Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Our research
Content type
+
Downloads (446)
+
Events (420)
 
Groups (145)
+
News (2640)
 
People (734)
 
Projects (1067)
+
Publications (12162)
+
Videos (5366)
Labs
Research areas
Algorithms and theory47205 (761)
Communication and collaboration47188 (1395)
Computational linguistics47189 (464)
Computational sciences47190 (762)
Computer systems and networking47191 (2027)
Computer vision208594 (1076)
Data mining and data management208595 (194)
Economics and computation47192 (301)
Education47193 (783)
Gaming47194 (368)
Graphics and multimedia47195 (1149)
Hardware and devices47196 (1014)
Health and well-being47197 (452)
Human-computer interaction47198 (2168)
Machine learning and intelligence47200 (1692)
Mobile computing208596 (117)
Quantum computing208597 (55)
Search, information retrieval, and knowledge management47199 (1688)
Security and privacy47202 (751)
Social media208598 (93)
Social sciences47203 (814)
Software development, programming principles, tools, and languages47204 (1455)
Speech recognition, synthesis, and dialog systems208599 (140)
Technology for emerging markets208600 (47)
1–25 of 22980
Sort
Show 25 | 50 | 100
1234567Next 
Nicholas Jing Yuan, Yu Zheng, Xing Xie, Yingzi Wang, Kai Zheng, and Hui Xiong

The step of urbanization and modern civilization fosters different functional zones in a city, such as residential areas, business districts, and educational areas. In a metropolis, people commute between these functional zones every day to engage in different socioeconomic activities, e.g., working, shopping, and entertaining. In this paper, we propose a data-driven framework to discover functional zones in a city. Specifically, we introduce the concept of Latent Activity Trajectory (LAT), which...

Publication details
Date: 1 August 2016
Type: Article
Publisher: IEEE – Institute of Electrical and Electronics Engineers
Yuchen Zhang, Xi Chen, Dengyong Zhou, and Michael I. Jordan

Publication details
Date: 1 December 2015
Type: Inproceeding
Yanjie Fu, Yong Ge, Yu Zheng, Yao, Yanchi Liu, Hui Xiong, and Nicholas Jing Yuan

Ranking residential real estates based on investment values can provide decision making support for home buyers and thus plays an important role in estate marketplace. In this paper, we aim to develop methods for ranking estates based on investment values by mining users opinions about estates from online user reviews and offline moving behaviors (e.g., taxi traces, smart card transactions, check-ins). While a variety of features could be extracted from these data, these features are intercorrelated and...

Publication details
Date: 1 December 2015
Type: Inproceeding
Publisher: IEEE – Institute of Electrical and Electronics Engineers
Emerson Murphy-Hill, Thomas Zimmermann, Christian Bird, and Nachiappan Nagappan

When software engineers fix bugs, they may have several options as to how to fix those bugs. Which fix they choose has many implications, both for practitioners and researchers: What is the risk of introducing other bugs during the fix? Is the bug fix in the same code that caused the bug? Is the change fixing the cause or just covering a symptom? In this paper, we investigate alternative fixes to bugs and present an empirical study of how engineers make design choices about how to fix bugs. We start...

Publication details
Date: 1 December 2015
Type: Article
Publisher: IEEE – Institute of Electrical and Electronics Engineers
Publication details
Date: 1 December 2015
Type: Article
Abram Hindle, Christian Bird, Thomas Zimmermann, and Nachiappan Nagappan

Large organizations like Microsoft tend to rely on formal requirements documentation in order to specify and design the software products that they develop. These documents are meant to be tightly coupled with the actual implementation of the features they describe. In this paper we evaluate the value of high-level topic-based requirements traceability and issue report traceability in the version control system, using Latent Dirichlet Allocation (LDA). We evaluate LDA topics on practitioners...

Publication details
Date: 1 December 2015
Type: Article
Publisher: Springer
Mohan Yang, bolin ding, surajit chaudhuri, and kaushik chakrabarti

We aim to provide table answers to keyword queries using a knowledge base. For queries referring to multiple entities, like “Washington cities population” and “Mel Gibson movies”, it is better to represent each relevant answer as a table which aggregates a set of entities or joins of entities within the same table scheme or pattern. In this paper, we study how to find highly relevant patterns in a knowledge base for user-given keyword queries to compose table answers. A knowledge base is...

Publication details
Date: 1 August 2015
Type: Inproceeding
Publisher: VLDB – Very Large Data Bases
Badrish Chandramouli, Jonathan Goldstein, Mike Barnett, Robert DeLine, Danyel Fisher, John C. Platt, James F. Terwilliger, and John Wernsing

This paper introduces Trill – a new query processor for analytics. Trill fulfills a combination of three requirements for a query processor to serve the diverse big data analytics space: (1) Query Model: Trill is based on a tempo-relational model that enables it to handle streaming and relational queries with early results, across the latency spectrum from real-time to offline; (2) Fabric and Language Integration : Trill is architected as a high-level language library that supports...

Publication details
Date: 1 August 2015
Type: Inproceeding
Publisher: VLDB – Very Large Data Bases
During Microsoft’s annual Faculty Summit, design departments from universities from around the world send teams of students to present projects with potential real-world impact.
Event details
Date: 8–9 July 2015
Location: Microsoft Redmond
Type: Conference
Shuo Ma, Yu Zheng, and Ouri Wolfson

We proposed and developed a taxi-sharing system that accepts taxi passengers’ real-time ride requests sent from smartphones and schedules proper taxis to pick up them via ridesharing, subject to time, capacity, and monetary constraints. The monetary constraints provide incentives for both passengers and taxi drivers: passengers will not pay more compared with no ridesharing and get compensated if their travel time is lengthened due to ridesharing; taxi drivers will make money for all the detour distance...

Publication details
Date: 1 June 2015
Type: Article
Publisher: IEEE
Fuzheng Zhang, Nicholas Jing Yuan, David Wilkie, Yu Zheng, and Xing Xie

Urban transportation is an important factor in energy consumption and pollution, and is of increasing concern due to its complexity and economic significance. Its importance will only increase as urbanization continues around the world. In this paper, we explore drivers’ refueling behavior in urban areas. Compared to questionnaire-based methods of the past, we propose a complete data-driven system that pushes towards real-time sensing of individual refueling behavior and citywide petrol consumption. Our...

Publication details
Date: 1 June 2015
Type: Article
Publisher: ACM – Association for Computing Machinery
The Devices and Networking Summit 2015 will bring together 250 thought leaders, researchers and practitioners from academia and industry, drawn from a broad range of disciplines including computer science, engineering and design. Together we will discuss some of the key advances and challenges relating to the development and deployment of the next generation of devices and services.
Event details
Date: 11–13 May 2015
Location: Paris, France
Type: Conference
Kim Herzig, Michaela Greiler, Jacek Czerwonka, and Brendan Murphy

Testing is a key element of software development processes for the management and assessment of product quality. In most development environments, the software engineers are responsible for ensuring the functional correctness of code. However, for large complex software products, there is an additional need to check that changes do not negatively impact other parts of the software and they comply with system constraints such as backward compatibility, performance, security etc. Ensuring these system...

Publication details
Date: 1 May 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Varun Jampani, SM Ali Eslami, Daniel Tarlow, Pushmeet Kohli, and John Winn

Generative models provide a powerful framework for probabilistic reasoning. However, in many domains their use has been hampered by the practical difficulties of inference. This is particularly the case in computer vision, where models of the imaging process tend to be large, loopy and layered. For this reason bottom-up conditional models have traditionally dominated in such domains. We find that widely-used, general-purpose message passing inference algorithms such as Expectation Propagation (EP) and...

Publication details
Date: 1 May 2015
Type: Inproceeding
Ali Mamdouh Elkahky, Yang Song, and Xiaodong He

Recent online services rely heavily on automatic personalization to recommend relevant content to a large number of users. This requires systems to scale promptly to accommodate the stream of new users visiting the online services for the first time. In this work, we propose a content-based recommendation system to address both the recommendation quality and the system scalability. We propose to use a rich feature set to represent users, according to their web browsing history and search queries. We use...

Publication details
Date: 1 May 2015
Type: Inproceeding
Publisher: WWW – World Wide Web Consortium (W3C)
Kim Herzig and Nachiappan Nagappan

Applying code changes to software systems and testing these code changes can be a complex task that involves many different types of software testing strategies, e.g. system and integration tests. However, not all test failures reported during code integration are hinting towards code defects. Testing large systems such as the Microsoft Windows operating system requires complex test infrastructures, which may lead to test failures caused by faulty tests and test infrastructure issues. Such false test...

Publication details
Date: 1 May 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Xu Chu, Yeye He, Kaushik Chakrabarti, and Kris Ganjam
Publication details
Date: 1 May 2015
Type: Inproceeding
Publisher: in Proceedings of International Conference on Management of Data (SIGMOD)
Christopher Theisen, Kim Herzig, Patrick Morrison, Brendan Murphy, and Laurie Williams

Security testing and reviewing efforts are a necessity for software projects, but are time-consuming and expensive to apply. Identifying vulnerable code supports decision-making during all phases of software development. An approach for identifying vulnerable code is to identify its attack surface, the sum of all paths for untrusted data into and out of a system. Identifying the code that lies on the attack surface requires expertise and significant manual effort. This paper proposes an...

Publication details
Date: 1 May 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Lihong Li, Remi Munos, and Csaba Szepesvari

This paper studies the off-policy evaluation problem, where one aims to estimate the value of a target policy based on a sample of observations collected by another policy. We first consider the single-state, or multi-armed bandit case, establish a finite-time minimax risk lower bound, and analyze the risk of three standard estimators. For the so-called regression estimator, we show that while it is asymptotically optimal, for small sample sizes it may perform suboptimally compared to an ideal oracle up...

Publication details
Date: 1 May 2015
Type: Inproceeding
Publisher: AISTATS
This is the website of the second International Workshop on Rack-scale Computing to be co-located with EuroSys'15
Event details
Date: 21 April 2015
Location: Bordeaux, France
Type: Workshop
Irene Rae, Bilge Mutlu, Gary M. Olson, Judith S. Olson, Leila Takayama, and Gina Venolia

As network availability becomes ubiquitous, users are leveraging this access to establish their presence in remote locations through the use of commercially available telepresence technologies. With the increasing adoption of systems, new questions are emerging about how these technologies affect user interactions and relationships. Our goal for this workshop is to bring an interdisciplinary group of telepresence researchers together to trade perspectives, fostering new opportunities for collaboration...

Publication details
Date: 18 April 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Sudip Roy, Arnd Christian König, Igor Dvorkin, and Manish Kumar

Cloud platforms involve multiple independently developed components, often executing on diverse hardware configurations and across multiple data centers. This complexity makes tracking various key performance indicators (KPIs) and manual diagnosing of anomalies in system behavior both difficult and expensive. In this paper, we describe Argus, an automated system for mining service logs to identify anomalies and help formulate data-driven hypotheses.

Argus includes a suite of efficient mining...

Publication details
Date: 15 April 2015
Type: Inproceeding
Publisher: IEEE
Accurate indoor localization has the potential to transform the way people navigate indoors in a similar way that GPS transformed the way people navigate outdoors. Over the last 15 years, several human-centric approaches to indoor localization have been proposed by both academia and industry, but we have yet to see large scale deployments. This competition aims to bring together real-time or near real-time indoor location technologies and compare their performance.
Event details
Date: 11–13 April 2015
Location: Seattle, WA, USA
Type: Workshop
Juho Kim, Elena L. Glassman, Andrés Monroy-Hernández, and Meredith Ringel Morris

Teachers in conventional classrooms often ask learners to express themselves and show their thought processes by speaking out loud, drawing on a whiteboard, or even using physical objects. Despite the pedagogical value of such activities, interactive exercises available in most online learning platforms are constrained to multiple-choice and short answer questions. We introduce RIMES, a system for easily authoring, recording, and reviewing interactive multimedia exercises embedded in lecture videos....

Publication details
Date: 1 April 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Elena L. Glassman, Juho Kim, Andrés Monroy-Hernández, and Meredith Ringel Morris

Educators have developed an effective technique to get feedback after in-person lectures, called “muddy cards.” Students are given time to reflect and write the “muddiest” (least clear) point on an index card, to hand in as they leave class. This practice of assigning end-of-lecture reflection tasks to generate explicit student feedback is well suited for adaptation to the challenge of supporting feedback in online video lectures. We describe the design and evaluation of Mudslide, a prototype system...

Publication details
Date: 1 April 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
1–25 of 22980
Sort
Show 25 | 50 | 100
1234567Next 
> Our research