Our research
##### Content type

+
Events (0)

Groups (147)
+
News (2388)

People (836)

Projects (975)
+
Publications (11528)
+
Videos (0)
##### Research areas
Communication and collaboration47188 (1199)
Computational linguistics47189 (348)
Computational sciences47190 (560)
Computer systems and networking47191 (1642)
Economics47192 (231)
Education47193 (533)
Gaming47194 (300)
Graphics and multimedia47195 (989)
Hardware and devices47196 (821)
Health and well-being47197 (324)
Human-computer interaction47198 (1765)
Information retrieval and management47199 (1485)
Machine learning47200 (1290)
Security and privacy47202 (616)
Social science47203 (695)
Software development47204 (1215)
Theory47205 (578)
1–25 of 16220
Sort
Show 25 | 50 | 100
1234567Next
##### Publication details
Date: 1 September 2014
Type: Inproceedings
Publisher: Very Large Data Bases Endowment Inc.
Analytics over the increasing quantity of data stored in the Cloud has become very expensive, particularly due to the pay-as-you-go Cloud computation model. Data scientists typically manually extract samples of increasing data size (progressive samples) using domain-specific sampling strategies for exploratory querying. This provides them with user-control, repeatable semantics, and result provenance. However, such solutions result in tedious workflows that preclude the reuse of work across samples. On the...
##### Publication details
Date: 1 August 2014
Type: Inproceedings
In feed-following applications such as Twitter and Facebook, users (consumers) follow a large number of other users (producers) to get personalized feeds, generated by blending producers' feeds. With the proliferation of Cloud-connected smart edge devices such as smartphones, producers and consumers of many feed-following applications reside on edge devices and the Cloud. An important design goal of such applications is to minimize communication (and energy) overhead of edge devices. In this paper, we...
##### Publication details
Date: 1 August 2014
Type: Inproceedings
##### Publication details
Date: 1 March 2014
Type: Inproceedings
Web search is seeing a paradigm shift from keyword based search to an entity-centric organization of web data. To support web search with this deeper level of understanding, a web-scale entity linking system must include feature extraction that is robust to the diversity of web documents and their varied writing styles and content structure; maintain high-precision linking for "tail" (unpopular) entities that is robust to the existence of confounding entities outside of the knowledge base and entity...
##### Publication details
Date: 24 February 2014
Type: Inproceedings
Publisher: ACM
Prolific adoption of digital media across scientific fields has led to inevitable transformation of a traditional lab book into an electronic lab notebook (ELN). Research so far has focussed on designing ELN prototypes and learning from their limited deployments. At the same time, a variety of commercially available ELNs have been adopted by industrial and academic laboratories. That provides opportunities for situated research and a deeper understanding of the role that ELNs assumes as an integral part of...
##### Publication details
Date: 1 February 2014
Type: Inproceedings
Publisher: ACM
RankNet is one of the widely adopted ranking models for web search tasks. However, adapting a generic RankNet for personalized search is little studied. In this paper, we first trained a variety of RankNets with different number of hidden layers and network structures on a per-user basis, and observed that a deep neural network with five hidden layers gives the best performance. To further improve the performance of adaptation, we propose a set of novel methods categorized into two groups. In the first...
##### Publication details
Date: 1 February 2014
Type: Inproceedings
Publisher: ACM
##### Publication details
Date: 1 February 2014
Type: Inproceedings
In this paper, we present the first formal study of how mothers of young children (aged three and under) use social networking sites, particularly Facebook and Twitter, including mothers’ perceptions of which SNSes are appropriate for sharing information about their children, changes in post style and frequency after birth, and the volume and nature of child-related content shared in these venues. Our findings have implications for improving the utility and usability of SNS tools for mothers of young...
##### Publication details
Date: 1 February 2014
Type: Inproceedings
Publisher: ACM
Consumers shopping in “brick-and-mortar” (non-virtual) stores often use their mobile phones to consult with others about potential purchases. Via a survey (n = 200), we detail current practices in seeking remote shopping advice. We then consider how emerging social platforms, such as social networking sites and crowd labor markets, could offer rich next-generation remote shopping advice experiences. We conducted a field experiment in which shoppers shared photographs of potential purchases via MMS,...
##### Publication details
Date: 1 February 2014
Type: Inproceedings
Publisher: ACM
Supporting physical exertion is a growing trend in digital technology design. However, most experiences focus on bodily actions in which participants act independently of each other. In contrast, we focus on virtual body-to-body interactions between multiple participants, inspired by combat-oriented sports such as boxing that highlight the need to act while avoiding reciprocal bodily action. Mediating such body-to-body interactions with technology is challenging, particularly when participants are not...
##### Publication details
Date: 1 February 2014
Type: Inproceedings
Publisher: ACM
In status message question asking (SMQA), members of social networking sites make use of status messages to express information needs to friends and contacts. We present findings from a laboratory study that examined 82 participants’ SMQA behaviors in the broader context of online information seeking. When given the option of using a search engine and/or a social network, we found that participants leveraged SMQA for 20% of their information needs, most often posing a question to their network in addition...
##### Publication details
Date: 1 February 2014
Type: Inproceedings
Publisher: ACM
A string of recent attacks against the global public key infrastructure (PKI) has brought to light weaknesses in the certification authority (CA) system. In response, the CA/Browser Forum, a consortium of certification authorities and browser vendors, published in 2011 a set of requirements applicable to all certificates intended for use on the Web and issued after July 1st, 2012, following the successful adoption of the extended validation guidelines in 2007. We evaluate the actual level of adherence to...
##### Publication details
Date: 1 February 2014
Type: Inproceedings
Publisher: Internet Society
Geographically distributed systems often rely on replicated eventually consistent data stores to achieve availability and performance. To resolve conflicting updates at different replicas, researchers and practitioners have proposed specialized consistency protocols, called replicated data types, that implement objects such as registers, counters, sets or lists. Reasoning about replicated data types has however not been on par with comparable work on abstract data types and concurrent data types, lacking...
##### Publication details
Date: 22 January 2014
Type: Inproceedings
Publisher: ACM SIGPLAN
Symbolic Automata extend classical automata by using symbolic alphabets instead of finite ones. Most of the classical automata algorithms rely on the alphabet being finite, and generalizing them to the symbolic setting is not a trivial task. In this paper we study the problem of minimizing symbolic automata. We formally define and prove the basic properties of minimality in the symbolic setting, and lift classical minimization algorithms (Huffman-Moore’s and Hopcroft’s algorithms) to symbolic automata....
##### Publication details
Date: 1 January 2014
Type: Inproceedings
Publisher: ACM
Head and modifier detection is an important problem for applications that handle short texts such as search queries, ads keywords, titles, captions, etc. In many cases, short texts such as search queries do not follow grammar rules, and existing approaches for head and modifier detection are coarse-grained, domain specific, and/or require labeling of large amounts of training data. In this paper, we introduce a semantic approach for head and modifier detection. We first obtain a large number of instance...
##### Publication details
Date: 1 January 2014
Type: Inproceedings
Relational program logics have been used for mechanizing formal proofs of various cryptographic constructions. With an eye towards scaling these successes towards end-to-end security proofs for implementations of distributed systems, we present RF*, a relational extension of F*, a general-purpose higher-order stateful programming language with a verification system based on refinement types. The distinguishing feature of RF* is a relational Hoare logic for a higher-order, stateful, probabilistic...
##### Publication details
Date: 1 January 2014
Type: Inproceedings
Publisher: ACM
We study the question of learning a sparse multi-variate polynomial over the real domain. In particular, for some unknown polynomial $f(\vx)$ of degree-$d$ and $k$ monomials, we show how to reconstruct $f$, within error $\epsilon$, given only a set of examples $\bar x_i$ drawn uniformly from the $n$-dimensional cube (or an $n$-dimensional Gaussian distribution), together with evaluations $f(\bar x_i)$ on them. The result holds even in the noisy setting'', where we have only values $f(\bar x_i)+g$ where...
##### Publication details
Date: 1 January 2014
Type: Inproceedings
Publisher: ACM
We study the question of learning a sparse multi-variate polynomial over the real domain. In particular, for some unknown polynomial $f(\vx)$ of degree-$d$ and $k$ monomials, we show how to reconstruct $f$, within error $\epsilon$, given only a set of examples $\bar x_i$ drawn uniformly from the $n$-dimensional cube (or an $n$-dimensional Gaussian distribution), together with evaluations $f(\bar x_i)$ on them. The result holds even in the noisy setting'', where we have only values $f(\bar x_i)+g$ where...
##### Publication details
Date: 1 January 2014
Type: Inproceedings
Publisher: ACM
It is often the case that increasing the precision of a program analysis leads to worse results. It is our thesis that this phenomenon is the result of fundamental limits on the ability to use precise abstract domains as the basis for inferring strong invariants of programs. We show that bias-variance tradeoff, an idea from learning theory, can be used to explain why more precise abstractions do not necessarily lead to better results and also provides practical techniques for coping with such limitations....
##### Publication details
Date: 1 January 2014
Type: Inproceedings
Publisher: ACM
##### Publication details
Date: 1 January 2014
Type: Article
Publisher: Cambridge University Press
Advances in experimental techniques resulted in abundant genomic, transcriptomic, epigenomic, and proteomic data that have the potential to reveal critical drivers of human diseases. Complementary algorithmic developments enable researchers to map these data onto protein-protein interaction networks and infer which signaling pathways are perturbed by a disease. Despite this progress, integrating data across different biological samples or patients remains a substantial challenge because samples from the...
##### Publication details
Date: 1 January 2014
Type: Article
Publisher: World Scientific Publishing
The increasing pervasiveness of location-acquisition technologies has enabled collection of huge amount of trajectories for almost any kind of moving objects. Discovering useful patterns from their movement behaviours can convey valuable knowledge to a variety of critical applications. In this light, we propose a novel concept, called gathering, which is a trajectory pattern modelling various group incidents such as celebrations, parades, protests, traffic jams and so on. A key observation is that these...
##### Publication details
Date: 1 January 2014
Type: Article
Publisher: IEEE Transactions on Knowledge and Data Engineering (TKDE)
The explosive growth and widespread accessibility of community contributed media content on the Internet have led to a surge of research activity in multimedia search. Approaches that apply text search techniques for multimedia search have achieved limited success as they entirely ignore visual content as a ranking signal. Multimedia search re-ranking, which reorders visual documents based on multimodal cues to improve initial text-only searches, has received increasing attention in recent years. Such a...
##### Publication details
Date: 1 January 2014
Type: Article
Horton is a graph query processing system that executes declarative reachability queries on a partitioned attributed multi-graph. It employs a query language, query optimizer, and a distributed execution engine. The query language expresses declarative reachability queries, and supports closures and predicates on node and edge attributes to match graph paths. We introduce three algebraic graph operators, select, traverse, and join, and a query is compiled into an execution plan containing these...
##### Publication details
Date: 1 January 2014
Type: Inproceedings
1–25 of 16220
Sort
Show 25 | 50 | 100
1234567Next
> Our research