BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
model (34)
use (21)
memori (18)
system (16)
automata (16)

Stem weak$ (all stems)

225 papers:

FoSSaCSFoSSaCS-2015-SalvatiW #type system
Typing Weak MSOL Properties (SS, IW), pp. 343–357.
SCAMSCAM-2015-RenatusBE #modelling #security #using
Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
PLDIPLDI-2015-TassarottiDV #logic #memory management #verification
Verifying read-copy-update in a logic for weak memory (JT, DD, VV), pp. 110–120.
ICALPICALP-v2-2015-LahavV #memory management #modelling #reasoning
Owicki-Gries Reasoning for Weak Memory Models (OL, VV), pp. 311–323.
LATALATA-2015-Cotton-BarrattMO #automaton #memory management
Weak and Nested Class Memory Automata (CCB, ASM, CHLO), pp. 188–199.
FMFM-2015-DerrickS #correctness #framework #memory management #modelling
A Framework for Correctness Criteria on Weak Memory Models (JD, GS), pp. 178–194.
QAPLQAPL-2015-AldiniB #automaton #markov #similarity
Expected-Delay-Summing Weak Bisimilarity for Markov Automata (AA, MB), pp. 1–15.
ASPLOSASPLOS-2015-AlglaveBDGKPSW #behaviour #concurrent #gpu #programming
GPU Concurrency: Weak Behaviours and Programming Assumptions (JA, MB, AFD, GG, JK, DP, TS, JW), pp. 577–591.
HPDCHPDC-2015-WangZQLMR #consistency #distributed #scalability #towards
Towards Scalable Distributed Workload Manager with Monitoring-Based Weakly Consistent Resource Stealing (KW, XZ, KQ, ML, BM, IR), pp. 219–222.
CADECADE-2015-SakaiOO #confluence
Non-E-Overlapping, Weakly Shallow, and Non-Collapsing TRSs are Confluent (MS, MO, MO), pp. 111–126.
CSLCSL-2015-BrihayeBMR #reachability
Weak Subgame Perfect Equilibria and their Application to Quantitative Reachability (TB, VB, NM, JFR), pp. 504–518.
ICLPICLP-J-2015-LawRB #constraints #learning #programming #set
Learning weak constraints in answer set programming (ML, AR, KB), pp. 511–525.
LICSLICS-2015-Carreiro #bisimulation #invariant #logic
PDL Is the Bisimulation-Invariant Fragment of Weak Chain Logic (FC), pp. 341–352.
WRLAWRLA-2014-LucasM #order #termination
Strong and Weak Operational Termination of Order-Sorted Rewrite Theories (SL, JM), pp. 178–194.
PLDIPLDI-2014-AlglaveMT #memory management #modelling #simulation #testing
Herding cats: modelling, simulation, testing, and data-mining for weak memory (JA, LM, MT), p. 7.
STOCSTOC-2014-Massoulie #community #detection
Community detection thresholds and the weak Ramanujan property (LM), pp. 694–703.
ICALPICALP-v1-2014-AaronsonABB
Weak Parity (SA, AA, KB, MB), pp. 26–38.
ICALPICALP-v2-2014-Bojanczyk14a #infinity #quantifier
Weak MSO+U with Path Quantifiers over Infinite Trees (MB), pp. 38–49.
ICALPICALP-v2-2014-Chatterjee0 #game studies
Games with a Weak Adversary (KC, LD), pp. 110–121.
ICALPICALP-v2-2014-GoncharovP #algebra #bisimulation #equation #monad #recursion
Coalgebraic Weak Bisimulation from Recursive Equations over Monads (SG, DP), pp. 196–207.
ICMLICML-c2-2014-XuTXR #reduction
Large-margin Weakly Supervised Dimensionality Reduction (CX, DT, CX, YR), pp. 865–873.
KDDKDD-2014-LiuWY #algorithm #performance
An efficient algorithm for weak hierarchical lasso (YL, JW, JY), pp. 283–292.
SIGIRSIGIR-2014-HingmireC #approach #classification #topic
Topic labeled text classification: a weakly supervised approach (SH, SC), pp. 385–394.
OOPSLAOOPSLA-2014-TuronVD #memory management #named #navigation #protocol
GPS: navigating weak memory with ghosts, protocols, and separation (AT, VV, DD), pp. 691–707.
SACSAC-2014-OmatuY #classification #smell #using
Smell classification using weakly responding data (SO, MY), pp. 213–214.
HPCAHPCA-2014-PariharH #approach #dependence #metaheuristic
Accelerating decoupled look-ahead via weak dependence removal: A metaheuristic approach (RP, MCH), pp. 662–677.
LICSLICS-CSL-2014-CarreiroFVZ #automaton #similarity
Weak MSO: automata and expressiveness modulo bisimilarity (FC, AF, YV, FZ), p. 27.
LICSLICS-CSL-2014-CharatonikKM #decidability #logic #transitive
Decidability of weak logics with deterministic transitive closure (WC, EK, FM), p. 10.
LICSLICS-CSL-2014-Haase #subclass
Subclasses of presburger arithmetic and the weak EXP hierarchy (CH), p. 10.
SMTSMT-2014-ChristH #array
Weakly Equivalent Arrays (JC, JH), pp. 39–49.
ICDARICDAR-2013-RoySSJ #documentation #n-gram #segmentation #using
Character N-Gram Spotting on Handwritten Documents Using Weakly-Supervised Segmentation (UR, NS, KPS, CVJ), pp. 577–581.
ESOPESOP-2013-AlglaveKNT #memory management #program transformation #verification
Software Verification for Weak Memory via Program Transformation (JA, DK, VN, MT), pp. 512–532.
ESOPESOP-2013-JagadeesanPPR #composition #memory management #modelling #reasoning
Quarantining Weakness — Compositional Reasoning under Relaxed Memory Models (Extended Abstract) (RJ, GP, CP, JR), pp. 492–511.
ICALPICALP-v2-2013-JurdzinskiKS #distributed #network
Distributed Deterministic Broadcasting in Wireless Networks of Weak Devices (TJ, DRK, GS), pp. 632–644.
ICFPICFP-2013-Balabonski
Weak optimality, and the meaning of sharing (TB), pp. 263–274.
CSCWCSCW-2013-BurkeK #difference #facebook #using
Using facebook after losing a job: differential benefits of strong and weak ties (MB, RK), pp. 1419–1430.
CIKMCIKM-2013-FangHZ #analysis #bibliography #sentiment
Exploring weakly supervised latent sentiment explanations for aspect-level review analysis (LF, MH, XZ), pp. 1057–1066.
SEKESEKE-2013-Al-JamimiA #design pattern #detection #prolog #using
Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (S) (HAAJ, MAA), pp. 727–730.
SIGIRSIGIR-2013-BonnefoyBB #detection #documentation
A weakly-supervised detection of entity central documents in a stream (LB, VB, PB), pp. 769–772.
PPDPPPDP-2013-ChristiansenHRS #encapsulation #functional #logic programming #semantics #source code
A semantics for weakly encapsulated search in functional logic programs (JC, MH, FR, DS), pp. 49–60.
PPoPPPPoPP-2013-LePCN #memory management #modelling #performance
Correct and efficient work-stealing for weak memory models (NML, AP, AC, FZN), pp. 69–80.
CADECADE-2013-BaumgartnerW #abstraction
Hierarchic Superposition with Weak Abstraction (PB, UW), pp. 39–57.
CSLCSL-2013-ColcombetKLB #automaton
Deciding the weak definability of Büchi definable tree languages (TC, DK, CL, MVB), pp. 215–230.
LICSLICS-2013-HofmanMT #decidability #simulation
Decidability of Weak Simulation on One-Counter Nets (PH, RM, PT), pp. 203–212.
LICSLICS-2013-Riba #infinity #word
Forcing MSO on Infinite Words in Weak MSO (CR), pp. 448–457.
ICSTSAT-2013-MisraORS #bound #detection #set
Upper and Lower Bounds for Weak Backdoor Set Detection (NM, SO, VR, SS), pp. 394–402.
PODSPODS-2012-Tao #2d #constant
Indexability of 2D range search revisited: constant redundancy and weak indivisibility (YT), pp. 131–142.
ESOPESOP-2012-AtigBBM #decidability #memory management #modelling #question #what
What’s Decidable about Weak Memory Models? (MFA, AB, SB, MM), pp. 26–46.
ICSMEICSM-2012-QianZ #java #memory management
Inferring weak references for fixing Java memory leaks (JQ, XZ), pp. 571–574.
ICSMEICSM-2012-QiML #automation #performance #scalability #source code #using
Making automatic repair for large-scale programs more efficient using weak recompilation (YQ, XM, YL), pp. 254–263.
CIAACIAA-2012-AmaviCR #recursion #xml
Weak Inclusion for Recursive XML Types (JA, JC, PR), pp. 78–89.
LATALATA-2012-IbarraT #automaton #multi #turing machine
Weak Synchronization and Synchronizability of Multitape Pushdown Automata and Turing Machines (OHI, NQT), pp. 337–350.
CIKMCIKM-2012-LuZZX #image #learning #scalability #semantics #set
Semantic context learning with large-scale weakly-labeled image set (YL, WZ, KZ, XX), pp. 1859–1863.
ICMLICML-2012-JoulinB #classification
A convex relaxation for weakly supervised classifiers (AJ, FRB), p. 171.
ICPRICPR-2012-AbouelenienY #analysis #fault #named #performance
SampleBoost: Improving boosting performance by destabilizing weak learners based on weighted error analysis (MA, XY), pp. 585–588.
ICPRICPR-2012-BougesCBL #classification #nearest neighbour #using
Using k-nearest neighbors to handle missing weak classifiers in a boosted cascade (PB, TC, CB, GL), pp. 1763–1766.
QAPLQAPL-2012-Bernardo #bisimulation #concurrent #markov #process
Weak Markovian Bisimulation Congruences and Exact CTMC-Level Aggregations for Concurrent Processes (MB), pp. 122–136.
CSLCSL-2012-AltenkirchR #approach
A Syntactical Approach to Weak ω-Groupoids (TA, OR), pp. 16–30.
CSLCSL-2012-Cook #complexity #proving
Connecting Complexity Classes, Weak Formal Theories, and Propositional Proof Systems (Invited Talk) (SAC), pp. 9–11.
ICSTICST-2012-DurelliOD #mutation testing #testing #towards #virtual machine
Toward Harnessing High-Level Language Virtual Machines for Further Speeding Up Weak Mutation Testing (VHSD, JO, MED), pp. 681–690.
CIAACIAA-2011-AmaviCAR #xml
Weak Inclusion for XML Types (JA, JC, MHFA, PR), pp. 30–41.
ECIRECIR-2011-He #classification #sentiment
Latent Sentiment Model for Weakly-Supervised Cross-Lingual Sentiment Classification (YH), pp. 214–225.
KDIRKDIR-2011-Jean-LouisBFD #approach #scalability
A Weakly Supervised Approach for Large-scale Relation Extraction (LJL, RB, OF, AD), pp. 94–103.
MLDMMLDM-2011-MohebzadaRR #analysis #constraints #generative
Sensitivity Analysis for Weak Constraint Generation (JGM, MMR, GR), pp. 239–252.
SIGIRSIGIR-2011-WangHH #image #mining #search-based #web
Mining weakly labeled web facial images for search-based face annotation (DW, SCHH, YH), pp. 535–544.
MODELSMoDELS-2011-BavotaGOLTGC #comprehension #diagrams #identification #uml
Identifying the Weaknesses of UML Class Diagrams during Data Model Comprehension (GB, CG, RO, ADL, GT, MG, JACL), pp. 168–182.
MODELSMoDELS-2011-BavotaGOLTGC #comprehension #diagrams #identification #uml
Identifying the Weaknesses of UML Class Diagrams during Data Model Comprehension (GB, CG, RO, ADL, GT, MG, JACL), pp. 168–182.
PPoPPPPoPP-2011-RoyHH #consistency #memory management
Weak atomicity under the x86 memory consistency model (AR, SH, TLH), pp. 291–292.
CAVCAV-2011-AlglaveM #memory management #modelling
Stability in Weak Memory Models (JA, LM), pp. 50–66.
DACDAC-2010-ShenTX #algorithm #analysis #correlation #linear #power management #statistics
A linear algorithm for full-chip statistical leakage power analysis considering weak spatial correlation (RS, SXDT, JX), pp. 481–486.
ESOPESOP-2010-DilligDA
Fluid Updates: Beyond Strong vs. Weak Updates (ID, TD, AA), pp. 246–266.
TACASTACAS-2010-BauerMSH #on the #refinement
On Weak Modal Compatibility, Refinement, and the MIO Workbench (SSB, PM, AS, RH), pp. 175–189.
PLDIPLDI-2010-WestbrookRIYAT #java #multi #named #programming #using
Mint: Java multi-stage programming using weak separability (EMW, MR, JI, YY, TA, WT), pp. 400–411.
AFLAFL-J-2008-Blanchet-SadriOR10 #theorem #word
Fine and Wilf’s Theorem for Partial Words with Arbitrarily Many Weak Periods (FBS, TO, TDR), pp. 705–722.
ICALPICALP-v1-2010-Ambos-SpiesB #exponential
Weak Completeness Notions for Exponential Time (KAS, TB), pp. 503–514.
ICPRICPR-2010-AndoF #classification #image #segmentation
Human-Area Segmentation by Selecting Similar Silhouette Images Based on Weak-Classifier Response (HA, HF), pp. 3444–3447.
ICPRICPR-2010-ThiCZWS #modelling #recognition #using
Weakly Supervised Action Recognition Using Implicit Shape Models (THT, LC, JZ, LW, SS), pp. 3517–3520.
ICPRICPR-2010-YouLJ #automation #image
Automatic Weak Calibration of Master-Slave Surveillance System Based on Mosaic Image (LY, SL, WJ), pp. 1824–1827.
SEKESEKE-2010-Yeh #animation #human-computer #interactive #learning
The effects of human-computer interaction modes for weak learners in an animation learning environment (YFY), pp. 18–23.
POPLPOPL-2010-AtigBBM #memory management #modelling #on the #problem #verification
On the verification problem for weak memory models (MFA, AB, SB, MM), pp. 7–18.
SACSAC-OOPS-J-2008-LogozzoF10 #abstract domain #array #named #performance #relational #validation
Pentagons: A weakly relational abstract domain for the efficient validation of array accesses (FL, MF), pp. 796–807.
SACSAC-2010-Niu #energy #realtime #scalability
Energy-aware dual-mode voltage scaling for weakly hard real-time systems (LN), pp. 321–325.
CAVCAV-2010-AlglaveMSS #memory management #modelling
Fences in Weak Memory Models (JA, LM, SS, PS), pp. 258–272.
CSLCSL-2010-GanzowK #algorithm #higher-order #induction #logic #monad
New Algorithm for Weak Monadic Second-Order Logic on Inductive Structures (TG, LK), pp. 366–380.
LICSLICS-2010-JohanssonBPV #calculus
Weak Equivalences in Psi-Calculi (MJ, JB, JP, BV), pp. 322–331.
RTARTA-2010-EndrullisGHKO #normalisation #orthogonal
Unique Normal Forms in Infinitary Weakly Orthogonal Rewriting (JE, CG, DH, JWK, VvO), pp. 85–102.
RTARTA-2010-Simonsen #convergence #normalisation
Weak Convergence and Uniform Normalization in Infinitary Rewriting (JGS), pp. 311–324.
ICDARICDAR-2009-BarratT #image #modelling #network #using
Modeling, Classifying and Annotating Weakly Annotated Images Using Bayesian Network (SB, ST), pp. 1201–1205.
STOCSTOC-2009-DodisW #encryption #symmetry
Non-malleable extractors and symmetric key cryptography from weak secrets (YD, DW), pp. 601–610.
ICALPICALP-v2-2009-ParysW #automaton
Weak Alternating Timed Automata (PP, IW), pp. 273–284.
AdaEuropeAdaEurope-2009-KaiserP #java #multi #semantics #thread
Weak Fairness Semantic Drawbacks in Java Multithreading (CK, JFPP), pp. 90–104.
KDDKDD-2009-XuYL #mining #using
Named entity mining from click-through data using weakly supervised latent dirichlet allocation (GX, SHY, HL), pp. 1365–1374.
SACSAC-2009-ArbelaezH #dependence
Exploiting weak dependencies in tree-based search (AA, YH), pp. 1385–1391.
LICSLICS-2009-CreusGMT #normalisation #term rewriting
Non-linear Rewrite Closure and Weak Normalization (CC, GG, FM, AT), pp. 365–374.
TLCATLCA-2009-Lumsdaine #type system
Weak ω-Categories from Intensional Type Theory (PLL), pp. 172–187.
AFLAFL-2008-Blanchet-SadriOR #word
Computing Weak Periods of Partial Words (FBS, TO, TDR), pp. 134–145.
ICALPICALP-C-2008-HochS #on the
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak (JJH, AS), pp. 616–630.
ICALPICALP-C-2008-PietrzakS #pseudo
Weak Pseudorandom Functions in Minicrypt (KP, JS), pp. 423–436.
ICGTICGT-2008-Heindel #category theory #morphism
Grammar Morphisms and Weakly Adhesive Categories (TH), pp. 493–495.
ICEISICEIS-HCI-2008-StoitsevSFM08a #modelling #process #programming
Enabling end Users to Proactively Tailor Underspecified, Human-Centric Business Processes — “Programming by Example” of Weakly-Structured Process Models (TS, SS, FF, MM), pp. 38–46.
ICEISICEIS-J-2008-StoitsevSFM08b #modelling #process #programming
Enabling End Users to Proactively Tailor Underspecified, Human-Centric Business Processes: “Programming by Example” of Weakly-Structured Process Models (TS, SS, FF, MM), pp. 307–320.
ICPRICPR-2008-FabletLSMCB #learning #using
Weakly supervised learning using proportion-based information: An application to fisheries acoustics (RF, RL, CS, JM, PC, JMB), pp. 1–4.
ICPRICPR-2008-ZhuBQ #lazy evaluation #learning
Bagging very weak learners with lazy local learning (XZ, CB, WQ), pp. 1–4.
SACSAC-2008-LogozzoF #abstract domain #array #named #performance #relational #validation
Pentagons: a weakly relational abstract domain for the efficient validation of array accesses (FL, MF), pp. 184–188.
LICSLICS-2008-Edalat
Weak Topology and a Differentiable Operator for Lipschitz Maps (AE), pp. 364–375.
DATEDATE-2007-NiuQ #energy #interactive #realtime #scheduling
Interactive presentation: Peripheral-conscious scheduling on energy minimization for weakly hard real-time systems (LN, GQ), pp. 791–796.
HTHT-2007-CanosSPL #design #process
Strong vs. weak links: making processes prevail over structure in navigational design (JHC, CS, MdCP, ML), pp. 139–140.
LATALATA-2007-KutribR #automaton #regular expression
Succinct Description of Regular Languages by Weak Restarting Automata (MK, JR), pp. 343–354.
CIKMCIKM-2007-Pasca07a #query #using #web
Weakly-supervised discovery of named entities using web search queries (MP), pp. 683–690.
SIGIRSIGIR-2007-LiLHC #ad hoc #corpus #query #using #wiki
Improving weak ad-hoc queries using wikipedia as external corpus (YL, RWPL, EKSH, KFLC), pp. 797–798.
TLCATLCA-2007-JiangZ
Weakly Distributive Domains (YJ, GQZ), pp. 194–206.
PLDIPLDI-2006-DhurjatiKA #alias #analysis #named
SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
DLTDLT-2006-SanteanY #ambiguity #finite #on the #transducer
On Weakly Ambiguous Finite Transducers (NS, SY), pp. 156–167.
EDOCEDOC-2006-ErnstLSW #architecture #enterprise #tool support
Tool Support for Enterprise Architecture Management — Strengths and Weaknesses (AME, JL, CMS, AW), pp. 13–22.
CIKMCIKM-2006-QianXWC #adaptation #categorisation
Adapting association patterns for text categorization: weaknesses and enhancements (TQ, HX, YW, EC), pp. 782–783.
CIKMCIKM-2006-TomasicSZ
Processing information intent via weak labeling (AT, IS, JZ), pp. 856–857.
ICPRICPR-v2-2006-ZhengLY #kernel #learning #problem
Weakly Supervised Learning on Pre-image Problem in Kernel Methods (WSZ, JHL, PCY), pp. 711–715.
ISMMISMM-2006-DonnellyHK #semantics
Formal semantics of weak references (KD, JJH, AJK), pp. 126–137.
CAVCAV-2006-HeljankoJKLL #automaton #bound #model checking
Bounded Model Checking for Weak Alternating Büchi Automata (KH, TAJ, MK, ML, TL), pp. 95–108.
CSLCSL-2006-HarwoodMS #bisimulation
Weak Bisimulation Approximants (WH, FM, AS), pp. 365–379.
DATEDATE-2005-MartensG #integration #orthogonal #polynomial #simulation #using
Time-Domain Simulation of Sampled Weakly Nonlinear Systems Using Analytical Integration and Orthogonal Polynomial Series (EM, GGEG), pp. 120–125.
SASSAS-2005-BagnaraHMZ #abstraction
Widening Operators for Weakly-Relational Numeric Abstractions (RB, PMH, EM, EZ), pp. 3–18.
STOCSTOC-2005-Holenstein
Key agreement from weak bit agreement (TH), pp. 664–673.
STOCSTOC-2005-Raz #random
Extractors with weak random seeds (RR), pp. 11–20.
ICALPICALP-2005-Pous #bisimulation
Up-to Techniques for Weak Bisimulation (DP), pp. 730–741.
CSLCSL-2005-BrattkaS #axiom #sequence
Computing with Sequences, Weak Topologies and the Axiom of Choice (VB, MS), pp. 462–476.
CSLCSL-2005-Kolokolova #bound
Closure Properties of Weak Systems of Bounded Arithmetic (AK), pp. 369–383.
VMCAIVMCAI-2005-Lange #automaton #calculus #linear
Weak Automata for the Linear Time µ-Calculus (ML), pp. 267–281.
CIKMCIKM-2004-Zhang #classification #information management
Weakly-supervised relation classification for information extraction (ZZ), pp. 581–588.
KRKR-2004-Lukasiewicz #logic #probability
Weak Nonmonotonic Probabilistic Logics (TL), pp. 23–33.
ICSEICSE-2004-OReilly #approach #coordination
A Weakly Constrained Approach to Software Change Coordination (CO), pp. 66–68.
IJCARIJCAR-2004-GanzingerSW #composition #proving #similarity
Modular Proof Systems for Partial Functions with Weak Equality (HG, VSS, UW), pp. 168–182.
LICSLICS-2004-CookT
The Strength of Replacement in Weak Arithmetic (SAC, NT), pp. 256–264.
DACDAC-2003-LiP #named #order #reduction
NORM: compact model order reduction of weakly nonlinear systems (PL, LTP), pp. 472–477.
DATEDATE-2003-DobrovolnyVWD #analysis #modelling
Analysis and White-Box Modeling of Weakly Nonlinear Time-Varying Circuits (PD, GV, PW, SD), pp. 10624–10629.
FASEFASE-2003-Morasca #approach #metric
Foundations of a Weak Measurement-Theoretic Approach to Software Measurement (SM), pp. 200–215.
STOCSTOC-2003-BatuEKMRRS #algorithm #approximate #distance #edit distance #sublinear
A sublinear algorithm for weakly approximating edit distance (TB, FE, JK, AM, SR, RR, RS), pp. 316–324.
CIAACIAA-2003-Ravikumar #algorithm #automaton
Weak Minimization of DFA — An Algorithm and Applications (BR), pp. 226–238.
ICALPICALP-2003-Mayr #bisimulation #equivalence #process
Undecidability of Weak Bisimulation Equivalence for 1-Counter Processes (RM), pp. 570–583.
SEFMSEFM-2003-LanotteMT #automaton #bisimulation #probability #security
Weak Bisimulation for Probabilistic Timed Automata and Applications to Security (RL, AMS, AT), pp. 34–43.
PPDPPPDP-2003-Escobar
Refining weakly outermost-needed rewriting and narrowing (SE), pp. 113–123.
STOCSTOC-2002-Raz02a #bound #principle
Resolution lower bounds for the weak pigeonhole principle (RR), pp. 553–562.
DLTDLT-2002-Srba #similarity
Undecidability of Weak Bisimilarity for PA-Processes (JS), pp. 197–208.
ICMLICML-2002-BockhorstC #concept
Exploiting Relations Among Concepts to Acquire Weakly Labeled Training Data (JB, MC), pp. 43–50.
ICMLICML-2002-Seewald #how #performance
How to Make Stacking Better and Faster While Also Taking Care of an Unknown Weakness (AKS), pp. 554–561.
ICPRICPR-v1-2002-YuanGYW #modelling #recognition
Recognition of Strong and Weak Connection Models in Continuous Sign Language (QY, WG, HY, CW), pp. 75–78.
KDDKDD-2002-JoshiAK #predict #question
Predicting rare classes: can boosting make any weak learner strong? (MVJ, RCA, VK), pp. 297–306.
CAVCAV-2002-ChatterjeeSG #consistency #memory management #model checking #modelling #protocol #refinement #verification
Shared Memory Consistency Protocol Verification Against Weak Memory Models: Refinement via Model-Checking (PC, HS, GG), pp. 123–136.
CSLCSL-2002-ChernovSSV #logic
Variants of Realizability for Propositional Formulas and the Logic of the Weak Law of Excluded Middle (AVC, DPS, EZS, NKV), pp. 74–88.
LICSLICS-2002-DesharnaisJGP #bisimulation #metric #probability #process
The Metric Analogue of Weak Bisimulation for Probabilistic Processes (JD, RJ, VG, PP), pp. 413–422.
RTARTA-2002-Forest #calculus #pattern matching
A Weak Calculus with Explicit Operators for Pattern Matching and Substitution (JF), pp. 174–191.
VMCAIVMCAI-2002-TorreMN #automaton
Weak Muller Acceptance Conditions for Tree Automata (SLT, AM, MN), pp. 240–254.
FoSSaCSFoSSaCS-2001-Stirling #decidability #parallel #process #set #similarity
Decidability of Weak Bisimilarity for a Subset of Basic Parallel Processes (CS), pp. 379–393.
ICSMEICSM-2001-TonellaP #c++ #diagrams #reverse engineering #uml
Reverse Engineering of the UML Class Diagram from C++ Code in Presence of Weakly Typed Containers (PT, AP), pp. 376–385.
STOCSTOC-2001-PitassiR #bound #principle
Regular resolution lower bounds for the weak pigeonhole principle (TP, RR), pp. 347–355.
ICALPICALP-2001-AtseriasBE #bound
Lower Bounds for the Weak Pigeonhole Principle Beyond Resolution (AA, MLB, JLE), pp. 1005–1016.
ICMLICML-2001-IvanovBP
Expectation Maximization for Weakly Labeled Data (YAI, BB, AP), pp. 218–225.
IJCARIJCAR-2001-BoigelotJW #automaton #integer #linear #on the
On the Use of Weak Automata for Deciding Linear Arithmetic with Integer and Real Variables (BB, SJ, PW), pp. 611–625.
RTARTA-2001-LimetRS
Weakly Regular Relations and Applications (SL, PR, HS), pp. 185–200.
DACDAC-2000-Phillips #framework #reduction
Projection frameworks for model reduction of weakly nonlinear systems (JRP), pp. 184–189.
STOCSTOC-2000-MacielPW #principle #proving
A new proof of the weak pigeonhole principle (AM, TP, ARW), pp. 368–377.
TOOLSTOOLS-USA-2000-HeberleLNZ #type system
Weak Subtyping and Genericity (AH, WL, RN, WZ), pp. 149–158.
ISMMISMM-2000-AgesenG #performance
Efficient Object Sampling via Weak References (OA, AG), pp. 121–126.
CSLCSL-2000-ComonC
Flatness Is Not a Weakness (HC, VC), pp. 262–276.
TACASTACAS-1999-LiC #bisimulation #congruence #process
Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing Processes (ZL, HC), pp. 300–314.
DLTDLT-1999-Platek
Weak cyclic forms of rw-automata (MP), pp. 115–124.
IFLIFL-1999-JonesME #haskell #pointer
Stretching the Storage Manager: Weak Pointers and Stable Names in Haskell (SLPJ, SM, CE), pp. 37–58.
LICSLICS-1999-FioreCW #bisimulation
Weak Bisimulation and Open Maps (MPF, GLC, GW), pp. 67–76.
LICSLICS-1999-Johannsen #bound #problem
Weak Bounded Arithmetic, the Diffie-Hellman Problem and Constable’s Class K (JJ), pp. 268–274.
RTARTA-1999-Oostrom #normalisation #orthogonal
Normalisation in Weakly Orthogonal Rewriting (VvO), pp. 60–74.
STOCSTOC-1998-KupfermanV #automaton
Weak Alternating Automata and Tree Automata Emptiness (OK, MYV), pp. 224–233.
ICALPICALP-1998-LiC #bisimulation #congruence #π-calculus
Checking Strong/Weak Bisimulation Equivalences and Observation Congruence for the π-Calculus (ZL, HC), pp. 707–718.
ICPRICPR-1998-LeiW #detection #novel #symmetry
A novel method for detecting and localising of reflectional and rotational symmetry under weak perspective projection (YL, KCW), pp. 417–419.
TOOLSTOOLS-USA-1998-LoweNTZ #inheritance #type system
Weak Subtyping — Yet Another Notion of Inheritance (WL, RN, MT, WZ), pp. 333–345.
LICSLICS-1998-KupfermanV #linear
Freedom, Weakness, and Determinism: From Linear-Time to Branching-Time (OK, MYV), pp. 81–92.
SOSPSOSP-1997-PetersenSTTD #consistency #flexibility #replication
Flexible Update Propagation for Weakly Consistent Replication (KP, MS, DBT, MT, AJD), pp. 288–301.
CAVCAV-1997-BaierH #bisimulation #probability #process
Weak Bisimulation for Fully Probabilistic Processes (CB, HH), pp. 119–130.
CSLCSL-1997-BussP #principle
Resolution and the Weak Pigeonhole Principle (SRB, TP), pp. 149–156.
TLCATLCA-1997-Herbelin #game studies #reduction
Games and Weak-Head Reduction for Classical PCF (HH), pp. 214–230.
TLCATLCA-1997-Xi #normalisation #λ-calculus
Weak and Strong β Normalisations in Typed λ-Calculi (HX), pp. 390–404.
STOCSTOC-1996-Ta-Shma #on the #random
On Extracting Randomness From Weak Random Sources (Extended Abstract) (ATS), pp. 276–285.
ICFPICFP-1996-FerreiraHJ #bisimulation #formal method
A Theory of Weak Bisimulation for Core CML (WF, MH, AJ), pp. 201–212.
ICPRICPR-1996-LakshmananW #bound #detection #image
Detection of bounded weak echo regions in meteorological radar images (VL, AW), pp. 895–899.
PPDPPLILP-1996-BenaissaLR #modelling #recursion #reduction #using
Modeling Sharing and Recursion for Weak Reduction Strategies Using Explicit Substitution (ZEAB, PL, KHR), pp. 393–407.
SACSAC-1996-Lenz #adaptation #consistency #data transformation #distributed
Adaptive distributed data management with weak consistent replicated data (RL), pp. 178–185.
CSLCSL-1996-Ingolfsdottir #semantics
Weak Semantics Based on Lighted Button Pressing Experiments (AI), pp. 226–243.
LICSLICS-1996-Edalat
The Scott Topology Induces the Weak Topology (AE), pp. 372–381.
ICALPICALP-1995-FennerLM #sequence
Weakly Useful Sequences (SAF, JHL, EM), pp. 393–404.
SOSPSOSP-1995-MummertES #mobile
Exploiting Weak Connectivity for Mobile File Access (LBM, ME, MS), pp. 143–155.
SOSPSOSP-1995-TerryTPDSH
Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System (DBT, MT, KP, AJD, MS, CH), pp. 172–183.
STOCSTOC-1994-BlumFJKMR #analysis #fourier #learning #query #statistics #using
Weakly learning DNF and characterizing statistical query learning using Fourier analysis (AB, MLF, JCJ, MJK, YM, SR), pp. 253–262.
SACSAC-1994-GaryE #flexibility #semantics
A flexible marker-passer for semantically weak search (KG, JJED), pp. 313–317.
HPDCHPDC-1994-AgrawalCLS #using
Investigating Weak Memories Using Maya (DA, MC, HVL, AKS), pp. 123–130.
ICDARICDAR-1993-CullenE #documentation #image #segmentation
Weak model-dependent page segmentation and skew correction for processing document images (JFC, KE), pp. 757–760.
STOCSTOC-1993-ChazelleEGGSW #bound #set
Improved bounds on weak epsilon-nets for convex sets (BC, HE, MG, LJG, MS, EW), pp. 495–504.
FPCAFPCA-1993-Yoshida #reduction #λ-calculus
Optimal Reduction in Weak-λ-calculus with Shared Environments (NY), pp. 243–254.
LISPLFP-1992-MullerZ #abstract interpretation
Abstract Interpretation in Weak Powerdomains (RM, YZ), pp. 119–126.
CSCWCSCW-1992-PickeringK #communication
Hardwiring Weak Ties: Individual and Institutional Issues in Computer Mediated Communication (JMP, JLK), pp. 356–361.
ICLPJICSLP-1992-FerrandD #correctness #logic programming #proving #source code
Proof Method of Partial Correctness and Weak Completeness for Normal Logic Programs (GF, PD), pp. 161–174.
POPLPOPL-1991-Maranget #orthogonal #term rewriting #λ-calculus
Optimal Derivations in Weak λ-calculi and in Orthogonal Terms Rewriting Systems (LM), pp. 255–269.
RTARTA-1991-Baader #bound #problem #unification
Unification, Weak Unification, Upper Bound, Lower Bound, and Generalization Problems (FB), pp. 86–97.
RTARTA-1991-CurienG #confluence #normalisation #on the
On Confluence for Weakly Normalizing Systems (PLC, GG), pp. 215–225.
ISSTATAV-1991-Marick
The Weak Mutation Hypothesis (BM), pp. 190–199.
ISSTATAV-1991-OffuttL #how #question
How Strong is Weak Mutation? (AJO, SDL), pp. 200–213.
SIGMODSIGMOD-1990-AtzeniT #independence #performance
Efficient Updates to Independent Schemes in the Weak Instance Model (PA, RT), pp. 84–93.
ESOPESOP-1990-SchnoebelenP #logic #on the
On the Weak Adequacy of Branching-Time Remporal Logic (PS, SP), pp. 377–388.
PODSPODS-1989-AtzeniT #database
Updating Databases in the Weak Instance Model (PA, RT), pp. 101–109.
CSLCSL-1989-KrajicekP #modelling
Propositional Provability and Models of Weak Arithmetic (JK, PP), pp. 193–210.
ICLPNACLP-1989-CasanovaGS #logic programming #source code
Computing Answers to Logic Programs with Weak Model Elimination (MAC, RAdTG, AS), pp. 92–114.
ICLPJICSCP-1988-LoboMR88 #source code
Weak Completion Theory for Non-Horn Programs (JL, JM, AR), pp. 828–842.
ICLPJICSCP-1988-PrzymusinskaP88 #logic programming #semantics #source code
Weakly Perfect Model Semantics for Logic Programs (HP, TCP), pp. 1106–1120.
LICSLICS-1988-MullerSS #automaton #decidability #exponential #logic #why
Weak Alternating Automata Give a Simple Explanation of Why Most Temporal and Dynamic Logics are Decidable in Exponential Time (DEM, AS, PES), pp. 422–427.
PODSPODS-1987-AtzeniB
A New Basis for the Weak Instance Model (PA, MCDB), pp. 79–86.
ESECESEC-1987-Craigen #verification
Strengths and Weaknesses of Program Verification Systems (DC), pp. 396–404.
CSLCSL-1987-BohmP #combinator #finite #reduction #set
Surjectivity for Finite Sets of Combinators by Weak Reduction (CB, AP), pp. 27–43.
PODSPODS-1986-Gadia
Weak Temporal Relations (SKG), pp. 70–77.
ICALPICALP-1986-MullerSS #automaton #complexity #monad
Alternating Automata. The Weak Monadic Theory of the Tree, and its Complexity (DEM, AS, PES), pp. 275–283.
LICSLICS-1986-MakowskyS #equivalence #higher-order #on the #semantics #standard #verification
On the Equivalence of Weak Second Order and Nonstandard Time Semantics For Various Program Verification Systems (JAM, IS), pp. 293–300.
ICSEICSE-1985-GirgisW #analysis #data flow #testing #using
An Integrated System for Program Testing Using Weak Mutation and Data Flow Analysis (MRG, MRW), pp. 313–319.
PODSPODS-1984-FischerG #dependence #multi
Weak Multivalued Dependencies (PCF, DVG), pp. 266–274.
PODSPODS-1984-Yannakakis #query
Querying Weak Instances (MY), pp. 275–280.
STOCSTOC-1981-JosephY #modelling #performance #polynomial #source code
Fast Programs for Initial Segments and Polynomial Time Computation in Weak Models of Arithmetic (Preliminary Abstract) (DJ, PY), pp. 55–61.
DACDAC-1980-Sidle #database
Weaknesses of commercial data base management systems in engineering applications (TS), pp. 57–61.
STOCSTOC-1974-Rackoff #complexity #on the
On the Complexity of the Theories of Weak Direct Products: A Preliminary Report (CR), pp. 149–160.
STOCSTOC-1974-Robertson #complexity #higher-order #monad
Structure of Complexity in the Weak Monadic Second-Order Theories of the Natural Numbers (ELR), pp. 161–171.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.