BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (85)
use (78)
model (75)
logic (52)
call (51)

Stem valu$ (all stems)

764 papers:

DACDAC-2015-ChangHLW #analysis #encoding #functional #named
TA-FTA: transition-aware functional timing analysis with a four-valued encoding (JCCC, RHMH, LYZL, CHPW), p. 6.
DACDAC-2015-TziantzioulisGF #correlation #fault #float #integer #named
b-HiVE: a bit-level history-based error model with value correlation for voltage-scaled integer and floating point units (GT, AMG, SMF, NH, SOM, SP), p. 6.
DRRDRR-2015-XuS
Missing value imputation: with application to handwriting data (ZX, SNS).
HTHT-2015-JainKJ #network #online #social
Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks (PJ, PK, AJ), pp. 247–255.
VLDBVLDB-2015-AhmadK #distributed
Compaction Management in Distributed Key-Value Datastores (MYA, BK), pp. 850–861.
VLDBVLDB-2015-MullerG #abstract interpretation #sql
Provenance for SQL through Abstract Interpretation: Value-less, but Worthwhile (TM, TG), pp. 1872–1883.
VLDBVLDB-2015-ZhangWYGLZ #in memory #named #throughput
Mega-KV: A Case for GPUs to Maximize the Throughput of In-Memory Key-Value Stores (KZ, KW, YY, LG, RL, XZ), pp. 1226–1237.
TACASTACAS-2015-CassezMPS #composition #contest #named #refinement
Perentie: Modular Trace Refinement and Selective Value Tracking — (Competition Contribution) (FC, TM, EP, NS), pp. 439–442.
TACASTACAS-2015-ChistikovDM #approximate #estimation #probability #smt #source code
Approximate Counting in SMT and Value Estimation for Probabilistic Programs (DVC, RD, RM), pp. 320–334.
TACASTACAS-2015-KumarSK #concept #scalability #slicing
Value Slice: A New Slicing Concept for Scalable Property Checking (SK, AS, UPK), pp. 101–115.
SANERSANER-2015-MattsenWS #abstract domain #analysis
A non-convex abstract domain for the value analysis of binaries (SM, AW, SS), pp. 271–280.
SCAMSCAM-2015-BanerjeeMS #equivalence #framework #validation
A translation validation framework for symbolic value propagation based equivalence checking of FSMDAs (KB, CAM, DS), pp. 247–252.
STOCSTOC-2015-BravermanG #game studies #parallel
Small Value Parallel Repetition for General Games (MB, AG), pp. 335–340.
ICALPICALP-v1-2015-FullaZ #constraints #infinity
A Galois Connection for Valued Constraint Languages of Infinite Size (PF, SZ), pp. 517–528.
ICALPICALP-v1-2015-HuangL #approximate #combinator #optimisation #probability #problem
Approximating the Expected Values for Combinatorial Optimization Problems over Stochastic Points (LH, JL), pp. 910–921.
ICALPICALP-v1-2015-KozikO #algebra #constraints #problem
Algebraic Properties of Valued Constraint Satisfaction Problem (MK, JO), pp. 846–858.
ICALPICALP-v1-2015-ThapperZ
Sherali-Adams Relaxations for Valued CSPs (JT, SZ), pp. 1058–1069.
CHICHI-2015-BowserHMC #experience #on the
On Vintage Values: The Experience of Secondhand Fashion Reacquisition (AEB, OLH, EFM, EFC), pp. 897–906.
CHICHI-2015-ShihBHC
Unequal Time for Unequal Value: Implications of Differing Motivations for Participation in Timebanking (PCS, VB, KH, JMC), pp. 1075–1084.
CSCWCSCW-2015-CarrollB #design #peer-to-peer
Creating Value Together: The Emerging Design Space of Peer-to-Peer Currency and Exchange (JMC, VB), pp. 1500–1510.
CSCWCSCW-2015-FerreiraPS #social
Spending Time with Money: From Shared Values to Social Connectivity (JF, MJP, SS), pp. 1222–1234.
CSCWCSCW-2015-MarshallS #facebook #persistent
Exploring the Ownership and Persistent Value of Facebook Content (CCM, FMSI), pp. 712–723.
CSCWCSCW-2015-WangWWSZZZ #collaboration
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms (GW, TW, BW, DS, ZZ, HZ, BYZ), pp. 17–30.
CSCWCSCW-2015-ZyskowskiMBGK #challenge #comprehension #people
Accessible Crowdwork?: Understanding the Value in and Challenge of Microtask Employment for People with Disabilities (KZ, MRM, JPB, MLG, SKK), pp. 1682–1693.
HCIDUXU-IXD-2015-SuzukiCTO
Hidden Presence: Sensing Occupancy and Extracting Value from Occupancy Data (LS, PC, TT, GCO), pp. 412–424.
HCIHIMI-IKC-2015-KimitaMMNIS #education #learning
Learning State Model for Value Co-Creative Education Services (KK, KM, SM, YN, TI, YS), pp. 341–349.
HCIHIMI-IKD-2015-ZhangA #game studies #mobile #research
The Research of the Influence of Customer Perceived Value to Customer Satisfaction in Mobile Games (KZ, YA), pp. 678–687.
ICEISICEIS-v2-2015-BaldassarreBCV #metric
Tracking Project Progress with Earned Value Management Metrics — A Real Case (MTB, NB, DC, GV), pp. 502–508.
ICEISICEIS-v2-2015-Boon-itt #quality #self
Managing Service Quality of Self-Service Technologies to Enhance e-Satisfaction in Digital Banking Context — The Roles of Technology Readiness and Perceived Value (SBi), pp. 602–609.
ICEISICEIS-v3-2015-BagheriKT #information management #network #social
Business-IT Alignment in PSS Value Networks — Linking Customer Knowledge Management to Social Customer Relationship Management (SB, RJK, JJMT), pp. 249–257.
ICMLICML-2015-KimXVS #process
Manifold-valued Dirichlet Processes (HJK, JX, BCV, VS), pp. 1199–1208.
ICMLICML-2015-SchaulHGS #approximate
Universal Value Function Approximators (TS, DH, KG, DS), pp. 1312–1320.
KDDKDD-2015-DevooghtKM #matrix
Dynamic Matrix Factorization with Priors on Unknown Values (RD, NK, AM), pp. 189–198.
MLDMMLDM-2015-IshayH #algorithm #clustering #integration #novel
A Novel Algorithm for the Integration of the Imputation of Missing Values and Clustering (RBI, MH), pp. 115–129.
MLDMMLDM-2015-KarkkainenS #analysis #component #robust
Robust Principal Component Analysis of Data with Missing Values (TK, MS), pp. 140–154.
SEKESEKE-2015-MatturroFR #agile #bibliography
Soft Skills in Scrum Teams. A survey of the most valued to have by Product Owners and Scrum Masters (GM, CF, FR), pp. 42–45.
SIGIRSIGIR-2015-Paik #information retrieval #probability
A Probabilistic Model for Information Retrieval Based on Maximum Value Distribution (JHP), pp. 585–594.
SIGIRSIGIR-2015-SpirinKKSI #metric #optimisation #quality #tuple
Relevance-aware Filtering of Tuples Sorted by an Attribute Value via Direct Optimization of Search Quality Metrics (NVS, MK, JK, YVS, PAI), pp. 979–982.
MoDELSMoDELS-2015-AhmarGDP #communication #modelling #uml #visual notation
Enhancing the communication value of UML models with graphical layers (YEA, SG, CD, XLP), pp. 64–69.
PPDPPPDP-2015-RondogiannisT #logic programming #using
Expressing preferences in logic programming using an infinite-valued logic (PR, AT), pp. 208–219.
REFSQREFSQ-2015-HarbersDN #process #requirements
Embedding Stakeholder Values in the Requirements Engineering Process (MH, CD, MAN), pp. 318–332.
SACSAC-2015-MinHJCH #distributed #performance #process #scalability
An efficient backup-recovery technique to process large data in distributed key-value store (DM, TH, JJ, YC, JH), pp. 2072–2074.
SACSAC-2015-PapeBH #adaptation #data type #execution #optimisation #performance
Adaptive just-in-time value class optimization: transparent data structure inlining for fast execution (TP, CFB, RH), pp. 1970–1977.
SACSAC-2015-RafailidisM #image #parallel #similarity
Parallel similarity search based on the dimensions value cardinalities of image descriptor vectors (DR, YM), pp. 1023–1030.
ESEC-FSEESEC-FSE-2015-GhaisasMBGKV #automation #security #towards
Towards automating the security compliance value chain (SG, MM, BB, AG, RK, HMV), pp. 1014–1017.
ESEC-FSEESEC-FSE-2015-SenNGC #execution #multi #named #summary #symbolic computation #using
MultiSE: multi-path symbolic execution using value summaries (KS, GCN, LG, WC), pp. 842–853.
ICSEICSE-v2-2015-BarnBR #on the #re-engineering
On the Role of Value Sensitive Concerns in Software Engineering Practice (BSB, RB, FR), pp. 497–500.
SPLCSPLC-2015-0002Z #agile #approach
Lean variation management: increasing business value with a diversified approach (MB, BZ), p. 385.
HPCAHPCA-2015-PeraisS #effectiveness #framework #named #predict
BeBoP: A cost effective predictor infrastructure for superscalar value prediction (AP, AS), pp. 13–25.
SOSPSOSP-2015-TsaiZRJZP #file system #how
How to get more value from your file system directory cache (CcT, YZ, JR, YJ, TZ, DEP), pp. 441–456.
CSLCSL-2015-DawarW #finite
A Definability Dichotomy for Finite Valued CSPs (AD, PW), pp. 60–77.
ICSTICST-2015-BaiSP #fault #named #using
NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model (ZB, GS, AP), pp. 1–10.
TLCATLCA-2015-GuerrieriPR #call-by #standard #λ-calculus
Standardization of a Call-By-Value λ-Calculus (GG, LP, SRDR), pp. 211–225.
VMCAIVMCAI-2015-Ferrara0N #automation
Automatic Inference of Heap Properties Exploiting Value Domains (PF, PM, MN), pp. 393–411.
DACDAC-2014-GebalaMMRT #on the #using
On Using Implied Values in EDT-based Test Compression (MG, GM, NM, JR, JT), p. 6.
DATEDATE-2014-DuanW
Exploiting narrow-width values for improving non-volatile cache lifetime (GD, SW), pp. 1–4.
DATEDATE-2014-SongDY #analysis #bound #multi #order #parametricity #performance #reduction
Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
HTHT-2014-TangHL #social #social media #trust
Is distrust the negation of trust?: the value of distrust in social media (JT, XH, HL), pp. 148–157.
ESOPESOP-2014-CrubilleL #bisimulation #call-by #on the #probability #λ-calculus
On Probabilistic Applicative Bisimulation and Call-by-Value λ-Calculi (RC, UDL), pp. 209–228.
ESOPESOP-2014-UrbanM #abstract domain #ranking
An Abstract Domain to Infer Ordinal-Valued Ranking Functions (CU, AM), pp. 412–431.
FoSSaCSFoSSaCS-2014-CarraroG #call-by #semantics
A Semantical and Operational Account of Call-by-Value Solvability (AC, GG), pp. 103–118.
FoSSaCSFoSSaCS-2014-Tsukada0 #call-by #complexity #model checking #source code
Complexity of Model-Checking Call-by-Value Programs (TT, NK), pp. 180–194.
TACASTACAS-2014-LoweMW #analysis #contest
CPAchecker with Sequential Combination of Explicit-Value Analyses and Predicate Analyses — (Competition Contribution) (SL, MUM, PW), pp. 392–394.
SASSAS-2014-ChenLMKW #abstract domain #constraints
An Abstract Domain to Infer Octagonal Constraints with Absolute Value (LC, JL, AM, DK, JW), pp. 101–117.
CHICHI-2014-DurrantKR
Human values in curating a human rights media archive (AD, DSK, SR), pp. 2685–2694.
CHICHI-2014-HsiehCMN #comprehension #what
You read what you value: understanding personal values and reading interests (GH, JC, JM, JN), pp. 983–986.
CHICHI-2014-VoidaDHM #logic
Shared values/conflicting logics: working around e-government systems (AV, LD, GRH, MM), pp. 3583–3592.
CHICHI-2014-ZhaoL #comprehension #social #social media
Curation through use: understanding the personal value of social media (XZ, SEL), pp. 2431–2440.
CSCWCSCW-2014-ChenHMN #comprehension #social #social media #word
Understanding individuals’ personal values from social media word use (JC, GH, JM, JN), pp. 405–414.
CSCWCSCW-2014-LivingstonGMB #how
How players value their characters in world of warcraft (IJL, CG, RLM, MB), pp. 1333–1343.
CSCWCSCW-2014-ShiltonKF #how #social
How to see values in social computing: methods for studying values dimensions (KS, JAK, KRF), pp. 426–435.
HCIDUXU-DP-2014-HamachiTN #integration #process #quality
Activities to Improve System Integration and Service Quality and Add Additional Values — Reducing the Cost in Applying Human-Centered-Design Process (RH, IT, HN), pp. 32–38.
HCIDUXU-ELAS-2014-KamiyaKASNMF #design #using
Timeaxis Design of a Service System Growing Values of Mobility Using the M-V Model (KK, AK, JA, KS, HN, YM, SF), pp. 281–292.
HCIHCI-AS-2014-KwiatkowskaSL #design
Design Artefacts as Business Decision Prompts: Tackling the Design and Business Values Gap (JK, AS, DL), pp. 721–730.
HCIHCI-TMT-2014-PereiraB #comprehension #concept #design
Value Pie: A Culturally Informed Conceptual Scheme for Understanding Values in Design (RP, MCCB), pp. 122–133.
HCIHIMI-AS-2014-MatsuiHKA #behaviour #case study #education #learning
A Study on Exploration of Relationships between Behaviors and Mental States of Learners for Value Co-creative Education and Learning Environment (TM, YH, KK, TA), pp. 69–79.
HCIHIMI-AS-2014-Sakurai #education
The Value Improvement in Education Service by Grasping the Value Acceptance State with ICT Utilized Education Environment (YS), pp. 90–98.
HCIHIMI-DE-2014-BonacinRHPB #aspect-oriented #collaboration #comprehension #social
Understanding Pragmatic Aspects with Social Values in Web-Mediated Collaborative Systems (RB, JCdR, HHH, RP, MCCB), pp. 471–482.
HCIHIMI-DE-2014-ChangT #case study
A Study of the Factors Affecting Product Values and Preferences-Using Vacuum Cleaner as an Example (WcC, HyT), pp. 561–571.
ICEISICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process
Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
ICEISICEIS-v3-2014-BenaijaK #risk management
Trade off Between Risk Management, Value Creation and Strategic Alignment in Project Portfolio Management (KB, LK), pp. 447–452.
ICEISICEIS-v3-2014-SinghJIS #architecture #enterprise #modelling
Modeling Value Creation with Enterprise Architecture (PMS, HJ, MEI, MvS), pp. 343–351.
CIKMCIKM-2014-TakayamaTIOFC #detection #probability
A Word-Scale Probabilistic Latent Variable Model for Detecting Human Values (YT, YT, EI, DWO, KRF, ASC), pp. 1489–1498.
ICMLICML-c1-2014-MannM #approximate #policy #scalability
Scaling Up Approximate Value Iteration with Options: Better Policies with Fewer Iterations (TAM, SM), pp. 127–135.
ICPRICPR-2014-GhoraiC #algorithm #composition #higher-order #image #using
An Image Inpainting Algorithm Using Higher Order Singular Value Decomposition (MG, BC), pp. 2867–2872.
KDDKDD-2014-AnagnostopoulosT #big data #scalability
Scaling out big data missing value imputations: pythia vs. godzilla (CA, PT), pp. 651–660.
KDDKDD-2014-ChenC #incremental #named #rank #set
LWI-SVD: low-rank, windowed, incremental singular value decompositions on time-evolving data sets (XC, KSC), pp. 987–996.
KMISKMIS-2014-DaviesB #security
Determining the Value of Information Security Investments — A Decision Support System (HLD, AJCB), pp. 426–433.
KRKR-2014-BartholomewL #modelling #multi
Stable Models of Multi-Valued Formulas: Partial versus Total Functions (MB, JL).
KRKR-2014-BorgwardtDP #decidability #logic
Decidable Gödel Description Logics without the Finitely-Valued Model Property (SB, FD, RP).
MLDMMLDM-2014-UtkinZC #classification #data-driven #database #robust
A Robust One-Class Classification Model with Interval-Valued Data Based on Belief Functions and Minimax Strategy (LVU, YAZ, AIC), pp. 107–118.
SEKESEKE-2014-SouzaRS #empirical #predict #using
A Proposal for the Improvement of Project’s Cost Predictability using Earned Value Management and Historical Data of Cost — An Empirical Study (ADdS, ARR, DCSdS), pp. 729–734.
PPDPPPDP-J-2012-LagoP14 #call-by #dependent type #linear
Linear dependent types in a call-by-value scenario (UDL, BP), pp. 77–100.
RERE-2014-TohonenKM #case study #game studies
Evaluating the business value of information technology: Case study on game management system (HT, MK, TM), pp. 283–292.
SACSAC-2014-JangKCH #replication
Impacts of delayed replication on the key-value store (MJ, WK, YC, JH), pp. 1757–1758.
SACSAC-2014-LoulergueRTLH #parallel #problem
Formal derivation and extraction of a parallel program for the all nearest smaller values problem (FL, SR, JT, JL, ZH), pp. 1577–1584.
SACSAC-2014-NabeezathP #algorithm #detection #performance
Global value numbering for redundancy detection: a simple and efficient algorithm (SN, VP), pp. 1609–1611.
ICSEICSE-2014-LetierSB #architecture #nondeterminism #requirements
Uncertainty, risk, and information value in software requirements and architecture (EL, DS, ETB), pp. 883–894.
ASPLOSASPLOS-2014-GutierrezCGDCM #3d #design #physics
Integrated 3D-stacked server designs for increasing physical density of key-value stores (AG, MC, BG, RGD, LC, TNM), pp. 485–498.
CGOCGO-2014-YeSX #analysis #detection
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
HPCAHPCA-2014-PeraisS
Practical data value speculation for future high-end processors (AP, AS), pp. 428–439.
LICSLICS-CSL-2014-RouxP #game studies #infinity
Infinite sequential games with real-valued payoffs (SLR, AP), p. 10.
RTARTA-TLCA-2014-Schmidt-SchaussS #call-by #λ-calculus
Applicative May- and Should-Simulation in the Call-by-Value λ Calculus with AMB (MSS, DS), pp. 379–394.
VMCAIVMCAI-2014-Ferrara #abstract interpretation #analysis
Generic Combination of Heap and Value Analyses in Abstract Interpretation (PF), pp. 302–321.
VMCAIVMCAI-2014-Mine #abstract interpretation #analysis #relational #thread
Relational Thread-Modular Static Value Analysis by Abstract Interpretation (AM), pp. 39–58.
VMCAIVMCAI-2014-SchwarzSVA #analysis #precise #source code
Precise Analysis of Value-Dependent Synchronization in Priority Scheduled Programs (MDS, HS, VV, KA), pp. 21–38.
DACDAC-2013-StratigopoulosFCM #estimation #metric #multi #statistics #using
Multidimensional analog test metrics estimation using extreme value theory and statistical blockade (HGDS, PF, YC, FM), p. 7.
DATEDATE-2013-CevreroEAILBS #estimation #performance
Fast and accurate BER estimation methodology for I/O links based on extreme value theory (AC, NEE, CA, PI, YL, AB, GIS), pp. 503–508.
DATEDATE-2013-HillebrechtKEWB #generative
Accurate QBF-based test pattern generation in presence of unknown values (SH, MAK, DE, HJW, BB), pp. 436–441.
DRRDRR-2013-KumarPR13a #composition #documentation #evaluation #using
Evaluation of document binarization using eigen value decomposition (DK, MNAP, AGR).
DRRDRR-2013-LundKR #multi
Combining multiple thresholding binarization values to improve OCR output (WBL, DJK, EKR).
ICDARICDAR-2013-SethN
Segmenting Tables via Indexing of Value Cells by Table Headers (SCS, GN), pp. 887–891.
SIGMODSIGMOD-2013-ArocenaGM
Value invention in data exchange (PCA, BG, RJM), pp. 157–168.
SIGMODSIGMOD-2013-CaiVPAHJ #markov #simulation #using
Simulation of database-valued markov chains using SimSQL (ZC, ZV, LLP, SA, PJH, CMJ), pp. 637–648.
VLDBVLDB-2013-Dey #scalability #transaction
Scalable Transactions across Heterogeneous NoSQL Key-Value Data Stores (AD), pp. 1434–1439.
VLDBVLDB-2013-Franceschini #approach #big data #how #open source
How to maximize the value of big data with the open source SpagoBI suite through a comprehensive approach (MF), pp. 1170–1171.
FoSSaCSFoSSaCS-2013-ChurchillM #bisimulation #composition
Modular Bisimulation Theory for Computations and Values (MC, PDM), pp. 97–112.
TACASTACAS-2013-Lowe #analysis #contest
CPAchecker with Explicit-Value Analysis Based on CEGAR and Interpolation — (Competition Contribution) (SL), pp. 610–612.
SASSAS-2013-BlazyLMP #abstract interpretation #analysis #c #verification
Formal Verification of a C Value Analysis Based on Abstract Interpretation (SB, VL, AM, DP), pp. 324–344.
STOCSTOC-2013-ThapperZ #complexity
The complexity of finite-valued CSPs (JT, SZ), pp. 695–704.
ICALPICALP-v1-2013-Kolmogorov #linear #power of #programming
The Power of Linear Programming for Finite-Valued CSPs: A Constructive Characterization (VK), pp. 625–636.
LATALATA-2013-HashimotoSISF #bottom-up #transducer
Determinacy and Subsumption for Single-Valued Bottom-Up Tree Transducers (KH, RS, YI, HS, TF), pp. 335–346.
CHICHI-2013-GulottaOFF #legacy
Digital artifacts as legacy: exploring the lifespan and value of digital data (RG, WO, JF, HF), pp. 1813–1822.
CHICHI-2013-MatthewsWBSMEZL #community #enterprise #online
Community insights: helping community leaders enhance the value of enterprise online communities (TM, SW, HB, BAS, MM, KE, MXZ, TL), pp. 513–522.
CHICHI-2013-YooHWHF #co-evolution #design #evolution
A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts (DY, AH, JPW, DGH, BF), pp. 419–428.
HCIHCI-AS-2013-HuaG #comprehension #difference #evaluation #predict #protocol #safety #usability
Usability Evaluation of a Voluntary Patient Safety Reporting System: Understanding the Difference between Predicted and Observed Time Values by Retrospective Think-Aloud Protocols (LH, YG), pp. 94–100.
HCIHCI-III-2013-ShojiOKO #case study
A Study on Combinative Value Creation in Songs Selection (HS, JO, KK, AO), pp. 372–380.
HCIHIMI-LCCB-2013-GuoZSP #axiom #usability
Value Added by the Axiomatic Usability Method for Evaluating Consumer Electronics (YG, YZ, GS, RWP), pp. 457–466.
HCIOCSC-2013-HallCW #approach #community #predict
Well-Being’s Predictive Value — A Gamified Approach to Managing Smart Communities (MH, SC, CW), pp. 13–22.
EDOCEDOC-2013-ValjaOISJ #modelling #predict
Modeling and Prediction of Monetary and Non-monetary Business Values (MV, , MEI, MvS, PJ), pp. 153–158.
EDOCEDOC-2013-VicenteGS #architecture #enterprise
The Value of ITIL in Enterprise Architecture (MV, NG, MMdS), pp. 147–152.
ICEISICEIS-v1-2013-LaurierP #concept #representation
An Enterprise-ontology based Conceptual-modeling Grammar for Representing Value Chain and Supply Chain Scripts (WL, GP), pp. 103–111.
ICEISICEIS-v2-2013-Abbo #approach
The Analytical Approach to Information Value Management (DA), pp. 549–554.
ICEISICEIS-v2-2013-OBrienSH #framework #quality
The Value of Good Data — A Quality Perspective — A Framework for Discussion (TO, AS, MH), pp. 555–562.
ICEISICEIS-v3-2013-GeorgeF #architecture #enterprise
Enterprise Architecture Value Model (EG, GF), pp. 376–381.
ICMLICML-c1-2013-KrauseFGI #approximate
Approximation properties of DBNs with binary hidden units and real-valued visible units (OK, AF, TG, CI), pp. 419–426.
ICMLICML-c2-2013-MinhBM #framework #learning #multi
A unifying framework for vector-valued manifold regularization and multi-view learning (HQM, LB, VM), pp. 100–108.
ICMLICML-c3-2013-BrechtelGD #incremental #learning #performance #representation
Solving Continuous POMDPs: Value Iteration with Incremental Learning of an Efficient Space Representation (SB, TG, RD), pp. 370–378.
SEKESEKE-2013-PereiraAS #data access #policy #relational #runtime
Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
SACSAC-2013-KinderenP #approach #named
e3RoME: a value-based approach for method bundling (SdK, HAP), pp. 1469–1471.
SACSAC-2013-LikitvivatanavongY #set
Many-to-many interchangeable sets of values in CSPs (CL, RHCY), pp. 86–91.
ICSEICSE-2013-Kukreja #approach #requirements #towards
Decision theoretic requirements prioritization: a two-step approach for sliding towards value realization (NK), pp. 1465–1467.
ICSEICSE-2013-SayyadMA #case study #on the #product line #re-engineering #search-based
On the value of user preferences in search-based software engineering: a case study in software product lines (ASS, TM, HA), pp. 492–501.
CGOCGO-2013-CostaASP
Just-in-time value specialization (IRdAC, PROA, HNS, FMQP), p. 11.
HPDCHPDC-2013-Al-ShishtawyV #named
ElastMan: autonomic elasticity manager for cloud-based key-value stores (AAS, VV), pp. 115–116.
ISMMISMM-2013-LiCK #analysis #graph #pointer #precise #scalability
Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
ISSTAISSTA-2013-SteimannFA #empirical #fault
Threats to the validity and value of empirical assessments of the accuracy of coverage-based fault locators (FS, MF, RA), pp. 314–324.
CASECASE-2012-ChenF #analysis #rule-based
Treatment of missing values for association rule-based tool commonality analysis in semiconductor manufacturing (RHC, CMF), pp. 886–891.
CASECASE-2012-DongNL #industrial #modelling
A new ELM based on interval-value for modeling in industry systems (MD, KN, ML), pp. 869–873.
CASECASE-2012-DotoliFIR #agile #modelling #simulation #using
A lean manufacturing strategy using Value Stream Mapping, the Unified Modeling Language, and discrete event simulation (MD, MPF, GI, GR), pp. 668–673.
CASECASE-2012-HN #approach #multi #network #social
Influence limitation in multi-campaign social networks: A Shapley value based approach (PRH, YN), pp. 735–740.
DACDAC-2012-KongC #3d #process
Exploiting narrow-width values for process variation-tolerant 3-D microprocessors (JK, SWC), pp. 1197–1206.
SIGMODSIGMOD-2012-TatemuraPHH #named #sql
Partiqle: an elastic SQL engine over key-value stores (JT, OP, WPH, HH), pp. 629–632.
SIGMODSIGMOD-2012-Vaithyanathan #enterprise #social #social media
The value of social media data in enterprise applications (SV), pp. 755–756.
FLOPSFLOPS-2012-AccattoliP #call-by #revisited
Call-by-Value Solvability, Revisited (BA, LP), pp. 4–16.
ICALPICALP-v1-2012-DeDS #problem
The Inverse Shapley Value Problem (AD, ID, RAS), pp. 266–277.
ICALPICALP-v2-2012-BojanczykP12a #towards
Toward Model Theory with Data Values (MB, TP), pp. 116–127.
SEFMSEFM-2012-FerraraFJ #analysis
TVAL+ : TVLA and Value Analyses Together (PF, RF, UJ), pp. 63–77.
SEFMSEFM-2012-VorobyovKS #approach #data flow #security
A Low-Overhead, Value-Tracking Approach to Information Flow Security (KV, PK, PS), pp. 367–381.
CHICHI-2012-BorningM #design
Next steps for value sensitive design (AB, MM), pp. 1125–1134.
CHICHI-2012-BrechtEBG #analysis #network #social
Corporate career presences on social network sites: an analysis of hedonic and utilitarian value (FB, AE, CB, OG), pp. 2441–2450.
CHICHI-2012-LampeVGE #facebook
Perceptions of facebook’s value as an information source (CL, JV, RG, NBE), pp. 3195–3204.
CHICHI-2012-WaernBN #community #design #game studies
Athletes and street acrobats: designing for play as a community value in parkour (AW, EB, KJLN), pp. 869–878.
CSCWCSCW-2012-AndreBL #microblog #twitter
Who gives a tweet?: evaluating microblog content value (PA, MSB, KL), pp. 471–474.
CSCWCSCW-2012-PriedhorskyPST #algorithm #evaluation #personalisation #recommendation
Recommending routes in the context of bicycling: algorithms, evaluation, and the value of personalization (RP, DP, SS, LGT), pp. 979–988.
CSCWCSCW-2012-VasalouOJ #case study #product line
A case study of non-adoption: the values of location tracking in the family (AV, AMO, ANJ), pp. 779–788.
CAiSECAiSE-2012-Razo-ZapataLGA #fuzzy #network #verification
Fuzzy Verification of Service Value Networks (ISRZ, PDL, JG, HA), pp. 95–110.
EDOCEDOC-2012-IacobQJ #architecture #enterprise
Capturing Business Strategy and Value in Enterprise Architecture to Support Portfolio Valuation (MEI, DACQ, HJ), pp. 11–20.
ICEISICEIS-J-2012-PereiraBB12a #aspect-oriented #design #process
Values and Cultural Aspects in Design: Artifacts for Making Them Explicit in Design Activities (RP, SBB, MCCB), pp. 358–375.
ICEISICEIS-v2-2012-LukaszewskiJL #data mining #mining #ontology #semantics #using
Attribute Value Ontology — Using Semantics in Data Mining (TL, JJ, AL), pp. 329–334.
ICEISICEIS-v3-2012-PereiraBB #design
Keeping Values in Mind — Artifacts for a Value-oriented and Culturally Informed Design (RP, SBB, MCCB), pp. 25–34.
ICEISICEIS-v3-2012-TsudaASO #automation #classification
A Classification Method of Inquiry e-Mails for Describing FAQ with Automatic Setting Mechanism of Judgment Threshold Values (YT, MA, MS, HO), pp. 199–205.
CIKMCIKM-2012-QinZWWZH #migration #optimisation
Optimizing data migration for cloud-based key-value stores (XQ, WZ, WW, JW, XZ, TH), pp. 2204–2208.
ICMLICML-2012-KolarX #consistency
Consistent Covariance Selection From Data With Missing Values (MK, EPX), p. 85.
ICMLICML-2012-LiuL #modelling #multi #named
Sparse-GEV: Sparse Latent Space Model for Multivariate Extreme Value Time Serie Modeling (YL, MTB, HL), p. 156.
ICPRICPR-2012-Capitaine #equivalence #probability
Set-valued Bayesian inference with probabilistic equivalence (HLC), pp. 2132–2135.
ICPRICPR-2012-FengKCWP #automation #multi
Automatic face annotation by multilinear AAM with Missing Values (ZHF, JK, WJC, XW, SP), pp. 2586–2589.
ICPRICPR-2012-LiVBB #clustering #learning #using
Feature learning using Generalized Extreme Value distribution based K-means clustering (ZL, OV, HB, RB), pp. 1538–1541.
ICPRICPR-2012-MujumdarVK #framework #multi #novel #segmentation #using
A novel framework for segmentation of stroke lesions in Diffusion Weighted MRI using multiple b-value data (SM, RV, LTK), pp. 3762–3765.
KDDKDD-2012-AndersonHKL #case study #community #process #stack overflow
Discovering value from community activity on focused question answering sites: a case study of stack overflow (AA, DPH, JMK, JL), pp. 850–858.
KDDKDD-2012-HuZLYH #matrix
Accelerated singular value thresholding for matrix completion (YH, DZ, JL, JY, XH), pp. 298–306.
KDDKDD-2012-XueKRVT
Anonymizing set-valued data by nonreciprocal recoding (MX, PK, CR, JV, KLT), pp. 1050–1058.
RecSysRecSys-2012-BellufXG #case study #online #personalisation #recommendation #scalability
Case study on the business value impact of personalized recommendations on a large online retailer (TB, LX, RG), pp. 277–280.
SEKESEKE-2012-SouzaR #performance
A proposal for the improvement of the technique of Earned Value Management utilizing the history of performance data (ADdS, ARCdR), pp. 753–758.
SIGIRSIGIR-2012-MishneL #case study #twitter
Twanchor text: a preliminary study of the value of tweets as anchor text (GM, JL), pp. 1159–1160.
PPDPPPDP-2012-LagoP #call-by #dependent type #linear
Linear dependent types in a call-by-value scenario (UDL, BP), pp. 115–126.
RERE-2012-KukrejaBPP #framework #requirements
Selecting an appropriate framework for value-based requirements prioritization (NK, BWB, SSP, SP), pp. 303–308.
SACSAC-2012-IencoPPT #automation #taxonomy #towards
Towards an automatic construction of Contextual Attribute-Value Taxonomies (DI, YP, PP, MT), pp. 113–118.
FSEFSE-2012-BirdZ #analysis #branch
Assessing the value of branches with what-if analysis (CB, TZ), p. 45.
FSEFSE-2012-BookGG #interactive
Seeing the forest and the trees: focusing team interaction on value and effort drivers (MB, SG, VG), p. 30.
PLEASEPLEASE-2012-HuYWRW #case study #industrial
Value-based portfolio scoping: an industrial case study (JH, YY, QW, GR, HW), pp. 45–48.
PLEASEPLEASE-2012-LiY #product line
Enhance value by building trustworthy software-reliant system of systems from software product lines (DL, YY), pp. 13–16.
CCCC-2012-FarooqCJ #branch #compilation #predict
Compiler Support for Value-Based Indirect Branch Prediction (MUF, LC, LKJ), pp. 185–199.
ICLPICLP-2012-Lifschitz #logic programming #source code
Two-Valued Logic Programs (VL), pp. 259–266.
ICLPICLP-J-2012-LifschitzPY #modelling #null #relational
Relational theories with null values and non-herbrand stable models (VL, KP, FY), pp. 565–582.
ICSTICST-2012-PonsiniMR #abstract interpretation #analysis #constraints #float #programming #source code
Combining Constraint Programming and Abstract Interpretation for Value Analysis of Floating-point Programs (OP, CM, MR), pp. 775–776.
IJCARIJCAR-2012-BaazLZ #calculus #effectiveness #semantics
Effective Finite-Valued Semantics for Labelled Calculi (MB, OL, AZ), pp. 52–66.
ISSTAISSTA-2012-SuiYX #analysis #detection #memory management #using
Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
LICSLICS-2012-FijalkowGO #automaton #probability #problem
Deciding the Value 1 Problem for Probabilistic Leaktight Automata (NF, HG, YO), pp. 295–304.
LICSLICS-2012-Hoshino #call-by #combinator #semantics
Step Indexed Realizability Semantics for a Call-by-Value Language Based on Basic Combinatorial Objects (NH), pp. 385–394.
LICSLICS-2012-Tan #automaton #order
An Automata Model for Trees with Ordered Data Values (TT), pp. 586–595.
CBSECBSE-2011-LevequeS #component #modelling
Refining extra-functional property values in hierarchical component models (TL, SS), pp. 83–92.
ASEASE-2011-Halfond #web
Domain and value checking of web application invocation arguments (WGJH), pp. 544–547.
DATEDATE-2011-KochteW #evaluation #fault #satisfiability
SAT-based fault coverage evaluation in the presence of unknown values (MAK, HJW), pp. 1303–1308.
SIGMODSIGMOD-2011-DebnathSL #named #ram
SkimpyStash: RAM space skimpy key-value store on flash-based storage (BKD, SS, JL), pp. 25–36.
VLDBVLDB-2011-ChenMFDX #difference #privacy
Publishing Set-Valued Data via Differential Privacy (RC, NM, BCMF, BCD, LX), pp. 1087–1098.
ESOPESOP-2011-ChenMWC #analysis #linear
Linear Absolute Value Relation Analysis (LC, AM, JW, PC), pp. 156–175.
PLDIPLDI-2011-TristanGM #validation
Evaluating value-graph translation validation for LLVM (JBT, PG, GM), pp. 295–305.
CIAACIAA-2011-BechetDF #strict
Categorial Grammars with Iterated Types form a Strict Hierarchy of k-Valued Languages (DB, AJD, AF), pp. 42–52.
ICALPICALP-v1-2011-FeigeR #independence #set
Recoverable Values for Independent Sets (UF, DR), pp. 486–497.
ICALPICALP-v2-2011-BrazdilBEK #approximate #game studies #probability #termination
Approximating the Termination Value of One-Counter MDPs and Stochastic Games (TB, VB, KE, AK), pp. 332–343.
LATALATA-2011-Huschenbett #distributed #logic #modelling #multi
Models for Quantitative Distributed Systems and Multi-Valued Logics (MH), pp. 310–322.
ICFPICFP-2011-SwamyCFSBY #dependent type #distributed #programming
Secure distributed programming with value-dependent types (NS, JC, CF, PYS, KB, JY), pp. 266–278.
AGTIVEAGTIVE-2011-BuchmannWW #case study #configuration management #graph transformation
The Added Value of Programmed Graph Transformations — A Case Study from Software Configuration Management (TB, BW, SW), pp. 198–209.
CHICHI-2011-AndersenLSSP #game studies #online
Placing a value on aesthetics in online casual games (EA, YEL, RS, RS, ZP), pp. 1275–1278.
CHICHI-2011-KimR
User perceptions of the role and value of tags (YMK, SYR), pp. 671–674.
CHICHI-2011-WoelferIHFG #mobile #people #safety
Improving the safety of homeless young people with mobile phones: values, form and function (JPW, AI, DGH, BF, BTG), pp. 1707–1716.
CSCWCSCW-2011-AlsheikhRL #case study #design #distance
(Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context (TA, JAR, SEL), pp. 75–84.
CSCWCSCW-2011-AmesGKS #comprehension #social
Understanding technology choices and values through social class (MGA, JG, JK, MS), pp. 55–64.
CSCWCSCW-2011-VertesiD
The value of data: considering the context of production in data economies (JV, PD), pp. 533–542.
HCIDUXU-v2-2011-TsengH #design #personalisation
Designing the Personalized Nostalgic Emotion Value of a Product (YST, MCH), pp. 664–672.
HCIHIMI-v2-2011-FagerstromG #empirical #facebook #network #social #using
Co-Creation of Value through Social Network Marketing: A Field Experiment Using a Facebook Campaign to Increase Conversion Rate (AF, GG), pp. 229–235.
EDOCEDOC-2011-CurleyK #case study #framework #maturity #using
Using the IT Capability Maturity Framework to Improve IT Capability and Value Creation: An Intel IT Case Study (MC, JK), pp. 107–115.
ICEISICEIS-J-2011-BorekHGP #framework
IS/IT Resources and Business Value: Operationalization of an Information Oriented Framework (AB, MH, MG, AKP), pp. 420–434.
ICEISICEIS-v1-2011-SchrodlGLT #assessment #framework #hybrid #network #risk management
Risk Management in Supply Networks for Hybrid Value Bundles — A Risk Assessment Framework (HS, MG, LL, KT), pp. 157–162.
ICEISICEIS-v1-2011-XiaoZTZC #network
A New Chinese Public Welfare Operation Mode based on Value Network Model (DX, ZZ, ZT, JZ, FC), pp. 510–514.
ICEISICEIS-v2-2011-BadarudinSSMM #algorithm #memory management #problem #representation #search-based
An Improved Genetic Algorithm with Gene Value Representation and Short Term Memory for Shape Assignment Problem (IB, ABMS, MNS, AM, MTMM), pp. 178–183.
ICEISICEIS-v2-2011-RenW #perspective
Declare Value Transportation — An Incomplete Contracting View (YR, QW), pp. 373–377.
ICEISICEIS-v3-2011-Li11c #identification #performance
An Efficient Method to Identify Customer Value in Tourist Hotel Management (CL), pp. 165–169.
ICEISICEIS-v4-2011-BorekPHG #framework
An Information Oriented Framework for Relating IS/IT Resources and Business Value (AB, AKP, MH, MG), pp. 358–367.
ECIRECIR-2011-Joachims #feedback
The Value of User Feedback (TJ), p. 6.
ICMLICML-2011-KadriRPDR #functional #kernel
Functional Regularized Least Squares Classication with Operator-valued Kernels (HK, AR, PP, ED, AR), pp. 993–1000.
ICMLICML-2011-MinhS
Vector-valued Manifold Regularization (HQM, VS), pp. 57–64.
ICMLICML-2011-PazisP #scalability #set
Generalized Value Functions for Large Action Sets (JP, RP), pp. 1185–1192.
KMISKMIS-2011-Borchardt #recommendation #towards
Towards a Value-oriented KMS Recommendation for SME (UB), pp. 347–350.
MLDMMLDM-2011-Grabczewski
Separability of Split Value Criterion with Weighted Separation Gains (KG), pp. 88–98.
RecSysRecSys-2011-XinS #matrix #multi #probability #recommendation
Multi-value probabilistic matrix factorization for IP-TV recommendations (YX, HS), pp. 221–228.
MODELSMoDELS-2011-Petre #modelling
The Value in Muddling Around Modelling (MP), p. 1.
OOPSLAOOPSLA-2011-AustinDF
Virtual values for language extension (THA, TD, CF), pp. 921–938.
RERE-2011-KomssiKTLD #analysis #perspective #process
Integrating analysis of customers’ processes into roadmapping: The value-creation perspective (MK, MK, HT, LL, AMD), pp. 57–66.
SACSAC-2011-FragidisT
Analyzing value co-creation in service systems: contribution from GORE (GF, KAT), pp. 705–707.
SACSAC-2011-MajchrzakH #game studies
Game vendors’ influence on the monetary value of virtual goods (TAM, KFH), pp. 757–764.
ESEC-FSEESEC-FSE-2011-LiCK #analysis #performance #points-to #using
Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
ESEC-FSEESEC-FSE-2011-MirghasemiBP #execution #named
Querypoint: moving backwards on wrong values in the buggy execution (SM, JJB, CP), pp. 436–439.
ICSEICSE-2011-JhiWJZLW #detection
Value-based program characterization and its application to software plagiarism detection (YcJ, XW, XJ, SZ, PL, DW), pp. 756–765.
SPLCSPLC-2011-LiW #evolution #product line
Adding Value through Software Product Line Engineering: The Evolution of the FISCAN Software Product Lines (DL, DMW), pp. 213–222.
SPLCSPLC-2011-Muller #optimisation #product line
Value-Based Portfolio Optimization for Software Product Lines (JM), pp. 15–24.
HPDCHPDC-2011-AbbasiEWSK #performance #pipes and filters
Just in time: adding value to the IO pipelines of high performance applications with JITStaging (HA, GE, MW, KS, SK), pp. 27–36.
SOSPSOSP-2011-LimFAK #named
SILT: a memory-efficient, high-performance key-value store (HL, BF, DGA, MK), pp. 1–13.
LICSLICS-2011-BokerCHK #cumulative #specification
Temporal Specifications with Accumulative Values (UB, KC, TAH, OK), pp. 43–52.
TAPTAP-2011-ChebaroKGJ #analysis #c #debugging #generative #slicing #testing
The SANTE Tool: Value Analysis, Program Slicing and Test Generation for C Program Debugging (OC, NK, AG, JJ), pp. 78–83.
ECSAECSA-2010-EklundA #architecture #classification
A Classification of Value for Software Architecture Decisions (UE, TA), pp. 368–375.
ECSAECSA-2010-IvanovicA #architecture
Customer Value in Architecture Decision Making (AI, PA), pp. 263–278.
ASEASE-2010-LoM #mining #specification
Scenario-based and value-based specification mining: better together (DL, SM), pp. 387–396.
DATEDATE-2010-GellertPZFVS #architecture #design #energy #predict #smt
Energy-performance design space exploration in SMT architectures exploiting selective load value predictions (AG, GP, VZ, AF, LNV, CS), pp. 271–274.
DATEDATE-2010-LazzariFMC #multi
A new quaternary FPGA based on a voltage-mode multi-valued circuit (CL, PFF, JM, LC), pp. 1797–1802.
HTHT-2010-HsiaoBYO #adaptation #approach #case study
The value of adaptive link annotation in e-learning: a study of a portal-based approach (IHH, PB, MY, AO), pp. 223–228.
PODSPODS-2010-FanG #tuple
Capturing missing tuples and missing values (WF, FG), pp. 169–178.
VLDBVLDB-2010-DebnathSL #named #persistent #throughput
FlashStore: High Throughput Persistent Key-Value Store (BKD, SS, JL), pp. 1414–1425.
VLDBVLDB-2010-GuoDSZ #constraints
Record Linkage with Uniqueness Constraints and Erroneous Values (SG, XD, DS, RZ), pp. 417–428.
ICSMEICSM-2010-SerebrenikB #metric
Theil index for aggregation of software metrics values (AS, MvdB), pp. 1–9.
DLTDLT-2010-DrosteV #automaton #bound #logic #multi #theorem
Kleene and Büchi Theorems for Weighted Automata and Multi-valued Logics over Arbitrary Bounded Lattices (MD, HV), pp. 160–172.
ICALPICALP-v1-2010-CaiCL #graph #morphism #theorem
Graph Homomorphisms with Complex Values: A Dichotomy Theorem (JyC, XC, PL), pp. 275–286.
ICALPICALP-v2-2010-Laird #call-by #game studies #morphism #polymorphism #semantics
Game Semantics for Call-by-Value Polymorphism (JL), pp. 187–198.
LATALATA-2010-FlorencioF #approach #bound #consistency
Finding Consistent Categorial Grammars of Bounded Value: A Parameterized Approach (CCF, HF), pp. 202–213.
IFMIFM-2010-FranzleTE #hybrid #probability #smt
Satisfaction Meets Expectations — Computing Expected Values of Probabilistic Hybrid Systems with SMT (MF, TT, AE), pp. 168–182.
CHICHI-2010-DenningBFGKM #security
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices (TD, AB, BF, BTG, TK, WHM), pp. 917–926.
CHICHI-2010-ZhangQCW #case study #enterprise
A case study of micro-blogging in the enterprise: use, value, and related issues (JZ, YQ, JC, YW), pp. 123–132.
CIKMCIKM-2010-ShiXF
Anonymizing data with quasi-sensitive attribute values (PS, LX, BCMF), pp. 1389–1392.
ICPRICPR-2010-ChenZCY #image #segmentation
Active Contours with Thresholding Value for Image Segmentation (GC, HZ, IC, WY), pp. 2266–2269.
ICPRICPR-2010-MakiharaHY #how #question
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values? (YM, MAH, YY), pp. 1208–1211.
KRKR-2010-ArieliAZ #logic
Maximally Paraconsistent Three-Valued Logics (OA, AA, AZ).
KRKR-2010-CeramiEB #decidability #logic
Decidability of a Description Logic over Infinite-Valued Product Logic (MC, FE, FB).
KRKR-2010-XiaoLMQ #consistency #metric #multi #nondeterminism #satisfiability #semantics
Computing Inconsistency Measurements under Multi-Valued Semantics by Partial Max-SAT Solvers (GX, ZL, YM, GQ).
SEKESEKE-2010-Zhang #development
Capturing Antagonistic Stakeholder Value Propositions in Value-Based Software Development (DZ), pp. 12–18.
SEKESEKE-2010-ZhangYW #question
Absent features or missing values? (WZ, YY, QW), pp. 6–11.
SIGIRSIGIR-2010-KaleBSVVGD #enterprise #named #web
iCollaborate: harvesting value from enterprise web usage (AK, TB, BS, TLPV, LV, MG, MD), p. 699.
SIGIRSIGIR-2010-OstergrenYE #visual notation #web
The value of visual elements in web search (MO, SyY, ENE), pp. 867–868.
SIGIRSIGIR-2010-WhiteH #web
Assessing the scenic route: measuring the value of search trails in web logs (RWW, JH), pp. 587–594.
REFSQREFSQ-2010-Fricker #ecosystem #requirements
Requirements Value Chains: Stakeholder Management and Requirements Engineering in Software Ecosystems (SF), pp. 60–66.
REFSQREFSQ-2010-ProynovaPWW #perspective #requirements #research
Use of Personal Values in Requirements Engineering — A Research Preview (RP, BP, AW, TW), pp. 17–22.
SACSAC-2010-BacciuBM #adaptation
Adaptive fuzzy-valued service selection (DB, MGB, LM), pp. 2467–2471.
SACSAC-2010-ColantonioPOV #adaptation #approach #clustering #matrix #named
ABBA: adaptive bicluster-based approach to impute missing values in binary matrices (AC, RDP, AO, NVV), pp. 1026–1033.
SACSAC-2010-IlayperumaZ #collaboration #modelling #perspective
Exploring business value models from the inter-organizational collaboration perspective (TI, JZ), pp. 99–105.
ICSEICSE-2010-KitchenhamBB #education #re-engineering
The educational value of mapping studies of software engineering literature (BK, PB, DB), pp. 589–598.
CCCC-2010-DingO #algorithm #representation #strict
Unrestricted Code Motion: A Program Representation and Transformation Algorithms Based on Future Values (SD, ), pp. 26–45.
HPCAHPCA-2010-FarooqCJ #predict
Value Based BTB Indexing for indirect jump prediction (MUF, LC, LKJ), pp. 1–11.
ISMMISMM-2010-TianFG #parallel #predict #using
Speculative parallelization using state separation and multiple value prediction (CT, MF, RG), pp. 63–72.
OSDIOSDI-2010-GeambasuLKKL #distributed #named
Comet: An active distributed key-value store (RG, AAL, TK, AK, HML), pp. 323–336.
LICSLICS-2010-AvronAZ #logic #on the
On Strong Maximality of Paraconsistent Finite-Valued Logics (AA, OA, AZ), pp. 304–313.
ASEASE-2009-GreenMWE #comprehension #re-engineering
Understanding the Value of Software Engineering Technologies (PGI, TM, SW, OER), pp. 52–61.
CASECASE-2009-FagioliniMB #distributed
Set-valued consensus for distributed clock synchronization (AF, SM, AB), pp. 116–121.
CASECASE-2009-SenguptaDBMD #detection #fault #modelling #using
Fault detection of Air Intake Systems of SI gasoline engines using mean value and within cycle models (SS, SD, AKB, SM, AKD), pp. 361–366.
CASECASE-2009-ViswanadhamK #network #process
Orchestrating a network of activities in the value chain (NV, SK), pp. 501–506.
DATEDATE-2009-WangHZC #design
Exploiting narrow-width values for thermal-aware register file designs (SW, JSH, SGZ, SWC), pp. 1422–1427.
VLDBVLDB-2009-HeN #top-down
Anonymization of Set-Valued Data via Top-Down, Local Generalization (YH, JFN), pp. 934–945.
VLDBVLDB-2009-KaushikS #consistency
Consistent Histograms In The Presence of Distinct Value Counts (RK, DS), pp. 850–861.
ICSMEICSM-2009-JadallahGMR
Balancing value and modifiability when planning for the next release (AJ, MG, MM, GR), pp. 495–498.
ICSMEICSM-2009-JeffreyGG #effectiveness #fault #locality #multi #performance #using
Effective and efficient localization of multiple faults using value replacement (DJ, NG, RG), pp. 221–230.
SCAMSCAM-2009-CanetCM #analysis #c #source code
A Value Analysis for C Programs (GC, PC, BM), pp. 123–124.
FMFM-2009-AlbertAGP #analysis
Field-Sensitive Value Analysis by Field-Insensitive Analysis (EA, PA, SG, GP), pp. 370–386.
FMFM-2009-SchriebWW #abstraction
Three-Valued Spotlight Abstractions (JS, HW, DW), pp. 106–122.
CHICHI-2009-DantecPW #design #evolution #experience
Values as lived experience: evolving value sensitive design in support of value discovery (CALD, ESP, SW), pp. 1141–1150.
CHICHI-2009-DiefenbachH
The “Beauty Dilemma”: beauty is valued but discounted in product choice (SD, MH), pp. 1419–1426.
HCIDHM-2009-EngstlerB #generative
Generation of Percentile Values for Human Joint Torque Characteristics (FE, HB), pp. 95–104.
HCIHCD-2009-LiuL #adaptation #mobile #people
User Value Based Product Adaptation: A Case of Mobile Products for Chinese Urban Elderly People (JL, XL), pp. 492–500.
HCIHCD-2009-PohlmeyerBWM #approach #experience #user interface
The Value of Answers without Question[s]: A Qualitative Approach to User Experience and Aging (AEP, LTMB, HW, JM), pp. 894–903.
HCIHCI-NIMT-2009-Jain #human-computer #multimodal #using
Value of Using Multimodal Data in HCI Methodologies (JJ), pp. 48–57.
HCIHCI-NIMT-2009-MurakamiK #classification #music
Study of Feature Values for Subjective Classification of Music (MM, TK), pp. 701–709.
CAiSECAiSE-2009-WeigandJAB #design #modelling #towards
Value-Based Service Modeling and Design: Toward a Unified View of Services (HW, PJ, BA, MB), pp. 410–424.
CAiSECAiSE-2009-Wiederhold #how #named #question #tutorial
Tutorial: How to Value Software in a Business, and Where Might the Value Go? (GW), pp. 9–10.
ICMLICML-2009-TaylorP #approximate #kernel #learning
Kernelized value function approximation for reinforcement learning (GT, RP), pp. 1017–1024.
KDDKDD-2009-LiMPF #mining #named #sequence #summary
DynaMMo: mining and summarization of coevolving sequences with missing values (LL, JM, NSP, CF), pp. 507–516.
KEODKEOD-2009-ArkoudasBK #logic #reasoning
Qualitative Spatial Reasoning Via 3-Valued Heterogeneous Logic (KA, SB, SK), pp. 80–87.
KMISKMIS-2009-RohrbaughH #information management #multi #process
Value Knowledge Management — Process Structuring for Multi-party Conflict (JR, SH), pp. 63–68.
KMISKMIS-2009-StockerT #case study #enterprise #multi #wiki
Exploring the Value of Enterprise Wikis — A Multiple-Case Study (AS, KT), pp. 5–12.
SEKESEKE-2009-SeliyaK #modelling #quality
Value-Based Software Quality Modeling (NS, TMK), pp. 116–121.
SEKESEKE-2009-Zhang #consistency #development #nondeterminism
Taming Inconsistency in Value-based Software Development (DZ), pp. 450–455.
LOPSTRLOPSTR-2009-Nishimura #exception #logic
Refining Exceptions in Four-Valued Logic (SN), pp. 113–127.
POPLPOPL-2009-JonssonN #call-by #higher-order #supercompilation
Positive supercompilation for a higher order call-by-value language (PAJ, JN), pp. 277–288.
RERE-2009-KauppinenSLKTD #development
From Feature Development to Customer Value Creation (MK, JS, LL, MK, HT, AMD), pp. 275–280.
REFSQREFSQ-2009-Dzamashvili-FogelstromBAH #requirements
When Product Managers Gamble with Requirements: Attitudes to Value and Risk (NDF, SB, AA, AH), pp. 1–15.
REFSQREFSQ-2009-TourweCBB #collaboration #quantifier #requirements
Demystifying Release Definition: From Requirements Prioritization to Collaborative Value Quantification (TT, WC, NB, VB), pp. 37–44.
SPLCSPLC-2009-SavolainenBKM #product line
Default values for improved product line management (JS, JB, JK, TM), pp. 51–60.
ICLPICLP-2009-HolldoblerR #logic programming #semantics #source code
Logic Programs under Three-Valued Lukasiewicz Semantics (SH, CDPKR), pp. 464–478.
TLCATLCA-2009-HerbelinZ #call-by #deduction #λ-calculus
An Operational Account of Call-by-Value Minimal and Classical λ-Calculus in “Natural Deduction” Form (HH, SZ), pp. 142–156.
TLCATLCA-2009-Riba #on the
On the Values of Reducibility Candidates (CR), pp. 264–278.
VMCAIVMCAI-2009-Vafeiadis #abstraction #verification
Shape-Value Abstraction for Verifying Linearizability (VV), pp. 335–348.
WICSAWICSA-2008-BahsoonE #approach #architecture #distributed #scalability
An Economics-Driven Approach for Valuing Scalability in Distributed Architectures (RB, WE), pp. 9–18.
WICSAWICSA-2008-CantoneK #design #documentation #empirical
Value-Based Design Decision Rationale Documentation: Principles and Empirical Feasibility Study (GC, PK), pp. 189–198.
WICSAWICSA-2008-Ojala #architecture #assessment
Developing Value Assessment for SW Architecture (PO), pp. 245–248.
VLDBVLDB-2008-TerrovitisMK #privacy
Privacy-preserving anonymization of set-valued data (MT, NM, PK), pp. 115–125.
ESOPESOP-2008-FournetGN #implementation
A Formal Implementation of Value Commitment (CF, NG, FZN), pp. 383–397.
FoSSaCSFoSSaCS-2008-SelingerV #call-by #λ-calculus
A Linear-non-Linear Model for a Computational Call-by-Value λ Calculus (Extended Abstract) (PS, BV), pp. 81–96.
ICSMEICSM-2008-BoogerdM #empirical #standard
Assessing the value of coding standards: An empirical study (CB, LM), pp. 277–286.
STOCSTOC-2008-Vondrak #approximate #problem
Optimal approximation for the submodular welfare problem in the value oracle model (JV), pp. 67–74.
DLTDLT-2008-Souza #decidability #equivalence #on the #transducer
On the Decidability of the Equivalence for k-Valued Transducers (RdS), pp. 252–263.
FMFM-2008-MateescuT #concurrent #model checking
A Model Checking Language for Concurrent Value-Passing Systems (RM, DT), pp. 148–164.
CHICHI-2008-GuyJSMSF #network #social
Harvesting with SONAR: the value of aggregating social network information (IG, MJ, ES, NM, VS, SF), pp. 1017–1026.
CSCWCSCW-2008-KripleanBM #wiki
Articulations of wikiwork: uncovering valued work in wikipedia through barnstars (TK, IB, DWM), pp. 47–56.
EDOCEDOC-2008-Czarski #enterprise #internet
More than Just an Internet Hype: Added Value with Spatial-Enabled Enterprise Applications (CC).
ICEISICEIS-DISI-2008-Cardoso #network
Service Engineering for Future Business Value Networks (JC), pp. 15–20.
ICEISICEIS-DISI-2008-ItaborahyOS #project management
Value-Based Software Project Management — A Business Perspective on Software Projects (AI, KMdO, RRdS), pp. 218–225.
ICEISICEIS-ISAS2-2008-AlencarSAFF #approach #bound #branch
Maximizing the Business Value of Software Projects — A Branch & Bound Approach (AJA, EAS, EPdA, MCF, ALF), pp. 162–169.
ICEISICEIS-ISAS2-2008-BrockeMR #approach #modelling #process #towards
Towards a Value-Oriented Approach to Business Process Modelling (JvB, JM, JR), pp. 380–395.
CIKMCIKM-2008-BacheC
Estimating real-valued characteristics of criminals from their recorded crimes (RB, FC), pp. 1385–1386.
ICMLICML-2008-ParrLTPL #analysis #approximate #feature model #learning #linear #modelling
An analysis of linear models, linear value-function approximation, and feature selection for reinforcement learning (RP, LL, GT, CPW, MLL), pp. 752–759.
ICMLICML-2008-TakedaS
nu-support vector machine as conditional value-at-risk minimization (AT, MS), pp. 1056–1063.
ICPRICPR-2008-KashimaYIS
Regression with interval output values (HK, KY, AI, HS), pp. 1–4.
ICPRICPR-2008-LuiC #multi
Three related types of multi-value association patterns (TWHL, DKYC), pp. 1–4.
ICPRICPR-2008-QuQY #learning
Learning a discriminative sparse tri-value transform (ZQ, GQ, PCY), pp. 1–4.
ICPRICPR-2008-WongCF #adaptation #image #using
Phase-adaptive image signal fusion using complex-valued wavelets (AW, DAC, PWF), pp. 1–4.
RecSysRecSys-2008-DiasLLEL #case study #personalisation #recommendation
The value of personalised recommender systems to e-business: a case study (MBD, DL, ML, WED, PJGL), pp. 291–294.
SEKESEKE-2008-Zhang #machine learning #re-engineering #research
Machine Learning and Value-based Software Engineering: a Research Agenda (DZ), pp. 285–290.
RERE-2008-GordijnKW
Value-driven Service Matching (JG, SdK, RW), pp. 67–70.
SACSAC-2008-GarciaH #analysis #functional #metric #using
Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
SACSAC-2008-GordijnWRW #self #towards
Towards self-configuration and management of e-service provisioning in dynamic value constellations (JG, HW, MR, RW), pp. 566–571.
SACSAC-2008-ZarvicWE #modelling
Checking the alignment of value-based business models and IT functionality (NZ, RW, PvE), pp. 607–613.
ICSTICST-2008-SherriffW #composition #empirical #impact analysis #using
Empirical Software Change Impact Analysis using Singular Value Decomposition (MS, LW), pp. 268–277.
IJCARIJCAR-2008-Melquiond #bound #proving
Proving Bounds on Real-Valued Functions with Computations (GM), pp. 2–17.
ISSTAISSTA-2008-JeffreyGG #fault #locality #using
Fault localization using value replacement (DJ, NG, RG), pp. 167–178.
ISSTAISSTA-2008-Larus #testing
The real value of testing (JRL), pp. 1–2.
VMCAIVMCAI-2008-KupfermanL #automaton #game studies #logic #multi #simulation
Multi-valued Logics, Automata, Simulations, and Games (OK, YL), p. 5.
ASEASE-2007-ChenM #concurrent #source code #testing #using
Testing concurrent programs using value schedules (JC, SM), pp. 313–322.
CASECASE-2007-ChandrashekarN #analysis #coordination #network
A Shapley Value Analysis to Coordinate the Formation of Procurement Networks (TSC, YN), pp. 664–669.
DACDAC-2007-RamalingamSNOP #analysis #composition #modelling #using
Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
DATEDATE-2007-EckerESSVH #abstraction #interactive #performance #representation #simulation
Interactive presentation: Impact of description language, abstraction layer, and value representation on simulation performance (WE, VE, LS, TS, MV, MH), pp. 767–772.
SIGMODSIGMOD-2007-BeyerHRSG #estimation #multi #on the
On synopses for distinct-value estimation under multiset operations (KSB, PJH, BR, YS, RG), pp. 199–210.
VLDBVLDB-2007-ChandramouliPY #scalability
Value-Based Notification Conditions in Large-Scale Publish/Subscribe Systems (BC, JMP, JY), pp. 878–889.
VLDBVLDB-2007-WuJ #set
A Bayesian Method for Guessing the Extreme Values in a Data Set (MW, CJ), pp. 471–482.
PLDIPLDI-2007-CheremPR #analysis #detection #memory management #using
Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
SASSAS-2007-Monniaux #abstraction #source code
Optimal Abstraction on Real-Valued Programs (DM), pp. 104–120.
SASSAS-2007-ShohamG #abstraction #composition #verification
Compositional Verification and 3-Valued Abstractions Join Forces (SS, OG), pp. 69–86.
CIAACIAA-2007-CaucalCFR #context-free grammar #performance #throughput
Efficient Computation of Throughput Values of Context-Free Languages (DC, JC, WF, WR), pp. 203–213.
CIAACIAA-2007-GoldwurmR #modelling #statistics
Average Value and Variance of Pattern Statistics in Rational Models (MG, RR), pp. 62–72.
ICALPICALP-2007-BodirskyCKO #constraints
Maximal Infinite-Valued Constraint Languages (MB, HC, JK, TvO), pp. 546–557.
ICFPICFP-2007-BrasselHFHV #call-by #evaluation #lazy evaluation
Lazy call-by-value evaluation (BB, MH, SF, FH, GV), pp. 265–276.
AGTIVEAGTIVE-2007-FussT #algorithm #graph transformation #model transformation #simulation
Simulating Set-Valued Transformations with Algorithmic Graph Transformation Languages (CF, VET), pp. 442–455.
HCIDHM-2007-ZhangDC #composition #pattern matching #pattern recognition #process #recognition
Wavelet Transform and Singular Value Decomposition of EEG Signal for Pattern Recognition of Complicated Hand Activities (XZ, WD, ZC), pp. 294–303.
HCIHCI-IDU-2007-ItohHTK #design #process
A New User-Centered Design Process for Creating New Value and Future (YI, YH, HT, MK), pp. 108–116.
HCIHCI-IDU-2007-KimJBKJY #framework
A New Framework of Measuring the Business Values of Software (IKK, BSJ, SB, AK, YGJ, MHY), pp. 559–568.
HCIHCI-IDU-2007-NietersW #collaboration #design
Collaborative Design for Strategic UXD Impact and Global Product Value (JEN, DW), pp. 214–222.
HCIHIMI-MTT-2007-NoorinaeiniLW #classification #composition #hybrid
Hybrid Singular Value Decomposition: A Model of Human Text Classification (AN, MRL, SjW), pp. 517–525.
CAiSECAiSE-2007-DerzsiGKAT #case study
Assessing Feasibility of IT-Enabled Networked Value Constellations: A Case Study in the Electricity Sector (ZD, JG, KK, HA, YHT), pp. 66–80.
CAiSECAiSE-2007-PijpersG #comprehension #named
e3forces: Understanding Strategies of Networked e 3 value Constellations by Analyzing Environmental Forces (VP, JG), pp. 188–202.
EDOCEDOC-2007-TosicSL #composition #uml #web #web service
UML Profiles for WS-Policy4MASC as Support for Business Value Driven Engineering and Management of Web Services and their Compositions (VT, BS, HL), pp. 157–168.
ICEISICEIS-DISI-2007-BergamaschiOGS #metadata
Relevant values: New metadata to provide insight on attribute values at schema level (SB, MO, FG, CS), pp. 274–279.
ICEISICEIS-DISI-2007-CabreroGP #approach #design #maintenance
Maintenance cost of a software design: A value-based approach (DCM, JG, MP), pp. 384–389.
ICEISICEIS-SAIC-2007-CheungSB #collaboration #using
Value Creation for SMES Using Collaborative Commerce Marketplaces (YPC, DS, JB), pp. 63–71.
ICMLICML-2007-JohnsM #approximate #graph
Constructing basis functions from directed graphs for value function approximation (JJ, SM), pp. 385–392.
ICMLICML-2007-ParrPLL #approximate #generative
Analyzing feature generation for value-function approximation (RP, CPW, LL, MLL), pp. 737–744.
ICMLICML-2007-PhuaF #approximate #learning #linear
Tracking value function dynamics to improve reinforcement learning with piecewise linear function approximation (CWP, RF), pp. 751–758.
ICMLICML-2007-ZhangY #classification #consistency #constraints #on the
On the value of pairwise constraints in classification and consistency (JZ, RY), pp. 1111–1118.
SIGIRSIGIR-2007-TeevanDH #personalisation
Characterizing the value of personalizing search (JT, STD, EH), pp. 757–758.
SIGIRSIGIR-2007-ThomasR #ambiguity #automation
Estimating the value of automatic disambiguation (PT, TR), pp. 719–720.
OOPSLAOOPSLA-2007-BondNKGM #fault #null
Tracking bad apples: reporting the origin of null and undefined value errors (MDB, NN, SWK, SZG, KSM), pp. 405–422.
RERE-2007-EgyedGHB #lessons learnt #requirements #traceability
Value-Based Requirements Traceability: Lessons Learned (AE, PG, MH, SB), pp. 115–118.
RERE-2007-KartsevaGT #design #enterprise #using
Value-based Design of Networked Enterprises Using e3control Patterns (VK, JG, YHT), pp. 91–100.
REFSQREFSQ-2007-AurumW #approach #concept #requirements
A Value-Based Approach in Requirements Engineering: Explaining Some of the Fundamental Concepts (AA, CW), pp. 109–115.
REFSQREFSQ-2007-ZarvicDW #requirements
Value-Based Requirements Engineering for Value Webs (NZ, MD, RW), pp. 116–128.
SACSAC-2007-CaldersGM #mining
Mining itemsets in the presence of missing values (TC, BG, MM), pp. 404–408.
ESEC-FSEESEC-FSE-2007-Stefaniak #visualisation
Visualising exemplary program values (MS), pp. 575–578.
SOSPSOSP-2007-DeCandiaHJKLPSVV #named
Dynamo: amazon’s highly available key-value store (GD, DH, MJ, GK, AL, AP, SS, PV, WV), pp. 205–220.
CAVCAV-2007-KatoenKLW #abstraction #markov
Three-Valued Abstraction for Continuous-Time Markov Chains (JPK, DK, ML, VW), pp. 311–324.
ICLPICLP-2007-GrecoM #consistency #database #query #semantics
Querying and Repairing Inconsistent Databases Under Three-Valued Semantics (SG, CM), pp. 149–164.
ICSTSAT-2007-AnsoteguiBLM #csp #satisfiability
Mapping CSP into Many-Valued SAT (CA, MLB, JL, FM), pp. 10–15.
DACDAC-2006-HuebbersDI #parametricity #performance #process
Computation of accurate interconnect process parameter values for performance corners under process variations (FH, AD, YII), pp. 797–800.
DACDAC-2006-RawatCKSGZS #named #proving #question
DFM: where’s the proof of value? (SR, RC, AK, JS, MG, NZ, AS), pp. 1061–1062.
DACDAC-2006-SingheeFMR #probability #statistics #tool support #towards
Probabilistic interval-valued computation: toward a practical surrogate for statistics inside CAD tools (AS, CFF, JDM, RAR), pp. 167–172.
DATEDATE-2006-ChaoWCWC #using
Coverage loss by using space compactors in presence of unknown values (MCTC, SW, STC, WW, KTC), pp. 1053–1054.
DATEDATE-2006-RongP #algorithm #formal method #markov #online #process
Determining the optimal timeout values for a power-managed system based on the theory of Markovian processes: offline and online algorithms (PR, MP), pp. 1128–1133.
DATEDATE-2006-SundaresanM #energy #optimisation
Value-based bit ordering for energy optimization of on-chip global signal buses (KS, NRM), pp. 624–625.
SIGMODSIGMOD-2006-SilbersteinMY #energy #monitoring #network
Energy-efficient monitoring of extreme values in sensor networks (AS, KM, JY), pp. 169–180.
ESOPESOP-2006-CooperK #call-by #data flow
Embedding Dynamic Dataflow in a Call-by-Value Language (GHC, SK), pp. 294–308.
SASSAS-2006-Arnold #analysis #logic #refinement #using
Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
STOCSTOC-2006-AngluinACW #injection #learning
Learning a circuit by injecting values (DA, JA, JC, YW), pp. 584–593.
CHICHI-2006-CosleyFTR #bibliography #community #using
Using intelligent task routing and contribution review to help communities build artifacts of lasting value (DC, DF, LGT, JR), pp. 1037–1046.
CHICHI-2006-RashidLTRKR #game studies
Motivating participation by displaying the value of contribution (AMR, KSL, RDT, PR, REK, JR), pp. 955–958.
CAiSECAiSE-2006-KartsevaGT #network
Inter-organisational Controls as Value Objects in Network Organisations (VK, JG, YHT), pp. 336–350.
CAiSECAiSE-2006-WeigandJABEI #on the
On the Notion of Value Object (HW, PJ, BA, MB, AE, TI), pp. 321–335.
EDOCEDOC-2006-MutschlerBR06a #approach #evaluation #perspective #workflow
An Evaluation Approach for Analyzing Workflow Management Systems from a Value-based Perspective (BM, JB, MR), pp. 477–482.
ICEISICEIS-ISAS-2006-KrogstieDJ #modelling #process
Increasing the Value of Process Modelling (JK, VD, SMJ), pp. 70–77.
ICEISICEIS-J-2006-KrogstieDJ06a #framework #modelling #process
Process Modeling Value Framework (JK, VD, SMJ), pp. 309–321.
CIKMCIKM-2006-ChiTT #analysis #named
Eigen-trend: trend analysis in the blogosphere based on singular value decompositions (YC, BLT, JT), pp. 68–77.
CIKMCIKM-2006-Kielman #realtime #security
The real-time nature and value of homeland security information (JK), p. 3.
CIKMCIKM-2006-MichelBNTWZ #keyword
Discovering and exploiting keyword and attribute-value co-occurrences to improve P2P routing indices (SM, MB, NN, PT, GW, CZ), pp. 172–181.
CIKMCIKM-2006-TerrovitisPVS
A combination of trie-trees and inverted files for the indexing of set-valued attributes (MT, SP, PV, TKS), pp. 728–737.
ICMLICML-2006-LiLC #markov #process
Region-based value iteration for partially observable Markov decision processes (HL, XL, LC), pp. 561–568.
ICMLICML-2006-ShengL #algorithm #testing
Feature value acquisition in testing: a sequential batch test algorithm (VSS, CXL), pp. 809–816.
ICPRICPR-v1-2006-MarmoAC #classification #set #using
Microfossils shape classification using a set of width values (RM, SA, VC), pp. 691–694.
ICPRICPR-v2-2006-IlonenPKK #classification
Gaussian mixture pdf in one-class classification: computing and utilizing confidence values (JI, PP, JKK, HK), pp. 577–580.
ICPRICPR-v3-2006-AbdallahHB #composition #image #performance #robust #using
A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition (EEA, ABH, PB), pp. 673–676.
KRKR-2006-HunterK #consistency #nondeterminism
Shapley Inconsistency Values (AH, SK), pp. 249–259.
SEKESEKE-2006-HuangC06a #nondeterminism #rule-based
A New Method of Value-Adding Treatment Inference for Rule-based Uncertainty Knowledge (CJH, MYC), pp. 51–56.
LOPSTRLOPSTR-2006-BagnaraDHMZ #named
Grids: A Domain for Analyzing the Distribution of Numerical Values (RB, KD, PMH, MM, EZ), pp. 219–235.
QAPLQAPL-2006-SingerB #predict
Return Value Prediction meets Information Theory (JS, GB), pp. 137–151.
RERE-2006-GordijnPW #comprehension #modelling #using
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling (JG, MP, RW), pp. 126–135.
SACSAC-2006-WuGL #analysis #database #modelling #towards
Towards value disclosure analysis in modeling general databases (XW, SG, YL), pp. 617–621.
ICSEICSE-2006-Dolins #process #using
Using the balanced scorecard process to compute the value of software applications (SBD), pp. 881–884.
ICSEICSE-2006-HuangBHGLQ #development #enterprise #process
Applying the Value/Petri process to ERP software development in China (LH, BWB, HH, JG, JL, CQ), pp. 502–511.
LCTESLCTES-2006-Mine #analysis #c #embedded #pointer #source code
Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics (AM), pp. 54–63.
LICSLICS-2006-ShohamG #abstraction #precise
3-Valued Abstraction: More Precision at Less Cost (SS, OG), pp. 399–410.
DATEDATE-2005-YangHSP #logic #multi #quantum #synthesis #using
Exact Synthesis of 3-Qubit Quantum Circuits from Non-Binary Quantum Gates Using Multiple-Valued Logic and Group Theory (GY, WNNH, XS, MAP), pp. 434–435.
PODSPODS-2005-Koch #complexity #functional #on the #query #recursion #xquery
On the complexity of nonrecursive XQuery and functional query languages on complex values (CK), pp. 84–97.
SIGMODSIGMOD-2005-BohannonFFR #constraints #cost analysis #effectiveness #heuristic
A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification (PB, MF, WF, RR), pp. 143–154.
VLDBVLDB-2005-ChengKPKT #adaptation #query
Adaptive Stream Filters for Entity-based Queries with Non-Value Tolerance (RC, BK, SP, AK, YCT), pp. 37–48.
VLDBVLDB-2005-EnderleSS #database #query #relational #tuple
Efficiently Processing Queries on Interval-and-Value Tuples in Relational Databases (JE, NS, TS), pp. 385–396.
CHICHI-2005-FlanaganHN #design #game studies #trade-off
Values at play: design tradeoffs in socially-oriented game design (MF, DCH, HN), pp. 751–760.
CIKMCIKM-2005-KangHLM #feedback #modelling #statistics #using
Establishing value mappings using statistical models and user feedback (JK, TSH, DL, PM), pp. 68–75.
CIKMCIKM-2005-YuZS #set #towards
Towards estimating the number of distinct value combinations for a set of attributes (XY, CZ, KCS), pp. 656–663.
ICMLICML-2005-Mahadevan #learning
Proto-value functions: developmental reinforcement learning (SM), pp. 553–560.
ICMLICML-2005-SzepesvariM #bound #finite
Finite time bounds for sampling based fitted value iteration (CS, RM), pp. 880–887.
KDDKDD-2005-LongZY #clustering #composition
Co-clustering by block value decomposition (BL, Z(Z, PSY), pp. 635–640.
MLDMMLDM-2005-Boulle #category theory #scalability
A Grouping Method for Categorical Attributes Having Very Large Number of Values (MB), pp. 228–242.
GPCEGPCE-2005-Ahlander #sorting
Sorting Out the Relationships Between Pairs of Iterators, Values, and References (), pp. 342–356.
RERE-2005-RaadtGY #perspective #web #web service
Exploring Web Services from a Business Value Perspective (BvdR, JG, ESKY), pp. 53–62.
SACSAC-2005-LawL #constraints #matrix #modelling #symmetry #using
Breaking value symmetries in matrix models using channeling constraints (YCL, JHML), pp. 371–376.
SACSAC-2005-WieringaG #coordination #correctness #design #process #trust
Value-oriented design of service coordination processes: correctness and trust (RW, JG), pp. 1320–1327.
ESEC-FSEESEC-FSE-2005-HeindlB #case study #requirements
A case study on value-based requirements tracing (MH, SB), pp. 60–69.
ICSEICSE-2005-GoldenJB #design pattern #empirical
The value of a usability-supporting architectural pattern in software architecture design: a controlled experiment (EG, BEJ, LB), pp. 460–469.
SPLCSPLC-2005-Wesselius #architecture #modelling #nondeterminism
Modeling Architectural Value: Cash Flow, Time and Uncertainty (JHW), pp. 89–95.
HPCAHPCA-2005-TuckT #parallel #predict #thread
Multithreaded Value Prediction (NT, DMT), pp. 5–15.
ICLPICLP-2005-Mallya #deduction #model checking #multi
Deductive Multi-valued Model Checking (AM), pp. 297–310.
RTARTA-2005-Rocheteau #call-by #λ-calculus #μ-calculus
λμ-Calculus and Duality: Call-by-Name and Call-by-Value (JR), pp. 204–218.
RTARTA-2005-Wadler #call-by
Call-by-Value Is Dual to Call-by-Name — Reloaded (PW), pp. 185–203.
TLCATLCA-2005-CoppolaLR #call-by #logic #λ-calculus
Elementary Affine Logic and the Call-by-Value λ Calculus (PC, UDL, SRDR), pp. 131–145.
TLCATLCA-2005-Sinot #call-by #interactive
Call-by-Name and Call-by-Value as Token-Passing Interaction Nets (FRS), pp. 386–400.
WICSAWICSA-2004-IonitaAHOT #approach #architecture #cost analysis
A Scenario-Driven Approach for Value, Risk, and Cost Analysis in System Architecting for Innovation (MTI, PA, DKH, JHO, JJMT), pp. 277–280.
DATEDATE-v1-2004-ChangYL
Value-Conscious Cache: Simple Technique for Reducing Cache Access Power (YJC, CLY, FL), pp. 16–21.
DATEDATE-v1-2004-ZhangYV
Low Static-Power Frequent-Value Data Caches (CZ, JY, FV), pp. 214–219.
DATEDATE-v1-2004-Ziv #generative
Stimuli Generation with Late Binding of Values (AZ), pp. 558–563.
PODSPODS-2004-HartmannL #dependence #multi
Multi-valued Dependencies in the Presence of Lists (SH, SL), pp. 330–341.
ESOPESOP-2004-HirschowitzLW #call-by #mixin #reduction #semantics
Call-by-Value Mixin Modules: Reduction Semantics, Side Effects, Types (TH, XL, JBW), pp. 64–78.
ICSMEICSM-2004-SoodD #approach #component #maintenance
An Approach to Measure Software Maintenance and Support as a Value Added Component of To-Day’s Business (HRS, DD), p. 503.
ICSMEICSM-2004-Woodworth #metric #quality #using
Using Metrics to Drive Quality Improvements and Value — Company Wide (BW), p. 2.
ICSMEICSM-2004-XieN #black box #difference #testing
Checking Inside the Black Box: Regression Testing Based on Value Spectra Differences (TX, DN), pp. 28–37.
SASSAS-2004-GulwaniN #algorithm #polynomial
A Polynomial-Time Algorithm for Global Value Numbering (SG, GCN), pp. 212–227.
STOCSTOC-2004-AchlioptasN #graph #random
The two possible values of the chromatic number of a random graph (DA, AN), pp. 587–593.
FLOPSFLOPS-2004-Garrigue #strict
Relaxing the Value Restriction (JG), pp. 196–213.
ICALPICALP-2004-BrunsG #logic #model checking #multi
Model Checking with Multi-valued Logics (GB, PG), pp. 281–293.
IFMIFM-2004-VilasARGD #imperative #incremental #logic #modelling #semantics #specification
A Many-Valued Logic with Imperative Semantics for Incremental Specification of Timed Models (AFV, JJPA, RPDR, AGS, JGD), pp. 382–401.
ICEISICEIS-v1-2004-Gilb #metric #multi #performance #project management #quality
Evolutionary Project Management: Multiple Performance, Quality and Cost Metrics for Early and Continuous Stakeholder Value Delivery (TG), p. VII.
CIKMCIKM-2004-ChenGS #rank
Local methods for estimating pagerank values (YYC, QG, TS), pp. 381–389.
ICMLICML-2004-MannorSST #bias #estimation
Bias and variance in value function estimation (SM, DS, PS, JNT).
ICMLICML-2004-WingateS #named #parallel
P3VI: a partitioned, prioritized, parallel value iterator (DW, KDS).
ICPRICPR-v4-2004-AdachiS #re-engineering #visual notation
Uncalibrated Visual Servoing from Projective Reconstruction of Control Values (JA, JS), pp. 297–300.
LSOLSO-2004-MelnikR #learning
Impreciseness and Its Value from the Perspective of Software Organizations and Learning (GM, MMR), pp. 122–130.
SIGIRSIGIR-2004-NemethST #automation #evaluation #interactive #query
Evaluation of the real and perceived value of automatic and interactive query expansion (YN, BS, MTM), pp. 526–527.
POPLPOPL-2004-GulwaniN #random #using
Global value numbering using random interpretation (SG, GCN), pp. 342–352.
SACSAC-2004-AbulAPB #generative #using
Finding differentially expressed genes: pattern generation using Q-values (OA, RA, FP, KB), pp. 138–142.
SACSAC-2004-Calderon-BenavidesGAGD #algorithm #collaboration #comparison #multi #predict
A comparison of several predictive algorithms for collaborative filtering on multi-valued ratings (MLCB, CNGC, JdJPA, JCGD, JD), pp. 1033–1039.
CCCC-2004-OzerNG #approximate #probability #using
Stochastic Bit-Width Approximation Using Extreme Value Theory for Customizable Processors (, AN, DG), pp. 250–264.
CCCC-2004-VanDrunenH
Value-Based Partial Redundancy Elimination (TV, ALH), pp. 167–184.
CGOCGO-2004-ZhaiCSM #communication #compilation #optimisation #thread
Compiler Optimization of Memory-Resident Value Communication Between Speculative Threads (AZ, CBC, JGS, TCM), pp. 39–52.
CAVCAV-2004-BinghamCHQZ #automation #bound #consistency #verification
Automatic Verification of Sequential Consistency for Unbounded Addresses and Data Values (JDB, AC, AJH, SQ, ZZ), pp. 427–439.
CAVCAV-2004-RepsSW #logic #program analysis
Static Program Analysis via 3-Valued Logic (TWR, SS, RW), pp. 15–30.
LICSLICS-2004-AlfaroGJ #abstraction #game studies #nondeterminism #precise
Three-Valued Abstractions of Games: Uncertainty, but with Precision (LdA, PG, RJ), pp. 170–179.
SATSAT-2004-Stachniak
A Note on Satisfying Truth-Value Assignments of Boolean Formulas (ZS), pp. 104–110.
DATEDATE-2003-JiangMB #algebra #multi
Reducing Multi-Valued Algebraic Operations to Binary (JHRJ, AM, RKB), pp. 10752–10757.
DATEDATE-2003-MarinissenVMKM
Creating Value Through Test (EJM, BV, RM, MK, MM), pp. 10402–10409.
SIGMODSIGMOD-2003-KangN #on the
On Schema Matching with Opaque Column Names and Data Values (JK, JFN), pp. 205–216.
SIGMODSIGMOD-2003-Mamoulis #performance
Efficient Processing of Joins on Set-valued Attributes (NM), pp. 157–168.
FoSSaCSFoSSaCS-2003-DunfieldP #call-by
Type Assignment for Intersections and Unions in Call-by-Value Languages (JD, FP), pp. 250–266.
CSMRCSMR-2003-Latendresse #c #c++ #evaluation #performance #preprocessor #symbolic computation #using
Fast Symbolic Evaluation of C/C++ Preprocessing Using Conditional Value (ML), p. 170–?.
FMFME-2003-GurfinkelC #generative #model checking #multi
Generating Counterexamples for Multi-valued Model-Checking (AG, MC), pp. 503–521.
ICFPICFP-2003-Wadler #call-by
Call-by-value is dual to call-by-name (PW), pp. 189–201.
CAiSECAiSE-2003-GordijnW #approach #design #process
A Value-Oriented Approach to E-business Process Design (JG, RW), pp. 390–403.
ICEISICEIS-v3-2003-MatsumotoT #modelling #problem
A Promising Manifesto for E-Business Value Modeling Problems (MJM, MT), pp. 112–120.
ICEISICEIS-v4-2003-Cox #communication #design #what
What Is the Value of Emotion in Communication? Implications for User Centred Design (RC), pp. 418–425.
ICMLICML-2003-ZhangH #learning #taxonomy
Learning from Attribute Value Taxonomies and Partially Specified Instances (JZ, VH), pp. 880–887.
PPDPPPDP-2003-HirschowitzLW #call-by #compilation #functional #recursion
Compilation of extended recursion in call-by-value functional languages (TH, XL, JBW), pp. 160–171.
SACSAC-2003-CazierSL #privacy #trust
Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility (JC, BS, RSL), pp. 617–622.
ICSEICSE-2003-EasterbrookCDGLPTT #model checking #multi #named #reasoning
χChek: A Model Checker for Multi-Valued Reasoning (SME, MC, BD, AG, AYCL, VP, AT, CDTW), pp. 804–805.
ICSEICSE-2003-MooreKKA #architecture #design #lessons learnt
Quantifying the Value of Architecture Design Decisions: Lessons from the Field (MM, RK, MK, JA), pp. 557–563.
CCCC-2003-JohnsonM #dependence #graph #using
Combined Code Motion and Register Allocation Using the Value State Dependence Graph (NJ, AM), pp. 1–16.
CAVCAV-2003-ShohamG #abstraction #framework #game studies
A Game-Based Framework for CTL Counterexamples and 3-Valued Abstraction-Refinement (SS, OG), pp. 275–287.
VMCAIVMCAI-2003-GodefroidJ #modelling #on the
On the Expressiveness of 3-Valued Models (PG, RJ), pp. 206–222.
ASEASE-2002-AndrewsFL #testing
Adding Value to Formal Test Oracles (JHA, RF, VDL), pp. 275–248.
DACDAC-2002-PomeranzKR #on the
On output response compression in the presence of unknown output values (IP, SK, SMR), pp. 255–258.
VLDBVLDB-2002-OzsoyogluAAOUO #algebra #database
Sideway Value Algebra for Object-Relational Databases (, AAH, ISA, SAÖ, ÖU, ZMÖ), pp. 59–70.
VLDBVLDB-2002-PolyzotisG #graph #xml
Structure and Value Synopses for XML Data Graphs (NP, MNG), pp. 466–477.
ESOPESOP-2002-HirschowitzL #call-by #mixin
Mixin Modules in a Call-by-Value Setting (TH, XL), pp. 6–20.
PLDIPLDI-2002-BurtscherDH #classification #predict
Static Load Classification for Improving the Value Predictability of Data-Cache Misses (MB, AD, MH), pp. 222–233.
PLDIPLDI-2002-Gargi #algorithm
A Sparse Algorithm for Predicated Global Value Numbering (KG), pp. 45–56.
SASSAS-2002-Reps #logic #program analysis
Static Program Analysis via 3-Valued Logic (TWR), p. 1.
IFLIFL-2002-AchtenAP
When Generic Functions Use Dynamic Values (PA, AA, MJP), pp. 17–33.
ICGTICGT-2002-FernandezM #call-by #graph grammar
Call-by-Value λ-Graph Rewriting Without Rewriting (MF, IM), pp. 75–89.
CHICHI-2002-FioreTS #behaviour
Observed behavior and perceived value of authors in usenet newsgroups: bridging the gap (ATF, SLT, MAS), pp. 323–330.
ICEISICEIS-2002-CostaA
Evaluating EMS Value — The Case of a Small Accountancy Firm (CJC, PA), pp. 460–466.
CIKMCIKM-2002-DeshpandeK #classification #using
Using conjunction of attribute values for classification (MD, GK), pp. 356–364.
ICMLICML-2002-DeCoste #classification #distance #geometry #kernel #performance
Anytime Interval-Valued Outputs for Kernel Machines: Fast Support Vector Machine Classification via Distance Geometry (DD), pp. 99–106.
ICMLICML-2002-Ho #classification
Classification Value Grouping (CKMH), pp. 251–258.
ICMLICML-2002-TakechiS #induction
Finding an Optimal Gain-Ratio Subset-Split Test for a Set-Valued Attribute in Decision Tree Induction (FT, ES), pp. 618–625.
ICPRICPR-v1-2002-RiegerTVV #3d #estimation #image
Curvature Estimation of Surfaces in 3D Grey-Value Images (BR, FJT, LJvV, PWV), pp. 684–687.
KDDKDD-2002-JagannathanNAH
A model for discovering customer value for E-content (SJ, JN, KCA, MH), pp. 532–537.
KDDKDD-2002-RossetNEVI #modelling
Customer lifetime value modeling and its use for customer retention planning (SR, EN, UE, NV, YI), pp. 332–340.
ASPLOSASPLOS-2002-ZhaiCSM #communication #compilation #optimisation #thread
Compiler optimization of scalar value communication between speculative threads (AZ, CBC, JGS, TCM), pp. 171–183.
CCCC-2002-WuSKLF
Value-Profile Guided Stride Prefetching for Irregular Code (YW, MJS, RK, WL, JF), pp. 307–324.
HPCAHPCA-2002-Sazeides #modelling
Modeling Value Speculation (YS), pp. 211–222.
HPCAHPCA-2002-SteffanCZM #communication #concurrent #thread
Improving Value Communication for Thread-Level Speculation (JGS, CBC, AZ, TCM), pp. 65–75.
CAVCAV-2002-ChechikGD #model checking #multi #named
chi-Chek: A Multi-valued Model-Checker (MC, AG, BD), pp. 505–509.
CSLCSL-2002-Kakutani #call-by #recursion
Duality between Call-by-Name Recursion and Call-by-Value Iteration (YK), pp. 506–521.
CSLCSL-2002-Levy #call-by #semantics
Possible World Semantics for General Storage in Call-By-Value (PBL), pp. 232–246.
LICSLICS-2002-RepsLS #semantics
Semantic Minimization of 3-Valued Propositional Formulae (TWR, AL, SS), p. 40–?.
SATSAT-2002-ManyaABCL
Resolution methods for many-valued CNF formulas (FM, CA, RB, AC, CML), p. 42.
DATEDATE-2001-RufHKR #multi
Simulation-guided property checking based on a multi-valued AR-automata (JR, DWH, TK, WR), pp. 742–748.
ICDARICDAR-2001-KimCKS #generative #recognition #string #using
Recognition of Unconstrained Handwritten Numeral Strings Using Decision Value Generator (KKK, YC, JHK, CYS), pp. 14–17.
PODSPODS-2001-AlonMNSV #revisited #xml
XML with Data Values: Typechecking Revisited (NA, TM, FN, DS, VV).
VLDBVLDB-2001-Gibbons #query
Distinct Sampling for Highly-Accurate Answers to Distinct Values Queries and Event Reports (PBG), pp. 541–550.
ESOPESOP-2001-HuthJS #program analysis
Modal Transition Systems: A Foundation for Three-Valued Program Analysis (MH, RJ, DAS), pp. 155–169.
FoSSaCSFoSSaCS-2001-HasegawaK #axiom #call-by #recursion
Axioms for Recursion in Call-by-Value (MH, YK), pp. 246–260.
TACASTACAS-2001-ChechikDE #implementation #model checking #multi
Implementing a Multi-valued Symbolic Model Checker (MC, BD, SME), pp. 404–419.
IWPCIWPC-J-1999-FrancelR01 #debugging #slicing
The value of slicing while debugging (MAF, SR), pp. 151–169.
ICSMEICSM-2001-ByersKP #dependence #graph
Syntax-Directed Construction of Value Dependence Graphs (DB, MK, TP), p. 692–?.
ICSMEICSM-2001-SiyV #question
Does the Modern Code Inspection Have Value? (HPS, LGV), p. 281–?.
FMFME-2001-ChechikEP #logic #model checking #multi
Model-Checking over Multi-valued Logics (MC, SME, VP), pp. 72–98.
ICEISICEIS-v2-2001-BaumolW #network
Intentions Value Network (UB, RW), pp. 1075–1080.
ICMLICML-2001-AmarDGZ #learning #multi
Multiple-Instance Learning of Real-Valued Data (RAA, DRD, SAG, QZ), pp. 3–10.
KDDKDD-2001-DomingosR #mining #network
Mining the network value of customers (PMD, MR), pp. 57–66.
KDDKDD-T-2001-GallantPT #data mining #mining #web
Value-based data mining and web mining for CRM (SG, GPS, MT), pp. 325–390.
PADLPADL-2001-Ramakrishnan #calculus #logic programming #model checking #using #μ-calculus
A Model Checker for Value-Passing μ-Calculus Using Logic Programming (CRR), pp. 1–13.
POPLPOPL-2001-AbadiF #communication #mobile
Mobile values, new names, and secure communication (MA, CF), pp. 104–115.
POPLPOPL-2001-Yahav #concurrent #java #logic #safety #source code #using #verification
Verifying safety properties of concurrent Java programs using 3-valued logic (EY), pp. 27–40.
RERE-2001-AntonEAP #policy #privacy #requirements
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering (AIA, JBE, TAA, CP), pp. 138–145.
FSEESEC-FSE-2001-SullivanGCH #composition #design
The structure and value of modularity in software design (KJS, WGG, YC, BH), pp. 99–108.
ICSEICSE-2001-EasterbrookC #consistency #framework #multi #reasoning
A Framework for Multi-Valued Reasoning over Inconsistent Viewpoints (SME, MC), pp. 411–420.
CCCC-2001-WattersonD #profiling
Goal-Directed Value Profiling (SAW, SKD), pp. 319–333.
HPCAHPCA-2001-GoemanVB #difference #performance #predict
Differential FCM: Increasing Value Prediction Accuracy by Improving Table Usage Efficiency (BG, HV, KDB), pp. 207–216.
HPCAHPCA-2001-LeeSNT #architecture #stack
Stack Value File: Custom Microarchitecture for the Stack (HHSL, MS, CJN, GST), pp. 5–14.
LICSLICS-2001-FioreT #semantics
Semantics of Name and Value Passing (MPF, DT), pp. 93–104.
ICSTSAT-2001-BejarCFMG #logic #satisfiability
Extending the Reach of SAT with Many-Valued Logics (RB, AC, CF, FM, CPG), pp. 392–407.
DACDAC-2000-WilsonD #reliability #simulation #using #verification
Reliable verification using symbolic simulation with scalar values (CW, DLD), pp. 124–129.
DATEDATE-2000-MetraFR #online #testing
On-Line Testing and Diagnosis of Bus Lines with respect to Intermediate Voltage Values (CM, MF, BR), p. 763.
DATEDATE-2000-Strolenberg
Stay Away from Minimum Design-Rule Values (CWHS), pp. 71–72.
PODSPODS-2000-CharikarCMN #estimation #fault #towards
Towards Estimation Error Guarantees for Distinct Values (MC, SC, RM, VRN), pp. 268–279.
VLDBVLDB-2000-Deshpande #challenge #data transformation
Linking Business to Deliver Value: A Data Management Challenge (AD), pp. 682–683.
ICSMEICSM-2000-Chapin #roadmap
Trends in Preserving and Enhancing the Value of Software (NC), pp. 6–8.
ICSMEICSM-2000-Olver #perspective
Preserving the Value of Software — A CIO Perspective (THO), p. 9–?.
SASSAS-2000-MuthWD
Code Specialization Based on Value Profiles (RM, SAW, SKD), pp. 340–359.
STOCSTOC-2000-Srinivasan #clique
The value of strong inapproximability results for clique (AS), pp. 144–152.
ICEISICEIS-2000-KleinerSB #estimation #learning
Self Organizing Maps for Value Estimation to Solve Reinforcement Learning Tasks (AK, BS, OB), pp. 149–156.
ICMLICML-2000-BoschZ #in memory #learning #multi
Unpacking Multi-valued Symbolic Features and Classes in Memory-Based Language Learning (AvdB, JZ), pp. 1055–1062.
ICMLICML-2000-FariasR #approximate #fixpoint #learning
Fixed Points of Approximate Value Iteration and Temporal-Difference Learning (DPdF, BVR), pp. 207–214.
ICPRICPR-v2-2000-AizenbergABF #image #multi #network #recognition
Image Recognition on the Neural Network Based on Multi-Valued Neurons (INA, NNA, CB, EF), pp. 2989–2992.
ICPRICPR-v2-2000-AokiK #image #using
An Image Storage System Using Complex-Valued Associative Memories (HA, YK), pp. 2626–2629.
ICPRICPR-v2-2000-LuoH #algorithm #composition #graph #using
Symbolic Graph Matching Using the EM Algorithm and Singular Value Decomposition (BL, ERH), pp. 2141–2144.
ICPRICPR-v3-2000-ChenHD #composition #using
Circle Location from Intensity and Range Data Using the Singular Value Decomposition (NsC, GH, SD), pp. 3782–3785.
TOOLSTOOLS-EUROPE-2000-Mitchell #process
Adding Value to the Unified Process (RM), p. 463.
TOOLSTOOLS-USA-2000-Duncan #project management
Project Management: Earned Value Management (BD), pp. 513–514.
TOOLSTOOLS-USA-2000-Mitchell00a #process
Adding Value to the Unified Process (RM), pp. 435–436.
SPLCSPLC-2000-FaulkHR #re-engineering
Value-based software engineering (VBSE) (SRF, RRH, DR), pp. 205–224.
ASPLOSASPLOS-2000-BurrowsELVWWW #flexibility #performance
Efficient and Flexible Value Sampling (MB, ÚE, STL, MTV, CAW, KW, WEW), pp. 160–167.
ASPLOSASPLOS-2000-ZhangYG #design #locality
Frequent Value Locality and Value-Centric Data Cache Design (YZ, JY, RG), pp. 150–159.
CCCC-2000-KnoopR #constant #graph
Constant Propagation on the Value Graph: Simple Constants and Beyond (JK, OR), pp. 94–109.
HPCAHPCA-2000-LeeWY #predict
Decoupled Value Prediction on Trace Processors (SJL, YW, PCY), pp. 231–240.
ICDARICDAR-1999-AtukoraleS #classification
Combining Classifiers based on Confidence Values (ASA, PNS), pp. 37–40.
VLDBVLDB-1999-FuhDCMTLDRM #implementation #inheritance #sql
Implementation of SQL3 Structured Types with Inheritance and Value Substitutability (YCF, SD, WC, NMM, BTT, BGL, LD, SR, DM), pp. 565–574.
VLDBVLDB-1999-Graefe #sql
The Value of Merge-Join and Hash-Join in SQL Server (GG), pp. 250–253.
VLDBVLDB-1999-IoannidisP #approximate
Histogram-Based Approximation of Set-Valued Query-Answers (YEI, VP), pp. 174–185.
TACASTACAS-1999-LiC #bisimulation #congruence #process
Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing Processes (ZL, HC), pp. 300–314.
SASSAS-1999-TakimotoH #graph #using
Partial Dead Code Elimination Using Extended Value Graph (MT, KH), pp. 179–193.
ICALPICALP-1999-Szegedy #artificial reality #logic #proving
Many-Valued Logics and Holographic Proofs (MS), pp. 676–686.
FMFM-v2-1999-KingHCP #experience #industrial #proving #verification
The Value of Verification: Positive Experience of Industrial Proof (SK, JH, RC, AP), pp. 1527–1545.
HCIHCI-CCAD-1999-ElzerB #3d #process #representation
Three-dimensional representation of process values (PFE, CB), pp. 1296–1300.
HCIHCI-EI-1999-Hollnagel #interface
Keep Cool: The Value of Affective Computer Interfaces in a Rational World (EH), pp. 676–680.
HCIHCI-EI-1999-So
The Search For A Cybersickness Dose Value (RHYS), pp. 152–156.
HCIHCI-EI-1999-TakedaK
Influences of Ergo-meter Work Load Stimulated Fluctuations in CFF Values of Circadian Rhythm on VDU Work Load Related central Nerve Fatigue (MT, SK), pp. 84–88.
CIKMCIKM-1999-KangSLL
Indexing field values in field oriented systems: interval Quadtree (MAK, SS, KJL, RL), pp. 335–342.
ICMLICML-1999-SchneiderWMR #distributed
Distributed Value Functions (JGS, WKW, AWM, MAR), pp. 371–378.
ICMLICML-1999-UtgoffS #approximate #unification
Approximation Via Value Unification (PEU, DJS), pp. 425–432.
KDDKDD-1999-ManiDBD #data mining #mining #modelling #statistics
Statistics and Data Mining Techniques for Lifetime Value Modeling (DRM, JD, AB, PD), pp. 94–103.
MLDMMLDM-1999-AizenbergAK #algorithm #image #learning #multi #recognition
Multi-valued and Universal Binary Neurons: Learning Algorithms, Application to Image Processing and Recognition (INA, NNA, GAK), pp. 21–35.
MLDMMLDM-1999-Jahn #image #learning #preprocessor
Unsupervised Learning of Local Mean Gray Values for Image Pre-processing (HJ), pp. 64–74.
POPLPOPL-1999-SagivRW #analysis #logic #parametricity
Parametric Shape Analysis via 3-Valued Logic (SS, TWR, RW), pp. 105–118.
HPCAHPCA-1999-HuangL #locality #reuse
Exploiting Basic Block Value Locality with Block Reuse (JH, DJL), pp. 106–114.
HPCAHPCA-1999-NakraGS #predict
Global Context-Based Value Prediction (TN, RG, MLS), pp. 4–12.
CADECADE-1999-KonradW #first-order #generative #logic
System Description: Kimba, A Model Generator for Many-Valued First-Order Logics (KK, DAW), pp. 282–286.
CAVCAV-1999-BrunsG #logic #model checking
Model Checking Partial State Spaces with 3-Valued Temporal Logics (GB, PG), pp. 274–287.
CSLCSL-1999-KinoshitaP #call-by #programming language
Data-Refinement for Call-By-Value Programming Languages (YK, JP), pp. 562–576.
TLCATLCA-1999-Fujita #call-by #morphism #polymorphism #λ-calculus #μ-calculus
Explicitly Typed λμ-Calculus for Polymorphism an Call-by-Value (KeF), pp. 162–176.
TLCATLCA-1999-Levy #call-by #named #paradigm
Call-by-Push-Value: A Subsuming Paradigm (PBL), pp. 228–242.
PODSPODS-1998-VorobyovV #complexity #logic programming #recursion #source code
Complexity of Nonrecursive Logic Programs with Complex Values (SGV, AV), pp. 244–253.
CIKMCIKM-1998-ThomasianCL #approximate #clustering #composition
Clustering and Singular Value Decomposition for Approximate Indexing in High Dimensional Spaces (AT, VC, CSL), pp. 201–207.
ICMLICML-1998-KimuraK #algorithm #analysis #learning #using
An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
ICMLICML-1998-SchneiderBM #scheduling
Value Function Based Production Scheduling (JGS, JAB, AWM), pp. 522–530.
POPLPOPL-1998-BodikA #analysis
Path-Sensitive Value-Flow Analysis (RB, SA), pp. 237–251.
SACSAC-1998-WaldenBH #approximate #clustering #fuzzy #multi #using
Evaluating multi-valued inverse functions using clustering and fuzzy approximations (MAW, MB, AH), pp. 74–79.
ASPLOSASPLOS-1998-FuJLC #performance #scheduling
Value Speculation Scheduling for High Performance Processors (CyF, MDJ, SYL, TMC), pp. 262–271.
CSLCSL-1998-Lukasiewicz #first-order #logic #probability #semantics
Many-Valued First-Order Logics with Probabilistic Semantics (TL), pp. 415–429.
LICSLICS-1998-ArieliA #logic
The Logical Role of the Four-Valued Bilattice (OA, AA), pp. 118–126.
ICDARICDAR-1997-Horiuchi #classification
Pattern Classification Method by Integrating Interval Feature Values (TH), pp. 847–850.
VLDBVLDB-1997-PoosalaI #estimation #independence
Selectivity Estimation Without the Attribute Value Independence Assumption (VP, YEI), pp. 486–495.
PEPMPEPM-1997-AsaiMY #call-by #partial evaluation #λ-calculus
Partial Evaluation of Call-by-Value λ-Calculus with Side-Effects (KA, HM, AY), pp. 12–21.
DLTDLT-1997-WatanabeT #attribute grammar #evaluation #using
An Attribute Evaluation of One-Pass Attribute Grammars Using Value Estimate (YW, TT), pp. 155–165.
ICALPICALP-1997-HondaY #analysis #call-by #game studies
Game Theoretic Analysis of Call-by-Value Computation (KH, NY), pp. 225–236.
HCIHCI-CC-1997-TakedaH #question
Does the Circadian Rhythm of VDT Operators Cause Fluctuations of CFF Value that to Mask Fatigue Variations During Work Load? (MT, YH), pp. 563–566.
ICMLICML-1997-Friedman #learning #network
Learning Belief Networks in the Presence of Missing Values and Hidden Variables (NF), pp. 125–133.
PPDPPLILP-1997-Mossin #graph #higher-order
Higher-Order Value Flow Graphs (CM), pp. 159–173.
RERE-1997-HammerRHH #metric #requirements
Requirements Metrics — Value Added (TH, LHR, LH, LEH), p. 141.
SACSAC-1997-KaiserLMGP #algorithm #hybrid #predict #search-based
Polypeptide structure prediction: real-value versus binary hybrid genetic algorithms (CEK, GBL, LDM, GHGJ, RP), pp. 279–286.
CSLCSL-1997-AbramskyM #call-by #game studies
Call-by-Value Games (SA, GM), pp. 1–17.
CSLCSL-1997-HartonasH #concurrent #functional #higher-order
Full Abstractness for a Functional/Concurrent Language with Higher-Order Value-Passing (Extended Abstract) (CH, MH), pp. 239–254.
LICSLICS-1997-Rathke #fixpoint #induction #process
Unique Fixpoint Induction for Value-Passing Processes (Extended Abstract) (JR), pp. 140–148.
LICSLICS-1997-RieckeS #call-by #relational
A Relational Account of Call-by-Value Sequentiality (JGR, AS), pp. 258–267.
SIGMODSIGMOD-1996-MorpainCFP #consistency #database #dependence #maintenance #multi
Maintaining Database Consistency in Presence of Value Dependencies in Multidatabase Systems (CM, MC, JF, JFP), pp. 459–468.
ESOPESOP-1996-BarbutiM #logic #multi #prolog #semantics
A Multiple-Valued Logical Semantics for Prolog (RB, PM), pp. 62–76.
ESOPESOP-1996-Bechet #encoding #partial evaluation #using
Removing Value Encoding Using Alternative Values in Partial Evaluation of Strongly-Typed Languages (DB), pp. 77–91.
ICALPICALP-1996-AumannB #performance
Efficient Asynchronous Consensus with the Value-Oblivious Adversary Scheduler (YA, MAB), pp. 622–633.
ICFPICFP-1996-SabryW #call-by
A Reflection on Call-by-Value (AS, PW), pp. 13–24.
CHICHI-1996-ComstockD #architecture #usability
Embed User Values in System Architecture: The Declaration of System Usability (EMC, WMD), pp. 420–427.
CIKMCIKM-1996-LinRSB #sequence
Indexing Values of Time Sequences (LL, TR, MS, DZB), pp. 223–232.
ICMLICML-1996-BoutilierD #approximate #programming
Approximate Value Trees in Structured Dynamic Programming (CB, RD), pp. 54–62.
ICMLICML-1996-TadepalliO #approximate #domain model #learning #modelling #scalability
Scaling Up Average Reward Reinforcement Learning by Approximating the Domain Models and the Value Function (PT, DO), pp. 471–479.
ICPRICPR-1996-AizenbergAK #image #learning #multi #network #pattern matching #pattern recognition #recognition
Multi-valued and universal binary neurons: mathematical model, learning, networks, application to image processing and pattern recognition (NNA, INA, GAK), pp. 185–189.
ICPRICPR-1996-Dzemyda #analysis #set #visual notation
Visual analysis of a set of function values (GD), pp. 700–704.
ICPRICPR-1996-Kita #using
Force-based registration method using attribute values (YK), pp. 34–39.
KRKR-1996-BaralGP
Value Minimization in Circumscription (CB, AG, AP), pp. 474–481.
SIGIRSIGIR-1996-RollekeF #logic #retrieval #using
Retrieval of Complex Objects Using a Four-Valued Logic (TR, NF), pp. 206–214.
ASPLOSASPLOS-1996-LipastiWS #locality #predict
Value Locality and Load Value Prediction (MHL, CBW, JPS), pp. 138–147.
CADECADE-1996-BaazFSZ #logic #towards
MUltlog 1.0: Towards an Expert System for Many-Valued Logics (MB, CGF, GS, RZ), pp. 226–230.
CADECADE-1996-EglyR #normalisation #on the
On the Practical Value of Different Definitional Translations to Normal Form (UE, TR), pp. 403–417.
CADECADE-1996-Salzer #axiom #multi #quantifier
Optimal Axiomatizations for Multiple-Valued Operators and Quantifiers Based on Semi-lattices (GS), pp. 688–702.
CSLCSL-1996-ArieliA #knowledge base
Four-Valued Diagnoses for Stratified Knowledge-Bases (OA, AA), pp. 1–17.
CSLCSL-1996-Stark #call-by #logic
Call-by-Value, Call-by-Name and the Logic of Values (RFS), pp. 431–445.
VLDBVLDB-1995-BestavrosB #concurrent
Value-cognizant Speculative Concurrency Control (AB, SB), pp. 122–133.
VLDBVLDB-1995-HaasNSS #estimation
Sampling-Based Estimation of the Number of Distinct Values of an Attribute (PJH, JFN, SS, LS), pp. 311–322.
PLDIPLDI-1995-Click
Global Code Motion / Global Value Mumbering (CC), pp. 246–257.
PLDIPLDI-1995-Patterson #branch #predict
Accurate Static Branch Prediction by Value Range Propagation (JRCP), pp. 67–78.
DLTDLT-1995-Weber #automaton #transducer
Transforming a Single-Valued Transducer Into a Mealy Machine (AW), pp. 176–185.
FPCAFPCA-1995-Thiemann #polymorphism #revisited #type system
Unboxed Values and Polymorphic Typing Revisited (PT), pp. 24–35.
ICMLICML-1995-Niyogi #complexity #learning
Free to Choose: Investigating the Sample Complexity of Active Learning of Real Valued Functions (PN), pp. 405–412.
ICMLICML-1995-SalganicoffU #learning #multi #using
Active Exploration and Learning in real-Valued Spaces using Multi-Armed Bandit Allocation Indices (MS, LHU), pp. 480–487.
TLCATLCA-1995-PravatoRR #call-by #category theory #semantics #λ-calculus
Categorical semantics of the call-by-value λ-calculus (AP, SRDR, LR), pp. 381–396.
SASSAS-1994-BanerjeeS #call-by #λ-calculus
Stackability in the Simply-Typed Call-by-Value λ Calculus (AB, DAS), pp. 131–146.
LISPLFP-1994-AshleyD #implementation #multi #performance
An Efficient Implementation of Multiple Return Values in Scheme (JMA, RKD), pp. 140–149.
CHICHI-1994-BurkhartHJ94a #design
The value of a baseline in determining design success (BJB, DH, SJ), pp. 386–391.
KDDKDD-1994-ChuC #abstraction #concept #database
Abstraction of High Level Concepts from Numerical Values in Databases (WWC, KC), pp. 133–144.
PPDPALP-1994-Teusink #abduction #logic programming #source code
Three-Valued Completion for Abductive Logic Programs (FT), pp. 150–167.
PPDPPLILP-1994-JanssensBE
Abstracting Numerical Values in CLP(H, N) (GJ, MB, VE), pp. 400–414.
POPLPOPL-1994-CleavelandY #framework #process
An Operational Framework for Value-Passing Processes (RC, DY), pp. 326–338.
POPLPOPL-1994-TofteT #call-by #implementation #stack #using #λ-calculus
Implementation of the Typed Call-by-Value λ-Calculus using a Stack of Regions (MT, JPT), pp. 188–201.
POPLPOPL-1994-WeiseCES #dependence #graph #representation
Value Dependence Graphs: Representation without Taxation (DW, RFC, MDE, BS), pp. 297–310.
ICLPICLP-1994-BigotGD #logic programming #source code
Output Value Placement in Moded Logic Programs (PAB, DG, SKD), pp. 175–189.
ICDARICDAR-1993-HuangS #classification #metric #multi
Combination of multiple classifiers with measurement values (YSH, CYS), pp. 598–601.
ICSMECSM-1993-MerloGHM #constant #multi #re-engineering #user interface
Multi-Valued Constant Propagation for the Reengineering of User Interfaces (EM, JFG, LJH, RdM), pp. 120–129.
CHIINTERCHI-1993-MaguireD #industrial #metric #usability
Usability measurement: its practical value to the computer industry (MCM, AD), pp. 145–148.
CIKMCIKM-1993-HalperGP #database #object-oriented
Value Propagation in Object-Oriented Database Part Hierarchies (MH, JG, YP), pp. 606–614.
CIKMCIKM-1993-HouZZ #database #statistics
Statistical Inference of Unknown Attribute Values in Databases (WCH, ZZ, NZ), pp. 21–30.
SACSAC-1993-GallionSCB #algorithm #learning
Dynamic ID3: A Symbolic Learning Algorithm for Many-Valued Attribute Domains (RG, CLS, DCSC, WEB), pp. 14–20.
SACSAC-1993-PanH #array #composition #pipes and filters
Computation of Singular Value Decomposition on Arrays with Pipelined Optical Buses (YP, MH), pp. 525–532.
TLCATLCA-1993-Sieber #call-by #nondeterminism
Call-by-Value and Nondeterminism (KS), pp. 376–390.
DACDAC-1992-LaiS #diagrams #multi #verification
Edge-Valued Binary Decision Diagrams for Multi-Level Hierarchical Verification (YTL, SS), pp. 608–613.
DACDAC-1992-LinCM #generative #multi
Symbolic Prime Generation for Multiple-Valued Functions (BL, OC, JCM), pp. 40–44.
STOCSTOC-1992-Ben-David #detection #finite #question
Can Finite Samples Detect Singularities of Real-Valued Functions? (SBD), pp. 390–399.
SASWSA-1992-GenglerR #analysis
A Polyvariant Binding Time Analysis Handling Partially Known Values (MG, MR), pp. 322–330.
SASWSA-1992-Queinnec
Value Transforming Style (CQ), pp. 20–28.
CHICHI-1992-Chimera #multi #navigation #visualisation
Value bars: an information visualization and navigation tool for multi-attribute listings (RC), pp. 293–294.
ICMLML-1992-WeinbergBK #clustering #concept
Conceptual Clustering with Systematic Missing Values (JBW, GB, GRK), pp. 464–469.
CADECADE-1992-BeckertGHK #logic #multi #proving #theorem proving
The Tableau-Based Theorem Prover 3TAP for Multi-Valued Logics (BB, SG, RH, WK), pp. 758–760.
CSLCSL-1992-Smith #type system
Kleene’s Slash and Existence of Values of Open Terms in Type Theory (JMS), pp. 395–402.
ICLPJICSLP-1992-Fitting #logic programming #semantics
Many-Valued Semantics for Logic Programming (MF), pp. 23–24.
PODSPODS-1991-BusscheP #power of
The Expressive Power of Structured Values in Pure OODB’s (JVdB, JP), pp. 291–299.
FPCAFPCA-1991-JonesL #functional #strict
Unboxed Values as First Class Citizens in a Non-Strict Functional Language (SLPJ, JL), pp. 636–666.
KRKR-1991-Ginsberg91a #reasoning
The Computational Value of Nonmonotonic Reasoning (MLG), pp. 262–268.
ICMLML-1991-Kadie #induction #learning
Quantifying the Value of Constructive Induction, Knowledge, and Noise Filtering on Inductive Learning (CMK), pp. 153–157.
ICSEICSE-1991-JacobyT #evaluation #geometry #parametricity #reliability
Parameter Value Computation by Least Square Method and Evaluation of Software Availability and Reliability at Service-Operation by the Hyper-Geometric Distribution Software Reliability Growth Model (HGDM) (RJ, YT), pp. 226–237.
CSLCSL-1991-Mundici #logic #normalisation
Normal Forms in Infinite-Valued Logic: The Case of One Variable (DM), pp. 272–277.
DACDAC-1990-MalikBNS #logic #multi
Reduced Offsets for Two-Level Multi-Valued Logic Minimization (AAM, RKB, ARN, ALSV), pp. 290–296.
PODSPODS-1990-SoparkarS #clustering
Data-value Partitioning and Virtual Messages (NS, AS), pp. 357–367.
PODSPODS-1990-YouY #formal method #logic programming #question
Three-Valued Formalization of Logic Programming: Is It Needed? (JHY, LYY), pp. 172–182.
VLDBVLDB-1990-Mohan #concurrent #multi #named #transaction
ARIES/KVL: A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes (CM), pp. 392–405.
ESOPESOP-1990-SteffenKR #graph #program transformation #representation
The Value Flow Graph: A Program Representation for Optimal Program Transformations (BS, JK, OR), pp. 389–405.
ICALPICALP-1990-HennessyI #communication #formal method #process
A Theory of Communicating Processes with Value-Passing (MH, AI), pp. 209–219.
ICALPICALP-1990-Riecke #call-by #decidability #proving
A Complete and Decidable Proof System for Call-by-Value Equalities (Preliminary Report) (JGR), pp. 20–31.
ICMLML-1990-ObradovicP #learning #multi
Learning with Discrete Multi-Valued Neurons (ZO, IP), pp. 392–399.
CSLCSL-1990-Hahnle #logic #multi #performance #proving #towards
Towards an Efficient Tableau Proof Procedure for Multiple-Valued Logics (RH), pp. 248–260.
LICSLICS-1990-RobinsonR #call-by #morphism #polymorphism #set
Polymorphism, Set Theory, and Call-by-Value (ER, GR), pp. 12–18.
ICLPNACLP-1990-Liu #null #source code
Null Values in Definite Programs (YL), pp. 273–288.
SIGMODSIGMOD-1989-IoannidisS
Conflict Resolution of Rules Assigning Values to Virtual Attributes (YEI, TKS), pp. 205–214.
PLDIPLDI-1989-OTooleG #polymorphism #re-engineering
Type Reconstruction with First-Class Polymorphic Values (JO, DKG), pp. 207–217.
KRKR-1989-Przymusinski #formal method #logic programming #reasoning
Three-Valued Formalizations of Non-Monotonic Reasoning and Logic Programming (TCP), pp. 341–348.
ICMLML-1989-Quinlan #induction
Unknown Attribute Values in Induction (JRQ), pp. 164–168.
SIGMODSIGMOD-1988-YuanC #algorithm #database #evaluation #null #query #relational
A Sound and Complete Query Evaluation Algorithm for Relational Databases with Null Values (LYY, DAC), pp. 74–81.
VLDBVLDB-1988-GottlobZ #database #null
Closed World Databases Opened Through Null Values (GG, RZ), pp. 50–61.
VLDBVLDB-1988-Lynch #database #estimation #optimisation #query #scalability
Selectivity Estimation and Query Optimization in Large Databases with Highly Skewed Distribution of Column Values (CAL), pp. 240–251.
PLDIPLDI-1988-Reppy
Synchronous Operations as First-Class Values (JHR), pp. 250–259.
FMVDME-1988-Blikle #specification #validation
Three-Valued Predicates for Software Specification and Validation (AB), pp. 243–266.
FMVDME-1988-KonikowskaTB #logic #specification #validation
A Three-Valued Logic for Software Specification and Validation (BK, AT, AB), pp. 218–242.
SIGIRSIGIR-1988-FurnasDDLHSL #composition #information retrieval #semantics #using
Information Retrieval using a Singular Value Decomposition Model of Latent Semantic Structure (GWF, SCD, STD, TKL, RAH, LAS, KEL), pp. 465–480.
PPDPALP-1988-Dahn #modelling #specification
Boolean Valued Models and Incomplete Specifications (BID), pp. 119–126.
POPLPOPL-1988-RosenWZ
Global Value Numbers and Redundant Computations (BKR, MNW, FKZ), pp. 12–27.
ICLPJICSCP-1988-FittingB88 #logic programming #semantics
Stratified and Three-valued Logic Programming Semantics (MF, MBJ), pp. 1054–1069.
STOCSTOC-1987-Buss #problem
The Boolean Formula Value Problem Is in ALOGTIME (SRB), pp. 123–131.
ICALPICALP-1987-Johnson #finite
Single-Valued Finite Transduction (JHJ), pp. 202–211.
POPLPOPL-1987-TannenM
Computable Values Can Be Classical (VT, ARM), pp. 238–245.
ICSEICSE-1987-MiyazakiM #metric #using
Software Metrics Using Deviation Value (YM, NM), pp. 83–95.
ICLPICLP-1987-CecchiSA87 #logic programming #source code
Evaluating Logic Programs via Set-Valued Functions (CC, DS, LCA), pp. 428–455.
ICLPICLP-1987-MorishitaNH87 #logic programming
Symbolical Construction of Truth Value Domain for Logic Program (SM, MN, SH), pp. 533–555.
DACDAC-1986-KuoC #generative #multi
Generating essential primes for a Boolean function with multiple-valued inputs (YSK, WKC), pp. 193–199.
CADECADE-1986-Schmitt #aspect-oriented #logic
Computational Aspects of Three-Valued Logic (PHS), pp. 190–198.
PODSPODS-1984-TaySG #database #performance
A Mean Value Performance Model for Locking in Databases: The Waiting Case (YCT, RS, NG), pp. 311–322.
ICALPICALP-1984-AtzeniM #constraints #database #dependence #functional #null
Functional Dependencies and Disjunctive Existence Constraints in Database Relations with Null Values (PA, NMM), pp. 69–81.
DACDAC-1982-McDermott #modelling
Transmission gate modeling in an existing three-value simulator (RMM), pp. 678–681.
PODSPODS-1982-Zaniolo #database #null
Database Relations with Null Values (CZ), pp. 27–33.
LISPLFP-1982-Georgeff #functional #implementation #stack
A Scheme for Implementing Functional Values on a Stack Machine (MPG), pp. 188–195.
DACDAC-1981-Sherwood #logic #modelling #simulation
A MOS modelling technique for 4-state true-value hierarchical logic simulation or Karnough knowledge (WS), pp. 775–785.
SIGMODSIGMOD-1981-StearnsR #concurrent #database #distributed #using
Distributed Database Concurrency Controls Using Before-Values (RES, DJR), pp. 74–83.
VLDBVLDB-1981-Goldstein #constraints #database #null #relational
Constraints on Null Values in Relational Databases (BSG), pp. 101–110.
SIGIRSIGIR-1981-Robertson
Term Frequency and Term Value (SER), pp. 22–29.
SIGMODSIGMOD-1979-Vassiliou #approach #database #null #semantics
Null Values in Data Base Management: A Denotational Semantics Approach (YV), pp. 162–169.
VLDBVLDB-1979-Lien #database #dependence #multi #null #relational
Multivalued Dependencies with Null Values in Relational Data Bases (YEL), pp. 61–66.
ICALPICALP-1979-SethiT #call-by #continuation #semantics
Constructing Call-by-Value Continuation Semantics (RS, AT), pp. 556–570.
SIGIRSIGIR-1979-Dattola #documentation #retrieval
Use of Dynamic Discrimination Values in a Document Retrieval System (RTD), pp. 23–32.
DACDAC-1978-AliaCMB #component #functional #modelling #simulation
LSI components modelling in a three-valued functional simulation (GA, PC, EM, FB), pp. 428–438.
SIGMODSIGMOD-1978-YamamotoTUI #design #multi #order
Design of a Generalized Balanced Multiple-Valued File Organization Scheme of Order Two (SY, ST, KU, HI), pp. 47–51.
ICALPICALP-1978-CremersH #using
Mutual Exclusion of N Processors Using an O(N)-Valued Message Variable (Extended Abstract) (ABC, TNH), pp. 165–176.
POPLPOPL-1978-DemersDS #data type #encapsulation #morphism #polymorphism
Data Types as Values: Polymorphism, Type-Checking, Encapsulation (AJD, JED, GS), pp. 23–30.
VLDBVLDB-1977-YamamotoTUI #design #multi
Design of a Balanced Multiple Valued File Organization Schema with the Least Redundancy (SY, ST, KU, HI), p. 230.
POPLPOPL-1977-Lang #call-by #evaluation #semantics
Threshold Evaluation and the Semantics of Call by Value, Assignment and Generic Procedures (BL), pp. 227–237.
POPLPOPL-1977-ReifL #evaluation #graph #symbolic computation
Symbolic Evaluation and the Global Value Graph (JHR, HRL), pp. 104–118.
DACDAC-1975-Sherman #testing #using
Program function test definition using a three-value simulator (WJS), pp. 189–194.
POPLPOPL-1975-Solomon
Modes, Values, and Expressions (MHS), pp. 149–159.
DACDAC-1972-Landsburg #design
The value of digital printer plotting in ship design (ACL), pp. 170–180.
DACSHARE-1965-Fielding #automation #design
Cost value of design automation (FGF).

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.