Upload 4 files
Browse files- best_paper/fill_missing_abstracts.py +195 -0
- best_paper/negative_papers.json +2 -2
- best_paper/negative_summary.csv +212 -212
best_paper/fill_missing_abstracts.py
ADDED
|
@@ -0,0 +1,195 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"""
|
| 2 |
+
Fill missing abstracts in use_this_matches.json by querying OpenAlex (primary) and Crossref (fallback).
|
| 3 |
+
|
| 4 |
+
Usage:
|
| 5 |
+
python best_paper/fill_missing_abstracts.py \
|
| 6 |
+
--input best_paper/use_this_matches.json \
|
| 7 |
+
--output best_paper/use_this_matches_filled.json \
|
| 8 |
+
--limit 0 \
|
| 9 |
+
--sleep 0.5
|
| 10 |
+
|
| 11 |
+
Notes:
|
| 12 |
+
- Requires network access.
|
| 13 |
+
- We only overwrite `scraped_abstract` for entries with no abstract/abstract_raw/scraped_abstract.
|
| 14 |
+
"""
|
| 15 |
+
|
| 16 |
+
import argparse
|
| 17 |
+
import html
|
| 18 |
+
import json
|
| 19 |
+
import re
|
| 20 |
+
import time
|
| 21 |
+
from pathlib import Path
|
| 22 |
+
from typing import Dict, List, Optional
|
| 23 |
+
from urllib.parse import quote_plus
|
| 24 |
+
|
| 25 |
+
import requests
|
| 26 |
+
|
| 27 |
+
|
| 28 |
+
def normalize_title(text: str) -> str:
|
| 29 |
+
text = text.lower()
|
| 30 |
+
text = re.sub(r"[^a-z0-9]+", " ", text)
|
| 31 |
+
return " ".join(text.split())
|
| 32 |
+
|
| 33 |
+
|
| 34 |
+
def decode_openalex_inverted_index(idx: Dict[str, List[int]]) -> str:
|
| 35 |
+
# Reconstruct abstract from OpenAlex inverted index.
|
| 36 |
+
positions: Dict[int, str] = {}
|
| 37 |
+
for word, locs in idx.items():
|
| 38 |
+
for pos in locs:
|
| 39 |
+
positions[pos] = word
|
| 40 |
+
return " ".join(positions[i] for i in sorted(positions))
|
| 41 |
+
|
| 42 |
+
|
| 43 |
+
def fetch_openalex(title: str, email: Optional[str] = None) -> Optional[str]:
|
| 44 |
+
url = "https://api.openalex.org/works"
|
| 45 |
+
params = {"search": title, "per-page": 3}
|
| 46 |
+
if email:
|
| 47 |
+
params["mailto"] = email
|
| 48 |
+
resp = requests.get(url, params=params, timeout=15)
|
| 49 |
+
resp.raise_for_status()
|
| 50 |
+
data = resp.json()
|
| 51 |
+
for item in data.get("results", []):
|
| 52 |
+
candidate_title = item.get("title") or ""
|
| 53 |
+
if not candidate_title:
|
| 54 |
+
continue
|
| 55 |
+
if normalize_title(candidate_title) != normalize_title(title):
|
| 56 |
+
continue
|
| 57 |
+
idx = item.get("abstract_inverted_index")
|
| 58 |
+
if idx:
|
| 59 |
+
return decode_openalex_inverted_index(idx)
|
| 60 |
+
abstract = item.get("abstract")
|
| 61 |
+
if abstract:
|
| 62 |
+
return abstract
|
| 63 |
+
return None
|
| 64 |
+
|
| 65 |
+
|
| 66 |
+
def fetch_semantic_scholar(title: str) -> Optional[str]:
|
| 67 |
+
# Semantic Scholar Graph API search by title.
|
| 68 |
+
url = "https://api.semanticscholar.org/graph/v1/paper/search"
|
| 69 |
+
params = {
|
| 70 |
+
"query": title,
|
| 71 |
+
"limit": 5,
|
| 72 |
+
"fields": "title,abstract",
|
| 73 |
+
}
|
| 74 |
+
resp = requests.get(url, params=params, timeout=15, headers={"User-Agent": "abstract-filler"})
|
| 75 |
+
resp.raise_for_status()
|
| 76 |
+
data = resp.json()
|
| 77 |
+
for item in data.get("data", []):
|
| 78 |
+
candidate_title = item.get("title") or ""
|
| 79 |
+
if not candidate_title:
|
| 80 |
+
continue
|
| 81 |
+
if normalize_title(candidate_title) != normalize_title(title):
|
| 82 |
+
continue
|
| 83 |
+
abstract = item.get("abstract")
|
| 84 |
+
if abstract:
|
| 85 |
+
return abstract
|
| 86 |
+
return None
|
| 87 |
+
|
| 88 |
+
|
| 89 |
+
def strip_html(text: str) -> str:
|
| 90 |
+
text = re.sub(r"<[^>]+>", " ", text)
|
| 91 |
+
text = html.unescape(text)
|
| 92 |
+
return " ".join(text.split())
|
| 93 |
+
|
| 94 |
+
|
| 95 |
+
def fetch_crossref(title: str) -> Optional[str]:
|
| 96 |
+
url = "https://api.crossref.org/works"
|
| 97 |
+
params = {
|
| 98 |
+
"query.bibliographic": title,
|
| 99 |
+
"rows": 3,
|
| 100 |
+
"select": "title,abstract",
|
| 101 |
+
"sort": "score",
|
| 102 |
+
"order": "desc",
|
| 103 |
+
}
|
| 104 |
+
resp = requests.get(url, params=params, timeout=15, headers={"User-Agent": "abstract-filler"})
|
| 105 |
+
resp.raise_for_status()
|
| 106 |
+
data = resp.json()
|
| 107 |
+
for item in data.get("message", {}).get("items", []):
|
| 108 |
+
titles = item.get("title") or []
|
| 109 |
+
if not titles:
|
| 110 |
+
continue
|
| 111 |
+
candidate_title = titles[0]
|
| 112 |
+
if normalize_title(candidate_title) != normalize_title(title):
|
| 113 |
+
continue
|
| 114 |
+
abstract = item.get("abstract")
|
| 115 |
+
if abstract:
|
| 116 |
+
return strip_html(abstract)
|
| 117 |
+
return None
|
| 118 |
+
|
| 119 |
+
|
| 120 |
+
def has_abstract(entry: Dict) -> bool:
|
| 121 |
+
abs_val = entry.get("abstract_raw") or entry.get("abstract") or entry.get("scraped_abstract")
|
| 122 |
+
return bool(abs_val and str(abs_val).strip())
|
| 123 |
+
|
| 124 |
+
|
| 125 |
+
def try_fill(entry: Dict, email: Optional[str]) -> Optional[str]:
|
| 126 |
+
title = entry.get("title") or entry.get("title_raw") or ""
|
| 127 |
+
if not title:
|
| 128 |
+
return None
|
| 129 |
+
# Try OpenAlex first, then Crossref, then Semantic Scholar.
|
| 130 |
+
try:
|
| 131 |
+
abstract = fetch_openalex(title, email=email)
|
| 132 |
+
if abstract:
|
| 133 |
+
return abstract
|
| 134 |
+
except Exception:
|
| 135 |
+
pass
|
| 136 |
+
try:
|
| 137 |
+
abstract = fetch_crossref(title)
|
| 138 |
+
if abstract:
|
| 139 |
+
return abstract
|
| 140 |
+
except Exception:
|
| 141 |
+
pass
|
| 142 |
+
try:
|
| 143 |
+
abstract = fetch_semantic_scholar(title)
|
| 144 |
+
if abstract:
|
| 145 |
+
return abstract
|
| 146 |
+
except Exception:
|
| 147 |
+
pass
|
| 148 |
+
return None
|
| 149 |
+
|
| 150 |
+
|
| 151 |
+
def main() -> None:
|
| 152 |
+
parser = argparse.ArgumentParser(description="Fill missing abstracts by querying OpenAlex/Crossref.")
|
| 153 |
+
parser.add_argument(
|
| 154 |
+
"--input",
|
| 155 |
+
default="use_this_matches_filled.json",
|
| 156 |
+
help="Input JSON path (defaults to the already-filled file).",
|
| 157 |
+
)
|
| 158 |
+
parser.add_argument(
|
| 159 |
+
"--output",
|
| 160 |
+
default="use_this_matches_filled.json",
|
| 161 |
+
help="Output JSON path (in-place update of the filled file).",
|
| 162 |
+
)
|
| 163 |
+
parser.add_argument("--limit", type=int, default=0, help="Max fills to attempt (0 = no limit).")
|
| 164 |
+
parser.add_argument("--sleep", type=float, default=0.5, help="Seconds to sleep between network calls.")
|
| 165 |
+
parser.add_argument("--mailto", type=str, default=None, help="Optional email for OpenAlex polite use.")
|
| 166 |
+
args = parser.parse_args()
|
| 167 |
+
|
| 168 |
+
data = json.load(open(args.input))
|
| 169 |
+
missing_idx = [i for i, item in enumerate(data) if not has_abstract(item)]
|
| 170 |
+
print(f"Total entries: {len(data)} | Missing abstracts: {len(missing_idx)}")
|
| 171 |
+
|
| 172 |
+
filled = 0
|
| 173 |
+
for count, idx in enumerate(missing_idx, start=1):
|
| 174 |
+
if args.limit and filled >= args.limit:
|
| 175 |
+
break
|
| 176 |
+
entry = data[idx]
|
| 177 |
+
title = entry.get("title") or entry.get("title_raw") or f"(paper {entry.get('paper')})"
|
| 178 |
+
print(f"[{count}/{len(missing_idx)}] Fetching abstract for: {title}")
|
| 179 |
+
abstract = try_fill(entry, email=args.mailto)
|
| 180 |
+
if abstract:
|
| 181 |
+
data[idx]["scraped_abstract"] = abstract
|
| 182 |
+
filled += 1
|
| 183 |
+
print(f" -> filled (len={len(abstract)})")
|
| 184 |
+
else:
|
| 185 |
+
print(" -> not found")
|
| 186 |
+
time.sleep(args.sleep)
|
| 187 |
+
|
| 188 |
+
Path(args.output).parent.mkdir(parents=True, exist_ok=True)
|
| 189 |
+
with open(args.output, "w") as f:
|
| 190 |
+
json.dump(data, f, indent=2)
|
| 191 |
+
print(f"Done. Filled {filled} abstracts. Saved to {args.output}")
|
| 192 |
+
|
| 193 |
+
|
| 194 |
+
if __name__ == "__main__":
|
| 195 |
+
main()
|
best_paper/negative_papers.json
CHANGED
|
@@ -1,3 +1,3 @@
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:
|
| 3 |
-
size
|
|
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:2b028e88ef96c6bcaa5ea8c7ef6f0075e2e712b6c49b03eed15f5d991e38546c
|
| 3 |
+
size 24047835
|
best_paper/negative_summary.csv
CHANGED
|
@@ -1,15 +1,15 @@
|
|
| 1 |
paper_id,title,citation_best,negative_count,negative_min,negative_max
|
| 2 |
3122089757,scaling attributed network embedding to massive graphs,36,10,36,36
|
| 3 |
-
2996908057,winogrande an adversarial winograd schema challenge at scale,396,10,
|
| 4 |
3035507081,beyond accuracy behavioral testing of nlp models with checklist,8,10,8,8
|
| 5 |
3009121097,a design engineering approach for quantitatively exploring context aware sentence retrieval for nonspeaking individuals with motor disabilities,27,10,27,27
|
| 6 |
-
3030254708,articulating experience reflections from experts applying micro phenomenology to design research in hci,0,10,
|
| 7 |
3017640030,beyond the prototype understanding the challenge of scaling hardware device production,22,10,22,22
|
| 8 |
3032514484,bug or feature covert impairments to human computer interaction,6,10,6,6
|
| 9 |
3014972121,co designing checklists to understand organizational challenges and opportunities around fairness in ai,301,10,292,309
|
| 10 |
3013330822,color and animation preferences for a light band ehmi in interactions between automated vehicles and pedestrians,113,10,112,114
|
| 11 |
3029211878,connecting distributed families camera work for three party mobile video calls,33,10,33,33
|
| 12 |
-
3030161855,creating augmented and virtual reality applications current practices challenges and opportunities,185,10,182,
|
| 13 |
3030528496,design study lite methodology expediting design studies and enabling the synergy of visualization pedagogy and social good,26,10,26,26
|
| 14 |
3029149150,designing ambient narrative based interfaces to reflect and motivate physical activity,48,10,48,48
|
| 15 |
3030460604,exploring how game genre in student designed games influences computational thinking development,25,10,25,25
|
|
@@ -34,19 +34,19 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 34 |
3034925446,tuning free plug and play proximal algorithm for inverse imaging problems,2,10,2,2
|
| 35 |
3002398329,white box fairness testing through adversarial sampling,104,10,103,105
|
| 36 |
3005780259,an empirical study on program failures of deep learning jobs,77,10,77,78
|
| 37 |
-
3090625562,towards the use of the readily available tests from the release pipeline as performance tests are we there yet,0,10,0,
|
| 38 |
3091518781,time travel testing of android apps,83,10,83,83
|
| 39 |
-
3045552507,here we go again why is it difficult for developers to learn another programming language,0,10,
|
| 40 |
3105398568,big code big vocabulary open vocabulary models for source code,87,10,86,88
|
| 41 |
3103843169,unblind your apps predicting natural language labels for mobile gui components by deep learning,47,10,47,47
|
| 42 |
3100403944,translating video recordings of mobile app usages into replayable scenarios,53,10,53,53
|
| 43 |
3034497099,synthesizing aspect driven recommendation explanations from reviews,12,10,12,12
|
| 44 |
3081170586,on sampled metrics for item recommendation,330,10,328,332
|
| 45 |
-
3021455140,hummingbird energy efficient gps receiver for small satellites,0,10,0,
|
| 46 |
-
3023792721,m cube a millimeter wave massive mimo software radio,0,10,0,
|
| 47 |
3098350529,no regret learning dynamics for extensive form correlated equilibrium,11,10,11,11
|
| 48 |
-
3098903812,language models are few shot learners,12370,10,
|
| 49 |
-
3013640143,understanding detecting and localizing partial failures in large system software,17,10,16,
|
| 50 |
3108362055,hxdp efficient software packet processing on fpga nics,12,10,11,13
|
| 51 |
3093054587,byzantine ordered consensus without byzantine oligarchy,14,10,13,15
|
| 52 |
3095716351,virtual consensus in delos,7,10,6,8
|
|
@@ -61,23 +61,23 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 61 |
3105035347,controlling fairness and bias in dynamic learning to rank,60,10,59,61
|
| 62 |
2995994861,rateless codes for near perfect load balancing in distributed matrix vector multiplication,15,10,15,15
|
| 63 |
3030167386,shapesearch a flexible and efficient system for shape based exploration of trendlines,1,10,1,1
|
| 64 |
-
3028661980,pump up the volume processing large data on gpus with fast interconnects,0,10,
|
| 65 |
3093717762,handmorph a passive exoskeleton that miniaturizes grasp,29,10,28,30
|
| 66 |
3008139924,opportunities for optimism in contended main memory multicore transactions,33,10,33,33
|
| 67 |
3023027202,open intent extraction from natural language interactions,30,10,30,30
|
| 68 |
2963763772,how to combine tree search methods in reinforcement learning,13,10,13,13
|
| 69 |
2964345285,bridging the gap between training and inference for neural machine translation,20,10,20,20
|
| 70 |
-
2940636472,anchored audio sampling a seamless method for exploring children s thoughts during deployment studies,0,10,
|
| 71 |
2935781565,unremarkable ai fitting intelligent decision support into critical clinical decision making processes,72,10,72,73
|
| 72 |
2927052147,increasing the transparency of research papers with explorable multiverse analyses,112,10,111,113
|
| 73 |
-
2941798514,project sidewalk a web based crowdsourcing tool for collecting sidewalk accessibility data at scale,0,10,
|
| 74 |
2940996955,touchstone2 an interactive environment for exploring trade offs in hci experiment design,5,10,5,5
|
| 75 |
2941255702,a translational science model for hci,57,10,57,57
|
| 76 |
-
2942399136,street level algorithms a theory at the gaps between policy and decisions,0,10,
|
| 77 |
-
2942185243,retype quick text editing with keyboard and gaze,0,10,0,
|
| 78 |
-
2941419932,picme interactive visual guidance for taking requested photo composition,0,10,1,
|
| 79 |
2941232686,managing messes in computational notebooks,134,10,133,135
|
| 80 |
-
2941123418,think secure from the beginning a survey with software developers,0,10,1,
|
| 81 |
2964608097,a theory of fermat paths for non line of sight shape reconstruction,121,10,121,121
|
| 82 |
2967591898,empirical review of java program repair tools a large scale experiment on 2 141 bugs and 23 551 repair attempts,3,10,3,3
|
| 83 |
2966914448,generating automated and online test oracles for simulink models with continuous and uncertain behaviors,44,10,43,45
|
|
@@ -99,22 +99,22 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 99 |
2954691065,view centric performance optimization for database backed web applications,18,10,18,18
|
| 100 |
2965266021,boosting for comparison based learning,4,10,4,4
|
| 101 |
2949380784,optimizing impression counts for outdoor advertising,33,10,33,33
|
| 102 |
-
2979514732,ebp a wearable system for frequent and comfortable blood pressure monitoring from user s ear,0,10,0,
|
| 103 |
2979925109,fluid flexible user interface distribution for ubiquitous multi device interaction,4,10,4,4
|
| 104 |
-
2806709843,datacenter rpcs can be general and fast,40,10,39,
|
| 105 |
-
2918488807,understanding lifecycle management complexity of datacenter topologies,15,10,
|
| 106 |
2963212338,low latency graph streaming using compressed purely functional trees,1,10,1,1
|
| 107 |
2954738632,continuously reasoning about programs using differential bayesian inference,20,10,20,20
|
| 108 |
2954518791,towards certified separate compilation for concurrent programs,17,10,17,17
|
| 109 |
3104371626,an inductive synthesis framework for verifiable reinforcement learning,72,10,71,73
|
| 110 |
2955231257,a typed algebraic approach to parsing,13,10,13,13
|
| 111 |
3105155462,optimization and abstraction a synergistic approach for analyzing neural network robustness,49,10,48,50
|
| 112 |
-
2948130259,interventional fairness causal database repair for algorithmic fairness,0,10,
|
| 113 |
2963311060,spectre attacks exploiting speculative execution,1495,10,1132,1667
|
| 114 |
2968103728,underwater backscatter networking,99,10,97,101
|
| 115 |
2948795993,variance reduction in gradient exploration for online learning to rank,15,10,15,15
|
| 116 |
2964022882,computationally efficient estimation of the spectral gap of a markov chain,1,10,1,1
|
| 117 |
-
2948130259,interventional fairness causal database repair for algorithmic fairness,0,10,
|
| 118 |
2974073952,scaling symbolic evaluation for automated verification of systems code with serval,63,10,61,65
|
| 119 |
2963620995,the reachability problem for petri nets is not elementary,4,10,4,4
|
| 120 |
2980899416,tiptext eyes free text entry on a fingertip keyboard,70,10,68,72
|
|
@@ -126,15 +126,15 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 126 |
2963033005,learning to ask good questions ranking clarification questions using neural expected value of perfect information,9,10,9,9
|
| 127 |
2963686541,let s do it again a first computational approach to detecting adverbial presupposition triggers,10,10,10,10
|
| 128 |
2796382388,agile 3d sketching with air scaffolding,18,10,18,18
|
| 129 |
-
2796228338,pinpointing precise head and eye based target selection for augmented reality,0,10,
|
| 130 |
-
2795857247,data illustrator augmenting vector design tools with lazy data binding for expressive visualization authoring,0,10,
|
| 131 |
-
2795566406,a stalker s paradise how intimate partner abusers exploit technology,0,10,0,
|
| 132 |
2787712888,voice interfaces in everyday life,552,10,522,573
|
| 133 |
-
2795389852,let s talk about race identity chatbots and ai,0,10,0,
|
| 134 |
-
2795783386,semi automated coding for qualitative research a user centered inquiry and initial prototypes,0,10,0,
|
| 135 |
-
2796076588,wall room scale interactive and context aware sensing,0,10,0,
|
| 136 |
2795442664,expressive time series querying with hand drawn scale free sketches,51,10,51,51
|
| 137 |
-
2795619128,project zanzibar a portable and flexible tangible interaction platform,0,10,
|
| 138 |
2796058046,extending manual drawing practices with artist centric programming tools,42,10,42,42
|
| 139 |
2964185501,taskonomy disentangling task transfer learning,82,10,82,82
|
| 140 |
2899462170,the impact of regular expression denial of service redos in practice an empirical study at the ecosystem scale,86,10,84,89
|
|
@@ -146,8 +146,8 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 146 |
2963143631,obfuscated gradients give a false sense of security circumventing defenses to adversarial examples,1077,10,1018,1144
|
| 147 |
2965749257,delayed impact of fair machine learning,11,10,11,11
|
| 148 |
3105413283,large scale analysis of framework specific exceptions in android apps,57,10,57,57
|
| 149 |
-
2794889478,spatio temporal context reduction a pointer analysis based static approach for detecting use after free vulnerabilities,0,10,0,
|
| 150 |
-
2794694213,identifying design problems in the source code a grounded theory,0,10,
|
| 151 |
2795338679,static automated program repair for heap properties,71,10,71,71
|
| 152 |
2962804757,automated localization for unreproducible builds,32,10,32,32
|
| 153 |
2794901250,generalized data structure synthesis,31,10,31,31
|
|
@@ -158,12 +158,12 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 158 |
3092809319,from conjunctive queries to instance queries in ontology mediated querying,1,10,1,1
|
| 159 |
2962756936,what game are we playing end to end learning in normal and extensive form games,56,10,56,56
|
| 160 |
2807873315,commonsense knowledge aware conversation generation with graph attention,517,10,481,532
|
| 161 |
-
3098276446,adversarial attacks on neural networks for graph data,350,10,
|
| 162 |
-
2896992572,skycore moving core to the edge for untethered and reliable uav based lte networks,0,10,
|
| 163 |
2890192685,non delusional q learning and value iteration,27,10,27,27
|
| 164 |
-
2963755523,neural ordinary differential equations,2108,10,
|
| 165 |
2798641544,netchain scale free sub rtt coordination,164,10,160,169
|
| 166 |
-
2897044322,rept reverse debugging of failures in deployed software,37,10,34,
|
| 167 |
2899396876,legoos a disseminated distributed os for hardware resource disaggregation,140,10,134,146
|
| 168 |
2963823348,orca differential bug localization in large scale services,8,10,8,8
|
| 169 |
2964240296,program synthesis using conflict driven learning,101,10,100,102
|
|
@@ -175,23 +175,23 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 175 |
2876796450,inferring persistent interdomain congestion,88,10,88,88
|
| 176 |
2799048248,should i follow the crowd a probabilistic analysis of the effectiveness of popularity in recommender systems,13,10,13,13
|
| 177 |
2771541561,a refined mean field approximation,32,10,32,32
|
| 178 |
-
2798891709,surf practical range query filtering with fast succinct tries,0,10,
|
| 179 |
2896381102,authoring and verifying human robot interactions,52,10,51,53
|
| 180 |
-
2896806675,porta profiling software tutorials using operating system wide activity tracing,0,10,
|
| 181 |
-
2897456565,resi a highly flexible pressure sensitive imperceptible textile interface based on resistive yarns,0,10,
|
| 182 |
3105298605,the ubiquity of large graphs and surprising challenges of graph processing extended survey,78,10,78,78
|
| 183 |
-
2788150400,highlife higher arity fact harvesting,0,10,
|
| 184 |
2963019788,label free supervision of neural networks with physics and domain knowledge,279,10,276,282
|
| 185 |
2963069394,probabilistic typology deep generative models of vowel inventories,7,10,7,7
|
| 186 |
2591131751,designing gamified applications that make safe driving more engaging,37,10,37,37
|
| 187 |
-
2611348597,illumination aesthetics light as a creative material within computational design,0,10,
|
| 188 |
-
2611579020,sharevr enabling co located experiences for virtual reality between hmd and non hmd users,0,10,1,
|
| 189 |
-
2611586694,explaining the gap visualizing one s predictions improves recall and comprehension of data,0,10,
|
| 190 |
2611474773,what is interaction,137,10,136,138
|
| 191 |
-
2610874624,bignav bayesian information gain for guiding multiscale navigation,0,10,0,
|
| 192 |
2611632447,modelling learning of new keyboard layouts,47,10,47,47
|
| 193 |
-
2610281177,flash organizations crowdsourcing complex work by structuring crowds as organizations,0,10,0,
|
| 194 |
-
2610874523,reflective practicum a framework of sensitising concepts to design for transformative reflection,0,10,
|
| 195 |
2610929834,fingertip tactile devices for virtual object manipulation and exploration,134,10,133,135
|
| 196 |
2558581619,what can be predicted from six seconds of driver glances,47,10,47,47
|
| 197 |
2610414453,design and evaluation of a data driven password meter,118,10,117,119
|
|
@@ -220,34 +220,34 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 220 |
2618267215,verified models and reference implementations for the tls 1 3 standard candidate,168,10,165,172
|
| 221 |
2744387122,re architecting datacenter networks and stacks for low latency and high performance,316,10,305,324
|
| 222 |
2743093301,language directed hardware design for network performance monitoring,234,10,231,236
|
| 223 |
-
2742124187,bitfunnel revisiting signatures for search,0,10,0,
|
| 224 |
2576238278,accelerating performance inference over closed systems by asymptotic methods,5,10,5,5
|
| 225 |
2613088476,parallelizing sequential graph computations,37,10,37,37
|
| 226 |
3101492167,the efficient server audit problem deduplicated re execution and the web,15,10,14,16
|
| 227 |
-
2616028256,deepxplore automated whitebox testing of deep learning systems,0,10,
|
| 228 |
2765855860,triggering artwork swaps for live animation,16,10,15,16
|
| 229 |
-
2766544714,grabity a wearable haptic interface for simulating weight and grasping in virtual reality,0,10,0,
|
| 230 |
-
3106143313,aircode unobtrusive physical tags for digital fabrication,0,10,
|
| 231 |
2583856578,provenance for natural language queries,31,10,31,31
|
| 232 |
2566652907,bidirectional search that is guaranteed to meet in the middle,46,10,46,46
|
| 233 |
2515120005,finding non arbitrary form meaning systematicity using string metric learning for kernel regression,27,10,27,27
|
| 234 |
2407293509,the effect of visual appearance on the performance of continuous sliders and visual analogue scales,92,10,91,92
|
| 235 |
2395063354,object oriented drawing,93,10,93,93
|
| 236 |
2400260714,enabling designers to foresee which colors users cannot see,38,10,38,38
|
| 237 |
-
2347171008,i don t want to wear a screen probing perceptions of and possibilities for dynamic displays on clothing,0,10,0,
|
| 238 |
-
2346915687,rapid a framework for fabricating low latency interactive objects with rfid tags,0,10,
|
| 239 |
-
2339558352,haptic wave a cross modal interface for visually impaired audio producers,0,10,
|
| 240 |
-
2395423607,flexcase enhancing mobile interaction with a flexible sensing and display cover,0,10,0,
|
| 241 |
2408438722,understanding and mitigating the effects of device and cloud service design decisions on the environmental footprint of digital infrastructure,101,10,100,102
|
| 242 |
2406854312,enhancing cross device interaction scripting with interactive illustrations,27,10,27,27
|
| 243 |
-
2402939184,learn piano with bach an adaptive learning interface that adjusts task difficulty based on brain state,0,10,0,
|
| 244 |
-
2400074865,smart touch improving touch accuracy for people with motor impairments with template matching,0,10,
|
| 245 |
2396533648,building a personalized auto calibrating eye tracker from user interactions,68,10,68,68
|
| 246 |
-
2394670422,developing and validating the user burden scale a tool for assessing user burden in computing systems,0,10,0,
|
| 247 |
2400341429,foraging among an overabundance of similar variants,43,10,43,43
|
| 248 |
2396662988,finding email in a multi account multi device world,32,10,32,32
|
| 249 |
-
3103319922,empath understanding topic signals in large scale text,0,10,1,
|
| 250 |
-
2398012670,lock n lol group based limiting assistance app to mitigate smartphone distractions in group activities,0,10,
|
| 251 |
2194775991,deep residual learning for image recognition,4350,10,3806,4771
|
| 252 |
2548627465,api code recommendation using statistical learning from fine grained changes,156,10,149,163
|
| 253 |
2547900581,detecting sensitive data disclosure via bi directional text correlation analysis,24,10,24,24
|
|
@@ -261,16 +261,16 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 261 |
2393286498,feedback directed instrumentation for deployed javascript applications,18,10,18,18
|
| 262 |
2387719207,from word embeddings to document similarities for improved information retrieval in software engineering,286,10,281,291
|
| 263 |
2294434616,guiding dynamic symbolic execution toward unverified program executions,85,10,85,85
|
| 264 |
-
2367183013,on the techniques we create the tools we build and their misalignments a study of klee,0,10,
|
| 265 |
2381207137,termination checking for llvm peephole optimizations,11,10,11,11
|
| 266 |
-
2374182234,vdtest an automated framework to support testing for virtual devices,0,10,0,
|
| 267 |
-
2144160189,work practices and challenges in pull based development the contributor s perspective,0,10,0,
|
| 268 |
-
2348679751,fraudar bounding graph fraud in the face of camouflage,0,10,
|
| 269 |
2964077562,value iteration networks,241,10,238,244
|
| 270 |
2412123704,passive wi fi bringing low power to wi fi transmissions,256,10,238,274
|
| 271 |
2575735093,ryoan a distributed sandbox for untrusted computation on secret data,166,10,162,173
|
| 272 |
2522470548,early detection of configuration errors to reduce failure damage,1,10,0,2
|
| 273 |
-
2576393274,push button verification of file systems via crash refinement,53,10,
|
| 274 |
2414762192,into the depths of c elaborating the de facto standards,14,10,14,14
|
| 275 |
2413028252,transactional data structure libraries,7,10,7,7
|
| 276 |
2386500332,types from data making structured data first class citizens in f,4,10,4,4
|
|
@@ -280,26 +280,26 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 280 |
2488197787,don t mind the gap bridging network wide objectives and device level configurations,6,10,6,6
|
| 281 |
2488265751,eliminating channel feedback in next generation cellular networks,134,10,132,136
|
| 282 |
2495264776,inter technology backscatter towards internet connectivity for implanted devices,23,10,23,23
|
| 283 |
-
2340380384,understanding information need an fmri study,0,10,
|
| 284 |
-
2421547754,wander join online aggregation via random walks,0,10,0,
|
| 285 |
2963024133,reed muller codes achieve capacity on erasure channels,44,10,43,45
|
| 286 |
-
2537074996,rovables miniature on body robots as mobile wearables,0,10,
|
| 287 |
-
2533619018,zooids building blocks for swarm user interfaces,0,10,
|
| 288 |
-
2539017927,procover sensory augmentation of prosthetic limbs using smart textile covers,0,10,
|
| 289 |
-
2538172027,viband high fidelity bio acoustic sensing using commodity smartwatch accelerometers,0,10,0,
|
| 290 |
2535724050,compressed linear algebra for large scale machine learning,75,10,75,75
|
| 291 |
2262364653,social networks under stress,6,10,6,6
|
| 292 |
2211594368,from non negative to general operator cost partitioning,77,10,77,77
|
| 293 |
-
1974329625,affordance allowing objects to communicate dynamic use,0,10,0,
|
| 294 |
-
2077940530,velocitap investigating fast mobile text entry using sentence based decoding of touchscreen keyboard input,0,10,0,
|
| 295 |
-
2171022339,what makes interruptions disruptive a process model account of the effects of the problem state bottleneck on task interruption and resumption,0,10,
|
| 296 |
1993143504,lightweight relief shearing for enhanced terrain perception on interactive maps,40,10,40,40
|
| 297 |
-
2071865879,patina engraver visualizing activity logs as patina in fashionable trackers,0,10,0,
|
| 298 |
-
2148163144,baselase an interactive focus context laser floor,0,10,0,
|
| 299 |
2163444123,iskin flexible stretchable and visually customizable on body touch sensors for mobile computing,9,10,9,9
|
| 300 |
-
2193303691,acoustruments passive acoustically driven interactive controls for handheld devices,0,10,0,
|
| 301 |
-
2071620178,sharing is caring assistive technology designs on thingiverse,0,10,
|
| 302 |
-
1964639420,colourid improving colour identification for people with impaired colour vision,0,10,
|
| 303 |
1938204631,dynamicfusion reconstruction and tracking of non rigid scenes in real time,927,10,915,939
|
| 304 |
2136601052,multise multi path symbolic execution using value summaries,101,10,100,102
|
| 305 |
2015187825,measure it manage it ignore it software practitioners and technical debt,244,10,235,257
|
|
@@ -320,35 +320,35 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 320 |
1495444061,a messy state of the union taming the composite state machines of tls,208,10,206,210
|
| 321 |
1536141561,riposte an anonymous messaging system handling millions of users,117,10,117,118
|
| 322 |
2094739364,central control over distributed routing,139,10,136,142
|
| 323 |
-
2070299948,quickscorer a fast algorithm to rank documents with additive ensembles of regression trees,0,10,
|
| 324 |
2009122315,spy vs spy rumor source obfuscation,1,10,1,1
|
| 325 |
-
2092799168,dbscan revisited mis claim un fixability and approximation,0,10,
|
| 326 |
2049314312,pivot tracing dynamic causal monitoring for distributed systems,18,10,16,20
|
| 327 |
2411173678,using crash hoare logic for certifying the fscq file system,182,10,177,190
|
| 328 |
2412033124,coz finding code that counts with causal profiling,3,10,3,3
|
| 329 |
-
2197150605,foldio digital fabrication of interactive and shape changing objects with foldable printed electronics,0,10,
|
| 330 |
-
2176017127,orbits gaze interaction for smart watches using smooth pursuit eye movements,0,10,
|
| 331 |
-
2271345687,webstrates shareable dynamic media,0,10,0,
|
| 332 |
2269738476,constructing an interactive natural language interface for relational databases,404,10,393,415
|
| 333 |
-
3125781181,hyptrails a bayesian approach for comparing hypotheses about human trails on the web,0,10,
|
| 334 |
151167705,recovering from selection bias in causal and statistical inference,85,10,85,85
|
| 335 |
2251682575,fast and robust neural network joint models for statistical machine translation,496,10,492,503
|
| 336 |
-
2137864660,consumed endurance a metric to quantify arm fatigue of mid air interactions,0,10,0,
|
| 337 |
-
2147149886,duet exploring joint interactions on a smart phone and a smart watch,0,10,
|
| 338 |
-
2081933842,type hover swipe in 96 bytes a motion sensing mechanical keyboard,0,10,0,
|
| 339 |
2005996634,effects of display size and navigation type on a classification task,73,10,73,73
|
| 340 |
-
2094690640,mixfab a mixed reality environment for personal fabrication,0,10,
|
| 341 |
2047781873,real time feedback for improving medication taking,67,10,67,67
|
| 342 |
2162409443,structured labeling for facilitating concept evolution in machine learning,99,10,98,100
|
| 343 |
2117160827,towards accurate and practical predictive models of active vision based visual search,31,10,31,31
|
| 344 |
-
2051295909,retrodepth 3d silhouette sensing for high precision input on and above physical surfaces,0,10,
|
| 345 |
2124910144,understanding multitasking through parallelized strategy exploration and individualized cognitive modeling,19,10,19,19
|
| 346 |
-
2106612861,making sustainability sustainable challenges in the design of eco interaction technologies,0,10,
|
| 347 |
2102147011,selection and presentation practices for code example summarization,34,10,34,34
|
| 348 |
2140609933,learning natural coding conventions,377,10,296,451
|
| 349 |
2041235686,ai a lightweight system for tolerating concurrency bugs,13,10,13,13
|
| 350 |
2096146112,powering the static driver verifier using corral,40,10,39,41
|
| 351 |
-
159693449,understanding the limiting factors of topic modeling via posterior contraction analysis,166,10,164,
|
| 352 |
2056659466,a study and toolkit for asynchronous programming in c,54,10,54,54
|
| 353 |
2080395944,cowboys ankle sprains and keepers of quality how is video game development different from software development,170,10,168,172
|
| 354 |
1970005004,enhancing symbolic execution with veritesting,212,10,209,216
|
|
@@ -357,28 +357,28 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 357 |
2090907135,understanding javascript event based interactions,64,10,64,64
|
| 358 |
2050127001,unit test virtualization with vmvm,80,10,79,80
|
| 359 |
2052261215,reducing the sampling complexity of topic models,228,10,225,230
|
| 360 |
-
2069973845,tagoram real time tracking of mobile rfid tags to high precision using cots devices,0,10,
|
| 361 |
2963056065,asymmetric lsh alsh for sublinear time maximum inner product search mips,266,10,264,267
|
| 362 |
-
2155216527,software dataplane verification,40,10,39,
|
| 363 |
2096915479,arrakis the operating system is the control plane,222,10,208,236
|
| 364 |
1852007091,shielding applications from an untrusted cloud with haven,430,10,371,475
|
| 365 |
2169414316,ix a protected dataplane operating system for high throughput and low latency,278,10,253,303
|
| 366 |
2170737051,compiler validation via equivalence modulo inputs,174,10,167,180
|
| 367 |
2057510141,improving javascript performance by deconstructing the type system,14,10,14,14
|
| 368 |
2050680750,on abstraction refinement for program analyses in datalog,79,10,78,80
|
| 369 |
-
2077542434,weaker forms of monotonicity for declarative networking a more fine grained answer to the calm conjecture,0,10,
|
| 370 |
2031015560,secure multiparty computations on bitcoin,351,10,342,361
|
| 371 |
2099619158,balancing accountability and privacy in the network,34,10,34,34
|
| 372 |
-
2157990152,conga distributed congestion aware load balancing for datacenters,0,10,
|
| 373 |
2089455813,partitioned elias fano indexes,127,10,127,128
|
| 374 |
319976220,concave switching in single and multihop networks,22,10,22,22
|
| 375 |
2099102906,materialization optimizations for feature selection workloads,111,10,110,112
|
| 376 |
2106941316,sensing techniques for tablet stylus interaction,64,10,61,67
|
| 377 |
2028953510,expert crowdsourcing with flash teams,215,10,199,225
|
| 378 |
-
2144575742,printscreen fabricating highly customizable thin film touch displays,0,10,
|
| 379 |
2243512312,the uncracked pieces in database cracking,66,10,66,66
|
| 380 |
1597017619,epic an extensible and scalable system for processing big data,13,10,13,13
|
| 381 |
-
2294510862,m4 a visualization oriented time series data aggregation,0,10,
|
| 382 |
2797202077,building efficient query engines in a high level language,100,10,100,101
|
| 383 |
2229053133,on k path covers and their applications,52,10,52,52
|
| 384 |
2060170830,efficient estimation for high similarities using odd sketches,63,10,62,63
|
|
@@ -388,15 +388,15 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 388 |
2052209137,weighted graph comparison techniques for brain connectivity analysis,165,10,163,167
|
| 389 |
2158892938,analyzing user generated youtube videos to understand touchscreen use by people with motor impairments,137,10,136,138
|
| 390 |
2128640376,improving navigation based file retrieval,30,10,30,30
|
| 391 |
-
2168214746,sprweb preserving subjective responses to website colour schemes through automatic recolouring,0,10,
|
| 392 |
-
1986345088,the efficacy of human post editing for language translation,185,10,182,
|
| 393 |
-
2147603330,turkopticon interrupting worker invisibility in amazon mechanical turk,0,10,
|
| 394 |
-
2166713718,illumiroom peripheral projected illusions for interactive experiences,0,10,
|
| 395 |
-
2007644286,webzeitgeist design mining the web,0,10,
|
| 396 |
-
2057073649,laserorigami laser cutting 3d objects,0,10,
|
| 397 |
2056225838,labor dynamics in a mobile micro task market,106,10,105,107
|
| 398 |
-
2015143364,job opportunities through entertainment virally spread speech based services for low literate users,0,10,0,
|
| 399 |
-
2109727442,screenfinity extending the perception area of content on very large public displays,0,10,
|
| 400 |
2025802550,reasons to question seven segment displays,19,10,19,19
|
| 401 |
2122146326,fast accurate detection of 100 000 object classes on a single machine,320,10,320,321
|
| 402 |
2135166986,from large scale image categorization to entry level categories,107,10,106,108
|
|
@@ -408,37 +408,37 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 408 |
2250922733,flexibility and decoupling in the simple temporal problem,7,10,7,7
|
| 409 |
2141336889,whole home gesture recognition using wireless signals,980,10,916,1130
|
| 410 |
2126709939,scalable influence estimation in continuous time diffusion networks,141,10,140,141
|
| 411 |
-
73604409,embassies radically refactoring the web,32,10,
|
| 412 |
2157216158,a general constraint centric scheduling framework for spatial architectures,65,10,64,66
|
| 413 |
-
2047068447,clap recording local executions to reproduce concurrency failures,0,10,
|
| 414 |
-
2048025009,static analysis for probabilistic programs inferring whole program properties from finitely many paths,0,10,
|
| 415 |
2063553958,reconciling exhaustive pattern matching with objects,1,10,1,1
|
| 416 |
2018746447,pinocchio nearly practical verifiable computation,774,10,725,792
|
| 417 |
2099461393,ambient backscatter wireless communication out of thin air,65,10,64,65
|
| 418 |
2159205954,beliefs and biases in web search,153,10,152,154
|
| 419 |
2145432435,queueing system topologies with limited flexibility,32,10,32,32
|
| 420 |
2002203222,massive graph triangulation,132,10,130,133
|
| 421 |
-
2104670257,the scalable commutativity rule designing scalable software for multicore processors,0,10,0,
|
| 422 |
-
1978364288,towards optimization safe systems analyzing the impact of undefined behavior,0,10,0,
|
| 423 |
-
2082171780,naiad a timely dataflow system,0,10,0,
|
| 424 |
-
2150549828,pneui pneumatically actuated soft composite materials for shape changing interfaces,0,10,0,
|
| 425 |
-
2109018459,touch activate adding interactivity to existing objects using active acoustic sensing,0,10,1,
|
| 426 |
-
2001716033,fiberio a touchscreen that senses fingerprints,0,10,
|
| 427 |
2033201131,disc diversity result diversification based on dissimilarity and coverage,3,10,3,3
|
| 428 |
-
2127411301,no country for old members user lifecycle and linguistic change in online communities,0,10,
|
| 429 |
2293636571,learning svm classifiers with indefinite kernels,27,10,27,27
|
| 430 |
1512874001,document summarization based on data reconstruction,118,10,118,118
|
| 431 |
2159250884,bayesian symbol refined tree substitution grammars for syntactic parsing,44,10,44,44
|
| 432 |
2136345490,observational and experimental investigation of typing behaviour using virtual keyboards for mobile devices,96,10,95,97
|
| 433 |
2126298837,the normal natural troubles of driving with gps,105,10,104,106
|
| 434 |
2060696172,improving command selection with commandmaps,64,10,64,64
|
| 435 |
-
2132962756,communitysourcing engaging local crowds to perform expert work via physical kiosks,0,10,
|
| 436 |
-
2088182082,touche enhancing touch interaction on humans screens liquids and everyday objects,0,10,0,
|
| 437 |
2166132393,detecting error related negativity for interaction design,63,10,63,63
|
| 438 |
1974923332,using rhythmic patterns as an input method,38,10,38,38
|
| 439 |
-
2168953163,revisiting the jacquard loom threads of history and current patterns in hci,0,10,
|
| 440 |
-
2018499862,clayvision the elastic image of the city,0,10,0,
|
| 441 |
-
2148787816,seeking the ground truth a retroactive study on the evolution and migration of software libraries,0,10,
|
| 442 |
1965085982,scalable test data generation from multidimensional models,16,10,16,16
|
| 443 |
2098278465,using dynamic analysis to discover polynomial and array invariants,70,10,70,70
|
| 444 |
2131008594,automated detection of client state manipulation vulnerabilities,11,10,11,11
|
|
@@ -451,26 +451,26 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 451 |
2095156129,don t trust satellite phones a security analysis of two satphone standards,66,10,66,66
|
| 452 |
2113551315,multi resource fair queueing for packet processing,41,10,41,41
|
| 453 |
2029009258,time based calibration of effectiveness measures,174,10,172,176
|
| 454 |
-
2101221989,temperature management in data centers why some might like it hot,0,10,0,
|
| 455 |
-
2123458705,high performance complex event processing over xml streams,63,10,62,
|
| 456 |
-
2113331157,jamming user interfaces programmable particle stiffness and sensing for malleable and shape changing devices,0,10,0,
|
| 457 |
-
2010127311,cliplets juxtaposing still and dynamic imagery,0,10,0,
|
| 458 |
-
2167913131,crowdscape interactively visualizing user behavior and output,0,10,
|
| 459 |
2005499394,dense subgraph maintenance under streaming edge weight updates for real time story identification,102,10,101,103
|
| 460 |
1982139456,counting beyond a yottabyte or how sparql 1 1 property paths will prevent adoption of the standard,123,10,122,124
|
| 461 |
57159709,complexity of and algorithms for borda manipulation,75,10,75,75
|
| 462 |
2142523187,unsupervised part of speech tagging with bilingual graph based projections,258,10,254,262
|
| 463 |
-
2075779758,bricolage example based retargeting for web design,0,10,
|
| 464 |
2022815033,mid air pan and zoom on wall sized displays,202,10,199,205
|
| 465 |
-
2153391061,why is my internet slow making network speeds visible,0,10,
|
| 466 |
-
2146852151,synchronous interaction among hundreds an evaluation of a conference in an avatar based virtual environment,0,10,
|
| 467 |
-
2105697580,your noise is my command sensing gestures using the body as an antenna,0,10,0,
|
| 468 |
2081964782,enhancing physicality in touch interaction with programmable friction,131,10,130,132
|
| 469 |
-
2136691781,usable gestures for blind people understanding preference and performance,0,10,
|
| 470 |
-
2127473562,automics souvenir generating photoware for theme parks,0,10,0,
|
| 471 |
-
2097331574,effects of community size and contact rate in synchronous social q a,0,10,0,
|
| 472 |
2153207410,review spotlight a user interface for summarizing user generated reviews using adjective noun word pairs,0,10,0,226
|
| 473 |
-
1986692274,ease of juggling studying the effects of manual multitasking,0,10,0,
|
| 474 |
2069121074,a polylogarithmic competitive algorithm for the k server problem,65,10,63,67
|
| 475 |
2107220315,proving programs robust,139,10,132,145
|
| 476 |
2167626029,proactive detection of collaboration conflicts,202,10,195,203
|
|
@@ -478,24 +478,24 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 478 |
2963584844,computational rationalization the inverse equilibrium problem,20,10,20,20
|
| 479 |
2111765806,run time efficient probabilistic model checking,191,10,187,195
|
| 480 |
2119142490,verifying multi threaded software using smt based context bounded model checking,131,10,129,133
|
| 481 |
-
2106860490,programs tests and oracles the foundations of testing revisited,0,10,
|
| 482 |
2116907335,on demand feature recommendations derived from mining public product descriptions,142,10,141,143
|
| 483 |
-
2162439064,configuring global software teams a multi company analysis of project productivity quality and profits,0,10,
|
| 484 |
89766480,nested rollout policy adaptation for monte carlo tree search,100,10,99,101
|
| 485 |
-
2044879407,leakage in data mining formulation detection and avoidance,0,10,
|
| 486 |
2138961375,e mili energy minimizing idle listening in wireless networks,136,10,129,142
|
| 487 |
2126541908,detecting driver phone use leveraging car speakers,206,10,195,217
|
| 488 |
-
174578849,serverswitch a programmable and high performance platform for data center networks,129,10,126,
|
| 489 |
1515106148,design implementation and evaluation of congestion control for multipath tcp,582,10,515,647
|
| 490 |
2137824953,data representation synthesis,5,10,5,5
|
| 491 |
2095609152,data exchange beyond complete data,30,10,29,31
|
| 492 |
2099129595,phonotactic reconstruction of encrypted voip conversations hookt on fon iks,117,10,117,118
|
| 493 |
-
2008251177,find it if you can a game for modeling different types of web search success using interaction data,0,10,0,
|
| 494 |
2136110891,topology discovery of sparse random graphs with few participants,38,10,37,38
|
| 495 |
-
2115799249,entangled queries enabling declarative data driven coordination,0,10,0,
|
| 496 |
-
2066383384,cells a virtual mobile smartphone architecture,0,10,
|
| 497 |
-
1995790197,a file is not a file understanding the i o behavior of apple desktop applications,0,10,0,
|
| 498 |
-
2166493117,sidebyside ad hoc multi user interaction with handheld projectors,0,10,0,
|
| 499 |
2130846554,remusdb transparent high availability for database systems,46,10,46,46
|
| 500 |
2164173709,towards a theory model for product search,59,10,58,60
|
| 501 |
1538864647,a novel transition based encoding scheme for planning as satisfiability,54,10,54,54
|
|
@@ -504,13 +504,13 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 504 |
2124318441,how does search behavior change as search becomes more difficult,202,10,199,205
|
| 505 |
2119188105,the tower of babel meets web 2 0 user generated content and its applications in a multilingual context,33,10,33,33
|
| 506 |
2155385126,occlusion aware interfaces,67,10,67,67
|
| 507 |
-
2169709590,skinput appropriating the body as an input surface,0,10,
|
| 508 |
-
2129146498,lumino tangible blocks for tabletop computers based on glass fiber bundles,0,10,0,
|
| 509 |
-
2158447593,prefab implementing advanced behaviors using pixel based reverse engineering of interface structure,0,10,0,
|
| 510 |
-
2120326355,useful junk the effects of visual embellishment on comprehension and memorability of charts,0,10,0,
|
| 511 |
2056637671,staged concurrent program analysis,53,10,52,54
|
| 512 |
-
2082638814,developer fluency achieving true mastery in software projects,0,10,
|
| 513 |
-
2166271660,creating and evolving developer documentation understanding the decisions of open source contributors,0,10,
|
| 514 |
2169970157,collaborative reliability prediction of service oriented systems,245,10,239,251
|
| 515 |
2127190390,a degree of knowledge model to capture source code familiarity,123,10,122,124
|
| 516 |
2122987719,a machine learning approach for tracing regulatory codes to product specific requirements,180,10,177,182
|
|
@@ -521,25 +521,25 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 521 |
2911611915,reverse traceroute,133,10,131,135
|
| 522 |
2145467766,efficient system enforced deterministic parallelism,1,10,0,2
|
| 523 |
1893312510,the turtles project design and implementation of nested virtualization,239,10,222,253
|
| 524 |
-
2141729404,safe to the last instruction automated verification of a type safe operating system,0,10,0,
|
| 525 |
2103126020,an optimal algorithm for the distinct elements problem,330,10,284,375
|
| 526 |
1985225657,scifi a system for secure face identification,231,10,225,236
|
| 527 |
2097460929,efficient error estimating coding feasibility and applications,21,10,21,21
|
| 528 |
-
2109913881,assessing the scenic route measuring the value of search trails in web logs,0,10,0,
|
| 529 |
2152475116,load balancing via random local search in closed and open systems,10,10,10,10
|
| 530 |
2151224499,fast fast architecture sensitive tree search on modern cpus and gpus,0,10,0,111
|
| 531 |
2912359042,qip pspace,57,10,56,58
|
| 532 |
-
2090048052,vizwiz nearly real time answers to visual questions,0,10,
|
| 533 |
2161163216,towards certain fixes with editing rules and master data,117,10,116,117
|
| 534 |
2171279286,factorizing personalized markov chains for next basket recommendation,2199,10,1476,2356
|
| 535 |
2124142520,predicting tie strength with social media,1367,10,1019,1748
|
| 536 |
2116041277,undo and erase events as indicators of usability problems,39,10,39,39
|
| 537 |
-
2162065809,from interaction to trajectories designing coherent journeys through user experiences,0,10,0,
|
| 538 |
-
2144024567,sizing the horizon the effects of chart size and layering on the graphical perception of time series visualizations,0,10,
|
| 539 |
-
2061766138,social immersive media pursuing best practices for multi user interactive camera projector exhibits,0,10,1,
|
| 540 |
-
2097298348,ephemeral adaptation the use of gradual onset to improve menu selection performance,0,10,0,
|
| 541 |
2073961002,asserting and checking determinism for multithreaded programs,69,10,68,69
|
| 542 |
-
2136880809,darwin an approach for debugging evolving programs,0,10,
|
| 543 |
2059215200,graph based mining of multiple object usage patterns,297,10,258,296
|
| 544 |
2142037471,discriminative models for multi class object layout,282,10,280,284
|
| 545 |
2132800423,effective static deadlock detection,178,10,177,181
|
|
@@ -548,19 +548,19 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 548 |
2156883549,invariant based automatic testing of ajax user interfaces,201,10,196,206
|
| 549 |
1528986923,consequence driven reasoning for horn shiq ontologies,183,10,180,185
|
| 550 |
2080320419,collaborative filtering with temporal dynamics,1132,10,1062,1165
|
| 551 |
-
2135573205,centaur realizing the full potential of centralized wlans through a hybrid data path,0,10,0,
|
| 552 |
1519889149,trinc small trusted hardware for large distributed systems,147,10,144,149
|
| 553 |
1693562991,sora high performance software radio using general purpose multi core processors,265,10,256,271
|
| 554 |
2148707178,binary analysis for measurement and attribution of program performance,57,10,56,58
|
| 555 |
2062340141,native client a sandbox for portable untrusted x86 native code,540,10,512,569
|
| 556 |
2150957281,white space networking with wi fi like connectivity,396,10,388,403
|
| 557 |
2134842174,sources of evidence for vertical selection,203,10,201,206
|
| 558 |
-
2169045095,the age of gossip spatial mean field regime,0,10,0,
|
| 559 |
2126354234,generating example data for dataflow programs,58,10,58,58
|
| 560 |
-
2133394135,fawn a fast array of wimpy nodes,0,10,
|
| 561 |
-
2151062909,routebricks exploiting parallelism to scale software routers,0,10,0,
|
| 562 |
-
2136310957,sel4 formal verification of an os kernel,0,10,
|
| 563 |
-
2139459444,mouse 2 0 multi touch meets the mouse,0,10,0,
|
| 564 |
2120342618,a unified approach to ranking in probabilistic databases,151,10,150,151
|
| 565 |
192051504,optimal false name proof voting rules with costly voting,41,10,41,41
|
| 566 |
1816489643,how good is almost perfect,107,10,107,107
|
|
@@ -574,8 +574,8 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 574 |
2122633358,efficient online monitoring of web service slas,142,10,139,147
|
| 575 |
2103188316,recommending adaptive changes for framework evolution,97,10,97,98
|
| 576 |
2154843497,precise memory leak detection for java software using container profiling,142,10,141,143
|
| 577 |
-
2164372721,debugging reinvented asking and answering why and why not questions about program behavior,0,10,0,
|
| 578 |
-
2130243914,predicting accurate and actionable static analysis warnings an experimental approach,0,10,
|
| 579 |
2171183905,assessment of urban scale wireless networks with a small number of measurements,79,10,77,81
|
| 580 |
1572904055,remus high availability via asynchronous virtual machine replication,567,10,502,646
|
| 581 |
1598241463,consensus routing the internet as a distributed system,87,10,85,89
|
|
@@ -583,25 +583,25 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 583 |
1493893823,dryadlinq a system for general purpose distributed data parallel computing using a high level language,708,10,561,767
|
| 584 |
2216311525,difference engine harnessing memory redundancy in virtual machines,185,10,175,187
|
| 585 |
2143472559,pacemakers and implantable cardiac defibrillators software radio attacks and zero power defenses,725,10,681,770
|
| 586 |
-
2103331800,zigzag decoding combating hidden terminals in wireless networks,0,10,1,
|
| 587 |
2005689470,algorithmic mediation for collaborative exploratory search,181,10,178,182
|
| 588 |
-
2059739152,counter braids a novel counter architecture for per flow measurement,0,10,
|
| 589 |
1987358714,serializable isolation for snapshot databases,173,10,172,174
|
| 590 |
2171901130,scalable network distance browsing in spatial databases,307,10,301,311
|
| 591 |
2140190783,bringing physics to the surface,194,10,183,204
|
| 592 |
-
2018989507,finding frequent items in data streams,559,10,534,
|
| 593 |
2141463661,constrained physical design tuning,36,10,36,36
|
| 594 |
-
2145990704,irlbot scaling to 6 billion pages and beyond,0,10,0,
|
| 595 |
2146447174,plow a collaborative task learning agent,151,10,150,151
|
| 596 |
1902527071,thresholded rewards acting optimally in timed zero sum games,13,10,13,13
|
| 597 |
2121465811,learning synchronous grammars for semantic parsing with lambda calculus,331,10,324,338
|
| 598 |
2117601224,authoring sensor based interactions by demonstration with direct manipulation and pattern recognition,149,10,148,150
|
| 599 |
2006550435,consuming video on mobile devices,194,10,190,196
|
| 600 |
-
2131801294,multiview improving trust in group video conferencing through spatial faithfulness,0,10,0,
|
| 601 |
-
2108518773,shift a technique for operating pen based interfaces using touch,0,10,
|
| 602 |
-
2057359302,software or wetware discovering when and why people use digital prosthetic memory,0,10,0,
|
| 603 |
-
2168233682,sustainable interaction design invention disposal renewal reuse,0,10,
|
| 604 |
-
2144409879,dynamic 3d scene analysis from a moving vehicle,302,10,
|
| 605 |
3127778049,space efficient identity based encryption without pairings,3,10,3,3
|
| 606 |
2167671111,mining specifications of malicious behavior,280,10,258,297
|
| 607 |
2112380328,automatic consistency assessment for query results in dynamic environments,14,10,14,14
|
|
@@ -614,19 +614,19 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 614 |
110738662,automated heart wall motion abnormality detection from ultrasound images using bayesian networks,43,10,43,43
|
| 615 |
57770583,performance analysis of online anticipatory algorithms for large multistage stochastic integer programs,35,10,35,35
|
| 616 |
1552944591,building structure into local search for sat,39,10,39,39
|
| 617 |
-
1576549127,life death and the critical transition finding liveness bugs in systems code,184,10,
|
| 618 |
2071286129,fault tolerant typed assembly language,36,10,35,36
|
| 619 |
-
2153578567,the ant and the grasshopper fast and accurate pointer analysis for millions of lines of code,0,10,
|
| 620 |
2149156280,studying the use of popular destinations to enhance web search interaction,201,10,199,203
|
| 621 |
2066262685,modeling the relative fitness of storage,15,10,15,15
|
| 622 |
2077449561,compiling mappings to bridge applications and databases,50,10,50,50
|
| 623 |
2035801804,scalable approximate query processing with the dbo engine,80,10,80,80
|
| 624 |
-
2108026089,sinfonia a new paradigm for building scalable distributed systems,0,10,
|
| 625 |
-
2139359217,zyzzyva speculative byzantine fault tolerance,0,10,1,
|
| 626 |
2166510103,secure web applications via automatic partitioning,245,10,234,262
|
| 627 |
-
2140280838,thinsight versatile multi touch sensing for thin form factor displays,0,10,0,
|
| 628 |
2140613126,scalable semantic web data management using vertical partitioning,657,10,610,675
|
| 629 |
-
2163263459,wherefore art thou r3579x anonymized social networks hidden patterns and structural steganography,0,10,
|
| 630 |
1607840088,model counting a new strategy for obtaining good bounds,143,10,143,143
|
| 631 |
52985456,towards an axiom system for default logic,13,10,13,13
|
| 632 |
2144108169,semantic taxonomy induction from heterogenous evidence,466,10,459,474
|
|
@@ -635,22 +635,22 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 635 |
2118755902,a role for haptics in mobile interaction initial design using a handheld tactile display prototype,15,10,15,15
|
| 636 |
2146352414,putting objects in perspective,235,10,234,236
|
| 637 |
2082731247,controlling factors in evaluating path sensitive error detection techniques,11,10,11,11
|
| 638 |
-
2107794009,synergy a new algorithm for property checking,0,10,1,
|
| 639 |
2071616717,model based development of dynamically adaptive software,413,10,386,422
|
| 640 |
-
2079317829,who should fix this bug,900,10,
|
| 641 |
1544095305,experience with an object reputation system for peer to peer filesharing,214,10,200,227
|
| 642 |
1500238431,availability of multi object operations,29,10,29,30
|
| 643 |
2620706897,rethink the sync,45,10,42,48
|
| 644 |
2624304035,bigtable a distributed storage system for structured data,1866,10,1070,2578
|
| 645 |
2124504084,minimal test collections for retrieval evaluation,245,10,240,250
|
| 646 |
2152652256,maximizing throughput in wireless networks via gossiping,135,10,129,139
|
| 647 |
-
2103224511,to search or to crawl towards a query optimizer for text centric tasks,0,10,
|
| 648 |
2062658884,reflective physical prototyping through integrated design test and analysis,300,10,260,346
|
| 649 |
2146081216,trustworthy keyword search for regulatory compliant records retention,29,10,29,29
|
| 650 |
2128941908,random sampling from a search engine s index,126,10,125,127
|
| 651 |
1587673378,the max k armed bandit a new model of exploration applied to search heuristic selection,80,10,80,80
|
| 652 |
2152263452,a hierarchical phrase based model for statistical machine translation,1184,10,1044,1342
|
| 653 |
-
2112103637,the bubble cursor enhancing target acquisition by dynamic resizing of the cursor s activation area,0,10,1,
|
| 654 |
2153282521,examining task engagement in sensor based statistical models of human interruptibility,108,10,107,109
|
| 655 |
2138134117,making space for stories ambiguity in the design of personal communication systems,147,10,146,149
|
| 656 |
2150240046,automatic generation of suggestions for program investigation,132,10,127,135
|
|
@@ -658,19 +658,19 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 658 |
2009489720,cute a concolic unit testing engine for c,282,10,258,297
|
| 659 |
2170239024,data structure repair using goal directed reasoning,10,10,10,10
|
| 660 |
2169952536,using structural context to recommend source code examples,70,10,70,70
|
| 661 |
-
2160938265,eliciting design requirements for maintenance oriented ides a detailed study of corrective and perfective maintenance tasks,73,10,
|
| 662 |
1603364293,learning coordination classifiers,7,10,7,7
|
| 663 |
2912387951,solving checkers,51,10,51,51
|
| 664 |
157725869,a probabilistic model of redundancy in information extraction,178,10,176,180
|
| 665 |
1965343327,detecting bgp configuration faults with static analysis,296,10,270,317
|
| 666 |
-
2147278401,automatic pool allocation improving performance by controlling data structure layout in the heap,0,10,
|
| 667 |
1997199152,programming by sketching for bit streaming programs,213,10,208,219
|
| 668 |
-
2159668267,xml data exchange consistency and query answering,0,10,0,
|
| 669 |
-
1963658069,learning to estimate query difficulty including applications to missing content detection and distributed information retrieval,0,10,0,
|
| 670 |
2010859647,coupon replication systems,48,10,47,49
|
| 671 |
-
2110137598,rx treating bugs as allergies a safe method to survive software failures,0,10,
|
| 672 |
2121178808,speculative execution in a distributed file system,96,10,91,101
|
| 673 |
-
2165100126,vigilante end to end containment of internet worms,0,10,
|
| 674 |
2042616792,automation and customization of rendered web pages,220,10,199,225
|
| 675 |
2135552269,cache conscious frequent pattern mining on a modern processor,69,10,69,69
|
| 676 |
1977841655,three level caching for efficient query processing in large web search engines,155,10,154,156
|
|
@@ -686,12 +686,12 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 686 |
2058632086,trickle a self regulating algorithm for code propagation and maintenance in wireless sensor networks,1144,10,660,1530
|
| 687 |
2174598112,recovering device drivers,158,10,154,165
|
| 688 |
2158600037,cloning based context sensitive pointer alias analysis using binary decision diagrams,54,10,53,55
|
| 689 |
-
2092650892,conditional xpath the first order complete xpath dialect,70,10,
|
| 690 |
2134557008,a formal study of information retrieval heuristics,346,10,339,352
|
| 691 |
2116790783,on performance bounds for the integration of elastic and adaptive streaming flows,51,10,50,52
|
| 692 |
1993855803,indexing spatio temporal trajectories with chebyshev polynomials,311,10,306,315
|
| 693 |
1989450868,multi finger gestural interaction with 3d volumetric displays,24,10,24,24
|
| 694 |
-
2088761521,crossy a crossing based drawing application,0,10,0,
|
| 695 |
2097995023,model driven data acquisition in sensor networks,1053,10,941,1173
|
| 696 |
2064716575,automatic detection of fragments in dynamically generated web pages,80,10,80,80
|
| 697 |
2113272343,towards a model of face to face grounding,204,10,201,206
|
|
@@ -704,7 +704,7 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 704 |
2160510992,precise dynamic slicing algorithms,69,10,68,70
|
| 705 |
2112243500,modular verification of software components in c,125,10,124,126
|
| 706 |
1664963465,approximating game theoretic optimal strategies for full scale poker,217,10,215,221
|
| 707 |
-
2061820396,maximizing the spread of influence through a social network,6739,10,
|
| 708 |
2125346056,automatically proving the correctness of compiler optimizations,115,10,113,117
|
| 709 |
1971778458,an information theoretic approach to normal forms for relational and xml data,32,10,31,33
|
| 710 |
2125596620,re examining the potential effectiveness of interactive query expansion,182,10,178,186
|
|
@@ -714,11 +714,11 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 714 |
2295705535,backtracking intrusions,303,10,280,313
|
| 715 |
1971549254,perceptually supported image editing of text and graphics,77,10,76,77
|
| 716 |
2069153192,scaling personalized web search,140,10,138,142
|
| 717 |
-
2169463693,semtag and seeker bootstrapping the semantic web via automated semantic annotation,0,10,
|
| 718 |
1964376592,on computing all abductive explanations,46,10,46,46
|
| 719 |
2154124206,discriminative training and maximum entropy models for statistical machine translation,1063,10,978,1126
|
| 720 |
2098121410,constant round coin tossing with a man in the middle or realizing the shared random string model,163,10,159,167
|
| 721 |
-
2145818650,minimizing congestion in general networks,261,10,
|
| 722 |
2121081915,isolating cause effect chains from computer programs,530,10,377,676
|
| 723 |
2045747317,pattern discovery in sequences under a markov assumption,37,10,37,37
|
| 724 |
2121542813,memory resource management in vmware esx server,1215,10,901,1638
|
|
@@ -729,12 +729,12 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 729 |
2139403546,fast decoding and optimal decoding for machine translation,233,10,231,235
|
| 730 |
2155693943,immediate head parsing for language models,308,10,305,311
|
| 731 |
1960231166,complexity results for structure based causality,88,10,87,89
|
| 732 |
-
2134206624,optimal aggregation algorithms for middleware,1085,10,
|
| 733 |
-
2094661073,temporal summaries of new topics,261,10,
|
| 734 |
2163336863,locally adaptive dimensionality reduction for indexing large time series databases,867,10,834,905
|
| 735 |
2161168778,untrusted hosts and confidentiality secure program partitioning,13,10,12,14
|
| 736 |
-
2053903896,base using abstraction to improve fault tolerance,0,10,
|
| 737 |
-
1994547327,phidgets easy development of physical interfaces through physical widgets,0,10,
|
| 738 |
2130642985,weaving relations for cache performance,327,10,320,334
|
| 739 |
1985727586,engineering server driven consistency for large scale dynamic web services,66,10,66,66
|
| 740 |
2096678443,the game of hex an automatic theorem proving approach to game programming,37,10,37,37
|
|
@@ -742,27 +742,27 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 742 |
2118119027,statistics based summarization step one sentence compression,410,10,404,417
|
| 743 |
2103552898,local search characteristics of incomplete sat procedures,78,10,78,78
|
| 744 |
2159128898,real time tracking of non rigid objects using mean shift,2918,10,2772,3067
|
| 745 |
-
1991962718,hancock a language for extracting signatures from data streams,0,10,
|
| 746 |
2066859698,checking system rules using system specific programmer written compiler extensions,171,10,165,177
|
| 747 |
-
2072737419,dynamo a transparent dynamic optimization system,0,10,
|
| 748 |
-
2035071899,auditing boolean attributes,79,10,75,
|
| 749 |
1985554184,ir evaluation methods for retrieving highly relevant documents,934,10,786,1079
|
| 750 |
-
2202508117,xmill an efficient compressor for xml data,0,10,0,
|
| 751 |
-
2169732913,sensing techniques for mobile interaction,541,10,
|
| 752 |
2175110005,graph structure in the web,35,10,35,35
|
| 753 |
1483940455,proverb the probabilistic cruciverbalist,39,10,39,39
|
| 754 |
2127466278,a distributed case based reasoning application for engineering sales support,47,10,47,47
|
| 755 |
1774901127,learning in natural language,12,10,12,12
|
| 756 |
-
2058732827,metacost a general method for making classifiers cost sensitive,0,10,0,
|
| 757 |
2151200745,io lite a unified i o buffering and caching system,107,10,103,109
|
| 758 |
2108112890,whole program paths,34,10,34,34
|
| 759 |
2043778692,exact and approximate aggregation in constraint query languages,18,10,18,18
|
| 760 |
-
2024181699,cross language information retrieval based on parallel texts and automatic mining of parallel texts from the web,315,10,
|
| 761 |
-
2164049396,dynamat a dynamic view management system for data warehouses,0,10,
|
| 762 |
-
2101915391,manageability availability and performance in porcupine a highly scalable cluster based mail service,0,10,
|
| 763 |
-
2150709314,cellular disco resource management using virtual clusters on shared memory multiprocessors,0,10,0,
|
| 764 |
2156874421,the click modular router,2437,10,693,1923
|
| 765 |
-
2116833128,soft timers efficient microsecond software timer support for network processing,0,10,0,
|
| 766 |
1489992655,focused crawling a new approach to topic specific web resource discovery,1538,10,1081,1863
|
| 767 |
2096037858,learning evaluation functions for global optimization and boolean satisfiability,71,10,71,71
|
| 768 |
2123564449,the interactive museum tour guide robot,500,10,487,515
|
|
@@ -770,19 +770,19 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 770 |
2061628264,expressiveness of structured document query languages based on attribute grammars,55,10,54,56
|
| 771 |
2067970404,a theory of term weighting based on exploratory data analysis,90,10,89,91
|
| 772 |
1997506570,efficient transparent application recovery in client server information systems,43,10,43,43
|
| 773 |
-
2064803206,integrating association rule mining with relational database systems alternatives and implications,0,10,0,
|
| 774 |
2029114021,the interactive multimedia jukebox imj a new paradigm for the on demand delivery of audio video,40,10,40,40
|
| 775 |
1567570606,statistical parsing with a context free grammar and word statistics,562,10,551,581
|
| 776 |
2114975944,building concept representations from reusable components,63,10,63,63
|
| 777 |
1483210996,fast context switching in real time propositional reasoning,39,10,39,39
|
| 778 |
2098854122,a practical algorithm for finding optimal triangulations,74,10,74,74
|
| 779 |
-
1589050831,translingual information retrieval a comparative evaluation,167,10,165,
|
| 780 |
2170913656,analysis and visualization of classifier performance comparison under imprecise class and cost distributions,704,10,666,727
|
| 781 |
282367566,on the complexity of database queries,182,10,164,193
|
| 782 |
1983078185,feature selection perceptron learning and a usability case study for text categorization,127,10,127,128
|
| 783 |
2129938590,fast parallel similarity search in multimedia databases,173,10,172,174
|
| 784 |
-
2153131460,continuous profiling where have all the cycles gone,0,10,0,
|
| 785 |
-
2154766204,disco running commodity operating systems on scalable multiprocessors,0,10,
|
| 786 |
2113913089,integrating reliable memory in databases,32,10,32,32
|
| 787 |
2138637314,a novel application of theory refinement to student modeling,29,10,29,29
|
| 788 |
1600919542,pushing the envelope planning propositional logic and stochastic search,872,10,827,927
|
|
@@ -790,7 +790,7 @@ paper_id,title,citation_best,negative_count,negative_min,negative_max
|
|
| 790 |
2167345029,automatic compiler inserted i o prefetching for out of core applications,203,10,199,213
|
| 791 |
2150769115,safe kernel extensions without run time checking,56,10,53,58
|
| 792 |
2146815834,retrieving spoken documents by combining multiple index sources,115,10,113,117
|
| 793 |
-
2009343025,supporting stored video reducing rate variability and end to end resource requirements through optimal smoothing,398,10,
|
| 794 |
2248022866,exploiting process lifetime distributions for dynamic load balancing,13,10,13,13
|
| 795 |
2143401113,implementing data cubes efficiently,1182,10,1038,1354
|
| 796 |
2128061541,fast subsequence matching in time series databases,1709,10,1220,1943
|
|
|
|
| 1 |
paper_id,title,citation_best,negative_count,negative_min,negative_max
|
| 2 |
3122089757,scaling attributed network embedding to massive graphs,36,10,36,36
|
| 3 |
+
2996908057,winogrande an adversarial winograd schema challenge at scale,396,10,391,402
|
| 4 |
3035507081,beyond accuracy behavioral testing of nlp models with checklist,8,10,8,8
|
| 5 |
3009121097,a design engineering approach for quantitatively exploring context aware sentence retrieval for nonspeaking individuals with motor disabilities,27,10,27,27
|
| 6 |
+
3030254708,articulating experience reflections from experts applying micro phenomenology to design research in hci,0,10,0,109
|
| 7 |
3017640030,beyond the prototype understanding the challenge of scaling hardware device production,22,10,22,22
|
| 8 |
3032514484,bug or feature covert impairments to human computer interaction,6,10,6,6
|
| 9 |
3014972121,co designing checklists to understand organizational challenges and opportunities around fairness in ai,301,10,292,309
|
| 10 |
3013330822,color and animation preferences for a light band ehmi in interactions between automated vehicles and pedestrians,113,10,112,114
|
| 11 |
3029211878,connecting distributed families camera work for three party mobile video calls,33,10,33,33
|
| 12 |
+
3030161855,creating augmented and virtual reality applications current practices challenges and opportunities,185,10,182,188
|
| 13 |
3030528496,design study lite methodology expediting design studies and enabling the synergy of visualization pedagogy and social good,26,10,26,26
|
| 14 |
3029149150,designing ambient narrative based interfaces to reflect and motivate physical activity,48,10,48,48
|
| 15 |
3030460604,exploring how game genre in student designed games influences computational thinking development,25,10,25,25
|
|
|
|
| 34 |
3034925446,tuning free plug and play proximal algorithm for inverse imaging problems,2,10,2,2
|
| 35 |
3002398329,white box fairness testing through adversarial sampling,104,10,103,105
|
| 36 |
3005780259,an empirical study on program failures of deep learning jobs,77,10,77,78
|
| 37 |
+
3090625562,towards the use of the readily available tests from the release pipeline as performance tests are we there yet,0,10,0,304
|
| 38 |
3091518781,time travel testing of android apps,83,10,83,83
|
| 39 |
+
3045552507,here we go again why is it difficult for developers to learn another programming language,0,10,0,78
|
| 40 |
3105398568,big code big vocabulary open vocabulary models for source code,87,10,86,88
|
| 41 |
3103843169,unblind your apps predicting natural language labels for mobile gui components by deep learning,47,10,47,47
|
| 42 |
3100403944,translating video recordings of mobile app usages into replayable scenarios,53,10,53,53
|
| 43 |
3034497099,synthesizing aspect driven recommendation explanations from reviews,12,10,12,12
|
| 44 |
3081170586,on sampled metrics for item recommendation,330,10,328,332
|
| 45 |
+
3021455140,hummingbird energy efficient gps receiver for small satellites,0,10,0,1080
|
| 46 |
+
3023792721,m cube a millimeter wave massive mimo software radio,0,10,0,502
|
| 47 |
3098350529,no regret learning dynamics for extensive form correlated equilibrium,11,10,11,11
|
| 48 |
+
3098903812,language models are few shot learners,12370,10,4246,20318
|
| 49 |
+
3013640143,understanding detecting and localizing partial failures in large system software,17,10,16,18
|
| 50 |
3108362055,hxdp efficient software packet processing on fpga nics,12,10,11,13
|
| 51 |
3093054587,byzantine ordered consensus without byzantine oligarchy,14,10,13,15
|
| 52 |
3095716351,virtual consensus in delos,7,10,6,8
|
|
|
|
| 61 |
3105035347,controlling fairness and bias in dynamic learning to rank,60,10,59,61
|
| 62 |
2995994861,rateless codes for near perfect load balancing in distributed matrix vector multiplication,15,10,15,15
|
| 63 |
3030167386,shapesearch a flexible and efficient system for shape based exploration of trendlines,1,10,1,1
|
| 64 |
+
3028661980,pump up the volume processing large data on gpus with fast interconnects,0,10,2,118
|
| 65 |
3093717762,handmorph a passive exoskeleton that miniaturizes grasp,29,10,28,30
|
| 66 |
3008139924,opportunities for optimism in contended main memory multicore transactions,33,10,33,33
|
| 67 |
3023027202,open intent extraction from natural language interactions,30,10,30,30
|
| 68 |
2963763772,how to combine tree search methods in reinforcement learning,13,10,13,13
|
| 69 |
2964345285,bridging the gap between training and inference for neural machine translation,20,10,20,20
|
| 70 |
+
2940636472,anchored audio sampling a seamless method for exploring children s thoughts during deployment studies,0,10,0,48
|
| 71 |
2935781565,unremarkable ai fitting intelligent decision support into critical clinical decision making processes,72,10,72,73
|
| 72 |
2927052147,increasing the transparency of research papers with explorable multiverse analyses,112,10,111,113
|
| 73 |
+
2941798514,project sidewalk a web based crowdsourcing tool for collecting sidewalk accessibility data at scale,0,10,3,229
|
| 74 |
2940996955,touchstone2 an interactive environment for exploring trade offs in hci experiment design,5,10,5,5
|
| 75 |
2941255702,a translational science model for hci,57,10,57,57
|
| 76 |
+
2942399136,street level algorithms a theory at the gaps between policy and decisions,0,10,0,95
|
| 77 |
+
2942185243,retype quick text editing with keyboard and gaze,0,10,0,131
|
| 78 |
+
2941419932,picme interactive visual guidance for taking requested photo composition,0,10,1,257
|
| 79 |
2941232686,managing messes in computational notebooks,134,10,133,135
|
| 80 |
+
2941123418,think secure from the beginning a survey with software developers,0,10,1,141
|
| 81 |
2964608097,a theory of fermat paths for non line of sight shape reconstruction,121,10,121,121
|
| 82 |
2967591898,empirical review of java program repair tools a large scale experiment on 2 141 bugs and 23 551 repair attempts,3,10,3,3
|
| 83 |
2966914448,generating automated and online test oracles for simulink models with continuous and uncertain behaviors,44,10,43,45
|
|
|
|
| 99 |
2954691065,view centric performance optimization for database backed web applications,18,10,18,18
|
| 100 |
2965266021,boosting for comparison based learning,4,10,4,4
|
| 101 |
2949380784,optimizing impression counts for outdoor advertising,33,10,33,33
|
| 102 |
+
2979514732,ebp a wearable system for frequent and comfortable blood pressure monitoring from user s ear,0,10,0,397
|
| 103 |
2979925109,fluid flexible user interface distribution for ubiquitous multi device interaction,4,10,4,4
|
| 104 |
+
2806709843,datacenter rpcs can be general and fast,40,10,39,43
|
| 105 |
+
2918488807,understanding lifecycle management complexity of datacenter topologies,15,10,14,16
|
| 106 |
2963212338,low latency graph streaming using compressed purely functional trees,1,10,1,1
|
| 107 |
2954738632,continuously reasoning about programs using differential bayesian inference,20,10,20,20
|
| 108 |
2954518791,towards certified separate compilation for concurrent programs,17,10,17,17
|
| 109 |
3104371626,an inductive synthesis framework for verifiable reinforcement learning,72,10,71,73
|
| 110 |
2955231257,a typed algebraic approach to parsing,13,10,13,13
|
| 111 |
3105155462,optimization and abstraction a synergistic approach for analyzing neural network robustness,49,10,48,50
|
| 112 |
+
2948130259,interventional fairness causal database repair for algorithmic fairness,0,10,0,941
|
| 113 |
2963311060,spectre attacks exploiting speculative execution,1495,10,1132,1667
|
| 114 |
2968103728,underwater backscatter networking,99,10,97,101
|
| 115 |
2948795993,variance reduction in gradient exploration for online learning to rank,15,10,15,15
|
| 116 |
2964022882,computationally efficient estimation of the spectral gap of a markov chain,1,10,1,1
|
| 117 |
+
2948130259,interventional fairness causal database repair for algorithmic fairness,0,10,1,255
|
| 118 |
2974073952,scaling symbolic evaluation for automated verification of systems code with serval,63,10,61,65
|
| 119 |
2963620995,the reachability problem for petri nets is not elementary,4,10,4,4
|
| 120 |
2980899416,tiptext eyes free text entry on a fingertip keyboard,70,10,68,72
|
|
|
|
| 126 |
2963033005,learning to ask good questions ranking clarification questions using neural expected value of perfect information,9,10,9,9
|
| 127 |
2963686541,let s do it again a first computational approach to detecting adverbial presupposition triggers,10,10,10,10
|
| 128 |
2796382388,agile 3d sketching with air scaffolding,18,10,18,18
|
| 129 |
+
2796228338,pinpointing precise head and eye based target selection for augmented reality,0,10,1,70
|
| 130 |
+
2795857247,data illustrator augmenting vector design tools with lazy data binding for expressive visualization authoring,0,10,3,26
|
| 131 |
+
2795566406,a stalker s paradise how intimate partner abusers exploit technology,0,10,0,124
|
| 132 |
2787712888,voice interfaces in everyday life,552,10,522,573
|
| 133 |
+
2795389852,let s talk about race identity chatbots and ai,0,10,0,49
|
| 134 |
+
2795783386,semi automated coding for qualitative research a user centered inquiry and initial prototypes,0,10,0,77
|
| 135 |
+
2796076588,wall room scale interactive and context aware sensing,0,10,0,204
|
| 136 |
2795442664,expressive time series querying with hand drawn scale free sketches,51,10,51,51
|
| 137 |
+
2795619128,project zanzibar a portable and flexible tangible interaction platform,0,10,2,193
|
| 138 |
2796058046,extending manual drawing practices with artist centric programming tools,42,10,42,42
|
| 139 |
2964185501,taskonomy disentangling task transfer learning,82,10,82,82
|
| 140 |
2899462170,the impact of regular expression denial of service redos in practice an empirical study at the ecosystem scale,86,10,84,89
|
|
|
|
| 146 |
2963143631,obfuscated gradients give a false sense of security circumventing defenses to adversarial examples,1077,10,1018,1144
|
| 147 |
2965749257,delayed impact of fair machine learning,11,10,11,11
|
| 148 |
3105413283,large scale analysis of framework specific exceptions in android apps,57,10,57,57
|
| 149 |
+
2794889478,spatio temporal context reduction a pointer analysis based static approach for detecting use after free vulnerabilities,0,10,0,32
|
| 150 |
+
2794694213,identifying design problems in the source code a grounded theory,0,10,1,751
|
| 151 |
2795338679,static automated program repair for heap properties,71,10,71,71
|
| 152 |
2962804757,automated localization for unreproducible builds,32,10,32,32
|
| 153 |
2794901250,generalized data structure synthesis,31,10,31,31
|
|
|
|
| 158 |
3092809319,from conjunctive queries to instance queries in ontology mediated querying,1,10,1,1
|
| 159 |
2962756936,what game are we playing end to end learning in normal and extensive form games,56,10,56,56
|
| 160 |
2807873315,commonsense knowledge aware conversation generation with graph attention,517,10,481,532
|
| 161 |
+
3098276446,adversarial attacks on neural networks for graph data,350,10,332,358
|
| 162 |
+
2896992572,skycore moving core to the edge for untethered and reliable uav based lte networks,0,10,3,198
|
| 163 |
2890192685,non delusional q learning and value iteration,27,10,27,27
|
| 164 |
+
2963755523,neural ordinary differential equations,2108,10,1778,2422
|
| 165 |
2798641544,netchain scale free sub rtt coordination,164,10,160,169
|
| 166 |
+
2897044322,rept reverse debugging of failures in deployed software,37,10,34,40
|
| 167 |
2899396876,legoos a disseminated distributed os for hardware resource disaggregation,140,10,134,146
|
| 168 |
2963823348,orca differential bug localization in large scale services,8,10,8,8
|
| 169 |
2964240296,program synthesis using conflict driven learning,101,10,100,102
|
|
|
|
| 175 |
2876796450,inferring persistent interdomain congestion,88,10,88,88
|
| 176 |
2799048248,should i follow the crowd a probabilistic analysis of the effectiveness of popularity in recommender systems,13,10,13,13
|
| 177 |
2771541561,a refined mean field approximation,32,10,32,32
|
| 178 |
+
2798891709,surf practical range query filtering with fast succinct tries,0,10,1,113
|
| 179 |
2896381102,authoring and verifying human robot interactions,52,10,51,53
|
| 180 |
+
2896806675,porta profiling software tutorials using operating system wide activity tracing,0,10,3,77
|
| 181 |
+
2897456565,resi a highly flexible pressure sensitive imperceptible textile interface based on resistive yarns,0,10,0,1003
|
| 182 |
3105298605,the ubiquity of large graphs and surprising challenges of graph processing extended survey,78,10,78,78
|
| 183 |
+
2788150400,highlife higher arity fact harvesting,0,10,0,39
|
| 184 |
2963019788,label free supervision of neural networks with physics and domain knowledge,279,10,276,282
|
| 185 |
2963069394,probabilistic typology deep generative models of vowel inventories,7,10,7,7
|
| 186 |
2591131751,designing gamified applications that make safe driving more engaging,37,10,37,37
|
| 187 |
+
2611348597,illumination aesthetics light as a creative material within computational design,0,10,2,192
|
| 188 |
+
2611579020,sharevr enabling co located experiences for virtual reality between hmd and non hmd users,0,10,1,87
|
| 189 |
+
2611586694,explaining the gap visualizing one s predictions improves recall and comprehension of data,0,10,2,85
|
| 190 |
2611474773,what is interaction,137,10,136,138
|
| 191 |
+
2610874624,bignav bayesian information gain for guiding multiscale navigation,0,10,0,573
|
| 192 |
2611632447,modelling learning of new keyboard layouts,47,10,47,47
|
| 193 |
+
2610281177,flash organizations crowdsourcing complex work by structuring crowds as organizations,0,10,0,33
|
| 194 |
+
2610874523,reflective practicum a framework of sensitising concepts to design for transformative reflection,0,10,0,161
|
| 195 |
2610929834,fingertip tactile devices for virtual object manipulation and exploration,134,10,133,135
|
| 196 |
2558581619,what can be predicted from six seconds of driver glances,47,10,47,47
|
| 197 |
2610414453,design and evaluation of a data driven password meter,118,10,117,119
|
|
|
|
| 220 |
2618267215,verified models and reference implementations for the tls 1 3 standard candidate,168,10,165,172
|
| 221 |
2744387122,re architecting datacenter networks and stacks for low latency and high performance,316,10,305,324
|
| 222 |
2743093301,language directed hardware design for network performance monitoring,234,10,231,236
|
| 223 |
+
2742124187,bitfunnel revisiting signatures for search,0,10,0,177
|
| 224 |
2576238278,accelerating performance inference over closed systems by asymptotic methods,5,10,5,5
|
| 225 |
2613088476,parallelizing sequential graph computations,37,10,37,37
|
| 226 |
3101492167,the efficient server audit problem deduplicated re execution and the web,15,10,14,16
|
| 227 |
+
2616028256,deepxplore automated whitebox testing of deep learning systems,0,10,0,157
|
| 228 |
2765855860,triggering artwork swaps for live animation,16,10,15,16
|
| 229 |
+
2766544714,grabity a wearable haptic interface for simulating weight and grasping in virtual reality,0,10,0,54
|
| 230 |
+
3106143313,aircode unobtrusive physical tags for digital fabrication,0,10,2,129
|
| 231 |
2583856578,provenance for natural language queries,31,10,31,31
|
| 232 |
2566652907,bidirectional search that is guaranteed to meet in the middle,46,10,46,46
|
| 233 |
2515120005,finding non arbitrary form meaning systematicity using string metric learning for kernel regression,27,10,27,27
|
| 234 |
2407293509,the effect of visual appearance on the performance of continuous sliders and visual analogue scales,92,10,91,92
|
| 235 |
2395063354,object oriented drawing,93,10,93,93
|
| 236 |
2400260714,enabling designers to foresee which colors users cannot see,38,10,38,38
|
| 237 |
+
2347171008,i don t want to wear a screen probing perceptions of and possibilities for dynamic displays on clothing,0,10,0,116
|
| 238 |
+
2346915687,rapid a framework for fabricating low latency interactive objects with rfid tags,0,10,0,56
|
| 239 |
+
2339558352,haptic wave a cross modal interface for visually impaired audio producers,0,10,0,40
|
| 240 |
+
2395423607,flexcase enhancing mobile interaction with a flexible sensing and display cover,0,10,0,106
|
| 241 |
2408438722,understanding and mitigating the effects of device and cloud service design decisions on the environmental footprint of digital infrastructure,101,10,100,102
|
| 242 |
2406854312,enhancing cross device interaction scripting with interactive illustrations,27,10,27,27
|
| 243 |
+
2402939184,learn piano with bach an adaptive learning interface that adjusts task difficulty based on brain state,0,10,0,84
|
| 244 |
+
2400074865,smart touch improving touch accuracy for people with motor impairments with template matching,0,10,2,191
|
| 245 |
2396533648,building a personalized auto calibrating eye tracker from user interactions,68,10,68,68
|
| 246 |
+
2394670422,developing and validating the user burden scale a tool for assessing user burden in computing systems,0,10,0,321
|
| 247 |
2400341429,foraging among an overabundance of similar variants,43,10,43,43
|
| 248 |
2396662988,finding email in a multi account multi device world,32,10,32,32
|
| 249 |
+
3103319922,empath understanding topic signals in large scale text,0,10,1,73
|
| 250 |
+
2398012670,lock n lol group based limiting assistance app to mitigate smartphone distractions in group activities,0,10,0,377
|
| 251 |
2194775991,deep residual learning for image recognition,4350,10,3806,4771
|
| 252 |
2548627465,api code recommendation using statistical learning from fine grained changes,156,10,149,163
|
| 253 |
2547900581,detecting sensitive data disclosure via bi directional text correlation analysis,24,10,24,24
|
|
|
|
| 261 |
2393286498,feedback directed instrumentation for deployed javascript applications,18,10,18,18
|
| 262 |
2387719207,from word embeddings to document similarities for improved information retrieval in software engineering,286,10,281,291
|
| 263 |
2294434616,guiding dynamic symbolic execution toward unverified program executions,85,10,85,85
|
| 264 |
+
2367183013,on the techniques we create the tools we build and their misalignments a study of klee,0,10,0,72
|
| 265 |
2381207137,termination checking for llvm peephole optimizations,11,10,11,11
|
| 266 |
+
2374182234,vdtest an automated framework to support testing for virtual devices,0,10,0,257
|
| 267 |
+
2144160189,work practices and challenges in pull based development the contributor s perspective,0,10,0,42
|
| 268 |
+
2348679751,fraudar bounding graph fraud in the face of camouflage,0,10,4,37
|
| 269 |
2964077562,value iteration networks,241,10,238,244
|
| 270 |
2412123704,passive wi fi bringing low power to wi fi transmissions,256,10,238,274
|
| 271 |
2575735093,ryoan a distributed sandbox for untrusted computation on secret data,166,10,162,173
|
| 272 |
2522470548,early detection of configuration errors to reduce failure damage,1,10,0,2
|
| 273 |
+
2576393274,push button verification of file systems via crash refinement,53,10,49,56
|
| 274 |
2414762192,into the depths of c elaborating the de facto standards,14,10,14,14
|
| 275 |
2413028252,transactional data structure libraries,7,10,7,7
|
| 276 |
2386500332,types from data making structured data first class citizens in f,4,10,4,4
|
|
|
|
| 280 |
2488197787,don t mind the gap bridging network wide objectives and device level configurations,6,10,6,6
|
| 281 |
2488265751,eliminating channel feedback in next generation cellular networks,134,10,132,136
|
| 282 |
2495264776,inter technology backscatter towards internet connectivity for implanted devices,23,10,23,23
|
| 283 |
+
2340380384,understanding information need an fmri study,0,10,8,419
|
| 284 |
+
2421547754,wander join online aggregation via random walks,0,10,0,846
|
| 285 |
2963024133,reed muller codes achieve capacity on erasure channels,44,10,43,45
|
| 286 |
+
2537074996,rovables miniature on body robots as mobile wearables,0,10,1,129
|
| 287 |
+
2533619018,zooids building blocks for swarm user interfaces,0,10,1,38
|
| 288 |
+
2539017927,procover sensory augmentation of prosthetic limbs using smart textile covers,0,10,6,183
|
| 289 |
+
2538172027,viband high fidelity bio acoustic sensing using commodity smartwatch accelerometers,0,10,0,158
|
| 290 |
2535724050,compressed linear algebra for large scale machine learning,75,10,75,75
|
| 291 |
2262364653,social networks under stress,6,10,6,6
|
| 292 |
2211594368,from non negative to general operator cost partitioning,77,10,77,77
|
| 293 |
+
1974329625,affordance allowing objects to communicate dynamic use,0,10,0,63
|
| 294 |
+
2077940530,velocitap investigating fast mobile text entry using sentence based decoding of touchscreen keyboard input,0,10,0,42
|
| 295 |
+
2171022339,what makes interruptions disruptive a process model account of the effects of the problem state bottleneck on task interruption and resumption,0,10,2,186
|
| 296 |
1993143504,lightweight relief shearing for enhanced terrain perception on interactive maps,40,10,40,40
|
| 297 |
+
2071865879,patina engraver visualizing activity logs as patina in fashionable trackers,0,10,0,919
|
| 298 |
+
2148163144,baselase an interactive focus context laser floor,0,10,0,63
|
| 299 |
2163444123,iskin flexible stretchable and visually customizable on body touch sensors for mobile computing,9,10,9,9
|
| 300 |
+
2193303691,acoustruments passive acoustically driven interactive controls for handheld devices,0,10,0,181
|
| 301 |
+
2071620178,sharing is caring assistive technology designs on thingiverse,0,10,4,41
|
| 302 |
+
1964639420,colourid improving colour identification for people with impaired colour vision,0,10,1,147
|
| 303 |
1938204631,dynamicfusion reconstruction and tracking of non rigid scenes in real time,927,10,915,939
|
| 304 |
2136601052,multise multi path symbolic execution using value summaries,101,10,100,102
|
| 305 |
2015187825,measure it manage it ignore it software practitioners and technical debt,244,10,235,257
|
|
|
|
| 320 |
1495444061,a messy state of the union taming the composite state machines of tls,208,10,206,210
|
| 321 |
1536141561,riposte an anonymous messaging system handling millions of users,117,10,117,118
|
| 322 |
2094739364,central control over distributed routing,139,10,136,142
|
| 323 |
+
2070299948,quickscorer a fast algorithm to rank documents with additive ensembles of regression trees,0,10,0,182
|
| 324 |
2009122315,spy vs spy rumor source obfuscation,1,10,1,1
|
| 325 |
+
2092799168,dbscan revisited mis claim un fixability and approximation,0,10,10,836
|
| 326 |
2049314312,pivot tracing dynamic causal monitoring for distributed systems,18,10,16,20
|
| 327 |
2411173678,using crash hoare logic for certifying the fscq file system,182,10,177,190
|
| 328 |
2412033124,coz finding code that counts with causal profiling,3,10,3,3
|
| 329 |
+
2197150605,foldio digital fabrication of interactive and shape changing objects with foldable printed electronics,0,10,1,153
|
| 330 |
+
2176017127,orbits gaze interaction for smart watches using smooth pursuit eye movements,0,10,1,260
|
| 331 |
+
2271345687,webstrates shareable dynamic media,0,10,0,118
|
| 332 |
2269738476,constructing an interactive natural language interface for relational databases,404,10,393,415
|
| 333 |
+
3125781181,hyptrails a bayesian approach for comparing hypotheses about human trails on the web,0,10,0,79
|
| 334 |
151167705,recovering from selection bias in causal and statistical inference,85,10,85,85
|
| 335 |
2251682575,fast and robust neural network joint models for statistical machine translation,496,10,492,503
|
| 336 |
+
2137864660,consumed endurance a metric to quantify arm fatigue of mid air interactions,0,10,0,112
|
| 337 |
+
2147149886,duet exploring joint interactions on a smart phone and a smart watch,0,10,2,40
|
| 338 |
+
2081933842,type hover swipe in 96 bytes a motion sensing mechanical keyboard,0,10,0,83
|
| 339 |
2005996634,effects of display size and navigation type on a classification task,73,10,73,73
|
| 340 |
+
2094690640,mixfab a mixed reality environment for personal fabrication,0,10,1,63
|
| 341 |
2047781873,real time feedback for improving medication taking,67,10,67,67
|
| 342 |
2162409443,structured labeling for facilitating concept evolution in machine learning,99,10,98,100
|
| 343 |
2117160827,towards accurate and practical predictive models of active vision based visual search,31,10,31,31
|
| 344 |
+
2051295909,retrodepth 3d silhouette sensing for high precision input on and above physical surfaces,0,10,0,498
|
| 345 |
2124910144,understanding multitasking through parallelized strategy exploration and individualized cognitive modeling,19,10,19,19
|
| 346 |
+
2106612861,making sustainability sustainable challenges in the design of eco interaction technologies,0,10,0,72
|
| 347 |
2102147011,selection and presentation practices for code example summarization,34,10,34,34
|
| 348 |
2140609933,learning natural coding conventions,377,10,296,451
|
| 349 |
2041235686,ai a lightweight system for tolerating concurrency bugs,13,10,13,13
|
| 350 |
2096146112,powering the static driver verifier using corral,40,10,39,41
|
| 351 |
+
159693449,understanding the limiting factors of topic modeling via posterior contraction analysis,166,10,164,167
|
| 352 |
2056659466,a study and toolkit for asynchronous programming in c,54,10,54,54
|
| 353 |
2080395944,cowboys ankle sprains and keepers of quality how is video game development different from software development,170,10,168,172
|
| 354 |
1970005004,enhancing symbolic execution with veritesting,212,10,209,216
|
|
|
|
| 357 |
2090907135,understanding javascript event based interactions,64,10,64,64
|
| 358 |
2050127001,unit test virtualization with vmvm,80,10,79,80
|
| 359 |
2052261215,reducing the sampling complexity of topic models,228,10,225,230
|
| 360 |
+
2069973845,tagoram real time tracking of mobile rfid tags to high precision using cots devices,0,10,1,188
|
| 361 |
2963056065,asymmetric lsh alsh for sublinear time maximum inner product search mips,266,10,264,267
|
| 362 |
+
2155216527,software dataplane verification,40,10,39,43
|
| 363 |
2096915479,arrakis the operating system is the control plane,222,10,208,236
|
| 364 |
1852007091,shielding applications from an untrusted cloud with haven,430,10,371,475
|
| 365 |
2169414316,ix a protected dataplane operating system for high throughput and low latency,278,10,253,303
|
| 366 |
2170737051,compiler validation via equivalence modulo inputs,174,10,167,180
|
| 367 |
2057510141,improving javascript performance by deconstructing the type system,14,10,14,14
|
| 368 |
2050680750,on abstraction refinement for program analyses in datalog,79,10,78,80
|
| 369 |
+
2077542434,weaker forms of monotonicity for declarative networking a more fine grained answer to the calm conjecture,0,10,1,384
|
| 370 |
2031015560,secure multiparty computations on bitcoin,351,10,342,361
|
| 371 |
2099619158,balancing accountability and privacy in the network,34,10,34,34
|
| 372 |
+
2157990152,conga distributed congestion aware load balancing for datacenters,0,10,1,197
|
| 373 |
2089455813,partitioned elias fano indexes,127,10,127,128
|
| 374 |
319976220,concave switching in single and multihop networks,22,10,22,22
|
| 375 |
2099102906,materialization optimizations for feature selection workloads,111,10,110,112
|
| 376 |
2106941316,sensing techniques for tablet stylus interaction,64,10,61,67
|
| 377 |
2028953510,expert crowdsourcing with flash teams,215,10,199,225
|
| 378 |
+
2144575742,printscreen fabricating highly customizable thin film touch displays,0,10,1,110
|
| 379 |
2243512312,the uncracked pieces in database cracking,66,10,66,66
|
| 380 |
1597017619,epic an extensible and scalable system for processing big data,13,10,13,13
|
| 381 |
+
2294510862,m4 a visualization oriented time series data aggregation,0,10,4,301
|
| 382 |
2797202077,building efficient query engines in a high level language,100,10,100,101
|
| 383 |
2229053133,on k path covers and their applications,52,10,52,52
|
| 384 |
2060170830,efficient estimation for high similarities using odd sketches,63,10,62,63
|
|
|
|
| 388 |
2052209137,weighted graph comparison techniques for brain connectivity analysis,165,10,163,167
|
| 389 |
2158892938,analyzing user generated youtube videos to understand touchscreen use by people with motor impairments,137,10,136,138
|
| 390 |
2128640376,improving navigation based file retrieval,30,10,30,30
|
| 391 |
+
2168214746,sprweb preserving subjective responses to website colour schemes through automatic recolouring,0,10,1,61
|
| 392 |
+
1986345088,the efficacy of human post editing for language translation,185,10,182,188
|
| 393 |
+
2147603330,turkopticon interrupting worker invisibility in amazon mechanical turk,0,10,2,83
|
| 394 |
+
2166713718,illumiroom peripheral projected illusions for interactive experiences,0,10,0,66
|
| 395 |
+
2007644286,webzeitgeist design mining the web,0,10,1,39
|
| 396 |
+
2057073649,laserorigami laser cutting 3d objects,0,10,1,102
|
| 397 |
2056225838,labor dynamics in a mobile micro task market,106,10,105,107
|
| 398 |
+
2015143364,job opportunities through entertainment virally spread speech based services for low literate users,0,10,0,41
|
| 399 |
+
2109727442,screenfinity extending the perception area of content on very large public displays,0,10,0,345
|
| 400 |
2025802550,reasons to question seven segment displays,19,10,19,19
|
| 401 |
2122146326,fast accurate detection of 100 000 object classes on a single machine,320,10,320,321
|
| 402 |
2135166986,from large scale image categorization to entry level categories,107,10,106,108
|
|
|
|
| 408 |
2250922733,flexibility and decoupling in the simple temporal problem,7,10,7,7
|
| 409 |
2141336889,whole home gesture recognition using wireless signals,980,10,916,1130
|
| 410 |
2126709939,scalable influence estimation in continuous time diffusion networks,141,10,140,141
|
| 411 |
+
73604409,embassies radically refactoring the web,32,10,31,33
|
| 412 |
2157216158,a general constraint centric scheduling framework for spatial architectures,65,10,64,66
|
| 413 |
+
2047068447,clap recording local executions to reproduce concurrency failures,0,10,0,174
|
| 414 |
+
2048025009,static analysis for probabilistic programs inferring whole program properties from finitely many paths,0,10,7,528
|
| 415 |
2063553958,reconciling exhaustive pattern matching with objects,1,10,1,1
|
| 416 |
2018746447,pinocchio nearly practical verifiable computation,774,10,725,792
|
| 417 |
2099461393,ambient backscatter wireless communication out of thin air,65,10,64,65
|
| 418 |
2159205954,beliefs and biases in web search,153,10,152,154
|
| 419 |
2145432435,queueing system topologies with limited flexibility,32,10,32,32
|
| 420 |
2002203222,massive graph triangulation,132,10,130,133
|
| 421 |
+
2104670257,the scalable commutativity rule designing scalable software for multicore processors,0,10,0,475
|
| 422 |
+
1978364288,towards optimization safe systems analyzing the impact of undefined behavior,0,10,0,1601
|
| 423 |
+
2082171780,naiad a timely dataflow system,0,10,0,544
|
| 424 |
+
2150549828,pneui pneumatically actuated soft composite materials for shape changing interfaces,0,10,0,278
|
| 425 |
+
2109018459,touch activate adding interactivity to existing objects using active acoustic sensing,0,10,1,80
|
| 426 |
+
2001716033,fiberio a touchscreen that senses fingerprints,0,10,0,24
|
| 427 |
2033201131,disc diversity result diversification based on dissimilarity and coverage,3,10,3,3
|
| 428 |
+
2127411301,no country for old members user lifecycle and linguistic change in online communities,0,10,0,639
|
| 429 |
2293636571,learning svm classifiers with indefinite kernels,27,10,27,27
|
| 430 |
1512874001,document summarization based on data reconstruction,118,10,118,118
|
| 431 |
2159250884,bayesian symbol refined tree substitution grammars for syntactic parsing,44,10,44,44
|
| 432 |
2136345490,observational and experimental investigation of typing behaviour using virtual keyboards for mobile devices,96,10,95,97
|
| 433 |
2126298837,the normal natural troubles of driving with gps,105,10,104,106
|
| 434 |
2060696172,improving command selection with commandmaps,64,10,64,64
|
| 435 |
+
2132962756,communitysourcing engaging local crowds to perform expert work via physical kiosks,0,10,2,76
|
| 436 |
+
2088182082,touche enhancing touch interaction on humans screens liquids and everyday objects,0,10,0,451
|
| 437 |
2166132393,detecting error related negativity for interaction design,63,10,63,63
|
| 438 |
1974923332,using rhythmic patterns as an input method,38,10,38,38
|
| 439 |
+
2168953163,revisiting the jacquard loom threads of history and current patterns in hci,0,10,0,136
|
| 440 |
+
2018499862,clayvision the elastic image of the city,0,10,0,82
|
| 441 |
+
2148787816,seeking the ground truth a retroactive study on the evolution and migration of software libraries,0,10,0,54
|
| 442 |
1965085982,scalable test data generation from multidimensional models,16,10,16,16
|
| 443 |
2098278465,using dynamic analysis to discover polynomial and array invariants,70,10,70,70
|
| 444 |
2131008594,automated detection of client state manipulation vulnerabilities,11,10,11,11
|
|
|
|
| 451 |
2095156129,don t trust satellite phones a security analysis of two satphone standards,66,10,66,66
|
| 452 |
2113551315,multi resource fair queueing for packet processing,41,10,41,41
|
| 453 |
2029009258,time based calibration of effectiveness measures,174,10,172,176
|
| 454 |
+
2101221989,temperature management in data centers why some might like it hot,0,10,0,38
|
| 455 |
+
2123458705,high performance complex event processing over xml streams,63,10,62,64
|
| 456 |
+
2113331157,jamming user interfaces programmable particle stiffness and sensing for malleable and shape changing devices,0,10,0,60
|
| 457 |
+
2010127311,cliplets juxtaposing still and dynamic imagery,0,10,0,91
|
| 458 |
+
2167913131,crowdscape interactively visualizing user behavior and output,0,10,1,112
|
| 459 |
2005499394,dense subgraph maintenance under streaming edge weight updates for real time story identification,102,10,101,103
|
| 460 |
1982139456,counting beyond a yottabyte or how sparql 1 1 property paths will prevent adoption of the standard,123,10,122,124
|
| 461 |
57159709,complexity of and algorithms for borda manipulation,75,10,75,75
|
| 462 |
2142523187,unsupervised part of speech tagging with bilingual graph based projections,258,10,254,262
|
| 463 |
+
2075779758,bricolage example based retargeting for web design,0,10,1,384
|
| 464 |
2022815033,mid air pan and zoom on wall sized displays,202,10,199,205
|
| 465 |
+
2153391061,why is my internet slow making network speeds visible,0,10,0,75
|
| 466 |
+
2146852151,synchronous interaction among hundreds an evaluation of a conference in an avatar based virtual environment,0,10,0,345
|
| 467 |
+
2105697580,your noise is my command sensing gestures using the body as an antenna,0,10,0,211
|
| 468 |
2081964782,enhancing physicality in touch interaction with programmable friction,131,10,130,132
|
| 469 |
+
2136691781,usable gestures for blind people understanding preference and performance,0,10,0,42
|
| 470 |
+
2127473562,automics souvenir generating photoware for theme parks,0,10,0,289
|
| 471 |
+
2097331574,effects of community size and contact rate in synchronous social q a,0,10,0,90
|
| 472 |
2153207410,review spotlight a user interface for summarizing user generated reviews using adjective noun word pairs,0,10,0,226
|
| 473 |
+
1986692274,ease of juggling studying the effects of manual multitasking,0,10,0,106
|
| 474 |
2069121074,a polylogarithmic competitive algorithm for the k server problem,65,10,63,67
|
| 475 |
2107220315,proving programs robust,139,10,132,145
|
| 476 |
2167626029,proactive detection of collaboration conflicts,202,10,195,203
|
|
|
|
| 478 |
2963584844,computational rationalization the inverse equilibrium problem,20,10,20,20
|
| 479 |
2111765806,run time efficient probabilistic model checking,191,10,187,195
|
| 480 |
2119142490,verifying multi threaded software using smt based context bounded model checking,131,10,129,133
|
| 481 |
+
2106860490,programs tests and oracles the foundations of testing revisited,0,10,2,665
|
| 482 |
2116907335,on demand feature recommendations derived from mining public product descriptions,142,10,141,143
|
| 483 |
+
2162439064,configuring global software teams a multi company analysis of project productivity quality and profits,0,10,1,325
|
| 484 |
89766480,nested rollout policy adaptation for monte carlo tree search,100,10,99,101
|
| 485 |
+
2044879407,leakage in data mining formulation detection and avoidance,0,10,0,1062
|
| 486 |
2138961375,e mili energy minimizing idle listening in wireless networks,136,10,129,142
|
| 487 |
2126541908,detecting driver phone use leveraging car speakers,206,10,195,217
|
| 488 |
+
174578849,serverswitch a programmable and high performance platform for data center networks,129,10,126,132
|
| 489 |
1515106148,design implementation and evaluation of congestion control for multipath tcp,582,10,515,647
|
| 490 |
2137824953,data representation synthesis,5,10,5,5
|
| 491 |
2095609152,data exchange beyond complete data,30,10,29,31
|
| 492 |
2099129595,phonotactic reconstruction of encrypted voip conversations hookt on fon iks,117,10,117,118
|
| 493 |
+
2008251177,find it if you can a game for modeling different types of web search success using interaction data,0,10,0,380
|
| 494 |
2136110891,topology discovery of sparse random graphs with few participants,38,10,37,38
|
| 495 |
+
2115799249,entangled queries enabling declarative data driven coordination,0,10,0,1943
|
| 496 |
+
2066383384,cells a virtual mobile smartphone architecture,0,10,0,239
|
| 497 |
+
1995790197,a file is not a file understanding the i o behavior of apple desktop applications,0,10,0,789
|
| 498 |
+
2166493117,sidebyside ad hoc multi user interaction with handheld projectors,0,10,0,155
|
| 499 |
2130846554,remusdb transparent high availability for database systems,46,10,46,46
|
| 500 |
2164173709,towards a theory model for product search,59,10,58,60
|
| 501 |
1538864647,a novel transition based encoding scheme for planning as satisfiability,54,10,54,54
|
|
|
|
| 504 |
2124318441,how does search behavior change as search becomes more difficult,202,10,199,205
|
| 505 |
2119188105,the tower of babel meets web 2 0 user generated content and its applications in a multilingual context,33,10,33,33
|
| 506 |
2155385126,occlusion aware interfaces,67,10,67,67
|
| 507 |
+
2169709590,skinput appropriating the body as an input surface,0,10,0,112
|
| 508 |
+
2129146498,lumino tangible blocks for tabletop computers based on glass fiber bundles,0,10,0,313
|
| 509 |
+
2158447593,prefab implementing advanced behaviors using pixel based reverse engineering of interface structure,0,10,0,149
|
| 510 |
+
2120326355,useful junk the effects of visual embellishment on comprehension and memorability of charts,0,10,0,78
|
| 511 |
2056637671,staged concurrent program analysis,53,10,52,54
|
| 512 |
+
2082638814,developer fluency achieving true mastery in software projects,0,10,0,169
|
| 513 |
+
2166271660,creating and evolving developer documentation understanding the decisions of open source contributors,0,10,1,39
|
| 514 |
2169970157,collaborative reliability prediction of service oriented systems,245,10,239,251
|
| 515 |
2127190390,a degree of knowledge model to capture source code familiarity,123,10,122,124
|
| 516 |
2122987719,a machine learning approach for tracing regulatory codes to product specific requirements,180,10,177,182
|
|
|
|
| 521 |
2911611915,reverse traceroute,133,10,131,135
|
| 522 |
2145467766,efficient system enforced deterministic parallelism,1,10,0,2
|
| 523 |
1893312510,the turtles project design and implementation of nested virtualization,239,10,222,253
|
| 524 |
+
2141729404,safe to the last instruction automated verification of a type safe operating system,0,10,0,501
|
| 525 |
2103126020,an optimal algorithm for the distinct elements problem,330,10,284,375
|
| 526 |
1985225657,scifi a system for secure face identification,231,10,225,236
|
| 527 |
2097460929,efficient error estimating coding feasibility and applications,21,10,21,21
|
| 528 |
+
2109913881,assessing the scenic route measuring the value of search trails in web logs,0,10,0,90
|
| 529 |
2152475116,load balancing via random local search in closed and open systems,10,10,10,10
|
| 530 |
2151224499,fast fast architecture sensitive tree search on modern cpus and gpus,0,10,0,111
|
| 531 |
2912359042,qip pspace,57,10,56,58
|
| 532 |
+
2090048052,vizwiz nearly real time answers to visual questions,0,10,0,82
|
| 533 |
2161163216,towards certain fixes with editing rules and master data,117,10,116,117
|
| 534 |
2171279286,factorizing personalized markov chains for next basket recommendation,2199,10,1476,2356
|
| 535 |
2124142520,predicting tie strength with social media,1367,10,1019,1748
|
| 536 |
2116041277,undo and erase events as indicators of usability problems,39,10,39,39
|
| 537 |
+
2162065809,from interaction to trajectories designing coherent journeys through user experiences,0,10,0,76
|
| 538 |
+
2144024567,sizing the horizon the effects of chart size and layering on the graphical perception of time series visualizations,0,10,0,200
|
| 539 |
+
2061766138,social immersive media pursuing best practices for multi user interactive camera projector exhibits,0,10,1,158
|
| 540 |
+
2097298348,ephemeral adaptation the use of gradual onset to improve menu selection performance,0,10,0,70
|
| 541 |
2073961002,asserting and checking determinism for multithreaded programs,69,10,68,69
|
| 542 |
+
2136880809,darwin an approach for debugging evolving programs,0,10,0,183
|
| 543 |
2059215200,graph based mining of multiple object usage patterns,297,10,258,296
|
| 544 |
2142037471,discriminative models for multi class object layout,282,10,280,284
|
| 545 |
2132800423,effective static deadlock detection,178,10,177,181
|
|
|
|
| 548 |
2156883549,invariant based automatic testing of ajax user interfaces,201,10,196,206
|
| 549 |
1528986923,consequence driven reasoning for horn shiq ontologies,183,10,180,185
|
| 550 |
2080320419,collaborative filtering with temporal dynamics,1132,10,1062,1165
|
| 551 |
+
2135573205,centaur realizing the full potential of centralized wlans through a hybrid data path,0,10,0,787
|
| 552 |
1519889149,trinc small trusted hardware for large distributed systems,147,10,144,149
|
| 553 |
1693562991,sora high performance software radio using general purpose multi core processors,265,10,256,271
|
| 554 |
2148707178,binary analysis for measurement and attribution of program performance,57,10,56,58
|
| 555 |
2062340141,native client a sandbox for portable untrusted x86 native code,540,10,512,569
|
| 556 |
2150957281,white space networking with wi fi like connectivity,396,10,388,403
|
| 557 |
2134842174,sources of evidence for vertical selection,203,10,201,206
|
| 558 |
+
2169045095,the age of gossip spatial mean field regime,0,10,0,41
|
| 559 |
2126354234,generating example data for dataflow programs,58,10,58,58
|
| 560 |
+
2133394135,fawn a fast array of wimpy nodes,0,10,0,88
|
| 561 |
+
2151062909,routebricks exploiting parallelism to scale software routers,0,10,0,169
|
| 562 |
+
2136310957,sel4 formal verification of an os kernel,0,10,16,303
|
| 563 |
+
2139459444,mouse 2 0 multi touch meets the mouse,0,10,0,260
|
| 564 |
2120342618,a unified approach to ranking in probabilistic databases,151,10,150,151
|
| 565 |
192051504,optimal false name proof voting rules with costly voting,41,10,41,41
|
| 566 |
1816489643,how good is almost perfect,107,10,107,107
|
|
|
|
| 574 |
2122633358,efficient online monitoring of web service slas,142,10,139,147
|
| 575 |
2103188316,recommending adaptive changes for framework evolution,97,10,97,98
|
| 576 |
2154843497,precise memory leak detection for java software using container profiling,142,10,141,143
|
| 577 |
+
2164372721,debugging reinvented asking and answering why and why not questions about program behavior,0,10,0,72
|
| 578 |
+
2130243914,predicting accurate and actionable static analysis warnings an experimental approach,0,10,1,37
|
| 579 |
2171183905,assessment of urban scale wireless networks with a small number of measurements,79,10,77,81
|
| 580 |
1572904055,remus high availability via asynchronous virtual machine replication,567,10,502,646
|
| 581 |
1598241463,consensus routing the internet as a distributed system,87,10,85,89
|
|
|
|
| 583 |
1493893823,dryadlinq a system for general purpose distributed data parallel computing using a high level language,708,10,561,767
|
| 584 |
2216311525,difference engine harnessing memory redundancy in virtual machines,185,10,175,187
|
| 585 |
2143472559,pacemakers and implantable cardiac defibrillators software radio attacks and zero power defenses,725,10,681,770
|
| 586 |
+
2103331800,zigzag decoding combating hidden terminals in wireless networks,0,10,1,55
|
| 587 |
2005689470,algorithmic mediation for collaborative exploratory search,181,10,178,182
|
| 588 |
+
2059739152,counter braids a novel counter architecture for per flow measurement,0,10,1,77
|
| 589 |
1987358714,serializable isolation for snapshot databases,173,10,172,174
|
| 590 |
2171901130,scalable network distance browsing in spatial databases,307,10,301,311
|
| 591 |
2140190783,bringing physics to the surface,194,10,183,204
|
| 592 |
+
2018989507,finding frequent items in data streams,559,10,534,584
|
| 593 |
2141463661,constrained physical design tuning,36,10,36,36
|
| 594 |
+
2145990704,irlbot scaling to 6 billion pages and beyond,0,10,0,43
|
| 595 |
2146447174,plow a collaborative task learning agent,151,10,150,151
|
| 596 |
1902527071,thresholded rewards acting optimally in timed zero sum games,13,10,13,13
|
| 597 |
2121465811,learning synchronous grammars for semantic parsing with lambda calculus,331,10,324,338
|
| 598 |
2117601224,authoring sensor based interactions by demonstration with direct manipulation and pattern recognition,149,10,148,150
|
| 599 |
2006550435,consuming video on mobile devices,194,10,190,196
|
| 600 |
+
2131801294,multiview improving trust in group video conferencing through spatial faithfulness,0,10,0,171
|
| 601 |
+
2108518773,shift a technique for operating pen based interfaces using touch,0,10,1,61
|
| 602 |
+
2057359302,software or wetware discovering when and why people use digital prosthetic memory,0,10,0,93
|
| 603 |
+
2168233682,sustainable interaction design invention disposal renewal reuse,0,10,1,139
|
| 604 |
+
2144409879,dynamic 3d scene analysis from a moving vehicle,302,10,300,302
|
| 605 |
3127778049,space efficient identity based encryption without pairings,3,10,3,3
|
| 606 |
2167671111,mining specifications of malicious behavior,280,10,258,297
|
| 607 |
2112380328,automatic consistency assessment for query results in dynamic environments,14,10,14,14
|
|
|
|
| 614 |
110738662,automated heart wall motion abnormality detection from ultrasound images using bayesian networks,43,10,43,43
|
| 615 |
57770583,performance analysis of online anticipatory algorithms for large multistage stochastic integer programs,35,10,35,35
|
| 616 |
1552944591,building structure into local search for sat,39,10,39,39
|
| 617 |
+
1576549127,life death and the critical transition finding liveness bugs in systems code,184,10,175,191
|
| 618 |
2071286129,fault tolerant typed assembly language,36,10,35,36
|
| 619 |
+
2153578567,the ant and the grasshopper fast and accurate pointer analysis for millions of lines of code,0,10,3,597
|
| 620 |
2149156280,studying the use of popular destinations to enhance web search interaction,201,10,199,203
|
| 621 |
2066262685,modeling the relative fitness of storage,15,10,15,15
|
| 622 |
2077449561,compiling mappings to bridge applications and databases,50,10,50,50
|
| 623 |
2035801804,scalable approximate query processing with the dbo engine,80,10,80,80
|
| 624 |
+
2108026089,sinfonia a new paradigm for building scalable distributed systems,0,10,0,693
|
| 625 |
+
2139359217,zyzzyva speculative byzantine fault tolerance,0,10,1,393
|
| 626 |
2166510103,secure web applications via automatic partitioning,245,10,234,262
|
| 627 |
+
2140280838,thinsight versatile multi touch sensing for thin form factor displays,0,10,0,148
|
| 628 |
2140613126,scalable semantic web data management using vertical partitioning,657,10,610,675
|
| 629 |
+
2163263459,wherefore art thou r3579x anonymized social networks hidden patterns and structural steganography,0,10,1,61
|
| 630 |
1607840088,model counting a new strategy for obtaining good bounds,143,10,143,143
|
| 631 |
52985456,towards an axiom system for default logic,13,10,13,13
|
| 632 |
2144108169,semantic taxonomy induction from heterogenous evidence,466,10,459,474
|
|
|
|
| 635 |
2118755902,a role for haptics in mobile interaction initial design using a handheld tactile display prototype,15,10,15,15
|
| 636 |
2146352414,putting objects in perspective,235,10,234,236
|
| 637 |
2082731247,controlling factors in evaluating path sensitive error detection techniques,11,10,11,11
|
| 638 |
+
2107794009,synergy a new algorithm for property checking,0,10,1,279
|
| 639 |
2071616717,model based development of dynamically adaptive software,413,10,386,422
|
| 640 |
+
2079317829,who should fix this bug,900,10,721,1076
|
| 641 |
1544095305,experience with an object reputation system for peer to peer filesharing,214,10,200,227
|
| 642 |
1500238431,availability of multi object operations,29,10,29,30
|
| 643 |
2620706897,rethink the sync,45,10,42,48
|
| 644 |
2624304035,bigtable a distributed storage system for structured data,1866,10,1070,2578
|
| 645 |
2124504084,minimal test collections for retrieval evaluation,245,10,240,250
|
| 646 |
2152652256,maximizing throughput in wireless networks via gossiping,135,10,129,139
|
| 647 |
+
2103224511,to search or to crawl towards a query optimizer for text centric tasks,0,10,1,603
|
| 648 |
2062658884,reflective physical prototyping through integrated design test and analysis,300,10,260,346
|
| 649 |
2146081216,trustworthy keyword search for regulatory compliant records retention,29,10,29,29
|
| 650 |
2128941908,random sampling from a search engine s index,126,10,125,127
|
| 651 |
1587673378,the max k armed bandit a new model of exploration applied to search heuristic selection,80,10,80,80
|
| 652 |
2152263452,a hierarchical phrase based model for statistical machine translation,1184,10,1044,1342
|
| 653 |
+
2112103637,the bubble cursor enhancing target acquisition by dynamic resizing of the cursor s activation area,0,10,1,43
|
| 654 |
2153282521,examining task engagement in sensor based statistical models of human interruptibility,108,10,107,109
|
| 655 |
2138134117,making space for stories ambiguity in the design of personal communication systems,147,10,146,149
|
| 656 |
2150240046,automatic generation of suggestions for program investigation,132,10,127,135
|
|
|
|
| 658 |
2009489720,cute a concolic unit testing engine for c,282,10,258,297
|
| 659 |
2170239024,data structure repair using goal directed reasoning,10,10,10,10
|
| 660 |
2169952536,using structural context to recommend source code examples,70,10,70,70
|
| 661 |
+
2160938265,eliciting design requirements for maintenance oriented ides a detailed study of corrective and perfective maintenance tasks,73,10,72,74
|
| 662 |
1603364293,learning coordination classifiers,7,10,7,7
|
| 663 |
2912387951,solving checkers,51,10,51,51
|
| 664 |
157725869,a probabilistic model of redundancy in information extraction,178,10,176,180
|
| 665 |
1965343327,detecting bgp configuration faults with static analysis,296,10,270,317
|
| 666 |
+
2147278401,automatic pool allocation improving performance by controlling data structure layout in the heap,0,10,1,199
|
| 667 |
1997199152,programming by sketching for bit streaming programs,213,10,208,219
|
| 668 |
+
2159668267,xml data exchange consistency and query answering,0,10,0,151
|
| 669 |
+
1963658069,learning to estimate query difficulty including applications to missing content detection and distributed information retrieval,0,10,0,235
|
| 670 |
2010859647,coupon replication systems,48,10,47,49
|
| 671 |
+
2110137598,rx treating bugs as allergies a safe method to survive software failures,0,10,3,415
|
| 672 |
2121178808,speculative execution in a distributed file system,96,10,91,101
|
| 673 |
+
2165100126,vigilante end to end containment of internet worms,0,10,2,1209
|
| 674 |
2042616792,automation and customization of rendered web pages,220,10,199,225
|
| 675 |
2135552269,cache conscious frequent pattern mining on a modern processor,69,10,69,69
|
| 676 |
1977841655,three level caching for efficient query processing in large web search engines,155,10,154,156
|
|
|
|
| 686 |
2058632086,trickle a self regulating algorithm for code propagation and maintenance in wireless sensor networks,1144,10,660,1530
|
| 687 |
2174598112,recovering device drivers,158,10,154,165
|
| 688 |
2158600037,cloning based context sensitive pointer alias analysis using binary decision diagrams,54,10,53,55
|
| 689 |
+
2092650892,conditional xpath the first order complete xpath dialect,70,10,67,73
|
| 690 |
2134557008,a formal study of information retrieval heuristics,346,10,339,352
|
| 691 |
2116790783,on performance bounds for the integration of elastic and adaptive streaming flows,51,10,50,52
|
| 692 |
1993855803,indexing spatio temporal trajectories with chebyshev polynomials,311,10,306,315
|
| 693 |
1989450868,multi finger gestural interaction with 3d volumetric displays,24,10,24,24
|
| 694 |
+
2088761521,crossy a crossing based drawing application,0,10,0,169
|
| 695 |
2097995023,model driven data acquisition in sensor networks,1053,10,941,1173
|
| 696 |
2064716575,automatic detection of fragments in dynamically generated web pages,80,10,80,80
|
| 697 |
2113272343,towards a model of face to face grounding,204,10,201,206
|
|
|
|
| 704 |
2160510992,precise dynamic slicing algorithms,69,10,68,70
|
| 705 |
2112243500,modular verification of software components in c,125,10,124,126
|
| 706 |
1664963465,approximating game theoretic optimal strategies for full scale poker,217,10,215,221
|
| 707 |
+
2061820396,maximizing the spread of influence through a social network,6739,10,1692,7560
|
| 708 |
2125346056,automatically proving the correctness of compiler optimizations,115,10,113,117
|
| 709 |
1971778458,an information theoretic approach to normal forms for relational and xml data,32,10,31,33
|
| 710 |
2125596620,re examining the potential effectiveness of interactive query expansion,182,10,178,186
|
|
|
|
| 714 |
2295705535,backtracking intrusions,303,10,280,313
|
| 715 |
1971549254,perceptually supported image editing of text and graphics,77,10,76,77
|
| 716 |
2069153192,scaling personalized web search,140,10,138,142
|
| 717 |
+
2169463693,semtag and seeker bootstrapping the semantic web via automated semantic annotation,0,10,2,265
|
| 718 |
1964376592,on computing all abductive explanations,46,10,46,46
|
| 719 |
2154124206,discriminative training and maximum entropy models for statistical machine translation,1063,10,978,1126
|
| 720 |
2098121410,constant round coin tossing with a man in the middle or realizing the shared random string model,163,10,159,167
|
| 721 |
+
2145818650,minimizing congestion in general networks,261,10,228,287
|
| 722 |
2121081915,isolating cause effect chains from computer programs,530,10,377,676
|
| 723 |
2045747317,pattern discovery in sequences under a markov assumption,37,10,37,37
|
| 724 |
2121542813,memory resource management in vmware esx server,1215,10,901,1638
|
|
|
|
| 729 |
2139403546,fast decoding and optimal decoding for machine translation,233,10,231,235
|
| 730 |
2155693943,immediate head parsing for language models,308,10,305,311
|
| 731 |
1960231166,complexity results for structure based causality,88,10,87,89
|
| 732 |
+
2134206624,optimal aggregation algorithms for middleware,1085,10,467,1032
|
| 733 |
+
2094661073,temporal summaries of new topics,261,10,254,267
|
| 734 |
2163336863,locally adaptive dimensionality reduction for indexing large time series databases,867,10,834,905
|
| 735 |
2161168778,untrusted hosts and confidentiality secure program partitioning,13,10,12,14
|
| 736 |
+
2053903896,base using abstraction to improve fault tolerance,0,10,0,1601
|
| 737 |
+
1994547327,phidgets easy development of physical interfaces through physical widgets,0,10,0,89
|
| 738 |
2130642985,weaving relations for cache performance,327,10,320,334
|
| 739 |
1985727586,engineering server driven consistency for large scale dynamic web services,66,10,66,66
|
| 740 |
2096678443,the game of hex an automatic theorem proving approach to game programming,37,10,37,37
|
|
|
|
| 742 |
2118119027,statistics based summarization step one sentence compression,410,10,404,417
|
| 743 |
2103552898,local search characteristics of incomplete sat procedures,78,10,78,78
|
| 744 |
2159128898,real time tracking of non rigid objects using mean shift,2918,10,2772,3067
|
| 745 |
+
1991962718,hancock a language for extracting signatures from data streams,0,10,0,30
|
| 746 |
2066859698,checking system rules using system specific programmer written compiler extensions,171,10,165,177
|
| 747 |
+
2072737419,dynamo a transparent dynamic optimization system,0,10,2,126
|
| 748 |
+
2035071899,auditing boolean attributes,79,10,75,83
|
| 749 |
1985554184,ir evaluation methods for retrieving highly relevant documents,934,10,786,1079
|
| 750 |
+
2202508117,xmill an efficient compressor for xml data,0,10,0,173
|
| 751 |
+
2169732913,sensing techniques for mobile interaction,541,10,300,428
|
| 752 |
2175110005,graph structure in the web,35,10,35,35
|
| 753 |
1483940455,proverb the probabilistic cruciverbalist,39,10,39,39
|
| 754 |
2127466278,a distributed case based reasoning application for engineering sales support,47,10,47,47
|
| 755 |
1774901127,learning in natural language,12,10,12,12
|
| 756 |
+
2058732827,metacost a general method for making classifiers cost sensitive,0,10,0,87
|
| 757 |
2151200745,io lite a unified i o buffering and caching system,107,10,103,109
|
| 758 |
2108112890,whole program paths,34,10,34,34
|
| 759 |
2043778692,exact and approximate aggregation in constraint query languages,18,10,18,18
|
| 760 |
+
2024181699,cross language information retrieval based on parallel texts and automatic mining of parallel texts from the web,315,10,299,330
|
| 761 |
+
2164049396,dynamat a dynamic view management system for data warehouses,0,10,3,1182
|
| 762 |
+
2101915391,manageability availability and performance in porcupine a highly scalable cluster based mail service,0,10,0,1601
|
| 763 |
+
2150709314,cellular disco resource management using virtual clusters on shared memory multiprocessors,0,10,0,415
|
| 764 |
2156874421,the click modular router,2437,10,693,1923
|
| 765 |
+
2116833128,soft timers efficient microsecond software timer support for network processing,0,10,0,245
|
| 766 |
1489992655,focused crawling a new approach to topic specific web resource discovery,1538,10,1081,1863
|
| 767 |
2096037858,learning evaluation functions for global optimization and boolean satisfiability,71,10,71,71
|
| 768 |
2123564449,the interactive museum tour guide robot,500,10,487,515
|
|
|
|
| 770 |
2061628264,expressiveness of structured document query languages based on attribute grammars,55,10,54,56
|
| 771 |
2067970404,a theory of term weighting based on exploratory data analysis,90,10,89,91
|
| 772 |
1997506570,efficient transparent application recovery in client server information systems,43,10,43,43
|
| 773 |
+
2064803206,integrating association rule mining with relational database systems alternatives and implications,0,10,0,176
|
| 774 |
2029114021,the interactive multimedia jukebox imj a new paradigm for the on demand delivery of audio video,40,10,40,40
|
| 775 |
1567570606,statistical parsing with a context free grammar and word statistics,562,10,551,581
|
| 776 |
2114975944,building concept representations from reusable components,63,10,63,63
|
| 777 |
1483210996,fast context switching in real time propositional reasoning,39,10,39,39
|
| 778 |
2098854122,a practical algorithm for finding optimal triangulations,74,10,74,74
|
| 779 |
+
1589050831,translingual information retrieval a comparative evaluation,167,10,165,168
|
| 780 |
2170913656,analysis and visualization of classifier performance comparison under imprecise class and cost distributions,704,10,666,727
|
| 781 |
282367566,on the complexity of database queries,182,10,164,193
|
| 782 |
1983078185,feature selection perceptron learning and a usability case study for text categorization,127,10,127,128
|
| 783 |
2129938590,fast parallel similarity search in multimedia databases,173,10,172,174
|
| 784 |
+
2153131460,continuous profiling where have all the cycles gone,0,10,0,50
|
| 785 |
+
2154766204,disco running commodity operating systems on scalable multiprocessors,0,10,0,365
|
| 786 |
2113913089,integrating reliable memory in databases,32,10,32,32
|
| 787 |
2138637314,a novel application of theory refinement to student modeling,29,10,29,29
|
| 788 |
1600919542,pushing the envelope planning propositional logic and stochastic search,872,10,827,927
|
|
|
|
| 790 |
2167345029,automatic compiler inserted i o prefetching for out of core applications,203,10,199,213
|
| 791 |
2150769115,safe kernel extensions without run time checking,56,10,53,58
|
| 792 |
2146815834,retrieving spoken documents by combining multiple index sources,115,10,113,117
|
| 793 |
+
2009343025,supporting stored video reducing rate variability and end to end resource requirements through optimal smoothing,398,10,297,466
|
| 794 |
2248022866,exploiting process lifetime distributions for dynamic load balancing,13,10,13,13
|
| 795 |
2143401113,implementing data cubes efficiently,1182,10,1038,1354
|
| 796 |
2128061541,fast subsequence matching in time series databases,1709,10,1220,1943
|