Our Research

The Qatar Computing Research Institute (QCRI) - MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) research collaboration is a medium for knowledge joint-creation, transfer, and exchange of expertise between QCRI and MIT CSAIL scientists. Scientists from both organizations are undertaking a variety of core computer science research projects -- database management, Arabic language technology, new paradigms for social computing, and data visualization, etc., with the goal of developing innovative solutions that can have a broad and meaningful impact. The agreement also offers CSAIL researchers and students exposure to the unique challenges in the Gulf region. Scientists at QCRI are benefiting from the expertise of MIT’s eminent faculty and researchers through joint research projects that will enable QCRI to realize its vision to become a premier center of computing research regionally and internationally.

Current Projects

Current Projects

Project activity in the program concluded on June 30, 2020. Information regarding all completed projects can be found by selecting Past Projects.

Past Projects

Humanitarian Image Analysis

The goal of this project is to conduct applied and core computer science research and to build innovative technologies that can be used by decision-makers, NGOs, affected communities, and scholars to improve the effectiveness of humanitarian strategies such as preparedness, mitigation, and response during humanitarian crises and emergencies. The core of this project will focus on developing a multimodal data processing system for understanding disaster scenes and situations from social media.

Principal Investigators
Muhammad Imran, QCRI
Ferda Ofli, QCRI
Antonio Torralba, MIT CSAIL
 

HealthyForce - Promoting a Better Lifestyle with Reinforcement Learning in Type 2 Diabetes and Obesity

This project is focused on the development of a lifestyle recommendation system eventually intended to reduce the risk of obesity and type 2 diabetes. The project team will explore the use of reinforcement learning with a new healthy lifestyle and behavioral change representation initially focused to recommend activity patterns which maximize the user's quality of sleep. These recommendations will be used to create both a new model for behavioral change (which will be incorporated into a health coaching system to provide just-in-time recommendations to increase the user's quality of sleep), as well as a new analytics system to support coaching by healthcare professionals.

Principal Investigators

Peter Szolovits, MIT CSAIL
Luis Fernandez-Luque, QCRI
Raghvendra Mall, QCRI
 

Optimal Transport Models for Healthcare Analytics

The main focus of this project is to discover causal relationships in (multivariate) sequence of states (e.g. in health data) and to uncover the complex dependency structures from high-dimensional time-series encoded as sequence of states. The project team will address, in particular, the following challenges, using optimal transport methodology: machine learning techniques to extract sequences of states from time-series data, causality analysis from sequence of states data, explanatory models for sequence of states data, supervised learning methods to predict categorical or continuous output from sequence of states input data, unsupervised learning methods for sequence of states data, and factor analysis for sequence of states data.

Principal Investigators

Abdelkader Baggag, QCRI
Justin Solomon, MIT CSAIL

Accurate Map Making Using Mobile Sensor Data

This project aims to develop accurate map-making techniques using crowd-sourced methods to overcome challenges related to creating and maintaining street maps, especially in a rapidly developing environment such as Doha, Qatar, leveraging data primarily from mobile phones and investigating current limitations due to sensor noise, outages and data sparsity.

Principal Investigators
Mohammed Alizadeh, MIT CSAIL
Hari Balakrishnan, MIT CSAIL
Sanjay Chawla, QCRI
Sam Madden, MIT CSAIL

 
Data Base Management

This project deals with database management.  Specifically, the project team is investigating a system to support data scientists, called Data Civilizer.

Principal Investigators
Sam Madden, MIT CSAIL
Mourad Ouzzani, QCRI
Michael Stonebraker, MIT CSAIL
 

Arabic Speech and Language Processing

This project aims to develop key speech and language processing technology enabling users to search for verified facts and claims, in both written and video repositories of English and Arabic, using questions posed in natural and spoken language.  The research addresses four essential cross-cutting topic areas to achieve this objective.  First, we will investigate methods that enable rich annotation of Arabic multimedia content.  Second, we will investigate language processing methods to analyze open-ended user-generated content, e.g., dialogs, and perform veracity assessment and inference.  Third, we will explore speech and language methods for processing low-resource Arabic dialects.  Finally, we will explore interpretation and debugging techniques to improve machine translation between English and Arabic.

Principal Investigators
Ahmed Ali, QCRI
James Glass, MIT CSAIL
Preslav Nakov, QCRI
Stephan Vogel, QCRI
 

Past Projects

 

Humanitarian Image Analysis

The goal of this project was to conduct applied and core computer science research and to build innovative technologies that can be used by decision-makers, NGOs, affected communities, and scholars to improve the effectiveness of humanitarian strategies such as preparedness, mitigation, and response during humanitarian crises and emergencies. The core of this project focused on developing a multimodal data processing system for understanding disaster scenes and situations from social media.



Principal Investigators
Muhammad Imran, QCRI
Ferda Ofli, QCRI
Antonio Torralba, MIT CSAIL
 

HealthyForce - Promoting a Better Lifestyle with Reinforcement Learning in Type 2 Diabetes and Obesity

This project is focused on the development of a lifestyle recommendation system eventually intended to reduce the risk of obesity and type 2 diabetes. The project team explored the use of reinforcement learning with a new healthy lifestyle and behavioral change representation initially focused to recommend activity patterns which maximize the user's quality of sleep. These recommendations were then to be used to create both a new model for behavioral change (which would be incorporated into a health coaching system to provide just-in-time recommendations to increase the user's quality of sleep), as well as a new analytics system to support coaching by healthcare professionals.

Principal Investigators
Peter Szolovits, MIT CSAIL
Luis Fernandez-Luque, QCRI
Raghvendra Mall, QCRI
 

Optimal Transport Models for Healthcare Analytics

The main focus of this project was to discover causal relationships in (multivariate) sequence of states (e.g. in health data) and to uncover the complex dependency structures from high-dimensional time-series encoded as sequence of states. The project team focused on addressing, in particular, the following challenges, using optimal transport methodology: machine learning techniques to extract sequences of states from time-series data, causality analysis from sequence of states data, explanatory models for sequence of states data, supervised learning methods to predict categorical or continuous output from sequence of states input data, unsupervised learning methods for sequence of states data, and factor analysis for sequence of states data.

Principal Investigators
Abdelkader Baggag, QCRI
Justin Solomon, MIT CSAIL

Audio-visual Facial Re-animation

This project focuses on the generation of video facial expression given an audio signal.

Principal Investigators
Stephan Vogel, QCRI
Wojciech Matusik, CSAIL
 

Accurate Map Making Using Mobile Sensor Data

This project focused on developing accurate map-making techniques using crowd-sourced methods to overcome challenges related to creating and maintaining street maps, especially in a rapidly developing environment such as Doha, Qatar, leveraging data primarily from mobile phones and investigating current limitations due to sensor noise, outages and data sparsity.

 

Principal Investigators
Mohammed Alizadeh, MIT CSAIL
Hari Balakrishnan, MIT CSAIL
Sanjay Chawla, QCRI
Sam Madden, MIT CSAIL

 
Urban Data Analytics to Improve Mobility for Growing Cities in the Context of Mega Events

Information technologies at the start of this project could inform each of us about the best alternatives for shortest paths from origins to destinations, but they could not contain incentives or alternatives that manage the information efficiently to get collective benefits. To obtain such benefits, one would need to have not only good estimates of how the traffic is formed but also to have target strategies to reduce enough vehicles from the best possible roads in a feasible way.

Moreover, to reach the target vehicle reduction is not trivial, it requires individual sacrifices such as some drivers taking alternative routes, shifts in departure times or even changes in modes of transportation. The opportunity is that during large events (Carnivals, Festivals, Sports events, etc.) the traffic inconveniences in large cities are unusually high, yet temporary, and the entire population may be more willing to adopt collective recommendations for social good.

This project focused on understanding the impact of large-scale events and city growth to the traffic in the city and people’s commuting, and sequentially proposing reasonable and feasible travel demand management strategy to mitigate the traffic congestion in the future. This project took a fast growing city, Doha, Qatar as testbed. Traffic in Doha is notoriously bad and the population is growing very fast. Doha will host the FIFA World Cup in 2022, which will definitely attract a great number of tourists, and increase the pressure of the road network. To meet these challenges, this project used big data resources to understand the impact of World Cup and assist the policy maker with more reasonable planning strategy.

The project estimated the travel demand of local population using Bluetooth data and census data. The demand was assigned to the road network and the travel time of each trip estimated.

Principal Investigators
Sofiane Abbar (Social Computing, QCRI)
Marta González (HumNet Lab, MIT)

Advanced Analytics and Visualization for Sports

This project fell into three categories: 1) the use of machine learning and other advanced analytical techniques to discover new information related to on-field performance,  2) the development and application of novel techniques that provide new ways of viewing sporting events, and 3) providing a system for content-adaptive video retargeting.

Principal Investigators
John Guttag, CSAIL
Fredo Durand, CSAIL
Wojciech Matusik, CSAIL
Mohamed Hefeeda, QCRI

Data Management for Social Computing

This project focused on how data management can be used to facilitate social computing. The Humanitarian Technologies research thrust sought to establish key technologies required to facilitate disaster management and humanitarian relief activities based on social media. These technologies leveraged current social networks and primarily focused on data consumption, generation, and integration.




Principal Investigators
Lalana Kagal, CSAIL
Carlos Castillo, QCRI
Patrick Meier, QCRI

Cyber Security Development

The research challenge addressed was that of securing computing infrastructure against a broad class of cyberattacks. The project's objective was to develop new techniques that can remove many of the vulnerabilities that attackers exploit and that can predict and intercept new (zero-day) attacks that exploit previously unknown vulnerabilities. These objectives were pursued through a number of sub-projects that fall into three categories: Systems that are much more difficult to penetrate; Systems that can work through penetrations; and Systems that can recover quickly.
 

Principal Investigators
Srini Devadas, CSAIL
Adam Chlipala, CSAIL
Frans Kaashoek, CSAIL
Shafi Goldwasser, CSAIL
Howard Shrobe, CSAIL
Martin Rinard, CSAIL
Armando Solar Lezama, CSAIL
Vinod Vaikuntanathan, CSAIL
Nickolai Zeldovich, CSAIL
Dimitrios Serpanos, QCRI

Capturing Missing Heritability: Functional Genome-wide Association Studies

This project focused a new study type to understand the basis of complex genetic traits, a functional genome-wide association study (fGWAS).  Most experimental designs, relying solely on linear models and genetic information to predict phenotypes, fail to recover the full range of predictability of a trait.  By combining extensive well-controlled cellular data with novel integrative computational models, this team sought to find a large chunk of the missing heritability of multiple complex traits.  With these contributions, the team then worked to capture the broad-sense heritability that is missed by linear models that rely solely on genotype and markers acting individually.
This new study type focused on making advances along two fronts by measuring and integrating fine-grained cellular measurements into genotype-phenotype models:
(1)    Integrative models that use cellular measurements to prioritize particular genetic variants and interactions, leading to more effective multiple hypothesis controls and better predictions
(2)    Cellular measurements, interpreted as biomarkers, will be used directly to improve prediction of phenotypes
Key milestones: (1) developing novel computational methods that link genotype to phenotype using functional information in Functional Genome Wide Association Studies, and (2) characterizing natural human genetic variation using new computational methods.

Principal Investigators
David Gifford, CSAIL
Tommi Jaakkola, CSAIL
Halima Bensmail, QCRI
Reda Rawi, QCRI

<
Computational Neuro Modeling of Visual Memory: Multimodal Imagining and Analysis

How is memory implemented in the human brain?
This project focused on the development of machine learning classification algorithms for human neuroscience data with the goal of gaining knowledge of the computations and brain regions associated with visual long-term memory.




Principal Investigators
Aude Oliva, CSAIL
Polina Golland, CSAIL
Halima Bensmail, QCRI
Othmane Bouhali, QCRI
 

Rapid Prototyping of Hardware Security Solutions

The goal of the project was to design a high-throughput and low-power FPGA implementation of the newly proposed sparse FFT algorithm. For the purposes of guiding the implementation
effort, the team chose the input data size as a million (220) points, with a maximum of 500 nonzero frequency coefficients. The team completed an initial implementation of the SFFT Core, which includes: 4096 point dense-FFT module, a top-511 element selector module, a Voting module and the Value-compute module. The team improved the design performance and resource usage by modifying the pipeline of the design. The researchers also completed an extensive debugging of the design using customized test-benches. Given the filtered input data slices, the project's FPGA implementation now produces the value-index pairs of the 500 most significant frequency components.

Principal Investigators
Arvind, CSAIL
Raymond Filippi, QCRI

MAQSA: Interactive Social Analytics for News

MAQSA is a system for social analytics on news. MAQSA provides an interactive topic-centric dashboard that summarizes news articles and social activity (e.g., comments and tweets) around them. MAQSA helps editors and publishers in newsrooms understand user engagement and audience sentiment evolution on various topics of interest. It also helps news consumers explore public reaction on articles relevant to a topic and refine their exploration via related entities, topics, articles and tweets. Given a topic, e.g., “Gulf Oil Spill,” or “The Arab Spring”, MAQSA combines three key dimensions: time, geographic location, and topic to generate a detailed activity dashboard around relevant articles. The dashboard contains an annotated comment timeline and a social graph of comments. It utilizes commenters’ locations to build maps of comment sentiment and topics by region of the world. Finally, to facilitate exploration, MAQSA provides listings of related entities, articles, and tweets. It algorithmically processes large collections of articles and tweets, and enables the dynamic specification of topics and dates for exploration. The MAQSA Project completed during Spring 2012, resulting in a patent and conference paper.

Principal Investigators
Sam Madden, CSAIL
Jorge Quiane Ruiz, QCRI
Sihem Amer-Yahia, QCRI

Understanding Health Habits from Social Media Pictures

The major goal of the project was to understand the food habits from social media images. This includes: training machine learning models for image auto-tagging and content extraction from noisy hashtags; predicting population level health statistics in US and Qatar; monitoring temporal and regional trends in food consumption and its implications; learning models that can achieve in depth analysis of food images through the use of large scale cooking recipe data collected from the web.



Principal Investigators
Ferda Ofli, QCRI
Antonio Torralba, MIT CSAIL
Ingmar Weber, QCRI
 

Video Magnification and Video Comparison for Sports

This research focused on developing motion magnification and comparison techniques for sports applications, and to develop motion magnification techniques for laparoscopic surgery.

 

 

Principal Investigators
Fredo Durand, CSAIL
John Guttag, CSAIL
Mohamed Hefeeda, QCRI

 

Content-Adaptive Video Retargeting/Next Generation Video

This project focused on exploiting big data for image and video manipulation. Our work solves fundamental and challenging computer graphics problems with applications to various impactful domains including: computational photography, multimedia and video content post-production.

Principal Investigators
>Mohamed Elgharib, QCRI
Wojciech Matusik, CSAIL
 

Cross-Cloud: Phase 2

This projects objective was to answer the question: How can users get the full benefits of multi-user software even when their friends and colleagues use different software vendors, platforms, and service providers?  More technically, it aimed to design and aid in standardization of protocols which allow for decentralization of social software, thus giving users and vendors a free market for innovation. It also aimed to develop software infrastructure that supports this vision, such as servers to support data storage and retrieval, libraries and development tools to support application developers, and web applications for use by end users.  The approach is iterative, building up from small working systems, improving scaling, security, and user experience, as we test and demonstrate new solutions.

Principal Investigators
Tim Berners-Lee, CSAIL

Understanding and Developing for Cultural Identities Across Platforms: Value-Driven Design Principles and Best Practices in a Qataris

We aimed to assess the current tactics used by Qataris and other GCC nationals to express identity through the use of virtual identity technologies (e.g., social media profiles and avatars), which are not necessarily designed with their values in mind. This investigation sought muliple results: (1) articulation of base principles and best practices for developing technologies that empower Qataris to enact traditional values and cultural norms, (2) new computational techniques for understanding user values and practices in virtual identity systems, and (3) a novel application illustrating the efficacy of our discovered design principles. 

Principal Investigators
D. Fox Harrell, CSAIL
Haewoon Kwak, QCRI
 

Data Base Management

This project dealt with database management.  Specifically, the project team focused on investigating a system to support data scientists, called Data Civilizer, which helped with a number of problems around discovering, integrating, and cleaning data sets.  A particular focus was on methods that combined machine learning, program synthesis, and human-in-the-loop techniques to advance the state of the art in these important areas. 




Principal Investigators
Sam Madden, MIT CSAIL
Mourad Ouzzani, QCRI
Michael Stonebraker, MIT CSAIL
 

Arabic Speech and Language Processing

This project aimed to develop key speech and language processing technology enabling users to search for verified facts and claims, in both written and video repositories of English and Arabic, using questions posed in natural and spoken language.  The research addressed four essential cross-cutting topic areas to achieve this objective.  First, we investigated methods that enable rich annotation of Arabic multimedia content.  Second, we investigated language processing methods to analyze open-ended user-generated content, e.g., dialogs, and perform veracity assessment and inference.  Third, we explored speech and language methods for processing low-resource Arabic dialects.  Finally, we explored interpretation and debugging techniques to improve machine translation between English and Arabic.

Principal Investigators
Ahmed Ali, QCRI
James Glass, MIT CSAIL
Preslav Nakov, QCRI
Stephan Vogel, QCRI
 

A Vertically-Integrated Approach to Resource Efficient Shared Computing

At the initiation of this project, shared computing platforms, from small clusters to large datacenters, suffer from low utilization, wasting billions of dollars in energy and infrastructure every year. Low utilization stems from a disconnect between layers of the hardware and software stack. The goal of this project was to investigate and develop integrated intra- and inter-node resource management techniques that provide both near-peak utilization and guaranteed high performance in shared environments.

To this end, this project consisted of three main thrusts:

  1. Elastic multicore systems, which combine recent hardware support for fast resource management with a novel software runtime to make hardware adaptation work for, not against, performance guarantees. Elastic multicores are focused on using different hardware resources (such as cores, caches, and power) to achieve a given performance target as efficiently as possible, and safely share resources among guaranteed-performance and best-effort applications.
  2. Novel solutions to enable collaborative multi-tenancy, where resource-intensive workloads are co-scheduled and placed using fine-grained, automatically-collected resource usage profiles, considering aspects such as cache and memory bandwidth sharing.
  3. A shared system prototype that enables QF computing users to aggressively colocate applications on shared many-core nodes. The system will guarantee the latency requirement of performance-critical tasks (such as Al Jazeera video processing) while achieving high system utilization with intelligent placement of batch tasks such as HPC and data analytics.

Principal Investigators
Xiaosong Ma, QCRI
Daniel Sanchez, CSAIL

 

Publications

Publications
[1]
S. A. Chowdhury, A. Ali, S. Shon, and J. Glass, “What Does an End-to-End Dialect Identification Model Learn About Non-Dialectal Information?,” in Interspeech 2020, 2020, pp. 462–466, doi: 10.21437/Interspeech.2020-2235 [Online]. Available: http://www.isca-speech.org/archive/Interspeech_2020/abstracts/2235.html
[2]
E. Weber et al., “Detecting natural disasters, damage, and incidents in the wild,” arXiv:2008.09188 [cs], Aug. 2020 [Online]. Available: http://arxiv.org/abs/2008.09188
[3]
E. K. Rezig et al., “Debugging large-scale data science pipelines using dagger,” Proc. VLDB Endow., vol. 13, no. 12, pp. 2993–2996, Aug. 2020, doi: 10.14778/3415478.3415527.
[4]
S. He et al., “Sat2Graph: Road Graph Extraction through Graph-Tensor Encoding,” arXiv:2007.09547 [cs], Jul. 2020 [Online]. Available: http://arxiv.org/abs/2007.09547
[5]
G. D. S. Martino, S. Cresci, A. Barrón-Cedeño, S. Yu, R. D. Pietro, and P. Nakov, “A Survey on Computational Propaganda Detection,” in Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, Yokohama, Japan, 2020, pp. 4826–4832, doi: 10.24963/ijcai.2020/672 [Online]. Available: https://www.ijcai.org/proceedings/2020/672
[6]
S. Shon, A. Ali, Y. Samih, H. Mubarak, and J. Glass, “ADI17: A Fine-Grained Arabic Dialect Identification Dataset,” in ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 2020, pp. 8244–8248, doi: 10.1109/ICASSP40776.2020.9052982 [Online]. Available: https://ieeexplore.ieee.org/document/9052982/
[7]
X. Yu et al., “PushdownDB: Accelerating a DBMS using S3 Computation,” arXiv:2002.05837 [cs], Feb. 2020 [Online]. Available: http://arxiv.org/abs/2002.05837
[8]
A. Qahtan, N. Tang, M. Ouzzani, Y. Cao, and M. Stonebraker, “Pattern functional dependencies for data cleaning,” Proc. VLDB Endow., vol. 13, no. 5, pp. 684–697, Jan. 2020, doi: 10.14778/3377369.3377377.
[9]
J. Wu, Y. Belinkov, H. Sajjad, N. Durrani, F. Dalvi, and J. Glass, “Similarity Analysis of Contextual Word Representation Models,” in Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, Online, 2020, pp. 4638–4655, doi: 10.18653/v1/2020.acl-main.422 [Online]. Available: https://www.aclweb.org/anthology/2020.acl-main.422
[10]
G. Da San Martino, S. Shaar, Y. Zhang, S. Yu, A. Barrón-Cedeño, and P. Nakov, “Prta: A System to Support the Analysis of Propaganda Techniques in the News,” in Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics: System Demonstrations, Online, 2020, pp. 287–293, doi: 10.18653/v1/2020.acl-demos.32 [Online]. Available: https://www.aclweb.org/anthology/2020.acl-demos.32
[11]
R. Baly et al., “What Was Written vs. Who Read It: News Media Profiling Using Text Analysis and Social Media Context,” in Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, Online, 2020, pp. 3364–3374, doi: 10.18653/v1/2020.acl-main.308 [Online]. Available: https://www.aclweb.org/anthology/2020.acl-main.308
[12]
R. Baly, G. Da San Martino, J. Glass, and P. Nakov, “We Can Detect Your Bias: Predicting the Political Ideology of News Articles,” in Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), Online, 2020, pp. 4982–4991, doi: 10.18653/v1/2020.emnlp-main.404 [Online]. Available: https://www.aclweb.org/anthology/2020.emnlp-main.404
[13]
S. He et al., “RoadTagger: Robust Road Attribute Inference with Graph Neural Networks,” arXiv:1912.12408 [cs], Dec. 2019 [Online]. Available: http://arxiv.org/abs/1912.12408
[14]
C. Frogner, S. Claici, E. Chien, and J. Solomon, “Incorporating Unlabeled Data into Distributionally Robust Learning,” arXiv:1912.07729 [cs, stat], Dec. 2019 [Online]. Available: http://arxiv.org/abs/1912.07729
[15]
A. Ali et al., “The MGB-5 Challenge: Recognition and Dialect Identification of Dialectal Arabic Speech,” in 2019 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), SG, Singapore, 2019, pp. 1026–1033, doi: 10.1109/ASRU46091.2019.9003960 [Online]. Available: https://ieeexplore.ieee.org/document/9003960/
[16]
P. Monteiller, S. Claici, E. Chien, F. Mirzazadeh, J. Solomon, and M. Yurochkin, “Alleviating Label Switching with Optimal Transport,” arXiv:1911.02053 [cs, stat], Nov. 2019 [Online]. Available: http://arxiv.org/abs/1911.02053
[17]
M. Yurochkin, S. Claici, E. Chien, F. Mirzazadeh, and J. Solomon, “Hierarchical Optimal Transport for Document Representation,” arXiv:1906.10827 [cs, stat], Nov. 2019 [Online]. Available: http://arxiv.org/abs/1906.10827
[18]
Y. Belinkov, N. Durrani, F. Dalvi, H. Sajjad, and J. Glass, “On the Linguistic Representational Power of Neural Machine Translation Models,” arXiv:1911.00317 [cs], Nov. 2019 [Online]. Available: http://arxiv.org/abs/1911.00317
[19]
Y. Belinkov, A. Ali, and J. Glass, “Analyzing Phonetic and Graphemic Representations in End-to-End Automatic Speech Recognition,” in Interspeech 2019, 2019, pp. 81–85, doi: 10.21437/Interspeech.2019-2599 [Online]. Available: http://www.isca-speech.org/archive/Interspeech_2019/abstracts/2599.html
[20]
J. Tan et al., “Choosing a cloud DBMS: architectures and tradeoffs,” Proc. VLDB Endow., vol. 12, no. 12, pp. 2170–2182, Aug. 2019, doi: 10.14778/3352063.3352133.
[21]
E. K. Rezig et al., “Data Civilizer 2.0: a holistic framework for data preparation and analytics,” Proc. VLDB Endow., vol. 12, no. 12, pp. 1954–1957, Aug. 2019, doi: 10.14778/3352063.3352108.
[22]
L. Cao et al., “Smile: a system to support machine learning on EEG data at scale,” Proc. VLDB Endow., vol. 12, no. 12, pp. 2230–2241, Aug. 2019, doi: 10.14778/3352063.3352138.
[23]
F. Dalvi et al., “NeuroX: A Toolkit for Analyzing Individual Neurons in Neural Networks,” AAAI, vol. 33, pp. 9851–9852, Jul. 2019, doi: 10.1609/aaai.v33i01.33019851.
[24]
F. Dalvi, N. Durrani, H. Sajjad, Y. Belinkov, A. Bau, and J. Glass, “What Is One Grain of Sand in the Desert? Analyzing Individual Neurons in Deep NLP Models,” AAAI, vol. 33, pp. 6309–6317, Jul. 2019, doi: 10.1609/aaai.v33i01.33016309.
[25]
X. Li et al., “Findings of the First Shared Task on Machine Translation Robustness,” arXiv:1906.11943 [cs], Jul. 2019 [Online]. Available: http://arxiv.org/abs/1906.11943
[26]
P. Atanasova et al., “Automatic Fact-Checking Using Context and Discourse Information,” Journal of Data and Information Quality, vol. 11, no. 3, pp. 1–27, May 2019, doi: 10.1145/3297722.
[27]
T.-H. Oh et al., “Speech2Face: Learning the Face Behind a Voice,” arXiv:1905.09773 [cs], May 2019 [Online]. Available: http://arxiv.org/abs/1905.09773
[28]
S. Shon, A. Ali, and J. Glass, “Domain Attentive Fusion for End-to-end Dialect Identification with Unknown Target Domain,” in ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom, 2019, pp. 5951–5955, doi: 10.1109/ICASSP.2019.8682533 [Online]. Available: https://ieeexplore.ieee.org/document/8682533/
[29]
S. Khurana, S. R. Joty, A. Ali, and J. Glass, “A Factorial Deep Markov Model for Unsupervised Disentangled Representation Learning from Speech,” in ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom, 2019, pp. 6540–6544, doi: 10.1109/ICASSP.2019.8683131 [Online]. Available: https://ieeexplore.ieee.org/document/8683131/
[30]
Y. Belinkov, A. Magidow, A. Barrón-Cedeño, A. Shmidman, and M. Romanov, “Studying the history of the Arabic language: language technology and a large-scale historical corpus,” Lang Resources & Evaluation, Apr. 2019, doi: 10.1007/s10579-019-09460-w. [Online]. Available: http://link.springer.com/10.1007/s10579-019-09460-w
[31]
E. K. Rezig, M. Ouzzani, A. K. Elmagarmid, W. G. Aref, and M. Stonebraker, “Towards an End-to-End Human-Centric Data Cleaning Framework,” in Proceedings of the Workshop on Human-In-the-Loop Data Analytics  - HILDA’19, Amsterdam, Netherlands, 2019, pp. 1–7, doi: 10.1145/3328519.3329133 [Online]. Available: http://dl.acm.org/citation.cfm?doid=3328519.3329133
[32]
M. Mohtarami, J. Glass, and P. Nakov, “Contrastive Language Adaptation for Cross-Lingual Stance Detection,” in Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), Hong Kong, China, 2019, pp. 4441–4451, doi: 10.18653/v1/D19-1452 [Online]. Available: https://www.aclweb.org/anthology/D19-1452
[33]
M. Mahdavi et al., “Raha: A Configuration-Free Error Detection System,” in Proceedings of the 2019 International Conference on Management of Data  - SIGMOD ’19, Amsterdam, Netherlands, 2019, pp. 865–882, doi: 10.1145/3299869.3324956 [Online]. Available: http://dl.acm.org/citation.cfm?doid=3299869.3324956
[34]
T. Elsayed et al., “Overview of the CLEF-2019 CheckThat! Lab: Automatic Identification and Verification of Claims,” in Experimental IR Meets Multilinguality, Multimodality, and Interaction, vol. 11696, F. Crestani, M. Braschler, J. Savoy, A. Rauber, H. Müller, D. E. Losada, G. Heinatz Bürki, L. Cappellato, and N. Ferro, Eds. Cham: Springer International Publishing, 2019, pp. 301–321 [Online]. Available: http://link.springer.com/10.1007/978-3-030-28577-7_25
[35]
G. Da San Martino, S. Yu, A. Barrón-Cedeño, R. Petrov, and P. Nakov, “Fine-Grained Analysis of Propaganda in News Article,” in Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), Hong Kong, China, 2019, pp. 5635–5645, doi: 10.18653/v1/D19-1565 [Online]. Available: https://www.aclweb.org/anthology/D19-1565
[36]
A. Bau, N. Durrani, Y. Belinkov, F. Dalvi, H. Sajjad, and J. Glass, “IDENTIFYING AND CONTROLLING IMPORTANT NEURONS IN NEURAL MACHINE TRANSLATION,” p. 19, 2019.
[37]
R. Baly, G. Karadzhov, A. Saleh, J. Glass, and P. Nakov, “Multi-Task Ordinal Regression for Jointly Predicting the Trustworthiness and the Leading Political Ideology of News Media,” in Proceedings of the 2019 Conference of the North, Minneapolis, Minnesota, 2019, pp. 2109–2116, doi: 10.18653/v1/N19-1216 [Online]. Available: http://aclweb.org/anthology/N19-1216
[38]
A. Mukkara, N. Beckmann, M. Abeydeera, X. Ma, and D. Sanchez, “Exploiting Locality in Graph Analytics through Hardware-Accelerated Traversal Scheduling,” in 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Fukuoka, 2018, pp. 1–14, doi: 10.1109/MICRO.2018.00010 [Online]. Available: https://ieeexplore.ieee.org/document/8574527/
[39]
M. Zampieri et al., “Language Identification and Morphosyntactic Tagging: The Second VarDial Evaluation Campaign,” Proceedings of the Fifth Workshop on NLP for Similar Languages, Varieties and Dialects, Aug. 2018 [Online]. Available: http://aclweb.org/anthology/W18-3901
[40]
R. Baly, M. Mohtarami, J. Glass, L. Marquez, A. Moschitti, and P. Nakov, “Integrating Stance Detection and Fact Checking in a Unified Corpus,” arXiv:1804.08012 [cs], Apr. 2018 [Online]. Available: http://arxiv.org/abs/1804.08012
[41]
M. Mohtarami, R. Baly, J. Glass, P. Nakov, L. Marquez, and A. Moschitti, “Automatic Stance Detection Using End-to-End Memory Networks,” arXiv:1804.07581 [cs], Apr. 2018 [Online]. Available: http://arxiv.org/abs/1804.07581
[42]
M. Najafian, S. Khurana, S. Shon, A. Ali, and J. Glass, “Exploiting convolutional neural networks for phonotactic based dialect identification - 0005174,” p. 5, Apr. 2018.
[43]
R. C. Fernandez, I. F. Ilyas, S. Madden, M. O. M. Stonebraker, and N. Tang, “Seeping Semantics: Linking Datasets using Word Embeddings for Data Discovery,” p. 12, Apr. 2018, doi: 10.1109/ICDE.2018.00093.
[44]
M. Najafian, S. Khurana, S. Shon, A. Ali, and J. Glass, “Exploiting convolutional neural networks for phonotactic based dialect identification - 0005174,” in ICASSP 2018, 2018, p. 5 [Online]. Available: http://groups.csail.mit.edu/sls/publications/2018/SuwonShon_ICASSP18.pdf
[45]
E. Mansour et al., “Building Data Civilizer Pipelines with an Advanced Workflow Engine,” in 2018 IEEE 34th International Conference on Data Engineering (ICDE), Paris, 2018, pp. 1593–1596, doi: 10.1109/ICDE.2018.00184 [Online]. Available: https://ieeexplore.ieee.org/document/8509405/
[46]
R. Castro Fernandez, Z. Abedjan, F. Koko, G. Yuan, S. Madden, and M. Stonebraker, “Aurum: A Data Discovery System,” in 2018 IEEE 34th International Conference on Data Engineering (ICDE), Paris, 2018, pp. 1001–1012, doi: 10.1109/ICDE.2018.00094 [Online]. Available: https://ieeexplore.ieee.org/document/8509315/
[47]
S. Shon, A. Ali, and J. Glass, “Convolutional Neural Networks and Language Embeddings for End-to-End Dialect Recognition,” arXiv:1803.04567 [cs, eess], Mar. 2018 [Online]. Available: http://arxiv.org/abs/1803.04567
[48]
T. Mihaylova et al., “Fact Checking in Community Forums,” arXiv:1803.03178 [cs], Mar. 2018 [Online]. Available: http://arxiv.org/abs/1803.03178
[49]
N. El-Sayed, A. Mukkara, P.-A. Tsai, H. Kasture, X. Ma, and D. Sanchez, “KPart: A Hybrid Cache Partitioning-Sharing Technique for Commodity Multicores,” in 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA), Vienna, 2018, pp. 104–117, doi: 10.1109/HPCA.2018.00019 [Online]. Available: http://ieeexplore.ieee.org/document/8327002/
[50]
Y. Belinkov, L. Màrquez, H. Sajjad, N. Durrani, F. Dalvi, and J. Glass, “Evaluating Layers of Representation in Neural Machine Translation on Part-of-Speech and Semantic Tagging Tasks,” arXiv:1801.07772 [cs], Jan. 2018 [Online]. Available: http://arxiv.org/abs/1801.07772
[51]
R. Taft et al., “P-Store: An Elastic Database System with Predictive Provisioning,” in Proceedings of the 2018 International Conference on Management of Data  - SIGMOD ’18, Houston, TX, USA, 2018, pp. 205–219, doi: 10.1145/3183713.3190650 [Online]. Available: http://dl.acm.org/citation.cfm?doid=3183713.3190650.
[52]
S. Şengün and D. F. Harrell, “Virtual Identity Systems Should Better Support Gulf Nationals,” p. 4, 2018.
[53]
A. A. Qahtan, A. Elmagarmid, R. Castro Fernandez, M. Ouzzani, and N. Tang, “FAHES: A Robust Disguised Missing Values Detector,” in Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining  - KDD ’18, London, United Kingdom, 2018, pp. 2100–2109, doi: 10.1145/3219819.3220109 [Online]. Available: http://dl.acm.org/citation.cfm?doid=3219819.3220109
[54]
P. A. Mawhorter, S. Sengun, H. Kwak, and D. F. Harrell, “Identifying Regional Trends in Avatar Customization,” IEEE Transactions on Games, pp. 1–1, 2018, doi: 10.1109/TG.2018.2835776.
[55]
E. Alabdulqader, S. Lazem, M. Khamis, and S. M. Dray, “Exploring Participatory Design Methods to Engage with Arab Communities,” in Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems  - CHI ’18, Montreal QC, Canada, 2018, pp. 1–8, doi: 10.1145/3170427.3170623 [Online]. Available: http://dl.acm.org/citation.cfm?doid=3170427.3170623
[56]
M. Najafian, W.-N. Hsu, A. Ali, and J. Glass, “Automatic speech recognition of Arabic multi-genre broadcast media,” in 2017 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), Okinawa, Japan, 2017, pp. 353–359, doi: 10.1109/ASRU.2017.8268957 [Online]. Available: http://ieeexplore.ieee.org/document/8268957/
[57]
F. Dalvi, N. Durrani, H. Sajjad, Y. Belinkov, and S. Vogel, “Understanding and Improving Morphological Learning in the Neural Machine Translation Decoder,” p. 10, Nov. 2017.
[58]
X. Ji et al., “Understanding Object-level Memory Access Pa erns Across the Spectrum,” in International Conference for High Performance Computing, Networking, Storage and Analysis (SC17), 2017 [Online]. Available: http://people.csail.mit.edu/sanchez/drafts/2017.objprof.sc.pdf
[59]
R. Singh et al., “Synthesizing entity matching rules by examples,” Proceedings of the VLDB Endowment, vol. 11, no. 2, pp. 189–202, Oct. 2017, doi: 10.14778/3149193.3149199.
[60]
R. Singh et al., “Synthesizing entity matching rules by examples,” Proceedings of the VLDB Endowment, vol. 11, no. 2, pp. 189–202, Oct. 2017, doi: 10.14778/3149193.3149199.
[61]
D. Deng et al., “Unsupervised String Transformation Learning for Entity Consolidation,” arXiv:1709.10436 [cs], Sep. 2017 [Online]. Available: http://arxiv.org/abs/1709.10436
[62]
Po-An Tsai, Nathan Beckmann, and Daniel Sanchez, “Nexus: A New Approach to Replication in Distributed Shared Caches,” in The 26th International Conference on Parallel Architectures and Compilation Techniques (PACT), Portland, Oregon, USA, 2017 [Online]. Available: http://people.csail.mit.edu/sanchez/papers/2017.nexus.pact.pdf
[63]
H. Sajjad, F. Dalvi, N. Durrani, A. Abdelali, Y. Belinkov, and S. Vogel, “Challenging Language-Dependent Segmentation for Arabic: An Application to Machine Translation and Part-of-Speech Tagging,” arXiv:1709.00616 [cs], Sep. 2017 [Online]. Available: http://arxiv.org/abs/1709.00616
[64]
W. Tao, D. Deng, and M. Stonebraker, “Approximate string joins with abbreviations,” Proceedings of the VLDB Endowment, vol. 11, no. 1, pp. 53–65, Sep. 2017, doi: 10.14778/3151113.3151118.
[65]
H. Kasture, X. Ji, N. El-Sayed, N. Beckmann, X. Ma, and D. Sanchez, “POSTER: Improving Datacenter Efficiency through Partitioning-Aware Scheduling,” in 26th international conference on Parallel Architectures and Compilation Techniques (PACT-26), 2017 [Online]. Available: http://people.csail.mit.edu/sanchez/papers/2017.shepherd.pact.pdf
[66]
S. Shon, A. Ali, and J. Glass, “MIT-QCRI Arabic Dialect Identification System for the 2017 Multi-Genre Broadcast Challenge,” arXiv:1709.00387 [cs], Aug. 2017 [Online]. Available: http://arxiv.org/abs/1709.00387
[67]
S. Khurana, M. Najafian, A. Ali, T. A. Hanai, Y. Belinkov, and J. Glass, “QMDIS: QCRI-MIT Advanced Dialect Identification System,” in Interspeech 2017, 2017, pp. 2591–2595, doi: 10.21437/Interspeech.2017-1391 [Online]. Available: http://www.isca-speech.org/archive/Interspeech_2017/abstracts/1391.html
[68]
J. Salminen et al., “Generating Cultural Personas from Social Data: A Perspective of Middle Eastern Users,” in 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Prague, 2017, pp. 120–125, doi: 10.1109/FiCloudW.2017.97 [Online]. Available: http://ieeexplore.ieee.org/document/8113781/
[69]
S. Romeo et al., “Language processing and learning models for community question answering in Arabic,” Information Processing & Management, Aug. 2017, doi: 10.1016/j.ipm.2017.07.003. [Online]. Available: https://doi.org/10.1016/j.ipm.2017.07.003
[70]
S. Romeo et al., “Language processing and learning models for community question answering in Arabic,” Information Processing & Management, Aug. 2017, doi: 10.1016/j.ipm.2017.07.003. [Online]. Available: https://linkinghub.elsevier.com/retrieve/pii/S0306457316306720
[71]
S. Khurana, M. Najafian, A. Ali, T. Al Hanai, Y. Belinkov, and J. Glass, “QMDIS: QCRI-MIT Advanced Dialect Identification System,” Proc. Interspeech 2017, pp. 2591–2595, Aug. 2017.
[72]
A. Salvador et al., “Learning Cross-modal Embeddings for Cooking Recipes and Food Images,” in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, vol. 720, pp. 619–508 [Online]. Available: http://openaccess.thecvf.com/content_cvpr_2017/papers/Salvador_Learning_Cross-Modal_Embeddings_CVPR_2017_paper.pdf
[73]
H. Sajjad, F. Dalvi, N. Durrani, A. Abdelali, Y. Belinkov, and S. Vogel, “Challenging Language-Dependent Segmentation for Arabic: An Application to Machine Translation and Part-of-Speech Tagging,” 2017, pp. 601–607, doi: 10.18653/v1/P17-2095 [Online]. Available: http://doi.org/10.18653/v1/P17-2095
[74]
Y. Belinkov, N. Durrani, F. Dalvi, H. Sajjad, and J. Glass, “What do Neural Machine Translation Models Learn about Morphology?,” 2017, pp. 861–872, doi: 10.18653/v1/P17-1080 [Online]. Available: https://doi.org/10.18653/v1/P17-1080
[75]
A. Mukkara, N. Beckmann, and D. Sanchez, “Cache-Guided Scheduling: Exploiting Caches to Maximize Locality in Graph Processing,” in 1st International Workshop on Architectures for Graph Processing (AGP 2017), Held in conjunction with ISCA 2017, Toronto, Canada, 2017 [Online]. Available: https://sites.google.com/view/agp2017/program
[76]
P.-A. Tsai, N. Beckmann, and D. Sanchez, “Jenga: Software-Defined Cache Hierarchies,” in Proceedings of the 44th Annual International Symposium on Computer Architecture, New York, NY, USA, 2017, pp. 652–665, doi: 10.1145/3079856.3080214 [Online]. Available: https://doi.org/10.1145/3079856.3080214
[77]
D. F. Harrell et al., “Culturally-Grounded Analysis of Everyday Creativity in Social Media: A Case Study in Qatari Context,” in Proceedings of the 2017 ACM SIGCHI Conference on Creativity and Cognition, New York, NY, USA, 2017, pp. 209–221, doi: 10.1145/3059454.3059456 [Online]. Available: https://doi.org/10.1145/3059454.3059456
[78]
T. Shen, T. Lei, R. Barzilay, and T. Jaakkola, “Style Transfer from Non-Parallel Text by Cross-Alignment,” arXiv:1705.09655 [cs], May 2017 [Online]. Available: http://arxiv.org/abs/1705.09655
[79]
E. Kocabey et al., “Face-to-bmi: Using computer vision to infer body mass index on social media,” in The 11th International AAAI Conference on Web and Social Media (ICWSM-17), Montreal, Canada, 2017 [Online]. Available: https://arxiv.org/pdf/1703.03156.pdf
[80]
F. Ofli, Y. Aytar, I. Weber, R. al Hammouri, and A. Torralba, “Is Saki #delicious?: The Food Perception Gap on Instagram and Its Relation to Health,” presented at the 2017 International World Wide Web Conference Committee (IW3C2), 2017, pp. 509–518, doi: 10.1145/3038912.3052663 [Online]. Available: http://dx.doi.org/10.1145/3038912.3052663
[81]
Nathan Beckmann and Daniel Sanchez, “Maximizing Cache Performance Under Uncertainty,” presented at the The 23rd IEEE Symposium on High Performance Computer Architecture, 2017 [Online]. Available: http://hpca2017.org/program/
[82]
C. Herder, L. Ren, M. van Dijk, M.-D. Yu, and S. Devadas, “Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions,” IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 1, pp. 65–82, Jan. 2017, doi: 10.1109/TDSC.2016.2536609.
[83]
D. Deng et al., “The Data Civilizer System,” presented at the 2017 Conference on Innovative Data Systems Research (CIDR 2017), 2017 [Online]. Available: http://cidrdb.org/cidr2017/papers/p44-deng-cidr17.pdf
[84]
D. F. Harrell et al., “Culturally-Grounded Analysis of Everyday Creativity in Social Media: A Case Study in Qatari Context,” in Proceedings of the 2017 ACM SIGCHI Conference on Creativity and Cognition  - C&C ’17, Singapore, Singapore, 2017, pp. 209–221, doi: 10.1145/3059454.3059456 [Online]. Available: http://dl.acm.org/citation.cfm?doid=3059454.3059456
[85]
Y. Belinkov, N. Durrani, F. Dalvi, H. Sajjad, and J. Glass, “What do Neural Machine Translation Models Learn about Morphology?,” Proceedings of the 55th Annual Meeting of the Association for          Computational Linguistics (Volume 1: Long Papers), pp. 861–872, 2017, doi: 10.18653/v1/P17-1080.
[86]
D. Alvarez-Melis and T. Jaakkola, “A causal framework for explaining the predictions of black-box sequence-to-sequence models,” in Proceedings of the 2017 Conference on Empirical Methods in Natural          Language Processing, Copenhagen, Denmark, 2017, pp. 412–421, doi: 10.18653/v1/D17-1042 [Online]. Available: http://aclweb.org/anthology/D17-1042
[87]
S. Romeo et al., “Neural attention for learning to rank questions in community question answering,” in Proceedings of the 26th International Conference on Computational Linguistics, Osaka, Japan, 2016, pp. 1734–1745 [Online]. Available: http://www.aclweb.org/anthology/C/C16/C16-1163.pdf
[88]
W.-N. Hsu, Y. Zhang, and J. Glass, “A prioritized grid long short-term memory RNN for speech recognition,” in 2016 IEEE Spoken Language Technology Workshop (SLT), 2016, pp. 467–473, doi: 10.1109/SLT.2016.7846305 [Online]. Available: https://doi.org/10.1109/SLT.2016.7846305
[89]
Y. Belinkov, A. Magidow, M. Romanov, A. Shmidman, and M. Koppel, “Shamela: A Large-Scale Historical Arabic Corpus,” in Proceedings of the Workshop on Language Technology Resources and Tools for Digital Humanities (LT4DH), Osaka, Japan, 2016, pp. 45–53 [Online]. Available: http://aclweb.org/anthology/W16-4007
[90]
Y. Belinkov and J. Glass, “A Character-level Convolutional Neural Network for Distinguishing Similar Languages and Dialects,” in Proceedings of the Third Workshop on NLP for Similar Languages, Varieties and Dialects (VarDial3), Osaka, Japan, 2016, pp. 145–152 [Online]. Available: http://aclweb.org/anthology/W16-4819
[91]
A. Ali et al., “The MGB-2 Challenge: Arabic Multi-Dialect Broadcast Media Recognition,” presented at the 2016 IEEE Workshop on Spoken Language Technology, San Diego, California, 2016 [Online]. Available: http://www.slt2016.org/Papers/ViewPapers.asp?PaperNum=1013
[92]
T. AlHanai, W.-N. Hsu, and J. Glass, “Development of the MIT ASR system for the 2016 Arabic multi-genre broadcast challenge,” in 2016 IEEE Spoken Language Technology Workshop (SLT), 2016, pp. 299–304, doi: 10.1109/SLT.2016.7846280 [Online]. Available: https://doi.org/10.1109/SLT.2016.7846280
[93]
M. Serafini, R. Taft, A. J. Elmore, A. Pavlo, A. Aboulnaga, and M. Stonebraker, “Clay: fine-grained adaptive partitioning for general database schemas,” Proceedings of the VLDB Endowment, vol. 10, no. 4, pp. 445–456, Nov. 2016, doi: 10.14778/3025111.3025125.
[94]
T. Lei, R. Barzilay, and T. Jaakkola, “Rationalizing neural predictions,” in arXiv preprint arXiv:1606.04155, Austin, Texas, 2016 [Online]. Available: https://arxiv.org/abs/1606.04155
[95]
Y. Belinkov and J. Glass, “Large-Scale Machine Translation between Arabic and Hebrew: Available Corpora and Initial Results,” in Proceedings of the Workshop on Semitic Machine Translation, Austin, Texas, 2016, pp. 7–12 [Online]. Available: https://semitic-mt.seas.gwu.edu/pdf/SeMaT02.pdf
[96]
A. Ali et al., “Automatic Dialect Detection in Arabic Broadcast Speech,” presented at the INTERSPEECH 2016, San Francisco, CA, 2016, pp. 2934–2938, doi: 10.21437/Interspeech.2016-1297 [Online]. Available: https://doi.org/10.21437/Interspeech.2016-1297
[97]
H. Nassif, M. Mohtarami, and J. Glass, “Learning semantic relatedness in community question answering using neural models,” in ACL 2016, 2016, pp. 137–147 [Online]. Available: http://www.aclweb.org/anthology/W16-1616
[98]
L. Chong-U, L. Antonios, and H. F. D, “Discovering Social and Aesthetic Categories of Avatars: A Bottom-Up Artificial Intelligence Approach Using Image Clustering,” in DiGRA/FDG - Proceedings of the First International Joint Conference of DiGRA and FDG, Dundee, Scotland, 2016 [Online]. Available: http://www.digra.org/wp-content/uploads/digital-library/paper_1971.pdf
[99]
Z. Abedjan et al., “Detecting Data Errors: Where are we and what needs to be done?,” Proceedings of the VLDB Endowment, vol. 9, no. 12, pp. 993–1004, Aug. 2016, doi: 10.14778/2994509.2994518.
[100]
Abe Davis, “Visual Vibration Analysis,” PhD Dissertation, Massachusetts Institute of Technology, 2016 [Online]. Available: http://www.abedavis.com/thesis.pdf
[101]
P. Kellnhofer, P. Didyk, K. Myszkowski, M. M. Hefeeda, H.-P. Seidel, and W. Matusik, “GazeStereo3D: seamless disparity manipulations,” ACM Transactions on Graphics, vol. 35, no. 4, pp. 1–13, Jul. 2016, doi: 10.1145/2897824.2925866.
[102]
Y. Zhang, D. Gaddy, R. Barzilay, and T. Jaakkola, “Ten Pairs to Tag – Multilingual POS Tagging via Coarse Mapping between Embeddings,” in Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego, California, 2016, pp. 1307–1317 [Online]. Available: http://www.aclweb.org/anthology/N16-1156
[103]
M. Mohtarami et al., “SLS at SemEval-2016 Task 3: Neural-based Approaches for Ranking in Community Question Answering,” in Proceedings of the 10th International Workshop on Semantic Evaluation (SemEval-2016), San Diego, California, 2016, pp. 828–835 [Online]. Available: http://www.aclweb.org/anthology/S16-1128
[104]
T. Lei et al., “Semi-supervised Question Retrieval with Gated Convolutions,” in Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego, California, 2016, pp. 1279–1289 [Online]. Available: http://www.aclweb.org/anthology/N16-1153
[105]
K. Krafka et al., “Eye Tracking for Everyone,” in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 2176–2184 [Online]. Available: http://www.cv-foundation.org/openaccess/content_cvpr_2016/html/Krafka_Eye_Tracking_for_CVPR_2016_paper.html
[106]
Z. Abedjan, J. Morcos, I. F. Ilyas, M. Ouzzani, P. Papotti, and M. Stonebraker, “DataXFormer: A robust transformation discovery system,” in 2016 IEEE 32nd International Conference on Data Engineering (ICDE), 2016, pp. 1134–1145, doi: 10.1109/ICDE.2016.7498319 [Online]. Available: http://doi.org/10.1109/ICDE.2016.7498319
[107]
E. Mansour et al., “A Demonstration of the Solid Platform for Social Web Applications,” in Proceedings of the 25th International Conference Companion on World Wide Web, Montréal, Québec, Canada, 2016, pp. 223–226, doi: 10.1145/2872518.2890529 [Online]. Available: https://doi.org/10.1145/2872518.2890529
[108]
K. Calagari et al., “Depth Personalization and Streaming of Stereoscopic Sports Videos,” ACM Trans. Multimedia Comput. Commun. Appl., vol. 12, no. 3, p. 41:1-41:23, Mar. 2016, doi: 10.1145/2890103.
[109]
N. Beckmann and D. Sanchez, “Modeling cache performance beyond LRU,” in 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA), 2016, pp. 225–236, doi: 10.1109/HPCA.2016.7446067 [Online]. Available: https://doi.org/10.1109/HPCA.2016.7446067
[110]
Harshad Kasture and Daniel Sanchez, “Tailbench: a benchmark suite and evaluation methodology for latency-critical applications,” 2016 IEEE International Symposium on Workload Characterization (IISWC), pp. 1–10, 2016, doi: 10.1109/IISWC.2016.7581261.
[111]
N. Beckmann and D. Sanchez, “Cache Calculus: Modeling Caches through Differential Equations,” IEEE Computer Architecture Letters, vol. PP, no. 99, pp. 1–1, 2016, doi: 10.1109/LCA.2015.2512873.
[112]
Z. Abedjan, C. G. Akcora, M. Ouzzani, P. Papotti, and M. Stonebraker, “Temporal Rules Discovery for Web Data Cleaning,” Proc. VLDB Endow., vol. 9, no. 4, pp. 336–347, Dec. 2015, doi: 10.14778/2856318.2856328.
[113]
A. Davis, J. G. Chen, and F. Durand, “Image-space Modal Bases for Plausible Manipulation of Objects in Video,” ACM Trans. Graph., vol. 34, no. 6, p. 239:1-239:7, Oct. 2015, doi: 10.1145/2816795.2818095.
[114]
N. Bitansky and V. Vaikuntanathan, “Indistinguishability Obfuscation from Functional Encryption,” in 2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS), 2015, pp. 171–190, doi: 10.1109/FOCS.2015.20 [Online]. Available: http://doi.org/10.1109/FOCS.2015.20
[115]
S. Joty et al., “Global Thread-level Inference for Comment Classification in Community Question Answering,” in Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, Lisbon, Portugal, 2015, pp. 573–578 [Online]. Available: http://aclweb.org/anthology/D15-1068
[116]
P. Cardinal, N. Dehak, Y. Zhang, and J. Glass, “Speaker adaptation using the i-vector technique for bottleneck features,” in 16th Annual Conference of the International Speech Communication Association, 2015, vol. 2015, pp. 2867–2871 [Online]. Available: http://www.isca-speech.org/archive/interspeech_2015/papers/i15_2867.pdf
[117]
A. Abdelali, A. Ali, F. Guzmán, F. Stahlberg, S. Vogel, and Y. Zhang, “QAT2–The QCRI Advanced Transcription and Translation System,” in 16th Annual Conference of the International Speech Communication Association, 2015, pp. 726–727 [Online]. Available: http://www.isca-speech.org/archive/interspeech_2015/papers/i15_0726.pdf
[118]
Y. Belinkov, A. Barrón-Cedeño, and H. Mubarak, “Answer Selection in Arabic Community Question Answering: A Feature-Rich Approach,” in Proceedings of the Second Workshop on Arabic Natural Language Processing, Beijing, China, 2015, pp. 183–190 [Online]. Available: http://www.aclweb.org/anthology/W15-3223
[119]
A. Barrón-Cedeño et al., “Thread-Level Information for Comment Classification in Community Question Answering,” in Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers), Beijing, China, 2015, pp. 687–693 [Online]. Available: http://www.aclweb.org/anthology/P15-2113
[120]
Y. Zhang, C. Li, R. Barzilay, and K. Darwish, “Randomized Greedy Inference for Joint Segmentation, POS Tagging and Dependency Parsing,” in Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, 2015, pp. 42–52 [Online]. Available: http://www.aclweb.org/anthology/N15-1005
[121]
P. Nakov, L. Màrquez, W. Magdy, A. Moschitti, J. Glass, and B. Randeree, “SemEval-2015 Task 3: Answer Selection in Community Question Answering,” in Proceedings of the 9th International Workshop on Semantic Evaluation (SemEval 2015), Denver, Colorado, 2015, pp. 269–281 [Online]. Available: http://www.aclweb.org/anthology/S15-2047
[122]
T. Lei, Y. Zhang, L. Màrquez, A. Moschitti, and R. Barzilay, “High-Order Low-Rank Tensors for Semantic Role Labeling,” in Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, 2015, pp. 1150–1160 [Online]. Available: http://www.aclweb.org/anthology/N15-1121
[123]
M. A. Elgharib, M. Hefeeda, F. Durand, and W. T. Freeman, “Video magnification in presence of large motions,” in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 4119–4127, doi: 10.1109/CVPR.2015.7299039 [Online]. Available: http://doi.org/10.1109/CVPR.2015.7299039
[124]
A. Davis, K. L. Bouman, J. G. Chen, M. Rubinstein, F. Durand, and W. T. Freeman, “Visual vibrometry: Estimating material properties from small motions in video,” in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 5335–5343, doi: 10.1109/CVPR.2015.7299171 [Online]. Available: http://doi.org/10.1109/CVPR.2015.7299171
[125]
Y. Belinkov, M. Mohtarami, S. Cyphers, and J. Glass, “VectorSLU: A Continuous Word Vector Approach to Answer Selection in Community Question Answering Systems,” in Proceedings of the 9th International Workshop on Semantic Evaluation (SemEval 2015), Denver, Colorado, 2015, pp. 282–287 [Online]. Available: http://www.aclweb.org/anthology/S15-2048
[126]
A. Alghunaim, M. Mohtarami, S. Cyphers, and J. Glass, “A Vector Space Approach for Aspect Based Sentiment Analysis,” in Proceedings of the 1st Workshop on Vector Space Modeling for Natural Language Processing, Denver, Colorado, 2015, pp. 116–122 [Online]. Available: http://www.aclweb.org/anthology/W15-1516
[127]
C. W. Fletcher et al., “A Low-Latency, Low-Area Hardware Oblivious RAM Controller,” in 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), 2015, pp. 215–222, doi: 10.1109/FCCM.2015.58 [Online]. Available: http://doi.org/10.1109/FCCM.2015.58
[128]
R. Rawi, M. El Anbari, and H. Bensmail, “Model Selection Emphasises the Importance of Non-Chromosomal Information in Genetic Studies,” PLOS ONE, vol. 10, no. 1, p. e0117014, Jan. 2015, doi: 10.1371/journal.pone.0117014.
[129]
X. Yu et al., “PrORAM: Dynamic Prefetcher for Oblivious RAM,” in Proceedings of the 42Nd Annual International Symposium on Computer Architecture, New York, NY, USA, 2015, pp. 616–628, doi: 10.1145/2749469.2750413 [Online]. Available: http://doi.acm.org/10.1145/2749469.2750413
[130]
J. Yang, “Preventing Information Leaks with Policy-Agnostic Programming,” Massachusetts Institute of Technology, 2015 [Online]. Available: http://hdl.handle.net/1721.1/101468
[131]
WeiHua James Li, Julius Adebayo, Fuming Shih, and Lalana Kagal, “Understanding the role of mobile technologies for humanitarian relief,” in ISCRAM 2015 Conference Proceedings – 12th International Conference on Information Systems for Crisis Response and Management, Kristiansand, Norway, 2015 [Online]. Available: http://idl.iscram.org/files/weihuajamesli/2015/1224_WeiHuaJamesLi_etal2015.pdf
[132]
V. Vaikuntanathan and P. N. Vasudevan, “Secret Sharing and Statistical Zero Knowledge,” in Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part I, T. Iwata and J. H. Cheon, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 656–680 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48797-6_27
[133]
L. Ren et al., “Constants Count: Practical Improvements to Oblivious RAM,” in 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., 2015, pp. 415–430 [Online]. Available: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ren-ling
[134]
J. Morcos, Z. Abedjan, I. F. Ilyas, M. Ouzzani, P. Papotti, and M. Stonebraker, “DataXFormer: An Interactive Data Transformation Tool,” in Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2015, pp. 883–888, doi: 10.1145/2723372.2735366 [Online]. Available: http://doi.acm.org/10.1145/2723372.2735366
[135]
Y. H. Kwon, “Riffle: An efficient communication system with strong anonymity,” Massachusetts Institute of Technology, 2015 [Online]. Available: http://hdl.handle.net/1721.1/99859
[136]
A. Kwon, M. AlSabah, D. Lazar, M. Dacier, and S. Devadas, “Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services,” in 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., 2015, pp. 287–302 [Online]. Available: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kwon
[137]
R. Kumaresan, T. Moran, and I. Bentov, “How to Use Bitcoin to Play Decentralized Poker,” in Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2015, pp. 195–206, doi: 10.1145/2810103.2813712 [Online]. Available: http://doi.acm.org/10.1145/2810103.2813712
[138]
V. Kolesnikov and R. Kumaresan, “On Cut-and-Choose Oblivious Transfer and Its Variants,” in Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part I, T. Iwata and J. H. Cheon, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 386–412 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48797-6_17
[139]
Z. Khayyat et al., “BigDansing: A System for Big Data Cleansing,” in Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2015, pp. 1215–1230, doi: 10.1145/2723372.2747646 [Online]. Available: http://doi.acm.org/10.1145/2723372.2747646
[140]
A. Jain et al., “Mobile Application Development for Crisis Data,” Procedia Engineering, vol. 107, pp. 255–262, 2015, doi: 10.1016/j.proeng.2015.06.080.
[141]
Y. Ishai, R. Kumaresan, E. Kushilevitz, and A. Paskin-Cherniavsky, “Secure Computation with Minimal Interaction, Revisited,” in Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, R. Gennaro and M. Robshaw, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 359–378 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48000-7_18
[142]
S. Gorbunov, V. Vaikuntanathan, and D. Wichs, “Leveled Fully Homomorphic Signatures from Standard Lattices,” in Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, New York, NY, USA, 2015, pp. 469–477, doi: 10.1145/2746539.2746576 [Online]. Available: http://doi.acm.org/10.1145/2746539.2746576
[143]
S. Gorbunov, V. Vaikuntanathan, and H. Wee, “Predicate Encryption for Circuits from LWE,” in Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, R. Gennaro and M. Robshaw, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 503–523 [Online]. Available: http://dx.doi.org/10.1007/978-3-662-48000-7_25
[144]
C. W. Fletcher, L. Ren, A. Kwon, M. van Dijk, and S. Devadas, “Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM,” in Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, New York, NY, USA, 2015, pp. 103–116, doi: 10.1145/2694344.2694353 [Online]. Available: http://doi.acm.org/10.1145/2694344.2694353
[145]
B. Delaware, C. Pit-Claudel, J. Gross, and A. Chlipala, “Fiat: Deductive Synthesis of Abstract Data Types in a Proof Assistant,” in POPL ’15 Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015, pp. 689–700, doi: 10.1145/2676726.2677006 [Online]. Available: http://doi.org/10.1145/2676726.2677006
[146]
G. Chaurasia, J. Ragan-Kelley, S. Paris, G. Drettakis, and F. Durand, “Compiling High Performance Recursive Filters,” in Proceedings of the 7th Conference on High-Performance Graphics, New York, NY, USA, 2015, pp. 85–94, doi: 10.1145/2790060.2790063 [Online]. Available: http://doi.org/10.1145/2790060.2790063
[147]
R. Canetti, J. Holmgren, A. Jain, and V. Vaikuntanathan, “Succinct Garbling and Indistinguishability Obfuscation for RAM Programs,” in Forty-Seventh Annual ACM on Symposium on Theory of Computing, New York, NY, USA, 2015, pp. 429–437, doi: 10.1145/2746539.2746621 [Online]. Available: http://doi.org/10.1145/2746539.2746621
[148]
Z. Brakerski and V. Vaikuntanathan, “Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions,” in Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II, Y. Dodis and J. B. Nielsen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 1–30 [Online]. Available: http://doi.org/10.1007/978-3-662-46497-7_1
[149]
P. Ananth, Z. Brakerski, G. Segev, and V. Vaikuntanathan, “From Selective to Adaptive Security in Functional Encryption,” in Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, R. Gennaro and M. Robshaw, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 657–677 [Online]. Available: http://doi.org/10.1007/978-3-662-48000-7_32
[150]
Z. Abedjan et al., “Dataxformer: Leveraging the Web for Semantic Transformations,” in CIDR 2015, Seventh Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 4-7, 2015, Online Proceedings, 2015 [Online]. Available: http://www.cidrdb.org/cidr2015/Papers/CIDR15_Paper31.pdf
[151]
A. Ali, Y. Zhang, P. Cardinal, N. Dahak, S. Vogel, and J. Glass, “A complete KALDI recipe for building Arabic speech recognition systems,” in 2014 IEEE Spoken Language Technology Workshop (SLT), 2014, pp. 525–529, doi: 10.1109/SLT.2014.7078629 [Online]. Available: http://doi.org/10.1109/SLT.2014.7078629
[152]
R. Taft et al., “E-store: Fine-grained Elastic Partitioning for Distributed Transaction Processing Systems,” Proc. VLDB Endow., vol. 8, no. 3, pp. 245–256, Nov. 2014, doi: 10.14778/2735508.2735514.
[153]
T. Al Hanai and J. Glass, “Lexical Modeling for Arabic ASR: A Systematic Approach,” in 15th Annual Conference of the International Speech Communication Association, 2014, pp. 2605–2609 [Online]. Available: http://www.isca-speech.org/archive/archive_papers/interspeech_2014/i14_2605.pdf
[154]
A. Agarwal, H. Hassanieh, O. Abari, E. Hamed, D. Katabi, and Arvind, “High-throughput implementation of a million-point sparse Fourier Transform,” in 2014 24th International Conference on Field Programmable Logic and Applications (FPL), 2014, pp. 1–6, doi: 10.1109/FPL.2014.6927450 [Online]. Available: http://doi.org/10.1109/FPL.2014.6927450
[155]
I. Saleh et al., “A Study of using Syntactic and Semantic Structures for Concept Segmentation and Labeling,” in COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers, Dublin, Ireland, 2014, pp. 193–202 [Online]. Available: http://www.aclweb.org/anthology/C14-1020
[156]
K. Templin, P. Didyk, K. Myszkowski, M. M. Hefeeda, H.-P. Seidel, and W. Matusik, “Modeling and optimizing eye vergence response to stereoscopic cuts,” ACM Transactions on Graphics, vol. 33, no. 4, pp. 1–8, Jul. 2014, doi: 10.1145/2601097.2601148.
[157]
M. H. Bahari, N. Dehak, H. V. hamme, L. Burget, A. M. Ali, and J. Glass, “Non-Negative Factor Analysis of Gaussian Mixture Model Weight Adaptation for Language and Dialect Recognition,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, no. 7, Jul. 2014, doi: 10.1109/TASLP.2014.2319159. [Online]. Available: http://doi.org/10.1109/TASLP.2014.2319159
[158]
Y. Zhang, T. Lei, R. Barzilay, T. Jaakkola, and A. Globerson, “Steps to Excellence: Simple Inference with Refined Scoring of Dependency Trees,” in Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Baltimore, Maryland, 2014, pp. 197–207 [Online]. Available: http://www.aclweb.org/anthology/P14-1019
[159]
T. Lei, Y. Xin, Y. Zhang, R. Barzilay, and T. Jaakkola, “Low-Rank Tensors for Scoring Dependency Structures,” in Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Baltimore, Maryland, 2014, pp. 1381–1391 [Online]. Available: http://www.aclweb.org/anthology/P14-1130
[160]
M. D. Edwards, A. Symbor-Nagrabska, L. Dollard, D. K. Gifford, and G. R. Fink, “Interactions between chromosomal and nonchromosomal elements reveal missing heritability,” Proceedings of the National Academy of Sciences, vol. 111, no. 21, pp. 7719–7722, May 2014, doi: 10.1073/pnas.1407126111.
[161]
T. B. Hashimoto, M. D. Edwards, and D. K. Gifford, “Universal Count Correction for High-Throughput Sequencing,” PLoS Comput Biol, vol. 10, no. 3, pp. 1–11, Mar. 2014, doi: 10.1371/journal.pcbi.1003494.
[162]
M. Gubanov, M. Stonebraker, and D. Bruckner, “Text and structured data fusion in data tamer at scale,” in 2014 IEEE 30th International Conference on Data Engineering, 2014, pp. 1258–1261, doi: 10.1109/ICDE.2014.6816755 [Online]. Available: http://doi.org/10.1109/ICDE.2014.6816755
[163]
C. W. Fletchery, L. Ren, X. Yu, M. V. Dijk, O. Khan, and S. Devadas, “Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs,” in 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA), 2014, pp. 213–224, doi: 10.1109/HPCA.2014.6835932 [Online]. Available: http://doi.org/10.1109/HPCA.2014.6835932
[164]
N. Wadhwa, M. Rubinstein, F. Durand, and W. T. Freeman, “Riesz pyramids for fast phase-based video magnification,” in Computational Photography (ICCP), 2014 IEEE International Conference on, 2014, pp. 1–10 [Online]. Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6831820
[165]
O. Seneviratne et al., “Developing Mobile Linked Data Applications,” in Proceedings of the 2014 International Conference on Posters & Demonstrations Track - Volume 1272, Aachen, Germany, Germany, 2014, pp. 169–172 [Online]. Available: http://dl.acm.org/citation.cfm?id=2878453.2878496
[166]
A. Sambra, S. Hawke, T. Berners-Lee, L. Kagal, and A. Aboulnaga, “CIMBA: client-integrated microblogging architecture,” in Proceedings of the 2014 International Conference on Posters & Demonstrations Track-Volume 1272, 2014, pp. 57–60 [Online]. Available: http://dl.acm.org/citation.cfm?id=2878468
[167]
A. McQueen, J. Wiens, and J. Guttag, “Automatically recognizing on-ball screens,” in 2014 MIT Sloan Sports Analytics Conference, Boston, MA, USA, 2014 [Online]. Available: http://www.sloansportsconference.com/wp-content/uploads/2014/02/2014_SSAC_Recognizing-on-Ball-Screens.pdf
[168]
M. T. Khan, D. Serpanos, and H. Shrobe, “On the Behavioural Formalization of the Cognitive Middleware AWDRAT,” arXiv preprint arXiv:1412.2328, 2014 [Online]. Available: http://arxiv.org/abs/1412.2328
[169]
M. T. Khan, D. N. Serpanos, and H. E. Shrobe, “On the Formal Semantics of the Cognitive Middleware AWDRAT,” arXiv:1412.3588, 2014 [Online]. Available: http://arxiv.org/abs/1412.3588
[170]
M. Kates, “Player motion analysis: automatically classifying NBA plays,” Massachusetts Institute of Technology, 2014 [Online]. Available: http://dspace.mit.edu/handle/1721.1/100664
[171]
L. Gyarmati, H. Kwak, and P. Rodriguez, “Searching for a unique style in soccer,” in 2014 KDD Workshop on Large-Scale Sports Analytics, 2014 [Online]. Available: http://large-scale-sports-analytics.org/Large-Scale-Sports-Analytics/Submissions2014_files/paperID5.pdf
[172]
S. Goldwasser et al., “Multi-input functional encryption,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2014, pp. 578–602 [Online]. Available: http://link.springer.com/chapter/10.1007/978-3-642-55220-5_32
[173]
P. Cardinal et al., “Recent advances in ASR applied to an Arabic transcription system for Al-Jazeera.,” in 15th Annual Conference of the International Speech Communication Association, 2014, pp. 2088–2092 [Online]. Available: http://www.isca-speech.org/archive/archive_papers/interspeech_2014/i14_2088.pdf
[174]
K. Calagari et al., “Anahita: A System for 3D Video Streaming with Depth Customization,” in Proceedings of the 22Nd ACM International Conference on Multimedia, New York, NY, USA, 2014, pp. 337–346, doi: 10.1145/2647868.2654899 [Online]. Available: http://doi.org/10.1145/2647868.2654899
[175]
H. Sajjad, K. Darwish, and Y. Belinkov, “Translating Dialectal Arabic to English,” in Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), Sofia, Bulgaria, 2013, pp. 1–6 [Online]. Available: http://www.aclweb.org/anthology/P13-2001
[176]
X. Yu, C. W. Fletcher, L. Ren, M. van Dijk, and S. Devadas, “Generalized External Interaction with Tamper-resistant Hardware with Bounded Information Leakage,” in Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, New York, NY, USA, 2013, pp. 23–34, doi: 10.1145/2517488.2517498 [Online]. Available: http://doi.org/10.1145/2517488.2517498
[177]
M. Stonebraker et al., “Data Curation at Scale: The Data Tamer System,” in CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 6-9, 2013, Online Proceedings, 2013 [Online]. Available: http://www.cidrdb.org/cidr2013/Papers/CIDR13_Paper28.pdf
[178]
F. Shih, O. Seneviratne, I. Liccardi, E. Patton, P. Meier, and C. Castillo, “Democratizing Mobile App Development for Disaster Management,” in Joint Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments and Workshop on Semantic Cities, New York, NY, USA, 2013, pp. 39–42, doi: 10.1145/2516911.2516915 [Online]. Available: http://doi.org/10.1145/2516911.2516915
[179]
A. Jindal, J. Quiané-Ruiz, and S. Madden, “CARTILAGE: Adding Flexibility to the Hadoop Skeleton,” in Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2013, pp. 1057–1060, doi: 10.1145/2463676.2465258 [Online]. Available: http://doi.org/10.1145/2463676.2465258
[180]
G. Gartheeban and J. Guttag, “A Data-driven Method for In-game Decision Making in MLB: When to Pull a Starting Pitcher,” in Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 2013, pp. 973–979, doi: 10.1145/2487575.2487660 [Online]. Available: http://doi.org/10.1145/2487575.2487660
[181]
S. Amer-Yahia et al., “MAQSA: A System for Social Analytics on News,” in Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2012, pp. 653–656, doi: 10.1145/2213836.2213924 [Online]. Available: http://doi.org/10.1145/2213836.2213924
[182]
I. Laptev, H. Mayer, T. Lindeberg, W. Eckstein, C. Steger, and A. Baumgartner, “Automatic extraction of roads from aerial images based on scale space and snakes,” Machine Vision and Applications, vol. 12, no. 1, pp. 23–31, Jul. 2000, doi: 10.1007/s001380050121.