A companion document to the UIST 2015 Call for Participation
Also see the Advice for a Successful UIST Submission
This guide describes the format, deadlines and other relevant information for submissions to UIST 2015. Authors submitting material to UIST 2015 are encouraged to use this guide to learn about the UIST review process and the submission requirements. For guidelines on how to improve the quality of your submission, see the Advice for a Successful UIST Submission.
UIST features papers, demos, and posters, as described in the Call for Participation. While the material in this guide is primarily oriented towards paper authors, its general emphasis on quality and stringent review is also applicable to authors of demo and poster submissions. Accepted papers will be presented during three days of technical sessions at the conference and published in the conference proceedings.
Paper submissions must not have been published previously in the English language. A paper is considered to have been previously published if it has appeared in a peer-reviewed journal or meeting proceedings that is reliably and permanently available afterward in print or electronic form to non-attendees. This includes papers that are reviewed only as abstracts, but are published as a complete paper.
The paper cannot be considered a novel manuscript if it reports an incremental update or a small improvement of the previously published work. Although the paper can be based on the earlier archival publications by the authors, significant new developments and findings have to be reported for the paper to be considered a novel manuscript. As a rule of thumb a paper has to include about 70% new material to be considered a novel contribution. We also encourage the authors to submit a complete work rather than dividing it into smaller pieces.
For UIST submission purposes, a paper is not considered to have been previously published if it was presented earlier in forms explicitly labeled as "non-archival", even if they are, in fact archived. This includes for example CHI extended abstracts (including alt.chi, works-in-progress, posters, demos, etc), SIGGRAPH Emerging Technology, and UIST posters and demos. Work that builds on previous non-archival work should typically contain at least 30% new material. However, authors must cite this previous work in their manuscript. If you are unsure about whether something is considered archival, please contact program2015@uist.org. Authors wishing to submit work containing substantial portions of work published elsewhere also need to check their copyright agreement with the original publisher to make sure that this is permissible according to that agreement.
English is considered the international language of ACM SIGCHI and its journals and conferences. Work that has previously been presented or published in a language other than English may be translated and presented or published in English in SIGCHI journals and conferences insofar as ACM SIGCHI is concerned. The original author should typically also be the author (or co-author) of work translated into English, and it should be made clear that this is a translation. We encourage authors whose work was originally published in languages other than English do this if they feel their work is of sufficient relevance and quality to be useful to a wider international audience. Of course, it is not acceptable to translate the original work of another author and present it as one's own. Authors wishing to publish in English a work originally published elsewhere also need to check their original copyright agreement with the original publisher to make sure that this is permissible according to that agreement.
UIST sees significant value in sharing early work through posters, demos, and informal venues like technical reports. Indeed, UIST strongly encourages the submission of exciting, early research as a UIST poster or demo. Sharing preliminary research through these short, lightly reviewed work-in-progress or extended-abstract venues does not inhibit subsequent publication at UIST - provided that the UIST submission makes a contribution beyond (i.e., provides more or newer information than) the previous, shorter document. Such documents, which typically appear in the adjunct proceedings, are not considered prior publications, and thus do not preclude submission of a paper on the same topic by the same authors. Prior work should of course be referenced appropriately.
A paper identical or substantially similar (or even a subset or superset) in content to one submitted to UIST must not be simultaneously under consideration at another conference or journal during the entire duration of the UIST review process (i.e., from the submission deadline until the notification of decisions are emailed to authors). This restriction applies even if the overlap in review timelines between UIST and another venue is just a few days or a few hours, and even if it is your intention to withdraw the submission from the other venues as soon as it is accepted by one of them. This restriction also applies even if the other venue allows simultaneous submission. UIST reviewers are often familiar with the papers under review at other related conferences and journals; as such, submissions that are substantially similar run the risk of being rejected by UIST and the other venues on grounds of duplication alone.
You are encouraged to submit a revised and extended version of your UIST paper to a journal such as ACM Transactions on Computer-Human Interaction or Human-Computer Interaction after it has been presented at the conference.
Paper submissions are anonymous. You are required to make a reasonable effort to purge identifying information from your submission:
Primarily -- as with CHI -- it means that submissions must remove all author and institutional information from the title and header area of the first page of the paper. Author information should also be removed from submitted supplementary materials, in particular, videos. Submissions that do not do so may be rejected without review.
Furthermore, all references must remain intact. If you previously published a paper and your current submission builds on that work, the complete reference with author's name must appear in the references. Blank references (e.g., "12. REMOVED FOR REVIEWING") should be avoided and authors must refer to their previous work in the third person (e.g. "We build on prior work by Smith et al. [X] but generalize their algorithm to new settings."). Further suppression of identity in the body of the paper, while encouraged, is left to the authors' discretion.
While the details of anonymization in the body of the paper are ultimately left to the authors' discretion, we understand that some work is difficult (or impossible) to anonymize without degrading the quality of the writing. In these cases, we encourage the authors to ensure that details relevant for review of this paper are included.
While publicizing and promoting work during the review process goes against the spirit of anonymous review, we understand that there are competing interests that make publicity important. The UIST community has agreed that such publicity should not be explicitly prohibited or penalized. However, we encourage authors to wait until the review process is over to publicize their work.
UIST has a long tradition of excellent, thoughtful reviewing. This policy seeks to balance two goals. The first goal is to emphasize for all parties involved that reviews assess the content of a submission, not its authors. This is why names must be omitted from the masthead and reasonable efforts to maintain anonymity in the body of the paper should be taken. The second goal is to encourage papers that clearly explain the research. Sometimes doing so requires (at least implicitly) disclosing information about the authors or an institution. If you have comments or questions about this policy, please email program2015@uist.org. These rules apply to papers only. Submissions to the Posters, Demos, and Doctoral Symposium tracks should follow the anonymization guidelines in the respective calls for those tracks.
The UIST review process is confidential and confidentiality of submissions is maintained from their submission to their publication date (typically the date of the first day of the conference).
The Program Committee and a set of external reviewers, both consisting of recognized experts, will review submitted papers. Then, at their meeting (June 25-26, 2015), the committee will select those papers to be presented at UIST 2015. For 2015 the Committee will be using the following process:
Email notifications of the Program Committee's decisions should be sent no later than June 27, 2015. Full reviews, which may have changed due to the rebuttal, online discussion, and discussion at the committee meeting, will be sent by June 30, 2015. The notifications will place each paper in one of the following two categories:
Conditionally accepted papers undergo a second review process in which a referee (an associate chair of the Program Committee) verifies that the final version of the paper is acceptable (that any required changes have been made, and that other changes made by the authors, perhaps in response to reviewer comments, have not compromised the paper in any way). The length of the camera-ready copy (rounded up to the nearest page) must be less than or equal to the length of the original submission unless there is a strong justification to increase the length of the manuscript, which should be agreed upon by the primary reviewer. This second and final stage determines the final acceptance status of all papers. The referees' decisions are final. Papers that do not satisfy the referees in the second stage of review and/or that are not uploaded in final form by the final deadline of July 24, 2015, together with the original or revised versions of the submitted supplementary material, will be rejected. Accepted papers will appear in the conference proceedings.
There are many types of valid contributions to UIST, including new algorithms, techniques, hardware, theoretical models, systems and applications. We will do our very best to ensure reviewers understand that there are many ways for a paper to make a significant contribution to UIST, and that papers should be reviewed according the nature of their contributions. In particular, our community has identified systems and applications papers as particularly challenging to write and evaluate. For authors and reviewers of such papers, we recommend consulting articles written on how to evaluate systems research and how to write systems papers:
Levin, Roy, and David D. Redell. How (and How Not) to Write a Good Systems Paper. ACM SIGOPS Operating Systems Review 17.3 (1983): 35-40.
Olsen, D. R. 2007. Evaluating Interface Systems Research. In Proceedings of the 20th Annual ACM Symposium on User interface Software and Technology. UIST '07. ACM, 251-258.
Another recent topic of discussion within our community has been the role of evaluations within HCI research. While user testing is not strictly required for UIST papers, authors should be careful not to make unsubstantiated claims for new techniques or systems which have not been tested. In general, authors and reviewers should consider what the appropriate method of validation is for the specific problem or research questions which their paper is addressing. For more advice on this topic, we recommend the following article:
Greenberg, S. and Buxton, B. 2008. Usability evaluation considered harmful (some of the time). In Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems. CHI '08. ACM, 111-120.
See also the video guide Since user interfaces are inherently interactive, authors are encouraged to include a video figure with their papers, which will be kept confidential during the review process. As with the rest of the paper, video figures should be anonymized. Authors should make video figures short and accessible without being misleading. A video should give the same impression as a live demo. For example, a long computational pause can only be removed if its absence is made obvious through techniques such as a visual dissolve and a clear indication (verbal and/or visual) of how much time was removed. Videos about technology mock-ups should be clearly indicated as such. Mock-ups should be avoided when the video is about an implemented system. The video figure accompanying a submission for review is used only to help reviewers evaluate the submissions. Acceptable videos can be made without expensive production or special effects. A camcorder, tripod, and some planning can help guide the viewer's attention. A smooth zoom into the interaction area and then out to the full screen is often much more effective than a static screenshot. Show how the user manipulates the input devices if that is relevant. Supporting video need not be stand-alone, because the reviewers will have the paper. While the paper should be understandable without the video, the paper may include references to the video. In particular, authors may use video sequences showing actual use of the proposed system to give readers and reviewers an impression of how the interaction unfolds like and/or how users responded to using the presented system. As video figures will be included with the paper in the ACM digital library, authors may assume that everyone who has the video has the paper, and vice versa. The burden is on the authors to ensure that videos figures are rendered in file formats and codecs that are accessible on all common platforms. Please see the video guide for more details.
All paper submissions must be made in the 2014 version of the SIGCHI papers format. Submitted papers may also include page numbers so the reviewers can more easily refer to portions. Detailed format instructions are available at the SIGCHI conference publication format site. Submissions must be in PDF format, and video submissions must be in one of the approved file formats. Submission details can be found at the UIST Electronic Submission site (http://www.precisionconference.com/~sigchi).
Authors have the option to choose the level of rights management they prefer. ACM offers three different options for authors to manage the publication rights to their work. Please consult the ACM Authors Site (http://authors.acm.org/). The SIGCHI Submitter Agreement also requires that authors hold copyright to the content of their submission, and will obtain appropriate permissions for any portions of the content that are copyrighted by others.
This document was last updated in January 2015 by Tovi Grossman and Bjoern Hartmann, who inherited it from Mira Dontcheva and Daniel Wigdor, who inherited it from Ivan Poupyrev and Takeo Igarashi, who inherited it from Hrvoje Benko and Celine Latulipe, who inherited it from Maneesh Agrawala and Scott Klemmer (who used material provided by Saul Greenberg), who inherited it from François Guimbretière, who inherited it from Michel Beaudouin-Lafon, who inherited it from Ravin Balakrishnan and Chia Shen, who inherited it from Ken Hinckley and Pierre Wellner, who inherited it from Dan Olsen, who inherited it from Steve Feiner, who inherited it from Joe Konstan, who inherited it from Michel Beaudouin-Lafon, who inherited it from Ari Rapkin, who inherited it from Beth Mynatt, who inherited it from George Robertson, who inherited it from Marc H. Brown, who inherited it from George Robertson, who got lots of help on it from Steve Feiner, Brad Myers, Jock Mackinlay, Mark Green, Randy Pausch, Pierre Wellner, and Beth Mynatt.