13 papers:
- DATE-2015-BalboniFB #configuration management #distributed #latency #multi #network #scalability
- Synergistic use of multiple on-chip networks for ultra-low latency and scalable distributed routing reconfiguration (MB, JF, DB), pp. 806–811.
- HIMI-IKC-2015-YamadaAY #analysis #internet
- An Analysis of the Synergistic Effect in the Advertisement — Between the Television Commercials and the Internet Commercials (TY, YA, KY), pp. 159–170.
- ICSE-v1-2015-YiYLZW #analysis #testing
- A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
- PLDI-2011-PrasadAG #automation #compilation #execution #matlab #source code
- Automatic compilation of MATLAB programs for synergistic execution on heterogeneous processors (AP, JA, RG), pp. 152–163.
- LCTES-2009-UdupaGT #execution #multi #source code
- Synergistic execution of stream programs on multicores with accelerators (AU, RG, MJT), pp. 99–108.
- DATE-DF-2006-MadingLPSBEH #architecture #fixpoint
- The vector fixed point unit of the synergistic processor element of the cell architecture processor (NM, JL, JP, RS, SB, SE, WH), pp. 244–248.
- ICPC-2006-VinzE #approach #comprehension
- A Synergistic Approach to Program Comprehension (BLV, LHE), pp. 69–73.
- ICSE-2003-SchmidtB #framework #middleware
- Patterns, Frameworks, and Middleware: Their Synergistic Relationships (DCS, FB), pp. 694–704.
- RE-2001-Lowry #question #requirements #synthesis
- Requirements Engineering and Program Synthesis: Mutually Exclusive or Synergistic? (MRL), pp. 12–13.
- ESOP-1994-King #analysis
- A Synergistic Analysis for Sharing and Groundness with Traces Linearity (AK), pp. 363–378.
- INTERCHI-1993-HudsonH #approach #independence #specification
- A synergistic approach to specifying simple number independent layouts by example (SEH, CNH), pp. 285–292.
- CHI-1989-CohenDMPSGST #natural language
- Synergistic use of direct manipulation and natural language (PRC, MD, DBM, FCNP, JWS, RAGJ, JLS, SWT), pp. 227–233.
- VLDB-1981-Minsky #database
- Synergistic Authorization in Database Systems (NHM), pp. 543–552.