2015 |
From Non-Negative to General Operator Cost Partitioning |
Florian Pommerening, University of Basel; et al. |
2014 |
Recovering from Selection Bias in Causal and Statistical Inference |
Elias Bareinboim, University of California Los Angeles; et al. |
2013 |
HC-Search: Learning Heuristics and Cost Functions for Structured Prediction |
Janardhan Rao Doppa, Oregon State University; et al. |
SMILe: Shuffled Multiple-Instance Learning |
Gary Doran & Soumya Ray, Case Western Reserve University |
2012 |
Learning SVM Classifiers with Indefinite Kernels |
Suicheng Gu & Yuhong Guo, Temple University |
Document Summarization Based on Data Reconstruction |
Zhanying He, Zhejiang University; et al. |
2011 |
Dynamic Resource Allocation in Conservation Planning |
Daniel Golovin, California Institute of Technology; et al. |
Complexity of and Algorithms for Borda Manipulation |
Jessica Davies, University of Toronto; et al. |
2010 |
How Incomplete Is Your Semantic Web Reasoner? Systematic Analysis of the Completeness of Query Ans... |
Giorgos Stoilos, Oxford University; et al. |
A Novel Transition Based Encoding Scheme for Planning as Satisfiability |
Ruoyun Huang, Washington University in St. Louis; et al. |
2008 |
How Good is Almost Perfect? |
Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg |
Optimal False-Name-Proof Voting Rules with Costly Voting |
Liad Wagman & Vincent Conitzer, Duke University |
2007 |
PLOW: A Collaborative Task Learning Agent |
James Allen, Institute for Human and Machine Cognition; et al. |
Thresholded Rewards: Acting Optimally in Timed, Zero-Sum Games |
Colin McMillen & Manuela Veloso, Carnegie Mellon University |
2006 |
Model Counting: A New Strategy for Obtaining Good Bounds |
Carla P. Gomes, Cornell University; et al. |
Towards an Axiom System for Default Logic |
Gerhard Lakemeyer, RWTH Aachen University Hector J. Levesque, University of Toronto |
2005 |
The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic Selection |
Vincent A. Cicirello, Drexel University Stephen F. Smith, Carnegie Mellon University |
2004 |
Learning and Inferring Transportation Routines |
Lin Liao, University of Washington; et al. |
2002 |
On Computing All Abductive Explanations |
Thomas Eiter, Technische Universität Wien Kazuhisa Makino, Osaka University |
2000 |
The Game of Hex: An Automatic Theorem-Proving Approach to Game Programming |
Vadim V. Anshelevich, Vanshel Consulting |
1999 |
PROVERB: The Probabilistic Cruciverbalist |
Greg A. Keim, Duke University; et al. |
1998 |
Learning Evaluation Functions for Global Optimization and Boolean Satisfiability |
Justin A. Boyan & Andrew W. Moore, Carnegie Mellon University |
Acceleration Methods for Numeric CSPs |
Yahia Lebbah & Olivier Lhomme, Ecole des Mines de Nantes |
The Interactive Museum Tour-Guide Robot |
Wolfram Burgard, University of Bonn; et al. |
1997 |
Statistical Parsing with a Context-Free Grammar and Word Statistics |
Eugene Charniak, Brown University |
A Practical Algorithm for Finding Optimal Triangulations |
Krill Shoikhet & Dan Geiger, Technion |
Fast Context Switching in Real-Time Propositional Reasoning |
P. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center |
Building Concept Representations from Reusable Components |
Peter Clark, Boeing Bruce Porter, University of Texas at Austin |
1996 |
Verification of Knowledge Bases Based on Containment Checking |
Alon Y. Levy, AT&T Laboratories Marie-Christine Rousset, Université Paris-Sud |
A Novel Application of Theory Refinement to Student Modeling |
Paul T. Baffes, SciComp Raymond J. Mooney, University of Texas at Austin |
Pushing the Envelope: Planning, Propositional Logic, and Stochastic Search |
Henry Kautz & Bart Selman, AT&T Laboratories |
2015 |
What Makes Interruptions Disruptive?: A Process-Model Account of the Effects of the Problem State ... |
Jelmer P. Borst, University of Groningen; et al. |
VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keybo... |
Keith Vertanen, Montana Tech; et al. |
Sharing is Caring: Assistive Technology Designs on Thingiverse |
Erin Buehler, University of Maryland Baltimore County; et al. |
Tiree Energy Pulse: Exploring Renewable Energy Forecasts on the Edge of the Grid |
Will Simm, Lancaster University; et al. |
Unequal Representation and Gender Stereotypes in Image Search Results for Occupations |
Matthew Kay, University of Washington; et al. |
Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure |
Pamela Wisniewski, Pennsylvania State University; et al. |
Affordance++: Allowing Objects to Communicate Dynamic Use |
Pedro Lopes, Hasso Plattner Institute; et al. |
Designing Political Deliberation Environments to Support Interactions in the Public Sphere |
Bryan Semaan, Syracuse University; et al. |
ColourID: Improving Colour Identification for People with Impaired Colour Vision |
David R. Flatla, University of Dundee; et al. |
Fluid Grouping: Quantifying Group Engagement around Interactive Tabletop Exhibits in the Wild |
Florian Block, Harvard University; et al. |
Sangeet Swara: A Community-Moderated Voice Forum in Rural India |
Aditya Vashistha, University of Washington; et al. |
Acoustruments: Passive, Acoustically-Driven, Interactive Controls for Handheld Devices |
Gierad Laput, Carnegie Mellon University; et al. |
iSkin: Flexible, Stretchable and Visually Customizable On-Body Touch Sensors for Mobile Computing |
Martin Weigel, Max Planck Institut; et al. |
Patina Engraver: Visualizing Activity Logs as Patina in Fashionable Trackers |
Moon-Hwan Lee, KAIST; et al. |
BaseLase: An Interactive Focus+Context Laser Floor |
Jörg Müller, Aarhus University; et al. |
The Social Impact of a Robot Co-Worker in Industrial Settings |
Allison Sauppé & Bilge Mutlu, University of Wisconsin |
"I always assumed that I wasn't really that close to [her]": Reasoning about Invisible Algorithms ... |
Motahhare Eslami, University of Illinois at Urbana-Champaign; et al. |
Understanding and Supporting Fathers and Fatherhood on Social Media Sites |
Tawfiq Ammari & Sarita Schoenebeck, University of Michigan |
Lightweight Relief Shearing for Enhanced Terrain Perception on Interactive Maps |
Wesley Willett, INRIA; et al. |
From User-Centered to Adoption-Centered Design: A Case Study of an HCI Research Innovation Becomin... |
Parmit K. Chilana, University of Waterloo; et al. |
2014 |
Growing Closer on Facebook: Changes in Tie Strength Through Social Network Site Use |
Moira Burke, Facebook Robert Kraut, Carnegie Mellon University |
Duet: Exploring Joint Interactions on a Smart Phone and a Smart Watch |
Xiang Anthony Chen, Carnegie Mellon University; et al. |
RetroDepth: 3D Silhouette Sensing for High-Precision Input On and Above Physical Surfaces |
David Kim, Microsoft Research; et al. |
Estimating the Social Costs of Friendsourcing |
Jeffrey Rzeszotarski & Meredith Morris, Microsoft Research |
Human Values in Curating a Human Rights Media Archive |
Abigail Durrant, Newcastle University; et al. |
Emerging Sites of HCI Innovation: Hackerspaces, Hardware Startups & Incubators |
Silvia Lindtner, University of California Irvine; et al. |
Effects of Display Size and Navigation Type on a Classification Task |
Can Liu, Université Paris-Sud; et al. |
Towards Accurate and Practical Predictive Models of Active-Vision-Based Visual Search |
David Kieras, University of Michigan Anthony Hornof, University of Oregon |
Real-time Feedback for Improving Medication Taking |
Matthew Lee, Philips Research Anind Dey, Carnegie Mellon University |
Making Sustainability Sustainable: Challenges in the Design of Eco-Interaction Technologies |
Rayoung Yang, University of Michigan; et al. |
Consumed Endurance: A Metric to Quantify Arm Fatigue of Mid-Air Interactions |
Anders Markussen, University of Copenhagen; et al. |
Type-Hover-Swipe in 96 Bytes: A Motion Sensing Mechanical Keyboard |
Stuart A Taylor, Microsoft Research; et al. |
Structured Labeling for Facilitating Concept Evolution in Machine Learning |
Todd Kulesza, Oregon State University; et al. |
MixFab: a Mixed-Reality Environment for Personal Fabrication |
Christian Weichel, Lancaster University; et al. |
Designing for Slowness, Anticipation and Re-visitation: A Long Term Field Study of the Photobox |
William Odom, Carnegie Mellon University; et al. |
"Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug War |
Munmun De Choudhury, Microsoft Research; et al. |
Understanding Multitasking Through Parallelized Strategy Exploration and Individualized Cognitive ... |
Yunfeng Zhang & Anthony Hornof, University of Oregon |
2013 |
Labor Dynamics in a Mobile Micro-Task Market |
Mohamed Musthag & Deepak Ganesan, University of Massachusetts Amherst |
What is "Critical" About Critical Design? |
Jeffrey Bardzell & Shaowen Bardzell, Indiana University at Bloomington |
SPRWeb: Preserving Subjective Responses to Website Colour Schemes through Automatic Recolouring |
David R. Flatla, University of Saskatchewan; et al. |
LaserOrigami: Laser-Cutting 3D Objects |
Stefanie Mueller, Hasso Plattner Institute; et al. |
Mind the Theoretical Gap: Interpreting, Using, and Developing Behavioral Theory in HCI Research |
Eric B. Hekler, Arizona State University; et al. |
Screenfinity: Extending the Perception Area of Content on Very Large Public Displays |
Constantin Schmidt, Technische Universität Berlin; et al. |
Reasons to Question Seven Segment Displays |
Harold Thimbleby, Swansea University |
Improving Navigation-Based File Retrieval |
Stephen Fitchett, University of Canterbury; et al. |
The Dubuque Electricity Portal: Evaluation of a City-Scale Residential Electricity Consumption Fee... |
Tom Erickson, IBM Research; et al. |
At Home with Agents: Exploring Attitudes Towards Future Smart Energy Infrastructures |
Tom Rodden, University of Nottingham; et al. |
Job Opportunities through Entertainment: Virally Spread Speech-Based Services for Low-Literate Users |
Agha Ali Raza, Carnegie Mellon University; et al. |
IllumiRoom: Peripheral Projected Illusions for Interactive Experiences |
Brett Jones, University of Illinois at Urbana-Champaign; et al. |
The Efficacy of Human Post-Editing for Language Translation |
Spence Green, Stanford University; et al. |
Analyzing User-Generated YouTube Videos to Understand Touchscreen Use by People with Motor Impairm... |
Lisa Anthony, University of Maryland Baltimore County; et al. |
Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical Turk |
Lilly Irani, University of California Irvine M. Six Silberman, Bureau of Economic Interpretation |
Webzeitgeist: Design Mining the Web |
Ranjitha Kumar, Stanford University; et al. |
Weighted Graph Comparison Techniques for Brain Connectivity Analysis |
Basak Alper, University of California Santa Barbara; et al. |
The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Arc... |
Xuan Zhao, Cornell University; et al. |
2012 |
Uncomfortable Interactions |
Steve Benford, University of Nottingham; et al. |
ClayVision: The (Elastic) Image of the City |
Yuichiro Takeuchi, Sony Computer Science Laboratories Ken Perlin, New York University |
Revisiting the Jacquard Loom: Threads of History and Current Patterns in HCI |
Ylva Fernaeus, KTH Royal Institute of Technology; et al. |
Personas and Decision Making in the Design Process: An Ethnographic Case Study |
Erin Friess, University of North Texas |
Detecting Error-Related Negativity for Interaction Design |
Chi Vi & Sriram Subramanian, University of Bristol |
Observational and Experimental Investigation of Typing Behaviour using Virtual Keyboards for Mobil... |
Niels Henze, University of Oldenburg; et al. |
Looking Glass: A Field Study on Noticing Interactivity of Shop Windows |
Jörg Müller, Technische Universität Berlin; et al. |
Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday Objects |
Munehiko Sato, Disney Research; et al. |
Affordances in HCI: Toward a Mediated Action Perspective |
Victor Kaptelinin, University of Bergen Bonnie Nardi, University of California Irvine |
Using Rhythmic Patterns as an Input Method |
Emilien Ghomi, Université Paris-Sud; et al. |
The Normal Natural Troubles of Driving with GPS |
Barry Brown, Stockholm University Eric Laurier, University of Edinburgh |
Communitysourcing: Engaging Local Crowds to Perform Expert Work Via Physical Kiosks |
Kurtis Heimerl, University of California Berkeley; et al. |
Improving Command Selection with CommandMaps |
Joey Scarr, University of Canterbury; et al. |
Empathy, Participatory Design and People with Dementia |
Stephen Lindsay, Newcastle University; et al. |
2011 |
Usable Gestures for Blind People: Understanding Preference and Performance |
Shaun K. Kane, University of Washington; et al. |
Effects of Community Size and Contact Rate in Synchronous Social Q&A |
Ryen W. White, Microsoft Research; et al. |
Teenagers and Their Virtual Possessions: Design Opportunities and Issues |
William Odom, Carnegie Mellon University; et al. |
Enhancing Physicality in Touch Interaction with Programmable Friction |
Vincent Levesque, University of British Columbia; et al. |
Mid-air Pan-and-Zoom on Wall-sized Displays |
Mathieu Nancel, Université Paris-Sud; et al. |
Bricolage: Example-Based Retargeting for Web Design |
Ranjitha Kumar, Stanford University; et al. |
Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual E... |
Thomas Erickson, IBM Research; et al. |
In the Shadow of Misperception: Assistive Technology Use and Social Interactions |
Kristen Shinohara & Jacob Wobbrock, University of Washington |
Why is My Internet Slow?: Making Network Speeds Visible |
Marshini Chetty, Georgia Institute of Technology; et al. |
Ease of Juggling: Studying the Effects of Manual Multitasking |
Antti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University |
Automics: souvenir generating photoware for theme parks |
Abigail Durrant, University of Nottingham; et al. |
Your Noise is My Command: Sensing Gestures Using the Body as an Antenna |
Gabe Cohn, University of Washington; et al. |
Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Wor... |
Koji Yatani, University of Toronto; et al. |
2010 |
Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber Bundles |
Patrick Baudisch, Hasso Plattner Institute; et al. |
Mapping the Landscape of Sustainable HCI |
Carl DiSalvo, Georgia Institute of Technology; et al. |
Occlusion-Aware Interfaces |
Daniel Vogel & Ravin Balakrishnan, University of Toronto |
Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural India |
Neil Patel, Stanford University; et al. |
How does search behavior change as search becomes more difficult? |
Anne Aula, Google; et al. |
The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Co... |
Brent Hecht & Darren Gergle, Northwestern University |
Skinput: Appropriating the Body as an Input Surface |
Chris Harrison, Carnegie Mellon University; et al. |
Mobile-izing Health Workers in Rural India |
Divya Ramachandran, University of California Berkeley; et al. |
The Design of Eco-Feedback Technology |
Jon Froehlich, University of Washington; et al. |
Feminist HCI: Taking Stock and Outlining an Agenda for Design |
Shaowen Bardzell, Indiana University at Bloomington |
Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface Structure |
Morgan Dixon & James Fogarty, University of Washington |
Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of Charts |
Scott Bateman, University of Saskatchewan; et al. |
2009 |
From Interaction to Trajectories: Designing Coherent Journeys Through User Experiences |
Steve Benford, University of Nottingham; et al. |
Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Ser... |
Jeffrey Heer, Stanford University; et al. |
Predicting Tie Strength With Social Media |
Eric Gilbert & Karrie Karahalios, University of Illinois at Urbana-Champaign |
Musink: Composing Music through Augmented Drawing |
Theophanis Tsandilas, Université Paris-Sud; et al. |
Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector Exhibits |
Scott S. Snibbe, Sona Research Hayes S. Raffle, Massachusetts Institute of Technology |
Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection Performance |
Leah Findlater, University of British Columbia; et al. |
Undo and Erase Events as Indicators of Usability Problems |
David Akers, Stanford University; et al. |
2008 |
In-Car GPS Navigation: Engagement with and Disengagement from the Environment |
Gilly Leshed, Cornell University; et al. |
Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Inte... |
Krzysztof Z. Gajos, University of Washington; et al. |
Large Scale Analysis of Web Revisitation Patterns |
Eytan Adar, University of Washington; et al. |
Designs on Dignity: Perceptions of Technology Among the Homeless |
Christopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology |
The Network in the Garden: An Empirical Analysis of Social Media in Rural Life |
Eric Gilbert, University of Illinois at Urbana-Champaign; et al. |
Multimodal collaborative handwriting training for visually-impaired people |
Beryl Plimmer, University of Auckland; et al. |
An Error Model for Pointing Based on Fitts' Law |
Jacob Wobbrock, University of Washington; et al. |
2007 |
Multiview: improving trust in group video conferencing through spatial faithfulness |
David T. Nguyen & John Canny, University of California Berkeley |
Software or wetware?: discovering when and why people use digital prosthetic memory |
Vaiva Kalnikaité & Steve Whittaker, University of Sheffield |
Shift: a technique for operating pen-based interfaces using touch |
Daniel Vogel, University of Toronto Patrick Baudisch, Microsoft Research |
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognit... |
Björn Hartmann, Stanford University; et al. |
Sustainable interaction design: invention & disposal, renewal & reuse |
Eli Blevis, Indiana University at Bloomington |
Consuming video on Mobile devices |
Kenton O'Hara, Hewlett-Packard Labs; et al. |
2006 |
Trackball text entry for people with motor impairments |
Jacob Wobbrock & Brad Myers, Carnegie Mellon University |
Embedded phenomena: supporting science learning with classroom-sized distributed simulations |
Tom Moher, University of Illinois at Chicago |
A role for haptics in mobile interaction: initial design using a handheld tactile display prototype |
Joseph Luk, University of British Columbia; et al. |
2005 |
Making space for stories: ambiguity in the design of personal communication systems |
Paul M. Aoki, Palo Alto Research Center Allison Woodruff, Intel Research |
Examining Task Engagement in Sensor-Based Statistical Models of Human Interruptibility |
James Fogarty, Carnegie Mellon University; et al. |
Designing the spectator experience |
Stuart Reeves, University of Nottingham; et al. |
The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation area |
Tovi Grossman & Ravin Balakrishnan, University of Toronto |
2015 |
An average-case depth hierarchy theorem for Boolean circuits |
Benjamin Rossman, National Institute of Informatics; et al. |
2014 |
Path Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations a... |
Yin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology |
2013 |
Navigating Central Path with Electrical Flows: from Flows to Matchings, and Back |
Aleksander Mądry, École Polytechnique Fédérale de Lausanne |
2012 |
A multi-prover interactive proof for NEXP sound against entangled provers |
Tsuyoshi Ito, NEC Labs America Thomas Vidick, Massachusetts Institute of Technology |
A Polylogarithimic Approximation Algorithm for Edge-Disjoint Paths with Congestion 2 |
Julia Chuzhoy, Toyota Technological Institute at Chicago Shi Li, Princeton University |
2011 |
A Randomized Rounding Approach to the Traveling Salesman Problem |
Shayan Oveis Gharan, Stanford University; et al. |
A Polylogarithmic-Competitive Algorithm for the k-Server Problem |
Nikhil Bansal, IBM Research; et al. |
Approximating Graphic TSP by Matchings |
Tobia M¨o;mke & Ola Svensson, Royal Institute of Technology |
2010 |
Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke Decompositions |
Matthew Andrews, Bell Labs |
Subexponential Algorithms for Unique Games and Related Problems |
Sanjeev Arora, Princeton University; et al. |
Computational Transition at the Uniqueness Threshold |
Allan Sly, Microsoft Research |
2008 |
Two Query PCP with Sub-Constant Error |
Dana Moshkovitz & Ran Raz, Weizmann Institute of Science |
2007 |
Space-Efficient Identity Based Encryption Without Pairings |
Dan Boneh, Stanford University; et al. |
2006 |
Settling the Complexity of 2-Player Nash Equilibrium |
Xi Chen, Tsinghua University Xiaotie Deng, City University of Hong Kong |
2005 |
The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type M... |
Subhash A. Khot, Georgia Institute of Technology Nisheeth K. Vishnoi, IBM Research |
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time |
Farzad Parvaresh & Alexander Vardy, University of California San Diego |
2004 |
Cryptography in NC0 |
Benny Applebaum, Technion; et al. |
Hardness of Approximating the Shortest Vector Problem in Lattices |
Subhash Khot, Georgia Institute of Technology |
2003 |
On the Impossibility of Dimension Reduction in L1 |
Bo Brinkman & Moses Charikar, Princeton University |
2002 |
A Dichotomy Theorem for Constraints on a Three-Element Set |
Andrei A. Bulatov, University of Oxford |
Minimizing Congestion in General Networks |
Harald Räcke, Paderborn University |
Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model |
Boaz Barak, Weizmann Institute of Science |
2014 |
Selection and Presentation Practices for Code Example Summarization |
Annie Ying & Martin Robillard, McGill University |
Are Mutants a Valid Substitute for Real Faults in Software Testing? |
René Just, University of Washington; et al. |
AI: A Lightweight System for Tolerating Concurrency Bugs |
Mingxing Zhang, Tsinghua University; et al. |
Powering the Static Driver Verifier using Corral |
Akash Lal & Shaz Qadeer, Microsoft Research |
Learning Natural Coding Conventions |
Miltiadis Allamanis, University of Edinburgh; et al. |
Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case Study |
Klaus-Benedikt Schultis, Siemens Corporate Technology; et al. |
2012 |
Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software Libraries |
Bradley Cossette & Robert Walker, University of Calgary |
Scalable Test Data Generation from Multidimensional Models |
Emina Torlak, University of California Berkeley |
Assessing the Value of Branches with What-if Analysis |
Christian Bird & Thomas Zimmermann, Microsoft Research |
2011 |
Proactive Detection of Collaboration Conflicts |
Yuriy Brun, University of Washington; et al. |
How Do Fixes Become Bugs? |
Zuoning Yin, University of Illinois at Urbana-Champaign; et al. |
Proving programs robust |
Swarat Chaudhuri, Rice University; et al. |
2010 |
Creating and evolving developer documentation: understanding the decisions of open source contribu... |
Barthélémy Dagenais & Martin P. Robillard, McGill University |
Developer Fluency: Achieving True Mastery in Software Projects |
Minghui Zhou, Peking University Audris Mockus, Avaya Labs |
Staged Concurrent Program Analysis |
Nishant Sinha & Chao Wang, NEC Labs America |
2009 |
Asserting and checking determinism for multithreaded programs |
Jacob Burnim & Koushik Sen, University of California Berkeley |
Darwin: an approach for debugging evolving programs |
Dawei Qi, National University of Singapore; et al. |
Graph-based Mining of Multiple Object Usage Patterns |
Tung Thanh Nguyen, Iowa State University; et al. |
2008 |
What makes a good bug report? |
Nicolas Bettenburg, Saarland University; et al. |
Efficient online monitoring of web-service SLAs |
Franco Raimondi, University College London; et al. |
2007 |
Automatic consistency assessment for query results in dynamic environments |
Jamie Payton, University of North Carolina at Charlotte; et al. |
Globally distributed software development project performance: an empirical analysis |
Narayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University |
Mining specifications of malicious behavior |
Mihai Christodorescu, University of Wisconsin; et al. |
Object and reference immutability using Java generics |
Yoav Zibin, Massachusetts Institute of Technology; et al. |
2006 |
Controlling factors in evaluating path-sensitive error detection techniques |
Matthew B. Dwyer, University of Nebraska-Lincoln; et al. |
SYNERGY: a new algorithm for property checking |
Bhargav S. Gulavani, Indian Institute of Technology; et al. |
2005 |
Automatic Generation of Suggestions for Program Investigation |
Martin P. Robillard, McGill University |
CUTE: a concolic unit testing engine for C |
Koushik Sen, University of Illinois at Urbana-Champaign; et al. |
Context- and path-sensitive memory leak detection |
Yichen Xie & Alex Aiken, Stanford University |
2004 |
Reasoning about partial goal satisfaction for requirements and design engineering |
Emmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain |
A classification system and analysis for aspect-oriented programs |
Martin Rinard, Massachusetts Institute of Technology; et al. |
2003 |
Eliminating redundancies with a "composition with adaptation" meta-programming technique |
Stan Jarzabek, National University of Singapore Li Shubiao, Xi'an Jiaotong University |
A Family of Test Adequacy Criteria for Database-Driven Applications |
Gregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh |
Predicting problems caused by component upgrades |
Stephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology |
2002 |
Isolating Cause-Effect Chains from Computer Programs |
Andreas Zeller, Saarland University |
2015 |
Alloy*: A General-Purpose Higher-Order Relational Constraint Solver |
Aleksandar Milicevic, Massachusetts Institute of Technology; et al. |
How Much Up-Front? A Grounded theory of Agile Architecture |
Michael Waterman, Specialised Architecture Services Ltd; et al. |
Views on Internal and External Validity in Empirical Software Engineering |
Janet Siegmund, University of Passau; et al. |
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational F... |
Mathieu Lavallée & Pierre N. Robillard, Polytechnique Montréal |
When and Why Your Code Starts to Smell Bad |
Michele Tufano, College of William and Mary; et al. |
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes |
Adrian Nistor, Chapman University; et al. |
2014 |
Characterizing and Detecting Performance Bugs for Smartphone Applications |
Yepang Liu, Hong Kong University of Science and Technology; et al. |
Improving Automated Source Code Summarization via an Eye-Tracking Study of Programmers |
Paige Rodeghero, University of Notre Dame; et al. |
Understanding JavaScript Event-Based Interactions |
Saba Alimadadi, University of British Columbia; et al. |
Coverage Is Not Strongly Correlated with Test Suite Effectiveness |
Laura Inozemtseva & Reid Holmes, University of Waterloo |
Cowboys, Ankle Sprains, and Keepers of Quality: How Is Video Game Development Different from Softw... |
Emerson Murphy-Hill, North Carolina State University; et al. |
Trading Robustness for Maintainability: An Empirical Study of Evolving C# Programs |
Nélio Cacho, Federal University of Rio Grande do Norte; et al. |
Unit Test Virtualization with VMVM |
Jonathan Bell & Gail Kaiser, Columbia University |
Enhancing Symbolic Execution with Veritesting |
Thanassis Avgerinos, Carnegie Mellon University; et al. |
A Study and Toolkit for Asynchronous Programming in C# |
Semih Okur, University of Illinois at Urbana-Champaign; et al. |
2013 |
Dual Ecological Measures of Focus in Software Development |
Daryl Posnett, University of California Davis; et al. |
Data Clone Detection and Visualization in Spreadsheets |
Felienne Hermans, Delft University of Technology; et al. |
UML in Practice |
Marian Petre, Open University |
Automatic patch generation learned from human-written patches |
Dongsun Kim, Hong Kong University of Science and Technology; et al. |
Assisting Developers of Big Data Analytics Applications When Deploying on Hadoop Clouds |
Weiyi Shang, Queen's University; et al. |
Interaction-Based Test-Suite Minimization |
Dale Blue, IBM; et al. |
2012 |
Understanding Integer Overflow in C/C++ |
Will Dietz, University of Illinois at Urbana-Champaign; et al. |
Using Dynamic Analysis to Discover Polynomial and Array Invariants |
ThanhVu Nguyen, University of New Mexico; et al. |
Amplifying Tests to Validate Exception Handling Code |
Pingyu Zhang & Sebastian Elbaum, University of Nebraska-Lincoln |
Partial Models: Towards Modeling and Reasoning with Uncertainty |
Michalis Famelis, University of Toronto; et al. |
How Do Professional Developers Comprehend Software? |
Tobias Roehm, Technische Universität München; et al. |
A Tactic-Centric Approach for Automating Traceability of Quality Concerns |
Mehdi Mirakhorli, DePaul University; et al. |
Automated Detection of Client-State Manipulation Vulnerabilities |
Anders Møller & Mathias Schwarz, Aarhus University |
2011 |
Verifying Multi-threaded Software using SMT-based Context-Bounded Model Checking |
Lucas Cordeiro & Bernd Fischer, University of Southampton |
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and ... |
Narayan Ramasubbu, Singapore Management University; et al. |
Programs, tests, and oracles: the foundations of testing revisited |
Matt Staats, University of Minnesota; et al. |
On-demand Feature Recommendations Derived from Mining Public Product Descriptions |
Horatiu Dumitru, DePaul University; et al. |
Run-Time Efficient Probabilistic Model Checking |
Antonio Filieri, Politecnico di Milano; et al. |
2010 |
A Machine Learning Approach for Tracing Regulatory Codes to Product Specific Requirements |
Jane Cleland-Huang, DePaul University; et al. |
Collaborative Reliability Prediction of Service-Oriented Systems |
Zibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong |
A Cut-off Approach for Bounded Verification of Parameterized Systems |
Qiusong Yang & Mingshu Li, Chinese Academy of Sciences |
Test Generation through Programming in UDITA |
Milos Gligoric, University of Illinois at Urbana-Champaign; et al. |
A Degree-of-Knowledge Model to Capture Source Code Familiarity |
Thomas Fritz, University of British Columbia; et al. |
2009 |
How We Refactor, and How We Know It |
Emerson Murphy-Hill, Portland State University; et al. |
Effective Static Deadlock Detection |
Mayur Naik, Intel Research; et al. |
Invariant-Based Automatic Testing of AJAX User Interfaces |
Ali Mesbah & Arie van Deursen, Delft University of Technology |
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows Vista |
Christian Bird, University of California Davis; et al. |
Automatically finding patches using genetic programming |
Westley Weimer, University of Virginia; et al. |
2008 |
Precise memory leak detection for java software using container profiling |
Guoqing Xu & Atanas Rountev, Ohio State University |
Debugging reinvented: asking and answering why and why not questions about program behavior |
Andrew J. Ko & Brad A. Myers, Carnegie Mellon University |
Recommending adaptive changes for framework evolution |
Barthélémy Dagenais & Martin P. Robillard, McGill University |
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental Approach |
Joseph Ruthruff, University of Nebraska-Lincoln; et al. |
The effect of program and model structure on mc/dc test adequacy coverage |
Ajitha Rajan, University of Minnesota; et al. |
2007 |
Refactoring for Parameterizing Java Classes |
Adam Kiezun, Massachusetts Institute of Technology; et al. |
Tracking Code Clones in Evolving Software |
Ekwa Duala-Ekoko & Martin P. Robillard, McGill University |
Matching and Merging of Statecharts Specifications |
Shiva Nejati, University of Toronto; et al. |
Predicting Faults from Cached History |
Sunghun Kim, Massachusetts Institute of Technology; et al. |
2006 |
Model-Based Development of Dynamically Adaptive Software |
Ji Zhang & Betty H.C. Cheng, Michigan State University |
Who Should Fix This Bug? |
John Anvik, University of British Columbia; et al. |
2005 |
Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Pe... |
Andrew Ko, Carnegie Mellon University; et al. |
Is Mutation an Appropriate Tool for Testing Experiments? |
James Andrews, University of Western Ontario; et al. |
Using Structural Context to Recommend Source Code Examples |
Reid Holmes & Gail Murphy, University of British Columbia |
Data Structure Repair Using Goal-Directed Reasoning |
Brian Demsky & Martin Rinard, Massachusetts Institute of Technology |
2004 |
SNIAFL: Towards a Static Non-Interactive Approach to Feature Location |
Wei Zhao, Peking University; et al. |
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized Systems |
Rohit Khare & Richard N. Taylor, University of California Irvine |
An Empirical Study of Software Reuse vs. Defect-Density and Stability |
Parastoo Mohagheghi, Ericsson; et al. |
A Tool for Writing and Debugging Algebraic Specifications |
Johannes Henkel & Amer Diwan, University of Colorado |
Static Checking of Dynamically Generated Queries in Database Applications |
Carl Gould, University of California Davis; et al. |
2003 |
Precise Dynamic Slicing Algorithms |
Xiangyu Zhang, University of Arizona; et al. |
Modular Verification of Software Components in C |
Sagar Chaki, Carnegie Mellon University; et al. |
2015 |
Bayesian Active Learning for Posterior Estimation |
Kirthevasan Kandasamy, Carnegie Mellon University; et al. |
Recursive Decomposition for Nonconvex Optimization |
Abram L. Friesen & Pedro Domingos, University of Washington |
2013 |
Bayesian Optimization in High Dimensions via Random Embeddings |
Ziyu Wang, University of British Columbia; et al. |
Flexibility and Decoupling in the Simple Temporal Problem |
Michel Wilson, Delft University of Technology; et al. |
2011 |
Unweighted Coalitional Manipulation Under the Borda Rule is NP-Hard |
Nadja Betzler, Technische Universität Berlin; et al. |
Nested Rollout Policy Adaptation for Monte Carlo Tree Search |
Christopher D. Rosin, Parity Computing |
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean Spaces |
Roman Kontchakov, Birkbeck College London; et al. |
2009 |
Consequence-Driven Reasoning for Horn SHIQ Ontologies |
Yevgeny Kazakov, University of Oxford |
Learning Conditional Preference Networks with Queries |
Frederic Koriche, Université Montpellier II Bruno Zanuttini, Université de Caen Basse-Normandie |
2007 |
Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian Networks |
Maleeha Qazi, Siemens Medical Solutions; et al. |
Building Structure into Local Search for SAT |
Duc Nghia Pham, Griffith University; et al. |
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Pro... |
Luc Mercier & Pascal Van Hentenryck, Brown University |
2005 |
Learning Coordination Classifiers |
Yuhong Guo, University of Alberta; et al. |
Solving Checkers |
Jonathan Schaeffer, University of Alberta; et al. |
A Probabilistic Model of Redundancy in Information Extraction |
Doug Downey, University of Washington; et al. |
2003 |
Approximating Game-Theoretic Optimal Strategies for Full-scale Poker |
Darse Billings, University of Alberta; et al. |
Thin Junction Tree Filters for Simultaneous Localization and Mapping |
Mark A. Paskin, University of California Berkeley |
2001 |
Complexity Results for Structure-Based Causality |
Thomas Eiter & Thomas Lukasiewicz, Vienna University of Technology |
1999 |
Learning in Natural Language |
Dan Roth, University of Illinois at Urbana-Champaign |
A Distributed Case-Based Reasoning Application for Engineering Sales Support |
Ian Watson, University of Salford Dan Gardingen, Western Air |
1997 |
Object Identification in a Bayesian Context |
Timothy Huang & Stuart Russell, University of California Berkeley |
Translingual Information Retrieval: A Comparative Evaluation |
Jaime G. Carbonell, Carnegie Mellon University; et al. |
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolo... |
Fangzhen Lin, The Hongkong University of Science and Technology |
2015 |
The Power of Slightly More than One Sample in Randomized Load Balancing |
Lei Ying, Arizona State University; et al. |
2014 |
Joint Static and Dynamic Traffic Scheduling in Data Center Networks |
Zizhong Cao, Polytechnic Institute of New York University; et al. |
Performance Evaluation and Asymptotics for Content Delivery Networks |
Virag Shah & Gustavo de Veciana, University of Texas at Austin |
2013 |
On the Steady-State of Cache Networks |
Elisha J. Rosensweig, University of Massachusetts Amherst; et al. |
2012 |
Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework |
Carlee Joe-Wong, Princeton University; et al. |
2011 |
Dynamic right-sizing for power-proportional data centers |
Minghong Lin, California Institute of Technology; et al. |
2010 |
On the Feasibility and Efficacy of Protection Routing in IP Networks |
Kin-Wah Kwong, University of Pennsylvania; et al. |
2009 |
Queuing Network Models for Multi-Channel P2P Live Streaming Systems |
Di Wu, Polytechnic Institute of New York University; et al. |
2008 |
On the Feasibility of the Link Abstraction in (Rural) Mesh Networks |
Dattatraya Gokhal, Indian Navy; et al. |
Theoretical Results on Base Station Movement Problem for Sensor Networks |
Yi Shi & Y. Thomas Hou, Virginia Tech |
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless... |
Changhee Joo, Ohio State University; et al. |
2007 |
Disruption free topology reconfiguration in OSPF networks |
Pierre Francois, Université catholique de Louvain; et al. |
2006 |
Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective |
Gaurav Sharma, Purdue University; et al. |
2005 |
Perfect Simulation and Stationarity of a Class of Mobility Models |
Jean-Yves Le Boude, École Polytechnique Fédérale de Lausanne Milan Vojnović, Microsoft Research |
2004 |
Throughput-Delay Trade-Off in Wireless Networks |
Abbas El Gamal, Stanford University; et al. |
2003 |
User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks |
Sem Borst, Bell Labs |
2002 |
Priority Service and Max-Min Fairness |
Peter Marbach, University of Toronto |
2001 |
Mobility increases the capacity of ad-hoc wireless networks |
Matthias Grossglauser, AT&T Laboratories David Tse, University of California Berkeley |
2000 |
The Chaotic Nature of TCP Congestion Control |
András Veres, Ericsson Miklós Boda, Ericsson Research |
1999 |
Bandwidth Sharing: Objectives and Algorithms |
Laurent Massoulié, Microsoft Research James Robert, France Telecom |
1998 |
Effective Bandwidths in Wireless Networks with Multiuser Receivers |
David Tse, University of California Berkeley Stephen Hanly, University of Melbourne |
1996 |
An algorithm for multicast tree generation in networks with asymmetric links |
Ram Ramanathan, BBN Technologies |
2015 |
Parallel-Correctness and Transferability for Conjunctive Queries |
Tom J. Ameloot, Hasselt University; et al. |
2014 |
Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Co... |
Tom J. Ameloot, Hasselt University; et al. |
2013 |
Verification of database-driven systems via amalgamation |
Mikołaj Bojańczyk, University of Warsaw; et al. |
2012 |
Worst-case Optimal Join Algorithms |
Hung Q. Ngo, University at Buffalo; et al. |
2011 |
Data Exchange Beyond Complete Data |
Marcelo Arenas, Pontificia Universidad Católica de Chile; et al. |
2010 |
An Optimal Algorithm for the Distinct Elements Problem |
Daniel M. Kane, Harvard University; et al. |
2009 |
Size and Treewidth Bounds for Conjunctive Queries |
Georg Gottlob, University of Oxford; et al. |
2008 |
Estimating PageRank on Graph Streams |
Atish Das Sarma, Georgia Institute of Technology; et al. |
2007 |
Generalized Hypertree Decompositions: NP-Hardness and Tractable Variants |
Georg Gottlob, University of Oxford; et al. |
2006 |
Two-variable logic on data trees and XML reasoning |
Mikolaj Bojanczyk, Warsaw University; et al. |
2005 |
On the complexity of division and set joins in the relational algebra |
Dirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum |
XML data exchange: consistency and query answering |
Marcelo Arenas & Leonid Libkin, University of Toronto |
2004 |
Conditional XPath, the first order complete XPath dialect |
Maarten Marx, University of Amsterdam |
2003 |
An Information-Theoretic Approach to Normal Forms for Relational and XML Data |
Marcelo Arenas & Leonid Libkin, University of Toronto |
2002 |
Monadic Datalog and the Expressive Power of Languages for Web Information Extraction |
Georg Gottlob & Christoph Koch, Technische Universität Wien |
2001 |
Optimal aggregation algorithms for middleware |
Ronald Fagin, IBM Research; et al. |
2000 |
Auditing Boolean attributes |
Jon Kleinberg, Cornell University; et al. |
1999 |
Exact and approximate aggregation in constraint query languages |
Michael Benefikt & Leonid Libkin, Bell Labs |
1998 |
A lower bound theorem for indexing schemes and its application to multidimensional range queries |
Vasilis Samoladas & Daniel P. Miranker, University of Texas at Austin |
Expressiveness of structured document query languages based on attribute grammars |
Frank Neven & Jan Van den Bussche, Limburgs Universitair Centrum |
1997 |
On the Complexity of Database Queries |
Christos H. Papadimitriou, University of California Berkeley Mihalis Yannakakis, Bell Labs |
2015 |
Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems |
Jonathan Mace, Brown University; et al. |
Using Crash Hoare Logic for Certifying the FSCQ File System |
Haogang Chen, Massachusetts Institute of Technology; et al. |
Coz: Finding Code that Counts with Causal Profiling |
Charlie Curtsinger, Grinnell College Emery Berger, University of Massachusetts Amherst |
2013 |
Towards optimization-safe systems: analyzing the impact of undefined behavior |
Xi Wang, Massachusetts Institute of Technology; et al. |
Naiad: A Timely Dataflow System |
Derek G. Murray, Microsoft Research; et al. |
The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors |
Austin T. Clements, Massachusetts Institute of Technology; et al. |
2011 |
A File is Not a File: Understanding the I/O Behavior of Apple Desktop Applications |
Tyler Harter, University of Wisconsin; et al. |
Cells: A Virtual Mobile Smartphone Architecture |
Jeremy Andrus, Columbia University; et al. |
2009 |
FAWN: A Fast Array of Wimpy Nodes |
David G. Andersen, Carnegie Mellon University; et al. |
seL4: Formal Verification of an OS Kernel |
Gerwin Klein, NICTA; et al. |
RouteBricks: Exploiting Parallelism to Scale Software Routers |
Mihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al. |
2007 |
Zyzzyva: speculative byzantine fault tolerance |
Ramakrishna Kotla, University of Texas at Austin; et al. |
Sinfonia: a new paradigm for building scalable distributed systems |
Marcos K. Aguilera, Hewlett-Packard Labs; et al. |
Secure Web Applications via Automatic Partitioning |
Stephen Chong, Cornell University; et al. |
2005 |
Speculative Execution in a Distributed File System |
Edmund B. Nightingale, University of Michigan; et al. |
BAR Tolerance for Cooperative Services |
Amitanand S. Aiyer, University of Texas at Austin; et al. |
Rx: treating bugs as allergies - a safe method to survive software failures |
Feng Qin, University of Illinois at Urbana-Champaign; et al. |
Vigilante: End-to-End Containment of Internet Worms |
Manuel Costa, University of Cambridge; et al. |
2003 |
Backtracking intrusions |
Samuel T. King & Peter M. Chen, University of Michigan |
Preserving peer replicas by rate-limited sampled voting |
Petros Maniatis, Stanford University; et al. |
Improving the Reliability of Commodity Operating Systems |
Michael M. Swift, University of Washington; et al. |
2001 |
BASE: using abstraction to improve fault tolerance |
Rodrigo Rodrigues, Massachusetts Institute of Technology; et al. |
Untrusted hosts and confidentiality: secure program partitioning |
Steve Zdancewic, Cornell University; et al. |
1999 |
Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors |
Kinshuk Govil, Stanford University; et al. |
Soft timers: efficient microsecond software timer support for network processing |
Mohit Aron & Peter Druschel, Rice University |
The Click modular router |
Robert Morris, Massachusetts Institute of Technology; et al. |
Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail se... |
Yasushi Saito, University of Washington; et al. |
1997 |
Continuous profiling: where have all the cycles gone? |
Jennifer M. Anderson, Digital Equipment Corporation; et al. |
Disco: running commodity operating systems on scalable multiprocessors |
Edouard Bugnion, Stanford University; et al. |
Eraser: a dynamic data race detector for multithreaded programs |
Stefan Savage, University of Washington; et al. |
2015 |
Exponential Separation of Information and Communication for Boolean Functions |
Anat Ganor, Weizmann Institute of Science; et al. |
2-Server PIR with sub-polynomial communication |
Zeev Dvir & Sivakanth Gopi, Princeton University |
Lower Bounds on the Size of Semidefinite Programming Relaxations |
James R. Lee, University of Washington; et al. |
2014 |
The matching polytope has exponential extension complexity |
Thomas Rothvoß, University of Washington |
2013 |
Approximation Resistance from Pairwise Independent Subgroups |
Siu On Chan, University of California Berkeley |
Low Rank Approximation and Regression in Input Sparsity Time |
Kenneth L. Clarkson & David P. Woodruff, IBM Research |
2012 |
Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Lower Bounds |
Samuel Fiorini, Université libre de Bruxelles; et al. |
The Cell Probe Complexity of Dynamic Range Counting |
Kasper Larsen, Aarhus University |
2011 |
Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphs |
Paul Christiano, Massachusetts Institute of Technology; et al. |
Subexponential lower bounds for randomized pivoting rules for the simplex algorithm |
Oliver Friedmann, University of Munich; et al. |
2010 |
An improved LP-based approximation for steiner tree |
Jaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al. |
QIP = PSPACE |
Rahul Jain, National University of Singapore; et al. |
2009 |
A constructive proof of the Lovász local lemma |
Robin A. Moser, ETH Zurich |
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem |
Chris Peikert, SRI International |
2008 |
Optimal algorithms and inapproximability results for every CSP? |
Prasad Raghavendra, University of Washington |
Optimal hierarchical decompositions for congestion minimization in networks |
Harald Räcke, University of Warwick |
2007 |
Faster integer multiplication |
Martin Fürer, Pennsylvania State University |
Towards 3-query locally decodable codes of subexponential length |
Sergey Yekhanin, Massachusetts Institute of Technology |
2006 |
The PCP theorem by gap amplification |
Irit Dinur, Hebrew University |
2005 |
Undirected ST-connectivity in log-space |
Omer Reingold, Weizmann Institute of Science |
2004 |
Multi-linear formulas for permanent and determinant are of super-polynomial size |
Ran Raz, Weizmann Institute of Science |
Expander flows, geometric embeddings and graph partitioning |
Sanjeev Arora, Princeton University; et al. |
2003 |
Derandomizing polynomial identity tests means proving circuit lower bounds |
Valentine Kabanets & Russell Impagliazzo, University of California San Diego |
New lattice-based cryptographic constructions |
Oded Regev, Tel-Aviv University |
2015 |
Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye Movements |
Augusto Esteves, Lancaster University; et al. |
Webstrates: Shareable Dynamic Media |
Clemens Klokmose, Aarhus University; et al. |
Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electr... |
Simon Olberding, Max Planck Institut; et al. |
2014 |
Sensing Techniques for Tablet+Stylus Interaction |
Ken Hinckley, Microsoft Research; et al. |
PrintScreen: Fabricating Highly Customizable Thin-film Touch-Displays |
Simon Olberding, Max Planck Institut; et al. |
Expert Crowdsourcing with Flash Teams |
Daniela Retelny, Stanford University; et al. |
2013 |
PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing Interfaces |
Lining Yao, Massachusetts Institute of Technology; et al. |
Touch & Activate: Adding Interactivity to Existing Objects using Active Acoustic Sensing |
Makoto Ono, University of Tsukuba; et al. |
Fiberio: A Touchscreen that Senses Fingerprints |
Christian Holz & Patrick Baudisch, Hasso Plattner Institute |
2012 |
CrowdScape: interactively visualizing user behavior and output |
Jeffrey Rzeszotarski & Aniket Kitur, Carnegie Mellon University |
Cliplets: juxtaposing still and dynamic imagery |
Neel Joshi, Microsoft Research; et al. |
Jamming User Interfaces: Programmable Particle Stiffness and Sensing for Malleable and Shape-Chang... |
Sean Follmer, Massachusetts Institute of Technology; et al. |
2011 |
SideBySide: Ad-hoc Multi-user Interaction with Handheld Projectors |
Karl D.D. Willis, Carnegie Mellon University; et al. |
2010 |
VizWiz: nearly real-time answers to visual questions |
Jeffrey P. Bigham, University of Rochester; et al. |
2009 |
Mouse 2.0: Multi-touch meets the Mouse |
Nicolas Villar, Microsoft Research; et al. |
2008 |
Bringing Physics to the Surface |
Andrew D. Wilson, Microsoft Research; et al. |
2007 |
ThinSight: Versatile Multi-touch Sensing for Thin Form-factor Displays |
Steve Hodges, Microsoft Research; et al. |
2006 |
Reflective Physical Prototyping through Integrated Design, Test, and Analysis |
Björn Hartmann, Stanford University; et al. |
2005 |
Automation and Customization of Rendered Web Pages |
Michael Bolin, Massachusetts Institute of Technology; et al. |
2004 |
Multi-Finger Gestural Interaction with 3D Volumetric Displays |
Tovi Grossman, University of Toronto; et al. |
CrossY: A Crossing-Based Drawing Application |
Georg Apitz & François Guimbretière, University of Maryland |
2003 |
Perceptually-Supported Image Editing of Text and Graphics |
Eric Saund, Palo Alto Research Center; et al. |
2002 |
Clothing Manipulation |
Takeo Igarashi, University of Tokyo John F. Hughes, Brown University |
2001 |
Phidgets: Easy Development of Physical Interfaces through Physical Widgets |
Saul Greenberg & Chester Fitchett, University of Calgary |
2000 |
Sensing Techniques for Mobile Interaction |
Ken Hinckley, Microsoft Research; et al. |
1996 |
Indigo: A Local Propagation Algorithm for Inequality Constraints |
Alan Borning, University of Washington; et al. |