Original address: https://jeffhuang.com/best_paper_awards.html
By Conference: AAAI ACL CHI CIKM CVPR FOCS FSE ICCV ICML ICSE IJCAI INFOCOM KDD MOBICOM NSDI OSDI PLDI PODS S&P SIGCOMM SIGIR SIGMETRICS SIGMOD SODA SOSP STOC UIST VLDB WWW
Institutions with the most Best Papers
Much of this data was entered by hand (obtained by contacting past conference organizers, retrieving cached conference websites, and searching CVs) so please email me if you notice any errors or omissions: bestpaper-AT-jeffhuang.com. I (Jeff Huang) tried to collect best paper awards from the top-tier conferences in each area, but some conferences do not have such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award" and "outstanding paper award" are included but not "best student paper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL). The list of papers for years 2017 and 2018 were collected by Mingrui Ray Zhang.
AAAI (Artificial Intelligence) | ||
2018 | Memory-Augmented Monte Carlo Tree Search | Chenjun Xiao, University of Alberta; et al. |
2017 | Label-Free Supervision of Neural Networks with Physics and Domain Knowledge | Russell Stewart & Stefano Ermon, Stanford University |
2016 | Bidirectional Search That Is Guaranteed to Meet in the Middle | Robert C. Holte, University of Alberta; et al. |
2015 | From Non-Negative to General Operator Cost Partitioning | Florian Pommerening, University of Basel; et al. |
2014 | Recovering from Selection Bias in Causal and Statistical Inference | Elias Bareinboim, University of California Los Angeles; et al. |
2013 | HC-Search: Learning Heuristics and Cost Functions for Structured Prediction | Janardhan Rao Doppa, Oregon State University; et al. |
SMILe: Shuffled Multiple-Instance Learning | Gary Doran & Soumya Ray, Case Western Reserve University | |
2012 | Learning SVM Classifiers with Indefinite Kernels | Suicheng Gu & Yuhong Guo, Temple University |
Document Summarization Based on Data Reconstruction | Zhanying He, Zhejiang University; et al. | |
2011 | Dynamic Resource Allocation in Conservation Planning | Daniel Golovin, California Institute of Technology; et al. |
Complexity of and Algorithms for Borda Manipulation | Jessica Davies, University of Toronto; et al. | |
2010 | How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Ans... | Giorgos Stoilos, Oxford University; et al. |
A Novel Transition Based Encoding Scheme for Planning as Satisfiability | Ruoyun Huang, Washington University in St. Louis; et al. | |
2008 | How Good is Almost Perfect? | Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg |
Optimal False-Name-Proof Voting Rules with Costly Voting | Liad Wagman & Vincent Conitzer, Duke University | |
2007 | PLOW: A Collaborative Task Learning Agent | James Allen, Institute for Human and Machine Cognition; et al. |
Thresholded Rewards: Acting Optimally in Timed, Zero-Sum Games | Colin McMillen & Manuela Veloso, Carnegie Mellon University | |
2006 | Model Counting: A New Strategy for Obtaining Good Bounds | Carla P. Gomes, Cornell University; et al. |
Towards an Axiom System for Default Logic | Gerhard Lakemeyer, RWTH Aachen University Hector J. Levesque, University of Toronto |
|
2005 | The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic Selection | Vincent A. Cicirello, Drexel University Stephen F. Smith, Carnegie Mellon University |
2004 | Learning and Inferring Transportation Routines | Lin Liao, University of Washington; et al. |
2002 | On Computing All Abductive Explanations | Thomas Eiter, Technische Universität Wien Kazuhisa Makino, Osaka University |
2000 | The Game of Hex: An Automatic Theorem-Proving Approach to Game Programming | Vadim V. Anshelevich, Vanshel Consulting |
1999 | PROVERB: The Probabilistic Cruciverbalist | Greg A. Keim, Duke University; et al. |
1998 | Learning Evaluation Functions for Global Optimization and Boolean Satisfiability | Justin A. Boyan & Andrew W. Moore, Carnegie Mellon University |
Acceleration Methods for Numeric CSPs | Yahia Lebbah & Olivier Lhomme, Ecole des Mines de Nantes | |
The Interactive Museum Tour-Guide Robot | Wolfram Burgard, University of Bonn; et al. | |
1997 | Statistical Parsing with a Context-Free Grammar and Word Statistics | Eugene Charniak, Brown University |
A Practical Algorithm for Finding Optimal Triangulations | Krill Shoikhet & Dan Geiger, Technion | |
Fast Context Switching in Real-Time Propositional Reasoning | P. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center | |
Building Concept Representations from Reusable Components | Peter Clark, Boeing Bruce Porter, University of Texas at Austin |
|
1996 | Verification of Knowledge Bases Based on Containment Checking | Alon Y. Levy, AT&T Laboratories Marie-Christine Rousset, Université Paris-Sud |
A Novel Application of Theory Refinement to Student Modeling | Paul T. Baffes, SciComp Raymond J. Mooney, University of Texas at Austin |
|
Pushing the Envelope: Planning, Propositional Logic, and Stochastic Search | Henry Kautz & Bart Selman, AT&T Laboratories | |
ACL (Natural Language Processing) | ||
2018 | Finding syntax in human encephalography with beam search | John Hale, Cornell University; et al. |
2017 | Probabilistic Typology: Deep Generative Models of Vowel Inventories | Ryan Cotterell & Jason Eisner, Johns Hopkins University |
2016 | Finding Non-Arbitrary Form-Meaning Systematicity Using String-Metric Learning for Kernel Regression | E. Darío Gutiérrez, University of California Berkeley; et al. |
2015 | Improving Evaluation of Machine Translation Quality Estimation | Yvette Graham, Trinity College Dublin |
Learning Dynamic Feature Selection for Fast Sequential Prediction | Emma Strubell, University of Massachusetts Amherst; et al. | |
2014 | Fast and Robust Neural Network Joint Models for Statistical Machine Translation | Jacob Devlin, Raytheon BBN Technologies; et al. |
2013 | Grounded Language Learning from Video Described with Sentences | Haonan Yu & Jeffrey Mark Siskind, Purdue University |
2012 | String Re-writing Kernel | Fan Bu, Tsinghua University; et al. |
Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic Parsing | Hiroyuki Shindo, NTT Communication Science Laboratories; et al. | |
2011 | Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based Projections | Dipanjan Das, Carnegie Mellon University Slav Petrov, Google |
2010 | Beyond NomBank: A Study of Implicit Arguments for Nominal Predicates | Matthew Gerber & Joyce Y. Chai, Michigan State University |
2009 | Reinforcement Learning for Mapping Instructions to Actions | S.R.K. Branavan, Massachusetts Institute of Technology; et al. |
K-Best A* Parsing | Adam Pauls & Dan Klein, University of California Berkeley | |
Concise Integer Linear Programming Formulations for Dependency Parsing | André F.T. Martins, Instituto de Telecomunicações; et al. | |
2008 | Forest Reranking: Discriminative Parsing with Non-Local Features | Liang Huang, University of Pennsylvania |
A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language Model | Libin Shen, BBN Technologies; et al. | |
2007 | Learning synchronous grammars for semantic parsing with lambda calculus | Yuk Wah Wong & Raymond J. Mooney, University of Texas at Austin |
2006 | Semantic taxonomy induction from heterogenous evidence | Rion Snow, Stanford University; et al. |
2005 | A Hierarchical Phrase-Based Model for Statistical Machine Translation | David Chiang, University of Maryland |
2004 | Finding Predominant Word Senses in Untagged Text | Diana McCarthy, University of Sussex; et al. |
2003 | Accurate Unlexicalized Parsing | Dan Klein & Christopher D. Manning, Stanford University |
Towards a Model of Face-to-Face Grounding | Yukiko I. Nakano, RISTEX; et al. | |
2002 | Discriminative Training and Maximum Entropy Models for Statistical Machine Translation | Franz Josef Och & Hermann Ney, RWTH Aachen University |
2001 | Immediate-Head Parsing for Language Models | Eugene Charniak, Brown University |
Fast Decoding and Optimal Decoding for Machine Translation | Ulrich Germann, University of Southern California; et al. | |
CHI (Human-Computer Interaction) | ||
2018 | Examining Wikipedia With a Broader Lens: Quantifying the Value of Wikipedia's Relationships with O... | Nicholas Vincent, Northwestern University; et al. |
Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants | Tamy Guberek, University of Michigan; et al. | |
Addressing Age-Related Bias in Sentiment Analysis | Mark Diaz, Northwestern University; et al. | |
Wall++: Room-Scale Interactive and Context-Aware Sensing | Yang Zhang, Carnegie Mellon University; et al. | |
Design for Collaborative Survival: An Inquiry into Human-Fungi Relationships | Jen Liu, University of Colorado Boulder; et al. | |
Expressive Time Series Querying with Hand-Drawn Scale-Free Sketches | Miro Mannino & Azza Abouzied, New York University | |
Pinpointing: Precise Head- and Eye-Based Target Selection for Augmented Reality | Mikko Kytö, Aalto University; et al. | |
Streets for People: Engaging Children in Placemaking Through a Socio-technical Process | Sean Peacock, Newcastle University; et al. | |
Let's Talk About Race: Identity, Chatbots, and AI | Ari Schlesinger, Georgia Institute of Technology; et al. | |
“A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology | Diana Freed, Cornell Tech; et al. | |
HARK No More: On the Preregistration of CHI Experiments | Andy Cockburn, University of Canterbury; et al. | |
Hoarding and Minimalism: Tendencies in Digital Data Preservation | Francesco Vitale, University of British Columbia; et al. | |
Semi-Automated Coding for Qualitative Research: A User-Centered Inquiry and Initial Prototypes | Megh Marathe & Kentaro Toyama, University of Michigan | |
Making as Expression: Informing Design with People with Complex Communication Needs through Art Th... | Amanda Lazar, University of Maryland; et al. | |
How Relevant are Incidental Power Poses for HCI? | Yvonne Jansen, Sorbonne Université Kasper Hornbæk, University of Copenhagen |
|
Data Illustrator: Augmenting Vector Design Tools with Lazy Data Binding for Expressive Visualizati... | Zhicheng Liu, Adobe Research; et al. | |
Extending Manual Drawing Practices with Artist-Centric Programming Tools | Jennifer, Jacobs Massachusetts Institute of Technology; et al. | |
Experiencing the Body as Play | Florian 'Floyd' Mueller, RMIT University; et al. | |
Gender Recognition or Gender Reductionism?: The Social Implications of Embedded Gender Recognition... | Foad Hamidi, University of Maryland; et al. | |
Voice Interfaces in Everyday Life | Martin Porcheron, University of Nottingham; et al. | |
Project Zanzibar: A Portable and Flexible Tangible Interaction Platform | Nicolas Villar, Microsoft Research; et al. | |
Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in ... | Sharifa Sultana, Cornell University; et al. | |
Agile 3D Sketching with Air Scaffolding | Yongkwan Kim, KAIST; et al. | |
Making Core Memory: Design Inquiry into Gendered Legacies of Engineering and Craftwork | Daniela K. Rosner, University of Washington; et al. | |
2017 | Illumination Aesthetics: Light as a Creative Material within Computational Design | Cesar Torres, University of California Berkeley; et al. |
Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing ... | Viirj Kan, Massachusetts Institute of Technology; et al. | |
ShareVR: Enabling Co-Located Experiences for Virtual Reality between HMD and Non-HMD Users | Jan Gugenheimer, Ulm University; et al. | |
You Want Me to Work with Who?: Stakeholder Perceptions of Automated Team Formation in Project-base... | Farnaz Jahanbakhsh, University of Illinois at Urbana-Champaign; et al. | |
Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse | Tara Matthews, Google; et al. | |
A Critical Lens on Dementia and Design in HCI | Amanda Lazar, Northwestern University; et al. | |
Modelling Learning of New Keyboard Layouts | Jussi P. P. Jokinen, Aalto University; et al. | |
Designing Gamified Applications that Make Safe Driving More Engaging | Fabius Steinberger, Queensland University of Technology; et al. | |
mHealth for Maternal Mental Health: Everyday Wisdom in Ethical Design | Marguerite Barry, Trinity College Dublin; et al. | |
Explaining the Gap: Visualizing One's Predictions Improves Recall and Comprehension of Data | Yea-Seul Kim, University of Washington; et al. | |
Reflective Practicum: A Framework of Sensitising Concepts to Design for Transformative Reflection | Petr Slovák, Vienna University of Technology; et al. | |
What Can Be Predicted from Six Seconds of Driver Glances? | Lex Fridman, Massachusetts Institute of Technology; et al. | |
Flash Organizations: Crowdsourcing Complex Work by Structuring Crowds As Organizations | Melissa A. Valentine, Stanford University; et al. | |
Design and Evaluation of a Data-Driven Password Meter | Blase Ur, University of Chicago; et al. | |
Understanding Public Evaluation: Quantifying Experimenter Intervention | Julie R. Williamson & John Williamson, University of Glasgow | |
What Is Interaction? | Kasper Hornbæk, University of Copenhagen Antti Oulasvirta, Aalto University |
|
BIGnav: Bayesian Information Gain for Guiding Multiscale Navigation | Wanyu Liu, Université Paris-Saclay; et al. | |
Examining Menstrual Tracking to Inform the Design of Personal Informatics Tools | Daniel A. Epstein, University of Washington; et al. | |
2016 | Building a Personalized, Auto-Calibrating Eye Tracker from User Interactions | Michael Xuelin Huang, Hong Kong Polytechnic University; et al. |
Finding Email in a Multi-Account, Multi-Device World | Marta E. Cecchinato, University College London; et al. | |
On Looking at the Vagina through Labella | Teresa Almeida, Newcastle University; et al. | |
Enhancing Cross-Device Interaction Scripting with Interactive Illustrations | Pei-Yu (Peggy) Chi, University of California Berkeley; et al. | |
Empath: Understanding Topic Signals in Large-Scale Text | Ethan Fast, Stanford University; et al. | |
The Effect of Visual Appearance on the Performance of Continuous Sliders and Visual Analogue Scales | Justin Matejka, Autodesk Research; et al. | |
HCI Research as Problem-Solving | Antti Oulasvirta, Aalto University Kasper Hornbæk, University of Copenhagen |
|
RapID: A Framework for Fabricating Low-Latency Interactive Objects with RFID Tags | Andrew Spielberg, Massachusetts Institute of Technology; et al. | |
Enabling Designers to Foresee Which Colors Users Cannot See | Katharina Reinecke, University of Washington; et al. | |
Designing Movement-based Play With Young People Using Powered Wheelchairs | Kathrin Gerling, University of Lincoln; et al. | |
Developing and Validating the User Burden Scale: A Tool for Assessing User Burden in Computing Sys... | Hyewon Suh, University of Washington; et al. | |
Momentary Pleasure or Lasting Meaning?: Distinguishing Eudaimonic and Hedonic User Experiences | Elisa D. Mekler, University of Basel Kasper Hornbæk, University of Copenhagen |
|
Understanding and Mitigating the Effects of Device and Cloud Service Design Decisions on the Envir... | Chris Preist, University of Bristol; et al. | |
Haptic Wave: A Cross-Modal Interface for Visually Impaired Audio Producers | Atau Tanaka & Adam Parkinson, Goldsmiths | |
"I don't Want to Wear a Screen": Probing Perceptions of and Possibilities for Dynamic Displays on ... | Laura Devendorf, University of California Berkeley; et al. | |
Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences | Pamela Wisniewski, University of Central Florida; et al. | |
Object-Oriented Drawing | Haijun Xia, University of Toronto; et al. | |
Foraging Among an Overabundance of Similar Variants | Sruti Srinivasa Ragavan, Oregon State University; et al. | |
Lock n' LoL: Group-based Limiting Assistance App to Mitigate Smartphone Distractions in Group Acti... | Minsam Ko, KAIST; et al. | |
Learn Piano with BACh: An Adaptive Learning Interface that Adjusts Task Difficulty Based on Brain ... | Beste F. Yuksel, Tufts University; et al. | |
FlexCase: Enhancing Mobile Interaction with a Flexible Sensing and Display Cover | Christian Rendl, University of Applied Sciences Upper Austria; et al. | |
Project Jacquard: Interactive Digital Textiles at Scale | Ivan Poupyrev, Google; et al. | |
Smart Touch: Improving Touch Accuracy for People with Motor Impairments with Template Matching | Martez E. Mott, University of Washington; et al. | |
2015 | What Makes Interruptions Disruptive?: A Process-Model Account of the Effects of the Problem State ... | Jelmer P. Borst, University of Groningen; et al. |
VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keybo... | Keith Vertanen, Montana Tech; et al. | |
Sharing is Caring: Assistive Technology Designs on Thingiverse | Erin Buehler, University of Maryland Baltimore County; et al. | |
Tiree Energy Pulse: Exploring Renewable Energy Forecasts on the Edge of the Grid | Will Simm, Lancaster University; et al. | |
Unequal Representation and Gender Stereotypes in Image Search Results for Occupations | Matthew Kay, University of Washington; et al. | |
Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure | Pamela Wisniewski, Pennsylvania State University; et al. | |
Affordance++: Allowing Objects to Communicate Dynamic Use | Pedro Lopes, Hasso Plattner Institute; et al. | |
Designing Political Deliberation Environments to Support Interactions in the Public Sphere | Bryan Semaan, Syracuse University; et al. | |
ColourID: Improving Colour Identification for People with Impaired Colour Vision | David R. Flatla, University of Dundee; et al. | |
Fluid Grouping: Quantifying Group Engagement around Interactive Tabletop Exhibits in the Wild | Florian Block, Harvard University; et al. | |
Sangeet Swara: A Community-Moderated Voice Forum in Rural India | Aditya Vashistha, University of Washington; et al. | |
Acoustruments: Passive, Acoustically-Driven, Interactive Controls for Handheld Devices | Gierad Laput, Carnegie Mellon University; et al. | |
iSkin: Flexible, Stretchable and Visually Customizable On-Body Touch Sensors for Mobile Computing | Martin Weigel, Max Planck Institut; et al. | |
Patina Engraver: Visualizing Activity Logs as Patina in Fashionable Trackers | Moon-Hwan Lee, KAIST; et al. | |
BaseLase: An Interactive Focus+Context Laser Floor | Jörg Müller, Aarhus University; et al. | |
The Social Impact of a Robot Co-Worker in Industrial Settings | Allison Sauppé & Bilge Mutlu, University of Wisconsin | |
"I always assumed that I wasn't really that close to [her]": Reasoning about Invisible Algorithms ... | Motahhare Eslami, University of Illinois at Urbana-Champaign; et al. | |
Understanding and Supporting Fathers and Fatherhood on Social Media Sites | Tawfiq Ammari & Sarita Schoenebeck, University of Michigan | |
Lightweight Relief Shearing for Enhanced Terrain Perception on Interactive Maps | Wesley Willett, INRIA; et al. | |
From User-Centered to Adoption-Centered Design: A Case Study of an HCI Research Innovation Becomin... | Parmit K. Chilana, University of Waterloo; et al. | |
2014 | Growing Closer on Facebook: Changes in Tie Strength Through Social Network Site Use | Moira Burke, Facebook Robert Kraut, Carnegie Mellon University |
Duet: Exploring Joint Interactions on a Smart Phone and a Smart Watch | Xiang Anthony Chen, Carnegie Mellon University; et al. | |
RetroDepth: 3D Silhouette Sensing for High-Precision Input On and Above Physical Surfaces | David Kim, Microsoft Research; et al. | |
Estimating the Social Costs of Friendsourcing | Jeffrey Rzeszotarski & Meredith Morris, Microsoft Research | |
Human Values in Curating a Human Rights Media Archive | Abigail Durrant, Newcastle University; et al. | |
Emerging Sites of HCI Innovation: Hackerspaces, Hardware Startups & Incubators | Silvia Lindtner, University of California Irvine; et al. | |
Effects of Display Size and Navigation Type on a Classification Task | Can Liu, Université Paris-Sud; et al. | |
Towards Accurate and Practical Predictive Models of Active-Vision-Based Visual Search | David Kieras, University of Michigan Anthony Hornof, University of Oregon |
|
Real-time Feedback for Improving Medication Taking | Matthew Lee, Philips Research Anind Dey, Carnegie Mellon University |
|
Making Sustainability Sustainable: Challenges in the Design of Eco-Interaction Technologies | Rayoung Yang, University of Michigan; et al. | |
Consumed Endurance: A Metric to Quantify Arm Fatigue of Mid-Air Interactions | Anders Markussen, University of Copenhagen; et al. | |
Type-Hover-Swipe in 96 Bytes: A Motion Sensing Mechanical Keyboard | Stuart A Taylor, Microsoft Research; et al. | |
Structured Labeling for Facilitating Concept Evolution in Machine Learning | Todd Kulesza, Oregon State University; et al. | |
MixFab: a Mixed-Reality Environment for Personal Fabrication | Christian Weichel, Lancaster University; et al. | |
Designing for Slowness, Anticipation and Re-visitation: A Long Term Field Study of the Photobox | William Odom, Carnegie Mellon University; et al. | |
"Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug War | Munmun De Choudhury, Microsoft Research; et al. | |
Understanding Multitasking Through Parallelized Strategy Exploration and Individualized Cognitive ... | Yunfeng Zhang & Anthony Hornof, University of Oregon | |
2013 | Labor Dynamics in a Mobile Micro-Task Market | Mohamed Musthag & Deepak Ganesan, University of Massachusetts Amherst |
What is "Critical" About Critical Design? | Jeffrey Bardzell & Shaowen Bardzell, Indiana University at Bloomington | |
SPRWeb: Preserving Subjective Responses to Website Colour Schemes through Automatic Recolouring | David R. Flatla, University of Saskatchewan; et al. | |
LaserOrigami: Laser-Cutting 3D Objects | Stefanie Mueller, Hasso Plattner Institute; et al. | |
Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI Research | Eric B. Hekler, Arizona State University; et al. | |
Screenfinity: Extending the Perception Area of Content on Very Large Public Displays | Constantin Schmidt, Technische Universität Berlin; et al. | |
Reasons to Question Seven Segment Displays | Harold Thimbleby, Swansea University | |
Improving Navigation-Based File Retrieval | Stephen Fitchett, University of Canterbury; et al. | |
The Dubuque Electricity Portal: Evaluation of a City-Scale Residential Electricity Consumption Fee... | Tom Erickson, IBM Research; et al. | |
At Home with Agents: Exploring Attitudes Towards Future Smart Energy Infrastructures | Tom Rodden, University of Nottingham; et al. | |
Job Opportunities through Entertainment: Virally Spread Speech-Based Services for Low-Literate Users | Agha Ali Raza, Carnegie Mellon University; et al. | |
IllumiRoom: Peripheral Projected Illusions for Interactive Experiences | Brett Jones, University of Illinois at Urbana-Champaign; et al. | |
The Efficacy of Human Post-Editing for Language Translation | Spence Green, Stanford University; et al. | |
Analyzing User-Generated YouTube Videos to Understand Touchscreen Use by People with Motor Impairm... | Lisa Anthony, University of Maryland Baltimore County; et al. | |
Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical Turk | Lilly Irani, University of California Irvine M. Six Silberman, Bureau of Economic Interpretation |
|
Webzeitgeist: Design Mining the Web | Ranjitha Kumar, Stanford University; et al. | |
Weighted Graph Comparison Techniques for Brain Connectivity Analysis | Basak Alper, University of California Santa Barbara; et al. | |
The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Arc... | Xuan Zhao, Cornell University; et al. | |
2012 | Uncomfortable Interactions | Steve Benford, University of Nottingham; et al. |
ClayVision: The (Elastic) Image of the City | Yuichiro Takeuchi, Sony Computer Science Laboratories Ken Perlin, New York University |
|
Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCI | Ylva Fernaeus, KTH Royal Institute of Technology; et al. | |
Personas and Decision Making in the Design Process: An Ethnographic Case Study | Erin Friess, University of North Texas | |
Detecting Error-Related Negativity for Interaction Design | Chi Vi & Sriram Subramanian, University of Bristol | |
Observational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobil... | Niels Henze, University of Oldenburg; et al. | |
Looking Glass: A Field Study on Noticing Interactivity of Shop Windows | Jörg Müller, Technische Universität Berlin; et al. | |
Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday Objects | Munehiko Sato, Disney Research; et al. | |
Affordances in HCI: Toward a Mediated Action Perspective | Victor Kaptelinin, University of Bergen Bonnie Nardi, University of California Irvine |
|
Using Rhythmic Patterns as an Input Method | Emilien Ghomi, Université Paris-Sud; et al. | |
The Normal Natural Troubles of Driving with GPS | Barry Brown, Stockholm University Eric Laurier, University of Edinburgh |
|
Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical Kiosks | Kurtis Heimerl, University of California Berkeley; et al. | |
Improving Command Selection with CommandMaps | Joey Scarr, University of Canterbury; et al. | |
Empathy, Participatory Design and People with Dementia | Stephen Lindsay, Newcastle University; et al. | |
2011 | Usable Gestures for Blind People: Understanding Preference and Performance | Shaun K. Kane, University of Washington; et al. |
Effects of Community Size and Contact Rate in Synchronous Social Q&A | Ryen W. White, Microsoft Research; et al. | |
Teenagers and Their Virtual Possessions: Design Opportunities and Issues | William Odom, Carnegie Mellon University; et al. | |
Enhancing Physicality in Touch Interaction with Programmable Friction | Vincent Levesque, University of British Columbia; et al. | |
Mid-air Pan-and-Zoom on Wall-sized Displays | Mathieu Nancel, Université Paris-Sud; et al. | |
Bricolage: Example-Based Retargeting for Web Design | Ranjitha Kumar, Stanford University; et al. | |
Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual E... | Thomas Erickson, IBM Research; et al. | |
In the Shadow of Misperception: Assistive Technology Use and Social Interactions | Kristen Shinohara & Jacob Wobbrock, University of Washington | |
Why is My Internet Slow?: Making Network Speeds Visible | Marshini Chetty, Georgia Institute of Technology; et al. | |
Ease of Juggling: Studying the Effects of Manual Multitasking | Antti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University | |
Automics: souvenir generating photoware for theme parks | Abigail Durrant, University of Nottingham; et al. | |
Your Noise is My Command: Sensing Gestures Using the Body as an Antenna | Gabe Cohn, University of Washington; et al. | |
Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Wor... | Koji Yatani, University of Toronto; et al. | |
2010 | Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber Bundles | Patrick Baudisch, Hasso Plattner Institute; et al. |
Mapping the Landscape of Sustainable HCI | Carl DiSalvo, Georgia Institute of Technology; et al. | |
Occlusion-Aware Interfaces | Daniel Vogel & Ravin Balakrishnan, University of Toronto | |
Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural India | Neil Patel, Stanford University; et al. | |
How does search behavior change as search becomes more difficult? | Anne Aula, Google; et al. | |
The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Co... | Brent Hecht & Darren Gergle, Northwestern University | |
Skinput: Appropriating the Body as an Input Surface | Chris Harrison, Carnegie Mellon University; et al. | |
Mobile-izing Health Workers in Rural India | Divya Ramachandran, University of California Berkeley; et al. | |
The Design of Eco-Feedback Technology | Jon Froehlich, University of Washington; et al. | |
Feminist HCI: Taking Stock and Outlining an Agenda for Design | Shaowen Bardzell, Indiana University at Bloomington | |
Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface Structure | Morgan Dixon & James Fogarty, University of Washington | |
Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of Charts | Scott Bateman, University of Saskatchewan; et al. | |
2009 | From Interaction to Trajectories: Designing Coherent Journeys Through User Experiences | Steve Benford, University of Nottingham; et al. |
Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Ser... | Jeffrey Heer, Stanford University; et al. | |
Predicting Tie Strength With Social Media | Eric Gilbert & Karrie Karahalios, University of Illinois at Urbana-Champaign | |
Musink: Composing Music through Augmented Drawing | Theophanis Tsandilas, Université Paris-Sud; et al. | |
Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector Exhibits | Scott S. Snibbe, Sona Research Hayes S. Raffle, Massachusetts Institute of Technology |
|
Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection Performance | Leah Findlater, University of British Columbia; et al. | |
Undo and Erase Events as Indicators of Usability Problems | David Akers, Stanford University; et al. | |
2008 | In-Car GPS Navigation: Engagement with and Disengagement from the Environment | Gilly Leshed, Cornell University; et al. |
Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Inte... | Krzysztof Z. Gajos, University of Washington; et al. | |
Large Scale Analysis of Web Revisitation Patterns | Eytan Adar, University of Washington; et al. | |
Designs on Dignity: Perceptions of Technology Among the Homeless | Christopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology | |
The Network in the Garden: An Empirical Analysis of Social Media in Rural Life | Eric Gilbert, University of Illinois at Urbana-Champaign; et al. | |
Multimodal collaborative handwriting training for visually-impaired people | Beryl Plimmer, University of Auckland; et al. | |
An Error Model for Pointing Based on Fitts' Law | Jacob Wobbrock, University of Washington; et al. | |
2007 | Multiview: improving trust in group video conferencing through spatial faithfulness | David T. Nguyen & John Canny, University of California Berkeley |
Software or wetware?: discovering when and why people use digital prosthetic memory | Vaiva Kalnikaité & Steve Whittaker, University of Sheffield | |
Shift: a technique for operating pen-based interfaces using touch | Daniel Vogel, University of Toronto Patrick Baudisch, Microsoft Research |
|
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognit... | Björn Hartmann, Stanford University; et al. | |
Sustainable interaction design: invention & disposal, renewal & reuse | Eli Blevis, Indiana University at Bloomington | |
Consuming video on Mobile devices | Kenton O'Hara, Hewlett-Packard Labs; et al. | |
2006 | Trackball text entry for people with motor impairments | Jacob Wobbrock & Brad Myers, Carnegie Mellon University |
Embedded phenomena: supporting science learning with classroom-sized distributed simulations | Tom Moher, University of Illinois at Chicago | |
A role for haptics in mobile interaction: initial design using a handheld tactile display prototype | Joseph Luk, University of British Columbia; et al. | |
2005 | Making space for stories: ambiguity in the design of personal communication systems | Paul M. Aoki, Palo Alto Research Center Allison Woodruff, Intel Research |
Examining Task Engagement in Sensor-Based Statistical Models of Human Interruptibility | James Fogarty, Carnegie Mellon University; et al. | |
Designing the spectator experience | Stuart Reeves, University of Nottingham; et al. | |
The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation area | Tovi Grossman & Ravin Balakrishnan, University of Toronto | |
CIKM (Knowledge Management) | ||
2018 | Relevance estimation with multiple information sources on search engine result pages | Junqi Zhang, Tsinghua University; et al. |
2017 | Hike: A Hybrid Human-Machine Method for Entity Alignment in Large-Scale Knowledge Bases | Yan Zhuang, Tsinghua University; et al. |
2016 | Vandalism Detection in Wikidata | Stefan Heindorf, Paderborn University; et al. |
2015 | Assessing the Impact of Syntactic and Semantic Structures for Answer Passages Reranking | Kateryna Tymoshenko, University of Trento Alessandro Moschitti, Qatar Computing Research Institute |
2014 | Cross-Device Search | George Montanez, Carnegie Mellon University; et al. |
2013 | Penguins in Sweaters, or Serendipitous Entity Search on User-generated Content | Ilaria Bordino, Yahoo! Research; et al. |
2012 | Gelling, and Melting, Large Graphs by Edge Manipulation | Hanghang Tong, IBM Research; et al. |
2011 | Intent-aware query similarity | Jiafeng Guo, Chinese Academy of Sciences; et al. |
2010 | MENTA: Inducing Multilingual Taxonomies from Wikipedia | Gerard de Melo & Gerhard Weikum, Max Planck Institut |
FACeTOR: cost-driven exploration of faceted query results | Abhijith Kashyap, State University of New York at Buffalo; et al. | |
2009 | On the Feasibility of Multi-Site Web Search Engines | Ricardo Baeza-Yates, Yahoo! Research; et al. |
2008 | Learning to Link with Wikipedia | David Milne & Ian H. Witten, University of Waikato |
2007 | Autonomously Semantifying Wikipedia | Fei Wu & Daniel S. Weld, University of Washington |
2006 | Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing Indices | Segabtian Michel, Max Planck Institut; et al. |
2005 | Towards Automatic Association of Relevant Unstructured Content with Structured Query Results | Prasan Roy, IBM Research; et al. |
2004 | Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XML | Qiankun Zhao, Nanyang Technological University; et al. |
CVPR (Computer Vision) | ||
2018 | Taskonomy: Disentangling Task Transfer Learning | Amir R. Zamir, Stanford University; et al. |
2017 | Densely Connected Convolutional Networks | Zhuang Liu, Tsinghua University; et al. |
Learning from Simulated and Unsupervised Images through Adversarial Training | Ashish Shrivastava, Apple Inc.; et al. | |
2016 | Deep Residual Learning for Image Recognition | Kaiming He, Microsoft Research; et al. |
2015 | DynamicFusion: Reconstruction and Tracking of Non-rigid Scenes in Real-Time | Richard A. Newcombe, University of Washington; et al. |
2014 | What Camera Motion Reveals About Shape with Unknown BRDF | Manmohan Chandraker, NEC Labs America |
2013 | Fast, Accurate Detection of 100,000 Object Classes on a Single Machine | Thomas Dean, Google; et al. |
2012 | A Simple Prior-free Method for Non-Rigid Structure-from-Motion Factorization | Yuchao Dai, Northwestern Polytechnical University; et al. |
2011 | Real-time Human Pose Recognition in Parts from Single Depth Images | Jamie Shotton, Microsoft Research; et al. |
2010 | Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data usi... | Anders Eriksson & Anton va den Hendel, University of Adelaide |
2009 | Single Image Haze Removal Using Dark Channel Prior | Kaiming He, The Chinese University of Hong Kong; et al. |
2008 | Global Stereo Reconstruction under Second Order Smoothness Priors | Oliver Woodford, University of Oxford; et al. |
Beyond Sliding Windows: Object Localization by Efficient Subwindow Search | Chistoph H. Lampert, Max Planck Institut; et al. | |
2007 | Dynamic 3D Scene Analysis from a Moving Vehicle | Bastian Leibe, ETH Zurich; et al. |
2006 | Putting Objects in Perspective | Derek Hoiem, Carnegie Mellon University; et al. |
2005 | Real-Time Non-Rigid Surface Detection | Julien Pilet, École Polytechnique Fédérale de Lausanne; et al. |
2004 | Programmable Imaging using a Digital Micromirror Array | Shree K. Nayar, Columbia University; et al. |
2003 | Object Class Recognition by Unsupervised Scale-Invariant Learning | Rob Fergus, University of Oxford; et al. |
2001 | Morphable 3D models from video | Matthew Brand, Mitsubishi Electric Research Laboratories |
2000 | Real-Time Tracking of Non-Rigid Objects using Mean Shift | Dorin Comaniciu, Siemens Corporate Research; et al. |
FOCS (Theory) | ||
2018 | Classical Verification of Quantum Computation | Urmila Mahadev, University of California Berkeley |
Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic Time | Diptarka Chakraborty, Computer Science Institute of Charles University; et al. | |
Pseudorandom Sets in Grassmann Graph have Near-Perfect Expansion | Subhash Khot, New York University; et al. | |
2017 | A dichotomy theorem for nonuniform CSPs | Andrei A. Bulatov, Simon Fraser University |
The Matching Problem in General Graphs is in Quasi-NC | Ola Svensson & Jakub Tarnawski, École polytechnique fédérale de Lausanne | |
The Proof of CSP Dichotomy Conjecture | Dmitriy Zhuk, Lomonosov Moscow State University | |
2016 | Settling the Complexity of Computing Approximate Two-Player Nash Equilibria | Aviad Rubinstein, University of California Berkeley |
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning | Ran Raz, Weizmann Institute of Science | |
2015 | An average-case depth hierarchy theorem for Boolean circuits | Benjamin Rossman, National Institute of Informatics; et al. |
2014 | Path Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations a... | Yin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology |
2013 | Navigating Central Path with Electrical Flows: from Flows to Matchings, and Back | Aleksander Mądry, École Polytechnique Fédérale de Lausanne |
2012 | A multi-prover interactive proof for NEXP sound against entangled provers | Tsuyoshi Ito, NEC Labs America Thomas Vidick, Massachusetts Institute of Technology |
A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2 | Julia Chuzhoy, Toyota Technological Institute at Chicago Shi Li, Princeton University |
|
2011 | A Randomized Rounding Approach to the Traveling Salesman Problem | Shayan Oveis Gharan, Stanford University; et al. |
A Polylogarithmic-Competitive Algorithm for the k-Server Problem | Nikhil Bansal, IBM Research; et al. | |
Approximating Graphic TSP by Matchings | Tobia M¨o;mke & Ola Svensson, Royal Institute of Technology | |
2010 | Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke Decompositions | Matthew Andrews, Bell Labs |
Subexponential Algorithms for Unique Games and Related Problems | Sanjeev Arora, Princeton University; et al. | |
Computational Transition at the Uniqueness Threshold | Allan Sly, Microsoft Research | |
2008 | Two Query PCP with Sub-Constant Error | Dana Moshkovitz & Ran Raz, Weizmann Institute of Science |
2007 | Space-Efficient Identity Based Encryption Without Pairings | Dan Boneh, Stanford University; et al. |
2006 | Settling the Complexity of 2-Player Nash Equilibrium | Xi Chen, Tsinghua University Xiaotie Deng, City University of Hong Kong |
2005 | The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type M... | Subhash A. Khot, Georgia Institute of Technology Nisheeth K. Vishnoi, IBM Research |
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time | Farzad Parvaresh & Alexander Vardy, University of California San Diego | |
2004 | Cryptography in NC0 | Benny Applebaum, Technion; et al. |
Hardness of Approximating the Shortest Vector Problem in Lattices | Subhash Khot, Georgia Institute of Technology | |
2003 | On the Impossibility of Dimension Reduction in L1 | Bo Brinkman & Moses Charikar, Princeton University |
2002 | A Dichotomy Theorem for Constraints on a Three-Element Set | Andrei A. Bulatov, University of Oxford |
Minimizing Congestion in General Networks | Harald Räcke, Paderborn University | |
Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model | Boaz Barak, Weizmann Institute of Science | |
FSE (Software Engineering) | ||
2018 | Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks | Shengjian (Daniel) Guo, Virginia Tech; et al. |
An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems | Yu Gao, Chinese Academy of Sciences; et al. | |
Data Race Detection on Compressed Traces | Dileep Kini, University of Illinois at Urbana-Champaign; et al. | |
Oreo: Detection of Clones in the Twilight Zone | Vaibhav Saini, University of California Irvine; et al. | |
The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the ... | James C. Davis, Virginia Tech; et al. | |
Do Android Taint Analysis Tools Keep Their Promises? | Felix Pauck, Paderborn University; et al. | |
2017 | The Power of "Why" and "Why Not": Enriching Scenario Exploration with Provenance | Tim Nelson, Brown University; et al. |
Cooperative Kernels: GPU Multitasking for Blocking Algorithms | Tyler Sorensen, Imperial College London; et al. | |
Understanding Misunderstandings in Source Code | Dan Gopstein, New York University; et al. | |
Trade-Offs in Continuous Integration: Assurance, Security, and Flexibility | Michael Hilton, Oregon State University; et al. | |
Discovering Relational Specifications | Calvin Smith, University of Wisconsin-Madison; et al. | |
Automatically Diagnosing and Repairing Error Handling Bugs in C | Yuchi Tian & Baishakhi Ray, University of Virginia | |
Fairness Testing: Testing Software for Discrimination | Sainyam Galhotra, University of Massachusetts Amherst; et al. | |
2016 | Foraging and Navigations Fundamentally: Developers' Predictions of Value and Cost | David Piorkowski, Oregon State University; et al. |
Multi-Representational Security Analysis | Eunsuk Kang, University of California Berkeley; et al. | |
Factors Influencing Code Review Processes in Industry | Tobias Baum, Leibniz Universität Hannover; et al. | |
API Code Recommendation Using Statistical Learning from Fine-grained Changes | Anh Tuan Nguyen, Iowa State University; et al. | |
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis | Xiaofei Xie, Tianjin University; et al. | |
Why We Refactor? Confessions of GitHub Contributors | Danilo Silva, Federal University of Minas Gerais; et al. | |
Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis | Jianjun Huang, Purdue University; et al. | |
2015 | Optimizing energy consumption of GUIs in Android apps: a multi-objective approach | Mario Linares-Vásquez, College of William and Mary; et al. |
How Practitioners Perceive the Relevance of Software Engineering Research | David Lo, Singapore Management University; et al. | |
Effective Test Suites for Mixed Discrete-Continuous Stateflow Controllers | Reza Matinnejad, University of Luxembourg; et al. | |
Modeling Readability to Improve Unit Tests | Ermira Daka, University of Sheffield; et al. | |
Measure It? Manage It? Ignore It? Software Practitioners and Technical Debt | Neil A. Ernst, Carnegie Mellon University; et al. | |
A User-Guided Approach to Program Analysis | Ravi Mangal, Georgia Institute of Technology; et al. | |
MultiSE: Multi-path Symbolic Execution using Value Summaries | Koushik Sen, University of California Berkeley; et al. | |
Users Beware: Preference Inconsistencies Ahead | Farnaz Behrang, Georgia Institute of Technology; et al. | |
2014 | Selection and Presentation Practices for Code Example Summarization | Annie Ying & Martin Robillard, McGill University |
Are Mutants a Valid Substitute for Real Faults in Software Testing? | René Just, University of Washington; et al. | |
AI: A Lightweight System for Tolerating Concurrency Bugs | Mingxing Zhang, Tsinghua University; et al. | |
Powering the Static Driver Verifier using Corral | Akash Lal & Shaz Qadeer, Microsoft Research | |
Learning Natural Coding Conventions | Miltiadis Allamanis, University of Edinburgh; et al. | |
Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case Study | Klaus-Benedikt Schultis, Siemens Corporate Technology; et al. | |
2012 | Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software Libraries | Bradley Cossette & Robert Walker, University of Calgary |
Scalable Test Data Generation from Multidimensional Models | Emina Torlak, University of California Berkeley | |
Assessing the Value of Branches with What-if Analysis | Christian Bird & Thomas Zimmermann, Microsoft Research | |
2011 | Proactive Detection of Collaboration Conflicts | Yuriy Brun, University of Washington; et al. |
How Do Fixes Become Bugs? | Zuoning Yin, University of Illinois at Urbana-Champaign; et al. | |
Proving programs robust | Swarat Chaudhuri, Rice University; et al. | |
2010 | Creating and evolving developer documentation: understanding the decisions of open source contribu... | Barthélémy Dagenais & Martin P. Robillard, McGill University |
Developer Fluency: Achieving True Mastery in Software Projects | Minghui Zhou, Peking University Audris Mockus, Avaya Labs |
|
Staged Concurrent Program Analysis | Nishant Sinha & Chao Wang, NEC Labs America | |
2009 | Asserting and checking determinism for multithreaded programs | Jacob Burnim & Koushik Sen, University of California Berkeley |
Darwin: an approach for debugging evolving programs | Dawei Qi, National University of Singapore; et al. | |
Graph-based Mining of Multiple Object Usage Patterns | Tung Thanh Nguyen, Iowa State University; et al. | |
2008 | What makes a good bug report? | Nicolas Bettenburg, Saarland University; et al. |
Efficient online monitoring of web-service SLAs | Franco Raimondi, University College London; et al. | |
2007 | Automatic consistency assessment for query results in dynamic environments | Jamie Payton, University of North Carolina at Charlotte; et al. |
Globally distributed software development project performance: an empirical analysis | Narayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University | |
Mining specifications of malicious behavior | Mihai Christodorescu, University of Wisconsin; et al. | |
Object and reference immutability using Java generics | Yoav Zibin, Massachusetts Institute of Technology; et al. | |
2006 | Controlling factors in evaluating path-sensitive error detection techniques | Matthew B. Dwyer, University of Nebraska-Lincoln; et al. |
SYNERGY: a new algorithm for property checking | Bhargav S. Gulavani, Indian Institute of Technology; et al. | |
2005 | Automatic Generation of Suggestions for Program Investigation | Martin P. Robillard, McGill University |
CUTE: a concolic unit testing engine for C | Koushik Sen, University of Illinois at Urbana-Champaign; et al. | |
Context- and path-sensitive memory leak detection | Yichen Xie & Alex Aiken, Stanford University | |
2004 | Reasoning about partial goal satisfaction for requirements and design engineering | Emmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain |
A classification system and analysis for aspect-oriented programs | Martin Rinard, Massachusetts Institute of Technology; et al. | |
2003 | Eliminating redundancies with a "composition with adaptation" meta-programming technique | Stan Jarzabek, National University of Singapore Li Shubiao, Xi'an Jiaotong University |
A Family of Test Adequacy Criteria for Database-Driven Applications | Gregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh | |
Predicting problems caused by component upgrades | Stephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology | |
2002 | Isolating Cause-Effect Chains from Computer Programs | Andreas Zeller, Saarland University |
ICCV (Computer Vision) | ||
2017 | Mask R-CNN | Kaiming He, Facebook AI Research; et al. |
2015 | Deep Neural Decision Forests | Peter Kontschieder, Microsoft Research; et al. |
2013 | From Large Scale Image Categorization to Entry-Level Categories | Vicente Ordonez, University of North Carolina at Chapel Hill; et al. |
2011 | Relative Attributes | Devi Parikh, Toyota Technological Institute at Chicago Kristen Grauman, University of Texas at Austin |
2009 | Discriminative models for multi-class object layout | Chaitanya Desai, University of California Irvine; et al. |
2007 | Population Shape Regression From Random Design Data | Bradley Davis, University of North Carolina at Chapel Hill; et al. |
2005 | Globally Optimal Estimates for Geometric Reconstruction Problems | Fredrik Kahl, Lund University Didier Henrion, LAAS-CNRS |
2003 | Detecting Pedestrians using Patterns of Motion and Appearance | Paul Viola, Microsoft Research; et al. |
Image Parsing: Unifying Segmentation, Detection and Recognition | Zhuowen Tu, University of California Los Angeles; et al. | |
Image-based Rendering using Image-based Priors | Andrew Fitzgibbon, University of Oxford; et al. | |
2001 | Probabilistic Tracking with Exemplars in a Metric Space | Kentaro Toyama & Andrew Blake, Microsoft Research |
The Space of All Stereo Images | Steven Seitz, University of Washington | |
1999 | Euclidean Reconstruction and Reprojection up to Subgroups | Yi Ma, University of California Berkeley; et al. |
A Theory of Shape by Space Carving | Kiriakos Kutulakos, University of Rochester Steven Seitz, Carnegie Mellon University |
|
1998 | Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Paramet... | Marc Pollefeys, Katholieke Universiteit Leuven; et al. |
The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image Sequences | Phil Torr, Microsoft Research; et al. | |
ICML (Machine Learning) | ||
2018 | Delayed Impact of Fair Machine Learning | Lydia T. Liu, University of California Berkeley; et al. |
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples | Anish Athalye, Massachusetts Institute of Technology; et al. | |
2017 | Understanding Black-box Predictions via Influence Functions | Pang Wei Koh & Percy Liang, Stanford University |
2016 | Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs Sampling | Christopher De Sa, Stanford University; et al. |
Pixel Recurrent Neural Networks | Aaron Van den Oord, Google; et al. | |
Dueling Network Architectures for Deep Reinforcement Learning | Ziyu Wang, Google; et al. | |
2015 | A Nearly-Linear Time Framework for Graph-Structured Sparsity | Chinmay Hegde, Massachusetts Institute of Technology; et al. |
Optimal and Adaptive Algorithms for Online Boosting | Alina Beygelzimer, Yahoo! Research; et al. | |
2014 | Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis | Jian Tang, Peking University; et al. |
2013 | Vanishing Component Analysis | Roi Livni, The Hebrew University of Jerusalum; et al. |
Fast Semidifferential-based Submodular Function Optimization | Rishabh Iyer, University of Washington; et al. | |
2012 | Bayesian Posterior Sampling via Stochastic Gradient Fisher Scoring | Sungjin Ahn, University of California Irvine; et al. |
2011 | Computational Rationalization: The Inverse Equilibrium Problem | Kevin Waugh, Carnegie Mellon University; et al. |
2010 | Hilbert Space Embeddings of Hidden Markov Models | Le Song, Carnegie Mellon University; et al. |
2009 | Structure preserving embedding | Blake Shaw & Tony Jebara, Columbia University |
2008 | SVM Optimization: Inverse Dependence on Training Set Size | Shai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago |
2007 | Information-theoretic metric learning | Jason V. Davis, University of Texas at Austin; et al. |
2006 | Trading convexity for scalability | Ronan Collobert, NEC Labs America; et al. |
2005 | A support vector method for multivariate performance measures | Thorsten Joachims, Cornell University |
1999 | Least-Squares Temporal Difference Learning | Justin A. Boyan, NASA Ames Research Center |
ICSE (Software Engineering) | ||
2018 | Large-Scale Analysis of Framework-Specific Exceptions in Android Apps | Lingling Fan, East China Normal University; et al. |
Generalized Data Structure Synthesis | Calvin Loncaric, University of Washington; et al. | |
Static Automated Program Repair for Heap Properties | Rijnard van Tonder & Claire Le Goues, Carnegie Mellon University | |
Towards Optimal Concolic Testing | Xinyu Wang, Zhejiang University; et al. | |
Spatio-Temporal Context Reduction: A Pointer-Analysis- Based Static Approach for Detecting Use-Aft... | Hua Yan, University of New South Wales; et al. | |
Identifying Design Problems in the Source Code: A Grounded Theory | Leonardo Sousa, PUC-Rio; et al. | |
Traceability in the Wild: Automatically Augmenting Incomplete Trace links | Michael Rath, Technical University Ilmenau; et al. | |
Automated Localization for Unreproducible Builds | Zhilei Ren, Dalian University of Technology; et al. | |
2017 | Decoding the representation of code in the brain: An fMRI study of code review and expertise | Benjamin Floyd, University of Virginia; et al. |
Code Defenders: Crowdsourcing Effective Tests and Subtle Mutants with a Mutation Testing Game | José Miguel Rojas, The University of Sheffield; et al. | |
Clone Refactoring with Lambda Expressions | Nikolaos Tsantalis, Concordia University; et al. | |
Optimizing Test Placement for Module-Level Regression Testing | August Shi, University of Illinois at Urbana-Champaign; et al. | |
A Grounded Theory of Agile Transitions in Practice | Rashina Hoda, The University of Auckland James Noble Victoria, University of Wellington |
|
Challenges for Static Analysis of Java Reflection - Literature Review and Empirical Study | Davy Landman, Centrum Wiskunde & Informatica; et al. | |
2016 | Feedback-Directed Instrumentation for Deployed JavaScript Applications | Magnus Madsen, University of Waterloo; et al. |
From Word Embeddings to Document Similarities for Improved Information Retrieval in Software Engin... | Xin Ye, Ohio University Athens; et al. | |
On the Techniques We Create, the Tools We Build, and Their Misalignments: A Study of KLEE | Eric F. Rizzi, Grammatech; et al. | |
Work Practices and Challenges in Pull-Based Development: The Contributor's Perspective | Georgios Gousios, Radboud University Nijmegen; et al. | |
Termination-Checking for LLVM Peephole Optimizations | David Menendez & Santosh Nagarakatte, Rutgers University | |
Guiding Dynamic Symbolic Execution toward Unverified Program Executions | Maria Christakis, ETH Zurich; et al. | |
Efficient Large-Scale Trace Checking Using MapReduce | Marcello M. Bersani, Politecnico di Milano; et al. | |
VDTest: An Automated Framework to Support Testing for Virtual Devices | Tingting Yu, University of Kentucky; et al. | |
Energy Profiles of Java Collections Classes | Samir Hasan, Auburn University; et al. | |
2015 | Alloy*: A General-Purpose Higher-Order Relational Constraint Solver | Aleksandar Milicevic, Massachusetts Institute of Technology; et al. |
How Much Up-Front? A Grounded theory of Agile Architecture | Michael Waterman, Specialised Architecture Services Ltd; et al. | |
Views on Internal and External Validity in Empirical Software Engineering | Janet Siegmund, University of Passau; et al. | |
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational F... | Mathieu Lavallée & Pierre N. Robillard, Polytechnique Montréal | |
When and Why Your Code Starts to Smell Bad | Michele Tufano, College of William and Mary; et al. | |
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes | Adrian Nistor, Chapman University; et al. | |
2014 | Characterizing and Detecting Performance Bugs for Smartphone Applications | Yepang Liu, Hong Kong University of Science and Technology; et al. |
Improving Automated Source Code Summarization via an Eye-Tracking Study of Programmers | Paige Rodeghero, University of Notre Dame; et al. | |
Understanding JavaScript Event-Based Interactions | Saba Alimadadi, University of British Columbia; et al. | |
Coverage Is Not Strongly Correlated with Test Suite Effectiveness | Laura Inozemtseva & Reid Holmes, University of Waterloo | |
Cowboys, Ankle Sprains, and Keepers of Quality: How Is Video Game Development Different from Softw... | Emerson Murphy-Hill, North Carolina State University; et al. | |
Trading Robustness for Maintainability: An Empirical Study of Evolving C# Programs | Nélio Cacho, Federal University of Rio Grande do Norte; et al. | |
Unit Test Virtualization with VMVM | Jonathan Bell & Gail Kaiser, Columbia University | |
Enhancing Symbolic Execution with Veritesting | Thanassis Avgerinos, Carnegie Mellon University; et al. | |
A Study and Toolkit for Asynchronous Programming in C# | Semih Okur, University of Illinois at Urbana-Champaign; et al. | |
2013 | Dual Ecological Measures of Focus in Software Development | Daryl Posnett, University of California Davis; et al. |
Data Clone Detection and Visualization in Spreadsheets | Felienne Hermans, Delft University of Technology; et al. | |
UML in Practice | Marian Petre, Open University | |
Automatic patch generation learned from human-written patches | Dongsun Kim, Hong Kong University of Science and Technology; et al. | |
Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop Clouds | Weiyi Shang, Queen's University; et al. | |
Interaction-Based Test-Suite Minimization | Dale Blue, IBM; et al. | |
2012 | Understanding Integer Overflow in C/C++ | Will Dietz, University of Illinois at Urbana-Champaign; et al. |
Using Dynamic Analysis to Discover Polynomial and Array Invariants | ThanhVu Nguyen, University of New Mexico; et al. | |
Amplifying Tests to Validate Exception Handling Code | Pingyu Zhang & Sebastian Elbaum, University of Nebraska-Lincoln | |
Partial Models: Towards Modeling and Reasoning with Uncertainty | Michalis Famelis, University of Toronto; et al. | |
How Do Professional Developers Comprehend Software? | Tobias Roehm, Technische Universität München; et al. | |
A Tactic-Centric Approach for Automating Traceability of Quality Concerns | Mehdi Mirakhorli, DePaul University; et al. | |
Automated Detection of Client-State Manipulation Vulnerabilities | Anders Møller & Mathias Schwarz, Aarhus University | |
2011 | Verifying Multi-threaded Software using SMT-based Context-Bounded Model Checking | Lucas Cordeiro & Bernd Fischer, University of Southampton |
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and ... | Narayan Ramasubbu, Singapore Management University; et al. | |
Programs, tests, and oracles: the foundations of testing revisited | Matt Staats, University of Minnesota; et al. | |
On-demand Feature Recommendations Derived from Mining Public Product Descriptions | Horatiu Dumitru, DePaul University; et al. | |
Run-Time Efficient Probabilistic Model Checking | Antonio Filieri, Politecnico di Milano; et al. | |
2010 | A Machine Learning Approach for Tracing Regulatory Codes to Product Specific Requirements | Jane Cleland-Huang, DePaul University; et al. |
Collaborative Reliability Prediction of Service-Oriented Systems | Zibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong | |
A Cut-off Approach for Bounded Verification of Parameterized Systems | Qiusong Yang & Mingshu Li, Chinese Academy of Sciences | |
Test Generation through Programming in UDITA | Milos Gligoric, University of Illinois at Urbana-Champaign; et al. | |
A Degree-of-Knowledge Model to Capture Source Code Familiarity | Thomas Fritz, University of British Columbia; et al. | |
2009 | How We Refactor, and How We Know It | Emerson Murphy-Hill, Portland State University; et al. |
Effective Static Deadlock Detection | Mayur Naik, Intel Research; et al. | |
Invariant-Based Automatic Testing of AJAX User Interfaces | Ali Mesbah & Arie van Deursen, Delft University of Technology | |
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows Vista | Christian Bird, University of California Davis; et al. | |
Automatically finding patches using genetic programming | Westley Weimer, University of Virginia; et al. | |
2008 | Precise memory leak detection for java software using container profiling | Guoqing Xu & Atanas Rountev, Ohio State University |
Debugging reinvented: asking and answering why and why not questions about program behavior | Andrew J. Ko & Brad A. Myers, Carnegie Mellon University | |
Recommending adaptive changes for framework evolution | Barthélémy Dagenais & Martin P. Robillard, McGill University | |
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental Approach | Joseph Ruthruff, University of Nebraska-Lincoln; et al. | |
The effect of program and model structure on mc/dc test adequacy coverage | Ajitha Rajan, University of Minnesota; et al. | |
2007 | Refactoring for Parameterizing Java Classes | Adam Kiezun, Massachusetts Institute of Technology; et al. |
Tracking Code Clones in Evolving Software | Ekwa Duala-Ekoko & Martin P. Robillard, McGill University | |
Matching and Merging of Statecharts Specifications | Shiva Nejati, University of Toronto; et al. | |
Predicting Faults from Cached History | Sunghun Kim, Massachusetts Institute of Technology; et al. | |
2006 | Model-Based Development of Dynamically Adaptive Software | Ji Zhang & Betty H.C. Cheng, Michigan State University |
Who Should Fix This Bug? | John Anvik, University of British Columbia; et al. | |
2005 | Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Pe... | Andrew Ko, Carnegie Mellon University; et al. |
Is Mutation an Appropriate Tool for Testing Experiments? | James Andrews, University of Western Ontario; et al. | |
Using Structural Context to Recommend Source Code Examples | Reid Holmes & Gail Murphy, University of British Columbia | |
Data Structure Repair Using Goal-Directed Reasoning | Brian Demsky & Martin Rinard, Massachusetts Institute of Technology | |
2004 | SNIAFL: Towards a Static Non-Interactive Approach to Feature Location | Wei Zhao, Peking University; et al. |
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized Systems | Rohit Khare & Richard N. Taylor, University of California Irvine | |
An Empirical Study of Software Reuse vs. Defect-Density and Stability | Parastoo Mohagheghi, Ericsson; et al. | |
A Tool for Writing and Debugging Algebraic Specifications | Johannes Henkel & Amer Diwan, University of Colorado | |
Static Checking of Dynamically Generated Queries in Database Applications | Carl Gould, University of California Davis; et al. | |
2003 | Precise Dynamic Slicing Algorithms | Xiangyu Zhang, University of Arizona; et al. |
Modular Verification of Software Components in C | Sagar Chaki, Carnegie Mellon University; et al. | |
IJCAI (Artificial Intelligence) | ||
2018 | Reasoning about Consensus when Opinions Diffuse through Majority Dynamics | Vincenzo Auletta, University of Salerno; et al. |
SentiGAN: Generating Sentimental Texts via Mixture Adversarial Networks | Ke Wang & Xiaojun Wan, Peking University | |
From Conjunctive Queries to Instance Queries in Ontology-Mediated Querying | Cristina Feier, University of Bremen; et al. | |
What game are we playing? End-to-end learning in normal and extensive form games | Chun Kai Ling, Carnegie Mellon University; et al. | |
Commonsense Knowledge Aware Conversation Generation with Graph Attention | Hao Zhou, Tsinghua University; et al. | |
R-SVM+: Robust Learning with Privileged Information | Xue Li, Wuhan University; et al. | |
A Degeneracy Framework for Graph Similarity | Giannis Nikolentzos, École Polytechnique; et al. | |
2017 | Foundations of Declarative Data Analysis Using Limit Datalog Programs | Mark Kaminski, University of Oxford; et al. |
2016 | Hierarchical Finite State Controllers for Generalized Planning | Javier Segovia, Universitat Pompeu Fabra; et al. |
2015 | Bayesian Active Learning for Posterior Estimation | Kirthevasan Kandasamy, Carnegie Mellon University; et al. |
Recursive Decomposition for Nonconvex Optimization | Abram L. Friesen & Pedro Domingos, University of Washington | |
2013 | Bayesian Optimization in High Dimensions via Random Embeddings | Ziyu Wang, University of British Columbia; et al. |
Flexibility and Decoupling in the Simple Temporal Problem | Michel Wilson, Delft University of Technology; et al. | |
2011 | Unweighted Coalitional Manipulation Under the Borda Rule is NP-Hard | Nadja Betzler, Technische Universität Berlin; et al. |
Nested Rollout Policy Adaptation for Monte Carlo Tree Search | Christopher D. Rosin, Parity Computing | |
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean Spaces | Roman Kontchakov, Birkbeck College London; et al. | |
2009 | Consequence-Driven Reasoning for Horn SHIQ Ontologies | Yevgeny Kazakov, University of Oxford |
Learning Conditional Preference Networks with Queries | Frederic Koriche, Université Montpellier II Bruno Zanuttini, Université de Caen Basse-Normandie |
|
2007 | Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian Networks | Maleeha Qazi, Siemens Medical Solutions; et al. |
Building Structure into Local Search for SAT | Duc Nghia Pham, Griffith University; et al. | |
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Pro... | Luc Mercier & Pascal Van Hentenryck, Brown University | |
2005 | Learning Coordination Classifiers | Yuhong Guo, University of Alberta; et al. |
Solving Checkers | Jonathan Schaeffer, University of Alberta; et al. | |
A Probabilistic Model of Redundancy in Information Extraction | Doug Downey, University of Washington; et al. | |
2003 | Approximating Game-Theoretic Optimal Strategies for Full-scale Poker | Darse Billings, University of Alberta; et al. |
Thin Junction Tree Filters for Simultaneous Localization and Mapping | Mark A. Paskin, University of California Berkeley | |
2001 | Complexity Results for Structure-Based Causality | Thomas Eiter & Thomas Lukasiewicz, Vienna University of Technology |
1999 | Learning in Natural Language | Dan Roth, University of Illinois at Urbana-Champaign |
A Distributed Case-Based Reasoning Application for Engineering Sales Support | Ian Watson, University of Salford Dan Gardingen, Western Air |
|
1997 | Object Identification in a Bayesian Context | Timothy Huang & Stuart Russell, University of California Berkeley |
Translingual Information Retrieval: A Comparative Evaluation | Jaime G. Carbonell, Carnegie Mellon University; et al. | |
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolo... | Fangzhen Lin, The Hongkong University of Science and Technology | |
INFOCOM (Networking) | ||
2018 | WiFED: WiFi Friendly Energy Delivery with Distributed Beamforming | Subhramoy Mohanti, Northeastern University; et al. |
Understanding Ethereum via Graph Analysis | Ting Chen, University of Electronic Science and Technology of China; et al. | |
Optimizing Age of Information in Wireless Networks with Throughput Constraints | Igor Kadota, Massachusetts Institute of Technology; et al. | |
2017 | One Step at a Time: Optimizing SDN Upgrades in ISP Networks | Konstantinos Poularakis, Yale University; et al. |
2016 | Heavy-Ball: A New Approach to Tame Delay and Convergence in Wireless Network Optimization | Jia Liu, Ohio State University; et al. |
2015 | The Power of Slightly More than One Sample in Randomized Load Balancing | Lei Ying, Arizona State University; et al. |
2014 | Joint Static and Dynamic Traffic Scheduling in Data Center Networks | Zizhong Cao, Polytechnic Institute of New York University; et al. |
Performance Evaluation and Asymptotics for Content Delivery Networks | Virag Shah & Gustavo de Veciana, University of Texas at Austin | |
2013 | On the Steady-State of Cache Networks | Elisha J. Rosensweig, University of Massachusetts Amherst; et al. |
2012 | Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework | Carlee Joe-Wong, Princeton University; et al. |
2011 | Dynamic right-sizing for power-proportional data centers | Minghong Lin, California Institute of Technology; et al. |
2010 | On the Feasibility and Efficacy of Protection Routing in IP Networks | Kin-Wah Kwong, University of Pennsylvania; et al. |
2009 | Queuing Network Models for Multi-Channel P2P Live Streaming Systems | Di Wu, Polytechnic Institute of New York University; et al. |
2008 | On the Feasibility of the Link Abstraction in (Rural) Mesh Networks | Dattatraya Gokhal, Indian Navy; et al. |
Theoretical Results on Base Station Movement Problem for Sensor Networks | Yi Shi & Y. Thomas Hou, Virginia Tech | |
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless... | Changhee Joo, Ohio State University; et al. | |
2007 | Disruption free topology reconfiguration in OSPF networks | Pierre Francois, Université catholique de Louvain; et al. |
2006 | Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective | Gaurav Sharma, Purdue University; et al. |
2005 | Perfect Simulation and Stationarity of a Class of Mobility Models | Jean-Yves Le Boude, École Polytechnique Fédérale de Lausanne Milan Vojnović, Microsoft Research |
2004 | Throughput-Delay Trade-Off in Wireless Networks | Abbas El Gamal, Stanford University; et al. |
2003 | User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks | Sem Borst, Bell Labs |
2002 | Priority Service and Max-Min Fairness | Peter Marbach, University of Toronto |
2001 | Mobility increases the capacity of ad-hoc wireless networks | Matthias Grossglauser, AT&T Laboratories David Tse, University of California Berkeley |
2000 | The Chaotic Nature of TCP Congestion Control | András Veres, Ericsson Miklós Boda, Ericsson Research |
1999 | Bandwidth Sharing: Objectives and Algorithms | Laurent Massoulié, Microsoft Research James Robert, France Telecom |
1998 | Effective Bandwidths in Wireless Networks with Multiuser Receivers | David Tse, University of California Berkeley Stephen Hanly, University of Melbourne |
1996 | An algorithm for multicast tree generation in networks with asymmetric links | Ram Ramanathan, BBN Technologies |
KDD (Data Mining) | ||
2018 | Adversarial Attacks on Neural Networks for Graph Data | Daniel Zügner, Technical University of Munich; et al. |
2017 | Accelerating Innovation Through Analogy Mining | Tom Hope, Hebrew University of Jerusalem; et al. |
2016 | FRAUDAR: Bounding Graph Fraud in the Face of Camouflage | Bryan Hooi, Carnegie Mellon University; et al. |
2015 | Efficient Algorithms for Public-Private Social Networks | Flavio Chierichetti, Sapienza University of Rome; et al. |
2014 | Reducing the Sampling Complexity of Topic Models | Aaron Li, Carnegie Mellon University; et al. |
2013 | Simple and Deterministic Matrix Sketching | Edo Liberty, Yahoo! Research |
2012 | Searching and Mining Trillions of Time Series Subsequences under Dynamic Time Warping | Thanawin Rakthanmanon, University of California Riverside; et al. |
2011 | Leakage in Data Mining: Formulation, Detection, and Avoidance | Shachar Kaufman, Tel-Aviv University; et al. |
2010 | Large linear classification when data cannot fit in memory | Hsiang-Fu Yu, National Taiwan University; et al. |
Connecting the dots between news articles | Dafna Shahaf & Carlos Guestrin, Carnegie Mellon University | |
2009 | Collaborative Filtering with Temporal Dynamics | Yehuda Koren, Yahoo! Research |
2008 | Fastanova: an efficient algorithm for genome-wide association study | Xiang Zhang, University of North Carolina at Chapel Hill; et al. |
2007 | Predictive discrete latent factor models for large scale dyadic data | Deepak Agarwal & Srujana Merugu, Yahoo! Research |
2006 | Training linear SVMs in linear time | Thorsten Joachims, Cornell University |
2005 | Graphs over time: densification laws, shrinking diameters and possible explanations | Jure Leskovec, Carnegie Mellon University; et al. |
2004 | A probabilistic framework for semi-supervised clustering | Sugato Basu, University of Texas at Austin; et al. |
2003 | Maximizing the spread of influence through a social network | David Kempe, Cornell University; et al. |
2002 | Pattern discovery in sequences under a Markov assumption | Darya Chudova & Padhraic Smyth, University of California Irvine |
2001 | Robust space transformations for distance-based operations | Edwin M. Knorr, University of British Columbia; et al. |
2000 | Hancock: a language for extracting signatures from data streams | Corinna Cortes, AT&T Laboratories; et al. |
1999 | MetaCost: a general method for making classifiers cost-sensitive | Pedro Domingos, Universidade Técnica de Lisboa |
1998 | Occam's Two Razors: The Sharp and the Blunt | Pedro Domingos, Universidade Técnica de Lisboa |
1997 | Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Di... | Foster Provost & Tom Fawcett, NYNEX Science and Technology |
MOBICOM (Mobile) | ||
2018 | SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks | Mehrdad Moradi, University of Michigan; et al. |
2017 | WEBee: Physical-Layer Cross-Technology Communication via Emulation | Zhijun Li & Tian He, University of Minnesota |
2015 | CAreDroid: Adaptation Framework for Android ContextAware Applications | Salma Elmalaki, University of California Los Angeles; et al. |
2014 | Tagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS Devices | Lei Yang, Tsinghua University; et al. |
2013 | Whole-Home Gesture Recognition Using Wireless Signals | Qifan Pu, University of Washington; et al. |
2012 | Distinguishing Users with Capacitative Touch Communication | Tam Vu, Rutgers University; et al. |
2011 | Detecting Driver Phone Use Leveraging Car Speakers | Jie Yang, Stevens Institute of Technology; et al. |
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks | Xinyu Zhang & Kang G. Shin, University of Michigan | |
2010 | The κ factor: inferring protocol performance using inter-link reception correlation | Kannan Srinivasan, Stanford University; et al. |
2009 | CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data Path | Vivek Shrivastava, University of Wisconsin; et al. |
2008 | Assessment of Urban-Scale Wireless Networks with a Small Number of Measurements | Joshua Robinson, Rice University; et al. |
NSDI (Networking) | ||
2018 | NetChain: Scale-Free Sub-RTT Coordination | Xin Jin, Johns Hopkins University; et al. |
2017 | mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes | Muhammad Asim Jamshed, KAIST; et al. |
2016 | Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions | Bryce Kellogg, University of Washington; et al. |
2015 | Queues Don't Matter When You Can JUMP Them! | Matthew P. Grosvenor, University of Cambridge; et al. |
Designing Distributed Systems Using Approximate Synchrony in Data Center Networks | Dan R. K. Ports, University of Washington; et al. | |
The Design and Implementation of Open vSwitch | Ben Pfaff, VMware; et al. | |
2014 | Software Dataplane Verification | Mihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne |
2013 | Embassies: Radically Refactoring the Web | Jon Howell, Microsoft Research; et al. |
A Fault-Tolerant Engineered Network | Vincent Liu, University of Washington; et al. | |
2012 | Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | Matei Zaharia, University of California Berkeley; et al. |
2011 | Design, Implementation and Evaluation of Congestion Control for Multipath TCP | Damon Wischik, University College London; et al. |
ServerSwitch: A Programmable and High Performance Platform for Data Center Networks | Guohan Lu, Microsoft Research; et al. | |
2010 | Reverse traceroute | Ethan Katz-Bassett, University of Washington; et al. |
2009 | Sora: High Performance Software Radio Using General Purpose Multi-core Processors | Kun Tan, Microsoft Research; et al. |
TrInc: Small Trusted Hardware for Large Distributed Systems | Dave Levin, University of Maryland; et al. | |
2008 | Remus: High Availability via Asynchronous Virtual Machine Replication | Brendan Cully, University of British Columbia; et al. |
Consensus Routing: The Internet as a Distributed System | John P. John, University of Washington; et al. | |
2007 | Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems Code | Charles Killian, University of California San Diego; et al. |
2006 | Experience with an Object Reputation System for Peer-to-Peer Filesharing | Kevin Walsh & Emin Gün Sirer, Cornell University |
Replay Debugging for Distributed Applications | Dennis Geels, University of California Berkeley; et al. | |
2005 | Detecting BGP Configuration Faults with Static Analysis | Nick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology |
2004 | Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Netwo... | Philip Levis, University of California Berkeley; et al. |
OSDI (Operating Systems) | ||
2018 | REPT: Reverse Debugging of Failures in Deployed Software | Weidong Cui, Microsoft Research; et al. |
Orca: Differential Bug Localization in Large-Scale Services | Ranjita Bhagwan, Microsoft Research; et al. | |
LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation | Yizhou Shan, Purdue University; et al. | |
2016 | Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data | Tyler Hunt, University of Texas at Austin; et al. |
Push-Button Verification of File Systems via Crash Refinement | Helgi Sigurbjarnarson, University of Washington; et al. | |
Early Detection of Configuration Errors to Reduce Failure Damage | Tianyin Xu, University of California San Diego; et al. | |
2014 | Shielding Applications from an Untrusted Cloud with Haven | Andrew Baumann, Microsoft Research; et al. |
IX: A Protected Dataplane Operating System for High Throughput and Low Latency | Adam Belay, Stanford University; et al. | |
Arrakis: The Operating System is the Control Plane | Simon Peter, University of Washington; et al. | |
2012 | Spanner: Google's Globally-Distributed Database | James C. Corbett, Google; et al. |
2010 | Efficient System-Enforced Deterministic Parallelism | Amittai Aviram, Yale University; et al. |
The Turtles Project: Design and Implementation of Nested Virtualization | Muli Ben-Yehuda, IBM Research; et al. | |
2008 | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs | Cristian Cadar, Stanford University; et al. |
Difference Engine: Harnessing Memory Redundancy in Virtual Machines | Diwaker Gupta, University of California San Diego; et al. | |
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Lan... | Yuan Yu, Microsoft Research; et al. | |
2006 | Bigtable: A Distributed Storage System for Structured Data | Fay Chang, Google; et al. |
Rethink the Sync | Edmund B. Nightingale, University of Michigan; et al. | |
2004 | Using Model Checking to Find Serious File System Errors | Junfeng Yang, Stanford University; et al. |
Recovering Device Drivers | Michael M. Swift, University of Washington; et al. | |
2002 | Memory Resource Management in VMware ESX Server | Carl A. Waldspurger, VMware |
2000 | Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions | Dawson Engler, Stanford University; et al. |
1999 | IO-Lite: A Unified I/O Buffering and Caching System | Vivek S. Pai, Rice University; et al. |
1996 | Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications | Todd C. Mowry, University of Toronto; et al. |
Safe Kernel Extensions Without Run-Time Checking | George C. Necula & Peter Lee, Carnegie Mellon University | |
PLDI (Programming Languages) | ||
2018 | Program synthesis using conflict-driven learning | Yu Feng, University of Texas at Austin; et al. |
The semantics of transactions and weak memory in x86, Power, ARM, and C++ | Nathan Chong, ARM; et al. | |
A data-driven CHC solver | He Zhu, Galois; et al. | |
2017 | Low Overhead Dynamic Binary Translation on ARM | Amanieu D'Antras, University of Manchester; et al. |
Repairing sequential consistency in C/C++11 | Ori Lahav, MPI-SWS; et al. | |
Bringing the web up to speed with WebAssembly | Andreas Haas, Google; et al. | |
Compiling without continuations | Luke Maurer, University of Oregon; et al. | |
2016 | Assessing the limits of program-specific garbage collection performance | Nicholas Jacek, University of Massachusetts Amherst; et al. |
Into the Depths of C: Elaborating the De Facto Standards | Kayvan Memarian, University of Cambridge; et al. | |
Transactional Data Structure Libraries | Alexander Spiegelman, Technion; et al. | |
Types from data: Making structured data first-class citizens in F# | Tomas Petricek, University of Cambridge; et al. | |
2015 | Provably Correct Peephole Optimizations with Alive | Nuno P. Lopes, Microsoft Research; et al. |
Diagnosing Type Errors with Class | Danfeng Zhang, Cornell University; et al. | |
Automatically Improving Accuracy for Floating Point Expressions | Pavel Panchekha, University of Washington; et al. | |
2014 | Improving JavaScript Performance by Deconstructing the Type System | Wonsun Ahn, University of Illinois at Urbana-Champaign; et al. |
Compiler validation via equivalence modulo inputs | Vu Le, University of California Davis; et al. | |
On Abstraction Refinement for Program Analyses in Datalog | Xin Zhang, Georgia Institute of Technology; et al. | |
2013 | Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many ... | Sriram Sankaranarayanan, University of Colorado; et al. |
A General Constraint-centric Scheduling Framework for Spatial Architectures | Tony Nowatzki, University of Wisconsin; et al. | |
Reconciling Exhaustive Pattern Matching with Objects | Chinawat Isradisaikul & Andrew C. Myers, Cornell University | |
CLAP: Recording Local Executions to Reproduce Concurrency Failures | Jeff Huang, Hong Kong University of Science and Technology; et al. | |
2012 | Concurrent Data Representation Synthesis | Peter Hawkins, Stanford University; et al. |
2011 | Data Representation Synthesis | Peter Hawkins, Stanford University; et al. |
2010 | Safe to the Last Instruction: Automated Verification of a Type-Safe Operating System | Jean Yang, Massachusetts Institute of Technology Chris Hawblitzel, Microsoft Research |
2009 | Binary Analysis for Measurement and Attribution of Program Performance | Nathan Tallent, Rice University; et al. |
2007 | Fault-tolerant Typed Assembly Language | Frances Perry, Princeton University; et al. |
The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of Code | Ben Hardekopf & Calvin Lin, University of Texas at Austin | |
2005 | Automatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the Heap | Chris Lattner & Vikram Adve, University of Illinois at Urbana-Champaign |
Programming by Sketching for Bit-Streaming Programs | Armando Solar-Lezama, University of California Berkeley; et al. | |
2004 | Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams | John Whaley & Monica S. Lam, Stanford University |
2003 | Automatically Proving the Correctness of Compiler Optimizations | Sorin Lerner, University of Washington; et al. |
2000 | Dynamo: a transparent dynamic optimization system | Vasanth Bala, Hewlett-Packard Labs; et al. |
1999 | Whole program paths | James R. Larus, Microsoft Research |
PODS (Databases) | ||
2018 | Entity Matching with Active Monotone Classification | Yufei Tao, Chinese University of Hong Kong |
2017 | Dichotomies in Ontology-Mediated Querying with the Guarded Fragment | André Hernich, University of Liverpool; et al. |
2016 | FAQ: Questions Asked Frequently | Mahmoud Abo Khamis, University at Buffalo; et al. |
2015 | Parallel-Correctness and Transferability for Conjunctive Queries | Tom J. Ameloot, Hasselt University; et al. |
2014 | Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Co... | Tom J. Ameloot, Hasselt University; et al. |
2013 | Verification of database-driven systems via amalgamation | Mikołaj Bojańczyk, University of Warsaw; et al. |
2012 | Worst-case Optimal Join Algorithms | Hung Q. Ngo, University at Buffalo; et al. |
2011 | Data Exchange Beyond Complete Data | Marcelo Arenas, Pontificia Universidad Católica de Chile; et al. |
2010 | An Optimal Algorithm for the Distinct Elements Problem | Daniel M. Kane, Harvard University; et al. |
2009 | Size and Treewidth Bounds for Conjunctive Queries | Georg Gottlob, University of Oxford; et al. |
2008 | Estimating PageRank on Graph Streams | Atish Das Sarma, Georgia Institute of Technology; et al. |
2007 | Generalized Hypertree Decompositions: NP-Hardness and Tractable Variants | Georg Gottlob, University of Oxford; et al. |
2006 | Two-variable logic on data trees and XML reasoning | Mikolaj Bojanczyk, Warsaw University; et al. |
2005 | On the complexity of division and set joins in the relational algebra | Dirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum |
XML data exchange: consistency and query answering | Marcelo Arenas & Leonid Libkin, University of Toronto | |
2004 | Conditional XPath, the first order complete XPath dialect | Maarten Marx, University of Amsterdam |
2003 | An Information-Theoretic Approach to Normal Forms for Relational and XML Data | Marcelo Arenas & Leonid Libkin, University of Toronto |
2002 | Monadic Datalog and the Expressive Power of Languages for Web Information Extraction | Georg Gottlob & Christoph Koch, Technische Universität Wien |
2001 | Optimal aggregation algorithms for middleware | Ronald Fagin, IBM Research; et al. |
2000 | Auditing Boolean attributes | Jon Kleinberg, Cornell University; et al. |
1999 | Exact and approximate aggregation in constraint query languages | Michael Benefikt & Leonid Libkin, Bell Labs |
1998 | A lower bound theorem for indexing schemes and its application to multidimensional range queries | Vasilis Samoladas & Daniel P. Miranker, University of Texas at Austin |
Expressiveness of structured document query languages based on attribute grammars | Frank Neven & Jan Van den Bussche, Limburgs Universitair Centrum | |
1997 | On the Complexity of Database Queries | Christos H. Papadimitriou, University of California Berkeley Mihalis Yannakakis, Bell Labs |
S&P (Security and Privacy) | ||
2018 | DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice | Vincent Cheval, Inria; et al. |
On Enforcing the Digital Immunity of a Large Humanitarian Organization | Stevens Le Blond, École Polytechnique Fédérale de Lausanne; et al. | |
2017 | Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate | Karthikeyan Bhargavan, INRIA; et al. |
2016 | A2: Analog Malicious Hardware | Kaiyuan Yang, University of Michigan; et al. |
2015 | Riposte: An Anonymous Messaging System Handling Millions of Users | Henry Corrigan-Gibbs, Stanford University; et al. |
A Messy State of the Union: Taming the Composite State Machines of TLS | Benjamin Beurdouche, INRIA; et al. | |
2014 | Secure Multiparty Computations on BitCoin | Marcin Andrychowicz, University of Warsaw; et al. |
Bootstrapping Privacy Compliance in Big Data Systems | Shayak Sen, Carnegie Mellon University; et al. | |
2013 | Pinocchio: Nearly Practical Verifiable Computation | Bryan Parno, Microsoft Research; et al. |
2012 | Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards | Benedikt Driessen, Ruhr-Universität Bochum; et al. |
2011 | Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks | Andrew M. White, University of North Carolina at Chapel Hill; et al. |
2010 | SCiFI - A System for Secure Face Identification | Margarita Osadchy, University of Haifa; et al. |
2009 | Native Client: A Sandbox for Portable, Untrusted x86 Native Code | Bennet Yee, Google; et al. |
2008 | Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses | Daniel Halperin, University of Washington; et al. |
SIGCOMM (Networking) | ||
2018 | Inferring Persistent Interdomain Congestion | Saksham Agarwal, Cornell University; et al. |
2017 | Re-architecting datacenter networks and stacks for low latency and high performance | Mark Handley, University College London; et al. |
Language-directed hardware design for network performance monitoring | Srinivas Narayana, Massachusetts Institute of Technology; et al. | |
2016 | Eliminating Channel Feedback in Next-Generation Cellular Networks | Deepak Vasisht, Massachusetts Institute of Technology; et al. |
Inter-Technology Backscatter: Towards Internet Connectivity for Implanted Devices | Vikram Iyer, University of Washington; et al. | |
Don't Mind the Gap: Bridging Network-wide Objectives and Device-level Configurations | Ryan Beckett, Princeton University; et al. | |
2015 | Central Control Over Distributed Routing | Stefano Vissicchio, Université catholique de Louvain; et al. |
2014 | Balancing Accountability and Privacy in the Network | David Naylor, Carnegie Mellon University; et al. |
CONGA: Distributed Congestion-Aware Load Balancing for Datacenters | Mohammad Alizadeh, Cisco Systems; et al. | |
2013 | Ambient Backscatter: Wireless Communication Out of Thin Air | Vincent Liu, University of Washington; et al. |
2012 | Multi-Resource Fair Queueing for Packet Processing | Ali Ghodsi, University of California Berkeley; et al. |
2011 | They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices | Shyamnath Gollakota, Massachusetts Institute of Technology; et al. |
2010 | Efficient Error Estimating Coding: Feasibility and Applications | Binbin Chen, National University of Singapore; et al. |
2009 | White Space Networking with Wi-Fi like Connectivity | Paramvir Bahl, Microsoft Research; et al. |
2008 | ZigZag Decoding: Combating Hidden Terminals in Wireless Networks | Shyamnath Gollakota & Dina Katabi, Massachusetts Institute of Technology |
SIGIR (Information Retrieval) | ||
2018 | Should I Follow the Crowd? A Probabilistic Analysis of the Effectiveness of Popularity in Recommen... | Rocío Cañamares & Pablo Castells, Universidad Autónoma de Madrid |
2017 | BitFunnel: Revisiting Signatures for Search | Bob Goodwin, Microsoft; et al. |
2016 | Understanding Information Need: An fMRI Study | Yashar Moshfeghi, University of Glasgow; et al. |
2015 | QuickScorer: A Fast Algorithm to Rank Documents with Additive Ensembles of Regression Trees | Claudio Lucchese, Istituto di Scienza e Tecnologie dell'Informazione; et al. |
2014 | Partitioned Elias-Fano Indexes | Giuseppe Ottaviano, Istituto di Scienza e Tecnologie dell'Informazione Rossano Venturini, Università di Pisa |
2013 | Beliefs and Biases in Web Search | Ryen W. White, Microsoft Research |
2012 | Time-Based Calibration of Effectiveness Measures | Mark Smucker & Charles Clarke, University of Waterloo |
2011 | Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction Data | Mikhail Ageev, Moscow State University; et al. |
2010 | Assessing the Scenic Route: Measuring the Value of Search Trails in Web Logs | Ryen W. White, Microsoft Research Jeff Huang, University of Washington |
2009 | Sources of evidence for vertical selection | Jaime Arguello, Carnegie Mellon University; et al. |
2008 | Algorithmic Mediation for Collaborative Exploratory Search | Jeremy Pickens, FX Palo Alto Lab; et al. |
2007 | Studying the Use of Popular Destinations to Enhance Web Search Interaction | Ryen W. White, Microsoft Research; et al. |
2006 | Minimal Test Collections for Retrieval Evaluation | Ben Carterette, University of Massachusetts Amherst; et al. |
2005 | Learning to estimate query difficulty: including applications to missing content detection and dis... | Elad Yom-Tov, IBM Research; et al. |
2004 | A Formal Study of Information Retrieval Heuristics | Hui Fang, University of Illinois at Urbana-Champaign; et al. |
2003 | Re-examining the potential effectiveness of interactive query expansion | Ian Ruthven, University of Strathclyde |
2002 | Novelty and redundancy detection in adaptive filtering | Yi Zhang, Carnegie Mellon University; et al. |
2001 | Temporal summaries of new topics | James Allan, University of Massachusetts Amherst; et al. |
2000 | IR evaluation methods for retrieving highly relevant documents | Kalervo Järvelin & Jaana Kekäläinen, University of Tampere |
1999 | Cross-language information retrieval based on parallel texts and automatic mining of parallel text... | Jian-Yun Nie, Université de Montréal; et al. |
1998 | A theory of term weighting based on exploratory data analysis | Warren R. Greiff, University of Massachusetts Amherst |
1997 | Feature selection, perceptron learning, and a usability case study for text categorization | Hwee Tou Ng, DSO National Laboratories; et al. |
1996 | Retrieving spoken documents by combining multiple index sources | Gareth Jones, University of Cambridge; et al. |
SIGMETRICS (Performance) | ||
2018 | A Refined Mean Field Approximation | Nicolas Gast, Inria Benny Van Houdt, University of Antwerp |
2017 | Accelerating Performance Inference over Closed Systems by Asymptotic Methods | Giuliano Casale, Imperial College London |
2016 | On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with Fitness | Bo Jiang, University of Massachusetts Amherst; et al. |
2015 | Spy vs. Spy: Rumor Source Obfuscation | Giulia Fanti, University of California Berkeley; et al. |
2014 | Concave switching in single and multihop networks | Neil Walton, University of Amsterdam |
2013 | Queueing System Topologies with Limited Flexibility | John Tsitsiklis & Kuang Xu, Massachusetts Institute of Technology |
2012 | Temperature management in data centers: why some (might) like it hot | Nosayba El-Sayed, University of Toronto; et al. |
2011 | Topology Discovery of Sparse Random Graphs With Few Participants | Animashree Anandkumar, University of California Irvine; et al. |
2010 | Load balancing via random local search in closed and open systems | Ayalvadi Ganesh, University of Bristol; et al. |
2009 | The Age of Gossip: Spatial Mean Field Regime | Augustin Chaintreau, Technicolor; et al. |
2008 | Counter Braids: A Novel Counter Architecture for Per-Flow Measurement | Yi Lu, Stanford University; et al. |
2007 | Modeling the Relative Fitness of Storage | Michael P. Mesnier, Intel; et al. |
2006 | Maximizing throughput in wireless networks via gossiping | Eytan Modiano, Massachusetts Institute of Technology; et al. |
2005 | Coupon replication systems | Laurent Massoulié & Milan Vojnović, Microsoft Research |
2004 | On performance bounds for the integration of elastic and adaptive streaming flows | Thomas Bonald & Alexandre Proutiere, France Telecom |
1996 | Supporting stored video: reducing rate variability and end-to-end resource requirements through op... | James D. Salehi, University of Massachusetts Amherst; et al. |
Exploiting process lifetime distributions for dynamic load balancing | Mor Harchol-Balter & Allen B. Downey, University of California Berkeley | |
SIGMOD (Databases) | ||
2018 | SuRF:Practical Range Query Filtering with Fast Succinct Tries | Huanchen Zhang, Carnegie Mellon University; et al. |
2017 | Parallelizing Sequential Graph Computations | Wenfei Fan, University of Edinburgh; et al. |
2016 | Wander Join: Online Aggregation via Random Walks | Feifei Li, University of Utah; et al. |
2015 | DBSCAN Revisited: Mis-Claim, Un-Fixability, and Approximation | Junhao Gan & Yufei Tao, Chinese University of Hong Kong |
2014 | Materialization Optimizations for Feature Selection Workloads | Ce Zhang, Stanford University; et al. |
2013 | Massive Graph Triangulation | Xiaocheng Hu, The Chinese University of Hong Kong; et al. |
2012 | High-Performance Complex Event Processing over XML Streams | Barzan Mozafari, Massachusetts Institute of Technology; et al. |
2011 | Entangled Queries: Enabling Declarative Data-Driven Coordination | Nitin Gupta, Cornell University; et al. |
2010 | FAST: fast architecture sensitive tree search on modern CPUs and GPUs | Changkyu Kim, Intel; et al. |
2009 | Generating example data for dataflow programs | Christopher Olston, Yahoo! Research; et al. |
2008 | Serializable isolation for snapshot databases | Michael J. Cahill, University of Sydney; et al. |
Scalable Network Distance Browsing in Spatial Databases | Hanan Samet, University of Maryland; et al. | |
2007 | Compiling mappings to bridge applications and databases | Sergey Melnik, Microsoft Research; et al. |
Scalable Approximate Query Processing with the DBO Engine | Christopher Jermaine, University of Florida; et al. | |
2006 | To search or to crawl?: towards a query optimizer for text-centric tasks | Panagiotis G. Ipeirotis, New York University; et al. |
2004 | Indexing spatio-temporal trajectories with Chebyshev polynomials | Yuhan Cai & Raymond T. Ng, University of British Columbia |
2003 | Spreadsheets in RDBMS for OLAP | Andrew Witkowski, Oracle; et al. |
2001 | Locally adaptive dimensionality reduction for indexing large time series databases | Eamonn Keogh, University of California Irvine; et al. |
2000 | XMill: an efficient compressor for XML data | Hartmut Liefke, University of Pennsylvania Dan Suciu, AT&T Laboratories |
1999 | DynaMat: a dynamic view management system for data warehouses | Yannis Kotidis & Nick Roussopoulos, University of Maryland |
1998 | Efficient transparent application recovery in client-server information systems | David Lomet & Gerhard Weikum, Microsoft Research |
Integrating association rule mining with relational database systems: alternatives and implications | Sunita Sarawagi, IBM Research; et al. | |
1997 | Fast parallel similarity search in multimedia databases | Stefan Berchtold, University of Munich; et al. |
1996 | Implementing data cubes efficiently | Venky Harinarayan, Stanford University; et al. |
SODA (Theory) | ||
2018 | Approaching 3/2 for the s-t-path TSP | Vera Traub & Jens Vygen, Universität Bonn |
Online Bipartite Matching with Amortized O(log2 N)Replacements | Aaron Bernstein, Technical University of Berlin; et al. | |
2017 | Subquadratic Algorithms for the Diameter and the Sum of Pairwise Distances in Planar Graphs | Sergio Cabello, University of Ljubljana |
A (2 + Є) Approximation for Maximum Weight Matching in the Semi-Streaming Model | Ami Paz, IRIF Gregory Schwartzman, National Institute of Informatics |
|
2016 | An Improved Distributed Algorithm for Maximal Independent Set | Mohsen Ghaffari, Massachusetts Institute of Technology |
Near-Optimal Light Spanners | Shiri Chechik, Tel-Aviv University Christian Wulff-Nilsen, University of Copenhagen |
|
2015 | The Parameterized Complexity of k-Biclique | Bingkai Lin, University of Tokyo |
2014 | Polynomiality for Bin Packing with a Constant Number of Item Types | Michel X. Goemans & Thomas Rothvoß, Massachusetts Institute of Technology |
An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommod... | Jonathan A. Kelner, Massachusetts Institute of Technology; et al. | |
2013 | A Simple Algorithm for the Graph Minor Decomposition - Logic meets Structural Graph Theory | Martin Grohe, RWTH Aachen University; et al. |
Dynamic graph connectivity in polylogarithmic worst case time | Bruce M. Kapron, University of Victoria; et al. | |
2012 | Computing all maps into a sphere | Martin Čadek, Masaryk University; et al. |
2011 | An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss Transform | Nir Ailon, Technion Edo Liberty, Yahoo! Research |
2010 | An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem | Arash Asadpour, Stanford University; et al. |
2009 | Natural Algorithms | Bernard Chazelle, Princeton University |
SOSP (Operating Systems) | ||
2017 | DeepXplore: Automated Whitebox Testing of Deep Learning Systems | Kexin Pei, Columbia University; et al. |
The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web | Cheng Tan, New York University; et al. | |
2015 | Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems | Jonathan Mace, Brown University; et al. |
Using Crash Hoare Logic for Certifying the FSCQ File System | Haogang Chen, Massachusetts Institute of Technology; et al. | |
Coz: Finding Code that Counts with Causal Profiling | Charlie Curtsinger, Grinnell College Emery Berger, University of Massachusetts Amherst |
|
2013 | Towards optimization-safe systems: analyzing the impact of undefined behavior | Xi Wang, Massachusetts Institute of Technology; et al. |
Naiad: A Timely Dataflow System | Derek G. Murray, Microsoft Research; et al. | |
The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors | Austin T. Clements, Massachusetts Institute of Technology; et al. | |
2011 | A File is Not a File: Understanding the I/O Behavior of Apple Desktop Applications | Tyler Harter, University of Wisconsin; et al. |
Cells: A Virtual Mobile Smartphone Architecture | Jeremy Andrus, Columbia University; et al. | |
2009 | FAWN: A Fast Array of Wimpy Nodes | David G. Andersen, Carnegie Mellon University; et al. |
seL4: Formal Verification of an OS Kernel | Gerwin Klein, NICTA; et al. | |
RouteBricks: Exploiting Parallelism to Scale Software Routers | Mihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al. | |
2007 | Zyzzyva: speculative byzantine fault tolerance | Ramakrishna Kotla, University of Texas at Austin; et al. |
Sinfonia: a new paradigm for building scalable distributed systems | Marcos K. Aguilera, Hewlett-Packard Labs; et al. | |
Secure Web Applications via Automatic Partitioning | Stephen Chong, Cornell University; et al. | |
2005 | Speculative Execution in a Distributed File System | Edmund B. Nightingale, University of Michigan; et al. |
BAR Tolerance for Cooperative Services | Amitanand S. Aiyer, University of Texas at Austin; et al. | |
Rx: treating bugs as allergies - a safe method to survive software failures | Feng Qin, University of Illinois at Urbana-Champaign; et al. | |
Vigilante: End-to-End Containment of Internet Worms | Manuel Costa, University of Cambridge; et al. | |
2003 | Backtracking intrusions | Samuel T. King & Peter M. Chen, University of Michigan |
Preserving peer replicas by rate-limited sampled voting | Petros Maniatis, Stanford University; et al. | |
Improving the Reliability of Commodity Operating Systems | Michael M. Swift, University of Washington; et al. | |
2001 | BASE: using abstraction to improve fault tolerance | Rodrigo Rodrigues, Massachusetts Institute of Technology; et al. |
Untrusted hosts and confidentiality: secure program partitioning | Steve Zdancewic, Cornell University; et al. | |
1999 | Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors | Kinshuk Govil, Stanford University; et al. |
Soft timers: efficient microsecond software timer support for network processing | Mohit Aron & Peter Druschel, Rice University | |
The Click modular router | Robert Morris, Massachusetts Institute of Technology; et al. | |
Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail se... | Yasushi Saito, University of Washington; et al. | |
1997 | Continuous profiling: where have all the cycles gone? | Jennifer M. Anderson, Digital Equipment Corporation; et al. |
Disco: running commodity operating systems on scalable multiprocessors | Edouard Bugnion, Stanford University; et al. | |
Eraser: a dynamic data race detector for multithreaded programs | Stefan Savage, University of Washington; et al. | |
STOC (Theory) | ||
2018 | A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem | Ola Svensson, École Polytechnique Fédérale de Lausanne; et al. |
2017 | Explicit, Almost Optimal, Epsilon-Balanced Codes | Amnon Ta-Shma, Tel-Aviv University |
A Weighted Linear Matroid Parity Algorithm | Satoru Iwata, University of Tokyo Yusuke Kobayashi, University of Tsukuba |
|
Deciding Parity Games in Quasipolynomial Time | Cristian S. Calude, University of Auckland; et al. | |
2016 | Explicit Two-Source Extractors and Resilient Functions | Eshan Chattopadhyay & David Zuckerman, University of Texas at Austin |
Graph Isomorphism in Quasipolynomial Time | László Babaí, University of Chicago | |
Reed-Muller Codes Achieve Capacity on Erasure Channels | Shrinivas Kudekar, Qualcomm Research; et al. | |
2015 | Exponential Separation of Information and Communication for Boolean Functions | Anat Ganor, Weizmann Institute of Science; et al. |
2-Server PIR with sub-polynomial communication | Zeev Dvir & Sivakanth Gopi, Princeton University | |
Lower Bounds on the Size of Semidefinite Programming Relaxations | James R. Lee, University of Washington; et al. | |
2014 | The matching polytope has exponential extension complexity | Thomas Rothvoß, University of Washington |
2013 | Approximation Resistance from Pairwise Independent Subgroups | Siu On Chan, University of California Berkeley |
Low Rank Approximation and Regression in Input Sparsity Time | Kenneth L. Clarkson & David P. Woodruff, IBM Research | |
2012 | Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower Bounds | Samuel Fiorini, Université libre de Bruxelles; et al. |
The Cell Probe Complexity of Dynamic Range Counting | Kasper Larsen, Aarhus University | |
2011 | Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphs | Paul Christiano, Massachusetts Institute of Technology; et al. |
Subexponential lower bounds for randomized pivoting rules for the simplex algorithm | Oliver Friedmann, University of Munich; et al. | |
2010 | An improved LP-based approximation for steiner tree | Jaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al. |
QIP = PSPACE | Rahul Jain, National University of Singapore; et al. | |
2009 | A constructive proof of the Lovász local lemma | Robin A. Moser, ETH Zurich |
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem | Chris Peikert, SRI International | |
2008 | Optimal algorithms and inapproximability results for every CSP? | Prasad Raghavendra, University of Washington |
Optimal hierarchical decompositions for congestion minimization in networks | Harald Räcke, University of Warwick | |
2007 | Faster integer multiplication | Martin Fürer, Pennsylvania State University |
Towards 3-query locally decodable codes of subexponential length | Sergey Yekhanin, Massachusetts Institute of Technology | |
2006 | The PCP theorem by gap amplification | Irit Dinur, Hebrew University |
2005 | Undirected ST-connectivity in log-space | Omer Reingold, Weizmann Institute of Science |
2004 | Multi-linear formulas for permanent and determinant are of super-polynomial size | Ran Raz, Weizmann Institute of Science |
Expander flows, geometric embeddings and graph partitioning | Sanjeev Arora, Princeton University; et al. | |
2003 | Derandomizing polynomial identity tests means proving circuit lower bounds | Valentine Kabanets & Russell Impagliazzo, University of California San Diego |
New lattice-based cryptographic constructions | Oded Regev, Tel-Aviv University | |
UIST (User Interface) | ||
2018 | Porta: Profiling Software Tutorials Using Operating-System-Wide Activity Tracing | Alok Mysore & Philip J. Guo, University of California San Diego |
Authoring and Verifying Human-Robot Interactions | David Porfirio, University of Wisconsin-Madison; et al. | |
RESi: A Highly Flexible, Pressure-Sensitive, Imperceptible Textile Interface Based on Resistive Ya... | Patrick Parzer, University of Applied Sciences Upper Austria; et al. | |
2017 | Triggering Artwork Swaps for Live Animation | Nora S. Willett, Princeton University; et al. |
Grabity: A Wearable Haptic Interface for Simulating Weight and Grasping in Virtual Reality | Inrak Choi, Stanford University; et al. | |
AirCode: Unobtrusive Physical Tags for Digital Fabrication | Dingzeyu Li, Columbia University; et al. | |
2016 | Rovables: Miniature On-Body Robots as Mobile Wearables | Artem Dementyev, Massachusetts Institute of Technology; et al. |
proCover: Sensory Augmentation of Prosthetic Limbs Using Smart Textile Covers | Joanne Leong, University of Applied Sciences Upper Austria; et al. | |
ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch Accelerometers | Gierad Laput, Carnegie Mellon University; et al. | |
Zooids: Building Blocks for Swarm User Interfaces | Mathieu Le Goc, INRIA; et al. | |
2015 | Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye Movements | Augusto Esteves, Lancaster University; et al. |
Webstrates: Shareable Dynamic Media | Clemens Klokmose, Aarhus University; et al. | |
Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electr... | Simon Olberding, Max Planck Institut; et al. | |
2014 | Sensing Techniques for Tablet+Stylus Interaction | Ken Hinckley, Microsoft Research; et al. |
PrintScreen: Fabricating Highly Customizable Thin-film Touch-Displays | Simon Olberding, Max Planck Institut; et al. | |
Expert Crowdsourcing with Flash Teams | Daniela Retelny, Stanford University; et al. | |
2013 | PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing Interfaces | Lining Yao, Massachusetts Institute of Technology; et al. |
Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic Sensing | Makoto Ono, University of Tsukuba; et al. | |
Fiberio: A Touchscreen that Senses Fingerprints | Christian Holz & Patrick Baudisch, Hasso Plattner Institute | |
2012 | CrowdScape: interactively visualizing user behavior and output | Jeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University |
Cliplets: juxtaposing still and dynamic imagery | Neel Joshi, Microsoft Research; et al. | |
Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Chang... | Sean Follmer, Massachusetts Institute of Technology; et al. | |
2011 | SideBySide: Ad-hoc Multi-user Interaction with Handheld Projectors | Karl D.D. Willis, Carnegie Mellon University; et al. |
2010 | VizWiz: nearly real-time answers to visual questions | Jeffrey P. Bigham, University of Rochester; et al. |
2009 | Mouse 2.0: Multi-touch meets the Mouse | Nicolas Villar, Microsoft Research; et al. |
2008 | Bringing Physics to the Surface | Andrew D. Wilson, Microsoft Research; et al. |
2007 | ThinSight: Versatile Multi-touch Sensing for Thin Form-factor Displays | Steve Hodges, Microsoft Research; et al. |
2006 | Reflective Physical Prototyping through Integrated Design, Test, and Analysis | Björn Hartmann, Stanford University; et al. |
2005 | Automation and Customization of Rendered Web Pages | Michael Bolin, Massachusetts Institute of Technology; et al. |
2004 | Multi-Finger Gestural Interaction with 3D Volumetric Displays | Tovi Grossman, University of Toronto; et al. |
CrossY: A Crossing-Based Drawing Application | Georg Apitz & François Guimbretière, University of Maryland | |
2003 | Perceptually-Supported Image Editing of Text and Graphics | Eric Saund, Palo Alto Research Center; et al. |
2002 | Clothing Manipulation | Takeo Igarashi, University of Tokyo John F. Hughes, Brown University |
2001 | Phidgets: Easy Development of Physical Interfaces through Physical Widgets | Saul Greenberg & Chester Fitchett, University of Calgary |
2000 | Sensing Techniques for Mobile Interaction | Ken Hinckley, Microsoft Research; et al. |
1996 | Indigo: A Local Propagation Algorithm for Inequality Constraints | Alan Borning, University of Washington; et al. |
VLDB (Databases) | ||
2017 | Provenance for Natural Language Queries | Daniel Deutch, Tel-Aviv University; et al. |
2016 | Compressed Linear Algebra for Large-Scale Machine Learning | Ahmed Elgohary, University of Maryland; et al. |
2015 | Constructing an interactive natural language interface for relational databases | Fei Li & H. V. Jagadish, University of Michigan |
2014 | M4: A Visualization-Oriented Time Series Data Aggregation | Uwe Jugel, SAP; et al. |
Building Efficient Query Engines in a High-Level Language | Yannis Klonatos, École Polytechnique Fédérale de Lausanne; et al. | |
On k-Path Covers and their Applications | Stefan Funke, University of Stuttgart; et al. | |
epiC: an Extensible and Scalable System for Processing Big Data | Dawei Jiang, National University of Singapore; et al. | |
The Uncracked Pieces in Database Cracking | Felix Martin Schuhknecht, Saarland University; et al. | |
2013 | DisC Diversity: Result Diversification based on Dissimilarity and Coverage | Marina Drosou & Evaggelia Pitoura, University of Ioannina |
2012 | Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification | Albert Angel, University of Toronto; et al. |
2011 | RemusDB: Transparent High-Availability for Database Systems | Umar Farooq Minhas, University of Waterloo; et al. |
2010 | Towards Certain Fixes with Editing Rules and Master Data | Shuai Ma, University of Edinburgh; et al. |
2009 | A Unified Approach to Ranking in Probabilistic Databases | Jian Li, University of Maryland; et al. |
2008 | Finding Frequent Items in Data Streams | Graham Cormode & Marios Hadjieleftheriou, AT&T Laboratories |
Constrained Physical Design Tuning | Nicolas Bruno & Surajit Chaudhuri, Microsoft Research | |
2007 | Scalable Semantic Web Data Management Using Vertical Partitioning | Daniel J. Abadi, Massachusetts Institute of Technology; et al. |
2006 | Trustworthy Keyword Search for Regulatory-Compliant Records Retention | Soumyadeb Mitra, University of Illinois at Urbana-Champaign; et al. |
2005 | Cache-conscious Frequent Pattern Mining on a Modern Processor | Amol Ghoting, Ohio State University; et al. |
2004 | Model-Driven Data Acquisition in Sensor Networks | Amol Deshpande, University of California Berkeley; et al. |
2001 | Weaving Relations for Cache Performance | Anastassia Ailamaki, Carnegie Mellon University; et al. |
1997 | Integrating Reliable Memory in Databases | Wee Teck Ng & Peter M. Chen, University of Michigan |
WWW (World Wide Web) | ||
2018 | HighLife: Higher-arity Fact Harvesting | Patrick Ernst, Saarland Informatics CampusSaarbrücken; et al. |
2016 | Social Networks Under Stress | Daniel Romero, University of Michigan; et al. |
2015 | HypTrails: A Bayesian Approach for Comparing Hypotheses About Human Trails on the Web | Philipp Singer, GESIS - Leibniz Institute for the Social Sciences; et al. |
2014 | Efficient Estimation for High Similarities using Odd Sketches | Michael Mitzenmacher, Harvard University; et al. |
2013 | No Country for Old Members: User Lifecycle and Linguistic Change in Online Communities | Cristian Danescu-Niculescu-Mizil, Stanford University; et al. |
2012 | Counting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the Standard | Marcelo Arenas, Pontificia Universidad Católica de Chile; et al. |
2011 | Towards a theory model for product search | Beibei Li, New York University; et al. |
2010 | Factorizing personalized Markov chains for next-basket recommendation | Steffen Rendle, Osaka University; et al. |
2009 | Hybrid keyword search auctions | Ashish Goel, Stanford University Kamesh Munagala, Duke University |
2008 | IRLbot: Scaling to 6 billion pages and beyond | Hsin-Tsang Lee, Texas A&M University; et al. |
2007 | Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganogra... | Lars Backstrom, Cornell University; et al. |
2006 | Random Sampling from a Search Engine's Index | Ziv Bar-Yossef & Maxim Gurevich, Technion |
2005 | Three-level caching for efficient query processing in large Web search engines | Xiaohui Long & Torsten Suel, Polytechnic Institute of New York University |
2004 | Automatic detection of fragments in dynamically generated web pages | Lakshmish Ramaswamy, Georgia Institute of Technology; et al. |
2003 | Scaling personalized web search | Glen Jeh & Jennifer Widom, Stanford University |
SemTag and seeker: bootstrapping the semantic web via automated semantic annotation | Stephen Dill, IBM Research; et al. | |
2002 | Abstracting application-level web security | David Scott & Richard Sharp, University of Cambridge |
2001 | Engineering Server Driven Consistency for Large Scale Dynamic Web Services | Jian Yin, University of Texas at Austin; et al. |
2000 | Graph Structure in the Web | Andrei Broder, AltaVista; et al. |
1999 | Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery | Soumen Chakrabarti, Indian Institute of Technology; et al. |
1998 | The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/video | Kevin C. Almeroth, University of California Santa Barbara Mostafa H. Ammar, Georgia Institute of Technology |
Institutions with Best Papers | |
Microsoft Research | 49.2 |
University of Washington | 42.0 |
Carnegie Mellon University | 39.3 |
Massachusetts Institute of Technology | 38.8 |
Stanford University | 37.5 |
University of California Berkeley | 28.8 |
Cornell University | 16.7 |
University of Illinois at Urbana-Champaign | 16.3 |
University of Toronto | 14.3 |
University of Michigan | 13.9 |
University of Texas at Austin | 13.0 |
IBM Research | 12.8 |
12.7 | |
University of British Columbia | 11.4 |
University of Massachusetts Amherst | 11.2 |
Georgia Institute of Technology | 9.2 |
École Polytechnique Fédérale de Lausanne | 9.1 |
University of California Irvine | 8.9 |
University of Maryland | 8.6 |
Princeton University | 8.4 |
Yahoo! Research | 7.9 |
University of Oxford | 7.4 |
University of California San Diego | 6.2 |
Tsinghua University | 6.2 |
Weizmann Institute of Science | 6.2 |
Columbia University | 6.1 |
University of Wisconsin | 6.0 |
McGill University | 5.9 |
University of Cambridge | 5.6 |
Brown University | 5.4 |
University of Nottingham | 5.3 |
Tel-Aviv University | 5.3 |
Max Planck Institut | 5.2 |
University of Waterloo | 5.0 |
New York University | 4.9 |
AT&T Laboratories | 4.9 |
Northwestern University | 4.6 |
Oregon State University | 4.6 |
INRIA | 4.6 |
University of Alberta | 4.5 |
Technion | 4.5 |
Rice University | 4.2 |
National University of Singapore | 4.2 |
Purdue University | 4.2 |
NEC Labs America | 4.1 |
KAIST | 4.0 |
Hasso Plattner Institute | 4.0 |
Université Paris-Sud | 4.0 |
Newcastle University | 3.9 |
Bell Labs | 3.8 |
Hewlett-Packard Labs | 3.7 |
Aarhus University | 3.6 |
University of Nebraska-Lincoln | 3.6 |
University of California Davis | 3.6 |
Delft University of Technology | 3.5 |
Ohio State University | 3.4 |
University of North Carolina at Chapel Hill | 3.4 |
University of Copenhagen | 3.4 |
University of California Los Angeles | 3.3 |
Technische Universität Berlin | 3.3 |
Peking University | 3.3 |
ETH Zurich | 3.2 |
University College London | 3.1 |
Aalto University | 3.1 |
Rutgers University | 3.1 |
Virginia Tech | 3.0 |
Pennsylvania State University | 3.0 |
DePaul University | 3.0 |
Indiana University at Bloomington | 3.0 |
University of Minnesota | 3.0 |
Hong Kong University of Science and Technology | 2.9 |
University of Virginia | 2.8 |
Microsoft | 2.8 |
Lancaster University | 2.8 |
Saarland University | 2.8 |
Imperial College London | 2.8 |
Chinese Academy of Sciences | 2.7 |
Paderborn University | 2.6 |
University of Edinburgh | 2.6 |
The Chinese University of Hong Kong | 2.5 |
Polytechnic Institute of New York University | 2.5 |
University of Tokyo | 2.5 |
Université catholique de Louvain | 2.4 |
Duke University | 2.4 |
University of Glasgow | 2.4 |
University of Applied Sciences Upper Austria | 2.4 |
University of Bristol | 2.4 |
University of Saskatchewan | 2.4 |
Toyota Technological Institute at Chicago | 2.3 |
University of Pennsylvania | 2.3 |
Harvard University | 2.2 |
University of Amsterdam | 2.2 |
University of Oregon | 2.2 |
Disney Research | 2.2 |
RWTH Aachen University | 2.2 |
Singapore Management University | 2.2 |
Vienna University of Technology | 2.2 |
University of Canterbury | 2.2 |
University of Colorado | 2.1 |
University of Calgary | 2.1 |
VMware | 2.1 |
Intel Research | 2.0 |
Universidade Técnica de Lisboa | 2.0 |
BBN Technologies | 2.0 |
NASA Ames Research Center | 2.0 |
Credit is given in decreasing author order as customary in many fields. First authors are given 1 point, second authors are given 0.5 points, third authors are given 0.33 points, etc. These points are then divided by the sum of points for that paper, i.e. normalizing it. This ranking may be inaccurate or incomplete, may not reflect the current state of best paper awards, and is not an official list. If you are not satisfied with the ranking listed here, please disregard it.