585 papers:
- ECSA-2015-TrubianiGE #analysis #architecture #modelling #nondeterminism #performance #traceability
- Exploiting Traceability Uncertainty Between Software Architectural Models and Performance Analysis Results (CT, AG, AE), pp. 305–321.
- CASE-2015-BjorkenstamCL
- Exploiting sparsity in the discrete mechanics and optimal control method with application to human motion planning (SB, JSC, BL), pp. 769–774.
- DAC-2015-ChenMRC #execution #paradigm #performance
- Opportunistic turbo execution in NTC: exploiting the paradigm shift in performance bottlenecks (HC, DM, SR, KC), p. 6.
- DAC-2015-ThieleAE #analysis #scheduling
- Improving formal timing analysis of switched ethernet by exploiting FIFO scheduling (DT, PA, RE), p. 6.
- DAC-2015-WangH0LL #logic #memory management #named
- ProPRAM: exploiting the transparent logic resources in non-volatile memory for near data computing (YW, YH, LZ, HL, XL), p. 6.
- DAC-2015-WangJZWY15a #memory management
- Exploit imbalanced cell writes to mitigate write disturbance in dense phase change memory (RW, LJ, YZ, LW, JY), p. 6.
- DATE-2015-ConstantinWKCB
- Exploiting dynamic timing margins in microprocessors for frequency-over-scaling with instruction-based clock adjustment (JC, LW, GK, AC, AB), pp. 381–386.
- DATE-2015-KhanhSKA #dependence #design #synthesis
- Exploiting loop-array dependencies to accelerate the design space exploration with high level synthesis (PNK, AKS, AK, KMMA), pp. 157–162.
- DATE-2015-ZhangZCY #scalability
- Exploiting DRAM restore time variations in deep sub-micron scaling (XZ, YZ, BRC, JY), pp. 477–482.
- HT-2015-BledaiteR #collaboration #elicitation
- Pairwise Preferences Elicitation and Exploitation for Conversational Collaborative Filtering (LB, FR), pp. 231–236.
- SIGMOD-2015-JoglekarGPR #correlation #evaluation
- Exploiting Correlations for Expensive Predicate Evaluation (MJ, HGM, AGP, CR), pp. 1183–1198.
- SIGMOD-2015-YuSC #dependence #distributed #matrix #performance
- Exploiting Matrix Dependency for Efficient Distributed Matrix Computation (LY, YS, BC), pp. 93–105.
- VLDB-2015-RenW #graph #morphism #scalability
- Exploiting Vertex Relationships in Speeding up Subgraph Isomorphism over Large Graphs (XR, JW), pp. 617–628.
- PEPM-2015-BahrA #graph #traversal
- Generalising Tree Traversals to DAGs: Exploiting Sharing without the Pain (PB, EA), pp. 27–38.
- CHI-2015-MeutznerGK #difference
- Constructing Secure Audio CAPTCHAs by Exploiting Differences between Humans and Machines (HM, SG, DK), pp. 2335–2338.
- ECIR-2015-LiTWLR #automation #network #quality #wiki
- Automatically Assessing Wikipedia Article Quality by Exploiting Article-Editor Networks (XL, JT, TW, ZL, MdR), pp. 574–580.
- ECIR-2015-RuotsaloH #semantics
- Exploiting Semantic Annotations for Domain-Specific Entity Search (TR, EH), pp. 358–369.
- KDD-2015-ArlorioCLLP #assessment #authentication #data mining #mining
- Exploiting Data Mining for Authenticity Assessment and Protection of High-Quality Italian Wines from Piedmont (MA, JDC, GL, ML, LP), pp. 1671–1680.
- KDD-2015-Papagiannopoulou #learning #multi
- Discovering and Exploiting Deterministic Label Relationships in Multi-Label Learning (CP, GT, IT), pp. 915–924.
- KDD-2015-SuYSSKVY #feedback #graph
- Exploiting Relevance Feedback in Knowledge Graph Search (YS, SY, HS, MS, SK, MV, XY), pp. 1135–1144.
- RecSys-2015-LuC #personalisation #recommendation
- Exploiting Geo-Spatial Preference for Personalized Expert Recommendation (HL, JC), pp. 67–74.
- SIGIR-2015-LuZZW #personalisation #recommendation
- Exploiting User and Business Attributes for Personalized Business Recommendation (KL, YZ, LZ, SW), pp. 891–894.
- SIGIR-2015-SallesGRR #automation #classification #effectiveness #fault #named #random
- BROOF: Exploiting Out-of-Bag Errors, Boosting and Random Forests for Effective Automated Classification (TS, MAG, VR, LCdR), pp. 353–362.
- SIGIR-2015-ShapiraOM #information retrieval #wiki
- Exploiting Wikipedia for Information Retrieval Tasks (BS, NO, VM), pp. 1137–1140.
- SIGIR-2015-ZhangC #category theory #correlation #named #recommendation #social
- GeoSoCa: Exploiting Geographical, Social and Categorical Correlations for Point-of-Interest Recommendations (JDZ, CYC), pp. 443–452.
- SAC-2015-Dragoni #multi
- Exploiting multilinguality for creating mappings between thesauri (MD), pp. 382–387.
- ESEC-FSE-2015-ZhengMZ #capacity #constraints #identification #problem #process
- A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundancies (QZ, AM, MZ), pp. 637–648.
- HPCA-2015-PekhimenkoHCMGK #reuse
- Exploiting compressed block size as an indicator of future reuse (GP, TH, RC, OM, PBG, MAK, TCM), pp. 51–63.
- SAT-2015-NevesMJLM #satisfiability
- Exploiting Resolution-Based Representations for MaxSAT Solving (MN, RM, MJ, IL, VMM), pp. 272–286.
- VMCAI-2015-Ferrara0N #automation
- Automatic Inference of Heap Properties Exploiting Value Domains (PF, PM, MN), pp. 393–411.
- DAC-2014-AxerTED #bound #network #performance
- Exploiting Shaper Context to Improve Performance Bounds of Ethernet AVB Networks (PA, DT, RE, JD), p. 6.
- DAC-2014-DaviKS #control flow #embedded #fine-grained #performance #towards
- Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation (LD, PK, ARS), p. 6.
- DAC-2014-LiuCYLHL #fault #locality #named
- EC-Cache: Exploiting Error Locality to Optimize LDPC in NAND Flash-Based SSDs (RSL, MYC, CLY, CHL, KCH, HPL), p. 6.
- DATE-2014-0001GWKAWG #optimisation #performance #runtime
- Exploiting expendable process-margins in DRAMs for run-time performance optimization (KC, SG, CW, MK, BA, NW, KG), pp. 1–6.
- DATE-2014-AshammagariMH #configuration management #design #functional #performance #power management
- Exploiting STT-NV technology for reconfigurable, high performance, low power, and low temperature functional unit design (ARA, HM, HH), pp. 1–6.
- DATE-2014-DuanW
- Exploiting narrow-width values for improving non-volatile cache lifetime (GD, SW), pp. 1–4.
- DATE-2014-KimKKYL #design
- Coarse-grained Bubble Razor to exploit the potential of two-phase transparent latch designs (HK, DK, JJK, SY, SL), pp. 1–6.
- DATE-2014-LiuSXL #injection #programmable #thread
- Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy (ZL, WS, SX, ZL), pp. 1–6.
- DATE-2014-LuCC #correlation #memory management #performance
- Achieving efficient packet-based memory system by exploiting correlation of memory requests (TL, LC, MC), pp. 1–6.
- HT-2014-KawaseSNHN
- Exploiting the wisdom of the crowds for characterizing and connecting heterogeneous resources (RK, PS, BPN, EH, WN), pp. 56–65.
- SIGMOD-2014-MoerkotteDMNB #order
- Exploiting ordered dictionaries to efficiently construct histograms with q-error guarantees in SAP HANA (GM, DD, NM, AN, AB), pp. 361–372.
- VLDB-2014-MaeharaAIK #graph #personalisation #rank
- Computing Personalized PageRank Quickly by Exploiting Graph Structures (TM, TA, YI, KiK), pp. 1023–1034.
- CSMR-WCRE-2014-QuanteTS #c #case study #towards
- Towards recovering and exploiting domain knowledge from C code: A case study on automotive software (JQ, MT, JS), pp. 383–386.
- CHI-2014-ShiraziAHSKS #interactive
- Exploiting thermal reflection for interactive systems (ASS, YA, NH, SS, MK, AS), pp. 3483–3492.
- ICEIS-v3-2014-GonzalezAY #architecture #enterprise #evolution
- Evolving a Core Banking Enterprise Architecture — Leveraging Business Events Exploitation (BSMG, JMdÁ, JCY), pp. 181–189.
- CIKM-2014-ChanDYTZ #classification #ranking #retrieval
- Term Selection and Result Reranking for Question Retrieval by Exploiting Hierarchical Classification (WC, JD, WY, JT, XZ), pp. 141–150.
- CIKM-2014-KimHYCK #retrieval
- Exploiting Knowledge Structure for Proximity-aware Movie Retrieval Model (SK, KH, MYY, SC, SK), pp. 1847–1850.
- CIKM-2014-LiuWSM #recommendation
- Exploiting Geographical Neighborhood Characteristics for Location Recommendation (YL, WW, AS, CM), pp. 739–748.
- CIKM-2014-YamaguchiAKI #correlation #online #social
- Online User Location Inference Exploiting Spatiotemporal Correlations in Social Streams (YY, TA, HK, YI), pp. 1139–1148.
- CIKM-2014-ZhangLCZW #collaboration
- Exploit Latent Dirichlet Allocation for One-Class Collaborative Filtering (HZ, ZL, YC, XZ, SW), pp. 1991–1994.
- ECIR-2014-NainiA #feature model #learning #rank
- Exploiting Result Diversification Methods for Feature Selection in Learning to Rank (KDN, ISA), pp. 455–461.
- ICPR-2014-ChenZW #identification #learning #metric
- Relevance Metric Learning for Person Re-identification by Exploiting Global Similarities (JC, ZZ, YW), pp. 1657–1662.
- ICPR-2014-ZamalievaYD #geometry
- Exploiting Temporal Geometry for Moving Camera Background Subtraction (DZ, AY, JWD), pp. 1200–1205.
- KDD-2014-FuXGYZZ #clustering #dependence #ranking
- Exploiting geographic dependencies for real estate appraisal: a mutual perspective of ranking and clustering (YF, HX, YG, ZY, YZ, ZHZ), pp. 1047–1056.
- KDIR-2014-MeguebliKDP #ranking #social
- Exploiting Social Debates for Opinion Ranking (YM, MK, BLD, FP), pp. 250–260.
- KEOD-2014-Otero-CerdeiraR #named #ontology
- OntoPhil — Exploitation of Binding Points for Ontology Matching (LOC, FJRM, TVR, AMGR), pp. 5–15.
- RecSys-2014-PalovicsBKKF #online #recommendation
- Exploiting temporal influence in online recommendation (RP, AAB, LK, TK, EF), pp. 273–280.
- RecSys-2014-VanchinathanNBK #process #recommendation
- Explore-exploit in top-N recommender systems via Gaussian processes (HPV, IN, FDB, AK), pp. 225–232.
- RecSys-2014-YuanMZS #predict #sentiment
- Exploiting sentiment homophily for link prediction (GY, PKM, ZZ, MPS), pp. 17–24.
- SIGIR-2014-McParlaneJ #image #twitter #wiki
- Exploiting Twitter and Wikipedia for the annotation of event images (PJM, JMJ), pp. 1175–1178.
- Onward-2014-GuSBS #ide #interactive
- Capturing and Exploiting IDE Interactions (ZG, DS, ETB, ZS), pp. 83–94.
- OOPSLA-2014-VoraKG #algorithm #consistency #named #parallel #using
- ASPIRE: exploiting asynchronous parallelism in iterative algorithms using a relaxed consistency based DSM (KV, SCK, RG), pp. 861–878.
- SAC-2014-ArapovBO #named #web #wiki
- WikiNEXT: a wiki for exploiting the web of data (PA, MB, ABO), pp. 727–734.
- SAC-2014-LeeJB #design #file system #memory management #named #similarity
- DTFS: exploiting the similarity of data versions to design a write-efficient file system in phase-change memory (EL, JEJ, HB), pp. 1535–1540.
- ASPLOS-2014-ZhangRZGBXZ #correlation #detection #named
- EnCore: exploiting system environment and correlation information for misconfiguration detection (JZ, LR, XZ, NG, VB, TX, YZ), pp. 687–700.
- CC-2014-WangPFO #legacy #parallel
- Exploitation of GPUs for the Parallelisation of Probably Parallel Legacy Code (ZW, DCP, BF, MFPO), pp. 154–173.
- HPCA-2014-AgrawalAT #energy #locality #named #process
- Mosaic: Exploiting the spatial locality of process variation to reduce refresh energy in on-chip eDRAM modules (AA, AA, JT), pp. 84–95.
- HPCA-2014-PhamBEL #clustering
- Increasing TLB reach by exploiting clustering in page translations (BP, AB, YE, GHL), pp. 558–567.
- HPCA-2014-ZhengMW #energy
- Exploiting thermal energy storage to reduce data center capital and operating expenses (WZ, KM, XW), pp. 132–141.
- HPDC-2014-ChenZJ #community #locality #named #network #online #performance #social
- CBL: exploiting community based locality for efficient content search in online social networks (HC, FZ, HJ), pp. 299–304.
- HPDC-2014-MaratheHLSRS #effectiveness #execution
- Exploiting redundancy for cost-effective, time-constrained execution of HPC applications on amazon EC2 (AM, RH, DKL, BRdS, BR, MS), pp. 279–290.
- HPDC-2014-XiaHD #memory management #named
- ConCORD: easily exploiting memory content redundancy through the content-aware service command (LX, KCH, PAD), pp. 25–36.
- LCTES-2014-KochFBD #reduction #similarity
- Exploiting function similarity for code size reduction (TJKEvK, BF, PB, AD), pp. 85–94.
- ISSTA-2014-MarianiPRS #named #testing #web
- Link: exploiting the web of data to generate test inputs (LM, MP, OR, MS), pp. 373–384.
- CASE-2013-0011ZD #petri net #robust #specification
- Exploiting robustness in Petri net-based closed-loop systems to accommodate control specification changes (JL, MZ, XD), pp. 71–76.
- DAC-2013-AmaruGM #composition #logic #named #synthesis
- BDS-MAJ: a BDD-based logic synthesis tool exploiting majority logic decomposition (LGA, PEG, GDM), p. 6.
- DAC-2013-ShafiqueRAH #fault #optimisation #reliability
- Exploiting program-level masking and error propagation for constrained reliability optimization (MS, SR, PVA, JH), p. 9.
- DAC-2013-SinghDK #energy #execution #multi #optimisation #streaming
- Energy optimization by exploiting execution slacks in streaming applications on multiprocessor systems (AKS, AD, AK), p. 7.
- DAC-2013-ZhaiBS #parallel #realtime #streaming
- Exploiting just-enough parallelism when mapping streaming applications in hard real-time systems (JTZ, MB, TS), p. 8.
- DAC-2013-ZhangPFH
- Lighting the dark silicon by exploiting heterogeneity on future processors (YZ, LP, XF, YH), p. 7.
- DATE-2013-KocBKE #detection #fault
- Exploiting replicated checkpoints for soft error detection and correction (FK, KB, BK, OE), pp. 1494–1497.
- DATE-2013-RaghunathanTGM #multi #named #process
- Cherry-picking: exploiting process variations in dark-silicon homogeneous chip multi-processors (BR, YT, SG, DM), pp. 39–44.
- DATE-2013-RutzigBC #configuration management #energy #framework #multi
- A transparent and energy aware reconfigurable multiprocessor platform for simultaneous ILP and TLP exploitation (MBR, ACSB, LC), pp. 1559–1564.
- DATE-2013-YueZ #memory management #performance
- Exploiting subarrays inside a bank to improve phase change memory performance (JY, YZ), pp. 386–391.
- ICDAR-2013-PengCSPN #documentation
- Exploiting Stroke Orientation for CRF Based Binarization of Historical Documents (XP, HC, KS, RP, PN), pp. 1034–1038.
- SIGMOD-2013-OrdonezGGCBQ #algorithm #as a service #data mining #database #in the cloud #mining #relational
- Data mining algorithms as a service in the cloud exploiting relational database systems (CO, JGG, CGA, WC, VB, MSQ), pp. 1001–1004.
- VLDB-2013-AntonelliCCLT
- Exploiting the Diversity, Mass and Speed of Territorial Data by TELCO Operator for Better User Services (FA, AC, CC, RL, GT), pp. 1164–1165.
- ICFP-2013-MainlandLJ
- Exploiting vector instructions with generalized stream fusio (GM, RL, SLPJ), pp. 37–48.
- CIKM-2013-TuLLHL #information retrieval #modelling #proximity #statistics
- Exploiting proximity feature in statistical translation models for information retrieval (XT, JL, BL, TH, ML), pp. 1237–1240.
- ECIR-2013-BelemMAG #recommendation
- Exploiting Novelty and Diversity in Tag Recommendation (FB, EFM, JMA, MAG), pp. 380–391.
- ECIR-2013-EickhoffLV #retrieval
- Exploiting User Comments for Audio-Visual Content Indexing and Retrieval (CE, WL, APdV), pp. 38–49.
- ECIR-2013-McParlaneJ #automation #image
- Exploiting Time in Automatic Image Tagging (PJM, JMJ), pp. 520–531.
- ECIR-2013-SaadK #adaptation #intranet #navigation
- Exploiting Click Logs for Adaptive Intranet Navigation (SZS, UK), pp. 792–795.
- ICML-c3-2013-BalcanBM #learning #ontology
- Exploiting Ontology Structures and Unlabeled Data for Learning (NB, AB, YM), pp. 1112–1120.
- KDD-2013-BaiJS #automation #generative #set
- Exploiting user clicks for automatic seed set generation for entity matching (XB, FPJ, SHS), pp. 980–988.
- RecSys-2013-MouraoRKM #hybrid #recommendation
- Exploiting non-content preference attributes through hybrid recommendation method (FM, LCdR, JAK, WMJ), pp. 177–184.
- SEKE-2013-LiLY #fault #locality #testing
- Exploiting Weights of Test Cases to Enhance Fault Localization (S) (YL, CL, ZY), pp. 589–593.
- SIGIR-2013-BabashzadehHD #information retrieval #semantics
- Exploiting semantics for improving clinical information retrieval (AB, JH, MD), pp. 801–804.
- SIGIR-2013-DalipGCC #case study #feedback #rank #stack overflow
- Exploiting user feedback to learn to rank answers in q&a forums: a case study with stack overflow (DHD, MAG, MC, PC), pp. 543–552.
- SIGIR-2013-LiSWH #hybrid #segmentation #twitter
- Exploiting hybrid contexts for Tweet segmentation (CL, AS, JW, QH), pp. 523–532.
- SAC-2013-AccorsiSM #mining #on the #process #security
- On the exploitation of process mining for security audits: the process discovery case (RA, TS, GM), pp. 1462–1468.
- SAC-2013-CiraciV #code generation #points-to
- Exploiting points-to maps for de-/serialization code generation (SC, OV), pp. 1712–1719.
- SAC-2013-DietrichRP #clustering #detection #visual notation
- Exploiting visual appearance to cluster and detect rogue software (CJD, CR, NP), pp. 1776–1783.
- SAC-2013-HogenboomBFBJK #analysis #sentiment
- Exploiting emoticons in sentiment analysis (AH, DB, FF, MB, FdJ, UK), pp. 703–710.
- PLEASE-2013-UrliMBC #how #multi #product line #question
- How to exploit domain knowledge in Multiple Software Product Lines? (SU, SM, MBF, PC), pp. 13–16.
- CGO-2013-HuangJBJA #automation #parallel #runtime #using
- Automatically exploiting cross-invocation parallelism using runtime information (JH, TBJ, SRB, NPJ, DIA), p. 11.
- CGO-2013-YanTZYS #algorithm #fine-grained #graph #named #parallel #traversal
- Vlock: Lock virtualization mechanism for exploiting fine-grained parallelism in graph traversal algorithms (JY, GT, XZ, EY, NS), p. 10.
- HPCA-2013-YueZ #symmetry
- Accelerating write by exploiting PCM asymmetries (JY, YZ), pp. 282–293.
- ICLP-J-2013-CatB #dependence #detection #functional #generative
- Detection and exploitation of functional dependencies for model generation (BdC, MB), pp. 471–485.
- SAT-2013-DaviesB #power of #satisfiability
- Exploiting the Power of mip Solvers in maxsat (JD, FB), pp. 166–181.
- QoSA-2012-NaabS #architecture #flexibility #lifecycle
- Architectural flexibility in a software-system’s life-cycle: systematic construction and exploitation of flexibility (MN, JS), pp. 13–22.
- WICSA-ECSA-2012-GhabiE #architecture #modelling #nondeterminism #traceability
- Exploiting Traceability Uncertainty between Architectural Models and Code (AG, AE), pp. 171–180.
- DAC-2012-AthikulwongsePL #3d
- Exploiting die-to-die thermal coupling in 3D IC placement (KA, MP, SKL), pp. 741–746.
- DAC-2012-DonohooOPA #embedded #energy #mobile
- Exploiting spatiotemporal and device contexts for energy-efficient mobile embedded systems (BKD, CO, SP, CA), pp. 1278–1283.
- DAC-2012-KarakonstantisRBB #fault #on the
- On the exploitation of the inherent error resilience of wireless systems under unreliable silicon (GK, CR, CB, AB), pp. 510–515.
- DAC-2012-KongC #3d #process
- Exploiting narrow-width values for process variation-tolerant 3-D microprocessors (JK, SWC), pp. 1197–1206.
- DATE-2012-KondratyevLMW #synthesis #trade-off
- Exploiting area/delay tradeoffs in high-level synthesis (AK, LL, MM, YW), pp. 1024–1029.
- DATE-2012-PomataMTRL #design #performance
- Exploiting binary translation for fast ASIP design space exploration on FPGAs (SP, PM, GT, LR, ML), pp. 566–569.
- SIGMOD-2012-SilvaR #similarity
- Exploiting MapReduce-based similarity joins (YNS, JMR), pp. 693–696.
- VLDB-2012-LuoLMCZ #data transformation #hybrid #named
- hStorage-DB: Heterogeneity-aware Data Management to Exploit the Full Capability of Hybrid Storage Systems (TL, RL, MPM, FC, XZ), pp. 1076–1087.
- VLDB-2012-MurthyDDHMPRS #data transformation #semistructured data
- Exploiting Evidence from Unstructured Data to Enhance Master Data Management (KM, PMD, AD, RH, MKM, DP, JR, SS), pp. 1862–1873.
- VLDB-2012-SilvaP #database #metric #similarity
- Exploiting Database Similarity Joins for Metric Spaces (YNS, SP), pp. 1922–1925.
- PLDI-2012-TrippMFS #named #parallel
- JANUS: exploiting parallelism via hindsight (OT, RM, JF, MS), pp. 145–156.
- ICGT-2012-GadducciLV #approximate #infinity #modelling
- Exploiting Over- and Under-Approximations for Infinite-State Counterpart Models (FG, ALL, AV), pp. 51–65.
- CIKM-2012-MahajanRTM #algorithm #named #recommendation
- LogUCB: an explore-exploit algorithm for comments recommendation (DKM, RR, CT, AM), pp. 6–15.
- CIKM-2012-SudituF #adaptation #feedback #trade-off
- Iterative relevance feedback with adaptive exploration/exploitation trade-off (NS, FF), pp. 1323–1331.
- CIKM-2012-YaoS #learning #relational #ubiquitous
- Exploiting latent relevance for relational learning of ubiquitous things (LY, QZS), pp. 1547–1551.
- CIKM-2012-ZhengFY #concept
- Exploiting concept hierarchy for result diversification (WZ, HF, CY), pp. 1844–1848.
- CIKM-2012-ZhuCCXT #classification #information management #mobile
- Exploiting enriched contextual information for mobile app classification (HZ, HC, EC, HX, JT), pp. 1617–1621.
- ECIR-2012-Martinez-AlvarezYR #automation #classification #documentation
- Semi-automatic Document Classification: Exploiting Document Difficulty (MMA, SY, TR), pp. 468–471.
- ICML-2012-AvnerMS #multi
- Decoupling Exploration and Exploitation in Multi-Armed Bandits (OA, SM, OS), p. 145.
- ICML-2012-DesautelsKB #optimisation #process #trade-off
- Parallelizing Exploration-Exploitation Tradeoffs with Gaussian Process Bandit Optimization (TD, AK, JWB), p. 109.
- ICML-2012-OuyangG #probability
- Stochastic Smoothing for Nonsmooth Minimizations: Accelerating SGD by Exploiting Structure (HO, AGG), p. 198.
- ICPR-2012-ArthMS #locality #mobile
- Exploiting sensors on mobile phones to improve wide-area localization (CA, AM, DS), pp. 2152–2156.
- ICPR-2012-AskKA #equation #performance #polynomial #symmetry
- Exploiting p-fold symmetries for faster polynomial equation solving (EA, YK, KÅ), pp. 3232–3235.
- ICPR-2012-ChenL #identification
- Exploiting ruling line artifacts in writer identification (JC, DPL), pp. 3737–3740.
- ICPR-2012-OrfanidisT #subclass
- Exploiting subclass information in Support Vector Machines (GO, AT), pp. 1076–1079.
- ICPR-2012-SinghA #estimation
- Exploiting ramp structures for improving optical flow estimation (AS, NA), pp. 2504–2507.
- ICPR-2012-TanK #identification #image
- Human identification from at-a-distance images by simultaneously exploiting iris and periocular features (CWT, AK), pp. 553–556.
- KDD-2012-0002L #named #recommendation
- RecMax: exploiting recommender systems for fun and profit (AG, LVSL), pp. 1294–1302.
- KDIR-2012-LuongHGH #network #recommendation #social
- Exploiting Social Networks for Publication Venue Recommendations (HPL, TH, SG, KH), pp. 239–245.
- KMIS-2012-LiAB #collaboration #experience #reuse
- Facilitating Experience Sharing in Groups — Collaborative Trace Reuse and Exploitation (QL, MHA, JPAB), pp. 21–30.
- MLDM-2012-PirasGP #approach #image #retrieval
- Enhancing Image Retrieval by an Exploration-Exploitation Approach (LP, GG, RP), pp. 355–365.
- RecSys-2012-KarimiFNS #learning #matrix #recommendation
- Exploiting the characteristics of matrix factorization for active learning in recommender systems (RK, CF, AN, LST), pp. 317–320.
- RecSys-2012-NoiaMOR #modelling #recommendation #web
- Exploiting the web of data in model-based recommender systems (TDN, RM, VCO, DR), pp. 253–256.
- SIGIR-2012-KahngL #graph #rdf
- Exploiting paths for entity search in RDF graphs (MK, SgL), pp. 1027–1028.
- SIGIR-2012-LimsopathamMMO #dependence
- Exploiting term dependence while handling negation in medical search (NL, CM, RM, IO), pp. 1065–1066.
- SIGIR-2012-Tran #modelling #retrieval #social #social media #topic
- Exploiting temporal topic models in social media retrieval (TAT), p. 999.
- OOPSLA-2012-WuZSJGS #behaviour #correlation #predict
- Exploiting inter-sequence correlations for program behavior prediction (BW, ZZ, XS, YJ, YG, RS), pp. 851–866.
- SAC-2012-AccorsiS #consistency #mining #on the #process #security
- On the exploitation of process mining for security audits: the conformance checking case (RA, TS), pp. 1709–1716.
- SAC-2012-BaralisCJF #multi #summary
- Multi-document summarization exploiting frequent itemsets (EB, LC, SJ, AF), pp. 782–786.
- SAC-2012-HuangHYY #algorithm #approximate #correlation #network
- An in-network approximate data gathering algorithm exploiting spatial correlation in wireless sensor networks (CCH, JLH, JAY, LYY), pp. 550–555.
- SAC-2012-MascardiL #algorithm #named #ontology
- BOwL: exploiting Boolean operators and lesk algorithm for linking ontologies (VM, AL), pp. 398–400.
- SAC-2012-TangJ #analysis #precise
- Exploiting regularity of user-defined types to improve precision of program analyses (XT, JJ), pp. 1743–1750.
- SAC-2012-TinelliCSD #automation #compilation #composition #sql #standard
- Knowledge compilation for automated Team Composition exploiting standard SQL (ET, SC, EDS, FMD), pp. 1680–1685.
- ICSE-2012-Gu #fine-grained #ide #interactive
- Capturing and exploiting fine-grained IDE interactions (ZG), pp. 1630–1631.
- ASPLOS-2012-HariANR #equivalence #fault #named
- Relyzer: exploiting application-level fault equivalence to analyze application resiliency to transient faults (SKSH, SVA, HN, PR), pp. 123–134.
- CC-2012-UnkuleSQ #automation #gpu #kernel #locality #thread
- Automatic Restructuring of GPU Kernels for Exploiting Inter-thread Data Locality (SU, CS, AQ), pp. 21–40.
- ISMM-2012-Nasre #analysis #constraints #graph #performance #points-to
- Exploiting the structure of the constraint graph for efficient points-to analysis (RN), pp. 121–132.
- SAT-2012-LiWL #satisfiability
- Exploiting Historical Relationships of Clauses and Variables in Local Search for Satisfiability — (Poster Presentation) (CML, WW, YL), pp. 479–480.
- DAC-2011-KoseF #algorithm #analysis #information retrieval #locality #performance
- Fast algorithms for IR voltage drop analysis exploiting locality (SK, EGF), pp. 996–1001.
- DATE-2011-StranoGLFGB #architecture #scalability #self
- Exploiting Network-on-Chip structural redundancy for a cooperative and scalable built-in self-test architecture (AS, CGR, DL, MF, MEG, DB), pp. 661–666.
- DATE-2011-WangZHLL #memory management
- Flex memory: Exploiting and managing abundant off-chip optical bandwidth (YW, LZ, YH, HL, XL), pp. 968–973.
- ICDAR-2011-GuichardCC #documentation #word
- Exploiting Collection Level for Improving Assisted Handwritten Word Transcription of Historical Documents (LG, JC, BC), pp. 875–879.
- VLDB-2011-EltabakhTOGKM #flexibility #named
- CoHadoop: Flexible Data Placement and Its Exploitation in Hadoop (MYE, YT, FÖ, RG, AK, JM), pp. 575–585.
- VLDB-2012-RohPKSL11 #optimisation #parallel
- B+-tree Index Optimization by Exploiting Internal Parallelism of Flash-based Solid State Drives (HR, SP, SK, MS, SWL), pp. 286–297.
- ICSM-2011-PirzadehHS #analysis #execution #mining
- Exploiting text mining techniques in the analysis of execution traces (HP, AHL, MS), pp. 223–232.
- PLDI-2011-KulkarniNPSP #commutative
- Exploiting the commutativity lattice (MK, DN, DP, XS, KP), pp. 542–555.
- PLDI-2011-UdupaRT #dependence #named #parallel
- ALTER: exploiting breakable dependences for parallelization (AU, KR, WT), pp. 480–491.
- CHI-2011-WilliamsYPMMI #3d #interactive #multi #named
- TZee: exploiting the lighting properties of multi-touch tabletops for tangible 3d interactions (CW, XDY, GAP, JMU, AM, PI), pp. 1363–1372.
- HCI-ITE-2011-NebeKJF #interactive #multi #using
- Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction (KN, FK, HJ, HF), pp. 100–109.
- HCI-ITE-2011-ZhangAR #human-computer #interactive #multi
- Developing and Exploiting a Multilingual Grammar for Human-Computer Interaction (XZ, RA, DFR), pp. 396–405.
- HCI-UA-2011-OlivierWP #game studies #music #named #recommendation
- MusicTagger: Exploiting User Generated Game Data for Music Recommendation (HO, MW, NP), pp. 678–687.
- CIKM-2011-ChiangNTD #network #predict
- Exploiting longer cycles for link prediction in signed networks (KYC, NN, AT, ISD), pp. 1157–1162.
- CIKM-2011-WangYS #documentation #feedback
- Relevance feedback exploiting query-specific document manifolds (CW, EY, MS), pp. 1957–1960.
- ECIR-2011-DuanZ #concurrent #modelling #retrieval #thread
- Exploiting Thread Structures to Improve Smoothing of Language Models for Forum Post Retrieval (HD, CZ), pp. 350–361.
- ECIR-2011-HofmannWR #learning #online #rank
- Balancing Exploration and Exploitation in Learning to Rank Online (KH, SW, MdR), pp. 251–263.
- KDD-2011-GundechaBL #network #privacy #social
- Exploiting vulnerability to secure user privacy on a social networking site (PG, GB, HL), pp. 511–519.
- KDD-2011-ScellatoNM #network #predict #social
- Exploiting place features in link prediction on location-based social networks (SS, AN, CM), pp. 1046–1054.
- KDD-2011-ValizadeganJW #learning #multi #predict
- Learning to trade off between exploration and exploitation in multiclass bandit prediction (HV, RJ, SW), pp. 204–212.
- KEOD-2011-AarnioSK #industrial #lightweight #semantics
- A Lightweight Element Matching Method for Industrial Terminology Harmonization — Exploiting Minimal Semantics based on Naming Conventions (PA, SS, KK), pp. 390–395.
- KEOD-2011-HusakovaC #multi #ontology #recommendation #simulation
- Exploitation of Ontology-based Recommendation System with Multi-agent Simulations (MH, PC), pp. 433–436.
- SEKE-2011-FarahatE #fault #performance
- Exploiting Computational Redundancy for Efficient Recovery from Soft Errors in Sensor Nodes (AF, AE), pp. 619–624.
- SEKE-2011-GrabnerMBG #aspect-oriented #documentation #legacy #semantics
- Exploiting semantic aspects to evolve a text-based search on a legacy document management system (JG, AM, MB, TG), pp. 392–397.
- SIGIR-2011-BelemMPAG #multi #recommendation
- Associative tag recommendation exploiting multiple textual features (FB, EFM, TP, JMA, MAG), pp. 1033–1042.
- SIGIR-2011-LiLS #recommendation #social
- Exploiting endorsement information and social influence for item recommendation (CTL, SDL, MKS), pp. 1131–1132.
- SIGIR-2011-YeYLL #collaboration #recommendation
- Exploiting geographical influence for collaborative point-of-interest recommendation (MY, PY, WCL, DLL), pp. 325–334.
- OOPSLA-2011-PylaRV #parallel
- Exploiting coarse-grain speculative parallelism (HKP, CJR, SV), pp. 555–574.
- SAC-2011-LiuZ #memory management #predict #realtime
- Exploiting time predictable two-level scratchpad memory for real-time systems (YL, WZ), pp. 395–396.
- SAC-2011-RathgebUW #recognition
- Shifting score fusion: on exploiting shifting variation in iris recognition (CR, AU, PW), pp. 3–7.
- ESEC-FSE-2011-ClementsEIMM #architecture #requirements #testing
- Exploiting software architecture to support requirements satisfaction testing (PCC, MJEC, PI, IM, EM), pp. 484–487.
- ICSE-2011-Bacchelli #email #re-engineering
- Exploring, exposing, and exploiting emails to include human factors in software engineering (AB), pp. 1074–1077.
- ICSE-2011-SoffaWM #debugging #hardware #testing
- Exploiting hardware advances for software testing and debugging (MLS, KRW, JM), pp. 888–891.
- LDTA-2011-DominguezP #algebra
- Exploiting algebra/coalgebra duality for program fusion extensions (FD, AP), p. 6.
- HPCA-2011-ChenLZ #memory management #parallel #performance
- Essential roles of exploiting internal parallelism of flash memory based solid state drives in high-speed data processing (FC, RL, XZ), pp. 266–277.
- HPCA-2011-RobatmiliGBK #distributed
- Exploiting criticality to reduce bottlenecks in distributed uniprocessors (BR, MSSG, DB, SWK), pp. 431–442.
- CADE-2011-DeharbeFMP #problem #smt #symmetry
- Exploiting Symmetry in SMT Problems (DD, PF, SM, BWP), pp. 222–236.
- ICST-2011-FraserZ #generative #testing
- Exploiting Common Object Usage in Test Case Generation (GF, AZ), pp. 80–89.
- DAC-2010-ChippaMRRC #algorithm #design #energy #hardware #performance #scalability
- Scalable effort hardware design: exploiting algorithmic resilience for energy efficiency (VKC, DM, AR, KR, STC), pp. 555–560.
- DAC-2010-NovoLFRC #data flow #finite #precise
- Exploiting finite precision information to guide data-flow mapping (DN, ML, RF, PR, FC), pp. 248–253.
- DAC-2010-YinL #low cost #monitoring
- Exploiting reconfigurability for low-cost in-situ test and monitoring of digital PLLs (LY, PL), pp. 929–934.
- DATE-2010-GellertPZFVS #architecture #design #energy #predict #smt
- Energy-performance design space exploration in SMT architectures exploiting selective load value predictions (AG, GP, VZ, AF, LNV, CS), pp. 271–274.
- DATE-2010-JunYC #library #multi #network #synthesis
- Exploiting multiple switch libraries in topology synthesis of on-chip interconnection network (MJ, SY, EYC), pp. 1390–1395.
- DATE-2010-KimKL #named #reliability #similarity
- SimTag: Exploiting tag bits similarity to improve the reliability of the data caches (JK, SK, YL), pp. 941–944.
- DATE-2010-LiSC #logic #manycore
- Exploiting local logic structures to optimize multi-core SoC floorplanning (CHL, SS, LPC), pp. 1291–1296.
- DATE-2010-RoxE #correlation
- Exploiting inter-event stream correlations between output event streams of non-preemptively scheduled tasks (JR, RE), pp. 226–231.
- VLDB-2010-ChengLYLLX #database #effectiveness #scalability
- Explore or Exploit? Effective Strategies for Disambiguating Large Databases (RC, EL, XSY, MHL, XL, XX), pp. 815–825.
- VLDB-2010-GulhaneRST #information management #web
- Exploiting Content Redundancy for Web Information Extraction (PG, RR, SHS, AT), pp. 578–587.
- VLDB-2010-TzoumasDJ #clustering #correlation #query
- Sharing-Aware Horizontal Partitioning for Exploiting Correlations During Query Processing (KT, AD, CSJ), pp. 542–553.
- PLDI-2010-MightSH #functional #object-oriented #program analysis
- Resolving and exploiting the k-CFA paradox: illuminating functional vs. object-oriented program analysis (MM, YS, DVH), pp. 305–315.
- CHI-2010-KangFK #social
- Exploiting knowledge-in-the-head and knowledge-in-the-social-web: effects of domain expertise on exploratory search in individual and social search environments (RK, WTF, TGK), pp. 393–402.
- CIKM-2010-BelemMAGP #metric #quality #recommendation #web
- Exploiting co-occurrence and information quality metrics to recommend tags in web 2.0 applications (FMB, EFM, JMdA, MAG, GLP), pp. 1793–1796.
- CIKM-2010-BroderGJMMW #web
- Exploiting site-level information to improve web search (AZB, EG, VJ, GM, DM, JW), pp. 1393–1396.
- CIKM-2010-DemartiniMBZ #named
- TAER: time-aware entity retrieval-exploiting the past to find relevant entities in news articles (GD, MMSM, RB, HZ), pp. 1517–1520.
- CIKM-2010-JensenS #classification
- Exploiting sequential relationships for familial classification (LSJ, JGS), pp. 1901–1904.
- CIKM-2010-KarimzadehganZ #feedback #interactive #trade-off
- Exploration-exploitation tradeoff in interactive relevance feedback (MK, CZ), pp. 1397–1400.
- CIKM-2010-KimKLB #interpreter #performance #semantics
- Efficient wikipedia-based semantic interpreter by exploiting top-k processing (JWK, AK, DL, SB), pp. 1813–1816.
- CIKM-2010-LiSDX #multi #summary #topic
- Exploiting novelty, coverage and balance for topic-focused multi-document summarization (XL, YDS, LD, CYX), pp. 1765–1768.
- CIKM-2010-LiuCXD #collaboration #personalisation #ranking
- Exploiting user interests for collaborative filtering: interests expansion via personalized ranking (QL, EC, HX, CHQD), pp. 1697–1700.
- CIKM-2010-Otterbacher #gender #metadata
- Inferring gender of movie reviewers: exploiting writing style, content and metadata (JO), pp. 369–378.
- ECIR-2010-RudinacLH #consistency #query #retrieval
- Exploiting Result Consistency to Select Query Expansions for Spoken Content Retrieval (SR, ML, AH), pp. 645–648.
- ICML-2010-McAuleyC #performance
- Exploiting Data-Independence for Fast Belief-Propagation (JJM, TSC), pp. 767–774.
- ICPR-2010-CadavidA #automation #detection #modelling #using #visual notation
- Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines (SC, MAM), pp. 1714–1717.
- ICPR-2010-LiZXCG #analysis #documentation #multi #sentiment
- Exploiting Combined Multi-level Model for Document Sentiment Analysis (SL, HZ, WX, GC, JG), pp. 4141–4144.
- ICPR-2010-PapadopoulosMKS #analysis #approach #image #learning #semantics #statistics
- A Statistical Learning Approach to Spatial Context Exploitation for Semantic Image Analysis (GTP, VM, IK, MGS), pp. 3138–3142.
- ICPR-2010-SimeoneMT
- Exploiting System Knowledge to Improve ECOC Reject Rules (PS, CM, FT), pp. 4340–4343.
- KDD-2010-BozorgiSSV #heuristic #learning #predict
- Beyond heuristics: learning to classify vulnerabilities and predict exploits (MB, LKS, SS, GMV), pp. 105–114.
- KDD-2010-LiWZCMJ #performance
- Exploitation and exploration in a performance based contextual advertising system (WL, XW, RZ, YC, JM, RJ), pp. 27–36.
- KDD-2010-ZhangZ #dependence #learning #multi
- Multi-label learning by exploiting label dependency (MLZ, KZ), pp. 999–1008.
- KDIR-2010-KumarVSV #clustering #documentation #n-gram #wiki
- Exploiting N-gram Importance and Wikipedia based Additional Knowledge for Improvements in GAAC based Document Clustering (NK, VVBV, KS, VV), pp. 182–187.
- SIGIR-2010-BillerbeckDFIK #retrieval
- Exploiting click-through data for entity retrieval (BB, GD, CSF, TI, RK), pp. 803–804.
- SIGIR-2010-CondeVC #social #web
- Inferring user intent in web search by exploiting social annotations (JMC, DV, PC), pp. 827–828.
- SIGIR-2010-SvoreKK #how #proximity #retrieval #web
- How good is a span of terms?: exploiting proximity to improve web retrieval (KMS, PHK, NK), pp. 154–161.
- SAC-2010-GehlertBKMPP #adaptation #verification
- Exploiting assumption-based verification for the adaptation of service-based applications (AG, AB, RK, AM, MP, KP), pp. 2430–2437.
- SAC-2010-SykesHMK #adaptation #architecture #non-functional #self
- Exploiting non-functional preferences in architectural adaptation for self-managed systems (DS, WH, JM, JK), pp. 431–438.
- ICSE-2010-BegelKZ #named #repository
- Codebook: discovering and exploiting relationships in software repositories (AB, YPK, TZ), pp. 125–134.
- CGO-2010-JiangZTMGSG #behaviour #correlation #predict #statistics
- Exploiting statistical correlations for proactive prediction of program behaviors (YJ, EZZ, KT, FM, MG, XS, YG), pp. 248–256.
- CGO-2010-KochBF #code generation
- Integrated instruction selection and register allocation for compact code generation exploiting freeform mixing of 16- and 32-bit instructions (TJKEvK, IB, BF), pp. 180–189.
- HPCA-2010-WooSLL #3d #architecture #memory management
- An optimized 3D-stacked memory architecture by exploiting excessive, high-density TSV bandwidth (DHW, NHS, DLL, HHSL), pp. 1–12.
- ISSTA-2010-SantelicesH #dependence #execution #multi #scalability #symbolic computation
- Exploiting program dependencies for scalable multiple-path symbolic execution (RAS, MJH), pp. 195–206.
- SAT-2010-GoultiaevaB
- Exploiting Circuit Representations in QBF Solving (AG, FB), pp. 333–339.
- DAC-2009-Whipp #architecture #process #verification
- Exploiting “architecture for verification” to streamline the verification process (DW), pp. 212–215.
- DATE-2009-BaeMV #scheduling
- Exploiting clock skew scheduling for FPGA (SB, PM, NV), pp. 1524–1529.
- DATE-2009-CabodiCGMNQ #constraints #model checking #verification
- Speeding up model checking by exploiting explicit and hidden verification constraints (GC, PC, LG, MM, SN, SQ), pp. 1686–1691.
- DATE-2009-Diaz-MadridNHDR #pipes and filters #reduction
- Power reduction of a 12-bit 40-MS/s pipeline ADC exploiting partial amplifier sharing (JÁDM, HN, HH, GDA, RRM), pp. 369–373.
- DATE-2009-PigorschS
- Exploiting structure in an AIG based QBF solver (FP, CS), pp. 1596–1601.
- DATE-2009-WangHZC #design
- Exploiting narrow-width values for thermal-aware register file designs (SW, JSH, SGZ, SWC), pp. 1422–1427.
- DATE-2009-YangO #adaptation #towards
- Towards no-cost adaptive MPSoC static schedules through exploitation of logical-to-physical core mapping latitude (CY, AO), pp. 63–68.
- ICDAR-2009-IbrahimKKAG #analysis #dependence #online #using #verification
- On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
- SIGMOD-2009-BabuGM #learning #nondeterminism #scalability
- Large-scale uncertainty management systems: learning and exploiting your data (SB, SG, KM), pp. 995–998.
- SIGMOD-2009-Chen #named #performance
- FlashLogging: exploiting flash devices for synchronous logging performance (SC), pp. 73–86.
- SIGMOD-2009-ChenKM #analysis #multi
- Exploiting context analysis for combining multiple entity resolution systems (ZC, DVK, SM), pp. 207–218.
- VLDB-2009-KimuraHRMZ #correlation #dependence #functional
- Correlation Maps: A Compressed Access Method for Exploiting Soft Functional Dependencies (HK, GH, AR, SM, SBZ), pp. 1222–1233.
- HIMI-DIE-2009-ChenT
- Exploiting Browsing History for Exploratory Search (WLC, WGT), pp. 355–364.
- ICEIS-AIDSS-2009-TinelliCRNSD #semantics #sql #standard
- I.M.P.A.K.T.: An Innovative Semantic-based Skill Management System Exploiting Standard SQL (ET, AC, MR, TDN, EDS, FMD), pp. 224–229.
- CIKM-2009-AltingovdeOU #query #web
- Exploiting query views for static index pruning in web search engines (ISA, RO, ÖU), pp. 1951–1954.
- CIKM-2009-HuSZC #clustering #semantics #using
- Exploiting internal and external semantics for the clustering of short texts using world knowledge (XH, NS, CZ, TSC), pp. 919–928.
- CIKM-2009-LuCP #clustering #network #social #web
- Exploit the tripartite network of social tagging for web clustering (CL, XC, EKP), pp. 1545–1548.
- CIKM-2009-ShenWCSYCL #classification
- Exploiting term relationship to boost text classification (DS, JW, BC, JTS, QY, ZC, YL), pp. 1637–1640.
- CIKM-2009-ZhangJZZ #bidirectional #detection
- Exploiting bidirectional links: making spamming detection easier (YZ, QJ, LZ, YZ), pp. 1839–1842.
- ECIR-2009-AbbasiCNPS
- Exploiting Flickr Tags and Groups for Finding Landmark Photos (RA, SC, WN, RP, SS), pp. 654–661.
- ECIR-2009-TollariDMFAG #concept #image #retrieval #visual notation
- Exploiting Visual Concepts to Improve Text-Based Image Retrieval (ST, MD, CM, AFT, MRA, PG), pp. 701–705.
- ECIR-2009-TsagkiasLR #predict
- Exploiting Surface Features for the Prediction of Podcast Preference (MT, ML, MdR), pp. 473–484.
- ICML-2009-ChoiCW #markov #modelling #multi
- Exploiting sparse Markov and covariance structure in multiresolution models (MJC, VC, ASW), pp. 177–184.
- KDD-2009-HuZLPZ #clustering #documentation #wiki
- Exploiting Wikipedia as external knowledge for document clustering (XH, XZ, CL, EKP, XZ), pp. 389–396.
- RecSys-2009-ShiLH #collaboration #similarity
- Exploiting user similarity based on rated-item pools for improved user-based collaborative filtering (YS, ML, AH), pp. 125–132.
- SEKE-2009-RuhelaR #clustering #documentation #web
- Improving Text Document Clustering by Exploiting Open Web Directory (GR, PKR), pp. 87–92.
- SIGIR-2009-Chen #memory management #retrieval
- Exploiting memory cues in personal lifelog retrieval (YC), p. 856.
- SIGIR-2009-JiZLZXCSZ #ranking
- Global ranking by exploiting user clicks (SJ, KZ, CL, ZZ, GRX, OC, GS, HZ), pp. 35–42.
- SIGIR-2009-Kanhabua #documentation #retrieval
- Exploiting temporal information in retrieval of archived documents (NK), p. 848.
- SIGIR-2009-MiletteSRH #social
- Exploiting social context for expertise propagation (GPM, MKS, KR, RH), p. 835.
- SIGIR-2009-ZhuWCT #information retrieval #modelling #nondeterminism #risk management
- Risky business: modeling and exploiting uncertainty in information retrieval (JZ, JW, IJC, MJT), pp. 99–106.
- QAPL-2009-MuraPPR #markov
- Exploiting non-Markovian Bio-Processes (IM, DP, CP, AR), pp. 83–98.
- RE-2009-SalinesiDDMR #constraints #finite #modelling #product line #programming
- Exploiting the Versatility of Constraint Programming over Finite Domains to Integrate Product Line Models (CS, DD, OD, RM, CR), pp. 375–376.
- SAC-2009-ArbelaezH #dependence
- Exploiting weak dependencies in tree-based search (AA, YH), pp. 1385–1391.
- SAC-2009-HendersonCL #performance
- Exploiting join cardinality for faster hash joins (MH, BC, RL), pp. 1549–1554.
- SAC-2009-LiuZ #distance #performance #stack #worst-case
- Exploiting stack distance to estimate worst-case data cache performance (YL, WZ), pp. 1979–1983.
- SPLC-2009-BabarIP #agile #architecture #case study #development #industrial #product line
- An industrial case of exploiting product line architectures in agile software development (MAB, TI, MP), pp. 171–179.
- CC-2009-GaoLXN #concurrent #predict #recursion #source code #thread
- Exploiting Speculative TLP in Recursive Programs by Dynamic Thread Prediction (LG, LL, JX, TFN), pp. 78–93.
- CC-2009-KnightsMSMD #hardware #optimisation
- Blind Optimization for Exploiting Hardware Features (DK, TM, PFS, MCM, AD), pp. 251–265.
- PPoPP-2009-HuangEHC #compilation #optimisation #source code
- Exploiting global optimizations for openmp programs in the openuh compiler (LH, DE, MWH, BMC), pp. 289–290.
- SOSP-2009-DobrescuEACFIKMR #named #parallel
- RouteBricks: exploiting parallelism to scale software routers (MD, NE, KJA, BGC, KRF, GI, AK, MM, SR), pp. 15–28.
- SAT-2009-LiMMP #satisfiability
- Exploiting Cycle Structures in Max-SAT (CML, FM, NOM, JP), pp. 467–480.
- VMCAI-2009-TreflerW #architecture #reduction #symmetry
- Extending Symmetry Reduction by Exploiting System Architecture (RJT, TW), pp. 320–334.
- CASE-2008-NummelaUSK #case study #industrial
- Exploiting passive UHF RFID in paper industry — Case study: End user (JN, LU, LS, MK), pp. 436–441.
- DAC-2008-KwonYHMCE #approach #memory management #parallel
- A practical approach of memory access parallelization to exploit multiple off-chip DDR memories (WCK, SY, SMH, BM, KMC, SKE), pp. 447–452.
- DATE-2008-HongYBCEK #bias #runtime #scalability
- Dynamic Voltage Scaling of Supply and Body Bias Exploiting Software Runtime Distribution (SH, SY, BB, KMC, SKE, TK), pp. 242–247.
- DATE-2008-SingheeSR #correlation #kernel #performance #statistics
- Exploiting Correlation Kernels for Efficient Handling of Intra-Die Spatial Correlation, with Application to Statistical Timing (AS, SS, RAR), pp. 856–861.
- VLDB-2008-SenDG #correlation #database #probability
- Exploiting shared correlations in probabilistic databases (PS, AD, LG), pp. 809–820.
- ITiCSE-2008-ThorntonE #data flow #data type #online
- A data type to exploit online data sources (MT, SHE), pp. 114–118.
- ICPC-2008-RothlisbergerGN #ide #runtime
- Exploiting Runtime Information in the IDE (DR, OG, ON), pp. 63–72.
- SCAM-2008-SingerK
- Exploiting the Correspondence between Micro Patterns and Class Names (JS, CCK), pp. 67–76.
- GT-VMT-2006-Lanese08 #graph transformation
- Exploiting User-definable Synchronizations in Graph Transformation (IL), pp. 27–38.
- AdaEurope-2008-CarnevaliGV #formal method #petri net
- A Tailored V-Model Exploiting the Theory of Preemptive Time Petri Nets (LC, LG, EV), pp. 87–100.
- ICEIS-DISI-2008-NebelingRS #content management #migration #repository #standard
- Migration between Content Management Systems — Exploiting the JSR-170 Content Repository Standard (MN, GR, LS), pp. 240–245.
- CIKM-2008-Aguilar-SaboritJSM #memory management #performance #pipes and filters
- Exploiting pipeline interruptions for efficient memory allocation (JAS, MJ, DS, VMM), pp. 639–648.
- CIKM-2008-AhmadABM #database #interactive #modelling #query
- Modeling and exploiting query interactions in database systems (MA, AA, SB, KM), pp. 183–192.
- CIKM-2008-FaruquieNCS #detection #information management
- Exploiting context to detect sensitive information in call center conversations (TAF, SN, AC, LVS), pp. 1513–1514.
- CIKM-2008-RochaMPGM #classification
- Exploiting temporal contexts in text classification (LCdR, FM, AMP, MAG, WMJ), pp. 243–252.
- ECIR-2008-AlonsoZ #information retrieval #semantics
- Exploiting Semantic Annotations in Information Retrieval (OA, HZ), p. 712.
- ECIR-2008-PandeyL #case study #comparative #information retrieval
- Exploiting Session Context for Information Retrieval — A Comparative Study (GP, JL), pp. 652–657.
- ECIR-2008-PehcevskiVT #locality #ranking #wiki
- Exploiting Locality of Wikipedia Links in Entity Ranking (JP, AMV, JAT), pp. 258–269.
- ICPR-2008-LiaoJ #learning #network #parametricity #semistructured data
- Exploiting qualitative domain knowledge for learning Bayesian network parameters with incomplete data (WL, QJ), pp. 1–4.
- RecSys-2008-Baltrunas #information management #recommendation
- Exploiting contextual information in recommender systems (LB), pp. 295–298.
- SEKE-2008-GoaerOTS #architecture #evolution
- Evolution Shelf: Exploiting Evolution Styles within Software Architectures (OLG, MCO, DT, AS), pp. 387–392.
- SIGIR-2008-BanchsK #information retrieval
- Exploiting MDS Projections for Cross-language IR (REB, AK), pp. 863–864.
- SIGIR-2008-JiangA #analysis #categorisation
- Exploiting subjectivity analysis in blogs to improve political leaning categorization (MJ, SA), pp. 725–726.
- SIGIR-2008-NaKKL #information retrieval #proximity
- Exploiting proximity feature in bigram language model for information retrieval (SHN, JK, ISK, JHL), pp. 821–822.
- SIGIR-2008-SerdyukovRH #dependence
- Exploiting sequential dependencies for expert finding (PS, HR, DH), pp. 795–796.
- SIGIR-2008-Winter #information retrieval #peer-to-peer #xml
- Exploiting XML structure to improve information retrieval in peer-to-peer systems (JW), p. 890.
- SIGIR-2008-ZimmerTW #approximate #correlation #information management #keyword
- Exploiting correlated keywords to improve approximate information filtering (CZ, CT, GW), pp. 323–330.
- SAC-2008-AtoofianB #behaviour #embedded #latency #memory management
- Exploiting program cyclic behavior to reduce memory latency in embedded processors (EA, AB), pp. 1482–1486.
- SAC-2008-LobatoBNTP #middleware #semantics
- Exploiting semantic information on a message exchanging middleware (DCL, MQB, RBN, CACT, MdGCP), pp. 514–515.
- SPLC-2008-KumarBC #identification #variability
- Identifying and Exploiting the Similarities between Rationale Management and Variability Management (AKT, BB, OC), pp. 99–108.
- ASPLOS-2008-BallapuramSL #behaviour #multi #semantics
- Exploiting access semantics and program behavior to reduce snoop power in chip multiprocessors (CSB, AS, HHSL), pp. 60–69.
- HPCA-2008-SubramaniamPL #dependence #memory management #named #predict #smt
- PEEP: Exploiting predictability of memory dependences in SMT processors (SS, MP, GHL), pp. 137–148.
- HPDC-2008-Al-KiswanyGSYR #distributed #named
- StoreGPU: exploiting graphics processing units to accelerate distributed storage systems (SAK, AG, ESN, GY, MR), pp. 165–174.
- ICLP-2008-BonattiCOS #privacy #security #trust
- Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
- ECSA-2007-NavaCD #architecture #design #process #tool support
- Processes for Creating and Exploiting Architectural Design Decisions with Tool Support (FN, RC, JCD), pp. 321–324.
- ASE-2007-DwyerP #cost analysis #dynamic analysis #static analysis #type system
- Residual dynamic typestate analysis exploiting static analysis: results to reformulate and reduce the cost of dynamic analysis (MBD, RP), pp. 124–133.
- DATE-2007-KraemerLAM #interactive #parallel #program transformation #source code #using
- Interactive presentation: SoftSIMD — exploiting subword parallelism using source code transformations (SK, RL, GA, HM), pp. 1349–1354.
- DATE-2007-MamagkakisSC #design #middleware #optimisation #protocol
- Middleware design optimization of wireless protocols based on the exploitation of dynamic input patterns (SM, DS, FC), pp. 1036–1041.
- ICDAR-2007-AradhyeM #detection
- Exploiting Videotext _Events_ for Improved Videotext Detection (HBA, GKM), pp. 894–898.
- ICDAR-2007-ChenW #documentation #image #kernel
- Exploiting Fisher Kernels in Decoding Severely Noisy Document Images (JC, YW), pp. 417–421.
- SIGMOD-2007-GeorgiadisV #performance #relational #xpath
- Xpath on steroids: exploiting relational engines for xpath performance (HG, VV), pp. 317–328.
- SIGMOD-2007-LarsonLZZ07a #estimation #self
- Exploiting self-monitoring sample views for cardinality estimation (PÅL, WL, JZ, PZ), pp. 1073–1075.
- SIGMOD-2007-ZhouLFL #performance #query
- Efficient exploitation of similar subexpressions for query processing (JZ, PÅL, JCF, WL), pp. 533–544.
- CSEET-2007-Burge #education #maintenance #multi #reliability
- Exploiting Multiplicity to Teach Reliability and Maintainability in a Capstone Project (JEB), pp. 29–36.
- SAS-2007-HardekopfL #analysis #equivalence #pointer
- Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis (BH, CL), pp. 265–280.
- DHM-2007-CaoWJWC #design #feedback #visual notation
- The Design and Exploitation of Visual Feedback System for Rowing (CC, CW, LJ, ZW, XC), pp. 794–802.
- HCI-MIE-2007-ChenCW #correlation #interactive #multimodal
- Exploiting Speech-Gesture Correlation in Multimodal Interaction (FC, EHCC, NW), pp. 23–30.
- ICEIS-AIDSS-2007-ShethG #execution #middleware #non-functional #process #semantics #workflow
- The 4×4 semantic model — exploiting data, functional, non-functional and execution semantics across business process, workflow, partner services and middleware services tiers (APS, KG), pp. 1–4.
- ICEIS-DISI-2007-ShethG #execution #middleware #non-functional #process #semantics #workflow
- The 4×4 semantic model — exploiting data, functional, non-functional and execution semantics across business process, workflow, partner services and middleware services tiers (APS, KG), pp. 1–4.
- ICEIS-EIS-2007-ShethG #execution #middleware #non-functional #process #semantics #workflow
- The 4×4 semantic model — exploiting data, functional, non-functional and execution semantics across business process, workflow, partner services and middleware services tiers (APS, KG), pp. 1–4.
- ICEIS-HCI-2007-ShethG #execution #middleware #non-functional #process #semantics #workflow
- The 4×4 semantic model — exploiting data, functional, non-functional and execution semantics across business process, workflow, partner services and middleware services tiers (APS, KG), pp. 1–4.
- ICEIS-J-2007-ShethG07a #execution #middleware #non-functional #process #semantics #workflow
- The 4 x 4 Semantic Model: Exploiting Data, Functional, Non-functional and Execution Semantics Across Business Process, Workflow, Partner Services and Middleware Services Tiers (APS, KG), pp. 16–26.
- ICEIS-SAIC-2007-ShethG #execution #middleware #non-functional #process #semantics #workflow
- The 4×4 semantic model — exploiting data, functional, non-functional and execution semantics across business process, workflow, partner services and middleware services tiers (APS, KG), pp. 1–4.
- ICML-2007-KrauseG #approach #learning #process
- Nonmyopic active learning of Gaussian processes: an exploration-exploitation approach (AK, CG), pp. 449–456.
- KDD-2007-CrabtreeAG #aspect-oriented #automation #query
- Exploiting underrepresented query aspects for automatic query expansion (DC, PA, XG), pp. 191–200.
- KDD-2007-KarrasMS #summary
- Exploiting duality in summarization with deterministic guarantees (PK, DS, NM), pp. 380–389.
- RecSys-2007-FreyneFC #data access #recommendation #social #towards
- Toward the exploitation of social access patterns for recommendation (JF, RF, MC), pp. 179–182.
- SIGIR-2007-WanY #clustering #collaboration #documentation #multi #named
- CollabSum: exploiting multiple document clustering for collaborative single document summarizations (XW, JY), pp. 143–150.
- SAC-2007-CazzolaPGS #co-evolution #design #metadata #modelling
- Co-evolving application code and design models by exploiting meta-data (WC, SP, AG, GS), pp. 1275–1279.
- SAC-2007-LinK #array #integration
- Exploiting inter-gene information for microarray data integration (KML, JK), pp. 123–127.
- SAC-2007-LiuMB #approach #clustering
- A clustering entropy-driven approach for exploring and exploiting noisy functions (SHL, MM, BRB), pp. 738–742.
- SAC-2007-Palmer #web #web service
- Exploiting bibliographic web services with CiTeX (JDP), pp. 1673–1676.
- SAC-2007-RuffoS #peer-to-peer #recommendation
- Evaluating peer-to-peer recommender systems that exploit spontaneous affinities (GR, RS), pp. 1574–1578.
- SAC-2007-SonJF
- Exploiting types for improved schema mapping (YS, HMJ, FF), pp. 423–429.
- SAC-2007-StanchinaM #algorithm #garbage collection #performance #realtime
- Exploiting the efficiency of generational algorithms for hardware-supported real-time garbage collection (SS, MM), pp. 713–718.
- CGO-2007-HormatiCM
- Exploiting Narrow Accelerators with Data-Centric Subgraph Mapping (AH, NC, SAM), pp. 341–353.
- CGO-2007-ReddiCCS #persistent #reuse
- Persistent Code Caching: Exploiting Code Reuse Across Executions and Applications (VJR, DC, RC, MDS), pp. 74–88.
- HPCA-2007-AgarwalMWSF #parallel
- Exploiting Postdominance for Speculative Parallelization (MA, KM, KMW, SSS, MIF), pp. 295–305.
- HPCA-2007-ZhongLM #architecture #hybrid #manycore #parallel #thread
- Extending Multicore Architectures to Exploit Hybrid Parallelism in Single-thread Applications (HZ, SAL, SAM), pp. 25–36.
- PPoPP-2007-UpadhyayaPM #concurrent
- Expressing and exploiting concurrency in networked applications with aspen (GU, VSP, SPM), pp. 13–23.
- PPoPP-2007-ZhangSZSG #concurrent
- Optimized lock assignment and allocation: a method for exploiting concurrency among critical sections (YZ, VCS, WZ, VS, GRG), pp. 146–147.
- CSL-2007-ChenF #parametricity
- Subexponential Time and Fixed-Parameter Tractability: Exploiting the Miniaturization Mapping (YC, JF), pp. 389–404.
- DAC-2006-JayaseelanLM
- Exploiting forwarding to improve data bandwidth of instruction-set extensions (RJ, HL, TM), pp. 43–48.
- DAC-2006-SuhendraMRC #analysis #detection #performance
- Efficient detection and exploitation of infeasible paths for software timing analysis (VS, TM, AR, TC), pp. 358–363.
- DAC-2006-Wang #detection #symmetry
- Exploiting K-Distance Signature for Boolean Matching and G-Symmetry Detection (KHW), pp. 516–521.
- DATE-2006-BeltrameSSLP #simulation
- Exploiting TLM and object introspection for system-level simulation (GB, DS, CS, DL, CP), pp. 100–105.
- DATE-2006-GandhiM #energy #multi #using
- Exploiting data-dependent slack using dynamic multi-VDD to minimize energy consumption in datapath circuits (KRG, NRM), pp. 1001–1006.
- VLDB-2006-HabichRL #database #named #optimisation
- GignoMDA — Exploiting Cross-Layer Optimization for Complex Database Applications (DH, SR, WL), p. 1251–?.
- VLDB-2006-MissierEGPJ #quality
- Quality Views: Capturing and Exploiting the User Perspective on Data Quality (PM, SME, RMG, ADP, BJ), pp. 977–988.
- TACAS-2006-GroceJ #program analysis
- Exploiting Traces in Program Analysis (AG, RJ), pp. 379–393.
- ICSM-2006-KuhnG
- Exploiting the Analogy Between Traces and Signal Processing (AK, OG), pp. 320–329.
- SCAM-2006-BinkleyHK #animation #approximate #static analysis
- Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation (DB, MH, JK), pp. 43–52.
- CAiSE-2006-FlescaGMT #documentation #nondeterminism
- Wrapping PDF Documents Exploiting Uncertain Knowledge (SF, SG, EM, AT), pp. 175–189.
- CIKM-2006-GollapudiP #symmetry #topic
- Exploiting asymmetry in hierarchical topic extraction (SG, RP), pp. 475–482.
- CIKM-2006-MichelBNTWZ #keyword
- Discovering and exploiting keyword and attribute-value co-occurrences to improve P2P routing indices (SM, MB, NN, PT, GW, CZ), pp. 172–181.
- CIKM-2006-ShiN #adaptation #corpus #information retrieval #parallel
- Filtering or adapting: two strategies to exploit noisy parallel corpora for cross-language information retrieval (LS, JYN), pp. 814–815.
- ICPR-v2-2006-ChenY #modelling #using #video
- Exploiting High Dimensional Video Features Using Layered Gaussian Mixture Models (DC, JY), pp. 1078–1081.
- ICPR-v2-2006-HarpazH #geometry #learning
- Exploiting the Geometry of Gene Expression Patterns for Unsupervised Learning (RH, RMH), pp. 670–674.
- ICPR-v2-2006-KhanKKA #dependence #online #verification
- On-Line Signature Verification by Exploiting Inter-Feature Dependencies (MKK, MAK, MAUK, IA), pp. 796–799.
- SAC-2006-BaralisG #categorisation #word
- Associative text categorization exploiting negated words (EB, PG), pp. 530–535.
- SAC-2006-BergerMD #categorisation #email #set
- Exploiting partial decision trees for feature subset selection in e-mail categorization (HB, DM, MD), pp. 1105–1109.
- SAC-2006-FengQWZ #mining #query #xml
- Exploit sequencing to accelerate hot XML query pattern mining (JF, QQ, JW, LZ), pp. 517–524.
- SAC-2006-NoiaSCTD #framework #image #retrieval #semantics
- A framework for content-based image retrieval fully exploiting the semantics of annotation (TDN, EDS, FdC, ET, FMD), pp. 1709–1710.
- ASPLOS-2006-GordonTA #parallel #pipes and filters #source code
- Exploiting coarse-grained task, data, and pipeline parallelism in stream programs (MIG, WT, SPA), pp. 151–162.
- ASPLOS-2006-KawahitoKMIN #framework #recognition
- A new idiom recognition framework for exploiting hardware-assist instructions (MK, HK, TM, HI, TN), pp. 382–393.
- ASPLOS-2006-ParasharSG #locality #multi #named #performance #thread
- SlicK: slice-based locality exploitation for efficient redundant multithreading (AP, AS, SG), pp. 95–105.
- CGO-2006-SonCK #approach #locality #power management
- A Compiler-Guided Approach for Reducing Disk Power Consumption by Exploiting Disk Access Locality (SWS, GC, MTK), pp. 256–268.
- HPCA-2006-PenryFHWSAC #parallel #simulation
- Exploiting parallelism and structure to accelerate the simulation of chip multi-processors (DAP, DF, DH, RW, GS, DIA, DC), pp. 29–40.
- PPoPP-2006-LiuTCASRT #compilation #named
- POSH: a TLS compiler that exploits program structure (WL, JT, LC, WA, KS, JR, JT), pp. 158–167.
- PPoPP-2006-ManassievMA #clustering #concurrent #distributed #memory management #transaction
- Exploiting distributed version concurrency in a transactional memory cluster (KM, MM, CA), pp. 198–208.
- SAT-2006-SabharwalAGHS #modelling #performance #symmetry
- QBF Modeling: Exploiting Player Symmetry for Simplicity and Efficiency (AS, CA, CPG, JWH, BS), pp. 382–395.
- WICSA-2005-KruchtenLVW #architecture
- Building up and Exploiting Architectural Knowledge (PK, PL, HvV, TW), pp. 291–292.
- ASE-2005-KashyapG #detection #performance #reachability
- Exploiting predicate structure for efficient reachability detection (SK, VKG), pp. 4–13.
- DAC-2005-MonyBPK #proving
- Exploiting suspected redundancy without proving it (HM, JB, VP, RK), pp. 463–466.
- DAC-2005-ZykovMJVS #architecture #novel #performance #trade-off
- High performance computing on fault-prone nanotechnologies: novel microarchitecture techniques exploiting reliability-delay trade-offs (AVZ, EM, MFJ, GdV, AS), pp. 270–273.
- DATE-2005-AbsarC #approach #array
- Compiler-Based Approach for Exploiting Scratch-Pad in Presence of Irregular Array Access (MJA, FC), pp. 1162–1167.
- DATE-2005-ChappellMPOFS #adaptation #generative #realtime #safety
- Exploiting Real-Time FPGA Based Adaptive Systems Technology for Real-Time Sensor Fusion in Next Generation Automotive Safety Systems (SC, AM, DP, DO, BF, CS), pp. 180–185.
- DATE-2005-LeungTH #energy #scheduling
- Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling (LFL, CYT, XSH), pp. 634–639.
- DocEng-2005-ChengSB #documentation #xml
- Exploiting XML technologies for intelligent document routing (IC, SS, NB), pp. 26–28.
- SAS-2005-SimonK #analysis
- Exploiting Sparsity in Polyhedral Analysis (AS, AK), pp. 336–351.
- CEFP-2005-Hammond #approach #behaviour #bound #functional #programming
- Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach (KH), pp. 100–134.
- SOFTVIS-2005-MalloyP #c++ #modelling #source code #uml #visualisation
- Exploiting UML dynamic object modeling for the visualization of C++ programs (BAM, JFP), pp. 105–114.
- CIKM-2005-ComanNS #energy #network #performance #query
- Exploiting redundancy in sensor networks for energy efficient processing of spatiotemporal region queries (AC, MAN, JS), pp. 187–194.
- ICML-2005-WangWGSC #markov #modelling #random #semantics
- Exploiting syntactic, semantic and lexical regularities in language modeling via directed Markov random fields (SW, SW, RG, DS, LC), pp. 948–955.
- SEKE-2005-AvesaniBPS #requirements
- Exploiting Domain Knowledge in Requirements Prioritization (PA, CB, AP, AS), pp. 467–472.
- SIGIR-2005-SrikanthVBM #automation #image #ontology
- Exploiting ontologies for automatic image annotation (MS, JV, MB, DIM), pp. 552–558.
- SIGIR-2005-XueYZYC #analysis
- Exploiting the hierarchical structure for link analysis (GRX, QY, HJZ, YY, ZC), pp. 186–193.
- SAC-2005-BoninoCP #automation #concept #learning #network
- Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks (DB, FC, FP), pp. 1639–1644.
- ICSE-2005-GanapathySJRB #automation
- Automatic discovery of API-level exploits (VG, SAS, SJ, TWR, REB), pp. 312–321.
- CGO-2005-ArnoldG #graph #virtual machine
- Collecting and Exploiting High-Accuracy Call Graph Profiles in Virtual Machines (MA, DG), pp. 51–62.
- HPCA-2005-QinLZ #detection #memory management #named
- SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
- LCTES-2005-ZhuM #feedback #scalability #scheduling
- Feedback EDF scheduling exploiting hardware-assisted asynchronous dynamic voltage scaling (YZ, FM), pp. 203–212.
- DAC-2004-DargaLSM #detection #symmetry
- Exploiting structure in symmetry detection for CNF (PTD, MHL, KAS, ILM), pp. 530–534.
- DAC-2004-SilveiraP #algorithm #network #reduction
- Exploiting input information in a model reduction algorithm for massively coupled parasitic networks (LMS, JRP), pp. 385–388.
- DATE-DF-2004-BruschiB #communication #design #synthesis
- A Design Methodology for the Exploitation of High Level Communication Synthesis (FB, MB), pp. 180–185.
- DATE-v1-2004-Velev #performance #verification
- Exploiting Signal Unobservability for Efficient Translation to CNF in Formal Verification of Microprocessors (MNV), pp. 266–271.
- DATE-v2-2004-DuanK
- Exploiting Crosstalk to Speed up On-Chip Buse (CD, SPK), pp. 778–783.
- DATE-v2-2004-KadayifKK #energy #multi
- Exploiting Processor Workload Heterogeneity for Reducing Energy Consumption in Chip Multiprocessors (IK, MTK, IK), pp. 1158–1163.
- SIGMOD-2004-BrambillaCCDFM #declarative #specification #web #web service #workflow
- Declarative Specification of Web Applications exploiting Web Services and Workflows (MB, SC, SC, MD, PF, IM), pp. 909–910.
- ICSM-2004-LiM #component #distributed #testing
- Exploiting Global Causality in Testing of Distributed and Component-Based Applications (JL, KM), p. 527.
- IFL-2004-Cristobal-SalasCRG #message passing #program transformation #source code
- Exploiting Single-Assignment Properties to Optimize Message-Passing Programs by Code Transformations (ACS, AC, ERA, JLG), pp. 1–16.
- CIKM-2004-RavindranG #concept
- Exploiting hierarchical relationships in conceptual search (DR, SG), pp. 238–239.
- ICPR-v4-2004-YuanL #dependence #nondeterminism
- Fragile Watermarking Scheme Exploiting Non-Deterministic Block-Wise Dependency (YY, CTL), pp. 849–852.
- KDD-2004-CohenS #integration #markov #process
- Exploiting dictionaries in named entity extraction: combining semi-Markov extraction processes and data integration methods (WWC, SS), pp. 89–98.
- KDD-2004-XiongSTK #bound #correlation #identification
- Exploiting a support-based upper bound of Pearson’s correlation coefficient for efficiently identifying strongly correlated pairs (HX, SS, PNT, VK), pp. 334–343.
- SIGIR-2004-UpstillR #recommendation #web
- Exploiting hyperlink recommendation evidence in navigational web search (TU, SER), pp. 576–577.
- RE-2004-UchitelCKM #animation #requirements #validation
- Fluent-Based Animation: Exploiting the Relation between Goals and Scenarios for Requirements Validation (SU, RC, JK, JM), pp. 208–217.
- SAC-2004-JuhaszC #clustering #multi #performance
- Exploiting fast ethernet performance in multiplatform cluster environment (SJ, HC), pp. 1407–1411.
- SAC-2004-Mosses #semantics
- Exploiting labels in Structural Operational Semantics (PDM), pp. 1476–1481.
- FSE-2004-KremenekAYE #correlation #fault #ranking
- Correlation exploitation in error ranking (TK, KA, JY, DRE), pp. 83–93.
- FSE-2004-ZitserLL #open source #source code #static analysis #testing #tool support #using
- Testing static analysis tools using exploitable buffer overflows from open source code (MZ, RL, TL), pp. 97–106.
- HPCA-2004-Michaud #capacity #execution #manycore #migration
- Exploiting the Cache Capacity of a Single-Chip Multi-Core Processor with Execution Migration (PM), pp. 186–197.
- HPCA-2004-WenWPK #predict
- Exploiting Prediction to Reduce Power on Buses (VW, MW, YP, JK), pp. 2–13.
- DATE-2003-HuM #architecture #energy #flexibility #performance
- Exploiting the Routing Flexibility for Energy/Performance Aware Mapping of Regular NoC Architectures (JH, RM), pp. 10688–10693.
- DATE-2003-MeiVVML #architecture #configuration management #parallel #scheduling #using
- Exploiting Loop-Level Parallelism on Coarse-Grained Reconfigurable Architectures Using Modulo Scheduling (BM, SV, DV, HDM, RL), pp. 10296–10301.
- DATE-2003-SurendraBN #network #reuse
- Enhancing Speedup in Network Processing Applications by Exploiting Instruction Reuse with Flow Aggregation (GS, SB, SKN), pp. 10784–10789.
- ICDAR-2003-StefanoCM #algorithm #classification #reliability #search-based
- Exploiting Reliability for Dynamic Selection of Classifiers by Means of Genetic Algorithms (CDS, ADC, AM), pp. 671–675.
- SIGMOD-2003-ChaudhuriGS #query
- Factorizing Complex Predicates in Queries to Exploit Indexes (SC, PG, SS), pp. 361–372.
- SIGMOD-2003-Raghavan
- Extracting and Exploiting Structure in Text Search (PR), p. 635.
- IWPC-2003-HennessyMP #comprehension #named #tool support #xml
- gccXfront: Exploiting gcc as a Front End for Program Comprehension Tools via XML/XSLT (MH, BAM, JFP), p. 298–?.
- ICEIS-v1-2003-BerrielGSCG
- Exploitation of the Datawarehouse in the Hotels Services: A Proposal of Client Orientation (RB, AG, IS, MC, ZG), pp. 460–463.
- CIKM-2003-SrikanthS #approach #information retrieval #modelling #query
- Exploiting syntactic structure of queries in a language modeling approach to IR (MS, RKS), pp. 476–483.
- ICML-2003-ZhangXC #adaptation #learning
- Exploration and Exploitation in Adaptive Filtering Based on Bayesian Active Learning (YZ, WX, JPC), pp. 896–903.
- SIGIR-2003-ShenZ #documentation #information retrieval #interactive #query #ranking
- Exploiting query history for document ranking in interactive information retrieval (XS, CZ), pp. 377–378.
- LDTA-2003-CostagliolaDFG #analysis #development #visual notation
- Exploiting XPG for Visual Languages: Definition, Analysis and Development (GC, VD, FF, CG), pp. 612–627.
- PPoPP-2003-ChenTSDS #distributed
- Exploiting high-level coherence information to optimize distributed shared state (DC, CT, BS, SD, MLS), pp. 131–142.
- PPoPP-2003-KimPR #concurrent #interface #network #programmable
- Exploiting task-level concurrency in a programmable network interface (HyK, VSP, SR), pp. 61–72.
- DAC-2002-HuangM #configuration management #parallel
- Exploiting operation level parallelism through dynamically reconfigurable datapaths (ZH, SM), pp. 337–342.
- DAC-2002-KandemirRC #embedded #memory management #multi
- Exploiting shared scratch pad memory space in embedded multiprocessor systems (MTK, JR, ANC), pp. 219–224.
- DATE-2002-WuK #algorithm
- Exploiting Idle Cycles for Algorithm Level Re-Computing (KW, RK), pp. 842–846.
- SIGMOD-2002-BrunoC #optimisation #query #statistics
- Exploiting statistics on query expressions for optimization (NB, SC), pp. 263–274.
- VLDB-2002-KangC #maintenance #online
- Exploiting Versions for On-line Data Warehouse Maintenance in MOLAP Servers (HGK, CWC), pp. 742–753.
- VLDB-2002-KounevB #data access
- Improving Data Access of J2EE Applications by Exploiting Asynchronous Messaging and Caching Services (SK, APB), pp. 574–585.
- VLDB-2002-ZellerK #case study #database #experience #optimisation #scalability
- Experience Report: Exploiting Advanced Database Optimization Features for Large-Scale SAP R/3 Installations (BZ, AK), pp. 894–905.
- ICEIS-2002-ConstantinouTKTK #framework
- An E-Service Infrastructure for Innovation Exploitation and Technology Transfer: The DILEMMA Project (AC, VT, PK, DT, AK), pp. 1029–1034.
- ICML-2002-BockhorstC #concept
- Exploiting Relations Among Concepts to Acquire Weakly Labeled Training Data (JB, MC), pp. 43–50.
- ICML-2002-LangfordZK #analysis #trade-off
- Competitive Analysis of the Explore/Exploit Tradeoff (JL, MZ, SK), pp. 339–346.
- ICPR-v1-2002-VegaS #analysis
- Experiments on Gait Analysis by Exploiting Nonstationarity in the Distribution of Feature Relationships (IRV, SS), pp. 1–4.
- ICPR-v2-2002-RasheedS #classification
- Movie Genre Classification By Exploiting Audio-Visual Features Of Previews (ZR, MS), pp. 1086–1089.
- KDD-2002-BennettDM
- Exploiting unlabeled data in ensemble methods (KPB, AD, RM), pp. 289–296.
- KDD-2002-StoreyC #modelling #optimisation
- Exploiting response models: optimizing cross-sell and up-sell opportunities in banking (AS, MDC), pp. 325–331.
- SEKE-2002-Micucci #architecture #industrial #knowledge-based #monitoring
- Exploiting the kaleidoscope architecture in an industrial environmental monitoring system with heterogeneous devices and a knowledge-based supervisor (DM), pp. 685–688.
- SEKE-2002-SchmerlG #architecture #design #self
- Exploiting architectural design knowledge to support self-repairing systems (BRS, DG), pp. 241–248.
- PADL-2002-YangG #data type #logic programming #performance #source code
- Exploiting Efficient Control and Data Structures in Logic Programs (RY, SG), pp. 318–331.
- POPL-2002-ShufGBS #memory management #optimisation
- Exploiting prolific types for memory management and optimizations (YS, MG, RB, JPS), pp. 295–306.
- SAC-2002-BrownJ #retrieval
- Exploiting contextual change in context-aware retrieval (PJB, GJFJ), pp. 650–656.
- HPCA-2002-YangPFV #design #energy
- Exploiting Choice in Resizable Cache Design to Optimize Deep-Submicron Processor Energy-Delay (SHY, MDP, BF, TNV), pp. 151–161.
- CAV-2002-AlurMY #behaviour #model checking #performance
- Exploiting Behavioral Hierarchy for Efficient Model Checking (RA, MM, ZY), pp. 338–342.
- ASE-2001-Iosif #model checking #symmetry
- Exploiting Heap Symmetries in Explicit-State Model Checking of Software (RI), pp. 254–261.
- DAC-2001-BozorgzadehKS #flexibility
- Creating and Exploiting Flexibility in Steiner Trees (EB, RK, MS), pp. 195–198.
- DATE-2001-SamiSSZZ #embedded
- Exploiting data forwarding to reduce the power budget of VLIW embedded processors (MS, DS, CS, VZ, RZ), pp. 252–257.
- PLDI-2001-Chilimbi #abstraction #locality #performance
- Efficient Representations and Abstractions for Quantifying and Exploiting Data Reference Locality (TMC), pp. 191–202.
- CHI-2001-CravenTDPGBFBJLH
- Exploiting interactivity, influence, space and time to explore non-linear drama in virtual worlds (MPC, IT, AD, JP, CG, SB, MF, JB, KMJA, BL, MH), pp. 30–37.
- ICEIS-v1-2001-StojanovicDS #development #network
- Exploiting Temporal GIS and Spatio-Temporal Data to Enhance Telecom Network Planning and Development (DS, SDK, ZS), pp. 88–95.
- CIKM-2001-FrenchPGP #effectiveness #retrieval
- Exploiting A Controlled Vocabulary to Improve Collection Selection and Retrieval Effectiveness (JCF, ALP, FCG, NP), pp. 199–206.
- SIGIR-2001-ClarkeCL
- Exploiting Redundancy in Question Answering (CLAC, GVC, TRL), pp. 358–365.
- SAC-2001-Leopold #optimisation #reuse
- Exploiting non-uniform reuse for cache optimization (CL), pp. 560–564.
- SAC-2001-PowerM #lalr #metric
- Exploiting metrics to facilitate grammar transformation into LALR format (JFP, BAM), pp. 636–640.
- ICSE-2001-AlurAGHKKMMW #design #model checking #named
- JMOCHA: A Model Checking Tool that Exploits Design Structure (RA, LdA, RG, TAH, MK, CMK, RM, FYCM, BYW), pp. 835–836.
- ICSE-2001-GriswoldYK #evolution
- Exploiting the Map Metaphor in a Tool for Software Evolution (WGG, JJY, YK), pp. 265–274.
- CAV-2001-VelevB #logic #named #similarity
- EVC: A Validity Checker for the Logic of Equality with Uninterpreted Functions and Memories, Exploiting Positive Equality, and Conservative Transformations (MNV, REB), pp. 235–240.
- ICLP-2001-RochaSC #on the
- On a Tabling Engine That Can Exploit Or-Parallelism (RR, FMAS, VSC), pp. 43–58.
- IJCAR-2001-HaarslevMT #logic #modelling #pseudo #reasoning
- Exploiting Pseudo Models for TBox and ABox Reasoning in Expressive Description Logics (VH, RM, AYT), pp. 61–75.
- SAT-2001-Berre #lookahead #power of
- Exploiting the real power of unit propagation lookahead (DLB), pp. 59–80.
- DATE-2000-HoffmannK #fault #multi
- Exploiting Hierarchy for Multiple Error Correction in Combinational Circuits (DWH, TK), p. 758.
- PLDI-2000-LarsenA #parallel #set
- Exploiting superword level parallelism with multimedia instruction sets (SL, SPA), pp. 145–156.
- IFL-2000-SargeantKW #functional #parallel #source code
- Exploiting Implicit Parallelism in Functional Programs with SLAM (JS, CCK, IW), pp. 19–36.
- ICML-2000-DrummondH
- Exploiting the Cost (In)sensitivity of Decision Tree Splitting Criteria (CD, RCH), pp. 239–246.
- ICPR-v3-2000-DekeyserBPP #2d #image #parametricity #sequence
- Super-Resolution from Noisy Image Sequences Exploiting a 2D Parametric Motion Model (FD, PB, PP, ÉP), pp. 3354–3357.
- CC-2000-UhWWJBC #effectiveness
- Techniques for Effectively Exploiting a Zero Overhead Loop Buffer (GRU, YW, DBW, SJ, CB, VC), pp. 157–172.
- HPCA-2000-TorrellasYN #effectiveness #integration #towards
- Toward a Cost-Effective DSM Organization That Exploits Processor-Memory Integration (JT, LY, ATN), pp. 15–25.
- OSDI-2000-KimCKNMCK
- A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References (JMK, JC, JK, SHN, SLM, YC, CSK), pp. 119–134.
- DAC-1999-ChoiYLPK #design #embedded
- Exploiting Intellectual Properties in ASIP Designs for Embedded DSP Software (HC, JHY, JYL, ICP, CMK), pp. 939–944.
- DAC-1999-VelevB #pipes and filters #similarity #verification
- Exploiting Positive Equality and Partial Non-Consistency in the Formal Verification of Pipelined Microprocessors (MNV, REB), pp. 397–401.
- DAC-1999-YehCCJ #design
- Gate-Level Design Exploiting Dual Supply Voltages for Power-Driven Applications (CWY, MCC, SCC, WBJ), pp. 68–71.
- DATE-1999-EijkJMT #algorithm #identification #symmetry
- Identification and Exploitation of Symmetries in DSP Algorithms (CAJvE, ETAFJ, BM, AHT), pp. 602–608.
- DATE-1999-KallaC #equivalence #performance
- Performance Driven Resynthesis by Exploiting Retiming-Induced State Register Equivalence (PK, MJC), pp. 638–642.
- DATE-1999-Leupers #code generation #embedded
- Exploiting Conditional Instructions in Code Generation for Embedded VLIW Processors (RL), p. 105–?.
- DATE-1999-SantosJ #equivalence #on the fly
- Exploiting State Equivalence on the Fly while Applying Code Motion and Speculation (LCVdS, JAGJ), p. 609–?.
- VLDB-1999-PitouraC
- Exploiting Versions for Handling Updates in Broadcast Disks (EP, PKC), pp. 114–125.
- STOC-1999-CohenK #web
- Exploiting Regularities in Web Traffic Patterns for Cache Replacement (EC, HK), pp. 109–118.
- HCI-EI-1999-AtkinsonW #approach #database #industrial #information retrieval #legacy #scalability
- Exploiting Knowledge in Large Industrial Companies: A Combined Approach to Information Retrieval from Legacy Databases (MA, OMW), pp. 1177–1181.
- HCI-EI-1999-FarencP #architecture #performance
- An Extensible Architecture to Support the Structuring and the efficient Exploitation of Ergonomic Rules (CF, PAP), pp. 1038–1042.
- SAC-1999-GollaL #architecture #functional #logic #parallel #scheduling #thread
- A Dynamic Scheduling Logic for Exploiting Multiple Functional Units in Single Ship Multithreaded Architectures (PNG, ECL), pp. 466–473.
- ICSE-1999-NittoR #architecture #middleware
- Exploiting ADLs to Specify Architectural Styles Induced by Middleware Infrastructures (EDN, DSR), pp. 13–22.
- ICSE-1999-WoodmanGMHR #programming #smalltalk
- Exploiting Smalltalk Modules in a Customizable Programming Environment (MW, RG, MM, SH, HR), pp. 65–74.
- CC-1999-RubinBR #data type #recursion
- Virtual Cache Line: A New Technique to Improve Cache Exploitation for Recursive Data Structures (SR, DB, MR), pp. 259–273.
- HPCA-1999-BrooksM #performance
- Dynamically Exploiting Narrow Width Operands to Improve Processor Power and Performance (DMB, MM), pp. 13–22.
- HPCA-1999-HuangL #locality #reuse
- Exploiting Basic Block Value Locality with Block Reuse (JH, DJL), pp. 106–114.
- HPCA-1999-InoueKM #logic #memory management
- Dynamically Variable Line-Size Cache Exploiting High On-Chip Memory Bandwidth of Merged DRAM/Logic LSIs (KI, KK, KM), pp. 218–222.
- HPCA-1999-RheeL #network #scalability
- A Scalable Cache Coherent Scheme Exploiting Wormhole Routing Networks (YR, JL), pp. 223–226.
- HPDC-1999-KoussihAS #clustering #memory management #named
- Dodo: A User-level System for Exploiting Idle Memory in Workstation Clusters (SK, AA, SS), pp. 301–308.
- LCTES-1999-UhWWJBC #effectiveness
- Effective Exploitation of a Zero Overhead Loop Buffer (GRU, YW, DBW, SJ, CB, VC), pp. 10–19.
- CAV-1999-BryantGV #logic #similarity
- Exploiting Positive Equality in a Logic of Equality with Uninterpreted Functions (REB, SMG, MNV), pp. 470–482.
- DAC-1998-UsamiIIKTHATK #design #power management #scalability
- Design Methodology of Ultra Low-Power MPEG4 Codec Core Exploiting Voltage Scaling Techniques (KU, MI, TI, MK, MT, MH, HA, TT, TK), pp. 483–488.
- DATE-1998-CornoPRV
- Exploiting Symbolic Techniques for Partial Scan Flip Flop Selection (FC, PP, MSR, MV), pp. 670–677.
- DATE-1998-Scholl #composition #functional #multi
- Multi-output Functional Decomposition with Exploitation of Don’t Cares (CS), pp. 743–748.
- TACAS-1998-AjamiHI #linear #logic #model checking #symmetry
- Exploiting Symmetry in Linear Time Temporal Logic Model Checking: One Step Beyond (KA, SH, JMI), pp. 52–67.
- WCRE-1998-FusaroTV #case study #component #named #process
- REP — chaRacterising and Exploiting Process component: Results of Experimentation (PF, MT, GV), pp. 20–29.
- PLDI-1998-SastryPS #execution #float #integer
- Exploiting Idle Floating-Point Resources for Integer Execution (SSS, SP, JES), pp. 118–129.
- EDOC-1998-GoldschmidtHL #enterprise #java
- Exploiting Enterprise JavaBeans in the NIIIP virtual enterprise (AG, PH, JL), pp. 124–135.
- SAC-1998-MachucaM #data mining #database #mining #precise #relational #set
- Enhancing the exploitation of data mining in relational database systems via the rough sets theory including precision variables (FM, MM), pp. 70–73.
- ICSE-1998-CugolaNF #distributed #framework
- Exploiting an Event-Based Infrastructure to Develop Complex Distributed Systems (GC, EDN, AF), pp. 261–270.
- HPCA-1998-MackenzieKFLLAK #performance
- Exploiting Two-Case Delivery for Fast Protected Messaging (KM, JK, MF, WL, VL, AA, MFK), pp. 231–242.
- ASE-1997-PautlerWQ #simulation #specification
- Exploiting Domain-Specific Knowledge to Refine Simulation Specifications (DP, SW, AQ), p. 117–?.
- DAC-1997-FangW #clustering #design #multi
- Multi-Way FPGA Partitioning by Fully Exploiting Design Hierarchy (WJF, ACHW), pp. 518–521.
- EDTC-1997-SchollMHM #symmetry
- Minimizing ROBDD sizes of incompletely specified Boolean functionsby exploiting strong symmetries (CS, SM, GH, PM), pp. 229–234.
- EDTC-1997-WalkerG97a #distributed #independence #simulation
- Exploiting temporal independence in distributed preemptive circuit simulation (PW, SG), pp. 378–382.
- HT-1997-HillHJLHH #hypermedia #navigation
- Exploiting Serendipity Amongst Users To Provide Support For Hypertext Navigation (GH, GH, RJ, SL, JH, MH), pp. 212–213.
- PLDI-1997-AmmonsBL #hardware #performance #profiling
- Exploiting Hardware Performance Counters with Flow and Context Sensitive Profiling (GA, TB, JRL), pp. 85–96.
- HCI-CC-1997-Taylor #re-engineering
- Improving Sociotechnical Systems by Exploiting the Remains of Reengineering (JCT), pp. 237–240.
- CIKM-1997-Wolverton #automation #enterprise #modelling
- Exploiting Enterprise Models for the Automatic Distribution of Corporate Information (MW), pp. 341–347.
- KDD-1997-GalalCH #parallel #scalability
- Improving Scalability in a Scientific Discovery System by Exploiting Parallelism (GG, DJC, LBH), pp. 171–174.
- SIGIR-1997-AnickV #clustering #information retrieval
- Exploiting Clustering and Phrases for Context-based Information Retrieval (PGA, SV), pp. 314–323.
- TOOLS-USA-1997-OzsuGS #framework #modelling #object-oriented
- A Framework for Temporal Data Models: Exploiting Object-Oriented Technology (MTÖ, IAG, DS), pp. 16–30.
- SOSP-1997-Steere #latency #nondeterminism #set
- Exploiting the Non-Determinism and Asynchrony of Set Iterators to Reduce Aggregate File I/O Latency (DCS), pp. 252–263.
- CAV-1997-GyurisS #model checking #on the fly #symmetry
- On-the-Fly Model Checking Under Fairness That Exploits Symmetry (VG, APS), pp. 232–243.
- CAV-1997-PandeyB #evaluation #symmetry #verification
- Exploiting Symmetry When Verifying Transitor-Level Circuits by Symbolic Trajectory Evaluation (MP, REB), pp. 244–255.
- ILPS-1997-CorreiaSC #orthogonal #parallel
- The SBA: Exploiting Orthogonality in AND-OR Parallel Systems (MEC, FMAS, VSC), pp. 117–131.
- DAC-1996-SanghaviRBS #memory management #performance
- High Performance BDD Package By Exploiting Memory Hiercharchy (JVS, RKR, RKB, ALSV), pp. 635–640.
- HT-1996-WeissVSNSDG #clustering #hypermedia #named #network
- HyPursuit: A Hierarchical Network Search Engine that Exploits Content-Link Hypertext Clustering (RW, BV, MAS, CN, PS, AD, DKG), pp. 180–193.
- CSCW-1996-Dourish #collaboration #consistency #semantics #tool support
- Consistency Guarantees: Exploiting Application Semantics for Consistency Management in a Collaboration Toolkit (PD), pp. 268–277.
- ICML-1996-GreinerGK
- Exploiting the Omission of Irrelevant Data (RG, AJG, AK), pp. 216–224.
- ICML-1996-Widmer #incremental #recognition
- Recognition and Exploitation of Contextual CLues via Incremental Meta-Learning (GW), pp. 525–533.
- KDD-1996-AronisPB #automation
- Exploiting Background Knowledge in Automated Discovery (JMA, FJP, BGB), pp. 355–358.
- ECOOP-1996-BullatS #clustering #database #effectiveness
- Dynamic Clustering in Object Databases Exploiting Effective Use of Relationships Between Objects (FB, MS), pp. 344–365.
- ICRE-1996-Brackett #requirements
- Ripe Fruit in Requirements Engineering: Techniques You Can Exploit NOW (JWB), pp. 42–43.
- ICRE-1996-ChampionM #analysis #enterprise #requirements
- Exploiting an enterprise model during systems’ requirements capture and analysis (REMC, TTM), pp. 208–216.
- ASPLOS-1996-SaghirCL
- Exploiting Dual Data-Memory Banks in Digital Signal Processors (MARS, PC, CGL), pp. 234–243.
- HPDC-1996-KumaranQ #automation #network #parallel
- Automatic Exploitation of Dual Level Parallelism on a Network of Multiprocessors (SK, MJQ), pp. 616–625.
- CAV-1996-MillerK
- Saving Space by Fully Exploiting Invisible Transitions (HM, SK), pp. 336–347.
- DAC-1995-FarrahiTS #memory management #segmentation
- Memory Segmentation to Exploit Sleep Mode Operation (AHF, GET, MS), pp. 36–41.
- KDD-1995-DeogunRS #approximate #set
- Exploiting Upper Approximation in the Rough Set Methodology (JSD, VVR, HS), pp. 69–74.
- KDD-1995-LeeOQ #information management #visualisation
- Exploiting Visualization in Knowledge Discovery (HYL, HLO, LHQ), pp. 198–203.
- PLILP-1995-FreireHSW #parallel
- Exploiting Parallelism in Tabled Evaluations (JF, RH, TS, DSW), pp. 115–132.
- SOSP-1995-Harchol-BalterD #process
- Exploiting Process Lifetime Distributions for Dynamic Load Balancing (MHB, ABD), p. 236.
- SOSP-1995-MummertES #mobile
- Exploiting Weak Connectivity for Mobile File Access (LBM, ME, MS), pp. 143–155.
- VLDB-1994-HasanM #algorithm #optimisation #parallel #pipes and filters #trade-off
- Optimization Algorithms for Exploiting the Parallelism-Communication Tradeoff in Pipelined Parallelism (WH, RM), pp. 36–47.
- STOC-1994-BrewerCL #random #scalability
- Scalable expanders: exploiting hierarchical random wiring (EAB, FTC, TL), pp. 144–152.
- ICALP-1994-FixS #reasoning #source code
- Reasoning about Programs by Exploiting the Environment (LF, FBS), pp. 328–339.
- KR-1994-Schubert #information management #natural language #reasoning #representation
- Exploiting Natural Language for Knowledge Representation and Reasoning (Abstract) (LKS), pp. 650–651.
- FSE-1994-GarlanAO #architecture #design
- Exploiting Style in Architectural Design Environments (DG, RA, JO), pp. 175–188.
- HPDC-1994-BeckerW #dependence
- Exploiting Inter-Task Dependencies for Dynamic Load Balancing (WB, GW), pp. 157–165.
- DAC-1993-HuD #dependence #functional
- Reducing BDD Size by Exploiting Functional Dependencies (AJH, DLD), pp. 266–271.
- VLDB-1993-LometS #database
- Exploiting A History Database for Backup (DBL, BS), pp. 380–390.
- INTERCHI-1993-HaakeH
- Take CoVer: exploiting version support in cooperative systems (AH, JMH), pp. 406–413.
- LOPSTR-1993-OlmedillaBH #automation #independence
- Automatic Exploitation of Non-Determinate Independent And-Parallelism in the Basic Andorra Model (MO, FB, MVH), pp. 177–195.
- CAV-1993-ClarkeFJ #logic #model checking #symmetry
- Exploiting Symmetry In Temporal Logic Model Checking (EMC, TF, SJ), pp. 450–462.
- ISSTA-1993-Miller #testing
- Exploitation of Software Test Technology (Abstract) (EFM), p. 159.
- SIGMOD-1992-Hong #parallel
- Exploiting Inter-Operation Parallelism in XPRS (WH), pp. 19–28.
- JICSLP-1992-Shen #prolog
- Exploiting Dependent And-Parallelism in Prolog: The Dynamic Dependent And-Parallel Scheme (DDAS) (KS), pp. 717–731.
- JICSLP-1992-Szeredi #optimisation #problem
- Exploiting Or-Parallelism in Optimisation Problems (PS), pp. 703–716.
- AdaEurope-1991-ColombiniTP #ada #realtime
- Ada as High Level Language for Real-Time Systems Exploiting RDBMS Techniques (CC, AdT, RP), pp. 384–393.
- ML-1991-MahadevanC #architecture #learning #scalability
- Scaling Reinforcement Learning to Robotics by Exploiting the Subsumption Architecture (SM, JC), pp. 328–332.
- PPoPP-1991-CostaWY #named #parallel #prolog
- Andorra-I: A Parallel Prolog System that Transparently Exploits both And- and Or-Parallelism (VSC, DHDW, RY), pp. 83–93.
- PPoPP-1991-JuC #parallel
- Exploitation of APL Data Parallelism on a Shared-memory MIMD Machine (DCJ, WMC), pp. 61–72.
- PPoPP-1991-LaRoweWE #memory management #multi #operating system
- Exploiting Operating System Support for Dynamic Page Placement on a NUMA Shared Memory Multiprocessor (RPLJ, JTW, CSE), pp. 122–132.
- PPoPP-1990-Gupta #parallel
- Employing Register Channels for the Exploitation of Instruction Level Parallelism (RG), pp. 118–127.
- PPoPP-1990-TickI #logic programming #parallel #programming language
- Programming Techniques for Efficiently Exploiting Parallelism in Logic Programming Languages (ET, NI), pp. 31–39.
- CLP-1990-HermenegildoG90 #independence #performance #prolog
- &-Prolog and its Performance: Exploiting Independent And-Parallelism (MVH, KJG), pp. 253–268.
- DAC-1989-BolsensRCM #analysis #behaviour #debugging #logic
- Electrical Debugging of Synchronous MOS VLSI Circuits Exploiting Analysis of the Intended Logic Behaviour (IB, WDR, LJMC, HDM), pp. 513–518.
- SIGMOD-1989-ChangK #clustering #effectiveness #inheritance #object-oriented #semantics
- Exploiting Inheritance and Structure Semantics for Effective Clustering and Buffering in an Object-Oriented DBMS (EEC, RHK), pp. 348–357.
- SOSP-1989-EdwardsM #file system
- Exploiting Read-Mostly Workloads in The FileNet File System (DAE, MSM), pp. 58–70.
- NACLP-1989-SinghalP #how #parallel #question #unification
- Unification Parallelism: How Much Can We Exploit? (AS, YNP), pp. 1135–1147.
- PPEALS-1988-GuptaT #parallel #runtime
- Exploiting Variable Grain Parallelism at Runtime (AG, AT), pp. 212–221.
- CADE-1988-ButlerK #deduction #parallel #problem #prototype
- Exploitation of Parallelism in Prototypical Deduction Problems (RB, NTK), pp. 333–343.
- JICSCP-1988-BoscoCM88 #functional #logic #power of #programming
- Exploiting the Full Power of Logic Plus Functional Programming (PGB, CC, CM), pp. 3–17.
- SOSP-1987-BirmanJ #distributed
- Exploiting Virtual Synchrony in Distributed Systems (KPB, TAJ), pp. 123–138.
- SOSP-1987-FinlaysonC
- Log Files: An Extended File Service Exploiting Write-Once Storage (RSF, DRC), pp. 139–148.
- DAC-1986-Frank #parallel #simulation
- Exploiting parallelism in a switch-level simulation machine (EHF), pp. 20–26.
- SIGIR-1986-Bookstein #documentation #performance #self
- Performance of Self-Taught Documents: Exploiting Co-Relevance Structure in a Document Collection (AB), pp. 244–248.