Sciweavers

434 search results - page 12 / 87
» The Case for Browser Provenance
Sort
View
DKE
1998
146views more  DKE 1998»
13 years 8 months ago
A Case study of Automatic Authoring: From a Textbook to a Hyper-Textbook
This paper presents a case-study of automatic construction of a hypertext from a large full-text document. The document we used as input of the automatic authoring process is a we...
Fabio Crestani, Massimo Melucci
JSCIC
2007
89views more  JSCIC 2007»
13 years 8 months ago
Adjoint Recovery of Superconvergent Linear Functionals from Galerkin Approximations. The One-dimensional Case
In this paper, we extend the adjoint error correction of Pierce and Giles [SIAM Review, 42 (2000), pp. 247-264] for obtaining superconvergent approximations of functionals to Gale...
Bernardo Cockburn, Ryuhei Ichikawa
ARSCOM
2005
106views more  ARSCOM 2005»
13 years 8 months ago
Chromatic Equivalence of Generalized Ladder Graphs
A class of graphs called generalized ladder graphs is defined. A sufficient condition for pairs of these graphs to be chromatically equivalent is proven. In addition a formula for...
Stephen Guattery, Gary Haggard, Ronald C. Read
APPROX
2007
Springer
104views Algorithms» more  APPROX 2007»
14 years 2 months ago
Worst-Case to Average-Case Reductions Revisited
Abstract. A fundamental goal of computational complexity (and foundations of cryptography) is to find a polynomial-time samplable distribution (e.g., the uniform distribution) and...
Dan Gutfreund, Amnon Ta-Shma
TSE
2002
115views more  TSE 2002»
13 years 8 months ago
Simplifying and Isolating Failure-Inducing Input
Given some test case, a program fails. Which circumstances of the test case are responsible for the particular failure? The Delta Debugging algorithm generalizes and simplifies som...
Andreas Zeller, Ralf Hildebrandt