Sciweavers

RTA
2010
Springer
13 years 11 months ago
Automated Termination Analysis of Java Bytecode by Term Rewriting
We present an automated approach to prove termination of Java Bytecode (JBC) programs by automatically transforming them to term rewrite systems (TRSs). In this way, the numerous t...
Carsten Otto, Marc Brockschmidt, Christian von Ess...
CSE
2009
IEEE
13 years 11 months ago
Analyzing Enterprise Social Media Networks
Broadening adoption of social media applications within the enterprise offers a new and valuable data source for insight into the social structure of organizations. Social media ap...
Marc A. Smith, Derek L. Hansen, Eric Gleave
CSE
2009
IEEE
13 years 11 months ago
Clustering Signature in Complex Social Networks
An important aspect in social computing is the structure of social networks, which build the underlying substrate for the exchange of information. With the growing importance of mi...
Ueli Peter, Tomas Hruz
CSE
2009
IEEE
13 years 11 months ago
Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens
Abstract--Web 2.0 users have many choices of contenthosting or application-service providers (CSPs). It can be difficult for a user to share content with a set of real-life friends...
San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov
CSE
2009
IEEE
13 years 11 months ago
Completely Distributed Low Duty Cycle Communication for Long-Living Sensor Networks
A lifetime of several years for wireless sensor nodes can be achieved if their activity period is minimized. This can be done by using low duty cycle protocols. One of the challeng...
Marcin Brzozowski, Hendrik Salomon, Peter Langendo...
CSE
2009
IEEE
13 years 11 months ago
A Comparative Study of Blocking Storage Methods for Sparse Matrices on Multicore Architectures
Sparse Matrix-Vector multiplication (SpMV) is a very challenging computational kernel, since its performance depends greatly on both the input matrix and the underlying architectur...
Vasileios Karakasis, Georgios I. Goumas, Nectarios...
ITICSE
2010
ACM
13 years 11 months ago
Professional associations in K-12 computer science
Chris Stephenson, Judith Gal-Ezer, Margot Phillipp...
ICMT
2010
Springer
13 years 11 months ago
From State- to Delta-Based Bidirectional Model Transformations
Existing bidirectional model transformation languages are mainly state-based: a transformation is considered composed from functions whose inputs and outputs only consist of origin...
Zinovy Diskin, Yingfei Xiong, Krzysztof Czarnecki
STACS
1987
Springer
13 years 11 months ago
Graph Isomorphism is in the Low Hierarchy
It is shown that the graph isomorphism problem is located in the low hierarchy in NP. This implies that this problem is not NPcomplete (not even under weaker forms of polynomial-ti...
Uwe Schöning