225 papers:
FoSSaCS-2015-SalvatiW #type system- Typing Weak MSOL Properties (SS, IW), pp. 343–357.
SCAM-2015-RenatusBE #modelling #security #using- Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
PLDI-2015-TassarottiDV #logic #memory management #verification- Verifying read-copy-update in a logic for weak memory (JT, DD, VV), pp. 110–120.
ICALP-v2-2015-LahavV #memory management #modelling #reasoning- Owicki-Gries Reasoning for Weak Memory Models (OL, VV), pp. 311–323.
LATA-2015-Cotton-BarrattMO #automaton #memory management- Weak and Nested Class Memory Automata (CCB, ASM, CHLO), pp. 188–199.
FM-2015-DerrickS #correctness #framework #memory management #modelling- A Framework for Correctness Criteria on Weak Memory Models (JD, GS), pp. 178–194.
QAPL-2015-AldiniB #automaton #markov #similarity- Expected-Delay-Summing Weak Bisimilarity for Markov Automata (AA, MB), pp. 1–15.
ASPLOS-2015-AlglaveBDGKPSW #behaviour #concurrent #gpu #programming- GPU Concurrency: Weak Behaviours and Programming Assumptions (JA, MB, AFD, GG, JK, DP, TS, JW), pp. 577–591.
HPDC-2015-WangZQLMR #consistency #distributed #scalability #towards- Towards Scalable Distributed Workload Manager with Monitoring-Based Weakly Consistent Resource Stealing (KW, XZ, KQ, ML, BM, IR), pp. 219–222.
CADE-2015-SakaiOO #confluence- Non-E-Overlapping, Weakly Shallow, and Non-Collapsing TRSs are Confluent (MS, MO, MO), pp. 111–126.
CSL-2015-BrihayeBMR #reachability- Weak Subgame Perfect Equilibria and their Application to Quantitative Reachability (TB, VB, NM, JFR), pp. 504–518.
ICLP-J-2015-LawRB #constraints #learning #programming #set- Learning weak constraints in answer set programming (ML, AR, KB), pp. 511–525.
LICS-2015-Carreiro #bisimulation #invariant #logic- PDL Is the Bisimulation-Invariant Fragment of Weak Chain Logic (FC), pp. 341–352.
WRLA-2014-LucasM #order #termination- Strong and Weak Operational Termination of Order-Sorted Rewrite Theories (SL, JM), pp. 178–194.
PLDI-2014-AlglaveMT #memory management #modelling #simulation #testing- Herding cats: modelling, simulation, testing, and data-mining for weak memory (JA, LM, MT), p. 7.
STOC-2014-Massoulie #community #detection- Community detection thresholds and the weak Ramanujan property (LM), pp. 694–703.
ICALP-v1-2014-AaronsonABB- Weak Parity (SA, AA, KB, MB), pp. 26–38.
ICALP-v2-2014-Bojanczyk14a #infinity #quantifier- Weak MSO+U with Path Quantifiers over Infinite Trees (MB), pp. 38–49.
ICALP-v2-2014-Chatterjee0 #game studies- Games with a Weak Adversary (KC, LD), pp. 110–121.
ICALP-v2-2014-GoncharovP #algebra #bisimulation #equation #monad #recursion- Coalgebraic Weak Bisimulation from Recursive Equations over Monads (SG, DP), pp. 196–207.
ICML-c2-2014-XuTXR #reduction- Large-margin Weakly Supervised Dimensionality Reduction (CX, DT, CX, YR), pp. 865–873.
KDD-2014-LiuWY #algorithm #performance- An efficient algorithm for weak hierarchical lasso (YL, JW, JY), pp. 283–292.
SIGIR-2014-HingmireC #approach #classification #topic- Topic labeled text classification: a weakly supervised approach (SH, SC), pp. 385–394.
OOPSLA-2014-TuronVD #memory management #named #navigation #protocol- GPS: navigating weak memory with ghosts, protocols, and separation (AT, VV, DD), pp. 691–707.
SAC-2014-OmatuY #classification #smell #using- Smell classification using weakly responding data (SO, MY), pp. 213–214.
HPCA-2014-PariharH #approach #dependence #metaheuristic- Accelerating decoupled look-ahead via weak dependence removal: A metaheuristic approach (RP, MCH), pp. 662–677.
LICS-CSL-2014-CarreiroFVZ #automaton #similarity- Weak MSO: automata and expressiveness modulo bisimilarity (FC, AF, YV, FZ), p. 27.
LICS-CSL-2014-CharatonikKM #decidability #logic #transitive- Decidability of weak logics with deterministic transitive closure (WC, EK, FM), p. 10.
LICS-CSL-2014-Haase #subclass- Subclasses of presburger arithmetic and the weak EXP hierarchy (CH), p. 10.
SMT-2014-ChristH #array- Weakly Equivalent Arrays (JC, JH), pp. 39–49.
ICDAR-2013-RoySSJ #documentation #n-gram #segmentation #using- Character N-Gram Spotting on Handwritten Documents Using Weakly-Supervised Segmentation (UR, NS, KPS, CVJ), pp. 577–581.
ESOP-2013-AlglaveKNT #memory management #program transformation #verification- Software Verification for Weak Memory via Program Transformation (JA, DK, VN, MT), pp. 512–532.
ESOP-2013-JagadeesanPPR #composition #memory management #modelling #reasoning- Quarantining Weakness — Compositional Reasoning under Relaxed Memory Models (Extended Abstract) (RJ, GP, CP, JR), pp. 492–511.
ICALP-v2-2013-JurdzinskiKS #distributed #network- Distributed Deterministic Broadcasting in Wireless Networks of Weak Devices (TJ, DRK, GS), pp. 632–644.
ICFP-2013-Balabonski- Weak optimality, and the meaning of sharing (TB), pp. 263–274.
CSCW-2013-BurkeK #difference #facebook #using- Using facebook after losing a job: differential benefits of strong and weak ties (MB, RK), pp. 1419–1430.
CIKM-2013-FangHZ #analysis #bibliography #sentiment- Exploring weakly supervised latent sentiment explanations for aspect-level review analysis (LF, MH, XZ), pp. 1057–1066.
SEKE-2013-Al-JamimiA #design pattern #detection #prolog #using- Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (S) (HAAJ, MAA), pp. 727–730.
SIGIR-2013-BonnefoyBB #detection #documentation- A weakly-supervised detection of entity central documents in a stream (LB, VB, PB), pp. 769–772.
PPDP-2013-ChristiansenHRS #encapsulation #functional #logic programming #semantics #source code- A semantics for weakly encapsulated search in functional logic programs (JC, MH, FR, DS), pp. 49–60.
PPoPP-2013-LePCN #memory management #modelling #performance- Correct and efficient work-stealing for weak memory models (NML, AP, AC, FZN), pp. 69–80.
CADE-2013-BaumgartnerW #abstraction- Hierarchic Superposition with Weak Abstraction (PB, UW), pp. 39–57.
CSL-2013-ColcombetKLB #automaton- Deciding the weak definability of Büchi definable tree languages (TC, DK, CL, MVB), pp. 215–230.
LICS-2013-HofmanMT #decidability #simulation- Decidability of Weak Simulation on One-Counter Nets (PH, RM, PT), pp. 203–212.
LICS-2013-Riba #infinity #word- Forcing MSO on Infinite Words in Weak MSO (CR), pp. 448–457.
SAT-2013-MisraORS #bound #detection #set- Upper and Lower Bounds for Weak Backdoor Set Detection (NM, SO, VR, SS), pp. 394–402.
PODS-2012-Tao #2d #constant- Indexability of 2D range search revisited: constant redundancy and weak indivisibility (YT), pp. 131–142.
ESOP-2012-AtigBBM #decidability #memory management #modelling #question #what- What’s Decidable about Weak Memory Models? (MFA, AB, SB, MM), pp. 26–46.
ICSM-2012-QianZ #java #memory management- Inferring weak references for fixing Java memory leaks (JQ, XZ), pp. 571–574.
ICSM-2012-QiML #automation #performance #scalability #source code #using- Making automatic repair for large-scale programs more efficient using weak recompilation (YQ, XM, YL), pp. 254–263.
CIAA-2012-AmaviCR #recursion #xml- Weak Inclusion for Recursive XML Types (JA, JC, PR), pp. 78–89.
LATA-2012-IbarraT #automaton #multi #turing machine- Weak Synchronization and Synchronizability of Multitape Pushdown Automata and Turing Machines (OHI, NQT), pp. 337–350.
CIKM-2012-LuZZX #image #learning #scalability #semantics #set- Semantic context learning with large-scale weakly-labeled image set (YL, WZ, KZ, XX), pp. 1859–1863.
ICML-2012-JoulinB #classification- A convex relaxation for weakly supervised classifiers (AJ, FRB), p. 171.
ICPR-2012-AbouelenienY #analysis #fault #named #performance- SampleBoost: Improving boosting performance by destabilizing weak learners based on weighted error analysis (MA, XY), pp. 585–588.
ICPR-2012-BougesCBL #classification #nearest neighbour #using- Using k-nearest neighbors to handle missing weak classifiers in a boosted cascade (PB, TC, CB, GL), pp. 1763–1766.
QAPL-2012-Bernardo #bisimulation #concurrent #markov #process- Weak Markovian Bisimulation Congruences and Exact CTMC-Level Aggregations for Concurrent Processes (MB), pp. 122–136.
CSL-2012-AltenkirchR #approach- A Syntactical Approach to Weak ω-Groupoids (TA, OR), pp. 16–30.
CSL-2012-Cook #complexity #proving- Connecting Complexity Classes, Weak Formal Theories, and Propositional Proof Systems (Invited Talk) (SAC), pp. 9–11.
ICST-2012-DurelliOD #mutation testing #testing #towards #virtual machine- Toward Harnessing High-Level Language Virtual Machines for Further Speeding Up Weak Mutation Testing (VHSD, JO, MED), pp. 681–690.
CIAA-2011-AmaviCAR #xml- Weak Inclusion for XML Types (JA, JC, MHFA, PR), pp. 30–41.
ECIR-2011-He #classification #sentiment- Latent Sentiment Model for Weakly-Supervised Cross-Lingual Sentiment Classification (YH), pp. 214–225.
KDIR-2011-Jean-LouisBFD #approach #scalability- A Weakly Supervised Approach for Large-scale Relation Extraction (LJL, RB, OF, AD), pp. 94–103.
MLDM-2011-MohebzadaRR #analysis #constraints #generative- Sensitivity Analysis for Weak Constraint Generation (JGM, MMR, GR), pp. 239–252.
SIGIR-2011-WangHH #image #mining #search-based #web- Mining weakly labeled web facial images for search-based face annotation (DW, SCHH, YH), pp. 535–544.
MoDELS-2011-BavotaGOLTGC #comprehension #diagrams #identification #uml- Identifying the Weaknesses of UML Class Diagrams during Data Model Comprehension (GB, CG, RO, ADL, GT, MG, JACL), pp. 168–182.
MoDELS-2011-BavotaGOLTGC #comprehension #diagrams #identification #uml- Identifying the Weaknesses of UML Class Diagrams during Data Model Comprehension (GB, CG, RO, ADL, GT, MG, JACL), pp. 168–182.
PPoPP-2011-RoyHH #consistency #memory management- Weak atomicity under the x86 memory consistency model (AR, SH, TLH), pp. 291–292.
CAV-2011-AlglaveM #memory management #modelling- Stability in Weak Memory Models (JA, LM), pp. 50–66.
DAC-2010-ShenTX #algorithm #analysis #correlation #linear #power management #statistics- A linear algorithm for full-chip statistical leakage power analysis considering weak spatial correlation (RS, SXDT, JX), pp. 481–486.
ESOP-2010-DilligDA- Fluid Updates: Beyond Strong vs. Weak Updates (ID, TD, AA), pp. 246–266.
TACAS-2010-BauerMSH #on the #refinement- On Weak Modal Compatibility, Refinement, and the MIO Workbench (SSB, PM, AS, RH), pp. 175–189.
PLDI-2010-WestbrookRIYAT #java #multi #named #programming #using- Mint: Java multi-stage programming using weak separability (EMW, MR, JI, YY, TA, WT), pp. 400–411.
AFL-J-2008-Blanchet-SadriOR10 #theorem #word- Fine and Wilf’s Theorem for Partial Words with Arbitrarily Many Weak Periods (FBS, TO, TDR), pp. 705–722.
ICALP-v1-2010-Ambos-SpiesB #exponential- Weak Completeness Notions for Exponential Time (KAS, TB), pp. 503–514.
ICPR-2010-AndoF #classification #image #segmentation- Human-Area Segmentation by Selecting Similar Silhouette Images Based on Weak-Classifier Response (HA, HF), pp. 3444–3447.
ICPR-2010-ThiCZWS #modelling #recognition #using- Weakly Supervised Action Recognition Using Implicit Shape Models (THT, LC, JZ, LW, SS), pp. 3517–3520.
ICPR-2010-YouLJ #automation #image- Automatic Weak Calibration of Master-Slave Surveillance System Based on Mosaic Image (LY, SL, WJ), pp. 1824–1827.
SEKE-2010-Yeh #animation #human-computer #interactive #learning- The effects of human-computer interaction modes for weak learners in an animation learning environment (YFY), pp. 18–23.
POPL-2010-AtigBBM #memory management #modelling #on the #problem #verification- On the verification problem for weak memory models (MFA, AB, SB, MM), pp. 7–18.
SAC-OOPS-J-2008-LogozzoF10 #abstract domain #array #named #performance #relational #validation- Pentagons: A weakly relational abstract domain for the efficient validation of array accesses (FL, MF), pp. 796–807.
SAC-2010-Niu #energy #realtime #scalability- Energy-aware dual-mode voltage scaling for weakly hard real-time systems (LN), pp. 321–325.
CAV-2010-AlglaveMSS #memory management #modelling- Fences in Weak Memory Models (JA, LM, SS, PS), pp. 258–272.
CSL-2010-GanzowK #algorithm #higher-order #induction #logic #monad- New Algorithm for Weak Monadic Second-Order Logic on Inductive Structures (TG, LK), pp. 366–380.
LICS-2010-JohanssonBPV #calculus- Weak Equivalences in Psi-Calculi (MJ, JB, JP, BV), pp. 322–331.
RTA-2010-EndrullisGHKO #normalisation #orthogonal- Unique Normal Forms in Infinitary Weakly Orthogonal Rewriting (JE, CG, DH, JWK, VvO), pp. 85–102.
RTA-2010-Simonsen #convergence #normalisation- Weak Convergence and Uniform Normalization in Infinitary Rewriting (JGS), pp. 311–324.
ICDAR-2009-BarratT #image #modelling #network #using- Modeling, Classifying and Annotating Weakly Annotated Images Using Bayesian Network (SB, ST), pp. 1201–1205.
STOC-2009-DodisW #encryption #symmetry- Non-malleable extractors and symmetric key cryptography from weak secrets (YD, DW), pp. 601–610.
ICALP-v2-2009-ParysW #automaton- Weak Alternating Timed Automata (PP, IW), pp. 273–284.
AdaEurope-2009-KaiserP #java #multi #semantics #thread- Weak Fairness Semantic Drawbacks in Java Multithreading (CK, JFPP), pp. 90–104.
KDD-2009-XuYL #mining #using- Named entity mining from click-through data using weakly supervised latent dirichlet allocation (GX, SHY, HL), pp. 1365–1374.
SAC-2009-ArbelaezH #dependence- Exploiting weak dependencies in tree-based search (AA, YH), pp. 1385–1391.
LICS-2009-CreusGMT #normalisation #term rewriting- Non-linear Rewrite Closure and Weak Normalization (CC, GG, FM, AT), pp. 365–374.
TLCA-2009-Lumsdaine #type system- Weak ω-Categories from Intensional Type Theory (PLL), pp. 172–187.
AFL-2008-Blanchet-SadriOR #word- Computing Weak Periods of Partial Words (FBS, TO, TDR), pp. 134–145.
ICALP-C-2008-HochS #on the- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak (JJH, AS), pp. 616–630.
ICALP-C-2008-PietrzakS #pseudo- Weak Pseudorandom Functions in Minicrypt (KP, JS), pp. 423–436.
ICGT-2008-Heindel #category theory #morphism- Grammar Morphisms and Weakly Adhesive Categories (TH), pp. 493–495.
ICEIS-HCI-2008-StoitsevSFM08a #modelling #process #programming- Enabling end Users to Proactively Tailor Underspecified, Human-Centric Business Processes — “Programming by Example” of Weakly-Structured Process Models (TS, SS, FF, MM), pp. 38–46.
ICEIS-J-2008-StoitsevSFM08b #modelling #process #programming- Enabling End Users to Proactively Tailor Underspecified, Human-Centric Business Processes: “Programming by Example” of Weakly-Structured Process Models (TS, SS, FF, MM), pp. 307–320.
ICPR-2008-FabletLSMCB #learning #using- Weakly supervised learning using proportion-based information: An application to fisheries acoustics (RF, RL, CS, JM, PC, JMB), pp. 1–4.
ICPR-2008-ZhuBQ #lazy evaluation #learning- Bagging very weak learners with lazy local learning (XZ, CB, WQ), pp. 1–4.
SAC-2008-LogozzoF #abstract domain #array #named #performance #relational #validation- Pentagons: a weakly relational abstract domain for the efficient validation of array accesses (FL, MF), pp. 184–188.
LICS-2008-Edalat- Weak Topology and a Differentiable Operator for Lipschitz Maps (AE), pp. 364–375.
DATE-2007-NiuQ #energy #interactive #realtime #scheduling- Interactive presentation: Peripheral-conscious scheduling on energy minimization for weakly hard real-time systems (LN, GQ), pp. 791–796.
HT-2007-CanosSPL #design #process- Strong vs. weak links: making processes prevail over structure in navigational design (JHC, CS, MdCP, ML), pp. 139–140.
LATA-2007-KutribR #automaton #regular expression- Succinct Description of Regular Languages by Weak Restarting Automata (MK, JR), pp. 343–354.
CIKM-2007-Pasca07a #query #using #web- Weakly-supervised discovery of named entities using web search queries (MP), pp. 683–690.
SIGIR-2007-LiLHC #ad hoc #corpus #query #using #wiki- Improving weak ad-hoc queries using wikipedia as external corpus (YL, RWPL, EKSH, KFLC), pp. 797–798.
TLCA-2007-JiangZ- Weakly Distributive Domains (YJ, GQZ), pp. 194–206.
PLDI-2006-DhurjatiKA #alias #analysis #named- SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
DLT-2006-SanteanY #ambiguity #finite #on the #transducer- On Weakly Ambiguous Finite Transducers (NS, SY), pp. 156–167.
EDOC-2006-ErnstLSW #architecture #enterprise #tool support- Tool Support for Enterprise Architecture Management — Strengths and Weaknesses (AME, JL, CMS, AW), pp. 13–22.
CIKM-2006-QianXWC #adaptation #categorisation- Adapting association patterns for text categorization: weaknesses and enhancements (TQ, HX, YW, EC), pp. 782–783.
CIKM-2006-TomasicSZ- Processing information intent via weak labeling (AT, IS, JZ), pp. 856–857.
ICPR-v2-2006-ZhengLY #kernel #learning #problem- Weakly Supervised Learning on Pre-image Problem in Kernel Methods (WSZ, JHL, PCY), pp. 711–715.
ISMM-2006-DonnellyHK #semantics- Formal semantics of weak references (KD, JJH, AJK), pp. 126–137.
CAV-2006-HeljankoJKLL #automaton #bound #model checking- Bounded Model Checking for Weak Alternating Büchi Automata (KH, TAJ, MK, ML, TL), pp. 95–108.
CSL-2006-HarwoodMS #bisimulation- Weak Bisimulation Approximants (WH, FM, AS), pp. 365–379.
DATE-2005-MartensG #integration #orthogonal #polynomial #simulation #using- Time-Domain Simulation of Sampled Weakly Nonlinear Systems Using Analytical Integration and Orthogonal Polynomial Series (EM, GGEG), pp. 120–125.
SAS-2005-BagnaraHMZ #abstraction- Widening Operators for Weakly-Relational Numeric Abstractions (RB, PMH, EM, EZ), pp. 3–18.
STOC-2005-Holenstein- Key agreement from weak bit agreement (TH), pp. 664–673.
STOC-2005-Raz #random- Extractors with weak random seeds (RR), pp. 11–20.
ICALP-2005-Pous #bisimulation- Up-to Techniques for Weak Bisimulation (DP), pp. 730–741.
CSL-2005-BrattkaS #axiom #sequence- Computing with Sequences, Weak Topologies and the Axiom of Choice (VB, MS), pp. 462–476.
CSL-2005-Kolokolova #bound- Closure Properties of Weak Systems of Bounded Arithmetic (AK), pp. 369–383.
VMCAI-2005-Lange #automaton #calculus #linear- Weak Automata for the Linear Time µ-Calculus (ML), pp. 267–281.
CIKM-2004-Zhang #classification #information management- Weakly-supervised relation classification for information extraction (ZZ), pp. 581–588.
KR-2004-Lukasiewicz #logic #probability- Weak Nonmonotonic Probabilistic Logics (TL), pp. 23–33.
ICSE-2004-OReilly #approach #coordination- A Weakly Constrained Approach to Software Change Coordination (CO), pp. 66–68.
IJCAR-2004-GanzingerSW #composition #proving #similarity- Modular Proof Systems for Partial Functions with Weak Equality (HG, VSS, UW), pp. 168–182.
LICS-2004-CookT- The Strength of Replacement in Weak Arithmetic (SAC, NT), pp. 256–264.
DAC-2003-LiP #named #order #reduction- NORM: compact model order reduction of weakly nonlinear systems (PL, LTP), pp. 472–477.
DATE-2003-DobrovolnyVWD #analysis #modelling- Analysis and White-Box Modeling of Weakly Nonlinear Time-Varying Circuits (PD, GV, PW, SD), pp. 10624–10629.
FASE-2003-Morasca #approach #metric- Foundations of a Weak Measurement-Theoretic Approach to Software Measurement (SM), pp. 200–215.
STOC-2003-BatuEKMRRS #algorithm #approximate #distance #edit distance #sublinear- A sublinear algorithm for weakly approximating edit distance (TB, FE, JK, AM, SR, RR, RS), pp. 316–324.
CIAA-2003-Ravikumar #algorithm #automaton- Weak Minimization of DFA — An Algorithm and Applications (BR), pp. 226–238.
ICALP-2003-Mayr #bisimulation #equivalence #process- Undecidability of Weak Bisimulation Equivalence for 1-Counter Processes (RM), pp. 570–583.
SEFM-2003-LanotteMT #automaton #bisimulation #probability #security- Weak Bisimulation for Probabilistic Timed Automata and Applications to Security (RL, AMS, AT), pp. 34–43.
PPDP-2003-Escobar- Refining weakly outermost-needed rewriting and narrowing (SE), pp. 113–123.
STOC-2002-Raz02a #bound #principle- Resolution lower bounds for the weak pigeonhole principle (RR), pp. 553–562.
DLT-2002-Srba #similarity- Undecidability of Weak Bisimilarity for PA-Processes (JS), pp. 197–208.
ICML-2002-BockhorstC #concept- Exploiting Relations Among Concepts to Acquire Weakly Labeled Training Data (JB, MC), pp. 43–50.
ICML-2002-Seewald #how #performance- How to Make Stacking Better and Faster While Also Taking Care of an Unknown Weakness (AKS), pp. 554–561.
ICPR-v1-2002-YuanGYW #modelling #recognition- Recognition of Strong and Weak Connection Models in Continuous Sign Language (QY, WG, HY, CW), pp. 75–78.
KDD-2002-JoshiAK #predict #question- Predicting rare classes: can boosting make any weak learner strong? (MVJ, RCA, VK), pp. 297–306.
CAV-2002-ChatterjeeSG #consistency #memory management #model checking #modelling #protocol #refinement #verification- Shared Memory Consistency Protocol Verification Against Weak Memory Models: Refinement via Model-Checking (PC, HS, GG), pp. 123–136.
CSL-2002-ChernovSSV #logic- Variants of Realizability for Propositional Formulas and the Logic of the Weak Law of Excluded Middle (AVC, DPS, EZS, NKV), pp. 74–88.
LICS-2002-DesharnaisJGP #bisimulation #metric #probability #process- The Metric Analogue of Weak Bisimulation for Probabilistic Processes (JD, RJ, VG, PP), pp. 413–422.
RTA-2002-Forest #calculus #pattern matching- A Weak Calculus with Explicit Operators for Pattern Matching and Substitution (JF), pp. 174–191.
VMCAI-2002-TorreMN #automaton- Weak Muller Acceptance Conditions for Tree Automata (SLT, AM, MN), pp. 240–254.
FoSSaCS-2001-Stirling #decidability #parallel #process #set #similarity- Decidability of Weak Bisimilarity for a Subset of Basic Parallel Processes (CS), pp. 379–393.
ICSM-2001-TonellaP #c++ #diagrams #reverse engineering #uml- Reverse Engineering of the UML Class Diagram from C++ Code in Presence of Weakly Typed Containers (PT, AP), pp. 376–385.
STOC-2001-PitassiR #bound #principle- Regular resolution lower bounds for the weak pigeonhole principle (TP, RR), pp. 347–355.
ICALP-2001-AtseriasBE #bound- Lower Bounds for the Weak Pigeonhole Principle Beyond Resolution (AA, MLB, JLE), pp. 1005–1016.
ICML-2001-IvanovBP- Expectation Maximization for Weakly Labeled Data (YAI, BB, AP), pp. 218–225.
IJCAR-2001-BoigelotJW #automaton #integer #linear #on the- On the Use of Weak Automata for Deciding Linear Arithmetic with Integer and Real Variables (BB, SJ, PW), pp. 611–625.
RTA-2001-LimetRS- Weakly Regular Relations and Applications (SL, PR, HS), pp. 185–200.
DAC-2000-Phillips #framework #reduction- Projection frameworks for model reduction of weakly nonlinear systems (JRP), pp. 184–189.
STOC-2000-MacielPW #principle #proving- A new proof of the weak pigeonhole principle (AM, TP, ARW), pp. 368–377.
TOOLS-USA-2000-HeberleLNZ #type system- Weak Subtyping and Genericity (AH, WL, RN, WZ), pp. 149–158.
ISMM-2000-AgesenG #performance- Efficient Object Sampling via Weak References (OA, AG), pp. 121–126.
CSL-2000-ComonC- Flatness Is Not a Weakness (HC, VC), pp. 262–276.
TACAS-1999-LiC #bisimulation #congruence #process- Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing Processes (ZL, HC), pp. 300–314.
DLT-1999-Platek- Weak cyclic forms of rw-automata (MP), pp. 115–124.
IFL-1999-JonesME #haskell #pointer- Stretching the Storage Manager: Weak Pointers and Stable Names in Haskell (SLPJ, SM, CE), pp. 37–58.
LICS-1999-FioreCW #bisimulation- Weak Bisimulation and Open Maps (MPF, GLC, GW), pp. 67–76.
LICS-1999-Johannsen #bound #problem- Weak Bounded Arithmetic, the Diffie-Hellman Problem and Constable’s Class K (JJ), pp. 268–274.
RTA-1999-Oostrom #normalisation #orthogonal- Normalisation in Weakly Orthogonal Rewriting (VvO), pp. 60–74.
STOC-1998-KupfermanV #automaton- Weak Alternating Automata and Tree Automata Emptiness (OK, MYV), pp. 224–233.
ICALP-1998-LiC #bisimulation #congruence #π-calculus- Checking Strong/Weak Bisimulation Equivalences and Observation Congruence for the π-Calculus (ZL, HC), pp. 707–718.
ICPR-1998-LeiW #detection #novel #symmetry- A novel method for detecting and localising of reflectional and rotational symmetry under weak perspective projection (YL, KCW), pp. 417–419.
TOOLS-USA-1998-LoweNTZ #inheritance #type system- Weak Subtyping — Yet Another Notion of Inheritance (WL, RN, MT, WZ), pp. 333–345.
LICS-1998-KupfermanV #linear- Freedom, Weakness, and Determinism: From Linear-Time to Branching-Time (OK, MYV), pp. 81–92.
SOSP-1997-PetersenSTTD #consistency #flexibility #replication- Flexible Update Propagation for Weakly Consistent Replication (KP, MS, DBT, MT, AJD), pp. 288–301.
CAV-1997-BaierH #bisimulation #probability #process- Weak Bisimulation for Fully Probabilistic Processes (CB, HH), pp. 119–130.
CSL-1997-BussP #principle- Resolution and the Weak Pigeonhole Principle (SRB, TP), pp. 149–156.
TLCA-1997-Herbelin #game studies #reduction- Games and Weak-Head Reduction for Classical PCF (HH), pp. 214–230.
TLCA-1997-Xi #normalisation #λ-calculus- Weak and Strong β Normalisations in Typed λ-Calculi (HX), pp. 390–404.
STOC-1996-Ta-Shma #on the #random- On Extracting Randomness From Weak Random Sources (Extended Abstract) (ATS), pp. 276–285.
ICFP-1996-FerreiraHJ #bisimulation #formal method- A Theory of Weak Bisimulation for Core CML (WF, MH, AJ), pp. 201–212.
ICPR-1996-LakshmananW #bound #detection #image- Detection of bounded weak echo regions in meteorological radar images (VL, AW), pp. 895–899.
PLILP-1996-BenaissaLR #modelling #recursion #reduction #using- Modeling Sharing and Recursion for Weak Reduction Strategies Using Explicit Substitution (ZEAB, PL, KHR), pp. 393–407.
SAC-1996-Lenz #adaptation #consistency #data transformation #distributed- Adaptive distributed data management with weak consistent replicated data (RL), pp. 178–185.
CSL-1996-Ingolfsdottir #semantics- Weak Semantics Based on Lighted Button Pressing Experiments (AI), pp. 226–243.
LICS-1996-Edalat- The Scott Topology Induces the Weak Topology (AE), pp. 372–381.
ICALP-1995-FennerLM #sequence- Weakly Useful Sequences (SAF, JHL, EM), pp. 393–404.
SOSP-1995-MummertES #mobile- Exploiting Weak Connectivity for Mobile File Access (LBM, ME, MS), pp. 143–155.
SOSP-1995-TerryTPDSH- Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System (DBT, MT, KP, AJD, MS, CH), pp. 172–183.
STOC-1994-BlumFJKMR #analysis #fourier #learning #query #statistics #using- Weakly learning DNF and characterizing statistical query learning using Fourier analysis (AB, MLF, JCJ, MJK, YM, SR), pp. 253–262.
SAC-1994-GaryE #flexibility #semantics- A flexible marker-passer for semantically weak search (KG, JJED), pp. 313–317.
HPDC-1994-AgrawalCLS #using- Investigating Weak Memories Using Maya (DA, MC, HVL, AKS), pp. 123–130.
ICDAR-1993-CullenE #documentation #image #segmentation- Weak model-dependent page segmentation and skew correction for processing document images (JFC, KE), pp. 757–760.
STOC-1993-ChazelleEGGSW #bound #set- Improved bounds on weak epsilon-nets for convex sets (BC, HE, MG, LJG, MS, EW), pp. 495–504.
FPCA-1993-Yoshida #reduction #λ-calculus- Optimal Reduction in Weak-λ-calculus with Shared Environments (NY), pp. 243–254.
LFP-1992-MullerZ #abstract interpretation- Abstract Interpretation in Weak Powerdomains (RM, YZ), pp. 119–126.
CSCW-1992-PickeringK #communication- Hardwiring Weak Ties: Individual and Institutional Issues in Computer Mediated Communication (JMP, JLK), pp. 356–361.
JICSLP-1992-FerrandD #correctness #logic programming #proving #source code- Proof Method of Partial Correctness and Weak Completeness for Normal Logic Programs (GF, PD), pp. 161–174.
POPL-1991-Maranget #orthogonal #term rewriting #λ-calculus- Optimal Derivations in Weak λ-calculi and in Orthogonal Terms Rewriting Systems (LM), pp. 255–269.
RTA-1991-Baader #bound #problem #unification- Unification, Weak Unification, Upper Bound, Lower Bound, and Generalization Problems (FB), pp. 86–97.
RTA-1991-CurienG #confluence #normalisation #on the- On Confluence for Weakly Normalizing Systems (PLC, GG), pp. 215–225.
TAV-1991-Marick- The Weak Mutation Hypothesis (BM), pp. 190–199.
TAV-1991-OffuttL #how #question- How Strong is Weak Mutation? (AJO, SDL), pp. 200–213.
SIGMOD-1990-AtzeniT #independence #performance- Efficient Updates to Independent Schemes in the Weak Instance Model (PA, RT), pp. 84–93.
ESOP-1990-SchnoebelenP #logic #on the- On the Weak Adequacy of Branching-Time Remporal Logic (PS, SP), pp. 377–388.
PODS-1989-AtzeniT #database- Updating Databases in the Weak Instance Model (PA, RT), pp. 101–109.
CSL-1989-KrajicekP #modelling- Propositional Provability and Models of Weak Arithmetic (JK, PP), pp. 193–210.
NACLP-1989-CasanovaGS #logic programming #source code- Computing Answers to Logic Programs with Weak Model Elimination (MAC, RAdTG, AS), pp. 92–114.
JICSCP-1988-LoboMR88 #source code- Weak Completion Theory for Non-Horn Programs (JL, JM, AR), pp. 828–842.
JICSCP-1988-PrzymusinskaP88 #logic programming #semantics #source code- Weakly Perfect Model Semantics for Logic Programs (HP, TCP), pp. 1106–1120.
LICS-1988-MullerSS #automaton #decidability #exponential #logic #why- Weak Alternating Automata Give a Simple Explanation of Why Most Temporal and Dynamic Logics are Decidable in Exponential Time (DEM, AS, PES), pp. 422–427.
PODS-1987-AtzeniB- A New Basis for the Weak Instance Model (PA, MCDB), pp. 79–86.
ESEC-1987-Craigen #verification- Strengths and Weaknesses of Program Verification Systems (DC), pp. 396–404.
CSL-1987-BohmP #combinator #finite #reduction #set- Surjectivity for Finite Sets of Combinators by Weak Reduction (CB, AP), pp. 27–43.
PODS-1986-Gadia- Weak Temporal Relations (SKG), pp. 70–77.
ICALP-1986-MullerSS #automaton #complexity #monad- Alternating Automata. The Weak Monadic Theory of the Tree, and its Complexity (DEM, AS, PES), pp. 275–283.
LICS-1986-MakowskyS #equivalence #higher-order #on the #semantics #standard #verification- On the Equivalence of Weak Second Order and Nonstandard Time Semantics For Various Program Verification Systems (JAM, IS), pp. 293–300.
ICSE-1985-GirgisW #analysis #data flow #testing #using- An Integrated System for Program Testing Using Weak Mutation and Data Flow Analysis (MRG, MRW), pp. 313–319.
PODS-1984-FischerG #dependence #multi- Weak Multivalued Dependencies (PCF, DVG), pp. 266–274.
PODS-1984-Yannakakis #query- Querying Weak Instances (MY), pp. 275–280.
STOC-1981-JosephY #modelling #performance #polynomial #source code- Fast Programs for Initial Segments and Polynomial Time Computation in Weak Models of Arithmetic (Preliminary Abstract) (DJ, PY), pp. 55–61.
DAC-1980-Sidle #database- Weaknesses of commercial data base management systems in engineering applications (TS), pp. 57–61.
STOC-1974-Rackoff #complexity #on the- On the Complexity of the Theories of Weak Direct Products: A Preliminary Report (CR), pp. 149–160.
STOC-1974-Robertson #complexity #higher-order #monad- Structure of Complexity in the Weak Monadic Second-Order Theories of the Natural Numbers (ELR), pp. 161–171.