本文收集了AAAI、ACL、CIKM、CVPR、FOCS、FSE、ICCV、ICML、IJCAI、INFOCOM、KDD等國際CS頂會,2012年至2018年所有最佳論文。
內容正離子網路,這裡僅給出部分論文串列,完整串列查閱原網頁:
https://jeffhuang.com/best_paper_awards.html#mobicom
這些資料大部分是手工輸入的(透過聯絡過去的會議組織者、檢索快取的會議網站和搜尋簡歷獲得)。本串列試圖從各個領域的頂級會議中收集最佳論文獎勵,但是有些會議沒有這樣的獎勵(例如SIGGRAPH、CAV )。“Distinguished paper award”和“Outstanding paper award”包括在內,但不包括“最佳學生論文”(如NIPS )或“最佳10年論文”(如POPL )。
按照許多領域的慣例,得分是按作者遞減順序給出的。第一作者得1分,第二作者得0.5分,第三作者得0.33分,等等。然後,這些得分除以該論文的得分之和,即歸一化。這一排名可能不準確或不完整,可能不反映最佳論文獎的現狀,也不是官方名單,僅供參考。
CIKM (Knowledge Management)
2018 Relevance estimation with multiple information sources on search engine result pages Junqi Zhang, Tsinghua University; et al.
2017 Hike: A Hybrid Human-Machine Method for Entity Alignment in Large-Scale Knowledge Bases Yan Zhuang, Tsinghua University; et al.
2016 Vandalism Detection in Wikidata Stefan Heindorf, Paderborn University; et al.
2015 Assessing the Impact of Syntactic and Semantic Structures for Answer Passages Reranking Kateryna Tymoshenko, University of Trento
UIST (User Interface)
2018 Porta: Profiling Software Tutorials Using Operating-System-Wide Activity Tracing Alok Mysore & Philip J. Guo, University of California San Diego
Authoring and Verifying Human-Robot Interactions David Porfirio, University of Wisconsin-Madison; et al.
RESi: A Highly Flexible, Pressure-Sensitive, Imperceptible Textile Interface Based on Resistive Ya… Patrick Parzer, University of Applied Sciences Upper Austria; et al.
2017 Triggering Artwork Swaps for Live Animation Nora S. Willett, Princeton University; et al.
Grabity: A Wearable Haptic Interface for Simulating Weight and Grasping in Virtual Reality Inrak Choi, Stanford University; et al.
AirCode: Unobtrusive Physical Tags for Digital Fabrication Dingzeyu Li, Columbia University; et al.
2016 Rovables: Miniature On-Body Robots as Mobile Wearables Artem Dementyev, Massachusetts Institute of Technology; et al.
proCover: Sensory Augmentation of Prosthetic Limbs Using Smart Textile Covers Joanne Leong, University of Applied Sciences Upper Austria; et al.
ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch Accelerometers Gierad Laput, Carnegie Mellon University; et al.
Zooids: Building Blocks for Swarm User Interfaces Mathieu Le Goc, INRIA; et al.
2015 Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye Movements Augusto Esteves, Lancaster University; et al.
Webstrates: Shareable Dynamic Media Clemens Klokmose, Aarhus University; et al.
Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electr… Simon Olberding, Max Planck Institut; et al.
2014 Sensing Techniques for Tablet+Stylus Interaction Ken Hinckley, Microsoft Research; et al.
PrintScreen: Fabricating Highly Customizable Thin-film Touch-Displays Simon Olberding, Max Planck Institut; et al.
Expert Crowdsourcing with Flash Teams Daniela Retelny, Stanford University; et al.
2013 PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing Interfaces Lining Yao, Massachusetts Institute of Technology; et al.
PODS (Databases)
2018 Entity Matching with Active Monotone Classification Yufei Tao, Chinese University of Hong Kong
2017 Dichotomies in Ontology-Mediated Querying with the Guarded Fragment André Hernich, University of Liverpool; et al.
2016 FAQ: Questions Asked Frequently Mahmoud Abo Khamis, University at Buffalo; et al.
2015 Parallel-Correctness and Transferability for Conjunctive Queries Tom J. Ameloot, Hasselt University; et al.
2014 Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Co… Tom J. Ameloot, Hasselt University; et al.
2013 Verification of database-driven systems via amalgamation Mikołaj Bojańczyk, University of Warsaw; et al.
SIGCOMM (Networking)
2018 Inferring Persistent Interdomain Congestion Saksham Agarwal, Cornell University; et al.
2017 Re-architecting datacenter networks and stacks for low latency and high performance Mark Handley, University College London; et al.
Language-directed hardware design for network performance monitoring Srinivas Narayana, Massachusetts Institute of Technology; et al.
2016 Eliminating Channel Feedback in Next-Generation Cellular Networks Deepak Vasisht, Massachusetts Institute of Technology; et al.
Inter-Technology Backscatter: Towards Internet Connectivity for Implanted Devices Vikram Iyer, University of Washington; et al.
Don’t Mind the Gap: Bridging Network-wide Objectives and Device-level Configurations Ryan Beckett, Princeton University; et al.
2015 Central Control Over Distributed Routing Stefano Vissicchio, Université catholique de Louvain; et al.
2014 Balancing Accountability and Privacy in the Network David Naylor, Carnegie Mellon University; et al.
CONGA: Distributed Congestion-Aware Load Balancing for Datacenters Mohammad Alizadeh, Cisco Systems; et al.
2013 Ambient Backscatter: Wireless Communication Out of Thin Air Vincent Liu, University of Washington; et al.
ACL (Natural Language Processing)
2018 Finding syntax in human encephalography with beam search John Hale, Cornell University; et al.
2017 Probabilistic Typology: Deep Generative Models of Vowel Inventories Ryan Cotterell & Jason Eisner, Johns Hopkins University
2016 Finding Non-Arbitrary Form-Meaning Systematicity Using String-Metric Learning for Kernel Regression E. Darío Gutiérrez, University of California Berkeley; et al.
2015 Improving Evaluation of Machine Translation Quality Estimation Yvette Graham, Trinity College Dublin
Learning Dynamic Feature Selection for Fast Sequential Prediction Emma Strubell, University of Massachusetts Amherst; et al.
2014 Fast and Robust Neural Network Joint Models for Statistical Machine Translation Jacob Devlin, Raytheon BBN Technologies; et al.
2013 Grounded Language Learning from Video Described with Sentences Haonan Yu & Jeffrey Mark Siskind, Purdue University
INFOCOM (Networking)
2018 WiFED: WiFi Friendly Energy Delivery with Distributed Beamforming Subhramoy Mohanti, Northeastern University; et al.
Understanding Ethereum via Graph Analysis Ting Chen, University of Electronic Science and Technology of China; et al.
Optimizing Age of Information in Wireless Networks with Throughput Constraints Igor Kadota, Massachusetts Institute of Technology; et al.
2017 One Step at a Time: Optimizing SDN Upgrades in ISP Networks Konstantinos Poularakis, Yale University; et al.
2016 Heavy-Ball: A New Approach to Tame Delay and Convergence in Wireless Network Optimization Jia Liu, Ohio State University; et al.
2015 The Power of Slightly More than One Sample in Randomized Load Balancing Lei Ying, Arizona State University; et al.
2014 Joint Static and Dynamic Traffic Scheduling in Data Center Networks Zizhong Cao, Polytechnic Institute of New York University; et al.
Performance Evaluation and Asymptotics for Content Delivery Networks Virag Shah & Gustavo de Veciana, University of Texas at Austin
2013 On the Steady-State of Cache Networks Elisha J. Rosensweig, University of Massachusetts Amherst; et al.
IJCAI (Artificial Intelligence)
2018 Reasoning about Consensus when Opinions Diffuse through Majority Dynamics Vincenzo Auletta, University of Salerno; et al.
SentiGAN: Generating Sentimental Texts via Mixture Adversarial Networks Ke Wang & Xiaojun Wan, Peking University
From Conjunctive Queries to Instance Queries in Ontology-Mediated Querying Cristina Feier, University of Bremen; et al.
What game are we playing? End-to-end learning in normal and extensive form games Chun Kai Ling, Carnegie Mellon University; et al.
Commonsense Knowledge Aware Conversation Generation with Graph Attention Hao Zhou, Tsinghua University; et al.
R-SVM+: Robust Learning with Privileged Information Xue Li, Wuhan University; et al.
A Degeneracy Framework for Graph Similarity Giannis Nikolentzos, École Polytechnique; et al.
2017 Foundations of Declarative Data Analysis Using Limit Datalog Programs Mark Kaminski, University of Oxford; et al.
2016 Hierarchical Finite State Controllers for Generalized Planning Javier Segovia, Universitat Pompeu Fabra; et al.
2015 Bayesian Active Learning for Posterior Estimation Kirthevasan Kandasamy, Carnegie Mellon University; et al.
Recursive Decomposition for Nonconvex Optimization Abram L. Friesen & Pedro Domingos, University of Washington
2013 Bayesian Optimization in High Dimensions via Random Embeddings Ziyu Wang, University of British Columbia; et al.
Flexibility and Decoupling in the Simple Temporal Problem Michel Wilson, Delft University of Technology; et al.
2011 Unweighted Coalitional Manipulation Under the Borda Rule is NP-Hard Nadja Betzler, Technische Universität Berlin; et al.
ICCV (Computer Vision)
2017 Mask R-CNN Kaiming He, Facebook AI Research; et al.
2015 Deep Neural Decision Forests Peter Kontschieder, Microsoft Research; et al.
2013 From Large Scale Image Categorization to Entry-Level Categories Vicente Ordonez, University of North Carolina at Chapel Hill; et al.
2011 Relative Attributes Devi Parikh, Toyota Technological Institute at Chicago
AAAI (Artificial Intelligence)
2018 Memory-Augmented Monte Carlo Tree Search Chenjun Xiao, University of Alberta; et al.
2017 Label-Free Supervision of Neural Networks with Physics and Domain Knowledge Russell Stewart & Stefano Ermon, Stanford University
2016 Bidirectional Search That Is Guaranteed to Meet in the Middle Robert C. Holte, University of Alberta; et al.
2015 From Non-Negative to General Operator Cost Partitioning Florian Pommerening, University of Basel; et al.
2014 Recovering from Selection Bias in Causal and Statistical Inference Elias Bareinboim, University of California Los Angeles; et al.
2013 HC-Search: Learning Heuristics and Cost Functions for Structured Prediction Janardhan Rao Doppa, Oregon State University; et al.
SIGMOD (Databases)
2018 SuRF:Practical Range Query Filtering with Fast Succinct Tries Huanchen Zhang, Carnegie Mellon University; et al.
2017 Parallelizing Sequential Graph Computations Wenfei Fan, University of Edinburgh; et al.
2016 Wander Join: Online Aggregation via Random Walks Feifei Li, University of Utah; et al.
2015 DBSCAN Revisited: Mis-Claim, Un-Fixability, and Approximation Junhao Gan & Yufei Tao, Chinese University of Hong Kong
2014 Materialization Optimizations for Feature Selection Workloads Ce Zhang, Stanford University; et al.
2013 Massive Graph Triangulation Xiaocheng Hu, The Chinese University of Hong Kong; et al.
NSDI (Networking)
2018 NetChain: Scale-Free Sub-RTT Coordination Xin Jin, Johns Hopkins University; et al.
2017 mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes Muhammad Asim Jamshed, KAIST; et al.
2016 Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions Bryce Kellogg, University of Washington; et al.
2015 Queues Don’t Matter When You Can JUMP Them! Matthew P. Grosvenor, University of Cambridge; et al.
Designing Distributed Systems Using Approximate Synchrony in Data Center Networks Dan R. K. Ports, University of Washington; et al.
The Design and Implementation of Open vSwitch Ben Pfaff, VMware; et al.
2014 Software Dataplane Verification Mihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne
2013 Embassies: Radically Refactoring the Web Jon Howell, Microsoft Research; et al.
MOBICOM (Mobile)
2018 SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks Mehrdad Moradi, University of Michigan; et al.
2017 WEBee: Physical-Layer Cross-Technology Communication via Emulation Zhijun Li & Tian He, University of Minnesota
2015 CAreDroid: Adaptation Framework for Android ContextAware Applications Salma Elmalaki, University of California Los Angeles; et al.
2014 Tagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS Devices Lei Yang, Tsinghua University; et al.
2013 Whole-Home Gesture Recognition Using Wireless Signals Qifan Pu, University of Washington; et al.
2012 Distinguishing Users with Capacitative Touch Communication Tam Vu, Rutgers University; et al.
ICML (Machine Learning)
2018 Delayed Impact of Fair Machine Learning Lydia T. Liu, University of California Berkeley; et al.
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples Anish Athalye, Massachusetts Institute of Technology; et al.
2017 Understanding Black-box Predictions via Influence Functions Pang Wei Koh & Percy Liang, Stanford University
2016 Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs Sampling Christopher De Sa, Stanford University; et al.
Pixel Recurrent Neural Networks Aaron Van den Oord, Google; et al.
Dueling Network Architectures for Deep Reinforcement Learning Ziyu Wang, Google; et al.
2015 A Nearly-Linear Time Framework for Graph-Structured Sparsity Chinmay Hegde, Massachusetts Institute of Technology; et al.
Optimal and Adaptive Algorithms for Online Boosting Alina Beygelzimer, Yahoo! Research; et al.
2014 Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis Jian Tang, Peking University; et al.
2013 Vanishing Component Analysis Roi Livni, The Hebrew University of Jerusalum; et al.
S&P; (Security and Privacy)
2018 DEEPSEC: Deciding Equivalence Properties in Security Protocols — Theory and Practice Vincent Cheval, Inria; et al.
On Enforcing the Digital Immunity of a Large Humanitarian Organization Stevens Le Blond, École Polytechnique Fédérale de Lausanne; et al.
2017 Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate Karthikeyan Bhargavan, INRIA; et al.
2016 A2: Analog Malicious Hardware Kaiyuan Yang, University of Michigan; et al.
2015 Riposte: An Anonymous Messaging System Handling Millions of Users Henry Corrigan-Gibbs, Stanford University; et al.
A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche, INRIA; et al.
2014 Secure Multiparty Computations on BitCoin Marcin Andrychowicz, University of Warsaw; et al.
Bootstrapping Privacy Compliance in Big Data Systems Shayak Sen, Carnegie Mellon University; et al.
2013 Pinocchio: Nearly Practical Verifiable Computation Bryan Parno, Microsoft Research; et al.
CHI (Human-Computer Interaction)
2018 Examining Wikipedia With a Broader Lens: Quantifying the Value of Wikipedia’s Relationships with O… Nicholas Vincent, Northwestern University; et al.
Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants Tamy Guberek, University of Michigan; et al.
Addressing Age-Related Bias in Sentiment Analysis Mark Diaz, Northwestern University; et al.
Wall++: Room-Scale Interactive and Context-Aware Sensing Yang Zhang, Carnegie Mellon University; et al.
Design for Collaborative Survival: An Inquiry into Human-Fungi Relationships Jen Liu, University of Colorado Boulder; et al.
Expressive Time Series Querying with Hand-Drawn Scale-Free Sketches Miro Mannino & Azza Abouzied, New York University
Pinpointing: Precise Head- and Eye-Based Target Selection for Augmented Reality Mikko Kytö, Aalto University; et al.
Streets for People: Engaging Children in Placemaking Through a Socio-technical Process Sean Peacock, Newcastle University; et al.
Let’s Talk About Race: Identity, Chatbots, and AI Ari Schlesinger, Georgia Institute of Technology; et al.
“A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology Diana Freed, Cornell Tech; et al.
HARK No More: On the Preregistration of CHI Experiments Andy Cockburn, University of Canterbury; et al.
Hoarding and Minimalism: Tendencies in Digital Data Preservation Francesco Vitale, University of British Columbia; et al.
Semi-Automated Coding for Qualitative Research: A User-Centered Inquiry and Initial Prototypes Megh Marathe & Kentaro Toyama, University of Michigan
Making as Expression: Informing Design with People with Complex Communication Needs through Art Th… Amanda Lazar, University of Maryland; et al.
How Relevant are Incidental Power Poses for HCI? Yvonne Jansen, Sorbonne Université
STOC (Theory)
2018 A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem Ola Svensson, École Polytechnique Fédérale de Lausanne; et al.
2017 Explicit, Almost Optimal, Epsilon-Balanced Codes Amnon Ta-Shma, Tel-Aviv University
A Weighted Linear Matroid Parity Algorithm Satoru Iwata, University of Tokyo
FSE (Software Engineering)
2018 Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks Shengjian (Daniel) Guo, Virginia Tech; et al.
An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems Yu Gao, Chinese Academy of Sciences; et al.
Data Race Detection on Compressed Traces Dileep Kini, University of Illinois at Urbana-Champaign; et al.
Oreo: Detection of Clones in the Twilight Zone Vaibhav Saini, University of California Irvine; et al.
The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the … James C. Davis, Virginia Tech; et al.
Do Android Taint Analysis Tools Keep Their Promises? Felix Pauck, Paderborn University; et al.
2017 The Power of “Why” and “Why Not”: Enriching Scenario Exploration with Provenance Tim Nelson, Brown University; et al.
Cooperative Kernels: GPU Multitasking for Blocking Algorithms Tyler Sorensen, Imperial College London; et al.
Understanding Misunderstandings in Source Code Dan Gopstein, New York University; et al.
Trade-Offs in Continuous Integration: Assurance, Security, and Flexibility Michael Hilton, Oregon State University; et al.
Discovering Relational Specifications Calvin Smith, University of Wisconsin-Madison; et al.
Automatically Diagnosing and Repairing Error Handling Bugs in C Yuchi Tian & Baishakhi Ray, University of Virginia
Fairness Testing: Testing Software for Discrimination Sainyam Galhotra, University of Massachusetts Amherst; et al.
2016 Foraging and Navigations Fundamentally: Developers’ Predictions of Value and Cost David Piorkowski, Oregon State University; et al.
Multi-Representational Security Analysis Eunsuk Kang, University of California Berkeley; et al.
Factors Influencing Code Review Processes in Industry Tobias Baum, Leibniz Universität Hannover; et al.
API Code Recommendation Using Statistical Learning from Fine-grained Changes Anh Tuan Nguyen, Iowa State University; et al.
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis Xiaofei Xie, Tianjin University; et al.
Why We Refactor? Confessions of GitHub Contributors Danilo Silva, Federal University of Minas Gerais; et al.
Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis Jianjun Huang, Purdue University; et al.
2015 Optimizing energy consumption of GUIs in Android apps: a multi-objective approach Mario Linares-Vásquez, College of William and Mary; et al.
How Practitioners Perceive the Relevance of Software Engineering Research David Lo, Singapore Management University; et al.
Effective Test Suites for Mixed Discrete-Continuous Stateflow Controllers Reza Matinnejad, University of Luxembourg; et al.
Modeling Readability to Improve Unit Tests Ermira Daka, University of Sheffield; et al.
Measure It? Manage It? Ignore It? Software Practitioners and Technical Debt Neil A. Ernst, Carnegie Mellon University; et al.
A User-Guided Approach to Program Analysis Ravi Mangal, Georgia Institute of Technology; et al.
MultiSE: Multi-path Symbolic Execution using Value Summaries Koushik Sen, University of California Berkeley; et al.
Users Beware: Preference Inconsistencies Ahead Farnaz Behrang, Georgia Institute of Technology; et al.
2014 Selection and Presentation Practices for Code Example Summarization Annie Ying & Martin Robillard, McGill University
Are Mutants a Valid Substitute for Real Faults in Software Testing? René Just, University of Washington; et al.
AI: A Lightweight System for Tolerating Concurrency Bugs Mingxing Zhang, Tsinghua University; et al.
Powering the Static Driver Verifier using Corral Akash Lal & Shaz Qadeer, Microsoft Research
Learning Natural Coding Conventions Miltiadis Allamanis, University of Edinburgh; et al.
Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case Study Klaus-Benedikt Schultis, Siemens Corporate Technology; et al.
2012 Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software Libraries Bradley Cossette & Robert Walker, University of Calgary
VLDB (Databases)
2017 Provenance for Natural Language Queries Daniel Deutch, Tel-Aviv University; et al.
2016 Compressed Linear Algebra for Large-Scale Machine Learning Ahmed Elgohary, University of Maryland; et al.
2015 Constructing an interactive natural language interface for relational databases Fei Li & H. V. Jagadish, University of Michigan
2014 M4: A Visualization-Oriented Time Series Data Aggregation Uwe Jugel, SAP; et al.
Building Efficient Query Engines in a High-Level Language Yannis Klonatos, École Polytechnique Fédérale de Lausanne; et al.
On k-Path Covers and their Applications Stefan Funke, University of Stuttgart; et al.
epiC: an Extensible and Scalable System for Processing Big Data Dawei Jiang, National University of Singapore; et al.
The Uncracked Pieces in Database Cracking Felix Martin Schuhknecht, Saarland University; et al.
2013 DisC Diversity: Result Diversification based on Dissimilarity and Coverage Marina Drosou & Evaggelia Pitoura, University of Ioannina
2012 Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification Albert Angel, University of Toronto; et al.
FOCS (Theory)
2018 Classical Verification of Quantum Computation Urmila Mahadev, University of California Berkeley
Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic Time Diptarka Chakraborty, Computer Science Institute of Charles University; et al.
Pseudorandom Sets in Grassmann Graph have Near-Perfect Expansion Subhash Khot, New York University; et al.
2017 A dichotomy theorem for nonuniform CSPs Andrei A. Bulatov, Simon Fraser University
The Matching Problem in General Graphs is in Quasi-NC Ola Svensson & Jakub Tarnawski, École polytechnique fédérale de Lausanne
The Proof of CSP Dichotomy Conjecture Dmitriy Zhuk, Lomonosov Moscow State University
2016 Settling the Complexity of Computing Approximate Two-Player Nash Equilibria Aviad Rubinstein, University of California Berkeley
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning Ran Raz, Weizmann Institute of Science
2015 An average-case depth hierarchy theorem for Boolean circuits Benjamin Rossman, National Institute of Informatics; et al.
2014 Path Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations a… Yin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology
2013 Navigating Central Path with Electrical Flows: from Flows to Matchings, and Back Aleksander Mądry, École Polytechnique Fédérale de Lausanne
PLDI (Programming Languages)
2018 Program synthesis using conflict-driven learning Yu Feng, University of Texas at Austin; et al.
The semantics of transactions and weak memory in x86, Power, ARM, and C++ Nathan Chong, ARM; et al.
A data-driven CHC solver He Zhu, Galois; et al.
2017 Low Overhead Dynamic Binary Translation on ARM Amanieu D’Antras, University of Manchester; et al.
Repairing sequential consistency in C/C++11 Ori Lahav, MPI-SWS; et al.
Bringing the web up to speed with WebAssembly Andreas Haas, Google; et al.
Compiling without continuations Luke Maurer, University of Oregon; et al.
2016 Assessing the limits of program-specific garbage collection performance Nicholas Jacek, University of Massachusetts Amherst; et al.
Into the Depths of C: Elaborating the De Facto Standards Kayvan Memarian, University of Cambridge; et al.
Transactional Data Structure Libraries Alexander Spiegelman, Technion; et al.
Types from data: Making structured data first-class citizens in F# Tomas Petricek, University of Cambridge; et al.
2015 Provably Correct Peephole Optimizations with Alive Nuno P. Lopes, Microsoft Research; et al.
Diagnosing Type Errors with Class Danfeng Zhang, Cornell University; et al.
Automatically Improving Accuracy for Floating Point Expressions Pavel Panchekha, University of Washington; et al.
2014 Improving JavaScript Performance by Deconstructing the Type System Wonsun Ahn, University of Illinois at Urbana-Champaign; et al.
Compiler validation via equivalence modulo inputs Vu Le, University of California Davis; et al.
On Abstraction Refinement for Program Analyses in Datalog Xin Zhang, Georgia Institute of Technology; et al.
2013 Static Analysis for Probabilistic Programs: Inferring Whole Program Properties from Finitely Many … Sriram Sankaranarayanan, University of Colorado; et al.
WWW (World Wide Web)
2018 HighLife: Higher-arity Fact Harvesting Patrick Ernst, Saarland Informatics CampusSaarbrücken; et al.
2016 Social Networks Under Stress Daniel Romero, University of Michigan; et al.
2015 HypTrails: A Bayesian Approach for Comparing Hypotheses About Human Trails on the Web Philipp Singer, GESIS – Leibniz Institute for the Social Sciences; et al.
2014 Efficient Estimation for High Similarities using Odd Sketches Michael Mitzenmacher, Harvard University; et al.
2013 No Country for Old Members: User Lifecycle and Linguistic Change in Online Communities Cristian Danescu-Niculescu-Mizil, Stanford University; et al.
2012 Counting Beyond a Yottabyte, or how SPARQL 1.1 Property Paths will Prevent Adoption of the Standard Marcelo Arenas, Pontificia Universidad Católica de Chile; et al.
SOSP (Operating Systems)
2017 DeepXplore: Automated Whitebox Testing of Deep Learning Systems Kexin Pei, Columbia University; et al.
The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web Cheng Tan, New York University; et al.
2015 Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems Jonathan Mace, Brown University; et al.
Using Crash Hoare Logic for Certifying the FSCQ File System Haogang Chen, Massachusetts Institute of Technology; et al.
Coz: Finding Code that Counts with Causal Profiling Charlie Curtsinger, Grinnell College
ICSE (Software Engineering)
2018 Large-Scale Analysis of Framework-Specific Exceptions in Android Apps Lingling Fan, East China Normal University; et al.
Generalized Data Structure Synthesis Calvin Loncaric, University of Washington; et al.
Static Automated Program Repair for Heap Properties Rijnard van Tonder & Claire Le Goues, Carnegie Mellon University
Towards Optimal Concolic Testing Xinyu Wang, Zhejiang University; et al.
Spatio-Temporal Context Reduction: A Pointer-Analysis- Based Static Approach for Detecting Use-Aft… Hua Yan, University of New South Wales; et al.
Identifying Design Problems in the Source Code: A Grounded Theory Leonardo Sousa, PUC-Rio; et al.
Traceability in the Wild: Automatically Augmenting Incomplete Trace links Michael Rath, Technical University Ilmenau; et al.
Automated Localization for Unreproducible Builds Zhilei Ren, Dalian University of Technology; et al.
2017 Decoding the representation of code in the brain: An fMRI study of code review and expertise Benjamin Floyd, University of Virginia; et al.
Code Defenders: Crowdsourcing Effective Tests and Subtle Mutants with a Mutation Testing Game José Miguel Rojas, The University of Sheffield; et al.
Clone Refactoring with Lambda Expressions Nikolaos Tsantalis, Concordia University; et al.
Optimizing Test Placement for Module-Level Regression Testing August Shi, University of Illinois at Urbana-Champaign; et al.
A Grounded Theory of Agile Transitions in Practice Rashina Hoda, The University of Auckland
KDD (Data Mining)
2018 Adversarial Attacks on Neural Networks for Graph Data Daniel Zügner, Technical University of Munich; et al.
2017 Accelerating Innovation Through Analogy Mining Tom Hope, Hebrew University of Jerusalem; et al.
2016 FRAUDAR: Bounding Graph Fraud in the Face of Camouflage Bryan Hooi, Carnegie Mellon University; et al.
2015 Efficient Algorithms for Public-Private Social Networks Flavio Chierichetti, Sapienza University of Rome; et al.
2014 Reducing the Sampling Complexity of Topic Models Aaron Li, Carnegie Mellon University; et al.
2013 Simple and Deterministic Matrix Sketching Edo Liberty, Yahoo! Research
SIGIR (Information Retrieval)
2018 Should I Follow the Crowd? A Probabilistic Analysis of the Effectiveness of Popularity in Recommen… Rocío Cañamares & Pablo Castells, Universidad Autónoma de Madrid
2017 BitFunnel: Revisiting Signatures for Search Bob Goodwin, Microsoft; et al.
2016 Understanding Information Need: An fMRI Study Yashar Moshfeghi, University of Glasgow; et al.
2015 QuickScorer: A Fast Algorithm to Rank Documents with Additive Ensembles of Regression Trees Claudio Lucchese, Istituto di Scienza e Tecnologie dell’Informazione; et al.
2014 Partitioned Elias-Fano Indexes Giuseppe Ottaviano, Istituto di Scienza e Tecnologie dell’Informazione
CVPR (Computer Vision)
2018 Taskonomy: Disentangling Task Transfer Learning Amir R. Zamir, Stanford University; et al.
2017 Densely Connected Convolutional Networks Zhuang Liu, Tsinghua University; et al.
Learning from Simulated and Unsupervised Images through Adversarial Training Ashish Shrivastava, Apple Inc.; et al.
2016 Deep Residual Learning for Image Recognition Kaiming He, Microsoft Research; et al.
2015 DynamicFusion: Reconstruction and Tracking of Non-rigid Scenes in Real-Time Richard A. Newcombe, University of Washington; et al.
2014 What Camera Motion Reveals About Shape with Unknown BRDF Manmohan Chandraker, NEC Labs America
2013 Fast, Accurate Detection of 100,000 Object Classes on a Single Machine Thomas Dean, Google; et al.
SIGMETRICS (Performance)
2018 A Refined Mean Field Approximation Nicolas Gast, Inria
OSDI (Operating Systems)
2018 REPT: Reverse Debugging of Failures in Deployed Software Weidong Cui, Microsoft Research; et al.
Orca: Differential Bug Localization in Large-Scale Services Ranjita Bhagwan, Microsoft Research; et al.
LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation Yizhou Shan, Purdue University; et al.
2016 Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data Tyler Hunt, University of Texas at Austin; et al.
Push-Button Verification of File Systems via Crash Refinement Helgi Sigurbjarnarson, University of Washington; et al.
Early Detection of Configuration Errors to Reduce Failure Damage Tianyin Xu, University of California San Diego; et al.
2014 Shielding Applications from an Untrusted Cloud with Haven Andrew Baumann, Microsoft Research; et al.
IX: A Protected Dataplane Operating System for High Throughput and Low Latency Adam Belay, Stanford University; et al.
Arrakis: The Operating System is the Control Plane Simon Peter, University of Washington; et al.
2012 Spanner: Google’s Globally-Distributed Database James C. Corbett, Google; et al.
2010 Efficient System-Enforced Deterministic Parallelism Amittai Aviram, Yale University; et al.
The Turtles Project: Design and Implementation of Nested Virtualization Muli Ben-Yehuda, IBM Research; et al.
2008 KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Cristian Cadar, Stanford University; et al.
SODA (Theory)
2018 Approaching 3/2 for the s-t-path TSP Vera Traub & Jens Vygen, Universität Bonn
Online Bipartite Matching with Amortized O(log2 N)Replacements Aaron Bernstein, Technical University of Berlin; et al.
2017 Subquadratic Algorithms for the Diameter and the Sum of Pairwise Distances in Planar Graphs Sergio Cabello, University of Ljubljana
A (2 + Є) Approximation for Maximum Weight Matching in the Semi-Streaming Model Ami Paz, IRIF