Sciweavers

3786 search results - page 552 / 758
» Structure Comparison and Structure Patterns
Sort
View
159
Voted
ACL2
2006
ACM
15 years 9 months ago
Function memoization and unique object representation for ACL2 functions
We have developed an extension of ACL2 that includes the implementation of hash-based association lists and function memoization; this makes some algorithms execute more quickly. ...
Robert S. Boyer, Warren A. Hunt Jr.
111
Voted
ERLANG
2006
ACM
15 years 9 months ago
Model checking erlang programs: the functional approach
We present the new model checker McErlang for verifying Erlang programs. In comparison with the etomcrl tool set, McErlang differs mainly in that it is implemented in Erlang. The ...
Lars-Åke Fredlund, Clara Benac Earle
103
Voted
MSR
2006
ACM
15 years 9 months ago
How long did it take to fix bugs?
The number of bugs (or fixes) is a common factor used to measure the quality of software and assist bug related analysis. For example, if software files have many bugs, they may b...
Sunghun Kim, E. James Whitehead Jr.
142
Voted
SIGIR
2006
ACM
15 years 9 months ago
Near-duplicate detection by instance-level constrained clustering
For the task of near-duplicated document detection, both traditional fingerprinting techniques used in database community and bag-of-word comparison approaches used in information...
Hui Yang, James P. Callan
140
Voted
ICPP
2005
IEEE
15 years 9 months ago
Locality-Aware Randomized Load Balancing Algorithms for DHT Networks
Structured P2P overlay networks based on a consistent hashing function have an aftermath load balance problem that needs to be dealt with. A load balancing method should take into...
Haiying Shen, Cheng-Zhong Xu