计算机、机器视觉、图像处理顶级会议的最佳论文Best Paper Awards in Computer Science
BestPaper Awards in Computer Science (since 1996)
By Conference: AAAI ACL CHI CIKM CVPR FOCS FSE ICCV ICML ICSE IJCAI INFOCOM KDD NSDI OSDI PLDI PODS S&P SIGCOMM SIGIR SIGMETRICS SIGMOD SODA SOSP STOC UIST VLDB WWW
Institutionswith the most Best Papers
Much of this data was entered byhand (obtained by contacting past conference organizers, retrieving cachedconference websites, and searching CVs) so please email me if you notice anyerrors or omissions: bestpaper-AT-jeffhuang.com. I tried to collect best paperawards from the top-tier conferences in each area, but some conferences do nothave such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award"and "outstanding paper award" are included but not "best studentpaper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL)
| AAAI (Artificial Intelligence)**** |
|---|
| 2012 | Document Summarization Based on Data Reconstruction | Zhanying He, Zhejiang University; et al. Chun Chen, Zhejiang University
Jiajun Bu, Zhejiang University
Can Wang, Zhejiang University
Lijan Zhang, Zhejiang University
Deng Cai, Zhejiang University
Xiaofei He, Zhejiang University |
|Learning SVM Classiiers with Indeinite Kernels|Suicheng Gu & Yuhong Guo, Temple University|
| 2011 | Dynamic Resource Allocation in Conservation Planning | Daniel Golovin, California Institute of Technology; et al. Andreas Krause, ETH Zurich
Beth Gardner, North Carolina State University
Sarah J. Converse, Patuxent Wildlife Research Center
Steve Morey, U.S. Fish and Wildlife Service |
| Complexity of and Algorithms for Borda Manipulation | Jessica Davies, University of Toronto; et al. George Katsirelos, Université Paris-Sud
Nina Narodytska, University of New South Wales
Toby Walsh, NICTA |
| 2010 | How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Ans... | Giorgos Stoilos, Oxford University; et al. Bernardo Cuenca Grau, Oxford University
Ian Horrocks, Oxford University |
| A Novel Transition Based Encoding Scheme for Planning as Satisfiability | Ruoyun Huang, Washington University in St. Louis; et al. Yixin Chen, Washington University in St. Louis
Weixiong Zhang, Washington University in St. Louis |
| 2008 | How Good is Almost Perfect? | Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg |
|---|
| 2007 | PLOW: A Collaborative Task Learning Agent | James Allen, Institute for Human and Machine Cognition; et al. Nathanael Chambers, Stanford University
George Ferguson, University of Rochester
Lucian Galescu, Institute for Human and Machine Cognition
Hyuckchul Jung, Institute for Human and Machine Cognition
Mary Swift, University of Rochester
William Taysom, Institute for Human and Machine Cognition |
|Thresholded Rewards: Acting Optimally in Timed, Zero-Sum Games|Colin McMillen & Manuela Veloso, Carnegie Mellon University|
| 2006 | Model Counting: A New Strategy for Obtaining Good Bounds | Carla P. Gomes, Cornell University; et al. Ashish Sabharwal, Cornell University
Bart Selman, Cornell University |
| Towards an Axiom System for Default Logic | Gerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto |
| 2005 | The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic Selection | Vincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University |
| 2004 | Learning and Inferring Transportation Routines | Lin Liao, University of Washington; et al. Dieter Fox, University of Washington
Henry Kautz, University of Washington |
| 2002 | On Computing All Abductive Explanations | Thomas Eiter, Technische Universität Wien
Kazuhisa Makino, Osaka University |
|2000|The Game of Hex: An Automatic Theorem-Proving Approach to Game Programming|Vadim V. Anshelevich, Vanshel Consulting|
| 1999 | PROVERB: The Probabilistic Cruciverbalist | Greg A. Keim, Duke University; et al. Noam M. Shazeer, Duke University
Michael L. Littman, Duke University
Sushant Agarwal, Duke University
Catherine M. Cheves, Duke University
Joseph Fitzgerald, Duke University
Jason Grosland, Duke University
Fan Jiang, Duke University
Shannon Pollard, Duke University
Karl Weinmeister, Duke University |
| 1998 | Learning Evaluation Functions for Global Optimization and Boolean Satisfiability | Justin A. Boyan & Andrew W. Moore, Carnegie Mellon University |
|---|
| The Interactive Museum Tour-Guide Robot | Wolfram Burgard, University of Bonn; et al. Armin B. Cremers, University of Bonn
Dieter Fox, University of Bonn
Dirk Hähnel, University of Bonn
Gerhard Lakemeyer, Aachen University of Technology
Dirk Schulz, University of Bonn
Walter Steiner, University of Bonn
Sebastian Thrun, Carnegie Mellon University |
| 1997 | Statistical Parsing with a Context-Free Grammar and Word Statistics | Eugene Charniak, Brown University |
|---|---|---|
| Fast Context Switching in Real-Time Propositional Reasoning | P. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center |
| Building Concept Representations from Reusable Components | Peter Clark, Boeing
Bruce Porter, University of Texas at Austin |
| 1996 | Verification of Knowledge Bases Based on Containment Checking | Alon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, Université Paris-Sud |
| A Novel Application of Theory Refinement to Student Modeling | Paul T. Baffes, SciComp
Raymond J. Mooney, University of Texas at Austin |
| Pushing the Envelope: Planning, Propositional Logic, and Stochastic Search | Henry Kautz & Bart Selman, AT&T Laboratories |
|---|
| 2012 | String Re-writing Kernel | Fan Bu, Tsinghua University; et al. Hang Li, Microsoft Research
Xiaoyan Zhu, Tsinghua University |
| Bayesian Symbol-Refined Tree Substitution Grammars for Syntactic Parsing | Hiroyuki Shindo, NTT Communication Science Laboratories; et al. Yusuke Miyao, National Institute of Informatics
Akinori Fujino, NTT Communication Science Laboratories
Masaaki Nagata, NTT Communication Science Laboratories |
| 2011 | Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based Projections | Dipanjan Das, Carnegie Mellon University
Slav Petrov, Google |
|2010|Beyond NomBank: A Study of Implicit Arguments for Nominal Predicates|Matthew Gerber & Joyce Y. Chai, Michigan State University|
| 2009 | Reinforcement Learning for Mapping Instructions to Actions | S.R.K. Branavan, Massachusetts Institute of Technology; et al. Harr Chen, Massachusetts Institute of Technology
Luke S. Zettlemoyer, Massachusetts Institute of Technology
Regina Barzilay, Massachusetts Institute of Technology |
|K-Best A* Parsing|Adam Pauls & Dan Klein, University of California Berkeley|
| Concise Integer Linear Programming Formulations for Dependency Parsing | André F.T. Martins, Instituto de Telecomunicações; et al. Noah A. Smith, Carnegie Mellon University
Eric P. Xing, Carnegie Mellon University |
|2008|Forest Reranking: Discriminative Parsing with Non-Local Features|Liang Huang, University of Pennsylvania|
| A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language Model | Libin Shen, BBN Technologies; et al. Jinxi Xu, BBN Technologies
Ralph Weischedel, BBN Technologies |
|2007|Learning synchronous grammars for semantic parsing with lambda calculus|Yuk Wah Wong & Raymond J. Mooney, University of Texas at Austin|
| 2006 | Semantic taxonomy induction from heterogenous evidence | Rion Snow, Stanford University; et al. Daniel Jurafsky, Stanford University
Andrew Y. Ng, Stanford University |
|2005|A Hierarchical Phrase-Based Model for Statistical Machine Translation|David Chiang, University of Maryland|
| 2004 | Finding Predominant Word Senses in Untagged Text | Diana McCarthy, University of Sussex; et al. Rob Koeling, University of Sussex
Julie Weeds, University of Sussex
John Carroll, University of Sussex |
|2003|Accurate Unlexicalized Parsing|Dan Klein & Christopher D. Manning, Stanford University|
| Towards a Model of Face-to-Face Grounding | Yukiko I. Nakano, RISTEX; et al. Gabe Reinstein, Massachusetts Institute of Technology
Tom Stocky, Massachusetts Institute of Technology
Justine Cassell, Massachusetts Institute of Technology |
| 2002 | Discriminative Training and Maximum Entropy Models for Statistical Machine Translation | Franz Josef Och & Hermann Ney, RWTH Aachen University |
|---|
| Fast Decoding and Optimal Decoding for Machine Translation | Ulrich Germann, University of Southern California; et al. Michael Jahr, Stanford University
Kevin Knight, University of Southern California
Daniel Marcu, University of Southern California
Kenji Yamada, University of Southern California |
|CHI (Human-Computer Interaction)****|
| 2012 | Uncomfortable Interactions | Steve Benford, University of Nottingham; et al. Chris Greenhalgh, University of Nottingham
Gabriella Giannachi, University of Exeter
Brendan Walker, University of Nottingham
Joe Marshall, University of Nottingham
Tom Rodden, University of Nottingham |
| ClayVision: The (Elastic) Image of the City | Yuichiro Takeuchi, Sony Computer Science Laboratories
Ken Perlin, New York University |
| Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCI | Ylva Fernaeus, KTH Royal Institute of Technology; et al. Martin Jonssonm, Södertörn University
Jakob Tholanderm, Stockholm University |
| Personas and Decision Making in the Design Process: An Ethnographic Case Study | Erin Friess, University of North Texas |
|---|
| Observational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobil... | Niels Henze, University of Oldenburg; et al. Enrico Rukzio, University of Duisburg-Essen
Susanne Boll, University of Oldenburg |
| Looking Glass: A Field Study on Noticing Interactivity of Shop Windows | Jörg Müller, Technische Universität Berlin; et al. Robert Walter, Technische Universität Berlin
Gilles Bailly, Technische Universität Berlin
Michael Nischt, Technische Universität Berlin
Florian Alt, University of Stuttgart |
| Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday Objects | Munehiko Sato, Disney Research; et al. Ivan Poupyrev, Disney Research
Chris Harrison, Disney Research |
| Affordances in HCI: Toward a Mediated Action Perspective | Victor Kaptelinin, University of Bergen
Bonnie Nardi, University of California Irvine |
| Using Rhythmic Patterns as an Input Method | Emilien Ghomi, Université Paris-Sud; et al. Guillaume Faure, Université Paris-Sud
Stephane Huot, Université Paris-Sud
Olivier Chapuis, Université Paris-Sud
Michel Beaudouin-Lafon, Université Paris-Sud |
| The Normal Natural Troubles of Driving with GPS | Barry Brown, Stockholm University
Eric Laurier, University of Edinburgh |
| Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical Kiosks | Kurtis Heimerl, University of California Berkeley; et al. Brian Gawalt, University of California Berkeley
Kuang Chen, University of California Berkeley
Tapan S. Parikh, University of California Berkeley
Björn Hartmann, University of California Berkeley |
| Improving Command Selection with CommandMaps | Joey Scarr, University of Canterbury; et al. Andy Cockburn, University of Canterbury
Carl Gutwin, University of Saskatchewan
Andrea Bunt, University of Manitoba |
| Empathy, Participatory Design and People with Dementia | Stephen Lindsay, Newcastle University; et al. Katie Britain, Newcastle University
Daniel Jackson, Newcastle University
Cassim Ladha, Newcastle University
Karim Ladha, Newcastle University
Patrick Olivier, Newcastle University |
| 2011 | Usable Gestures for Blind People: Understanding Preference and Performance | Shaun K. Kane, University of Washington; et al. Jacob O. Wobbrock, University of Washington
Richard E. Ladner, University of Washington |
| Effects of Community Size and Contact Rate in Synchronous Social Q&A | Ryen W. White, Microsoft Research; et al. Matthew Richardson, Microsoft Research
Yandong Liu, Carnegie Mellon University |
| Teenagers and Their Virtual Possessions: Design Opportunities and Issues | William Odom, Carnegie Mellon University; et al. John Zimmerman, Carnegie Mellon University
Jodi Forlizzi, Carnegie Mellon University |
| Enhancing Physicality in Touch Interaction with Programmable Friction | Vincent Levesque, University of British Columbia; et al. Louise Oram, University of British Columbia
Karon MacLean, University of British Columbia
Andy Cockburn, University of Canterbury
Nicholas D. Marchuk, Northwestern University
Dan Johnson, Northwestern University
J. Edward Colgate, Northwestern University |
| Mid-air Pan-and-Zoom on Wall-sized Displays | Mathieu Nancel, Université Paris-Sud; et al. Julie Wagner, INRIA
Emmanuel Pietriga, INRIA
Olivier Chapuis, Université Paris-Sud
Wendy Mackay, INRIA |
| Bricolage: Example-Based Retargeting for Web Design | Ranjitha Kumar, Stanford University; et al. Jerry Talton, Stanford University
Salman Ahmad, Stanford University
Scott Klemmer, Stanford University |
| Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual E... | Thomas Erickson, IBM Research; et al. N. Sadat Shami, IBM Research
Wendy A. Kellogg, IBM Research
David W. Levine, IBM Research |
|In the Shadow of Misperception: Assistive Technology Use and Social Interactions|Kristen Shinohara & Jacob O. Wobbrock, University of Washington|
| Why is My Internet Slow?: Making Network Speeds Visible | Marshini Chetty, Georgia Institute of Technology; et al. David Haslem, Orange Sparkle Ball
Andrew Baird, Amazon
Ugochi Ofoha, Georgia Institute of Technology
Bethany Sumner, Georgia Institute of Technology
Rebecca Grinter, Georgia Institute of Technology |
|Ease of Juggling: Studying the Effects of Manual Multitasking|Antti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University|
| Automics: souvenir generating photoware for theme parks | Abigail Durrant, University of Nottingham; et al. Duncan Rowland, University of Lincoln
David S. Kirk, University of Nottingham
Steve Benford, University of Nottingham
Joel E. Fischer, University of Nottingham
Derek McAuley, University of Nottingham
Michael A. Peshkin, Northwestern University |
| Your Noise is My Command: Sensing Gestures Using the Body as an Antenna | Gabe Cohn, University of Washington; et al. Daniel Morris, Microsoft Research
Shwetak N. Patel, University of Washington
Desney Tan, Microsoft Research |
| Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Wor... | Koji Yatani, University of Toronto; et al. Michael Novati, University of Toronto
Andrew Trusty, University of Toronto
Khai N. Truong, University of Toronto |
| 2010 | Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber Bundles | Patrick Baudisch, Hasso Plattner Institute; et al. Torsten Becker, Hasso Plattner Institute
Frederik Rudeck, Hasso Plattner Institute |
| Mapping the Landscape of Sustainable HCI | Carl DiSalvo, Georgia Institute of Technology; et al. Phoebe Sengers, Cornell University
Hrönn Brynjarsdóttir, Cornell University |
|Occlusion-Aware Interfaces|Daniel Vogel & Ravin Balakrishnan, University of Toronto|
| Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural India | Neil Patel, Stanford University; et al. Deepti Chittamuru, University of California Berkeley
Anupam Jain, IBM Research
Paresh Dave, Development Support Center
Tapan S. Parikh, University of California Berkeley |
| How does search behavior change as search becomes more difficult? | Anne Aula, Google; et al. Rehan M. Khan, Google
Zhiwei Guan, Google |
|The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Co...|Brent Hecht & Darren Gergle, Northwestern University|
| Skinput: Appropriating the Body as an Input Surface | Chris Harrison, Carnegie Mellon University; et al. Desney Tan, Microsoft Research
Dan Morris, Microsoft Research |
| Mobile-izing Health Workers in Rural India | Divya Ramachandran, University of California Berkeley; et al. John Canny, University of California Berkeley
Prabhu Dutta Das, Dhirubhai Ambani Institute of Information and Communications Technology
Edward Cutrell, Microsoft Research |
| The Design of Eco-Feedback Technology | Jon Froehlich, University of Washington; et al. Leah Findlater, University of Washington
James Landay, University of Washington |
| Feminist HCI: Taking Stock and Outlining an Agenda for Design | Shaowen Bardzell, Indiana University at Bloomington |
|---|
| Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of Charts | Scott Bateman, University of Saskatchewan; et al. Regan L. Mandryk, University of Saskatchewan
Carl Gutwin, University of Saskatchewan
Aaron Genest, University of Saskatchewan
David McDine, University of Saskatchewan
Christopher Brooks, University of Saskatchewan |
| 2009 | From Interaction to Trajectories: Designing Coherent Journeys Through User Experiences | Steve Benford, University of Nottingham; et al. Gabriella Giannachi, University of Exeter
Boriana Koleva, University of Nottingham
Tom Rodden, University of Nottingham |
| Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Ser... | Jeffrey Heer, Stanford University; et al. Nicholas Kong, University of California Berkeley
Maneesh Agrawala, University of California Berkeley |
|Predicting Tie Strength With Social Media|Eric Gilbert & Karrie Karahalios, University of Illinois at Urbana-Champaign|
| Musink: Composing Music through Augmented Drawing | Theophanis Tsandilas, Université Paris-Sud; et al. Catherine Letondal, Université Paris-Sud
Wendy E. Mackay, Université Paris-Sud |
| Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector Exhibits | Scott S. Snibbe, Sona Research
Hayes S. Raffle, Massachusetts Institute of Technology |
| Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection Performance | Leah Findlater, University of British Columbia; et al. Karyn Moffatt, University of British Columbia
Joanna McGrenere, University of British Columbia
Jessica Dawson, University of British Columbia |
| Undo and Erase Events as Indicators of Usability Problems | David Akers, Stanford University; et al. Matthew Simpson, Google
Robin Jeffries, Google
Terry Winograd, Stanford University |
| 2008 | In-Car GPS Navigation: Engagement with and Disengagement from the Environment | Gilly Leshed, Cornell University; et al. Theresa Velden, Cornell University
Oya Rieger, Cornell University
Blazej Kot, Cornell University
Phoebe Sengers, Cornell University |
| Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Inte... | Krzysztof Z. Gajos, University of Washington; et al. Jacob O. Wobbrock, University of Washington
Daniel S. Weld, University of Washington |
| Large Scale Analysis of Web Revisitation Patterns | Eytan Adar, University of Washington; et al. Jaime Teevan, Microsoft Research
Susan T. Dumais, Microsoft Research |
|Designs on Dignity: Perceptions of Technology Among the Homeless|Christopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology|
| The Network in the Garden: An Empirical Analysis of Social Media in Rural Life | Eric Gilbert, University of Illinois at Urbana-Champaign; et al. Karrie Karahalios, University of Illinois at Urbana-Champaign
Christian Sandvig, University of Illinois at Urbana-Champaign |
| Multimodal collaborative handwriting training for visually-impaired people | Beryl Plimmer, University of Auckland; et al. Andrew Crossan, University of Glasgow
Stephen A. Brewster, University of Glasgow
Rachel Blagojevic, University of Auckland |
| An Error Model for Pointing Based on Fitts' Law | Jacob O. Wobbrock, University of Washington; et al. Edward Cutrell, Microsoft Research
Susumu Harada, University of Washington
I. Scott MacKenzie, York University |
| 2007 | Multiview: improving trust in group video conferencing through spatial faithfulness | David T. Nguyen & John Canny, University of California Berkeley |
|---|
| Shift: a technique for operating pen-based interfaces using touch | Daniel Vogel, University of Toronto
Patrick Baudisch, Microsoft Research |
| Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognit... | Björn Hartmann, Stanford University; et al. Leith Abdulla, Stanford University
Manas Mittal, Massachusetts Institute of Technology
Scott R. Klemmer, Stanford University |
|Sustainable interaction design: invention & disposal, renewal & reuse|Eli Blevis, Indiana University at Bloomington|
| Consuming video on Mobile devices | Kenton O'Hara, Hewlett-Packard Labs; et al. April Slayden Mitchell, Hewlett-Packard Labs
Alex Vorbau, Hewlett-Packard Labs |
| 2006 | Trackball text entry for people with motor impairments | Jacob O. Wobbrock & Brad Myers, Carnegie Mellon University |
|---|
| A role for haptics in mobile interaction: initial design using a handheld tactile display prototype | Joseph Luk, University of British Columbia; et al. Jérôme Pasquero, McGill University
Shannon Little, University of British Columbia
Karon MacLean, University of British Columbia
Vincent Lévesque, McGill University
Vincent Hayward, McGill University |
| 2005 | Making space for stories: ambiguity in the design of personal communication systems | Paul M. Aoki, Palo Alto Research Center
Allison Woodruff, Intel Research |
| Examining Task Engagement in Sensor-Based Statistical Models of Human Interruptibility | James Fogarty, Carnegie Mellon University; et al. Andrew J. Ko, Carnegie Mellon University
Htet Htet Aung, Carnegie Mellon University
Elspeth Golden, Carnegie Mellon University
Karen P. Tang, Carnegie Mellon University
Scott E. Hudson, Carnegie Mellon University |
| Designing the spectator experience | Stuart Reeves, University of Nottingham; et al. Steve Benford, University of Nottingham
Claire O'Malley, University of Nottingham
Mike Fraser, University of Bristol |
| The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation area | Tovi Grossman & Ravin Balakrishnan, University of Toronto |
|---|
| 2012 | Gelling, and Melting, Large Graphs by Edge Manipulation | Hanghang Tong, IBM Research; et al. B. Aditya Prakash, Virginia Tech
Tina Eliassi-Rad, Rutgers University
Michalis Faloutsos, University of California Riverside
Christos Faloutsos, Carnegie Mellon University |
| 2011 | Intent-aware query similarity | Jiafeng Guo, Chinese Academy of Sciences; et al. Xueqi Cheng, Chinese Academy of Sciences
Gu Su, Microsoft Research
Xiaofei Zhu, Chinese Academy of Sciences |
|2010|MENTA: Inducing Multilingual Taxonomies from Wikipedia|Gerard de Melo & Gerhard Weikum, Max Planck Institut|
| FACeTOR: cost-driven exploration of faceted query results | Abhijith Kashyap, State University of New York at Buffalo; et al. Vagelis Hristidis, Florida International University
Michalis Petropoulos, State University of New York at Buffalo |
| 2009 | On the Feasibility of Multi-Site Web Search Engines | Ricardo Baeza-Yates, Yahoo! Research; et al. Aristides Gionis, Yahoo! Research
Flavio Junqueira, Yahoo! Research
Vassilis Plachouras, Yahoo! Research
Luca Telloli, Yahoo! Research |
| 2008 | Learning to Link with Wikipedia | David Milne & Ian H. Witten, Univerisity of Waikato |
|---|
| 2006 | Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing Indices | Segabtian Michel, Max Planck Institut; et al. Matthias Bender, Max Planck Institut
Nikos Ntarmos, RACTI and University of Patras
Peter Triantafillou, RACTI and University of Patras
Gerhard Weikum, Max Planck Institut
Christian Zimmer, Max Planck Institut |
| 2005 | Towards Automatic Association of Relevant Unstructured Content with Structured Query Results | Prasan Roy, IBM Research; et al. Mukesh Mohania, IBM Research
Bhuvan Bamba, Georgia Institute of Technology
Shree Raman, University of Massachusetts Amherst |
| 2004 | Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XML | Qiankun Zhao, Nanyang Technological University; et al. Sourav S Bhowmick, Nanyang Technological University
Mukesh Mohania, IBM Research
Yahiko Kambayashi, Kyoto University |
|CVPR (Computer Vision)****|
| 2012 | A Simple Prior-free Method for Non-Rigid Structure-from-Motion Factorization | Yuchao Dai, Northwestern Polytechnical University; et al. Hongdong Li, Australian National University
Mingyi He, Northwestern Polytechnical University |
| 2011 | Real-time Human Pose Recognition in Parts from Single Depth Images | Jamie Shotton, Microsoft Research; et al. Andrew Fitzgibbon, Microsoft Research
Mat Cook, Microsoft Research
Toby Sharp, Microsoft Research
Mark Finocchio, Microsoft Research
Richard Moore, Microsoft Research
Alex Kipman, Microsoft Research
Andrew Blake, Microsoft Research |
|2010|Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data usi...|Anders Eriksson & Anton va den Hendel, University of Adelaide|
| 2009 | Single Image Haze Removal Using Dark Channel Prior | Kaiming He, The Chinese University of Hong Kong; et al. Jian Sun, Microsoft Research
Xiaoou Tang, The Chinese University of Hong Kong |
| 2008 | Global Stereo Reconstruction under Second Order Smoothness Priors | Oliver Woodford, University of Oxford; et al. Ian Reid, Oxford Brookes University
Philip Torr, University of Oxford
Andrew Fitzgibbon, Microsoft Research |
| Beyond Sliding Windows: Object Localization by Efficient Subwindow Search | Chistoph H. Lampert, Max Planck Institut; et al. Matthew B. Blaschko, Max Planck Institut
Thomas Hodmann, Google |
| 2007 | Dynamic 3D Scene Analysis from a Moving Vehicle | Bastian Leibe, ETH Zurich; et al. Nico Cornelis, Katholieke Universiteit Leuven
Kurt COrnelis, Katholieke Universiteit Leuven
Luc Van Gool, ETH Zurich |
| 2006 | Putting Objects in Perspective | Derek Hoiem, Carnegie Mellon University; et al. Alexei Efros, Carnegie Mellon University
Martial Hebert, Carnegie Mellon University |
| 2005 | Real-Time Non-Rigid Surface Detection | Julien Pilet, École Polytechnique Fédérale de Lausanne; et al. Vincent Lepetit, École Polytechnique Fédérale de Lausanne
Pascal Fua, École Polytechnique Fédérale de Lausanne |
| 2004 | Programmable Imaging using a Digital Micromirror Array | Shree K. Nayar, Columbia University; et al. Vlad Branzoi, Columbia University
Terry E. Boult, University of Colorado |
| 2003 | Object Class Recognition by Unsupervised Scale-Invariant Learning | Rob Fergus, University of Oxford; et al. Pietro Perona, California Institute of Technology
Andrew Zisserman, University of Oxford |
|2001|Morphable 3D models from video|Matthew Brand, Mitsubishi Electric Research Laboratories|
| 2000 | Real-Time Tracking of Non-Rigid Objects using Mean Shift | Dorin Comaniciu, Siemens Corporate Research; et al. Visvanathan Ramesh, Siemens Corporate Research
Peter Meer, Rutgers University |
|FOCS (Theory)****|
| 2012 | A multi-prover interactive proof for NEXP sound against entangled provers | Tsuyoshi Ito, NEC Labs America
Thomas Vidick, Massachusetts Institute of Technology |
| A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2 | Julia Chuzhoy, Toyota Technological Institute at Chicago
Shi Li, Princeton University |
|2011|3-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ Hold in General|Timon Hertli, ETH Zurich|
| A Polylogarithmic-Competitive Algorithm for the k-Server Problem | Nikhil Bansal, IBM Research; et al. Niv Buchbinder, Open University
Aleksander M&acedil;dry, Massachusetts Institute of Technology
Joseph Naor, Technion |
|2010|Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke Decompositions|Matthew Andrews, Bell Labs|
| Subexponential Algorithms for Unique Games and Related Problems | Sanjeev Arora, Princeton University; et al. Boaz Barak, Princeton University
David Steurer, Princeton University |
| Computational Transition at the Uniqueness Threshold | Allan Sly, Microsoft Research |
|---|
| 2007 | Space-Efficient Identity Based Encryption Without Pairings | Dan Boneh, Stanford University; et al. Craig Gentry, Stanford University
Michael Hamburg, Stanford University |
| 2006 | Settling the Complexity of 2-Player Nash Equilibrium | Xi Chen, Tsinghua University
Xiaotie Deng, City University of Hong Kong |
| 2005 | The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type M... | Subhash A. Khot, Georgia Institute of Technology
Nisheeth K. Vishnoi, IBM Research |
|Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time|Farzad Parvaresh & Alexander Vardy, University of California San Diego|
| 2004 | Cryptography in NC0 | Benny Applebaum, Technion; et al. Yuval Ishai, Technion
Eyal Kushilevitz, Technion |
| Hardness of Approximating the Shortest Vector Problem in Lattices | Subhash Khot, Georgia Institute of Technology | |
|---|---|---|
| 2002 | A Dichotomy Theorem for Constraints on a Three-Element Set | Andrei A. Bulatov, University of Oxford |
| Minimizing Congestion in General Networks | Harald Räcke, Paderborn University | |
| Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model | Boaz Barak, Weizmann Institute of Science | |
| FSE (Software Engineering)**** |
| 2011 | Proactive Detection of Collaboration Conflicts | Yuriy Brun, University of Washington; et al. Reid Holmes, University of Waterloo
Michael D. Ernst, University of Washington
David Notkin, University of Washington |
| How Do Fixes Become Bugs? | Zuoning Yin, University of Illinois at Urbana-Champaign; et al. Ding Yuan, University of Illinois at Urbana-Champaign
Yuanyuan Zhou, University of California San Diego
Shankar Pasupathy, NetApp
Lakshmi Bairavasundaram, NetApp |
| Proving programs robust | Swarat Chaudhuri, Rice University; et al. Sumit Gulwani, Microsoft Research
Roberto Lublinerman, Pennsylvania State University
Sara Navidpour, Pennsylvania State University |
|2010|Creating and evolving developer documentation: understanding the decisions of open source contribu...|Barthélémy Dagenais & Martin P. Robillard, McGill University|
| Developer Fluency: Achieving True Mastery in Software Projects | Minghui Zhou, Peking University
Audris Mockus, Avaya Labs |
| Staged Concurrent Program Analysis | Nishant Sinha & Chao Wang, NEC Labs America |
|---|
| Darwin: an approach for debugging evolving programs | Dawei Qi, National University of Singapore; et al. Abhik Roychoudhury, National University of Singapore
Zhenkai Liang, National University of Singapore
Kapil Vaswani, Microsoft Research |
| Graph-based Mining of Multiple Object Usage Patterns | Tung Thanh Nguyen, Iowa State University; et al. Hoan Anh Nguyen, Iowa State University
Nam H. Pham, Iowa State University
Jafar M. Al-Kofahi, Iowa State University
Tien N. Nguyen, Iowa State University |
| 2008 | What makes a good bug report? | Nicolas Bettenburg, Saarland University; et al. Sascha Just, Saarland University
Adrian Schröter, University of Victoria
Cathrin Weiss, University of Zurich
Rahul Premraj, Saarland University
Thomas Zimmermann, University of Calgary |
| Efficient online monitoring of web-service SLAs | Franco Raimondi, University College London; et al. James Skene, University College London
Wolfgang Emmerich, University College London |
| 2007 | Automatic consistency assessment for query results in dynamic environments | Jamie Payton, University of North Carolina at Charlotte; et al. Christine Julien, University of Texas at Austin
Gruia-Catalin Roman, Washington University in St. Louis |
|Globally distributed software development project performance: an empirical analysis|Narayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University|
| Mining specifications of malicious behavior | Mihai Christodorescu, University of Wisconsin; et al. Somesh Jha, University of Wisconsin
Christopher Kruegel, Vienna University of Technology |
| Object and reference immutability using Java generics | Yoav Zibin, Massachusetts Institute of Technology; et al. Alex Potanin, Victoria University of Wellington
Mahmood Ali, Massachusetts Institute of Technology
Shay Artzi, Massachusetts Institute of Technology
Adam Kieżun, Massachusetts Institute of Technology
Michael D. Ernst, Massachusetts Institute of Technology |
| 2006 | Controlling factors in evaluating path-sensitive error detection techniques | Matthew B. Dwyer, University of Nebraska-Lincoln; et al. Suzette Person, University of Nebraska-Lincoln
Sebastian Elbaum, University of Nebraska-Lincoln |
| SYNERGY: a new algorithm for property checking | Bhargav S. Gulavani, Indian Institute of Technology; et al. Thomas A. Henzinger, École Polytechnique Fédérale de Lausanne
Yamini Kannan, Microsoft Research
Aditya V. Nori, Microsoft Research
Sriram K. Rajamani, Microsoft Research |
|2005|Automatic Generation of Suggestions for Program Investigation|Martin P. Robillard, McGill University|
| CUTE: a concolic unit testing engine for C | Koushik Sen, University of Illinois at Urbana-Champaign; et al. Darko Marinov, University of Illinois at Urbana-Champaign
Gul Agha, University of Illinois at Urbana-Champaign |
| Context- and path-sensitive memory leak detection | Yichen Xie & Alex Aiken, Stanford University |
|---|
| A classification system and analysis for aspect-oriented programs | Martin Rinard, Massachusetts Institute of Technology; et al. Alexandru Salcianu, Massachusetts Institute of Technology
Suhabe Bugrara, Massachusetts Institute of Technology |
| 2003 | Eliminating redundancies with a "composition with adaptation" meta-programming technique | Stan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong University |
| A Family of Test Adequacy Criteria for Database-Driven Applications | Gregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh | |
|---|---|---|
| 2002 | Isolating Cause-Effect Chains from Computer Programs | Andreas Zeller, Saarland University |
| ICCV (Computer Vision)**** |
| 2011 | Relative Attributes | Devi Parikh, Toyota Technological Institute at Chicago
Kristen Grauman, University of Texas at Austin |
| 2009 | Discriminative models for multi-class object layout | Chaitanya Desai, University of California Irvine; et al. Deva Ramanan, University of California Irvine
Charless Fowlkes, University of California Irvine |
| 2007 | Population Shape Regression From Random Design Data | Bradley Davis, University of North Carolina at Chapel Hill; et al. P. Thomas Fletcher, University of Utah
Elizabeth Bullitt, University of North Carolina at Chapel Hill
Sarang Joshi, University of Utah |
| 2005 | Globally Optimal Estimates for Geometric Reconstruction Problems | Fredrik Kahl, Lund University
Didier Henrion, LAAS-CNRS |
| 2003 | Detecting Pedestrians using Patterns of Motion and Appearance | Paul Viola, Microsoft Research; et al. Michael J. Jones, Mitsubishi Electric Research Laboratories
Daniel Snow, Mitsubishi Electric Research Laboratories |
| Image Parsing: Unifying Segmentation, Detection and Recognition | Zhuowen Tu, University of California Los Angeles; et al. Xiangrong Chen, University of California Los Angeles
Alan L. Yuille, University of California Los Angeles
Song-Chun Zhu, University of California Los Angeles |
| Image-based Rendering using Image-based Priors | Andrew Fitzgibbon, University of Oxford; et al. Yonatan Wexler, Weizmann Institute of Science
Andrew Zisserman, University of Oxford |
| 2001 | Probabilistic Tracking with Exemplars in a Metric Space | Kentaro Toyama & Andrew Blake, Microsoft Research |
|---|
| 1999 | Euclidean Reconstruction and Reprojection up to Subgroups | Yi Ma, University of California Berkeley; et al. Stefano Soatto, Washington University in St. Louis
Jana Kosecka, University of California Berkeley
Shankar Sastry, University of California Berkeley |
| A Theory of Shape by Space Carving | Kiriakos Kutulakos, University of Rochester
Steven Seitz, Carnegie Mellon University |
| 1998 | Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Paramet... | Marc Pollefeys, Katholieke Universiteit Leuven; et al. Reinhard Koch, Katholieke Universiteit Leuven
Luc Van Gool, Katholieke Universiteit Leuven |
| The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image Sequences | Phil Torr, Microsoft Research; et al. Andrew Fitzgibbon, University of Oxford
Andrew Zisserman, University of Oxford |
|ICML (Machine Learning)****|
| 2012 | Bayesian Posterior Sampling via Stochastic Gradient Fisher Scoring | Sungjin Ahn, University of California Irvine; et al. Anoop Korattikara, University of California Irvine
Max Welling, University of California Irvine |
| 2011 | Computational Rationalization: The Inverse Equilibrium Problem | Kevin Waugh, Carnegie Mellon University; et al. Brian Ziebart, Carnegie Mellon University
Drew Bagnell, Carnegie Mellon University |
| 2010 | Hilbert Space Embeddings of Hidden Markov Models | Le Song, Carnegie Mellon University; et al. Byron Boots, Carnegie Mellon University
Sajid M. Siddiqi, Google
Geoffrey Gordon, Carnegie Mellon University
Alex Smola, Yahoo! Research |
| 2009 | Structure preserving embedding | Blake Shaw & Tony Jebara, Columbia University |
|---|
| 2007 | Information-theoretic metric learning | Jason V. Davis, University of Texas at Austin; et al. Brian Kulis, University of Texas at Austin
Prateek Jain, University of Texas at Austin
Suvrit Sra, University of Texas at Austin
Inderjit S. Dhillon, University of Texas at Austin |
| 2006 | Trading convexity for scalability | Ronan Collobert, NEC Labs America; et al. Fabian Sinz, NEC Labs America
Jason Weston, NEC Labs America
Léon Bottou, NEC Labs America |
| 2005 | A support vector method for multivariate performance measures | Thorsten Joachims, Cornell University |
|---|---|---|
| ICSE (Software Engineering)**** |
| 2012 | Understanding Integer Overflow in C/C++ | Will Dietz, University of Illinois at Urbana-Champaign; et al. Peng Li, University of Utah
John Regehr, University of Utah
Vikram Adve, University of Illinois at Urbana-Champaign |
| Using Dynamic Analysis to Discover Polynomial and Array Invariants | ThanhVu Nguyen, University of New Mexico; et al. Deepak Kapur, University of New Mexico
Westley Weimer, University of New Mexico
Stephanie Forrest, University of New Mexico |
|Amplifying Tests to Validate Exception Handling Code|Pingyu Zhang & Sebastian Elbaum, University of Nebraska-Lincoln|
| Partial Models: Towards Modeling and Reasoning with Uncertainty | Michalis Famelis, University of Toronto; et al. Rick Salay, University of Toronto
Marsha Chechik, University of Toronto |
| How Do Professional Developers Comprehend Software? | Tobias Roehm, Technische Universität München; et al. Rebecca Tiarks, University of Bremen
Rainer Koschke, University of Bremen
Walid Maalej, Technische Universität München |
| A Tactic-Centric Approach for Automating Traceability of Quality Concerns | Mehdi Mirakhorli, DePaul University; et al. Yonghee Shin, DePaul University
Jane Cleland-Huang, DePaul University
Murat Cinar, DePaul University |
| Automated Detection of Client-State Manipulation Vulnerabilities | Anders Møller & Mathias Schwarz, Aarhus University |
|---|
| Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and ... | Narayan Ramasubbu, Singapore Management University; et al. Marcelo Cataldo, Carnegie Mellon University
Rajesh Krishna Balan, Singapore Management University
James D. Herbsleb, Carnegie Mellon University |
| Programs, tests, and oracles: the foundations of testing revisited | Matt Staats, University of Minnesota; et al. Michael W. Whalen, University of Minnesota
Mats P.E. Heimdahl, University of Minnesota |
| On-demand Feature Recommendations Derived from Mining Public Product Descriptions | Horatiu Dumitru, DePaul University; et al. Marek Gibiec, DePaul University
Negar Hariri, DePaul University
Jane Cleland-Huang, DePaul University
Bamshad Mobasher, DePaul University
Carlos Castro-Herrera, DePaul University
Mehdi Mirakhorli, DePaul University |
| Run-Time Efficient Probabilistic Model Checking | Antonio Filieri, Politecnico di Milano; et al. Carlo Ghezzi, Politecnico di Milano
Giordano Tamburrelli, Politecnico di Milano |
| 2010 | A Machine Learning Approach for Tracing Regulatory Codes to Product Specific Requirements | Jane Cleland-Huang, DePaul University; et al. Adam Czauderna, DePaul University
John Emenecker, DePaul University
Marek Gibiec, DePaul University |
| Collaborative Reliability Prediction of Service-Oriented Systems | Zibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong |
|---|
| Test Generation through Programming in UDITA | Milos Gligoric, University of Illinois at Urbana-Champaign; et al. Tihomir Gvero, École Polytechnique Fédérale de Lausanne
Vilas Jagannath, University of Illinois at Urbana-Champaign
Sarfraz Khurshid, University of Texas at Austin
Viktor Kuncak, École Polytechnique Fédérale de Lausanne
Darko Marinov, University of Illinois at Urbana-Champaign |
| A Degree-of-Knowledge Model to Capture Source Code Familiarity | Thomas Fritz, University of British Columbia; et al. Jingwen Ou, University of British Columbia
Gail C. Murphy, University of British Columbia
Emerson Murphy-Hill, University of British Columbia |
| 2009 | How We Refactor, and How We Know It | Emerson Murphy-Hill, Portland State University; et al. Chris Parnin, Georgia Institute of Technology
Andrew P. Black, Portland State University |
| Effective Static Deadlock Detection | Mayur Naik, Intel Research; et al. Chang-Seo Park, University of California Berkeley
Koushik Sen, University of California Berkeley
David Gay, Intel Research |
|Invariant-Based Automatic Testing of AJAX User Interfaces|Ali Mesbah & Arie van Deursen, Delft University of Technology|
| Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows Vista | Christian Bird, University of California Davis; et al. Nachiappan Nagappan, Microsoft Research
Premkumar Devanbu, University of California Davis
Harald Gall, University of Zurich
Brendan Murphy, Microsoft Research |
| Automatically finding patches using genetic programming | Westley Weimer, University of Virginia; et al. ThanhVu Nguyen, University of New Mexico
Claire Le Goues, University of Virginia
Stephanie Forrest, University of New Mexico |
| 2008 | Precise memory leak detection for java software using container profiling | Guoqing Xu & Atanas Rountev, Ohio State University |
|---|---|---|
| Recommending adaptive changes for framework evolution | Barthélémy Dagenais & Martin P. Robillard, McGill University |
| Predicting Accurate and Actionable Static Analysis Warnings: An Experimental Approach | Joseph Ruthruff, University of Nebraska-Lincoln; et al. John Penix, Google
J. David Morgenthaler, Google
Sebastian Elbaum, University of Nebraska-Lincoln
Gregg Rothermel, University of Nebraska-Lincoln |
| The effect of program and model structure on mc/dc test adequacy coverage | Ajitha Rajan, University of Minnesota; et al. Michael W. Whalen, Rockwell Collins
Mats P.E. Heimdahl, University of Minnesota |
| 2007 | Refactoring for Parameterizing Java Classes | Adam Kiezun, Massachusetts Institute of Technology; et al. Michael D. Ernst, Massachusetts Institute of Technology
Frank Tip, IBM Research
Robert M. Fuhrer, IBM Research |
|Tracking Code Clones in Evolving Software|Ekwa Duala-Ekoko & Martin P. Robillard, McGill University|
| Matching and Merging of Statecharts Specifications | Shiva Nejati, University of Toronto; et al. Mehrdad Sabetzadeh, University of Toronto
Marsha Chechik, University of Toronto
Steve Easterbrook, University of Toronto
Pamela Zave, AT&T Laboratories |
| Predicting Faults from Cached History | Sunghun Kim, Massachusetts Institute of Technology; et al. Thomas Zimmermann, Saarland University
E. James Whitehead Jr., University of California Santa Cruz
Andreas Zeller, Saarland University |
|2006|Model-Based Development of Dynamically Adaptive Software|Ji Zhang & Betty H.C. Cheng, Michigan State University|
| Who Should Fix This Bug? | John Anvik, University of British Columbia; et al. Lyndon Hiew, University of British Columbia
Gail C. Murphy, University of British Columbia |
| 2005 | Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Pe... | Andrew Ko, Carnegie Mellon University; et al. Htet Htet Aung, Carnegie Mellon University
Brad Myers, Carnegie Mellon University |
| Is Mutation an Appropriate Tool for Testing Experiments? | James Andrews, University of Western Ontario; et al. Lionel Briand, Carleton University
Yvan Labiche, Carleton University |
| Using Structural Context to Recommend Source Code Examples | Reid Holmes & Gail Murphy, University of British Columbia |
|---|
| 2004 | SNIAFL: Towards a Static Non-Interactive Approach to Feature Location | Wei Zhao, Peking University; et al. Lu Zhang, Peking University
Yin Liu, Peking University
Jiasu Sun, Peking University
Fuqing Yang, Peking University |
|Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized Systems|Rohit Khare & Richard N. Taylor, University of California Irvine|
| An Empirical Study of Software Reuse vs. Defect-Density and Stability | Parastoo Mohagheghi, Ericsson; et al. Reidar Conradi, Norwegian University of Science and Technology
Ole M. Killi, Norwegian University of Science and Technology
Henrik Schwarz, Norwegian University of Science and Technology |
|A Tool for Writing and Debugging Algebraic Specifications|Johannes Henkel & Amer Diwan, University of Colorado|
| Static Checking of Dynamically Generated Queries in Database Applications | Carl Gould, University of California Davis; et al. Zhendong Su, University of California Davis
Premkumar Devanbu, University of California Davis |
| 2003 | Precise Dynamic Slicing Algorithms | Xiangyu Zhang, University of Arizona; et al. Rajiv Gupta, University of Arizona
Youtao Zhang, University of Arizona |
| Modular Verification of Software Components in C | Sagar Chaki, Carnegie Mellon University; et al. Edmund Clarke, Carnegie Mellon University
Alex Groce, Carnegie Mellon University
Somesh Jha, University of Wisconsin
Helmut Veith, Technische Universität Wien |
|IJCAI (Artificial Intelligence)****|
| 2011 | Unweighted Coalitional Manipulation Under the Borda Rule is NP-Hard | Nadja Betzler, Technische Universität Berlin; et al. Rolf Niedermeier, Technische Universität Berlin
Gerhard J. Woeginger, Technische Universität Eindhoven |
|Nested Rollout Policy Adaptation for Monte Carlo Tree Search|Christopher D. Rosin, Parity Computing|
| On the Decidability of Connectedness Constraints in 2D and 3D Euclidean Spaces | Roman Kontchakov, Birkbeck College London; et al. Yavor Nenov, University of Manchester
Ian Pratt-Hartmann, University of Manchester
Michael Zakharyaschev, Birkbeck College London |
|2009|Consequence-Driven Reasoning for Horn SHIQ Ontologies|Yevgeny Kazakov, University of Oxford|
| Learning Conditional Preference Networks with Queries | Frederic Koriche, Université Montpellier II
Bruno Zanuttini, Université de Caen Basse-Normandie |
| 2007 | Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian Networks | Maleeha Qazi, Siemens Medical Solutions; et al. Glenn Fung, Siemens Medical Solutions
Sriram Krishnan, Siemens Medical Solutions
Romer Rosales, Siemens Medical Solutions
Harald Steck, Siemens Medical Solutions
R. Bharat Rao, Siemens Medical Solutions
Don Polderman, Erasmus University Medical Center
Dhanalakshmi Chandrasekaran, No Affiliation |
| Building Structure into Local Search for SAT | Duc Nghia Pham, Griffith University; et al. John Thornton, Griffith University
Abdul Sattar, Griffith University |
|Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Pro...|Luc Mercier & Pascal Van Hentenryck, Brown University|
| 2005 | Learning Coordination Classifiers | Yuhong Guo, University of Alberta; et al. Russell Greiner, University of Alberta
Dale Schuurmans, University of Alberta |
| Solving Checkers | Jonathan Schaeffer, University of Alberta; et al. Yngvi Bjornsson, University of Alberta
Neil Burch, University of Alberta
Akihiro Kishimoto, University of Alberta
Martin Muller, University of Alberta
Robert Lake, University of Alberta
Paul Lu, University of Alberta
Steve Sutphen, University of Alberta |
| A Probabilistic Model of Redundancy in Information Extraction | Doug Downey, University of Washington; et al. Oren Etzioni, University of Washington
Stephen Soderland, University of Washington |
| 2003 | Approximating Game-Theoretic Optimal Strategies for Full-scale Poker | Darse Billings, University of Alberta; et al. Neil Burch, University of Alberta
Aaron Davidson, University of Alberta
Robert Holte, University of Alberta
Jonathan Schaeffer, University of Alberta
Terence Schauenberg, University of Alberta
Duane Szafron, University of Alberta |
| Thin Junction Tree Filters for Simultaneous Localization and Mapping | Mark A. Paskin, University of California Berkeley | |
|---|---|---|
| 1999 | Learning in Natural Language | Dan Roth, University of Illinois at Urbana-Champaign |
| A Distributed Case-Based Reasoning Application for Engineering Sales Support | Ian Watson, University of Salford
Dan Gardingen, Western Air |
|1997|Object Identification in a Bayesian Context|Timothy Huang & Stuart Russell, University of California Berkeley|
| Translingual Information Retrieval: A Comparative Evaluation | Jaime G. Carbonell, Carnegie Mellon University; et al. Yiming Yang, Carnegie Mellon University
Robert E. Frederking, Carnegie Mellon University
Ralf D. Brown, Carnegie Mellon University
Yibing Geng, Carnegie Mellon University
Danny Lee, Carnegie Mellon University |
| Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolo... | Fangzhen Lin, The Hongkong University of Science and Technology |
|---|
| 2012 | Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework | Carlee Joe-Wong, Princeton University; et al. Soumya Sen, Princeton University
Tian Lan, George Washington University
Mung Chiang, Princeton University |
| 2011 | Dynamic right-sizing for power-proportional data centers | Minghong Lin, California Institute of Technology; et al. Adam Wierman, California Institute of Technology
Lachlan Andrew, Swinburne University of Technology
Eno Thereska, Microsoft Research |
| 2010 | On the Feasibility and Efficacy of Protection Routing in IP Networks | Kin-Wah Kwong, University of Pennsylvania; et al. Lixin Gao, University of Massachusetts Amherst
Roch Guérin, University of Pennsylvania
Zhi-Li Zhang, University of Minnesota |
| 2009 | Queuing Network Models for Multi-Channel P2P Live Streaming Systems | Di Wu, Polytechnic Institute of New York University; et al. Yong Liu, Polytechnic Institute of New York University
Keith W. Ross, Polytechnic Institute of New York University |
| 2008 | On the Feasibility of the Link Abstraction in (Rural) Mesh Networks | Dattatraya Gokhal, Indian Navy; et al. Sayandeep Sen, University of Wisconsin
Kameswari Chebrolu, Indian Institute of Technology
Bhaskaran Rama, Indian Institute of Technology |
|Theoretical Results on Base Station Movement Problem for Sensor Networks|Yi Shi & Y. Thomas Hou, Virginia Tech|
| Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless... | Changhee Joo, Ohio State University; et al. Xiaojun Lin, Purdue University
Ness B. Shroff, Ohio State University |
| 2007 | Disruption free topology reconfiguration in OSPF networks | Pierre Francois, Université catholique de Louvain; et al. Mike Shand, Cisco Systems
Olicier Bonaventure, Université catholique de Louvain |
| 2006 | Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective | Gaurav Sharma, Purdue University; et al. Ravi Mazumdar, University of Waterloo
Ness Shroff, Purdue University |
| 2005 | Perfect Simulation and Stationarity of a Class of Mobility Models | Jean-Yves Le Boude, École Polytechnique Fédérale de Lausanne
Milan Vojnović, Microsoft Research |
| 2004 | Throughput-Delay Trade-Off in Wireless Networks | Abbas El Gamal, Stanford University; et al. James Mammen, Stanford University
Balaji Prabhakar, Stanford University
Devavrat Shah, Stanford University |
| 2003 | User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks | Sem Borst, Bell Labs |
|---|
| 2001 | Mobility increases the capacity of ad-hoc wireless networks | Matthias Grossglauser, AT&T Laboratories
David Tse, University of California Berkeley |
| 2000 | The Chaotic Nature of TCP Congestion Control | András Veres, Ericsson
Miklós Boda, Ericsson Research |
| 1999 | Bandwidth Sharing: Objectives and Algorithms | Laurent Massoulié, Microsoft Research
James Robert, France Télécom R&D |
| 1998 | Effective Bandwidths in Wireless Networks with Multiuser Receivers | David Tse, University of California Berkeley
Stephen Hanly, University of Melbourne |
| 1996 | An algorithm for multicast tree generation in networks with asymmetric links | Ram Ramanathan, BBN Technologies |
|---|
| 2012 | Searching and Mining Trillions of Time Series Subsequences under Dynamic Time Warping | Thanawin Rakthanmanon, University of California Riverside; et al. Bilson Campana, University of California Riverside
Abdullah Mueen, University of California Riverside
Gustavo Batista, University of São Paulo
Brandon Westover, Brigham and Women's Hospital
Qiang Zhu, University of California Riverside
Jesin Zakaria, University of California Riverside
Eamonn Keogh, University of California Riverside |
| 2011 | Leakage in Data Mining: Formulation, Detection, and Avoidance | Shachar Kaufman, Tel-Aviv University; et al. Saharon Rosset, Tel-Aviv University
Claudia Perlich, Media6Degrees |
| 2010 | Large linear classification when data cannot fit in memory | Hsiang-Fu Yu, National Taiwan University; et al. Cho-Jui Hsieh, National Taiwan University
Kai-Wei Chang, National Taiwan University
Chih-Jen Lin, National Taiwan University |
| Connecting the dots between news articles | Dafna Shahaf & Carlos Guestrin, Carnegie Mellon University |
|---|
| 2008 | Fastanova: an efficient algorithm for genome-wide association study | Xiang Zhang, University of North Carolina at Chapel Hill; et al. Fei Zou, University of North Carolina at Chapel Hill
Wei Wang, University of North Carolina at Chapel Hill |
| 2007 | Predictive discrete latent factor models for large scale dyadic data | Deepak Agarwal & Srujana Merugu, Yahoo! Research |
|---|
| 2005 | Graphs over time: densification laws, shrinking diameters and possible explanations | Jure Leskovec, Carnegie Mellon University; et al. Jon Kleinberg, Cornell University
Christos Faloutsos, Carnegie Mellon University |
| 2004 | A probabilistic framework for semi-supervised clustering | Sugato Basu, University of Texas at Austin; et al. Mikhail Bilenko, University of Texas at Austin
Raymond J. Mooney, University of Texas at Austin |
| 2003 | Maximizing the spread of influence through a social network | David Kempe, Cornell University; et al. Jon Kleinberg, Cornell University
Éva Tardos, Cornell University |
|2002|Pattern discovery in sequences under a Markov assumption|Darya Chudova & Padhraic Smyth, University of California Irvine|
| 2001 | Robust space transformations for distance-based operations | Edwin M. Knorr, University of British Columbia; et al. Raymond T. Ng, University of British Columbia
Ruben H. Zamar, University of British Columbia |
| 2000 | Hancock: a language for extracting signatures from data streams | Corinna Cortes, AT&T Laboratories; et al. Kathleen Fisher, AT&T Laboratories
Daryl Pregibon, AT&T Laboratories
Anne Rogers, AT&T Laboratories |
| 1999 | MetaCost: a general method for making classifiers cost-sensitive | Pedro Domingos, Universidade Técnica de Lisboa |
|---|---|---|
| 1997 | Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Di... | Foster Provost & Tom Fawcett, NYNEX Science and Technology |
| NSDI (Networking)**** |
| 2012 | Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | Matei Zaharia, University of California Berkeley; et al. Mosharaf Chowdhury, University of California Berkeley
Tathagata Das, University of California Berkeley
Ankur Dave, University of California Berkeley
Justin Ma, University of California Berkeley
Murphy McCauley, University of California Berkeley
Michael J. Franklin, University of California Berkeley
Scott Shenker, University of California Berkeley
Ion Stoica, University of California Berkeley |
| 2011 | Design, Implementation and Evaluation of Congestion Control for Multipath TCP | Damon Wischik, University College London; et al. Costin Raiciu, University College London
Adam Greenhalgh, University College London
Mark Handley, University College London |
| ServerSwitch: A Programmable and High Performance Platform for Data Center Networks | Guohan Lu, Microsoft Research; et al. Chuanxiong Guo, Microsoft Research
Yulong Li, Microsoft Research
Zhiqiang Zhou, Tsinghua University
Tong Yuan, Microsoft Research
Haitao Wu, Microsoft Research
Yongqiang Xiong, Microsoft Research
Rui Gao, Microsoft Research
Yongguang Zhang, Microsoft Research |
| 2010 | Reverse traceroute | Ethan Katz-Bassett, University of Washington; et al. Harsha V. Madhyastha, University of California San Diego
Vijay Kumar Adhikari, University of Minnesota
Colin Scott, University of Washington
Justine Sherry, University of Washington
Peter van Wesep, University of Washington
Thomas Anderson, University of Washington
Arvind Krishnamurthy, University of Washington |
| 2009 | TrInc: Small Trusted Hardware for Large Distributed Systems | Dave Levin, University of Maryland; et al. John R. Douceur, Microsoft Research
Jacob R. Lorch, Microsoft Research
Thomas Moscibroda, Microsoft Research |
| 2008 | Remus: High Availability via Asynchronous Virtual Machine Replication | Brendan Cully, University of British Columbia; et al. Geoffrey Lefebvre, University of British Columbia
Dutch Meyer, University of British Columbia
Mike Feeley, University of British Columbia
Norm Hutchinson, University of British Columbia
Andrew Warfield, University of British Columbia |
| Consensus Routing: The Internet as a Distributed System | John P. John, University of Washington; et al. Ethan Katz-Bassett, University of Washington
Arvind Krishnamurthy, University of Washington
Thomas Anderson, University of Washington
Arun Venkataramani, University of Massachusetts Amherst |
| 2007 | Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems Code | Charles Killian, University of California San Diego; et al. James W. Anderson, University of California San Diego
Ranjit Jhala, University of California San Diego
Amin Vahdat, University of California San Diego |
|2006|Experience with an Object Reputation System for Peer-to-Peer Filesharing|Kevin Walsh & Emin Gün Sirer, Cornell University|
| Replay Debugging for Distributed Applications | Dennis Geels, University of California Berkeley; et al. Gautam Altekar, University of California Berkeley
Scott Shenker, University of California Berkeley
Ion Stoica, University of California Berkeley |
|2005|Detecting BGP Configuration Faults with Static Analysis|Nick Feamster & Hari Balakrishnan, Massachusetts Institute of Technology|
| 2004 | Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Netwo... | Philip Levis, University of California Berkeley; et al. Neil Patel, University of California Berkeley
David Culler, University of California Berkeley
Scott Shenker, University of California Berkeley |
|OSDI (Operating Systems)****|
| 2012 | Spanner: Google's Globally-Distributed Database | James C. Corbett, Google; et al. Jeffrey Dean, Google
Michael Epstein, Google
Andrew Fikes, Google
Christopher Frost, Google
JJ Furman, Google
Sanjay Ghemawat, Google
Andrey Gubarev, Google
Christopher Heiser, Google
Peter Hochschild, Google
Wilson Hsieh, Google
Sebastian Kanthak, Google
Eugene Kogan, Google
Hongyi Li, Google
Alexander Lloyd, Google
Sergey Melnik, Google
David Mwaura, Google
David Nagle, Google
Sean Quinlan, Google
Rajesh Rao, Google
Lindsay Rolig, Google
Yasushi Saito, Google
Michal Szymaniak, Google
Christopher Taylor, Google
Ruth Wang, Google
Dale Woodford, Google |
| 2010 | Efficient System-Enforced Deterministic Parallelism | Amittai Aviram, Yale University; et al. Shu-Chun Weng, Yale University
Sen Hu, Yale University
Bryan Ford, Yale University |
| The Turtles Project: Design and Implementation of Nested Virtualization | Muli Ben-Yehuda, IBM Research; et al. Michael D. Day, IBM Linux Technology Center
Zvi Dubitzky, IBM Research
Michael Factor, IBM Research
Nadav Har'El, IBM Research
Abel Gordon, IBM Research
Anthony Liguori, IBM Linux Technology Center
Orit Wasserman, IBM Research
Ben-Ami Yassour, IBM Research |
| 2008 | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs | Cristian Cadar, Stanford University; et al. Daniel Dunbar, Stanford University
Dawson Engler, Stanford University |
| Difference Engine: Harnessing Memory Redundancy in Virtual Machines | Diwaker Gupta, University of California San Diego; et al. Sangmin Lee, University of Texas at Austin
Michael Vrable, University of California San Diego
Stefan Savage, University of California San Diego
Alex C. Snoeren, University of California San Diego
George Varghese, University of California San Diego
Geoffrey M. Voelker, University of California San Diego
Amin Vahdat, University of California San Diego |
| DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Lan... | Yuan Yu, Microsoft Research; et al. Michael Isard, Microsoft Research
Dennis Fetterly, Microsoft Research
Mihai Budiu, Microsoft Research
Úlfar Erlingsson, Microsoft Research
Pradeep Kumar Gunda, Microsoft Research
Jon Currey, Microsoft Research |
| 2006 | Bigtable: A Distributed Storage System for Structured Data | Fay Chang, Google; et al. Jeffrey Dean, Google
Sanjay Ghemawat, Google
Wilson C. Hsieh, Google
Deborah A. Wallach, Google
Mike Burrows, Google
Tushar Chandra, Google
Andrew Fikes, Google
Robert E. Gruber, Google |
| Rethink the Sync | Edmund B. Nightingale, University of Michigan; et al. Kaushik Veeraraghavan, University of Michigan
Peter M. Chen, University of Michigan
Jason Flinn, University of Michigan |
| 2004 | Using Model Checking to Find Serious File System Errors | Junfeng Yang, Stanford University; et al. Paul Twohey, Stanford University
Dawson Engler, Stanford University
Madanlal Musuvathi, Microsoft Research |
| Recovering Device Drivers | Michael M. Swift, University of Washington; et al. Muthukaruppan Annamalai, University of Washington
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington |
|2002|Memory Resource Management in VMware ESX Server|Carl A. Waldspurger, VMware|
| 2000 | Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions | Dawson Engler, Stanford University; et al. Benjamin Chelf, Stanford University
Andy Chou, Stanford University
Seth Hallem, Stanford University |
| 1999 | IO-Lite: A Unified I/O Buffering and Caching System | Vivek S. Pai, Rice University; et al. Peter Druschel, Rice University
Willy Zwaenepoel, Rice University |
| 1996 | Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications | Todd C. Mowry, University of Toronto; et al. Angela K. Demke, University of Toronto
Orran Krieger, University of Toronto |
| Safe Kernel Extensions Without Run-Time Checking | George C. Necula & Peter Lee, Carnegie Mellon University |
|---|
| 2012 | Concurrent Data Representation Synthesis | Peter Hawkins, Stanford University; et al. Alex Aiken, Stanford University
Kathleen Fisher, Tufts University
Martin Rinard, Massachusetts Institute of Technology
Mooly Sagiv, Tel-Aviv University |
| 2011 | Data Representation Synthesis | Peter Hawkins, Stanford University; et al. Alex Aiken, Stanford University
Kathleen Fisher, Tufts University
Martin Rinard, Massachusetts Institute of Technology
Mooly Sagiv, Tel-Aviv University |
| 2010 | Safe to the Last Instruction: Automated Verification of a Type-Safe Operating System | Jean Yang, Massachusetts Institute of Technology
Chris Hawblitzel, Microsoft Research |
| 2009 | Binary Analysis for Measurement and Attribution of Program Performance | Nathan Tallent, Rice University; et al. John Mellor-Crummey, Rice University
Michael Fagan, Rice University |
| 2007 | Fault-tolerant Typed Assembly Language | Frances Perry, Princeton University; et al. Lester Mackey, Princeton University
George A. Reis, Princeton University
Jay Ligatti, University of South Florida
David I. August, Princeton University
David Walker, Princeton University |
| The Ant and the Grasshopper: Fast and Accurate Pointer Analysis for Millions of Lines of Code | Ben Hardekopf & Calvin Lin, University of Texas at Austin |
|---|
| Programming by Sketching for Bit-Streaming Programs | Armando Solar-Lezama, University of California Berkeley; et al. Rodric Rabbah, Massachusetts Institute of Technology
Rastislav Bodik, University of California Berkeley
Kemal Ebcioğlu, IBM Research |
|2004|Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams|John Whaley & Monica S. Lam, Stanford University|
| 2003 | Automatically Proving the Correctness of Compiler Optimizations | Sorin Lerner, University of Washington; et al. Todd Millstein, University of Washington
Craig Chambers, University of Washington |
| 2000 | Dynamo: a transparent dynamic optimization system | Vasanth Bala, Hewlett-Packard Labs; et al. Evelyn Duesterwald, Hewlett-Packard Labs
Sanjeev Banerjia, InCert |
| 1999 | Whole program paths | James R. Larus, Microsoft Research |
|---|
| 2012 | Worst-case Optimal Join Algorithms | Hung Q. Ngo, University at Buffalo; et al. Ely Porat, Bar-Ilan University
Christopher Ré, University of Wisconsin
Atri Rudra, University at Buffalo |
| 2011 | Data Exchange Beyond Complete Data | Marcelo Arenas, Pontificia Universidad Católica de Chile; et al. Jorge Pérez, Universidad de Chile
Juan Reutter, University of Edinburgh |
| 2010 | An Optimal Algorithm for the Distinct Elements Problem | Daniel M. Kane, Harvard University; et al. Jelani Nelson, Massachusetts Institute of Technology
David P. Woodruff, IBM Research |
| 2009 | Size and Treewidth Bounds for Conjunctive Queries | Georg Gottlob, University of Oxford; et al. Stephanie Lee, University of Oxford
Gregory Valient, University of California Berkeley |
| 2008 | Estimating PageRank on Graph Streams | Atish Das Sarma, Georgia Institute of Technology; et al. Sreenivas Gollapudi, Microsoft Research
Rina Panigrahy, Microsoft Research |
| 2007 | Generalized Hypertree Decompositions: NP-Hardness and Tractable Variants | Georg Gottlob, University of Oxford; et al. Zoltan Miklos, University of Oxford
Thomas Schwentick, Universität Dortmund |
| 2006 | Two-variable logic on data trees and XML reasoning | Mikolaj Bojanczyk, Warsaw University; et al. Claire David, Université Paris
Anca Muscholl, Université Paris
Thomas Schwentick, Universität Dortmund
Luc Segoufin, Université Paris |
| 2005 | On the complexity of division and set joins in the relational algebra | Dirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum |
|---|---|---|
| 2004 | Conditional XPath, the first order complete XPath dialect | Maarten Marx, University of Amsterdam |
| 2003 | An Information-Theoretic Approach to Normal Forms for Relational and XML Data | Marcelo Arenas & Leonid Libkin, University of Toronto |
| 2002 | Monadic Datalog and the Expressive Power of Languages for Web Information Extraction | Georg Gottlob & Christoph Koch, Technische Universität Wien |
| 2001 | Optimal aggregation algorithms for middleware | Ronald Fagin, IBM Research; et al. Amnon Lotem, University of Maryland
Moni Naor, Weizmann Institute of Science |
| 2000 | Auditing Boolean attributes | Jon Kleinberg, Cornell University; et al. Christos Papadimitriou, University of California Berkeley
Prabhakar Raghavan, IBM Research |
| 1999 | Exact and approximate aggregation in constraint query languages | Michael Benefikt & Leonid Libkin, Bell Labs |
|---|---|---|
| Expressiveness of structured document query languages based on attribute grammars | Frank Neven & Jan Van den Bussche, Limburgs Universitair Centrum |
| 1997 | On the Complexity of Database Queries | Christos H. Papadimitriou, University of California Berkeley
Mihalis Yannakakis, Bell Labs |
|S &P (Security and Privacy)****|
| 2012 | Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards | Benedikt Driessen, Ruhr-Universität Bochum; et al. Ralf Hund, Ruhr-Universität Bochum
Carsten Willems, Ruhr-Universität Bochum
Christof Paar, Ruhr-Universität Bochum
Thorsten Holz, Ruhr-Universität Bochum |
| 2011 | Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks | Andrew M. White, University of North Carolina at Chapel Hill; et al. Austin Matthews, University of North Carolina at Chapel Hill
Kevin Snow, University of North Carolina at Chapel Hill
Fabian Monrose, University of North Carolina at Chapel Hill |
| 2010 | SCiFI - A System for Secure Face Identification | Margarita Osadchy, University of Haifa; et al. Benny Pinkas, University of Haifa
Ayman Jarrous, University of Haifa
Boaz Moskovich, University of Haifa |
| 2009 | Native Client: A Sandbox for Portable, Untrusted x86 Native Code | Bennet Yee, Google; et al. David Sehr, Google
Gregory Dardyk, Google
Bradley Chen, Google
Robert Muth, Google
Tavis Ormandy, Google
Shiki Okasaka, Google
Neha Narula, Google
Nicholas Fullagar, Google |
| 2008 | Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses | Daniel Halperin, University of Washington; et al. Thomas S. Heydt-Benjamin, University of Massachusetts Amherst
Benjamin Ransford, University of Massachusetts Amherst
Shane S. Clark, University of Massachusetts Amherst
Benessa Defend, University of Massachusetts Amherst
Will Morgan, University of Massachusetts Amherst
Kevin Fu, University of Massachusetts Amherst
Tadayoshi Kohno, University of Washington
William H. Maisel, Harvard University |
|SIGCOMM (Networking)****|
| 2012 | Multi-Resource Fair Queueing for Packet Processing | Ali Ghodsi, University of California Berkeley; et al. Vyas Sekar, Intel Research
Matei Zaharia, University of California Berkeley
Ion Stoica, University of California Berkeley |
| 2011 | They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices | Shyamnath Gollakota, Massachusetts Institute of Technology; et al. Haitham Hassanieh, Massachusetts Institute of Technology
Benjamin Ransford, University of Massachusetts Amherst
Dina Katabi, Massachusetts Institute of Technology
Kevin Fu, University of Massachusetts Amherst |
| 2010 | Efficient Error Estimating Coding: Feasibility and Applications | Binbin Chen, National University of Singapore; et al. Ziling Chou, National University of Singapore
Yuda Zhao, National University of Singapore
Haifeng Yu, National University of Singapore |
| 2009 | White Space Networking with Wi-Fi like Connectivity | Paramvir Bahl, Microsoft Research; et al. Ranveer Chandra, Microsoft Research
Thomas Moscibroda, Microsoft Research
Rohan Murty, Harvard University
Matt Welsh, Harvard University |
| 2008 | ZigZag Decoding: Combating Hidden Terminals in Wireless Networks | Shyamnath Gollakota & Dina Katabi, Massachusetts Institute of Technology |
|---|---|---|
| 2012 | Time-Based Calibration of Effectiveness Measures | Mark Smucker & Charles Clarke, University of Waterloo |
| 2011 | Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction Data | Mikhail Ageev, Moscow State University; et al. Qi Guo, Emory University
Dmitry Lagun, Emory University
Eugene Agichtein, Emory University |
| 2010 | Assessing the Scenic Route: Measuring the Value of Search Trails in Web Logs | Ryen W. White, Microsoft Research
Jeff Huang, University of Washington |
| 2009 | Sources of evidence for vertical selection | Jaime Arguello, Carnegie Mellon University; et al. Fernando Diaz, Yahoo! Research
Jamie Callan, Carnegie Mellon University
Jean-Francois Crespo, Yahoo! Research |
| 2008 | Algorithmic Mediation for Collaborative Exploratory Search | Jeremy Pickens, FX Palo Alto Lab; et al. Gene Golovchinsky, FX Palo Alto Lab
Chirag Shah, University of North Carolina at Chapel Hill
Pernilla Qvarfordt, FX Palo Alto Lab
Maribeth Back, FX Palo Alto Lab |
| 2007 | Studying the Use of Popular Destinations to Enhance Web Search Interaction | Ryen W. White, Microsoft Research; et al. Mikhail Bilenko, Microsoft Research
Silviu Cucerzan, Microsoft Research |
| 2006 | Minimal Test Collections for Retrieval Evaluation | Ben Carterette, University of Massachusetts Amherst; et al. James Allan, University of Massachusetts Amherst
Ramesh Sitaraman, University of Massachusetts Amherst |
| 2005 | Learning to estimate query difficulty: including applications to missing content detection and dis... | Elad Yom-Tov, IBM Research; et al. Shai Fine, IBM Research
David Carmel, IBM Research
Adam Darlow, IBM Research |
| 2004 | A Formal Study of Information Retrieval Heuristics | Hui Fang, University of Illinois at Urbana-Champaign; et al. Tao Tao, University of Illinois at Urbana-Champaign
ChengXiang Zhai, University of Illinois at Urbana-Champaign |
|2003|Re-examining the potential effectiveness of interactive query expansion|Ian Ruthven, University of Strathclyde|
| 2002 | Novelty and redundancy detection in adaptive filtering | Yi Zhang, Carnegie Mellon University; et al. Jamie Callan, Carnegie Mellon University
Thomas Minka, Carnegie Mellon University |
| 2001 | Temporal summaries of new topics | James Allan, University of Massachusetts Amherst; et al. Rahul Gupta, University of Massachusetts Amherst
Vikas Khandelwal, University of Massachusetts Amherst |
|2000|IR evaluation methods for retrieving highly relevant documents|Kalervo Järvelin & Jaana Kekäläinen, University of Tampere|
| 1999 | Cross-language information retrieval based on parallel texts and automatic mining of parallel text... | Jian-Yun Nie, Université de Montréal; et al. Michel Simard, Université de Montréal
Pierre Isabelle, Université de Montréal
Richard Durand, Université de Montréal |
|1998|A theory of term weighting based on exploratory data analysis|Warren R. Greiff, University of Massachusetts Amherst|
| 1997 | Feature selection, perceptron learning, and a usability case study for text categorization | Hwee Tou Ng, DSO National Laboratories; et al. Wei Boon Goh, Ministry of Defence
Kok Leong Low, Ministry of Defence |
| 1996 | Retrieving spoken documents by combining multiple index sources | Gareth Jones, University of Cambridge; et al. Jonathan Foote, University of Cambridge
Karen Spärck Jones, University of Cambridge
Steve Young, University of Cambridge |
|SIGMETRICS (Performance)****|
| 2012 | Temperature management in data centers: why some (might) like it hot | Nosayba El-Sayed, University of Toronto; et al. Ioan Stefanovici, University of Toronto
George Amvrosiadis, University of Toronto
Andy A. Hwang, University of Toronto
Bianca Schroeder, University of Toronto |
| 2011 | Topology Discovery of Sparse Random Graphs With Few Participants | Animashree Anandkumar, University of California Irvine; et al. Avinatan Hassidim, Google
Jonathan Kelner, Massachusetts Institute of Technology |
| 2010 | Load balancing via random local search in closed and open systems | Ayalvadi Ganesh, University of Bristol; et al. Sarah Lilienthal, Cambridge University
D. Manjunath, Indian Institute of Technology
Alexandre Proutière, Microsoft Research
Florian Simatos, INRIA |
| 2009 | The Age of Gossip: Spatial Mean Field Regime | Augustin Chaintreau, Technicolor; et al. Jean-Yves Le Boudec, École Polytechnique Fédérale de Lausanne
Nikodin Ristanovic, École Polytechnique Fédérale de Lausanne |
| 2008 | Counter Braids: A Novel Counter Architecture for Per-Flow Measurement | Yi Lu, Stanford University; et al. Andrea Montanari, Stanford University
Balaji Prabhakar, Stanford University
Sarang Dharmapurikar, Cisco Systems
Abdul Kabbani, Stanford University |
| 2007 | Modeling the Relative Fitness of Storage | Michael P. Mesnier, Intel; et al. Matthew Wachs, Carnegie Mellon University
Raja R. Sambasivan, Carnegie Mellon University
Alice X. Zheng, Carnegie Mellon University
Gregory R. Ganger, Carnegie Mellon University |
| 2006 | Maximizing throughput in wireless networks via gossiping | Eytan Modiano, Massachusetts Institute of Technology; et al. Devavrat Shah, Massachusetts Institute of Technology
Gil Zussman, Massachusetts Institute of Technology |
| 2005 | Coupon replication systems | Laurent Massoulié & Milan Vojnović, Microsoft Research |
|---|
| 1996 | Supporting stored video: reducing rate variability and end-to-end resource requirements through op... | James D. Salehi, University of Massachusetts Amherst; et al. Zhi-Li Zhang, University of Massachusetts Amherst
James F. Kurose, University of Massachusetts Amherst
Don Towsley, University of Massachusetts Amherst |
| Exploiting process lifetime distributions for dynamic load balancing | Mor Harchol-Balter & Allen B. Downey, University of California Berkeley |
|---|
| 2012 | High-Performance Complex Event Processing over XML Streams | Barzan Mozafari, Massachusetts Institute of Technology; et al. Kai Zeng, University of California Los Angeles
Carlo Zaniolo, University of California Los Angeles |
| 2011 | Entangled Queries: Enabling Declarative Data-Driven Coordination | Nitin Gupta, Cornell University; et al. Lucja Kot, Cornell University
Sudip Roy, Cornell University
Gabriel Bender, Cornell University
Johannes Gehrke, Cornell University
Christoph Koch, École Polytechnique Fédérale de Lausanne |
| 2010 | FAST: fast architecture sensitive tree search on modern CPUs and GPUs | Changkyu Kim, Intel; et al. Jatin Chhugani, Intel
Nadathur Satish, Intel
Eric Sedlar, Oracle
Anthony D. Nguyen, Intel
Tim Kaldewey, Oracle
Victor W. Lee, Intel
Scott A. Brandt, University of California Santa Cruz
Pradeep Dubey, Intel |
| 2009 | Generating example data for dataflow programs | Christopher Olston, Yahoo! Research; et al. Shubham Chopra, Yahoo! Research
Utkarsh Srivastava, Yahoo! Research |
| 2008 | Serializable isolation for snapshot databases | Michael J. Cahill, University of Sydney; et al. Uwe Röhm, University of Sydney
Alan D. Fekete, University of Sydney |
| 2007 | Compiling mappings to bridge applications and databases | Sergey Melnik, Microsoft Research; et al. Atul Adya, Microsoft
Philip A. Bernstein, Microsoft Research |
| 2006 | To search or to crawl?: towards a query optimizer for text-centric tasks | Panagiotis G. Ipeirotis, New York University; et al. Eugene Agichtein, Microsoft Research
Pranay Jain, Columbia University
Luis Gravano, Columbia University |
|2004|Indexing spatio-temporal trajectories with Chebyshev polynomials|Yuhan Cai & Raymond T. Ng, University of British Columbia|
| 2003 | Spreadsheets in RDBMS for OLAP | Andrew Witkowski, Oracle; et al. Srikanth Bellakonda, Oracle
Tolga Bozkaya, Oracle
Gregory Dorman, Oracle
Nathan Folkert, Oracle
Abhinav Gupta, Oracle
Lei Shen, Oracle
Sankar Subramanian, Oracle |
| 2001 | Locally adaptive dimensionality reduction for indexing large time series databases | Eamonn Keogh, University of California Irvine; et al. Kaushik Chakrabarti, University of California Irvine
Michael Pazzani, University of California Irvine
Sharad Mehrotra, University of California Irvine |
| 2000 | XMill: an efficient compressor for XML data | Hartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories |
| 1999 | DynaMat: a dynamic view management system for data warehouses | Yannis Kotidis & Nick Roussopoulos, University of Maryland |
|---|
| 1997 | Fast parallel similarity search in multimedia databases | Stefan Berchtold, University of Munich; et al. Christian Böml, University of Munich
Bernhard Braunmüller, University of Munich
Daniel A. Keim, University of Munich
Hans-Peter Kriegel, University of Munich |
| 1996 | Implementing data cubes efficiently | Venky Harinarayan, Stanford University; et al. Anand Rajaraman, Stanford University
Jeffrey D. Ullman, Stanford University |
|SODA (Theory)****|
| 2012 | Computing all maps into a sphere | Martin Čadek, Masaryk University; et al. Marek Krčál, Charles University
Jiří Matoušel, Charles University
Francis Sergeraert, Université Joseph Fourier
Lukáš Vokřínel, Masaryk University
Uli Wagner, Charles University |
| 2011 | An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss Transform | Nir Ailon, Technion
Edo Liberty, Yahoo! Research |
| 2010 | An O(log n/log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem | Arash Asadpour, Stanford University; et al. Michel X. Goemans, Massachusetts Institute of Technology
Aleksander Madry, Massachusetts Institute of Technology
Shayan Oveis Gharan, Stanford University
Amin Saberi, Stanford University |
| 2009 | Natural Algorithms | Bernard Chazelle, Princeton University |
|---|
| 2011 | A File is Not a File: Understanding the I/O Behavior of Apple Desktop Applications | Tyler Harter, University of Wisconsin; et al. Chris Dragga, University of Wisconsin
Michael Vaughn, University of Wisconsin
Andrea C. Arpaci-Dusseau, University of Wisconsin
Remzi H. Arpaci-Dusseau, University of Wisconsin |
| Cells: A Virtual Mobile Smartphone Architecture | Jeremy Andrus, Columbia University; et al. Christoffer Dall, Columbia University
Alexander Van't Hof, Columbia University
Oren Laadan, Columbia University
Jason Nieh, Columbia University |
| 2009 | FAWN: A Fast Array of Wimpy Nodes | David G. Andersen, Carnegie Mellon University; et al. Jason Franklin, Carnegie Mellon University
Michael Kaminsky, Intel Research
Amar Phanishayee, Carnegie Mellon University
Lawrence Tan, Carnegie Mellon University
Vijay Vasudevan, Carnegie Mellon University |
| seL4: Formal Verification of an OS Kernel | Gerwin Klein, NICTA; et al. Kevin Elphinstone, NICTA
Gernot Heiser, NICTA
June Andronick, NICTA
David Cock, NICTA
Philip Derrin, NICTA
Dhammika Elkaduwe, NICTA
Kai Engelhardt, NICTA
Rafal Kolanski, NICTA
Michael Norrish, NICTA
Thomas Sewell, NICTA
Harvey Tuch, NICTA
Simon Winwood, NICTA |
| RouteBricks: Exploiting Parallelism to Scale Software Routers | Mihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al. Norbert Egi, Lancaster University
Katerina Argyraki, École Polytechnique Fédérale de Lausanne
Byung-Gon Chun, Intel Research
Kevin Fall, Intel Research
Gianluca Iannaccone, Intel Research
Allan Knies, Intel Research
Maziar Manesh, Intel Research
Sylvia Ratnasamy, Intel Research |
| 2007 | Zyzzyva: speculative byzantine fault tolerance | Ramakrishna Kotla, University of Texas at Austin; et al. Lorenzo Alvisi, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Allen Clement, University of Texas at Austin
Edmund Wong, University of Texas at Austin |
| Sinfonia: a new paradigm for building scalable distributed systems | Marcos K. Aguilera, Hewlett-Packard Labs; et al. Arif Merchant, Hewlett-Packard Labs
Mehul Shah, Hewlett-Packard Labs
Alistair Veitch, Hewlett-Packard Labs
Christos Karamanolis, VMware |
| Secure Web Applications via Automatic Partitioning | Stephen Chong, Cornell University; et al. Jed Liu, Cornell University
Andrew C. Myers, Cornell University
Xin Qi, Cornell University
K. Vikram, Cornell University
Lantian Zheng, Cornell University
Xin Zheng, Cornell University |
| 2005 | Speculative Execution in a Distributed File System | Edmund B. Nightingale, University of Michigan; et al. Peter M. Chen, University of Michigan
Jason Flinn, University of Michigan |
| BAR Tolerance for Cooperative Services | Amitanand S. Aiyer, University of Texas at Austin; et al. Lorenzo Alvisi, University of Texas at Austin
Allen Clement, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Jean-Philippe Martin, University of Texas at Austin
Carl Porth, University of Texas at Austin |
| Rx: treating bugs as allergies - a safe method to survive software failures | Feng Qin, University of Illinois at Urbana-Champaign; et al. Joseph Tucek, University of Illinois at Urbana-Champaign
Jagadeesan Sundaresan, University of Illinois at Urbana-Champaign
Yuanyuan Zhou, University of Illinois at Urbana-Champaign |
| Vigilante: End-to-End Containment of Internet Worms | Manuel Costa, University of Cambridge; et al. Jon Crowcroft, University of Cambridge
Miguel Castro, Microsoft Research
Antony Rowstron, Microsoft Research
Lidong Zhou, Microsoft Research
Lintao Zhang, Microsoft Research
Paul Barham, Microsoft Research |
|2003|Backtracking intrusions|Samuel T. King & Peter M. Chen, University of Michigan|
| Preserving peer replicas by rate-limited sampled voting | Petros Maniatis, Stanford University; et al. David S. H. Rosenthal, Stanford University
Mema Roussopoulos, Stanford University
Mary Baker, Stanford University
TJ Giuli, Stanford University
Yanto Muliadi, Stanford University |
| Improving the Reliability of Commodity Operating Systems | Michael M. Swift, University of Washington; et al. Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington |
| 2001 | BASE: using abstraction to improve fault tolerance | Rodrigo Rodrigues, Massachusetts Institute of Technology; et al. Miguel Castro, Microsoft Research
Barbara Liskov, Massachusetts Institute of Technology |
| Untrusted hosts and confidentiality: secure program partitioning | Steve Zdancewic, Cornell University; et al. Lantian Zheng, Cornell University
Nathaniel Nystrom, Cornell University
Andrew C. Myers, Cornell University |
| 1999 | Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors | Kinshuk Govil, Stanford University; et al. Dan Teodosiu, Hewlett-Packard Labs
Yongqiang Huang, Stanford University
Mendel Rosenblum, Stanford University |
|Soft timers: efficient microsecond software timer support for network processing|Mohit Aron & Peter Druschel, Rice University|
| The Click modular router | Robert Morris, Massachusetts Institute of Technology; et al. Eddie Kohler, Massachusetts Institute of Technology
John Jannotti, Massachusetts Institute of Technology
M. Frans Kaashoek, Massachusetts Institute of Technology |
| Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail se... | Yasushi Saito, University of Washington; et al. Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington |
| 1997 | Continuous profiling: where have all the cycles gone? | Jennifer M. Anderson, Digital Equipment Corporation; et al. Lance M. Berc, Digital Equipment Corporation
Jeffrey Dean, Digital Equipment Corporation
Sanjay Ghemawat, Digital Equipment Corporation
Monika R. Henzinger, Digital Equipment Corporation
Shun-Tak A. Leung, Digital Equipment Corporation
Richard L. Sites, Digital Equipment Corporation
Mark T. Vandevoorde, Digital Equipment Corporation
Carl A. Waldspurger, Digital Equipment Corporation
William E. Weihl, Digital Equipment Corporation |
| Disco: running commodity operating systems on scalable multiprocessors | Edouard Bugnion, Stanford University; et al. Scott Devine, Stanford University
Mendel Rosenblum, Stanford University |
| Eraser: a dynamic data race detector for multithreaded programs | Stefan Savage, University of Washington; et al. Michael Burrows, Digital Equipment Corporation
Greg Nelson, Digital Equipment Corporation
Patrick Sobalvarro, Digital Equipment Corporation
Thomas Anderson, University of California Berkeley |
|STOC (Theory)****|
| 2012 | Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower Bounds | Samuel Fiorini, Université libre de Bruxelles; et al. Serge Massar, Université libre de Bruxelles
Sebastian Pokutta, Universität Erlangen Nürnberg
Hans Tiwary, Université libre de Bruxelles
Ronald de Wolf, Centrum Wiskunde & Informatica |
|The Cell Probe Complexity of Dynamic Range Counting|Kasper Larsen, Aarhus University|
| 2011 | Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphs | Paul Christiano, Massachusetts Institute of Technology; et al. Jonathan A. Kelner, Massachusetts Institute of Technology
Aleksander Madry, Massachusetts Institute of Technology
Daniel A. Spielman, Yale University
Shang-Hua Teng, University of Southern California |
| Subexponential lower bounds for randomized pivoting rules for the simplex algorithm | Oliver Friedmann, University of Munich; et al. Thomas Dueholm Hansen, Aarhus University
Uri Zwick, Tel-Aviv University |
| 2010 | An improved LP-based approximation for steiner tree | Jaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al. Fabrizio Grandoni, University of Tor Vergata
Thomas Rothvoß, École Polytechnique Fédérale de Lausanne
Laura Sanità, École Polytechnique Fédérale de Lausanne |
| QIP = PSPACE | Rahul Jain, National University of Singapore; et al. Zhengfeng Ji, Perimeter Institute for Theoretical Physics
Sarvagya Upadhyay, University of Waterloo
John Watrous, University of Waterloo |
| 2009 | A constructive proof of the Lovász local lemma | Robin A. Moser, ETH Zurich |
|---|---|---|
| 2008 | Optimal algorithms and inapproximability results for every CSP? | Prasad Raghavendra, University of Washington |
| Optimal hierarchical decompositions for congestion minimization in networks | Harald Räcke, University of Warwick | |
| 2007 | Faster integer multiplication | Martin Fürer, Pennsylvania State University |
| Towards 3-query locally decodable codes of subexponential length | Sergey Yekhanin, Massachusetts Institute of Technology | |
| 2006 | The PCP theorem by gap amplification | Irit Dinur, Hebrew University |
| 2005 | Undirected ST-connectivity in log-space | Omer Reingold, Weizmann Institute of Science |
| 2004 | Multi-linear formulas for permanent and determinant are of super-polynomial size | Ran Raz, Weizmann Institute of Science |
| Expander flows, geometric embeddings and graph partitioning | Sanjeev Arora, Princeton University; et al. Satish Rao, University of California Berkeley
Umesh Vazirani, University of California Berkeley |
| 2003 | Derandomizing polynomial identity tests means proving circuit lower bounds | Valentine Kabanets & Russell Impagliazzo, University of California San Diego |
|---|---|---|
| UIST (User Interface)**** | ||
| 2012 | CrowdScape: interactively visualizing user behavior and output | Jeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University |
| Cliplets: juxtaposing still and dynamic imagery | Neel Joshi, Microsoft Research; et al. Sisil Mehta, Georgia Institute of Technology
Steven Drucker, Microsoft Research
Eric Stollnitz, Microsoft Research
Hugues Hoppe, Microsoft Research
Matt Uyttendaele, Microsoft
Michael Cohen, Microsoft Research |
| Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Chang... | Sean Follmer, Massachusetts Institute of Technology; et al. Daniel Leithinger, Massachusetts Institute of Technology
Alex Olwal, Massachusetts Institute of Technology
Nadia Cheng, Massachusetts Institute of Technology
Hiroshi Ishii, Massachusetts Institute of Technology |
| 2011 | SideBySide: Ad-hoc Multi-user Interaction with Handheld Projectors | Karl D.D. Willis, Carnegie Mellon University; et al. Ivan Poupyrev, Disney Research
Scott E. Hudson, Carnegie Mellon University
Moshe Mahler, Disney Research |
| 2010 | VizWiz: nearly real-time answers to visual questions | Jeffrey P. Bigham, University of Rochester; et al. Chandrika Jayant, University of Washington
Hanjie Ji, University of Rochester
Greg Little, Massachusetts Institute of Technology
Andrew Miller, University of Central Florida
Robert C. Miller, Massachusetts Institute of Technology
Robin Miller, University of Rochester
Aubrey Tatarowicz, Massachusetts Institute of Technology
Brandyn White, University of Maryland
Samual White, University of Rochester
Tom Yeh, University of Maryland |
| 2009 | Mouse 2.0: Multi-touch meets the Mouse | Nicolas Villar, Microsoft Research; et al. Shahram Izadi, Microsoft Research
Dan Rosenfeld, Microsoft
Hrvoje Benko, Microsoft Research
John Helmes, Microsoft Research
Jonathan Westhues, Microsoft Research
Steve Hodges, Microsoft Research
Eyal Ofek, Microsoft
Alex Butler, Microsoft Research
Xiang Cao, Microsoft Research
Billy Chen, Microsoft |
| 2008 | Bringing Physics to the Surface | Andrew D. Wilson, Microsoft Research; et al. Shahram Izadi, Microsoft Research
Otmar Hilliges, Microsoft Research
Armando Garcia-Mendoza, Microsoft Research
David Kirk, Microsoft Research |
| 2007 | ThinSight: Versatile Multi-touch Sensing for Thin Form-factor Displays | Steve Hodges, Microsoft Research; et al. Shahram Izadi, Microsoft Research
Alex Butler, Microsoft Research
Alban Rrustemi, Microsoft Research
Bill Buxton, Microsoft Research |
| 2006 | Reflective Physical Prototyping through Integrated Design, Test, and Analysis | Björn Hartmann, Stanford University; et al. Scott Klemmer, Stanford University
Michael Bernstein, Stanford University
Leith Abdulla, Stanford University
Brandon Burr, Stanford University
Avi Robinson-Mosher, Stanford University
Jennifer Gee, Stanford University |
| 2005 | Automation and Customization of Rendered Web Pages | Michael Bolin, Massachusetts Institute of Technology; et al. Matthew Webber, Massachusetts Institute of Technology
Philip Rha, Massachusetts Institute of Technology
Tom Wilson, Massachusetts Institute of Technology
Robert C. Miller, Massachusetts Institute of Technology |
| 2004 | Multi-Finger Gestural Interaction with 3D Volumetric Displays | Tovi Grossman, University of Toronto; et al. Daniel Wigdor, University of Toronto
Ravin Balakrishnan, University of Toronto |
|CrossY: A Crossing-Based Drawing Application|Georg Apitz & François Guimbretière, University of Maryland|
| 2003 | Perceptually-Supported Image Editing of Text and Graphics | Eric Saund, Palo Alto Research Center; et al. David Fleet, Palo Alto Research Center
Daniel Larner, Palo Alto Research Center
James Mahoney, Palo Alto Research Center |
| 2002 | Clothing Manipulation | Takeo Igarashi, University of Tokyo
John F. Hughes, Brown University |
|2001|Phidgets: Easy Development of Physical Interfaces through Physical Widgets|Saul Greenberg & Chester Fitchett, University of Calgary|
| 2000 | Sensing Techniques for Mobile Interaction | Ken Hinckley, Microsoft Research; et al. Jeff Pierce, Microsoft Research
Mike Sinclair, Microsoft Research
Eric Horvitz, Microsoft Research |
| 1996 | Indigo: A Local Propagation Algorithm for Inequality Constraints | Alan Borning, University of Washington; et al. Richard Anderson, University of Washington
Bjorn Freeman-Benson, Object Technology International |
|VLDB (Databases)****|
| 2012 | Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification | Albert Angel, University of Toronto; et al. Nick Koudas, University of Toronto
Nikos Sarkas, University of Toronto
Divesh Srivastava, AT&T Laboratories |
| 2011 | RemusDB: Transparent High-Availability for Database Systems | Umar Farooq Minhas, University of Waterloo; et al. Shriram Rajagopalan, University of British Columbia
Brendan Cully, University of British Columbia
Ashraf Aboulnaga, University of Waterloo
Ken Salem, University of Waterloo
Andrew Warfield, University of British Columbia |
| 2010 | Towards Certain Fixes with Editing Rules and Master Data | Shuai Ma, University of Edinburgh; et al. Wenfei Fan, University of Edinburgh
Jianzhong Li, Harbin Institute of Technology
Wenyuan Yu, University of Edinburgh
Nan Tang, University of Edinburgh |
| 2009 | A Unified Approach to Ranking in Probabilistic Databases | Jian Li, University of Maryland; et al. Barna Saha, University of Maryland
Amol Deshpande, University of Maryland |
| 2008 | Finding Frequent Items in Data Streams | Graham Cormode & Marios Hadjieleftheriou, AT&T Laboratories |
|---|
| 2007 | Scalable Semantic Web Data Management Using Vertical Partitioning | Daniel J. Abadi, Massachusetts Institute of Technology; et al. Adam Marcus, Massachusetts Institute of Technology
Samuel R. Madden, Massachusetts Institute of Technology
Kate Hollenbach, Massachusetts Institute of Technology |
| 2006 | Trustworthy Keyword Search for Regulatory-Compliant Records Retention | Soumyadeb Mitra, University of Illinois at Urbana-Champaign; et al. Windsor W. Hsu, University of Illinois at Urbana-Champaign
Marianne Winslett, University of Illinois at Urbana-Champaign |
| 2005 | Cache-conscious Frequent Pattern Mining on a Modern Processor | Amol Ghoting, Ohio State University; et al. Gregory Buehrer, Ohio State University
Srinivasan Parthasarathy, Ohio State University
Daehyun Kim, Intel
Anthony D. Nguyen, Intel
Yen-Kuang Chen, Intel
Pradeep Dubey, Intel |
| 2004 | Model-Driven Data Acquisition in Sensor Networks | Amol Deshpande, University of California Berkeley; et al. Carlos Guestrin, Intel Research
Samuel R. Madden, Massachusetts Institute of Technology
Joseph M. Hellerstein, University of California Berkeley
Wei Hong, Intel Research |
| 2001 | Weaving Relations for Cache Performance | Anastassia Ailamaki, Carnegie Mellon University; et al. David J. DeWitt, University of Wisconsin
Mark D. Hill, University of Wisconsin
Marios Skounakis, University of Wisconsin |
| 1997 | Integrating Reliable Memory in Databases | Wee Teck Ng & Peter M. Chen, University of Michigan |
|---|
| 2012 | Counting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the Standard | Marcelo Arenas, Pontificia Universidad Católica de Chile; et al. Sebastián Conca, Pontificia Universidad Católica de Chile
Jorge Pérez, Universidad de Chile |
| 2011 | Towards a theory model for product search | Beibei Li, New York University; et al. Anindya Ghose, New York University
Panagiotis G. Ipeirotis, New York University |
| 2010 | Factorizing personalized Markov chains for next-basket recommendation | Steffen Rendle, Osaka University; et al. Christoph Freudenthaler, University of Hildesheim
Lars Schmidt-Thieme, University of Hildesheim |
| 2009 | Hybrid keyword search auctions | Ashish Goel, Stanford University
Kamesh Munagala, Duke University |
| 2008 | IRLbot: Scaling to 6 billion pages and beyond | Hsin-Tsang Lee, Texas A&M University; et al. Derek Leonard, Texas A&M University
Xiaoming Wang, Texas A&M University
Dmitri Loguinov, Texas A&M University |
| 2007 | Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganogra... | Lars Backstrom, Cornell University; et al. Cynthia Dwork, Microsoft Research
Jon Kleinberg, Cornell University |
| 2006 | Random Sampling from a Search Engine's Index | Ziv Bar-Yossef & Maxim Gurevich, Technion |
|---|
| 2004 | Automatic detection of fragments in dynamically generated web pages | Lakshmish Ramaswamy, Georgia Institute of Technology; et al. Arun Iyengar, IBM Research
Ling Liu, Georgia Institute of Technology
Fred Douglis, IBM Research |
|2003|Scaling personalized web search|Glen Jeh & Jennifer Widom, Stanford University|
| SemTag and seeker: bootstrapping the semantic web via automated semantic annotation | Stephen Dill, IBM Research; et al. Nadav Eiron, IBM Research
David Gibson, IBM Research
Daniel Gruhl, IBM Research
R. Guha, IBM Research
Anant Jhingran, IBM Research
Tapas Kanungo, IBM Research
Sridhar Rajagopalan, IBM Research
Andrew Tomkins, IBM Research
John A. Tomlin, IBM Research
Jason Y. Zien, IBM Research |
|2002|Abstracting application-level web security|David Scott & Richard Sharp, University of Cambridge|
| 2001 | Engineering Server Driven Consistency for Large Scale Dynamic Web Services | Jian Yin, University of Texas at Austin; et al. Lorenzo Alvisi, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Arun Iyengar, IBM Research |
| 2000 | Graph Structure in the Web | Andrei Broder, AltaVista; et al. Ravi Kumar, IBM Research
Farzin Maghoul, AltaVista
Prabhakar Raghavan, IBM Research
Sridhar Rajagopalan, IBM Research
Raymie Stata, Compaq Systems Research Center
Andrew Tomkins, IBM Research
Janet Wiener, Compaq Systems Research Center |
| 1999 | Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery | Soumen Chakrabarti, Indian Institute of Technology; et al. Martin van den Berg, FX Palo Alto Lab
Byron Dom, IBM Research |
| 1998 | The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/video | Kevin C. Almeroth, University of California Santa Barbara
Mostafa H. Ammar, Georgia Institute of Technology |
| Institutions with Best Papers**** | |
|---|---|
| Microsoft Research | 26.2 |
| Carnegie Mellon University | 22.5 |
| Stanford University | 22.0 |
| Massachusetts Institute of Technology | 20.6 |
| University of Washington | 20.3 |
| University of California Berkeley | 17.3 |
| University of Toronto | 13.3 |
| Cornell University | 10.9 |
| University of Illinois at Urbana-Champaign | 9.9 |
| University of Texas at Austin | 9.4 |
| University of British Columbia | 8.8 |
| IBM Research | 8.4 |
| University of Oxford | 6.2 |
| Georgia Institute of Technology | 6.0 |
| University of California Irvine | 5.9 |
| 5.7 | |
| Princeton University | 5.6 |
| University of Massachusetts Amherst | 5.2 |
| AT&T Laboratories | 4.9 |
| University of Maryland | 4.8 |
| Yahoo! Research | 4.8 |
| Weizmann Institute of Science | 4.5 |
| McGill University | 4.4 |
| University of California San Diego | 4.1 |
| University of Michigan | 4.0 |
| École Polytechnique Fédérale de Lausanne | 3.9 |
| Technion | 3.8 |
| Rice University | 3.5 |
| Brown University | 3.3 |
| Bell Labs | 3.3 |
| University of Nottingham | 3.3 |
| Université Paris-Sud | 3.1 |
| Columbia University | 3.1 |
| National University of Singapore | 3.0 |
| DePaul University | 3.0 |
| University of Alberta | 3.0 |
| Hewlett-Packard Labs | 3.0 |
| University of Wisconsin | 2.8 |
| ETH Zurich | 2.8 |
| University of North Carolina at Chapel Hill | 2.8 |
| NEC Labs America | 2.7 |
| University of Nebraska-Lincoln | 2.6 |
| Max Planck Institut | 2.6 |
| University of Cambridge | 2.6 |
| Ohio State University | 2.4 |
| University of Waterloo | 2.4 |
| Duke University | 2.3 |
| Toyota Technological Institute at Chicago | 2.3 |
| University of Pennsylvania | 2.3 |
| Aarhus University | 2.3 |
| Tel-Aviv University | 2.2 |
| Saarland University | 2.1 |
| Polytechnic Institute of New York University | 2.0 |
| University College London | 2.0 |
| Universidade Técnica de Lisboa | 2.0 |
| Indiana University at Bloomington | 2.0 |
| BBN Technologies | 2.0 |
| NASA Ames Research Center | 2.0 |
Credit is given in decreasingauthor order as customary in many fields. First authors are given 1 point,second authors are given 0.5 points, third authors are given 0.33 points, etc.These points are then divided by the sum of points for that paper, i.e.normalizing it. This ranking may be inaccurate or incomplete, may not reflectthe current state of best paper awards, and is not an official list. If you arenot satisfied with the ranking listed here, please disregard it.
