BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
model (4)
can (3)
onlin (3)
base (3)
datalog (3)

Stem beat$ (all stems)

32 papers:

STOCSTOC-2015-KorulaMZ #online #order #random
Online Submodular Welfare Maximization: Greedy Beats 1/2 in Random Order (NK, VSM, MZ), pp. 889–898.
ICALPICALP-v1-2015-WangW #algorithm #online
Two-sided Online Bipartite Matching and Vertex Cover: Beating the Greedy Algorithm (YW, SCwW), pp. 1070–1081.
CHICHI-2015-KhotLAHM #design #named #physics #process
TastyBeats: Designing Palatable Representations of Physical Activity (RAK, JL, DA, LH, F'M), pp. 2933–2942.
CHICHI-2015-OakleyLIE #gesture #named
Beats: Tapping Gestures for Smart Watches (IO, DL, MRI, AE), pp. 1237–1246.
HCIHIMI-IKC-2015-Bretschneider-Hagemes #development #low cost #mobile #multi #question #simulation
Development of a New Low Cost Driving Simulation for Assessing Multidimensional Task Loads Caused by Mobile ICT at Drivers’ Workplaces. — Objective-Fidelity Beats Equipment-Fidelity? (MBH), pp. 173–179.
CAVCAV-2015-KonnovVW #abstraction #algorithm #distributed #model checking #smt
SMT and POR Beat Counter Abstraction: Parameterized Model Checking of Threshold-Based Distributed Algorithms (IK, HV, JW), pp. 85–102.
STOCSTOC-2014-KesselheimTRV #online
Primal beats dual on online packing LPs in the random-order model (TK, KR, AT, BV), pp. 303–312.
CHICHI-2014-MottW #lens #using
Beating the bubble: using kinematic triggering in the bubble lens for acquiring small, dense targets (MEM, JOW), pp. 733–742.
KDDKDD-2014-RamakrishnanBMSKSWCVKKMZHCLHSTGKDAZFSFAGM #open source #using
“Beating the news” with EMBERS: forecasting civil unrest using open source indicators (NR, PB, SM, NS, RPK, PS, WW, JC, AV, GK, CJK, AM, LZ, TH, FC, CTL, BH, AS, KT, LG, GK, AD, CA, IZ, JF, KMS, YF, JA, DG, DM), pp. 1799–1808.
KDDKDD-2014-Ting #approximate
Streamed approximate counting of distinct elements: beating optimal batch methods (DT), pp. 442–451.
CHICHI-2013-FaresFK #question
Can we beat the mouse with MAGIC? (RF, SF, OK), pp. 1387–1390.
SIGMODSIGMOD-2012-WangLF #adaptation #framework #similarity
Can we beat the prefix filtering?: an adaptive framework for similarity join and search (JW, GL, JF), pp. 85–96.
STOCSTOC-2012-HardtR #matrix #random
Beating randomized response on incoherent matrices (MH, AR), pp. 1255–1268.
SIGMODSIGMOD-2011-TekleL #datalog #performance #query #set
More efficient datalog queries: subsumptive tabling beats magic sets (KTT, YAL), pp. 661–672.
ITiCSEITiCSE-2011-WolzMS #learning #process
Kinesthetic learning of computing via “off-beat” activities (UW, MM, MS), pp. 68–72.
ICMLICML-2011-YueJ
Beat the Mean Bandit (YY, TJ), pp. 241–248.
SACSAC-2011-BarreraV #approach #automation #summary
Automated extractive single-document summarization: beating the baselines with a new approach (AB, RV), pp. 268–269.
SOFTVISSOFTVIS-2010-JohnsonM #concurrent #execution #named #source code #visualisation
Beat: a tool for visualizing the execution of object orientated concurrent programs (PJ, SM), pp. 225–226.
CHICHI-2009-MagielseM #game studies #named #pervasive
HeartBeat: an outdoor pervasive game for children (RM, PM), pp. 2181–2184.
DACDAC-2008-LiBNPC #approach #how #implementation #power management #set
How to let instruction set processor beat ASIC for low power wireless baseband implementation: a system level approach (ML, BB, DN, LVdP, FC), pp. 345–346.
REFSQREFSQ-2008-RegnellBW #complexity #question #requirements #scalability
Can We Beat the Complexity of Very Large-Scale Requirements Engineering? (BR, RBS, KW), pp. 123–128.
STOCSTOC-2006-BarakRSW #graph
2-source dispersers for sub-polynomial entropy and Ramsey graphs beating the Frankl-Wilson construction (BB, AR, RS, AW), pp. 671–680.
ICALPICALP-2005-Wegener #combinator #optimisation
Simulated Annealing Beats Metropolis in Combinatorial Optimization (IW), pp. 589–601.
ICLPICLP-2001-GuoRR
Speculative Beats Conservative Justification (HFG, CRR, IVR), pp. 150–165.
ISSTAISSTA-1998-GodefroidHJ #analysis #model checking #monitoring #using
Model Checking Without a Model: An Analysis of the Heart-Beat Monitor of a Telephone Switch Using VeriSoft (PG, RSH, LJJ), pp. 124–133.
CHICHI-1997-Borchers #design #interactive #interface #music #named
WorldBeat: Designing a Baton-Based Interface for an Interactive Music Exhibit (JOB), pp. 131–138.
CHICHI-1996-YamaashiCNB
Beating the Limitations of Camera-Monitor Mediated Telepresence with Extra Eyes (KY, JRC, TN, WB), pp. 50–57.
ICMLICML-1995-Lang95a #problem #search-based #synthesis
Hill Climbing Beats Genetic Search on a Boolean Circuit Synthesis Problem of Koza’s (KJL), pp. 340–343.
ICLPILPS-1995-Toman #bottom-up #constraints #datalog #top-down
Top-Down beats Bottom-Up for Constraint Based Extensions of Datalog (DT), pp. 98–112.
PPDPPLILP-1994-Smith #multi #why
Why Multi-SLD Beats SLD (Even on a Uniprocessor) (DAS), pp. 40–56.
STOCSTOC-1993-WigdersonZ #bound
Expanders that beat the eigenvalue bound: explicit construction and applications (AW, DZ), pp. 245–251.
PODSPODS-1989-Ullman #bottom-up #datalog #top-down
Bottom-Up Beats Top-Down for Datalog (JDU), pp. 140–149.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.