| First Name | Last Name | Institution | Poster Session | Number | Poster Title |
| Heba | Aly | University
of Maryland at College Park | Wednesday | 1 | On the Value of
Spatiotemporal Information: Principles and Scenarios |
| Samaneh | Azadi | University
of California, Berkeley | Wednesday | 2 | Discriminator
Rejection Sampling |
| Naama | Ben-David | Carnegie
Mellon University | Wednesday | 3 | |
| Amanda | Bienz | University
of Illinois at Urbana-Champaign | Wednesday | 4 | Reducing
Communication Costs in the Parallel SpMV |
| Su Lin | Blodgett | University
of Massachusetts at Amherst | Wednesday | 5 | Debunking Debiasing:
A Critique of Bias Measurement in NLP |
| Ceara | Byrne | Georgia
Institute of Technology | Wednesday | 6 | WIDGETs: Wireless,
Interactive Devices for Gauging and Evaluating Temperament for service and
working dogs |
| Shuang | Chen | Cornell
University | Wednesday | 7 | Managing Interactive
Cloud Services in Current and Future Server Platforms |
| Chen | Chen | Google
Inc. | Wednesday | 8 | Connectivity in
Complex Networks: Measures, Inference and Optimization |
| Beidi | Chen | Rice
University | Wednesday | 9 | LGD: Fast and
Accurate Stochastic Gradient Estimation |
| Pardis | Emami
Naeini | Carnegie
Mellon University | Wednesday | 10 | Privacy and Security
Label for IoT Devices Based on Input from Experts and Consumers |
| Xian | Fan | Rice
University | Wednesday | 11 | Using Machine
Learning Algorithms to Solve Problems in Biology |
| Sumegha | Garg | Princeton
University | Wednesday | 12 | Understanding the
limits of computational models and learning algorithms |
| Surbhi | Goel | University
of Texas at Austin | Wednesday | 13 | Time/Accuracy
Tradeoffs for Learning a ReLU with Gaussian Marginals |
| Huda | Ibeid | Intel
Corporation | Wednesday | 14 | |
| Reyhaneh | Jabbarvand | University
of California, Irvine | Wednesday | 15 | |
| Natasha | Jaques | Massachusetts
Institute of Technology | Wednesday | 16 | Way Off-Policy Batch
Deep Reinforcement Learning of Implicit Human Preferences in Dialog |
| SouYung | Jin | University
of Massachusetts at Amherst | Wednesday | 17 | Leveraging Continuity
of Videos for Detection and Clustering |
| Faria | Kalim | University
of Illinois at Urbana-Champaign | Wednesday | 18 | |
| Mina | Konakovic
Lukovic | Massachusetts
Institute of Technology | Wednesday | 19 | Computational Design
of Auxetic Shells |
| Guyue | Liu | Carnegie
Mellon University | Wednesday | 20 | Towards A High
Performance, Customizable and Trusted Software-Defined Infrastructure |
| Ismini | Lourentzou | University
of Illinois at Urbana Champaign | Wednesday | 21 | Data Quality in the
Deep Learning Era |
| Danae | Metaxa | Stanford
University | Wednesday | 22 | Search Media and
Elections: 
Longitudinally Auditing Political Search Results |
| Erin | Molloy | University
of Illinois at Urbana-Champaign | Wednesday | 23 | |
| Shana | Moothedath | University
of Washington | Wednesday | 24 | |
| Tricia | Ngoon | University
of California, San Diego | Wednesday | 25 | Setting the Creative
“Temperature”: Scaffolds for Amplifying Exploratory Thinking in
Creative Learning |
| Pei-Chen | Peng | Cedars-Sinai
Medical Center | Wednesday | 26 | Partitioned
heritability and functional enrichment reveal ovarian cancer risk variants in
histotype-specific enhancers that disrupt transcription factor binding sites. |
| Sarah | Sebo | Yale
University | Wednesday | 27 | |
| Jennifer | Sleeman | University
of Maryland Baltimore County | Wednesday | 28 | RBM Image Generation
Using the D-Wave 2000Q |
| Elahe | Soltanaghaei | University
of Virginia | Wednesday | 29 | Sensing the Physical
World Using Pervasive Wireless Infrastructure |
| Akshitha | Sriraman | University
of Michigan – Ann Arbor | Wednesday | 30 | Enabling Hyperscale
Web Services |
| Laure | Thompson | Cornell
University | Wednesday | 31 | Authorless Topic
Models: Biasing Models Away from Known Structure |
| Galiz | Tuncay | University
of Illinois at Urbana-Champaign | Wednesday | 32 | |
| Junia | Valente | University
of Texas at Dallas | Wednesday | 33 | Security Analysis of
Consumer IoT Devices |
| Gayane | Vardoyan | University
of Massachusetts at Amherst | Wednesday | 34 | On the Stochastic
Analysis of a Quantum Entanglement Switch |
| Nikhita | Vedula | Ohio
State University | Wednesday | 35 | Modeling Knowledge
and Functional Intent for Context Aware Pragmatic Analysis |
| Radha | Venkatagiri | University
of Illinois at Urbana Champaign | Wednesday | 36 | Democratizing
Error-Efficient Computing viaPrincipled Application-Level Error Analysis |
| Xintong | Wang | University
of Michigan – Ann Arbor | Wednesday | 37 | Studies on the
computational modeling and design of financial markets |
| Quingyun | Wu | University
of Virginia | Wednesday | 38 | Contextual Bandit in
Non-Stationary Environments |
| Yang | Yang | Carnegie
Mellon University | Wednesday | 39 | Comparing 3D genome
organization in multiple species using Phylo-HMRF |
| Rui | Zhang | University
of North Carolina at Chapel Hill | Wednesday | 40 | Transys: Leveraging
Common Security Properties Across Hardware Designs |
| Cecilia | Zhang | University
of California, Berkeley | Wednesday | 41 | Cinematic rendering
for casual image and video |
| Yuhang | Zhao | Cornell
University | Wednesday | 42 | Designing Mixed
Reality Systems to Empower People with Visual Impairments |
| Yixue | Zhao | University
of Southern California | Wednesday | 43 | Leveraging Program
Analysis to Reduce User-Perceived Latency in Mobile Applications |
| Wenting | Zheng | University
of California, Berkeley | Wednesday | 44 | Sharing without
Showing: Building Secure Collaborative Systems |
| Ayten Ozge | Akmandor | Princeton
University | Thursday | 1 | SECRET: Semantically
Enhanced Classification of Real-world Tasks |
| Andrea | Alexandru | University
of Pennsylvania | Thursday | 2 | Privacy for
Cyber-Physical Systems |
| Forough | Arabshahi | Carnegie
Mellon University | Thursday | 3 | Combining Symbolic
Expressions and Black-Box Function Evaluations in Neural Programs |
| Bahar | Asgari | Georgia
Institute of Technology | Thursday | 4 | ALRESCHA: A
Lightweight Reconfigurable Sparse Computation Accelerator |
| Tegan | Brennan | University
of California, Santa Barbara | Thursday | 5 | Static and Dynamic
Software Side Channels |
| Chitraleema | Chakraborty | Harvard
University | Thursday | 6 | Strain dependent
carrier properties in atomically thin semiconductors |
| Margaret | Chapman | University
of California, Berkeley | Thursday | 7 | |
| Chunfeng | Cui | University
of California, Santa Barbara | Thursday | 8 | Tensor Computations,
Uncertainty Quantification, and Machine Learning |
| Maria | De-Arteaga | Carnegie
Mellon University | Thursday | 9 | Bias in Bios: A Case
Study of Semantic Representation Bias in a High-Stakes Setting |
| Ghada | Dessouky | Technische
Universität Darmstadt | Thursday | 10 | Hardware-Assisted
Security Extensions and Secure Processor Design |
| MIn | Du | University
of California, Berkeley | Thursday | 11 | |
| Esin | Durmus | Cornell
University | Thursday | 12 | |
| Najme | Ebrahimi | University
of Michigan – Ann Arbor | Thursday | 13 | |
| Yasaman | Ghasempour | Rice
University | Thursday | 14 | Spatial Multiplexing
in mmWave Wireless Networks |
| Hana | Habib | Carnegie
Mellon University | Thursday | 15 | “Away From
Prying Eyes: Analyzing Usage and Understanding of Private Browsing |
| Bahar | Haghighat | Harvard
University | Thursday | 16 | Programmable Matter
for Robotic Applications |
| Sahar | Hashemgeloogerdi | University
of Rochester | Thursday | 17 | Acoustically Inspired
Algorithms for Modeling and Audio Enhancementvia Orthonormal Basis Functions |
| Hoda | Heidari | ETH-Zurich | Thursday | 18 | |
| Sylvia | Herbert | University
of California, Berkeley | Thursday | 19 | Safety Real-World
Autonomy for Uncertain and Human-Centered Robotic Systems |
| Patricia | Hidalgo-Gonzalez | University
of California, Berkeley | Thursday | 20 | |
| Alexandra | Ion | ETH-Zurich | Thursday | 21 | Metamaterial Devices |
| Yea-Seul | Kim | University
of Washington | Thursday | 22 | Understanding
Visualization Interpretation In Light of Beliefs |
| Ramya | Korlakai
Vinayak | University
of Washington | Thursday | 23 | Optimal Learning from
Sparse Data |
| Qi | Lei | University
of Texas at Austin | Thursday | 24 | Inverting Deep
Generative Models, One Layer at a Time |
| Andrea | Lincoln | Massachusetts
Institute of Technology | Thursday | 25 | Applications of
Fine-Grained Complexity |
| Sifei | Liu | Nvidia
Graphics Pvt Ltd | Thursday | 26 | |
| Sepideh | Mahabadi | Toyota
Technological Institute at Chicago | Thursday | 27 | Composable Core-sets
for Diversity Maximization |
| Nooshin | Mohammadi
Estakhri | University
of Michigan – Ann Arbor | Thursday | 28 | Controlling quantum
interference using metamaterials |
| Soo-Jin | Moon | Carnegie
Mellon University | Thursday | 29 | Black-Box Approach to
Network Security |
| Talia | Ringer | University
of Washington | Thursday | 30 | Proof Engineering
Tools for a New Era |
| Leda | Sari | University
of Illinois at Urbana-Champaign | Thursday | 31 | Training
Speech-to-concept Models using Non-parallel Speech and Text |
| Shreya | Saxena | Columbia
University | Thursday | 32 | Dynamical Systems
Principles Predict Motor Cortex Population Activity Across Movement Speeds |
| Saima | Siddiqui | Argonne
National Laboratory | Thursday | 33 | Spintronics for
ultra-low power computing: Physics to system level application |
| Liting | Sun | University
of California, Berkeley | Thursday | 34 | Intelligent and
High-Performance Behavior Design in Autonomous Systems |
| Swabha | Swayamdipta | Carnegie
Mellon University | Thursday | 35 | Adversarial Filters
of Dataset Biases |
| Nazanin | Takbiri | University
of Massachusetts (System) | Thursday | 36 | |
| Emily | Toomey | Massachusetts
Institute of Technology | Thursday | 37 | |
| Hsaio-Yu | Tung | Carnegie
Mellon University | Thursday | 38 | Embodies visual
recognition |
| Bige | Unluturk | Georgia
Institute of Technology | Thursday | 39 | Molecular
communication for Internet of Bio-NanoThings |
| Xu | Wang | Carnegie
Mellon University | Thursday | 40 | Sourcing Open-ended
Solutions to Create Scalable Learning Opportunities |
| Neeraja | Yadwadkar | Stanford
University | Thursday | 41 | An Easy-to-use and
Efficient Cloud |
| Zhi | Yao | University
of California, Los Angeles | Thursday | 42 | Engineering
Wave-Material Interactions for Innovative Electronic Applications |
| Shuowen | Zhang | National
University of Singapore | Thursday | 43 | Cellular-Enabled UAV
Communication: Connectivity-Constrained Trajectory Optimization |