Sciweavers

1569 search results - page 131 / 314
» Programming contest strategy
Sort
View
86
Voted
IPPS
2008
IEEE
15 years 7 months ago
A transparent non-invasive file data model for algorithmic skeletons
A file data model for algorithmic skeletons is proposed, focusing on transparency and efficiency. Algorithmic skeletons correspond to a high-level programming model that takes a...
Denis Caromel, Mario Leyton
110
Voted
PC
1998
153views Management» more  PC 1998»
15 years 7 days ago
Compilation Techniques for Out-of-Core Parallel Computations
The difficulty of handling out-of-core data limits the performance of supercomputers as well as the potential of the parallel machines. Since writing an efficient out-of-core ve...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
83
Voted
WIA
2005
Springer
15 years 6 months ago
Robust Spelling Correction
The paper introduces a robust spelling correction technique to deal with ill-formed input strings, including unknown parts of unknown length. In contrast to previous works, we deri...
Manuel Vilares Ferro, Juan Otero Pombo, Jesú...
98
Voted
MFCS
1997
Springer
15 years 4 months ago
When are Two Rewrite Systems More than None?
It is important for programs to have modular correctness properties. We look at non-deterministic programs expressed as termrewriting systems which compute normal forms of input t...
Nachum Dershowitz
79
Voted
ECLIPSE
2007
ACM
15 years 4 months ago
Filtering out methods you wish you hadn't navigated
The navigation of structural dependencies (e.g., method invocations) when a developer performs a change task is an effective strategy in program investigation. Several existing ap...
Annie T. T. Ying, Peri L. Tarr