Sciweavers

6258 search results - page 1166 / 1252
» Applied Text Generation
Sort
View
132
Voted
ASSETS
2009
ACM
15 years 10 months ago
Speaking through pictures: images vs. icons
People with aphasia, a condition that impairs the ability to understand or generate written or spoken language, are aided by assistive technology that helps them communicate throu...
Xiaojuan Ma, Jordan L. Boyd-Graber, Sonya S. Nikol...
124
Voted
ISSTA
2009
ACM
15 years 10 months ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...
126
Voted
ISSTA
2009
ACM
15 years 10 months ago
Loop-extended symbolic execution on binary programs
Mixed concrete and symbolic execution is an important technique for finding and understanding software bugs, including securityrelevant ones. However, existing symbolic execution...
Prateek Saxena, Pongsin Poosankam, Stephen McCaman...
118
Voted
SIGIR
2009
ACM
15 years 10 months ago
Approximating true relevance distribution from a mixture model based on irrelevance data
Pseudo relevance feedback (PRF), which has been widely applied in IR, aims to derive a distribution from the top n pseudo relevant documents D. However, these documents are often ...
Peng Zhang, Yuexian Hou, Dawei Song
93
Voted
CGO
2008
IEEE
15 years 10 months ago
Latency-tolerant software pipelining in a production compiler
In this paper we investigate the benefit of scheduling non-critical loads for a higher latency during software pipelining. "Noncritical" denotes those loads that have s...
Sebastian Winkel, Rakesh Krishnaiyer, Robyn Sampso...
« Prev « First page 1166 / 1252 Last » Next »