The military develops simulations to analyze nearly every aspect of defense. How accurate are these simulations and to what extent do they produce dependable results? Most guidanc...
Scott D. Simpkins, Eugene P. Paulo, Lyn R. Whitake...
The exokernel operating system architecture safely gives untrusted software efficient control over hardware and software resources by separating management from protection. This ...
M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ga...
Constraint relaxation is a frequently used technique for managing over-determined constraint satisfaction problems. A problem in constraint relaxation is the selection of the appr...
R. R. Bakker, F. Dikker, F. Tempelman, P. M. Wognu...
Motivated by a real-world problem, we study a novel budgeted optimization problem where the goal is to optimize an unknown function f(x) given a budget. In our setting, it is not ...
Javad Azimi, Xiaoli Fern, Alan Fern, Elizabeth Bur...
This paper is about the evolution of a system prototype called Pensieve whose goal is to support people's reminiscing practices. A number of technologies exist to manage memo...
Dan Cosley, Kathy Akey, Brian Alson, Jonathan Baxt...