Sciweavers

106
Voted
CORR
2016
Springer
68views Education» more  CORR 2016»
10 years 1 months ago
Regression Testing of Virtual Prototypes Using Symbolic Execution
Recently virtual platforms and virtual prototyping techniques have been widely applied for accelerating software development in electronics companies. It has been proved that thes...
Bin Lin, Dejun Qian
124
Voted
CORR
2016
Springer
49views Education» more  CORR 2016»
10 years 1 months ago
Bandit Structured Prediction for Learning from Partial Feedback in Statistical Machine Translation
We present an approach to structured prediction from bandit feedback, called Bandit Structured Prediction, where only the value of a task loss function at a single predicted point...
Artem Sokolov, Stefan Riezler, Tanguy Urvoy
112
Voted
CORR
2016
Springer
54views Education» more  CORR 2016»
10 years 1 months ago
On the scaling of functional spaces, from smart cities to cloud computing
The study of spacetime, and its role in understanding functional systems has received little attention in information science. Recent work, on the origin of universal scaling in c...
Mark Burgess
CORR
2016
Springer
71views Education» more  CORR 2016»
10 years 1 months ago
Local community detection by seed expansion: from conductance to weighted kernel 1-mean optimization
In local community detection by seed expansion a single cluster concentrated around few given query nodes in a graph is discovered in a localized way. Conductance is a popular obj...
Twan van Laarhoven, Elena Marchiori
CORR
2016
Springer
60views Education» more  CORR 2016»
10 years 1 months ago
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser
The Algebraic Eraser Diffie–Hellman (AEDH) protocol was introduced in 2005 and published in 2006 by I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux as a protocol suitable for ...
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E...