Publications


2012
 
[1]
S. Amer-Yahia, S. Anjum, A. Ghenai, A. Siddique, S. Abbar, S. Madden, A. Marcus, and M. El-Haddad, “MAQSA: A System for Social Analytics on News,” in Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2012, pp. 653–656 [Online]. Available: http://doi.org/10.1145/2213836.2213924

 

2013:

[2]
G. Gartheeban and J. Guttag, “A Data-driven Method for In-game Decision Making in MLB: When to Pull a Starting Pitcher,” in Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 2013, pp. 973–979 [Online]. Available: http://doi.org/10.1145/2487575.2487660
 
[3]
A. Jindal, J. Quiané-Ruiz, and S. Madden, “CARTILAGE: Adding Flexibility to the Hadoop Skeleton,” in Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2013, pp. 1057–1060 [Online]. Available: http://doi.org/10.1145/2463676.2465258
 
[4]
F. Shih, O. Seneviratne, I. Liccardi, E. Patton, P. Meier, and C. Castillo, “Democratizing Mobile App Development for Disaster Management,” in Joint Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments and Workshop on Semantic Cities, New York, NY, USA, 2013, pp. 39–42 [Online]. Available: http://doi.org/10.1145/2516911.2516915
 
[5]
M. Stonebraker, D. Bruckner, I. F. Ilyas, G. Beskales, M. Cherniack, S. B. Zdonik, A. Pagan, and S. Xu, “Data Curation at Scale: The Data Tamer System,” in CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 6-9, 2013, Online Proceedings, 2013 [Online]. Available: http://www.cidrdb.org/cidr2013/Papers/CIDR13_Paper28.pdf
 
[6]
X. Yu, C. W. Fletcher, L. Ren, M. van Dijk, and S. Devadas, “Generalized External Interaction with Tamper-resistant Hardware with Bounded Information Leakage,” in Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, New York, NY, USA, 2013, pp. 23–34 [Online]. Available: http://doi.org/10.1145/2517488.2517498
 
[7]
H. Sajjad, K. Darwish, and Y. Belinkov, “Translating Dialectal Arabic to English,” in Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), Sofia, Bulgaria, 2013, pp. 1–6 [Online]. Available: http://www.aclweb.org/anthology/P13-2001

 

2014:

[8]
K. Calagari, K. Templin, T. Elgamal, K. Diab, P. Didyk, W. Matusik, and M. Hefeeda, “Anahita: A System for 3D Video Streaming with Depth Customization,” in Proceedings of the 22Nd ACM International Conference on Multimedia, New York, NY, USA, 2014, pp. 337–346 [Online]. Available: http://doi.org/10.1145/2647868.2654899
 
[9]
P. Cardinal, A. M. Ali, N. Dehak, Y. Zhang, T. Al Hanai, Y. Zhang, J. R. Glass, and S. Vogel, “Recent advances in ASR applied to an Arabic transcription system for Al-Jazeera.,” in 15th Annual Conference of the International Speech Communication Association, 2014, pp. 2088–2092 [Online]. Available: http://www.isca-speech.org/archive/archive_papers/interspeech_2014/i14_2...
 
[10]
G. Ganeshapillai and J. Guttag, “A Data-driven Method for In-game Decision Making in MLB,” in 2014 MIT Sloan Sports Analytics Conference, Boston, MA, USA, 2014 [Online]. Available: http://www.sloansportsconference.com/wp-content/uploads/2014/02/2014_SSA...
 
[11]
S. Goldwasser, S. D. Gordon, V. Goyal, A. Jain, J. Katz, F.-H. Liu, A. Sahai, E. Shi, and H.-S. Zhou, “Multi-input functional encryption,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2014, pp. 578–602 [Online]. Available: http://link.springer.com/chapter/10.1007/978-3-642-55220-5_32
 
[12]
L. Gyarmati, H. Kwak, and P. Rodriguez, “Searching for a unique style in soccer,” in 2014 KDD Workshop on Large-Scale Sports Analytics, 2014 [Online]. Available: http://large-scale-sports-analytics.org/Large-Scale-Sports-Analytics/Sub...
 
[13]
M. Kates, “Player motion analysis: automatically classifying NBA plays,” Massachusetts Institute of Technology, 2014 [Online]. Available: http://dspace.mit.edu/handle/1721.1/100664
 
[14]
M. T. Khan, D. Serpanos, and H. Shrobe, “On the Behavioural Formalization of the Cognitive Middleware AWDRAT,” arXiv preprint arXiv:1412.2328, 2014 [Online]. Available: http://arxiv.org/abs/1412.2328
 
[15]
M. T. Khan, D. N. Serpanos, and H. E. Shrobe, “On the Formal Semantics of the Cognitive Middleware AWDRAT,” arXiv:1412.3588, 2014 [Online]. Available: http://arxiv.org/abs/1412.3588
 
[16]
A. McQueen, J. Wiens, and J. Guttag, “Automatically recognizing on-ball screens,” in 2014 MIT Sloan Sports Analytics Conference, Boston, MA, USA, 2014 [Online]. Available: http://www.sloansportsconference.com/wp-content/uploads/2014/02/2014_SSA...
 
[17]
A. Sambra, S. Hawke, T. Berners-Lee, L. Kagal, and A. Aboulnaga, “CIMBA: client-integrated microblogging architecture,” in Proceedings of the 2014 International Conference on Posters & Demonstrations Track-Volume 1272, 2014, pp. 57–60 [Online]. Available: http://dl.acm.org/citation.cfm?id=2878468
 
[18]
O. Seneviratne, E. W. Patton, D. Miao, F. Shih, W. Li, L. Kagal, and C. Castillo, “Developing Mobile Linked Data Applications,” in Proceedings of the 2014 International Conference on Posters & Demonstrations Track - Volume 1272, Aachen, Germany, Germany, 2014, pp. 169–172 [Online]. Available: http://dl.acm.org/citation.cfm?id=2878453.2878496
 
[19]
N. Wadhwa, M. Rubinstein, F. Durand, and W. T. Freeman, “Riesz pyramids for fast phase-based video magnification,” in Computational Photography (ICCP), 2014 IEEE International Conference on, 2014, pp. 1–10 [Online]. Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6831820
 
[20]
C. W. Fletchery, L. Ren, X. Yu, M. V. Dijk, O. Khan, and S. Devadas, “Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs,” in 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA), 2014, pp. 213–224 [Online]. Available: http://doi.org/10.1109/HPCA.2014.6835932
 
[21]
M. Gubanov, M. Stonebraker, and D. Bruckner, “Text and structured data fusion in data tamer at scale,” in 2014 IEEE 30th International Conference on Data Engineering, 2014, pp. 1258–1261 [Online]. Available: http://doi.org/10.1109/ICDE.2014.6816755
 
[22]
T. B. Hashimoto, M. D. Edwards, and D. K. Gifford, “Universal Count Correction for High-Throughput Sequencing,” PLoS Comput Biol, vol. 10, no. 3, pp. 1–11, Mar. 2014 [Online]. Available: http://doi.org/10.1371/journal.pcbi.1003494
 
[23]
M. D. Edwards, A. Symbor-Nagrabska, L. Dollard, D. K. Gifford, and G. R. Fink, “Interactions between chromosomal and nonchromosomal elements reveal missing heritability,” Proceedings of the National Academy of Sciences, vol. 111, no. 21, pp. 7719–7722, May 2014 [Online]. Available: http://doi.org/10.1073/pnas.1407126111
 
[24]
T. Lei, Y. Xin, Y. Zhang, R. Barzilay, and T. Jaakkola, “Low-Rank Tensors for Scoring Dependency Structures,” in Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Baltimore, Maryland, 2014, pp. 1381–1391 [Online]. Available: http://www.aclweb.org/anthology/P14-1130
 
[25]
Y. Zhang, T. Lei, R. Barzilay, T. Jaakkola, and A. Globerson, “Steps to Excellence: Simple Inference with Refined Scoring of Dependency Trees,” in Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Baltimore, Maryland, 2014, pp. 197–207 [Online]. Available: http://www.aclweb.org/anthology/P14-1019
 
[26]
M. H. Bahari, N. Dehak, H. V. hamme, L. Burget, A. M. Ali, and J. Glass, “Non-Negative Factor Analysis of Gaussian Mixture Model Weight Adaptation for Language and Dialect Recognition,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, no. 7, Jul. 2014 [Online]. Available: http://doi.org/10.1109/TASLP.2014.2319159
 
[27]
K. Templin, P. Didyk, K. Myszkowski, M. M. Hefeeda, H.-P. Seidel, and W. Matusik, “Modeling and optimizing eye vergence response to stereoscopic cuts,” ACM Transactions on Graphics, vol. 33, no. 4, pp. 1–8, Jul. 2014 [Online]. Available: http://doi.org/10.1145/2601097.2601148
 
[28]
I. Saleh, S. Cyphers, J. Glass, S. Joty, L. Màrquez, A. Moschitti, and P. Nakov, “A Study of using Syntactic and Semantic Structures for Concept Segmentation and Labeling,” in COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers, Dublin, Ireland, 2014, pp. 193–202 [Online]. Available: http://www.aclweb.org/anthology/C14-1020
 
[29]
A. Agarwal, H. Hassanieh, O. Abari, E. Hamed, D. Katabi, and Arvind, “High-throughput implementation of a million-point sparse Fourier Transform,” in 2014 24th International Conference on Field Programmable Logic and Applications (FPL), 2014, pp. 1–6 [Online]. Available: http://doi.org/10.1109/FPL.2014.6927450
 
[30]
T. Al Hanai and J. Glass, “Lexical Modeling for Arabic ASR: A Systematic Approach,” in 15th Annual Conference of the International Speech Communication Association, 2014, pp. 2605–2609 [Online]. Available: http://www.isca-speech.org/archive/archive_papers/interspeech_2014/i14_2...
 
[31]
R. Taft, E. Mansour, M. Serafini, J. Duggan, A. J. Elmore, A. Aboulnaga, A. Pavlo, and M. Stonebraker, “E-store: Fine-grained Elastic Partitioning for Distributed Transaction Processing Systems,” Proc. VLDB Endow., vol. 8, no. 3, pp. 245–256, Nov. 2014 [Online]. Available: http://doi.org/10.14778/2735508.2735514
 
[32]
A. Ali, Y. Zhang, P. Cardinal, N. Dahak, S. Vogel, and J. Glass, “A complete KALDI recipe for building Arabic speech recognition systems,” in 2014 IEEE Spoken Language Technology Workshop (SLT), 2014, pp. 525–529 [Online]. Available: http://doi.org/10.1109/SLT.2014.7078629

 

2015:

[33]
Z. Abedjan, J. Morcos, M. N. Gubanov, I. F. Ilyas, M. Stonebraker, P. Papotti, and M. Ouzzani, “Dataxformer: Leveraging the Web for Semantic Transformations,” in CIDR 2015, Seventh Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 4-7, 2015, Online Proceedings, 2015 [Online]. Available: http://www.cidrdb.org/cidr2015/Papers/CIDR15_Paper31.pdf
 
[34]
P. Ananth, Z. Brakerski, G. Segev, and V. Vaikuntanathan, “From Selective to Adaptive Security in Functional Encryption,” in Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, R. Gennaro and M. Robshaw, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 657–677 [Online]. Available: http://doi.org/10.1007/978-3-662-48000-7_32
 
[35]
Z. Brakerski and V. Vaikuntanathan, “Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions,” in Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II, Y. Dodis and J. B. Nielsen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 1–30 [Online]. Available: http://doi.org/10.1007/978-3-662-46497-7_1
 
[36]
R. Canetti, J. Holmgren, A. Jain, and V. Vaikuntanathan, “Succinct Garbling and Indistinguishability Obfuscation for RAM Programs,” in Forty-Seventh Annual ACM on Symposium on Theory of Computing, New York, NY, USA, 2015, pp. 429–437 [Online]. Available: http://doi.org/10.1145/2746539.2746621
 
[37]
G. Chaurasia, J. Ragan-Kelley, S. Paris, G. Drettakis, and F. Durand, “Compiling High Performance Recursive Filters,” in Proceedings of the 7th Conference on High-Performance Graphics, New York, NY, USA, 2015, pp. 85–94 [Online]. Available: http://doi.org/10.1145/2790060.2790063
 
[38]
B. Delaware, C. Pit-Claudel, J. Gross, and A. Chlipala, “Fiat: Deductive Synthesis of Abstract Data Types in a Proof Assistant,” in POPL ’15 Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015, pp. 689–700 [Online]. Available: http://doi.org/10.1145/2676726.2677006
 
[39]
C. W. Fletcher, L. Ren, A. Kwon, M. van Dijk, and S. Devadas, “Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM,” in Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, New York, NY, USA, 2015, pp. 103–116 [Online]. Available: http://doi.acm.org/10.1145/2694344.2694353
 
[40]
S. Gorbunov, V. Vaikuntanathan, and H. Wee, “Predicate Encryption for Circuits from LWE,” in Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, R. Gennaro and M. Robshaw, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 503–523 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48000-7_25
 
[41]
S. Gorbunov, V. Vaikuntanathan, and D. Wichs, “Leveled Fully Homomorphic Signatures from Standard Lattices,” in Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, New York, NY, USA, 2015, pp. 469–477 [Online]. Available: http://doi.acm.org/10.1145/2746539.2746576
 
[42]
Y. Ishai, R. Kumaresan, E. Kushilevitz, and A. Paskin-Cherniavsky, “Secure Computation with Minimal Interaction, Revisited,” in Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, R. Gennaro and M. Robshaw, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 359–378 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48000-7_18
 
[43]
A. Jain, J. Adebayo, E. de Leon, W. Li, L. Kagal, P. Meier, and C. Castillo, “Mobile Application Development for Crisis Data,” Procedia Engineering, vol. 107, pp. 255–262, 2015 [Online]. Available: http://doi.org/10.1016/j.proeng.2015.06.080
 
[44]
Z. Khayyat, I. F. Ilyas, A. Jindal, S. Madden, M. Ouzzani, P. Papotti, J.-A. Quiané-Ruiz, N. Tang, and S. Yin, “BigDansing: A System for Big Data Cleansing,” in Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2015, pp. 1215–1230 [Online]. Available: http://doi.acm.org/10.1145/2723372.2747646
 
[45]
V. Kolesnikov and R. Kumaresan, “On Cut-and-Choose Oblivious Transfer and Its Variants,” in Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part I, T. Iwata and J. H. Cheon, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 386–412 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48797-6_17
 
[46]
R. Kumaresan, T. Moran, and I. Bentov, “How to Use Bitcoin to Play Decentralized Poker,” in Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2015, pp. 195–206 [Online]. Available: http://doi.acm.org/10.1145/2810103.2813712
 
[47]
A. Kwon, M. AlSabah, D. Lazar, M. Dacier, and S. Devadas, “Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services,” in 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., 2015, pp. 287–302 [Online]. Available: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/pr...
 
[48]
Y. H. Kwon, “Riffle: An efficient communication system with strong anonymity,” Massachusetts Institute of Technology, 2015 [Online]. Available: http://hdl.handle.net/1721.1/99859
 
[49]
J. Morcos, Z. Abedjan, I. F. Ilyas, M. Ouzzani, P. Papotti, and M. Stonebraker, “DataXFormer: An Interactive Data Transformation Tool,” in Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2015, pp. 883–888 [Online]. Available: http://doi.acm.org/10.1145/2723372.2735366
 
[50]
L. Ren, C. Fletcher, A. Kwon, E. Stefanov, E. Shi, M. van Dijk, and S. Devadas, “Constants Count: Practical Improvements to Oblivious RAM,” in 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., 2015, pp. 415–430 [Online]. Available: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/pr...
 
[51]
V. Vaikuntanathan and P. N. Vasudevan, “Secret Sharing and Statistical Zero Knowledge,” in Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part I, T. Iwata and J. H. Cheon, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 656–680 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48797-6_27
 
[52]
WeiHua James Li, Julius Adebayo, Fuming Shih, and Lalana Kagal, “Understanding the role of mobile technologies for humanitarian relief,” in ISCRAM 2015 Conference Proceedings – 12th International Conference on Information Systems for Crisis Response and Management, Kristiansand, Norway, 2015 [Online]. Available: http://idl.iscram.org/files/weihuajamesli/2015/1224_WeiHuaJamesLi_etal20...
 
[53]
J. Yang, “Preventing Information Leaks with Policy-Agnostic Programming,” Massachusetts Institute of Technology, 2015 [Online]. Available: http://hdl.handle.net/1721.1/101468
 
[54]
X. Yu, S. K. Haider, L. Ren, C. Fletcher, A. Kwon, M. van Dijk, and S. Devadas, “PrORAM: Dynamic Prefetcher for Oblivious RAM,” in Proceedings of the 42Nd Annual International Symposium on Computer Architecture, New York, NY, USA, 2015, pp. 616–628 [Online]. Available: http://doi.acm.org/10.1145/2749469.2750413
 
[55]
C. W. Fletcher, L. Ren, A. Kwon, M. v Dijk, E. Stefanov, D. Serpanos, and S. Devadas, “A Low-Latency, Low-Area Hardware Oblivious RAM Controller,” in 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), 2015, pp. 215–222 [Online]. Available: http://doi.org/10.1109/FCCM.2015.58
 
[56]
A. Alghunaim, M. Mohtarami, S. Cyphers, and J. Glass, “A Vector Space Approach for Aspect Based Sentiment Analysis,” in Proceedings of the 1st Workshop on Vector Space Modeling for Natural Language Processing, Denver, Colorado, 2015, pp. 116–122 [Online]. Available: http://www.aclweb.org/anthology/W15-1516
 
[57]
Y. Belinkov, M. Mohtarami, S. Cyphers, and J. Glass, “VectorSLU: A Continuous Word Vector Approach to Answer Selection in Community Question Answering Systems,” in Proceedings of the 9th International Workshop on Semantic Evaluation (SemEval 2015), Denver, Colorado, 2015, pp. 282–287 [Online]. Available: http://www.aclweb.org/anthology/S15-2048
 
[58]
A. Davis, K. L. Bouman, J. G. Chen, M. Rubinstein, F. Durand, and W. T. Freeman, “Visual vibrometry: Estimating material properties from small motions in video,” in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 5335–5343 [Online]. Available: http://doi.org/10.1109/CVPR.2015.7299171
 
[59]
M. A. Elgharib, M. Hefeeda, F. Durand, and W. T. Freeman, “Video magnification in presence of large motions,” in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 4119–4127 [Online]. Available: http://doi.org/10.1109/CVPR.2015.7299039
 
[60]
T. Lei, Y. Zhang, L. Màrquez, A. Moschitti, and R. Barzilay, “High-Order Low-Rank Tensors for Semantic Role Labeling,” in Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, 2015, pp. 1150–1160 [Online]. Available: http://www.aclweb.org/anthology/N15-1121
 
[61]
P. Nakov, L. Màrquez, W. Magdy, A. Moschitti, J. Glass, and B. Randeree, “SemEval-2015 Task 3: Answer Selection in Community Question Answering,” in Proceedings of the 9th International Workshop on Semantic Evaluation (SemEval 2015), Denver, Colorado, 2015, pp. 269–281 [Online]. Available: http://www.aclweb.org/anthology/S15-2047
 
[62]
Y. Zhang, C. Li, R. Barzilay, and K. Darwish, “Randomized Greedy Inference for Joint Segmentation, POS Tagging and Dependency Parsing,” in Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, 2015, pp. 42–52 [Online]. Available: http://www.aclweb.org/anthology/N15-1005
 
[63]
A. Barrón-Cedeño, S. Filice, G. Da San Martino, S. Joty, L. Màrquez, P. Nakov, and A. Moschitti, “Thread-Level Information for Comment Classification in Community Question Answering,” in Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers), Beijing, China, 2015, pp. 687–693 [Online]. Available: http://www.aclweb.org/anthology/P15-2113
 
[64]
Y. Belinkov, A. Barrón-Cedeño, and H. Mubarak, “Answer Selection in Arabic Community Question Answering: A Feature-Rich Approach,” in Proceedings of the Second Workshop on Arabic Natural Language Processing, Beijing, China, 2015, pp. 183–190 [Online]. Available: http://www.aclweb.org/anthology/W15-3223
 
[65]
A. Abdelali, A. Ali, F. Guzmán, F. Stahlberg, S. Vogel, and Y. Zhang, “QAT2–The QCRI Advanced Transcription and Translation System,” in 16th Annual Conference of the International Speech Communication Association, 2015, pp. 726–727 [Online]. Available: http://www.isca-speech.org/archive/interspeech_2015/papers/i15_0726.pdf
 
[66]
P. Cardinal, N. Dehak, Y. Zhang, and J. Glass, “Speaker adaptation using the i-vector technique for bottleneck features,” in 16th Annual Conference of the International Speech Communication Association, 2015, vol. 2015, pp. 2867–2871 [Online]. Available: http://www.isca-speech.org/archive/interspeech_2015/papers/i15_2867.pdf
 
[67]
S. Joty, A. Barrón-Cedeño, G. Da San Martino, S. Filice, L. Màrquez, A. Moschitti, and P. Nakov, “Global Thread-level Inference for Comment Classification in Community Question Answering,” in Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, Lisbon, Portugal, 2015, pp. 573–578 [Online]. Available: http://aclweb.org/anthology/D15-1068
 
[68]
N. Bitansky and V. Vaikuntanathan, “Indistinguishability Obfuscation from Functional Encryption,” in 2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS), 2015, pp. 171–190 [Online]. Available: http://doi.org/10.1109/FOCS.2015.20
 
[69]
A. Davis, J. G. Chen, and F. Durand, “Image-space Modal Bases for Plausible Manipulation of Objects in Video,” ACM Trans. Graph., vol. 34, no. 6, p. 239:1–239:7, Oct. 2015 [Online]. Available: http://doi.acm.org/10.1145/2816795.2818095
 
[70]
Z. Abedjan, C. G. Akcora, M. Ouzzani, P. Papotti, and M. Stonebraker, “Temporal Rules Discovery for Web Data Cleaning,” Proc. VLDB Endow., vol. 9, no. 4, pp. 336–347, Dec. 2015 [Online]. Available: http://doi.org/10.14778/2856318.2856328

 

2016:

[71]
N. Beckmann and D. Sanchez, “Cache Calculus: Modeling Caches through Differential Equations,” IEEE Computer Architecture Letters, vol. PP, no. 99, pp. 1–1, 2016 [Online]. Available: http://doi.org/10.1109/LCA.2015.2512873
 
[72]
Harshad Kasture, Daniel Sanchez, “Tailbench: a benchmark suite and evaluation methodology for latency-critical applications,” 2016 IEEE International Symposium on Workload Characterization (IISWC), vol. , no. , pp. 1–10, 2016 [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/IISWC.2016.7581261
 
[73]
N. Beckmann and D. Sanchez, “Modeling cache performance beyond LRU,” in 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA), 2016, pp. 225–236 [Online]. Available: https://doi.org/10.1109/HPCA.2016.7446067
 
[74]
K. Calagari, T. Elgamal, K. Diab, K. Templin, P. Didyk, W. Matusik, and M. Hefeeda, “Depth Personalization and Streaming of Stereoscopic Sports Videos,” ACM Trans. Multimedia Comput. Commun. Appl., vol. 12, no. 3, p. 41:1–41:23, Mar. 2016 [Online]. Available: http://doi.acm.org/10.1145/2890103
 
[75]
E. Mansour, A. V. Sambra, S. Hawke, M. Zereba, S. Capadisli, A. Ghanem, A. Aboulnaga, and T. Berners-Lee, “A Demonstration of the Solid Platform for Social Web Applications,” in Proceedings of the 25th International Conference Companion on World Wide Web, Montréal, Québec, Canada, 2016, pp. 223–226 [Online]. Available: https://doi.org/10.1145/2872518.2890529
 
[76]
Z. Abedjan, J. Morcos, I. F. Ilyas, M. Ouzzani, P. Papotti, and M. Stonebraker, “DataXFormer: A robust transformation discovery system,” in 2016 IEEE 32nd International Conference on Data Engineering (ICDE), 2016, pp. 1134–1145 [Online]. Available: http://doi.org/10.1109/ICDE.2016.7498319
 
[77]
K. Krafka, A. Khosla, P. Kellnhofer, H. Kannan, S. Bhandarkar, W. Matusik, and A. Torralba, “Eye Tracking for Everyone,” in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 2176–2184 [Online]. Available: http://www.cv-foundation.org/openaccess/content_cvpr_2016/html/Krafka_Ey...
 
[78]
T. Lei, H. Joshi, R. Barzilay, T. Jaakkola, K. Tymoshenko, A. Moschitti, and L. Màrquez, “Semi-supervised Question Retrieval with Gated Convolutions,” in Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego, California, 2016, pp. 1279–1289 [Online]. Available: http://www.aclweb.org/anthology/N16-1153
 
[79]
M. Mohtarami, Y. Belinkov, W.-N. Hsu, Y. Zhang, T. Lei, K. Bar, S. Cyphers, and J. Glass, “SLS at SemEval-2016 Task 3: Neural-based Approaches for Ranking in Community Question Answering,” in Proceedings of the 10th International Workshop on Semantic Evaluation (SemEval-2016), San Diego, California, 2016, pp. 828–835 [Online]. Available: http://www.aclweb.org/anthology/S16-1128
 
[80]
Y. Zhang, D. Gaddy, R. Barzilay, and T. Jaakkola, “Ten Pairs to Tag – Multilingual POS Tagging via Coarse Mapping between Embeddings,” in Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego, California, 2016, pp. 1307–1317 [Online]. Available: http://www.aclweb.org/anthology/N16-1156
 
[81]
P. Kellnhofer, P. Didyk, K. Myszkowski, M. M. Hefeeda, H.-P. Seidel, and W. Matusik, “GazeStereo3D: seamless disparity manipulations,” ACM Transactions on Graphics, vol. 35, no. 4, pp. 1–13, Jul. 2016 [Online]. Available: http://dl.acm.org/citation.cfm?doid=2897824.2925866
 
[82]
Abe Davis, “Visual Vibration Analysis,” PhD Dissertation, Massachusetts Institute of Technology, 2016 [Online]. Available: http://www.abedavis.com/thesis.pdf
 
[83]
Z. Abedjan, X. Chu, D. Deng, R. C. Fernandez, I. F. Ilyas, M. Ouzzani, P. Papotti, M. Stonebraker, and N. Tang, “Detecting Data Errors: Where are we and what needs to be done?,” Proceedings of the VLDB Endowment, vol. 9, no. 12, pp. 993–1004, Aug. 2016 [Online]. Available: https://doi.org/10.14778/2994509.2994518
 
[84]
L. Chong-U, L. Antonios, and H. F. D, “Discovering Social and Aesthetic Categories of Avatars: A Bottom-Up Artificial Intelligence Approach Using Image Clustering,” in DiGRA/FDG - Proceedings of the First International Joint Conference of DiGRA and FDG, Dundee, Scotland, 2016 [Online]. Available: http://www.digra.org/wp-content/uploads/digital-library/paper_1971.pdf
 
[85]
H. Nassif, M. Mohtarami, and J. Glass, “Learning semantic relatedness in community question answering using neural models,” in ACL 2016, 2016, pp. 137–147 [Online]. Available: http://www.aclweb.org/anthology/W16-1616
 
[86]
A. Ali, N. Dehak, P. Cardinal, S. Khurana, S. H. Yella, J. Glass, P. Bell, and S. Renals, “Automatic Dialect Detection in Arabic Broadcast Speech,” presented at the INTERSPEECH 2016, San Francisco, CA, 2016, pp. 2934–2938 [Online]. Available: https://doi.org/10.21437/Interspeech.2016-1297
 
[87]
Y. Belinkov and J. Glass, “Large-Scale Machine Translation between Arabic and Hebrew: Available Corpora and Initial Results,” in Proceedings of the Workshop on Semitic Machine Translation, Austin, Texas, 2016, pp. 7–12 [Online]. Available: https://semitic-mt.seas.gwu.edu/pdf/SeMaT02.pdf
 
[88]
T. Lei, R. Barzilay, and T. Jaakkola, “Rationalizing neural predictions,” in arXiv preprint arXiv:1606.04155, Austin, Texas, 2016 [Online]. Available: https://arxiv.org/abs/1606.04155
 
[89]
M. Serafini, R. Taft, A. J. Elmore, A. Pavlo, A. Aboulnaga, and M. Stonebraker, “Clay: fine-grained adaptive partitioning for general database schemas,” Proceedings of the VLDB Endowment, vol. 10, no. 4, pp. 445–456, Nov. 2016 [Online]. Available: https://doi.org/10.14778/3025111.3025125
 
[90]
T. AlHanai, W.-N. Hsu, and J. Glass, “Development of the MIT ASR system for the 2016 Arabic multi-genre broadcast challenge,” in 2016 IEEE Spoken Language Technology Workshop (SLT), 2016, pp. 299–304 [Online]. Available: https://doi.org/10.1109/SLT.2016.7846280
 
[91]
A. Ali, P. Bell, J. Glass, Y. Messaoui, H. Mubarak, S. Renals, and Y. Zhang, “The MGB-2 Challenge: Arabic Multi-Dialect Broadcast Media Recognition,” presented at the 2016 IEEE Workshop on Spoken Language Technology, San Diego, California, 2016 [Online]. Available: http://www.slt2016.org/Papers/ViewPapers.asp?PaperNum=1013
 
[92]
Y. Belinkov and J. Glass, “A Character-level Convolutional Neural Network for Distinguishing Similar Languages and Dialects,” in Proceedings of the Third Workshop on NLP for Similar Languages, Varieties and Dialects (VarDial3), Osaka, Japan, 2016, pp. 145–152 [Online]. Available: http://aclweb.org/anthology/W16-4819
 
[93]
Y. Belinkov, A. Magidow, M. Romanov, A. Shmidman, and M. Koppel, “Shamela: A Large-Scale Historical Arabic Corpus,” in Proceedings of the Workshop on Language Technology Resources and Tools for Digital Humanities (LT4DH), Osaka, Japan, 2016, pp. 45–53 [Online]. Available: http://aclweb.org/anthology/W16-4007
 
[94]
W.-N. Hsu, Y. Zhang, and J. Glass, “A prioritized grid long short-term memory RNN for speech recognition,” in 2016 IEEE Spoken Language Technology Workshop (SLT), 2016, pp. 467–473 [Online]. Available: https://doi.org/10.1109/SLT.2016.7846305
 
[95]
S. Romeo, G. Da San Martino, A. Barrón-Cedeno, A. Moschitti, Y. Belinkov, W.-N. Hsu, Y. Zhang, M. Mohtarami, and J. Glass, “Neural attention for learning to rank questions in community question answering,” in Proceedings of the 26th International Conference on Computational Linguistics, Osaka, Japan, 2016, pp. 1734–1745 [Online]. Available: http://www.aclweb.org/anthology/C/C16/C16-1163.pdf

 

2017:

[96]
D. Deng, R. C. Fernandez, Z. Abedjan, S. Wang, M. Stonebraker, A. Elmagarmid, I. F. Ilyasl, S. Madden, M. Ouzzani, and N. Tang, “The Data Civilizer System,” presented at the 2017 Conference on Innovative Data Systems Research (CIDR 2017), 2017 [Online]. Available: http://cidrdb.org/cidr2017/papers/p44-deng-cidr17.pdf
 
[97]
C. Herder, L. Ren, M. van Dijk, M.-D. Yu, and S. Devadas, “Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions,” IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 1, pp. 65–82, Jan. 2017 [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/TDSC.2016.2536609
 
[98]
Nathan Beckmann and Daniel Sanchez, “Maximizing Cache Performance Under Uncertainty,” presented at the The 23rd IEEE Symposium on High Performance Computer Architecture, 2017 [Online]. Available: http://hpca2017.org/program/
 
[99]
F. Ofli, Y. Aytar, I. Weber, R. al Hammouri, and A. Torralba, “Is Saki# delicious? The Food Perception Gap on Instagram and Its Relation to Health,” arXiv preprint arXiv:1702.06318, Feb. 2017 [Online]. Available: https://arxiv.org/abs/1702.06318