Submissions from 2019
End-to-End Concolic Testing for Hardware/Software Co-Validation, Bo Chen, Kai Cong, Zhenkun Yang, Qin Wang, Jialu Wang, Li Lei, and Fei Xie
EPA-RIMM : an Efficient, Performance-Aware Runtime Integrity Measurement Mechanism for Modern Server Platforms, Brian G. Delgado, Tejaswini Vibhute, John Fastabend, and Karen L. Karavanic
Rotten Green Tests, Julien Delplanque, Stéphane Ducasse, Guillermo Polito, Andrew P. Black, and Anne Etien
Mutual Exclusion Sizing for Hoi Polloi, Swetha Mettala Gilla, Maria Roncken, Ivan Sutherland, and Xiaoyu Song
Context-Aware Image Matting for Simultaneous Foreground and Alpha Estimation, Qiqi Hou and Feng Liu
Appearance Flow Completion for Novel View Synthesis, Hoang Le and Feng Liu
Good Similar Patches for Image Denoising, Si Lu
Good Similar Patches for Image Denoising (Poster), Si Lu
High-speed Video from Asynchronous Camera Array, Si Lu
High-speed Video from Asynchronous Camera Array (Poster), Si Lu
No-reference Image Denoising Quality Assessment, Si Lu
Artificial Intelligence Hits the Barrier of Meaning, Melanie Mitchell
CommuterScanner: Towards Smart Indoor Positioning Systems in Urban Transportation, Abhishek Mukherji, Vinay Raghuram, Santosh Pandey, Huy Tran, and Nirupama Bulusu
An Uncultivated Virus Infecting a Symbiotic Nanoarchaeota in the Hot Springs of Yellowstone National Park, Jacob H. Munson-McGee, Colleen Rooney, and Mark J. Young
Context-Aware Synthesis for Video Frame Interpolation, Simon Niklaus and Feng Liu
3D Ken Burns Effect from a Single Image, Simon Niklaus, Long Mai, Jimei Yang, and Feng Liu
Event Trend Aggregation Under Rich Event Matching Semantics, Olga Poppe, Chuan Lei, Elke A. Rundensteiner, and David Maier
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage, David Pouliot, Scott Griffy, and Charles V. Wright
Innovative Process Paradigms and Data Driven Analytics: A New Horizon for Software and Systems Process, David Raffo, Reda Bendraou, LiGuo Huang, and Fabrizio M. Maggi
Challenges in Los Terahertz MIMO, Suresh Singh, Ha K. Tran, and Thanh N. Le
Joint Stabilization and Direction of 360° Videos, Chengzhou Tang, Oliver Wang, Feng Liu, and Ping Tan
What Are Hybrid Development Methods Made Of? an Evidence-Based Characterization, Paolo Tell, Jil Klünder, Steffen Küpper, David Raffo, Stephen G. MacDonell, Jürgen Münch, Dietmar Pfahl, Oliver Linssen, and Marco Kuhrmann
Improving Infrastructure-Based Indoor Positioning Systems with Device Motion Detection, Huy Tran, Abhishek Mukherji, Nirupama Bulusu, Santosh Pandey, and Xu Zhang
Comparative Analysis of Evolutionary Algorithms Based on Swarm Intelligence for QoS Optimization of Cloud Services, Yan Wang, Jian-Tao Zhou, Yan Jiao, and Song Xiaoyu
An Edge Computing Marketplace for Distributed Machine Learning, Susham Yerabolu, Samuel Gomena, Ehsan Aryafar, and Carlee Joe-Wong
Deepmarket: an Edge Computing Marketplace with Distributed Tensorflow Execution Capability, Susham Yerabolu, Soyoung Kim, Samuel J. Gomena, Xuanzhe Li, Rohan Patel, Shraddha Bhise, and Ehsan Aryafar
Traffic Consolidation for Green Optical Dcns, Qing Yi and Suresh P. Singh
Submissions from 2018
Block-Supply Chain: A New Anti-Counterfeiting Supply Chain Using NFC and Blockchain, Naif Alzahrani and Nirupama Bulusu
Equivalence Checking of Non-deterministic Operations, Sergio Antoy and Michael Hanus
A New Functional-Logic Compiler for Curry: SPRITE, Sergio Antoy and Andy Jost
Scheduling Non-preemptive Tasks with Strict Periods in Multi-core Real-time Systems, Jinchao Chen, Chenglie Du, Fei Xie, and Bin Lin
SAMU: Design and Implementation of Frequency Selectivity-Aware Multi-User MIMO for WLANs, Yongjiu Du, Yan Shi, Ehsan Aryafar, Pengfei Cui, Joseph Camp, and Mung Chiang
When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise, Guglielmo Fachini, Cătălin Hriţcu, Marco Stronati, Arthur Azevedo de Amorim, Carmine Abate, Roberto Blanco, Théo Laurent, Benjamin C. Pierce, and Andrew Tolmach
Specification-Driven Automated Conformance Checking for Virtual Prototype and Post-Silicon Designs, Haifeng Gu, Mingsong Chen, Tongquan Wei, Li Lei, and Fei Xie
A Cyber-Physical System Framework for Early Detection of Paroxysmal Diseases, Zuxing Gu, Yu Jiang, Min Zhou, Xiaoyu Song, and Lui Sha
Concolic Testing of SystemC Designs, Bin Lin, Kai Cong, Zhenkun Yang, Zhigang Liao, Tao Zhan, Christopher Havlicek, and Fei Xie
SCBench: A Benchmark Design Suite for SystemC Verification and Validation, Bin Lin and Fei Xie
Semantic Image Retrieval via Active Grounding of Visual Situations, Max H. Quinn, Erik Conser, Jordan M. Witte, and Melanie Mitchell
Joint Stabilization and Direction of 360 Degrees Videos, Chengzhou Tang, Oliver Wang, Feng Liu, and Ping Tan
Challenges and Opportunities in Transportation Data, Kristin A. Tufte, Kushal Datta, Alekh Jindal, David Maier, and Robert L. Bertini
Submissions from 2017
Blazes: Coordination Analysis and Placement for Distributed Programs, Peter Alvaro, Neil Conway, Joseph M. Hellerstein, and David Maier
Proving Non-Deterministic Computations in Agda, Sergio Antoy, Michael Hanus, and Steven Libby
Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid Architecture, Ehsan Aryafar, Alireza Keshavarz-Haddad, Carlee Joe-Wong, and Mung Chiang
CyberPDX: A Camp for Broadening Participation in Cybersecurity, Wu-chang Feng, Robert Liebman, Lois Delcambre, Michael Mooradian Lupro, Tim Sheard, Scott Britell, and Gerald W. Recktenwald
On the Temporal Effects of Mobile Blockers in Urban Millimeter-Wave Cellular Scenarios, Margarita Gapeyenko, Mikhail Gerasimenko, Andrey Samuylov, Dmitri Moltchanov, Sarabjot Singh, Mustafa Riza Akdeniz, Ehsan Aryafar, Nageen Himayat, Sergey Andreev, and Yevgeni Koucheryavy
Spatial-Semantic Image Search by Visual Feature Synthesis, Mai Long, Hailin Jin, Chen Fang, and Feng Liu
Sparse Coding on Stereo Video for Object Detection, Sheng Y. Lundquist, Melanie Mitchell, and Garrett T. Kenyon
Video Frame Interpolation via Adaptive Convolution, Simon Niklaus, Long Mai, and Feng Liu
Video Frame Interpolation via Adaptive Separable Convolution, Simon Niklaus, Long Mai, and Feng Liu
Grace's Inheritance, James Noble, Andrew P. Black, Kim B. Bruce, Michael Homer, and Timothy Jones
Fast On-Line Kernel Density Estimation for Active Object Localization, Anthony D. Rhodes, Max H. Quinn, and Melanie Mitchell
Bayesian Optimization for Refining Object Proposals, Anthony D. Rhodes, Jordan Witte, Melanie Mitchell, and Bruno Jedynak
Online Map Matching for Passive Indoor Positioning Systems, Huy Tran, Santosh Pandey, and Nirupama Bulusu
Submissions from 2016
Executable Relational Specifications of Polymorphic Type Systems Using Prolog, Ki Yung Ahn and Andrea Vezzosi
Default Rules for Curry, Sergio Antoy and Michael Hanus
A Verified Information-Flow architecture, Arthur Azevedo de Amorim, Nathan Collins, André DeHOn, Delphine Demange, Cătălin Hriţcu, David Pichardie, Benjamin C. Pierce, Randy Pollack, and Andrew Tolmach
Schedulability Analysis of Non-Preemptive Strictly Periodic Tasks in Multi-Core Real-Time Systems, Jinchao Chen, Chenglie Du, Fei Xie, and Zhenkun Yang
Incorporating Priors for Medical Image Segmentation Using a Genetic Algorithm, Payel Ghosh, Melanie Mitchell, James A. Tanyi, and Arthur Y. Hung
Generating High Coverage Tests for SystemC Designs Using Symbolic Execution, Bin Lin, Zhenkun Yang, Kai Cong, and Fei Xie
Sparse Encoding of Binocular Images for Depth Inference, Sheng Y. Lundquist, Dylan M. Paiton, Peter F. Schultz, and Garrett T. Kenyon
Rate Adaptation for Terahertz Communications, Farnoosh Moshirfatemi and Suresh Singh
Active Object Localization in Visual Situations, Max H. Quinn, Anthony Rhodes, and Melanie Mitchell
Fast and Adaptive Indexing of Multi-Dimensional Observational Data, Sheng Wang, David Maier, and Beng Chin Ooi
Submissions from 2015
Towards Automated Prediction of Relationships Among Scientific Datasets, Abdussalam Alawini, David Maier, Kristin A. Tufte, Bill Howe, and Rashmi Nandikur
Default Rules in Functional Logic Programs, Sergio Antoy and Michael Hanus
From Boolean Equalities to Constraints, Sergio Antoy and Michael Hanus
Needed Computations Shortcutting Needed Steps, Sergio Antoy, Jacob Johannsen, and Steven Libby
Compiling Collapsing Rules in Certain Constructor Systems, Sergio Antoy and Andy Jost
Micro-Policies: Formally Verified, Tag-Based Security Monitors, Arthur Azevedo de Amorim, Maxime Denes, Nick Giannarakis, Cătălin Hriţcu, Benjamin C. Pierce, Antal Spector-Zabusky, and Andrew Tolmach
The Expression Problem, Gracefully, Andrew P. Black
The Grace Programming Language Draft Specification Version 0.5. 2025, Andrew P. Black, Kim B. Bruce, and James Noble
Hierarchical Composition of Memristive Networks for Real-Time Computing, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, and Christof Teuscher
Automatic Fault Injection for Driver Robustness Testing, Kai Cong, Li Lei, Zhenkun Yang, and Fei Xie
The BigDAWG Polystore System, Jennie Duggan, Aaron J. Elmore, Michael Stonebraker, Magdalena Balazinska, Bill Howe, Jeremy Kepner, Samuel Madden, David Maier, Timothy G. Mattson, and Stan Zdonik
A Demonstration of the BigDAWG Polystore System, Aaron J. Elmore, Jennie Duggan, Michael Stonebraker, Magdalena Balazinska, Ugur Cetintemel, Vijay Gadepally, J. Heer, Bill Howe, Jeremy Kepner, Tim Kraska, Samuel Madden, David Maier, Timothy G. Mattson, S. Papadopoulos, J. Parkhurst, Nesime Tatbul, Manasi Vartak, and Stan Zdonik
A Scaffolded, Metamorphic CTF for Reverse Engineering, Wu-chang Feng
Updating an Introductory Performance Course with PDC Topics, Karen L. Karavanic and Daniel LeBlanc
Query From Examples: An Iterative, Data-Driven Approach to Query Construction, Hao Li, Chee-Yong Chan, and David Maier
Desiderata for a Big Data Language, David Maier
Technical Perspective: In-Situ Database Management, David Maier
S-Store: Streaming Meets Transaction Processing, John Meehan, Nesime Tatbul, Cansu Aslantas, Ugur Cetintemel, Jiang Du, Tim Kraska, Samuel Madden, David Maier, Andrew Pavlo, Michael Stonebraker, Kristin A. Tufte, and Hao Wang
Are Data Sets Like Documents?: Evaluating Similarity-Based Ranked Search over Scientific Data, Veronika Margaret Megler and David Maier
Demonstrating "Data Near Here": Scientific Data Search, Veronika Margaret Megler and David Maier
Data Like This: Ranked Search of Genomic Data Vision Paper, Veronika Margaret Megler, David Maier, Daniel Bottomly, Libbey White, Shannon McWeeney, and Beth Wilmot
Delay Line as a Chemical Reaction Network, Josh Moles, Peter Banda, and Christof Teuscher
Inference Attacks on Property-Preserving Encrypted Databases, Muhammad Naveed, Seny Kamara, and Charles V. Wright
A Theory of Name Resolution, Pierre Néron, Andrew Tolmach, Eelco Visser, and Guido Wachsmuth
Creating a National Nonmotorized Traffic Count Archive: Process and Progress, Krista Nordback, Kristin A. Tufte, Morgan Harvey, Nathan McNeil, Elizabeth Stolz, and Jolene Liu
Semi-modular Delay Model Revisited in Context of Relative Timing, Hoon Park, Anping He, Marly Roncken, and Xiaoyu Song
Ear-Phone: A context-aware noise mapping using smart phones, Rajib Rana, Chun Tung Chou, Nirupama Bulusu, Salil Kanhere, and Wen Hu
Naturalized Communication and Testing, Marly Roncken, Swetha Mettala Gilla, Hoon Park, Navaneeth Prasannakumar Jamadagni, Christopher Cowan, and Ivan Sutherland
Static Conflict Detection for a Policy Language, Alix Trou, Robert Dockins, and Andrew Tolmach
Evolution and Usage of the Portal Data Archive: 10-Year Retrospective, Kristin A. Tufte, Robert Bertini, and Morgan Harvey
A Constraint Language for Static Semantic Analysis based on Scope Graphs, Hendrik van Antwerpen, Pierre Néron, Andrew Tolmach, Eelco Visser, and Guido Wachsmuth
Reinforced Imitative Graph Learning for Mobile User Profiling, Dongjie Wang, Pengyang Wang, Yanjie Fu, Kunpeng Liu, Hui Xiong, and Charles Hughes
Thumbnail Preserving Encryption for JPEG, Charles V. Wright and Wu-chi Feng
Usage Based Topology for DCNs, Qing Yi and Suresh Singh
Submissions from 2014
COEL: A Web-based Chemistry Simulation Framework, Peter Banda, Drew Blount, and Christof Teuscher
Learning Two-input Linear and Nonlinear Analog Functions with a Simple Chemical System, Peter Banda and Christof Teuscher
Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems, Akshay Dua, Nirupama Bulusu, Wu-chang Feng, and Wen Hu