Sciweavers

5643 search results - page 1125 / 1129
» Retrieval Evaluation in Practice
Sort
View
PEPM
2011
ACM
12 years 10 months ago
Adaptation-based programming in java
Writing deterministic programs is often difficult for problems whose optimal solutions depend on unpredictable properties of the programs’ inputs. Difficulty is also encounter...
Tim Bauer, Martin Erwig, Alan Fern, Jervis Pinto
PLDI
2011
ACM
12 years 10 months ago
Separation logic + superposition calculus = heap theorem prover
Program analysis and verification tools crucially depend on the ability to symbolically describe and reason about sets of program behaviors. Separation logic provides a promising...
Juan Antonio Navarro Pérez, Andrey Rybalche...
SIGMETRICS
2011
ACM
229views Hardware» more  SIGMETRICS 2011»
12 years 10 months ago
Model-driven optimization of opportunistic routing
Opportunistic routing aims to improve wireless performance by exploiting communication opportunities arising by chance. A key challenge in opportunistic routing is how to achieve ...
Eric Rozner, Mi Kyung Han, Lili Qiu, Yin Zhang
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 10 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
ATAL
2011
Springer
12 years 7 months ago
Maximizing revenue in symmetric resource allocation systems when user utilities exhibit diminishing returns
Consumers of resources in realistic applications (e.g., web, multimedia) typically derive diminishing-return utilities from the amount of resource they receive. A resource provide...
Roie Zivan, Miroslav Dudík, Praveen Paruchu...
« Prev « First page 1125 / 1129 Last » Next »