【Paper】【Compute Vision】Best Paper Awards in Computer Science (since 1996)

Best Paper Awards in Computer Science (since 1996)

转载之:http://jeffhuang.com/best_paper_awards.html

比较伤心,莫有ECCV

By Conference:  AAAI   ACL   CHI   CIKM   CVPR   FOCS   FSE   ICCV   ICML   ICSE   IJCAI   INFOCOM   KDD   MOBICOM   

NSDI   OSDI   PLDI   PODS   S&P   SIGCOMM  SIGIR   SIGMETRICS   SIGMOD   SODA   SOSP   STOC   UIST   VLDB   WWW

Institutions with the most Best Papers

Much of this data was entered by hand (obtained by contacting past conference organizers, retrieving cached conference websites, and searching CVs) so please email me if you notice any errors or omissions: bestpaper-AT-jeffhuang.com. I tried to collect best paper awards from the top-tier conferences in each area, but some conferences do not have such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award" and "outstanding paper award" are included but not "best student paper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL).

There is a visualization for filtering these papers by institution, year, and conference (thanks to David Karger)


AAAI (Artificial Intelligence)
2013HC-Search: Learning Heuristics and Cost Functions for Structured PredictionJanardhan Rao Doppa, Oregon State University; et al.
SMILe: Shuffled Multiple-Instance LearningGary Doran & Soumya Ray, Case Western Reserve University
2012Learning SVM Classifiers with Indefinite KernelsSuicheng Gu & Yuhong Guo, Temple University
Document Summarization Based on Data ReconstructionZhanying He, Zhejiang University; et al.
2011Dynamic Resource Allocation in Conservation PlanningDaniel Golovin, California Institute of Technology; et al.
Complexity of and Algorithms for Borda ManipulationJessica Davies, University of Toronto; et al.
2010How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Ans...Giorgos Stoilos, Oxford University; et al.
A Novel Transition Based Encoding Scheme for Planning as SatisfiabilityRuoyun Huang, Washington University in St. Louis; et al.
2008How Good is Almost Perfect?Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg
Optimal False-Name-Proof Voting Rules with Costly VotingLiad Wagman & Vincent Conitzer, Duke University
2007PLOW: A Collaborative Task Learning AgentJames Allen, Institute for Human and Machine Cognition; et al.
Thresholded Rewards: Acting Optimally in Timed, Zero-Sum GamesColin McMillen & Manuela Veloso, Carnegie Mellon University
2006Model Counting: A New Strategy for Obtaining Good BoundsCarla P. Gomes, Cornell University; et al.
Towards an Axiom System for Default LogicGerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto
2005The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic SelectionVincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University
2004Learning and Inferring Transportation RoutinesLin Liao, University of Washington; et al.
2002On Computing All Abductive ExplanationsThomas Eiter, Technische Universität Wien
Kazuhisa Makino, Osaka University
2000The Game of Hex: An Automatic Theorem-Proving Approach to Game ProgrammingVadim V. Anshelevich, Vanshel Consulting
1999PROVERB: The Probabilistic CruciverbalistGreg A. Keim, Duke University; et al.
1998Learning Evaluation Functions for Global Optimization and Boolean SatisfiabilityJustin A. Boyan & Andrew W. Moore, Carnegie Mellon University
Acceleration Methods for Numeric CSPsYahia Lebbah & Olivier Lhomme, Ecole des Mines de Nantes
The Interactive Museum Tour-Guide RobotWolfram Burgard, University of Bonn; et al.
1997Statistical Parsing with a Context-Free Grammar and Word StatisticsEugene Charniak, Brown University
A Practical Algorithm for Finding Optimal TriangulationsKrill Shoikhet & Dan Geiger, Technion
Fast Context Switching in Real-Time Propositional ReasoningP. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center
Building Concept Representations from Reusable ComponentsPeter Clark, Boeing
Bruce Porter, University of Texas at Austin
1996Verification of Knowledge Bases Based on Containment CheckingAlon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, Université Paris-Sud
A Novel Application of Theory Refinement to Student ModelingPaul T. Baffes, SciComp
Raymond J. Mooney, University of Texas at Austin
Pushing the Envelope: Planning, Propositional Logic, and Stochastic SearchHenry Kautz & Bart Selman, AT&T Laboratories
ACL (Natural Language Processing)
2013Grounded Language Learning from Video Described with SentencesHaonan Yu & Jeffrey Mark Siskind, Purdue University
2012String Re-writing KernelFan Bu, Tsinghua University; et al.
Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic ParsingHiroyuki Shindo, NTT Communication Science Laboratories; et al.
2011Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based ProjectionsDipanjan Das, Carnegie Mellon University
Slav Petrov, Google
2010Beyond NomBank: A Study of Implicit Arguments for Nominal PredicatesMatthew Gerber & Joyce Y. Chai, Michigan State University
2009Reinforcement Learning for Mapping Instructions to ActionsS.R.K. Branavan, Massachusetts Institute of Technology; et al.
K-Best A* ParsingAdam Pauls & Dan Klein, University of California Berkeley
Concise Integer Linear Programming Formulations for Dependency ParsingAndré F.T. Martins, Instituto de Telecomunicações; et al.
2008Forest Reranking: Discriminative Parsing with Non-Local FeaturesLiang Huang, University of Pennsylvania
A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language ModelLibin Shen, BBN Technologies; et al.
2007Learning synchronous grammars for semantic parsing with lambda calculusYuk Wah Wong & Raymond J. Mooney, University of Texas at Austin
2006Semantic taxonomy induction from heterogenous evidenceRion Snow, Stanford University; et al.
2005A Hierarchical Phrase-Based Model for Statistical Machine TranslationDavid Chiang, University of Maryland
2004Finding Predominant Word Senses in Untagged TextDiana McCarthy, University of Sussex; et al.
2003Accurate Unlexicalized ParsingDan Klein & Christopher D. Manning, Stanford University
Towards a Model of Face-to-Face GroundingYukiko I. Nakano, RISTEX; et al.
2002Discriminative Training and Maximum Entropy Models for Statistical Machine TranslationFranz Josef Och & Hermann Ney, RWTH Aachen University
2001Immediate-Head Parsing for Language ModelsEugene Charniak, Brown University
Fast Decoding and Optimal Decoding for Machine TranslationUlrich Germann, University of Southern California; et al.
CHI (Human-Computer Interaction)
2013Labor Dynamics in a Mobile Micro-Task MarketMohamed Musthag & Deepak Ganesan, University of Massachusetts Amherst
Eliminating redundancies with a "composition with adaptation" meta-programming techniqueStan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong University
A Family of Test Adequacy Criteria for Database-Driven ApplicationsGregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh
Predicting problems caused by component upgradesStephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology
2002Isolating Cause-Effect Chains from Computer ProgramsAndreas Zeller, Saarland University
ICCV (Computer Vision)
2013From Large Scale Image Categorization to Entry-Level CategoriesVicente Ordonez, University of North Carolina at Chapel Hill; et al.
2011Relative AttributesDevi Parikh, Toyota Technological Institute at Chicago
Kristen Grauman, University of Texas at Austin
2009Discriminative models for multi-class object layoutChaitanya Desai, University of California Irvine; et al.
2007Population Shape Regression From Random Design DataBradley Davis, University of North Carolina at Chapel Hill; et al.
2005Globally Optimal Estimates for Geometric Reconstruction ProblemsFredrik Kahl, Lund University
Didier Henrion, LAAS-CNRS
2003Detecting Pedestrians using Patterns of Motion and AppearancePaul Viola, Microsoft Research; et al.
Image Parsing: Unifying Segmentation, Detection and RecognitionZhuowen Tu, University of California Los Angeles; et al.
Image-based Rendering using Image-based PriorsAndrew Fitzgibbon, University of Oxford; et al.
2001Probabilistic Tracking with Exemplars in a Metric SpaceKentaro Toyama & Andrew Blake, Microsoft Research
The Space of All Stereo ImagesSteven Seitz, University of Washington
1999Euclidean Reconstruction and Reprojection up to SubgroupsYi Ma, University of California Berkeley; et al.
A Theory of Shape by Space CarvingKiriakos Kutulakos, University of Rochester
Steven Seitz, Carnegie Mellon University
1998Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Paramet...Marc Pollefeys, Katholieke Universiteit Leuven; et al.
The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image SequencesPhil Torr, Microsoft Research; et al.
ICML (Machine Learning)
2013Vanishing Component AnalysisRoi Livni, The Hebrew University of Jerusalum; et al.
Fast Semidifferential-based Submodular Function OptimizationRishabh Iyer, University of Washington; et al.
2012Bayesian Posterior Sampling via Stochastic Gradient Fisher ScoringSungjin Ahn, University of California Irvine; et al.
2011Computational Rationalization: The Inverse Equilibrium ProblemKevin Waugh, Carnegie Mellon University; et al.
2010Hilbert Space Embeddings of Hidden Markov ModelsLe Song, Carnegie Mellon University; et al.
2009Structure preserving embeddingBlake Shaw & Tony Jebara, Columbia University
2008SVM Optimization: Inverse Dependence on Training Set SizeShai Shalev-Shwartz & Nathan Srebro, Toyota Technological Institute at Chicago
2007Information-theoretic metric learningJason V. Davis, University of Texas at Austin; et al.
2006Trading convexity for scalabilityRonan Collobert, NEC Labs America; et al.
2005A support vector method for multivariate performance measuresThorsten Joachims, Cornell University
1999Least-Squares Temporal Difference LearningJustin A. Boyan, NASA Ames Research Center
ICSE (Software Engineering)
2013Dual Ecological Measures of Focus in Software DevelopmentDaryl Posnett, University of California Davis; et al.
Data Clone Detection and Visualization in SpreadsheetsFelienne Hermans, Delft University of Technology; et al.
UML in PracticeMarian Petre, Open University
Automatic patch generation learned from human-written patchesDongsun Kim, Hong Kong University of Science and Technology; et al.
Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop CloudsWeiyi Shang, Queen's University; et al.
Interaction-Based Test-Suite MinimizationDale Blue, IBM; et al.
2012Understanding Integer Overflow in C/C++Will Dietz, University of Illinois at Urbana-Champaign; et al.
Using Dynamic Analysis to Discover Polynomial and Array InvariantsThanhVu Nguyen, University of New Mexico; et al.
Amplifying Tests to Validate Exception Handling CodePingyu Zhang & Sebastian Elbaum, University of Nebraska-Lincoln
Partial Models: Towards Modeling and Reasoning with UncertaintyMichalis Famelis, University of Toronto; et al.
How Do Professional Developers Comprehend Software?Tobias Roehm, Technische Universität München; et al.
A Tactic-Centric Approach for Automating Traceability of Quality ConcernsMehdi Mirakhorli, DePaul University; et al.
Automated Detection of Client-State Manipulation VulnerabilitiesAnders Møller & Mathias Schwarz, Aarhus University
2011Verifying Multi-threaded Software using SMT-based Context-Bounded Model CheckingLucas Cordeiro & Bernd Fischer, University of Southampton
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and ...Narayan Ramasubbu, Singapore Management University; et al.
Programs, tests, and oracles: the foundations of testing revisitedMatt Staats, University of Minnesota; et al.
On-demand Feature Recommendations Derived from Mining Public Product DescriptionsHoratiu Dumitru, DePaul University; et al.
Run-Time Efficient Probabilistic Model CheckingAntonio Filieri, Politecnico di Milano; et al.
2010A Machine Learning Approach for Tracing Regulatory Codes to Product Specific RequirementsJane Cleland-Huang, DePaul University; et al.
Collaborative Reliability Prediction of Service-Oriented SystemsZibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong
A Cut-off Approach for Bounded Verification of Parameterized SystemsQiusong Yang & Mingshu Li, Chinese Academy of Sciences
Test Generation through Programming in UDITAMilos Gligoric, University of Illinois at Urbana-Champaign; et al.
A Degree-of-Knowledge Model to Capture Source Code FamiliarityThomas Fritz, University of British Columbia; et al.
2009How We Refactor, and How We Know ItEmerson Murphy-Hill, Portland State University; et al.
Effective Static Deadlock DetectionMayur Naik, Intel Research; et al.
Invariant-Based Automatic Testing of AJAX User InterfacesAli Mesbah & Arie van Deursen, Delft University of Technology
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows VistaChristian Bird, University of California Davis; et al.
Automatically finding patches using genetic programmingWestley Weimer, University of Virginia; et al.
2008Precise memory leak detection for java software using container profilingGuoqing Xu & Atanas Rountev, Ohio State University
Debugging reinvented: asking and answering why and why not questions about program behaviorAndrew J. Ko & Brad A. Myers, Carnegie Mellon University
Recommending adaptive changes for framework evolutionBarthélémy Dagenais & Martin P. Robillard, McGill University
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental ApproachJoseph Ruthruff, University of Nebraska-Lincoln; et al.
The effect of program and model structure on mc/dc test adequacy coverageAjitha Rajan, University of Minnesota; et al.
2007Refactoring for Parameterizing Java ClassesAdam Kiezun, Massachusetts Institute of Technology; et al.
Tracking Code Clones in Evolving SoftwareEkwa Duala-Ekoko & Martin P. Robillard, McGill University
Matching and Merging of Statecharts SpecificationsShiva Nejati, University of Toronto; et al.
Predicting Faults from Cached HistorySunghun Kim, Massachusetts Institute of Technology; et al.
2006Model-Based Development of Dynamically Adaptive SoftwareJi Zhang & Betty H.C. Cheng, Michigan State University
Who Should Fix This Bug?John Anvik, University of British Columbia; et al.
2005Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Pe...Andrew Ko, Carnegie Mellon University; et al.
Is Mutation an Appropriate Tool for Testing Experiments?James Andrews, University of Western Ontario; et al.
Using Structural Context to Recommend Source Code ExamplesReid Holmes & Gail Murphy, University of British Columbia
Data Structure Repair Using Goal-Directed ReasoningBrian Demsky & Martin Rinard, Massachusetts Institute of Technology
2004SNIAFL: Towards a Static Non-Interactive Approach to Feature LocationWei Zhao, Peking University; et al.
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized SystemsRohit Khare & Richard N. Taylor, University of California Irvine
An Empirical Study of Software Reuse vs. Defect-Density and StabilityParastoo Mohagheghi, Ericsson; et al.
A Tool for Writing and Debugging Algebraic SpecificationsJohannes Henkel & Amer Diwan, University of Colorado
Static Checking of Dynamically Generated Queries in Database ApplicationsCarl Gould, University of California Davis; et al.
2003Precise Dynamic Slicing AlgorithmsXiangyu Zhang, University of Arizona; et al.
Modular Verification of Software Components in CSagar Chaki, Carnegie Mellon University; et al.
IJCAI (Artificial Intelligence)
2013Bayesian Optimization in High Dimensions via Random EmbeddingsZiyu Wang, University of British Columbia; et al.
Flexibility and Decoupling in the Simple Temporal ProblemMichel Wilson, Delft University of Technology; et al.
2011Unweighted Coalitional Manipulation Under the Borda Rule is NP-HardNadja Betzler, Technische Universität Berlin; et al.
Nested Rollout Policy Adaptation for Monte Carlo Tree SearchChristopher D. Rosin, Parity Computing
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean SpacesRoman Kontchakov, Birkbeck College London; et al.
2009Consequence-Driven Reasoning for Horn SHIQ OntologiesYevgeny Kazakov, University of Oxford
Learning Conditional Preference Networks with QueriesFrederic Koriche, Université Montpellier II
Bruno Zanuttini, Université de Caen Basse-Normandie
2007Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian NetworksMaleeha Qazi, Siemens Medical Solutions; et al.
Building Structure into Local Search for SATDuc Nghia Pham, Griffith University; et al.
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Pro...Luc Mercier & Pascal Van Hentenryck, Brown University
2005Learning Coordination ClassifiersYuhong Guo, University of Alberta; et al.
Solving CheckersJonathan Schaeffer, University of Alberta; et al.
A Probabilistic Model of Redundancy in Information ExtractionDoug Downey, University of Washington; et al.
2003Approximating Game-Theoretic Optimal Strategies for Full-scale PokerDarse Billings, University of Alberta; et al.
Thin Junction Tree Filters for Simultaneous Localization and MappingMark A. Paskin, University of California Berkeley
2001Complexity Results for Structure-Based CausalityThomas Eiter & Thomas Lukasiewicz, Vienna University of Technology
1999Learning in Natural LanguageDan Roth, University of Illinois at Urbana-Champaign
A Distributed Case-Based Reasoning Application for Engineering Sales SupportIan Watson, University of Salford
Dan Gardingen, Western Air
1997Object Identification in a Bayesian ContextTimothy Huang & Stuart Russell, University of California Berkeley
Translingual Information Retrieval: A Comparative EvaluationJaime G. Carbonell, Carnegie Mellon University; et al.
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolo...Fangzhen Lin, The Hongkong University of Science and Technology
INFOCOM (Networking)
2013On the Steady-State of Cache NetworksElisha J. Rosensweig, University of Massachusetts Amherst; et al.
2012Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying frameworkCarlee Joe-Wong, Princeton University; et al.
2011Dynamic right-sizing for power-proportional data centersMinghong Lin, California Institute of Technology; et al.
2010On the Feasibility and Efficacy of Protection Routing in IP NetworksKin-Wah Kwong, University of Pennsylvania; et al.
2009Queuing Network Models for Multi-Channel P2P Live Streaming SystemsDi Wu, Polytechnic Institute of New York University; et al.
2008On the Feasibility of the Link Abstraction in (Rural) Mesh NetworksDattatraya Gokhal, Indian Navy; et al.
Theoretical Results on Base Station Movement Problem for Sensor NetworksYi Shi & Y. Thomas Hou, Virginia Tech
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless...Changhee Joo, Ohio State University; et al.
2007Disruption free topology reconfiguration in OSPF networksPierre Francois, Université catholique de Louvain; et al.
2006Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global PerspectiveGaurav Sharma, Purdue University; et al.
2005Perfect Simulation and Stationarity of a Class of Mobility ModelsJean-Yves Le Boude, École Polytechnique Fédérale de Lausanne
Milan Vojnović, Microsoft Research
2004Throughput-Delay Trade-Off in Wireless NetworksAbbas El Gamal, Stanford University; et al.
2003User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data NetworksSem Borst, Bell Labs
2002Priority Service and Max-Min FairnessPeter Marbach, University of Toronto
2001Mobility increases the capacity of ad-hoc wireless networksMatthias Grossglauser, AT&T Laboratories
David Tse, University of California Berkeley
2000The Chaotic Nature of TCP Congestion ControlAndrás Veres, Ericsson
Miklós Boda, Ericsson Research
1999Bandwidth Sharing: Objectives and AlgorithmsLaurent Massoulié, Microsoft Research
James Robert, France Telecom
1998Effective Bandwidths in Wireless Networks with Multiuser ReceiversDavid Tse, University of California Berkeley
Stephen Hanly, University of Melbourne
1996An algorithm for multicast tree generation in networks with asymmetric linksRam Ramanathan, BBN Technologies
KDD (Data Mining)
2013Simple and Deterministic Matrix SketchingEdo Liberty, Yahoo! Research
2012Searching and Mining Trillions of Time Series Subsequences under Dynamic Time WarpingThanawin Rakthanmanon, University of California Riverside; et al.
2011Leakage in Data Mining: Formulation, Detection, and AvoidanceShachar Kaufman, Tel-Aviv University; et al.
2010Large linear classification when data cannot fit in memoryHsiang-Fu Yu, National Taiwan University; et al.
Connecting the dots between news articlesDafna Shahaf & Carlos Guestrin, Carnegie Mellon University
2009Collaborative Filtering with Temporal DynamicsYehuda Koren, Yahoo! Research
2008Fastanova: an efficient algorithm for genome-wide association studyXiang Zhang, University of North Carolina at Chapel Hill; et al.
2007Predictive discrete latent factor models for large scale dyadic dataDeepak Agarwal & Srujana Merugu, Yahoo! Research
2006Training linear SVMs in linear timeThorsten Joachims, Cornell University
2005Graphs over time: densification laws, shrinking diameters and possible explanationsJure Leskovec, Carnegie Mellon University; et al.
2004A probabilistic framework for semi-supervised clusteringSugato Basu, University of Texas at Austin; et al.
2003Maximizing the spread of influence through a social networkDavid Kempe, Cornell University; et al.
2002Pattern discovery in sequences under a Markov assumptionDarya Chudova & Padhraic Smyth, University of California Irvine
2001Robust space transformations for distance-based operationsEdwin M. Knorr, University of British Columbia; et al.
2000Hancock: a language for extracting signatures from data streamsCorinna Cortes, AT&T Laboratories; et al.
1999MetaCost: a general method for making classifiers cost-sensitivePedro Domingos, Universidade Técnica de Lisboa
1998Occam's Two Razors: The Sharp and the BluntPedro Domingos, Universidade Técnica de Lisboa
1997Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Di...Foster Provost & Tom Fawcett, NYNEX Science and Technology
MOBICOM (Mobile)
2013Whole-Home Gesture Recognition Using Wireless SignalsQifan Pu, University of Washington; et al.
2012Distinguishing Users with Capacitative Touch CommunicationTam Vu, Rutgers University; et al.
2011Detecting Driver Phone Use Leveraging Car SpeakersJie Yang, Stevens Institute of Technology; et al.
E-MiLi: Energy-Minimizing Idle Listening in Wireless NetworksXinyu Zhang & Kang G. Shin, University of Michigan
2010The κ factor: inferring protocol performance using inter-link reception correlationKannan Srinivasan, Stanford University; et al.
2009CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data PathVivek Shrivastava, University of Wisconsin; et al.
2008Assessment of Urban-Scale Wireless Networks with a Small Number of MeasurementsJoshua Robinson, Rice University; et al.
NSDI (Networking)
2014Software Dataplane VerificationMihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne
2013Embassies: Radically Refactoring the WebJon Howell, Microsoft Research; et al.
A Fault-Tolerant Engineered NetworkVincent Liu, University of Washington; et al.
2012Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingMatei Zaharia, University of California Berkeley; et al.
2011Design, Implementation and Evaluation of Congestion Control for Multipath TCPDamon Wischik, University College London; et al.
ServerSwitch: A Programmable and High Performance Platform for Data Center NetworksGuohan Lu, Microsoft Research; et al.
2010Reverse tracerouteEthan Katz-Bassett, University of Washington; et al.
2009Sora: High Performance Software Radio Using General Purpose Multi-core ProcessorsKun Tan, Microsoft Research; et al.
TrInc: Small Trusted Hardware for Large Distributed SystemsDave Levin, University of Maryland; et al.
2008Remus: High Availability via Asynchronous Virtual Machine ReplicationBrendan Cully, University of British Columbia; et al.
Consensus Routing: The Internet as a Distributed SystemJohn P. John, University of Washington; et al.
2007Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems CodeCharles Killian, University of California San Diego; et al.
2006Experience with an Object Reputation System for Peer-to-Peer FilesharingKevin Walsh & Emin Gün Sirer, Cornell University
Replay Debugging for Distributed ApplicationsDennis Geels, University of California Berkeley; et al.
2005Detecting BGP Configuration Faults with Static AnalysisNick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology
2004Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Netwo...Philip Levis, University of California Berkeley; et al.
OSDI (Operating Systems)
2012Spanner: Google's Globally-Distributed DatabaseJames C. Corbett, Google; et al.
2010Efficient System-Enforced Deterministic ParallelismAmittai Aviram, Yale University; et al.
The Turtles Project: Design and Implementation of Nested VirtualizationMuli Ben-Yehuda, IBM Research; et al.
2008KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems ProgramsCristian Cadar, Stanford University; et al.
Difference Engine: Harnessing Memory Redundancy in Virtual MachinesDiwaker Gupta, University of California San Diego; et al.
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Lan...Yuan Yu, Microsoft Research; et al.
2006Bigtable: A Distributed Storage System for Structured DataFay Chang, Google; et al.
Rethink the SyncEdmund B. Nightingale, University of Michigan; et al.
2004Using Model Checking to Find Serious File System ErrorsJunfeng Yang, Stanford University; et al.
Recovering Device DriversMichael M. Swift, University of Washington; et al.
2002Memory Resource Management in VMware ESX ServerCarl A. Waldspurger, VMware
2000Checking System Rules Using System-Specific, Programmer-Written Compiler ExtensionsDawson Engler, Stanford University; et al.
1999IO-Lite: A Unified I/O Buffering and Caching SystemVivek S. Pai, Rice University; et al.
1996Automatic Compiler-Inserted I/O Prefetching for Out-of-Core ApplicationsTodd C. Mowry, University of Toronto; et al.
Safe Kernel Extensions Without Run-Time CheckingGeorge C. Necula & Peter Lee, Carnegie Mellon University
PLDI (Programming Languages)
2013Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many ...Sriram Sankaranarayanan, University of Colorado; et al.
A General Constraint-centric Scheduling Framework for Spatial ArchitecturesTony Nowatzki, University of Wisconsin; et al.
Reconciling Exhaustive Pattern Matching with ObjectsChinawat Isradisaikul & Andrew C. Myers, Cornell University
CLAP: Recording Local Executions to Reproduce Concurrency FailuresJeff Huang, Hong Kong University of Science and Technology; et al.
2012Concurrent Data Representation SynthesisPeter Hawkins, Stanford University; et al.
2011Data Representation SynthesisPeter Hawkins, Stanford University; et al.
2010Safe to the Last Instruction: Automated Verification of a Type-Safe Operating SystemJean Yang, Massachusetts Institute of Technology
Chris Hawblitzel, Microsoft Research
2009Binary Analysis for Measurement and Attribution of Program PerformanceNathan Tallent, Rice University; et al.
2007Fault-tolerant Typed Assembly LanguageFrances Perry, Princeton University; et al.
The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of CodeBen Hardekopf & Calvin Lin, University of Texas at Austin
2005Automatic Pool Allocation: Improving Performance by Controlling Data Structure Layout in the HeapChris Lattner & Vikram Adve, University of Illinois at Urbana-Champaign
Programming by Sketching for Bit-Streaming ProgramsArmando Solar-Lezama, University of California Berkeley; et al.
2004Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision DiagramsJohn Whaley & Monica S. Lam, Stanford University
2003Automatically Proving the Correctness of Compiler OptimizationsSorin Lerner, University of Washington; et al.
2000Dynamo: a transparent dynamic optimization systemVasanth Bala, Hewlett-Packard Labs; et al.
1999Whole program pathsJames R. Larus, Microsoft Research
PODS (Databases)
2013Verification of database-driven systems via amalgamationMikołaj Bojańczyk, University of Warsaw; et al.
2012Worst-case Optimal Join AlgorithmsHung Q. Ngo, University at Buffalo; et al.
2011Data Exchange Beyond Complete DataMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.
2010An Optimal Algorithm for the Distinct Elements ProblemDaniel M. Kane, Harvard University; et al.
2009Size and Treewidth Bounds for Conjunctive QueriesGeorg Gottlob, University of Oxford; et al.
2008Estimating PageRank on Graph StreamsAtish Das Sarma, Georgia Institute of Technology; et al.
2007Generalized Hypertree Decompositions: NP-Hardness and Tractable VariantsGeorg Gottlob, University of Oxford; et al.
2006Two-variable logic on data trees and XML reasoningMikolaj Bojanczyk, Warsaw University; et al.
2005On the complexity of division and set joins in the relational algebraDirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum
XML data exchange: consistency and query answeringMarcelo Arenas & Leonid Libkin, University of Toronto
2004Conditional XPath, the first order complete XPath dialectMaarten Marx, University of Amsterdam
2003An Information-Theoretic Approach to Normal Forms for Relational and XML DataMarcelo Arenas & Leonid Libkin, University of Toronto
2002Monadic Datalog and the Expressive Power of Languages for Web Information ExtractionGeorg Gottlob & Christoph Koch, Technische Universität Wien
2001Optimal aggregation algorithms for middlewareRonald Fagin, IBM Research; et al.
2000Auditing Boolean attributesJon Kleinberg, Cornell University; et al.
1999Exact and approximate aggregation in constraint query languagesMichael Benefikt & Leonid Libkin, Bell Labs
1998A lower bound theorem for indexing schemes and its application to multidimensional range queriesVasilis Samoladas & Daniel P. Miranker, University of Texas at Austin
Expressiveness of structured document query languages based on attribute grammarsFrank Neven & Jan Van den Bussche, Limburgs Universitair Centrum
1997On the Complexity of Database QueriesChristos H. Papadimitriou, University of California Berkeley
Mihalis Yannakakis, Bell Labs
S&P (Security and Privacy)
2013Pinocchio: Nearly Practical Verifiable ComputationBryan Parno, Microsoft Research; et al.
2012Don't Trust Satellite Phones: A Security Analysis of Two Satphone StandardsBenedikt Driessen, Ruhr-Universität Bochum; et al.
2011Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iksAndrew M. White, University of North Carolina at Chapel Hill; et al.
2010SCiFI - A System for Secure Face IdentificationMargarita Osadchy, University of Haifa; et al.
2009Native Client: A Sandbox for Portable, Untrusted x86 Native CodeBennet Yee, Google; et al.
2008Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power DefensesDaniel Halperin, University of Washington; et al.
SIGCOMM (Networking)
2013Ambient Backscatter: Wireless Communication Out of Thin AirVincent Liu, University of Washington; et al.
2012Multi-Resource Fair Queueing for Packet ProcessingAli Ghodsi, University of California Berkeley; et al.
2011They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical DevicesShyamnath Gollakota, Massachusetts Institute of Technology; et al.
2010Efficient Error Estimating Coding: Feasibility and ApplicationsBinbin Chen, National University of Singapore; et al.
2009White Space Networking with Wi-Fi like ConnectivityParamvir Bahl, Microsoft Research; et al.
2008ZigZag Decoding: Combating Hidden Terminals in Wireless NetworksShyamnath Gollakota & Dina Katabi, Massachusetts Institute of Technology
SIGIR (Information Retrieval)
2013Beliefs and Biases in Web SearchRyen W. White, Microsoft Research
2012Time-Based Calibration of Effectiveness MeasuresMark Smucker & Charles Clarke, University of Waterloo
2011Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction DataMikhail Ageev, Moscow State University; et al.
2010Assessing the Scenic Route: Measuring the Value of Search Trails in Web LogsRyen W. White, Microsoft Research
Jeff Huang, University of Washington
2009Sources of evidence for vertical selectionJaime Arguello, Carnegie Mellon University; et al.
2008Algorithmic Mediation for Collaborative Exploratory SearchJeremy Pickens, FX Palo Alto Lab; et al.
2007Studying the Use of Popular Destinations to Enhance Web Search InteractionRyen W. White, Microsoft Research; et al.
2006Minimal Test Collections for Retrieval EvaluationBen Carterette, University of Massachusetts Amherst; et al.
2005Learning to estimate query difficulty: including applications to missing content detection and dis...Elad Yom-Tov, IBM Research; et al.
2004A Formal Study of Information Retrieval HeuristicsHui Fang, University of Illinois at Urbana-Champaign; et al.
2003Re-examining the potential effectiveness of interactive query expansionIan Ruthven, University of Strathclyde
2002Novelty and redundancy detection in adaptive filteringYi Zhang, Carnegie Mellon University; et al.
2001Temporal summaries of new topicsJames Allan, University of Massachusetts Amherst; et al.
2000IR evaluation methods for retrieving highly relevant documentsKalervo Järvelin & Jaana Kekäläinen, University of Tampere
1999Cross-language information retrieval based on parallel texts and automatic mining of parallel text...Jian-Yun Nie, Université de Montréal; et al.
1998A theory of term weighting based on exploratory data analysisWarren R. Greiff, University of Massachusetts Amherst
1997Feature selection, perceptron learning, and a usability case study for text categorizationHwee Tou Ng, DSO National Laboratories; et al.
1996Retrieving spoken documents by combining multiple index sourcesGareth Jones, University of Cambridge; et al.
SIGMETRICS (Performance)
2013Queueing System Topologies with Limited FlexibilityJohn Tsitsiklis & Kuang Xu, Massachusetts Institute of Technology
2012Temperature management in data centers: why some (might) like it hotNosayba El-Sayed, University of Toronto; et al.
2011Topology Discovery of Sparse Random Graphs With Few ParticipantsAnimashree Anandkumar, University of California Irvine; et al.
2010Load balancing via random local search in closed and open systemsAyalvadi Ganesh, University of Bristol; et al.
2009The Age of Gossip: Spatial Mean Field RegimeAugustin Chaintreau, Technicolor; et al.
2008Counter Braids: A Novel Counter Architecture for Per-Flow MeasurementYi Lu, Stanford University; et al.
2007Modeling the Relative Fitness of StorageMichael P. Mesnier, Intel; et al.
2006Maximizing throughput in wireless networks via gossipingEytan Modiano, Massachusetts Institute of Technology; et al.
2005Coupon replication systemsLaurent Massoulié & Milan Vojnović, Microsoft Research
2004On performance bounds for the integration of elastic and adaptive streaming flowsThomas Bonald & Alexandre Proutiere, France Telecom
1996Supporting stored video: reducing rate variability and end-to-end resource requirements through op...James D. Salehi, University of Massachusetts Amherst; et al.
Exploiting process lifetime distributions for dynamic load balancingMor Harchol-Balter & Allen B. Downey, University of California Berkeley
SIGMOD (Databases)
2013Massive Graph TriangulationXiaocheng Hu, The Chinese University of Hong Kong; et al.
2012High-Performance Complex Event Processing over XML StreamsBarzan Mozafari, Massachusetts Institute of Technology; et al.
2011Entangled Queries: Enabling Declarative Data-Driven CoordinationNitin Gupta, Cornell University; et al.
2010FAST: fast architecture sensitive tree search on modern CPUs and GPUsChangkyu Kim, Intel; et al.
2009Generating example data for dataflow programsChristopher Olston, Yahoo! Research; et al.
2008Serializable isolation for snapshot databasesMichael J. Cahill, University of Sydney; et al.
2007Compiling mappings to bridge applications and databasesSergey Melnik, Microsoft Research; et al.
2006To search or to crawl?: towards a query optimizer for text-centric tasksPanagiotis G. Ipeirotis, New York University; et al.
2004Indexing spatio-temporal trajectories with Chebyshev polynomialsYuhan Cai & Raymond T. Ng, University of British Columbia
2003Spreadsheets in RDBMS for OLAPAndrew Witkowski, Oracle; et al.
2001Locally adaptive dimensionality reduction for indexing large time series databasesEamonn Keogh, University of California Irvine; et al.
2000XMill: an efficient compressor for XML dataHartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories
1999DynaMat: a dynamic view management system for data warehousesYannis Kotidis & Nick Roussopoulos, University of Maryland
1998Efficient transparent application recovery in client-server information systemsDavid Lomet & Gerhard Weikum, Microsoft Research
1997Fast parallel similarity search in multimedia databasesStefan Berchtold, University of Munich; et al.
1996Implementing data cubes efficientlyVenky Harinarayan, Stanford University; et al.
SODA (Theory)
2014Polynomiality for Bin Packing with a Constant Number of Item TypesMichel X. Goemans & Thomas Rothvoss, Massachusetts Institute of Technology
An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommod...Jonathan A. Kelner, Massachusetts Institute of Technology; et al.
2013A Simple Algorithm for the Graph Minor Decomposition - Logic meets Structural Graph TheoryMartin Grohe, RWTH Aachen University; et al.
Dynamic graph connectivity in polylogarithmic worst case timeBruce M. Kapron, University of Victoria; et al.
2012Computing all maps into a sphereMartin Čadek, Masaryk University; et al.
2011An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss TransformNir Ailon, Technion
Edo Liberty, Yahoo! Research
2010An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman ProblemArash Asadpour, Stanford University; et al.
2009Natural AlgorithmsBernard Chazelle, Princeton University
SOSP (Operating Systems)
2013Towards optimization-safe systems: analyzing the impact of undefined behaviorXi Wang, Massachusetts Institute of Technology; et al.
Naiad: A Timely Dataflow SystemDerek G. Murray, Microsoft Research; et al.
The Scalable Commutativity Rule: Designing Scalable Software for Multicore ProcessorsAustin T. Clements, Massachusetts Institute of Technology; et al.
2011A File is Not a File: Understanding the I/O Behavior of Apple Desktop ApplicationsTyler Harter, University of Wisconsin; et al.
Cells: A Virtual Mobile Smartphone ArchitectureJeremy Andrus, Columbia University; et al.
2009FAWN: A Fast Array of Wimpy NodesDavid G. Andersen, Carnegie Mellon University; et al.
seL4: Formal Verification of an OS KernelGerwin Klein, NICTA; et al.
RouteBricks: Exploiting Parallelism to Scale Software RoutersMihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al.
2007Zyzzyva: speculative byzantine fault toleranceRamakrishna Kotla, University of Texas at Austin; et al.
Sinfonia: a new paradigm for building scalable distributed systemsMarcos K. Aguilera, Hewlett-Packard Labs; et al.
Secure Web Applications via Automatic PartitioningStephen Chong, Cornell University; et al.
2005Speculative Execution in a Distributed File SystemEdmund B. Nightingale, University of Michigan; et al.
BAR Tolerance for Cooperative ServicesAmitanand S. Aiyer, University of Texas at Austin; et al.
Rx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, University of Illinois at Urbana-Champaign; et al.
Vigilante: End-to-End Containment of Internet WormsManuel Costa, University of Cambridge; et al.
2003Backtracking intrusionsSamuel T. King & Peter M. Chen, University of Michigan
Preserving peer replicas by rate-limited sampled votingPetros Maniatis, Stanford University; et al.
Improving the Reliability of Commodity Operating SystemsMichael M. Swift, University of Washington; et al.
2001BASE: using abstraction to improve fault toleranceRodrigo Rodrigues, Massachusetts Institute of Technology; et al.
Untrusted hosts and confidentiality: secure program partitioningSteve Zdancewic, Cornell University; et al.
1999Cellular Disco: resource management using virtual clusters on shared-memory multiprocessorsKinshuk Govil, Stanford University; et al.
Soft timers: efficient microsecond software timer support for network processingMohit Aron & Peter Druschel, Rice University
The Click modular routerRobert Morris, Massachusetts Institute of Technology; et al.
Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail se...Yasushi Saito, University of Washington; et al.
1997Continuous profiling: where have all the cycles gone?Jennifer M. Anderson, Digital Equipment Corporation; et al.
Disco: running commodity operating systems on scalable multiprocessorsEdouard Bugnion, Stanford University; et al.
Eraser: a dynamic data race detector for multithreaded programsStefan Savage, University of Washington; et al.
STOC (Theory)
2013Approximation Resistance from Pairwise Independent SubgroupsSiu On Chan, University of California Berkeley
Low Rank Approximation and Regression in Input Sparsity TimeKenneth L. Clarkson & David P. Woodruff, IBM Research
2012Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower BoundsSamuel Fiorini, Université libre de Bruxelles; et al.
The Cell Probe Complexity of Dynamic Range CountingKasper Larsen, Aarhus University
2011Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphsPaul Christiano, Massachusetts Institute of Technology; et al.
Subexponential lower bounds for randomized pivoting rules for the simplex algorithmOliver Friedmann, University of Munich; et al.
2010An improved LP-based approximation for steiner treeJaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al.
QIP = PSPACERahul Jain, National University of Singapore; et al.
2009A constructive proof of the Lovász local lemmaRobin A. Moser, ETH Zurich
Public-Key Cryptosystems from the Worst-Case Shortest Vector ProblemChris Peikert, SRI International
2008Optimal algorithms and inapproximability results for every CSP?Prasad Raghavendra, University of Washington
Optimal hierarchical decompositions for congestion minimization in networksHarald Räcke, University of Warwick
2007Faster integer multiplicationMartin Fürer, Pennsylvania State University
Towards 3-query locally decodable codes of subexponential lengthSergey Yekhanin, Massachusetts Institute of Technology
2006The PCP theorem by gap amplificationIrit Dinur, Hebrew University
2005Undirected ST-connectivity in log-spaceOmer Reingold, Weizmann Institute of Science
2004Multi-linear formulas for permanent and determinant are of super-polynomial sizeRan Raz, Weizmann Institute of Science
Expander flows, geometric embeddings and graph partitioningSanjeev Arora, Princeton University; et al.
2003Derandomizing polynomial identity tests means proving circuit lower boundsValentine Kabanets & Russell Impagliazzo, University of California San Diego
New lattice-based cryptographic constructionsOded Regev, Tel-Aviv University
UIST (User Interface)
2013PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing InterfacesLining Yao, Massachusetts Institute of Technology; et al.
Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic SensingMakoto Ono, University of Tsukuba; et al.
Fiberio: A Touchscreen that Senses FingerprintsChristian Holz & Patrick Baudisch, Hasso Plattner Institute
2012CrowdScape: interactively visualizing user behavior and outputJeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University
Cliplets: juxtaposing still and dynamic imageryNeel Joshi, Microsoft Research; et al.
Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Chang...Sean Follmer, Massachusetts Institute of Technology; et al.
2011SideBySide: Ad-hoc Multi-user Interaction with Handheld ProjectorsKarl D.D. Willis, Carnegie Mellon University; et al.
2010VizWiz: nearly real-time answers to visual questionsJeffrey P. Bigham, University of Rochester; et al.
2009Mouse 2.0: Multi-touch meets the MouseNicolas Villar, Microsoft Research; et al.
2008Bringing Physics to the SurfaceAndrew D. Wilson, Microsoft Research; et al.
2007ThinSight: Versatile Multi-touch Sensing for Thin Form-factor DisplaysSteve Hodges, Microsoft Research; et al.
2006Reflective Physical Prototyping through Integrated Design, Test, and AnalysisBjörn Hartmann, Stanford University; et al.
2005Automation and Customization of Rendered Web PagesMichael Bolin, Massachusetts Institute of Technology; et al.
2004Multi-Finger Gestural Interaction with 3D Volumetric DisplaysTovi Grossman, University of Toronto; et al.
CrossY: A Crossing-Based Drawing ApplicationGeorg Apitz & François Guimbretière, University of Maryland
2003Perceptually-Supported Image Editing of Text and GraphicsEric Saund, Palo Alto Research Center; et al.
2002Clothing ManipulationTakeo Igarashi, University of Tokyo
John F. Hughes, Brown University
2001Phidgets: Easy Development of Physical Interfaces through Physical WidgetsSaul Greenberg & Chester Fitchett, University of Calgary
2000Sensing Techniques for Mobile InteractionKen Hinckley, Microsoft Research; et al.
1996Indigo: A Local Propagation Algorithm for Inequality ConstraintsAlan Borning, University of Washington; et al.
VLDB (Databases)
2013DisC Diversity: Result Diversification based on Dissimilarity and CoverageMarina Drosou & Evaggelia Pitoura, University of Ioannina
2012Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story IdentificationAlbert Angel, University of Toronto; et al.
2011RemusDB: Transparent High-Availability for Database SystemsUmar Farooq Minhas, University of Waterloo; et al.
2010Towards Certain Fixes with Editing Rules and Master DataShuai Ma, University of Edinburgh; et al.
2009A Unified Approach to Ranking in Probabilistic DatabasesJian Li, University of Maryland; et al.
2008Finding Frequent Items in Data StreamsGraham Cormode & Marios Hadjieleftheriou, AT&T Laboratories
Constrained Physical Design TuningNicolas Bruno & Surajit Chaudhuri, Microsoft Research
2007Scalable Semantic Web Data Management Using Vertical PartitioningDaniel J. Abadi, Massachusetts Institute of Technology; et al.
2006Trustworthy Keyword Search for Regulatory-Compliant Records RetentionSoumyadeb Mitra, University of Illinois at Urbana-Champaign; et al.
2005Cache-conscious Frequent Pattern Mining on a Modern ProcessorAmol Ghoting, Ohio State University; et al.
2004Model-Driven Data Acquisition in Sensor NetworksAmol Deshpande, University of California Berkeley; et al.
2001Weaving Relations for Cache PerformanceAnastassia Ailamaki, Carnegie Mellon University; et al.
1997Integrating Reliable Memory in DatabasesWee Teck Ng & Peter M. Chen, University of Michigan
WWW (World Wide Web)
2013No Country for Old Members: User Lifecycle and Linguistic Change in Online CommunitiesCristian Danescu-Niculescu-Mizil, Stanford University; et al.
2012Counting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the StandardMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.
2011Towards a theory model for product searchBeibei Li, New York University; et al.
2010Factorizing personalized Markov chains for next-basket recommendationSteffen Rendle, Osaka University; et al.
2009Hybrid keyword search auctionsAshish Goel, Stanford University
Kamesh Munagala, Duke University
2008IRLbot: Scaling to 6 billion pages and beyondHsin-Tsang Lee, Texas A&M University; et al.
2007Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganogra...Lars Backstrom, Cornell University; et al.
2006Random Sampling from a Search Engine's IndexZiv Bar-Yossef & Maxim Gurevich, Technion
2005Three-level caching for efficient query processing in large Web search enginesXiaohui Long & Torsten Suel, Polytechnic Institute of New York University
2004Automatic detection of fragments in dynamically generated web pagesLakshmish Ramaswamy, Georgia Institute of Technology; et al.
2003Scaling personalized web searchGlen Jeh & Jennifer Widom, Stanford University
SemTag and seeker: bootstrapping the semantic web via automated semantic annotationStephen Dill, IBM Research; et al.
2002Abstracting application-level web securityDavid Scott & Richard Sharp, University of Cambridge
2001Engineering Server Driven Consistency for Large Scale Dynamic Web ServicesJian Yin, University of Texas at Austin; et al.
2000Graph Structure in the WebAndrei Broder, AltaVista; et al.
1999Focused Crawling: A New Approach to Topic-Specific Web Resource DiscoverySoumen Chakrabarti, Indian Institute of Technology; et al.
1998The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/videoKevin C. Almeroth, University of California Santa Barbara
Mostafa H. Ammar, Georgia Institute of Technology


Institutions with Best Papers
Microsoft Research32.4
Stanford University26.8
Massachusetts Institute of Technology26.6
University of Washington24.1
Carnegie Mellon University22.9
University of California Berkeley19.5
University of Toronto13.3
Cornell University12.9
IBM Research11.5
University of Illinois at Urbana-Champaign10.3
University of Texas at Austin9.4
University of British Columbia9.4
University of Massachusetts Amherst7.2
Yahoo! Research6.8
Google6.8
University of California Irvine6.5
University of Oxford6.2
Georgia Institute of Technology6.0
École Polytechnique Fédérale de Lausanne5.9
Princeton University5.6
University of Maryland5.6
University of Michigan5.2
AT&T Laboratories4.9
McGill University4.7
Weizmann Institute of Science4.5
University of Wisconsin4.3
University of Nottingham4.3
Rice University4.2
University of California San Diego4.2
Technion3.8
Hewlett-Packard Labs3.7
University of North Carolina at Chapel Hill3.4
Brown University3.3
Bell Labs3.3
Université Paris-Sud3.1
Columbia University3.1
National University of Singapore3.0
DePaul University3.0
Delft University of Technology3.0
Hasso Plattner Institute3.0
University of Alberta3.0
Indiana University at Bloomington3.0
Technische Universität Berlin2.7
NEC Labs America2.7
University of Waterloo2.7
University of Nebraska-Lincoln2.6
University of California Davis2.6
Max Planck Institut2.6
University of Cambridge2.6
The Chinese University of Hong Kong2.5
Ohio State University2.4
Duke University2.3
Toyota Technological Institute at Chicago2.3
University of Pennsylvania2.3
Aarhus University2.3
RWTH Aachen University2.2
Tel-Aviv University2.2
University of Calgary2.1
Saarland University2.1
Intel Research2.0
Polytechnic Institute of New York University2.0
University College London2.0
Universidade Técnica de Lisboa2.0
NASA Ames Research Center2.0
Purdue University2.0
BBN Technologies2.0

Credit is given in decreasing author order as customary in many fields. First authors are given 1 point, second authors are given 0.5 points, third authors are given 0.33 points, etc. These points are then divided by the sum of points for that paper, i.e. normalizing it. This ranking may be inaccurate or incomplete, may not reflect the current state of best paper awards, and is not an official list. If you are not satisfied with the ranking listed here, please disregard it.


Back to Jeff Huang's Homepage


Page last updated: 2014-04-03

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值