Sciweavers

9231 search results - page 1617 / 1847
» informs 2008
Sort
View
ASPDAC
2008
ACM
106views Hardware» more  ASPDAC 2008»
15 years 5 months ago
Verifying full-custom multipliers by Boolean equivalence checking and an arithmetic bit level proof
—In this paper we describe a practical methodology to formally verify highly optimized, industrial multipliers. We a multiplier description language which abstracts from low-leve...
Udo Krautz, Markus Wedler, Wolfgang Kunz, Kai Webe...
C3S2E
2008
ACM
15 years 5 months ago
Concurrent software engineering: preparing for paradigm shift
Software systems bridge the gap between information processing needs and available computer hardware. As system requirements grow in complexity and hardware evolves, the gap does ...
Peter Grogono, Brian Shearing
CHI
2008
ACM
15 years 5 months ago
Testing vs. code inspection vs. what else?: male and female end users' debugging strategies
Little is known about the strategies end-user programmers use in debugging their programs, and even less is known about gender differences that may exist in these strategies. With...
Neeraja Subrahmaniyan, Laura Beckwith, Valentina G...
CHI
2008
ACM
15 years 5 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
DIS
2008
Springer
15 years 5 months ago
Empirical Asymmetric Selective Transfer in Multi-objective Decision Trees
We consider learning tasks where multiple target variables need to be predicted. Two approaches have been used in this setting: (a) build a separate single-target model for each ta...
Beau Piccart, Jan Struyf, Hendrik Blockeel
« Prev « First page 1617 / 1847 Last » Next »