计算机、机器视觉、图像处理顶级会议的最佳论文Best Paper Awards in Computer Science

[-]

BestPaper Awards in Computer Science (since 1996)

By Conference:   AAAI   ACL   CHI   CIKM   CVPR   FOCS   FSE   ICCV   ICML   ICSE   IJCAI   INFOCOM KDD  NSDI   OSDI   PLDI   PODS   S&P   SIGCOMM  SIGIR  SIGMETRICS  SIGMOD SODA  SOSP  STOC UIST  VLDB  WWW

Institutionswith the most Best Papers

Much of this data was entered byhand (obtained by contacting past conference organizers, retrieving cachedconference websites, and searching CVs) so please email me if you notice anyerrors or omissions: bestpaper-AT-jeffhuang.com. I tried to collect best paperawards from the top-tier conferences in each area, but some conferences do nothave such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award"and "outstanding paper award" are included but not "best studentpaper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL)

 

AAAI (Artificial Intelligence)

2012

Document Summarization Based on Data Reconstruction

Zhanying He, Zhejiang University; et al.

Chun Chen, Zhejiang University
Jiajun Bu, Zhejiang University
Can Wang, Zhejiang University
Lijan Zhang, Zhejiang University
Deng Cai, Zhejiang University
Xiaofei He, Zhejiang University

Learning SVM Classiiers with Indeinite Kernels

Suicheng Gu & Yuhong Guo, Temple University

2011

Dynamic Resource Allocation in Conservation Planning

Daniel Golovin, California Institute of Technology; et al.

Andreas Krause, ETH Zurich
Beth Gardner, North Carolina State University
Sarah J. Converse, Patuxent Wildlife Research Center
Steve Morey, U.S. Fish and Wildlife Service

Complexity of and Algorithms for Borda Manipulation

Jessica Davies, University of Toronto; et al.

George Katsirelos, Université Paris-Sud
Nina Narodytska, University of New South Wales
Toby Walsh, NICTA

2010

How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Ans...

Giorgos Stoilos, Oxford University; et al.

Bernardo Cuenca Grau, Oxford University
Ian Horrocks, Oxford University

A Novel Transition Based Encoding Scheme for Planning as Satisfiability

Ruoyun Huang, Washington University in St. Louis; et al.

Yixin Chen, Washington University in St. Louis
Weixiong Zhang, Washington University in St. Louis

2008

How Good is Almost Perfect?

Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg

Optimal False-Name-Proof Voting Rules with Costly Voting

Liad Wagman & Vincent Conitzer, Duke University

2007

PLOW: A Collaborative Task Learning Agent

James Allen, Institute for Human and Machine Cognition; et al.

Nathanael Chambers, Stanford University
George Ferguson, University of Rochester
Lucian Galescu, Institute for Human and Machine Cognition
Hyuckchul Jung, Institute for Human and Machine Cognition
Mary Swift, University of Rochester
William Taysom, Institute for Human and Machine Cognition

Thresholded Rewards: Acting Optimally in Timed, Zero-Sum Games

Colin McMillen & Manuela Veloso, Carnegie Mellon University

2006

Model Counting: A New Strategy for Obtaining Good Bounds

Carla P. Gomes, Cornell University; et al.

Ashish Sabharwal, Cornell University
Bart Selman, Cornell University

Towards an Axiom System for Default Logic

Gerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto

2005

The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic Selection

Vincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University

2004

Learning and Inferring Transportation Routines

Lin Liao, University of Washington; et al.

Dieter Fox, University of Washington
Henry Kautz, University of Washington

2002

On Computing All Abductive Explanations

Thomas Eiter, Technische Universität Wien
Kazuhisa Makino, Osaka University

2000

The Game of Hex: An Automatic Theorem-Proving Approach to Game Programming

Vadim V. Anshelevich, Vanshel Consulting

1999

PROVERB: The Probabilistic Cruciverbalist

Greg A. Keim, Duke University; et al.

Noam M. Shazeer, Duke University
Michael L. Littman, Duke University
Sushant Agarwal, Duke University
Catherine M. Cheves, Duke University
Joseph Fitzgerald, Duke University
Jason Grosland, Duke University
Fan Jiang, Duke University
Shannon Pollard, Duke University
Karl Weinmeister, Duke University

1998

Learning Evaluation Functions for Global Optimization and Boolean Satisfiability

Justin A. Boyan & Andrew W. Moore, Carnegie Mellon University

Acceleration Methods for Numeric CSPs

Yahia Lebbah & Olivier Lhomme, Ecole des Mines de Nantes

The Interactive Museum Tour-Guide Robot

Wolfram Burgard, University of Bonn; et al.

Armin B. Cremers, University of Bonn
Dieter Fox, University of Bonn
Dirk Hähnel, University of Bonn
Gerhard Lakemeyer, Aachen University of Technology
Dirk Schulz, University of Bonn
Walter Steiner, University of Bonn
Sebastian Thrun, Carnegie Mellon University

1997

Statistical Parsing with a Context-Free Grammar and Word Statistics

Eugene Charniak, Brown University

A Practical Algorithm for Finding Optimal Triangulations

Krill Shoikhet & Dan Geiger, Technion

Fast Context Switching in Real-Time Propositional Reasoning

P. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center

Building Concept Representations from Reusable Components

Peter Clark, Boeing
Bruce Porter, University of Texas at Austin

1996

Verification of Knowledge Bases Based on Containment Checking

Alon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, Université Paris-Sud

A Novel Application of Theory Refinement to Student Modeling

Paul T. Baffes, SciComp
Raymond J. Mooney, University of Texas at Austin

Pushing the Envelope: Planning, Propositional Logic, and Stochastic Search

Henry Kautz & Bart Selman, AT&T Laboratories

ACL (Natural Language Processing)

2012

String Re-writing Kernel

Fan Bu, Tsinghua University; et al.

Hang Li, Microsoft Research
Xiaoyan Zhu, Tsinghua University

Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic Parsing

Hiroyuki Shindo, NTT Communication Science Laboratories; et al.

Yusuke Miyao, National Institute of Informatics
Akinori Fujino, NTT Communication Science Laboratories
Masaaki Nagata, NTT Communication Science Laboratories

2011

Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based Projections

Dipanjan Das, Carnegie Mellon University
Slav Petrov, Google

2010

Beyond NomBank: A Study of Implicit Arguments for Nominal Predicates

Matthew Gerber & Joyce Y. Chai, Michigan State University

2009

Reinforcement Learning for Mapping Instructions to Actions

S.R.K. Branavan, Massachusetts Institute of Technology; et al.

Harr Chen, Massachusetts Institute of Technology
Luke S. Zettlemoyer, Massachusetts Institute of Technology
Regina Barzilay, Massachusetts Institute of Technology

K-Best A* Parsing

Adam Pauls & Dan Klein, University of California Berkeley

Concise Integer Linear Programming Formulations for Dependency Parsing

André F.T. Martins, Instituto de Telecomunicações; et al.

Noah A. Smith, Carnegie Mellon University
Eric P. Xing, Carnegie Mellon University

2008

Forest Reranking: Discriminative Parsing with Non-Local Features

Liang Huang, University of Pennsylvania

A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language Model

Libin Shen, BBN Technologies; et al.

Jinxi Xu, BBN Technologies
Ralph Weischedel, BBN Technologies

2007

Learning synchronous grammars for semantic parsing with lambda calculus

Yuk Wah Wong & Raymond J. Mooney, University of Texas at Austin

2006

Semantic taxonomy induction from heterogenous evidence

Rion Snow, Stanford University; et al.

Daniel Jurafsky, Stanford University
Andrew Y. Ng, Stanford University

2005

A Hierarchical Phrase-Based Model for Statistical Machine Translation

David Chiang, University of Maryland

2004

Finding Predominant Word Senses in Untagged Text

Diana McCarthy, University of Sussex; et al.

Rob Koeling, University of Sussex
Julie Weeds, University of Sussex
John Carroll, University of Sussex

2003

Accurate Unlexicalized Parsing

Dan Klein & Christopher D. Manning, Stanford University

Towards a Model of Face-to-Face Grounding

Yukiko I. Nakano, RISTEX; et al.

Gabe Reinstein, Massachusetts Institute of Technology
Tom Stocky, Massachusetts Institute of Technology
Justine Cassell, Massachusetts Institute of Technology

2002

Discriminative Training and Maximum Entropy Models for Statistical Machine Translation

Franz Josef Och & Hermann Ney, RWTH Aachen University

2001

Immediate-Head Parsing for Language Models

Eugene Charniak, Brown University

Fast Decoding and Optimal Decoding for Machine Translation

Ulrich Germann, University of Southern California; et al.

Michael Jahr, Stanford University
Kevin Knight, University of Southern California
Daniel Marcu, University of Southern California
Kenji Yamada, University of Southern California

CHI (Human-Computer Interaction)

2012

Uncomfortable Interactions

Steve Benford, University of Nottingham; et al.

Chris Greenhalgh, University of Nottingham
Gabriella Giannachi, University of Exeter
Brendan Walker, University of Nottingham
Joe Marshall, University of Nottingham
Tom Rodden, University of Nottingham

ClayVision: The (Elastic) Image of the City

Yuichiro Takeuchi, Sony Computer Science Laboratories
Ken Perlin, New York University

Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCI

Ylva Fernaeus, KTH Royal Institute of Technology; et al.

Martin Jonssonm, Södertörn University
Jakob Tholanderm, Stockholm University

Personas and Decision Making in the Design Process: An Ethnographic Case Study

Erin Friess, University of North Texas

Detecting Error-Related Negativity for Interaction Design

Chi Vi & Sriram Subramanian, University of Bristol

Observational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobil...

Niels Henze, University of Oldenburg; et al.

Enrico Rukzio, University of Duisburg-Essen
Susanne Boll, University of Oldenburg

Looking Glass: A Field Study on Noticing Interactivity of Shop Windows

Jörg Müller, Technische Universität Berlin; et al.

Robert Walter, Technische Universität Berlin
Gilles Bailly, Technische Universität Berlin
Michael Nischt, Technische Universität Berlin
Florian Alt, University of Stuttgart

Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday Objects

Munehiko Sato, Disney Research; et al.

Ivan Poupyrev, Disney Research
Chris Harrison, Disney Research

Affordances in HCI: Toward a Mediated Action Perspective

Victor Kaptelinin, University of Bergen
Bonnie Nardi, University of California Irvine

Using Rhythmic Patterns as an Input Method

Emilien Ghomi, Université Paris-Sud; et al.

Guillaume Faure, Université Paris-Sud
Stephane Huot, Université Paris-Sud
Olivier Chapuis, Université Paris-Sud
Michel Beaudouin-Lafon, Université Paris-Sud

The Normal Natural Troubles of Driving with GPS

Barry Brown, Stockholm University
Eric Laurier, University of Edinburgh

Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical Kiosks

Kurtis Heimerl, University of California Berkeley; et al.

Brian Gawalt, University of California Berkeley
Kuang Chen, University of California Berkeley
Tapan S. Parikh, University of California Berkeley
Björn Hartmann, University of California Berkeley

Improving Command Selection with CommandMaps

Joey Scarr, University of Canterbury; et al.

Andy Cockburn, University of Canterbury
Carl Gutwin, University of Saskatchewan
Andrea Bunt, University of Manitoba

Empathy, Participatory Design and People with Dementia

Stephen Lindsay, Newcastle University; et al.

Katie Britain, Newcastle University
Daniel Jackson, Newcastle University
Cassim Ladha, Newcastle University
Karim Ladha, Newcastle University
Patrick Olivier, Newcastle University

2011

Usable Gestures for Blind People: Understanding Preference and Performance

Shaun K. Kane, University of Washington; et al.

Jacob O. Wobbrock, University of Washington
Richard E. Ladner, University of Washington

Effects of Community Size and Contact Rate in Synchronous Social Q&A

Ryen W. White, Microsoft Research; et al.

Matthew Richardson, Microsoft Research
Yandong Liu, Carnegie Mellon University

Teenagers and Their Virtual Possessions: Design Opportunities and Issues

William Odom, Carnegie Mellon University; et al.

John Zimmerman, Carnegie Mellon University
Jodi Forlizzi, Carnegie Mellon University

Enhancing Physicality in Touch Interaction with Programmable Friction

Vincent Levesque, University of British Columbia; et al.

Louise Oram, University of British Columbia
Karon MacLean, University of British Columbia
Andy Cockburn, University of Canterbury
Nicholas D. Marchuk, Northwestern University
Dan Johnson, Northwestern University
J. Edward Colgate, Northwestern University

Mid-air Pan-and-Zoom on Wall-sized Displays

Mathieu Nancel, Université Paris-Sud; et al.

Julie Wagner, INRIA
Emmanuel Pietriga, INRIA
Olivier Chapuis, Université Paris-Sud
Wendy Mackay, INRIA

Bricolage: Example-Based Retargeting for Web Design

Ranjitha Kumar, Stanford University; et al.

Jerry Talton, Stanford University
Salman Ahmad, Stanford University
Scott Klemmer, Stanford University

Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual E...

Thomas Erickson, IBM Research; et al.

N. Sadat Shami, IBM Research
Wendy A. Kellogg, IBM Research
David W. Levine, IBM Research

In the Shadow of Misperception: Assistive Technology Use and Social Interactions

Kristen Shinohara & Jacob O. Wobbrock, University of Washington

Why is My Internet Slow?: Making Network Speeds Visible

Marshini Chetty, Georgia Institute of Technology; et al.

David Haslem, Orange Sparkle Ball
Andrew Baird, Amazon
Ugochi Ofoha, Georgia Institute of Technology
Bethany Sumner, Georgia Institute of Technology
Rebecca Grinter, Georgia Institute of Technology

Ease of Juggling: Studying the Effects of Manual Multitasking

Antti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University

Automics: souvenir generating photoware for theme parks

Abigail Durrant, University of Nottingham; et al.

Duncan Rowland, University of Lincoln
David S. Kirk, University of Nottingham
Steve Benford, University of Nottingham
Joel E. Fischer, University of Nottingham
Derek McAuley, University of Nottingham
Michael A. Peshkin, Northwestern University

Your Noise is My Command: Sensing Gestures Using the Body as an Antenna

Gabe Cohn, University of Washington; et al.

Daniel Morris, Microsoft Research
Shwetak N. Patel, University of Washington
Desney Tan, Microsoft Research

Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Wor...

Koji Yatani, University of Toronto; et al.

Michael Novati, University of Toronto
Andrew Trusty, University of Toronto
Khai N. Truong, University of Toronto

2010

Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber Bundles

Patrick Baudisch, Hasso Plattner Institute; et al.

Torsten Becker, Hasso Plattner Institute
Frederik Rudeck, Hasso Plattner Institute

Mapping the Landscape of Sustainable HCI

Carl DiSalvo, Georgia Institute of Technology; et al.

Phoebe Sengers, Cornell University
Hrönn Brynjarsdóttir, Cornell University

Occlusion-Aware Interfaces

Daniel Vogel & Ravin Balakrishnan, University of Toronto

Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural India

Neil Patel, Stanford University; et al.

Deepti Chittamuru, University of California Berkeley
Anupam Jain, IBM Research
Paresh Dave, Development Support Center
Tapan S. Parikh, University of California Berkeley

How does search behavior change as search becomes more difficult?

Anne Aula, Google; et al.

Rehan M. Khan, Google
Zhiwei Guan, Google

The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Co...

Brent Hecht & Darren Gergle, Northwestern University

Skinput: Appropriating the Body as an Input Surface

Chris Harrison, Carnegie Mellon University; et al.

Desney Tan, Microsoft Research
Dan Morris, Microsoft Research

Mobile-izing Health Workers in Rural India

Divya Ramachandran, University of California Berkeley; et al.

John Canny, University of California Berkeley
Prabhu Dutta Das, Dhirubhai Ambani Institute of Information and Communications Technology
Edward Cutrell, Microsoft Research

The Design of Eco-Feedback Technology

Jon Froehlich, University of Washington; et al.

Leah Findlater, University of Washington
James Landay, University of Washington

Feminist HCI: Taking Stock and Outlining an Agenda for Design

Shaowen Bardzell, Indiana University at Bloomington

Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface Structure

Morgan Dixon & James Fogarty, University of Washington

Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of Charts

Scott Bateman, University of Saskatchewan; et al.

Regan L. Mandryk, University of Saskatchewan
Carl Gutwin, University of Saskatchewan
Aaron Genest, University of Saskatchewan
David McDine, University of Saskatchewan
Christopher Brooks, University of Saskatchewan

2009

From Interaction to Trajectories: Designing Coherent Journeys Through User Experiences

Steve Benford, University of Nottingham; et al.

Gabriella Giannachi, University of Exeter
Boriana Koleva, University of Nottingham
Tom Rodden, University of Nottingham

Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Ser...

Jeffrey Heer, Stanford University; et al.

Nicholas Kong, University of California Berkeley
Maneesh Agrawala, University of California Berkeley

Predicting Tie Strength With Social Media

Eric Gilbert & Karrie Karahalios, University of Illinois at Urbana-Champaign

Musink: Composing Music through Augmented Drawing

Theophanis Tsandilas, Université Paris-Sud; et al.

Catherine Letondal, Université Paris-Sud
Wendy E. Mackay, Université Paris-Sud

Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector Exhibits

Scott S. Snibbe, Sona Research
Hayes S. Raffle, Massachusetts Institute of Technology

Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection Performance

Leah Findlater, University of British Columbia; et al.

Karyn Moffatt, University of British Columbia
Joanna McGrenere, University of British Columbia
Jessica Dawson, University of British Columbia

Undo and Erase Events as Indicators of Usability Problems

David Akers, Stanford University; et al.

Matthew Simpson, Google
Robin Jeffries, Google
Terry Winograd, Stanford University

2008

In-Car GPS Navigation: Engagement with and Disengagement from the Environment

Gilly Leshed, Cornell University; et al.

Theresa Velden, Cornell University
Oya Rieger, Cornell University
Blazej Kot, Cornell University
Phoebe Sengers, Cornell University

Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Inte...

Krzysztof Z. Gajos, University of Washington; et al.

Jacob O. Wobbrock, University of Washington
Daniel S. Weld, University of Washington

Large Scale Analysis of Web Revisitation Patterns

Eytan Adar, University of Washington; et al.

Jaime Teevan, Microsoft Research
Susan T. Dumais, Microsoft Research

Designs on Dignity: Perceptions of Technology Among the Homeless

Christopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology

The Network in the Garden: An Empirical Analysis of Social Media in Rural Life

Eric Gilbert, University of Illinois at Urbana-Champaign; et al.

Karrie Karahalios, University of Illinois at Urbana-Champaign
Christian Sandvig, University of Illinois at Urbana-Champaign

Multimodal collaborative handwriting training for visually-impaired people

Beryl Plimmer, University of Auckland; et al.

Andrew Crossan, University of Glasgow
Stephen A. Brewster, University of Glasgow
Rachel Blagojevic, University of Auckland

An Error Model for Pointing Based on Fitts' Law

Jacob O. Wobbrock, University of Washington; et al.

Edward Cutrell, Microsoft Research
Susumu Harada, University of Washington
I. Scott MacKenzie, York University

2007

Multiview: improving trust in group video conferencing through spatial faithfulness

David T. Nguyen & John Canny, University of California Berkeley

Software or wetware?: discovering when and why people use digital prosthetic memory

Vaiva Kalnikaité & Steve Whittaker, University of Sheffield

Shift: a technique for operating pen-based interfaces using touch

Daniel Vogel, University of Toronto
Patrick Baudisch, Microsoft Research

Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognit...

Björn Hartmann, Stanford University; et al.

Leith Abdulla, Stanford University
Manas Mittal, Massachusetts Institute of Technology
Scott R. Klemmer, Stanford University

Sustainable interaction design: invention & disposal, renewal & reuse

Eli Blevis, Indiana University at Bloomington

Consuming video on Mobile devices

Kenton O'Hara, Hewlett-Packard Labs; et al.

April Slayden Mitchell, Hewlett-Packard Labs
Alex Vorbau, Hewlett-Packard Labs

2006

Trackball text entry for people with motor impairments

Jacob O. Wobbrock & Brad Myers, Carnegie Mellon University

Embedded phenomena: supporting science learning with classroom-sized distributed simulations

Tom Moher, University of Illinois at Chicago

A role for haptics in mobile interaction: initial design using a handheld tactile display prototype

Joseph Luk, University of British Columbia; et al.

Jérôme Pasquero, McGill University
Shannon Little, University of British Columbia
Karon MacLean, University of British Columbia
Vincent Lévesque, McGill University
Vincent Hayward, McGill University

2005

Making space for stories: ambiguity in the design of personal communication systems

Paul M. Aoki, Palo Alto Research Center
Allison Woodruff, Intel Research

Examining Task Engagement in Sensor-Based Statistical Models of Human Interruptibility

James Fogarty, Carnegie Mellon University; et al.

Andrew J. Ko, Carnegie Mellon University
Htet Htet Aung, Carnegie Mellon University
Elspeth Golden, Carnegie Mellon University
Karen P. Tang, Carnegie Mellon University
Scott E. Hudson, Carnegie Mellon University

Designing the spectator experience

Stuart Reeves, University of Nottingham; et al.

Steve Benford, University of Nottingham
Claire O'Malley, University of Nottingham
Mike Fraser, University of Bristol

The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation area

Tovi Grossman & Ravin Balakrishnan, University of Toronto

CIKM (Knowledge Management)

2012

Gelling, and Melting, Large Graphs by Edge Manipulation

Hanghang Tong, IBM Research; et al.

B. Aditya Prakash, Virginia Tech
Tina Eliassi-Rad, Rutgers University
Michalis Faloutsos, University of California Riverside
Christos Faloutsos, Carnegie Mellon University

2011

Intent-aware query similarity

Jiafeng Guo, Chinese Academy of Sciences; et al.

Xueqi Cheng, Chinese Academy of Sciences
Gu Su, Microsoft Research
Xiaofei Zhu, Chinese Academy of Sciences

2010

MENTA: Inducing Multilingual Taxonomies from Wikipedia

Gerard de Melo & Gerhard Weikum, Max Planck Institut

FACeTOR: cost-driven exploration of faceted query results

Abhijith Kashyap, State University of New York at Buffalo; et al.

Vagelis Hristidis, Florida International University
Michalis Petropoulos, State University of New York at Buffalo

2009

On the Feasibility of Multi-Site Web Search Engines

Ricardo Baeza-Yates, Yahoo! Research; et al.

Aristides Gionis, Yahoo! Research
Flavio Junqueira, Yahoo! Research
Vassilis Plachouras, Yahoo! Research
Luca Telloli, Yahoo! Research

2008

Learning to Link with Wikipedia

David Milne & Ian H. Witten, Univerisity of Waikato

2007

Autonomously Semantifying Wikipedia

Fei Wu & Daniel S. Weld, University of Washington

2006

Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing Indices

Segabtian Michel, Max Planck Institut; et al.

Matthias Bender, Max Planck Institut
Nikos Ntarmos, RACTI and University of Patras
Peter Triantafillou, RACTI and University of Patras
Gerhard Weikum, Max Planck Institut
Christian Zimmer, Max Planck Institut

2005

Towards Automatic Association of Relevant Unstructured Content with Structured Query Results

Prasan Roy, IBM Research; et al.

Mukesh Mohania, IBM Research
Bhuvan Bamba, Georgia Institute of Technology
Shree Raman, University of Massachusetts Amherst

2004

Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XML

Qiankun Zhao, Nanyang Technological University; et al.

Sourav S Bhowmick, Nanyang Technological University
Mukesh Mohania, IBM Research
Yahiko Kambayashi, Kyoto University

CVPR (Computer Vision)

2012

A Simple Prior-free Method for Non-Rigid Structure-from-Motion Factorization

Yuchao Dai, Northwestern Polytechnical University; et al.

Hongdong Li, Australian National University
Mingyi He, Northwestern Polytechnical University

2011

Real-time Human Pose Recognition in Parts from Single Depth Images

Jamie Shotton, Microsoft Research; et al.

Andrew Fitzgibbon, Microsoft Research
Mat Cook, Microsoft Research
Toby Sharp, Microsoft Research
Mark Finocchio, Microsoft Research
Richard Moore, Microsoft Research
Alex Kipman, Microsoft Research
Andrew Blake, Microsoft Research

2010

Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data usi...

Anders Eriksson & Anton va den Hendel, University of Adelaide

2009

Single Image Haze Removal Using Dark Channel Prior

Kaiming He, The Chinese University of Hong Kong; et al.

Jian Sun, Microsoft Research
Xiaoou Tang, The Chinese University of Hong Kong

2008

Global Stereo Reconstruction under Second Order Smoothness Priors

Oliver Woodford, University of Oxford; et al.

Ian Reid, Oxford Brookes University
Philip Torr, University of Oxford
Andrew Fitzgibbon, Microsoft Research

Beyond Sliding Windows: Object Localization by Efficient Subwindow Search

Chistoph H. Lampert, Max Planck Institut; et al.

Matthew B. Blaschko, Max Planck Institut
Thomas Hodmann, Google

2007

Dynamic 3D Scene Analysis from a Moving Vehicle

Bastian Leibe, ETH Zurich; et al.

Nico Cornelis, Katholieke Universiteit Leuven
Kurt COrnelis, Katholieke Universiteit Leuven
Luc Van Gool, ETH Zurich

2006

Putting Objects in Perspective

Derek Hoiem, Carnegie Mellon University; et al.

Alexei Efros, Carnegie Mellon University
Martial Hebert, Carnegie Mellon University

2005

Real-Time Non-Rigid Surface Detection

Julien Pilet, École Polytechnique Fédérale de Lausanne; et al.

Vincent Lepetit, École Polytechnique Fédérale de Lausanne
Pascal Fua, École Polytechnique Fédérale de Lausanne

2004

Programmable Imaging using a Digital Micromirror Array

Shree K. Nayar, Columbia University; et al.

Vlad Branzoi, Columbia University
Terry E. Boult, University of Colorado

2003

Object Class Recognition by Unsupervised Scale-Invariant Learning

Rob Fergus, University of Oxford; et al.

Pietro Perona, California Institute of Technology
Andrew Zisserman, University of Oxford

2001

Morphable 3D models from video

Matthew Brand, Mitsubishi Electric Research Laboratories

2000

Real-Time Tracking of Non-Rigid Objects using Mean Shift

Dorin Comaniciu, Siemens Corporate Research; et al.

Visvanathan Ramesh, Siemens Corporate Research
Peter Meer, Rutgers University

FOCS (Theory)

2012

A multi-prover interactive proof for NEXP sound against entangled provers

Tsuyoshi Ito, NEC Labs America
Thomas Vidick, Massachusetts Institute of Technology

A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2

Julia Chuzhoy, Toyota Technological Institute at Chicago
Shi Li, Princeton University

2011

3-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ Hold in General

Timon Hertli, ETH Zurich

A Polylogarithmic-Competitive Algorithm for the k-Server Problem

Nikhil Bansal, IBM Research; et al.

Niv Buchbinder, Open University
Aleksander M&acedil;dry, Massachusetts Institute of Technology
Joseph Naor, Technion

2010

Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke Decompositions

Matthew Andrews, Bell Labs

Subexponential Algorithms for Unique Games and Related Problems

Sanjeev Arora, Princeton University; et al.

Boaz Barak, Princeton University
David Steurer, Princeton University

Computational Transition at the Uniqueness Threshold

Allan Sly, Microsoft Research

2008

Two Query PCP with Sub-Constant Error

Dana Moshkovitz & Ran Raz, Weizmann Institute of Science

2007

Space-Efficient Identity Based Encryption Without Pairings

Dan Boneh, Stanford University; et al.

Craig Gentry, Stanford University
Michael Hamburg, Stanford University

2006

Settling the Complexity of 2-Player Nash Equilibrium

Xi Chen, Tsinghua University
Xiaotie Deng, City University of Hong Kong

2005

The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type M...

Subhash A. Khot, Georgia Institute of Technology
Nisheeth K. Vishnoi, IBM Research

Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time

Farzad Parvaresh & Alexander Vardy, University of California San Diego

2004

Cryptography in NC0

Benny Applebaum, Technion; et al.

Yuval Ishai, Technion
Eyal Kushilevitz, Technion

Hardness of Approximating the Shortest Vector Problem in Lattices

Subhash Khot, Georgia Institute of Technology

2003

On the Impossibility of Dimension Reduction in L1

Bo Brinkman & Moses Charikar, Princeton University

2002

A Dichotomy Theorem for Constraints on a Three-Element Set

Andrei A. Bulatov, University of Oxford

Minimizing Congestion in General Networks

Harald Räcke, Paderborn University

Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model

Boaz Barak, Weizmann Institute of Science

FSE (Software Engineering)

2011

Proactive Detection of Collaboration Conflicts

Yuriy Brun, University of Washington; et al.

Reid Holmes, University of Waterloo
Michael D. Ernst, University of Washington
David Notkin, University of Washington

How Do Fixes Become Bugs?

Zuoning Yin, University of Illinois at Urbana-Champaign; et al.

Ding Yuan, University of Illinois at Urbana-Champaign
Yuanyuan Zhou, University of California San Diego
Shankar Pasupathy, NetApp
Lakshmi Bairavasundaram, NetApp

Proving programs robust

Swarat Chaudhuri, Rice University; et al.

Sumit Gulwani, Microsoft Research
Roberto Lublinerman, Pennsylvania State University
Sara Navidpour, Pennsylvania State University

2010

Creating and evolving developer documentation: understanding the decisions of open source contribu...

Barthélémy Dagenais & Martin P. Robillard, McGill University

Developer Fluency: Achieving True Mastery in Software Projects

Minghui Zhou, Peking University
Audris Mockus, Avaya Labs

Staged Concurrent Program Analysis

Nishant Sinha & Chao Wang, NEC Labs America

2009

Asserting and checking determinism for multithreaded programs

Jacob Burnim & Koushik Sen, University of California Berkeley

Darwin: an approach for debugging evolving programs

Dawei Qi, National University of Singapore; et al.

Abhik Roychoudhury, National University of Singapore
Zhenkai Liang, National University of Singapore
Kapil Vaswani, Microsoft Research

Graph-based Mining of Multiple Object Usage Patterns

Tung Thanh Nguyen, Iowa State University; et al.

Hoan Anh Nguyen, Iowa State University
Nam H. Pham, Iowa State University
Jafar M. Al-Kofahi, Iowa State University
Tien N. Nguyen, Iowa State University

2008

What makes a good bug report?

Nicolas Bettenburg, Saarland University; et al.

Sascha Just, Saarland University
Adrian Schröter, University of Victoria
Cathrin Weiss, University of Zurich
Rahul Premraj, Saarland University
Thomas Zimmermann, University of Calgary

Efficient online monitoring of web-service SLAs

Franco Raimondi, University College London; et al.

James Skene, University College London
Wolfgang Emmerich, University College London

2007

Automatic consistency assessment for query results in dynamic environments

Jamie Payton, University of North Carolina at Charlotte; et al.

Christine Julien, University of Texas at Austin
Gruia-Catalin Roman, Washington University in St. Louis

Globally distributed software development project performance: an empirical analysis

Narayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University

Mining specifications of malicious behavior

Mihai Christodorescu, University of Wisconsin; et al.

Somesh Jha, University of Wisconsin
Christopher Kruegel, Vienna University of Technology

Object and reference immutability using Java generics

Yoav Zibin, Massachusetts Institute of Technology; et al.

Alex Potanin, Victoria University of Wellington
Mahmood Ali, Massachusetts Institute of Technology
Shay Artzi, Massachusetts Institute of Technology
Adam Kieżun, Massachusetts Institute of Technology
Michael D. Ernst, Massachusetts Institute of Technology

2006

Controlling factors in evaluating path-sensitive error detection techniques

Matthew B. Dwyer, University of Nebraska-Lincoln; et al.

Suzette Person, University of Nebraska-Lincoln
Sebastian Elbaum, University of Nebraska-Lincoln

SYNERGY: a new algorithm for property checking

Bhargav S. Gulavani, Indian Institute of Technology; et al.

Thomas A. Henzinger, École Polytechnique Fédérale de Lausanne
Yamini Kannan, Microsoft Research
Aditya V. Nori, Microsoft Research
Sriram K. Rajamani, Microsoft Research

2005

Automatic Generation of Suggestions for Program Investigation

Martin P. Robillard, McGill University

CUTE: a concolic unit testing engine for C

Koushik Sen, University of Illinois at Urbana-Champaign; et al.

Darko Marinov, University of Illinois at Urbana-Champaign
Gul Agha, University of Illinois at Urbana-Champaign

Context- and path-sensitive memory leak detection

Yichen Xie & Alex Aiken, Stanford University

2004

Reasoning about partial goal satisfaction for requirements and design engineering

Emmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain

A classification system and analysis for aspect-oriented programs

Martin Rinard, Massachusetts Institute of Technology; et al.

Alexandru Salcianu, Massachusetts Institute of Technology
Suhabe Bugrara, Massachusetts Institute of Technology

2003

Eliminating redundancies with a "composition with adaptation" meta-programming technique

Stan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong University

A Family of Test Adequacy Criteria for Database-Driven Applications

Gregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh

Predicting problems caused by component upgrades

Stephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology

2002

Isolating Cause-Effect Chains from Computer Programs

Andreas Zeller, Saarland University

ICCV (Computer Vision)

2011

Relative Attributes

Devi Parikh, Toyota Technological Institute at Chicago
Kristen Grauman, University of Texas at Austin

2009

Discriminative models for multi-class object layout

Chaitanya Desai, University of California Irvine; et al.

Deva Ramanan, University of California Irvine
Charless Fowlkes, University of California Irvine

2007

Population Shape Regression From Random Design Data

Bradley Davis, University of North Carolina at Chapel Hill; et al.

P. Thomas Fletcher, University of Utah
Elizabeth Bullitt, University of North Carolina at Chapel Hill
Sarang Joshi, University of Utah

2005

Globally Optimal Estimates for Geometric Reconstruction Problems

Fredrik Kahl, Lund University
Didier Henrion, LAAS-CNRS

2003

Detecting Pedestrians using Patterns of Motion and Appearance

Paul Viola, Microsoft Research; et al.

Michael J. Jones, Mitsubishi Electric Research Laboratories
Daniel Snow, Mitsubishi Electric Research Laboratories

Image Parsing: Unifying Segmentation, Detection and Recognition

Zhuowen Tu, University of California Los Angeles; et al.

Xiangrong Chen, University of California Los Angeles
Alan L. Yuille, University of California Los Angeles
Song-Chun Zhu, University of California Los Angeles

Image-based Rendering using Image-based Priors

Andrew Fitzgibbon, University of Oxford; et al.

Yonatan Wexler, Weizmann Institute of Science
Andrew Zisserman, University of Oxford

2001

Probabilistic Tracking with Exemplars in a Metric Space

Kentaro Toyama & Andrew Blake, Microsoft Research

The Space of All Stereo Images

Steven Seitz, University of Washington

1999

Euclidean Reconstruction and Reprojection up to Subgroups

Yi Ma, University of California Berkeley; et al.

Stefano Soatto, Washington University in St. Louis
Jana Kosecka, University of California Berkeley
Shankar Sastry, University of California Berkeley

A Theory of Shape by Space Carving

Kiriakos Kutulakos, University of Rochester
Steven Seitz, Carnegie Mellon University

1998

Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Paramet...

Marc Pollefeys, Katholieke Universiteit Leuven; et al.

Reinhard Koch, Katholieke Universiteit Leuven
Luc Van Gool, Katholieke Universiteit Leuven

The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image Sequences

Phil Torr, Microsoft Research; et al.

Andrew Fitzgibbon, University of Oxford
Andrew Zisserman, University of Oxford

ICML (Machine Learning)

2012

Bayesian Posterior Sampling via Stochastic Gradient Fisher Scoring

Sungjin Ahn, University of California Irvine; et al.

Anoop Korattikara, University of California Irvine
Max Welling, University of California Irvine

2011

Computational Rationalization: The Inverse Equilibrium Problem

Kevin Waugh, Carnegie Mellon University; et al.

Brian Ziebart, Carnegie Mellon University
Drew Bagnell, Carnegie Mellon University

2010

Hilbert Space Embeddings of Hidden Markov Models

Le Song, Carnegie Mellon University; et al.

Byron Boots, Carnegie Mellon University
Sajid M. Siddiqi, Google
Geoffrey Gordon, Carnegie Mellon University
Alex Smola, Yahoo! Research

2009

Structure preserving embedding

Blake Shaw & Tony Jebara, Columbia University

2008

SVM Optimization: Inverse Dependence on Training Set Size

Shai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago

2007

Information-theoretic metric learning

Jason V. Davis, University of Texas at Austin; et al.

Brian Kulis, University of Texas at Austin
Prateek Jain, University of Texas at Austin
Suvrit Sra, University of Texas at Austin
Inderjit S. Dhillon, University of Texas at Austin

2006

Trading convexity for scalability

Ronan Collobert, NEC Labs America; et al.

Fabian Sinz, NEC Labs America
Jason Weston, NEC Labs America
Léon Bottou, NEC Labs America

2005

A support vector method for multivariate performance measures

Thorsten Joachims, Cornell University

1999

Least-Squares Temporal Difference Learning

Justin A. Boyan, NASA Ames Research Center

ICSE (Software Engineering)

2012

Understanding Integer Overflow in C/C++

Will Dietz, University of Illinois at Urbana-Champaign; et al.

Peng Li, University of Utah
John Regehr, University of Utah
Vikram Adve, University of Illinois at Urbana-Champaign

Using Dynamic Analysis to Discover Polynomial and Array Invariants

ThanhVu Nguyen, University of New Mexico; et al.

Deepak Kapur, University of New Mexico
Westley Weimer, University of New Mexico
Stephanie Forrest, University of New Mexico

Amplifying Tests to Validate Exception Handling Code

Pingyu Zhang & Sebastian Elbaum, University of Nebraska-Lincoln

Partial Models: Towards Modeling and Reasoning with Uncertainty

Michalis Famelis, University of Toronto; et al.

Rick Salay, University of Toronto
Marsha Chechik, University of Toronto

How Do Professional Developers Comprehend Software?

Tobias Roehm, Technische Universität München; et al.

Rebecca Tiarks, University of Bremen
Rainer Koschke, University of Bremen
Walid Maalej, Technische Universität München

A Tactic-Centric Approach for Automating Traceability of Quality Concerns

Mehdi Mirakhorli, DePaul University; et al.

Yonghee Shin, DePaul University
Jane Cleland-Huang, DePaul University
Murat Cinar, DePaul University

Automated Detection of Client-State Manipulation Vulnerabilities

Anders Møller & Mathias Schwarz, Aarhus University

2011

Verifying Multi-threaded Software using SMT-based Context-Bounded Model Checking

Lucas Cordeiro & Bernd Fischer, University of Southampton

Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and ...

Narayan Ramasubbu, Singapore Management University; et al.

Marcelo Cataldo, Carnegie Mellon University
Rajesh Krishna Balan, Singapore Management University
James D. Herbsleb, Carnegie Mellon University

Programs, tests, and oracles: the foundations of testing revisited

Matt Staats, University of Minnesota; et al.

Michael W. Whalen, University of Minnesota
Mats P.E. Heimdahl, University of Minnesota

On-demand Feature Recommendations Derived from Mining Public Product Descriptions

Horatiu Dumitru, DePaul University; et al.

Marek Gibiec, DePaul University
Negar Hariri, DePaul University
Jane Cleland-Huang, DePaul University
Bamshad Mobasher, DePaul University
Carlos Castro-Herrera, DePaul University
Mehdi Mirakhorli, DePaul University

Run-Time Efficient Probabilistic Model Checking

Antonio Filieri, Politecnico di Milano; et al.

Carlo Ghezzi, Politecnico di Milano
Giordano Tamburrelli, Politecnico di Milano

2010

A Machine Learning Approach for Tracing Regulatory Codes to Product Specific Requirements

Jane Cleland-Huang, DePaul University; et al.

Adam Czauderna, DePaul University
John Emenecker, DePaul University
Marek Gibiec, DePaul University

Collaborative Reliability Prediction of Service-Oriented Systems

Zibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong

A Cut-off Approach for Bounded Verification of Parameterized Systems

Qiusong Yang & Mingshu Li, Chinese Academy of Sciences

Test Generation through Programming in UDITA

Milos Gligoric, University of Illinois at Urbana-Champaign; et al.

Tihomir Gvero, École Polytechnique Fédérale de Lausanne
Vilas Jagannath, University of Illinois at Urbana-Champaign
Sarfraz Khurshid, University of Texas at Austin
Viktor Kuncak, École Polytechnique Fédérale de Lausanne
Darko Marinov, University of Illinois at Urbana-Champaign

A Degree-of-Knowledge Model to Capture Source Code Familiarity

Thomas Fritz, University of British Columbia; et al.

Jingwen Ou, University of British Columbia
Gail C. Murphy, University of British Columbia
Emerson Murphy-Hill, University of British Columbia

2009

How We Refactor, and How We Know It

Emerson Murphy-Hill, Portland State University; et al.

Chris Parnin, Georgia Institute of Technology
Andrew P. Black, Portland State University

Effective Static Deadlock Detection

Mayur Naik, Intel Research; et al.

Chang-Seo Park, University of California Berkeley
Koushik Sen, University of California Berkeley
David Gay, Intel Research

Invariant-Based Automatic Testing of AJAX User Interfaces

Ali Mesbah & Arie van Deursen, Delft University of Technology

Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows Vista

Christian Bird, University of California Davis; et al.

Nachiappan Nagappan, Microsoft Research
Premkumar Devanbu, University of California Davis
Harald Gall, University of Zurich
Brendan Murphy, Microsoft Research

Automatically finding patches using genetic programming

Westley Weimer, University of Virginia; et al.

ThanhVu Nguyen, University of New Mexico
Claire Le Goues, University of Virginia
Stephanie Forrest, University of New Mexico

2008

Precise memory leak detection for java software using container profiling

Guoqing Xu & Atanas Rountev, Ohio State University

Debugging reinvented: asking and answering why and why not questions about program behavior

Andrew J. Ko & Brad A. Myers, Carnegie Mellon University

Recommending adaptive changes for framework evolution

Barthélémy Dagenais & Martin P. Robillard, McGill University

Predicting Accurate and Actionable Static Analysis Warnings: An Experimental Approach

Joseph Ruthruff, University of Nebraska-Lincoln; et al.

John Penix, Google
J. David Morgenthaler, Google
Sebastian Elbaum, University of Nebraska-Lincoln
Gregg Rothermel, University of Nebraska-Lincoln

The effect of program and model structure on mc/dc test adequacy coverage

Ajitha Rajan, University of Minnesota; et al.

Michael W. Whalen, Rockwell Collins
Mats P.E. Heimdahl, University of Minnesota

2007

Refactoring for Parameterizing Java Classes

Adam Kiezun, Massachusetts Institute of Technology; et al.

Michael D. Ernst, Massachusetts Institute of Technology
Frank Tip, IBM Research
Robert M. Fuhrer, IBM Research

Tracking Code Clones in Evolving Software

Ekwa Duala-Ekoko & Martin P. Robillard, McGill University

Matching and Merging of Statecharts Specifications

Shiva Nejati, University of Toronto; et al.

Mehrdad Sabetzadeh, University of Toronto
Marsha Chechik, University of Toronto
Steve Easterbrook, University of Toronto
Pamela Zave, AT&T Laboratories

Predicting Faults from Cached History

Sunghun Kim, Massachusetts Institute of Technology; et al.

Thomas Zimmermann, Saarland University
E. James Whitehead Jr., University of California Santa Cruz
Andreas Zeller, Saarland University

2006

Model-Based Development of Dynamically Adaptive Software

Ji Zhang & Betty H.C. Cheng, Michigan State University

Who Should Fix This Bug?

John Anvik, University of British Columbia; et al.

Lyndon Hiew, University of British Columbia
Gail C. Murphy, University of British Columbia

2005

Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Pe...

Andrew Ko, Carnegie Mellon University; et al.

Htet Htet Aung, Carnegie Mellon University
Brad Myers, Carnegie Mellon University

Is Mutation an Appropriate Tool for Testing Experiments?

James Andrews, University of Western Ontario; et al.

Lionel Briand, Carleton University
Yvan Labiche, Carleton University

Using Structural Context to Recommend Source Code Examples

Reid Holmes & Gail Murphy, University of British Columbia

Data Structure Repair Using Goal-Directed Reasoning

Brian Demsky & Martin Rinard, Massachusetts Institute of Technology

2004

SNIAFL: Towards a Static Non-Interactive Approach to Feature Location

Wei Zhao, Peking University; et al.

Lu Zhang, Peking University
Yin Liu, Peking University
Jiasu Sun, Peking University
Fuqing Yang, Peking University

Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized Systems

Rohit Khare & Richard N. Taylor, University of California Irvine

An Empirical Study of Software Reuse vs. Defect-Density and Stability

Parastoo Mohagheghi, Ericsson; et al.

Reidar Conradi, Norwegian University of Science and Technology
Ole M. Killi, Norwegian University of Science and Technology
Henrik Schwarz, Norwegian University of Science and Technology

A Tool for Writing and Debugging Algebraic Specifications

Johannes Henkel & Amer Diwan, University of Colorado

Static Checking of Dynamically Generated Queries in Database Applications

Carl Gould, University of California Davis; et al.

Zhendong Su, University of California Davis
Premkumar Devanbu, University of California Davis

2003

Precise Dynamic Slicing Algorithms

Xiangyu Zhang, University of Arizona; et al.

Rajiv Gupta, University of Arizona
Youtao Zhang, University of Arizona

Modular Verification of Software Components in C

Sagar Chaki, Carnegie Mellon University; et al.

Edmund Clarke, Carnegie Mellon University
Alex Groce, Carnegie Mellon University
Somesh Jha, University of Wisconsin
Helmut Veith, Technische Universität Wien

IJCAI (Artificial Intelligence)

2011

Unweighted Coalitional Manipulation Under the Borda Rule is NP-Hard

Nadja Betzler, Technische Universität Berlin; et al.

Rolf Niedermeier, Technische Universität Berlin
Gerhard J. Woeginger, Technische Universität Eindhoven

Nested Rollout Policy Adaptation for Monte Carlo Tree Search

Christopher D. Rosin, Parity Computing

On the Decidability of Connectedness Constraints in 2D and 3D Euclidean Spaces

Roman Kontchakov, Birkbeck College London; et al.

Yavor Nenov, University of Manchester
Ian Pratt-Hartmann, University of Manchester
Michael Zakharyaschev, Birkbeck College London

2009

Consequence-Driven Reasoning for Horn SHIQ Ontologies

Yevgeny Kazakov, University of Oxford

Learning Conditional Preference Networks with Queries

Frederic Koriche, Université Montpellier II
Bruno Zanuttini, Université de Caen Basse-Normandie

2007

Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian Networks

Maleeha Qazi, Siemens Medical Solutions; et al.

Glenn Fung, Siemens Medical Solutions
Sriram Krishnan, Siemens Medical Solutions
Romer Rosales, Siemens Medical Solutions
Harald Steck, Siemens Medical Solutions
R. Bharat Rao, Siemens Medical Solutions
Don Polderman, Erasmus University Medical Center
Dhanalakshmi Chandrasekaran, No Affiliation

Building Structure into Local Search for SAT

Duc Nghia Pham, Griffith University; et al.

John Thornton, Griffith University
Abdul Sattar, Griffith University

Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Pro...

Luc Mercier & Pascal Van Hentenryck, Brown University

2005

Learning Coordination Classifiers

Yuhong Guo, University of Alberta; et al.

Russell Greiner, University of Alberta
Dale Schuurmans, University of Alberta

Solving Checkers

Jonathan Schaeffer, University of Alberta; et al.

Yngvi Bjornsson, University of Alberta
Neil Burch, University of Alberta
Akihiro Kishimoto, University of Alberta
Martin Muller, University of Alberta
Robert Lake, University of Alberta
Paul Lu, University of Alberta
Steve Sutphen, University of Alberta

A Probabilistic Model of Redundancy in Information Extraction

Doug Downey, University of Washington; et al.

Oren Etzioni, University of Washington
Stephen Soderland, University of Washington

2003

Approximating Game-Theoretic Optimal Strategies for Full-scale Poker

Darse Billings, University of Alberta; et al.

Neil Burch, University of Alberta
Aaron Davidson, University of Alberta
Robert Holte, University of Alberta
Jonathan Schaeffer, University of Alberta
Terence Schauenberg, University of Alberta
Duane Szafron, University of Alberta

Thin Junction Tree Filters for Simultaneous Localization and Mapping

Mark A. Paskin, University of California Berkeley

2001

Complexity Results for Structure-Based Causality

Thomas Eiter & Thomas Lukasiewicz, Vienna University of Technology

1999

Learning in Natural Language

Dan Roth, University of Illinois at Urbana-Champaign

A Distributed Case-Based Reasoning Application for Engineering Sales Support

Ian Watson, University of Salford
Dan Gardingen, Western Air

1997

Object Identification in a Bayesian Context

Timothy Huang & Stuart Russell, University of California Berkeley

Translingual Information Retrieval: A Comparative Evaluation

Jaime G. Carbonell, Carnegie Mellon University; et al.

Yiming Yang, Carnegie Mellon University
Robert E. Frederking, Carnegie Mellon University
Ralf D. Brown, Carnegie Mellon University
Yibing Geng, Carnegie Mellon University
Danny Lee, Carnegie Mellon University

Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolo...

Fangzhen Lin, The Hongkong University of Science and Technology

INFOCOM (Networking)

2012

Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework

Carlee Joe-Wong, Princeton University; et al.

Soumya Sen, Princeton University
Tian Lan, George Washington University
Mung Chiang, Princeton University

2011

Dynamic right-sizing for power-proportional data centers

Minghong Lin, California Institute of Technology; et al.

Adam Wierman, California Institute of Technology
Lachlan Andrew, Swinburne University of Technology
Eno Thereska, Microsoft Research

2010

On the Feasibility and Efficacy of Protection Routing in IP Networks

Kin-Wah Kwong, University of Pennsylvania; et al.

Lixin Gao, University of Massachusetts Amherst
Roch Guérin, University of Pennsylvania
Zhi-Li Zhang, University of Minnesota

2009

Queuing Network Models for Multi-Channel P2P Live Streaming Systems

Di Wu, Polytechnic Institute of New York University; et al.

Yong Liu, Polytechnic Institute of New York University
Keith W. Ross, Polytechnic Institute of New York University

2008

On the Feasibility of the Link Abstraction in (Rural) Mesh Networks

Dattatraya Gokhal, Indian Navy; et al.

Sayandeep Sen, University of Wisconsin
Kameswari Chebrolu, Indian Institute of Technology
Bhaskaran Rama, Indian Institute of Technology

Theoretical Results on Base Station Movement Problem for Sensor Networks

Yi Shi & Y. Thomas Hou, Virginia Tech

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless...

Changhee Joo, Ohio State University; et al.

Xiaojun Lin, Purdue University
Ness B. Shroff, Ohio State University

2007

Disruption free topology reconfiguration in OSPF networks

Pierre Francois, Université catholique de Louvain; et al.

Mike Shand, Cisco Systems
Olicier Bonaventure, Université catholique de Louvain

2006

Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective

Gaurav Sharma, Purdue University; et al.

Ravi Mazumdar, University of Waterloo
Ness Shroff, Purdue University

2005

Perfect Simulation and Stationarity of a Class of Mobility Models

Jean-Yves Le Boude, École Polytechnique Fédérale de Lausanne
Milan Vojnović, Microsoft Research

2004

Throughput-Delay Trade-Off in Wireless Networks

Abbas El Gamal, Stanford University; et al.

James Mammen, Stanford University
Balaji Prabhakar, Stanford University
Devavrat Shah, Stanford University

2003

User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks

Sem Borst, Bell Labs

2002

Priority Service and Max-Min Fairness

Peter Marbach, University of Toronto

2001

Mobility increases the capacity of ad-hoc wireless networks

Matthias Grossglauser, AT&T Laboratories
David Tse, University of California Berkeley

2000

The Chaotic Nature of TCP Congestion Control

András Veres, Ericsson
Miklós Boda, Ericsson Research

1999

Bandwidth Sharing: Objectives and Algorithms

Laurent Massoulié, Microsoft Research
James Robert, France Télécom R&D

1998

Effective Bandwidths in Wireless Networks with Multiuser Receivers

David Tse, University of California Berkeley
Stephen Hanly, University of Melbourne

1996

An algorithm for multicast tree generation in networks with asymmetric links

Ram Ramanathan, BBN Technologies

KDD (Data Mining)

2012

Searching and Mining Trillions of Time Series Subsequences under Dynamic Time Warping

Thanawin Rakthanmanon, University of California Riverside; et al.

Bilson Campana, University of California Riverside
Abdullah Mueen, University of California Riverside
Gustavo Batista, University of São Paulo
Brandon Westover, Brigham and Women's Hospital
Qiang Zhu, University of California Riverside
Jesin Zakaria, University of California Riverside
Eamonn Keogh, University of California Riverside

2011

Leakage in Data Mining: Formulation, Detection, and Avoidance

Shachar Kaufman, Tel-Aviv University; et al.

Saharon Rosset, Tel-Aviv University
Claudia Perlich, Media6Degrees

2010

Large linear classification when data cannot fit in memory

Hsiang-Fu Yu, National Taiwan University; et al.

Cho-Jui Hsieh, National Taiwan University
Kai-Wei Chang, National Taiwan University
Chih-Jen Lin, National Taiwan University

Connecting the dots between news articles

Dafna Shahaf & Carlos Guestrin, Carnegie Mellon University

2009

Collaborative Filtering with Temporal Dynamics

Yehuda Koren, Yahoo! Research

2008

Fastanova: an efficient algorithm for genome-wide association study

Xiang Zhang, University of North Carolina at Chapel Hill; et al.

Fei Zou, University of North Carolina at Chapel Hill
Wei Wang, University of North Carolina at Chapel Hill

2007

Predictive discrete latent factor models for large scale dyadic data

Deepak Agarwal & Srujana Merugu, Yahoo! Research

2006

Training linear SVMs in linear time

Thorsten Joachims, Cornell University

2005

Graphs over time: densification laws, shrinking diameters and possible explanations

Jure Leskovec, Carnegie Mellon University; et al.

Jon Kleinberg, Cornell University
Christos Faloutsos, Carnegie Mellon University

2004

A probabilistic framework for semi-supervised clustering

Sugato Basu, University of Texas at Austin; et al.

Mikhail Bilenko, University of Texas at Austin
Raymond J. Mooney, University of Texas at Austin

2003

Maximizing the spread of influence through a social network

David Kempe, Cornell University; et al.

Jon Kleinberg, Cornell University
Éva Tardos, Cornell University

2002

Pattern discovery in sequences under a Markov assumption

Darya Chudova & Padhraic Smyth, University of California Irvine

2001

Robust space transformations for distance-based operations

Edwin M. Knorr, University of British Columbia; et al.

Raymond T. Ng, University of British Columbia
Ruben H. Zamar, University of British Columbia

2000

Hancock: a language for extracting signatures from data streams

Corinna Cortes, AT&T Laboratories; et al.

Kathleen Fisher, AT&T Laboratories
Daryl Pregibon, AT&T Laboratories
Anne Rogers, AT&T Laboratories

1999

MetaCost: a general method for making classifiers cost-sensitive

Pedro Domingos, Universidade Técnica de Lisboa

1998

Occam's Two Razors: The Sharp and the Blunt

Pedro Domingos, Universidade Técnica de Lisboa

1997

Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Di...

Foster Provost & Tom Fawcett, NYNEX Science and Technology

NSDI (Networking)

2012

Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing

Matei Zaharia, University of California Berkeley; et al.

Mosharaf Chowdhury, University of California Berkeley
Tathagata Das, University of California Berkeley
Ankur Dave, University of California Berkeley
Justin Ma, University of California Berkeley
Murphy McCauley, University of California Berkeley
Michael J. Franklin, University of California Berkeley
Scott Shenker, University of California Berkeley
Ion Stoica, University of California Berkeley

2011

Design, Implementation and Evaluation of Congestion Control for Multipath TCP

Damon Wischik, University College London; et al.

Costin Raiciu, University College London
Adam Greenhalgh, University College London
Mark Handley, University College London

ServerSwitch: A Programmable and High Performance Platform for Data Center Networks

Guohan Lu, Microsoft Research; et al.

Chuanxiong Guo, Microsoft Research
Yulong Li, Microsoft Research
Zhiqiang Zhou, Tsinghua University
Tong Yuan, Microsoft Research
Haitao Wu, Microsoft Research
Yongqiang Xiong, Microsoft Research
Rui Gao, Microsoft Research
Yongguang Zhang, Microsoft Research

2010

Reverse traceroute

Ethan Katz-Bassett, University of Washington; et al.

Harsha V. Madhyastha, University of California San Diego
Vijay Kumar Adhikari, University of Minnesota
Colin Scott, University of Washington
Justine Sherry, University of Washington
Peter van Wesep, University of Washington
Thomas Anderson, University of Washington
Arvind Krishnamurthy, University of Washington

2009

TrInc: Small Trusted Hardware for Large Distributed Systems

Dave Levin, University of Maryland; et al.

John R. Douceur, Microsoft Research
Jacob R. Lorch, Microsoft Research
Thomas Moscibroda, Microsoft Research

2008

Remus: High Availability via Asynchronous Virtual Machine Replication

Brendan Cully, University of British Columbia; et al.

Geoffrey Lefebvre, University of British Columbia
Dutch Meyer, University of British Columbia
Mike Feeley, University of British Columbia
Norm Hutchinson, University of British Columbia
Andrew Warfield, University of British Columbia

Consensus Routing: The Internet as a Distributed System

John P. John, University of Washington; et al.

Ethan Katz-Bassett, University of Washington
Arvind Krishnamurthy, University of Washington
Thomas Anderson, University of Washington
Arun Venkataramani, University of Massachusetts Amherst

2007

Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems Code

Charles Killian, University of California San Diego; et al.

James W. Anderson, University of California San Diego
Ranjit Jhala, University of California San Diego
Amin Vahdat, University of California San Diego

2006

Experience with an Object Reputation System for Peer-to-Peer Filesharing

Kevin Walsh & Emin Gün Sirer, Cornell University

Replay Debugging for Distributed Applications

Dennis Geels, University of California Berkeley; et al.

Gautam Altekar, University of California Berkeley
Scott Shenker, University of California Berkeley
Ion Stoica, University of California Berkeley

2005

Detecting BGP Configuration Faults with Static Analysis

Nick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology

2004

Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Netwo...

Philip Levis, University of California Berkeley; et al.

Neil Patel, University of California Berkeley
David Culler, University of California Berkeley
Scott Shenker, University of California Berkeley

OSDI (Operating Systems)

2012

Spanner: Google's Globally-Distributed Database

James C. Corbett, Google; et al.

Jeffrey Dean, Google
Michael Epstein, Google
Andrew Fikes, Google
Christopher Frost, Google
JJ Furman, Google
Sanjay Ghemawat, Google
Andrey Gubarev, Google
Christopher Heiser, Google
Peter Hochschild, Google
Wilson Hsieh, Google
Sebastian Kanthak, Google
Eugene Kogan, Google
Hongyi Li, Google
Alexander Lloyd, Google
Sergey Melnik, Google
David Mwaura, Google
David Nagle, Google
Sean Quinlan, Google
Rajesh Rao, Google
Lindsay Rolig, Google
Yasushi Saito, Google
Michal Szymaniak, Google
Christopher Taylor, Google
Ruth Wang, Google
Dale Woodford, Google

2010

Efficient System-Enforced Deterministic Parallelism

Amittai Aviram, Yale University; et al.

Shu-Chun Weng, Yale University
Sen Hu, Yale University
Bryan Ford, Yale University

The Turtles Project: Design and Implementation of Nested Virtualization

Muli Ben-Yehuda, IBM Research; et al.

Michael D. Day, IBM Linux Technology Center
Zvi Dubitzky, IBM Research
Michael Factor, IBM Research
Nadav Har'El, IBM Research
Abel Gordon, IBM Research
Anthony Liguori, IBM Linux Technology Center
Orit Wasserman, IBM Research
Ben-Ami Yassour, IBM Research

2008

KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs

Cristian Cadar, Stanford University; et al.

Daniel Dunbar, Stanford University
Dawson Engler, Stanford University

Difference Engine: Harnessing Memory Redundancy in Virtual Machines

Diwaker Gupta, University of California San Diego; et al.

Sangmin Lee, University of Texas at Austin
Michael Vrable, University of California San Diego
Stefan Savage, University of California San Diego
Alex C. Snoeren, University of California San Diego
George Varghese, University of California San Diego
Geoffrey M. Voelker, University of California San Diego
Amin Vahdat, University of California San Diego

DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Lan...

Yuan Yu, Microsoft Research; et al.

Michael Isard, Microsoft Research
Dennis Fetterly, Microsoft Research
Mihai Budiu, Microsoft Research
Úlfar Erlingsson, Microsoft Research
Pradeep Kumar Gunda, Microsoft Research
Jon Currey, Microsoft Research

2006

Bigtable: A Distributed Storage System for Structured Data

Fay Chang, Google; et al.

Jeffrey Dean, Google
Sanjay Ghemawat, Google
Wilson C. Hsieh, Google
Deborah A. Wallach, Google
Mike Burrows, Google
Tushar Chandra, Google
Andrew Fikes, Google
Robert E. Gruber, Google

Rethink the Sync

Edmund B. Nightingale, University of Michigan; et al.

Kaushik Veeraraghavan, University of Michigan
Peter M. Chen, University of Michigan
Jason Flinn, University of Michigan

2004

Using Model Checking to Find Serious File System Errors

Junfeng Yang, Stanford University; et al.

Paul Twohey, Stanford University
Dawson Engler, Stanford University
Madanlal Musuvathi, Microsoft Research

Recovering Device Drivers

Michael M. Swift, University of Washington; et al.

Muthukaruppan Annamalai, University of Washington
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington

2002

Memory Resource Management in VMware ESX Server

Carl A. Waldspurger, VMware

2000

Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions

Dawson Engler, Stanford University; et al.

Benjamin Chelf, Stanford University
Andy Chou, Stanford University
Seth Hallem, Stanford University

1999

IO-Lite: A Unified I/O Buffering and Caching System

Vivek S. Pai, Rice University; et al.

Peter Druschel, Rice University
Willy Zwaenepoel, Rice University

1996

Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications

Todd C. Mowry, University of Toronto; et al.

Angela K. Demke, University of Toronto
Orran Krieger, University of Toronto

Safe Kernel Extensions Without Run-Time Checking

George C. Necula & Peter Lee, Carnegie Mellon University

PLDI (Programming Languages)

2012

Concurrent Data Representation Synthesis

Peter Hawkins, Stanford University; et al.

Alex Aiken, Stanford University
Kathleen Fisher, Tufts University
Martin Rinard, Massachusetts Institute of Technology
Mooly Sagiv, Tel-Aviv University

2011

Data Representation Synthesis

Peter Hawkins, Stanford University; et al.

Alex Aiken, Stanford University
Kathleen Fisher, Tufts University
Martin Rinard, Massachusetts Institute of Technology
Mooly Sagiv, Tel-Aviv University

2010

Safe to the Last Instruction: Automated Verification of a Type-Safe Operating System

Jean Yang, Massachusetts Institute of Technology
Chris Hawblitzel, Microsoft Research

2009

Binary Analysis for Measurement and Attribution of Program Performance

Nathan Tallent, Rice University; et al.

John Mellor-Crummey, Rice University
Michael Fagan, Rice University

2007

Fault-tolerant Typed Assembly Language

Frances Perry, Princeton University; et al.

Lester Mackey, Princeton University
George A. Reis, Princeton University
Jay Ligatti, University of South Florida
David I. August, Princeton University
David Walker, Princeton University

The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of Code

Ben Hardekopf & Calvin Lin, University of Texas at Austin

2005

Automatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the Heap

Chris Lattner & Vikram Adve, University of Illinois at Urbana-Champaign

Programming by Sketching for Bit-Streaming Programs

Armando Solar-Lezama, University of California Berkeley; et al.

Rodric Rabbah, Massachusetts Institute of Technology
Rastislav Bodik, University of California Berkeley
Kemal Ebcioğlu, IBM Research

2004

Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams

John Whaley & Monica S. Lam, Stanford University

2003

Automatically Proving the Correctness of Compiler Optimizations

Sorin Lerner, University of Washington; et al.

Todd Millstein, University of Washington
Craig Chambers, University of Washington

2000

Dynamo: a transparent dynamic optimization system

Vasanth Bala, Hewlett-Packard Labs; et al.

Evelyn Duesterwald, Hewlett-Packard Labs
Sanjeev Banerjia, InCert

1999

Whole program paths

James R. Larus, Microsoft Research

PODS (Databases)

2012

Worst-case Optimal Join Algorithms

Hung Q. Ngo, University at Buffalo; et al.

Ely Porat, Bar-Ilan University
Christopher Ré, University of Wisconsin
Atri Rudra, University at Buffalo

2011

Data Exchange Beyond Complete Data

Marcelo Arenas, Pontificia Universidad Católica de Chile; et al.

Jorge Pérez, Universidad de Chile
Juan Reutter, University of Edinburgh

2010

An Optimal Algorithm for the Distinct Elements Problem

Daniel M. Kane, Harvard University; et al.

Jelani Nelson, Massachusetts Institute of Technology
David P. Woodruff, IBM Research

2009

Size and Treewidth Bounds for Conjunctive Queries

Georg Gottlob, University of Oxford; et al.

Stephanie Lee, University of Oxford
Gregory Valient, University of California Berkeley

2008

Estimating PageRank on Graph Streams

Atish Das Sarma, Georgia Institute of Technology; et al.

Sreenivas Gollapudi, Microsoft Research
Rina Panigrahy, Microsoft Research

2007

Generalized Hypertree Decompositions: NP-Hardness and Tractable Variants

Georg Gottlob, University of Oxford; et al.

Zoltan Miklos, University of Oxford
Thomas Schwentick, Universität Dortmund

2006

Two-variable logic on data trees and XML reasoning

Mikolaj Bojanczyk, Warsaw University; et al.

Claire David, Université Paris
Anca Muscholl, Université Paris
Thomas Schwentick, Universität Dortmund
Luc Segoufin, Université Paris

2005

On the complexity of division and set joins in the relational algebra

Dirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum

XML data exchange: consistency and query answering

Marcelo Arenas & Leonid Libkin, University of Toronto

2004

Conditional XPath, the first order complete XPath dialect

Maarten Marx, University of Amsterdam

2003

An Information-Theoretic Approach to Normal Forms for Relational and XML Data

Marcelo Arenas & Leonid Libkin, University of Toronto

2002

Monadic Datalog and the Expressive Power of Languages for Web Information Extraction

Georg Gottlob & Christoph Koch, Technische Universität Wien

2001

Optimal aggregation algorithms for middleware

Ronald Fagin, IBM Research; et al.

Amnon Lotem, University of Maryland
Moni Naor, Weizmann Institute of Science

2000

Auditing Boolean attributes

Jon Kleinberg, Cornell University; et al.

Christos Papadimitriou, University of California Berkeley
Prabhakar Raghavan, IBM Research

1999

Exact and approximate aggregation in constraint query languages

Michael Benefikt & Leonid Libkin, Bell Labs

1998

A lower bound theorem for indexing schemes and its application to multidimensional range queries

Vasilis Samoladas & Daniel P. Miranker, University of Texas at Austin

Expressiveness of structured document query languages based on attribute grammars

Frank Neven & Jan Van den Bussche, Limburgs Universitair Centrum

1997

On the Complexity of Database Queries

Christos H. Papadimitriou, University of California Berkeley
Mihalis Yannakakis, Bell Labs

S&P (Security and Privacy)

2012

Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards

Benedikt Driessen, Ruhr-Universität Bochum; et al.

Ralf Hund, Ruhr-Universität Bochum
Carsten Willems, Ruhr-Universität Bochum
Christof Paar, Ruhr-Universität Bochum
Thorsten Holz, Ruhr-Universität Bochum

2011

Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks

Andrew M. White, University of North Carolina at Chapel Hill; et al.

Austin Matthews, University of North Carolina at Chapel Hill
Kevin Snow, University of North Carolina at Chapel Hill
Fabian Monrose, University of North Carolina at Chapel Hill

2010

SCiFI - A System for Secure Face Identification

Margarita Osadchy, University of Haifa; et al.

Benny Pinkas, University of Haifa
Ayman Jarrous, University of Haifa
Boaz Moskovich, University of Haifa

2009

Native Client: A Sandbox for Portable, Untrusted x86 Native Code

Bennet Yee, Google; et al.

David Sehr, Google
Gregory Dardyk, Google
Bradley Chen, Google
Robert Muth, Google
Tavis Ormandy, Google
Shiki Okasaka, Google
Neha Narula, Google
Nicholas Fullagar, Google

2008

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Daniel Halperin, University of Washington; et al.

Thomas S. Heydt-Benjamin, University of Massachusetts Amherst
Benjamin Ransford, University of Massachusetts Amherst
Shane S. Clark, University of Massachusetts Amherst
Benessa Defend, University of Massachusetts Amherst
Will Morgan, University of Massachusetts Amherst
Kevin Fu, University of Massachusetts Amherst
Tadayoshi Kohno, University of Washington
William H. Maisel, Harvard University

SIGCOMM (Networking)

2012

Multi-Resource Fair Queueing for Packet Processing

Ali Ghodsi, University of California Berkeley; et al.

Vyas Sekar, Intel Research
Matei Zaharia, University of California Berkeley
Ion Stoica, University of California Berkeley

2011

They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices

Shyamnath Gollakota, Massachusetts Institute of Technology; et al.

Haitham Hassanieh, Massachusetts Institute of Technology
Benjamin Ransford, University of Massachusetts Amherst
Dina Katabi, Massachusetts Institute of Technology
Kevin Fu, University of Massachusetts Amherst

2010

Efficient Error Estimating Coding: Feasibility and Applications

Binbin Chen, National University of Singapore; et al.

Ziling Chou, National University of Singapore
Yuda Zhao, National University of Singapore
Haifeng Yu, National University of Singapore

2009

White Space Networking with Wi-Fi like Connectivity

Paramvir Bahl, Microsoft Research; et al.

Ranveer Chandra, Microsoft Research
Thomas Moscibroda, Microsoft Research
Rohan Murty, Harvard University
Matt Welsh, Harvard University

2008

ZigZag Decoding: Combating Hidden Terminals in Wireless Networks

Shyamnath Gollakota & Dina Katabi, Massachusetts Institute of Technology

SIGIR (Information Retrieval)

2012

Time-Based Calibration of Effectiveness Measures

Mark Smucker & Charles Clarke, University of Waterloo

2011

Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction Data

Mikhail Ageev, Moscow State University; et al.

Qi Guo, Emory University
Dmitry Lagun, Emory University
Eugene Agichtein, Emory University

2010

Assessing the Scenic Route: Measuring the Value of Search Trails in Web Logs

Ryen W. White, Microsoft Research
Jeff Huang, University of Washington

2009

Sources of evidence for vertical selection

Jaime Arguello, Carnegie Mellon University; et al.

Fernando Diaz, Yahoo! Research
Jamie Callan, Carnegie Mellon University
Jean-Francois Crespo, Yahoo! Research

2008

Algorithmic Mediation for Collaborative Exploratory Search

Jeremy Pickens, FX Palo Alto Lab; et al.

Gene Golovchinsky, FX Palo Alto Lab
Chirag Shah, University of North Carolina at Chapel Hill
Pernilla Qvarfordt, FX Palo Alto Lab
Maribeth Back, FX Palo Alto Lab

2007

Studying the Use of Popular Destinations to Enhance Web Search Interaction

Ryen W. White, Microsoft Research; et al.

Mikhail Bilenko, Microsoft Research
Silviu Cucerzan, Microsoft Research

2006

Minimal Test Collections for Retrieval Evaluation

Ben Carterette, University of Massachusetts Amherst; et al.

James Allan, University of Massachusetts Amherst
Ramesh Sitaraman, University of Massachusetts Amherst

2005

Learning to estimate query difficulty: including applications to missing content detection and dis...

Elad Yom-Tov, IBM Research; et al.

Shai Fine, IBM Research
David Carmel, IBM Research
Adam Darlow, IBM Research

2004

A Formal Study of Information Retrieval Heuristics

Hui Fang, University of Illinois at Urbana-Champaign; et al.

Tao Tao, University of Illinois at Urbana-Champaign
ChengXiang Zhai, University of Illinois at Urbana-Champaign

2003

Re-examining the potential effectiveness of interactive query expansion

Ian Ruthven, University of Strathclyde

2002

Novelty and redundancy detection in adaptive filtering

Yi Zhang, Carnegie Mellon University; et al.

Jamie Callan, Carnegie Mellon University
Thomas Minka, Carnegie Mellon University

2001

Temporal summaries of new topics

James Allan, University of Massachusetts Amherst; et al.

Rahul Gupta, University of Massachusetts Amherst
Vikas Khandelwal, University of Massachusetts Amherst

2000

IR evaluation methods for retrieving highly relevant documents

Kalervo Järvelin & Jaana Kekäläinen, University of Tampere

1999

Cross-language information retrieval based on parallel texts and automatic mining of parallel text...

Jian-Yun Nie, Université de Montréal; et al.

Michel Simard, Université de Montréal
Pierre Isabelle, Université de Montréal
Richard Durand, Université de Montréal

1998

A theory of term weighting based on exploratory data analysis

Warren R. Greiff, University of Massachusetts Amherst

1997

Feature selection, perceptron learning, and a usability case study for text categorization

Hwee Tou Ng, DSO National Laboratories; et al.

Wei Boon Goh, Ministry of Defence
Kok Leong Low, Ministry of Defence

1996

Retrieving spoken documents by combining multiple index sources

Gareth Jones, University of Cambridge; et al.

Jonathan Foote, University of Cambridge
Karen Spärck Jones, University of Cambridge
Steve Young, University of Cambridge

SIGMETRICS (Performance)

2012

Temperature management in data centers: why some (might) like it hot

Nosayba El-Sayed, University of Toronto; et al.

Ioan Stefanovici, University of Toronto
George Amvrosiadis, University of Toronto
Andy A. Hwang, University of Toronto
Bianca Schroeder, University of Toronto

2011

Topology Discovery of Sparse Random Graphs With Few Participants

Animashree Anandkumar, University of California Irvine; et al.

Avinatan Hassidim, Google
Jonathan Kelner, Massachusetts Institute of Technology

2010

Load balancing via random local search in closed and open systems

Ayalvadi Ganesh, University of Bristol; et al.

Sarah Lilienthal, Cambridge University
D. Manjunath, Indian Institute of Technology
Alexandre Proutière, Microsoft Research
Florian Simatos, INRIA

2009

The Age of Gossip: Spatial Mean Field Regime

Augustin Chaintreau, Technicolor; et al.

Jean-Yves Le Boudec, École Polytechnique Fédérale de Lausanne
Nikodin Ristanovic, École Polytechnique Fédérale de Lausanne

2008

Counter Braids: A Novel Counter Architecture for Per-Flow Measurement

Yi Lu, Stanford University; et al.

Andrea Montanari, Stanford University
Balaji Prabhakar, Stanford University
Sarang Dharmapurikar, Cisco Systems
Abdul Kabbani, Stanford University

2007

Modeling the Relative Fitness of Storage

Michael P. Mesnier, Intel; et al.

Matthew Wachs, Carnegie Mellon University
Raja R. Sambasivan, Carnegie Mellon University
Alice X. Zheng, Carnegie Mellon University
Gregory R. Ganger, Carnegie Mellon University

2006

Maximizing throughput in wireless networks via gossiping

Eytan Modiano, Massachusetts Institute of Technology; et al.

Devavrat Shah, Massachusetts Institute of Technology
Gil Zussman, Massachusetts Institute of Technology

2005

Coupon replication systems

Laurent Massoulié & Milan Vojnović, Microsoft Research

2004

On performance bounds for the integration of elastic and adaptive streaming flows

Thomas Bonald & Alexandre Proutiere, France Telecom

1996

Supporting stored video: reducing rate variability and end-to-end resource requirements through op...

James D. Salehi, University of Massachusetts Amherst; et al.

Zhi-Li Zhang, University of Massachusetts Amherst
James F. Kurose, University of Massachusetts Amherst
Don Towsley, University of Massachusetts Amherst

Exploiting process lifetime distributions for dynamic load balancing

Mor Harchol-Balter & Allen B. Downey, University of California Berkeley

SIGMOD (Databases)

2012

High-Performance Complex Event Processing over XML Streams

Barzan Mozafari, Massachusetts Institute of Technology; et al.

Kai Zeng, University of California Los Angeles
Carlo Zaniolo, University of California Los Angeles

2011

Entangled Queries: Enabling Declarative Data-Driven Coordination

Nitin Gupta, Cornell University; et al.

Lucja Kot, Cornell University
Sudip Roy, Cornell University
Gabriel Bender, Cornell University
Johannes Gehrke, Cornell University
Christoph Koch, École Polytechnique Fédérale de Lausanne

2010

FAST: fast architecture sensitive tree search on modern CPUs and GPUs

Changkyu Kim, Intel; et al.

Jatin Chhugani, Intel
Nadathur Satish, Intel
Eric Sedlar, Oracle
Anthony D. Nguyen, Intel
Tim Kaldewey, Oracle
Victor W. Lee, Intel
Scott A. Brandt, University of California Santa Cruz
Pradeep Dubey, Intel

2009

Generating example data for dataflow programs

Christopher Olston, Yahoo! Research; et al.

Shubham Chopra, Yahoo! Research
Utkarsh Srivastava, Yahoo! Research

2008

Serializable isolation for snapshot databases

Michael J. Cahill, University of Sydney; et al.

Uwe Röhm, University of Sydney
Alan D. Fekete, University of Sydney

2007

Compiling mappings to bridge applications and databases

Sergey Melnik, Microsoft Research; et al.

Atul Adya, Microsoft
Philip A. Bernstein, Microsoft Research

2006

To search or to crawl?: towards a query optimizer for text-centric tasks

Panagiotis G. Ipeirotis, New York University; et al.

Eugene Agichtein, Microsoft Research
Pranay Jain, Columbia University
Luis Gravano, Columbia University

2004

Indexing spatio-temporal trajectories with Chebyshev polynomials

Yuhan Cai & Raymond T. Ng, University of British Columbia

2003

Spreadsheets in RDBMS for OLAP

Andrew Witkowski, Oracle; et al.

Srikanth Bellakonda, Oracle
Tolga Bozkaya, Oracle
Gregory Dorman, Oracle
Nathan Folkert, Oracle
Abhinav Gupta, Oracle
Lei Shen, Oracle
Sankar Subramanian, Oracle

2001

Locally adaptive dimensionality reduction for indexing large time series databases

Eamonn Keogh, University of California Irvine; et al.

Kaushik Chakrabarti, University of California Irvine
Michael Pazzani, University of California Irvine
Sharad Mehrotra, University of California Irvine

2000

XMill: an efficient compressor for XML data

Hartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories

1999

DynaMat: a dynamic view management system for data warehouses

Yannis Kotidis & Nick Roussopoulos, University of Maryland

1998

Efficient transparent application recovery in client-server information systems

David Lomet & Gerhard Weikum, Microsoft Research

1997

Fast parallel similarity search in multimedia databases

Stefan Berchtold, University of Munich; et al.

Christian Böml, University of Munich
Bernhard Braunmüller, University of Munich
Daniel A. Keim, University of Munich
Hans-Peter Kriegel, University of Munich

1996

Implementing data cubes efficiently

Venky Harinarayan, Stanford University; et al.

Anand Rajaraman, Stanford University
Jeffrey D. Ullman, Stanford University

SODA (Theory)

2012

Computing all maps into a sphere

Martin Čadek, Masaryk University; et al.

Marek Krčál, Charles University
Jiří Matoušel, Charles University
Francis Sergeraert, Université Joseph Fourier
Lukáš Vokřínel, Masaryk University
Uli Wagner, Charles University

2011

An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss Transform

Nir Ailon, Technion
Edo Liberty, Yahoo! Research

2010

An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem

Arash Asadpour, Stanford University; et al.

Michel X. Goemans, Massachusetts Institute of Technology
Aleksander Madry, Massachusetts Institute of Technology
Shayan Oveis Gharan, Stanford University
Amin Saberi, Stanford University

2009

Natural Algorithms

Bernard Chazelle, Princeton University

SOSP (Operating Systems)

2011

A File is Not a File: Understanding the I/O Behavior of Apple Desktop Applications

Tyler Harter, University of Wisconsin; et al.

Chris Dragga, University of Wisconsin
Michael Vaughn, University of Wisconsin
Andrea C. Arpaci-Dusseau, University of Wisconsin
Remzi H. Arpaci-Dusseau, University of Wisconsin

Cells: A Virtual Mobile Smartphone Architecture

Jeremy Andrus, Columbia University; et al.

Christoffer Dall, Columbia University
Alexander Van't Hof, Columbia University
Oren Laadan, Columbia University
Jason Nieh, Columbia University

2009

FAWN: A Fast Array of Wimpy Nodes

David G. Andersen, Carnegie Mellon University; et al.

Jason Franklin, Carnegie Mellon University
Michael Kaminsky, Intel Research
Amar Phanishayee, Carnegie Mellon University
Lawrence Tan, Carnegie Mellon University
Vijay Vasudevan, Carnegie Mellon University

seL4: Formal Verification of an OS Kernel

Gerwin Klein, NICTA; et al.

Kevin Elphinstone, NICTA
Gernot Heiser, NICTA
June Andronick, NICTA
David Cock, NICTA
Philip Derrin, NICTA
Dhammika Elkaduwe, NICTA
Kai Engelhardt, NICTA
Rafal Kolanski, NICTA
Michael Norrish, NICTA
Thomas Sewell, NICTA
Harvey Tuch, NICTA
Simon Winwood, NICTA

RouteBricks: Exploiting Parallelism to Scale Software Routers

Mihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al.

Norbert Egi, Lancaster University
Katerina Argyraki, École Polytechnique Fédérale de Lausanne
Byung-Gon Chun, Intel Research
Kevin Fall, Intel Research
Gianluca Iannaccone, Intel Research
Allan Knies, Intel Research
Maziar Manesh, Intel Research
Sylvia Ratnasamy, Intel Research

2007

Zyzzyva: speculative byzantine fault tolerance

Ramakrishna Kotla, University of Texas at Austin; et al.

Lorenzo Alvisi, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Allen Clement, University of Texas at Austin
Edmund Wong, University of Texas at Austin

Sinfonia: a new paradigm for building scalable distributed systems

Marcos K. Aguilera, Hewlett-Packard Labs; et al.

Arif Merchant, Hewlett-Packard Labs
Mehul Shah, Hewlett-Packard Labs
Alistair Veitch, Hewlett-Packard Labs
Christos Karamanolis, VMware

Secure Web Applications via Automatic Partitioning

Stephen Chong, Cornell University; et al.

Jed Liu, Cornell University
Andrew C. Myers, Cornell University
Xin Qi, Cornell University
K. Vikram, Cornell University
Lantian Zheng, Cornell University
Xin Zheng, Cornell University

2005

Speculative Execution in a Distributed File System

Edmund B. Nightingale, University of Michigan; et al.

Peter M. Chen, University of Michigan
Jason Flinn, University of Michigan

BAR Tolerance for Cooperative Services

Amitanand S. Aiyer, University of Texas at Austin; et al.

Lorenzo Alvisi, University of Texas at Austin
Allen Clement, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Jean-Philippe Martin, University of Texas at Austin
Carl Porth, University of Texas at Austin

Rx: treating bugs as allergies - a safe method to survive software failures

Feng Qin, University of Illinois at Urbana-Champaign; et al.

Joseph Tucek, University of Illinois at Urbana-Champaign
Jagadeesan Sundaresan, University of Illinois at Urbana-Champaign
Yuanyuan Zhou, University of Illinois at Urbana-Champaign

Vigilante: End-to-End Containment of Internet Worms

Manuel Costa, University of Cambridge; et al.

Jon Crowcroft, University of Cambridge
Miguel Castro, Microsoft Research
Antony Rowstron, Microsoft Research
Lidong Zhou, Microsoft Research
Lintao Zhang, Microsoft Research
Paul Barham, Microsoft Research

2003

Backtracking intrusions

Samuel T. King & Peter M. Chen, University of Michigan

Preserving peer replicas by rate-limited sampled voting

Petros Maniatis, Stanford University; et al.

David S. H. Rosenthal, Stanford University
Mema Roussopoulos, Stanford University
Mary Baker, Stanford University
TJ Giuli, Stanford University
Yanto Muliadi, Stanford University

Improving the Reliability of Commodity Operating Systems

Michael M. Swift, University of Washington; et al.

Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington

2001

BASE: using abstraction to improve fault tolerance

Rodrigo Rodrigues, Massachusetts Institute of Technology; et al.

Miguel Castro, Microsoft Research
Barbara Liskov, Massachusetts Institute of Technology

Untrusted hosts and confidentiality: secure program partitioning

Steve Zdancewic, Cornell University; et al.

Lantian Zheng, Cornell University
Nathaniel Nystrom, Cornell University
Andrew C. Myers, Cornell University

1999

Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors

Kinshuk Govil, Stanford University; et al.

Dan Teodosiu, Hewlett-Packard Labs
Yongqiang Huang, Stanford University
Mendel Rosenblum, Stanford University

Soft timers: efficient microsecond software timer support for network processing

Mohit Aron & Peter Druschel, Rice University

The Click modular router

Robert Morris, Massachusetts Institute of Technology; et al.

Eddie Kohler, Massachusetts Institute of Technology
John Jannotti, Massachusetts Institute of Technology
M. Frans Kaashoek, Massachusetts Institute of Technology

Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail se...

Yasushi Saito, University of Washington; et al.

Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington

1997

Continuous profiling: where have all the cycles gone?

Jennifer M. Anderson, Digital Equipment Corporation; et al.

Lance M. Berc, Digital Equipment Corporation
Jeffrey Dean, Digital Equipment Corporation
Sanjay Ghemawat, Digital Equipment Corporation
Monika R. Henzinger, Digital Equipment Corporation
Shun-Tak A. Leung, Digital Equipment Corporation
Richard L. Sites, Digital Equipment Corporation
Mark T. Vandevoorde, Digital Equipment Corporation
Carl A. Waldspurger, Digital Equipment Corporation
William E. Weihl, Digital Equipment Corporation

Disco: running commodity operating systems on scalable multiprocessors

Edouard Bugnion, Stanford University; et al.

Scott Devine, Stanford University
Mendel Rosenblum, Stanford University

Eraser: a dynamic data race detector for multithreaded programs

Stefan Savage, University of Washington; et al.

Michael Burrows, Digital Equipment Corporation
Greg Nelson, Digital Equipment Corporation
Patrick Sobalvarro, Digital Equipment Corporation
Thomas Anderson, University of California Berkeley

STOC (Theory)

2012

Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower Bounds

Samuel Fiorini, Université libre de Bruxelles; et al.

Serge Massar, Université libre de Bruxelles
Sebastian Pokutta, Universität Erlangen Nürnberg
Hans Tiwary, Université libre de Bruxelles
Ronald de Wolf, Centrum Wiskunde & Informatica

The Cell Probe Complexity of Dynamic Range Counting

Kasper Larsen, Aarhus University

2011

Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphs

Paul Christiano, Massachusetts Institute of Technology; et al.

Jonathan A. Kelner, Massachusetts Institute of Technology
Aleksander Madry, Massachusetts Institute of Technology
Daniel A. Spielman, Yale University
Shang-Hua Teng, University of Southern California

Subexponential lower bounds for randomized pivoting rules for the simplex algorithm

Oliver Friedmann, University of Munich; et al.

Thomas Dueholm Hansen, Aarhus University
Uri Zwick, Tel-Aviv University

2010

An improved LP-based approximation for steiner tree

Jaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al.

Fabrizio Grandoni, University of Tor Vergata
Thomas Rothvoß, École Polytechnique Fédérale de Lausanne
Laura Sanità, École Polytechnique Fédérale de Lausanne

QIP = PSPACE

Rahul Jain, National University of Singapore; et al.

Zhengfeng Ji, Perimeter Institute for Theoretical Physics
Sarvagya Upadhyay, University of Waterloo
John Watrous, University of Waterloo

2009

A constructive proof of the Lovász local lemma

Robin A. Moser, ETH Zurich

Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem

Chris Peikert, SRI International

2008

Optimal algorithms and inapproximability results for every CSP?

Prasad Raghavendra, University of Washington

Optimal hierarchical decompositions for congestion minimization in networks

Harald Räcke, University of Warwick

2007

Faster integer multiplication

Martin Fürer, Pennsylvania State University

Towards 3-query locally decodable codes of subexponential length

Sergey Yekhanin, Massachusetts Institute of Technology

2006

The PCP theorem by gap amplification

Irit Dinur, Hebrew University

2005

Undirected ST-connectivity in log-space

Omer Reingold, Weizmann Institute of Science

2004

Multi-linear formulas for permanent and determinant are of super-polynomial size

Ran Raz, Weizmann Institute of Science

Expander flows, geometric embeddings and graph partitioning

Sanjeev Arora, Princeton University; et al.

Satish Rao, University of California Berkeley
Umesh Vazirani, University of California Berkeley

2003

Derandomizing polynomial identity tests means proving circuit lower bounds

Valentine Kabanets & Russell Impagliazzo, University of California San Diego

New lattice-based cryptographic constructions

Oded Regev, Tel-Aviv University

UIST (User Interface)

2012

CrowdScape: interactively visualizing user behavior and output

Jeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University

Cliplets: juxtaposing still and dynamic imagery

Neel Joshi, Microsoft Research; et al.

Sisil Mehta, Georgia Institute of Technology
Steven Drucker, Microsoft Research
Eric Stollnitz, Microsoft Research
Hugues Hoppe, Microsoft Research
Matt Uyttendaele, Microsoft
Michael Cohen, Microsoft Research

Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Chang...

Sean Follmer, Massachusetts Institute of Technology; et al.

Daniel Leithinger, Massachusetts Institute of Technology
Alex Olwal, Massachusetts Institute of Technology
Nadia Cheng, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology

2011

SideBySide: Ad-hoc Multi-user Interaction with Handheld Projectors

Karl D.D. Willis, Carnegie Mellon University; et al.

Ivan Poupyrev, Disney Research
Scott E. Hudson, Carnegie Mellon University
Moshe Mahler, Disney Research

2010

VizWiz: nearly real-time answers to visual questions

Jeffrey P. Bigham, University of Rochester; et al.

Chandrika Jayant, University of Washington
Hanjie Ji, University of Rochester
Greg Little, Massachusetts Institute of Technology
Andrew Miller, University of Central Florida
Robert C. Miller, Massachusetts Institute of Technology
Robin Miller, University of Rochester
Aubrey Tatarowicz, Massachusetts Institute of Technology
Brandyn White, University of Maryland
Samual White, University of Rochester
Tom Yeh, University of Maryland

2009

Mouse 2.0: Multi-touch meets the Mouse

Nicolas Villar, Microsoft Research; et al.

Shahram Izadi, Microsoft Research
Dan Rosenfeld, Microsoft
Hrvoje Benko, Microsoft Research
John Helmes, Microsoft Research
Jonathan Westhues, Microsoft Research
Steve Hodges, Microsoft Research
Eyal Ofek, Microsoft
Alex Butler, Microsoft Research
Xiang Cao, Microsoft Research
Billy Chen, Microsoft

2008

Bringing Physics to the Surface

Andrew D. Wilson, Microsoft Research; et al.

Shahram Izadi, Microsoft Research
Otmar Hilliges, Microsoft Research
Armando Garcia-Mendoza, Microsoft Research
David Kirk, Microsoft Research

2007

ThinSight: Versatile Multi-touch Sensing for Thin Form-factor Displays

Steve Hodges, Microsoft Research; et al.

Shahram Izadi, Microsoft Research
Alex Butler, Microsoft Research
Alban Rrustemi, Microsoft Research
Bill Buxton, Microsoft Research

2006

Reflective Physical Prototyping through Integrated Design, Test, and Analysis

Björn Hartmann, Stanford University; et al.

Scott Klemmer, Stanford University
Michael Bernstein, Stanford University
Leith Abdulla, Stanford University
Brandon Burr, Stanford University
Avi Robinson-Mosher, Stanford University
Jennifer Gee, Stanford University

2005

Automation and Customization of Rendered Web Pages

Michael Bolin, Massachusetts Institute of Technology; et al.

Matthew Webber, Massachusetts Institute of Technology
Philip Rha, Massachusetts Institute of Technology
Tom Wilson, Massachusetts Institute of Technology
Robert C. Miller, Massachusetts Institute of Technology

2004

Multi-Finger Gestural Interaction with 3D Volumetric Displays

Tovi Grossman, University of Toronto; et al.

Daniel Wigdor, University of Toronto
Ravin Balakrishnan, University of Toronto

CrossY: A Crossing-Based Drawing Application

Georg Apitz & François Guimbretière, University of Maryland

2003

Perceptually-Supported Image Editing of Text and Graphics

Eric Saund, Palo Alto Research Center; et al.

David Fleet, Palo Alto Research Center
Daniel Larner, Palo Alto Research Center
James Mahoney, Palo Alto Research Center

2002

Clothing Manipulation

Takeo Igarashi, University of Tokyo
John F. Hughes, Brown University

2001

Phidgets: Easy Development of Physical Interfaces through Physical Widgets

Saul Greenberg & Chester Fitchett, University of Calgary

2000

Sensing Techniques for Mobile Interaction

Ken Hinckley, Microsoft Research; et al.

Jeff Pierce, Microsoft Research
Mike Sinclair, Microsoft Research
Eric Horvitz, Microsoft Research

1996

Indigo: A Local Propagation Algorithm for Inequality Constraints

Alan Borning, University of Washington; et al.

Richard Anderson, University of Washington
Bjorn Freeman-Benson, Object Technology International

VLDB (Databases)

2012

Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification

Albert Angel, University of Toronto; et al.

Nick Koudas, University of Toronto
Nikos Sarkas, University of Toronto
Divesh Srivastava, AT&T Laboratories

2011

RemusDB: Transparent High-Availability for Database Systems

Umar Farooq Minhas, University of Waterloo; et al.

Shriram Rajagopalan, University of British Columbia
Brendan Cully, University of British Columbia
Ashraf Aboulnaga, University of Waterloo
Ken Salem, University of Waterloo
Andrew Warfield, University of British Columbia

2010

Towards Certain Fixes with Editing Rules and Master Data

Shuai Ma, University of Edinburgh; et al.

Wenfei Fan, University of Edinburgh
Jianzhong Li, Harbin Institute of Technology
Wenyuan Yu, University of Edinburgh
Nan Tang, University of Edinburgh

2009

A Unified Approach to Ranking in Probabilistic Databases

Jian Li, University of Maryland; et al.

Barna Saha, University of Maryland
Amol Deshpande, University of Maryland

2008

Finding Frequent Items in Data Streams

Graham Cormode & Marios Hadjieleftheriou, AT&T Laboratories

Constrained Physical Design Tuning

Nicolas Bruno & Surajit Chaudhuri, Microsoft Research

2007

Scalable Semantic Web Data Management Using Vertical Partitioning

Daniel J. Abadi, Massachusetts Institute of Technology; et al.

Adam Marcus, Massachusetts Institute of Technology
Samuel R. Madden, Massachusetts Institute of Technology
Kate Hollenbach, Massachusetts Institute of Technology

2006

Trustworthy Keyword Search for Regulatory-Compliant Records Retention

Soumyadeb Mitra, University of Illinois at Urbana-Champaign; et al.

Windsor W. Hsu, University of Illinois at Urbana-Champaign
Marianne Winslett, University of Illinois at Urbana-Champaign

2005

Cache-conscious Frequent Pattern Mining on a Modern Processor

Amol Ghoting, Ohio State University; et al.

Gregory Buehrer, Ohio State University
Srinivasan Parthasarathy, Ohio State University
Daehyun Kim, Intel
Anthony D. Nguyen, Intel
Yen-Kuang Chen, Intel
Pradeep Dubey, Intel

2004

Model-Driven Data Acquisition in Sensor Networks

Amol Deshpande, University of California Berkeley; et al.

Carlos Guestrin, Intel Research
Samuel R. Madden, Massachusetts Institute of Technology
Joseph M. Hellerstein, University of California Berkeley
Wei Hong, Intel Research

2001

Weaving Relations for Cache Performance

Anastassia Ailamaki, Carnegie Mellon University; et al.

David J. DeWitt, University of Wisconsin
Mark D. Hill, University of Wisconsin
Marios Skounakis, University of Wisconsin

1997

Integrating Reliable Memory in Databases

Wee Teck Ng & Peter M. Chen, University of Michigan

WWW (World Wide Web)

2012

Counting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the Standard

Marcelo Arenas, Pontificia Universidad Católica de Chile; et al.

Sebastián Conca, Pontificia Universidad Católica de Chile
Jorge Pérez, Universidad de Chile

2011

Towards a theory model for product search

Beibei Li, New York University; et al.

Anindya Ghose, New York University
Panagiotis G. Ipeirotis, New York University

2010

Factorizing personalized Markov chains for next-basket recommendation

Steffen Rendle, Osaka University; et al.

Christoph Freudenthaler, University of Hildesheim
Lars Schmidt-Thieme, University of Hildesheim

2009

Hybrid keyword search auctions

Ashish Goel, Stanford University
Kamesh Munagala, Duke University

2008

IRLbot: Scaling to 6 billion pages and beyond

Hsin-Tsang Lee, Texas A&M University; et al.

Derek Leonard, Texas A&M University
Xiaoming Wang, Texas A&M University
Dmitri Loguinov, Texas A&M University

2007

Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganogra...

Lars Backstrom, Cornell University; et al.

Cynthia Dwork, Microsoft Research
Jon Kleinberg, Cornell University

2006

Random Sampling from a Search Engine's Index

Ziv Bar-Yossef & Maxim Gurevich, Technion

2005

Three-level caching for efficient query processing in large Web search engines

Xiaohui Long & Torsten Suel, Polytechnic Institute of New York University

2004

Automatic detection of fragments in dynamically generated web pages

Lakshmish Ramaswamy, Georgia Institute of Technology; et al.

Arun Iyengar, IBM Research
Ling Liu, Georgia Institute of Technology
Fred Douglis, IBM Research

2003

Scaling personalized web search

Glen Jeh & Jennifer Widom, Stanford University

SemTag and seeker: bootstrapping the semantic web via automated semantic annotation

Stephen Dill, IBM Research; et al.

Nadav Eiron, IBM Research
David Gibson, IBM Research
Daniel Gruhl, IBM Research
R. Guha, IBM Research
Anant Jhingran, IBM Research
Tapas Kanungo, IBM Research
Sridhar Rajagopalan, IBM Research
Andrew Tomkins, IBM Research
John A. Tomlin, IBM Research
Jason Y. Zien, IBM Research

2002

Abstracting application-level web security

David Scott & Richard Sharp, University of Cambridge

2001

Engineering Server Driven Consistency for Large Scale Dynamic Web Services

Jian Yin, University of Texas at Austin; et al.

Lorenzo Alvisi, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Arun Iyengar, IBM Research

2000

Graph Structure in the Web

Andrei Broder, AltaVista; et al.

Ravi Kumar, IBM Research
Farzin Maghoul, AltaVista
Prabhakar Raghavan, IBM Research
Sridhar Rajagopalan, IBM Research
Raymie Stata, Compaq Systems Research Center
Andrew Tomkins, IBM Research
Janet Wiener, Compaq Systems Research Center

1999

Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery

Soumen Chakrabarti, Indian Institute of Technology; et al.

Martin van den Berg, FX Palo Alto Lab
Byron Dom, IBM Research

1998

The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/video

Kevin C. Almeroth, University of California Santa Barbara
Mostafa H. Ammar, Georgia Institute of Technology

 

Institutions with Best Papers

Microsoft Research

26.2

Carnegie Mellon University

22.5

Stanford University

22.0

Massachusetts Institute of Technology

20.6

University of Washington

20.3

University of California Berkeley

17.3

University of Toronto

13.3

Cornell University

10.9

University of Illinois at Urbana-Champaign

9.9

University of Texas at Austin

9.4

University of British Columbia

8.8

IBM Research

8.4

University of Oxford

6.2

Georgia Institute of Technology

6.0

University of California Irvine

5.9

Google

5.7

Princeton University

5.6

University of Massachusetts Amherst

5.2

AT&T Laboratories

4.9

University of Maryland

4.8

Yahoo! Research

4.8

Weizmann Institute of Science

4.5

McGill University

4.4

University of California San Diego

4.1

University of Michigan

4.0

École Polytechnique Fédérale de Lausanne

3.9

Technion

3.8

Rice University

3.5

Brown University

3.3

Bell Labs

3.3

University of Nottingham

3.3

Université Paris-Sud

3.1

Columbia University

3.1

National University of Singapore

3.0

DePaul University

3.0

University of Alberta

3.0

Hewlett-Packard Labs

3.0

University of Wisconsin

2.8

ETH Zurich

2.8

University of North Carolina at Chapel Hill

2.8

NEC Labs America

2.7

University of Nebraska-Lincoln

2.6

Max Planck Institut

2.6

University of Cambridge

2.6

Ohio State University

2.4

University of Waterloo

2.4

Duke University

2.3

Toyota Technological Institute at Chicago

2.3

University of Pennsylvania

2.3

Aarhus University

2.3

Tel-Aviv University

2.2

Saarland University

2.1

Polytechnic Institute of New York University

2.0

University College London

2.0

Universidade Técnica de Lisboa

2.0

Indiana University at Bloomington

2.0

BBN Technologies

2.0

NASA Ames Research Center

2.0

Credit is given in decreasingauthor order as customary in many fields. First authors are given 1 point,second authors are given 0.5 points, third authors are given 0.33 points, etc.These points are then divided by the sum of points for that paper, i.e.normalizing it. This ranking may be inaccurate or incomplete, may not reflectthe current state of best paper awards, and is not an official list. If you arenot satisfied with the ranking listed here, please disregard it.

  • 1
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
提供的源码资源涵盖了小程序应用等多个领域,每个领域都包含了丰富的实例和项目。这些源码都是基于各自平台的最新技术和标准编写,确保了在对应环境下能够无缝运行。同时,源码中配备了详细的注释和文档,帮助用户快速理解代码结构和实现逻辑。 适用人群: 适合毕业设计、课程设计作业。这些源码资源特别适合大学生群体。无论你是计算机相关专业的学生,还是对其他领域编程感兴趣的学生,这些资源都能为你提供宝贵的学习和实践机会。通过学习和运行这些源码,你可以掌握各平台开发的基础知识,提升编程能力和项目实战经验。 使用场景及目标: 在学习阶段,你可以利用这些源码资源进行课程实践、课外项目或毕业设计。通过分析和运行源码,你将深入了解各平台开发的技术细节和最佳实践,逐步培养起自己的项目开发和问题解决能力。此外,在求职或创业过程中,具备跨平台开发能力的大学生将更具竞争力。 其他说明: 为了确保源码资源的可运行性和易用性,特别注意了以下几点:首先,每份源码都提供了详细的运行环境和依赖说明,确保用户能够轻松搭建起开发环境;其次,源码中的注释和文档都非常完善,方便用户快速上手和理解代码;最后,我会定期更新这些源码资源,以适应各平台技术的最新发展和市场需求。 所有源码均经过严格测试,可以直接运行,可以放心下载使用。有任何使用问题欢迎随时与博主沟通,第一时间进行解答!

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值