Best paper awards

Best paper awards for AAAI, ACL, CHI, CIKM, FOCS, FSE, ICML, ICSE, IJCAI, KDD, OSDI, PODS, SIGIR, SIGMOD, SOSP, STOC, UIST, VLDB, WWW

By Conference:   AAAI   ACL   CHI   CIKM   FOCS   FSE   ICML   ICSE   IJCAI   KDD   OSDI   PODS   SIGIR   SIGMOD   SOSP   STOC   UIST   VLDB   WWW

Institutions with the most Best Papers

AAAI (Artificial Intelligence)
2011Complexity of and Algorithms for Borda ManipulationJessica Davies, University of Toronto; et al.
2010A Novel Transition Based Encoding Scheme for Planning as SatisfiabilityRuoyun Huang, Washington University in St. Louis; et al.
2008How Good is Almost Perfect?Malte Helmert & Gabriele Röger, Albert-Ludwigs-Universität Freiburg
Optimal False-Name-Proof Voting Rules with Costly VotingLiad Wagman & Vincent Conitzer, Duke University
2007PLOW: A Collaborative Task Learning AgentJames Allen, Institute for Human and Machine Cognition; et al.
Thresholded Rewards: Acting Optimally in Timed, Zero-Sum GamesColin McMillen & Manuela Veloso, Carnegie Mellon University
2006Model Counting: A New Strategy for Obtaining Good BoundsCarla P. Gomes, Cornell University; et al.
Towards an Axiom System for Default LogicGerhard Lakemeyer, RWTH Aachen University
Hector J. Levesque, University of Toronto
2005The Max K- Armed Bandit: A New Model of Exploration Applied to Search Heuristic SelectionVincent A. Cicirello, Drexel University
Stephen F. Smith, Carnegie Mellon University
2004Learning and Inferring Transportation RoutinesLin Liao, University of Washington; et al.
2002On Computing All Abductive ExplanationsThomas Eiter, Technische Universität Wien
Kazuhisa Makino, Osaka University
2000The Game of Hex: An Automatic Theorem-Proving Approach to Game ProgrammingVadim V. Anshelevich, Vanshel Consulting
1999PROVERB: The Probabilistic CruciverbalistGreg A. Keim, Duke University; et al.
1998Learning Evaluation Functions for Global Optimization and Boolean SatisfiabilityJustin A. Boyan & Andrew W. Moore, Carnegie Mellon University
Acceleration Methods for Numeric CSPsYahia Lebbah & Olivier Lhomme, Ecole des Mines de Nantes
The Interactive Museum Tour-Guide RobotWolfram Burgard, University of Bonn; et al.
1997Statistical Parsing with a Context-Free Grammar and Word StatisticsEugene Charniak, Brown University
A Practical Algorithm for Finding Optimal TriangulationsKrill Shoikhet & Dan Geiger, Technion
Fast Context Switching in Real-Time Propositional ReasoningP. Pandurang Nayak & Brian C. Williams, NASA Ames Research Center
Building Concept Representations from Reusable ComponentsPeter Clark, Boeing
Bruce Porter, University of Texas at Austin
1996Verification of Knowledge Bases Based on Containment CheckingAlon Y. Levy, AT&T Laboratories
Marie-Christine Rousset, Université Paris-Sud
A Novel Application of Theory Refinement to Student ModelingPaul T. Baffes, SciComp Inc
Raymond J. Mooney, University of Texas at Austin
Pushing the Envelope: Planning, Propositional Logic, and Stochastic SearchHenry Kautz & Bart Selman, AT&T Laboratories
ACL (Natural Language Processing)
2011Unsupervised Part-of-Speech Tagging with Bilingual Graph-Based ProjectionsDipanjan Das, Carnegie Mellon University
Slav Petrov, Google
2010Beyond NomBank: A Study of Implicit Arguments for Nominal PredicatesMatthew Gerber & Joyce Y. Chai, Michigan State University
2009Reinforcement Learning for Mapping Instructions to ActionsS.R.K. Branavan, Massachusetts Institute of Technology; et al.
K-Best A* ParsingAdam Pauls & Dan Klein, University of California Berkeley
Concise Integer Linear Programming Formulations for Dependency ParsingAndré F.T. Martins, Instituto de Telecomunicações; et al.
2008Forest Reranking: Discriminative Parsing with Non-Local FeaturesLiang Huang, University of Pennsylvania
A New String-to-Dependency Machine Translation Algorithm with a Target Dependency Language ModelLibin Shen, BBN Technologies; et al.
2007Learning synchronous grammars for semantic parsing with lambda calculusYuk Wah Wong & Raymond J. Mooney, University of Texas at Austin
2006Semantic taxonomy induction from heterogenous evidenceRion Snow, Stanford University; et al.
2005A Hierarchical Phrase-Based Model for Statistical Machine TranslationDavid Chiang, University of Maryland
2004Finding Predominant Word Senses in Untagged TextDiana McCarthy, University of Sussex; et al.
2003Accurate Unlexicalized ParsingDan Klein & Christopher D. Manning, Stanford University
Towards a Model of Face-to-Face GroundingYukiko I. Nakano, RISTEX; et al.
2002Discriminative Training and Maximum Entropy Models for Statistical Machine TranslationFranz Josef Och & Hermann Ney, RWTH Aachen University
2001Immediate-Head Parsing for Language ModelsEugene Charniak, Brown University
Fast Decoding and Optimal Decoding for Machine TranslationUlrich Germann, University of Southern California; et al.
CHI (Human-Computer Interaction)
2011Usable Gestures for Blind People: Understanding Preference and PerformanceShaun K. Kane, University of Washington; et al.
Effects of Community Size and Contact Rate in Synchronous Social Q&ARyen W. White, Microsoft Research; et al.
Teenagers and Their Virtual Possessions: Design Opportunities and IssuesWilliam Odom, Carnegie Mellon University; et al.
Enhancing Physicality in Touch Interaction with Programmable FrictionVincent Levesque, University of British Columbia; et al.
Mid-air Pan-and-Zoom on Wall-sized DisplaysMathieu Nancel, Université Paris-Sud; et al.
Bricolage: Example-Based Retargeting for Web DesignRanjitha Kumar, Stanford University; et al.
Synchronous Interaction Among Hundreds: An Evaluation of a Conference in an Avatar-based Virtual Env...Thomas Erickson, IBM Research; et al.
In the Shadow of Misperception: Assistive Technology Use and Social InteractionsKristen Shinohara & Jacob O. Wobbrock, University of Washington
Why is My Internet Slow?: Making Network Speeds VisibleMarshini Chetty, Georgia Institute of Technology; et al.
Ease of Juggling: Studying the Effects of Manual MultitaskingAntti Oulasvirta & Joanna Bergstrom-Lehtovirta, Aalto University
Automics: souvenir generating photoware for theme parksAbigail Durrant, University of Nottingham; et al.
Your Noise is My Command: Sensing Gestures Using the Body as an AntennaGabe Cohn, University of Washington; et al.
Review Spotlight: A User Interface for Summarizing User-generated Reviews Using Adjective-Noun Word ...Koji Yatani, University of Toronto; et al.
2010Lumino: Tangible Blocks for Tabletop Computers Based on Glass Fiber BundlesPatrick Baudisch, Hasso Plattner Institute; et al.
Mapping the Landscape of Sustainable HCICarl DiSalvo, Georgia Institute of Technology; et al.
Occlusion-Aware InterfacesDaniel Vogel & Ravin Balakrishnan, University of Toronto
Avaaj Otalo — A Field Study of an Interactive Voice Forum for Small Farmers in Rural IndiaNeil Patel, Stanford University; et al.
How does search behavior change as search becomes more difficult?Anne Aula, Google; et al.
The Tower of Babel Meets Web 2.0: User-Generated Content and its Applications in a Multilingual Cont...Brent Hecht & Darren Gergle, Northwestern University
Skinput: Appropriating the Body as an Input SurfaceChris Harrison, Carnegie Mellon University; et al.
Mobile-izing Health Workers in Rural IndiaDivya Ramachandran, University of California Berkeley; et al.
The Design of Eco-Feedback TechnologyJon Froehlich, University of Washington; et al.
Feminist HCI: Taking Stock and Outlining an Agenda for DesignShaowen Bardzell, Indiana University at Bloomington
Prefab: Implementing Advanced Behaviors Using Pixel-Based Reverse Engineering of Interface StructureMorgan Dixon & James Fogarty, University of Washington
Useful Junk? The Effects of Visual Embellishment on Comprehension and Memorability of ChartsScott Bateman, University of Saskatchewan; et al.
2009From Interaction to Trajectories: Designing Coherent Journeys Through User ExperiencesSteve Benford, The University of Nottingham; et al.
Sizing the Horizon: The Effects of Chart Size and Layering on the Graphical Perception of Time Serie...Jeffrey Heer, Stanford University; et al.
Predicting Tie Strength With Social MediaEric Gilbert & Karrie Karahalios, University of Illinois at Urbana-Champaign
Musink: Composing Music through Augmented DrawingTheophanis Tsandilas, Université Paris-Sud; et al.
Social Immersive Media: Pursuing Best Practices for Multi-user Interactive Camera/Projector ExhibitsScott S. Snibbe, Sona Research
Hayes S. Raffle, Massachusetts Institute of Technology
Ephemeral Adaptation: The Use of Gradual Onset to Improve Menu Selection PerformanceLeah Findlater, University of British Columbia; et al.
Undo and Erase Events as Indicators of Usability ProblemsDavid Akers, Stanford University; et al.
2008In-Car GPS Navigation: Engagement with and Disengagement from the EnvironmentGilly Leshed, Cornell University; et al.
Improving the Performance of Motor-Impaired Users with Automatically-Generated, Ability-Based Interf...Krzysztof Z. Gajos, University of Washington; et al.
Large Scale Analysis of Web Revisitation PatternsEytan Adar, University of Washington; et al.
Designs on Dignity: Perceptions of Technology Among the HomelessChristopher A. Le Dantec & W. Keith Edwards, Georgia Institute of Technology
The Network in the Garden: An Empirical Analysis of Social Media in Rural LifeEric Gilbert, University of Illinois at Urbana-Champaign; et al.
Multimodal collaborative handwriting training for visually-impaired peopleBeryl Plimmer, University of Auckland; et al.
An Error Model for Pointing Based on Fitts' LawJacob O. Wobbrock, University of Washington; et al.
2007Multiview: improving trust in group video conferencing through spatial faithfulnessDavid T. Nguyen & John Canny, University of California Berkeley
Software or wetware?: discovering when and why people use digital prosthetic memoryVaiva Kalnikaité & Steve Whittaker, The University of Sheffield
Shift: a technique for operating pen-based interfaces using touchDaniel Vogel, University of Toronto
Patrick Baudisch, Microsoft Research
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognitio...Björn Hartmann, Stanford University; et al.
Sustainable interaction design: invention & disposal, renewal & reuseEli Blevis, Indiana University at Bloomington
Consuming video on Mobile devicesKenton O'Hara, Hewlett-Packard Labs; et al.
2006Trackball text entry for people with motor impairmentsJacob O. Wobbrock & Brad Myers, Carnegie Mellon University
Embedded phenomena: supporting science learning with classroom-sized distributed simulationsTom Moher, University of Illinois at Chicago
A role for haptics in mobile interaction: initial design using a handheld tactile display prototypeJoseph Luk, University of British Columbia; et al.
2005Making space for stories: ambiguity in the design of personal communication systemsPaul M. Aoki, Palo Alto Research Center
Allison Woodruff, Intel Research
Examining Task Engagement in Sensor-Based Statistical Models of Human InterruptibilityJames Fogarty, Carnegie Mellon University; et al.
Designing the spectator experienceStuart Reeves, The University of Nottingham; et al.
The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation areaTovi Grossman & Ravin Balakrishnan, University of Toronto
CIKM (Knowledge Management)
2011Intent-aware query similarityJiafeng Guo, Chinese Academy of Sciences; et al.
2010MENTA: Inducing Multilingual Taxonomies from WikipediaGerard de Melo & Gerhard Weikum, Max Planck Institut
FACeTOR: cost-driven exploration of faceted query resultsAbhijith Kashyap, State University of New York at Buffalo; et al.
2009On the Feasibility of Multi-Site Web Search EnginesRicardo Baeza-Yates, Yahoo! Research; et al.
2008Learning to Link with WikipediaDavid Milne & Ian H. Witten, Univerisity of Waikato
2007Autonomously Semantifying WikipediaFei Wu & Daniel S. Weld, University of Washington
2006Discovering and Exploiting Keyword and Attribute-Value Co-occurrences to Improve P2P Routing IndicesSegabtian Michel, Max Planck Institut; et al.
2005Towards Automatic Association of Relevant Unstructured Content with Structured Query ResultsPrasan Roy, IBM Research; et al.
2004Discovering Frequently Changing Structures from Historical Structural Deltas of Unordered XMLQiankun Zhao, Nanyang Technological University; et al.
FOCS (Theory)
20113-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ Hold in GeneralTimon Hertli, ETH Zurich
A Polylogarithmic-Competitive Algorithm for the k-Server ProblemNikhil Bansal, IBM Research; et al.
2010Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke DecompositionsMatthew Andrews, Bell Labs
Subexponential Algorithms for Unique Games and Related ProblemsSanjeev Arora, Princeton University; et al.
Computational Transition at the Uniqueness ThresholdAllan Sly, Microsoft Research
2008Two Query PCP with Sub-Constant ErrorDana Moshkovitz & Ran Raz, Weizmann Institute of Science
2007Space-Efficient Identity Based Encryption Without PairingsDan Boneh, Stanford University; et al.
2006Settling the Complexity of 2-Player Nash EquilibriumXi Chen, Tsinghua University
Xiaotie Deng, City University of Hong Kong
2005The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type Met...Subhash A. Khot, Georgia Institute of Technology
Nisheeth K. Vishnoi, IBM Research
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial TimeFarzad Parvaresh & Alexander Vardy, University of California San Diego
2004Cryptography in NC0Benny Applebaum, Technion; et al.
Hardness of Approximating the Shortest Vector Problem in LatticesSubhash Khot, Georgia Institute of Technology
2003On the Impossibility of Dimension Reduction in L1Bo Brinkman & Moses Charikar, Princeton University
2002A Dichotomy Theorem for Constraints on a Three-Element SetAndrei A. Bulatov, University of Oxford
Minimizing Congestion in General NetworksHarald Räcke, Paderborn University
Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String ModelBoaz Barak, Weizmann Institute of Science
FSE (Software Engineering)
2011Proactive Detection of Collaboration ConflictsYuriy Brun, University of Washington; et al.
How Do Fixes Become Bugs?Zuoning Yin, University of Illinois at Urbana-Champaign; et al.
Proving programs robustSwarat Chaudhuri, Rice University; et al.
2010Creating and evolving developer documentation: understanding the decisions of open source contributo...Barthélémy Dagenais & Martin P. Robillard, McGill University
Developer Fluency: Achieving True Mastery in Software ProjectsMinghui Zhou, Peking University
Audris Mockus, Avaya Labs
Staged Concurrent Program AnalysisNishant Sinha & Chao Wang, NEC Labs America
2009Asserting and checking determinism for multithreaded programsJacob Burnim & Koushik Sen, University of California Berkeley
Darwin: an approach for debugging evolving programsDawei Qi, National University of Singapore; et al.
Graph-based Mining of Multiple Object Usage PatternsTung Thanh Nguyen, Iowa State University; et al.
2008What makes a good bug report?Nicolas Bettenburg, Saarland University; et al.
Efficient online monitoring of web-service SLAsFranco Raimondi, University College London; et al.
2007Automatic consistency assessment for query results in dynamic environmentsJamie Payton, University of North Carolina at Charlotte; et al.
Globally distributed software development project performance: an empirical analysisNarayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University
Mining specifications of malicious behaviorMihai Christodorescu, University of Wisconsin; et al.
Object and reference immutability using Java genericsYoav Zibin, Massachusetts Institute of Technology; et al.
2006Controlling factors in evaluating path-sensitive error detection techniquesMatthew B. Dwyer, University of Nebraska-Lincoln; et al.
SYNERGY: a new algorithm for property checkingBhargav S. Gulavani, Indian Institute of Technology; et al.
2005Automatic Generation of Suggestions for Program InvestigationMartin P. Robillard, McGill University
CUTE: a concolic unit testing engine for CKoushik Sen, University of Illinois at Urbana-Champaign; et al.
Context- and path-sensitive memory leak detectionYichen Xie & Alex Aiken, Stanford University
2004Reasoning about partial goal satisfaction for requirements and design engineeringEmmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain
A classification system and analysis for aspect-oriented programsMartin Rinard, Massachusetts Institute of Technology; et al.
2003<a href="http://scholar.google.com/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=Eliminating+redundancies+with+a+" composition+with+adaptation"+meta-programming+technique&as_oq="&as_eq=&as_occt=any&as_sauthors=Jarzabek"" style="text-decoration: none; ">Eliminating redundancies with a "composition with adaptation" meta-programming techniqueStan Jarzabek, National University of Singapore
Li Shubiao, Xi'an Jiaotong University
A Family of Test Adequacy Criteria for Database-Driven ApplicationsGregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh
Predicting problems caused by component upgradesStephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology
2002Isolating Cause-Effect Chains from Computer ProgramsAndreas Zeller, Saarland University
ICML (Machine Learning)
2011Computational Rationalization: The Inverse Equilibrium ProblemKevin Waugh, Carnegie Mellon University; et al.
2010Hilbert Space Embeddings of Hidden Markov ModelsLe Song, Carnegie Mellon University; et al.
2009Structure preserving embeddingBlake Shaw & Tony Jebara, Columbia University
2008SVM Optimization: Inverse Dependence on Training Set SizeShai Shalev-Shwartz & Nathan Srebro, University of Chicago
2007Information-theoretic metric learningJason V. Davis, University of Texas at Austin; et al.
2006Trading convexity for scalabilityRonan Collobert, NEC Labs America; et al.
2005A support vector method for multivariate performance measuresThorsten Joachims, Cornell University
1999Least-Squares Temporal Difference LearningJustin A. Boyan, NASA Ames Research Center
ICSE (Software Engineering)
2011Verifying Multi-threaded Software using SMT-based Context-Bounded Model CheckingLucas Cordeiro & Bernd Fischer, University of Southampton
Configuring Global Software Teams: A Multi-Company Analysis of Project Productivity, Quality, and Pr...Narayan Ramasubbu, Singapore Management University; et al.
Programs, tests, and oracles: the foundations of testing revisitedMatt Staats, University of Minnesota; et al.
On-demand Feature Recommendations Derived from Mining Public Product DescriptionsHoratiu Dumitru, DePaul University; et al.
Run-Time Efficient Probabilistic Model CheckingAntonio Filieri, Politecnico di Milano; et al.
2010A Machine Learning Approach for Tracing Regulatory Codes to Product Specific RequirementsJane Cleland-Huang, DePaul University; et al.
Collaborative Reliability Prediction of Service-Oriented SystemsZibin Zheng & Michael R. Lyu, The Chinese University of Hong Kong
A Cut-off Approach for Bounded Verification of Parameterized SystemsQiusong Yang & Mingshu Li, Chinese Academy of Sciences
Test Generation through Programming in UDITAMilos Gligoric, University of Illinois at Urbana-Champaign; et al.
A Degree-of-Knowledge Model to Capture Source Code FamiliarityThomas Fritz, University of British Columbia; et al.
2009How We Refactor, and How We Know ItEmerson Murphy-Hill, Portland State University; et al.
Effective Static Deadlock DetectionMayur Naik, Intel Research; et al.
Invariant-Based Automatic Testing of AJAX User InterfacesAli Mesbah & Arie van Deursen, Delft University of Technology
Does Distributed Development Affect Software Quality? An Empirical Case Study of Windows VistaChristian Bird, University of California Davis; et al.
Automatically finding patches using genetic programmingWestley Weimer, University of Virginia; et al.
2008Precise memory leak detection for java software using container profilingGuoqing Xu & Atanas Rountev, Ohio State University
Debugging reinvented: asking and answering why and why not questions about program behaviorAndrew J. Ko & Brad A. Myers, Carnegie Mellon University
Recommending adaptive changes for framework evolutionBarthélémy Dagenais & Martin P. Robillard, McGill University
Predicting Accurate and Actionable Static Analysis Warnings: An Experimental ApproachJoseph Ruthruff, University of Nebraska-Lincoln; et al.
The effect of program and model structure on mc/dc test adequacy coverageAjitha Rajan, University of Minnesota; et al.
2007Refactoring for Parameterizing Java ClassesAdam Kiezun, Massachusetts Institute of Technology; et al.
Tracking Code Clones in Evolving SoftwareEkwa Duala-Ekoko & Martin P. Robillard, McGill University
Matching and Merging of Statecharts SpecificationsShiva Nejati, University of Toronto; et al.
Predicting Faults from Cached HistorySunghun Kim, Massachusetts Institute of Technology; et al.
2006Model-Based Development of Dynamically Adaptive SoftwareJi Zhang & Betty H.C. Cheng, Michigan State University
Who Should Fix This Bug?John Anvik, University of British Columbia; et al.
2005Eliciting Design Requirements for Maintenance-Oriented IDEs: A Detailed Study of Corrective and Perf...Andrew Ko, Carnegie Mellon University; et al.
Is Mutation an Appropriate Tool for Testing Experiments?James Andrews, University of Western Ontario; et al.
Using Structural Context to Recommend Source Code ExamplesReid Holmes & Gail Murphy, University of British Columbia
Data Structure Repair Using Goal-Directed ReasoningBrian Demsky & Martin Rinard, Massachusetts Institute of Technology
2004SNIAFL: Towards a Static Non-Interactive Approach to Feature LocationWei Zhao, Peking University; et al.
Extending the REpresentational State Transfer (REST) Architectural Style for Decentralized SystemsRohit Khare & Richard N. Taylor, University of California Irvine
An Empirical Study of Software Reuse vs. Defect-Density and StabilityParastoo Mohagheghi, Ericsson Norway-Grimstad; et al.
A Tool for Writing and Debugging Algebraic SpecificationsJohannes Henkel & Amer Diwan, University of Colorado
Static Checking of Dynamically Generated Queries in Database ApplicationsCarl Gould, University of California Davis; et al.
2003Precise Dynamic Slicing AlgorithmsXiangyu Zhang, The University of Arizona; et al.
Modular Verification of Software Components in CSagar Chaki, Carnegie Mellon University; et al.
IJCAI (Artificial Intelligence)
2011Unweighted Coalitional Manipulation Under the Borda Rule is NP-HardNadja Betzler, Technische Universität Berlin; et al.
Nested Rollout Policy Adaptation for Monte Carlo Tree SearchChristopher D. Rosin, Parity Computing
On the Decidability of Connectedness Constraints in 2D and 3D Euclidean SpacesRoman Kontchakov, Birkbeck College London; et al.
2009Consequence-Driven Reasoning for Horn SHIQ OntologiesYevgeny Kazakov, University of Oxford
Learning Conditional Preference Networks with QueriesFrederic Koriche, Université Montpellier II
Bruno Zanuttini, Université de Caen Basse-Normandie
2007Automated Heart Wall Motion Abnormality Detection From Ultrasound Images using Bayesian NetworksMaleeha Qazi, Siemens Medical Solutions; et al.
Building Structure into Local Search for SATDuc Nghia Pham, Griffith University; et al.
Performance Analysis of Online Anticipatory Algorithms for Large Multistage Stochastic Integer Progr...Luc Mercier & Pascal Van Hentenryck, Brown University
2005Learning Coordination ClassifiersYuhong Guo, University of Alberta; et al.
Solving CheckersJonathan Schaeffer, University of Alberta; et al.
A Probabilistic Model of Redundancy in Information ExtractionDoug Downey, University of Washington; et al.
2003Approximating Game-Theoretic Optimal Strategies for Full-scale PokerDarse Billings, University of Alberta; et al.
Thin Junction Tree Filters for Simultaneous Localization and MappingMark A. Paskin, University of California Berkeley
2001Complexity Results for Structure-Based CausalityThomas Eiter & Thomas Lukasiewicz, Vienna University of Technology
1999Learning in Natural LanguageDan Roth, University of Illinois at Urbana-Champaign
A Distributed Case-Based Reasoning Application for Engineering Sales SupportIan Watson, University of Salford
Dan Gardingen, Western Air Ltd.
1997Object Identification in a Bayesian ContextTimothy Huang & Stuart Russell, University of California Berkeley
Translingual Information Retrieval: A Comparative EvaluationJaime G. Carbonell, Carnegie Mellon University; et al.
Applications of the Situation Calculus to Formalizing Control and Strategic Information: The Prolog ...Fangzhen Lin, The Hongkong University of Science and Technology
KDD (Data Mining)
2011Leakage in Data Mining: Formulation, Detection, and AvoidanceShachar Kaufman, Tel-Aviv University; et al.
2010Large linear classification when data cannot fit in memoryHsiang-Fu Yu, National Taiwan University; et al.
Connecting the dots between news articlesDafna Shahaf & Carlos Guestrin, Carnegie Mellon University
2009Collaborative Filtering with Temporal DynamicsYehuda Koren, Yahoo! Research
2008Fastanova: an efficient algorithm for genome-wide association studyXiang Zhang, University of North Carolina at Chapel Hill; et al.
2007Predictive discrete latent factor models for large scale dyadic dataDeepak Agarwal & Srujana Merugu, Yahoo! Research
2006Training linear SVMs in linear timeThorsten Joachims, Cornell University
2005Graphs over time: densification laws, shrinking diameters and possible explanationsJure Leskovec, Carnegie Mellon University; et al.
2004A probabilistic framework for semi-supervised clusteringSugato Basu, University of Texas at Austin; et al.
2003Maximizing the spread of influence through a social networkDavid Kempe, Cornell University; et al.
2002Pattern discovery in sequences under a Markov assumptionDarya Chudova & Padhraic Smyth, University of California Irvine
2001Robust space transformations for distance-based operationsEdwin M. Knorr, University of British Columbia; et al.
2000Hancock: a language for extracting signatures from data streamsCorinna Cortes, AT&T Laboratories; et al.
1999MetaCost: a general method for making classifiers cost-sensitivePedro Domingos, Universidade Técnica de Lisboa
1998Occam's Two Razors: The Sharp and the BluntPedro Domingos, Universidade Técnica de Lisboa
1997Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Dist...Foster Provost & Tom Fawcett, NYNEX Science and Technology
OSDI (Operating Systems)
2010Efficient System-Enforced Deterministic ParallelismAmittai Aviram, Yale University; et al.
The Turtles Project: Design and Implementation of Nested VirtualizationMuli Ben-Yehuda, IBM Research; et al.
2008KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems ProgramsCristian Cadar, Stanford University; et al.
Difference Engine: Harnessing Memory Redundancy in Virtual MachinesDiwaker Gupta, University of California San Diego; et al.
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Langu...Yuan Yu, Microsoft Research; et al.
2006Bigtable: A Distributed Storage System for Structured DataFay Chang, Google; et al.
Rethink the SyncEdmund B. Nightingale, University of Michigan; et al.
2004Using Model Checking to Find Serious File System ErrorsJunfeng Yang, Stanford University; et al.
Recovering Device DriversMichael M. Swift, University of Washington; et al.
2002Memory Resource Management in VMware ESX ServerCarl A. Waldspurger, VMware
2000Checking System Rules Using System-Specific, Programmer-Written Compiler ExtensionsDawson Engler, Stanford University; et al.
1999IO-Lite: A Unified I/O Buffering and Caching SystemVivek S. Pai, Rice University; et al.
1996Automatic Compiler-Inserted I/O Prefetching for Out-of-Core ApplicationsTodd C. Mowry, University of Toronto; et al.
PODS (Databases)
2011Data Exchange Beyond Complete DataMarcelo Arenas, Pontificia Universidad Católica de Chile; et al.
2010An Optimal Algorithm for the Distinct Elements ProblemDaniel M. Kane, Harvard University; et al.
2009Size and Treewidth Bounds for Conjunctive QueriesGeorg Gottlob, University of Oxford; et al.
2008Estimating PageRank on Graph StreamsAtish Das Sarma, Georgia Institute of Technology; et al.
2007Generalized Hypertree Decompositions: NP-Hardness and Tractable VariantsGeorg Gottlob, University of Oxford; et al.
2006Two-variable logic on data trees and XML reasoningMikolaj Bojanczyk, Warsaw University; et al.
2005On the complexity of division and set joins in the relational algebraDirk Leinders & Jan Van den Bussche, Limburgs Universitair Centrum
XML data exchange: consistency and query answeringMarcelo Arenas & Leonid Libkin, University of Toronto
2004Conditional XPath, the first order complete XPath dialectMaarten Marx, University of Amsterdam
2003An Information-Theoretic Approach to Normal Forms for Relational and XML DataMarcelo Arenas & Leonid Libkin, University of Toronto
2002Monadic Datalog and the Expressive Power of Languages for Web Information ExtractionGeorg Gottlob & Christoph Koch, Technische Universität Wien
2001Optimal aggregation algorithms for middlewareRonald Fagin, IBM Research; et al.
2000Auditing Boolean attributesJon Kleinberg, Cornell University; et al.
1999Exact and approximate aggregation in constraint query languagesMichael Benefikt & Leonid Libkin, Bell Labs
1998A lower bound theorem for indexing schemes and its application to multidimensional range queriesVasilis Samoladas & Daniel P. Miranker, University of Texas at Austin
Expressiveness of structured document query languages based on attribute grammarsFrank Neven & Jan Van den Bussche, Limburgs Universitair Centrum
1997On the Complexity of Database QueriesChristos H. Papadimitriou, University of California Berkeley
Mihalis Yannakakis, Bell Labs
SIGIR (Information Retrieval)
2011Find It If You Can: A Game for Modeling Different Types of Web Search Success Using Interaction DataMikhail Ageev, Moscow State University; et al.
2010Assessing the Scenic Route: Measuring the Value of Search Trails in Web LogsRyen W. White, Microsoft Research
Jeff Huang, University of Washington
2009Sources of evidence for vertical selectionJaime Arguello, Carnegie Mellon University; et al.
2008Algorithmic Mediation for Collaborative Exploratory SearchJeremy Pickens, FX Palo Alto Lab; et al.
2007Studying the Use of Popular Destinations to Enhance Web Search InteractionRyen W. White, Microsoft Research; et al.
2006Minimal Test Collections for Retrieval EvaluationBen Carterette, University of Massachusetts Amherst; et al.
2005Learning to estimate query difficulty: including applications to missing content detection and distr...Elad Yom-Tov, IBM Research; et al.
2004A Formal Study of Information Retrieval HeuristicsHui Fang, University of Illinois at Urbana-Champaign; et al.
2003Re-examining the potential effectiveness of interactive query expansionIan Ruthven, University of Strathclyde
2002Novelty and redundancy detection in adaptive filteringYi Zhang, Carnegie Mellon University; et al.
2001Temporal summaries of new topicsJames Allan, University of Massachusetts Amherst; et al.
2000IR evaluation methods for retrieving highly relevant documentsKalervo Järvelin & Jaana Kekäläinen, University of Tampere
1999Cross-language information retrieval based on parallel texts and automatic mining of parallel texts ...Jian-Yun Nie, Université de Montréal; et al.
1998A theory of term weighting based on exploratory data analysisWarren R. Greiff, University of Massachusetts Amherst
1997Feature selection, perceptron learning, and a usability case study for text categorizationHwee Tou Ng, DSO National Laboratories; et al.
1996Retrieving spoken documents by combining multiple index sourcesGareth Jones, University of Cambridge; et al.
SIGMOD (Databases)
2011Entangled Queries: Enabling Declarative Data-Driven CoordinationNitin Gupta, Cornell University; et al.
2010FAST: fast architecture sensitive tree search on modern CPUs and GPUsChangkyu Kim, Intel; et al.
2009Generating example data for dataflow programsChristopher Olston, Yahoo! Research; et al.
2008Serializable isolation for snapshot databasesMichael J. Cahill, University of Sydney; et al.
2007Compiling mappings to bridge applications and databasesSergey Melnik, Microsoft Research; et al.
2006To search or to crawl?: towards a query optimizer for text-centric tasksPanagiotis G. Ipeirotis, New York University; et al.
2004Indexing spatio-temporal trajectories with Chebyshev polynomialsYuhan Cai & Raymond T. Ng, University of British Columbia
2003Spreadsheets in RDBMS for OLAPAndrew Witkowski, Oracle; et al.
2001Locally adaptive dimensionality reduction for indexing large time series databasesEamonn Keogh, University of California Irvine; et al.
2000XMill: an efficient compressor for XML dataHartmut Liefke, University of Pennsylvania
Dan Suciu, AT&T Laboratories
1999DynaMat: a dynamic view management system for data warehousesYannis Kotidis & Nick Roussopoulos, University of Maryland
1998Efficient transparent application recovery in client-server information systemsDavid Lomet & Gerhard Weikum, Microsoft Research
1997Fast parallel similarity search in multimedia databasesStefan Berchtold, University of Munich; et al.
1996Implementing data cubes efficientlyVenky Harinarayan, Stanford University; et al.
SOSP (Operating Systems)
2011A File is Not a File: Understanding the I/O Behavior of Apple Desktop ApplicationsTyler Harter, University of Wisconsin; et al.
Cells: A Virtual Mobile Smartphone ArchitectureJeremy Andrus, Columbia University; et al.
2009FAWN: A Fast Array of Wimpy NodesDavid G. Andersen, Carnegie Mellon University; et al.
seL4: Formal Verification of an OS KernelGerwin Klein, NICTA; et al.
RouteBricks: Exploiting Parallelism to Scale Software RoutersMihai Dobrescu, École Polytechnique Fédérale de Lausanne; et al.
2007Zyzzyva: speculative byzantine fault toleranceRamakrishna Kotla, University of Texas at Austin; et al.
Sinfonia: a new paradigm for building scalable distributed systemsMarcos K. Aguilera, Hewlett-Packard Labs; et al.
Secure Web Applications via Automatic PartitioningStephen Chong, Cornell University; et al.
2005Rx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, University of Illinois at Urbana-Champaign; et al.
2003Backtracking intrusionsSamuel T. King & Peter M. Chen, University of Michigan
Preserving peer replicas by rate-limited sampled votingPetros Maniatis, Stanford University; et al.
Improving the Reliability of Commodity Operating SystemsMichael M. Swift, University of Washington; et al.
2001BASE: using abstraction to improve fault toleranceRodrigo Rodrigues, Massachusetts Institute of Technology; et al.
Untrusted hosts and confidentiality: secure program partitioningSteve Zdancewic, Cornell University; et al.
1999Cellular Disco: resource management using virtual clusters on shared-memory multiprocessorsKinshuk Govil, Stanford University; et al.
Soft timers: efficient microsecond software timer support for network processingMohit Aron & Peter Druschel, Rice University
The Click modular routerRobert Morris, Massachusetts Institute of Technology; et al.
Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail serv...Yasushi Saito, University of Washington; et al.
1997Continuous profiling: where have all the cycles gone?Jennifer M. Anderson, Digital Equipment Corporation; et al.
Disco: running commodity operating systems on scalable multiprocessorsEdouard Bugnion, Stanford University; et al.
Eraser: a dynamic data race detector for multithreaded programsStefan Savage, University of Washington; et al.
STOC (Theory)
2011Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphsPaul Christiano, Massachusetts Institute of Technology; et al.
Subexponential lower bounds for randomized pivoting rules for the simplex algorithmOliver Friedmann, University of Munich; et al.
2010An improved LP-based approximation for steiner treeJaroslaw Byrka, École Polytechnique Fédérale de Lausanne; et al.
QIP = PSPACERahul Jain, National University of Singapore; et al.
2009A constructive proof of the Lovász local lemmaRobin A. Moser, ETH Zurich
Public-Key Cryptosystems from the Worst-Case Shortest Vector ProblemChris Peikert, SRI International
2008Optimal algorithms and inapproximability results for every CSP?Prasad Raghavendra, University of Washington
Optimal hierarchical decompositions for congestion minimization in networksHarald Räcke, University of Warwick
2007Faster integer multiplicationMartin Fürer, Pennsylvania State University
Towards 3-query locally decodable codes of subexponential lengthSergey Yekhanin, Massachusetts Institute of Technology
2006The PCP theorem by gap amplificationIrit Dinur, Hebrew University
2005Undirected ST-connectivity in log-spaceOmer Reingold, Weizmann Institute of Science
2004Multi-linear formulas for permanent and determinant are of super-polynomial sizeRan Raz, Weizmann Institute of Science
Expander flows, geometric embeddings and graph partitioningSanjeev Arora, Princeton University; et al.
2003Derandomizing polynomial identity tests means proving circuit lower boundsValentine Kabanets & Russell Impagliazzo, University of California San Diego
New lattice-based cryptographic constructionsOded Regev, Tel-Aviv University
UIST (User Interface)
2011SideBySide: Ad-hoc Multi-user Interaction with Handheld ProjectorsKarl D.D. Willis, Carnegie Mellon University; et al.
2010VizWiz: nearly real-time answers to visual questionsJeffrey P. Bigham, University of Rochester; et al.
2009Mouse 2.0: Multi-touch meets the MouseNicolas Villar, Microsoft Research; et al.
2008Bringing Physics to the SurfaceAndrew D. Wilson, Microsoft Research; et al.
2007ThinSight: Versatile Multi-touch Sensing for Thin Form-factor DisplaysSteve Hodges, Microsoft Research; et al.
2006Reflective Physical Prototyping through Integrated Design, Test, and AnalysisBjörn Hartmann, Stanford University; et al.
2005Automation and Customization of Rendered Web PagesMichael Bolin, Massachusetts Institute of Technology; et al.
2004Multi-Finger Gestural Interaction with 3D Volumetric DisplaysTovi Grossman, University of Toronto; et al.
CrossY: A Crossing-Based Drawing ApplicationGeorg Apitz & François Guimbretière, University of Maryland
2003Perceptually-Supported Image Editing of Text and GraphicsEric Saund, Palo Alto Research Center; et al.
2002Clothing ManipulationTakeo Igarashi, University of Tokyo
John F. Hughes, Brown University
2001Phidgets: Easy Development of Physical Interfaces through Physical WidgetsSaul Greenberg & Chester Fitchett, University of Calgary
2000Sensing Techniques for Mobile InteractionKen Hinckley, Microsoft Research; et al.
1996Indigo: A Local Propagation Algorithm for Inequality ConstraintsAlan Borning, University of Washington; et al.
VLDB (Databases)
2011RemusDB: Transparent High-Availability for Database SystemsUmar Farooq Minhas, University of Waterloo; et al.
2010Towards Certain Fixes with Editing Rules and Master DataShuai Ma, University of Edinburgh; et al.
2009A Unified Approach to Ranking in Probabilistic DatabasesJian Li, University of Maryland; et al.
2008Finding Frequent Items in Data StreamsGraham Cormode & Marios Hadjieleftheriou, AT&T Laboratories
Constrained Physical Design TuningNicolas Bruno & Surajit Chaudhuri, Microsoft Research
2007Scalable Semantic Web Data Management Using Vertical PartitioningDaniel J. Abadi, Massachusetts Institute of Technology; et al.
2006Trustworthy Keyword Search for Regulatory-Compliant Records RetentionSoumyadeb Mitra, University of Illinois at Urbana-Champaign; et al.
2005Cache-conscious Frequent Pattern Mining on a Modern ProcessorAmol Ghoting, The Ohio State University; et al.
2004Model-Driven Data Acquisition in Sensor NetworksAmol Deshpande, University of California Berkeley; et al.
2001Weaving Relations for Cache PerformanceAnastassia Ailamaki, Carnegie Mellon University; et al.
1997Integrating Reliable Memory in DatabasesWee Teck Ng & Peter M. Chen, University of Michigan
WWW (World Wide Web)
2011Towards a theory model for product searchBeibei Li, New York University; et al.
2010Factorizing personalized Markov chains for next-basket recommendationSteffen Rendle, Osaka University; et al.
2009Hybrid keyword search auctionsAshish Goel, Stanford University
Kamesh Munagala, Duke University
2008IRLbot: Scaling to 6 billion pages and beyondHsin-Tsang Lee, Texas A&M University; et al.
2007Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganograph...Lars Backstrom, Cornell University; et al.
2006Random Sampling from a Search Engine's IndexZiv Bar-Yossef & Maxim Gurevich, Technion
2005Three-level caching for efficient query processing in large Web search enginesXiaohui Long & Torsten Suel, Polytechnic University
2004Automatic detection of fragments in dynamically generated web pagesLakshmish Ramaswamy, Georgia Institute of Technology; et al.
2003Scaling personalized web searchGlen Jeh & Jennifer Widom, Stanford University
SemTag and seeker: bootstrapping the semantic web via automated semantic annotationStephen Dill, IBM Research; et al.
2002Abstracting application-level web securityDavid Scott & Richard Sharp, University of Cambridge
2001Engineering Server Driven Consistency for Large Scale Dynamic Web ServicesJian Yin, University of Texas at Austin; et al.
2000Graph Structure in the WebAndrei Broder, AltaVista Company; et al.
1999Focused Crawling: A New Approach to Topic-Specific Web Resource DiscoverySoumen Chakrabarti, Indian Institute of Technology; et al.
1998The Interactive Multimedia Jukebox (IMJ): a new paradigm for the on-demand delivery of audio/videoKevin C. Almeroth, University of California Santa Barbara
Mostafa H. Ammar, Georgia Institute of Technology

This data was entered by hand (obtained by contacting past conference organizers, retrieving cached conference websites, and searching Resumes) so please email me if you notice any errors or omissions: bestpapers-AT-jeffhuang.com. I tried to collect best paper awards from the top-tier conferences in each area, but some conferences do not have such an award (e.g. SIGGRAPH, CAV). "Distinguished paper award" and "outstanding paper award" were also collected but "best student paper" (e.g. NIPS) or "best 10-year old paper" (e.g. POPL, PLDI) were not collected.


Institutions and Best Papers
Carnegie Mellon University18.5
Stanford University17.1
University of Washington16.3
Microsoft Research15.5
Massachusetts Institute of Technology13.2
Cornell University9.9
University of Toronto9.4
University of California Berkeley9.1
University of Illinois at Urbana-Champaign8.3
IBM Research7.9
University of British Columbia7.8
University of Texas at Austin7.1
Georgia Institute of Technology5.8
Yahoo! Research4.4
McGill University4.4
University of Maryland4.3
Weizmann Institute of Science4.2
AT&T Laboratories4.1
University of Oxford3.6
Brown University3.3
Google3.2
Technion3.1
University of Massachusetts Amherst3.1
University of Michigan3.0
University of Alberta3.0
University of California Irvine3.0
University of California San Diego3.0
Princeton University2.5
Rice University2.5
University of Wisconsin2.4
Duke University2.3
Bell Labs2.3
Columbia University2.3
Hewlett-Packard Labs2.2
Université Paris-Sud2.1
Saarland University2.1
National University of Singapore2.0
University of Cambridge2.0
Universidade Técnica de Lisboa2.0
Tel-Aviv University2.0
Indiana University at Bloomington2.0
DePaul University2.0
NASA Ames Research Center2.0
NEC Labs America2.0
ETH Zurich2.0

Credit is given in decreasing author order as customary in many fields. First authors are given 1 point, second authors are given 0.5 points, third authors are given 0.33 points, etc. These points are then divided by the sum of points for that paper, i.e. normalizing it. This ranking may be inaccurate or incomplete, may not reflect the current state of best paper awards, and is not an official list. If you are not satisfied with the ranking listed here, please disregard it.


Back to Jeff Huang's Homepage


Page last updated: 2011-12-18