August 7, 2014

Perceiving, Learning, and Exploiting Object Affordances for Autonomous Pile Manipulation

Autonomous Robots

Autonomous manipulation in unstructured environments will enable a large variety of exciting and important applications. Despite its promise, autonomous manipulation remains largely unsolved. Even the…

Anthony Stentz, Arun Venkatraman, Dubi Katz, J. Andrew Bagnell, Moslem Kazemi
June 24, 2014

Collaborative Hashing

Conference on Computer Vision and Pattern Recognition (CVPR)

Hashing technique has become a promising approach for fast similarity search. Most of existing hashing research pursue the binary codes for the same type of entities by preserving their similarities….

Xianglong Liu, Junfeng He, Cheng Deng, Bo Lang
June 24, 2014

DeepFace: Closing the Gap to Human-Level Performance in Face Verification

Conference on Computer Vision and Pattern Recognition (CVPR)

In modern face recognition, the conventional pipeline consists of four stages: detect => align => represent => classify. We revisit both the alignment step and the representation step by employing exp…

Yaniv Taigman, Ming Yang, Marc'Aurelio Ranzato, Lior Wolf
June 24, 2014

Fast Database Restarts at Facebook

ACM Special Interest Group on Management of Data (SIGMOD)

Facebook engineers query multiple databases to monitor and analyze Facebook products and services. The fastest of these databases is Scuba, which achieves subsecond query response time by storing all…

Aakash Goel, Bhuwan Chopra, Ciprian Gerea, Dhrúv Mátáni, Josh Metzler, Fahim Ul Haq, Janet Wiener
June 24, 2014

PANDA: Pose Aligned Networks for Deep Attribute Modeling

Conference on Computer Vision and Pattern Recognition (CVPR)

We propose a method for inferring human attributes (such as gender, hair style, clothes style, expression, action) from images of people under large variation of viewpoint, pose, appearance, articulat…

Ning Zhang, Manohar Paluri, Marc'Aurelio Ranzato, Trevor Darrell, Lubomir Bourdev
June 23, 2014

Adaptive HTER Estimation for Document-Specific MT Post-Editing

Annual Conference of Association of Computational Linguistics (ACL)

We present an adaptive translation quality estimation (QE) method to predict the human targeted translation error rate (HTER) for a document-specific machine translation model. We first introduce fea…

Fei Huang, Jianming Xu, Abraham Ittycheriah, Salim Roukos
June 20, 2014

vCacheShare: Automated Server Flash Cache Space Management in a Virtualization Environment

USENIX Annual Technical Conference (ATC)

Server Flash Cache (SFC) is being increasingly adopted in virtualization environments for IO acceleration. Deciding the optimal SFC allocation among VMs or VM disks is a major pain-point, dominantly handled manually by administrators.

Fei Meng, Li Zhou, Xiaosong Ma, Sandeep Uttamchandani, Deng Liu
June 12, 2014

There is no Fork: an Abstraction for Efficient, Concurrent, and Concise Data Access

ACM SIGPLAN International Conference on Functional Programming (ICFP)

We describe a new programming idiom for concurrency, based on Applicative Functors, where concurrency is implicit in the Applicative <*> operator. The result is that concurrent programs can be written in a natural applicative style, and they retain a high degree of clarity and modularity while executing with maximal concurrency.

Simon Marlow, Louis Brandy, Jon Coens, Jon Purdy
June 2, 2014

Topic-based Clusters in Egocentric Networks on Facebook

AAAI Conference on Weblogs and Social Media (ICWSM)

Homophily suggests that people tend to befriend others with shared traits, such as similar topical interests or overlapping social circles. We study how people communicate online in term of conversati…

Lilian Weng, Thomas Lento
June 2, 2014

Rumor Cascades

AAAI Conference on Weblogs and Social Media (ICWSM)

Online social networks provide a rich substrate for rumor propagation. Information received via friends tends to be trusted, and online social networks allow individuals to transmit information to man…

Adrien Friggeri, Lada Adamic, Dean Eckles, Justin Cheng
May 18, 2014

Analyzing Forged SSL Certificates in the Wild

IEEE Symposium on Security and Privacy (IEEE S&P)

The SSL man-in-the-middle attack uses forged SSL certificates to intercept encrypted connections between clients and servers. However, due to a lack of reliable indicators, it is still unclear how commonplace these attacks occur in the wild. In this work, we have designed and implemented a method to detect the occurrence of SSL man-in-the-middle attack on a top global website, Facebook.

David Huang, Alex Rice, Erling Ellingsen, Collin Jackson
May 8, 2014

Joint Inference of Multiple Label Types in Large Networks

International Conference on Machine Learning (ICML)

We tackle the problem of inferring node labels in a partially labeled graph where each node in the graph has multiple label types and each label type has a large number of possible labels. Our primary…

Deepayan Chakrabarti, Stano Funiak, Jonathan Chang, Sofus Attila Macskássy
April 26, 2014

Incentives to Participate in Online Research: An Experimental Examination of “Surprise” Incentives

ACM Conference on Human Factors in Computing Systems (CHI)

In this work, we present four experiments examining how two different kinds of ‘surprise’ financial incentives affect the rate of participation in a longitudinal study when participants are initially solicited with either an appeal to intrinsic motivation to participate in research or one that also offers extrinsic financial incentives.

Andrew Tresolini Fiore, Coye Cheshire, Lindsay Shaw Taylor, G.A. Mendelsohn
April 26, 2014

Visually Impaired Users on an Online Social Network

ACM Conference on Human Factors in Computing Systems (CHI)

In this paper we present the first large-scale empirical study of how visually impaired people use online social networks, specifically Facebook. We identify a sample of 50K visually impaired users, a…

Shaomei Wu, Lada Adamic
April 26, 2014

Growing Closer on Facebook: Changes in Tie Strength Through Site Use

ACM Conference on Human Factors in Computing (CHI)

Scientists debate whether people grow closer to their friends through social networking sites like Facebook, whether those sites displace more meaningful interaction, or whether they simply reflect existing ties.

Moira Burke, Robert Kraut
April 11, 2014

Designing and Deploying Online Field Experiments

International World Wide Web Conference (WWW)

Online experiments are widely used to compare specific design alternatives, but they can also be used to produce generalizable knowledge and inform strategic decision making. Doing so often requires sophisticated experimental designs, iterative refinement, and careful logging and analysis.

Eytan Bakshy, Dean Eckles, Michael Bernstein
April 7, 2014

Deduplicating a Places Database

International World Wide Web Conference (WWW)

We consider the problem of resolving duplicates in a database of places, where a place is defined as any entity that has a name and a physical location. When other auxiliary attributes like phone and full address are not available, deduplication based solely on names and approximate location becomes an extremely challenging problem that requires both domain knowledge as well an local geographical knowledge.

Philip Bohannon, Nilesh Dalvi, Marian Olteanu, Manish Raghavan
April 7, 2014

Personalized Collaborative Clustering

International World Wide Web Conference (WWW)

We study the problem of learning personalized user models from rich user interactions. In particular, we focus on learning from clustering feedback (i.e., grouping recommended items into clusters), wh…

Yisong Yue, Chong Wang, Khalid El-Arini, Carlos Guestrin
April 7, 2014

Can cascades be predicted?

International World Wide Web Conference (WWW)

On many social networking web sites such as Facebook and Twitter, resharing or reposting functionality allows users to share others’ content with their own friends or followers. As content is reshared…

Justin Cheng, Lada Adamic, Alex Dow, Jon Kleinberg, Jure Leskovec
April 2, 2014

Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks

USENIX Symposium on Networked Systems Design and Implementation (NSDI)

Data center networks often have errors in the forwarding tables, causing packets to loop indefinitely, fall into black-holes or simply get dropped before they reach the correct destination. Finding fo…

James Hongyi Zeng, Shidong Zhang, Fei Ye, Vimal Kumar, Mickey Ju, Junda Liu, Nick McKeown, Amin Vahdat