, University of Southern California; et al. Radhika Naranjan Mysore, VMware Inc. Sucha Supittayapornpong, University of Southern California Ramesh Govindan, University of Southern California | |
PLDI Programming Languages | Low-Latency Graph Streaming using Compressed Purely-Functional Trees | Laxman Dhulipala, Carnegie Mellon University; et al. Guy E. Blelloch, Carnegie Mellon University Julian Shun, Massachusetts Institute of Technology |
Continuously Reasoning about Programs using Differential Bayesian Inference | Kihong Heo, University of Pennsylvania; et al. Mukund Raghothaman, University of Pennsylvania Xujie Si, University of Pennsylvania Mayur Naik, University of Pennsylvania | |
Towards Certified Separate Compilation for Concurrent Programs | Hanru Jiang, University of Science and Technology of China; et al. Hongjin Liang, Nanjing University Siyang Xiao, University of Science and Technology of China Junpeng Zha, University of Science and Technology of China Xinyu Feng, Nanjing University | |
An Inductive Synthesis Framework for Verifiable Reinforcement Learning | He Zhu, Rutgers University; et al. Zikang Xiong, Purdue University Stephen Magill, Purdue University Suresh Jagannathan, Purdue University | |
A Typed, Algebraic Approach to Parsing | Neel Krishnaswami & Jeremy Yallop, University of Cambridge | |
Optimization and Abstraction: A Synergistic Approach for Analyzing Neural Network Robustness | Greg Anderson, University of Texas at Austin; et al. Shankara Pailoor, University of Texas at Austin Isil Dillig, University of Texas at Austin Swarat Chaudhuri, Rice University | |
PODS Databases | Interventional Fairness: Causal Database Repair for Algorithmic Fairness | Babak Salimi, University of Washington; et al. Luke Rodriguez, University of Washington Bill Howe, University of Washington Dan Suciu, University of Washington |
S&P Security and Privacy | Spectre Attacks: Exploiting Speculative Execution | Paul Kocher, Independent Researcher; et al. Jann Horn, Google Anders Fogh, G DATA Advanced Analytics Daniel Genkin, University of Pennsylvania Daniel Gruss, Graz University of Technology Werner Haas, Cyberus Technology Mike Hamburg, Rambus Moritz Lipp, Graz University of Technology Stefan Mangard, Graz University of Technology Thomas Prescher, Cyberus Technology Michael Schwarz, Graz University of Technology Yuval Yarom, University of Adelaide |
SIGCOMM Networking | Underwater Backscatter Networking | Junsu Jang & Fadel Abib, Massachusetts Institute of Technology |
SIGIR Information Retrieval | Variance Reduction in Gradient Exploration for Online Learning to Rank | Huazheng Wang, University of Virginia; et al. Sunwoo Kim, University of Virginia Eric McCord-Snook, University of Virginia Qingyun Wu, University of Virginia Hongning Wang, University of Virginia |
SIGMETRICS Performance | Computationally Efficient Estimation of the Spectral Gap of a Markov Chain | Richard Combes, Concours Centrale-Supélec Mikael Touati, Orange Labs |
SIGMOD Databases | Interventional Fairness: Causal Database Repair for Algorithmic Fairness | Babak Salimi, University of Washington; et al. Luke Rodriguez, University of Washington Bill Howe, University of Washington Dan Suciu, University of Washington |
SODA Theory | Sublinear Algorithms for (∆ + 1) Vertex Coloring | Sepehr Assadi, University of Pennsylvania; et al. Yu Chen, University of Pennsylvania Sanjeev Khanna, University of Pennsylvania |
SOSP Operating Systems | Scaling symbolic evaluation for automated verification of systems code with Serval | Luke Nelson, University of Washington; et al. James Bornhold, University of Washington Ronghui Gu, Columbia University Andrew Baumann, Microsoft Emina Torlak, University of Washington Xi Wang, University of Washington |
Efficient Scalable Thread-Safety-Violation Detection | Guangpu Li, University of Chicago; et al. Shan Lu, University of Chicago Madanlal Musuvathi, Microsoft Suman Nath, Microsoft Rohan Padhye, University of California, San Diego | |
STOC Theory | The Reachability Problem for Petri Nets is Not Elementary | Wojciech Czerwinski, University of Warsaw; et al. Slawomir Lasota, University of Warsaw Ranko Lazic, University of Warsaw Jerome Leroux, National Center for Scientific Research Filip Mazowiecki, University of Bordeaux |
Oracle Separation of BPQ and PH | Ran Raz, Princeton University Avishay Tal, Stanford University | |
Log-Concave Polynomials II: High-Dimensional Walks and an FPRAS for Counting Basis of a Matroid | Nima Anari, Stanford University; et al. Kuikui Liu, University of Washington Shayan Oveis Gharan, University of Washington Cynthia Vinzant, North Carolina State University | |
UIST User Interface | TipText: Eyes-Free Text Entry on a Fingertip Keyboard | Zheer Xu, Dartmouth College; et al. Pui Chung Wong, Dartmouth College Jun Gong, Dartmouth College Te-Yen Wu, Dartmouth College Aditya Nittala, Saarland University Xiaojun Bi, Stony Brook University Jürgen Steimle, Saarland University Hongbo Fu, City University of Hong Kong Kening Zhu, City University of Hong Kong Xing-Dong Yang, Dartmouth College |
VLDB Databases | Fine-Grained, Secure and Efficient Data Provenance for Blockchain | Pingcheng Ruan, National University of Singapore; et al. Gang Chen, Zhejiang University Tien Tuan Anh Dinh, National University of Singapore Qian Lin, National University of Singapore Beng Chin Ooi, National University of Singapore |
WWW World Wide Web | Emoji-Powered Representation Learning for Cross-Lingual Sentiment Classification | Zhenpeng Chen, Peking University; et al. Ziniu Hu, University of California, Los Angeles Xuan Lu, Peking University Qiaozhu Mei, University of Michigan Xuanzhe Liu, Peking University |
OUTGUARD: Detecting In-Browser Covert Cryptocurrency Mining in the Wild | Amin Kharraz, University of Illinois at Urbana–Champaign; et al. Zane Ma, University of Illinois at Urbana–Champaign Paul Murley, University of Illinois at Urbana–Champaign Charles Lever, Georgia Institute of Technology Joshua Mason, University of Illinois at Urbana–Champaign Andrew Miller, University of Illinois at Urbana–Champaign Nikita Borisov, University of Illinois at Urbana–Champaign Manos Antonakakis, Georgia Institute of Technology Michael Donald Bailey, University of Illinois at Urbana–Champaign |
2018 | ||
---|---|---|
AAAI Artificial Intelligence | Memory-Augmented Monte Carlo Tree Search | Chenjun Xiao, University of Alberta; et al. Jincheng Mei, University of Alberta Martin Müller, University of Alberta |
ACL Natural Language Processing | Finding syntax in human encephalography with beam search | John Hale, Cornell University; et al. Chris Dyer, DeepMind Adhiguna Kuncoro, University of Oxford Jonathan R. Brennan, University of Michigan |
Learning to Ask Good Questions: Ranking Clarification Questions using Neural Expected Value of Perfect Information | Sudha Rao & Hal Daumé III, University of Maryland | |
Let's do it "again": A First Computational Approach to Detecting Adverbial Presupposition Triggers | Andre Cianflone, McGill University; et al. Yulan Feng, McGill University Jad Kabbara, McGill University Jackie Chi Kit Cheung, McGill University | |
CHI Human-Computer Interaction | Agile 3D Sketching with Air Scaffolding | Yongkwan Kim, KAIST; et al. Sang-Gyun An, KAIST Joon Hyub Lee, KAIST Seok-Hyung Bae, KAIST |
Pinpointing: Precise Head- and Eye-Based Target Selection for Augmented Reality | Mikko Kytö, Aalto University; et al. Barrett Ens, University of South Australia Thammathip Piumsomboon, University of South Australia Gun A. Lee, University of South Australia Mark Billinghurst, University of South Australia | |
Data Illustrator: Augmenting Vector Design Tools with Lazy Data Binding for Expressive Visualization Authoring | Zhicheng Liu, Adobe; et al. John Thompson, Georgia Institute of Technology Alan Wilson, Adobe Systems Inc. Mira Dontcheva, Adobe James Delorey, Adobe Systems Inc. Sam Grigg, Adobe Systems Inc. Bernard Kerr, Adobe Systems Inc. John Stasko, Georgia Institute of Technology | |
"A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology | Diana Freed, Cornell University; et al. Jackeline Palmer, Hunter College Diana Minchala, City College of New York Karen Levy, Cornell University Thomas Ristenpart, Cornell University Nicola Dell, Cornell University | |
Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants | Tamy Guberek, University of Michigan; et al. Allison McDonald, University of Michigan Sylvia Simioni, University of Michigan Abraham H. Mhaidli, University of Michigan Kentaro Toyama, University of Michigan Florian Schaub, University of Michigan | |
Streets for People: Engaging Children in Placemaking Through a Socio-technical Process | Sean Peacock, Newcastle University; et al. Robert Anderson, Newcastle University Clara Crivellaro, Newcastle University | |
Addressing Age-Related Bias in Sentiment Analysis | Mark Diaz, Northwestern University; et al. Isaac Johnson, Northwestern University Amanda Lazar, University of Maryland Anne Marie Piper, Northwestern University Darren Gergle, Northwestern University | |
From Her Story, to Our Story: Digital Storytelling as Public Engagement around Abortion Rights Advocacy in Ireland | Lydia Michie, Newcastle University; et al. Madeline Balaam, Royal Institute of Technology John McCarthy, University College Cork Timur Osadchiy, Newcastle University Kellie Morrissey, Newcastle University | |
Gender Recognition or Gender Reductionism?: The Social Implications of Embedded Gender Recognition Systems | Foad Hamidi, University of Maryland; et al. Morgan Klaus Scheuerman, University of Maryland Stacy M. Branham, University of Maryland | |
How Relevant are Incidental Power Poses for HCI? | Yvonne Jansen, Sorbonne University Kasper Hornbæk, University of Copenhagen | |
Voice Interfaces in Everyday Life | Martin Porcheron, University of Nottingham; et al. Joel E. Fischer, University of Nottingham Stuart Reeves, University of Nottingham Sarah Sharples, University of Nottingham | |
Examining Wikipedia With a Broader Lens: Quantifying the Value of Wikipedia's Relationships with Other Large-Scale Online Communities | Nicholas Vincent, Northwestern University; et al. Isaac Johnson, Northwestern University Brent Hecht, Northwestern University | |
Let's Talk About Race: Identity, Chatbots, and AI | Ari Schlesinger, Georgia Institute of Technology; et al. Kenton P. O'Hara, Microsoft Alex S. Taylor, City, University of London | |
Semi-Automated Coding for Qualitative Research: A User-Centered Inquiry and Initial Prototypes | Megh Marathe & Kentaro Toyama, University of Michigan | |
Wall++: Room-Scale Interactive and Context-Aware Sensing | Yang Zhang, Carnegie Mellon University; et al. Chouchang (Jack) Yang, Disney Research Scott E. Hudson, Carnegie Mellon University Chris Harrison, Carnegie Mellon University Alanson Sample, Disney Research | |
HARK No More: On the Preregistration of CHI Experiments | Andy Cockburn, University of Canterbury; et al. Carl Gutwin, University of Saskatchewan Alan Dix, University of Birmingham | |
Making as Expression: Informing Design with People with Complex Communication Needs through Art Therapy | Amanda Lazar, University of Maryland; et al. Jessica L. Feuston, Northwestern University Caroline Edasis, Mather LifeWays Anne Marie Piper, Northwestern University | |
Expressive Time Series Querying with Hand-Drawn Scale-Free Sketches | Miro Mannino & Azza Abouzied, New York University | |
Project Zanzibar: A Portable and Flexible Tangible Interaction Platform | Nicolas Villar, Microsoft; et al. Daniel Cletheroe, Microsoft Greg Saul, Microsoft Christian Holz, Microsoft Tim Regan, Microsoft Oscar Salandin, Microsoft Misha Sra, Microsoft Hui-Shyong Yeo, Microsoft William Field, Microsoft Haiyan Zhang, Microsoft | |
Experiencing the Body as Play | Florian 'Floyd' Mueller, RMIT University; et al. Richard Byrne, RMIT University Josh Andres, RMIT University Rakesh Patibanda, RMIT University | |
Making Core Memory: Design Inquiry into Gendered Legacies of Engineering and Craftwork | Daniela K. Rosner, University of Washington; et al. Samantha Shorey, University of Washington Brock R. Craft, University of Washington Helen Remick, Independent Researcher | |
Design for Collaborative Survival: An Inquiry into Human-Fungi Relationships | Jen Liu, University of Colorado Boulder; et al. Daragh Byrne, Carnegie Mellon University Laura Devendorf, University of Colorado Boulder | |
Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in Bangladesh | Sharifa Sultana, Cornell University; et al. François Guimbretière, Cornell University Phoebe Sengers, Cornell University Nicola Dell, Cornell University | |
Hoarding and Minimalism: Tendencies in Digital Data Preservation | Francesco Vitale, University of British Columbia; et al. Izabelle Janzen, University of British Columbia Joanna McGrenere, University of British Columbia | |
Extending Manual Drawing Practices with Artist-Centric Programming Tools | Jennifer Jacobs, Massachusetts Institute of Technology; et al. Joel Brandt, Adobe Radomír Mech, Adobe Mitchel Resnick, Massachusetts Institute of Technology | |
CIKM Knowledge Management | Relevance estimation with multiple information sources on search engine result pages | Junqi Zhang, Tsinghua University; et al. Yiqun Liu, Tsinghua University Shaoping Ma, Tsinghua University Qi Tian, University of Texas at San Antonio |
CVPR Computer Vision | Taskonomy: Disentangling Task Transfer Learning | Amir R. Zamir, Stanford University; et al. Alexander Sax, Stanford University William Shen, Stanford University Leonidas Guibas, Stanford University Jitendra Malik, University of California, Berkeley Silvio Savarese, Stanford University |
FOCS Theory | Classical Verification of Quantum Computation | Urmila Mahadev, University of California, Berkeley |
Pseudorandom Sets in Grassmann Graph have Near-Perfect Expansion | Subhash Khot, New York University; et al. Dor Minzer, Tel Aviv University Muli Safra, Tel Aviv University | |
Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic Time | Diptarka Chakraborty, Computer Science Institute of Charles University; et al. Debarati Das, Computer Science Institute of Charles University Elazar Goldenberg, The Academic College of Tel Aviv-Yaffo Michal Koucký, Computer Science Institute of Charles University Michael Saks, Rutgers University | |
FSE Software Engineering | The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the Ecosystem Scale | James C. Davis, Virginia Tech; et al. Christy A. Coghlan, Virginia Tech Francisco Servant, Virginia Tech Dongyoon Lee, Virginia Tech |
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks | Shengjian (Daniel) Guo, Virginia Tech; et al. Meng Wu, Virginia Tech Chao Wang, University of Southern California | |
Data Race Detection on Compressed Traces | Dileep Kini, University of Illinois at Urbana–Champaign; et al. Umang Mathur, University of Illinois at Urbana–Champaign Mahesh Viswanathan, University of Illinois at Urbana–Champaign | |
Do Android Taint Analysis Tools Keep Their Promises? | Felix Pauck, University of Paderborn; et al. Eric Bodden, University of Paderborn Heike Wehrheim, University of Paderborn | |
An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems | Yu Gao, Chinese Academy of Sciences; et al. Wensheng Dou, Chinese Academy of Sciences Feng Qin, Ohio State University Chushu Gao, Chinese Academy of Sciences Dong Wang, Chinese Academy of Sciences Jun Wei, Chinese Academy of Sciences Ruirui Huang, Alibaba Group Li Zhou, Alibaba Group Yongming Wu, Alibaba Group | |
Oreo: Detection of Clones in the Twilight Zone | Vaibhav Saini, University of California, Irvine; et al. Farima Farmahinifarahani, University of California, Irvine Yadong Lu, University of California, Irvine Pierre Baldi, University of California, Irvine Crista Lopes, University of California, Irvine | |
ICML Machine Learning | Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples | Anish Athalye, Massachusetts Institute of Technology; et al. Nicholas Carlini, University of California, Berkeley David Wagner, University of California, Berkeley |
Delayed Impact of Fair Machine Learning | Lydia T. Liu, University of California, Berkeley; et al. Sarah Dean, University of California, Berkeley Esther Rolf, University of California, Berkeley Max Simchowitz, University of California, Berkeley Moritz Hardt, University of California, Berkeley | |
ICSE Software Engineering | Large-Scale Analysis of Framework-Specific Exceptions in Android Apps | Lingling Fan, East China Normal University; et al. Ting Su, Nanyang Technological University Sen Chen, East China Normal University Guozhu Meng, Chinese Academy of Sciences Yang Liu, Nanyang Technological University Lihua Xu, East China Normal University Geguang Pu, East China Normal University Zhendong Su, University of California, Davis |
Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-After-Free Vulnerabilities | Hua Yan, University of New South Wales; et al. Yulei Sui, University of Technology Sydney Shiping Chen, CSIRO's Data61 Jingling Xue, University of New South Wales | |
Identifying Design Problems in the Source Code: A Grounded Theory | Leonardo Sousa, Pontifical Catholic University of Rio de Janeiro; et al. Anderson Oliveira, Pontifical Catholic University of Rio de Janeiro Willian Oizumi, Pontifical Catholic University of Rio de Janeiro Simone Barbosa, Pontifical Catholic University of Rio de Janeiro Alessandro Garcia, Pontifical Catholic University of Rio de Janeiro Jaejoon Lee, University of Lancaster Marcos Kalinowski, Pontifical Catholic University of Rio de Janeiro Rafael de Mello, Pontifical Catholic University of Rio de Janeiro Baldoino Fonseca, Universidade Federal de Alagoas Roberto Oliveira, Pontifical Catholic University of Rio de Janeiro Carlos Lucena, Pontifical Catholic University of Rio de Janeiro Rodrigo Paes, Pontifical Catholic University of Rio de Janeiro | |
Static Automated Program Repair for Heap Properties | Rijnard van Tonder & Claire Le Goues, Carnegie Mellon University | |
Automated Localization for Unreproducible Builds | Zhilei Ren, Dalian University of Technology; et al. He Jiang, Dalian University of Technology Jifeng Xuan, Wuhan University Zijiang Yang, Western Michigan University | |
Generalized Data Structure Synthesis | Calvin Loncaric, University of Washington; et al. Michael D. Ernst, University of Washington Emina Torlak, University of Washington | |
Traceability in the Wild: Automatically Augmenting Incomplete Trace links | Michael Rath, Technical University Ilmenau; et al. Jacob Rendall, University of Notre Dame Jin L. C. Guo, McGill University Jane Cleland-Huang, University of Notre Dame Patrick Mäder, Technical University Ilmenau | |
Towards Optimal Concolic Testing | Xinyu Wang, Zhejiang University; et al. Jun Sun, Singapore University of Technology and Design Zhenbang Chen, National University of Defense Technology Peixin Zhang, Zhejiang University Jingyi Wang, Singapore University of Technology and Design Yun Lin, National University of Singapore | |
IJCAI Artificial Intelligence | SentiGAN: Generating Sentimental Texts via Mixture Adversarial Networks | Ke Wang & Xiaojun Wan, Peking University |
Reasoning about Consensus when Opinions Diffuse through Majority Dynamics | Vincenzo Auletta, University of Salerno; et al. Diodato Ferraioli, University of Salerno Gianluigi Greco, University of Calabria | |
R-SVM+: Robust Learning with Privileged Information | Xue Li, Wuhan University; et al. Bo Du, Wuhan University Chang Xu, University of Sydney Yipeng Zhang, Wuhan University Lefei Zhang, Wuhan University Dacheng Tao, University of Sydney | |
From Conjunctive Queries to Instance Queries in Ontology-Mediated Querying | Cristina Feier, University of Bremen; et al. Carsten Lutz, University of Bremen Frank Wolte, University of Liverpool | |
What game are we playing? End-to-end learning in normal and extensive form games | Chun Kai Ling, Carnegie Mellon University; et al. Fei Fang, Carnegie Mellon University J. Zico Kolter, Carnegie Mellon University | |
Commonsense Knowledge Aware Conversation Generation with Graph Attention | Hao Zhou, Tsinghua University; et al. Tom Young, Beijing Institute of Technology Minlie Huang, Tsinghua University Haizhou Zhao, Sogou Jingfang Xu, Sogou Xiaoyan Zhu, Tsinghua University | |
A Degeneracy Framework for Graph Similarity | Giannis Nikolentzos, École Polytechnique; et al. Polykarpos Meladianos, Athens University of Economics and Business Stratis Limnios, École Polytechnique Michalis Vazirgiannis, École Polytechnique | |
INFOCOM Networking | Understanding Ethereum via Graph Analysis | Ting Chen, University of Electronic Science and Technology of China; et al. Yuxiao Zhu, Guangdong University of Technology Zihao Li, University of Electronic Science and Technology of China Jiachi Chen, Hong Kong Polytechnic University Xiaoqi Li, Hong Kong Polytechnic University Xiapu Luo, Hong Kong Polytechnic University Xiaodong Lin, Wilfrid Laurier University Xiaosong Zhang, University of Electronic Science and Technology of China |
WiFED: WiFi Friendly Energy Delivery with Distributed Beamforming | Subhramoy Mohanti, Northeastern University; et al. Elif Bozkaya, Istanbul Technical University M. Yousof Naderi, Northeastern University Berk Canberk, Istanbul Technical University Kaushik Chowdhury, Northeastern University | |
Optimizing Age of Information in Wireless Networks with Throughput Constraints | Igor Kadota, Massachusetts Institute of Technology; et al. Abhishek Sinha, Massachusetts Institute of Technology Eytan Modiano, Massachusetts Institute of Technology | |
KDD Data Mining | Adversarial Attacks on Neural Networks for Graph Data | Daniel Zügner, Technical University of Munich; et al. Amir Akbarnejad, Technical University of Munich Stephan Günnemann, Technical University of Munich |
MOBICOM Mobile | SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks | Mehrdad Moradi, University of Michigan; et al. Karthikeyan Sundaresan, NEC Labs America Eugene Chai, NEC Labs America Sampath Rangarajan, NEC Labs America Z. Morley Mao, University of Michigan |
NeurIPS Machine Learning | Non-delusional Q-learning and Value-iteration | Tyler Lu, Google; et al. Dale Schuurmans, Google Craig Boutilier, Google |
Optimal Algorithms for Non-Smooth Distributed Optimization in Networks | Kevin Scaman, Huawei; et al. Francis Bach, Inria Sébastien Bubeck, Microsoft Yin Tat Lee, Microsoft Laurent Massoulié, Inria | |
Nearly Tight Sample Complexity Bounds for Learning Mixtures of Gaussians via Sample Compression Schemes | Hassan Ashtiani, McMaster University; et al. Shai Ben-David, University of Waterloo Nick Harvey, University of British Columbia Christopher Liaw, University of British Columbia Abbas Mehrabian, McGill University Yaniv Plan, University of British Columbia | |
Neural Ordinary Differential Equations | Tian Qi Chen, University of Toronto; et al. Yulia Rubanova, University of Toronto Jesse Bettencourt, University of Toronto David Duvenaud, University of Toronto | |
NSDI Networking | NetChain: Scale-Free Sub-RTT Coordination | Xin Jin, Johns Hopkins University; et al. Xiaozhou Li, Barefoot Networks Haoyu Zhang, Princeton University Nate Foster, Cornell University Jeongkeun Lee, Barefoot Networks Robert Soulé, University of Lugano Changhoon Kim, Barefoot Networks Ion Stoica, University of California, Berkeley |
OSDI Operating Systems | REPT: Reverse Debugging of Failures in Deployed Software | Weidong Cui, Microsoft; et al. Xinyang Ge, Microsoft Baris Kasikci, University of Michigan Ben Niu, Microsoft Upamanyu Sharma, University of Michigan Ruoyu Wang, Arizona State University Insu Yun, Georgia Institute of Technology |
LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation | Yizhou Shan, Purdue University; et al. Yutong Huang, Purdue University Yilun Chen, Purdue University Yiying Zhang, Purdue University | |
Orca: Differential Bug Localization in Large-Scale Services | Ranjita Bhagwan, Microsoft; et al. Rahul Kumar, Microsoft Chandra Sekhar Maddila, Microsoft Adithya Abraham Philip, Microsoft | |
PLDI Programming Languages | Program synthesis using conflict-driven learning | Yu Feng, University of Texas at Austin; et al. Ruben Martins, Carnegie Mellon University Osbert Bastani, Massachusetts Institute of Technology Isil Dillig, University of Texas at Austin |
A data-driven CHC solver | He Zhu, Galois; et al. Stephen Magill, Galois Suresh Jagannathan, Purdue University | |
The Semantics of Transactions and Weak Memory in x86, Power, ARM, and C++ | Nathan Chong, weapon; et al. Tyler Sorensen, Imperial College London John Wickerson, Imperial College London | |
PODS Databases | Entity Matching with Active Monotone Classification | Yufei Tao, The Chinese University of Hong Kong |
S&P Security and Privacy | On Enforcing the Digital Immunity of a Large Humanitarian Organization | Stevens Le Blond, École Polytechnique Fédérale de Lausanne; et al. Alejandro Cuevas, École Polytechnique Fédérale de Lausanne Juan Ramón Troncoso-Pastoriza, École Polytechnique Fédérale de Lausanne Philipp Jovanovic, École Polytechnique Fédérale de Lausanne Bryan Ford, École Polytechnique Fédérale de Lausanne Jean-Pierre Hubaux, École Polytechnique Fédérale de Lausanne |
DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice | Vincent Cheval, Inria; et al. Steve Kremer, Inria Itsaka Rakotonirina, Inria | |
SIGCOMM Networking | Inferring Persistent Interdomain Congestion | Amogh Dhamdhere, University of California, San Diego; et al. David D. Clark, Massachusetts Institute of Technology Alexander Gamero-Garrido, University of California, San Diego Matthew Luckie, University of Waikato Ricky K. P. Mok, University of California, San Diego Gautam Akiwate, University of California, San Diego Kabir Gogia, University of California, San Diego Vaibhav Bajpai, Technical University of Munich Alex C. Snoeren, University of California, San Diego kc claffy, University of California, San Diego |
SIGIR Information Retrieval | Should I Follow the Crowd? A Probabilistic Analysis of the Effectiveness of Popularity in Recommender Systems | Rocío Cañamares & Pablo Castells, Autonomous University of Madrid |
SIGMETRICS Performance | A Refined Mean Field Approximation | Nicolas Gast, Inria Benny Van Houdt, University of Antwerp |
SIGMOD Databases | SuRF: Practical Range Query Filtering with Fast Succinct Tries | Huanchen Zhang, Carnegie Mellon University; et al. Hyeontaek Lim, Carnegie Mellon University Viktor Leis, Technical University of Munich David G. Andersen, Carnegie Mellon University Michael Kaminsky, Intel Kimberly Keeton, Hewlett Packard Andrew Pavlo, Carnegie Mellon University |
SODA Theory | Approaching 3/2 for the s-t-path TSP | Vera Traub & Jens Vygen, University of Bonn |
Online Bipartite Matching with Amortized O(log2 N)Replacements | Aaron Bernstein, Technical University of Berlin; et al. Jacob Holm, University of Copenhagen Eva Rotenberg, Technical University of Denmark | |
STOC Theory | A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem | Ola Svensson, École Polytechnique Fédérale de Lausanne; et al. Jakub Tarnawski, École Polytechnique Fédérale de Lausanne László A. Végh, London School of Economics and Political Science |
UIST User Interface | Authoring and Verifying Human-Robot Interactions | David Porfirio, University of Wisconsin–Madison; et al. Allison Sauppé, University of Wisconsin–La Crosse Aws Albarghouthi, University of Wisconsin–Madison Bilge Mutlu, University of Wisconsin–Madison |
Porta: Profiling Software Tutorials Using Operating-System-Wide Activity Tracing | Alok Mysore & Philip J. Guo, University of California, San Diego | |
RESi: A Highly Flexible, Pressure-Sensitive, Imperceptible Textile Interface Based on Resistive Yarns | Patrick Parzer, University of Applied Sciences Upper Austria; et al. Florian Perteneder, University of Applied Sciences Upper Austria Kathrin Probst, University of Applied Sciences Upper Austria Christian Rendl, University of Applied Sciences Upper Austria Joanne Leong, University of Applied Sciences Upper Austria Sarah Schuetz, University of Applied Sciences Upper Austria Anita Vogl, University of Applied Sciences Upper Austria Reinhard Schwoediauer, Johannes Kepler University Linz Martin Kaltenbrunner, Johannes Kepler University Linz Siegfried Bauer, Johannes Kepler University Linz Michael Haller, University of Applied Sciences Upper Austria | |
VLDB Databases | The Ubiquity of Large Graphs and Surprising Challenges of Graph Processing: Extended Survey | Siddhartha Sahu, University of Waterloo; et al. Amine Mhedhbi, University of Waterloo Semih Salihoglu, University of Waterloo Jimmy Lin, University of Waterloo M. Tamer Özsu, University of Waterloo |
WWW World Wide Web | HighLife: Higher-arity Fact Harvesting | Patrick Ernst, Saarland Informatics CampusSaarbrücken; et al. Amy Siu, Saarland Informatics CampusSaarbrücken Gerhard Weikum, Saarland Informatics CampusSaarbrücken |
2017 | ||
---|---|---|
AAAI Artificial Intelligence | Label-Free Supervision of Neural Networks with Physics and Domain Knowledge | Russell Stewart & Stefano Ermon, Stanford University |
ACL Natural Language Processing | Probabilistic Typology: Deep Generative Models of Vowel Inventories | Ryan Cotterell & Jason Eisner, Johns Hopkins University |
CHI Human-Computer Interaction | Kinecting with Orangutans: Zoo Visitors' Empathetic Responses to Animals' Use of Interactive Technology | Sarah Webber, University of Melbourne; et al. Marcus Carter, University of Melbourne Sally Sherwen, Zoos Victoria Wally Smith, University of Melbourne Zaher Joukhadar, University of Melbourne Frank Vetere, University of Melbourne |
Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing, Actuation, and Interaction | Viirj Kan, Massachusetts Institute of Technology; et al. Emma Vargo, Massachusetts Institute of Technology Noa Machover, Massachusetts Institute of Technology Hiroshi Ishii, Massachusetts Institute of Technology Serena Pan, Massachusetts Institute of Technology Weixuan Chen, Massachusetts Institute of Technology Yasuaki Kakehi, Keio University | |
Understanding Public Evaluation: Quantifying Experimenter Intervention | Julie R. Williamson & John Williamson, University of Glasgow | |
Designing Gamified Applications that Make Safe Driving More Engaging | Fabius Steinberger, Queensland University of Technology; et al. Ronald Schroeter, Queensland University of Technology Marcus Foth, Queensland University of Technology Daniel Johnson, Queensland University of Technology | |
Illumination Aesthetics: Light as a Creative Material within Computational Design | Cesar Torres, University of California, Berkeley; et al. Jasper O'Leary, University of California, Berkeley Molly Nicholas, University of California, Berkeley Eric Paulos, University of California, Berkeley | |
Empowered participation: How Citizens Use Technology in Local Governance | Sheena Erete, DePaul University Jennifer O. Burrell, MadX LLC | |
Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse | Tara Matthews, Google; et al. Kathleen O'Leary, University of Washington Anna Turner, Google Manya Sleeper, Google Jill Palzkill Woelfer, Google Martin Shelton, Google Cori Manthorne, Community Overcoming Relationship Abuse Elizabeth F. Churchill, Google Sunny Consolvo, Google | |
ShareVR: Enabling Co-Located Experiences for Virtual Reality between HMD and Non-HMD Users | Jan Gugenheimer, University of Ulm; et al. Evgeny Stemasov, University of Ulm Julian Frommel, University of Ulm Enrico Rukzio, University of Ulm | |
Examining Menstrual Tracking to Inform the Design of Personal Informatics Tools | Daniel A. Epstein, University of Washington; et al. Nicole B. Lee, Independent Researcher Jennifer H. Kang, University of Washington Elena Agapie, University of Washington Jessica Schroeder, University of Washington Laura R. Pina, University of Washington James Fogarty, University of Washington Julie A. Kientz, University of Washington Sean Munson, University of Washington | |
Explaining the Gap: Visualizing One's Predictions Improves Recall and Comprehension of Data | Yea-Seul Kim, University of Washington; et al. Katharina Reinecke, University of Washington Jessica Hullman, University of Washington | |
mHealth for Maternal Mental Health: Everyday Wisdom in Ethical Design | Marguerite Barry, Trinity College Dublin; et al. Kevin Doherty, Trinity College Dublin Jose Marcano Belisario, Imperial College London Josip Car, Imperial College London Cecily Morrison, Imperial College London Gavin Doherty, Trinity College Dublin | |
A Critical Lens on Dementia and Design in HCI | Amanda Lazar, Northwestern University; et al. Caroline Edasis, Mather LifeWays Anne Marie Piper, Northwestern University | |
What Is Interaction? | Kasper Hornbæk, University of Copenhagen Antti Oulasvirta, Aalto University | |
BIGnav: Bayesian Information Gain for Guiding Multiscale Navigation | Wanyu Liu, Paris-Saclay University; et al. Rafael Lucas D'Oliveira, University of Campinas Michel Beaudouin-Lafon, Paris-Saclay University Olivier Rioul, Paris-Saclay University | |
Modelling Learning of New Keyboard Layouts | Jussi P. P. Jokinen, Aalto University; et al. Sayan Sarcar, Kochi University of Technology Antti Oulasvirta, Aalto University Chaklam Silpasuwanchai, Kochi University of Technology Zhenxin Wang, Kochi University of Technology Xiangshi Ren, Kochi University of Technology | |
Flash Organizations: Crowdsourcing Complex Work by Structuring Crowds As Organizations | Melissa A. Valentine, Stanford University; et al. Daniela Retelny, Stanford University Alexandra To, Carnegie Mellon University Negar Rahmati, Stanford University Tulsee Doshi, Stanford University Michael Bernstein, Stanford University | |
Reflective Practicum: A Framework of Sensitising Concepts to Design for Transformative Reflection | Petr Slovák, TU Wien; et al. Christopher Frauenberger, TU Wien Geraldine Fitzpatrick, TU Wien | |
Fingertip Tactile Devices for Virtual Object Manipulation and Exploration | Samuel B. Schorr & Allison M. Okamura, Stanford University | |
What Can Be Predicted from Six Seconds of Driver Glances? | Lex Fridman, Massachusetts Institute of Technology; et al. Heishiro, Toyoda Toyota Collaborative Safety Research Center Sean Seaman, Touchstone Evaluations Bobbie Seppelt, Touchstone Evaluations Linda Angell, Touchstone Evaluations Joonbum Lee, Massachusetts Institute of Technology Bruce Mehler, Massachusetts Institute of Technology Bryan Reimer, Massachusetts Institute of Technology | |
Design and Evaluation of a Data-Driven Password Meter | Blase Ur, University of Chicago; et al. Felicia Alfieri, Carnegie Mellon University Maung Aung, Carnegie Mellon University Lujo Bauer, Carnegie Mellon University Nicolas Christin, Carnegie Mellon University Jessica Colnago, Carnegie Mellon University Lorrie Faith Cranor, Carnegie Mellon University Henry Dixon, Carnegie Mellon University Pardis Emami Naeini, Carnegie Mellon University Hana Habib, Carnegie Mellon University Noah Johnson, Carnegie Mellon University William Melicher, Carnegie Mellon University | |
You Want Me to Work with Who?: Stakeholder Perceptions of Automated Team Formation in Project-based Courses | Farnaz Jahanbakhsh, University of Illinois at Urbana–Champaign; et al. Wai-Tat Fu, University of Illinois at Urbana–Champaign Karrie Karahalios, University of Illinois at Urbana–Champaign Darko Marinov, University of Illinois at Urbana–Champaign Brian Bailey, University of Illinois at Urbana–Champaign | |
Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing Actuation and Interaction | Viirj Kan, Massachusetts Institute of Technology; et al. Emma Vargo, Massachusetts Institute of Technology Noa Machover, Massachusetts Institute of Technology Hiroshi Ishii, Massachusetts Institute of Technology Serena Pan, Massachusetts Institute of Technology Weixuan Chen, Massachusetts Institute of Technology Yasuaki Kakehi, Massachusetts Institute of Technology | |
CIKM Knowledge Management | Hike: A Hybrid Human-Machine Method for Entity Alignment in Large-Scale Knowledge Bases | Yan Zhuang, Tsinghua University; et al. Guoliang Li, Tsinghua University Zhuojian Zhong, Tsinghua University Jianhua Feng, Tsinghua University |
CVPR Computer Vision | Densely Connected Convolutional Networks | Zhuang Liu, Tsinghua University; et al. Gao Huang, Cornell University Laurens van der Maaten, Meta Kilian Q. Weinberger, Cornell University |
Learning from Simulated and Unsupervised Images through Adversarial Training | Ashish Shrivastava, Apple; et al. Tomas Pfister, Apple Oncel Tuzel, Apple Josh Susskind, Apple Wenda Wang, Apple Russ Webb, Apple | |
FOCS Theory | A dichotomy theorem for nonuniform CSPs | Andrei A. Bulatov, Simon Fraser University |
The Proof of CSP Dichotomy Conjecture | Dmitriy Zhuk, Moscow State University | |
The Matching Problem in General Graphs is in Quasi-NC | Ola Svensson & Jakub Tarnawski, École Polytechnique Fédérale de Lausanne | |
FSE Software Engineering | The Power of "Why" and "Why Not": Enriching Scenario Exploration with Provenance | Tim Nelson, Brown University; et al. Natasha Danas, Brown University Daniel J. Dougherty, Worcester Polytechnic Institute Shriram Krishnamurthi, Brown University |
Understanding Misunderstandings in Source Code | Dan Gopstein, New York University; et al. Jake Iannacone, New York University Yu Yan, Pennsylvania State University Lois DeLong, New York University Yanyan Zhuang, University of Colorado Boulder Martin K.-C. Yeh, Pennsylvania State University Justin Cappos, New York University | |
Trade-Offs in Continuous Integration: Assurance, Security, and Flexibility | Michael Hilton, Oregon State University; et al. Nicholas Nelson, Oregon State University Timothy Tunnell, University of Illinois at Urbana–Champaign Darko Marinov, University of Illinois at Urbana–Champaign Danny Dig, Oregon State University | |
Cooperative Kernels: GPU Multitasking for Blocking Algorithms | Tyler Sorensen, Imperial College London; et al. Hugues Evrard, Imperial College London Alastair F. Donaldson, Imperial College London | |
Fairness Testing: Testing Software for Discrimination | Sainyam Galhotra, University of Massachusetts Amherst; et al. Yuriy Brun, University of Massachusetts Amherst Alexandra Meliou, University of Massachusetts Amherst | |
Discovering Relational Specifications | Calvin Smith, University of Wisconsin–Madison; et al. Gabriel Ferns, University of Wisconsin–Madison Aws Albarghouthi, University of Wisconsin–Madison | |
Automatically Diagnosing and Repairing Error Handling Bugs in C | Yuchi Tian & Baishakhi Ray, University of Virginia | |
ICCV Computer Vision | Mask R-CNN | Kaiming He, Meta; et al. Georgia Gkioxari, Meta Piotr Dollar, Meta Ross Girshick, Meta |
ICML Machine Learning | Understanding Black-box Predictions via Influence Functions | Pang Wei Koh & Percy Liang, Stanford University |
ICSE Software Engineering | Clone Refactoring with Lambda Expressions | Nikolaos Tsantalis, Concordia University; et al. Davood Mazinanian, Concordia University Shahriar Rostami, Concordia University |
A Grounded Theory of Agile Transitions in Practice | Rashina Hoda, University of Auckland James Noble Victoria, Victoria University of Wellington | |
Code Defenders: Crowdsourcing Effective Tests and Subtle Mutants with a Mutation Testing Game | José Miguel Rojas, University of Sheffield; et al. Thomas D. White, University of Sheffield Benjamin S. Clegg, University of Sheffield Gordon Fraser, University of Sheffield | |
Decoding the representation of code in the brain: An fMRI study of code review and expertise | Benjamin Floyd, University of Virginia; et al. Tyler Santander, University of Virginia Westley Weimer, University of Virginia | |
Challenges for Static Analysis of Java Reflection - Literature Review and Empirical Study | Davy Landman, Centrum Wiskunde & Informatica; et al. Alexander Serebrenik, Centrum Wiskunde & Informatica Jurgen J. Vinju, Centrum Wiskunde & Informatica | |
Optimizing Test Placement for Module-Level Regression Testing | August Shi, University of Illinois at Urbana–Champaign; et al. Suresh Thummalapenta, Microsoft Shuvendu K. Lahiri, Microsoft Nikolaj Bjorner, Microsoft Jacek Czerwonka, Microsoft | |
IJCAI Artificial Intelligence | Foundations of Declarative Data Analysis Using Limit Datalog Programs | Mark Kaminski, University of Oxford; et al. Bernardo Cuenca Grau, University of Oxford Egor V. Kostylev, University of Oxford Boris Motik, University of Oxford Ian Horrocks, University of Oxford |
INFOCOM Networking | One Step at a Time: Optimizing SDN Upgrades in ISP Networks | Konstantinos Poularakis, Yale University; et al. George Iosifidis, Yale University Georgios Smaragdakis, Massachusetts Institute of Technology Leandros Tassiulas, Yale University |
KDD Data Mining | Accelerating Innovation Through Analogy Mining | Tom Hope, Hebrew University of Jerusalem; et al. Joel Chan, Carnegie Mellon University Aniket Kittur, Carnegie Mellon University Dafna Shahaf, Hebrew University of Jerusalem |
MOBICOM Mobile | WEBee: Physical-Layer Cross-Technology Communication via Emulation | Zhijun Li & Tian He, University of Minnesota |
NeurIPS Machine Learning | Safe and Nested Subgame Solving for Imperfect-Information Games | Noam Brown & Tuomas Sandholm, Carnegie Mellon University |
Variance-based Regularization with Convex Objectives | Hongseok Namkoong & John Duchi, Stanford University | |
A Linear-Time Kernel Goodness-of-Fit Test | Wittawat Jitkrittum, University College London; et al. Wenkai Xu, University College London Zoltan Szabo, École Polytechnique Kenji Fukumizu, The Institute of Statistical Mathematics Arthur Gretton, University College London | |
NSDI Networking | mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes | Muhammad Asim Jamshed, KAIST; et al. YoungGyoun Moon, KAIST Donghwi Kim, KAIST Dongsu Han, KAIST KyoungSoo Park, KAIST |
PLDI Programming Languages | Low Overhead Dynamic Binary Translation on ARM | Amanieu D'Antras, University of Manchester; et al. Cosmin Gorgovan, University of Manchester Jim Garside, University of Manchester Mikel Luján, University of Manchester |
Repairing sequential consistency in C/C++11 | Ori Lahav, Max Planck Institute for Software Systems; et al. Viktor Vafeiadis, Max Planck Institute for Software Systems Jeehoon Kang, Seoul National University Chung-Kil Hur, Seoul National University Derek Dreyer, Max Planck Institute for Software Systems | |
Compiling without continuations | Luke Maurer, University of Oregon; et al. Paul Downen, University of Oregon Zena M. Ariola, University of Oregon Simon Peyton Jones, Microsoft | |
Bringing the web up to speed with WebAssembly | Andreas Haas, Google; et al. Andreas Rossberg, Google Derek L. Schuff, Google Ben L. Titzer, Google Michael Holman, Microsoft Dan Gohman, Mozilla Corporation Luke Wagner, Mozilla Corporation Alon Zakai, Mozilla Corporation JF Bastien, Apple | |
PODS Databases | Dichotomies in Ontology-Mediated Querying with the Guarded Fragment | André Hernich, University of Liverpool; et al. Carsten Lutz, University of Bremen Fabio Papacchini, University of Liverpool Frank Wolter, University of Liverpool |
S&P Security and Privacy | Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate | Karthikeyan Bhargavan, Inria; et al. Bruno Blanchet, Inria Nadim Kobeissi, Inria |
SIGCOMM Networking | Re-architecting datacenter networks and stacks for low latency and high performance | Mark Handley, University College London; et al. Costin Raiciu, Politehnica University of Bucharest Alexandru Agache, Politehnica University of Bucharest Andrei Voinescu, Politehnica University of Bucharest Andrew Moore, University of Cambridge Gianni Antichi, University of Cambridge Marcin Wójcik, University of Cambridge |
Language-directed hardware design for network performance monitoring | Srinivas Narayana, Massachusetts Institute of Technology; et al. Anirudh Sivaraman, Massachusetts Institute of Technology Vikram Nathan, Massachusetts Institute of Technology Prateesh Goyal, Massachusetts Institute of Technology Venkat Arun, Indian Institute of Technology Guwahati Mohammad Alizadeh, Massachusetts Institute of Technology Vimalkumar Jeyakumar, Cisco Systems Changhoon Kim, Barefoot Networks | |
SIGIR Information Retrieval | BitFunnel: Revisiting Signatures for Search | Bob Goodwin, Microsoft; et al. Michael Hopcroft, Microsoft Dan Luu, Microsoft Alex Clemmer, Heptio Mihaela Curmei, Microsoft Sameh Elnikety, Microsoft Yuxiong He, Microsoft |
SIGMETRICS Performance | Accelerating Performance Inference over Closed Systems by Asymptotic Methods | Giuliano Casale, Imperial College London |
SIGMOD Databases | Parallelizing Sequential Graph Computations | Wenfei Fan, University of Edinburgh; et al. Jingbo Xu, University of Edinburgh Yinghui Wu, Washington State University Wenyuan Yu, Beihang University Jiaxin Jiang, Hong Kong Baptist University Zeyu Zheng, Peking University Bohan Zhang, Peking University Yang Cao, University of Edinburgh Chao Tian, University of Edinburgh |
SODA Theory | Subquadratic Algorithms for the Diameter and the Sum of Pairwise Distances in Planar Graphs | Sergio Cabello, University of Ljubljana |
A (2 + Є) Approximation for Maximum Weight Matching in the Semi-Streaming Model | Ami Paz, Institut de Recherche en Informatique Fondamentale Gregory Schwartzman, National Institute of Informatics | |
SOSP Operating Systems | The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web | Cheng Tan, New York University; et al. Lingfan Yu, New York University Joshua B. Leners, Two Sigma Michael Walfish, New York University |
DeepXplore: Automated Whitebox Testing of Deep Learning Systems | Kexin Pei, Columbia University; et al. Yinzhi Cao, Lehigh University Junfeng Yang, Columbia University Suman Jana, Columbia University | |
STOC Theory | Explicit, Almost Optimal, Epsilon-Balanced Codes | Amnon Ta-Shma, Tel Aviv University |
Deciding Parity Games in Quasipolynomial Time | Cristian S. Calude, University of Auckland; et al. Sanjay Jain, National University of Singapore Bakhadyr Khoussainov, University of Auckland Wei Li, National University of Singapore Frank Stephan, National University of Singapore | |
A Weighted Linear Matroid Parity Algorithm | Satoru Iwata, University of Tokyo Yusuke Kobayashi, University of Tsukuba | |
UIST User Interface | Triggering Artwork Swaps for Live Animation | Nora S. Willett, Princeton University; et al. Wilmot Li, Adobe Jovan Popovic, Adobe Adam Finkelstein, Princeton University |
Grabity: A Wearable Haptic Interface for Simulating Weight and Grasping in Virtual Reality | Inrak Choi, Stanford University; et al. Heather Culbertson, Stanford University Mark R. Miller, Stanford University Alex Olwal, Google Sean Follmer, Stanford University | |
AirCode: Unobtrusive Physical Tags for Digital Fabrication | Dingzeyu Li, Columbia University; et al. Avinash S. Nair, Columbia University Shree K. Nayar, Columbia University Changxi Zheng, Columbia University | |
VLDB Databases | Provenance for Natural Language Queries | Daniel Deutch, Tel Aviv University; et al. Nave Frost, Tel Aviv University Amir Gilad, Tel Aviv University |
2016 | ||
---|---|---|
AAAI Artificial Intelligence | Bidirectional Search That Is Guaranteed to Meet in the Middle | Robert C. Holte, University of Alberta; et al. Ariel Felner, Ben-Gurion University of the Negev Guni Sharon, Ben-Gurion University of the Negev Nathan R. Sturtevant, University of Denver |
ACL Natural Language Processing | Finding Non-Arbitrary Form-Meaning Systematicity Using String-Metric Learning for Kernel Regression | E. Darío Gutiérrez, University of California, Berkeley; et al. Roger Levy, Massachusetts Institute of Technology Benjamin K. Bergen, University of California, San Diego |
CHI Human-Computer Interaction | The Effect of Visual Appearance on the Performance of Continuous Sliders and Visual Analogue Scales | Justin Matejka, Autodesk; et al. Michael Glueck, Autodesk Tovi Grossman, Autodesk George Fitzmaurice, Autodesk |
Designing Movement-based Play With Young People Using Powered Wheelchairs | Kathrin Gerling, University of Lincoln; et al. Kieran Hicks, University of Lincoln Michael Kalyn, University of Lincoln Adam Evans, University of Copenhagen Conor Linehan, University College Cork | |
Object-Oriented Drawing | Haijun Xia, University of Toronto; et al. Bruno Araujo, University of Toronto Tovi Grossman, Autodesk Daniel Wigdor, University of Toronto | |
Enabling Designers to Foresee Which Colors Users Cannot See | Katharina Reinecke, University of Washington; et al. David R. Flatla, University of Dundee Christopher Brooks, University of Michigan | |
On Looking at the Vagina through Labella | Teresa Almeida, Newcastle University; et al. Rob Comber, Newcastle University Gavin Wood, Newcastle University Dean Saraf, Newcastle University Madeline Balaam, Newcastle University | |
Project Jacquard: Interactive Digital Textiles at Scale | Ivan Poupyrev, Google; et al. Nan-Wei Gong, Google Shiho Fukuhara, Google Mustafa Emre Karagozler, Google Carsten Schwesig, Google Karen E. Robinson, Google | |
"I don't Want to Wear a Screen": Probing Perceptions of and Possibilities for Dynamic Displays on Clothing | Laura Devendorf, University of California, Berkeley; et al. Joanne Lo, University of California, Berkeley Noura Howell, University of California, Berkeley Jung Lin Lee, University of California, Berkeley Nan-Wei Gong, Google M. Emre Karagozler, Google Shiho Fukuhara, Google Ivan Poupyrev, Google Eric Paulos, University of California, Berkeley Kimiko Ryokai, University of California, Berkeley | |
Momentary Pleasure or Lasting Meaning?: Distinguishing Eudaimonic and Hedonic User Experiences | Elisa D. Mekler, University of Basel Kasper Hornbæk, University of Copenhagen | |
RapID: A Framework for Fabricating Low-Latency Interactive Objects with RFID Tags | Andrew Spielberg, Massachusetts Institute of Technology; et al. Alanson Sample, Disney Research Scott E. Hudson, Carnegie Mellon University Jennifer Mankoff, Carnegie Mellon University James McCann, Disney Research | |
HCI Research as Problem-Solving | Antti Oulasvirta, Aalto University Kasper Hornbæk, University of Copenhagen | |
Haptic Wave: A Cross-Modal Interface for Visually Impaired Audio Producers | Atau Tanaka & Adam Parkinson, Goldsmiths, University of London | |
FlexCase: Enhancing Mobile Interaction with a Flexible Sensing and Display Cover | Christian Rendl, University of Applied Sciences Upper Austria; et al. David Kim, Microsoft Patrick Parzer, University of Applied Sciences Upper Austria Sean Fanello, Microsoft Martin Zirkl, Institute of Surface Technologies and Photonics Gregor Scheipl, Joanneum Research Forschungsgesellschaft m.b.H Michael Haller, University of Applied Sciences Upper Austria Shahram Izadi, Microsoft | |
Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences | Pamela Wisniewski, University of Central Florida; et al. Heng Xu, Pennsylvania State University Mary Beth Rosson, Pennsylvania State University Daniel F. Perkins, Pennsylvania State University John M. Carroll, Pennsylvania State University | |
Understanding and Mitigating the Effects of Device and Cloud Service Design Decisions on the Environmental Footprint of Digital Infrastructure | Chris Preist, University of Bristol; et al. Daniel Schien, University of Bristol Eli Blevis, Indiana University Bloomington | |
Enhancing Cross-Device Interaction Scripting with Interactive Illustrations | Pei-Yu (Peggy) Chi, University of California, Berkeley; et al. Yang Li, Google Björn Hartmann, University of California, Berkeley | |
Learn Piano with BACh: An Adaptive Learning Interface that Adjusts Task Difficulty Based on Brain State | Beste F. Yuksel, Tufts University; et al. Kurt B. Oleson, Tufts University Lane Harrison, Worcester Polytechnic Institute Evan M. Peck, Bucknell University Daniel Afergan, Tufts University Remco Chang, Tufts University Robert JK Jacob, Tufts University | |
Smart Touch: Improving Touch Accuracy for People with Motor Impairments with Template Matching | Martez E. Mott, University of Washington; et al. Radu-Daniel Vatavu, Ștefan cel Mare University of Suceava Shaun K. Kane, University of Colorado Boulder Jacob O. Wobbrock, University of Washington | |
Building a Personalized, Auto-Calibrating Eye Tracker from User Interactions | Michael Xuelin Huang, Hong Kong Polytechnic University; et al. Tiffany C.K. Kwok, Hong Kong Polytechnic University Grace Ngai, Hong Kong Polytechnic University Stephen C.F. Chan, Hong Kong Polytechnic University Hong Va Leong, Hong Kong Polytechnic University | |
Developing and Validating the User Burden Scale: A Tool for Assessing User Burden in Computing Systems | Hyewon Suh, University of Washington; et al. Nina Shahriaree, University of Washington Eric B. Hekler, Arizona State University Julie A. Kientz, University of Washington | |
Foraging Among an Overabundance of Similar Variants | Sruti Srinivasa Ragavan, Oregon State University; et al. Sandeep Kaur Kuttal, Oregon State University Charles Hill, Oregon State University Anita Sarma, Oregon State University David Piorkowski, Oregon State University Margaret Burnett, Oregon State University | |
Finding Email in a Multi-Account, Multi-Device World | Marta E. Cecchinato, University College London; et al. Abigail Sellen, Microsoft Milad Shokouhi, Microsoft Gavin Smyth, Microsoft | |
Empath: Understanding Topic Signals in Large-Scale Text | Ethan Fast, Stanford University; et al. Binbin Chen, Stanford University Michael Bernstein, Stanford University | |
Lock n' LoL: Group-based Limiting Assistance App to Mitigate Smartphone Distractions in Group Activities | Minsam Ko, KAIST; et al. Seungwoo Choi, KAIST Koji Yatani, University of Tokyo Uichin Lee, KAIST | |
CIKM Knowledge Management | Vandalism Detection in Wikidata | Stefan Heindorf, University of Paderborn; et al. Martin Potthast, Bauhaus University Benno Stein, Bauhaus University Gregor Engels, University of Paderborn |
CVPR Computer Vision | Deep Residual Learning for Image Recognition | Kaiming He, Microsoft; et al. Xiangyu Zhang, Microsoft Shaoqing Ren, Microsoft Jian Sun, Microsoft |
FOCS Theory | Settling the Complexity of Computing Approximate Two-Player Nash Equilibria | Aviad Rubinstein, University of California, Berkeley |
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning | Ran Raz, Weizmann Institute of Science | |
FSE Software Engineering | API Code Recommendation Using Statistical Learning from Fine-grained Changes | Anh Tuan Nguyen, Iowa State University; et al. Michael Hilton, Oregon State University Mihai Codoban, Microsoft Hoan Anh Nguyen, Iowa State University Lily Mast, University of Evansville Eli Rademacher, Oregon State University Tien N. Nguyen, Iowa State University Danny Dig, Oregon State University |
Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis | Jianjun Huang, Purdue University; et al. Xiangyu Zhang, Purdue University Lin Tan, University of Waterloo | |
Factors Influencing Code Review Processes in Industry | Tobias Baum, Leibniz University Hannover; et al. Olga Liskin, Leibniz University Hannover Kai Niklas, Leibniz University Hannover Kurt Schneider, Leibniz University Hannover | |
Foraging and Navigations Fundamentally: Developers' Predictions of Value and Cost | David Piorkowski, Oregon State University; et al. Austin Z. Henley, University of Memphis Tahmid Nabi, Oregon State University Scott D. Fleming, University of Memphis Christopher Scaffidi, Oregon State University Margaret Burnett, Oregon State University | |
Multi-Representational Security Analysis | Eunsuk Kang, University of California, Berkeley; et al. Aleksandar Milicevic, Microsoft Daniel Jackson, Massachusetts Institute of Technology | |
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis | Xiaofei Xie, Tianjin University; et al. Bihuan Chen, Nanyang Technological University Yang Liu, Nanyang Technological University Wei Le, Iowa State University Xiaohong Li, Tianjin University | |
Why We Refactor? Confessions of GitHub Contributors | Danilo Silva, Federal University of Minas Gerais; et al. Nikolaos Tsantalis, Concordia University Marco Tulio Valente, Federal University of Minas Gerais | |
ICML Machine Learning | Dueling Network Architectures for Deep Reinforcement Learning | Ziyu Wang, Google; et al. Tom Schaul, Google Matteo Hessel, Google Hado van Hasselt, Google Marc Lanctot, Google Nando de Freitas, University of Oxford |
Pixel Recurrent Neural Networks | Aaron Van den Oord, Google; et al. Nal Kalchbrenner, Google Koray Kavukcuoglu, Google | |
Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs Sampling | Christopher De Sa, Stanford University; et al. Chris Re, Stanford University Kunle Olukotun, Stanford University | |
ICSE Software Engineering | Efficient Large-Scale Trace Checking Using MapReduce | Marcello M. Bersani, Politecnico di Milano; et al. Domenico Bianculli, University of Luxembourg Carlo Ghezzi, Politecnico di Milano Srđan Krstić, Politecnico di Milano Pierluigi San Pietro, Politecnico di Milano |
Energy Profiles of Java Collections Classes | Samir Hasan, Auburn University; et al. Zachary King, Auburn University Munawar Hafiz, Auburn University Mohammed Sayagh, Polytechnique Montréal Bram Adams, Polytechnique Montréal Abram Hindle, University of Alberta | |
Feedback-Directed Instrumentation for Deployed JavaScript Applications | Magnus Madsen, University of Waterloo; et al. Frank Tip, Samsung Esben Andreasen, Aarhus University Koushik Sen, University of California, Berkeley Anders Møller, Aarhus University | |
From Word Embeddings to Document Similarities for Improved Information Retrieval in Software Engineering | Xin Ye, Ohio University; et al. Hui Shen, Ohio University Xiao Ma, Ohio University Razvan Bunescu, Ohio University Chang Liu, Ohio University | |
Guiding Dynamic Symbolic Execution toward Unverified Program Executions | Maria Christakis, ETH Zurich; et al. Peter Müller, ETH Zurich Valentin Wüstholz, ETH Zurich | |
On the Techniques We Create, the Tools We Build, and Their Misalignments: A Study of KLEE | Eric F. Rizzi, GrammaTech; et al. Sebastian Elbaum, University of Nebraska–Lincoln Matthew B. Dwyer, University of Nebraska–Lincoln | |
Termination-Checking for LLVM Peephole Optimizations | David Menendez & Santosh Nagarakatte, Rutgers University | |
VDTest: An Automated Framework to Support Testing for Virtual Devices | Tingting Yu, University of Kentucky; et al. Xiao Qu, ABB Switzerland Ltd Corporate Research Myra B. Cohen, University of Nebraska–Lincoln | |
Work Practices and Challenges in Pull-Based Development: The Contributor's Perspective | Georgios Gousios, Radboud University Nijmegen; et al. Margaret-Anne Storey, University of Victoria Alberto Bacchelli, Delft University of Technology | |
IJCAI Artificial Intelligence | Hierarchical Finite State Controllers for Generalized Planning | Javier Segovia, Pompeu Fabra University; et al. Sergio Jiménez, Pompeu Fabra University Anders Jonsson, Pompeu Fabra University |
INFOCOM Networking | Heavy-Ball: A New Approach to Tame Delay and Convergence in Wireless Network Optimization | Jia Liu, Ohio State University; et al. Atilla Eryilmaz, Ohio State University Ness B. Shroff, Ohio State University Elizabeth Serena Bentley, Air Force Research Laboratory |
KDD Data Mining | FRAUDAR: Bounding Graph Fraud in the Face of Camouflage | Bryan Hooi, Carnegie Mellon University; et al. Hyun Ah Song, Carnegie Mellon University Alex Beutel, Carnegie Mellon University Neil Shah, Carnegie Mellon University Kijung Shin, Carnegie Mellon University Christos Faloutsos, Carnegie Mellon University |
NeurIPS Machine Learning | Value Iteration Networks | Aviv Tamar, University of California, Berkeley; et al. Yi Wu, University of California, Berkeley Garrett Thomas, University of California, Berkeley Sergey Levine, University of California, Berkeley Pieter Abbeel, University of California, Berkeley |
NSDI Networking | Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions | Bryce Kellogg, University of Washington; et al. Vamsi Talla, University of Washington Shyamnath Gollakota, University of Washington Joshua R. Smith, University of Washington |
OSDI Operating Systems | Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data | Tyler Hunt, University of Texas at Austin; et al. Zhiting Zhu, University of Texas at Austin Yuanzhong Xu, University of Texas at Austin Simon Peter, University of Texas at Austin Emmett Witchel, University of Texas at Austin |
Early Detection of Configuration Errors to Reduce Failure Damage | Tianyin Xu, University of California, San Diego; et al. Xinxin Jin, University of California, San Diego Peng Huang, University of California, San Diego Yuanyuan Zhou, University of California, San Diego Shan Lu, University of Chicago Long Jin, University of California, San Diego Shankar Pasupathy, NetApp | |
Push-Button Verification of File Systems via Crash Refinement | Helgi Sigurbjarnarson, University of Washington; et al. James Bornholt, University of Washington Emina Torlak, University of Washington Xi Wang, University of Washington | |
PLDI Programming Languages | Into the Depths of C: Elaborating the De Facto Standards | Kayvan Memarian, University of Cambridge; et al. Justus Matthiesen, University of Cambridge James Lingard, University of Cambridge Kyndylan Nienhuis, University of Cambridge David Chisnall, University of Cambridge Robert N. M. Watson, University of Cambridge Peter Sewell, University of Cambridge |
Transactional Data Structure Libraries | Alexander Spiegelman, Technion – Israel Institute of Technology; et al. Guy Golan-Gueta, Yahoo Idit Keidar, Technion – Israel Institute of Technology | |
Types from data: Making structured data first-class citizens in F# | Tomas Petricek, University of Cambridge; et al. Gustavo Guerra, Microsoft Don Syme, Microsoft | |
Assessing the limits of program-specific garbage collection performance | Nicholas Jacek, University of Massachusetts Amherst; et al. Meng-Chieh Chiu, University of Massachusetts Amherst Benjamin Marlin, University of Massachusetts Amherst Eliot Moss, University of Massachusetts Amherst | |
PODS Databases | FAQ: Questions Asked Frequently | Mahmoud Abo Khamis, University at Buffalo; et al. Hung Q. Ngo, University at Buffalo Atri Rudra, University at Buffalo |
S&P Security and Privacy | A2: Analog Malicious Hardware | Kaiyuan Yang, University of Michigan; et al. Matthew Hicks, University of Michigan Qing Dong, University of Michigan Todd Austin, University of Michigan Dennis Sylvester, University of Michigan |
SIGCOMM Networking | Don't Mind the Gap: Bridging Network-wide Objectives and Device-level Configurations | Ryan Beckett, Princeton University; et al. Ratul Mahajan, Microsoft Todd Millstein, University of California, Los Angeles Jitendra Padhye, Microsoft David Walker, Princeton University |
Eliminating Channel Feedback in Next-Generation Cellular Networks | Deepak Vasisht, Massachusetts Institute of Technology; et al. Swarun Kumar, Carnegie Mellon University Hariharan Rahul, Massachusetts Institute of Technology Dina Katabi, Massachusetts Institute of Technology | |
Inter-Technology Backscatter: Towards Internet Connectivity for Implanted Devices | Vikram Iyer, University of Washington; et al. Vamsi Talla, University of Washington Bryce Kellogg, University of Washington Shyamnath Gollakota, University of Washington Joshua Smith, University of Washington | |
SIGIR Information Retrieval | Understanding Information Need: An fMRI Study | Yashar Moshfeghi, University of Glasgow; et al. Peter Triantafillou, University of Glasgow Frank E. Pollick, University of Glasgow |
SIGMETRICS Performance | On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with Fitness | Bo Jiang, University of Massachusetts Amherst; et al. Daniel R. Figueiredo, Federal University of Rio de Janeiro Bruno Ribeiro, Purdue University Don Towsley, University of Massachusetts Amherst |
SIGMOD Databases | Wander Join: Online Aggregation via Random Walks | Feifei Li, University of Utah; et al. Bin Wu, Hong Kong University of Science and Technology Ke Yi, Hong Kong University of Science and Technology Zhuoyue Zhao, Shanghai Jiao Tong University |
SODA Theory | An Improved Distributed Algorithm for Maximal Independent Set | Mohsen Ghaffari, Massachusetts Institute of Technology |
Near-Optimal Light Spanners | Shiri Chechik, Tel Aviv University Christian Wulff-Nilsen, University of Copenhagen | |
STOC Theory | Reed-Muller Codes Achieve Capacity on Erasure Channels | Shrinivas Kudekar, Qualcomm; et al. Santhosh Kumar, Texas A&M University Marco Mondelli, École Polytechnique Fédérale de Lausanne Henry D. Pfister, Duke University Eren Sasoglu, Intel Rudiger Urbanke, École Polytechnique Fédérale de Lausanne |
Explicit Two-Source Extractors and Resilient Functions | Eshan Chattopadhyay & David Zuckerman, University of Texas at Austin | |
Graph Isomorphism in Quasipolynomial Time | László Babaí, University of Chicago | |
UIST User Interface | Rovables: Miniature On-Body Robots as Mobile Wearables | Artem Dementyev, Massachusetts Institute of Technology; et al. Hsin-Liu (Cindy) Kao, Massachusetts Institute of Technology Inrak Choi, Stanford University Deborah Ajilo, Massachusetts Institute of Technology Maggie Xu, Stanford University Joseph Paradiso, Massachusetts Institute of Technology Chris Schmandt, Massachusetts Institute of Technology Sean Follmer, Stanford University |
Zooids: Building Blocks for Swarm User Interfaces | Mathieu Le Goc, Inria; et al. Lawrence H. Kim, Stanford University Ali Parsaei, Stanford University Jean-Daniel Fekete, Inria Pierre Dragicevic, Inria Sean Follmer, Stanford University | |
proCover: Sensory Augmentation of Prosthetic Limbs Using Smart Textile Covers | Joanne Leong, University of Applied Sciences Upper Austria; et al. Patrick Parzer, University of Applied Sciences Upper Austria Florian Perteneder, University of Applied Sciences Upper Austria Teo Babic, University of Applied Sciences Upper Austria Christian Rendl, University of Applied Sciences Upper Austria Anita Vogl, University of Applied Sciences Upper Austria Hubert Egger, University of Applied Sciences Upper Austria Alex Olwal, Google Michael Haller, University of Applied Sciences Upper Austria | |
ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch Accelerometers | Gierad Laput, Carnegie Mellon University; et al. Robert Xiao, Carnegie Mellon University Chris Harrison, Carnegie Mellon University | |
VLDB Databases | Compressed Linear Algebra for Large-Scale Machine Learning | Ahmed Elgohary, University of Maryland; et al. Matthias Boehm, IBM Peter Haas, IBM Fred Reiss, IBM Berthold Reinwald, IBM |
WWW World Wide Web | Social Networks Under Stress | Daniel Romero, University of Michigan; et al. Brian Uzzi, Northwestern University Jon Kleinberg, Cornell University |
2015 | ||
---|---|---|
AAAI Artificial Intelligence | From Non-Negative to General Operator Cost Partitioning | Florian Pommerening, University of Basel; et al. Malte Helmert, University of Basel Gabriele Röger, University of Basel Jendrik Seipp, University of Basel |
ACL Natural Language Processing | Learning Dynamic Feature Selection for Fast Sequential Prediction | Emma Strubell, University of Massachusetts Amherst; et al. Luke Vilnis, University of Massachusetts Amherst Kate Silverstein, University of Massachusetts Amherst Andrew McCallum, University of Massachusetts Amherst |
Improving Evaluation of Machine Translation Quality Estimation | Yvette Graham, Trinity College Dublin | |
CHI Human-Computer Interaction | Affordance++: Allowing Objects to Communicate Dynamic Use | Pedro Lopes, Hasso Plattner Institute; et al. Patrik Jonell, Hasso Plattner Institute Patrick Baudisch, Hasso Plattner Institute |
VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboard Input | Keith Vertanen, Montana Technological University; et al. Haythem Memmi, Montana Technological University Justin Emge, Montana Technological University Shyam Reyal, University of St Andrews Per Ola Kristensson, University of Cambridge | |
What Makes Interruptions Disruptive?: A Process-Model Account of the Effects of the Problem State Bottleneck on Task Interruption and Resumption | Jelmer P. Borst, University of Groningen; et al. Niels A. Taatgen, University of Groningen Hedderik van Rijn, University of Groningen | |
Lightweight Relief Shearing for Enhanced Terrain Perception on Interactive Maps | Wesley Willett, Inria; et al. Bernhard Jenny, Oregon State University Tobias Isenberg, Inria Pierre Dragicevic, Inria | |
The Social Impact of a Robot Co-Worker in Industrial Settings | Allison Sauppé & Bilge Mutlu, University of Wisconsin–Madison | |
Sangeet Swara: A Community-Moderated Voice Forum in Rural India | Aditya Vashistha, University of Washington; et al. Edward Cutrell, Microsoft Gaetano Borriello, University of Washington William Thies, Microsoft | |
Understanding and Supporting Fathers and Fatherhood on Social Media Sites | Tawfiq Ammari & Sarita Schoenebeck, University of Michigan | |
Patina Engraver: Visualizing Activity Logs as Patina in Fashionable Trackers | Moon-Hwan Lee, KAIST; et al. Seijin Cha, KAIST Tek-Jin Nam, KAIST | |
Fluid Grouping: Quantifying Group Engagement around Interactive Tabletop Exhibits in the Wild | Florian Block, Harvard University; et al. James Hammerman, Terc Michael Horn, Northwestern University Amy Spiegel, University of Nebraska–Lincoln Jonathan Christiansen, Terc Brenda Phillips, Harvard University Judy Diamond, Bulletin of the University of Nebraska State Museum E. Margaret Evans, University of Michigan Chia Shen, Harvard University | |
Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure | Pamela Wisniewski, Pennsylvania State University; et al. Haiyan Jia, Pennsylvania State University Na Wang, Pennsylvania State University Saijing Zheng, Pennsylvania State University Heng Xu, Pennsylvania State University Mary Beth Rosson, Pennsylvania State University John Carroll, Pennsylvania State University | |
BaseLase: An Interactive Focus+Context Laser Floor | Jörg Müller, Aarhus University; et al. Dieter Eberle, Technical University of Berlin Constantin Schmidt, Technical University of Berlin | |
Tiree Energy Pulse: Exploring Renewable Energy Forecasts on the Edge of the Grid | Will Simm, University of Lancaster; et al. Maria Angela Ferrario, University of Lancaster Adrian Friday, University of Lancaster Peter Newman, University of Lancaster Stephen Forshaw, University of Lancaster Mike Hazas, University of Lancaster Alan Dix, University of Lancaster | |
iSkin: Flexible, Stretchable and Visually Customizable On-Body Touch Sensors for Mobile Computing | Martin Weigel, Max Planck Institute for Informatics; et al. Tong Lu, Carnegie Mellon University Gilles Bailly, Télécom Paris Antti Oulasvirta, Aalto University Carmel Majidi, Carnegie Mellon University Jürgen Steimle, Max Planck Institute for Informatics | |
Designing Political Deliberation Environments to Support Interactions in the Public Sphere | Bryan Semaan, Syracuse University; et al. Heather Faucett, University of California, Irvine Scott P. Robertson, University of Hawaii at Manoa Misa Maruyama, University of Hawaii at Manoa Sara Douglas, University of Hawaii at Manoa | |
From User-Centered to Adoption-Centered Design: A Case Study of an HCI Research Innovation Becoming a Product | Parmit K. Chilana, University of Waterloo; et al. Andrew J. Ko, University of Washington Jacob Wobbrock, University of Washington | |
Acoustruments: Passive, Acoustically-Driven, Interactive Controls for Handheld Devices | Gierad Laput, Carnegie Mellon University; et al. Eric Brockmeyer, Disney Research Scott E. Hudson, Carnegie Mellon University Chris Harrison, Carnegie Mellon University | |
The Heart Work of Wikipedia: Gendered, Emotional Labor in the World's Largest Online Encyclopedia | Amanda Menking, University of Washington Ingrid Erickson, Rutgers University | |
Unequal Representation and Gender Stereotypes in Image Search Results for Occupations | Matthew Kay, University of Washington; et al. Cynthia Matuszek, University of Maryland, Baltimore County Sean A. Munson, University of Washington | |
Sharing is Caring: Assistive Technology Designs on Thingiverse | Erin Buehler, University of Maryland, Baltimore County; et al. Stacy Branham, University of Maryland, Baltimore County Abdullah Ali, University of Maryland, Baltimore County Jeremy J. Chang, University of Maryland, Baltimore County Megan Kelly Hofmann, Colorado State University Amy Hurst, University of Maryland, Baltimore County Shaun K. Kane, University of Maryland, Baltimore County | |
"I always assumed that I wasn't really that close to [her]": Reasoning about Invisible Algorithms in News Feeds | Motahhare Eslami, University of Illinois at Urbana–Champaign; et al. Aimee Rickman, California State University Kristen Vaccaro, University of Illinois at Urbana–Champaign Amirhossein Aleyasen, University of Illinois at Urbana–Champaign Andy Vuong, University of Illinois at Urbana–Champaign Karrie Karahalios, University of Illinois at Urbana–Champaign Kevin Hamilton, University of Illinois at Urbana–Champaign Christian Sandvig, University of Michigan | |
ColourID: Improving Colour Identification for People with Impaired Colour Vision | David R. Flatla, University of Dundee; et al. Alan R. Andrade, University of Dundee Ross D. Teviotdale, University of Dundee Dylan L. Knowles, University of Saskatchewan Craig Stewart, University of Dundee | |
CIKM Knowledge Management | Assessing the Impact of Syntactic and Semantic Structures for Answer Passages Reranking | Kateryna Tymoshenko, University of Trento Alessandro Moschitti, Qatar Computing Research Institute |
CVPR Computer Vision | DynamicFusion: Reconstruction and Tracking of Non-rigid Scenes in Real-Time | Richard A. Newcombe, University of Washington; et al. Dieter Fox, University of Washington Steven M. Seitz, University of Washington |
FOCS Theory | An average-case depth hierarchy theorem for Boolean circuits | Benjamin Rossman, National Institute of Informatics; et al. Rocco A. Servedio, Columbia University Li-Yang Tan, University of California, Berkeley |
FSE Software Engineering | How Practitioners Perceive the Relevance of Software Engineering Research | David Lo, Singapore Management University; et al. Nachiappan Nagappan, Microsoft Thomas Zimmermann, Microsoft |
Effective Test Suites for Mixed Discrete-Continuous Stateflow Controllers | Reza Matinnejad, University of Luxembourg; et al. Shiva Nejati, University of Luxembourg Lionel C. Briand, University of Luxembourg Thomas Bruckmann, Delphi Automotive Systems | |
MultiSE: Multi-path Symbolic Execution using Value Summaries | Koushik Sen, University of California, Berkeley; et al. George Necula, University of California, Berkeley Liang Gong, University of California, Berkeley Wontae Choi, University of California, Berkeley | |
Modeling Readability to Improve Unit Tests | Ermira Daka, University of Sheffield; et al. José Campos, University of Sheffield Gordon Fraser, University of Sheffield Jonathan Dorn, University of Virginia Westley Weimer, University of Virginia | |
Optimizing energy consumption of GUIs in Android apps: a multi-objective approach | Mario Linares-Vásquez, College of William & Mary; et al. Gabriele Bavota, Free University of Bozen-Bolzano Carlos Eduardo Bernal Cárdenas, College of William & Mary Rocco Oliveto, University of Molise Massimiliano Di Penta, University of Sannio Denys Poshyvanyk, College of William & Mary | |
Measure It? Manage It? Ignore It? Software Practitioners and Technical Debt | Neil A. Ernst, Carnegie Mellon University; et al. Stephany Bellomo, Carnegie Mellon University Ipek Ozkaya, Carnegie Mellon University Robert L. Nord, Carnegie Mellon University Ian Gorton, Carnegie Mellon University | |
A User-Guided Approach to Program Analysis | Ravi Mangal, Georgia Institute of Technology; et al. Xin Zhang, Georgia Institute of Technology Aditya V. Nori, Microsoft Mayur Naik, Georgia Institute of Technology | |
Users Beware: Preference Inconsistencies Ahead | Farnaz Behrang, Georgia Institute of Technology; et al. Myra B. Cohen, University of Nebraska–Lincoln Alessandro Orso, Georgia Institute of Technology | |
ICCV Computer Vision | Deep Neural Decision Forests | Peter Kontschieder, Microsoft; et al. Madalina Fiterau, Carnegie Mellon University Antonio Criminisi, Microsoft Samuel Rota Bulò, Microsoft |
ICML Machine Learning | Optimal and Adaptive Algorithms for Online Boosting | Alina Beygelzimer, Yahoo; et al. Satyen Kale, Yahoo Haipeng Luo, Princeton University |
A Nearly-Linear Time Framework for Graph-Structured Sparsity | Chinmay Hegde, Massachusetts Institute of Technology; et al. Piotr Indyk, Massachusetts Institute of Technology Ludwig Schmid, Massachusetts Institute of Technology | |
ICSE Software Engineering | Views on Internal and External Validity in Empirical Software Engineering | Janet Siegmund, University of Passau; et al. Norbert Siegmund, University of Passau Sven Apel, University of Passau |
How Much Up-Front? A Grounded theory of Agile Architecture | Michael Waterman, Specialised Architecture Services Ltd; et al. James Noble, Victoria University of Wellington George Allan, Victoria University of Wellington | |
When and Why Your Code Starts to Smell Bad | Michele Tufano, College of William & Mary; et al. Fabio Palomba, University of Salerno Gabriele Bavota, Free University of Bozen-Bolzano Rocco Oliveto, University of Molise Massimiliano Di Penta, University of Sannio Andrea De Lucia, University of Salerno Denys Poshyvanyk, College of William & Mary | |
Alloy*: A General-Purpose Higher-Order Relational Constraint Solver | Aleksandar Milicevic, Massachusetts Institute of Technology; et al. Joseph P. Near, Massachusetts Institute of Technology Eunsuk Kang, Massachusetts Institute of Technology Daniel Jackson, Massachusetts Institute of Technology | |
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Factors on Software Quality | Mathieu Lavallée & Pierre N. Robillard, Polytechnique Montréal | |
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes | Adrian Nistor, Chapman University; et al. Po-Chun Chang, University of Wisconsin–Madison Cosmin Radoi, University of Illinois at Urbana–Champaign Shan Lu, University of Chicago | |
IJCAI Artificial Intelligence | Recursive Decomposition for Nonconvex Optimization | Abram L. Friesen & Pedro Domingos, University of Washington |
Bayesian Active Learning for Posterior Estimation | Kirthevasan Kandasamy, Carnegie Mellon University; et al. Jeff Schneider, Carnegie Mellon University Barnabas Poczos, Carnegie Mellon University | |
INFOCOM Networking | The Power of Slightly More than One Sample in Randomized Load Balancing | Lei Ying, Arizona State University; et al. R. Srikant, University of Illinois at Urbana–Champaign Xiaohan Kang, Arizona State University |
KDD Data Mining | Efficient Algorithms for Public-Private Social Networks | Flavio Chierichetti, Sapienza University of Rome; et al. Alessandro Epasto, Brown University Ravi Kumar, Google Silvio Lattanzi, Google Vahab Mirrokni, Google |
MOBICOM Mobile | CAreDroid: Adaptation Framework for Android ContextAware Applications | Salma Elmalaki, University of California, Los Angeles; et al. Lucas Wanner, University of California, Los Angeles Mani Srivastava, University of California, Los Angeles |
NeurIPS Machine Learning | Competitive Distribution Estimation: Why is Good-Turing Good | Alon Orlitsky & Ananda Suresh, University of California, San Diego |
Fast Convergence of Regularized Learning in Games | Vasilis Syrgkanis, Microsoft; et al. Alekh Agarwal, Microsoft Haipeng Luo, Princeton University Robert Schapire, Microsoft | |
NSDI Networking | The Design and Implementation of Open vSwitch | Ben Pfaff, VMware Inc.; et al. Justin Pettit, VMware Inc. Teemu Koponen, VMware Inc. Ethan J. Jackson, VMware Inc. Andy Zhou, VMware Inc. Jarno Rajahalme, VMware Inc. Jesse Gross, VMware Inc. Alex Wang, VMware Inc. Jonathan Stringer, VMware Inc. Pravin Shelar, VMware Inc. Keith Amidon, Awake Networks Martín Casado, VMware Inc. |
Queues Don't Matter When You Can JUMP Them! | Matthew P. Grosvenor, University of Cambridge; et al. Malte Schwarzkopf, University of Cambridge Ionel Gog, University of Cambridge Robert N. M. Watson, University of Cambridge Andrew W. Moore, University of Cambridge Steven Hand, University of Cambridge Jon Crowcroft, University of Cambridge | |
Designing Distributed Systems Using Approximate Synchrony in Data Center Networks | Dan R. K. Ports, University of Washington; et al. Jialin Li, University of Washington Vincent Liu, University of Washington Naveen Kr. Sharma, University of Washington Arvind Krishnamurthy, University of Washington | |
PLDI Programming Languages | Automatically Improving Accuracy for Floating Point Expressions | Pavel Panchekha, University of Washington; et al. Alex Sanchez-Stern, University of Washington James R. Wilcox, University of Washington Zachary Tatlock, University of Washington |
Diagnosing Type Errors with Class | Danfeng Zhang, Cornell University; et al. Andrew C. Myers, Cornell University Dimitrios Vytiniotis, Microsoft Simon Peyton-Jones, Microsoft | |
Provably Correct Peephole Optimizations with Alive | Nuno P. Lopes, Microsoft; et al. David Menendez, Rutgers University Santosh Nagarakatte, Rutgers University John Regehr, University of Utah | |
PODS Databases | Parallel-Correctness and Transferability for Conjunctive Queries | Tom J. Ameloot, Hasselt University; et al. Gaetano Geck, TU Dortmund Bas Ketsman, Hasselt University Frank Neven, Hasselt University Thomas Schwentick, TU Dortmund |
S&P Security and Privacy | A Messy State of the Union: Taming the Composite State Machines of TLS | Benjamin Beurdouche, Inria; et al. Karthikeyan Bhargavan, Inria Antoine Delignat-Lavaud, Inria Cédric Fournet, Microsoft Markulf Kohlweiss, Microsoft Alfredo Pironti, Inria Pierre-Yves Strub, IMDEA Nanoscience Institute Jean Karim Zinzindohoue, Inria |
Riposte: An Anonymous Messaging System Handling Millions of Users | Henry Corrigan-Gibbs, Stanford University; et al. Dan Boneh, Stanford University David Mazières, Stanford University | |
SIGCOMM Networking | Central Control Over Distributed Routing | Stefano Vissicchio, Université catholique de Louvain; et al. Olivier Tilmans, Université catholique de Louvain Laurent Vanbever, ETH Zurich Jennifer Rexford, Princeton University |
SIGIR Information Retrieval | QuickScorer: A Fast Algorithm to Rank Documents with Additive Ensembles of Regression Trees | Claudio Lucchese, Istituto di Scienza e Tecnologie dell'Informazione; et al. Franco Maria Nardini, Istituto di Scienza e Tecnologie dell'Informazione Salvatore Orlando, IUAV University of Venice Raffaele Perego, Istituto di Scienza e Tecnologie dell'Informazione Nicola Tonellotto, Istituto di Scienza e Tecnologie dell'Informazione Rossano Venturini, Istituto di Scienza e Tecnologie dell'Informazione |
SIGMETRICS Performance | Spy vs. Spy: Rumor Source Obfuscation | Giulia Fanti, University of California, Berkeley; et al. Peter Kairouz, University of Illinois at Urbana–Champaign Sewoong Oh, University of Illinois at Urbana–Champaign Pramod Viswanath, University of Illinois at Urbana–Champaign |
SIGMOD Databases | DBSCAN Revisited: Mis-Claim, Un-Fixability, and Approximation | Junhao Gan & Yufei Tao, The Chinese University of Hong Kong |
SODA Theory | The Parameterized Complexity of k-Biclique | Bingkai Lin, University of Tokyo |
SOSP Operating Systems | Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems | Jonathan Mace, Brown University; et al. Ryan Roelke, Brown University Rodrigo Fonseca, Brown University |
Using Crash Hoare Logic for Certifying the FSCQ File System | Haogang Chen, Massachusetts Institute of Technology; et al. Daniel Ziegler, Massachusetts Institute of Technology Tej Chajed, Massachusetts Institute of Technology Adam Chlipala, Massachusetts Institute of Technology M. Frans Kaashoek, Massachusetts Institute of Technology Nickolai Zeldovich, Massachusetts Institute of Technology | |
Coz: Finding Code that Counts with Causal Profiling | Charlie Curtsinger, Grinnell College Emery Berger, University of Massachusetts Amherst | |
STOC Theory | Exponential Separation of Information and Communication for Boolean Functions | Anat Ganor, Weizmann Institute of Science; et al. Gillat Kol, Princeton University Ran Raz, Weizmann Institute of Science |
Lower Bounds on the Size of Semidefinite Programming Relaxations | James R. Lee, University of Washington; et al. Prasad Raghavendra, University of California, Berkeley David Steurer, Cornell University | |
2-Server PIR with sub-polynomial communication | Zeev Dvir & Sivakanth Gopi, Princeton University | |
UIST User Interface | Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electronics | Simon Olberding, Max Planck Institute for Informatics; et al. Sergio Soto Ortega, Max Planck Institute for Informatics Klaus Hildebrandt, Max Planck Institute for Informatics Jurgen Steimle, Max Planck Institute for Informatics |
Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye Movements | Augusto Esteves, University of Lancaster; et al. Eduardo Velloso, University of Lancaster Andreas Bulling, Max Planck Institute for Informatics Hans Gellersen, University of Lancaster | |
Webstrates: Shareable Dynamic Media | Clemens Klokmose, Aarhus University; et al. James Eagan, Télécom Paris Siemen Baader, Aarhus University Wendy Mackay, Inria Michel Beaudouin-Lafon, University of Paris-Sud | |
VLDB Databases | Constructing an interactive natural language interface for relational databases | Fei Li & H. V. Jagadish, University of Michigan |
WWW World Wide Web | HypTrails: A Bayesian Approach for Comparing Hypotheses About Human Trails on the Web | Philipp Singer, GESIS - Leibniz-Institute for the Social Sciences, Mannheim; et al. Denis Helic, Graz University of Technology Andreas Hotho, University of Würzburg Markus Strohmaier, GESIS - Leibniz-Institute for the Social Sciences, Mannheim |
2014 | ||
---|---|---|
AAAI Artificial Intelligence | Recovering from Selection Bias in Causal and Statistical Inference | Elias Bareinboim, University of California, Los Angeles; et al. Jin Tian, Iowa State University Judea Pearl, University of California, Los Angeles |
ACL Natural Language Processing | Fast and Robust Neural Network Joint Models for Statistical Machine Translation | Jacob Devlin, BBN Technologies; et al. Rabih Zbib, BBN Technologies Zhongqiang Huang, BBN Technologies Thomas Lamar, BBN Technologies Richard Schwartz, BBN Technologies John Makhoul, BBN Technologies |
CHI Human-Computer Interaction | Consumed Endurance: A Metric to Quantify Arm Fatigue of Mid-Air Interactions | Anders Markussen, University of Copenhagen; et al. Mikkel Jakobsen, University of Copenhagen Kasper Hornbaek, University of Copenhagen |
Duet: Exploring Joint Interactions on a Smart Phone and a Smart Watch | Xiang Anthony Chen, Carnegie Mellon University; et al. Tovi Grossman, Autodesk Daniel Wigdor, University of Toronto George Fitzmaurice, Autodesk | |
Type-Hover-Swipe in 96 Bytes: A Motion Sensing Mechanical Keyboard | Stuart A Taylor, Microsoft; et al. Cem Keskin, Microsoft Otmar Hilliges, ETH Zurich Shahram Izadi, Microsoft John Helmes, Microsoft | |
Effects of Display Size and Navigation Type on a Classification Task | Can Liu, University of Paris-Sud; et al. Olivier Chapuis, University of Paris-Sud Michel Beaudouin-Lafon, University of Paris-Sud Eric Lecolinet, Télécom Paris Wendy Mackay, Inria George Fitzmaurice, Autodesk | |
MixFab: a Mixed-Reality Environment for Personal Fabrication | Christian Weichel, University of Lancaster; et al. Manfred Lau, University of Lancaster David Kim, Microsoft Nicolas Villar, Microsoft Hans W Gellersen, University of Lancaster | |
Growing Closer on Meta: Changes in Tie Strength Through Social Network Site Use | Moira Burke, Meta Robert Kraut, Carnegie Mellon University | |
Emerging Sites of HCI Innovation: Hackerspaces, Hardware Startups & Incubators | Silvia Lindtner, University of California, Irvine; et al. Garnet Hertz, University of California, Irvine Paul Dourish, University of California, Irvine | |
Designing for Slowness, Anticipation and Re-visitation: A Long Term Field Study of the Photobox | William Odom, Carnegie Mellon University; et al. Abigail Sellen, Microsoft Richard Banks, Microsoft David Kirk, Newcastle University Tim Regan, Microsoft Mark Selby, University of Nottingham Jodi Forlizzi, Carnegie Mellon University John Zimmerman, Carnegie Mellon University | |
Estimating the Social Costs of Friendsourcing | Jeffrey Rzeszotarski & Meredith Morris, Microsoft | |
Human Values in Curating a Human Rights Media Archive | Abigail Durrant, Newcastle University; et al. David Kirk, Newcastle University Stuart Reeves, University of Nottingham | |
"Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug War | Munmun De Choudhury, Microsoft; et al. Andres Monroy-Hernandez, Microsoft Gloria Mark, University of California, Irvine | |
Real-time Feedback for Improving Medication Taking | Matthew Lee, Philips Anind Dey, Carnegie Mellon University | |
Structured Labeling for Facilitating Concept Evolution in Machine Learning | Todd Kulesza, Oregon State University; et al. Saleema Amershi, Microsoft Rich Caruana, Microsoft Danyel Fisher, Microsoft Denis Charles, Microsoft | |
Towards Accurate and Practical Predictive Models of Active-Vision-Based Visual Search | David Kieras, University of Michigan Anthony Hornof, University of Oregon | |
RetroDepth: 3D Silhouette Sensing for High-Precision Input On and Above Physical Surfaces | David Kim, Microsoft; et al. Shahram Izadi, Microsoft Jakub Dostal, University of St Andrews Christoph Rhemann, Microsoft Cem Keskin, Microsoft Christopher Zach, Microsoft Jamie Shotton, Microsoft Timothy Large, Microsoft Steven Bathiche, Microsoft Matthias Niessner, Stanford University D. Alex Butler, Microsoft Sean Fanello, Istituto Italiano di Tecnologia Vivek Pradeep, Microsoft | |
Understanding Multitasking Through Parallelized Strategy Exploration and Individualized Cognitive Modeling | Yunfeng Zhang & Anthony Hornof, University of Oregon | |
Making Sustainability Sustainable: Challenges in the Design of Eco-Interaction Technologies | Rayoung Yang, University of Michigan; et al. Mark Newman, University of Michigan Jodi Forlizzi, Carnegie Mellon University | |
CIKM Knowledge Management | Cross-Device Search | George Montanez, Carnegie Mellon University; et al. Ryen White, Microsoft Xiao Huang, Microsoft |
CVPR Computer Vision | What Camera Motion Reveals About Shape with Unknown BRDF | Manmohan Chandraker, NEC Labs America |
FOCS Theory | Path Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations and Faster Algorithms for Maximum Flow | Yin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology |
FSE Software Engineering | Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case Study | Klaus-Benedikt Schultis, Siemens; et al. Christoph Elsner, Siemens Daniel Lohmann, University of Erlangen-Nuremberg |
Selection and Presentation Practices for Code Example Summarization | Annie Ying & Martin Robillard, McGill University | |
Learning Natural Coding Conventions | Miltiadis Allamanis, University of Edinburgh; et al. Earl T. Barr, University College London Christian Bird, Microsoft Charles Sutton, University of Edinburgh | |
AI: A Lightweight System for Tolerating Concurrency Bugs | Mingxing Zhang, Tsinghua University; et al. Yongwei Wu, Tsinghua University Shan Lu, University of Wisconsin–Madison Shanxiang Qi, University of Illinois at Urbana–Champaign Jinglei Ren, Tsinghua University Weimin Zheng, Tsinghua University | |
Powering the Static Driver Verifier using Corral | Akash Lal & Shaz Qadeer, Microsoft | |
Are Mutants a Valid Substitute for Real Faults in Software Testing? | René Just, University of Washington; et al. Darioush Jalali, University of Washington Laura Inozemtseva, University of Waterloo Michael Ernst, University of Washington Reid Holmes, University of Waterloo Gordon Fraser, University of Sheffield | |
ICML Machine Learning | Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis | Jian Tang, Peking University; et al. Zhaoshi Meng, University of Michigan XuanLong Nguyen, University of Michigan Qiaozhu Mei, University of Michigan Ming Zhang, Peking University |
ICSE Software Engineering | A Study and Toolkit for Asynchronous Programming in C# | Semih Okur, University of Illinois at Urbana–Champaign; et al. David L. Hartveld, Delft University of Technology Danny Dig, Oregon State University Arie van Deursen, Delft University of Technology |
Characterizing and Detecting Performance Bugs for Smartphone Applications | Yepang Liu, Hong Kong University of Science and Technology; et al. Chang Xu, Nanjing University Shing-Chi Cheung, Hong Kong University of Science and Technology | |
Coverage Is Not Strongly Correlated with Test Suite Effectiveness | Laura Inozemtseva & Reid Holmes, University of Waterloo | |
Cowboys, Ankle Sprains, and Keepers of Quality: How Is Video Game Development Different from Software Development? | Emerson Murphy-Hill, North Carolina State University; et al. Thomas Zimmermann, Microsoft Nachiappan Nagappan, Microsoft | |
Enhancing Symbolic Execution with Veritesting | Thanassis Avgerinos, Carnegie Mellon University; et al. Alexandre Rebert, Carnegie Mellon University Sang Kil Cha, Carnegie Mellon University David Brumley, Carnegie Mellon University | |
Improving Automated Source Code Summarization via an Eye-Tracking Study of Programmers | Paige Rodeghero, University of Notre Dame; et al. Collin McMillan, University of Notre Dame Paul W. McBurney, University of Notre Dame Nigel Bosch, University of Notre Dame Sidney D'Mello, University of Notre Dame | |
Trading Robustness for Maintainability: An Empirical Study of Evolving C# Programs | Nélio Cacho, Universidade Federal do Rio Grande do Norte; et al. Thiago César, Universidade Federal do Rio Grande do Norte Thomas Filipe, Universidade Federal do Rio Grande do Norte Eliezio Soares, Universidade Federal do Rio Grande do Norte Arthur Cassio, Universidade Federal do Rio Grande do Norte Rafael Souza, Universidade Federal do Rio Grande do Norte Israel Garcia, Universidade Federal do Rio Grande do Norte Eiji Adachi Barbosa, Pontifical Catholic University of Rio de Janeiro Alessandro Garcia, Pontifical Catholic University of Rio de Janeiro | |
Understanding JavaScript Event-Based Interactions | Saba Alimadadi, University of British Columbia; et al. Sheldon Sequeira, University of British Columbia Ali Mesbah, University of British Columbia Karthik Pattabiraman, University of British Columbia | |
Unit Test Virtualization with VMVM | Jonathan Bell & Gail Kaiser, Columbia University | |
INFOCOM Networking | Joint Static and Dynamic Traffic Scheduling in Data Center Networks | Zizhong Cao, New York University Tandon School of Engineering; et al. M. Kodialam, Bell Labs T. V. Lakshman, Bell Labs |
Performance Evaluation and Asymptotics for Content Delivery Networks | Virag Shah & Gustavo de Veciana, University of Texas at Austin | |
KDD Data Mining | Reducing the Sampling Complexity of Topic Models | Aaron Li, Carnegie Mellon University; et al. Amr Ahmed, Google Sujith Ravi, Google Alexander Smola, Carnegie Mellon University |
MOBICOM Mobile | Tagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS Devices | Lei Yang, Tsinghua University; et al. Yekui Chen, Tsinghua University Xiang-Yang Li, Illinois Institute of Technology Chaowei Xiao, Tsinghua University Mo Li, Nanyang Technological University Yunhao Liu, Tsinghua University |
NeurIPS Machine Learning | Asymmetric LSH (ALSH) for Sublinear Time Maximum Inner Product Search (MIPS) | Anshumali Shrivastava, Cornell University Ping Li, Rutgers University |
A* Sampling | Christopher Maddison, University of Toronto; et al. Daniel Tarlow, Microsoft Tom Minka, Microsoft | |
NSDI Networking | Software Dataplane Verification | Mihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne |
OSDI Operating Systems | Arrakis: The Operating System is the Control Plane | Simon Peter, University of Washington; et al. Jialin Li, University of Washington Irene Zhang, University of Washington Dan Ports, University of Washington Doug Woos, University of Washington Arvind Krishnamurthy, University of Washington Thomas Anderson, University of Washington Timothy Roscoe, ETH Zurich |
Shielding Applications from an Untrusted Cloud with Haven | Andrew Baumann, Microsoft; et al. Marcus Peinado, Microsoft Galen Hunt, Microsoft | |
IX: A Protected Dataplane Operating System for High Throughput and Low Latency | Adam Belay, Stanford University; et al. George Prekas, École Polytechnique Fédérale de Lausanne Ana Klimovic, Stanford University Samuel Grossman, Stanford University Christos Kozyrakis, Stanford University Edouard Bugnion, École Polytechnique Fédérale de Lausanne | |
PLDI Programming Languages | Compiler validation via equivalence modulo inputs | Vu Le, University of California, Davis; et al. Mehrdad Afshari, University of California, Davis Zhendong Su, University of California, Davis |
Improving JavaScript Performance by Deconstructing the Type System | Wonsun Ahn, University of Illinois at Urbana–Champaign; et al. Jiho Choi, University of Illinois at Urbana–Champaign Thomas Shull, University of Illinois at Urbana–Champaign María Garzarín, University of Illinois at Urbana–Champaign Josep Torrellas, University of Illinois at Urbana–Champaign | |
On Abstraction Refinement for Program Analyses in Datalog | Xin Zhang, Georgia Institute of Technology; et al. Ravi Mangal, Georgia Institute of Technology Radu Grigore, University of Oxford Mayur Naik, Georgia Institute of Technology Hongseok Yang, University of Oxford | |
PODS Databases | Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Conjecture | Tom J. Ameloot, Hasselt University; et al. Bas Ketsman, Hasselt University Frank Neven, Hasselt University Daniel Zinn, LogicBlox |
S&P Security and Privacy | Secure Multiparty Computations on BitCoin | Marcin Andrychowicz, University of Warsaw; et al. Stefan Dziembowski, University of Warsaw Daniel Malinowski, University of Warsaw Łukasz Mazurek, University of Warsaw |
SIGCOMM Networking | Balancing Accountability and Privacy in the Network | David Naylor, Carnegie Mellon University; et al. Matthew K. Mukerjee, Carnegie Mellon University Peter Steenkiste, Carnegie Mellon University |
CONGA: Distributed Congestion-Aware Load Balancing for Datacenters | Mohammad Alizadeh, Cisco Systems; et al. Tom Edsall, Cisco Systems Sarang Dharmapurikar, Cisco Systems Ramanan Vaidyanathan, Cisco Systems Kevin Chu, Cisco Systems Andy Fingerhut, Google Terry Lam, Cisco Systems Francis Matus, Cisco Systems Rong Pan, Cisco Systems Navindra Yadav, Cisco Systems George Varghese, Microsoft | |
SIGIR Information Retrieval | Partitioned Elias-Fano Indexes | Giuseppe Ottaviano, Istituto di Scienza e Tecnologie dell'Informazione Rossano Venturini, University of Pisa |
SIGMETRICS Performance | Concave switching in single and multihop networks | Neil Walton, University of Amsterdam |
SIGMOD Databases | Materialization Optimizations for Feature Selection Workloads | Ce Zhang, Stanford University; et al. Arun Kumar, University of Wisconsin–Madison Christopher Ré, Stanford University |
SODA Theory | Polynomiality for Bin Packing with a Constant Number of Item Types | Michel X. Goemans & Thomas Rothvoß, Massachusetts Institute of Technology |
An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommodity Generalizations | Jonathan A. Kelner, Massachusetts Institute of Technology; et al. Yin Tat Lee, Massachusetts Institute of Technology Lorenzo Orecchia, Massachusetts Institute of Technology Aaron Sidford, Massachusetts Institute of Technology | |
STOC Theory | The matching polytope has exponential extension complexity | Thomas Rothvoß, University of Washington |
UIST User Interface | Sensing Techniques for Tablet+Stylus Interaction | Ken Hinckley, Microsoft; et al. Michel Pahud, Microsoft Hrvoje Benko, Microsoft Pourang Irani, Microsoft Marcel Gavriliu, Microsoft François Guimbretière, Microsoft Xiang Anthony Chen, Microsoft Fabrice Matulic, Microsoft William Buxton, Microsoft Andrew Wilson, Microsoft |
Expert Crowdsourcing with Flash Teams | Daniela Retelny, Stanford University; et al. Sébastien Robaszkiewicz, Stanford University Alexandra To, Stanford University Walter Lasecki, University of Rochester Jay Patel, Stanford University Negar Rahmati, Stanford University Tulsee Doshi, Stanford University Melissa Valentine, Stanford University Michael Bernstein, Stanford University | |
PrintScreen: Fabricating Highly Customizable Thin-film Touch-Displays | Simon Olberding, Max Planck Institute for Informatics; et al. Michael Wessely, Max Planck Institute for Informatics Jürgen Steimle, Max Planck Institute for Informatics | |
VLDB Databases | The Uncracked Pieces in Database Cracking | Felix Martin Schuhknecht, Saarland University; et al. Alekh Jindal, Massachusetts Institute of Technology Jens Dittrich, Saarland University |
epiC: an Extensible and Scalable System for Processing Big Data | Dawei Jiang, National University of Singapore; et al. Gang Chen, Zhejiang University Beng Chin Ooi, National University of Singapore Kian-Lee Tan, National University of Singapore Sai Wu, Zhejiang University | |
M4: A Visualization-Oriented Time Series Data Aggregation | Uwe Jugel, SAP SE; et al. Zbigniew Jerzak, SAP SE Gregor Hackenbroich, SAP SE Volker Markl, Technical University of Berlin | |
Building Efficient Query Engines in a High-Level Language | Yannis Klonatos, École Polytechnique Fédérale de Lausanne; et al. Christoph Koch, École Polytechnique Fédérale de Lausanne Tiark Rompf, École Polytechnique Fédérale de Lausanne Hassan Chaf, Oracle Corporation | |
On k-Path Covers and their Applications | Stefan Funke, University of Stuttgart; et al. André Nusser, University of Stuttgart Sabine Storandt, University of Stuttgart | |
WWW World Wide Web | Efficient Estimation for High Similarities using Odd Sketches | Michael Mitzenmacher, Harvard University; et al. Rasmus Pagh, IT University of Copenhagen Ninh Pham, IT University of Copenhagen |
2013 | ||
---|---|---|
AAAI Artificial Intelligence | SMILe: Shuffled Multiple-Instance Learning | Gary Doran & Soumya Ray, Case Western Reserve University |
HC-Search: Learning Heuristics and Cost Functions for Structured Prediction | Janardhan Rao Doppa, Oregon State University; et al. Alan Fern, Oregon State University Prasad Tadepalli, Oregon State University | |
ACL Natural Language Processing | Grounded Language Learning from Video Described with Sentences | Haonan Yu & Jeffrey Mark Siskind, Purdue University |
CHI Human-Computer Interaction | Weighted Graph Comparison Techniques for Brain Connectivity Analysis | Basak Alper, University of California, Santa Barbara; et al. Benjamin Bach, Inria Nathalie Riche, Microsoft Tobias Isenberg, Inria Jean-Daniel Fekete, Inria |
Analyzing User-Generated YouTube Videos to Understand Touchscreen Use by People with Motor Impairments | Lisa Anthony, University of Maryland, Baltimore County; et al. YooJin Kim, University of Maryland Leah Findlater, University of Maryland | |
What is "Critical" About Critical Design? | Jeffrey Bardzell & Shaowen Bardzell, Indiana University Bloomington | |
The Dubuque Electricity Portal: Evaluation of a City-Scale Residential Electricity Consumption Feedback System | Tom Erickson, IBM; et al. Ming Li, IBM Younghun Kim, IBM Ajay Deshpande, IBM Sambit Sahu, IBM Tian Chao, IBM Piyawadee Sukaviriya, IBM Milind Naphade, IBM | |
Improving Navigation-Based File Retrieval | Stephen Fitchett, University of Canterbury; et al. Andy Cockburn, University of Canterbury Carl Gutwin, University of Saskatchewan | |
SPRWeb: Preserving Subjective Responses to Website Colour Schemes through Automatic Recolouring | David R. Flatla, University of Saskatchewan; et al. Katharina Reinecke, Harvard University Carl Gutwin, University of Saskatchewan Krzysztof Z. Gajos, Harvard University | |
The Efficacy of Human Post-Editing for Language Translation | Spence Green, Stanford University; et al. Jeffrey Heer, Stanford University Christopher D. Manning, Stanford University | |
Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI Research | Eric B. Hekler, Arizona State University; et al. Predrag Klasnja, University of Michigan Jon Froehlich, University of Maryland Matthew P. Buman, University of Maryland | |
Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical Turk | Lilly Irani, University of California, Irvine M. Six Silberman, Bureau of Economic Interpretation | |
IllumiRoom: Peripheral Projected Illusions for Interactive Experiences | Brett Jones, University of Illinois at Urbana–Champaign; et al. Hrvoje Benko, Microsoft Eyal Ofek, Microsoft Andrew D. Wilson, Microsoft | |
Webzeitgeist: Design Mining the Web | Ranjitha Kumar, Stanford University; et al. Arvind Satyanarayan, Stanford University Cesar Torres, Stanford University Maxine Lim, Stanford University Salman Ahmad, Massachusetts Institute of Technology Scott R. Klemmer, Stanford University Jerry O. Talton, Intel | |
LaserOrigami: Laser-Cutting 3D Objects | Stefanie Mueller, Hasso Plattner Institute; et al. Bastian Kruck, Hasso Plattner Institute Patrick Baudisch, Hasso Plattner Institute | |
Labor Dynamics in a Mobile Micro-Task Market | Mohamed Musthag & Deepak Ganesan, University of Massachusetts Amherst | |
Job Opportunities through Entertainment: Virally Spread Speech-Based Services for Low-Literate Users | Agha Ali Raza, Carnegie Mellon University; et al. Farhan Ul Haq, Lahore University of Management Sciences Zain Tariq, Lahore University of Management Sciences Mansoor Pervaiz, Northeastern University Samia Razaq, Lahore University of Management Sciences Umar Saif, Lahore University of Management Sciences Roni Rosenfeld, Carnegie Mellon University | |
At Home with Agents: Exploring Attitudes Towards Future Smart Energy Infrastructures | Tom Rodden, University of Nottingham; et al. Joel E. Fischer, University of Nottingham Nadia Pantidi, University of Nottingham Khaled Bachour, University of Nottingham Stuart Moran, University of Nottingham | |
Screenfinity: Extending the Perception Area of Content on Very Large Public Displays | Constantin Schmidt, Technical University of Berlin; et al. Jörg Müller, Technical University of Berlin Gilles Bailly, Technical University of Berlin | |
Reasons to Question Seven Segment Displays | Harold Thimbleby, Swansea University | |
The Many Faces of Meta: Experiencing Social Media as Performance, Exhibition, and Personal Archive | Xuan Zhao, Cornell University; et al. Niloufar Salehi, Cornell University Sasha Naranjit, Cornell University Sara Alwaalan, Cornell University Stephen Voida, Cornell University Dan Cosley, Cornell University | |
CIKM Knowledge Management | Penguins in Sweaters, or Serendipitous Entity Search on User-generated Content | Ilaria Bordino, Yahoo; et al. Yelena Mejova, Yahoo Mounia Lalmas, Yahoo |
CVPR Computer Vision | Fast, Accurate Detection of 100,000 Object Classes on a Single Machine | Thomas Dean, Google; et al. Mark A. Ruzon, Google Mark Segal, Google Jonathon Shlens, Google Sudheendra Vijayanarasimhan, Google Jay Yagnik, Google |
FOCS Theory | Navigating Central Path with Electrical Flows: from Flows to Matchings, and Back | Aleksander Mądry, École Polytechnique Fédérale de Lausanne |
On Kinetic Delaunay Triangulations: A Near Quadratic Bound for Unit Speed Motions | Natan Rubin, University of Paris VI: Pierre-and-Marie-Curie University | |
ICCV Computer Vision | From Large Scale Image Categorization to Entry-Level Categories | Vicente Ordonez, University of North Carolina at Chapel Hill; et al. Jia Deng, Stanford University Yejin Choi, Stony Brook University Alexander Berg, University of North Carolina at Chapel Hill Tamara Berg, University of North Carolina at Chapel Hill |
ICML Machine Learning | Fast Semidifferential-based Submodular Function Optimization | Rishabh Iyer, University of Washington; et al. Stefanie Jegelka, University of California, Berkeley Jeff Bilmes, University of Washington |
Vanishing Component Analysis | Roi Livni, The Hebrew University of Jerusalum; et al. David Lehavi, Hewlett Packard Sagi Schein, Hewlett Packard Hila Nachlieli, Hewlett Packard Shai Shalev Shwartz, The Hebrew University of Jerusalum Amir Globerson, The Hebrew University of Jerusalum | |
ICSE Software Engineering | Data Clone Detection and Visualization in Spreadsheets | Felienne Hermans, Delft University of Technology; et al. Ben Sedee, Delft University of Technology Martin Pinzger, Delft University of Technology Arie van Deursen, Delft University of Technology |
Interaction-Based Test-Suite Minimization | Dale Blue, IBM; et al. Itai Segall, IBM Rachel Tzoref-Brill, IBM Aviad Zlotnick, IBM | |
Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop Clouds | Weiyi Shang, Queen's University; et al. Zhen Ming Jiang, Queen's University Hadi Hemmati, Queen's University Bram Adams, Polytechnique Montréal Ahmed E. Hassan, Queen's University Patrick Martin, Queen's University | |
UML in Practice | Marian Petre, The Open University | |
Dual Ecological Measures of Focus in Software Development | Daryl Posnett, University of California, Davis; et al. Raissa D'Souza, University of California, Davis Premkumar Devanbu, University of California, Davis Vladimir Filkov, University of California, Davis | |
Automatic patch generation learned from human-written patches | Dongsun Kim, Hong Kong University of Science and Technology; et al. Jaechang Nam, Hong Kong University of Science and Technology Jaewoo Song, Hong Kong University of Science and Technology Sunghun Kim, Hong Kong University of Science and Technology | |
IJCAI Artificial Intelligence | Flexibility and Decoupling in the Simple Temporal Problem | Michel Wilson, Delft University of Technology; et al. Tomas Klos, Delft University of Technology Cees Witteveen, Delft University of Technology Bob Huisman, Delft University of Technology |
Bayesian Optimization in High Dimensions via Random Embeddings | Ziyu Wang, University of British Columbia; et al. Masrour Zoghi, University of Amsterdam Frank Hutter, Freiberg University of Mining and Technology David Matheson, University of British Columbia Nando de Freitas, University of British Columbia | |
INFOCOM Networking | On the Steady-State of Cache Networks | Elisha J. Rosensweig, University of Massachusetts Amherst; et al. Daniel S. Menasche, University of Massachusetts Amherst Jim Kurose, University of Massachusetts Amherst |
KDD Data Mining | Simple and Deterministic Matrix Sketching | Edo Liberty, Yahoo |
MOBICOM Mobile | Whole-Home Gesture Recognition Using Wireless Signals | Qifan Pu, University of Washington; et al. Sidhant Gupta, University of Washington Shyamnath Gollakota, University of Washington Shwetak Patel, University of Washington |
NeurIPS Machine Learning | A memory frontier for complex synapses | Subhaneil Lahiri & Surya Ganguli, Stanford University |
Submodular Optimization with Submodular Cover and Submodular Knapsack Constraints | Rishabh Iyer & Jeff Bilmes, University of Washington | |
Scalable Influence Estimation in Continuous-Time Diffusion Networks | Nan Du, Georgia Institute of Technology; et al. Le Song, Georgia Institute of Technology Manuel Gomez-Rodriguez, Max Planck Institute for Intelligent Systems Hongyuan Zha, Georgia Institute of Technology | |
NSDI Networking | A Fault-Tolerant Engineered Network | Vincent Liu, University of Washington; et al. Daniel Halperin, University of Washington Arvind Krishnamurthy, University of Washington Thomas Anderson, University of Washington |
Embassies: Radically Refactoring the Web | Jon Howell, Microsoft; et al. Bryan Parno, Microsoft John R. Douceur, Microsoft | |
PLDI Programming Languages | A General Constraint-centric Scheduling Framework for Spatial Architectures | Tony Nowatzki, University of Wisconsin–Madison; et al. Michael Sartin-Tarm, University of Wisconsin–Madison Lorenzo De Carli, University of Wisconsin–Madison Karthikeyan Sankaralingam, University of Wisconsin–Madison Cristian Estan, Broadcom Behnam Robatmili, Qualcomm |
CLAP: Recording Local Executions to Reproduce Concurrency Failures | Jeff Huang, Hong Kong University of Science and Technology; et al. Charles Zhang, Hong Kong University of Science and Technology Julian Dolby, IBM | |
Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many Paths | Sriram Sankaranarayanan, University of Colorado Boulder; et al. Aleksandar Chakarov, University of Colorado Boulder Sumit Gulwani, Microsoft | |
Reconciling Exhaustive Pattern Matching with Objects | Chinawat Isradisaikul & Andrew C. Myers, Cornell University | |
PODS Databases | Verification of database-driven systems via amalgamation | Mikołaj Bojańczyk, University of Warsaw; et al. Luc Segoufin, Inria Szymon Toruńczyk, University of Warsaw |
S&P Security and Privacy | Pinocchio: Nearly Practical Verifiable Computation | Bryan Parno, Microsoft; et al. Craig Gentry, IBM Jon Howell, Microsoft Mariana Raykova, IBM |
SIGCOMM Networking | Ambient Backscatter: Wireless Communication Out of Thin Air | Vincent Liu, University of Washington; et al. Aaron Parks, University of Washington Vamsi Talla, University of Washington Shyamnath Gollakota, University of Washington David Wetherall, University of Washington Joshua R. Smith, University of Washington |
SIGIR Information Retrieval | Beliefs and Biases in Web Search | Ryen W. White, Microsoft |
SIGMETRICS Performance | Queueing System Topologies with Limited Flexibility | John Tsitsiklis & Kuang Xu, Massachusetts Institute of Technology |
SIGMOD Databases | Massive Graph Triangulation | Xiaocheng Hu, The Chinese University of Hong Kong; et al. Yufei Tao, The Chinese University of Hong Kong Chin-Wan Chung, KAIST |
SODA Theory | A Simple Algorithm for the Graph Minor Decomposition - Logic meets Structural Graph Theory | Martin Grohe, RWTH Aachen University; et al. Ken-ichi Kawarabayashi, National Institute of Informatics Bruce Reed, McGill University |
Dynamic graph connectivity in polylogarithmic worst case time | Bruce M. Kapron, University of Victoria; et al. Valerie King, University of Victoria Ben Mountjoy, University of Victoria | |
SOSP Operating Systems | The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors | Austin T. Clements, Massachusetts Institute of Technology; et al. M. Frans Kaashoek, Massachusetts Institute of Technology Nickolai Zeldovich, Massachusetts Institute of Technology Robert T. Morris, Massachusetts Institute of Technology Eddie Kohler, Harvard University |
Towards optimization-safe systems: analyzing the impact of undefined behavior | Xi Wang, Massachusetts Institute of Technology; et al. Nickolai Zeldovich, Massachusetts Institute of Technology M. Frans Kaashoek, Massachusetts Institute of Technology Armando Solar-Lezama, Massachusetts Institute of Technology | |
Naiad: A Timely Dataflow System | Derek G. Murray, Microsoft; et al. Frank McSherry, Microsoft Rebecca Isaacs, Microsoft Michael Isard, Microsoft Paul Barham, Microsoft Martíın Abadi, Microsoft | |
STOC Theory | Approximation Resistance from Pairwise Independent Subgroups | Siu On Chan, University of California, Berkeley |
Low Rank Approximation and Regression in Input Sparsity Time | Kenneth L. Clarkson & David P. Woodruff, IBM | |
UIST User Interface | PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing Interfaces | Lining Yao, Massachusetts Institute of Technology; et al. Ryuma Niiyama, Massachusetts Institute of Technology Jifei Ou, Massachusetts Institute of Technology Sean Follmer, Massachusetts Institute of Technology Clark Della Silva, Massachusetts Institute of Technology Hiroshi Ishii, Massachusetts Institute of Technology |
Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic Sensing | Makoto Ono, University of Tsukuba; et al. Buntarou Shizuki, University of Tsukuba Jiro Tanaka, University of Tsukuba | |
Fiberio: A Touchscreen that Senses Fingerprints | Christian Holz & Patrick Baudisch, Hasso Plattner Institute | |
VLDB Databases | DisC Diversity: Result Diversification based on Dissimilarity and Coverage | Marina Drosou & Evaggelia Pitoura, University of Ioannina |
WWW World Wide Web | No Country for Old Members: User Lifecycle and Linguistic Change in Online Communities | Cristian Danescu-Niculescu-Mizil, Stanford University; et al. Robert West, Stanford University Dan Jurafsky, Stanford University Jure Leskovec, Stanford University Christopher Potts, Stanford University |
2012 | ||
---|---|---|
AAAI Artificial Intelligence | Learning SVM Classifiers with Indefinite Kernels | Suicheng Gu & Yuhong Guo, Temple University |
Document Summarization Based on Data Reconstruction | Zhanying He, Zhejiang University; et al. Chun Chen, Zhejiang University Jiajun Bu, Zhejiang University Can Wang, Zhejiang University Lijan Zhang, Zhejiang University Deng Cai, Zhejiang University Xiaofei He, Zhejiang University | |
ACL Natural Language Processing | Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic Parsing | Hiroyuki Shindo, NTT Communication Science Laboratories; et al. Yusuke Miyao, National Institute of Informatics Akinori Fujino, NTT Communication Science Laboratories Masaaki Nagata, NTT Communication Science Laboratories |
CHI Human-Computer Interaction | Observational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobile Devices | Niels Henze, University of Oldenburg; et al. Enrico Rukzio, University of Duisburg-Essen Susanne Boll, University of Oldenburg |
The Normal Natural Troubles of Driving with GPS | Barry Brown, Stockholm University Eric Laurier, University of Edinburgh | |
Improving Command Selection with CommandMaps | Joey Scarr, University of Canterbury; et al. Andy Cockburn, University of Canterbury Carl Gutwin, University of Saskatchewan Andrea Bunt, University of Manitoba | |
Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical Kiosks | Kurtis Heimerl, University of California, Berkeley; et al. Brian Gawalt, University of California, Berkeley Kuang Chen, University of California, Berkeley Tapan S. Parikh, University of California, Berkeley Björn Hartmann, University of California, Berkeley | |
Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday Objects | Munehiko Sato, Disney Research; et al. Ivan Poupyrev, Disney Research Chris Harrison, Disney Research | |
Detecting Error-Related Negativity for Interaction Design | Chi Vi & Sriram Subramanian, University of Bristol | |
Empathy, Participatory Design and People with Dementia | Stephen Lindsay, Newcastle University; et al. Katie Britain, Newcastle University Daniel Jackson, Newcastle University Cassim Ladha, Newcastle University Karim Ladha, Newcastle University Patrick Olivier, Newcastle University | |
Looking Glass: A Field Study on Noticing Interactivity of Shop Windows | Jörg Müller, Technical University of Berlin; et al. Robert Walter, Technical University of Berlin Gilles Bailly, Technical University of Berlin Michael Nischt, Technical University of Berlin Florian Alt, University of Stuttgart | |
Affordances in HCI: Toward a Mediated Action Perspective | Victor Kaptelinin, University of Bergen Bonnie Nardi, University of California, Irvine | |
Personas and Decision Making in the Design Process: An Ethnographic Case Study | Erin Friess, University of North Texas | |
Using Rhythmic Patterns as an Input Method | Emilien Ghomi, University of Paris-Sud; et al. Guillaume Faure, University of Paris-Sud Stephane Huot, University of Paris-Sud Olivier Chapuis, University of Paris-Sud Michel Beaudouin-Lafon, University of Paris-Sud | |
Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCI | Ylva Fernaeus, Royal Institute of Technology; et al. Martin Jonssonm, Södertörn University Jakob Tholanderm, Stockholm University | |
Uncomfortable Interactions | Steve Benford, University of Nottingham; et al. Chris Greenhalgh, University of Nottingham Gabriella Giannachi, University of Exeter Brendan Walker, University of Nottingham Joe Marshall, University of Nottingham Tom Rodden, University of Nottingham | |
ClayVision: The (Elastic) Image of the City | Yuichiro Takeuchi, Sony Ken Perlin, New York University | |
CIKM Knowledge Management | Gelling, and Melting, Large Graphs by Edge Manipulation | Hanghang Tong, IBM; et al. B. Aditya Prakash, Virginia Tech Tina Eliassi-Rad, Rutgers University Michalis Faloutsos, University of California, Riverside Christos Faloutsos, Carnegie Mellon University |
CVPR Computer Vision | A Simple Prior-free Method for Non-Rigid Structure-from-Motion Factorization | Yuchao Dai, Northwestern Polytechnical University; et al. Hongdong Li, Australian National University Mingyi He, Northwestern Polytechnical University |
FOCS Theory | A Polylogarithmic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2 | Julia Chuzhoy, Toyota Technological Institute at Chicago Shi Li, Princeton University |
A multi-prover interactive proof for NEXP sound against entangled provers | Tsuyoshi Ito, NEC Labs America Thomas Vidick, Massachusetts Institute of Technology | |
FSE Software Engineering | Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software Libraries | Bradley Cossette & Robert Walker, University of Calgary |
Scalable Test Data Generation from Multidimensional Models | Emina Torlak, University of California, Berkeley | |
Assessing the Value of Branches with What-if Analysis | Christian Bird & Thomas Zimmermann, Microsoft | |
ICML Machine Learning | Bayesian Posterior Sampling via Stochastic Gradient Fisher Scoring | Sungjin Ahn, University of California, Irvine; et al. Anoop Korattikara, University of California, Irvine Max Welling, University of California, Irvine |
ICSE Software Engineering | Amplifying Tests to Validate Exception Handling Code | Pingyu Zhang & Sebastian Elbaum, University of Nebraska–Lincoln |
A Tactic-Centric Approach for Automating Traceability of Quality Concerns | Mehdi Mirakhorli, DePaul University; et al. Yonghee Shin, DePaul University Jane Cleland-Huang, DePaul University Murat Cinar, DePaul University | |
Using Dynamic Analysis to Discover Polynomial and Array Invariants | ThanhVu Nguyen, University of New Mexico; et al. Deepak Kapur, University of New Mexico Westley Weimer, University of New Mexico Stephanie Forrest, University of New Mexico | |
Automated Detection of Client-State Manipulation Vulnerabilities | Anders Møller & Mathias Schwarz, Aarhus University | |
Understanding Integer Overflow in C/C++ | Will Dietz, University of Illinois at Urbana–Champaign; et al. Peng Li, University of Utah John Regehr, University of Utah Vikram Adve, University of Illinois at Urbana–Champaign | |
How Do Professional Developers Comprehend Software? | Tobias Roehm, Technical University of Munich; et al. Rebecca Tiarks, University of Bremen Rainer Koschke, University of Bremen Walid Maalej, Technical University of Munich | |
Partial Models: Towards Modeling and Reasoning with Uncertainty | Michalis Famelis, University of Toronto; et al. Rick Salay, University of Toronto Marsha Chechik, University of Toronto | |
INFOCOM Networking | Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework | Carlee Joe-Wong, Princeton University; et al. Soumya Sen, Princeton University Tian Lan, George Washington University Mung Chiang, Princeton University |
KDD Data Mining | Searching and Mining Trillions of Time Series Subsequences under Dynamic Time Warping | Thanawin Rakthanmanon, University of California, Riverside; et al. Bilson Campana, University of California, Riverside Abdullah Mueen, University of California, Riverside Gustavo Batista, University of São Paulo Brandon Westover, Brigham and Women's Hospital Qiang Zhu, University of California, Riverside Jesin Zakaria, University of California, Riverside Eamonn Keogh, University of California, Riverside |
MOBICOM Mobile | Distinguishing Users with Capacitative Touch Communication | Tam Vu, Rutgers University; et al. Akash Baid, Rutgers University Simon Gao, Rutgers University Marco Gruteser, Rutgers University Richard Howard, Rutgers University Janne Lindqvist, Rutgers University Predag Spasojevic, Rutgers University Jeffrey Walling, Rutgers University |
NSDI Networking | Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | Matei Zaharia, University of California, Berkeley; et al. Mosharaf Chowdhury, University of California, Berkeley Tathagata Das, University of California, Berkeley Ankur Dave, University of California, Berkeley Justin Ma, University of California, Berkeley Murphy McCauley, University of California, Berkeley Michael J. Franklin, University of California, Berkeley Scott Shenker, University of California, Berkeley Ion Stoica, University of California, Berkeley |
OSDI Operating Systems | Spanner: Google's Globally-Distributed Database | James C. Corbett, Google; et al. Jeffrey Dean, Google Michael Epstein, Google Andrew Fikes, Google Christopher Frost, Google JJ Furman, Google Sanjay Ghemawat, Google Andrey Gubarev, Google Christopher Heiser, Google Peter Hochschild, Google Wilson Hsieh, Google Sebastian Kanthak, Google Eugene Kogan, Google Hongyi Li, Google Alexander Lloyd, Google Sergey Melnik, Google David Mwaura, Google David Nagle, Google Sean Quinlan, Google Rajesh Rao, Google Lindsay Rolig, Google Yasushi Saito, Google Michal Szymaniak, Google Christopher Taylor, Google Ruth Wang, Google Dale Woodford, Google |
PLDI Programming Languages | Concurrent Data Representation Synthesis | Peter Hawkins, Stanford University; et al. Alex Aiken, Stanford University Kathleen Fisher, Tufts University Martin Rinard, Massachusetts Institute of Technology Mooly Sagiv, Tel Aviv University |
PODS Databases | Worst-case Optimal Join Algorithms | Hung Q. Ngo, University at Buffalo; et al. Ely Porat, Bar-Ilan University Christopher Ré, University of Wisconsin–Madison Atri Rudra, University at Buffalo |
S&P Security and Privacy | Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards | Benedikt Driessen, Ruhr University Bochum; et al. Ralf Hund, Ruhr University Bochum Carsten Willems, Ruhr University Bochum Christof Paar, Ruhr University Bochum Thorsten Holz, Ruhr University Bochum |
SIGCOMM Networking | Multi-Resource Fair Queueing for Packet Processing | Ali Ghodsi, University of California, Berkeley; et al. Vyas Sekar, Intel Matei Zaharia, University of California, Berkeley Ion Stoica, University of California, Berkeley |
SIGIR Information Retrieval | Time-Based Calibration of Effectiveness Measures | Mark Smucker & Charles Clarke, University of Waterloo |
SIGMETRICS Performance | Temperature management in data centers: why some (might) like it hot | Nosayba El-Sayed, University of Toronto; et al. Ioan Stefanovici, University of Toronto George Amvrosiadis, University of Toronto Andy A. Hwang, University of Toronto Bianca Schroeder, University of Toronto |
SIGMOD Databases | High-Performance Complex Event Processing over XML Streams | Barzan Mozafari, Massachusetts Institute of Technology; et al. Kai Zeng, University of California, Los Angeles Carlo Zaniolo, University of California, Los Angeles |
SODA Theory | Computing all maps into a sphere | Martin Čadek, Masaryk University; et al. Marek Krčál, Charles University Jiří Matoušel, Charles University Francis Sergeraert, Joseph Fourier University Lukáš Vokřínel, Masaryk University Uli Wagner, ETH Zurich |
STOC Theory | Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower Bounds | Samuel Fiorini, Free University of Brussels; et al. Serge Massar, Free University of Brussels Sebastian Pokutta, University of Erlangen-Nuremberg Hans Tiwary, Free University of Brussels Ronald de Wolf, Centrum Wiskunde & Informatica |
The Cell Probe Complexity of Dynamic Range Counting | Kasper Larsen, Aarhus University | |
UIST User Interface | Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Changing Devices | Sean Follmer, Massachusetts Institute of Technology; et al. Daniel Leithinger, Massachusetts Institute of Technology Alex Olwal, Massachusetts Institute of Technology Nadia Cheng, Massachusetts Institute of Technology Hiroshi Ishii, Massachusetts Institute of Technology |
Cliplets: juxtaposing still and dynamic imagery | Neel Joshi, Microsoft; et al. Sisil Mehta, Georgia Institute of Technology Steven Drucker, Microsoft Eric Stollnitz, Microsoft Hugues Hoppe, Microsoft Matt Uyttendaele, Microsoft Michael Cohen, Microsoft | |
CrowdScape: interactively visualizing user behavior and output | Jeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University | |
VLDB Databases | Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification | Albert Angel, University of Toronto; et al. Nick Koudas, University of Toronto Nikos Sarkas, University of Toronto Divesh Srivastava, AT&T Laboratories |
WWW World Wide Web | Counting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the Standard | Marcelo Arenas, Pontifical Catholic University of Chile; et al. Sebastián Conca, Pontifical Catholic University of Chile Jorge Pérez, University of Chile |
2011 | ||
---|---|---|
AAAI Artificial Intelligence | Complexity of and Algorithms for Borda Manipulation | Jessica Davies, University of Toronto; et al. George Katsirelos, University of Paris-Sud Nina Narodytska, University of New South Wales Toby Walsh, National ICT Australia |
Dynamic Resource Allocation in Conservation Planning | Daniel Golovin, California Institute of Technology; et al. Andreas Krause, ETH Zurich Beth Gardner, North Carolina State University Sarah J. Converse, Patuxent Wildlife Research Center Steve Morey, United States Fish and Wildlife Service | |
ACL Natural Language Processing | Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based Projections | Dipanjan Das, Carnegie Mellon University Slav Petrov, Google |
CHI Human-Computer Interaction | Bricolage: Example-Based Retargeting for Web Design | Ranjitha Kumar, Stanford University; et al. Jerry Talton, Stanford University Salman Ahmad, Stanford University Scott Klemmer, Stanford University |
Teenagers and Their Virtual Possessions: Design Opportunities and Issues | William Odom, Carnegie Mellon University; et al. John Zimmerman, Carnegie Mellon University Jodi Forlizzi, Carnegie Mellon University | |
Mid-air Pan-and-Zoom on Wall-sized Displays | Mathieu Nancel, University of Paris-Sud; et al. Julie Wagner, Inria Emmanuel Pietriga, Inria Olivier Chapuis, University of Paris-Sud Wendy Mackay, Inria | |
Why is My Internet Slow?: Making Network Speeds Visible | Marshini Chetty, Georgia Institute of Technology; et al. David Haslem, Orange Sparkle Ball Andrew Baird, Amazon Ugochi Ofoha, Georgia Institute of Technology Bethany Sumner, Georgia Institute of Technology Rebecca Grinter, Georgia Institute of Technology | |
Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual Environment | Thomas Erickson, IBM; et al. N. Sadat Shami, IBM Wendy A. Kellogg, IBM David W. Levine, IBM | |
Your Noise is My Command: Sensing Gestures Using the Body as an Antenna | Gabe Cohn, University of Washington; et al. Daniel Morris, Microsoft Shwetak N. Patel, University of Washington Desney Tan, Microsoft | |
Enhancing Physicality in Touch Interaction with Programmable Friction | Vincent Levesque, University of British Columbia; et al. Louise Oram, University of British Columbia Karon MacLean, University of British Columbia Andy Cockburn, University of Canterbury Nicholas D. Marchuk, Northwestern University Dan Johnson, Northwestern University J. Edward Colgate, Northwestern University | |
Usable Gestures for Blind People: Understanding Preference and Performance | Shaun K. Kane, University of Washington; et al. Jacob Wobbrock, University of Washington Richard E. Ladner, University of Washington | |
Automics: souvenir generating photoware for theme parks | Abigail Durrant, University of Nottingham; et al. Duncan Rowland, University of Lincoln David Kirk, University of Nottingham Steve Benford, University of Nottingham Joel E. Fischer, University of Nottingham Derek McAuley, University of Nottingham Michael A. Peshkin, Northwestern University | |
Effects of Community Size and Contact Rate in Synchronous Social Q&A | Ryen W. White, Microsoft; et al. Matthew Richardson, Microsoft Yandong Liu, Carnegie Mellon University | |
Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Word Pairs | Koji Yatani, University of Toronto; et al. Michael Novati, University of Toronto Andrew Trusty, University of Toronto Khai N. Truong, University of Toronto | |
In the Shadow of Misperception: Assistive Technology Use and Social Interactions | Kristen Shinohara & Jacob Wobbrock, University of Washington | |
Ease of Juggling: Studying the Effects of Manual Multitasking | Antti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University | |
CIKM Knowledge Management | Intent-aware query similarity | Jiafeng Guo, Chinese Academy of Sciences; et al. Xueqi Cheng, Chinese Academy of Sciences Gu Su, Microsoft Xiaofei Zhu, Chinese Academy of Sciences |
CVPR Computer Vision | Real-time Human Pose Recognition in Parts from Single Depth Images | Jamie Shotton, Microsoft; et al. Andrew Fitzgibbon, Microsoft Mat Cook, Microsoft Toby Sharp, Microsoft Mark Finocchio, Microsoft Richard Moore, Microsoft Alex Kipman, Microsoft Andrew Blake, Microsoft |
FOCS Theory | A Randomized Rounding Approach to the Traveling Salesman Problem | Shayan Oveis Gharan, Stanford University; et al. Amin Saberi, Stanford University Mohit Singh, McGill University |
Approximating Graphic TSP by Matchings | Tobia Mömke & Ola Svensson, Royal Institute of Technology | |
A Polylogarithmic-Competitive Algorithm for the k-Server Problem | Nikhil Bansal, IBM; et al. Niv Buchbinder, The Open University Aleksander Mądry, Massachusetts Institute of Technology Joseph Naor, Technion – Israel Institute of Technology | |
FSE Software Engineering | Proving programs robust | Swarat Chaudhuri, Rice University; et al. Sumit Gulwani, Microsoft Roberto Lublinerman, Pennsylvania State University Sara Navidpour, Pennsylvania State University |
How Do Fixes Become Bugs? | Zuoning Yin, University of Illinois at Urbana–Champaign; et al. Ding Yuan, University of Illinois at Urbana–Champaign Yuanyuan Zhou, University of California, San Diego Shankar Pasupathy, NetApp Lakshmi Bairavasundaram, NetApp | |
Proactive Detection of Collaboration Conflicts | Yuriy Brun, University of Washington; et al. Reid Holmes, University of Waterloo Michael D. Ernst, University of Washington David Notkin, University of Washington | |
ICCV Computer Vision | Relative Attributes | Devi Parikh, Toyota Technological Institute at Chicago Kristen Grauman, University of Texas at Austin |
ICML Machine Learning | Computational Rationalization: The Inverse Equilibrium Problem | Kevin Waugh, Carnegie Mellon University; et al. Brian Ziebart, Carnegie Mellon University Drew Bagnell, Carnegie Mellon University |
ICSE Software Engineering | Run-Time Efficient Probabilistic Model Checking | Antonio Filieri, Politecnico di Milano; et al. Carlo Ghezzi, Politecnico di Milano Giordano Tamburrelli, Politecnico di Milano |
Verifying Multi-threaded Software using SMT-based Context-Bounded Model Checking | Lucas Cordeiro & Bernd Fischer, University of Southampton | |
Programs, tests, and oracles: the foundations of testing revisited | Matt Staats, University of Minnesota; et al. Michael W. Whalen, University of Minnesota Mats P.E. Heimdahl, University of Minnesota | |
On-demand Feature Recommendations Derived from Mining Public Product Descriptions | Horatiu Dumitru, DePaul University; et al. Marek Gibiec, DePaul University Negar Hariri, DePaul University Jane Cleland-Huang, DePaul University Bamshad Mobasher, DePaul University Carlos Castro-Herrera, DePaul University Mehdi Mirakhorli, DePaul University | |
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and Profits | Narayan Ramasubbu, Singapore Management University; et al. Marcelo Cataldo, Carnegie Mellon University Rajesh Krishna Balan, Singapore Management University James D. Herbsleb, Carnegie Mellon University | |
IJCAI Artificial Intelligence | Nested Rollout Policy Adaptation for Monte Carlo Tree Search | Christopher D. Rosin, Parity Computing |
Unweighted Coalitional Manipulation Under the Borda Rule is NP-Hard | Nadja Betzler, Technical University of Berlin; et al. Rolf Niedermeier, Technical University of Berlin Gerhard J. Woeginger, Eindhoven University of Technology | |
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean Spaces | Roman Kontchakov, Birkbeck College London; et al. Yavor Nenov, University of Manchester Ian Pratt-Hartmann, University of Manchester Michael Zakharyaschev, Birkbeck College London | |
INFOCOM Networking | Dynamic right-sizing for power-proportional data centers | Minghong Lin, California Institute of Technology; et al. Adam Wierman, California Institute of Technology Lachlan Andrew, Swinburne University of Technology Eno Thereska, Microsoft |
KDD Data Mining | Leakage in Data Mining: Formulation, Detection, and Avoidance | Shachar Kaufman, Tel Aviv University; et al. Saharon Rosset, Tel Aviv University Claudia Perlich, Media6Degrees |
MOBICOM Mobile | E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks | Xinyu Zhang & Kang G. Shin, University of Michigan |
Detecting Driver Phone Use Leveraging Car Speakers | Jie Yang, Stevens Institute of Technology; et al. Simon Sdhom, Stevens Institute of Technology Gayathri Chandrasekaran, Rutgers University Tam Vu, Stevens Institute of Technology Hongbo Liu, Stevens Institute of Technology Nicolae Cecan, Rutgers University Yingying Chen, Stevens Institute of Technology Marco Gruteser, Rutgers University Richard P. Martin, Rutgers University | |
NSDI Networking | ServerSwitch: A Programmable and High Performance Platform for Data Center Networks | Guohan Lu, Microsoft; et al. Chuanxiong Guo, Microsoft Yulong Li, Microsoft Zhiqiang Zhou, Tsinghua University Tong Yuan, Microsoft Haitao Wu, Microsoft Yongqiang Xiong, Microsoft Rui Gao, Microsoft Yongguang Zhang, Microsoft |
Design, Implementation and Evaluation of Congestion Control for Multipath TCP | Damon Wischik, University College London; et al. Costin Raiciu, University College London Adam Greenhalgh, University College London Mark Handley, University College London | |
PLDI Programming Languages | Data Representation Synthesis | Peter Hawkins, Stanford University; et al. Alex Aiken, Stanford University Kathleen Fisher, Tufts University Martin Rinard, Massachusetts Institute of Technology Mooly Sagiv, Tel Aviv University |
PODS Databases | Data Exchange Beyond Complete Data | Marcelo Arenas, Pontifical Catholic University of Chile; et al. Jorge Pérez, University of Chile Juan Reutter, University of Edinburgh |
S&P Security and Privacy | Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks | Andrew M. White, University of North Carolina at Chapel Hill; et al. Austin Matthews, University of North Carolina at Chapel Hill Kevin Snow, University of North Carolina at Chapel Hill Fabian Monrose, University of North Carolina at Chapel Hill |
SIGCOMM Networking | They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices | Shyamnath Gollakota, Massachusetts Institute of Technology; et al. Haitham Hassanieh, Massachusetts Institute of Technology Benjamin Ransford, University of Massachusetts Amherst Dina Katabi, Massachusetts Institute of Technology Kevin Fu, University of Massachusetts Amherst |
SIGIR Information Retrieval | Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction Data | Mikhail Ageev, Moscow State University; et al. Qi Guo, Emory University Dmitry Lagun, Emory University Eugene Agichtein, Emory University |
SIGMETRICS Performance | Topology Discovery of Sparse Random Graphs With Few Participants | Animashree Anandkumar, University of California, Irvine; et al. Avinatan Hassidim, Google Jonathan Kelner, Massachusetts Institute of Technology |
SIGMOD Databases | Entangled Queries: Enabling Declarative Data-Driven Coordination | Nitin Gupta, Cornell University; et al. Lucja Kot, Cornell University Sudip Roy, Cornell University Gabriel Bender, Cornell University Johannes Gehrke, Cornell University Christoph Koch, École Polytechnique Fédérale de Lausanne |
SODA Theory | An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss Transform | Nir Ailon, Technion – Israel Institute of Technology Edo Liberty, Yahoo |
SOSP Operating Systems | Cells: A Virtual Mobile Smartphone Architecture | Jeremy Andrus, Columbia University; et al. Christoffer Dall, Columbia University Alexander Van't Hof, Columbia University Oren Laadan, Columbia University Jason Nieh, Columbia University |
A File is Not a File: Understanding the I/O Behavior of Apple Desktop Applications | Tyler Harter, University of Wisconsin–Madison; et al. Chris Dragga, University of Wisconsin–Madison Michael Vaughn, University of Wisconsin–Madison Andrea C. Arpaci-Dusseau, University of Wisconsin–Madison Remzi H. Arpaci-Dusseau, University of Wisconsin–Madison | |
STOC Theory | Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphs | Paul Christiano, Massachusetts Institute of Technology; et al. Jonathan A. Kelner, Massachusetts Institute of Technology Aleksander Mądry, Massachusetts Institute of Technology Daniel A. Spielman, Yale University Shang-Hua Teng, University of Southern California |
Subexponential lower bounds for randomized pivoting rules for the simplex algorithm | Oliver Friedmann, Ludwig Maximilian University of Munich; et al. Thomas Dueholm Hansen, Aarhus University Uri Zwick, Tel Aviv University | |
UIST User Interface | SideBySide: Ad-hoc Multi-user Interaction with Handheld Projectors | Karl D.D. Willis, Carnegie Mellon University; et al. Ivan Poupyrev, Disney Research Scott E. Hudson, Carnegie Mellon University Moshe Mahler, Disney Research |
VLDB Databases | RemusDB: Transparent High-Availability for Database Systems | Umar Farooq Minhas, University of Waterloo; et al. Shriram Rajagopalan, University of British Columbia Brendan Cully, University of British Columbia Ashraf Aboulnaga, University of Waterloo Ken Salem, University of Waterloo Andrew Warfield, University of British Columbia |
WWW World Wide Web | Towards a theory model for product search | Beibei Li, New York University; et al. Anindya Ghose, New York University Panagiotis G. Ipeirotis, New York University |
2010 | ||
---|---|---|
AAAI Artificial Intelligence | A Novel Transition Based Encoding Scheme for Planning as Satisfiability | Ruoyun Huang, Washington University in St. Louis; et al. Yixin Chen, Washington University in St. Louis Weixiong Zhang, Washington University in St. Louis |
How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Answering Systems | Giorgos Stoilos, University of Oxford; et al. Bernardo Cuenca Grau, University of Oxford Ian Horrocks, University of Oxford | |
ACL Natural Language Processing | Beyond NomBank: A Study of Implicit Arguments for Nominal Predicates | Matthew Gerber & Joyce Y. Chai, Michigan State University |
CHI Human-Computer Interaction | How does search behavior change as search becomes more difficult? | Anne Aula, Google; et al. Rehan M. Khan, Google Zhiwei Guan, Google |
The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Context | Brent Hecht & Darren Gergle, Northwestern University | |
Occlusion-Aware Interfaces | Daniel Vogel & Ravin Balakrishnan, University of Toronto | |
Skinput: Appropriating the Body as an Input Surface | Chris Harrison, Carnegie Mellon University; et al. Desney Tan, Microsoft Dan Morris, Microsoft | |
Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural India | Neil Patel, Stanford University; et al. Deepti Chittamuru, University of California, Berkeley Anupam Jain, IBM Paresh Dave, LLC Center for Information and Legal Support for the Development of the Arctic Tapan S. Parikh, University of California, Berkeley | |
Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber Bundles | Patrick Baudisch, Hasso Plattner Institute; et al. Torsten Becker, Hasso Plattner Institute Frederik Rudeck, Hasso Plattner Institute | |
Feminist HCI: Taking Stock and Outlining an Agenda for Design | Shaowen Bardzell, Indiana University Bloomington | |
Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface Structure | Morgan Dixon & James Fogarty, University of Washington | |
Mobile-izing Health Workers in Rural India | Divya Ramachandran, University of California, Berkeley; et al. John Canny, University of California, Berkeley Prabhu Dutta Das, Dhirubhai Ambani Institute of Information and Communication Technology Edward Cutrell, Microsoft | |
Mapping the Landscape of Sustainable HCI | Carl DiSalvo, Georgia Institute of Technology; et al. Phoebe Sengers, Cornell University Hrönn Brynjarsdóttir, Cornell University | |
The Design of Eco-Feedback Technology | Jon Froehlich, University of Washington; et al. Leah Findlater, University of Washington James Landay, University of Washington | |
Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of Charts | Scott Bateman, University of Saskatchewan; et al. Regan L. Mandryk, University of Saskatchewan Carl Gutwin, University of Saskatchewan Aaron Genest, University of Saskatchewan David McDine, University of Saskatchewan Christopher Brooks, University of Saskatchewan | |
CIKM Knowledge Management | MENTA: Inducing Multilingual Taxonomies from Wikipedia | Gerard de Melo & Gerhard Weikum, Max Planck Institute for Informatics |
FACeTOR: cost-driven exploration of faceted query results | Abhijith Kashyap, University at Buffalo; et al. Vagelis Hristidis, Florida International University Michalis Petropoulos, University at Buffalo | |
CVPR Computer Vision | Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data using the L1 Norm | Anders Eriksson & Anton va den Hendel, University of Adelaide |
FOCS Theory | Subexponential Algorithms for Unique Games and Related Problems | Sanjeev Arora, Princeton University; et al. Boaz Barak, Princeton University David Steurer, Princeton University |
Computational Transition at the Uniqueness Threshold | Allan Sly, Microsoft | |
Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke Decompositions | Matthew Andrews, Bell Labs | |
FSE Software Engineering | Staged Concurrent Program Analysis | Nishant Sinha & Chao Wang, NEC Labs America |
Developer Fluency: Achieving True Mastery in Software Projects | Minghui Zhou, Peking University Audris Mockus, Avaya Labs | |
Creating and evolving developer documentation: understanding the decisions of open source contributors | Barthélémy Dagenais & Martin P. Robillard, McGill University | |
ICML Machine Learning | Hilbert Space Embeddings of Hidden Markov Models | Le Song, Carnegie Mellon University; et al. Byron Boots, Carnegie Mellon University Sajid M. Siddiqi, Google Geoffrey Gordon, Carnegie Mellon University Alex Smola, Yahoo |
ICSE Software Engineering | Collaborative Reliability Prediction of Service-Oriented Systems | Zibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong |
A Degree-of-Knowledge Model to Capture Source Code Familiarity | Thomas Fritz, University of British Columbia; et al. Jingwen Ou, University of British Columbia Gail C. Murphy, University of British Columbia Emerson Murphy-Hill, University of British Columbia | |
A Machine Learning Approach for Tracing Regulatory Codes to Product Specific Requirements | Jane Cleland-Huang, DePaul University; et al. Adam Czauderna, DePaul University John Emenecker, DePaul University Marek Gibiec, DePaul University | |
A Cut-off Approach for Bounded Verification of Parameterized Systems | Qiusong Yang & Mingshu Li, Chinese Academy of Sciences | |
Test Generation through Programming in UDITA | Milos Gligoric, University of Illinois at Urbana–Champaign; et al. Tihomir Gvero, École Polytechnique Fédérale de Lausanne Vilas Jagannath, University of Illinois at Urbana–Champaign Sarfraz Khurshid, University of Texas at Austin Viktor Kuncak, École Polytechnique Fédérale de Lausanne Darko Marinov, University of Illinois at Urbana–Champaign | |
INFOCOM Networking | On the Feasibility and Efficacy of Protection Routing in IP Networks | Kin-Wah Kwong, University of Pennsylvania; et al. Lixin Gao, University of Massachusetts Amherst Roch Guérin, University of Pennsylvania Zhi-Li Zhang, University of Minnesota |
KDD Data Mining | Connecting the dots between news articles | Dafna Shahaf & Carlos Guestrin, Carnegie Mellon University |
Large linear classification when data cannot fit in memory | Hsiang-Fu Yu, National Taiwan University; et al. Cho-Jui Hsieh, National Taiwan University Kai-Wei Chang, National Taiwan University Chih-Jen Lin, National Taiwan University | |
MOBICOM Mobile | The κ Factor: Inferring Protocol Performance UsingInter-link Reception Correlation | Kannan Srinivasan, Stanford University; et al. Mayank Jain, Stanford University Jung Il Choi, Stanford University Tahir Azim, Stanford University Edward S. Kim, University of Southern California Philip Levis, Stanford University Bhaskar Krishnamachari, University of Southern California |
NSDI Networking | Reverse traceroute | Ethan Katz-Bassett, University of Washington; et al. Harsha V. Madhyastha, University of California, San Diego Vijay Kumar Adhikari, University of Minnesota Colin Scott, University of Washington Justine Sherry, University of Washington Peter van Wesep, University of Washington Thomas Anderson, University of Washington Arvind Krishnamurthy, University of Washington |
OSDI Operating Systems | Efficient System-Enforced Deterministic Parallelism | Amittai Aviram, Yale University; et al. Shu-Chun Weng, Yale University Sen Hu, Yale University Bryan Ford, Yale University |
The Turtles Project: Design and Implementation of Nested Virtualization | Muli Ben-Yehuda, IBM; et al. Michael D. Day, IBM Zvi Dubitzky, IBM Michael Factor, IBM Nadav Har'El, IBM Abel Gordon, IBM Anthony Liguori, IBM Orit Wasserman, IBM Ben-Ami Yassour, IBM | |
PLDI Programming Languages | Safe to the Last Instruction: Automated Verification of a Type-Safe Operating System | Jean Yang, Massachusetts Institute of Technology Chris Hawblitzel, Microsoft |
PODS Databases | An Optimal Algorithm for the Distinct Elements Problem | Daniel M. Kane, Harvard University; et al. Jelani Nelson, Massachusetts Institute of Technology David P. Woodruff, IBM |
S&P Security and Privacy | SCiFI - A System for Secure Face Identification | Margarita Osadchy, University of Haifa; et al. Benny Pinkas, University of Haifa Ayman Jarrous, University of Haifa Boaz Moskovich, University of Haifa |
SIGCOMM Networking | Efficient Error Estimating Coding: Feasibility and Applications | Binbin Chen, National University of Singapore; et al. Ziling Chou, National University of Singapore Yuda Zhao, National University of Singapore Haifeng Yu, National University of Singapore |
SIGIR Information Retrieval | Assessing the Scenic Route: Measuring the Value of Search Trails in Web Logs | Ryen W. White, Microsoft Jeff Huang, University of Washington |
SIGMETRICS Performance | Load balancing via random local search in closed and open systems | Ayalvadi Ganesh, University of Bristol; et al. Sarah Lilienthal, University of Cambridge D. Manjunath, Indian Institute of Technology Kanpur Alexandre Proutière, Microsoft Florian Simatos, Inria |
SIGMOD Databases | FAST: fast architecture sensitive tree search on modern CPUs and GPUs | Changkyu Kim, Intel; et al. Jatin Chhugani, Intel Nadathur Satish, Intel Eric Sedlar, Oracle Corporation Anthony D. Nguyen, Intel Tim Kaldewey, Oracle Corporation Victor W. Lee, Intel Scott A. Brandt, University of California, Santa Cruz Pradeep Dubey, Intel |
SODA Theory | An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem | Arash Asadpour, Stanford University; et al. Michel X. Goemans, Massachusetts Institute of Technology Aleksander Mądry, Massachusetts Institute of Technology Shayan Oveis Gharan, Stanford University Amin Saberi, Stanford University |
STOC Theory | QIP = PSPACE | Rahul Jain, National University of Singapore; et al. Zhengfeng Ji, Perimeter Institute for Theoretical Physics Sarvagya Upadhyay, University of Waterloo John Watrous, University of Waterloo |
An improved LP-based approximation for steiner tree | Jaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al. Fabrizio Grandoni, Tor Vergata University of Rome Thomas Rothvoß, École Polytechnique Fédérale de Lausanne Laura Sanità, École Polytechnique Fédérale de Lausanne | |
UIST User Interface | VizWiz: nearly real-time answers to visual questions | Jeffrey P. Bigham, University of Rochester; et al. Chandrika Jayant, University of Washington Hanjie Ji, University of Rochester Greg Little, Massachusetts Institute of Technology Andrew Miller, University of Central Florida Robert C. Miller, Massachusetts Institute of Technology Robin Miller, University of Rochester Aubrey Tatarowicz, Massachusetts Institute of Technology Brandyn White, University of Maryland Samual White, University of Rochester Tom Yeh, University of Maryland |
VLDB Databases | Towards Certain Fixes with Editing Rules and Master Data | Shuai Ma, University of Edinburgh; et al. Wenfei Fan, University of Edinburgh Jianzhong Li, Harbin Institute of Technology Wenyuan Yu, University of Edinburgh Nan Tang, University of Edinburgh |
WWW World Wide Web | Factorizing personalized Markov chains for next-basket recommendation | Steffen Rendle, Osaka University; et al. Christoph Freudenthaler, University of Hildesheim Lars Schmidt-Thieme, University of Hildesheim |
2009 | ||
---|---|---|
ACL Natural Language Processing | K-Best A* Parsing | Adam Pauls & Dan Klein, University of California, Berkeley |
Reinforcement Learning for Mapping Instructions to Actions | S.R.K. Branavan, Massachusetts Institute of Technology; et al. Harr Chen, Massachusetts Institute of Technology Luke S. Zettlemoyer, Massachusetts Institute of Technology Regina Barzilay, Massachusetts Institute of Technology | |
Concise Integer Linear Programming Formulations for Dependency Parsing | André F.T. Martins, Telecommunications Institute; et al. Noah A. Smith, Carnegie Mellon University Eric P. Xing, Carnegie Mellon University | |
CHI Human-Computer Interaction | Predicting Tie Strength With Social Media | Eric Gilbert & Karrie Karahalios, University of Illinois at Urbana–Champaign |
Undo and Erase Events as Indicators of Usability Problems | David Akers, Stanford University; et al. Matthew Simpson, Google Robin Jeffries, Google Terry Winograd, Stanford University | |
From Interaction to Trajectories: Designing Coherent Journeys Through User Experiences | Steve Benford, University of Nottingham; et al. Gabriella Giannachi, University of Exeter Boriana Koleva, University of Nottingham Tom Rodden, University of Nottingham | |
Musink: Composing Music through Augmented Drawing | Theophanis Tsandilas, University of Paris-Sud; et al. Catherine Letondal, University of Paris-Sud Wendy Mackay, University of Paris-Sud | |
Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Series Visualizations | Jeffrey Heer, Stanford University; et al. Nicholas Kong, University of California, Berkeley Maneesh Agrawala, University of California, Berkeley | |
Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector Exhibits | Scott S. Snibbe, Sona Research Hayes S. Raffle, Massachusetts Institute of Technology | |
Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection Performance | Leah Findlater, University of British Columbia; et al. Karyn Moffatt, University of British Columbia Joanna McGrenere, University of British Columbia Jessica Dawson, University of British Columbia | |
CIKM Knowledge Management | On the Feasibility of Multi-Site Web Search Engines | Ricardo Baeza-Yates, Yahoo; et al. Aristides Gionis, Yahoo Flavio Junqueira, Yahoo Vassilis Plachouras, Yahoo Luca Telloli, Yahoo |
CVPR Computer Vision | Single Image Haze Removal Using Dark Channel Prior | Kaiming He, The Chinese University of Hong Kong; et al. Jian Sun, Microsoft Xiaoou Tang, The Chinese University of Hong Kong |
FSE Software Engineering | Asserting and checking determinism for multithreaded programs | Jacob Burnim & Koushik Sen, University of California, Berkeley |
Darwin: an approach for debugging evolving programs | Dawei Qi, National University of Singapore; et al. Abhik Roychoudhury, National University of Singapore Zhenkai Liang, National University of Singapore Kapil Vaswani, Microsoft | |
Graph-based Mining of Multiple Object Usage Patterns | Tung Thanh Nguyen, Iowa State University; et al. Hoan Anh Nguyen, Iowa State University Nam H. Pham, Iowa State University Jafar M. Al-Kofahi, Iowa State University Tien N. Nguyen, Iowa State University | |
ICCV Computer Vision | Discriminative models for multi-class object layout | Chaitanya Desai, University of California, Irvine; et al. Deva Ramanan, University of California, Irvine Charless Fowlkes, University of California, Irvine |
ICML Machine Learning | Structure preserving embedding | Blake Shaw & Tony Jebara, Columbia University |
ICSE Software Engineering | Effective Static Deadlock Detection | Mayur Naik, Intel; et al. Chang-Seo Park, University of California, Berkeley Koushik Sen, University of California, Berkeley David Gay, Intel |
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows Vista | Christian Bird, University of California, Davis; et al. Nachiappan Nagappan, Microsoft Premkumar Devanbu, University of California, Davis Harald Gall, University of Zurich Brendan Murphy, Microsoft | |
How We Refactor, and How We Know It | Emerson Murphy-Hill, Portland State University; et al. Chris Parnin, Georgia Institute of Technology Andrew P. Black, Portland State University | |
Automatically finding patches using genetic programming | Westley Weimer, University of Virginia; et al. ThanhVu Nguyen, University of New Mexico Claire Le Goues, University of Virginia Stephanie Forrest, University of New Mexico | |
Invariant-Based Automatic Testing of AJAX User Interfaces | Ali Mesbah & Arie van Deursen, Delft University of Technology | |
IJCAI Artificial Intelligence | Learning Conditional Preference Networks with Queries | Frederic Koriche, Montpellier 2 University Bruno Zanuttini, Université de Caen Basse-Normandie |
Consequence-Driven Reasoning for Horn SHIQ Ontologies | Yevgeny Kazakov, University of Oxford | |
INFOCOM Networking | Queuing Network Models for Multi-Channel P2P Live Streaming Systems | Di Wu, New York University Tandon School of Engineering; et al. Yong Liu, New York University Tandon School of Engineering Keith W. Ross, New York University Tandon School of Engineering |
KDD Data Mining | Collaborative Filtering with Temporal Dynamics | Yehuda Koren, Yahoo |
MOBICOM Mobile | CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data Path | Vivek Shrivastava, University of Wisconsin–Madison; et al. Nabeel Ahmed, University of Waterloo Shravan Rayanchu, University of Wisconsin–Madison Suman Banerjee, University of Wisconsin–Madison Srinivasan Keshav, University of Waterloo Konstantina Papagiannaki, Intel Arunesh Mishra, Google |
NSDI Networking | TrInc: Small Trusted Hardware for Large Distributed Systems | Dave Levin, University of Maryland; et al. John R. Douceur, Microsoft Jacob R. Lorch, Microsoft Thomas Moscibroda, Microsoft |
Sora: High Performance Software Radio Using General Purpose Multi-core Processors | Kun Tan, Microsoft; et al. Jiansong Zhang, Microsoft Ji Fang, Beijing Jiaotong University He Liu, Tsinghua University Yusheng Ye, Tsinghua University Shen Wang, Tsinghua University Yongguang Zhang, Microsoft Haitao Wu, Microsoft Wei Wang, Microsoft Geoffrey M. Voelker, University of California, San Diego | |
PLDI Programming Languages | Binary Analysis for Measurement and Attribution of Program Performance | Nathan Tallent, Rice University; et al. John Mellor-Crummey, Rice University Michael Fagan, Rice University |
PODS Databases | Size and Treewidth Bounds for Conjunctive Queries | Georg Gottlob, University of Oxford; et al. Stephanie Lee, University of Oxford Gregory Valient, University of California, Berkeley |
S&P Security and Privacy | Native Client: A Sandbox for Portable, Untrusted x86 Native Code | Bennet Yee, Google; et al. David Sehr, Google Gregory Dardyk, Google Bradley Chen, Google Robert Muth, Google Tavis Ormandy, Google Shiki Okasaka, Google Neha Narula, Google Nicholas Fullagar, Google |
SIGCOMM Networking | White Space Networking with Wi-Fi like Connectivity | Paramvir Bahl, Microsoft; et al. Ranveer Chandra, Microsoft Thomas Moscibroda, Microsoft Rohan Murty, Harvard University Matt Welsh, Harvard University |
SIGIR Information Retrieval | Sources of evidence for vertical selection | Jaime Arguello, Carnegie Mellon University; et al. Fernando Diaz, Yahoo Jamie Callan, Carnegie Mellon University Jean-Francois Crespo, Yahoo |
SIGMETRICS Performance | The Age of Gossip: Spatial Mean Field Regime | Augustin Chaintreau, Technicolor; et al. Jean-Yves Le Boudec, École Polytechnique Fédérale de Lausanne Nikodin Ristanovic, École Polytechnique Fédérale de Lausanne |
SIGMOD Databases | Generating example data for dataflow programs | Christopher Olston, Yahoo; et al. Shubham Chopra, Yahoo Utkarsh Srivastava, Yahoo |
SODA Theory | Natural Algorithms | Bernard Chazelle, Princeton University |
SOSP Operating Systems | FAWN: A Fast Array of Wimpy Nodes | David G. Andersen, Carnegie Mellon University; et al. Jason Franklin, Carnegie Mellon University Michael Kaminsky, Intel Amar Phanishayee, Carnegie Mellon University Lawrence Tan, Carnegie Mellon University Vijay Vasudevan, Carnegie Mellon University |
RouteBricks: Exploiting Parallelism to Scale Software Routers | Mihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al. Norbert Egi, University of Lancaster Katerina Argyraki, École Polytechnique Fédérale de Lausanne Byung-Gon Chun, Intel Kevin Fall, Intel Gianluca Iannaccone, Intel Allan Knies, Intel Maziar Manesh, Intel Sylvia Ratnasamy, Intel | |
seL4: Formal Verification of an OS Kernel | Gerwin Klein, National ICT Australia; et al. Kevin Elphinstone, National ICT Australia Gernot Heiser, National ICT Australia June Andronick, National ICT Australia David Cock, National ICT Australia Philip Derrin, National ICT Australia Dhammika Elkaduwe, National ICT Australia Kai Engelhardt, National ICT Australia Rafal Kolanski, National ICT Australia Michael Norrish, National ICT Australia Thomas Sewell, National ICT Australia Harvey Tuch, National ICT Australia Simon Winwood, National ICT Australia | |
STOC Theory | A constructive proof of the Lovász local lemma | Robin A. Moser, ETH Zurich |
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem | Chris Peikert, SRI International | |
UIST User Interface | Mouse 2.0: Multi-touch meets the Mouse | Nicolas Villar, Microsoft; et al. Shahram Izadi, Microsoft Dan Rosenfeld, Microsoft Hrvoje Benko, Microsoft John Helmes, Microsoft Jonathan Westhues, Microsoft Steve Hodges, Microsoft Eyal Ofek, Microsoft Alex Butler, Microsoft Xiang Cao, Microsoft Billy Chen, Microsoft |
VLDB Databases | A Unified Approach to Ranking in Probabilistic Databases | Jian Li, University of Maryland; et al. Barna Saha, University of Maryland Amol Deshpande, University of Maryland |
WWW World Wide Web | Hybrid keyword search auctions | Ashish Goel, Stanford University Kamesh Munagala, Duke University |
2008 | ||
---|---|---|
AAAI Artificial Intelligence | Optimal False-Name-Proof Voting Rules with Costly Voting | Liad Wagman & Vincent Conitzer, Duke University |
How Good is Almost Perfect? | Malte Helmert & Gabriele Röger, University of Freiburg | |
ACL Natural Language Processing | A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language Model | Libin Shen, BBN Technologies; et al. Jinxi Xu, BBN Technologies Ralph Weischedel, BBN Technologies |
Forest Reranking: Discriminative Parsing with Non-Local Features | Liang Huang, University of Pennsylvania | |
CHI Human-Computer Interaction | An Error Model for Pointing Based on Fitts' Law | Jacob Wobbrock, University of Washington; et al. Edward Cutrell, Microsoft Susumu Harada, University of Washington I. Scott MacKenzie, University of York |
Designs on Dignity: Perceptions of Technology Among the Homeless | Christopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology | |
Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Interfaces | Krzysztof Z. Gajos, University of Washington; et al. Jacob Wobbrock, University of Washington Daniel S. Weld, University of Washington | |
In-Car GPS Navigation: Engagement with and Disengagement from the Environment | Gilly Leshed, Cornell University; et al. Theresa Velden, Cornell University Oya Rieger, Cornell University Blazej Kot, Cornell University Phoebe Sengers, Cornell University | |
Large Scale Analysis of Web Revisitation Patterns | Eytan Adar, University of Washington; et al. Jaime Teevan, Microsoft Susan T. Dumais, Microsoft | |
Multimodal collaborative handwriting training for visually-impaired people | Beryl Plimmer, University of Auckland; et al. Andrew Crossan, University of Glasgow Stephen A. Brewster, University of Glasgow Rachel Blagojevic, University of Auckland | |
The Network in the Garden: An Empirical Analysis of Social Media in Rural Life | Eric Gilbert, University of Illinois at Urbana–Champaign; et al. Karrie Karahalios, University of Illinois at Urbana–Champaign Christian Sandvig, University of Illinois at Urbana–Champaign | |
CIKM Knowledge Management | Learning to Link with Wikipedia | David Milne & Ian H. Witten, University of Waikato |
CVPR Computer Vision | Beyond Sliding Windows: Object Localization by Efficient Subwindow Search | Chistoph H. Lampert, Max Planck Institute for Biological Cybernetics; et al. Matthew B. Blaschko, Max Planck Institute for Biological Cybernetics Thomas Hodmann, Google |
Global Stereo Reconstruction under Second Order Smoothness Priors | Oliver Woodford, University of Oxford; et al. Ian Reid, Oxford Brookes University Philip Torr, University of Oxford Andrew Fitzgibbon, Microsoft | |
FOCS Theory | Two Query PCP with Sub-Constant Error | Dana Moshkovitz & Ran Raz, Weizmann Institute of Science |
FSE Software Engineering | Efficient online monitoring of web-service SLAs | Franco Raimondi, University College London; et al. James Skene, University College London Wolfgang Emmerich, University College London |
What makes a good bug report? | Nicolas Bettenburg, Saarland University; et al. Sascha Just, Saarland University Adrian Schröter, University of Victoria Cathrin Weiss, University of Zurich Rahul Premraj, Saarland University Thomas Zimmermann, University of Calgary | |
ICML Machine Learning | SVM Optimization: Inverse Dependence on Training Set Size | Shai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago |
ICSE Software Engineering | Recommending adaptive changes for framework evolution | Barthélémy Dagenais & Martin P. Robillard, McGill University |
Precise memory leak detection for java software using container profiling | Guoqing Xu & Atanas Rountev, Ohio State University | |
Debugging Reinvented: Asking and Answering Why and Why Not Questions about Program Behavior | Andrew J. Ko & Brad A. Myers, Carnegie Mellon University | |
The Effect of Program and Model Structure on MC/DC Test Adequacy Coverage | Ajitha Rajan, University of Minnesota; et al. Michael W. Whalen, Rockwell Collins Mats P.E. Heimdahl, University of Minnesota | |
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental Approach | Joseph Ruthruff, University of Nebraska–Lincoln; et al. John Penix, Google J. David Morgenthaler, Google Sebastian Elbaum, University of Nebraska–Lincoln Gregg Rothermel, University of Nebraska–Lincoln | |
INFOCOM Networking | Theoretical Results on Base Station Movement Problem for Sensor Networks | Yi Shi & Y. Thomas Hou, Virginia Tech |
On the Feasibility of the Link Abstraction in (Rural) Mesh Networks | Dattatraya Gokhal, Indian Navy; et al. Sayandeep Sen, University of Wisconsin–Madison Kameswari Chebrolu, Indian Institute of Technology Kanpur Bhaskaran Rama, Indian Institute of Technology Kanpur | |
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks | Changhee Joo, Ohio State University; et al. Xiaojun Lin, Purdue University Ness B. Shroff, Ohio State University | |
KDD Data Mining | Fastanova: an efficient algorithm for genome-wide association study | Xiang Zhang, University of North Carolina at Chapel Hill; et al. Fei Zou, University of North Carolina at Chapel Hill Wei Wang, University of North Carolina at Chapel Hill |
MOBICOM Mobile | Assessment of Urban-Scale Wireless Networks with a Small Number of Measurements | Joshua Robinson, Rice University; et al. Ram Swaminathan, Hewlett Packard Edward W. Knightly, Rice University |
NSDI Networking | Remus: High Availability via Asynchronous Virtual Machine Replication | Brendan Cully, University of British Columbia; et al. Geoffrey Lefebvre, University of British Columbia Dutch Meyer, University of British Columbia Mike Feeley, University of British Columbia Norm Hutchinson, University of British Columbia Andrew Warfield, University of British Columbia |
Consensus Routing: The Internet as a Distributed System | John P. John, University of Washington; et al. Ethan Katz-Bassett, University of Washington Arvind Krishnamurthy, University of Washington Thomas Anderson, University of Washington Arun Venkataramani, University of Massachusetts Amherst | |
OSDI Operating Systems | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs | Cristian Cadar, Stanford University; et al. Daniel Dunbar, Stanford University Dawson Engler, Stanford University |
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language | Yuan Yu, Microsoft; et al. Michael Isard, Microsoft Dennis Fetterly, Microsoft Mihai Budiu, Microsoft Úlfar Erlingsson, Microsoft Pradeep Kumar Gunda, Microsoft Jon Currey, Microsoft | |
Difference Engine: Harnessing Memory Redundancy in Virtual Machines | Diwaker Gupta, University of California, San Diego; et al. Sangmin Lee, University of Texas at Austin Michael Vrable, University of California, San Diego Stefan Savage, University of California, San Diego Alex C. Snoeren, University of California, San Diego George Varghese, University of California, San Diego Geoffrey M. Voelker, University of California, San Diego Amin Vahdat, University of California, San Diego | |
PODS Databases | Estimating PageRank on Graph Streams | Atish Das Sarma, Georgia Institute of Technology; et al. Sreenivas Gollapudi, Microsoft Rina Panigrahy, Microsoft |
S&P Security and Privacy | Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses | Daniel Halperin, University of Washington; et al. Thomas S. Heydt-Benjamin, University of Massachusetts Amherst Benjamin Ransford, University of Massachusetts Amherst Shane S. Clark, University of Massachusetts Amherst Benessa Defend, University of Massachusetts Amherst Will Morgan, University of Massachusetts Amherst Kevin Fu, University of Massachusetts Amherst Tadayoshi Kohno, University of Washington William H. Maisel, Harvard University |
SIGCOMM Networking | ZigZag Decoding: Combating Hidden Terminals in Wireless Networks | Shyamnath Gollakota & Dina Katabi, Massachusetts Institute of Technology |
SIGIR Information Retrieval | Algorithmic Mediation for Collaborative Exploratory Search | Jeremy Pickens, FX Palo Alto Lab; et al. Gene Golovchinsky, FX Palo Alto Lab Chirag Shah, University of North Carolina at Chapel Hill Pernilla Qvarfordt, FX Palo Alto Lab Maribeth Back, FX Palo Alto Lab |
SIGMETRICS Performance | Counter Braids: A Novel Counter Architecture for Per-Flow Measurement | Yi Lu, Stanford University; et al. Andrea Montanari, Stanford University Balaji Prabhakar, Stanford University Sarang Dharmapurikar, Cisco Systems Abdul Kabbani, Stanford University |
SIGMOD Databases | Serializable isolation for snapshot databases | Michael J. Cahill, University of Sydney; et al. Uwe Röhm, University of Sydney Alan D. Fekete, University of Sydney |
Scalable Network Distance Browsing in Spatial Databases | Hanan Samet, University of Maryland; et al. Jagan Sankaranarayanan, University of Maryland Houman Alborzi, University of Maryland | |
STOC Theory | Optimal hierarchical decompositions for congestion minimization in networks | Harald Räcke, University of Warwick |
Optimal algorithms and inapproximability results for every CSP? | Prasad Raghavendra, University of Washington | |
UIST User Interface | Bringing Physics to the Surface | Andrew D. Wilson, Microsoft; et al. Shahram Izadi, Microsoft Otmar Hilliges, Microsoft Armando Garcia-Mendoza, Microsoft David Kirk, Microsoft |
VLDB Databases | Finding Frequent Items in Data Streams | Graham Cormode & Marios Hadjieleftheriou, AT&T Laboratories |
Constrained Physical Design Tuning | Nicolas Bruno & Surajit Chaudhuri, Microsoft | |
WWW World Wide Web | IRLbot: Scaling to 6 billion pages and beyond | Hsin-Tsang Lee, Texas A&M University; et al. Derek Leonard, Texas A&M University Xiaoming Wang, Texas A&M University Dmitri Loguinov, Texas A&M University |
2007 | ||
---|---|---|
AAAI Artificial Intelligence | PLOW: A Collaborative Task Learning Agent | James Allen, Florida Institute for Human and Machine Cognition; et al. Nathanael Chambers, Stanford University George Ferguson, University of Rochester Lucian Galescu, Florida Institute for Human and Machine Cognition Hyuckchul Jung, Florida Institute for Human and Machine Cognition Mary Swift, University of Rochester William Taysom, Florida Institute for Human and Machine Cognition |
Thresholded Rewards: Acting Optimally in Timed, Zero-Sum Games | Colin McMillen & Manuela Veloso, Carnegie Mellon University | |
ACL Natural Language Processing | Learning synchronous grammars for semantic parsing with lambda calculus | Yuk Wah Wong & Raymond J. Mooney, University of Texas at Austin |
CHI Human-Computer Interaction | Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognition | Björn Hartmann, Stanford University; et al. Leith Abdulla, Stanford University Manas Mittal, Massachusetts Institute of Technology Scott R. Klemmer, Stanford University |
Consuming video on Mobile devices | Kenton O'Hara, Hewlett Packard; et al. April Slayden Mitchell, Hewlett Packard Alex Vorbau, Hewlett Packard | |
Multiview: improving trust in group video conferencing through spatial faithfulness | David T. Nguyen & John Canny, University of California, Berkeley | |
Shift: a technique for operating pen-based interfaces using touch | Daniel Vogel, University of Toronto Patrick Baudisch, Microsoft | |
Software or wetware?: discovering when and why people use digital prosthetic memory | Vaiva Kalnikaité & Steve Whittaker, University of Sheffield | |
Sustainable interaction design: invention & disposal, renewal & reuse | Eli Blevis, Indiana University Bloomington | |
CIKM Knowledge Management | Autonomously Semantifying Wikipedia | Fei Wu & Daniel S. Weld, University of Washington |
CVPR Computer Vision | Dynamic 3D Scene Analysis from a Moving Vehicle | Bastian Leibe, ETH Zurich; et al. Nico Cornelis, Katholieke Universiteit Leuven Kurt COrnelis, Katholieke Universiteit Leuven Luc Van Gool, ETH Zurich |
FOCS Theory | Space-Efficient Identity Based Encryption Without Pairings | Dan Boneh, Stanford University; et al. Craig Gentry, Stanford University Michael Hamburg, Stanford University |
FSE Software Engineering | Globally distributed software development project performance: an empirical analysis | Narayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University |
Mining specifications of malicious behavior | Mihai Christodorescu, University of Wisconsin–Madison; et al. Somesh Jha, University of Wisconsin–Madison Christopher Kruegel, TU Wien | |
Automatic consistency assessment for query results in dynamic environments | Jamie Payton, University of North Carolina at Charlotte; et al. Christine Julien, University of Texas at Austin Gruia-Catalin Roman, Washington University in St. Louis | |
Object and reference immutability using Java generics | Yoav Zibin, Massachusetts Institute of Technology; et al. Alex Potanin, Victoria University of Wellington Mahmood Ali, Massachusetts Institute of Technology Shay Artzi, Massachusetts Institute of Technology Adam Kieżun, Massachusetts Institute of Technology Michael D. Ernst, Massachusetts Institute of Technology | |
ICCV Computer Vision | Population Shape Regression From Random Design Data | Bradley Davis, University of North Carolina at Chapel Hill; et al. P. Thomas Fletcher, University of Utah Elizabeth Bullitt, University of North Carolina at Chapel Hill Sarang Joshi, University of Utah |
ICML Machine Learning | Information-theoretic metric learning | Jason V. Davis, University of Texas at Austin; et al. Brian Kulis, University of Texas at Austin Prateek Jain, University of Texas at Austin Suvrit Sra, University of Texas at Austin Inderjit S. Dhillon, University of Texas at Austin |
ICSE Software Engineering | Tracking Code Clones in Evolving Software | Ekwa Duala-Ekoko & Martin P. Robillard, McGill University |
Predicting Faults from Cached History | Sunghun Kim, Massachusetts Institute of Technology; et al. Thomas Zimmermann, Saarland University E. James Whitehead Jr., University of California, Santa Cruz Andreas Zeller, Saarland University | |
Matching and Merging of Statecharts Specifications | Shiva Nejati, University of Toronto; et al. Mehrdad Sabetzadeh, University of Toronto Marsha Chechik, University of Toronto Steve Easterbrook, University of Toronto Pamela Zave, AT&T Laboratories | |
Refactoring for Parameterizing Java Classes | Adam Kiezun, Massachusetts Institute of Technology; et al. Michael D. Ernst, Massachusetts Institute of Technology Frank Tip, IBM Robert M. Fuhrer, IBM | |
IJCAI Artificial Intelligence | Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian Networks | Maleeha Qazi, Siemens; et al. Glenn Fung, Siemens Sriram Krishnan, Siemens Romer Rosales, Siemens Harald Steck, Siemens R. Bharat Rao, Siemens Don Polderman, Erasmus MC Dhanalakshmi Chandrasekaran, Independent Researcher |
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Programs | Luc Mercier & Pascal Van Hentenryck, Brown University | |
Building Structure into Local Search for SAT | Duc Nghia Pham, Griffith University; et al. John Thornton, Griffith University Abdul Sattar, Griffith University | |
INFOCOM Networking | Disruption free topology reconfiguration in OSPF networks | Pierre Francois, Université catholique de Louvain; et al. Mike Shand, Cisco Systems Olicier Bonaventure, Université catholique de Louvain |
KDD Data Mining | Predictive discrete latent factor models for large scale dyadic data | Deepak Agarwal & Srujana Merugu, Yahoo |
NSDI Networking | Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems Code | Charles Killian, University of California, San Diego; et al. James W. Anderson, University of California, San Diego Ranjit Jhala, University of California, San Diego Amin Vahdat, University of California, San Diego |
PLDI Programming Languages | Fault-tolerant Typed Assembly Language | Frances Perry, Princeton University; et al. Lester Mackey, Princeton University George A. Reis, Princeton University Jay Ligatti, University of South Florida David I. August, Princeton University David Walker, Princeton University |
The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of Code | Ben Hardekopf & Calvin Lin, University of Texas at Austin | |
PODS Databases | Generalized Hypertree Decompositions: NP-Hardness and Tractable Variants | Georg Gottlob, University of Oxford; et al. Zoltan Miklos, University of Oxford Thomas Schwentick, TU Dortmund |
SIGIR Information Retrieval | Studying the Use of Popular Destinations to Enhance Web Search Interaction | Ryen W. White, Microsoft; et al. Mikhail Bilenko, Microsoft Silviu Cucerzan, Microsoft |
SIGMETRICS Performance | Modeling the Relative Fitness of Storage | Michael P. Mesnier, Intel; et al. Matthew Wachs, Carnegie Mellon University Raja R. Sambasivan, Carnegie Mellon University Alice X. Zheng, Carnegie Mellon University Gregory R. Ganger, Carnegie Mellon University |
SIGMOD Databases | Compiling mappings to bridge applications and databases | Sergey Melnik, Microsoft; et al. Atul Adya, Microsoft Philip A. Bernstein, Microsoft |
Scalable Approximate Query Processing with the DBO Engine | Christopher Jermaine, University of Florida; et al. Subramanian Arumugam, University of Florida Abhijit Pol, University of Florida Alin Dobra, University of Florida | |
SOSP Operating Systems | Sinfonia: a new paradigm for building scalable distributed systems | Marcos K. Aguilera, Hewlett Packard; et al. Arif Merchant, Hewlett Packard Mehul Shah, Hewlett Packard Alistair Veitch, Hewlett Packard Christos Karamanolis, VMware Inc. |
Zyzzyva: speculative byzantine fault tolerance | Ramakrishna Kotla, University of Texas at Austin; et al. Lorenzo Alvisi, University of Texas at Austin Mike Dahlin, University of Texas at Austin Allen Clement, University of Texas at Austin Edmund Wong, University of Texas at Austin | |
Secure Web Applications via Automatic Partitioning | Stephen Chong, Cornell University; et al. Jed Liu, Cornell University Andrew C. Myers, Cornell University Xin Qi, Cornell University K. Vikram, Cornell University Lantian Zheng, Cornell University Xin Zheng, Cornell University | |
STOC Theory | Faster integer multiplication | Martin Fürer, Pennsylvania State University |
Towards 3-query locally decodable codes of subexponential length | Sergey Yekhanin, Massachusetts Institute of Technology | |
UIST User Interface | ThinSight: Versatile Multi-touch Sensing for Thin Form-factor Displays | Steve Hodges, Microsoft; et al. Shahram Izadi, Microsoft Alex Butler, Microsoft Alban Rrustemi, Microsoft Bill Buxton, Microsoft |
VLDB Databases | Scalable Semantic Web Data Management Using Vertical Partitioning | Daniel J. Abadi, Massachusetts Institute of Technology; et al. Adam Marcus, Massachusetts Institute of Technology Samuel R. Madden, Massachusetts Institute of Technology Kate Hollenbach, Massachusetts Institute of Technology |
WWW World Wide Web | Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography | Lars Backstrom, Cornell University; et al. Cynthia Dwork, Microsoft Jon Kleinberg, Cornell University |
2006 | ||
---|---|---|
AAAI Artificial Intelligence | Model Counting: A New Strategy for Obtaining Good Bounds | Carla P. Gomes, Cornell University; et al. Ashish Sabharwal, Cornell University Bart Selman, Cornell University |
Towards an Axiom System for Default Logic | Gerhard Lakemeyer, RWTH Aachen University Hector J. Levesque, University of Toronto | |
ACL Natural Language Processing | Semantic taxonomy induction from heterogenous evidence | Rion Snow, Stanford University; et al. Daniel Jurafsky, Stanford University Andrew Y. Ng, Stanford University |
CHI Human-Computer Interaction | Trackball text entry for people with motor impairments | Jacob Wobbrock & Brad Myers, Carnegie Mellon University |
Embedded phenomena: supporting science learning with classroom-sized distributed simulations | Tom Moher, University of Illinois at Chicago | |
A role for haptics in mobile interaction: initial design using a handheld tactile display prototype | Joseph Luk, University of British Columbia; et al. Jérôme Pasquero, McGill University Shannon Little, University of British Columbia Karon MacLean, University of British Columbia Vincent Lévesque, McGill University Vincent Hayward, McGill University | |
CIKM Knowledge Management | Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing Indices | Segabtian Michel, Max Planck Institute for Informatics; et al. Matthias Bender, Max Planck Institute for Informatics Nikos Ntarmos, RACTI Peter Triantafillou, RACTI Gerhard Weikum, Max Planck Institute for Informatics Christian Zimmer, Max Planck Institute for Informatics |
CVPR Computer Vision | Putting Objects in Perspective | Derek Hoiem, Carnegie Mellon University; et al. Alexei Efros, Carnegie Mellon University Martial Hebert, Carnegie Mellon University |
FOCS Theory | Settling the Complexity of 2-Player Nash Equilibrium | Xi Chen, Tsinghua University Xiaotie Deng, City University of Hong Kong |
FSE Software Engineering | Controlling factors in evaluating path-sensitive error detection techniques | Matthew B. Dwyer, University of Nebraska–Lincoln; et al. Suzette Person, University of Nebraska–Lincoln Sebastian Elbaum, University of Nebraska–Lincoln |
SYNERGY: a new algorithm for property checking | Bhargav S. Gulavani, Indian Institute of Technology Kanpur; et al. Thomas A. Henzinger, École Polytechnique Fédérale de Lausanne Yamini Kannan, Microsoft Aditya V. Nori, Microsoft Sriram K. Rajamani, Microsoft | |
ICML Machine Learning | Trading convexity for scalability | Ronan Collobert, NEC Labs America; et al. Fabian Sinz, NEC Labs America Jason Weston, NEC Labs America Léon Bottou, NEC Labs America |
ICSE Software Engineering | Model-Based Development of Dynamically Adaptive Software | Ji Zhang & Betty H.C. Cheng, Michigan State University |
Who Should Fix This Bug? | John Anvik, University of British Columbia; et al. Lyndon Hiew, University of British Columbia Gail C. Murphy, University of British Columbia | |
INFOCOM Networking | Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective | Gaurav Sharma, Purdue University; et al. Ravi Mazumdar, University of Waterloo Ness Shroff, Purdue University |
KDD Data Mining | Training linear SVMs in linear time | Thorsten Joachims, Cornell University |
NSDI Networking | Experience with an Object Reputation System for Peer-to-Peer Filesharing | Kevin Walsh & Emin Gün Sirer, Cornell University |
Availability of Multi-Object Operations | Haifeng Yu, Intel; et al. Phillip B. Gibbons, Intel Suman Nath, Microsoft | |
OSDI Operating Systems | Rethink the Sync | Edmund B. Nightingale, University of Michigan; et al. Kaushik Veeraraghavan, University of Michigan Peter M. Chen, University of Michigan Jason Flinn, University of Michigan |
Bigtable: A Distributed Storage System for Structured Data | Fay Chang, Google; et al. Jeffrey Dean, Google Sanjay Ghemawat, Google Wilson C. Hsieh, Google Deborah A. Wallach, Google Mike Burrows, Google Tushar Chandra, Google Andrew Fikes, Google Robert E. Gruber, Google | |
PODS Databases | Two-variable logic on data trees and XML reasoning | Mikolaj Bojanczyk, University of Warsaw; et al. Claire David, Paris-Sorbonne University - Paris IV Anca Muscholl, Paris-Sorbonne University - Paris IV Thomas Schwentick, TU Dortmund Luc Segoufin, Paris-Sorbonne University - Paris IV |
SIGIR Information Retrieval | Minimal Test Collections for Retrieval Evaluation | Ben Carterette, University of Massachusetts Amherst; et al. James Allan, University of Massachusetts Amherst Ramesh Sitaraman, University of Massachusetts Amherst |
SIGMETRICS Performance | Maximizing throughput in wireless networks via gossiping | Eytan Modiano, Massachusetts Institute of Technology; et al. Devavrat Shah, Massachusetts Institute of Technology Gil Zussman, Massachusetts Institute of Technology |
SIGMOD Databases | To search or to crawl?: towards a query optimizer for text-centric tasks | Panagiotis G. Ipeirotis, New York University; et al. Eugene Agichtein, Microsoft Pranay Jain, Columbia University Luis Gravano, Columbia University |
STOC Theory | The PCP theorem by gap amplification | Irit Dinur, Hebrew University of Jerusalem |
UIST User Interface | Reflective Physical Prototyping through Integrated Design, Test, and Analysis | Björn Hartmann, Stanford University; et al. Scott Klemmer, Stanford University Michael Bernstein, Stanford University Leith Abdulla, Stanford University Brandon Burr, Stanford University Avi Robinson-Mosher, Stanford University Jennifer Gee, Stanford University |
VLDB Databases | Trustworthy Keyword Search for Regulatory-Compliant Records Retention | Soumyadeb Mitra, University of Illinois at Urbana–Champaign; et al. Windsor W. Hsu, University of Illinois at Urbana–Champaign Marianne Winslett, University of Illinois at Urbana–Champaign |
WWW World Wide Web | Random Sampling from a Search Engine's Index | Ziv Bar-Yossef & Maxim Gurevich, Technion – Israel Institute of Technology |
2005 | ||
---|---|---|
AAAI Artificial Intelligence | The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic Selection | Vincent A. Cicirello, Drexel University Stephen F. Smith, Carnegie Mellon University |
ACL Natural Language Processing | A Hierarchical Phrase-Based Model for Statistical Machine Translation | David Chiang, University of Maryland |
CHI Human-Computer Interaction | The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation area | Tovi Grossman & Ravin Balakrishnan, University of Toronto |
Designing the spectator experience | Stuart Reeves, University of Nottingham; et al. Steve Benford, University of Nottingham Claire O'Malley, University of Nottingham Mike Fraser, University of Bristol | |
Examining Task Engagement in Sensor-Based Statistical Models of Human Interruptibility | James Fogarty, Carnegie Mellon University; et al. Andrew J. Ko, Carnegie Mellon University Htet Htet Aung, Carnegie Mellon University Elspeth Golden, Carnegie Mellon University Karen P. Tang, Carnegie Mellon University Scott E. Hudson, Carnegie Mellon University | |
Making space for stories: ambiguity in the design of personal communication systems | Paul M. Aoki, PARC Allison Woodruff, Intel | |
CIKM Knowledge Management | Towards Automatic Association of Relevant Unstructured Content with Structured Query Results | Prasan Roy, IBM; et al. Mukesh Mohania, IBM Bhuvan Bamba, Georgia Institute of Technology Shree Raman, University of Massachusetts Amherst |
CVPR Computer Vision | Real-Time Non-Rigid Surface Detection | Julien Pilet, École Polytechnique Fédérale de Lausanne; et al. Vincent Lepetit, École Polytechnique Fédérale de Lausanne Pascal Fua, École Polytechnique Fédérale de Lausanne |
FOCS Theory | The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type Metrics into L1 | Subhash A. Khot, Georgia Institute of Technology Nisheeth K. Vishnoi, IBM |
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time | Farzad Parvaresh & Alexander Vardy, University of California, San Diego | |
FSE Software Engineering | Automatic Generation of Suggestions for Program Investigation | Martin P. Robillard, McGill University |
Context- and path-sensitive memory leak detection | Yichen Xie & Alex Aiken, Stanford University | |
CUTE: a concolic unit testing engine for C | Koushik Sen, University of Illinois at Urbana–Champaign; et al. Darko Marinov, University of Illinois at Urbana–Champaign Gul Agha, University of Illinois at Urbana–Champaign | |
ICCV Computer Vision | Globally Optimal Estimates for Geometric Reconstruction Problems | Fredrik Kahl, Lund University Didier Henrion, Laboratory for Analysis and Architecture of Systems |
ICML Machine Learning | A support vector method for multivariate performance measures | Thorsten Joachims, Cornell University |
ICSE Software Engineering | Data Structure Repair Using Goal-Directed Reasoning | Brian Demsky & Martin Rinard, Massachusetts Institute of Technology |
Using Structural Context to Recommend Source Code Examples | Reid Holmes & Gail Murphy, University of British Columbia | |
Is Mutation an Appropriate Tool for Testing Experiments? | James Andrews, University of Western Ontario; et al. Lionel Briand, Carleton University Yvan Labiche, Carleton University | |
Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Perfective Maintenance Tasks | Andrew Ko, Carnegie Mellon University; et al. Htet Htet Aung, Carnegie Mellon University Brad Myers, Carnegie Mellon University | |
IJCAI Artificial Intelligence | Learning Coordination Classifiers | Yuhong Guo, University of Alberta; et al. Russell Greiner, University of Alberta Dale Schuurmans, University of Alberta |
Solving Checkers | Jonathan Schaeffer, University of Alberta; et al. Yngvi Bjornsson, University of Alberta Neil Burch, University of Alberta Akihiro Kishimoto, University of Alberta Martin Muller, University of Alberta Robert Lake, University of Alberta Paul Lu, University of Alberta Steve Sutphen, University of Alberta | |
A Probabilistic Model of Redundancy in Information Extraction | Doug Downey, University of Washington; et al. Oren Etzioni, University of Washington Stephen Soderland, University of Washington | |
INFOCOM Networking | Perfect Simulation and Stationarity of a Class of Mobility Models | Jean-Yves Le Boude, École Polytechnique Fédérale de Lausanne Milan Vojnović, Microsoft |
KDD Data Mining | Graphs over time: densification laws, shrinking diameters and possible explanations | Jure Leskovec, Carnegie Mellon University; et al. Jon Kleinberg, Cornell University Christos Faloutsos, Carnegie Mellon University |
NSDI Networking | Detecting BGP Configuration Faults with Static Analysis | Nick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology |
PLDI Programming Languages | Automatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the Heap | Chris Lattner & Vikram Adve, University of Illinois at Urbana–Champaign |
Programming by Sketching for Bit-Streaming Programs | Armando Solar-Lezama, University of California, Berkeley; et al. Rodric Rabbah, Massachusetts Institute of Technology Rastislav Bodik, University of California, Berkeley Kemal Ebcioğlu, IBM | |
PODS Databases | On the complexity of division and set joins in the relational algebra | Dirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum |
XML data exchange: consistency and query answering | Marcelo Arenas & Leonid Libkin, University of Toronto | |
SIGIR Information Retrieval | Learning to estimate query difficulty: including applications to missing content detection and distributed information retrieval | Elad Yom-Tov, IBM; et al. Shai Fine, IBM David Carmel, IBM Adam Darlow, IBM |
SIGMETRICS Performance | Coupon replication systems | Laurent Massoulié & Milan Vojnović, Microsoft |
SOSP Operating Systems | Rx: treating bugs as allergies - a safe method to survive software failures | Feng Qin, University of Illinois at Urbana–Champaign; et al. Joseph Tucek, University of Illinois at Urbana–Champaign Jagadeesan Sundaresan, University of Illinois at Urbana–Champaign Yuanyuan Zhou, University of Illinois at Urbana–Champaign |
BAR Tolerance for Cooperative Services | Amitanand S. Aiyer, University of Texas at Austin; et al. Lorenzo Alvisi, University of Texas at Austin Allen Clement, University of Texas at Austin Mike Dahlin, University of Texas at Austin Jean-Philippe Martin, University of Texas at Austin Carl Porth, University of Texas at Austin | |
Speculative Execution in a Distributed File System | Edmund B. Nightingale, University of Michigan; et al. Peter M. Chen, University of Michigan Jason Flinn, University of Michigan | |
Vigilante: End-to-End Containment of Internet Worms | Manuel Costa, University of Cambridge; et al. Jon Crowcroft, University of Cambridge Miguel Castro, Microsoft Antony Rowstron, Microsoft Lidong Zhou, Microsoft Lintao Zhang, Microsoft Paul Barham, Microsoft | |
STOC Theory | Undirected ST-connectivity in log-space | Omer Reingold, Weizmann Institute of Science |
UIST User Interface | Automation and Customization of Rendered Web Pages | Michael Bolin, Massachusetts Institute of Technology; et al. Matthew Webber, Massachusetts Institute of Technology Philip Rha, Massachusetts Institute of Technology Tom Wilson, Massachusetts Institute of Technology Robert C. Miller, Massachusetts Institute of Technology |
VLDB Databases | Cache-conscious Frequent Pattern Mining on a Modern Processor | Amol Ghoting, Ohio State University; et al. Gregory Buehrer, Ohio State University Srinivasan Parthasarathy, Ohio State University Daehyun Kim, Intel Anthony D. Nguyen, Intel Yen-Kuang Chen, Intel Pradeep Dubey, Intel |
WWW World Wide Web | Three-level caching for efficient query processing in large Web search engines | Xiaohui Long & Torsten Suel, New York University Tandon School of Engineering |
2004 | ||
---|---|---|
AAAI Artificial Intelligence | Learning and Inferring Transportation Routines | Lin Liao, University of Washington; et al. Dieter Fox, University of Washington Henry Kautz, University of Washington |
ACL Natural Language Processing | Finding Predominant Word Senses in Untagged Text | Diana McCarthy, University of Sussex; et al. Rob Koeling, University of Sussex Julie Weeds, University of Sussex John Carroll, University of Sussex |
CIKM Knowledge Management | Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XML | Qiankun Zhao, Nanyang Technological University; et al. Sourav S Bhowmick, Nanyang Technological University Mukesh Mohania, IBM Yahiko Kambayashi, Kyoto University |
CVPR Computer Vision | Programmable Imaging using a Digital Micromirror Array | Shree K. Nayar, Columbia University; et al. Vlad Branzoi, Columbia University Terry E. Boult, University of Colorado Boulder |
FOCS Theory | Hardness of Approximating the Shortest Vector Problem in Lattices | Subhash Khot, Georgia Institute of Technology |
Cryptography in NC0 | Benny Applebaum, Technion – Israel Institute of Technology; et al. Yuval Ishai, Technion – Israel Institute of Technology Eyal Kushilevitz, Technion – Israel Institute of Technology | |
FSE Software Engineering | A Classification System and Analysis for Aspect-Oriented Programs | Martin Rinard, Massachusetts Institute of Technology; et al. Alexandru Salcianu, Massachusetts Institute of Technology Suhabe Bugrara, Massachusetts Institute of Technology |
Reasoning about partial goal satisfaction for requirements and design engineering | Emmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain | |
ICSE Software Engineering | SNIAFL: Towards a Static Non-Interactive Approach to Feature Location | Wei Zhao, Peking University; et al. Lu Zhang, Peking University Yin Liu, Peking University Jiasu Sun, Peking University Fuqing Yang, Peking University |
An Empirical Study of Software Reuse vs. Defect-Density and Stability | Parastoo Mohagheghi, Ericsson; et al. Reidar Conradi, Norwegian University of Science and Technology Ole M. Killi, Norwegian University of Science and Technology Henrik Schwarz, Norwegian University of Science and Technology | |
Static Checking of Dynamically Generated Queries in Database Applications | Carl Gould, University of California, Davis; et al. Zhendong Su, University of California, Davis Premkumar Devanbu, University of California, Davis | |
A Tool for Writing and Debugging Algebraic Specifications | Johannes Henkel & Amer Diwan, University of Colorado Boulder | |
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized Systems | Rohit Khare & Richard N. Taylor, University of California, Irvine | |
INFOCOM Networking | Throughput-Delay Trade-Off in Wireless Networks | Abbas El Gamal, Stanford University; et al. James Mammen, Stanford University Balaji Prabhakar, Stanford University Devavrat Shah, Stanford University |
KDD Data Mining | A probabilistic framework for semi-supervised clustering | Sugato Basu, University of Texas at Austin; et al. Mikhail Bilenko, University of Texas at Austin Raymond J. Mooney, University of Texas at Austin |
NSDI Networking | Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks | Philip Levis, University of California, Berkeley; et al. Neil Patel, University of California, Berkeley David Culler, University of California, Berkeley Scott Shenker, University of California, Berkeley |
OSDI Operating Systems | Recovering Device Drivers | Michael M. Swift, University of Washington; et al. Muthukaruppan Annamalai, University of Washington Brian N. Bershad, University of Washington Henry M. Levy, University of Washington |
Using Model Checking to Find Serious File System Errors | Junfeng Yang, Stanford University; et al. Paul Twohey, Stanford University Dawson Engler, Stanford University Madanlal Musuvathi, Microsoft | |
PLDI Programming Languages | Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams | John Whaley & Monica S. Lam, Stanford University |
PODS Databases | Conditional XPath, the first order complete XPath dialect | Maarten Marx, University of Amsterdam |
SIGIR Information Retrieval | A Formal Study of Information Retrieval Heuristics | Hui Fang, University of Illinois at Urbana–Champaign; et al. Tao Tao, University of Illinois at Urbana–Champaign ChengXiang Zhai, University of Illinois at Urbana–Champaign |
SIGMETRICS Performance | On performance bounds for the integration of elastic and adaptive streaming flows | Thomas Bonald & Alexandre Proutiere, France Telecom |
SIGMOD Databases | Indexing spatio-temporal trajectories with Chebyshev polynomials | Yuhan Cai & Raymond T. Ng, University of British Columbia |
STOC Theory | Expander flows, geometric embeddings and graph partitioning | Sanjeev Arora, Princeton University; et al. Satish Rao, University of California, Berkeley Umesh Vazirani, University of California, Berkeley |
Multi-linear formulas for permanent and determinant are of super-polynomial size | Ran Raz, Weizmann Institute of Science | |
UIST User Interface | Multi-Finger Gestural Interaction with 3D Volumetric Displays | Tovi Grossman, University of Toronto; et al. Daniel Wigdor, University of Toronto Ravin Balakrishnan, University of Toronto |
CrossY: A Crossing-Based Drawing Application | Georg Apitz & François Guimbretière, University of Maryland | |
VLDB Databases | Model-Driven Data Acquisition in Sensor Networks | Amol Deshpande, University of California, Berkeley; et al. Carlos Guestrin, Intel Samuel R. Madden, Massachusetts Institute of Technology Joseph M. Hellerstein, University of California, Berkeley Wei Hong, Intel |
WWW World Wide Web | Automatic detection of fragments in dynamically generated web pages | Lakshmish Ramaswamy, Georgia Institute of Technology; et al. Arun Iyengar, IBM Ling Liu, Georgia Institute of Technology Fred Douglis, IBM |
2003 | ||
---|---|---|
ACL Natural Language Processing | Towards a Model of Face-to-Face Grounding | Yukiko I. Nakano, Research Institute of Science and Technology for Society; et al. Gabe Reinstein, Massachusetts Institute of Technology Tom Stocky, Massachusetts Institute of Technology Justine Cassell, Massachusetts Institute of Technology |
Accurate Unlexicalized Parsing | Dan Klein & Christopher D. Manning, Stanford University | |
CVPR Computer Vision | Object Class Recognition by Unsupervised Scale-Invariant Learning | Rob Fergus, University of Oxford; et al. Pietro Perona, California Institute of Technology Andrew Zisserman, University of Oxford |
FOCS Theory | On the Impossibility of Dimension Reduction in L1 | Bo Brinkman & Moses Charikar, Princeton University |
FSE Software Engineering | Predicting Problems Caused by Component Upgrades | Stephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology |
A Family of Test Adequacy Criteria for Database-Driven Applications | Gregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh | |
Eliminating redundancies with a "composition with adaptation" meta-programming technique | Stan Jarzabek, National University of Singapore Li Shubiao, Xi'an Jiaotong University | |
ICCV Computer Vision | Image-based Rendering using Image-based Priors | Andrew Fitzgibbon, University of Oxford; et al. Yonatan Wexler, Weizmann Institute of Science Andrew Zisserman, University of Oxford |
Image Parsing: Unifying Segmentation, Detection and Recognition | Zhuowen Tu, University of California, Los Angeles; et al. Xiangrong Chen, University of California, Los Angeles Alan L. Yuille, University of California, Los Angeles Song-Chun Zhu, University of California, Los Angeles | |
Detecting Pedestrians using Patterns of Motion and Appearance | Paul Viola, Microsoft; et al. Michael J. Jones, Mitsubishi Electric Research Laboratories Daniel Snow, Mitsubishi Electric Research Laboratories | |
ICSE Software Engineering | Precise Dynamic Slicing Algorithms | Xiangyu Zhang, University of Arizona; et al. Rajiv Gupta, University of Arizona Youtao Zhang, University of Arizona |
Modular Verification of Software Components in C | Sagar Chaki, Carnegie Mellon University; et al. Edmund Clarke, Carnegie Mellon University Alex Groce, Carnegie Mellon University Somesh Jha, University of Wisconsin–Madison Helmut Veith, TU Wien | |
IJCAI Artificial Intelligence | Thin Junction Tree Filters for Simultaneous Localization and Mapping | Mark A. Paskin, University of California, Berkeley |
Approximating Game-Theoretic Optimal Strategies for Full-scale Poker | Darse Billings, University of Alberta; et al. Neil Burch, University of Alberta Aaron Davidson, University of Alberta Robert Holte, University of Alberta Jonathan Schaeffer, University of Alberta Terence Schauenberg, University of Alberta Duane Szafron, University of Alberta | |
INFOCOM Networking | User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks | Sem Borst, Bell Labs |
KDD Data Mining | Maximizing the spread of influence through a social network | David Kempe, Cornell University; et al. Jon Kleinberg, Cornell University Éva Tardos, Cornell University |
PLDI Programming Languages | Automatically Proving the Correctness of Compiler Optimizations | Sorin Lerner, University of Washington; et al. Todd Millstein, University of Washington Craig Chambers, University of Washington |
PODS Databases | An Information-Theoretic Approach to Normal Forms for Relational and XML Data | Marcelo Arenas & Leonid Libkin, University of Toronto |
SIGIR Information Retrieval | Re-examining the potential effectiveness of interactive query expansion | Ian Ruthven, University of Strathclyde |
SIGMOD Databases | Spreadsheets in RDBMS for OLAP | Andrew Witkowski, Oracle Corporation; et al. Srikanth Bellakonda, Oracle Corporation Tolga Bozkaya, Oracle Corporation Gregory Dorman, Oracle Corporation Nathan Folkert, Oracle Corporation Abhinav Gupta, Oracle Corporation Lei Shen, Oracle Corporation Sankar Subramanian, Oracle Corporation |
SOSP Operating Systems | Improving the Reliability of Commodity Operating Systems | Michael M. Swift, University of Washington; et al. Brian N. Bershad, University of Washington Henry M. Levy, University of Washington |
Preserving peer replicas by rate-limited sampled voting | Petros Maniatis, Stanford University; et al. David S. H. Rosenthal, Stanford University Mema Roussopoulos, Stanford University Mary Baker, Stanford University TJ Giuli, Stanford University Yanto Muliadi, Stanford University | |
Backtracking intrusions | Samuel T. King & Peter M. Chen, University of Michigan | |
STOC Theory | Derandomizing polynomial identity tests means proving circuit lower bounds | Valentine Kabanets & Russell Impagliazzo, University of California, San Diego |
New lattice-based cryptographic constructions | Oded Regev, Tel Aviv University | |
UIST User Interface | Perceptually-Supported Image Editing of Text and Graphics | Eric Saund, PARC; et al. David Fleet, PARC Daniel Larner, PARC James Mahoney, PARC |
WWW World Wide Web | Scaling personalized web search | Glen Jeh & Jennifer Widom, Stanford University |
SemTag and seeker: bootstrapping the semantic web via automated semantic annotation | Stephen Dill, IBM; et al. Nadav Eiron, IBM David Gibson, IBM Daniel Gruhl, IBM R. Guha, IBM Anant Jhingran, IBM Tapas Kanungo, IBM Sridhar Rajagopalan, IBM Andrew Tomkins, IBM John A. Tomlin, IBM Jason Y. Zien, IBM |
2002 | ||
---|---|---|
AAAI Artificial Intelligence | On Computing All Abductive Explanations | Thomas Eiter, TU Wien Kazuhisa Makino, Osaka University |
ACL Natural Language Processing | Discriminative Training and Maximum Entropy Models for Statistical Machine Translation | Franz Josef Och & Hermann Ney, RWTH Aachen University |
FOCS Theory | Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model | Boaz Barak, Weizmann Institute of Science |
Minimizing Congestion in General Networks | Harald Räcke, University of Paderborn | |
A Dichotomy Theorem for Constraints on a Three-Element Set | Andrei A. Bulatov, University of Oxford | |
FSE Software Engineering | Isolating Cause-Effect Chains from Computer Programs | Andreas Zeller, Saarland University |
INFOCOM Networking | Priority Service and Max-Min Fairness | Peter Marbach, University of Toronto |
KDD Data Mining | Pattern discovery in sequences under a Markov assumption | Darya Chudova & Padhraic Smyth, University of California, Irvine |
OSDI Operating Systems | Memory Resource Management in VMware ESX Server | Carl A. Waldspurger, VMware Inc. |
PODS Databases | Monadic Datalog and the Expressive Power of Languages for Web Information Extraction | Georg Gottlob & Christoph Koch, TU Wien |
SIGIR Information Retrieval | Novelty and redundancy detection in adaptive filtering | Yi Zhang, Carnegie Mellon University; et al. Jamie Callan, Carnegie Mellon University Thomas Minka, Carnegie Mellon University |
UIST User Interface | Clothing Manipulation | Takeo Igarashi, University of Tokyo John F. Hughes, Brown University |
WWW World Wide Web | Abstracting application-level web security | David Scott & Richard Sharp, University of Cambridge |
2001 | ||
---|---|---|
ACL Natural Language Processing | Fast Decoding and Optimal Decoding for Machine Translation | Ulrich Germann, University of Southern California; et al. Michael Jahr, Stanford University Kevin Knight, University of Southern California Daniel Marcu, University of Southern California Kenji Yamada, University of Southern California |
Immediate-Head Parsing for Language Models | Eugene Charniak, Brown University | |
CVPR Computer Vision | Morphable 3D models from video | Matthew Brand, Mitsubishi Electric Research Laboratories |
ICCV Computer Vision | Probabilistic Tracking with Exemplars in a Metric Space | Kentaro Toyama & Andrew Blake, Microsoft |
The Space of All Stereo Images | Steven Seitz, University of Washington | |
IJCAI Artificial Intelligence | Complexity Results for Structure-Based Causality | Thomas Eiter & Thomas Lukasiewicz, TU Wien |
INFOCOM Networking | Mobility increases the capacity of ad-hoc wireless networks | Matthias Grossglauser, AT&T Laboratories David Tse, University of California, Berkeley |
KDD Data Mining | Robust space transformations for distance-based operations | Edwin M. Knorr, University of British Columbia; et al. Raymond T. Ng, University of British Columbia Ruben H. Zamar, University of British Columbia |
PODS Databases | Optimal aggregation algorithms for middleware | Ronald Fagin, IBM; et al. Amnon Lotem, University of Maryland Moni Naor, Weizmann Institute of Science |
SIGIR Information Retrieval | Temporal summaries of new topics | James Allan, University of Massachusetts Amherst; et al. Rahul Gupta, University of Massachusetts Amherst Vikas Khandelwal, University of Massachusetts Amherst |
SIGMOD Databases | Locally adaptive dimensionality reduction for indexing large time series databases | Eamonn Keogh, University of California, Irvine; et al. Kaushik Chakrabarti, University of California, Irvine Michael Pazzani, University of California, Irvine Sharad Mehrotra, University of California, Irvine |
SOSP Operating Systems | Untrusted hosts and confidentiality: secure program partitioning | Steve Zdancewic, Cornell University; et al. Lantian Zheng, Cornell University Nathaniel Nystrom, Cornell University Andrew C. Myers, Cornell University |
BASE: using abstraction to improve fault tolerance | Rodrigo Rodrigues, Massachusetts Institute of Technology; et al. Miguel Castro, Microsoft Barbara Liskov, Massachusetts Institute of Technology | |
UIST User Interface | Phidgets: Easy Development of Physical Interfaces through Physical Widgets | Saul Greenberg & Chester Fitchett, University of Calgary |
VLDB Databases | Weaving Relations for Cache Performance | Anastassia Ailamaki, Carnegie Mellon University; et al. David J. DeWitt, University of Wisconsin–Madison Mark D. Hill, University of Wisconsin–Madison Marios Skounakis, University of Wisconsin–Madison |
WWW World Wide Web | Engineering Server Driven Consistency for Large Scale Dynamic Web Services | Jian Yin, University of Texas at Austin; et al. Lorenzo Alvisi, University of Texas at Austin Mike Dahlin, University of Texas at Austin Arun Iyengar, IBM |
2000 | ||
---|---|---|
AAAI Artificial Intelligence | The Game of Hex: An Automatic Theorem-Proving Approach to Game Programming | Vadim V. Anshelevich, Vanshel Consulting |
Automatic Invention of Integer Sequences | Simon Colton, University of Edinburgh; et al. Alan Bundy, University of Edinburgh Toby Walsh, University of York | |
Statistics-Based Summarization -- Step One: Sentence Compression | Kevin Knight & Daniel Marcu, University of Southern California | |
Local Search Characteristics of Incomplete SAT Procedures | Dale Schuurmans & Finnegan Southey, University of Waterloo | |
CVPR Computer Vision | Real-Time Tracking of Non-Rigid Objects using Mean Shift | Dorin Comaniciu, Siemens; et al. Visvanathan Ramesh, Siemens Peter Meer, Rutgers University |
INFOCOM Networking | The Chaotic Nature of TCP Congestion Control | András Veres & Miklós Boda, Ericsson |
KDD Data Mining | Hancock: a language for extracting signatures from data streams | Corinna Cortes, AT&T Laboratories; et al. Kathleen Fisher, AT&T Laboratories Daryl Pregibon, AT&T Laboratories Anne Rogers, AT&T Laboratories |
OSDI Operating Systems | Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions | Dawson Engler, Stanford University; et al. Benjamin Chelf, Stanford University Andy Chou, Stanford University Seth Hallem, Stanford University |
PLDI Programming Languages | Dynamo: a transparent dynamic optimization system | Vasanth Bala, Hewlett Packard; et al. Evelyn Duesterwald, Hewlett Packard Sanjeev Banerjia, InCert |
PODS Databases | Auditing Boolean attributes | Jon Kleinberg, Cornell University; et al. Christos Papadimitriou, University of California, Berkeley Prabhakar Raghavan, IBM |
SIGIR Information Retrieval | IR evaluation methods for retrieving highly relevant documents | Kalervo Järvelin & Jaana Kekäläinen, University of Tampere |
SIGMOD Databases | XMill: an efficient compressor for XML data | Hartmut Liefke, University of Pennsylvania Dan Suciu, AT&T Laboratories |
UIST User Interface | Sensing Techniques for Mobile Interaction | Ken Hinckley, Microsoft; et al. Jeff Pierce, Microsoft Mike Sinclair, Microsoft Eric Horvitz, Microsoft |
WWW World Wide Web | Graph Structure in the Web | Andrei Broder, AltaVista; et al. Ravi Kumar, IBM Farzin Maghoul, AltaVista Prabhakar Raghavan, IBM Sridhar Rajagopalan, IBM Raymie Stata, Compaq Systems Research Center Andrew Tomkins, IBM Janet Wiener, Compaq Systems Research Center |
1999 | ||
---|---|---|
AAAI Artificial Intelligence | PROVERB: The Probabilistic Cruciverbalist | Greg A. Keim, Duke University; et al. Noam M. Shazeer, Duke University Michael L. Littman, Duke University Sushant Agarwal, Duke University Catherine M. Cheves, Duke University Joseph Fitzgerald, Duke University Jason Grosland, Duke University Fan Jiang, Duke University Shannon Pollard, Duke University Karl Weinmeister, Duke University |
ICCV Computer Vision | A Theory of Shape by Space Carving | Kiriakos Kutulakos, University of Rochester Steven Seitz, Carnegie Mellon University |
Euclidean Reconstruction and Reprojection up to Subgroups | Yi Ma, University of California, Berkeley; et al. Stefano Soatto, Washington University in St. Louis Jana Kosecka, University of California, Berkeley Shankar Sastry, University of California, Berkeley | |
ICML Machine Learning | Least-Squares Temporal Difference Learning | Justin A. Boyan, NASA |
IJCAI Artificial Intelligence | A Distributed Case-Based Reasoning Application for Engineering Sales Support | Ian Watson, University of Salford Dan Gardingen, Western Air |
Learning in Natural Language | Dan Roth, University of Illinois at Urbana–Champaign | |
INFOCOM Networking | Bandwidth Sharing: Objectives and Algorithms | Laurent Massoulié, Microsoft James Robert, France Telecom |
KDD Data Mining | MetaCost: a general method for making classifiers cost-sensitive | Pedro Domingos, Universidade Técnica de Lisboa |
OSDI Operating Systems | IO-Lite: A Unified I/O Buffering and Caching System | Vivek S. Pai, Rice University; et al. Peter Druschel, Rice University Willy Zwaenepoel, Rice University |
PLDI Programming Languages | Whole program paths | James R. Larus, Microsoft |
PODS Databases | Exact and approximate aggregation in constraint query languages | Michael Benefikt & Leonid Libkin, Bell Labs |
SIGIR Information Retrieval | Cross-language information retrieval based on parallel texts and automatic mining of parallel texts from the Web | Jian-Yun Nie, Université de Montréal; et al. Michel Simard, Université de Montréal Pierre Isabelle, Université de Montréal Richard Durand, Université de Montréal |
SIGMOD Databases | DynaMat: a dynamic view management system for data warehouses | Yannis Kotidis & Nick Roussopoulos, University of Maryland |
SOSP Operating Systems | Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail service | Yasushi Saito, University of Washington; et al. Brian N. Bershad, University of Washington Henry M. Levy, University of Washington |
Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors | Kinshuk Govil, Stanford University; et al. Dan Teodosiu, Hewlett Packard Yongqiang Huang, Stanford University Mendel Rosenblum, Stanford University | |
The Click modular router | Robert Morris, Massachusetts Institute of Technology; et al. Eddie Kohler, Massachusetts Institute of Technology John Jannotti, Massachusetts Institute of Technology M. Frans Kaashoek, Massachusetts Institute of Technology | |
Soft timers: efficient microsecond software timer support for network processing | Mohit Aron & Peter Druschel, Rice University | |
WWW World Wide Web | Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery | Soumen Chakrabarti, Indian Institute of Technology Kanpur; et al. Martin van den Berg, FX Palo Alto Lab Byron Dom, IBM |
1998 | ||
---|---|---|
AAAI Artificial Intelligence | Learning Evaluation Functions for Global Optimization and Boolean Satisfiability | Justin A. Boyan & Andrew W. Moore, Carnegie Mellon University |
The Interactive Museum Tour-Guide Robot | Wolfram Burgard, University of Bonn; et al. Armin B. Cremers, University of Bonn Dieter Fox, University of Bonn Dirk Hähnel, University of Bonn Gerhard Lakemeyer, RWTH Aachen University Dirk Schulz, University of Bonn Walter Steiner, University of Bonn Sebastian Thrun, Carnegie Mellon University | |
Acceleration Methods for Numeric CSPs | Yahia Lebbah & Olivier Lhomme, École des Mines de Nantes | |
ICCV Computer Vision | Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Parameters | Marc Pollefeys, Katholieke Universiteit Leuven; et al. Reinhard Koch, Katholieke Universiteit Leuven Luc Van Gool, Katholieke Universiteit Leuven |
The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image Sequences | Phil Torr, Microsoft; et al. Andrew Fitzgibbon, University of Oxford Andrew Zisserman, University of Oxford | |
INFOCOM Networking | Effective Bandwidths in Wireless Networks with Multiuser Receivers | David Tse, University of California, Berkeley Stephen Hanly, University of Melbourne |
KDD Data Mining | Occam's Two Razors: The Sharp and the Blunt | Pedro Domingos, Universidade Técnica de Lisboa |
PODS Databases | Expressiveness of structured document query languages based on attribute grammars | Frank Neven & Jan Van den Bussche, Limburgs Universitair Centrum |
A lower bound theorem for indexing schemes and its application to multidimensional range queries | Vasilis Samoladas & Daniel P. Miranker, University of Texas at Austin | |
SIGIR Information Retrieval | A theory of term weighting based on exploratory data analysis | Warren R. Greiff, University of Massachusetts Amherst |
SIGMOD Databases | Efficient transparent application recovery in client-server information systems | David Lomet & Gerhard Weikum, Microsoft |
Integrating association rule mining with relational database systems: alternatives and implications | Sunita Sarawagi, IBM; et al. Shiby Thomas, University of Florida Rakesh Agrawal, IBM | |
WWW World Wide Web | The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/video | Kevin C. Almeroth, University of California, Santa Barbara Mostafa H. Ammar, Georgia Institute of Technology |
1997 | ||
---|---|---|
AAAI Artificial Intelligence | Statistical Parsing with a Context-Free Grammar and Word Statistics | Eugene Charniak, Brown University |
Building Concept Representations from Reusable Components | Peter Clark, Boeing Bruce Porter, University of Texas at Austin | |
Fast Context Switching in Real-Time Propositional Reasoning | P. Pandurang Nayak & Brian C. Williams, NASA | |
A Practical Algorithm for Finding Optimal Triangulations | Krill Shoikhet & Dan Geiger, Technion – Israel Institute of Technology | |
IJCAI Artificial Intelligence | Translingual Information Retrieval: A Comparative Evaluation | Jaime G. Carbonell, Carnegie Mellon University; et al. Yiming Yang, Carnegie Mellon University Robert E. Frederking, Carnegie Mellon University Ralf D. Brown, Carnegie Mellon University Yibing Geng, Carnegie Mellon University Danny Lee, Carnegie Mellon University |
Object Identification in a Bayesian Context | Timothy Huang & Stuart Russell, University of California, Berkeley | |
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolog Cut Operator | Fangzhen Lin, Hong Kong University of Science and Technology | |
KDD Data Mining | Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions | Foster Provost & Tom Fawcett, NYNEX Science and Technology |
PODS Databases | On the Complexity of Database Queries | Christos H. Papadimitriou, University of California, Berkeley Mihalis Yannakakis, Bell Labs |
SIGIR Information Retrieval | Feature selection, perceptron learning, and a usability case study for text categorization | Hwee Tou Ng, Defence Science Organisation; et al. Wei Boon Goh, Ministry of Defence Kok Leong Low, Ministry of Defence |
SIGMOD Databases | Fast parallel similarity search in multimedia databases | Stefan Berchtold, Ludwig Maximilian University of Munich; et al. Christian Böml, Ludwig Maximilian University of Munich Bernhard Braunmüller, Ludwig Maximilian University of Munich Daniel A. Keim, Ludwig Maximilian University of Munich Hans-Peter Kriegel, Ludwig Maximilian University of Munich |
SOSP Operating Systems | Eraser: a dynamic data race detector for multithreaded programs | Stefan Savage, University of Washington; et al. Michael Burrows, Digital Equipment Corporation Greg Nelson, Digital Equipment Corporation Patrick Sobalvarro, Digital Equipment Corporation Thomas Anderson, University of California, Berkeley |
Continuous profiling: where have all the cycles gone? | Jennifer M. Anderson, Digital Equipment Corporation; et al. Lance M. Berc, Digital Equipment Corporation Jeffrey Dean, Digital Equipment Corporation Sanjay Ghemawat, Digital Equipment Corporation Monika R. Henzinger, Digital Equipment Corporation Shun-Tak A. Leung, Digital Equipment Corporation Richard L. Sites, Digital Equipment Corporation Mark T. Vandevoorde, Digital Equipment Corporation Carl A. Waldspurger, Digital Equipment Corporation William E. Weihl, Digital Equipment Corporation | |
Disco: running commodity operating systems on scalable multiprocessors | Edouard Bugnion, Stanford University; et al. Scott Devine, Stanford University Mendel Rosenblum, Stanford University | |
VLDB Databases | Integrating Reliable Memory in Databases | Wee Teck Ng & Peter M. Chen, University of Michigan |
1996 | ||
---|---|---|
AAAI Artificial Intelligence | A Novel Application of Theory Refinement to Student Modeling | Paul T. Baffes, SciComp Raymond J. Mooney, University of Texas at Austin |
Pushing the Envelope: Planning, Propositional Logic, and Stochastic Search | Henry Kautz & Bart Selman, AT&T Laboratories | |
Verification of Knowledge Bases Based on Containment Checking | Alon Y. Levy, AT&T Laboratories Marie-Christine Rousset, University of Paris-Sud | |
INFOCOM Networking | An algorithm for multicast tree generation in networks with asymmetric links | Ram Ramanathan, BBN Technologies |
OSDI Operating Systems | Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications | Todd C. Mowry, University of Toronto; et al. Angela K. Demke, University of Toronto Orran Krieger, University of Toronto |
Safe Kernel Extensions Without Run-Time Checking | George C. Necula & Peter Lee, Carnegie Mellon University | |
SIGIR Information Retrieval | Retrieving spoken documents by combining multiple index sources | Gareth Jones, University of Cambridge; et al. Jonathan Foote, University of Cambridge Karen Spärck Jones, University of Cambridge Steve Young, University of Cambridge |
SIGMETRICS Performance | Supporting stored video: reducing rate variability and end-to-end resource requirements through optimal smoothing | James D. Salehi, University of Massachusetts Amherst; et al. Zhi-Li Zhang, University of Massachusetts Amherst James F. Kurose, University of Massachusetts Amherst Don Towsley, University of Massachusetts Amherst |
Exploiting Process Lifetime Distributions for Dynamic Load Balancing | Mor Harchol-Balter & Allen B. Downey, University of California, Berkeley | |
SIGMOD Databases | Implementing data cubes efficiently | Venky Harinarayan, Stanford University; et al. Anand Rajaraman, Stanford University Jeffrey D. Ullman, Stanford University |
Fast Subsequence Matching in Time-Series Databases | Christos Faloutsos, University of Maryland; et al. M. Ranganathan, University of Maryland Yannis Manolopoulos, University of Maryland | |
UIST User Interface | Indigo: A Local Propagation Algorithm for Inequality Constraints | Alan Borning, University of Washington; et al. Richard Anderson, University of Washington Bjorn Freeman-Benson, Object Technology International |