Sciweavers

2863 search results - page 381 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
137
Voted
WCRE
2003
IEEE
15 years 9 months ago
Problems Creating Task-relevant Clone Detection Reference Data
One prevalent method for evaluating the results of automated software analysis tools is to compare the tools’ output to the judgment of human experts. This evaluation strategy i...
Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yan...
135
Voted
ICLP
2010
Springer
15 years 7 months ago
Tabling and Answer Subsumption for Reasoning on Logic Programs with Annotated Disjunctions
Probabilistic Logic Programming is an active field of research, with many proposals for languages, semantics and reasoning algorithms. One such proposal, Logic Programming with A...
Fabrizio Riguzzi, Terrance Swift
101
Voted
WWW
2005
ACM
16 years 4 months ago
The WT10G dataset and the evolution of the web
The purpose of this paper is threefold. First, we study the evolution of the web based on data available from an earlier snapshot of the web and compare the results with those pre...
Wei-Tsen Milly Chiang, Markus Hagenbuchner, Ah Chu...
ICCD
2002
IEEE
152views Hardware» more  ICCD 2002»
16 years 17 days ago
Register Binding Based Power Management for High-level Synthesis of Control-Flow Intensive Behaviors
A circuit or circuit component that does not contain any spurious switching activity, i.e., activity that is not required by its specified functionality, is called perfectly power...
Lin Zhong, Jiong Luo, Yunsi Fei, Niraj K. Jha
133
Voted
ARCS
2009
Springer
15 years 10 months ago
Evaluating Sampling Based Hotspot Detection
In sampling based hotspot detection, performance engineers sample the running program periodically and record the Instruction Pointer (IP) addresses at the sampling. Empirically, f...
Qiang Wu, Oskar Mencer