Tag #bound
1558 papers:
POPL-2020-HarkKGK #induction #probability #verification- Aiming low is harder: induction for lower bounds in probabilistic program verification (MH, BLK, JG, JPK), p. 28.
ASPLOS-2020-AngstadtJW #automaton #kernel #learning #legacy #string- Accelerating Legacy String Kernels via Bounded Automata Learning (KA, JBJ, WW), pp. 235–249.
CGO-2020-OjogboTV #automation- Secure automatic bounds checking: prevention is simpler than cure (EJO, MT, TNV), pp. 43–55.
CSL-2020-Tzameret #proving- From Classical Proof Theory to P versus NP: a Guide to Bounded Theories (Invited Talk) (IT), p. 2.
CIAA-2019-Okhotin #automaton- Graph-Walking Automata: From Whence They Come, and Whither They are Bound (AO), pp. 10–29.
DLT-2019-AzfarCCJ #linear #matrix #set- A Linear Bound on the K-Rendezvous Time for Primitive Sets of NZ Matrices (UA, CC, LC, RMJ), pp. 59–73.
DLT-2019-BhaveKPT #context-sensitive grammar #on the- On Timed Scope-Bounded Context-Sensitive Languages (DB, SNK, RP, AT0), pp. 168–181.
DLT-2019-Frid - First Lower Bounds for Palindromic Length (AEF), pp. 234–243.
DLT-2019-Gao #complexity #education #pattern matching- The Teaching Complexity of Erasing Pattern Languages with Bounded Variable Frequency (ZG), pp. 154–167.
FSCD-2019-Ikebuchi - A Lower Bound of the Number of Rewrite Rules Obtained by Homological Methods (MI), p. 17.
SEFM-2019-RouxT #verification- Partially Bounded Context-Aware Verification (LLR, CT), pp. 532–548.
DiGRA-2019-Fleet #trust- Boundaries, Trust and Reputation in Virtual and Illicit Markets (RF).
DiGRA-2019-Ford #game studies- Beyond the Wall: The Boundaries of the Neomedieval Town in Singleplayer Roleplaying Games (DF).
CIKM-2019-FujiwaraIKKAU #algorithm #incremental #performance #random- Fast Random Forest Algorithm via Incremental Upper Bound (YF, YI, SK, AK, JA, NU), pp. 2205–2208.
CIKM-2019-WangCCCHHLC #interactive #mining #mobile #named #process #visualisation- TraVis: An Interactive Visualization System for Mining Inbound Traveler Activities by Leveraging Mobile Ad Request Data (PXW, HC, WQC, CCC, YHH, THH, YL, CHC), pp. 2881–2884.
ICML-2019-AminKMV #difference #privacy #trade-off- Bounding User Contributions: A Bias-Variance Trade-off in Differential Privacy (KA, AK, AMM, SV), pp. 263–271.
ICML-2019-Chen #analysis #consistency #fault #kernel #nearest neighbour- Nearest Neighbor and Kernel Survival Analysis: Nonasymptotic Error Bounds and Strong Consistency Rates (GHC), pp. 1001–1010.
ICML-2019-LiuTC #on the- On Certifying Non-Uniform Bounds against Adversarial Attacks (CL, RT, VC), pp. 4072–4081.
ICML-2019-PolianskiiP #approach #classification #geometry #integration #monte carlo- Voronoi Boundary Classification: A High-Dimensional Geometric Approach via Weighted Monte Carlo Integration (VP, FTP), pp. 5162–5170.
ICML-2019-PooleOOAT #on the- On Variational Bounds of Mutual Information (BP, SO, AvdO, AA, GT), pp. 5171–5180.
ICML-2019-RamamurthyVM #data analysis- Topological Data Analysis of Decision Boundaries with Application to Model Selection (KNR, KRV, KM), pp. 5351–5360.
ICML-2019-X #named #policy #predict #using- POLITEX: Regret Bounds for Policy Iteration using Expert Prediction, pp. 3692–3702.
ICML-2019-ZanetteB #learning #problem #using- Tighter Problem-Dependent Regret Bounds in Reinforcement Learning without Domain Knowledge using Value Function Bounds (AZ, EB), pp. 7304–7312.
ICML-2019-ZhouG #optimisation- Lower Bounds for Smooth Nonconvex Finite-Sum Optimization (DZ, QG), pp. 7574–7583.
Onward-2019-StoelSV #named #relational- AlleAlle: bounded relational model finding with unbounded data (JS, TvdS, JJV), pp. 46–61.
OOPSLA-2019-GencRXB #concurrent #detection #predict- Dependence-aware, unbounded sound predictive race detection (KG, JR, YX, MDB), p. 30.
POPL-2019-BaeL #logic #model checking #using- Bounded model checking of signal temporal logic properties using syntactic separation (KB, JL), p. 30.
POPL-2019-BlanchetteGPT - Bindings as bounded natural functors (JCB, LG, AP0, DT), p. 34.
POPL-2019-DudenhefnerR #approximate- Principality and approximation under dimensional bound (AD, JR), p. 29.
CASE-2019-JiangL #game studies #network- Bayesian Stackelberg Game Model for Water Supply Networks against Bounded Rational Interdictors (JJ, XL), pp. 842–847.
CASE-2019-RaineriB #realtime- Jerk limited planner for real-time applications requiring variable velocity bounds (MR, CGLB), pp. 1611–1617.
CASE-2019-ZabinskyHH #approximate #branch #heuristic- Integrating Heuristics and Approximations into a Branch and Bound Framework* (ZBZ, TYH, HH), pp. 774–779.
CASE-2019-ZakerimaneshTHT - Task-Space Position and Containment Control of Redundant Manipulators with Bounded Inputs (AZ, AT, FH, MT), pp. 431–436.
CGO-2019-RodriguesGP #array #generative #in memory- Generation of In-Bounds Inputs for Arrays in Memory-Unsafe Languages (MR, BG, FMQP), pp. 136–148.
FASE-2019-ZhangSMC #analysis #constraints #scheduling #smt #specification- SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language (MZ0, FS, FM, XC0), pp. 61–78.
CAV-2019-FengCZF0 #difference #equation #verification- Taming Delays in Dynamical Systems - Unbounded Verification of Delay Differential Equations (SF, MC, NZ, MF, BX0), pp. 650–669.
CAV-2019-KolblLW - Clock Bound Repair for Timed Systems (MK, SL, TW), pp. 79–96.
ICTSS-2019-ErardG #source code #testing- Bounded Exhaustive Testing with Certified and Optimized Data Enumeration Programs (CE, AG), pp. 159–175.
VMCAI-2019-LuCC0 #source code- Type-Directed Bounding of Collections in Reactive Programs (TL, PC, BYEC, AT0), pp. 275–296.
JCDL-2018-JayarathnaS #eye tracking #modelling- Evaluating Saccade-Bounded Eye Movement Features for the User Modeling (SJ, SS), pp. 21–24.
DLT-2018-JiraskovaO #automaton #complexity #towards- Towards Exact State Complexity Bounds for Input-Driven Pushdown Automata (GJ, AO), pp. 441–452.
- ICFP-2018-AccattoliGK
- Tight typings and split bounds (BA, SGL, DK), p. 30.
ICML-2018-AbeilleL #linear #polynomial #problem- Improved Regret Bounds for Thompson Sampling in Linear Quadratic Control Problems (MA, AL), pp. 1–9.
ICML-2018-Allen-ZhuBL #first-order- Make the Minority Great Again: First-Order Regret Bound for Contextual Bandits (ZAZ, SB, YL), pp. 186–194.
ICML-2018-Arora0NZ #approach- Stronger Generalization Bounds for Deep Nets via a Compression Approach (SA, RG0, BN, YZ), pp. 254–263.
ICML-2018-ChenTZHC - Variational Inference and Model Selection with Generalized Evidence Bounds (LC, CT, RZ, RH, LC), pp. 892–901.
ICML-2018-Dziugaite0 - Entropy-SGD optimizes the prior of a PAC-Bayes bound: Generalization properties of Entropy-SGD and data-dependent priors (GKD, DMR0), pp. 1376–1385.
ICML-2018-KimW #approximate #predict #self #string- Self-Bounded Prediction Suffix Tree via Approximate String Matching (DK0, CJW), pp. 2664–2672.
ICML-2018-LangeKA #clustering #correlation #performance- Partial Optimality and Fast Lower Bounds for Weighted Correlation Clustering (JHL, AK, BA), pp. 2898–2907.
ICML-2018-MehrabiTY #approximate #network #power of- Bounds on the Approximation Power of Feedforward Neural Networks (MM, AT, MIY), pp. 3450–3458.
ICML-2018-MouZGW - Dropout Training, Data-dependent Regularization, and Generalization Bounds (WM, YZ, JG, LW0), pp. 3642–3650.
ICML-2018-NguyenNDRST #convergence #exclamation- SGD and Hogwild! Convergence Without the Bounded Gradients Assumption (LMN, PHN, MvD, PR, KS, MT), pp. 3747–3755.
ICML-2018-RainforthKLMIWT - Tighter Variational Bounds are Not Necessarily Better (TR, ARK, TAL, CJM, MI, FW, YWT), pp. 4274–4282.
ICML-2018-Scarlett #optimisation- Tight Regret Bounds for Bayesian Optimization in One Dimension (JS), pp. 4507–4515.
ICML-2018-SerraTR #linear #network- Bounding and Counting Linear Regions of Deep Neural Networks (TS, CT, SR), pp. 4565–4573.
ICML-2018-WeiszGS #algorithm #approximate #named- LEAPSANDBOUNDS: A Method for Approximately Optimal Algorithm Configuration (GW, AG, CS), pp. 5254–5262.
ICML-2018-ZanetteB #identification #learning #problem- Problem Dependent Reinforcement Learning Bounds Which Can Identify Bandit Structure in MDPs (AZ, EB), pp. 5732–5740.
ICML-2018-ZhouMBGYLF #distributed #how #optimisation #question- Distributed Asynchronous Optimization with Unbounded Delays: How Slow Can You Go? (ZZ, PM, NB, PWG, YY, LJL, LFF0), pp. 5965–5974.
ICPR-2018-LiZLL #bottom-up #constraints #estimation #multi- Bottom-up Pose Estimation of Multiple Person with Bounding Box Constraint (ML, ZZ, JL, XL), pp. 115–120.
ICPR-2018-PramerdorferKL #3d #classification #multi #network- Multi-View Classification and 3D Bounding Box Regression Networks (CP, MK, MVL), pp. 734–739.
ICPR-2018-SongZR #network- UAV Target Tracking with A Boundary-Decision Network (KS, WZ0, XR), pp. 2576–2581.
ICPR-2018-ZhangZZL #detection #image #performance- Boundary-based Image Forgery Detection by Fast Shallow CNN (ZZ, YZ, ZZ, JL), pp. 2658–2663.
KDD-2018-KumagaiI #learning- Learning Dynamics of Decision Boundaries without Additional Labeled Data (AK, TI), pp. 1627–1636.
KDD-2018-Ting #empirical #estimation #fault #named #using- Count-Min: Optimal Estimation and Tight Error Bounds using Empirical Error Distributions (DT), pp. 2319–2328.
OOPSLA-2018-KakiESJ #concurrent #replication #verification- Safe replication through bounded concurrency verification (GK, KE, KCS, SJ), p. 27.
PLDI-2018-DolanSM - Bounding data races in space and time (SD, KCS, AM), pp. 242–255.
PLDI-2018-LiuW #analysis #concurrent #interprocedural #named #source code- CUBA: interprocedural Context-UnBounded Analysis of concurrent programs (PL, TW), pp. 105–119.
PLDI-2018-NgoC0 #analysis #probability #source code- Bounded expectations: resource analysis for probabilistic programs (VCN, QC, JH0), pp. 496–512.
PLDI-2018-RoemerGB #concurrent #detection #predict- High-coverage, unbounded sound predictive race detection (JR, KG, MDB), pp. 374–389.
SAS-2018-JacqueminPV #analysis #fault #float- A Reduced Product of Absolute and Relative Error Bounds for Floating-Point Analysis (MJ, SP, FV), pp. 223–242.
SAS-2018-MastroeniP #verification- Verifying Bounded Subset-Closed Hyperproperties (IM, MP), pp. 263–283.
ASE-2018-MonteiroGCF #c++ #framework #model checking #platform #source code- Bounded model checking of C++ programs based on the Qt cross-platform framework (journal-first abstract) (FRM, MAPG, LCC, EBdLF), p. 954.
CASE-2018-JantschNWHM #approach #branch- Enhanced branch and bound approach for receding horizon based planning (MJ, NNN, LW, MH, UM), pp. 160–163.
CC-2018-ZhaoK0 #compilation #framework- A polyhedral compilation framework for loops with dynamic data-dependent bounds (JZ0, MK, AC0), pp. 14–24.
CAV-2018-CordeiroKKST #bytecode #java #model checking #named #verification- JBMC: A Bounded Model Checking Tool for Verifying Java Bytecode (LCC, PK, DK, PS, MT), pp. 183–190.
CAV-2018-BouajjaniEJQ #message passing #on the #source code #verification- On the Completeness of Verifying Message Passing Programs Under Bounded Asynchrony (AB, CE, KJ, SQ), pp. 372–391.
CSL-2018-FijalkowMMR #logic- Quantifying Bounds in Strategy Logic (NF, BM, AM, SR), p. 23.
IJCAR-2018-Bromberger #linear #problem #reduction- A Reduction from Unbounded Linear Mixed Arithmetic Problems into Bounded Problems (MB), pp. 329–345.
IJCAR-2018-PayetS #abstract interpretation #array- Checking Array Bounds by Abstract Interpretation and Symbolic Expressions (ÉP, FS), pp. 706–722.
TAP-2018-Keller #higher-order #testing #verification- Tactic Program-Based Testing and Bounded Verification in Isabelle/HOL (CK), pp. 103–119.
DLT-2017-Yamakami #automaton #complexity #probability- One-Way Bounded-Error Probabilistic Pushdown Automata and Kolmogorov Complexity - (Preliminary Report) (TY), pp. 353–364.
FSCD-2017-KanovichKMS #algorithm #calculus #order #polynomial- A Polynomial-Time Algorithm for the Lambek Calculus with Brackets of Bounded Order (MIK, SK, GM, AS), p. 17.
SEFM-2017-CabodiCPPV #learning #model checking- Interpolation-Based Learning as a Mean to Speed-Up Bounded Model Checking (Short Paper) (GC, PC, MP, PP, DV), pp. 382–387.
AIIDE-2017-PowleyCW #memory management #monte carlo- Memory Bounded Monte Carlo Tree Search (EJP, PIC, DW), pp. 94–100.
ICML-2017-AvronKMMVZ #approximate #fourier #kernel #random #statistics- Random Fourier Features for Kernel Ridge Regression: Approximation Bounds and Statistical Guarantees (HA, MK, CM, CM, AV, AZ), pp. 253–262.
ICML-2017-AzarOM #learning- Minimax Regret Bounds for Reinforcement Learning (MGA, IO, RM), pp. 263–272.
ICML-2017-BachemLH0 #clustering- Uniform Deviation Bounds for k-Means Clustering (OB, ML, SHH, AK0), pp. 283–291.
ICML-2017-Domke - A Divergence Bound for Hybrids of MCMC and Variational Inference and an Application to Langevin Dynamics and SGVI (JD), pp. 1029–1038.
ICML-2017-McNamaraB - Risk Bounds for Transferring Representations With and Without Fine-Tuning (DM, MFB), pp. 2373–2381.
ICML-2017-MirrokniLVW #approximate- Tight Bounds for Approximate Carathéodory and Beyond (VSM, RPL, AV, SCwW), pp. 2440–2448.
ICML-2017-MukkamalaH - Variants of RMSProp and Adagrad with Logarithmic Regret Bounds (MCM, MH0), pp. 2545–2553.
ICML-2017-ShalitJS #algorithm- Estimating individual treatment effect: generalization bounds and algorithms (US, FDJ, DAS), pp. 3076–3085.
KDD-2017-AvinLNP #network- Improved Degree Bounds and Full Spectrum Power Laws in Preferential Attachment Networks (CA, ZL, YN, DP), pp. 45–53.
KDD-2017-YinLN #education #scalability- Small Batch or Large Batch?: Gaussian Walk with Rebound Can Teach (PY, PL0, TN), pp. 1275–1284.
Onward-2017-JangdaY - Unbounded superoptimization (AJ, GY), pp. 78–88.
OOPSLA-2017-CelikPKG #generative- Bounded exhaustive test-input generation on GPUs (AÇ, SP, SK, MG), p. 25.
AdaEurope-2017-DiazFKMHAC #analysis #manycore #named #probability- MC2: Multicore and Cache Analysis via Deterministic and Probabilistic Jitter Bounding (ED, MF, LK, EM, CH, JA, FJC), pp. 102–118.
LOPSTR-2017-LiqatBLH #energy #modelling #program analysis- Inferring Energy Bounds via Static Program Analysis and Evolutionary Modeling of Basic Blocks (UL, ZB, PLG0, MVH), pp. 54–72.
POPL-2017-DudenhefnerR #calculus- Intersection type calculi of bounded dimension (AD, JR), pp. 653–665.
POPL-2017-HoffmannDW #analysis #automation #ml #towards- Towards automatic resource bound analysis for OCaml (JH0, AD, SCW), pp. 359–373.
ESEC-FSE-2017-CelikVMG #testing #virtual machine- Regression test selection across JVM boundaries (AÇ, MV, AM, MG), pp. 809–820.
ASPLOS-2017-BarbalaceLJCCLR - Breaking the Boundaries in Heterogeneous-ISA Datacenters (AB, RL, CJ, AC, HRC, VL, BR), pp. 645–659.
CASE-2017-0003AG #fault #reduction- Model reduction techniques with error bounds (MI0, MJA, AG), pp. 1510–1515.
CASE-2017-RiaziWBL #energy #optimisation- Energy and peak-power optimization of time-bounded robot trajectories (SR, OW, KB, BL), p. 1301.
CC-2017-FedericoPA #analysis #framework- rev.ng: a unified binary analysis framework to recover CFGs and function boundaries (ADF, MP, GA), pp. 131–141.
CGO-2017-SenguptaCBK #hardware #memory management #named #transaction #using- Legato: end-to-end bounded region serializability using commodity hardware transactional memory (AS, MC, MDB, MK0), pp. 1–13.
CADE-2017-Cruanes #satisfiability- Satisfiability Modulo Bounded Checking (SC), pp. 114–129.
CAV-2017-ChatterjeeFM #analysis #automation- Automated Recurrence Analysis for Almost-Linear Expected-Runtime Bounds (KC, HF0, AM), pp. 118–139.
CAV-2017-FaymonvilleFT #framework #named #synthesis- BoSy: An Experimentation Framework for Bounded Synthesis (PF, BF, LT), pp. 325–332.
CAV-2017-KhalimovB #synthesis- Bounded Synthesis for Streett, Rabin, and CTL* (AK, RB), pp. 333–352.
CAV-2017-MaricSB #algorithm- Cutoff Bounds for Consensus Algorithms (OM, CS0, DAB), pp. 217–237.
CSL-2017-ChenFH #first-order #logic #quantifier #rank #slicing- Slicewise Definability in First-Order Logic with Bounded Quantifier Rank (YC, JF, XH), p. 16.
ICST-2017-DarkeCCV #abstraction #model checking #performance #proving #safety #using- Efficient Safety Proofs for Industry-Scale Code Using Abstractions and Bounded Model Checking (PD, BC, AC, RV), pp. 468–475.
SCAM-2016-GaoHMW #model checking #named #testing- LLSPLAT: Improving Concolic Testing by Bounded Model Checking (MG0, LH, RM, ZW), pp. 127–136.
CIAA-2016-IbarraM #linear #on the- On Bounded Semilinear Languages, Counter Machines, and Finite-Index ET0L (OHI, IM), pp. 138–149.
FM-2016-DellabaniCBB #interactive #multi- Local Planning of Multiparty Interactions with Bounded Horizons (MD, JC, MB, SB), pp. 199–216.
FM-2016-Flores-Montoya #source code- Upper and Lower Amortized Cost Bounds of Programs Expressed as Cost Relations (AFM), pp. 254–273.
SEFM-2016-BendikBBC #analysis #order #requirements #safety #set- Finding Boundary Elements in Ordered Sets with Application to Safety and Requirements Analysis (JB, NB, JB, IC), pp. 121–136.
ICML-2016-AltschulerBFMRZ #algorithm #distributed #set- Greedy Column Subset Selection: New Bounds and Distributed Algorithms (JA, AB, GF, VSM, AR, MZ), pp. 2539–2548.
ICML-2016-DavidS #algorithm #performance #problem- PAC Lower Bounds and Efficient Algorithms for The Max K-Armed Bandit Problem (YD, NS), pp. 878–887.
ICML-2016-HoilesS #design #education #evaluation #recommendation- Bounded Off-Policy Evaluation with Missing Data for Course Recommendation and Curriculum Design (WH, MvdS), pp. 1596–1604.
ICML-2016-KomiyamaHN #algorithm #performance #problem- Copeland Dueling Bandit Problem: Regret Lower Bound, Optimal Algorithm, and Computationally Efficient Algorithm (JK, JH, HN), pp. 1235–1244.
ICML-2016-NewlingF #performance- Fast k-means with accurate bounds (JN, FF), pp. 936–944.
ICML-2016-PuleoM #clustering #correlation #fault- Correlation Clustering and Biclustering with Locally Bounded Errors (GJP, OM), pp. 869–877.
ICPR-2016-BullingerBWA #generative #re-engineering #using #video- Moving object reconstruction in monocular video data using boundary generation (SB, CB, SW, MA), pp. 240–246.
ICPR-2016-Lan0DAH #matrix- A PAC bound for joint matrix completion based on Partially Collective Matrix Factorization (CL, XL0, YD, JSA, JH), pp. 2628–2633.
ICPR-2016-LuoLQ #analysis #optimisation #probability- Bound analysis of natural gradient descent in stochastic optimization setting (ZL, DL, YQ), pp. 4166–4171.
ICPR-2016-MezumanW #finite- A tight convex upper bound on the likelihood of a finite mixture (EM, YW), pp. 1683–1688.
ICPR-2016-RubioYSM #named #segmentation- BASS: Boundary-Aware Superpixel Segmentation (AR, LY, ESS, FMN), pp. 2824–2829.
KDD-2016-HooiSBSSF #graph #named- FRAUDAR: Bounding Graph Fraud in the Face of Camouflage (BH, HAS, AB, NS, KS, CF), pp. 895–904.
KDD-2016-ReddyLBJ #learning #scheduling- Unbounded Human Learning: Optimal Scheduling for Spaced Repetition (SR, IL, SB, TJ), pp. 1815–1824.
MoDELS-2016-Blache #c #development #embedded #modelling #safety #using- Handling index-out-of-bounds in safety-critical embedded C code using model-based development (GB), pp. 143–149.
LOPSTR-2016-JanaKDVC #array #model checking #scalability #source code- Scaling Bounded Model Checking by Transforming Programs with Arrays (AJ, UPK, AD, RV, NC), pp. 275–292.
POPL-2016-HagueKO #automaton #higher-order- Unboundedness and downward closures of higher-order pushdown automata (MH, JK, CHLO), pp. 151–163.
QAPL-2016-LarsenLZ15 #energy #exclamation #game studies- Limit Your Consumption! Finding Bounds in Average-energy Games (KGL, SL, MZ0), pp. 1–14.
SAS-2016-ChristakisW #abstract interpretation- Bounded Abstract Interpretation (MC, VW), pp. 105–125.
SAS-2016-GangeNSSS #matrix- Exploiting Sparsity in Difference-Bound Matrices (GG, JAN, PS, HS, PJS), pp. 189–211.
ASE-2016-Nishi #model checking #programming #towards #using- Towards bounded model checking using nonlinear programming solver (MN), pp. 560–565.
FSE-2016-Monteiro #finite #fixpoint #implementation #model checking #modelling- Bounded model checking of state-space digital systems: the impact of finite word-length effects on the implementation of fixed-point digital controllers based on state-space modeling (FRM), pp. 1151–1153.
CASE-2016-HanLD #feedback #mobile- Flocking of mobile robots by bounded feedback (TTH, HML, BHD), pp. 689–694.
CASE-2016-LeeL #3d #estimation #recognition- Object recognition and pose estimation based on 3D planar closed loop boundaries (YL, SL0), pp. 245–250.
CASE-2016-Ritt #algorithm #permutation #problem #scheduling- A branch-and-bound algorithm with cyclic best-first search for the permutation flow shop scheduling problem (MR), pp. 872–877.
CC-2016-DuckY #pointer- Heap bounds protection with low fat pointers (GJD, RHCY), pp. 132–142.
FASE-2016-WeckesserLSRS #automation #detection #exclamation #feature model #modelling- Mind the Gap! Automated Anomaly Detection for Potentially Unbounded Cardinality-Based Feature Models (MW, ML, TS, BR, AS), pp. 158–175.
CAV-2016-FinkbeinerK #synthesis- Bounded Cycle Synthesis (BF, FK0), pp. 118–135.
CAV-2016-LeggNR #satisfiability #synthesis- A SAT-Based Counterexample Guided Method for Unbounded Synthesis (AL, NN, LR), pp. 364–382.
CSL-2016-KotekVZ #finite #higher-order #monad #satisfiability- Monadic Second Order Finite Satisfiability and Unbounded Tree-Width (TK, HV, FZ), p. 20.
IJCAR-2016-AthanasiouLW #equation #thread #using #verification- Unbounded-Thread Program Verification using Thread-State Equations (KA, PL, TW), pp. 516–531.
IJCAR-2016-FrohnNHBG #integer #runtime #source code- Lower Runtime Bounds for Integer Programs (FF, MN, JH, MB, JG), pp. 550–567.
VMCAI-2016-HashemiH0 #nondeterminism #probability #reachability- Reward-Bounded Reachability Probability for Uncertain Weighted MDPs (VH, HH, LS0), pp. 351–371.
VLDB-2015-AkidauBCCFLMMPS #approach #correctness #data flow #latency- The Dataflow Model: A Practical Approach to Balancing Correctness, Latency, and Cost in Massive-Scale, Unbounded, Out-of-Order Data Processing (TA, RB, CC, SC, RFM, RL, SM, DM, FP, ES, SW), pp. 1792–1803.
CIAA-J-2013-JirasekJ15 #on the #regular expression- On the boundary of regular languages (JJ, GJ), pp. 42–57.
DLT-2015-JirasekJ - The Boundary of Prefix-Free Languages (JJ, GJ), pp. 300–312.
DLT-2015-Yamakami #complexity #quantum- Complexity Bounds of Constant-Space Quantum Computation — (TY), pp. 426–438.
ICALP-v1-2015-Ailon #fourier- Tighter Fourier Transform Lower Bounds (NA), pp. 14–25.
ICALP-v1-2015-BeameLP - Finding the Median (Obliviously) with Bounded Space (PB, VL, MP), pp. 103–115.
ICALP-v1-2015-FeldmannFKP #graph- A (1+ε ) ( 1 + ε ) -Embedding of Low Highway Dimension Graphs into Bounded Treewidth Graphs (AEF, WSF, JK, IP), pp. 469–480.
ICALP-v1-2015-FominGKM #graph #morphism #problem- Lower Bounds for the Graph Homomorphism Problem (FVF, AG, ASK, IM), pp. 481–493.
ICALP-v1-2015-KayalKPS - Lower Bounds for Sums of Powers of Low Degree Univariates (NK, PK, TP, CS), pp. 810–821.
ICALP-v1-2015-KomarathSS #finite- Comparator Circuits over Finite Bounded Posets (BK, JS, KSS), pp. 834–845.
ICALP-v1-2015-Sanyal #fourier- Near-Optimal Upper Bound on Fourier Dimension of Boolean Functions in Terms of Fourier Sparsity (SS), pp. 1035–1045.
ICALP-v2-2015-BojanczykMW #clique #datalog #monad #source code- Containment of Monadic Datalog Programs via Bounded Clique-Width (MB, FM, AW), pp. 427–439.
ICALP-v2-2015-FijalkowHKS #game studies #memory management- Trading Bounds for Memory in Games with Counters (NF, FH, DK, MS), pp. 197–208.
ICALP-v2-2015-GairingKK #game studies- Tight Bounds for Cost-Sharing in Weighted Congestion Games (MG, KK, GK), pp. 626–637.
LATA-2015-AmanoS #multi #polynomial- A Nonuniform Circuit Class with Multilayer of Threshold Gates Having Super Quasi Polynomial Size Lower Bounds Against NEXP (KA, AS), pp. 461–472.
LATA-2015-DabrowskiHP #clique #graph- Bounding Clique-Width via Perfect Graphs (KKD, SH, DP), pp. 676–688.
LATA-2015-EremondiIM - Insertion Operations on Deterministic Reversal-Bounded Counter Machines (JE, OHI, IM), pp. 200–211.
LATA-2015-KrishnaMT #automaton #decidability #problem #reachability #recursion- Time-Bounded Reachability Problem for Recursive Timed Automata is Undecidable (SNK, LM, AT), pp. 237–248.
FM-2015-0001K #model checking #using- Property-Driven Fence Insertion Using Reorder Bounded Model Checking (SJ, DK), pp. 291–307.
FM-2015-BagheriKMJ #android #design #detection #protocol #verification- Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
FM-2015-ChimdyalwarDCVC #abstraction #model checking #static analysis #using- Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FM-2015-KroeningLW #automaton #model checking #proving #safety- Proving Safety with Trace Automata and Bounded Model Checking (DK, ML, GW), pp. 325–341.
RTA-2015-FrohnGHAS #complexity #runtime- Inferring Lower Bounds for Runtime Complexity (FF, JG, JH, CA, TS), pp. 334–349.
SEFM-2015-ClarisoGC #ocl #refinement #towards #uml #verification- Towards Domain Refinement for UML/OCL Bounded Verification (RC, CAG, JC), pp. 108–114.
SEFM-2015-RochaBC #c #generative #memory management #model checking #source code #testing #using- Memory Management Test-Case Generation of C Programs Using Bounded Model Checking (HR, RSB, LCC), pp. 251–267.
ICFP-2015-VazouBJ #refinement- Bounded refinement types (NV, AB, RJ), pp. 48–61.
CHI-2015-BlomkvistPA #agile #communication #distributed- Communication through Boundary Objects in Distributed Agile Teams (JKB, JP, JÅ), pp. 1875–1884.
CHI-2015-CecchinatoCB #difference #email- Working 9-5?: Professional Differences in Email and Boundary Management Practices (MEC, ALC, JB), pp. 3989–3998.
CHI-2015-FleckCR #multi #using- Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
CHI-2015-YerousisARRRW - Computer-Enabled Project Spaces: Connecting with Palestinian Refugees across Camp Boundaries (GPY, KA, TvR, DWR, MR, VW), pp. 3749–3758.
DUXU-UI-2015-GomezFD #education- Transcending Disciplinary, Cultural and National Boundaries: Emergent Technologies, New Education Landscape and the Cloud Workshop Project (RG, PF, RD), pp. 631–642.
HCI-IT-2015-HakodaKSST #gesture #mobile #named #using- AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
ICML-2015-AgarwalB #finite #optimisation- A Lower Bound for the Optimization of Finite Sums (AA, LB), pp. 78–86.
ICML-2015-KordaA #approximate #convergence #exponential #on the- On TD(0) with function approximation: Concentration bounds and a centered variant with exponential convergence (NK, PLA), pp. 626–634.
ICML-2015-LakshmananOR #learning- Improved Regret Bounds for Undiscounted Continuous Reinforcement Learning (KL, RO, DR), pp. 524–532.
ICML-2015-TagortiS #convergence #fault #on the- On the Rate of Convergence and Error Bounds for LSTD(λ) (MT, BS), pp. 1521–1529.
ICML-2015-TewariC #documentation #fault #learning #matter #question #rank- Generalization error bounds for learning to rank: Does the length of document lists matter? (AT, SC), pp. 315–323.
ICML-2015-Yang0JZ #fault #set- An Explicit Sampling Dependent Spectral Error Bound for Column Subset Selection (TY, LZ, RJ, SZ), pp. 135–143.
ICML-2015-ZhangWJ #algorithm #distributed #estimation #matrix #performance #rank- Distributed Estimation of Generalized Matrix Rank: Efficient Algorithms and Lower Bounds (YZ, MJW, MIJ), pp. 457–465.
ICML-2015-ZhouZS #analysis #convergence #fault #first-order- ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
KDD-2015-Kaban #random- Improved Bounds on the Dot Product under Random Projection and Random Sign Projection (AK), pp. 487–496.
KDD-2015-YuW0PSIW #markov #multi- Tornado Forecasting with Multiple Markov Boundaries (KY, DW, WD, JP, DLS, SI, XW), pp. 2237–2246.
PLDI-2015-0010ZTZ #named- Light: replay via tightly bounded recording (PL, XZ, OT, YZ), pp. 55–64.
PLDI-2015-Carbonneaux0S #composition- Compositional certified resource bounds (QC, JH, ZS), pp. 467–478.
POPL-2015-FarzanKP #parallel #proving- Proof Spaces for Unbounded Parallelism (AF, ZK, AP), pp. 407–420.
SAS-2015-CattaruzzaASK #analysis- Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (DC, AA, PS, DK), pp. 312–331.
ASE-2015-InversoN0TP #concurrent #model checking #multi #named #thread- Lazy-CSeq: A Context-Bounded Model Checking Tool for Multi-threaded C-Programs (OI, TLN, BF, SLT, GP), pp. 807–812.
ASE-2015-LerchSBM #abstraction #analysis #data flow #scalability- Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T) (JL, JS, EB, MM), pp. 619–629.
ASE-2015-TomanPT #named #rust #verification- Crust: A Bounded Verifier for Rust (N) (JT, SP, ET), pp. 75–80.
SAC-2015-Puffitsch #analysis #branch #predict- Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
GPCE-2015-ReyndersDP #api #generative- Generating safe boundary APIs between typed EDSLs and their environments (BR, DD, FP), pp. 31–34.
ASPLOS-2015-MorrisonA #symmetry- Temporally Bounding TSO for Fence-Free Asymmetric Synchronization (AM, YA), pp. 45–58.
ASPLOS-2015-NguyenWBFHX #big data #compilation #named #runtime- FACADE: A Compiler and Runtime for (Almost) Object-Bounded Big Data Applications (KN, KW, YB, LF, JH, G(X), pp. 675–690.
ASPLOS-2015-SenguptaBZBK #dynamic analysis #hybrid- Hybrid Static: Dynamic Analysis for Statically Bounded Region Serializability (AS, SB, MZ, MDB, MK), pp. 561–575.
CASE-2015-FeiAR #clustering #resource management #symbolic computation #using- Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, KÅ, SAR), pp. 799–806.
CASE-2015-Michalek #standard- Motion control with minimization of a boundary off-track for non-Standard N-trailers along forward-followed paths (MMM), pp. 1564–1569.
CASE-2015-PerriBL #online- Jerk bounded velocity planner for the online management of autonomous vehicles (SP, CGLB, ML), pp. 618–625.
CASE-2015-TanakaM #algorithm #problem #strict- Dominance properties for the unrestricted block relocation problem and their application to a branch-and-bound algorithm (ST, FM), pp. 509–514.
DAC-2015-FernandezJAQVC #realtime- Increasing confidence on measurement-based contention bounds for real-time round-robin buses (GF, JJ, JA, EQ, TV, FJC), p. 6.
DATE-2015-DarkeCVSM #approximate #model checking #using- Over-approximating loops to prove properties using bounded model checking (PD, BC, RV, US, RM), pp. 1407–1412.
DATE-2015-KimAS #composition #scheduling- Schedulability bound for integrated modular avionics partitions (JEK, TFA, LS), pp. 37–42.
PDP-2015-KonstantinidisC #gpu #kernel #memory management #performance- A Practical Performance Model for Compute and Memory Bound GPU Kernels (EK, YC), pp. 651–658.
FASE-2015-FedyukovichDHS #dependence #detection #model checking- Symbolic Detection of Assertion Dependencies for Bounded Model Checking (GF, ACD, AEJH, NS), pp. 186–201.
FoSSaCS-2015-Ganardi #clique #game studies- Parity Games of Bounded Tree- and Clique-Width (MG), pp. 390–404.
STOC-2015-AbdullahV #difference- A Directed Isoperimetric Inequality with application to Bregman Near Neighbor Lower Bounds (AA, SV), pp. 509–518.
STOC-2015-BarakCK #independence- Sum of Squares Lower Bounds from Pairwise Independence (BB, SOC, PKK), pp. 97–106.
STOC-2015-Chechik #approximate #distance- Approximate Distance Oracles with Improved Bounds (SC), pp. 1–10.
STOC-2015-HardtP #learning- Tight Bounds for Learning a Mixture of Two Gaussians (MH, EP), pp. 753–760.
STOC-2015-KoppulaLW #memory management #obfuscation #turing machine- Indistinguishability Obfuscation for Turing Machines with Unbounded Memory (VK, ABL, BW), pp. 419–428.
STOC-2015-LarsenNN #adaptation #algorithm #streaming- Time Lower Bounds for Nonadaptive Turnstile Streaming Algorithms (KGL, JN, HLN), pp. 803–812.
STOC-2015-LeeRS #programming- Lower Bounds on the Size of Semidefinite Programming Relaxations (JRL, PR, DS), pp. 567–576.
STOC-2015-LiuL - FPTAS for #BIS with Degree Bounds on One Side (JL, PL), pp. 549–556.
STOC-2015-MekaPW #clique- Sum-of-squares Lower Bounds for Planted Clique (RM, AP, AW), pp. 87–96.
TACAS-2015-Nguyen0TP #c #contest #lazy evaluation #source code- Unbounded Lazy-CSeq: A Lazy Sequentialization Tool for C Programs with Unbounded Context Switches — (Competition Contribution) (TLN, BF, SLT, GP), pp. 461–463.
CADE-2015-BackemanR #proving #theorem proving- Theorem Proving with Bounded Rigid E-Unification (PB, PR), pp. 572–587.
CAV-2015-MajumdarW #model checking #named #source code- Bbs: A Phase-Bounded Model Checker for Asynchronous Programs (RM, ZW), pp. 496–503.
CAV-2015-ErezN #automation #graph #smt #using- Finding Bounded Path in Graph Using SMT for Automatic Clock Routing (AE, AN), pp. 20–36.
CSL-2015-Kaiser0LL #approach- A Unified Approach to Boundedness Properties in MSO (LK, ML, SL, CL), pp. 441–456.
ICST-2015-XuLCK #approach #detection #lightweight #thread- A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops (JX, YL, RHC, DCK), pp. 1–10.
ICTSS-2015-WeisslederWL #automation #design #product line- Automated Test Design for Boundaries of Product Line Variants (SW, FW, HL), pp. 86–101.
LICS-2015-BenediktCCB #complexity #logic- The Complexity of Boundedness for Guarded Logics (MB, BtC, TC, MVB), pp. 293–304.
LICS-2015-HeijltjesH #complexity #logic #petri net #proving- Complexity Bounds for Sum-Product Logic via Additive Proof Nets and Petri Nets (WH, DJDH), pp. 80–91.
LICS-2015-KrebsV #logic #refinement- Universal Covers, Color Refinement, and Two-Variable Counting Logic: Lower Bounds for the Depth (AK, OV), pp. 689–700.
SAT-2015-MenciaPM #satisfiability- SAT-Based Horn Least Upper Bounds (CM, AP, JMS), pp. 423–433.
VMCAI-2015-MukundRS #data type #implementation- Bounded Implementations of Replicated Data Types (MM, GSR, SPS), pp. 355–372.
WICSA-2014-BiancoMKR #case study #ecosystem #framework #platform- The Role of Platform Boundary Resources in Software Ecosystems: A Case Study (VdB, VM, MK, MR), pp. 11–20.
SIGMOD-2014-FanWW #graph #query- Querying big graphs within bounded resources (WF, XW, YW), pp. 301–312.
VLDB-2014-CaoFWY #query- Bounded Conjunctive Queries (YC, WF, TW, WY), pp. 1231–1242.
VLDB-2014-YanCZ - Error-bounded Sampling for Analytics on Big Sparse Data (YY, LJC, ZZ), pp. 1508–1519.
VLDB-2015-BegumK14 - Rare Time Series Motif Discovery from Unbounded Streams (NB, EJK), pp. 149–160.
ITiCSE-2014-MI #query- A method to prove query lower bounds (JM, SI), pp. 81–86.
CIAA-2014-DumitranGMM - Bounded Prefix-Suffix Duplication (MD, JG, FM, VM), pp. 176–187.
DLT-2014-BrzozowskiS #complexity- Upper Bounds on Syntactic Complexity of Left and Two-Sided Ideals (JAB, MS), pp. 13–24.
DLT-2014-TorreNP #automaton- Scope-Bounded Pushdown Languages (SLT, MN, GP), pp. 116–128.
ICALP-v1-2014-BravermanG - Public vs Private Coin in Bounded-Round Information (MB, AG), pp. 502–513.
ICALP-v1-2014-BrietDHS #approximate- Lower Bounds for Approximate LDCs (JB, ZD, GH, SS), pp. 259–270.
ICALP-v1-2014-KolMSY #approximate #rank- Approximate Nonnegative Rank Is Equivalent to the Smooth Rectangle Bound (GK, SM, AS, AY), pp. 701–712.
ICALP-v1-2014-KumarS - Superpolynomial Lower Bounds for General Homogeneous Depth 4 Arithmetic Circuits (MK, SS), pp. 751–762.
ICALP-v1-2014-MancinskaV #probability- Unbounded Entanglement Can Be Needed to Achieve the Optimal Success Probability (LM, TV), pp. 835–846.
ICALP-v1-2014-NelsonN - Lower Bounds for Oblivious Subspace Embeddings (JN, HLN), pp. 883–894.
ICALP-v1-2014-Volkovich #learning #on the- On Learning, Lower Bounds and (un)Keeping Promises (IV), pp. 1027–1038.
ICALP-v2-2014-AdjiashviliR #graph- Labeling Schemes for Bounded Degree Graphs (DA, NR), pp. 375–386.
ICALP-v2-2014-AschnerK #constraints #modelling #network- Bounded-Angle Spanning Tree: Modeling Networks with Angular Constraints (RA, MJK), pp. 387–398.
ICALP-v2-2014-KopelowitzKPS #graph #worst-case- Orienting Fully Dynamic Graphs with Worst-Case Time Bounds (TK, RK, EP, SS), pp. 532–543.
LATA-2014-BestD #graph #petri net- Characterisation of the State Spaces of Live and Bounded Marked Graph Petri Nets (EB, RRD), pp. 161–172.
LATA-2014-KonitzerS #automaton #process- DFA with a Bounded Activity Level (MK, HUS), pp. 478–489.
FM-2014-PonzioRAF #performance- Efficient Tight Field Bounds Computation Based on Shape Predicates (PP, NR, NA, MFF), pp. 531–546.
ICFP-2014-SchoepeHS #named- SeLINQ: tracking information across application-database boundaries (DS, DH, AS), pp. 25–38.
CIG-2014-VodopivecS #difference- Enhancing upper confidence bounds for trees with temporal difference values (TV, BS), pp. 1–8.
FDG-2014-GarbeRDWM #combinator #visualisation- Author assistance visualizations for Ice-Bound, a combinatorial narrative (JG, AAR, MD, NWF, MM).
FDG-2014-GarbeRWM #configuration management #named #novel- Ice-Bound: A novel of reconfiguration (JG, AAR, NWF, MM).
FDG-2014-ReedGWM #named- Ice-Bound: Combining richly-realized story with expressive gameplay (AAR, JG, NWF, MM).
CHI-2014-LeeSS #analysis #design #research- Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
CHI-2014-WaycottDVMGOK - Captioned photographs in psychosocial aged care: relationship building and boundary work (JW, HD, FV, AM, AG, EO, LK), pp. 4167–4176.
CSCW-2014-GavilanesMQ #communication #social #twitter- Twitter ain’t without frontiers: economic, social, and cultural boundaries in international communication (ROGG, YM, DQ), pp. 1511–1522.
CIKM-2014-LiuXCXTY #approach #linear #network #scalability #social- Influence Maximization over Large-Scale Social Networks: A Bounded Linear Approach (QL, BX, EC, HX, FT, JXY), pp. 171–180.
ICML-c1-2014-AroraBGM #learning- Provable Bounds for Learning Some Deep Representations (SA, AB, RG, TM), pp. 584–592.
ICML-c1-2014-CombesP #algorithm- Unimodal Bandits: Regret Lower Bounds and Optimal Algorithms (RC, AP), pp. 521–529.
ICML-c1-2014-DenisGH #learning #matrix- Dimension-free Concentration Bounds on Hankel Matrices for Spectral Learning (FD, MG, AH), pp. 449–457.
ICML-c1-2014-IyerNS #convergence #estimation #kernel- Maximum Mean Discrepancy for Class Ratio Estimation: Convergence Bounds and Kernel Selection (AI, SN, SS), pp. 530–538.
ICML-c1-2014-JainT #independence #learning- (Near) Dimension Independent Risk Bounds for Differentially Private Learning (PJ, AGT), pp. 476–484.
ICML-c2-2014-Kontorovich #algorithm #metric- Concentration in unbounded metric spaces and algorithmic stability (AK), pp. 28–36.
ICML-c2-2014-MuHWG - Square Deal: Lower Bounds and Improved Relaxations for Tensor Recovery (CM, BH, JW, DG), pp. 73–81.
ICML-c2-2014-PentinaL #learning- A PAC-Bayesian bound for Lifelong Learning (AP, CHL), pp. 991–999.
ICML-c2-2014-ToshD - Lower Bounds for the Gibbs Sampler over Mixtures of Gaussians (CT, SD), pp. 1467–1475.
ICML-c2-2014-ZoghiWMR #problem- Relative Upper Confidence Bound for the K-Armed Dueling Bandit Problem (MZ, SW, RM, MdR), pp. 10–18.
KR-2014-HaririCD - State-Boundedness in Data-Aware Dynamic Systems (BBH, DC, MM, AD).
KR-2014-LomuscioM14a #model checking- Model Checking Unbounded Artifact-Centric Systems (AL, JM).
KR-2014-Razgon #on the- On OBDDs for CNFs of Bounded Treewidth (IR).
OOPSLA-2014-RosnerBPKAFK #generative #hybrid #invariant- Bounded exhaustive test input generation from hybrid invariants (NR, VSB, PP, SAK, NA, MFF, SK), pp. 655–674.
PLDI-2014-Carbonneaux0RS #c #source code #verification- End-to-end verification of stack-space bounds for C programs (QC, JH, TR, ZS), p. 30.
PLDI-2014-GreenmanMT #morphism #polymorphism- Getting F-bounded polymorphism into shape (BG, FM, RT), p. 12.
PLDI-2014-LuuSSD #constraints #string- A model counter for constraints over unbounded strings (LL, SS, PS, BD), p. 57.
ASE-2014-BasuB #automation #interactive #verification- Automatic verification of interactions in asynchronous systems with unbounded buffers (SB, TB), pp. 743–754.
SLE-2014-KursLN #semiparsing- Bounded Seas — Island Parsing Without Shipwrecks (JK, ML, ON), pp. 62–81.
ASPLOS-2014-MorrisonA - Fence-free work stealing on bounded TSO processors (AM, YA), pp. 413–426.
ASPLOS-2014-SaniBQZ - I/o paravirtualization at the device file boundary (AAS, KB, SQ, LZ), pp. 319–332.
CASE-2014-ChiuC #detection #image- A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
CASE-2014-TanakaT #algorithm #performance #problem- A faster branch-and-bound algorithm for the block relocation problem (ST, KT), pp. 7–12.
DAC-2014-AxerTED #network #performance- Exploiting Shaper Context to Improve Performance Bounds of Ethernet AVB Networks (PA, DT, RE, JD), p. 6.
DATE-2014-LongLY #analysis #evaluation #modelling #multi- Analysis and evaluation of per-flow delay bound for multiplexing models (YL, ZL, XY), pp. 1–4.
DATE-2014-SongDY #analysis #multi #order #parametricity #performance #reduction- Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
DATE-2014-ZhaoL - Empowering study of delay bound tightness with simulated annealing (XZ, ZL), pp. 1–6.
PPoPP-2014-ThomsonDB #concurrent #empirical #testing #using- Concurrency testing using schedule bounding: an empirical study (PT, AFD, AB), pp. 15–28.
ESOP-2014-GhicaS #linear- Bounded Linear Types in a Resource Semiring (DRG, AIS), pp. 331–350.
ESOP-2014-KothaACESB #parallel #runtime- Affine Parallelization of Loops with Run-Time Dependent Bounds from Binaries (AK, KA, TC, KE, MS, RB), pp. 554–574.
FoSSaCS-2014-Fu #markov #probability #process #reachability- Maximal Cost-Bounded Reachability Probability on Continuous-Time Markov Decision Processes (HF), pp. 73–87.
STOC-2014-ChekuriC #polynomial #theorem- Polynomial bounds for the grid-minor theorem (CC, JC), pp. 60–69.
STOC-2014-DworkTT0 #analysis #component #privacy- Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
STOC-2014-ElberfeldK #graph- Embedding and canonizing graphs of bounded genus in logspace (ME, KiK), pp. 383–392.
STOC-2014-EneV #algorithm #approximate #design #network #problem #requirements- Improved approximation algorithms for degree-bounded network design problems with node connectivity requirements (AE, AV), pp. 754–763.
STOC-2014-FournierLMS #matrix #multi- Lower bounds for depth 4 formulas computing iterated matrix multiplication (HF, NL, GM, SS), pp. 128–135.
STOC-2014-FriggstadS #algorithm #approximate- Approximation algorithms for regret-bounded vehicle routing and applications to distance-constrained vehicle routing (ZF, CS), pp. 744–753.
STOC-2014-GavinskyMWW #approach #complexity #composition #towards- Toward better formula lower bounds: an information complexity approach to the KRW composition conjecture (DG, OM, OW, AW), pp. 213–222.
STOC-2014-GoosP #communication- Communication lower bounds via critical block sensitivity (MG, TP), pp. 847–856.
STOC-2014-KayalLSS - Super-polynomial lower bounds for depth-4 homogeneous arithmetic formulas (NK, NL, CS, SS), pp. 119–127.
STOC-2014-KayalSS - A super-polynomial lower bound for regular arithmetic formulas (NK, CS, RS), pp. 146–153.
STOC-2014-Lovett #communication #rank- Communication is bounded by root of rank (SL), pp. 842–846.
STOC-2014-Williams #algorithm #linear- New algorithms and lower bounds for circuits with linear threshold gates (RW), pp. 194–202.
TACAS-2014-KroeningT #c #contest #model checking #named- CBMC — C Bounded Model Checker — (Competition Contribution) (DK, MT), pp. 389–391.
TACAS-2014-Siirtola #composition #multi #named #verification- Bounds2: A Tool for Compositional Multi-parametrised Verification (AS), pp. 599–604.
CAV-2014-BinghamL #fault #simulation #using #verification- Verifying Relative Error Bounds Using Symbolic Simulation (JB, JLH), pp. 277–292.
CAV-2014-InversoT0TP #c #concurrent #lazy evaluation #model checking #multi #source code #thread- Bounded Model Checking of Multi-threaded C Programs via Lazy Sequentialization (OI, ET, BF, SLT, GP), pp. 585–602.
CAV-2014-LeeS #abstraction #approximate #reachability #scalability #verification- Unbounded Scalable Verification Based on Approximate Property-Directed Reachability and Datapath Abstraction (SL, KAS), pp. 849–865.
CAV-2014-MadhavanK #functional #source code- Symbolic Resource Bound Inference for Functional Programs (RM, VK), pp. 762–778.
CAV-2014-SinnZV #complexity #scalability #static analysis- A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis (MS, FZ, HV), pp. 745–761.
LICS-CSL-2014-GottlobM #logic #problem- Achieving new upper bounds for the hypergraph duality problem through logic (GG, EM), p. 10.
LICS-CSL-2014-HarwathHS #composition #theorem- Preservation and decomposition theorems for bounded degree structures (FH, LH, NS), p. 10.
LICS-CSL-2014-LerouxPS #automaton- Hyper-Ackermannian bounds for pushdown vector addition systems (JL, MP, GS), p. 10.
SAT-2014-JarvisaloK - Conditional Lower Bounds for Failed Literals and Related Techniques (MJ, JHK), pp. 75–84.
TAP-2014-HentschelHB #execution #symbolic computation #visualisation- Visualizing Unbounded Symbolic Execution (MH, RH, RB), pp. 82–98.
TAP-2014-KampmannGZ #execution #named #performance #verification- JTACO: Test Execution for Faster Bounded Verification (AK, JPG, AZ), pp. 134–141.
DocEng-2013-VielMPT - Go beyond boundaries of iTV applications (CCV, ELM, MdGCP, CACT), pp. 263–272.
ICDAR-2013-HePXSN #3d #re-engineering- A Book Dewarping System by Boundary-Based 3D Surface Reconstruction (YH, PP, SX, JS, SN), pp. 403–407.
PODS-2013-KazanaS #first-order #query- Enumeration of first-order queries on classes of structures with bounded expansion (WK, LS), pp. 297–308.
SIGMOD-2013-VlachouDNK #algorithm #query- Branch-and-bound algorithm for reverse top-k queries (AV, CD, KN, YK), pp. 481–492.
SIGMOD-2013-YakoutBE #automation #scalability- Don’t be SCAREd: use SCalable Automatic REpairing with maximal likelihood and bounded changes (MY, LBE, AKE), pp. 553–564.
VLDB-2013-AfratiSSU #cost analysis- Upper and Lower Bounds on the Cost of a Map-Reduce Computation (FNA, ADS, SS, JDU), pp. 277–288.
ITiCSE-2013-QureshiEP #student- Students organizing against pollution: computational thinking across boundaries (SQ, FE, SMP), p. 356.
SCAM-2013-MattsenCS - Driving a sound static software analyzer with branch-and-bound (SM, PC, SS), pp. 63–68.
CIAA-2013-JirasekJ #on the #regular expression- On the Boundary of Regular Languages (JJ, GJ), pp. 208–219.
DLT-2013-Blanchet-SadriW #strict- Strict Bounds for Pattern Avoidance (FBS, BW), pp. 106–117.
ICALP-v1-2013-AndoniNPW #linear #sketching- Tight Lower Bound for Linear Sketches of Moments (AA, HLN, YP, YW), pp. 25–32.
ICALP-v1-2013-BunT #approximate- Dual Lower Bounds for Approximate Degree and Markov-Bernstein Inequalities (MB, JT), pp. 303–314.
ICALP-v1-2013-CyganP #algorithm #graph #performance- Faster Exponential-Time Algorithms in Graphs of Bounded Average Degree (MC, MP), pp. 364–375.
ICALP-v1-2013-FilmusLMNV #calculus #comprehension #polynomial #towards- Towards an Understanding of Polynomial Calculus: New Separations and Lower Bounds — (YF, ML, MM, JN, MV), pp. 437–448.
ICALP-v1-2013-KumarMN - Arithmetic Circuit Lower Bounds via MaxRank (MK, GM, JS), pp. 661–672.
ICALP-v1-2013-Lampis #graph #model checking- Model Checking Lower Bounds for Simple Graphs (ML), pp. 673–683.
ICALP-v1-2013-Leonardos #complexity #random #recursion- An Improved Lower Bound for the Randomized Decision Tree Complexity of Recursive Majority, (NL), pp. 696–708.
ICALP-v1-2013-MoruzN #algorithm #random- Improved Space Bounds for Strongly Competitive Randomized Paging Algorithms (GM, AN), pp. 757–768.
ICALP-v2-2013-BecchettiBDKM #complexity #convergence #proving- Physarum Can Compute Shortest Paths: Convergence Proofs and Complexity Bounds (LB, VB, MD, AK, KM), pp. 472–483.
ICALP-v2-2013-MertziosS #evolution #network- Strong Bounds for Evolution in Networks (GBM, PGS), pp. 669–680.
LATA-2013-IbarraR #automaton #on the- On Bounded Languages and Reversal-Bounded Automata (OHI, BR), pp. 359–370.
LATA-2013-Smith - Infiniteness and Boundedness in 0L, DT0L, and T0L Systems (TS), pp. 535–546.
LATA-2013-Tveretina - A Conditional Superpolynomial Lower Bound for Extended Resolution (OT), pp. 559–569.
TLCA-2013-Clairambault #linear #reduction- Bounding Skeletons, Locally Scoped Terms and Exact Bounds for Linear Head Reduction (PC), pp. 109–124.
FDG-2013-CarterG #contest #game studies #online- eSports in EVE Online: Skullduggery, fair play and acceptability in an unbounded competition (MC, MRG), pp. 47–54.
FDG-2013-ConsalvoP #game studies- Welcome to the discourse of the real: Constituting the boundaries of games and players (MC, CAP), pp. 55–62.
CHI-2013-ShiXC #network #social #using- Using contextual integrity to examine interpersonal information boundary on social network sites (PS, HX, YC), pp. 35–38.
CSCW-2013-HalpernEFG #collaboration #design- Designing collaboration: comparing cases exploring cultural probes as boundary-negotiating objects (MKH, IE, LF, GKG), pp. 1093–1102.
CSCW-2013-HuangDLLG - Meanings and boundaries of scientific software sharing (XH, XD, CPL, TL, NG), pp. 423–434.
HCI-IMT-2013-BraunFMSM #gesture- Context-Based Bounding Volume Morphing in Pointing Gesture Application (AB, AF, AM, CS, MM), pp. 147–156.
ICML-c1-2013-GiguereLMS #algorithm #approach #learning #predict- Risk Bounds and Learning Algorithms for the Regression Approach to Structured Output Prediction (SG, FL, MM, KS), pp. 107–114.
ICML-c1-2013-KumarB #graph #learning- Convex Relaxations for Learning Bounded-Treewidth Decomposable Graphs (KSSK, FRB), pp. 525–533.
ICML-c1-2013-KumarLVV - Near-Optimal Bounds for Cross-Validation via Loss Stability (RK, DL, SV, AV), pp. 27–35.
ICML-c1-2013-MaillardNOR #learning #representation- Optimal Regret Bounds for Selecting the State Representation in Reinforcement Learning (OAM, PN, RO, DR), pp. 543–551.
ICML-c1-2013-MehtaG #predict- Sparsity-Based Generalization Bounds for Predictive Sparse Coding (NAM, AGG), pp. 36–44.
ICML-c3-2013-DurrantK #classification #fault- Sharp Generalization Error Bounds for Randomly-projected Classifiers (RJD, AK), pp. 693–701.
ICML-c3-2013-HonorioJ #exponential #fault- Two-Sided Exponential Concentration Bounds for Bayes Error Rate and Shannon Entropy (JH, TSJ), pp. 459–467.
ICML-c3-2013-PiresSG #classification #multi- Cost-sensitive Multiclass Classification Risk Bounds (BAP, CS, MG), pp. 1391–1399.
ICML-c3-2013-ZhangYJLH #kernel #learning #online- Online Kernel Learning with a Near Optimal Sparsity Bound (LZ, JY, RJ, ML, XH), pp. 621–629.
KDD-2013-NarasimhanA #named #optimisation- SVMpAUCtight: a new support vector method for optimizing partial AUC based on a tight convex upper bound (HN, SA), pp. 167–175.
MLDM-2013-PrieditisL #classification #performance #problem #using- When Classification becomes a Problem: Using Branch-and-Bound to Improve Classification Efficiency (AP, ML), pp. 466–480.
SIGIR-2013-KatoSYI #evaluation #robust- Report from the NTCIR-10 1CLICK-2 Japanese subtask: baselines, upperbounds and evaluation robustness (MPK, TS, TY, MI), pp. 753–756.
SIGIR-2013-TakumaY #performance- Faster upper bounding of intersection sizes (DT, HY), pp. 703–712.
OOPSLA-2013-CoonsMM #partial order #reduction- Bounded partial-order reduction (KEC, MM, KSM), pp. 833–848.
HILT-2013-Chaki #model checking- Bounded model checking of high-integrity software (SC), pp. 9–10.
PLDI-2013-CohenP #towards- Limitations of partial compaction: towards practical bounds (NC, EP), pp. 309–320.
REFSQ-2013-RempelMKP #overview #requirements #taxonomy #traceability- Requirements Traceability across Organizational Boundaries — A Survey and Taxonomy (PR, PM, TK, IP), pp. 125–140.
ASE-2013-ChandramohanTBSP #approach #behaviour #detection #modelling #scalability- A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
ASE-2013-ChoDS #composition #model checking #named #source code- BLITZ: Compositional bounded model checking for real-world programs (CYC, VD, DS), pp. 136–146.
ASE-2013-FalkeMS #model checking- The bounded model checker LLBMC (SF, FM, CS), pp. 706–709.
SAC-2013-BrancoLR #protocol #scalability- Bounded gossip: a gossip protocol for large-scale datacenters (MB, JL, LR), pp. 591–596.
SAC-2013-LarrosaR #constraints #distributed #optimisation- Risk-neutral bounded max-sum for distributed constraint optimization (JL, ER), pp. 92–97.
CASE-2013-OFlahertyE #learning #sequence- Learning to locomote: Action sequences and switching boundaries (RO, ME), pp. 7–12.
CGO-2013-LaiS #analysis #optimisation #performance- Performance upper bound analysis and optimization of SGEMM on Fermi and Kepler GPUs (JL, AS), p. 10.
DATE-2013-CabodiLV #model checking #optimisation- Optimization techniques for craig interpolant compaction in unbounded model checking (GC, CL, DV), pp. 1417–1422.
DATE-2013-ShahKA #analysis- Bounding SDRAM interference: detailed analysis vs. latency-rate analysis (HS, AK, BA), pp. 308–313.
DATE-2013-TzouBHC #composition #using- Periodic jitter and bounded uncorrelated jitter decomposition using incoherent undersampling (NT, DB, SWH, AC), pp. 1667–1672.
FoSSaCS-2013-BonnetC - Bounded Context-Switching and Reentrant Locking (RB, RC), pp. 65–80.
STOC-2013-Ajtai #quantifier- Lower bounds for RAMs and quantifier elimination (MA), pp. 803–812.
STOC-2013-AzarCKS #online- Tight bounds for online vector bin packing (YA, IRC, SK, FBS), pp. 961–970.
STOC-2013-BhowmickDL #product line- New bounds for matching vector families (AB, ZD, SL), pp. 823–832.
STOC-2013-BurgisserI #complexity #geometry- Explicit lower bounds via geometric complexity theory (PB, CI), pp. 141–150.
STOC-2013-ChakrabartyS13a #testing- Optimal bounds for monotonicity and lipschitz testing over hypercubes and hypergrids (DC, CS), pp. 419–428.
STOC-2013-FeldmanGRVX #algorithm #clique #detection #statistics- Statistical algorithms and a lower bound for detecting planted cliques (VF, EG, LR, SV, YX), pp. 655–664.
STOC-2013-GuptaTW #algorithm #graph- Sparsest cut on bounded treewidth graphs: algorithms and hardness results (AG, KT, DW), pp. 281–290.
STOC-2013-GuruswamiX #algebra #geometry- List decoding reed-solomon, algebraic-geometric, and gabidulin subcodes up to the singleton bound (VG, CX), pp. 843–852.
STOC-2013-KalaiRR - Delegation for bounded space (YTK, RR, RDR), pp. 565–574.
STOC-2013-KomargodskiR - Average-case lower bounds for formula size (IK, RR), pp. 171–180.
STOC-2013-NelsonN - Sparsity lower bounds for dimensionality reducing maps (JN, HLN), pp. 101–110.
STOC-2013-Sherstov #communication #using- Communication lower bounds using directional derivatives (AAS), pp. 921–930.
TACAS-2013-FalkeMS #c #contest #model checking #named #source code #using- LLBMC: Improved Bounded Model Checking of C Programs Using LLVM — (Competition Contribution) (SF, FM, CS), pp. 623–626.
TACAS-2013-GangeNSSS #constraints #model checking #regular expression- Unbounded Model-Checking with Interpolation for Regular Language Constraints (GG, JAN, PJS, HS, PS), pp. 277–291.
TACAS-2013-MorseCNF #contest- Handling Unbounded Loops with ESBMC 1.20 — (Competition Contribution) (JM, LCC, DN, BF), pp. 619–622.
CAV-2013-AlglaveKT #concurrent #model checking #partial order #performance- Partial Orders for Efficient Bounded Model Checking of Concurrent Software (JA, DK, MT), pp. 141–157.
CAV-2013-FarzanK #named #parallel #static analysis- Duet: Static Analysis for Unbounded Parallelism (AF, ZK), pp. 191–196.
CAV-2013-KomuravelliGCC #abstraction #automation #model checking #smt- Automatic Abstraction in SMT-Based Unbounded Software Model Checking (AK, AG, SC, EMC), pp. 846–862.
CAV-2013-StewartEY #automaton #model checking #polynomial #probability- Upper Bounds for Newton’s Method on Monotone Polynomial Systems, and P-Time Model Checking of Probabilistic One-Counter Automata (AS, KE, MY), pp. 495–510.
CSL-2013-BerkholzKV #logic #quantifier- Bounds for the quantifier depth in finite-variable logics: Alternation hierarchy (CB, AK, OV), pp. 61–80.
CSL-2013-GhasemlooC #proving- Theories for Subexponential-size Bounded-depth Frege Proofs (KG, SAC), pp. 296–315.
ICLP-J-2013-AzizCS #semantics- Stable model semantics for founded bounds (RAA, GC, PJS), pp. 517–532.
ICST-2013-AbadABCFGMMRV #contract #generative #incremental #satisfiability #testing- Improving Test Generation under Rich Contracts by Tight Bounds and Incremental SAT Solving (PA, NA, VSB, DC, MFF, JPG, TSEM, MMM, NR, IV), pp. 21–30.
ICST-2013-HillTB #c++ #named- GrowthTracker: Diagnosing Unbounded Heap Growth in C++ Software (EH, DJT, SB), pp. 134–143.
ISSTA-2013-BindalBL #concurrent #parallel #source code #testing #thread- Variable and thread bounding for systematic testing of multithreaded programs (SB, SB, AL), pp. 145–155.
ISSTA-2013-RosnerGBBRPZF #analysis #invariant #parallel #refinement- Parallel bounded analysis in code with rich invariants by refinement of field bounds (NR, JPG, SB, GMB, SPDR, LP, LZ, MFF), pp. 23–33.
LICS-2013-HeimbergKS #normalisation- An Optimal Gaifman Normal Form Construction for Structures of Bounded Degree (LH, DK, NS), pp. 63–72.
LICS-2013-MogaveroMS #behaviour #on the- On the Boundary of Behavioral Strategies (FM, AM, LS), pp. 263–272.
SAT-2013-Atserias #algebra #problem #proving- The Proof-Search Problem between Bounded-Width Resolution and Bounded-Degree Semi-algebraic Proofs (AA), pp. 1–17.
SAT-2013-Lauria #proving #rank #theorem- A Rank Lower Bound for Cutting Planes Proofs of Ramsey’s Theorem (ML), pp. 351–364.
SAT-2013-MisraORS #detection #set- Upper and Lower Bounds for Weak Backdoor Set Detection (NM, SO, VR, SS), pp. 394–402.
SIGMOD-2012-FraternaliMT - Top-k bounded diversification (PF, DM, MT), pp. 421–432.
VLDB-2012-BailisVFHS - Probabilistically Bounded Staleness for Practical Partial Quorums (PB, SV, MJF, JMH, IS), pp. 776–787.
VLDB-2012-SelkeLB #database- Pushing the Boundaries of Crowd-enabled Databases with Query-driven Schema Expansion (JS, CL, WTB), pp. 538–549.
AFL-J-2011-IbarraS12 #linear- Characterizations of Bounded semilinear Languages by One-Way and Two-Way Deterministic Machines (OHI, SS), pp. 1291–1306.
CIAA-2012-Gusev #automaton #rank- Synchronizing Automata of Bounded Rank (VVG), pp. 171–179.
CIAA-2012-HeamHK #constraints #on the- On Positive TAGED with a Bounded Number of Constraints (PCH, VH, OK), pp. 329–336.
CIAA-2012-ReidenbachS #automaton #nondeterminism- Automata with Modulo Counters and Nondeterministic Counter Bounds (DR, MLS), pp. 361–368.
DLT-2012-CaralpRT #automaton #multi- Visibly Pushdown Automata with Multiplicities: Finiteness and K-Boundedness (MC, PAR, JMT), pp. 226–238.
DLT-2012-FazekasMS - Hairpin Completion with Bounded Stem-Loop (SZF, RM, KST), pp. 428–439.
ICALP-v1-2012-AchlioptasM #random #satisfiability- Unsatisfiability Bounds for Random CSPs from an Energetic Interpolation Method (DA, RMM), pp. 1–12.
ICALP-v1-2012-ChanLN #fault tolerance #metric- Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree (THHC, ML, LN), pp. 182–193.
ICALP-v1-2012-CrowstonJM - Max-Cut Parameterized above the Edwards-Erdős Bound (RC, MJ, MM), pp. 242–253.
ICALP-v1-2012-KapralovP #metric- NNS Lower Bounds via Metric Expansion for l ∞ and EMD (MK, RP), pp. 545–556.
ICALP-v1-2012-Kimmel #quantum- Quantum Adversary (Upper) Bound (SK), pp. 557–568.
ICALP-v1-2012-LaplanteLR #detection #quantum- Classical and Quantum Partition Bound and Detector Inefficiency (SL, VL, JR), pp. 617–628.
ICALP-v1-2012-Marx #multi- A Tight Lower Bound for Planar Multiway Cut with Fixed Number of Terminals (DM), pp. 677–688.
ICALP-v2-2012-AtseriasD #approximate #quantifier- Degree Lower Bounds of Tower-Type for Approximating Formulas with Parity Quantifiers (AA, AD), pp. 67–78.
ICALP-v2-2012-FearnleyS #game studies- Time and Parallelizability Results for Parity Games with Bounded Treewidth (JF, SS), pp. 189–200.
ICALP-v2-2012-KikotKPZ #exponential #query- Exponential Lower Bounds and Separation for Query Rewriting (SK, RK, VVP, MZ), pp. 263–274.
LATA-2012-ReidenbachS - Patterns with Bounded Treewidth (DR, MLS), pp. 468–479.
IFM-2012-RochaBCN #comprehension #debugging #model checking #programming #using- Understanding Programming Bugs in ANSI-C Software Using Bounded Model Checking Counter-Examples (HR, RSB, LCC, ADN), pp. 128–142.
SEFM-2012-ColomboFMP #configuration management #monitoring #named #resource management #runtime #verification- polyLarva: Runtime Verification with Configurable Resource-Aware Monitoring Boundaries (CC, AF, RM, GJP), pp. 218–232.
CHI-2012-WisniewskiLW - Fighting for my space: coping mechanisms for sns boundary regulation (PJW, HRL, DW), pp. 609–618.
CSCW-2012-FredericW #social #social media- Boundary regulation in social media (SF, HW), pp. 769–778.
ICML-2012-FoxT - Bounded Planning in Passive POMDPs (RF, NT), p. 15.
ICML-2012-FreitasSZ #exponential #process- Exponential Regret Bounds for Gaussian Process Bandits with Deterministic Observations (NdF, AJS, MZ), p. 125.
ICML-2012-HoiWZJW #algorithm #kernel #learning #online #performance #scalability- Fast Bounded Online Gradient Descent Algorithms for Scalable Kernel-Based Online Learning (SCHH, JW, PZ, RJ, PW), p. 141.
ICML-2012-JiYLJH #algorithm #fault #learning- A Simple Algorithm for Semi-supervised Learning with Improved Generalization Error Bound (MJ, TY, BL, RJ, JH), p. 110.
ICML-2012-MorvantKR #classification #matrix #multi- PAC-Bayesian Generalization Bound on Confusion Matrix for Multi-Class Classification (EM, SK, LR), p. 158.
ICML-2012-Petrik #approximate #programming #robust- Approximate Dynamic Programming By Minimizing Distributionally Robust Bounds (MP), p. 207.
ICPR-2012-ChenYZZ #detection #network- Detecting occlusion boundaries via saliency network (DC, ZY, GZ, NZ), pp. 2569–2572.
ICPR-2012-LiuSZWBCT #detection- Joint shot boundary detection and key frame extraction (XL, MS, LZ, SW, JB, CC, DT), pp. 2565–2568.
ICPR-2012-SongZJB #robust #video- Robust video stabilization based on bounded path planning (CS, HZ, WJ, YB), pp. 3684–3687.
ICPR-2012-SuYLW #classification #editing #using- Local color editing using color classification and boundary inpainting (ZS, XY, XL, DW), pp. 3196–3199.
ICPR-2012-WangHB #locality- Glass object localization by joint inference of boundary and depth (TW, XH, NB), pp. 3783–3786.
ICPR-2012-ZhangXY #detection #modelling- An improved surround suppression model based on orientation contrast for boundary detection (HZ, BX, JY), pp. 3086–3089.
KDD-2012-ZhangY #community #detection #matrix- Overlapping community detection via bounded nonnegative matrix tri-factorization (YZ, DYY), pp. 606–614.
KR-2012-GiacomoLP #calculus #decidability #verification- Bounded Situation Calculus Action Theories and Decidable Verification (GDG, YL, FP).
KR-2012-GiordanoMD #model checking- Achieving Completeness in Bounded Model Checking of Action Theories in ASP (LG, AM, DTD).
POPL-2012-KrishnaswamiBH #functional #higher-order #programming- Higher-order functional reactive programming in bounded space (NRK, NB, JH), pp. 45–58.
QAPL-2012-PalamidessiS #algebra #constraints #difference #privacy #relational- Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems (CP, MS), pp. 92–105.
ASE-2012-NijjarB #smt #using #verification- Unbounded data model verification using SMT solvers (JN, TB), pp. 210–219.
FSE-2012-NearJ #named #verification #web- Rubicon: bounded verification of web applications (JPN, DJ), p. 60.
ICSE-2012-ZhouXZ #named #polynomial #search-based- Stride: Search-based deterministic replay in polynomial time via bounded linkage (JZ, XX, CZ), pp. 892–902.
SAC-2012-El-ShambakeyR #concurrent #embedded #manycore #realtime #trade-off- STM concurrency control for multicore embedded real-time software: time bounds and tradeoffs (MES, BR), pp. 1602–1609.
SAC-2012-OliveiraCS #on the #using- On using adversary simulators to obtain tight lower bounds for response times (RSdO, AC, RAS), pp. 1573–1579.
SAC-2012-ShahidPO - Minimum bounding boxes for regular cross-polytopes (SS, SP, CBO), pp. 879–884.
CASE-2012-KehoeBG #adaptation- Estimating part tolerance bounds based on adaptive Cloud-based grasp planning with slip (BK, DB, KG), pp. 1106–1113.
CASE-2012-ParkM #behaviour #clustering #hybrid #linear #performance #tool support- Performance bounds for hybrid flow lines: Fundamental behavior, practical features and application to linear cluster tools (KP, JRM), pp. 371–376.
CC-2012-ShirakoSFPRSS - Analytical Bounds for Optimal Tile Size Selection (JS, KS, NF, LNP, JR, PS, VS), pp. 101–121.
CGO-2012-HasabnisMS - Light-weight bounds checking (NH, AM, RS), pp. 135–144.
DAC-2012-El-ShambakeyR #concurrent #embedded #realtime- STM concurrency control for embedded real-time software with tighter time bounds (MES, BR), pp. 437–446.
DATE-2012-AxerSE #probability- Probabilistic response time bound for CAN messages with arbitrary deadlines (PA, MS, RE), pp. 1114–1117.
DATE-2012-ShahRK #scheduling #using- Bounding WCET of applications using SDRAM with Priority Based Budget Scheduling in MPSoCs (HS, AR, AK), pp. 665–670.
PDP-2012-BoukedjarLB #branch #cpu #gpu #parallel- Parallel Branch and Bound on a CPU-GPU System (AB, MEL, DEB), pp. 392–398.
STOC-2012-AgrawalSSS - Jacobian hits circuits: hitting-sets, lower bounds for depth-D occur-k formulas & depth-3 transcendence degree-k circuits (MA, CS, RS, NS), pp. 599–614.
STOC-2012-BeameBI #trade-off- Time-space tradeoffs in resolution: superpolynomial lower bounds for superlinear space (PB, CB, RI), pp. 213–232.
STOC-2012-BulanekKS #online #problem- Tight lower bounds for the online labeling problem (JB, MK, MES), pp. 1185–1198.
STOC-2012-ChanP #analysis #fourier #network- Tight bounds for monotone switching networks via fourier analysis (SMC, AP), pp. 495–504.
STOC-2012-FioriniMPTW #exponential #linear- Linear vs. semidefinite extended formulations: exponential separation and strong lower bounds (SF, SM, SP, HRT, RdW), pp. 95–106.
STOC-2012-GalHKPV - Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates (AG, KAH, MK, PP, EV), pp. 479–494.
STOC-2012-GiakkoupisW #random- A tight RMR lower bound for randomized mutual exclusion (GG, PW), pp. 983–1002.
STOC-2012-WoodruffZ #distributed #functional #monitoring- Tight bounds for distributed functional monitoring (DPW, QZ), pp. 941–960.
TACAS-2012-BouajjaniE #analysis #message passing #source code- Bounded Phase Analysis of Message-Passing Programs (AB, ME), pp. 451–465.
TACAS-2012-CordeiroMNF #contest #model checking- Context-Bounded Model Checking with ESBMC 1.17 — (Competition Contribution) (LCC, JM, DN, BF), pp. 534–537.
TACAS-2012-CoxSC #precise #verification- A Bit Too Precise? Bounded Verification of Quantized Digital Filters (AC, SS, BYEC), pp. 33–47.
TACAS-2012-DSilvaHKT #analysis #learning- Numeric Bounds Analysis with Conflict-Driven Learning (VD, LH, DK, MT), pp. 48–63.
TACAS-2012-SinzMF #contest #model checking #named #representation- LLBMC: A Bounded Model Checker for LLVM’s Intermediate Representation — (Competition Contribution) (CS, FM, SF), pp. 542–544.
CAV-2012-HagueL #analysis #parallel #source code #thread- Synchronisation- and Reversal-Bounded Analysis of Multithreaded Programs with Counters (MH, AWL), pp. 260–276.
CAV-2012-Moskal #c #infinity #verification- From C to Infinity and Back: Unbounded Auto-active Verification with VCC (MM), p. 6.
CSL-2012-BertrandFS #satisfiability- Bounded Satisfiability for PCTL (NB, JF, SS), pp. 92–106.
CSL-2012-DudderMRU #combinator #logic- Bounded Combinatory Logic (BD, MM, JR, PU), pp. 243–258.
CSL-2012-Kuroda #axiom #concept #proving- Axiomatizing proof tree concepts in Bounded Arithmetic (SK), pp. 440–454.
ICST-2012-CadavidBS #metamodelling #modelling- Searching the Boundaries of a Modeling Space to Test Metamodels (JJC, BB, HAS), pp. 131–140.
ICST-2012-LiuNT #case study #smt #using #verification- Bounded Program Verification Using an SMT Solver: A Case Study (TL, MN, MT), pp. 101–110.
IJCAR-2012-EmmerKKSV #model checking #word- EPR-Based Bounded Model Checking at Word Level (ME, ZK, KK, CS, AV), pp. 210–224.
IJCAR-2012-SpielmannK #synthesis- Synthesis for Unbounded Bit-Vector Arithmetic (AS, VK), pp. 499–513.
LICS-2012-BartoKW #constraints- Near Unanimity Constraints Have Bounded Pathwidth Duality (LB, MK, RW), pp. 125–134.
LICS-2012-Berkholz #game studies #testing- Lower Bounds for Existential Pebble Games and k-Consistency Tests (CB), pp. 25–34.
LICS-2012-BundalaOW #model checking #on the- On the Magnitude of Completeness Thresholds in Bounded Model Checking (DB, JO, JW), pp. 155–164.
LICS-2012-EsparzaGM #verification- A Perfect Model for Bounded Verification (JE, PG, RM), pp. 285–294.
LICS-2012-GrigorieffV #algorithm #using- Functionals Using Bounded Information and the Dynamics of Algorithms (SG, PV), pp. 345–354.
SAT-2012-AchlioptasM #algorithm #exponential #random #satisfiability- Exponential Lower Bounds for DPLL Algorithms on Satisfiable Random 3-CNF Formulas (DA, RMM), pp. 327–340.
TAP-2012-BengoleaAMF #test coverage #testing #using- Using Coverage Criteria on RepOK to Reduce Bounded-Exhaustive Test Suites (VSB, NA, DM, MFF), pp. 19–34.
PODS-2011-JowhariST #problem- Tight bounds for Lp samplers, finding duplicates in streams, and related problems (HJ, MS, GT), pp. 49–58.
ITiCSE-2011-MarkhamB #twitter #using- Collaborating across international boundaries: using twitter as a tool in the classroom (SM, SB), p. 382.
ICSM-2011-YazdanshenasM #component- Crossing the boundaries while analyzing heterogeneous component-based software systems (ARY, LM), pp. 193–202.
DLT-J-2009-BealBP11 #automaton #clustering #polynomial #word- A Quadratic Upper Bound on the Size of a Synchronizing Word in One-Cluster Automata (MPB, MVB, DP), pp. 277–288.
DLT-J-2009-Petersen11 #simulation- Simulations by Time-Bounded Counter Machines (HP), pp. 395–409.
AFL-2011-IbarraS #linear- Characterizations of Bounded Semilinear Languages by One-Way and Two-way Deterministic Machines (OHI, SS), pp. 211–224.
DLT-2011-KortelainenS #context-free grammar- There Does Not Exist a Minimal Full Trio with Respect to Bounded Context-Free Languages (JK, TS), pp. 312–323.
ICALP-v1-2011-AdlerKKLST #graph- Tight Bounds for Linkages in Planar Graphs (IA, SGK, PKK, DL, SS, DMT), pp. 110–121.
ICALP-v1-2011-BeyersdorffGLR - Parameterized Bounded-Depth Frege Is Not Optimal (OB, NG, ML, AAR), pp. 630–641.
ICALP-v1-2011-BordewichK #agile #graph #set- Rapid Mixing of Subset Glauber Dynamics on Graphs of Bounded Tree-Width (MB, RJK), pp. 533–544.
ICALP-v1-2011-CliffordJ #integer #multi #online- Lower Bounds for Online Integer Multiplication and Convolution in the Cell-Probe Model (RC, MJ), pp. 593–604.
ICALP-v1-2011-FilmusPS #exponential- Exponential Lower Bounds for AC0-Frege Imply Superpolynomial Frege Lower Bounds (YF, TP, RS), pp. 618–629.
ICALP-v1-2011-HarkinsH #algorithm #game studies #learning- Exact Learning Algorithms, Betting Games, and Circuit Lower Bounds (RCH, JMH), pp. 416–423.
ICALP-v1-2011-KawarabayashiKS #approximate #distance #graph- Linear-Space Approximate Distance Oracles for Planar, Bounded-Genus and Minor-Free Graphs (KiK, PNK, CS), pp. 135–146.
ICALP-v1-2011-MagniezNSX #complexity #random #recursion- Improved Bounds for the Randomized Decision Tree Complexity of Recursive Majority (FM, AN, MS, DX), pp. 317–329.
ICALP-v1-2011-Zhang #communication #complexity #on the #power of #quantum- On the Power of Lower Bound Methods for One-Way Quantum Communication Complexity (SZ), pp. 49–60.
ICALP-v2-2011-BrazdilKKV #analysis #probability #recursion #runtime #source code- Runtime Analysis of Probabilistic Programs with Unbounded Recursion (TB, SK, AK, IHV), pp. 319–331.
ICALP-v2-2011-BrihayeDGORW #automaton #hybrid #on the #reachability- On Reachability for Hybrid Automata over Bounded Time (TB, LD, GG, JO, JFR, JW), pp. 416–427.
ICALP-v2-2011-HalldorssonM #distributed #scheduling- Nearly Optimal Bounds for Distributed Wireless Scheduling in the SINR Model (MMH, PM), pp. 625–636.
ICALP-v2-2011-SchmitzS #multi #recursion- Multiply-Recursive Upper Bounds with Higman’s Lemma (SS, PS), pp. 441–452.
LATA-2011-Quaas #automaton #on the #problem- On the Interval-Bound Problem for Weighted Timed Automata (KQ), pp. 452–464.
FM-2011-AlbertGGJST #behaviour #concurrent #simulation #worst-case- Simulating Concurrent Behaviors with Worst-Case Cost Bounds (EA, SG, MGZ, EBJ, RS, SLTT), pp. 353–368.
FM-2011-DiosP #certification #memory management #polynomial- Certification of Safe Polynomial Memory Bounds (JdD, RP), pp. 184–199.
RTA-2011-DurandS #linear- Left-linear Bounded TRSs are Inverse Recognizability Preserving (ID, MS), pp. 361–376.
SEFM-2011-MorseCNF #ltl #model checking- Context-Bounded Model Checking of LTL Properties for ANSI-C Software (JM, LCC, DN, BF), pp. 302–317.
SEFM-2011-ParrinoGGF #analysis #data flow #satisfiability #verification- A Dataflow Analysis to Improve SAT-Based Bounded Program Verification (BCP, JPG, DG, MFF), pp. 138–154.
ICFP-2011-WeirichYS - Binders unbound (SW, BAY, TS), pp. 333–345.
CHI-2011-KuznetsovTKHPS - Breaking boundaries: strategies for mentoring through textile computing workshops (SK, LCT, CK, IH, EP, DPS), pp. 2957–2966.
CHI-2011-ZhouAZ - CPOE workarounds, boundary objects, and assemblages (XZ, MSA, KZ), pp. 3353–3362.
CAiSE-2011-Finkelstein #challenge #information management #re-engineering- Ten Open Challenges at the Boundaries of Software Engineering and Information Systems (AF), p. 1.
ICEIS-v1-2011-ChenZ #analysis- Analysis on the Spatial Variation of the Center of Gravity of Inbound Tourism in China (YC, HZ), pp. 441–447.
CIKM-2011-LiuLH #fault #kernel #learning- Learning kernels with upper bounds of leave-one-out error (YL, SL, YH), pp. 2205–2208.
CIKM-2011-LvZ #normalisation- Lower-bounding term frequency normalization (YL, CZ), pp. 7–16.
ICML-2011-JegelkaB11a #approximate #using- Approximation Bounds for Inference using Cooperative Cuts (SJ, JAB), pp. 577–584.
ICML-2011-LiuI #difference #using- Bounding the Partition Function using Holder’s Inequality (QL, ATI), pp. 849–856.
ICML-2011-MarlinKM #modelling- Piecewise Bounds for Estimating Bernoulli-Logistic Latent Gaussian Models (BMM, MEK, KPM), pp. 633–640.
ICML-2011-RoyLM #polynomial #source code- From PAC-Bayes Bounds to Quadratic Programs for Majority Votes (JFR, FL, MM), pp. 649–656.
ICML-2011-Scott #classification- Surrogate losses and regret bounds for cost-sensitive classification with example-dependent costs (CS), pp. 153–160.
KDD-2011-IfrimW #biology #classification #coordination #predict #sequence- Bounded coordinate-descent for biological sequence classification in high dimensional predictor space (GI, CW), pp. 708–716.
KDD-2011-RaissiP #towards- Towards bounding sequential patterns (CR, JP), pp. 1379–1387.
MLDM-2011-AlshukriCZ #detection #incremental #random #using- Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
PEPM-2011-Rinard #probability #program analysis #program transformation #source code- Probabilistic accuracy bounds for perforated programs: a new foundation for program analysis and transformation (MCR), pp. 79–80.
POPL-2011-BenderskyP #memory management- Space overhead bounds for dynamic memory management with partial compaction (AB, EP), pp. 475–486.
POPL-2011-EmmiQR #scheduling- Delay-bounded scheduling (ME, SQ, ZR), pp. 411–422.
SAS-2011-MonniauxG #fixpoint #model checking #using- Using Bounded Model Checking to Focus Fixpoint Iterations (DM, LG), pp. 369–385.
SAS-2011-ZulegerGSV #abstraction #analysis #imperative #source code- Bound Analysis of Imperative Programs with the Size-Change Abstraction (FZ, SG, MS, HV), pp. 280–297.
RE-2011-UbayashiKHT #analysis #embedded- A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
ASE-2011-IvancicBGSMTIM #framework #named #scalability #verification- DC2: A framework for scalable, scope-bounded software verification (FI, GB, AG, SS, NM, HT, TI, YM), pp. 133–142.
ICSE-2011-CordeiroF #concurrent #model checking #multi #smt #thread #using #verification- Verifying multi-threaded software using smt-based context-bounded model checking (LC, BF), pp. 331–340.
CASE-2011-WuS #multi #problem- A lower and upper bound guided nested partitions method for solving capacitated multi-level production planning problems (TW, LS), pp. 78–83.
CC-2011-JoynerBS #analysis #array- Subregion Analysis and Bounds Check Elimination for High Level Arrays (MJ, ZB, VS), pp. 246–265.
DAC-2011-HaoTSS #analysis #performance #process- Performance bound analysis of analog circuits considering process variations (ZH, SXDT, RS, GS), pp. 310–315.
DAC-2011-HsiaoD #parallel #scalability- A highly scalable parallel boundary element method for capacitance extraction (YCH, LD), pp. 552–557.
DATE-2011-LuHCT - Steiner tree based rotary clock routing with bounded skew and capacitive load balancing (JL, VH, XC, BT), pp. 455–460.
DATE-2011-ShahRK #latency #performance- Priority division: A high-speed shared-memory bus arbitration with bounded latency (HS, AR, AK), pp. 1497–1500.
DATE-2011-TsaiLCKCK #on the- On routing fixed escaped boundary pins for high speed boards (TYT, RJL, CYC, CYK, HMC, YK), pp. 461–466.
STOC-2011-AdamaszekCER #order- Almost tight bounds for reordering buffer management (AA, AC, ME, HR), pp. 607–616.
STOC-2011-BarakDYW #design #geometry #matrix #rank- Rank bounds for design matrices with applications toc ombinatorial geometry and locally correctable codes (BB, ZD, AY, AW), pp. 519–528.
STOC-2011-ChakrabartiR #communication #complexity- An optimal lower bound on the communication complexity of gap-hamming-distance (AC, OR), pp. 51–60.
STOC-2011-FriedmannHZ #algorithm #random- Subexponential lower bounds for randomized pivoting rules for the simplex algorithm (OF, TDH, UZ), pp. 283–292.
STOC-2011-LeeS - Near-optimal distortion bounds for embedding doubling spaces into L1 (JRL, AS), pp. 765–772.
STOC-2011-LenzenW #parallel #random- Tight bounds for parallel randomized load balancing: extended abstract (CL, RW), pp. 11–20.
STOC-2011-SaxenaS #matter #testing- Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn’t matter (NS, CS), pp. 431–440.
STOC-2011-Yoshida #algorithm #approximate #csp- Optimal constant-time approximation algorithms and (unconditional) inapproximability results for every bounded-degree CSP (YY), pp. 665–674.
TACAS-2011-Ehlers #named #synthesis- Unbeast: Symbolic Bounded Synthesis (RE), pp. 272–275.
CADE-2011-KorovinV #linear- Solving Systems of Linear Inequalities by Bound Propagation (KK, AV), pp. 369–383.
CAV-2011-BrazdilKK #analysis #performance #probability #source code- Efficient Analysis of Probabilistic Programs with an Unbounded Counter (TB, SK, AK), pp. 208–224.
CAV-2011-KroeningOSWW #linear #model checking- Linear Completeness Thresholds for Bounded Model Checking (DK, JO, OS, TW, JW), pp. 557–572.
CSL-2011-CaiZ - Tight Upper Bounds for Streett and Parity Complementation (YC, TZ), pp. 112–128.
ISSTA-2011-NijjarB #modelling #ruby #verification- Bounded verification of Ruby on Rails data models (JN, TB), pp. 67–77.
LICS-2011-FigueiraFSS #recursion- Ackermannian and Primitive-Recursive Bounds with Dickson’s Lemma (DF, SF, SS, PS), pp. 269–278.
SAT-2011-Williams #algorithm #complexity #satisfiability- Connecting SAT Algorithms and Complexity Lower Bounds (RW), pp. 1–2.
TAP-2011-AguirreBFG #black box #generative #test coverage #testing- Incorporating Coverage Criteria in Bounded Exhaustive Black Box Test Generation of Structural Inputs (NA, VSB, MFF, JPG), pp. 15–32.
AFL-J-2008-MalcherMP10 #array- Sublinearly Space Bounded Iterative Arrays (AM, CM, BP), pp. 843–858.
DLT-2010-BremerF #problem- Inclusion Problems for Patterns with a Bounded Number of Variables (JB, DDF), pp. 100–111.
DLT-2010-DrosteV #automaton #logic #multi #theorem- Kleene and Büchi Theorems for Weighted Automata and Multi-valued Logics over Arbitrary Bounded Lattices (MD, HV), pp. 160–172.
ICALP-v1-2010-GreveJLT #approximate- Cell Probe Lower Bounds and Approximations for Range Mode (MG, AGJ, KDL, JT), pp. 605–616.
ICALP-v2-2010-Fearnley #exponential #policy- Exponential Lower Bounds for Policy Iteration (JF), pp. 551–562.
ICALP-v2-2010-OuaknineW #formal method #towards #verification- Towards a Theory of Time-Bounded Verification (JO, JW), pp. 22–37.
LATA-2010-FlorencioF #approach #consistency- Finding Consistent Categorial Grammars of Bounded Value: A Parameterized Approach (CCF, HF), pp. 202–213.
LATA-2010-Neary - A Boundary between Universality and Non-universality in Extended Spiking Neural P Systems (TN), pp. 475–487.
RTA-2010-DurandSS #linear #term rewriting #termination- Termination of linear bounded term rewriting systems (ID, GS, MS), pp. 341–356.
RTA-2010-Waldmann #matrix- Polynomially Bounded Matrix Interpretations (JW), pp. 357–372.
FLOPS-2010-KetemaS #diagrams #term rewriting #λ-calculus- Least Upper Bounds on the Size of Church-Rosser Diagrams in Term Rewriting and λ-Calculus (JK, JGS), pp. 272–287.
CHI-2010-AarhusB - Negotiating boundaries: managing disease at home (RA, SAB), pp. 1223–1232.
CHI-2010-AssogbaD #named #programming- Share: a programming environment for loosely bound cooperation (YA, JSD), pp. 961–970.
CHI-2010-DantecE #information management #multi- Across boundaries of influence and accountability: the multiple scales of public sector information systems (CALD, WKE), pp. 113–122.
CIKM-2010-XiaoLC #concept- K-farthest-neighbors-based concept boundary determination for support vector data description (YX, BL, LC), pp. 1701–1704.
ECIR-2010-AnderkaSP #similarity #why- Cross-Language High Similarity Search: Why No Sub-linear Time Bound Can Be Expected (MA, BS, MP), pp. 640–644.
ICML-2010-CortesMR10a #kernel #learning- Generalization Bounds for Learning Kernels (CC, MM, AR), pp. 247–254.
ICML-2010-SorgSL - Internal Rewards Mitigate Agent Boundedness (JS, SPS, RLL), pp. 1007–1014.
ICML-2010-SzitaS #complexity #learning #modelling- Model-based reinforcement learning with nearly tight exploration complexity bounds (IS, CS), pp. 1031–1038.
ICPR-2010-BaldacciBD #3d #algorithm #design #framework #graph #segmentation- Oriented Boundary Graph: A Framework to Design and Implement 3D Segmentation Algorithms (FB, AJPB, JPD), pp. 1116–1119.
ICPR-2010-BauerEOBKFHN #approach #estimation #graph #performance #robust- A Fast and Robust Graph-Based Approach for Boundary Estimation of Fiber Bundles Relying on Fractional Anisotropy Maps (MHAB, JE, TO, SB, JK, BF, HKH, CN), pp. 4016–4019.
ICPR-2010-DurrantK #performance- A Bound on the Performance of LDA in Randomly Projected Data Spaces (RJD, AK), pp. 4044–4047.
ICPR-2010-KhosrowabadiQWA #detection #recognition #self #using- EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
ICPR-2010-PhamTN #segmentation #similarity #using- Bounding-Box Based Segmentation with Single Min-cut Using Distant Pixel Similarity (VQP, KT, TN), pp. 4420–4423.
ICPR-2010-ZhangK #analysis- Weighted Boundary Points for Shape Analysis (JZ, RK), pp. 1598–1601.
KDD-2010-PrengerLVCH #classification #fault- Class-specific error bounds for ensemble classifiers (RJP, TDL, KRV, BYC, WGH), pp. 843–852.
KR-2010-PichlerRSW #constraints #programming- Tractable Answer-Set Programming with Weight Constraints: Bounded Treewidth Is not Enough (RP, SR, SS, SW).
KR-2010-ZhangZ #on the #semantics #set #source code- On the Progression Semantics and Boundedness of Answer Set Programs (YZ, YZ).
SIGIR-2010-WangLC #detection #query- Intent boundary detection in search query logs (CJW, KHYL, HHC), pp. 749–750.
MoDELS-v2-2010-ParetoEE #architecture #design- Architectural Descriptions as Boundary Objects in System and Design Work (LP, PE, SE), pp. 406–419.
SPLC-2010-ElsnerULS #consistency #product line- Consistent Product Line Configuration across File Type and Product Line Boundaries (CE, PU, DL, WSP), pp. 181–195.
PEPM-2010-AndersonK #approximate #termination- Regular approximation and bounded domains for size-change termination (HA, SCK), pp. 53–62.
PLDI-2010-GulwaniZ #problem- The reachability-bound problem (SG, FZ), pp. 292–304.
SAS-2010-AliasDFG #complexity #multi #ranking #source code #termination- Multi-dimensional Rankings, Program Termination, and Complexity Bounds of Flowchart Programs (CA, AD, PF, LG), pp. 117–133.
ASE-2010-HeJBGW #approach #model checking #statistics- A bounded statistical approach for model checking of unbounded until properties (RH, PJ, SB, APG, HW), pp. 225–234.
ICSE-2010-Cordeiro #concurrent #embedded #model checking #multi #smt #thread- SMT-based bounded model checking for multi-threaded software in embedded systems (LC), pp. 373–376.
ICSE-2010-YangL #approach #verification- A cut-off approach for bounded verification of parameterized systems (QY, ML), pp. 345–354.
SAC-2010-CampanTC - User-controlled generalization boundaries for p-sensitive k-anonymity (AC, TMT, NC), pp. 1103–1104.
CASE-2010-Hsu #markov #safety- Control of continuous-time Markov chains with safety upper bounds (SPH), pp. 990–993.
CASE-2010-MacwanNB #approach #multi #novel #online #predict #probability- On-line target-motion prediction for autonomous multirobot search in realistic terrains with time-expanding boundaries: A novel probabilistic approach (AM, GN, BB), pp. 662–667.
CASE-2010-WuZ #clustering #petri net #process #scheduling #tool support- Petri net-based scheduling of time-constrained dual-arm cluster tools with bounded activity time variation (NW, MZ), pp. 465–470.
DAC-2010-Breuer #hardware- Hardware that produces bounded rather than exact results (MAB), pp. 871–876.
DAC-2010-LinLHC #constraints- Performance-driven analog placement considering boundary constraint (CWL, JML, CPH, SJC), pp. 292–297.
DAC-2010-LiuKLC #concurrent #multi #thread- Multi-threaded collision-aware global routing with bounded-length maze routing (WHL, WCK, YLL, KYC), pp. 200–205.
DATE-2010-BuLWCL #composition #hybrid #linear #reachability- BACH 2 : Bounded reachability checker for compositional linear hybrid systems (LB, YL, LW, XC, XL), pp. 1512–1517.
DATE-2010-SchlieckerNE #analysis #multi #performance- Bounding the shared resource load for the performance analysis of multiprocessor systems (SS, MN, RE), pp. 759–764.
LCTES-2010-AltmeyerMR #analysis- Resilience analysis: tightening the CRPD bound for set-associative caches (SA, CM, JR), pp. 153–162.
ESOP-2010-NaumannB #first-order #higher-order #information management- Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions (DAN, AB), pp. 2–22.
FoSSaCS-2010-WiesZH #analysis #process- Forward Analysis of Depth-Bounded Processes (TW, DZ, TAH), pp. 94–108.
STOC-2010-BateniHM #approximate #graph- Approximation schemes for steiner forest on planar graphs and graphs of bounded treewidth (MB, MH, DM), pp. 211–220.
STOC-2010-ChierichettiLP - Almost tight bounds for rumour spreading with conductance (FC, SL, AP), pp. 399–408.
STOC-2010-DiakonikolasHKMRST #polynomial- Bounding the average sensitivity and noise sensitivity of polynomial threshold functions (ID, PH, AK, RM, PR, RAS, LYT), pp. 533–542.
STOC-2010-Hirai #multi #problem- The maximum multiflow problems with bounded fractionality (HH), pp. 115–120.
STOC-2010-KarninMSV #multi #testing- Deterministic identity testing of depth-4 multilinear circuits with bounded top fan-in (ZSK, PM, AS, IV), pp. 649–658.
STOC-2010-Patrascu #polynomial #problem #towards- Towards polynomial lower bounds for dynamic problems (MP), pp. 603–610.
STOC-2010-Raz - Tensor-rank and lower bounds for arithmetic formulas (RR), pp. 659–666.
STOC-2010-Sherstov - Optimal bounds for sign-representing the intersection of two halfspaces by polynomials (AAS), pp. 523–532.
STOC-2010-VerbinZ #memory management- The limits of buffering: a tight lower bound for dynamic membership in the external memory model (EV, QZ), pp. 447–456.
STOC-2010-Williams - Improving exhaustive search implies superpolynomial lower bounds (RW), pp. 231–240.
TACAS-2010-MalinowskiN #automaton #model checking #partial order #satisfiability #semantics- SAT Based Bounded Model Checking with Partial Order Semantics for Timed Automata (JM, PN), pp. 405–419.
CAV-2010-BouajjaniDERS #invariant #source code #synthesis- Invariant Synthesis for Programs Manipulating Lists with Unbounded Data (AB, CD, CE, AR, MS), pp. 72–88.
CAV-2010-Ehlers #synthesis- Symbolic Bounded Synthesis (RE), pp. 365–379.
CAV-2010-GantyMM #approximate- Bounded Underapproximations (PG, RM, BM), pp. 600–614.
CAV-2010-Seth #automaton #multi #reachability- Global Reachability in Bounded Phase Multi-stack Pushdown Systems (AS), pp. 615–628.
CAV-2010-ZhouHWG #array #on the- On Array Theory of Bounded Elements (MZ, FH, BYW, MG), pp. 570–584.
ISSTA-2010-GaleottiRPF #analysis #invariant #performance #verification- Analysis of invariants for efficient bounded verification (JPG, NR, CLP, MFF), pp. 25–36.
LICS-2010-JenkinsORW #automaton- Alternating Timed Automata over Bounded Time (MJ, JO, AR, JW), pp. 60–69.
LICS-2010-KreutzerT #complexity #higher-order #logic #monad- Lower Bounds for the Complexity of Monadic Second-Order Logic (SK, ST), pp. 189–198.
SAT-2010-Ben-SassonJ #learning #strict- Lower Bounds for Width-Restricted Clause Learning on Small Width Formulas (EBS, JJ), pp. 16–29.
SAT-2010-BoufkhadH #satisfiability- Non Uniform Selection of Solutions for Upper Bounding the 3-SAT Threshold (YB, TH), pp. 99–112.
SAT-2010-MillerKLB #design #encoding #model checking- Encoding Techniques, Craig Interpolants and Bounded Model Checking for Incomplete Designs (CM, SK, MDTL, BB), pp. 194–208.
SAT-2010-RathiARS #random #satisfiability- Bounds on Threshold of Regular Random k-SAT (VR, EA, LKR, MS), pp. 264–277.
VMCAI-2010-ChadhaLPV #complexity #realtime #verification- Complexity Bounds for the Verification of Real-Time Software (RC, AL, PP, MV), pp. 95–111.
VMCAI-2010-Dubrovin #reachability- Checking Bounded Reachability in Asynchronous Systems by Symbolic Event Tracing (JD), pp. 146–162.
DRR-2009-TaghvaC #analysis #documentation #using- Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
ICDAR-2009-LiuBMG #detection #fault #sequence- Improving the Table Boundary Detection in PDFs by Fixing the Sequence Error of the Sparse Lines (YL, KB, PM, CLG), pp. 1006–1010.
ICDAR-2009-SharmaL - Form Field Frame Boundary Removal for Form Processing System in Gurmukhi Script (DVS, GSL), pp. 256–260.
ICDAR-2009-WangC #detection #documentation #image- Logo Detection in Document Images Based on Boundary Extension of Feature Rectangles (HW, YC), pp. 1335–1339.
PODS-2009-BerindeCIS #fault- Space-optimal heavy hitters with strong error bounds (RB, GC, PI, MJS), pp. 157–166.
PODS-2009-GottlobLV #query- Size and treewidth bounds for conjunctive queries (GG, STL, GV), pp. 45–54.
PODS-2009-Yi #query- Dynamic indexability and lower bounds for dynamic one-dimensional range query indexes (KY), pp. 187–196.
VLDB-2009-MoerkotteNS #estimation #fault- Preventing Bad Plans by Bounding the Impact of Cardinality Estimation Errors (GM, TN, GS), pp. 982–993.
WCRE-1999-PassingSLP99a #named- NTrace: Function Boundary Tracing for Windows on IA-32 (JP, AS, MvL, AP), pp. 43–52.
DLT-2009-BealP #automaton #clustering #polynomial #word- A Quadratic Upper Bound on the Size of a Synchronizing Word in One-Cluster Automata (MPB, DP), pp. 81–90.
DLT-2009-GruberH #complexity #regular expression- Tight Bounds on the Descriptional Complexity of Regular Expressions (HG, MH), pp. 276–287.
DLT-2009-Petersen #simulation- Simulations by Time-Bounded Counter Machines (HP), pp. 410–418.
DLT-2009-Shur - Two-Sided Bounds for the Growth Rates of Power-Free Languages (AMS), pp. 466–477.
ICALP-v1-2009-Amano #approximate- Bounds on the Size of Small Depth Circuits for Approximating Majority (KA), pp. 59–70.
ICALP-v1-2009-BansalCPK #scalability- Improved Bounds for Speed Scaling in Devices Obeying the Cube-Root Rule (NB, HLC, KP, DK), pp. 144–155.
ICALP-v1-2009-BuhrmanFS - Unconditional Lower Bounds against Advice (HB, LF, RS), pp. 195–209.
ICALP-v1-2009-ElsasserS #multi #random- Tight Bounds for the Cover Time of Multiple Random Walks (RE, TS), pp. 415–426.
ICALP-v1-2009-GuhaH #order #random #theorem- Revisiting the Direct Sum Theorem and Space Lower Bounds in Random Order Streams (SG, ZH), pp. 513–524.
ICALP-v1-2009-MastrolilliS #scheduling- Improved Bounds for Flow Shop Scheduling (MM, OS), pp. 677–688.
ICALP-v2-2009-BlumensathOW #finite #higher-order #monad #word- Boundedness of Monadic Second-Order Formulae over Finite Words (AB, MO, MW), pp. 67–78.
ICALP-v2-2009-ColcombetZ #automaton- A Tight Lower Bound for Determinization of Transition Labeled Büchi Automata (TC, KZ), pp. 151–162.
LATA-2009-Bollig #complexity #integer #multi- Larger Lower Bounds on the OBDD Complexity of Integer Multiplication (BB), pp. 212–223.
LATA-2009-GauwinNT #concurrent #query- Bounded Delay and Concurrency for Earliest Query Answering (OG, JN, ST), pp. 350–361.
LATA-2009-ItoLM - Bounded Hairpin Completion (MI, PL, VM), pp. 434–445.
FM-2009-BonakdarpourK #complexity #on the- On the Complexity of Synthesizing Relaxed and Graceful Bounded-Time 2-Phase Recovery (BB, SSK), pp. 660–675.
FM-2009-HarrisKCJR #data flow #process #verification- Verifying Information Flow Control over Unbounded Processes (WRH, NK, SC, SJ, TWR), pp. 773–789.
FM-2009-JostLHSH #analysis #using- “Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
FM-2009-PradellaMP #encoding #metric #model checking- A Metric Encoding for Bounded Model Checking (MP, AM, PSP), pp. 741–756.
FM-2009-ShaoKP #approach #formal method #incremental #lightweight #using- An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
IFM-2009-Cook #hardware #synthesis- Taming the Unbounded for Hardware Synthesis (BC), p. 39.
RTA-2009-BursucC #algebra #protocol #security- Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions (SB, HCL), pp. 133–147.
TLCA-2009-LagoH #linear #logic #revisited- Bounded Linear Logic, Revisited (UDL, MH), pp. 80–94.
DiGRA-2009-IhamakiT #comprehension #game studies #mobile- Understanding 21st Century's Mobile Device-Based Games within Boundaries (PI, PT).
HIMI-DIE-2009-ShinPC #detection- Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs (IS, NDP, HC), pp. 619–627.
ICML-2009-Cesa-BianchiGO #classification #robust- Robust bounds for classification via selective sampling (NCB, CG, FO), pp. 121–128.
ICML-2009-ReidW - Surrogate regret bounds for proper losses (MDR, RCW), pp. 897–904.
PLDI-2009-GulwaniJK #analysis #control flow #invariant #refinement- Control-flow refinement and progress invariants for bound analysis (SG, SJ, EK), pp. 375–385.
PLDI-2009-NagarakatteZMZ #c #memory management #named #safety- SoftBound: highly compatible and complete spatial memory safety for c (SN, JZ, MMKM, SZ), pp. 245–258.
PLDI-2009-PetrankMS #parallel #source code- Progress guarantee for parallel programs via bounded lock-freedom (EP, MM, BS), pp. 144–154.
SAS-2009-NiedzielskiRGP #constraints #control flow- A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination (DN, JvR, AG, KP), pp. 137–153.
ASE-2009-CordeiroFM #embedded #model checking #smt- SMT-Based Bounded Model Checking for Embedded ANSI-C Software (LCC, BF, JMS), pp. 137–148.
SAC-2009-ManuchSS #self- Two lower bounds for self-assemblies at temperature 1 (JM, LS, CS), pp. 808–809.
SAC-2009-YipH #consistency #constraints- Length-lex bound consistency for knapsack constraints (JY, PVH), pp. 1397–1401.
DAC-2009-FeySD #fault tolerance #using- Computing bounds for fault tolerance using formal techniques (GF, AS, RD), pp. 190–195.
DATE-2009-FahmyRJ #distributed #memory management #multi #on the #realtime #transaction- On bounding response times under software transactional memory in distributed multiprocessor real-time systems (SFF, BR, EDJ), pp. 688–693.
DATE-2009-GuoS #design #distributed #optimisation #using- Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
DATE-2009-PollexKAS #worst-case- Improved worst-case response-time calculations by upper-bound conditions (VP, SK, KA, FS), pp. 105–110.
FASE-2009-JagannathLDM #cost analysis #testing- Reducing the Costs of Bounded-Exhaustive Testing (VJ, YYL, BD, DM), pp. 171–185.
FoSSaCS-2009-KupfermanP #automaton- Lower Bounds on Witnesses for Nonemptiness of Universal Co-Büchi Automata (OK, NP), pp. 182–196.
FoSSaCS-2009-Schewe #automaton #nondeterminism- Tighter Bounds for the Determinisation of Büchi Automata (SS), pp. 167–181.
STOC-2009-BateniCG - MaxMin allocation via degree lower-bounded arborescences (MB, MC, VG), pp. 543–552.
STOC-2009-DietzfelbingerW - Tight lower bounds for greedy routing in uniform small world rings (MD, PW), pp. 591–600.
STOC-2009-Viola #data type- Bit-probe lower bounds for succinct data structures (EV), pp. 475–482.
TACAS-2009-AtigBQ #analysis #concurrent #source code #thread- Context-Bounded Analysis for Concurrent Programs with Dynamic Creation of Threads (MFA, AB, SQ), pp. 107–123.
TACAS-2009-NaumovichBG #named #performance #petri net- ITPN-PerfBound: A Performance Bound Tool for Interval Time Petri Nets (EPN, SB, MG), pp. 50–53.
CAV-2009-FuhrmannH #induction #on the #proving- On Extending Bounded Proofs to Inductive Proofs (OF, SH), pp. 278–290.
CAV-2009-Gulwani #analysis #complexity #named- SPEED: Symbolic Complexity Bound Analysis (SG), pp. 51–62.
CAV-2009-TorreMP #concurrent #reachability- Reducing Context-Bounded Concurrent Reachability to Sequential Reachability (SLT, PM, GP), pp. 477–492.
CSL-2009-GaboardiP #semantics #using- Upper Bounds on Stream I/O Using Semantic Interpretations (MG, RP), pp. 271–286.
CSL-2009-KuskeL #automation #revisited- Automatic Structures of Bounded Degree Revisited (DK, ML), pp. 364–378.
ICST-2009-PostS #equivalence #functional #implementation #model checking #proving #using- Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking (HP, CS), pp. 31–40.
LICS-2009-CaiZL #automaton- An Improved Lower Bound for the Complementation of Rabin Automata (YC, TZ, HL), pp. 167–176.
LICS-2009-Friedmann #algorithm #exponential #game studies- An Exponential Lower Bound for the Parity Game Strategy Improvement Algorithm as We Know it (OF), pp. 145–156.
LICS-2009-Kahlon #communication #decidability #thread- Boundedness vs. Unboundedness of Lock Chains: Characterizing Decidability of Pairwise CFL-Reachability for Threads Communicating via Locks (VK), pp. 27–36.
SAT-2009-AtseriasFT #algorithm- Clause-Learning Algorithms with Many Restarts and Bounded-Width Resolution (AA, JKF, MT), pp. 114–127.
SAT-2009-Goldberg - Boundary Points and Resolution (EG), pp. 147–160.
SAT-2009-Johannsen #exponential #learning #strict- An Exponential Lower Bound for Width-Restricted Clause Learning (JJ), pp. 128–140.
SAT-2009-LarrosaNOR #branch #generative #optimisation- Branch and Bound for Boolean Optimization and the Generation of Optimality Certificates (JL, RN, AO, ERC), pp. 453–466.
TAP-2009-Rapin #execution #model checking #symbolic computation- Symbolic Execution Based Model Checking of Open Systems with Unbounded Variables (NR), pp. 137–152.
VMCAI-2009-Oshman #model checking- An Automata-Theoretic Dynamic Completeness Criterion for Bounded Model-Checking (RO), pp. 275–289.
VMCAI-2009-WimmerBB #generative #markov #model checking #using- Counterexample Generation for Discrete-Time Markov Chains Using Bounded Model Checking (RW, BB, BB), pp. 366–380.
WICSA-2008-LagoACK #architecture #community- Wishes and Boundaries for a Software Architecture Knowledge Community (PL, PA, RC, PK), pp. 271–274.
SIGMOD-2008-GemullaL - Sampling time-based sliding windows in bounded space (RG, WL), pp. 379–392.
SIGMOD-2008-NavlakhaRS #fault #graph #summary- Graph summarization with bounded error (SN, RR, NS), pp. 419–432.
AFL-2008-MalcherMP #array- Sublinearly Space Bounded Iterative Arrays (AM, CM, BP), pp. 292–301.
DLT-2008-CrochemoreFIJ #string- Bounds on Powers in Strings (MC, SZF, CSI, IJ), pp. 206–215.
DLT-2008-HromkovicS #automaton #nondeterminism #on the #proving- On the Hardness of Determining Small NFA’s and of Proving Lower Bounds on Their Sizes (JH, GS), pp. 34–55.
ICALP-A-2008-BansalCLL #scheduling- Scheduling for Speed Bounded Processors (NB, HLC, TWL, LKL), pp. 409–420.
ICALP-A-2008-BjorklundHKK #graph #problem- The Travelling Salesman Problem in Bounded Degree Graphs (AB, TH, PK, MK), pp. 198–209.
ICALP-A-2008-ChildsL #order #quantum- Optimal Quantum Adversary Lower Bounds for Ordered Search (AMC, TL), pp. 869–880.
ICALP-A-2008-GuhaM #multi- Tight Lower Bounds for Multi-pass Stream Computation Via Pass Elimination (SG, AM), pp. 760–772.
ICALP-A-2008-KaleS #graph- An Expansion Tester for Bounded Degree Graphs (SK, CS), pp. 527–538.
ICALP-A-2008-KempeRUW #fault tolerance #quantum- Upper Bounds on the Noise Threshold for Fault-Tolerant Quantum Computing (JK, OR, FU, RdW), pp. 845–856.
ICALP-A-2008-Saxena #testing- Diagonal Circuit Identity Testing and Lower Bounds (NS), pp. 60–71.
ICALP-C-2008-GoyalJPS #encryption #policy- Bounded Ciphertext Policy Attribute Based Encryption (VG, AJ, OP, AS), pp. 579–591.
ICALP-C-2008-WehnerW #composition #security- Composable Security in the Bounded-Quantum-Storage Model (SW, JW), pp. 604–615.
LATA-2008-ArrighiNW #automaton #finite #quantum- One-Dimensional Quantum Cellular Automata over Finite, Unbounded Configurations (PA, VN, RFW), pp. 64–75.
LATA-2008-KorpM #dependence #proving #term rewriting #termination- Match-Bounds with Dependency Pairs for Proving Termination of Rewrite Systems (MK, AM), pp. 321–332.
LATA-2008-Mercer #automaton #finite #quantum- Lower Bounds for Generalized Quantum Finite Automata (MM), pp. 373–384.
LATA-2008-Perekrestenko #np-hard- Minimalist Grammars with Unbounded Scrambling and Nondiscriminating Barriers Are NP-Hard (AP), pp. 421–432.
FM-2008-BonakdarpourK #fault- Masking Faults While Providing Bounded-Time Phased Recovery (BB, SSK), pp. 374–389.
SEFM-2008-PhamTTC #algorithm #java #memory management #performance- A Fast Algorithm to Compute Heap Memory Bounds of Java Card Applets (THP, AHT, NTT, WNC), pp. 259–267.
ICEIS-ISAS2-2008-AlencarSAFF #approach #branch- Maximizing the Business Value of Software Projects — A Branch & Bound Approach (AJA, EAS, EPdA, MCF, ALF), pp. 162–169.
CIKM-2008-LiuMG #detection #documentation #identification- Identifying table boundaries in digital documents via sparse line detection (YL, PM, CLG), pp. 1311–1320.
ICML-2008-GomesWP #memory management #modelling #topic- Memory bounded inference in topic models (RG, MW, PP), pp. 344–351.
ICML-2008-OrabonaKC #kernel- The projectron: a bounded kernel-based Perceptron (FO, JK, BC), pp. 720–727.
ICPR-2008-AlliliZ #approach #segmentation- An approach for dynamic combination of region and boundary information in segmentation (MSA, DZ), pp. 1–4.
ICPR-2008-KadarBS #detection #evolution #image #programming #search-based- Evolving boundary detectors for natural images via Genetic Programming (IK, OBS, MS), pp. 1–4.
ICPR-2008-MuraiF #detection #using #video- Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
ICPR-2008-PohK #authentication #fault #multimodal #on the #using- On using error bounds to optimize cost-sensitive multimodal biometric authentication (NP, JK), pp. 1–4.
ICPR-2008-WangTHW #using- Object boundary extraction using Active B-Snake Model (YW, EKT, ZH, JGW), pp. 1–4.
ICPR-2008-WimmerHS #classification- Implicit active shape model employing boundary classifier (AW, JH, GS), pp. 1–4.
SEKE-2008-ParkK #automaton #constraints #lts #model checking #using- Using Boolean Cardinality Constraint for LTS Bounded Model Checking (SP, GK), pp. 537–542.
SEKE-2008-PatroneR #logic #programming language- Sharing Application Logic Across Programming Language Boundaries (DSP, BR), pp. 227–231.
SIGIR-2008-Diaz08b #empirical #metric #robust #similarity- Theoretical bounds on and empirical robustness of score regularization to different similarity measures (FDD), pp. 809–810.
ECOOP-2008-HuangHBR #hardware #object-oriented #programming- Liquid Metal: Object-Oriented Programming Across the Hardware/Software Boundary (SSH, AH, DFB, RMR), pp. 76–103.
PEPM-2008-Mu #algorithm #problem- Maximum segment sum is back: deriving algorithms for two segment problems with bounded lengths (SCM), pp. 31–39.
PEPM-2008-PopeeaXC #array #precise- A practical and precise inference and specializer for array bound checks elimination (CP, DNX, WNC), pp. 177–187.
PEPM-2008-PuchingerS #automation #source code- Automating branch-and-bound for dynamic programs (JP, PJS), pp. 81–89.
SAS-2008-AlbertAGP #automation #cost analysis- Automatic Inference of Upper Bounds for Recurrence Relations in Cost Analysis (EA, PA, SG, GP), pp. 221–237.
ASE-2008-PostSKG #abstract interpretation #model checking- Reducing False Positives by Combining Abstract Interpretation and Bounded Model Checking (HP, CS, AK, TG), pp. 188–197.
ASE-2008-PradellaMP #realtime #satisfiability #specification- Refining Real-Time System Specifications through Bounded Model- and Satisfiability-Checking (MP, AM, PSP), pp. 119–127.
FSE-2008-LivshitsK #named #web- Doloto: code splitting for network-bound web 2.0 applications (VBL, EK), pp. 350–360.
ICSE-2008-FritschSSC #adaptation- Time-bounded adaptation for automotive system software (SF, AS, DCS, SC), pp. 571–580.
SAC-2008-Andersson #scheduling- The utilization bound of uniprocessor preemptive slack-monotonic scheduling is 50% (BA), pp. 281–283.
ASPLOS-2008-DeviettiBMZ #architecture #c #named #programming language #safety- Hardbound: architectural support for spatial safety of the C programming language (JD, CB, MMKM, SZ), pp. 103–114.
DAC-2008-GuptaK - Bounded-lifetime integrated circuits (PG, ABK), pp. 347–348.
ISMM-2008-ChinNPQ #low level #memory management #source code- Analysing memory resource bounds for low-level programs (WNC, HHN, CP, SQ), pp. 151–160.
ESOP-2008-TerauchiM #linear #programming- Inferring Channel Buffer Bounds Via Linear Programming (TT, AM), pp. 284–298.
FoSSaCS-2008-GruberJ #communication #complexity #regular expression #using- Optimal Lower Bounds on Regular Expression Size Using Communication Complexity (HG, JJ), pp. 273–286.
STOC-2008-AttiyaHW #problem- Tight rmr lower bounds for mutual exclusion and other problems (HA, DH, PW), pp. 217–226.
STOC-2008-BansalKN #design #network- Additive guarantees for degree bounded directed network design (NB, RK, VN), pp. 769–778.
STOC-2008-CaiCL #exclamation #polynomial #problem- A quadratic lower bound for the permanent and determinant problem over any characteristic != 2 (JyC, XC, DL), pp. 491–498.
STOC-2008-ChakrabartiCM #communication #robust- Robust lower bounds for communication and stream computation (AC, GC, AM), pp. 641–650.
STOC-2008-ChoiK #complexity #graph #query- Optimal query complexity bounds for finding graphs (SSC, JHK), pp. 749–758.
STOC-2008-DinurGKS #morphism- Decodability of group homomorphisms beyond the johnson bound (ID, EG, SK, MS), pp. 275–284.
STOC-2008-DvirSY #trade-off- Hardness-randomness tradeoffs for bounded depth arithmetic circuits (ZD, AS, AY), pp. 741–748.
STOC-2008-JainKN #communication #complexity #theorem- Direct product theorems for classical communication complexity via subdistribution bounds: extended abstract (RJ, HK, AN), pp. 599–608.
STOC-2008-LauS #approximate #design #network- Additive approximation for bounded degree survivable network design (LCL, MS), pp. 759–768.
STOC-2008-Rao #game studies #parallel- Parallel repetition in projection games and a concentration bound (AR), pp. 1–10.
STOC-2008-Raz - Elusive functions and lower bounds for arithmetic circuits (RR), pp. 711–720.
STOC-2008-Sherstov #communication #matrix #quantum- The pattern matrix method for lower bounds on quantum communication (AAS), pp. 85–94.
TACAS-2008-LalTKR #analysis #concurrent #interprocedural #source code- Interprocedural Analysis of Concurrent Programs Under a Context Bound (AL, TT, NK, TWR), pp. 282–298.
TACAS-2008-TorreMP #analysis #concurrent #queue- Context-Bounded Analysis of Concurrent Queue Systems (SLT, PM, GP), pp. 299–314.
CAV-2008-LalR #analysis #concurrent- Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis (AL, TWR), pp. 37–51.
CSL-2008-BeyersdorffM - A Tight Karp-Lipton Collapse Result in Bounded Arithmetic (OB, SM), pp. 199–214.
CSL-2008-Eisinger #automaton #integer #linear- Upper Bounds on the Automata Size for Integer and Mixed Real and Integer Linear Arithmetic (JE), pp. 431–445.
CSL-2008-PiskacK #linear- Fractional Collections with Cardinality Bounds, and Mixed Linear Arithmetic with Stars (RP, VK), pp. 124–138.
ICLP-2008-SchulteS #dynamic analysis- Dynamic Analysis of Bounds Versus Domain Propagation (CS, PJS), pp. 332–346.
IJCAR-2008-Melquiond #proving- Proving Bounds on Real-Valued Functions with Computations (GM), pp. 2–17.
LICS-2008-Moschovakis #axiom- The Axiomatic Derivation of Absolute Lower Bounds (YNM), p. 405.
SAT-2008-KottlerKS08a #np-hard #satisfiability #subclass #using- A New Bound for an NP-Hard Subclass of 3-SAT Using Backdoors (SK, MK, CS), pp. 161–167.
TAP-2008-DunetsSR #analysis #data type #relational- Bounded Relational Analysis of Free Data Types (AD, GS, WR), pp. 99–115.
PODS-2007-GottlobPW #datalog #finite #monad- Monadic datalog over finite structures with bounded treewidth (GG, RP, FW), pp. 165–174.
PODS-2007-Schweikardt #modelling #query- Machine models and lower bounds for query processing (NS), pp. 41–52.
VLDB-2007-RastogiHS #privacy- The Boundary Between Privacy and Utility in Data Publishing (VR, SH, DS), pp. 531–542.
DLT-2007-MalcherP #complexity #context-free grammar- Descriptional Complexity of Bounded Context-Free Languages (AM, GP), pp. 312–323.
ICALP-2007-BjorklundB - Bounded Depth Data Trees (HB, MB), pp. 862–874.
ICALP-2007-BozzelliT #automaton #parametricity #problem- Decision Problems for Lower/Upper Bound Parametric Timed Automata (LB, SLT), pp. 925–936.
ICALP-2007-GuhaM #estimation #multi #streaming- Lower Bounds for Quantile Estimation in Random-Order and Multi-pass Streaming (SG, AM), pp. 704–715.
ICALP-2007-IwamaNRY #communication #complexity #quantum- Unbounded-Error One-Way Classical and Quantum Communication Complexity (KI, HN, RR, SY), pp. 110–121.
ICALP-2007-KreutzerOS #monad- Boundedness of Monadic FO over Acyclic Structures (SK, MO, NS), pp. 571–582.
ICALP-2007-MontanaroW #communication #complexity #quantum- A Lower Bound on Entanglement-Assisted Quantum Communication Complexity (AM, AJW), pp. 122–133.
LATA-2007-Thorne #finite- Categorial Module Grammars of Bounded Size have Finite Bounded Density (CT), pp. 577–588.
RTA-2007-KorpM #proving #term rewriting #termination #using- Proving Termination of Rewrite Systems Using Bounds (MK, AM), pp. 273–287.
CIG-2007-OommenGP #finite #game studies #probability #using- Using Stochastic AI Techniques to Achieve Unbounded Resolution in Finite Player Goore Games and its Applications (BJO, OCG, AP), pp. 161–167.
DiGRA-2007-StromE #case study #industrial #interactive #network- The unbound network of product and service interaction of the MMOG industry: with a case study of China (PS, ME).
HCI-MIE-2007-DerakhshiK #fuzzy #network #predict #sequence #using #word- Using Recurrent Fuzzy Neural Networks for Predicting Word Boundaries in a Phoneme Sequence in Persian Language (MRFD, MRK), pp. 50–59.
ICML-2007-Hanneke #complexity #learning- A bound on the label complexity of agnostic active learning (SH), pp. 353–360.
ICML-2007-Shah - Sample compression bounds for decision trees (MS), pp. 799–806.
MLDM-2007-SaittaRS #clustering- A Bounded Index for Cluster Validity (SS, BR, IFCS), pp. 174–187.
PLDI-2007-MusuvathiQ #parallel #source code #testing #thread- Iterative context bounding for systematic testing of multithreaded programs (MM, SQ), pp. 446–455.
SAC-2007-Armendariz-InigoJMDM #database #flexibility #protocol #replication- k-bound GSI: a flexible database replication protocol (JEAI, JRJR, JRGdM, HD, FDME), pp. 556–560.
SAC-2007-SausenSLP #multi #network- Bounded-distance multi-coverage backbones in wireless sensor networks (PSS, MAS, AMNdL, AP), pp. 203–208.
DAC-2007-ZhouLS #embedded #hybrid #multi #performance #using- Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
DATE-2007-GrosseKD #functional #model checking- Estimating functional coverage in bounded model checking (DG, UK, RD), pp. 1176–1181.
DATE-2007-SathanurCBMMP #clustering #interactive #performance- Interactive presentation: Efficient computation of discharge current upper bounds for clustered sleep transistor sizing (AVS, AC, LB, AM, EM, MP), pp. 1544–1549.
PDP-2007-MezmazMT #approach #branch #parallel- A Grid-based Parallel Approach of the Multi-Objective Branch and Bound (MSM, NM, EGT), pp. 23–30.
FoSSaCS-2007-MarnetteKR #constraints #polynomial #set- Polynomial Constraints for Sets with Cardinality Bounds (BM, VK, MCR), pp. 258–273.
FoSSaCS-2007-MuschollW #composition #web #web service- A Lower Bound on Web Services Composition (AM, IW), pp. 274–286.
STOC-2007-AttiyaC #random- Tight bounds for asynchronous randomized consensus (HA, KC), pp. 155–164.
STOC-2007-BeameJR #algorithm #random- Lower bounds for randomized read/write stream algorithms (PB, TSJ, AR), pp. 689–698.
STOC-2007-LinialS #communication #complexity- Lower bounds in communication complexity based on factorization norms (NL, AS), pp. 699–708.
STOC-2007-Patrascu #2d- Lower bounds for 2-dimensional range counting (MP), pp. 40–46.
STOC-2007-Santhanam - Circuit lower bounds for Merlin-Arthur classes (RS), pp. 275–283.
STOC-2007-SinghL #approximate- Approximating minimum bounded degree spanning trees to within one of optimal (MS, LCL), pp. 661–670.
TACAS-2007-YuCL #diagrams #reachability #using- Bounded Reachability Checking of Asynchronous Systems Using Decision Diagrams (AJY, GC, GL), pp. 648–663.
CADE-2007-GieslTSS #proving #termination- Proving Termination by Bounded Increase (JG, RT, SS, PSK), pp. 443–459.
CADE-2007-PerezV #effectiveness #encoding #logic #ltl #model checking- Encodings of Bounded LTL Model Checking in Effectively Propositional Logic (JANP, AV), pp. 346–361.
CAV-2007-BouajjaniFQ #analysis #parallel #source code #thread- Context-Bounded Analysis of Multithreaded Programs with Dynamic Linked Structures (AB, SF, SQ), pp. 207–220.
CAV-2007-ChakiSV #verification- Verification Across Intellectual Property Boundaries (SC, CS, HV), pp. 82–94.
CAV-2007-MalerNP #on the- On Synthesizing Controllers from Bounded-Response Properties (OM, DN, AP), pp. 95–107.
CSL-2007-Burel #deduction- Unbounded Proof-Length Speed-Up in Deduction Modulo (GB), pp. 496–511.
ICLP-2007-NavasMLH #analysis #logic programming #source code- User-Definable Resource Bounds Analysis for Logic Programs (JAN, EM, PLG, MVH), pp. 348–363.
LICS-2007-Schopp #logic- Stratified Bounded Affine Logic for Logarithmic Space (US), pp. 411–420.
SAT-2007-BubeckB #preprocessor- Bounded Universal Expansion for Preprocessing QBF (UB, HKB), pp. 244–257.
SAT-2007-Kojevnikov #linear- Improved Lower Bounds for Tree-Like Resolution over Linear Inequalities (AK), pp. 70–79.
SAT-2007-LangloisST - Horn Upper Bounds and Renaming (ML, RHS, GT), pp. 80–93.
TestCom-FATES-2007-PapSKN #algorithm #finite #generative #incremental #state machine #testing- A Bounded Incremental Test Generation Algorithm for Finite State Machines (ZP, MS, GK, GÁN), pp. 244–259.
VMCAI-2007-PeronH #abstract domain #constraints #matrix- An Abstract Domain Extending Difference-Bound Matrices with Disequality Constraints (MP, NH), pp. 268–282.
ECDL-2006-Butterworth #design #library #network #social- Designing Digital Library Resources for Users in Sparse, Unbounded Social Networks (RB), pp. 184–195.
PODS-2006-GottlobPW #database #design- Tractable database design through bounded treewidth (GG, RP, FW), pp. 124–133.
PODS-2006-GroheHS #random #scalability #set- Randomized computations on large data sets: tight lower bounds (MG, AH, NS), pp. 243–252.
ICSM-2006-GoldHLM #approach #concept #source code #using- Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
CIAA-2006-GalvezSF #linear #lookahead #parsing- Shift-Resolve Parsing: Simple, Unbounded Lookahead, Linear Time (JFG, SS, JF), pp. 253–264.
DLT-2006-BellP #matrix- Lowering Undecidability Bounds for Decision Questions in Matrices (PB, IP), pp. 375–385.
DLT-2006-GruberH #complexity #nondeterminism- Finding Lower Bounds for Nondeterministic State Complexity Is Hard (HG, MH), pp. 363–374.
DLT-2006-ItoLS - Closure of Language Classes Under Bounded Duplication (MI, PL, KST), pp. 238–247.
ICALP-v1-2006-BaierEHKSS - Length-Bounded Cuts and Flows (GB, TE, AH, EK, HS, MS), pp. 679–690.
ICALP-v1-2006-CaragiannisFKKM - Tight Bounds for Selfish and Greedy Load Balancing (IC, MF, CK, PK, LM), pp. 311–322.
ICALP-v1-2006-CarrollGM #graph- Embedding Bounded Bandwidth Graphs into l1 (DEC, AG, AM), pp. 27–37.
ICALP-v1-2006-ChaudhuriRRT #algorithm #approximate- A Push-Relabel Algorithm for Approximating Degree Bounded MSTs (KC, SR, SR, KT), pp. 191–201.
ICALP-v1-2006-Golynski #rank- Optimal Lower Bounds for Rank and Select Indexes (AG), pp. 370–381.
ICALP-v1-2006-KojevnikovI #calculus #proving- Lower Bounds of Static Lovász-Schrijver Calculus Proofs for Tseitin Tautologies (AK, DI), pp. 323–334.
ICALP-v1-2006-Wolf #matrix #quantum- Lower Bounds on Matrix Rigidity Via a Quantum Argument (RdW), pp. 62–71.
ICALP-v2-2006-HarnikN #hybrid #on the #security- On Everlasting Security in the Hybrid Bounded Storage Model (DH, MN), pp. 192–203.
ICALP-v2-2006-Pietrzak - A Tight Bound for EMAC (KP), pp. 168–179.
ICALP-v2-2006-Yan #automaton- Lower Bounds for Complementation of ω-Automata Via the Full Automata Technique (QY), pp. 589–600.
FM-2006-BouquetDL #automation #generative #ml #specification #testing- Automated Boundary Test Generation from JML Specifications (FB, FD, BL), pp. 428–443.
RTA-2006-LevySV #higher-order #unification- Bounded Second-Order Unification Is NP-Complete (JL, MSS, MV), pp. 400–414.
FLOPS-2006-Avery #analysis #termination- Size-Change Termination and Bound Analysis (JA), pp. 192–207.
ICML-2006-Banerjee #on the- On Bayesian bounds (AB), pp. 81–88.
ICML-2006-MoghaddamWA - Generalized spectral bounds for sparse LDA (BM, YW, SA), pp. 641–648.
ICML-2006-PandaCW #concept #detection- Concept boundary detection for speeding up SVMs (NP, EYC, GW), pp. 681–688.
ICPR-v1-2006-KatsoulasK #image- Box-like Superquadric Recovery in Range Images by Fusing Region and Boundary Information (DK, DIK), pp. 719–722.
ICPR-v1-2006-LiHS #approach #image #machine learning- A Machine Learning Approach for Locating Boundaries of Liver Tumors in CT Images (YL, SH, KS), pp. 400–403.
ICPR-v2-2006-ChenH #composition #image #segmentation- Boundary correction for total variation regularized L^1 function with applications to image decomposition and segmentation (TC, TSH), pp. 316–319.
ICPR-v2-2006-SaragihG #fault- Iterative Error Bound Minimisation for AAM Alignment (JS, RG), pp. 1192–1195.
SEKE-2006-OgataKF - Falsification of OTSs by Searches of Bounded Reachable State Spaces (KO, WK, KF), pp. 440–445.
ASE-2006-DengLR #execution #named #symbolic computation- Bogor/Kiasan: A k-bounded Symbolic Execution for Checking Strong Heap Properties of Open Systems (XD, JL, R), pp. 157–166.
ICSE-2006-DhurjatiA #array #c- Backwards-compatible array bounds checking for C with very low overhead (DD, VSA), pp. 162–171.
SAC-2006-Capron #static analysis- Static analysis of time bounded reactive properties of Boolean symbols (GC), pp. 1827–1834.
SAC-2006-FangG #dataset- Boundary surface extraction and rendering for volume datasets (SF, PG), pp. 1356–1360.
SAC-2006-MeerWA #composition #interactive #performance- Efficient interactive configuration of unbounded modular systems (ERvdM, AW, HRA), pp. 409–414.
SAC-2006-WuRJ #embedded #energy #on the #realtime- On bounding energy consumption in dynamic, embedded real-time systems (HW, BR, EDJ), pp. 933–934.
ASPLOS-2006-ChuangNVSBPCC #memory management #transaction- Unbounded page-based transactional memory (WC, SN, GV, JS, MVB, GP, BC, OC), pp. 347–358.
DAC-2006-AwedhS #automation #invariant #model checking- Automatic invariant strengthening to prove properties in bounded model checking (MA, FS), pp. 1073–1076.
DAC-2006-PeranandamNRWKR #performance- Fast falsification based on symbolic bounded property checking (PMP, PKN, JR, RJW, TK, WR), pp. 1077–1082.
DAC-2006-WangZ - Optimal jumper insertion for antenna avoidance under ratio upper-bound (JW, HZ), pp. 761–766.
DAC-2006-WuH #constraints #equivalence #mining- Mining global constraints for improving bounded sequential equivalence checking (WW, MSH), pp. 743–748.
DATE-2006-ChakrabortySDMMP #optimisation- Thermal resilient bounded-skew clock tree optimization methodology (AC, PS, KD, AM, EM, MP), pp. 832–837.
HPDC-2006-DjerrahCCR #framework #optimisation #problem- Bob++: Framework for Solving Optimization Problems with Branch-and-Bound methods (AD, BLC, VDC, CR), pp. 369–370.
PDP-2006-DortaLR #analysis #performance- Performance Analysis of Branch-and-Bound Skeletons (ID, CL, CR), pp. 75–82.
PPoPP-2006-BrevikNW #parallel #predict- Predicting bounds on queuing delay for batch-scheduled parallel machines (JB, DN, RW), pp. 110–118.
STOC-2006-AmbainisSW #quantum #theorem #trade-off- A new quantum lower bound method, : with applications to direct product theorems and time-space tradeoffs (AA, RS, RdW), pp. 618–633.
STOC-2006-Antonakopoulos #performance #protocol- Fast leader-election protocols with bounded cheaters’ edge (SA), pp. 187–196.
STOC-2006-ColeG #set- Searching dynamic point sets in spaces with bounded doubling dimension (RC, LAG), pp. 574–583.
STOC-2006-DinurFKO #fourier #on the- On the fourier tails of bounded functions over the discrete cube (ID, EF, GK, RO), pp. 437–446.
STOC-2006-GavinskyKRW #communication #complexity #exponential #identification #quantum- Bounded-error quantum state identification and exponential separations in communication complexity (DG, JK, OR, RdW), pp. 594–603.
STOC-2006-Gurvits #algorithm #approach #proving- Hyperbolic polynomials approach to Van der Waerden/Schrijver-Valiant like conjectures: sharper bounds, simpler proofs and algorithmic applications (LG), pp. 417–426.
STOC-2006-Zhang #quantum #random- New upper and lower bounds for randomized and quantum local search (SZ), pp. 634–643.
TACAS-2006-LiS #abstraction #model checking #performance #refinement- Efficient Abstraction Refinement in Interpolation-Based Unbounded Model Checking (BL, FS), pp. 227–241.
CAV-2006-BurckhardtAM #case study #concurrent #data type #memory management #model checking #modelling- Bounded Model Checking of Concurrent Data Types on Relaxed Memory Models: A Case Study (SB, RA, MMKM), pp. 489–502.
CAV-2006-HeljankoJKLL #automaton #model checking- Bounded Model Checking for Weak Alternating Büchi Automata (KH, TAJ, MK, ML, TL), pp. 95–108.
IJCAR-2006-DyckhoffKL #calculus #logic- Strong Cut-Elimination Systems for Hudelmaier’s Depth-Bounded Sequent Calculus for Implicational Logic (RD, DK, SL), pp. 347–361.
LICS-2006-BojanczykC - Bounds in w-Regularity (MB, TC), pp. 285–296.
LICS-2006-LaurentF #clique #complexity #semantics- Obsessional Cliques: A Semantic Characterization of Bounded Time Complexity (OL, LTdF), pp. 179–188.
LICS-2006-MacielP #composition #proving- Conditional Lower Bound for a System of Constant-Depth Proofs with Modular Connectives (AM, TP), pp. 189–200.
LICS-2006-Otto #first-order #logic #monad #problem- The Boundedness Problem for Monadic Universal First-Order Logic (MO), pp. 37–48.
LICS-2006-SchroderP #logic- PSPACE Bounds for Rank-1 Modal Logics (LS, DP), pp. 231–242.
SAT-2006-ZabiyakaD #complexity #dependence #functional- Functional Treewidth: Bounding Complexity in the Presence of Functional Dependencies (YZ, AD), pp. 116–129.
TestCom-2006-BerradaCFS #realtime #testing #using- Test Case Minimization for Real-Time Systems Using Timed Bound Traces (IB, RC, PF, AS), pp. 289–305.
TestCom-2006-Ipate #finite #nondeterminism #sequence #state machine #testing- Bounded Sequence Testing from Non-deterministic Finite State Machines (FI), pp. 55–70.
PODS-2005-GroheS #memory management #random #sorting- Lower bounds for sorting with few random accesses to external memory (MG, NS), pp. 238–249.
SIGMOD-2005-PolJ #relational- Relational Confidence Bounds Are Easy With The Bootstrap (AP, CJ), pp. 587–598.
CIAA-2005-CanoG #automaton #constant #finite- Finite Automata and Unions of Regular Patterns with Bounded Constant Segments (AC, PG), pp. 104–115.
ICALP-2005-Ambuhl #algorithm #energy #network #performance- An Optimal Bound for the MST Algorithm to Compute Energy Efficient Broadcast Trees in Wireless Networks (CA), pp. 1139–1150.
ICALP-2005-BeamePS #communication #complexity #multi- Lower Bounds for Lovász-Schrijver Systems and Beyond Follow from Multiparty Communication Complexity (PB, TP, NS), pp. 1176–1188.
ICALP-2005-ChattopadhyayH #composition #symmetry- Lower Bounds for Circuits with Few Modular and Symmetric Gates (AC, KAH), pp. 994–1005.
ICALP-2005-CzeizlerK #automaton #linear- A Tight Linear Bound on the Neighborhood of Inverse Cellular Automata (EC, JK), pp. 410–420.
ICALP-2005-DiehlM #polynomial #random- Time-Space Lower Bounds for the Polynomial-Time Hierarchy on Randomized Machines (SD, DvM), pp. 982–993.
ICALP-2005-FialaGK #distance #graph- Distance Constrained Labelings of Graphs of Bounded Treewidth (JF, PAG, JK), pp. 360–372.
ICALP-2005-FordG #communication #complexity #multi- Hadamard Tensors and Lower Bounds on Multiparty Communication Complexity (JF, AG), pp. 1163–1175.
ICALP-2005-GroheKS #memory management #query #streaming- Tight Lower Bounds for Query Processing on Streaming and External Memory Data (MG, CK, NS), pp. 1076–1088.
ICALP-2005-HorvitzK #black box #performance- Bounds on the Efficiency of “Black-Box” Commitment Schemes (OH, JK), pp. 128–139.
ICALP-2005-KoiranNP #complexity #problem #quantum #query- A Quantum Lower Bound for the Query Complexity of Simon’s Problem (PK, VN, NP), pp. 1287–1298.
ICALP-2005-TamassiaT #security- Computational Bounds on Hierarchical Data Processing with Applications to Information Security (RT, NT), pp. 153–165.
ICALP-2005-WehnerW #information retrieval- Improved Lower Bounds for Locally Decodable Codes and Private Information Retrieval (SW, RdW), pp. 1424–1436.
RTA-2005-BonfanteMM - Quasi-interpretations and Small Space Bounds (GB, JYM, JYM), pp. 150–164.
CEFP-2005-Hammond #approach #behaviour #functional #programming- Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach (KH), pp. 100–134.
DiGRA-2005-LeeL #transaction- An Irrational Black Market? Boundary work perspective on the stigma of in-game asset transaction (YHL, HL).
CIKM-2005-Yeh - An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription (JhY), pp. 285–286.
ICML-2005-JoachimsH #clustering #correlation #fault- Error bounds for correlation clustering (TJ, JEH), pp. 385–392.
ICML-2005-KaariainenL #comparison #fault- A comparison of tight generalization error bounds (MK, JL), pp. 409–416.
ICML-2005-LavioletteM #classification- PAC-Bayes risk bounds for sample-compressed Gibbs classifiers (FL, MM), pp. 481–488.
ICML-2005-McMahanLG #performance #programming #realtime- Bounded real-time dynamic programming: RTDP with monotone upper bounds and performance guarantees (HBM, ML, GJG), pp. 569–576.
ICML-2005-SzepesvariM #finite- Finite time bounds for sampling based fitted value iteration (CS, RM), pp. 880–887.
SAC-2005-ReddyC #using- Finding saddle points using stability boundaries (CKR, HDC), pp. 212–213.
CASE-2005-ChengY #using- Virtual object deformations using attributed boundary model (TMC, CCY), pp. 295–300.
CGO-2005-BrueningA #capacity #consistency #maintenance- Maintaining Consistency and Bounding Capacity of Software Code Caches (DB, SPA), pp. 74–85.
DAC-2005-LiSB #effectiveness #problem- Effective bounding techniques for solving unate and binate covering problems (XYL, MFMS, FB), pp. 385–390.
DATE-2005-CabodiCNQ #model checking #quantifier #set- Circuit Based Quantification: Back to State Set Manipulation within Unbounded Model Checking (GC, MC, SN, SQ), pp. 688–689.
DATE-2005-KatzHD #model checking- Space-Efficient Bounded Model Checking (JK, ZH, ND), pp. 686–687.
DATE-2005-ManquinhoM #effectiveness #optimisation #pseudo- Effective Lower Bounding Techniques for Pseudo-Boolean Optimization (VMM, JPMS), pp. 660–665.
DATE-2005-Marculescu #design #energy #fault tolerance- Energy Bounds for Fault-Tolerant Nanoscale Designs (DM), pp. 74–79.
DATE-2005-MartinelliD #composition #set- Bound Set Selection and Circuit Re-Synthesis for Area/Delay Driven Decomposition (AM, ED), pp. 430–431.
HPCA-2005-AnanianAKLL #memory management #transaction- Unbounded Transactional Memory (CSA, KA, BCK, CEL, SL), pp. 316–327.
LCTES-2005-DefoeCC - Upper bound for defragmenting buddy heaps (DCD, SRC, RC), pp. 222–229.
ESOP-2005-ChanderEILN #dynamic analysis #verification- Enforcing Resource Bounds via Static Verification of Dynamic Checks (AC, DE, NI, PL, GCN), pp. 311–325.
STOC-2005-Alekhnovich #random- Lower bounds for k-DNF resolution on random 3-CNFs (MA), pp. 251–256.
STOC-2005-CryanDR #approximate- Approximately counting integral flows and cell-bounded contingency tables (MC, MED, DR), pp. 413–422.
STOC-2005-GafniGP #adaptation #complexity #set- From a static impossibility to an adaptive lower bound: the complexity of early deciding set agreement (EG, RG, BP), pp. 714–722.
STOC-2005-KouckyPT - Bounded-depth circuits: separating wires from gates (MK, PP, DT), pp. 257–265.
TACAS-2005-QadeerR #concurrent #model checking- Context-Bounded Model Checking of Concurrent Software (SQ, JR), pp. 93–107.
TACAS-2005-SharmaPC #logic- Bounded Validity Checking of Interval Duration Logic (BS, PKP, SC), pp. 301–316.
SAT-J-2004-PorschenS05 #problem- Worst Case Bounds for Some NP-Complete Modified Horn-SAT Problems (SP, ES), pp. 251–262.
CAV-2005-GuptaS #abstraction #model checking #refinement- Abstraction Refinement for Bounded Model Checking (AG, OS), pp. 112–124.
CAV-2005-HeljankoJL #incremental #model checking- Incremental and Complete Bounded Model Checking for Full PLTL (KH, TAJ, TL), pp. 98–111.
CAV-2005-RabinovitzG #concurrent #model checking #source code- Bounded Model Checking of Concurrent Programs (IR, OG), pp. 82–97.
CSL-2005-CharatonikGM #model checking #pointer #source code- Bounded Model Checking of Pointer Programs (WC, LG, PM), pp. 397–412.
CSL-2005-Kolokolova - Closure Properties of Weak Systems of Bounded Arithmetic (AK), pp. 369–383.
ICLP-2005-Saidi #mining #process #using- Using CLP to Characterise Linguistic Lattice Boundaries in a Text Mining Process (ASS), pp. 418–420.
SAT-2005-DantsinW #satisfiability- An Improved Upper Bound for SAT (ED, AW), pp. 400–407.
SAT-2005-DershowitzHK #model checking- Bounded Model Checking with QBF (ND, ZH, JK), pp. 408–414.
SAT-2005-Gelder #distance #proving- Input Distance and Lower Bounds for Propositional Resolution Proof Length (AVG), pp. 282–293.
SAT-2005-HeuleM #linear #programming #random #satisfiability #using- Observed Lower Bounds for Random 3-SAT Phase Transition Density Using Linear Programming (MH, HvM), pp. 122–134.
SAT-2005-MneimnehLASS #algorithm #satisfiability- A Branch-and-Bound Algorithm for Extracting Smallest Minimal Unsatisfiable Formulas (MNM, IL, ZSA, JPMS, KAS), pp. 467–474.
SAT-2005-Zarpas #benchmark #metric #model checking #satisfiability- Benchmarking SAT Solvers for Bounded Model Checking (EZ), pp. 340–354.
VMCAI-2005-AbrahamBKS #hybrid #linear #model checking #optimisation- Optimizing Bounded Model Checking for Linear Hybrid Systems (EÁ, BB, FK, MS), pp. 396–412.
VMCAI-2005-LatvalaBHJ #ltl #model checking #performance- Simple Is Better: Efficient Bounded Model Checking for Past LTL (TL, AB, KH, TAJ), pp. 380–395.
VLDB-2004-KoudasOT0 #approximate #fault #performance #query- Approximate NN queries on Streams with Guaranteed Error/performance Bounds (NK, BCO, KLT, RZ), pp. 804–815.
VLDB-2004-RossS #database #multi #symmetry- Symmetric Relations and Cardinality-Bounded Multisets in Database Systems (KAR, JS), pp. 912–923.
ITiCSE-WGR-2004-RolfeP #backtracking #problem- An alternative problem for backtracking and bounding (TJR, PWP), pp. 83–84.
CIAA-2004-CampeanuP #automaton #nondeterminism- Tight Bounds for NFA to DFCA Transformations for Binary Alphabets (CC, AP), pp. 306–307.
ICALP-2004-AlekhnovichHI #algorithm #exponential #satisfiability- Exponential Lower Bounds for the Running Time of DPLL Algorithms on Satisfiable Formulas (MA, EAH, DI), pp. 84–96.
ICALP-2004-BlundoDS #self- Definitions and Bounds for Self-Healing Key Distribution Schemes (CB, PD, ADS), pp. 234–245.
ICALP-2004-Fleischer #algorithm #linear #network- Linear Tolls Suffice: New Bounds and Algorithms for Tolls in Single Source Networks (LF), pp. 544–554.
ICALP-2004-FlumGW #nondeterminism #parametricity- Bounded Fixed-Parameter Tractability and log2n Nondeterministic Bits (JF, MG, MW), pp. 555–567.
ICALP-2004-MelkebeekR #satisfiability- A Time Lower Bound for Satisfiability (DvM, RR), pp. 971–982.
ICALP-2004-Midrijanis #polynomial #problem #quantum #query #set #similarity- A Polynomial Quantum Query Lower Bound for the Set Equality Problem (GM), pp. 996–1005.
ICALP-2004-SandersSS #migration #online #scheduling- Online Scheduling with Bounded Migration (PS, NS, MS), pp. 1111–1122.
ICALP-2004-Zhang #on the #power of- On the Power of Ambainis’s Lower Bounds (SZ), pp. 1238–1250.
RTA-2004-Waldmann #named #string- Matchbox: A Tool for Match-Bounded String Rewriting (JW), pp. 85–94.
SEFM-2004-FlakeM #ocl- Past- and Future-Oriented Time-Bounded Temporal Properties with OCL (SF, WM), pp. 154–163.
ICML-2004-ConitzerS #communication #complexity #game studies #learning- Communication complexity as a lower bound for learning in games (VC, TS).
ICML-2004-RuckertK #learning #towards- Towards tight bounds for rule learning (UR, SK).
ICPR-v1-2004-GokcenJD #learning- Comparing Optimal Bounding Ellipsoid and Support Vector Machine Active Learning (IG, DJ, JRD), pp. 172–175.
ICPR-v1-2004-KangD #approximate #classification #fault- Product Approximation by Minimizing the Upper Bound of Bayes Error Rate for Bayesian Combination of Classifiers (HJK, DSD), pp. 252–255.
ICPR-v3-2004-DePiero #graph #memory management #polynomial #worst-case- Structural Graph Matching With Polynomial Bounds On Memory and on Worst-Case Effort (FWD), pp. 379–382.
ICPR-v3-2004-ZhuHT - Comparing Decision Boundary Curvature (HZ, JH, XT), pp. 450–453.
ICPR-v4-2004-FarenzenaBFB #re-engineering- Rigorous Accuracy Bounds for Calibrated Stereo Reconstruction (MF, AB, AF, AB), pp. 288–292.
ICPR-v4-2004-KimPL #using- Object Boundary Edge Selection Using Normal Direction Derivatives of a Contour in a Complex Scene (TYK, JP, SWL), pp. 755–758.
ICPR-v4-2004-ShihKG #analysis #fault #image- An Error Bound of Relative Image Blur Analysis (SWS, PSK, WSG), pp. 100–103.
ICPR-v4-2004-SungLPL #locality #recognition #using- Iris Recognition Using Collarette Boundary Localization (HS, JL, JhP, YL), pp. 857–860.
KDD-2004-XiongSTK #correlation #identification- Exploiting a support-based upper bound of Pearson’s correlation coefficient for efficiently identifying strongly correlated pairs (HX, SS, PNT, VK), pp. 334–343.
KR-2004-EiterFFPW #complexity #model checking #programming #set- Complexity of Model Checking and Bounded Predicate Arities for Non-ground Answer Set Programming (TE, WF, MF, GP, SW), pp. 377–387.
PLDI-2004-VenetB #array #c #embedded #performance #precise #scalability #source code- Precise and efficient static array bound checking for large embedded C programs (AV, GPB), pp. 231–242.
RE-2004-LinNIJ #problem #security #using- Using Abuse Frames to Bound the Scope of Security Problems (LL, BN, DCI, MJ), pp. 354–355.
SAC-2004-MichaelsonHS #automaton #named #programming #using- FSM-Hume: programming resource-limited systems using bounded automata (GM, KH, JS), pp. 1455–1461.
SAC-2004-ZhouLA #image- Boundary extraction in thermal images by edge map (QZ, ZL, JKA), pp. 254–258.
ASPLOS-2004-SmolensGKFHN #detection #latency #named- Fingerprinting: bounding soft-error detection latency and bandwidth (JCS, BTG, JK, BF, JCH, AN), pp. 224–234.
CGO-2004-TallamZG #profiling- Extending Path Profiling across Loop Backedges and Procedure Boundaries (ST, XZ, RG), pp. 251–264.
DAC-2004-WangJHS #model checking #satisfiability- Refining the SAT decision ordering for bounded model checking (CW, HJ, GDH, FS), pp. 535–538.
DATE-v1-2004-AlmukhaizimDM #concurrent #detection #fault #latency #on the- On Concurrent Error Detection with Bounded Latency in FSMs (SA, PD, YM), pp. 596–603.
DATE-v1-2004-BaumgartnerK - Enhanced Diameter Bounding via Structural (JB, AK), pp. 36–41.
FoSSaCS-2004-LuttgenV #bisimulation- Bisimulation on Speed: Lower Time Bounds (GL, WV), pp. 333–347.
STOC-2004-Aaronson04a #quantum- Lower bounds for local search by quantum arguments (SA), pp. 465–474.
STOC-2004-AilonC #linear #testing- Lower bounds for linear degeneracy testing (NA, BC), pp. 554–560.
STOC-2004-ChenHKX #linear #reduction- Linear FPT reductions and computational lower bounds (JC, XH, IAK, GX), pp. 212–221.
STOC-2004-ChenKLRSV #confluence #theorem- (Almost) tight bounds and existence theorems for confluent flows (JC, RDK, LL, RR, RS, AV), pp. 529–538.
STOC-2004-Elkin #approximate #distributed #problem #trade-off- Unconditional lower bounds on the time-approximation tradeoffs for the distributed minimum spanning tree problem (ME), pp. 331–340.
STOC-2004-Feige #graph #independence #on the #random- On sums of independent random variables with unbounded variance, and estimating the average degree in a graph (UF), pp. 594–603.
STOC-2004-Kelner #clustering #graph- Spectral partitioning, eigenvalue bounds, and circle packings for graphs of bounded genus (JAK), pp. 455–464.
STOC-2004-Pass #multi- Bounded-concurrent secure multi-party computation with a dishonest majority (RP), pp. 232–241.
STOC-2004-PatrascuD - Lower bounds for dynamic connectivity (MP, EDD), pp. 546–553.
TACAS-2004-BaierHHK #markov #performance #process #reachability- Efficient Computation of Time-Bounded Reachability Probabilities in Uniform Continuous-Time Markov Decision Processes (CB, BRH, HH, JPK), pp. 61–76.
TACAS-2004-BehrmannBLP #abstraction #automaton- Lower and Upper Bounds in Zone Based Abstractions of Timed Automata (GB, PB, KGL, RP), pp. 312–326.
TACAS-2004-LeueMW #modelling #scalability #uml- A Scalable Incomplete Test for the Boundedness of UML RT Models (SL, RM, WW), pp. 327–341.
TACAS-2004-RaviS #model checking- Minimal Assignments for Bounded Model Checking (KR, FS), pp. 31–45.
CAV-2004-AwedhS #model checking #proving- Proving More Properties with Bounded Model Checking (MA, FS), pp. 96–108.
CAV-2004-BinghamCHQZ #automation #consistency #verification- Automatic Verification of Sequential Consistency for Unbounded Addresses and Data Values (JDB, AC, AJH, SQ, ZZ), pp. 427–439.
CAV-2004-GanaiGA #embedded #model checking #modelling #performance- Efficient Modeling of Embedded Memories in Bounded Model Checking (MKG, AG, PA), pp. 440–452.
CAV-2004-JinAS #model checking #named #satisfiability #towards- CirCUs: A Satisfiability Solver Geared towards Bounded Model Checking (HJ, MA, FS), pp. 519–522.
CAV-2004-LahiriB #verification- Indexed Predicate Discovery for Unbounded System Verification (SKL, REB), pp. 135–147.
CSL-2004-AmadioCDJ #bytecode #functional #verification- A Functional Scenario for Bytecode Verification of Resource Bounds (RMA, SCG, SDZ, LJ), pp. 265–279.
CSL-2004-Bojanczyk #quantifier- A Bounding Quantifier (MB), pp. 41–55.
CSL-2004-ImmermanRRSY #decidability #logic #transitive- The Boundary Between Decidability and Undecidability for Transitive-Closure Logics (NI, AMR, TWR, SS, GY), pp. 160–174.
CSL-2004-Skelley #higher-order- A Third-Order Bounded Arithmetic Theory for PSPACE (AS), pp. 340–354.
LICS-2004-SeshiaB #quantifier #using- Deciding Quantifier-Free Presburger Formulas Using Parameterized Solution Bounds (SAS, REB), pp. 100–109.
SAT-2004-ManquinhoM #optimisation #pseudo #satisfiability #using- Using Lower-Bound Estimates in SAT-Based Pseudo-Boolean Optimization (VMM, JPMS), pp. 120–126.
VMCAI-2004-ClarkeKOS #complexity #model checking- Completeness and Complexity of Bounded Model Checking (EMC, DK, JO, OS), pp. 85–96.
DRR-2003-Fan #parametricity- Text extraction via an edge-bounded averaging and a parametric character model (JF), pp. 8–19.
ICDAR-2003-CaoDL #approach #documentation #image #modelling- Rectifying the Bound Document Image Captured by the Camera: A Model Based Approach (HC, XD, CL), pp. 71–75.
PODS-2003-Segoufin #complexity #documentation #query #type system #xml- Typing and querying XML documents: some complexity bounds (LS), pp. 167–178.
DLT-2003-Giammarresi #set- Computing Languages by (Bounded) Local Sets (DG), pp. 304–315.
ICALP-2003-AmirACLP #algorithm- Function Matching: Algorithms, Applications, and a Lower Bound (AA, YA, RC, ML, EP), pp. 929–942.
ICALP-2003-HoyerMW #quantum- Quantum Search on Bounded-Error Inputs (PH, MM, RdW), pp. 291–299.
ICALP-2003-RybinaV #formal method- Upper Bounds for a Theory of Queues (TR, AV), pp. 714–724.
ICFP-2003-Simonet #data type- An extension of HM(X) with bounded existential and universal data-types (VS), pp. 39–50.
DiGRA-2003-Copier #game studies #research- The other game researcher: participating in and watching the costruction of boundaries in game studies (MC).
ICEIS-v3-2003-GustasG #approach #enterprise #information management #modelling #towards- Towards the Enterprise Engineering Approach for Information System Modelling Across Organisational and Technical Boundaries (RG, PG), pp. 77–88.
ICML-2003-ConitzerS03a #framework #game studies #named- BL-WoLF: A Framework For Loss-Bounded Learnability In Zero-Sum Games (VC, TS), pp. 91–98.
ICML-2003-Munos #approximate #fault #policy- Error Bounds for Approximate Policy Iteration (RM), pp. 560–567.
ICML-2003-SalakhutdinovR #adaptation #optimisation- Adaptive Overrelaxed Bound Optimization Methods (RS, STR), pp. 664–671.
MLDM-2003-ImiyaTOH #detection #random #set- Detecting the Boundary Curve of Planar Random Point Set (AI, KT, HO, VH), pp. 413–424.
MLDM-2003-MiteranBB #approximate #classification #image #realtime #segmentation #using- Classification Boundary Approximation by Using Combination of Training Steps for Real-Time Image Segmentation (JM, SB, EBB), pp. 141–155.
PPDP-2003-GrecoZ #datalog #on the #performance #query- On the rewriting and efficient computation of bound disjunctive datalog queries (SG, EZ), pp. 136–147.
SAC-2003-RaidlJ #algorithm #heuristic #problem- Greedy Heuristics and an Evolutionary Algorithm for the Bounded-Diameter Minimum Spanning Tree Problem (GRR, BAJ), pp. 747–752.
DAC-2003-AgarwalBZV #refinement #statistics- Computation and Refinement of Statistical Bounds on Circuit Delay (AA, DB, VZ, SBKV), pp. 348–353.
DAC-2003-ClarkeKY #behaviour #c #consistency #model checking #source code #using- Behavioral consistency of C and verilog programs using bounded model checking (EMC, DK, KY), pp. 368–371.
DAC-2003-GuptaGWYA #learning #model checking #satisfiability- Learning from BDDs in SAT-based bounded model checking (AG, MKG, CW, ZY, PA), pp. 824–829.
DAC-2003-KangP #model checking #satisfiability- SAT-based unbounded symbolic model checking (HJK, ICP), pp. 840–843.
DAC-2003-StehrGA #analysis #performance #trade-off- Performance trade-off analysis of analog circuits by normal-boundary intersection (GS, HEG, KA), pp. 958–963.
DATE-2003-AgarwalBZV #analysis #statistics #using- Statistical Timing Analysis Using Bounds (AA, DB, VZ, SBKV), pp. 10062–10067.
DATE-2003-CabodiNQ #approximate #model checking #satisfiability #traversal- Improving SAT-Based Bounded Model Checking by Means of BDD-Based Approximate Traversals (GC, SN, SQ), pp. 10898–10905.
DATE-2003-EbendtGD - Combination of Lower Bounds in Exact BDD Minimization (RE, WG, RD), pp. 10758–10763.
DATE-2003-SmedtG #design #named- HOLMES: Capturing the Yield-Optimized Design Space Boundaries of Analog and RF Integrated Circuits (BDS, GGEG), pp. 10256–10263.
PDP-2003-DortaLRR #divide and conquer #parallel- Parallel Skeletons for Divide-and-Conquer and Branch-and-Bound techniques (ID, CL, CR, AR), pp. 292–298.
STOC-2003-Bar-Yossef - Sampling lower bounds via information theory (ZBY), pp. 335–344.
STOC-2003-FakcharoenpholRT #approximate #metric- A tight bound on approximating arbitrary metrics by tree metrics (JF, SR, KT), pp. 448–455.
STOC-2003-FatourouFR #implementation #multi- A tight time lower bound for space-optimal implementations of multi-writer snapshots (PF, FEF, ER), pp. 259–268.
STOC-2003-GalR - Lower bounds on the amount of randomness in private computation (AG, AR), pp. 659–666.
STOC-2003-GennaroGK #encryption #performance- Lower bounds on the efficiency of encryption and digital signature schemes (RG, YG, JK), pp. 417–425.
STOC-2003-JayramKKR #problem- Cell-probe lower bounds for the partial match problem (TSJ, SK, RK, YR), pp. 667–672.
STOC-2003-KabanetsI #polynomial #proving #testing- Derandomizing polynomial identity tests means proving circuit lower bounds (VK, RI), pp. 355–364.
STOC-2003-KerenidisW #exponential #quantum- Exponential lower bound for 2-query locally decodable codes via a quantum argument (IK, RdW), pp. 106–115.
STOC-2003-KonemannR #approximate- Primal-dual meets local search: approximating MST’s with nonuniform degree bounds (JK, RR), pp. 389–395.
STOC-2003-Lindell - Bounded-concurrent secure two-party computation without setup assumptions (YL), pp. 683–692.
STOC-2003-ODonnellS #polynomial- New degree bounds for polynomial threshold functions (RO, RAS), pp. 325–334.
STOC-2003-SauerhoffW #graph #integer #multi #trade-off- Time-space tradeoff lower bounds for integer multiplication and graphs of arithmetic functions (MS, PW), pp. 186–195.
TACAS-2003-AmlaKMM #analysis #model checking- Experimental Analysis of Different Techniques for Bounded Model Checking (NA, RPK, KLM, RM), pp. 34–48.
TACAS-2003-BartzisB #constraints #performance- Construction of Efficient BDDs for Bounded Arithmetic Constraints (CB, TB), pp. 394–408.
TACAS-2003-BenedettiC #ltl #model checking- Bounded Model Checking for Past LTL (MB, AC), pp. 18–33.
TACAS-2003-BraghinCFFLP #analysis #named- BANANA — A Tool for Boundary Ambients Nesting ANAlysis (CB, AC, SF, RF, FLL, CP), pp. 437–441.
TACAS-2003-CiardoMS - Saturation Unbound (GC, RMM, RS), pp. 379–393.
CADE-2003-Schmidt-Schauss #decidability #higher-order- Decidability of Arity-Bounded Higher-Order Matching (MSS), pp. 488–502.
CAV-2003-MouraRS #induction #model checking #verification- Bounded Model Checking and Induction: From Refutation to Verification (Extended Abstract, Category A) (LMdM, HR, MS), pp. 14–26.
CAV-2003-Obdrzalek #calculus #model checking #performance #μ-calculus- Fast μ-Calculus Model Checking when Tree-Width Is Bounded (JO), pp. 80–92.
CAV-2003-SeshiaB #automaton #model checking #using- Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods (SAS, REB), pp. 154–166.
CSL-2003-ChevalierKRTV - Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
VMCAI-2003-UnnikrishnanSL #analysis- Optimized Live Heap Bound Analysis (LU, SDS, YAL), pp. 70–85.
PODS-2002-Chirkova #problem #query- The View-Selection Problem Has an Exponential-Time Lower Bound for Conjunctive Queries and Views (RC), pp. 159–168.
DLT-2002-DoL #on the #product line- On a Family of Codes with Bounded Deciphering Delay (DLV, IL), pp. 369–380.
DLT-2002-Domaratzki #automaton #finite- Improved Bounds on the Number of Automata Accepting Finite Languages (MD), pp. 209–219.
DLT-2002-SasakiIIW #2d #probability #turing machine- A Space Lower Bound of Two-Dimensional Probabilistic Turing Machines (YS, KI, AI, YW), pp. 185–196.
ICALP-2002-AblayevMP #branch #probability #quantum #source code- Quantum and Stochastic Branching Programs of Bounded Width (FMA, CM, CP), pp. 343–354.
ICALP-2002-BermanK #approximate- Approximation Hardness of Bounded Degree MIN-CSP and MIN-BISECTION (PB, MK), pp. 623–632.
ICALP-2002-ChristerssonGL #ad hoc #network- Gossiping with Bounded Size Messages in ad hoc Radio Networks (MC, LG, AL), pp. 377–389.
ICALP-2002-DemetrescuI #trade-off- Improved Bounds and New Trade-Offs for Dynamic All Pairs Shortest Paths (CD, GFI), pp. 633–643.
ICALP-2002-EpsteinSS #online- New Bounds for Variable-Sized and Resource Augmented Online Bin Packing (LE, SSS, RvS), pp. 306–317.
ICALP-2002-EstebanGM #complexity #on the- On the Complexity of Resolution with Bounded Conjunctions (JLE, NG, JM), pp. 220–231.
ICALP-2002-GarganoHSV #branch- Spanning Trees with Bounded Number of Branch Vertices (LG, PH, LS, UV), pp. 355–365.
ICALP-2002-GrigorievHP #algebra #exponential #proving- Exponential Lower Bound for Static Semi-algebraic Proofs (DG, EAH, DVP), pp. 257–268.
ICALP-2002-ImpagliazzoS #axiom #simulation- Bounded-Depth Frege Systems with Counting Axioms Polynomially Simulate Nullstellensatz Refutations (RI, NS), pp. 208–219.
ICALP-2002-Radzik #network- Improving Time Bounds on Maximum Generalised Flow Computations by Contracting the Network (TR), pp. 611–622.
FME-2002-LegeardPU #automation #testing- Automated Boundary Testing from Z and B (BL, FP, MU), pp. 21–40.
RTA-2002-Tahhan-Bittar #confluence #recursion #term rewriting- Recursive Derivational Length Bounds for Confluent Term Rewrite Systems (ETB), pp. 281–295.
CSCW-2002-LuttersA #case study #safety- Achieving safety: a field study of boundary objects in aircraft technical support (WGL, MSA), pp. 266–275.
CSCW-2002-StevensW #data access #maintenance- A new dimension in access control: studying maintenance engineering across organizational boundaries (GS, VW), pp. 196–205.
ICML-2002-GargHR #on the- On generalization bounds, projection profile, and margin distribution (AG, SHP, DR), pp. 171–178.
ICML-2002-Langford #testing- Combining Trainig Set and Test Set Bounds (JL), pp. 331–338.
ICML-2002-ZhangL #network- Representational Upper Bounds of Bayesian Networks (HZ, CXL), pp. 674–681.
ICPR-v1-2002-WechslerDLC #predict #using- Motion Prediction Using VC-Generalization Bounds (HW, ZD, FL, VC), pp. 151–154.
ICPR-v2-2002-EcabertT #image #segmentation- Variational Image Segmentation by Unifying Region and Boundary Information (OE, JPT), pp. 885–888.
ICPR-v2-2002-FrantiVK #clustering- Branch-and-Bound Technique for Solving Optimal Clustering (PF, OV, TK), pp. 232–235.
ICPR-v3-2002-Ishii #design #people- Tangible Bits: Designing the Boundary between People, Bits, and Atoms (HI), p. 277.
ICPR-v3-2002-KimKKK #sequence- Usefulness of Boundary Sequences in Computing Shape Features for Arbitrary Shaped Regions (SK, SK, JK, MK), pp. 355–358.
ICPR-v3-2002-SilvestreL #classification #optimisation- Optimization of Neural Classifiers Based on Bayesian Decision Boundaries and Idle Neurons Pruning (MRS, LLL), pp. 387–390.
PEPM-2002-GomezL #analysis #automation #higher-order- Automatic time-bound analysis for a higher-order language (GG, YAL), pp. 75–86.
POPL-2002-Boehm #garbage collection- Bounding space usage of conservative garbage collectors (HJB), pp. 93–100.
CC-2002-QianHV #approach #array #java- A Comprehensive Approach to Array Bounds Check Elimination for Java (FQ, LJH, CV), pp. 325–342.
DAC-2002-CabodiCQ #model checking #question #satisfiability- Can BDDs compete with SAT solvers on bounded model checking? (GC, PC, SQ), pp. 117–122.
FoSSaCS-2002-JancarKMS #automaton #proving- Equivalence-Checking with One-Counter Automata: A Generic Method for Proving Lower Bounds (PJ, AK, FM, ZS), pp. 172–186.
FoSSaCS-2002-LohreyM #communication- Bounded MSC Communication (ML, AM), pp. 295–309.
STOC-2002-Aaronson #problem #quantum- Quantum lower bound for the collision problem (SA), pp. 635–642.
STOC-2002-Ben-Sasson02a - Hard examples for bounded depth frege (EBS), pp. 563–572.
STOC-2002-DziembowskiM #proving #security- Tight security proofs for the bounded-storage model (SD, UMM), pp. 341–350.
STOC-2002-Kontogiannis #algorithm #online #scheduling- Lower bounds & competitive algorithms for online scheduling of unit-size tasks to related machines (SCK), pp. 124–133.
STOC-2002-Raz02a #principle- Resolution lower bounds for the weak pigeonhole principle (RR), pp. 553–562.
STOC-2002-SaksS #approximate #data type #distance- Space lower bounds for distance approximation in the data stream model (MES, XS), pp. 360–369.
CADE-2002-MouraRS #infinity #lazy evaluation #model checking #proving #theorem proving- Lazy Theorem Proving for Bounded Model Checking over Infinite Domains (LMdM, HR, MS), pp. 438–455.
CAV-2002-BinghamH #model checking- Semi-formal Bounded Model Checking (JDB, AJH), pp. 280–294.
CAV-2002-ChevalierV #automation #protocol #security #verification- Automated Unbounded Verification of Security Protocols (YC, LV), pp. 324–337.
CAV-2002-McMillan #model checking #satisfiability- Applying SAT Methods in Unbounded Symbolic Model Checking (KLM), pp. 250–264.
CSL-2002-MarcinkowskiT #complexity #game studies #ltl- Optimal Complexity Bounds for Positive LTL Games (JM, TT), pp. 262–275.
CSL-2002-Nipkow #hoare #logic #nondeterminism #recursion- Hoare Logics for Recursive Procedures and Unbounded Nondeterminism (TN), pp. 103–119.
CSL-2002-Schmidt-SchaussS #decidability #higher-order #unification- Decidability of Bounded Higher-Order Unification (MSS, KUS), pp. 522–536.
ISSTA-2002-Bishop #reliability- Rescaling reliability bounds for a new operational profile (PGB), pp. 180–190.
SAT-2002-Schoening #satisfiability- New worst case bounds on k-SAT (US), p. 1.
WICSA-2001-Shaw #architecture #communication #research #ubiquitous- When System Boundaries Dissolve: Research Opportunities in Software Architectures for Ubiquitous Computing and Communication (MS), p. 99–?.
ICDAR-2001-ZhangT #documentation #image- Recovery of Distorted Document Images from Bound Volumes (ZZ, CLT), pp. 429–433.
CIAA-2001-FarreG #parsing- Bounded-Graph Construction for Noncanonical Discriminating-Reverse Parsers (JF, JFG), pp. 101–114.
ICALP-2001-AtseriasBE - Lower Bounds for the Weak Pigeonhole Principle Beyond Resolution (AA, MLB, JLE), pp. 1005–1016.
ICALP-2001-Blaser #algebra- Improvements of the Alder-Strassen Bound: Algebras with Nonzero Radical (MB), pp. 79–91.
ICALP-2001-BuhrmanTV #simulation- Time and Space Bounds for Reversible Simulation (HB, JT, PMBV), pp. 1017–1027.
ICALP-2001-ChakrabartiK #complexity #graph #random- Improved Lower Bounds on the Randomized Complexity of Graph Properties (AC, SK), pp. 285–296.
ICALP-2001-EngebretsenK #approximate #metric- Approximation Hardness of TSP with Bounded Metrics (LE, MK), pp. 201–212.
ICALP-2001-SenV #quantum- Lower Bounds in the Quantum Cell Probe Model (PS, SV), pp. 358–369.
TLCA-2001-Hofmann #behaviour #complexity #memory management #type system #using- From Bounded Arithmetic to Memory Management: Use of Type Theory to Capture Complexity Classes and Space Behaviour (MH0), pp. 2–3.
ICML-2001-Geibel #learning- Reinforcement Learning with Bounded Risk (PG), pp. 162–169.
ICML-2001-Hutter #predict #sequence- General Loss Bounds for Universal Sequence Prediction (MH), pp. 210–217.
ICML-2001-LangfordSM #classification #predict- An Improved Predictive Accuracy Bound for Averaging Classifiers (JL, MWS, NM), pp. 290–297.
ICML-2001-Zhang #approximate #problem- Some Sparse Approximation Bounds for Regression Problems (TZ0), pp. 624–631.
LOPSTR-2001-FerrariFO #logic #proving- Extracting Exact Time Bounds from Logical Proofs (MF, CF, MO), pp. 245–266.
PPDP-2001-SchulteS #question- When Do Bounds and Domain Propagation Lead to the Same Search Space? (CS, PJS), pp. 115–126.
CC-2001-FarreG #parsing- A Bounded Graph-Connect Construction for LR-regular Parsers (JF, JFG), pp. 244–258.
DAC-2001-YangPT - Improving Bus Test Via IDDT and Boundary Scan (SYY, CAP, MTA), pp. 307–312.
STOC-2001-Ambainis #protocol #quantum- A new protocol and lower bounds for quantum coin flipping (AA), pp. 134–142.
STOC-2001-Bar-YossefKS #algorithm- Sampling algorithms: lower bounds and applications (ZBY, RK, DS), pp. 266–275.
STOC-2001-BolligW #branch #integer #multi #using- A read-once branching program lower bound of Ω(2n/4) for integer multiplication using universal (BB, PW), pp. 419–424.
STOC-2001-ChazelleL - Lower bounds for intersection searching and fractional cascading in higher dimension (BC, DL), pp. 322–329.
STOC-2001-IckingM #3d #complexity #diagrams #distance- A tight bound for the complexity of voroni diagrams under polyhedral convex distance functions in 3D (CI, LM), pp. 316–321.
STOC-2001-LachishR - Explicit lower bound of 4.5n — o(n) for boolena circuits (OL, RR), pp. 399–408.
STOC-2001-PitassiR #principle- Regular resolution lower bounds for the weak pigeonhole principle (TP, RR), pp. 347–355.
STOC-2001-RazS #matrix- Lower bounds for matrix product, in bounded depth circuits with arbitrary gates (RR, AS), pp. 409–418.
STOC-2001-Trevisan #optimisation #problem- Non-approximability results for optimization problems on bounded degree instances (LT), pp. 453–461.
TACAS-2001-Carvajal-SchiaffinoDC #petri net #validation- Combining Structural and Enumerative Techniques for the Validation of Bounded Petri Nets (RCS, GD, GC), pp. 435–449.
CAV-2001-CoptyFFGKTV #industrial #model checking- Benefits of Bounded Model Checking at an Industrial Setting (FC, LF, RF, EG, GK, AT, MYV), pp. 436–453.
LICS-2001-AdlerI #exclamation- An n! Lower Bound on Formula Size (MA, NI), pp. 197–206.
LICS-2001-Stoller #protocol- A Bound on Attacks on Payment Protocols (SDS), pp. 61–70.
VLDB-2000-YuV #fault #network #performance- Efficient Numerical Error Bounding for Replicated Network Services (HY, AV), pp. 123–133.
ICALP-2000-AdlerFGP - Tight Size Bounds for Packet Headers in Narrow Meshes (MA, FEF, LAG, MP), pp. 756–767.
ICALP-2000-BolligW #problem- Asymptotically Optimal Bounds for OBDDs and the Solution of Some Basic OBDD Problems (BB, IW), pp. 187–198.
ICALP-2000-CsirikW #online- Resource Augmentation for Online Bounded Space Bin Packing (JC, GJW), pp. 296–304.
ICALP-2000-FournierK - Lower Bounds Are Not Easier over the Reals: Inside PH (HF, PK), pp. 832–843.
ICALP-2000-GoldbergJKP #capacity #protocol- A Bound on the Capacity of Backoff and Acknowledgement-Based Protocols (LAG, MJ, SK, MP), pp. 705–716.
ICALP-2000-Seiden #algorithm #online- An Optimal Online Algorithm for Bounded Space Variable-Sized Bin Packing (SSS), pp. 283–295.
IFL-2000-GustavssonS #analysis #morphism #polymorphism #type system- A Usage Analysis with Bounded Usage Polymorphism and Subtyping (JG, JS), pp. 140–157.
IFL-2000-Hammond #behaviour #concurrent- The Dynamic Properties of Hume: A Functionally-Based Concurrent Language with Bounded Time and Space Behaviour (KH), pp. 122–139.
ICML-2000-EvgeniouPPP #kernel #performance- Bounds on the Generalization Performance of Kernel Machine Ensembles (TE, LPB, MP, TP), pp. 271–278.
ICML-2000-ForsterW #learning- Relative Loss Bounds for Temporal-Difference Learning (JF, MKW), pp. 295–302.
ICML-2000-Reynolds #adaptation #clustering #learning- Adaptive Resolution Model-Free Reinforcement Learning: Decision Boundary Partitioning (SIR), pp. 783–790.
ICPR-v1-2000-HoogsM #approach- An Integrated Boundary and Region Approach to Perceptual Grouping (AH, JLM), pp. 1284–1290.
ICPR-v1-2000-SappaG #fault #image #modelling #optimisation- Modeling Range Images with Bounded Error Triangular Meshes without Optimization (ADS, MAG), pp. 1392–1395.
ICPR-v1-2000-TasdizenC #algebra #estimation #image #modelling- Boundary Estimation from Intensity/Color Images with Algebraic Curve Models (TT, DBC), pp. 1225–1228.
ICPR-v2-2000-LingC #feature model #performance- Fast and Efficient Feature Extraction Based on Bayesian Decision Boundaries (LLL, HMC), pp. 2390–2393.
ICPR-v3-2000-CamilleriP #refinement- Spectral Unmixing of Mixed Pixels for Texture Boundary Refinement (KPC, MP), pp. 7096–7099.
ICPR-v3-2000-KletteZ #fault #multi #order- Multigrid Error Bounds for Moments of Arbitrary Order (RK, JDZ), pp. 3790–3793.
ICPR-v3-2000-KwanCG #approach #automation #using- Automatic Extraction of Bone Boundaries from CT Scans Using an Intelligence-Based Approach (FYK, KCC, IG), pp. 3441–3444.
ICPR-v3-2000-RittscherS #detection- An Integral Criterion for Detecting Boundary Edges and Textured Regions (JR, JS), pp. 7076–7079.
ICPR-v4-2000-LeungCKC #detection #fuzzy- Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method (CCL, FHYC, PCKK, WFC), pp. 4360–4363.
PLDI-2000-BodikGS #array #named- ABCD: eliminating array bounds checks on demand (RB, RG, VS), pp. 321–333.
PLDI-2000-RuginaR #analysis #array #memory management #pointer- Symbolic bounds analysis of pointers, array indices, and accessed memory regions (RR, MCR), pp. 182–195.
POPL-2000-CraryW #certification- Resource Bound Certification (KC, SW), pp. 184–198.
DAC-2000-GaurdianiSMSC #component #constant #simulation #statistics- An asymptotically constant, linearly bounded methodology for the statistical simulation of analog circuits including component mismatch effects (CG, SS, PM, PS, DC), pp. 15–18.
DAC-2000-Hassoun #analysis #using- Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
DAC-2000-NarasimhanR #on the #problem #scheduling #synthesis- On lower bounds for scheduling problems in high-level synthesis (MN, JR), pp. 546–551.
DATE-2000-KruseSJSN #constraints #data flow #graph #power management- Lower Bounds on the Power Consumption in Scheduled Data Flow Graphs with Resource Constraints (LK, ES, GJ, AS, WN), p. 737.
DATE-2000-ParkK #design #detection #fault- A New IEEE 1149.1 Boundary Scan Design for the Detection of Delay Defects (SP, TK), pp. 458–462.
DATE-2000-SchwenckerSGA #automation #design- The Generalized Boundary Curve-A Common Method for Automatic Nominal Design and Design Centering of Analog Circuits (RS, FS, HEG, KA), pp. 42–47.
ESOP-2000-Hofmann #functional #type system- A Type System for Bounded Space and Functional In-Place Update--Extended Abstract (MH0), pp. 165–179.
STOC-2000-Achlioptas #random #satisfiability- Setting 2 variables at a time yields a new lower bound for random 3-SAT (DA), pp. 28–37.
STOC-2000-Ambainis #quantum- Quantum lower bounds by quantum arguments (AA), pp. 636–643.
STOC-2000-AnderssonT #worst-case- Tight(er) worst-case bounds on dynamic searching and priority queues (AA, MT), pp. 335–342.
STOC-2000-BarkolR #nearest neighbour #problem- Tighter bounds for nearest neighbor search and related problems in the cell probe model (OB, YR), pp. 388–396.
STOC-2000-HarnikR - Higher lower bounds on monotone size (DH, RR), pp. 378–387.
STOC-2000-KonemannR #algorithm #approximate #matter- A matter of degree: improved approximation algorithms for degree-bounded minimum spanning trees (JK, RR), pp. 537–546.
CAV-2000-AbdullaIN #petri net- Unfoldings of Unbounded Petri Nets (PAA, SPI, AN), pp. 495–507.
CAV-2000-AyariB #higher-order #logic #monad- Bounded Model Construction for Monadic Second-Order Logics (AA, DAB), pp. 99–112.
CAV-2000-Shtrichman #model checking #satisfiability- Tuning SAT Checkers for Bounded Model Checking (OS), pp. 480–494.
CL-2000-ChirkovaG #database- Linearly Bounded Reformulations of Conjunctive Databases (RC, MRG), pp. 987–1001.
CSL-2000-Atserias #complexity #fixpoint- The Descriptive Complexity of the Fixed-Points of Bounded Formulas (AA), pp. 172–186.
CSL-2000-Blumensath #complexity- Bounded Arithmetic and Descriptive Complexity (AB), pp. 232–246.
LICS-2000-BussK - Resource-Bounded Continuity and Sequentiality for Type-Two Functionals (SRB, BMK), pp. 77–83.
SIGMOD-1999-EmbleyJN #documentation #web- Record-Boundary Discovery in Web Documents (DWE, YSJ, YKN), pp. 467–478.
DLT-1999-AndreBC #decidability #on the #query- On decidability of boundedness property for regular path queries (YA, FB, ACC), pp. 245–256.
ICALP-1999-AllenderABDL - Bounded Depth Arithmetic Circuits: Counting and Closure (EA, AA, DAMB, SD, HL), pp. 149–158.
ICALP-1999-AndreevBCR #branch #pseudo #set #source code- Small Pseudo-Random Sets Yield Hard Functions: New Tight Explict Lower Bounds for Branching Programs (AEA, JLB, AEFC, JDPR), pp. 179–189.
ICALP-1999-DufordJS - Boundedness of Reset P/T Nets (CD, PJ, PS), pp. 301–310.
ICALP-1999-GavoilleH #graph- Compact Routing Tables for Graphs of Bounded Genus (CG, NH), pp. 351–360.
ICALP-1999-NiedermeierR #satisfiability- New Upper Bounds for MaxSat (RN, PR), pp. 575–584.
ICFP-1999-HughesP #embedded #ml #programming #recursion #towards- Recursion and Dynamic Data-structures in Bounded Space: Towards Embedded ML Programming (JH, LP), pp. 70–81.
TOOLS-USA-1999-PlasilBV #behaviour #component #protocol- Bounding Component Behavior via Protocols (FP, MB, SV), pp. 387–398.
PLDI-1999-BlellochC #garbage collection #multi #on the- On Bounding Time and Space for Multiprocessor Garbage Collection (GEB, PC), pp. 104–117.
Best-of-PLDI-1999-BlellochC99a #garbage collection #multi #on the- On bounding time and space for multiprocessor garbage collection (with retrospective) (GEB, PC), pp. 626–641.
DAC-1999-ChenW #approximate #fault- Error Bounded Padé Approximation via Bilinear Conformal Transformation (CPC, DFW), pp. 7–12.
DAC-1999-DrechslerG #using- Using Lower Bounds During Dynamic BDD Minimization (RD, WG), pp. 29–32.
DATE-1999-ShinKK #multi #testing- At-Speed Boundary-Scan Interconnect Testing in a Board with Multiple System Clocks (JS, HK, SK), p. 473–?.
PDP-1999-CasadoG #algorithm #branch #distributed- Work load balance approaches for branch and bound algorithms on distributed systems (LGC, IG), pp. 155–162.
PDP-1999-Gennaro #clustering #modelling #performance- Performance models for I/O bound SPMD applications on clusters of workstations (CG), pp. 263–270.
STOC-1999-AmbainisNTV #automaton #quantum- Dense Quantum Coding and a Lower Bound for 1-Way Quantum Automata (AA, AN, ATS, UVV), pp. 376–383.
STOC-1999-BeameF #problem- Optimal Bounds for the Predecessor Problem (PB, FEF), pp. 295–304.
STOC-1999-BorodinOR #nearest neighbour #problem- Lower Bounds for High Dimensional Nearest Neighbor Search and Related Problems (AB, RO, YR), pp. 312–321.
STOC-1999-ChakrabartiCGL #approximate #complexity #nearest neighbour- A Lower Bound on the Complexity of Approximate Nearest-Neighbor Searching on the Hamming Cube (AC, BC, BG, AL), pp. 305–311.
STOC-1999-ChenKLW - Optimal Buy-and-Hold Strategies for Financial Markets with Bounded Daily Returns (GHC, MYK, YDL, HKW), pp. 119–128.
STOC-1999-DodisK #design #distance #network- Design Networks with Bounded Pairwise Distance (YD, SK), pp. 750–759.
STOC-1999-IshaiK #information retrieval- Improved Upper Bounds on Information-Theoretic Private Information Retrieval (YI, EK), pp. 79–88.
STOC-1999-RazR #on the- On Recycling the Randomness of States in Space Bounded Computation (RR, OR), pp. 159–168.
STOC-1999-RussellSZ - Lower Bounds for Leader Election and Collective Coin-Flipping in the Perfect Information Model (AR, MES, DZ), pp. 339–347.
TACAS-1999-AbdullaAB #protocol #verification- Symbolic Verification of Lossy Channel Systems: Application to the Bounded Retransmission Protocol (PAA, AA, AB), pp. 208–222.
CSL-1999-Beklemishev #query- Open Least Element Principle and Bounded Query Computation (LDB), pp. 389–404.
CSL-1999-Toran - Lower Bounds for Space in Resolution (JT), pp. 362–373.
ICLP-1999-PedreschiR #logic programming #nondeterminism #source code- Bounded Nondeterminism of Logic Programs (DP, SR), pp. 350–364.
IWTCS-1999-BaumgartenH #testing- Testability with Unbounded Testing Strategies (BB, OH), pp. 43–60.
LICS-1999-Johannsen #problem- Weak Bounded Arithmetic, the Diffie-Hellman Problem and Constable’s Class K (JJ), pp. 268–274.
LICS-1999-Libkin #invariant #logic #query- Logics with Counting, Auxiliary Relations, and Lower Bounds for Invariant Queries (LL), pp. 316–325.
PODS-1998-KoutsoupiasT #2d- Tight Bounds for 2-Dimensional Indexing Schemes (EK, DST), pp. 52–58.
PODS-1998-SamoladasM #multi #query #theorem- A Lower Bound Theorem for Indexing Schemes and Its Application to Multidimensional Range Queries (VS, DPM), pp. 44–51.
ICALP-1998-JuknaZ #branch #nondeterminism #on the #source code- On Branching Programs With Bounded Uncertainty (SJ, SZ), pp. 259–270.
ICML-1998-Cesa-BianchiF #finite #multi #problem- Finite-Time Regret Bounds for the Multiarmed Bandit Problem (NCB, PF), pp. 100–108.
ICPR-1998-Claridge #algorithm #consistency #locality #visual notation- A boundary localisation algorithm consistent with human visual perception (EC), pp. 300–304.
ICPR-1998-FlorebySS #fourier #image #order #using- Boundary finding using Fourier surfaces of increasing order [simulated medical images] (LF, LS, KS), pp. 465–467.
ICPR-1998-Heikkila #detection- Moment and curvature preserving technique for accurate ellipse boundary detection (JH), pp. 734–737.
ICPR-1998-LeeHSL #analysis #automation #detection #parsing #using #video- Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
ICPR-1998-SuriHS #automation #classification #polynomial- Automatic quadratic calibration for correction of pixel classification boundaries to an accuracy of 2.5 millimeters: an application in cardiac imaging (JSS, RMH, FHS), pp. 30–33.
PLDI-1998-XiP #array #dependent type- Eliminating Array Bound Checking Through Dependent Types (HX, FP), pp. 249–257.
DAC-1998-DengiR #2d #megamodelling- Boundary Element Method Macromodels for 2-D Hierachical Capacitance Extraction (EAD, RAR), pp. 218–223.
DATE-1998-HelvigRZ #approximate #problem- Improved Approximation Bounds for the Group Steiner Problem (CSH, GR, AZ), pp. 406–413.
LCTES-1998-LiuG #analysis #automation- Automatic Accurate Time-Bound Analysis for High-Level Languages (YAL, GG), pp. 31–40.
PDP-1998-JimenezLF #multi- Loop bounds computation for multilevel tiling (MJ, JML, AF), pp. 445–452.
STOC-1998-FeigeS #scheduling- Improved Bounds for Acyclic Job Shop Scheduling (UF, CS), pp. 624–633.
STOC-1998-FournierK #question- Are Lower Bounds Easier over the Reals? (HF, PK), pp. 507–513.
STOC-1998-Gal #source code- A Characterization of Span Program Size and Improved Lower Bounds for Monotone Span Programs (AG), pp. 429–437.
STOC-1998-Grigoriev #complexity #random- Randomized Complexity Lower Bounds (DG), pp. 219–223.
STOC-1998-GrigorievK #exponential- An Exponential Lower Bound for Depth 3 Arithmetic Circuits (DG, MK), pp. 577–582.
STOC-1998-ShokrollahiW #algebra #geometry- Decoding Algebraic-Geometric Codes Beyond the Error-Correction Bound (MAS, HW), pp. 241–248.
CAV-1998-AbdullaBJ #analysis #on the fly- On-the-Fly Analysis of Systems with Unbounded, Lossy FIFO Channels (PAA, AB, BJ), pp. 305–318.
CSL-1998-Buning - An Upper Bound for Minimal Resolution Refutations (HKB), pp. 171–178.
CSL-1998-Schwentick #complexity #linear- Descriptive Complexity, Lower Bounds and Linear Time (TS), pp. 9–28.
LICS-1998-KolaitisO #first-order #logic #on the #problem- On the Boundedness Problem for Two-Variable First-Order Logic (PGK, MO), pp. 513–524.
ICDAR-1997-Nishida #documentation #feature model #image- Boundary Feature Extraction from Gray-Scale Document Images (HN), pp. 132–141.
ICDAR-1997-Szmurlo #normalisation #recognition- Boundary Normalization for Recognition of Non-Touching Non-Degraded Characters (MS), pp. 463–466.
DLT-1997-BuchholzK #on the #power of- On the power of one-way bounded cellular time computers (TB, MK), pp. 365–375.
DLT-1997-FernauHF #distributed- Bounding resources in Cooperating Distributed Grammar Systems (HF, MH, RF), pp. 261–272.
DLT-1997-IwamaT #automaton #nondeterminism- Tight Bounds on the Number of States of DFA’s That Are Equivalent to n-state NFA’s (KI, KT), pp. 147–154.
DLT-1997-KarhumakiPM #constant- A lower bound for a constant in Shallit’s conjecture (JK, WP, FM), pp. 103–118.
ICALP-1997-Ambainis #communication #complexity #information retrieval- Upper Bound on Communication Complexity of Private Information Retrieval (AA), pp. 401–407.
ICALP-1997-BeigelF #nondeterminism #performance #recursion- Molecular Computing, Bounded Nondeterminism, and Efficient Recursion (RB, BF), pp. 816–826.
ICALP-1997-Bournez #constant #power of- Some Bounds on the Computational Power of Piecewise Constant Derivative Systems (OB), pp. 143–153.
ICALP-1997-Bruyere #algorithm- A Completion Algorithm for Codes with Bounded Synchronization Delay (VB), pp. 87–97.
ICALP-1997-BuhrmanFF - Results on Resource-Bounded Measure (HB, SAF, LF), pp. 188–194.
ICALP-1997-Hagerup #algorithm #graph- Dynamic Algorithms for Graphs of Bounded Treewidth (TH), pp. 292–302.
ICFP-1997-ChinH - A Bounds Inference Method for Vector-Based Memoisation (WNC, MH), pp. 176–187.
ICML-1997-Fiechter #learning #online- Expected Mistake Bound Model for On-Line Reinforcement Learning (CNF), pp. 116–124.
PEPM-1997-Debray #partial evaluation- Resource-Bounded Partial Evaluation (SKD), pp. 179–192.
DAC-1997-BeattieP - Bounds for BEM Capacitance Extraction (MWB, LTP), pp. 133–136.
DAC-1997-KahngT - More Practical Bounded-Skew Clock Routing (ABK, CWAT), pp. 594–599.
DAC-1997-LiaoD #problem #using- Solving Covering Problems Using LPR-Based Lower Bounds (SYL, SD), pp. 117–120.
EDTC-1997-ChakrabortyM #functional #parallel #programmable #testing- A programmable boundary scan technique for board-level, parallel functional duplex march testing of word-oriented multiport static RAMs (KC, PM), pp. 330–334.
EDTC-1997-Kristof #architecture #effectiveness #idea #self #testing- Extension of the boundary-scan architecture and new idea of BIST for more effective testing and self-testing of interconnections (AK), p. 630.
STOC-1997-Albers #online #scheduling- Better Bounds for Online Scheduling (SA), pp. 130–139.
STOC-1997-Aspnes #distributed #random- Lower Bounds for Distributed Coin-Flipping and Randomized Consensus (JA), pp. 559–568.
STOC-1997-GoldreichR #graph #testing- Property Testing in Bounded Degree Graphs (OG, DR), pp. 406–415.
STOC-1997-GrigorievK #random- Randomized Ω(n²) Lower Bound for Knapsack (DG, MK), pp. 76–85.
STOC-1997-PaturiSZ #exponential- Exponential Lower Bounds for Depth 3 Boolean Circuits (RP, MES, FZ), pp. 86–91.
TACAS-1997-DArgenioKRT #exclamation #protocol- The Bounded Retransmission Protocol Must Be on Time! (PRD, JPK, TCR, JT), pp. 416–431.
TAPSOFT-1997-AndreB #difference #transducer- Word-into-Tree Transducers with Bounded Difference (YA, FB), pp. 177–188.
CSL-1997-BonetG #linear #simulation- Linear Lower Bounds and Simulations in Frege Systems with Substitutions (MLB, NG), pp. 115–128.
ILPS-1997-DebrayLHL #estimation #logic programming #source code- Lower Bound Cost Estimation for Logic Programs (SKD, PLG, MVH, NWL), pp. 291–305.
ILPS-1997-KingSB #analysis #logic programming #source code- Lower-bound Time-complexity Analysis of Logic Programs (AK, KS, FB), pp. 261–275.
ADL-1996-ChingJW #enterprise #library- Authorization in the Digital Library: Secure Access to Services Across Enterprise Boundaries (NC, VEJ, MW), pp. 110–119.
ICALP-1996-AtenieseBSS #encryption #visual notation- Constructions and Bounds for Visual Cryptography (GA, CB, ADS, DRS), pp. 416–428.
ICALP-1996-BradfordR - Lower Bounds for Row Minima Searching (PGB, KR), pp. 454–465.
ICALP-1996-Hashiguchi #automaton #distance- New Upper Bounds to the Limitedness of Distance Automata (KH), pp. 324–335.
ICALP-1996-Miltersen #multi- Lower Bounds for Static Dictionaries on RAMs with Bit Operations But No Multiplication (PBM), pp. 442–453.
ICALP-1996-Razborov #independence #proving- Lower Bounds for Propositional Proofs and Independence Results in Bounded Arithmetic (AAR), pp. 48–62.
CSCW-1996-RandallR #development- Ethnography and Systems Development: Bounding the Intersection (DR, MR), p. 5.
CIKM-1996-Greco #set #unification- Optimal Unification of Bounded Simple Set Terms (SG), pp. 326–336.
ICPR-1996-GunnN #energy #using- Snake head boundary extraction using global and local energy minimisation (SRG, MSN), pp. 581–585.
ICPR-1996-LakshmananW #detection #image- Detection of bounded weak echo regions in meteorological radar images (VL, AW), pp. 895–899.
ICPR-1996-SuriHS #automation #fault- Correction of systematic errors in automatically produced boundaries from low-contrast ventriculograms (JSS, RMH, FHS), pp. 361–365.
ICPR-1996-SzeL #algorithm #branch #classification- Branch and bound algorithm for the Bayes classifier (LS, CHL), pp. 705–709.
KR-1996-Hendler #implementation #research- Implementations and Research: Discussions at the Boundary (JAH), pp. 659–660.
KR-1996-MacGregor #implementation #research- Implementations and Research: Discussions at the Boundary (RMM), pp. 657–658.
KR-1996-Schubert #implementation #research- Implementations and Research: Discussions at the Boundary (LKS), pp. 661–662.
KR-1996-Shapiro #implementation #research- Implementations and Research: Discussions at the Boundary (SCS), pp. 663–664.
DAC-1996-OhPP #linear #programming #using- Constructing Lower and Upper Bounded Delay Routing Trees Using Linear Programming (JO, IP, MP), pp. 401–404.
DAC-1996-ParulkarGB #data flow #graph- Lower Bounds on Test Resources for Scheduled Data Flow Graphs (IP, SKG, MAB), pp. 143–148.
STOC-1996-BabaiGKRSW #graph #source code- Extremal Bipartite Graphs and Superpolynomial Lower Bounds for Monotone Span Programs (LB, AG, JK, LR, TS, AW), pp. 603–611.
STOC-1996-BartalFL #graph #online #problem- Lower Bounds for On-line Graph Problems with Application to On-line Circuit and Optical Routing (YB, AF, SL), pp. 531–540.
STOC-1996-Basu #algebra #on the #set- On Bounding the Betti Numbers and Computing the Euler Characteristic of Semi-Algebraic Sets (SB), pp. 408–417.
STOC-1996-Cesa-BianchiDFS #learning- Noise-Tolerant Learning Near the Information-Theoretic Bound (NCB, ED, PF, HUS), pp. 141–150.
STOC-1996-EvansP - Lower Bounds for Noisy Boolean Decision Trees (WSE, NP), pp. 620–628.
STOC-1996-GrigorievKHS #algebra #random- A Lower Bound for Randomized Algebraic Decision Trees (DG, MK, FMadH, RS), pp. 612–619.
CADE-1996-Vorobyov - An Improved Lower Bound for the Elementary Theories of Trees (SGV), pp. 275–287.
CAV-1996-ClarkeBLXS #analysis #named #realtime #specification #tool support #visual notation- XVERSA: An Integrated Graphical and Textual Toolset for the Specification and Analysis of Resource-Bound Real-Time Sytems (DC, HBA, IL, HlX, OS), pp. 402–405.
CSL-1996-Dziembowski #fixpoint #query- Bounded-Variable Fixpoint Queries are PSPACE-complete (SD), pp. 89–105.
CSL-1996-Merkle - Exact Pairs for Abstract Bounded Reducibilities (WM), pp. 349–368.
LICS-1996-Marcinkowski #datalog #decidability- DATALOG SIRUPs Uniform Boundedness is Undecidable (JM), pp. 13–24.
ICDAR-v2-1995-HaHP #component #recursion #using- Recursive X-Y cut using bounding boxes of connected components (JH, RMH, ITP), pp. 952–955.
ICDAR-v2-1995-HaHP95a #composition #documentation- Document page decomposition by the bounding-box project (JH, RMH, ITP), pp. 1119–1122.
PODS-1995-DongS - Space-Bounded FOIES (GD, JS), pp. 139–150.
PODS-1995-Vardi #complexity #on the #query- On the Complexity of Bounded-Variable Queries (MYV), pp. 266–276.
SIGMOD-1995-PapadiasTSE #case study- Topological Relations in the World of Minimum Bounding Rectangles: A Study with R-trees (DP, YT, TKS, MJE), pp. 92–103.
VLDB-1995-FlodinR #object-oriented #query- Processing Object-Oriented Queries with Invertible Late Bound Functions (SF, TR), pp. 335–344.
DLT-1995-Dorr #abstract interpretation- Computing an Upper Bound for SVS(gg) by Abstract Interpretation (HD), pp. 279–288.
DLT-1995-GvozdjakR #parallel- Time-Bounded Parallel Rewriting (PG, BR), pp. 79–87.
ICALP-1995-Ben-AmramG #algebra #random- Lower Bounds on Algebraic Random Access Machines (AMBA, ZG), pp. 360–371.
ICALP-1995-BodlaenderH #algorithm #parallel- Parallel Algorithms with Optimal Speedup for Bounded Treewidth (HLB, TH), pp. 268–279.
ICALP-1995-BozanisKMT #problem- New Upper Bounds for Generalized Intersection Searching Problems (PB, NK, CM, AKT), pp. 464–474.
ICALP-1995-FreivaldsK #random- Lower Time Bounds for Randomized Computation (RF, MK), pp. 183–195.
ICML-1995-Drakopoulos #classification #fault #nearest neighbour- Bounds on the Classification Error of the Nearest Neighbor Rule (JAD), pp. 203–208.
PLDI-1995-BarrettZ #garbage collection #using- Garbage Collection Using a Dynamic Threatening Boundary (DAB, BGZ), pp. 301–314.
POPL-1995-CastagnaP #decidability #named #quantifier- Corrigendum: Decidable Bounded Quantification (GC, BCP), p. 408.
POPL-1995-HoangM #type inference #type system- Lower Bounds on Type Inference with Subtypes (MH, JCM), pp. 176–185.
POPL-1995-Vorobyov #decidability #quantifier- Structural Decidable Extensions of Bounded Quantification (SGV), pp. 164–175.
DAC-1995-GuptaKTWP - The Elmore Delay as a Bound for RC Trees with Generalized Input Signals (RG, BK, BT, JW, LTP), pp. 364–369.
DAC-1995-HuangKT #on the #problem- On the Bounded-Skew Clock and Steiner Routing Problems (DJHH, ABK, CWAT), pp. 508–513.
STOC-1995-AnderssonHP #array- A tight lower bound for searching a sorted array (AA, JH, OP), pp. 417–426.
STOC-1995-BonetPR #proving- Lower bounds for cutting planes proofs with small coefficients (MLB, TP, RR), pp. 575–584.
STOC-1995-CanettiI #power of #random #scheduling- Bounding the power of preemption in randomized scheduling (RC, SI), pp. 606–615.
STOC-1995-Chazelle - Lower bounds for off-line range searching (BC), pp. 733–740.
STOC-1995-EdmondsP - A nearly optimal time-space lower bound for directed st-connectivity on the NNJAG model (JE, CKP), pp. 147–156.
STOC-1995-Eppstein #geometry #optimisation #parametricity- Geometric lower bounds for parametric matroid optimization (DE), pp. 662–671.
STOC-1995-Harchol-BalterW #network- Bounding delays in packet-routing networks (MHB, DW), pp. 248–257.
STOC-1995-KahaleLMPSS #network #sorting- Lower bounds for sorting networks (NK, FTL, YM, CGP, TS, ES), pp. 437–446.
STOC-1995-KarpinskiM #network #polynomial- Polynomial bounds for VC dimension of sigmoidal neural networks (MK, AM), pp. 200–208.
STOC-1995-Ponzio #branch #integer #multi #source code- A lower bound for integer multiplication with read-once branching programs (SP), pp. 130–139.
TAPSOFT-1995-BadouelBD #algorithm #polynomial #synthesis- Polynomial Algorithms for the Synthesis of Bounded Nets (EB, LB, PD), pp. 364–378.
PODS-1994-Afrati #datalog #exclamation #graph #query- Bounded Arity Datalog (!=) Queries on Graphs (FNA), pp. 97–106.
ICALP-1994-AumannBF #cost analysis #fault #on the- On the Cost of Recomputing: Tight Bounds on Pebbling with Faults (YA, JBI, UF), pp. 47–58.
ICALP-1994-Bonizzoni - A Tight Lower Bound for Primitivity in k-Structures (PB), pp. 556–567.
ICALP-1994-BuhrmanT #on the- On the Cutting Edge of Relativization: The Resource Bounded Injury Method (HB, LT), pp. 263–273.
ICALP-1994-FreivaldsK #random- Lower Space Bounds for Randomized Computation (RF, MK), pp. 580–592.
ICALP-1994-PlaxtonS #network #sorting- A Super-Logarithmic Lower Bound for Hypercubic Sorting Networks (CGP, TS), pp. 618–629.
ICALP-1994-Pudlak #communication #complexity #game studies- Unexpected Upper Bounds on the Complexity of Some Communication Games (PP), pp. 1–10.
TAGT-1994-ArnborgP #graph #subclass- A Technique for Recognizing Graphs of Bounded Treewidth with Application to Subclasses of Partial 2-Paths (SA, AP), pp. 469–486.
TAGT-1994-SkodinisW #graph grammar #problem- The Bounded Degree Problem for Non-Obstructing eNCE Graph Grammars (KS, EW), pp. 211–224.
POPL-1994-CastagnaP #decidability #quantifier- Decidable Bounded Quantification (GC, BCP), pp. 151–162.
ICRE-1994-DrakeT #analysis- System bounding issues for analysis (JMD, WTT), pp. 24–31.
DAC-1994-ZhuW - Switch Bound Allocation for Maximizing Routability in Timing-Driven Routing of FPGAs (KZ, DFW), pp. 165–170.
EDAC-1994-DalkilicP #scheduling #using- Optimal Operation Scheduling Using Resource Lower Bound Estimations (MED, VP), pp. 319–324.
EDAC-1994-KarkkainenTW #monitoring #power management #testing- Boundary Scan Testing Combined with Power Supply Current Monitoring (MK, KT, MW), pp. 232–235.
EDAC-1994-Su #random testing #testing- Random Testing of Interconnects in A Boundary Scan Environment (CS), pp. 226–231.
HPDC-1994-Benslimane #communication #finite #state machine- Deciding Boundedness for Systems of Two Communicating Finite State Machines (AB), pp. 262–269.
PDP-1994-DiersteinHR #algorithm #array- A Branch-and-bound Algorithm For Array Distributions (AD, RH, TR), pp. 528–535.
STOC-1994-BodlaenderFH #problem- Beyond NP-completeness for problems of bounded width: hardness for the W hierarchy (HLB, MRF, MTH), pp. 449–458.
STOC-1994-FortnowW #game studies- Optimality and domination in repeated games with bounded players (LF, DW), pp. 741–749.
STOC-1994-GrigorievKV #algebra #testing- Lower bounds on testing membership to a polyhedron by algebraic decision trees (DG, MK, NV), pp. 635–644.
STOC-1994-HalldorssonR #approximate #graph #independence #set- Greed is good: approximating independent sets in sparse and bounded-degree graphs (MMH, JR), pp. 439–448.
STOC-1994-Miltersen #problem #random- Lower bounds for union-split-find related problems on random access machines (PBM), pp. 625–634.
STOC-1994-Mulmuley #linear #parallel #problem #programming- Lower bounds for parallel linear programming and other problems (KM), pp. 603–614.
STOC-1994-PapadimitriouY #complexity #on the- On complexity as bounded rationality (CHP, MY), pp. 726–733.
STOC-1994-YangA #problem- Time bounds for mutual exclusion and related problems (JHY, JHA), pp. 224–233.
ISSTA-1994-BertolinoM #branch #testing- A Meaningful Bound for Branch Testing (AB, MM), p. 202.
LICS-1994-ImpagliazzoPU #proving- Upper and Lower Bounds for Tree-Like Cutting Planes Proofs (RI, TP, AU), pp. 220–228.
ICDAR-1993-Breul #fault #recognition #using- Recognition of handprinted digits using optimal bounded error matching (TMB), pp. 493–496.
ICALP-1993-Ablayev #communication #complexity #probability- Lower Bounds for One-way Probabilistic Communication Complexity (FMA), pp. 241–252.
ICALP-1993-Kann #approximate #problem- Polynomially Bounded Minimization Problems which are Hard to Approximate (VK), pp. 52–63.
ICALP-1993-KozenZ #problem- Optimal Bounds for the Change-Making Problem (DK, SZ), pp. 150–161.
ICALP-1993-Yamamoto #nondeterminism #trade-off #turing machine- Reversal-Space Trade-offs For Simultaneous Resource-Bounded Nondeterministic Turing Machines (HY), pp. 203–214.
TLCA-1993-Pierce #morphism #polymorphism- Intersection Types and Bounded Polymorphism (BCP), pp. 346–360.
TLCA-1993-Springintveld #reduction- Lower and Upper Bounds for Reductions of Types in λω and λP (JS), pp. 391–405.
CIKM-1993-CosarLS #multi #optimisation #query- Multiple Query Optimization with Depth-First Branch-and-Bound and Dynamic Query Ordering (AC, EPL, JS), pp. 433–438.
CIKM-1993-Maine #named #performance- HSGIMS — A Secure High-Speed Tool with Bound Search Times for Transparently Managing and Manipulating Information (PADdM), pp. 216–222.
PLILP-1993-BarklundB #memory management #multi- Executing Bounded Quantifications on Shared Memory Multiprocessors (JB, JB), pp. 302–317.
KBSE-1993-Feather #implementation- An Implementation of Bounded Obligations (MSF), p. 18.
SAC-1993-VaidyanathanL #analysis #learning- Analysis of Upper Bound in Valiant’s Model for Learning Bounded CNF Expressions (SV, SL), pp. 754–761.
SAC-1993-VeezhinathanKT #branch #hybrid- A Hybrid of Neural Net and Branch and Bound Techniques for Seismic Horizon Tracking (JV, FK, JT), pp. 173–178.
DAC-1993-Lee #2d #algorithm #design- A Bounded 2D Contour Searching Algorithm for Floorplan Design with Arbitrarily Shaped Rectilinear and Soft Modules (TcL), pp. 525–530.
STOC-1993-ChazelleEGGSW #set- Improved bounds on weak epsilon-nets for convex sets (BC, HE, MG, LJG, MS, EW), pp. 495–504.
STOC-1993-KushilevitzMRZ #random- Lower bounds for randomized mutual exclusion (EK, YM, MOR, DZ), pp. 154–163.
STOC-1993-Maass #complexity #learning- Bounds for the computational power and learning complexity of analog neural nets (WM), pp. 335–344.
STOC-1993-PlotkinT #multi- Improved bounds on the max-flow min-cut ratio for multicommodity flows (SAP, ÉT), pp. 691–697.
STOC-1993-WigdersonZ - Expanders that beat the eigenvalue bound: explicit construction and applications (AW, DZ), pp. 245–251.
CSL-1993-Grohe #fixpoint #logic- Bounded-Arity Hierarchies in Fixed-Point Logics (MG), pp. 150–164.
ICLP-1993-Brzoska #logic programming- Temporal Logic Programming with Bounded Universal Modality Goals (CB), pp. 239–256.
ISSTA-1993-CorbettA #concurrent #realtime- A Practical Technique for Bounding the Time Between Events in Concurrent Real-Time Systems (JCC, GSA), pp. 110–116.
PODS-1992-WongA #concurrent #consistency #database #nondeterminism- Tolerating Bounded Inconsistency for Increasing Concurrency in Database Systems (MHW, DA), pp. 236–245.
ICALP-1992-ChazelleR #complexity #pointer- Lower Bounds on the Complexity of Simplex Range Reporting on a Pointer Machine (BC, BR), pp. 439–449.
ICALP-1992-SantisPY #proving #statistics #verification- One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier (ADS, GP, MY), pp. 28–40.
KR-1992-Schwarz #logic- Bounding Introspection in Nonmonotonic Logic (GS), pp. 581–590.
POPL-1992-NielsonN #fixpoint- Bounded Fixed Point Iteration (HRN, FN), pp. 71–82.
POPL-1992-Pierce #decidability #quantifier- Bounded Quantification is Undecidable (BCP), pp. 305–315.
DAC-1992-LingKW #3d #approach #simulation- A Boundary-Element Approach to Transient simulation of Three-Dimensional Integrated Circuit Interconnect (DDL, SK, JW), pp. 93–98.
HPDC-1992-ClaytonDMW #latency- Determining Update Latency Bounds in Galactica Net (SC, RJD, WM, AW), pp. 104–111.
STOC-1992-BeameIKPPW #exponential #principle- Exponential Lower Bounds for the Pigeonhole Principle (PB, RI, JK, TP, PP, ARW), pp. 200–220.
STOC-1992-BjornerLY #linear- Linear Decision Trees: Volume Estimates and Topological Bounds (AB, LL, ACCY), pp. 170–177.
STOC-1992-DworkW #concurrent #exclamation #performance- Simple and Efficient Bounded Concurrent Timestamping or Bounded Concurrent Timestamp Systems are Comprehensible! (CD, OW), pp. 655–666.
STOC-1992-MaggsS #algorithm #network- Simple Algorithms for Routing on Butterfly Networks with Bounded Queues (BMM, RKS), pp. 150–161.
CSL-1992-Stewart #logic #polynomial #query- Logical Characterization of Bounded Query Classes II: Polynomial-Time Oracle Machines (IAS), pp. 410–424.
PODS-1991-HillebrandKMV #datalog #tool support- Tools for Datalog Boundedness (GGH, PCK, HGM, MYV), pp. 1–12.
PODS-1991-JohnsonR #consistency #protocol #replication- A Tight Upper Bound on the Benefits of Replication and Consistency Control Protocols (DBJ, LR), pp. 75–81.
PODS-1991-KrishnakumarB - Bounded Ignorance in Replicated Systems (NK, AJB), pp. 63–74.
PODS-1991-MumickP #linear #query- Overbound and Right-Linear Queries (ISM, HP), pp. 127–141.
ICALP-1991-HonkalaS #ambiguity #morphism- L Morphisms: Bounded Delay and Regularity of Ambiguity (JH, AS), pp. 566–574.
RTA-1991-Baader #problem #unification- Unification, Weak Unification, Upper Bound, Lower Bound, and Generalization Problems (FB), pp. 86–97.
RTA-1991-Brandenburg #confluence #equivalence #graph grammar- The Equivalence of Boundary and Confluent Graph Grammars on Graph Languages of Bounded Degree (FJB), pp. 312–322.
RTA-1991-Hofbauer #proving #term rewriting #termination- Time Bounded Rewrite Systems and Termination Proofs by Generalized Embedding (DH), pp. 62–73.
RTA-1991-Pottier #algorithm #linear- Minimal Solutions of Linear Diophantine Systems: Bounds and Algorithms (LP), pp. 162–173.
ML-1991-YooF #effectiveness #identification- Identifying Cost Effective Boundaries of Operationality (JPY, DHF), pp. 569–573.
DAC-1991-OnoderaTT #layout- Branch-and-Bound Placement for Building Block Layout (HO, YT, KT), pp. 433–439.
PPoPP-1991-NicolauW #parallel- Optimal Schedules for Parallel Prefix Computation with Bounded Resources (AN, HW), pp. 1–10.
CAAP-1991-Caron #automaton #linear #term rewriting- Linear Bounded Automata and Rewrite Systems: Influence of Initial Configurations on Decision Properties (ACC), pp. 74–89.
STOC-1991-AslamD #fault- Searching in the Presence of Linearly Bounded Errors (JAA, AD), pp. 486–493.
STOC-1991-AttiyaDLS #nondeterminism- Bounds on the Time to Reach Agreement in the Presence of Timing Uncertainty (HA, CD, NAL, LJS), pp. 359–369.
STOC-1991-BreslauerG #parallel #string- A Lower Bound for Parallel String Matching (DB, ZG), pp. 439–443.
STOC-1991-KarloffRR #algorithm #random- Lower Bounds for Randomized k-Server and Motion Planning Algorithms (HJK, YR, YR), pp. 278–288.
STOC-1991-Nisan #commutative- Lower Bounds for Non-Commutative Computation (NN), pp. 410–418.
CAV-1991-JardJ #algorithm #on the fly #verification- Bounded-memory Algorithms for Verification On-the-fly (CJ, TJ), pp. 192–202.
CSL-1991-Flum #on the- On Bounded Theories (JF), pp. 111–118.
CSL-1991-Goerdt #proving- The Cutting Plane Proof System with Bounded Degree of Falsity (AG), pp. 119–133.
LICS-1991-Hungar #complexity #hoare #proving- Complexity Bounds of Hoare-style Proof Systems (HH), pp. 120–126.
ML-1990-Hirsh #consistency #learning #nondeterminism- Learning from Data with Bounded Inconsistency (HH), pp. 32–39.
PLDI-1990-Gupta #array #fresh look #optimisation- A Fresh Look at Optimizing Array Bound Checking (RG), pp. 272–282.
PLDI-1990-SanthanamO - Register Allocation Across Procedure and Module Boundaries (VS, DO), pp. 28–39.
STOC-1990-Cleve #simulation #source code #towards- Towards Optimal Simulations of Formulas by Bounded-Width Programs (RC), pp. 271–277.
STOC-1990-Frederickson - The Information Theory Bound Is Tight for Selection in a Heap (GNF), pp. 26–33.
STOC-1990-Nisan #generative- Psuedorandom Generators for Space-Bounded Computation (NN), pp. 204–212.
STOC-1990-OgiwaraW #on the #polynomial #set- On Polynomial Time Bounded Truth-Table Reducibility of NP Sets to Sparse Sets (MO, OW), pp. 457–467.
STOC-1990-Poutre #pointer #problem- Lower Bounds for the Union-Find and the Split-Find Problem on Pointer Machines (JALP), pp. 34–44.
STOC-1990-Szegedy #communication #complexity #symmetry- Functions with Bounded Symmetric Communication Complexity and Circuits with mod m Gates (MS), pp. 278–286.
STOC-1990-Zuckerman - A Technique for Lower Bounding the Cover Time (DZ), pp. 254–259.
CSL-1990-HertrampfW #fault #interactive #proving- Interactive Proof Systems: Provers, Rounds, and Error Bounds (UH, KWW), pp. 261–273.
CSL-1990-Pudlak #theorem- Ramsey’s Theorem in Bounded Arithmetic (PP), pp. 308–317.
CSL-1990-Ranaivoson #graph #problem- Nontrivial Lower Bounds for some NP-Problems on Directed Graphs (SR), pp. 318–339.
LICS-1990-HarelRV #concurrent #on the #power of #reasoning #source code- On the Power of Bounded Concurrency~III: Reasoning About Programs (DH, RR, MYV), pp. 478–488.
PODS-1989-DublishM #fixpoint #query- Expressibility of Bounded-Arity Fixed-Point Query Hierarchies (PD, SNM), pp. 324–335.
ICALP-1989-AllenderH - Lower Bounds for the Low Hierarchy (EA, LAH), pp. 31–45.
ICALP-1989-BilardiM - Time Lower Bounds For CREW-PRAM Computation Of Monotone Functions (GB, AM), pp. 95–107.
ICALP-1989-BrassardC - Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (GB, CC, MY), pp. 123–136.
ICALP-1989-Cardone #quantifier #recursion #relational #semantics- Relational Semantics for Recursive Types and Bounded Quantification (FC), pp. 164–178.
ICALP-1989-MansourST - Lower Bounds for Computations with the Floor Operation (YM, BS, PT), pp. 559–573.
FPCA-1989-CanningCHOM #morphism #object-oriented #polymorphism #programming- F-Bounded Polymorphism for Object-Oriented Programming (PSC, WRC, WLH, WGO, JCM), pp. 273–280.
DAC-1989-PatilB #algorithm #branch #generative #parallel #testing- A Parallel Branch and Bound Algorithm for Test Generation (SP, PB), pp. 339–343.
SOSP-1989-BarkleyL #lazy evaluation- A Lazy Buddy System Bounded by Two Coalescing Delays per Class (REB, TPL), pp. 167–176.
CAAP-1989-BeauquierCPV - Syntactical Properties of Unbounded Nets of Processors (JB, AC, AP0, GVN), pp. 119–133.
CAAP-1989-HabelKV #decidability #graph grammar #problem- Decidable Boundedness Problems for Hyperedge-Replacement Graph Grammar (AH, HJK, WV), pp. 275–289.
STOC-1989-BorodinRT #sequence #traversal- Lower Bounds on the Length of Universal Traversal Sequences (AB, WLR, MT), pp. 562–573.
STOC-1989-DolevS #concurrent- Bounded Concurrent Time-Stamp Systems Are Constructible (DD, NS), pp. 454–466.
CSL-1989-Meinel #source code- Ω-Branching Programs of Bounded Width (CM), pp. 242–253.
LICS-1989-Stolboushkin #complexity #logic- Some Complexity Bounds for Dynamic Logics (APS), pp. 324–332.
PODS-1988-RamakrishnaM #analysis- Analysis of Bounded Disorder File Organization (MVR, PM), pp. 117–125.
PODS-1988-Vardi #decidability #linear #query #recursion- Decidability and Undecidability Results for Boundedness of Linear Recursive Queries (MYV), pp. 341–351.
ICALP-1988-Bodlaender #graph #programming- Dynamic Programming on Graphs with Bounded Treewidth (HLB), pp. 105–118.
ICALP-1988-ChangIP #modelling #parallel #performance #simulation- Efficient Simulations of Simple Models of Parallel Computation by Time-Bounded ATM’s and Space-Bounded TM’s (JHC, OHI, MAP), pp. 119–132.
LFP-1988-Martini #modelling #quantifier- Bounded Quantifiers Have Interval Models (SM), pp. 164–173.
ML-1988-BravermanR - Boundaries of Operationality (MSB, SJR), pp. 221–234.
STOC-1988-KarpZ #parallel #random- A Randomized Parallel Branch-and-Bound Procedure (RMK, YZ), pp. 290–300.
STOC-1988-King #complexity #graph- Lower Bounds on the Complexity of Graph Properties (VK), pp. 468–476.
CADE-1988-VermaR #parallel- Optimal Time Bounds for Parallel Term Matching (RMV, IVR), pp. 694–703.
CADE-1988-Walther #algorithm #automation #proving #termination- Argument-Bounded Algorithms as a Basis for Automated Termination Proofs (CW), pp. 602–621.
LICS-1988-BruceL #inheritance #quantifier- A Modest Model of Records, Inheritance and Bounded Quantification (KBB, GL), pp. 38–50.
PODS-1987-BeeriKBR #logic programming #source code- Bounds on the Propagation of Selection into Logic Programs (CB, PCK, FB, RR), pp. 214–226.
PODS-1987-ChanH #database #dependence #design #functional #on the- On Designing Database Schemes Bounded or Constant-time-maintainable with respect to Functional Dependencies (EPFC, HJH), pp. 48–57.
PODS-1987-NaughtonS #decidability #recursion- A Decidable Class of Bounded Recursions (JFN, YS), pp. 227–236.
ICALP-1987-Dietzfelbinger #sorting- Lower Bounds for Sorting of Sums (MD), pp. 457–466.
ICALP-1987-MehlhornNA #complexity #problem- A Lower Bound for the Complexity of the Union-Split-Find Problem (KM, SN, HA), pp. 479–488.
STOC-1987-BeameH #problem- Optimal Bounds for Decision Problems on the CRCW PRAM (PB, JH), pp. 83–93.
STOC-1987-Smolensky #algebra #complexity #formal method- Algebraic Methods in the Theory of Lower Bounds for Boolean Circuit Complexity (RS), pp. 77–82.
LICS-1987-ImmermanK - Definability with Bounded Number of Bound Variables (NI, DK), pp. 236–244.
ICALP-1986-Schoning #recursion- Lower Bounds by Recursion Theoretic Arguments (US), pp. 370–375.
ICALP-1986-Willard #problem #query- Lower Bounds for Dynamic Range Query Problems That Permit Subtraction (DEW), pp. 444–453.
GG-1986-Welzl #graph grammar- Boundary NlC and partition controlled graph grammars (EW), pp. 593–609.
OOPSLA-1986-MittalBK - Virtual Copies — At the Boundary Between Classes and Instances (SM, DGB, KMK), pp. 159–166.
DAC-1986-LinA #layout #named- Minplex — a compactor that minimizes the bounding rectangle and individual rectangles in a layout (SLL, JA), pp. 123–130.
STOC-1986-AjtaiBHKPRST #branch #source code- Two lower bounds for branching programs (MA, LB, PH, JK, PP, VR, ES, GT), pp. 30–38.
STOC-1986-Barrington #branch #source code- Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC¹ (DAMB), pp. 1–5.
STOC-1986-DworkPPU #fault tolerance #network- Fault Tolerance in Networks of Bounded Degree (CD, DP, NP, EU), pp. 370–379.
STOC-1986-Hastad - Almost Optimal Lower Bounds for Small Depth Circuits (JH), pp. 6–20.
STOC-1986-LeightonS #algorithm #analysis #grid- Tight Bounds for Minimax Grid Matching, With Applications to the Average Case Analysis of Algorithms (FTL, PWS), pp. 91–103.
STOC-1986-LiY #parallel- New Lower Bounds for Parallel Computation (ML, YY), pp. 177–187.
VLDB-1985-Ioannidis #recursion- A Time Bound on the Materialization of some Recursively Defined Views (YEI), pp. 219–226.
ICALP-1985-KarlssonMR #nearest neighbour #problem- The Nearest Neighbor Problem on Bounded Domains (RGK, JIM, ELR), pp. 318–327.
ICALP-1985-Li - Lower Bounds by Kolmogorov-Complexity (ML0), pp. 383–393.
STOC-1985-Buss #polynomial- The Polynomial Hierarchy and Fragments of Bounded Arithmetic (SRB), pp. 285–290.
STOC-1985-FichHRW #infinity #parallel- One, Two, Three … Infinity: Lower Bounds for Parallel Computation (FEF, FMadH, PR, AW), pp. 48–58.
STOC-1985-VardiS #logic #source code- Improved Upper and Lower Bounds for Modal Logics of Programs: Preliminary Report (MYV, LJS), pp. 240–251.
DAC-1984-LewandowskiL #algorithm #branch- A branch and bound algorithm for optimal pla folding (JLL, CLL), pp. 426–433.
STOC-1984-AdlerM #algorithm #polynomial- A Simplex Algorithm Whose Average Number of Steps is Bounded between Two Quadratic Functions of the Smaller Dimension (IA, NM), pp. 312–323.
STOC-1984-Boppana - Threshold Functions and Bounded Depth Monotone Circuits (RBB), pp. 475–479.
STOC-1984-DurisGS #communication #complexity- Lower Bounds on Communication Complexity (PD, ZG, GS), pp. 81–91.
STOC-1984-HartS #finite #logic #modelling #probability- Probabilistic Temporal Logics for Finite and Bounded Models (SH, MS), pp. 1–13.
STOC-1984-Leighton #complexity #parallel #sorting- Tight Bounds on the Complexity of Parallel Sorting (FTL), pp. 71–80.
STOC-1984-Maass #nondeterminism #polynomial #turing machine- Quadratic Lower Bounds for Deterministic and Nondeterministic One-Tape Turing Machines (WM), pp. 401–408.
ILPC-1984-Sintzoff84 #source code #strict- Bounded-Horizon Success-Complete Restriction of Inference Programs (MS), pp. 139–150.
ICALP-1983-ChandraFL #constant #problem- Lower Bounds for Constant Depth Circuits for Prefix Problems (AKC, SF, RJL), pp. 109–117.
ICALP-1983-ChoffrutK #morphism #testing- Test Sets for Morphisms with Bounded Delay (CC, JK), pp. 118–127.
ICALP-1983-HambruschS #graph #problem- Lower Bounds for Solving Undirected Graph Problems on VLSI (SEH, JS), pp. 292–303.
DAC-1983-LiuA - Bounds on the saved area ratio due to PLA folding (WL, DEA), pp. 538–544.
STOC-1983-Ben-Or #algebra- Lower Bounds for Algebraic Computation Trees (MBO), pp. 80–86.
STOC-1983-BorodinDFP #branch #source code- Bounds for Width Two Branching Programs (AB, DD, FEF, WJP), pp. 87–93.
STOC-1983-ChandraFL83a - Unbounded Fan-in Circuits and Associative Functions (AKC, SF, RJL), pp. 52–60.
STOC-1983-DurisGPR - Two Nonlinear Lower Bounds (PD, ZG, WJP, RR), pp. 127–132.
STOC-1983-Fich #parallel- New Bounds for Parallel Prefix Circuits (FEF), pp. 100–109.
STOC-1983-FurerSS #graph #normalisation- Normal Forms for Trivalent Graphs and Graphs of Bounded Valence (MF, WS, ES), pp. 161–170.
STOC-1983-Valiant #exponential #strict- Exponential Lower Bounds for Restricted Monotone Circuits (LGV), pp. 110–117.
ICALP-1982-DurisG #automaton #on the- On Reversal-Bounded Counter Machines and on Pushdown Automata with a Bound on the Size of the Pushdown Store (PD, ZG), pp. 166–175.
ICALP-1982-GoralcikovaGK #morphism #pseudo- A Boundary of Isomorphism Completeness in the Lattice of Semigroup Pseudovarieties (AG, PG, VK), pp. 292–299.
ICALP-1982-Kalorkoti - A Lower Bound for the Formula Size of Rational Functions (KK), pp. 330–338.
LFP-1982-White #constant- Constant Time Interpretation for Shallow-bound Variables in the Presence of Mixed SPECIAL/LOCAL Declarations (JLW), pp. 196–200.
POPL-1982-ReifS #communication #distributed #variability- Unbounded Speed Variability in Distributed Communication Systems (JHR, PGS), pp. 46–56.
DAC-1982-Grass #algorithm- A depth-first branch-and-bound algorithm for optimal PLA folding (WG), pp. 133–140.
DAC-1982-Kalay #modelling #multi #parametricity- Modeling polyhedral solids bounded by multi-curved parametric surfaces (YEK), pp. 501–507.
STOC-1982-BabaiGM #graph #morphism #multi- Isomorphism of Graphs with Bounded Eigenvalue Multiplicity (LB, DYG, DMM), pp. 310–324.
STOC-1982-CookD #parallel #ram- Bounds on the Time for Parallel RAM’s to Compute Simple Functions (SAC, CD), pp. 231–233.
STOC-1982-PachlKR #algorithm #distributed #proving- A Technique for Proving Lower Bounds for Distributed Maximum-Finding Algorithms (JKP, EK, DR), pp. 378–382.
STOC-1982-RuzzoST #probability- Space-Bounded Hierarchies and Probabilistic Computations (WLR, JS, MT), pp. 215–223.
ICALP-1981-BlattnerL - Parikh-Bounded Languages (MB, ML), pp. 316–323.
ICALP-1981-Snir #proving- Proving Lower Bounds for Linar Decision Trees (MS), pp. 305–315.
ICALP-1981-Ukkonen #on the #parsing- On Size Bounds for Deterministic Parsers (EU), pp. 218–228.
SIGIR-1981-SmeatonR #algorithm #information retrieval #nearest neighbour #problem #using- The Nearest Neighbour Problem in Information Retrieval: An Algorithm Using Upperbounds (AFS, CJvR), pp. 83–87.
DAC-1981-Goldstein - Defining the bounding edges of a SynthaVision solid model (RCG), pp. 457–461.
STOC-1981-Fich #detection #problem- Lower Bounds for the Cycle Detection Problem (FEF), pp. 96–105.
STOC-1981-LiptonS - Lower Bounds for VLSI (RJL, RS), pp. 300–307.
STOC-1981-PatersonRS - Bounds on Minimax Edge Length for Complete Binary Trees (MP, WLR, LS), pp. 293–299.
STOC-1981-Simon #complexity #probability #turing machine- Space-Bounded Probabilistic Turing Machine Complexity Classes Are Closed under Complement (JS), pp. 158–167.
ICALP-1980-Back #nondeterminism #semantics- Semantics of Unbounded Nondeterminism (RJB), pp. 51–63.
ICALP-1980-LewisP #symmetry- Symmetric Space-Bounded Computation (HRL, CHP), pp. 374–384.
ICALP-1980-RaoultV #semiparsing- Optimal Unbounded Search Strategies (JCR, JV), pp. 512–530.
STOC-1980-Miller #graph #morphism #testing- Isomorphism Testing for Graphs of Bounded Genus (GLM), pp. 225–235.
STOC-1980-Mirkowska #algorithm #axiom #nondeterminism- Complete Axiomatization of Algorithmic Properties of Program Schemes with Bounded Nondeterministic Interpretations (GM), pp. 14–21.
STOC-1980-PaulSS #approach #online- An Information-Theoretic Approach to Time Bounds for On-Line Computation (WJP, JIS, JS), pp. 357–367.
DAC-1979-DysartK #automation #branch- An application of branch and bound method to automatic printed circuit board routing (LD, MK), pp. 494–499.
STOC-1979-LengauerT #trade-off- Upper and Lower Bounds on Time-Space Tradeoffs (TL, RET), pp. 262–277.
STOC-1979-Ruzzo - Tree-Size Bounded Alternation (WLR), pp. 352–359.
STOC-1979-Sipser #automaton- Lower Bounds on the Size of Sweeping Automata (MS), pp. 360–364.
VLDB-1978-ChenLT #performance #scalability- The Rebound Sorter: An Efficient Sort Engine for Large Files (TCC, VYL, CT), pp. 312–318.
ICALP-1978-DobkinM #problem- Time and Space Bounds for Selection Problems (DPD, JIM), pp. 192–204.
STOC-1978-ReddyL #quantifier- Presburger Arithmetic with Bounded Quantifier Alternation (CRR, DWL), pp. 320–325.
ICALP-1977-BookY #on the #power of- On the Computational Power of Reversal-Bounded Machines (RVB, CKY), pp. 111–119.
ICALP-1977-Brandenburg #context-sensitive grammar- The Contextsensitivity Bounds of Contextsensitive Grammars and Languages (FJB), pp. 120–134.
POPL-1977-SuzukiI #array #implementation- Implementation of an Array Bound Checker (NS, KI), pp. 132–143.
STOC-1977-Sudborough #automaton- Separating Tape Bounded Auxiliary Pushdown Automata Classes (IHS), pp. 208–217.
STOC-1977-YaoAR #problem- An Ω(n² log n) Lower Bound to the Shortest Paths Problem (ACCY, DA, RLR), pp. 11–17.
ICALP-1976-AltM #complexity #recognition- Lower Bounds for the Space Complexity of Context-Free Recognition (HA, KM), pp. 338–354.
STOC-1976-PaulTC #game studies #graph- Space Bounds for a Game of Graphs (WJP, RET, JRC), pp. 149–160.
STOC-1975-FischerMP - Lower Bounds on the Size of Boolean Formulas: Preliminary Report (MJF, ARM, MP), pp. 37–44.
STOC-1975-Galil #complexity #on the- On the Validity and Complexity of Bounded Resolution (ZG), pp. 72–82.
STOC-1975-Paul #combinator #complexity- A 2.5 n-lower Bound on the Combinatorial Complexity of Boolean Functions (WJP), pp. 27–36.
STOC-1975-Valiant #complexity #on the- On Non-linear Lower Bounds in Computational Complexity (LGV), pp. 45–53.
ICALP-1974-Monien #recursion- Characterizations of Time-Bounded Computations by Limited Primitive Recursion (BM), pp. 280–293.
STOC-1974-BookNP #context-free grammar #linear #multi- Intersections of Linear Context-Free Languages and Reversal-Bounded Multipushdown Machines (RVB, MN, MP), pp. 290–296.
STOC-1974-Kedem #multi- Combining Dimensionality and Rate of Growth Arguments for Establishing Lower Bounds on the Number of Multiplications (ZMK), pp. 334–341.
STOC-1974-Kung #algorithm #evaluation #parallel- New Algorithms and Lower Bounds for the Parallel Evaluation of Certain Rational Expressions (HTK), pp. 323–333.
SOSP-1973-GareyG #scheduling- Bounds on Scheduling with Limited Resources (MRG, RLG), pp. 104–111.
STOC-1973-Oppen - Elementary Bounds for Presburger Arithmetic (DCO), pp. 34–37.
ICALP-1972-Monien #automaton #turing machine- Relationship between Pushdown Automata and Tape-Bounded Turing Machines (BM), pp. 575–583.
DAC-1972-Lewis #detection #logic #simulation- Hazard detection by a quinary simulation of logic devices with bounded propagation delays (DWL), pp. 157–164.
STOC-1972-BlumFPRT #linear- Linear Time Bounds for Median Computations (MB, RWF, VRP, RLR, RET), pp. 119–124.
STOC-1972-CookR #random- Time-Bounded Random Access Machines (SAC, RAR), pp. 73–80.
STOC-1972-Kung #multi #performance- A Bound on the Multiplication Efficiency of Iteration (HTK), pp. 102–107.
STOC-1972-NievergeltR - Binary Search Trees of Bounded Balance (JN, EMR), pp. 137–142.
STOC-1970-Ausiello #on the- On Bounds on the Number of Steps to Compute Functions (GA), pp. 41–47.
STOC-1970-BookGW - Tape- and Time-Bounded Turing Acceptors and AFLs: Extended Abstract (RVB, SAG, BW), pp. 92–99.
STOC-1969-McCreightM - Classes of Computable Functions Defined by Bounds on Computation: Preliminary Report (EMM, ARM), pp. 79–88.