First Name | Last Name | Institution | Poster Session | Number | Poster Title |
Heba | Aly | University
of Maryland at College Park | Wednesday | 1 | On the Value of
Spatiotemporal Information: Principles and Scenarios |
Samaneh | Azadi | University
of California, Berkeley | Wednesday | 2 | Discriminator
Rejection Sampling |
Naama | Ben-David | Carnegie
Mellon University | Wednesday | 3 | |
Amanda | Bienz | University
of Illinois at Urbana-Champaign | Wednesday | 4 | Reducing
Communication Costs in the Parallel SpMV |
Su Lin | Blodgett | University
of Massachusetts at Amherst | Wednesday | 5 | Debunking Debiasing:
A Critique of Bias Measurement in NLP |
Ceara | Byrne | Georgia
Institute of Technology | Wednesday | 6 | WIDGETs: Wireless,
Interactive Devices for Gauging and Evaluating Temperament for service and
working dogs |
Shuang | Chen | Cornell
University | Wednesday | 7 | Managing Interactive
Cloud Services in Current and Future Server Platforms |
Chen | Chen | Google
Inc. | Wednesday | 8 | Connectivity in
Complex Networks: Measures, Inference and Optimization |
Beidi | Chen | Rice
University | Wednesday | 9 | LGD: Fast and
Accurate Stochastic Gradient Estimation |
Pardis | Emami
Naeini | Carnegie
Mellon University | Wednesday | 10 | Privacy and Security
Label for IoT Devices Based on Input from Experts and Consumers |
Xian | Fan | Rice
University | Wednesday | 11 | Using Machine
Learning Algorithms to Solve Problems in Biology |
Sumegha | Garg | Princeton
University | Wednesday | 12 | Understanding the
limits of computational models and learning algorithms |
Surbhi | Goel | University
of Texas at Austin | Wednesday | 13 | Time/Accuracy
Tradeoffs for Learning a ReLU with Gaussian Marginals |
Huda | Ibeid | Intel
Corporation | Wednesday | 14 | |
Reyhaneh | Jabbarvand | University
of California, Irvine | Wednesday | 15 | |
Natasha | Jaques | Massachusetts
Institute of Technology | Wednesday | 16 | Way Off-Policy Batch
Deep Reinforcement Learning of Implicit Human Preferences in Dialog |
SouYung | Jin | University
of Massachusetts at Amherst | Wednesday | 17 | Leveraging Continuity
of Videos for Detection and Clustering |
Faria | Kalim | University
of Illinois at Urbana-Champaign | Wednesday | 18 | |
Mina | Konakovic
Lukovic | Massachusetts
Institute of Technology | Wednesday | 19 | Computational Design
of Auxetic Shells |
Guyue | Liu | Carnegie
Mellon University | Wednesday | 20 | Towards A High
Performance, Customizable and Trusted Software-Defined Infrastructure |
Ismini | Lourentzou | University
of Illinois at Urbana Champaign | Wednesday | 21 | Data Quality in the
Deep Learning Era |
Danae | Metaxa | Stanford
University | Wednesday | 22 | Search Media and
Elections: 
Longitudinally Auditing Political Search Results |
Erin | Molloy | University
of Illinois at Urbana-Champaign | Wednesday | 23 | |
Shana | Moothedath | University
of Washington | Wednesday | 24 | |
Tricia | Ngoon | University
of California, San Diego | Wednesday | 25 | Setting the Creative
“Temperature”: Scaffolds for Amplifying Exploratory Thinking in
Creative Learning |
Pei-Chen | Peng | Cedars-Sinai
Medical Center | Wednesday | 26 | Partitioned
heritability and functional enrichment reveal ovarian cancer risk variants in
histotype-specific enhancers that disrupt transcription factor binding sites. |
Sarah | Sebo | Yale
University | Wednesday | 27 | |
Jennifer | Sleeman | University
of Maryland Baltimore County | Wednesday | 28 | RBM Image Generation
Using the D-Wave 2000Q |
Elahe | Soltanaghaei | University
of Virginia | Wednesday | 29 | Sensing the Physical
World Using Pervasive Wireless Infrastructure |
Akshitha | Sriraman | University
of Michigan – Ann Arbor | Wednesday | 30 | Enabling Hyperscale
Web Services |
Laure | Thompson | Cornell
University | Wednesday | 31 | Authorless Topic
Models: Biasing Models Away from Known Structure |
Galiz | Tuncay | University
of Illinois at Urbana-Champaign | Wednesday | 32 | |
Junia | Valente | University
of Texas at Dallas | Wednesday | 33 | Security Analysis of
Consumer IoT Devices |
Gayane | Vardoyan | University
of Massachusetts at Amherst | Wednesday | 34 | On the Stochastic
Analysis of a Quantum Entanglement Switch |
Nikhita | Vedula | Ohio
State University | Wednesday | 35 | Modeling Knowledge
and Functional Intent for Context Aware Pragmatic Analysis |
Radha | Venkatagiri | University
of Illinois at Urbana Champaign | Wednesday | 36 | Democratizing
Error-Efficient Computing viaPrincipled Application-Level Error Analysis |
Xintong | Wang | University
of Michigan – Ann Arbor | Wednesday | 37 | Studies on the
computational modeling and design of financial markets |
Quingyun | Wu | University
of Virginia | Wednesday | 38 | Contextual Bandit in
Non-Stationary Environments |
Yang | Yang | Carnegie
Mellon University | Wednesday | 39 | Comparing 3D genome
organization in multiple species using Phylo-HMRF |
Rui | Zhang | University
of North Carolina at Chapel Hill | Wednesday | 40 | Transys: Leveraging
Common Security Properties Across Hardware Designs |
Cecilia | Zhang | University
of California, Berkeley | Wednesday | 41 | Cinematic rendering
for casual image and video |
Yuhang | Zhao | Cornell
University | Wednesday | 42 | Designing Mixed
Reality Systems to Empower People with Visual Impairments |
Yixue | Zhao | University
of Southern California | Wednesday | 43 | Leveraging Program
Analysis to Reduce User-Perceived Latency in Mobile Applications |
Wenting | Zheng | University
of California, Berkeley | Wednesday | 44 | Sharing without
Showing: Building Secure Collaborative Systems |
Ayten Ozge | Akmandor | Princeton
University | Thursday | 1 | SECRET: Semantically
Enhanced Classification of Real-world Tasks |
Andrea | Alexandru | University
of Pennsylvania | Thursday | 2 | Privacy for
Cyber-Physical Systems |
Forough | Arabshahi | Carnegie
Mellon University | Thursday | 3 | Combining Symbolic
Expressions and Black-Box Function Evaluations in Neural Programs |
Bahar | Asgari | Georgia
Institute of Technology | Thursday | 4 | ALRESCHA: A
Lightweight Reconfigurable Sparse Computation Accelerator |
Tegan | Brennan | University
of California, Santa Barbara | Thursday | 5 | Static and Dynamic
Software Side Channels |
Chitraleema | Chakraborty | Harvard
University | Thursday | 6 | Strain dependent
carrier properties in atomically thin semiconductors |
Margaret | Chapman | University
of California, Berkeley | Thursday | 7 | |
Chunfeng | Cui | University
of California, Santa Barbara | Thursday | 8 | Tensor Computations,
Uncertainty Quantification, and Machine Learning |
Maria | De-Arteaga | Carnegie
Mellon University | Thursday | 9 | Bias in Bios: A Case
Study of Semantic Representation Bias in a High-Stakes Setting |
Ghada | Dessouky | Technische
Universität Darmstadt | Thursday | 10 | Hardware-Assisted
Security Extensions and Secure Processor Design |
MIn | Du | University
of California, Berkeley | Thursday | 11 | |
Esin | Durmus | Cornell
University | Thursday | 12 | |
Najme | Ebrahimi | University
of Michigan – Ann Arbor | Thursday | 13 | |
Yasaman | Ghasempour | Rice
University | Thursday | 14 | Spatial Multiplexing
in mmWave Wireless Networks |
Hana | Habib | Carnegie
Mellon University | Thursday | 15 | “Away From
Prying Eyes: Analyzing Usage and Understanding of Private Browsing |
Bahar | Haghighat | Harvard
University | Thursday | 16 | Programmable Matter
for Robotic Applications |
Sahar | Hashemgeloogerdi | University
of Rochester | Thursday | 17 | Acoustically Inspired
Algorithms for Modeling and Audio Enhancementvia Orthonormal Basis Functions |
Hoda | Heidari | ETH-Zurich | Thursday | 18 | |
Sylvia | Herbert | University
of California, Berkeley | Thursday | 19 | Safety Real-World
Autonomy for Uncertain and Human-Centered Robotic Systems |
Patricia | Hidalgo-Gonzalez | University
of California, Berkeley | Thursday | 20 | |
Alexandra | Ion | ETH-Zurich | Thursday | 21 | Metamaterial Devices |
Yea-Seul | Kim | University
of Washington | Thursday | 22 | Understanding
Visualization Interpretation In Light of Beliefs |
Ramya | Korlakai
Vinayak | University
of Washington | Thursday | 23 | Optimal Learning from
Sparse Data |
Qi | Lei | University
of Texas at Austin | Thursday | 24 | Inverting Deep
Generative Models, One Layer at a Time |
Andrea | Lincoln | Massachusetts
Institute of Technology | Thursday | 25 | Applications of
Fine-Grained Complexity |
Sifei | Liu | Nvidia
Graphics Pvt Ltd | Thursday | 26 | |
Sepideh | Mahabadi | Toyota
Technological Institute at Chicago | Thursday | 27 | Composable Core-sets
for Diversity Maximization |
Nooshin | Mohammadi
Estakhri | University
of Michigan – Ann Arbor | Thursday | 28 | Controlling quantum
interference using metamaterials |
Soo-Jin | Moon | Carnegie
Mellon University | Thursday | 29 | Black-Box Approach to
Network Security |
Talia | Ringer | University
of Washington | Thursday | 30 | Proof Engineering
Tools for a New Era |
Leda | Sari | University
of Illinois at Urbana-Champaign | Thursday | 31 | Training
Speech-to-concept Models using Non-parallel Speech and Text |
Shreya | Saxena | Columbia
University | Thursday | 32 | Dynamical Systems
Principles Predict Motor Cortex Population Activity Across Movement Speeds |
Saima | Siddiqui | Argonne
National Laboratory | Thursday | 33 | Spintronics for
ultra-low power computing: Physics to system level application |
Liting | Sun | University
of California, Berkeley | Thursday | 34 | Intelligent and
High-Performance Behavior Design in Autonomous Systems |
Swabha | Swayamdipta | Carnegie
Mellon University | Thursday | 35 | Adversarial Filters
of Dataset Biases |
Nazanin | Takbiri | University
of Massachusetts (System) | Thursday | 36 | |
Emily | Toomey | Massachusetts
Institute of Technology | Thursday | 37 | |
Hsaio-Yu | Tung | Carnegie
Mellon University | Thursday | 38 | Embodies visual
recognition |
Bige | Unluturk | Georgia
Institute of Technology | Thursday | 39 | Molecular
communication for Internet of Bio-NanoThings |
Xu | Wang | Carnegie
Mellon University | Thursday | 40 | Sourcing Open-ended
Solutions to Create Scalable Learning Opportunities |
Neeraja | Yadwadkar | Stanford
University | Thursday | 41 | An Easy-to-use and
Efficient Cloud |
Zhi | Yao | University
of California, Los Angeles | Thursday | 42 | Engineering
Wave-Material Interactions for Innovative Electronic Applications |
Shuowen | Zhang | National
University of Singapore | Thursday | 43 | Cellular-Enabled UAV
Communication: Connectivity-Constrained Trajectory Optimization |