BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
time (13)
path (13)
posit (10)
share (9)
analysi (8)

Stem fals$ (all stems)

46 papers:

STOCSTOC-2015-BackursI #distance #edit distance
Edit Distance Cannot Be Computed in Strongly Subquadratic Time (unless SETH is false) (AB, PI), pp. 51–58.
FMFM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis #using
Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
ICSEICSE-v2-2015-HerzigN #detection #empirical #using
Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
ICPRICPR-2014-BalntasTM #detection
Improving Object Tracking with Voting from False Positive Detections (VB, LT, KM), pp. 1928–1933.
PPoPPPPoPP-2014-LiuTHB #detection #named #predict
PREDATOR: predictive false sharing detection (TL, CT, ZH, EDB), pp. 3–14.
ASEASE-2012-ThungLLJRD #debugging #detection #empirical #fault #tool support #what
To what extent could we detect field defects? an empirical study of false negatives in static bug finding tools (FT, L, DL, LJ, FR, PTD), pp. 50–59.
ICSEICSE-2012-PradelG #automation #debugging #detection #generative #mining #specification #testing
Leveraging test generation and specification mining for automated bug detection without false positives (MP, TRG), pp. 288–298.
ISSTAISSTA-2012-GrossFZ #search-based #testing
Search-based system testing: high coverage, no false alarms (FG, GF, AZ), pp. 67–77.
VLDBVLDB-2012-LiuZW11 #mining
Controlling False Positives in Association Rule Mining (GL, HZ, LW), pp. 145–156.
OOPSLAOOPSLA-2011-LiuB #automation #detection #named #precise
SHERIFF: precise detection and automatic mitigation of false sharing (TL, EDB), pp. 3–18.
ASPLOSASPLOS-2011-HayashizakiWISN #performance
Improving the performance of trace-based systems by false loop filtering (HH, PW, HI, MJS, TN), pp. 405–418.
DACDAC-2010-Coudert #algorithm #performance #verification
An efficient algorithm to verify generalized false paths (OC), pp. 188–193.
ICGTICGT-2010-Esparza #concurrent #tool support
A False History of True Concurrency: From Petri to Tools (JE), pp. 1–2.
DACDAC-2009-TsaiH
A false-path aware formal static timing analyzer considering simultaneous input transitions (ST, CYH), pp. 25–30.
TACASTACAS-2009-GouesW #mining #specification
Specification Mining with Few False Positives (CLG, WW), pp. 292–306.
ASEASE-2008-PostSKG #abstract interpretation #bound #model checking
Reducing False Positives by Combining Abstract Interpretation and Bounded Model Checking (HP, CS, AK, TG), pp. 188–197.
STOCSTOC-2008-LovettMS
Inverse conjecture for the gowers norm is false (SL, RM, AS), pp. 547–556.
KDDKDD-2008-WuLCC #learning #symmetry
Asymmetric support vector machines: low false-positive learning under the user tolerance (SHW, KPL, CMC, MSC), pp. 749–757.
IFMIFM-2007-CalameIPS #debugging
Bug Hunting with False Negatives (JRC, NI, JvdP, NS), pp. 98–117.
HCIDHM-2007-LiWW
The Effects of the False Vocal Fold Gaps in a Model of the Larynx on Pressures Distributions and Flows (SL, MW, SW), pp. 147–156.
DATEDATE-2006-FeyGD #verification
Avoiding false negatives in formal verification for protocol-driven blocks (GF, DG, RD), pp. 1225–1226.
ICSTSAT-2006-BuningZ #quantifier
Minimal False Quantified Boolean Formulas (HKB, XZ), pp. 339–352.
SASSAS-2005-JungKSY #analysis #c #statistics
Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis (YJ, JK, JS, KY), pp. 203–217.
KDDKDD-2005-HershkopS #email #modelling #reduction
Combining email models for false positive reduction (SH, SJS), pp. 98–107.
DATEDATE-v2-2004-GlebovGZOPB #analysis
False-Noise Analysis for Domino Circuits (AG, SG, VZ, CO, RP, MRB), pp. 784–789.
DATEDATE-v2-2004-RanKWM #analysis
Eliminating False Positives in Crosstalk Noise Analysis (YR, AK, YW, MMS), pp. 1192–1197.
VLDBVLDB-2004-YuCLZ #data type #mining #transaction
False Positive or False Negative: Mining Frequent Itemsets from High Speed Transactional Data Streams (JXY, ZC, HL, AZ), pp. 204–215.
DACDAC-2002-LiouKWC #analysis #performance #statistics #testing #validation
False-path-aware statistical timing analysis and efficient path selection for delay testing and timing validation (JJL, AK, LCW, KTC), pp. 566–569.
DACDAC-2002-ZengAA #identification #using
False timing path identification using ATPG techniques and delay-based information (JZ, MSA, JAA), pp. 562–565.
DATEDATE-2002-ArrigoniDPLW #scheduling
False Path Elimination in Quasi-Static Scheduling (GA, LD, CP, LL, YW), pp. 964–970.
DACDAC-2001-ArunachalamBP #analysis #interactive
False Coupling Interactions in Static Timing Analysis (RA, RDB, LTP), pp. 726–731.
DATEDATE-2001-ZengABA #identification
Full chip false timing path identification: applications to the PowerPCTM microprocessors (JZ, MSA, JB, JAA), pp. 514–519.
CAVCAV-2001-MoondanosSHK #divide and conquer #equivalence #logic #named #verification
CLEVER: Divide and Conquer Combinational Logic Equivalence VERification with False Negative Elimination (JM, CJHS, ZH, DK), pp. 131–143.
DACDAC-2000-BlaauwPD #graph
Removing user specified false paths from timing graphs (DB, RP, AD), pp. 270–273.
DACDAC-1999-RaimiA #detection
Detecting False Timing Paths: Experiments on PowerPC Microprocessors (RR, JAA), pp. 737–741.
SACSAC-1999-JinH #array #clustering #problem
False Sharing Problems in Cluster-Based Disk Arrays (HJ, KH), pp. 461–465.
DACDAC-1997-KukimotoB #analysis #detection
Exact Required Time Analysis via False Path Detection (YK, RKB), pp. 220–225.
PPoPPPPoPP-1997-AmzaCRZ #distributed #memory management #trade-off
Trade-offs Between False Sharing and Aggregation in Software Distributed Shared Memory (CA, ALC, KR, WZ), pp. 90–99.
STOCSTOC-1996-KushilevitzLO #communication #complexity
The Linear-Array Conjecture in Communication Complexity is False (EK, NL, RO), pp. 1–10.
HPDCHPDC-1996-FreehA #distributed #memory management
Dynamically Controlling False Sharing in Distributed Shared Memory (VWF, GRA), pp. 403–411.
ICDARICDAR-v1-1995-LiangLY #query
False hits of tri-syllabic queries in a Chinese signature file (TL, SYL, WPY), pp. 159–162.
PPoPPPPoPP-1995-JeremiassenE #data transformation #memory management #multi
Reducing False Sharing on Shared Memory Multiprocessors through Compile Time Data Transformations (TEJ, SJE), pp. 179–188.
DACDAC-1993-HuangPS #approach #approximate #heuristic #polynomial #problem
A Polynomial-Time Heuristic Approach to Approximate a Solution to the False Path Problem (STH, TMP, JMS), pp. 118–122.
DACDAC-1992-ChenDC
Circuit Enhancement by Eliminating Long False Paths (HCC, DHCD, SWC), pp. 249–252.
PLDIPLDI-1992-PughW #data flow #dependence #using
Eliminating False Data Dependences using the Omega Test (WP, DW), pp. 140–151.
DACDAC-1989-DuYG #analysis #on the #problem
On the General False Path Problem in Timing Analysis (DHCD, SHY, SG), pp. 555–560.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.