12

Best paper awards at AAAI, ACL, CHI, CIKM, CVPR, FOCS, FSE, ICCV, ICML, ICSE, IJ...

 3 years ago
source link: https://jeffhuang.com/best_paper_awards/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Best paper awards at AAAI, ACL, CHI, CIKM, CVPR, FOCS, FSE, ICCV, ICML, ICSE, IJCAI, INFOCOM, KDD, MOBICOM, NEURIPS, NSDI, OSDI, PLDI, PODS, S&P, SIGCOMM, SIGIR, SIGMETRICS, SIGMOD, SODA, SOSP, STOC, UIST, VLDB, WWW

Best Paper Awards in Computer Science (since 1996)

By Conference:   AAAI   ACL   CHI   CIKM   CVPR   FOCS   FSE   ICCV   ICML   ICSE   IJCAI   INFOCOM   KDD   MOBICOM   NEURIPS   NSDI   OSDI   PLDI   PODS   S&P   SIGCOMM   SIGIR   SIGMETRICS   SIGMOD   SODA   SOSP   STOC   UIST   VLDB   WWW

Institutions with the most Best Papers

Much of this data was entered by hand (obtained by contacting past conference organizers, retrieving cached conference websites, and searching CVs) so please email me if you notice any errors or omissions: bestpaper-AT-jeffhuang.com. I (Jeff Huang) tried to collect best paper awards from the top-tier conferences in each area, but some conferences do not have such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award" and "outstanding paper award" are included but not "best student paper" or "best 10-year old paper" (e.g. POPL). The list of papers for years 2017 and 2018 were collected by Mingrui Ray Zhang, and the list for years 2019 and 2020 were collected by AllenAI's Semantic Scholar Team (Dawn Howell and others) with contributions from Will Gierke and Alice Marbach.

AAAI (Artificial Intelligence)2020WINOGRANDE: An Adversarial Winograd Schema Challenge at ScaleKeisuke Sakaguchi, Allen Institute for Artificial Intelligence; et al.2019How to Combine Tree-Search Methods in Reinforcement LearningYonathan Efroni, Technion – Israel Institute of Technology; et al.2018Memory-Augmented Monte Carlo Tree SearchChenjun Xiao, University of Alberta; et al.2017Label-Free Supervision of Neural Networks with Physics and Domain KnowledgeRussell Stewart & Stefano Ermon, Stanford University2016Bidirectional Search That Is Guaranteed to Meet in the MiddleRobert C. Holte, University of Alberta; et al.2015From Non-Negative to General Operator Cost PartitioningFlorian Pommerening, University of Basel; et al.2014Recovering from Selection Bias in Causal and Statistical InferenceElias Bareinboim, University of California, Los Angeles; et al.2013SMILe: Shuffled Multiple-Instance LearningGary Doran & Soumya Ray, Case Western Reserve UniversityHC-Search: Learning Heuristics and Cost Functions for Structured PredictionJanardhan Rao Doppa, Oregon State University; et al.2012Learning SVM Classifiers with Indefinite KernelsSuicheng Gu & Yuhong Guo, Temple UniversityDocument Summarization Based on Data ReconstructionZhanying He, Zhejiang University; et al.2011Complexity of and Algorithms for Borda ManipulationJessica Davies, University of Toronto; et al.Dynamic Resource Allocation in Conservation PlanningDaniel Golovin, California Institute of Technology; et al.2010A Novel Transition Based Encoding Scheme for Planning as SatisfiabilityRuoyun Huang, Washington University in St. Louis; et al.How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Ans...Giorgos Stoilos, University of Oxford; et al.2008Optimal False-Name-Proof Voting Rules with Costly VotingLiad Wagman & Vincent Conitzer, Duke UniversityHow Good is Almost Perfect?Malte Helmert & Gabriele Röger, University of Freiburg2007PLOW: A Collaborative Task Learning AgentJames Allen, Florida Institute for Human and Machine Cognition; et al.Thresholded Rewards: Acting Optimally in Timed, Zero-Sum GamesColin McMillen & Manuela Veloso, Carnegie Mellon University2006Model Counting: A New Strategy for Obtaining Good BoundsCarla P. Gomes, Cornell University; et al.Towards an Axiom System for Default LogicGerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto2005The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic SelectionVincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University2004Learning and Inferring Transportation RoutinesLin Liao, University of Washington; et al.2002On Computing All Abductive ExplanationsThomas Eiter, TU Wien
Kazuhisa Makino, Osaka University2000The Game of Hex: An Automatic Theorem-Proving Approach to Game ProgrammingVadim V. Anshelevich, Vanshel ConsultingAutomatic Invention of Integer SequencesSimon Colton, University of Edinburgh; et al.Statistics-Based Summarization -- Step One: Sentence CompressionKevin Knight & Daniel Marcu, University of Southern CaliforniaLocal Search Characteristics of Incomplete SAT ProceduresDale Schuurmans & Finnegan Southey, University of Waterloo1999PROVERB: The Probabilistic CruciverbalistGreg A. Keim, Duke University; et al.1998Learning Evaluation Functions for Global Optimization and Boolean SatisfiabilityJustin A. Boyan & Andrew W. Moore, Carnegie Mellon UniversityThe Interactive Museum Tour-Guide RobotWolfram Burgard, University of Bonn; et al.Acceleration Methods for Numeric CSPsYahia Lebbah & Olivier Lhomme, École des Mines de Nantes1997Statistical Parsing with a Context-Free Grammar and Word StatisticsEugene Charniak, Brown UniversityBuilding Concept Representations from Reusable ComponentsPeter Clark, Boeing
Bruce Porter, University of Texas at AustinFast Context Switching in Real-Time Propositional ReasoningP. Pandurang Nayak & Brian C. Williams, Ames Research CenterA Practical Algorithm for Finding Optimal TriangulationsKrill Shoikhet & Dan Geiger, Technion – Israel Institute of Technology1996A Novel Application of Theory Refinement to Student ModelingPaul T. Baffes, ScicomP
Raymond J. Mooney, University of Texas at AustinPushing the Envelope: Planning, Propositional Logic, and Stochastic SearchHenry Kautz & Bart Selman, AT&T LaboratoriesVerification of Knowledge Bases Based on Containment CheckingAlon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, University of Paris-SudACL (Natural Language Processing)2019Emotion-Cause Pair Extraction: A New Task to Emotion Analysis in TextsRui Xia & Zixiang Ding, Nanjing University of Science and Technology2018Finding syntax in human encephalography with beam searchJohn Hale, Cornell University; et al.2017Probabilistic Typology: Deep Generative Models of Vowel InventoriesRyan Cotterell & Jason Eisner, Johns Hopkins University2016Finding Non-Arbitrary Form-Meaning Systematicity Using String-Metric Learning for Kernel RegressionE. Darío Gutiérrez, University of California, Berkeley; et al.2015Learning Dynamic Feature Selection for Fast Sequential PredictionEmma Strubell, University of Massachusetts Amherst; et al.Improving Evaluation of Machine Translation Quality EstimationYvette Graham, Trinity College Dublin2014Fast and Robust Neural Network Joint Models for Statistical Machine TranslationJacob Devlin, BBN Technologies; et al.2013Grounded Language Learning from Video Described with SentencesHaonan Yu & Jeffrey Mark Siskind, Purdue University2012Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic ParsingHiroyuki Shindo, NTT Communication Science Laboratories; et al.2011Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based ProjectionsDipanjan Das, Carnegie Mellon University
Slav Petrov, Google2010Beyond NomBank: A Study of Implicit Arguments for Nominal PredicatesMatthew Gerber & Joyce Y. Chai, Michigan State University2009K-Best A* ParsingAdam Pauls & Dan Klein, University of California, BerkeleyReinforcement Learning for Mapping Instructions to ActionsS.R.K. Branavan, Massachusetts Institute of Technology; et al.Concise Integer Linear Programming Formulations for Dependency ParsingAndré F.T. Martins, Telecommunications Institute; et al.2008A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language ModelLibin Shen, BBN Technologies; et al.Forest Reranking: Discriminative Parsing with Non-Local FeaturesLiang Huang, University of Pennsylvania2007Learning synchronous grammars for semantic parsing with lambda calculusYuk Wah Wong & Raymond J. Mooney, University of Texas at Austin2006Semantic taxonomy induction from heterogenous evidenceRion Snow, Stanford University; et al.2005A Hierarchical Phrase-Based Model for Statistical Machine TranslationDavid Chiang, University of Maryland2004Finding Predominant Word Senses in Untagged TextDiana McCarthy, University of Sussex; et al.2003Towards a Model of Face-to-Face GroundingYukiko I. Nakano, Research Institute of Science and Technology for Society; et al.Accurate Unlexicalized ParsingDan Klein & Christopher D. Manning, Stanford University2002Discriminative Training and Maximum Entropy Models for Statistical Machine TranslationFranz Josef Och & Hermann Ney, RWTH Aachen University2001Fast Decoding and Optimal Decoding for Machine TranslationUlrich Germann, University of Southern California; et al.Immediate-Head Parsing for Language ModelsEugene Charniak, Brown UniversityCHI (Human-Computer Interaction)2020A Design Engineering Approach for Quantitatively Exploring Context-Aware Sentence Retrieval for No...Per Ola Kristensson, University of Cambridge; et al.Articulating Experience: Reflections from Experts Applying Micro-Phenomenology to Design Research ...Mirjana Prpa, Simon Fraser University; et al.Beyond the Prototype: Understanding the Challenge of Scaling Hardware Device ProductionRushil Khurana, Carnegie Mellon University
Steve Hodges, MicrosoftBug or Feature? Covert Impairments to Human Computer InteractionJohn V. Monaco, Naval Postgraduate SchoolCo-Designing Checklists to Understand Organizational Challenges and Opportunities around Fairness ...Michael A. Madaio, Carnegie Mellon University; et al.Color and Animation Preferences for a Light Band eHMI in Interactions Between Automated Vehicles a...Debargha Dey, Eindhoven University of Technology; et al.Connecting Distributed Families: Camera Work for Three-party Mobile Video CallsYumei Gan, The Chinese University of Hong Kong; et al.Creating Augmented and Virtual Reality Applications: Current Practices, Challenges, and Opportunit...Narges Ashtari, Simon Fraser University; et al.Critical Race Theory for HCIIhudiya Finda Ogbonnaya-Ogburu, University of Michigan; et al.Design Study "Lite" Methodology: Expediting Design Studies and Enabling the Synergy of Visualizati...Uzma Haque Syeda, Northeastern University; et al.Designing Ambient Narrative-Based Interfaces to Reflect and Motivate Physical ActivityElizabeth L. Murnane, Stanford University; et al.Designing and Evaluating Calmer, a Device for Simulating Maternal Skin-to-Skin Holding for Prematu...Sabrina Hauser, Umeå University; et al.Designing Clinical AAC Tablet Applications with Adults who have Mild Intellectual DisabilitiesRyan Colin Gibson, University of Strathclyde; et al.Designing Trans Technology: Defining Challenges and Envisioning Community-Centered SolutionsOliver L. Haimson, University of Michigan; et al.Exploring How Game Genre in Student-Designed Games Influences Computational Thinking DevelopmentGiovanni Maria Troiano, Northeastern University; et al.Isness: Using Multi-Person VR to Design Peak Mystical Type Experiences Comparable to PsychedelicsDavid R. Glowacki, University of Bristol; et al.Me vs. Super(wo)man: Effects of Customization and Identification in a VR ExergameJordan Koulouris, University of Bath; et al.Mental Models of AI Agents in a Cooperative Game SettingKaty Ilonka Gero, Columbia University; et al.MRAT: The Mixed Reality Analytics ToolkitMichael Nebeling, University of Michigan; et al.On Being Iterated: The Affective Demands of Design ParticipationPaul Dourish, University of California, Irvine; et al.PenSight: Enhanced Interaction with a Pen-Top CameraFabrice Matulic, Preferred Networds Inc; et al.ReFind: Design, Lived Experience and Ongoingness in BereavementJayne Wallace, Northumbria University; et al.Robots for Inclusive Play: Co-designing an Educational Game With Visually Impaired and Sighted Chi...Oussama Metatla, University of Bristol; et al.Techniques for Flexible Responsive Visualization DesignJane Hoffswell, University of Washington; et al.texSketch: Active Diagramming through Pen-and-Ink AnnotationsHariharan Subramonyam, University of Michigan; et al.The Role of Everyday Sounds in Advanced Dementia CareMaarten Houben, Eindhoven University of Technology; et al.Touching and Being in Touch with the Menstruating BodyNadia Campo Woytuk, Royal Institute of Technology; et al.Transparency of CHI Research Artifacts: Results of a Self-Reported SurveyChat Wacharamanotham, University of Zurich; et al.Trigeminal-based Temperature IllusionsJas Brooks, University of Chicago; et al.Wireality: Enabling Complex Tangible Geometries in Virtual Reality with Worn Multi-String HapticsCathy Fang, Carnegie Mellon University; et al.Wrex: A Unified Programming-by-Example Interaction for Synthesizing Readable Code for Data Scienti...Ian Drosos, University of California, San Diego; et al.2019"Occupational Therapy is Making": Design Iteration and Digital Fabrication in Occupational TherapyMegan Hofmann, Carnegie Mellon University; et al."I feel it is my responsibility to stream": Streaming and Engaging with Intangible Cultural Herita...Zhicong Lu, University of Toronto; et al.Guerilla Warfare and the Use of New (and Some Old) Technology: Lessons from FARC’s Armed Struggle ...Débora De Castro Leal, University of Siegen; et al.Investigating Slowness as a Frame to Design Longer-Term Experiences with Personal Data: A Field St...William Odom, Simon Fraser University; et al.Engagement with Mental Health Screening on Mobile Devices: Results from an Antenatal Feasibility S...Kevin Doherty, Trinity College Dublin; et al.Anchored Audio Sampling: A Seamless Method for Exploring Children’s Thoughts During Deployment Stu...Alexis Hiniker, University of Washington; et al.Unremarkable AI: Fitting Intelligent Decision Support into Critical, Clinical Decision-Making Proc...Qian Yang, Carnegie Mellon University; et al.Online grocery delivery services: An opportunity to address food disparities in transportation-s...Tawanna Dillahunt, University of Michigan; et al.Voice User Interfaces in Schools: Co-designing for Inclusion With Visually-Impaired and Sighted Pu...Oussama Metatla, University of Bristol; et al.Increasing the Transparency of Research Papers with Explorable Multiverse AnalysesPierre Dragicevic, Inria; et al.Geppetto: Enabling Semantic Design of Expressive Robot BehaviorsRuta Desai, Carnegie Mellon University; et al.Project Sidewalk: A Web-based Crowdsourcing Tool for Collecting Sidewalk Accessibility Data At ScaleManaswi Saha, University of Washington; et al.Touchstone2: An Interactive Environment for Exploring Trade-offs in HCI Experiment DesignAlexander Eiselmayer, University of Zurich; et al.AffinityLens: Data-Assisted Affinity Diagramming with Augmented RealityHariharan Subramonyam, University of Michigan; et al.A Translational Science Model for HCILucas Colusso, University of Washington; et al.A Tale of Two Perspectives: A Conceptual Framework of User Expectations and Experiences of Instruc...Ahed Aladwan, University of Melbourne; et al.Street-Level Algorithms: A Theory At The Gaps Between Policy and DecisionsAli Alkhatib & Michael Bernstein, Stanford UniversityRisk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens S...Karla A. Badillo-Urquiola, University of Central Florida; et al.Protection, Productivity and Pleasure in the Smart Home: Emerging Expectations and Gendered Insigh...Yolande A. A. Strengers, Monash University; et al.Detecting Personality Traits Using Eye-Tracking DataShlomo Berkovsky, Trustworthy Systems; et al.ReType: Quick Text Editing with Keyboard and GazeShyamli Sindhwani, University of Auckland; et al.Data is Personal: Attitudes and Perceptions of Data Visualization in Rural PennsylvaniaShyamli Sindhwani, University of Auckland; et al.PicMe: Interactive Visual Guidance for Taking Requested Photo CompositionMinju Kim, KAIST
Jungjin Lee, KAI IncManaging Messes in Computational NotebooksAndrew Head, University of California, Berkeley; et al.A Framework for the Experience of Meaning in Human-Computer InteractionElisa D Mekler, Aalto University
Kasper Hornbæk, University of CopenhagenManagerial Visions: Stories of Upgrading and Maintaining the Public Restroom with IoTSarah E. Fox, University of California, San Diego; et al.Social Play in an Exergame: How the Need to Belong Predicts AdherenceMaximus D Kaos, Queen's University & Aalto University; et al.'Think secure from the beginning': A Survey with Software DevelopersHala Assal & Sonia Chiasson, Carleton University"They Don't Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South AsiaNithya Sambasivan, Google; et al.2018Agile 3D Sketching with Air ScaffoldingYongkwan Kim, KAIST; et al.Pinpointing: Precise Head- and Eye-Based Target Selection for Augmented RealityMikko Kytö, Aalto University; et al.Data Illustrator: Augmenting Vector Design Tools with Lazy Data Binding for Expressive Visualizati...Zhicheng Liu, Adobe; et al.“A Stalker's Paradise”: How Intimate Partner Abusers Exploit TechnologyDiana Freed, Cornell Tech; et al.Keeping a Low Profile? Technology, Risk and Privacy among Undocumented ImmigrantsTamy Guberek, University of Michigan; et al.Streets for People: Engaging Children in Placemaking Through a Socio-technical ProcessSean Peacock, Newcastle University; et al.Addressing Age-Related Bias in Sentiment AnalysisMark Diaz, Northwestern University; et al.From Her Story, to Our Story: Digital Storytelling as Public Engagement around Abortion Rights Adv...Lydia Michie, Newcastle University; et al.Gender Recognition or Gender Reductionism?: The Social Implications of Embedded Gender Recognition...Foad Hamidi, University of Maryland; et al.How Relevant are Incidental Power Poses for HCI?Yvonne Jansen, Sorbonne University
Kasper Hornbæk, University of CopenhagenVoice Interfaces in Everyday LifeMartin Porcheron, University of Nottingham; et al.Examining Wikipedia With a Broader Lens: Quantifying the Value of Wikipedia's Relationships with O...Nicholas Vincent, Northwestern University; et al.Let's Talk About Race: Identity, Chatbots, and AIAri Schlesinger, Georgia Institute of Technology; et al.Semi-Automated Coding for Qualitative Research: A User-Centered Inquiry and Initial PrototypesMegh Marathe & Kentaro Toyama, University of MichiganWall++: Room-Scale Interactive and Context-Aware SensingYang Zhang, Carnegie Mellon University; et al.HARK No More: On the Preregistration of CHI ExperimentsAndy Cockburn, University of Canterbury; et al.Making as Expression: Informing Design with People with Complex Communication Needs through Art Th...Amanda Lazar, University of Maryland; et al.Expressive Time Series Querying with Hand-Drawn Scale-Free SketchesMiro Mannino & Azza Abouzied, New York UniversityProject Zanzibar: A Portable and Flexible Tangible Interaction PlatformNicolas Villar, Microsoft; et al.Experiencing the Body as PlayFlorian 'Floyd' Mueller, RMIT University; et al.Making Core Memory: Design Inquiry into Gendered Legacies of Engineering and CraftworkDaniela K. Rosner, University of Washington; et al.Design for Collaborative Survival: An Inquiry into Human-Fungi RelationshipsJen Liu, University of Colorado Boulder; et al.Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in ...Sharifa Sultana, Cornell University; et al.Hoarding and Minimalism: Tendencies in Digital Data PreservationFrancesco Vitale, University of British Columbia; et al.Extending Manual Drawing Practices with Artist-Centric Programming ToolsJennifer, Jacobs Massachusetts Institute of Technology; et al.2017Kinecting with Orangutans: Zoo Visitors' Empathetic Responses to Animals' Use of Interactive Techn...Sarah Webber, University of Melbourne; et al.Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing,...Viirj Kan, Massachusetts Institute of Technology; et al.Understanding Public Evaluation: Quantifying Experimenter InterventionJulie R. Williamson & John Williamson, University of GlasgowDesigning Gamified Applications that Make Safe Driving More EngagingFabius Steinberger, Queensland University of Technology; et al.Illumination Aesthetics: Light as a Creative Material within Computational DesignCesar Torres, University of California, Berkeley; et al.Empowered participation: How Citizens Use Technology in Local GovernanceSheena Erete, DePaul University
Jennifer O. Burrell, MadX LLCStories from Survivors: Privacy & Security Practices when Coping with Intimate Partner AbuseTara Matthews, Google; et al.ShareVR: Enabling Co-Located Experiences for Virtual Reality between HMD and Non-HMD UsersJan Gugenheimer, University of Ulm; et al.Examining Menstrual Tracking to Inform the Design of Personal Informatics ToolsDaniel A. Epstein, University of Washington; et al.Explaining the Gap: Visualizing One's Predictions Improves Recall and Comprehension of DataYea-Seul Kim, University of Washington; et al.mHealth for Maternal Mental Health: Everyday Wisdom in Ethical DesignMarguerite Barry, Trinity College Dublin; et al.A Critical Lens on Dementia and Design in HCIAmanda Lazar, Northwestern University; et al.What Is Interaction?Kasper Hornbæk, University of Copenhagen
Antti Oulasvirta, Aalto UniversityBIGnav: Bayesian Information Gain for Guiding Multiscale NavigationWanyu Liu, University of Paris-Saclay; et al.Modelling Learning of New Keyboard LayoutsJussi P. P. Jokinen, Aalto University; et al.Flash Organizations: Crowdsourcing Complex Work by Structuring Crowds As OrganizationsMelissa A. Valentine, Stanford University; et al.Reflective Practicum: A Framework of Sensitising Concepts to Design for Transformative ReflectionPetr Slovák, TU Wien; et al.Fingertip Tactile Devices for Virtual Object Manipulation and ExplorationSamuel B. Schorr & Allison M. Okamura, Stanford UniversityWhat Can Be Predicted from Six Seconds of Driver Glances?Lex Fridman, Massachusetts Institute of Technology; et al.Design and Evaluation of a Data-Driven Password MeterBlase Ur, University of Chicago; et al.You Want Me to Work with Who?: Stakeholder Perceptions of Automated Team Formation in Project-base...Farnaz Jahanbakhsh, University of Illinois at Urbana–Champaign; et al.Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing ...Viirj Kan, Massachusetts Institute of Technology; et al.2016The Effect of Visual Appearance on the Performance of Continuous Sliders and Visual Analogue ScalesJustin Matejka, Autodesk; et al.Designing Movement-based Play With Young People Using Powered WheelchairsKathrin Gerling, University of Lincoln; et al.Object-Oriented DrawingHaijun Xia, University of Toronto; et al.Enabling Designers to Foresee Which Colors Users Cannot SeeKatharina Reinecke, University of Washington; et al.On Looking at the Vagina through LabellaTeresa Almeida, Newcastle University; et al.Project Jacquard: Interactive Digital Textiles at ScaleIvan Poupyrev, Google; et al."I don't Want to Wear a Screen": Probing Perceptions of and Possibilities for Dynamic Displays on ...Laura Devendorf, University of California, Berkeley; et al.Momentary Pleasure or Lasting Meaning?: Distinguishing Eudaimonic and Hedonic User ExperiencesElisa D. Mekler, University of Basel
Kasper Hornbæk, University of CopenhagenRapID: A Framework for Fabricating Low-Latency Interactive Objects with RFID TagsAndrew Spielberg, Massachusetts Institute of Technology; et al.HCI Research as Problem-SolvingAntti Oulasvirta, Aalto University
Kasper Hornbæk, University of CopenhagenHaptic Wave: A Cross-Modal Interface for Visually Impaired Audio ProducersAtau Tanaka & Adam Parkinson, Goldsmiths, University of LondonFlexCase: Enhancing Mobile Interaction with a Flexible Sensing and Display CoverChristian Rendl, University of Applied Sciences Upper Austria; et al.Dear Diary: Teens Reflect on Their Weekly Online Risk ExperiencesPamela Wisniewski, University of Central Florida; et al.Understanding and Mitigating the Effects of Device and Cloud Service Design Decisions on the Envir...Chris Preist, University of Bristol; et al.Enhancing Cross-Device Interaction Scripting with Interactive IllustrationsPei-Yu (Peggy) Chi, University of California, Berkeley; et al.Learn Piano with BACh: An Adaptive Learning Interface that Adjusts Task Difficulty Based on Brain ...Beste F. Yuksel, Tufts University; et al.Smart Touch: Improving Touch Accuracy for People with Motor Impairments with Template MatchingMartez E. Mott, University of Washington; et al.Building a Personalized, Auto-Calibrating Eye Tracker from User InteractionsMichael Xuelin Huang, Hong Kong Polytechnic University; et al.Developing and Validating the User Burden Scale: A Tool for Assessing User Burden in Computing Sys...Hyewon Suh, University of Washington; et al.Foraging Among an Overabundance of Similar VariantsSruti Srinivasa Ragavan, Oregon State University; et al.Finding Email in a Multi-Account, Multi-Device WorldMarta E. Cecchinato, University College London; et al.Empath: Understanding Topic Signals in Large-Scale TextEthan Fast, Stanford University; et al.Lock n' LoL: Group-based Limiting Assistance App to Mitigate Smartphone Distractions in Group Acti...Minsam Ko, KAIST; et al.2015Affordance++: Allowing Objects to Communicate Dynamic UsePedro Lopes, Hasso Plattner Institute; et al.VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keybo...Keith Vertanen, Montana Technological University; et al.What Makes Interruptions Disruptive?: A Process-Model Account of the Effects of the Problem State ...Jelmer P. Borst, University of Groningen; et al.Lightweight Relief Shearing for Enhanced Terrain Perception on Interactive MapsWesley Willett, Inria; et al.The Social Impact of a Robot Co-Worker in Industrial SettingsAllison Sauppé & Bilge Mutlu, University of Wisconsin–MadisonSangeet Swara: A Community-Moderated Voice Forum in Rural IndiaAditya Vashistha, University of Washington; et al.Understanding and Supporting Fathers and Fatherhood on Social Media SitesTawfiq Ammari & Sarita Schoenebeck, University of MichiganPatina Engraver: Visualizing Activity Logs as Patina in Fashionable TrackersMoon-Hwan Lee, KAIST; et al.Fluid Grouping: Quantifying Group Engagement around Interactive Tabletop Exhibits in the WildFlorian Block, Harvard University; et al.Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk ExposurePamela Wisniewski, Pennsylvania State University; et al.BaseLase: An Interactive Focus+Context Laser FloorJörg Müller, Aarhus University; et al.Tiree Energy Pulse: Exploring Renewable Energy Forecasts on the Edge of the GridWill Simm, University of Lancaster; et al.iSkin: Flexible, Stretchable and Visually Customizable On-Body Touch Sensors for Mobile ComputingMartin Weigel, Max-Planck-Institut für Limnologie; et al.Designing Political Deliberation Environments to Support Interactions in the Public SphereBryan Semaan, Syracuse University; et al.From User-Centered to Adoption-Centered Design: A Case Study of an HCI Research Innovation Becomin...Parmit K. Chilana, University of Waterloo; et al.Acoustruments: Passive, Acoustically-Driven, Interactive Controls for Handheld DevicesGierad Laput, Carnegie Mellon University; et al.The Heart Work of Wikipedia: Gendered, Emotional Labor in the World’s Largest Online EncyclopediaAmanda Menking, University of Washington
Ingrid Erickson, Rutgers UniversityUnequal Representation and Gender Stereotypes in Image Search Results for OccupationsMatthew Kay, University of Washington; et al.Sharing is Caring: Assistive Technology Designs on ThingiverseErin Buehler, University of Maryland, Baltimore County; et al."I always assumed that I wasn't really that close to [her]": Reasoning about Invisible Algorithms ...Motahhare Eslami, University of Illinois at Urbana–Champaign; et al.ColourID: Improving Colour Identification for People with Impaired Colour VisionDavid R. Flatla, University of Dundee; et al.2014Consumed Endurance: A Metric to Quantify Arm Fatigue of Mid-Air InteractionsAnders Markussen, University of Copenhagen; et al.Duet: Exploring Joint Interactions on a Smart Phone and a Smart WatchXiang Anthony Chen, Carnegie Mellon University; et al.Type-Hover-Swipe in 96 Bytes: A Motion Sensing Mechanical KeyboardStuart A Taylor, Microsoft; et al.Effects of Display Size and Navigation Type on a Classification TaskCan Liu, University of Paris-Sud; et al.MixFab: a Mixed-Reality Environment for Personal FabricationChristian Weichel, University of Lancaster; et al.Growing Closer on Facebook: Changes in Tie Strength Through Social Network Site UseMoira Burke, Facebook
Robert Kraut, Carnegie Mellon UniversityEmerging Sites of HCI Innovation: Hackerspaces, Hardware Startups & IncubatorsSilvia Lindtner, University of California, Irvine; et al.Designing for Slowness, Anticipation and Re-visitation: A Long Term Field Study of the PhotoboxWilliam Odom, Carnegie Mellon University; et al.Estimating the Social Costs of FriendsourcingJeffrey Rzeszotarski & Meredith Morris, MicrosoftHuman Values in Curating a Human Rights Media ArchiveAbigail Durrant, Newcastle University; et al."Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug WarMunmun De Choudhury, Microsoft; et al.Real-time Feedback for Improving Medication TakingMatthew Lee, Philips
Anind Dey, Carnegie Mellon UniversityStructured Labeling for Facilitating Concept Evolution in Machine LearningTodd Kulesza, Oregon State University; et al.Towards Accurate and Practical Predictive Models of Active-Vision-Based Visual SearchDavid Kieras, University of Michigan
Anthony Hornof, University of OregonRetroDepth: 3D Silhouette Sensing for High-Precision Input On and Above Physical SurfacesDavid Kim, Microsoft; et al.Understanding Multitasking Through Parallelized Strategy Exploration and Individualized Cognitive ...Yunfeng Zhang & Anthony Hornof, University of OregonMaking Sustainability Sustainable: Challenges in the Design of Eco-Interaction TechnologiesRayoung Yang, University of Michigan; et al.2013Weighted Graph Comparison Techniques for Brain Connectivity AnalysisBasak Alper, University of California, Santa Barbara; et al.Analyzing User-Generated YouTube Videos to Understand Touchscreen Use by People with Motor Impairm...Lisa Anthony, University of Maryland, Baltimore County; et al.What is "Critical" About Critical Design?Jeffrey Bardzell & Shaowen Bardzell, Indiana University BloomingtonThe Dubuque Electricity Portal: Evaluation of a City-Scale Residential Electricity Consumption Fee...Tom Erickson, IBM; et al.Improving Navigation-Based File RetrievalStephen Fitchett, University of Canterbury; et al.SPRWeb: Preserving Subjective Responses to Website Colour Schemes through Automatic RecolouringDavid R. Flatla, University of Saskatchewan; et al.The Efficacy of Human Post-Editing for Language TranslationSpence Green, Stanford University; et al.Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI ResearchEric B. Hekler, Arizona State University; et al.Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical TurkLilly Irani, University of California, Irvine
M. Six Silberman, Bureau of Economic InterpretationIllumiRoom: Peripheral Projected Illusions for Interactive ExperiencesBrett Jones, University of Illinois at Urbana–Champaign; et al.Webzeitgeist: Design Mining the WebRanjitha Kumar, Stanford University; et al.LaserOrigami: Laser-Cutting 3D ObjectsStefanie Mueller, Hasso Plattner Institute; et al.Labor Dynamics in a Mobile Micro-Task MarketMohamed Musthag & Deepak Ganesan, University of Massachusetts AmherstJob Opportunities through Entertainment: Virally Spread Speech-Based Services for Low-Literate UsersAgha Ali Raza, Carnegie Mellon University; et al.At Home with Agents: Exploring Attitudes Towards Future Smart Energy InfrastructuresTom Rodden, University of Nottingham; et al.Screenfinity: Extending the Perception Area of Content on Very Large Public DisplaysConstantin Schmidt, Technical University of Berlin; et al.Reasons to Question Seven Segment DisplaysHarold Thimbleby, Swansea UniversityThe Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Arc...Xuan Zhao, Cornell University; et al.2012Observational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobil...Niels Henze, University of Oldenburg; et al.The Normal Natural Troubles of Driving with GPSBarry Brown, Stockholm University
Eric Laurier, University of EdinburghImproving Command Selection with CommandMapsJoey Scarr, University of Canterbury; et al.Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical KiosksKurtis Heimerl, University of California, Berkeley; et al.Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday ObjectsMunehiko Sato, Disney Research; et al.Detecting Error-Related Negativity for Interaction DesignChi Vi & Sriram Subramanian, University of BristolEmpathy, Participatory Design and People with DementiaStephen Lindsay, Newcastle University; et al.Looking Glass: A Field Study on Noticing Interactivity of Shop WindowsJörg Müller, Technical University of Berlin; et al.Affordances in HCI: Toward a Mediated Action PerspectiveVictor Kaptelinin, University of Bergen
Bonnie Nardi, University of California, IrvinePersonas and Decision Making in the Design Process: An Ethnographic Case StudyErin Friess, University of North TexasUsing Rhythmic Patterns as an Input MethodEmilien Ghomi, University of Paris-Sud; et al.Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCIYlva Fernaeus, Royal Institute of Technology; et al.Uncomfortable InteractionsSteve Benford, University of Nottingham; et al.ClayVision: The (Elastic) Image of the CityYuichiro Takeuchi, Sony Computer Science Laboratories Paris
Ken Perlin, New York University2011Bricolage: Example-Based Retargeting for Web DesignRanjitha Kumar, Stanford University; et al.Teenagers and Their Virtual Possessions: Design Opportunities and IssuesWilliam Odom, Carnegie Mellon University; et al.Mid-air Pan-and-Zoom on Wall-sized DisplaysMathieu Nancel, University of Paris-Sud; et al.Why is My Internet Slow?: Making Network Speeds VisibleMarshini Chetty, Georgia Institute of Technology; et al.Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual E...Thomas Erickson, IBM; et al.Your Noise is My Command: Sensing Gestures Using the Body as an AntennaGabe Cohn, University of Washington; et al.Enhancing Physicality in Touch Interaction with Programmable FrictionVincent Levesque, University of British Columbia; et al.Usable Gestures for Blind People: Understanding Preference and PerformanceShaun K. Kane, University of Washington; et al.Automics: souvenir generating photoware for theme parksAbigail Durrant, University of Nottingham; et al.Effects of Community Size and Contact Rate in Synchronous Social Q&ARyen W. White, Microsoft; et al.Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Wor...Koji Yatani, University of Toronto; et al.In the Shadow of Misperception: Assistive Technology Use and Social InteractionsKristen Shinohara & Jacob Wobbrock, University of WashingtonEase of Juggling: Studying the Effects of Manual MultitaskingAntti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University2010How does search behavior change as search becomes more difficult?Anne Aula, Google; et al.The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Co...Brent Hecht & Darren Gergle, Northwestern UniversityOcclusion-Aware InterfacesDaniel Vogel & Ravin Balakrishnan, University of TorontoSkinput: Appropriating the Body as an Input SurfaceChris Harrison, Carnegie Mellon University; et al.Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural IndiaNeil Patel, Stanford University; et al.Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber BundlesPatrick Baudisch, Hasso Plattner Institute; et al.Feminist HCI: Taking Stock and Outlining an Agenda for DesignShaowen Bardzell, Indiana University BloomingtonPrefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface StructureMorgan Dixon & James Fogarty, University of WashingtonMobile-izing Health Workers in Rural IndiaDivya Ramachandran, University of California, Berkeley; et al.Mapping the Landscape of Sustainable HCICarl DiSalvo, Georgia Institute of Technology; et al.The Design of Eco-Feedback TechnologyJon Froehlich, University of Washington; et al.Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of ChartsScott Bateman, University of Saskatchewan; et al.2009Predicting Tie Strength With Social MediaEric Gilbert & Karrie Karahalios, University of Illinois at Urbana–ChampaignUndo and Erase Events as Indicators of Usability ProblemsDavid Akers, Stanford University; et al.From Interaction to Trajectories: Designing Coherent Journeys Through User ExperiencesSteve Benford, University of Nottingham; et al.Musink: Composing Music through Augmented DrawingTheophanis Tsandilas, University of Paris-Sud; et al.Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Ser...Jeffrey Heer, Stanford University; et al.Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector ExhibitsScott S. Snibbe, Sona Research
Hayes S. Raffle, Massachusetts Institute of TechnologyEphemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection PerformanceLeah Findlater, University of British Columbia; et al.2008An Error Model for Pointing Based on Fitts' LawJacob Wobbrock, University of Washington; et al.Designs on Dignity: Perceptions of Technology Among the HomelessChristopher A. Le Dantec & W. Keith Edwards, Georgia Institute of TechnologyImproving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Inte...Krzysztof Z. Gajos, University of Washington; et al.In-Car GPS Navigation: Engagement with and Disengagement from the EnvironmentGilly Leshed, Cornell University; et al.Large Scale Analysis of Web Revisitation PatternsEytan Adar, University of Washington; et al.Multimodal collaborative handwriting training for visually-impaired peopleBeryl Plimmer, University of Auckland; et al.The Network in the Garden: An Empirical Analysis of Social Media in Rural LifeEric Gilbert, University of Illinois at Urbana–Champaign; et al.2007Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognit...Björn Hartmann, Stanford University; et al.Consuming video on Mobile devicesKenton O'Hara, Hewlett Packard Labs; et al.Multiview: improving trust in group video conferencing through spatial faithfulnessDavid T. Nguyen & John Canny, University of California, BerkeleyShift: a technique for operating pen-based interfaces using touchDaniel Vogel, University of Toronto
Patrick Baudisch, MicrosoftSoftware or wetware?: discovering when and why people use digital prosthetic memoryVaiva Kalnikaité & Steve Whittaker, University of SheffieldSustainable interaction design: invention & disposal, renewal & reuseEli Blevis, Indiana University Bloomington2006Trackball text entry for people with motor impairmentsJacob Wobbrock & Brad Myers, Carnegie Mellon UniversityEmbedded phenomena: supporting science learning with classroom-sized distributed simulationsTom Moher, University of Illinois at ChicagoA role for haptics in mobile interaction: initial design using a handheld tactile display prototypeJoseph Luk, University of British Columbia; et al.2005The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation areaTovi Grossman & Ravin Balakrishnan, University of TorontoDesigning the spectator experienceStuart Reeves, University of Nottingham; et al.Examining Task Engagement in Sensor-Based Statistical Models of Human InterruptibilityJames Fogarty, Carnegie Mellon University; et al.Making space for stories: ambiguity in the design of personal communication systemsPaul M. Aoki, PARC
Allison Woodruff, Intel Research LabletsCIKM (Knowledge Management)2019AutoGRD: Model Recommendation Through Graphical Dataset RepresentationNoy Cohen-Shapira, Ben-Gurion University of the Negev; et al.2018Relevance estimation with multiple information sources on search engine result pagesJunqi Zhang, Tsinghua University; et al.2017Hike: A Hybrid Human-Machine Method for Entity Alignment in Large-Scale Knowledge BasesYan Zhuang, Tsinghua University; et al.2016Vandalism Detection in WikidataStefan Heindorf, University of Paderborn; et al.2015Assessing the Impact of Syntactic and Semantic Structures for Answer Passages RerankingKateryna Tymoshenko, University of Trento
Alessandro Moschitti, Qatar Computing Research Institute2014Cross-Device SearchGeorge Montanez, Carnegie Mellon University; et al.2013Penguins in Sweaters, or Serendipitous Entity Search on User-generated ContentIlaria Bordino, Yahoo; et al.2012Gelling, and Melting, Large Graphs by Edge ManipulationHanghang Tong, IBM; et al.2011Intent-aware query similarityJiafeng Guo, Chinese Academy of Sciences; et al.2010MENTA: Inducing Multilingual Taxonomies from WikipediaGerard de Melo & Gerhard Weikum, Max-Planck-Institut für LimnologieFACeTOR: cost-driven exploration of faceted query resultsAbhijith Kashyap, University at Buffalo; et al.2009On the Feasibility of Multi-Site Web Search EnginesRicardo Baeza-Yates, Yahoo; et al.2008Learning to Link with WikipediaDavid Milne & Ian H. Witten, University of Waikato2007Autonomously Semantifying WikipediaFei Wu & Daniel S. Weld, University of Washington2006Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing IndicesSegabtian Michel, Max-Planck-Institut für Limnologie; et al.2005Towards Automatic Association of Relevant Unstructured Content with Structured Query ResultsPrasan Roy, IBM; et al.2004Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XMLQiankun Zhao, Nanyang Technological University; et al.CVPR (Computer Vision)2020Unsupervised Learning of Probably Symmetric Deformable 3D Objects from Images in the WildShangzhe Wu, University of Oxford; et al.2019A Theory of Fermat Paths for Non-Line-of-Sight Shape ReconstructionShumian Xin, Carnegie Mellon University; et al.2018Taskonomy: Disentangling Task Transfer LearningAmir R. Zamir, Stanford University; et al.2017Densely Connected Convolutional NetworksZhuang Liu, Tsinghua University; et al.Learning from Simulated and Unsupervised Images through Adversarial TrainingAshish Shrivastava, Apple; et al.2016Deep Residual Learning for Image RecognitionKaiming He, Microsoft; et al.2015DynamicFusion: Reconstruction and Tracking of Non-rigid Scenes in Real-TimeRichard A. Newcombe, University of Washington; et al.2014What Camera Motion Reveals About Shape with Unknown BRDFManmohan Chandraker, NEC Labs America2013Fast, Accurate Detection of 100,000 Object Classes on a Single MachineThomas Dean, Google; et al.2012A Simple Prior-free Method for Non-Rigid Structure-from-Motion FactorizationYuchao Dai, Northwestern Polytechnical University; et al.2011Real-time Human Pose Recognition in Parts from Single Depth ImagesJamie Shotton, Microsoft; et al.2010Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data usi...Anders Eriksson & Anton va den Hendel, University of Adelaide2009Single Image Haze Removal Using Dark Channel PriorKaiming He, The Chinese University of Hong Kong; et al.2008Beyond Sliding Windows: Object Localization by Efficient Subwindow SearchChistoph H. Lampert, Max-Planck-Institut für Limnologie; et al.Global Stereo Reconstruction under Second Order Smoothness PriorsOliver Woodford, University of Oxford; et al.2007Dynamic 3D Scene Analysis from a Moving VehicleBastian Leibe, ETH Zurich; et al.2006Putting Objects in PerspectiveDerek Hoiem, Carnegie Mellon University; et al.2005Real-Time Non-Rigid Surface DetectionJulien Pilet, École Polytechnique Fédérale de Lausanne; et al.2004Programmable Imaging using a Digital Micromirror ArrayShree K. Nayar, Columbia University; et al.2003Object Class Recognition by Unsupervised Scale-Invariant LearningRob Fergus, University of Oxford; et al.2001Morphable 3D models from videoMatthew Brand, Mitsubishi Electric Research Laboratories2000Real-Time Tracking of Non-Rigid Objects using Mean ShiftDorin Comaniciu, Siemens Corporate Research; et al.FOCS (Theory)2019Lower bounds for maximal matchings and maximal independent setsAlkida Balliu, Aalto University; et al.NEEXP ⊆ MIP*Anand Natarajan, California Institute of Technology
John Wright, Massachusetts Institute of TechnologyAutomating Resolution is NP-HardAlbert Atserias & Moritz Müller, Polytechnic University of Catalonia2018Classical Verification of Quantum ComputationUrmila Mahadev, University of California, BerkeleyPseudorandom Sets in Grassmann Graph have Near-Perfect ExpansionSubhash Khot, New York University; et al.Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic TimeDiptarka Chakraborty, Computer Science Institute of Charles University; et al.2017A dichotomy theorem for nonuniform CSPsAndrei A. Bulatov, Simon Fraser UniversityThe Proof of CSP Dichotomy ConjectureDmitriy Zhuk, Moscow State UniversityThe Matching Problem in General Graphs is in Quasi-NCOla Svensson & Jakub Tarnawski, École Polytechnique Fédérale de Lausanne2016Settling the Complexity of Computing Approximate Two-Player Nash EquilibriaAviad Rubinstein, University of California, BerkeleyFast Learning Requires Good Memory: A Time-Space Lower Bound for Parity LearningRan Raz, Weizmann Institute of Science2015An average-case depth hierarchy theorem for Boolean circuitsBenjamin Rossman, National Institute of Informatics; et al.2014Path Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations a...Yin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology2013Navigating Central Path with Electrical Flows: from Flows to Matchings, and BackAleksander Mądry, École Polytechnique Fédérale de LausanneOn Kinetic Delaunay Triangulations: A Near Quadratic Bound for Unit Speed MotionsNatan Rubin, University of Paris VI: Pierre-and-Marie-Curie University2012A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2Julia Chuzhoy, Toyota Technological Institute at Chicago
Shi Li, Princeton UniversityA multi-prover interactive proof for NEXP sound against entangled proversTsuyoshi Ito, NEC Labs America
Thomas Vidick, Massachusetts Institute of Technology2011A Randomized Rounding Approach to the Traveling Salesman ProblemShayan Oveis Gharan, Stanford University; et al.Approximating Graphic TSP by MatchingsTobia M¨o;mke & Ola Svensson, Royal Institute of TechnologyA Polylogarithmic-Competitive Algorithm for the k-Server ProblemNikhil Bansal, IBM; et al.2010Subexponential Algorithms for Unique Games and Related ProblemsSanjeev Arora, Princeton University; et al.Computational Transition at the Uniqueness ThresholdAllan Sly, MicrosoftApproximation Algorithms for the Edge-Disjoint Paths Problem via Raecke DecompositionsMatthew Andrews, Bell Labs2008Two Query PCP with Sub-Constant ErrorDana Moshkovitz & Ran Raz, Weizmann Institute of Science2007Space-Efficient Identity Based Encryption Without PairingsDan Boneh, Stanford University; et al.2006Settling the Complexity of 2-Player Nash EquilibriumXi Chen, Tsinghua University
Xiaotie Deng, City University of Hong Kong2005The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type M...Subhash A. Khot, Georgia Institute of Technology
Nisheeth K. Vishnoi, IBMCorrecting Errors Beyond the Guruswami-Sudan Radius in Polynomial TimeFarzad Parvaresh & Alexander Vardy, University of California, San Diego2004Hardness of Approximating the Shortest Vector Problem in LatticesSubhash Khot, Georgia Institute of TechnologyCryptography in NC0Benny Applebaum, Technion – Israel Institute of Technology; et al.2003On the Impossibility of Dimension Reduction in L1Bo Brinkman & Moses Charikar, Princeton University2002Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String ModelBoaz Barak, Weizmann Institute of ScienceMinimizing Congestion in General NetworksHarald Räcke, University of PaderbornA Dichotomy Theorem for Constraints on a Three-Element SetAndrei A. Bulatov, University of OxfordFSE (Software Engineering)2019Empirical Review of Java Program Repair Tools: A Large-Scale Experiment on 2,141 Bugs and 23,551 R...Thomas Durieux, University of Lisbon; et al.Generating Automated and Online Test Oracles for Simulink Models with Continuous and Uncertain Beh...Claudio Menghi, University of Luxembourg; et al.The Importance of Accounting for Real-World Labelling When Predicting Software VulnerabilitiesMatthieu Jimenez, University of Luxembourg; et al.Assessing the Quality of the Steps to Reproduce in Bug ReportsOscar Chaparro, College of William & Mary; et al.A Framework for Writing Trigger-Action Todo Comments in Executable FormatPengyu Nie, University of Texas at Austin; et al.A Statistics-based Performance Testing Methodology for Cloud ApplicationsSen He, University of Texas at San Antonio; et al.2018The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the ...James C. Davis, Virginia Tech; et al.Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing LeaksShengjian (Daniel) Guo, Virginia Tech; et al.Data Race Detection on Compressed TracesDileep Kini, University of Illinois at Urbana–Champaign; et al.Do Android Taint Analysis Tools Keep Their Promises?Felix Pauck, University of Paderborn; et al.An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed SystemsYu Gao, Chinese Academy of Sciences; et al.Oreo: Detection of Clones in the Twilight ZoneVaibhav Saini, University of California, Irvine; et al.2017The Power of "Why" and "Why Not": Enriching Scenario Exploration with ProvenanceTim Nelson, Brown University; et al.Understanding Misunderstandings in Source CodeDan Gopstein, New York University; et al.Trade-Offs in Continuous Integration: Assurance, Security, and FlexibilityMichael Hilton, Oregon State University; et al.Cooperative Kernels: GPU Multitasking for Blocking AlgorithmsTyler Sorensen, Imperial College London; et al.Fairness Testing: Testing Software for DiscriminationSainyam Galhotra, University of Massachusetts Amherst; et al.Discovering Relational SpecificationsCalvin Smith, University of Wisconsin–Madison; et al.Automatically Diagnosing and Repairing Error Handling Bugs in CYuchi Tian & Baishakhi Ray, University of Virginia2016API Code Recommendation Using Statistical Learning from Fine-grained ChangesAnh Tuan Nguyen, Iowa State University; et al.Detecting Sensitive Data Disclosure via Bi-directional Text Correlation AnalysisJianjun Huang, Purdue University; et al.Factors Influencing Code Review Processes in IndustryTobias Baum, Leibniz University Hannover; et al.Foraging and Navigations Fundamentally: Developers' Predictions of Value and CostDavid Piorkowski, Oregon State University; et al.Multi-Representational Security AnalysisEunsuk Kang, University of California, Berkeley; et al.Proteus: Computing Disjunctive Loop Summary via Path Dependency AnalysisXiaofei Xie, Tianjin University; et al.Why We Refactor? Confessions of GitHub ContributorsDanilo Silva, Federal University of Minas Gerais; et al.2015How Practitioners Perceive the Relevance of Software Engineering ResearchDavid Lo, Singapore Management University; et al.Effective Test Suites for Mixed Discrete-Continuous Stateflow ControllersReza Matinnejad, University of Luxembourg; et al.MultiSE: Multi-path Symbolic Execution using Value SummariesKoushik Sen, University of California, Berkeley; et al.Modeling Readability to Improve Unit TestsErmira Daka, University of Sheffield; et al.Optimizing energy consumption of GUIs in Android apps: a multi-objective approachMario Linares-Vásquez, College of William & Mary; et al.Measure It? Manage It? Ignore It? Software Practitioners and Technical DebtNeil A. Ernst, Carnegie Mellon University; et al.A User-Guided Approach to Program AnalysisRavi Mangal, Georgia Institute of Technology; et al.Users Beware: Preference Inconsistencies AheadFarnaz Behrang, Georgia Institute of Technology; et al.2014Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case StudyKlaus-Benedikt Schultis, Siemens Corporate Technology; et al.Selection and Presentation Practices for Code Example SummarizationAnnie Ying & Martin Robillard, McGill UniversityLearning Natural Coding ConventionsMiltiadis Allamanis, University of Edinburgh; et al.AI: A Lightweight System for Tolerating Concurrency BugsMingxing Zhang, Tsinghua University; et al.Powering the Static Driver Verifier using CorralAkash Lal & Shaz Qadeer, MicrosoftAre Mutants a Valid Substitute for Real Faults in Software Testing?René Just, University of Washington; et al.2012Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software LibrariesBradley Cossette & Robert Walker, University of CalgaryScalable Test Data Generation from Multidimensional ModelsEmina Torlak, University of California, BerkeleyAssessing the Value of Branches with What-if AnalysisChristian Bird & Thomas Zimmermann, Microsoft2011Proving programs robustSwarat Chaudhuri, Rice University; et al.How Do Fixes Become Bugs?Zuoning Yin, University of Illinois at Urbana–Champaign; et al.Proactive Detection of Collaboration ConflictsYuriy Brun, University of Washington; et al.2010Staged Concurrent Program AnalysisNishant Sinha & Chao Wang, NEC Labs AmericaDeveloper Fluency: Achieving True Mastery in Software ProjectsMinghui Zhou, Peking University
Audris Mockus, Avaya LabsCreating and evolving developer documentation: understanding the decisions of open source contribu...Barthélémy Dagenais & Martin P. Robillard, McGill University2009Asserting and checking determinism for multithreaded programsJacob Burnim & Koushik Sen, University of California, BerkeleyDarwin: an approach for debugging evolving programsDawei Qi, National University of Singapore; et al.Graph-based Mining of Multiple Object Usage PatternsTung Thanh Nguyen, Iowa State University; et al.2008Efficient online monitoring of web-service SLAsFranco Raimondi, University College London; et al.What makes a good bug report?Nicolas Bettenburg, Saarland University; et al.2007Globally distributed software development project performance: an empirical analysisNarayan Ramasubbu & Rajesh Krishna Balan, Singapore Management UniversityMining specifications of malicious behaviorMihai Christodorescu, University of Wisconsin–Madison; et al.Automatic consistency assessment for query results in dynamic environmentsJamie Payton, University of North Carolina at Charlotte; et al.Object and reference immutability using Java genericsYoav Zibin, Massachusetts Institute of Technology; et al.2006Controlling factors in evaluating path-sensitive error detection techniquesMatthew B. Dwyer, University of Nebraska–Lincoln; et al.SYNERGY: a new algorithm for property checkingBhargav S. Gulavani, Indian Institute of Technology Kanpur; et al.2005Automatic Generation of Suggestions for Program InvestigationMartin P. Robillard, McGill UniversityContext- and path-sensitive memory leak detectionYichen Xie & Alex Aiken, Stanford UniversityCUTE: a concolic unit testing engine for CKoushik Sen, University of Illinois at Urbana–Champaign; et al.2004A Classification System and Analysis for Aspect-Oriented ProgramsMartin Rinard, Massachusetts Institute of Technology; et al.Reasoning about partial goal satisfaction for requirements and design engineeringEmmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain2003Predicting Problems Caused by Component UpgradesStephen McCamant & Michael D. Ernst, Massachusetts Institute of TechnologyA Family of Test Adequacy Criteria for Database-Driven ApplicationsGregory M. Kapfhammer & Mary Lou Soffa, University of PittsburghEliminating redundancies with a "composition with adaptation" meta-programming techniqueStan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong University2002Isolating Cause-Effect Chains from Computer ProgramsAndreas Zeller, Saarland UniversityICCV (Computer Vision)2019SinGAN: Learning a Generative Model from a Single Natural ImageTamar Rott Shaham, Technion – Israel Institute of Technology; et al.2017Mask R-CNNKaiming He, Facebook AI Research; et al.2015Deep Neural Decision ForestsPeter Kontschieder, Microsoft; et al.2013From Large Scale Image Categorization to Entry-Level CategoriesVicente Ordonez, University of North Carolina at Chapel Hill; et al.2011Relative AttributesDevi Parikh, Toyota Technological Institute at Chicago
Kristen Grauman, University of Texas at Austin2009Discriminative models for multi-class object layoutChaitanya Desai, University of California, Irvine; et al.2007Population Shape Regression From Random Design DataBradley Davis, University of North Carolina at Chapel Hill; et al.2005Globally Optimal Estimates for Geometric Reconstruction ProblemsFredrik Kahl, Lund University
Didier Henrion, Laboratory for Analysis and Architecture of Systems2003Image-based Rendering using Image-based PriorsAndrew Fitzgibbon, University of Oxford; et al.Image Parsing: Unifying Segmentation, Detection and RecognitionZhuowen Tu, University of California, Los Angeles; et al.Detecting Pedestrians using Patterns of Motion and AppearancePaul Viola, Microsoft; et al.2001Probabilistic Tracking with Exemplars in a Metric SpaceKentaro Toyama & Andrew Blake, MicrosoftThe Space of All Stereo ImagesSteven Seitz, University of Washington1999A Theory of Shape by Space CarvingKiriakos Kutulakos, University of Rochester
Steven Seitz, Carnegie Mellon UniversityEuclidean Reconstruction and Reprojection up to SubgroupsYi Ma, University of California, Berkeley; et al.1998Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Paramet...Marc Pollefeys, Katholieke Universiteit Leuven; et al.The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image SequencesPhil Torr, Microsoft; et al.ICML (Machine Learning)2020On Learning Sets of Symmetric ElementsHaggai Maron, NVIDIA Research; et al.Tuning-free Plug-and-Play Proximal Algorithm for Inverse Imaging ProblemsKiaxuan Wei, Beijing Institute of Technology; et al.2019Challenging Common Assumptions in the Unsupervised Learning of Disentangled RepresentationsFrancesco Locatello, ETH Zurich; et al.Rates of Convergence for Sparse Variational Gaussian Process RegressionDavid R. Burt, University of Cambridge; et al.2018Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial ExamplesAnish Athalye, Massachusetts Institute of Technology; et al.Delayed Impact of Fair Machine LearningLydia T. Liu, University of California, Berkeley; et al.2017Understanding Black-box Predictions via Influence FunctionsPang Wei Koh & Percy Liang, Stanford University2016Dueling Network Architectures for Deep Reinforcement LearningZiyu Wang, Google; et al.Pixel Recurrent Neural NetworksAaron Van den Oord, Google; et al.Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs SamplingChristopher De Sa, Stanford University; et al.2015Optimal and Adaptive Algorithms for Online BoostingAlina Beygelzimer, Yahoo; et al.A Nearly-Linear Time Framework for Graph-Structured SparsityChinmay Hegde, Massachusetts Institute of Technology; et al.2014Understanding the Limiting Factors of Topic Modeling via Posterior Contraction AnalysisJian Tang, Peking University; et al.2013Fast Semidifferential-based Submodular Function OptimizationRishabh Iyer, University of Washington; et al.Vanishing Component AnalysisRoi Livni, The Hebrew University of Jerusalum; et al.2012Bayesian Posterior Sampling via Stochastic Gradient Fisher ScoringSungjin Ahn, University of California, Irvine; et al.2011Computational Rationalization: The Inverse Equilibrium ProblemKevin Waugh, Carnegie Mellon University; et al.2010Hilbert Space Embeddings of Hidden Markov ModelsLe Song, Carnegie Mellon University; et al.2009Structure preserving embeddingBlake Shaw & Tony Jebara, Columbia University2008SVM Optimization: Inverse Dependence on Training Set SizeShai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago2007Information-theoretic metric learningJason V. Davis, University of Texas at Austin; et al.2006Trading convexity for scalabilityRonan Collobert, NEC Labs America; et al.2005A support vector method for multivariate performance measuresThorsten Joachims, Cornell University1999Least-Squares Temporal Difference LearningJustin A. Boyan, Ames Research CenterICSE (Software Engineering)2020A Machine Learning Approach for Vulnerability CurationChen Yang, Veracode Inc.; et al.Traceability Support for Multi-Lingual Software ProjectsYalin Liu, University of Notre Dame; et al.Ethical Mining - A Case Study on MSR Mining ChallengesNicolas Gold & Jens Krinke, University of College LondonWhite Box Fairness Testing through Adversarial SamplingPeixin Zhang, Zhejiang University; et al. An Empirical Study on Program Failures of Deep Learning JobsRu Zhang, Microsoft; et al.Towards the Use of the Readily Available Tests from the Release Pipeline as Performance Tests. Ar...Zishuo Ding, Concordia University; et al.A Tale from the Trenches: Cognitive Biases and Software DevelopmentSouti Chattopadhyay, Oregon State University; et al.Time-travel Testing of Android AppsZhen Dong, National University of Singapore; et al.Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language?Nischal Shrestha, North Carolina State University; et al.Big Code!= Big Vocabulary: Open-Vocabulary Models for Source codeRafael-Michael Karampatsis, University of Edinburgh; et al. Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep LearningJieshan Chen, Australian National University; et al.Translating Video Recordings of Mobile App Usages into Replayable ScenariosCarlos Bernal-Cardenas, College of William & Mary; et al.2019Detecting incorrect build rulesNandor Licker & Andrew Rice, University of CambridgeDistilling Neural Representations of Data Structure Manipulation using fMRI and fNIRSYu Huang, University of Michigan; et al.Do Developers Discover New Tools On The Toilet?Emerson Murphy-Hill, Google; et al.Going Farther Together: The Impact of Social Capital on Sustained Participation in Open SourceHuilian Sophie Qiu, Carnegie Mellon University; et al.iSENSE: Completion-Aware Crowdtesting ManagementJunjie Wang, Institute of Software, Chinese Academy of Sciences; et al.Redundant Loads: A Software Inefficiency IndicatorPengfei Su, College of William & Mary; et al.Resource-Aware Program Analysis Via Online Abstraction CoarseningKihong Heo, University of Pennsylvania; et al.Scalable Approaches for Test Suite ReductionEmilio Cruciani, Gran Sasso Science Institute; et al.SMOKE: Scalable Path-Sensitive Memory Leak Detection for Millions of Lines of CodeGang Fan, Hong Kong University of Science and Technology; et al.The Seven Sins: Security Smells in Infrastructure as Code ScriptsAkond Rahman, North Carolina State University; et al.View-Centric Performance Optimization for Database-Backed Web ApplicationsJunwen Yang, University of Chicago; et al.2018Large-Scale Analysis of Framework-Specific Exceptions in Android AppsLingling Fan, East China Normal University; et al.Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-Afte...Hua Yan, University of New South Wales; et al.Identifying Design Problems in the Source Code: A Grounded TheoryLeonardo Sousa, Pontifical Catholic University of Rio de Janeiro; et al.Static Automated Program Repair for Heap PropertiesRijnard van Tonder & Claire Le Goues, Carnegie Mellon UniversityAutomated Localization for Unreproducible BuildsZhilei Ren, Dalian University of Technology; et al.Generalized Data Structure SynthesisCalvin Loncaric, University of Washington; et al.Traceability in the Wild: Automatically Augmenting Incomplete Trace linksMichael Rath, Technical University Ilmenau; et al.Towards Optimal Concolic TestingXinyu Wang, Zhejiang University; et al.2017Clone Refactoring with Lambda ExpressionsNikolaos Tsantalis, Concordia University; et al.A Grounded Theory of Agile Transitions in PracticeRashina Hoda, University of Auckland
James Noble Victoria, Victoria University of WellingtonCode Defenders: Crowdsourcing Effective Tests and Subtle Mutants with a Mutation Testing GameJosé Miguel Rojas, University of Sheffield; et al.Decoding the representation of code in the brain: An fMRI study of code review and expertiseBenjamin Floyd, University of Virginia; et al.Challenges for Static Analysis of Java Reflection - Literature Review and Empirical StudyDavy Landman, Centrum Wiskunde & Informatica; et al.Optimizing Test Placement for Module-Level Regression TestingAugust Shi, University of Illinois at Urbana–Champaign; et al.2016Efficient Large-Scale Trace Checking Using MapReduceMarcello M. Bersani, Politecnico di Milano; et al.Energy Profiles of Java Collections ClassesSamir Hasan, Auburn University; et al.Feedback-Directed Instrumentation for Deployed JavaScript ApplicationsMagnus Madsen, University of Waterloo; et al.From Word Embeddings to Document Similarities for Improved Information Retrieval in Software Engin...Xin Ye, Ohio University; et al.Guiding Dynamic Symbolic Execution toward Unverified Program ExecutionsMaria Christakis, ETH Zurich; et al.On the Techniques We Create, the Tools We Build, and Their Misalignments: A Study of KLEEEric F. Rizzi, GrammaTech; et al.Termination-Checking for LLVM Peephole OptimizationsDavid Menendez & Santosh Nagarakatte, Rutgers UniversityVDTest: An Automated Framework to Support Testing for Virtual DevicesTingting Yu, University of Kentucky; et al.Work Practices and Challenges in Pull-Based Development: The Contributor's PerspectiveGeorgios Gousios, Radboud University Nijmegen; et al.2015Views on Internal and External Validity in Empirical Software EngineeringJanet Siegmund, University of Passau; et al.How Much Up-Front? A Grounded theory of Agile ArchitectureMichael Waterman, Specialised Architecture Services Ltd; et al.When and Why Your Code Starts to Smell BadMichele Tufano, College of William & Mary; et al.Alloy*: A General-Purpose Higher-Order Relational Constraint SolverAleksandar Milicevic, Massachusetts Institute of Technology; et al.Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational F...Mathieu Lavallée & Pierre N. Robillard, Polytechnique MontréalCARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive FixesAdrian Nistor, Chapman University; et al.2014A Study and Toolkit for Asynchronous Programming in C#Semih Okur, University of Illinois at Urbana–Champaign; et al.Characterizing and Detecting Performance Bugs for Smartphone ApplicationsYepang Liu, Hong Kong University of Science and Technology; et al.Coverage Is Not Strongly Correlated with Test Suite EffectivenessLaura Inozemtseva & Reid Holmes, University of WaterlooCowboys, Ankle Sprains, and Keepers of Quality: How Is Video Game Development Different from Softw...Emerson Murphy-Hill, North Carolina State University; et al.Enhancing Symbolic Execution with VeritestingThanassis Avgerinos, Carnegie Mellon University; et al.Improving Automated Source Code Summarization via an Eye-Tracking Study of ProgrammersPaige Rodeghero, University of Notre Dame; et al.Trading Robustness for Maintainability: An Empirical Study of Evolving C# ProgramsNélio Cacho, Universidade Federal do Rio Grande do Norte; et al.Understanding JavaScript Event-Based InteractionsSaba Alimadadi, University of British Columbia; et al.Unit Test Virtualization with VMVMJonathan Bell & Gail Kaiser, Columbia University2013Data Clone Detection and Visualization in SpreadsheetsFelienne Hermans, Delft University of Technology; et al.Interaction-Based Test-Suite MinimizationDale Blue, IBM; et al.Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop CloudsWeiyi Shang, Queen's University; et al.UML in PracticeMarian Petre, The Open UniversityDual Ecological Measures of Focus in Software DevelopmentDaryl Posnett, University of California, Davis; et al.Automatic patch generation learned from human-written patchesDongsun Kim, Hong Kong University of Science and Technology; et al.2012Amplifying Tests to Validate Exception Handling CodePingyu Zhang & Sebastian Elbaum, University of Nebraska–LincolnA Tactic-Centric Approach for Automating Traceability of Quality ConcernsMehdi Mirakhorli, DePaul University; et al.Using Dynamic Analysis to Discover Polynomial and Array InvariantsThanhVu Nguyen, University of New Mexico; et al.Automated Detection of Client-State Manipulation VulnerabilitiesAnders Møller & Mathias Schwarz, Aarhus UniversityUnderstanding Integer Overflow in C/C++Will Dietz, University of Illinois at Urbana–Champaign; et al.How Do Professional Developers Comprehend Software?Tobias Roehm, Technical University of Munich; et al.Partial Models: Towards Modeling and Reasoning with UncertaintyMichalis Famelis, University of Toronto; et al.2011Run-Time Efficient Probabilistic Model CheckingAntonio Filieri, Politecnico di Milano; et al.Verifying Multi-threaded Software using SMT-based Context-Bounded Model CheckingLucas Cordeiro & Bernd Fischer, University of SouthamptonPrograms, tests, and oracles: the foundations of testing revisitedMatt Staats, University of Minnesota; et al.On-demand Feature Recommendations Derived from Mining Public Product DescriptionsHoratiu Dumitru, DePaul University; et al.Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and ...Narayan Ramasubbu, Singapore Management University; et al.2010Collaborative Reliability Prediction of Service-Oriented SystemsZibin Zheng & Michael R. Lyu, The Chinese University of Hong KongA Degree-of-Knowledge Model to Capture Source Code FamiliarityThomas Fritz, University of British Columbia; et al.A Machine Learning Approach for Tracing Regulatory Codes to Product Specific RequirementsJane Cleland-Huang, DePaul University; et al.A Cut-off Approach for Bounded Verification of Parameterized SystemsQiusong Yang & Mingshu Li, Chinese Academy of SciencesTest Generation through Programming in UDITAMilos Gligoric, University of Illinois at Urbana–Champaign; et al.2009Effective Static Deadlock DetectionMayur Naik, Intel Research Lablets; et al.Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows VistaChristian Bird, University of California, Davis; et al.How We Refactor, and How We Know ItEmerson Murphy-Hill, Portland State University; et al.Automatically finding patches using genetic programmingWestley Weimer, University of Virginia; et al.Invariant-Based Automatic Testing of AJAX User InterfacesAli Mesbah & Arie van Deursen, Delft University of Technology2008Recommending adaptive changes for framework evolutionBarthélémy Dagenais & Martin P. Robillard, McGill UniversityPrecise memory leak detection for java software using container profilingGuoqing Xu & Atanas Rountev, Ohio State UniversityDebugging Reinvented: Asking and Answering Why and Why Not Questions about Program BehaviorAndrew J. Ko & Brad A. Myers, Carnegie Mellon UniversityThe Effect of Program and Model Structure on MC/DC Test Adequacy CoverageAjitha Rajan, University of Minnesota; et al.Predicting Accurate and Actionable Static Analysis Warnings: An Experimental ApproachJoseph Ruthruff, University of Nebraska–Lincoln; et al.2007Tracking Code Clones in Evolving SoftwareEkwa Duala-Ekoko & Martin P. Robillard, McGill UniversityPredicting Faults from Cached HistorySunghun Kim, Massachusetts Institute of Technology; et al.Matching and Merging of Statecharts SpecificationsShiva Nejati, University of Toronto; et al.Refactoring for Parameterizing Java ClassesAdam Kiezun, Massachusetts Institute of Technology; et al.2006Model-Based Development of Dynamically Adaptive SoftwareJi Zhang & Betty H.C. Cheng, Michigan State UniversityWho Should Fix This Bug?John Anvik, University of British Columbia; et al.2005Data Structure Repair Using Goal-Directed ReasoningBrian Demsky & Martin Rinard, Massachusetts Institute of TechnologyUsing Structural Context to Recommend Source Code ExamplesReid Holmes & Gail Murphy, University of British ColumbiaIs Mutation an Appropriate Tool for Testing Experiments?James Andrews, University of Western Ontario; et al.Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Pe...Andrew Ko, Carnegie Mellon University; et al.2004SNIAFL: Towards a Static Non-Interactive Approach to Feature LocationWei Zhao, Peking University; et al.An Empirical Study of Software Reuse vs. Defect-Density and StabilityParastoo Mohagheghi, Ericsson; et al.Static Checking of Dynamically Generated Queries in Database ApplicationsCarl Gould, University of California, Davis; et al.A Tool for Writing and Debugging Algebraic SpecificationsJohannes Henkel & Amer Diwan, University of Colorado BoulderExtending the REpresentational State Transfer (REST) Architectural Style for Decentralized SystemsRohit Khare & Richard N. Taylor, University of California, Irvine2003Precise Dynamic Slicing AlgorithmsXiangyu Zhang, University of Arizona; et al.Modular Verification of Software Components in CSagar Chaki, Carnegie Mellon University; et al.IJCAI (Artificial Intelligence)2019Clause Elimination for SAT and QSATMarijn Heule, University of Texas at Austin; et al.2018SentiGAN: Generating Sentimental Texts via Mixture Adversarial NetworksKe Wang & Xiaojun Wan, Peking UniversityReasoning about Consensus when Opinions Diffuse through Majority DynamicsVincenzo Auletta, University of Salerno; et al.R-SVM+: Robust Learning with Privileged InformationXue Li, Wuhan University; et al.From Conjunctive Queries to Instance Queries in Ontology-Mediated QueryingCristina Feier, University of Bremen; et al.What game are we playing? End-to-end learning in normal and extensive form gamesChun Kai Ling, Carnegie Mellon University; et al.Commonsense Knowledge Aware Conversation Generation with Graph AttentionHao Zhou, Tsinghua University; et al.A Degeneracy Framework for Graph SimilarityGiannis Nikolentzos, École Polytechnique; et al.2017Foundations of Declarative Data Analysis Using Limit Datalog ProgramsMark Kaminski, University of Oxford; et al.2016Hierarchical Finite State Controllers for Generalized PlanningJavier Segovia, Pompeu Fabra University; et al.2015Recursive Decomposition for Nonconvex OptimizationAbram L. Friesen & Pedro Domingos, University of WashingtonBayesian Active Learning for Posterior EstimationKirthevasan Kandasamy, Carnegie Mellon University; et al.2013Flexibility and Decoupling in the Simple Temporal ProblemMichel Wilson, Delft University of Technology; et al.Bayesian Optimization in High Dimensions via Random EmbeddingsZiyu Wang, University of British Columbia; et al.2011Nested Rollout Policy Adaptation for Monte Carlo Tree SearchChristopher D. Rosin, Parity ComputingUnweighted Coalitional Manipulation Under the Borda Rule is NP-HardNadja Betzler, Technical University of Berlin; et al.On the Decidability of Connectedness Constraints in 2D and 3D Euclidean SpacesRoman Kontchakov, Birkbeck College London; et al.2009Learning Conditional Preference Networks with QueriesFrederic Koriche, Montpellier 2 University
Bruno Zanuttini, Université de Caen Basse-NormandieConsequence-Driven Reasoning for Horn SHIQ OntologiesYevgeny Kazakov, University of Oxford2007Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian NetworksMaleeha Qazi, Siemens Medical Solutions; et al.Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Pro...Luc Mercier & Pascal Van Hentenryck, Brown UniversityBuilding Structure into Local Search for SATDuc Nghia Pham, Griffith University; et al.2005Learning Coordination ClassifiersYuhong Guo, University of Alberta; et al.Solving CheckersJonathan Schaeffer, University of Alberta; et al.A Probabilistic Model of Redundancy in Information ExtractionDoug Downey, University of Washington; et al.2003Thin Junction Tree Filters for Simultaneous Localization and MappingMark A. Paskin, University of California, BerkeleyApproximating Game-Theoretic Optimal Strategies for Full-scale PokerDarse Billings, University of Alberta; et al.2001Complexity Results for Structure-Based CausalityThomas Eiter & Thomas Lukasiewicz, TU Wien1999A Distributed Case-Based Reasoning Application for Engineering Sales SupportIan Watson, University of Salford
Dan Gardingen, Western AirLearning in Natural LanguageDan Roth, University of Illinois at Urbana–Champaign1997Translingual Information Retrieval: A Comparative EvaluationJaime G. Carbonell, Carnegie Mellon University; et al.Object Identification in a Bayesian ContextTimothy Huang & Stuart Russell, University of California, BerkeleyApplications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolo...Fangzhen Lin, The Hongkong University of Science and TechnologyINFOCOM (Networking)2020Push the Limit of Acoustic Gesture RecognitionYanwen Wang, The Hong Kong Polytechnic University; et al.On the Power of Randomization for Scheduling Real-Time Traffic in Wireless NetworksChristos Tsanikidis & Javad Ghaderi, Columbia UniversityReducing the Service Function Chain Backup Cost over the Edge and Cloud by a Self-Adapting SchemeXiaojun Shang, Stony Brook University; et al.2019Combinatorial Sleeping Bandits with Fairness ConstraintsFengjiao Li, Iowa State University; et al.RF-Mehndi: A Fingertip Profiled RF IdentifierCui Zhao, Xi'an Jiaotong University; et al.Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable ChannelsGuocong Quan, Ohio State University; et al.2018Understanding Ethereum via Graph AnalysisTing Chen, University of Electronic Science and Technology of China; et al.WiFED: WiFi Friendly Energy Delivery with Distributed BeamformingSubhramoy Mohanti, Northeastern University; et al.Optimizing Age of Information in Wireless Networks with Throughput ConstraintsIgor Kadota, Massachusetts Institute of Technology; et al.2017One Step at a Time: Optimizing SDN Upgrades in ISP NetworksKonstantinos Poularakis, Yale University; et al.2016Heavy-Ball: A New Approach to Tame Delay and Convergence in Wireless Network OptimizationJia Liu, Ohio State University; et al.2015The Power of Slightly More than One Sample in Randomized Load BalancingLei Ying, Arizona State University; et al.2014Joint Static and Dynamic Traffic Scheduling in Data Center NetworksZizhong Cao, New York University Tandon School of Engineering; et al.Performance Evaluation and Asymptotics for Content Delivery NetworksVirag Shah & Gustavo de Veciana, University of Texas at Austin2013On the Steady-State of Cache NetworksElisha J. Rosensweig, University of Massachusetts Amherst; et al.2012Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying frameworkCarlee Joe-Wong, Princeton University; et al.2011Dynamic right-sizing for power-proportional data centersMinghong Lin, California Institute of Technology; et al.2010On the Feasibility and Efficacy of Protection Routing in IP NetworksKin-Wah Kwong, University of Pennsylvania; et al.2009Queuing Network Models for Multi-Channel P2P Live Streaming SystemsDi Wu, New York University Tandon School of Engineering; et al.2008Theoretical Results on Base Station Movement Problem for Sensor NetworksYi Shi & Y. Thomas Hou, Virginia TechOn the Feasibility of the Link Abstraction in (Rural) Mesh NetworksDattatraya Gokhal, Indian Navy; et al.Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless...Changhee Joo, Ohio State University; et al.2007Disruption free topology reconfiguration in OSPF networksPierre Francois, Université catholique de Louvain; et al.2006Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global PerspectiveGaurav Sharma, Purdue University; et al.2005Perfect Simulation and Stationarity of a Class of Mobility ModelsJean-Yves Le Boude, École Polytechnique Fédérale de Lausanne
Milan Vojnović, Microsoft2004Throughput-Delay Trade-Off in Wireless NetworksAbbas El Gamal, Stanford University; et al.2003User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data NetworksSem Borst, Bell Labs2002Priority Service and Max-Min FairnessPeter Marbach, University of Toronto2001Mobility increases the capacity of ad-hoc wireless networksMatthias Grossglauser, AT&T Laboratories
David Tse, University of California, Berkeley2000The Chaotic Nature of TCP Congestion ControlAndrás Veres & Miklós Boda, Ericsson1999Bandwidth Sharing: Objectives and AlgorithmsLaurent Massoulié, Microsoft
James Robert, France Telecom1998Effective Bandwidths in Wireless Networks with Multiuser ReceiversDavid Tse, University of California, Berkeley
Stephen Hanly, University of Melbourne1996An algorithm for multicast tree generation in networks with asymmetric linksRam Ramanathan, BBN TechnologiesKDD (Data Mining)2020On Sampled Metrics for Item RecommendationWalid Krichene & Steffen Rendle, Google2019Optimizing Impression Counts for Outdoor AdvertisingYipeng Zhang, RMIT University; et al.2018Adversarial Attacks on Neural Networks for Graph DataDaniel Zügner, Technical University of Munich; et al.2017Accelerating Innovation Through Analogy MiningTom Hope, Hebrew University of Jerusalem; et al.2016FRAUDAR: Bounding Graph Fraud in the Face of CamouflageBryan Hooi, Carnegie Mellon University; et al.2015Efficient Algorithms for Public-Private Social NetworksFlavio Chierichetti, Sapienza University of Rome; et al.2014Reducing the Sampling Complexity of Topic ModelsAaron Li, Carnegie Mellon University; et al.2013Simple and Deterministic Matrix SketchingEdo Liberty, Yahoo2012Searching and Mining Trillions of Time Series Subsequences under Dynamic Time WarpingThanawin Rakthanmanon, University of California, Riverside; et al.2011Leakage in Data Mining: Formulation, Detection, and AvoidanceShachar Kaufman, Tel Aviv University; et al.2010Connecting the dots between news articlesDafna Shahaf & Carlos Guestrin, Carnegie Mellon UniversityLarge linear classification when data cannot fit in memoryHsiang-Fu Yu, National Taiwan University; et al.2009Collaborative Filtering with Temporal DynamicsYehuda Koren, Yahoo2008Fastanova: an efficient algorithm for genome-wide association studyXiang Zhang, University of North Carolina at Chapel Hill; et al.2007Predictive discrete latent factor models for large scale dyadic dataDeepak Agarwal & Srujana Merugu, Yahoo2006Training linear SVMs in linear timeThorsten Joachims, Cornell University2005Graphs over time: densification laws, shrinking diameters and possible explanationsJure Leskovec, Carnegie Mellon University; et al.2004A probabilistic framework for semi-supervised clusteringSugato Basu, University of Texas at Austin; et al.2003Maximizing the spread of influence through a social networkDavid Kempe, Cornell University; et al.2002Pattern discovery in sequences under a Markov assumptionDarya Chudova & Padhraic Smyth, University of California, Irvine2001Robust space transformations for distance-based operationsEdwin M. Knorr, University of British Columbia; et al.2000Hancock: a language for extracting signatures from data streamsCorinna Cortes, AT&T Laboratories; et al.1999MetaCost: a general method for making classifiers cost-sensitivePedro Domingos, Universidade Técnica de Lisboa1998Occam's Two Razors: The Sharp and the BluntPedro Domingos, Universidade Técnica de Lisboa1997Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Di...Foster Provost & Tom Fawcett, NYNEX Science and TechnologyMOBICOM (Mobile)2019eBP: A Wearable System For Frequent and Comfortable Blood Pressure Monitoring From User’s EarNam Bui, UC Boulder; et al.FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device InteractionSangeun Oh, KAIST; et al.2018SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE NetworksMehrdad Moradi, University of Michigan; et al.2017WEBee: Physical-Layer Cross-Technology Communication via EmulationZhijun Li & Tian He, University of Minnesota2015CAreDroid: Adaptation Framework for Android ContextAware ApplicationsSalma Elmalaki, University of California, Los Angeles; et al.2014Tagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS DevicesLei Yang, Tsinghua University; et al.2013Whole-Home Gesture Recognition Using Wireless SignalsQifan Pu, University of Washington; et al.2012Distinguishing Users with Capacitative Touch CommunicationTam Vu, Rutgers University; et al.2011E-MiLi: Energy-Minimizing Idle Listening in Wireless NetworksXinyu Zhang & Kang G. Shin, University of MichiganDetecting Driver Phone Use Leveraging Car SpeakersJie Yang, Stevens Institute of Technology; et al.2010The κ Factor: Inferring Protocol Performance UsingInter-link Reception CorrelationKannan Srinivasan, Stanford University; et al.2009CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data PathVivek Shrivastava, University of Wisconsin–Madison; et al.2008Assessment of Urban-Scale Wireless Networks with a Small Number of MeasurementsJoshua Robinson, Rice University; et al.NeurIPS (Machine Learning)2019Distribution-Independent PAC Learning of Halfspaces with Massart NoiseIlias Diakonikolas, University of Southern California; et al.2018Non-delusional Q-learning and Value-iterationTyler Lu, Google; et al.Optimal Algorithms for Non-Smooth Distributed Optimization in NetworksKevin Scaman, Huawei Noah’s Ark Lab; et al.Nearly Tight Sample Complexity Bounds for Learning Mixtures of Gaussians via Sample Compression Sc...Hassan Ashtiani, McMaster University and Vector Institute; et al.Neural Ordinary Differential EquationsTian Qi Chen, University of Toronto and Vector Institute; et al.2017Safe and Nested Subgame Solving for Imperfect-Information GamesNoam Brown & Tuomas Sandholm, Carnegie Mellon UniversityVariance-based Regularization with Convex ObjectivesHongseok Namkoong & John Duchi, Stanford UniversityA Linear-Time Kernel Goodness-of-Fit TestWittawat Jitkrittum, University College London; et al.2016 Value Iteration NetworksAviv Tamar, University of California, Berkeley; et al.2015Competitive Distribution Estimation: Why is Good-Turing GoodAlon Orlitsky & Ananda Suresh, University of California, San DiegoFast Convergence of Regularized Learning in GamesVasilis Syrgkanis, Microsoft; et al.2014Asymmetric LSH (ALSH) for Sublinear Time Maximum Inner Product Search (MIPS)Anshumali Shrivastava, Cornell University
Ping Li, Rutgers UniversityA* SamplingChristopher Maddison, University of Toronto; et al.2013A memory frontier for complex synapsesSubhaneil Lahiri, Stanford University)
Surya Ganguli, Stanford UniversitySubmodular Optimization with Submodular Cover and Submodular Knapsack ConstraintsRishabh Iyer & Jeff Bilmes, University of WashingtonScalable Influence Estimation in Continuous-Time Diffusion NetworksNan Du, Georgia Institute of Technology; et al.NSDI (Networking)2020Understanding, Detecting and Localizing Partial Failures in Large System SoftwareChang Lou, Johns Hopkins University; et al.AmphiLight: Direct Air-Water Communication with Laser LightCharles J. Carver, Dartmouth College; et al.2019Datacenter RPCs can be General and FastZhenpeng Chen, Peking University; et al.Understanding Lifecycle Management Complexity of Datacenter TopologiesAmin Kharraz, University of Illinois at Urbana–Champaign; et al.2018NetChain: Scale-Free Sub-RTT CoordinationXin Jin, Johns Hopkins University; et al.2017mOS: A Reusable Networking Stack for Flow Monitoring MiddleboxesMuhammad Asim Jamshed, KAIST; et al.2016Passive Wi-Fi: Bringing Low Power to Wi-Fi TransmissionsBryce Kellogg, University of Washington; et al.2015The Design and Implementation of Open vSwitchBen Pfaff, VMware Inc.; et al.Queues Don't Matter When You Can JUMP Them!Matthew P. Grosvenor, University of Cambridge; et al.Designing Distributed Systems Using Approximate Synchrony in Data Center NetworksDan R. K. Ports, University of Washington; et al.2014Software Dataplane VerificationMihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne2013A Fault-Tolerant Engineered NetworkVincent Liu, University of Washington; et al.Embassies: Radically Refactoring the WebJon Howell, Microsoft; et al.2012Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingMatei Zaharia, University of California, Berkeley; et al.2011ServerSwitch: A Programmable and High Performance Platform for Data Center NetworksGuohan Lu, Microsoft; et al.Design, Implementation and Evaluation of Congestion Control for Multipath TCPDamon Wischik, University College London; et al.2010Reverse tracerouteEthan Katz-Bassett, University of Washington; et al.2009TrInc: Small Trusted Hardware for Large Distributed SystemsDave Levin, University of Maryland; et al.Sora: High Performance Software Radio Using General Purpose Multi-core ProcessorsKun Tan, Microsoft; et al.2008Remus: High Availability via Asynchronous Virtual Machine ReplicationBrendan Cully, University of British Columbia; et al.Consensus Routing: The Internet as a Distributed SystemJohn P. John, University of Washington; et al.2007Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems CodeCharles Killian, University of California, San Diego; et al.2006Experience with an Object Reputation System for Peer-to-Peer FilesharingKevin Walsh & Emin Gün Sirer, Cornell UniversityAvailability of Multi-Object OperationsHaifeng Yu, Intel Research Pittsburgh; et al.2005Detecting BGP Configuration Faults with Static AnalysisNick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology2004Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Netwo...Philip Levis, University of California, Berkeley; et al.OSDI (Operating Systems)2018REPT: Reverse Debugging of Failures in Deployed SoftwareWeidong Cui, Microsoft; et al.LegoOS: A Disseminated, Distributed OS for Hardware Resource DisaggregationYizhou Shan, Purdue University; et al.Orca: Differential Bug Localization in Large-Scale ServicesRanjita Bhagwan, Microsoft; et al.2016Ryoan: A Distributed Sandbox for Untrusted Computation on Secret DataTyler Hunt, University of Texas at Austin; et al.Early Detection of Configuration Errors to Reduce Failure DamageTianyin Xu, University of California, San Diego; et al.Push-Button Verification of File Systems via Crash RefinementHelgi Sigurbjarnarson, University of Washington; et al.2014Arrakis: The Operating System is the Control PlaneSimon Peter, University of Washington; et al.Shielding Applications from an Untrusted Cloud with HavenAndrew Baumann, Microsoft; et al.IX: A Protected Dataplane Operating System for High Throughput and Low LatencyAdam Belay, Stanford University; et al.2012Spanner: Google's Globally-Distributed DatabaseJames C. Corbett, Google; et al.2010Efficient System-Enforced Deterministic ParallelismAmittai Aviram, Yale University; et al.The Turtles Project: Design and Implementation of Nested VirtualizationMuli Ben-Yehuda, IBM; et al.2008KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems ProgramsCristian Cadar, Stanford University; et al.DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Lan...Yuan Yu, Microsoft; et al.Difference Engine: Harnessing Memory Redundancy in Virtual MachinesDiwaker Gupta, University of California, San Diego; et al.2006Rethink the SyncEdmund B. Nightingale, University of Michigan; et al.Bigtable: A Distributed Storage System for Structured DataFay Chang, Google; et al.2004Recovering Device DriversMichael M. Swift, University of Washington; et al.Using Model Checking to Find Serious File System ErrorsJunfeng Yang, Stanford University; et al.2002Memory Resource Management in VMware ESX ServerCarl A. Waldspurger, VMware Inc.2000Checking System Rules Using System-Specific, Programmer-Written Compiler ExtensionsDawson Engler, Stanford University; et al.1999IO-Lite: A Unified I/O Buffering and Caching SystemVivek S. Pai, Rice University; et al.1996Automatic Compiler-Inserted I/O Prefetching for Out-of-Core ApplicationsTodd C. Mowry, University of Toronto; et al.Safe Kernel Extensions Without Run-Time CheckingGeorge C. Necula & Peter Lee, Carnegie Mellon UniversityPLDI (Programming Languages)2018Program synthesis using conflict-driven learningYu Feng, University of Texas at Austin; et al.A data-driven CHC solverHe Zhu, Galois; et al.The Semantics of Transactions and Weak Memory in x86, Power, ARM, and C++Nathan Chong, weapon; et al.2017Low Overhead Dynamic Binary Translation on ARMAmanieu D'Antras, University of Manchester; et al.Repairing sequential consistency in C/C++11Ori Lahav, Max Planck Institute for Software Systems; et al.Compiling without continuationsLuke Maurer, University of Oregon; et al.Bringing the web up to speed with WebAssemblyAndreas Haas, Google; et al.2016Into the Depths of C: Elaborating the De Facto StandardsKayvan Memarian, University of Cambridge; et al.Transactional Data Structure LibrariesAlexander Spiegelman, Technion – Israel Institute of Technology; et al.Types from data: Making structured data first-class citizens in F#Tomas Petricek, University of Cambridge; et al.Assessing the limits of program-specific garbage collection performanceNicholas Jacek, University of Massachusetts Amherst; et al.2015Automatically Improving Accuracy for Floating Point ExpressionsPavel Panchekha, University of Washington; et al.Diagnosing Type Errors with ClassDanfeng Zhang, Cornell University; et al.Provably Correct Peephole Optimizations with AliveNuno P. Lopes, Microsoft; et al.2014Compiler validation via equivalence modulo inputsVu Le, University of California, Davis; et al.Improving JavaScript Performance by Deconstructing the Type SystemWonsun Ahn, University of Illinois at Urbana–Champaign; et al.On Abstraction Refinement for Program Analyses in DatalogXin Zhang, Georgia Institute of Technology; et al.2013A General Constraint-centric Scheduling Framework for Spatial ArchitecturesTony Nowatzki, University of Wisconsin–Madison; et al.CLAP: Recording Local Executions to Reproduce Concurrency FailuresJeff Huang, Hong Kong University of Science and Technology; et al.Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many ...Sriram Sankaranarayanan, University of Colorado Boulder; et al.Reconciling Exhaustive Pattern Matching with ObjectsChinawat Isradisaikul & Andrew C. Myers, Cornell University2012Concurrent Data Representation SynthesisPeter Hawkins, Stanford University; et al.2011Data Representation SynthesisPeter Hawkins, Stanford University; et al.2010Safe to the Last Instruction: Automated Verification of a Type-Safe Operating SystemJean Yang, Massachusetts Institute of Technology
Chris Hawblitzel, Microsoft2009Binary Analysis for Measurement and Attribution of Program PerformanceNathan Tallent, Rice University; et al.2007Fault-tolerant Typed Assembly LanguageFrances Perry, Princeton University; et al.The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of CodeBen Hardekopf & Calvin Lin, University of Texas at Austin2005Automatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the HeapChris Lattner & Vikram Adve, University of Illinois at Urbana–ChampaignProgramming by Sketching for Bit-Streaming ProgramsArmando Solar-Lezama, University of California, Berkeley; et al.2004Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision DiagramsJohn Whaley & Monica S. Lam, Stanford University2003Automatically Proving the Correctness of Compiler OptimizationsSorin Lerner, University of Washington; et al.2000Dynamo: a transparent dynamic optimization systemVasanth Bala, Hewlett Packard Labs; et al.1999Whole program pathsJames R. Larus, MicrosoftPODS (Databases)2019Interventional Fairness: Causal Database Repair for Algorithmic FairnessBabak Salimi, University of Washington; et al.2018Entity Matching with Active Monotone ClassificationYufei Tao, The Chinese University of Hong Kong2017Dichotomies in Ontology-Mediated Querying with the Guarded FragmentAndré Hernich, University of Liverpool; et al.2016FAQ: Questions Asked FrequentlyMahmoud Abo Khamis, University at Buffalo; et al.2015Parallel-Correctness and Transferability for Conjunctive QueriesTom J. Ameloot, Hasselt University; et al.2014Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Co...Tom J. Ameloot, Hasselt University; et al.2013Verification of database-driven systems via amalgamationMikołaj Bojańczyk, University of Warsaw; et al.2012Worst-case Optimal Join AlgorithmsHung Q. Ngo, University at Buffalo; et al.2011Data Exchange Beyond Complete DataMarcelo Arenas, Pontifical Catholic University of Chile; et al.2010An Optimal Algorithm for the Distinct Elements ProblemDaniel M. Kane, Harvard University; et al.2009Size and Treewidth Bounds for Conjunctive QueriesGeorg Gottlob, University of Oxford; et al.2008Estimating PageRank on Graph StreamsAtish Das Sarma, Georgia Institute of Technology; et al.2007Generalized Hypertree Decompositions: NP-Hardness and Tractable VariantsGeorg Gottlob, University of Oxford; et al.2006Two-variable logic on data trees and XML reasoningMikolaj Bojanczyk, University of Warsaw; et al.2005On the complexity of division and set joins in the relational algebraDirk Leinders & Jan Van den Bussche, Limburgs Universitair CentrumXML data exchange: consistency and query answeringMarcelo Arenas & Leonid Libkin, University of Toronto2004Conditional XPath, the first order complete XPath dialectMaarten Marx, University of Amsterdam2003An Information-Theoretic Approach to Normal Forms for Relational and XML DataMarcelo Arenas & Leonid Libkin, University of Toronto2002Monadic Datalog and the Expressive Power of Languages for Web Information ExtractionGeorg Gottlob & Christoph Koch, TU Wien2001Optimal aggregation algorithms for middlewareRonald Fagin, IBM; et al.2000Auditing Boolean attributesJon Kleinberg, Cornell University; et al.1999Exact and approximate aggregation in constraint query languagesMichael Benefikt & Leonid Libkin, Bell Labs1998Expressiveness of structured document query languages based on attribute grammarsFrank Neven & Jan Van den Bussche, Limburgs Universitair CentrumA lower bound theorem for indexing schemes and its application to multidimensional range queriesVasilis Samoladas & Daniel P. Miranker, University of Texas at Austin1997On the Complexity of Database QueriesChristos H. Papadimitriou, University of California, Berkeley
Mihalis Yannakakis, Bell LabsS&P (Security and Privacy)2020TRRespass: Exploiting the Many Sides of Target Row RefreshPietro Frigo, Vrije Universiteit Amsterdam; et al.2019Understanding Lifecycle Management Complexity of Datacenter TopologiesMingyang Zhang, University of Southern California; et al.2018On Enforcing the Digital Immunity of a Large Humanitarian OrganizationStevens Le Blond, École Polytechnique Fédérale de Lausanne; et al.DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and PracticeVincent Cheval, Inria; et al.2017Verified Models and Reference Implementations for the TLS 1.3 Standard CandidateKarthikeyan Bhargavan, Inria; et al.2016A2: Analog Malicious HardwareKaiyuan Yang, University of Michigan; et al.2015A Messy State of the Union: Taming the Composite State Machines of TLSBenjamin Beurdouche, Inria; et al.Riposte: An Anonymous Messaging System Handling Millions of UsersHenry Corrigan-Gibbs, Stanford University; et al.2014Secure Multiparty Computations on BitCoinMarcin Andrychowicz, University of Warsaw; et al.2013Pinocchio: Nearly Practical Verifiable ComputationBryan Parno, Microsoft; et al.2012Don't Trust Satellite Phones: A Security Analysis of Two Satphone StandardsBenedikt Driessen, Ruhr University Bochum; et al.2011Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iksAndrew M. White, University of North Carolina at Chapel Hill; et al.2010SCiFI - A System for Secure Face IdentificationMargarita Osadchy, University of Haifa; et al.2009Native Client: A Sandbox for Portable, Untrusted x86 Native CodeBennet Yee, Google; et al.2008Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power DefensesDaniel Halperin, University of Washington; et al.SIGCOMM (Networking)2020Routing on Multiple Optimality CriteriaJoão Luís Sobrinho & Miguel Alves Ferreira, University of Lisbon2019Underwater Backscatter NetworkingJunsu Jang & Fadel Abib, MIT Media Lab2018Inferring Persistent Interdomain CongestionSaksham Agarwal, Cornell University; et al.2017Re-architecting datacenter networks and stacks for low latency and high performanceMark Handley, University College London; et al.Language-directed hardware design for network performance monitoringSrinivas Narayana, Massachusetts Institute of Technology; et al.2016Don't Mind the Gap: Bridging Network-wide Objectives and Device-level ConfigurationsRyan Beckett, Princeton University; et al.Eliminating Channel Feedback in Next-Generation Cellular NetworksDeepak Vasisht, Massachusetts Institute of Technology; et al.Inter-Technology Backscatter: Towards Internet Connectivity for Implanted DevicesVikram Iyer, University of Washington; et al.2015Central Control Over Distributed RoutingStefano Vissicchio, Université catholique de Louvain; et al.2014Balancing Accountability and Privacy in the NetworkDavid Naylor, Carnegie Mellon University; et al.CONGA: Distributed Congestion-Aware Load Balancing for DatacentersMohammad Alizadeh, Cisco Systems; et al.2013Ambient Backscatter: Wireless Communication Out of Thin AirVincent Liu, University of Washington; et al.2012Multi-Resource Fair Queueing for Packet ProcessingAli Ghodsi, University of California, Berkeley; et al.2011They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical DevicesShyamnath Gollakota, Massachusetts Institute of Technology; et al.2010Efficient Error Estimating Coding: Feasibility and ApplicationsBinbin Chen, National University of Singapore; et al.2009White Space Networking with Wi-Fi like ConnectivityParamvir Bahl, Microsoft; et al.2008ZigZag Decoding: Combating Hidden Terminals in Wireless NetworksShyamnath Gollakota & Dina Katabi, Massachusetts Institute of TechnologySIGIR (Information Retrieval)2019Variance Reduction in Gradient Exploration for Online Learning to RankHuazheng Wang, University of Virginia; et al.2018Should I Follow the Crowd? A Probabilistic Analysis of the Effectiveness of Popularity in Recommen...Rocío Cañamares & Pablo Castells, Autonomous University of Madrid2017BitFunnel: Revisiting Signatures for SearchBob Goodwin, Microsoft; et al.2016Understanding Information Need: An fMRI StudyYashar Moshfeghi, University of Glasgow; et al.2015QuickScorer: A Fast Algorithm to Rank Documents with Additive Ensembles of Regression TreesClaudio Lucchese, Istituto di Scienza e Tecnologie dell'Informazione; et al.2014Partitioned Elias-Fano IndexesGiuseppe Ottaviano, Istituto di Scienza e Tecnologie dell'Informazione
Rossano Venturini, University of Pisa2013Beliefs and Biases in Web SearchRyen W. White, Microsoft2012Time-Based Calibration of Effectiveness MeasuresMark Smucker & Charles Clarke, University of Waterloo2011Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction DataMikhail Ageev, Moscow State University; et al.2010Assessing the Scenic Route: Measuring the Value of Search Trails in Web LogsRyen W. White, Microsoft
Jeff Huang, University of Washington2009Sources of evidence for vertical selectionJaime Arguello, Carnegie Mellon University; et al.2008Algorithmic Mediation for Collaborative Exploratory SearchJeremy Pickens, FX Palo Alto Lab; et al.2007Studying the Use of Popular Destinations to Enhance Web Search InteractionRyen W. White, Microsoft; et al.2006Minimal Test Collections for Retrieval EvaluationBen Carterette, University of Massachusetts Amherst; et al.2005Learning to estimate query difficulty: including applications to missing content detection and dis...Elad Yom-Tov, IBM; et al.2004A Formal Study of Information Retrieval HeuristicsHui Fang, University of Illinois at Urbana–Champaign; et al.2003Re-examining the potential effectiveness of interactive query expansionIan Ruthven, University of Strathclyde2002Novelty and redundancy detection in adaptive filteringYi Zhang, Carnegie Mellon University; et al.2001Temporal summaries of new topicsJames Allan, University of Massachusetts Amherst; et al.2000IR evaluation methods for retrieving highly relevant documentsKalervo Järvelin & Jaana Kekäläinen, University of Tampere1999Cross-language information retrieval based on parallel texts and automatic mining of parallel text...Jian-Yun Nie, Université de Montréal; et al.1998A theory of term weighting based on exploratory data analysisWarren R. Greiff, University of Massachusetts Amherst1997Feature selection, perceptron learning, and a usability case study for text categorizationHwee Tou Ng, Defence Science Organisation; et al.1996Retrieving spoken documents by combining multiple index sourcesGareth Jones, University of Cambridge; et al.SIGMETRICS (Performance)2020Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix-Vector MultiplicationAnkur Mallik, Carnegie Mellon University; et al.2019Computationally Efficient Estimation of the Spectral Gap of a Markov ChainRichard Combes, Concours Centrale-Supélec
Mikael Touati, Orange Labs2018A Refined Mean Field ApproximationNicolas Gast, Inria
Benny Van Houdt, University of Antwerp2017Accelerating Performance Inference over Closed Systems by Asymptotic MethodsGiuliano Casale, Imperial College London2016On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with FitnessBo Jiang, University of Massachusetts Amherst; et al.2015Spy vs. Spy: Rumor Source ObfuscationGiulia Fanti, University of California, Berkeley; et al.2014Concave switching in single and multihop networksNeil Walton, University of Amsterdam2013Queueing System Topologies with Limited FlexibilityJohn Tsitsiklis & Kuang Xu, Massachusetts Institute of Technology2012Temperature management in data centers: why some (might) like it hotNosayba El-Sayed, University of Toronto; et al.2011Topology Discovery of Sparse Random Graphs With Few ParticipantsAnimashree Anandkumar, University of California, Irvine; et al.2010Load balancing via random local search in closed and open systemsAyalvadi Ganesh, University of Bristol; et al.2009The Age of Gossip: Spatial Mean Field RegimeAugustin Chaintreau, Technicolor; et al.2008Counter Braids: A Novel Counter Architecture for Per-Flow MeasurementYi Lu, Stanford University; et al.2007Modeling the Relative Fitness of StorageMichael P. Mesnier, Intel; et al.2006Maximizing throughput in wireless networks via gossipingEytan Modiano, Massachusetts Institute of Technology; et al.2005Coupon replication systemsLaurent Massoulié & Milan Vojnović, Microsoft2004On performance bounds for the integration of elastic and adaptive streaming flowsThomas Bonald & Alexandre Proutiere, France Telecom1996Supporting stored video: reducing rate variability and end-to-end resource requirements through op...James D. Salehi, University of Massachusetts Amherst; et al.Exploiting Process Lifetime Distributions for Dynamic Load BalancingMor Harchol-Balter & Allen B. Downey, University of California, BerkeleySIGMOD (Databases)2020ShapeSearch: A Flexible and Efficient System for Shape-based Exploration of TrendlinesTarique Siddiqui, University of Illinois at Urbana–Champaign; et al.Pump Up the Volume: Processing Large Data on GPUs with Fast InterconnectsClemens Lutz, DFKI GmbH; et al.2019Interventional Fairness: Causal Database Repair for Algorithmic FairnessBabak Salimi, University of Washington; et al.2018SuRF: Practical Range Query Filtering with Fast Succinct TriesHuanchen Zhang, Carnegie Mellon University; et al.2017Parallelizing Sequential Graph ComputationsWenfei Fan, University of Edinburgh; et al.2016Wander Join: Online Aggregation via Random WalksFeifei Li, University of Utah; et al.2015DBSCAN Revisited: Mis-Claim, Un-Fixability, and ApproximationJunhao Gan & Yufei Tao, The Chinese University of Hong Kong2014Materialization Optimizations for Feature Selection WorkloadsCe Zhang, Stanford University; et al.2013Massive Graph TriangulationXiaocheng Hu, The Chinese University of Hong Kong; et al.2012High-Performance Complex Event Processing over XML StreamsBarzan Mozafari, Massachusetts Institute of Technology; et al.2011Entangled Queries: Enabling Declarative Data-Driven CoordinationNitin Gupta, Cornell University; et al.2010FAST: fast architecture sensitive tree search on modern CPUs and GPUsChangkyu Kim, Intel; et al.2009Generating example data for dataflow programsChristopher Olston, Yahoo; et al.2008Serializable isolation for snapshot databasesMichael J. Cahill, University of Sydney; et al.Scalable Network Distance Browsing in Spatial DatabasesHanan Samet, University of Maryland; et al.2007Compiling mappings to bridge applications and databasesSergey Melnik, Microsoft; et al.Scalable Approximate Query Processing with the DBO EngineChristopher Jermaine, University of Florida; et al.2006To search or to crawl?: towards a query optimizer for text-centric tasksPanagiotis G. Ipeirotis, New York University; et al.2004Indexing spatio-temporal trajectories with Chebyshev polynomialsYuhan Cai & Raymond T. Ng, University of British Columbia2003Spreadsheets in RDBMS for OLAPAndrew Witkowski, Oracle Corporation; et al.2001Locally adaptive dimensionality reduction for indexing large time series databasesEamonn Keogh, University of California, Irvine; et al.2000XMill: an efficient compressor for XML dataHartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories1999DynaMat: a dynamic view management system for data warehousesYannis Kotidis & Nick Roussopoulos, University of Maryland1998Efficient transparent application recovery in client-server information systemsDavid Lomet & Gerhard Weikum, MicrosoftIntegrating association rule mining with relational database systems: alternatives and implicationsSunita Sarawagi, IBM; et al.1997Fast parallel similarity search in multimedia databasesStefan Berchtold, Ludwig Maximilian University of Munich; et al.1996Implementing data cubes efficientlyVenky Harinarayan, Stanford University; et al.Fast Subsequence Matching in Time-Series DatabasesChristos Faloutsos, University of Maryland at College Park; et al.1994AlphaSort: A RISC Machine SortChris Nyberg, Digital Equipment Corporation; et al.SODA (Theory)2020Chasing Convex Bodies OptimallyMark Sellke, Stanford UniversityChasing Convex Bodies with Linear Competitive RatioC.J. Argue, Carnegie Mellon University; et al.2019Sublinear Algorithms for (∆ + 1) Vertex ColoringSepehr Assadi, University of Pennsylvania; et al.2018Approaching 3/2 for the s-t-path TSPVera Traub & Jens Vygen, University of BonnOnline Bipartite Matching with Amortized O(log2 N)ReplacementsAaron Bernstein, Technical University of Berlin; et al.2017Subquadratic Algorithms for the Diameter and the Sum of Pairwise Distances in Planar GraphsSergio Cabello, University of LjubljanaA (2 + Є) Approximation for Maximum Weight Matching in the Semi-Streaming ModelAmi Paz, Institut de Recherche en Informatique Fondamentale
Gregory Schwartzman, National Institute of Informatics2016An Improved Distributed Algorithm for Maximal Independent SetMohsen Ghaffari, Massachusetts Institute of TechnologyNear-Optimal Light SpannersShiri Chechik, Tel Aviv University
Christian Wulff-Nilsen, University of Copenhagen2015The Parameterized Complexity of k-BicliqueBingkai Lin, University of Tokyo2014Polynomiality for Bin Packing with a Constant Number of Item TypesMichel X. Goemans & Thomas Rothvoß, Massachusetts Institute of TechnologyAn Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommod...Jonathan A. Kelner, Massachusetts Institute of Technology; et al.2013A Simple Algorithm for the Graph Minor Decomposition - Logic meets Structural Graph TheoryMartin Grohe, RWTH Aachen University; et al.Dynamic graph connectivity in polylogarithmic worst case timeBruce M. Kapron, University of Victoria; et al.2012Computing all maps into a sphereMartin Čadek, Masaryk University; et al.2011An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss TransformNir Ailon, Technion – Israel Institute of Technology
Edo Liberty, Yahoo2010An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman ProblemArash Asadpour, Stanford University; et al.2009Natural AlgorithmsBernard Chazelle, Princeton UniversitySOSP (Operating Systems)2019Scaling symbolic evaluation for automated verification of systems code with ServalLuke Nelson, University of Washington; et al.Efficient Scalable Thread-Safety-Violation DetectionGuangpu Li, University of Chicago; et al.2017The Efficient Server Audit Problem, Deduplicated Re-execution, and the WebCheng Tan, New York University; et al.DeepXplore: Automated Whitebox Testing of Deep Learning SystemsKexin Pei, Columbia University; et al.2015Pivot Tracing: Dynamic Causal Monitoring for Distributed SystemsJonathan Mace, Brown University; et al.Using Crash Hoare Logic for Certifying the FSCQ File SystemHaogang Chen, Massachusetts Institute of Technology; et al.Coz: Finding Code that Counts with Causal ProfilingCharlie Curtsinger, Grinnell College
Emery Berger, University of Massachusetts Amherst2013The Scalable Commutativity Rule: Designing Scalable Software for Multicore ProcessorsAustin T. Clements, Massachusetts Institute of Technology; et al.Towards optimization-safe systems: analyzing the impact of undefined behaviorXi Wang, Massachusetts Institute of Technology; et al.Naiad: A Timely Dataflow SystemDerek G. Murray, Microsoft; et al.2011Cells: A Virtual Mobile Smartphone ArchitectureJeremy Andrus, Columbia University; et al.A File is Not a File: Understanding the I/O Behavior of Apple Desktop ApplicationsTyler Harter, University of Wisconsin–Madison; et al.2009FAWN: A Fast Array of Wimpy NodesDavid G. Andersen, Carnegie Mellon University; et al.RouteBricks: Exploiting Parallelism to Scale Software RoutersMihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al.seL4: Formal Verification of an OS KernelGerwin Klein, National ICT Australia; et al.2007Sinfonia: a new paradigm for building scalable distributed systemsMarcos K. Aguilera, Hewlett Packard Labs; et al.Zyzzyva: speculative byzantine fault toleranceRamakrishna Kotla, University of Texas at Austin; et al.Secure Web Applications via Automatic PartitioningStephen Chong, Cornell University; et al.2005Rx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, University of Illinois at Urbana–Champaign; et al.BAR Tolerance for Cooperative ServicesAmitanand S. Aiyer, University of Texas at Austin; et al.Speculative Execution in a Distributed File SystemEdmund B. Nightingale, University of Michigan; et al.Vigilante: End-to-End Containment of Internet WormsManuel Costa, University of Cambridge; et al.2003Improving the Reliability of Commodity Operating SystemsMichael M. Swift, University of Washington; et al.Preserving peer replicas by rate-limited sampled votingPetros Maniatis, Stanford University; et al.Backtracking intrusionsSamuel T. King & Peter M. Chen, University of Michigan2001Untrusted hosts and confidentiality: secure program partitioningSteve Zdancewic, Cornell University; et al.BASE: using abstraction to improve fault toleranceRodrigo Rodrigues, Massachusetts Institute of Technology; et al.1999Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail se...Yasushi Saito, University of Washington; et al.Cellular Disco: resource management using virtual clusters on shared-memory multiprocessorsKinshuk Govil, Stanford University; et al.The Click modular routerRobert Morris, Massachusetts Institute of Technology; et al.Soft timers: efficient microsecond software timer support for network processingMohit Aron & Peter Druschel, Rice University1997Eraser: a dynamic data race detector for multithreaded programsStefan Savage, University of Washington; et al.Continuous profiling: where have all the cycles gone?Jennifer M. Anderson, Digital Equipment Corporation; et al.Disco: running commodity operating systems on scalable multiprocessorsEdouard Bugnion, Stanford University; et al.STOC (Theory)2020Improved Bounds for The Sunflower LemmaRyan Alweiss, Princeton University; et al.2019The Reachability Problem for Petri Nets is Not ElementaryWojciech Czerwinski, University of Warsaw; et al.2018A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman ProblemOla Svensson, École Polytechnique Fédérale de Lausanne; et al.2017Explicit, Almost Optimal, Epsilon-Balanced CodesAmnon Ta-Shma, Tel Aviv UniversityDeciding Parity Games in Quasipolynomial TimeCristian S. Calude, University of Auckland; et al.A Weighted Linear Matroid Parity AlgorithmSatoru Iwata, University of Tokyo
Yusuke Kobayashi, University of Tsukuba2016Reed-Muller Codes Achieve Capacity on Erasure ChannelsShrinivas Kudekar, Qualcomm; et al.Explicit Two-Source Extractors and Resilient FunctionsEshan Chattopadhyay & David Zuckerman, University of Texas at AustinGraph Isomorphism in Quasipolynomial TimeLászló Babaí, University of Chicago2015Exponential Separation of Information and Communication for Boolean FunctionsAnat Ganor, Weizmann Institute of Science; et al.Lower Bounds on the Size of Semidefinite Programming RelaxationsJames R. Lee, University of Washington; et al.2-Server PIR with sub-polynomial communicationZeev Dvir & Sivakanth Gopi, Princeton University2014The matching polytope has exponential extension complexityThomas Rothvoß, University of Washington2013Approximation Resistance from Pairwise Independent SubgroupsSiu On Chan, University of California, BerkeleyLow Rank Approximation and Regression in Input Sparsity TimeKenneth L. Clarkson & David P. Woodruff, IBM2012Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower BoundsSamuel Fiorini, Free University of Brussels; et al.The Cell Probe Complexity of Dynamic Range CountingKasper Larsen, Aarhus University2011Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphsPaul Christiano, Massachusetts Institute of Technology; et al.Subexponential lower bounds for randomized pivoting rules for the simplex algorithmOliver Friedmann, Ludwig Maximilian University of Munich; et al.2010QIP = PSPACERahul Jain, National University of Singapore; et al.An improved LP-based approximation for steiner treeJaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al.2009A constructive proof of the Lovász local lemmaRobin A. Moser, ETH ZurichPublic-Key Cryptosystems from the Worst-Case Shortest Vector ProblemChris Peikert, SRI International2008Optimal hierarchical decompositions for congestion minimization in networksHarald Räcke, University of WarwickOptimal algorithms and inapproximability results for every CSP?Prasad Raghavendra, University of Washington2007Faster integer multiplicationMartin Fürer, Pennsylvania State UniversityTowards 3-query locally decodable codes of subexponential lengthSergey Yekhanin, Massachusetts Institute of Technology2006The PCP theorem by gap amplificationIrit Dinur, Hebrew University of Jerusalem2005Undirected ST-connectivity in log-spaceOmer Reingold, Weizmann Institute of Science2004Expander flows, geometric embeddings and graph partitioningSanjeev Arora, Princeton University; et al.Multi-linear formulas for permanent and determinant are of super-polynomial sizeRan Raz, Weizmann Institute of Science2003Derandomizing polynomial identity tests means proving circuit lower boundsValentine Kabanets & Russell Impagliazzo, University of California, San DiegoNew lattice-based cryptographic constructionsOded Regev, Tel Aviv UniversityUIST (User Interface)2019TipText: Eyes-Free Text Entry on a Fingertip KeyboardZheer Xu, Dartmouth College; et al.2018Authoring and Verifying Human-Robot InteractionsDavid Porfirio, University of Wisconsin–Madison; et al.Porta: Profiling Software Tutorials Using Operating-System-Wide Activity TracingAlok Mysore & Philip J. Guo, University of California, San DiegoRESi: A Highly Flexible, Pressure-Sensitive, Imperceptible Textile Interface Based on Resistive Ya...Patrick Parzer, University of Applied Sciences Upper Austria; et al.2017Triggering Artwork Swaps for Live AnimationNora S. Willett, Princeton University; et al.Grabity: A Wearable Haptic Interface for Simulating Weight and Grasping in Virtual RealityInrak Choi, Stanford University; et al.AirCode: Unobtrusive Physical Tags for Digital FabricationDingzeyu Li, Columbia University; et al.2016Rovables: Miniature On-Body Robots as Mobile WearablesArtem Dementyev, Massachusetts Institute of Technology; et al.Zooids: Building Blocks for Swarm User InterfacesMathieu Le Goc, Inria; et al.proCover: Sensory Augmentation of Prosthetic Limbs Using Smart Textile CoversJoanne Leong, University of Applied Sciences Upper Austria; et al.ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch AccelerometersGierad Laput, Carnegie Mellon University; et al.2015Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electr...Simon Olberding, Max-Planck-Institut für Limnologie; et al.Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye MovementsAugusto Esteves, University of Lancaster; et al.Webstrates: Shareable Dynamic MediaClemens Klokmose, Aarhus University; et al.2014Sensing Techniques for Tablet+Stylus InteractionKen Hinckley, Microsoft; et al.Expert Crowdsourcing with Flash TeamsDaniela Retelny, Stanford University; et al.PrintScreen: Fabricating Highly Customizable Thin-film Touch-DisplaysSimon Olberding, Max-Planck-Institut für Limnologie; et al.2013PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing InterfacesLining Yao, Massachusetts Institute of Technology; et al.Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic SensingMakoto Ono, University of Tsukuba; et al.Fiberio: A Touchscreen that Senses FingerprintsChristian Holz & Patrick Baudisch, Hasso Plattner Institute2012Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Chang...Sean Follmer, Massachusetts Institute of Technology; et al.Cliplets: juxtaposing still and dynamic imageryNeel Joshi, Microsoft; et al.CrowdScape: interactively visualizing user behavior and outputJeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University2011SideBySide: Ad-hoc Multi-user Interaction with Handheld ProjectorsKarl D.D. Willis, Carnegie Mellon University; et al.2010VizWiz: nearly real-time answers to visual questionsJeffrey P. Bigham, University of Rochester; et al.2009Mouse 2.0: Multi-touch meets the MouseNicolas Villar, Microsoft; et al.2008Bringing Physics to the SurfaceAndrew D. Wilson, Microsoft; et al.2007ThinSight: Versatile Multi-touch Sensing for Thin Form-factor DisplaysSteve Hodges, Microsoft; et al.2006Reflective Physical Prototyping through Integrated Design, Test, and AnalysisBjörn Hartmann, Stanford University; et al.2005Automation and Customization of Rendered Web PagesMichael Bolin, Massachusetts Institute of Technology; et al.2004Multi-Finger Gestural Interaction with 3D Volumetric DisplaysTovi Grossman, University of Toronto; et al.CrossY: A Crossing-Based Drawing ApplicationGeorg Apitz & François Guimbretière, University of Maryland2003Perceptually-Supported Image Editing of Text and GraphicsEric Saund, PARC; et al.2002Clothing ManipulationTakeo Igarashi, University of Tokyo
John F. Hughes, Brown University2001Phidgets: Easy Development of Physical Interfaces through Physical WidgetsSaul Greenberg & Chester Fitchett, University of Calgary2000Sensing Techniques for Mobile InteractionKen Hinckley, Microsoft; et al.1996Indigo: A Local Propagation Algorithm for Inequality ConstraintsAlan Borning, University of Washington; et al.VLDB (Databases)2020Opportunities for optimism in contended main-memory multicore transactionsYihe Huang, Harvard University; et al.2019Fine-Grained, Secure and Efficient Data Provenance for BlockchainPingcheng Ruan, National University of Singapore; et al.2018The Ubiquity of Large Graphs and Surprising Challenges of Graph Processing: Extended SurveySiddhartha Sahu, University of Waterloo; et al.2017Provenance for Natural Language QueriesDaniel Deutch, Tel Aviv University; et al.2016Compressed Linear Algebra for Large-Scale Machine LearningAhmed Elgohary, University of Maryland; et al.2015Constructing an interactive natural language interface for relational databasesFei Li & H. V. Jagadish, University of Michigan2014The Uncracked Pieces in Database CrackingFelix Martin Schuhknecht, Saarland University; et al.epiC: an Extensible and Scalable System for Processing Big DataDawei Jiang, National University of Singapore; et al.M4: A Visualization-Oriented Time Series Data AggregationUwe Jugel, SAP SE; et al.Building Efficient Query Engines in a High-Level LanguageYannis Klonatos, École Polytechnique Fédérale de Lausanne; et al.On k-Path Covers and their ApplicationsStefan Funke, University of Stuttgart; et al.2013DisC Diversity: Result Diversification based on Dissimilarity and CoverageMarina Drosou & Evaggelia Pitoura, University of Ioannina2012Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story IdentificationAlbert Angel, University of Toronto; et al.2011RemusDB: Transparent High-Availability for Database SystemsUmar Farooq Minhas, University of Waterloo; et al.2010Towards Certain Fixes with Editing Rules and Master DataShuai Ma, University of Edinburgh; et al.2009A Unified Approach to Ranking in Probabilistic DatabasesJian Li, University of Maryland; et al.2008Finding Frequent Items in Data StreamsGraham Cormode & Marios Hadjieleftheriou, AT&T LaboratoriesConstrained Physical Design TuningNicolas Bruno & Surajit Chaudhuri, Microsoft2007Scalable Semantic Web Data Management Using Vertical PartitioningDaniel J. Abadi, Massachusetts Institute of Technology; et al.2006Trustworthy Keyword Search for Regulatory-Compliant Records RetentionSoumyadeb Mitra, University of Illinois at Urbana–Champaign; et al.2005Cache-conscious Frequent Pattern Mining on a Modern ProcessorAmol Ghoting, Ohio State University; et al.2004Model-Driven Data Acquisition in Sensor NetworksAmol Deshpande, University of California, Berkeley; et al.2001Weaving Relations for Cache PerformanceAnastassia Ailamaki, Carnegie Mellon University; et al.1997Integrating Reliable Memory in DatabasesWee Teck Ng & Peter M. Chen, University of MichiganWWW (World Wide Web)2020Open Intent Extraction from Natural Language InteractionsNikhita Vedula, Ohio State University; et al.2019Emoji-Powered Representation Learning for Cross-Lingual Sentiment ClassificationZhenpeng Chen, Peking University; et al.2018HighLife: Higher-arity Fact HarvestingPatrick Ernst, Saarland Informatics CampusSaarbrücken; et al.2016Social Networks Under StressDaniel Romero, University of Michigan; et al.2015HypTrails: A Bayesian Approach for Comparing Hypotheses About Human Trails on the WebPhilipp Singer, GESIS - Leibniz-Institute for the Social Sciences, Mannheim; et al.2014Efficient Estimation for High Similarities using Odd SketchesMichael Mitzenmacher, Harvard University; et al.2013No Country for Old Members: User Lifecycle and Linguistic Change in Online CommunitiesCristian Danescu-Niculescu-Mizil, Stanford University; et al.2012Counting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the StandardMarcelo Arenas, Pontifical Catholic University of Chile; et al.2011Towards a theory model for product searchBeibei Li, New York University; et al.2010Factorizing personalized Markov chains for next-basket recommendationSteffen Rendle, Osaka University; et al.2009Hybrid keyword search auctionsAshish Goel, Stanford University
Kamesh Munagala, Duke University2008IRLbot: Scaling to 6 billion pages and beyondHsin-Tsang Lee, Texas A&M University; et al.2007Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganogra...Lars Backstrom, Cornell University; et al.2006Random Sampling from a Search Engine's IndexZiv Bar-Yossef & Maxim Gurevich, Technion – Israel Institute of Technology2005Three-level caching for efficient query processing in large Web search enginesXiaohui Long & Torsten Suel, New York University Tandon School of Engineering2004Automatic detection of fragments in dynamically generated web pagesLakshmish Ramaswamy, Georgia Institute of Technology; et al.2003Scaling personalized web searchGlen Jeh & Jennifer Widom, Stanford UniversitySemTag and seeker: bootstrapping the semantic web via automated semantic annotationStephen Dill, IBM; et al.2002Abstracting application-level web securityDavid Scott & Richard Sharp, University of Cambridge2001Engineering Server Driven Consistency for Large Scale Dynamic Web ServicesJian Yin, University of Texas at Austin; et al.2000Graph Structure in the WebAndrei Broder, AltaVista; et al.1999Focused Crawling: A New Approach to Topic-Specific Web Resource DiscoverySoumen Chakrabarti, Indian Institute of Technology Kanpur; et al.1998The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/videoKevin C. Almeroth, University of California, Santa Barbara
Mostafa H. Ammar, Georgia Institute of TechnologyInstitutions with Best PapersMicrosoft56.4University of Washington50.5Carnegie Mellon University47.1Stanford University43.3Massachusetts Institute of Technology40.2University of California, Berkeley29.2University of Michigan20.6University of Illinois at Urbana–Champaign18.5Cornell University17.4Google16.8University of Toronto15.8University of Texas at Austin14.5IBM13.7University of British Columbia12.4University of Massachusetts Amherst11.2Georgia Institute of Technology10.3École Polytechnique Fédérale de Lausanne10.1University of Oxford9.6University of California, Irvine9.4Princeton University9.1University of Maryland8.9University of California, San Diego8.7University of Cambridge8.6University of Wisconsin–Madison8.0Yahoo7.9Columbia University7.6University of Waterloo7.4Inria7.0Weizmann Institute of Science6.2Technion – Israel Institute of Technology6.1McGill University5.9National University of Singapore5.8KAIST5.8University of Nottingham5.7Oregon State University5.5Tsinghua University5.5Brown University5.4The Chinese University of Hong Kong5.4Tel Aviv University5.3Max-Planck-Institut für Limnologie5.2Ohio State University5.2New York University4.9AT&T Laboratories4.9Northwestern University4.8Newcastle University4.8Peking University4.8University of Bristol4.7Aalto University4.7University of Alberta4.5University of Virginia4.2University of Paris-Sud4.2University College London4.2ETH Zurich4.2Rice University4.2Purdue University4.2NEC Labs America4.1TU Wien4.1Technical University of Berlin4.1Hasso Plattner Institute4.0University of Edinburgh4.0University of Chicago3.9University of Pennsylvania3.9Bell Labs3.8University of California, Los Angeles3.8Hong Kong University of Science and Technology3.8Rutgers University3.7University of Copenhagen3.7Hewlett Packard Labs3.7DePaul University3.7Aarhus University3.6University of Nebraska–Lincoln3.6University of California, Davis3.6Delft University of Technology3.5University of Southern California3.5University of North Carolina at Chapel Hill3.4College of William & Mary3.4University of Auckland3.3Imperial College London3.3Indiana University Bloomington3.2Harvard University3.1Virginia Tech3.0Pennsylvania State University3.0BBN Technologies3.0University of Minnesota3.0University of Warsaw3.0University of Colorado Boulder3.0University of Luxembourg2.9Saarland University2.9Iowa State University2.9University of Sheffield2.9Singapore Management University2.9University of Lancaster2.8Simon Fraser University2.8North Carolina State University2.8Royal Institute of Technology2.8Zhejiang University2.7Chinese Academy of Sciences2.7University of Paderborn2.6New York University Tandon School of Engineering2.5University of Tokyo2.5Digital Equipment Corporation2.5Université catholique de Louvain2.4Duke University2.4University of Glasgow2.4University at Buffalo2.4University of Applied Sciences Upper Austria2.4Johns Hopkins University2.4University of Saskatchewan2.4Northeastern University2.3Toyota Technological Institute at Chicago2.3University of Notre Dame2.3University of Melbourne2.3VMware Inc.2.3RWTH Aachen University2.3Concordia University2.3Eindhoven University of Technology2.2University of Amsterdam2.2University of Oregon2.2Disney Research2.2University of Canterbury2.2Trinity College Dublin2.1California Institute of Technology2.1University of Calgary2.1RMIT University2.1Intel Research Lablets2.0Autodesk2.0Ames Research Center2.0Universidade Técnica de Lisboa2.0

Credit is given in decreasing author order as customary in many fields. First authors are given 1 point, second authors are given 0.5 points, third authors are given 0.33 points, etc. These points are then divided by the sum of points for that paper, i.e. normalizing it. This ranking may be inaccurate or incomplete, may not reflect the current state of best paper awards, and is not an official list. If you are not satisfied with the ranking listed here, please disregard it.

Back to Jeff Huang's Homepage

Brown University Human-Computer Interaction Research Group

This page is designed to last.

Page last updated: 2020-10-18


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK