计算机顶级会议的历年最佳文章 (1996-2013)

 本人博客地址:http://blog.csdn.net/wanrenwangxuejing

Best Paper Awards in Computer Science (since 1996)

By Conference:   AAAI   ACL   CHI   CIKM   CVPR   FOCS   FSE   ICCV   ICML   ICSE   IJCAI   INFOCOM   KDD   MOBICOM   NSDI   OSDI   PLDI   PODS   S&P   SIGCOMM   SIGIR  SIGMETRICS   SIGMOD   SODA   SOSP   STOC   UIST   VLDB   WWW

Institutions with the most Best Papers

Much of this data was entered by hand (obtained by contacting past conference organizers, retrieving cached conference websites, and searching CVs) so please email me if you notice any errors or omissions: bestpaper-AT-jeffhuang.com. I tried to collect best paper awards from the top-tier conferences in each area, but some conferences do not have such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award" and "outstanding paper award" are included but not "best student paper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL).

There is a visualization for filtering these papers by institution, year, and conference (thanks to David Karger)


AAAI (Artificial Intelligence)
2013HC-Search: Learning Heuristics and Cost Functions for Structured PredictionJanardhan Rao Doppa, Oregon State University; et al.
SMILe: Shuffled Multiple-Instance LearningGary Doran & Soumya Ray, Case Western Reserve University
2012Learning SVM Classifiers with Indefinite KernelsSuicheng Gu & Yuhong Guo, Temple University
Document Summarization Based on Data ReconstructionZhanying He, Zhejiang University; et al.
2011Dynamic Resource Allocation in Conservation PlanningDaniel Golovin, California Institute of Technology; et al.
Complexity of and Algorithms for Borda ManipulationJessica Davies, University of Toronto; et al.
2010How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Ans...Giorgos Stoilos, Oxford University; et al.
A Novel Transition Based Encoding Scheme for Planning as SatisfiabilityRuoyun Huang, Washington University in St. Louis; et al.
2008How Good is Almost Perfect?Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg
Optimal False-Name-Proof Voting Rules with Costly VotingLiad Wagman & Vincent Conitzer, Duke University
2007PLOW: A Collaborative Task Learning AgentJames Allen, Institute for Human and Machine Cognition; et al.
Thresholded Rewards: Acting Optimally in Timed, Zero-Sum GamesColin McMillen & Manuela Veloso, Carnegie Mellon University
2006Model Counting: A New Strategy for Obtaining Good BoundsCarla P. Gomes, Cornell University; et al.
Towards an Axiom System for Default LogicGerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto
2005The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic SelectionVincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University
2004Learning and Inferring Transportation RoutinesLin Liao, University of Washington; et al.
2002On Computing All Abductive ExplanationsThomas Eiter, Technische Universität Wien
Kazuhisa Makino, Osaka University
2000The Game of Hex: An Automatic Theorem-Proving Approach to Game ProgrammingVadim V. Anshelevich, Vanshel Consulting
1999PROVERB: The Probabilistic CruciverbalistGreg A. Keim, Duke University; et al.
1998Learning Evaluation Functions for Global Optimization and Boolean SatisfiabilityJustin A. Boyan & Andrew W. Moore, Carnegie Mellon University
Acceleration Methods for Numeric CSPsYahia Lebbah & Olivier Lhomme, Ecole des Mines de Nantes
The Interactive Museum Tour-Guide RobotWolfram Burgard, University of Bonn; et al.
1997Statistical Parsing with a Context-Free Grammar and Word StatisticsEugene Charniak, Brown University
A Practical Algorithm for Finding Optimal TriangulationsKrill Shoikhet & Dan Geiger, Technion
Fast Context Switching in Real-Time Propositional ReasoningP. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center
Building Concept Representations from Reusable ComponentsPeter Clark, Boeing
Bruce Porter, University of Texas at Austin
1996Verification of Knowledge Bases Based on Containment CheckingAlon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, Université Paris-Sud
A Novel Application of Theory Refinement to Student ModelingPaul T. Baffes, SciComp
Raymond J. Mooney, University of Texas at Austin
Pushing the Envelope: Planning, Propositional Logic, and Stochastic SearchHenry Kautz & Bart Selman, AT&T Laboratories
ACL (Natural Language Processing)
2013Grounded Language Learning from Video Described with SentencesHaonan Yu & Jeffrey Mark Siskind, Purdue University
2012String Re-writing KernelFan Bu, Tsinghua University; et al.
Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic ParsingHiroyuki Shindo, NTT Communication Science Laboratories; et al.
2011Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based ProjectionsDipanjan Das, Carnegie Mellon University
Slav Petrov, Google
2010Beyond NomBank: A Study of Implicit Arguments for Nominal PredicatesMatthew Gerber & Joyce Y. Chai, Michigan State University
2009Reinforcement Learning for Mapping Instructions to ActionsS.R.K. Branavan, Massachusetts Institute of Technology; et al.
K-Best A* ParsingAdam Pauls & Dan Klein, University of California Berkeley
Concise Integer Linear Programming Formulations for Dependency ParsingAndré F.T. Martins, Instituto de Telecomunicações; et al.
2008Forest Reranking: Discriminative Parsing with Non-Local FeaturesLiang Huang, University of Pennsylvania
A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language ModelLibin Shen, BBN Technologies; et al.
2007Learning synchronous grammars for semantic parsing with lambda calculusYuk Wah Wong & Raymond J. Mooney, University of Texas at Austin
2006Semantic taxonomy induction from heterogenous evidenceRion Snow, Stanford University; et al.
2005A Hierarchical Phrase-Based Model for Statistical Machine TranslationDavid Chiang, University of Maryland
2004Finding Predominant Word Senses in Untagged TextDiana McCarthy, University of Sussex; et al.
2003Accurate Unlexicalized ParsingDan Klein & Christopher D. Manning, Stanford University
Towards a Model of Face-to-Face GroundingYukiko I. Nakano, RISTEX; et al.
2002Discriminative Training and Maximum Entropy Models for Statistical Machine TranslationFranz Josef Och & Hermann Ney, RWTH Aachen University
2001Immediate-Head Parsing for Language ModelsEugene Charniak, Brown University
Fast Decoding and Optimal Decoding for Machine TranslationUlrich Germann, University of Southern California; et al.
CHI (Human-Computer Interaction)
2014Growing Closer on Facebook: Changes in Tie Strength Through Social Network Site UseMoira Burke, Facebook
Robert Kraut, Carnegie Mellon University
Duet: Exploring Joint Interactions on a Smart Phone and a Smart WatchXiang Anthony Chen, Carnegie Mellon University; et al.
RetroDepth: 3D Silhouette Sensing for High-Precision Input On and Above Physical SurfacesDavid Kim, Microsoft Research; et al.
Estimating the Social Costs of FriendsourcingJeffrey Rzeszotarski & Meredith Morris, Microsoft Research
Human Values in Curating a Human Rights Media ArchiveAbigail Durrant, Newcastle University; et al.
Effects of Display Size and Navigation Type on a Classification TaskCan Liu, Université Paris-Sud; et al.
Towards Accurate and Practical Predictive Models of Active-Vision-Based Visual SearchDavid Kieras, University of Michigan
Anthony Hornof, University of Oregon
Real-time Feedback for Improving Medication TakingMatthew Lee, Philips Research
Anind Dey, Carnegie Mellon University
Making Sustainability Sustainable: Challenges in the Design of Eco-Interaction TechnologiesRayoung Yang, University of Michigan; et al.
Consumed Endurance: A Metric to Quantify Arm Fatigue of Mid-Air InteractionsAnders Markussen, University of Copenhagen; et al.
Type-Hover-Swipe in 96 Bytes: A Motion Sensing Mechanical KeyboardStuart A Taylor, Microsoft Research; et al.
Structured Labeling for Facilitating Concept Evolution in Machine LearningTodd Kulesza, Oregon State University; et al.
Emerging Sites of HCI Innovation: Hackerspaces, Hardware Startups & IncubatorsSilvia Lindtner, University of California Irvine; et al.
MixFab: a Mixed-Reality Environment for Personal FabricationChristian Weichel, Lancaster University; et al.
Designing for Slowness, Anticipation and Re-visitation: A Long Term Field Study of the PhotoboxWilliam Odom, Carnegie Mellon University; et al.
What is "Critical" About Critical Design?Jeffrey Bardzell & Shaowen Bardzell, Indiana University at Bloomington
SPRWeb: Preserving Subjective Responses to Website Colour Schemes through Automatic RecolouringDavid R. Flatla, University of Saskatchewan; et al.
LaserOrigami: Laser-Cutting 3D ObjectsStefanie Mueller, Hasso Plattner Institute; et al.
Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI ResearchEric B. Hekler, Arizona State University; et al.
Screenfinity: Extending the Perception Area of Content on Very Large Public DisplaysConstantin Schmidt, Technische Universität Berlin; et al.
Reasons to Question Seven Segment DisplaysHarold Thimbleby, Swansea University
Improving Navigation-Based File RetrievalStephen Fitchett, University of Canterbury; et al.
The Dubuque Electricity Portal: Evaluation of a City-Scale Residential Electricity Consumption Fee...Tom Erickson, IBM Research; et al.
At Home with Agents: Exploring Attitudes Towards Future Smart Energy InfrastructuresTom Rodden, University of Nottingham; et al.
Job Opportunities through Entertainment: Virally Spread Speech-Based Services for Low-Literate UsersAgha Ali Raza, Carnegie Mellon University; et al.
IllumiRoom: Peripheral Projected Illusions for Interactive ExperiencesBrett Jones, University of Illinois at Urbana-Champaign; et al.
The Efficacy of Human Post-Editing for Language TranslationSpence Green, Stanford University; et al.
Analyzing User-Generated YouTube Videos to Understand Touchscreen Use by People with Motor Impairm...Lisa Anthony, University of Maryland Baltimore County; et al.
Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical TurkLilly Irani, University of California Irvine
M. Six Silberman, Bureau of Economic Interpretation
Webzeitgeist: Design Mining the WebRanjitha Kumar, Stanford University; et al.
Weighted Graph Comparison Techniques for Brain Connectivity AnalysisBasak Alper, University of California Santa Barbara; et al.
The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Arc...Xuan Zhao, Cornell University; et al.
2012Uncomfortable InteractionsSteve Benford, University of Nottingham; et al.
ClayVision: The (Elastic) Image of the CityYuichiro Takeuchi, Sony Computer Science Laboratories
Ken Perlin, New York University
Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCIYlva Fernaeus, KTH Royal Institute of Technology; et al.
Personas and Decision Making in the Design Process: An Ethnographic Case StudyErin Friess, University of North Texas
Detecting Error-Related Negativity for Interaction DesignChi Vi & Sriram Subramanian, University of Bristol
Observational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobil...Niels Henze, University of Oldenburg; et al.
Looking Glass: A Field Study on Noticing Interactivity of Shop WindowsJörg Müller, Technische Universität Berlin; et al.
Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday ObjectsMunehiko Sato, Disney Research; et al.
Affordances in HCI: Toward a Mediated Action PerspectiveVictor Kaptelinin, University of Bergen
Bonnie Nardi, University of California Irvine
Using Rhythmic Patterns as an Input MethodEmilien Ghomi, Université Paris-Sud; et al.
The Normal Natural Troubles of Driving with GPSBarry Brown, Stockholm University
Eric Laurier, University of Edinburgh
Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical KiosksKurtis Heimerl, University of California Berkeley; et al.
Improving Command Selection with CommandMapsJoey Scarr, University of Canterbury; et al.
Empathy, Participatory Design and People with DementiaStephen Lindsay, Newcastle University; et al.
2011Usable Gestures for Blind People: Understanding Preference and PerformanceShaun K. Kane, University of Washington; et al.
Effects of Community Size and Contact Rate in Synchronous Social Q&ARyen W. White, Microsoft Research; et al.
Teenagers and Their Virtual Possessions: Design Opportunities and IssuesWilliam Odom, Carnegie Mellon University; et al.
Enhancing Physicality in Touch Interaction with Programmable FrictionVincent Levesque, University of British Columbia; et al.
Mid-air Pan-and-Zoom on Wall-sized DisplaysMathieu Nancel, Université Paris-Sud; et al.
Bricolage: Example-Based Retargeting for Web DesignRanjitha Kumar, Stanford University; et al.
Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual E...Thomas Erickson, IBM Research; et al.
In the Shadow of Misperception: Assistive Technology Use and Social InteractionsKristen Shinohara & Jacob O. Wobbrock, University of Washington
Why is My Internet Slow?: Making Network Speeds VisibleMarshini Chetty, Georgia Institute of Technology; et al.
Ease of Juggling: Studying the Effects of Manual MultitaskingAntti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University
Automics: souvenir generating photoware for theme parksAbigail Durrant, University of Nottingham; et al.
Your Noise is My Command: Sensing Gestures Using the Body as an AntennaGabe Cohn, University of Washington; et al.
Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Wor...Koji Yatani, University of Toronto; et al.
2010Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber BundlesPatrick Baudisch, Hasso Plattner Institute; et al.
Mapping the Landscape of Sustainable HCICarl DiSalvo, Georgia Institute of Technology; et al.
Occlusion-Aware InterfacesDaniel Vogel & Ravin Balakrishnan, University of Toronto
Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural IndiaNeil Patel, Stanford University; et al.
How does search behavior change as search becomes more difficult?Anne Aula, Google; et al.
The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Co...Brent Hecht & Darren Gergle, Northwestern University
Skinput: Appropriating the Body as an Input SurfaceChris Harrison, Carnegie Mellon University; et al.
Mobile-izing Health Workers in Rural IndiaDivya Ramachandran, University of California Berkeley; et al.
The Design of Eco-Feedback TechnologyJon Froehlich, University of Washington; et al.
Feminist HCI: Taking Stock and Outlining an Agenda for DesignShaowen Bardzell, Indiana University at Bloomington
Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface StructureMorgan Dixon & James Fogarty, University of Washington
Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of ChartsScott Bateman, University of Saskatchewan; et al.
2009From Interaction to Trajectories: Designing Coherent Journeys Through User ExperiencesSteve Benford, University of Nottingham; et al.
Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Ser...Jeffrey Heer, Stanford University; et al.
Predicting Tie Strength With Social MediaEric Gilbert & Karrie Karahalios, University of Illinois at Urbana-Champaign
Musink: Composing Music through Augmented DrawingTheophanis Tsandilas, Université Paris-Sud; et al.
Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector ExhibitsScott S. Snibbe, Sona Research
Hayes S. Raffle, Massachusetts Institute of Technology
Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection PerformanceLeah Findlater, University of British Columbia; et al.
Undo and Erase Events as Indicators of Usability ProblemsDavid Akers, Stanford University; et al.
2008In-Car GPS Navigation: Engagement with and Disengagement from the EnvironmentGilly Leshed, Cornell University; et al.
Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Inte...Krzysztof Z. Gajos, University of Washington; et al.
Large Scale Analysis of Web Revisitation PatternsEytan Adar, University of Washington; et al.
Designs on Dignity: Perceptions of Technology Among the HomelessChristopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology
The Network in the Garden: An Empirical Analysis of Social Media in Rural LifeEric Gilbert, University of Illinois at Urbana-Champaign; et al.
Multimodal collaborative handwriting training for visually-impaired peopleBeryl Plimmer, University of Auckland; et al.
An Error Model for Pointing Based on Fitts' LawJacob O. Wobbrock, University of Washington; et al.
2007Multiview: improving trust in group video conferencing through spatial faithfulnessDavid T. Nguyen & John Canny, University of California Berkeley
Software or wetware?: discovering when and why people use digital prosthetic memoryVaiva Kalnikaité & Steve Whittaker, University of Sheffield
Shift: a technique for operating pen-based interfaces using touchDaniel Vogel, University of Toronto
Patrick Baudisch, Microsoft Research
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognit...Björn Hartmann, Stanford University; et al.
Sustainable interaction design: invention & disposal, renewal & reuseEli Blevis, Indiana University at Bloomington
Consuming video on Mobile devicesKenton O'Hara, Hewlett-Packard Labs; et al.
2006Trackball text entry for people with motor impairmentsJacob O. Wobbrock & Brad Myers, Carnegie Mellon University
Embedded phenomena: supporting science learning with classroom-sized distributed simulationsTom Moher, University of Illinois at Chicago
A role for haptics in mobile interaction: initial design using a handheld tactile display prototypeJoseph Luk, University of British Columbia; et al.
2005Making space for stories: ambiguity in the design of personal communication systemsPaul M. Aoki, Palo Alto Research Center
Allison Woodruff, Intel Research
Examining Task Engagement in Sensor-Based Statistical Models of Human InterruptibilityJames Fogarty, Carnegie Mellon University; et al.
Designing the spectator experienceStuart Reeves, University of Nottingham; et al.
The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation areaTovi Grossman & Ravin Balakrishnan, University of Toronto
CIKM (Knowledge Management)
2013Penguins in Sweaters, or Serendipitous Entity Search on User-generated ContentIlaria Bordino, Yahoo! Research; et al.
2012Gelling, and Melting, Large Graphs by Edge ManipulationHanghang Tong, IBM Research; et al.
2011Intent-aware query similarityJiafeng Guo, Chinese Academy of Sciences; et al.
2010MENTA: Inducing Multilingual Taxonomies from WikipediaGerard de Melo & Gerhard Weikum, Max Planck Institut
FACeTOR: cost-driven exploration of faceted query resultsAbhijith Kashyap, State University of New York at Buffalo; et al.
2009On the Feasibility of Multi-Site Web Search EnginesRicardo Baeza-Yates, Yahoo! Research; et al.
2008Learning to Link with WikipediaDavid Milne & Ian H. Witten, University of Waikato
2007Autonomously Semantifying WikipediaFei Wu & Daniel S. Weld, University of Washington
2006Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing IndicesSegabtian Michel, Max Planck Institut; et al.
2005Towards Automatic Association of Relevant Unstructured Content with Structured Query ResultsPrasan Roy, IBM Research; et al.
2004Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XMLQiankun Zhao, Nanyang Technological University; et al.
CVPR (Computer Vision)
2013Fast, Accurate Detection of 100,000 Object Classes on a Single MachineThomas Dean, Google; et al.
2012A Simple Prior-free Method for Non-Rigid Structure-from-Motion FactorizationYuchao Dai, Northwestern Polytechnical University; et al.
2011Real-time Human Pose Recognition in Parts from Single Depth ImagesJamie Shotton, Microsoft Research; et al.
2010Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data usi...Anders Eriksson & Anton va den Hendel, University of Adelaide
2009Single Image Haze Removal Using Dark Channel PriorKaiming He, The Chinese University of Hong Kong; et al.
2008Global Stereo Reconstruction under Second Order Smoothness PriorsOliver Woodford, University of Oxford; et al.
Beyond Sliding Windows: Object Localization by Efficient Subwindow SearchChistoph H. Lampert, Max Planck Institut; et al.
2007Dynamic 3D Scene Analysis from a Moving VehicleBastian Leibe, ETH Zurich; et al.
2006Putting Objects in PerspectiveDerek Hoiem, Carnegie Mellon University; et al.
2005Real-Time Non-Rigid Surface DetectionJulien Pilet, École Polytechnique Fédérale de Lausanne; et al.
2004Programmable Imaging using a Digital Micromirror ArrayShree K. Nayar, Columbia University; et al.
2003Object Class Recognition by Unsupervised Scale-Invariant LearningRob Fergus, University of Oxford; et al.
2001Morphable 3D models from videoMatthew Brand, Mitsubishi Electric Research Laboratories
2000Real-Time Tracking of Non-Rigid Objects using Mean ShiftDorin Comaniciu, Siemens Corporate Research; et al.
FOCS (Theory)
2013Navigating Central Path with Electrical Flows: from Flows to Matchings, and BackAleksander Mądry, École Polytechnique Fédérale de Lausanne
2012A multi-prover interactive proof for NEXP sound against entangled proversTsuyoshi Ito, NEC Labs America
Thomas Vidick, Massachusetts Institute of Technology
A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2Julia Chuzhoy, Toyota Technological Institute at Chicago
Shi Li, Princeton University
2011A Randomized Rounding Approach to the Traveling Salesman ProblemShayan Oveis Gharan, Stanford University; et al.
A Polylogarithmic-Competitive Algorithm for the k-Server ProblemNikhil Bansal, IBM Research; et al.
Approximating Graphic TSP by MatchingsTobia M¨o;mke & Ola Svensson, Royal Institute of Technology
2010Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke DecompositionsMatthew Andrews, Bell Labs
Subexponential Algorithms for Unique Games and Related ProblemsSanjeev Arora, Princeton University; et al.
Computational Transition at the Uniqueness ThresholdAllan Sly, Microsoft Research
2008Two Query PCP with Sub-Constant ErrorDana Moshkovitz & Ran Raz, Weizmann Institute of Science
2007Space-Efficient Identity Based Encryption Without PairingsDan Boneh, Stanford University; et al.
2006Settling the Complexity of 2-Player Nash EquilibriumXi Chen, Tsinghua University
Xiaotie Deng, City University of Hong Kong
2005The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type M...Subhash A. Khot, Georgia Institute of Technology
Nisheeth K. Vishnoi, IBM Research
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial TimeFarzad Parvaresh & Alexander Vardy, University of California San Diego
2004Cryptography in NC0Benny Applebaum, Technion; et al.
Hardness of Approximating the Shortest Vector Problem in LatticesSubhash Khot, Georgia Institute of Technology
2003On the Impossibility of Dimension Reduction in L1Bo Brinkman & Moses Charikar, Princeton University
2002A Dichotomy Theorem for Constraints on a Three-Element SetAndrei A. Bulatov, University of Oxford
Minimizing Congestion in General NetworksHarald Räcke, Paderborn University
Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String ModelBoaz Barak, Weizmann Institute of Science
FSE (Software Engineering)
2012Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software LibrariesBradley Cossette & Robert Walker, University of Calgary
Scalable Test Data Generation from Multidimensional ModelsEmina Torlak, University of California Berkeley
Assessing the Value of Branches with What-if AnalysisChristian Bird & Thomas Zimmermann, Microsoft Research
2011Proactive Detection of Collaboration ConflictsYuriy Brun, University of Washington; et al.
How Do Fixes Become Bugs?Zuoning Yin, University of Illinois at Urbana-Champaign; et al.
Proving programs robustSwarat Chaudhuri, Rice University; et al.
2010Creating and evolving developer documentation: understanding the decisions of open source contribu...Barthélémy Dagenais & Martin P. Robillard, McGill University
Developer Fluency: Achieving True Mastery in Software ProjectsMinghui Zhou, Peking University
Audris Mockus, Avaya Labs
Staged Concurrent Program AnalysisNishant Sinha & Chao Wang, NEC Labs America
2009Asserting and checking determinism for multithreaded programsJacob Burnim & Koushik Sen, University of California Berkeley
Darwin: an approach for debugging evolving programsDawei Qi, National University of Singapore; et al.
Graph-based Mining of Multiple Object Usage PatternsTung Thanh Nguyen, Iowa State University; et al.
2008What makes a good bug report?Nicolas Bettenburg, Saarland University; et al.
Efficient online monitoring of web-service SLAsFranco Raimondi, University College London; et al.
2007Automatic consistency assessment for query results in dynamic environmentsJamie Payton, University of North Carolina at Charlotte; et al.
Globally distributed software development project performance: an empirical analysisNarayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University
Mining specifications of malicious behaviorMihai Christodorescu, University of Wisconsin; et al.
Object and reference immutability using Java genericsYoav Zibin, Massachusetts Institute of Technology; et al.
2006Controlling factors in evaluating path-sensitive error detection techniquesMatthew B. Dwyer, University of Nebraska-Lincoln; et al.
SYNERGY: a new algorithm for property checkingBhargav S. Gulavani, Indian Institute of Technology; et al.
2005Automatic Generation of Suggestions for Program InvestigationMartin P. Robillard, McGill University
CUTE: a concolic unit testing engine for CKoushik Sen, University of Illinois at Urbana-Champaign; et al.
Context- and path-sensitive memory leak detectionYichen Xie & Alex Aiken, Stanford University
2004Reasoning about partial goal satisfaction for requirements and design engineeringEmmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain
A classification system and analysis for aspect-oriented programsMartin Rinard, Massachusetts Institute of Technology; et al.
2003<a href="http://scholar.google.com/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=Eliminating+redundancies+with+a+" composition+with+adaptation"+meta-programming+technique&as_oq="&as_eq=&as_occt=any&as_sauthors=Jarzabek"" style="text-decoration: none;">Eliminating redundancies with a "composition with adaptation" meta-programming techniqueStan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong University
A Family of Test Adequacy Criteria for Database-Driven ApplicationsGregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh
Predicting problems caused by component upgradesStephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology
2002Isolating Cause-Effect Chains from Computer ProgramsAndreas Zeller, Saarland University
ICCV (Computer Vision)
2013From Large Scale Image Categorization to Entry-Level CategoriesVicente Ordonez, University of North Carolina at Chapel Hill; et al.
2011Relative AttributesDevi Parikh, Toyota Technological Institute at Chicago
Kristen Grauman, University of Texas at Austin
2009Discriminative models for multi-class object layoutChaitanya Desai, University of California Irvine; et al.
2007Population Shape Regression From Random Design DataBradley Davis, University of North Carolina at Chapel Hill; et al.
2005Globally Optimal Estimates for Geometric Reconstruction ProblemsFredrik Kahl, Lund University
Didier Henrion, LAAS-CNRS
2003Detecting Pedestrians using Patterns of Motion and AppearancePaul Viola, Microsoft Research; et al.
Image Parsing: Unifying Segmentation, Detection and RecognitionZhuowen Tu, University of California Los Angeles; et al.
Image-based Rendering using Image-based PriorsAndrew Fitzgibbon, University of Oxford; et al.
2001Probabilistic Tracking with Exemplars in a Metric SpaceKentaro Toyama & Andrew Blake, Microsoft Research
The Space of All Stereo ImagesSteven Seitz, University of Washington
1999Euclidean Reconstruction and Reprojection up to SubgroupsYi Ma, University of California Berkeley; et al.
A Theory of Shape by Space CarvingKiriakos Kutulakos, University of Rochester
Steven Seitz, Carnegie Mellon University
1998Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Paramet...Marc Pollefeys, Katholieke Universiteit Leuven; et al.
The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image SequencesPhil Torr, Microsoft Research; et al.
ICML (Machine Learning)
2013Vanishing Component AnalysisRoi Livni, The Hebrew University of Jerusalum; et al.
Fast Semidifferential-based Submodular Function OptimizationRishabh Iyer, University of Washington; et al.
2012Bayesian Posterior Sampling via Stochastic Gradient Fisher ScoringSungjin Ahn, University of California Irvine; et al.
2011Computational Rationalization: The Inverse Equilibrium ProblemKevin Waugh, Carnegie Mellon University; et al.
2010Hilbert Space Embeddings of Hidden Markov ModelsLe Song, Carnegie Mellon University; et al.
2009Structure preserving embeddingBlake Shaw & Tony Jebara, Columbia University
2008SVM Optimization: Inverse Dependence on Training Set SizeShai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago
2007Information-theoretic metric learningJason V. Davis, University of Texas at Austin; et al.
2006Trading convexity for scalabilityRonan Collobert, NEC Labs America; et al.
2005A support vector method for multivariate performance measuresThorsten Joachims, Cornell University
1999Least-Squares Temporal Difference LearningJustin A. Boyan, NASA Ames Research Center
ICSE (Software Engineering)
2013Dual Ecological Measures of Focus in Software DevelopmentDaryl Posnett, University of California Davis; et al.
Data Clone Detection and Visualization in SpreadsheetsFelienne Hermans, Delft University of Technology; et al.
UML in PracticeMarian Petre, Open University
Automatic patch generation learned from human-written patchesDongsun Kim, Hong Kong University of Science and Technology; et al.
Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop CloudsWeiyi Shang, Queen's University; et al.
Interaction-Based Test-Suite MinimizationDale Blue, IBM; et al.
2012Understanding Integer Overflow in C/C++Will Dietz, University of Illinois at Urbana-Champaign; et al.
Using Dynamic Analysis to Discover Polynomial and Array InvariantsThanhVu Nguyen, University of New Mexico; et al.
Amplifying Tests to Validate Exception Handling CodePingyu Zhang & Sebastian Elbaum, University of Nebraska-Lincoln
Partial Models: Towards Modeling and Reasoning with UncertaintyMichalis Famelis, University of Toronto; et al.
How Do Professional Developers Comprehend Software?Tobias Roehm, Technische Universität München; et al.
A Tactic-Centric Approach for Automating Traceability of Quality ConcernsMehdi Mirakhorli, DePaul University; et al.
Automated Detection of Client-State Manipulation VulnerabilitiesAnders Møller & Mathias Schwarz, Aarhus University
2011Verifying Multi-threaded Software using SMT-based Context-Bounded Model CheckingLucas Cordeiro & Bernd Fischer, University of Southampton
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and ...Narayan Ramasubbu, Singapore Management University; et al.
Programs, tests, and oracles: the foundations of testing revisitedMatt Staats, University of Minnesota; et al.
On-demand Feature Recommendations Derived from Mining Public Product DescriptionsHoratiu Dumitru, DePaul University; et al.
Run-Time Efficient Probabilistic Model CheckingAntonio Filieri, Politecnico di Milano; et al.
2010A Machine Learning Approach for Tracing Regulatory Codes to Product Specific RequirementsJane Cleland-Huang, DePaul University; et al.
Collaborative Reliability Prediction of Service-Oriented SystemsZibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong
A Cut-off Approach for Bounded Verification of Parameterized SystemsQiusong Yang & Mingshu Li, Chinese Academy of Sciences
Test Generation through Programming in UDITAMilos Gligoric, University of Illinois at Urbana-Champaign; et al.
A Degree-of-Knowledge Model to Capture Source Code FamiliarityThomas Fritz, University of British Columbia; et al.
2009How We Refactor, and How We Know ItEmerson Murphy-Hill, Portland State University; et al.
Effective Static Deadlock DetectionMayur Naik, Intel Research; et al.
Invariant-Based Automatic Testing of AJAX User InterfacesAli Mesbah & Arie van Deursen, Delft University of Technology
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows VistaChristian Bird, University of California Davis; et al.
Automatically finding patches using genetic programmingWestley Weimer, University of Virginia; et al.
2008Precise memory leak detection for java software using container profilingGuoqing Xu & Atanas Rountev, Ohio State University
Debugging reinvented: asking and answering why and why not questions about program behaviorAndrew J. Ko & Brad A. Myers, Carnegie Mellon University
Recommending adaptive changes for framework evolutionBarthélémy Dagenais & Martin P. Robillard, McGill University
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental ApproachJoseph Ruthruff, University of Nebraska-Lincoln; et al.
The effect of program and model structure on mc/dc test adequacy coverageAjitha Rajan, University of Minnesota; et al.
2007Refactoring for Parameterizing Java ClassesAdam Kiezun, Massachusetts Institute of Technology; et al.
Tracking Code Clones in Evolving SoftwareEkwa Duala-Ekoko & Martin P. Robillard, McGill University
Matching and Merging of Statecharts SpecificationsShiva Nejati, University of Toronto; et al.
Predicting Faults from Cached HistorySunghun Kim, Massachusetts Institute of Technology; et al.
2006Model-Based Development of Dynamically Adaptive SoftwareJi Zhang & Betty H.C. Cheng, Michigan State University
Who Should Fix This Bug?John Anvik, University of British Columbia; et al.
2005Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Pe...Andrew Ko, Carnegie Mellon University; et al.
Is Mutation an Appropriate Tool for Testing Experiments?James Andrews, University of Western Ontario; et al.
Using Structural Context to Recommend Source Code ExamplesReid Holmes & Gail Murphy, University of British Columbia
Data Structure Repair Using Goal-Directed ReasoningBrian Demsky & Martin Rinard, Massachusetts Institute of Technology
2004SNIAFL: Towards a Static Non-Interactive Approach to Feature LocationWei Zhao, Peking University; et al.
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized SystemsRohit Khare & Richard N. Taylor, University of California Irvine
An Empirical Study of Software Reuse vs. Defect-Density and StabilityParastoo Mohagheghi, Ericsson; et al.
A Tool for Writing and Debugging Algebraic SpecificationsJohannes Henkel & Amer Diwan, University of Colorado
Static Checking of Dynamically Generated Queries in Database ApplicationsCarl Gould, University of California Davis; et al.
2003Precise Dynamic Slicing AlgorithmsXiangyu Zhang, University of Arizona; et al.
Modular Verification of Software Components in CSagar Chaki, Carnegie Mellon University; et al.
IJCAI (Artificial Intelligence)
2013Bayesian Optimization in High Dimensions via Random EmbeddingsZiyu Wang, University of British Columbia; et al.
Flexibility and Decoupling in the Simple Temporal ProblemMichel Wilson, Delft University of Technology; et al.
2011Unweighted Coalitional Manipulation Under the Borda Rule is NP-HardNadja Betzler, Technische Universität Berlin; et al.
Nested Rollout Policy Adaptation for Monte Carlo Tree SearchChristopher D. Rosin, Parity Computing
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean SpacesRoman Kontchakov, Birkbeck College London; et al.
2009Consequence-Driven Reasoning for Horn SHIQ OntologiesYevgeny Kazakov, University of Oxford
Learning Conditional Preference Networks with QueriesFrederic Koriche, Université Montpellier II
Bruno Zanuttini, Université de Caen Basse-Normandie
2007Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian NetworksMaleeha Qazi, Siemens Medical Solutions; et al.
Building Structure into Local Search for SATDuc Nghia Pham, Griffith University; et al.
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Pro...Luc Mercier & Pascal Van Hentenryck, Brown University
2005Learning Coordination ClassifiersYuhong Guo, University of Alberta; et al.
Solving CheckersJonathan Schaeffer, University of Alberta; et al.
A Probabilistic Model of Redundancy in Information ExtractionDoug Downey, University of Washington; et al.
2003Approximating Game-Theoretic Optimal Strategies for Full-scale PokerDarse Billings, University of Alberta; et al.
Thin Junction Tree Filters for Simultaneous Localization and MappingMark A. Paskin, University of California Berkeley
2001Complexity Results for Structure-Based CausalityThomas Eiter & Thomas Lukasiewicz, Vienna University of Technology
1999Learning in Natural LanguageDan Roth, University of Illinois at Urbana-Champaign
A Distributed Case-Based Reasoning Application for Engineering Sales SupportIan Watson, University of Salford
Dan Gardingen, Western Air
1997Object Identification in a Bayesian ContextTimothy Huang & Stuart Russell, University of California Berkeley
Translingual Information Retrieval: A Comparative EvaluationJaime G. Carbonell, Carnegie Mellon University; et al.
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolo...Fangzhen Lin, The Hongkong University of Science and Technology
INFOCOM (Networking)
2013On the Steady-State of Cache NetworksElisha J. Rosensweig, University of Massachusetts Amherst; et al.
2012Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying frameworkCarlee Joe-Wong, Princeton University; et al.
2011Dynamic right-sizing for power-proportional data centersMinghong Lin, California Institute of Technology; et al.
2010On the Feasibility and Efficacy of Protection Routing in IP NetworksKin-Wah Kwong, University of Pennsylvania; et al.
2009Queuing Network Models for Multi-Channel P2P Live Streaming SystemsDi Wu, Polytechnic Institute of New York University; et al.
2008On the Feasibility of the Link Abstraction in (Rural) Mesh NetworksDattatraya Gokhal, Indian Navy; et al.
Theoretical Results on Base Station Movement Problem for Sensor NetworksYi Shi & Y. Thomas Hou, Virginia Tech
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless...Changhee Joo, Ohio State University; et al.
2007Disruption free topology reconfiguration in OSPF networksPierre Francois, Université catholique de Louvain; et al.
2006Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global PerspectiveGaurav Sharma, Purdue University; et al.
2005Perfect Simulation and Stationarity of a Class of Mobility ModelsJean-Yves Le Boude, École Polytechnique Fédérale de Lausanne
Milan Vojnović, Microsoft Research
2004Throughput-Delay Trade-Off in Wireless NetworksAbbas El Gamal, Stanford University; et al.
2003User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data NetworksSem Borst, Bell Labs
2002Priority Service and Max-Min FairnessPeter Marbach, University of Toronto
2001Mobility increases the capacity of ad-hoc wireless networksMatthias Grossglauser, AT&T Laboratories
David Tse, University of California Berkeley
2000The Chaotic Nature of TCP Congestion ControlAndrás Veres, Ericsson
Miklós Boda, Ericsson Research
1999Bandwidth Sharing: Objectives and AlgorithmsLaurent Massoulié, Microsoft Research
James Robert, France Telecom
1998Effective Bandwidths in Wireless Networks with Multiuser ReceiversDavid Tse, University of California Berkeley
Stephen Hanly, University of Melbourne
1996An algorithm for multicast tree generation in networks with asymmetric linksRam Ramanathan, BBN Technologies
KDD (Data Mining)
2013Simple and Deterministic Matrix SketchingEdo Liberty, Yahoo! Research
2012Searching and Mining Trillions of Time Series Subsequences under Dynamic Time WarpingThanawin Rakthanmanon, University of California Riverside; et al.
2011Leakage in Data Mining: Formulation, Detection, and AvoidanceShachar Kaufman, Tel-Aviv University; et al.
2010Large linear classification when data cannot fit in memoryHsiang-Fu Yu, National Taiwan University; et al.
Connecting the dots between news articlesDafna Shahaf & Carlos Guestrin, Carnegie Mellon University
2009Collaborative Filtering with Temporal DynamicsYehuda Koren, Yahoo! Research
2008Fastanova: an efficient algorithm for genome-wide association studyXiang Zhang, University of North Carolina at Chapel Hill; et al.
2007Predictive discrete latent factor models for large scale dyadic dataDeepak Agarwal & Srujana Merugu, Yahoo! Research
2006Training linear SVMs in linear timeThorsten Joachims, Cornell University
2005Graphs over time: densification laws, shrinking diameters and possible explanationsJure Leskovec, Carnegie Mellon University; et al.
2004A probabilistic framework for semi-supervised clusteringSugato Basu, University of Texas at Austin; et al.
2003Maximizing the spread of influence through a social networkDavid Kempe, Cornell University; et al.
2002Pattern discovery in sequences under a Markov assumptionDarya Chudova & Padhraic Smyth, University of California Irvine
2001Robust space transformations for distance-based operationsEdwin M. Knorr, University of British Columbia; et al.
2000Hancock: a language for extracting signatures from data streamsCorinna Cortes, AT&T Laboratories; et al.
1999MetaCost: a general method for making classifiers cost-sensitivePedro Domingos, Universidade Técnica de Lisboa
1998Occam's Two Razors: The Sharp and the BluntPedro Domingos, Universidade Técnica de Lisboa
1997Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Di...Foster Provost & Tom Fawcett, NYNEX Science and Technology
MOBICOM (Mobile)
2013Whole-Home Gesture Recognition Using Wireless SignalsQifan Pu, University of Washington; et al.
2012Distinguishing Users with Capacitative Touch CommunicationTam Vu, Rutgers University; et al.
2011Detecting Driver Phone Use Leveraging Car SpeakersJie Yang, Stevens Institute of Technology; et al.
E-MiLi: Energy-Minimizing Idle Listening in Wireless NetworksXinyu Zhang & Kang G. Shin, University of Michigan
2010The κ factor: inferring protocol performance using inter-link reception correlationKannan Srinivasan, Stanford University; et al.
2009CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data PathVivek Shrivastava, University of Wisconsin; et al.
2008Assessment of Urban-Scale Wireless Networks with a Small Number of MeasurementsJoshua Robinson, Rice University; et al.
NSDI (Networking)
2014Software Dataplane VerificationMihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne
2013Embassies: Radically Refactoring the WebJon Howell, Microsoft Research; et al.
A Fault-Tolerant Engineered NetworkVincent Liu, University of Washington; et al.
2012Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingMatei Zaharia, University of California Berkeley; et al.
2011Design, Implementation and Evaluation of Congestion Control for Multipath TCPDamon Wischik, University College London; et al.
ServerSwitch: A Programmable and High Performance Platform for Data Center NetworksGuohan Lu, Microsoft Research; et al.
2010Reverse tracerouteEthan Katz-Bassett, University of Washington; et al.
2009Sora: High Performance Software Radio Using General Purpose Multi-core ProcessorsKun Tan, Microsoft Research; et al.
TrInc: Small Trusted Hardware for Large Distributed SystemsDave Levin, University of Maryland; et al.
2008Remus: High Availability via Asynchronous Virtual Machine ReplicationBrendan Cully, University of British Columbia; et al.
Consensus Routing: The Internet as a Distributed SystemJohn P. John, University of Washington; et al.
2007Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems CodeCharles Killian, University of California San Diego; et al.
2006Experience with an Object Reputation System for Peer-to-Peer FilesharingKevin Walsh & Emin Gün Sirer, Cornell University
Replay Debugging for Distributed ApplicationsDennis Geels, University of California Berkeley; et al.
2005Detecting BGP Configuration Faults with Static AnalysisNick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology
2004Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Netwo...Philip Levis, University of California Berkeley; et al.
OSDI (Operating Systems)
2012Spanner: Google's Globally-Distributed DatabaseJames C. Corbett, Google; et al.
2010Efficient System-Enforced Deterministic ParallelismAmittai Aviram, Yale University; et al.
The Turtles Project: Design and Implementation of Nested VirtualizationMuli Ben-Yehuda, IBM Research; et al.
2008KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems ProgramsCristian Cadar, Stanford University; et al.
Difference Engine: Harnessing Memory Redundancy in Virtual MachinesDiwaker Gupta, University of California San Diego; et al.
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Lan...Yuan Yu, Microsoft Research; et al.
2006Bigtable: A Distributed Storage System for Structured DataFay Chang, Google; et al.
Rethink the SyncEdmund B. Nightingale, University of Michigan; et al.
2004Using Model Checking to Find Serious File System ErrorsJunfeng Yang, Stanford University; et al.
Recovering Device DriversMichael M. Swift, University of Washington; et al.
2002Memory Resource Management in VMware ESX ServerCarl A. Waldspurger, VMware
2000Checking System Rules Using System-Specific, Programmer-Written Compiler ExtensionsDawson Engler, Stanford University; et al.
1999IO-Lite: A Unified I/O Buffering and Caching SystemVivek S. Pai, Rice University; et al.
1996Automatic Compiler-Inserted I/O Prefetching for Out-of-Core ApplicationsTodd C. Mowry, University of Toronto; et al.
Safe Kernel Extensions Without Run-Time CheckingGeorge C. Necula & Peter Lee, Carnegie Mellon University
PLDI (Programming Languages)
2013Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many ...Sriram Sankaranarayanan, University of Colorado; et al.
A General Constraint-centric Scheduling Framework for Spatial ArchitecturesTony Nowatzki, University of Wisconsin; et al.
Reconciling Exhaustive Pattern Matching with ObjectsChinawat Isradisaikul & Andrew C. Myers, Cornell University
CLAP: Recording Local Executions to Reproduce Concurrency FailuresJeff Huang, Hong Kong University of Science and Technology; et al.
2012Concurrent Data Representation SynthesisPeter Hawkins, Stanford University; et al.
2011Data Representation SynthesisPeter Hawkins, Stanford University; et al.
2010Safe to the Last Instruction: Automated Verification of a Type-Safe Operating SystemJean Yang, Massachusetts Institute of Technology
Chris Hawblitzel, Microsoft Research
2009Binary Analysis for Measurement and Attribution of Program PerformanceNathan Tallent, Rice University; et al.
2007Fault-tolerant Typed Assembly LanguageFrances Perry, Princeton University; et al.
The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of CodeBen Hardekopf & Calvin Lin, University of Texas at Austin
2005Automatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the HeapChris Lattner & Vikram Adve, University of Illinois at Urbana-Champaign
Programming by Sketching for Bit-Streaming ProgramsArmando Solar-Lezama, University of California Berkeley; et al.
2004Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision DiagramsJohn Whaley & Monica S. Lam, Stanford University
2003Automatically Proving the Correctness of Compiler OptimizationsSorin Lerner, University of Washington; et al.
2000Dynamo: a transparent dynamic optimization systemVasanth Bala, Hewlett-Packard Labs; et al.
1999Whole program pathsJames R. Larus, Microsoft Research
PODS (Databases)
2013Verification of database-driven systems via amalgamationMikołaj Bojańczyk, University of Warsaw; et al.
2012Worst-case Optimal Join AlgorithmsHung Q. Ngo, University at Buffalo; et al.
2011Data Exchange Beyond Complete DataMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.
2010An Optimal Algorithm for the Distinct Elements ProblemDaniel M. Kane, Harvard University; et al.
2009Size and Treewidth Bounds for Conjunctive QueriesGeorg Gottlob, University of Oxford; et al.
2008Estimating PageRank on Graph StreamsAtish Das Sarma, Georgia Institute of Technology; et al.
2007Generalized Hypertree Decompositions: NP-Hardness and Tractable VariantsGeorg Gottlob, University of Oxford; et al.
2006Two-variable logic on data trees and XML reasoningMikolaj Bojanczyk, Warsaw University; et al.
2005On the complexity of division and set joins in the relational algebraDirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum
XML data exchange: consistency and query answeringMarcelo Arenas & Leonid Libkin, University of Toronto
2004Conditional XPath, the first order complete XPath dialectMaarten Marx, University of Amsterdam
2003An Information-Theoretic Approach to Normal Forms for Relational and XML DataMarcelo Arenas & Leonid Libkin, University of Toronto
2002Monadic Datalog and the Expressive Power of Languages for Web Information ExtractionGeorg Gottlob & Christoph Koch, Technische Universität Wien
2001Optimal aggregation algorithms for middlewareRonald Fagin, IBM Research; et al.
2000Auditing Boolean attributesJon Kleinberg, Cornell University; et al.
1999Exact and approximate aggregation in constraint query languagesMichael Benefikt & Leonid Libkin, Bell Labs
1998A lower bound theorem for indexing schemes and its application to multidimensional range queriesVasilis Samoladas & Daniel P. Miranker, University of Texas at Austin
Expressiveness of structured document query languages based on attribute grammarsFrank Neven & Jan Van den Bussche, Limburgs Universitair Centrum
1997On the Complexity of Database QueriesChristos H. Papadimitriou, University of California Berkeley
Mihalis Yannakakis, Bell Labs
S&P (Security and Privacy)
2013Pinocchio: Nearly Practical Verifiable ComputationBryan Parno, Microsoft Research; et al.
2012Don't Trust Satellite Phones: A Security Analysis of Two Satphone StandardsBenedikt Driessen, Ruhr-Universität Bochum; et al.
2011Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iksAndrew M. White, University of North Carolina at Chapel Hill; et al.
2010SCiFI - A System for Secure Face IdentificationMargarita Osadchy, University of Haifa; et al.
2009Native Client: A Sandbox for Portable, Untrusted x86 Native CodeBennet Yee, Google; et al.
2008Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power DefensesDaniel Halperin, University of Washington; et al.
SIGCOMM (Networking)
2013Ambient Backscatter: Wireless Communication Out of Thin AirVincent Liu, University of Washington; et al.
2012Multi-Resource Fair Queueing for Packet ProcessingAli Ghodsi, University of California Berkeley; et al.
2011They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical DevicesShyamnath Gollakota, Massachusetts Institute of Technology; et al.
2010Efficient Error Estimating Coding: Feasibility and ApplicationsBinbin Chen, National University of Singapore; et al.
2009White Space Networking with Wi-Fi like ConnectivityParamvir Bahl, Microsoft Research; et al.
2008ZigZag Decoding: Combating Hidden Terminals in Wireless NetworksShyamnath Gollakota & Dina Katabi, Massachusetts Institute of Technology
SIGIR (Information Retrieval)
2013Beliefs and Biases in Web SearchRyen W. White, Microsoft Research
2012Time-Based Calibration of Effectiveness MeasuresMark Smucker & Charles Clarke, University of Waterloo
2011Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction DataMikhail Ageev, Moscow State University; et al.
2010Assessing the Scenic Route: Measuring the Value of Search Trails in Web LogsRyen W. White, Microsoft Research
Jeff Huang, University of Washington
2009Sources of evidence for vertical selectionJaime Arguello, Carnegie Mellon University; et al.
2008Algorithmic Mediation for Collaborative Exploratory SearchJeremy Pickens, FX Palo Alto Lab; et al.
2007Studying the Use of Popular Destinations to Enhance Web Search InteractionRyen W. White, Microsoft Research; et al.
2006Minimal Test Collections for Retrieval EvaluationBen Carterette, University of Massachusetts Amherst; et al.
2005Learning to estimate query difficulty: including applications to missing content detection and dis...Elad Yom-Tov, IBM Research; et al.
2004A Formal Study of Information Retrieval HeuristicsHui Fang, University of Illinois at Urbana-Champaign; et al.
2003Re-examining the potential effectiveness of interactive query expansionIan Ruthven, University of Strathclyde
2002Novelty and redundancy detection in adaptive filteringYi Zhang, Carnegie Mellon University; et al.
2001Temporal summaries of new topicsJames Allan, University of Massachusetts Amherst; et al.
2000IR evaluation methods for retrieving highly relevant documentsKalervo Järvelin & Jaana Kekäläinen, University of Tampere
1999Cross-language information retrieval based on parallel texts and automatic mining of parallel text...Jian-Yun Nie, Université de Montréal; et al.
1998A theory of term weighting based on exploratory data analysisWarren R. Greiff, University of Massachusetts Amherst
1997Feature selection, perceptron learning, and a usability case study for text categorizationHwee Tou Ng, DSO National Laboratories; et al.
1996Retrieving spoken documents by combining multiple index sourcesGareth Jones, University of Cambridge; et al.
SIGMETRICS (Performance)
2013Queueing System Topologies with Limited FlexibilityJohn Tsitsiklis & Kuang Xu, Massachusetts Institute of Technology
2012Temperature management in data centers: why some (might) like it hotNosayba El-Sayed, University of Toronto; et al.
2011Topology Discovery of Sparse Random Graphs With Few ParticipantsAnimashree Anandkumar, University of California Irvine; et al.
2010Load balancing via random local search in closed and open systemsAyalvadi Ganesh, University of Bristol; et al.
2009The Age of Gossip: Spatial Mean Field RegimeAugustin Chaintreau, Technicolor; et al.
2008Counter Braids: A Novel Counter Architecture for Per-Flow MeasurementYi Lu, Stanford University; et al.
2007Modeling the Relative Fitness of StorageMichael P. Mesnier, Intel; et al.
2006Maximizing throughput in wireless networks via gossipingEytan Modiano, Massachusetts Institute of Technology; et al.
2005Coupon replication systemsLaurent Massoulié & Milan Vojnović, Microsoft Research
2004On performance bounds for the integration of elastic and adaptive streaming flowsThomas Bonald & Alexandre Proutiere, France Telecom
1996Supporting stored video: reducing rate variability and end-to-end resource requirements through op...James D. Salehi, University of Massachusetts Amherst; et al.
Exploiting process lifetime distributions for dynamic load balancingMor Harchol-Balter & Allen B. Downey, University of California Berkeley
SIGMOD (Databases)
2013Massive Graph TriangulationXiaocheng Hu, The Chinese University of Hong Kong; et al.
2012High-Performance Complex Event Processing over XML StreamsBarzan Mozafari, Massachusetts Institute of Technology; et al.
2011Entangled Queries: Enabling Declarative Data-Driven CoordinationNitin Gupta, Cornell University; et al.
2010FAST: fast architecture sensitive tree search on modern CPUs and GPUsChangkyu Kim, Intel; et al.
2009Generating example data for dataflow programsChristopher Olston, Yahoo! Research; et al.
2008Serializable isolation for snapshot databasesMichael J. Cahill, University of Sydney; et al.
Scalable Network Distance Browsing in Spatial DatabasesHanan Samet, University of Maryland; et al.
2007Compiling mappings to bridge applications and databasesSergey Melnik, Microsoft Research; et al.
Scalable Approximate Query Processing with the DBO EngineChristopher Jermaine, University of Florida; et al.
2006To search or to crawl?: towards a query optimizer for text-centric tasksPanagiotis G. Ipeirotis, New York University; et al.
2004Indexing spatio-temporal trajectories with Chebyshev polynomialsYuhan Cai & Raymond T. Ng, University of British Columbia
2003Spreadsheets in RDBMS for OLAPAndrew Witkowski, Oracle; et al.
2001Locally adaptive dimensionality reduction for indexing large time series databasesEamonn Keogh, University of California Irvine; et al.
2000XMill: an efficient compressor for XML dataHartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories
1999DynaMat: a dynamic view management system for data warehousesYannis Kotidis & Nick Roussopoulos, University of Maryland
1998Efficient transparent application recovery in client-server information systemsDavid Lomet & Gerhard Weikum, Microsoft Research
Integrating association rule mining with relational database systems: alternatives and implicationsSunita Sarawagi, IBM Research; et al.
1997Fast parallel similarity search in multimedia databasesStefan Berchtold, University of Munich; et al.
1996Implementing data cubes efficientlyVenky Harinarayan, Stanford University; et al.
SODA (Theory)
2014Polynomiality for Bin Packing with a Constant Number of Item TypesMichel X. Goemans & Thomas Rothvoss, Massachusetts Institute of Technology
An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommod...Jonathan A. Kelner, Massachusetts Institute of Technology; et al.
2013A Simple Algorithm for the Graph Minor Decomposition - Logic meets Structural Graph TheoryMartin Grohe, RWTH Aachen University; et al.
Dynamic graph connectivity in polylogarithmic worst case timeBruce M. Kapron, University of Victoria; et al.
2012Computing all maps into a sphereMartin Čadek, Masaryk University; et al.
2011An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss TransformNir Ailon, Technion
Edo Liberty, Yahoo! Research
2010An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman ProblemArash Asadpour, Stanford University; et al.
2009Natural AlgorithmsBernard Chazelle, Princeton University
SOSP (Operating Systems)
2013Towards optimization-safe systems: analyzing the impact of undefined behaviorXi Wang, Massachusetts Institute of Technology; et al.
Naiad: A Timely Dataflow SystemDerek G. Murray, Microsoft Research; et al.
The Scalable Commutativity Rule: Designing Scalable Software for Multicore ProcessorsAustin T. Clements, Massachusetts Institute of Technology; et al.
2011A File is Not a File: Understanding the I/O Behavior of Apple Desktop ApplicationsTyler Harter, University of Wisconsin; et al.
Cells: A Virtual Mobile Smartphone ArchitectureJeremy Andrus, Columbia University; et al.
2009FAWN: A Fast Array of Wimpy NodesDavid G. Andersen, Carnegie Mellon University; et al.
seL4: Formal Verification of an OS KernelGerwin Klein, NICTA; et al.
RouteBricks: Exploiting Parallelism to Scale Software RoutersMihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al.
2007Zyzzyva: speculative byzantine fault toleranceRamakrishna Kotla, University of Texas at Austin; et al.
Sinfonia: a new paradigm for building scalable distributed systemsMarcos K. Aguilera, Hewlett-Packard Labs; et al.
Secure Web Applications via Automatic PartitioningStephen Chong, Cornell University; et al.
2005Speculative Execution in a Distributed File SystemEdmund B. Nightingale, University of Michigan; et al.
BAR Tolerance for Cooperative ServicesAmitanand S. Aiyer, University of Texas at Austin; et al.
Rx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, University of Illinois at Urbana-Champaign; et al.
Vigilante: End-to-End Containment of Internet WormsManuel Costa, University of Cambridge; et al.
2003Backtracking intrusionsSamuel T. King & Peter M. Chen, University of Michigan
Preserving peer replicas by rate-limited sampled votingPetros Maniatis, Stanford University; et al.
Improving the Reliability of Commodity Operating SystemsMichael M. Swift, University of Washington; et al.
2001BASE: using abstraction to improve fault toleranceRodrigo Rodrigues, Massachusetts Institute of Technology; et al.
Untrusted hosts and confidentiality: secure program partitioningSteve Zdancewic, Cornell University; et al.
1999Cellular Disco: resource management using virtual clusters on shared-memory multiprocessorsKinshuk Govil, Stanford University; et al.
Soft timers: efficient microsecond software timer support for network processingMohit Aron & Peter Druschel, Rice University
The Click modular routerRobert Morris, Massachusetts Institute of Technology; et al.
Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail se...Yasushi Saito, University of Washington; et al.
1997Continuous profiling: where have all the cycles gone?Jennifer M. Anderson, Digital Equipment Corporation; et al.
Disco: running commodity operating systems on scalable multiprocessorsEdouard Bugnion, Stanford University; et al.
Eraser: a dynamic data race detector for multithreaded programsStefan Savage, University of Washington; et al.
STOC (Theory)
2013Approximation Resistance from Pairwise Independent SubgroupsSiu On Chan, University of California Berkeley
Low Rank Approximation and Regression in Input Sparsity TimeKenneth L. Clarkson & David P. Woodruff, IBM Research
2012Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower BoundsSamuel Fiorini, Université libre de Bruxelles; et al.
The Cell Probe Complexity of Dynamic Range CountingKasper Larsen, Aarhus University
2011Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphsPaul Christiano, Massachusetts Institute of Technology; et al.
Subexponential lower bounds for randomized pivoting rules for the simplex algorithmOliver Friedmann, University of Munich; et al.
2010An improved LP-based approximation for steiner treeJaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al.
QIP = PSPACERahul Jain, National University of Singapore; et al.
2009A constructive proof of the Lovász local lemmaRobin A. Moser, ETH Zurich
Public-Key Cryptosystems from the Worst-Case Shortest Vector ProblemChris Peikert, SRI International
2008Optimal algorithms and inapproximability results for every CSP?Prasad Raghavendra, University of Washington
Optimal hierarchical decompositions for congestion minimization in networksHarald Räcke, University of Warwick
2007Faster integer multiplicationMartin Fürer, Pennsylvania State University
Towards 3-query locally decodable codes of subexponential lengthSergey Yekhanin, Massachusetts Institute of Technology
2006The PCP theorem by gap amplificationIrit Dinur, Hebrew University
2005Undirected ST-connectivity in log-spaceOmer Reingold, Weizmann Institute of Science
2004Multi-linear formulas for permanent and determinant are of super-polynomial sizeRan Raz, Weizmann Institute of Science
Expander flows, geometric embeddings and graph partitioningSanjeev Arora, Princeton University; et al.
2003Derandomizing polynomial identity tests means proving circuit lower boundsValentine Kabanets & Russell Impagliazzo, University of California San Diego
New lattice-based cryptographic constructionsOded Regev, Tel-Aviv University
UIST (User Interface)
2013PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing InterfacesLining Yao, Massachusetts Institute of Technology; et al.
Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic SensingMakoto Ono, University of Tsukuba; et al.
Fiberio: A Touchscreen that Senses FingerprintsChristian Holz & Patrick Baudisch, Hasso Plattner Institute
2012CrowdScape: interactively visualizing user behavior and outputJeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University
Cliplets: juxtaposing still and dynamic imageryNeel Joshi, Microsoft Research; et al.
Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Chang...Sean Follmer, Massachusetts Institute of Technology; et al.
2011SideBySide: Ad-hoc Multi-user Interaction with Handheld ProjectorsKarl D.D. Willis, Carnegie Mellon University; et al.
2010VizWiz: nearly real-time answers to visual questionsJeffrey P. Bigham, University of Rochester; et al.
2009Mouse 2.0: Multi-touch meets the MouseNicolas Villar, Microsoft Research; et al.
2008Bringing Physics to the SurfaceAndrew D. Wilson, Microsoft Research; et al.
2007ThinSight: Versatile Multi-touch Sensing for Thin Form-factor DisplaysSteve Hodges, Microsoft Research; et al.
2006Reflective Physical Prototyping through Integrated Design, Test, and AnalysisBjörn Hartmann, Stanford University; et al.
2005Automation and Customization of Rendered Web PagesMichael Bolin, Massachusetts Institute of Technology; et al.
2004Multi-Finger Gestural Interaction with 3D Volumetric DisplaysTovi Grossman, University of Toronto; et al.
CrossY: A Crossing-Based Drawing ApplicationGeorg Apitz & François Guimbretière, University of Maryland
2003Perceptually-Supported Image Editing of Text and GraphicsEric Saund, Palo Alto Research Center; et al.
2002Clothing ManipulationTakeo Igarashi, University of Tokyo
John F. Hughes, Brown University
2001Phidgets: Easy Development of Physical Interfaces through Physical WidgetsSaul Greenberg & Chester Fitchett, University of Calgary
2000Sensing Techniques for Mobile InteractionKen Hinckley, Microsoft Research; et al.
1996Indigo: A Local Propagation Algorithm for Inequality ConstraintsAlan Borning, University of Washington; et al.
VLDB (Databases)
2013DisC Diversity: Result Diversification based on Dissimilarity and CoverageMarina Drosou & Evaggelia Pitoura, University of Ioannina
2012Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story IdentificationAlbert Angel, University of Toronto; et al.
2011RemusDB: Transparent High-Availability for Database SystemsUmar Farooq Minhas, University of Waterloo; et al.
2010Towards Certain Fixes with Editing Rules and Master DataShuai Ma, University of Edinburgh; et al.
2009A Unified Approach to Ranking in Probabilistic DatabasesJian Li, University of Maryland; et al.
2008Finding Frequent Items in Data StreamsGraham Cormode & Marios Hadjieleftheriou, AT&T Laboratories
Constrained Physical Design TuningNicolas Bruno & Surajit Chaudhuri, Microsoft Research
2007Scalable Semantic Web Data Management Using Vertical PartitioningDaniel J. Abadi, Massachusetts Institute of Technology; et al.
2006Trustworthy Keyword Search for Regulatory-Compliant Records RetentionSoumyadeb Mitra, University of Illinois at Urbana-Champaign; et al.
2005Cache-conscious Frequent Pattern Mining on a Modern ProcessorAmol Ghoting, Ohio State University; et al.
2004Model-Driven Data Acquisition in Sensor NetworksAmol Deshpande, University of California Berkeley; et al.
2001Weaving Relations for Cache PerformanceAnastassia Ailamaki, Carnegie Mellon University; et al.
1997Integrating Reliable Memory in DatabasesWee Teck Ng & Peter M. Chen, University of Michigan
WWW (World Wide Web)
2014Efficient Estimation for High Similarities using Odd SketchesMichael Mitzenmacher, Harvard University; et al.
2013No Country for Old Members: User Lifecycle and Linguistic Change in Online CommunitiesCristian Danescu-Niculescu-Mizil, Stanford University; et al.
2012Counting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the StandardMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.
2011Towards a theory model for product searchBeibei Li, New York University; et al.
2010Factorizing personalized Markov chains for next-basket recommendationSteffen Rendle, Osaka University; et al.
2009Hybrid keyword search auctionsAshish Goel, Stanford University
Kamesh Munagala, Duke University
2008IRLbot: Scaling to 6 billion pages and beyondHsin-Tsang Lee, Texas A&M University; et al.
2007Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganogra...Lars Backstrom, Cornell University; et al.
2006Random Sampling from a Search Engine's IndexZiv Bar-Yossef & Maxim Gurevich, Technion
2005Three-level caching for efficient query processing in large Web search enginesXiaohui Long & Torsten Suel, Polytechnic Institute of New York University
2004Automatic detection of fragments in dynamically generated web pagesLakshmish Ramaswamy, Georgia Institute of Technology; et al.
2003Scaling personalized web searchGlen Jeh & Jennifer Widom, Stanford University
SemTag and seeker: bootstrapping the semantic web via automated semantic annotationStephen Dill, IBM Research; et al.
2002Abstracting application-level web securityDavid Scott & Richard Sharp, University of Cambridge
2001Engineering Server Driven Consistency for Large Scale Dynamic Web ServicesJian Yin, University of Texas at Austin; et al.
2000Graph Structure in the WebAndrei Broder, AltaVista; et al.
1999Focused Crawling: A New Approach to Topic-Specific Web Resource DiscoverySoumen Chakrabarti, Indian Institute of Technology; et al.
1998The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/videoKevin C. Almeroth, University of California Santa Barbara
Mostafa H. Ammar, Georgia Institute of Technology


Institutions with Best Papers
Microsoft Research36.9
Stanford University26.8
Massachusetts Institute of Technology26.6
Carnegie Mellon University24.7
University of Washington24.1
University of California Berkeley19.5
University of Toronto13.4
Cornell University12.9
IBM Research12.2
University of Illinois at Urbana-Champaign10.3
University of Texas at Austin9.4
University of British Columbia9.4
University of California Irvine7.7
University of Massachusetts Amherst7.2
Yahoo! Research6.8
Google6.8
University of Michigan6.7
University of Maryland6.6
University of Oxford6.2
Georgia Institute of Technology6.0
École Polytechnique Fédérale de Lausanne5.9
Princeton University5.6
AT&T Laboratories4.9
McGill University4.7
University of Nottingham4.5
Weizmann Institute of Science4.5
University of Wisconsin4.3
Rice University4.2
University of California San Diego4.2
Université Paris-Sud3.9
Technion3.8
Hewlett-Packard Labs3.7
University of North Carolina at Chapel Hill3.4
Brown University3.3
Bell Labs3.3
Columbia University3.1
National University of Singapore3.0
DePaul University3.0
Delft University of Technology3.0
Hasso Plattner Institute3.0
University of Alberta3.0
Indiana University at Bloomington3.0
Technische Universität Berlin2.7
NEC Labs America2.7
University of Waterloo2.7
University of Nebraska-Lincoln2.6
University of California Davis2.6
Max Planck Institut2.6
University of Cambridge2.6
The Chinese University of Hong Kong2.5
Ohio State University2.4
Duke University2.3
Toyota Technological Institute at Chicago2.3
University of Pennsylvania2.3
Aarhus University2.3
RWTH Aachen University2.2
Tel-Aviv University2.2
University of Calgary2.1
Saarland University2.1
Intel Research2.0
Polytechnic Institute of New York University2.0
University College London2.0
Universidade Técnica de Lisboa2.0
BBN Technologies2.0
NASA Ames Research Center2.0
Purdue University2.0

Credit is given in decreasing author order as customary in many fields. First authors are given 1 point, second authors are given 0.5 points, third authors are given 0.33 points, etc. These points are then divided by the sum of points for that paper, i.e. normalizing it. This ranking may be inaccurate or incomplete, may not reflect the current state of best paper awards, and is not an official list. If you are not satisfied with the ranking listed here, please disregard it.


该文章转载自http://jeffhuang.com/best_paper_awards.html#institutions

  • 1
    点赞
  • 3
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
计算机考研历年真题PDF是指汇集了计算机考研历年真题的电子文档。近年来,越来越多的考生通过使用这些PDF文档进行备考和复习。这些PDF文档通常包含了各个年份的计算机考研真题和部分答案。考生可以通过阅读和分析这些真题,了解考试的出题趋势和重点,并且进行有针对性的复习。 计算机考研历年真题PDF的优点如下: 1. 方便获取:考生可以通过互联网轻松获取这些PDF文档,免去了购买纸质书籍和翻阅大量资料的麻烦。 2. 全面覆盖:这些PDF文档通常会收录多年的真题,涵盖了各个考试科目的考题。考生可以根据自己的需要选择合适的年份进行复习。 3. 模拟实战:考生可以将这些真题作为模拟考试进行练习,以增加实战经验和提高解题能力。 4. 效率提升:通过分析历年真题,考生可以了解到考试的阅读理解方式、题目类型等,从而提高备考效率,有针对性地进行复习。 当然,使用计算机考研历年真题PDF也存在一些注意事项: 1. 不可过分依赖:真题只是备考过程的一部分,考生还需要掌握相应的理论知识,并进行系统性的复习。 2. 真题不是万能的:尽管历年真题有一定的参考价值,但考生在备考过程中还要关注最新的考试动态和教材要求。 总之,计算机考研历年真题PDF对于备考的考生来说是一种非常有价值的资源。合理地利用这些真题可以提高备考效率和准备考试的能力。但考生需要注意,真题只是备考的辅助工具,还需要根据教材要求和考试大纲进行有针对性的学习和复习。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值