Sciweavers

634 search results - page 59 / 127
» Groundwork for Weak Analysis
Sort
View
129
Voted
SIGSOFT
2004
ACM
15 years 9 months ago
Correlation exploitation in error ranking
Static program checking tools can find many serious bugs in software, but due to analysis limitations they also frequently emit false error reports. Such false positives can easi...
Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R...
194
Voted

Publication
466views
16 years 2 months ago
Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions
In pay-per click sponsored search auctions which are cur- rently extensively used by search engines, the auction for a keyword involves a certain number of advertisers (say k) c...
Akash Das Sarma, Sujit Gujar, Y. Narahari
127
Voted
SAINT
2002
IEEE
15 years 8 months ago
Incremental Hoarding and Reintegration in Mobile Environments
Disconnection is one of the popular techniques for operating in mobile environments and is here to stay, until long-range wireless connectivity becomes a reality. However, disconn...
Abdelsalam Helal, Abhinav Khushraj, Jinsuo Zhang
185
Voted
STOC
2000
ACM
174views Algorithms» more  STOC 2000»
15 years 8 months ago
Noise-tolerant learning, the parity problem, and the statistical query model
We describe a slightly subexponential time algorithm for learning parity functions in the presence of random classification noise, a problem closely related to several cryptograph...
Avrim Blum, Adam Kalai, Hal Wasserman
170
Voted
SIAMCO
2010
169views more  SIAMCO 2010»
14 years 10 months ago
Shape Derivative of Drag Functional
Abstract. In the paper compressible, stationary Navier-Stokes (N-S) equations are considered. The model is well-posed, there exist weak solutions in bounded domains, subject to inh...
Pavel I. Plotnikov, Jan Sokolowski