BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
bound
Google bound

Tag #bound

1558 papers:

POPLPOPL-2020-HarkKGK #induction #probability #verification
Aiming low is harder: induction for lower bounds in probabilistic program verification (MH, BLK, JG, JPK), p. 28.
ASPLOSASPLOS-2020-AngstadtJW #automaton #kernel #learning #legacy #string
Accelerating Legacy String Kernels via Bounded Automata Learning (KA, JBJ, WW), pp. 235–249.
CGOCGO-2020-OjogboTV #automation
Secure automatic bounds checking: prevention is simpler than cure (EJO, MT, TNV), pp. 43–55.
CSLCSL-2020-Tzameret #proving
From Classical Proof Theory to P versus NP: a Guide to Bounded Theories (Invited Talk) (IT), p. 2.
CIAACIAA-2019-Okhotin #automaton
Graph-Walking Automata: From Whence They Come, and Whither They are Bound (AO), pp. 10–29.
DLTDLT-2019-AzfarCCJ #linear #matrix #set
A Linear Bound on the K-Rendezvous Time for Primitive Sets of NZ Matrices (UA, CC, LC, RMJ), pp. 59–73.
DLTDLT-2019-BhaveKPT #context-sensitive grammar #on the
On Timed Scope-Bounded Context-Sensitive Languages (DB, SNK, RP, AT0), pp. 168–181.
DLTDLT-2019-Frid
First Lower Bounds for Palindromic Length (AEF), pp. 234–243.
DLTDLT-2019-Gao #complexity #education #pattern matching
The Teaching Complexity of Erasing Pattern Languages with Bounded Variable Frequency (ZG), pp. 154–167.
FSCDFSCD-2019-Ikebuchi
A Lower Bound of the Number of Rewrite Rules Obtained by Homological Methods (MI), p. 17.
SEFMSEFM-2019-RouxT #verification
Partially Bounded Context-Aware Verification (LLR, CT), pp. 532–548.
DiGRADiGRA-2019-Fleet #trust
Boundaries, Trust and Reputation in Virtual and Illicit Markets (RF).
DiGRADiGRA-2019-Ford #game studies
Beyond the Wall: The Boundaries of the Neomedieval Town in Singleplayer Roleplaying Games (DF).
CIKMCIKM-2019-FujiwaraIKKAU #algorithm #incremental #performance #random
Fast Random Forest Algorithm via Incremental Upper Bound (YF, YI, SK, AK, JA, NU), pp. 2205–2208.
CIKMCIKM-2019-WangCCCHHLC #interactive #mining #mobile #named #process #visualisation
TraVis: An Interactive Visualization System for Mining Inbound Traveler Activities by Leveraging Mobile Ad Request Data (PXW, HC, WQC, CCC, YHH, THH, YL, CHC), pp. 2881–2884.
ICMLICML-2019-AminKMV #difference #privacy #trade-off
Bounding User Contributions: A Bias-Variance Trade-off in Differential Privacy (KA, AK, AMM, SV), pp. 263–271.
ICMLICML-2019-Chen #analysis #consistency #fault #kernel #nearest neighbour
Nearest Neighbor and Kernel Survival Analysis: Nonasymptotic Error Bounds and Strong Consistency Rates (GHC), pp. 1001–1010.
ICMLICML-2019-LiuTC #on the
On Certifying Non-Uniform Bounds against Adversarial Attacks (CL, RT, VC), pp. 4072–4081.
ICMLICML-2019-PolianskiiP #approach #classification #geometry #integration #monte carlo
Voronoi Boundary Classification: A High-Dimensional Geometric Approach via Weighted Monte Carlo Integration (VP, FTP), pp. 5162–5170.
ICMLICML-2019-PooleOOAT #on the
On Variational Bounds of Mutual Information (BP, SO, AvdO, AA, GT), pp. 5171–5180.
ICMLICML-2019-RamamurthyVM #data analysis
Topological Data Analysis of Decision Boundaries with Application to Model Selection (KNR, KRV, KM), pp. 5351–5360.
ICMLICML-2019-X #named #policy #predict #using
POLITEX: Regret Bounds for Policy Iteration using Expert Prediction, pp. 3692–3702.
ICMLICML-2019-ZanetteB #learning #problem #using
Tighter Problem-Dependent Regret Bounds in Reinforcement Learning without Domain Knowledge using Value Function Bounds (AZ, EB), pp. 7304–7312.
ICMLICML-2019-ZhouG #optimisation
Lower Bounds for Smooth Nonconvex Finite-Sum Optimization (DZ, QG), pp. 7574–7583.
OnwardOnward-2019-StoelSV #named #relational
AlleAlle: bounded relational model finding with unbounded data (JS, TvdS, JJV), pp. 46–61.
OOPSLAOOPSLA-2019-GencRXB #concurrent #detection #predict
Dependence-aware, unbounded sound predictive race detection (KG, JR, YX, MDB), p. 30.
POPLPOPL-2019-BaeL #logic #model checking #using
Bounded model checking of signal temporal logic properties using syntactic separation (KB, JL), p. 30.
POPLPOPL-2019-BlanchetteGPT
Bindings as bounded natural functors (JCB, LG, AP0, DT), p. 34.
POPLPOPL-2019-DudenhefnerR #approximate
Principality and approximation under dimensional bound (AD, JR), p. 29.
CASECASE-2019-JiangL #game studies #network
Bayesian Stackelberg Game Model for Water Supply Networks against Bounded Rational Interdictors (JJ, XL), pp. 842–847.
CASECASE-2019-RaineriB #realtime
Jerk limited planner for real-time applications requiring variable velocity bounds (MR, CGLB), pp. 1611–1617.
CASECASE-2019-ZabinskyHH #approximate #branch #heuristic
Integrating Heuristics and Approximations into a Branch and Bound Framework* (ZBZ, TYH, HH), pp. 774–779.
CASECASE-2019-ZakerimaneshTHT
Task-Space Position and Containment Control of Redundant Manipulators with Bounded Inputs (AZ, AT, FH, MT), pp. 431–436.
CGOCGO-2019-RodriguesGP #array #generative #in memory
Generation of In-Bounds Inputs for Arrays in Memory-Unsafe Languages (MR, BG, FMQP), pp. 136–148.
FASEFASE-2019-ZhangSMC #analysis #constraints #scheduling #smt #specification
SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language (MZ0, FS, FM, XC0), pp. 61–78.
CAVCAV-2019-FengCZF0 #difference #equation #verification
Taming Delays in Dynamical Systems - Unbounded Verification of Delay Differential Equations (SF, MC, NZ, MF, BX0), pp. 650–669.
CAVCAV-2019-KolblLW
Clock Bound Repair for Timed Systems (MK, SL, TW), pp. 79–96.
ICTSSICTSS-2019-ErardG #source code #testing
Bounded Exhaustive Testing with Certified and Optimized Data Enumeration Programs (CE, AG), pp. 159–175.
VMCAIVMCAI-2019-LuCC0 #source code
Type-Directed Bounding of Collections in Reactive Programs (TL, PC, BYEC, AT0), pp. 275–296.
JCDLJCDL-2018-JayarathnaS #eye tracking #modelling
Evaluating Saccade-Bounded Eye Movement Features for the User Modeling (SJ, SS), pp. 21–24.
DLTDLT-2018-JiraskovaO #automaton #complexity #towards
Towards Exact State Complexity Bounds for Input-Driven Pushdown Automata (GJ, AO), pp. 441–452.
ICFP-2018-AccattoliGK
Tight typings and split bounds (BA, SGL, DK), p. 30.
ICMLICML-2018-AbeilleL #linear #polynomial #problem
Improved Regret Bounds for Thompson Sampling in Linear Quadratic Control Problems (MA, AL), pp. 1–9.
ICMLICML-2018-Allen-ZhuBL #first-order
Make the Minority Great Again: First-Order Regret Bound for Contextual Bandits (ZAZ, SB, YL), pp. 186–194.
ICMLICML-2018-Arora0NZ #approach
Stronger Generalization Bounds for Deep Nets via a Compression Approach (SA, RG0, BN, YZ), pp. 254–263.
ICMLICML-2018-ChenTZHC
Variational Inference and Model Selection with Generalized Evidence Bounds (LC, CT, RZ, RH, LC), pp. 892–901.
ICMLICML-2018-Dziugaite0
Entropy-SGD optimizes the prior of a PAC-Bayes bound: Generalization properties of Entropy-SGD and data-dependent priors (GKD, DMR0), pp. 1376–1385.
ICMLICML-2018-KimW #approximate #predict #self #string
Self-Bounded Prediction Suffix Tree via Approximate String Matching (DK0, CJW), pp. 2664–2672.
ICMLICML-2018-LangeKA #clustering #correlation #performance
Partial Optimality and Fast Lower Bounds for Weighted Correlation Clustering (JHL, AK, BA), pp. 2898–2907.
ICMLICML-2018-MehrabiTY #approximate #network #power of
Bounds on the Approximation Power of Feedforward Neural Networks (MM, AT, MIY), pp. 3450–3458.
ICMLICML-2018-MouZGW
Dropout Training, Data-dependent Regularization, and Generalization Bounds (WM, YZ, JG, LW0), pp. 3642–3650.
ICMLICML-2018-NguyenNDRST #convergence #exclamation
SGD and Hogwild! Convergence Without the Bounded Gradients Assumption (LMN, PHN, MvD, PR, KS, MT), pp. 3747–3755.
ICMLICML-2018-RainforthKLMIWT
Tighter Variational Bounds are Not Necessarily Better (TR, ARK, TAL, CJM, MI, FW, YWT), pp. 4274–4282.
ICMLICML-2018-Scarlett #optimisation
Tight Regret Bounds for Bayesian Optimization in One Dimension (JS), pp. 4507–4515.
ICMLICML-2018-SerraTR #linear #network
Bounding and Counting Linear Regions of Deep Neural Networks (TS, CT, SR), pp. 4565–4573.
ICMLICML-2018-WeiszGS #algorithm #approximate #named
LEAPSANDBOUNDS: A Method for Approximately Optimal Algorithm Configuration (GW, AG, CS), pp. 5254–5262.
ICMLICML-2018-ZanetteB #identification #learning #problem
Problem Dependent Reinforcement Learning Bounds Which Can Identify Bandit Structure in MDPs (AZ, EB), pp. 5732–5740.
ICMLICML-2018-ZhouMBGYLF #distributed #how #optimisation #question
Distributed Asynchronous Optimization with Unbounded Delays: How Slow Can You Go? (ZZ, PM, NB, PWG, YY, LJL, LFF0), pp. 5965–5974.
ICPRICPR-2018-LiZLL #bottom-up #constraints #estimation #multi
Bottom-up Pose Estimation of Multiple Person with Bounding Box Constraint (ML, ZZ, JL, XL), pp. 115–120.
ICPRICPR-2018-PramerdorferKL #3d #classification #multi #network
Multi-View Classification and 3D Bounding Box Regression Networks (CP, MK, MVL), pp. 734–739.
ICPRICPR-2018-SongZR #network
UAV Target Tracking with A Boundary-Decision Network (KS, WZ0, XR), pp. 2576–2581.
ICPRICPR-2018-ZhangZZL #detection #image #performance
Boundary-based Image Forgery Detection by Fast Shallow CNN (ZZ, YZ, ZZ, JL), pp. 2658–2663.
KDDKDD-2018-KumagaiI #learning
Learning Dynamics of Decision Boundaries without Additional Labeled Data (AK, TI), pp. 1627–1636.
KDDKDD-2018-Ting #empirical #estimation #fault #named #using
Count-Min: Optimal Estimation and Tight Error Bounds using Empirical Error Distributions (DT), pp. 2319–2328.
OOPSLAOOPSLA-2018-KakiESJ #concurrent #replication #verification
Safe replication through bounded concurrency verification (GK, KE, KCS, SJ), p. 27.
PLDIPLDI-2018-DolanSM
Bounding data races in space and time (SD, KCS, AM), pp. 242–255.
PLDIPLDI-2018-LiuW #analysis #concurrent #interprocedural #named #source code
CUBA: interprocedural Context-UnBounded Analysis of concurrent programs (PL, TW), pp. 105–119.
PLDIPLDI-2018-NgoC0 #analysis #probability #source code
Bounded expectations: resource analysis for probabilistic programs (VCN, QC, JH0), pp. 496–512.
PLDIPLDI-2018-RoemerGB #concurrent #detection #predict
High-coverage, unbounded sound predictive race detection (JR, KG, MDB), pp. 374–389.
SASSAS-2018-JacqueminPV #analysis #fault #float
A Reduced Product of Absolute and Relative Error Bounds for Floating-Point Analysis (MJ, SP, FV), pp. 223–242.
SASSAS-2018-MastroeniP #verification
Verifying Bounded Subset-Closed Hyperproperties (IM, MP), pp. 263–283.
ASEASE-2018-MonteiroGCF #c++ #framework #model checking #platform #source code
Bounded model checking of C++ programs based on the Qt cross-platform framework (journal-first abstract) (FRM, MAPG, LCC, EBdLF), p. 954.
CASECASE-2018-JantschNWHM #approach #branch
Enhanced branch and bound approach for receding horizon based planning (MJ, NNN, LW, MH, UM), pp. 160–163.
CCCC-2018-ZhaoK0 #compilation #framework
A polyhedral compilation framework for loops with dynamic data-dependent bounds (JZ0, MK, AC0), pp. 14–24.
CAVCAV-2018-CordeiroKKST #bytecode #java #model checking #named #verification
JBMC: A Bounded Model Checking Tool for Verifying Java Bytecode (LCC, PK, DK, PS, MT), pp. 183–190.
CAVCAV-2018-BouajjaniEJQ #message passing #on the #source code #verification
On the Completeness of Verifying Message Passing Programs Under Bounded Asynchrony (AB, CE, KJ, SQ), pp. 372–391.
CSLCSL-2018-FijalkowMMR #logic
Quantifying Bounds in Strategy Logic (NF, BM, AM, SR), p. 23.
IJCARIJCAR-2018-Bromberger #linear #problem #reduction
A Reduction from Unbounded Linear Mixed Arithmetic Problems into Bounded Problems (MB), pp. 329–345.
IJCARIJCAR-2018-PayetS #abstract interpretation #array
Checking Array Bounds by Abstract Interpretation and Symbolic Expressions (ÉP, FS), pp. 706–722.
TAPTAP-2018-Keller #higher-order #testing #verification
Tactic Program-Based Testing and Bounded Verification in Isabelle/HOL (CK), pp. 103–119.
DLTDLT-2017-Yamakami #automaton #complexity #probability
One-Way Bounded-Error Probabilistic Pushdown Automata and Kolmogorov Complexity - (Preliminary Report) (TY), pp. 353–364.
FSCDFSCD-2017-KanovichKMS #algorithm #calculus #order #polynomial
A Polynomial-Time Algorithm for the Lambek Calculus with Brackets of Bounded Order (MIK, SK, GM, AS), p. 17.
SEFMSEFM-2017-CabodiCPPV #learning #model checking
Interpolation-Based Learning as a Mean to Speed-Up Bounded Model Checking (Short Paper) (GC, PC, MP, PP, DV), pp. 382–387.
AIIDEAIIDE-2017-PowleyCW #memory management #monte carlo
Memory Bounded Monte Carlo Tree Search (EJP, PIC, DW), pp. 94–100.
ICMLICML-2017-AvronKMMVZ #approximate #fourier #kernel #random #statistics
Random Fourier Features for Kernel Ridge Regression: Approximation Bounds and Statistical Guarantees (HA, MK, CM, CM, AV, AZ), pp. 253–262.
ICMLICML-2017-AzarOM #learning
Minimax Regret Bounds for Reinforcement Learning (MGA, IO, RM), pp. 263–272.
ICMLICML-2017-BachemLH0 #clustering
Uniform Deviation Bounds for k-Means Clustering (OB, ML, SHH, AK0), pp. 283–291.
ICMLICML-2017-Domke
A Divergence Bound for Hybrids of MCMC and Variational Inference and an Application to Langevin Dynamics and SGVI (JD), pp. 1029–1038.
ICMLICML-2017-McNamaraB
Risk Bounds for Transferring Representations With and Without Fine-Tuning (DM, MFB), pp. 2373–2381.
ICMLICML-2017-MirrokniLVW #approximate
Tight Bounds for Approximate Carathéodory and Beyond (VSM, RPL, AV, SCwW), pp. 2440–2448.
ICMLICML-2017-MukkamalaH
Variants of RMSProp and Adagrad with Logarithmic Regret Bounds (MCM, MH0), pp. 2545–2553.
ICMLICML-2017-ShalitJS #algorithm
Estimating individual treatment effect: generalization bounds and algorithms (US, FDJ, DAS), pp. 3076–3085.
KDDKDD-2017-AvinLNP #network
Improved Degree Bounds and Full Spectrum Power Laws in Preferential Attachment Networks (CA, ZL, YN, DP), pp. 45–53.
KDDKDD-2017-YinLN #education #scalability
Small Batch or Large Batch?: Gaussian Walk with Rebound Can Teach (PY, PL0, TN), pp. 1275–1284.
OnwardOnward-2017-JangdaY
Unbounded superoptimization (AJ, GY), pp. 78–88.
OOPSLAOOPSLA-2017-CelikPKG #generative
Bounded exhaustive test-input generation on GPUs (, SP, SK, MG), p. 25.
AdaEuropeAdaEurope-2017-DiazFKMHAC #analysis #manycore #named #probability
MC2: Multicore and Cache Analysis via Deterministic and Probabilistic Jitter Bounding (ED, MF, LK, EM, CH, JA, FJC), pp. 102–118.
LOPSTRLOPSTR-2017-LiqatBLH #energy #modelling #program analysis
Inferring Energy Bounds via Static Program Analysis and Evolutionary Modeling of Basic Blocks (UL, ZB, PLG0, MVH), pp. 54–72.
POPLPOPL-2017-DudenhefnerR #calculus
Intersection type calculi of bounded dimension (AD, JR), pp. 653–665.
POPLPOPL-2017-HoffmannDW #analysis #automation #ml #towards
Towards automatic resource bound analysis for OCaml (JH0, AD, SCW), pp. 359–373.
ESEC-FSEESEC-FSE-2017-CelikVMG #testing #virtual machine
Regression test selection across JVM boundaries (, MV, AM, MG), pp. 809–820.
ASPLOSASPLOS-2017-BarbalaceLJCCLR
Breaking the Boundaries in Heterogeneous-ISA Datacenters (AB, RL, CJ, AC, HRC, VL, BR), pp. 645–659.
CASECASE-2017-0003AG #fault #reduction
Model reduction techniques with error bounds (MI0, MJA, AG), pp. 1510–1515.
CASECASE-2017-RiaziWBL #energy #optimisation
Energy and peak-power optimization of time-bounded robot trajectories (SR, OW, KB, BL), p. 1301.
CCCC-2017-FedericoPA #analysis #framework
rev.ng: a unified binary analysis framework to recover CFGs and function boundaries (ADF, MP, GA), pp. 131–141.
CGOCGO-2017-SenguptaCBK #hardware #memory management #named #transaction #using
Legato: end-to-end bounded region serializability using commodity hardware transactional memory (AS, MC, MDB, MK0), pp. 1–13.
CADECADE-2017-Cruanes #satisfiability
Satisfiability Modulo Bounded Checking (SC), pp. 114–129.
CAVCAV-2017-ChatterjeeFM #analysis #automation
Automated Recurrence Analysis for Almost-Linear Expected-Runtime Bounds (KC, HF0, AM), pp. 118–139.
CAVCAV-2017-FaymonvilleFT #framework #named #synthesis
BoSy: An Experimentation Framework for Bounded Synthesis (PF, BF, LT), pp. 325–332.
CAVCAV-2017-KhalimovB #synthesis
Bounded Synthesis for Streett, Rabin, and CTL* (AK, RB), pp. 333–352.
CAVCAV-2017-MaricSB #algorithm
Cutoff Bounds for Consensus Algorithms (OM, CS0, DAB), pp. 217–237.
CSLCSL-2017-ChenFH #first-order #logic #quantifier #rank #slicing
Slicewise Definability in First-Order Logic with Bounded Quantifier Rank (YC, JF, XH), p. 16.
ICSTICST-2017-DarkeCCV #abstraction #model checking #performance #proving #safety #using
Efficient Safety Proofs for Industry-Scale Code Using Abstractions and Bounded Model Checking (PD, BC, AC, RV), pp. 468–475.
SCAMSCAM-2016-GaoHMW #model checking #named #testing
LLSPLAT: Improving Concolic Testing by Bounded Model Checking (MG0, LH, RM, ZW), pp. 127–136.
CIAACIAA-2016-IbarraM #linear #on the
On Bounded Semilinear Languages, Counter Machines, and Finite-Index ET0L (OHI, IM), pp. 138–149.
FMFM-2016-DellabaniCBB #interactive #multi
Local Planning of Multiparty Interactions with Bounded Horizons (MD, JC, MB, SB), pp. 199–216.
FMFM-2016-Flores-Montoya #source code
Upper and Lower Amortized Cost Bounds of Programs Expressed as Cost Relations (AFM), pp. 254–273.
SEFMSEFM-2016-BendikBBC #analysis #order #requirements #safety #set
Finding Boundary Elements in Ordered Sets with Application to Safety and Requirements Analysis (JB, NB, JB, IC), pp. 121–136.
ICMLICML-2016-AltschulerBFMRZ #algorithm #distributed #set
Greedy Column Subset Selection: New Bounds and Distributed Algorithms (JA, AB, GF, VSM, AR, MZ), pp. 2539–2548.
ICMLICML-2016-DavidS #algorithm #performance #problem
PAC Lower Bounds and Efficient Algorithms for The Max K-Armed Bandit Problem (YD, NS), pp. 878–887.
ICMLICML-2016-HoilesS #design #education #evaluation #recommendation
Bounded Off-Policy Evaluation with Missing Data for Course Recommendation and Curriculum Design (WH, MvdS), pp. 1596–1604.
ICMLICML-2016-KomiyamaHN #algorithm #performance #problem
Copeland Dueling Bandit Problem: Regret Lower Bound, Optimal Algorithm, and Computationally Efficient Algorithm (JK, JH, HN), pp. 1235–1244.
ICMLICML-2016-NewlingF #performance
Fast k-means with accurate bounds (JN, FF), pp. 936–944.
ICMLICML-2016-PuleoM #clustering #correlation #fault
Correlation Clustering and Biclustering with Locally Bounded Errors (GJP, OM), pp. 869–877.
ICPRICPR-2016-BullingerBWA #generative #re-engineering #using #video
Moving object reconstruction in monocular video data using boundary generation (SB, CB, SW, MA), pp. 240–246.
ICPRICPR-2016-Lan0DAH #matrix
A PAC bound for joint matrix completion based on Partially Collective Matrix Factorization (CL, XL0, YD, JSA, JH), pp. 2628–2633.
ICPRICPR-2016-LuoLQ #analysis #optimisation #probability
Bound analysis of natural gradient descent in stochastic optimization setting (ZL, DL, YQ), pp. 4166–4171.
ICPRICPR-2016-MezumanW #finite
A tight convex upper bound on the likelihood of a finite mixture (EM, YW), pp. 1683–1688.
ICPRICPR-2016-RubioYSM #named #segmentation
BASS: Boundary-Aware Superpixel Segmentation (AR, LY, ESS, FMN), pp. 2824–2829.
KDDKDD-2016-HooiSBSSF #graph #named
FRAUDAR: Bounding Graph Fraud in the Face of Camouflage (BH, HAS, AB, NS, KS, CF), pp. 895–904.
KDDKDD-2016-ReddyLBJ #learning #scheduling
Unbounded Human Learning: Optimal Scheduling for Spaced Repetition (SR, IL, SB, TJ), pp. 1815–1824.
MoDELSMoDELS-2016-Blache #c #development #embedded #modelling #safety #using
Handling index-out-of-bounds in safety-critical embedded C code using model-based development (GB), pp. 143–149.
LOPSTRLOPSTR-2016-JanaKDVC #array #model checking #scalability #source code
Scaling Bounded Model Checking by Transforming Programs with Arrays (AJ, UPK, AD, RV, NC), pp. 275–292.
POPLPOPL-2016-HagueKO #automaton #higher-order
Unboundedness and downward closures of higher-order pushdown automata (MH, JK, CHLO), pp. 151–163.
QAPLQAPL-2016-LarsenLZ15 #energy #exclamation #game studies
Limit Your Consumption! Finding Bounds in Average-energy Games (KGL, SL, MZ0), pp. 1–14.
SASSAS-2016-ChristakisW #abstract interpretation
Bounded Abstract Interpretation (MC, VW), pp. 105–125.
SASSAS-2016-GangeNSSS #matrix
Exploiting Sparsity in Difference-Bound Matrices (GG, JAN, PS, HS, PJS), pp. 189–211.
ASEASE-2016-Nishi #model checking #programming #towards #using
Towards bounded model checking using nonlinear programming solver (MN), pp. 560–565.
FSEFSE-2016-Monteiro #finite #fixpoint #implementation #model checking #modelling
Bounded model checking of state-space digital systems: the impact of finite word-length effects on the implementation of fixed-point digital controllers based on state-space modeling (FRM), pp. 1151–1153.
CASECASE-2016-HanLD #feedback #mobile
Flocking of mobile robots by bounded feedback (TTH, HML, BHD), pp. 689–694.
CASECASE-2016-LeeL #3d #estimation #recognition
Object recognition and pose estimation based on 3D planar closed loop boundaries (YL, SL0), pp. 245–250.
CASECASE-2016-Ritt #algorithm #permutation #problem #scheduling
A branch-and-bound algorithm with cyclic best-first search for the permutation flow shop scheduling problem (MR), pp. 872–877.
CCCC-2016-DuckY #pointer
Heap bounds protection with low fat pointers (GJD, RHCY), pp. 132–142.
FASEFASE-2016-WeckesserLSRS #automation #detection #exclamation #feature model #modelling
Mind the Gap! Automated Anomaly Detection for Potentially Unbounded Cardinality-Based Feature Models (MW, ML, TS, BR, AS), pp. 158–175.
CAVCAV-2016-FinkbeinerK #synthesis
Bounded Cycle Synthesis (BF, FK0), pp. 118–135.
CAVCAV-2016-LeggNR #satisfiability #synthesis
A SAT-Based Counterexample Guided Method for Unbounded Synthesis (AL, NN, LR), pp. 364–382.
CSLCSL-2016-KotekVZ #finite #higher-order #monad #satisfiability
Monadic Second Order Finite Satisfiability and Unbounded Tree-Width (TK, HV, FZ), p. 20.
IJCARIJCAR-2016-AthanasiouLW #equation #thread #using #verification
Unbounded-Thread Program Verification using Thread-State Equations (KA, PL, TW), pp. 516–531.
IJCARIJCAR-2016-FrohnNHBG #integer #runtime #source code
Lower Runtime Bounds for Integer Programs (FF, MN, JH, MB, JG), pp. 550–567.
VMCAIVMCAI-2016-HashemiH0 #nondeterminism #probability #reachability
Reward-Bounded Reachability Probability for Uncertain Weighted MDPs (VH, HH, LS0), pp. 351–371.
VLDBVLDB-2015-AkidauBCCFLMMPS #approach #correctness #data flow #latency
The Dataflow Model: A Practical Approach to Balancing Correctness, Latency, and Cost in Massive-Scale, Unbounded, Out-of-Order Data Processing (TA, RB, CC, SC, RFM, RL, SM, DM, FP, ES, SW), pp. 1792–1803.
CIAACIAA-J-2013-JirasekJ15 #on the #regular expression
On the boundary of regular languages (JJ, GJ), pp. 42–57.
DLTDLT-2015-JirasekJ
The Boundary of Prefix-Free Languages (JJ, GJ), pp. 300–312.
DLTDLT-2015-Yamakami #complexity #quantum
Complexity Bounds of Constant-Space Quantum Computation — (TY), pp. 426–438.
ICALPICALP-v1-2015-Ailon #fourier
Tighter Fourier Transform Lower Bounds (NA), pp. 14–25.
ICALPICALP-v1-2015-BeameLP
Finding the Median (Obliviously) with Bounded Space (PB, VL, MP), pp. 103–115.
ICALPICALP-v1-2015-FeldmannFKP #graph
A (1+ε ) ( 1 + ε ) -Embedding of Low Highway Dimension Graphs into Bounded Treewidth Graphs (AEF, WSF, JK, IP), pp. 469–480.
ICALPICALP-v1-2015-FominGKM #graph #morphism #problem
Lower Bounds for the Graph Homomorphism Problem (FVF, AG, ASK, IM), pp. 481–493.
ICALPICALP-v1-2015-KayalKPS
Lower Bounds for Sums of Powers of Low Degree Univariates (NK, PK, TP, CS), pp. 810–821.
ICALPICALP-v1-2015-KomarathSS #finite
Comparator Circuits over Finite Bounded Posets (BK, JS, KSS), pp. 834–845.
ICALPICALP-v1-2015-Sanyal #fourier
Near-Optimal Upper Bound on Fourier Dimension of Boolean Functions in Terms of Fourier Sparsity (SS), pp. 1035–1045.
ICALPICALP-v2-2015-BojanczykMW #clique #datalog #monad #source code
Containment of Monadic Datalog Programs via Bounded Clique-Width (MB, FM, AW), pp. 427–439.
ICALPICALP-v2-2015-FijalkowHKS #game studies #memory management
Trading Bounds for Memory in Games with Counters (NF, FH, DK, MS), pp. 197–208.
ICALPICALP-v2-2015-GairingKK #game studies
Tight Bounds for Cost-Sharing in Weighted Congestion Games (MG, KK, GK), pp. 626–637.
LATALATA-2015-AmanoS #multi #polynomial
A Nonuniform Circuit Class with Multilayer of Threshold Gates Having Super Quasi Polynomial Size Lower Bounds Against NEXP (KA, AS), pp. 461–472.
LATALATA-2015-DabrowskiHP #clique #graph
Bounding Clique-Width via Perfect Graphs (KKD, SH, DP), pp. 676–688.
LATALATA-2015-EremondiIM
Insertion Operations on Deterministic Reversal-Bounded Counter Machines (JE, OHI, IM), pp. 200–211.
LATALATA-2015-KrishnaMT #automaton #decidability #problem #reachability #recursion
Time-Bounded Reachability Problem for Recursive Timed Automata is Undecidable (SNK, LM, AT), pp. 237–248.
FMFM-2015-0001K #model checking #using
Property-Driven Fence Insertion Using Reorder Bounded Model Checking (SJ, DK), pp. 291–307.
FMFM-2015-BagheriKMJ #android #design #detection #protocol #verification
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
FMFM-2015-ChimdyalwarDCVC #abstraction #model checking #static analysis #using
Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FMFM-2015-KroeningLW #automaton #model checking #proving #safety
Proving Safety with Trace Automata and Bounded Model Checking (DK, ML, GW), pp. 325–341.
RTARTA-2015-FrohnGHAS #complexity #runtime
Inferring Lower Bounds for Runtime Complexity (FF, JG, JH, CA, TS), pp. 334–349.
SEFMSEFM-2015-ClarisoGC #ocl #refinement #towards #uml #verification
Towards Domain Refinement for UML/OCL Bounded Verification (RC, CAG, JC), pp. 108–114.
SEFMSEFM-2015-RochaBC #c #generative #memory management #model checking #source code #testing #using
Memory Management Test-Case Generation of C Programs Using Bounded Model Checking (HR, RSB, LCC), pp. 251–267.
ICFPICFP-2015-VazouBJ #refinement
Bounded refinement types (NV, AB, RJ), pp. 48–61.
CHICHI-2015-BlomkvistPA #agile #communication #distributed
Communication through Boundary Objects in Distributed Agile Teams (JKB, JP, ), pp. 1875–1884.
CHICHI-2015-CecchinatoCB #difference #email
Working 9-5?: Professional Differences in Email and Boundary Management Practices (MEC, ALC, JB), pp. 3989–3998.
CHICHI-2015-FleckCR #multi #using
Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
CHICHI-2015-YerousisARRRW
Computer-Enabled Project Spaces: Connecting with Palestinian Refugees across Camp Boundaries (GPY, KA, TvR, DWR, MR, VW), pp. 3749–3758.
HCIDUXU-UI-2015-GomezFD #education
Transcending Disciplinary, Cultural and National Boundaries: Emergent Technologies, New Education Landscape and the Cloud Workshop Project (RG, PF, RD), pp. 631–642.
HCIHCI-IT-2015-HakodaKSST #gesture #mobile #named #using
AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
ICMLICML-2015-AgarwalB #finite #optimisation
A Lower Bound for the Optimization of Finite Sums (AA, LB), pp. 78–86.
ICMLICML-2015-KordaA #approximate #convergence #exponential #on the
On TD(0) with function approximation: Concentration bounds and a centered variant with exponential convergence (NK, PLA), pp. 626–634.
ICMLICML-2015-LakshmananOR #learning
Improved Regret Bounds for Undiscounted Continuous Reinforcement Learning (KL, RO, DR), pp. 524–532.
ICMLICML-2015-TagortiS #convergence #fault #on the
On the Rate of Convergence and Error Bounds for LSTD(λ) (MT, BS), pp. 1521–1529.
ICMLICML-2015-TewariC #documentation #fault #learning #matter #question #rank
Generalization error bounds for learning to rank: Does the length of document lists matter? (AT, SC), pp. 315–323.
ICMLICML-2015-Yang0JZ #fault #set
An Explicit Sampling Dependent Spectral Error Bound for Column Subset Selection (TY, LZ, RJ, SZ), pp. 135–143.
ICMLICML-2015-ZhangWJ #algorithm #distributed #estimation #matrix #performance #rank
Distributed Estimation of Generalized Matrix Rank: Efficient Algorithms and Lower Bounds (YZ, MJW, MIJ), pp. 457–465.
ICMLICML-2015-ZhouZS #analysis #convergence #fault #first-order
ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
KDDKDD-2015-Kaban #random
Improved Bounds on the Dot Product under Random Projection and Random Sign Projection (AK), pp. 487–496.
KDDKDD-2015-YuW0PSIW #markov #multi
Tornado Forecasting with Multiple Markov Boundaries (KY, DW, WD, JP, DLS, SI, XW), pp. 2237–2246.
PLDIPLDI-2015-0010ZTZ #named
Light: replay via tightly bounded recording (PL, XZ, OT, YZ), pp. 55–64.
PLDIPLDI-2015-Carbonneaux0S #composition
Compositional certified resource bounds (QC, JH, ZS), pp. 467–478.
POPLPOPL-2015-FarzanKP #parallel #proving
Proof Spaces for Unbounded Parallelism (AF, ZK, AP), pp. 407–420.
SASSAS-2015-CattaruzzaASK #analysis
Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (DC, AA, PS, DK), pp. 312–331.
ASEASE-2015-InversoN0TP #concurrent #model checking #multi #named #thread
Lazy-CSeq: A Context-Bounded Model Checking Tool for Multi-threaded C-Programs (OI, TLN, BF, SLT, GP), pp. 807–812.
ASEASE-2015-LerchSBM #abstraction #analysis #data flow #scalability
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T) (JL, JS, EB, MM), pp. 619–629.
ASEASE-2015-TomanPT #named #rust #verification
Crust: A Bounded Verifier for Rust (N) (JT, SP, ET), pp. 75–80.
SACSAC-2015-Puffitsch #analysis #branch #predict
Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
GPCEGPCE-2015-ReyndersDP #api #generative
Generating safe boundary APIs between typed EDSLs and their environments (BR, DD, FP), pp. 31–34.
ASPLOSASPLOS-2015-MorrisonA #symmetry
Temporally Bounding TSO for Fence-Free Asymmetric Synchronization (AM, YA), pp. 45–58.
ASPLOSASPLOS-2015-NguyenWBFHX #big data #compilation #named #runtime
FACADE: A Compiler and Runtime for (Almost) Object-Bounded Big Data Applications (KN, KW, YB, LF, JH, G(X), pp. 675–690.
ASPLOSASPLOS-2015-SenguptaBZBK #dynamic analysis #hybrid
Hybrid Static: Dynamic Analysis for Statically Bounded Region Serializability (AS, SB, MZ, MDB, MK), pp. 561–575.
CASECASE-2015-FeiAR #clustering #resource management #symbolic computation #using
Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, , SAR), pp. 799–806.
CASECASE-2015-Michalek #standard
Motion control with minimization of a boundary off-track for non-Standard N-trailers along forward-followed paths (MMM), pp. 1564–1569.
CASECASE-2015-PerriBL #online
Jerk bounded velocity planner for the online management of autonomous vehicles (SP, CGLB, ML), pp. 618–625.
CASECASE-2015-TanakaM #algorithm #problem #strict
Dominance properties for the unrestricted block relocation problem and their application to a branch-and-bound algorithm (ST, FM), pp. 509–514.
DACDAC-2015-FernandezJAQVC #realtime
Increasing confidence on measurement-based contention bounds for real-time round-robin buses (GF, JJ, JA, EQ, TV, FJC), p. 6.
DATEDATE-2015-DarkeCVSM #approximate #model checking #using
Over-approximating loops to prove properties using bounded model checking (PD, BC, RV, US, RM), pp. 1407–1412.
DATEDATE-2015-KimAS #composition #scheduling
Schedulability bound for integrated modular avionics partitions (JEK, TFA, LS), pp. 37–42.
PDPPDP-2015-KonstantinidisC #gpu #kernel #memory management #performance
A Practical Performance Model for Compute and Memory Bound GPU Kernels (EK, YC), pp. 651–658.
FASEFASE-2015-FedyukovichDHS #dependence #detection #model checking
Symbolic Detection of Assertion Dependencies for Bounded Model Checking (GF, ACD, AEJH, NS), pp. 186–201.
FoSSaCSFoSSaCS-2015-Ganardi #clique #game studies
Parity Games of Bounded Tree- and Clique-Width (MG), pp. 390–404.
STOCSTOC-2015-AbdullahV #difference
A Directed Isoperimetric Inequality with application to Bregman Near Neighbor Lower Bounds (AA, SV), pp. 509–518.
STOCSTOC-2015-BarakCK #independence
Sum of Squares Lower Bounds from Pairwise Independence (BB, SOC, PKK), pp. 97–106.
STOCSTOC-2015-Chechik #approximate #distance
Approximate Distance Oracles with Improved Bounds (SC), pp. 1–10.
STOCSTOC-2015-HardtP #learning
Tight Bounds for Learning a Mixture of Two Gaussians (MH, EP), pp. 753–760.
STOCSTOC-2015-KoppulaLW #memory management #obfuscation #turing machine
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory (VK, ABL, BW), pp. 419–428.
STOCSTOC-2015-LarsenNN #adaptation #algorithm #streaming
Time Lower Bounds for Nonadaptive Turnstile Streaming Algorithms (KGL, JN, HLN), pp. 803–812.
STOCSTOC-2015-LeeRS #programming
Lower Bounds on the Size of Semidefinite Programming Relaxations (JRL, PR, DS), pp. 567–576.
STOCSTOC-2015-LiuL
FPTAS for #BIS with Degree Bounds on One Side (JL, PL), pp. 549–556.
STOCSTOC-2015-MekaPW #clique
Sum-of-squares Lower Bounds for Planted Clique (RM, AP, AW), pp. 87–96.
TACASTACAS-2015-Nguyen0TP #c #contest #lazy evaluation #source code
Unbounded Lazy-CSeq: A Lazy Sequentialization Tool for C Programs with Unbounded Context Switches — (Competition Contribution) (TLN, BF, SLT, GP), pp. 461–463.
CADECADE-2015-BackemanR #proving #theorem proving
Theorem Proving with Bounded Rigid E-Unification (PB, PR), pp. 572–587.
CAVCAV-2015-MajumdarW #model checking #named #source code
Bbs: A Phase-Bounded Model Checker for Asynchronous Programs (RM, ZW), pp. 496–503.
CAVCAV-2015-ErezN #automation #graph #smt #using
Finding Bounded Path in Graph Using SMT for Automatic Clock Routing (AE, AN), pp. 20–36.
CSLCSL-2015-Kaiser0LL #approach
A Unified Approach to Boundedness Properties in MSO (LK, ML, SL, CL), pp. 441–456.
ICSTICST-2015-XuLCK #approach #detection #lightweight #thread
A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops (JX, YL, RHC, DCK), pp. 1–10.
ICTSSICTSS-2015-WeisslederWL #automation #design #product line
Automated Test Design for Boundaries of Product Line Variants (SW, FW, HL), pp. 86–101.
LICSLICS-2015-BenediktCCB #complexity #logic
The Complexity of Boundedness for Guarded Logics (MB, BtC, TC, MVB), pp. 293–304.
LICSLICS-2015-HeijltjesH #complexity #logic #petri net #proving
Complexity Bounds for Sum-Product Logic via Additive Proof Nets and Petri Nets (WH, DJDH), pp. 80–91.
LICSLICS-2015-KrebsV #logic #refinement
Universal Covers, Color Refinement, and Two-Variable Counting Logic: Lower Bounds for the Depth (AK, OV), pp. 689–700.
ICSTSAT-2015-MenciaPM #satisfiability
SAT-Based Horn Least Upper Bounds (CM, AP, JMS), pp. 423–433.
VMCAIVMCAI-2015-MukundRS #data type #implementation
Bounded Implementations of Replicated Data Types (MM, GSR, SPS), pp. 355–372.
WICSAWICSA-2014-BiancoMKR #case study #ecosystem #framework #platform
The Role of Platform Boundary Resources in Software Ecosystems: A Case Study (VdB, VM, MK, MR), pp. 11–20.
SIGMODSIGMOD-2014-FanWW #graph #query
Querying big graphs within bounded resources (WF, XW, YW), pp. 301–312.
VLDBVLDB-2014-CaoFWY #query
Bounded Conjunctive Queries (YC, WF, TW, WY), pp. 1231–1242.
VLDBVLDB-2014-YanCZ
Error-bounded Sampling for Analytics on Big Sparse Data (YY, LJC, ZZ), pp. 1508–1519.
VLDBVLDB-2015-BegumK14
Rare Time Series Motif Discovery from Unbounded Streams (NB, EJK), pp. 149–160.
ITiCSEITiCSE-2014-MI #query
A method to prove query lower bounds (JM, SI), pp. 81–86.
CIAACIAA-2014-DumitranGMM
Bounded Prefix-Suffix Duplication (MD, JG, FM, VM), pp. 176–187.
DLTDLT-2014-BrzozowskiS #complexity
Upper Bounds on Syntactic Complexity of Left and Two-Sided Ideals (JAB, MS), pp. 13–24.
DLTDLT-2014-TorreNP #automaton
Scope-Bounded Pushdown Languages (SLT, MN, GP), pp. 116–128.
ICALPICALP-v1-2014-BravermanG
Public vs Private Coin in Bounded-Round Information (MB, AG), pp. 502–513.
ICALPICALP-v1-2014-BrietDHS #approximate
Lower Bounds for Approximate LDCs (JB, ZD, GH, SS), pp. 259–270.
ICALPICALP-v1-2014-KolMSY #approximate #rank
Approximate Nonnegative Rank Is Equivalent to the Smooth Rectangle Bound (GK, SM, AS, AY), pp. 701–712.
ICALPICALP-v1-2014-KumarS
Superpolynomial Lower Bounds for General Homogeneous Depth 4 Arithmetic Circuits (MK, SS), pp. 751–762.
ICALPICALP-v1-2014-MancinskaV #probability
Unbounded Entanglement Can Be Needed to Achieve the Optimal Success Probability (LM, TV), pp. 835–846.
ICALPICALP-v1-2014-NelsonN
Lower Bounds for Oblivious Subspace Embeddings (JN, HLN), pp. 883–894.
ICALPICALP-v1-2014-Volkovich #learning #on the
On Learning, Lower Bounds and (un)Keeping Promises (IV), pp. 1027–1038.
ICALPICALP-v2-2014-AdjiashviliR #graph
Labeling Schemes for Bounded Degree Graphs (DA, NR), pp. 375–386.
ICALPICALP-v2-2014-AschnerK #constraints #modelling #network
Bounded-Angle Spanning Tree: Modeling Networks with Angular Constraints (RA, MJK), pp. 387–398.
ICALPICALP-v2-2014-KopelowitzKPS #graph #worst-case
Orienting Fully Dynamic Graphs with Worst-Case Time Bounds (TK, RK, EP, SS), pp. 532–543.
LATALATA-2014-BestD #graph #petri net
Characterisation of the State Spaces of Live and Bounded Marked Graph Petri Nets (EB, RRD), pp. 161–172.
LATALATA-2014-KonitzerS #automaton #process
DFA with a Bounded Activity Level (MK, HUS), pp. 478–489.
FMFM-2014-PonzioRAF #performance
Efficient Tight Field Bounds Computation Based on Shape Predicates (PP, NR, NA, MFF), pp. 531–546.
ICFPICFP-2014-SchoepeHS #named
SeLINQ: tracking information across application-database boundaries (DS, DH, AS), pp. 25–38.
CoGCIG-2014-VodopivecS #difference
Enhancing upper confidence bounds for trees with temporal difference values (TV, BS), pp. 1–8.
FDGFDG-2014-GarbeRDWM #combinator #visualisation
Author assistance visualizations for Ice-Bound, a combinatorial narrative (JG, AAR, MD, NWF, MM).
FDGFDG-2014-GarbeRWM #configuration management #named #novel
Ice-Bound: A novel of reconfiguration (JG, AAR, NWF, MM).
FDGFDG-2014-ReedGWM #named
Ice-Bound: Combining richly-realized story with expressive gameplay (AAR, JG, NWF, MM).
CHICHI-2014-LeeSS #analysis #design #research
Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
CHICHI-2014-WaycottDVMGOK
Captioned photographs in psychosocial aged care: relationship building and boundary work (JW, HD, FV, AM, AG, EO, LK), pp. 4167–4176.
CSCWCSCW-2014-GavilanesMQ #communication #social #twitter
Twitter ain’t without frontiers: economic, social, and cultural boundaries in international communication (ROGG, YM, DQ), pp. 1511–1522.
CIKMCIKM-2014-LiuXCXTY #approach #linear #network #scalability #social
Influence Maximization over Large-Scale Social Networks: A Bounded Linear Approach (QL, BX, EC, HX, FT, JXY), pp. 171–180.
ICMLICML-c1-2014-AroraBGM #learning
Provable Bounds for Learning Some Deep Representations (SA, AB, RG, TM), pp. 584–592.
ICMLICML-c1-2014-CombesP #algorithm
Unimodal Bandits: Regret Lower Bounds and Optimal Algorithms (RC, AP), pp. 521–529.
ICMLICML-c1-2014-DenisGH #learning #matrix
Dimension-free Concentration Bounds on Hankel Matrices for Spectral Learning (FD, MG, AH), pp. 449–457.
ICMLICML-c1-2014-IyerNS #convergence #estimation #kernel
Maximum Mean Discrepancy for Class Ratio Estimation: Convergence Bounds and Kernel Selection (AI, SN, SS), pp. 530–538.
ICMLICML-c1-2014-JainT #independence #learning
(Near) Dimension Independent Risk Bounds for Differentially Private Learning (PJ, AGT), pp. 476–484.
ICMLICML-c2-2014-Kontorovich #algorithm #metric
Concentration in unbounded metric spaces and algorithmic stability (AK), pp. 28–36.
ICMLICML-c2-2014-MuHWG
Square Deal: Lower Bounds and Improved Relaxations for Tensor Recovery (CM, BH, JW, DG), pp. 73–81.
ICMLICML-c2-2014-PentinaL #learning
A PAC-Bayesian bound for Lifelong Learning (AP, CHL), pp. 991–999.
ICMLICML-c2-2014-ToshD
Lower Bounds for the Gibbs Sampler over Mixtures of Gaussians (CT, SD), pp. 1467–1475.
ICMLICML-c2-2014-ZoghiWMR #problem
Relative Upper Confidence Bound for the K-Armed Dueling Bandit Problem (MZ, SW, RM, MdR), pp. 10–18.
KRKR-2014-HaririCD
State-Boundedness in Data-Aware Dynamic Systems (BBH, DC, MM, AD).
KRKR-2014-LomuscioM14a #model checking
Model Checking Unbounded Artifact-Centric Systems (AL, JM).
KRKR-2014-Razgon #on the
On OBDDs for CNFs of Bounded Treewidth (IR).
OOPSLAOOPSLA-2014-RosnerBPKAFK #generative #hybrid #invariant
Bounded exhaustive test input generation from hybrid invariants (NR, VSB, PP, SAK, NA, MFF, SK), pp. 655–674.
PLDIPLDI-2014-Carbonneaux0RS #c #source code #verification
End-to-end verification of stack-space bounds for C programs (QC, JH, TR, ZS), p. 30.
PLDIPLDI-2014-GreenmanMT #morphism #polymorphism
Getting F-bounded polymorphism into shape (BG, FM, RT), p. 12.
PLDIPLDI-2014-LuuSSD #constraints #string
A model counter for constraints over unbounded strings (LL, SS, PS, BD), p. 57.
ASEASE-2014-BasuB #automation #interactive #verification
Automatic verification of interactions in asynchronous systems with unbounded buffers (SB, TB), pp. 743–754.
SLESLE-2014-KursLN #semiparsing
Bounded Seas — Island Parsing Without Shipwrecks (JK, ML, ON), pp. 62–81.
ASPLOSASPLOS-2014-MorrisonA
Fence-free work stealing on bounded TSO processors (AM, YA), pp. 413–426.
ASPLOSASPLOS-2014-SaniBQZ
I/o paravirtualization at the device file boundary (AAS, KB, SQ, LZ), pp. 319–332.
CASECASE-2014-ChiuC #detection #image
A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
CASECASE-2014-TanakaT #algorithm #performance #problem
A faster branch-and-bound algorithm for the block relocation problem (ST, KT), pp. 7–12.
DACDAC-2014-AxerTED #network #performance
Exploiting Shaper Context to Improve Performance Bounds of Ethernet AVB Networks (PA, DT, RE, JD), p. 6.
DATEDATE-2014-LongLY #analysis #evaluation #modelling #multi
Analysis and evaluation of per-flow delay bound for multiplexing models (YL, ZL, XY), pp. 1–4.
DATEDATE-2014-SongDY #analysis #multi #order #parametricity #performance #reduction
Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
DATEDATE-2014-ZhaoL
Empowering study of delay bound tightness with simulated annealing (XZ, ZL), pp. 1–6.
PPoPPPPoPP-2014-ThomsonDB #concurrent #empirical #testing #using
Concurrency testing using schedule bounding: an empirical study (PT, AFD, AB), pp. 15–28.
ESOPESOP-2014-GhicaS #linear
Bounded Linear Types in a Resource Semiring (DRG, AIS), pp. 331–350.
ESOPESOP-2014-KothaACESB #parallel #runtime
Affine Parallelization of Loops with Run-Time Dependent Bounds from Binaries (AK, KA, TC, KE, MS, RB), pp. 554–574.
FoSSaCSFoSSaCS-2014-Fu #markov #probability #process #reachability
Maximal Cost-Bounded Reachability Probability on Continuous-Time Markov Decision Processes (HF), pp. 73–87.
STOCSTOC-2014-ChekuriC #polynomial #theorem
Polynomial bounds for the grid-minor theorem (CC, JC), pp. 60–69.
STOCSTOC-2014-DworkTT0 #analysis #component #privacy
Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
STOCSTOC-2014-ElberfeldK #graph
Embedding and canonizing graphs of bounded genus in logspace (ME, KiK), pp. 383–392.
STOCSTOC-2014-EneV #algorithm #approximate #design #network #problem #requirements
Improved approximation algorithms for degree-bounded network design problems with node connectivity requirements (AE, AV), pp. 754–763.
STOCSTOC-2014-FournierLMS #matrix #multi
Lower bounds for depth 4 formulas computing iterated matrix multiplication (HF, NL, GM, SS), pp. 128–135.
STOCSTOC-2014-FriggstadS #algorithm #approximate
Approximation algorithms for regret-bounded vehicle routing and applications to distance-constrained vehicle routing (ZF, CS), pp. 744–753.
STOCSTOC-2014-GavinskyMWW #approach #complexity #composition #towards
Toward better formula lower bounds: an information complexity approach to the KRW composition conjecture (DG, OM, OW, AW), pp. 213–222.
STOCSTOC-2014-GoosP #communication
Communication lower bounds via critical block sensitivity (MG, TP), pp. 847–856.
STOCSTOC-2014-KayalLSS
Super-polynomial lower bounds for depth-4 homogeneous arithmetic formulas (NK, NL, CS, SS), pp. 119–127.
STOCSTOC-2014-KayalSS
A super-polynomial lower bound for regular arithmetic formulas (NK, CS, RS), pp. 146–153.
STOCSTOC-2014-Lovett #communication #rank
Communication is bounded by root of rank (SL), pp. 842–846.
STOCSTOC-2014-Williams #algorithm #linear
New algorithms and lower bounds for circuits with linear threshold gates (RW), pp. 194–202.
TACASTACAS-2014-KroeningT #c #contest #model checking #named
CBMC — C Bounded Model Checker — (Competition Contribution) (DK, MT), pp. 389–391.
TACASTACAS-2014-Siirtola #composition #multi #named #verification
Bounds2: A Tool for Compositional Multi-parametrised Verification (AS), pp. 599–604.
CAVCAV-2014-BinghamL #fault #simulation #using #verification
Verifying Relative Error Bounds Using Symbolic Simulation (JB, JLH), pp. 277–292.
CAVCAV-2014-InversoT0TP #c #concurrent #lazy evaluation #model checking #multi #source code #thread
Bounded Model Checking of Multi-threaded C Programs via Lazy Sequentialization (OI, ET, BF, SLT, GP), pp. 585–602.
CAVCAV-2014-LeeS #abstraction #approximate #reachability #scalability #verification
Unbounded Scalable Verification Based on Approximate Property-Directed Reachability and Datapath Abstraction (SL, KAS), pp. 849–865.
CAVCAV-2014-MadhavanK #functional #source code
Symbolic Resource Bound Inference for Functional Programs (RM, VK), pp. 762–778.
CAVCAV-2014-SinnZV #complexity #scalability #static analysis
A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis (MS, FZ, HV), pp. 745–761.
LICSLICS-CSL-2014-GottlobM #logic #problem
Achieving new upper bounds for the hypergraph duality problem through logic (GG, EM), p. 10.
LICSLICS-CSL-2014-HarwathHS #composition #theorem
Preservation and decomposition theorems for bounded degree structures (FH, LH, NS), p. 10.
LICSLICS-CSL-2014-LerouxPS #automaton
Hyper-Ackermannian bounds for pushdown vector addition systems (JL, MP, GS), p. 10.
ICSTSAT-2014-JarvisaloK
Conditional Lower Bounds for Failed Literals and Related Techniques (MJ, JHK), pp. 75–84.
TAPTAP-2014-HentschelHB #execution #symbolic computation #visualisation
Visualizing Unbounded Symbolic Execution (MH, RH, RB), pp. 82–98.
TAPTAP-2014-KampmannGZ #execution #named #performance #verification
JTACO: Test Execution for Faster Bounded Verification (AK, JPG, AZ), pp. 134–141.
DocEngDocEng-2013-VielMPT
Go beyond boundaries of iTV applications (CCV, ELM, MdGCP, CACT), pp. 263–272.
ICDARICDAR-2013-HePXSN #3d #re-engineering
A Book Dewarping System by Boundary-Based 3D Surface Reconstruction (YH, PP, SX, JS, SN), pp. 403–407.
PODSPODS-2013-KazanaS #first-order #query
Enumeration of first-order queries on classes of structures with bounded expansion (WK, LS), pp. 297–308.
SIGMODSIGMOD-2013-VlachouDNK #algorithm #query
Branch-and-bound algorithm for reverse top-k queries (AV, CD, KN, YK), pp. 481–492.
SIGMODSIGMOD-2013-YakoutBE #automation #scalability
Don’t be SCAREd: use SCalable Automatic REpairing with maximal likelihood and bounded changes (MY, LBE, AKE), pp. 553–564.
VLDBVLDB-2013-AfratiSSU #cost analysis
Upper and Lower Bounds on the Cost of a Map-Reduce Computation (FNA, ADS, SS, JDU), pp. 277–288.
ITiCSEITiCSE-2013-QureshiEP #student
Students organizing against pollution: computational thinking across boundaries (SQ, FE, SMP), p. 356.
SCAMSCAM-2013-MattsenCS
Driving a sound static software analyzer with branch-and-bound (SM, PC, SS), pp. 63–68.
CIAACIAA-2013-JirasekJ #on the #regular expression
On the Boundary of Regular Languages (JJ, GJ), pp. 208–219.
DLTDLT-2013-Blanchet-SadriW #strict
Strict Bounds for Pattern Avoidance (FBS, BW), pp. 106–117.
ICALPICALP-v1-2013-AndoniNPW #linear #sketching
Tight Lower Bound for Linear Sketches of Moments (AA, HLN, YP, YW), pp. 25–32.
ICALPICALP-v1-2013-BunT #approximate
Dual Lower Bounds for Approximate Degree and Markov-Bernstein Inequalities (MB, JT), pp. 303–314.
ICALPICALP-v1-2013-CyganP #algorithm #graph #performance
Faster Exponential-Time Algorithms in Graphs of Bounded Average Degree (MC, MP), pp. 364–375.
ICALPICALP-v1-2013-FilmusLMNV #calculus #comprehension #polynomial #towards
Towards an Understanding of Polynomial Calculus: New Separations and Lower Bounds — (YF, ML, MM, JN, MV), pp. 437–448.
ICALPICALP-v1-2013-KumarMN
Arithmetic Circuit Lower Bounds via MaxRank (MK, GM, JS), pp. 661–672.
ICALPICALP-v1-2013-Lampis #graph #model checking
Model Checking Lower Bounds for Simple Graphs (ML), pp. 673–683.
ICALPICALP-v1-2013-Leonardos #complexity #random #recursion
An Improved Lower Bound for the Randomized Decision Tree Complexity of Recursive Majority, (NL), pp. 696–708.
ICALPICALP-v1-2013-MoruzN #algorithm #random
Improved Space Bounds for Strongly Competitive Randomized Paging Algorithms (GM, AN), pp. 757–768.
ICALPICALP-v2-2013-BecchettiBDKM #complexity #convergence #proving
Physarum Can Compute Shortest Paths: Convergence Proofs and Complexity Bounds (LB, VB, MD, AK, KM), pp. 472–483.
ICALPICALP-v2-2013-MertziosS #evolution #network
Strong Bounds for Evolution in Networks (GBM, PGS), pp. 669–680.
LATALATA-2013-IbarraR #automaton #on the
On Bounded Languages and Reversal-Bounded Automata (OHI, BR), pp. 359–370.
LATALATA-2013-Smith
Infiniteness and Boundedness in 0L, DT0L, and T0L Systems (TS), pp. 535–546.
LATALATA-2013-Tveretina
A Conditional Superpolynomial Lower Bound for Extended Resolution (OT), pp. 559–569.
TLCATLCA-2013-Clairambault #linear #reduction
Bounding Skeletons, Locally Scoped Terms and Exact Bounds for Linear Head Reduction (PC), pp. 109–124.
FDGFDG-2013-CarterG #contest #game studies #online
eSports in EVE Online: Skullduggery, fair play and acceptability in an unbounded competition (MC, MRG), pp. 47–54.
FDGFDG-2013-ConsalvoP #game studies
Welcome to the discourse of the real: Constituting the boundaries of games and players (MC, CAP), pp. 55–62.
CHICHI-2013-ShiXC #network #social #using
Using contextual integrity to examine interpersonal information boundary on social network sites (PS, HX, YC), pp. 35–38.
CSCWCSCW-2013-HalpernEFG #collaboration #design
Designing collaboration: comparing cases exploring cultural probes as boundary-negotiating objects (MKH, IE, LF, GKG), pp. 1093–1102.
CSCWCSCW-2013-HuangDLLG
Meanings and boundaries of scientific software sharing (XH, XD, CPL, TL, NG), pp. 423–434.
HCIHCI-IMT-2013-BraunFMSM #gesture
Context-Based Bounding Volume Morphing in Pointing Gesture Application (AB, AF, AM, CS, MM), pp. 147–156.
ICMLICML-c1-2013-GiguereLMS #algorithm #approach #learning #predict
Risk Bounds and Learning Algorithms for the Regression Approach to Structured Output Prediction (SG, FL, MM, KS), pp. 107–114.
ICMLICML-c1-2013-KumarB #graph #learning
Convex Relaxations for Learning Bounded-Treewidth Decomposable Graphs (KSSK, FRB), pp. 525–533.
ICMLICML-c1-2013-KumarLVV
Near-Optimal Bounds for Cross-Validation via Loss Stability (RK, DL, SV, AV), pp. 27–35.
ICMLICML-c1-2013-MaillardNOR #learning #representation
Optimal Regret Bounds for Selecting the State Representation in Reinforcement Learning (OAM, PN, RO, DR), pp. 543–551.
ICMLICML-c1-2013-MehtaG #predict
Sparsity-Based Generalization Bounds for Predictive Sparse Coding (NAM, AGG), pp. 36–44.
ICMLICML-c3-2013-DurrantK #classification #fault
Sharp Generalization Error Bounds for Randomly-projected Classifiers (RJD, AK), pp. 693–701.
ICMLICML-c3-2013-HonorioJ #exponential #fault
Two-Sided Exponential Concentration Bounds for Bayes Error Rate and Shannon Entropy (JH, TSJ), pp. 459–467.
ICMLICML-c3-2013-PiresSG #classification #multi
Cost-sensitive Multiclass Classification Risk Bounds (BAP, CS, MG), pp. 1391–1399.
ICMLICML-c3-2013-ZhangYJLH #kernel #learning #online
Online Kernel Learning with a Near Optimal Sparsity Bound (LZ, JY, RJ, ML, XH), pp. 621–629.
KDDKDD-2013-NarasimhanA #named #optimisation
SVMpAUCtight: a new support vector method for optimizing partial AUC based on a tight convex upper bound (HN, SA), pp. 167–175.
MLDMMLDM-2013-PrieditisL #classification #performance #problem #using
When Classification becomes a Problem: Using Branch-and-Bound to Improve Classification Efficiency (AP, ML), pp. 466–480.
SIGIRSIGIR-2013-KatoSYI #evaluation #robust
Report from the NTCIR-10 1CLICK-2 Japanese subtask: baselines, upperbounds and evaluation robustness (MPK, TS, TY, MI), pp. 753–756.
SIGIRSIGIR-2013-TakumaY #performance
Faster upper bounding of intersection sizes (DT, HY), pp. 703–712.
OOPSLAOOPSLA-2013-CoonsMM #partial order #reduction
Bounded partial-order reduction (KEC, MM, KSM), pp. 833–848.
HILTHILT-2013-Chaki #model checking
Bounded model checking of high-integrity software (SC), pp. 9–10.
PLDIPLDI-2013-CohenP #towards
Limitations of partial compaction: towards practical bounds (NC, EP), pp. 309–320.
REFSQREFSQ-2013-RempelMKP #overview #requirements #taxonomy #traceability
Requirements Traceability across Organizational Boundaries — A Survey and Taxonomy (PR, PM, TK, IP), pp. 125–140.
ASEASE-2013-ChandramohanTBSP #approach #behaviour #detection #modelling #scalability
A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
ASEASE-2013-ChoDS #composition #model checking #named #source code
BLITZ: Compositional bounded model checking for real-world programs (CYC, VD, DS), pp. 136–146.
ASEASE-2013-FalkeMS #model checking
The bounded model checker LLBMC (SF, FM, CS), pp. 706–709.
SACSAC-2013-BrancoLR #protocol #scalability
Bounded gossip: a gossip protocol for large-scale datacenters (MB, JL, LR), pp. 591–596.
SACSAC-2013-LarrosaR #constraints #distributed #optimisation
Risk-neutral bounded max-sum for distributed constraint optimization (JL, ER), pp. 92–97.
CASECASE-2013-OFlahertyE #learning #sequence
Learning to locomote: Action sequences and switching boundaries (RO, ME), pp. 7–12.
CGOCGO-2013-LaiS #analysis #optimisation #performance
Performance upper bound analysis and optimization of SGEMM on Fermi and Kepler GPUs (JL, AS), p. 10.
DATEDATE-2013-CabodiLV #model checking #optimisation
Optimization techniques for craig interpolant compaction in unbounded model checking (GC, CL, DV), pp. 1417–1422.
DATEDATE-2013-ShahKA #analysis
Bounding SDRAM interference: detailed analysis vs. latency-rate analysis (HS, AK, BA), pp. 308–313.
DATEDATE-2013-TzouBHC #composition #using
Periodic jitter and bounded uncorrelated jitter decomposition using incoherent undersampling (NT, DB, SWH, AC), pp. 1667–1672.
FoSSaCSFoSSaCS-2013-BonnetC
Bounded Context-Switching and Reentrant Locking (RB, RC), pp. 65–80.
STOCSTOC-2013-Ajtai #quantifier
Lower bounds for RAMs and quantifier elimination (MA), pp. 803–812.
STOCSTOC-2013-AzarCKS #online
Tight bounds for online vector bin packing (YA, IRC, SK, FBS), pp. 961–970.
STOCSTOC-2013-BhowmickDL #product line
New bounds for matching vector families (AB, ZD, SL), pp. 823–832.
STOCSTOC-2013-BurgisserI #complexity #geometry
Explicit lower bounds via geometric complexity theory (PB, CI), pp. 141–150.
STOCSTOC-2013-ChakrabartyS13a #testing
Optimal bounds for monotonicity and lipschitz testing over hypercubes and hypergrids (DC, CS), pp. 419–428.
STOCSTOC-2013-FeldmanGRVX #algorithm #clique #detection #statistics
Statistical algorithms and a lower bound for detecting planted cliques (VF, EG, LR, SV, YX), pp. 655–664.
STOCSTOC-2013-GuptaTW #algorithm #graph
Sparsest cut on bounded treewidth graphs: algorithms and hardness results (AG, KT, DW), pp. 281–290.
STOCSTOC-2013-GuruswamiX #algebra #geometry
List decoding reed-solomon, algebraic-geometric, and gabidulin subcodes up to the singleton bound (VG, CX), pp. 843–852.
STOCSTOC-2013-KalaiRR
Delegation for bounded space (YTK, RR, RDR), pp. 565–574.
STOCSTOC-2013-KomargodskiR
Average-case lower bounds for formula size (IK, RR), pp. 171–180.
STOCSTOC-2013-NelsonN
Sparsity lower bounds for dimensionality reducing maps (JN, HLN), pp. 101–110.
STOCSTOC-2013-Sherstov #communication #using
Communication lower bounds using directional derivatives (AAS), pp. 921–930.
TACASTACAS-2013-FalkeMS #c #contest #model checking #named #source code #using
LLBMC: Improved Bounded Model Checking of C Programs Using LLVM — (Competition Contribution) (SF, FM, CS), pp. 623–626.
TACASTACAS-2013-GangeNSSS #constraints #model checking #regular expression
Unbounded Model-Checking with Interpolation for Regular Language Constraints (GG, JAN, PJS, HS, PS), pp. 277–291.
TACASTACAS-2013-MorseCNF #contest
Handling Unbounded Loops with ESBMC 1.20 — (Competition Contribution) (JM, LCC, DN, BF), pp. 619–622.
CAVCAV-2013-AlglaveKT #concurrent #model checking #partial order #performance
Partial Orders for Efficient Bounded Model Checking of Concurrent Software (JA, DK, MT), pp. 141–157.
CAVCAV-2013-FarzanK #named #parallel #static analysis
Duet: Static Analysis for Unbounded Parallelism (AF, ZK), pp. 191–196.
CAVCAV-2013-KomuravelliGCC #abstraction #automation #model checking #smt
Automatic Abstraction in SMT-Based Unbounded Software Model Checking (AK, AG, SC, EMC), pp. 846–862.
CAVCAV-2013-StewartEY #automaton #model checking #polynomial #probability
Upper Bounds for Newton’s Method on Monotone Polynomial Systems, and P-Time Model Checking of Probabilistic One-Counter Automata (AS, KE, MY), pp. 495–510.
CSLCSL-2013-BerkholzKV #logic #quantifier
Bounds for the quantifier depth in finite-variable logics: Alternation hierarchy (CB, AK, OV), pp. 61–80.
CSLCSL-2013-GhasemlooC #proving
Theories for Subexponential-size Bounded-depth Frege Proofs (KG, SAC), pp. 296–315.
ICLPICLP-J-2013-AzizCS #semantics
Stable model semantics for founded bounds (RAA, GC, PJS), pp. 517–532.
ICSTICST-2013-AbadABCFGMMRV #contract #generative #incremental #satisfiability #testing
Improving Test Generation under Rich Contracts by Tight Bounds and Incremental SAT Solving (PA, NA, VSB, DC, MFF, JPG, TSEM, MMM, NR, IV), pp. 21–30.
ICSTICST-2013-HillTB #c++ #named
GrowthTracker: Diagnosing Unbounded Heap Growth in C++ Software (EH, DJT, SB), pp. 134–143.
ISSTAISSTA-2013-BindalBL #concurrent #parallel #source code #testing #thread
Variable and thread bounding for systematic testing of multithreaded programs (SB, SB, AL), pp. 145–155.
ISSTAISSTA-2013-RosnerGBBRPZF #analysis #invariant #parallel #refinement
Parallel bounded analysis in code with rich invariants by refinement of field bounds (NR, JPG, SB, GMB, SPDR, LP, LZ, MFF), pp. 23–33.
LICSLICS-2013-HeimbergKS #normalisation
An Optimal Gaifman Normal Form Construction for Structures of Bounded Degree (LH, DK, NS), pp. 63–72.
LICSLICS-2013-MogaveroMS #behaviour #on the
On the Boundary of Behavioral Strategies (FM, AM, LS), pp. 263–272.
ICSTSAT-2013-Atserias #algebra #problem #proving
The Proof-Search Problem between Bounded-Width Resolution and Bounded-Degree Semi-algebraic Proofs (AA), pp. 1–17.
ICSTSAT-2013-Lauria #proving #rank #theorem
A Rank Lower Bound for Cutting Planes Proofs of Ramsey’s Theorem (ML), pp. 351–364.
ICSTSAT-2013-MisraORS #detection #set
Upper and Lower Bounds for Weak Backdoor Set Detection (NM, SO, VR, SS), pp. 394–402.
SIGMODSIGMOD-2012-FraternaliMT
Top-k bounded diversification (PF, DM, MT), pp. 421–432.
VLDBVLDB-2012-BailisVFHS
Probabilistically Bounded Staleness for Practical Partial Quorums (PB, SV, MJF, JMH, IS), pp. 776–787.
VLDBVLDB-2012-SelkeLB #database
Pushing the Boundaries of Crowd-enabled Databases with Query-driven Schema Expansion (JS, CL, WTB), pp. 538–549.
AFLAFL-J-2011-IbarraS12 #linear
Characterizations of Bounded semilinear Languages by One-Way and Two-Way Deterministic Machines (OHI, SS), pp. 1291–1306.
CIAACIAA-2012-Gusev #automaton #rank
Synchronizing Automata of Bounded Rank (VVG), pp. 171–179.
CIAACIAA-2012-HeamHK #constraints #on the
On Positive TAGED with a Bounded Number of Constraints (PCH, VH, OK), pp. 329–336.
CIAACIAA-2012-ReidenbachS #automaton #nondeterminism
Automata with Modulo Counters and Nondeterministic Counter Bounds (DR, MLS), pp. 361–368.
DLTDLT-2012-CaralpRT #automaton #multi
Visibly Pushdown Automata with Multiplicities: Finiteness and K-Boundedness (MC, PAR, JMT), pp. 226–238.
DLTDLT-2012-FazekasMS
Hairpin Completion with Bounded Stem-Loop (SZF, RM, KST), pp. 428–439.
ICALPICALP-v1-2012-AchlioptasM #random #satisfiability
Unsatisfiability Bounds for Random CSPs from an Energetic Interpolation Method (DA, RMM), pp. 1–12.
ICALPICALP-v1-2012-ChanLN #fault tolerance #metric
Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree (THHC, ML, LN), pp. 182–193.
ICALPICALP-v1-2012-CrowstonJM
Max-Cut Parameterized above the Edwards-Erdős Bound (RC, MJ, MM), pp. 242–253.
ICALPICALP-v1-2012-KapralovP #metric
NNS Lower Bounds via Metric Expansion for l ∞ and EMD (MK, RP), pp. 545–556.
ICALPICALP-v1-2012-Kimmel #quantum
Quantum Adversary (Upper) Bound (SK), pp. 557–568.
ICALPICALP-v1-2012-LaplanteLR #detection #quantum
Classical and Quantum Partition Bound and Detector Inefficiency (SL, VL, JR), pp. 617–628.
ICALPICALP-v1-2012-Marx #multi
A Tight Lower Bound for Planar Multiway Cut with Fixed Number of Terminals (DM), pp. 677–688.
ICALPICALP-v2-2012-AtseriasD #approximate #quantifier
Degree Lower Bounds of Tower-Type for Approximating Formulas with Parity Quantifiers (AA, AD), pp. 67–78.
ICALPICALP-v2-2012-FearnleyS #game studies
Time and Parallelizability Results for Parity Games with Bounded Treewidth (JF, SS), pp. 189–200.
ICALPICALP-v2-2012-KikotKPZ #exponential #query
Exponential Lower Bounds and Separation for Query Rewriting (SK, RK, VVP, MZ), pp. 263–274.
LATALATA-2012-ReidenbachS
Patterns with Bounded Treewidth (DR, MLS), pp. 468–479.
IFMIFM-2012-RochaBCN #comprehension #debugging #model checking #programming #using
Understanding Programming Bugs in ANSI-C Software Using Bounded Model Checking Counter-Examples (HR, RSB, LCC, ADN), pp. 128–142.
SEFMSEFM-2012-ColomboFMP #configuration management #monitoring #named #resource management #runtime #verification
polyLarva: Runtime Verification with Configurable Resource-Aware Monitoring Boundaries (CC, AF, RM, GJP), pp. 218–232.
CHICHI-2012-WisniewskiLW
Fighting for my space: coping mechanisms for sns boundary regulation (PJW, HRL, DW), pp. 609–618.
CSCWCSCW-2012-FredericW #social #social media
Boundary regulation in social media (SF, HW), pp. 769–778.
ICMLICML-2012-FoxT
Bounded Planning in Passive POMDPs (RF, NT), p. 15.
ICMLICML-2012-FreitasSZ #exponential #process
Exponential Regret Bounds for Gaussian Process Bandits with Deterministic Observations (NdF, AJS, MZ), p. 125.
ICMLICML-2012-HoiWZJW #algorithm #kernel #learning #online #performance #scalability
Fast Bounded Online Gradient Descent Algorithms for Scalable Kernel-Based Online Learning (SCHH, JW, PZ, RJ, PW), p. 141.
ICMLICML-2012-JiYLJH #algorithm #fault #learning
A Simple Algorithm for Semi-supervised Learning with Improved Generalization Error Bound (MJ, TY, BL, RJ, JH), p. 110.
ICMLICML-2012-MorvantKR #classification #matrix #multi
PAC-Bayesian Generalization Bound on Confusion Matrix for Multi-Class Classification (EM, SK, LR), p. 158.
ICMLICML-2012-Petrik #approximate #programming #robust
Approximate Dynamic Programming By Minimizing Distributionally Robust Bounds (MP), p. 207.
ICPRICPR-2012-ChenYZZ #detection #network
Detecting occlusion boundaries via saliency network (DC, ZY, GZ, NZ), pp. 2569–2572.
ICPRICPR-2012-LiuSZWBCT #detection
Joint shot boundary detection and key frame extraction (XL, MS, LZ, SW, JB, CC, DT), pp. 2565–2568.
ICPRICPR-2012-SongZJB #robust #video
Robust video stabilization based on bounded path planning (CS, HZ, WJ, YB), pp. 3684–3687.
ICPRICPR-2012-SuYLW #classification #editing #using
Local color editing using color classification and boundary inpainting (ZS, XY, XL, DW), pp. 3196–3199.
ICPRICPR-2012-WangHB #locality
Glass object localization by joint inference of boundary and depth (TW, XH, NB), pp. 3783–3786.
ICPRICPR-2012-ZhangXY #detection #modelling
An improved surround suppression model based on orientation contrast for boundary detection (HZ, BX, JY), pp. 3086–3089.
KDDKDD-2012-ZhangY #community #detection #matrix
Overlapping community detection via bounded nonnegative matrix tri-factorization (YZ, DYY), pp. 606–614.
KRKR-2012-GiacomoLP #calculus #decidability #verification
Bounded Situation Calculus Action Theories and Decidable Verification (GDG, YL, FP).
KRKR-2012-GiordanoMD #model checking
Achieving Completeness in Bounded Model Checking of Action Theories in ASP (LG, AM, DTD).
POPLPOPL-2012-KrishnaswamiBH #functional #higher-order #programming
Higher-order functional reactive programming in bounded space (NRK, NB, JH), pp. 45–58.
QAPLQAPL-2012-PalamidessiS #algebra #constraints #difference #privacy #relational
Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems (CP, MS), pp. 92–105.
ASEASE-2012-NijjarB #smt #using #verification
Unbounded data model verification using SMT solvers (JN, TB), pp. 210–219.
FSEFSE-2012-NearJ #named #verification #web
Rubicon: bounded verification of web applications (JPN, DJ), p. 60.
ICSEICSE-2012-ZhouXZ #named #polynomial #search-based
Stride: Search-based deterministic replay in polynomial time via bounded linkage (JZ, XX, CZ), pp. 892–902.
SACSAC-2012-El-ShambakeyR #concurrent #embedded #manycore #realtime #trade-off
STM concurrency control for multicore embedded real-time software: time bounds and tradeoffs (MES, BR), pp. 1602–1609.
SACSAC-2012-OliveiraCS #on the #using
On using adversary simulators to obtain tight lower bounds for response times (RSdO, AC, RAS), pp. 1573–1579.
SACSAC-2012-ShahidPO
Minimum bounding boxes for regular cross-polytopes (SS, SP, CBO), pp. 879–884.
CASECASE-2012-KehoeBG #adaptation
Estimating part tolerance bounds based on adaptive Cloud-based grasp planning with slip (BK, DB, KG), pp. 1106–1113.
CASECASE-2012-ParkM #behaviour #clustering #hybrid #linear #performance #tool support
Performance bounds for hybrid flow lines: Fundamental behavior, practical features and application to linear cluster tools (KP, JRM), pp. 371–376.
CCCC-2012-ShirakoSFPRSS
Analytical Bounds for Optimal Tile Size Selection (JS, KS, NF, LNP, JR, PS, VS), pp. 101–121.
CGOCGO-2012-HasabnisMS
Light-weight bounds checking (NH, AM, RS), pp. 135–144.
DACDAC-2012-El-ShambakeyR #concurrent #embedded #realtime
STM concurrency control for embedded real-time software with tighter time bounds (MES, BR), pp. 437–446.
DATEDATE-2012-AxerSE #probability
Probabilistic response time bound for CAN messages with arbitrary deadlines (PA, MS, RE), pp. 1114–1117.
DATEDATE-2012-ShahRK #scheduling #using
Bounding WCET of applications using SDRAM with Priority Based Budget Scheduling in MPSoCs (HS, AR, AK), pp. 665–670.
PDPPDP-2012-BoukedjarLB #branch #cpu #gpu #parallel
Parallel Branch and Bound on a CPU-GPU System (AB, MEL, DEB), pp. 392–398.
STOCSTOC-2012-AgrawalSSS
Jacobian hits circuits: hitting-sets, lower bounds for depth-D occur-k formulas & depth-3 transcendence degree-k circuits (MA, CS, RS, NS), pp. 599–614.
STOCSTOC-2012-BeameBI #trade-off
Time-space tradeoffs in resolution: superpolynomial lower bounds for superlinear space (PB, CB, RI), pp. 213–232.
STOCSTOC-2012-BulanekKS #online #problem
Tight lower bounds for the online labeling problem (JB, MK, MES), pp. 1185–1198.
STOCSTOC-2012-ChanP #analysis #fourier #network
Tight bounds for monotone switching networks via fourier analysis (SMC, AP), pp. 495–504.
STOCSTOC-2012-FioriniMPTW #exponential #linear
Linear vs. semidefinite extended formulations: exponential separation and strong lower bounds (SF, SM, SP, HRT, RdW), pp. 95–106.
STOCSTOC-2012-GalHKPV
Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates (AG, KAH, MK, PP, EV), pp. 479–494.
STOCSTOC-2012-GiakkoupisW #random
A tight RMR lower bound for randomized mutual exclusion (GG, PW), pp. 983–1002.
STOCSTOC-2012-WoodruffZ #distributed #functional #monitoring
Tight bounds for distributed functional monitoring (DPW, QZ), pp. 941–960.
TACASTACAS-2012-BouajjaniE #analysis #message passing #source code
Bounded Phase Analysis of Message-Passing Programs (AB, ME), pp. 451–465.
TACASTACAS-2012-CordeiroMNF #contest #model checking
Context-Bounded Model Checking with ESBMC 1.17 — (Competition Contribution) (LCC, JM, DN, BF), pp. 534–537.
TACASTACAS-2012-CoxSC #precise #verification
A Bit Too Precise? Bounded Verification of Quantized Digital Filters (AC, SS, BYEC), pp. 33–47.
TACASTACAS-2012-DSilvaHKT #analysis #learning
Numeric Bounds Analysis with Conflict-Driven Learning (VD, LH, DK, MT), pp. 48–63.
TACASTACAS-2012-SinzMF #contest #model checking #named #representation
LLBMC: A Bounded Model Checker for LLVM’s Intermediate Representation — (Competition Contribution) (CS, FM, SF), pp. 542–544.
CAVCAV-2012-HagueL #analysis #parallel #source code #thread
Synchronisation- and Reversal-Bounded Analysis of Multithreaded Programs with Counters (MH, AWL), pp. 260–276.
CAVCAV-2012-Moskal #c #infinity #verification
From C to Infinity and Back: Unbounded Auto-active Verification with VCC (MM), p. 6.
CSLCSL-2012-BertrandFS #satisfiability
Bounded Satisfiability for PCTL (NB, JF, SS), pp. 92–106.
CSLCSL-2012-DudderMRU #combinator #logic
Bounded Combinatory Logic (BD, MM, JR, PU), pp. 243–258.
CSLCSL-2012-Kuroda #axiom #concept #proving
Axiomatizing proof tree concepts in Bounded Arithmetic (SK), pp. 440–454.
ICSTICST-2012-CadavidBS #metamodelling #modelling
Searching the Boundaries of a Modeling Space to Test Metamodels (JJC, BB, HAS), pp. 131–140.
ICSTICST-2012-LiuNT #case study #smt #using #verification
Bounded Program Verification Using an SMT Solver: A Case Study (TL, MN, MT), pp. 101–110.
IJCARIJCAR-2012-EmmerKKSV #model checking #word
EPR-Based Bounded Model Checking at Word Level (ME, ZK, KK, CS, AV), pp. 210–224.
IJCARIJCAR-2012-SpielmannK #synthesis
Synthesis for Unbounded Bit-Vector Arithmetic (AS, VK), pp. 499–513.
LICSLICS-2012-BartoKW #constraints
Near Unanimity Constraints Have Bounded Pathwidth Duality (LB, MK, RW), pp. 125–134.
LICSLICS-2012-Berkholz #game studies #testing
Lower Bounds for Existential Pebble Games and k-Consistency Tests (CB), pp. 25–34.
LICSLICS-2012-BundalaOW #model checking #on the
On the Magnitude of Completeness Thresholds in Bounded Model Checking (DB, JO, JW), pp. 155–164.
LICSLICS-2012-EsparzaGM #verification
A Perfect Model for Bounded Verification (JE, PG, RM), pp. 285–294.
LICSLICS-2012-GrigorieffV #algorithm #using
Functionals Using Bounded Information and the Dynamics of Algorithms (SG, PV), pp. 345–354.
ICSTSAT-2012-AchlioptasM #algorithm #exponential #random #satisfiability
Exponential Lower Bounds for DPLL Algorithms on Satisfiable Random 3-CNF Formulas (DA, RMM), pp. 327–340.
TAPTAP-2012-BengoleaAMF #test coverage #testing #using
Using Coverage Criteria on RepOK to Reduce Bounded-Exhaustive Test Suites (VSB, NA, DM, MFF), pp. 19–34.
PODSPODS-2011-JowhariST #problem
Tight bounds for Lp samplers, finding duplicates in streams, and related problems (HJ, MS, GT), pp. 49–58.
ITiCSEITiCSE-2011-MarkhamB #twitter #using
Collaborating across international boundaries: using twitter as a tool in the classroom (SM, SB), p. 382.
ICSMEICSM-2011-YazdanshenasM #component
Crossing the boundaries while analyzing heterogeneous component-based software systems (ARY, LM), pp. 193–202.
DLTDLT-J-2009-BealBP11 #automaton #clustering #polynomial #word
A Quadratic Upper Bound on the Size of a Synchronizing Word in One-Cluster Automata (MPB, MVB, DP), pp. 277–288.
DLTDLT-J-2009-Petersen11 #simulation
Simulations by Time-Bounded Counter Machines (HP), pp. 395–409.
AFLAFL-2011-IbarraS #linear
Characterizations of Bounded Semilinear Languages by One-Way and Two-way Deterministic Machines (OHI, SS), pp. 211–224.
DLTDLT-2011-KortelainenS #context-free grammar
There Does Not Exist a Minimal Full Trio with Respect to Bounded Context-Free Languages (JK, TS), pp. 312–323.
ICALPICALP-v1-2011-AdlerKKLST #graph
Tight Bounds for Linkages in Planar Graphs (IA, SGK, PKK, DL, SS, DMT), pp. 110–121.
ICALPICALP-v1-2011-BeyersdorffGLR
Parameterized Bounded-Depth Frege Is Not Optimal (OB, NG, ML, AAR), pp. 630–641.
ICALPICALP-v1-2011-BordewichK #agile #graph #set
Rapid Mixing of Subset Glauber Dynamics on Graphs of Bounded Tree-Width (MB, RJK), pp. 533–544.
ICALPICALP-v1-2011-CliffordJ #integer #multi #online
Lower Bounds for Online Integer Multiplication and Convolution in the Cell-Probe Model (RC, MJ), pp. 593–604.
ICALPICALP-v1-2011-FilmusPS #exponential
Exponential Lower Bounds for AC0-Frege Imply Superpolynomial Frege Lower Bounds (YF, TP, RS), pp. 618–629.
ICALPICALP-v1-2011-HarkinsH #algorithm #game studies #learning
Exact Learning Algorithms, Betting Games, and Circuit Lower Bounds (RCH, JMH), pp. 416–423.
ICALPICALP-v1-2011-KawarabayashiKS #approximate #distance #graph
Linear-Space Approximate Distance Oracles for Planar, Bounded-Genus and Minor-Free Graphs (KiK, PNK, CS), pp. 135–146.
ICALPICALP-v1-2011-MagniezNSX #complexity #random #recursion
Improved Bounds for the Randomized Decision Tree Complexity of Recursive Majority (FM, AN, MS, DX), pp. 317–329.
ICALPICALP-v1-2011-Zhang #communication #complexity #on the #power of #quantum
On the Power of Lower Bound Methods for One-Way Quantum Communication Complexity (SZ), pp. 49–60.
ICALPICALP-v2-2011-BrazdilKKV #analysis #probability #recursion #runtime #source code
Runtime Analysis of Probabilistic Programs with Unbounded Recursion (TB, SK, AK, IHV), pp. 319–331.
ICALPICALP-v2-2011-BrihayeDGORW #automaton #hybrid #on the #reachability
On Reachability for Hybrid Automata over Bounded Time (TB, LD, GG, JO, JFR, JW), pp. 416–427.
ICALPICALP-v2-2011-HalldorssonM #distributed #scheduling
Nearly Optimal Bounds for Distributed Wireless Scheduling in the SINR Model (MMH, PM), pp. 625–636.
ICALPICALP-v2-2011-SchmitzS #multi #recursion
Multiply-Recursive Upper Bounds with Higman’s Lemma (SS, PS), pp. 441–452.
LATALATA-2011-Quaas #automaton #on the #problem
On the Interval-Bound Problem for Weighted Timed Automata (KQ), pp. 452–464.
FMFM-2011-AlbertGGJST #behaviour #concurrent #simulation #worst-case
Simulating Concurrent Behaviors with Worst-Case Cost Bounds (EA, SG, MGZ, EBJ, RS, SLTT), pp. 353–368.
FMFM-2011-DiosP #certification #memory management #polynomial
Certification of Safe Polynomial Memory Bounds (JdD, RP), pp. 184–199.
RTARTA-2011-DurandS #linear
Left-linear Bounded TRSs are Inverse Recognizability Preserving (ID, MS), pp. 361–376.
SEFMSEFM-2011-MorseCNF #ltl #model checking
Context-Bounded Model Checking of LTL Properties for ANSI-C Software (JM, LCC, DN, BF), pp. 302–317.
SEFMSEFM-2011-ParrinoGGF #analysis #data flow #satisfiability #verification
A Dataflow Analysis to Improve SAT-Based Bounded Program Verification (BCP, JPG, DG, MFF), pp. 138–154.
ICFPICFP-2011-WeirichYS
Binders unbound (SW, BAY, TS), pp. 333–345.
CHICHI-2011-KuznetsovTKHPS
Breaking boundaries: strategies for mentoring through textile computing workshops (SK, LCT, CK, IH, EP, DPS), pp. 2957–2966.
CHICHI-2011-ZhouAZ
CPOE workarounds, boundary objects, and assemblages (XZ, MSA, KZ), pp. 3353–3362.
CAiSECAiSE-2011-Finkelstein #challenge #information management #re-engineering
Ten Open Challenges at the Boundaries of Software Engineering and Information Systems (AF), p. 1.
ICEISICEIS-v1-2011-ChenZ #analysis
Analysis on the Spatial Variation of the Center of Gravity of Inbound Tourism in China (YC, HZ), pp. 441–447.
CIKMCIKM-2011-LiuLH #fault #kernel #learning
Learning kernels with upper bounds of leave-one-out error (YL, SL, YH), pp. 2205–2208.
CIKMCIKM-2011-LvZ #normalisation
Lower-bounding term frequency normalization (YL, CZ), pp. 7–16.
ICMLICML-2011-JegelkaB11a #approximate #using
Approximation Bounds for Inference using Cooperative Cuts (SJ, JAB), pp. 577–584.
ICMLICML-2011-LiuI #difference #using
Bounding the Partition Function using Holder’s Inequality (QL, ATI), pp. 849–856.
ICMLICML-2011-MarlinKM #modelling
Piecewise Bounds for Estimating Bernoulli-Logistic Latent Gaussian Models (BMM, MEK, KPM), pp. 633–640.
ICMLICML-2011-RoyLM #polynomial #source code
From PAC-Bayes Bounds to Quadratic Programs for Majority Votes (JFR, FL, MM), pp. 649–656.
ICMLICML-2011-Scott #classification
Surrogate losses and regret bounds for cost-sensitive classification with example-dependent costs (CS), pp. 153–160.
KDDKDD-2011-IfrimW #biology #classification #coordination #predict #sequence
Bounded coordinate-descent for biological sequence classification in high dimensional predictor space (GI, CW), pp. 708–716.
KDDKDD-2011-RaissiP #towards
Towards bounding sequential patterns (CR, JP), pp. 1379–1387.
MLDMMLDM-2011-AlshukriCZ #detection #incremental #random #using
Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
PEPMPEPM-2011-Rinard #probability #program analysis #program transformation #source code
Probabilistic accuracy bounds for perforated programs: a new foundation for program analysis and transformation (MCR), pp. 79–80.
POPLPOPL-2011-BenderskyP #memory management
Space overhead bounds for dynamic memory management with partial compaction (AB, EP), pp. 475–486.
POPLPOPL-2011-EmmiQR #scheduling
Delay-bounded scheduling (ME, SQ, ZR), pp. 411–422.
SASSAS-2011-MonniauxG #fixpoint #model checking #using
Using Bounded Model Checking to Focus Fixpoint Iterations (DM, LG), pp. 369–385.
SASSAS-2011-ZulegerGSV #abstraction #analysis #imperative #source code
Bound Analysis of Imperative Programs with the Size-Change Abstraction (FZ, SG, MS, HV), pp. 280–297.
RERE-2011-UbayashiKHT #analysis #embedded
A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
ASEASE-2011-IvancicBGSMTIM #framework #named #scalability #verification
DC2: A framework for scalable, scope-bounded software verification (FI, GB, AG, SS, NM, HT, TI, YM), pp. 133–142.
ICSEICSE-2011-CordeiroF #concurrent #model checking #multi #smt #thread #using #verification
Verifying multi-threaded software using smt-based context-bounded model checking (LC, BF), pp. 331–340.
CASECASE-2011-WuS #multi #problem
A lower and upper bound guided nested partitions method for solving capacitated multi-level production planning problems (TW, LS), pp. 78–83.
CCCC-2011-JoynerBS #analysis #array
Subregion Analysis and Bounds Check Elimination for High Level Arrays (MJ, ZB, VS), pp. 246–265.
DACDAC-2011-HaoTSS #analysis #performance #process
Performance bound analysis of analog circuits considering process variations (ZH, SXDT, RS, GS), pp. 310–315.
DACDAC-2011-HsiaoD #parallel #scalability
A highly scalable parallel boundary element method for capacitance extraction (YCH, LD), pp. 552–557.
DATEDATE-2011-LuHCT
Steiner tree based rotary clock routing with bounded skew and capacitive load balancing (JL, VH, XC, BT), pp. 455–460.
DATEDATE-2011-ShahRK #latency #performance
Priority division: A high-speed shared-memory bus arbitration with bounded latency (HS, AR, AK), pp. 1497–1500.
DATEDATE-2011-TsaiLCKCK #on the
On routing fixed escaped boundary pins for high speed boards (TYT, RJL, CYC, CYK, HMC, YK), pp. 461–466.
STOCSTOC-2011-AdamaszekCER #order
Almost tight bounds for reordering buffer management (AA, AC, ME, HR), pp. 607–616.
STOCSTOC-2011-BarakDYW #design #geometry #matrix #rank
Rank bounds for design matrices with applications toc ombinatorial geometry and locally correctable codes (BB, ZD, AY, AW), pp. 519–528.
STOCSTOC-2011-ChakrabartiR #communication #complexity
An optimal lower bound on the communication complexity of gap-hamming-distance (AC, OR), pp. 51–60.
STOCSTOC-2011-FriedmannHZ #algorithm #random
Subexponential lower bounds for randomized pivoting rules for the simplex algorithm (OF, TDH, UZ), pp. 283–292.
STOCSTOC-2011-LeeS
Near-optimal distortion bounds for embedding doubling spaces into L1 (JRL, AS), pp. 765–772.
STOCSTOC-2011-LenzenW #parallel #random
Tight bounds for parallel randomized load balancing: extended abstract (CL, RW), pp. 11–20.
STOCSTOC-2011-SaxenaS #matter #testing
Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn’t matter (NS, CS), pp. 431–440.
STOCSTOC-2011-Yoshida #algorithm #approximate #csp
Optimal constant-time approximation algorithms and (unconditional) inapproximability results for every bounded-degree CSP (YY), pp. 665–674.
TACASTACAS-2011-Ehlers #named #synthesis
Unbeast: Symbolic Bounded Synthesis (RE), pp. 272–275.
CADECADE-2011-KorovinV #linear
Solving Systems of Linear Inequalities by Bound Propagation (KK, AV), pp. 369–383.
CAVCAV-2011-BrazdilKK #analysis #performance #probability #source code
Efficient Analysis of Probabilistic Programs with an Unbounded Counter (TB, SK, AK), pp. 208–224.
CAVCAV-2011-KroeningOSWW #linear #model checking
Linear Completeness Thresholds for Bounded Model Checking (DK, JO, OS, TW, JW), pp. 557–572.
CSLCSL-2011-CaiZ
Tight Upper Bounds for Streett and Parity Complementation (YC, TZ), pp. 112–128.
ISSTAISSTA-2011-NijjarB #modelling #ruby #verification
Bounded verification of Ruby on Rails data models (JN, TB), pp. 67–77.
LICSLICS-2011-FigueiraFSS #recursion
Ackermannian and Primitive-Recursive Bounds with Dickson’s Lemma (DF, SF, SS, PS), pp. 269–278.
ICSTSAT-2011-Williams #algorithm #complexity #satisfiability
Connecting SAT Algorithms and Complexity Lower Bounds (RW), pp. 1–2.
TAPTAP-2011-AguirreBFG #black box #generative #test coverage #testing
Incorporating Coverage Criteria in Bounded Exhaustive Black Box Test Generation of Structural Inputs (NA, VSB, MFF, JPG), pp. 15–32.
AFLAFL-J-2008-MalcherMP10 #array
Sublinearly Space Bounded Iterative Arrays (AM, CM, BP), pp. 843–858.
DLTDLT-2010-BremerF #problem
Inclusion Problems for Patterns with a Bounded Number of Variables (JB, DDF), pp. 100–111.
DLTDLT-2010-DrosteV #automaton #logic #multi #theorem
Kleene and Büchi Theorems for Weighted Automata and Multi-valued Logics over Arbitrary Bounded Lattices (MD, HV), pp. 160–172.
ICALPICALP-v1-2010-GreveJLT #approximate
Cell Probe Lower Bounds and Approximations for Range Mode (MG, AGJ, KDL, JT), pp. 605–616.
ICALPICALP-v2-2010-Fearnley #exponential #policy
Exponential Lower Bounds for Policy Iteration (JF), pp. 551–562.
ICALPICALP-v2-2010-OuaknineW #formal method #towards #verification
Towards a Theory of Time-Bounded Verification (JO, JW), pp. 22–37.
LATALATA-2010-FlorencioF #approach #consistency
Finding Consistent Categorial Grammars of Bounded Value: A Parameterized Approach (CCF, HF), pp. 202–213.
LATALATA-2010-Neary
A Boundary between Universality and Non-universality in Extended Spiking Neural P Systems (TN), pp. 475–487.
RTARTA-2010-DurandSS #linear #term rewriting #termination
Termination of linear bounded term rewriting systems (ID, GS, MS), pp. 341–356.
RTARTA-2010-Waldmann #matrix
Polynomially Bounded Matrix Interpretations (JW), pp. 357–372.
FLOPSFLOPS-2010-KetemaS #diagrams #term rewriting #λ-calculus
Least Upper Bounds on the Size of Church-Rosser Diagrams in Term Rewriting and λ-Calculus (JK, JGS), pp. 272–287.
CHICHI-2010-AarhusB
Negotiating boundaries: managing disease at home (RA, SAB), pp. 1223–1232.
CHICHI-2010-AssogbaD #named #programming
Share: a programming environment for loosely bound cooperation (YA, JSD), pp. 961–970.
CHICHI-2010-DantecE #information management #multi
Across boundaries of influence and accountability: the multiple scales of public sector information systems (CALD, WKE), pp. 113–122.
CIKMCIKM-2010-XiaoLC #concept
K-farthest-neighbors-based concept boundary determination for support vector data description (YX, BL, LC), pp. 1701–1704.
ECIRECIR-2010-AnderkaSP #similarity #why
Cross-Language High Similarity Search: Why No Sub-linear Time Bound Can Be Expected (MA, BS, MP), pp. 640–644.
ICMLICML-2010-CortesMR10a #kernel #learning
Generalization Bounds for Learning Kernels (CC, MM, AR), pp. 247–254.
ICMLICML-2010-SorgSL
Internal Rewards Mitigate Agent Boundedness (JS, SPS, RLL), pp. 1007–1014.
ICMLICML-2010-SzitaS #complexity #learning #modelling
Model-based reinforcement learning with nearly tight exploration complexity bounds (IS, CS), pp. 1031–1038.
ICPRICPR-2010-BaldacciBD #3d #algorithm #design #framework #graph #segmentation
Oriented Boundary Graph: A Framework to Design and Implement 3D Segmentation Algorithms (FB, AJPB, JPD), pp. 1116–1119.
ICPRICPR-2010-BauerEOBKFHN #approach #estimation #graph #performance #robust
A Fast and Robust Graph-Based Approach for Boundary Estimation of Fiber Bundles Relying on Fractional Anisotropy Maps (MHAB, JE, TO, SB, JK, BF, HKH, CN), pp. 4016–4019.
ICPRICPR-2010-DurrantK #performance
A Bound on the Performance of LDA in Randomly Projected Data Spaces (RJD, AK), pp. 4044–4047.
ICPRICPR-2010-KhosrowabadiQWA #detection #recognition #self #using
EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
ICPRICPR-2010-PhamTN #segmentation #similarity #using
Bounding-Box Based Segmentation with Single Min-cut Using Distant Pixel Similarity (VQP, KT, TN), pp. 4420–4423.
ICPRICPR-2010-ZhangK #analysis
Weighted Boundary Points for Shape Analysis (JZ, RK), pp. 1598–1601.
KDDKDD-2010-PrengerLVCH #classification #fault
Class-specific error bounds for ensemble classifiers (RJP, TDL, KRV, BYC, WGH), pp. 843–852.
KRKR-2010-PichlerRSW #constraints #programming
Tractable Answer-Set Programming with Weight Constraints: Bounded Treewidth Is not Enough (RP, SR, SS, SW).
KRKR-2010-ZhangZ #on the #semantics #set #source code
On the Progression Semantics and Boundedness of Answer Set Programs (YZ, YZ).
SIGIRSIGIR-2010-WangLC #detection #query
Intent boundary detection in search query logs (CJW, KHYL, HHC), pp. 749–750.
MODELSMoDELS-v2-2010-ParetoEE #architecture #design
Architectural Descriptions as Boundary Objects in System and Design Work (LP, PE, SE), pp. 406–419.
SPLCSPLC-2010-ElsnerULS #consistency #product line
Consistent Product Line Configuration across File Type and Product Line Boundaries (CE, PU, DL, WSP), pp. 181–195.
PEPMPEPM-2010-AndersonK #approximate #termination
Regular approximation and bounded domains for size-change termination (HA, SCK), pp. 53–62.
PLDIPLDI-2010-GulwaniZ #problem
The reachability-bound problem (SG, FZ), pp. 292–304.
SASSAS-2010-AliasDFG #complexity #multi #ranking #source code #termination
Multi-dimensional Rankings, Program Termination, and Complexity Bounds of Flowchart Programs (CA, AD, PF, LG), pp. 117–133.
ASEASE-2010-HeJBGW #approach #model checking #statistics
A bounded statistical approach for model checking of unbounded until properties (RH, PJ, SB, APG, HW), pp. 225–234.
ICSEICSE-2010-Cordeiro #concurrent #embedded #model checking #multi #smt #thread
SMT-based bounded model checking for multi-threaded software in embedded systems (LC), pp. 373–376.
ICSEICSE-2010-YangL #approach #verification
A cut-off approach for bounded verification of parameterized systems (QY, ML), pp. 345–354.
SACSAC-2010-CampanTC
User-controlled generalization boundaries for p-sensitive k-anonymity (AC, TMT, NC), pp. 1103–1104.
CASECASE-2010-Hsu #markov #safety
Control of continuous-time Markov chains with safety upper bounds (SPH), pp. 990–993.
CASECASE-2010-MacwanNB #approach #multi #novel #online #predict #probability
On-line target-motion prediction for autonomous multirobot search in realistic terrains with time-expanding boundaries: A novel probabilistic approach (AM, GN, BB), pp. 662–667.
CASECASE-2010-WuZ #clustering #petri net #process #scheduling #tool support
Petri net-based scheduling of time-constrained dual-arm cluster tools with bounded activity time variation (NW, MZ), pp. 465–470.
DACDAC-2010-Breuer #hardware
Hardware that produces bounded rather than exact results (MAB), pp. 871–876.
DACDAC-2010-LinLHC #constraints
Performance-driven analog placement considering boundary constraint (CWL, JML, CPH, SJC), pp. 292–297.
DACDAC-2010-LiuKLC #concurrent #multi #thread
Multi-threaded collision-aware global routing with bounded-length maze routing (WHL, WCK, YLL, KYC), pp. 200–205.
DATEDATE-2010-BuLWCL #composition #hybrid #linear #reachability
BACH 2 : Bounded reachability checker for compositional linear hybrid systems (LB, YL, LW, XC, XL), pp. 1512–1517.
DATEDATE-2010-SchlieckerNE #analysis #multi #performance
Bounding the shared resource load for the performance analysis of multiprocessor systems (SS, MN, RE), pp. 759–764.
LCTESLCTES-2010-AltmeyerMR #analysis
Resilience analysis: tightening the CRPD bound for set-associative caches (SA, CM, JR), pp. 153–162.
ESOPESOP-2010-NaumannB #first-order #higher-order #information management
Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions (DAN, AB), pp. 2–22.
FoSSaCSFoSSaCS-2010-WiesZH #analysis #process
Forward Analysis of Depth-Bounded Processes (TW, DZ, TAH), pp. 94–108.
STOCSTOC-2010-BateniHM #approximate #graph
Approximation schemes for steiner forest on planar graphs and graphs of bounded treewidth (MB, MH, DM), pp. 211–220.
STOCSTOC-2010-ChierichettiLP
Almost tight bounds for rumour spreading with conductance (FC, SL, AP), pp. 399–408.
STOCSTOC-2010-DiakonikolasHKMRST #polynomial
Bounding the average sensitivity and noise sensitivity of polynomial threshold functions (ID, PH, AK, RM, PR, RAS, LYT), pp. 533–542.
STOCSTOC-2010-Hirai #multi #problem
The maximum multiflow problems with bounded fractionality (HH), pp. 115–120.
STOCSTOC-2010-KarninMSV #multi #testing
Deterministic identity testing of depth-4 multilinear circuits with bounded top fan-in (ZSK, PM, AS, IV), pp. 649–658.
STOCSTOC-2010-Patrascu #polynomial #problem #towards
Towards polynomial lower bounds for dynamic problems (MP), pp. 603–610.
STOCSTOC-2010-Raz
Tensor-rank and lower bounds for arithmetic formulas (RR), pp. 659–666.
STOCSTOC-2010-Sherstov
Optimal bounds for sign-representing the intersection of two halfspaces by polynomials (AAS), pp. 523–532.
STOCSTOC-2010-VerbinZ #memory management
The limits of buffering: a tight lower bound for dynamic membership in the external memory model (EV, QZ), pp. 447–456.
STOCSTOC-2010-Williams
Improving exhaustive search implies superpolynomial lower bounds (RW), pp. 231–240.
TACASTACAS-2010-MalinowskiN #automaton #model checking #partial order #satisfiability #semantics
SAT Based Bounded Model Checking with Partial Order Semantics for Timed Automata (JM, PN), pp. 405–419.
CAVCAV-2010-BouajjaniDERS #invariant #source code #synthesis
Invariant Synthesis for Programs Manipulating Lists with Unbounded Data (AB, CD, CE, AR, MS), pp. 72–88.
CAVCAV-2010-Ehlers #synthesis
Symbolic Bounded Synthesis (RE), pp. 365–379.
CAVCAV-2010-GantyMM #approximate
Bounded Underapproximations (PG, RM, BM), pp. 600–614.
CAVCAV-2010-Seth #automaton #multi #reachability
Global Reachability in Bounded Phase Multi-stack Pushdown Systems (AS), pp. 615–628.
CAVCAV-2010-ZhouHWG #array #on the
On Array Theory of Bounded Elements (MZ, FH, BYW, MG), pp. 570–584.
ISSTAISSTA-2010-GaleottiRPF #analysis #invariant #performance #verification
Analysis of invariants for efficient bounded verification (JPG, NR, CLP, MFF), pp. 25–36.
LICSLICS-2010-JenkinsORW #automaton
Alternating Timed Automata over Bounded Time (MJ, JO, AR, JW), pp. 60–69.
LICSLICS-2010-KreutzerT #complexity #higher-order #logic #monad
Lower Bounds for the Complexity of Monadic Second-Order Logic (SK, ST), pp. 189–198.
ICSTSAT-2010-Ben-SassonJ #learning #strict
Lower Bounds for Width-Restricted Clause Learning on Small Width Formulas (EBS, JJ), pp. 16–29.
ICSTSAT-2010-BoufkhadH #satisfiability
Non Uniform Selection of Solutions for Upper Bounding the 3-SAT Threshold (YB, TH), pp. 99–112.
ICSTSAT-2010-MillerKLB #design #encoding #model checking
Encoding Techniques, Craig Interpolants and Bounded Model Checking for Incomplete Designs (CM, SK, MDTL, BB), pp. 194–208.
ICSTSAT-2010-RathiARS #random #satisfiability
Bounds on Threshold of Regular Random k-SAT (VR, EA, LKR, MS), pp. 264–277.
VMCAIVMCAI-2010-ChadhaLPV #complexity #realtime #verification
Complexity Bounds for the Verification of Real-Time Software (RC, AL, PP, MV), pp. 95–111.
VMCAIVMCAI-2010-Dubrovin #reachability
Checking Bounded Reachability in Asynchronous Systems by Symbolic Event Tracing (JD), pp. 146–162.
DRRDRR-2009-TaghvaC #analysis #documentation #using
Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
ICDARICDAR-2009-LiuBMG #detection #fault #sequence
Improving the Table Boundary Detection in PDFs by Fixing the Sequence Error of the Sparse Lines (YL, KB, PM, CLG), pp. 1006–1010.
ICDARICDAR-2009-SharmaL
Form Field Frame Boundary Removal for Form Processing System in Gurmukhi Script (DVS, GSL), pp. 256–260.
ICDARICDAR-2009-WangC #detection #documentation #image
Logo Detection in Document Images Based on Boundary Extension of Feature Rectangles (HW, YC), pp. 1335–1339.
PODSPODS-2009-BerindeCIS #fault
Space-optimal heavy hitters with strong error bounds (RB, GC, PI, MJS), pp. 157–166.
PODSPODS-2009-GottlobLV #query
Size and treewidth bounds for conjunctive queries (GG, STL, GV), pp. 45–54.
PODSPODS-2009-Yi #query
Dynamic indexability and lower bounds for dynamic one-dimensional range query indexes (KY), pp. 187–196.
VLDBVLDB-2009-MoerkotteNS #estimation #fault
Preventing Bad Plans by Bounding the Impact of Cardinality Estimation Errors (GM, TN, GS), pp. 982–993.
WCREWCRE-1999-PassingSLP99a #named
NTrace: Function Boundary Tracing for Windows on IA-32 (JP, AS, MvL, AP), pp. 43–52.
DLTDLT-2009-BealP #automaton #clustering #polynomial #word
A Quadratic Upper Bound on the Size of a Synchronizing Word in One-Cluster Automata (MPB, DP), pp. 81–90.
DLTDLT-2009-GruberH #complexity #regular expression
Tight Bounds on the Descriptional Complexity of Regular Expressions (HG, MH), pp. 276–287.
DLTDLT-2009-Petersen #simulation
Simulations by Time-Bounded Counter Machines (HP), pp. 410–418.
DLTDLT-2009-Shur
Two-Sided Bounds for the Growth Rates of Power-Free Languages (AMS), pp. 466–477.
ICALPICALP-v1-2009-Amano #approximate
Bounds on the Size of Small Depth Circuits for Approximating Majority (KA), pp. 59–70.
ICALPICALP-v1-2009-BansalCPK #scalability
Improved Bounds for Speed Scaling in Devices Obeying the Cube-Root Rule (NB, HLC, KP, DK), pp. 144–155.
ICALPICALP-v1-2009-BuhrmanFS
Unconditional Lower Bounds against Advice (HB, LF, RS), pp. 195–209.
ICALPICALP-v1-2009-ElsasserS #multi #random
Tight Bounds for the Cover Time of Multiple Random Walks (RE, TS), pp. 415–426.
ICALPICALP-v1-2009-GuhaH #order #random #theorem
Revisiting the Direct Sum Theorem and Space Lower Bounds in Random Order Streams (SG, ZH), pp. 513–524.
ICALPICALP-v1-2009-MastrolilliS #scheduling
Improved Bounds for Flow Shop Scheduling (MM, OS), pp. 677–688.
ICALPICALP-v2-2009-BlumensathOW #finite #higher-order #monad #word
Boundedness of Monadic Second-Order Formulae over Finite Words (AB, MO, MW), pp. 67–78.
ICALPICALP-v2-2009-ColcombetZ #automaton
A Tight Lower Bound for Determinization of Transition Labeled Büchi Automata (TC, KZ), pp. 151–162.
LATALATA-2009-Bollig #complexity #integer #multi
Larger Lower Bounds on the OBDD Complexity of Integer Multiplication (BB), pp. 212–223.
LATALATA-2009-GauwinNT #concurrent #query
Bounded Delay and Concurrency for Earliest Query Answering (OG, JN, ST), pp. 350–361.
LATALATA-2009-ItoLM
Bounded Hairpin Completion (MI, PL, VM), pp. 434–445.
FMFM-2009-BonakdarpourK #complexity #on the
On the Complexity of Synthesizing Relaxed and Graceful Bounded-Time 2-Phase Recovery (BB, SSK), pp. 660–675.
FMFM-2009-HarrisKCJR #data flow #process #verification
Verifying Information Flow Control over Unbounded Processes (WRH, NK, SC, SJ, TWR), pp. 773–789.
FMFM-2009-JostLHSH #analysis #using
“Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
FMFM-2009-PradellaMP #encoding #metric #model checking
A Metric Encoding for Bounded Model Checking (MP, AM, PSP), pp. 741–756.
FMFM-2009-ShaoKP #approach #formal method #incremental #lightweight #using
An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
IFMIFM-2009-Cook #hardware #synthesis
Taming the Unbounded for Hardware Synthesis (BC), p. 39.
RTARTA-2009-BursucC #algebra #protocol #security
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions (SB, HCL), pp. 133–147.
TLCATLCA-2009-LagoH #linear #logic #revisited
Bounded Linear Logic, Revisited (UDL, MH), pp. 80–94.
DiGRADiGRA-2009-IhamakiT #comprehension #game studies #mobile
Understanding 21st Century's Mobile Device-Based Games within Boundaries (PI, PT).
HCIHIMI-DIE-2009-ShinPC #detection
Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs (IS, NDP, HC), pp. 619–627.
ICMLICML-2009-Cesa-BianchiGO #classification #robust
Robust bounds for classification via selective sampling (NCB, CG, FO), pp. 121–128.
ICMLICML-2009-ReidW
Surrogate regret bounds for proper losses (MDR, RCW), pp. 897–904.
PLDIPLDI-2009-GulwaniJK #analysis #control flow #invariant #refinement
Control-flow refinement and progress invariants for bound analysis (SG, SJ, EK), pp. 375–385.
PLDIPLDI-2009-NagarakatteZMZ #c #memory management #named #safety
SoftBound: highly compatible and complete spatial memory safety for c (SN, JZ, MMKM, SZ), pp. 245–258.
PLDIPLDI-2009-PetrankMS #parallel #source code
Progress guarantee for parallel programs via bounded lock-freedom (EP, MM, BS), pp. 144–154.
SASSAS-2009-NiedzielskiRGP #constraints #control flow
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination (DN, JvR, AG, KP), pp. 137–153.
ASEASE-2009-CordeiroFM #embedded #model checking #smt
SMT-Based Bounded Model Checking for Embedded ANSI-C Software (LCC, BF, JMS), pp. 137–148.
SACSAC-2009-ManuchSS #self
Two lower bounds for self-assemblies at temperature 1 (JM, LS, CS), pp. 808–809.
SACSAC-2009-YipH #consistency #constraints
Length-lex bound consistency for knapsack constraints (JY, PVH), pp. 1397–1401.
DACDAC-2009-FeySD #fault tolerance #using
Computing bounds for fault tolerance using formal techniques (GF, AS, RD), pp. 190–195.
DATEDATE-2009-FahmyRJ #distributed #memory management #multi #on the #realtime #transaction
On bounding response times under software transactional memory in distributed multiprocessor real-time systems (SFF, BR, EDJ), pp. 688–693.
DATEDATE-2009-GuoS #design #distributed #optimisation #using
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
DATEDATE-2009-PollexKAS #worst-case
Improved worst-case response-time calculations by upper-bound conditions (VP, SK, KA, FS), pp. 105–110.
FASEFASE-2009-JagannathLDM #cost analysis #testing
Reducing the Costs of Bounded-Exhaustive Testing (VJ, YYL, BD, DM), pp. 171–185.
FoSSaCSFoSSaCS-2009-KupfermanP #automaton
Lower Bounds on Witnesses for Nonemptiness of Universal Co-Büchi Automata (OK, NP), pp. 182–196.
FoSSaCSFoSSaCS-2009-Schewe #automaton #nondeterminism
Tighter Bounds for the Determinisation of Büchi Automata (SS), pp. 167–181.
STOCSTOC-2009-BateniCG
MaxMin allocation via degree lower-bounded arborescences (MB, MC, VG), pp. 543–552.
STOCSTOC-2009-DietzfelbingerW
Tight lower bounds for greedy routing in uniform small world rings (MD, PW), pp. 591–600.
STOCSTOC-2009-Viola #data type
Bit-probe lower bounds for succinct data structures (EV), pp. 475–482.
TACASTACAS-2009-AtigBQ #analysis #concurrent #source code #thread
Context-Bounded Analysis for Concurrent Programs with Dynamic Creation of Threads (MFA, AB, SQ), pp. 107–123.
TACASTACAS-2009-NaumovichBG #named #performance #petri net
ITPN-PerfBound: A Performance Bound Tool for Interval Time Petri Nets (EPN, SB, MG), pp. 50–53.
CAVCAV-2009-FuhrmannH #induction #on the #proving
On Extending Bounded Proofs to Inductive Proofs (OF, SH), pp. 278–290.
CAVCAV-2009-Gulwani #analysis #complexity #named
SPEED: Symbolic Complexity Bound Analysis (SG), pp. 51–62.
CAVCAV-2009-TorreMP #concurrent #reachability
Reducing Context-Bounded Concurrent Reachability to Sequential Reachability (SLT, PM, GP), pp. 477–492.
CSLCSL-2009-GaboardiP #semantics #using
Upper Bounds on Stream I/O Using Semantic Interpretations (MG, RP), pp. 271–286.
CSLCSL-2009-KuskeL #automation #revisited
Automatic Structures of Bounded Degree Revisited (DK, ML), pp. 364–378.
ICSTICST-2009-PostS #equivalence #functional #implementation #model checking #proving #using
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking (HP, CS), pp. 31–40.
LICSLICS-2009-CaiZL #automaton
An Improved Lower Bound for the Complementation of Rabin Automata (YC, TZ, HL), pp. 167–176.
LICSLICS-2009-Friedmann #algorithm #exponential #game studies
An Exponential Lower Bound for the Parity Game Strategy Improvement Algorithm as We Know it (OF), pp. 145–156.
LICSLICS-2009-Kahlon #communication #decidability #thread
Boundedness vs. Unboundedness of Lock Chains: Characterizing Decidability of Pairwise CFL-Reachability for Threads Communicating via Locks (VK), pp. 27–36.
ICSTSAT-2009-AtseriasFT #algorithm
Clause-Learning Algorithms with Many Restarts and Bounded-Width Resolution (AA, JKF, MT), pp. 114–127.
ICSTSAT-2009-Goldberg
Boundary Points and Resolution (EG), pp. 147–160.
ICSTSAT-2009-Johannsen #exponential #learning #strict
An Exponential Lower Bound for Width-Restricted Clause Learning (JJ), pp. 128–140.
ICSTSAT-2009-LarrosaNOR #branch #generative #optimisation
Branch and Bound for Boolean Optimization and the Generation of Optimality Certificates (JL, RN, AO, ERC), pp. 453–466.
TAPTAP-2009-Rapin #execution #model checking #symbolic computation
Symbolic Execution Based Model Checking of Open Systems with Unbounded Variables (NR), pp. 137–152.
VMCAIVMCAI-2009-Oshman #model checking
An Automata-Theoretic Dynamic Completeness Criterion for Bounded Model-Checking (RO), pp. 275–289.
VMCAIVMCAI-2009-WimmerBB #generative #markov #model checking #using
Counterexample Generation for Discrete-Time Markov Chains Using Bounded Model Checking (RW, BB, BB), pp. 366–380.
WICSAWICSA-2008-LagoACK #architecture #community
Wishes and Boundaries for a Software Architecture Knowledge Community (PL, PA, RC, PK), pp. 271–274.
SIGMODSIGMOD-2008-GemullaL
Sampling time-based sliding windows in bounded space (RG, WL), pp. 379–392.
SIGMODSIGMOD-2008-NavlakhaRS #fault #graph #summary
Graph summarization with bounded error (SN, RR, NS), pp. 419–432.
AFLAFL-2008-MalcherMP #array
Sublinearly Space Bounded Iterative Arrays (AM, CM, BP), pp. 292–301.
DLTDLT-2008-CrochemoreFIJ #string
Bounds on Powers in Strings (MC, SZF, CSI, IJ), pp. 206–215.
DLTDLT-2008-HromkovicS #automaton #nondeterminism #on the #proving
On the Hardness of Determining Small NFA’s and of Proving Lower Bounds on Their Sizes (JH, GS), pp. 34–55.
ICALPICALP-A-2008-BansalCLL #scheduling
Scheduling for Speed Bounded Processors (NB, HLC, TWL, LKL), pp. 409–420.
ICALPICALP-A-2008-BjorklundHKK #graph #problem
The Travelling Salesman Problem in Bounded Degree Graphs (AB, TH, PK, MK), pp. 198–209.
ICALPICALP-A-2008-ChildsL #order #quantum
Optimal Quantum Adversary Lower Bounds for Ordered Search (AMC, TL), pp. 869–880.
ICALPICALP-A-2008-GuhaM #multi
Tight Lower Bounds for Multi-pass Stream Computation Via Pass Elimination (SG, AM), pp. 760–772.
ICALPICALP-A-2008-KaleS #graph
An Expansion Tester for Bounded Degree Graphs (SK, CS), pp. 527–538.
ICALPICALP-A-2008-KempeRUW #fault tolerance #quantum
Upper Bounds on the Noise Threshold for Fault-Tolerant Quantum Computing (JK, OR, FU, RdW), pp. 845–856.
ICALPICALP-A-2008-Saxena #testing
Diagonal Circuit Identity Testing and Lower Bounds (NS), pp. 60–71.
ICALPICALP-C-2008-GoyalJPS #encryption #policy
Bounded Ciphertext Policy Attribute Based Encryption (VG, AJ, OP, AS), pp. 579–591.
ICALPICALP-C-2008-WehnerW #composition #security
Composable Security in the Bounded-Quantum-Storage Model (SW, JW), pp. 604–615.
LATALATA-2008-ArrighiNW #automaton #finite #quantum
One-Dimensional Quantum Cellular Automata over Finite, Unbounded Configurations (PA, VN, RFW), pp. 64–75.
LATALATA-2008-KorpM #dependence #proving #term rewriting #termination
Match-Bounds with Dependency Pairs for Proving Termination of Rewrite Systems (MK, AM), pp. 321–332.
LATALATA-2008-Mercer #automaton #finite #quantum
Lower Bounds for Generalized Quantum Finite Automata (MM), pp. 373–384.
LATALATA-2008-Perekrestenko #np-hard
Minimalist Grammars with Unbounded Scrambling and Nondiscriminating Barriers Are NP-Hard (AP), pp. 421–432.
FMFM-2008-BonakdarpourK #fault
Masking Faults While Providing Bounded-Time Phased Recovery (BB, SSK), pp. 374–389.
SEFMSEFM-2008-PhamTTC #algorithm #java #memory management #performance
A Fast Algorithm to Compute Heap Memory Bounds of Java Card Applets (THP, AHT, NTT, WNC), pp. 259–267.
ICEISICEIS-ISAS2-2008-AlencarSAFF #approach #branch
Maximizing the Business Value of Software Projects — A Branch & Bound Approach (AJA, EAS, EPdA, MCF, ALF), pp. 162–169.
CIKMCIKM-2008-LiuMG #detection #documentation #identification
Identifying table boundaries in digital documents via sparse line detection (YL, PM, CLG), pp. 1311–1320.
ICMLICML-2008-GomesWP #memory management #modelling #topic
Memory bounded inference in topic models (RG, MW, PP), pp. 344–351.
ICMLICML-2008-OrabonaKC #kernel
The projectron: a bounded kernel-based Perceptron (FO, JK, BC), pp. 720–727.
ICPRICPR-2008-AlliliZ #approach #segmentation
An approach for dynamic combination of region and boundary information in segmentation (MSA, DZ), pp. 1–4.
ICPRICPR-2008-KadarBS #detection #evolution #image #programming #search-based
Evolving boundary detectors for natural images via Genetic Programming (IK, OBS, MS), pp. 1–4.
ICPRICPR-2008-MuraiF #detection #using #video
Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
ICPRICPR-2008-PohK #authentication #fault #multimodal #on the #using
On using error bounds to optimize cost-sensitive multimodal biometric authentication (NP, JK), pp. 1–4.
ICPRICPR-2008-WangTHW #using
Object boundary extraction using Active B-Snake Model (YW, EKT, ZH, JGW), pp. 1–4.
ICPRICPR-2008-WimmerHS #classification
Implicit active shape model employing boundary classifier (AW, JH, GS), pp. 1–4.
SEKESEKE-2008-ParkK #automaton #constraints #lts #model checking #using
Using Boolean Cardinality Constraint for LTS Bounded Model Checking (SP, GK), pp. 537–542.
SEKESEKE-2008-PatroneR #logic #programming language
Sharing Application Logic Across Programming Language Boundaries (DSP, BR), pp. 227–231.
SIGIRSIGIR-2008-Diaz08b #empirical #metric #robust #similarity
Theoretical bounds on and empirical robustness of score regularization to different similarity measures (FDD), pp. 809–810.
ECOOPECOOP-2008-HuangHBR #hardware #object-oriented #programming
Liquid Metal: Object-Oriented Programming Across the Hardware/Software Boundary (SSH, AH, DFB, RMR), pp. 76–103.
PEPMPEPM-2008-Mu #algorithm #problem
Maximum segment sum is back: deriving algorithms for two segment problems with bounded lengths (SCM), pp. 31–39.
PEPMPEPM-2008-PopeeaXC #array #precise
A practical and precise inference and specializer for array bound checks elimination (CP, DNX, WNC), pp. 177–187.
PEPMPEPM-2008-PuchingerS #automation #source code
Automating branch-and-bound for dynamic programs (JP, PJS), pp. 81–89.
SASSAS-2008-AlbertAGP #automation #cost analysis
Automatic Inference of Upper Bounds for Recurrence Relations in Cost Analysis (EA, PA, SG, GP), pp. 221–237.
ASEASE-2008-PostSKG #abstract interpretation #model checking
Reducing False Positives by Combining Abstract Interpretation and Bounded Model Checking (HP, CS, AK, TG), pp. 188–197.
ASEASE-2008-PradellaMP #realtime #satisfiability #specification
Refining Real-Time System Specifications through Bounded Model- and Satisfiability-Checking (MP, AM, PSP), pp. 119–127.
FSEFSE-2008-LivshitsK #named #web
Doloto: code splitting for network-bound web 2.0 applications (VBL, EK), pp. 350–360.
ICSEICSE-2008-FritschSSC #adaptation
Time-bounded adaptation for automotive system software (SF, AS, DCS, SC), pp. 571–580.
SACSAC-2008-Andersson #scheduling
The utilization bound of uniprocessor preemptive slack-monotonic scheduling is 50% (BA), pp. 281–283.
ASPLOSASPLOS-2008-DeviettiBMZ #architecture #c #named #programming language #safety
Hardbound: architectural support for spatial safety of the C programming language (JD, CB, MMKM, SZ), pp. 103–114.
DACDAC-2008-GuptaK
Bounded-lifetime integrated circuits (PG, ABK), pp. 347–348.
ISMMISMM-2008-ChinNPQ #low level #memory management #source code
Analysing memory resource bounds for low-level programs (WNC, HHN, CP, SQ), pp. 151–160.
ESOPESOP-2008-TerauchiM #linear #programming
Inferring Channel Buffer Bounds Via Linear Programming (TT, AM), pp. 284–298.
FoSSaCSFoSSaCS-2008-GruberJ #communication #complexity #regular expression #using
Optimal Lower Bounds on Regular Expression Size Using Communication Complexity (HG, JJ), pp. 273–286.
STOCSTOC-2008-AttiyaHW #problem
Tight rmr lower bounds for mutual exclusion and other problems (HA, DH, PW), pp. 217–226.
STOCSTOC-2008-BansalKN #design #network
Additive guarantees for degree bounded directed network design (NB, RK, VN), pp. 769–778.
STOCSTOC-2008-CaiCL #exclamation #polynomial #problem
A quadratic lower bound for the permanent and determinant problem over any characteristic != 2 (JyC, XC, DL), pp. 491–498.
STOCSTOC-2008-ChakrabartiCM #communication #robust
Robust lower bounds for communication and stream computation (AC, GC, AM), pp. 641–650.
STOCSTOC-2008-ChoiK #complexity #graph #query
Optimal query complexity bounds for finding graphs (SSC, JHK), pp. 749–758.
STOCSTOC-2008-DinurGKS #morphism
Decodability of group homomorphisms beyond the johnson bound (ID, EG, SK, MS), pp. 275–284.
STOCSTOC-2008-DvirSY #trade-off
Hardness-randomness tradeoffs for bounded depth arithmetic circuits (ZD, AS, AY), pp. 741–748.
STOCSTOC-2008-JainKN #communication #complexity #theorem
Direct product theorems for classical communication complexity via subdistribution bounds: extended abstract (RJ, HK, AN), pp. 599–608.
STOCSTOC-2008-LauS #approximate #design #network
Additive approximation for bounded degree survivable network design (LCL, MS), pp. 759–768.
STOCSTOC-2008-Rao #game studies #parallel
Parallel repetition in projection games and a concentration bound (AR), pp. 1–10.
STOCSTOC-2008-Raz
Elusive functions and lower bounds for arithmetic circuits (RR), pp. 711–720.
STOCSTOC-2008-Sherstov #communication #matrix #quantum
The pattern matrix method for lower bounds on quantum communication (AAS), pp. 85–94.
TACASTACAS-2008-LalTKR #analysis #concurrent #interprocedural #source code
Interprocedural Analysis of Concurrent Programs Under a Context Bound (AL, TT, NK, TWR), pp. 282–298.
TACASTACAS-2008-TorreMP #analysis #concurrent #queue
Context-Bounded Analysis of Concurrent Queue Systems (SLT, PM, GP), pp. 299–314.
CAVCAV-2008-LalR #analysis #concurrent
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis (AL, TWR), pp. 37–51.
CSLCSL-2008-BeyersdorffM
A Tight Karp-Lipton Collapse Result in Bounded Arithmetic (OB, SM), pp. 199–214.
CSLCSL-2008-Eisinger #automaton #integer #linear
Upper Bounds on the Automata Size for Integer and Mixed Real and Integer Linear Arithmetic (JE), pp. 431–445.
CSLCSL-2008-PiskacK #linear
Fractional Collections with Cardinality Bounds, and Mixed Linear Arithmetic with Stars (RP, VK), pp. 124–138.
ICLPICLP-2008-SchulteS #dynamic analysis
Dynamic Analysis of Bounds Versus Domain Propagation (CS, PJS), pp. 332–346.
IJCARIJCAR-2008-Melquiond #proving
Proving Bounds on Real-Valued Functions with Computations (GM), pp. 2–17.
LICSLICS-2008-Moschovakis #axiom
The Axiomatic Derivation of Absolute Lower Bounds (YNM), p. 405.
ICSTSAT-2008-KottlerKS08a #np-hard #satisfiability #subclass #using
A New Bound for an NP-Hard Subclass of 3-SAT Using Backdoors (SK, MK, CS), pp. 161–167.
TAPTAP-2008-DunetsSR #analysis #data type #relational
Bounded Relational Analysis of Free Data Types (AD, GS, WR), pp. 99–115.
PODSPODS-2007-GottlobPW #datalog #finite #monad
Monadic datalog over finite structures with bounded treewidth (GG, RP, FW), pp. 165–174.
PODSPODS-2007-Schweikardt #modelling #query
Machine models and lower bounds for query processing (NS), pp. 41–52.
VLDBVLDB-2007-RastogiHS #privacy
The Boundary Between Privacy and Utility in Data Publishing (VR, SH, DS), pp. 531–542.
DLTDLT-2007-MalcherP #complexity #context-free grammar
Descriptional Complexity of Bounded Context-Free Languages (AM, GP), pp. 312–323.
ICALPICALP-2007-BjorklundB
Bounded Depth Data Trees (HB, MB), pp. 862–874.
ICALPICALP-2007-BozzelliT #automaton #parametricity #problem
Decision Problems for Lower/Upper Bound Parametric Timed Automata (LB, SLT), pp. 925–936.
ICALPICALP-2007-GuhaM #estimation #multi #streaming
Lower Bounds for Quantile Estimation in Random-Order and Multi-pass Streaming (SG, AM), pp. 704–715.
ICALPICALP-2007-IwamaNRY #communication #complexity #quantum
Unbounded-Error One-Way Classical and Quantum Communication Complexity (KI, HN, RR, SY), pp. 110–121.
ICALPICALP-2007-KreutzerOS #monad
Boundedness of Monadic FO over Acyclic Structures (SK, MO, NS), pp. 571–582.
ICALPICALP-2007-MontanaroW #communication #complexity #quantum
A Lower Bound on Entanglement-Assisted Quantum Communication Complexity (AM, AJW), pp. 122–133.
LATALATA-2007-Thorne #finite
Categorial Module Grammars of Bounded Size have Finite Bounded Density (CT), pp. 577–588.
RTARTA-2007-KorpM #proving #term rewriting #termination #using
Proving Termination of Rewrite Systems Using Bounds (MK, AM), pp. 273–287.
CoGCIG-2007-OommenGP #finite #game studies #probability #using
Using Stochastic AI Techniques to Achieve Unbounded Resolution in Finite Player Goore Games and its Applications (BJO, OCG, AP), pp. 161–167.
DiGRADiGRA-2007-StromE #case study #industrial #interactive #network
The unbound network of product and service interaction of the MMOG industry: with a case study of China (PS, ME).
HCIHCI-MIE-2007-DerakhshiK #fuzzy #network #predict #sequence #using #word
Using Recurrent Fuzzy Neural Networks for Predicting Word Boundaries in a Phoneme Sequence in Persian Language (MRFD, MRK), pp. 50–59.
ICMLICML-2007-Hanneke #complexity #learning
A bound on the label complexity of agnostic active learning (SH), pp. 353–360.
ICMLICML-2007-Shah
Sample compression bounds for decision trees (MS), pp. 799–806.
MLDMMLDM-2007-SaittaRS #clustering
A Bounded Index for Cluster Validity (SS, BR, IFCS), pp. 174–187.
PLDIPLDI-2007-MusuvathiQ #parallel #source code #testing #thread
Iterative context bounding for systematic testing of multithreaded programs (MM, SQ), pp. 446–455.
SACSAC-2007-Armendariz-InigoJMDM #database #flexibility #protocol #replication
k-bound GSI: a flexible database replication protocol (JEAI, JRJR, JRGdM, HD, FDME), pp. 556–560.
SACSAC-2007-SausenSLP #multi #network
Bounded-distance multi-coverage backbones in wireless sensor networks (PSS, MAS, AMNdL, AP), pp. 203–208.
DACDAC-2007-ZhouLS #embedded #hybrid #multi #performance #using
Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
DATEDATE-2007-GrosseKD #functional #model checking
Estimating functional coverage in bounded model checking (DG, UK, RD), pp. 1176–1181.
DATEDATE-2007-SathanurCBMMP #clustering #interactive #performance
Interactive presentation: Efficient computation of discharge current upper bounds for clustered sleep transistor sizing (AVS, AC, LB, AM, EM, MP), pp. 1544–1549.
PDPPDP-2007-MezmazMT #approach #branch #parallel
A Grid-based Parallel Approach of the Multi-Objective Branch and Bound (MSM, NM, EGT), pp. 23–30.
FoSSaCSFoSSaCS-2007-MarnetteKR #constraints #polynomial #set
Polynomial Constraints for Sets with Cardinality Bounds (BM, VK, MCR), pp. 258–273.
FoSSaCSFoSSaCS-2007-MuschollW #composition #web #web service
A Lower Bound on Web Services Composition (AM, IW), pp. 274–286.
STOCSTOC-2007-AttiyaC #random
Tight bounds for asynchronous randomized consensus (HA, KC), pp. 155–164.
STOCSTOC-2007-BeameJR #algorithm #random
Lower bounds for randomized read/write stream algorithms (PB, TSJ, AR), pp. 689–698.
STOCSTOC-2007-LinialS #communication #complexity
Lower bounds in communication complexity based on factorization norms (NL, AS), pp. 699–708.
STOCSTOC-2007-Patrascu #2d
Lower bounds for 2-dimensional range counting (MP), pp. 40–46.
STOCSTOC-2007-Santhanam
Circuit lower bounds for Merlin-Arthur classes (RS), pp. 275–283.
STOCSTOC-2007-SinghL #approximate
Approximating minimum bounded degree spanning trees to within one of optimal (MS, LCL), pp. 661–670.
TACASTACAS-2007-YuCL #diagrams #reachability #using
Bounded Reachability Checking of Asynchronous Systems Using Decision Diagrams (AJY, GC, GL), pp. 648–663.
CADECADE-2007-GieslTSS #proving #termination
Proving Termination by Bounded Increase (JG, RT, SS, PSK), pp. 443–459.
CADECADE-2007-PerezV #effectiveness #encoding #logic #ltl #model checking
Encodings of Bounded LTL Model Checking in Effectively Propositional Logic (JANP, AV), pp. 346–361.
CAVCAV-2007-BouajjaniFQ #analysis #parallel #source code #thread
Context-Bounded Analysis of Multithreaded Programs with Dynamic Linked Structures (AB, SF, SQ), pp. 207–220.
CAVCAV-2007-ChakiSV #verification
Verification Across Intellectual Property Boundaries (SC, CS, HV), pp. 82–94.
CAVCAV-2007-MalerNP #on the
On Synthesizing Controllers from Bounded-Response Properties (OM, DN, AP), pp. 95–107.
CSLCSL-2007-Burel #deduction
Unbounded Proof-Length Speed-Up in Deduction Modulo (GB), pp. 496–511.
ICLPICLP-2007-NavasMLH #analysis #logic programming #source code
User-Definable Resource Bounds Analysis for Logic Programs (JAN, EM, PLG, MVH), pp. 348–363.
LICSLICS-2007-Schopp #logic
Stratified Bounded Affine Logic for Logarithmic Space (US), pp. 411–420.
ICSTSAT-2007-BubeckB #preprocessor
Bounded Universal Expansion for Preprocessing QBF (UB, HKB), pp. 244–257.
ICSTSAT-2007-Kojevnikov #linear
Improved Lower Bounds for Tree-Like Resolution over Linear Inequalities (AK), pp. 70–79.
ICSTSAT-2007-LangloisST
Horn Upper Bounds and Renaming (ML, RHS, GT), pp. 80–93.
FATESTestCom-FATES-2007-PapSKN #algorithm #finite #generative #incremental #state machine #testing
A Bounded Incremental Test Generation Algorithm for Finite State Machines (ZP, MS, GK, GÁN), pp. 244–259.
VMCAIVMCAI-2007-PeronH #abstract domain #constraints #matrix
An Abstract Domain Extending Difference-Bound Matrices with Disequality Constraints (MP, NH), pp. 268–282.
TPDLECDL-2006-Butterworth #design #library #network #social
Designing Digital Library Resources for Users in Sparse, Unbounded Social Networks (RB), pp. 184–195.
PODSPODS-2006-GottlobPW #database #design
Tractable database design through bounded treewidth (GG, RP, FW), pp. 124–133.
PODSPODS-2006-GroheHS #random #scalability #set
Randomized computations on large data sets: tight lower bounds (MG, AH, NS), pp. 243–252.
ICSMEICSM-2006-GoldHLM #approach #concept #source code #using
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
CIAACIAA-2006-GalvezSF #linear #lookahead #parsing
Shift-Resolve Parsing: Simple, Unbounded Lookahead, Linear Time (JFG, SS, JF), pp. 253–264.
DLTDLT-2006-BellP #matrix
Lowering Undecidability Bounds for Decision Questions in Matrices (PB, IP), pp. 375–385.
DLTDLT-2006-GruberH #complexity #nondeterminism
Finding Lower Bounds for Nondeterministic State Complexity Is Hard (HG, MH), pp. 363–374.
DLTDLT-2006-ItoLS
Closure of Language Classes Under Bounded Duplication (MI, PL, KST), pp. 238–247.
ICALPICALP-v1-2006-BaierEHKSS
Length-Bounded Cuts and Flows (GB, TE, AH, EK, HS, MS), pp. 679–690.
ICALPICALP-v1-2006-CaragiannisFKKM
Tight Bounds for Selfish and Greedy Load Balancing (IC, MF, CK, PK, LM), pp. 311–322.
ICALPICALP-v1-2006-CarrollGM #graph
Embedding Bounded Bandwidth Graphs into l1 (DEC, AG, AM), pp. 27–37.
ICALPICALP-v1-2006-ChaudhuriRRT #algorithm #approximate
A Push-Relabel Algorithm for Approximating Degree Bounded MSTs (KC, SR, SR, KT), pp. 191–201.
ICALPICALP-v1-2006-Golynski #rank
Optimal Lower Bounds for Rank and Select Indexes (AG), pp. 370–381.
ICALPICALP-v1-2006-KojevnikovI #calculus #proving
Lower Bounds of Static Lovász-Schrijver Calculus Proofs for Tseitin Tautologies (AK, DI), pp. 323–334.
ICALPICALP-v1-2006-Wolf #matrix #quantum
Lower Bounds on Matrix Rigidity Via a Quantum Argument (RdW), pp. 62–71.
ICALPICALP-v2-2006-HarnikN #hybrid #on the #security
On Everlasting Security in the Hybrid Bounded Storage Model (DH, MN), pp. 192–203.
ICALPICALP-v2-2006-Pietrzak
A Tight Bound for EMAC (KP), pp. 168–179.
ICALPICALP-v2-2006-Yan #automaton
Lower Bounds for Complementation of ω-Automata Via the Full Automata Technique (QY), pp. 589–600.
FMFM-2006-BouquetDL #automation #generative #ml #specification #testing
Automated Boundary Test Generation from JML Specifications (FB, FD, BL), pp. 428–443.
RTARTA-2006-LevySV #higher-order #unification
Bounded Second-Order Unification Is NP-Complete (JL, MSS, MV), pp. 400–414.
FLOPSFLOPS-2006-Avery #analysis #termination
Size-Change Termination and Bound Analysis (JA), pp. 192–207.
ICMLICML-2006-Banerjee #on the
On Bayesian bounds (AB), pp. 81–88.
ICMLICML-2006-MoghaddamWA
Generalized spectral bounds for sparse LDA (BM, YW, SA), pp. 641–648.
ICMLICML-2006-PandaCW #concept #detection
Concept boundary detection for speeding up SVMs (NP, EYC, GW), pp. 681–688.
ICPRICPR-v1-2006-KatsoulasK #image
Box-like Superquadric Recovery in Range Images by Fusing Region and Boundary Information (DK, DIK), pp. 719–722.
ICPRICPR-v1-2006-LiHS #approach #image #machine learning
A Machine Learning Approach for Locating Boundaries of Liver Tumors in CT Images (YL, SH, KS), pp. 400–403.
ICPRICPR-v2-2006-ChenH #composition #image #segmentation
Boundary correction for total variation regularized L^1 function with applications to image decomposition and segmentation (TC, TSH), pp. 316–319.
ICPRICPR-v2-2006-SaragihG #fault
Iterative Error Bound Minimisation for AAM Alignment (JS, RG), pp. 1192–1195.
SEKESEKE-2006-OgataKF
Falsification of OTSs by Searches of Bounded Reachable State Spaces (KO, WK, KF), pp. 440–445.
ASEASE-2006-DengLR #execution #named #symbolic computation
Bogor/Kiasan: A k-bounded Symbolic Execution for Checking Strong Heap Properties of Open Systems (XD, JL, R), pp. 157–166.
ICSEICSE-2006-DhurjatiA #array #c
Backwards-compatible array bounds checking for C with very low overhead (DD, VSA), pp. 162–171.
SACSAC-2006-Capron #static analysis
Static analysis of time bounded reactive properties of Boolean symbols (GC), pp. 1827–1834.
SACSAC-2006-FangG #dataset
Boundary surface extraction and rendering for volume datasets (SF, PG), pp. 1356–1360.
SACSAC-2006-MeerWA #composition #interactive #performance
Efficient interactive configuration of unbounded modular systems (ERvdM, AW, HRA), pp. 409–414.
SACSAC-2006-WuRJ #embedded #energy #on the #realtime
On bounding energy consumption in dynamic, embedded real-time systems (HW, BR, EDJ), pp. 933–934.
ASPLOSASPLOS-2006-ChuangNVSBPCC #memory management #transaction
Unbounded page-based transactional memory (WC, SN, GV, JS, MVB, GP, BC, OC), pp. 347–358.
DACDAC-2006-AwedhS #automation #invariant #model checking
Automatic invariant strengthening to prove properties in bounded model checking (MA, FS), pp. 1073–1076.
DACDAC-2006-PeranandamNRWKR #performance
Fast falsification based on symbolic bounded property checking (PMP, PKN, JR, RJW, TK, WR), pp. 1077–1082.
DACDAC-2006-WangZ
Optimal jumper insertion for antenna avoidance under ratio upper-bound (JW, HZ), pp. 761–766.
DACDAC-2006-WuH #constraints #equivalence #mining
Mining global constraints for improving bounded sequential equivalence checking (WW, MSH), pp. 743–748.
DATEDATE-2006-ChakrabortySDMMP #optimisation
Thermal resilient bounded-skew clock tree optimization methodology (AC, PS, KD, AM, EM, MP), pp. 832–837.
HPDCHPDC-2006-DjerrahCCR #framework #optimisation #problem
Bob++: Framework for Solving Optimization Problems with Branch-and-Bound methods (AD, BLC, VDC, CR), pp. 369–370.
PDPPDP-2006-DortaLR #analysis #performance
Performance Analysis of Branch-and-Bound Skeletons (ID, CL, CR), pp. 75–82.
PPoPPPPoPP-2006-BrevikNW #parallel #predict
Predicting bounds on queuing delay for batch-scheduled parallel machines (JB, DN, RW), pp. 110–118.
STOCSTOC-2006-AmbainisSW #quantum #theorem #trade-off
A new quantum lower bound method, : with applications to direct product theorems and time-space tradeoffs (AA, RS, RdW), pp. 618–633.
STOCSTOC-2006-Antonakopoulos #performance #protocol
Fast leader-election protocols with bounded cheaters’ edge (SA), pp. 187–196.
STOCSTOC-2006-ColeG #set
Searching dynamic point sets in spaces with bounded doubling dimension (RC, LAG), pp. 574–583.
STOCSTOC-2006-DinurFKO #fourier #on the
On the fourier tails of bounded functions over the discrete cube (ID, EF, GK, RO), pp. 437–446.
STOCSTOC-2006-GavinskyKRW #communication #complexity #exponential #identification #quantum
Bounded-error quantum state identification and exponential separations in communication complexity (DG, JK, OR, RdW), pp. 594–603.
STOCSTOC-2006-Gurvits #algorithm #approach #proving
Hyperbolic polynomials approach to Van der Waerden/Schrijver-Valiant like conjectures: sharper bounds, simpler proofs and algorithmic applications (LG), pp. 417–426.
STOCSTOC-2006-Zhang #quantum #random
New upper and lower bounds for randomized and quantum local search (SZ), pp. 634–643.
TACASTACAS-2006-LiS #abstraction #model checking #performance #refinement
Efficient Abstraction Refinement in Interpolation-Based Unbounded Model Checking (BL, FS), pp. 227–241.
CAVCAV-2006-BurckhardtAM #case study #concurrent #data type #memory management #model checking #modelling
Bounded Model Checking of Concurrent Data Types on Relaxed Memory Models: A Case Study (SB, RA, MMKM), pp. 489–502.
CAVCAV-2006-HeljankoJKLL #automaton #model checking
Bounded Model Checking for Weak Alternating Büchi Automata (KH, TAJ, MK, ML, TL), pp. 95–108.
IJCARIJCAR-2006-DyckhoffKL #calculus #logic
Strong Cut-Elimination Systems for Hudelmaier’s Depth-Bounded Sequent Calculus for Implicational Logic (RD, DK, SL), pp. 347–361.
LICSLICS-2006-BojanczykC
Bounds in w-Regularity (MB, TC), pp. 285–296.
LICSLICS-2006-LaurentF #clique #complexity #semantics
Obsessional Cliques: A Semantic Characterization of Bounded Time Complexity (OL, LTdF), pp. 179–188.
LICSLICS-2006-MacielP #composition #proving
Conditional Lower Bound for a System of Constant-Depth Proofs with Modular Connectives (AM, TP), pp. 189–200.
LICSLICS-2006-Otto #first-order #logic #monad #problem
The Boundedness Problem for Monadic Universal First-Order Logic (MO), pp. 37–48.
LICSLICS-2006-SchroderP #logic
PSPACE Bounds for Rank-1 Modal Logics (LS, DP), pp. 231–242.
ICSTSAT-2006-ZabiyakaD #complexity #dependence #functional
Functional Treewidth: Bounding Complexity in the Presence of Functional Dependencies (YZ, AD), pp. 116–129.
ICTSSTestCom-2006-BerradaCFS #realtime #testing #using
Test Case Minimization for Real-Time Systems Using Timed Bound Traces (IB, RC, PF, AS), pp. 289–305.
ICTSSTestCom-2006-Ipate #finite #nondeterminism #sequence #state machine #testing
Bounded Sequence Testing from Non-deterministic Finite State Machines (FI), pp. 55–70.
PODSPODS-2005-GroheS #memory management #random #sorting
Lower bounds for sorting with few random accesses to external memory (MG, NS), pp. 238–249.
SIGMODSIGMOD-2005-PolJ #relational
Relational Confidence Bounds Are Easy With The Bootstrap (AP, CJ), pp. 587–598.
CIAACIAA-2005-CanoG #automaton #constant #finite
Finite Automata and Unions of Regular Patterns with Bounded Constant Segments (AC, PG), pp. 104–115.
ICALPICALP-2005-Ambuhl #algorithm #energy #network #performance
An Optimal Bound for the MST Algorithm to Compute Energy Efficient Broadcast Trees in Wireless Networks (CA), pp. 1139–1150.
ICALPICALP-2005-BeamePS #communication #complexity #multi
Lower Bounds for Lovász-Schrijver Systems and Beyond Follow from Multiparty Communication Complexity (PB, TP, NS), pp. 1176–1188.
ICALPICALP-2005-ChattopadhyayH #composition #symmetry
Lower Bounds for Circuits with Few Modular and Symmetric Gates (AC, KAH), pp. 994–1005.
ICALPICALP-2005-CzeizlerK #automaton #linear
A Tight Linear Bound on the Neighborhood of Inverse Cellular Automata (EC, JK), pp. 410–420.
ICALPICALP-2005-DiehlM #polynomial #random
Time-Space Lower Bounds for the Polynomial-Time Hierarchy on Randomized Machines (SD, DvM), pp. 982–993.
ICALPICALP-2005-FialaGK #distance #graph
Distance Constrained Labelings of Graphs of Bounded Treewidth (JF, PAG, JK), pp. 360–372.
ICALPICALP-2005-FordG #communication #complexity #multi
Hadamard Tensors and Lower Bounds on Multiparty Communication Complexity (JF, AG), pp. 1163–1175.
ICALPICALP-2005-GroheKS #memory management #query #streaming
Tight Lower Bounds for Query Processing on Streaming and External Memory Data (MG, CK, NS), pp. 1076–1088.
ICALPICALP-2005-HorvitzK #black box #performance
Bounds on the Efficiency of “Black-Box” Commitment Schemes (OH, JK), pp. 128–139.
ICALPICALP-2005-KoiranNP #complexity #problem #quantum #query
A Quantum Lower Bound for the Query Complexity of Simon’s Problem (PK, VN, NP), pp. 1287–1298.
ICALPICALP-2005-TamassiaT #security
Computational Bounds on Hierarchical Data Processing with Applications to Information Security (RT, NT), pp. 153–165.
ICALPICALP-2005-WehnerW #information retrieval
Improved Lower Bounds for Locally Decodable Codes and Private Information Retrieval (SW, RdW), pp. 1424–1436.
RTARTA-2005-BonfanteMM
Quasi-interpretations and Small Space Bounds (GB, JYM, JYM), pp. 150–164.
CEFPCEFP-2005-Hammond #approach #behaviour #functional #programming
Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach (KH), pp. 100–134.
DiGRADiGRA-2005-LeeL #transaction
An Irrational Black Market? Boundary work perspective on the stigma of in-game asset transaction (YHL, HL).
CIKMCIKM-2005-Yeh
An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription (JhY), pp. 285–286.
ICMLICML-2005-JoachimsH #clustering #correlation #fault
Error bounds for correlation clustering (TJ, JEH), pp. 385–392.
ICMLICML-2005-KaariainenL #comparison #fault
A comparison of tight generalization error bounds (MK, JL), pp. 409–416.
ICMLICML-2005-LavioletteM #classification
PAC-Bayes risk bounds for sample-compressed Gibbs classifiers (FL, MM), pp. 481–488.
ICMLICML-2005-McMahanLG #performance #programming #realtime
Bounded real-time dynamic programming: RTDP with monotone upper bounds and performance guarantees (HBM, ML, GJG), pp. 569–576.
ICMLICML-2005-SzepesvariM #finite
Finite time bounds for sampling based fitted value iteration (CS, RM), pp. 880–887.
SACSAC-2005-ReddyC #using
Finding saddle points using stability boundaries (CKR, HDC), pp. 212–213.
CASECASE-2005-ChengY #using
Virtual object deformations using attributed boundary model (TMC, CCY), pp. 295–300.
CGOCGO-2005-BrueningA #capacity #consistency #maintenance
Maintaining Consistency and Bounding Capacity of Software Code Caches (DB, SPA), pp. 74–85.
DACDAC-2005-LiSB #effectiveness #problem
Effective bounding techniques for solving unate and binate covering problems (XYL, MFMS, FB), pp. 385–390.
DATEDATE-2005-CabodiCNQ #model checking #quantifier #set
Circuit Based Quantification: Back to State Set Manipulation within Unbounded Model Checking (GC, MC, SN, SQ), pp. 688–689.
DATEDATE-2005-KatzHD #model checking
Space-Efficient Bounded Model Checking (JK, ZH, ND), pp. 686–687.
DATEDATE-2005-ManquinhoM #effectiveness #optimisation #pseudo
Effective Lower Bounding Techniques for Pseudo-Boolean Optimization (VMM, JPMS), pp. 660–665.
DATEDATE-2005-Marculescu #design #energy #fault tolerance
Energy Bounds for Fault-Tolerant Nanoscale Designs (DM), pp. 74–79.
DATEDATE-2005-MartinelliD #composition #set
Bound Set Selection and Circuit Re-Synthesis for Area/Delay Driven Decomposition (AM, ED), pp. 430–431.
HPCAHPCA-2005-AnanianAKLL #memory management #transaction
Unbounded Transactional Memory (CSA, KA, BCK, CEL, SL), pp. 316–327.
LCTESLCTES-2005-DefoeCC
Upper bound for defragmenting buddy heaps (DCD, SRC, RC), pp. 222–229.
ESOPESOP-2005-ChanderEILN #dynamic analysis #verification
Enforcing Resource Bounds via Static Verification of Dynamic Checks (AC, DE, NI, PL, GCN), pp. 311–325.
STOCSTOC-2005-Alekhnovich #random
Lower bounds for k-DNF resolution on random 3-CNFs (MA), pp. 251–256.
STOCSTOC-2005-CryanDR #approximate
Approximately counting integral flows and cell-bounded contingency tables (MC, MED, DR), pp. 413–422.
STOCSTOC-2005-GafniGP #adaptation #complexity #set
From a static impossibility to an adaptive lower bound: the complexity of early deciding set agreement (EG, RG, BP), pp. 714–722.
STOCSTOC-2005-KouckyPT
Bounded-depth circuits: separating wires from gates (MK, PP, DT), pp. 257–265.
TACASTACAS-2005-QadeerR #concurrent #model checking
Context-Bounded Model Checking of Concurrent Software (SQ, JR), pp. 93–107.
TACASTACAS-2005-SharmaPC #logic
Bounded Validity Checking of Interval Duration Logic (BS, PKP, SC), pp. 301–316.
ICSTSAT-J-2004-PorschenS05 #problem
Worst Case Bounds for Some NP-Complete Modified Horn-SAT Problems (SP, ES), pp. 251–262.
CAVCAV-2005-GuptaS #abstraction #model checking #refinement
Abstraction Refinement for Bounded Model Checking (AG, OS), pp. 112–124.
CAVCAV-2005-HeljankoJL #incremental #model checking
Incremental and Complete Bounded Model Checking for Full PLTL (KH, TAJ, TL), pp. 98–111.
CAVCAV-2005-RabinovitzG #concurrent #model checking #source code
Bounded Model Checking of Concurrent Programs (IR, OG), pp. 82–97.
CSLCSL-2005-CharatonikGM #model checking #pointer #source code
Bounded Model Checking of Pointer Programs (WC, LG, PM), pp. 397–412.
CSLCSL-2005-Kolokolova
Closure Properties of Weak Systems of Bounded Arithmetic (AK), pp. 369–383.
ICLPICLP-2005-Saidi #mining #process #using
Using CLP to Characterise Linguistic Lattice Boundaries in a Text Mining Process (ASS), pp. 418–420.
ICSTSAT-2005-DantsinW #satisfiability
An Improved Upper Bound for SAT (ED, AW), pp. 400–407.
ICSTSAT-2005-DershowitzHK #model checking
Bounded Model Checking with QBF (ND, ZH, JK), pp. 408–414.
ICSTSAT-2005-Gelder #distance #proving
Input Distance and Lower Bounds for Propositional Resolution Proof Length (AVG), pp. 282–293.
ICSTSAT-2005-HeuleM #linear #programming #random #satisfiability #using
Observed Lower Bounds for Random 3-SAT Phase Transition Density Using Linear Programming (MH, HvM), pp. 122–134.
ICSTSAT-2005-MneimnehLASS #algorithm #satisfiability
A Branch-and-Bound Algorithm for Extracting Smallest Minimal Unsatisfiable Formulas (MNM, IL, ZSA, JPMS, KAS), pp. 467–474.
ICSTSAT-2005-Zarpas #benchmark #metric #model checking #satisfiability
Benchmarking SAT Solvers for Bounded Model Checking (EZ), pp. 340–354.
VMCAIVMCAI-2005-AbrahamBKS #hybrid #linear #model checking #optimisation
Optimizing Bounded Model Checking for Linear Hybrid Systems (, BB, FK, MS), pp. 396–412.
VMCAIVMCAI-2005-LatvalaBHJ #ltl #model checking #performance
Simple Is Better: Efficient Bounded Model Checking for Past LTL (TL, AB, KH, TAJ), pp. 380–395.
VLDBVLDB-2004-KoudasOT0 #approximate #fault #performance #query
Approximate NN queries on Streams with Guaranteed Error/performance Bounds (NK, BCO, KLT, RZ), pp. 804–815.
VLDBVLDB-2004-RossS #database #multi #symmetry
Symmetric Relations and Cardinality-Bounded Multisets in Database Systems (KAR, JS), pp. 912–923.
ITiCSEITiCSE-WGR-2004-RolfeP #backtracking #problem
An alternative problem for backtracking and bounding (TJR, PWP), pp. 83–84.
CIAACIAA-2004-CampeanuP #automaton #nondeterminism
Tight Bounds for NFA to DFCA Transformations for Binary Alphabets (CC, AP), pp. 306–307.
ICALPICALP-2004-AlekhnovichHI #algorithm #exponential #satisfiability
Exponential Lower Bounds for the Running Time of DPLL Algorithms on Satisfiable Formulas (MA, EAH, DI), pp. 84–96.
ICALPICALP-2004-BlundoDS #self
Definitions and Bounds for Self-Healing Key Distribution Schemes (CB, PD, ADS), pp. 234–245.
ICALPICALP-2004-Fleischer #algorithm #linear #network
Linear Tolls Suffice: New Bounds and Algorithms for Tolls in Single Source Networks (LF), pp. 544–554.
ICALPICALP-2004-FlumGW #nondeterminism #parametricity
Bounded Fixed-Parameter Tractability and log2n Nondeterministic Bits (JF, MG, MW), pp. 555–567.
ICALPICALP-2004-MelkebeekR #satisfiability
A Time Lower Bound for Satisfiability (DvM, RR), pp. 971–982.
ICALPICALP-2004-Midrijanis #polynomial #problem #quantum #query #set #similarity
A Polynomial Quantum Query Lower Bound for the Set Equality Problem (GM), pp. 996–1005.
ICALPICALP-2004-SandersSS #migration #online #scheduling
Online Scheduling with Bounded Migration (PS, NS, MS), pp. 1111–1122.
ICALPICALP-2004-Zhang #on the #power of
On the Power of Ambainis’s Lower Bounds (SZ), pp. 1238–1250.
RTARTA-2004-Waldmann #named #string
Matchbox: A Tool for Match-Bounded String Rewriting (JW), pp. 85–94.
SEFMSEFM-2004-FlakeM #ocl
Past- and Future-Oriented Time-Bounded Temporal Properties with OCL (SF, WM), pp. 154–163.
ICMLICML-2004-ConitzerS #communication #complexity #game studies #learning
Communication complexity as a lower bound for learning in games (VC, TS).
ICMLICML-2004-RuckertK #learning #towards
Towards tight bounds for rule learning (UR, SK).
ICPRICPR-v1-2004-GokcenJD #learning
Comparing Optimal Bounding Ellipsoid and Support Vector Machine Active Learning (IG, DJ, JRD), pp. 172–175.
ICPRICPR-v1-2004-KangD #approximate #classification #fault
Product Approximation by Minimizing the Upper Bound of Bayes Error Rate for Bayesian Combination of Classifiers (HJK, DSD), pp. 252–255.
ICPRICPR-v3-2004-DePiero #graph #memory management #polynomial #worst-case
Structural Graph Matching With Polynomial Bounds On Memory and on Worst-Case Effort (FWD), pp. 379–382.
ICPRICPR-v3-2004-ZhuHT
Comparing Decision Boundary Curvature (HZ, JH, XT), pp. 450–453.
ICPRICPR-v4-2004-FarenzenaBFB #re-engineering
Rigorous Accuracy Bounds for Calibrated Stereo Reconstruction (MF, AB, AF, AB), pp. 288–292.
ICPRICPR-v4-2004-KimPL #using
Object Boundary Edge Selection Using Normal Direction Derivatives of a Contour in a Complex Scene (TYK, JP, SWL), pp. 755–758.
ICPRICPR-v4-2004-ShihKG #analysis #fault #image
An Error Bound of Relative Image Blur Analysis (SWS, PSK, WSG), pp. 100–103.
ICPRICPR-v4-2004-SungLPL #locality #recognition #using
Iris Recognition Using Collarette Boundary Localization (HS, JL, JhP, YL), pp. 857–860.
KDDKDD-2004-XiongSTK #correlation #identification
Exploiting a support-based upper bound of Pearson’s correlation coefficient for efficiently identifying strongly correlated pairs (HX, SS, PNT, VK), pp. 334–343.
KRKR-2004-EiterFFPW #complexity #model checking #programming #set
Complexity of Model Checking and Bounded Predicate Arities for Non-ground Answer Set Programming (TE, WF, MF, GP, SW), pp. 377–387.
PLDIPLDI-2004-VenetB #array #c #embedded #performance #precise #scalability #source code
Precise and efficient static array bound checking for large embedded C programs (AV, GPB), pp. 231–242.
RERE-2004-LinNIJ #problem #security #using
Using Abuse Frames to Bound the Scope of Security Problems (LL, BN, DCI, MJ), pp. 354–355.
SACSAC-2004-MichaelsonHS #automaton #named #programming #using
FSM-Hume: programming resource-limited systems using bounded automata (GM, KH, JS), pp. 1455–1461.
SACSAC-2004-ZhouLA #image
Boundary extraction in thermal images by edge map (QZ, ZL, JKA), pp. 254–258.
ASPLOSASPLOS-2004-SmolensGKFHN #detection #latency #named
Fingerprinting: bounding soft-error detection latency and bandwidth (JCS, BTG, JK, BF, JCH, AN), pp. 224–234.
CGOCGO-2004-TallamZG #profiling
Extending Path Profiling across Loop Backedges and Procedure Boundaries (ST, XZ, RG), pp. 251–264.
DACDAC-2004-WangJHS #model checking #satisfiability
Refining the SAT decision ordering for bounded model checking (CW, HJ, GDH, FS), pp. 535–538.
DATEDATE-v1-2004-AlmukhaizimDM #concurrent #detection #fault #latency #on the
On Concurrent Error Detection with Bounded Latency in FSMs (SA, PD, YM), pp. 596–603.
DATEDATE-v1-2004-BaumgartnerK
Enhanced Diameter Bounding via Structural (JB, AK), pp. 36–41.
FoSSaCSFoSSaCS-2004-LuttgenV #bisimulation
Bisimulation on Speed: Lower Time Bounds (GL, WV), pp. 333–347.
STOCSTOC-2004-Aaronson04a #quantum
Lower bounds for local search by quantum arguments (SA), pp. 465–474.
STOCSTOC-2004-AilonC #linear #testing
Lower bounds for linear degeneracy testing (NA, BC), pp. 554–560.
STOCSTOC-2004-ChenHKX #linear #reduction
Linear FPT reductions and computational lower bounds (JC, XH, IAK, GX), pp. 212–221.
STOCSTOC-2004-ChenKLRSV #confluence #theorem
(Almost) tight bounds and existence theorems for confluent flows (JC, RDK, LL, RR, RS, AV), pp. 529–538.
STOCSTOC-2004-Elkin #approximate #distributed #problem #trade-off
Unconditional lower bounds on the time-approximation tradeoffs for the distributed minimum spanning tree problem (ME), pp. 331–340.
STOCSTOC-2004-Feige #graph #independence #on the #random
On sums of independent random variables with unbounded variance, and estimating the average degree in a graph (UF), pp. 594–603.
STOCSTOC-2004-Kelner #clustering #graph
Spectral partitioning, eigenvalue bounds, and circle packings for graphs of bounded genus (JAK), pp. 455–464.
STOCSTOC-2004-Pass #multi
Bounded-concurrent secure multi-party computation with a dishonest majority (RP), pp. 232–241.
STOCSTOC-2004-PatrascuD
Lower bounds for dynamic connectivity (MP, EDD), pp. 546–553.
TACASTACAS-2004-BaierHHK #markov #performance #process #reachability
Efficient Computation of Time-Bounded Reachability Probabilities in Uniform Continuous-Time Markov Decision Processes (CB, BRH, HH, JPK), pp. 61–76.
TACASTACAS-2004-BehrmannBLP #abstraction #automaton
Lower and Upper Bounds in Zone Based Abstractions of Timed Automata (GB, PB, KGL, RP), pp. 312–326.
TACASTACAS-2004-LeueMW #modelling #scalability #uml
A Scalable Incomplete Test for the Boundedness of UML RT Models (SL, RM, WW), pp. 327–341.
TACASTACAS-2004-RaviS #model checking
Minimal Assignments for Bounded Model Checking (KR, FS), pp. 31–45.
CAVCAV-2004-AwedhS #model checking #proving
Proving More Properties with Bounded Model Checking (MA, FS), pp. 96–108.
CAVCAV-2004-BinghamCHQZ #automation #consistency #verification
Automatic Verification of Sequential Consistency for Unbounded Addresses and Data Values (JDB, AC, AJH, SQ, ZZ), pp. 427–439.
CAVCAV-2004-GanaiGA #embedded #model checking #modelling #performance
Efficient Modeling of Embedded Memories in Bounded Model Checking (MKG, AG, PA), pp. 440–452.
CAVCAV-2004-JinAS #model checking #named #satisfiability #towards
CirCUs: A Satisfiability Solver Geared towards Bounded Model Checking (HJ, MA, FS), pp. 519–522.
CAVCAV-2004-LahiriB #verification
Indexed Predicate Discovery for Unbounded System Verification (SKL, REB), pp. 135–147.
CSLCSL-2004-AmadioCDJ #bytecode #functional #verification
A Functional Scenario for Bytecode Verification of Resource Bounds (RMA, SCG, SDZ, LJ), pp. 265–279.
CSLCSL-2004-Bojanczyk #quantifier
A Bounding Quantifier (MB), pp. 41–55.
CSLCSL-2004-ImmermanRRSY #decidability #logic #transitive
The Boundary Between Decidability and Undecidability for Transitive-Closure Logics (NI, AMR, TWR, SS, GY), pp. 160–174.
CSLCSL-2004-Skelley #higher-order
A Third-Order Bounded Arithmetic Theory for PSPACE (AS), pp. 340–354.
LICSLICS-2004-SeshiaB #quantifier #using
Deciding Quantifier-Free Presburger Formulas Using Parameterized Solution Bounds (SAS, REB), pp. 100–109.
SATSAT-2004-ManquinhoM #optimisation #pseudo #satisfiability #using
Using Lower-Bound Estimates in SAT-Based Pseudo-Boolean Optimization (VMM, JPMS), pp. 120–126.
VMCAIVMCAI-2004-ClarkeKOS #complexity #model checking
Completeness and Complexity of Bounded Model Checking (EMC, DK, JO, OS), pp. 85–96.
DRRDRR-2003-Fan #parametricity
Text extraction via an edge-bounded averaging and a parametric character model (JF), pp. 8–19.
ICDARICDAR-2003-CaoDL #approach #documentation #image #modelling
Rectifying the Bound Document Image Captured by the Camera: A Model Based Approach (HC, XD, CL), pp. 71–75.
PODSPODS-2003-Segoufin #complexity #documentation #query #type system #xml
Typing and querying XML documents: some complexity bounds (LS), pp. 167–178.
DLTDLT-2003-Giammarresi #set
Computing Languages by (Bounded) Local Sets (DG), pp. 304–315.
ICALPICALP-2003-AmirACLP #algorithm
Function Matching: Algorithms, Applications, and a Lower Bound (AA, YA, RC, ML, EP), pp. 929–942.
ICALPICALP-2003-HoyerMW #quantum
Quantum Search on Bounded-Error Inputs (PH, MM, RdW), pp. 291–299.
ICALPICALP-2003-RybinaV #formal method
Upper Bounds for a Theory of Queues (TR, AV), pp. 714–724.
ICFPICFP-2003-Simonet #data type
An extension of HM(X) with bounded existential and universal data-types (VS), pp. 39–50.
DiGRADiGRA-2003-Copier #game studies #research
The other game researcher: participating in and watching the costruction of boundaries in game studies (MC).
ICEISICEIS-v3-2003-GustasG #approach #enterprise #information management #modelling #towards
Towards the Enterprise Engineering Approach for Information System Modelling Across Organisational and Technical Boundaries (RG, PG), pp. 77–88.
ICMLICML-2003-ConitzerS03a #framework #game studies #named
BL-WoLF: A Framework For Loss-Bounded Learnability In Zero-Sum Games (VC, TS), pp. 91–98.
ICMLICML-2003-Munos #approximate #fault #policy
Error Bounds for Approximate Policy Iteration (RM), pp. 560–567.
ICMLICML-2003-SalakhutdinovR #adaptation #optimisation
Adaptive Overrelaxed Bound Optimization Methods (RS, STR), pp. 664–671.
MLDMMLDM-2003-ImiyaTOH #detection #random #set
Detecting the Boundary Curve of Planar Random Point Set (AI, KT, HO, VH), pp. 413–424.
MLDMMLDM-2003-MiteranBB #approximate #classification #image #realtime #segmentation #using
Classification Boundary Approximation by Using Combination of Training Steps for Real-Time Image Segmentation (JM, SB, EBB), pp. 141–155.
PPDPPPDP-2003-GrecoZ #datalog #on the #performance #query
On the rewriting and efficient computation of bound disjunctive datalog queries (SG, EZ), pp. 136–147.
SACSAC-2003-RaidlJ #algorithm #heuristic #problem
Greedy Heuristics and an Evolutionary Algorithm for the Bounded-Diameter Minimum Spanning Tree Problem (GRR, BAJ), pp. 747–752.
DACDAC-2003-AgarwalBZV #refinement #statistics
Computation and Refinement of Statistical Bounds on Circuit Delay (AA, DB, VZ, SBKV), pp. 348–353.
DACDAC-2003-ClarkeKY #behaviour #c #consistency #model checking #source code #using
Behavioral consistency of C and verilog programs using bounded model checking (EMC, DK, KY), pp. 368–371.
DACDAC-2003-GuptaGWYA #learning #model checking #satisfiability
Learning from BDDs in SAT-based bounded model checking (AG, MKG, CW, ZY, PA), pp. 824–829.
DACDAC-2003-KangP #model checking #satisfiability
SAT-based unbounded symbolic model checking (HJK, ICP), pp. 840–843.
DACDAC-2003-StehrGA #analysis #performance #trade-off
Performance trade-off analysis of analog circuits by normal-boundary intersection (GS, HEG, KA), pp. 958–963.
DATEDATE-2003-AgarwalBZV #analysis #statistics #using
Statistical Timing Analysis Using Bounds (AA, DB, VZ, SBKV), pp. 10062–10067.
DATEDATE-2003-CabodiNQ #approximate #model checking #satisfiability #traversal
Improving SAT-Based Bounded Model Checking by Means of BDD-Based Approximate Traversals (GC, SN, SQ), pp. 10898–10905.
DATEDATE-2003-EbendtGD
Combination of Lower Bounds in Exact BDD Minimization (RE, WG, RD), pp. 10758–10763.
DATEDATE-2003-SmedtG #design #named
HOLMES: Capturing the Yield-Optimized Design Space Boundaries of Analog and RF Integrated Circuits (BDS, GGEG), pp. 10256–10263.
PDPPDP-2003-DortaLRR #divide and conquer #parallel
Parallel Skeletons for Divide-and-Conquer and Branch-and-Bound techniques (ID, CL, CR, AR), pp. 292–298.
STOCSTOC-2003-Bar-Yossef
Sampling lower bounds via information theory (ZBY), pp. 335–344.
STOCSTOC-2003-FakcharoenpholRT #approximate #metric
A tight bound on approximating arbitrary metrics by tree metrics (JF, SR, KT), pp. 448–455.
STOCSTOC-2003-FatourouFR #implementation #multi
A tight time lower bound for space-optimal implementations of multi-writer snapshots (PF, FEF, ER), pp. 259–268.
STOCSTOC-2003-GalR
Lower bounds on the amount of randomness in private computation (AG, AR), pp. 659–666.
STOCSTOC-2003-GennaroGK #encryption #performance
Lower bounds on the efficiency of encryption and digital signature schemes (RG, YG, JK), pp. 417–425.
STOCSTOC-2003-JayramKKR #problem
Cell-probe lower bounds for the partial match problem (TSJ, SK, RK, YR), pp. 667–672.
STOCSTOC-2003-KabanetsI #polynomial #proving #testing
Derandomizing polynomial identity tests means proving circuit lower bounds (VK, RI), pp. 355–364.
STOCSTOC-2003-KerenidisW #exponential #quantum
Exponential lower bound for 2-query locally decodable codes via a quantum argument (IK, RdW), pp. 106–115.
STOCSTOC-2003-KonemannR #approximate
Primal-dual meets local search: approximating MST’s with nonuniform degree bounds (JK, RR), pp. 389–395.
STOCSTOC-2003-Lindell
Bounded-concurrent secure two-party computation without setup assumptions (YL), pp. 683–692.
STOCSTOC-2003-ODonnellS #polynomial
New degree bounds for polynomial threshold functions (RO, RAS), pp. 325–334.
STOCSTOC-2003-SauerhoffW #graph #integer #multi #trade-off
Time-space tradeoff lower bounds for integer multiplication and graphs of arithmetic functions (MS, PW), pp. 186–195.
TACASTACAS-2003-AmlaKMM #analysis #model checking
Experimental Analysis of Different Techniques for Bounded Model Checking (NA, RPK, KLM, RM), pp. 34–48.
TACASTACAS-2003-BartzisB #constraints #performance
Construction of Efficient BDDs for Bounded Arithmetic Constraints (CB, TB), pp. 394–408.
TACASTACAS-2003-BenedettiC #ltl #model checking
Bounded Model Checking for Past LTL (MB, AC), pp. 18–33.
TACASTACAS-2003-BraghinCFFLP #analysis #named
BANANA — A Tool for Boundary Ambients Nesting ANAlysis (CB, AC, SF, RF, FLL, CP), pp. 437–441.
TACASTACAS-2003-CiardoMS
Saturation Unbound (GC, RMM, RS), pp. 379–393.
CADECADE-2003-Schmidt-Schauss #decidability #higher-order
Decidability of Arity-Bounded Higher-Order Matching (MSS), pp. 488–502.
CAVCAV-2003-MouraRS #induction #model checking #verification
Bounded Model Checking and Induction: From Refutation to Verification (Extended Abstract, Category A) (LMdM, HR, MS), pp. 14–26.
CAVCAV-2003-Obdrzalek #calculus #model checking #performance #μ-calculus
Fast μ-Calculus Model Checking when Tree-Width Is Bounded (JO), pp. 80–92.
CAVCAV-2003-SeshiaB #automaton #model checking #using
Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods (SAS, REB), pp. 154–166.
CSLCSL-2003-ChevalierKRTV
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
VMCAIVMCAI-2003-UnnikrishnanSL #analysis
Optimized Live Heap Bound Analysis (LU, SDS, YAL), pp. 70–85.
PODSPODS-2002-Chirkova #problem #query
The View-Selection Problem Has an Exponential-Time Lower Bound for Conjunctive Queries and Views (RC), pp. 159–168.
DLTDLT-2002-DoL #on the #product line
On a Family of Codes with Bounded Deciphering Delay (DLV, IL), pp. 369–380.
DLTDLT-2002-Domaratzki #automaton #finite
Improved Bounds on the Number of Automata Accepting Finite Languages (MD), pp. 209–219.
DLTDLT-2002-SasakiIIW #2d #probability #turing machine
A Space Lower Bound of Two-Dimensional Probabilistic Turing Machines (YS, KI, AI, YW), pp. 185–196.
ICALPICALP-2002-AblayevMP #branch #probability #quantum #source code
Quantum and Stochastic Branching Programs of Bounded Width (FMA, CM, CP), pp. 343–354.
ICALPICALP-2002-BermanK #approximate
Approximation Hardness of Bounded Degree MIN-CSP and MIN-BISECTION (PB, MK), pp. 623–632.
ICALPICALP-2002-ChristerssonGL #ad hoc #network
Gossiping with Bounded Size Messages in ad hoc Radio Networks (MC, LG, AL), pp. 377–389.
ICALPICALP-2002-DemetrescuI #trade-off
Improved Bounds and New Trade-Offs for Dynamic All Pairs Shortest Paths (CD, GFI), pp. 633–643.
ICALPICALP-2002-EpsteinSS #online
New Bounds for Variable-Sized and Resource Augmented Online Bin Packing (LE, SSS, RvS), pp. 306–317.
ICALPICALP-2002-EstebanGM #complexity #on the
On the Complexity of Resolution with Bounded Conjunctions (JLE, NG, JM), pp. 220–231.
ICALPICALP-2002-GarganoHSV #branch
Spanning Trees with Bounded Number of Branch Vertices (LG, PH, LS, UV), pp. 355–365.
ICALPICALP-2002-GrigorievHP #algebra #exponential #proving
Exponential Lower Bound for Static Semi-algebraic Proofs (DG, EAH, DVP), pp. 257–268.
ICALPICALP-2002-ImpagliazzoS #axiom #simulation
Bounded-Depth Frege Systems with Counting Axioms Polynomially Simulate Nullstellensatz Refutations (RI, NS), pp. 208–219.
ICALPICALP-2002-Radzik #network
Improving Time Bounds on Maximum Generalised Flow Computations by Contracting the Network (TR), pp. 611–622.
FMFME-2002-LegeardPU #automation #testing
Automated Boundary Testing from Z and B (BL, FP, MU), pp. 21–40.
RTARTA-2002-Tahhan-Bittar #confluence #recursion #term rewriting
Recursive Derivational Length Bounds for Confluent Term Rewrite Systems (ETB), pp. 281–295.
CSCWCSCW-2002-LuttersA #case study #safety
Achieving safety: a field study of boundary objects in aircraft technical support (WGL, MSA), pp. 266–275.
CSCWCSCW-2002-StevensW #data access #maintenance
A new dimension in access control: studying maintenance engineering across organizational boundaries (GS, VW), pp. 196–205.
ICMLICML-2002-GargHR #on the
On generalization bounds, projection profile, and margin distribution (AG, SHP, DR), pp. 171–178.
ICMLICML-2002-Langford #testing
Combining Trainig Set and Test Set Bounds (JL), pp. 331–338.
ICMLICML-2002-ZhangL #network
Representational Upper Bounds of Bayesian Networks (HZ, CXL), pp. 674–681.
ICPRICPR-v1-2002-WechslerDLC #predict #using
Motion Prediction Using VC-Generalization Bounds (HW, ZD, FL, VC), pp. 151–154.
ICPRICPR-v2-2002-EcabertT #image #segmentation
Variational Image Segmentation by Unifying Region and Boundary Information (OE, JPT), pp. 885–888.
ICPRICPR-v2-2002-FrantiVK #clustering
Branch-and-Bound Technique for Solving Optimal Clustering (PF, OV, TK), pp. 232–235.
ICPRICPR-v3-2002-Ishii #design #people
Tangible Bits: Designing the Boundary between People, Bits, and Atoms (HI), p. 277.
ICPRICPR-v3-2002-KimKKK #sequence
Usefulness of Boundary Sequences in Computing Shape Features for Arbitrary Shaped Regions (SK, SK, JK, MK), pp. 355–358.
ICPRICPR-v3-2002-SilvestreL #classification #optimisation
Optimization of Neural Classifiers Based on Bayesian Decision Boundaries and Idle Neurons Pruning (MRS, LLL), pp. 387–390.
PEPMPEPM-2002-GomezL #analysis #automation #higher-order
Automatic time-bound analysis for a higher-order language (GG, YAL), pp. 75–86.
POPLPOPL-2002-Boehm #garbage collection
Bounding space usage of conservative garbage collectors (HJB), pp. 93–100.
CCCC-2002-QianHV #approach #array #java
A Comprehensive Approach to Array Bounds Check Elimination for Java (FQ, LJH, CV), pp. 325–342.
DACDAC-2002-CabodiCQ #model checking #question #satisfiability
Can BDDs compete with SAT solvers on bounded model checking? (GC, PC, SQ), pp. 117–122.
FoSSaCSFoSSaCS-2002-JancarKMS #automaton #proving
Equivalence-Checking with One-Counter Automata: A Generic Method for Proving Lower Bounds (PJ, AK, FM, ZS), pp. 172–186.
FoSSaCSFoSSaCS-2002-LohreyM #communication
Bounded MSC Communication (ML, AM), pp. 295–309.
STOCSTOC-2002-Aaronson #problem #quantum
Quantum lower bound for the collision problem (SA), pp. 635–642.
STOCSTOC-2002-Ben-Sasson02a
Hard examples for bounded depth frege (EBS), pp. 563–572.
STOCSTOC-2002-DziembowskiM #proving #security
Tight security proofs for the bounded-storage model (SD, UMM), pp. 341–350.
STOCSTOC-2002-Kontogiannis #algorithm #online #scheduling
Lower bounds & competitive algorithms for online scheduling of unit-size tasks to related machines (SCK), pp. 124–133.
STOCSTOC-2002-Raz02a #principle
Resolution lower bounds for the weak pigeonhole principle (RR), pp. 553–562.
STOCSTOC-2002-SaksS #approximate #data type #distance
Space lower bounds for distance approximation in the data stream model (MES, XS), pp. 360–369.
CADECADE-2002-MouraRS #infinity #lazy evaluation #model checking #proving #theorem proving
Lazy Theorem Proving for Bounded Model Checking over Infinite Domains (LMdM, HR, MS), pp. 438–455.
CAVCAV-2002-BinghamH #model checking
Semi-formal Bounded Model Checking (JDB, AJH), pp. 280–294.
CAVCAV-2002-ChevalierV #automation #protocol #security #verification
Automated Unbounded Verification of Security Protocols (YC, LV), pp. 324–337.
CAVCAV-2002-McMillan #model checking #satisfiability
Applying SAT Methods in Unbounded Symbolic Model Checking (KLM), pp. 250–264.
CSLCSL-2002-MarcinkowskiT #complexity #game studies #ltl
Optimal Complexity Bounds for Positive LTL Games (JM, TT), pp. 262–275.
CSLCSL-2002-Nipkow #hoare #logic #nondeterminism #recursion
Hoare Logics for Recursive Procedures and Unbounded Nondeterminism (TN), pp. 103–119.
CSLCSL-2002-Schmidt-SchaussS #decidability #higher-order #unification
Decidability of Bounded Higher-Order Unification (MSS, KUS), pp. 522–536.
ISSTAISSTA-2002-Bishop #reliability
Rescaling reliability bounds for a new operational profile (PGB), pp. 180–190.
SATSAT-2002-Schoening #satisfiability
New worst case bounds on k-SAT (US), p. 1.
WICSAWICSA-2001-Shaw #architecture #communication #research #ubiquitous
When System Boundaries Dissolve: Research Opportunities in Software Architectures for Ubiquitous Computing and Communication (MS), p. 99–?.
ICDARICDAR-2001-ZhangT #documentation #image
Recovery of Distorted Document Images from Bound Volumes (ZZ, CLT), pp. 429–433.
CIAACIAA-2001-FarreG #parsing
Bounded-Graph Construction for Noncanonical Discriminating-Reverse Parsers (JF, JFG), pp. 101–114.
ICALPICALP-2001-AtseriasBE
Lower Bounds for the Weak Pigeonhole Principle Beyond Resolution (AA, MLB, JLE), pp. 1005–1016.
ICALPICALP-2001-Blaser #algebra
Improvements of the Alder-Strassen Bound: Algebras with Nonzero Radical (MB), pp. 79–91.
ICALPICALP-2001-BuhrmanTV #simulation
Time and Space Bounds for Reversible Simulation (HB, JT, PMBV), pp. 1017–1027.
ICALPICALP-2001-ChakrabartiK #complexity #graph #random
Improved Lower Bounds on the Randomized Complexity of Graph Properties (AC, SK), pp. 285–296.
ICALPICALP-2001-EngebretsenK #approximate #metric
Approximation Hardness of TSP with Bounded Metrics (LE, MK), pp. 201–212.
ICALPICALP-2001-SenV #quantum
Lower Bounds in the Quantum Cell Probe Model (PS, SV), pp. 358–369.
TLCATLCA-2001-Hofmann #behaviour #complexity #memory management #type system #using
From Bounded Arithmetic to Memory Management: Use of Type Theory to Capture Complexity Classes and Space Behaviour (MH0), pp. 2–3.
ICMLICML-2001-Geibel #learning
Reinforcement Learning with Bounded Risk (PG), pp. 162–169.
ICMLICML-2001-Hutter #predict #sequence
General Loss Bounds for Universal Sequence Prediction (MH), pp. 210–217.
ICMLICML-2001-LangfordSM #classification #predict
An Improved Predictive Accuracy Bound for Averaging Classifiers (JL, MWS, NM), pp. 290–297.
ICMLICML-2001-Zhang #approximate #problem
Some Sparse Approximation Bounds for Regression Problems (TZ0), pp. 624–631.
LOPSTRLOPSTR-2001-FerrariFO #logic #proving
Extracting Exact Time Bounds from Logical Proofs (MF, CF, MO), pp. 245–266.
PPDPPPDP-2001-SchulteS #question
When Do Bounds and Domain Propagation Lead to the Same Search Space? (CS, PJS), pp. 115–126.
CCCC-2001-FarreG #parsing
A Bounded Graph-Connect Construction for LR-regular Parsers (JF, JFG), pp. 244–258.
DACDAC-2001-YangPT
Improving Bus Test Via IDDT and Boundary Scan (SYY, CAP, MTA), pp. 307–312.
STOCSTOC-2001-Ambainis #protocol #quantum
A new protocol and lower bounds for quantum coin flipping (AA), pp. 134–142.
STOCSTOC-2001-Bar-YossefKS #algorithm
Sampling algorithms: lower bounds and applications (ZBY, RK, DS), pp. 266–275.
STOCSTOC-2001-BolligW #branch #integer #multi #using
A read-once branching program lower bound of Ω(2n/4) for integer multiplication using universal (BB, PW), pp. 419–424.
STOCSTOC-2001-ChazelleL
Lower bounds for intersection searching and fractional cascading in higher dimension (BC, DL), pp. 322–329.
STOCSTOC-2001-IckingM #3d #complexity #diagrams #distance
A tight bound for the complexity of voroni diagrams under polyhedral convex distance functions in 3D (CI, LM), pp. 316–321.
STOCSTOC-2001-LachishR
Explicit lower bound of 4.5n — o(n) for boolena circuits (OL, RR), pp. 399–408.
STOCSTOC-2001-PitassiR #principle
Regular resolution lower bounds for the weak pigeonhole principle (TP, RR), pp. 347–355.
STOCSTOC-2001-RazS #matrix
Lower bounds for matrix product, in bounded depth circuits with arbitrary gates (RR, AS), pp. 409–418.
STOCSTOC-2001-Trevisan #optimisation #problem
Non-approximability results for optimization problems on bounded degree instances (LT), pp. 453–461.
TACASTACAS-2001-Carvajal-SchiaffinoDC #petri net #validation
Combining Structural and Enumerative Techniques for the Validation of Bounded Petri Nets (RCS, GD, GC), pp. 435–449.
CAVCAV-2001-CoptyFFGKTV #industrial #model checking
Benefits of Bounded Model Checking at an Industrial Setting (FC, LF, RF, EG, GK, AT, MYV), pp. 436–453.
LICSLICS-2001-AdlerI #exclamation
An n! Lower Bound on Formula Size (MA, NI), pp. 197–206.
LICSLICS-2001-Stoller #protocol
A Bound on Attacks on Payment Protocols (SDS), pp. 61–70.
VLDBVLDB-2000-YuV #fault #network #performance
Efficient Numerical Error Bounding for Replicated Network Services (HY, AV), pp. 123–133.
ICALPICALP-2000-AdlerFGP
Tight Size Bounds for Packet Headers in Narrow Meshes (MA, FEF, LAG, MP), pp. 756–767.
ICALPICALP-2000-BolligW #problem
Asymptotically Optimal Bounds for OBDDs and the Solution of Some Basic OBDD Problems (BB, IW), pp. 187–198.
ICALPICALP-2000-CsirikW #online
Resource Augmentation for Online Bounded Space Bin Packing (JC, GJW), pp. 296–304.
ICALPICALP-2000-FournierK
Lower Bounds Are Not Easier over the Reals: Inside PH (HF, PK), pp. 832–843.
ICALPICALP-2000-GoldbergJKP #capacity #protocol
A Bound on the Capacity of Backoff and Acknowledgement-Based Protocols (LAG, MJ, SK, MP), pp. 705–716.
ICALPICALP-2000-Seiden #algorithm #online
An Optimal Online Algorithm for Bounded Space Variable-Sized Bin Packing (SSS), pp. 283–295.
IFLIFL-2000-GustavssonS #analysis #morphism #polymorphism #type system
A Usage Analysis with Bounded Usage Polymorphism and Subtyping (JG, JS), pp. 140–157.
IFLIFL-2000-Hammond #behaviour #concurrent
The Dynamic Properties of Hume: A Functionally-Based Concurrent Language with Bounded Time and Space Behaviour (KH), pp. 122–139.
ICMLICML-2000-EvgeniouPPP #kernel #performance
Bounds on the Generalization Performance of Kernel Machine Ensembles (TE, LPB, MP, TP), pp. 271–278.
ICMLICML-2000-ForsterW #learning
Relative Loss Bounds for Temporal-Difference Learning (JF, MKW), pp. 295–302.
ICMLICML-2000-Reynolds #adaptation #clustering #learning
Adaptive Resolution Model-Free Reinforcement Learning: Decision Boundary Partitioning (SIR), pp. 783–790.
ICPRICPR-v1-2000-HoogsM #approach
An Integrated Boundary and Region Approach to Perceptual Grouping (AH, JLM), pp. 1284–1290.
ICPRICPR-v1-2000-SappaG #fault #image #modelling #optimisation
Modeling Range Images with Bounded Error Triangular Meshes without Optimization (ADS, MAG), pp. 1392–1395.
ICPRICPR-v1-2000-TasdizenC #algebra #estimation #image #modelling
Boundary Estimation from Intensity/Color Images with Algebraic Curve Models (TT, DBC), pp. 1225–1228.
ICPRICPR-v2-2000-LingC #feature model #performance
Fast and Efficient Feature Extraction Based on Bayesian Decision Boundaries (LLL, HMC), pp. 2390–2393.
ICPRICPR-v3-2000-CamilleriP #refinement
Spectral Unmixing of Mixed Pixels for Texture Boundary Refinement (KPC, MP), pp. 7096–7099.
ICPRICPR-v3-2000-KletteZ #fault #multi #order
Multigrid Error Bounds for Moments of Arbitrary Order (RK, JDZ), pp. 3790–3793.
ICPRICPR-v3-2000-KwanCG #approach #automation #using
Automatic Extraction of Bone Boundaries from CT Scans Using an Intelligence-Based Approach (FYK, KCC, IG), pp. 3441–3444.
ICPRICPR-v3-2000-RittscherS #detection
An Integral Criterion for Detecting Boundary Edges and Textured Regions (JR, JS), pp. 7076–7079.
ICPRICPR-v4-2000-LeungCKC #detection #fuzzy
Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method (CCL, FHYC, PCKK, WFC), pp. 4360–4363.
PLDIPLDI-2000-BodikGS #array #named
ABCD: eliminating array bounds checks on demand (RB, RG, VS), pp. 321–333.
PLDIPLDI-2000-RuginaR #analysis #array #memory management #pointer
Symbolic bounds analysis of pointers, array indices, and accessed memory regions (RR, MCR), pp. 182–195.
POPLPOPL-2000-CraryW #certification
Resource Bound Certification (KC, SW), pp. 184–198.
DACDAC-2000-GaurdianiSMSC #component #constant #simulation #statistics
An asymptotically constant, linearly bounded methodology for the statistical simulation of analog circuits including component mismatch effects (CG, SS, PM, PS, DC), pp. 15–18.
DACDAC-2000-Hassoun #analysis #using
Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
DACDAC-2000-NarasimhanR #on the #problem #scheduling #synthesis
On lower bounds for scheduling problems in high-level synthesis (MN, JR), pp. 546–551.
DATEDATE-2000-KruseSJSN #constraints #data flow #graph #power management
Lower Bounds on the Power Consumption in Scheduled Data Flow Graphs with Resource Constraints (LK, ES, GJ, AS, WN), p. 737.
DATEDATE-2000-ParkK #design #detection #fault
A New IEEE 1149.1 Boundary Scan Design for the Detection of Delay Defects (SP, TK), pp. 458–462.
DATEDATE-2000-SchwenckerSGA #automation #design
The Generalized Boundary Curve-A Common Method for Automatic Nominal Design and Design Centering of Analog Circuits (RS, FS, HEG, KA), pp. 42–47.
ESOPESOP-2000-Hofmann #functional #type system
A Type System for Bounded Space and Functional In-Place Update--Extended Abstract (MH0), pp. 165–179.
STOCSTOC-2000-Achlioptas #random #satisfiability
Setting 2 variables at a time yields a new lower bound for random 3-SAT (DA), pp. 28–37.
STOCSTOC-2000-Ambainis #quantum
Quantum lower bounds by quantum arguments (AA), pp. 636–643.
STOCSTOC-2000-AnderssonT #worst-case
Tight(er) worst-case bounds on dynamic searching and priority queues (AA, MT), pp. 335–342.
STOCSTOC-2000-BarkolR #nearest neighbour #problem
Tighter bounds for nearest neighbor search and related problems in the cell probe model (OB, YR), pp. 388–396.
STOCSTOC-2000-HarnikR
Higher lower bounds on monotone size (DH, RR), pp. 378–387.
STOCSTOC-2000-KonemannR #algorithm #approximate #matter
A matter of degree: improved approximation algorithms for degree-bounded minimum spanning trees (JK, RR), pp. 537–546.
CAVCAV-2000-AbdullaIN #petri net
Unfoldings of Unbounded Petri Nets (PAA, SPI, AN), pp. 495–507.
CAVCAV-2000-AyariB #higher-order #logic #monad
Bounded Model Construction for Monadic Second-Order Logics (AA, DAB), pp. 99–112.
CAVCAV-2000-Shtrichman #model checking #satisfiability
Tuning SAT Checkers for Bounded Model Checking (OS), pp. 480–494.
ICLPCL-2000-ChirkovaG #database
Linearly Bounded Reformulations of Conjunctive Databases (RC, MRG), pp. 987–1001.
CSLCSL-2000-Atserias #complexity #fixpoint
The Descriptive Complexity of the Fixed-Points of Bounded Formulas (AA), pp. 172–186.
CSLCSL-2000-Blumensath #complexity
Bounded Arithmetic and Descriptive Complexity (AB), pp. 232–246.
LICSLICS-2000-BussK
Resource-Bounded Continuity and Sequentiality for Type-Two Functionals (SRB, BMK), pp. 77–83.
SIGMODSIGMOD-1999-EmbleyJN #documentation #web
Record-Boundary Discovery in Web Documents (DWE, YSJ, YKN), pp. 467–478.
DLTDLT-1999-AndreBC #decidability #on the #query
On decidability of boundedness property for regular path queries (YA, FB, ACC), pp. 245–256.
ICALPICALP-1999-AllenderABDL
Bounded Depth Arithmetic Circuits: Counting and Closure (EA, AA, DAMB, SD, HL), pp. 149–158.
ICALPICALP-1999-AndreevBCR #branch #pseudo #set #source code
Small Pseudo-Random Sets Yield Hard Functions: New Tight Explict Lower Bounds for Branching Programs (AEA, JLB, AEFC, JDPR), pp. 179–189.
ICALPICALP-1999-DufordJS
Boundedness of Reset P/T Nets (CD, PJ, PS), pp. 301–310.
ICALPICALP-1999-GavoilleH #graph
Compact Routing Tables for Graphs of Bounded Genus (CG, NH), pp. 351–360.
ICALPICALP-1999-NiedermeierR #satisfiability
New Upper Bounds for MaxSat (RN, PR), pp. 575–584.
ICFPICFP-1999-HughesP #embedded #ml #programming #recursion #towards
Recursion and Dynamic Data-structures in Bounded Space: Towards Embedded ML Programming (JH, LP), pp. 70–81.
TOOLSTOOLS-USA-1999-PlasilBV #behaviour #component #protocol
Bounding Component Behavior via Protocols (FP, MB, SV), pp. 387–398.
PLDIPLDI-1999-BlellochC #garbage collection #multi #on the
On Bounding Time and Space for Multiprocessor Garbage Collection (GEB, PC), pp. 104–117.
PLDIBest-of-PLDI-1999-BlellochC99a #garbage collection #multi #on the
On bounding time and space for multiprocessor garbage collection (with retrospective) (GEB, PC), pp. 626–641.
DACDAC-1999-ChenW #approximate #fault
Error Bounded Padé Approximation via Bilinear Conformal Transformation (CPC, DFW), pp. 7–12.
DACDAC-1999-DrechslerG #using
Using Lower Bounds During Dynamic BDD Minimization (RD, WG), pp. 29–32.
DATEDATE-1999-ShinKK #multi #testing
At-Speed Boundary-Scan Interconnect Testing in a Board with Multiple System Clocks (JS, HK, SK), p. 473–?.
PDPPDP-1999-CasadoG #algorithm #branch #distributed
Work load balance approaches for branch and bound algorithms on distributed systems (LGC, IG), pp. 155–162.
PDPPDP-1999-Gennaro #clustering #modelling #performance
Performance models for I/O bound SPMD applications on clusters of workstations (CG), pp. 263–270.
STOCSTOC-1999-AmbainisNTV #automaton #quantum
Dense Quantum Coding and a Lower Bound for 1-Way Quantum Automata (AA, AN, ATS, UVV), pp. 376–383.
STOCSTOC-1999-BeameF #problem
Optimal Bounds for the Predecessor Problem (PB, FEF), pp. 295–304.
STOCSTOC-1999-BorodinOR #nearest neighbour #problem
Lower Bounds for High Dimensional Nearest Neighbor Search and Related Problems (AB, RO, YR), pp. 312–321.
STOCSTOC-1999-ChakrabartiCGL #approximate #complexity #nearest neighbour
A Lower Bound on the Complexity of Approximate Nearest-Neighbor Searching on the Hamming Cube (AC, BC, BG, AL), pp. 305–311.
STOCSTOC-1999-ChenKLW
Optimal Buy-and-Hold Strategies for Financial Markets with Bounded Daily Returns (GHC, MYK, YDL, HKW), pp. 119–128.
STOCSTOC-1999-DodisK #design #distance #network
Design Networks with Bounded Pairwise Distance (YD, SK), pp. 750–759.
STOCSTOC-1999-IshaiK #information retrieval
Improved Upper Bounds on Information-Theoretic Private Information Retrieval (YI, EK), pp. 79–88.
STOCSTOC-1999-RazR #on the
On Recycling the Randomness of States in Space Bounded Computation (RR, OR), pp. 159–168.
STOCSTOC-1999-RussellSZ
Lower Bounds for Leader Election and Collective Coin-Flipping in the Perfect Information Model (AR, MES, DZ), pp. 339–347.
TACASTACAS-1999-AbdullaAB #protocol #verification
Symbolic Verification of Lossy Channel Systems: Application to the Bounded Retransmission Protocol (PAA, AA, AB), pp. 208–222.
CSLCSL-1999-Beklemishev #query
Open Least Element Principle and Bounded Query Computation (LDB), pp. 389–404.
CSLCSL-1999-Toran
Lower Bounds for Space in Resolution (JT), pp. 362–373.
ICLPICLP-1999-PedreschiR #logic programming #nondeterminism #source code
Bounded Nondeterminism of Logic Programs (DP, SR), pp. 350–364.
ICTSSIWTCS-1999-BaumgartenH #testing
Testability with Unbounded Testing Strategies (BB, OH), pp. 43–60.
LICSLICS-1999-Johannsen #problem
Weak Bounded Arithmetic, the Diffie-Hellman Problem and Constable’s Class K (JJ), pp. 268–274.
LICSLICS-1999-Libkin #invariant #logic #query
Logics with Counting, Auxiliary Relations, and Lower Bounds for Invariant Queries (LL), pp. 316–325.
PODSPODS-1998-KoutsoupiasT #2d
Tight Bounds for 2-Dimensional Indexing Schemes (EK, DST), pp. 52–58.
PODSPODS-1998-SamoladasM #multi #query #theorem
A Lower Bound Theorem for Indexing Schemes and Its Application to Multidimensional Range Queries (VS, DPM), pp. 44–51.
ICALPICALP-1998-JuknaZ #branch #nondeterminism #on the #source code
On Branching Programs With Bounded Uncertainty (SJ, SZ), pp. 259–270.
ICMLICML-1998-Cesa-BianchiF #finite #multi #problem
Finite-Time Regret Bounds for the Multiarmed Bandit Problem (NCB, PF), pp. 100–108.
ICPRICPR-1998-Claridge #algorithm #consistency #locality #visual notation
A boundary localisation algorithm consistent with human visual perception (EC), pp. 300–304.
ICPRICPR-1998-FlorebySS #fourier #image #order #using
Boundary finding using Fourier surfaces of increasing order [simulated medical images] (LF, LS, KS), pp. 465–467.
ICPRICPR-1998-Heikkila #detection
Moment and curvature preserving technique for accurate ellipse boundary detection (JH), pp. 734–737.
ICPRICPR-1998-LeeHSL #analysis #automation #detection #parsing #using #video
Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
ICPRICPR-1998-SuriHS #automation #classification #polynomial
Automatic quadratic calibration for correction of pixel classification boundaries to an accuracy of 2.5 millimeters: an application in cardiac imaging (JSS, RMH, FHS), pp. 30–33.
PLDIPLDI-1998-XiP #array #dependent type
Eliminating Array Bound Checking Through Dependent Types (HX, FP), pp. 249–257.
DACDAC-1998-DengiR #2d #megamodelling
Boundary Element Method Macromodels for 2-D Hierachical Capacitance Extraction (EAD, RAR), pp. 218–223.
DATEDATE-1998-HelvigRZ #approximate #problem
Improved Approximation Bounds for the Group Steiner Problem (CSH, GR, AZ), pp. 406–413.
LCTESLCTES-1998-LiuG #analysis #automation
Automatic Accurate Time-Bound Analysis for High-Level Languages (YAL, GG), pp. 31–40.
PDPPDP-1998-JimenezLF #multi
Loop bounds computation for multilevel tiling (MJ, JML, AF), pp. 445–452.
STOCSTOC-1998-FeigeS #scheduling
Improved Bounds for Acyclic Job Shop Scheduling (UF, CS), pp. 624–633.
STOCSTOC-1998-FournierK #question
Are Lower Bounds Easier over the Reals? (HF, PK), pp. 507–513.
STOCSTOC-1998-Gal #source code
A Characterization of Span Program Size and Improved Lower Bounds for Monotone Span Programs (AG), pp. 429–437.
STOCSTOC-1998-Grigoriev #complexity #random
Randomized Complexity Lower Bounds (DG), pp. 219–223.
STOCSTOC-1998-GrigorievK #exponential
An Exponential Lower Bound for Depth 3 Arithmetic Circuits (DG, MK), pp. 577–582.
STOCSTOC-1998-ShokrollahiW #algebra #geometry
Decoding Algebraic-Geometric Codes Beyond the Error-Correction Bound (MAS, HW), pp. 241–248.
CAVCAV-1998-AbdullaBJ #analysis #on the fly
On-the-Fly Analysis of Systems with Unbounded, Lossy FIFO Channels (PAA, AB, BJ), pp. 305–318.
CSLCSL-1998-Buning
An Upper Bound for Minimal Resolution Refutations (HKB), pp. 171–178.
CSLCSL-1998-Schwentick #complexity #linear
Descriptive Complexity, Lower Bounds and Linear Time (TS), pp. 9–28.
LICSLICS-1998-KolaitisO #first-order #logic #on the #problem
On the Boundedness Problem for Two-Variable First-Order Logic (PGK, MO), pp. 513–524.
ICDARICDAR-1997-Nishida #documentation #feature model #image
Boundary Feature Extraction from Gray-Scale Document Images (HN), pp. 132–141.
ICDARICDAR-1997-Szmurlo #normalisation #recognition
Boundary Normalization for Recognition of Non-Touching Non-Degraded Characters (MS), pp. 463–466.
DLTDLT-1997-BuchholzK #on the #power of
On the power of one-way bounded cellular time computers (TB, MK), pp. 365–375.
DLTDLT-1997-FernauHF #distributed
Bounding resources in Cooperating Distributed Grammar Systems (HF, MH, RF), pp. 261–272.
DLTDLT-1997-IwamaT #automaton #nondeterminism
Tight Bounds on the Number of States of DFA’s That Are Equivalent to n-state NFA’s (KI, KT), pp. 147–154.
DLTDLT-1997-KarhumakiPM #constant
A lower bound for a constant in Shallit’s conjecture (JK, WP, FM), pp. 103–118.
ICALPICALP-1997-Ambainis #communication #complexity #information retrieval
Upper Bound on Communication Complexity of Private Information Retrieval (AA), pp. 401–407.
ICALPICALP-1997-BeigelF #nondeterminism #performance #recursion
Molecular Computing, Bounded Nondeterminism, and Efficient Recursion (RB, BF), pp. 816–826.
ICALPICALP-1997-Bournez #constant #power of
Some Bounds on the Computational Power of Piecewise Constant Derivative Systems (OB), pp. 143–153.
ICALPICALP-1997-Bruyere #algorithm
A Completion Algorithm for Codes with Bounded Synchronization Delay (VB), pp. 87–97.
ICALPICALP-1997-BuhrmanFF
Results on Resource-Bounded Measure (HB, SAF, LF), pp. 188–194.
ICALPICALP-1997-Hagerup #algorithm #graph
Dynamic Algorithms for Graphs of Bounded Treewidth (TH), pp. 292–302.
ICFPICFP-1997-ChinH
A Bounds Inference Method for Vector-Based Memoisation (WNC, MH), pp. 176–187.
ICMLICML-1997-Fiechter #learning #online
Expected Mistake Bound Model for On-Line Reinforcement Learning (CNF), pp. 116–124.
PEPMPEPM-1997-Debray #partial evaluation
Resource-Bounded Partial Evaluation (SKD), pp. 179–192.
DACDAC-1997-BeattieP
Bounds for BEM Capacitance Extraction (MWB, LTP), pp. 133–136.
DACDAC-1997-KahngT
More Practical Bounded-Skew Clock Routing (ABK, CWAT), pp. 594–599.
DACDAC-1997-LiaoD #problem #using
Solving Covering Problems Using LPR-Based Lower Bounds (SYL, SD), pp. 117–120.
DATEEDTC-1997-ChakrabortyM #functional #parallel #programmable #testing
A programmable boundary scan technique for board-level, parallel functional duplex march testing of word-oriented multiport static RAMs (KC, PM), pp. 330–334.
DATEEDTC-1997-Kristof #architecture #effectiveness #idea #self #testing
Extension of the boundary-scan architecture and new idea of BIST for more effective testing and self-testing of interconnections (AK), p. 630.
STOCSTOC-1997-Albers #online #scheduling
Better Bounds for Online Scheduling (SA), pp. 130–139.
STOCSTOC-1997-Aspnes #distributed #random
Lower Bounds for Distributed Coin-Flipping and Randomized Consensus (JA), pp. 559–568.
STOCSTOC-1997-GoldreichR #graph #testing
Property Testing in Bounded Degree Graphs (OG, DR), pp. 406–415.
STOCSTOC-1997-GrigorievK #random
Randomized Ω(n²) Lower Bound for Knapsack (DG, MK), pp. 76–85.
STOCSTOC-1997-PaturiSZ #exponential
Exponential Lower Bounds for Depth 3 Boolean Circuits (RP, MES, FZ), pp. 86–91.
TACASTACAS-1997-DArgenioKRT #exclamation #protocol
The Bounded Retransmission Protocol Must Be on Time! (PRD, JPK, TCR, JT), pp. 416–431.
TAPSOFTTAPSOFT-1997-AndreB #difference #transducer
Word-into-Tree Transducers with Bounded Difference (YA, FB), pp. 177–188.
CSLCSL-1997-BonetG #linear #simulation
Linear Lower Bounds and Simulations in Frege Systems with Substitutions (MLB, NG), pp. 115–128.
ICLPILPS-1997-DebrayLHL #estimation #logic programming #source code
Lower Bound Cost Estimation for Logic Programs (SKD, PLG, MVH, NWL), pp. 291–305.
ICLPILPS-1997-KingSB #analysis #logic programming #source code
Lower-bound Time-complexity Analysis of Logic Programs (AK, KS, FB), pp. 261–275.
ADLADL-1996-ChingJW #enterprise #library
Authorization in the Digital Library: Secure Access to Services Across Enterprise Boundaries (NC, VEJ, MW), pp. 110–119.
ICALPICALP-1996-AtenieseBSS #encryption #visual notation
Constructions and Bounds for Visual Cryptography (GA, CB, ADS, DRS), pp. 416–428.
ICALPICALP-1996-BradfordR
Lower Bounds for Row Minima Searching (PGB, KR), pp. 454–465.
ICALPICALP-1996-Hashiguchi #automaton #distance
New Upper Bounds to the Limitedness of Distance Automata (KH), pp. 324–335.
ICALPICALP-1996-Miltersen #multi
Lower Bounds for Static Dictionaries on RAMs with Bit Operations But No Multiplication (PBM), pp. 442–453.
ICALPICALP-1996-Razborov #independence #proving
Lower Bounds for Propositional Proofs and Independence Results in Bounded Arithmetic (AAR), pp. 48–62.
CSCWCSCW-1996-RandallR #development
Ethnography and Systems Development: Bounding the Intersection (DR, MR), p. 5.
CIKMCIKM-1996-Greco #set #unification
Optimal Unification of Bounded Simple Set Terms (SG), pp. 326–336.
ICPRICPR-1996-GunnN #energy #using
Snake head boundary extraction using global and local energy minimisation (SRG, MSN), pp. 581–585.
ICPRICPR-1996-LakshmananW #detection #image
Detection of bounded weak echo regions in meteorological radar images (VL, AW), pp. 895–899.
ICPRICPR-1996-SuriHS #automation #fault
Correction of systematic errors in automatically produced boundaries from low-contrast ventriculograms (JSS, RMH, FHS), pp. 361–365.
ICPRICPR-1996-SzeL #algorithm #branch #classification
Branch and bound algorithm for the Bayes classifier (LS, CHL), pp. 705–709.
KRKR-1996-Hendler #implementation #research
Implementations and Research: Discussions at the Boundary (JAH), pp. 659–660.
KRKR-1996-MacGregor #implementation #research
Implementations and Research: Discussions at the Boundary (RMM), pp. 657–658.
KRKR-1996-Schubert #implementation #research
Implementations and Research: Discussions at the Boundary (LKS), pp. 661–662.
KRKR-1996-Shapiro #implementation #research
Implementations and Research: Discussions at the Boundary (SCS), pp. 663–664.
DACDAC-1996-OhPP #linear #programming #using
Constructing Lower and Upper Bounded Delay Routing Trees Using Linear Programming (JO, IP, MP), pp. 401–404.
DACDAC-1996-ParulkarGB #data flow #graph
Lower Bounds on Test Resources for Scheduled Data Flow Graphs (IP, SKG, MAB), pp. 143–148.
STOCSTOC-1996-BabaiGKRSW #graph #source code
Extremal Bipartite Graphs and Superpolynomial Lower Bounds for Monotone Span Programs (LB, AG, JK, LR, TS, AW), pp. 603–611.
STOCSTOC-1996-BartalFL #graph #online #problem
Lower Bounds for On-line Graph Problems with Application to On-line Circuit and Optical Routing (YB, AF, SL), pp. 531–540.
STOCSTOC-1996-Basu #algebra #on the #set
On Bounding the Betti Numbers and Computing the Euler Characteristic of Semi-Algebraic Sets (SB), pp. 408–417.
STOCSTOC-1996-Cesa-BianchiDFS #learning
Noise-Tolerant Learning Near the Information-Theoretic Bound (NCB, ED, PF, HUS), pp. 141–150.
STOCSTOC-1996-EvansP
Lower Bounds for Noisy Boolean Decision Trees (WSE, NP), pp. 620–628.
STOCSTOC-1996-GrigorievKHS #algebra #random
A Lower Bound for Randomized Algebraic Decision Trees (DG, MK, FMadH, RS), pp. 612–619.
CADECADE-1996-Vorobyov
An Improved Lower Bound for the Elementary Theories of Trees (SGV), pp. 275–287.
CAVCAV-1996-ClarkeBLXS #analysis #named #realtime #specification #tool support #visual notation
XVERSA: An Integrated Graphical and Textual Toolset for the Specification and Analysis of Resource-Bound Real-Time Sytems (DC, HBA, IL, HlX, OS), pp. 402–405.
CSLCSL-1996-Dziembowski #fixpoint #query
Bounded-Variable Fixpoint Queries are PSPACE-complete (SD), pp. 89–105.
CSLCSL-1996-Merkle
Exact Pairs for Abstract Bounded Reducibilities (WM), pp. 349–368.
LICSLICS-1996-Marcinkowski #datalog #decidability
DATALOG SIRUPs Uniform Boundedness is Undecidable (JM), pp. 13–24.
ICDARICDAR-v2-1995-HaHP #component #recursion #using
Recursive X-Y cut using bounding boxes of connected components (JH, RMH, ITP), pp. 952–955.
ICDARICDAR-v2-1995-HaHP95a #composition #documentation
Document page decomposition by the bounding-box project (JH, RMH, ITP), pp. 1119–1122.
PODSPODS-1995-DongS
Space-Bounded FOIES (GD, JS), pp. 139–150.
PODSPODS-1995-Vardi #complexity #on the #query
On the Complexity of Bounded-Variable Queries (MYV), pp. 266–276.
SIGMODSIGMOD-1995-PapadiasTSE #case study
Topological Relations in the World of Minimum Bounding Rectangles: A Study with R-trees (DP, YT, TKS, MJE), pp. 92–103.
VLDBVLDB-1995-FlodinR #object-oriented #query
Processing Object-Oriented Queries with Invertible Late Bound Functions (SF, TR), pp. 335–344.
DLTDLT-1995-Dorr #abstract interpretation
Computing an Upper Bound for SVS(gg) by Abstract Interpretation (HD), pp. 279–288.
DLTDLT-1995-GvozdjakR #parallel
Time-Bounded Parallel Rewriting (PG, BR), pp. 79–87.
ICALPICALP-1995-Ben-AmramG #algebra #random
Lower Bounds on Algebraic Random Access Machines (AMBA, ZG), pp. 360–371.
ICALPICALP-1995-BodlaenderH #algorithm #parallel
Parallel Algorithms with Optimal Speedup for Bounded Treewidth (HLB, TH), pp. 268–279.
ICALPICALP-1995-BozanisKMT #problem
New Upper Bounds for Generalized Intersection Searching Problems (PB, NK, CM, AKT), pp. 464–474.
ICALPICALP-1995-FreivaldsK #random
Lower Time Bounds for Randomized Computation (RF, MK), pp. 183–195.
ICMLICML-1995-Drakopoulos #classification #fault #nearest neighbour
Bounds on the Classification Error of the Nearest Neighbor Rule (JAD), pp. 203–208.
PLDIPLDI-1995-BarrettZ #garbage collection #using
Garbage Collection Using a Dynamic Threatening Boundary (DAB, BGZ), pp. 301–314.
POPLPOPL-1995-CastagnaP #decidability #named #quantifier
Corrigendum: Decidable Bounded Quantification (GC, BCP), p. 408.
POPLPOPL-1995-HoangM #type inference #type system
Lower Bounds on Type Inference with Subtypes (MH, JCM), pp. 176–185.
POPLPOPL-1995-Vorobyov #decidability #quantifier
Structural Decidable Extensions of Bounded Quantification (SGV), pp. 164–175.
DACDAC-1995-GuptaKTWP
The Elmore Delay as a Bound for RC Trees with Generalized Input Signals (RG, BK, BT, JW, LTP), pp. 364–369.
DACDAC-1995-HuangKT #on the #problem
On the Bounded-Skew Clock and Steiner Routing Problems (DJHH, ABK, CWAT), pp. 508–513.
STOCSTOC-1995-AnderssonHP #array
A tight lower bound for searching a sorted array (AA, JH, OP), pp. 417–426.
STOCSTOC-1995-BonetPR #proving
Lower bounds for cutting planes proofs with small coefficients (MLB, TP, RR), pp. 575–584.
STOCSTOC-1995-CanettiI #power of #random #scheduling
Bounding the power of preemption in randomized scheduling (RC, SI), pp. 606–615.
STOCSTOC-1995-Chazelle
Lower bounds for off-line range searching (BC), pp. 733–740.
STOCSTOC-1995-EdmondsP
A nearly optimal time-space lower bound for directed st-connectivity on the NNJAG model (JE, CKP), pp. 147–156.
STOCSTOC-1995-Eppstein #geometry #optimisation #parametricity
Geometric lower bounds for parametric matroid optimization (DE), pp. 662–671.
STOCSTOC-1995-Harchol-BalterW #network
Bounding delays in packet-routing networks (MHB, DW), pp. 248–257.
STOCSTOC-1995-KahaleLMPSS #network #sorting
Lower bounds for sorting networks (NK, FTL, YM, CGP, TS, ES), pp. 437–446.
STOCSTOC-1995-KarpinskiM #network #polynomial
Polynomial bounds for VC dimension of sigmoidal neural networks (MK, AM), pp. 200–208.
STOCSTOC-1995-Ponzio #branch #integer #multi #source code
A lower bound for integer multiplication with read-once branching programs (SP), pp. 130–139.
TAPSOFTTAPSOFT-1995-BadouelBD #algorithm #polynomial #synthesis
Polynomial Algorithms for the Synthesis of Bounded Nets (EB, LB, PD), pp. 364–378.
PODSPODS-1994-Afrati #datalog #exclamation #graph #query
Bounded Arity Datalog (!=) Queries on Graphs (FNA), pp. 97–106.
ICALPICALP-1994-AumannBF #cost analysis #fault #on the
On the Cost of Recomputing: Tight Bounds on Pebbling with Faults (YA, JBI, UF), pp. 47–58.
ICALPICALP-1994-Bonizzoni
A Tight Lower Bound for Primitivity in k-Structures (PB), pp. 556–567.
ICALPICALP-1994-BuhrmanT #on the
On the Cutting Edge of Relativization: The Resource Bounded Injury Method (HB, LT), pp. 263–273.
ICALPICALP-1994-FreivaldsK #random
Lower Space Bounds for Randomized Computation (RF, MK), pp. 580–592.
ICALPICALP-1994-PlaxtonS #network #sorting
A Super-Logarithmic Lower Bound for Hypercubic Sorting Networks (CGP, TS), pp. 618–629.
ICALPICALP-1994-Pudlak #communication #complexity #game studies
Unexpected Upper Bounds on the Complexity of Some Communication Games (PP), pp. 1–10.
ICGTTAGT-1994-ArnborgP #graph #subclass
A Technique for Recognizing Graphs of Bounded Treewidth with Application to Subclasses of Partial 2-Paths (SA, AP), pp. 469–486.
ICGTTAGT-1994-SkodinisW #graph grammar #problem
The Bounded Degree Problem for Non-Obstructing eNCE Graph Grammars (KS, EW), pp. 211–224.
POPLPOPL-1994-CastagnaP #decidability #quantifier
Decidable Bounded Quantification (GC, BCP), pp. 151–162.
REICRE-1994-DrakeT #analysis
System bounding issues for analysis (JMD, WTT), pp. 24–31.
DACDAC-1994-ZhuW
Switch Bound Allocation for Maximizing Routability in Timing-Driven Routing of FPGAs (KZ, DFW), pp. 165–170.
DATEEDAC-1994-DalkilicP #scheduling #using
Optimal Operation Scheduling Using Resource Lower Bound Estimations (MED, VP), pp. 319–324.
DATEEDAC-1994-KarkkainenTW #monitoring #power management #testing
Boundary Scan Testing Combined with Power Supply Current Monitoring (MK, KT, MW), pp. 232–235.
DATEEDAC-1994-Su #random testing #testing
Random Testing of Interconnects in A Boundary Scan Environment (CS), pp. 226–231.
HPDCHPDC-1994-Benslimane #communication #finite #state machine
Deciding Boundedness for Systems of Two Communicating Finite State Machines (AB), pp. 262–269.
PDPPDP-1994-DiersteinHR #algorithm #array
A Branch-and-bound Algorithm For Array Distributions (AD, RH, TR), pp. 528–535.
STOCSTOC-1994-BodlaenderFH #problem
Beyond NP-completeness for problems of bounded width: hardness for the W hierarchy (HLB, MRF, MTH), pp. 449–458.
STOCSTOC-1994-FortnowW #game studies
Optimality and domination in repeated games with bounded players (LF, DW), pp. 741–749.
STOCSTOC-1994-GrigorievKV #algebra #testing
Lower bounds on testing membership to a polyhedron by algebraic decision trees (DG, MK, NV), pp. 635–644.
STOCSTOC-1994-HalldorssonR #approximate #graph #independence #set
Greed is good: approximating independent sets in sparse and bounded-degree graphs (MMH, JR), pp. 439–448.
STOCSTOC-1994-Miltersen #problem #random
Lower bounds for union-split-find related problems on random access machines (PBM), pp. 625–634.
STOCSTOC-1994-Mulmuley #linear #parallel #problem #programming
Lower bounds for parallel linear programming and other problems (KM), pp. 603–614.
STOCSTOC-1994-PapadimitriouY #complexity #on the
On complexity as bounded rationality (CHP, MY), pp. 726–733.
STOCSTOC-1994-YangA #problem
Time bounds for mutual exclusion and related problems (JHY, JHA), pp. 224–233.
ISSTAISSTA-1994-BertolinoM #branch #testing
A Meaningful Bound for Branch Testing (AB, MM), p. 202.
LICSLICS-1994-ImpagliazzoPU #proving
Upper and Lower Bounds for Tree-Like Cutting Planes Proofs (RI, TP, AU), pp. 220–228.
ICDARICDAR-1993-Breul #fault #recognition #using
Recognition of handprinted digits using optimal bounded error matching (TMB), pp. 493–496.
ICALPICALP-1993-Ablayev #communication #complexity #probability
Lower Bounds for One-way Probabilistic Communication Complexity (FMA), pp. 241–252.
ICALPICALP-1993-Kann #approximate #problem
Polynomially Bounded Minimization Problems which are Hard to Approximate (VK), pp. 52–63.
ICALPICALP-1993-KozenZ #problem
Optimal Bounds for the Change-Making Problem (DK, SZ), pp. 150–161.
ICALPICALP-1993-Yamamoto #nondeterminism #trade-off #turing machine
Reversal-Space Trade-offs For Simultaneous Resource-Bounded Nondeterministic Turing Machines (HY), pp. 203–214.
TLCATLCA-1993-Pierce #morphism #polymorphism
Intersection Types and Bounded Polymorphism (BCP), pp. 346–360.
TLCATLCA-1993-Springintveld #reduction
Lower and Upper Bounds for Reductions of Types in λω and λP (JS), pp. 391–405.
CIKMCIKM-1993-CosarLS #multi #optimisation #query
Multiple Query Optimization with Depth-First Branch-and-Bound and Dynamic Query Ordering (AC, EPL, JS), pp. 433–438.
CIKMCIKM-1993-Maine #named #performance
HSGIMS — A Secure High-Speed Tool with Bound Search Times for Transparently Managing and Manipulating Information (PADdM), pp. 216–222.
PPDPPLILP-1993-BarklundB #memory management #multi
Executing Bounded Quantifications on Shared Memory Multiprocessors (JB, JB), pp. 302–317.
ASEKBSE-1993-Feather #implementation
An Implementation of Bounded Obligations (MSF), p. 18.
SACSAC-1993-VaidyanathanL #analysis #learning
Analysis of Upper Bound in Valiant’s Model for Learning Bounded CNF Expressions (SV, SL), pp. 754–761.
SACSAC-1993-VeezhinathanKT #branch #hybrid
A Hybrid of Neural Net and Branch and Bound Techniques for Seismic Horizon Tracking (JV, FK, JT), pp. 173–178.
DACDAC-1993-Lee #2d #algorithm #design
A Bounded 2D Contour Searching Algorithm for Floorplan Design with Arbitrarily Shaped Rectilinear and Soft Modules (TcL), pp. 525–530.
STOCSTOC-1993-ChazelleEGGSW #set
Improved bounds on weak epsilon-nets for convex sets (BC, HE, MG, LJG, MS, EW), pp. 495–504.
STOCSTOC-1993-KushilevitzMRZ #random
Lower bounds for randomized mutual exclusion (EK, YM, MOR, DZ), pp. 154–163.
STOCSTOC-1993-Maass #complexity #learning
Bounds for the computational power and learning complexity of analog neural nets (WM), pp. 335–344.
STOCSTOC-1993-PlotkinT #multi
Improved bounds on the max-flow min-cut ratio for multicommodity flows (SAP, ÉT), pp. 691–697.
STOCSTOC-1993-WigdersonZ
Expanders that beat the eigenvalue bound: explicit construction and applications (AW, DZ), pp. 245–251.
CSLCSL-1993-Grohe #fixpoint #logic
Bounded-Arity Hierarchies in Fixed-Point Logics (MG), pp. 150–164.
ICLPICLP-1993-Brzoska #logic programming
Temporal Logic Programming with Bounded Universal Modality Goals (CB), pp. 239–256.
ISSTAISSTA-1993-CorbettA #concurrent #realtime
A Practical Technique for Bounding the Time Between Events in Concurrent Real-Time Systems (JCC, GSA), pp. 110–116.
PODSPODS-1992-WongA #concurrent #consistency #database #nondeterminism
Tolerating Bounded Inconsistency for Increasing Concurrency in Database Systems (MHW, DA), pp. 236–245.
ICALPICALP-1992-ChazelleR #complexity #pointer
Lower Bounds on the Complexity of Simplex Range Reporting on a Pointer Machine (BC, BR), pp. 439–449.
ICALPICALP-1992-SantisPY #proving #statistics #verification
One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier (ADS, GP, MY), pp. 28–40.
KRKR-1992-Schwarz #logic
Bounding Introspection in Nonmonotonic Logic (GS), pp. 581–590.
POPLPOPL-1992-NielsonN #fixpoint
Bounded Fixed Point Iteration (HRN, FN), pp. 71–82.
POPLPOPL-1992-Pierce #decidability #quantifier
Bounded Quantification is Undecidable (BCP), pp. 305–315.
DACDAC-1992-LingKW #3d #approach #simulation
A Boundary-Element Approach to Transient simulation of Three-Dimensional Integrated Circuit Interconnect (DDL, SK, JW), pp. 93–98.
HPDCHPDC-1992-ClaytonDMW #latency
Determining Update Latency Bounds in Galactica Net (SC, RJD, WM, AW), pp. 104–111.
STOCSTOC-1992-BeameIKPPW #exponential #principle
Exponential Lower Bounds for the Pigeonhole Principle (PB, RI, JK, TP, PP, ARW), pp. 200–220.
STOCSTOC-1992-BjornerLY #linear
Linear Decision Trees: Volume Estimates and Topological Bounds (AB, LL, ACCY), pp. 170–177.
STOCSTOC-1992-DworkW #concurrent #exclamation #performance
Simple and Efficient Bounded Concurrent Timestamping or Bounded Concurrent Timestamp Systems are Comprehensible! (CD, OW), pp. 655–666.
STOCSTOC-1992-MaggsS #algorithm #network
Simple Algorithms for Routing on Butterfly Networks with Bounded Queues (BMM, RKS), pp. 150–161.
CSLCSL-1992-Stewart #logic #polynomial #query
Logical Characterization of Bounded Query Classes II: Polynomial-Time Oracle Machines (IAS), pp. 410–424.
PODSPODS-1991-HillebrandKMV #datalog #tool support
Tools for Datalog Boundedness (GGH, PCK, HGM, MYV), pp. 1–12.
PODSPODS-1991-JohnsonR #consistency #protocol #replication
A Tight Upper Bound on the Benefits of Replication and Consistency Control Protocols (DBJ, LR), pp. 75–81.
PODSPODS-1991-KrishnakumarB
Bounded Ignorance in Replicated Systems (NK, AJB), pp. 63–74.
PODSPODS-1991-MumickP #linear #query
Overbound and Right-Linear Queries (ISM, HP), pp. 127–141.
ICALPICALP-1991-HonkalaS #ambiguity #morphism
L Morphisms: Bounded Delay and Regularity of Ambiguity (JH, AS), pp. 566–574.
RTARTA-1991-Baader #problem #unification
Unification, Weak Unification, Upper Bound, Lower Bound, and Generalization Problems (FB), pp. 86–97.
RTARTA-1991-Brandenburg #confluence #equivalence #graph grammar
The Equivalence of Boundary and Confluent Graph Grammars on Graph Languages of Bounded Degree (FJB), pp. 312–322.
RTARTA-1991-Hofbauer #proving #term rewriting #termination
Time Bounded Rewrite Systems and Termination Proofs by Generalized Embedding (DH), pp. 62–73.
RTARTA-1991-Pottier #algorithm #linear
Minimal Solutions of Linear Diophantine Systems: Bounds and Algorithms (LP), pp. 162–173.
ICMLML-1991-YooF #effectiveness #identification
Identifying Cost Effective Boundaries of Operationality (JPY, DHF), pp. 569–573.
DACDAC-1991-OnoderaTT #layout
Branch-and-Bound Placement for Building Block Layout (HO, YT, KT), pp. 433–439.
PPoPPPPoPP-1991-NicolauW #parallel
Optimal Schedules for Parallel Prefix Computation with Bounded Resources (AN, HW), pp. 1–10.
TAPSOFTCAAP-1991-Caron #automaton #linear #term rewriting
Linear Bounded Automata and Rewrite Systems: Influence of Initial Configurations on Decision Properties (ACC), pp. 74–89.
STOCSTOC-1991-AslamD #fault
Searching in the Presence of Linearly Bounded Errors (JAA, AD), pp. 486–493.
STOCSTOC-1991-AttiyaDLS #nondeterminism
Bounds on the Time to Reach Agreement in the Presence of Timing Uncertainty (HA, CD, NAL, LJS), pp. 359–369.
STOCSTOC-1991-BreslauerG #parallel #string
A Lower Bound for Parallel String Matching (DB, ZG), pp. 439–443.
STOCSTOC-1991-KarloffRR #algorithm #random
Lower Bounds for Randomized k-Server and Motion Planning Algorithms (HJK, YR, YR), pp. 278–288.
STOCSTOC-1991-Nisan #commutative
Lower Bounds for Non-Commutative Computation (NN), pp. 410–418.
CAVCAV-1991-JardJ #algorithm #on the fly #verification
Bounded-memory Algorithms for Verification On-the-fly (CJ, TJ), pp. 192–202.
CSLCSL-1991-Flum #on the
On Bounded Theories (JF), pp. 111–118.
CSLCSL-1991-Goerdt #proving
The Cutting Plane Proof System with Bounded Degree of Falsity (AG), pp. 119–133.
LICSLICS-1991-Hungar #complexity #hoare #proving
Complexity Bounds of Hoare-style Proof Systems (HH), pp. 120–126.
ICMLML-1990-Hirsh #consistency #learning #nondeterminism
Learning from Data with Bounded Inconsistency (HH), pp. 32–39.
PLDIPLDI-1990-Gupta #array #fresh look #optimisation
A Fresh Look at Optimizing Array Bound Checking (RG), pp. 272–282.
PLDIPLDI-1990-SanthanamO
Register Allocation Across Procedure and Module Boundaries (VS, DO), pp. 28–39.
STOCSTOC-1990-Cleve #simulation #source code #towards
Towards Optimal Simulations of Formulas by Bounded-Width Programs (RC), pp. 271–277.
STOCSTOC-1990-Frederickson
The Information Theory Bound Is Tight for Selection in a Heap (GNF), pp. 26–33.
STOCSTOC-1990-Nisan #generative
Psuedorandom Generators for Space-Bounded Computation (NN), pp. 204–212.
STOCSTOC-1990-OgiwaraW #on the #polynomial #set
On Polynomial Time Bounded Truth-Table Reducibility of NP Sets to Sparse Sets (MO, OW), pp. 457–467.
STOCSTOC-1990-Poutre #pointer #problem
Lower Bounds for the Union-Find and the Split-Find Problem on Pointer Machines (JALP), pp. 34–44.
STOCSTOC-1990-Szegedy #communication #complexity #symmetry
Functions with Bounded Symmetric Communication Complexity and Circuits with mod m Gates (MS), pp. 278–286.
STOCSTOC-1990-Zuckerman
A Technique for Lower Bounding the Cover Time (DZ), pp. 254–259.
CSLCSL-1990-HertrampfW #fault #interactive #proving
Interactive Proof Systems: Provers, Rounds, and Error Bounds (UH, KWW), pp. 261–273.
CSLCSL-1990-Pudlak #theorem
Ramsey’s Theorem in Bounded Arithmetic (PP), pp. 308–317.
CSLCSL-1990-Ranaivoson #graph #problem
Nontrivial Lower Bounds for some NP-Problems on Directed Graphs (SR), pp. 318–339.
LICSLICS-1990-HarelRV #concurrent #on the #power of #reasoning #source code
On the Power of Bounded Concurrency~III: Reasoning About Programs (DH, RR, MYV), pp. 478–488.
PODSPODS-1989-DublishM #fixpoint #query
Expressibility of Bounded-Arity Fixed-Point Query Hierarchies (PD, SNM), pp. 324–335.
ICALPICALP-1989-AllenderH
Lower Bounds for the Low Hierarchy (EA, LAH), pp. 31–45.
ICALPICALP-1989-BilardiM
Time Lower Bounds For CREW-PRAM Computation Of Monotone Functions (GB, AM), pp. 95–107.
ICALPICALP-1989-BrassardC
Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (GB, CC, MY), pp. 123–136.
ICALPICALP-1989-Cardone #quantifier #recursion #relational #semantics
Relational Semantics for Recursive Types and Bounded Quantification (FC), pp. 164–178.
ICALPICALP-1989-MansourST
Lower Bounds for Computations with the Floor Operation (YM, BS, PT), pp. 559–573.
FPCAFPCA-1989-CanningCHOM #morphism #object-oriented #polymorphism #programming
F-Bounded Polymorphism for Object-Oriented Programming (PSC, WRC, WLH, WGO, JCM), pp. 273–280.
DACDAC-1989-PatilB #algorithm #branch #generative #parallel #testing
A Parallel Branch and Bound Algorithm for Test Generation (SP, PB), pp. 339–343.
SOSPSOSP-1989-BarkleyL #lazy evaluation
A Lazy Buddy System Bounded by Two Coalescing Delays per Class (REB, TPL), pp. 167–176.
TAPSOFTCAAP-1989-BeauquierCPV
Syntactical Properties of Unbounded Nets of Processors (JB, AC, AP0, GVN), pp. 119–133.
TAPSOFTCAAP-1989-HabelKV #decidability #graph grammar #problem
Decidable Boundedness Problems for Hyperedge-Replacement Graph Grammar (AH, HJK, WV), pp. 275–289.
STOCSTOC-1989-BorodinRT #sequence #traversal
Lower Bounds on the Length of Universal Traversal Sequences (AB, WLR, MT), pp. 562–573.
STOCSTOC-1989-DolevS #concurrent
Bounded Concurrent Time-Stamp Systems Are Constructible (DD, NS), pp. 454–466.
CSLCSL-1989-Meinel #source code
Ω-Branching Programs of Bounded Width (CM), pp. 242–253.
LICSLICS-1989-Stolboushkin #complexity #logic
Some Complexity Bounds for Dynamic Logics (APS), pp. 324–332.
PODSPODS-1988-RamakrishnaM #analysis
Analysis of Bounded Disorder File Organization (MVR, PM), pp. 117–125.
PODSPODS-1988-Vardi #decidability #linear #query #recursion
Decidability and Undecidability Results for Boundedness of Linear Recursive Queries (MYV), pp. 341–351.
ICALPICALP-1988-Bodlaender #graph #programming
Dynamic Programming on Graphs with Bounded Treewidth (HLB), pp. 105–118.
ICALPICALP-1988-ChangIP #modelling #parallel #performance #simulation
Efficient Simulations of Simple Models of Parallel Computation by Time-Bounded ATM’s and Space-Bounded TM’s (JHC, OHI, MAP), pp. 119–132.
LISPLFP-1988-Martini #modelling #quantifier
Bounded Quantifiers Have Interval Models (SM), pp. 164–173.
ICMLML-1988-BravermanR
Boundaries of Operationality (MSB, SJR), pp. 221–234.
STOCSTOC-1988-KarpZ #parallel #random
A Randomized Parallel Branch-and-Bound Procedure (RMK, YZ), pp. 290–300.
STOCSTOC-1988-King #complexity #graph
Lower Bounds on the Complexity of Graph Properties (VK), pp. 468–476.
CADECADE-1988-VermaR #parallel
Optimal Time Bounds for Parallel Term Matching (RMV, IVR), pp. 694–703.
CADECADE-1988-Walther #algorithm #automation #proving #termination
Argument-Bounded Algorithms as a Basis for Automated Termination Proofs (CW), pp. 602–621.
LICSLICS-1988-BruceL #inheritance #quantifier
A Modest Model of Records, Inheritance and Bounded Quantification (KBB, GL), pp. 38–50.
PODSPODS-1987-BeeriKBR #logic programming #source code
Bounds on the Propagation of Selection into Logic Programs (CB, PCK, FB, RR), pp. 214–226.
PODSPODS-1987-ChanH #database #dependence #design #functional #on the
On Designing Database Schemes Bounded or Constant-time-maintainable with respect to Functional Dependencies (EPFC, HJH), pp. 48–57.
PODSPODS-1987-NaughtonS #decidability #recursion
A Decidable Class of Bounded Recursions (JFN, YS), pp. 227–236.
ICALPICALP-1987-Dietzfelbinger #sorting
Lower Bounds for Sorting of Sums (MD), pp. 457–466.
ICALPICALP-1987-MehlhornNA #complexity #problem
A Lower Bound for the Complexity of the Union-Split-Find Problem (KM, SN, HA), pp. 479–488.
STOCSTOC-1987-BeameH #problem
Optimal Bounds for Decision Problems on the CRCW PRAM (PB, JH), pp. 83–93.
STOCSTOC-1987-Smolensky #algebra #complexity #formal method
Algebraic Methods in the Theory of Lower Bounds for Boolean Circuit Complexity (RS), pp. 77–82.
LICSLICS-1987-ImmermanK
Definability with Bounded Number of Bound Variables (NI, DK), pp. 236–244.
ICALPICALP-1986-Schoning #recursion
Lower Bounds by Recursion Theoretic Arguments (US), pp. 370–375.
ICALPICALP-1986-Willard #problem #query
Lower Bounds for Dynamic Range Query Problems That Permit Subtraction (DEW), pp. 444–453.
ICGTGG-1986-Welzl #graph grammar
Boundary NlC and partition controlled graph grammars (EW), pp. 593–609.
OOPSLAOOPSLA-1986-MittalBK
Virtual Copies — At the Boundary Between Classes and Instances (SM, DGB, KMK), pp. 159–166.
DACDAC-1986-LinA #layout #named
Minplex — a compactor that minimizes the bounding rectangle and individual rectangles in a layout (SLL, JA), pp. 123–130.
STOCSTOC-1986-AjtaiBHKPRST #branch #source code
Two lower bounds for branching programs (MA, LB, PH, JK, PP, VR, ES, GT), pp. 30–38.
STOCSTOC-1986-Barrington #branch #source code
Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC¹ (DAMB), pp. 1–5.
STOCSTOC-1986-DworkPPU #fault tolerance #network
Fault Tolerance in Networks of Bounded Degree (CD, DP, NP, EU), pp. 370–379.
STOCSTOC-1986-Hastad
Almost Optimal Lower Bounds for Small Depth Circuits (JH), pp. 6–20.
STOCSTOC-1986-LeightonS #algorithm #analysis #grid
Tight Bounds for Minimax Grid Matching, With Applications to the Average Case Analysis of Algorithms (FTL, PWS), pp. 91–103.
STOCSTOC-1986-LiY #parallel
New Lower Bounds for Parallel Computation (ML, YY), pp. 177–187.
VLDBVLDB-1985-Ioannidis #recursion
A Time Bound on the Materialization of some Recursively Defined Views (YEI), pp. 219–226.
ICALPICALP-1985-KarlssonMR #nearest neighbour #problem
The Nearest Neighbor Problem on Bounded Domains (RGK, JIM, ELR), pp. 318–327.
ICALPICALP-1985-Li
Lower Bounds by Kolmogorov-Complexity (ML0), pp. 383–393.
STOCSTOC-1985-Buss #polynomial
The Polynomial Hierarchy and Fragments of Bounded Arithmetic (SRB), pp. 285–290.
STOCSTOC-1985-FichHRW #infinity #parallel
One, Two, Three … Infinity: Lower Bounds for Parallel Computation (FEF, FMadH, PR, AW), pp. 48–58.
STOCSTOC-1985-VardiS #logic #source code
Improved Upper and Lower Bounds for Modal Logics of Programs: Preliminary Report (MYV, LJS), pp. 240–251.
DACDAC-1984-LewandowskiL #algorithm #branch
A branch and bound algorithm for optimal pla folding (JLL, CLL), pp. 426–433.
STOCSTOC-1984-AdlerM #algorithm #polynomial
A Simplex Algorithm Whose Average Number of Steps is Bounded between Two Quadratic Functions of the Smaller Dimension (IA, NM), pp. 312–323.
STOCSTOC-1984-Boppana
Threshold Functions and Bounded Depth Monotone Circuits (RBB), pp. 475–479.
STOCSTOC-1984-DurisGS #communication #complexity
Lower Bounds on Communication Complexity (PD, ZG, GS), pp. 81–91.
STOCSTOC-1984-HartS #finite #logic #modelling #probability
Probabilistic Temporal Logics for Finite and Bounded Models (SH, MS), pp. 1–13.
STOCSTOC-1984-Leighton #complexity #parallel #sorting
Tight Bounds on the Complexity of Parallel Sorting (FTL), pp. 71–80.
STOCSTOC-1984-Maass #nondeterminism #polynomial #turing machine
Quadratic Lower Bounds for Deterministic and Nondeterministic One-Tape Turing Machines (WM), pp. 401–408.
ICLPILPC-1984-Sintzoff84 #source code #strict
Bounded-Horizon Success-Complete Restriction of Inference Programs (MS), pp. 139–150.
ICALPICALP-1983-ChandraFL #constant #problem
Lower Bounds for Constant Depth Circuits for Prefix Problems (AKC, SF, RJL), pp. 109–117.
ICALPICALP-1983-ChoffrutK #morphism #testing
Test Sets for Morphisms with Bounded Delay (CC, JK), pp. 118–127.
ICALPICALP-1983-HambruschS #graph #problem
Lower Bounds for Solving Undirected Graph Problems on VLSI (SEH, JS), pp. 292–303.
DACDAC-1983-LiuA
Bounds on the saved area ratio due to PLA folding (WL, DEA), pp. 538–544.
STOCSTOC-1983-Ben-Or #algebra
Lower Bounds for Algebraic Computation Trees (MBO), pp. 80–86.
STOCSTOC-1983-BorodinDFP #branch #source code
Bounds for Width Two Branching Programs (AB, DD, FEF, WJP), pp. 87–93.
STOCSTOC-1983-ChandraFL83a
Unbounded Fan-in Circuits and Associative Functions (AKC, SF, RJL), pp. 52–60.
STOCSTOC-1983-DurisGPR
Two Nonlinear Lower Bounds (PD, ZG, WJP, RR), pp. 127–132.
STOCSTOC-1983-Fich #parallel
New Bounds for Parallel Prefix Circuits (FEF), pp. 100–109.
STOCSTOC-1983-FurerSS #graph #normalisation
Normal Forms for Trivalent Graphs and Graphs of Bounded Valence (MF, WS, ES), pp. 161–170.
STOCSTOC-1983-Valiant #exponential #strict
Exponential Lower Bounds for Restricted Monotone Circuits (LGV), pp. 110–117.
ICALPICALP-1982-DurisG #automaton #on the
On Reversal-Bounded Counter Machines and on Pushdown Automata with a Bound on the Size of the Pushdown Store (PD, ZG), pp. 166–175.
ICALPICALP-1982-GoralcikovaGK #morphism #pseudo
A Boundary of Isomorphism Completeness in the Lattice of Semigroup Pseudovarieties (AG, PG, VK), pp. 292–299.
ICALPICALP-1982-Kalorkoti
A Lower Bound for the Formula Size of Rational Functions (KK), pp. 330–338.
LISPLFP-1982-White #constant
Constant Time Interpretation for Shallow-bound Variables in the Presence of Mixed SPECIAL/LOCAL Declarations (JLW), pp. 196–200.
POPLPOPL-1982-ReifS #communication #distributed #variability
Unbounded Speed Variability in Distributed Communication Systems (JHR, PGS), pp. 46–56.
DACDAC-1982-Grass #algorithm
A depth-first branch-and-bound algorithm for optimal PLA folding (WG), pp. 133–140.
DACDAC-1982-Kalay #modelling #multi #parametricity
Modeling polyhedral solids bounded by multi-curved parametric surfaces (YEK), pp. 501–507.
STOCSTOC-1982-BabaiGM #graph #morphism #multi
Isomorphism of Graphs with Bounded Eigenvalue Multiplicity (LB, DYG, DMM), pp. 310–324.
STOCSTOC-1982-CookD #parallel #ram
Bounds on the Time for Parallel RAM’s to Compute Simple Functions (SAC, CD), pp. 231–233.
STOCSTOC-1982-PachlKR #algorithm #distributed #proving
A Technique for Proving Lower Bounds for Distributed Maximum-Finding Algorithms (JKP, EK, DR), pp. 378–382.
STOCSTOC-1982-RuzzoST #probability
Space-Bounded Hierarchies and Probabilistic Computations (WLR, JS, MT), pp. 215–223.
ICALPICALP-1981-BlattnerL
Parikh-Bounded Languages (MB, ML), pp. 316–323.
ICALPICALP-1981-Snir #proving
Proving Lower Bounds for Linar Decision Trees (MS), pp. 305–315.
ICALPICALP-1981-Ukkonen #on the #parsing
On Size Bounds for Deterministic Parsers (EU), pp. 218–228.
SIGIRSIGIR-1981-SmeatonR #algorithm #information retrieval #nearest neighbour #problem #using
The Nearest Neighbour Problem in Information Retrieval: An Algorithm Using Upperbounds (AFS, CJvR), pp. 83–87.
DACDAC-1981-Goldstein
Defining the bounding edges of a SynthaVision solid model (RCG), pp. 457–461.
STOCSTOC-1981-Fich #detection #problem
Lower Bounds for the Cycle Detection Problem (FEF), pp. 96–105.
STOCSTOC-1981-LiptonS
Lower Bounds for VLSI (RJL, RS), pp. 300–307.
STOCSTOC-1981-PatersonRS
Bounds on Minimax Edge Length for Complete Binary Trees (MP, WLR, LS), pp. 293–299.
STOCSTOC-1981-Simon #complexity #probability #turing machine
Space-Bounded Probabilistic Turing Machine Complexity Classes Are Closed under Complement (JS), pp. 158–167.
ICALPICALP-1980-Back #nondeterminism #semantics
Semantics of Unbounded Nondeterminism (RJB), pp. 51–63.
ICALPICALP-1980-LewisP #symmetry
Symmetric Space-Bounded Computation (HRL, CHP), pp. 374–384.
ICALPICALP-1980-RaoultV #semiparsing
Optimal Unbounded Search Strategies (JCR, JV), pp. 512–530.
STOCSTOC-1980-Miller #graph #morphism #testing
Isomorphism Testing for Graphs of Bounded Genus (GLM), pp. 225–235.
STOCSTOC-1980-Mirkowska #algorithm #axiom #nondeterminism
Complete Axiomatization of Algorithmic Properties of Program Schemes with Bounded Nondeterministic Interpretations (GM), pp. 14–21.
STOCSTOC-1980-PaulSS #approach #online
An Information-Theoretic Approach to Time Bounds for On-Line Computation (WJP, JIS, JS), pp. 357–367.
DACDAC-1979-DysartK #automation #branch
An application of branch and bound method to automatic printed circuit board routing (LD, MK), pp. 494–499.
STOCSTOC-1979-LengauerT #trade-off
Upper and Lower Bounds on Time-Space Tradeoffs (TL, RET), pp. 262–277.
STOCSTOC-1979-Ruzzo
Tree-Size Bounded Alternation (WLR), pp. 352–359.
STOCSTOC-1979-Sipser #automaton
Lower Bounds on the Size of Sweeping Automata (MS), pp. 360–364.
VLDBVLDB-1978-ChenLT #performance #scalability
The Rebound Sorter: An Efficient Sort Engine for Large Files (TCC, VYL, CT), pp. 312–318.
ICALPICALP-1978-DobkinM #problem
Time and Space Bounds for Selection Problems (DPD, JIM), pp. 192–204.
STOCSTOC-1978-ReddyL #quantifier
Presburger Arithmetic with Bounded Quantifier Alternation (CRR, DWL), pp. 320–325.
ICALPICALP-1977-BookY #on the #power of
On the Computational Power of Reversal-Bounded Machines (RVB, CKY), pp. 111–119.
ICALPICALP-1977-Brandenburg #context-sensitive grammar
The Contextsensitivity Bounds of Contextsensitive Grammars and Languages (FJB), pp. 120–134.
POPLPOPL-1977-SuzukiI #array #implementation
Implementation of an Array Bound Checker (NS, KI), pp. 132–143.
STOCSTOC-1977-Sudborough #automaton
Separating Tape Bounded Auxiliary Pushdown Automata Classes (IHS), pp. 208–217.
STOCSTOC-1977-YaoAR #problem
An Ω(n² log n) Lower Bound to the Shortest Paths Problem (ACCY, DA, RLR), pp. 11–17.
ICALPICALP-1976-AltM #complexity #recognition
Lower Bounds for the Space Complexity of Context-Free Recognition (HA, KM), pp. 338–354.
STOCSTOC-1976-PaulTC #game studies #graph
Space Bounds for a Game of Graphs (WJP, RET, JRC), pp. 149–160.
STOCSTOC-1975-FischerMP
Lower Bounds on the Size of Boolean Formulas: Preliminary Report (MJF, ARM, MP), pp. 37–44.
STOCSTOC-1975-Galil #complexity #on the
On the Validity and Complexity of Bounded Resolution (ZG), pp. 72–82.
STOCSTOC-1975-Paul #combinator #complexity
A 2.5 n-lower Bound on the Combinatorial Complexity of Boolean Functions (WJP), pp. 27–36.
STOCSTOC-1975-Valiant #complexity #on the
On Non-linear Lower Bounds in Computational Complexity (LGV), pp. 45–53.
ICALPICALP-1974-Monien #recursion
Characterizations of Time-Bounded Computations by Limited Primitive Recursion (BM), pp. 280–293.
STOCSTOC-1974-BookNP #context-free grammar #linear #multi
Intersections of Linear Context-Free Languages and Reversal-Bounded Multipushdown Machines (RVB, MN, MP), pp. 290–296.
STOCSTOC-1974-Kedem #multi
Combining Dimensionality and Rate of Growth Arguments for Establishing Lower Bounds on the Number of Multiplications (ZMK), pp. 334–341.
STOCSTOC-1974-Kung #algorithm #evaluation #parallel
New Algorithms and Lower Bounds for the Parallel Evaluation of Certain Rational Expressions (HTK), pp. 323–333.
SOSPSOSP-1973-GareyG #scheduling
Bounds on Scheduling with Limited Resources (MRG, RLG), pp. 104–111.
STOCSTOC-1973-Oppen
Elementary Bounds for Presburger Arithmetic (DCO), pp. 34–37.
ICALPICALP-1972-Monien #automaton #turing machine
Relationship between Pushdown Automata and Tape-Bounded Turing Machines (BM), pp. 575–583.
DACDAC-1972-Lewis #detection #logic #simulation
Hazard detection by a quinary simulation of logic devices with bounded propagation delays (DWL), pp. 157–164.
STOCSTOC-1972-BlumFPRT #linear
Linear Time Bounds for Median Computations (MB, RWF, VRP, RLR, RET), pp. 119–124.
STOCSTOC-1972-CookR #random
Time-Bounded Random Access Machines (SAC, RAR), pp. 73–80.
STOCSTOC-1972-Kung #multi #performance
A Bound on the Multiplication Efficiency of Iteration (HTK), pp. 102–107.
STOCSTOC-1972-NievergeltR
Binary Search Trees of Bounded Balance (JN, EMR), pp. 137–142.
STOCSTOC-1970-Ausiello #on the
On Bounds on the Number of Steps to Compute Functions (GA), pp. 41–47.
STOCSTOC-1970-BookGW
Tape- and Time-Bounded Turing Acceptors and AFLs: Extended Abstract (RVB, SAG, BW), pp. 92–99.
STOCSTOC-1969-McCreightM
Classes of Computable Functions Defined by Bounds on Computation: Preliminary Report (EMM, ARM), pp. 79–88.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.