Sciweavers

2949 search results - page 558 / 590
» Transformations in Information Supply
Sort
View
PLDI
2009
ACM
14 years 8 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
POPL
2009
ACM
14 years 8 months ago
Equality saturation: a new approach to optimization
Optimizations in a traditional compiler are applied sequentially, with each optimization destructively modifying the program to produce a transformed program that is then passed t...
Ross Tate, Michael Stepp, Zachary Tatlock, Sorin L...
CHI
2009
ACM
14 years 8 months ago
Mirroring bodily experiences over time
Elsa Kosmack Vaara Kristina H??k The Affective Health system is a mobile lifestyle application that aims to empower people to reflect on their lives and lifestyles. The system logs...
Elsa Kosmack Vaara, Jakob Tholander, Kristina H&ou...
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
14 years 8 months ago
Adapting the right measures for K-means clustering
Clustering validation is a long standing challenge in the clustering literature. While many validation measures have been developed for evaluating the performance of clustering al...
Junjie Wu, Hui Xiong, Jian Chen
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
14 years 8 months ago
An association analysis approach to biclustering
The discovery of biclusters, which denote groups of items that show coherent values across a subset of all the transactions in a data set, is an important type of analysis perform...
Gaurav Pandey, Gowtham Atluri, Michael Steinbach, ...