Best Paper Awards in Computer Science

By Conference:   AAAI   ACL   CHI   CIKM   CVPR   FOCS   FSE   ICCV   ICML   ICSE   IJCAI   KDD   OSDI   PODS   SIGIR   SIGMOD   SOSP   STOC   UIST   VLDB   WWW

Institutions with the most Best Papers

AAAI (Artificial Intelligence)
2011Complexity of and Algorithms for Borda ManipulationJessica Davies, University of Toronto; et al.
George Katsirelos, Université Paris-Sud
Nina Narodytska, University of New South Wales
Toby Walsh, NICTA
2010A Novel Transition Based Encoding Scheme for Planning as SatisfiabilityRuoyun Huang, Washington University in St. Louis; et al.
Yixin Chen, Washington University in St. Louis
Weixiong Zhang, Washington University in St. Louis
2008How Good is Almost Perfect?Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg
Optimal False-Name-Proof Voting Rules with Costly VotingLiad Wagman & Vincent Conitzer, Duke University
2007PLOW: A Collaborative Task Learning AgentJames Allen, Institute for Human and Machine Cognition; et al.
Nathanael Chambers, Stanford University
George Ferguson, University of Rochester
Lucian Galescu, Institute for Human and Machine Cognition
Hyuckchul Jung, Institute for Human and Machine Cognition
Mary Swift, University of Rochester
William Taysom, Institute for Human and Machine Cognition
Thresholded Rewards: Acting Optimally in Timed, Zero-Sum GamesColin McMillen & Manuela Veloso, Carnegie Mellon University
2006Model Counting: A New Strategy for Obtaining Good BoundsCarla P. Gomes, Cornell University; et al.
Ashish Sabharwal, Cornell University
Bart Selman, Cornell University
Towards an Axiom System for Default LogicGerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto
2005The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic SelectionVincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University
2004Learning and Inferring Transportation RoutinesLin Liao, University of Washington; et al.
Dieter Fox, University of Washington
Henry Kautz, University of Washington
2002On Computing All Abductive ExplanationsThomas Eiter, Technische Universität Wien
Kazuhisa Makino, Osaka University
2000The Game of Hex: An Automatic Theorem-Proving Approach to Game ProgrammingVadim V. Anshelevich, Vanshel Consulting
1999PROVERB: The Probabilistic CruciverbalistGreg A. Keim, Duke University; et al.
Noam M. Shazeer, Duke University
Michael L. Littman, Duke University
Sushant Agarwal, Duke University
Catherine M. Cheves, Duke University
Joseph Fitzgerald, Duke University
Jason Grosland, Duke University
Fan Jiang, Duke University
Shannon Pollard, Duke University
Karl Weinmeister, Duke University
1998Learning Evaluation Functions for Global Optimization and Boolean SatisfiabilityJustin A. Boyan & Andrew W. Moore, Carnegie Mellon University
Acceleration Methods for Numeric CSPsYahia Lebbah & Olivier Lhomme, Ecole des Mines de Nantes
The Interactive Museum Tour-Guide RobotWolfram Burgard, University of Bonn; et al.
Armin B. Cremers, University of Bonn
Dieter Fox, University of Bonn
Dirk Hähnel, University of Bonn
Gerhard Lakemeyer, Aachen University of Technology
Dirk Schulz, University of Bonn
Walter Steiner, University of Bonn
Sebastian Thrun, Carnegie Mellon University
1997Statistical Parsing with a Context-Free Grammar and Word StatisticsEugene Charniak, Brown University
A Practical Algorithm for Finding Optimal TriangulationsKrill Shoikhet & Dan Geiger, Technion
Fast Context Switching in Real-Time Propositional ReasoningP. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center
Building Concept Representations from Reusable ComponentsPeter Clark, Boeing
Bruce Porter, University of Texas at Austin
1996Verification of Knowledge Bases Based on Containment CheckingAlon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, Université Paris-Sud
A Novel Application of Theory Refinement to Student ModelingPaul T. Baffes, SciComp
Raymond J. Mooney, University of Texas at Austin
Pushing the Envelope: Planning, Propositional Logic, and Stochastic SearchHenry Kautz & Bart Selman, AT&T Laboratories
ACL (Natural Language Processing)
2011Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based ProjectionsDipanjan Das, Carnegie Mellon University
Slav Petrov, Google
2010Beyond NomBank: A Study of Implicit Arguments for Nominal PredicatesMatthew Gerber & Joyce Y. Chai, Michigan State University
2009Reinforcement Learning for Mapping Instructions to ActionsS.R.K. Branavan, Massachusetts Institute of Technology; et al.
Harr Chen, Massachusetts Institute of Technology
Luke S. Zettlemoyer, Massachusetts Institute of Technology
Regina Barzilay, Massachusetts Institute of Technology
K-Best A* ParsingAdam Pauls & Dan Klein, University of California Berkeley
Concise Integer Linear Programming Formulations for Dependency ParsingAndré F.T. Martins, Instituto de Telecomunicações; et al.
Noah A. Smith, Carnegie Mellon University
Eric P. Xing, Carnegie Mellon University
2008Forest Reranking: Discriminative Parsing with Non-Local FeaturesLiang Huang, University of Pennsylvania
A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language ModelLibin Shen, BBN Technologies; et al.
Jinxi Xu, BBN Technologies
Ralph Weischedel, BBN Technologies
2007Learning synchronous grammars for semantic parsing with lambda calculusYuk Wah Wong & Raymond J. Mooney, University of Texas at Austin
2006Semantic taxonomy induction from heterogenous evidenceRion Snow, Stanford University; et al.
Daniel Jurafsky, Stanford University
Andrew Y. Ng, Stanford University
2005A Hierarchical Phrase-Based Model for Statistical Machine TranslationDavid Chiang, University of Maryland
2004Finding Predominant Word Senses in Untagged TextDiana McCarthy, University of Sussex; et al.
Rob Koeling, University of Sussex
Julie Weeds, University of Sussex
John Carroll, University of Sussex
2003Accurate Unlexicalized ParsingDan Klein & Christopher D. Manning, Stanford University
Towards a Model of Face-to-Face GroundingYukiko I. Nakano, RISTEX; et al.
Gabe Reinstein, Massachusetts Institute of Technology
Tom Stocky, Massachusetts Institute of Technology
Justine Cassell, Massachusetts Institute of Technology
2002Discriminative Training and Maximum Entropy Models for Statistical Machine TranslationFranz Josef Och & Hermann Ney, RWTH Aachen University
2001Immediate-Head Parsing for Language ModelsEugene Charniak, Brown University
Fast Decoding and Optimal Decoding for Machine TranslationUlrich Germann, University of Southern California; et al.
Michael Jahr, Stanford University
Kevin Knight, University of Southern California
Daniel Marcu, University of Southern California
Kenji Yamada, University of Southern California
CHI (Human-Computer Interaction)
2011Usable Gestures for Blind People: Understanding Preference and PerformanceShaun K. Kane, University of Washington; et al.
Jacob O. Wobbrock, University of Washington
Richard E. Ladner, University of Washington
Effects of Community Size and Contact Rate in Synchronous Social Q&ARyen W. White, Microsoft Research; et al.
Matthew Richardson, Microsoft Research
Yandong Liu, Carnegie Mellon University
Teenagers and Their Virtual Possessions: Design Opportunities and IssuesWilliam Odom, Carnegie Mellon University; et al.
John Zimmerman, Carnegie Mellon University
Jodi Forlizzi, Carnegie Mellon University
Enhancing Physicality in Touch Interaction with Programmable FrictionVincent Levesque, University of British Columbia; et al.
Louise Oram, University of British Columbia
Karon MacLean, University of British Columbia
Andy Cockburn, University of Canterbury
Nicholas D. Marchuk, Northwestern University
Dan Johnson, Northwestern University
J. Edward Colgate, Northwestern University
Mid-air Pan-and-Zoom on Wall-sized DisplaysMathieu Nancel, Université Paris-Sud; et al.
Julie Wagner, INRIA
Emmanuel Pietriga, INRIA
Olivier Chapuis, Université Paris-Sud
Wendy Mackay, INRIA
Bricolage: Example-Based Retargeting for Web DesignRanjitha Kumar, Stanford University; et al.
Jerry Talton, Stanford University
Salman Ahmad, Stanford University
Scott Klemmer, Stanford University
Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual Env...Thomas Erickson, IBM Research; et al.
N. Sadat Shami, IBM Research
Wendy A. Kellogg, IBM Research
David W. Levine, IBM Research
In the Shadow of Misperception: Assistive Technology Use and Social InteractionsKristen Shinohara & Jacob O. Wobbrock, University of Washington
Why is My Internet Slow?: Making Network Speeds VisibleMarshini Chetty, Georgia Institute of Technology; et al.
David Haslem, Orange Sparkle Ball
Andrew Baird, Amazon
Ugochi Ofoha, Georgia Institute of Technology
Bethany Sumner, Georgia Institute of Technology
Rebecca Grinter, Georgia Institute of Technology
Ease of Juggling: Studying the Effects of Manual MultitaskingAntti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University
Automics: souvenir generating photoware for theme parksAbigail Durrant, University of Nottingham; et al.
Duncan Rowland, University of Lincoln
David S. Kirk, University of Nottingham
Steve Benford, University of Nottingham
Joel E. Fischer, University of Nottingham
Derek McAuley, University of Nottingham
Michael A. Peshkin, Northwestern University
Your Noise is My Command: Sensing Gestures Using the Body as an AntennaGabe Cohn, University of Washington; et al.
Daniel Morris, Microsoft Research
Shwetak N. Patel, University of Washington
Desney Tan, Microsoft Research
Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Word ...Koji Yatani, University of Toronto; et al.
Michael Novati, University of Toronto
Andrew Trusty, University of Toronto
Khai N. Truong, University of Toronto
2010Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber BundlesPatrick Baudisch, Hasso Plattner Institute; et al.
Torsten Becker, Hasso Plattner Institute
Frederik Rudeck, Hasso Plattner Institute
Mapping the Landscape of Sustainable HCICarl DiSalvo, Georgia Institute of Technology; et al.
Phoebe Sengers, Cornell University
Hrönn Brynjarsdóttir, Cornell University
Occlusion-Aware InterfacesDaniel Vogel & Ravin Balakrishnan, University of Toronto
Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural IndiaNeil Patel, Stanford University; et al.
Deepti Chittamuru, University of California Berkeley
Anupam Jain, IBM Research
Paresh Dave, Development Support Center
Tapan S. Parikh, University of California Berkeley
How does search behavior change as search becomes more difficult?Anne Aula, Google; et al.
Rehan M. Khan, Google
Zhiwei Guan, Google
The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Cont...Brent Hecht & Darren Gergle, Northwestern University
Skinput: Appropriating the Body as an Input SurfaceChris Harrison, Carnegie Mellon University; et al.
Desney Tan, Microsoft Research
Dan Morris, Microsoft Research
Mobile-izing Health Workers in Rural IndiaDivya Ramachandran, University of California Berkeley; et al.
John Canny, University of California Berkeley
Prabhu Dutta Das, Dhirubhai Ambani Institute of Information and Communications Technology
Edward Cutrell, Microsoft Research
The Design of Eco-Feedback TechnologyJon Froehlich, University of Washington; et al.
Leah Findlater, University of Washington
James Landay, University of Washington
Feminist HCI: Taking Stock and Outlining an Agenda for DesignShaowen Bardzell, Indiana University at Bloomington
Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface StructureMorgan Dixon & James Fogarty, University of Washington
Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of ChartsScott Bateman, University of Saskatchewan; et al.
Regan L. Mandryk, University of Saskatchewan
Carl Gutwin, University of Saskatchewan
Aaron Genest, University of Saskatchewan
David McDine, University of Saskatchewan
Christopher Brooks, University of Saskatchewan
2009From Interaction to Trajectories: Designing Coherent Journeys Through User ExperiencesSteve Benford, University of Nottingham; et al.
Gabriella Giannachi, University of Exeter
Boriana Koleva, University of Nottingham
Tom Rodden, University of Nottingham
Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Serie...Jeffrey Heer, Stanford University; et al.
Nicholas Kong, University of California Berkeley
Maneesh Agrawala, University of California Berkeley
Predicting Tie Strength With Social MediaEric Gilbert & Karrie Karahalios, University of Illinois at Urbana-Champaign
Musink: Composing Music through Augmented DrawingTheophanis Tsandilas, Université Paris-Sud; et al.
Catherine Letondal, Université Paris-Sud
Wendy E. Mackay, Université Paris-Sud
Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector ExhibitsScott S. Snibbe, Sona Research
Hayes S. Raffle, Massachusetts Institute of Technology
Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection PerformanceLeah Findlater, University of British Columbia; et al.
Karyn Moffatt, University of British Columbia
Joanna McGrenere, University of British Columbia
Jessica Dawson, University of British Columbia
Undo and Erase Events as Indicators of Usability ProblemsDavid Akers, Stanford University; et al.
Matthew Simpson, Google
Robin Jeffries, Google
Terry Winograd, Stanford University
2008In-Car GPS Navigation: Engagement with and Disengagement from the EnvironmentGilly Leshed, Cornell University; et al.
Theresa Velden, Cornell University
Oya Rieger, Cornell University
Blazej Kot, Cornell University
Phoebe Sengers, Cornell University
Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Interf...Krzysztof Z. Gajos, University of Washington; et al.
Jacob O. Wobbrock, University of Washington
Daniel S. Weld, University of Washington
Large Scale Analysis of Web Revisitation PatternsEytan Adar, University of Washington; et al.
Jaime Teevan, Microsoft Research
Susan T. Dumais, Microsoft Research
Designs on Dignity: Perceptions of Technology Among the HomelessChristopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology
The Network in the Garden: An Empirical Analysis of Social Media in Rural LifeEric Gilbert, University of Illinois at Urbana-Champaign; et al.
Karrie Karahalios, University of Illinois at Urbana-Champaign
Christian Sandvig, University of Illinois at Urbana-Champaign
Multimodal collaborative handwriting training for visually-impaired peopleBeryl Plimmer, University of Auckland; et al.
Andrew Crossan, University of Glasgow
Stephen A. Brewster, University of Glasgow
Rachel Blagojevic, University of Auckland
An Error Model for Pointing Based on Fitts' LawJacob O. Wobbrock, University of Washington; et al.
Edward Cutrell, Microsoft Research
Susumu Harada, University of Washington
I. Scott MacKenzie, York University
2007Multiview: improving trust in group video conferencing through spatial faithfulnessDavid T. Nguyen & John Canny, University of California Berkeley
Software or wetware?: discovering when and why people use digital prosthetic memoryVaiva Kalnikaité & Steve Whittaker, University of Sheffield
Shift: a technique for operating pen-based interfaces using touchDaniel Vogel, University of Toronto
Patrick Baudisch, Microsoft Research
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognitio...Björn Hartmann, Stanford University; et al.
Leith Abdulla, Stanford University
Manas Mittal, Massachusetts Institute of Technology
Scott R. Klemmer, Stanford University
Sustainable interaction design: invention & disposal, renewal & reuseEli Blevis, Indiana University at Bloomington
Consuming video on Mobile devicesKenton O'Hara, Hewlett-Packard Labs; et al.
April Slayden Mitchell, Hewlett-Packard Labs
Alex Vorbau, Hewlett-Packard Labs
2006Trackball text entry for people with motor impairmentsJacob O. Wobbrock & Brad Myers, Carnegie Mellon University
Embedded phenomena: supporting science learning with classroom-sized distributed simulationsTom Moher, University of Illinois at Chicago
A role for haptics in mobile interaction: initial design using a handheld tactile display prototypeJoseph Luk, University of British Columbia; et al.
Jérôme Pasquero, McGill University
Shannon Little, University of British Columbia
Karon MacLean, University of British Columbia
Vincent Lévesque, McGill University
Vincent Hayward, McGill University
2005Making space for stories: ambiguity in the design of personal communication systemsPaul M. Aoki, Palo Alto Research Center
Allison Woodruff, Intel Research
Examining Task Engagement in Sensor-Based Statistical Models of Human InterruptibilityJames Fogarty, Carnegie Mellon University; et al.
Andrew J. Ko, Carnegie Mellon University
Htet Htet Aung, Carnegie Mellon University
Elspeth Golden, Carnegie Mellon University
Karen P. Tang, Carnegie Mellon University
Scott E. Hudson, Carnegie Mellon University
Designing the spectator experienceStuart Reeves, University of Nottingham; et al.
Steve Benford, University of Nottingham
Claire O'Malley, University of Nottingham
Mike Fraser, University of Bristol
The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation areaTovi Grossman & Ravin Balakrishnan, University of Toronto
CIKM (Knowledge Management)
2011Intent-aware query similarityJiafeng Guo, Chinese Academy of Sciences; et al.
Xueqi Cheng, Chinese Academy of Sciences
Gu Su, Microsoft Research
Xiaofei Zhu, Chinese Academy of Sciences
2010MENTA: Inducing Multilingual Taxonomies from WikipediaGerard de Melo & Gerhard Weikum, Max Planck Institut
FACeTOR: cost-driven exploration of faceted query resultsAbhijith Kashyap, State University of New York at Buffalo; et al.
Vagelis Hristidis, Florida International University
Michalis Petropoulos, State University of New York at Buffalo
2009On the Feasibility of Multi-Site Web Search EnginesRicardo Baeza-Yates, Yahoo! Research; et al.
Aristides Gionis, Yahoo! Research
Flavio Junqueira, Yahoo! Research
Vassilis Plachouras, Yahoo! Research
Luca Telloli, Yahoo! Research
2008Learning to Link with WikipediaDavid Milne & Ian H. Witten, Univerisity of Waikato
2007Autonomously Semantifying WikipediaFei Wu & Daniel S. Weld, University of Washington
2006Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing IndicesSegabtian Michel, Max Planck Institut; et al.
Matthias Bender, Max Planck Institut
Nikos Ntarmos, RACTI and University of Patras
Peter Triantafillou, RACTI and University of Patras
Gerhard Weikum, Max Planck Institut
Christian Zimmer, Max Planck Institut
2005Towards Automatic Association of Relevant Unstructured Content with Structured Query ResultsPrasan Roy, IBM Research; et al.
Mukesh Mohania, IBM Research
Bhuvan Bamba, Georgia Institute of Technology
Shree Raman, University of Massachusetts Amherst
2004Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XMLQiankun Zhao, Nanyang Technological University; et al.
Sourav S Bhowmick, Nanyang Technological University
Mukesh Mohania, IBM Research
Yahiko Kambayashi, Kyoto University
CVPR (Computer Vision)
2011Real-time Human Pose Recognition in Parts from Single Depth ImagesJamie Shotton, Microsoft Research; et al.
Andrew Fitzgibbon, Microsoft Research
Mat Cook, Microsoft Research
Toby Sharp, Microsoft Research
Mark Finocchio, Microsoft Research
Richard Moore, Microsoft Research
Alex Kipman, Microsoft Research
Andrew Blake, Microsoft Research
2010Efficient Computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data using...Anders Eriksson & Anton va den Hendel, University of Adelaide
2009Single Image Haze Removal Using Dark Channel PriorKaiming He, The Chinese University of Hong Kong; et al.
Jian Sun, Microsoft Research
Xiaoou Tang, The Chinese University of Hong Kong
2008Global Stereo Reconstruction under Second Order Smoothness PriorsOliver Woodford, University of Oxford; et al.
Ian Reid, Oxford Brookes University
Philip Torr, University of Oxford
Andrew Fitzgibbon, Microsoft Research
Beyond Sliding Windows: Object Localization by Efficient Subwindow SearchChistoph H. Lampert, Max Planck Institut; et al.
Matthew B. Blaschko, Max Planck Institut
Thomas Hodmann, Google
2007Dynamic 3D Scene Analysis from a Moving VehicleBastian Leibe, ETH Zurich; et al.
Nico Cornelis, Katholieke Universiteit Leuven
Kurt COrnelis, Katholieke Universiteit Leuven
Luc Van Gool, ETH Zurich
2006Putting Objects in PerspectiveDerek Hoiem, Carnegie Mellon University; et al.
Alexei Efros, Carnegie Mellon University
Martial Hebert, Carnegie Mellon University
2005Real-Time Non-Rigid Surface DetectionJulien Pilet, École Polytechnique Fédérale de Lausanne; et al.
Vincent Lepetit, École Polytechnique Fédérale de Lausanne
Pascal Fua, École Polytechnique Fédérale de Lausanne
2004Programmable Imaging using a Digital Micromirror ArrayShree K. Nayar, Columbia University; et al.
Vlad Branzoi, Columbia University
Terry E. Boult, University of Colorado
2003Object Class Recognition by Unsupervised Scale-Invariant LearningRob Fergus, University of Oxford; et al.
Pietro Perona, California Institute of Technology
Andrew Zisserman, University of Oxford
2001Morphable 3D models from videoMatthew Brand, Mitsubishi Electric Research Laboratories
2000Real-Time Tracking of Non-Rigid Objects using Mean ShiftDorin Comaniciu, Siemens Corporate Research; et al.
Visvanathan Ramesh, Siemens Corporate Research
Peter Meer, Rutgers University
FOCS (Theory)
20113-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ Hold in GeneralTimon Hertli, ETH Zurich
A Polylogarithmic-Competitive Algorithm for the k-Server ProblemNikhil Bansal, IBM Research; et al.
Niv Buchbinder, Open University
Aleksander M&acedil;dry, Massachusetts Institute of Technology
Joseph Naor, Technion
2010Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke DecompositionsMatthew Andrews, Bell Labs
Subexponential Algorithms for Unique Games and Related ProblemsSanjeev Arora, Princeton University; et al.
Boaz Barak, Princeton University
David Steurer, Princeton University
Computational Transition at the Uniqueness ThresholdAllan Sly, Microsoft Research
2008Two Query PCP with Sub-Constant ErrorDana Moshkovitz & Ran Raz, Weizmann Institute of Science
2007Space-Efficient Identity Based Encryption Without PairingsDan Boneh, Stanford University; et al.
Craig Gentry, Stanford University
Michael Hamburg, Stanford University
2006Settling the Complexity of 2-Player Nash EquilibriumXi Chen, Tsinghua University
Xiaotie Deng, City University of Hong Kong
2005The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type Met...Subhash A. Khot, Georgia Institute of Technology
Nisheeth K. Vishnoi, IBM Research
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial TimeFarzad Parvaresh & Alexander Vardy, University of California San Diego
2004Cryptography in NC0Benny Applebaum, Technion; et al.
Yuval Ishai, Technion
Eyal Kushilevitz, Technion
Hardness of Approximating the Shortest Vector Problem in LatticesSubhash Khot, Georgia Institute of Technology
2003On the Impossibility of Dimension Reduction in L1Bo Brinkman & Moses Charikar, Princeton University
2002A Dichotomy Theorem for Constraints on a Three-Element SetAndrei A. Bulatov, University of Oxford
Minimizing Congestion in General NetworksHarald Räcke, Paderborn University
Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String ModelBoaz Barak, Weizmann Institute of Science
FSE (Software Engineering)
2011Proactive Detection of Collaboration ConflictsYuriy Brun, University of Washington; et al.
Reid Holmes, University of Waterloo
Michael D. Ernst, University of Washington
David Notkin, University of Washington
How Do Fixes Become Bugs?Zuoning Yin, University of Illinois at Urbana-Champaign; et al.
Ding Yuan, University of Illinois at Urbana-Champaign
Yuanyuan Zhou, University of California San Diego
Shankar Pasupathy, NetApp
Lakshmi Bairavasundaram, NetApp
Proving programs robustSwarat Chaudhuri, Rice University; et al.
Sumit Gulwani, Microsoft Research
Roberto Lublinerman, Pennsylvania State University
Sara Navidpour, Pennsylvania State University
2010Creating and evolving developer documentation: understanding the decisions of open source contributo...Barthélémy Dagenais & Martin P. Robillard, McGill University
Developer Fluency: Achieving True Mastery in Software ProjectsMinghui Zhou, Peking University
Audris Mockus, Avaya Labs
Staged Concurrent Program AnalysisNishant Sinha & Chao Wang, NEC Labs America
2009Asserting and checking determinism for multithreaded programsJacob Burnim & Koushik Sen, University of California Berkeley
Darwin: an approach for debugging evolving programsDawei Qi, National University of Singapore; et al.
Abhik Roychoudhury, National University of Singapore
Zhenkai Liang, National University of Singapore
Kapil Vaswani, Microsoft Research
Graph-based Mining of Multiple Object Usage PatternsTung Thanh Nguyen, Iowa State University; et al.
Hoan Anh Nguyen, Iowa State University
Nam H. Pham, Iowa State University
Jafar M. Al-Kofahi, Iowa State University
Tien N. Nguyen, Iowa State University
2008What makes a good bug report?Nicolas Bettenburg, Saarland University; et al.
Sascha Just, Saarland University
Adrian Schröter, University of Victoria
Cathrin Weiss, University of Zurich
Rahul Premraj, Saarland University
Thomas Zimmermann, University of Calgary
Efficient online monitoring of web-service SLAsFranco Raimondi, University College London; et al.
James Skene, University College London
Wolfgang Emmerich, University College London
2007Automatic consistency assessment for query results in dynamic environmentsJamie Payton, University of North Carolina at Charlotte; et al.
Christine Julien, University of Texas at Austin
Gruia-Catalin Roman, Washington University in St. Louis
Globally distributed software development project performance: an empirical analysisNarayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University
Mining specifications of malicious behaviorMihai Christodorescu, University of Wisconsin; et al.
Somesh Jha, University of Wisconsin
Christopher Kruegel, Vienna University of Technology
Object and reference immutability using Java genericsYoav Zibin, Massachusetts Institute of Technology; et al.
Alex Potanin, Victoria University of Wellington
Mahmood Ali, Massachusetts Institute of Technology
Shay Artzi, Massachusetts Institute of Technology
Adam Kieżun, Massachusetts Institute of Technology
Michael D. Ernst, Massachusetts Institute of Technology
2006Controlling factors in evaluating path-sensitive error detection techniquesMatthew B. Dwyer, University of Nebraska-Lincoln; et al.
Suzette Person, University of Nebraska-Lincoln
Sebastian Elbaum, University of Nebraska-Lincoln
SYNERGY: a new algorithm for property checkingBhargav S. Gulavani, Indian Institute of Technology; et al.
Thomas A. Henzinger, École Polytechnique Fédérale de Lausanne
Yamini Kannan, Microsoft Research
Aditya V. Nori, Microsoft Research
Sriram K. Rajamani, Microsoft Research
2005Automatic Generation of Suggestions for Program InvestigationMartin P. Robillard, McGill University
CUTE: a concolic unit testing engine for CKoushik Sen, University of Illinois at Urbana-Champaign; et al.
Darko Marinov, University of Illinois at Urbana-Champaign
Gul Agha, University of Illinois at Urbana-Champaign
Context- and path-sensitive memory leak detectionYichen Xie & Alex Aiken, Stanford University
2004Reasoning about partial goal satisfaction for requirements and design engineeringEmmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain
A classification system and analysis for aspect-oriented programsMartin Rinard, Massachusetts Institute of Technology; et al.
Alexandru Salcianu, Massachusetts Institute of Technology
Suhabe Bugrara, Massachusetts Institute of Technology
2003Eliminating redundancies with a "composition with adaptation" meta-programming techniqueStan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong University
A Family of Test Adequacy Criteria for Database-Driven ApplicationsGregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh
Predicting problems caused by component upgradesStephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology
2002Isolating Cause-Effect Chains from Computer ProgramsAndreas Zeller, Saarland University
ICCV (Computer Vision)
2011Relative AttributesDevi Parikh, Toyota Technological Institute at Chicago
Kristen Grauman, University of Texas at Austin
2009Discriminative models for multi-class object layoutChaitanya Desai, University of California Irvine; et al.
Deva Ramanan, University of California Irvine
Charless Fowlkes, University of California Irvine
2007Population Shape Regression From Random Design DataBradley Davis, University of North Carolina at Chapel Hill; et al.
P. Thomas Fletcher, University of Utah
Elizabeth Bullitt, University of North Carolina at Chapel Hill
Sarang Joshi, University of Utah
2005Globally Optimal Estimates for Geometric Reconstruction ProblemsFredrik Kahl, Lund University
Didier Henrion, LAAS-CNRS
2003Detecting Pedestrians using Patterns of Motion and AppearancePaul Viola, Microsoft Research; et al.
Michael J. Jones, Mitsubishi Electric Research Laboratories
Daniel Snow, Mitsubishi Electric Research Laboratories
Image Parsing: Unifying Segmentation, Detection and RecognitionZhuowen Tu, University of California Los Angeles; et al.
Xiangrong Chen, University of California Los Angeles
Alan L. Yuille, University of California Los Angeles
Song-Chun Zhu, University of California Los Angeles
Image-based Rendering using Image-based PriorsAndrew Fitzgibbon, University of Oxford; et al.
Yonatan Wexler, Weizmann Institute of Science
Andrew Zisserman, University of Oxford
2001Probabilistic Tracking with Exemplars in a Metric SpaceKentaro Toyama & Andrew Blake, Microsoft Research
The Space of All Stereo ImagesSteven Seitz, University of Washington
1999Euclidean Reconstruction and Reprojection up to SubgroupsYi Ma, University of California Berkeley; et al.
Stefano Soatto, Washington University in St. Louis
Jana Kosecka, University of California Berkeley
Shankar Sastry, University of California Berkeley
A Theory of Shape by Space CarvingKiriakos Kutulakos, University of Rochester
Steven Seitz, Carnegie Mellon University
1998Self-Calibration and Metric Reconstruction in spite of Varying and Unknown Internal Camera Parameter...Marc Pollefeys, Katholieke Universiteit Leuven; et al.
Reinhard Koch, Katholieke Universiteit Leuven
Luc Van Gool, Katholieke Universiteit Leuven
The Problem of Degeneracy in Structure and Motion Recovery from Uncalibrated Image SequencesPhil Torr, Microsoft Research; et al.
Andrew Fitzgibbon, University of Oxford
Andrew Zisserman, University of Oxford
ICML (Machine Learning)
2011Computational Rationalization: The Inverse Equilibrium ProblemKevin Waugh, Carnegie Mellon University; et al.
Brian Ziebart, Carnegie Mellon University
Drew Bagnell, Carnegie Mellon University
2010Hilbert Space Embeddings of Hidden Markov ModelsLe Song, Carnegie Mellon University; et al.
Byron Boots, Carnegie Mellon University
Sajid M. Siddiqi, Google
Geoffrey Gordon, Carnegie Mellon University
Alex Smola, Yahoo! Research
2009Structure preserving embeddingBlake Shaw & Tony Jebara, Columbia University
2008SVM Optimization: Inverse Dependence on Training Set SizeShai Shalev-Shwartz & Nathan Srebro, University of Chicago
2007Information-theoretic metric learningJason V. Davis, University of Texas at Austin; et al.
Brian Kulis, University of Texas at Austin
Prateek Jain, University of Texas at Austin
Suvrit Sra, University of Texas at Austin
Inderjit S. Dhillon, University of Texas at Austin
2006Trading convexity for scalabilityRonan Collobert, NEC Labs America; et al.
Fabian Sinz, NEC Labs America
Jason Weston, NEC Labs America
Léon Bottou, NEC Labs America
2005A support vector method for multivariate performance measuresThorsten Joachims, Cornell University
1999Least-Squares Temporal Difference LearningJustin A. Boyan, NASA Ames Research Center
ICSE (Software Engineering)
2011Verifying Multi-threaded Software using SMT-based Context-Bounded Model CheckingLucas Cordeiro & Bernd Fischer, University of Southampton
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and Pr...Narayan Ramasubbu, Singapore Management University; et al.
Marcelo Cataldo, Carnegie Mellon University
Rajesh Krishna Balan, Singapore Management University
James D. Herbsleb, Carnegie Mellon University
Programs, tests, and oracles: the foundations of testing revisitedMatt Staats, University of Minnesota; et al.
Michael W. Whalen, University of Minnesota
Mats P.E. Heimdahl, University of Minnesota
On-demand Feature Recommendations Derived from Mining Public Product DescriptionsHoratiu Dumitru, DePaul University; et al.
Marek Gibiec, DePaul University
Negar Hariri, DePaul University
Jane Cleland-Huang, DePaul University
Bamshad Mobasher, DePaul University
Carlos Castro-Herrera, DePaul University
Mehdi Mirakhorli, DePaul University
Run-Time Efficient Probabilistic Model CheckingAntonio Filieri, Politecnico di Milano; et al.
Carlo Ghezzi, Politecnico di Milano
Giordano Tamburrelli, Politecnico di Milano
2010A Machine Learning Approach for Tracing Regulatory Codes to Product Specific RequirementsJane Cleland-Huang, DePaul University; et al.
Adam Czauderna, DePaul University
John Emenecker, DePaul University
Marek Gibiec, DePaul University
Collaborative Reliability Prediction of Service-Oriented SystemsZibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong
A Cut-off Approach for Bounded Verification of Parameterized SystemsQiusong Yang & Mingshu Li, Chinese Academy of Sciences
Test Generation through Programming in UDITAMilos Gligoric, University of Illinois at Urbana-Champaign; et al.
Tihomir Gvero, École Polytechnique Fédérale de Lausanne
Vilas Jagannath, University of Illinois at Urbana-Champaign
Sarfraz Khurshid, University of Texas at Austin
Viktor Kuncak, École Polytechnique Fédérale de Lausanne
Darko Marinov, University of Illinois at Urbana-Champaign
A Degree-of-Knowledge Model to Capture Source Code FamiliarityThomas Fritz, University of British Columbia; et al.
Jingwen Ou, University of British Columbia
Gail C. Murphy, University of British Columbia
Emerson Murphy-Hill, University of British Columbia
2009How We Refactor, and How We Know ItEmerson Murphy-Hill, Portland State University; et al.
Chris Parnin, Georgia Institute of Technology
Andrew P. Black, Portland State University
Effective Static Deadlock DetectionMayur Naik, Intel Research; et al.
Chang-Seo Park, University of California Berkeley
Koushik Sen, University of California Berkeley
David Gay, Intel Research
Invariant-Based Automatic Testing of AJAX User InterfacesAli Mesbah & Arie van Deursen, Delft University of Technology
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows VistaChristian Bird, University of California Davis; et al.
Nachiappan Nagappan, Microsoft Research
Premkumar Devanbu, University of California Davis
Harald Gall, University of Zurich
Brendan Murphy, Microsoft Research
Automatically finding patches using genetic programmingWestley Weimer, University of Virginia; et al.
ThanhVu Nguyen, University of New Mexico
Claire Le Goues, University of Virginia
Stephanie Forrest, University of New Mexico
2008Precise memory leak detection for java software using container profilingGuoqing Xu & Atanas Rountev, Ohio State University
Debugging reinvented: asking and answering why and why not questions about program behaviorAndrew J. Ko & Brad A. Myers, Carnegie Mellon University
Recommending adaptive changes for framework evolutionBarthélémy Dagenais & Martin P. Robillard, McGill University
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental ApproachJoseph Ruthruff, University of Nebraska-Lincoln; et al.
John Penix, Google
J. David Morgenthaler, Google
Sebastian Elbaum, University of Nebraska-Lincoln
Gregg Rothermel, University of Nebraska-Lincoln
The effect of program and model structure on mc/dc test adequacy coverageAjitha Rajan, University of Minnesota; et al.
Michael W. Whalen, Rockwell Collins
Mats P.E. Heimdahl, University of Minnesota
2007Refactoring for Parameterizing Java ClassesAdam Kiezun, Massachusetts Institute of Technology; et al.
Michael D. Ernst, Massachusetts Institute of Technology
Frank Tip, IBM Research
Robert M. Fuhrer, IBM Research
Tracking Code Clones in Evolving SoftwareEkwa Duala-Ekoko & Martin P. Robillard, McGill University
Matching and Merging of Statecharts SpecificationsShiva Nejati, University of Toronto; et al.
Mehrdad Sabetzadeh, University of Toronto
Marsha Chechik, University of Toronto
Steve Easterbrook, University of Toronto
Pamela Zave, AT&T Laboratories
Predicting Faults from Cached HistorySunghun Kim, Massachusetts Institute of Technology; et al.
Thomas Zimmermann, Saarland University
E. James Whitehead Jr., University of California Santa Cruz
Andreas Zeller, Saarland University
2006Model-Based Development of Dynamically Adaptive SoftwareJi Zhang & Betty H.C. Cheng, Michigan State University
Who Should Fix This Bug?John Anvik, University of British Columbia; et al.
Lyndon Hiew, University of British Columbia
Gail C. Murphy, University of British Columbia
2005Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Perf...Andrew Ko, Carnegie Mellon University; et al.
Htet Htet Aung, Carnegie Mellon University
Brad Myers, Carnegie Mellon University
Is Mutation an Appropriate Tool for Testing Experiments?James Andrews, University of Western Ontario; et al.
Lionel Briand, Carleton University
Yvan Labiche, Carleton University
Using Structural Context to Recommend Source Code ExamplesReid Holmes & Gail Murphy, University of British Columbia
Data Structure Repair Using Goal-Directed ReasoningBrian Demsky & Martin Rinard, Massachusetts Institute of Technology
2004SNIAFL: Towards a Static Non-Interactive Approach to Feature LocationWei Zhao, Peking University; et al.
Lu Zhang, Peking University
Yin Liu, Peking University
Jiasu Sun, Peking University
Fuqing Yang, Peking University
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized SystemsRohit Khare & Richard N. Taylor, University of California Irvine
An Empirical Study of Software Reuse vs. Defect-Density and StabilityParastoo Mohagheghi, Ericsson Norway-Grimstad; et al.
Reidar Conradi, Norwegian University of Science and Technology
Ole M. Killi, Norwegian University of Science and Technology
Henrik Schwarz, Norwegian University of Science and Technology
A Tool for Writing and Debugging Algebraic SpecificationsJohannes Henkel & Amer Diwan, University of Colorado
Static Checking of Dynamically Generated Queries in Database ApplicationsCarl Gould, University of California Davis; et al.
Zhendong Su, University of California Davis
Premkumar Devanbu, University of California Davis
2003Precise Dynamic Slicing AlgorithmsXiangyu Zhang, University of Arizona; et al.
Rajiv Gupta, University of Arizona
Youtao Zhang, University of Arizona
Modular Verification of Software Components in CSagar Chaki, Carnegie Mellon University; et al.
Edmund Clarke, Carnegie Mellon University
Alex Groce, Carnegie Mellon University
Somesh Jha, University of Wisconsin
Helmut Veith, Technische Universität Wien
IJCAI (Artificial Intelligence)
2011Unweighted Coalitional Manipulation Under the Borda Rule is NP-HardNadja Betzler, Technische Universität Berlin; et al.
Rolf Niedermeier, Technische Universität Berlin
Gerhard J. Woeginger, Technische Universität Eindhoven
Nested Rollout Policy Adaptation for Monte Carlo Tree SearchChristopher D. Rosin, Parity Computing
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean SpacesRoman Kontchakov, Birkbeck College London; et al.
Yavor Nenov, University of Manchester
Ian Pratt-Hartmann, University of Manchester
Michael Zakharyaschev, Birkbeck College London
2009Consequence-Driven Reasoning for Horn SHIQ OntologiesYevgeny Kazakov, University of Oxford
Learning Conditional Preference Networks with QueriesFrederic Koriche, Université Montpellier II
Bruno Zanuttini, Université de Caen Basse-Normandie
2007Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian NetworksMaleeha Qazi, Siemens Medical Solutions; et al.
Glenn Fung, Siemens Medical Solutions
Sriram Krishnan, Siemens Medical Solutions
Romer Rosales, Siemens Medical Solutions
Harald Steck, Siemens Medical Solutions
R. Bharat Rao, Siemens Medical Solutions
Don Polderman, Erasmus University Medical Center
Dhanalakshmi Chandrasekaran, No Affiliation
Building Structure into Local Search for SATDuc Nghia Pham, Griffith University; et al.
John Thornton, Griffith University
Abdul Sattar, Griffith University
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Progr...Luc Mercier & Pascal Van Hentenryck, Brown University
2005Learning Coordination ClassifiersYuhong Guo, University of Alberta; et al.
Russell Greiner, University of Alberta
Dale Schuurmans, University of Alberta
Solving CheckersJonathan Schaeffer, University of Alberta; et al.
Yngvi Bjornsson, University of Alberta
Neil Burch, University of Alberta
Akihiro Kishimoto, University of Alberta
Martin Muller, University of Alberta
Robert Lake, University of Alberta
Paul Lu, University of Alberta
Steve Sutphen, University of Alberta
A Probabilistic Model of Redundancy in Information ExtractionDoug Downey, University of Washington; et al.
Oren Etzioni, University of Washington
Stephen Soderland, University of Washington
2003Approximating Game-Theoretic Optimal Strategies for Full-scale PokerDarse Billings, University of Alberta; et al.
Neil Burch, University of Alberta
Aaron Davidson, University of Alberta
Robert Holte, University of Alberta
Jonathan Schaeffer, University of Alberta
Terence Schauenberg, University of Alberta
Duane Szafron, University of Alberta
Thin Junction Tree Filters for Simultaneous Localization and MappingMark A. Paskin, University of California Berkeley
2001Complexity Results for Structure-Based CausalityThomas Eiter & Thomas Lukasiewicz, Vienna University of Technology
1999Learning in Natural LanguageDan Roth, University of Illinois at Urbana-Champaign
A Distributed Case-Based Reasoning Application for Engineering Sales SupportIan Watson, University of Salford
Dan Gardingen, Western Air
1997Object Identification in a Bayesian ContextTimothy Huang & Stuart Russell, University of California Berkeley
Translingual Information Retrieval: A Comparative EvaluationJaime G. Carbonell, Carnegie Mellon University; et al.
Yiming Yang, Carnegie Mellon University
Robert E. Frederking, Carnegie Mellon University
Ralf D. Brown, Carnegie Mellon University
Yibing Geng, Carnegie Mellon University
Danny Lee, Carnegie Mellon University
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolog ...Fangzhen Lin, The Hongkong University of Science and Technology
KDD (Data Mining)
2011Leakage in Data Mining: Formulation, Detection, and AvoidanceShachar Kaufman, Tel-Aviv University; et al.
Saharon Rosset, Tel-Aviv University
Claudia Perlich, Media6Degrees
2010Large linear classification when data cannot fit in memoryHsiang-Fu Yu, National Taiwan University; et al.
Cho-Jui Hsieh, National Taiwan University
Kai-Wei Chang, National Taiwan University
Chih-Jen Lin, National Taiwan University
Connecting the dots between news articlesDafna Shahaf & Carlos Guestrin, Carnegie Mellon University
2009Collaborative Filtering with Temporal DynamicsYehuda Koren, Yahoo! Research
2008Fastanova: an efficient algorithm for genome-wide association studyXiang Zhang, University of North Carolina at Chapel Hill; et al.
Fei Zou, University of North Carolina at Chapel Hill
Wei Wang, University of North Carolina at Chapel Hill
2007Predictive discrete latent factor models for large scale dyadic dataDeepak Agarwal & Srujana Merugu, Yahoo! Research
2006Training linear SVMs in linear timeThorsten Joachims, Cornell University
2005Graphs over time: densification laws, shrinking diameters and possible explanationsJure Leskovec, Carnegie Mellon University; et al.
Jon Kleinberg, Cornell University
Christos Faloutsos, Carnegie Mellon University
2004A probabilistic framework for semi-supervised clusteringSugato Basu, University of Texas at Austin; et al.
Mikhail Bilenko, University of Texas at Austin
Raymond J. Mooney, University of Texas at Austin
2003Maximizing the spread of influence through a social networkDavid Kempe, Cornell University; et al.
Jon Kleinberg, Cornell University
Éva Tardos, Cornell University
2002Pattern discovery in sequences under a Markov assumptionDarya Chudova & Padhraic Smyth, University of California Irvine
2001Robust space transformations for distance-based operationsEdwin M. Knorr, University of British Columbia; et al.
Raymond T. Ng, University of British Columbia
Ruben H. Zamar, University of British Columbia
2000Hancock: a language for extracting signatures from data streamsCorinna Cortes, AT&T Laboratories; et al.
Kathleen Fisher, AT&T Laboratories
Daryl Pregibon, AT&T Laboratories
Anne Rogers, AT&T Laboratories
1999MetaCost: a general method for making classifiers cost-sensitivePedro Domingos, Universidade Técnica de Lisboa
1998Occam's Two Razors: The Sharp and the BluntPedro Domingos, Universidade Técnica de Lisboa
1997Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Dist...Foster Provost & Tom Fawcett, NYNEX Science and Technology
OSDI (Operating Systems)
2010Efficient System-Enforced Deterministic ParallelismAmittai Aviram, Yale University; et al.
Shu-Chun Weng, Yale University
Sen Hu, Yale University
Bryan Ford, Yale University
The Turtles Project: Design and Implementation of Nested VirtualizationMuli Ben-Yehuda, IBM Research; et al.
Michael D. Day, IBM Linux Technology Center
Zvi Dubitzky, IBM Research
Michael Factor, IBM Research
Nadav Har'El, IBM Research
Abel Gordon, IBM Research
Anthony Liguori, IBM Linux Technology Center
Orit Wasserman, IBM Research
Ben-Ami Yassour, IBM Research
2008KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems ProgramsCristian Cadar, Stanford University; et al.
Daniel Dunbar, Stanford University
Dawson Engler, Stanford University
Difference Engine: Harnessing Memory Redundancy in Virtual MachinesDiwaker Gupta, University of California San Diego; et al.
Sangmin Lee, University of Texas at Austin
Michael Vrable, University of California San Diego
Stefan Savage, University of California San Diego
Alex C. Snoeren, University of California San Diego
George Varghese, University of California San Diego
Geoffrey M. Voelker, University of California San Diego
Amin Vahdat, University of California San Diego
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Langu...Yuan Yu, Microsoft Research; et al.
Michael Isard, Microsoft Research
Dennis Fetterly, Microsoft Research
Mihai Budiu, Microsoft Research
Úlfar Erlingsson, Microsoft Research
Pradeep Kumar Gunda, Microsoft Research
Jon Currey, Microsoft Research
2006Bigtable: A Distributed Storage System for Structured DataFay Chang, Google; et al.
Jeffrey Dean, Google
Sanjay Ghemawat, Google
Wilson C. Hsieh, Google
Deborah A. Wallach, Google
Mike Burrows, Google
Tushar Chandra, Google
Andrew Fikes, Google
Robert E. Gruber, Google
Rethink the SyncEdmund B. Nightingale, University of Michigan; et al.
Kaushik Veeraraghavan, University of Michigan
Peter M. Chen, University of Michigan
Jason Flinn, University of Michigan
2004Using Model Checking to Find Serious File System ErrorsJunfeng Yang, Stanford University; et al.
Paul Twohey, Stanford University
Dawson Engler, Stanford University
Madanlal Musuvathi, Microsoft Research
Recovering Device DriversMichael M. Swift, University of Washington; et al.
Muthukaruppan Annamalai, University of Washington
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington
2002Memory Resource Management in VMware ESX ServerCarl A. Waldspurger, VMware
2000Checking System Rules Using System-Specific, Programmer-Written Compiler ExtensionsDawson Engler, Stanford University; et al.
Benjamin Chelf, Stanford University
Andy Chou, Stanford University
Seth Hallem, Stanford University
1999IO-Lite: A Unified I/O Buffering and Caching SystemVivek S. Pai, Rice University; et al.
Peter Druschel, Rice University
Willy Zwaenepoel, Rice University
1996Automatic Compiler-Inserted I/O Prefetching for Out-of-Core ApplicationsTodd C. Mowry, University of Toronto; et al.
Angela K. Demke, University of Toronto
Orran Krieger, University of Toronto
PODS (Databases)
2011Data Exchange Beyond Complete DataMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.
Jorge Pérez, Universidad de Chile
Juan Reutter, University of Edinburgh
2010An Optimal Algorithm for the Distinct Elements ProblemDaniel M. Kane, Harvard University; et al.
Jelani Nelson, Massachusetts Institute of Technology
David P. Woodruff, IBM Research
2009Size and Treewidth Bounds for Conjunctive QueriesGeorg Gottlob, University of Oxford; et al.
Stephanie Lee, University of Oxford
Gregory Valient, University of California Berkeley
2008Estimating PageRank on Graph StreamsAtish Das Sarma, Georgia Institute of Technology; et al.
Sreenivas Gollapudi, Microsoft Research
Rina Panigrahy, Microsoft Research
2007Generalized Hypertree Decompositions: NP-Hardness and Tractable VariantsGeorg Gottlob, University of Oxford; et al.
Zoltan Miklos, University of Oxford
Thomas Schwentick, Universität Dortmund
2006Two-variable logic on data trees and XML reasoningMikolaj Bojanczyk, Warsaw University; et al.
Claire David, Université Paris
Anca Muscholl, Université Paris
Thomas Schwentick, Universität Dortmund
Luc Segoufin, Université Paris
2005On the complexity of division and set joins in the relational algebraDirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum
XML data exchange: consistency and query answeringMarcelo Arenas & Leonid Libkin, University of Toronto
2004Conditional XPath, the first order complete XPath dialectMaarten Marx, University of Amsterdam
2003An Information-Theoretic Approach to Normal Forms for Relational and XML DataMarcelo Arenas & Leonid Libkin, University of Toronto
2002 Monadic Datalog and the Expressive Power of Languages for Web Information ExtractionGeorg Gottlob & Christoph Koch, Technische Universität Wien
2001Optimal aggregation algorithms for middlewareRonald Fagin, IBM Research; et al.
Amnon Lotem, University of Maryland
Moni Naor, Weizmann Institute of Science
2000Auditing Boolean attributesJon Kleinberg, Cornell University; et al.
Christos Papadimitriou, University of California Berkeley
Prabhakar Raghavan, IBM Research
1999Exact and approximate aggregation in constraint query languagesMichael Benefikt & Leonid Libkin, Bell Labs
1998A lower bound theorem for indexing schemes and its application to multidimensional range queriesVasilis Samoladas & Daniel P. Miranker, University of Texas at Austin
Expressiveness of structured document query languages based on attribute grammarsFrank Neven & Jan Van den Bussche, Limburgs Universitair Centrum
1997On the Complexity of Database QueriesChristos H. Papadimitriou, University of California Berkeley
Mihalis Yannakakis, Bell Labs
SIGIR (Information Retrieval)
2011Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction DataMikhail Ageev, Moscow State University; et al.
Qi Guo, Emory University
Dmitry Lagun, Emory University
Eugene Agichtein, Emory University
2010Assessing the Scenic Route: Measuring the Value of Search Trails in Web LogsRyen W. White, Microsoft Research
Jeff Huang, University of Washington
2009Sources of evidence for vertical selectionJaime Arguello, Carnegie Mellon University; et al.
Fernando Diaz, Yahoo! Research
Jamie Callan, Carnegie Mellon University
Jean-Francois Crespo, Yahoo! Research
2008Algorithmic Mediation for Collaborative Exploratory SearchJeremy Pickens, FX Palo Alto Lab; et al.
Gene Golovchinsky, FX Palo Alto Lab
Chirag Shah, University of North Carolina at Chapel Hill
Pernilla Qvarfordt, FX Palo Alto Lab
Maribeth Back, FX Palo Alto Lab
2007Studying the Use of Popular Destinations to Enhance Web Search InteractionRyen W. White, Microsoft Research; et al.
Mikhail Bilenko, Microsoft Research
Silviu Cucerzan, Microsoft Research
2006Minimal Test Collections for Retrieval EvaluationBen Carterette, University of Massachusetts Amherst; et al.
James Allan, University of Massachusetts Amherst
Ramesh Sitaraman, University of Massachusetts Amherst
2005Learning to estimate query difficulty: including applications to missing content detection and distr...Elad Yom-Tov, IBM Research; et al.
Shai Fine, IBM Research
David Carmel, IBM Research
Adam Darlow, IBM Research
2004A Formal Study of Information Retrieval HeuristicsHui Fang, University of Illinois at Urbana-Champaign; et al.
Tao Tao, University of Illinois at Urbana-Champaign
ChengXiang Zhai, University of Illinois at Urbana-Champaign
2003Re-examining the potential effectiveness of interactive query expansionIan Ruthven, University of Strathclyde
2002Novelty and redundancy detection in adaptive filteringYi Zhang, Carnegie Mellon University; et al.
Jamie Callan, Carnegie Mellon University
Thomas Minka, Carnegie Mellon University
2001Temporal summaries of new topicsJames Allan, University of Massachusetts Amherst; et al.
Rahul Gupta, University of Massachusetts Amherst
Vikas Khandelwal, University of Massachusetts Amherst
2000IR evaluation methods for retrieving highly relevant documentsKalervo Järvelin & Jaana Kekäläinen, University of Tampere
1999Cross-language information retrieval based on parallel texts and automatic mining of parallel texts ...Jian-Yun Nie, Université de Montréal; et al.
Michel Simard, Université de Montréal
Pierre Isabelle, Université de Montréal
Richard Durand, Université de Montréal
1998A theory of term weighting based on exploratory data analysisWarren R. Greiff, University of Massachusetts Amherst
1997Feature selection, perceptron learning, and a usability case study for text categorizationHwee Tou Ng, DSO National Laboratories; et al.
Wei Boon Goh, Ministry of Defence
Kok Leong Low, Ministry of Defence
1996Retrieving spoken documents by combining multiple index sourcesGareth Jones, University of Cambridge; et al.
Jonathan Foote, University of Cambridge
Karen Spärck Jones, University of Cambridge
Steve Young, University of Cambridge
SIGMOD (Databases)
2011Entangled Queries: Enabling Declarative Data-Driven CoordinationNitin Gupta, Cornell University; et al.
Lucja Kot, Cornell University
Sudip Roy, Cornell University
Gabriel Bender, Cornell University
Johannes Gehrke, Cornell University
Christoph Koch, École Polytechnique Fédérale de Lausanne
2010FAST: fast architecture sensitive tree search on modern CPUs and GPUsChangkyu Kim, Intel; et al.
Jatin Chhugani, Intel
Nadathur Satish, Intel
Eric Sedlar, Oracle
Anthony D. Nguyen, Intel
Tim Kaldewey, Oracle
Victor W. Lee, Intel
Scott A. Brandt, University of California Santa Cruz
Pradeep Dubey, Intel
2009Generating example data for dataflow programsChristopher Olston, Yahoo! Research; et al.
Shubham Chopra, Yahoo! Research
Utkarsh Srivastava, Yahoo! Research
2008Serializable isolation for snapshot databasesMichael J. Cahill, University of Sydney; et al.
Uwe Röhm, University of Sydney
Alan D. Fekete, University of Sydney
2007Compiling mappings to bridge applications and databasesSergey Melnik, Microsoft Research; et al.
Atul Adya, Microsoft
Philip A. Bernstein, Microsoft Research
2006To search or to crawl?: towards a query optimizer for text-centric tasksPanagiotis G. Ipeirotis, New York University; et al.
Eugene Agichtein, Microsoft Research
Pranay Jain, Columbia University
Luis Gravano, Columbia University
2004Indexing spatio-temporal trajectories with Chebyshev polynomialsYuhan Cai & Raymond T. Ng, University of British Columbia
2003Spreadsheets in RDBMS for OLAPAndrew Witkowski, Oracle; et al.
Srikanth Bellakonda, Oracle
Tolga Bozkaya, Oracle
Gregory Dorman, Oracle
Nathan Folkert, Oracle
Abhinav Gupta, Oracle
Lei Shen, Oracle
Sankar Subramanian, Oracle
2001Locally adaptive dimensionality reduction for indexing large time series databasesEamonn Keogh, University of California Irvine; et al.
Kaushik Chakrabarti, University of California Irvine
Michael Pazzani, University of California Irvine
Sharad Mehrotra, University of California Irvine
2000XMill: an efficient compressor for XML dataHartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories
1999DynaMat: a dynamic view management system for data warehousesYannis Kotidis & Nick Roussopoulos, University of Maryland
1998Efficient transparent application recovery in client-server information systemsDavid Lomet & Gerhard Weikum, Microsoft Research
1997Fast parallel similarity search in multimedia databasesStefan Berchtold, University of Munich; et al.
Christian Böml, University of Munich
Bernhard Braunmüller, University of Munich
Daniel A. Keim, University of Munich
Hans-Peter Kriegel, University of Munich
1996Implementing data cubes efficientlyVenky Harinarayan, Stanford University; et al.
Anand Rajaraman, Stanford University
Jeffrey D. Ullman, Stanford University
SOSP (Operating Systems)
2011A File is Not a File: Understanding the I/O Behavior of Apple Desktop ApplicationsTyler Harter, University of Wisconsin; et al.
Chris Dragga, University of Wisconsin
Michael Vaughn, University of Wisconsin
Andrea C. Arpaci-Dusseau, University of Wisconsin
Remzi H. Arpaci-Dusseau, University of Wisconsin
Cells: A Virtual Mobile Smartphone ArchitectureJeremy Andrus, Columbia University; et al.
Christoffer Dall, Columbia University
Alexander Van't Hof, Columbia University
Oren Laadan, Columbia University
Jason Nieh, Columbia University
2009FAWN: A Fast Array of Wimpy NodesDavid G. Andersen, Carnegie Mellon University; et al.
Jason Franklin, Carnegie Mellon University
Michael Kaminsky, Intel Research
Amar Phanishayee, Carnegie Mellon University
Lawrence Tan, Carnegie Mellon University
Vijay Vasudevan, Carnegie Mellon University
seL4: Formal Verification of an OS KernelGerwin Klein, NICTA; et al.
Kevin Elphinstone, NICTA
Gernot Heiser, NICTA
June Andronick, NICTA
David Cock, NICTA
Philip Derrin, NICTA
Dhammika Elkaduwe, NICTA
Kai Engelhardt, NICTA
Rafal Kolanski, NICTA
Michael Norrish, NICTA
Thomas Sewell, NICTA
Harvey Tuch, NICTA
Simon Winwood, NICTA
RouteBricks: Exploiting Parallelism to Scale Software RoutersMihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al.
Norbert Egi, Lancaster University
Katerina Argyraki, École Polytechnique Fédérale de Lausanne
Byung-Gon Chun, Intel Research
Kevin Fall, Intel Research
Gianluca Iannaccone, Intel Research
Allan Knies, Intel Research
Maziar Manesh, Intel Research
Sylvia Ratnasamy, Intel Research
2007Zyzzyva: speculative byzantine fault toleranceRamakrishna Kotla, University of Texas at Austin; et al.
Lorenzo Alvisi, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Allen Clement, University of Texas at Austin
Edmund Wong, University of Texas at Austin
Sinfonia: a new paradigm for building scalable distributed systemsMarcos K. Aguilera, Hewlett-Packard Labs; et al.
Arif Merchant, Hewlett-Packard Labs
Mehul Shah, Hewlett-Packard Labs
Alistair Veitch, Hewlett-Packard Labs
Christos Karamanolis, VMware
Secure Web Applications via Automatic PartitioningStephen Chong, Cornell University; et al.
Jed Liu, Cornell University
Andrew C. Myers, Cornell University
Xin Qi, Cornell University
K. Vikram, Cornell University
Lantian Zheng, Cornell University
Xin Zheng, Cornell University
2005Rx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, University of Illinois at Urbana-Champaign; et al.
Joseph Tucek, University of Illinois at Urbana-Champaign
Jagadeesan Sundaresan, University of Illinois at Urbana-Champaign
Yuanyuan Zhou, University of Illinois at Urbana-Champaign
2003Backtracking intrusionsSamuel T. King & Peter M. Chen, University of Michigan
Preserving peer replicas by rate-limited sampled votingPetros Maniatis, Stanford University; et al.
David S. H. Rosenthal, Stanford University
Mema Roussopoulos, Stanford University
Mary Baker, Stanford University
TJ Giuli, Stanford University
Yanto Muliadi, Stanford University
Improving the Reliability of Commodity Operating SystemsMichael M. Swift, University of Washington; et al.
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington
2001BASE: using abstraction to improve fault toleranceRodrigo Rodrigues, Massachusetts Institute of Technology; et al.
Miguel Castro, Microsoft Research
Barbara Liskov, Massachusetts Institute of Technology
Untrusted hosts and confidentiality: secure program partitioningSteve Zdancewic, Cornell University; et al.
Lantian Zheng, Cornell University
Nathaniel Nystrom, Cornell University
Andrew C. Myers, Cornell University
1999Cellular Disco: resource management using virtual clusters on shared-memory multiprocessorsKinshuk Govil, Stanford University; et al.
Dan Teodosiu, Hewlett-Packard Labs
Yongqiang Huang, Stanford University
Mendel Rosenblum, Stanford University
Soft timers: efficient microsecond software timer support for network processingMohit Aron & Peter Druschel, Rice University
The Click modular routerRobert Morris, Massachusetts Institute of Technology; et al.
Eddie Kohler, Massachusetts Institute of Technology
John Jannotti, Massachusetts Institute of Technology
M. Frans Kaashoek, Massachusetts Institute of Technology
Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail serv...Yasushi Saito, University of Washington; et al.
Brian N. Bershad, University of Washington
Henry M. Levy, University of Washington
1997Continuous profiling: where have all the cycles gone?Jennifer M. Anderson, Digital Equipment Corporation; et al.
Lance M. Berc, Digital Equipment Corporation
Jeffrey Dean, Digital Equipment Corporation
Sanjay Ghemawat, Digital Equipment Corporation
Monika R. Henzinger, Digital Equipment Corporation
Shun-Tak A. Leung, Digital Equipment Corporation
Richard L. Sites, Digital Equipment Corporation
Mark T. Vandevoorde, Digital Equipment Corporation
Carl A. Waldspurger, Digital Equipment Corporation
William E. Weihl, Digital Equipment Corporation
Disco: running commodity operating systems on scalable multiprocessorsEdouard Bugnion, Stanford University; et al.
Scott Devine, Stanford University
Mendel Rosenblum, Stanford University
Eraser: a dynamic data race detector for multithreaded programsStefan Savage, University of Washington; et al.
Michael Burrows, Digital Equipment Corporation
Greg Nelson, Digital Equipment Corporation
Patrick Sobalvarro, Digital Equipment Corporation
Thomas Anderson, University of California Berkeley
STOC (Theory)
2011Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphsPaul Christiano, Massachusetts Institute of Technology; et al.
Jonathan A. Kelner, Massachusetts Institute of Technology
Aleksander Madry, Massachusetts Institute of Technology
Daniel A. Spielman, Yale University
Shang-Hua Teng, University of Southern California
Subexponential lower bounds for randomized pivoting rules for the simplex algorithmOliver Friedmann, University of Munich; et al.
Thomas Dueholm Hansen, Aarhus University
Uri Zwick, Tel-Aviv University
2010An improved LP-based approximation for steiner treeJaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al.
Fabrizio Grandoni, University of Tor Vergata
Thomas Rothvoß, École Polytechnique Fédérale de Lausanne
Laura Sanità, École Polytechnique Fédérale de Lausanne
QIP = PSPACERahul Jain, National University of Singapore; et al.
Zhengfeng Ji, Perimeter Institute for Theoretical Physics
Sarvagya Upadhyay, University of Waterloo
John Watrous, University of Waterloo
2009A constructive proof of the Lovász local lemmaRobin A. Moser, ETH Zurich
Public-Key Cryptosystems from the Worst-Case Shortest Vector ProblemChris Peikert, SRI International
2008Optimal algorithms and inapproximability results for every CSP?Prasad Raghavendra, University of Washington
Optimal hierarchical decompositions for congestion minimization in networksHarald Räcke, University of Warwick
2007Faster integer multiplicationMartin Fürer, Pennsylvania State University
Towards 3-query locally decodable codes of subexponential lengthSergey Yekhanin, Massachusetts Institute of Technology
2006The PCP theorem by gap amplificationIrit Dinur, Hebrew University
2005Undirected ST-connectivity in log-spaceOmer Reingold, Weizmann Institute of Science
2004Multi-linear formulas for permanent and determinant are of super-polynomial sizeRan Raz, Weizmann Institute of Science
Expander flows, geometric embeddings and graph partitioningSanjeev Arora, Princeton University; et al.
Satish Rao, University of California Berkeley
Umesh Vazirani, University of California Berkeley
2003Derandomizing polynomial identity tests means proving circuit lower boundsValentine Kabanets & Russell Impagliazzo, University of California San Diego
New lattice-based cryptographic constructionsOded Regev, Tel-Aviv University
UIST (User Interface)
2011SideBySide: Ad-hoc Multi-user Interaction with Handheld ProjectorsKarl D.D. Willis, Carnegie Mellon University; et al.
Ivan Poupyrev, Disney Research
Scott E. Hudson, Carnegie Mellon University
Moshe Mahler, Disney Research
2010VizWiz: nearly real-time answers to visual questionsJeffrey P. Bigham, University of Rochester; et al.
Chandrika Jayant, University of Washington
Hanjie Ji, University of Rochester
Greg Little, Massachusetts Institute of Technology
Andrew Miller, University of Central Florida
Robert C. Miller, Massachusetts Institute of Technology
Robin Miller, University of Rochester
Aubrey Tatarowicz, Massachusetts Institute of Technology
Brandyn White, University of Maryland
Samual White, University of Rochester
Tom Yeh, University of Maryland
2009Mouse 2.0: Multi-touch meets the MouseNicolas Villar, Microsoft Research; et al.
Shahram Izadi, Microsoft Research
Dan Rosenfeld, Microsoft
Hrvoje Benko, Microsoft Research
John Helmes, Microsoft Research
Jonathan Westhues, Microsoft Research
Steve Hodges, Microsoft Research
Eyal Ofek, Microsoft
Alex Butler, Microsoft Research
Xiang Cao, Microsoft Research
Billy Chen, Microsoft
2008Bringing Physics to the SurfaceAndrew D. Wilson, Microsoft Research; et al.
Shahram Izadi, Microsoft Research
Otmar Hilliges, Microsoft Research
Armando Garcia-Mendoza, Microsoft Research
David Kirk, Microsoft Research
2007ThinSight: Versatile Multi-touch Sensing for Thin Form-factor DisplaysSteve Hodges, Microsoft Research; et al.
Shahram Izadi, Microsoft Research
Alex Butler, Microsoft Research
Alban Rrustemi, Microsoft Research
Bill Buxton, Microsoft Research
2006Reflective Physical Prototyping through Integrated Design, Test, and AnalysisBjörn Hartmann, Stanford University; et al.
Scott Klemmer, Stanford University
Michael Bernstein, Stanford University
Leith Abdulla, Stanford University
Brandon Burr, Stanford University
Avi Robinson-Mosher, Stanford University
Jennifer Gee, Stanford University
2005Automation and Customization of Rendered Web PagesMichael Bolin, Massachusetts Institute of Technology; et al.
Matthew Webber, Massachusetts Institute of Technology
Philip Rha, Massachusetts Institute of Technology
Tom Wilson, Massachusetts Institute of Technology
Robert C. Miller, Massachusetts Institute of Technology
2004Multi-Finger Gestural Interaction with 3D Volumetric DisplaysTovi Grossman, University of Toronto; et al.
Daniel Wigdor, University of Toronto
Ravin Balakrishnan, University of Toronto
CrossY: A Crossing-Based Drawing ApplicationGeorg Apitz & François Guimbretière, University of Maryland
2003Perceptually-Supported Image Editing of Text and GraphicsEric Saund, Palo Alto Research Center; et al.
David Fleet, Palo Alto Research Center
Daniel Larner, Palo Alto Research Center
James Mahoney, Palo Alto Research Center
2002Clothing ManipulationTakeo Igarashi, University of Tokyo
John F. Hughes, Brown University
2001Phidgets: Easy Development of Physical Interfaces through Physical WidgetsSaul Greenberg & Chester Fitchett, University of Calgary
2000Sensing Techniques for Mobile InteractionKen Hinckley, Microsoft Research; et al.
Jeff Pierce, Microsoft Research
Mike Sinclair, Microsoft Research
Eric Horvitz, Microsoft Research
1996Indigo: A Local Propagation Algorithm for Inequality ConstraintsAlan Borning, University of Washington; et al.
Richard Anderson, University of Washington
Bjorn Freeman-Benson, Object Technology International
VLDB (Databases)
2011RemusDB: Transparent High-Availability for Database SystemsUmar Farooq Minhas, University of Waterloo; et al.
Shriram Rajagopalan, University of British Columbia
Brendan Cully, University of British Columbia
Ashraf Aboulnaga, University of Waterloo
Ken Salem, University of Waterloo
Andrew Warfield, University of British Columbia
2010Towards Certain Fixes with Editing Rules and Master DataShuai Ma, University of Edinburgh; et al.
Wenfei Fan, University of Edinburgh
Jianzhong Li, Harbin Institute of Technology
Wenyuan Yu, University of Edinburgh
Nan Tang, University of Edinburgh
2009A Unified Approach to Ranking in Probabilistic DatabasesJian Li, University of Maryland; et al.
Barna Saha, University of Maryland
Amol Deshpande, University of Maryland
2008Finding Frequent Items in Data StreamsGraham Cormode & Marios Hadjieleftheriou, AT&T Laboratories
Constrained Physical Design TuningNicolas Bruno & Surajit Chaudhuri, Microsoft Research
2007Scalable Semantic Web Data Management Using Vertical PartitioningDaniel J. Abadi, Massachusetts Institute of Technology; et al.
Adam Marcus, Massachusetts Institute of Technology
Samuel R. Madden, Massachusetts Institute of Technology
Kate Hollenbach, Massachusetts Institute of Technology
2006Trustworthy Keyword Search for Regulatory-Compliant Records RetentionSoumyadeb Mitra, University of Illinois at Urbana-Champaign; et al.
Windsor W. Hsu, University of Illinois at Urbana-Champaign
Marianne Winslett, University of Illinois at Urbana-Champaign
2005Cache-conscious Frequent Pattern Mining on a Modern ProcessorAmol Ghoting, Ohio State University; et al.
Gregory Buehrer, Ohio State University
Srinivasan Parthasarathy, Ohio State University
Daehyun Kim, Intel
Anthony D. Nguyen, Intel
Yen-Kuang Chen, Intel
Pradeep Dubey, Intel
2004Model-Driven Data Acquisition in Sensor NetworksAmol Deshpande, University of California Berkeley; et al.
Carlos Guestrin, Intel Research
Samuel R. Madden, Massachusetts Institute of Technology
Joseph M. Hellerstein, University of California Berkeley
Wei Hong, Intel Research
2001Weaving Relations for Cache PerformanceAnastassia Ailamaki, Carnegie Mellon University; et al.
David J. DeWitt, University of Wisconsin
Mark D. Hill, University of Wisconsin
Marios Skounakis, University of Wisconsin
1997Integrating Reliable Memory in DatabasesWee Teck Ng & Peter M. Chen, University of Michigan
WWW (World Wide Web)
2011Towards a theory model for product searchBeibei Li, New York University; et al.
Anindya Ghose, New York University
Panagiotis G. Ipeirotis, New York University
2010Factorizing personalized Markov chains for next-basket recommendationSteffen Rendle, Osaka University; et al.
Christoph Freudenthaler, University of Hildesheim
Lars Schmidt-Thieme, University of Hildesheim
2009Hybrid keyword search auctionsAshish Goel, Stanford University
Kamesh Munagala, Duke University
2008IRLbot: Scaling to 6 billion pages and beyondHsin-Tsang Lee, Texas A&M University; et al.
Derek Leonard, Texas A&M University
Xiaoming Wang, Texas A&M University
Dmitri Loguinov, Texas A&M University
2007Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganograph...Lars Backstrom, Cornell University; et al.
Cynthia Dwork, Microsoft Research
Jon Kleinberg, Cornell University
2006Random Sampling from a Search Engine's IndexZiv Bar-Yossef & Maxim Gurevich, Technion
2005Three-level caching for efficient query processing in large Web search enginesXiaohui Long & Torsten Suel, Polytechnic University
2004Automatic detection of fragments in dynamically generated web pagesLakshmish Ramaswamy, Georgia Institute of Technology; et al.
Arun Iyengar, IBM Research
Ling Liu, Georgia Institute of Technology
Fred Douglis, IBM Research
2003Scaling personalized web searchGlen Jeh & Jennifer Widom, Stanford University
SemTag and seeker: bootstrapping the semantic web via automated semantic annotationStephen Dill, IBM Research; et al.
Nadav Eiron, IBM Research
David Gibson, IBM Research
Daniel Gruhl, IBM Research
R. Guha, IBM Research
Anant Jhingran, IBM Research
Tapas Kanungo, IBM Research
Sridhar Rajagopalan, IBM Research
Andrew Tomkins, IBM Research
John A. Tomlin, IBM Research
Jason Y. Zien, IBM Research
2002Abstracting application-level web securityDavid Scott & Richard Sharp, University of Cambridge
2001Engineering Server Driven Consistency for Large Scale Dynamic Web ServicesJian Yin, University of Texas at Austin; et al.
Lorenzo Alvisi, University of Texas at Austin
Mike Dahlin, University of Texas at Austin
Arun Iyengar, IBM Research
2000Graph Structure in the WebAndrei Broder, AltaVista; et al.
Ravi Kumar, IBM Research
Farzin Maghoul, AltaVista
Prabhakar Raghavan, IBM Research
Sridhar Rajagopalan, IBM Research
Raymie Stata, Compaq Systems Research Center
Andrew Tomkins, IBM Research
Janet Wiener, Compaq Systems Research Center
1999Focused Crawling: A New Approach to Topic-Specific Web Resource DiscoverySoumen Chakrabarti, Indian Institute of Technology; et al.
Martin van den Berg, FX Palo Alto Lab
Byron Dom, IBM Research
1998The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/videoKevin C. Almeroth, University of California Santa Barbara
Mostafa H. Ammar, Georgia Institute of Technology

This data was entered by hand (obtained by contacting past conference organizers, retrieving cached conference websites, and searching Resumes) so please email me if you notice any errors or omissions: bestpapers-AT-jeffhuang.com. I tried to collect best paper awards from the top-tier conferences in each area, but some conferences do not have such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award" and "outstanding paper award" were also collected but "best student paper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL, PLDI) were not collected.


Institutions with Best Papers
Carnegie Mellon University19.8
Microsoft Research19.0
University of Washington17.3
Stanford University17.1
Massachusetts Institute of Technology13.3
Cornell University9.9
University of California Berkeley9.9
University of Toronto9.4
University of Illinois at Urbana-Champaign8.3
IBM Research7.9
University of British Columbia7.8
University of Texas at Austin7.4
University of Oxford6.2
Georgia Institute of Technology5.8
Weizmann Institute of Science4.5
Yahoo! Research4.4
McGill University4.4
University of Maryland4.3
AT&T Laboratories4.1
University of California Irvine4.0
Google3.4
Brown University3.3
Technion3.1
University of Massachusetts Amherst3.1
Columbia University3.1
University of Michigan3.0
University of Alberta3.0
University of California San Diego3.0
École Polytechnique Fédérale de Lausanne2.8
ETH Zurich2.6
Max Planck Institut2.6
Princeton University2.5
Rice University2.5
University of Wisconsin2.4
University of Nottingham2.4
Duke University2.3
Bell Labs2.3
Hewlett-Packard Labs2.2
Université Paris-Sud2.1
Saarland University2.1
National University of Singapore2.0
University of Cambridge2.0
Universidade Técnica de Lisboa2.0
Tel-Aviv University2.0
Indiana University at Bloomington2.0
DePaul University2.0
NASA Ames Research Center2.0
NEC Labs America2.0

Credit is given in decreasing author order as customary in many fields. First authors are given 1 point, second authors are given 0.5 points, third authors are given 0.33 points, etc. These points are then divided by the sum of points for that paper, i.e. normalizing it. This ranking may be inaccurate or incomplete, may not reflect the current state of best paper awards, and is not an official list. If you are not satisfied with the ranking listed here, please disregard it.


Back to Jeff Huang's Homepage


Page last updated: 2011-12-23