764 papers:
- DAC-2015-ChangHLW #analysis #encoding #functional #named
- TA-FTA: transition-aware functional timing analysis with a four-valued encoding (JCCC, RHMH, LYZL, CHPW), p. 6.
- DAC-2015-TziantzioulisGF #correlation #fault #float #integer #named
- b-HiVE: a bit-level history-based error model with value correlation for voltage-scaled integer and floating point units (GT, AMG, SMF, NH, SOM, SP), p. 6.
- DRR-2015-XuS
- Missing value imputation: with application to handwriting data (ZX, SNS).
- HT-2015-JainKJ #network #online #social
- Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks (PJ, PK, AJ), pp. 247–255.
- VLDB-2015-AhmadK #distributed
- Compaction Management in Distributed Key-Value Datastores (MYA, BK), pp. 850–861.
- VLDB-2015-MullerG #abstract interpretation #sql
- Provenance for SQL through Abstract Interpretation: Value-less, but Worthwhile (TM, TG), pp. 1872–1883.
- VLDB-2015-ZhangWYGLZ #in memory #named #throughput
- Mega-KV: A Case for GPUs to Maximize the Throughput of In-Memory Key-Value Stores (KZ, KW, YY, LG, RL, XZ), pp. 1226–1237.
- TACAS-2015-CassezMPS #composition #contest #named #refinement
- Perentie: Modular Trace Refinement and Selective Value Tracking — (Competition Contribution) (FC, TM, EP, NS), pp. 439–442.
- TACAS-2015-ChistikovDM #approximate #estimation #probability #smt #source code
- Approximate Counting in SMT and Value Estimation for Probabilistic Programs (DVC, RD, RM), pp. 320–334.
- TACAS-2015-KumarSK #concept #scalability #slicing
- Value Slice: A New Slicing Concept for Scalable Property Checking (SK, AS, UPK), pp. 101–115.
- SANER-2015-MattsenWS #abstract domain #analysis
- A non-convex abstract domain for the value analysis of binaries (SM, AW, SS), pp. 271–280.
- SCAM-2015-BanerjeeMS #equivalence #framework #validation
- A translation validation framework for symbolic value propagation based equivalence checking of FSMDAs (KB, CAM, DS), pp. 247–252.
- STOC-2015-BravermanG #game studies #parallel
- Small Value Parallel Repetition for General Games (MB, AG), pp. 335–340.
- ICALP-v1-2015-FullaZ #constraints #infinity
- A Galois Connection for Valued Constraint Languages of Infinite Size (PF, SZ), pp. 517–528.
- ICALP-v1-2015-HuangL #approximate #combinator #optimisation #probability #problem
- Approximating the Expected Values for Combinatorial Optimization Problems over Stochastic Points (LH, JL), pp. 910–921.
- ICALP-v1-2015-KozikO #algebra #constraints #problem
- Algebraic Properties of Valued Constraint Satisfaction Problem (MK, JO), pp. 846–858.
- ICALP-v1-2015-ThapperZ
- Sherali-Adams Relaxations for Valued CSPs (JT, SZ), pp. 1058–1069.
- CHI-2015-BowserHMC #experience #on the
- On Vintage Values: The Experience of Secondhand Fashion Reacquisition (AEB, OLH, EFM, EFC), pp. 897–906.
- CHI-2015-ShihBHC
- Unequal Time for Unequal Value: Implications of Differing Motivations for Participation in Timebanking (PCS, VB, KH, JMC), pp. 1075–1084.
- CSCW-2015-CarrollB #design #peer-to-peer
- Creating Value Together: The Emerging Design Space of Peer-to-Peer Currency and Exchange (JMC, VB), pp. 1500–1510.
- CSCW-2015-FerreiraPS #social
- Spending Time with Money: From Shared Values to Social Connectivity (JF, MJP, SS), pp. 1222–1234.
- CSCW-2015-MarshallS #facebook #persistent
- Exploring the Ownership and Persistent Value of Facebook Content (CCM, FMSI), pp. 712–723.
- CSCW-2015-WangWWSZZZ #collaboration
- Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms (GW, TW, BW, DS, ZZ, HZ, BYZ), pp. 17–30.
- CSCW-2015-ZyskowskiMBGK #challenge #comprehension #people
- Accessible Crowdwork?: Understanding the Value in and Challenge of Microtask Employment for People with Disabilities (KZ, MRM, JPB, MLG, SKK), pp. 1682–1693.
- DUXU-IXD-2015-SuzukiCTO
- Hidden Presence: Sensing Occupancy and Extracting Value from Occupancy Data (LS, PC, TT, GCO), pp. 412–424.
- HIMI-IKC-2015-KimitaMMNIS #education #learning
- Learning State Model for Value Co-Creative Education Services (KK, KM, SM, YN, TI, YS), pp. 341–349.
- HIMI-IKD-2015-ZhangA #game studies #mobile #research
- The Research of the Influence of Customer Perceived Value to Customer Satisfaction in Mobile Games (KZ, YA), pp. 678–687.
- ICEIS-v2-2015-BaldassarreBCV #metric
- Tracking Project Progress with Earned Value Management Metrics — A Real Case (MTB, NB, DC, GV), pp. 502–508.
- ICEIS-v2-2015-Boon-itt #quality #self
- Managing Service Quality of Self-Service Technologies to Enhance e-Satisfaction in Digital Banking Context — The Roles of Technology Readiness and Perceived Value (SBi), pp. 602–609.
- ICEIS-v3-2015-BagheriKT #information management #network #social
- Business-IT Alignment in PSS Value Networks — Linking Customer Knowledge Management to Social Customer Relationship Management (SB, RJK, JJMT), pp. 249–257.
- ICML-2015-KimXVS #process
- Manifold-valued Dirichlet Processes (HJK, JX, BCV, VS), pp. 1199–1208.
- ICML-2015-SchaulHGS #approximate
- Universal Value Function Approximators (TS, DH, KG, DS), pp. 1312–1320.
- KDD-2015-DevooghtKM #matrix
- Dynamic Matrix Factorization with Priors on Unknown Values (RD, NK, AM), pp. 189–198.
- MLDM-2015-IshayH #algorithm #clustering #integration #novel
- A Novel Algorithm for the Integration of the Imputation of Missing Values and Clustering (RBI, MH), pp. 115–129.
- MLDM-2015-KarkkainenS #analysis #component #robust
- Robust Principal Component Analysis of Data with Missing Values (TK, MS), pp. 140–154.
- SEKE-2015-MatturroFR #agile #bibliography
- Soft Skills in Scrum Teams. A survey of the most valued to have by Product Owners and Scrum Masters (GM, CF, FR), pp. 42–45.
- SIGIR-2015-Paik #information retrieval #probability
- A Probabilistic Model for Information Retrieval Based on Maximum Value Distribution (JHP), pp. 585–594.
- SIGIR-2015-SpirinKKSI #metric #optimisation #quality #tuple
- Relevance-aware Filtering of Tuples Sorted by an Attribute Value via Direct Optimization of Search Quality Metrics (NVS, MK, JK, YVS, PAI), pp. 979–982.
- MoDELS-2015-AhmarGDP #communication #modelling #uml #visual notation
- Enhancing the communication value of UML models with graphical layers (YEA, SG, CD, XLP), pp. 64–69.
- PPDP-2015-RondogiannisT #logic programming #using
- Expressing preferences in logic programming using an infinite-valued logic (PR, AT), pp. 208–219.
- REFSQ-2015-HarbersDN #process #requirements
- Embedding Stakeholder Values in the Requirements Engineering Process (MH, CD, MAN), pp. 318–332.
- SAC-2015-MinHJCH #distributed #performance #process #scalability
- An efficient backup-recovery technique to process large data in distributed key-value store (DM, TH, JJ, YC, JH), pp. 2072–2074.
- SAC-2015-PapeBH #adaptation #data type #execution #optimisation #performance
- Adaptive just-in-time value class optimization: transparent data structure inlining for fast execution (TP, CFB, RH), pp. 1970–1977.
- SAC-2015-RafailidisM #image #parallel #similarity
- Parallel similarity search based on the dimensions value cardinalities of image descriptor vectors (DR, YM), pp. 1023–1030.
- ESEC-FSE-2015-GhaisasMBGKV #automation #security #towards
- Towards automating the security compliance value chain (SG, MM, BB, AG, RK, HMV), pp. 1014–1017.
- ESEC-FSE-2015-SenNGC #execution #multi #named #summary #symbolic computation #using
- MultiSE: multi-path symbolic execution using value summaries (KS, GCN, LG, WC), pp. 842–853.
- ICSE-v2-2015-BarnBR #on the #re-engineering
- On the Role of Value Sensitive Concerns in Software Engineering Practice (BSB, RB, FR), pp. 497–500.
- SPLC-2015-0002Z #agile #approach
- Lean variation management: increasing business value with a diversified approach (MB, BZ), p. 385.
- HPCA-2015-PeraisS #effectiveness #framework #named #predict
- BeBoP: A cost effective predictor infrastructure for superscalar value prediction (AP, AS), pp. 13–25.
- SOSP-2015-TsaiZRJZP #file system #how
- How to get more value from your file system directory cache (CcT, YZ, JR, YJ, TZ, DEP), pp. 441–456.
- CSL-2015-DawarW #finite
- A Definability Dichotomy for Finite Valued CSPs (AD, PW), pp. 60–77.
- ICST-2015-BaiSP #fault #named #using
- NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model (ZB, GS, AP), pp. 1–10.
- TLCA-2015-GuerrieriPR #call-by #standard #λ-calculus
- Standardization of a Call-By-Value λ-Calculus (GG, LP, SRDR), pp. 211–225.
- VMCAI-2015-Ferrara0N #automation
- Automatic Inference of Heap Properties Exploiting Value Domains (PF, PM, MN), pp. 393–411.
- DAC-2014-GebalaMMRT #on the #using
- On Using Implied Values in EDT-based Test Compression (MG, GM, NM, JR, JT), p. 6.
- DATE-2014-DuanW
- Exploiting narrow-width values for improving non-volatile cache lifetime (GD, SW), pp. 1–4.
- DATE-2014-SongDY #analysis #bound #multi #order #parametricity #performance #reduction
- Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
- HT-2014-TangHL #social #social media #trust
- Is distrust the negation of trust?: the value of distrust in social media (JT, XH, HL), pp. 148–157.
- ESOP-2014-CrubilleL #bisimulation #call-by #on the #probability #λ-calculus
- On Probabilistic Applicative Bisimulation and Call-by-Value λ-Calculi (RC, UDL), pp. 209–228.
- ESOP-2014-UrbanM #abstract domain #ranking
- An Abstract Domain to Infer Ordinal-Valued Ranking Functions (CU, AM), pp. 412–431.
- FoSSaCS-2014-CarraroG #call-by #semantics
- A Semantical and Operational Account of Call-by-Value Solvability (AC, GG), pp. 103–118.
- FoSSaCS-2014-Tsukada0 #call-by #complexity #model checking #source code
- Complexity of Model-Checking Call-by-Value Programs (TT, NK), pp. 180–194.
- TACAS-2014-LoweMW #analysis #contest
- CPAchecker with Sequential Combination of Explicit-Value Analyses and Predicate Analyses — (Competition Contribution) (SL, MUM, PW), pp. 392–394.
- SAS-2014-ChenLMKW #abstract domain #constraints
- An Abstract Domain to Infer Octagonal Constraints with Absolute Value (LC, JL, AM, DK, JW), pp. 101–117.
- CHI-2014-DurrantKR
- Human values in curating a human rights media archive (AD, DSK, SR), pp. 2685–2694.
- CHI-2014-HsiehCMN #comprehension #what
- You read what you value: understanding personal values and reading interests (GH, JC, JM, JN), pp. 983–986.
- CHI-2014-VoidaDHM #logic
- Shared values/conflicting logics: working around e-government systems (AV, LD, GRH, MM), pp. 3583–3592.
- CHI-2014-ZhaoL #comprehension #social #social media
- Curation through use: understanding the personal value of social media (XZ, SEL), pp. 2431–2440.
- CSCW-2014-ChenHMN #comprehension #social #social media #word
- Understanding individuals’ personal values from social media word use (JC, GH, JM, JN), pp. 405–414.
- CSCW-2014-LivingstonGMB #how
- How players value their characters in world of warcraft (IJL, CG, RLM, MB), pp. 1333–1343.
- CSCW-2014-ShiltonKF #how #social
- How to see values in social computing: methods for studying values dimensions (KS, JAK, KRF), pp. 426–435.
- DUXU-DP-2014-HamachiTN #integration #process #quality
- Activities to Improve System Integration and Service Quality and Add Additional Values — Reducing the Cost in Applying Human-Centered-Design Process (RH, IT, HN), pp. 32–38.
- DUXU-ELAS-2014-KamiyaKASNMF #design #using
- Timeaxis Design of a Service System Growing Values of Mobility Using the M-V Model (KK, AK, JA, KS, HN, YM, SF), pp. 281–292.
- HCI-AS-2014-KwiatkowskaSL #design
- Design Artefacts as Business Decision Prompts: Tackling the Design and Business Values Gap (JK, AS, DL), pp. 721–730.
- HCI-TMT-2014-PereiraB #comprehension #concept #design
- Value Pie: A Culturally Informed Conceptual Scheme for Understanding Values in Design (RP, MCCB), pp. 122–133.
- HIMI-AS-2014-MatsuiHKA #behaviour #case study #education #learning
- A Study on Exploration of Relationships between Behaviors and Mental States of Learners for Value Co-creative Education and Learning Environment (TM, YH, KK, TA), pp. 69–79.
- HIMI-AS-2014-Sakurai #education
- The Value Improvement in Education Service by Grasping the Value Acceptance State with ICT Utilized Education Environment (YS), pp. 90–98.
- HIMI-DE-2014-BonacinRHPB #aspect-oriented #collaboration #comprehension #social
- Understanding Pragmatic Aspects with Social Values in Web-Mediated Collaborative Systems (RB, JCdR, HHH, RP, MCCB), pp. 471–482.
- HIMI-DE-2014-ChangT #case study
- A Study of the Factors Affecting Product Values and Preferences-Using Vacuum Cleaner as an Example (WcC, HyT), pp. 561–571.
- ICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process
- Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
- ICEIS-v3-2014-BenaijaK #risk management
- Trade off Between Risk Management, Value Creation and Strategic Alignment in Project Portfolio Management (KB, LK), pp. 447–452.
- ICEIS-v3-2014-SinghJIS #architecture #enterprise #modelling
- Modeling Value Creation with Enterprise Architecture (PMS, HJ, MEI, MvS), pp. 343–351.
- CIKM-2014-TakayamaTIOFC #detection #probability
- A Word-Scale Probabilistic Latent Variable Model for Detecting Human Values (YT, YT, EI, DWO, KRF, ASC), pp. 1489–1498.
- ICML-c1-2014-MannM #approximate #policy #scalability
- Scaling Up Approximate Value Iteration with Options: Better Policies with Fewer Iterations (TAM, SM), pp. 127–135.
- ICPR-2014-GhoraiC #algorithm #composition #higher-order #image #using
- An Image Inpainting Algorithm Using Higher Order Singular Value Decomposition (MG, BC), pp. 2867–2872.
- KDD-2014-AnagnostopoulosT #big data #scalability
- Scaling out big data missing value imputations: pythia vs. godzilla (CA, PT), pp. 651–660.
- KDD-2014-ChenC #incremental #named #rank #set
- LWI-SVD: low-rank, windowed, incremental singular value decompositions on time-evolving data sets (XC, KSC), pp. 987–996.
- KMIS-2014-DaviesB #security
- Determining the Value of Information Security Investments — A Decision Support System (HLD, AJCB), pp. 426–433.
- KR-2014-BartholomewL #modelling #multi
- Stable Models of Multi-Valued Formulas: Partial versus Total Functions (MB, JL).
- KR-2014-BorgwardtDP #decidability #logic
- Decidable Gödel Description Logics without the Finitely-Valued Model Property (SB, FD, RP).
- MLDM-2014-UtkinZC #classification #data-driven #database #robust
- A Robust One-Class Classification Model with Interval-Valued Data Based on Belief Functions and Minimax Strategy (LVU, YAZ, AIC), pp. 107–118.
- SEKE-2014-SouzaRS #empirical #predict #using
- A Proposal for the Improvement of Project’s Cost Predictability using Earned Value Management and Historical Data of Cost — An Empirical Study (ADdS, ARR, DCSdS), pp. 729–734.
- PPDP-J-2012-LagoP14 #call-by #dependent type #linear
- Linear dependent types in a call-by-value scenario (UDL, BP), pp. 77–100.
- RE-2014-TohonenKM #case study #game studies
- Evaluating the business value of information technology: Case study on game management system (HT, MK, TM), pp. 283–292.
- SAC-2014-JangKCH #replication
- Impacts of delayed replication on the key-value store (MJ, WK, YC, JH), pp. 1757–1758.
- SAC-2014-LoulergueRTLH #parallel #problem
- Formal derivation and extraction of a parallel program for the all nearest smaller values problem (FL, SR, JT, JL, ZH), pp. 1577–1584.
- SAC-2014-NabeezathP #algorithm #detection #performance
- Global value numbering for redundancy detection: a simple and efficient algorithm (SN, VP), pp. 1609–1611.
- ICSE-2014-LetierSB #architecture #nondeterminism #requirements
- Uncertainty, risk, and information value in software requirements and architecture (EL, DS, ETB), pp. 883–894.
- ASPLOS-2014-GutierrezCGDCM #3d #design #physics
- Integrated 3D-stacked server designs for increasing physical density of key-value stores (AG, MC, BG, RGD, LC, TNM), pp. 485–498.
- CGO-2014-YeSX #analysis #detection
- Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
- HPCA-2014-PeraisS
- Practical data value speculation for future high-end processors (AP, AS), pp. 428–439.
- LICS-CSL-2014-RouxP #game studies #infinity
- Infinite sequential games with real-valued payoffs (SLR, AP), p. 10.
- RTA-TLCA-2014-Schmidt-SchaussS #call-by #λ-calculus
- Applicative May- and Should-Simulation in the Call-by-Value λ Calculus with AMB (MSS, DS), pp. 379–394.
- VMCAI-2014-Ferrara #abstract interpretation #analysis
- Generic Combination of Heap and Value Analyses in Abstract Interpretation (PF), pp. 302–321.
- VMCAI-2014-Mine #abstract interpretation #analysis #relational #thread
- Relational Thread-Modular Static Value Analysis by Abstract Interpretation (AM), pp. 39–58.
- VMCAI-2014-SchwarzSVA #analysis #precise #source code
- Precise Analysis of Value-Dependent Synchronization in Priority Scheduled Programs (MDS, HS, VV, KA), pp. 21–38.
- DAC-2013-StratigopoulosFCM #estimation #metric #multi #statistics #using
- Multidimensional analog test metrics estimation using extreme value theory and statistical blockade (HGDS, PF, YC, FM), p. 7.
- DATE-2013-CevreroEAILBS #estimation #performance
- Fast and accurate BER estimation methodology for I/O links based on extreme value theory (AC, NEE, CA, PI, YL, AB, GIS), pp. 503–508.
- DATE-2013-HillebrechtKEWB #generative
- Accurate QBF-based test pattern generation in presence of unknown values (SH, MAK, DE, HJW, BB), pp. 436–441.
- DRR-2013-KumarPR13a #composition #documentation #evaluation #using
- Evaluation of document binarization using eigen value decomposition (DK, MNAP, AGR).
- DRR-2013-LundKR #multi
- Combining multiple thresholding binarization values to improve OCR output (WBL, DJK, EKR).
- ICDAR-2013-SethN
- Segmenting Tables via Indexing of Value Cells by Table Headers (SCS, GN), pp. 887–891.
- SIGMOD-2013-ArocenaGM
- Value invention in data exchange (PCA, BG, RJM), pp. 157–168.
- SIGMOD-2013-CaiVPAHJ #markov #simulation #using
- Simulation of database-valued markov chains using SimSQL (ZC, ZV, LLP, SA, PJH, CMJ), pp. 637–648.
- VLDB-2013-Dey #scalability #transaction
- Scalable Transactions across Heterogeneous NoSQL Key-Value Data Stores (AD), pp. 1434–1439.
- VLDB-2013-Franceschini #approach #big data #how #open source
- How to maximize the value of big data with the open source SpagoBI suite through a comprehensive approach (MF), pp. 1170–1171.
- FoSSaCS-2013-ChurchillM #bisimulation #composition
- Modular Bisimulation Theory for Computations and Values (MC, PDM), pp. 97–112.
- TACAS-2013-Lowe #analysis #contest
- CPAchecker with Explicit-Value Analysis Based on CEGAR and Interpolation — (Competition Contribution) (SL), pp. 610–612.
- SAS-2013-BlazyLMP #abstract interpretation #analysis #c #verification
- Formal Verification of a C Value Analysis Based on Abstract Interpretation (SB, VL, AM, DP), pp. 324–344.
- STOC-2013-ThapperZ #complexity
- The complexity of finite-valued CSPs (JT, SZ), pp. 695–704.
- ICALP-v1-2013-Kolmogorov #linear #power of #programming
- The Power of Linear Programming for Finite-Valued CSPs: A Constructive Characterization (VK), pp. 625–636.
- LATA-2013-HashimotoSISF #bottom-up #transducer
- Determinacy and Subsumption for Single-Valued Bottom-Up Tree Transducers (KH, RS, YI, HS, TF), pp. 335–346.
- CHI-2013-GulottaOFF #legacy
- Digital artifacts as legacy: exploring the lifespan and value of digital data (RG, WO, JF, HF), pp. 1813–1822.
- CHI-2013-MatthewsWBSMEZL #community #enterprise #online
- Community insights: helping community leaders enhance the value of enterprise online communities (TM, SW, HB, BAS, MM, KE, MXZ, TL), pp. 513–522.
- CHI-2013-YooHWHF #co-evolution #design #evolution
- A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts (DY, AH, JPW, DGH, BF), pp. 419–428.
- HCI-AS-2013-HuaG #comprehension #difference #evaluation #predict #protocol #safety #usability
- Usability Evaluation of a Voluntary Patient Safety Reporting System: Understanding the Difference between Predicted and Observed Time Values by Retrospective Think-Aloud Protocols (LH, YG), pp. 94–100.
- HCI-III-2013-ShojiOKO #case study
- A Study on Combinative Value Creation in Songs Selection (HS, JO, KK, AO), pp. 372–380.
- HIMI-LCCB-2013-GuoZSP #axiom #usability
- Value Added by the Axiomatic Usability Method for Evaluating Consumer Electronics (YG, YZ, GS, RWP), pp. 457–466.
- OCSC-2013-HallCW #approach #community #predict
- Well-Being’s Predictive Value — A Gamified Approach to Managing Smart Communities (MH, SC, CW), pp. 13–22.
- EDOC-2013-ValjaOISJ #modelling #predict
- Modeling and Prediction of Monetary and Non-monetary Business Values (MV, MÖ, MEI, MvS, PJ), pp. 153–158.
- EDOC-2013-VicenteGS #architecture #enterprise
- The Value of ITIL in Enterprise Architecture (MV, NG, MMdS), pp. 147–152.
- ICEIS-v1-2013-LaurierP #concept #representation
- An Enterprise-ontology based Conceptual-modeling Grammar for Representing Value Chain and Supply Chain Scripts (WL, GP), pp. 103–111.
- ICEIS-v2-2013-Abbo #approach
- The Analytical Approach to Information Value Management (DA), pp. 549–554.
- ICEIS-v2-2013-OBrienSH #framework #quality
- The Value of Good Data — A Quality Perspective — A Framework for Discussion (TO, AS, MH), pp. 555–562.
- ICEIS-v3-2013-GeorgeF #architecture #enterprise
- Enterprise Architecture Value Model (EG, GF), pp. 376–381.
- ICML-c1-2013-KrauseFGI #approximate
- Approximation properties of DBNs with binary hidden units and real-valued visible units (OK, AF, TG, CI), pp. 419–426.
- ICML-c2-2013-MinhBM #framework #learning #multi
- A unifying framework for vector-valued manifold regularization and multi-view learning (HQM, LB, VM), pp. 100–108.
- ICML-c3-2013-BrechtelGD #incremental #learning #performance #representation
- Solving Continuous POMDPs: Value Iteration with Incremental Learning of an Efficient Space Representation (SB, TG, RD), pp. 370–378.
- SEKE-2013-PereiraAS #data access #policy #relational #runtime
- Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
- SAC-2013-KinderenP #approach #named
- e3RoME: a value-based approach for method bundling (SdK, HAP), pp. 1469–1471.
- SAC-2013-LikitvivatanavongY #set
- Many-to-many interchangeable sets of values in CSPs (CL, RHCY), pp. 86–91.
- ICSE-2013-Kukreja #approach #requirements #towards
- Decision theoretic requirements prioritization: a two-step approach for sliding towards value realization (NK), pp. 1465–1467.
- ICSE-2013-SayyadMA #case study #on the #product line #re-engineering #search-based
- On the value of user preferences in search-based software engineering: a case study in software product lines (ASS, TM, HA), pp. 492–501.
- CGO-2013-CostaASP
- Just-in-time value specialization (IRdAC, PROA, HNS, FMQP), p. 11.
- HPDC-2013-Al-ShishtawyV #named
- ElastMan: autonomic elasticity manager for cloud-based key-value stores (AAS, VV), pp. 115–116.
- ISMM-2013-LiCK #analysis #graph #pointer #precise #scalability
- Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
- ISSTA-2013-SteimannFA #empirical #fault
- Threats to the validity and value of empirical assessments of the accuracy of coverage-based fault locators (FS, MF, RA), pp. 314–324.
- CASE-2012-ChenF #analysis #rule-based
- Treatment of missing values for association rule-based tool commonality analysis in semiconductor manufacturing (RHC, CMF), pp. 886–891.
- CASE-2012-DongNL #industrial #modelling
- A new ELM based on interval-value for modeling in industry systems (MD, KN, ML), pp. 869–873.
- CASE-2012-DotoliFIR #agile #modelling #simulation #using
- A lean manufacturing strategy using Value Stream Mapping, the Unified Modeling Language, and discrete event simulation (MD, MPF, GI, GR), pp. 668–673.
- CASE-2012-HN #approach #multi #network #social
- Influence limitation in multi-campaign social networks: A Shapley value based approach (PRH, YN), pp. 735–740.
- DAC-2012-KongC #3d #process
- Exploiting narrow-width values for process variation-tolerant 3-D microprocessors (JK, SWC), pp. 1197–1206.
- SIGMOD-2012-TatemuraPHH #named #sql
- Partiqle: an elastic SQL engine over key-value stores (JT, OP, WPH, HH), pp. 629–632.
- SIGMOD-2012-Vaithyanathan #enterprise #social #social media
- The value of social media data in enterprise applications (SV), pp. 755–756.
- FLOPS-2012-AccattoliP #call-by #revisited
- Call-by-Value Solvability, Revisited (BA, LP), pp. 4–16.
- ICALP-v1-2012-DeDS #problem
- The Inverse Shapley Value Problem (AD, ID, RAS), pp. 266–277.
- ICALP-v2-2012-BojanczykP12a #towards
- Toward Model Theory with Data Values (MB, TP), pp. 116–127.
- SEFM-2012-FerraraFJ #analysis
- TVAL+ : TVLA and Value Analyses Together (PF, RF, UJ), pp. 63–77.
- SEFM-2012-VorobyovKS #approach #data flow #security
- A Low-Overhead, Value-Tracking Approach to Information Flow Security (KV, PK, PS), pp. 367–381.
- CHI-2012-BorningM #design
- Next steps for value sensitive design (AB, MM), pp. 1125–1134.
- CHI-2012-BrechtEBG #analysis #network #social
- Corporate career presences on social network sites: an analysis of hedonic and utilitarian value (FB, AE, CB, OG), pp. 2441–2450.
- CHI-2012-LampeVGE #facebook
- Perceptions of facebook’s value as an information source (CL, JV, RG, NBE), pp. 3195–3204.
- CHI-2012-WaernBN #community #design #game studies
- Athletes and street acrobats: designing for play as a community value in parkour (AW, EB, KJLN), pp. 869–878.
- CSCW-2012-AndreBL #microblog #twitter
- Who gives a tweet?: evaluating microblog content value (PA, MSB, KL), pp. 471–474.
- CSCW-2012-PriedhorskyPST #algorithm #evaluation #personalisation #recommendation
- Recommending routes in the context of bicycling: algorithms, evaluation, and the value of personalization (RP, DP, SS, LGT), pp. 979–988.
- CSCW-2012-VasalouOJ #case study #product line
- A case study of non-adoption: the values of location tracking in the family (AV, AMO, ANJ), pp. 779–788.
- CAiSE-2012-Razo-ZapataLGA #fuzzy #network #verification
- Fuzzy Verification of Service Value Networks (ISRZ, PDL, JG, HA), pp. 95–110.
- EDOC-2012-IacobQJ #architecture #enterprise
- Capturing Business Strategy and Value in Enterprise Architecture to Support Portfolio Valuation (MEI, DACQ, HJ), pp. 11–20.
- ICEIS-J-2012-PereiraBB12a #aspect-oriented #design #process
- Values and Cultural Aspects in Design: Artifacts for Making Them Explicit in Design Activities (RP, SBB, MCCB), pp. 358–375.
- ICEIS-v2-2012-LukaszewskiJL #data mining #mining #ontology #semantics #using
- Attribute Value Ontology — Using Semantics in Data Mining (TL, JJ, AL), pp. 329–334.
- ICEIS-v3-2012-PereiraBB #design
- Keeping Values in Mind — Artifacts for a Value-oriented and Culturally Informed Design (RP, SBB, MCCB), pp. 25–34.
- ICEIS-v3-2012-TsudaASO #automation #classification
- A Classification Method of Inquiry e-Mails for Describing FAQ with Automatic Setting Mechanism of Judgment Threshold Values (YT, MA, MS, HO), pp. 199–205.
- CIKM-2012-QinZWWZH #migration #optimisation
- Optimizing data migration for cloud-based key-value stores (XQ, WZ, WW, JW, XZ, TH), pp. 2204–2208.
- ICML-2012-KolarX #consistency
- Consistent Covariance Selection From Data With Missing Values (MK, EPX), p. 85.
- ICML-2012-LiuL #modelling #multi #named
- Sparse-GEV: Sparse Latent Space Model for Multivariate Extreme Value Time Serie Modeling (YL, MTB, HL), p. 156.
- ICPR-2012-Capitaine #equivalence #probability
- Set-valued Bayesian inference with probabilistic equivalence (HLC), pp. 2132–2135.
- ICPR-2012-FengKCWP #automation #multi
- Automatic face annotation by multilinear AAM with Missing Values (ZHF, JK, WJC, XW, SP), pp. 2586–2589.
- ICPR-2012-LiVBB #clustering #learning #using
- Feature learning using Generalized Extreme Value distribution based K-means clustering (ZL, OV, HB, RB), pp. 1538–1541.
- ICPR-2012-MujumdarVK #framework #multi #novel #segmentation #using
- A novel framework for segmentation of stroke lesions in Diffusion Weighted MRI using multiple b-value data (SM, RV, LTK), pp. 3762–3765.
- KDD-2012-AndersonHKL #case study #community #process #stack overflow
- Discovering value from community activity on focused question answering sites: a case study of stack overflow (AA, DPH, JMK, JL), pp. 850–858.
- KDD-2012-HuZLYH #matrix
- Accelerated singular value thresholding for matrix completion (YH, DZ, JL, JY, XH), pp. 298–306.
- KDD-2012-XueKRVT
- Anonymizing set-valued data by nonreciprocal recoding (MX, PK, CR, JV, KLT), pp. 1050–1058.
- RecSys-2012-BellufXG #case study #online #personalisation #recommendation #scalability
- Case study on the business value impact of personalized recommendations on a large online retailer (TB, LX, RG), pp. 277–280.
- SEKE-2012-SouzaR #performance
- A proposal for the improvement of the technique of Earned Value Management utilizing the history of performance data (ADdS, ARCdR), pp. 753–758.
- SIGIR-2012-MishneL #case study #twitter
- Twanchor text: a preliminary study of the value of tweets as anchor text (GM, JL), pp. 1159–1160.
- PPDP-2012-LagoP #call-by #dependent type #linear
- Linear dependent types in a call-by-value scenario (UDL, BP), pp. 115–126.
- RE-2012-KukrejaBPP #framework #requirements
- Selecting an appropriate framework for value-based requirements prioritization (NK, BWB, SSP, SP), pp. 303–308.
- SAC-2012-IencoPPT #automation #taxonomy #towards
- Towards an automatic construction of Contextual Attribute-Value Taxonomies (DI, YP, PP, MT), pp. 113–118.
- FSE-2012-BirdZ #analysis #branch
- Assessing the value of branches with what-if analysis (CB, TZ), p. 45.
- FSE-2012-BookGG #interactive
- Seeing the forest and the trees: focusing team interaction on value and effort drivers (MB, SG, VG), p. 30.
- PLEASE-2012-HuYWRW #case study #industrial
- Value-based portfolio scoping: an industrial case study (JH, YY, QW, GR, HW), pp. 45–48.
- PLEASE-2012-LiY #product line
- Enhance value by building trustworthy software-reliant system of systems from software product lines (DL, YY), pp. 13–16.
- CC-2012-FarooqCJ #branch #compilation #predict
- Compiler Support for Value-Based Indirect Branch Prediction (MUF, LC, LKJ), pp. 185–199.
- ICLP-2012-Lifschitz #logic programming #source code
- Two-Valued Logic Programs (VL), pp. 259–266.
- ICLP-J-2012-LifschitzPY #modelling #null #relational
- Relational theories with null values and non-herbrand stable models (VL, KP, FY), pp. 565–582.
- ICST-2012-PonsiniMR #abstract interpretation #analysis #constraints #float #programming #source code
- Combining Constraint Programming and Abstract Interpretation for Value Analysis of Floating-point Programs (OP, CM, MR), pp. 775–776.
- IJCAR-2012-BaazLZ #calculus #effectiveness #semantics
- Effective Finite-Valued Semantics for Labelled Calculi (MB, OL, AZ), pp. 52–66.
- ISSTA-2012-SuiYX #analysis #detection #memory management #using
- Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
- LICS-2012-FijalkowGO #automaton #probability #problem
- Deciding the Value 1 Problem for Probabilistic Leaktight Automata (NF, HG, YO), pp. 295–304.
- LICS-2012-Hoshino #call-by #combinator #semantics
- Step Indexed Realizability Semantics for a Call-by-Value Language Based on Basic Combinatorial Objects (NH), pp. 385–394.
- LICS-2012-Tan #automaton #order
- An Automata Model for Trees with Ordered Data Values (TT), pp. 586–595.
- CBSE-2011-LevequeS #component #modelling
- Refining extra-functional property values in hierarchical component models (TL, SS), pp. 83–92.
- ASE-2011-Halfond #web
- Domain and value checking of web application invocation arguments (WGJH), pp. 544–547.
- DATE-2011-KochteW #evaluation #fault #satisfiability
- SAT-based fault coverage evaluation in the presence of unknown values (MAK, HJW), pp. 1303–1308.
- SIGMOD-2011-DebnathSL #named #ram
- SkimpyStash: RAM space skimpy key-value store on flash-based storage (BKD, SS, JL), pp. 25–36.
- VLDB-2011-ChenMFDX #difference #privacy
- Publishing Set-Valued Data via Differential Privacy (RC, NM, BCMF, BCD, LX), pp. 1087–1098.
- ESOP-2011-ChenMWC #analysis #linear
- Linear Absolute Value Relation Analysis (LC, AM, JW, PC), pp. 156–175.
- PLDI-2011-TristanGM #validation
- Evaluating value-graph translation validation for LLVM (JBT, PG, GM), pp. 295–305.
- CIAA-2011-BechetDF #strict
- Categorial Grammars with Iterated Types form a Strict Hierarchy of k-Valued Languages (DB, AJD, AF), pp. 42–52.
- ICALP-v1-2011-FeigeR #independence #set
- Recoverable Values for Independent Sets (UF, DR), pp. 486–497.
- ICALP-v2-2011-BrazdilBEK #approximate #game studies #probability #termination
- Approximating the Termination Value of One-Counter MDPs and Stochastic Games (TB, VB, KE, AK), pp. 332–343.
- LATA-2011-Huschenbett #distributed #logic #modelling #multi
- Models for Quantitative Distributed Systems and Multi-Valued Logics (MH), pp. 310–322.
- ICFP-2011-SwamyCFSBY #dependent type #distributed #programming
- Secure distributed programming with value-dependent types (NS, JC, CF, PYS, KB, JY), pp. 266–278.
- AGTIVE-2011-BuchmannWW #case study #configuration management #graph transformation
- The Added Value of Programmed Graph Transformations — A Case Study from Software Configuration Management (TB, BW, SW), pp. 198–209.
- CHI-2011-AndersenLSSP #game studies #online
- Placing a value on aesthetics in online casual games (EA, YEL, RS, RS, ZP), pp. 1275–1278.
- CHI-2011-KimR
- User perceptions of the role and value of tags (YMK, SYR), pp. 671–674.
- CHI-2011-WoelferIHFG #mobile #people #safety
- Improving the safety of homeless young people with mobile phones: values, form and function (JPW, AI, DGH, BF, BTG), pp. 1707–1716.
- CSCW-2011-AlsheikhRL #case study #design #distance
- (Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context (TA, JAR, SEL), pp. 75–84.
- CSCW-2011-AmesGKS #comprehension #social
- Understanding technology choices and values through social class (MGA, JG, JK, MS), pp. 55–64.
- CSCW-2011-VertesiD
- The value of data: considering the context of production in data economies (JV, PD), pp. 533–542.
- DUXU-v2-2011-TsengH #design #personalisation
- Designing the Personalized Nostalgic Emotion Value of a Product (YST, MCH), pp. 664–672.
- HIMI-v2-2011-FagerstromG #empirical #facebook #network #social #using
- Co-Creation of Value through Social Network Marketing: A Field Experiment Using a Facebook Campaign to Increase Conversion Rate (AF, GG), pp. 229–235.
- EDOC-2011-CurleyK #case study #framework #maturity #using
- Using the IT Capability Maturity Framework to Improve IT Capability and Value Creation: An Intel IT Case Study (MC, JK), pp. 107–115.
- ICEIS-J-2011-BorekHGP #framework
- IS/IT Resources and Business Value: Operationalization of an Information Oriented Framework (AB, MH, MG, AKP), pp. 420–434.
- ICEIS-v1-2011-SchrodlGLT #assessment #framework #hybrid #network #risk management
- Risk Management in Supply Networks for Hybrid Value Bundles — A Risk Assessment Framework (HS, MG, LL, KT), pp. 157–162.
- ICEIS-v1-2011-XiaoZTZC #network
- A New Chinese Public Welfare Operation Mode based on Value Network Model (DX, ZZ, ZT, JZ, FC), pp. 510–514.
- ICEIS-v2-2011-BadarudinSSMM #algorithm #memory management #problem #representation #search-based
- An Improved Genetic Algorithm with Gene Value Representation and Short Term Memory for Shape Assignment Problem (IB, ABMS, MNS, AM, MTMM), pp. 178–183.
- ICEIS-v2-2011-RenW #perspective
- Declare Value Transportation — An Incomplete Contracting View (YR, QW), pp. 373–377.
- ICEIS-v3-2011-Li11c #identification #performance
- An Efficient Method to Identify Customer Value in Tourist Hotel Management (CL), pp. 165–169.
- ICEIS-v4-2011-BorekPHG #framework
- An Information Oriented Framework for Relating IS/IT Resources and Business Value (AB, AKP, MH, MG), pp. 358–367.
- ECIR-2011-Joachims #feedback
- The Value of User Feedback (TJ), p. 6.
- ICML-2011-KadriRPDR #functional #kernel
- Functional Regularized Least Squares Classication with Operator-valued Kernels (HK, AR, PP, ED, AR), pp. 993–1000.
- ICML-2011-MinhS
- Vector-valued Manifold Regularization (HQM, VS), pp. 57–64.
- ICML-2011-PazisP #scalability #set
- Generalized Value Functions for Large Action Sets (JP, RP), pp. 1185–1192.
- KMIS-2011-Borchardt #recommendation #towards
- Towards a Value-oriented KMS Recommendation for SME (UB), pp. 347–350.
- MLDM-2011-Grabczewski
- Separability of Split Value Criterion with Weighted Separation Gains (KG), pp. 88–98.
- RecSys-2011-XinS #matrix #multi #probability #recommendation
- Multi-value probabilistic matrix factorization for IP-TV recommendations (YX, HS), pp. 221–228.
- MoDELS-2011-Petre #modelling
- The Value in Muddling Around Modelling (MP), p. 1.
- OOPSLA-2011-AustinDF
- Virtual values for language extension (THA, TD, CF), pp. 921–938.
- RE-2011-KomssiKTLD #analysis #perspective #process
- Integrating analysis of customers’ processes into roadmapping: The value-creation perspective (MK, MK, HT, LL, AMD), pp. 57–66.
- SAC-2011-FragidisT
- Analyzing value co-creation in service systems: contribution from GORE (GF, KAT), pp. 705–707.
- SAC-2011-MajchrzakH #game studies
- Game vendors’ influence on the monetary value of virtual goods (TAM, KFH), pp. 757–764.
- ESEC-FSE-2011-LiCK #analysis #performance #points-to #using
- Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
- ESEC-FSE-2011-MirghasemiBP #execution #named
- Querypoint: moving backwards on wrong values in the buggy execution (SM, JJB, CP), pp. 436–439.
- ICSE-2011-JhiWJZLW #detection
- Value-based program characterization and its application to software plagiarism detection (YcJ, XW, XJ, SZ, PL, DW), pp. 756–765.
- SPLC-2011-LiW #evolution #product line
- Adding Value through Software Product Line Engineering: The Evolution of the FISCAN Software Product Lines (DL, DMW), pp. 213–222.
- SPLC-2011-Muller #optimisation #product line
- Value-Based Portfolio Optimization for Software Product Lines (JM), pp. 15–24.
- HPDC-2011-AbbasiEWSK #performance #pipes and filters
- Just in time: adding value to the IO pipelines of high performance applications with JITStaging (HA, GE, MW, KS, SK), pp. 27–36.
- SOSP-2011-LimFAK #named
- SILT: a memory-efficient, high-performance key-value store (HL, BF, DGA, MK), pp. 1–13.
- LICS-2011-BokerCHK #cumulative #specification
- Temporal Specifications with Accumulative Values (UB, KC, TAH, OK), pp. 43–52.
- TAP-2011-ChebaroKGJ #analysis #c #debugging #generative #slicing #testing
- The SANTE Tool: Value Analysis, Program Slicing and Test Generation for C Program Debugging (OC, NK, AG, JJ), pp. 78–83.
- ECSA-2010-EklundA #architecture #classification
- A Classification of Value for Software Architecture Decisions (UE, TA), pp. 368–375.
- ECSA-2010-IvanovicA #architecture
- Customer Value in Architecture Decision Making (AI, PA), pp. 263–278.
- ASE-2010-LoM #mining #specification
- Scenario-based and value-based specification mining: better together (DL, SM), pp. 387–396.
- DATE-2010-GellertPZFVS #architecture #design #energy #predict #smt
- Energy-performance design space exploration in SMT architectures exploiting selective load value predictions (AG, GP, VZ, AF, LNV, CS), pp. 271–274.
- DATE-2010-LazzariFMC #multi
- A new quaternary FPGA based on a voltage-mode multi-valued circuit (CL, PFF, JM, LC), pp. 1797–1802.
- HT-2010-HsiaoBYO #adaptation #approach #case study
- The value of adaptive link annotation in e-learning: a study of a portal-based approach (IHH, PB, MY, AO), pp. 223–228.
- PODS-2010-FanG #tuple
- Capturing missing tuples and missing values (WF, FG), pp. 169–178.
- VLDB-2010-DebnathSL #named #persistent #throughput
- FlashStore: High Throughput Persistent Key-Value Store (BKD, SS, JL), pp. 1414–1425.
- VLDB-2010-GuoDSZ #constraints
- Record Linkage with Uniqueness Constraints and Erroneous Values (SG, XD, DS, RZ), pp. 417–428.
- ICSM-2010-SerebrenikB #metric
- Theil index for aggregation of software metrics values (AS, MvdB), pp. 1–9.
- DLT-2010-DrosteV #automaton #bound #logic #multi #theorem
- Kleene and Büchi Theorems for Weighted Automata and Multi-valued Logics over Arbitrary Bounded Lattices (MD, HV), pp. 160–172.
- ICALP-v1-2010-CaiCL #graph #morphism #theorem
- Graph Homomorphisms with Complex Values: A Dichotomy Theorem (JyC, XC, PL), pp. 275–286.
- ICALP-v2-2010-Laird #call-by #game studies #morphism #polymorphism #semantics
- Game Semantics for Call-by-Value Polymorphism (JL), pp. 187–198.
- LATA-2010-FlorencioF #approach #bound #consistency
- Finding Consistent Categorial Grammars of Bounded Value: A Parameterized Approach (CCF, HF), pp. 202–213.
- IFM-2010-FranzleTE #hybrid #probability #smt
- Satisfaction Meets Expectations — Computing Expected Values of Probabilistic Hybrid Systems with SMT (MF, TT, AE), pp. 168–182.
- CHI-2010-DenningBFGKM #security
- Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices (TD, AB, BF, BTG, TK, WHM), pp. 917–926.
- CHI-2010-ZhangQCW #case study #enterprise
- A case study of micro-blogging in the enterprise: use, value, and related issues (JZ, YQ, JC, YW), pp. 123–132.
- CIKM-2010-ShiXF
- Anonymizing data with quasi-sensitive attribute values (PS, LX, BCMF), pp. 1389–1392.
- ICPR-2010-ChenZCY #image #segmentation
- Active Contours with Thresholding Value for Image Segmentation (GC, HZ, IC, WY), pp. 2266–2269.
- ICPR-2010-MakiharaHY #how #question
- How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values? (YM, MAH, YY), pp. 1208–1211.
- KR-2010-ArieliAZ #logic
- Maximally Paraconsistent Three-Valued Logics (OA, AA, AZ).
- KR-2010-CeramiEB #decidability #logic
- Decidability of a Description Logic over Infinite-Valued Product Logic (MC, FE, FB).
- KR-2010-XiaoLMQ #consistency #metric #multi #nondeterminism #satisfiability #semantics
- Computing Inconsistency Measurements under Multi-Valued Semantics by Partial Max-SAT Solvers (GX, ZL, YM, GQ).
- SEKE-2010-Zhang #development
- Capturing Antagonistic Stakeholder Value Propositions in Value-Based Software Development (DZ), pp. 12–18.
- SEKE-2010-ZhangYW #question
- Absent features or missing values? (WZ, YY, QW), pp. 6–11.
- SIGIR-2010-KaleBSVVGD #enterprise #named #web
- iCollaborate: harvesting value from enterprise web usage (AK, TB, BS, TLPV, LV, MG, MD), p. 699.
- SIGIR-2010-OstergrenYE #visual notation #web
- The value of visual elements in web search (MO, SyY, ENE), pp. 867–868.
- SIGIR-2010-WhiteH #web
- Assessing the scenic route: measuring the value of search trails in web logs (RWW, JH), pp. 587–594.
- REFSQ-2010-Fricker #ecosystem #requirements
- Requirements Value Chains: Stakeholder Management and Requirements Engineering in Software Ecosystems (SF), pp. 60–66.
- REFSQ-2010-ProynovaPWW #perspective #requirements #research
- Use of Personal Values in Requirements Engineering — A Research Preview (RP, BP, AW, TW), pp. 17–22.
- SAC-2010-BacciuBM #adaptation
- Adaptive fuzzy-valued service selection (DB, MGB, LM), pp. 2467–2471.
- SAC-2010-ColantonioPOV #adaptation #approach #clustering #matrix #named
- ABBA: adaptive bicluster-based approach to impute missing values in binary matrices (AC, RDP, AO, NVV), pp. 1026–1033.
- SAC-2010-IlayperumaZ #collaboration #modelling #perspective
- Exploring business value models from the inter-organizational collaboration perspective (TI, JZ), pp. 99–105.
- ICSE-2010-KitchenhamBB #education #re-engineering
- The educational value of mapping studies of software engineering literature (BK, PB, DB), pp. 589–598.
- CC-2010-DingO #algorithm #representation #strict
- Unrestricted Code Motion: A Program Representation and Transformation Algorithms Based on Future Values (SD, SÖ), pp. 26–45.
- HPCA-2010-FarooqCJ #predict
- Value Based BTB Indexing for indirect jump prediction (MUF, LC, LKJ), pp. 1–11.
- ISMM-2010-TianFG #parallel #predict #using
- Speculative parallelization using state separation and multiple value prediction (CT, MF, RG), pp. 63–72.
- OSDI-2010-GeambasuLKKL #distributed #named
- Comet: An active distributed key-value store (RG, AAL, TK, AK, HML), pp. 323–336.
- LICS-2010-AvronAZ #logic #on the
- On Strong Maximality of Paraconsistent Finite-Valued Logics (AA, OA, AZ), pp. 304–313.
- ASE-2009-GreenMWE #comprehension #re-engineering
- Understanding the Value of Software Engineering Technologies (PGI, TM, SW, OER), pp. 52–61.
- CASE-2009-FagioliniMB #distributed
- Set-valued consensus for distributed clock synchronization (AF, SM, AB), pp. 116–121.
- CASE-2009-SenguptaDBMD #detection #fault #modelling #using
- Fault detection of Air Intake Systems of SI gasoline engines using mean value and within cycle models (SS, SD, AKB, SM, AKD), pp. 361–366.
- CASE-2009-ViswanadhamK #network #process
- Orchestrating a network of activities in the value chain (NV, SK), pp. 501–506.
- DATE-2009-WangHZC #design
- Exploiting narrow-width values for thermal-aware register file designs (SW, JSH, SGZ, SWC), pp. 1422–1427.
- VLDB-2009-HeN #top-down
- Anonymization of Set-Valued Data via Top-Down, Local Generalization (YH, JFN), pp. 934–945.
- VLDB-2009-KaushikS #consistency
- Consistent Histograms In The Presence of Distinct Value Counts (RK, DS), pp. 850–861.
- ICSM-2009-JadallahGMR
- Balancing value and modifiability when planning for the next release (AJ, MG, MM, GR), pp. 495–498.
- ICSM-2009-JeffreyGG #effectiveness #fault #locality #multi #performance #using
- Effective and efficient localization of multiple faults using value replacement (DJ, NG, RG), pp. 221–230.
- SCAM-2009-CanetCM #analysis #c #source code
- A Value Analysis for C Programs (GC, PC, BM), pp. 123–124.
- FM-2009-AlbertAGP #analysis
- Field-Sensitive Value Analysis by Field-Insensitive Analysis (EA, PA, SG, GP), pp. 370–386.
- FM-2009-SchriebWW #abstraction
- Three-Valued Spotlight Abstractions (JS, HW, DW), pp. 106–122.
- CHI-2009-DantecPW #design #evolution #experience
- Values as lived experience: evolving value sensitive design in support of value discovery (CALD, ESP, SW), pp. 1141–1150.
- CHI-2009-DiefenbachH
- The “Beauty Dilemma”: beauty is valued but discounted in product choice (SD, MH), pp. 1419–1426.
- DHM-2009-EngstlerB #generative
- Generation of Percentile Values for Human Joint Torque Characteristics (FE, HB), pp. 95–104.
- HCD-2009-LiuL #adaptation #mobile #people
- User Value Based Product Adaptation: A Case of Mobile Products for Chinese Urban Elderly People (JL, XL), pp. 492–500.
- HCD-2009-PohlmeyerBWM #approach #experience #user interface
- The Value of Answers without Question[s]: A Qualitative Approach to User Experience and Aging (AEP, LTMB, HW, JM), pp. 894–903.
- HCI-NIMT-2009-Jain #human-computer #multimodal #using
- Value of Using Multimodal Data in HCI Methodologies (JJ), pp. 48–57.
- HCI-NIMT-2009-MurakamiK #classification #music
- Study of Feature Values for Subjective Classification of Music (MM, TK), pp. 701–709.
- CAiSE-2009-WeigandJAB #design #modelling #towards
- Value-Based Service Modeling and Design: Toward a Unified View of Services (HW, PJ, BA, MB), pp. 410–424.
- CAiSE-2009-Wiederhold #how #named #question #tutorial
- Tutorial: How to Value Software in a Business, and Where Might the Value Go? (GW), pp. 9–10.
- ICML-2009-TaylorP #approximate #kernel #learning
- Kernelized value function approximation for reinforcement learning (GT, RP), pp. 1017–1024.
- KDD-2009-LiMPF #mining #named #sequence #summary
- DynaMMo: mining and summarization of coevolving sequences with missing values (LL, JM, NSP, CF), pp. 507–516.
- KEOD-2009-ArkoudasBK #logic #reasoning
- Qualitative Spatial Reasoning Via 3-Valued Heterogeneous Logic (KA, SB, SK), pp. 80–87.
- KMIS-2009-RohrbaughH #information management #multi #process
- Value Knowledge Management — Process Structuring for Multi-party Conflict (JR, SH), pp. 63–68.
- KMIS-2009-StockerT #case study #enterprise #multi #wiki
- Exploring the Value of Enterprise Wikis — A Multiple-Case Study (AS, KT), pp. 5–12.
- SEKE-2009-SeliyaK #modelling #quality
- Value-Based Software Quality Modeling (NS, TMK), pp. 116–121.
- SEKE-2009-Zhang #consistency #development #nondeterminism
- Taming Inconsistency in Value-based Software Development (DZ), pp. 450–455.
- LOPSTR-2009-Nishimura #exception #logic
- Refining Exceptions in Four-Valued Logic (SN), pp. 113–127.
- POPL-2009-JonssonN #call-by #higher-order #supercompilation
- Positive supercompilation for a higher order call-by-value language (PAJ, JN), pp. 277–288.
- RE-2009-KauppinenSLKTD #development
- From Feature Development to Customer Value Creation (MK, JS, LL, MK, HT, AMD), pp. 275–280.
- REFSQ-2009-Dzamashvili-FogelstromBAH #requirements
- When Product Managers Gamble with Requirements: Attitudes to Value and Risk (NDF, SB, AA, AH), pp. 1–15.
- REFSQ-2009-TourweCBB #collaboration #quantifier #requirements
- Demystifying Release Definition: From Requirements Prioritization to Collaborative Value Quantification (TT, WC, NB, VB), pp. 37–44.
- SPLC-2009-SavolainenBKM #product line
- Default values for improved product line management (JS, JB, JK, TM), pp. 51–60.
- ICLP-2009-HolldoblerR #logic programming #semantics #source code
- Logic Programs under Three-Valued Lukasiewicz Semantics (SH, CDPKR), pp. 464–478.
- TLCA-2009-HerbelinZ #call-by #deduction #λ-calculus
- An Operational Account of Call-by-Value Minimal and Classical λ-Calculus in “Natural Deduction” Form (HH, SZ), pp. 142–156.
- TLCA-2009-Riba #on the
- On the Values of Reducibility Candidates (CR), pp. 264–278.
- VMCAI-2009-Vafeiadis #abstraction #verification
- Shape-Value Abstraction for Verifying Linearizability (VV), pp. 335–348.
- WICSA-2008-BahsoonE #approach #architecture #distributed #scalability
- An Economics-Driven Approach for Valuing Scalability in Distributed Architectures (RB, WE), pp. 9–18.
- WICSA-2008-CantoneK #design #documentation #empirical
- Value-Based Design Decision Rationale Documentation: Principles and Empirical Feasibility Study (GC, PK), pp. 189–198.
- WICSA-2008-Ojala #architecture #assessment
- Developing Value Assessment for SW Architecture (PO), pp. 245–248.
- VLDB-2008-TerrovitisMK #privacy
- Privacy-preserving anonymization of set-valued data (MT, NM, PK), pp. 115–125.
- ESOP-2008-FournetGN #implementation
- A Formal Implementation of Value Commitment (CF, NG, FZN), pp. 383–397.
- FoSSaCS-2008-SelingerV #call-by #λ-calculus
- A Linear-non-Linear Model for a Computational Call-by-Value λ Calculus (Extended Abstract) (PS, BV), pp. 81–96.
- ICSM-2008-BoogerdM #empirical #standard
- Assessing the value of coding standards: An empirical study (CB, LM), pp. 277–286.
- STOC-2008-Vondrak #approximate #problem
- Optimal approximation for the submodular welfare problem in the value oracle model (JV), pp. 67–74.
- DLT-2008-Souza #decidability #equivalence #on the #transducer
- On the Decidability of the Equivalence for k-Valued Transducers (RdS), pp. 252–263.
- FM-2008-MateescuT #concurrent #model checking
- A Model Checking Language for Concurrent Value-Passing Systems (RM, DT), pp. 148–164.
- CHI-2008-GuyJSMSF #network #social
- Harvesting with SONAR: the value of aggregating social network information (IG, MJ, ES, NM, VS, SF), pp. 1017–1026.
- CSCW-2008-KripleanBM #wiki
- Articulations of wikiwork: uncovering valued work in wikipedia through barnstars (TK, IB, DWM), pp. 47–56.
- EDOC-2008-Czarski #enterprise #internet
- More than Just an Internet Hype: Added Value with Spatial-Enabled Enterprise Applications (CC).
- ICEIS-DISI-2008-Cardoso #network
- Service Engineering for Future Business Value Networks (JC), pp. 15–20.
- ICEIS-DISI-2008-ItaborahyOS #project management
- Value-Based Software Project Management — A Business Perspective on Software Projects (AI, KMdO, RRdS), pp. 218–225.
- ICEIS-ISAS2-2008-AlencarSAFF #approach #bound #branch
- Maximizing the Business Value of Software Projects — A Branch & Bound Approach (AJA, EAS, EPdA, MCF, ALF), pp. 162–169.
- ICEIS-ISAS2-2008-BrockeMR #approach #modelling #process #towards
- Towards a Value-Oriented Approach to Business Process Modelling (JvB, JM, JR), pp. 380–395.
- CIKM-2008-BacheC
- Estimating real-valued characteristics of criminals from their recorded crimes (RB, FC), pp. 1385–1386.
- ICML-2008-ParrLTPL #analysis #approximate #feature model #learning #linear #modelling
- An analysis of linear models, linear value-function approximation, and feature selection for reinforcement learning (RP, LL, GT, CPW, MLL), pp. 752–759.
- ICML-2008-TakedaS
- nu-support vector machine as conditional value-at-risk minimization (AT, MS), pp. 1056–1063.
- ICPR-2008-KashimaYIS
- Regression with interval output values (HK, KY, AI, HS), pp. 1–4.
- ICPR-2008-LuiC #multi
- Three related types of multi-value association patterns (TWHL, DKYC), pp. 1–4.
- ICPR-2008-QuQY #learning
- Learning a discriminative sparse tri-value transform (ZQ, GQ, PCY), pp. 1–4.
- ICPR-2008-WongCF #adaptation #image #using
- Phase-adaptive image signal fusion using complex-valued wavelets (AW, DAC, PWF), pp. 1–4.
- RecSys-2008-DiasLLEL #case study #personalisation #recommendation
- The value of personalised recommender systems to e-business: a case study (MBD, DL, ML, WED, PJGL), pp. 291–294.
- SEKE-2008-Zhang #machine learning #re-engineering #research
- Machine Learning and Value-based Software Engineering: a Research Agenda (DZ), pp. 285–290.
- RE-2008-GordijnKW
- Value-driven Service Matching (JG, SdK, RW), pp. 67–70.
- SAC-2008-GarciaH #analysis #functional #metric #using
- Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
- SAC-2008-GordijnWRW #self #towards
- Towards self-configuration and management of e-service provisioning in dynamic value constellations (JG, HW, MR, RW), pp. 566–571.
- SAC-2008-ZarvicWE #modelling
- Checking the alignment of value-based business models and IT functionality (NZ, RW, PvE), pp. 607–613.
- ICST-2008-SherriffW #composition #empirical #impact analysis #using
- Empirical Software Change Impact Analysis using Singular Value Decomposition (MS, LW), pp. 268–277.
- IJCAR-2008-Melquiond #bound #proving
- Proving Bounds on Real-Valued Functions with Computations (GM), pp. 2–17.
- ISSTA-2008-JeffreyGG #fault #locality #using
- Fault localization using value replacement (DJ, NG, RG), pp. 167–178.
- ISSTA-2008-Larus #testing
- The real value of testing (JRL), pp. 1–2.
- VMCAI-2008-KupfermanL #automaton #game studies #logic #multi #simulation
- Multi-valued Logics, Automata, Simulations, and Games (OK, YL), p. 5.
- ASE-2007-ChenM #concurrent #source code #testing #using
- Testing concurrent programs using value schedules (JC, SM), pp. 313–322.
- CASE-2007-ChandrashekarN #analysis #coordination #network
- A Shapley Value Analysis to Coordinate the Formation of Procurement Networks (TSC, YN), pp. 664–669.
- DAC-2007-RamalingamSNOP #analysis #composition #modelling #using
- Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
- DATE-2007-EckerESSVH #abstraction #interactive #performance #representation #simulation
- Interactive presentation: Impact of description language, abstraction layer, and value representation on simulation performance (WE, VE, LS, TS, MV, MH), pp. 767–772.
- SIGMOD-2007-BeyerHRSG #estimation #multi #on the
- On synopses for distinct-value estimation under multiset operations (KSB, PJH, BR, YS, RG), pp. 199–210.
- VLDB-2007-ChandramouliPY #scalability
- Value-Based Notification Conditions in Large-Scale Publish/Subscribe Systems (BC, JMP, JY), pp. 878–889.
- VLDB-2007-WuJ #set
- A Bayesian Method for Guessing the Extreme Values in a Data Set (MW, CJ), pp. 471–482.
- PLDI-2007-CheremPR #analysis #detection #memory management #using
- Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
- SAS-2007-Monniaux #abstraction #source code
- Optimal Abstraction on Real-Valued Programs (DM), pp. 104–120.
- SAS-2007-ShohamG #abstraction #composition #verification
- Compositional Verification and 3-Valued Abstractions Join Forces (SS, OG), pp. 69–86.
- CIAA-2007-CaucalCFR #context-free grammar #performance #throughput
- Efficient Computation of Throughput Values of Context-Free Languages (DC, JC, WF, WR), pp. 203–213.
- CIAA-2007-GoldwurmR #modelling #statistics
- Average Value and Variance of Pattern Statistics in Rational Models (MG, RR), pp. 62–72.
- ICALP-2007-BodirskyCKO #constraints
- Maximal Infinite-Valued Constraint Languages (MB, HC, JK, TvO), pp. 546–557.
- ICFP-2007-BrasselHFHV #call-by #evaluation #lazy evaluation
- Lazy call-by-value evaluation (BB, MH, SF, FH, GV), pp. 265–276.
- AGTIVE-2007-FussT #algorithm #graph transformation #model transformation #simulation
- Simulating Set-Valued Transformations with Algorithmic Graph Transformation Languages (CF, VET), pp. 442–455.
- DHM-2007-ZhangDC #composition #pattern matching #pattern recognition #process #recognition
- Wavelet Transform and Singular Value Decomposition of EEG Signal for Pattern Recognition of Complicated Hand Activities (XZ, WD, ZC), pp. 294–303.
- HCI-IDU-2007-ItohHTK #design #process
- A New User-Centered Design Process for Creating New Value and Future (YI, YH, HT, MK), pp. 108–116.
- HCI-IDU-2007-KimJBKJY #framework
- A New Framework of Measuring the Business Values of Software (IKK, BSJ, SB, AK, YGJ, MHY), pp. 559–568.
- HCI-IDU-2007-NietersW #collaboration #design
- Collaborative Design for Strategic UXD Impact and Global Product Value (JEN, DW), pp. 214–222.
- HIMI-MTT-2007-NoorinaeiniLW #classification #composition #hybrid
- Hybrid Singular Value Decomposition: A Model of Human Text Classification (AN, MRL, SjW), pp. 517–525.
- CAiSE-2007-DerzsiGKAT #case study
- Assessing Feasibility of IT-Enabled Networked Value Constellations: A Case Study in the Electricity Sector (ZD, JG, KK, HA, YHT), pp. 66–80.
- CAiSE-2007-PijpersG #comprehension #named
- e3forces: Understanding Strategies of Networked e 3 value Constellations by Analyzing Environmental Forces (VP, JG), pp. 188–202.
- EDOC-2007-TosicSL #composition #uml #web #web service
- UML Profiles for WS-Policy4MASC as Support for Business Value Driven Engineering and Management of Web Services and their Compositions (VT, BS, HL), pp. 157–168.
- ICEIS-DISI-2007-BergamaschiOGS #metadata
- Relevant values: New metadata to provide insight on attribute values at schema level (SB, MO, FG, CS), pp. 274–279.
- ICEIS-DISI-2007-CabreroGP #approach #design #maintenance
- Maintenance cost of a software design: A value-based approach (DCM, JG, MP), pp. 384–389.
- ICEIS-SAIC-2007-CheungSB #collaboration #using
- Value Creation for SMES Using Collaborative Commerce Marketplaces (YPC, DS, JB), pp. 63–71.
- ICML-2007-JohnsM #approximate #graph
- Constructing basis functions from directed graphs for value function approximation (JJ, SM), pp. 385–392.
- ICML-2007-ParrPLL #approximate #generative
- Analyzing feature generation for value-function approximation (RP, CPW, LL, MLL), pp. 737–744.
- ICML-2007-PhuaF #approximate #learning #linear
- Tracking value function dynamics to improve reinforcement learning with piecewise linear function approximation (CWP, RF), pp. 751–758.
- ICML-2007-ZhangY #classification #consistency #constraints #on the
- On the value of pairwise constraints in classification and consistency (JZ, RY), pp. 1111–1118.
- SIGIR-2007-TeevanDH #personalisation
- Characterizing the value of personalizing search (JT, STD, EH), pp. 757–758.
- SIGIR-2007-ThomasR #ambiguity #automation
- Estimating the value of automatic disambiguation (PT, TR), pp. 719–720.
- OOPSLA-2007-BondNKGM #fault #null
- Tracking bad apples: reporting the origin of null and undefined value errors (MDB, NN, SWK, SZG, KSM), pp. 405–422.
- RE-2007-EgyedGHB #lessons learnt #requirements #traceability
- Value-Based Requirements Traceability: Lessons Learned (AE, PG, MH, SB), pp. 115–118.
- RE-2007-KartsevaGT #design #enterprise #using
- Value-based Design of Networked Enterprises Using e3control Patterns (VK, JG, YHT), pp. 91–100.
- REFSQ-2007-AurumW #approach #concept #requirements
- A Value-Based Approach in Requirements Engineering: Explaining Some of the Fundamental Concepts (AA, CW), pp. 109–115.
- REFSQ-2007-ZarvicDW #requirements
- Value-Based Requirements Engineering for Value Webs (NZ, MD, RW), pp. 116–128.
- SAC-2007-CaldersGM #mining
- Mining itemsets in the presence of missing values (TC, BG, MM), pp. 404–408.
- ESEC-FSE-2007-Stefaniak #visualisation
- Visualising exemplary program values (MS), pp. 575–578.
- SOSP-2007-DeCandiaHJKLPSVV #named
- Dynamo: amazon’s highly available key-value store (GD, DH, MJ, GK, AL, AP, SS, PV, WV), pp. 205–220.
- CAV-2007-KatoenKLW #abstraction #markov
- Three-Valued Abstraction for Continuous-Time Markov Chains (JPK, DK, ML, VW), pp. 311–324.
- ICLP-2007-GrecoM #consistency #database #query #semantics
- Querying and Repairing Inconsistent Databases Under Three-Valued Semantics (SG, CM), pp. 149–164.
- SAT-2007-AnsoteguiBLM #csp #satisfiability
- Mapping CSP into Many-Valued SAT (CA, MLB, JL, FM), pp. 10–15.
- DAC-2006-HuebbersDI #parametricity #performance #process
- Computation of accurate interconnect process parameter values for performance corners under process variations (FH, AD, YII), pp. 797–800.
- DAC-2006-RawatCKSGZS #named #proving #question
- DFM: where’s the proof of value? (SR, RC, AK, JS, MG, NZ, AS), pp. 1061–1062.
- DAC-2006-SingheeFMR #probability #statistics #tool support #towards
- Probabilistic interval-valued computation: toward a practical surrogate for statistics inside CAD tools (AS, CFF, JDM, RAR), pp. 167–172.
- DATE-2006-ChaoWCWC #using
- Coverage loss by using space compactors in presence of unknown values (MCTC, SW, STC, WW, KTC), pp. 1053–1054.
- DATE-2006-RongP #algorithm #formal method #markov #online #process
- Determining the optimal timeout values for a power-managed system based on the theory of Markovian processes: offline and online algorithms (PR, MP), pp. 1128–1133.
- DATE-2006-SundaresanM #energy #optimisation
- Value-based bit ordering for energy optimization of on-chip global signal buses (KS, NRM), pp. 624–625.
- SIGMOD-2006-SilbersteinMY #energy #monitoring #network
- Energy-efficient monitoring of extreme values in sensor networks (AS, KM, JY), pp. 169–180.
- ESOP-2006-CooperK #call-by #data flow
- Embedding Dynamic Dataflow in a Call-by-Value Language (GHC, SK), pp. 294–308.
- SAS-2006-Arnold #analysis #logic #refinement #using
- Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
- STOC-2006-AngluinACW #injection #learning
- Learning a circuit by injecting values (DA, JA, JC, YW), pp. 584–593.
- CHI-2006-CosleyFTR #bibliography #community #using
- Using intelligent task routing and contribution review to help communities build artifacts of lasting value (DC, DF, LGT, JR), pp. 1037–1046.
- CHI-2006-RashidLTRKR #game studies
- Motivating participation by displaying the value of contribution (AMR, KSL, RDT, PR, REK, JR), pp. 955–958.
- CAiSE-2006-KartsevaGT #network
- Inter-organisational Controls as Value Objects in Network Organisations (VK, JG, YHT), pp. 336–350.
- CAiSE-2006-WeigandJABEI #on the
- On the Notion of Value Object (HW, PJ, BA, MB, AE, TI), pp. 321–335.
- EDOC-2006-MutschlerBR06a #approach #evaluation #perspective #workflow
- An Evaluation Approach for Analyzing Workflow Management Systems from a Value-based Perspective (BM, JB, MR), pp. 477–482.
- ICEIS-ISAS-2006-KrogstieDJ #modelling #process
- Increasing the Value of Process Modelling (JK, VD, SMJ), pp. 70–77.
- ICEIS-J-2006-KrogstieDJ06a #framework #modelling #process
- Process Modeling Value Framework (JK, VD, SMJ), pp. 309–321.
- CIKM-2006-ChiTT #analysis #named
- Eigen-trend: trend analysis in the blogosphere based on singular value decompositions (YC, BLT, JT), pp. 68–77.
- CIKM-2006-Kielman #realtime #security
- The real-time nature and value of homeland security information (JK), p. 3.
- CIKM-2006-MichelBNTWZ #keyword
- Discovering and exploiting keyword and attribute-value co-occurrences to improve P2P routing indices (SM, MB, NN, PT, GW, CZ), pp. 172–181.
- CIKM-2006-TerrovitisPVS
- A combination of trie-trees and inverted files for the indexing of set-valued attributes (MT, SP, PV, TKS), pp. 728–737.
- ICML-2006-LiLC #markov #process
- Region-based value iteration for partially observable Markov decision processes (HL, XL, LC), pp. 561–568.
- ICML-2006-ShengL #algorithm #testing
- Feature value acquisition in testing: a sequential batch test algorithm (VSS, CXL), pp. 809–816.
- ICPR-v1-2006-MarmoAC #classification #set #using
- Microfossils shape classification using a set of width values (RM, SA, VC), pp. 691–694.
- ICPR-v2-2006-IlonenPKK #classification
- Gaussian mixture pdf in one-class classification: computing and utilizing confidence values (JI, PP, JKK, HK), pp. 577–580.
- ICPR-v3-2006-AbdallahHB #composition #image #performance #robust #using
- A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition (EEA, ABH, PB), pp. 673–676.
- KR-2006-HunterK #consistency #nondeterminism
- Shapley Inconsistency Values (AH, SK), pp. 249–259.
- SEKE-2006-HuangC06a #nondeterminism #rule-based
- A New Method of Value-Adding Treatment Inference for Rule-based Uncertainty Knowledge (CJH, MYC), pp. 51–56.
- LOPSTR-2006-BagnaraDHMZ #named
- Grids: A Domain for Analyzing the Distribution of Numerical Values (RB, KD, PMH, MM, EZ), pp. 219–235.
- QAPL-2006-SingerB #predict
- Return Value Prediction meets Information Theory (JS, GB), pp. 137–151.
- RE-2006-GordijnPW #comprehension #modelling #using
- Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling (JG, MP, RW), pp. 126–135.
- SAC-2006-WuGL #analysis #database #modelling #towards
- Towards value disclosure analysis in modeling general databases (XW, SG, YL), pp. 617–621.
- ICSE-2006-Dolins #process #using
- Using the balanced scorecard process to compute the value of software applications (SBD), pp. 881–884.
- ICSE-2006-HuangBHGLQ #development #enterprise #process
- Applying the Value/Petri process to ERP software development in China (LH, BWB, HH, JG, JL, CQ), pp. 502–511.
- LCTES-2006-Mine #analysis #c #embedded #pointer #source code
- Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics (AM), pp. 54–63.
- LICS-2006-ShohamG #abstraction #precise
- 3-Valued Abstraction: More Precision at Less Cost (SS, OG), pp. 399–410.
- DATE-2005-YangHSP #logic #multi #quantum #synthesis #using
- Exact Synthesis of 3-Qubit Quantum Circuits from Non-Binary Quantum Gates Using Multiple-Valued Logic and Group Theory (GY, WNNH, XS, MAP), pp. 434–435.
- PODS-2005-Koch #complexity #functional #on the #query #recursion #xquery
- On the complexity of nonrecursive XQuery and functional query languages on complex values (CK), pp. 84–97.
- SIGMOD-2005-BohannonFFR #constraints #cost analysis #effectiveness #heuristic
- A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification (PB, MF, WF, RR), pp. 143–154.
- VLDB-2005-ChengKPKT #adaptation #query
- Adaptive Stream Filters for Entity-based Queries with Non-Value Tolerance (RC, BK, SP, AK, YCT), pp. 37–48.
- VLDB-2005-EnderleSS #database #query #relational #tuple
- Efficiently Processing Queries on Interval-and-Value Tuples in Relational Databases (JE, NS, TS), pp. 385–396.
- CHI-2005-FlanaganHN #design #game studies #trade-off
- Values at play: design tradeoffs in socially-oriented game design (MF, DCH, HN), pp. 751–760.
- CIKM-2005-KangHLM #feedback #modelling #statistics #using
- Establishing value mappings using statistical models and user feedback (JK, TSH, DL, PM), pp. 68–75.
- CIKM-2005-YuZS #set #towards
- Towards estimating the number of distinct value combinations for a set of attributes (XY, CZ, KCS), pp. 656–663.
- ICML-2005-Mahadevan #learning
- Proto-value functions: developmental reinforcement learning (SM), pp. 553–560.
- ICML-2005-SzepesvariM #bound #finite
- Finite time bounds for sampling based fitted value iteration (CS, RM), pp. 880–887.
- KDD-2005-LongZY #clustering #composition
- Co-clustering by block value decomposition (BL, Z(Z, PSY), pp. 635–640.
- MLDM-2005-Boulle #category theory #scalability
- A Grouping Method for Categorical Attributes Having Very Large Number of Values (MB), pp. 228–242.
- GPCE-2005-Ahlander #sorting
- Sorting Out the Relationships Between Pairs of Iterators, Values, and References (KÅ), pp. 342–356.
- RE-2005-RaadtGY #perspective #web #web service
- Exploring Web Services from a Business Value Perspective (BvdR, JG, ESKY), pp. 53–62.
- SAC-2005-LawL #constraints #matrix #modelling #symmetry #using
- Breaking value symmetries in matrix models using channeling constraints (YCL, JHML), pp. 371–376.
- SAC-2005-WieringaG #coordination #correctness #design #process #trust
- Value-oriented design of service coordination processes: correctness and trust (RW, JG), pp. 1320–1327.
- ESEC-FSE-2005-HeindlB #case study #requirements
- A case study on value-based requirements tracing (MH, SB), pp. 60–69.
- ICSE-2005-GoldenJB #design pattern #empirical
- The value of a usability-supporting architectural pattern in software architecture design: a controlled experiment (EG, BEJ, LB), pp. 460–469.
- SPLC-2005-Wesselius #architecture #modelling #nondeterminism
- Modeling Architectural Value: Cash Flow, Time and Uncertainty (JHW), pp. 89–95.
- HPCA-2005-TuckT #parallel #predict #thread
- Multithreaded Value Prediction (NT, DMT), pp. 5–15.
- ICLP-2005-Mallya #deduction #model checking #multi
- Deductive Multi-valued Model Checking (AM), pp. 297–310.
- RTA-2005-Rocheteau #call-by #λ-calculus #μ-calculus
- λμ-Calculus and Duality: Call-by-Name and Call-by-Value (JR), pp. 204–218.
- RTA-2005-Wadler #call-by
- Call-by-Value Is Dual to Call-by-Name — Reloaded (PW), pp. 185–203.
- TLCA-2005-CoppolaLR #call-by #logic #λ-calculus
- Elementary Affine Logic and the Call-by-Value λ Calculus (PC, UDL, SRDR), pp. 131–145.
- TLCA-2005-Sinot #call-by #interactive
- Call-by-Name and Call-by-Value as Token-Passing Interaction Nets (FRS), pp. 386–400.
- WICSA-2004-IonitaAHOT #approach #architecture #cost analysis
- A Scenario-Driven Approach for Value, Risk, and Cost Analysis in System Architecting for Innovation (MTI, PA, DKH, JHO, JJMT), pp. 277–280.
- DATE-v1-2004-ChangYL
- Value-Conscious Cache: Simple Technique for Reducing Cache Access Power (YJC, CLY, FL), pp. 16–21.
- DATE-v1-2004-ZhangYV
- Low Static-Power Frequent-Value Data Caches (CZ, JY, FV), pp. 214–219.
- DATE-v1-2004-Ziv #generative
- Stimuli Generation with Late Binding of Values (AZ), pp. 558–563.
- PODS-2004-HartmannL #dependence #multi
- Multi-valued Dependencies in the Presence of Lists (SH, SL), pp. 330–341.
- ESOP-2004-HirschowitzLW #call-by #mixin #reduction #semantics
- Call-by-Value Mixin Modules: Reduction Semantics, Side Effects, Types (TH, XL, JBW), pp. 64–78.
- ICSM-2004-SoodD #approach #component #maintenance
- An Approach to Measure Software Maintenance and Support as a Value Added Component of To-Day’s Business (HRS, DD), p. 503.
- ICSM-2004-Woodworth #metric #quality #using
- Using Metrics to Drive Quality Improvements and Value — Company Wide (BW), p. 2.
- ICSM-2004-XieN #black box #difference #testing
- Checking Inside the Black Box: Regression Testing Based on Value Spectra Differences (TX, DN), pp. 28–37.
- SAS-2004-GulwaniN #algorithm #polynomial
- A Polynomial-Time Algorithm for Global Value Numbering (SG, GCN), pp. 212–227.
- STOC-2004-AchlioptasN #graph #random
- The two possible values of the chromatic number of a random graph (DA, AN), pp. 587–593.
- FLOPS-2004-Garrigue #strict
- Relaxing the Value Restriction (JG), pp. 196–213.
- ICALP-2004-BrunsG #logic #model checking #multi
- Model Checking with Multi-valued Logics (GB, PG), pp. 281–293.
- IFM-2004-VilasARGD #imperative #incremental #logic #modelling #semantics #specification
- A Many-Valued Logic with Imperative Semantics for Incremental Specification of Timed Models (AFV, JJPA, RPDR, AGS, JGD), pp. 382–401.
- ICEIS-v1-2004-Gilb #metric #multi #performance #project management #quality
- Evolutionary Project Management: Multiple Performance, Quality and Cost Metrics for Early and Continuous Stakeholder Value Delivery (TG), p. VII.
- CIKM-2004-ChenGS #rank
- Local methods for estimating pagerank values (YYC, QG, TS), pp. 381–389.
- ICML-2004-MannorSST #bias #estimation
- Bias and variance in value function estimation (SM, DS, PS, JNT).
- ICML-2004-WingateS #named #parallel
- P3VI: a partitioned, prioritized, parallel value iterator (DW, KDS).
- ICPR-v4-2004-AdachiS #re-engineering #visual notation
- Uncalibrated Visual Servoing from Projective Reconstruction of Control Values (JA, JS), pp. 297–300.
- LSO-2004-MelnikR #learning
- Impreciseness and Its Value from the Perspective of Software Organizations and Learning (GM, MMR), pp. 122–130.
- SIGIR-2004-NemethST #automation #evaluation #interactive #query
- Evaluation of the real and perceived value of automatic and interactive query expansion (YN, BS, MTM), pp. 526–527.
- POPL-2004-GulwaniN #random #using
- Global value numbering using random interpretation (SG, GCN), pp. 342–352.
- SAC-2004-AbulAPB #generative #using
- Finding differentially expressed genes: pattern generation using Q-values (OA, RA, FP, KB), pp. 138–142.
- SAC-2004-Calderon-BenavidesGAGD #algorithm #collaboration #comparison #multi #predict
- A comparison of several predictive algorithms for collaborative filtering on multi-valued ratings (MLCB, CNGC, JdJPA, JCGD, JD), pp. 1033–1039.
- CC-2004-OzerNG #approximate #probability #using
- Stochastic Bit-Width Approximation Using Extreme Value Theory for Customizable Processors (EÖ, AN, DG), pp. 250–264.
- CC-2004-VanDrunenH
- Value-Based Partial Redundancy Elimination (TV, ALH), pp. 167–184.
- CGO-2004-ZhaiCSM #communication #compilation #optimisation #thread
- Compiler Optimization of Memory-Resident Value Communication Between Speculative Threads (AZ, CBC, JGS, TCM), pp. 39–52.
- CAV-2004-BinghamCHQZ #automation #bound #consistency #verification
- Automatic Verification of Sequential Consistency for Unbounded Addresses and Data Values (JDB, AC, AJH, SQ, ZZ), pp. 427–439.
- CAV-2004-RepsSW #logic #program analysis
- Static Program Analysis via 3-Valued Logic (TWR, SS, RW), pp. 15–30.
- LICS-2004-AlfaroGJ #abstraction #game studies #nondeterminism #precise
- Three-Valued Abstractions of Games: Uncertainty, but with Precision (LdA, PG, RJ), pp. 170–179.
- SAT-2004-Stachniak
- A Note on Satisfying Truth-Value Assignments of Boolean Formulas (ZS), pp. 104–110.
- DATE-2003-JiangMB #algebra #multi
- Reducing Multi-Valued Algebraic Operations to Binary (JHRJ, AM, RKB), pp. 10752–10757.
- DATE-2003-MarinissenVMKM
- Creating Value Through Test (EJM, BV, RM, MK, MM), pp. 10402–10409.
- SIGMOD-2003-KangN #on the
- On Schema Matching with Opaque Column Names and Data Values (JK, JFN), pp. 205–216.
- SIGMOD-2003-Mamoulis #performance
- Efficient Processing of Joins on Set-valued Attributes (NM), pp. 157–168.
- FoSSaCS-2003-DunfieldP #call-by
- Type Assignment for Intersections and Unions in Call-by-Value Languages (JD, FP), pp. 250–266.
- CSMR-2003-Latendresse #c #c++ #evaluation #performance #preprocessor #symbolic computation #using
- Fast Symbolic Evaluation of C/C++ Preprocessing Using Conditional Value (ML), p. 170–?.
- FME-2003-GurfinkelC #generative #model checking #multi
- Generating Counterexamples for Multi-valued Model-Checking (AG, MC), pp. 503–521.
- ICFP-2003-Wadler #call-by
- Call-by-value is dual to call-by-name (PW), pp. 189–201.
- CAiSE-2003-GordijnW #approach #design #process
- A Value-Oriented Approach to E-business Process Design (JG, RW), pp. 390–403.
- ICEIS-v3-2003-MatsumotoT #modelling #problem
- A Promising Manifesto for E-Business Value Modeling Problems (MJM, MT), pp. 112–120.
- ICEIS-v4-2003-Cox #communication #design #what
- What Is the Value of Emotion in Communication? Implications for User Centred Design (RC), pp. 418–425.
- ICML-2003-ZhangH #learning #taxonomy
- Learning from Attribute Value Taxonomies and Partially Specified Instances (JZ, VH), pp. 880–887.
- PPDP-2003-HirschowitzLW #call-by #compilation #functional #recursion
- Compilation of extended recursion in call-by-value functional languages (TH, XL, JBW), pp. 160–171.
- SAC-2003-CazierSL #privacy #trust
- Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility (JC, BS, RSL), pp. 617–622.
- ICSE-2003-EasterbrookCDGLPTT #model checking #multi #named #reasoning
- χChek: A Model Checker for Multi-Valued Reasoning (SME, MC, BD, AG, AYCL, VP, AT, CDTW), pp. 804–805.
- ICSE-2003-MooreKKA #architecture #design #lessons learnt
- Quantifying the Value of Architecture Design Decisions: Lessons from the Field (MM, RK, MK, JA), pp. 557–563.
- CC-2003-JohnsonM #dependence #graph #using
- Combined Code Motion and Register Allocation Using the Value State Dependence Graph (NJ, AM), pp. 1–16.
- CAV-2003-ShohamG #abstraction #framework #game studies
- A Game-Based Framework for CTL Counterexamples and 3-Valued Abstraction-Refinement (SS, OG), pp. 275–287.
- VMCAI-2003-GodefroidJ #modelling #on the
- On the Expressiveness of 3-Valued Models (PG, RJ), pp. 206–222.
- ASE-2002-AndrewsFL #testing
- Adding Value to Formal Test Oracles (JHA, RF, VDL), pp. 275–248.
- DAC-2002-PomeranzKR #on the
- On output response compression in the presence of unknown output values (IP, SK, SMR), pp. 255–258.
- VLDB-2002-OzsoyogluAAOUO #algebra #database
- Sideway Value Algebra for Object-Relational Databases (GÖ, AAH, ISA, SAÖ, ÖU, ZMÖ), pp. 59–70.
- VLDB-2002-PolyzotisG #graph #xml
- Structure and Value Synopses for XML Data Graphs (NP, MNG), pp. 466–477.
- ESOP-2002-HirschowitzL #call-by #mixin
- Mixin Modules in a Call-by-Value Setting (TH, XL), pp. 6–20.
- PLDI-2002-BurtscherDH #classification #predict
- Static Load Classification for Improving the Value Predictability of Data-Cache Misses (MB, AD, MH), pp. 222–233.
- PLDI-2002-Gargi #algorithm
- A Sparse Algorithm for Predicated Global Value Numbering (KG), pp. 45–56.
- SAS-2002-Reps #logic #program analysis
- Static Program Analysis via 3-Valued Logic (TWR), p. 1.
- IFL-2002-AchtenAP
- When Generic Functions Use Dynamic Values (PA, AA, MJP), pp. 17–33.
- ICGT-2002-FernandezM #call-by #graph grammar
- Call-by-Value λ-Graph Rewriting Without Rewriting (MF, IM), pp. 75–89.
- CHI-2002-FioreTS #behaviour
- Observed behavior and perceived value of authors in usenet newsgroups: bridging the gap (ATF, SLT, MAS), pp. 323–330.
- ICEIS-2002-CostaA
- Evaluating EMS Value — The Case of a Small Accountancy Firm (CJC, PA), pp. 460–466.
- CIKM-2002-DeshpandeK #classification #using
- Using conjunction of attribute values for classification (MD, GK), pp. 356–364.
- ICML-2002-DeCoste #classification #distance #geometry #kernel #performance
- Anytime Interval-Valued Outputs for Kernel Machines: Fast Support Vector Machine Classification via Distance Geometry (DD), pp. 99–106.
- ICML-2002-Ho #classification
- Classification Value Grouping (CKMH), pp. 251–258.
- ICML-2002-TakechiS #induction
- Finding an Optimal Gain-Ratio Subset-Split Test for a Set-Valued Attribute in Decision Tree Induction (FT, ES), pp. 618–625.
- ICPR-v1-2002-RiegerTVV #3d #estimation #image
- Curvature Estimation of Surfaces in 3D Grey-Value Images (BR, FJT, LJvV, PWV), pp. 684–687.
- KDD-2002-JagannathanNAH
- A model for discovering customer value for E-content (SJ, JN, KCA, MH), pp. 532–537.
- KDD-2002-RossetNEVI #modelling
- Customer lifetime value modeling and its use for customer retention planning (SR, EN, UE, NV, YI), pp. 332–340.
- ASPLOS-2002-ZhaiCSM #communication #compilation #optimisation #thread
- Compiler optimization of scalar value communication between speculative threads (AZ, CBC, JGS, TCM), pp. 171–183.
- CC-2002-WuSKLF
- Value-Profile Guided Stride Prefetching for Irregular Code (YW, MJS, RK, WL, JF), pp. 307–324.
- HPCA-2002-Sazeides #modelling
- Modeling Value Speculation (YS), pp. 211–222.
- HPCA-2002-SteffanCZM #communication #concurrent #thread
- Improving Value Communication for Thread-Level Speculation (JGS, CBC, AZ, TCM), pp. 65–75.
- CAV-2002-ChechikGD #model checking #multi #named
- chi-Chek: A Multi-valued Model-Checker (MC, AG, BD), pp. 505–509.
- CSL-2002-Kakutani #call-by #recursion
- Duality between Call-by-Name Recursion and Call-by-Value Iteration (YK), pp. 506–521.
- CSL-2002-Levy #call-by #semantics
- Possible World Semantics for General Storage in Call-By-Value (PBL), pp. 232–246.
- LICS-2002-RepsLS #semantics
- Semantic Minimization of 3-Valued Propositional Formulae (TWR, AL, SS), p. 40–?.
- SAT-2002-ManyaABCL
- Resolution methods for many-valued CNF formulas (FM, CA, RB, AC, CML), p. 42.
- DATE-2001-RufHKR #multi
- Simulation-guided property checking based on a multi-valued AR-automata (JR, DWH, TK, WR), pp. 742–748.
- ICDAR-2001-KimCKS #generative #recognition #string #using
- Recognition of Unconstrained Handwritten Numeral Strings Using Decision Value Generator (KKK, YC, JHK, CYS), pp. 14–17.
- PODS-2001-AlonMNSV #revisited #xml
- XML with Data Values: Typechecking Revisited (NA, TM, FN, DS, VV).
- VLDB-2001-Gibbons #query
- Distinct Sampling for Highly-Accurate Answers to Distinct Values Queries and Event Reports (PBG), pp. 541–550.
- ESOP-2001-HuthJS #program analysis
- Modal Transition Systems: A Foundation for Three-Valued Program Analysis (MH, RJ, DAS), pp. 155–169.
- FoSSaCS-2001-HasegawaK #axiom #call-by #recursion
- Axioms for Recursion in Call-by-Value (MH, YK), pp. 246–260.
- TACAS-2001-ChechikDE #implementation #model checking #multi
- Implementing a Multi-valued Symbolic Model Checker (MC, BD, SME), pp. 404–419.
- IWPC-J-1999-FrancelR01 #debugging #slicing
- The value of slicing while debugging (MAF, SR), pp. 151–169.
- ICSM-2001-ByersKP #dependence #graph
- Syntax-Directed Construction of Value Dependence Graphs (DB, MK, TP), p. 692–?.
- ICSM-2001-SiyV #question
- Does the Modern Code Inspection Have Value? (HPS, LGV), p. 281–?.
- FME-2001-ChechikEP #logic #model checking #multi
- Model-Checking over Multi-valued Logics (MC, SME, VP), pp. 72–98.
- ICEIS-v2-2001-BaumolW #network
- Intentions Value Network (UB, RW), pp. 1075–1080.
- ICML-2001-AmarDGZ #learning #multi
- Multiple-Instance Learning of Real-Valued Data (RAA, DRD, SAG, QZ), pp. 3–10.
- KDD-2001-DomingosR #mining #network
- Mining the network value of customers (PMD, MR), pp. 57–66.
- KDD-T-2001-GallantPT #data mining #mining #web
- Value-based data mining and web mining for CRM (SG, GPS, MT), pp. 325–390.
- PADL-2001-Ramakrishnan #calculus #logic programming #model checking #using #μ-calculus
- A Model Checker for Value-Passing μ-Calculus Using Logic Programming (CRR), pp. 1–13.
- POPL-2001-AbadiF #communication #mobile
- Mobile values, new names, and secure communication (MA, CF), pp. 104–115.
- POPL-2001-Yahav #concurrent #java #logic #safety #source code #using #verification
- Verifying safety properties of concurrent Java programs using 3-valued logic (EY), pp. 27–40.
- RE-2001-AntonEAP #policy #privacy #requirements
- The Role of Policy and Stakeholder Privacy Values in Requirements Engineering (AIA, JBE, TAA, CP), pp. 138–145.
- ESEC-FSE-2001-SullivanGCH #composition #design
- The structure and value of modularity in software design (KJS, WGG, YC, BH), pp. 99–108.
- ICSE-2001-EasterbrookC #consistency #framework #multi #reasoning
- A Framework for Multi-Valued Reasoning over Inconsistent Viewpoints (SME, MC), pp. 411–420.
- CC-2001-WattersonD #profiling
- Goal-Directed Value Profiling (SAW, SKD), pp. 319–333.
- HPCA-2001-GoemanVB #difference #performance #predict
- Differential FCM: Increasing Value Prediction Accuracy by Improving Table Usage Efficiency (BG, HV, KDB), pp. 207–216.
- HPCA-2001-LeeSNT #architecture #stack
- Stack Value File: Custom Microarchitecture for the Stack (HHSL, MS, CJN, GST), pp. 5–14.
- LICS-2001-FioreT #semantics
- Semantics of Name and Value Passing (MPF, DT), pp. 93–104.
- SAT-2001-BejarCFMG #logic #satisfiability
- Extending the Reach of SAT with Many-Valued Logics (RB, AC, CF, FM, CPG), pp. 392–407.
- DAC-2000-WilsonD #reliability #simulation #using #verification
- Reliable verification using symbolic simulation with scalar values (CW, DLD), pp. 124–129.
- DATE-2000-MetraFR #online #testing
- On-Line Testing and Diagnosis of Bus Lines with respect to Intermediate Voltage Values (CM, MF, BR), p. 763.
- DATE-2000-Strolenberg
- Stay Away from Minimum Design-Rule Values (CWHS), pp. 71–72.
- PODS-2000-CharikarCMN #estimation #fault #towards
- Towards Estimation Error Guarantees for Distinct Values (MC, SC, RM, VRN), pp. 268–279.
- VLDB-2000-Deshpande #challenge #data transformation
- Linking Business to Deliver Value: A Data Management Challenge (AD), pp. 682–683.
- ICSM-2000-Chapin #roadmap
- Trends in Preserving and Enhancing the Value of Software (NC), pp. 6–8.
- ICSM-2000-Olver #perspective
- Preserving the Value of Software — A CIO Perspective (THO), p. 9–?.
- SAS-2000-MuthWD
- Code Specialization Based on Value Profiles (RM, SAW, SKD), pp. 340–359.
- STOC-2000-Srinivasan #clique
- The value of strong inapproximability results for clique (AS), pp. 144–152.
- ICEIS-2000-KleinerSB #estimation #learning
- Self Organizing Maps for Value Estimation to Solve Reinforcement Learning Tasks (AK, BS, OB), pp. 149–156.
- ICML-2000-BoschZ #in memory #learning #multi
- Unpacking Multi-valued Symbolic Features and Classes in Memory-Based Language Learning (AvdB, JZ), pp. 1055–1062.
- ICML-2000-FariasR #approximate #fixpoint #learning
- Fixed Points of Approximate Value Iteration and Temporal-Difference Learning (DPdF, BVR), pp. 207–214.
- ICPR-v2-2000-AizenbergABF #image #multi #network #recognition
- Image Recognition on the Neural Network Based on Multi-Valued Neurons (INA, NNA, CB, EF), pp. 2989–2992.
- ICPR-v2-2000-AokiK #image #using
- An Image Storage System Using Complex-Valued Associative Memories (HA, YK), pp. 2626–2629.
- ICPR-v2-2000-LuoH #algorithm #composition #graph #using
- Symbolic Graph Matching Using the EM Algorithm and Singular Value Decomposition (BL, ERH), pp. 2141–2144.
- ICPR-v3-2000-ChenHD #composition #using
- Circle Location from Intensity and Range Data Using the Singular Value Decomposition (NsC, GH, SD), pp. 3782–3785.
- TOOLS-EUROPE-2000-Mitchell #process
- Adding Value to the Unified Process (RM), p. 463.
- TOOLS-USA-2000-Duncan #project management
- Project Management: Earned Value Management (BD), pp. 513–514.
- TOOLS-USA-2000-Mitchell00a #process
- Adding Value to the Unified Process (RM), pp. 435–436.
- SPLC-2000-FaulkHR #re-engineering
- Value-based software engineering (VBSE) (SRF, RRH, DR), pp. 205–224.
- ASPLOS-2000-BurrowsELVWWW #flexibility #performance
- Efficient and Flexible Value Sampling (MB, ÚE, STL, MTV, CAW, KW, WEW), pp. 160–167.
- ASPLOS-2000-ZhangYG #design #locality
- Frequent Value Locality and Value-Centric Data Cache Design (YZ, JY, RG), pp. 150–159.
- CC-2000-KnoopR #constant #graph
- Constant Propagation on the Value Graph: Simple Constants and Beyond (JK, OR), pp. 94–109.
- HPCA-2000-LeeWY #predict
- Decoupled Value Prediction on Trace Processors (SJL, YW, PCY), pp. 231–240.
- ICDAR-1999-AtukoraleS #classification
- Combining Classifiers based on Confidence Values (ASA, PNS), pp. 37–40.
- VLDB-1999-FuhDCMTLDRM #implementation #inheritance #sql
- Implementation of SQL3 Structured Types with Inheritance and Value Substitutability (YCF, SD, WC, NMM, BTT, BGL, LD, SR, DM), pp. 565–574.
- VLDB-1999-Graefe #sql
- The Value of Merge-Join and Hash-Join in SQL Server (GG), pp. 250–253.
- VLDB-1999-IoannidisP #approximate
- Histogram-Based Approximation of Set-Valued Query-Answers (YEI, VP), pp. 174–185.
- TACAS-1999-LiC #bisimulation #congruence #process
- Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing Processes (ZL, HC), pp. 300–314.
- SAS-1999-TakimotoH #graph #using
- Partial Dead Code Elimination Using Extended Value Graph (MT, KH), pp. 179–193.
- ICALP-1999-Szegedy #artificial reality #logic #proving
- Many-Valued Logics and Holographic Proofs (MS), pp. 676–686.
- FM-v2-1999-KingHCP #experience #industrial #proving #verification
- The Value of Verification: Positive Experience of Industrial Proof (SK, JH, RC, AP), pp. 1527–1545.
- HCI-CCAD-1999-ElzerB #3d #process #representation
- Three-dimensional representation of process values (PFE, CB), pp. 1296–1300.
- HCI-EI-1999-Hollnagel #interface
- Keep Cool: The Value of Affective Computer Interfaces in a Rational World (EH), pp. 676–680.
- HCI-EI-1999-So
- The Search For A Cybersickness Dose Value (RHYS), pp. 152–156.
- HCI-EI-1999-TakedaK
- Influences of Ergo-meter Work Load Stimulated Fluctuations in CFF Values of Circadian Rhythm on VDU Work Load Related central Nerve Fatigue (MT, SK), pp. 84–88.
- CIKM-1999-KangSLL
- Indexing field values in field oriented systems: interval Quadtree (MAK, SS, KJL, RL), pp. 335–342.
- ICML-1999-SchneiderWMR #distributed
- Distributed Value Functions (JGS, WKW, AWM, MAR), pp. 371–378.
- ICML-1999-UtgoffS #approximate #unification
- Approximation Via Value Unification (PEU, DJS), pp. 425–432.
- KDD-1999-ManiDBD #data mining #mining #modelling #statistics
- Statistics and Data Mining Techniques for Lifetime Value Modeling (DRM, JD, AB, PD), pp. 94–103.
- MLDM-1999-AizenbergAK #algorithm #image #learning #multi #recognition
- Multi-valued and Universal Binary Neurons: Learning Algorithms, Application to Image Processing and Recognition (INA, NNA, GAK), pp. 21–35.
- MLDM-1999-Jahn #image #learning #preprocessor
- Unsupervised Learning of Local Mean Gray Values for Image Pre-processing (HJ), pp. 64–74.
- POPL-1999-SagivRW #analysis #logic #parametricity
- Parametric Shape Analysis via 3-Valued Logic (SS, TWR, RW), pp. 105–118.
- HPCA-1999-HuangL #locality #reuse
- Exploiting Basic Block Value Locality with Block Reuse (JH, DJL), pp. 106–114.
- HPCA-1999-NakraGS #predict
- Global Context-Based Value Prediction (TN, RG, MLS), pp. 4–12.
- CADE-1999-KonradW #first-order #generative #logic
- System Description: Kimba, A Model Generator for Many-Valued First-Order Logics (KK, DAW), pp. 282–286.
- CAV-1999-BrunsG #logic #model checking
- Model Checking Partial State Spaces with 3-Valued Temporal Logics (GB, PG), pp. 274–287.
- CSL-1999-KinoshitaP #call-by #programming language
- Data-Refinement for Call-By-Value Programming Languages (YK, JP), pp. 562–576.
- TLCA-1999-Fujita #call-by #morphism #polymorphism #λ-calculus #μ-calculus
- Explicitly Typed λμ-Calculus for Polymorphism an Call-by-Value (KeF), pp. 162–176.
- TLCA-1999-Levy #call-by #named #paradigm
- Call-by-Push-Value: A Subsuming Paradigm (PBL), pp. 228–242.
- PODS-1998-VorobyovV #complexity #logic programming #recursion #source code
- Complexity of Nonrecursive Logic Programs with Complex Values (SGV, AV), pp. 244–253.
- CIKM-1998-ThomasianCL #approximate #clustering #composition
- Clustering and Singular Value Decomposition for Approximate Indexing in High Dimensional Spaces (AT, VC, CSL), pp. 201–207.
- ICML-1998-KimuraK #algorithm #analysis #learning #using
- An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
- ICML-1998-SchneiderBM #scheduling
- Value Function Based Production Scheduling (JGS, JAB, AWM), pp. 522–530.
- POPL-1998-BodikA #analysis
- Path-Sensitive Value-Flow Analysis (RB, SA), pp. 237–251.
- SAC-1998-WaldenBH #approximate #clustering #fuzzy #multi #using
- Evaluating multi-valued inverse functions using clustering and fuzzy approximations (MAW, MB, AH), pp. 74–79.
- ASPLOS-1998-FuJLC #performance #scheduling
- Value Speculation Scheduling for High Performance Processors (CyF, MDJ, SYL, TMC), pp. 262–271.
- CSL-1998-Lukasiewicz #first-order #logic #probability #semantics
- Many-Valued First-Order Logics with Probabilistic Semantics (TL), pp. 415–429.
- LICS-1998-ArieliA #logic
- The Logical Role of the Four-Valued Bilattice (OA, AA), pp. 118–126.
- ICDAR-1997-Horiuchi #classification
- Pattern Classification Method by Integrating Interval Feature Values (TH), pp. 847–850.
- VLDB-1997-PoosalaI #estimation #independence
- Selectivity Estimation Without the Attribute Value Independence Assumption (VP, YEI), pp. 486–495.
- PEPM-1997-AsaiMY #call-by #partial evaluation #λ-calculus
- Partial Evaluation of Call-by-Value λ-Calculus with Side-Effects (KA, HM, AY), pp. 12–21.
- DLT-1997-WatanabeT #attribute grammar #evaluation #using
- An Attribute Evaluation of One-Pass Attribute Grammars Using Value Estimate (YW, TT), pp. 155–165.
- ICALP-1997-HondaY #analysis #call-by #game studies
- Game Theoretic Analysis of Call-by-Value Computation (KH, NY), pp. 225–236.
- HCI-CC-1997-TakedaH #question
- Does the Circadian Rhythm of VDT Operators Cause Fluctuations of CFF Value that to Mask Fatigue Variations During Work Load? (MT, YH), pp. 563–566.
- ICML-1997-Friedman #learning #network
- Learning Belief Networks in the Presence of Missing Values and Hidden Variables (NF), pp. 125–133.
- PLILP-1997-Mossin #graph #higher-order
- Higher-Order Value Flow Graphs (CM), pp. 159–173.
- RE-1997-HammerRHH #metric #requirements
- Requirements Metrics — Value Added (TH, LHR, LH, LEH), p. 141.
- SAC-1997-KaiserLMGP #algorithm #hybrid #predict #search-based
- Polypeptide structure prediction: real-value versus binary hybrid genetic algorithms (CEK, GBL, LDM, GHGJ, RP), pp. 279–286.
- CSL-1997-AbramskyM #call-by #game studies
- Call-by-Value Games (SA, GM), pp. 1–17.
- CSL-1997-HartonasH #concurrent #functional #higher-order
- Full Abstractness for a Functional/Concurrent Language with Higher-Order Value-Passing (Extended Abstract) (CH, MH), pp. 239–254.
- LICS-1997-Rathke #fixpoint #induction #process
- Unique Fixpoint Induction for Value-Passing Processes (Extended Abstract) (JR), pp. 140–148.
- LICS-1997-RieckeS #call-by #relational
- A Relational Account of Call-by-Value Sequentiality (JGR, AS), pp. 258–267.
- SIGMOD-1996-MorpainCFP #consistency #database #dependence #maintenance #multi
- Maintaining Database Consistency in Presence of Value Dependencies in Multidatabase Systems (CM, MC, JF, JFP), pp. 459–468.
- ESOP-1996-BarbutiM #logic #multi #prolog #semantics
- A Multiple-Valued Logical Semantics for Prolog (RB, PM), pp. 62–76.
- ESOP-1996-Bechet #encoding #partial evaluation #using
- Removing Value Encoding Using Alternative Values in Partial Evaluation of Strongly-Typed Languages (DB), pp. 77–91.
- ICALP-1996-AumannB #performance
- Efficient Asynchronous Consensus with the Value-Oblivious Adversary Scheduler (YA, MAB), pp. 622–633.
- ICFP-1996-SabryW #call-by
- A Reflection on Call-by-Value (AS, PW), pp. 13–24.
- CHI-1996-ComstockD #architecture #usability
- Embed User Values in System Architecture: The Declaration of System Usability (EMC, WMD), pp. 420–427.
- CIKM-1996-LinRSB #sequence
- Indexing Values of Time Sequences (LL, TR, MS, DZB), pp. 223–232.
- ICML-1996-BoutilierD #approximate #programming
- Approximate Value Trees in Structured Dynamic Programming (CB, RD), pp. 54–62.
- ICML-1996-TadepalliO #approximate #domain model #learning #modelling #scalability
- Scaling Up Average Reward Reinforcement Learning by Approximating the Domain Models and the Value Function (PT, DO), pp. 471–479.
- ICPR-1996-AizenbergAK #image #learning #multi #network #pattern matching #pattern recognition #recognition
- Multi-valued and universal binary neurons: mathematical model, learning, networks, application to image processing and pattern recognition (NNA, INA, GAK), pp. 185–189.
- ICPR-1996-Dzemyda #analysis #set #visual notation
- Visual analysis of a set of function values (GD), pp. 700–704.
- ICPR-1996-Kita #using
- Force-based registration method using attribute values (YK), pp. 34–39.
- KR-1996-BaralGP
- Value Minimization in Circumscription (CB, AG, AP), pp. 474–481.
- SIGIR-1996-RollekeF #logic #retrieval #using
- Retrieval of Complex Objects Using a Four-Valued Logic (TR, NF), pp. 206–214.
- ASPLOS-1996-LipastiWS #locality #predict
- Value Locality and Load Value Prediction (MHL, CBW, JPS), pp. 138–147.
- CADE-1996-BaazFSZ #logic #towards
- MUltlog 1.0: Towards an Expert System for Many-Valued Logics (MB, CGF, GS, RZ), pp. 226–230.
- CADE-1996-EglyR #normalisation #on the
- On the Practical Value of Different Definitional Translations to Normal Form (UE, TR), pp. 403–417.
- CADE-1996-Salzer #axiom #multi #quantifier
- Optimal Axiomatizations for Multiple-Valued Operators and Quantifiers Based on Semi-lattices (GS), pp. 688–702.
- CSL-1996-ArieliA #knowledge base
- Four-Valued Diagnoses for Stratified Knowledge-Bases (OA, AA), pp. 1–17.
- CSL-1996-Stark #call-by #logic
- Call-by-Value, Call-by-Name and the Logic of Values (RFS), pp. 431–445.
- VLDB-1995-BestavrosB #concurrent
- Value-cognizant Speculative Concurrency Control (AB, SB), pp. 122–133.
- VLDB-1995-HaasNSS #estimation
- Sampling-Based Estimation of the Number of Distinct Values of an Attribute (PJH, JFN, SS, LS), pp. 311–322.
- PLDI-1995-Click
- Global Code Motion / Global Value Mumbering (CC), pp. 246–257.
- PLDI-1995-Patterson #branch #predict
- Accurate Static Branch Prediction by Value Range Propagation (JRCP), pp. 67–78.
- DLT-1995-Weber #automaton #transducer
- Transforming a Single-Valued Transducer Into a Mealy Machine (AW), pp. 176–185.
- FPCA-1995-Thiemann #polymorphism #revisited #type system
- Unboxed Values and Polymorphic Typing Revisited (PT), pp. 24–35.
- ICML-1995-Niyogi #complexity #learning
- Free to Choose: Investigating the Sample Complexity of Active Learning of Real Valued Functions (PN), pp. 405–412.
- ICML-1995-SalganicoffU #learning #multi #using
- Active Exploration and Learning in real-Valued Spaces using Multi-Armed Bandit Allocation Indices (MS, LHU), pp. 480–487.
- TLCA-1995-PravatoRR #call-by #category theory #semantics #λ-calculus
- Categorical semantics of the call-by-value λ-calculus (AP, SRDR, LR), pp. 381–396.
- SAS-1994-BanerjeeS #call-by #λ-calculus
- Stackability in the Simply-Typed Call-by-Value λ Calculus (AB, DAS), pp. 131–146.
- LFP-1994-AshleyD #implementation #multi #performance
- An Efficient Implementation of Multiple Return Values in Scheme (JMA, RKD), pp. 140–149.
- CHI-1994-BurkhartHJ94a #design
- The value of a baseline in determining design success (BJB, DH, SJ), pp. 386–391.
- KDD-1994-ChuC #abstraction #concept #database
- Abstraction of High Level Concepts from Numerical Values in Databases (WWC, KC), pp. 133–144.
- ALP-1994-Teusink #abduction #logic programming #source code
- Three-Valued Completion for Abductive Logic Programs (FT), pp. 150–167.
- PLILP-1994-JanssensBE
- Abstracting Numerical Values in CLP(H, N) (GJ, MB, VE), pp. 400–414.
- POPL-1994-CleavelandY #framework #process
- An Operational Framework for Value-Passing Processes (RC, DY), pp. 326–338.
- POPL-1994-TofteT #call-by #implementation #stack #using #λ-calculus
- Implementation of the Typed Call-by-Value λ-Calculus using a Stack of Regions (MT, JPT), pp. 188–201.
- POPL-1994-WeiseCES #dependence #graph #representation
- Value Dependence Graphs: Representation without Taxation (DW, RFC, MDE, BS), pp. 297–310.
- ICLP-1994-BigotGD #logic programming #source code
- Output Value Placement in Moded Logic Programs (PAB, DG, SKD), pp. 175–189.
- ICDAR-1993-HuangS #classification #metric #multi
- Combination of multiple classifiers with measurement values (YSH, CYS), pp. 598–601.
- CSM-1993-MerloGHM #constant #multi #re-engineering #user interface
- Multi-Valued Constant Propagation for the Reengineering of User Interfaces (EM, JFG, LJH, RdM), pp. 120–129.
- INTERCHI-1993-MaguireD #industrial #metric #usability
- Usability measurement: its practical value to the computer industry (MCM, AD), pp. 145–148.
- CIKM-1993-HalperGP #database #object-oriented
- Value Propagation in Object-Oriented Database Part Hierarchies (MH, JG, YP), pp. 606–614.
- CIKM-1993-HouZZ #database #statistics
- Statistical Inference of Unknown Attribute Values in Databases (WCH, ZZ, NZ), pp. 21–30.
- SAC-1993-GallionSCB #algorithm #learning
- Dynamic ID3: A Symbolic Learning Algorithm for Many-Valued Attribute Domains (RG, CLS, DCSC, WEB), pp. 14–20.
- SAC-1993-PanH #array #composition #pipes and filters
- Computation of Singular Value Decomposition on Arrays with Pipelined Optical Buses (YP, MH), pp. 525–532.
- TLCA-1993-Sieber #call-by #nondeterminism
- Call-by-Value and Nondeterminism (KS), pp. 376–390.
- DAC-1992-LaiS #diagrams #multi #verification
- Edge-Valued Binary Decision Diagrams for Multi-Level Hierarchical Verification (YTL, SS), pp. 608–613.
- DAC-1992-LinCM #generative #multi
- Symbolic Prime Generation for Multiple-Valued Functions (BL, OC, JCM), pp. 40–44.
- STOC-1992-Ben-David #detection #finite #question
- Can Finite Samples Detect Singularities of Real-Valued Functions? (SBD), pp. 390–399.
- WSA-1992-GenglerR #analysis
- A Polyvariant Binding Time Analysis Handling Partially Known Values (MG, MR), pp. 322–330.
- WSA-1992-Queinnec
- Value Transforming Style (CQ), pp. 20–28.
- CHI-1992-Chimera #multi #navigation #visualisation
- Value bars: an information visualization and navigation tool for multi-attribute listings (RC), pp. 293–294.
- ML-1992-WeinbergBK #clustering #concept
- Conceptual Clustering with Systematic Missing Values (JBW, GB, GRK), pp. 464–469.
- CADE-1992-BeckertGHK #logic #multi #proving #theorem proving
- The Tableau-Based Theorem Prover 3TAP for Multi-Valued Logics (BB, SG, RH, WK), pp. 758–760.
- CSL-1992-Smith #type system
- Kleene’s Slash and Existence of Values of Open Terms in Type Theory (JMS), pp. 395–402.
- JICSLP-1992-Fitting #logic programming #semantics
- Many-Valued Semantics for Logic Programming (MF), pp. 23–24.
- PODS-1991-BusscheP #power of
- The Expressive Power of Structured Values in Pure OODB’s (JVdB, JP), pp. 291–299.
- FPCA-1991-JonesL #functional #strict
- Unboxed Values as First Class Citizens in a Non-Strict Functional Language (SLPJ, JL), pp. 636–666.
- KR-1991-Ginsberg91a #reasoning
- The Computational Value of Nonmonotonic Reasoning (MLG), pp. 262–268.
- ML-1991-Kadie #induction #learning
- Quantifying the Value of Constructive Induction, Knowledge, and Noise Filtering on Inductive Learning (CMK), pp. 153–157.
- ICSE-1991-JacobyT #evaluation #geometry #parametricity #reliability
- Parameter Value Computation by Least Square Method and Evaluation of Software Availability and Reliability at Service-Operation by the Hyper-Geometric Distribution Software Reliability Growth Model (HGDM) (RJ, YT), pp. 226–237.
- CSL-1991-Mundici #logic #normalisation
- Normal Forms in Infinite-Valued Logic: The Case of One Variable (DM), pp. 272–277.
- DAC-1990-MalikBNS #logic #multi
- Reduced Offsets for Two-Level Multi-Valued Logic Minimization (AAM, RKB, ARN, ALSV), pp. 290–296.
- PODS-1990-SoparkarS #clustering
- Data-value Partitioning and Virtual Messages (NS, AS), pp. 357–367.
- PODS-1990-YouY #formal method #logic programming #question
- Three-Valued Formalization of Logic Programming: Is It Needed? (JHY, LYY), pp. 172–182.
- VLDB-1990-Mohan #concurrent #multi #named #transaction
- ARIES/KVL: A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes (CM), pp. 392–405.
- ESOP-1990-SteffenKR #graph #program transformation #representation
- The Value Flow Graph: A Program Representation for Optimal Program Transformations (BS, JK, OR), pp. 389–405.
- ICALP-1990-HennessyI #communication #formal method #process
- A Theory of Communicating Processes with Value-Passing (MH, AI), pp. 209–219.
- ICALP-1990-Riecke #call-by #decidability #proving
- A Complete and Decidable Proof System for Call-by-Value Equalities (Preliminary Report) (JGR), pp. 20–31.
- ML-1990-ObradovicP #learning #multi
- Learning with Discrete Multi-Valued Neurons (ZO, IP), pp. 392–399.
- CSL-1990-Hahnle #logic #multi #performance #proving #towards
- Towards an Efficient Tableau Proof Procedure for Multiple-Valued Logics (RH), pp. 248–260.
- LICS-1990-RobinsonR #call-by #morphism #polymorphism #set
- Polymorphism, Set Theory, and Call-by-Value (ER, GR), pp. 12–18.
- NACLP-1990-Liu #null #source code
- Null Values in Definite Programs (YL), pp. 273–288.
- SIGMOD-1989-IoannidisS
- Conflict Resolution of Rules Assigning Values to Virtual Attributes (YEI, TKS), pp. 205–214.
- PLDI-1989-OTooleG #polymorphism #re-engineering
- Type Reconstruction with First-Class Polymorphic Values (JO, DKG), pp. 207–217.
- KR-1989-Przymusinski #formal method #logic programming #reasoning
- Three-Valued Formalizations of Non-Monotonic Reasoning and Logic Programming (TCP), pp. 341–348.
- ML-1989-Quinlan #induction
- Unknown Attribute Values in Induction (JRQ), pp. 164–168.
- SIGMOD-1988-YuanC #algorithm #database #evaluation #null #query #relational
- A Sound and Complete Query Evaluation Algorithm for Relational Databases with Null Values (LYY, DAC), pp. 74–81.
- VLDB-1988-GottlobZ #database #null
- Closed World Databases Opened Through Null Values (GG, RZ), pp. 50–61.
- VLDB-1988-Lynch #database #estimation #optimisation #query #scalability
- Selectivity Estimation and Query Optimization in Large Databases with Highly Skewed Distribution of Column Values (CAL), pp. 240–251.
- PLDI-1988-Reppy
- Synchronous Operations as First-Class Values (JHR), pp. 250–259.
- VDME-1988-Blikle #specification #validation
- Three-Valued Predicates for Software Specification and Validation (AB), pp. 243–266.
- VDME-1988-KonikowskaTB #logic #specification #validation
- A Three-Valued Logic for Software Specification and Validation (BK, AT, AB), pp. 218–242.
- SIGIR-1988-FurnasDDLHSL #composition #information retrieval #semantics #using
- Information Retrieval using a Singular Value Decomposition Model of Latent Semantic Structure (GWF, SCD, STD, TKL, RAH, LAS, KEL), pp. 465–480.
- ALP-1988-Dahn #modelling #specification
- Boolean Valued Models and Incomplete Specifications (BID), pp. 119–126.
- POPL-1988-RosenWZ
- Global Value Numbers and Redundant Computations (BKR, MNW, FKZ), pp. 12–27.
- JICSCP-1988-FittingB88 #logic programming #semantics
- Stratified and Three-valued Logic Programming Semantics (MF, MBJ), pp. 1054–1069.
- STOC-1987-Buss #problem
- The Boolean Formula Value Problem Is in ALOGTIME (SRB), pp. 123–131.
- ICALP-1987-Johnson #finite
- Single-Valued Finite Transduction (JHJ), pp. 202–211.
- POPL-1987-TannenM
- Computable Values Can Be Classical (VT, ARM), pp. 238–245.
- ICSE-1987-MiyazakiM #metric #using
- Software Metrics Using Deviation Value (YM, NM), pp. 83–95.
- ICLP-1987-CecchiSA87 #logic programming #source code
- Evaluating Logic Programs via Set-Valued Functions (CC, DS, LCA), pp. 428–455.
- ICLP-1987-MorishitaNH87 #logic programming
- Symbolical Construction of Truth Value Domain for Logic Program (SM, MN, SH), pp. 533–555.
- DAC-1986-KuoC #generative #multi
- Generating essential primes for a Boolean function with multiple-valued inputs (YSK, WKC), pp. 193–199.
- CADE-1986-Schmitt #aspect-oriented #logic
- Computational Aspects of Three-Valued Logic (PHS), pp. 190–198.
- PODS-1984-TaySG #database #performance
- A Mean Value Performance Model for Locking in Databases: The Waiting Case (YCT, RS, NG), pp. 311–322.
- ICALP-1984-AtzeniM #constraints #database #dependence #functional #null
- Functional Dependencies and Disjunctive Existence Constraints in Database Relations with Null Values (PA, NMM), pp. 69–81.
- DAC-1982-McDermott #modelling
- Transmission gate modeling in an existing three-value simulator (RMM), pp. 678–681.
- PODS-1982-Zaniolo #database #null
- Database Relations with Null Values (CZ), pp. 27–33.
- LFP-1982-Georgeff #functional #implementation #stack
- A Scheme for Implementing Functional Values on a Stack Machine (MPG), pp. 188–195.
- DAC-1981-Sherwood #logic #modelling #simulation
- A MOS modelling technique for 4-state true-value hierarchical logic simulation or Karnough knowledge (WS), pp. 775–785.
- SIGMOD-1981-StearnsR #concurrent #database #distributed #using
- Distributed Database Concurrency Controls Using Before-Values (RES, DJR), pp. 74–83.
- VLDB-1981-Goldstein #constraints #database #null #relational
- Constraints on Null Values in Relational Databases (BSG), pp. 101–110.
- SIGIR-1981-Robertson
- Term Frequency and Term Value (SER), pp. 22–29.
- SIGMOD-1979-Vassiliou #approach #database #null #semantics
- Null Values in Data Base Management: A Denotational Semantics Approach (YV), pp. 162–169.
- VLDB-1979-Lien #database #dependence #multi #null #relational
- Multivalued Dependencies with Null Values in Relational Data Bases (YEL), pp. 61–66.
- ICALP-1979-SethiT #call-by #continuation #semantics
- Constructing Call-by-Value Continuation Semantics (RS, AT), pp. 556–570.
- SIGIR-1979-Dattola #documentation #retrieval
- Use of Dynamic Discrimination Values in a Document Retrieval System (RTD), pp. 23–32.
- DAC-1978-AliaCMB #component #functional #modelling #simulation
- LSI components modelling in a three-valued functional simulation (GA, PC, EM, FB), pp. 428–438.
- SIGMOD-1978-YamamotoTUI #design #multi #order
- Design of a Generalized Balanced Multiple-Valued File Organization Scheme of Order Two (SY, ST, KU, HI), pp. 47–51.
- ICALP-1978-CremersH #using
- Mutual Exclusion of N Processors Using an O(N)-Valued Message Variable (Extended Abstract) (ABC, TNH), pp. 165–176.
- POPL-1978-DemersDS #data type #encapsulation #morphism #polymorphism
- Data Types as Values: Polymorphism, Type-Checking, Encapsulation (AJD, JED, GS), pp. 23–30.
- VLDB-1977-YamamotoTUI #design #multi
- Design of a Balanced Multiple Valued File Organization Schema with the Least Redundancy (SY, ST, KU, HI), p. 230.
- POPL-1977-Lang #call-by #evaluation #semantics
- Threshold Evaluation and the Semantics of Call by Value, Assignment and Generic Procedures (BL), pp. 227–237.
- POPL-1977-ReifL #evaluation #graph #symbolic computation
- Symbolic Evaluation and the Global Value Graph (JHR, HRL), pp. 104–118.
- DAC-1975-Sherman #testing #using
- Program function test definition using a three-value simulator (WJS), pp. 189–194.
- POPL-1975-Solomon
- Modes, Values, and Expressions (MHS), pp. 149–159.
- DAC-1972-Landsburg #design
- The value of digital printer plotting in ship design (ACL), pp. 170–180.
- SHARE-1965-Fielding #automation #design
- Cost value of design automation (FGF).