You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/references/bib.bib
+52-13Lines changed: 52 additions & 13 deletions
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,24 @@
1
+
@article{anderson:2017a,
2
+
abstract = {The square root of a sum of squares is well known to be prone to overflow and underflow. Ad hoc scaling of intermediate results, as has been done in numerical software such as the BLAS and LAPACK, mostly avoids the problem, but it can still occur at extreme values in the range of representable numbers. More careful scaling, as has been implemented in recent versions of the standard algorithms, may come at the expense of performance or clarity. This work reimplements the vector 2-norm and the generation of Givens rotations from the Level 1 BLAS to improve their performance and design. In addition, support for negative increments is extended to the Level 1 BLAS operations on a single vector, and a comprehensive test suite for all the Level 1 BLAS is included.},
3
+
address = {New York, NY, USA},
4
+
articleno = {12},
5
+
author = {Edward Anderson},
6
+
doi = {10.1145/3061665},
7
+
issn = {0098-3500},
8
+
issue_date = {March 2018},
9
+
journal = {ACM Transactions on Mathematical Software},
10
+
keywords = {Givens rotation, Vector operation, sum of squares, linear algebra, linalg},
11
+
month = {jul},
12
+
number = {1},
13
+
numpages = {28},
14
+
pages = {1--28},
15
+
publisher = {Association for Computing Machinery},
16
+
title = {Algorithm 978: Safe Scaling in the Level 1 BLAS},
17
+
url = {https://doi.org/10.1145/3061665},
18
+
volume = {44},
19
+
year = {2017},
20
+
}
21
+
1
22
@techreport{beebe:2002,
2
23
abstract = {These notes describe an implementation of an algorithm for accurate computation of \\( \operatname{expm1}(x) = \operatname{exp}(x) − 1 \\), one of the new elementary functions introduced in the 1999 ISO C Standard, but already available in most UNIX C implementations. A test package modeled after the Cody and Waite Elementary Function Test Package, ELEFUNT, is developed to evaluate the accuracy of implementations of \\( \operatorname{expm1}(x) \\).},
3
24
author = {Nelson H.F. Beebe},
@@ -36,6 +57,24 @@ @article{blei:2003
36
57
year = {2003},
37
58
}
38
59
60
+
@article{blue:1978a,
61
+
address = {New York, NY, USA},
62
+
author = {James L. Blue},
63
+
doi = {10.1145/355769.355771},
64
+
issn = {0098-3500},
65
+
issue_date = {March 1978},
66
+
journal = {ACM Transactions on Mathematical Software},
67
+
month = {mar},
68
+
number = {1},
69
+
numpages = {9},
70
+
pages = {15--23},
71
+
publisher = {Association for Computing Machinery},
72
+
title = {A Portable Fortran Program to Find the Euclidean Norm of a Vector},
73
+
url = {https://doi.org/10.1145/355769.355771},
74
+
volume = {4},
75
+
year = {1978},
76
+
}
77
+
39
78
@inproceedings{borwein:1991,
40
79
abstract = {A very simple class of algorithms for the computation of the Riemann-zeta function to arbitrary precision in arbitrary domains is proposed. These algorithms compete with the standard methods based on Euler-Maclaurin summation, are easier to implement and are easier to analyze.},
41
80
author = {P. Borwein},
@@ -1352,7 +1391,7 @@ @inproceedings{hu:2004a
1352
1391
keywords = {reviews, sentiment classification, summarization, text mining},
1353
1392
location = {Seattle, WA, USA},
1354
1393
numpages = {10},
1355
-
pages = {168--177},
1394
+
pages = {168--177},
1356
1395
publisher = {ACM},
1357
1396
series = {KDD '04},
1358
1397
title = {{Mining and Summarizing Customer Reviews}},
title = {{Opinion Observer: Analyzing and Comparing Opinions on the Web}},
@@ -1639,20 +1678,20 @@ @article{dekker:1971a
1639
1678
1640
1679
@inproceedings{caliskan-islam:2015a,
1641
1680
abstract = {Source code authorship attribution is a significant privacy threat to anonymous code contributors. However, it may also enable attribution of successful attacks from code left behind on an infected system, or aid in resolving copyright, copyleft, and plagiarism issues in the programming fields. In this work, we investigate machine learning methods to de-anonymize source code authors of C/C++ using coding style. Our Code Stylometry Feature Set is a novel representation of coding style found in source code that reflects coding style from properties derived from abstract syntax trees. Our random forest and abstract syntax tree-based approach attributes more authors (1,600 and 250) with significantly higher accuracy (94% and 98%) on a larger data set (Google Code Jam) than has been previously achieved. Furthermore, these novel features are robust, difficult to obfuscate, and can be used in other programming languages, such as Python. We also find that (i) the code resulting from difficult programming tasks is easier to attribute than easier tasks and (ii) skilled programmers (who can complete the more difficult tasks) are easier to attribute than less skilled programmers.},
1642
-
acmid = {2831160},
1643
-
address = {Berkeley, CA, USA},
1681
+
acmid = {2831160},
1682
+
address = {Berkeley, CA, USA},
1644
1683
author = {Aylin Caliskan-Islam and Richard Harang and Andrew Liu and Arvind Narayanan and Clare Voss and Fabian Yamaguchi and Rachel Greenstadt},
1645
1684
booktitle = {Proceedings of the 24th USENIX Conference on Security Symposium},
abstract = {Practitioners have expressed concern over their inability to accurately estimate costs associated with software development. This concern has become even more pressing as costs associated with development continue to increase. As a result, considerable research attention is now directed at gaining a better understanding of the software-development process as well as constructing and evaluating software cost estimating tools. This paper evaluates four of the most popular algorithmic models used to estimate software costs (SLIM, COCOMO, Function Points, and ESTIMACS). Data on 15 large completed business data-processing projects were collected and used to test the accuracy of the models' ex post effort estimation. One important result was that Albrecht's Function Points effort estimation model was validated by the independent data provided in this study [3]. The models not developed in business data-processing environments showed significant need for calibration. As models of the software-development process, all of the models tested failed to sufficiently reflect the underlying factors affecting productivity. Further research will be required to develop understanding in this area.},
1728
1767
acmid = {22906},
1729
-
address = {New York, NY, USA},
1730
-
author = {Chris F. Kemerer},
1768
+
address = {New York, NY, USA},
1769
+
author = {Chris F. Kemerer},
1731
1770
doi = {10.1145/22899.22906},
1732
1771
issn = {0001-0782},
1733
1772
issue_date = {May 1987},
@@ -1737,7 +1776,7 @@ @article{kemerer:1987a
1737
1776
number = {5},
1738
1777
numpages = {14},
1739
1778
pages = {416--429},
1740
-
publisher = {ACM},
1779
+
publisher = {ACM},
1741
1780
title = {{An Empirical Validation of Software Cost Estimation Models}},
0 commit comments