Poster Sessions

First NameLast NameInstitutionPoster SessionNumberPoster Title
HebaAlyUniversity of Maryland at College ParkWednesday1On the Value of Spatiotemporal Information: Principles and Scenarios
SamanehAzadiUniversity of California, BerkeleyWednesday2Discriminator Rejection Sampling
NaamaBen-DavidCarnegie Mellon UniversityWednesday3 
AmandaBienzUniversity of Illinois at Urbana-ChampaignWednesday4Reducing Communication Costs in the Parallel SpMV
Su LinBlodgettUniversity of Massachusetts at AmherstWednesday5Debunking Debiasing: A Critique of Bias Measurement in NLP
CearaByrneGeorgia Institute of TechnologyWednesday6WIDGETs: Wireless, Interactive Devices for Gauging and Evaluating Temperament for service and working dogs
ShuangChenCornell UniversityWednesday7Managing Interactive Cloud Services in Current and Future Server Platforms
ChenChenGoogle Inc.Wednesday8Connectivity in Complex Networks: Measures, Inference and Optimization
BeidiChenRice UniversityWednesday9LGD: Fast and Accurate Stochastic Gradient Estimation
PardisEmami NaeiniCarnegie Mellon UniversityWednesday10Privacy and Security Label for IoT Devices Based on Input from Experts and Consumers
XianFanRice UniversityWednesday11Using Machine Learning Algorithms to Solve Problems in Biology
SumeghaGargPrinceton UniversityWednesday12Understanding the limits of computational models and learning algorithms
SurbhiGoelUniversity of Texas at AustinWednesday13Time/Accuracy Tradeoffs for Learning a ReLU with Gaussian Marginals
HudaIbeidIntel CorporationWednesday14 
ReyhanehJabbarvandUniversity of California, IrvineWednesday15 
NatashaJaquesMassachusetts Institute of TechnologyWednesday16Way Off-Policy Batch Deep Reinforcement Learning of Implicit Human Preferences in Dialog
SouYungJinUniversity of Massachusetts at AmherstWednesday17Leveraging Continuity of Videos for Detection and Clustering
FariaKalimUniversity of Illinois at Urbana-ChampaignWednesday18 
MinaKonakovic LukovicMassachusetts Institute of TechnologyWednesday19Computational Design of Auxetic Shells
GuyueLiuCarnegie Mellon UniversityWednesday20Towards A High Performance, Customizable and Trusted Software-Defined Infrastructure
IsminiLourentzouUniversity of Illinois at Urbana ChampaignWednesday21Data Quality in the Deep Learning Era
DanaeMetaxaStanford UniversityWednesday22Search Media and Elections: 
Longitudinally Auditing Political Search Results
ErinMolloyUniversity of Illinois at Urbana-ChampaignWednesday23 
ShanaMoothedathUniversity of WashingtonWednesday24 
TriciaNgoonUniversity of California, San DiegoWednesday25Setting the Creative “Temperature”: Scaffolds for Amplifying Exploratory Thinking in Creative Learning
Pei-ChenPengCedars-Sinai Medical CenterWednesday26Partitioned heritability and functional enrichment reveal ovarian cancer risk variants in histotype-specific enhancers that disrupt transcription factor binding sites.
SarahSeboYale UniversityWednesday27 
JenniferSleemanUniversity of Maryland Baltimore CountyWednesday28RBM Image Generation Using the D-Wave 2000Q
ElaheSoltanaghaeiUniversity of VirginiaWednesday29Sensing the Physical World Using Pervasive Wireless Infrastructure
AkshithaSriramanUniversity of Michigan – Ann ArborWednesday30Enabling Hyperscale Web Services
LaureThompsonCornell UniversityWednesday31Authorless Topic Models: Biasing Models Away from Known Structure
GalizTuncayUniversity of Illinois at Urbana-ChampaignWednesday32 
JuniaValenteUniversity of Texas at DallasWednesday33Security Analysis of Consumer IoT Devices
GayaneVardoyanUniversity of Massachusetts at AmherstWednesday34On the Stochastic Analysis of a Quantum Entanglement Switch
NikhitaVedulaOhio State UniversityWednesday35Modeling Knowledge and Functional Intent for Context Aware Pragmatic Analysis
RadhaVenkatagiriUniversity of Illinois at Urbana ChampaignWednesday36Democratizing Error-Efficient Computing viaPrincipled Application-Level Error Analysis
XintongWangUniversity of Michigan – Ann ArborWednesday37Studies on the computational modeling and design of financial markets
QuingyunWuUniversity of VirginiaWednesday38Contextual Bandit in Non-Stationary Environments
YangYangCarnegie Mellon UniversityWednesday39Comparing 3D genome organization in multiple species using Phylo-HMRF
RuiZhangUniversity of North Carolina at Chapel HillWednesday40Transys: Leveraging Common Security Properties Across Hardware Designs
CeciliaZhangUniversity of California, BerkeleyWednesday41Cinematic rendering for casual image and video
YuhangZhaoCornell UniversityWednesday42Designing Mixed Reality Systems to Empower People with Visual Impairments
YixueZhaoUniversity of Southern CaliforniaWednesday43Leveraging Program Analysis to Reduce User-Perceived Latency in Mobile Applications
WentingZhengUniversity of California, BerkeleyWednesday44Sharing without Showing: Building Secure Collaborative Systems
Ayten OzgeAkmandorPrinceton UniversityThursday1SECRET: Semantically Enhanced Classification of Real-world Tasks
AndreaAlexandruUniversity of PennsylvaniaThursday2Privacy for Cyber-Physical Systems
ForoughArabshahiCarnegie Mellon UniversityThursday3Combining Symbolic Expressions and Black-Box Function Evaluations in Neural Programs
BaharAsgariGeorgia Institute of TechnologyThursday4ALRESCHA: A Lightweight Reconfigurable Sparse Computation Accelerator
TeganBrennanUniversity of California, Santa BarbaraThursday5Static and Dynamic Software Side Channels
ChitraleemaChakrabortyHarvard UniversityThursday6Strain dependent carrier properties in atomically thin semiconductors
MargaretChapmanUniversity of California, BerkeleyThursday7 
ChunfengCuiUniversity of California, Santa BarbaraThursday8Tensor Computations, Uncertainty Quantification, and Machine Learning
MariaDe-ArteagaCarnegie Mellon UniversityThursday9Bias in Bios: A Case Study of Semantic Representation Bias in a High-Stakes Setting
GhadaDessoukyTechnische Universität DarmstadtThursday10Hardware-Assisted Security Extensions and Secure Processor Design
MInDuUniversity of California, BerkeleyThursday11 
EsinDurmusCornell UniversityThursday12 
NajmeEbrahimiUniversity of Michigan – Ann ArborThursday13 
YasamanGhasempourRice UniversityThursday14Spatial Multiplexing in mmWave Wireless Networks
HanaHabibCarnegie Mellon UniversityThursday15“Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing
BaharHaghighatHarvard UniversityThursday16Programmable Matter for Robotic Applications
SaharHashemgeloogerdiUniversity of RochesterThursday17Acoustically Inspired Algorithms for Modeling and Audio Enhancementvia Orthonormal Basis Functions
HodaHeidariETH-ZurichThursday18 
SylviaHerbertUniversity of California, BerkeleyThursday19Safety Real-World Autonomy for Uncertain and Human-Centered Robotic Systems
PatriciaHidalgo-GonzalezUniversity of California, BerkeleyThursday20 
AlexandraIonETH-ZurichThursday21Metamaterial Devices
Yea-SeulKimUniversity of WashingtonThursday22Understanding Visualization Interpretation In Light of Beliefs
RamyaKorlakai VinayakUniversity of WashingtonThursday23Optimal Learning from Sparse Data
QiLeiUniversity of Texas at AustinThursday24Inverting Deep Generative Models, One Layer at a Time
AndreaLincolnMassachusetts Institute of TechnologyThursday25Applications of Fine-Grained Complexity
SifeiLiuNvidia Graphics Pvt LtdThursday26 
SepidehMahabadiToyota Technological Institute at ChicagoThursday27Composable Core-sets for Diversity Maximization
NooshinMohammadi EstakhriUniversity of Michigan – Ann ArborThursday28Controlling quantum interference using metamaterials
Soo-JinMoonCarnegie Mellon UniversityThursday29Black-Box Approach to Network Security
TaliaRingerUniversity of WashingtonThursday30Proof Engineering Tools for a New Era
LedaSariUniversity of Illinois at Urbana-ChampaignThursday31Training Speech-to-concept Models using Non-parallel Speech and Text
ShreyaSaxenaColumbia UniversityThursday32Dynamical Systems Principles Predict Motor Cortex Population Activity Across Movement Speeds
SaimaSiddiquiArgonne National LaboratoryThursday33Spintronics for ultra-low power computing: Physics to system level application
LitingSunUniversity of California, BerkeleyThursday34Intelligent and High-Performance Behavior Design in Autonomous Systems
SwabhaSwayamdiptaCarnegie Mellon UniversityThursday35Adversarial Filters of Dataset Biases
NazaninTakbiriUniversity of Massachusetts (System)Thursday36 
EmilyToomeyMassachusetts Institute of TechnologyThursday37 
Hsaio-YuTungCarnegie Mellon UniversityThursday38Embodies visual recognition
BigeUnluturkGeorgia Institute of TechnologyThursday39Molecular communication for Internet of Bio-NanoThings
XuWangCarnegie Mellon UniversityThursday40Sourcing Open-ended Solutions to Create Scalable Learning Opportunities
NeerajaYadwadkarStanford UniversityThursday41An Easy-to-use and Efficient Cloud
ZhiYaoUniversity of California, Los AngelesThursday42Engineering Wave-Material Interactions for Innovative Electronic Applications
ShuowenZhangNational University of SingaporeThursday43Cellular-Enabled UAV Communication: Connectivity-Constrained Trajectory Optimization