Sciweavers

6960 search results - page 1299 / 1392
» Continuity Analysis of Programs
Sort
View
CHI
2011
ACM
14 years 1 months ago
The aligned rank transform for nonparametric factorial analyses using only anova procedures
Nonparametric data from multi-factor experiments arise often in human-computer interaction (HCI). Examples may include error counts, Likert responses, and preference tallies. But ...
Jacob O. Wobbrock, Leah Findlater, Darren Gergle, ...
COMSUR
2011
198views Hardware» more  COMSUR 2011»
13 years 9 months ago
Optical Layer Monitoring Schemes for Fast Link Failure Localization in All-Optical Networks
—Optical layer monitoring and fault localization serves as a critical functional module in the control and management of optical networks. An efficient monitoring scheme aims at ...
Bin Wu, Pin-Han Ho, Kwan Lawrence Yeung, Já...
ESORICS
2011
Springer
13 years 9 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
SIGMOD
2012
ACM
222views Database» more  SIGMOD 2012»
13 years 10 days ago
Tiresias: a demonstration of how-to queries
In this demo, we will present Tiresias, the first how-to query engine. How-to queries represent fundamental data analysis questions of the form: “How should the input change in...
Alexandra Meliou, Yisong Song, Dan Suciu
DAC
2012
ACM
13 years 9 days ago
On software design for stochastic processors
Much recent research [8, 6, 7] suggests significant power and energy benefits of relaxing correctness constraints in future processors. Such processors with relaxed constraints ...
Joseph Sloan, John Sartori, Rakesh Kumar
« Prev « First page 1299 / 1392 Last » Next »