BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (10)
interact (5)
system (5)
detect (4)
data (4)

Stem token$ (all stems)

43 papers:

SIGMODSIGMOD-2014-AugstenM0K #database #on the fly #relational #similarity
On-the-fly token similarity joins in relational databases (NA, AM, TN, AK), pp. 1495–1506.
SCAMSCAM-2014-YoshidaH #c #semiparsing #source code #syntax
A Pattern Search Method for Unpreprocessed C Programs Based on Tokenized Syntax Trees (AY, YH), pp. 295–304.
ICALPICALP-v1-2014-PrabhakaranSW #using
Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
CHICHI-2014-ValdesEGTSMUK #design #gesture #interactive
Exploring the design space of gestural interaction with active tokens through user-defined gestures (CV, DE, CG, ST, OS, AM, BU, MK), pp. 4107–4116.
VMCAIVMCAI-2014-AminofJKR #model checking
Parameterized Model Checking of Token-Passing Systems (BA, SJ, AK, SR), pp. 262–281.
LDTALDTA-J-2009-ChilowiczDR #sequence #source code
Viewing functions as token sequences to highlight similarities in source code (MC, ÉD, GR), pp. 1871–1891.
CAVCAV-2013-KhalimovJB #synthesis
PARTY Parameterized Synthesis of Token Rings (AK, SJ, RB), pp. 928–933.
ASEASE-2012-YuanG #approach #clone detection #detection #named #scalability
Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
DATEDATE-2012-HansenS #multi #pipes and filters #resource management
Multi-token resource sharing for pipelined asynchronous systems (JH, MS), pp. 1191–1196.
SCAMSCAM-2012-MurakamiHHIK #clone detection #detection
Folding Repeated Instructions for Improving Token-Based Code Clone Detection (HM, KH, YH, HI, SK), pp. 64–73.
CHICHI-2012-HayashiPOH #named #using
WebTicket: account management using printable tokens (EH, BAP, FO, JIH), pp. 997–1006.
CIKMCIKM-2012-PatwardhanBAMC
Labeling by landscaping: classifying tokens in context by pruning and decorating trees (SP, BB, AA, AM, JCC), pp. 1133–1142.
HCIHCD-2011-Yamane #authentication #case study #design #game studies #multi #online
Secure Online Game Play with Token: A Case Study in the Design of Multi-factor Authentication Device (SRY), pp. 597–605.
SLESLE-2011-NishimoriK #framework #game studies #programming
Join Token-Based Event Handling: A Comprehensive Framework for Game Programming (TN, YK), pp. 119–138.
DocEngDocEng-2010-CutterBSB #re-engineering
Unsupervised font reconstruction based on token co-occurrence (MPC, JvB, FS, TMB), pp. 143–150.
LATALATA-2010-VelardoD #comparison #order #petri net
Language-Based Comparison of Petri Nets with Black Tokens, Pure Names and Ordered Data (FRV, GD), pp. 524–535.
KEODKEOD-2010-Akinkunmi
Temporal Entities — Types, Tokens and Qualifications (BOA), pp. 288–294.
KRKR-2010-KleinbergM #logic
The Temporal Logic of Token Causes (SK, BM).
PADLPADL-2009-XiFWZ #ad hoc #ambiguity #problem
Ad Hoc Data and the Token Ambiguity Problem (QX, KF, DW, KQZ), pp. 91–106.
SIGIRSIGIR-2008-Nguyen #approach #preprocessor #query #web #word
Query preprocessing: improving web search through a Vietnamese word tokenization approach (DN), pp. 765–766.
HPDCHPDC-2008-NathujiS #virtual machine
Vpm tokens: virtual machine-aware power budgeting in datacenters (RN, KS), pp. 119–128.
DACDAC-2007-CortadellaK #evaluation
Synchronous Elastic Circuits with Early Evaluation and Token Counterflow (JC, MK), pp. 416–419.
VLDBVLDB-2007-VoM #linear #named
RadixZip: Linear-Time Compression of Token Streams (BV, GSM), pp. 1162–1172.
HCIHCI-IPT-2007-DahlS #interactive #towards #visualisation
Visualizing Interaction in Digitally Augmented Spaces: Steps Toward a Formalism for Location-Aware and Token-Based Interactive Systems (YD, DS), pp. 569–578.
SIGIRSIGIR-2007-TrieschniggKJ #documentation #retrieval
The influence of basic tokenization on biomedical document retrieval (DT, WK, FdJ), pp. 803–804.
ESEC-FSEESEC-FSE-2007-BasitJ #clone detection #detection #flexibility #performance
Efficient token based clone detection with flexible tokenization (HAB, SJ), pp. 513–516.
HPCAHPCA-2007-MeixnerS #detection #fault #online
Error Detection via Online Checking of Cache Coherence with Token Coherence Signatures (AM, DJS), pp. 145–156.
CASECASE-2006-LeeLS #clustering #graph
Token delays and generalized workload balancing for timed event graphs with application to cluster tool operation (TEL, HYL, RSS), pp. 93–99.
HPCAHPCA-2005-MartyBHHMW #multi #using
Improving Multiple-CMP Systems Using Token Coherence (MRM, JDB, MDH, AJH, MMKM, DAW), pp. 328–339.
TLCATLCA-2005-Sinot #call-by #interactive
Call-by-Name and Call-by-Value as Token-Passing Interaction Nets (FRS), pp. 386–400.
VMCAIVMCAI-2005-BurckhardtAM #composition #implementation #parametricity #refinement #safety #verification
Verifying Safety of a Token Coherence Implementation by Parametric Compositional Refinement (SB, RA, MMKM), pp. 130–145.
DATEDATE-v1-2004-HeathBH #named #nondeterminism
Synchro-Tokens: Eliminating Nondeterminism to Enable Chip-Level Test of Globally-Asynchronous Locally-Synchronous SoC?s (MWH, WPB, IGH), pp. 410–415.
ASEASE-2001-Denney #algorithm #java #synthesis
The Synthesis of a Java Card Tokenization Algorithm (ED), pp. 43–50.
DATEDATE-2001-CichonB #data type #network
Annotated data types for addressed token passing networks (GC, WB), p. 801.
TLCATLCA-2001-Laurent #geometry #interactive
A Token Machine for Full Geometry of Interaction (OL), pp. 283–297.
ICPRICPR-v3-2000-Ichimura00a #3d #feature model
Token Grouping Based on 3D Motion and Feature Selection in Object Tracking (NI), pp. 7130–7136.
CIAAWIA-1998-MaurelPR #automaton #predict
The Syntactic Prediction with Token Automata: Application to HandiAS System (DM, BLP, OR), pp. 100–109.
SACSAC-1997-Maddi #problem
Token based solutions to M resources allocation problem (AM), pp. 340–344.
ICALPICALP-1993-HeideOW #adaptation
Strongly Adaptive Token Distribution (FMadH, BO, RW), pp. 398–409.
ICALPICALP-1992-BroderFSU
Near-perfect Token Distribution (AZB, AMF, ES, EU), pp. 308–317.
PODSPODS-1990-TamH #fine-grained #migration #transaction
Token Transactions: Managing Fine-Grained Migration of Data (VOT, MH), pp. 344–356.
SIGMODSIGMOD-1986-Motro #query
Constructing Queries from Tokens (AM), pp. 120–131.
ICLPSLP-1984-CiepielewskiH84 #process
Control of Activities in the Or-Parallel Token Machine (AC, SH), pp. 49–57.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.