Displaying works 41 - 60 of 187 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2010 chapter
Combining Locality Analysis with Online Proactive Job Co-scheduling in Chip Multiprocessors
In High Performance Embedded Architectures and Compilers (pp. 201–215).
2010 conference paper
Does cache sharing on modern CMP matter to the performance of contemporary multithreaded programs?
Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming - PPoPP '10. Presented at the the 15th ACM SIGPLAN symposium.
Event: the 15th ACM SIGPLAN symposium
2010 chapter
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors?
In Lecture Notes in Computer Science (pp. 264–282).
2010 conference paper
Exploiting statistical correlations for proactive prediction of program behaviors
Proceedings of the 8th annual IEEE/ ACM international symposium on Code generation and optimization - CGO '10. Presented at the the 8th annual IEEE/ ACM international symposium.
Event: the 8th annual IEEE/ ACM international symposium
2010 conference paper
Streamlining GPU applications on the fly
Proceedings of the 24th ACM International Conference on Supercomputing - ICS '10. Presented at the the 24th ACM International Conference.
Event: the 24th ACM International Conference
2010 conference paper
An input-centric paradigm for program dynamic optimizations
Proceedings of the ACM international conference on Object oriented programming systems languages and applications - OOPSLA '10. Presented at the the ACM international conference.
Event: the ACM international conference
2010 journal article
Cinematic Visual Discourse: Representation, Generation, and Evaluation
IEEE Transactions on Computational Intelligence and AI in Games, 2(2), 69–81.
Contributors: A. Jhala* & R. Young n
2010 chapter
Impossibility Results for RFID Privacy Notions
In Transactions on Computational Science XI (pp. 39–63).
2010 chapter
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
In Computer Security – ESORICS 2010 (pp. 663–678).
2010 journal article
Practical considerations in deploying statistical methods for defect prediction: A case study within the Turkish telecommunications industry
Information and Software Technology, 52(11), 1242–1257.
2010 journal article
A second look at Faster, Better, Cheaper
Innovations in Systems and Software Engineering, 6(4), 319–335.
2010 journal article
Automatically finding the control variables for complex system behavior
Automated Software Engineering, 17(4), 439–468.
2010 journal article
Stable rankings for different effort models
Automated Software Engineering, 17(4), 409–437.
2010 journal article
Defect prediction from static code features: current results, limitations, new approaches
Automated Software Engineering, 17(4), 375–407.
2010 chapter
Regularities in Learning Defect Predictors
In Product-Focused Software Process Improvement (pp. 116–130).
2010 chapter
Inducing Effective Pedagogical Strategies Using Learning Context Features
In User Modeling, Adaptation, and Personalization (pp. 147–158).
2010 chapter
Do Micro-Level Tutorial Decisions Matter: Applying Reinforcement Learning to Induce Pedagogical Tutorial Tactics
In Intelligent Tutoring Systems (pp. 224–234).
2010 journal article
Towards affective camera control in games
User Modeling and User-Adapted Interaction, 20(4), 313–340.
Contributors: G. Yannakakis *, H. Martínez * & A. Jhala*
2010 chapter
Integrating Learning and Engagement in Narrative-Centered Learning Environments
In Intelligent Tutoring Systems (pp. 166–177).
2010 chapter
Optimizing Story-Based Learning: An Investigation of Student Narrative Profiles
In Intelligent Tutoring Systems (pp. 155–165).
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.