Publications


2017

[1]
X. Ji, C. Wang, N. El-Sayed, X. Ma, Y. Kim, S. Vazhkudai, W. Xue, and D. Sanchez, “Understanding Object-level Memory Access Pa erns Across the Spectrum,” in International Conference for High Performance Computing, Networking, Storage and Analysis (SC17), 2017 [Online]. Available: http://people.csail.mit.edu/sanchez/drafts/2017.objprof.sc.pdf

 

[2]
Po-An Tsai, Nathan Beckmann, and Daniel Sanchez, “Nexus: A New Approach to Replication in Distributed Shared Caches,” in The 26th International Conference on Parallel Architectures and Compilation Techniques (PACT), Portland, Oregon, USA, 2017 [Online]. Available: http://people.csail.mit.edu/sanchez/papers/2017.nexus.pact.pdf

 

[3]
H. Kasture, X. Ji, N. El-Sayed, N. Beckmann, X. Ma, and D. Sanchez, “POSTER: Improving Datacenter Efficiency through Partitioning-Aware Scheduling,” in 26th international conference on Parallel Architectures and Compilation Techniques (PACT-26), 2017 [Online]. Available: http://people.csail.mit.edu/sanchez/papers/2017.shepherd.pact.pdf

 

[4]
Joni Salminen, Sercan Şengün, Haewoon Kwak, Bernard Jansen, Jisun An, Soon-Gyu Jung, Sarah Vieweg, and D. Fox Harrell, “Generating Cultural Personas From Social Data: A Perspective of Middle Eastern Users,” presented at the Fourth International Symposium on Social Networks Analysis, Management and Security (SNAMS-2017), Prague, Czech Republic, 2017.

 

[5]
S. Romeo, G. D. S. Martino, Y. Belinkov, A. Barrón-Cedeño, M. Eldesouki, K. Darwish, H. Mubarak, J. Glass, and A. Moschitti, “Language processing and learning models for community question answering in Arabic,” Information Processing & Management, Aug. 2017 [Online]. Available: https://doi.org/10.1016/j.ipm.2017.07.003

 

[6]
S. Khurana, M. Najafian, A. Ali, T. Al Hanai, Y. Belinkov, and J. Glass, “QMDIS: QCRI-MIT Advanced Dialect Identification System,” Proc. Interspeech 2017, pp. 2591–2595, Aug. 2017 [Online]. Available: http://people.csail.mit.edu/jrg/2017/Sameer-Interspeech-2017.pdf

 

[7]
A. Salvador, N. Hynes, Y. Aytar, J. Marin, F. Ofli, I. Weber, and A. Torralba, “Learning Cross-modal Embeddings for Cooking Recipes and Food Images,” in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, vol. 720, pp. 619–508 [Online]. Available: http://openaccess.thecvf.com/content_cvpr_2017/papers/Salvador_Learning_...

 

[8]
H. Sajjad, F. Dalvi, N. Durrani, A. Abdelali, Y. Belinkov, and S. Vogel, “Challenging Language-Dependent Segmentation for Arabic: An Application to Machine Translation and Part-of-Speech Tagging,” 2017, pp. 601–607 [Online]. Available: http://doi.org/10.18653/v1/P17-2095

 

[9]
Y. Belinkov, N. Durrani, F. Dalvi, H. Sajjad, and J. Glass, “What do Neural Machine Translation Models Learn about Morphology?,” 2017, pp. 861–872 [Online]. Available: https://doi.org/10.18653/v1/P17-1080

 

[10]
A. Mukkara, N. Beckmann, and D. Sanchez, “Cache-Guided Scheduling: Exploiting Caches to Maximize Locality in Graph Processing,” in 1st International Workshop on Architectures for Graph Processing (AGP 2017), Held in conjunction with ISCA 2017, Toronto, Canada, 2017 [Online]. Available: https://sites.google.com/view/agp2017/program

 

[11]
P.-A. Tsai, N. Beckmann, and D. Sanchez, “Jenga: Software-Defined Cache Hierarchies,” in Proceedings of the 44th Annual International Symposium on Computer Architecture, New York, NY, USA, 2017, pp. 652–665 [Online]. Available: https://doi.org/10.1145/3079856.3080214

 

[12]
D. F. Harrell, S. Vieweg, H. Kwak, C.-U. Lim, S. Sengun, A. Jahanian, and P. Ortiz, “Culturally-Grounded Analysis of Everyday Creativity in Social Media: A Case Study in Qatari Context,” in Proceedings of the 2017 ACM SIGCHI Conference on Creativity and Cognition, New York, NY, USA, 2017, pp. 209–221 [Online]. Available: https://doi.org/10.1145/3059454.3059456

 

[13]
E. Kocabey, M. Camurcu, F. Ofli, Y. Aytar, J. Marin, A. Torralba, and I. Weber, “Face-to-bmi: Using computer vision to infer body mass index on social media,” in The 11th International AAAI Conference on Web and Social Media (ICWSM-17), Montreal, Canada, 2017 [Online]. Available: https://arxiv.org/pdf/1703.03156.pdf

 

[14]
F. Ofli, Y. Aytar, I. Weber, R. al Hammouri, and A. Torralba, “Is Saki #delicious?: The Food Perception Gap on Instagram and Its Relation to Health,” presented at the 2017 International World Wide Web Conference Committee (IW3C2), 2017, pp. 509–518 [Online]. Available: http://dx.doi.org/10.1145/3038912.3052663

 

[15]
Nathan Beckmann and Daniel Sanchez, “Maximizing Cache Performance Under Uncertainty,” presented at the The 23rd IEEE Symposium on High Performance Computer Architecture, 2017 [Online]. Available: http://hpca2017.org/program/

 

[16]
C. Herder, L. Ren, M. van Dijk, M.-D. Yu, and S. Devadas, “Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions,” IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 1, pp. 65–82, Jan. 2017 [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/TDSC.2016.2536609

 

[17]
D. Deng, R. C. Fernandez, Z. Abedjan, S. Wang, M. Stonebraker, A. Elmagarmid, I. F. Ilyasl, S. Madden, M. Ouzzani, and N. Tang, “The Data Civilizer System,” presented at the 2017 Conference on Innovative Data Systems Research (CIDR 2017), 2017 [Online]. Available: http://cidrdb.org/cidr2017/papers/p44-deng-cidr17.pdf

 

2016

[18]
S. Romeo, G. Da San Martino, A. Barrón-Cedeno, A. Moschitti, Y. Belinkov, W.-N. Hsu, Y. Zhang, M. Mohtarami, and J. Glass, “Neural attention for learning to rank questions in community question answering,” in Proceedings of the 26th International Conference on Computational Linguistics, Osaka, Japan, 2016, pp. 1734–1745 [Online]. Available: http://www.aclweb.org/anthology/C/C16/C16-1163.pdf

 

[19]
W.-N. Hsu, Y. Zhang, and J. Glass, “A prioritized grid long short-term memory RNN for speech recognition,” in 2016 IEEE Spoken Language Technology Workshop (SLT), 2016, pp. 467–473 [Online]. Available: https://doi.org/10.1109/SLT.2016.7846305

 

[20]
Y. Belinkov, A. Magidow, M. Romanov, A. Shmidman, and M. Koppel, “Shamela: A Large-Scale Historical Arabic Corpus,” in Proceedings of the Workshop on Language Technology Resources and Tools for Digital Humanities (LT4DH), Osaka, Japan, 2016, pp. 45–53 [Online]. Available: http://aclweb.org/anthology/W16-4007

 

[21]
Y. Belinkov and J. Glass, “A Character-level Convolutional Neural Network for Distinguishing Similar Languages and Dialects,” in Proceedings of the Third Workshop on NLP for Similar Languages, Varieties and Dialects (VarDial3), Osaka, Japan, 2016, pp. 145–152 [Online]. Available: http://aclweb.org/anthology/W16-4819

 

[22]
A. Ali, P. Bell, J. Glass, Y. Messaoui, H. Mubarak, S. Renals, and Y. Zhang, “The MGB-2 Challenge: Arabic Multi-Dialect Broadcast Media Recognition,” presented at the 2016 IEEE Workshop on Spoken Language Technology, San Diego, California, 2016 [Online]. Available: http://www.slt2016.org/Papers/ViewPapers.asp?PaperNum=1013

 

[23]
T. AlHanai, W.-N. Hsu, and J. Glass, “Development of the MIT ASR system for the 2016 Arabic multi-genre broadcast challenge,” in 2016 IEEE Spoken Language Technology Workshop (SLT), 2016, pp. 299–304 [Online]. Available: https://doi.org/10.1109/SLT.2016.7846280

 

[24]
M. Serafini, R. Taft, A. J. Elmore, A. Pavlo, A. Aboulnaga, and M. Stonebraker, “Clay: fine-grained adaptive partitioning for general database schemas,” Proceedings of the VLDB Endowment, vol. 10, no. 4, pp. 445–456, Nov. 2016 [Online]. Available: https://doi.org/10.14778/3025111.3025125

 

[25]
T. Lei, R. Barzilay, and T. Jaakkola, “Rationalizing neural predictions,” in arXiv preprint arXiv:1606.04155, Austin, Texas, 2016 [Online]. Available: https://arxiv.org/abs/1606.04155

 

[26]
Y. Belinkov and J. Glass, “Large-Scale Machine Translation between Arabic and Hebrew: Available Corpora and Initial Results,” in Proceedings of the Workshop on Semitic Machine Translation, Austin, Texas, 2016, pp. 7–12 [Online]. Available: https://semitic-mt.seas.gwu.edu/pdf/SeMaT02.pdf

 

[27]
A. Ali, N. Dehak, P. Cardinal, S. Khurana, S. H. Yella, J. Glass, P. Bell, and S. Renals, “Automatic Dialect Detection in Arabic Broadcast Speech,” presented at the INTERSPEECH 2016, San Francisco, CA, 2016, pp. 2934–2938 [Online]. Available: https://doi.org/10.21437/Interspeech.2016-1297

 

[28]
H. Nassif, M. Mohtarami, and J. Glass, “Learning semantic relatedness in community question answering using neural models,” in ACL 2016, 2016, pp. 137–147 [Online]. Available: http://www.aclweb.org/anthology/W16-1616

 

[29]
L. Chong-U, L. Antonios, and H. F. D, “Discovering Social and Aesthetic Categories of Avatars: A Bottom-Up Artificial Intelligence Approach Using Image Clustering,” in DiGRA/FDG - Proceedings of the First International Joint Conference of DiGRA and FDG, Dundee, Scotland, 2016 [Online]. Available: http://www.digra.org/wp-content/uploads/digital-library/paper_1971.pdf

 

[30]
Z. Abedjan, X. Chu, D. Deng, R. C. Fernandez, I. F. Ilyas, M. Ouzzani, P. Papotti, M. Stonebraker, and N. Tang, “Detecting Data Errors: Where are we and what needs to be done?,” Proceedings of the VLDB Endowment, vol. 9, no. 12, pp. 993–1004, Aug. 2016 [Online]. Available: https://doi.org/10.14778/2994509.2994518

 

[31]
Abe Davis, “Visual Vibration Analysis,” PhD Dissertation, Massachusetts Institute of Technology, 2016 [Online]. Available: http://www.abedavis.com/thesis.pdf

 

[32]
P. Kellnhofer, P. Didyk, K. Myszkowski, M. M. Hefeeda, H.-P. Seidel, and W. Matusik, “GazeStereo3D: seamless disparity manipulations,” ACM Transactions on Graphics, vol. 35, no. 4, pp. 1–13, Jul. 2016 [Online]. Available: http://dl.acm.org/citation.cfm?doid=2897824.2925866

 

[33]
Y. Zhang, D. Gaddy, R. Barzilay, and T. Jaakkola, “Ten Pairs to Tag – Multilingual POS Tagging via Coarse Mapping between Embeddings,” in Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego, California, 2016, pp. 1307–1317 [Online]. Available: http://www.aclweb.org/anthology/N16-1156

 

[34]
M. Mohtarami, Y. Belinkov, W.-N. Hsu, Y. Zhang, T. Lei, K. Bar, S. Cyphers, and J. Glass, “SLS at SemEval-2016 Task 3: Neural-based Approaches for Ranking in Community Question Answering,” in Proceedings of the 10th International Workshop on Semantic Evaluation (SemEval-2016), San Diego, California, 2016, pp. 828–835 [Online]. Available: http://www.aclweb.org/anthology/S16-1128

 

[35]
T. Lei, H. Joshi, R. Barzilay, T. Jaakkola, K. Tymoshenko, A. Moschitti, and L. Màrquez, “Semi-supervised Question Retrieval with Gated Convolutions,” in Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego, California, 2016, pp. 1279–1289 [Online]. Available: http://www.aclweb.org/anthology/N16-1153

 

[36]
K. Krafka, A. Khosla, P. Kellnhofer, H. Kannan, S. Bhandarkar, W. Matusik, and A. Torralba, “Eye Tracking for Everyone,” in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 2176–2184 [Online]. Available: http://www.cv-foundation.org/openaccess/content_cvpr_2016/html/Krafka_Ey...

 

[37]
Z. Abedjan, J. Morcos, I. F. Ilyas, M. Ouzzani, P. Papotti, and M. Stonebraker, “DataXFormer: A robust transformation discovery system,” in 2016 IEEE 32nd International Conference on Data Engineering (ICDE), 2016, pp. 1134–1145 [Online]. Available: http://doi.org/10.1109/ICDE.2016.7498319

 

[38]
E. Mansour, A. V. Sambra, S. Hawke, M. Zereba, S. Capadisli, A. Ghanem, A. Aboulnaga, and T. Berners-Lee, “A Demonstration of the Solid Platform for Social Web Applications,” in Proceedings of the 25th International Conference Companion on World Wide Web, Montréal, Québec, Canada, 2016, pp. 223–226 [Online]. Available: https://doi.org/10.1145/2872518.2890529

 

[39]
K. Calagari, T. Elgamal, K. Diab, K. Templin, P. Didyk, W. Matusik, and M. Hefeeda, “Depth Personalization and Streaming of Stereoscopic Sports Videos,” ACM Trans. Multimedia Comput. Commun. Appl., vol. 12, no. 3, p. 41:1–41:23, Mar. 2016 [Online]. Available: http://doi.acm.org/10.1145/2890103

 

[40]
N. Beckmann and D. Sanchez, “Modeling cache performance beyond LRU,” in 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA), 2016, pp. 225–236 [Online]. Available: https://doi.org/10.1109/HPCA.2016.7446067

 

[41]
Harshad Kasture and Daniel Sanchez, “Tailbench: a benchmark suite and evaluation methodology for latency-critical applications,” 2016 IEEE International Symposium on Workload Characterization (IISWC), pp. 1–10, 2016 [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/IISWC.2016.7581261

 

[42]
N. Beckmann and D. Sanchez, “Cache Calculus: Modeling Caches through Differential Equations,” IEEE Computer Architecture Letters, vol. PP, no. 99, pp. 1–1, 2016 [Online]. Available: http://doi.org/10.1109/LCA.2015.2512873

 

2015

[43]
Z. Abedjan, C. G. Akcora, M. Ouzzani, P. Papotti, and M. Stonebraker, “Temporal Rules Discovery for Web Data Cleaning,” Proc. VLDB Endow., vol. 9, no. 4, pp. 336–347, Dec. 2015 [Online]. Available: http://doi.org/10.14778/2856318.2856328

 

[44]
A. Davis, J. G. Chen, and F. Durand, “Image-space Modal Bases for Plausible Manipulation of Objects in Video,” ACM Trans. Graph., vol. 34, no. 6, p. 239:1–239:7, Oct. 2015 [Online]. Available: http://doi.acm.org/10.1145/2816795.2818095

 

[45]
N. Bitansky and V. Vaikuntanathan, “Indistinguishability Obfuscation from Functional Encryption,” in 2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS), 2015, pp. 171–190 [Online]. Available: http://doi.org/10.1109/FOCS.2015.20

 

[46]
S. Joty, A. Barrón-Cedeño, G. Da San Martino, S. Filice, L. Màrquez, A. Moschitti, and P. Nakov, “Global Thread-level Inference for Comment Classification in Community Question Answering,” in Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, Lisbon, Portugal, 2015, pp. 573–578 [Online]. Available: http://aclweb.org/anthology/D15-1068

 

[47]
P. Cardinal, N. Dehak, Y. Zhang, and J. Glass, “Speaker adaptation using the i-vector technique for bottleneck features,” in 16th Annual Conference of the International Speech Communication Association, 2015, vol. 2015, pp. 2867–2871 [Online]. Available: http://www.isca-speech.org/archive/interspeech_2015/papers/i15_2867.pdf

 

[48]
A. Abdelali, A. Ali, F. Guzmán, F. Stahlberg, S. Vogel, and Y. Zhang, “QAT2–The QCRI Advanced Transcription and Translation System,” in 16th Annual Conference of the International Speech Communication Association, 2015, pp. 726–727 [Online]. Available: http://www.isca-speech.org/archive/interspeech_2015/papers/i15_0726.pdf

 

[49]
Y. Belinkov, A. Barrón-Cedeño, and H. Mubarak, “Answer Selection in Arabic Community Question Answering: A Feature-Rich Approach,” in Proceedings of the Second Workshop on Arabic Natural Language Processing, Beijing, China, 2015, pp. 183–190 [Online]. Available: http://www.aclweb.org/anthology/W15-3223

 

[50]
A. Barrón-Cedeño, S. Filice, G. Da San Martino, S. Joty, L. Màrquez, P. Nakov, and A. Moschitti, “Thread-Level Information for Comment Classification in Community Question Answering,” in Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers), Beijing, China, 2015, pp. 687–693 [Online]. Available: http://www.aclweb.org/anthology/P15-2113

 

[51]
Y. Zhang, C. Li, R. Barzilay, and K. Darwish, “Randomized Greedy Inference for Joint Segmentation, POS Tagging and Dependency Parsing,” in Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, 2015, pp. 42–52 [Online]. Available: http://www.aclweb.org/anthology/N15-1005

 

[52]
P. Nakov, L. Màrquez, W. Magdy, A. Moschitti, J. Glass, and B. Randeree, “SemEval-2015 Task 3: Answer Selection in Community Question Answering,” in Proceedings of the 9th International Workshop on Semantic Evaluation (SemEval 2015), Denver, Colorado, 2015, pp. 269–281 [Online]. Available: http://www.aclweb.org/anthology/S15-2047

 

[53]
T. Lei, Y. Zhang, L. Màrquez, A. Moschitti, and R. Barzilay, “High-Order Low-Rank Tensors for Semantic Role Labeling,” in Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, 2015, pp. 1150–1160 [Online]. Available: http://www.aclweb.org/anthology/N15-1121

 

[54]
M. A. Elgharib, M. Hefeeda, F. Durand, and W. T. Freeman, “Video magnification in presence of large motions,” in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 4119–4127 [Online]. Available: http://doi.org/10.1109/CVPR.2015.7299039

 

[55]
A. Davis, K. L. Bouman, J. G. Chen, M. Rubinstein, F. Durand, and W. T. Freeman, “Visual vibrometry: Estimating material properties from small motions in video,” in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 5335–5343 [Online]. Available: http://doi.org/10.1109/CVPR.2015.7299171

 

[56]
Y. Belinkov, M. Mohtarami, S. Cyphers, and J. Glass, “VectorSLU: A Continuous Word Vector Approach to Answer Selection in Community Question Answering Systems,” in Proceedings of the 9th International Workshop on Semantic Evaluation (SemEval 2015), Denver, Colorado, 2015, pp. 282–287 [Online]. Available: http://www.aclweb.org/anthology/S15-2048

 

[57]
A. Alghunaim, M. Mohtarami, S. Cyphers, and J. Glass, “A Vector Space Approach for Aspect Based Sentiment Analysis,” in Proceedings of the 1st Workshop on Vector Space Modeling for Natural Language Processing, Denver, Colorado, 2015, pp. 116–122 [Online]. Available: http://www.aclweb.org/anthology/W15-1516

 

[58]
C. W. Fletcher, L. Ren, A. Kwon, M. v Dijk, E. Stefanov, D. Serpanos, and S. Devadas, “A Low-Latency, Low-Area Hardware Oblivious RAM Controller,” in 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), 2015, pp. 215–222 [Online]. Available: http://doi.org/10.1109/FCCM.2015.58

 

[59]
X. Yu, S. K. Haider, L. Ren, C. Fletcher, A. Kwon, M. van Dijk, and S. Devadas, “PrORAM: Dynamic Prefetcher for Oblivious RAM,” in Proceedings of the 42Nd Annual International Symposium on Computer Architecture, New York, NY, USA, 2015, pp. 616–628 [Online]. Available: http://doi.acm.org/10.1145/2749469.2750413

 

[60]
J. Yang, “Preventing Information Leaks with Policy-Agnostic Programming,” Massachusetts Institute of Technology, 2015 [Online]. Available: http://hdl.handle.net/1721.1/101468

 

[61]
WeiHua James Li, Julius Adebayo, Fuming Shih, and Lalana Kagal, “Understanding the role of mobile technologies for humanitarian relief,” in ISCRAM 2015 Conference Proceedings – 12th International Conference on Information Systems for Crisis Response and Management, Kristiansand, Norway, 2015 [Online]. Available: http://idl.iscram.org/files/weihuajamesli/2015/1224_WeiHuaJamesLi_etal20...

 

[62]
V. Vaikuntanathan and P. N. Vasudevan, “Secret Sharing and Statistical Zero Knowledge,” in Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part I, T. Iwata and J. H. Cheon, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 656–680 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48797-6_27

 

[63]
L. Ren, C. Fletcher, A. Kwon, E. Stefanov, E. Shi, M. van Dijk, and S. Devadas, “Constants Count: Practical Improvements to Oblivious RAM,” in 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., 2015, pp. 415–430 [Online]. Available: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/pr...

 

[64]
J. Morcos, Z. Abedjan, I. F. Ilyas, M. Ouzzani, P. Papotti, and M. Stonebraker, “DataXFormer: An Interactive Data Transformation Tool,” in Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2015, pp. 883–888 [Online]. Available: http://doi.acm.org/10.1145/2723372.2735366

 

[65]
Y. H. Kwon, “Riffle: An efficient communication system with strong anonymity,” Massachusetts Institute of Technology, 2015 [Online]. Available: http://hdl.handle.net/1721.1/99859

 

[66]
A. Kwon, M. AlSabah, D. Lazar, M. Dacier, and S. Devadas, “Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services,” in 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., 2015, pp. 287–302 [Online]. Available: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/pr...

 

[67]
R. Kumaresan, T. Moran, and I. Bentov, “How to Use Bitcoin to Play Decentralized Poker,” in Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2015, pp. 195–206 [Online]. Available: http://doi.acm.org/10.1145/2810103.2813712

 

[68]
V. Kolesnikov and R. Kumaresan, “On Cut-and-Choose Oblivious Transfer and Its Variants,” in Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part I, T. Iwata and J. H. Cheon, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 386–412 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48797-6_17

 

[69]
Z. Khayyat, I. F. Ilyas, A. Jindal, S. Madden, M. Ouzzani, P. Papotti, J.-A. Quiané-Ruiz, N. Tang, and S. Yin, “BigDansing: A System for Big Data Cleansing,” in Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2015, pp. 1215–1230 [Online]. Available: http://doi.acm.org/10.1145/2723372.2747646

 

[70]
A. Jain, J. Adebayo, E. de Leon, W. Li, L. Kagal, P. Meier, and C. Castillo, “Mobile Application Development for Crisis Data,” Procedia Engineering, vol. 107, pp. 255–262, 2015 [Online]. Available: http://doi.org/10.1016/j.proeng.2015.06.080

 

[71]
Y. Ishai, R. Kumaresan, E. Kushilevitz, and A. Paskin-Cherniavsky, “Secure Computation with Minimal Interaction, Revisited,” in Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, R. Gennaro and M. Robshaw, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 359–378 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48000-7_18

 

[72]
S. Gorbunov, V. Vaikuntanathan, and D. Wichs, “Leveled Fully Homomorphic Signatures from Standard Lattices,” in Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, New York, NY, USA, 2015, pp. 469–477 [Online]. Available: http://doi.acm.org/10.1145/2746539.2746576

 

[73]
S. Gorbunov, V. Vaikuntanathan, and H. Wee, “Predicate Encryption for Circuits from LWE,” in Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, R. Gennaro and M. Robshaw, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 503–523 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48000-7_25

 

[74]
C. W. Fletcher, L. Ren, A. Kwon, M. van Dijk, and S. Devadas, “Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM,” in Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, New York, NY, USA, 2015, pp. 103–116 [Online]. Available: http://doi.acm.org/10.1145/2694344.2694353

 

[75]
B. Delaware, C. Pit-Claudel, J. Gross, and A. Chlipala, “Fiat: Deductive Synthesis of Abstract Data Types in a Proof Assistant,” in POPL ’15 Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015, pp. 689–700 [Online]. Available: http://doi.org/10.1145/2676726.2677006

 

[76]
G. Chaurasia, J. Ragan-Kelley, S. Paris, G. Drettakis, and F. Durand, “Compiling High Performance Recursive Filters,” in Proceedings of the 7th Conference on High-Performance Graphics, New York, NY, USA, 2015, pp. 85–94 [Online]. Available: http://doi.org/10.1145/2790060.2790063

 

[77]
R. Canetti, J. Holmgren, A. Jain, and V. Vaikuntanathan, “Succinct Garbling and Indistinguishability Obfuscation for RAM Programs,” in Forty-Seventh Annual ACM on Symposium on Theory of Computing, New York, NY, USA, 2015, pp. 429–437 [Online]. Available: http://doi.org/10.1145/2746539.2746621

 

[78]
Z. Brakerski and V. Vaikuntanathan, “Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions,” in Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II, Y. Dodis and J. B. Nielsen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 1–30 [Online]. Available: http://doi.org/10.1007/978-3-662-46497-7_1

 

[79]
P. Ananth, Z. Brakerski, G. Segev, and V. Vaikuntanathan, “From Selective to Adaptive Security in Functional Encryption,” in Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, R. Gennaro and M. Robshaw, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 657–677 [Online]. Available: http://doi.org/10.1007/978-3-662-48000-7_32

 

[80]
Z. Abedjan, J. Morcos, M. N. Gubanov, I. F. Ilyas, M. Stonebraker, P. Papotti, and M. Ouzzani, “Dataxformer: Leveraging the Web for Semantic Transformations,” in CIDR 2015, Seventh Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 4-7, 2015, Online Proceedings, 2015 [Online]. Available: http://www.cidrdb.org/cidr2015/Papers/CIDR15_Paper31.pdf

 

2014

[81]
A. Ali, Y. Zhang, P. Cardinal, N. Dahak, S. Vogel, and J. Glass, “A complete KALDI recipe for building Arabic speech recognition systems,” in 2014 IEEE Spoken Language Technology Workshop (SLT), 2014, pp. 525–529 [Online]. Available: http://doi.org/10.1109/SLT.2014.7078629

 

[82]
R. Taft, E. Mansour, M. Serafini, J. Duggan, A. J. Elmore, A. Aboulnaga, A. Pavlo, and M. Stonebraker, “E-store: Fine-grained Elastic Partitioning for Distributed Transaction Processing Systems,” Proc. VLDB Endow., vol. 8, no. 3, pp. 245–256, Nov. 2014 [Online]. Available: http://doi.org/10.14778/2735508.2735514

 

[83]
T. Al Hanai and J. Glass, “Lexical Modeling for Arabic ASR: A Systematic Approach,” in 15th Annual Conference of the International Speech Communication Association, 2014, pp. 2605–2609 [Online]. Available: http://www.isca-speech.org/archive/archive_papers/interspeech_2014/i14_2...

 

[84]
A. Agarwal, H. Hassanieh, O. Abari, E. Hamed, D. Katabi, and Arvind, “High-throughput implementation of a million-point sparse Fourier Transform,” in 2014 24th International Conference on Field Programmable Logic and Applications (FPL), 2014, pp. 1–6 [Online]. Available: http://doi.org/10.1109/FPL.2014.6927450

 

[85]
I. Saleh, S. Cyphers, J. Glass, S. Joty, L. Màrquez, A. Moschitti, and P. Nakov, “A Study of using Syntactic and Semantic Structures for Concept Segmentation and Labeling,” in COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers, Dublin, Ireland, 2014, pp. 193–202 [Online]. Available: http://www.aclweb.org/anthology/C14-1020

 

[86]
K. Templin, P. Didyk, K. Myszkowski, M. M. Hefeeda, H.-P. Seidel, and W. Matusik, “Modeling and optimizing eye vergence response to stereoscopic cuts,” ACM Transactions on Graphics, vol. 33, no. 4, pp. 1–8, Jul. 2014 [Online]. Available: http://doi.org/10.1145/2601097.2601148

 

[87]
M. H. Bahari, N. Dehak, H. V. hamme, L. Burget, A. M. Ali, and J. Glass, “Non-Negative Factor Analysis of Gaussian Mixture Model Weight Adaptation for Language and Dialect Recognition,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, no. 7, Jul. 2014 [Online]. Available: http://doi.org/10.1109/TASLP.2014.2319159

 

[88]
Y. Zhang, T. Lei, R. Barzilay, T. Jaakkola, and A. Globerson, “Steps to Excellence: Simple Inference with Refined Scoring of Dependency Trees,” in Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Baltimore, Maryland, 2014, pp. 197–207 [Online]. Available: http://www.aclweb.org/anthology/P14-1019

 

[89]
T. Lei, Y. Xin, Y. Zhang, R. Barzilay, and T. Jaakkola, “Low-Rank Tensors for Scoring Dependency Structures,” in Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Baltimore, Maryland, 2014, pp. 1381–1391 [Online]. Available: http://www.aclweb.org/anthology/P14-1130

 

[90]
M. D. Edwards, A. Symbor-Nagrabska, L. Dollard, D. K. Gifford, and G. R. Fink, “Interactions between chromosomal and nonchromosomal elements reveal missing heritability,” Proceedings of the National Academy of Sciences, vol. 111, no. 21, pp. 7719–7722, May 2014 [Online]. Available: http://doi.org/10.1073/pnas.1407126111

 

[91]
T. B. Hashimoto, M. D. Edwards, and D. K. Gifford, “Universal Count Correction for High-Throughput Sequencing,” PLoS Comput Biol, vol. 10, no. 3, pp. 1–11, Mar. 2014 [Online]. Available: http://doi.org/10.1371/journal.pcbi.1003494

 

[92]
M. Gubanov, M. Stonebraker, and D. Bruckner, “Text and structured data fusion in data tamer at scale,” in 2014 IEEE 30th International Conference on Data Engineering, 2014, pp. 1258–1261 [Online]. Available: http://doi.org/10.1109/ICDE.2014.6816755

 

[93]
C. W. Fletchery, L. Ren, X. Yu, M. V. Dijk, O. Khan, and S. Devadas, “Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs,” in 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA), 2014, pp. 213–224 [Online]. Available: http://doi.org/10.1109/HPCA.2014.6835932

 

[94]
N. Wadhwa, M. Rubinstein, F. Durand, and W. T. Freeman, “Riesz pyramids for fast phase-based video magnification,” in Computational Photography (ICCP), 2014 IEEE International Conference on, 2014, pp. 1–10 [Online]. Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6831820

 

[95]
O. Seneviratne, E. W. Patton, D. Miao, F. Shih, W. Li, L. Kagal, and C. Castillo, “Developing Mobile Linked Data Applications,” in Proceedings of the 2014 International Conference on Posters & Demonstrations Track - Volume 1272, Aachen, Germany, Germany, 2014, pp. 169–172 [Online]. Available: http://dl.acm.org/citation.cfm?id=2878453.2878496

 

[96]
A. Sambra, S. Hawke, T. Berners-Lee, L. Kagal, and A. Aboulnaga, “CIMBA: client-integrated microblogging architecture,” in Proceedings of the 2014 International Conference on Posters & Demonstrations Track-Volume 1272, 2014, pp. 57–60 [Online]. Available: http://dl.acm.org/citation.cfm?id=2878468

 

[97]
A. McQueen, J. Wiens, and J. Guttag, “Automatically recognizing on-ball screens,” in 2014 MIT Sloan Sports Analytics Conference, Boston, MA, USA, 2014 [Online]. Available: http://www.sloansportsconference.com/wp-content/uploads/2014/02/2014_SSA...

 

[98]
M. T. Khan, D. N. Serpanos, and H. E. Shrobe, “On the Formal Semantics of the Cognitive Middleware AWDRAT,” arXiv:1412.3588, 2014 [Online]. Available: http://arxiv.org/abs/1412.3588

 

[99]
M. T. Khan, D. Serpanos, and H. Shrobe, “On the Behavioural Formalization of the Cognitive Middleware AWDRAT,” arXiv preprint arXiv:1412.2328, 2014 [Online]. Available: http://arxiv.org/abs/1412.2328

 

[100]
M. Kates, “Player motion analysis: automatically classifying NBA plays,” Massachusetts Institute of Technology, 2014 [Online]. Available: http://dspace.mit.edu/handle/1721.1/100664

 

[101]
L. Gyarmati, H. Kwak, and P. Rodriguez, “Searching for a unique style in soccer,” in 2014 KDD Workshop on Large-Scale Sports Analytics, 2014 [Online]. Available: http://large-scale-sports-analytics.org/Large-Scale-Sports-Analytics/Sub...

 

[102]
S. Goldwasser, S. D. Gordon, V. Goyal, A. Jain, J. Katz, F.-H. Liu, A. Sahai, E. Shi, and H.-S. Zhou, “Multi-input functional encryption,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2014, pp. 578–602 [Online]. Available: http://link.springer.com/chapter/10.1007/978-3-642-55220-5_32

 

[103]
G. Ganeshapillai and J. Guttag, “A Data-driven Method for In-game Decision Making in MLB,” in 2014 MIT Sloan Sports Analytics Conference, Boston, MA, USA, 2014 [Online]. Available: http://www.sloansportsconference.com/wp-content/uploads/2014/02/2014_SSA...

 

[104]
P. Cardinal, A. M. Ali, N. Dehak, Y. Zhang, T. Al Hanai, Y. Zhang, J. R. Glass, and S. Vogel, “Recent advances in ASR applied to an Arabic transcription system for Al-Jazeera.,” in 15th Annual Conference of the International Speech Communication Association, 2014, pp. 2088–2092 [Online]. Available: http://www.isca-speech.org/archive/archive_papers/interspeech_2014/i14_2...

 

[105]
K. Calagari, K. Templin, T. Elgamal, K. Diab, P. Didyk, W. Matusik, and M. Hefeeda, “Anahita: A System for 3D Video Streaming with Depth Customization,” in Proceedings of the 22Nd ACM International Conference on Multimedia, New York, NY, USA, 2014, pp. 337–346 [Online]. Available: http://doi.org/10.1145/2647868.2654899

 

2013

[106]
H. Sajjad, K. Darwish, and Y. Belinkov, “Translating Dialectal Arabic to English,” in Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), Sofia, Bulgaria, 2013, pp. 1–6 [Online]. Available: http://www.aclweb.org/anthology/P13-2001

 

[107]
X. Yu, C. W. Fletcher, L. Ren, M. van Dijk, and S. Devadas, “Generalized External Interaction with Tamper-resistant Hardware with Bounded Information Leakage,” in Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, New York, NY, USA, 2013, pp. 23–34 [Online]. Available: http://doi.org/10.1145/2517488.2517498

 

[108]
M. Stonebraker, D. Bruckner, I. F. Ilyas, G. Beskales, M. Cherniack, S. B. Zdonik, A. Pagan, and S. Xu, “Data Curation at Scale: The Data Tamer System,” in CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 6-9, 2013, Online Proceedings, 2013 [Online]. Available: http://www.cidrdb.org/cidr2013/Papers/CIDR13_Paper28.pdf

 

[109]
F. Shih, O. Seneviratne, I. Liccardi, E. Patton, P. Meier, and C. Castillo, “Democratizing Mobile App Development for Disaster Management,” in Joint Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments and Workshop on Semantic Cities, New York, NY, USA, 2013, pp. 39–42 [Online]. Available: http://doi.org/10.1145/2516911.2516915

 

[110]
A. Jindal, J. Quiané-Ruiz, and S. Madden, “CARTILAGE: Adding Flexibility to the Hadoop Skeleton,” in Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2013, pp. 1057–1060 [Online]. Available: http://doi.org/10.1145/2463676.2465258

 

[111]
G. Gartheeban and J. Guttag, “A Data-driven Method for In-game Decision Making in MLB: When to Pull a Starting Pitcher,” in Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 2013, pp. 973–979 [Online]. Available: http://doi.org/10.1145/2487575.2487660

 

2012

[112]
S. Amer-Yahia, S. Anjum, A. Ghenai, A. Siddique, S. Abbar, S. Madden, A. Marcus, and M. El-Haddad, “MAQSA: A System for Social Analytics on News,” in Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2012, pp. 653–656 [Online]. Available: http://doi.org/10.1145/2213836.2213924