Follow

Submissions from 2008

Link

RADAR: A Personal Assistant that Learns to Reduce Email Overload, Michael Freed, Jaime G. Carbonell, Geoffrey J. Gordon, Jordan Hayes, Brad Myers, Daniel Siewiorek, Stephen Smith, Aaron Steinfeld, and Anthony Tomasic

Link

Holistic Application Analysis for Update-Independence, Charles Garrod, Amit Manjhi, Bruce Maggs, Todd Mowry, and Anthony Tomasic

Link

Semi-Supervised Learning of Multi-Factor Models for Face De-Identification, Ralph Gross, Latanya Sweeney, Fernando de la Torre, and Simon Baker

Link

Rare Class Discovery Based on Active Learning, Jingrui He and Jaime G. Carbonell

PDF

Alone Together: A socio-technical theory of motivation, coordination and collaboration technologies in organizing for free and open source software development, James Howison

Link

State-Set Branching: Leveraging BDDs for Heuristic Search, Rune M. Jensen, Manuela M. Veloso, and Randal E. Bryant

Link

Evaluating an Agglutinative Segmentation Model for ParaMor, Christian Monson, Alon Lavie, Jaime G. Carbonell, and Lori Levin

Link

Linguistic Structure and Bilingual Informants to Induce Machine Translation of Lesser-Resourced Languages, Christian Monson, Ariadna Font Llitjós, Vamshi Ambati, Lori Levin, Alon Lavie, Alison Alvarez, Roberto Aranovich, Jaime G. Carbonell, Robert Frederking, Erik Peterson, and Katharina Probst

PDF

Continuous-Domain Reinforcement Learning Using a Learned Qualitative State Representation, Jonathan Mugan and Benjamin Kuipers

PDF

Towards the Application of Reinforcement Learning to Undirected Developmental Learning, Jonathan Mugan and Benjamin Kuipers

Visibility of Control in Adaptive Systems, Hausi Muller, Mauro Pezze, and Mary Shaw

Link

A Novel Approach for Recognition of Human Faces, Jay Shankar Prasad and Gora Nandi

PDF

Expandable Grids for Visualizing and Authoring Computer Security Policies, Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, and Heather Strong

Link

Understanding and Capturing People’s Privacy Policies in a People Finder Application, Norman Sadeh, Jason Hong, Lorrie Faith Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, and Jinghai Rao

Link

The 2007 Procurement Challenge: A Competition to Evaluate Mixed Procurement Strategies, Alberto Sardinha, Michael Benisch, Norman Sadeh, Ramprasad Ravichandran, Vedran Podobnik, and Mihai Stan

Link

Characterizing Reusability of End-User Web Macro Scripts, Chris Scaffidi, Chris Bogart, Margaret Burnett, Allen Cypher, Brad Myers, and Mary Shaw

Link

Using Topes to Validate and Reformat Data in End-User Programming Tools, Chris Scaffidi, Allen Cypher, Sebastian Elbaum, Andhy Koesnandar, James Lin, Brad Myers, and Mary Shaw

Link

Tool Support for Data Validation by End-User Programmers, Chris Scaffidi, Brad Myers, and Mary Shaw

Link

Toped: Enabling End-User Programmers to Validate Data, Chris Scaffidi, Brad Myers, and Mary Shaw

Link

Topes: Reusable Abstractions for Validating Data, Chris Scaffidi, Brad Myers, and Mary Shaw

PDF

Using Scenario-Based Requirements to Direct Research on Web Macro Tools, Christopher Scaffidi, Allen Cypher, Sebastian Elbaum, Andhy Koesnandar, and Brad Myers

Link

Development of New Structure for Frequent Pattern Mining, Upasna Singh and Gora Nandi

Link

Demonstration of a Privacy-Preserving System that Performs an Unduplicated Accounting of Services across Homeless Programs, Latanya Sweeney

PDF

A Flexible Approach to Embedded Network Multicast Authentication, Chris Szilagy and Philip Koopman

Submissions from 2007

Link

Techniques for Dynamic Damping Control in Above Knee Prosthesis, Hemant Kr. Anand, Rachit Rastogi, and Gora Nandi

PDF

Lessons Learned from the Deployment of a Smartphone-Based Access-Control System, Lujo Bauer, Lorrie F. Cranor, Michael K. Reiter, and Kami Vaniea

Link

A Theory of Expressiveness in Mechanisms, Michael Benisch, Norman Sadeh, and Tuomas Sandholm

Link

Data-Intensive Supercomputing: The case for DISC, Randal E. Bryant

Link

Deciding Bit-Vector Arithmetic with Abstraction, Randal E. Bryant, Daniel Kroening, Joel Ouaknine, Sanjit A. Seshia, Ofer Strichman, and Bryan Brady

PDF

Workshop Report: From End-User Programming to End-User Software Engineering (a CHI'06 Workshop), Margaret Burnett, Brad Myers, Mary Beth Rosson, and Susan Wiedenbeck

Link

Combining N-grams and Alignment in G-Protein Coupling Specificity Prediction, Betty Yee Man Cheng and Jaime G. Carbonell

Link

User-Controllable Security and Privacy for Pervasive Computing, Jason Cornwell, Ian Fette, Gary Hsieh, Madhu Prabaker, Jinghai Rao, Karen Teng, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Jason Hong, Bruce McLaren, Mike Reiter, and Norman Sadeh

Link

Factoring Games to Isolate Strategic Interactions, George B. Davis, Michael Benisch, Kathleen M. Carley, and Norman Sadeh

Link

Dual Strategy Active Learning, Pinar Donmez, Jaime G. Carbonell, and Paul N. Bennett

PDF

Behavioral Response to Phishing Risk, Julie S. Downs, Mandy Holbrook, and Lorrie F. Cranor

Link

Retrieval and Feedback Models for Blog Distillation, Jonathan Elsas, Jaime Arguello, Jamie Callan, and Jaime G. Carbonell

Link

Strategies for Research About Design: a multidisciplinary graduate workshop, Mark D. Gross, Susan Finger, James Herbsleb, and Mary Shaw

Link

Robust Hand Geometry Measurements for Person Identification using Active Appearance Models, Ralph Gross, Yiheng Li, Latanya Sweeney, Xiaoqian Jiang, Wanhong Xu, and Daniel Yurovsky

Link

Towards Real-World Face De-Identification, Ralph Gross and Latanya Sweeney

Link

Nearest-Neighbor-Based Active Learning for Rare Category Detection, Jingrui He and Jaime G. Carbonell

Link

Graph-Based Semi-Supervised Learning as a Generative Model, Jingrui He, Jaime G. Carbonell, and Yan Liu

PDF

Position Paper: Deeply Embedded Survivability, Philip Koopman, Jennifer Black, and Theresa Maxino

PDF

Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System, Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge

PDF

Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer, Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie F. Cranor, and Jason Hong

Link

Cluster-Based Selection of Statistical Answering Strategies, Lucian Vlad Lita and Jaime G. Carbonell

Link

Protein Quaternary Fold Recognition Using Conditional Graphical Models, Yan Liu, Jaime G. Carbonell, Vanathi Gopalakrishnan, and Peter Weigele

PDF

Adaptive Sampling for Multi-Robot Wide-Area Exploration, Kian Hsiang Low, Geoffrey J. Gordon, John M. Dolan, and Pradeep Khosla

Link

Invalidation Clues for Database Scalability Services, Amit Manjhi, Phillip B. Gibbons, Anastassia Ailamaki, Charles Garrod, Bruce M. Maggs, Todd C. Mowry, Christopher Olston, Anthony Tomasic, and Haifeng Yu

Link

ParaMor: Finding Paradigms across Morphology, Christian Monson, Jaime G. Carbonell, Alon Lavie, and Lori Levin

Link

ParaMor: Minimally-Supervised Induction of Paradigm Structure and Morphological Analysis, Christian Monson, Jaime G. Carbonell, Alon Lavie, and Lori Levin

PDF

Learning Distinctions and Rules in a Continuous World Through Active Exploration, Jonathan Mugan and Benjamin Kuipers

PDF

Learning to Predict the Effects of Actions: Synergy Between Rules and Landmarks, Jonathan Mugan and Benjamin Kuipers

PDF

Common Pitfalls in Statistical Thinking, Mark C. Paulk and Elaine B. Hyder

Link

Leveraging Resource Prediction for Anticipatory Dynamic Configuration, Vahe Poladian, David Garlan, Mary Shaw, M. Satyanarayanan, Bradley Schmerl, and João Sousa

Link

Modeling Uncertainty of Predictive Inputs in Anticipatory Dynamic Configuration, Vahe Poladian, Mary Shaw, and David Garlan

Link

Enforcing Context-Sensitive Policies in Collaborative Business Environments, Alberto Sardinha, Jinghai Rao, and Norman Sadeh

Link

Trial By Water: Creating Hurricane Katrina "Person Locator" Web Sites, Chris Scaffidi, Brad Myers, and Mary Shaw

Link

Developing Confidence in Software through Credentials and Low-Ceremony Evidence, Chris Scaffidi and Mary Shaw

Link

Toward a Calculus of Confidence, Chris Scaffidi and Mary Shaw

PDF

Scenario-Based Requirements for Web Macro Tools, Christopher Scaffidi, Allen Cypher, Sebastian Elbaum, Andhy Koesnandar, and Brad Myers

Link

On Solving Boolean Combinations of UTVPI Constraints, Sanjit A. Seshia, K. Subramani, and Randal E. Bryant

Link

Helping Everyday Users Establish Confidence for Everyday Applications, Mary Shaw

Link

Strategies for Achieving Dependability in Coalitions of Systems, Mary Shaw

PDF

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish, Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge

Link

User Constructed Data Integration via Mixed Initiative Design, Anthony Tomasic, John Zimmerman, Ian Hargraves, and Roderick McMullen

Submissions from 2006

Link

Ultra-Large-Scale Systems: The Software Challenge of the Future

PDF

Scheduling with Uncertain Resources Part 3: Elicitation of Additional Data, Ulas Bardak, Eugene Fink, Chris R. Martens, and Jaime G. Carbonell

Link

Scalable Data Exploration and Novelty Detection, Jaime G. Carbonell, Eugene Fink, and Chun Jin

Link

Context-Based Machine Translation, Jaime G. Carbonell, Steve Klein, David Miller, Michael Steinbaum, Tomer Grassiany, and Jochen Frey

PDF

Language Technologies for Humanitarian Aid, Jaime G. Carbonell, Alon Lavie, Lori Levin, and Alan Black

PDF

JASPER: An Eclipse Plug-In to Facilitate Software Maintenance Tasks, Michael Coblenz, Andrew Ko, and Brad Myers

PDF

Coordination theory and its application in HCI, Kevin Crowston, Joseph Rubleske, and James Howison

PDF

Core and periphery in Free/Libre and Open Source software team communications, Kevin Crowston, Kangning Wei, Qing Li, and James Howison

PDF

Communication Networks from the Enron Email Corpus: "It's Always About the People. Enron is no Different.", Jana Diesner, Terrill L. Frantz, and Kathleen M. Carley

PDF

Decision Strategies and Susceptibility to Phishing, Julie S. Downs, Mandy B. Holbrook, and Lorrie Faith Cranor

Link

Scheduling with Uncertain Resources: Collaboration with the User, Eugene Fink, Ulas Bardak, Brandon Rothrock, and Jaime G. Carbonell

Link

Scheduling with Uncertain Resources: Search for a Near-Optimal Solution, Eugene Fink, P. Matthew Jennings, Ulas Bardak, Jean Oh, Stephen F. Smith, and Jaime G. Carbonell

Link

Spectral Clustering for Example-Based Machine Translation, Rashmi Gangadharaiah, Ralf Brown, and Jaime G. Carbonell

PDF

Power Strips, Prophylactics, and Privacy, Oh My!, Julia Gideon, Lorrie Cranor, Serge Egelman, and Alessandro Acquisti

Link

Model-Based Face De-Identification, Ralph Gross, Latanya Sweeney, Fernando de la Torre, and Simon Baker

Link

ARGUS: Efficient Scalable Continuous Query Optimization for Large-Volume Data Streams, Chun Jin and Jaime G. Carbonell

PDF

ARGUS: Efficient Scalable Continuous Query Optimization for Large-Volume Data Streams, Chun Jin and Jaime G. Carbonell

PDF

End-User Programming Productivity Tools, Andrew Ko, Brad Myers, Michael Coblenz, and Jeffrey Stylos

PDF

Human Selection of Mnemonic Phrase-based Passwords, Cynthia Kuo, Sasha Romanosky, and Lorrie Faith Cranor

Link

Experiences and Results from Initiating Field Defect Prediction and Product Test Prioritization Efforts at ABB Inc., Paul Luo Li, James Herbsleb, Mary Shaw, and Brian Robinson

Link

Segmentation Conditional Random Fields (SCRFs): A New Approach for Protein Fold Recognition, Yan Liu, Jaime G. Carbonell, Peter Weigele, and Vanathi Gopalakrishnan

PDF

Automating Post-Editing to Improve MT Systems, Ariadna Font Llitjós and Jaime G. Carbonell

PDF

Revisiting Fletcher and Adler Checksums, Theresa Maxino

Link

Developing Software suite for microcontroller based above knee active Prosthesis, Gora Nandi

PDF

Controlling Home and Office Appliances with Smartphones, Jeffrey Nichols and Brad Myers

PDF

Factors Affecting Personal Software Quality, Mark C. Paulk

Link

Federated Ontology Search, Vasco Calais Pedro, Eric Nyberg, and Jaime G. Carbonell

Link

A Mixed Initiative Semantic Web Framework for Process Composition, Jinghai Rao, Dimitar Dimitrov, Paul Hofmann, and Norman Sadeh

PDF

Efficient High Hamming Distance CRCs for Embedded Networks, Justin Ray and Philip Koopman

Link

Dimensions Characterizing Programming Language Feature Usage by Information Workers, Chris Scaffidi, Andrew Ko, Mary Shaw, and Brad Myers

Link

Challenges, Motivations, and Success Factors in the Creation of Hurricane Katrina "Person Locator" Web Sites, Chris Scaffidi, Brad Myers, and Mary Shaw

Link

Games Programs Play: Obstacles to Data Reuse, Chris Scaffidi, Mary Shaw, and Brad Myers

PDF

The EUSES Web Macro Scenario Corpus, Version 1.0, Christopher Scaffidi, Allen Cypher, Sebastian Elbaum, Andhy Koesnandar, and Brad Myers

Link

Strategies for Achieving Robustness in Coalitions of Systems, Mary Shaw

Link

The Golden Age of Software Architecture: A Comprehensive Survey, Mary Shaw and Paul Clements