BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
data (57)
system (53)
parallel (45)
model (44)
base (42)

Stem exploit$ (all stems)

585 papers:

ECSAECSA-2015-TrubianiGE #analysis #architecture #modelling #nondeterminism #performance #traceability
Exploiting Traceability Uncertainty Between Software Architectural Models and Performance Analysis Results (CT, AG, AE), pp. 305–321.
CASECASE-2015-BjorkenstamCL
Exploiting sparsity in the discrete mechanics and optimal control method with application to human motion planning (SB, JSC, BL), pp. 769–774.
DACDAC-2015-ChenMRC #execution #paradigm #performance
Opportunistic turbo execution in NTC: exploiting the paradigm shift in performance bottlenecks (HC, DM, SR, KC), p. 6.
DACDAC-2015-ThieleAE #analysis #scheduling
Improving formal timing analysis of switched ethernet by exploiting FIFO scheduling (DT, PA, RE), p. 6.
DACDAC-2015-WangH0LL #logic #memory management #named
ProPRAM: exploiting the transparent logic resources in non-volatile memory for near data computing (YW, YH, LZ, HL, XL), p. 6.
DACDAC-2015-WangJZWY15a #memory management
Exploit imbalanced cell writes to mitigate write disturbance in dense phase change memory (RW, LJ, YZ, LW, JY), p. 6.
DATEDATE-2015-ConstantinWKCB
Exploiting dynamic timing margins in microprocessors for frequency-over-scaling with instruction-based clock adjustment (JC, LW, GK, AC, AB), pp. 381–386.
DATEDATE-2015-KhanhSKA #dependence #design #synthesis
Exploiting loop-array dependencies to accelerate the design space exploration with high level synthesis (PNK, AKS, AK, KMMA), pp. 157–162.
DATEDATE-2015-ZhangZCY #scalability
Exploiting DRAM restore time variations in deep sub-micron scaling (XZ, YZ, BRC, JY), pp. 477–482.
HTHT-2015-BledaiteR #collaboration #elicitation
Pairwise Preferences Elicitation and Exploitation for Conversational Collaborative Filtering (LB, FR), pp. 231–236.
SIGMODSIGMOD-2015-JoglekarGPR #correlation #evaluation
Exploiting Correlations for Expensive Predicate Evaluation (MJ, HGM, AGP, CR), pp. 1183–1198.
SIGMODSIGMOD-2015-YuSC #dependence #distributed #matrix #performance
Exploiting Matrix Dependency for Efficient Distributed Matrix Computation (LY, YS, BC), pp. 93–105.
VLDBVLDB-2015-RenW #graph #morphism #scalability
Exploiting Vertex Relationships in Speeding up Subgraph Isomorphism over Large Graphs (XR, JW), pp. 617–628.
PEPMPEPM-2015-BahrA #graph #traversal
Generalising Tree Traversals to DAGs: Exploiting Sharing without the Pain (PB, EA), pp. 27–38.
CHICHI-2015-MeutznerGK #difference
Constructing Secure Audio CAPTCHAs by Exploiting Differences between Humans and Machines (HM, SG, DK), pp. 2335–2338.
ECIRECIR-2015-LiTWLR #automation #network #quality #wiki
Automatically Assessing Wikipedia Article Quality by Exploiting Article-Editor Networks (XL, JT, TW, ZL, MdR), pp. 574–580.
ECIRECIR-2015-RuotsaloH #semantics
Exploiting Semantic Annotations for Domain-Specific Entity Search (TR, EH), pp. 358–369.
KDDKDD-2015-ArlorioCLLP #assessment #authentication #data mining #mining
Exploiting Data Mining for Authenticity Assessment and Protection of High-Quality Italian Wines from Piedmont (MA, JDC, GL, ML, LP), pp. 1671–1680.
KDDKDD-2015-Papagiannopoulou #learning #multi
Discovering and Exploiting Deterministic Label Relationships in Multi-Label Learning (CP, GT, IT), pp. 915–924.
KDDKDD-2015-SuYSSKVY #feedback #graph
Exploiting Relevance Feedback in Knowledge Graph Search (YS, SY, HS, MS, SK, MV, XY), pp. 1135–1144.
RecSysRecSys-2015-LuC #personalisation #recommendation
Exploiting Geo-Spatial Preference for Personalized Expert Recommendation (HL, JC), pp. 67–74.
SIGIRSIGIR-2015-LuZZW #personalisation #recommendation
Exploiting User and Business Attributes for Personalized Business Recommendation (KL, YZ, LZ, SW), pp. 891–894.
SIGIRSIGIR-2015-SallesGRR #automation #classification #effectiveness #fault #named #random
BROOF: Exploiting Out-of-Bag Errors, Boosting and Random Forests for Effective Automated Classification (TS, MAG, VR, LCdR), pp. 353–362.
SIGIRSIGIR-2015-ShapiraOM #information retrieval #wiki
Exploiting Wikipedia for Information Retrieval Tasks (BS, NO, VM), pp. 1137–1140.
SIGIRSIGIR-2015-ZhangC #category theory #correlation #named #recommendation #social
GeoSoCa: Exploiting Geographical, Social and Categorical Correlations for Point-of-Interest Recommendations (JDZ, CYC), pp. 443–452.
SACSAC-2015-Dragoni #multi
Exploiting multilinguality for creating mappings between thesauri (MD), pp. 382–387.
ESEC-FSEESEC-FSE-2015-ZhengMZ #capacity #constraints #identification #problem #process
A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundancies (QZ, AM, MZ), pp. 637–648.
HPCAHPCA-2015-PekhimenkoHCMGK #reuse
Exploiting compressed block size as an indicator of future reuse (GP, TH, RC, OM, PBG, MAK, TCM), pp. 51–63.
ICSTSAT-2015-NevesMJLM #satisfiability
Exploiting Resolution-Based Representations for MaxSAT Solving (MN, RM, MJ, IL, VMM), pp. 272–286.
VMCAIVMCAI-2015-Ferrara0N #automation
Automatic Inference of Heap Properties Exploiting Value Domains (PF, PM, MN), pp. 393–411.
DACDAC-2014-AxerTED #bound #network #performance
Exploiting Shaper Context to Improve Performance Bounds of Ethernet AVB Networks (PA, DT, RE, JD), p. 6.
DACDAC-2014-DaviKS #control flow #embedded #fine-grained #performance #towards
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation (LD, PK, ARS), p. 6.
DACDAC-2014-LiuCYLHL #fault #locality #named
EC-Cache: Exploiting Error Locality to Optimize LDPC in NAND Flash-Based SSDs (RSL, MYC, CLY, CHL, KCH, HPL), p. 6.
DATEDATE-2014-0001GWKAWG #optimisation #performance #runtime
Exploiting expendable process-margins in DRAMs for run-time performance optimization (KC, SG, CW, MK, BA, NW, KG), pp. 1–6.
DATEDATE-2014-AshammagariMH #configuration management #design #functional #performance #power management
Exploiting STT-NV technology for reconfigurable, high performance, low power, and low temperature functional unit design (ARA, HM, HH), pp. 1–6.
DATEDATE-2014-DuanW
Exploiting narrow-width values for improving non-volatile cache lifetime (GD, SW), pp. 1–4.
DATEDATE-2014-KimKKYL #design
Coarse-grained Bubble Razor to exploit the potential of two-phase transparent latch designs (HK, DK, JJK, SY, SL), pp. 1–6.
DATEDATE-2014-LiuSXL #injection #programmable #thread
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy (ZL, WS, SX, ZL), pp. 1–6.
DATEDATE-2014-LuCC #correlation #memory management #performance
Achieving efficient packet-based memory system by exploiting correlation of memory requests (TL, LC, MC), pp. 1–6.
HTHT-2014-KawaseSNHN
Exploiting the wisdom of the crowds for characterizing and connecting heterogeneous resources (RK, PS, BPN, EH, WN), pp. 56–65.
SIGMODSIGMOD-2014-MoerkotteDMNB #order
Exploiting ordered dictionaries to efficiently construct histograms with q-error guarantees in SAP HANA (GM, DD, NM, AN, AB), pp. 361–372.
VLDBVLDB-2014-MaeharaAIK #graph #personalisation #rank
Computing Personalized PageRank Quickly by Exploiting Graph Structures (TM, TA, YI, KiK), pp. 1023–1034.
SANERCSMR-WCRE-2014-QuanteTS #c #case study #towards
Towards recovering and exploiting domain knowledge from C code: A case study on automotive software (JQ, MT, JS), pp. 383–386.
CHICHI-2014-ShiraziAHSKS #interactive
Exploiting thermal reflection for interactive systems (ASS, YA, NH, SS, MK, AS), pp. 3483–3492.
ICEISICEIS-v3-2014-GonzalezAY #architecture #enterprise #evolution
Evolving a Core Banking Enterprise Architecture — Leveraging Business Events Exploitation (BSMG, JMdÁ, JCY), pp. 181–189.
CIKMCIKM-2014-ChanDYTZ #classification #ranking #retrieval
Term Selection and Result Reranking for Question Retrieval by Exploiting Hierarchical Classification (WC, JD, WY, JT, XZ), pp. 141–150.
CIKMCIKM-2014-KimHYCK #retrieval
Exploiting Knowledge Structure for Proximity-aware Movie Retrieval Model (SK, KH, MYY, SC, SK), pp. 1847–1850.
CIKMCIKM-2014-LiuWSM #recommendation
Exploiting Geographical Neighborhood Characteristics for Location Recommendation (YL, WW, AS, CM), pp. 739–748.
CIKMCIKM-2014-YamaguchiAKI #correlation #online #social
Online User Location Inference Exploiting Spatiotemporal Correlations in Social Streams (YY, TA, HK, YI), pp. 1139–1148.
CIKMCIKM-2014-ZhangLCZW #collaboration
Exploit Latent Dirichlet Allocation for One-Class Collaborative Filtering (HZ, ZL, YC, XZ, SW), pp. 1991–1994.
ECIRECIR-2014-NainiA #feature model #learning #rank
Exploiting Result Diversification Methods for Feature Selection in Learning to Rank (KDN, ISA), pp. 455–461.
ICPRICPR-2014-ChenZW #identification #learning #metric
Relevance Metric Learning for Person Re-identification by Exploiting Global Similarities (JC, ZZ, YW), pp. 1657–1662.
ICPRICPR-2014-ZamalievaYD #geometry
Exploiting Temporal Geometry for Moving Camera Background Subtraction (DZ, AY, JWD), pp. 1200–1205.
KDDKDD-2014-FuXGYZZ #clustering #dependence #ranking
Exploiting geographic dependencies for real estate appraisal: a mutual perspective of ranking and clustering (YF, HX, YG, ZY, YZ, ZHZ), pp. 1047–1056.
KDIRKDIR-2014-MeguebliKDP #ranking #social
Exploiting Social Debates for Opinion Ranking (YM, MK, BLD, FP), pp. 250–260.
KEODKEOD-2014-Otero-CerdeiraR #named #ontology
OntoPhil — Exploitation of Binding Points for Ontology Matching (LOC, FJRM, TVR, AMGR), pp. 5–15.
RecSysRecSys-2014-PalovicsBKKF #online #recommendation
Exploiting temporal influence in online recommendation (RP, AAB, LK, TK, EF), pp. 273–280.
RecSysRecSys-2014-VanchinathanNBK #process #recommendation
Explore-exploit in top-N recommender systems via Gaussian processes (HPV, IN, FDB, AK), pp. 225–232.
RecSysRecSys-2014-YuanMZS #predict #sentiment
Exploiting sentiment homophily for link prediction (GY, PKM, ZZ, MPS), pp. 17–24.
SIGIRSIGIR-2014-McParlaneJ #image #twitter #wiki
Exploiting Twitter and Wikipedia for the annotation of event images (PJM, JMJ), pp. 1175–1178.
OnwardOnward-2014-GuSBS #ide #interactive
Capturing and Exploiting IDE Interactions (ZG, DS, ETB, ZS), pp. 83–94.
OOPSLAOOPSLA-2014-VoraKG #algorithm #consistency #named #parallel #using
ASPIRE: exploiting asynchronous parallelism in iterative algorithms using a relaxed consistency based DSM (KV, SCK, RG), pp. 861–878.
SACSAC-2014-ArapovBO #named #web #wiki
WikiNEXT: a wiki for exploiting the web of data (PA, MB, ABO), pp. 727–734.
SACSAC-2014-LeeJB #design #file system #memory management #named #similarity
DTFS: exploiting the similarity of data versions to design a write-efficient file system in phase-change memory (EL, JEJ, HB), pp. 1535–1540.
ASPLOSASPLOS-2014-ZhangRZGBXZ #correlation #detection #named
EnCore: exploiting system environment and correlation information for misconfiguration detection (JZ, LR, XZ, NG, VB, TX, YZ), pp. 687–700.
CCCC-2014-WangPFO #legacy #parallel
Exploitation of GPUs for the Parallelisation of Probably Parallel Legacy Code (ZW, DCP, BF, MFPO), pp. 154–173.
HPCAHPCA-2014-AgrawalAT #energy #locality #named #process
Mosaic: Exploiting the spatial locality of process variation to reduce refresh energy in on-chip eDRAM modules (AA, AA, JT), pp. 84–95.
HPCAHPCA-2014-PhamBEL #clustering
Increasing TLB reach by exploiting clustering in page translations (BP, AB, YE, GHL), pp. 558–567.
HPCAHPCA-2014-ZhengMW #energy
Exploiting thermal energy storage to reduce data center capital and operating expenses (WZ, KM, XW), pp. 132–141.
HPDCHPDC-2014-ChenZJ #community #locality #named #network #online #performance #social
CBL: exploiting community based locality for efficient content search in online social networks (HC, FZ, HJ), pp. 299–304.
HPDCHPDC-2014-MaratheHLSRS #effectiveness #execution
Exploiting redundancy for cost-effective, time-constrained execution of HPC applications on amazon EC2 (AM, RH, DKL, BRdS, BR, MS), pp. 279–290.
HPDCHPDC-2014-XiaHD #memory management #named
ConCORD: easily exploiting memory content redundancy through the content-aware service command (LX, KCH, PAD), pp. 25–36.
LCTESLCTES-2014-KochFBD #reduction #similarity
Exploiting function similarity for code size reduction (TJKEvK, BF, PB, AD), pp. 85–94.
ISSTAISSTA-2014-MarianiPRS #named #testing #web
Link: exploiting the web of data to generate test inputs (LM, MP, OR, MS), pp. 373–384.
CASECASE-2013-0011ZD #petri net #robust #specification
Exploiting robustness in Petri net-based closed-loop systems to accommodate control specification changes (JL, MZ, XD), pp. 71–76.
DACDAC-2013-AmaruGM #composition #logic #named #synthesis
BDS-MAJ: a BDD-based logic synthesis tool exploiting majority logic decomposition (LGA, PEG, GDM), p. 6.
DACDAC-2013-ShafiqueRAH #fault #optimisation #reliability
Exploiting program-level masking and error propagation for constrained reliability optimization (MS, SR, PVA, JH), p. 9.
DACDAC-2013-SinghDK #energy #execution #multi #optimisation #streaming
Energy optimization by exploiting execution slacks in streaming applications on multiprocessor systems (AKS, AD, AK), p. 7.
DACDAC-2013-ZhaiBS #parallel #realtime #streaming
Exploiting just-enough parallelism when mapping streaming applications in hard real-time systems (JTZ, MB, TS), p. 8.
DACDAC-2013-ZhangPFH
Lighting the dark silicon by exploiting heterogeneity on future processors (YZ, LP, XF, YH), p. 7.
DATEDATE-2013-KocBKE #detection #fault
Exploiting replicated checkpoints for soft error detection and correction (FK, KB, BK, OE), pp. 1494–1497.
DATEDATE-2013-RaghunathanTGM #multi #named #process
Cherry-picking: exploiting process variations in dark-silicon homogeneous chip multi-processors (BR, YT, SG, DM), pp. 39–44.
DATEDATE-2013-RutzigBC #configuration management #energy #framework #multi
A transparent and energy aware reconfigurable multiprocessor platform for simultaneous ILP and TLP exploitation (MBR, ACSB, LC), pp. 1559–1564.
DATEDATE-2013-YueZ #memory management #performance
Exploiting subarrays inside a bank to improve phase change memory performance (JY, YZ), pp. 386–391.
ICDARICDAR-2013-PengCSPN #documentation
Exploiting Stroke Orientation for CRF Based Binarization of Historical Documents (XP, HC, KS, RP, PN), pp. 1034–1038.
SIGMODSIGMOD-2013-OrdonezGGCBQ #algorithm #as a service #data mining #database #in the cloud #mining #relational
Data mining algorithms as a service in the cloud exploiting relational database systems (CO, JGG, CGA, WC, VB, MSQ), pp. 1001–1004.
VLDBVLDB-2013-AntonelliCCLT
Exploiting the Diversity, Mass and Speed of Territorial Data by TELCO Operator for Better User Services (FA, AC, CC, RL, GT), pp. 1164–1165.
ICFPICFP-2013-MainlandLJ
Exploiting vector instructions with generalized stream fusio (GM, RL, SLPJ), pp. 37–48.
CIKMCIKM-2013-TuLLHL #information retrieval #modelling #proximity #statistics
Exploiting proximity feature in statistical translation models for information retrieval (XT, JL, BL, TH, ML), pp. 1237–1240.
ECIRECIR-2013-BelemMAG #recommendation
Exploiting Novelty and Diversity in Tag Recommendation (FB, EFM, JMA, MAG), pp. 380–391.
ECIRECIR-2013-EickhoffLV #retrieval
Exploiting User Comments for Audio-Visual Content Indexing and Retrieval (CE, WL, APdV), pp. 38–49.
ECIRECIR-2013-McParlaneJ #automation #image
Exploiting Time in Automatic Image Tagging (PJM, JMJ), pp. 520–531.
ECIRECIR-2013-SaadK #adaptation #intranet #navigation
Exploiting Click Logs for Adaptive Intranet Navigation (SZS, UK), pp. 792–795.
ICMLICML-c3-2013-BalcanBM #learning #ontology
Exploiting Ontology Structures and Unlabeled Data for Learning (NB, AB, YM), pp. 1112–1120.
KDDKDD-2013-BaiJS #automation #generative #set
Exploiting user clicks for automatic seed set generation for entity matching (XB, FPJ, SHS), pp. 980–988.
RecSysRecSys-2013-MouraoRKM #hybrid #recommendation
Exploiting non-content preference attributes through hybrid recommendation method (FM, LCdR, JAK, WMJ), pp. 177–184.
SEKESEKE-2013-LiLY #fault #locality #testing
Exploiting Weights of Test Cases to Enhance Fault Localization (S) (YL, CL, ZY), pp. 589–593.
SIGIRSIGIR-2013-BabashzadehHD #information retrieval #semantics
Exploiting semantics for improving clinical information retrieval (AB, JH, MD), pp. 801–804.
SIGIRSIGIR-2013-DalipGCC #case study #feedback #rank #stack overflow
Exploiting user feedback to learn to rank answers in q&a forums: a case study with stack overflow (DHD, MAG, MC, PC), pp. 543–552.
SIGIRSIGIR-2013-LiSWH #hybrid #segmentation #twitter
Exploiting hybrid contexts for Tweet segmentation (CL, AS, JW, QH), pp. 523–532.
SACSAC-2013-AccorsiSM #mining #on the #process #security
On the exploitation of process mining for security audits: the process discovery case (RA, TS, GM), pp. 1462–1468.
SACSAC-2013-CiraciV #code generation #points-to
Exploiting points-to maps for de-/serialization code generation (SC, OV), pp. 1712–1719.
SACSAC-2013-DietrichRP #clustering #detection #visual notation
Exploiting visual appearance to cluster and detect rogue software (CJD, CR, NP), pp. 1776–1783.
SACSAC-2013-HogenboomBFBJK #analysis #sentiment
Exploiting emoticons in sentiment analysis (AH, DB, FF, MB, FdJ, UK), pp. 703–710.
PLEASEPLEASE-2013-UrliMBC #how #multi #product line #question
How to exploit domain knowledge in Multiple Software Product Lines? (SU, SM, MBF, PC), pp. 13–16.
CGOCGO-2013-HuangJBJA #automation #parallel #runtime #using
Automatically exploiting cross-invocation parallelism using runtime information (JH, TBJ, SRB, NPJ, DIA), p. 11.
CGOCGO-2013-YanTZYS #algorithm #fine-grained #graph #named #parallel #traversal
Vlock: Lock virtualization mechanism for exploiting fine-grained parallelism in graph traversal algorithms (JY, GT, XZ, EY, NS), p. 10.
HPCAHPCA-2013-YueZ #symmetry
Accelerating write by exploiting PCM asymmetries (JY, YZ), pp. 282–293.
ICLPICLP-J-2013-CatB #dependence #detection #functional #generative
Detection and exploitation of functional dependencies for model generation (BdC, MB), pp. 471–485.
ICSTSAT-2013-DaviesB #power of #satisfiability
Exploiting the Power of mip Solvers in maxsat (JD, FB), pp. 166–181.
QoSAQoSA-2012-NaabS #architecture #flexibility #lifecycle
Architectural flexibility in a software-system’s life-cycle: systematic construction and exploitation of flexibility (MN, JS), pp. 13–22.
WICSA-ECSAWICSA-ECSA-2012-GhabiE #architecture #modelling #nondeterminism #traceability
Exploiting Traceability Uncertainty between Architectural Models and Code (AG, AE), pp. 171–180.
DACDAC-2012-AthikulwongsePL #3d
Exploiting die-to-die thermal coupling in 3D IC placement (KA, MP, SKL), pp. 741–746.
DACDAC-2012-DonohooOPA #embedded #energy #mobile
Exploiting spatiotemporal and device contexts for energy-efficient mobile embedded systems (BKD, CO, SP, CA), pp. 1278–1283.
DACDAC-2012-KarakonstantisRBB #fault #on the
On the exploitation of the inherent error resilience of wireless systems under unreliable silicon (GK, CR, CB, AB), pp. 510–515.
DACDAC-2012-KongC #3d #process
Exploiting narrow-width values for process variation-tolerant 3-D microprocessors (JK, SWC), pp. 1197–1206.
DATEDATE-2012-KondratyevLMW #synthesis #trade-off
Exploiting area/delay tradeoffs in high-level synthesis (AK, LL, MM, YW), pp. 1024–1029.
DATEDATE-2012-PomataMTRL #design #performance
Exploiting binary translation for fast ASIP design space exploration on FPGAs (SP, PM, GT, LR, ML), pp. 566–569.
SIGMODSIGMOD-2012-SilvaR #similarity
Exploiting MapReduce-based similarity joins (YNS, JMR), pp. 693–696.
VLDBVLDB-2012-LuoLMCZ #data transformation #hybrid #named
hStorage-DB: Heterogeneity-aware Data Management to Exploit the Full Capability of Hybrid Storage Systems (TL, RL, MPM, FC, XZ), pp. 1076–1087.
VLDBVLDB-2012-MurthyDDHMPRS #data transformation #semistructured data
Exploiting Evidence from Unstructured Data to Enhance Master Data Management (KM, PMD, AD, RH, MKM, DP, JR, SS), pp. 1862–1873.
VLDBVLDB-2012-SilvaP #database #metric #similarity
Exploiting Database Similarity Joins for Metric Spaces (YNS, SP), pp. 1922–1925.
PLDIPLDI-2012-TrippMFS #named #parallel
JANUS: exploiting parallelism via hindsight (OT, RM, JF, MS), pp. 145–156.
ICGTICGT-2012-GadducciLV #approximate #infinity #modelling
Exploiting Over- and Under-Approximations for Infinite-State Counterpart Models (FG, ALL, AV), pp. 51–65.
CIKMCIKM-2012-MahajanRTM #algorithm #named #recommendation
LogUCB: an explore-exploit algorithm for comments recommendation (DKM, RR, CT, AM), pp. 6–15.
CIKMCIKM-2012-SudituF #adaptation #feedback #trade-off
Iterative relevance feedback with adaptive exploration/exploitation trade-off (NS, FF), pp. 1323–1331.
CIKMCIKM-2012-YaoS #learning #relational #ubiquitous
Exploiting latent relevance for relational learning of ubiquitous things (LY, QZS), pp. 1547–1551.
CIKMCIKM-2012-ZhengFY #concept
Exploiting concept hierarchy for result diversification (WZ, HF, CY), pp. 1844–1848.
CIKMCIKM-2012-ZhuCCXT #classification #information management #mobile
Exploiting enriched contextual information for mobile app classification (HZ, HC, EC, HX, JT), pp. 1617–1621.
ECIRECIR-2012-Martinez-AlvarezYR #automation #classification #documentation
Semi-automatic Document Classification: Exploiting Document Difficulty (MMA, SY, TR), pp. 468–471.
ICMLICML-2012-AvnerMS #multi
Decoupling Exploration and Exploitation in Multi-Armed Bandits (OA, SM, OS), p. 145.
ICMLICML-2012-DesautelsKB #optimisation #process #trade-off
Parallelizing Exploration-Exploitation Tradeoffs with Gaussian Process Bandit Optimization (TD, AK, JWB), p. 109.
ICMLICML-2012-OuyangG #probability
Stochastic Smoothing for Nonsmooth Minimizations: Accelerating SGD by Exploiting Structure (HO, AGG), p. 198.
ICPRICPR-2012-ArthMS #locality #mobile
Exploiting sensors on mobile phones to improve wide-area localization (CA, AM, DS), pp. 2152–2156.
ICPRICPR-2012-AskKA #equation #performance #polynomial #symmetry
Exploiting p-fold symmetries for faster polynomial equation solving (EA, YK, ), pp. 3232–3235.
ICPRICPR-2012-ChenL #identification
Exploiting ruling line artifacts in writer identification (JC, DPL), pp. 3737–3740.
ICPRICPR-2012-OrfanidisT #subclass
Exploiting subclass information in Support Vector Machines (GO, AT), pp. 1076–1079.
ICPRICPR-2012-SinghA #estimation
Exploiting ramp structures for improving optical flow estimation (AS, NA), pp. 2504–2507.
ICPRICPR-2012-TanK #identification #image
Human identification from at-a-distance images by simultaneously exploiting iris and periocular features (CWT, AK), pp. 553–556.
KDDKDD-2012-0002L #named #recommendation
RecMax: exploiting recommender systems for fun and profit (AG, LVSL), pp. 1294–1302.
KDIRKDIR-2012-LuongHGH #network #recommendation #social
Exploiting Social Networks for Publication Venue Recommendations (HPL, TH, SG, KH), pp. 239–245.
KMISKMIS-2012-LiAB #collaboration #experience #reuse
Facilitating Experience Sharing in Groups — Collaborative Trace Reuse and Exploitation (QL, MHA, JPAB), pp. 21–30.
MLDMMLDM-2012-PirasGP #approach #image #retrieval
Enhancing Image Retrieval by an Exploration-Exploitation Approach (LP, GG, RP), pp. 355–365.
RecSysRecSys-2012-KarimiFNS #learning #matrix #recommendation
Exploiting the characteristics of matrix factorization for active learning in recommender systems (RK, CF, AN, LST), pp. 317–320.
RecSysRecSys-2012-NoiaMOR #modelling #recommendation #web
Exploiting the web of data in model-based recommender systems (TDN, RM, VCO, DR), pp. 253–256.
SIGIRSIGIR-2012-KahngL #graph #rdf
Exploiting paths for entity search in RDF graphs (MK, SgL), pp. 1027–1028.
SIGIRSIGIR-2012-LimsopathamMMO #dependence
Exploiting term dependence while handling negation in medical search (NL, CM, RM, IO), pp. 1065–1066.
SIGIRSIGIR-2012-Tran #modelling #retrieval #social #social media #topic
Exploiting temporal topic models in social media retrieval (TAT), p. 999.
OOPSLAOOPSLA-2012-WuZSJGS #behaviour #correlation #predict
Exploiting inter-sequence correlations for program behavior prediction (BW, ZZ, XS, YJ, YG, RS), pp. 851–866.
SACSAC-2012-AccorsiS #consistency #mining #on the #process #security
On the exploitation of process mining for security audits: the conformance checking case (RA, TS), pp. 1709–1716.
SACSAC-2012-BaralisCJF #multi #summary
Multi-document summarization exploiting frequent itemsets (EB, LC, SJ, AF), pp. 782–786.
SACSAC-2012-HuangHYY #algorithm #approximate #correlation #network
An in-network approximate data gathering algorithm exploiting spatial correlation in wireless sensor networks (CCH, JLH, JAY, LYY), pp. 550–555.
SACSAC-2012-MascardiL #algorithm #named #ontology
BOwL: exploiting Boolean operators and lesk algorithm for linking ontologies (VM, AL), pp. 398–400.
SACSAC-2012-TangJ #analysis #precise
Exploiting regularity of user-defined types to improve precision of program analyses (XT, JJ), pp. 1743–1750.
SACSAC-2012-TinelliCSD #automation #compilation #composition #sql #standard
Knowledge compilation for automated Team Composition exploiting standard SQL (ET, SC, EDS, FMD), pp. 1680–1685.
ICSEICSE-2012-Gu #fine-grained #ide #interactive
Capturing and exploiting fine-grained IDE interactions (ZG), pp. 1630–1631.
ASPLOSASPLOS-2012-HariANR #equivalence #fault #named
Relyzer: exploiting application-level fault equivalence to analyze application resiliency to transient faults (SKSH, SVA, HN, PR), pp. 123–134.
CCCC-2012-UnkuleSQ #automation #gpu #kernel #locality #thread
Automatic Restructuring of GPU Kernels for Exploiting Inter-thread Data Locality (SU, CS, AQ), pp. 21–40.
ISMMISMM-2012-Nasre #analysis #constraints #graph #performance #points-to
Exploiting the structure of the constraint graph for efficient points-to analysis (RN), pp. 121–132.
ICSTSAT-2012-LiWL #satisfiability
Exploiting Historical Relationships of Clauses and Variables in Local Search for Satisfiability — (Poster Presentation) (CML, WW, YL), pp. 479–480.
DACDAC-2011-KoseF #algorithm #analysis #information retrieval #locality #performance
Fast algorithms for IR voltage drop analysis exploiting locality (SK, EGF), pp. 996–1001.
DATEDATE-2011-StranoGLFGB #architecture #scalability #self
Exploiting Network-on-Chip structural redundancy for a cooperative and scalable built-in self-test architecture (AS, CGR, DL, MF, MEG, DB), pp. 661–666.
DATEDATE-2011-WangZHLL #memory management
Flex memory: Exploiting and managing abundant off-chip optical bandwidth (YW, LZ, YH, HL, XL), pp. 968–973.
ICDARICDAR-2011-GuichardCC #documentation #word
Exploiting Collection Level for Improving Assisted Handwritten Word Transcription of Historical Documents (LG, JC, BC), pp. 875–879.
VLDBVLDB-2011-EltabakhTOGKM #flexibility #named
CoHadoop: Flexible Data Placement and Its Exploitation in Hadoop (MYE, YT, , RG, AK, JM), pp. 575–585.
VLDBVLDB-2012-RohPKSL11 #optimisation #parallel
B+-tree Index Optimization by Exploiting Internal Parallelism of Flash-based Solid State Drives (HR, SP, SK, MS, SWL), pp. 286–297.
ICSMEICSM-2011-PirzadehHS #analysis #execution #mining
Exploiting text mining techniques in the analysis of execution traces (HP, AHL, MS), pp. 223–232.
PLDIPLDI-2011-KulkarniNPSP #commutative
Exploiting the commutativity lattice (MK, DN, DP, XS, KP), pp. 542–555.
PLDIPLDI-2011-UdupaRT #dependence #named #parallel
ALTER: exploiting breakable dependences for parallelization (AU, KR, WT), pp. 480–491.
CHICHI-2011-WilliamsYPMMI #3d #interactive #multi #named
TZee: exploiting the lighting properties of multi-touch tabletops for tangible 3d interactions (CW, XDY, GAP, JMU, AM, PI), pp. 1363–1372.
HCIHCI-ITE-2011-NebeKJF #interactive #multi #using
Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction (KN, FK, HJ, HF), pp. 100–109.
HCIHCI-ITE-2011-ZhangAR #human-computer #interactive #multi
Developing and Exploiting a Multilingual Grammar for Human-Computer Interaction (XZ, RA, DFR), pp. 396–405.
HCIHCI-UA-2011-OlivierWP #game studies #music #named #recommendation
MusicTagger: Exploiting User Generated Game Data for Music Recommendation (HO, MW, NP), pp. 678–687.
CIKMCIKM-2011-ChiangNTD #network #predict
Exploiting longer cycles for link prediction in signed networks (KYC, NN, AT, ISD), pp. 1157–1162.
CIKMCIKM-2011-WangYS #documentation #feedback
Relevance feedback exploiting query-specific document manifolds (CW, EY, MS), pp. 1957–1960.
ECIRECIR-2011-DuanZ #concurrent #modelling #retrieval #thread
Exploiting Thread Structures to Improve Smoothing of Language Models for Forum Post Retrieval (HD, CZ), pp. 350–361.
ECIRECIR-2011-HofmannWR #learning #online #rank
Balancing Exploration and Exploitation in Learning to Rank Online (KH, SW, MdR), pp. 251–263.
KDDKDD-2011-GundechaBL #network #privacy #social
Exploiting vulnerability to secure user privacy on a social networking site (PG, GB, HL), pp. 511–519.
KDDKDD-2011-ScellatoNM #network #predict #social
Exploiting place features in link prediction on location-based social networks (SS, AN, CM), pp. 1046–1054.
KDDKDD-2011-ValizadeganJW #learning #multi #predict
Learning to trade off between exploration and exploitation in multiclass bandit prediction (HV, RJ, SW), pp. 204–212.
KEODKEOD-2011-AarnioSK #industrial #lightweight #semantics
A Lightweight Element Matching Method for Industrial Terminology Harmonization — Exploiting Minimal Semantics based on Naming Conventions (PA, SS, KK), pp. 390–395.
KEODKEOD-2011-HusakovaC #multi #ontology #recommendation #simulation
Exploitation of Ontology-based Recommendation System with Multi-agent Simulations (MH, PC), pp. 433–436.
SEKESEKE-2011-FarahatE #fault #performance
Exploiting Computational Redundancy for Efficient Recovery from Soft Errors in Sensor Nodes (AF, AE), pp. 619–624.
SEKESEKE-2011-GrabnerMBG #aspect-oriented #documentation #legacy #semantics
Exploiting semantic aspects to evolve a text-based search on a legacy document management system (JG, AM, MB, TG), pp. 392–397.
SIGIRSIGIR-2011-BelemMPAG #multi #recommendation
Associative tag recommendation exploiting multiple textual features (FB, EFM, TP, JMA, MAG), pp. 1033–1042.
SIGIRSIGIR-2011-LiLS #recommendation #social
Exploiting endorsement information and social influence for item recommendation (CTL, SDL, MKS), pp. 1131–1132.
SIGIRSIGIR-2011-YeYLL #collaboration #recommendation
Exploiting geographical influence for collaborative point-of-interest recommendation (MY, PY, WCL, DLL), pp. 325–334.
OOPSLAOOPSLA-2011-PylaRV #parallel
Exploiting coarse-grain speculative parallelism (HKP, CJR, SV), pp. 555–574.
SACSAC-2011-LiuZ #memory management #predict #realtime
Exploiting time predictable two-level scratchpad memory for real-time systems (YL, WZ), pp. 395–396.
SACSAC-2011-RathgebUW #recognition
Shifting score fusion: on exploiting shifting variation in iris recognition (CR, AU, PW), pp. 3–7.
ESEC-FSEESEC-FSE-2011-ClementsEIMM #architecture #requirements #testing
Exploiting software architecture to support requirements satisfaction testing (PCC, MJEC, PI, IM, EM), pp. 484–487.
ICSEICSE-2011-Bacchelli #email #re-engineering
Exploring, exposing, and exploiting emails to include human factors in software engineering (AB), pp. 1074–1077.
ICSEICSE-2011-SoffaWM #debugging #hardware #testing
Exploiting hardware advances for software testing and debugging (MLS, KRW, JM), pp. 888–891.
LDTALDTA-2011-DominguezP #algebra
Exploiting algebra/coalgebra duality for program fusion extensions (FD, AP), p. 6.
HPCAHPCA-2011-ChenLZ #memory management #parallel #performance
Essential roles of exploiting internal parallelism of flash memory based solid state drives in high-speed data processing (FC, RL, XZ), pp. 266–277.
HPCAHPCA-2011-RobatmiliGBK #distributed
Exploiting criticality to reduce bottlenecks in distributed uniprocessors (BR, MSSG, DB, SWK), pp. 431–442.
CADECADE-2011-DeharbeFMP #problem #smt #symmetry
Exploiting Symmetry in SMT Problems (DD, PF, SM, BWP), pp. 222–236.
ICSTICST-2011-FraserZ #generative #testing
Exploiting Common Object Usage in Test Case Generation (GF, AZ), pp. 80–89.
DACDAC-2010-ChippaMRRC #algorithm #design #energy #hardware #performance #scalability
Scalable effort hardware design: exploiting algorithmic resilience for energy efficiency (VKC, DM, AR, KR, STC), pp. 555–560.
DACDAC-2010-NovoLFRC #data flow #finite #precise
Exploiting finite precision information to guide data-flow mapping (DN, ML, RF, PR, FC), pp. 248–253.
DACDAC-2010-YinL #low cost #monitoring
Exploiting reconfigurability for low-cost in-situ test and monitoring of digital PLLs (LY, PL), pp. 929–934.
DATEDATE-2010-GellertPZFVS #architecture #design #energy #predict #smt
Energy-performance design space exploration in SMT architectures exploiting selective load value predictions (AG, GP, VZ, AF, LNV, CS), pp. 271–274.
DATEDATE-2010-JunYC #library #multi #network #synthesis
Exploiting multiple switch libraries in topology synthesis of on-chip interconnection network (MJ, SY, EYC), pp. 1390–1395.
DATEDATE-2010-KimKL #named #reliability #similarity
SimTag: Exploiting tag bits similarity to improve the reliability of the data caches (JK, SK, YL), pp. 941–944.
DATEDATE-2010-LiSC #logic #manycore
Exploiting local logic structures to optimize multi-core SoC floorplanning (CHL, SS, LPC), pp. 1291–1296.
DATEDATE-2010-RoxE #correlation
Exploiting inter-event stream correlations between output event streams of non-preemptively scheduled tasks (JR, RE), pp. 226–231.
VLDBVLDB-2010-ChengLYLLX #database #effectiveness #scalability
Explore or Exploit? Effective Strategies for Disambiguating Large Databases (RC, EL, XSY, MHL, XL, XX), pp. 815–825.
VLDBVLDB-2010-GulhaneRST #information management #web
Exploiting Content Redundancy for Web Information Extraction (PG, RR, SHS, AT), pp. 578–587.
VLDBVLDB-2010-TzoumasDJ #clustering #correlation #query
Sharing-Aware Horizontal Partitioning for Exploiting Correlations During Query Processing (KT, AD, CSJ), pp. 542–553.
PLDIPLDI-2010-MightSH #functional #object-oriented #program analysis
Resolving and exploiting the k-CFA paradox: illuminating functional vs. object-oriented program analysis (MM, YS, DVH), pp. 305–315.
CHICHI-2010-KangFK #social
Exploiting knowledge-in-the-head and knowledge-in-the-social-web: effects of domain expertise on exploratory search in individual and social search environments (RK, WTF, TGK), pp. 393–402.
CIKMCIKM-2010-BelemMAGP #metric #quality #recommendation #web
Exploiting co-occurrence and information quality metrics to recommend tags in web 2.0 applications (FMB, EFM, JMdA, MAG, GLP), pp. 1793–1796.
CIKMCIKM-2010-BroderGJMMW #web
Exploiting site-level information to improve web search (AZB, EG, VJ, GM, DM, JW), pp. 1393–1396.
CIKMCIKM-2010-DemartiniMBZ #named
TAER: time-aware entity retrieval-exploiting the past to find relevant entities in news articles (GD, MMSM, RB, HZ), pp. 1517–1520.
CIKMCIKM-2010-JensenS #classification
Exploiting sequential relationships for familial classification (LSJ, JGS), pp. 1901–1904.
CIKMCIKM-2010-KarimzadehganZ #feedback #interactive #trade-off
Exploration-exploitation tradeoff in interactive relevance feedback (MK, CZ), pp. 1397–1400.
CIKMCIKM-2010-KimKLB #interpreter #performance #semantics
Efficient wikipedia-based semantic interpreter by exploiting top-k processing (JWK, AK, DL, SB), pp. 1813–1816.
CIKMCIKM-2010-LiSDX #multi #summary #topic
Exploiting novelty, coverage and balance for topic-focused multi-document summarization (XL, YDS, LD, CYX), pp. 1765–1768.
CIKMCIKM-2010-LiuCXD #collaboration #personalisation #ranking
Exploiting user interests for collaborative filtering: interests expansion via personalized ranking (QL, EC, HX, CHQD), pp. 1697–1700.
CIKMCIKM-2010-Otterbacher #gender #metadata
Inferring gender of movie reviewers: exploiting writing style, content and metadata (JO), pp. 369–378.
ECIRECIR-2010-RudinacLH #consistency #query #retrieval
Exploiting Result Consistency to Select Query Expansions for Spoken Content Retrieval (SR, ML, AH), pp. 645–648.
ICMLICML-2010-McAuleyC #performance
Exploiting Data-Independence for Fast Belief-Propagation (JJM, TSC), pp. 767–774.
ICPRICPR-2010-CadavidA #automation #detection #modelling #using #visual notation
Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines (SC, MAM), pp. 1714–1717.
ICPRICPR-2010-LiZXCG #analysis #documentation #multi #sentiment
Exploiting Combined Multi-level Model for Document Sentiment Analysis (SL, HZ, WX, GC, JG), pp. 4141–4144.
ICPRICPR-2010-PapadopoulosMKS #analysis #approach #image #learning #semantics #statistics
A Statistical Learning Approach to Spatial Context Exploitation for Semantic Image Analysis (GTP, VM, IK, MGS), pp. 3138–3142.
ICPRICPR-2010-SimeoneMT
Exploiting System Knowledge to Improve ECOC Reject Rules (PS, CM, FT), pp. 4340–4343.
KDDKDD-2010-BozorgiSSV #heuristic #learning #predict
Beyond heuristics: learning to classify vulnerabilities and predict exploits (MB, LKS, SS, GMV), pp. 105–114.
KDDKDD-2010-LiWZCMJ #performance
Exploitation and exploration in a performance based contextual advertising system (WL, XW, RZ, YC, JM, RJ), pp. 27–36.
KDDKDD-2010-ZhangZ #dependence #learning #multi
Multi-label learning by exploiting label dependency (MLZ, KZ), pp. 999–1008.
KDIRKDIR-2010-KumarVSV #clustering #documentation #n-gram #wiki
Exploiting N-gram Importance and Wikipedia based Additional Knowledge for Improvements in GAAC based Document Clustering (NK, VVBV, KS, VV), pp. 182–187.
SIGIRSIGIR-2010-BillerbeckDFIK #retrieval
Exploiting click-through data for entity retrieval (BB, GD, CSF, TI, RK), pp. 803–804.
SIGIRSIGIR-2010-CondeVC #social #web
Inferring user intent in web search by exploiting social annotations (JMC, DV, PC), pp. 827–828.
SIGIRSIGIR-2010-SvoreKK #how #proximity #retrieval #web
How good is a span of terms?: exploiting proximity to improve web retrieval (KMS, PHK, NK), pp. 154–161.
SACSAC-2010-GehlertBKMPP #adaptation #verification
Exploiting assumption-based verification for the adaptation of service-based applications (AG, AB, RK, AM, MP, KP), pp. 2430–2437.
SACSAC-2010-SykesHMK #adaptation #architecture #non-functional #self
Exploiting non-functional preferences in architectural adaptation for self-managed systems (DS, WH, JM, JK), pp. 431–438.
ICSEICSE-2010-BegelKZ #named #repository
Codebook: discovering and exploiting relationships in software repositories (AB, YPK, TZ), pp. 125–134.
CGOCGO-2010-JiangZTMGSG #behaviour #correlation #predict #statistics
Exploiting statistical correlations for proactive prediction of program behaviors (YJ, EZZ, KT, FM, MG, XS, YG), pp. 248–256.
CGOCGO-2010-KochBF #code generation
Integrated instruction selection and register allocation for compact code generation exploiting freeform mixing of 16- and 32-bit instructions (TJKEvK, IB, BF), pp. 180–189.
HPCAHPCA-2010-WooSLL #3d #architecture #memory management
An optimized 3D-stacked memory architecture by exploiting excessive, high-density TSV bandwidth (DHW, NHS, DLL, HHSL), pp. 1–12.
ISSTAISSTA-2010-SantelicesH #dependence #execution #multi #scalability #symbolic computation
Exploiting program dependencies for scalable multiple-path symbolic execution (RAS, MJH), pp. 195–206.
ICSTSAT-2010-GoultiaevaB
Exploiting Circuit Representations in QBF Solving (AG, FB), pp. 333–339.
DACDAC-2009-Whipp #architecture #process #verification
Exploiting “architecture for verification” to streamline the verification process (DW), pp. 212–215.
DATEDATE-2009-BaeMV #scheduling
Exploiting clock skew scheduling for FPGA (SB, PM, NV), pp. 1524–1529.
DATEDATE-2009-CabodiCGMNQ #constraints #model checking #verification
Speeding up model checking by exploiting explicit and hidden verification constraints (GC, PC, LG, MM, SN, SQ), pp. 1686–1691.
DATEDATE-2009-Diaz-MadridNHDR #pipes and filters #reduction
Power reduction of a 12-bit 40-MS/s pipeline ADC exploiting partial amplifier sharing (JÁDM, HN, HH, GDA, RRM), pp. 369–373.
DATEDATE-2009-PigorschS
Exploiting structure in an AIG based QBF solver (FP, CS), pp. 1596–1601.
DATEDATE-2009-WangHZC #design
Exploiting narrow-width values for thermal-aware register file designs (SW, JSH, SGZ, SWC), pp. 1422–1427.
DATEDATE-2009-YangO #adaptation #towards
Towards no-cost adaptive MPSoC static schedules through exploitation of logical-to-physical core mapping latitude (CY, AO), pp. 63–68.
ICDARICDAR-2009-IbrahimKKAG #analysis #dependence #online #using #verification
On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
SIGMODSIGMOD-2009-BabuGM #learning #nondeterminism #scalability
Large-scale uncertainty management systems: learning and exploiting your data (SB, SG, KM), pp. 995–998.
SIGMODSIGMOD-2009-Chen #named #performance
FlashLogging: exploiting flash devices for synchronous logging performance (SC), pp. 73–86.
SIGMODSIGMOD-2009-ChenKM #analysis #multi
Exploiting context analysis for combining multiple entity resolution systems (ZC, DVK, SM), pp. 207–218.
VLDBVLDB-2009-KimuraHRMZ #correlation #dependence #functional
Correlation Maps: A Compressed Access Method for Exploiting Soft Functional Dependencies (HK, GH, AR, SM, SBZ), pp. 1222–1233.
HCIHIMI-DIE-2009-ChenT
Exploiting Browsing History for Exploratory Search (WLC, WGT), pp. 355–364.
ICEISICEIS-AIDSS-2009-TinelliCRNSD #semantics #sql #standard
I.M.P.A.K.T.: An Innovative Semantic-based Skill Management System Exploiting Standard SQL (ET, AC, MR, TDN, EDS, FMD), pp. 224–229.
CIKMCIKM-2009-AltingovdeOU #query #web
Exploiting query views for static index pruning in web search engines (ISA, RO, ÖU), pp. 1951–1954.
CIKMCIKM-2009-HuSZC #clustering #semantics #using
Exploiting internal and external semantics for the clustering of short texts using world knowledge (XH, NS, CZ, TSC), pp. 919–928.
CIKMCIKM-2009-LuCP #clustering #network #social #web
Exploit the tripartite network of social tagging for web clustering (CL, XC, EKP), pp. 1545–1548.
CIKMCIKM-2009-ShenWCSYCL #classification
Exploiting term relationship to boost text classification (DS, JW, BC, JTS, QY, ZC, YL), pp. 1637–1640.
CIKMCIKM-2009-ZhangJZZ #bidirectional #detection
Exploiting bidirectional links: making spamming detection easier (YZ, QJ, LZ, YZ), pp. 1839–1842.
ECIRECIR-2009-AbbasiCNPS
Exploiting Flickr Tags and Groups for Finding Landmark Photos (RA, SC, WN, RP, SS), pp. 654–661.
ECIRECIR-2009-TollariDMFAG #concept #image #retrieval #visual notation
Exploiting Visual Concepts to Improve Text-Based Image Retrieval (ST, MD, CM, AFT, MRA, PG), pp. 701–705.
ECIRECIR-2009-TsagkiasLR #predict
Exploiting Surface Features for the Prediction of Podcast Preference (MT, ML, MdR), pp. 473–484.
ICMLICML-2009-ChoiCW #markov #modelling #multi
Exploiting sparse Markov and covariance structure in multiresolution models (MJC, VC, ASW), pp. 177–184.
KDDKDD-2009-HuZLPZ #clustering #documentation #wiki
Exploiting Wikipedia as external knowledge for document clustering (XH, XZ, CL, EKP, XZ), pp. 389–396.
RecSysRecSys-2009-ShiLH #collaboration #similarity
Exploiting user similarity based on rated-item pools for improved user-based collaborative filtering (YS, ML, AH), pp. 125–132.
SEKESEKE-2009-RuhelaR #clustering #documentation #web
Improving Text Document Clustering by Exploiting Open Web Directory (GR, PKR), pp. 87–92.
SIGIRSIGIR-2009-Chen #memory management #retrieval
Exploiting memory cues in personal lifelog retrieval (YC), p. 856.
SIGIRSIGIR-2009-JiZLZXCSZ #ranking
Global ranking by exploiting user clicks (SJ, KZ, CL, ZZ, GRX, OC, GS, HZ), pp. 35–42.
SIGIRSIGIR-2009-Kanhabua #documentation #retrieval
Exploiting temporal information in retrieval of archived documents (NK), p. 848.
SIGIRSIGIR-2009-MiletteSRH #social
Exploiting social context for expertise propagation (GPM, MKS, KR, RH), p. 835.
SIGIRSIGIR-2009-ZhuWCT #information retrieval #modelling #nondeterminism #risk management
Risky business: modeling and exploiting uncertainty in information retrieval (JZ, JW, IJC, MJT), pp. 99–106.
QAPLQAPL-2009-MuraPPR #markov
Exploiting non-Markovian Bio-Processes (IM, DP, CP, AR), pp. 83–98.
RERE-2009-SalinesiDDMR #constraints #finite #modelling #product line #programming
Exploiting the Versatility of Constraint Programming over Finite Domains to Integrate Product Line Models (CS, DD, OD, RM, CR), pp. 375–376.
SACSAC-2009-ArbelaezH #dependence
Exploiting weak dependencies in tree-based search (AA, YH), pp. 1385–1391.
SACSAC-2009-HendersonCL #performance
Exploiting join cardinality for faster hash joins (MH, BC, RL), pp. 1549–1554.
SACSAC-2009-LiuZ #distance #performance #stack #worst-case
Exploiting stack distance to estimate worst-case data cache performance (YL, WZ), pp. 1979–1983.
SPLCSPLC-2009-BabarIP #agile #architecture #case study #development #industrial #product line
An industrial case of exploiting product line architectures in agile software development (MAB, TI, MP), pp. 171–179.
CCCC-2009-GaoLXN #concurrent #predict #recursion #source code #thread
Exploiting Speculative TLP in Recursive Programs by Dynamic Thread Prediction (LG, LL, JX, TFN), pp. 78–93.
CCCC-2009-KnightsMSMD #hardware #optimisation
Blind Optimization for Exploiting Hardware Features (DK, TM, PFS, MCM, AD), pp. 251–265.
PPoPPPPoPP-2009-HuangEHC #compilation #optimisation #source code
Exploiting global optimizations for openmp programs in the openuh compiler (LH, DE, MWH, BMC), pp. 289–290.
SOSPSOSP-2009-DobrescuEACFIKMR #named #parallel
RouteBricks: exploiting parallelism to scale software routers (MD, NE, KJA, BGC, KRF, GI, AK, MM, SR), pp. 15–28.
ICSTSAT-2009-LiMMP #satisfiability
Exploiting Cycle Structures in Max-SAT (CML, FM, NOM, JP), pp. 467–480.
VMCAIVMCAI-2009-TreflerW #architecture #reduction #symmetry
Extending Symmetry Reduction by Exploiting System Architecture (RJT, TW), pp. 320–334.
CASECASE-2008-NummelaUSK #case study #industrial
Exploiting passive UHF RFID in paper industry — Case study: End user (JN, LU, LS, MK), pp. 436–441.
DACDAC-2008-KwonYHMCE #approach #memory management #parallel
A practical approach of memory access parallelization to exploit multiple off-chip DDR memories (WCK, SY, SMH, BM, KMC, SKE), pp. 447–452.
DATEDATE-2008-HongYBCEK #bias #runtime #scalability
Dynamic Voltage Scaling of Supply and Body Bias Exploiting Software Runtime Distribution (SH, SY, BB, KMC, SKE, TK), pp. 242–247.
DATEDATE-2008-SingheeSR #correlation #kernel #performance #statistics
Exploiting Correlation Kernels for Efficient Handling of Intra-Die Spatial Correlation, with Application to Statistical Timing (AS, SS, RAR), pp. 856–861.
VLDBVLDB-2008-SenDG #correlation #database #probability
Exploiting shared correlations in probabilistic databases (PS, AD, LG), pp. 809–820.
ITiCSEITiCSE-2008-ThorntonE #data flow #data type #online
A data type to exploit online data sources (MT, SHE), pp. 114–118.
ICPCICPC-2008-RothlisbergerGN #ide #runtime
Exploiting Runtime Information in the IDE (DR, OG, ON), pp. 63–72.
SCAMSCAM-2008-SingerK
Exploiting the Correspondence between Micro Patterns and Class Names (JS, CCK), pp. 67–76.
GT-VMTGT-VMT-2006-Lanese08 #graph transformation
Exploiting User-definable Synchronizations in Graph Transformation (IL), pp. 27–38.
AdaEuropeAdaEurope-2008-CarnevaliGV #formal method #petri net
A Tailored V-Model Exploiting the Theory of Preemptive Time Petri Nets (LC, LG, EV), pp. 87–100.
ICEISICEIS-DISI-2008-NebelingRS #content management #migration #repository #standard
Migration between Content Management Systems — Exploiting the JSR-170 Content Repository Standard (MN, GR, LS), pp. 240–245.
CIKMCIKM-2008-Aguilar-SaboritJSM #memory management #performance #pipes and filters
Exploiting pipeline interruptions for efficient memory allocation (JAS, MJ, DS, VMM), pp. 639–648.
CIKMCIKM-2008-AhmadABM #database #interactive #modelling #query
Modeling and exploiting query interactions in database systems (MA, AA, SB, KM), pp. 183–192.
CIKMCIKM-2008-FaruquieNCS #detection #information management
Exploiting context to detect sensitive information in call center conversations (TAF, SN, AC, LVS), pp. 1513–1514.
CIKMCIKM-2008-RochaMPGM #classification
Exploiting temporal contexts in text classification (LCdR, FM, AMP, MAG, WMJ), pp. 243–252.
ECIRECIR-2008-AlonsoZ #information retrieval #semantics
Exploiting Semantic Annotations in Information Retrieval (OA, HZ), p. 712.
ECIRECIR-2008-PandeyL #case study #comparative #information retrieval
Exploiting Session Context for Information Retrieval — A Comparative Study (GP, JL), pp. 652–657.
ECIRECIR-2008-PehcevskiVT #locality #ranking #wiki
Exploiting Locality of Wikipedia Links in Entity Ranking (JP, AMV, JAT), pp. 258–269.
ICPRICPR-2008-LiaoJ #learning #network #parametricity #semistructured data
Exploiting qualitative domain knowledge for learning Bayesian network parameters with incomplete data (WL, QJ), pp. 1–4.
RecSysRecSys-2008-Baltrunas #information management #recommendation
Exploiting contextual information in recommender systems (LB), pp. 295–298.
SEKESEKE-2008-GoaerOTS #architecture #evolution
Evolution Shelf: Exploiting Evolution Styles within Software Architectures (OLG, MCO, DT, AS), pp. 387–392.
SIGIRSIGIR-2008-BanchsK #information retrieval
Exploiting MDS Projections for Cross-language IR (REB, AK), pp. 863–864.
SIGIRSIGIR-2008-JiangA #analysis #categorisation
Exploiting subjectivity analysis in blogs to improve political leaning categorization (MJ, SA), pp. 725–726.
SIGIRSIGIR-2008-NaKKL #information retrieval #proximity
Exploiting proximity feature in bigram language model for information retrieval (SHN, JK, ISK, JHL), pp. 821–822.
SIGIRSIGIR-2008-SerdyukovRH #dependence
Exploiting sequential dependencies for expert finding (PS, HR, DH), pp. 795–796.
SIGIRSIGIR-2008-Winter #information retrieval #peer-to-peer #xml
Exploiting XML structure to improve information retrieval in peer-to-peer systems (JW), p. 890.
SIGIRSIGIR-2008-ZimmerTW #approximate #correlation #information management #keyword
Exploiting correlated keywords to improve approximate information filtering (CZ, CT, GW), pp. 323–330.
SACSAC-2008-AtoofianB #behaviour #embedded #latency #memory management
Exploiting program cyclic behavior to reduce memory latency in embedded processors (EA, AB), pp. 1482–1486.
SACSAC-2008-LobatoBNTP #middleware #semantics
Exploiting semantic information on a message exchanging middleware (DCL, MQB, RBN, CACT, MdGCP), pp. 514–515.
SPLCSPLC-2008-KumarBC #identification #variability
Identifying and Exploiting the Similarities between Rationale Management and Variability Management (AKT, BB, OC), pp. 99–108.
ASPLOSASPLOS-2008-BallapuramSL #behaviour #multi #semantics
Exploiting access semantics and program behavior to reduce snoop power in chip multiprocessors (CSB, AS, HHSL), pp. 60–69.
HPCAHPCA-2008-SubramaniamPL #dependence #memory management #named #predict #smt
PEEP: Exploiting predictability of memory dependences in SMT processors (SS, MP, GHL), pp. 137–148.
HPDCHPDC-2008-Al-KiswanyGSYR #distributed #named
StoreGPU: exploiting graphics processing units to accelerate distributed storage systems (SAK, AG, ESN, GY, MR), pp. 165–174.
ICLPICLP-2008-BonattiCOS #privacy #security #trust
Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
ECSAECSA-2007-NavaCD #architecture #design #process #tool support
Processes for Creating and Exploiting Architectural Design Decisions with Tool Support (FN, RC, JCD), pp. 321–324.
ASEASE-2007-DwyerP #cost analysis #dynamic analysis #static analysis #type system
Residual dynamic typestate analysis exploiting static analysis: results to reformulate and reduce the cost of dynamic analysis (MBD, RP), pp. 124–133.
DATEDATE-2007-KraemerLAM #interactive #parallel #program transformation #source code #using
Interactive presentation: SoftSIMD — exploiting subword parallelism using source code transformations (SK, RL, GA, HM), pp. 1349–1354.
DATEDATE-2007-MamagkakisSC #design #middleware #optimisation #protocol
Middleware design optimization of wireless protocols based on the exploitation of dynamic input patterns (SM, DS, FC), pp. 1036–1041.
ICDARICDAR-2007-AradhyeM #detection
Exploiting Videotext _Events_ for Improved Videotext Detection (HBA, GKM), pp. 894–898.
ICDARICDAR-2007-ChenW #documentation #image #kernel
Exploiting Fisher Kernels in Decoding Severely Noisy Document Images (JC, YW), pp. 417–421.
SIGMODSIGMOD-2007-GeorgiadisV #performance #relational #xpath
Xpath on steroids: exploiting relational engines for xpath performance (HG, VV), pp. 317–328.
SIGMODSIGMOD-2007-LarsonLZZ07a #estimation #self
Exploiting self-monitoring sample views for cardinality estimation (PÅL, WL, JZ, PZ), pp. 1073–1075.
SIGMODSIGMOD-2007-ZhouLFL #performance #query
Efficient exploitation of similar subexpressions for query processing (JZ, PÅL, JCF, WL), pp. 533–544.
CSEETCSEET-2007-Burge #education #maintenance #multi #reliability
Exploiting Multiplicity to Teach Reliability and Maintainability in a Capstone Project (JEB), pp. 29–36.
SASSAS-2007-HardekopfL #analysis #equivalence #pointer
Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis (BH, CL), pp. 265–280.
HCIDHM-2007-CaoWJWC #design #feedback #visual notation
The Design and Exploitation of Visual Feedback System for Rowing (CC, CW, LJ, ZW, XC), pp. 794–802.
HCIHCI-MIE-2007-ChenCW #correlation #interactive #multimodal
Exploiting Speech-Gesture Correlation in Multimodal Interaction (FC, EHCC, NW), pp. 23–30.
ICEISICEIS-AIDSS-2007-ShethG #execution #middleware #non-functional #process #semantics #workflow
The 4×4 semantic model — exploiting data, functional, non-functional and execution semantics across business process, workflow, partner services and middleware services tiers (APS, KG), pp. 1–4.
ICEISICEIS-DISI-2007-ShethG #execution #middleware #non-functional #process #semantics #workflow
The 4×4 semantic model — exploiting data, functional, non-functional and execution semantics across business process, workflow, partner services and middleware services tiers (APS, KG), pp. 1–4.
ICEISICEIS-EIS-2007-ShethG #execution #middleware #non-functional #process #semantics #workflow
The 4×4 semantic model — exploiting data, functional, non-functional and execution semantics across business process, workflow, partner services and middleware services tiers (APS, KG), pp. 1–4.
ICEISICEIS-HCI-2007-ShethG #execution #middleware #non-functional #process #semantics #workflow
The 4×4 semantic model — exploiting data, functional, non-functional and execution semantics across business process, workflow, partner services and middleware services tiers (APS, KG), pp. 1–4.
ICEISICEIS-J-2007-ShethG07a #execution #middleware #non-functional #process #semantics #workflow
The 4 x 4 Semantic Model: Exploiting Data, Functional, Non-functional and Execution Semantics Across Business Process, Workflow, Partner Services and Middleware Services Tiers (APS, KG), pp. 16–26.
ICEISICEIS-SAIC-2007-ShethG #execution #middleware #non-functional #process #semantics #workflow
The 4×4 semantic model — exploiting data, functional, non-functional and execution semantics across business process, workflow, partner services and middleware services tiers (APS, KG), pp. 1–4.
ICMLICML-2007-KrauseG #approach #learning #process
Nonmyopic active learning of Gaussian processes: an exploration-exploitation approach (AK, CG), pp. 449–456.
KDDKDD-2007-CrabtreeAG #aspect-oriented #automation #query
Exploiting underrepresented query aspects for automatic query expansion (DC, PA, XG), pp. 191–200.
KDDKDD-2007-KarrasMS #summary
Exploiting duality in summarization with deterministic guarantees (PK, DS, NM), pp. 380–389.
RecSysRecSys-2007-FreyneFC #data access #recommendation #social #towards
Toward the exploitation of social access patterns for recommendation (JF, RF, MC), pp. 179–182.
SIGIRSIGIR-2007-WanY #clustering #collaboration #documentation #multi #named
CollabSum: exploiting multiple document clustering for collaborative single document summarizations (XW, JY), pp. 143–150.
SACSAC-2007-CazzolaPGS #co-evolution #design #metadata #modelling
Co-evolving application code and design models by exploiting meta-data (WC, SP, AG, GS), pp. 1275–1279.
SACSAC-2007-LinK #array #integration
Exploiting inter-gene information for microarray data integration (KML, JK), pp. 123–127.
SACSAC-2007-LiuMB #approach #clustering
A clustering entropy-driven approach for exploring and exploiting noisy functions (SHL, MM, BRB), pp. 738–742.
SACSAC-2007-Palmer #web #web service
Exploiting bibliographic web services with CiTeX (JDP), pp. 1673–1676.
SACSAC-2007-RuffoS #peer-to-peer #recommendation
Evaluating peer-to-peer recommender systems that exploit spontaneous affinities (GR, RS), pp. 1574–1578.
SACSAC-2007-SonJF
Exploiting types for improved schema mapping (YS, HMJ, FF), pp. 423–429.
SACSAC-2007-StanchinaM #algorithm #garbage collection #performance #realtime
Exploiting the efficiency of generational algorithms for hardware-supported real-time garbage collection (SS, MM), pp. 713–718.
CGOCGO-2007-HormatiCM
Exploiting Narrow Accelerators with Data-Centric Subgraph Mapping (AH, NC, SAM), pp. 341–353.
CGOCGO-2007-ReddiCCS #persistent #reuse
Persistent Code Caching: Exploiting Code Reuse Across Executions and Applications (VJR, DC, RC, MDS), pp. 74–88.
HPCAHPCA-2007-AgarwalMWSF #parallel
Exploiting Postdominance for Speculative Parallelization (MA, KM, KMW, SSS, MIF), pp. 295–305.
HPCAHPCA-2007-ZhongLM #architecture #hybrid #manycore #parallel #thread
Extending Multicore Architectures to Exploit Hybrid Parallelism in Single-thread Applications (HZ, SAL, SAM), pp. 25–36.
PPoPPPPoPP-2007-UpadhyayaPM #concurrent
Expressing and exploiting concurrency in networked applications with aspen (GU, VSP, SPM), pp. 13–23.
PPoPPPPoPP-2007-ZhangSZSG #concurrent
Optimized lock assignment and allocation: a method for exploiting concurrency among critical sections (YZ, VCS, WZ, VS, GRG), pp. 146–147.
CSLCSL-2007-ChenF #parametricity
Subexponential Time and Fixed-Parameter Tractability: Exploiting the Miniaturization Mapping (YC, JF), pp. 389–404.
DACDAC-2006-JayaseelanLM
Exploiting forwarding to improve data bandwidth of instruction-set extensions (RJ, HL, TM), pp. 43–48.
DACDAC-2006-SuhendraMRC #analysis #detection #performance
Efficient detection and exploitation of infeasible paths for software timing analysis (VS, TM, AR, TC), pp. 358–363.
DACDAC-2006-Wang #detection #symmetry
Exploiting K-Distance Signature for Boolean Matching and G-Symmetry Detection (KHW), pp. 516–521.
DATEDATE-2006-BeltrameSSLP #simulation
Exploiting TLM and object introspection for system-level simulation (GB, DS, CS, DL, CP), pp. 100–105.
DATEDATE-2006-GandhiM #energy #multi #using
Exploiting data-dependent slack using dynamic multi-VDD to minimize energy consumption in datapath circuits (KRG, NRM), pp. 1001–1006.
VLDBVLDB-2006-HabichRL #database #named #optimisation
GignoMDA — Exploiting Cross-Layer Optimization for Complex Database Applications (DH, SR, WL), p. 1251–?.
VLDBVLDB-2006-MissierEGPJ #quality
Quality Views: Capturing and Exploiting the User Perspective on Data Quality (PM, SME, RMG, ADP, BJ), pp. 977–988.
TACASTACAS-2006-GroceJ #program analysis
Exploiting Traces in Program Analysis (AG, RJ), pp. 379–393.
ICSMEICSM-2006-KuhnG
Exploiting the Analogy Between Traces and Signal Processing (AK, OG), pp. 320–329.
SCAMSCAM-2006-BinkleyHK #animation #approximate #static analysis
Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation (DB, MH, JK), pp. 43–52.
CAiSECAiSE-2006-FlescaGMT #documentation #nondeterminism
Wrapping PDF Documents Exploiting Uncertain Knowledge (SF, SG, EM, AT), pp. 175–189.
CIKMCIKM-2006-GollapudiP #symmetry #topic
Exploiting asymmetry in hierarchical topic extraction (SG, RP), pp. 475–482.
CIKMCIKM-2006-MichelBNTWZ #keyword
Discovering and exploiting keyword and attribute-value co-occurrences to improve P2P routing indices (SM, MB, NN, PT, GW, CZ), pp. 172–181.
CIKMCIKM-2006-ShiN #adaptation #corpus #information retrieval #parallel
Filtering or adapting: two strategies to exploit noisy parallel corpora for cross-language information retrieval (LS, JYN), pp. 814–815.
ICPRICPR-v2-2006-ChenY #modelling #using #video
Exploiting High Dimensional Video Features Using Layered Gaussian Mixture Models (DC, JY), pp. 1078–1081.
ICPRICPR-v2-2006-HarpazH #geometry #learning
Exploiting the Geometry of Gene Expression Patterns for Unsupervised Learning (RH, RMH), pp. 670–674.
ICPRICPR-v2-2006-KhanKKA #dependence #online #verification
On-Line Signature Verification by Exploiting Inter-Feature Dependencies (MKK, MAK, MAUK, IA), pp. 796–799.
SACSAC-2006-BaralisG #categorisation #word
Associative text categorization exploiting negated words (EB, PG), pp. 530–535.
SACSAC-2006-BergerMD #categorisation #email #set
Exploiting partial decision trees for feature subset selection in e-mail categorization (HB, DM, MD), pp. 1105–1109.
SACSAC-2006-FengQWZ #mining #query #xml
Exploit sequencing to accelerate hot XML query pattern mining (JF, QQ, JW, LZ), pp. 517–524.
SACSAC-2006-NoiaSCTD #framework #image #retrieval #semantics
A framework for content-based image retrieval fully exploiting the semantics of annotation (TDN, EDS, FdC, ET, FMD), pp. 1709–1710.
ASPLOSASPLOS-2006-GordonTA #parallel #pipes and filters #source code
Exploiting coarse-grained task, data, and pipeline parallelism in stream programs (MIG, WT, SPA), pp. 151–162.
ASPLOSASPLOS-2006-KawahitoKMIN #framework #recognition
A new idiom recognition framework for exploiting hardware-assist instructions (MK, HK, TM, HI, TN), pp. 382–393.
ASPLOSASPLOS-2006-ParasharSG #locality #multi #named #performance #thread
SlicK: slice-based locality exploitation for efficient redundant multithreading (AP, AS, SG), pp. 95–105.
CGOCGO-2006-SonCK #approach #locality #power management
A Compiler-Guided Approach for Reducing Disk Power Consumption by Exploiting Disk Access Locality (SWS, GC, MTK), pp. 256–268.
HPCAHPCA-2006-PenryFHWSAC #parallel #simulation
Exploiting parallelism and structure to accelerate the simulation of chip multi-processors (DAP, DF, DH, RW, GS, DIA, DC), pp. 29–40.
PPoPPPPoPP-2006-LiuTCASRT #compilation #named
POSH: a TLS compiler that exploits program structure (WL, JT, LC, WA, KS, JR, JT), pp. 158–167.
PPoPPPPoPP-2006-ManassievMA #clustering #concurrent #distributed #memory management #transaction
Exploiting distributed version concurrency in a transactional memory cluster (KM, MM, CA), pp. 198–208.
ICSTSAT-2006-SabharwalAGHS #modelling #performance #symmetry
QBF Modeling: Exploiting Player Symmetry for Simplicity and Efficiency (AS, CA, CPG, JWH, BS), pp. 382–395.
WICSAWICSA-2005-KruchtenLVW #architecture
Building up and Exploiting Architectural Knowledge (PK, PL, HvV, TW), pp. 291–292.
ASEASE-2005-KashyapG #detection #performance #reachability
Exploiting predicate structure for efficient reachability detection (SK, VKG), pp. 4–13.
DACDAC-2005-MonyBPK #proving
Exploiting suspected redundancy without proving it (HM, JB, VP, RK), pp. 463–466.
DACDAC-2005-ZykovMJVS #architecture #novel #performance #trade-off
High performance computing on fault-prone nanotechnologies: novel microarchitecture techniques exploiting reliability-delay trade-offs (AVZ, EM, MFJ, GdV, AS), pp. 270–273.
DATEDATE-2005-AbsarC #approach #array
Compiler-Based Approach for Exploiting Scratch-Pad in Presence of Irregular Array Access (MJA, FC), pp. 1162–1167.
DATEDATE-2005-ChappellMPOFS #adaptation #generative #realtime #safety
Exploiting Real-Time FPGA Based Adaptive Systems Technology for Real-Time Sensor Fusion in Next Generation Automotive Safety Systems (SC, AM, DP, DO, BF, CS), pp. 180–185.
DATEDATE-2005-LeungTH #energy #scheduling
Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling (LFL, CYT, XSH), pp. 634–639.
DocEngDocEng-2005-ChengSB #documentation #xml
Exploiting XML technologies for intelligent document routing (IC, SS, NB), pp. 26–28.
SASSAS-2005-SimonK #analysis
Exploiting Sparsity in Polyhedral Analysis (AS, AK), pp. 336–351.
CEFPCEFP-2005-Hammond #approach #behaviour #bound #functional #programming
Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach (KH), pp. 100–134.
SOFTVISSOFTVIS-2005-MalloyP #c++ #modelling #source code #uml #visualisation
Exploiting UML dynamic object modeling for the visualization of C++ programs (BAM, JFP), pp. 105–114.
CIKMCIKM-2005-ComanNS #energy #network #performance #query
Exploiting redundancy in sensor networks for energy efficient processing of spatiotemporal region queries (AC, MAN, JS), pp. 187–194.
ICMLICML-2005-WangWGSC #markov #modelling #random #semantics
Exploiting syntactic, semantic and lexical regularities in language modeling via directed Markov random fields (SW, SW, RG, DS, LC), pp. 948–955.
SEKESEKE-2005-AvesaniBPS #requirements
Exploiting Domain Knowledge in Requirements Prioritization (PA, CB, AP, AS), pp. 467–472.
SIGIRSIGIR-2005-SrikanthVBM #automation #image #ontology
Exploiting ontologies for automatic image annotation (MS, JV, MB, DIM), pp. 552–558.
SIGIRSIGIR-2005-XueYZYC #analysis
Exploiting the hierarchical structure for link analysis (GRX, QY, HJZ, YY, ZC), pp. 186–193.
SACSAC-2005-BoninoCP #automation #concept #learning #network
Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks (DB, FC, FP), pp. 1639–1644.
ICSEICSE-2005-GanapathySJRB #automation
Automatic discovery of API-level exploits (VG, SAS, SJ, TWR, REB), pp. 312–321.
CGOCGO-2005-ArnoldG #graph #virtual machine
Collecting and Exploiting High-Accuracy Call Graph Profiles in Virtual Machines (MA, DG), pp. 51–62.
HPCAHPCA-2005-QinLZ #detection #memory management #named
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
LCTESLCTES-2005-ZhuM #feedback #scalability #scheduling
Feedback EDF scheduling exploiting hardware-assisted asynchronous dynamic voltage scaling (YZ, FM), pp. 203–212.
DACDAC-2004-DargaLSM #detection #symmetry
Exploiting structure in symmetry detection for CNF (PTD, MHL, KAS, ILM), pp. 530–534.
DACDAC-2004-SilveiraP #algorithm #network #reduction
Exploiting input information in a model reduction algorithm for massively coupled parasitic networks (LMS, JRP), pp. 385–388.
DATEDATE-DF-2004-BruschiB #communication #design #synthesis
A Design Methodology for the Exploitation of High Level Communication Synthesis (FB, MB), pp. 180–185.
DATEDATE-v1-2004-Velev #performance #verification
Exploiting Signal Unobservability for Efficient Translation to CNF in Formal Verification of Microprocessors (MNV), pp. 266–271.
DATEDATE-v2-2004-DuanK
Exploiting Crosstalk to Speed up On-Chip Buse (CD, SPK), pp. 778–783.
DATEDATE-v2-2004-KadayifKK #energy #multi
Exploiting Processor Workload Heterogeneity for Reducing Energy Consumption in Chip Multiprocessors (IK, MTK, IK), pp. 1158–1163.
SIGMODSIGMOD-2004-BrambillaCCDFM #declarative #specification #web #web service #workflow
Declarative Specification of Web Applications exploiting Web Services and Workflows (MB, SC, SC, MD, PF, IM), pp. 909–910.
ICSMEICSM-2004-LiM #component #distributed #testing
Exploiting Global Causality in Testing of Distributed and Component-Based Applications (JL, KM), p. 527.
IFLIFL-2004-Cristobal-SalasCRG #message passing #program transformation #source code
Exploiting Single-Assignment Properties to Optimize Message-Passing Programs by Code Transformations (ACS, AC, ERA, JLG), pp. 1–16.
CIKMCIKM-2004-RavindranG #concept
Exploiting hierarchical relationships in conceptual search (DR, SG), pp. 238–239.
ICPRICPR-v4-2004-YuanL #dependence #nondeterminism
Fragile Watermarking Scheme Exploiting Non-Deterministic Block-Wise Dependency (YY, CTL), pp. 849–852.
KDDKDD-2004-CohenS #integration #markov #process
Exploiting dictionaries in named entity extraction: combining semi-Markov extraction processes and data integration methods (WWC, SS), pp. 89–98.
KDDKDD-2004-XiongSTK #bound #correlation #identification
Exploiting a support-based upper bound of Pearson’s correlation coefficient for efficiently identifying strongly correlated pairs (HX, SS, PNT, VK), pp. 334–343.
SIGIRSIGIR-2004-UpstillR #recommendation #web
Exploiting hyperlink recommendation evidence in navigational web search (TU, SER), pp. 576–577.
RERE-2004-UchitelCKM #animation #requirements #validation
Fluent-Based Animation: Exploiting the Relation between Goals and Scenarios for Requirements Validation (SU, RC, JK, JM), pp. 208–217.
SACSAC-2004-JuhaszC #clustering #multi #performance
Exploiting fast ethernet performance in multiplatform cluster environment (SJ, HC), pp. 1407–1411.
SACSAC-2004-Mosses #semantics
Exploiting labels in Structural Operational Semantics (PDM), pp. 1476–1481.
FSEFSE-2004-KremenekAYE #correlation #fault #ranking
Correlation exploitation in error ranking (TK, KA, JY, DRE), pp. 83–93.
FSEFSE-2004-ZitserLL #open source #source code #static analysis #testing #tool support #using
Testing static analysis tools using exploitable buffer overflows from open source code (MZ, RL, TL), pp. 97–106.
HPCAHPCA-2004-Michaud #capacity #execution #manycore #migration
Exploiting the Cache Capacity of a Single-Chip Multi-Core Processor with Execution Migration (PM), pp. 186–197.
HPCAHPCA-2004-WenWPK #predict
Exploiting Prediction to Reduce Power on Buses (VW, MW, YP, JK), pp. 2–13.
DATEDATE-2003-HuM #architecture #energy #flexibility #performance
Exploiting the Routing Flexibility for Energy/Performance Aware Mapping of Regular NoC Architectures (JH, RM), pp. 10688–10693.
DATEDATE-2003-MeiVVML #architecture #configuration management #parallel #scheduling #using
Exploiting Loop-Level Parallelism on Coarse-Grained Reconfigurable Architectures Using Modulo Scheduling (BM, SV, DV, HDM, RL), pp. 10296–10301.
DATEDATE-2003-SurendraBN #network #reuse
Enhancing Speedup in Network Processing Applications by Exploiting Instruction Reuse with Flow Aggregation (GS, SB, SKN), pp. 10784–10789.
ICDARICDAR-2003-StefanoCM #algorithm #classification #reliability #search-based
Exploiting Reliability for Dynamic Selection of Classifiers by Means of Genetic Algorithms (CDS, ADC, AM), pp. 671–675.
SIGMODSIGMOD-2003-ChaudhuriGS #query
Factorizing Complex Predicates in Queries to Exploit Indexes (SC, PG, SS), pp. 361–372.
SIGMODSIGMOD-2003-Raghavan
Extracting and Exploiting Structure in Text Search (PR), p. 635.
IWPCIWPC-2003-HennessyMP #comprehension #named #tool support #xml
gccXfront: Exploiting gcc as a Front End for Program Comprehension Tools via XML/XSLT (MH, BAM, JFP), p. 298–?.
ICEISICEIS-v1-2003-BerrielGSCG
Exploitation of the Datawarehouse in the Hotels Services: A Proposal of Client Orientation (RB, AG, IS, MC, ZG), pp. 460–463.
CIKMCIKM-2003-SrikanthS #approach #information retrieval #modelling #query
Exploiting syntactic structure of queries in a language modeling approach to IR (MS, RKS), pp. 476–483.
ICMLICML-2003-ZhangXC #adaptation #learning
Exploration and Exploitation in Adaptive Filtering Based on Bayesian Active Learning (YZ, WX, JPC), pp. 896–903.
SIGIRSIGIR-2003-ShenZ #documentation #information retrieval #interactive #query #ranking
Exploiting query history for document ranking in interactive information retrieval (XS, CZ), pp. 377–378.
LDTALDTA-2003-CostagliolaDFG #analysis #development #visual notation
Exploiting XPG for Visual Languages: Definition, Analysis and Development (GC, VD, FF, CG), pp. 612–627.
PPoPPPPoPP-2003-ChenTSDS #distributed
Exploiting high-level coherence information to optimize distributed shared state (DC, CT, BS, SD, MLS), pp. 131–142.
PPoPPPPoPP-2003-KimPR #concurrent #interface #network #programmable
Exploiting task-level concurrency in a programmable network interface (HyK, VSP, SR), pp. 61–72.
DACDAC-2002-HuangM #configuration management #parallel
Exploiting operation level parallelism through dynamically reconfigurable datapaths (ZH, SM), pp. 337–342.
DACDAC-2002-KandemirRC #embedded #memory management #multi
Exploiting shared scratch pad memory space in embedded multiprocessor systems (MTK, JR, ANC), pp. 219–224.
DATEDATE-2002-WuK #algorithm
Exploiting Idle Cycles for Algorithm Level Re-Computing (KW, RK), pp. 842–846.
SIGMODSIGMOD-2002-BrunoC #optimisation #query #statistics
Exploiting statistics on query expressions for optimization (NB, SC), pp. 263–274.
VLDBVLDB-2002-KangC #maintenance #online
Exploiting Versions for On-line Data Warehouse Maintenance in MOLAP Servers (HGK, CWC), pp. 742–753.
VLDBVLDB-2002-KounevB #data access
Improving Data Access of J2EE Applications by Exploiting Asynchronous Messaging and Caching Services (SK, APB), pp. 574–585.
VLDBVLDB-2002-ZellerK #case study #database #experience #optimisation #scalability
Experience Report: Exploiting Advanced Database Optimization Features for Large-Scale SAP R/3 Installations (BZ, AK), pp. 894–905.
ICEISICEIS-2002-ConstantinouTKTK #framework
An E-Service Infrastructure for Innovation Exploitation and Technology Transfer: The DILEMMA Project (AC, VT, PK, DT, AK), pp. 1029–1034.
ICMLICML-2002-BockhorstC #concept
Exploiting Relations Among Concepts to Acquire Weakly Labeled Training Data (JB, MC), pp. 43–50.
ICMLICML-2002-LangfordZK #analysis #trade-off
Competitive Analysis of the Explore/Exploit Tradeoff (JL, MZ, SK), pp. 339–346.
ICPRICPR-v1-2002-VegaS #analysis
Experiments on Gait Analysis by Exploiting Nonstationarity in the Distribution of Feature Relationships (IRV, SS), pp. 1–4.
ICPRICPR-v2-2002-RasheedS #classification
Movie Genre Classification By Exploiting Audio-Visual Features Of Previews (ZR, MS), pp. 1086–1089.
KDDKDD-2002-BennettDM
Exploiting unlabeled data in ensemble methods (KPB, AD, RM), pp. 289–296.
KDDKDD-2002-StoreyC #modelling #optimisation
Exploiting response models: optimizing cross-sell and up-sell opportunities in banking (AS, MDC), pp. 325–331.
SEKESEKE-2002-Micucci #architecture #industrial #knowledge-based #monitoring
Exploiting the kaleidoscope architecture in an industrial environmental monitoring system with heterogeneous devices and a knowledge-based supervisor (DM), pp. 685–688.
SEKESEKE-2002-SchmerlG #architecture #design #self
Exploiting architectural design knowledge to support self-repairing systems (BRS, DG), pp. 241–248.
PADLPADL-2002-YangG #data type #logic programming #performance #source code
Exploiting Efficient Control and Data Structures in Logic Programs (RY, SG), pp. 318–331.
POPLPOPL-2002-ShufGBS #memory management #optimisation
Exploiting prolific types for memory management and optimizations (YS, MG, RB, JPS), pp. 295–306.
SACSAC-2002-BrownJ #retrieval
Exploiting contextual change in context-aware retrieval (PJB, GJFJ), pp. 650–656.
HPCAHPCA-2002-YangPFV #design #energy
Exploiting Choice in Resizable Cache Design to Optimize Deep-Submicron Processor Energy-Delay (SHY, MDP, BF, TNV), pp. 151–161.
CAVCAV-2002-AlurMY #behaviour #model checking #performance
Exploiting Behavioral Hierarchy for Efficient Model Checking (RA, MM, ZY), pp. 338–342.
ASEASE-2001-Iosif #model checking #symmetry
Exploiting Heap Symmetries in Explicit-State Model Checking of Software (RI), pp. 254–261.
DACDAC-2001-BozorgzadehKS #flexibility
Creating and Exploiting Flexibility in Steiner Trees (EB, RK, MS), pp. 195–198.
DATEDATE-2001-SamiSSZZ #embedded
Exploiting data forwarding to reduce the power budget of VLIW embedded processors (MS, DS, CS, VZ, RZ), pp. 252–257.
PLDIPLDI-2001-Chilimbi #abstraction #locality #performance
Efficient Representations and Abstractions for Quantifying and Exploiting Data Reference Locality (TMC), pp. 191–202.
CHICHI-2001-CravenTDPGBFBJLH
Exploiting interactivity, influence, space and time to explore non-linear drama in virtual worlds (MPC, IT, AD, JP, CG, SB, MF, JB, KMJA, BL, MH), pp. 30–37.
ICEISICEIS-v1-2001-StojanovicDS #development #network
Exploiting Temporal GIS and Spatio-Temporal Data to Enhance Telecom Network Planning and Development (DS, SDK, ZS), pp. 88–95.
CIKMCIKM-2001-FrenchPGP #effectiveness #retrieval
Exploiting A Controlled Vocabulary to Improve Collection Selection and Retrieval Effectiveness (JCF, ALP, FCG, NP), pp. 199–206.
SIGIRSIGIR-2001-ClarkeCL
Exploiting Redundancy in Question Answering (CLAC, GVC, TRL), pp. 358–365.
SACSAC-2001-Leopold #optimisation #reuse
Exploiting non-uniform reuse for cache optimization (CL), pp. 560–564.
SACSAC-2001-PowerM #lalr #metric
Exploiting metrics to facilitate grammar transformation into LALR format (JFP, BAM), pp. 636–640.
ICSEICSE-2001-AlurAGHKKMMW #design #model checking #named
JMOCHA: A Model Checking Tool that Exploits Design Structure (RA, LdA, RG, TAH, MK, CMK, RM, FYCM, BYW), pp. 835–836.
ICSEICSE-2001-GriswoldYK #evolution
Exploiting the Map Metaphor in a Tool for Software Evolution (WGG, JJY, YK), pp. 265–274.
CAVCAV-2001-VelevB #logic #named #similarity
EVC: A Validity Checker for the Logic of Equality with Uninterpreted Functions and Memories, Exploiting Positive Equality, and Conservative Transformations (MNV, REB), pp. 235–240.
ICLPICLP-2001-RochaSC #on the
On a Tabling Engine That Can Exploit Or-Parallelism (RR, FMAS, VSC), pp. 43–58.
IJCARIJCAR-2001-HaarslevMT #logic #modelling #pseudo #reasoning
Exploiting Pseudo Models for TBox and ABox Reasoning in Expressive Description Logics (VH, RM, AYT), pp. 61–75.
ICSTSAT-2001-Berre #lookahead #power of
Exploiting the real power of unit propagation lookahead (DLB), pp. 59–80.
DATEDATE-2000-HoffmannK #fault #multi
Exploiting Hierarchy for Multiple Error Correction in Combinational Circuits (DWH, TK), p. 758.
PLDIPLDI-2000-LarsenA #parallel #set
Exploiting superword level parallelism with multimedia instruction sets (SL, SPA), pp. 145–156.
IFLIFL-2000-SargeantKW #functional #parallel #source code
Exploiting Implicit Parallelism in Functional Programs with SLAM (JS, CCK, IW), pp. 19–36.
ICMLICML-2000-DrummondH
Exploiting the Cost (In)sensitivity of Decision Tree Splitting Criteria (CD, RCH), pp. 239–246.
ICPRICPR-v3-2000-DekeyserBPP #2d #image #parametricity #sequence
Super-Resolution from Noisy Image Sequences Exploiting a 2D Parametric Motion Model (FD, PB, PP, ÉP), pp. 3354–3357.
CCCC-2000-UhWWJBC #effectiveness
Techniques for Effectively Exploiting a Zero Overhead Loop Buffer (GRU, YW, DBW, SJ, CB, VC), pp. 157–172.
HPCAHPCA-2000-TorrellasYN #effectiveness #integration #towards
Toward a Cost-Effective DSM Organization That Exploits Processor-Memory Integration (JT, LY, ATN), pp. 15–25.
OSDIOSDI-2000-KimCKNMCK
A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References (JMK, JC, JK, SHN, SLM, YC, CSK), pp. 119–134.
DACDAC-1999-ChoiYLPK #design #embedded
Exploiting Intellectual Properties in ASIP Designs for Embedded DSP Software (HC, JHY, JYL, ICP, CMK), pp. 939–944.
DACDAC-1999-VelevB #pipes and filters #similarity #verification
Exploiting Positive Equality and Partial Non-Consistency in the Formal Verification of Pipelined Microprocessors (MNV, REB), pp. 397–401.
DACDAC-1999-YehCCJ #design
Gate-Level Design Exploiting Dual Supply Voltages for Power-Driven Applications (CWY, MCC, SCC, WBJ), pp. 68–71.
DATEDATE-1999-EijkJMT #algorithm #identification #symmetry
Identification and Exploitation of Symmetries in DSP Algorithms (CAJvE, ETAFJ, BM, AHT), pp. 602–608.
DATEDATE-1999-KallaC #equivalence #performance
Performance Driven Resynthesis by Exploiting Retiming-Induced State Register Equivalence (PK, MJC), pp. 638–642.
DATEDATE-1999-Leupers #code generation #embedded
Exploiting Conditional Instructions in Code Generation for Embedded VLIW Processors (RL), p. 105–?.
DATEDATE-1999-SantosJ #equivalence #on the fly
Exploiting State Equivalence on the Fly while Applying Code Motion and Speculation (LCVdS, JAGJ), p. 609–?.
VLDBVLDB-1999-PitouraC
Exploiting Versions for Handling Updates in Broadcast Disks (EP, PKC), pp. 114–125.
STOCSTOC-1999-CohenK #web
Exploiting Regularities in Web Traffic Patterns for Cache Replacement (EC, HK), pp. 109–118.
HCIHCI-EI-1999-AtkinsonW #approach #database #industrial #information retrieval #legacy #scalability
Exploiting Knowledge in Large Industrial Companies: A Combined Approach to Information Retrieval from Legacy Databases (MA, OMW), pp. 1177–1181.
HCIHCI-EI-1999-FarencP #architecture #performance
An Extensible Architecture to Support the Structuring and the efficient Exploitation of Ergonomic Rules (CF, PAP), pp. 1038–1042.
SACSAC-1999-GollaL #architecture #functional #logic #parallel #scheduling #thread
A Dynamic Scheduling Logic for Exploiting Multiple Functional Units in Single Ship Multithreaded Architectures (PNG, ECL), pp. 466–473.
ICSEICSE-1999-NittoR #architecture #middleware
Exploiting ADLs to Specify Architectural Styles Induced by Middleware Infrastructures (EDN, DSR), pp. 13–22.
ICSEICSE-1999-WoodmanGMHR #programming #smalltalk
Exploiting Smalltalk Modules in a Customizable Programming Environment (MW, RG, MM, SH, HR), pp. 65–74.
CCCC-1999-RubinBR #data type #recursion
Virtual Cache Line: A New Technique to Improve Cache Exploitation for Recursive Data Structures (SR, DB, MR), pp. 259–273.
HPCAHPCA-1999-BrooksM #performance
Dynamically Exploiting Narrow Width Operands to Improve Processor Power and Performance (DMB, MM), pp. 13–22.
HPCAHPCA-1999-HuangL #locality #reuse
Exploiting Basic Block Value Locality with Block Reuse (JH, DJL), pp. 106–114.
HPCAHPCA-1999-InoueKM #logic #memory management
Dynamically Variable Line-Size Cache Exploiting High On-Chip Memory Bandwidth of Merged DRAM/Logic LSIs (KI, KK, KM), pp. 218–222.
HPCAHPCA-1999-RheeL #network #scalability
A Scalable Cache Coherent Scheme Exploiting Wormhole Routing Networks (YR, JL), pp. 223–226.
HPDCHPDC-1999-KoussihAS #clustering #memory management #named
Dodo: A User-level System for Exploiting Idle Memory in Workstation Clusters (SK, AA, SS), pp. 301–308.
LCTESLCTES-1999-UhWWJBC #effectiveness
Effective Exploitation of a Zero Overhead Loop Buffer (GRU, YW, DBW, SJ, CB, VC), pp. 10–19.
CAVCAV-1999-BryantGV #logic #similarity
Exploiting Positive Equality in a Logic of Equality with Uninterpreted Functions (REB, SMG, MNV), pp. 470–482.
DACDAC-1998-UsamiIIKTHATK #design #power management #scalability
Design Methodology of Ultra Low-Power MPEG4 Codec Core Exploiting Voltage Scaling Techniques (KU, MI, TI, MK, MT, MH, HA, TT, TK), pp. 483–488.
DATEDATE-1998-CornoPRV
Exploiting Symbolic Techniques for Partial Scan Flip Flop Selection (FC, PP, MSR, MV), pp. 670–677.
DATEDATE-1998-Scholl #composition #functional #multi
Multi-output Functional Decomposition with Exploitation of Don’t Cares (CS), pp. 743–748.
TACASTACAS-1998-AjamiHI #linear #logic #model checking #symmetry
Exploiting Symmetry in Linear Time Temporal Logic Model Checking: One Step Beyond (KA, SH, JMI), pp. 52–67.
WCREWCRE-1998-FusaroTV #case study #component #named #process
REP — chaRacterising and Exploiting Process component: Results of Experimentation (PF, MT, GV), pp. 20–29.
PLDIPLDI-1998-SastryPS #execution #float #integer
Exploiting Idle Floating-Point Resources for Integer Execution (SSS, SP, JES), pp. 118–129.
EDOCEDOC-1998-GoldschmidtHL #enterprise #java
Exploiting Enterprise JavaBeans in the NIIIP virtual enterprise (AG, PH, JL), pp. 124–135.
SACSAC-1998-MachucaM #data mining #database #mining #precise #relational #set
Enhancing the exploitation of data mining in relational database systems via the rough sets theory including precision variables (FM, MM), pp. 70–73.
ICSEICSE-1998-CugolaNF #distributed #framework
Exploiting an Event-Based Infrastructure to Develop Complex Distributed Systems (GC, EDN, AF), pp. 261–270.
HPCAHPCA-1998-MackenzieKFLLAK #performance
Exploiting Two-Case Delivery for Fast Protected Messaging (KM, JK, MF, WL, VL, AA, MFK), pp. 231–242.
ASEASE-1997-PautlerWQ #simulation #specification
Exploiting Domain-Specific Knowledge to Refine Simulation Specifications (DP, SW, AQ), p. 117–?.
DACDAC-1997-FangW #clustering #design #multi
Multi-Way FPGA Partitioning by Fully Exploiting Design Hierarchy (WJF, ACHW), pp. 518–521.
DATEEDTC-1997-SchollMHM #symmetry
Minimizing ROBDD sizes of incompletely specified Boolean functionsby exploiting strong symmetries (CS, SM, GH, PM), pp. 229–234.
DATEEDTC-1997-WalkerG97a #distributed #independence #simulation
Exploiting temporal independence in distributed preemptive circuit simulation (PW, SG), pp. 378–382.
HTHT-1997-HillHJLHH #hypermedia #navigation
Exploiting Serendipity Amongst Users To Provide Support For Hypertext Navigation (GH, GH, RJ, SL, JH, MH), pp. 212–213.
PLDIPLDI-1997-AmmonsBL #hardware #performance #profiling
Exploiting Hardware Performance Counters with Flow and Context Sensitive Profiling (GA, TB, JRL), pp. 85–96.
HCIHCI-CC-1997-Taylor #re-engineering
Improving Sociotechnical Systems by Exploiting the Remains of Reengineering (JCT), pp. 237–240.
CIKMCIKM-1997-Wolverton #automation #enterprise #modelling
Exploiting Enterprise Models for the Automatic Distribution of Corporate Information (MW), pp. 341–347.
KDDKDD-1997-GalalCH #parallel #scalability
Improving Scalability in a Scientific Discovery System by Exploiting Parallelism (GG, DJC, LBH), pp. 171–174.
SIGIRSIGIR-1997-AnickV #clustering #information retrieval
Exploiting Clustering and Phrases for Context-based Information Retrieval (PGA, SV), pp. 314–323.
TOOLSTOOLS-USA-1997-OzsuGS #framework #modelling #object-oriented
A Framework for Temporal Data Models: Exploiting Object-Oriented Technology (MTÖ, IAG, DS), pp. 16–30.
SOSPSOSP-1997-Steere #latency #nondeterminism #set
Exploiting the Non-Determinism and Asynchrony of Set Iterators to Reduce Aggregate File I/O Latency (DCS), pp. 252–263.
CAVCAV-1997-GyurisS #model checking #on the fly #symmetry
On-the-Fly Model Checking Under Fairness That Exploits Symmetry (VG, APS), pp. 232–243.
CAVCAV-1997-PandeyB #evaluation #symmetry #verification
Exploiting Symmetry When Verifying Transitor-Level Circuits by Symbolic Trajectory Evaluation (MP, REB), pp. 244–255.
ICLPILPS-1997-CorreiaSC #orthogonal #parallel
The SBA: Exploiting Orthogonality in AND-OR Parallel Systems (MEC, FMAS, VSC), pp. 117–131.
DACDAC-1996-SanghaviRBS #memory management #performance
High Performance BDD Package By Exploiting Memory Hiercharchy (JVS, RKR, RKB, ALSV), pp. 635–640.
HTHT-1996-WeissVSNSDG #clustering #hypermedia #named #network
HyPursuit: A Hierarchical Network Search Engine that Exploits Content-Link Hypertext Clustering (RW, BV, MAS, CN, PS, AD, DKG), pp. 180–193.
CSCWCSCW-1996-Dourish #collaboration #consistency #semantics #tool support
Consistency Guarantees: Exploiting Application Semantics for Consistency Management in a Collaboration Toolkit (PD), pp. 268–277.
ICMLICML-1996-GreinerGK
Exploiting the Omission of Irrelevant Data (RG, AJG, AK), pp. 216–224.
ICMLICML-1996-Widmer #incremental #recognition
Recognition and Exploitation of Contextual CLues via Incremental Meta-Learning (GW), pp. 525–533.
KDDKDD-1996-AronisPB #automation
Exploiting Background Knowledge in Automated Discovery (JMA, FJP, BGB), pp. 355–358.
ECOOPECOOP-1996-BullatS #clustering #database #effectiveness
Dynamic Clustering in Object Databases Exploiting Effective Use of Relationships Between Objects (FB, MS), pp. 344–365.
REICRE-1996-Brackett #requirements
Ripe Fruit in Requirements Engineering: Techniques You Can Exploit NOW (JWB), pp. 42–43.
REICRE-1996-ChampionM #analysis #enterprise #requirements
Exploiting an enterprise model during systems’ requirements capture and analysis (REMC, TTM), pp. 208–216.
ASPLOSASPLOS-1996-SaghirCL
Exploiting Dual Data-Memory Banks in Digital Signal Processors (MARS, PC, CGL), pp. 234–243.
HPDCHPDC-1996-KumaranQ #automation #network #parallel
Automatic Exploitation of Dual Level Parallelism on a Network of Multiprocessors (SK, MJQ), pp. 616–625.
CAVCAV-1996-MillerK
Saving Space by Fully Exploiting Invisible Transitions (HM, SK), pp. 336–347.
DACDAC-1995-FarrahiTS #memory management #segmentation
Memory Segmentation to Exploit Sleep Mode Operation (AHF, GET, MS), pp. 36–41.
KDDKDD-1995-DeogunRS #approximate #set
Exploiting Upper Approximation in the Rough Set Methodology (JSD, VVR, HS), pp. 69–74.
KDDKDD-1995-LeeOQ #information management #visualisation
Exploiting Visualization in Knowledge Discovery (HYL, HLO, LHQ), pp. 198–203.
PPDPPLILP-1995-FreireHSW #parallel
Exploiting Parallelism in Tabled Evaluations (JF, RH, TS, DSW), pp. 115–132.
SOSPSOSP-1995-Harchol-BalterD #process
Exploiting Process Lifetime Distributions for Dynamic Load Balancing (MHB, ABD), p. 236.
SOSPSOSP-1995-MummertES #mobile
Exploiting Weak Connectivity for Mobile File Access (LBM, ME, MS), pp. 143–155.
VLDBVLDB-1994-HasanM #algorithm #optimisation #parallel #pipes and filters #trade-off
Optimization Algorithms for Exploiting the Parallelism-Communication Tradeoff in Pipelined Parallelism (WH, RM), pp. 36–47.
STOCSTOC-1994-BrewerCL #random #scalability
Scalable expanders: exploiting hierarchical random wiring (EAB, FTC, TL), pp. 144–152.
ICALPICALP-1994-FixS #reasoning #source code
Reasoning about Programs by Exploiting the Environment (LF, FBS), pp. 328–339.
KRKR-1994-Schubert #information management #natural language #reasoning #representation
Exploiting Natural Language for Knowledge Representation and Reasoning (Abstract) (LKS), pp. 650–651.
FSEFSE-1994-GarlanAO #architecture #design
Exploiting Style in Architectural Design Environments (DG, RA, JO), pp. 175–188.
HPDCHPDC-1994-BeckerW #dependence
Exploiting Inter-Task Dependencies for Dynamic Load Balancing (WB, GW), pp. 157–165.
DACDAC-1993-HuD #dependence #functional
Reducing BDD Size by Exploiting Functional Dependencies (AJH, DLD), pp. 266–271.
VLDBVLDB-1993-LometS #database
Exploiting A History Database for Backup (DBL, BS), pp. 380–390.
CHIINTERCHI-1993-HaakeH
Take CoVer: exploiting version support in cooperative systems (AH, JMH), pp. 406–413.
LOPSTRLOPSTR-1993-OlmedillaBH #automation #independence
Automatic Exploitation of Non-Determinate Independent And-Parallelism in the Basic Andorra Model (MO, FB, MVH), pp. 177–195.
CAVCAV-1993-ClarkeFJ #logic #model checking #symmetry
Exploiting Symmetry In Temporal Logic Model Checking (EMC, TF, SJ), pp. 450–462.
ISSTAISSTA-1993-Miller #testing
Exploitation of Software Test Technology (Abstract) (EFM), p. 159.
SIGMODSIGMOD-1992-Hong #parallel
Exploiting Inter-Operation Parallelism in XPRS (WH), pp. 19–28.
ICLPJICSLP-1992-Shen #prolog
Exploiting Dependent And-Parallelism in Prolog: The Dynamic Dependent And-Parallel Scheme (DDAS) (KS), pp. 717–731.
ICLPJICSLP-1992-Szeredi #optimisation #problem
Exploiting Or-Parallelism in Optimisation Problems (PS), pp. 703–716.
AdaEuropeAdaEurope-1991-ColombiniTP #ada #realtime
Ada as High Level Language for Real-Time Systems Exploiting RDBMS Techniques (CC, AdT, RP), pp. 384–393.
ICMLML-1991-MahadevanC #architecture #learning #scalability
Scaling Reinforcement Learning to Robotics by Exploiting the Subsumption Architecture (SM, JC), pp. 328–332.
PPoPPPPoPP-1991-CostaWY #named #parallel #prolog
Andorra-I: A Parallel Prolog System that Transparently Exploits both And- and Or-Parallelism (VSC, DHDW, RY), pp. 83–93.
PPoPPPPoPP-1991-JuC #parallel
Exploitation of APL Data Parallelism on a Shared-memory MIMD Machine (DCJ, WMC), pp. 61–72.
PPoPPPPoPP-1991-LaRoweWE #memory management #multi #operating system
Exploiting Operating System Support for Dynamic Page Placement on a NUMA Shared Memory Multiprocessor (RPLJ, JTW, CSE), pp. 122–132.
PPoPPPPoPP-1990-Gupta #parallel
Employing Register Channels for the Exploitation of Instruction Level Parallelism (RG), pp. 118–127.
PPoPPPPoPP-1990-TickI #logic programming #parallel #programming language
Programming Techniques for Efficiently Exploiting Parallelism in Logic Programming Languages (ET, NI), pp. 31–39.
ICLPCLP-1990-HermenegildoG90 #independence #performance #prolog
&-Prolog and its Performance: Exploiting Independent And-Parallelism (MVH, KJG), pp. 253–268.
DACDAC-1989-BolsensRCM #analysis #behaviour #debugging #logic
Electrical Debugging of Synchronous MOS VLSI Circuits Exploiting Analysis of the Intended Logic Behaviour (IB, WDR, LJMC, HDM), pp. 513–518.
SIGMODSIGMOD-1989-ChangK #clustering #effectiveness #inheritance #object-oriented #semantics
Exploiting Inheritance and Structure Semantics for Effective Clustering and Buffering in an Object-Oriented DBMS (EEC, RHK), pp. 348–357.
SOSPSOSP-1989-EdwardsM #file system
Exploiting Read-Mostly Workloads in The FileNet File System (DAE, MSM), pp. 58–70.
ICLPNACLP-1989-SinghalP #how #parallel #question #unification
Unification Parallelism: How Much Can We Exploit? (AS, YNP), pp. 1135–1147.
PPoPPPPEALS-1988-GuptaT #parallel #runtime
Exploiting Variable Grain Parallelism at Runtime (AG, AT), pp. 212–221.
CADECADE-1988-ButlerK #deduction #parallel #problem #prototype
Exploitation of Parallelism in Prototypical Deduction Problems (RB, NTK), pp. 333–343.
ICLPJICSCP-1988-BoscoCM88 #functional #logic #power of #programming
Exploiting the Full Power of Logic Plus Functional Programming (PGB, CC, CM), pp. 3–17.
SOSPSOSP-1987-BirmanJ #distributed
Exploiting Virtual Synchrony in Distributed Systems (KPB, TAJ), pp. 123–138.
SOSPSOSP-1987-FinlaysonC
Log Files: An Extended File Service Exploiting Write-Once Storage (RSF, DRC), pp. 139–148.
DACDAC-1986-Frank #parallel #simulation
Exploiting parallelism in a switch-level simulation machine (EHF), pp. 20–26.
SIGIRSIGIR-1986-Bookstein #documentation #performance #self
Performance of Self-Taught Documents: Exploiting Co-Relevance Structure in a Document Collection (AB), pp. 244–248.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.