2012-2018-CS顶会历届最佳论文大列表

2012-2018-CS顶会历届最佳论文大列表

本文收集了AAAI、ACL、CIKM、CVPR、FOCS、FSE、ICCV、ICML、IJCAI、INFOCOM、KDD等国际CS顶会,2012年至2018年所有最佳论文。

内容正离子网络,这里仅给出部分论文列表,完整列表查阅原网页:

https://jeffhuang.com/best_paper_awards.html#mobicom

这些数据大部分是手工输入的(通过联系过去的会议组织者、检索缓存的会议网站和搜索简历获得)。本列表试图从各个领域的顶级会议中收集最佳论文奖励,但是有些会议没有这样的奖励(例如SIGGRAPH、CAV )。“Distinguished paper award”和“Outstanding paper award”包括在内,但不包括“最佳学生论文”(如NIPS )或“最佳10年论文”(如POPL )。

按照许多领域的惯例,得分是按作者递减顺序给出的。第一作者得1分,第二作者得0.5分,第三作者得0.33分,等等。然后,这些得分除以该论文的得分之和,即归一化。这一排名可能不准确或不完整,可能不反映最佳论文奖的现状,也不是官方名单,仅供参考。

CIKM (Knowledge Management)

2018 Relevance estimation with multiple information sources on search engine result pages Junqi Zhang, Tsinghua University; et al.

2017 Hike: A Hybrid Human-Machine Method for Entity Alignment in Large-Scale Knowledge Bases Yan Zhuang, Tsinghua University; et al.

2016 Vandalism Detection in Wikidata Stefan Heindorf, Paderborn University; et al.

2015 Assessing the Impact of Syntactic and Semantic Structures for Answer Passages Reranking Kateryna Tymoshenko, University of Trento

UIST (User Interface)

2018 Porta: Profiling Software Tutorials Using Operating-System-Wide Activity Tracing Alok Mysore & Philip J. Guo, University of California San Diego

Authoring and Verifying Human-Robot Interactions David Porfirio, University of Wisconsin-Madison; et al.

RESi: A Highly Flexible, Pressure-Sensitive, Imperceptible Textile Interface Based on Resistive Ya... Patrick Parzer, University of Applied Sciences Upper Austria; et al.

2017 Triggering Artwork Swaps for Live Animation Nora S. Willett, Princeton University; et al.

Grabity: A Wearable Haptic Interface for Simulating Weight and Grasping in Virtual Reality Inrak Choi, Stanford University; et al.

AirCode: Unobtrusive Physical Tags for Digital Fabrication Dingzeyu Li, Columbia University; et al.

2016 Rovables: Miniature On-Body Robots as Mobile Wearables Artem Dementyev, Massachusetts Institute of Technology; et al.

proCover: Sensory Augmentation of Prosthetic Limbs Using Smart Textile Covers Joanne Leong, University of Applied Sciences Upper Austria; et al.

ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch Accelerometers Gierad Laput, Carnegie Mellon University; et al.

Zooids: Building Blocks for Swarm User Interfaces Mathieu Le Goc, INRIA; et al.

2015 Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye Movements Augusto Esteves, Lancaster University; et al.

Webstrates: Shareable Dynamic Media Clemens Klokmose, Aarhus University; et al.

Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electr... Simon Olberding, Max Planck Institut; et al.

2014 Sensing Techniques for Tablet+Stylus Interaction Ken Hinckley, Microsoft Research; et al.

PrintScreen: Fabricating Highly Customizable Thin-film Touch-Displays Simon Olberding, Max Planck Institut; et al.

Expert Crowdsourcing with Flash Teams Daniela Retelny, Stanford University; et al.

2013 PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing Interfaces Lining Yao, Massachusetts Institute of Technology; et al.

PODS (Databases)

2018 Entity Matching with Active Monotone Classification Yufei Tao, Chinese University of Hong Kong

2017 Dichotomies in Ontology-Mediated Querying with the Guarded Fragment André Hernich, University of Liverpool; et al.

2016 FAQ: Questions Asked Frequently Mahmoud Abo Khamis, University at Buffalo; et al.

2015 Parallel-Correctness and Transferability for Conjunctive Queries Tom J. Ameloot, Hasselt University; et al.

2014 Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Co... Tom J. Ameloot, Hasselt University; et al.

2013 Verification of database-driven systems via amalgamation Mikołaj Bojańczyk, University of Warsaw; et al.

SIGCOMM (Networking)

2018 Inferring Persistent Interdomain Congestion Saksham Agarwal, Cornell University; et al.

2017 Re-architecting datacenter networks and stacks for low latency and high performance Mark Handley, University College London; et al.

Language-directed hardware design for network performance monitoring Srinivas Narayana, Massachusetts Institute of Technology; et al.

2016 Eliminating Channel Feedback in Next-Generation Cellular Networks Deepak Vasisht, Massachusetts Institute of Technology; et al.

Inter-Technology Backscatter: Towards Internet Connectivity for Implanted Devices Vikram Iyer, University of Washington; et al.

Don't Mind the Gap: Bridging Network-wide Objectives and Device-level Configurations Ryan Beckett, Princeton University; et al.

2015 Central Control Over Distributed Routing Stefano Vissicchio, Université catholique de Louvain; et al.

2014 Balancing Accountability and Privacy in the Network David Naylor, Carnegie Mellon University; et al.

CONGA: Distributed Congestion-Aware Load Balancing for Datacenters Mohammad Alizadeh, Cisco Systems; et al.

2013 Ambient Backscatter: Wireless Communication Out of Thin Air Vincent Liu, University of Washington; et al.

ACL (Natural Language Processing)

2018 Finding syntax in human encephalography with beam search John Hale, Cornell University; et al.

2017 Probabilistic Typology: Deep Generative Models of Vowel Inventories Ryan Cotterell & Jason Eisner, Johns Hopkins University

2016 Finding Non-Arbitrary Form-Meaning Systematicity Using String-Metric Learning for Kernel Regression E. Darío Gutiérrez, University of California Berkeley; et al.

2015 Improving Evaluation of Machine Translation Quality Estimation Yvette Graham, Trinity College Dublin

Learning Dynamic Feature Selection for Fast Sequential Prediction Emma Strubell, University of Massachusetts Amherst; et al.

2014 Fast and Robust Neural Network Joint Models for Statistical Machine Translation Jacob Devlin, Raytheon BBN Technologies; et al.

2013 Grounded Language Learning from Video Described with Sentences Haonan Yu & Jeffrey Mark Siskind, Purdue University

INFOCOM (Networking)

2018 WiFED: WiFi Friendly Energy Delivery with Distributed Beamforming Subhramoy Mohanti, Northeastern University; et al.

Understanding Ethereum via Graph Analysis Ting Chen, University of Electronic Science and Technology of China; et al.

Optimizing Age of Information in Wireless Networks with Throughput Constraints Igor Kadota, Massachusetts Institute of Technology; et al.

2017 One Step at a Time: Optimizing SDN Upgrades in ISP Networks Konstantinos Poularakis, Yale University; et al.

2016 Heavy-Ball: A New Approach to Tame Delay and Convergence in Wireless Network Optimization Jia Liu, Ohio State University; et al.

2015 The Power of Slightly More than One Sample in Randomized Load Balancing Lei Ying, Arizona State University; et al.

2014 Joint Static and Dynamic Traffic Scheduling in Data Center Networks Zizhong Cao, Polytechnic Institute of New York University; et al.

Performance Evaluation and Asymptotics for Content Delivery Networks Virag Shah & Gustavo de Veciana, University of Texas at Austin

2013 On the Steady-State of Cache Networks Elisha J. Rosensweig, University of Massachusetts Amherst; et al.

IJCAI (Artificial Intelligence)

2018 Reasoning about Consensus when Opinions Diffuse through Majority Dynamics Vincenzo Auletta, University of Salerno; et al.

SentiGAN: Generating Sentimental Texts via Mixture Adversarial Networks Ke Wang & Xiaojun Wan, Peking University

From Conjunctive Queries to Instance Queries in Ontology-Mediated Querying Cristina Feier, University of Bremen; et al.

What game are we playing? End-to-end learning in normal and extensive form games Chun Kai Ling, Carnegie Mellon University; et al.

Commonsense Knowledge Aware Conversation Generation with Graph Attention Hao Zhou, Tsinghua University; et al.

R-SVM+: Robust Learning with Privileged Information Xue Li, Wuhan University; et al.

A Degeneracy Framework for Graph Similarity Giannis Nikolentzos, École Polytechnique; et al.

2017 Foundations of Declarative Data Analysis Using Limit Datalog Programs Mark Kaminski, University of Oxford; et al.

2016 Hierarchical Finite State Controllers for Generalized Planning Javier Segovia, Universitat Pompeu Fabra; et al.

2015 Bayesian Active Learning for Posterior Estimation Kirthevasan Kandasamy, Carnegie Mellon University; et al.

Recursive Decomposition for Nonconvex Optimization Abram L. Friesen & Pedro Domingos, University of Washington

2013 Bayesian Optimization in High Dimensions via Random Embeddings Ziyu Wang, University of British Columbia; et al.

Flexibility and Decoupling in the Simple Temporal Problem Michel Wilson, Delft University of Technology; et al.

2011 Unweighted Coalitional Manipulation Under the Borda Rule is NP-Hard Nadja Betzler, Technische Universität Berlin; et al.

ICCV (Computer Vision)

2017 Mask R-CNN Kaiming He, Facebook AI Research; et al.

2015 Deep Neural Decision Forests Peter Kontschieder, Microsoft Research; et al.

2013 From Large Scale Image Categorization to Entry-Level Categories Vicente Ordonez, University of North Carolina at Chapel Hill; et al.

2011 Relative Attributes Devi Parikh, Toyota Technological Institute at Chicago

AAAI (Artificial Intelligence)

2018 Memory-Augmented Monte Carlo Tree Search Chenjun Xiao, University of Alberta; et al.

2017 Label-Free Supervision of Neural Networks with Physics and Domain Knowledge Russell Stewart & Stefano Ermon, Stanford University

2016 Bidirectional Search That Is Guaranteed to Meet in the Middle Robert C. Holte, University of Alberta; et al.

2015 From Non-Negative to General Operator Cost Partitioning Florian Pommerening, University of Basel; et al.

2014 Recovering from Selection Bias in Causal and Statistical Inference Elias Bareinboim, University of California Los Angeles; et al.

2013 HC-Search: Learning Heuristics and Cost Functions for Structured Prediction Janardhan Rao Doppa, Oregon State University; et al.

SIGMOD (Databases)

2018 SuRF:Practical Range Query Filtering with Fast Succinct Tries Huanchen Zhang, Carnegie Mellon University; et al.

2017 Parallelizing Sequential Graph Computations Wenfei Fan, University of Edinburgh; et al.

2016 Wander Join: Online Aggregation via Random Walks Feifei Li, University of Utah; et al.

2015 DBSCAN Revisited: Mis-Claim, Un-Fixability, and Approximation Junhao Gan & Yufei Tao, Chinese University of Hong Kong

2014 Materialization Optimizations for Feature Selection Workloads Ce Zhang, Stanford University; et al.

2013 Massive Graph Triangulation Xiaocheng Hu, The Chinese University of Hong Kong; et al.

NSDI (Networking)

2018 NetChain: Scale-Free Sub-RTT Coordination Xin Jin, Johns Hopkins University; et al.

2017 mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes Muhammad Asim Jamshed, KAIST; et al.

2016 Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions Bryce Kellogg, University of Washington; et al.

2015 Queues Don't Matter When You Can JUMP Them! Matthew P. Grosvenor, University of Cambridge; et al.

Designing Distributed Systems Using Approximate Synchrony in Data Center Networks Dan R. K. Ports, University of Washington; et al.

The Design and Implementation of Open vSwitch Ben Pfaff, VMware; et al.

2014 Software Dataplane Verification Mihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne

2013 Embassies: Radically Refactoring the Web Jon Howell, Microsoft Research; et al.

MOBICOM (Mobile)

2018 SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks Mehrdad Moradi, University of Michigan; et al.

2017 WEBee: Physical-Layer Cross-Technology Communication via Emulation Zhijun Li & Tian He, University of Minnesota

2015 CAreDroid: Adaptation Framework for Android ContextAware Applications Salma Elmalaki, University of California Los Angeles; et al.

2014 Tagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS Devices Lei Yang, Tsinghua University; et al.

2013 Whole-Home Gesture Recognition Using Wireless Signals Qifan Pu, University of Washington; et al.

2012 Distinguishing Users with Capacitative Touch Communication Tam Vu, Rutgers University; et al.

ICML (Machine Learning)

2018 Delayed Impact of Fair Machine Learning Lydia T. Liu, University of California Berkeley; et al.

Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples Anish Athalye, Massachusetts Institute of Technology; et al.

2017 Understanding Black-box Predictions via Influence Functions Pang Wei Koh & Percy Liang, Stanford University

2016 Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs Sampling Christopher De Sa, Stanford University; et al.

Pixel Recurrent Neural Networks Aaron Van den Oord, Google; et al.

Dueling Network Architectures for Deep Reinforcement Learning Ziyu Wang, Google; et al.

2015 A Nearly-Linear Time Framework for Graph-Structured Sparsity Chinmay Hegde, Massachusetts Institute of Technology; et al.

Optimal and Adaptive Algorithms for Online Boosting Alina Beygelzimer, Yahoo! Research; et al.

2014 Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis Jian Tang, Peking University; et al.

2013 Vanishing Component Analysis Roi Livni, The Hebrew University of Jerusalum; et al.

S&P (Security and Privacy)

2018 DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice Vincent Cheval, Inria; et al.

On Enforcing the Digital Immunity of a Large Humanitarian Organization Stevens Le Blond, École Polytechnique Fédérale de Lausanne; et al.

2017 Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate Karthikeyan Bhargavan, INRIA; et al.

2016 A2: Analog Malicious Hardware Kaiyuan Yang, University of Michigan; et al.

2015 Riposte: An Anonymous Messaging System Handling Millions of Users Henry Corrigan-Gibbs, Stanford University; et al.

A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche, INRIA; et al.

2014 Secure Multiparty Computations on BitCoin Marcin Andrychowicz, University of Warsaw; et al.

Bootstrapping Privacy Compliance in Big Data Systems Shayak Sen, Carnegie Mellon University; et al.

2013 Pinocchio: Nearly Practical Verifiable Computation Bryan Parno, Microsoft Research; et al.

CHI (Human-Computer Interaction)

2018 Examining Wikipedia With a Broader Lens: Quantifying the Value of Wikipedia's Relationships with O... Nicholas Vincent, Northwestern University; et al.

Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants Tamy Guberek, University of Michigan; et al.

Addressing Age-Related Bias in Sentiment Analysis Mark Diaz, Northwestern University; et al.

Wall++: Room-Scale Interactive and Context-Aware Sensing Yang Zhang, Carnegie Mellon University; et al.

Design for Collaborative Survival: An Inquiry into Human-Fungi Relationships Jen Liu, University of Colorado Boulder; et al.

Expressive Time Series Querying with Hand-Drawn Scale-Free Sketches Miro Mannino & Azza Abouzied, New York University

Pinpointing: Precise Head- and Eye-Based Target Selection for Augmented Reality Mikko Kytö, Aalto University; et al.

Streets for People: Engaging Children in Placemaking Through a Socio-technical Process Sean Peacock, Newcastle University; et al.

Let's Talk About Race: Identity, Chatbots, and AI Ari Schlesinger, Georgia Institute of Technology; et al.

“A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology Diana Freed, Cornell Tech; et al.

HARK No More: On the Preregistration of CHI Experiments Andy Cockburn, University of Canterbury; et al.

Hoarding and Minimalism: Tendencies in Digital Data Preservation Francesco Vitale, University of British Columbia; et al.

Semi-Automated Coding for Qualitative Research: A User-Centered Inquiry and Initial Prototypes Megh Marathe & Kentaro Toyama, University of Michigan

Making as Expression: Informing Design with People with Complex Communication Needs through Art Th... Amanda Lazar, University of Maryland; et al.

How Relevant are Incidental Power Poses for HCI? Yvonne Jansen, Sorbonne Université

STOC (Theory)

2018 A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem Ola Svensson, École Polytechnique Fédérale de Lausanne; et al.

2017 Explicit, Almost Optimal, Epsilon-Balanced Codes Amnon Ta-Shma, Tel-Aviv University

A Weighted Linear Matroid Parity Algorithm Satoru Iwata, University of Tokyo

FSE (Software Engineering)

2018 Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks Shengjian (Daniel) Guo, Virginia Tech; et al.

An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems Yu Gao, Chinese Academy of Sciences; et al.

Data Race Detection on Compressed Traces Dileep Kini, University of Illinois at Urbana-Champaign; et al.

Oreo: Detection of Clones in the Twilight Zone Vaibhav Saini, University of California Irvine; et al.

The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the ... James C. Davis, Virginia Tech; et al.

Do Android Taint Analysis Tools Keep Their Promises? Felix Pauck, Paderborn University; et al.

2017 The Power of "Why" and "Why Not": Enriching Scenario Exploration with Provenance Tim Nelson, Brown University; et al.

Cooperative Kernels: GPU Multitasking for Blocking Algorithms Tyler Sorensen, Imperial College London; et al.

Understanding Misunderstandings in Source Code Dan Gopstein, New York University; et al.

Trade-Offs in Continuous Integration: Assurance, Security, and Flexibility Michael Hilton, Oregon State University; et al.

Discovering Relational Specifications Calvin Smith, University of Wisconsin-Madison; et al.

Automatically Diagnosing and Repairing Error Handling Bugs in C Yuchi Tian & Baishakhi Ray, University of Virginia

Fairness Testing: Testing Software for Discrimination Sainyam Galhotra, University of Massachusetts Amherst; et al.

2016 Foraging and Navigations Fundamentally: Developers' Predictions of Value and Cost David Piorkowski, Oregon State University; et al.

Multi-Representational Security Analysis Eunsuk Kang, University of California Berkeley; et al.

Factors Influencing Code Review Processes in Industry Tobias Baum, Leibniz Universität Hannover; et al.

API Code Recommendation Using Statistical Learning from Fine-grained Changes Anh Tuan Nguyen, Iowa State University; et al.

Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis Xiaofei Xie, Tianjin University; et al.

Why We Refactor? Confessions of GitHub Contributors Danilo Silva, Federal University of Minas Gerais; et al.

Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis Jianjun Huang, Purdue University; et al.

2015 Optimizing energy consumption of GUIs in Android apps: a multi-objective approach Mario Linares-Vásquez, College of William and Mary; et al.

How Practitioners Perceive the Relevance of Software Engineering Research David Lo, Singapore Management University; et al.

Effective Test Suites for Mixed Discrete-Continuous Stateflow Controllers Reza Matinnejad, University of Luxembourg; et al.

Modeling Readability to Improve Unit Tests Ermira Daka, University of Sheffield; et al.

Measure It? Manage It? Ignore It? Software Practitioners and Technical Debt Neil A. Ernst, Carnegie Mellon University; et al.

A User-Guided Approach to Program Analysis Ravi Mangal, Georgia Institute of Technology; et al.

MultiSE: Multi-path Symbolic Execution using Value Summaries Koushik Sen, University of California Berkeley; et al.

Users Beware: Preference Inconsistencies Ahead Farnaz Behrang, Georgia Institute of Technology; et al.

2014 Selection and Presentation Practices for Code Example Summarization Annie Ying & Martin Robillard, McGill University

Are Mutants a Valid Substitute for Real Faults in Software Testing? René Just, University of Washington; et al.

AI: A Lightweight System for Tolerating Concurrency Bugs Mingxing Zhang, Tsinghua University; et al.

Powering the Static Driver Verifier using Corral Akash Lal & Shaz Qadeer, Microsoft Research

Learning Natural Coding Conventions Miltiadis Allamanis, University of Edinburgh; et al.

Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case Study Klaus-Benedikt Schultis, Siemens Corporate Technology; et al.

2012 Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software Libraries Bradley Cossette & Robert Walker, University of Calgary

VLDB (Databases)

2017 Provenance for Natural Language Queries Daniel Deutch, Tel-Aviv University; et al.

2016 Compressed Linear Algebra for Large-Scale Machine Learning Ahmed Elgohary, University of Maryland; et al.

2015 Constructing an interactive natural language interface for relational databases Fei Li & H. V. Jagadish, University of Michigan

2014 M4: A Visualization-Oriented Time Series Data Aggregation Uwe Jugel, SAP; et al.

Building Efficient Query Engines in a High-Level Language Yannis Klonatos, École Polytechnique Fédérale de Lausanne; et al.

On k-Path Covers and their Applications Stefan Funke, University of Stuttgart; et al.

epiC: an Extensible and Scalable System for Processing Big Data Dawei Jiang, National University of Singapore; et al.

The Uncracked Pieces in Database Cracking Felix Martin Schuhknecht, Saarland University; et al.

2013 DisC Diversity: Result Diversification based on Dissimilarity and Coverage Marina Drosou & Evaggelia Pitoura, University of Ioannina

2012 Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification Albert Angel, University of Toronto; et al.

FOCS (Theory)

2018 Classical Verification of Quantum Computation Urmila Mahadev, University of California Berkeley

Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic Time Diptarka Chakraborty, Computer Science Institute of Charles University; et al.

Pseudorandom Sets in Grassmann Graph have Near-Perfect Expansion Subhash Khot, New York University; et al.

2017 A dichotomy theorem for nonuniform CSPs Andrei A. Bulatov, Simon Fraser University

The Matching Problem in General Graphs is in Quasi-NC Ola Svensson & Jakub Tarnawski, École polytechnique fédérale de Lausanne

The Proof of CSP Dichotomy Conjecture Dmitriy Zhuk, Lomonosov Moscow State University

2016 Settling the Complexity of Computing Approximate Two-Player Nash Equilibria Aviad Rubinstein, University of California Berkeley

Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning Ran Raz, Weizmann Institute of Science

2015 An average-case depth hierarchy theorem for Boolean circuits Benjamin Rossman, National Institute of Informatics; et al.

2014 Path Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations a... Yin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology

2013 Navigating Central Path with Electrical Flows: from Flows to Matchings, and Back Aleksander Mądry, École Polytechnique Fédérale de Lausanne


分享到:


相關文章: