本文收集了AAAI、ACL、CIKM、CVPR、FOCS、FSE、ICCV、ICML、IJCAI、INFOCOM、KDD等国际CS顶会,2012年至2018年所有最佳论文。
内容正离子网络,这里仅给出部分论文列表,完整列表查阅原网页:
https://jeffhuang.com/best_paper_awards.html#mobicom
这些数据大部分是手工输入的(通过联系过去的会议组织者、检索缓存的会议网站和搜索简历获得)。本列表试图从各个领域的顶级会议中收集最佳论文奖励,但是有些会议没有这样的奖励(例如SIGGRAPH、CAV )。“Distinguished paper award”和“Outstanding paper award”包括在内,但不包括“最佳学生论文”(如NIPS )或“最佳10年论文”(如POPL )。
按照许多领域的惯例,得分是按作者递减顺序给出的。第一作者得1分,第二作者得0.5分,第三作者得0.33分,等等。然后,这些得分除以该论文的得分之和,即归一化。这一排名可能不准确或不完整,可能不反映最佳论文奖的现状,也不是官方名单,仅供参考。
CIKM (Knowledge Management)
2018 Relevance estimation with multiple information sources on search engine result pages Junqi Zhang, Tsinghua University; et al.
2017 Hike: A Hybrid Human-Machine Method for Entity Alignment in Large-Scale Knowledge Bases Yan Zhuang, Tsinghua University; et al.
2016 Vandalism Detection in Wikidata Stefan Heindorf, Paderborn University; et al.
2015 Assessing the Impact of Syntactic and Semantic Structures for Answer Passages Reranking Kateryna Tymoshenko, University of Trento
UIST (User Interface)
2018 Porta: Profiling Software Tutorials Using Operating-System-Wide Activity Tracing Alok Mysore & Philip J. Guo, University of California San Diego
Authoring and Verifying Human-Robot Interactions David Porfirio, University of Wisconsin-Madison; et al.
RESi: A Highly Flexible, Pressure-Sensitive, Imperceptible Textile Interface Based on Resistive Ya... Patrick Parzer, University of Applied Sciences Upper Austria; et al.
2017 Triggering Artwork Swaps for Live Animation Nora S. Willett, Princeton University; et al.
Grabity: A Wearable Haptic Interface for Simulating Weight and Grasping in Virtual Reality Inrak Choi, Stanford University; et al.
AirCode: Unobtrusive Physical Tags for Digital Fabrication Dingzeyu Li, Columbia University; et al.
2016 Rovables: Miniature On-Body Robots as Mobile Wearables Artem Dementyev, Massachusetts Institute of Technology; et al.
proCover: Sensory Augmentation of Prosthetic Limbs Using Smart Textile Covers Joanne Leong, University of Applied Sciences Upper Austria; et al.
ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch Accelerometers Gierad Laput, Carnegie Mellon University; et al.
Zooids: Building Blocks for Swarm User Interfaces Mathieu Le Goc, INRIA; et al.
2015 Orbits: Gaze Interaction for Smart Watches using Smooth Pursuit Eye Movements Augusto Esteves, Lancaster University; et al.
Webstrates: Shareable Dynamic Media Clemens Klokmose, Aarhus University; et al.
Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electr... Simon Olberding, Max Planck Institut; et al.
2014 Sensing Techniques for Tablet+Stylus Interaction Ken Hinckley, Microsoft Research; et al.
PrintScreen: Fabricating Highly Customizable Thin-film Touch-Displays Simon Olberding, Max Planck Institut; et al.
Expert Crowdsourcing with Flash Teams Daniela Retelny, Stanford University; et al.
2013 PneUI: Pneumatically Actuated Soft Composite Materials for Shape Changing Interfaces Lining Yao, Massachusetts Institute of Technology; et al.
PODS (Databases)
2018 Entity Matching with Active Monotone Classification Yufei Tao, Chinese University of Hong Kong
2017 Dichotomies in Ontology-Mediated Querying with the Guarded Fragment André Hernich, University of Liverpool; et al.
2016 FAQ: Questions Asked Frequently Mahmoud Abo Khamis, University at Buffalo; et al.
2015 Parallel-Correctness and Transferability for Conjunctive Queries Tom J. Ameloot, Hasselt University; et al.
2014 Weaker Forms of Monotonicity for Declarative Networking: A More Fine-Grained Answer to the CALM-Co... Tom J. Ameloot, Hasselt University; et al.
2013 Verification of database-driven systems via amalgamation Mikołaj Bojańczyk, University of Warsaw; et al.
SIGCOMM (Networking)
2018 Inferring Persistent Interdomain Congestion Saksham Agarwal, Cornell University; et al.
2017 Re-architecting datacenter networks and stacks for low latency and high performance Mark Handley, University College London; et al.
Language-directed hardware design for network performance monitoring Srinivas Narayana, Massachusetts Institute of Technology; et al.
2016 Eliminating Channel Feedback in Next-Generation Cellular Networks Deepak Vasisht, Massachusetts Institute of Technology; et al.
Inter-Technology Backscatter: Towards Internet Connectivity for Implanted Devices Vikram Iyer, University of Washington; et al.
Don't Mind the Gap: Bridging Network-wide Objectives and Device-level Configurations Ryan Beckett, Princeton University; et al.
2015 Central Control Over Distributed Routing Stefano Vissicchio, Université catholique de Louvain; et al.
2014 Balancing Accountability and Privacy in the Network David Naylor, Carnegie Mellon University; et al.
CONGA: Distributed Congestion-Aware Load Balancing for Datacenters Mohammad Alizadeh, Cisco Systems; et al.
2013 Ambient Backscatter: Wireless Communication Out of Thin Air Vincent Liu, University of Washington; et al.
ACL (Natural Language Processing)
2018 Finding syntax in human encephalography with beam search John Hale, Cornell University; et al.
2017 Probabilistic Typology: Deep Generative Models of Vowel Inventories Ryan Cotterell & Jason Eisner, Johns Hopkins University
2016 Finding Non-Arbitrary Form-Meaning Systematicity Using String-Metric Learning for Kernel Regression E. Darío Gutiérrez, University of California Berkeley; et al.
2015 Improving Evaluation of Machine Translation Quality Estimation Yvette Graham, Trinity College Dublin
Learning Dynamic Feature Selection for Fast Sequential Prediction Emma Strubell, University of Massachusetts Amherst; et al.
2014 Fast and Robust Neural Network Joint Models for Statistical Machine Translation Jacob Devlin, Raytheon BBN Technologies; et al.
2013 Grounded Language Learning from Video Described with Sentences Haonan Yu & Jeffrey Mark Siskind, Purdue University
INFOCOM (Networking)
2018 WiFED: WiFi Friendly Energy Delivery with Distributed Beamforming Subhramoy Mohanti, Northeastern University; et al.
Understanding Ethereum via Graph Analysis Ting Chen, University of Electronic Science and Technology of China; et al.
Optimizing Age of Information in Wireless Networks with Throughput Constraints Igor Kadota, Massachusetts Institute of Technology; et al.
2017 One Step at a Time: Optimizing SDN Upgrades in ISP Networks Konstantinos Poularakis, Yale University; et al.
2016 Heavy-Ball: A New Approach to Tame Delay and Convergence in Wireless Network Optimization Jia Liu, Ohio State University; et al.
2015 The Power of Slightly More than One Sample in Randomized Load Balancing Lei Ying, Arizona State University; et al.
2014 Joint Static and Dynamic Traffic Scheduling in Data Center Networks Zizhong Cao, Polytechnic Institute of New York University; et al.
Performance Evaluation and Asymptotics for Content Delivery Networks Virag Shah & Gustavo de Veciana, University of Texas at Austin
2013 On the Steady-State of Cache Networks Elisha J. Rosensweig, University of Massachusetts Amherst; et al.
IJCAI (Artificial Intelligence)
2018 Reasoning about Consensus when Opinions Diffuse through Majority Dynamics Vincenzo Auletta, University of Salerno; et al.
SentiGAN: Generating Sentimental Texts via Mixture Adversarial Networks Ke Wang & Xiaojun Wan, Peking University
From Conjunctive Queries to Instance Queries in Ontology-Mediated Querying Cristina Feier, University of Bremen; et al.
What game are we playing? End-to-end learning in normal and extensive form games Chun Kai Ling, Carnegie Mellon University; et al.
Commonsense Knowledge Aware Conversation Generation with Graph Attention Hao Zhou, Tsinghua University; et al.
R-SVM+: Robust Learning with Privileged Information Xue Li, Wuhan University; et al.
A Degeneracy Framework for Graph Similarity Giannis Nikolentzos, École Polytechnique; et al.
2017 Foundations of Declarative Data Analysis Using Limit Datalog Programs Mark Kaminski, University of Oxford; et al.
2016 Hierarchical Finite State Controllers for Generalized Planning Javier Segovia, Universitat Pompeu Fabra; et al.
2015 Bayesian Active Learning for Posterior Estimation Kirthevasan Kandasamy, Carnegie Mellon University; et al.
Recursive Decomposition for Nonconvex Optimization Abram L. Friesen & Pedro Domingos, University of Washington
2013 Bayesian Optimization in High Dimensions via Random Embeddings Ziyu Wang, University of British Columbia; et al.
Flexibility and Decoupling in the Simple Temporal Problem Michel Wilson, Delft University of Technology; et al.
2011 Unweighted Coalitional Manipulation Under the Borda Rule is NP-Hard Nadja Betzler, Technische Universität Berlin; et al.
ICCV (Computer Vision)
2017 Mask R-CNN Kaiming He, Facebook AI Research; et al.
2015 Deep Neural Decision Forests Peter Kontschieder, Microsoft Research; et al.
2013 From Large Scale Image Categorization to Entry-Level Categories Vicente Ordonez, University of North Carolina at Chapel Hill; et al.
2011 Relative Attributes Devi Parikh, Toyota Technological Institute at Chicago
AAAI (Artificial Intelligence)
2018 Memory-Augmented Monte Carlo Tree Search Chenjun Xiao, University of Alberta; et al.
2017 Label-Free Supervision of Neural Networks with Physics and Domain Knowledge Russell Stewart & Stefano Ermon, Stanford University
2016 Bidirectional Search That Is Guaranteed to Meet in the Middle Robert C. Holte, University of Alberta; et al.
2015 From Non-Negative to General Operator Cost Partitioning Florian Pommerening, University of Basel; et al.
2014 Recovering from Selection Bias in Causal and Statistical Inference Elias Bareinboim, University of California Los Angeles; et al.
2013 HC-Search: Learning Heuristics and Cost Functions for Structured Prediction Janardhan Rao Doppa, Oregon State University; et al.
SIGMOD (Databases)
2018 SuRF:Practical Range Query Filtering with Fast Succinct Tries Huanchen Zhang, Carnegie Mellon University; et al.
2017 Parallelizing Sequential Graph Computations Wenfei Fan, University of Edinburgh; et al.
2016 Wander Join: Online Aggregation via Random Walks Feifei Li, University of Utah; et al.
2015 DBSCAN Revisited: Mis-Claim, Un-Fixability, and Approximation Junhao Gan & Yufei Tao, Chinese University of Hong Kong
2014 Materialization Optimizations for Feature Selection Workloads Ce Zhang, Stanford University; et al.
2013 Massive Graph Triangulation Xiaocheng Hu, The Chinese University of Hong Kong; et al.
NSDI (Networking)
2018 NetChain: Scale-Free Sub-RTT Coordination Xin Jin, Johns Hopkins University; et al.
2017 mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes Muhammad Asim Jamshed, KAIST; et al.
2016 Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions Bryce Kellogg, University of Washington; et al.
2015 Queues Don't Matter When You Can JUMP Them! Matthew P. Grosvenor, University of Cambridge; et al.
Designing Distributed Systems Using Approximate Synchrony in Data Center Networks Dan R. K. Ports, University of Washington; et al.
The Design and Implementation of Open vSwitch Ben Pfaff, VMware; et al.
2014 Software Dataplane Verification Mihai Dobrescu & Katerina Argyraki, École Polytechnique Fédérale de Lausanne
2013 Embassies: Radically Refactoring the Web Jon Howell, Microsoft Research; et al.
MOBICOM (Mobile)
2018 SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks Mehrdad Moradi, University of Michigan; et al.
2017 WEBee: Physical-Layer Cross-Technology Communication via Emulation Zhijun Li & Tian He, University of Minnesota
2015 CAreDroid: Adaptation Framework for Android ContextAware Applications Salma Elmalaki, University of California Los Angeles; et al.
2014 Tagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS Devices Lei Yang, Tsinghua University; et al.
2013 Whole-Home Gesture Recognition Using Wireless Signals Qifan Pu, University of Washington; et al.
2012 Distinguishing Users with Capacitative Touch Communication Tam Vu, Rutgers University; et al.
ICML (Machine Learning)
2018 Delayed Impact of Fair Machine Learning Lydia T. Liu, University of California Berkeley; et al.
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples Anish Athalye, Massachusetts Institute of Technology; et al.
2017 Understanding Black-box Predictions via Influence Functions Pang Wei Koh & Percy Liang, Stanford University
2016 Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs Sampling Christopher De Sa, Stanford University; et al.
Pixel Recurrent Neural Networks Aaron Van den Oord, Google; et al.
Dueling Network Architectures for Deep Reinforcement Learning Ziyu Wang, Google; et al.
2015 A Nearly-Linear Time Framework for Graph-Structured Sparsity Chinmay Hegde, Massachusetts Institute of Technology; et al.
Optimal and Adaptive Algorithms for Online Boosting Alina Beygelzimer, Yahoo! Research; et al.
2014 Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis Jian Tang, Peking University; et al.
2013 Vanishing Component Analysis Roi Livni, The Hebrew University of Jerusalum; et al.
S&P (Security and Privacy)
2018 DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice Vincent Cheval, Inria; et al.
On Enforcing the Digital Immunity of a Large Humanitarian Organization Stevens Le Blond, École Polytechnique Fédérale de Lausanne; et al.
2017 Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate Karthikeyan Bhargavan, INRIA; et al.
2016 A2: Analog Malicious Hardware Kaiyuan Yang, University of Michigan; et al.
2015 Riposte: An Anonymous Messaging System Handling Millions of Users Henry Corrigan-Gibbs, Stanford University; et al.
A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche, INRIA; et al.
2014 Secure Multiparty Computations on BitCoin Marcin Andrychowicz, University of Warsaw; et al.
Bootstrapping Privacy Compliance in Big Data Systems Shayak Sen, Carnegie Mellon University; et al.
2013 Pinocchio: Nearly Practical Verifiable Computation Bryan Parno, Microsoft Research; et al.
CHI (Human-Computer Interaction)
2018 Examining Wikipedia With a Broader Lens: Quantifying the Value of Wikipedia's Relationships with O... Nicholas Vincent, Northwestern University; et al.
Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants Tamy Guberek, University of Michigan; et al.
Addressing Age-Related Bias in Sentiment Analysis Mark Diaz, Northwestern University; et al.
Wall++: Room-Scale Interactive and Context-Aware Sensing Yang Zhang, Carnegie Mellon University; et al.
Design for Collaborative Survival: An Inquiry into Human-Fungi Relationships Jen Liu, University of Colorado Boulder; et al.
Expressive Time Series Querying with Hand-Drawn Scale-Free Sketches Miro Mannino & Azza Abouzied, New York University
Pinpointing: Precise Head- and Eye-Based Target Selection for Augmented Reality Mikko Kytö, Aalto University; et al.
Streets for People: Engaging Children in Placemaking Through a Socio-technical Process Sean Peacock, Newcastle University; et al.
Let's Talk About Race: Identity, Chatbots, and AI Ari Schlesinger, Georgia Institute of Technology; et al.
“A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology Diana Freed, Cornell Tech; et al.
HARK No More: On the Preregistration of CHI Experiments Andy Cockburn, University of Canterbury; et al.
Hoarding and Minimalism: Tendencies in Digital Data Preservation Francesco Vitale, University of British Columbia; et al.
Semi-Automated Coding for Qualitative Research: A User-Centered Inquiry and Initial Prototypes Megh Marathe & Kentaro Toyama, University of Michigan
Making as Expression: Informing Design with People with Complex Communication Needs through Art Th... Amanda Lazar, University of Maryland; et al.
How Relevant are Incidental Power Poses for HCI? Yvonne Jansen, Sorbonne Université
STOC (Theory)
2018 A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem Ola Svensson, École Polytechnique Fédérale de Lausanne; et al.
2017 Explicit, Almost Optimal, Epsilon-Balanced Codes Amnon Ta-Shma, Tel-Aviv University
A Weighted Linear Matroid Parity Algorithm Satoru Iwata, University of Tokyo
FSE (Software Engineering)
2018 Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks Shengjian (Daniel) Guo, Virginia Tech; et al.
An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems Yu Gao, Chinese Academy of Sciences; et al.
Data Race Detection on Compressed Traces Dileep Kini, University of Illinois at Urbana-Champaign; et al.
Oreo: Detection of Clones in the Twilight Zone Vaibhav Saini, University of California Irvine; et al.
The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the ... James C. Davis, Virginia Tech; et al.
Do Android Taint Analysis Tools Keep Their Promises? Felix Pauck, Paderborn University; et al.
2017 The Power of "Why" and "Why Not": Enriching Scenario Exploration with Provenance Tim Nelson, Brown University; et al.
Cooperative Kernels: GPU Multitasking for Blocking Algorithms Tyler Sorensen, Imperial College London; et al.
Understanding Misunderstandings in Source Code Dan Gopstein, New York University; et al.
Trade-Offs in Continuous Integration: Assurance, Security, and Flexibility Michael Hilton, Oregon State University; et al.
Discovering Relational Specifications Calvin Smith, University of Wisconsin-Madison; et al.
Automatically Diagnosing and Repairing Error Handling Bugs in C Yuchi Tian & Baishakhi Ray, University of Virginia
Fairness Testing: Testing Software for Discrimination Sainyam Galhotra, University of Massachusetts Amherst; et al.
2016 Foraging and Navigations Fundamentally: Developers' Predictions of Value and Cost David Piorkowski, Oregon State University; et al.
Multi-Representational Security Analysis Eunsuk Kang, University of California Berkeley; et al.
Factors Influencing Code Review Processes in Industry Tobias Baum, Leibniz Universität Hannover; et al.
API Code Recommendation Using Statistical Learning from Fine-grained Changes Anh Tuan Nguyen, Iowa State University; et al.
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis Xiaofei Xie, Tianjin University; et al.
Why We Refactor? Confessions of GitHub Contributors Danilo Silva, Federal University of Minas Gerais; et al.
Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis Jianjun Huang, Purdue University; et al.
2015 Optimizing energy consumption of GUIs in Android apps: a multi-objective approach Mario Linares-Vásquez, College of William and Mary; et al.
How Practitioners Perceive the Relevance of Software Engineering Research David Lo, Singapore Management University; et al.
Effective Test Suites for Mixed Discrete-Continuous Stateflow Controllers Reza Matinnejad, University of Luxembourg; et al.
Modeling Readability to Improve Unit Tests Ermira Daka, University of Sheffield; et al.
Measure It? Manage It? Ignore It? Software Practitioners and Technical Debt Neil A. Ernst, Carnegie Mellon University; et al.
A User-Guided Approach to Program Analysis Ravi Mangal, Georgia Institute of Technology; et al.
MultiSE: Multi-path Symbolic Execution using Value Summaries Koushik Sen, University of California Berkeley; et al.
Users Beware: Preference Inconsistencies Ahead Farnaz Behrang, Georgia Institute of Technology; et al.
2014 Selection and Presentation Practices for Code Example Summarization Annie Ying & Martin Robillard, McGill University
Are Mutants a Valid Substitute for Real Faults in Software Testing? René Just, University of Washington; et al.
AI: A Lightweight System for Tolerating Concurrency Bugs Mingxing Zhang, Tsinghua University; et al.
Powering the Static Driver Verifier using Corral Akash Lal & Shaz Qadeer, Microsoft Research
Learning Natural Coding Conventions Miltiadis Allamanis, University of Edinburgh; et al.
Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case Study Klaus-Benedikt Schultis, Siemens Corporate Technology; et al.
2012 Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software Libraries Bradley Cossette & Robert Walker, University of Calgary
VLDB (Databases)
2017 Provenance for Natural Language Queries Daniel Deutch, Tel-Aviv University; et al.
2016 Compressed Linear Algebra for Large-Scale Machine Learning Ahmed Elgohary, University of Maryland; et al.
2015 Constructing an interactive natural language interface for relational databases Fei Li & H. V. Jagadish, University of Michigan
2014 M4: A Visualization-Oriented Time Series Data Aggregation Uwe Jugel, SAP; et al.
Building Efficient Query Engines in a High-Level Language Yannis Klonatos, École Polytechnique Fédérale de Lausanne; et al.
On k-Path Covers and their Applications Stefan Funke, University of Stuttgart; et al.
epiC: an Extensible and Scalable System for Processing Big Data Dawei Jiang, National University of Singapore; et al.
The Uncracked Pieces in Database Cracking Felix Martin Schuhknecht, Saarland University; et al.
2013 DisC Diversity: Result Diversification based on Dissimilarity and Coverage Marina Drosou & Evaggelia Pitoura, University of Ioannina
2012 Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification Albert Angel, University of Toronto; et al.
FOCS (Theory)
2018 Classical Verification of Quantum Computation Urmila Mahadev, University of California Berkeley
Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic Time Diptarka Chakraborty, Computer Science Institute of Charles University; et al.
Pseudorandom Sets in Grassmann Graph have Near-Perfect Expansion Subhash Khot, New York University; et al.
2017 A dichotomy theorem for nonuniform CSPs Andrei A. Bulatov, Simon Fraser University
The Matching Problem in General Graphs is in Quasi-NC Ola Svensson & Jakub Tarnawski, École polytechnique fédérale de Lausanne
The Proof of CSP Dichotomy Conjecture Dmitriy Zhuk, Lomonosov Moscow State University
2016 Settling the Complexity of Computing Approximate Two-Player Nash Equilibria Aviad Rubinstein, University of California Berkeley
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning Ran Raz, Weizmann Institute of Science
2015 An average-case depth hierarchy theorem for Boolean circuits Benjamin Rossman, National Institute of Informatics; et al.
2014 Path Finding Methods for Linear Programming: Solving Linear Programs in O(sqrt(rank)) Iterations a... Yin Tat Lee & Aaron Sidford, Massachusetts Institute of Technology
2013 Navigating Central Path with Electrical Flows: from Flows to Matchings, and Back Aleksander Mądry, École Polytechnique Fédérale de Lausanne
閱讀更多 深度學習與NLP 的文章