Tag #analysis
7357 papers:
- CC-2020-FegadeW #data type #modelling #pointer #scalability #semantics #using
- Scalable pointer analysis of data structures using semantic models (PF, CW), pp. 39–50.
- CC-2020-PuriniBCB #image #pipes and filters #smt #using
- Bitwidth customization in image processing pipelines using interval analysis and SMT solvers (SP, VB, ZC, UB), pp. 167–178.
- CGO-2020-TanejaLR #precise #testing
- Testing static analyses for precision and soundness (JT, ZL, JR), pp. 81–93.
- CSL-2020-Miquey #algebra #modelling
- Revisiting the Duality of Computation: An Algebraic Analysis of Classical Realizability Models (ÉM), p. 18.
- ICSA-2019-DajsurenL #safety
- Safety Analysis Method for Cooperative Driving Systems (YD, GL), pp. 181–190.
- ICSA-2019-TumaSB #data flow #design
- Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis (KT, RS, MB), pp. 191–200.
- EDM-2019-CaoPB #learning #performance
- Incorporating Prior Practice Difficulty into Performance Factor Analysis to Model Mandarin Tone Learning (MC, PIPJ, GMB).
- EDM-2019-GitinabardBHL #online #platform #sequence #student #what
- What will you do next? A sequence analysis on the student transitions between online platforms in blended courses (NG, TB, SH, CFL).
- EDM-2019-GuoB #collaboration #detection #using
- Collaboration Analysis Using Object Detection (ZG, RB).
- EDM-2019-HicksCL #process #student #using
- Students' Use of Support Functions in DBAs: Analysis of NAEP Grade 8 Mathematics Process Data (JH, RC, M(L).
- EDM-2019-Ikeda #education #learning #quality #using
- Learning Feature Analysis for Quality Improvement of Web-Based Teaching Materials Using Mouse Cursor Tracking (MI).
- EDM-2019-JoYKL #comparative #education #effectiveness #learning #online #word
- A Comparative Analysis of Emotional Words for Learning Effectiveness in Online Education (JJ, YY, GK, HL).
- EDM-2019-MalekianBKBN #process #student #using
- Characterising Students' Writing Processes Using Temporal Keystroke Analysis (DM, JB0, GEK, PGdB, SN).
- EDM-2019-MbouzaoDS #classification #interactive #student #video
- A Methodology for Student Video Interaction Patterns Analysis and Classification (BM, MCD, IS).
- EDM-2019-ReillyS #collaboration #predict #problem #quality
- Predicting the Quality of Collaborative Problem Solving Through Linguistic Analysis of Discourse (JMR, BS).
- ICPC-2019-KuangG0M0ME #feedback #traceability #using
- Using frugal user feedback with closeness analysis on code to improve IR-based traceability recovery (HK, HG, HH0, XM, JL0, PM, AE), pp. 369–379.
- ICPC-2019-ZhouW0C0FHC #co-evolution #comprehension #fine-grained
- Understanding evolutionary coupling by fine-grained co-change relationship analysis (DZ, YW, LX0, YC, XP0, JF, LH, HC), pp. 271–282.
- ICPC-2019-ZyrianovNGCM #framework #implementation #named #pointer
- srcPtr: a framework for implementing static pointer analysis approaches (VZ, CDN, DTG, MLC, JIM), pp. 144–147.
- ICSME-2019-DurieuxAMB0
- An Analysis of 35+ Million Jobs of Travis CI (TD, RA, MM, TFB, LC0), pp. 291–295.
- ICSME-2019-Imran #design #detection #java #open source #smell
- Design Smell Detection and Analysis for Open Source Java Software (AI), pp. 644–648.
- ICSME-2019-KhalilCMDQ #debugging #eclipse
- A Longitudinal Analysis of Bug Handling Across Eclipse Releases (ZAK, EC, TM, LD, CQ), pp. 1–12.
- ICSME-2019-Shah #data type #framework #performance
- Lib Metamorphosis: A Performance Analysis Framework for Exchanging Data Structures in Performance Sensitive Applications (MDS), pp. 379–381.
- MSR-2019-BandeiraMPM #stack overflow
- We need to talk about microservices: an analysis from the discussions on StackOverflow (AB, CAM, MP, PHMM), pp. 255–259.
- MSR-2019-BiswasVP #re-engineering #sentiment #word
- Exploring word embedding techniques to improve sentiment analysis of software engineering texts (EB, KVS, LLP), pp. 68–78.
- MSR-2019-ChrenMB0 #automation #named #reliability
- STRAIT: a tool for automated software reliability growth analysis (SC, RM, BB, BR0), pp. 105–110.
- SANER-2019-MuscedereHAADG #detection #lightweight #using
- Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis (BJM, RH, DA, JMA, IJD, MWG), pp. 175–185.
- SCAM-2019-0006LBR #android #privacy
- Introducing Privacy in Screen Event Frequency Analysis for Android Apps (HZ0, SL, RB, AR), pp. 268–279.
- SCAM-2019-MarcilioFB0 #automation #generative
- Automatically Generating Fix Suggestions in Response to Static Code Analysis Warnings (DM, CAF, RB, GP0), pp. 34–44.
- SCAM-2019-MondalRS #architecture #automation #case study #natural language #using
- An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques (AKM, BR, KAS), pp. 62–73.
- SCAM-2019-TiwariPG0 #android #named #scalability #web
- LUDroid: A Large Scale Analysis of Android - Web Hybridization (AT, JP, SG, CH0), pp. 256–267.
- DLT-2019-GoldwurmLV #component #modelling #statistics
- Analysis of Symbol Statistics in Bicomponent Rational Models (MG, JL, MV), pp. 306–318.
- FM-2019-ComptierDFP
- Property-Driven Software Analysis - (Extended Abstract) (MC, DD, PF, JMP), pp. 746–750.
- FM-2019-TranLMYNXJ #network #reachability
- Star-Based Reachability Analysis of Deep Neural Networks (HDT, DML, PM, XY, LVN, WX, TTJ), pp. 670–686.
- FSCD-2019-Bendkowski #towards #λ-calculus
- Towards the Average-Case Analysis of Substitution Resolution in Lambda-Calculus (MB), p. 21.
- IFM-2019-BeekLLV #configuration management #framework #modelling #summary
- Summary of: A Framework for Quantitative Modeling and Analysis of Highly (re)configurable Systems (MHtB, AL, ALL, AV), pp. 547–551.
- IFM-2019-BubelHT #dependence #logic
- A Program Logic for Dependence Analysis (RB, RH, AHT), pp. 83–100.
- IFM-2019-LoharPD #fault #probability
- Sound Probabilistic Numerical Error Analysis (DL, MP, ED), pp. 322–340.
- SEFM-2019-FarrellBFDDYM #case study #using #verification
- Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages (MF, MB, MF0, LAD, CD, HY, CM), pp. 471–490.
- SEFM-2019-PrasetyaK #nondeterminism
- Test Model Coverage Analysis Under Uncertainty (ISWBP, RK), pp. 222–239.
- AIIDE-2019-DemediukYDWB #identification
- Role Identification for Accurate Analysis in Dota 2 (SD, PY, AD, JAW, FB), pp. 130–138.
- AIIDE-2019-LiebanaGDIBL #statistics
- Analysis of Statistical Forward Planning Methods in Pommerman (DPL, RDG, OD, EI, MB, SML), pp. 66–72.
- AIIDE-2019-MoriTS #experience
- A Structured Analysis of Experience Management Techniques (GM, DT, SS), pp. 174–180.
- CHI-PLAY-2019-AhmadBKTNE #behaviour #modelling
- Modeling Individual and Team Behavior through Spatio-temporal Analysis (SA, AB, EK, ZT, THDN, MSEN), pp. 601–612.
- CHI-PLAY-2019-PorterR #game studies #roadmap
- An Analysis of Longitudinal Trends in Consumer Thoughts on Presence and Simulator Sickness in VR Games (JPI, AR), pp. 277–285.
- CHI-PLAY-2019-SchertlerKW #game studies #semantics #using
- User Guided Movement Analysis in Games using Semantic Trajectories (RS, SK, GW), pp. 613–623.
- CoG-2019-CookR #automation #game studies #graph
- Hyperstate Space Graphs for Automated Game Analysis (MC0, AR), pp. 1–8.
- CoG-2019-KhalifaGT #design
- ELIMINATION from Design to Analysis (AK, DG, JT), pp. 1–4.
- CoG-2019-MillerPCE #game studies #multi #social
- An Analysis of Peer Presence Social Group Dynamics to Enhance Player Engagement in Multiplayer Games (MM, NP, GC, CE), pp. 1–8.
- CoG-2019-NumminenVP #game studies #predict
- Predicting the monetization percentage with survival analysis in free-to-play games (RN, MV, TP), pp. 1–8.
- CoG-2019-ScholtenCHW #statistics
- Unconventional Exchange: Methods for Statistical Analysis of Virtual Goods (OJS, PC, KAH, JAW), pp. 1–7.
- CoG-2019-SykownikBM #automation #pipes and filters #sentiment #speech
- Can You Hear the Player Experienceƒ A Pipeline for Automated Sentiment Analysis of Player Speech (PS, FB, MM), pp. 1–4.
- CoG-2019-VolzN #game studies #on the #simulation
- On the Effects of Simulating Human Decisions in Game Analysis (VV, BN), pp. 1–8.
- CoG-2019-YuS #game studies
- Application of Retrograde Analysis on Fighting Games (KY, NRS), pp. 1–8.
- DiGRA-2019-Burkholder
- Co-Constructing Virtual Identities: Insights from Linguistic Analysis (RB).
- DiGRA-2019-FromeM #game studies
- Describing the Game Studies Canon: A Game Citation Analysis (JF, PM).
- DiGRA-2019-Tavinor #towards
- Towards an analysis of virtual realism (GT).
- FDG-2019-KaltmanOA #game studies #named #visualisation
- S4LVE: shareable videogame analysis and visualization (EK, JCO, JA), p. 5.
- FDG-2019-LuPN #communication #developer #game studies
- Game postmortems vs. developer Reddit AMAs: computational analysis of developer communication (CL, JP, TN), p. 7.
- FDG-2019-OuelletteBC #comprehension #design #education #game studies #using
- Using applied cognitive load theory and difficulty analysis for educational game design for understanding and transference of literacy skills in adults (MO, LB, CC), p. 11.
- FDG-2019-TreanorN #game studies
- Order-fulfillment games: an analysis of games about serving customers (MT, MJN), p. 7.
- CIKM-2019-AkenWLG #how
- How Does BERT Answer Questions?: A Layer-Wise Analysis of Transformer Representations (BvA, BW, AL, FAG), pp. 1823–1832.
- CIKM-2019-GuHDM #learning #named
- LinkRadar: Assisting the Analysis of Inter-app Page Links via Transfer Learning (DG, ZH, SD, YM0), pp. 2077–2080.
- CIKM-2019-Jatowt0BD #documentation
- Document in Context of its Time (DICT): Providing Temporal Context to Support Analysis of Past Documents (AJ, RC0, SSB, AD), pp. 2869–2872.
- CIKM-2019-KuziLSJZ #adaptation #information retrieval #learning #rank
- Analysis of Adaptive Training for Learning to Rank in Information Retrieval (SK, SL, SKKS, PPJ, CZ), pp. 2325–2328.
- CIKM-2019-MiloMY #datalog #named #probability
- PODIUM: Probabilistic Datalog Analysis via Contribution Maximization (TM, YM, BY), pp. 2865–2868.
- CIKM-2019-ShiY #network
- Recent Developments of Deep Heterogeneous Information Network Analysis (CS, PSY), pp. 2973–2974.
- CIKM-2019-ShiYZ #network
- HENA 2019: The 3rd Workshop of Heterogeneous Information Network Analysis and Applications (CS, YY, JZ), pp. 2991–2992.
- CIKM-2019-WuWS #collaboration
- Collaborative Analysis for Computational Risk in Urban Water Supply Systems (DW, HW, RS), pp. 2297–2300.
- CIKM-2019-YinLW #interactive #multi #sentiment
- Interactive Multi-Grained Joint Model for Targeted Sentiment Analysis (DY, XL, XW0), pp. 1031–1040.
- ECIR-p1-2019-DonnellyR #on the #sentiment
- On Interpretability and Feature Representations: An Analysis of the Sentiment Neuron (JD, AR), pp. 795–802.
- ECIR-p1-2019-WangOM #comparison #recommendation #sentiment
- Comparison of Sentiment Analysis and User Ratings in Venue Recommendation (XW, IO, CM), pp. 215–228.
- ICML-2019-AntelmiARL #multi #semistructured data
- Sparse Multi-Channel Variational Autoencoder for the Joint Analysis of Heterogeneous Data (LA, NA, PR, ML), pp. 302–311.
- ICML-2019-AroraDHLW #fine-grained #network #optimisation
- Fine-Grained Analysis of Optimization and Generalization for Overparameterized Two-Layer Neural Networks (SA, SSD, WH, ZL0, RW), pp. 322–332.
- ICML-2019-CaiLS #normalisation
- A Quantitative Analysis of the Effect of Batch Normalization on Gradient Descent (YC, QL, ZS), pp. 882–890.
- ICML-2019-Chen #bound #consistency #fault #kernel #nearest neighbour
- Nearest Neighbor and Kernel Survival Analysis: Nonasymptotic Error Bounds and Strong Consistency Rates (GHC), pp. 1001–1010.
- ICML-2019-CinelliKCPB #linear #modelling
- Sensitivity Analysis of Linear Structural Causal Models (CC, DK, BC, JP, EB), pp. 1252–1261.
- ICML-2019-CohenB #empirical #modelling #performance #sequence
- Empirical Analysis of Beam Search Performance Degradation in Neural Sequence Models (EC, JCB), pp. 1290–1299.
- ICML-2019-DereliOG #algorithm #biology #kernel #learning #multi
- A Multitask Multiple Kernel Learning Algorithm for Survival Analysis with Application to Cancer Biology (OD, CO, MG), pp. 1576–1585.
- ICML-2019-DoanMR #approximate #distributed #finite #learning #linear #multi
- Finite-Time Analysis of Distributed TD(0) with Linear Function Approximation on Multi-Agent Reinforcement Learning (TTD, STM, JR), pp. 1626–1635.
- ICML-2019-JiWZL #algorithm #optimisation
- Improved Zeroth-Order Variance Reduced Algorithms and Analysis for Nonconvex Optimization (KJ, ZW, YZ, YL), pp. 3100–3109.
- ICML-2019-LinHJ #algorithm #on the #performance
- On Efficient Optimal Transport: An Analysis of Greedy and Accelerated Mirror Descent Algorithms (TL, NH, MIJ), pp. 3982–3991.
- ICML-2019-LiTOS #fourier #random #towards
- Towards a Unified Analysis of Random Fourier Features (ZL, JFT, DO, DS), pp. 3905–3914.
- ICML-2019-NguyenSR #monte carlo #optimisation
- Non-Asymptotic Analysis of Fractional Langevin Monte Carlo for Non-Convex Optimization (THN, US, GR), pp. 4810–4819.
- ICML-2019-QianRGSLS
- SGD with Arbitrary Sampling: General Analysis and Improved Rates (XQ, PR, RMG, AS, NL, ES), pp. 5200–5209.
- ICML-2019-SaunshiPAKK #learning #representation
- A Theoretical Analysis of Contrastive Unsupervised Representation Learning (NS, OP, SA, MK, HK), pp. 5628–5637.
- ICML-2019-SimsekliSG #network #probability
- A Tail-Index Analysis of Stochastic Gradient Noise in Deep Neural Networks (US, LS, MG), pp. 5827–5837.
- ICML-2019-TianMGSCPZ
- ELF OpenGo: an analysis and open reimplementation of AlphaZero (YT, JM, QG, SS, ZC, JP, LZ), pp. 6244–6253.
- ICML-2019-UurtioBR #canonical #correlation #kernel #scalability
- Large-Scale Sparse Kernel Canonical Correlation Analysis (VU, SB, JR), pp. 6383–6391.
- ICML-2019-WilkinsonARSS #probability
- End-to-End Probabilistic Inference for Nonstationary Audio Analysis (WJW, MRA, JDR, DS, AS), pp. 6776–6785.
- ICML-2019-YuanL #adaptation #component #online
- Online Adaptive Principal Component Analysis and Its extensions (JY, AGL), pp. 7213–7221.
- ICML-2019-YuJY #communication #distributed #linear #on the #optimisation #performance
- On the Linear Speedup Analysis of Communication Efficient Momentum SGD for Distributed Non-Convex Optimization (HY, RJ, SY), pp. 7184–7193.
- ICML-2019-YunZYLA #learning #optimisation #statistics
- Trimming the l₁ Regularizer: Statistical Analysis, Optimization, and Applications to Deep Learning (JY, PZ, EY, ACL, AYA), pp. 7242–7251.
- KDD-2019-ChengSHZ #modelling #performance
- Incorporating Interpretability into Latent Factor Models via Fast Influence Analysis (WC, YS, LH, YZ), pp. 885–893.
- KDD-2019-WuZ #ambiguity #linear #reduction
- Disambiguation Enabled Linear Discriminant Analysis for Partial Label Dimensionality Reduction (JHW, MLZ), pp. 416–424.
- KDD-2019-Xia #graph #platform
- Roll of Unified Graph Analysis Platforms (YX), p. 3179.
- KDD-2019-YinH #estimation #identification #testing
- The Identification and Estimation of Direct and Indirect Effects in A/B Tests through Causal Mediation Analysis (XY, LH), pp. 2989–2999.
- MoDELS-2019-DeVriesC #modelling #non-functional #requirements
- Goal-Based Modeling and Analysis of Non-Functional Requirements (BD, BHCC), pp. 261–271.
- MoDELS-2019-PhilippSE #architecture #modelling #synthesis
- Model-Based Resource Analysis and Synthesis of Service-Oriented Automotive Software Architectures (PO, SK, ES), pp. 128–138.
- ECOOP-2019-Bastani0CAA #points-to #specification
- Eventually Sound Points-To Analysis with Specifications (OB, RS0, LC, SA, AA), p. 28.
- ECOOP-2019-LuoDB #approach #editing #ide #named
- MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper) (LL, JD, EB), p. 25.
- OOPSLA-2019-LuX #context-sensitive grammar #performance #pointer
- Precision-preserving yet fast object-sensitive pointer analysis with partial context sensitivity (JL, JX), p. 29.
- OOPSLA-2019-ZhangYTWK0 #abstract interpretation #bytecode #dependence #named
- BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation (ZZ0, WY, GT, GW, YK, XZ0), p. 31.
- PLDI-2019-FuS #effectiveness #float
- Effective floating-point analysis via weak-distance minimization (ZF, ZS), pp. 439–452.
- PLDI-2019-YogaN #difference
- Parallelism-centric what-if and differential analyses (AY, SN), pp. 485–501.
- POPL-2019-AndreescuJLM #correlation
- Inferring frame conditions with static correlation analysis (OFA, TPJ, SL, BM), p. 29.
- POPL-2019-HoushmandL #coordination #named #replication #synthesis
- Hamsaz: replication coordination analysis and synthesis (FH, ML), p. 32.
- POPL-2019-HungHZYHW #quantum #robust #source code
- Quantitative robustness analysis of quantum programs (SHH, KH, SZ, MY, MH0, XW), p. 29.
- POPL-2019-SpathAB #automaton #data flow #using
- Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems (JS, KA0, EB), p. 29.
- POPL-2019-TouzeauMMR #performance
- Fast and exact analysis for LRU caches (VT, CM, DM, JR), p. 29.
- QAPL-2019-Kirkeby #probability #reuse #source code
- Probabilistic Output Analyses for Deterministic Programs - Reusing Existing Non-probabilistic Analyses (MHK), pp. 43–57.
- SAS-2019-BecchiZ #hybrid
- Revisiting Polyhedral Analysis for Hybrid Systems (AB, EZ), pp. 183–202.
- SAS-2019-Cousot #data flow #semantics
- Syntactic and Semantic Soundness of Structural Dataflow Analysis (PC), pp. 96–117.
- SAS-2019-DelmasM #abstract interpretation #using
- Analysis of Software Patches Using Numerical Abstract Interpretation (DD, AM), pp. 225–246.
- SAS-2019-DengC #abstract interpretation
- Responsibility Analysis by Abstract Interpretation (CD, PC), pp. 368–388.
- SAS-2019-LeiS #performance #pointer #precise
- Fast and Precise Handling of Positive Weight Cycles for Field-Sensitive Pointer Analysis (YL, YS), pp. 27–47.
- SAS-2019-YanCSZZX #adaptation #safety #verification
- Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis (HY, SC0, YS, YZ, CZ, JX), pp. 48–72.
- ASE-2019-CelikPPAG #coq #mutation testing
- Mutation Analysis for Coq (AÇ, KP, MP, EJGA, MG), pp. 539–551.
- ASE-2019-DuX000Z #framework #network
- A Quantitative Analysis Framework for Recurrent Neural Network (XD, XX, YL0, LM0, YL0, JZ), pp. 1062–1065.
- ASE-2019-HeLWMZLHLX #algorithm
- Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint Analysis (DH, HL, LW, HM, HZ, JL0, SH, LL, JX), pp. 267–279.
- ASE-2019-HuangFZZWJMP #editing #modelling #named #precise #requirements
- Prema: A Tool for Precise Requirements Editing, Modeling and Analysis (YH, JF, HZ, JZ, SW, SJ, WM, GP), pp. 1166–1169.
- ASE-2019-Jiang #commit #generative #semantics
- Boosting Neural Commit Message Generation with Code Semantic Analysis (SJ), pp. 1280–1282.
- ASE-2019-LuoBS #android
- A Qualitative Analysis of Android Taint-Analysis Results (LL, EB, JS), pp. 102–114.
- ASE-2019-MuGCCGXMS #alias #execution #named #performance
- RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis (DM, WG, AC, YC, JG, XX, BM, CS), pp. 924–935.
- ASE-2019-RenLXJX #locality
- Root Cause Localization for Unreproducible Builds via Causality Analysis Over System Call Tracing (ZR, CL, XX, HJ, TX), pp. 527–538.
- ASE-2019-ReulingKRL #configuration management
- SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-Based Analysis of Variant-Rich Software (DR, UK, SR, ML), pp. 1134–1137.
- ASE-2019-VeduradaN #alias
- Batch Alias Analysis (JV, VKN), pp. 936–948.
- ASE-2019-WangC00S #fault #memory management #named #pointer
- TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis (YW, GC, MZ0, MG0, JS), pp. 1170–1173.
- ASE-2019-WuLZYZ0 #mobile #named #performance
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis (YW, XL, DZ, WY0, XZ, HJ0), pp. 139–150.
- ESEC-FSE-2019-ChenCLML #approach #learning #named #re-engineering #sentiment
- SEntiMoji: an emoji-powered learning approach for sentiment analysis in software engineering (ZC, YC, XL, QM, XL), pp. 841–852.
- ESEC-FSE-2019-CotroneoSLNB #debugging #empirical #framework #how #in the cloud #platform
- How bad can a bug get? an empirical analysis of software failures in the OpenStack cloud computing platform (DC, LDS, PL, RN, NB), pp. 200–211.
- ESEC-FSE-2019-DuXLM0Z #learning #modelling #named
- DeepStellar: model-based quantitative analysis of stateful deep learning systems (XD, XX, YL0, LM0, YL0, JZ), pp. 477–487.
- ESEC-FSE-2019-Fu #distributed #on the #scalability
- On the scalable dynamic taint analysis for distributed systems (XF), pp. 1247–1249.
- ESEC-FSE-2019-Pan #network #robust
- Static deep neural network analysis for robustness (RP), pp. 1238–1240.
- ESEC-FSE-2019-PauckW #android
- Together strong: cooperative Android app analysis (FP, HW), pp. 374–384.
- ESEC-FSE-2019-ShahinCS #product line
- Lifting Datalog-based analyses to software product lines (RS, MC, RS), pp. 39–49.
- ESEC-FSE-2019-SuiZZZX #android #debugging #difference #effectiveness #reduction #user interface
- Event trace reduction for effective bug replay of Android apps via differential GUI state analysis (YS, YZ0, WZ, MZ, JX), pp. 1095–1099.
- ICSE-2019-AryaWGC #detection #open source
- Analysis and detection of information types of open source software issue discussions (DA, WW, JLCG, JC), pp. 454–464.
- ICSE-2019-FanLLWNZL #android #graph #learning #using
- Graph embedding based familial analysis of Android malware using unsupervised learning (MF, XL, JL0, MW, CN, QZ, TL0), pp. 771–782.
- ICSE-2019-HeradioFME #modelling #statistics #variability
- Supporting the statistical analysis of variability models (RH, DFA, CMD, AE), pp. 843–853.
- ICSE-2019-KristensenM #javascript #library
- Reasonably-most-general clients for JavaScript library analysis (EKK, AM), pp. 83–93.
- ICSE-2019-LazregCCH0 #automation #embedded #multi #variability
- Multifaceted automated analyses for variability-intensive embedded systems (SL, MC, PC, PH, SM0), pp. 854–865.
- ICSE-2019-NilizadehNP #difference #fuzzing #named
- DifFuzz: differential fuzzing for side-channel analysis (SN, YN, CSP), pp. 176–187.
- ICSE-2019-WenLWXCS #api #library #mutation testing
- Exposing library API misuses via mutation analysis (MW, YL, RW, XX, SCC, ZS), pp. 866–877.
- GPCE-2019-FeichtingerHLPG #constraints #dependence #evolution #feature model
- Supporting feature model evolution by suggesting constraints from code-level dependency analyses (KF, DH, LL, HP, PG), pp. 129–142.
- SLE-2019-IzquierdoC #modelling #programming language
- Analysis and modeling of the governance in general programming languages (JLCI, JC), pp. 179–183.
- ASPLOS-2019-LustigSG #consistency #formal method #memory management
- A Formal Analysis of the NVIDIA PTX Memory Consistency Model (DL, SS, OG), pp. 257–270.
- CASE-2019-ChenJD #flexibility #geometry #performance #realtime
- Real-Time Performance Analysis of Batch-Based Serial Flexible Production Lines With Geometric Machines (JC, ZJ, YD), pp. 97–102.
- CASE-2019-ImaniCT0 #modelling #random
- Random Forest Modeling for Survival Analysis of Cancer Recurrences (FI, RC, CT, HY0), pp. 399–404.
- CASE-2019-KomasDKT0
- Data-and Expert-Driven Analysis of Cause-Effect Relationships in the Production of Lithium-Ion Batteries (TK, RD, MZK, ST, CH0), pp. 380–385.
- CASE-2019-PengZZZ #component #detection #fault #kernel #markov #multi #process
- Hidden Markov Model Combined with Kernel Principal Component Analysis for Nonlinear Multimode Process Fault Detection (PP, JZ, YZ, HZ), pp. 1586–1591.
- CASE-2019-PirehgalinTOV #automation #image #using #video #visual notation
- Automatic Visual Leakage Inspection by Using Thermographic Video and Image Analysis (MFP, ET, MO, BVH), pp. 1282–1288.
- CASE-2019-RoselliBA #flexibility #problem #scheduling #smt
- SMT Solvers for Flexible Job-Shop Scheduling Problems: A Computational Analysis (SFR, KB, KÅ), pp. 673–678.
- CASE-2019-SchulerS #automation #modelling #process #towards #using
- Spray pattern analysis using wet-mix concrete for model based process control towards automated construction (BS, OS), pp. 661–666.
- CASE-2019-XieX0C #semantics
- The Analysis of Haze Effect on Dense Semantic Mapping (HX, QX, DZ0, ZC), pp. 1118–1123.
- CC-2019-BlassP #algorithm #compilation #fixpoint #performance
- GPU-accelerated fixpoint algorithms for faster compiler analyses (TB, MP), pp. 122–134.
- CC-2019-ThakurN #scalability
- Compare less, defer more: scaling value-contexts based whole-program heap analyses (MT, VKN), pp. 135–146.
- CGO-2019-ZhouM #performance
- A Tool for Performance Analysis of GPU-Accelerated Applications (KZ, JMMC), p. 282.
- FASE-2019-TootsTYDGLMPPPT #privacy #process
- Business Process Privacy Analysis in Pleak (AT, RT, MY, MD, LGB, PL, RM, AP, MP, PP, JT), pp. 306–312.
- FASE-2019-ZhangSMC #bound #constraints #scheduling #smt #specification
- SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language (MZ0, FS, FM, XC0), pp. 61–78.
- CADE-2019-HirokawaNOO #confluence #revisited
- Confluence by Critical Pair Analysis Revisited (NH, JN, VvO, MO), pp. 319–336.
- CAV-2019-CeskaK #abstraction #network
- Semi-quantitative Abstraction and Analysis of Chemical Reaction Networks (MC0, JK), pp. 475–496.
- CAV-2019-DreossiFGKRVS #design #named #tool support
- VerifAI: A Toolkit for the Formal Design and Analysis of Artificial Intelligence-Based Systems (TD, DJF, SG, EK, HR, MVC, SAS), pp. 432–442.
- CAV-2019-GavrilenkoLFHM #encoding #memory management #modelling #smt
- BMC for Weak Memory Models: Relation Analysis for Compact SMT Encodings (NG, HPdL, FF, KH, RM0), pp. 355–365.
- CAV-2019-KatzHIJLLSTWZDK #framework #network #verification
- The Marabou Framework for Verification and Analysis of Deep Neural Networks (GK, DAH, DI, KJ, CL, RL, PS, ST, HW0, AZ, DLD, MJK, CWB), pp. 443–452.
- CAV-2019-NeupaneMM00 #approximate #infinity #model checking #named #probability
- STAMINA: STochastic Approximate Model-Checker for INfinite-State Analysis (TN, CJM, CM, HZ0, ZZ0), pp. 540–549.
- CAV-2019-BackesBCDGHKKKK #network #reachability
- Reachability Analysis for AWS-Based Networks (JB, SB, BC, CD, AG, AJH, TK, BK, EK, JK, SM, JR0, NR, JS, MAS, PS, PS, CV, BW), pp. 231–241.
- CAV-2019-GuoLLRS #kernel #scheduling
- Integrating Formal Schedulability Analysis into a Verified OS Kernel (XG, ML, ML0, LR, ZS), pp. 496–514.
- ICST-2019-KahlesTHJ #agile #automation #machine learning #testing
- Automating Root Cause Analysis via Machine Learning in Agile Software Testing Environments (JK, JT, TH, AJ), pp. 379–390.
- ICST-2019-Wei #safety
- AADL-Based Safety Analysis Approaches for Safety-Critical Systems (XW), pp. 481–482.
- ICST-2019-WuLSCX #android #detection #order #precise
- Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android (DW, JL0, YS, SC0, JX), pp. 276–287.
- VMCAI-2019-BouillaguetBSY #deduction #in memory #memory management #modelling #pointer #verification
- Exploiting Pointer Analysis in Memory Models for Deductive Verification (QB, FB, MS, BY), pp. 160–182.
- VMCAI-2019-GermaneM #automaton #continuation
- Relatively Complete Pushdown Analysis of Escape Continuations (KG, MM), pp. 205–225.
- VMCAI-2019-GermaneM0M #control flow
- Demand Control-Flow Analysis (KG, JM, MDA0, MM), pp. 226–246.
- VMCAI-2019-NicolaySMR
- Effect-Driven Flow Analysis (JN, QS, WDM, CDR), pp. 247–274.
- ECSA-2018-TumaS #architecture
- Two Architectural Threat Analysis Techniques Compared (KT, RS), pp. 347–363.
- ICSA-2018-SzvetitsZ #architecture #design #modelling #multi #runtime
- Architectural Design Decisions for Systems Supporting Model-Based Analysis of Runtime Events: A Qualitative Multi-method Study (MS, UZ), pp. 115–124.
- JCDL-2018-TayehS
- An Analysis of Cross-Document Linking Mechanisms (AAOT, BS), pp. 69–78.
- EDM-2018-AungRW #automation #video
- Who are they looking at? Automatic Eye Gaze Following for Classroom Observation Video Analysis (AMA, AR, JW).
- EDM-2018-ChenLCBC #behaviour #learning #scalability
- Behavioral Analysis at Scale: Learning Course Prerequisite Structures from Learner Clickstreams (WC, ASL, DC, CGB, MC).
- EDM-2018-CrossleyOLBDB #modelling #sentiment
- Modeling Math Identity and Math Success through Sentiment Analysis and Linguistic Features (SAC, JO, MJL, FB, MD, RSB).
- EDM-2018-DuDP #behaviour #learning #named
- ELBA: Exceptional Learning Behavior Analysis (XD, WD, MP).
- EDM-2018-SawyerRAL #behaviour #game studies #learning #problem #student
- Filtered Time Series Analyses of Student Problem-Solving Behaviors in Game-based Learning (RS, JPR, RA, JCL).
- ICPC-2018-CastroS #interactive #visualisation
- Analysis of test log information through interactive visualizations (DC, MS), pp. 156–166.
- ICSME-2018-0008ZOPLB #dataset #re-engineering #sentiment
- Two Datasets for Sentiment Analysis in Software Engineering (BL0, FZ, RO, MDP, ML, GB), p. 712.
- ICSME-2018-BagheriWAM #android #performance #security
- Efficient, Evolutionary Security Analysis of Interacting Android Apps (HB, JW, JA, SM), pp. 357–368.
- ICSME-2018-HuZLWLG #approach #hybrid #named #semantics
- BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis (YH, YZ0, JL, HW, BL, DG), pp. 104–114.
- ICSME-2018-JimenezCTP #n-gram #on the #parametricity
- On the Impact of Tokenizer and Parameters on N-Gram Based Code Analysis (MJ, MC, YLT, MP), pp. 437–448.
- ICSME-2018-JimenezCTP18a #named
- TUNA: TUning Naturalness-Based Analysis (MJ, MC, YLT, MP), p. 715.
- ICSME-2018-LeemansABSL #legacy #lessons learnt #process
- Software Process Analysis Methodology - A Methodology Based on Lessons Learned in Embracing Legacy Software (ML, WMPvdA, MGJvdB, RRHS, LL), pp. 665–674.
- ICSME-2018-PontaPS #metadata #open source
- Beyond Metadata: Code-Centric and Usage-Based Analysis of Known Vulnerabilities in Open-Source Software (SEP, HP, AS), pp. 449–460.
- ICSME-2018-SchlieSS #matlab #matrix #modelling #multi #using
- Comparing Multiple MATLAB/Simulink Models Using Static Connectivity Matrix Analysis (AS, SS, IS), pp. 160–171.
- MSR-2018-BellmanSB #debugging #developer #ide #timeline #visual notation
- Studying developer build issues and debugger usage via timeline analysis in visual studio IDE (CB, AS, OB), pp. 106–109.
- MSR-2018-CaiJ #android #performance #precise
- Leveraging historical versions of Android apps for efficient and precise taint analysis (HC, JJ), pp. 265–269.
- MSR-2018-CohenC08 #developer #git #repository #scalability
- Large-scale analysis of the co-commit patterns of the active developers in github's top repositories (EC, MPC), pp. 426–436.
- MSR-2018-MantylaCC08 #natural language #pipes and filters #re-engineering
- Natural language or not (NLON): a package for software engineering text analysis pipeline (MVM, FC, MC), pp. 387–391.
- MSR-2018-NovielliGL08 #benchmark #metric #re-engineering #research #sentiment
- A benchmark study on sentiment analysis for software engineering research (NN, DG, FL), pp. 364–375.
- MSR-2018-Soto-ValeroBB #behaviour #debugging #detection #process
- Detection and analysis of behavioral T-patterns in debugging activities (CSV, JB, BB), pp. 110–113.
- SANER-2018-IslamZ #comparison #re-engineering #sentiment #tool support
- A comparison of software engineering domain specific sentiment analysis tools (MRI, MFZ), pp. 487–491.
- SANER-2018-Jurgens #lessons learnt #quality
- A decade of software quality analysis in practice: Surprises, anecdotes, and lessons learned (keynote) (EJ), p. 1.
- SANER-2018-LeemansAB #modelling #recursion
- Recursion aware modeling and discovery for hierarchical software event log analysis (ML, WMPvdA, MGJvdB), pp. 185–196.
- SANER-2018-LeemansAB18a #mining #process #scalability #statechart #using
- The Statechart Workbench: Enabling scalable software event log analysis using process mining (ML, WMPvdA, MGJvdB), pp. 502–506.
- SANER-2018-Vogel-HeuserFFU #architecture #automation #composition #industrial
- Modularity and architecture of PLC-based software for automated production systems: An analysis in industrial companies (journal-first abstract) (BVH, JF, SF, SU, SR), p. 473.
- SANER-2018-XuLLZ #component #fault #hybrid #kernel #learning #predict
- Cross-version defect prediction via hybrid active learning with kernel principal component analysis (ZX, JL0, XL, TZ0), pp. 209–220.
- SCAM-2018-HorvathSGKP #challenge #implementation
- [Engineering Paper] Challenges of Implementing Cross Translation Unit Analysis in Clang Static Analyzer (GH, PS, ZG, DK, NP), pp. 171–176.
- SCAM-2018-JimenezTP #security
- [Engineering Paper] Enabling the Continuous Analysis of Security Vulnerabilities with VulData7 (MJ, YLT, MP), pp. 56–61.
- CIAA-2018-Condon #algorithm #design #network #on the
- On Design and Analysis of Chemical Reaction Network Algorithms (AC), pp. 1–3.
- FM-2018-AvgustinovBM
- Variant Analysis with QL (PA, KB, MYM), pp. 666–670.
- FM-2018-BeckerPDT #float #optimisation #tool support
- Combining Tools for Optimization and Analysis of Floating-Point Computations (HB, PP, ED, ZT), pp. 355–363.
- FM-2018-Laneve #concurrent #lightweight #source code #thread
- A Lightweight Deadlock Analysis for Programs with Threads and Reentrant Locks (CL), pp. 608–624.
- FM-2018-PutterW #composition #generative
- To Compose, or Not to Compose, That Is the Question: An Analysis of Compositional State Space Generation (SdP, AW), pp. 485–504.
- FM-2018-VandinBLL #configuration management #named
- QFLan: A Tool for the Quantitative Analysis of Highly Reconfigurable Systems (AV, MHtB, AL, ALL), pp. 329–337.
- IFM-2018-DoughertyGR #protocol #security #smt #using
- Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (DJD, JDG, JDR), pp. 130–150.
- SEFM-2018-ArndtJMN #graph
- Graph-Based Shape Analysis Beyond Context-Freeness (HA, CJ, CM, TN0), pp. 271–286.
- SEFM-2018-SchulzeCL #automation #specification
- Automated Specification Extraction and Analysis with Specstractor (CS0, RC, ML), pp. 37–53.
- SEFM-2018-SchuppA #concurrent #hybrid #multi #safety #thread
- Spread the Work: Multi-threaded Safety Analysis for Hybrid Systems (SS, EÁ), pp. 89–104.
- ICFP-2018-Das0P #complexity #parallel
- Parallel complexity analysis with temporal session types (AD, JH0, FP), p. 30.
- AIIDE-2018-PartlanCSKSHE #automation #interactive
- Exploratory Automated Analysis of Structural Features of Interactive Narrative (NP, EC, SS, EK, GS, CH, MSEN), pp. 88–94.
- AIIDE-2018-SummervilleMSOW #bidirectional #game studies #generative #named
- Gemini: Bidirectional Generation and Analysis of Games via ASP (AS, CM, BS, JCO, NWF, MM), pp. 123–129.
- CHI-PLAY-2018-RoohiTKH #network
- Neural Network Based Facial Expression Analysis of GameEvents: A Cautionary Tale (SR, JT, JMK, PH), pp. 429–437.
- CIG-2018-BraviLL0 #game studies #video
- Shallow Decision-Making Analysis in General Video Game Playing (IB, DPL, SML, JL0), pp. 1–8.
- CIG-2018-CookCR #constraints #design #game studies
- Inferring Design Constraints From Game Ruleset Analysis (MC0, SC, AR), pp. 1–8.
- CIG-2018-GreenwoodAP #game studies
- A Critical Analysis of Punishment in Public Goods Games (GWG, HAA, EP), pp. 1–5.
- CIG-2018-SironiW #adaptation #game studies #monte carlo #self #video
- Analysis of Self-Adaptive Monte Carlo Tree Search in General Video Game Playing (CFS, MHMW), pp. 1–4.
- CIG-2018-VariaTKK #3d #dataset #game studies
- A Refined 3D Dataset for the Analysis of Player Actions in Exertion Games (CV, GT, KK, SDK), pp. 1–4.
- DiGRA-2018-GaoS #design #framework #game studies #matter #platform
- Does Platform Matter? A Game Design Analysis of Female Engagement in MOBA Games (GG, PCS).
- FDG-2018-BothenFN #artificial reality #case study #comparative #game studies #interactive #mobile #user study
- An analysis and comparative user study on interactions in mobile virtual reality games (SB, JAF, PN), p. 8.
- FDG-2018-KosaS #game studies #what
- What tabletop players think about augmented tabletop games: a content analysis (MK, PS), p. 8.
- FDG-2018-ZhuWZ #game studies #generative #similarity
- Exploring the similarity between game events for game level analysis and generation (TZ0, BW, MZ), p. 7.
- VS-Games-2018-RallisLGVDD #artificial reality #game studies #learning #using #visualisation
- An Embodied Learning Game Using Kinect and Labanotation for Analysis and Visualization of Dance Kinesiology (IR, AL, IG, AV, ND, AD), pp. 1–8.
- CIKM-2018-BaiCLKX #modelling #relational #topic
- Neural Relational Topic Models for Scientific Article Analysis (HB, ZC, MRL, IK, ZX), pp. 27–36.
- CIKM-2018-BonchiGMR #probability #social
- Probabilistic Causal Analysis of Social Influence (FB, FG, BM, DR), pp. 1003–1012.
- CIKM-2018-ChenKBRKKB #behaviour #predict
- Predictive Analysis by Leveraging Temporal User Behavior and User Embeddings (CC, SK, HB, RAR, EK, BK, RCB), pp. 2175–2182.
- ECIR-2018-ZangerleTWS #multimodal #music #named #towards
- ALF-200k: Towards Extensive Multimodal Analyses of Music Tracks and Playlists (EZ, MT, SW, GS), pp. 584–590.
- ECIR-2018-Zhang0LZ #matrix #representation #sentiment #twitter #using
- Unsupervised Sentiment Analysis of Twitter Posts Using Density Matrix Representation (YZ, DS0, XL, PZ0), pp. 316–329.
- ICML-2018-AinsworthFLF #named
- oi-VAE: Output Interpretable VAEs for Nonlinear Group Factor Analysis (SKA, NJF, AKCL, EBF), pp. 119–128.
- ICML-2018-HuWL #probability #reduction #source code #using
- Dissipativity Theory for Accelerating Stochastic Variance Reduction: A Unified Analysis of SVRG and Katyusha Using Semidefinite Programs (BH, SW, LL), pp. 2043–2052.
- ICML-2018-ImamuraSS #clustering #crowdsourcing #fault
- Analysis of Minimax Error Rate for Crowdsourcing and Its Application to Worker Clustering Model (HI, IS, MS), pp. 2152–2161.
- ICML-2018-KasaiSM #algorithm #convergence #probability #recursion
- Riemannian Stochastic Recursive Gradient Algorithm with Retraction and Vector Transport and Its Convergence Analysis (HK, HS, BM), pp. 2521–2529.
- ICML-2018-LanCS #estimation #framework
- An Estimation and Analysis Framework for the Rasch Model (ASL, MC, CS), pp. 2889–2897.
- ICML-2018-MarinovMA #component #streaming
- Streaming Principal Component Analysis in Noisy Settings (TVM, PM, RA), pp. 3410–3419.
- ICML-2018-PangDZ #linear #network
- Max-Mahalanobis Linear Discriminant Analysis Networks (TP, CD, JZ0), pp. 4013–4022.
- ICML-2018-PanZD #learning
- Theoretical Analysis of Image-to-Image Translation with Adversarial Learning (XP, MZ, DD), pp. 4003–4012.
- ICML-2018-TsakirisV #clustering
- Theoretical Analysis of Sparse Subspace Clustering with Missing Entries (MCT, RV), pp. 4982–4991.
- ICML-2018-XieWZX #distance #learning #metric
- Orthogonality-Promoting Distance Metric Learning: Convex Relaxation and Theoretical Analysis (PX, WW, YZ, EPX), pp. 5399–5408.
- ICML-2018-ZhangWYG #matrix #rank
- A Primal-Dual Analysis of Global Optimality in Nonconvex Low-Rank Matrix Recovery (XZ, LW, YY, QG), pp. 5857–5866.
- ICPR-2018-0001ZZWL
- Convolutional Discriminant Analysis (GZ0, YZ, XYZ, HW, XL), pp. 1456–1461.
- ICPR-2018-BaiHA #correlation #kernel #recognition
- Kernel Discriminant Correlation Analysis: Feature Level Fusion for Nonlinear Biometric Recognition (YB, MH, MAM), pp. 3198–3203.
- ICPR-2018-Chen18a #feature model #robust
- Improved Robust Discriminant Analysis for Feature Extraction (XC), pp. 1444–1449.
- ICPR-2018-ChenHZLQ #detection #multi #video
- Video Salient Object Detection via Multiple Time-scale Analysis (YC, LH, WZ, XL, GQ), pp. 2184–2189.
- ICPR-2018-DehzangiS #process #recognition #reduction #robust #using
- IMU-Based Robust Human Activity Recognition using Feature Analysis, Extraction, and Reduction (OD, VS), pp. 1402–1407.
- ICPR-2018-EladawiEFPGARKS #image
- Early Diagnosis of Diabetic Retinopathy in OCTA Images Based on Local Analysis of Retinal Blood Vessels and Foveal Avascular Zone (NE, ME, LF, FP, MG, AA, AEMR, RK, SS, AEB), pp. 3886–3891.
- ICPR-2018-FariaS #approach #graph #image
- A Graph-based Approach for Static Ensemble Selection in Remote Sensing Image Analysis (FAF, SS), pp. 344–349.
- ICPR-2018-FaulaBE #image #performance
- A Fast Local Analysis by Thresholding applied to image matching (YF, SB, VE), pp. 3055–3060.
- ICPR-2018-JiangL18a #reduction
- Generalized Fisher Discriminant Analysis as A Dimensionality Reduction Technique (YJ, FHFL), pp. 994–999.
- ICPR-2018-KurzendorferBSB #classification #random #segmentation #using
- Myocardial Scar Segmentation in LGE-MRI using Fractal Analysis and Random Forest Classification (TK, KB, SS, AB, CF, AKM), pp. 3168–3173.
- ICPR-2018-ShiL #segmentation #video
- A New Foreground Segmentation Method for Video Analysis in Different Color Spaces (HS, CL), pp. 2899–2904.
- ICPR-2018-SinhaNGG #hybrid #navigation #network #performance
- Hybrid Path Planner for Efficient Navigation in Urban Road Networks through Analysis of Trajectory Traces (SS, MKN, SG, SKG), pp. 3250–3255.
- ICPR-2018-SuHK #classification #component #multi #performance #using
- Efficient Text Classification Using Tree-structured Multi-linear Principal Component Analysis (YS, YH, CCJK), pp. 585–590.
- ICPR-2018-SuJ #image #multi #using
- Multi-Spectral Fusion and Denoising of RGB and NIR Images Using Multi-Scale Wavelet Analysis (HS, CJ), pp. 1779–1784.
- ICPR-2018-TranLPHKTNP #dataset #multi
- A multi-modal multi-view dataset for human fall analysis and preliminary investigation on modality (THT, TLL, DTP, VNH, VMK, QTT, TSN, CP), pp. 1947–1952.
- ICPR-2018-Windeatt #classification #optimisation #using
- Optimising Ensemble of Two-Class classifiers using Spectral Analysis (TW), pp. 710–715.
- ICPR-2018-Yang0CF #canonical #correlation #detection #image #using
- Heterogeneous image change detection using Deep Canonical Correlation Analysis (JY, YZ0, YC, LF), pp. 2917–2922.
- ICPR-2018-YangZWQ #classification #detection #image #quality #recognition
- Quality Classified Image Analysis with Application to Face Detection and Recognition (FY, QZ0, MW, GQ), pp. 2863–2868.
- ICPR-2018-ZhangZDD #network #online #recognition
- Trajectory-based Radical Analysis Network for Online Handwritten Chinese Character Recognition (JZ, YZ, JD, LD), pp. 3681–3686.
- ICPR-2018-ZhaoLZTNM #automation #component #image #multi #robust #segmentation #using
- Automatic Multi-Atlas Segmentation for Abdominal Images Using Template Construction and Robust Principal Component Analysis (YZ0, HL0, RZ, GT, MN, BHM), pp. 3880–3885.
- ICPR-2018-ZhongD #difference #recognition
- Deep Difference Analysis in Similar-looking Face recognition (YZ, WD), pp. 3353–3358.
- ICPR-2018-ZuninoMCAPBVBM #detection #gesture #video
- Video Gesture Analysis for Autism Spectrum Disorder Detection (AZ, PM, AC, CA, JP, FB, EV, CB, VM), pp. 3421–3426.
- KDD-2018-GongW #behaviour #modelling #network #sentiment #social
- When Sentiment Analysis Meets Social Network: A Holistic User Behavior Modeling in Opinionated Data (LG, HW), pp. 1455–1464.
- KDD-2018-HuDZ0X #e-commerce #formal method #learning #rank
- Reinforcement Learning to Rank in E-Commerce Search Engine: Formalization, Analysis, and Application (YH, QD, AZ, YY0, YX), pp. 368–377.
- KDD-2018-HuF #multimodal #sentiment
- Multimodal Sentiment Analysis To Explore the Structure of Emotions (AH, SRF), pp. 350–358.
- KDD-2018-SunZZGH #online #query
- Exploring the Urban Region-of-Interest through the Analysis of Online Map Search Queries (YS, HZ, FZ, JG, QH), pp. 2269–2278.
- KDD-2018-WangFZWZA #behaviour #how #learning #representation
- You Are How You Drive: Peer and Temporal-Aware Representation Learning for Driving Behavior Analysis (PW, YF, JZ, PW, YZ, CCA), pp. 2457–2466.
- KDD-2018-WangWLW #composition #multi #network
- Multilevel Wavelet Decomposition Network for Interpretable Time Series Analysis (JW, ZW, JL, JW), pp. 2437–2446.
- ECMFA-2018-HinkelB #design #metamodelling #on the
- On the Influence of Metamodel Design to Analyses and Transformations (GH, EB), pp. 63–79.
- MoDELS-2018-ShinCNSBZ #framework #named #physics #testing #uml
- HITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems (SYS, KC, SN, MS, LCB, FZ), pp. 357–367.
- MoDELS-2018-WeckesserLRS #modelling #programming
- Mathematical Programming for Anomaly Analysis of Clafer Models (MW, ML, MR, AS), pp. 34–44.
- ECOOP-2018-GrechKS #graph #performance #string
- Efficient Reflection String Analysis via Graph Coloring (NG, GK, YS), p. 25.
- ECOOP-2018-SmaragdakisK #effectiveness #lazy evaluation #points-to
- Defensive Points-To Analysis: Effective Soundness via Laziness (YS, GK), p. 28.
- ECOOP-2018-TomanG #named
- Legato: An At-Most-Once Analysis with Applications to Dynamic Configuration Updates (JT, DG), p. 32.
- OOPSLA-2018-JeonJO #data-driven #points-to #precise #scalability
- Precise and scalable points-to analysis via data-driven context tunneling (MJ, SJ, HO), p. 29.
- OOPSLA-2018-LiTMS #context-sensitive grammar #pointer
- Precision-guided context sensitivity for pointer analysis (YL0, TT0, AM, YS), p. 29.
- OOPSLA-2018-RamaKS #points-to #refinement #slicing
- Refinement in object-sensitivity points-to analysis via slicing (GMR, RK, HS), p. 27.
- OOPSLA-2018-SzaboBEV #datalog
- Incrementalizing lattice-based program analyses in Datalog (TS, GB, SE, MV), p. 29.
- AdaEurope-2018-RoyuelaMQP #ada #compilation #parallel
- Safe Parallelism: Compiler Analysis Techniques for Ada and OpenMP (SR, XM, EQ, LMP), pp. 141–157.
- PLDI-2018-BrutschyD0V #consistency
- Static serializability analysis for causal consistency (LB, DD, PM0, MTV), pp. 90–104.
- PLDI-2018-ChenLDP #locality #parallel
- Locality analysis through static parallel sampling (DC, FL, CD, SP), pp. 557–570.
- PLDI-2018-HongSKRKPRS #gpu #kernel #optimisation #using
- GPU code optimization using abstract kernel emulation and sensitivity analysis (CH, ASR, JK, PSR, SK, LNP, FR, PS), pp. 736–751.
- PLDI-2018-LiuH #concurrent #debugging #difference #named #parallel #performance
- D4: fast concurrency debugging with parallel differential analysis (BL, JH0), pp. 359–373.
- PLDI-2018-LiuW #bound #concurrent #interprocedural #named #source code
- CUBA: interprocedural Context-UnBounded Analysis of concurrent programs (PL, TW), pp. 105–119.
- PLDI-2018-NgoC0 #bound #probability #source code
- Bounded expectations: resource analysis for probabilistic programs (VCN, QC, JH0), pp. 496–512.
- PLDI-2018-ShiXWZFZ #named #performance #precise
- Pinpoint: fast and precise sparse value flow analysis for million lines of code (QS, XX0, RW, JZ, GF, CZ), pp. 693–706.
- POPL-2018-ChatterjeeCP #alias #data flow #reachability
- Optimal Dyck reachability for data-dependence and alias analysis (KC, BC, AP), p. 30.
- POPL-2018-LiY #algorithm #problem #quantum #source code #termination
- Algorithmic analysis of termination problems for quantum programs (YL, MY), p. 29.
- SAS-2018-BagnaraBH #c #development #embedded #standard
- The MISRA C Coding Standard and its Role in the Development and Analysis of Safety- and Security-Critical Embedded Software (RB, AB, PMH), pp. 5–23.
- SAS-2018-JacqueminPV #bound #fault #float
- A Reduced Product of Absolute and Relative Error Bounds for Floating-Point Analysis (MJ, SP, FV), pp. 223–242.
- SAS-2018-OHearn #concurrent #experience #facebook
- Experience Developing and Deploying Concurrency Analysis at Facebook (PWO), pp. 56–70.
- ASE-2018-HassanRW #named #recommendation
- RUDSEA: recommending updates of Dockerfiles via software environment analysis (FH, RR, XW), pp. 796–801.
- ASE-2018-HelmKERM #framework
- A unified lattice model and framework for purity analyses (DH, FK, ME, MR, MM), pp. 340–350.
- ASE-2018-MoSCRKN #architecture #automation #case study #experience
- Experiences applying automated architecture analysis tool suites (RM, WS, YC, SR, RK, MN), pp. 779–789.
- ASE-2018-SungPW #framework #named
- CANAL: a cache timing analysis framework via LLVM transformation (CS, BP, CW0), pp. 904–907.
- ASE-2018-WangCYJ #approach #constraints #model checking #string
- A symbolic model checking approach to the analysis of string and length constraints (HEW, SYC, FY, JHRJ), pp. 623–633.
- ESEC-FSE-2018-ChenLZZWH0 #optimisation
- Optimizing test prioritization via test distribution analysis (JC0, YL, LZ, JZ, XW, DH, LZ0), pp. 656–667.
- ESEC-FSE-2018-HeLLZLZ #identification #problem
- Identifying impactful service system problems via log analysis (SH, QL, JGL, HZ0, MRL, DZ), pp. 60–70.
- ESEC-FSE-2018-LiTMS #context-sensitive grammar #pointer #self
- Scalability-first pointer analysis with self-tuning context-sensitivity (YL0, TT0, AM, YS), pp. 129–140.
- ESEC-FSE-2018-MaLLZG #automation #debugging #difference #named #network
- MODE: automated neural network model debugging via state differential analysis and input selection (SM, YL, WCL, XZ, AG), pp. 175–186.
- ESEC-FSE-2018-PauckBW #android #question #tool support
- Do Android taint analysis tools keep their promises? (FP, EB, HW), pp. 331–341.
- ICSE-2018-0008ZBPLO #how #question #re-engineering #sentiment
- Sentiment analysis for software engineering: how far can we go? (BL0, FZ, GB, MDP, ML, RO), pp. 94–104.
- ICSE-2018-0013P0 #mobile #named
- EnMobile: entity-based characterization and analysis of mobile malware (WY0, MRP, TX0), pp. 384–394.
- ICSE-2018-FanSCMLXPS #android #exception #scalability
- Large-scale analysis of framework-specific exceptions in Android apps (LF, TS, SC, GM, YL0, LX, GP, ZS), pp. 408–419.
- ICSE-2018-GaoZLK #identification #online #overview
- Online app review analysis for identifying emerging issues (CG, JZ, MRL, IK), pp. 48–58.
- ICSE-2018-Lambers0TBH #dependence #graph transformation #multi #re-engineering
- Multi-granular conflict and dependency analysis in software engineering based on graph transformation (LL, DS0, GT, KB, JH), pp. 716–727.
- ICSE-2018-LaraG #concept #modelling #type system
- A posteriori typing for model-driven engineering: concepts, analysis, and applications (JdL, EG), p. 1136.
- ICSE-2018-SadeghiJGBM #android #framework
- A temporal permission analysis and enforcement framework for Android (AS, RJ, NG, HB, SM), pp. 846–857.
- ICSE-2018-ZhangSX #process
- Launch-mode-aware context-sensitive activity transition analysis (YZ0, YS, JX), pp. 598–608.
- GPCE-2018-ChristopheRBM #distributed #javascript #process #source code
- Orchestrating dynamic analyses of distributed processes for full-stack JavaScript programs (LC, CDR, EGB, WDM), pp. 107–118.
- GPCE-2018-NiekeMSTYF #evolution
- Anomaly analyses for feature-model evolution (MN, JM, CS, TT, ICY, FF), pp. 188–201.
- GPCE-2018-Peldszus0J #feature model #modelling #product line #security
- Model-based security analysis of feature-oriented software product lines (SP, DS0, JJ), pp. 93–106.
- CASE-2018-HaouasDL #parallel
- Analysis of an Integrated 4-DoF Parallel Wrist for Dexterous Gripping (WH, RD, GJL), pp. 1448–1453.
- CASE-2018-KangYJ #performance #realtime #using
- Real-time Production Performance Analysis Using Machine Degradation Signals: a Two-Machine Case (YK, HY, FJ), pp. 1501–1506.
- CASE-2018-MarussyM #configuration management #dependence #modelling
- Constructing Dependability Analysis Models of Reconfigurable Production Systems (KM, IM), pp. 1158–1163.
- CASE-2018-MatsubaraNOC #component #policy #simulation
- Policy Transfer from Simulations to Real World by Transfer Component Analysis (TM, YN, YO, YC), pp. 264–269.
- CASE-2018-OutafraoutAN #approach #hybrid #modelling #multi #performance #petri net
- A colored hybrid Petri net-based modeling approach for performance analysis of a multi-modal transportation system (KO, EhCEA, ANSM), pp. 1568–1573.
- CASE-2018-SchedlerFBJT #automation #evaluation
- Evaluation of an Automated Sample Preparation System for Analysis of Methacrylates in Saliva (MS, HF, JB, SJ, KT), pp. 1101–1105.
- CASE-2018-TanCPP #automation #design #learning #visual notation
- Transfer Learning with PipNet: For Automated Visual Analysis of Piping Design (WCT, IMC, DP, SJP), pp. 1296–1301.
- CASE-2018-TanGCC #automation #learning
- Learning with Corrosion Feature: For Automated Quantitative Risk Analysis of Corrosion Mechanism (WCT, PCG, KHC, IMC), pp. 1290–1295.
- CASE-2018-YangWSQ #clustering #constraints #scheduling #tool support
- Cyclic Scheduling Analysis of Single-arm Cluster Tools with Wafer Residency Time Constraint and Chamber Cleaning Operations (FY, NW, RS, YQ), pp. 241–246.
- CASE-2018-Zou0HAX #performance
- Analysis of End-of-State Impact on Manufacturing System Production Performance (JZ, QC0, JH0, JA, GX), pp. 823–828.
- CC-2018-GinsbachCO #compilation #domain-specific language #named
- CAnDL: a domain specific language for compiler analysis (PG, LC, MFPO), pp. 151–162.
- CC-2018-KastrinisBFPS #alias #data type #performance
- An efficient data structure for must-alias analysis (GK, GB, KF, NPK, YS), pp. 48–58.
- CC-2018-KochMVCF #algorithm #compilation #parallel #towards
- Towards a compiler analysis for parallel algorithmic skeletons (TJKEvK, SM, CV, MC, BF), pp. 174–184.
- CC-2018-PathadeK #data flow
- Computing partially path-sensitive MFP solutions in data flow analyses (KP, UPK), pp. 37–47.
- CC-2018-ZhaoBS #parallel #points-to
- Parallel sparse flow-sensitive points-to analysis (JZ, MGB, VS), pp. 59–70.
- CGO-2018-ZhouLWX0
- May-happen-in-parallel analysis with static vector clocks (QZ, LL0, LW, JX, XF0), pp. 228–240.
- ESOP-2018-AbdullaJT #abstraction #concurrent
- Fragment Abstraction for Concurrent Shape Analysis (PAA, BJ, CQT), pp. 442–471.
- ESOP-2018-ChatterjeeGV #contract
- Quantitative Analysis of Smart Contracts (KC, AKG, YV), pp. 739–767.
- FASE-2018-0012SRYHBRS #approach #effectiveness #modelling
- Effective Analysis of Attack Trees: A Model-Driven Approach (RK0, SS, ER, BMY, DH, JB, AR, MS), pp. 56–73.
- FASE-2018-ChechikSDR #commutative #named #performance
- FPH: Efficient Non-commutativity Analysis of Feature-Based Systems (MC, IS, CD, JR), pp. 319–336.
- FASE-2018-LiuOSWGM #distributed #formal method #named #protocol #transaction
- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis (SL0, PCÖ, KS, QW0, IG, JM), pp. 77–93.
- FASE-2018-ParkSR #framework #using #web
- EventHandler-Based Analysis Framework for Web Apps Using Dynamically Collected States (JP, KS, SR), pp. 129–145.
- CAV-2018-BlondinEJ #named #protocol
- Peregrine: A Tool for the Analysis of Population Protocols (MB, JE, SJ), pp. 604–611.
- CAV-2018-FedyukovichZG #termination
- Syntax-Guided Termination Analysis (GF, YZ, AG), pp. 124–143.
- CAV-2018-SchemmelBDNW #liveness
- Symbolic Liveness Analysis of Real-World Software (DS, JB, OSD, TN0, KW), pp. 447–466.
- ICST-2018-Suarez-Otero #consistency #logic
- Analysis of the Logical Consistency in Cassandra (PSO), pp. 430–431.
- VMCAI-2018-KranzS #bytecode #composition #on-demand #using
- Modular Analysis of Executables Using On-Demand Heyting Completion (JK, AS), pp. 291–312.
- VMCAI-2018-TitoloFMM #abstract interpretation #fault #float #framework #source code
- An Abstract Interpretation Framework for the Round-Off Error Analysis of Floating-Point Programs (LT, MAF, MMM, CAM), pp. 516–537.
- ECSA-2017-NguyenOG #design #performance #process #repository
- PARAD Repository: On the Capitalization of the Performance Analysis Process for AADL Designs (TDN, YO, EG), pp. 22–39.
- ECSA-2017-TrubianiM #architecture #collaboration #modelling #nondeterminism #reduction
- Continuous Rearchitecting of QoS Models: Collaborative Analysis for Uncertainty Reduction (CT, RM), pp. 40–48.
- ICSA-2017-BangBM #collaboration #design
- Continuous Analysis of Collaborative Design (JYB, YB, NM), pp. 97–106.
- ICSA-2017-HauptLSV #api #framework #rest
- A Framework for the Structural Analysis of REST APIs (FH, FL, AS, KVH), pp. 55–58.
- ICSA-2017-PatersonC #markov #quality #refinement
- Accurate Analysis of Quality Properties of Software with Observation-Based Markov Chain Refinement (CP, RC), pp. 121–130.
- ICSA-2017-RoyMRSW #architecture #framework #towards
- Towards a Reference Architecture for Cloud-Based Plant Genotyping and Phenotyping Analysis Frameworks (BR, AKM, CKR, KAS, KW), pp. 41–50.
- JCDL-2017-MurdockJCMDP #towards
- Towards Publishing Secure Capsule-Based Analysis (JM, JJ, TWC, YM, JSD, BP), pp. 261–264.
- JCDL-2017-PageBFWW #library #linked data #music #open data
- Realising a Layered Digital Library: Exploration and Analysis of the Live Music Archive through Linked Data (KRP, SB, GF, DMW, TW), pp. 89–98.
- EDM-2017-BauerFP #behaviour #challenge #game studies #problem
- Analysis of problem-solving behavior in open-ended scientific-discovery game challenges (AB, JF, ZP).
- EDM-2017-CaiEDPGS #chat #collaboration #learning #modelling #network #topic
- Epistemic Network Analysis and Topic Modeling for Chat Data from Collaborative Learning Environment (ZC, BRE, ND, JWP, ACG, DWS).
- EDM-2017-CaoTH #student
- An Analysis of Students' Questions in MOOCs Forums (MC, YT, XH).
- EDM-2017-KuangCHN #framework #network #platform #social #topic
- A Topic Model and Social Network Analysis of a School Blogging Platform (XK, HSC, BH, GN).
- EDM-2017-LiTSH
- Text analysis with LIWC and Coh-Metrix: Portraying MOOCs Instructors (JL, YT, LS, XH).
- EDM-2017-Ortiz-VazquezLL #clustering #modelling #realtime
- Cluster Analysis of Real Time Location Data - An Application of Gaussian Mixture Models (AOV, XL, CFL, HSC, GN).
- EDM-2017-ShiPG #learning #performance #using
- Using an Additive Factor Model and Performance Factor Analysis to Assess Learning Gains in a Tutoring System to Help Adults with Reading Difficulties (GS, PIPJ, ACG).
- EDM-2017-VillamorR #collaboration #debugging #empirical
- Characterizing Collaboration in the Pair Program Tracing and Debugging Eye-Tracking Experiment: A Preliminary Analysis (MV, MMTR).
- EDM-2017-WangLGB
- A Latent Factor Model For Instructor Content Preference Analysis (JZW, ASL, PG, RGB).
- ICSME-2017-HigoK #metric
- Flattening Code for Metrics Measurement and Analysis (YH, SK), pp. 494–498.
- ICSME-2017-HuangVGSS #assembly #execution #named #scalability #visualisation
- Atlantis: Improving the Analysis and Visualization of Large Assembly Execution Traces (HNH, EV0, DMG, MADS, MS), pp. 623–627.
- MSR-2017-AtchisonBBSL
- A time series analysis of TravisTorrent builds: to everything there is a season (AA, CB, NB, ES, EL), pp. 463–466.
- MSR-2017-BellerGZ #git #testing
- Oops, my tests broke the build: an explorative analysis of Travis CI with GitHub (MB, GG, AZ), pp. 356–367.
- MSR-2017-BrandauerW #interactive #named
- Spencer: interactive heap analysis for the masses (SB, TW), pp. 113–123.
- MSR-2017-CitoSWLZG #ecosystem #empirical #git
- An empirical analysis of the docker container ecosystem on GitHub (JC, GS, JEW, PL, SZ, HCG), pp. 323–333.
- MSR-2017-IshioSII #reuse #set
- Source file set search for clone-and-own reuse analysis (TI, YS, KI, KI), pp. 257–268.
- MSR-2017-IslamZ #automation #re-engineering #sentiment
- Leveraging automated sentiment analysis in software engineering (MRI, MFZ), pp. 203–214.
- MSR-2017-RauschHL0 #empirical #integration #open source #workflow
- An empirical analysis of build failures in the continuous integration workflows of Java-based open-source software (TR, WH, PL, SS0), pp. 345–355.
- MSR-2017-SouzaS #sentiment
- Sentiment analysis of Travis CI builds (RRGS, BS), pp. 459–462.
- MSR-2017-ZampettiSOCP #how #integration #open source #pipes and filters #tool support
- How open source projects use static code analysis tools in continuous integration pipelines (FZ, SS, RO, GC, MDP), pp. 334–344.
- SANER-2017-AlexandruPG #multi
- Reducing redundancies in multi-revision code analysis (CVA, SP, HCG), pp. 148–159.
- SANER-2017-KandaGHM #comprehension #open source #towards
- Towards understanding an open-source bounty: Analysis of Bountysource (TK0, MG, HH, KiM), pp. 577–578.
- SANER-2017-MercierCJ #automation #memory management #named #reverse engineering
- dynStruct: An automatic reverse engineering tool for structure recovery and memory use analysis (DM, AC, RJ), pp. 497–501.
- SANER-2017-MoonSLK #behaviour #generative #how #what
- Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding (RJM, KMS, HYL, HJK), pp. 575–576.
- SANER-2017-YounangL #array #javascript
- Conventionality analysis of array objects in JavaScript (AY, LL), pp. 561–562.
- SCAM-2017-0008SMOBL #consistency #identifier #using
- Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers (BL0, SS, AM, RO, GB, ML), pp. 81–90.
- SCAM-2017-Anderson0 #php #query #sql
- Supporting Analysis of SQL Queries in PHP AiR (DA, MH0), pp. 153–158.
- SCAM-2017-PaduaS #exception
- Revisiting Exception Handling Practices with Exception Flow Analysis (GBdP, WS), pp. 11–20.
- FSCD-2017-Moser
- Uniform Resource Analysis by Rewriting: Strenghts and Weaknesses (Invited Talk) (GM), p. 10.
- IFM-2017-FrohnG #complexity #java
- Complexity Analysis for Java with AProVE (FF, JG), pp. 85–101.
- IFM-2017-GilmoreRV #statistics
- Transient and Steady-State Statistical Analysis for Discrete Event Simulators (SG, DR, AV), pp. 145–160.
- IFM-2017-HenrioLM
- Analysis of Synchronisations in Stateful Active Objects (LH, CL, VM), pp. 195–210.
- IFM-2017-SteinhofelW #control flow #invariant #standard
- A New Invariant Rule for the Analysis of Loops with Non-standard Control Flows (DS, NW), pp. 279–294.
- SEFM-2017-Jakobs #proving
- PART_PW : From Partial Analysis Results to a Proof Witness (MCJ), pp. 120–135.
- SEFM-2017-MahmudSL #embedded #logic #requirements #semantics #specification
- Specification and Semantic Analysis of Embedded Systems Requirements: From Description Logic to Temporal Logic (NM, CS, OL), pp. 332–348.
- SEFM-2017-MasciZJC #identification #requirements #safety #user interface
- A Hazard Analysis Method for Systematic Identification of Safety Requirements for User Interface Software in Medical Devices (PM, YZ0, PLJ, JCC), pp. 284–299.
- ICFP-2017-AvanziniL #automation #complexity #type inference
- Automating sized-type inference for complexity analysis (MA, UDL), p. 29.
- CHI-PLAY-2017-BarinDT #comprehension #game studies
- Understanding Dangerous Play: A Grounded Theory Analysis of High-Performance Drone Racing Crashes (AB, ID, ZOT), pp. 485–496.
- CHI-PLAY-2017-HornCD #adaptation #elicitation #game studies
- Adapting Cognitive Task Analysis to Elicit the Skill Chain of a Game (BH, SC, SD), pp. 277–289.
- DiGRA-2017-VughtG #game studies
- Considering play: From method to analysis (JvV, RG).
- FDG-2017-AllartLPGN #game studies #motivation #using #video
- Difficulty influence on motivation over time in video games using survival analysis (TA, GL, MP, AG, SN), p. 6.
- FDG-2017-HornHFBHS #game studies
- AI-assisted analysis of player strategy across level progressions in a puzzle game (BH, AKH, YF, JB, CH, GS), p. 10.
- FDG-2017-KaltmanOWM #game studies #tool support
- Getting the GISST: a toolkit for the creation, analysis and reference of game studies resources (EK, JCO, NWF, MM), p. 10.
- FDG-2017-MachadoNT #design #game studies
- SeekWhence a retrospective analysis tool for general game design (TM, AN, JT), p. 6.
- FDG-2017-Valls-VargasZO17a #generative #overview #perspective
- From computational narrative analysis to generation: a preliminary review (JVV, JZ, SO), p. 4.
- ICGJ-2017-PirkerKG #game studies #network #social
- Social network analysis of the global game jam network (JP, FK, CG), pp. 10–14.
- CIKM-2017-An0WY #clustering #feature model
- Unsupervised Feature Selection with Joint Clustering Analysis (SA, JW0, JW, ZY), pp. 1639–1648.
- CIKM-2017-ChenAS #bias #empirical #performance
- An Empirical Analysis of Pruning Techniques: Performance, Retrievability and Bias (RCC, LA, FS), pp. 2023–2026.
- CIKM-2017-ChenLL #modelling #sentiment
- Modeling Language Discrepancy for Cross-Lingual Sentiment Analysis (QC, CL, WL0), pp. 117–126.
- CIKM-2017-CuiLZZ #network
- Text Coherence Analysis Based on Deep Neural Network (BC, YL, YZ, ZZ), pp. 2027–2030.
- CIKM-2017-FeigenblatBRK #named #summary
- SummIt: A Tool for Extractive Summarization, Discovery and Analysis (GF, OB, HR, DK), pp. 2459–2462.
- CIKM-2017-FreitasTCX #agile #network
- Rapid Analysis of Network Connectivity (SF, HT, NC, YX), pp. 2463–2466.
- CIKM-2017-KhoaAW #framework #incremental #maintenance #using
- Smart Infrastructure Maintenance Using Incremental Tensor Analysis: Extended Abstract (NLDK, AA, YW), pp. 959–967.
- CIKM-2017-LeL17a #interactive #named #semantics #topic #visualisation
- SemVis: Semantic Visualization for Interactive Topical Analysis (TMVL, HWL), pp. 2487–2490.
- CIKM-2017-MaHLSYLR #clustering #graph #multi
- Multi-view Clustering with Graph Embedding for Connectome Analysis (GM, LH0, CTL, WS, PSY, ADL, ABR), pp. 127–136.
- CIKM-2017-MeleBC #multi
- Linking News across Multiple Streams for Timeliness Analysis (IM, SAB, FC), pp. 767–776.
- CIKM-2017-NguyenH
- Differentially Private Regression for Discrete-Time Survival Analysis (TTN, SCH), pp. 1199–1208.
- CIKM-2017-NobariRN
- Analysis of Telegram, An Instant Messaging Service (ADN, NR, MN), pp. 2035–2038.
- CIKM-2017-PangCWL #recognition #robust
- Robust Heterogeneous Discriminative Analysis for Single Sample Per Person Face Recognition (MP, YmC, BW, RL), pp. 2251–2254.
- CIKM-2017-ShaikhK #framework #named
- StreamingCube: A Unified Framework for Stream Processing and OLAP Analysis (SAS, HK), pp. 2527–2530.
- CIKM-2017-TayTH #memory management #network #sentiment
- Dyadic Memory Networks for Aspect-based Sentiment Analysis (YT, LAT, SCH), pp. 107–116.
- CIKM-2017-XuM #multimodal #named #network #semantics #sentiment
- MultiSentiNet: A Deep Semantic Network for Multimodal Sentiment Analysis (NX, WM), pp. 2399–2402.
- CIKM-2017-ZhangYEALL #predict #social
- Predicting Startup Crowdfunding Success through Longitudinal Social Engagement Analysis (QZ, TY, ME, SA0, VL, BTL), pp. 1937–1946.
- ECIR-2017-Chehreghani #feature model #problem
- Feature-Oriented Analysis of User Profile Completion Problem (MHC), pp. 304–316.
- ECIR-2017-ChenLLLLH #sentiment
- Cross-Lingual Sentiment Relation Capturing for Cross-Lingual Sentiment Analysis (QC, WL0, YL, XL, CL, YH), pp. 54–67.
- ECIR-2017-GarbaceaK #detection #summary
- A Systematic Analysis of Sentence Update Detection for Temporal Summarization (CG, EK), pp. 424–436.
- ECIR-2017-NarducciBLGS #semantics
- Temporal Semantic Analysis of Conference Proceedings (FN, PB, PL, MdG, GS), pp. 762–765.
- ICML-2017-0001JZ #geometry #problem #rank
- No Spurious Local Minima in Nonconvex Low Rank Problems: A Unified Geometric Analysis (RG0, CJ, YZ), pp. 1233–1242.
- ICML-2017-DembczynskiKKN #classification #consistency #revisited
- Consistency Analysis for Binary Classification Revisited (KD, WK, OK, NN), pp. 961–969.
- ICML-2017-GarberSS #algorithm #component #distributed #probability
- Communication-efficient Algorithms for Distributed Stochastic Principal Component Analysis (DG, OS, NS), pp. 1203–1212.
- ICML-2017-HornakovaLA #graph #multi #optimisation
- Analysis and Optimization of Graph Decompositions by Lifted Multicuts (AH, JHL, BA), pp. 1539–1548.
- ICML-2017-LiZLV #convergence #optimisation
- Convergence Analysis of Proximal Gradient with Momentum for Nonconvex Optimization (QL, YZ, YL, PKV), pp. 2111–2119.
- ICML-2017-Tian #convergence #network
- An Analytical Formula of Population Gradient for two-layered ReLU network and its Applications in Convergence and Critical Point Analysis (YT), pp. 3404–3413.
- KDD-2017-HuangZ #named
- SPOT: Sparse Optimal Transformations for High Dimensional Variable Selection and Exploratory Regression Analysis (QH, MZ), pp. 857–865.
- KDD-2017-LiGZXZ #development #perspective
- Prospecting the Career Development of Talents: A Survival Analysis Perspective (HL, YG, HZ, HX, HZ), pp. 917–925.
- KDD-2017-LiJZXLZZWZWXB #framework #named #platform
- FLAP: An End-to-End Event Log Analysis Platform for System Management (TL0, YJ, CZ, BX0, ZL0, WZ, XZ, WW0, LZ, JW, LX, DB), pp. 1547–1556.
- KDD-2017-LiuFMRSX #effectiveness #internet #process #realtime
- Effective and Real-time In-App Activity Analysis in Encrypted Internet Traffic Streams (JL, YF, JM, YR, LS, HX), pp. 335–344.
- KDD-2017-PaulLTYF #exclamation #named #sentiment #twitter #what
- Compass: Spatio Temporal Sentiment Analysis of US Election What Twitter Says! (DP, FL0, MKT, XY, RF), pp. 1585–1594.
- KDD-2017-ZhouXBWZLXLSG #named
- STAR: A System for Ticket Analysis and Resolution (WZ, WX, RB, QW, CZ, TL0, JX0, ZL0, LS, GYG), pp. 2181–2190.
- ECMFA-2017-AhmadianSRJ #ecosystem #industrial #modelling #privacy
- Model-Based Privacy Analysis in Industrial Ecosystems (ASA, DS, VR, JJ), pp. 215–231.
- ECMFA-2017-Debbi #formal method #modelling #probability
- Modeling and Formal Analysis of Probabilistic Complex Event Processing (CEP) Applications (HD), pp. 248–263.
- ECOOP-2017-Huang0 #dependence #reduction
- Speeding Up Maximal Causality Reduction with Static Dependency Analysis (SH, JH0), p. 22.
- OOPSLA-2017-GrechS #named #points-to
- P/Taint: unified points-to and taint analysis (NG, YS), p. 28.
- OOPSLA-2017-JeongJCO #context-sensitive grammar #data-driven #points-to
- Data-driven context-sensitivity for points-to analysis (SJ, MJ, SDC, HO), p. 28.
- OOPSLA-2017-SpathAB #alias #data flow #named #performance #precise
- IDEal: efficient and precise alias-aware dataflow analysis (JS, KA0, EB), p. 27.
- OOPSLA-2017-WangWC #complexity #functional #invariant #named
- TiML: a functional language for practical complexity analysis with invariants (PW0, DW, AC), p. 26.
- AdaEurope-2017-DiazFKMHAC #bound #manycore #named #probability
- MC2: Multicore and Cache Analysis via Deterministic and Probabilistic Jitter Bounding (ED, MF, LK, EM, CH, JA, FJC), pp. 102–118.
- LOPSTR-2017-AlbertiS #c #generative #specification #tool support
- Context Generation from Formal Specifications for C Analysis Tools (MA, JS), pp. 93–111.
- LOPSTR-2017-Lucas #first-order
- Analysis of Rewriting-Based Systems as First-Order Theories (SL), pp. 180–197.
- LOPSTR-2017-NguyenT #parallel #source code #thread
- CARET Analysis of Multithreaded Programs (HVN, TT), pp. 73–90.
- PLDI-2017-AbdullaACDHRR #constraints #framework #performance #string
- Flatten and conquer: a framework for efficient analysis of string constraints (PAA, MFA, YFC, BPD, LH, AR, PR), pp. 602–617.
- PLDI-2017-BillesMP #black box #collaboration #web
- Systematic black-box analysis of collaborative web applications (MB, AM, MP), pp. 171–184.
- PLDI-2017-DoychevK
- Rigorous analysis of software countermeasures against cache attacks (GD, BK), pp. 406–421.
- PLDI-2017-EizenbergPPMD #named #runtime #source code
- BARRACUDA: binary-level analysis of runtime RAces in CUDA programs (AE, YP, TP, WM, JD), pp. 126–140.
- PLDI-2017-KincaidBBR #composition #revisited
- Compositional recurrence analysis revisited (ZK, JB, AFB, TWR), pp. 248–262.
- PLDI-2017-TanLX #automaton #modelling #performance #points-to #precise
- Efficient and precise points-to analysis: modeling the heap by merging equivalent automata (TT0, YL0, JX), pp. 278–291.
- PLDI-2017-ThiessenL #pointer
- Context transformations for pointer analysis (RT, OL), pp. 263–277.
- POPL-2017-BrutschyD0V #consistency
- Serializability for eventual consistency: criterion, analysis, and applications (LB, DD, PM0, MTV), pp. 458–472.
- POPL-2017-GermaneM #automaton
- A posteriori environment analysis with Pushdown Delta CFA (KG, MM), pp. 19–31.
- POPL-2017-HoffmannDW #automation #bound #ml #towards
- Towards automatic resource bound analysis for OCaml (JH0, AD, SCW), pp. 359–373.
- POPL-2017-ZhangS #data flow #linear #reachability
- Context-sensitive data-dependence analysis via linear conjunctive language reachability (QZ, ZS), pp. 344–358.
- QAPL-2017-KoenigKM #named
- PAWS: A Tool for the Analysis of Weighted Systems (BK, SK, CM), pp. 75–91.
- QAPL-2017-SchuppNA #divide and conquer #hybrid #reachability #set
- Divide and Conquer: Variable Set Separation in Hybrid Systems Reachability Analysis (SS, JN, EÁ), pp. 1–14.
- SAS-2017-BrockschmidtCKK #learning
- Learning Shape Analysis (MB, YC, PK, SK, DT), pp. 66–87.
- SAS-2017-Guernic #towards
- Toward a Sound Analysis of Guarded LTI Loops with Inputs by Abstract Acceleration (CLG), pp. 192–211.
- SAS-2017-HolikMVW #heuristic #summary #thread
- Effect Summaries for Thread-Modular Analysis - Sound Analysis Despite an Unsound Heuristic (LH, RM0, TV, SW), pp. 169–191.
- SAS-2017-LeonFHM #memory management #modelling
- Portability Analysis for Weak Memory Models. PORTHOS: One Tool for all Models (HPdL, FF, KH, RM0), pp. 299–320.
- SAS-2017-TrostanetskiGK #composition #difference #semantics
- Modular Demand-Driven Analysis of Semantic Difference for Program Versions (AT, OG, DK), pp. 405–427.
- SAS-2017-ZhangSX #incremental #probability #source code
- Incremental Analysis for Probabilistic Programs (JZ, YS, JX), pp. 450–472.
- ASE-2017-AhmedBIR #code review #interactive #named #overview #sentiment
- SentiCR: a customized sentiment analysis tool for code review interactions (TA, AB, AI, SR), pp. 106–111.
- ASE-2017-Busari #architecture #modelling #requirements #search-based #towards
- Towards search-based modelling and analysis of requirements and architecture decisions (SAB), pp. 1026–1029.
- ASE-2017-JamshidiSVKPA #configuration management #learning #modelling #performance
- Transfer learning for performance modeling of configurable systems: an exploratory analysis (PJ, NS, MV, CK, AP, YA), pp. 497–508.
- ASE-2017-KimFJJOLC #testing
- Testing intermediate representations for binary analysis (SK0, MF, MJ, SJ, DO, JL, SKC), pp. 353–364.
- ASE-2017-ShiCWLB #comprehension #feature model #fuzzy
- Understanding feature requests by leveraging fuzzy method and linguistic analysis (LS, CC, QW0, SL, BWB), pp. 440–450.
- ASE-2017-WangW #fuzzing #in memory #similarity
- In-memory fuzzing for binary code similarity analysis (SW0, DW), pp. 319–330.
- ESEC-FSE-2017-AhmadianPRJ #modelling #privacy #security
- Model-based privacy and security analysis with CARiSMA (ASA, SP, QR, JJ), pp. 989–993.
- ESEC-FSE-2017-RegisCBPRPAGF #alloy #behaviour #modelling #specification
- DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviour (GR, CC, SGB, MP, FR, PP, NA, JPG, MFF), pp. 969–973.
- ESEC-FSE-2017-XieCZLLL #named #termination
- Loopster: static loop termination analysis (XX, BC0, LZ, SWL, YL0, XL), pp. 84–94.
- ICSE-2017-0006R #android #testing
- Analysis and testing of notifications in Android wear applications (HZ0, AR), pp. 347–357.
- ICSE-2017-BusariL #architecture #lightweight #named #requirements
- RADAR: a lightweight tool for requirements and architecture decision analysis (SAB, EL), pp. 552–562.
- ICSE-2017-JiangLYX #automation #integration #testing #what
- What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing (HJ, XL, ZY, JX), pp. 712–723.
- ICSE-2017-ServantJ #fine-grained #fuzzy
- Fuzzy fine-grained code-history analysis (FS, JAJ), pp. 746–757.
- ICSE-2017-XuCCLS #comprehension #named #security #towards
- SPAIN: security patch analysis for binaries towards understanding the pain and pills (ZX, BC0, MC, YL0, FS), pp. 462–472.
- SLE-2017-SmitsV #data flow #declarative #named #specification
- FlowSpec: declarative dataflow analysis specification (JS, EV), pp. 221–231.
- ASPLOS-2017-AjaySRZX #3d #energy #named #optimisation
- 3DGates: An Instruction-Level Energy Analysis and Optimization of 3D Printers (JA, CS0, ASR, CZ, WX), pp. 419–433.
- ASPLOS-2017-FerraiuoloXZMS #architecture #data flow #hardware #security #verification
- Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis (AF, RX, DZ, ACM, GES), pp. 555–568.
- ASPLOS-2017-McMahanCNRGHS #architecture #composition
- An Architecture Supporting Formal and Compositional Binary Analysis (JM, MC, LN, JR, SYG, BH, TS), pp. 177–191.
- ASPLOS-2017-NalliHHSVK #memory management #persistent
- An Analysis of Persistent Memory Use with WHISPER (SN, SH, MDH, MMS, HV0, KK), pp. 135–148.
- ASPLOS-2017-WangHZXS #graph #interprocedural #named #scalability
- Graspan: A Single-machine Disk-based Graph System for Interprocedural Static Analyses of Large-scale Systems Code (KW0, AH0, ZZ0, G(X, AAS), pp. 389–404.
- CASE-2017-AziziKBK #geometry #reachability
- Geometric reachability analysis for grasp planning in cluttered scenes for varying end-effectors (VA0, AK, KEB, MK), pp. 764–769.
- CASE-2017-ChenGL #identification #markov #online #performance
- Load identification based on Factorial Hidden Markov Model and online performance analysis (SC, FG, TL0), pp. 1249–1253.
- CASE-2017-KangMPJ #modelling #multi
- Multi-fidelity modeling for analysis of serial production lines (YK, LM, GP, FJ), pp. 30–35.
- CASE-2017-LeeJFBGBL #modelling #process #simulation #using
- Modeling and analysis of postoperative intervention process for total joint replacement patients using simulations (HKL, RJ, YF, PAB, JG, CB, JL), pp. 568–573.
- CASE-2017-LiLHTCLW #using
- The mechanism analysis of bipolar vessel sealing in vitro using EDM model (LL, LL, ZH, MT, RC, HL, JW), pp. 813–818.
- CASE-2017-LiuH #convergence #protocol
- The convergence analysis of bat-inspired consensus protocols with nonlinear dynamics (QL, QH), pp. 1560–1565.
- CASE-2017-LiuH17a #cyber-physical #hybrid #theorem
- Hybrid stability analysis via extended small-gain theorem for networked cyber-physical systems with transmission delay (QL, QH), pp. 1598–1603.
- CASE-2017-LiuMR #cyber-physical #security
- Security analysis of continuous-time cyber-physical system against sensor attacks (XL, YM, XR), pp. 1586–1591.
- CASE-2017-LiuWQWZ #fault #geometry
- A geometric errors analysis method integrated clamping error and wear out error over working space (XL, CW, LQ, YW, SZ), pp. 656–661.
- CASE-2017-LiuZ17a #monitoring #robust
- Intelligent robust milling tool wear monitoring via fractal analysis of cutting force (TL, KZ), pp. 1254–1259.
- CASE-2017-LiXZ #complexity #learning
- Complexity analysis of reinforcement learning and its application to robotics (BL, LX, QZ), pp. 1425–1426.
- CASE-2017-SaezMBT #cyber-physical #detection
- Anomaly detection and productivity analysis for cyber-physical systems in manufacturing (MS, FPM, KB, DMT), pp. 23–29.
- CASE-2017-YangZL #reliability
- Reliability analysis based on weibull distribution model for spreaders (SY, YZ, LL), pp. 531–535.
- CASE-2017-YanZ #performance
- Efficiency analysis of series machines under operation-dependent-failures (CBY, QZ), pp. 476–481.
- CASE-2017-ZhangWLL #string
- Analysis string stability of a new car-following model considering response time (JZ0, YW, GL, WL), pp. 853–857.
- CASE-2017-ZhaoLHD #flexibility #performance #problem
- Optimal planning of plant flexibility: Problem formulation and performance analysis (CZ, JL, NH, GAD), p. 986.
- CASE-2017-ZhongPPJ #case study #health #modelling #process
- Modeling and analysis of primary care to specialty care referral process: A case study at the university of florida health Jacksonville (XZ, AMP, LP, RJ), pp. 819–824.
- CASE-2017-ZhuangCG #parametricity
- Parameters analysis of hierarchical evolutionary method with an application of HVAC system (LZ, XC0, XG), pp. 858–863.
- CASE-2017-ZouZ #detection
- Occupancy detection in elevator car by fusing analysis of dual videos (JZ, QZ), pp. 906–911.
- CC-2017-FedericoPA #bound #framework
- rev.ng: a unified binary analysis framework to recover CFGs and function boundaries (ADF, MP, GA), pp. 131–141.
- CGO-2017-JohnsonFBOJA #collaboration #dependence #framework
- A collaborative dependence analysis framework (NPJ, JF, SRB, TO, TBJ, DIA), pp. 148–159.
- ESOP-2017-DArgenioBBFH #formal method #source code
- Is Your Software on Dope? - Formal Analysis of Surreptitiously “enhanced” Programs (PRD, GB, SB, BF, HH), pp. 83–110.
- ESOP-2017-TangWXZW0 #library #performance #reachability #summary
- Conditional Dyck-CFL Reachability Analysis for Complete and Efficient Library Summarization (HT, DW, YX, LZ, XW, LZ0), pp. 880–908.
- FASE-2017-Henda0LNSS #named #security
- OpenSAW: Open Security Analysis Workbench (NBH, BJ0, PL, KN, PS, OS), pp. 321–337.
- FASE-2017-PhamKRR #testing
- Bucketing Failing Tests via Symbolic Analysis (VTP, SK, SR, AR), pp. 43–59.
- CAV-2017-ChatterjeeFM #automation #bound
- Automated Recurrence Analysis for Almost-Linear Expected-Runtime Bounds (KC, HF0, AM), pp. 118–139.
- CAV-2017-SiZGN #satisfiability
- Maximum Satisfiability in Software Analysis: Applications and Techniques (XS, XZ, RG, MN), pp. 68–94.
- CAV-2017-Carbonneaux0RS #automation #coq #proving
- Automated Resource Analysis with Coq Proof Objects (QC, JH0, TWR, ZS), pp. 64–85.
- CAV-2017-ChatterjeeFG #recursion #source code #worst-case
- Non-polynomial Worst-Case Analysis of Recursive Programs (KC, HF0, AKG), pp. 41–63.
- CAV-2017-DanS0JV
- Finding Fix Locations for CFL-Reachability Analyses via Minimum Cuts (AMD, MS, SC0, JBJ, MTV), pp. 521–541.
- CAV-2017-TouzeauMMR #nondeterminism #performance
- Ascertaining Uncertainty for Efficient Exact Cache Analysis (VT, CM, DM, JR), pp. 22–40.
- ICST-2017-ChanWSPS #concurrent #fault #invariant #multi #named #source code #thread #using
- IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants (AC, SW0, HS, KP, NS), pp. 184–195.
- ICST-2017-HollandSK #benchmark #metric #state of the art
- Transferring State-of-the-Art Immutability Analyses: Experimentation Toolbox and Accuracy Benchmark (BH, GRS, SK), pp. 484–491.
- ICST-2017-LuckowKP #complexity #using
- Symbolic Complexity Analysis Using Context-Preserving Histories (KSL, RK, CSP), pp. 58–68.
- TAP-2017-BaranyS #c #data flow #hybrid
- Hybrid Information Flow Analysis for Real-World C Code (GB, JS), pp. 23–40.
- TAP-2017-DamianiHL #abstraction #product line #refinement
- Abstraction Refinement for the Analysis of Software Product Lines (FD, RH, ML), pp. 3–20.
- VMCAI-2017-GuW #float #source code #using
- Stabilizing Floating-Point Programs Using Provenance Analysis (YG, TW), pp. 228–245.
- VMCAI-2017-Seladji #component
- Finding Relevant Templates via the Principal Component Analysis (YS), pp. 483–499.
- ECSA-2016-AbukwaikAR #api #automation #concept #constraints #documentation #identification #towards
- Towards Seamless Analysis of Software Interoperability: Automatic Identification of Conceptual Constraints in API Documentation (HA, MA, HDR), pp. 67–83.
- ECSA-2016-KaptoEKT #approach #architecture #detection #evolution #source code
- Inferring Architectural Evolution from Source Code Analysis - A Tool-Supported Approach for the Detection of Architectural Tactics (CK, GEB, SK, CT), pp. 149–165.
- ECSA-2016-SchmerlGSBMCG #android #architecture #modelling #security
- Architecture Modeling and Analysis of Security in Android Systems (BRS, JG, AS, HB, SM, JC, DG), pp. 274–290.
- QoSA-2016-StierK #adaptation #modelling #performance #self
- Considering Transient Effects of Self-Adaptations in Model-Driven Performance Analyses (CS, AK), pp. 80–89.
- WICSA-2016-FengKCMX #approach #architecture #security #towards
- Towards an Architecture-Centric Approach to Security Analysis (QF, RK, YC, RM, LX0), pp. 221–230.
- WICSA-2016-GerlitzK16a #architecture #matlab #modelling
- Architectural Analysis of MATLAB/Simulink Models with Artshop (TG, SK), pp. 307–310.
- WICSA-2016-Hofig #architecture #component #dependence #summary #tutorial
- Tutorial Summary for Dependability Analysis in the Context of Component-Based System Architectures (KH), p. 255.
- WICSA-2016-MubeenN #abstraction #component #distributed #embedded #on the
- On Timing Analysis of Component-Based Vehicular Distributed Embedded Systems at Various Abstraction Levels (SM, TN), pp. 277–278.
- WICSA-2016-Seifermann #architecture #data flow
- Architectural Data Flow Analysis (SS), pp. 270–271.
- WICSA-2016-TaspolatogluH #architecture #security
- Context-Based Architectural Security Analysis (ET, RH), pp. 281–282.
- JCDL-2016-FuF #community #music #social
- Music Information Seeking via Social Q&A: An Analysis of Questions in Music StackExchange Community (HF, YF), pp. 139–142.
- CSEET-2016-KungL #design #object-oriented
- An Object-Oriented Analysis and Design Environment (DK, JL), pp. 91–100.
- CSEET-2016-PriesterSS #development #invariant
- Tool-Assisted Loop Invariant Development and Analysis (CP, YSS, MS), pp. 66–70.
- EDM-2016-AllenJDRKLM #process
- {ENTER}ing the Time Series {SPACE}: Uncovering the Writing Process through Keystroke Analyses (LKA, MEJ, MD, RDR, KK, ADL, DSM), pp. 22–29.
- EDM-2016-BaikadiELS #what
- Redefining “What” in Analyses of Who Does What in MOOCs (AB, CDE, YL, CS), pp. 569–570.
- EDM-2016-Bydzovska #comparative #performance #predict #student
- A Comparative Analysis of Techniques for Predicting Student Performance (HB), pp. 306–311.
- EDM-2016-DaiAY #learning #recommendation #towards
- Course Content Analysis: An Initiative Step toward Learning Object Recommendation Systems for MOOC Learners (YD, YA, MY), pp. 347–352.
- EDM-2016-HaoLDKK #collaboration #data mining #mining #problem #statistics
- Collaborative Problem Solving Skills versus Collaboration Outcomes: Findings from Statistical Analysis and Data Mining (JH, LL, AvD, PCK, CK), pp. 382–387.
- EDM-2016-KoedingerM
- Closing the Loop with Quantitative Cognitive Task Analysis (KRK, EAM), pp. 412–417.
- EDM-2016-LeeRBY #approach #clustering #heatmap #interactive #learning #visualisation
- Hierarchical Cluster Analysis Heatmaps and Pattern Analysis: An Approach for Visualizing Learning Management System Interaction Data (JEL, MR, AB, MY), pp. 603–604.
- EDM-2016-LiuBLBBBM #behaviour
- MOOC Learner Behaviors by Country and Culture; an Exploratory Analysis (ZL, RB, CL, TB, RSB, YB, DSM), pp. 127–134.
- EDM-2016-MlynarskaCG #process
- Time Series Analysis of VLE Activity Data (EM, PC, DG), pp. 613–614.
- EDM-2016-Sande16a #component #learning #problem
- Learning curves versus problem difficulty: an analysis of the Knowledge Component picture for a given context (BvdS), pp. 646–647.
- ICPC-2016-KhatiwadaKM #named
- STAC: A tool for Static Textual Analysis of Code (SK, MK, AM), pp. 1–3.
- ICPC-2016-ZhangT0 #android #dependence
- Android build dependency analysis (BZ0, VLT, MB0), pp. 1–4.
- ICSME-2016-HallW
- Data and Analysis Code for GP EFSM Inference (MH, NW), p. 611.
- ICSME-2016-KirchmayrMNPT #comprehension #integration #legacy #source code
- Integration of Static and Dynamic Code Analysis for Understanding Legacy Source Code (WK, MM, LN, JP, RT), pp. 543–552.
- MSR-2016-BlazB #sentiment
- Sentiment analysis in tickets for IT support (CCAB, KB), pp. 235–246.
- MSR-2016-NakshatriHT #empirical #exception #java
- Analysis of exception handling patterns in Java projects: an empirical study (SN, MH, ST), pp. 500–503.
- MSR-2016-YangHL #query #stack overflow
- From query to usable code: an analysis of stack overflow code snippets (DY, AH0, CVL), pp. 391–402.
- SANER-2016-BritoHVR #api #developer #java #scalability
- Do Developers Deprecate APIs with Replacement Messages? A Large-Scale Analysis on Java Systems (GB, ACH, MTV, RR), pp. 360–369.
- SANER-2016-DavidBTMFPM #execution #named #symbolic computation #tool support
- BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis (RD, SB, TDT, LM, JF, MLP, JYM), pp. 653–656.
- SANER-2016-DecanMCG #dependence #git #problem
- When GitHub Meets CRAN: An Analysis of Inter-Repository Package Dependency Problems (AD, TM, MC, PG), pp. 493–504.
- SANER-2016-ZhengRSLSJBCQB #hybrid #named #using
- AutoBench: Finding Workloads That You Need Using Pluggable Hybrid Analyses (YZ, AR, LS, YL0, HS, OJ, LB, LYC, ZQ, WB), pp. 639–643.
- FM-2016-AntoninoGR #reachability
- Tighter Reachability Criteria for Deadlock-Freedom Analysis (PRGA, TGR, AWR), pp. 43–59.
- FM-2016-BeckerCGHHKNSTT #formal method #modelling #proving #testing
- Combining Mechanized Proofs and Model-Based Testing in the Formal Analysis of a Hypervisor (HB, JMC, JG, UH, YH, CK, KN0, JLS, HT, TT), pp. 69–84.
- FM-2016-BenesBDPS #approach #model checking
- A Model Checking Approach to Discrete Bifurcation Analysis (NB, LB, MD, SP, DS), pp. 85–101.
- FM-2016-DimovskiBW #abstraction #variability
- Finding Suitable Variability Abstractions for Family-Based Analysis (ASD, CB, AW), pp. 217–234.
- FM-2016-StoenescuSPI #execution #framework #named #symbolic computation #using
- RIVER: A Binary Analysis Framework Using Symbolic Execution and Reversible x86 Instructions (TS, AS, SP, FI), pp. 779–785.
- FSCD-2016-Nipkow #data type #functional
- Verified Analysis of Functional Data Structures (TN), p. 2.
- IFM-2016-AndreiCCMR #formal method #probability
- Probabilistic Formal Analysis of App Usage to Inform Redesign (OA, MC, MC, AM, MR), pp. 115–129.
- IFM-2016-AntoninoGR #performance #satisfiability #using
- Efficient Deadlock-Freedom Checking Using Local Analysis and SAT Solving (PA, TGR, AWR), pp. 345–360.
- IFM-2016-BendispostoKLMP #reachability
- Symbolic Reachability Analysis of B Through ProB and LTSmin (JB, PK, ML, JM, JvdP, HT, JW), pp. 275–291.
- SEFM-2016-Agha #abstraction #concurrent #modelling #problem #semantics #tool support
- Abstractions, Semantic Models and Analysis Tools for Concurrent Systems: Progress and Open Problems - (Extended Abstract) (GA), pp. 3–8.
- SEFM-2016-BendikBBC #bound #order #requirements #safety #set
- Finding Boundary Elements in Ordered Sets with Application to Safety and Requirements Analysis (JB, NB, JB, IC), pp. 121–136.
- SEFM-2016-Cerone #framework #interactive #logic
- A Cognitive Framework Based on Rewriting Logic for the Analysis of Interactive Systems (AC), pp. 287–303.
- SEFM-2016-DernehlHK #abstract interpretation #diagrams #execution #symbolic computation
- Combining Abstract Interpretation with Symbolic Execution for a Static Value Range Analysis of Block Diagrams (CD, NH, SK), pp. 137–152.
- ICFP-2016-Gilray0M #control flow
- Allocation characterizes polyvariance: a unified methodology for polyvariant control-flow analysis (TG, MDA0, MM), pp. 407–420.
- AIIDE-2016-SinghV #2d
- Staying Hidden: An Analysis of Hiding Strategies in a 2D Level with Occlusions (NS, CV), pp. 72–78.
- CHI-PLAY-2016-HornHBFSH #black box #education #game studies
- Opening the Black Box of Play: Strategy Analysis of an Educational Game (BH, AKH, JB, YF, GS, CH), pp. 142–153.
- CHI-PLAY-2016-WallnerK #case study #game studies #user study #visualisation
- Visualizations for Retrospective Analysis of Battles in Team-based Combat Games: A User Study (GW, SK), pp. 22–32.
- CIG-2016-AllartLPGN #design
- Design influence on player retention: A method based on time varying survival analysis (TA, GL, MP, AG, SN), pp. 1–8.
- CIG-2016-DrachenGGHLSK #behaviour #clustering #comparative #profiling
- Guns and guardians: Comparative cluster analysis and behavioral profiling in destiny (AD, JG, CG, EH, PL, RS, DK), pp. 1–8.
- DiGRA-FDG-2016-IsaksenN #statistics
- A Statistical Analysis of Player Improvement and Single-Player High Scores (AI, AN).
- DiGRA-FDG-2016-Willumsen #formal method #source code
- Source Code and Formal Analysis: A Hermeneutic Reading of Passage (ECW).
- VS-Games-2016-GodinhoE #game studies
- Open Device Lab: An Analysis of Available Devices in the Gaming Market (RPG, RSCE), pp. 1–4.
- VS-Games-2016-PatinoRP #game studies #learning
- Analysis of Game and Learning Mechanics According to the Learning Theories (AP, MR, JNP), pp. 1–4.
- CIKM-2016-AmeriFCR #framework #predict #student
- Survival Analysis based Framework for Early Prediction of Student Dropouts (SA, MJF, RBC, CKR), pp. 903–912.
- CIKM-2016-CheemaKALWCR #health #monitoring #on the #using
- On Structural Health Monitoring Using Tensor Analysis and Support Vector Machine with Artificial Negative Data (PC, NLDK, MMA, WL0, YW0, FC0, PR), pp. 1813–1822.
- CIKM-2016-FanWL #metric #mobile #network #on the #optimisation
- On Backup Battery Data in Base Stations of Mobile Networks: Measurement, Analysis, and Optimization (XF, FW0, JL), pp. 1513–1522.
- CIKM-2016-GuoS #behaviour #mobile #scalability #towards
- Large-Scale Analysis of Viewing Behavior: Towards Measuring Satisfaction with Mobile Proactive Systems (QG, YS), pp. 579–588.
- CIKM-2016-KraviGMCMPT #multi #query
- One Query, Many Clicks: Analysis of Queries with Multiple Clicks by the Same User (EK, IG, AM, DC, YM, DP, GT), pp. 1423–1432.
- CIKM-2016-LiuLWT #information management #named #visualisation
- FIN10K: A Web-based Information System for Financial Report Analysis and Visualization (YWL, LCL, CJW, MFT), pp. 2441–2444.
- CIKM-2016-LiZZWZWXHWZLCR #delivery #framework #named #performance #platform
- DI-DAP: An Efficient Disaster Information Delivery and Analysis Platform in Disaster Management (TL0, WZ, CZ, QW, QZ, DW0, JX0, YH, WW0, MZ, SL, SCC, NR), pp. 1593–1602.
- CIKM-2016-MaxwellA #behaviour #performance
- Agents, Simulated Users and Humans: An Analysis of Performance and Behaviour (DM, LA), pp. 731–740.
- CIKM-2016-YuSHCH #data-driven #multi #quantifier #sentiment
- Data-Driven Contextual Valence Shifter Quantification for Multi-Theme Sentiment Analysis (HY, JS, MH, MC, JH0), pp. 939–948.
- ECIR-2016-FlaesRW #multi #sentiment #what
- What Multimedia Sentiment Analysis Says About City Liveability (JBF, SR, MW), pp. 824–829.
- ECIR-2016-FoleyA
- Retrieving Hierarchical Syllabus Items for Exam Question Analysis (JF, JA), pp. 575–586.
- ECIR-2016-LiWPA #empirical #learning #sentiment
- An Empirical Study of Skip-Gram Features and Regularization for Learning on Sentiment Analysis (CL, BW, VP, JAA), pp. 72–87.
- ECIR-2016-ShariffSZ #correlation #twitter
- Correlation Analysis of Reader's Demographics and Tweet Credibility Perception (SMS, MS, XZ), pp. 453–465.
- ECIR-2016-WakelingC #library #online #transaction
- Determining the Optimal Session Interval for Transaction Log Analysis of an Online Library Catalogue (SW, PDC), pp. 703–708.
- ICML-2016-AchimSE #constraints #fourier
- Beyond Parity Constraints: Fourier Analysis of Hash Functions for Inference (TA, AS, SE), pp. 2254–2262.
- ICML-2016-ChiangHD #component #robust
- Robust Principal Component Analysis with Side Information (KYC, CJH, ISD), pp. 2291–2299.
- ICML-2016-ElhoseinyEBE #categorisation #comparative #estimation #modelling #multi
- A Comparative Analysis and Study of Multiview CNN Models for Joint Object Categorization and Pose Estimation (ME, TEG, AB, AME), pp. 888–897.
- ICML-2016-FrostigMMS #component
- Principal Component Projection Without Principal Component Analysis (RF, CM, CM, AS), pp. 2349–2357.
- ICML-2016-GeJKNS #algorithm #canonical #correlation #performance #scalability
- Efficient Algorithms for Large-scale Generalized Eigenvector Computation and Canonical Correlation Analysis (RG0, CJ, SMK, PN, AS), pp. 2741–2750.
- ICML-2016-GeZ #component
- Rich Component Analysis (RG0, JZ), pp. 1502–1510.
- ICML-2016-KhandelwalLNS #monte carlo #on the
- On the Analysis of Complex Backup Strategies in Monte Carlo Tree Search (PK, EL, SN, PS), pp. 1319–1328.
- ICML-2016-MandtHB #algorithm #probability
- A Variational Analysis of Stochastic Gradient Algorithms (SM, MDH, DMB), pp. 354–363.
- ICML-2016-MichaeliWL #canonical #correlation #parametricity
- Nonparametric Canonical Correlation Analysis (TM, WW, KL), pp. 1967–1976.
- ICML-2016-QuXO #algorithm #optimisation #performance #probability
- Fast Rate Analysis of Some Stochastic Optimization Algorithms (CQ, HX, CJO), pp. 662–670.
- ICML-2016-WangMCBPRGUA #matrix #network
- Analysis of Deep Neural Networks with Extended Data Jacobian Matrix (SW, ArM, RC, JAB, MP, MR, KG, GU, ÖA), pp. 718–726.
- ICML-2016-Wipf #estimation #rank
- Analysis of Variational Bayesian Factorizations for Sparse and Low-Rank Estimation (DPW), pp. 926–935.
- ICML-2016-XieGF #clustering
- Unsupervised Deep Embedding for Clustering Analysis (JX, RBG, AF), pp. 478–487.
- ICPR-2016-AugereauFK #automation #estimation #towards
- Towards an automated estimation of English skill via TOEIC score based on reading analysis (OA, HF, KK), pp. 1285–1290.
- ICPR-2016-BillingsAB #detection #image
- Ultrasound image analysis for myopathy detection (SB, JA, PB), pp. 1461–1465.
- ICPR-2016-Brandtberg #classification #fourier #fuzzy #multi #order #rank #using
- Virtual hexagonal and multi-scale operator for fuzzy rank order texture classification using one-dimensional generalised Fourier analysis (TB), pp. 2018–2024.
- ICPR-2016-CardosoMA #performance #problem
- Plücker correction problem: Analysis and improvements in efficiency (JRC, PM, HA), pp. 2795–2800.
- ICPR-2016-CorbelliBGC #classification #documentation #layout
- Historical document digitization through layout analysis and deep content classification (AC, LB, CG, RC), pp. 4077–4082.
- ICPR-2016-CoteA #documentation #evaluation #image #statistics
- Layered ground truth: Conveying structural and statistical information for document image analysis and evaluation (MC, ABA), pp. 3258–3263.
- ICPR-2016-DesrosiersDD #generative #novel #statistics
- Novel generative model for facial expressions based on statistical shape analysis of landmarks trajectories (PAD, MD, MD), pp. 961–966.
- ICPR-2016-DevanneWDBBP #learning
- Learning shape variations of motion trajectories for gait analysis (MD, HW, MD, SB, ADB, PP), pp. 895–900.
- ICPR-2016-EscalanteP0RCCE #challenge #contest #multi #overview #perspective #visual notation
- ChaLearn Joint Contest on Multimedia Challenges Beyond Visual Analysis: An overview (HJE, VPL, JW0, MAR, BC, AC, SE, IG, XB, PH, HM, MAL), pp. 67–73.
- ICPR-2016-HanSG #image
- A hyperspectral image restoration method based on analysis sparse filter (CH, NS, CG), pp. 769–774.
- ICPR-2016-JermanPLSC #automation #identification
- Automatic cutting plane identification for computer-aided analysis of intracranial aneurysms (TJ, FP, BL, ZS, AC), pp. 1484–1489.
- ICPR-2016-KatsageorgiouZH #behaviour #data-driven #interactive
- Unsupervised mouse behavior analysis: A data-driven study of mice interactions (VMK, MZ, HH, VF0, FP, DS, VM), pp. 925–930.
- ICPR-2016-LovellPSVW #contest #image #pattern matching #pattern recognition #recognition
- International Contest on Pattern Recognition techniques for indirect immunofluorescence images analysis (BCL, GP, AS, MV, AW), pp. 74–76.
- ICPR-2016-LuoLQ #bound #optimisation #probability
- Bound analysis of natural gradient descent in stochastic optimization setting (ZL, DL, YQ), pp. 4166–4171.
- ICPR-2016-MinciulloC #automation #detection
- Fully automated shape analysis for detection of Osteoarthritis from lateral knee radiographs (LM, TFC), pp. 3787–3791.
- ICPR-2016-MinematsuST #bidirectional
- Background initialization based on bidirectional analysis and consensus voting (TM, AS, RiT), pp. 126–131.
- ICPR-2016-MoralesROOOI #estimation #video
- Outdoor omnidirectional video completion via depth estimation by motion analysis (CM, MR, YO, SO, TO, KI), pp. 3945–3950.
- ICPR-2016-NgoSMXC
- Quantitative analysis of facial paralysis based on limited-orientation modified circular Gabor filters (THN, MS, NM, WX0, YWC), pp. 349–354.
- ICPR-2016-OsmanliogluOHS #approximate #performance #problem
- Efficient approximation of labeling problems with applications to immune repertoire analysis (YO, SO, UH, AS), pp. 2410–2415.
- ICPR-2016-RotaSCP #education #forensics #image #learning #question #student
- Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis? (PR, ES, VC, CP), pp. 2503–2508.
- ICPR-2016-SaikiaSSKG #kernel #learning #multi #using
- Multiple kernel learning using data envelopment analysis and feature vector selection and projection (GS, SS, VVS, RDK, PG), pp. 520–524.
- ICPR-2016-SukS #detection #retrieval
- Solar flare retrieval, detection and analysis (TS, SS), pp. 1183–1188.
- ICPR-2016-SuzuuchiK #behaviour #multi
- Location-associated indoor behavior analysis of multiple persons (SS, MK), pp. 2079–2084.
- ICPR-2016-Troya-GalvisGB #classification #collaboration #image #segmentation
- Collaborative segmentation and classification for remote sensing image analysis (ATG, PG, LBÉ), pp. 829–834.
- ICPR-2016-WangWH #network #using
- Network entropy analysis using the Maxwell-Boltzmann partition function (JW, RCW0, ERH), pp. 1321–1326.
- ICPR-2016-ZamzamiPGKAS #approach #automation #multimodal
- An approach for automated multimodal analysis of infants' pain (GZ, CYP, DBG, RK, TA, YS0), pp. 4148–4153.
- ICPR-2016-ZhangHMCP #3d #detection #image
- Face spoofing detection based on 3D lighting environment analysis of image pair (XZ, XH, MM, CC0, SP), pp. 2995–3000.
- KDD-2016-BalcanLSW0 #communication #component #distributed #kernel #performance
- Communication Efficient Distributed Kernel Principal Component Analysis (MFB, YL, LS, DPW, BX0), pp. 725–734.
- KDD-2016-ChengZCJCW #correlation #ranking
- Ranking Causal Anomalies via Temporal and Dynamical Analysis on Vanishing Correlations (WC, KZ0, HC, GJ, ZC, WW0), pp. 805–814.
- KDD-2016-KangLSB #component
- Subjectively Interesting Component Analysis: Data Projections that Contrast with Prior Expectations (BK, JL, RSR, TDB), pp. 1615–1624.
- KDD-2016-LiWYR #learning #multi
- A Multi-Task Learning Formulation for Survival Analysis (YL, JW0, JY, CKR), pp. 1715–1724.
- KDD-2016-WangCF0E #modelling #topic
- Targeted Topic Modeling for Focused Analysis (SW, ZC0, GF, BL0, SE), pp. 1235–1244.
- KDD-2016-XuZZLZCX #behaviour #network #perspective #social
- Taxi Driving Behavior Analysis in Latent Vehicle-to-Vehicle Networks: A Social Influence Perspective (TX, HZ, XZ, QL0, HZ, EC, HX), pp. 1285–1294.
- KDD-2016-ZhuZXDX #modelling
- Recruitment Market Trend Analysis with Sequential Latent Variable Models (CZ, HZ, HX, PD, FX), pp. 383–392.
- SKY-2016-ExmanK #concept #named
- Modulaser: A Tool for Conceptual Analysis of Software Systems (IE, PK), pp. 19–26.
- ECMFA-2016-BaburCB #clustering #comparative #metamodelling #visualisation
- Hierarchical Clustering of Metamodels for Comparative Analysis and Visualization (ÖB, LC, MvdB), pp. 3–18.
- MoDELS-2016-DeVriesC #automation #detection #requirements
- Automatic detection of incomplete requirements via symbolic analysis (BD, BHCC), pp. 385–395.
- MoDELS-2016-KahaniBDC #eclipse #modelling #problem #tool support #topic
- The problems with eclipse modeling tools: a topic analysis of eclipse forums (NK, MB, JD, JRC), pp. 227–237.
- MoDELS-2016-ZhangYAL #case study #mutation testing #towards
- Towards mutation analysis for use cases (HZ, TY, SA, CL), pp. 363–373.
- ECOOP-2016-Chevalier-Boisvert #interprocedural #javascript #source code
- Interprocedural Type Specialization of JavaScript Programs Without Type Analysis (MCB, MF), p. 24.
- ECOOP-2016-SpathDAB #java #named #pointer
- Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (JS, LNQD, KA0, EB), p. 26.
- OOPSLA-2016-DanLHV #memory management #modelling #programming
- Modeling and analysis of remote memory access programming (AMD, PL0, TH, MTV), pp. 129–144.
- OOPSLA-2016-KulkarniMZN
- Accelerating program analyses by cross-program training (SK, RM, XZ, MN), pp. 359–377.
- AdaEurope-2016-MohaqeqiAY #data flow #graph #modelling #realtime #using
- Modeling and Analysis of Data Flow Graphs Using the Digraph Real-Time Task Model (MM, JA, WY0), pp. 15–29.
- LOPSTR-2016-FangS #abstraction #memory management
- Hierarchical Shape Abstraction for Analysis of Free List Memory Allocators (BF0, MS), pp. 151–167.
- PEPM-2016-AntwerpenNTVW #constraints #graph #semantics
- A constraint language for static semantic analysis based on scope graphs (HvA, PN, APT, EV, GW), pp. 49–60.
- PEPM-2016-Asai #towards
- Toward introducing binding-time analysis to MetaOCaml (KA), pp. 97–102.
- PLDI-2016-El-HassanyMBVV #concurrent #named #network
- SDNRacer: concurrency analysis for software-defined networks (AEH, JM, PB, LV, MTV), pp. 402–415.
- POPL-2016-ChatterjeeFNH #algorithm #probability #problem #source code #termination
- Algorithmic analysis of qualitative and quantitative termination problems for affine probabilistic programs (KC, HF0, PN0, RH), pp. 327–342.
- POPL-2016-GilrayL0MH #automaton #control flow #for free
- Pushdown control-flow analysis for free (TG, SL, MDA0, MM, DVH), pp. 691–704.
- PPDP-2016-BertolissiTV #data access #policy
- Analysis of access control policy updates through narrowing (CB, JMT, DV), pp. 62–75.
- PPDP-2016-MidtgaardNN #process #regular expression
- Iterated process analysis over lattice-valued regular expressions (JM, FN, HRN), pp. 132–145.
- SAS-2016-BalatsourasS #c #c++ #points-to
- Structure-Sensitive Points-To Analysis for C and C++ (GB, YS), pp. 84–104.
- SAS-2016-FrielinghausSV #interprocedural #termination
- Enforcing Termination of Interprocedural Analysis (SSF, HS, RV), pp. 447–468.
- SAS-2016-GharatKM #graph #points-to #using
- Flow- and Context-Sensitive Points-To Analysis Using Generalized Points-To Graphs (PMG, UPK, AM), pp. 212–236.
- SAS-2016-TanLX #pointer #precise
- Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting (TT0, YL0, JX), pp. 489–510.
- ASE-2016-Babur #modelling #scalability #set #statistics
- Statistical analysis of large sets of models (ÖB), pp. 888–891.
- ASE-2016-KroeningPSW #concurrent #thread
- Sound static deadlock analysis for C/Pthreads (DK, DP, PS, BW), pp. 379–390.
- ASE-2016-MingWWXL #named
- StraightTaint: decoupled offline symbolic taint analysis (JM, DW, JW, GX, PL), pp. 308–319.
- ASE-2016-OgnawalaOPL #composition #execution #low level #named #symbolic computation
- MACKE: compositional analysis of low-level vulnerabilities with symbolic execution (SO, MO, AP, TL), pp. 780–785.
- ASE-2016-RazaF #automation #development #named #performance #recommendation
- ProcessPAIR: a tool for automated performance analysis and improvement recommendation in software development (MR, JPF), pp. 798–803.
- ASE-2016-SzaboAVE #data flow #framework
- An extensible framework for variable-precision data-flow analyses in MPS (TS, SA, MV, SE), pp. 870–875.
- ASE-2016-SzaboEV #domain-specific language #incremental #named
- IncA: a DSL for the definition of incremental program analyses (TS, SE, MV), pp. 320–331.
- FSE-2016-BagheriM #alloy #evolution #named #performance #specification
- Titanium: efficient analysis of evolving alloy specifications (HB, SM), pp. 27–38.
- FSE-2016-BangAPPB #string
- String analysis for side channels with segmented oracles (LB, AA, QSP, CSP, TB), pp. 193–204.
- FSE-2016-Cheng #fault #integer #named
- RABIEF: range analysis based integer error fixing (XC), pp. 1094–1096.
- FSE-2016-HuangZT #correlation #detection
- Detecting sensitive data disclosure via bi-directional text correlation analysis (JH0, XZ0, LT0), pp. 169–180.
- FSE-2016-KangMJ #multi #security
- Multi-representational security analysis (EK, AM, DJ0), pp. 181–192.
- FSE-2016-MacedoBCCK #lightweight #specification
- Lightweight specification and analysis of dynamic systems with rich configurations (NM, JB, DC, AC, DK), pp. 373–383.
- FSE-2016-SuiX #on-demand #refinement
- On-demand strong update analysis via value-flow refinement (YS, JX), pp. 460–473.
- FSE-2016-SungKS0 #dependence #testing #web
- Static DOM event dependency analysis for testing web applications (CS, MK, NS0, CW0), pp. 447–459.
- FSE-2016-Xiaofei
- Static loop analysis and its applications (XX), pp. 1130–1132.
- FSE-2016-XieCLLL #dependence #named #summary
- Proteus: computing disjunctive loop summary via path dependency analysis (XX, BC0, YL0, WL, XL), pp. 61–72.
- FSE-2016-Xu0ZX #debugging #detection #predict #python
- Python predictive analysis for bug detection (ZX, PL0, XZ0, BX), pp. 121–132.
- FSE-2016-ZalmanoviciRT #clustering #functional #testing
- Cluster-based test suite functional analysis (MZ, OR, RTB), pp. 962–967.
- FSE-2016-ZhouW #api #detection #web
- API deprecation: a retrospective analysis and detection method for code examples on the web (JZ, RJW), pp. 266–277.
- ICSE-2016-BusanyM #behaviour #statistics
- Behavioral log analysis with statistical guarantees (NB, SM), pp. 877–887.
- ICSE-2016-DevroeyPPLSH #modelling #mutation testing
- Featured model-based mutation analysis (XD, GP, MP, AL, PYS, PH), pp. 655–666.
- ICSE-2016-Huang #concurrent #scalability #thread
- Scalable thread sharing analysis (JH0), pp. 1097–1108.
- ICSE-2016-LongR #generative #validation
- An analysis of the search spaces for generate and validate patch generation systems (FL, MCR), pp. 702–713.
- ICSE-2016-MechtaevYR #multi #named #scalability #synthesis
- Angelix: scalable multiline program patch synthesis via symbolic analysis (SM, JY, AR), pp. 691–701.
- ICSE-2016-Rubio-Gonzalez0 #float #precise #using
- Floating-point precision tuning using blame analysis (CRG, CN0, BM, KS, JD, WK, CI, WL, DHB, DH), pp. 1074–1085.
- ICSE-2016-SchroterKTBS #composition #configuration management #interface
- Feature-model interfaces: the highway to compositional analyses of highly-configurable systems (RS, SK, TT, FB, GS), pp. 667–678.
- ICSE-2016-XieLSCXX #automation #debugging
- Revisit of automatic debugging via human focus-tracking analysis (XX, ZL, SS, ZC0, JX, BX), pp. 808–819.
- CASE-2016-AntunesCB #performance #petri net #probability
- A stochastic Petri net model for simulation-based performance analysis of public bicycle sharing systems (IA, LKC, JCB), pp. 433–439.
- CASE-2016-FengZLF
- Analysis of closed loop production lines in automotive body shops (YF, XZ, JL, WF), pp. 849–854.
- CASE-2016-HsuYL #process #using
- Effect analysis and optimal combination of cutting conditions on the cutting torque of tapping processes using Taguchi methods (CCH, SSY, JIL), pp. 1215–1218.
- CASE-2016-JiLSWLSCJ #behaviour #smarttech
- A human-centered smart home system with wearable-sensor behavior analysis (JJ, TL0, CS0, HW, WL, MS, SC, ZJ), pp. 1112–1117.
- CASE-2016-KangJ #geometry
- Integrated analysis of productivity and machine condition degradation: A geometric-machine case (YK, FJ), pp. 1128–1133.
- CASE-2016-LioulemesTM
- Quantitative analysis of the human upper-limp kinematic model for robot-based rehabilitation applications (AL, MT, FM), pp. 1061–1066.
- CASE-2016-YangWBZ #clustering #multi #scheduling #tool support
- Optimal one-wafer cyclic scheduling analysis of transport-dominant single-arm multi-cluster tools (FY, NW, LB, MZ), pp. 1405–1410.
- CASE-2016-YangWQZ #clustering #hybrid #multi #scheduling #tool support
- Optimal scheduling analysis of treelike hybrid multi-cluster tools (FY, NW, YQ, MZ), pp. 1400–1404.
- CASE-2016-ZhangSMLZF #design #parametricity #process #simulation #towards
- Robotic additive manufacturing process simulation - towards design and analysis with building parameter in consideration (GQZ, AS, CM, DTL, BZ, TAF), pp. 609–613.
- CC-2016-SankarCN
- Improved MHP Analysis (AS, SC, VKN), pp. 207–217.
- CC-2016-SuiX #interprocedural #named
- SVF: interprocedural static value-flow analysis in LLVM (YS, JX), pp. 265–266.
- CGO-2016-PaisanteMBGP #pointer
- Symbolic range analysis of pointers (VP, MM, LBeO, LG, FMQP), pp. 171–181.
- CGO-2016-SuiDX #parallel #pointer #source code #thread
- Sparse flow-sensitive pointer analysis for multithreaded programs (YS, PD, JX), pp. 160–170.
- CGO-2016-VassiliadisRDPA #approximate #automation #towards
- Towards automatic significance analysis for approximate computing (VV, JR, JD, KP, CDA, NB, SL, UN), pp. 182–193.
- FASE-2016-ChrszonDKB #modelling #probability
- Family-Based Modeling and Analysis for Probabilistic Systems - Featuring ProFeat (PC, CD, SK, CB), pp. 287–304.
- CAV-2016-ChatterjeeFG #probability #source code #termination
- Termination Analysis of Probabilistic Programs Through Positivstellensatz's (KC, HF0, AKG), pp. 3–22.
- CAV-2016-FanQM0D #automation #hybrid #modelling #reachability
- Automatic Reachability Analysis for Nonlinear Hybrid Models with C2E2 (CF, BQ, SM, MV0, PSD), pp. 531–538.
- CAV-2016-ManevichDR #linear #termination
- From Shape Analysis to Termination Analysis in Linear Time (RM, BD, NR), pp. 426–446.
- CAV-2016-PrabhakarS #abstraction #refinement
- Counterexample Guided Abstraction Refinement for Stability Analysis (PP, MGS), pp. 495–512.
- CAV-2016-WangTLYJ #automaton #logic #representation #string
- String Analysis via Automata Manipulation with Logic Circuit Representation (HEW, TLT, CHL, FY, JHRJ), pp. 241–260.
- CAV-2016-SevegnaniC #graph #named
- BigraphER: Rewriting and Analysis Engine for Bigraphs (MS, MC), pp. 494–501.
- ICST-2016-GaoJBL #effectiveness #framework #testing
- A Framework to Evaluate the Effectiveness of Different Load Testing Analysis Techniques (RG, ZMJ, CB, ML), pp. 22–32.
- ICST-2016-TokumotoYSH #c #higher-order #mutation testing #named #virtual machine
- MuVM: Higher Order Mutation Analysis Virtual Machine for C (ST, HY, KS, SH), pp. 320–329.
- ICTSS-2016-SuzukiPKT #behaviour #network #visualisation
- Distribution Visualization for User Behavior Analysis on LTE Network (MS, QP, TK, MT), pp. 249–255.
- VMCAI-2016-Parizek #array #hybrid #partial order #reduction #source code
- Hybrid Analysis for Partial Order Reduction of Programs with Arrays (PP), pp. 291–310.
- CBSE-2015-KimBNMLSLP #probability #scheduling
- Quantitative Schedulability Analysis of Continuous Probability Tasks in a Hierarchical Context (JHK, AB, UN, MM, KGL, AS, IL, LTXP), pp. 91–100.
- ECSA-2015-StierKGR #architecture #energy #modelling #performance
- Model-Based Energy Efficiency Analysis of Software Architectures (CS, AK, HG, RHR), pp. 221–238.
- ECSA-2015-TrubianiGE #architecture #modelling #nondeterminism #performance #traceability
- Exploiting Traceability Uncertainty Between Software Architectural Models and Performance Analysis Results (CT, AG, AE), pp. 305–321.
- WICSA-2015-AbukwaikNR #concept
- A Proactive Support for Conceptual Interoperability Analysis in Software Systems (HA, MN, HDR), pp. 119–122.
- DocEng-2015-NicholasB #documentation
- Document Engineering Issues in Document Analysis (CN, RB), pp. 229–230.
- DRR-2015-ChenSWLHI #dataset #documentation #layout
- Ground truth model, tool, and dataset for layout analysis of historical documents (KC, MS, HW, ML, JH, RI), p. 940204.
- HT-2015-ApaolazaHJ #behaviour #interactive #low level #web
- Longitudinal Analysis of Low-Level Web Interaction through Micro Behaviours (AA, SH, CJ), pp. 337–340.
- HT-2015-Baeza-YatesS #generative
- Wisdom of the Crowd or Wisdom of a Few?: An Analysis of Users’ Content Generation (RABY, DST), pp. 69–74.
- HT-2015-BurnapCS #classification #communication #twitter
- Machine Classification and Analysis of Suicide-Related Communication on Twitter (PB, WC, JS), pp. 75–84.
- HT-2015-MishraDBS #incremental #learning #sentiment
- Sentiment Analysis with Incremental Human-in-the-Loop Learning and Lexical Resource Customization (SM, JD, JB, ES), pp. 323–325.
- JCDL-2015-NielsenG #interactive #library #multi #named #transaction #visual notation
- PivotViz: Interactive Visual Analysis of Multidimensional Library Transaction Data (MN, KG), pp. 139–142.
- SIGMOD-2015-ElgamalYAMH #big data #component #distributed #named #platform #scalability
- sPCA: Scalable Principal Component Analysis for Big Data on Distributed Platforms (TE, MY, AA, WM, MH), pp. 79–91.
- SIGMOD-2015-ZengADAS #big data #interactive #named #online
- G-OLA: Generalized On-Line Aggregation for Interactive Analysis on Big Data (KZ, SA, AD, MA, IS), pp. 913–918.
- VLDB-2015-BrancotteYBBDH #rank
- Rank aggregation with ties: Experiments and Analysis (BB, BY, GB, SCB, AD, SH), pp. 1202–1213.
- VLDB-2015-YangCLW #nearest neighbour #query
- Reverse k Nearest Neighbors Query Processing: Experiments and Analysis (SY, MAC, XL, WW), pp. 605–616.
- EDM-2015-AnayaGLH #approach #collaboration #diagrams #network #social #using
- An Approach of Collaboration Analytics in MOOCs Using Social Network Analysis and Influence Diagram (ARA, JGB, EL, FHdO), pp. 492–495.
- EDM-2015-BergnerKP #challenge #learning
- Methodological Challenges in the Analysis of MOOC Data for Exploring the Relationship between Discussion Forum Views and Learning Outcomes (YB, DK, DEP), pp. 234–241.
- EDM-2015-BhatnagarDWLDLC #learning
- An Analysis of Peer-submitted and Peer-reviewed Answer Rationales in a Web-based Peer Instruction Based Learning Environment (SB, MCD, CW, NL, MD, KL, ESC), pp. 456–459.
- EDM-2015-BlanchardDON #automation #education #speech #towards
- Classifying Q&A from Teachers' Speech: Moving Toward an Automated System of Dialogic Analysis (NB, SKD, AO, MN), pp. 282–288.
- EDM-2015-BoubekkiKGSB #data-driven #towards
- Toward Data-Driven Analyses of Electronic Text Books (AB, UK, FG, WS, UB), pp. 592–593.
- EDM-2015-GoldinG #convergence #student
- Convergent Validity of a Student Model: Recent-Performance Factors Analysis (IMG, AG), pp. 548–551.
- EDM-2015-Hayashi #feedback #network #online #process
- Psychological Effects of In-Group Activity Feedback in an Online Explanation Task: Lexical Network Analysis (YH), pp. 484–487.
- EDM-2015-JiangZLL #network #question #what
- Influence Analysis by Heterogeneous Network in MOOC Forums: What can We Discover? (ZJ, YZ, CL, XL), pp. 242–249.
- EDM-2015-MorettiMS #education #evaluation #policy #sentiment #topic
- Application of Sentiment and Topic Analysis to Teacher Evaluation Policy in the U.S (AM, KM, ASA), pp. 628–629.
- EDM-2015-PapousekPRS #adaptation
- An Analysis of Response Times in Adaptive Practice of Geography Facts (JP, RP, JR, VS), pp. 562–563.
- ITiCSE-2015-BellettiniLMMMT #how #performance #student
- How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students (CB, VL, DM, MM, AM, MT), pp. 27–32.
- ITiCSE-2015-Rubio #automation #categorisation #clustering #programming #student #using
- Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
- ITiCSE-2015-UraiUO #distributed #programming
- Enhancements to Support Functions of Distributed Pair Programming Based on Action Analysis (TU, TU, NO), pp. 177–182.
- ICPC-2015-MartinCAA #empirical #open source
- Make it simple: an empirical analysis of GNU make feature use in open source projects (DHM, JRC, BA, GA), pp. 207–217.
- ICPC-2015-SaeidiHKJ #interactive #modelling #named #source code #topic
- ITMViz: interactive topic modeling for source code analysis (AS, JH, RK, SJ), pp. 295–298.
- ICSME-2015-GoeminneM #database #framework #java #towards
- Towards a survival analysis of database framework usage in Java projects (MG, TM), pp. 551–555.
- ICSME-2015-JongelingDS #re-engineering #research #sentiment #tool support
- Choosing your weapons: On sentiment analysis tools for software engineering research (RJ, SD, AS), pp. 531–535.
- ICSME-2015-KhadkaSKSHJDB #case study #delivery #legacy #what
- Does software modernization deliver what it aimed for? A post modernization analysis of five software modernization case studies (RK, PS, BK, AS, JH, SJ, EvD, MB), pp. 477–486.
- ICSME-2015-XiaLWY #overview #recommendation
- Who should review this change?: Putting text and file location analyses together for more accurate recommendations (XX, DL, XW, XY), pp. 261–270.
- ICSME-2015-Yamashita #assessment #benchmark #case study #experience #metric #quality #visualisation
- Experiences from performing software quality evaluations via combining benchmark-based metrics analysis, software visualization, and expert assessment (AY), pp. 421–428.
- ICSME-2015-YamashitaZFW #comparative #industrial #open source #replication #smell
- Inter-smell relations in industrial and open source systems: A replication and comparative analysis (AY, MZ, FAF, BW), pp. 121–130.
- MSR-2015-ClaesMCV
- A Historical Analysis of Debian Package Incompatibilities (MC, TM, RDC, JV), pp. 212–223.
- MSR-2015-MalikZG #energy
- Going Green: An Exploratory Analysis of Energy-Related Questions (HM, PZ, MWG), pp. 418–421.
- MSR-2015-ZouXGYYZ #developer #empirical #non-functional #requirements #stack overflow #topic #using
- Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
- SANER-2015-AlawnehHH #metamodelling #performance #towards
- Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks (LA, AHL, JH), pp. 111–120.
- SANER-2015-CaiS15a #dependence #fine-grained #named
- TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (HC, RAS), pp. 489–493.
- SANER-2015-KoboriMI #evolution #java
- Evolution analysis for Accessibility Excessiveness in Java (KK, MM, KI), pp. 83–90.
- SANER-2015-LaverdiereBM #composition #graph #using
- Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
- SANER-2015-Martin #framework #towards
- Towards a framework for analysis, transformation, and manipulation of Makefiles (DM), pp. 601–602.
- SANER-2015-MattsenWS #abstract domain
- A non-convex abstract domain for the value analysis of binaries (SM, AW, SS), pp. 271–280.
- SANER-2015-MedicherlaK #approximate #precise #scalability
- Precision vs. scalability: Context sensitive analysis with prefix approximation (RKM, RK), pp. 281–290.
- SANER-2015-NairJNH
- A static code analysis tool for control system software (SN, RJ, ARN, SHS), pp. 459–463.
- SANER-2015-SilvaCMS #fine-grained
- Niche vs. breadth: Calculating expertise over time through a fine-grained analysis (JRdSJ, EC, LM, AS), pp. 409–418.
- SCAM-2015-DarizRS #programmable
- A static microcode analysis tool for programmable load drivers (LD, MR, MS), pp. 265–270.
- SCAM-2015-PintoKT #automation #multi #performance
- Automating the performance deviation analysis for multiple system releases: An evolutionary study (FP, UK, CT), pp. 201–210.
- DLT-2015-BrandlS #automaton #complexity #finite #monad
- Complexity Analysis: Transformation Monoids of Finite Automata (CB, HUS), pp. 143–154.
- ICALP-v2-2015-Boreale #approximate #generative #probability
- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation (MB), pp. 82–94.
- FM-2015-AlbertACGGMPR #concurrent #distributed #source code
- Resource Analysis: From Sequential to Concurrent and Distributed Programs (EA, PA, JC, SG, MGZ, EMM, GP, GRD), pp. 3–17.
- FM-2015-Damm #automation #lessons learnt #named #verification
- AVACS: Automatic Verification and Analysis of Complex Systems Highlights and Lessons Learned (WD), pp. 18–19.
- FM-2015-LiuH #android #case study #kernel #security
- Case Study: Static Security Analysis of the Android Goldfish Kernel (TL, RH), pp. 589–592.
- RTA-2015-GenetS #reachability
- Reachability Analysis of Innermost Rewriting (TG, YS), pp. 177–193.
- RTA-2015-NageleFM #automation #confluence #term rewriting
- Improving Automatic Confluence Analysis of Rewrite Systems by Redundant Rules (JN, BF, AM), pp. 257–268.
- SEFM-2015-KamaliHKP #distributed #formal method
- Formal Analysis of Proactive, Distributed Routing (MK, PH, MK, LP), pp. 175–189.
- TLCA-2015-HofmannM #multi #term rewriting
- Multivariate Amortised Resource Analysis for Term Rewrite Systems (MH, GM), pp. 241–256.
- AIIDE-2015-SifaDB #behaviour #scalability
- Large-Scale Cross-Game Player Behavior Analysis on Steam (RS, AD, CB), pp. 198–204.
- CHI-PLAY-2015-BaskinZ #behaviour #exclamation #interactive #tablet #towards
- The Player is Chewing the Tablet!: Towards a Systematic Analysis of User Behavior in Animal-Computer Interaction (SB, AZ), pp. 463–468.
- CHI-PLAY-2015-FodorMG #difference
- Agents and Avatars: Event based analysis of competitive differences (MF, PMB, JG), pp. 511–516.
- CHI-PLAY-2015-HarpsteadA #design #education #empirical #game studies #learning #using
- Using Empirical Learning Curve Analysis to Inform Design in an Educational Game (EH, VA), pp. 197–207.
- CHI-PLAY-2015-Wallner #behaviour
- Sequential Analysis of Player Behavior (GW), pp. 349–358.
- CIG-2015-ChangHH #algorithm #case study #convergence #correctness #monte carlo
- Convergence and correctness analysis of Monte-Carlo tree search algorithms: A case study of 2 by 4 Chinese dark chess (HJC, CWH, TsH), pp. 260–266.
- CIG-2015-MasuiUYP #development #game studies #towards
- Toward curling informatics - Digital scorebook development and game information analysis (FM, HU, HY, MP), pp. 481–488.
- CIG-2015-PaliyawanSCT #design #game studies #interface
- Body motion design and analysis for fighting game interface (PP, KS, WC, RT), pp. 360–367.
- DiGRA-2015-ShibuyaTS #game studies #mobile #social
- Systematic Analysis of In-Game Purchases and Social Features of Mobile Social Games in Japan (AS, MT, AS).
- FDG-2015-IsaksenGN #game studies #using
- Exploring Game Space Using Survival Analysis (AI, DG, AN).
- FDG-2015-MuellerKFKMSSG #behaviour #statistics
- Statistical Analysis of Player Behavior in Minecraft (SM0, MK, SF, SK, RPM, BS, RWS, MHG).
- FDG-2015-RyanKMW15a #game studies #semantics #tool support #using
- Tools for Game Discovery Built Using Latent Semantic Analysis (JOR, EK, MM, NWF).
- FDG-2015-ZookHR #game studies #monte carlo
- Monte-Carlo Tree Search for Simulation-based Play Strategy Analysis (AZ, BH, MR).
- VS-Games-2015-BevilacquaBE #game studies #multimodal
- Proposal for Non-Contact Analysis of Multimodal Inputs to Measure Stress Level in Serious Games (FB, PB, HE), pp. 1–4.
- ICGT-2015-Stuckrath #graph transformation #named #using #verification
- Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
- ICGT-2015-TaentzerG #confluence #graph transformation #towards
- Towards Local Confluence Analysis for Amalgamated Graph Transformation (GT, UG), pp. 69–86.
- CHI-2015-AmershiCDLSS #machine learning #named #performance #tool support
- ModelTracker: Redesigning Performance Analysis Tools for Machine Learning (SA, MC, SMD, BL, PYS, JS), pp. 337–346.
- CHI-2015-AsthanaSG #assessment #human-computer
- Survival Analysis: Objective assessment of Wait Time in HCI (SA, PS, PG), pp. 367–376.
- CHI-2015-ButlerASGP #automation #design #game studies
- Automatic Game Progression Design through Analysis of Solution Features (EB, EA, AMS, SG, ZP), pp. 2407–2416.
- CHI-2015-DerbovenMS #case study #design #multimodal
- Multimodal Analysis in Participatory Design with Children: A Primary School Case Study (JD, MVM, KS), pp. 2825–2828.
- CHI-2015-HourcadeMWP #exclamation #using
- Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
- CHI-2015-HoyleTACK #privacy #smarttech
- Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras (RH, RT, DLA, DJC, AK), pp. 1645–1648.
- CHI-2015-HuangSHH #how
- How Activists Are Both Born and Made: An Analysis of Users on Change.org (SWH, M(S, BMH, GH), pp. 211–220.
- CHI-2015-LesselAK #people
- Analysis of Recycling Capabilities of Individuals and Crowds to Encourage and Educate People to Separate Their Garbage Playfully (PL, MA, AK), pp. 1095–1104.
- CHI-2015-OskampBHG #design #evaluation #multi #named
- TerraGuide: Design and Evaluation of a Multi-Surface Environment for Terrain Visibility Analysis (MO, CB, RH, TCNG), pp. 3553–3562.
- CHI-2015-PandeyRSNB #empirical #how #visualisation
- How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
- CHI-2015-VatavuW #elicitation #formal method #metric #tool support
- Formalizing Agreement Analysis for Elicitation Studies: New Measures, Significance Test, and Toolkit (RDV, JOW), pp. 1325–1334.
- CHI-2015-Wacharamanotham #named #statistics
- Statsplorer: Guiding Novices in Statistical Analysis (CW, KS, STV, JOB), pp. 2693–2702.
- CSCW-2015-MacLeanGLMH #health #named #online
- Forum77: An Analysis of an Online Health Forum Dedicated to Addiction Recovery (DLM, SG, AL, CDM, JH), pp. 1511–1526.
- CSCW-2015-SavageM #online
- Participatory Militias: An Analysis of an Armed Movement’s Online Audience (SS, AMH), pp. 724–733.
- DHM-EH-2015-Hu0LZY #3d #development #finite
- Development of a 3D Finite Element Model of the Chinese 50th Male for the Analysis of Automotive Impact (HH, LD, XL, CZ, YY), pp. 258–265.
- DHM-EH-2015-HuDLZY
- Biomechanical Analysis of Human Thorax and Abdomen During Automotive Impact (HH, LD, XL, CZ, YY), pp. 266–273.
- DHM-EH-2015-HuZZRL #correlation
- Correlation Analysis on the Main and Basic Body Dimension for Chinese Adults (HH, CZ, XZ, LR, TL), pp. 37–43.
- DHM-EH-2015-KanazawaOWWTGH15a #experience
- Experience Factors Influence on Motion Technique of “The Way of Tea” by Motion Analysis (SK, TO, ZW, TW, YT, AG, HH), pp. 155–163.
- DHM-EH-2015-TianLYJCS #scalability #video
- Single-Variable Scenario Analysis of Vehicle-Pedestrian Potential Crash Based on Video Analysis Results of Large-Scale Naturalistic Driving Data (RT, LL, KY, FJ, YC, RS), pp. 295–304.
- DHM-EH-2015-UchidaHKEMOUG #process #using
- Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
- DHM-EH-2015-ZhouYLXZ
- Moment Analysis of Virtual Human Joint Based on JACK (QXZ, QY, ZQL, FX, SZ), pp. 100–109.
- DHM-HM-2015-BoringJM #modelling #performance #reliability
- Human Performance Modeling for Dynamic Human Reliability Analysis (RLB, JCJ, DM), pp. 223–234.
- DHM-HM-2015-GotoLTYH #eye tracking
- Analysis of Eye Movement of Caregiver Concerning on Transfer Operation (AG, ML, YT, TY, HH), pp. 58–65.
- DHM-HM-2015-IkaiMKIH
- Analysis of the Skills to Acupuncture (YI, MM, NK, HI, HH), pp. 66–73.
- DHM-HM-2015-KitajimaKMMMH #comprehension #process
- Process Analysis of Manufacturing of Sewing Scissors by All Forging Process and Understanding of Its Sharpness (YK, KK, MM, KM, YM, HH), pp. 124–132.
- DHM-HM-2015-KurataniHHKUGH #comparison #process
- Expert vs. Elementary Skill Comparison and Process Analysis in VaRTM-Manufactured Carbon Fiber Reinforced Composites (YK, KH, TH, TK, TU, AG, HH), pp. 133–142.
- DHM-HM-2015-SendaSKST #process
- Process Analysis of Kyo Karakami Manufacturing (SS, ES, TK, MS, YT), pp. 368–378.
- DHM-HM-2015-ShodaYSS #behaviour #how #people
- Exploring How People Collaborate with a Stranger: — Analyses of Verbal and Nonverbal Behaviors in Abstract Art Reproduction (HS, TY, NS, MS), pp. 379–388.
- DHM-HM-2015-SudaTHYGH #process
- Process Analysis of Expert and Non-expert Engineers in Quartz Glass Joint Process (MS, TT, AH, YY, AG, HH), pp. 389–398.
- DHM-HM-2015-SugimotoYNG #process
- EMG Activity Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, HN, AG), pp. 165–173.
- DHM-HM-2015-WangTTITGH
- Numerical Analysis on “Kana-Ami” Structure Between Expert and Non-expert (ZW, KiT, TT, KI, YT, AG, HH), pp. 192–200.
- DHM-HM-2015-WangTTTGH #process
- Motion Analysis of Interval Time During “Kana-ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 201–211.
- DHM-HM-2015-WangTTTGH15a #process
- Brain Activity Analysis on “Kana-Ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 212–219.
- DUXU-DD-2015-EmanuelRM #interactive
- Rhetoric of Interaction: Analysis of Pathos (BE, CR, MM), pp. 417–427.
- DUXU-DD-2015-Fernandez #health #human-computer #interactive
- Interactive Digital Storytelling and HCI Techniques Applied for Edutainment in Interactive Health Projects: Analysis of Two USC’s Labyrinth Projects (JIMF), pp. 621–633.
- DUXU-DD-2015-OliveiraMMM #behaviour #design
- Scenario Analysis as a Tool for Informing the Design of Behaviour Change Interventions (LCRdO, MCM, VM, AJM), pp. 535–547.
- DUXU-DD-2015-TarkkanenHR #problem #testing #usability
- Are We Testing Utility? Analysis of Usability Problem Types (KT, VH, PR), pp. 269–280.
- DUXU-IXD-2015-IwamotoKM #case study #using
- A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
- DUXU-IXD-2015-KoshiyamaPR #architecture #repository #usability
- Analysis of Usability and Information Architecture of the UFRN Institutional Repository (DK, ALSdP, JGSR), pp. 197–207.
- DUXU-IXD-2015-Naskova #usability
- Usability Analysis of IxDA.org (JN), pp. 63–73.
- DUXU-IXD-2015-OliveiraVSBRS #interactive #usability
- Ergonomic and Usability Analysis of Interactive Whiteboards in the Academic Environment (EO, EV, ES, SB, TR, MMS), pp. 208–217.
- DUXU-IXD-2015-RaffaeleAJCPCS #game studies #legacy #multi #platform #usability
- Doctor Who: Legacy, an Analysis of Usability and Playability of a Multi-platform Game (RR, RA, IJ, BC, GP, BJAdC, MMS), pp. 283–291.
- DUXU-UI-2015-DaggeFR #comparative #named #process
- HARSim: Posterior Load Comparative Analysis Process (RD, EF, FR), pp. 34–44.
- DUXU-UI-2015-KronbauerMS #evaluation #experience #interactive #mobile #user interface
- Capture and Analysis of Interaction Data for the Evaluation of User Experience with Mobile Devices (AHK, DM, CASS), pp. 54–65.
- DUXU-UI-2015-LeeKK #case study #experience #user interface
- A Study Customer Journey Map for User Experience Analysis of Information and Communications Technology Service (JHL, MJK, SWK), pp. 66–74.
- DUXU-UI-2015-MarcusB #design
- Chinese User-Experience Design: An Initial Analysis (AM, SB), pp. 107–117.
- DUXU-UI-2015-MarczalJ #behaviour #mobile
- Behavioural Variables Analysis in Mobile Environments (DM, PTAJ), pp. 118–130.
- DUXU-UI-2015-RodriguesEM #collaboration #platform
- Digital Collections: Analysis of Collaborative Platforms (CR, BE, MM), pp. 353–362.
- HCI-DE-2015-GrobelnyM #algorithm #comparative #design #grid #visual notation
- Comparative Analysis of Regular Grid Based Algorithms in the Design of Graphical Control Panels (JG, RM), pp. 332–339.
- HCI-DE-2015-HashizumeK #smarttech #usability
- Analysis of Factors Influencing the Satisfaction of the Usability Evaluations in Smartphone Applications (AH, SK), pp. 194–201.
- HCI-IT-2015-MurataM #eye tracking #using
- Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
- HCI-IT-2015-MutoM #development #interactive
- Analysis of Eye Hand Interaction in Drawing Figure and Letter — For the Development of Handwrite-Training Device (YM, TM), pp. 107–117.
- HCI-IT-2015-SarsharNR #human-computer #on the #smarttech #usability
- On the Usability of Smartphone Apps in Emergencies — An HCI Analysis of GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 765–774.
- HCI-IT-2015-SatoAOO #automation #classification #image
- Automatic Classification Between Involuntary and Two Types of Voluntary Blinks Based on an Image Analysis (HS, KA, SO, MO), pp. 140–149.
- HCI-IT-2015-ZhuF #game studies #online
- A Lexical Analysis of Nouns and Adjectives from Online Game Reviews (MZ, XF), pp. 670–680.
- HCI-UC-2015-Ujita #reliability #using
- Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
- HIMI-IKC-2015-HayashiH #concept #learning #process
- Analysis of the Relationship Between Metacognitive Ability and Learning Activity with Kit-Build Concept Map (YH, TH), pp. 304–312.
- HIMI-IKC-2015-MakhtarI #evaluation
- An Analysis of Ear Plethysmogram for Evaluation of Driver’s Mental Workload Level (AKM, MI), pp. 213–224.
- HIMI-IKC-2015-MatsudaOHT #automation #generative #multi #problem #testing #using
- Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
- HIMI-IKC-2015-WangN #identification #matrix
- Dot Matrix Analysis of Plant Operation Data for Identifying Sequential Alarms Triggered by Single Root Cause (ZW, MN), pp. 152–158.
- HIMI-IKC-2015-YamadaAY #internet
- An Analysis of the Synergistic Effect in the Advertisement — Between the Television Commercials and the Internet Commercials (TY, YA, KY), pp. 159–170.
- HIMI-IKD-2015-MorizumiA #using
- Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
- LCT-2015-AltanC #animation #education
- An Eye-Tracking Analysis of Spatial Contiguity Effect in Educational Animations (TA, KÇ), pp. 3–13.
- LCT-2015-DalipiYK #performance #semantics #using
- Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
- SCSM-2015-GerritsenB #predict
- Simulation-Based Prediction and Analysis of Collective Emotional States (CG, WRJvB), pp. 118–126.
- SCSM-2015-KastratiIYD #network #online #social #using
- Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
- SCSM-2015-KinclNPS #independence #sentiment
- Language-Independent Sentiment Analysis with Surrounding Context Extension (TK, MN, JP, PS), pp. 158–168.
- ICEIS-v2-2015-BandyszakRWP #information management #specification #validation
- Supporting the Validation of Structured Analysis Specifications in the Engineering of Information Systems by Test Path Exploration (TB, MR, TW, KP), pp. 252–259.
- ICEIS-v2-2015-Judrups #information management #integration
- Analysis of Knowledge Management and E-Learning Integration Approaches (JJ), pp. 451–456.
- ICEIS-v2-2015-PerezNGD #development #process
- A Tool for the Analysis of Change Management Processes in Software Development Cycles (MP, ÁN, HAPG, JCD), pp. 482–485.
- ICEIS-v2-2015-SariK #debugging #monitoring #predict #using
- Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
- ICEIS-v2-2015-SouzaVS #semantics
- Semantically Enriching the Detrending Step of Time Series Analysis (LdS, MSMGV, MSS), pp. 475–481.
- ICEIS-v2-2015-ZoglaMS #problem #quality #taxonomy
- Analysis of Data Quality Problem Taxonomies (AZ, IM, ES), pp. 445–450.
- ICEIS-v3-2015-BauerBTR #flexibility #maintenance #repository
- A SOA Repository with Advanced Analysis Capabilities — Improving the Maintenance and Flexibility of Service-Oriented Applications (TB, SB, JT, MR), pp. 238–248.
- ICEIS-v3-2015-ThabetGG #mining #petri net #process
- Petri Net Model Cost Extension based on Process Mining — Cost Data Description and Analysis (DT, SAG, HHBG), pp. 268–275.
- ICEIS-v3-2015-ValentimCM #case study #specification
- Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
- CIKM-2015-ChenSJ #data type #infinity
- Private Analysis of Infinite Data Streams via Retroactive Grouping (RC, YS, HJ), pp. 1061–1070.
- CIKM-2015-JoKB #gpu #matrix #multi #network #performance #scalability #social
- Efficient Sparse Matrix Multiplication on GPU for Large Social Network Analysis (YYJ, SWK, DHB), pp. 1261–1270.
- CIKM-2015-JoLR #predict #topic
- Time Series Analysis of Nursing Notes for Mortality Prediction via a State Transition Topic Model (YJ, NL, CPR), pp. 1171–1180.
- CIKM-2015-KimCLYK #semantics
- Deep Semantic Frame-Based Deceptive Opinion Spam Analysis (SK, HC, SL, MY, JK), pp. 1131–1140.
- CIKM-2015-MaxwellAJK
- Searching and Stopping: An Analysis of Stopping Rules and Strategies (DM, LA, KJ, HK), pp. 313–322.
- CIKM-2015-MukherjeeW #community #interactive
- Leveraging Joint Interactions for Credibility Analysis in News Communities (SM, GW), pp. 353–362.
- CIKM-2015-Paul #canonical #correlation
- Core-Sets For Canonical Correlation Analysis (SP), pp. 1887–1890.
- CIKM-2015-TehraniAT #interactive
- Interactive User Group Analysis (BOT, SAY, AT), pp. 403–412.
- CIKM-2015-Tomkins #scalability
- Large-Scale Analysis of Dynamics of Choice Among Discrete Alternatives (AT), p. 1349.
- CIKM-2015-ZhaoZK #game studies #network #recommendation #social
- Exploiting Game Theoretic Analysis for Link Recommendation in Social Networks (TZ, HVZ, IK), pp. 851–860.
- ECIR-2015-BansalBV #semantics #towards
- Towards Deep Semantic Analysis of Hashtags (PB, RB, VV), pp. 453–464.
- ECIR-2015-BiyaniBCM #concurrent #online #retrieval #thread #using
- Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
- ECIR-2015-CaoC #behaviour #detection #social #social media
- Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
- ECIR-2015-HienertHWK #named
- WHOSE — A Tool for Whole-Session Analysis in IIR (DH, WvH, AW, DK), pp. 172–183.
- ECIR-2015-HuynhHR #learning #sentiment #strict
- Learning Higher-Level Features with Convolutional Restricted Boltzmann Machines for Sentiment Analysis (TH, YH, SMR), pp. 447–452.
- ECIR-2015-Kelly #estimation #information retrieval #statistics
- Statistical Power Analysis for Sample Size Estimation in Information Retrieval Experiments with Users (DK), pp. 822–825.
- ECIR-2015-KoolenBBK #social #social media
- Looking for Books in Social Media: An Analysis of Complex Search Requests (MK, TB, AvdB, JK), pp. 184–196.
- ECIR-2015-Moghaddam #fault #feedback #mining #sentiment
- Beyond Sentiment Analysis: Mining Defects and Improvements from Customer Feedback (SM), pp. 400–410.
- ECIR-2015-SabetghadamLBR #graph #reachability
- Reachability Analysis of Graph Modelled Collections (SS, ML, RB, AR), pp. 370–381.
- ICML-2015-GanCHCC #modelling #scalability #topic
- Scalable Deep Poisson Factor Analysis for Topic Modeling (ZG, CC, RH, DEC, LC), pp. 1823–1832.
- ICML-2015-GongY #convergence #memory management
- A Modified Orthant-Wise Limited Memory Quasi-Newton Method with Convergence Analysis (PG, JY), pp. 276–284.
- ICML-2015-HuangGS #component #independence
- Deterministic Independent Component Analysis (RH, AG, CS), pp. 2521–2530.
- ICML-2015-KomiyamaHN #multi #probability #problem
- Optimal Regret Analysis of Thompson Sampling in Stochastic Multi-armed Bandit Problem with Multiple Plays (JK, JH, HN), pp. 1152–1161.
- ICML-2015-MaLF #canonical #correlation #dataset #linear #scalability
- Finding Linear Structure in Large Datasets with Scalable Canonical Correlation Analysis (ZM, YL, DPF), pp. 169–178.
- ICML-2015-NishiharaLRPJ #convergence
- A General Analysis of the Convergence of ADMM (RN, LL, BR, AP, MIJ), pp. 343–352.
- ICML-2015-PerrotH #learning #metric
- A Theoretical Analysis of Metric Hypothesis Transfer Learning (MP, AH), pp. 1708–1717.
- ICML-2015-PrasadPR #axiom #rank
- Distributional Rank Aggregation, and an Axiomatic Analysis (AP, HHP, PDR), pp. 2104–2112.
- ICML-2015-WangWS #clustering
- A Deterministic Analysis of Noisy Sparse Subspace Clustering for Dimensionality-reduced Data (YW, YXW, AS), pp. 1422–1431.
- ICML-2015-YangX15a #component #streaming
- Streaming Sparse Principal Component Analysis (WY, HX), pp. 494–503.
- ICML-2015-ZhouZS #bound #convergence #fault #first-order
- ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
- KDD-2015-ChaoHZ #kernel
- Optimal Kernel Group Transformation for Exploratory Regression Analysis and Graphics (PC, QH, MZ), pp. 905–914.
- KDD-2015-EmbarBPV #online #social #topic
- Online Topic-based Social Influence Analysis for the Wimbledon Championships (VRE, IB, VP, RV), pp. 1759–1768.
- KDD-2015-NagarajanWBNBHT #predict
- Predicting Future Scientific Discoveries Based on a Networked Analysis of the Past Literature (MN, ADW, BJB, IBN, SB, PJH, METD, SB, AKA, JJL, SR, CMB, CRP, LK, AML, AL, HZ, SB, GW, YC, LAD, WSS, OL), pp. 2019–2028.
- KDD-2015-OkumuraST #classification #incremental #linear #problem
- Quick Sensitivity Analysis for Incremental Data Modification and Its Application to Leave-one-out CV in Linear Classification Problems (SO, YS, IT), pp. 885–894.
- KDD-2015-ZhangLZSKYJ #biology #image #learning #modelling #multi
- Deep Model Based Transfer and Multi-Task Learning for Biological Image Analysis (WZ, RL, TZ, QS, SK, JY, SJ), pp. 1475–1484.
- KDD-2015-ZhouLB #clustering #graph
- Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis (YZ, LL, DB), pp. 1563–1572.
- MLDM-2015-CoralloFMACCGS #approach #sentiment
- Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
- MLDM-2015-KarkkainenS #component #robust
- Robust Principal Component Analysis of Data with Missing Values (TK, MS), pp. 140–154.
- MLDM-2015-KrasotkinaM15a #approach
- A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
- MLDM-2015-MojahedBWI #clustering #matrix #semistructured data #similarity #using
- Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
- MLDM-2015-ShaluntsB #named #sentiment
- SentiSAIL: Sentiment Analysis in English, German and Russian (GS, GB), pp. 87–97.
- RecSys-2015-SifaOB #migration
- User Churn Migration Analysis with DEDICOM (RS, CO, CB), pp. 321–324.
- RecSys-2015-SousaDBM #named #network #recommendation
- CNARe: Co-authorship Networks Analysis and Recommendations (GAdS, MAD, MAB, MMM), pp. 329–330.
- SEKE-2015-BarchetSF #collaboration #dependence #risk management
- Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
- SEKE-2015-GokhaleE #network #social
- Social Analysis of the SEKE Co-Author Network (SSG, REK), pp. 237–243.
- SEKE-2015-RamosCRSAP #architecture #recommendation
- Recommendation in the Digital TV Domain: an Architecture based on Textual Description Analysis (FBAR, AAMC, RRdS, GS, HOdA, AP), pp. 99–104.
- SEKE-2015-SaputriL #machine learning #perspective
- Are We Living in a Happy Country: An Analysis of National Happiness from Machine Learning Perspective (TRDS, SWL), pp. 174–177.
- SEKE-2015-SunSWZ #data flow #detection #fault #integer #using
- Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
- SEKE-2015-Tasse #identification #metric #using
- Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
- SEKE-2015-ValeSSA #agile #evaluation #industrial #named #process
- RiSE-DA: An Agile Domain Analysis Process and its Industrial Evaluation (TV, ISS, IFdS, ESdA), pp. 696–699.
- SEKE-2015-ZhangGAU #mobile
- Test Model and Coverage Analysis for Location-based Mobile Services (TZ, JG, OEKA, TU), pp. 80–86.
- SIGIR-2015-Dori-Hacohen #detection
- Controversy Detection and Stance Analysis (SDH), p. 1057.
- SIGIR-2015-HeindorfPSE #corpus #detection #knowledge base #towards
- Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
- SIGIR-2015-KrstovskiSK #modelling #retrieval
- Evaluating Retrieval Models through Histogram Analysis (KK, DAS, MJK), pp. 859–862.
- SIGIR-2015-SeverynM15a #network #sentiment #twitter
- Twitter Sentiment Analysis with Deep Convolutional Neural Networks (AS, AM), pp. 959–962.
- SKY-2015-FragaMRM #assessment #automation #generative #health #natural language
- Natural Language Processing System Applied in Public Health for Assessment of an Automatic Analysis of Patterns Generator (AF, JLM, VR, VM), pp. 31–38.
- MoDELS-J-2011-BavotaGOLTGC15 #diagrams #fine-grained #maintenance #uml
- A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
- AMT-2015-GholizadehDKM #model transformation
- Analysis of Source-to-Target Model Transformations in QueST (HG, ZD, SK, TSEM), pp. 46–55.
- BX-2015-HidakaBTM #approach #bidirectional #graph transformation
- Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
- ECMFA-2015-BerardinelliMPP #design #energy
- Energy Consumption Analysis and Design of Energy-Aware WSN Agents in fUML (LB, ADM, SP, LP, WT), pp. 1–17.
- MoDELS-2015-Rodriguez-Echeverria #approach #evolution #model transformation #statistics
- A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
- SPLC-2015-BeekFG #adaptation #paradigm #product line
- Applying the product lines paradigm to the quantitative analysis of collective adaptive systems (MHtB, AF, SG), pp. 321–326.
- SPLC-2015-BeekFGM #product line #using
- Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
- SPLC-2015-BeekLLV #constraints #modelling #probability #product line #statistics
- Statistical analysis of probabilistic models of software product lines with quantitative constraints (MHtB, AL, ALL, AV), pp. 11–15.
- SPLC-2015-DomisAB #modelling #safety #tool support #uml #using #variability
- Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
- SPLC-2015-LiangGCR #feature model #modelling #satisfiability #scalability
- SAT-based analysis of large real-world feature models is easy (JH(L, VG, KC, VR), pp. 91–100.
- SPLC-2015-YueAS #case study #cyber-physical #experience #product line
- Cyber-physical system product line engineering: comprehensive domain analysis and experience report (TY, SA, BS), pp. 338–347.
- ECOOP-2015-CentonzePT
- Access-rights Analysis in the Presence of Subjects (PC, MP, OT), pp. 222–246.
- ECOOP-2015-DimovskiBW #abstraction #precise #variability
- Variability Abstractions: Trading Precision for Speed in Family-Based Analyses (ASD, CB, AW), pp. 247–270.
- ECOOP-2015-WeiR #adaptation #javascript
- Adaptive Context-sensitive Analysis for JavaScript (SW, BGR), pp. 712–734.
- OOPSLA-2015-DietrichHS #java #points-to
- Giga-scale exhaustive points-to analysis for Java in under a minute (JD, NH, BS), pp. 535–551.
- OOPSLA-2015-FuBS #automation #fault
- Automated backward error analysis for numerical code (ZF, ZB, ZS), pp. 639–654.
- AdaEurope-2015-JaradatBP #maintenance #safety #using
- Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
- AdaEurope-2015-ZamoranoG #scheduling
- Schedulability Analysis of PWM Tasks for the UPMSat-2 ADCS (JZ, JG), pp. 85–99.
- LOPSTR-2015-BodeiBGHL #calculus
- A Global Occurrence Counting Analysis for Brane Calculi (CB, LB, RG, DH, FL), pp. 179–200.
- LOPSTR-2015-CominiGTV
- Abstract Analysis of Universal Properties for tccp (MC, MdMG, LT, AV), pp. 163–178.
- LOPSTR-2015-MantelMPW #automaton #composition #data flow #network #using
- Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis (HM, MMO, MP, AW), pp. 201–217.
- LOPSTR-2015-RiescoAA #maude #memory management #policy #semantics #specification
- Memory Policy Analysis for Semantics Specifications in Maude (AR0, IMA, MA), pp. 293–310.
- PEPM-2015-HoekH #php
- Object-sensitive Type Analysis of PHP (HEVdH, JH), pp. 9–20.
- PEPM-2015-KootH #exception #functional #higher-order #semantics #strict #type system
- Type-based Exception Analysis for Non-strict Higher-order Functional Languages with Imprecise Exception Semantics (RK, JH), pp. 127–138.
- PEPM-2015-VerstoepH #functional #higher-order #strict
- Polyvariant Cardinality Analysis for Non-strict Higher-order Functional Languages: Brief Announcement (HV, JH), pp. 139–142.
- PLDI-2015-DeligiannisDKLT #programming #state machine #testing
- Asynchronous programming, analysis and testing with state machines (PD, AFD, JK, AL, PT), pp. 154–164.
- PLDI-2015-WeijiangBLK #dependence
- Tree dependence analysis (YW, SB, JL, MK), pp. 314–325.
- POPL-2015-ChatterjeePV #interprocedural
- Quantitative Interprocedural Analysis (KC, AP, YV), pp. 539–551.
- POPL-2015-GiacobazziLR #metaprogramming
- Analyzing Program Analyses (RG, FL, FR), pp. 261–273.
- POPL-2015-PredaGLM #automaton #bytecode #semantics #similarity
- Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables (MDP, RG, AL, IM), pp. 329–341.
- POPL-2015-TangWZXZM #data flow
- Summary-Based Context-Sensitive Data-Dependence Analysis in Presence of Callbacks (HT, XW, LZ, BX, LZ, HM), pp. 83–95.
- PPDP-2015-Hofmann #automation
- Automatic amortized analysis (MH), p. 5.
- QAPL-2015-RosendahlK #probability
- Probabilistic Output Analysis by Program Manipulation (MR, MHK), pp. 110–124.
- SAS-2015-AlbertGG #interprocedural #source code
- May-Happen-in-Parallel Analysis for Asynchronous Programs with Inter-Procedural Synchronization (EA, SG, PG), pp. 72–89.
- SAS-2015-BakhirkinBP #set
- A Forward Analysis for Recurrent Sets (AB, JB, NP), pp. 293–311.
- SAS-2015-CastelnuovoNRSY #bottom-up #case study #composition #top-down
- Modularity in Lattices: A Case Study on the Correspondence Between Top-Down and Bottom-Up Analysis (GC, MN, NR, MS, HY), pp. 252–274.
- SAS-2015-CattaruzzaASK #bound
- Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (DC, AA, PS, DK), pp. 312–331.
- SAS-2015-LiRC
- Shape Analysis for Unstructured Sharing (HL, XR, BYEC), pp. 90–108.
- SAS-2015-LiTX #effectiveness
- Effective Soundness-Guided Reflection Analysis (YL, TT, JX), pp. 162–180.
- SAS-2015-RapoportLT #correlation #data flow #precise
- Precise Data Flow Analysis in the Presence of Correlated Method Calls (MR, OL, FT), pp. 54–71.
- ASE-2015-DeligiannisDR #concurrent #debugging #performance #precise
- Fast and Precise Symbolic Analysis of Concurrency Bugs in Device Drivers (T) (PD, AFD, ZR), pp. 166–177.
- ASE-2015-LerchSBM #abstraction #bound #data flow #scalability
- Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T) (JL, JS, EB, MM), pp. 619–629.
- ASE-2015-ShermanD #data flow #performance #precise
- Exploiting Domain and Program Structure to Synthesize Efficient and Precise Data Flow Analyses (T) (ES, MBD), pp. 608–618.
- ASE-2015-VecchioSYWKZ #android #string
- String Analysis of Android Applications (N) (JDV, FS, KMY, BW, SYK, LZ), pp. 680–685.
- ASE-2015-WaterlooPE #fault #testing
- Test Analysis: Searching for Faults in Tests (N) (MW, SP, SGE), pp. 149–154.
- ESEC-FSE-2015-BusanyM #behaviour #statistics
- Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
- ESEC-FSE-2015-FuLB #automation #memory dump #memory management #pointer
- Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
- ESEC-FSE-2015-GreenyerHMB #re-engineering #requirements
- Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering (JG, MH, JM, RB), pp. 1002–1005.
- ESEC-FSE-2015-LiLWH #android #java #string
- String analysis for Java and Android applications (DL, YL, MW, WGJH), pp. 661–672.
- ICSE-v1-2015-HuangLR #concurrent #named #predict
- GPredict: Generic Predictive Concurrency Analysis (JH, QL, GR), pp. 847–857.
- ICSE-v1-2015-OcteauLDJM #android #communication #component #constant
- Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (DO, DL, MD, SJ, PM), pp. 77–88.
- ICSE-v1-2015-PanW0G #javascript
- Gray Computing: An Analysis of Computing with Background JavaScript Tasks (YP, JW, YS, JG), pp. 167–177.
- ICSE-v1-2015-PradelSS #consistency #javascript #named #nondeterminism
- TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript (MP, PS, KS), pp. 314–324.
- ICSE-v1-2015-YangYWWR #android #control flow
- Static Control-Flow Analysis of User-Driven Callbacks in Android Applications (SY, DY, HW, YW, AR), pp. 89–99.
- ICSE-v1-2015-YiYLZW #testing
- A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
- ICSE-v2-2015-AlexandruG #agile #multi
- Rapid Multi-Purpose, Multi-Commit Code Analysis (CVA, HCG), pp. 635–638.
- ICSE-v2-2015-Berghe #security #towards
- Towards a Practical Security Analysis Methodology (AvDB), pp. 883–886.
- ICSE-v2-2015-Bichhawat
- Post-Dominator Analysis for Precisely Handling Implicit Flows (AB), pp. 787–789.
- ICSE-v2-2015-Hachem #architecture #data access #modelling #towards
- Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
- ICSE-v2-2015-HermansM #dataset #email #spreadsheet
- Enron’s Spreadsheets and Related Emails: A Dataset and Analysis (FH, ERMH), pp. 7–16.
- ICSE-v2-2015-KlasBDSH #evaluation #modelling #scalability #testing
- A Large-Scale Technology Evaluation Study: Effects of Model-based Analysis and Testing (MK, TB, AD, TS, PH), pp. 119–128.
- ICSE-v2-2015-MaleticC #semiparsing #source code #using
- Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
- ICSE-v2-2015-MaplesdenRTHG #case study #industrial #performance #using
- Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
- ICSE-v2-2015-Palomba #detection #smell
- Textual Analysis for Code Smell Detection (FP), pp. 769–771.
- ICSE-v2-2015-SadeghiBM #android #security #using
- Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
- ICSE-v2-2015-Zieris #information management #programming
- Qualitative Analysis of Knowledge Transfer in Pair Programming (FZ), pp. 855–858.
- SAC-2015-DuanZHX #delivery #framework #network #performance #platform
- Performance analysis for a service delivery platform in software defined network (QD, MZ, JH, CCX), pp. 2257–2262.
- SAC-2015-FerreiraMME #comparison #kernel #memory management
- An experimental comparison analysis of kernel-level memory allocators (TBF, RM, AM, BEC), pp. 2054–2059.
- SAC-2015-GimenesGRG #graph #multimodal #repository
- Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
- SAC-2015-IqbalKK #sentiment
- Bias-aware lexicon-based sentiment analysis (MI, AK, FK), pp. 845–850.
- SAC-2015-IsraelHS #multi #semantics #summary
- Semantic analysis for focused multi-document summarization (fMDS) of text (QI, HH, IYS), pp. 339–344.
- SAC-2015-JakobsW #data flow #proving #source code
- Programs from proofs of predicated dataflow analyses (MCJ, HW), pp. 1729–1736.
- SAC-2015-Jung0B #embedded #encoding #identification #power management
- Identification of embedded control units by state encoding and power consumption analysis (EJ, CM, LB), pp. 1957–1959.
- SAC-2015-KrutzMS #detection #effectiveness #using
- Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
- SAC-2015-LopezR #metaprogramming
- Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
- SAC-2015-MaltaPSBF #case study #distance #information management #overview
- A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case study (CAM, ROAP, APdS, IIB, AQdOF), pp. 227–232.
- SAC-2015-MongioviGFPT #approach #data flow #detection #hybrid #java
- Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
- SAC-2015-MoreiraJR #reduction #similarity #visual notation
- Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps (LASM, CMJ, PFFR), pp. 289–294.
- SAC-2015-OjameruayeB #framework
- A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
- SAC-2015-PiMMG #health #ontology #security
- Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
- SAC-2015-Puffitsch #bound #branch #predict
- Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
- SAC-2015-RaniseTV #automation #constraints #policy
- Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
- SAC-2015-SilvaMS #quality
- Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysis (THPS, MMM, APCdS), pp. 1142–1147.
- GPCE-2015-El-SharkawyKS #semantics #tool support
- Analysing the Kconfig semantics and its analysis tools (SES, AK, KS), pp. 45–54.
- SLE-2015-Bagge #library
- Analysis and transformation with the nuthatch tree-walking library (AHB), pp. 83–88.
- CASE-2015-CarmenateRLBM #approach #behaviour #energy #modelling #using
- Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
- CASE-2015-HanZ #energy
- Charge transfer and energy transfer analysis of battery charge equalization (WH, LZ), pp. 1137–1138.
- CASE-2015-JiaZAX #performance
- Performance analysis of Bernoulli serial production lines with switch-on/off machine control (ZJ, LZ, JA, GX), pp. 477–482.
- CASE-2015-MeddouriDF #generative #induction #performance #predict #using
- Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
- CASE-2015-NonakaSLNKK #simulation #statistics
- The S-Model: A digital manufacturing system combined with autonomous statistical analysis and autonomous discrete-event simulation for smart manufacturing (YN, YS, AL, SN, KK, YK), pp. 1006–1011.
- CASE-2015-SaezMBT #hybrid #performance #realtime #simulation
- Real-time hybrid simulation of manufacturing systems for performance analysis and control (MS, FPM, KB, DMT), pp. 526–531.
- CASE-2015-XiePLLY
- Hand-eye calibration and its accuracy analysis in robotic grinding (HX, CtP, WLL, YhL, ZPY), pp. 862–867.
- CASE-2015-XieZLSD #agile #approach #multi #process
- Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
- CASE-2015-ZhongLBM #modelling
- Modeling and analysis of e-visits in primary care (XZ, JL, PAB, AJM), pp. 955–960.
- CC-2015-AllenSK #points-to #scalability #staged
- Staged Points-to Analysis for Large Code Bases (NA, BS, PK), pp. 131–150.
- CGO-2015-NagarajG #approximate #mining #pointer #using
- Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
- CGO-2015-OanceaR #induction #scalability
- Scalable conditional induction variables (CIV) analysis (CEO, LR), pp. 213–224.
- DAC-2015-ChangHLW #encoding #functional #named
- TA-FTA: transition-aware functional timing analysis with a four-valued encoding (JCCC, RHMH, LYZL, CHPW), p. 6.
- DAC-2015-ChenTSHK #modelling #multi #reliability
- Interconnect reliability modeling and analysis for multi-branch interconnect trees (HBC, SXDT, VS, XH, TK), p. 6.
- DAC-2015-EspinosaHAAR #correlation #robust #set #verification
- Analysis and RTL correlation of instruction set simulators for automotive microcontroller robustness verification (JE, CH, JA, DdA, JCR), p. 6.
- DAC-2015-HanF #approach #cpu #gpu #graph #scalability
- Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
- DAC-2015-KrishnaNRT #composition #modelling #product line
- Compositional modeling and analysis of automotive feature product lines (SNK, GKN, SR, AT), p. 6.
- DAC-2015-LiuZWYX #difference #encryption #fault #named
- DERA: yet another differential fault attack on cryptographic devices based on error rate analysis (YL, JZ, LW, FY, QX), p. 6.
- DAC-2015-MundhenkSLFC #architecture #model checking #probability #security #using
- Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
- DAC-2015-RoseM #design #performance
- Performance analysis of a memristive crossbar PUF design (GSR, CAM), p. 6.
- DAC-2015-ThieleAE #scheduling
- Improving formal timing analysis of switched ethernet by exploiting FIFO scheduling (DT, PA, RE), p. 6.
- DAC-2015-YangTJ
- Criticality-dependency-aware timing characterization and analysis (YMY, KHT, IHRJ), p. 6.
- DATE-2015-AhmadyanGNCV #diagrams #performance
- Fast eye diagram analysis for high-speed CMOS circuits (SNA, CG, SN, EC, SV), pp. 1377–1382.
- DATE-2015-AndradeMVAPL #data flow #modelling
- Pre-simulation symbolic analysis of synchronization issues between discrete event and timed data flow models of computation (LA, TM, AV, CBA, FP, MML), pp. 1671–1676.
- DATE-2015-BaldwinBRPB #array #predict #using
- Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
- DATE-2015-BiondiB #modelling
- Engine control: task modeling and analysis (AB, GCB), pp. 525–530.
- DATE-2015-ChangD #model checking #modelling #using
- May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
- DATE-2015-DeyCAM #difference #fault
- Improved practical differential fault analysis of grain-128 (PD, AC, AA, DM), pp. 459–464.
- DATE-2015-DuongNXWTBYWW
- Coherent crosstalk noise analyses in ring-based optical interconnects (LHKD, MN, JX, ZW, YT, SLB, PY, XW, ZW), pp. 501–506.
- DATE-2015-FeldS #dependence
- Sufficient response time analysis considering dependencies between rate-dependent tasks (TF, FS), pp. 519–524.
- DATE-2015-GuanTW0 #realtime
- Delay analysis of structural real-time workload (NG, YT, YW, WY), pp. 223–228.
- DATE-2015-HoqueMS #approach #maintenance #model checking #probability #reliability #towards
- Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
- DATE-2015-IqtedarHSH #distributed #probability
- Formal probabilistic analysis of distributed dynamic thermal management (SI, OH, MS, JH), pp. 1221–1224.
- DATE-2015-KhosraviMGT #optimisation #reliability
- Uncertainty-aware reliability analysis and optimization (FK, MM, MG, JT), pp. 97–102.
- DATE-2015-KriebelRSASH #combinator #configuration management #fault #named #performance
- ACSEM: accuracy-configurable fast soft error masking analysis in combinatorial circuits (FK, SR, DS, PVA, MS, JH), pp. 824–829.
- DATE-2015-LezosDM #distance #locality #optimisation #reuse
- Reuse distance analysis for locality optimization in loop-dominated applications (CL, GD, KM), pp. 1237–1240.
- DATE-2015-MacherSBAK #named
- SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
- DATE-2015-MajumderLBP #architecture #manycore #probability
- NoC-enabled multicore architectures for stochastic analysis of biomolecular reactions (TM, XL, PB, PP), pp. 1102–1107.
- DATE-2015-RamboE #communication #worst-case
- Worst-case communication time analysis of networks-on-chip with shared virtual channels (EAR, RE), pp. 537–542.
- DATE-2015-SeylerSGNT #formal method
- Formal analysis of the startup delay of SOME/IP service discovery (JRS, TS, MG, NN, JT), pp. 49–54.
- DATE-2015-ThangamuthuCCL #network
- Analysis of ethernet-switch traffic shapers for in-vehicle networking applications (ST, NC, PJLC, JJL), pp. 55–60.
- DATE-2015-WartelKGBSTQLMB #case study #hardware #platform
- Timing analysis of an avionics case study on complex hardware/software platforms (FW, LK, AG, AB, ZRS, BT, EQ, CL, EM, IB, JA, LCG, TV, FJC), pp. 397–402.
- HPCA-2015-ZhaoY #distance #manycore #reuse #scalability
- Studying the impact of multicore processor scaling on directory techniques via reuse distance analysis (MZ, DY), pp. 590–602.
- HPDC-2015-AlvarezOEAGR
- HPC System Lifetime Story: Workload Characterization and Evolutionary Analyses on NERSC Systems (GPRÁ, POÖ, EE, KA, RG, LR), pp. 57–60.
- LCTES-2015-0001HL #kernel #realtime
- Cross-Kernel Control-Flow-Graph Analysis for Event-Driven Real-Time Systems (CD, MH, DL), p. 10.
- LCTES-2015-BarijoughHKG #streaming #trade-off
- Implementation-Aware Model Analysis: The Case of Buffer-Throughput Tradeoff in Streaming Applications (KMB, MH, VK, SG), p. 10.
- LCTES-2015-StilkerichLES #embedded #realtime
- A Practical Getaway: Applications of Escape Analysis in Embedded Real-Time Systems (IS, CL, CE, MS), p. 11.
- LCTES-2015-ZhangK #abstract interpretation #persistent #precise
- Improving the Precision of Abstract Interpretation Based Cache Persistence Analysis (ZZ, XDK), p. 10.
- PDP-2015-AbadalMMACM #design #manycore
- Multicast On-chip Traffic Analysis Targeting Manycore NoC Design (SA, AM, RM, EA, ACA, RM), pp. 370–378.
- PDP-2015-AkutsuUCKS #distributed #reliability
- Reliability Analysis of Highly Redundant Distributed Storage Systems with Dynamic Refuging (HA, KU, TC, TK, NS), pp. 261–268.
- PDP-2015-CabreraAAP #energy #library #metric
- Energy Measurement Library (EML) Usage and Overhead Analysis (AC, FA, JA, VBP), pp. 554–558.
- PDP-2015-FedorchenkoKC #database #design #network #security
- Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis (AF, IVK, AC), pp. 559–566.
- PDP-2015-PatelDSE #comparative #embedded
- Embedded Hypervisor Xvisor: A Comparative Analysis (AP, MD, MS, MWEK), pp. 682–691.
- PDP-2015-XavierORPMR #performance
- A Performance Isolation Analysis of Disk-Intensive Workloads on Container-Based Clouds (MGX, ICDO, FDR, RDDP, KJM, CAFDR), pp. 253–260.
- SOSP-2015-HooffLZZ #named #scalability
- Vuvuzela: scalable private messaging resistant to traffic analysis (JvdH, DL, MZ, NZ), pp. 137–152.
- ESOP-2015-CernyHKRZ #abstraction #execution #worst-case
- Segment Abstraction for Worst-Case Execution Time Analysis (PC, TAH, LK, AR, JZ), pp. 105–131.
- ESOP-2015-EmmiGMR #source code
- Analysis of Asynchronous Programs with Event-Based Synchronization (ME, PG, RM, FRV), pp. 535–559.
- ESOP-2015-VasconcelosJFH #functional #lazy evaluation #recursion #type system
- Type-Based Allocation Analysis for Co-recursion in Lazy Functional Languages (PBV, SJ, MF, KH), pp. 787–811.
- STOC-2015-SchulmanS #algorithm #matrix
- Analysis of a Classical Matrix Preconditioning Algorithm (LJS, AS), pp. 831–840.
- TACAS-2015-AlbertFR #cumulative
- Non-cumulative Resource Analysis (EA, JCF, GRD), pp. 85–100.
- TACAS-2015-DjoudiB #low level #named
- BINSEC: Binary Code Analysis with Low-Level Regions (AD, SB), pp. 212–217.
- TACAS-2015-FleuryLPV #framework #named
- Insight: An Open Binary Analysis Framework (EF, OL, GP, AV), pp. 218–224.
- TACAS-2015-GuanTAS0 #refinement #scalability
- Scalable Timing Analysis with Refinement (NG, YT, JA, MS, WY), pp. 3–18.
- TACAS-2015-HolikHLRSV #automaton #contest #named #using
- Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
- TACAS-2015-Immler #reachability
- Verified Reachability Analysis of Continuous Systems (FI), pp. 37–51.
- TACAS-2015-KongGCC #hybrid #named
- dReach: δ-Reachability Analysis for Hybrid Systems (SK, SG, WC, EMC), pp. 200–205.
- TACAS-2015-NamjoshiT #network #process
- Analysis of Dynamic Process Networks (KSN, RJT), pp. 164–178.
- TACAS-2015-Sankur #automaton #robust
- Symbolic Quantitative Robustness Analysis of Timed Automata (OS), pp. 484–498.
- CAV-2015-AbateBCK #adaptation #markov #network
- Adaptive Aggregation of Markov Chains: Quantitative Analysis of Chemical Reaction Networks (AA, LB, MC, MZK), pp. 195–213.
- CAV-2015-BozzanoCGM #modelling #performance #safety
- Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
- CAV-2015-BozzanoCPJKPRT #design #safety
- Formal Design and Safety Analysis of AIR6110 Wheel Brake System (MB, AC, AFP, DJ, GK, TP, RR, ST), pp. 518–535.
- CSL-2015-ClementeL #automaton #first-order #reachability
- Reachability Analysis of First-order Definable Pushdown Systems (LC, SL), pp. 244–259.
- ICLP-2015-KieslST #on the #source code
- On Structural Analysis of Non-Ground Answer-Set Programs (BK, PS, HT), pp. 221–234.
- ICST-2015-0001YPGS #generative #testing #using
- Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
- ICST-2015-NardoPB #generative #modelling #mutation testing #testing
- Generating Complex and Faulty Test Data through Model-Based Mutation Analysis (DDN, FP, LCB), pp. 1–10.
- ISSTA-2015-DimjasevicG #assurance #generative #runtime #testing #verification
- Test-case generation for runtime analysis and vice versa: verification of aircraft separation assurance (MD, DG), pp. 282–292.
- ISSTA-2015-HuangDMD #android #precise #scalability
- Scalable and precise taint analysis for Android (WH, YD, AM, JD), pp. 106–117.
- ISSTA-2015-QiLAR #correctness #generative
- An analysis of patch plausibility and correctness for generate-and-validate patch generation systems (ZQ, FL, SA, MCR), pp. 24–36.
- SAT-2015-FalknerLH #automation #named #performance #satisfiability
- SpySMAC: Automated Configuration and Performance Analysis of SAT Solvers (SF, MTL, FH), pp. 215–222.
- TAP-2015-GrinchteinCP #constraints #optimisation #protocol
- A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
- VMCAI-2015-BackesR #abstraction #clustering #graph transformation #infinity
- Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction (PB, JR), pp. 135–152.
- VMCAI-2015-NagarS #using
- Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
- VMCAI-2015-PrabhakarS #abstraction #hybrid
- Foundations of Quantitative Predicate Abstraction for Stability Analysis of Hybrid Systems (PP, MGS), pp. 318–335.
- ECSA-2014-BerardinelliMP #design #network #performance
- fUML-Driven Design and Performance Analysis of Software Agents for Wireless Sensor Network (LB, ADM, SP), pp. 324–339.
- WICSA-2014-FuZBX
- A Recoverability-Oriented Analysis for Operations on Cloud Applications (MF, LZ, LB, XX), pp. 125–128.
- DocEng-2014-DiemKS #classification #documentation
- Ruling analysis and classification of torn documents (MD, FK, RS), pp. 63–72.
- DocEng-2014-KolbergFRF #documentation #performance #throughput #using
- JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
- DRR-2014-FengLLLT #geometry
- Structure analysis for plane geometry figures (TF, XL, LL, KL, ZT), p. ?–11.
- DRR-2014-LiPLD #online #verification
- On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
- DRR-2014-LiuWTLG #automation #comprehension #image
- Automatic comic page image understanding based on edge segment analysis (DL, YW, ZT, LL, LG), p. ?–12.
- HT-2014-KimWWO #multi #twitter
- Sociolinguistic analysis of Twitter in multilingual societies (SK, IW, LW, AHO), pp. 243–248.
- HT-2014-ZhangBR #empirical #network #social #social media
- Empirical analysis of implicit brand networks on social media (KZ, SB, SR), pp. 190–199.
- JCDL-2014-Dallmeier-TiessenLHRKN #comparative #data transformation #workflow
- A comparative analysis of disciplinary data management workflows (SDT, AL, PH, LR, RK, EN), pp. 281–284.
- JCDL-2014-KanhabuaNN #memory management #scalability #what #wiki
- What triggers human remembering of events? A large-scale analysis of catalysts for collective memory in Wikipedia (NK, TNN, CN), pp. 341–350.
- JCDL-2014-KimuraM #documentation
- Method for supporting analysis of personal relationships through place names extracted from documents (FK, AM), pp. 253–256.
- JCDL-2014-MajidiC #dependence #fault #parsing
- Human and machine error analysis on dependency parsing of ancient Greek texts (SM, GRC), pp. 221–224.
- JCDL-2014-TakanoSIHT #behaviour #classification #documentation #towards
- Microscopic analysis of document handling while reading: Classification of behavior toward paper document (KT, HS, JI, TH, ST), pp. 445–446.
- JCDL-2014-ZhouTG #scalability #web
- Extraction and analysis of referenced web links in large-scale scholarly articles (KZ, RT, CG), pp. 451–452.
- PODS-2014-Cohen #graph #sketching
- All-distances sketches, revisited: HIP estimators for massive graphs analysis (EC), pp. 88–99.
- PODS-2014-NgoNRR #worst-case
- Beyond worst-case analysis for joins with minesweeper (HQN, DTN, CR, AR), pp. 234–245.
- SIGMOD-2014-Musleh #twitter #visual notation
- Spatio-temporal visual analysis for event-specific tweets (MM), pp. 1611–1612.
- SIGMOD-2014-ZhuGCL #clustering #graph #sentiment #social #social media
- Tripartite graph clustering for dynamic sentiment analysis on social media (LZ, AG, JC, KL), pp. 1531–1542.
- VLDB-2014-DeutchMT #framework #process
- A Provenance Framework for Data-Dependent Process Analysis (DD, YM, VT), pp. 457–468.
- VLDB-2014-JacobKS
- A System for Management and Analysis of Preference Data (MJ, BK, JS), pp. 1255–1258.
- VLDB-2014-ZhangTCO #data transformation #in memory #performance
- Efficient In-memory Data Management: An Analysis (HZ, BMT, GC, BCO), pp. 833–836.
- CSEET-2014-Steppe #dependence #design #education #graph #using
- Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
- EDM-2014-GalyardtG
- Recent-Performance Factors Analysis (AG, IMG), pp. 411–412.
- EDM-2014-GerykP #student #using #visual notation
- Analysis of Student Retention and Drop-out using Visual Analytics (JG, LP), pp. 331–332.
- EDM-2014-KaserKG #learning #parametricity #predict
- Different parameters - same prediction: An analysis of learning curves (TK, KRK, MHG), pp. 52–59.
- EDM-2014-MorganBR #fault #learning #validation
- Error Analysis as a Validation of Learning Progressions (BM, WB, VR), pp. 245–248.
- EDM-2014-SnowVM #learning
- Tracking Choices: Computational Analysis of Learning Trajectories (ELS, LKV, DSM), pp. 316–319.
- EDM-2014-WatanabeOK #behaviour #student
- Analysis and extraction of behaviors by students in lectures (EW, TO, TK), pp. 329–330.
- EDM-2014-WenYR #question #sentiment #what
- Sentiment Analysis in MOOC Discussion Forums: What does it tell us? (MW, DY, CPR), pp. 130–137.
- ITiCSE-2014-FerreiraM #algorithm #design #education #using
- The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
- ITiCSE-2014-KohNBR #validation
- Early validation of computational thinking pattern analysis (KHK, HN, ARB, AR), pp. 213–218.
- SIGITE-2014-JacksonEC #contest #performance #programming
- An analysis of team performance in high school programming contests (SJ, HJCE, RC), pp. 27–32.
- SIGITE-2014-PeltsvergerZ #education #security
- Bottleneck analysis with NetKit: teaching information security with hands-on labs (SP, CZ), pp. 45–50.
- SIGITE-2014-VihavainenLI #source code
- Analysis of source code snapshot granularity levels (AV, ML, PI), pp. 21–26.
- CSMR-WCRE-2014-AlalfiCD #clustering #experience #industrial
- Analysis and clustering of model clones: An automotive industrial experience (MHA, JRC, TRD), pp. 375–378.
- CSMR-WCRE-2014-SantosVA #clustering #semantics #using
- Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
- ICPC-2014-BinkleyHLO #comprehension #source code
- Understanding LDA in source code analysis (DB, DH, DJL, JO), pp. 26–36.
- ICSME-2014-ChaikalisLMC #evolution #named
- SEAgle: Effortless Software Evolution Analysis (TC, EL, GM, AC), pp. 581–584.
- ICSME-2014-KlattKS #dependence
- Program Dependency Analysis for Consolidating Customized Product Copies (BK, KK, CS), pp. 496–500.
- ICSME-2014-LandmanSV #corpus #empirical #java #scalability
- Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods (DL, AS, JJV), pp. 221–230.
- ICSME-2014-MondalRS #fine-grained
- A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code (MM, CKR, KAS), pp. 51–60.
- ICSME-2014-Muske #clustering #overview
- Improving Review of Clustered-Code Analysis Warnings (TM), pp. 569–572.
- ICSME-2014-SajnaniSOL #component #quality
- Is Popularity a Measure of Quality? An Analysis of Maven Components (HS, VS, JO, CVL), pp. 231–240.
- ICSME-2014-Stephan #clone detection #detection #evaluation #mutation testing #using
- Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
- ICSME-2014-TaoQ #concurrent #java #refactoring #source code
- Refactoring Java Concurrent Programs Based on Synchronization Requirement Analysis (BT, JQ), pp. 361–370.
- ICSME-2014-WongXZHZM #fault #locality #segmentation
- Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis (CPW, YX, HZ, DH, LZ, HM), pp. 181–190.
- MSR-2014-BloemenAKO #database #dependence #open source
- Innovation diffusion in open source software: preliminary analysis of dependency changes in the gentoo portage package database (RB, CA, SK, GOM), pp. 316–319.
- MSR-2014-FarahTC #architecture #named #quality #scalability
- OpenHub: a scalable architecture for the analysis of software quality attributes (GF, JST, DC), pp. 420–423.
- MSR-2014-GuzmanAL #commit #empirical #git #sentiment
- Sentiment analysis of commit comments in GitHub: an empirical study (EG, DA, YL), pp. 352–355.
- MSR-2014-MurgiaTAO #developer
- Do developers feel emotions? an exploratory analysis of emotions in software artifacts (AM, PT, BA, MO), pp. 262–271.
- MSR-2014-PleteaVS #git #security #sentiment
- Security and emotion: sentiment analysis of security discussions on GitHub (DP, BV, AS), pp. 348–351.
- MSR-2014-SteidlHJ #incremental #source code
- Incremental origin analysis of source code files (DS, BH, EJ), pp. 42–51.
- SCAM-2014-CaiJSZZ #named #predict
- SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction (HC, SJ, RAS, YJZ, YZ), pp. 165–174.
- SCAM-2014-HutchinsBS #c #c++ #concurrent #safety #thread
- C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
- SCAM-2014-LiangSM #performance
- Fast Flow Analysis with Godel Hashes (SL, WS, MM), pp. 225–234.
- SCAM-2014-LiangSMKH #automaton #exception
- Pruning, Pushdown Exception-Flow Analysis (SL, WS, MM, AWK, DVH), pp. 265–274.
- SCAM-2014-TengeriBHG #repository #test coverage #testing #tool support
- Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
- SCAM-2014-YadegariD
- Bit-Level Taint Analysis (BY, SD), pp. 255–264.
- ICALP-v1-2014-DosaS
- Optimal Analysis of Best Fit Bin Packing (GD, JS), pp. 429–441.
- LATA-2014-FelgenhauerT #automaton #reachability
- Reachability Analysis with State-Compatible Automata (BF, RT), pp. 347–359.
- LATA-2014-SeidlK #data flow #interprocedural #xml
- Interprocedural Information Flow Analysis of XML Processors (HS, MK), pp. 34–61.
- FM-2014-AntoninoSW #concurrent #csp #network #process #refinement
- A Refinement Based Strategy for Local Deadlock Analysis of Networks of CSP Processes (PRGA, AS, JW), pp. 62–77.
- FM-2014-BaeOM #multi #semantics
- Definition, Semantics, and Analysis of Multirate Synchronous AADL (KB, PCÖ, JM), pp. 94–109.
- FM-2014-ButinM
- Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
- FM-2014-ForejtKNS #communication #precise #predict #source code
- Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs (VF, DK, GN, SS), pp. 263–278.
- FM-2014-KordyLMP #algorithm #automaton #robust
- A Symbolic Algorithm for the Analysis of Robust Timed Automata (PK, RL, SM, JWP), pp. 351–366.
- FM-2014-LakshmiAK #liveness #reachability #using
- Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
- FM-2014-LiuGL #reliability
- MDP-Based Reliability Analysis of an Ambient Assisted Living System (YL, LG, YL), pp. 688–702.
- FM-2014-WenMM #formal method #information management #towards
- Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
- IFM-2014-BruniSNN #protocol #security
- Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
- IFM-2014-CalvaneseKSVZ #data type
- Shape and Content — A Database-Theoretic Perspective on the Analysis of Data Structures (DC, TK, MS, HV, FZ), pp. 3–17.
- IFM-2014-GilmoreTV #evaluation
- An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems (SG, MT, AV), pp. 71–86.
- IFM-2014-RamsdellDGR #hybrid #protocol #security
- A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
- RTA-TLCA-2014-HirokawaM #automation #complexity
- Automated Complexity Analysis Based on Context-Sensitive Rewriting (NH, GM), pp. 257–271.
- RTA-TLCA-2014-LiuDJ #confluence
- Confluence by Critical Pair Analysis (JL, ND, JPJ), pp. 287–302.
- RTA-TLCA-2014-Schmidt-Schauss #concurrent #programming language #semantics
- Concurrent Programming Languages and Methods for Semantic Analyses (MSS), pp. 21–30.
- SEFM-2014-BeckerSAB #constraints #deployment #fault tolerance #formal method
- A Formal Model for Constraint-Based Deployment Calculation and Analysis for Fault-Tolerant Systems (KB, BS, MA, CB), pp. 205–219.
- SEFM-2014-GrovO #consistency #formal method #multi
- Increasing Consistency in Multi-site Data Stores: Megastore-CGC and Its Formal Analysis (JG, PCÖ), pp. 159–174.
- SFM-2014-BubelMH #execution #modelling
- Analysis of Executable Software Models (RB, AFM, RH), pp. 1–25.
- FLOPS-2014-HoffmannS #array #integer #type system
- Type-Based Amortized Resource Analysis with Integers and Arrays (JH, ZS), pp. 152–168.
- ICFP-2014-ChenE #parametricity #product line #type system
- Type-based parametric analysis of program families (SC, ME), pp. 39–51.
- ICFP-2014-KakiJ #framework #higher-order #relational
- A relational framework for higher-order shape analysis (GK, SJ), pp. 311–324.
- IFL-2014-AdsitF #control flow #performance #system f
- An Efficient Type- and Control-Flow Analysis for System F (CA, MF), p. 3.
- ILC-2014-LevineY #assessment #profiling
- Leadership Trait Analysis and Threat Assessment with Profiler Plus (NL, MY), p. 50.
- FDG-2014-Grace #estimation #game studies
- A linguistic analysis of games: Verbs and nouns for content estimation (LDG).
- FDG-2014-GrowGGMW #architecture #authoring #requirements #tool support
- A methodology for requirements analysis of AI architecture authoring tools (AG, SEG, PG, MM, NWF).
- FDG-2014-SiPT #automation #game studies #realtime
- Automated terrain analysis in real-time strategy games (CS, YP, CTT).
- GRAPHITE-2014-DelzannoRT #protocol
- Graph- versus Vector-Based Analysis of a Consensus Protocol (GD, AR, RT), pp. 44–57.
- GRAPHITE-2014-FernandezKP #framework #graph grammar #interactive #modelling
- Strategic Port Graph Rewriting: An Interactive Modelling and Analysis Framework (MF, HK, BP), pp. 15–29.
- CHI-2014-GoyalLCF #collaboration
- Effects of implicit sharing in collaborative analysis (NG, GL, DC, SRF), pp. 129–138.
- CHI-2014-LeeSS #bound #design #research
- Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
- CHI-2014-LiuGFXHK
- CHI 1994-2013: mapping two decades of intellectual progress through co-word analysis (YL, JG, DF, BX, SH, VK), pp. 3553–3562.
- CHI-2014-Smith #comprehension #game studies #generative
- Understanding procedural content generation: a design-centric analysis of the role of PCG in games (GS), pp. 917–926.
- CHI-2014-XuYRFHB #exclamation
- Show me the money!: an analysis of project updates during crowdfunding campaigns (AX, XY, HR, WTF, SWH, BPB), pp. 591–600.
- CSCW-2014-BackstromK #facebook #network #social
- Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook (LB, JMK), pp. 831–841.
- CSCW-2014-KangKK #collaboration #information management #tool support
- Teammate inaccuracy blindness: when information sharing tools hinder collaborative analysis (RK, AK, SBK), pp. 797–806.
- DHM-2014-ItoTGK #research
- Research on Senior Response to Transfer Assistance between Wheelchair and Bed — EEG Analysis (MI, YT, AG, NK), pp. 558–566.
- DHM-2014-KarlovicPMSRRS #case study #comparison
- Analysis and Comparison of Ergonomics in Laparoscopic and Open Surgery — A Pilot Study (KK, SP, TM, KDS, RR, MAR, BS), pp. 273–281.
- DHM-2014-MirandaRV #development #memory management #mobile #testing
- Analysis of Luria Memory Tests for Development on Mobile Devices (JAHM, EHR, AMV), pp. 546–557.
- DHM-2014-OhgiriYYKH #comparison
- Comparison of Gait Analysis by the Way of Semi-structured Interviews (MO, KY, HY, NK, HH), pp. 43–54.
- DHM-2014-OkaGTNH
- Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
- DHM-2014-SugimotoYG
- Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, AG), pp. 66–77.
- DHM-2014-WongpatikasereeKT
- Context-Aware Posture Analysis in a Workstation-Oriented Office Environment (KW, HK, YT), pp. 148–159.
- DHM-2014-ZhouLXZZ #metric #parametricity
- Measurement and Analysis of Anthropometric Parameters of Young Male Vehicle Drivers (QXZ, ZQL, FX, SZ, SZ), pp. 174–181.
- DUXU-DI-2014-ChammasQM #design #interactive
- An Analysis of Design Methodologies of Interactive System for Mobiles (AC, MQ, CRM), pp. 213–222.
- DUXU-DI-2014-NovickVSG #empirical #game studies #usability
- Empirical Analysis of Playability vs. Usability in a Computer Game (DGN, JV, BS, IG), pp. 720–731.
- DUXU-DI-2014-ShafiqICRAAR #case study #learning #smarttech #usability #user satisfaction #what
- To What Extent System Usability Effects User Satisfaction: A Case Study of Smart Phone Features Analysis for Learning of Novice (MS, MI, JGC, ZR, MA, WA, SR), pp. 346–357.
- DUXU-DP-2014-BarrosSF14a #artificial reality #evaluation #using
- Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
- DUXU-DP-2014-SilvaPS #concept #using
- Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
- DUXU-TMT-2014-FilippiB #aspect-oriented #functional #human-computer #interactive #nondeterminism
- In-Depth Analysis of Non-deterministic Aspects of Human-Machine Interaction and Update of Dedicated Functional Mock-Ups (SF, DB), pp. 185–196.
- DUXU-TMT-2014-NieminenRTN #collaboration #industrial #information management
- Collaboration Space for Creative Knowledge Work — Analysis of Industrial Pilots (MPN, MR, MT, MN), pp. 653–662.
- DUXU-TMT-2014-QuaresmaG #smarttech #usability
- Usability Analysis of Smartphone Applications for Drivers (MQ, RCG), pp. 352–362.
- DUXU-TMT-2014-Tao #identification #user interface
- Grammatical Analysis of User Interface Events for Task Identification (YT), pp. 197–205.
- HCI-AS-2014-FerreiraB #elicitation #people #requirements #semantics
- Eliciting Accessibility Requirements for People with Hearing Loss: A Semantic and Norm Analysis (MAMF, RB), pp. 277–288.
- HCI-AS-2014-HooeyABF #design #fault
- Evidence-Based Error Analysis: Supporting the Design of Error-Tolerant Systems (BLH, MA, RB, DCF), pp. 401–412.
- HCI-AS-2014-LandyLNPLM #comparative #development #predict
- Finding Directions to a Good GPS System — A Comparative Analysis and Development of a Predictive Model (JL, TL, NN, PP, EL, PM), pp. 454–465.
- HCI-AS-2014-RafalakBW #evaluation
- Analysis of Demographical Factors’ Influence on Websites’ Credibility Evaluation (MR, PB, AW), pp. 57–68.
- HIMI-AS-2014-Coelho
- Association of CCR and BCC Efficiencies to Market Variables in a Retrospective Two Stage Data Envelope Analysis (DAC), pp. 151–159.
- HIMI-AS-2014-JangKJS #framework #reliability
- A Framework of Human Reliability Analysis Method Considering Soft Control in Digital Main Control Rooms (IJ, ARK, WJ, PHS), pp. 335–346.
- HIMI-AS-2014-TanikawaA #overview
- User Analysis and Questionnaire Survey (MT, YA), pp. 489–497.
- HIMI-DE-2014-KimitaNS #education
- Application of a Requirement Analysis Template to Lectures in a Higher Education Institution (KK, YN, YS), pp. 594–601.
- HIMI-DE-2014-LinKT #collaboration #design #learning
- A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
- HIMI-DE-2014-NazemiRKK #adaptation #similarity #visualisation
- User Similarity and Deviation Analysis for Adaptive Visualizations (KN, WR, JK, AK), pp. 64–75.
- LCT-NLE-2014-BrayshawGNWB #case study #evaluation #heuristic
- Investigating Heuristic Evaluation as a Methodology for Evaluating Pedagogical Software: An Analysis Employing Three Case Studies (MB, NG, JTN, LW, AB), pp. 25–35.
- LCT-NLE-2014-IbanezN #architecture #interactive
- An Interactive Installation for the Architectural Analysis of Space and Form in Historical Buildings (LAHI, VBN), pp. 43–52.
- LCT-NLE-2014-Jo0L #empirical #people
- Empirical Analysis of Changes in Human Creativity in People Who Work with Humanoid Robots and Their Avatars (DJ, JGL, KCL), pp. 273–281.
- SCSM-2014-AhangamaLKP #mobile #monitoring
- Revolutionizing Mobile Healthcare Monitoring Technology: Analysis of Features through Task Model (SA, YSL, SYK, DCCP), pp. 298–305.
- SCSM-2014-AhnMHNHPM #network #representation #semantics #social #twitter
- Social Network Representation and Dissemination of Pre-Exposure Prophylaxis (PrEP): A Semantic Network Analysis of HIV Prevention Drug on Twitter (ZA, MM, JH, YN, CWH, MP, JM), pp. 160–169.
- SCSM-2014-IoannidisPKKFA #named #social #social media
- SONETA: A Social Media Geo-Trends Analysis Tool (II, EP, CK, NK, CF, NMA), pp. 186–196.
- SCSM-2014-LopesMP #social #web
- Virtual Homage to the Dead: An Analysis of Digital Memorials in the Social Web (ADL, CM, VCP), pp. 67–78.
- SCSM-2014-MendesFFC #classification #how #social #using
- How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
- VISSOFT-2014-VoineaT #visual notation
- Visual Clone Analysis with SolidSDD (LV, ACT), pp. 79–82.
- CAiSE-2014-NobauerSG #approach #automation #evaluation #product line #similarity
- Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
- CAiSE-2014-RuizCEFP #information management #process
- Integrating the Goal and Business Process Perspectives in Information System Analysis (MR, DC, SE, XF, OP), pp. 332–346.
- EDOC-2014-FlorezSV #approach #automation #enterprise #modelling
- Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
- EDOC-2014-Franke #architecture #enterprise
- Enterprise Architecture Analysis with Production Functions (UF), pp. 52–60.
- EDOC-2014-MukkamalaHV #sentiment #social
- Fuzzy-Set Based Sentiment Analysis of Big Social Data (RRM, AH, RKV), pp. 71–80.
- EDOC-2014-NardiFA #modelling #ontology
- An Ontological Analysis of Service Modeling at ArchiMate’s Business Layer (JCN, RdAF, JPAA), pp. 92–100.
- ICEIS-v1-2014-TimoteoVF #case study #dataset #network #project management
- Evaluating Artificial Neural Networks and Traditional Approaches for Risk Analysis in Software Project Management — A Case Study with PERIL Dataset (CT, MV, SF), pp. 472–479.
- ICEIS-v2-2014-BeenK #approach #internet #online #people
- Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
- ICEIS-v2-2014-HernandesTTF #mining #using #visualisation
- Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
- ICEIS-v2-2014-HoosGKM #framework #identification #mobile #process
- Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
- ICEIS-v2-2014-ProcaciSA #community #metric #online #people #reduction #reliability
- Finding Reliable People in Online Communities of Questions and Answers — Analysis of Metrics and Scope Reduction (TBP, SWMS, LCVdA), pp. 526–535.
- ICEIS-v2-2014-VieiraJF #network
- A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
- ICEIS-v3-2014-AlvesVS #architecture
- Architecture Principles Compliance Analysis (JA, AV, PS), pp. 328–334.
- ICEIS-v3-2014-NaranjoSV #architecture #enterprise #named
- PRIMROSe — A Tool for Enterprise Architecture Analysis and Diagnosis (DN, MES, JV), pp. 201–213.
- CIKM-2014-ArapakisLV #comprehension #gesture
- Understanding Within-Content Engagement through Pattern Analysis of Mouse Gestures (IA, ML, GV), pp. 1439–1448.
- CIKM-2014-CarmelMPS #community #using
- Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
- CIKM-2014-JiaDGZ #community #network
- Analysis on Community Variational Trend in Dynamic Networks (XJ, ND, JG, AZ), pp. 151–160.
- CIKM-2014-LinJXWCW #sentiment
- A Cross-Lingual Joint Aspect/Sentiment Model for Sentiment Analysis (ZL, XJ, XX, WW, XC, YW), pp. 1089–1098.
- CIKM-2014-MengCS #approximate #keyword #query #semantics
- Semantic Approximate Keyword Query Based on Keyword and Query Coupling Relationship Analysis (XM, LC, JS), pp. 529–538.
- CIKM-2014-PhanDXPK #health #network #physics #process #social
- Analysis of Physical Activity Propagation in a Health Social Network (NP, DD, XX, BP, DK), pp. 1329–1338.
- CIKM-2014-RahimiSK #axiom #information retrieval
- Axiomatic Analysis of Cross-Language Information Retrieval (RR, AS, IK), pp. 1875–1878.
- CIKM-2014-RosenthalJ #enterprise
- Enterprise Discussion Analysis (SR, AJ), pp. 1967–1970.
- CIKM-2014-ShangLCC #component #robust
- Robust Principal Component Analysis with Missing Data (FS, YL, JC, HC), pp. 1149–1158.
- CIKM-2014-SpirinHDKB #facebook #graph #network #online #people #query #scalability #social
- People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs (NVS, JH, MD, KGK, MB), pp. 1009–1018.
- CIKM-2014-TaoIWS #canonical #correlation
- Exploring Shared Subspace and Joint Sparsity for Canonical Correlation Analysis (LT, HHSI, YW, XS), pp. 1887–1890.
- CIKM-2014-TaxidouF #agile #information management #named #realtime #twitter
- RApID: A System for Real-time Analysis of Information Diffusion in Twitter (IT, PMF), pp. 2060–2062.
- CIKM-2014-WilkieA #bias #performance #retrieval
- A Retrievability Analysis: Exploring the Relationship Between Retrieval Bias and Retrieval Performance (CW, LA), pp. 81–90.
- CIKM-2014-YilmazVCRB #documentation
- Relevance and Effort: An Analysis of Document Utility (EY, MV, NC, FR, PB), pp. 91–100.
- ECIR-2014-MonizJ #sentiment
- Sentiment Analysis and the Impact of Employee Satisfaction on Firm Earnings (AM, FdJ), pp. 519–527.
- ECIR-2014-WilkieA #bias #empirical #retrieval
- Best and Fairest: An Empirical Analysis of Retrieval System Bias (CW, LA), pp. 13–25.
- ICML-c1-2014-MillerBAG #process
- Factorized Point Process Intensities: A Spatial Analysis of Professional Basketball (AM, LB, RPA, KG), pp. 235–243.
- ICML-c1-2014-TangMNMZ #comprehension #modelling #topic
- Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis (JT, ZM, XN, QM, MZ), pp. 190–198.
- ICML-c2-2014-Lopez-PazSSGS #component #random
- Randomized Nonlinear Component Analysis (DLP, SS, AJS, ZG, BS), pp. 1359–1367.
- ICML-c2-2014-MukutaH #canonical #correlation #probability
- Probabilistic Partial Canonical Correlation Analysis (YM, TH), pp. 1449–1457.
- ICML-c2-2014-NguyenMVEB #correlation #multi
- Multivariate Maximal Correlation Analysis (HVN, EM, JV, PE, KB), pp. 775–783.
- ICML-c2-2014-NieYH #component #robust
- Optimal Mean Robust Principal Component Analysis (FN, JY, HH), pp. 1062–1070.
- ICML-c2-2014-SatoKN #normalisation
- Latent Confusion Analysis by Normalized Gamma Construction (IS, HK, HN), pp. 1116–1124.
- ICML-c2-2014-SatoN #approximate #equation #probability #process #using
- Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
- ICML-c2-2014-SunZZ #convergence
- A Convergence Rate Analysis for LogitBoost, MART and Their Variant (PS, TZ, JZ), pp. 1251–1259.
- ICML-c2-2014-TaylorGP #approximate #linear #programming
- An Analysis of State-Relevance Weights and Sampling Distributions on L1-Regularized Approximate Linear Programming Approximation Accuracy (GT, CG, DP), pp. 451–459.
- ICML-c2-2014-ToulisAR #linear #modelling #probability #statistics
- Statistical analysis of stochastic gradient methods for generalized linear models (PT, EA, JR), pp. 667–675.
- ICML-c2-2014-TuZWQ #scalability
- Making Fisher Discriminant Analysis Scalable (BT, ZZ, SW, HQ), pp. 964–972.
- ICML-c2-2014-ZhaoMXZZ #component #robust
- Robust Principal Component Analysis with Complex Noise (QZ, DM, ZX, WZ, LZ), pp. 55–63.
- ICPR-2014-AhmadKM
- Computer Assisted Analysis System of Electroencephalogram for Diagnosing Epilepsy (MAA, NAK, WM), pp. 3386–3391.
- ICPR-2014-AndreuLMG #automation #classification #gender #image
- Analysis of the Effect of Image Resolution on Automatic Face Gender Classification (YA, JLC, RAM, PGS), pp. 273–278.
- ICPR-2014-ArvanitopoulosBT #learning
- Laplacian Support Vector Analysis for Subspace Discriminative Learning (NA, DB, AT), pp. 1609–1614.
- ICPR-2014-BauckhageM #clustering #kernel #web
- Kernel Archetypal Analysis for Clustering Web Search Frequency Time Series (CB, KM), pp. 1544–1549.
- ICPR-2014-BiswasZLMV #detection #image #using
- Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
- ICPR-2014-ChengY
- Nighttime Traffic Flow Analysis for Rain-Drop Tampered Cameras (HYC, CCY), pp. 714–719.
- ICPR-2014-ChenYJ #feature model #linear #robust
- An Improved Linear Discriminant Analysis with L1-Norm for Robust Feature Extraction (XC, JY, ZJ), pp. 1585–1590.
- ICPR-2014-DengHXC #composition #matrix #rank
- Sparse and Low Rank Matrix Decomposition Based Local Morphological Analysis and Its Application to Diagnosis of Cirrhosis Livers (JD, XHH, GX, YWC), pp. 3363–3368.
- ICPR-2014-FernandezT #documentation #layout
- EM-Based Layout Analysis Method for Structured Documents (FCF, ORT), pp. 315–320.
- ICPR-2014-Hess-FloresRJ #multi #nondeterminism
- Uncertainty, Baseline, and Noise Analysis for L1 Error-Based Multi-view Triangulation (MHF, SR, KIJ), pp. 4074–4079.
- ICPR-2014-HongZP #estimation #image
- Pose Estimation via Complex-Frequency Domain Analysis of Image Gradient Orientations (XH, GZ, MP), pp. 1740–1745.
- ICPR-2014-HuDGX #distance #reduction
- Max-K-Min Distance Analysis for Dimension Reduction (JH, WD, JG, YX), pp. 726–731.
- ICPR-2014-KrytheL #linear
- Implicitly Constrained Semi-supervised Linear Discriminant Analysis (JHK, ML), pp. 3762–3767.
- ICPR-2014-KurtekS #segmentation #using
- Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
- ICPR-2014-LinCCLH #detection
- Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
- ICPR-2014-LinH #using
- Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
- ICPR-2014-LiuS
- Discriminative Partition Sparsity Analysis (LL, LS), pp. 1597–1602.
- ICPR-2014-LiuXYZ
- Texture Analysis with Shape Co-occurrence Patterns (GL, GSX, WY, LZ), pp. 1627–1632.
- ICPR-2014-LiWQXG #estimation
- Confidence Estimation and Reputation Analysis in Aspect Extraction (YL, HW, ZQ, WX, JG), pp. 3612–3617.
- ICPR-2014-MoilanenZP #agile #difference #using
- Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
- ICPR-2014-MollerPB #quantifier #using
- Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
- ICPR-2014-MoriKO #collaboration #framework #online #platform #search-based
- Search-Based Content Analysis System on Online Collaborative Platform for Film Production (MM, HK, MO), pp. 1091–1096.
- ICPR-2014-OhPKHB #image #personalisation #social
- Personalized Economy of Images in Social Forums: An Analysis on Supply, Consumption, and Saliency (SO, MP, IK, AH, JB), pp. 2011–2016.
- ICPR-2014-OkadaFWP #random
- Microenvironment-Based Protein Function Analysis by Random Forest (KO, LF, MW, DP), pp. 3138–3143.
- ICPR-2014-OnalAVFOOY #modelling
- Modeling the Brain Connectivity for Pattern Analysis (IO, EA, BV, OF, MO, IÖ, FTYV), pp. 3339–3344.
- ICPR-2014-SariE #detection #fault #independence #using
- Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
- ICPR-2014-SeckDT #3d #geometry #using
- 3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
- ICPR-2014-SlitiHBA #robust #using
- A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
- ICPR-2014-TavakoliYRHS #eye tracking #recognition
- Emotional Valence Recognition, Analysis of Salience and Eye Movements (HRT, VY, ER, JH, NS), pp. 4666–4671.
- ICPR-2014-TuXN #detection #process
- Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
- ICPR-2014-WangGLYWY #canonical #correlation
- Unsupervised Discriminant Canonical Correlation Analysis for Feature Fusion (SW, XG, JL, JYY, RW, JY), pp. 1550–1555.
- ICPR-2014-WatanabeW #component #distance #learning #metric #performance
- Logistic Component Analysis for Fast Distance Metric Learning (KW, TW), pp. 1278–1282.
- ICPR-2014-YanRLSS #clustering #invariant #linear #multi #recognition
- Clustered Multi-task Linear Discriminant Analysis for View Invariant Color-Depth Action Recognition (YY, ER, GL, RS, NS), pp. 3493–3498.
- ICPR-2014-YeWH #component #graph
- Graph Characterization from Entropy Component Analysis (CY, RCW, ERH), pp. 3845–3850.
- ICPR-2014-ZhangWGZZ #using #verification
- Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
- KDD-2014-AkibaMK #network
- Network structural analysis via core-tree-decomposition Publication of this article pending inquiry (TA, TM, KiK), pp. 1476–1485.
- KDD-2014-JiangCWXZY #behaviour #flexibility #multi #named
- FEMA: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery (MJ, PC, FW, XX, WZ, SY), pp. 1186–1195.
- KDD-2014-LanSB #learning
- Time-varying learning and content analytics via sparse factor analysis (ASL, CS, RGB), pp. 452–461.
- KDD-2014-TamhaneISDA #predict #risk management #student
- Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
- KDD-2014-YuH0 #detection #named #social #social media
- GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
- KDD-2014-ZhuSY #mining #network #social
- Network mining and analysis for social applications (FZ, HS, XY), p. 1974.
- KDIR-2014-CastelltortL #graph
- NoSQL Graph-based OLAP Analysis (AC, AL), pp. 217–224.
- KDIR-2014-HafethAC #case study #classification
- Text Analysis of User-Generated Contents for Health-care Applications — Case Study on Smoking Status Classification (DAH, AA, DC), pp. 242–249.
- KDIR-2014-LiuF #classification #sentiment #topic #web
- Web Content Classification based on Topic and Sentiment Analysis of Text (SL, TF), pp. 300–307.
- KDIR-2014-LiuF14a #classification #n-gram #sentiment #similarity #web
- Combining N-gram based Similarity Analysis with Sentiment Analysis in Web Content Classification (SL, TF), pp. 530–537.
- KDIR-2014-PsomakelisTAV #sentiment #twitter
- Comparing Methods for Twitter Sentiment Analysis (EP, KT, DA, TAV), pp. 225–232.
- KDIR-2014-WanJLL #challenge #sentiment #web
- Sentimental Analysis of Web Financial Reviews — Opportunities and Challenges (CW, TJ, DL, GL), pp. 366–373.
- KEOD-2014-AzaiezA #how #question #towards
- How to Guarantee Analysis Results Coherence after Data Warehouse Schema Changes Propagation towards Data Marts? (NA, JA), pp. 428–435.
- KR-2014-BhattST #architecture #design #experience #industrial #user interface
- Computing Narratives of Cognitive User Experience for Building Design Analysis: KR for Industry Scale Computer-Aided Architecture Design (MB, CPLS, MT).
- KR-2014-Delgrande #towards
- Towards a Knowledge Level Analysis of Forgetting (JPD).
- RecSys-2014-NoiaORTS #recommendation #towards
- An analysis of users’ propensity toward diversity in recommendations (TDN, VCO, JR, PT, EDS), pp. 285–288.
- SEKE-2014-BarnesL #clustering
- Text-Based Clustering and Analysis of Intelligent Argumentation Data (ECB, XFL), pp. 422–425.
- SEKE-2014-El-KharboutlyGF #security
- Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
- SEKE-2014-Garcia-NunesSZB #collaboration #fuzzy #modelling
- Mental models analysis based on fuzzy rules for collaborative decision-making (PIGN, AES, ACZ, GB), pp. 695–700.
- SEKE-2014-PaikariF #design #implementation #simulation
- Analysis, Design and Implementation of an Agent Based System for Simulating Connected Vehicles (EP, BHF), pp. 338–343.
- SEKE-2014-SchotsRS #performance #process
- A Body of Knowledge for Executing Performance Analysis of Software Processes (NCLS, ARR, GS), pp. 560–565.
- SEKE-2014-VianaCS #information management
- Knowledge Transfer between Senior and Novice Software Engineers: A Qualitative Analysis (DV, TC, CRBdS), pp. 235–240.
- SEKE-2014-WangC #approach #social #visualisation
- User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
- SEKE-2014-WanZWS #graph #performance #points-to
- Efficient Points-To Analysis for Partial Call Graph Construction (ZW, BZ, YW, YS), pp. 416–421.
- SEKE-2014-YangWSFC #debugging #fault
- Bug Inducing Analysis to Prevent Fault Prone Bug Fixes (HY, CW, QS, YF, ZC), pp. 620–625.
- SIGIR-2014-FangZ #axiom #information retrieval #modelling #optimisation
- Axiomatic analysis and optimization of information retrieval models (HF, CZ), p. 1288.
- SIGIR-2014-GoeuriotKL #information retrieval #query
- An analysis of query difficulty for information retrieval in the medical domain (LG, LK, JL), pp. 1007–1010.
- SIGIR-2014-LourencoVPMFP #sentiment
- Economically-efficient sentiment stream analysis (RLdOJ, AV, AMP, WMJ, RF, SP), pp. 637–646.
- SIGIR-2014-PelejaSM #sentiment
- Reputation analysis with a ranked sentiment-lexicon (FP, JS, JM), pp. 1207–1210.
- SIGIR-2014-TsolmonL #modelling #timeline
- An event extraction model based on timeline and user analysis in Latent Dirichlet allocation (BT, KSL), pp. 1187–1190.
- SIGIR-2014-UstaAVOU #education #how #learning #student
- How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
- SIGIR-2014-ZhangL0ZLM #modelling #recommendation #sentiment
- Explicit factor models for explainable recommendation based on phrase-level sentiment analysis (YZ, GL, MZ, YZ, YL, SM), pp. 83–92.
- ECMFA-2014-Moreno-DelgadoDZT #composition #domain-specific language #flexibility
- Modular DSLs for Flexible Analysis: An e-Motions Reimplementation of Palladio (AMD, FD, SZ, JT), pp. 132–147.
- ICMT-2014-GonzalezC #constraints #generative #model transformation #testing
- Test Data Generation for Model Transformations Combining Partition and Constraint Analysis (CAG, JC), pp. 25–41.
- ICMT-2014-GuanaS
- ChainTracker, a Model-Transformation Trace Analysis Tool for Code-Generation Environments (VG, ES), pp. 146–153.
- SPLC-2014-DomisSGAK #case study #experience #industrial #reuse
- Customizing domain analysis for assessing the reuse potential of industrial software systems: experience report (DD, SS, TG, MA, HK), pp. 310–319.
- ECOOP-2014-LiT #fault #python #source code
- Finding Reference-Counting Errors in Python/C Programs with Affine Analysis (SL, GT), pp. 80–104.
- ECOOP-2014-WeiR #behaviour #javascript #points-to
- State-Sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects (SW, BGR), pp. 1–26.
- OOPSLA-2014-NazareMSBGP #memory management #validation
- Validation of memory accesses through symbolic analyses (HN, IM, WS, LB, LG, FMQP), pp. 791–809.
- OOPSLA-2014-ZhangXZYS #alias #c #performance
- Efficient subcubic alias analysis for C (QZ, XX, CZ, HY, ZS), pp. 829–845.
- AdaEurope-2014-QamhiehM #graph #multi #scheduling
- Schedulability Analysis for Directed Acyclic Graphs on Multiprocessor Systems at a Subtask Level (MQ, SM), pp. 119–133.
- PEPM-2014-HanusS #composition #functional #logic programming #source code
- A modular and generic analysis server system for functional logic programs (MH, FS), pp. 181–188.
- PLDI-2014-ArztRFBBKTOM #android #named #precise
- FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
- PLDI-2014-BorgesFdPV #composition #probability #quantifier
- Compositional solution space quantification for probabilistic software analysis (MB, AF, Md, CSP, WV), p. 15.
- PLDI-2014-MitraLABSG #debugging #parallel #scalability
- Accurate application progress analysis for large-scale parallel debugging (SM, IL, DHA, SB, MS, TG), p. 23.
- PLDI-2014-SmaragdakisKB #context-sensitive grammar
- Introspective analysis: context-sensitivity, across the board (YS, GK, GB), p. 50.
- PLDI-2014-ZhangMGNY #abstraction #datalog #on the #refinement
- On abstraction refinement for program analyses in Datalog (XZ, RM, RG, MN, HY), p. 27.
- PLDI-2014-ZhangMNY #bottom-up #hybrid #interprocedural #top-down
- Hybrid top-down and bottom-up interprocedural analysis (XZ, RM, MN, HY), p. 28.
- POPL-2014-ChaudhuriFK #consistency #source code
- Consistency analysis of decision-making programs (SC, AF, ZK), pp. 555–568.
- POPL-2014-CoughlinC #composition #invariant
- Fissile type analysis: modular checking of almost everywhere invariants (DC, BYEC), pp. 73–86.
- POPL-2014-SergeyVJ #composition #higher-order #theory and practice
- Modular, higher-order cardinality analysis in theory and practice (IS, DV, SLPJ), pp. 335–348.
- SAS-2014-BakhirkinBP #abstraction #approximate
- Backward Analysis via over-Approximate Abstraction and under-Approximate Subtraction (AB, JB, NP), pp. 34–50.
- SAS-2014-CoxCR #automation #source code
- Automatic Analysis of Open Objects in Dynamic Language Programs (AC, BYEC, XR), pp. 134–150.
- SAS-2014-MadsenM #data flow #pointer #reachability
- Sparse Dataflow Analysis with Pointers and Reachability (MM, AM), pp. 201–218.
- SAS-2014-YeSX #pointer
- Region-Based Selective Flow-Sensitive Pointer Analysis (SY, YS, JX), pp. 319–336.
- RE-2014-AnishG #requirements
- Product knowledge configurator for requirements gap analysis and customizations (PRA, SG), pp. 437–443.
- RE-2014-BadgerTC #design #named #requirements #verification
- VARED: Verification and analysis of requirements and early designs (JMB, DT, CC), pp. 325–326.
- RE-2014-GuzmanM #fine-grained #how #sentiment
- How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews (EG, WM), pp. 153–162.
- RE-2014-MartinsO #case study #fault #functional #protocol #requirements #safety #using
- A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
- RE-2014-NguyenGA #automation #named #ontology #requirements
- GUITAR: An ontology-based automated requirements analysis tool (THN, JCG, MA), pp. 315–316.
- RE-2014-SaxenaC #agile #named #requirements
- Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements Engineering (SKS, RC), pp. 323–324.
- REFSQ-2014-AlebrahimFHM #interactive #problem #requirements
- Problem-Based Requirements Interaction Analysis (AA, SF, MH, RM), pp. 200–215.
- REFSQ-2014-NairVMTdB #problem #safety #traceability
- Safety Evidence Traceability: Problem Analysis and Model (SN, JLdlV, AM, GT, LdlB, FB), pp. 309–324.
- REFSQ-2014-RiegelD #elicitation #heuristic #optimisation #performance
- An Analysis of Priority-Based Decision Heuristics for Optimizing Elicitation Efficiency (NR, JD), pp. 268–284.
- REFSQ-2014-SannierB #approach #modelling #named #requirements
- INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
- REFSQ-2014-SethiaP #elicitation #empirical #performance #requirements
- The Effects of Requirements Elicitation Issues on Software Project Performance: An Empirical Analysis (NKS, ASP), pp. 285–300.
- REFSQ-2014-YangLJC #adaptation #modelling #overview #requirements #self
- A Systematic Literature Review of Requirements Modeling and Analysis for Self-adaptive Systems (ZY, ZL, ZJ, YC), pp. 55–71.
- ASE-2014-AbalBW #debugging #kernel #linux #variability
- 42 variability bugs in the linux kernel: a qualitative analysis (IA, CB, AW), pp. 421–432.
- ASE-2014-EllisHKLLLMM #automation #requirements
- Automated requirements analysis for a molecular watchdog timer (SJE, ERH, THK, JIL, JHL, RRL, DM, ASM), pp. 767–778.
- ASE-2014-MarasSC #named #reuse #web
- Firecrow: a tool for web application analysis and reuse (JM, MS, JC), pp. 847–850.
- ASE-2014-NearJ #interactive #named #security #web
- Derailer: interactive security analysis for web applications (JPN, DJ), pp. 587–598.
- ASE-2014-SeguraSC #automation #case study #e-commerce #experience #testing #variability
- Automated variability analysis and testing of an E-commerce site.: an experience report (SS, ABS, ARC), pp. 139–150.
- ASE-2014-TarvoR #automation #modelling #parallel #performance #source code #thread
- Automated analysis of multithreaded programs for performance modeling (AT, SPR), pp. 7–18.
- FSE-2014-DevroeyPCPLS #mutation testing #variability
- A variability perspective of mutation analysis (XD, GP, MC, MP, AL, PYS), pp. 841–844.
- FSE-2014-Gui00ND #agile #named #nondeterminism #reliability #tool support
- RaPiD: a toolkit for reliability analysis of non-deterministic systems (LG, JS, YL, TKN, JSD), pp. 727–730.
- FSE-2014-LerchHBM #named #performance #scalability
- FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases (JL, BH, EB, MM), pp. 98–108.
- FSE-2014-LuoHEM #empirical #testing
- An empirical analysis of flaky tests (QL, FH, LE, DM), pp. 643–653.
- FSE-2014-XiaoCK #architecture #named #quality #tool support
- Titan: a toolset that connects software architecture with quality analysis (LX, YC, RK), pp. 763–766.
- FSE-2014-Yang #network #open source #overview #perspective #social
- Social network analysis in open source software peer review (XY), pp. 820–822.
- ICSE-2014-AndroutsopoulosCDHH #fault #testing
- An analysis of the relationship between conditional entropy and failed error propagation in software testing (KA, DC, HD, RMH, MH), pp. 573–583.
- ICSE-2014-ArztB #data flow #incremental #named
- Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes (SA, EB), pp. 288–298.
- ICSE-2014-HuangMSZ #performance #testing
- Performance regression testing target prioritization via performance risk analysis (PH, XM, DS, YZ), pp. 60–71.
- ICSE-2014-NadiBKC #constraints #empirical #mining
- Mining configuration constraints: static analyses and empirical results (SN, TB, CK, KC), pp. 140–151.
- ICSE-2014-SuR #empirical #parametricity #probability
- Perturbation analysis of stochastic systems with empirical distribution parameters (GS, DSR), pp. 311–321.
- ICSE-2014-YaoHJ #case study #equivalence #using
- A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
- SAC-2014-AntunesBMBC #architecture #enterprise #ontology
- Ontology-based enterprise architecture model analysis (GA, MB, RM, JLB, AC), pp. 1420–1422.
- SAC-2014-ChangCHKL #behaviour #mobile
- Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
- SAC-2014-Chen #behaviour #coordination #energy #research #scheduling #student
- Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
- SAC-2014-EliasMFB #algorithm #memory management
- Experimental and theoretical analyses of memory allocation algorithms (DE, RM, MF, LBdA), pp. 1545–1546.
- SAC-2014-HalderZC #database #information management #query
- Information leakage analysis of database query languages (RH, MZ, AC), pp. 813–820.
- SAC-2014-HuangLD #delivery #modelling #multi #network #performance
- Modeling and analysis on network performance for cloud service delivery with multiple paths (JH, JL, QD), pp. 667–673.
- SAC-2014-HuangYKYLYGFQ #clustering #self
- Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles (HH, SY, KK, KGY, FL, DY, OG, AF, HQ), pp. 85–90.
- SAC-2014-KangS #implementation #scheduling
- Schedulability analysis support for automotive systems: from requirement to implementation (EYK, PYS), pp. 1080–1085.
- SAC-2014-OliveiraO #kernel #linux
- Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model (DBdO, RSdO), pp. 1543–1544.
- SAC-2014-OliveiraSB #coordination
- Quantitative analysis of Reo-based service coordination (NO, AS, LSB), pp. 1247–1254.
- SAC-2014-PapadakisT #approach #effectiveness #fault #locality #mutation testing
- Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
- SAC-2014-ParkH #network #performance
- Performance analysis of the golden-SM in the V2V network (MCP, DSH), pp. 1739–1740.
- SAC-2014-QuilleTR
- Spectral analysis and text processing over the computer science literature: patterns and discoveries (RVEQ, CTJ, JFRJ), pp. 653–657.
- SAC-2014-SeoKTC #framework #network #social
- A structural analysis of literary fictions with social network framework (JS, SHK, HT, HGC), pp. 634–640.
- SAC-2014-ShoshitaishviliIDV #scalability #security #trade-off
- Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
- SAC-2014-XiaLWZ #predict
- Build system analysis with link prediction (XX, DL, XW, BZ), pp. 1184–1186.
- SAC-2014-ZhanLS #in the cloud #mobile
- A green analysis of mobile cloud computing applications (KZ, CHL, PS), pp. 357–362.
- LDTA-J-2011-SauthoffG #domain-specific language #optimisation #programming
- Yield grammar analysis and product optimization in a domain-specific language for dynamic programming (GS, RG), pp. 2–22.
- SLE-J-2012-KrishnanW #attribute grammar #composition #higher-order #termination
- Monolithic and modular termination analyses for higher-order attribute grammars (LK, EVW), pp. 511–526.
- CASE-2014-ChenGGLCL #approach #behaviour #scheduling
- A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
- CASE-2014-ChuLSO #contract #flexibility #linear #parametricity #programming #using
- Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
- CASE-2014-GargSYPCHPAG #automation #reachability
- Exact reachability analysis for planning skew-line needle arrangements for automated brachytherapy (AG, TS, GY, SP, JAMC, ICH, JP, AA, KYG), pp. 524–531.
- CASE-2014-HanZH
- System-theoretic analysis of battery systems during equalization, charging, and discharging (WH, LZ, YH), pp. 158–163.
- CASE-2014-HuYLC #automation #modelling #multi #petri net
- Simplifying supervisory controllers of automated manufacturing systems via Petri net modeling and multiset analysis (HH, YY, YL, CC), pp. 449–454.
- CASE-2014-JiangCWWS #3d #fault #re-engineering #using
- Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
- CASE-2014-JiaZAX
- Analysis and improvement of batch-based production lines with Bernoulli machines (ZJ, LZ, JA, GX), pp. 13–18.
- CASE-2014-LiaoLCHF
- Vision based gait analysis on robotic walking stabilization system for patients with Parkinson’s Disease (CKL, CDL, CYC, CMH, LCF), pp. 818–823.
- CASE-2014-PengHHW #effectiveness #metric
- An effective wavelength utilization for spectroscopic analysis on orchid chlorophyll measurement (YHP, CSH, PCH, YDW), pp. 716–721.
- CASE-2014-WangGWG #behaviour #generative #multi
- Analysis of multi-location PEV charging behaviors based on trip chain generation (DW, XG, JW, JG), pp. 151–156.
- CASE-2014-WuCT #memory management #modelling #multi
- Multistage semiconductor memory inventory model based on survival analysis (JZW, CFC, YCT), pp. 613–618.
- CASE-2014-ZhuWQZ #clustering #constraints #modelling #multi #petri net #scheduling #tool support
- Modeling and schedulability analysis of single-arm multi-cluster tools with residency time constraints via Petri nets (QZ, NW, YQ, MZ), pp. 81–86.
- CC-2014-MadsenA #string
- String Analysis for Dynamic Field Access (MM, EA), pp. 197–217.
- CC-2014-TavaresBPR #data flow
- Parameterized Construction of Program Representations for Sparse Dataflow Analyses (ALCT, BB, FMQP, FR), pp. 18–39.
- CGO-2014-RountevY #android #user interface
- Static Reference Analysis for GUI Objects in Android Software (AR, DY), p. 143.
- CGO-2014-StadlerWM #java
- Partial Escape Analysis and Scalar Replacement for Java (LS, TW, HM), p. 165.
- CGO-2014-YeSX #detection
- Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
- DAC-2014-AthavaleMHV #source code #test coverage #using
- Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
- DAC-2014-IyengarG #embedded #memory management #modelling #power management #robust
- Modeling and Analysis of Domain Wall Dynamics for Robust and Low-Power Embedded Memory (AI, SG), p. 6.
- DAC-2014-KiamehrOTN #approach #fault
- Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
- DAC-2014-KleebergerMS
- Workload- and Instruction-Aware Timing Analysis: The missing Link between Technology and System-level Resilience (VK, PRM, US), p. 6.
- DAC-2014-LiangC #clustering #named #network #probability #reduction #scalability #smarttech
- ClusRed: Clustering and Network Reduction Based Probabilistic Optimal Power Flow Analysis for Large-Scale Smart Grids (YL, DC), p. 6.
- DAC-2014-LinL #parallel #reachability #verification
- Parallel Hierarchical Reachability Analysis for Analog Verification (HL, PL), p. 6.
- DAC-2014-NandakumarM
- System-Level Floorplan-Aware Analysis of Integrated CPU-GPUs (VSN, MMS), p. 6.
- DAC-2014-QuintonBHNNE #design #network
- Typical Worst Case Response-Time Analysis and its Use in Automotive Network Design (SQ, TTB, JH, MN, MN, RE), p. 6.
- DAC-2014-SchneiderPP #agile #multi
- MASH{fifo}: A Hardware-Based Multiple Cache Simulator for Rapid FIFO Cache Analysis (JS, JP, SP), p. 6.
- DAC-2014-ShankarSWP #concept #design #specification
- Ontology-guided Conceptual Analysis of Design Specifications (AS, BPS, FGW, CAP), p. 6.
- DAC-2014-ShanSFZTXYL #algorithm #configuration management #encryption #multi
- A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms (WS, LS, XF, XZ, CT, ZX, JY, JL), p. 6.
- DAC-2014-ShrivastavaRJW #control flow #fault
- Quantitative Analysis of Control Flow Checking Mechanisms for Soft Errors (AS, AR, RJ, CJW), p. 6.
- DAC-2014-SiyoumGC #data flow
- Symbolic Analysis of Dataflow Applications Mapped onto Shared Heterogeneous Resources (FS, MG, HC), p. 6.
- DAC-2014-WaksmanRSS #assessment #functional #identification
- A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
- DAC-2014-XueQBYT #framework #manycore #platform #scalability
- Disease Diagnosis-on-a-Chip: Large Scale Networks-on-Chip based Multicore Platform for Protein Folding Analysis (YX, ZQ, PB, FY, CYT), p. 6.
- DAC-2014-ZhengBB #identification #named #robust #towards
- CACI: Dynamic Current Analysis Towards Robust Recycled Chip Identification (YZ, AB, SB), p. 6.
- DATE-2014-AltmeyerD #correctness #on the #precise #probability
- On the correctness, optimality and precision of Static Probabilistic Timing Analysis (SA, RID), pp. 1–6.
- DATE-2014-BeneventiBVDB #identification #logic
- Thermal analysis and model identification techniques for a logic + WIDEIO stacked DRAM test chip (FB, AB, PV, DD, LB), pp. 1–4.
- DATE-2014-ButtazzoBB #adaptation #design
- Rate-adaptive tasks: Model, analysis, and design issues (GCB, EB, DB), pp. 1–6.
- DATE-2014-ChenHD #graph #modelling
- May-happen-in-parallel analysis based on segment graphs for safe ESL models (WC, XH, RD), pp. 1–6.
- DATE-2014-ChienYHLC #geometry #image
- Package geometric aware thermal analysis by infrared-radiation thermal images (JHC, HY, RSH, HJL, SCC), pp. 1–4.
- DATE-2014-EbrahimiETSCA #embedded #fault
- Comprehensive analysis of alpha and neutron particle-induced soft errors in an embedded processor at nanoscales (ME, AE, MBT, RS, EC, DA), pp. 1–6.
- DATE-2014-FischerCM #design #modelling
- Power modeling and analysis in early design phases (BF, CC, HM), pp. 1–6.
- DATE-2014-FrijnsASVGSC #graph
- Timing analysis of First-Come First-Served scheduled interval-timed Directed Acyclic Graphs (RF, SA, SS, JV, MCWG, RRHS, HC), pp. 1–6.
- DATE-2014-GanapathyCACGR #framework #memory management #named #robust
- INFORMER: An integrated framework for early-stage memory robustness analysis (SG, RC, DA, EC, AG, AR), pp. 1–4.
- DATE-2014-GangopadhyayLNR #adaptation #linear #modelling #performance
- Modeling and analysis of digital linear dropout regulators with adaptive control for high efficiency under wide dynamic range digital loads (SG, YL, SBN, AR), pp. 1–6.
- DATE-2014-GhalatyAS #fault
- Analyzing and eliminating the causes of fault sensitivity analysis (NFG, AA, PS), pp. 1–6.
- DATE-2014-Guan0 #performance #scheduling
- General and efficient Response Time Analysis for EDF scheduling (NG, WY), pp. 1–6.
- DATE-2014-HoffmanRAA #fault #memory management
- Wear-out analysis of Error Correction Techniques in Phase-Change Memory (CH, LR, RA, GA), pp. 1–4.
- DATE-2014-KarakonstantisSSAB #approach #energy #variability
- A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
- DATE-2014-KhanAHKKRC #bias
- Bias Temperature Instability analysis of FinFET based SRAM cells (SK, IA, SH, HK, BK, PR, FC), pp. 1–6.
- DATE-2014-LongLY #bound #evaluation #modelling #multi
- Analysis and evaluation of per-flow delay bound for multiplexing models (YL, ZL, XY), pp. 1–4.
- DATE-2014-NowotschPHPS #monitoring #multi #off the shelf
- Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems (JN, MP, AH, WP, AS), pp. 1–5.
- DATE-2014-PandeyV #fault #safety
- Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
- DATE-2014-RadojicicGMP
- Semi-symbolic analysis of mixed-signal systems including discontinuities (CR, CG, JM, XP), pp. 1–4.
- DATE-2014-RamboTDAE #realtime
- Failure analysis of a network-on-chip for real-time mixed-critical systems (EAR, AT, JD, LA, RE), pp. 1–4.
- DATE-2014-RanaC #named #reduction #scalability #simulation
- SSFB: A highly-efficient and scalable simulation reduction technique for SRAM yield analysis (MR, RC), pp. 1–6.
- DATE-2014-SalunkheMB #data flow #modelling
- Mode-Controlled Dataflow based modeling & analysis of a 4G-LTE receiver (HS, OM, KvB), pp. 1–4.
- DATE-2014-SiddiqueT #formal method #towards
- Towards the formal analysis of microresonators based photonic systems (US, ST), pp. 1–6.
- DATE-2014-SinghSWPWC #specification
- Cross-correlation of specification and RTL for soft IP analysis (BPS, AS, FGW, CAP, DJW, SC), pp. 1–6.
- DATE-2014-SongDY #bound #multi #order #parametricity #performance #reduction
- Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
- DATE-2014-VijaykumarV #canonical #statistics #using
- Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
- DATE-2014-VillenaS #network #performance #variability
- Efficient analysis of variability impact on interconnect lines and resistor networks (JFV, LMS), pp. 1–6.
- DATE-2014-ZhangB #probability
- Stochastic analysis of Bubble Razor (GZ, PAB), pp. 1–6.
- DATE-2014-ZhangYW #performance #problem
- Efficient high-sigma yield analysis for high dimensional problems (MZ, ZY, YW), pp. 1–6.
- HPDC-2014-BeaumontM #matrix #multi #platform #scheduling
- Analysis of dynamic scheduling strategies for matrix multiplication on heterogeneous platforms (OB, LM), pp. 141–152.
- HPDC-2014-SuAWBS #correlation #dataset #distributed #parallel
- Supporting correlation analysis on scientific datasets in parallel and distributed settings (YS, GA, JW, AB, HWS), pp. 191–202.
- HPDC-2014-YinWFZZ #middleware #named #scalability #visualisation
- SLAM: scalable locality-aware middleware for I/O in scientific analysis and visualization (JY, JW, WcF, XZ, JZ), pp. 257–260.
- ISMM-2014-RatnakarN #constraints #graph #performance #points-to
- Push-pull constraint graph for efficient points-to analysis (BR, RN), pp. 25–33.
- LCTES-2014-BallabrigaCR
- Cache-related preemption delay analysis for FIFO caches (CB, LKC, AR), pp. 33–42.
- LCTES-2014-RoyRWW #approximate #automation #named
- ASAC: automatic sensitivity analysis for approximate computing (PR, RR, CW, WFW), pp. 95–104.
- OSDI-2014-ChowMFPW #internet #performance #scalability
- The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services (MC, DM, JF, DP, TFW), pp. 217–231.
- OSDI-2014-YuanLZRZZJS #data-driven #distributed #testing
- Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
- PDP-2014-AcostaA #performance #source code
- Performance Analysis of Paralldroid Generated Programs (AA, FA), pp. 60–67.
- PDP-2014-BelliniBCMN #gpu #simulation
- Simulation and Analysis of the Blood Coagulation Cascade Accelerated on GPU (MB, DB, PC, GM, MSN), pp. 590–593.
- PDP-2014-ItoF #hardware #problem #resource management #using
- An Experimental Analysis for Hardware Resource Management Using a New Strip Packing Problem (RI, NF), pp. 360–364.
- PDP-2014-KumarL #latency #manycore
- Latency Analysis of Network-on-Chip Based Many-Core Processors (SK, GL), pp. 432–439.
- PDP-2014-RonchieriCDCTCSCMM #case study #framework
- The WNoDeS Cloud Virtualization Framework: A Macromolecular Surface Analysis Application Case Study (ER, DC, DD, VC, GDT, PC, DS, AC, LM, IM), pp. 218–222.
- PPoPP-2014-MaAC #algorithm #manycore #thread
- Theoretical analysis of classic algorithms on highly-threaded many-core GPUs (LM, KA, RDC), pp. 391–392.
- ESOP-2014-Fu #abstraction #memory management
- Targeted Update — Aggressive Memory Abstraction Beyond Common Sense and Its Application on Static Numeric Analysis (ZF), pp. 534–553.
- ESOP-2014-MangalNY #interprocedural
- A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join (RM, MN, HY), pp. 513–533.
- FASE-2014-CohenM #configuration management #semantics #specification
- Semantically Configurable Analysis of Scenario-Based Specifications (BC, SM), pp. 185–199.
- FASE-2014-HuangDM #java #type system #web
- Type-Based Taint Analysis for Java Web Applications (WH, YD, AM), pp. 140–154.
- FASE-2014-KowalST #performance
- Family-Based Performance Analysis of Variant-Rich Software Systems (MK, IS, MT), pp. 94–108.
- FASE-2014-SadeghiEM #mining #repository #security
- Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
- FoSSaCS-2014-BonnetKL #parallel #probability #process
- Analysis of Probabilistic Basic Parallel Processes (RB, SK, AWL), pp. 43–57.
- STOC-2014-BhaskaraCMV
- Smoothed analysis of tensor decompositions (AB, MC, AM, AV), pp. 594–603.
- STOC-2014-DworkTT0 #bound #component #privacy
- Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
- TACAS-2014-BrockschmidtEFFG #complexity #integer #runtime #source code
- Alternating Runtime and Size Complexity Analysis of Integer Programs (MB, FE, SF, CF, JG), pp. 140–155.
- TACAS-2014-LoweMW #contest
- CPAchecker with Sequential Combination of Explicit-Value Analyses and Predicate Analyses — (Competition Contribution) (SL, MUM, PW), pp. 392–394.
- WRLA-2014-RochaMM #smt
- Rewriting Modulo SMT and Open System Analysis (CR, JM, CAM), pp. 247–262.
- CAV-2014-ChatterjeeCD #probability
- CEGAR for Qualitative Analysis of Probabilistic Systems (KC, MC, PD), pp. 473–490.
- CAV-2014-EsparzaLMMN #approach #smt
- An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
- CAV-2014-Hagemann #hybrid #orthogonal #reachability #using
- Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
- CAV-2014-HeizmannHP #learning #source code #termination
- Termination Analysis by Learning Terminating Programs (MH, JH, AP), pp. 797–813.
- CAV-2014-ItzhakyBRST
- Property-Directed Shape Analysis (SI, NB, TWR, MS, AVT), pp. 35–51.
- CAV-2014-LeGQC #higher-order
- Shape Analysis via Second-Order Bi-Abduction (QLL, CG, SQ, WNC), pp. 52–68.
- ICLP-J-2014-SerranoLH #abstract interpretation #logic programming #resource management #source code #using
- Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
- ICST-2014-LiO #empirical #modelling #testing
- An Empirical Analysis of Test Oracle Strategies for Model-Based Testing (NL, JO), pp. 363–372.
- ICST-2014-MiicBT #automation #multi #platform #test coverage #testing
- Automated Multi-platform Testing and Code Coverage Analysis of the CP2K Application (MM, IB, MT), pp. 95–98.
- ICST-2014-PapadakisHT #combinator #interactive #mutation testing #testing
- Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing (MP, CH, YLT), pp. 1–10.
- ICST-2014-WiklundSEL #automation #empirical #testing
- Impediments for Automated Testing — An Empirical Analysis of a User Support Discussion Board (KW, DS, SE, KL), pp. 113–122.
- ISSTA-2014-HendersonPYHWZY #framework #performance #platform
- Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform (AH, AP, LKY, XH, XW, RZ, HY), pp. 248–258.
- ISSTA-2014-Just #framework #java #mutation testing #performance #scalability
- The major mutation framework: efficient and scalable mutation analysis for Java (RJ), pp. 433–436.
- ISSTA-2014-JustEF #clustering #execution #mutation testing #performance
- Efficient mutation analysis by propagating and partitioning infected execution states (RJ, MDE, GF), pp. 315–326.
- ISSTA-2014-MarinescuHC #evolution #framework #named
- Covrig: a framework for the analysis of code, test, and coverage evolution in real software (PDM, PH, CC), pp. 93–104.
- ISSTA-2014-TrippFP #hybrid #javascript #partial evaluation #security #web
- Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
- ISSTA-2014-XiaoBIMGC #dependence #effectiveness #type system
- ARC++: effective typestate and lifetime dependency analysis (XX, GB, FI, NM, AG, DC), pp. 116–126.
- LICS-CSL-2014-BaierDK #model checking #probability #trade-off
- Trade-off analysis meets probabilistic model checking (CB, CD, SK), p. 10.
- SAT-2014-BacchusN #algorithm #satisfiability
- Cores in Core Based MaxSat Algorithms: An Analysis (FB, NN), pp. 7–15.
- SMT-2014-CarlssonGP #constraints #programming #protocol
- Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
- TAP-2014-KosmatovS #runtime #tutorial
- Runtime Assertion Checking and Its Combinations with Static and Dynamic Analyses — Tutorial Synopsis (NK, JS), pp. 165–168.
- VMCAI-2014-Ferrara #abstract interpretation
- Generic Combination of Heap and Value Analyses in Abstract Interpretation (PF), pp. 302–321.
- VMCAI-2014-Fu #abstract domain #java #points-to #scalability
- Modularly Combining Numeric Abstract Domains with Points-to Analysis, and a Scalable Static Numeric Analyzer for Java (ZF), pp. 282–301.
- VMCAI-2014-GustavssonGL #execution #parallel #using
- Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
- VMCAI-2014-Mine #abstract interpretation #relational #thread
- Relational Thread-Modular Static Value Analysis by Abstract Interpretation (AM), pp. 39–58.
- VMCAI-2014-SchwarzSVA #precise #source code
- Precise Analysis of Value-Dependent Synchronization in Priority Scheduled Programs (MDS, HS, VV, KA), pp. 21–38.
- CBSE-2013-LednickiCS #execution #worst-case
- Model level worst-case execution time analysis for IEC 61499 (LL, JC, KS), pp. 169–178.
- ECSA-2013-BuchgeherW #architecture #consistency #towards
- Towards Continuous Reference Architecture Conformance Analysis (GB, RW), pp. 332–335.
- ECSA-2013-GoknilSPM #constraints #modelling
- Analysis Support for TADL2 Timing Constraints on EAST-ADL Models (AG, JS, MAPF, FM), pp. 89–105.
- QoSA-2013-BeckerLB #adaptation #performance #requirements #self #validation
- Performance analysis of self-adaptive systems for requirements validation at design-time (MB, ML, SB), pp. 43–52.
- QoSA-2013-BerardinelliLM #execution #non-functional
- Combining fUML and profiles for non-functional analysis based on model execution traces (LB, PL, TM), pp. 79–88.
- QoSA-2013-KlattK #architecture #difference
- Improving product copy consolidation by architecture-aware difference analysis (BK, MK), pp. 117–122.
- QoSA-2013-TrubianiMCAG #architecture #modelling #nondeterminism #performance
- Model-based performance analysis of software architectures under uncertainty (CT, IM, VC, AA, LG), pp. 69–78.
- DRR-2013-MehriGHM #documentation #image #multi #segmentation #using
- Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
- DRR-2013-SimistiraPKC #online
- Structural analysis of online handwritten mathematical symbols based on support vector machines (FS, VP, VK, GC).
- HT-2013-WangQS #realtime #social #twitter
- Reading tweeting minds: real-time analysis of short text for computational social science (ZW, DQ, DÓS), pp. 169–173.
- HT-2013-WeiHGLZW #behaviour #case study #twitter
- Mainstream media behavior analysis on Twitter: a case study on UK general election (ZW, YH, WG, BL, LZ, KFW), pp. 174–178.
- ICDAR-2013-AlkalaiBSL #identification
- Improving Formula Analysis with Line and Mathematics Identification (MA, JBB, VS, XL), pp. 334–338.
- ICDAR-2013-AntonacopoulosCPP #contest #layout
- ICDAR 2013 Competition on Historical Newspaper Layout Analysis (HNLA 2013) (AA, CC, CP, SP), pp. 1454–1458.
- ICDAR-2013-GriechischML #online
- Online Signature Analysis Based on Accelerometric and Gyroscopic Pens and Legendre Series (EG, MIM, ML), pp. 374–378.
- ICDAR-2013-KirbyH #using
- Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
- ICDAR-2013-LiPXW #consistency #online #order #verification
- A Stroke Order Verification Method for On-Line Handwritten Chinese Characters Based on Tempo-spatial Consistency Analysis (RL, LP, EX, NW), pp. 999–1003.
- ICDAR-2013-StammLD #approach #documentation #multi #partial order
- Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
- ICDAR-2013-TangHF #approach #recognition
- A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
- ICDAR-2013-WangLD #recognition
- Similar Pattern Discriminant Analysis for Improving Chinese Character Recognition Accuracy (YW, CL, XD), pp. 1056–1060.
- ICDAR-2013-WeiBSI #classification #documentation #evaluation #layout
- Evaluation of SVM, MLP and GMM Classifiers for Layout Analysis of Historical Documents (HW, MB, FS, RI), pp. 1220–1224.
- ICDAR-2013-YinLS #detection #documentation #framework #image #multi #novel
- A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
- ICDAR-2013-ZirariENM #component #documentation #image #segmentation #using
- A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
- PODS-2013-CalvaneseGM #database #perspective #process
- Foundations of data-aware process analysis: a database theory perspective (DC, GDG, MM), pp. 1–12.
- SIGMOD-2013-GuilleFHZ #framework #mining #named #open source #platform #social
- SONDY: an open source platform for social dynamics mining and analysis (AG, CF, HH, DAZ), pp. 1005–1008.
- SIGMOD-2013-MoustafaMDG #declarative #interactive #named #network
- GRDB: a system for declarative and interactive analysis of noisy information networks (WEM, HM, AD, LG), pp. 1085–1088.
- SIGMOD-2013-SuZWHZ #similarity
- Calibrating trajectory data for similarity-based analysis (HS, KZ, HW, JH, XZ), pp. 833–844.
- SIGMOD-2013-TaoYLBCHKSWWW #named #network #research
- Research-insight: providing insight on research by publication network analysis (FT, XY, KHL, GB, XC, JH, RK, YS, CW, LW, TW), pp. 1093–1096.
- TPDL-2013-KemmanK #named
- PoliMedia — Improving Analyses of Radio, TV and Newspaper Coverage of Political Debates (MK, MK), pp. 401–404.
- TPDL-2013-ManghiM #data flow
- Data Searchery — Preliminary Analysis of Data Sources Interlinking (PM, AM), pp. 458–461.
- TPDL-2013-TranZBNK #corpus #topic
- Topic Cropping: Leveraging Latent Topics for the Analysis of Small Corpora (NKT, SZ, KB, CN, RK), pp. 297–308.
- VLDB-2013-DeutchMT #named #process
- PROPOLIS: Provisioned Analysis of Data-Centric Processes (DD, YM, VT), pp. 1302–1305.
- VLDB-2013-MoyersSWKVBC #array #image #parallel
- A Demonstration of Iterative Parallel Array Processing in Support of Telescope Image Analysis (MM, ES, SW, KSK, JV, MB, AJC), pp. 1322–1325.
- VLDB-2013-OkcanRPF #named
- Scolopax: Exploratory Analysis of Scientific Data (AO, MR, BP, DF), pp. 1298–1301.
- VLDB-2013-SeoPSL #distributed #graph #scalability
- Distributed SociaLite: A Datalog-Based Language for Large-Scale Graph Analysis (JS, JP, JS, MSL), pp. 1906–1917.
- VLDB-2013-SowellSCDG #in memory #memory management
- An Experimental Analysis of Iterated Spatial Joins in Main Memory (BS, MAVS, TC, AJD, JG), pp. 1882–1893.
- VLDB-2013-Taxidou #information management #realtime #social #social media
- Realtime Analysis of Information Diffusion in Social Media (IT), pp. 1416–1421.
- ITiCSE-2013-HerreroLOST13a #empirical #performance
- An empirical analysis of the influence of classmates on the academic performance (CH, ML, JO, JS, ST), p. 328.
- ITiCSE-2013-Trakhtenbrot #algorithm #complexity #concept #problem #student
- Students misconceptions in analysis of algorithmic and computational complexity of problems (MT), pp. 353–354.
- CSMR-2013-BhattacharyaUNK #android #debugging #empirical #open source
- An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps (PB, LU, IN, SCK), pp. 133–143.
- CSMR-2013-GhaithWPM #detection #independence #performance #testing
- Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
- CSMR-2013-JezekHB #compilation #library
- Supplying Compiler’s Static Compatibility Checks by the Analysis of Third-Party Libraries (KJ, LH, PB), pp. 375–378.
- ICPC-2013-MurakamiHHIK #clone detection #detection #lightweight #source code
- Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
- ICPC-2013-PruijtKB #architecture #dependence #on the
- On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
- ICPC-2013-SteidlHJ #quality #source code
- Quality analysis of source code comments (DS, BH, EJ), pp. 83–92.
- ICSM-2013-AnandEKSBK #abstraction #bytecode #framework #memory management #stack
- An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables (KA, KE, AK, MS, RB, ADK), pp. 90–99.
- ICSM-2013-Beck #multi
- Analysis of Multi-dimensional Code Couplings (FB), pp. 560–565.
- ICSM-2013-CollardDM #framework #named #semiparsing #source code #tool support
- srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration (MLC, MJD, JIM), pp. 516–519.
- ICSM-2013-LabicheKM #diagrams
- Combining Static and Dynamic Analyses to Reverse-Engineer Scenario Diagrams (YL, BK, HM), pp. 130–139.
- ICSM-2013-MartinezDM #abstract syntax tree #automation
- Automatically Extracting Instances of Code Change Patterns with AST Analysis (MM, LD, MM), pp. 388–391.
- ICSM-2013-OsmanCP #algorithm #diagrams #machine learning
- An Analysis of Machine Learning Algorithms for Condensing Reverse Engineered Class Diagrams (MHO, MRVC, PvdP), pp. 140–149.
- ICSM-2013-SahaRS #evolution #named
- gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis (RKS, CKR, KAS), pp. 488–491.
- ICSM-2013-TianLS #debugging #multi #named #predict
- DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis (YT, DL, CS), pp. 200–209.
- ICSM-2013-VenkataramaniABM #repository #scalability #semantics
- Latent Co-development Analysis Based Semantic Search for Large Code Repositories (RV, AMA, VDB, BM), pp. 372–375.
- ICSM-2013-YukselS #automation #case study #classification
- Automated Classification of Static Code Analysis Alerts: A Case Study (UY, HS), pp. 532–535.
- MSR-2013-CampbellZXHM #detection #documentation #topic #using
- Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
- MSR-2013-DemeyerMWL #exclamation
- Happy birthday! a trend analysis on past MSR papers (SD, AM, KW, AL), pp. 353–362.
- MSR-2013-FuLLDZX #behaviour #comprehension
- Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
- MSR-2013-VasquezDP #development #mobile #stack overflow #using
- An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
- SCAM-2013-BiallasOCH #named #pointer
- PtrTracker: Pragmatic pointer analysis (SB, MCO, FC, RH), pp. 69–73.
- SCAM-2013-FabryRJ #source code
- Aspectual source code analysis with GASR (JF, CDR, VJ), pp. 53–62.
- SCAM-2013-PapadakisDT #fault #mutation testing #named #using
- Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
- SCAM-2013-SvajlenkoRD #generative #named #similarity #tool support
- ForkSim: Generating software forks for evaluating cross-project similarity analysis tools (JS, CKR, SD), pp. 37–42.
- WCRE-2013-ClearyGVSSP #interactive #memory management #multi
- Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis (BC, PG, EV, MADS, MS, FP), pp. 42–51.
- WCRE-2013-SaeidiHKJ #legacy #modelling #named #tool support
- Gelato: GEneric language tools for model-driven analysis of legacy software systems (AS, JH, RK, SJ), pp. 481–482.
- CIAA-2013-DreyfusHK #approximate #reachability
- Enhancing Approximations for Regular Reachability Analysis (AD, PCH, OK), pp. 331–339.
- ICALP-v1-2013-DeDS #algorithm #difference #fourier #geometry #robust
- A Robust Khintchine Inequality, and Algorithms for Computing Optimal Constants in Fourier Analysis and High-Dimensional Geometry (AD, ID, RAS), pp. 376–387.
- ICALP-v2-2013-HartungNNS #complexity #graph
- A Refined Complexity Analysis of Degree Anonymization in Graphs (SH, AN, RN, OS), pp. 594–606.
- LATA-2013-FernauHV #automaton #multi #problem
- A Multivariate Analysis of Some DFA Problems (HF, PH, YV), pp. 275–286.
- IFM-2013-GiachinoGLLW #concurrent #theory and practice
- Deadlock Analysis of Concurrent Objects: Theory and Practice (EG, CAG, CL, ML, PYHW), pp. 394–411.
- IFM-2013-Song00LD #divide and conquer #reachability
- Improved Reachability Analysis in DTMC via Divide and Conquer (SS, LG, JS, YL, JSD), pp. 162–176.
- RTA-2013-BauLNW #term rewriting #termination
- Compression of Rewriting Systems for Termination Analysis (AB, ML, EN, JW), pp. 97–112.
- SFM-2013-GratieIP #biology
- ODE Analysis of Biological Systems (DEG, BI, IP), pp. 29–62.
- SFM-2013-KopfR #automation #data flow
- Automation of Quantitative Information-Flow Analysis (BK, AR), pp. 1–28.
- CIG-2013-DivillyOH #evolution
- Exploration and analysis of the evolution of strategies for Mancala variants (CD, CO, SH), pp. 1–7.
- CIG-2013-ShakerSNST #automation #game studies #generative
- Automatic generation and analysis of physics-based puzzle games (MS, MHS, OAN, NS, JT), pp. 1–8.
- CIG-2013-SifaB #behaviour #game studies #learning
- Archetypical motion: Supervised game behavior learning with Archetypal Analysis (RS, CB), pp. 1–8.
- DiGRA-2013-Grace #game studies #web
- Affection Games in Digital Play: A Content Analysis of Web Playable Games (LDG).
- DiGRA-2013-Prax #design #game studies
- Game Design and Business Model: an Analysis of Diablo 3 (PP).
- DiGRA-2013-WehbeN #game studies #human-computer #interface #research
- An Introduction to EEG Analysis Techniques and Brain-Computer Interfaces for Games User Researchers (RRW, LEN).
- FDG-2013-CaplarSM #case study #performance #rating
- Analysis of players' in-game performance vs rating: Case study of Heroes of Newerth (NC, MS, MM), pp. 237–244.
- FDG-2013-Milik #category theory #multi #online #social
- Protecting face in virtual life: An ethnographic analysis of identity categories and informal systems of social control in massively multiplayer online worlds (OM), pp. 477–478.
- FDG-2013-Waern #game studies
- Game analysis as a signature pedagogy of game studies (AW), pp. 275–282.
- FDG-2013-Wallner #approach #named #visualisation
- Play-Graph: A methodology and visualization approach for the analysis of gameplay data (GW), pp. 253–260.
- GT-VMT-2013-MaximovaEE #graph transformation
- Analysis of Hypergraph Transformation Systems in AGG based on M-Functors (MM, HE, CE).
- CHI-2013-AlperBRIF #comparison #graph
- Weighted graph comparison techniques for brain connectivity analysis (BA, BB, NHR, TI, JDF), pp. 483–492.
- CHI-2013-BrownML #mobile #video
- iPhone in vivo: video analysis of mobile device use (BATB, MM, EL), pp. 1031–1040.
- CHI-2013-GoyalLF #visualisation
- Effects of visualization and note-taking on sensemaking and analysis (NG, GL, SRF), pp. 2721–2724.
- CHI-2013-VellosoBG #modelling #named
- MotionMA: motion modelling and analysis by demonstration (EV, AB, HG), pp. 1309–1318.
- CHI-2013-WalshFYD #design #framework
- FACIT PD: a framework for analysis and creation of intergenerational techniques for participatory design (GW, EF, JCY, AD), pp. 2893–2902.
- CHI-2013-WangBK #facebook #gender #topic
- Gender, topic, and audience response: an analysis of user-generated content on facebook (YCW, MB, REK), pp. 31–34.
- CSCW-2013-AlmuhimediWLSA #scalability #twitter
- Tweets are forever: a large-scale quantitative analysis of deleted tweets (HA, SW, BL, NMS, AA), pp. 897–908.
- CSCW-2013-Hautasaari #process #quote #wiki
- “Could someone please translate this?”: activity analysis of wikipedia article translation by non-experts (AMJH), pp. 945–954.
- CSCW-2013-Robert #multi
- A multi-level analysis of the impact of shared leadership in diverse virtual teams (LPRJ), pp. 363–374.
- CSCW-2013-SmithQC #identification #using
- Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
- DHM-HB-2013-ZhaoLZ #higher-order #statistics
- Higher Order Statistics Analyses Based on the Mathematical Model of Surface Electromyography (YZ, DL, JZ), pp. 402–408.
- DHM-SET-2013-ChiLC
- The Causal Analysis of Requested Alterations for Pressure Garments (CFC, CHL, HWC), pp. 173–182.
- DHM-SET-2013-HungCSC #case study #comparative #education #effectiveness #women
- A Comparative Analysis of the Educational Effectiveness of Leaflet and Website for Low-Literate Patients — A Case Study of Immigrant Mothers in Taipei (YLH, KRC, CS, TC), pp. 204–213.
- DUXU-CXC-2013-AsanoY #design
- Observation Analysis Method for Culture Centered Design — Proposal of KH Method - (KA, KY), pp. 11–19.
- DUXU-CXC-2013-CarvalhoSNM #comparative #game studies #interactive #usability
- Interactive Doodles: A Comparative Analysis of the Usability and Playability of Google Trademark Games between 2010 and 2012 (BJAdC, MMS, AMMdN, RPM), pp. 508–517.
- DUXU-NTE-2013-BarrosSFCC #artificial reality #people
- Virtual Reality Immersion: An Important Tool for Diagnostic Analysis and Rehabilitation of People with Disabilities (HOB, MMS, ELRF, WC, FC), pp. 337–344.
- DUXU-NTE-2013-Danylak #gesture #human-computer #interactive
- Semiotic Analysis for Gestural and Emotional Human-Computer Interaction (RD), pp. 465–474.
- DUXU-NTE-2013-Gyoda #ad hoc #communication #evaluation #network #performance
- Analysis and Evaluation of Wireless Ad Hoc Network Performance for a Disaster Communication Model and Scenarios (KG), pp. 65–74.
- DUXU-PMT-2013-KohnoYSN #approach #design
- Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
- DUXU-PMT-2013-ZhangD #interactive
- User-Mobile Phone Interactions: A Postphenomenology Analysis (BZ, HD), pp. 171–180.
- DUXU-WM-2013-BucchianicoCP #communication #towards #visual notation
- Branding “for All”: Toward the Definition of Inclusive Toolkits of Analysis and Visual Communication for Brand Identities (GDB, SC, SP), pp. 23–29.
- DUXU-WM-2013-Kim13a #query
- Analysis of Query Entries of a Job Search Engine (YK), pp. 203–211.
- HCI-III-2013-IteyaMK #using #visual notation
- Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
- HCI-III-2013-KimKAPW #artificial reality #social
- Brain Function Connectivity Analysis for Recognizing Different Relation of Social Emotion in Virtual Reality (JK, DK, SA, SP, MCW), pp. 441–447.
- HCI-III-2013-StorzRMLE #detection #machine learning #visualisation #workflow
- Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
- HCI-IMT-2013-Farhadi-NiakiEA #design #gesture #usability
- Design and Usability Analysis of Gesture-Based Control for Common Desktop Tasks (FFN, SAE, AA), pp. 215–224.
- HCI-IMT-2013-SakataKN #collaboration #communication #scalability
- Communication Analysis of Remote Collaboration System with Arm Scaling Function (NS, TK, SN), pp. 378–387.
- HCI-IMT-2013-SrivastavaT #realtime #using
- Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
- HCI-UC-2013-KuramochiOTHN #community #graph #network #semantics #twitter #using
- Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
- HCI-UC-2013-TajimaIK
- Analysis of Customer Preference through Unforced Natural Passive Observation (TT, YI, TK), pp. 466–474.
- HIMI-D-2013-KobayashiYA #behaviour
- Analysis of Purchasing Behavior Focusing on the Passage of Time at a Group Buying Site of Coupon (TK, TY, YA), pp. 449–455.
- HIMI-D-2013-KotaniKSA #development #memory management #using
- Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
- HIMI-D-2013-SusukiTOM #behaviour
- Cognitive Analysis of Driver’s Behavior with Seamless Display of Back-Monitor and Side-View Mirror (NS, KT, MO, HM), pp. 642–649.
- HIMI-HSM-2013-ChiangWCH #performance #smarttech
- An Analysis of Smartphone Size Regarding Operating Performance (ZHC, CCW, ACC, CyH), pp. 363–372.
- HIMI-HSM-2013-HerronV #overview
- Are Prescription Labels Usable? A Review and Analysis (MH, KPLV), pp. 252–260.
- HIMI-HSM-2013-LeeJ #simulation #using
- Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
- HIMI-HSM-2013-Noda #industrial #monitoring #performance #statistics
- Performance Monitoring of Industrial Plant Alarm Systems by Statistical Analysis of Plant Operation Data (MN), pp. 131–135.
- HIMI-LCCB-2013-AntolosLLV #using
- Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
- HIMI-LCCB-2013-KuritaKWS
- A Method for Service Failure Effects Analysis Based on Customer Satisfaction (YK, KK, KW, YS), pp. 485–494.
- HIMI-LCCB-2013-YajimaHY #communication #design
- Application of Ethno-Cognitive Interview and Analysis Method for the Smart Communication Design (AY, HH, TY), pp. 649–657.
- OCSC-2013-Abascal-MenaLZ #behaviour #mining #twitter
- User Generated Content: An Analysis of User Behavior by Mining Political Tweets (RAM, ÉLO, JSZH), pp. 3–12.
- OCSC-2013-AdnanHAT #behaviour #eye tracking #network #online #social
- Eye Tracking Analysis of User Behavior in Online Social Networks (WAWA, WNHH, NA, JT), pp. 113–119.
- OCSC-2013-YamauchiHN #source code #twitter
- Searching Emotional Scenes in TV Programs Based on Twitter Emotion Analysis (TY, YH, YIN), pp. 432–441.
- VISSOFT-2013-KarranTD #named #thread #visual notation
- SYNCTRACE: Visual thread-interplay analysis (BK, JT, JD), pp. 1–10.
- CAiSE-2013-BeheshtiBN #ad hoc #aspect-oriented #process
- Enabling the Analysis of Cross-Cutting Aspects in Ad-Hoc Processes (SMRB, BB, HRMN), pp. 51–67.
- CAiSE-2013-PapottiPSCP #code generation #modelling
- A Quantitative Analysis of Model-Driven Code Generation through Software Experimentation (PEP, AFdP, WLdS, CEC, LFP), pp. 321–337.
- EDOC-2013-TranZ #approach #architecture #verification
- Event Actors Based Approach for Supporting Analysis and Verification of Event-Driven Architectures (HT, UZ), pp. 217–226.
- ICEIS-J-2013-PintoKG13a #approach #architecture #automation #evaluation #metadata
- An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
- ICEIS-J-2013-RothPS13a #twitter
- Tweeting Politicians: An Analysis of the Usage of a Micro Blogging System (MR, GP, JS), pp. 351–365.
- ICEIS-v1-2013-BentayebK #adaptation #constraints #semantics
- Adapting OLAP Analysis to User’s Constraints through Semantic Hierarchies (FB, RK), pp. 193–200.
- ICEIS-v1-2013-ChiuFW #collaboration #integration #performance #social
- An Analysis of Supply Chain Collaboration and Its Impact on Firm Performance — An Integration of Social Capital, Justice, and Technology Use (MLC, CYF, ILW), pp. 5–12.
- ICEIS-v1-2013-QasimR #classification #evaluation #linear #using
- Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
- ICEIS-v1-2013-ZaamouneBPB #approach #multi #relational
- A New Relational Spatial OLAP Approach for Multi-resolution and Spatio-multidimensional Analysis of Incomplete Field Data (MZ, SB, FP, PB), pp. 145–152.
- ICEIS-v2-2013-CuzzocreaF #comparative #exclamation #metamodelling #power of #state of the art
- Comparative Analysis of State-of-the-Art Spatial Data Warehouse Meta-models — Catching the Expressive Power of SDW Schemas! (AC, RdNF), pp. 302–309.
- ICEIS-v2-2013-SampaioM
- Analysis and Improvement System WebAnywhere (CFdSS, LCM), pp. 403–409.
- ICEIS-v2-2013-SuB #composition #data flow #graph #web #web service
- Service Call Graph (SCG) — Information Flow Analysis in Web Service Composition (ZS, FB), pp. 17–24.
- ICEIS-v3-2013-AndargoliBK
- Analysis of Interoperability in the Queensland Disaster Management System (AEA, PB, HK), pp. 310–317.
- ICEIS-v3-2013-DiefenthalerB #architecture #enterprise #semantics #using #web
- Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
- ICEIS-v3-2013-FerreiraFSCRPO #interactive #search-based
- Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
- CIKM-2013-ArdonBMRSTT #topic #twitter
- Spatio-temporal and events based analysis of topic popularity in twitter (SA, AB, AM, AR, AS, RMT, ST), pp. 219–228.
- CIKM-2013-FangHZ #overview #sentiment
- Exploring weakly supervised latent sentiment explanations for aspect-level review analysis (LF, MH, XZ), pp. 1057–1066.
- CIKM-2013-KellerMWB #adaptation #flexibility
- Flexible and adaptive subspace search for outlier analysis (FK, EM, AW, KB), pp. 1381–1390.
- CIKM-2013-SubbianAS #mining #social
- Content-centric flow mining for influence analysis in social streams (KS, CCA, JS), pp. 841–846.
- ECIR-2013-ChenC #multi #network #topic #using
- A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
- ECIR-2013-HuiGHL #keyword
- Sponsored Search Ad Selection by Keyword Structure Analysis (KH, BG, BH, TL), pp. 230–241.
- ECIR-2013-NarangNMSD #evolution #microblog #social #topic
- Discovery and Analysis of Evolving Topical Social Discussions on Unstructured Microblogs (KN, SN, SM, LVS, KD), pp. 545–556.
- ECIR-2013-PicaultR #interactive #multi #named #social
- SIAM: Social Interaction Analysis for Multimedia (JP, MR), pp. 841–844.
- ICML-c1-2013-AvronBTZ #canonical #correlation #performance #reduction
- Efficient Dimensionality Reduction for Canonical Correlation Analysis (HA, CB, ST, AZ), pp. 347–355.
- ICML-c1-2013-HanL13a #component
- Principal Component Analysis on non-Gaussian Dependent Data (FH, HL), pp. 240–248.
- ICML-c1-2013-LivniLSNSG #component
- Vanishing Component Analysis (RL, DL, SS, HN, SSS, AG), pp. 597–605.
- ICML-c1-2013-ZhangC #linear
- Sparse Uncorrelated Linear Discriminant Analysis (XZ, DC), pp. 45–52.
- ICML-c2-2013-ChangKKZ #canonical #correlation #independence #kernel
- Canonical Correlation Analysis based on Hilbert-Schmidt Independence Criterion and Centered Kernel Target Alignment (BC, UK, RK, JZ), pp. 316–324.
- ICML-c2-2013-Goerg #component
- Forecastable Component Analysis (GMG), pp. 64–72.
- ICML-c3-2013-AndrewABL #canonical #correlation
- Deep Canonical Correlation Analysis (GA, RA, JAB, KL), pp. 1247–1255.
- ICML-c3-2013-BaktashmotlaghHBLS #classification #video
- Non-Linear Stationary Subspace Analysis with Application to Video Classification (MB, MTH, AB, BCL, MS), pp. 450–458.
- ICML-c3-2013-Kuleshov #algorithm #component #performance
- Fast algorithms for sparse principal component analysis based on Rayleigh quotient iteration (VK), pp. 1418–1425.
- KDD-2013-CaiQ #linear #on the #rank
- On the equivalent of low-rank linear regressions and linear discriminant analysis based regressions (XC, CHQD, FN, HH), pp. 1124–1132.
- KDD-2013-ChenTTY #kernel #modelling #performance
- Model-based kernel for efficient time series analysis (HC, FT, PT, XY), pp. 392–400.
- KDD-2013-DavidsonGCW #network
- Network discovery via constrained tensor analysis of fMRI data (IND, SG, OTC, PBW), pp. 194–202.
- KDD-2013-KermanyMBNM #framework
- Analysis of advanced meter infrastructure data of water consumption in apartment buildings (EK, HM, DB, YN, HM), pp. 1159–1167.
- KDD-2013-MaiyaTLR #documentation
- Exploratory analysis of highly heterogeneous document collections (ASM, JPT, FLL, RMR), pp. 1375–1383.
- KDD-2013-SunXY #component #robust
- Robust principal component analysis via capped norms (QS, SX, JY), pp. 311–319.
- KDD-2013-WangLLWWC #named #twitter
- SEA: a system for event analysis on chinese tweets (YW, HL, HL, JW, ZW, JC), pp. 1498–1501.
- KDD-2013-ZhuYGM #modelling #scalability #topic
- Scalable text and link analysis with mixed-topic link models (YZ, XY, LG, CM), pp. 473–481.
- KDIR-KMIS-2013-Gonzalez-BrambilaJG #database #research
- Analysis of Mexican Research Production — Exploring a Scientifical Database (SBGB, MJM, CNGB), pp. 177–182.
- KDIR-KMIS-2013-Ibarra-SanchezPO #case study #risk management #using
- Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
- KDIR-KMIS-2013-LlavoriLGNAS #framework #named #sentiment #towards
- i-SLOD: Towards an Infrastructure for Enabling the Dissemination and Analysis of Sentiment Data (RBL, DML, LGM, VN, MJA, IS), pp. 214–219.
- KDIR-KMIS-2013-OliveiraCL #concept
- Business Analytics — Analysis of an Emerging Concept (MPVdO, CXC, MBL), pp. 547–551.
- KDIR-KMIS-2013-PapulaVH #enterprise #network #process
- Knowledge Networks as a Source of Knowledge Initiatives and Innovation Activity in Small and Medium Enterprises — Regression Analysis for EU 27 Countries (JP, JV, JH), pp. 389–396.
- KDIR-KMIS-2013-SaijoSWK #case study #collaboration #community #multi #process
- An Analysis of Multi-disciplinary — Inter-agency Collaboration Process — Case Study of a Japanese Community Care Access Center (MS, TS, MW, SK), pp. 470–475.
- MLDM-2013-SentzH
- Information Gap Analysis for Decision Support Systems in Evidence-Based Medicine (KS, FMH), pp. 543–554.
- MLDM-2013-YasojimaFBOS #case study #generative #power management
- Partial Discharge Analysis and Inspection Alert Generation in High Power Transformers: A Case Study of an Autotransformer Bank at Eletrobrás-ELETRONORTE Vila do Conde Station (CTKY, MSF, FdSB, TFdO, AMdS), pp. 367–378.
- RecSys-2013-DoerfelJ #evaluation #recommendation
- An analysis of tag-recommender evaluation procedures (SD, RJ), pp. 343–346.
- SEKE-2013-ChaoY #order #reachability #scalability
- A Best Method to Synthesize Very Large K-th Order Systems without Reachability Analysis (DYC, THY), pp. 417–420.
- SEKE-2013-HansenM #ecosystem #network #towards
- Towards a Network Ecology of Software Ecosystems: an Analysis of two OSGi Ecosystems (KMH, KM), pp. 326–331.
- SEKE-2013-JanesMSS #problem #programming #requirements
- Domain Analysis in Combination with Extreme Programming toAddress Requirements Volatility Problems (AJ, SM, AS, GS), pp. 226–231.
- SEKE-2013-LiuWL #detection #named #online #performance #pointer
- ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
- SEKE-2013-NishiuraMWH #mutation testing #testing
- Mutation Analysis for JavaScriptWeb Application Testing (KN, YM, HW, SH), pp. 159–165.
- SEKE-2013-SantosBC #education #game studies #modelling #programming #semantics
- A Knowledge Modeling System for Semantic Analysis of Games Applied to Programming Education (ECOdS, GBB, EWGC), pp. 668–673.
- SEKE-2013-WangWMX #how #performance
- How Does Acquirer’s Participation Influence Performance of Software Projects: A Quantitative Analysis (YW, JW, JM, BX), pp. 537–541.
- SEKE-2013-WangZLBCT #modelling #non-functional #object-oriented #requirements
- Integrating Functional with Non-functional Requirements Analysis In Object Oriented Modeling Tool Based on HOOMT (JW, FZ, X(L, ECB, BC, MT), pp. 59–62.
- SEKE-2013-WeiX #e-commerce #effectiveness #evaluation
- A Formal Cost-Effectiveness Analysis Model for Product Evaluation in E-Commerce (RW, HX), pp. 287–293.
- SIGIR-2013-AnH #information retrieval #probability #semantics
- Boosting novelty for biomedical information retrieval through probabilistic latent semantic analysis (XA, JXH), pp. 829–832.
- SIGIR-2013-ChaBHC #modelling #network #social #topic
- Incorporating popularity in topic models for social network analysis (YC, BB, CCH, JC), pp. 223–232.
- SIGIR-2013-GippMBLN #detection
- Demonstration of citation pattern analysis for plagiarism detection (BG, NM, CB, ML, AN), pp. 1119–1120.
- SIGIR-2013-GolbusA #framework #information retrieval
- A mutual information-based framework for the analysis of information retrieval systems (PBG, JAA), pp. 683–692.
- SIGIR-2013-PappasP #collaboration #sentiment
- Sentiment analysis of user comments for one-class collaborative filtering over ted talks (NP, APB), pp. 773–776.
- SIGIR-2013-SonKP #locality #recommendation #semantics
- A location-based news article recommendation with explicit localized semantic analysis (JWS, AYK, SBP), pp. 293–302.
- MoDELS-2013-NoyritGT #domain-specific language #integration #modelling #using
- Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
- MoDELS-2013-PerezGCCC #modelling #network #policy #security
- Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
- MoDELS-2013-SaadB #data flow
- Data-Flow Based Model Analysis and Its Applications (CS, BB), pp. 707–723.
- MoDELS-2013-StorrleF #physics #towards #visual notation
- Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages (HS, AF), pp. 104–120.
- PLEASE-2013-HuangYKHU #domain-specific language #mining #repository #towards
- Domain analysis for mining software repositories: Towards feature-based DSL construction (CH, KY, YK, KH, NU), pp. 41–44.
- SPLC-2013-EichelbergerS #modelling #variability
- A systematic analysis of textual variability modeling languages (HE, KS), pp. 12–21.
- SPLC-2013-KoziolekGGDS #case study #experience #identification #reuse
- Experiences from identifying software reuse opportunities by domain analysis (HK, TG, TdG, DD, SS), pp. 208–217.
- SPLC-2013-McGregor #ecosystem #modelling #tutorial
- Ecosystem modeling and analysis: a tutorial (JDM), p. 282.
- Onward-2013-RossoJ #concept #design #git #what
- What’s wrong with git?: a conceptual design analysis (SPDR, DJ), pp. 37–52.
- OOPSLA-2013-ChongDKKQ #abstraction #gpu #invariant #kernel
- Barrier invariants: a shared state abstraction for the analysis of data-dependent GPU kernels (NC, AFD, PHJK, JK, SQ), pp. 605–622.
- OOPSLA-2013-HuangB #context-sensitive grammar #memory management #performance
- Efficient context sensitivity for dynamic analyses via calling context uptrees and customized memory management (JH, MDB), pp. 53–72.
- OOPSLA-2013-MeyerovichR #empirical #programming language
- Empirical analysis of programming language adoption (LAM, ASR), pp. 1–18.
- OOPSLA-2013-SmaragdakisBK #points-to #preprocessor
- Set-based pre-processing for points-to analysis (YS, GB, GK), pp. 253–270.
- AdaEurope-2013-AsensioLCN #approach #execution #safety #worst-case
- Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
- HILT-2013-CarterFHHT #named
- SAW: the software analysis workbench (KC, AF, JH, BH, AT), pp. 15–18.
- HILT-2013-Whalen #architecture #development #formal method #modelling #scalability #using
- Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
- LOPSTR-2013-AlbertGG #approach
- A Transformational Approach to Resource Analysis with Typed-Norms (EA, SG, RG), pp. 38–53.
- LOPSTR-2013-LiqatKSGLGHE #energy #modelling #source code
- Energy Consumption Analysis of Programs Based on XMOS ISA-Level Models (UL, SK, AS, KG, PLG, NG, MVH, KE), pp. 72–90.
- PADL-2013-RodriguesASF #abstraction #composition #declarative #multi #using
- A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
- PEPM-2013-SunCZ #constraints #locality #source code
- Constraint-based locality analysis for X10 programs (QS, YC, JZ), pp. 137–146.
- PLDI-2013-KastrinisS #context-sensitive grammar #hybrid #points-to
- Hybrid context-sensitivity for points-to analysis (GK, YS), pp. 423–434.
- PLDI-2013-SchaferSDT
- Dynamic determinacy analysis (MS, MS, JD, FT), pp. 165–174.
- PLDI-2013-ZhangLYS #algorithm #alias #performance
- Fast algorithms for Dyck-CFL-reachability with applications to alias analysis (QZ, MRL, HY, ZS), pp. 435–446.
- PLDI-2013-ZhangNY #abstraction #data flow #parametricity
- Finding optimum abstractions in parametric dataflow analysis (XZ, MN, HY), pp. 365–376.
- PPDP-2013-MontenegroPS #functional #regular expression #using
- Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
- QAPL-2013-NgoH #concurrent #multi #security #source code #thread
- Quantitative Security Analysis for Multi-threaded Programs (TMN, MH), pp. 34–48.
- SAS-2013-BlazyLMP #abstract interpretation #c #verification
- Formal Verification of a C Value Analysis Based on Abstract Interpretation (SB, VL, AM, DP), pp. 324–344.
- SAS-2013-DragoiES #data type
- Local Shape Analysis for Overlaid Data Structures (CD, CE, MS), pp. 150–171.
- SAS-2013-WhiteM #algebra #memory management #optimisation #using
- Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
- RE-2013-BreauxR #formal method #multi #privacy #requirements #specification
- Formal analysis of privacy requirements specifications for multi-tier applications (TDB, AR), pp. 14–20.
- RE-2013-MasseyEAS #automation #documentation #mining #policy #requirements
- Automated text mining for requirements analysis of policy documents (AKM, JE, AIA, PPS), pp. 4–13.
- RE-2013-NistalaK #approach #consistency #requirements #validation
- An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure (PN, PK), pp. 320–325.
- REFSQ-2013-BonBGALTBFGATA #case study #requirements
- Use Case and Requirements Analysis in a Remote Rural Context in Mali (AB, VdB, NBG, CvA, PDL, WT, SB, MF, AG, MA, AT, HA), pp. 331–346.
- REFSQ-2013-BreauxG #requirements #specification #traceability #using
- Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
- SAC-PL-J-2010-PopeeaC13 #debugging #proving #safety
- Dual analysis for proving safety and finding bugs (CP, WNC), pp. 390–411.
- ASE-2013-AnnervazKSS #domain model #modelling #natural language #quality #requirements
- Natural language requirements quality analysis based on business domain models (KMA, VSK, SS, MS), pp. 676–681.
- ASE-2013-GarciaIM #architecture #comparative
- A comparative analysis of software architecture recovery techniques (JG, II, NM), pp. 486–496.
- ASE-2013-LetsholoZC #modelling #named #requirements
- TRAM: A tool for transforming textual requirements into analysis models (KL, LZ, EVC), pp. 738–741.
- ASE-2013-OhmannL #control flow #debugging #lightweight
- Lightweight control-flow instrumentation and postmortem analysis in support of debugging (PO, BL), pp. 378–388.
- ASE-2013-RosnerSAKF #alloy #clustering #modelling #named #parallel
- Ranger: Parallel analysis of alloy models by range partitioning (NR, JHS, NA, SK, MFF), pp. 147–157.
- ASE-2013-Servant #debugging #using
- Supporting bug investigation using history analysis (FS), pp. 754–757.
- ASE-2013-SumnerZ #execution #identification
- Identifying execution points for dynamic analyses (WNS, XZ), pp. 81–91.
- ASE-2013-Wu0LD #automation #component #dependence #using
- Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
- ESEC-FSE-2013-ClaretRNGB #data flow #using
- Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
- ESEC-FSE-2013-JiangZLSHGS #reliability #runtime
- System reliability calculation based on the run-time analysis of ladder program (YJ, HZ, HL, XS, WNNH, MG, JS), pp. 695–698.
- ESEC-FSE-2013-KumarCS #industrial #precise #scalability
- Precise range analysis on large industry code (SK, BC, US), pp. 675–678.
- ESEC-FSE-2013-LiebigRKADL #scalability
- Scalable analysis of variable software (JL, AvR, CK, SA, JD, CL), pp. 81–91.
- ESEC-FSE-2013-MusluBEN
- Making offline analyses continuous (KM, YB, MDE, DN), pp. 323–333.
- ESEC-FSE-2013-QiuLS #co-evolution #database #empirical
- An empirical analysis of the co-evolution of schema and code in database applications (DQ, BL, ZS), pp. 125–135.
- ESEC-FSE-2013-WuHTY #alias #detection #effectiveness #fault
- Effective dynamic detection of alias analysis errors (JW, GH, YT, JY), pp. 279–289.
- ESEC-FSE-2013-ZhengZG #named #string #web
- Z3-str: a z3-based string solver for web application analysis (YZ, XZ, VG), pp. 114–124.
- ICSE-2013-AlmorsyGI #architecture #automation #security #using
- Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
- ICSE-2013-CarrenoW #approach #evolution #requirements
- Analysis of user comments: an approach for software requirements evolution (LVGC, KW), pp. 582–591.
- ICSE-2013-FilieriPV #reliability
- Reliability analysis in symbolic pathfinder (AF, CSP, WV), pp. 622–631.
- ICSE-2013-Le
- Segmented symbolic analysis (WL), pp. 212–221.
- ICSE-2013-Muslu #development #maintenance
- Integrating systematic exploration, analysis, and maintenance in software development (KM), pp. 1389–1392.
- ICSE-2013-NguyenQRC #named #program repair #semantics
- SemFix: program repair via semantic analysis (HDTN, DQ, AR, SC), pp. 772–781.
- ICSE-2013-SchwankeXC #architecture #quality
- Measuring architecture quality by structure plus history analysis (RWS, LX, YC), pp. 891–900.
- ICSE-2013-StephanASC #clone detection #comparison #detection #framework #mutation testing #using
- Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
- SAC-2013-AbeniM #interactive
- Analysis of client/server interactions in a reservation-based system (LA, NM), pp. 1603–1609.
- SAC-2013-CameronSNMM #component #performance #realtime #rule-based
- Performance analysis of a rule-based SOA component for real-time applications (AC, MS, NN, WM, TM), pp. 1877–1884.
- SAC-2013-GregioFAGMJ #behaviour #empirical #internet
- An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
- SAC-2013-HogenboomBFBJK #sentiment
- Exploiting emoticons in sentiment analysis (AH, DB, FF, MB, FdJ, UK), pp. 703–710.
- SAC-2013-HuangXCL #adaptation #algorithm #detection #implementation #parallel #random testing #testing
- Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
- SAC-2013-KalyanC #navigation #using
- A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
- SAC-2013-KoPH #design #realtime #video
- Design analysis for real-time video transcoding on cloud systems (SK, SP, HH), pp. 1610–1615.
- SAC-2013-MeloAOAMB #approach #concept #visual notation
- A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
- SAC-2013-PayetDKV #execution #scalability
- EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
- SAC-2013-TsukudaOYIT #coordination
- Discovering unexpected information on the basis of popularity/unpopularity analysis of coordinate objects and their relationships (KT, HO, MY, HI, KT), pp. 878–885.
- SAC-2013-VeeraragavanBMVNM #comprehension #distributed #experience #interactive #metric #multi #quality
- Understanding the quality of experience in modern distributed interactive multimedia applications in presence of failures: metrics and analysis (NRV, AB, LM, RV, NN, HM), pp. 439–446.
- SAC-2013-WaflerH #approach #dependence #grid #modelling #smarttech
- A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
- SAC-2013-ZhongM #empirical #game studies
- Google play is not a long tail market: an empirical analysis of app adoption on the Google play app market (NZ, FM), pp. 499–504.
- LDTA-J-2009-SoderbergEHM #abstract syntax tree #syntax
- Extensible intraprocedural flow analysis at the abstract syntax tree level (ES, TE, GH, EM), pp. 1809–1827.
- SLE-2013-WachsmuthKVGV #incremental #independence
- A Language Independent Task Engine for Incremental Name and Type Analysis (GW, GDPK, VAV, DMG, EV), pp. 260–280.
- CASE-2013-ChenZAX #finite
- Analysis of production completion time in Bernoulli serial lines with finite buffers (GC, LZ, JA, GX), pp. 770–775.
- CASE-2013-ChenZH #modelling #performance
- Mathematical modeling and performance analysis of battery equalization systems (HC, LZ, YH), pp. 711–716.
- CASE-2013-FantiIRU #scheduling #simulation
- A simulation based analysis of production scheduling in a steelmaking and continuous casting plant (MPF, GI, GR, WU), pp. 150–155.
- CASE-2013-GiulianiCP #optimisation
- A computational analysis of nondifferentiable optimization: Applications to production maximization in gas-lifted oil fields (CMG, EC, AP), pp. 286–291.
- CASE-2013-LanzaKPSS #automation #detection #fault #using
- Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
- CASE-2013-Markovski #synthesis
- Synthesis and analysis of supervisory controllers for time-abstracted discrete-event systems (JM), pp. 1075–1082.
- CASE-2013-SaidiM #configuration management #development #self
- Analysis and development of self-reconfigurable open kinematic machinery systems (RAS, BPM), pp. 966–971.
- CASE-2013-WuCY #policy #reachability
- A control policy for γ-nets without reachability analysis and siphon enumeration (WW, DYC, FY), pp. 1133–1138.
- CASE-2013-XieLSD #approach #markov #modelling #process
- Modeling and analysis of hospital inpatient rescue process: A Markov chain approach (XX, JL, CHS, YD), pp. 978–983.
- CASE-2013-ZhangH #algorithm #convergence #coordination #implementation #optimisation #parallel
- Convergence analysis and parallel computing implementation for the multiagent coordination optimization algorithm with applications (HZ, QH), pp. 825–830.
- CASE-2013-ZhaoL #exponential #multi
- Analysis of multi-product manufacturing systems with homogeneous exponential machines (CZ, JL), pp. 386–391.
- CASE-2013-ZhongLEHF #modelling #process #testing
- Modeling and analysis of mammography testing process at a breast imaging center of University of Wisconsin medical foundation (XZ, JL, SME, CH, LF), pp. 611–616.
- CASE-2013-ZhouKZS
- Causal analysis for non-stationary time series in sensor-rich smart buildings (YZ, ZK, LZ, CJS), pp. 593–598.
- CC-2013-KastrinisS #effectiveness #exception #java #performance #points-to
- Efficient and Effective Handling of Exceptions in Java Points-to Analysis (GK, YS), pp. 41–60.
- CC-2013-LuSXX #incremental #points-to
- An Incremental Points-to Analysis with CFL-Reachability (YL, LS, XX, JX), pp. 61–81.
- CC-2013-SiegelS #named
- FESA: Fold- and Expand-Based Shape Analysis (HS, AS), pp. 82–101.
- CGO-2013-KruijfS #code generation #evaluation #implementation
- Idempotent code generation: Implementation, analysis, and evaluation (MdK, KS), p. 12.
- CGO-2013-LaiS #bound #optimisation #performance
- Performance upper bound analysis and optimization of SGEMM on Fermi and Kepler GPUs (JL, AS), p. 10.
- DAC-2013-AgostaBMP
- Compiler-based side channel vulnerability analysis and optimized countermeasures application (GA, AB, MM, GP), p. 6.
- DAC-2013-AlleMD #dependence #pipes and filters #runtime #synthesis
- Runtime dependency analysis for loop pipelining in high-level synthesis (MA, AM, SD), p. 10.
- DAC-2013-AndalamGSRR #precise
- Precise timing analysis for direct-mapped caches (SA, AG, RS, PSR, JR), p. 10.
- DAC-2013-ChippaCRR #approximate
- Analysis and characterization of inherent application resilience for approximate computing (VKC, STC, KR, AR), p. 9.
- DAC-2013-DingLM #multi #realtime
- Integrated instruction cache analysis and locking in multitasking real-time systems (HD, YL, TM), p. 10.
- DAC-2013-EbrahimiAT #approach #multi
- A layout-based approach for multiple event transient analysis (ME, HA, MBT), p. 6.
- DAC-2013-KuruvillaSPVC #optimisation #set #statistics
- Speeding up computation of the max/min of a set of gaussians for statistical timing analysis and optimization (VK, DS, JP, CV, NC), p. 7.
- DAC-2013-LinLM #hybrid #kernel #reachability #verification
- Verification of digitally-intensive analog circuits via kernel ridge regression and hybrid reachability analysis (HL, PL, CJM), p. 6.
- DAC-2013-MallikZLCBBBCRBMV #evaluation #framework #named
- TEASE: a systematic analysis framework for early evaluation of FinFET-based advanced technology nodes (AM, PZ, TTL, BC, BB, PRDB, RB, KC, JR, MB, AM, DV), p. 6.
- DAC-2013-Miskov-ZivanovMF #automation #behaviour #design #network
- Dynamic behavior of cell signaling networks: model design and analysis automation (NMZ, DM, JRF), p. 6.
- DAC-2013-RaiSST #algorithm #distributed #network #process
- Distributed stable states for process networks: algorithm, analysis, and experiments on intel SCC (DR, LS, NS, LT), p. 10.
- DATE-2013-AhmadyanV #reachability #reduction #set
- Reachability analysis of nonlinear analog circuits through iterative reachable set reduction (SNA, SV), pp. 1436–1441.
- DATE-2013-AitkenFKRR #how #question #reliability
- Reliability analysis reloaded: how will we survive? (RA, GF, ZTK, FR, MSR), pp. 358–367.
- DATE-2013-AlieeGRT #automation #fault #reliability
- Automatic success tree-based reliability analysis for the consideration of transient and permanent faults (HA, MG, FR, JT), pp. 1621–1626.
- DATE-2013-BanaiyanMofradDG #distributed #fault tolerance #modelling
- Modeling and analysis of fault-tolerant distributed memories for networks-on-chip (AB, ND, GG), pp. 1605–1608.
- DATE-2013-BoleyCAC #estimation #performance
- Leveraging sensitivity analysis for fast, accurate estimation of SRAM dynamic write VMIN (JB, VC, RCA, BHC), pp. 1819–1824.
- DATE-2013-BundMS
- Event density analysis for event triggered control systems (TB, BM, FS), pp. 1111–1116.
- DATE-2013-CaiHMM #memory management #modelling
- Threshold voltage distribution in MLC NAND flash memory: characterization, analysis, and modeling (YC, EFH, OM, KM), pp. 1285–1290.
- DATE-2013-CastellanaF #independence #liveness #scheduling #synthesis
- Scheduling independent liveness analysis for register binding in high level synthesis (VGC, FF), pp. 1571–1574.
- DATE-2013-ChenM #modelling #reliability
- System-level modeling and microprocessor reliability analysis for backend wearout mechanisms (CCC, LM), pp. 1615–1620.
- DATE-2013-ChenRSIFC #process
- A SPICE-compatible model of graphene nano-ribbon field-effect transistors enabling circuit-level delay and power analysis under process variation (YYC, AR, AS, GI, GF, DC), pp. 1789–1794.
- DATE-2013-DiazSSR #network #performance #security #simulation
- Wireless sensor network simulation for security and performance analysis (AD, PS, JS, JR), pp. 432–435.
- DATE-2013-DoganBCABA #embedded #execution #multi #platform #power management
- Synchronizing code execution on ultra-low-power embedded multi-channel signal analysis platforms (AYD, RB, JC, GA, AB, DA), pp. 396–399.
- DATE-2013-FakihGFR #architecture #model checking #performance #towards #using
- Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
- DATE-2013-FirouziKTN #runtime
- Incorporating the impacts of workload-dependent runtime variations into timing analysis (FF, SK, MBT, SRN), pp. 1022–1025.
- DATE-2013-GuanYL0 #approach #estimation
- FIFO cache analysis for WCET estimation: a quantitative approach (NG, XY, ML, WY), pp. 296–301.
- DATE-2013-HasanA #fault #feedback #formal method #using
- Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
- DATE-2013-HellwegeHPP #metric #reliability
- Reliability analysis for integrated circuit amplifiers used in neural measurement systems (NH, NH, DPD, SP), pp. 713–716.
- DATE-2013-ImagawaTOS #architecture #configuration management #effectiveness
- A cost-effective selective TMR for heterogeneous coarse-grained reconfigurable architectures based on DFG-level vulnerability analysis (TI, HT, HO, TS), pp. 701–706.
- DATE-2013-KosmidisCQABC #design #probability
- Probabilistic timing analysis on conventional cache designs (LK, CC, EQ, JA, EDB, FJC), pp. 603–606.
- DATE-2013-LishernessLC #mutation testing
- Mutation analysis with coverage discounting (PL, NL, KT(C), pp. 31–34.
- DATE-2013-LiZCZ #multi #simulation
- Multi-level phase analysis for sampling simulation (JL, WZ, HC, BZ), pp. 649–654.
- DATE-2013-MalburgFF #comprehension #data flow #design
- Tuning dynamic data flow analysis to support design understanding (JM, AF, GF), pp. 1179–1184.
- DATE-2013-MaYGGTBH #architecture #towards #validation
- Toward polychronous analysis and validation for timed software architectures in AADL (YM, HY, TG, PLG, JPT, LB, MH), pp. 1173–1178.
- DATE-2013-NegreanKE #manycore
- Timing analysis of multi-mode applications on AUTOSAR conform multi-core systems (MN, SK, RE), pp. 302–307.
- DATE-2013-NeukirchnerQMAE #realtime
- Sensitivity analysis for arbitrary activation patterns in real-time systems (MN, SQ, TM, PA, RE), pp. 135–140.
- DATE-2013-PollexFSMMW #constant #realtime
- Sufficient real-time analysis for an engine control unit with constant angular velocities (VP, TF, FS, UM, RM, GW), pp. 1335–1338.
- DATE-2013-QianJBTMM #named #performance #using
- SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
- DATE-2013-QuintonNE #formal method #realtime
- Formal analysis of sporadic bursts in real-time systems (SQ, MN, RE), pp. 767–772.
- DATE-2013-RaminiGBB #3d #manycore #power management #using
- Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
- DATE-2013-SchneiderZGMC #composition
- Compositional analysis of switched ethernet topologies (RS, LZ, DG, AM, SC), pp. 1099–1104.
- DATE-2013-ShahKA #bound
- Bounding SDRAM interference: detailed analysis vs. latency-rate analysis (HS, AK, BA), pp. 308–313.
- DATE-2013-StanisicVCDMLM #embedded #performance #platform #power management
- Performance analysis of HPC applications on low-power embedded platforms (LS, BV, JC, AD, VMM, AL, JFM), pp. 475–480.
- DATE-2013-SubramanyanTPRSM #functional #reverse engineering #using
- Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
- DATE-2013-TheissingMSSS #fault
- Comprehensive analysis of software countermeasures against fault attacks (NT, DM, MS, FS, GS), pp. 404–409.
- DATE-2013-WagnerW #performance #statistics
- Efficient variation-aware statistical dynamic timing analysis for delay test applications (MW, HJW), pp. 276–281.
- DATE-2013-WildermannZT #distributed #game studies #manycore
- Game-theoretic analysis of decentralized core allocation schemes on many-core systems (SW, TZ, JT), pp. 1498–1503.
- DATE-2013-YaoYW #adaptation #modelling #online #performance
- Efficient importance sampling for high-sigma yield analysis with adaptive online surrogate modeling (JY, ZY, YW), pp. 1291–1296.
- DATE-2013-YilmazSWO #fault #industrial #scalability #simulation
- Fault analysis and simulation of large scale industrial mixed-signal circuits (EY, GS, LW, SO), pp. 565–570.
- ISMM-2013-LiCK #graph #pointer #precise #scalability
- Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
- LCTES-2013-HuberPP #control flow #graph #using
- Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
- LCTES-2013-MorenoFH #debugging #embedded
- Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis (CM, SF, MAH), pp. 77–88.
- PDP-2013-BasileCLP #reachability #security
- Improved Reachability Analysis for Security Management (CB, DC, AL, CP), pp. 534–541.
- PDP-2013-EittenbergerSK #network #peer-to-peer #streaming
- Location-Aware Traffic Analysis of a Peer-to-Peer Streaming Application in a HSPA Network (PME, KMS, URK), pp. 444–448.
- PDP-2013-McCoolSMK #named #parallel
- Paralysis: An Extensible Multi-tiered Guidance Environment for Program Parallelization and Analysis (SM, RS, PM, FK), pp. 400–404.
- PLOS-2013-BurtsevMER #named #performance #streaming
- Weir: a streaming language for performance analysis (AB, NM, EE, RR), p. 6.
- PPoPP-2013-WuZZJS #algorithm #complexity #design #gpu #memory management
- Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU (BW, ZZ, EZZ, YJ, XS), pp. 57–68.
- PPoPP-2013-YukiFRS #array #data flow #source code
- Array dataflow analysis for polyhedral X10 programs (TY, PF, SVR, VS), pp. 23–34.
- SOSP-2013-HuangBRLKL #facebook
- An analysis of Facebook photo caching (QH, KB, RvR, WL, SK, HCL), pp. 167–181.
- ESOP-2013-AlpuenteBFS #logic #specification
- Slicing-Based Trace Analysis of Rewriting Logic Specifications with iJulienne (MA, DB, FF, JS), pp. 121–124.
- ESOP-2013-BeyerHTV #multi #reachability #reuse
- Information Reuse for Multi-goal Reachability Analyses (DB, AH, MT, HV), pp. 472–491.
- ESOP-2013-CollingbourneDKQ #gpu #kernel #semantics #verification
- Interleaving and Lock-Step Semantics for Analysis and Verification of GPU Kernels (PC, AFD, JK, SQ), pp. 270–289.
- ESOP-2013-HofmannR #automation #type inference
- Automatic Type Inference for Amortised Heap-Space Analysis (MH, DR), pp. 593–613.
- FASE-2013-LinPEHR #behaviour #requirements #sequence #specification #string
- Augmenting Sequence Enumeration with String-Rewriting for Requirements Analysis and Behavioral Specification (LL, JHP, RE, RMH, CRM), pp. 179–193.
- FASE-2013-TrippPCCG #named #scalability #security #web
- Andromeda: Accurate and Scalable Security Analysis of Web Applications (OT, MP, PC, RC, SG), pp. 210–225.
- FoSSaCS-2013-HainryMP #complexity #process #type system
- Type-Based Complexity Analysis for Fork Processes (EH, JYM, RP), pp. 305–320.
- STOC-2013-HardtR #worst-case
- Beyond worst-case analysis in private singular vector computation (MH, AR), pp. 331–340.
- STOC-2013-KwokLLGT #algorithm #clustering #difference #higher-order
- Improved Cheeger’s inequality: analysis of spectral partitioning algorithms through higher order spectral gap (TCK, LCL, YTL, SOG, LT), pp. 11–20.
- TACAS-2013-BalasubramanianPKL #multi #named #statechart
- Polyglot: Systematic Analysis for Multiple Statechart Formalisms (DB, CSP, GK, MRL), pp. 523–529.
- TACAS-2013-FerraraMP #data access #policy #self
- Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
- TACAS-2013-GodefroidY #source code
- Analysis of Boolean Programs (PG, MY), pp. 214–229.
- TACAS-2013-Lowe #contest
- CPAchecker with Explicit-Value Analysis Based on CEGAR and Interpolation — (Competition Contribution) (SL), pp. 610–612.
- TACAS-2013-VizelGS #reachability #using
- Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
- TACAS-2013-Wendler #contest
- CPAchecker with Sequential Combination of Explicit-State Analysis and Predicate Analysis — (Competition Contribution) (PW), pp. 613–615.
- CADE-2013-ErbaturEKLLMMNSS #encryption #paradigm #protocol #symmetry #unification
- Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis (SE, SE, DK, ZL, CL, CM, JM, PN, SS, RS), pp. 231–248.
- CAV-2013-HolikLRSV #automation #automaton
- Fully Automated Shape Analysis Based on Forest Automata (LH, OL, AR, JS, TV), pp. 740–755.
- CAV-2013-MeierSCB #protocol #proving #security
- The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
- CAV-2013-Sankur #automaton #named #robust
- Shrinktech: A Tool for the Robustness Analysis of Timed Automata (OS), pp. 1006–1012.
- ICLP-J-2013-LiangK #logic programming #scalability #source code
- A practical analysis of non-termination in large logic programs (SL, MK), pp. 705–719.
- ICLP-J-2013-MaLWRL #approach #declarative #distributed #execution #specification
- A declarative approach to distributed computing: Specification, execution and analysis (JM, FL, DW, AR, JL), pp. 815–830.
- ICST-2013-CarrozzaCNPR #industrial #predict
- Analysis and Prediction of Mandelbugs in an Industrial Software System (GC, DC, RN, RP, SR), pp. 262–271.
- ICST-2013-FryW #maintenance
- Leveraging Light-Weight Analyses to Aid Software Maintenance (ZPF, WW), pp. 507–508.
- ICST-2013-GargantiniGM #automation #named #robust
- AURORA: AUtomatic RObustness coveRage Analysis Tool (AG, MG, EM), pp. 463–470.
- ICST-2013-ShuSHP #dependence #framework #named #platform
- JavaPDG: A New Platform for Program Dependence Analysis (GS, BS, TADH, AP), pp. 408–415.
- ISSTA-2013-Ghaith #performance #testing #transaction
- Analysis of performance regression testing data by transaction profiles (SG), pp. 370–373.
- ISSTA-2013-HowarGR #generative #hybrid #interface #learning
- Hybrid learning: interface generation through static, dynamic, and symbolic analysis (FH, DG, ZR), pp. 268–279.
- ISSTA-2013-RosnerGBBRPZF #bound #invariant #parallel #refinement
- Parallel bounded analysis in code with rich invariants by refinement of field bounds (NR, JPG, SB, GMB, SPDR, LP, LZ, MFF), pp. 23–33.
- ISSTA-2013-WeiR #javascript
- Practical blended taint analysis for JavaScript (SW, BGR), pp. 336–346.
- LICS-2013-ChaudhuriSV
- Regular Real Analysis (SC, SS, MYV), pp. 509–518.
- TAP-2013-GogollaBC #benchmark #metric #ocl #tool support #uml
- Initiating a Benchmark for UML and OCL Analysis Tools (MG, FB, JC), pp. 115–132.
- VMCAI-2013-SamantaDC #robust
- Robustness Analysis of Networked Systems (RS, JVD, SC), pp. 229–247.
- VMCAI-2013-SeladjiB #abstract domain #fixpoint #tool support #using
- Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
- CBSE-2012-BenesBCO #component #development #model checking #probability #reliability
- Reliability analysis in component-based development via probabilistic model checking (NB, BB, IC, RO), pp. 83–92.
- CBSE-2012-Carlson #component #embedded
- Timing analysis of component-based embedded systems (JC), pp. 151–156.
- WICSA-ECSA-2012-AstekinS #clone detection #detection #simulation
- Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
- WICSA-ECSA-2012-EdwardsBM #automation #code generation #modelling
- Automated Analysis and Code Generation for Domain-Specific Models (GE, YB, NM), pp. 161–170.
- WICSA-ECSA-2012-SuYZ #architecture #component #semantics
- Semantic Analysis of Component-aspect Dynamism for Connector-based Architecture Styles (GS, MY, CZ), pp. 151–160.
- WICSA-ECSA-2012-TauschPA #domain-specific language #named #traceability
- TracQL: A Domain-Specific Language for Traceability Analysis (NT, MP, JA), pp. 320–324.
- DocEng-2012-JunediGL #independence #revisited #xml
- XML query-update independence analysis revisited (MJ, PG, NL), pp. 95–98.
- DRR-2012-ChazalonC #documentation #interactive #performance
- Iterative analysis of document collections enables efficient human-initiated interaction (JC, BC).
- HT-2012-AisoposPTV #comparative #microblog #sentiment
- Content vs. context for sentiment analysis: a comparative analysis over microblogs (FA, GP, KT, TAV), pp. 187–196.
- HT-2012-KlienS #network
- Short links under attack: geographical analysis of spam in a URL shortener network (FK, MS), pp. 83–88.
- HT-2012-NakajimaZIN #detection #scalability
- Early detection of buzzwords based on large-scale time-series analysis of blog entries (SN, JZ, YI, RYN), pp. 275–284.
- JCDL-2012-FreireBC #library #metadata #problem #recognition
- An analysis of the named entity recognition problem in digital library metadata (NF, JLB, PC), pp. 171–174.
- JCDL-2012-YiZYYPW #multi #semantics
- Improving multi-faceted book search by incorporating sparse latent semantic analysis of click-through logs (DY, YZ, HY, YY, JP, BW), pp. 249–258.
- SIGMOD-2012-YangZMWX #difference #privacy
- Differential privacy in data publication and analysis (YY, ZZ, GM, MW, XX), pp. 601–606.
- TPDL-2012-LeeTC #challenge #game studies #metadata #video
- Domain Analysis for a Video Game Metadata Schema: Issues and Challenges (JHL, JTT, RIC), pp. 280–285.
- TPDL-2012-LlewellynGOH #tool support #using
- Enhancing the Curation of Botanical Data Using Text Analysis Tools (CL, CG, JO, EH), pp. 480–485.
- TPDL-2012-TranF
- Quantitative Analysis of Search Sessions Enhanced by Gaze Tracking with Dynamic Areas of Interest (VTT, NF), pp. 468–473.
- VLDB-2012-AlsubaieeAABBBCGHKLOPVW #big data #data transformation #named #open source
- ASTERIX: An Open Source System for “Big Data” Management and Analysis (SA, YA, HA, AB, VRB, YB, MJC, RG, ZH, YSK, CL, NO, PP, RV, JW), pp. 1898–1901.
- VLDB-2012-DalviMP #web
- An Analysis of Structured Data on the Web (NND, AM, BP), pp. 680–691.
- VLDB-2012-DasTADY #framework #what
- Who Tags What? An Analysis Framework (MD, ST, SAY, GD, CY), pp. 1567–1578.
- VLDB-2012-GawadeK #execution #framework #interactive #named #platform #query #visual notation
- Stethoscope: A platform for interactive visual analysis of query execution plans (MG, MLK), pp. 1926–1929.
- VLDB-2012-LetelierPPS #named
- SPAM: A SPARQL Analysis and Manipulation Tool (AL, JP, RP, SS), pp. 1958–1961.
- VLDB-2012-RoyDMSW
- Massive Genomic Data Processing and Deep Analysis (AR, YD, EM, YS, BLW), pp. 1906–1909.
- VLDB-2012-SunHYY #approach #mining #network
- Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach (YS, JH, XY, PSY), pp. 2022–2023.
- VLDB-2012-XuLGC #big data #clustering #in the cloud #interactive #named #visual notation
- CloudVista: Interactive and Economical Visual Cluster Analysis for Big Data in the Cloud (HX, ZL, SG, KC), pp. 1886–1889.
- VLDB-2012-ZhangZXYW #difference #functional #privacy
- Functional Mechanism: Regression Analysis under Differential Privacy (JZ, ZZ, XX, YY, MW), pp. 1364–1375.
- VLDB-2013-ZhaoT12 #network #scalability #social #visual notation
- Large Scale Cohesive Subgraphs Discovery for Social Network Visual Analysis (FZ, AKHT), pp. 85–96.
- ITiCSE-2012-BrownPSE #complexity #generative #named
- JUG: a JUnit generation, time complexity analysis and reporting tool to streamline grading (CB, RP, BS, JE), pp. 99–104.
- SIGITE-2012-AlviEAA #education
- Analysis and extraction of sentence-level paraphrase sub-corpus in CS education (FA, ESMEA, WGAK, REAA), pp. 49–54.
- CSMR-2012-GoulaoFWA #case study #comparative #evolution #predict #using
- Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
- CSMR-2012-HashimotoM #fine-grained #mining
- Enhancing History-Based Concern Mining with Fine-Grained Change Analysis (MH, AM), pp. 75–84.
- CSMR-2012-HoraADBCVM #debugging #visual notation
- Bug Maps: A Tool for the Visual Exploration and Analysis of Bugs (AH, NA, SD, MUB, CC, MTV, JM), pp. 523–526.
- CSMR-2012-KimKKB #database
- Rebuilding a Unified Database Service via Context Analysis Method (WK, THK, SK, DHB), pp. 471–474.
- CSMR-2012-LamkanfiD #debugging
- Filtering Bug Reports for Fix-Time Analysis (AL, SD), pp. 379–384.
- CSMR-2012-PerezDGM #ecosystem #named
- SECONDA: Software Ecosystem Analysis Dashboard (JP, RD, MG, TM), pp. 527–530.
- CSMR-2012-TerceiroMCC #complexity #comprehension #evolution
- Understanding Structural Complexity Evolution: A Quantitative Analysis (ASdAT, MGM, CC, DSC), pp. 85–94.
- ICPC-2012-TenevD
- Applying bioinformatics in the analysis of software variants (VLT, SD), pp. 259–260.
- ICSM-2012-BauerHHJC #framework #incremental #quality #scalability
- A framework for incremental quality analysis of large software systems (VB, LH, BH, EJ, MC), pp. 537–546.
- ICSM-2012-BavotaQOLB #empirical #maintenance #smell #testing
- An empirical analysis of the distribution of unit test smells and their impact on software maintenance (GB, AQ, RO, ADL, DB), pp. 56–65.
- ICSM-2012-ChaikalisMC #evolution #named #network
- SEANets: Software evolution analysis with networks (TC, GM, AC), pp. 634–637.
- ICSM-2012-HindleBZN #developer #implementation #question #requirements #topic
- Relating requirements to implementation via topic analysis: Do topics extracted from requirements make sense to managers and developers? (AH, CB, TZ, NN), pp. 243–252.
- ICSM-2012-Pollock #challenge #natural language
- Leveraging natural language analysis of software: Achievements, challenges, and opportunities (LLP), p. 4.
- ICSM-2012-RaemaekersDV #library
- Measuring software library stability through historical version analysis (SR, AvD, JV), pp. 378–387.
- MSR-2012-GigerPG #empirical #predict
- Can we predict types of code changes? An empirical analysis (EG, MP, HCG), pp. 217–226.
- MSR-2012-GuanaRHS #android #architecture #multi
- Do the stars align? Multidimensional analysis of Android’s layered architecture (VG, FR, AH, ES), pp. 124–127.
- MSR-2012-HarmanJZ #mining
- App store mining and analysis: MSR for app stores (MH, YJ, YZ), pp. 108–111.
- MSR-2012-RotellaC #overview
- Analysis of customer satisfaction survey data (PR, SC), pp. 88–97.
- SCAM-2012-GutzmannLL #framework #points-to
- Collections Frameworks for Points-To Analysis (TG, JL, WL), pp. 4–13.
- SCAM-2012-KargenS #comprehension #data flow #named
- InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries (UK, NS), pp. 138–143.
- SCAM-2012-LazarescuL #c #dependence #parallel #source code
- Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs (MTL, LL), pp. 126–131.
- SCAM-2012-MayerS #refactoring
- Cross-Language Code Analysis and Refactoring (PM, AS), pp. 94–103.
- SCAM-2012-Xie #testing
- Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done (TX), pp. 1–3.
- WCRE-2012-ClearySCSP #assembly #named
- ATLANTIS — Assembly Trace Analysis Environment (BC, MADS, LC, MS, FP), pp. 505–506.
- WCRE-2012-HanZFHWS #android #comprehension #debugging #topic
- Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs (DH, CZ, XF, AH, KW, ES), pp. 83–92.
- WCRE-2012-SteidlHJ #network #recommendation #using
- Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
- LATA-2012-NikolicS #array
- Automaton-Based Array Initialization Analysis (DN, FS), pp. 420–432.
- FM-2012-BeekMS #named #variability
- VMC: A Tool for Product Variability Analysis (MHtB, FM, AS), pp. 450–454.
- FM-2012-MinamideM #html #parsing #reachability #specification #testing
- Reachability Analysis of the HTML5 Parser Specification and Its Application to Compatibility Testing (YM, SM), pp. 293–307.
- FM-2012-NguyenSLDL
- Improved BDD-Based Discrete Analysis of Timed Systems (TKN, JS, YL, JSD, YL), pp. 326–340.
- FM-2012-OwreSS #automation #cyber-physical
- Automatic Dimensional Analysis of Cyber-Physical Systems (SO, IS, NS), pp. 356–371.
- IFM-2012-BorgerCG #framework #web
- Contribution to a Rigorous Analysis of Web Application Frameworks (EB, AC, VG), pp. 1–20.
- IFM-2012-KazemeyniJOB #modelling #network #probability
- MULE-Based Wireless Sensor Networks: Probabilistic Modeling and Quantitative Analysis (FK, EBJ, OO, IB), pp. 143–157.
- SEFM-2012-AyraultBDP #dependence #ml
- ML Dependency Analysis for Assessors (PA, VB, CD, FP), pp. 278–292.
- SEFM-2012-CuoqKKPSY #named #perspective
- Frama-C — A Software Analysis Perspective (PC, FK, NK, VP, JS, BY), pp. 233–247.
- SEFM-2012-FerraraFJ
- TVAL+ : TVLA and Value Analyses Together (PF, RF, UJ), pp. 63–77.
- SFM-2012-Becker #model transformation #non-functional
- Model Transformations in Non-functional Analysis (SB), pp. 263–289.
- SFM-2012-CortellessaMT #modelling #performance
- Software Performance Antipatterns: Modeling and Analysis (VC, ADM, CT), pp. 290–335.
- FLOPS-2012-TobitaTK #higher-order #model checking
- Exact Flow Analysis by Higher-Order Model Checking (YT, TT, NK), pp. 275–289.
- ICFP-2012-EarlSMH #automaton #higher-order #source code
- Introspective pushdown analysis of higher-order programs (CE, IS, MM, DVH), pp. 177–188.
- ICFP-2012-SimoesVFJH #automation #functional #lazy evaluation #memory management #source code
- Automatic amortised analysis of dynamic memory allocation for lazy functional programs (HRS, PBV, MF, SJ, KH), pp. 165–176.
- IFL-2012-Fluet #control flow #system f
- A Type- and Control-Flow Analysis for System F (MF), pp. 122–139.
- AIIDE-2012-BauerP #game studies #refinement #visual notation #visualisation
- RRT-Based Game Level Analysis, Visualization, and Visual Refinement (AWB, ZP).
- CIG-2012-McGuinness #generative #representation #statistics
- Statistical analyses of representation choice in level generation (CM), pp. 312–319.
- GRAPHITE-2012-BeckmannFKM #graph
- A structural analysis of the A5/1 state transition graph (AB, JF, JK, UM), pp. 5–19.
- CHI-2012-BaurBB #component #music #scalability
- Listening factors: a large-scale principal components analysis of long-term music listening histories (DB, JB, AB), pp. 1273–1276.
- CHI-2012-BrechtEBG #network #social
- Corporate career presences on social network sites: an analysis of hedonic and utilitarian value (FB, AE, CB, OG), pp. 2441–2450.
- CHI-2012-ChuangRMH #design #modelling #trust #visualisation
- Interpretation and trust: designing model-driven visualizations for text analysis (JC, DR, CDM, JH), pp. 443–452.
- CHI-2012-DixonFW #interface #using #visual notation
- A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
- CHI-2012-FolstadLH #evaluation #overview #usability
- Analysis in practical usability evaluation: a survey study (AF, EL, KH), pp. 2127–2136.
- CHI-2012-KapteinR #statistics
- Rethinking statistical analysis methods for CHI (MK, JR), pp. 1105–1114.
- CHI-2012-MustafaLM #visual notation
- EEG analysis of implicit human visual perception (MM, LL, MAM), pp. 513–516.
- CHI-2012-WallnerK #approach #visualisation
- A spatiotemporal visualization approach for the analysis of gameplay data (GW, SK), pp. 1115–1124.
- CHI-2012-ZiemkiewiczGL #graph #visualisation
- Analysis within and between graphs: observed user strategies in immunobiology visualization (CZ, SRG, DHL), pp. 1655–1658.
- CSCW-2012-BorgeGSC #process
- Patterns of team processes and breakdowns in information analysis tasks (MB, CHG, SIS, JMC), pp. 1105–1114.
- CSCW-2012-EhrlichC #communication #development #distributed #multi #performance
- All-for-one and one-for-all?: a multi-level analysis of communication patterns and individual performance in geographically distributed software development (KE, MC), pp. 945–954.
- CSCW-2012-KeeganGC #collaboration #editing #multi #network #statistics #wiki
- Do editors or articles drive collaboration?: multilevel statistical network analysis of wikipedia coauthorship (BK, DG, NSC), pp. 427–436.
- CSCW-2012-McDonaldGZ #prototype #social #type system
- Building for social translucence: a domain analysis and prototype system (DWM, SG, MZ), pp. 637–646.
- CSCW-2012-NguyenF #how
- How did you feel during our conversation?: retrospective analysis of intercultural and same-culture instant messaging conversations (DTN, SRF), pp. 117–126.
- CAiSE-2012-ZawawyKMM #logic #markov #network #using
- Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
- EDOC-2012-BinzLNS #enterprise #graph transformation #segmentation
- Improving the Manageability of Enterprise Topologies Through Segmentation, Graph Transformation, and Analysis Strategies (TB, FL, AN, DS), pp. 61–70.
- EDOC-2012-BurattinMAS #declarative #process
- Techniques for a Posteriori Analysis of Declarative Processes (AB, FMM, WMPvdA, AS), pp. 41–50.
- EDOC-2012-WangWART #composition #ecosystem #modelling
- Compositional QoS Modeling and Analysis of Cloud-based Federated Ecosystems (GW, HW, SA, RR, JPT), pp. 173–182.
- ICEIS-J-2012-GeJG #recommendation
- Bringing Diversity to Recommendation Lists — An Analysis of the Placement of Diverse Items (MG, DJ, FG), pp. 293–305.
- ICEIS-v2-2012-PolasikGWKPT #mobile #process
- Chronometric Analysis of a Payment Process for Cash, Cards and Mobile Devices (MP, JG, GW, JK, KP, NT), pp. 220–229.
- ICEIS-v2-2012-SemenovV #architecture #social #social media
- Ontology-guided Social Media Analysis — System Architecture (AS, JV), pp. 335–341.
- ICEIS-v3-2012-BauerEFH #consistency #process
- Resource-oriented Consistency Analysis of Engineering Processes (BB, TE, CF, BH), pp. 206–211.
- ICEIS-v3-2012-BonacinHRPB #aspect-oriented #challenge #problem #social
- Interacting with Dynamic Social Knowledge — Revealing Challenges through an Analysis of Pragmatic Aspects of Problem Solving (RB, HHH, JCdR, RP, MCCB), pp. 54–63.
- ICEIS-v3-2012-CansadoVS #architecture #enterprise #multi #using
- Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
- CIKM-2012-AmatiAG #microblog
- Survival analysis for freshness in microblogging search (GA, GA, CG), pp. 2483–2486.
- CIKM-2012-AshkanC #behaviour #modelling
- Modeling browsing behavior for click analysis in sponsored search (AA, CLAC), pp. 2015–2019.
- CIKM-2012-DengSZ #documentation #performance #scalability
- Efficient jaccard-based diversity analysis of large document collections (FD, SS, SZ), pp. 1402–1411.
- CIKM-2012-DybalaRAS #comparative #generative #ranking
- Data filtering in humor generation: comparative analysis of hit rate and co-occurrence rankings as a method to choose usable pun candidates (PD, RR, KA, KS), pp. 2587–2590.
- CIKM-2012-EldardiryN #classification #graph #how #predict
- An analysis of how ensembles of collective classifiers improve predictions in graphs (HE, JN), pp. 225–234.
- CIKM-2012-HuHXLUZ #mining
- Finding nuggets in IP portfolios: core patent mining through textual temporal analysis (PH, MH, PX, WL, AKU, XZ), pp. 1819–1823.
- CIKM-2012-JatowtT #scalability
- Large scale analysis of changes in english vocabulary over recent time (AJ, KT), pp. 2523–2526.
- CIKM-2012-JatowtT12a #comparative #readability #wiki
- Is wikipedia too difficult?: comparative analysis of readability of wikipedia, simple wikipedia and britannica (AJ, KT), pp. 2607–2610.
- CIKM-2012-Jin #multi #process #profiling
- User activity profiling with multi-layer analysis (HJ), pp. 2030–2034.
- CIKM-2012-KazaiCYT #fault #information retrieval
- An analysis of systematic judging errors in information retrieval (GK, NC, EY, SMMT), pp. 105–114.
- CIKM-2012-LeelanupabZJ #cumulative #parametricity
- A comprehensive analysis of parameter settings for novelty-biased cumulative gain (TL, GZ, JMJ), pp. 1950–1954.
- CIKM-2012-LiuW #on the #semantics
- On the connections between explicit semantic analysis and latent semantic analysis (CL, YMW), pp. 1804–1808.
- CIKM-2012-LiuZG #ranking
- Full-text citation analysis: enhancing bibliometric and scientific publication ranking (XL, JZ, CG), pp. 1975–1979.
- CIKM-2012-RahmanBH #algorithm #approximate #graph #named #scalability
- GRAFT: an approximate graphlet counting algorithm for large graph analysis (MR, MB, MAH), pp. 1467–1471.
- CIKM-2012-YueJHH #collaboration #query #web
- Where do the query terms come from?: an analysis of query reformulation in collaborative web search (ZY, JJ, SH, DH), pp. 2595–2598.
- ECIR-2012-AlbakourKNASFR #query #web
- Analysis of Query Reformulations in a Search Engine of a Local Web Site (MDA, UK, NN, IA, DS, MF, ANDR), pp. 517–521.
- ECIR-2012-Bloom #graph
- Applying Power Graph Analysis to Weighted Graphs (NB), pp. 548–551.
- ECIR-2012-KarimzadehganZ #axiom #information retrieval
- Axiomatic Analysis of Translation Language Model for Information Retrieval (MK, CZ), pp. 268–280.
- ECIR-2012-KarlgrenSOEH #sentiment
- Usefulness of Sentiment Analysis (JK, MS, FO, FE, OH), pp. 426–435.
- ECIR-2012-ZucconAZW #retrieval #using
- Top-k Retrieval Using Facility Location Analysis (GZ, LA, DZ, JW), pp. 305–316.
- ICML-2012-ChenCRCC #linear
- Communications Inspired Linear Discriminant Analysis (MC, WRC, MRDR, LC, ARC), p. 196.
- ICML-2012-KalaitzisL #component
- Residual Components Analysis (AAK, NDL), p. 73.
- ICML-2012-MairalY #complexity
- Complexity Analysis of the Lasso Regularization Path (JM, BY), p. 238.
- ICML-2012-MerchanteGG #approach #linear #performance
- An Efficient Approach to Sparse Linear Discriminant Analysis (LFSM, YG, GG), p. 168.
- ICML-2012-PachauriCS #problem
- Incorporating Domain Knowledge in Matching Problems via Harmonic Analysis (DP, MDC, VS), p. 112.
- ICML-2012-VogtR
- A Complete Analysis of the l_1, p Group-Lasso (JEV, VR), p. 143.
- ICML-2012-YgerBGR #adaptation #canonical #correlation #matrix
- Adaptive Canonical Correlation Analysis Based On Matrix Manifolds (FY, MB, GG, AR), p. 43.
- ICML-2012-YuS #kernel
- Analysis of Kernel Mean Matching under Covariate Shift (YY, CS), p. 150.
- ICPR-2012-Abdel-HakimE #component #named #online #performance #robust
- FRPCA: Fast Robust Principal Component Analysis for online observations (AEAH, MES), pp. 413–416.
- ICPR-2012-AbouelenienY #fault #named #performance
- SampleBoost: Improving boosting performance by destabilizing weak learners based on weighted error analysis (MA, XY), pp. 585–588.
- ICPR-2012-AiDHC #component #feature model #independence #multi
- Multiple feature selection and fusion based on generalized N-dimensional independent component analysis (DA, GD, XHH, YWC), pp. 971–974.
- ICPR-2012-AjmeraD #detection #word
- Combining text and prosodic analysis for prominent word detection (JA, ODD), pp. 1534–1537.
- ICPR-2012-BenJY #automation #clustering #fuzzy
- Automatic fuzzy clustering based on mistake analysis (SB, ZJ, JY), pp. 2914–2917.
- ICPR-2012-CantoniOFP
- Structural analysis of protein Secondary Structure by GHT (VC, OO, AF, AP), pp. 1767–1770.
- ICPR-2012-ChenHCHC #using
- Occluded human action analysis using dynamic manifold model (LCC, JWH, CHC, CYH, DYC), pp. 1245–1248.
- ICPR-2012-ChenYY #null #recognition #scalability
- Large margin null space discriminant analysis with applications to face recognition (XC, JY, WY), pp. 1679–1682.
- ICPR-2012-ElnakibNCPGE #3d #quantifier #using
- Quantification of age-related brain cortex change using 3D shape analysis (AE, MN, MC, HYP, GLG, AEB), pp. 41–44.
- ICPR-2012-ErYAK #modelling
- Traffic accident risk analysis based on relation of Common Route Models (UE, SY, OA, MEK), pp. 2561–2564.
- ICPR-2012-GaoM #canonical #correlation #detection #kernel #multi #using
- Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
- ICPR-2012-GhoshC #automation #classification
- Feature analysis for automatic classification of HEp-2 florescence patterns : Computer-Aided Diagnosis of Auto-immune diseases (SG, VC), pp. 174–177.
- ICPR-2012-GuiST #estimation #parametricity
- Regularization parameter estimation for spectral regression discriminant analysis based on perturbation theory (JG, ZS, TT), pp. 401–404.
- ICPR-2012-HuangA #detection #perspective
- Saliency detection via divergence analysis: A unified perspective (JBH, NA), pp. 2748–2751.
- ICPR-2012-HuangL #automation #component #detection #independence
- Automated mitosis detection based on eXclusive Independent Component Analysis (CHH, HKL), pp. 1856–1859.
- ICPR-2012-Iwata #optimisation
- Placing landmarks suitably for shape analysis by optimization (KI), pp. 2359–2362.
- ICPR-2012-JoshiDGBP #classification
- Neural-net classification for spatio-temporal descriptor based depression analysis (JJ, AD, RG, MB, GP), pp. 2634–2638.
- ICPR-2012-KimuraSKS #component #design
- Designing various component analysis at will (AK, HS, HK, MS), pp. 2959–2962.
- ICPR-2012-KorffFKSBPS #image #library #recognition
- Compound color recognition via image analysis on high-throughput compound libraries (MvK, JF, AK, JS, GB, OP, TS), pp. 1289–1293.
- ICPR-2012-KostopoulouZMV #2d #image
- 2D-GE image analysis focusing on elimination of spurious spots (EK, EZ, DM, AV), pp. 1627–1630.
- ICPR-2012-KrawczykS #classification #effectiveness #multi
- Effective multiple classifier systems for breast thermogram analysis (BK, GS), pp. 3345–3348.
- ICPR-2012-LeiLL #feature model #linear #performance #recognition
- Efficient feature selection for linear discriminant analysis and its application to face recognition (ZL, SL, SZL), pp. 1136–1139.
- ICPR-2012-LiuF #kernel #multi
- Multiple kernel discriminant analysis (XZL, GCF), pp. 1691–1694.
- ICPR-2012-LiuL #detection #learning #multi
- Unsupervised multi-target trajectory detection, learning and analysis in complicated environments (HL, JL), pp. 3716–3720.
- ICPR-2012-LuuSBS #adaptation #multi
- Compressed Submanifold Multifactor Analysis with adaptive factor structures (KL, MS, TDB, CYS), pp. 2715–2718.
- ICPR-2012-MoriyamaAS #using
- Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
- ICPR-2012-MoyouP
- Shape analysis on the hypersphere of wavelet densities (MM, AMP), pp. 2091–2094.
- ICPR-2012-Noh #classification #learning #metric #nearest neighbour
- χ2 Metric learning for nearest neighbor classification and its analysis (SN), pp. 991–995.
- ICPR-2012-Ohtsuka #detection
- Advanced ridge flux analysis for fingerprint minutiae detection (TO), pp. 1225–1228.
- ICPR-2012-PangHYQW #classification #learning
- Theoretical analysis of learning local anchors for classification (JP, QH, BY, LQ, DW), pp. 1803–1806.
- ICPR-2012-ParisHG #categorisation #image #towards
- Sparse coding for histograms of local binary patterns applied for image categorization: Toward a Bag-of-Scenes analysis (SP, XH, HG), pp. 2817–2820.
- ICPR-2012-RingJKE #classification #complexity #design #embedded #performance
- Software-based performance and complexity analysis for the design of embedded classification systems (MR, UJ, PK, BE), pp. 2266–2269.
- ICPR-2012-SantosFTRGPF #classification #correlation #image #multi
- Descriptor correlation analysis for remote sensing image multi-scale classification (JAdS, FAF, RdST, AR, PHG, SPF, AXF), pp. 3078–3081.
- ICPR-2012-SchaeferD #multi
- Multi-dimensional local binary pattern descriptors for improved texture analysis (GS, NPD), pp. 2500–2503.
- ICPR-2012-ShaoS #distance #reduction
- Fractional-step max-min distance analysis for dimension reduction (GS, NS), pp. 396–400.
- ICPR-2012-ShenMZ #graph #learning #online
- Unsupervised online learning trajectory analysis based on weighted directed graph (YS, ZM, JZ), pp. 1306–1309.
- ICPR-2012-StammD #documentation
- Searching attentive tasks with document analysis evidences and Dempster-Shafer theory (KS, AD), pp. 529–532.
- ICPR-2012-SuWF #canonical #correlation #evaluation #generative
- Evaluation of canonical correlation analysis: A Correlation Generation Model (YS, SW, YF), pp. 1751–1754.
- ICPR-2012-TangZKC #forensics #image #visualisation
- Visualizing vein patterns from color skin images based on image mapping for forensics analysis (CT, HZ, AWKK, NC), pp. 2387–2390.
- ICPR-2012-TawariT
- Audio-visual data association for face expression analysis (AT, MMT), pp. 1120–1123.
- ICPR-2012-WangGFC #segmentation
- Curvature-driven volumetric segmentation of binary shapes: An application to snow microstructure analysis (XW, LG, FF, DC), pp. 742–745.
- ICPR-2012-WangSCPZ #component #feature model #named
- STPCA: Sparse tensor Principal Component Analysis for feature extraction (SW, MS, YHC, EPP, CZ), pp. 2278–2281.
- ICPR-2012-WangWZJ #bias #database
- Bias analyses of spontaneous facial expression database (ZW, SW, YZ, QJ), pp. 2926–2929.
- ICPR-2012-WilkinsonO #documentation
- Mask-edge connectivity: Theory, computation, and application to historical document analysis (MHFW, JO), pp. 1334–1337.
- ICPR-2012-YokotaHKW #estimation #image
- Estimation of earthquake ground motion by image analysis of sliding objects taken with a fixed camera (AY, TH, HK, TW), pp. 784–787.
- ICPR-2012-ZhangLC #detection #multi #novel
- A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
- KDD-2012-KangPHF #algorithm #named #scalability
- GigaTensor: scaling tensor analysis up by 100 times — algorithms and discoveries (UK, EEP, AH, CF), pp. 316–324.
- KDD-2012-MiaoGMYTAS #documentation
- Latent association analysis of document pairs (GM, ZG, LEM, XY, ST, NA, JS), pp. 1415–1423.
- KDD-2012-SongCWWYD #behaviour
- Coupled behavior analysis for capturing coupling relationships in group-based market manipulations (YS, LC, XW, GW, WY, WD), pp. 976–984.
- KDD-2012-TangWYHZYGHXLU #mining #named #topic
- PatentMiner: topic-driven patent analysis and mining (JT, BW, YY, PH, YZ, XY, BG, MH, PX, WL, AKU), pp. 1366–1374.
- KDD-2012-YuanWTNY #learning #multi
- Multi-source learning for joint analysis of incomplete multi-modality neuroimaging data (LY, YW, PMT, VAN, JY), pp. 1149–1157.
- KDD-2012-YuZSWWQZ #data mining #in the cloud #mining #named #network #social
- BC-PDM: data mining, social network analysis and text mining system based on cloud computing (LY, JZ, WCS, BW, BW, LQ, BRZ), pp. 1496–1499.
- KDD-2012-ZhaoDWX #named #sentiment #twitter
- MoodLens: an emoticon-based sentiment analysis system for chinese tweets (JZ, LD, JW, KX), pp. 1528–1531.
- KDIR-2012-FukumotoMM #collaboration #recommendation #sentiment
- Collaborative Filtering based on Sentiment Analysis of Guest Reviews for Hotel Recommendation (FF, CM, SM), pp. 193–198.
- KDIR-2012-Machado #image #retrieval
- Factor Analysis and the Retrieval of Medical Images Depicting Structures with Similar Shapes (AMCM), pp. 175–180.
- KDIR-2012-MountassirBB #problem #semistructured data #sentiment #set
- Addressing the Problem of Unbalanced Data Sets in Sentiment Analysis (AM, HB, IB), pp. 306–311.
- KDIR-2012-SpiegelA #distance #invariant
- An Order-invariant Time Series Distance Measure — Position on Recent Developments in Time Series Analysis (SS, SA), pp. 264–268.
- KDIR-2012-UddinAH #network #social
- New Directions in the Analysis of Social Network Dynamics (MSU, SRA, LH), pp. 269–274.
- KEOD-2012-HlomaniS #framework #towards #workflow
- Towards an Ontology-driven Framework for Workflow Analysis (HH, DAS), pp. 405–410.
- KEOD-2012-LinharesD #functional #geometry
- Geometric Knowledge Analysis based in Part Functional Descriptions (JCL, AD), pp. 307–313.
- KMIS-2012-MarsanCE #behaviour #enterprise #framework #information management #platform #scalability #tool support #using
- Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
- KMIS-2012-PanTG #component
- A Component-based Method for Stakeholder Analysis (YCP, YT, SRG), pp. 290–293.
- KR-2012-CohnRS #representation #video
- Thinking Inside the Box: A Comprehensive Spatial Representation for Video Analysis (AGC, JR, MS).
- MLDM-2012-KalpakisYHMSSS #permutation #predict #using
- Outcome Prediction for Patients with Severe Traumatic Brain Injury Using Permutation Entropy Analysis of Electronic Vital Signs Data (KK, SY, PFMH, CFM, LGS, DMS, TMS), pp. 415–426.
- MLDM-2012-StaroszczykOM #comparative #feature model #recognition
- Comparative Analysis of Feature Selection Methods for Blood Cell Recognition in Leukemia (TS, SO, TM), pp. 467–481.
- SEKE-2012-ChenCZS #approach #integration
- A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
- SEKE-2012-DingM #fuzzy #modelling
- Modeling and Analysis of Switched Fuzzy Systems (ZD, JM), pp. 135–138.
- SEKE-2012-DuttaUA #approach #automation #semantics #verification
- Requirement Analysis and Automated Verification: A Semantic Approach (AD, PDU, SA), pp. 51–54.
- SEKE-2012-JangidPE #mobile #predict #sentiment #using
- A Mobile Application for Stock Market Prediction Using Sentiment Analysis (KJ, PP, ME), pp. 13–18.
- SEKE-2012-LiuMLS #non-functional #specification
- Risk-driven Non-functional Requirement Analysis and Specification (YL, ZM, HL, WS), pp. 55–60.
- SEKE-2012-LiuZSH #architecture #modelling #named
- SAMAT — A Tool for Software Architecture Modeling and Analysis (SL, RZ, ZS, XH), pp. 352–358.
- SEKE-2012-MaZQQXY #dependence #design pattern #identification #using
- Identification of Design Patterns Using Dependence Analysis (WM, XZ, XQ, JQ, LX, RY), pp. 289–292.
- SEKE-2012-VegiFCOB #named
- DC2AP: A Dublin Core Application Profile to Analysis Patterns (LFdMV, JLF, GLdSC, AdPO, JLB), pp. 511–516.
- SEKE-2012-WangL #approach #modelling #petri net #workflow
- Resource Modeling and Analysis for Workflows: A Petri Net Approach (JW, DL), pp. 381–386.
- SIGIR-2012-ChaC #modelling #topic #using
- Social-network analysis using topic models (YC, JC), pp. 565–574.
- SIGIR-2012-ChinS
- Survival analysis of click logs (SCC, WNS), pp. 1149–1150.
- SIGIR-2012-YangLLR #graph #twitter
- Finding interesting posts in Twitter based on retweet graph analysis (MCY, JTL, SWL, HCR), pp. 1073–1074.
- MoDELS-2012-MaraeeB #comparative #constraints #guidelines #modelling #recommendation #uml
- Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
- MoDELS-2012-NejatiASB #cpu #embedded #modelling #safety #testing
- Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
- MoDELS-2012-ShinJB #empirical #evaluation #modelling #mutation testing #test coverage #using
- Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
- MoDELS-2012-WilliamsBPP #modelling
- Sensitivity Analysis in Model-Driven Engineering (JRW, FRB, RFP, FACP), pp. 743–758.
- SPLC-2012-El-SharkawyDS #feature model #modelling
- From feature models to decision models and back again an analysis based on formal transformations (SES, SD, KS), pp. 126–135.
- SPLC-2012-OliveiraBN #debugging #product line
- Supporting the analysis of bug prevalence in software product lines with product genealogy (THBdO, MB, EYN), pp. 181–185.
- ECOOP-2012-DeD #java #pointer #scalability
- Scalable Flow-Sensitive Pointer Analysis for Java with Strong Updates (AD, DD), pp. 665–687.
- ECOOP-2012-KarimDGS #framework
- An Analysis of the Mozilla Jetpack Extension Framework (RK, MD, VG, CcS), pp. 333–355.
- ECOOP-2012-SridharanDCST #correlation #javascript #points-to
- Correlation Tracking for Points-To Analysis of JavaScript (MS, JD, SC, MS, FT), pp. 435–458.
- OOPSLA-2012-MusluBHEN #development #ide #recommendation
- Speculative analysis of integrated development environment recommendations (KM, YB, RH, MDE, DN), pp. 669–682.
- OOPSLA-2012-SiddiquiK #execution #scalability #symbolic computation #using
- Scaling symbolic execution using ranged analysis (JHS, SK), pp. 523–536.
- HILT-2012-LiSRM #protocol #realtime #scheduling
- Applicability of real-time schedulability analysis on a software radio protocol (SL, FS, SR, MB), pp. 81–94.
- LOPSTR-2012-MantelS #data flow #dependence
- Types vs. PDGs in Information Flow Analysis (HM, HS), pp. 106–121.
- PEPM-2012-AlbertCPR #incremental #resource management
- Incremental resource usage analysis (EA, JC, GP, GRD), pp. 25–34.
- PLDI-2012-AlbarghouthiKNR #interprocedural #top-down
- Parallelizing top-down interprocedural analyses (AA, RK, AVN, SKR), pp. 217–228.
- PLDI-2012-ChiwKRSS #domain-specific language #image #named #parallel #visualisation
- Diderot: a parallel DSL for image analysis and visualization (CC, GK, JR, LS, NS), pp. 111–120.
- PLDI-2012-HolewinskiRRFPRS
- Dynamic trace-based analysis of vectorization potential of applications (JH, RR, MR, NF, LNP, AR, PS), pp. 371–382.
- PLDI-2012-OhHLLY #design #implementation
- Design and implementation of sparse global analyses for C-like languages (HO, KH, WL, WL, KY), pp. 229–238.
- PLDI-2012-WuTHCY #parallel #precise #source code
- Sound and precise analysis of parallel programs through schedule specialization (JW, YT, GH, HC, JY), pp. 205–216.
- POPL-2012-BouajjaniE #parallel #recursion #source code
- Analysis of recursively parallel programs (AB, ME), pp. 203–214.
- QAPL-2012-GazeauMP #float #robust #source code
- A non-local method for robustness analysis of floating point programs (IG, DM, CP), pp. 63–76.
- SAS-2012-CalvertM #calculus #control flow
- Control Flow Analysis for the Join Calculus (PC, AM), pp. 181–197.
- SAS-2012-HenryMM #abstract interpretation #algorithm #evaluation
- Succinct Representations for Abstract Interpretation — Combined Analysis Algorithms and Experimental Evaluation (JH, DM, MM), pp. 283–299.
- SAS-2012-HoweK #parametricity #using
- Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
- SAS-2012-KhedkerMR #pointer
- Liveness-Based Pointer Analysis (UPK, AM, PSR), pp. 265–282.
- SAS-2012-Krishnamurthi #javascript #semantics #web
- Semantics and Analyses for JavaScript and the Web (SK), p. 4.
- SAS-2012-Ledesma-GarzaR #functional #higher-order #reachability #source code
- Binary Reachability Analysis of Higher Order Functional Programs (RLG, AR), pp. 388–404.
- SAS-2012-LeePMH #parallel #performance
- Efficient May Happen in Parallel Analysis for Async-Finish Parallelism (JKL, JP, RM, HH), pp. 5–23.
- SAS-2012-MadhavanRV #composition #higher-order #source code
- Modular Heap Analysis for Higher-Order Programs (RM, GR, KV), pp. 370–387.
- RE-2012-Alexandrova #development #legacy #requirements
- Business requirements analysis and development for legacy system replacement projects in government organizations (AA), pp. 337–340.
- RE-2012-CailliauL #framework #probability
- A probabilistic framework for goal-oriented risk analysis (AC, AvL), pp. 201–210.
- RE-2012-LutzLLKMSBH #product line #requirements
- Requirements analysis for a product family of DNA nanodevices (RRL, JHL, JIL, THK, DM, DMS, TB, ERH), pp. 211–220.
- REFSQ-2012-BruniFST #automation #multimodal #perspective #requirements #research
- Automatic Analysis of Multimodal Requirements: A Research Preview (EB, AF, NS, GT), pp. 218–224.
- REFSQ-2012-Radlinski #empirical #quality #requirements
- Empirical Analysis of the Impact of Requirements Engineering on Software Quality (LR), pp. 232–238.
- REFSQ-2012-RaspotnigO #case study #diagrams #sequence chart
- Supporting Failure Mode and Effect Analysis: A Case Study with Failure Sequence Diagrams (CR, ALO), pp. 117–131.
- ASE-2012-AlmorsyGI #automation #using
- Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
- ASE-2012-IbrahimGHA #ambiguity #kernel #operating system #points-to #using
- Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
- ASE-2012-Shang0X #experience #incremental #performance #points-to #precise #summary
- Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experience (LS, YL, JX), pp. 270–273.
- ASE-2012-TamrawiNNN #named #refactoring
- SYMake: a build code analysis and refactoring tool for makefiles (AT, HAN, HVN, TNN), pp. 366–369.
- ASE-2012-XiaoTFHM #privacy
- User-aware privacy control via extended static-information-flow analysis (XX, NT, MF, JdH, MM), pp. 80–89.
- FSE-2012-BirdZ #branch
- Assessing the value of branches with what-if analysis (CB, TZ), p. 45.
- FSE-2012-GanaiLG #concurrent #multi #named #source code #thread
- DTAM: dynamic taint analysis of multi-threaded programs for relevancy (MKG, DL, AG), p. 46.
- FSE-2012-RayWK #migration #named
- REPERTOIRE: a cross-system porting analysis tool for forked software projects (BR, CW, MK), p. 8.
- FSE-2012-WangZXXM #automation #collaboration #hybrid #web
- Automating presentation changes in dynamic web applications via collaborative hybrid analysis (XW, LZ, TX, YX, HM), p. 16.
- ICSE-2012-AlkhalafBG #string #using #validation #verification
- Verifying client-side input validation functions using string analysis (MA, TB, JLG), pp. 947–957.
- ICSE-2012-BhattacharyaINF #evolution #graph #predict
- Graph-based analysis and prediction for software evolution (PB, MI, IN, MF), pp. 419–429.
- ICSE-2012-Camilli #in the cloud #petri net
- Petri nets state space analysis in the cloud (MC), pp. 1638–1640.
- ICSE-2012-EsteveKNPY #correctness #dependence #performance #safety
- Formal correctness, safety, dependability, and performance analysis of a satellite (MAE, JPK, VYN, BP, YY), pp. 1022–1031.
- ICSE-2012-Ghardallou #invariant #termination #using
- Using invariant relations in the termination analysis of while loops (WG), pp. 1519–1522.
- ICSE-2012-Jaafar #evolution #on the #source code
- On the analysis of evolution of software artefacts and programs (FJ), pp. 1563–1566.
- ICSE-2012-MesbahM #automation #css #maintenance
- Automated analysis of CSS rules to support style maintenance (AM, SM), pp. 408–418.
- ICSE-2012-NguyenNDKS #developer #fault
- Inferring developer expertise through defect analysis (TTN, TNN, ED, TK, PS), pp. 1297–1300.
- ICSE-2012-Schulte #automation
- Ten years of automated code analysis at Microsoft (WS), p. 1001.
- ICSE-2012-ShahzadSL #lifecycle #scalability
- A large scale exploratory analysis of software vulnerability life cycles (MS, MZS, AXL), pp. 771–781.
- ICSE-2012-TamrawiNNN #evaluation #symbolic computation
- Build code analysis with symbolic evaluation (AT, HAN, HVN, TNN), pp. 650–660.
- ICSE-2012-UddinDR #api #concept
- Temporal analysis of API usage concepts (GU, BD, MPR), pp. 804–814.
- ICSE-2012-Yu #identification #using
- Improving failure-inducing changes identification using coverage analysis (KY), pp. 1604–1606.
- SAC-2012-BalduzziZBKL #security
- A security analysis of amazon’s elastic compute cloud service (MB, JZ, DB, EK, SL), pp. 1427–1434.
- SAC-2012-DasguptaK #precise #using
- Precise shape analysis using field sensitivity (SD, AK), pp. 1300–1307.
- SAC-2012-DestefanisTCM #anti #java #scalability
- An analysis of anti-micro-patterns effects on fault-proneness in large Java systems (GD, RT, GC, MM), pp. 1251–1253.
- SAC-2012-DragoB #architecture #design #graph #manycore #named
- DAG3: a tool for design and analysis of applications for multicore architectures (MLD, JB), pp. 1159–1164.
- SAC-2012-GomesP #interactive #social
- A media-based social interactions analysis procedure (AKG, MdGCP), pp. 1018–1024.
- SAC-2012-KhucSRR #distributed #scalability #sentiment #towards #twitter
- Towards building large-scale distributed systems for twitter sentiment analysis (VNK, CS, RR, JR), pp. 459–464.
- SAC-2012-MengHO #algorithm #search-based
- Analysis of a triploid genetic algorithm over deceptive landscapes (LM, SH, CO), pp. 244–249.
- SAC-2012-NetoA #process
- Keeping decisions and rationale explicit in business process analysis (MSdSN, RMdA), pp. 1702–1708.
- SAC-2012-NunesARTCS #data type
- To be or not to be real: fractal analysis of data streams from a regional climate change model (SAN, AMHdÁ, LASR, AJMT, PPC, EPMdS), pp. 831–832.
- SAC-2012-SantosCSLB #heuristic #identification #modelling #process
- Analysis of heuristics to identify crosscutting concerns in business process models (FJNS, CC, FMS, JCSdPL, TVB), pp. 1725–1726.
- SAC-2012-SarroMFG #algorithm #fault #predict #search-based #using
- A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault prediction (FS, SDM, FF, CG), pp. 1215–1220.
- SAC-2012-SchaadB #automation #named
- TAM2: automated threat analysis (AS, MB), pp. 1103–1108.
- SAC-2012-ScholteRBK #empirical #validation #web
- An empirical analysis of input validation mechanisms in web applications and languages (TS, WKR, DB, EK), pp. 1419–1426.
- SAC-2012-SwainCNB #markov #performance #using
- Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model (PS, SC, SN, PB), pp. 631–633.
- SAC-2012-TangJ #precise
- Exploiting regularity of user-defined types to improve precision of program analyses (XT, JJ), pp. 1743–1750.
- SLE-2012-KaminskiW #attribute grammar #composition
- Modular Well-Definedness Analysis for Attribute Grammars (TK, EVW), pp. 352–371.
- SLE-2012-KrishnanW #attribute grammar #higher-order #termination
- Termination Analysis for Higher-Order Attribute Grammars (LK, EVW), pp. 44–63.
- SLE-2012-Sloane #abstraction #attribute grammar
- Profile-Based Abstraction and Analysis of Attribute Grammar Evaluation (AMS), pp. 24–43.
- ASPLOS-2012-HongCSO #domain-specific language #graph #named #performance
- Green-Marl: a DSL for easy and efficient graph analysis (SH, HC, ES, KO), pp. 349–362.
- ASPLOS-2012-OlszewskiZKAA #named
- Aikido: accelerating shared data dynamic analyses (MO, QZ, DK, JA, SPA), pp. 173–184.
- CASE-2012-ChenF #rule-based
- Treatment of missing values for association rule-based tool commonality analysis in semiconductor manufacturing (RHC, CMF), pp. 886–891.
- CASE-2012-ChenZAB #approach #performance #realtime
- Real-time performance analysis of production lines: A system-theoretic approach (GC, LZ, JA, SB), pp. 656–661.
- CASE-2012-ChoiFN #assembly
- Vibration analysis in robotic ultrasonic welding for battery assembly (SC, TAF, SN), pp. 550–554.
- CASE-2012-CostantinoDEFS #evaluation #fuzzy #novel #performance
- A novel fuzzy Data Envelopment Analysis methodology for performance evaluation in a two-stage supply chain (NC, MD, NE, MF, FS), pp. 974–979.
- CASE-2012-HoerningSWS #robust #simulation #tool support
- Improving discrete event simulation in the emergency department with innovative and robust input analysis tools (SH, JS, TW, LS), pp. 131–136.
- CASE-2012-Kim #fuzzy #robust
- Robust stability analysis of T-S fuzzy systems with interval time-varying delays via a relaxation technique (SHK), pp. 829–832.
- CASE-2012-LinKH #functional #modelling
- Fitting a functional structural plant model based on global sensitivity analysis (YL, MK, JH), pp. 790–795.
- CASE-2012-LiuJCLX #canonical #correlation #fault #identification #linear #research
- Research on fault identification for complex system based on generalized linear canonical correlation analysis (DL, DJ, XC, AL, GX), pp. 474–478.
- CASE-2012-QiaoWZ #clustering #petri net #scheduling #tool support
- Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting (YQ, NW, MZ), pp. 206–211.
- CASE-2012-ShinPKA #linear
- Structural analysis of built-in sensor frame in jaws with linear type gripper (DHS, TSP, YGK, JA), pp. 810–814.
- CASE-2012-WangHDS #agile #protocol #simulation #using
- Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
- CASE-2012-YumKK #overview #perspective
- Analysis of defective patterns on wafers in semiconductor manufacturing: A bibliographical review (BJY, JHK, SJK), pp. 86–90.
- CC-2012-MarronLB #paradigm #programming
- Programming Paradigm Driven Heap Analysis (MM, OL, AB), pp. 41–60.
- CC-2012-PuttaN #parallel #points-to
- Parallel Replication-Based Points-To Analysis (SP, RN), pp. 61–80.
- CGO-2012-MatosevicA #bottom-up #data access #performance #summary
- Efficient bottom-up heap analysis for symbolic path-based data access summaries (IM, TSA), pp. 252–263.
- CGO-2012-ShangXX #on-demand #points-to
- On-demand dynamic summary-based points-to analysis (LS, XX, JX), pp. 264–274.
- DAC-2012-AgostaBP
- A code morphing methodology to automate power analysis countermeasures (GA, AB, GP), pp. 77–82.
- DAC-2012-ChungJ #functional #performance
- Functional timing analysis made fast and general (YTC, JHRJ), pp. 1055–1060.
- DAC-2012-GhosalLRTPWTA #data access #data flow #semantics
- Static dataflow with access patterns: semantics and analysis (AG, RL, KR, ST, AP, GW, TNT, HAA), pp. 656–663.
- DAC-2012-KumarBKV #predict #source code #using
- Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
- DAC-2012-LoS #execution #monitoring #parallel #runtime #worst-case
- Worst-case execution time analysis for parallel run-time monitoring (DL, GES), pp. 421–429.
- DAC-2012-MeirR #biology #named #network #performance #using
- BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
- DAC-2012-RajendranPSK #logic #obfuscation #security
- Security analysis of logic obfuscation (JR, YP, OS, RK), pp. 83–89.
- DAC-2012-RoyC #predict
- Predicting timing violations through instruction-level path sensitization analysis (SR, KC), pp. 1074–1081.
- DAC-2012-UkhovBEP #embedded #multi #optimisation #reliability
- Steady-state dynamic temperature analysis and reliability optimization for embedded multiprocessor systems (IU, MB, PE, ZP), pp. 197–204.
- DAC-2012-WenZCWX #named #performance #reliability #scalability #statistics
- PS3-RAM: a fast portable and scalable statistical STT-RAM reliability analysis method (WW, YZ, YC, YW, YX), pp. 1191–1196.
- DAC-2012-ZhaoSL #3d
- Analysis of DC current crowding in through-silicon-vias and its impact on power integrity in 3D ICs (XZ, MS, SKL), pp. 157–162.
- DAC-2012-ZolotovSHFVXLV #statistics
- Timing analysis with nonseparable statistical and deterministic variations (VZ, DS, JGH, EAF, CV, JX, JL, NV), pp. 1061–1066.
- DATE-2012-BesteT #robust #standard
- Layout-Driven Robustness Analysis for misaligned Carbon Nanotubes in CNTFET-based standard cells (MB, MBT), pp. 1609–1614.
- DATE-2012-BozgaDHHLLT #embedded #modelling #state of the art #tool support
- State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems (MB, AD, AH, HH, KGL, AL, JT), pp. 370–375.
- DATE-2012-CaiHMM #fault #memory management #metric
- Error patterns in MLC NAND flash memory: Measurement, characterization, and analysis (YC, EFH, OM, KM), pp. 521–526.
- DATE-2012-ChangCM
- RTL analysis and modifications for improving at-speed test (KHC, HZC, ILM), pp. 400–405.
- DATE-2012-JafariJL #scheduling #worst-case
- Worst-case delay analysis of Variable Bit-Rate flows in network-on-chip with aggregate scheduling (FJ, AJ, ZL), pp. 538–541.
- DATE-2012-KnothJS #modelling
- Current source modeling for power and timing analysis at different supply voltages (CK, HJ, US), pp. 923–928.
- DATE-2012-LiH #logic #named #performance #reliability
- RAG: An efficient reliability analysis of logic circuits on graphics processing units (ML, MSH), pp. 316–319.
- DATE-2012-LinWCCCHYS #functional #mutation testing #probability
- A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
- DATE-2012-LiuTW #approach #graph #parallel #statistics
- Parallel statistical analysis of analog circuits by GPU-accelerated graph-based approach (XL, SXDT, HW), pp. 852–857.
- DATE-2012-MaricauJG #learning #multi #reliability #using
- Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
- DATE-2012-MarinhoNPP #float #scheduling
- Preemption delay analysis for floating non-preemptive region scheduling (JM, VN, SMP, IP), pp. 497–502.
- DATE-2012-MasrurGCCAB #communication #cyber-physical #hybrid #protocol
- Timing analysis of cyber-physical applications for hybrid communication protocols (AM, DG, SC, JJC, AA, AB), pp. 1233–1238.
- DATE-2012-MengC #3d #energy #performance #runtime
- Analysis and runtime management of 3D systems with stacked DRAM for boosting energy efficiency (JM, AKC), pp. 611–616.
- DATE-2012-MiryalaCMP #network
- IR-drop analysis of graphene-based power distribution networks (SM, AC, EM, MP), pp. 81–86.
- DATE-2012-NeogyR #design #injection
- Analysis and design of sub-harmonically injection locked oscillators (AN, JSR), pp. 1209–1214.
- DATE-2012-OzTKT #parallel #thread #trade-off
- Performance-reliability tradeoff analysis for multithreaded applications (IO, HRT, MTK, OT), pp. 893–898.
- DATE-2012-PerinTBM #implementation
- Amplitude demodulation-based EM analysis of different RSA implementations (GP, LT, PB, PM), pp. 1167–1172.
- DATE-2012-PiscitelliP #design #hybrid
- Design space pruning through hybrid analysis in system-level design space exploration (RP, ADP), pp. 781–786.
- DATE-2012-QuintonEBY #challenge #probability #roadmap
- Challenges and new trends in probabilistic timing analysis (SQ, RE, DB, PMY), pp. 810–815.
- DATE-2012-QuintonHE #formal method #realtime
- Formal analysis of sporadic overload in real-time systems (SQ, MH, RE), pp. 515–520.
- DATE-2012-RahimiBG
- Analysis of instruction-level vulnerability to dynamic voltage and temperature variations (AR, LB, RKG), pp. 1102–1105.
- DATE-2012-RajendranPSK #encryption #fault #logic #perspective
- Logic encryption: A fault analysis perspective (JR, YP, OS, RK), pp. 953–958.
- DATE-2012-RoxEG #design #network #using
- Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
- DATE-2012-SchrijenL #comparative
- Comparative analysis of SRAM memories used as PUF primitives (GJS, VvdL), pp. 1319–1324.
- DATE-2012-TangZBM #correlation #modelling #statistics
- Transistor-level gate model based statistical timing analysis considering correlations (QT, AZ, MB, NvdM), pp. 917–922.
- DATE-2012-ThieleE #data flow #graph #optimisation #performance
- Optimizing performance analysis for synchronous dataflow graphs with shared resources (DT, RE), pp. 635–640.
- DATE-2012-TsaiLL #configuration management #design
- Design and analysis of via-configurable routing fabrics for structured ASICs (HPT, RBL, LCL), pp. 1479–1482.
- DATE-2012-XuLHRHT #power management
- Variation-aware leakage power model extraction for system-level hierarchical power analysis (YX, BL, RH, BR, CH, JT), pp. 346–351.
- DATE-2012-ZhangPM #3d #grid #power management
- Voltage propagation method for 3-D power grid analysis (CZ, VFP, GDM), pp. 844–847.
- DATE-2012-ZimmermannBR #multi #power management
- Analysis of multi-domain scenarios for optimized dynamic power management strategies (JZ, OB, WR), pp. 862–865.
- DATE-2012-ZohnerKSH
- Side channel analysis of the SHA-3 finalists (MZ, MK, MS, SAH), pp. 1012–1017.
- ISMM-2012-Nasre #constraints #graph #performance #points-to
- Exploiting the structure of the constraint graph for efficient points-to analysis (RN), pp. 121–132.
- LCTES-2012-FangLZLCZ #multi #predict
- Improving dynamic prediction accuracy through multi-level phase analysis (ZF, JL, WZ, YL, HC, BZ), pp. 89–98.
- PDP-2012-BaumannS #markov #modelling #network #security
- Markovian Modeling and Security Measure Analysis for Networks under Flooding DoS Attacks (HB, WS), pp. 298–302.
- PDP-2012-CastilloFMQR #algebra #energy #kernel #linear #message passing
- Analysis of Strategies to Save Energy for Message-Passing Dense Linear Algebra Kernels (MC, JCF, RM, ESQO, VR), pp. 346–352.
- PDP-2012-DilchM #algorithm #architecture #gpu #novel #optimisation #performance
- Optimization Techniques and Performance Analyses of Two Life Science Algorithms for Novel GPU Architectures (DD, EM), pp. 376–383.
- PDP-2012-HuWB #design
- Design and Analysis of a Mesh-based Wireless Network-on-Chip (WHH, CW, NB), pp. 483–490.
- PDP-2012-LahyaniKJ #approach #monitoring
- QoS Monitoring and Analysis Approach for Publish/Subscribe Systems Deployed on MANET (IL, NK, MJ), pp. 120–124.
- PDP-2012-RuizHMDKC #component #embedded #modelling #security
- A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components (JFR, RH, AM, VD, IVK, AC), pp. 261–268.
- PPoPP-2012-CaniouDRCA #constraints #parallel #performance
- Performance analysis of parallel constraint-based local search (YC, DD, FR, PC, SA), pp. 337–338.
- PPoPP-2012-Mendez-LojoBP #gpu #implementation #points-to
- A GPU implementation of inclusion-based points-to analysis (MML, MB, KP), pp. 107–116.
- PPoPP-2012-SimDKV #framework #identification #performance
- A performance analysis framework for identifying potential benefits in GPGPU applications (JS, AD, HK, RWV), pp. 11–22.
- PPoPP-2012-TzenakisPKPVN #dependence #named #parallel
- BDDT: : block-level dynamic dependence analysis for deterministic task-based parallelism (GT, AP, JK, PP, HV, DSN), pp. 301–302.
- STOC-2012-BrandtIKK
- An analysis of one-dimensional schelling segregation (CB, NI, GK, RK), pp. 789–804.
- STOC-2012-BrunschR #multi #optimisation
- Improved smoothed analysis of multiobjective optimization (TB, HR), pp. 407–426.
- STOC-2012-ChanP #bound #fourier #network
- Tight bounds for monotone switching networks via fourier analysis (SMC, AP), pp. 495–504.
- TACAS-2012-BouajjaniE #bound #message passing #source code
- Bounded Phase Analysis of Message-Passing Programs (AB, ME), pp. 451–465.
- TACAS-2012-DSilvaHKT #bound #learning
- Numeric Bounds Analysis with Conflict-Driven Learning (VD, LH, DK, MT), pp. 48–63.
- TACAS-2012-FehnkerGHMPT #automation #using
- Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
- TACAS-2012-FriedmannL #automaton
- Ramsey-Based Analysis of Parity Automata (OF, ML), pp. 64–78.
- TACAS-2012-LoweW #contest
- CPAchecker with Adjustable Predicate Analysis — (Competition Contribution) (SL, PW), pp. 528–530.
- TACAS-2012-ShvedMM #contest
- Predicate Analysis with BLAST 2.7 — (Competition Contribution) (PS, MUM, VSM), pp. 525–527.
- TACAS-2012-WangTGLS #formal method
- Reduction-Based Formal Analysis of BGP Instances (AW, CLT, AJTG, BTL, AS), pp. 283–298.
- WRLA-2012-FadlisyahOA #formal method #modelling
- Formal Modeling and Analysis of Human Body Exposure to Extreme Heat in HI-Maude (MF, PCÖ, EÁ), pp. 139–161.
- WRLA-2012-WirsingEMM #architecture #design #maude
- Design and Analysis of Cloud-Based Architectures with KLAIM and Maude (MW, JE, TM, JM), pp. 54–82.
- CAV-2012-BerdineCIW #abstraction
- Diagnosing Abstraction Failure for Separation Logic-Based Analyses (JB, AC, SI, CMW), pp. 155–173.
- CAV-2012-BogomolovFGLPW #distance #reachability
- A Box-Based Distance between Regions for Guiding the Reachability Analysis of SpaceEx (SB, GF, RG, HL, AP, MW), pp. 479–494.
- CAV-2012-HagueL #bound #parallel #source code #thread
- Synchronisation- and Reversal-Bounded Analysis of Multithreaded Programs with Counters (MH, AWL), pp. 260–276.
- CAV-2012-LeeWY #algorithm #learning #termination
- Termination Analysis with Algorithmic Learning (WL, BYW, KY), pp. 88–104.
- CAV-2012-Venet #difference #invariant #linear #scalability
- The Gauge Domain: Scalable Analysis of Linear Inequality Invariants (AV), pp. 139–154.
- ICLP-2012-Hanus #lazy evaluation #nondeterminism
- Improving Lazy Non-Deterministic Computations by Demand Analysis (MH), pp. 130–143.
- ICST-2012-CunninghamHH #combinator #testing
- A System Analysis Study Comparing Reverse Engineered Combinatorial Testing to Expert Judgment (AMCJ, JDH, RJH), pp. 630–635.
- ICST-2012-DanH #comparison #float #mutation testing #semantics
- Semantic Mutation Analysis of Floating-Point Comparison (HD, RMH), pp. 290–299.
- ICST-2012-ElrakaibyMT #mutation testing #policy #testing #using
- Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
- ICST-2012-GuoSC #clustering #testing
- Analysis of Test Clusters for Regression Testing (BG, MS, PC), p. 736.
- ICST-2012-JustKS #effectiveness #mutation testing #performance #question
- Do Redundant Mutants Affect the Effectiveness and Efficiency of Mutation Analysis? (RJ, GMK, FS), pp. 720–725.
- ICST-2012-MalikK #graph #using
- Dynamic Shape Analysis Using Spectral Graph Properties (MZM, SK), pp. 211–220.
- ICST-2012-MassicotteCNM #testing
- A Testing Model for Dynamic Malware Analysis Systems (FM, MC, HN, FM), pp. 826–833.
- ICST-2012-MizanF #automation #performance
- Automated Performance Model Construction through Event Log Analysis (AM, GF), pp. 636–641.
- ICST-2012-PasareanuB #statechart
- Statechart Analysis with Symbolic PathFinder (CSP, DB), p. 772.
- ICST-2012-PonsiniMR #abstract interpretation #constraints #float #programming #source code
- Combining Constraint Programming and Abstract Interpretation for Value Analysis of Floating-point Programs (OP, CM, MR), pp. 775–776.
- ICST-2012-SiddiquiMK #constraints #data flow #lightweight #theorem proving
- Lightweight Data-Flow Analysis for Execution-Driven Constraint Solving (JHS, DM, SK), pp. 91–100.
- ICST-2012-ZamanAH #empirical #performance #scalability
- A Large Scale Empirical Study on User-Centric Performance Analysis (SZ, BA, AEH), pp. 410–419.
- ICTSS-2012-Havelund
- Requirements-Driven Log Analysis (KH), pp. 1–4.
- IJCAR-2012-FosterS #algebra #automation
- Automated Analysis of Regular Algebra (SF, GS), pp. 271–285.
- IJCAR-2012-NikolicS #reachability
- Reachability Analysis of Program Variables (DN, FS), pp. 423–438.
- ISSTA-2012-AlkhalafCFBOK #consistency #difference #named #nondeterminism #string #validation
- ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies (MA, SRC, MF, TB, AO, CK), pp. 56–66.
- ISSTA-2012-SuiYX #detection #memory management #using
- Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
- ISSTA-2012-TombF #consistency #detection #nondeterminism #reachability
- Detecting inconsistencies via universal reachability analysis (AT, CF), pp. 287–297.
- SAT-2012-KottlerZSK #named #satisfiability
- CoPAn: Exploring Recurring Patterns in Conflict Analysis of CDCL SAT Solvers — (SK, CZ, PS, MK), pp. 449–455.
- TAP-2012-SulzmannZ #finite #linear #logic
- Constructive Finite Trace Analysis with Linear Temporal Logic (MS, AZ), pp. 132–148.
- CBSE-2011-DistefanoFGM #composition #multi #reliability #workflow
- A compositional method for reliability analysis of workflows affected by multiple failure modes (SD, AF, CG, RM), pp. 149–158.
- CBSE-2011-InoueH #component #data flow
- A method for data-flow analysis of business components (TI, SH), pp. 51–60.
- ECSA-2011-AdmodisastroK #approach #architecture #black box #development
- An Architecture Analysis Approach for Supporting Black-Box Software Development (NA, GK), pp. 180–189.
- QoSA-ISARCS-2011-HofigD #execution
- Failure-dependent execution time analysis (KH, DD), pp. 115–122.
- WICSA-2011-BrownNOP #architecture #dependence #release planning
- Analysis and Management of Architectural Dependencies in Iterative Release Planning (NB, RLN, IO, MP), pp. 103–112.
- WICSA-2011-Dobrica #architecture #integration #modelling #quality
- Exploring Approaches of Integration Software Architecture Modeling with Quality Analysis Models (LD), pp. 113–122.
- WICSA-2011-GanesanLCJJZ #architecture #re-engineering
- Architecture Reconstruction and Analysis of Medical Device Software (DG, ML, RC, RPJ, PLJ, YZ), pp. 194–203.
- WICSA-2011-GhezziG #architecture #as a service #lightweight #named
- SOFAS: A Lightweight Architecture for Software Analysis as a Service (GG, HCG), pp. 93–102.
- WICSA-2011-PetrovBN #architecture #design #enterprise #multi
- The Need for a Multilevel Context-Aware Software Architecture Analysis and Design Method with Enterprise and System Architecture Concerns as First Class Entities (PP, UB, RLN), pp. 147–156.
- DocEng-2011-BeelL #mindmap
- An exploratory analysis of mind maps (JB, SL), pp. 81–84.
- DRR-2011-LamiroyLKH #documentation #how #research #resource management
- How carefully designed open resource sharing can help and expand document analysis research (BL, DPL, HFK, JH), pp. 1–10.
- DRR-2011-SiddiqiKV #identification
- Feature relevance analysis for writer identification (IS, KK, NV), pp. 1–10.
- HT-2011-TakahashiOYIOT #using #wiki
- Evaluating significance of historical entities based on tempo-spatial impacts analysis using Wikipedia link structure (YT, HO, MY, HI, SO, KT), pp. 83–92.
- ICDAR-2011-AbediF #documentation #image #locality #string #using
- Localization of Digit Strings in Farsi/Arabic Document Images Using Structural Features and Syntactical Analysis (AA, KF), pp. 728–733.
- ICDAR-2011-AbedWM #contest #documentation #overview #perspective #recognition
- International Conference on Document Analysis and Recognition (ICDAR 2011) — Competitions Overview (HEA, LW, VM), pp. 1437–1443.
- ICDAR-2011-AhmedLWD #architecture #automation
- Improved Automatic Analysis of Architectural Floor Plans (SA, ML, MW, AD), pp. 864–869.
- ICDAR-2011-AntonacopoulosCPP #contest #documentation #layout
- Historical Document Layout Analysis Competition (AA, CC, CP, SP), pp. 1516–1520.
- ICDAR-2011-BaechlerI #layout #multi #using
- Multi Resolution Layout Analysis of Medieval Manuscripts Using Dynamic MLP (MB, RI), pp. 1185–1189.
- ICDAR-2011-BakerSSS #documentation
- Comparing Approaches to Mathematical Document Analysis from PDF (JBB, APS, VS, MS), pp. 463–467.
- ICDAR-2011-BukhariSB11a #documentation #image #layout #performance
- High Performance Layout Analysis of Arabic and Urdu Document Images (SSB, FS, TMB), pp. 1275–1279.
- ICDAR-2011-ChattopadhyaySSR #corpus
- Creation and Analysis of a Corpus of Text Rich Indian TV Videos (TC, SS, AS, NR), pp. 849–853.
- ICDAR-2011-ChazalonCL #documentation #interactive #performance
- Iterative Analysis of Pages in Document Collections for Efficient User Interaction (JC, BC, AL), pp. 503–507.
- ICDAR-2011-ClausnerPA11a #documentation #evaluation #layout #performance
- Scenario Driven In-depth Performance Evaluation of Document Layout Analysis Methods (CC, SP, AA), pp. 1404–1408.
- ICDAR-2011-DiemKS #classification #documentation #layout
- Text Classification and Document Layout Analysis of Paper Fragments (MD, FK, RS), pp. 854–858.
- ICDAR-2011-GalballyFMP #quality
- Quality Analysis of Dynamic Signature Based on the Sigma-Lognormal Model (JG, JFA, MMD, RP), pp. 633–637.
- ICDAR-2011-GarzSD #layout #using
- Layout Analysis for Historical Manuscripts Using Sift Features (AG, RS, MD), pp. 508–512.
- ICDAR-2011-KokawaBOWK #automation #classification #fault
- An Impact of OCR Errors on Automated Classification of OCR Japanese Texts with Parts-of-Speech Analysis (AK, LSPB, WO, TW, FK), pp. 543–547.
- ICDAR-2011-KurbielKE #component #independence #novel #preprocessor
- A Novel Preprocessing Method for Hectography Prints Based on Independent Component Analysis (TK, IVK, SE), pp. 1145–1149.
- ICDAR-2011-LamiroyL #architecture #benchmark #documentation #metric
- An Open Architecture for End-to-End Document Analysis Benchmarking (BL, DPL), pp. 42–47.
- ICDAR-2011-LamiroyLS #algorithm #contest #documentation
- Document Analysis Algorithm Contributions in End-to-End Applications: Report on the ICDAR 2011 Contest (BL, DPL, TS), pp. 1521–1525.
- ICDAR-2011-LazzaraLGJMC #documentation #framework #image #platform
- The SCRIBO Module of the Olena Platform: A Free Software Framework for Document Image Analysis (GL, RL, TG, YJ, JM, ACL), pp. 252–258.
- ICDAR-2011-MalleronE #approach #documentation
- A Mixed Approach for Handwritten Documents Structural Analysis (VM, VE), pp. 269–273.
- ICDAR-2011-XuYWL #using
- Touching Character Separation in Chinese Handwriting Using Visibility-Based Foreground Analysis (LX, FY, QFW, CLL), pp. 859–863.
- SIGMOD-2011-CastellanosDHGDLZS #framework #named #platform #social
- LCI: a social channel analysis platform for live customer intelligence (MC, UD, MH, RG, MD, YL, LZ, MS), pp. 1049–1058.
- SIGMOD-2011-FlaounasATSNBC #monitoring #named
- NOAM: news outlets analysis and monitoring system (INF, OA, MT, TS, FN, TDB, NC), pp. 1275–1278.
- SIGMOD-2011-HanPLKY #graph #performance
- iGraph in action: performance analysis of disk-based graph indexing techniques (WSH, MDP, JL, RK, JXY), pp. 1241–1242.
- SIGMOD-2011-KanagalLD #database #evaluation #probability #query #robust
- Sensitivity analysis and explanations for robust query evaluation in probabilistic databases (BK, JL, AD), pp. 841–852.
- SIGMOD-2011-LiuRGGWAM #multi #named #query #sequence #using
- E-Cube: multi-dimensional event sequence analysis using hierarchical pattern query sharing (ML, EAR, KG, CG, SW, IA, AM), pp. 889–900.
- SIGMOD-2011-WeningerDFHHJKKLMSTWY #named #network
- WINACS: construction and analysis of web-based computer science information networks (TW, MD, FF, JMH, JH, TJJ, SK, HK, ZL, DM, YS, NET, CW, XY), pp. 1255–1258.
- TPDL-2011-ParkLLFSHAH #collaboration #empirical #library #research
- Experiment and Analysis Services in a Fingerprint Digital Library for Collaborative Research (SHP, JL, LTL, EAF, NJS, KEH, ALA, MSH), pp. 179–191.
- VLDB-2011-BudakAA #network #online #social
- Structural Trend Analysis for Online Social Networks (CB, DA, AEA), pp. 646–656.
- VLDB-2011-HuiKS #documentation #named #xml
- HIWAS: Enabling Technology for Analysis of Clinical Data in XML Documents (JH, SEK, PS), pp. 1260–1271.
- VLDB-2011-KarwaRSY #graph
- Private Analysis of Graph Structure (VK, SR, AS, GY), pp. 1146–1157.
- CSEET-2011-LuLL #using
- Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
- CSEET-2011-TsukamotoTNM #motivation #programming
- Analysis of the motivation of learners in the in-house training of programming in Japanese ICT industries (HT, YT, HN, KiM), pp. 121–128.
- ITiCSE-2011-Hijon-NeiraV #interactive
- Merlin-Mo, an interactions analysis system for Moodle (RHN, JÁVI), p. 340.
- ITiCSE-2011-KleinKT #assessment #automation #semantics #using
- Automated assessment of short free-text responses in computer science using latent semantic analysis (RK, AK, MT), pp. 158–162.
- ICPC-J-2009-HsuH11 #comparison #estimation #relational
- Comparison of weighted grey relational analysis for software effort estimation (CJH, CYH), pp. 165–200.
- SCAM-J-2009-DesharnaisAS11 #identification #metric
- Identification and analysis of attributes and base measures within ISO 9126 (JMD, AA, WS), pp. 447–460.
- CSMR-2011-KohlKPDM #maintenance #multi #using
- Using Multivariate Split Analysis for an Improved Maintenance of Automotive Diagnosis Functions (JK, AK, JPP, AD, SM), pp. 305–308.
- ICPC-2011-Ali #automation #named #retrieval #trust
- Trustrace: Improving Automated Trace Retrieval through Resource Trust Analysis (NA), pp. 230–233.
- ICPC-2011-Sharafi #architecture #visualisation
- A Systematic Analysis of Software Architecture Visualization Techniques (ZS), pp. 254–257.
- ICSM-2011-PirzadehHS #execution #mining
- Exploiting text mining techniques in the analysis of execution traces (HP, AHL, MS), pp. 223–232.
- ICSM-2011-SnipesRM
- Code Hot Spot: A tool for extraction and analysis of code change history (WS, BPR, ERMH), pp. 392–401.
- ICSM-2011-TorresTPWY #evolution #named #visual notation
- Maleku: An evolutionary visual software analysis tool for providing insights into software evolution (AGT, RT, FJGP, MW, YY), pp. 594–597.
- MSR-2011-HindleEGM #automation #maintenance #process #topic
- Automated topic naming to support cross-project analysis of software maintenance activities (AH, NAE, MWG, JM), pp. 163–172.
- MSR-2011-SadowskiLLZW #algorithm #empirical
- An empirical analysis of the FixCache algorithm (CS, CL, ZL, XZ, EJWJ), pp. 219–222.
- MSR-2011-WangBD #debugging #eclipse
- System compatibility analysis of Eclipse and Netbeans based on bug data (XOW, EB, PTD), pp. 230–233.
- SCAM-2011-Gold #music #programming #source code
- Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis (NG), pp. 10–14.
- SCAM-2011-Keul
- Tuning Static Data Race Analysis for Automotive Control Software (SK), pp. 45–54.
- SCAM-2011-PavluSK #alias #comparison #graph #precise #set
- Computation of Alias Sets from Shape Graphs for Comparison of Shape Analysis Precision (VP, MS, AK), pp. 25–34.
- SCAM-2011-SfayhiS #interactive #visualisation #what
- What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios (AS, HAS), pp. 195–203.
- WCRE-2011-GrantCS #concept #reverse engineering #source code #using
- Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
- ICALP-v1-2011-BodlaenderJK #combinator #kernel #preprocessor
- Preprocessing for Treewidth: A Combinatorial Analysis through Kernelization (HLB, BMPJ, SK), pp. 437–448.
- ICALP-v1-2011-BorosEFGMM #approximate #game studies #probability
- Stochastic Mean Payoff Games: Smoothed Analysis and Approximation Schemes (EB, KME, MF, VG, KM, BM), pp. 147–158.
- ICALP-v2-2011-BrazdilKKV #bound #probability #recursion #runtime #source code
- Runtime Analysis of Probabilistic Programs with Unbounded Recursion (TB, SK, AK, IHV), pp. 319–331.
- FM-2011-BarringerH #domain-specific language #named #scala
- TraceContract: A Scala DSL for Trace Analysis (HB, KH), pp. 57–72.
- RTA-2011-FalkeKS #c #compilation #source code #termination #using
- Termination Analysis of C Programs Using Compiler Intermediate Languages (SF, DK, CS), pp. 41–50.
- RTA-2011-KochemsO #functional #linear #reachability #using
- Improved Functional Flow and Reachability Analyses Using Indexed Linear Tree Grammars (JK, CHLO), pp. 187–202.
- SEFM-2011-EggersRNF #hybrid #satisfiability
- Improving SAT Modulo ODE for Hybrid Systems Analysis by Combining Different Enclosure Methods (AE, NR, NSN, MF), pp. 172–187.
- SEFM-2011-ErnstSR #empirical #interactive #proving #theorem proving #verification
- Verification of B + Trees: An Experiment Combining Shape Analysis and Interactive Theorem Proving (GE, GS, WR), pp. 188–203.
- SEFM-2011-FadlisyahOA #formal method #hybrid #modelling #object-oriented
- Object-Oriented Formal Modeling and Analysis of Interacting Hybrid Systems in HI-Maude (MF, PCÖ, EÁ), pp. 415–430.
- SEFM-2011-ParrinoGGF #bound #data flow #satisfiability #verification
- A Dataflow Analysis to Improve SAT-Based Bounded Program Verification (BCP, JPG, DG, MFF), pp. 138–154.
- SEFM-2011-Pedercini11a #development #policy
- Development Policy Analysis in Mali: Sustainable Growth Prospects (MP), pp. 447–463.
- ICFP-2011-VardoulakisS #automaton
- Pushdown flow analysis of first-class control (DV, OS), pp. 69–80.
- CIG-2011-AlviA #complexity #game studies
- Complexity analysis and playing strategies for Ludo and its variant race games (FA, MAA), pp. 134–141.
- CIG-2011-ShakerYT #game studies #modelling #quality
- Feature analysis for modeling game content quality (NS, GNY, JT), pp. 126–133.
- DiGRA-2011-Asad #constraints #design #game studies
- Meaning Making Through Constraint: Modernist Poetics and Game Design Analysis (MA).
- DiGRA-2011-BelmanNF #design #game studies #named
- Grow-A-Game: A Tool for Values Conscious Design and Analysis of Digital Games (JB, HN, MF).
- DiGRA-2011-KrogerDQ #game studies #industrial #network
- The game boy's network. A network analysis of the German digital games industry (SK, ED, TQ).
- DiGRA-2011-SoppittM #comprehension #experience #using
- Understanding Player Experience using Sequential Analysis (MS, GM).
- FDG-2011-CooperKMLBBFPp #metaprogramming #social
- Analysis of social gameplay macros in the Foldit cookbook (SC, FK, IM, HL, JB, DB, JF, ZP, Fp), pp. 9–14.
- FDG-2011-LiuASCP #effectiveness
- Feature-based projections for effective playtrace analysis (YEL, EA, RS, SC, ZP), pp. 69–76.
- FDG-2011-Martin
- A spatial analysis of the JBA headquarters in Splinter Cell: Double Agent (PM0), pp. 123–130.
- AGTIVE-2011-GalvaoZRWA #graph #knowledge-based
- Knowledge-Based Graph Exploration Analysis (IG, EZ, AR, LW, MA), pp. 105–120.
- CHI-2011-Bargas-AvilaH #challenge #empirical #experience #novel #user interface
- Old wine in new bottles or novel challenges: a critical analysis of empirical studies of user experience (JABA, KH), pp. 2689–2698.
- CHI-2011-BaumerT #distributed #process #video
- Comparing activity theory with distributed cognition for video analysis: beyond “kicking the tires” (EPSB, BT), pp. 133–142.
- CHI-2011-BragdonNLH #design #gesture #mobile
- Experimental analysis of touch-screen gesture designs in mobile environments (AB, EN, YL, KH), pp. 403–412.
- CHI-2011-FourneyMT #interactive #query #usability
- Characterizing the usability of interactive applications through query log analysis (AF, RM, MAT), pp. 1817–1826.
- CHI-2011-GillVPJ #privacy #taxonomy
- Privacy dictionary: a linguistic taxonomy of privacy for content analysis (AJG, AV, CP, ANJ), pp. 3227–3236.
- CHI-2011-MaLD #perspective
- Perceptual analysis of talking avatar head movements: a quantitative perspective (XM, BHL, ZD), pp. 2699–2702.
- CHI-2011-WillettHHA #collaboration #named #visual notation
- CommentSpace: structured support for collaborative visual analysis (WW, JH, JMH, MA), pp. 3131–3140.
- CHI-2011-WobbrockFGH #parametricity #rank #using
- The aligned rank transform for nonparametric factorial analyses using only anova procedures (JOW, LF, DG, JJH), pp. 143–146.
- CSCW-2011-BardramD #process
- Activity analysis: applying activity theory to analyze complex work in hospitals (JB, AD), pp. 455–464.
- DHM-2011-BenderiusMWW #modelling #optimisation #simulation
- A Simulation Environment for Analysis and Optimization of Driver Models (OB, GM, KW, MW), pp. 453–462.
- DHM-2011-MarlerKJ #predict
- Optimization-Based Posture Prediction for Analysis of Box Lifting Tasks (TM, LK, RJ), pp. 151–160.
- DHM-2011-SixiangCIL #3d #modelling #parametricity
- 3D Parametric Body Model Based on Chinese Female Anhtropometric Analysis (PS, CKC, WHI, AL), pp. 22–29.
- DHM-2011-TangwenF #architecture #cumulative #learning #polymorphism
- Polymorphic Cumulative Learning in Integrated Cognitive Architectures for Analysis of Pilot-Aircraft Dynamic Environment (TY, SF), pp. 409–416.
- DHM-2011-WelkePRJ #how #modelling #validation #what
- What Is Human? How the Analysis of Brain Dynamics Can Help to Improve and Validate Driver Models (SW, JP, MR, TJ), pp. 513–522.
- DUXU-v1-2011-HuangW #gesture #interactive #mobile #usability
- Usability Analysis in Gesture Operation of Interactive E-Books on Mobile Devices (CHH, CMW), pp. 573–582.
- DUXU-v1-2011-Schmid #development #feedback #learning
- Development of an Augmented Feedback Application to Support Motor Learning after Stroke: Requirement Analysis (SS), pp. 305–314.
- DUXU-v1-2011-YeratziotisSVN
- Analysis of Emergent Use for Wellbeing Service Innovation (AY, CS, JV, MN), pp. 332–341.
- DUXU-v2-2011-Hsu11b #design
- Analysis of Causal Relationships between Blog Design Criteria (CCH), pp. 13–19.
- DUXU-v2-2011-InversiniCB #assessment #case study #experience #risk management #usability #user interface
- Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
- DUXU-v2-2011-Nakata #clustering #monitoring #usability
- Clustering Analysis to Evaluate Usability of Work-Flow Systems and to Monitor Proficiency of Workers (TN), pp. 487–496.
- DUXU-v2-2011-PohlmeyerB
- A Conjoint Analysis of Attributes Affecting the Likelihood of Technology Use (AEP, LTMB), pp. 303–312.
- HCD-2011-ChoiPJP #research #smarttech #state of the art
- Scientometric Analysis of Research in Smart Clothing: State of the Art and Future Direction (KC, HP, ESJ, SP), pp. 500–508.
- HCD-2011-WangL11a #behaviour #design #evaluation
- Task Analysis for Behavioral Factors Evaluation in Work System Design (LW, HYKL), pp. 440–448.
- HCI-DDA-2011-CharfiEKM #automation #evaluation #human-computer #interactive #network #towards
- Towards an Automatic Analysis of Interaction Data for HCI Evaluation Application to a Transport Network Supervision System (SC, HE, CK, FM), pp. 175–184.
- HCI-DDA-2011-InoueAN #modelling
- Cognitive Analysis for Knowledge Modeling in Air Traffic Control Work (SI, HA, KN), pp. 341–350.
- HCI-DDA-2011-KaelberM
- From Structural Analysis to Scenarios and Patterns for Knowledge Sharing Applications (CK, CM), pp. 258–267.
- HCI-ITE-2011-AbeOO #detection #image
- Eye-gaze Detection by Image Analysis under Natural Light (KA, SO, MO), pp. 176–184.
- HCI-ITE-2011-BarbuceanuADR #artificial reality #interactive #user interface
- Attentive User Interface for Interaction within Virtual Reality Environments Based on Gaze Analysis (FB, CA, MD, ZR), pp. 204–213.
- HCI-ITE-2011-HsiaoJ #named #user interface
- TiMBA — Tangible User Interface for Model Building and Analysis (CPH, BRJ), pp. 43–52.
- HCI-ITE-2011-InoueIFHIM
- Manual and Accelerometer Analysis of Head Nodding Patterns in Goal-oriented Dialogues (MI, TI, NF, RH, TI, HM), pp. 259–267.
- HCI-MIIE-2011-KimHJHMJ #behaviour #using #video
- Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
- HCI-UA-2011-LeeKJ #fault
- Control Error Analysis of Computerized Operational Environment in Nuclear Power Plants (SJL, JK, SCJ), pp. 360–367.
- HCI-UA-2011-RhiuRJY
- Analysis of Customer Satisfaction on the Stiffness of Outside Panels of Passenger Cars (IR, TR, BJ, MHY), pp. 257–265.
- HCI-UA-2011-YangCS #learning #recognition
- Facial Expression Recognition for Learning Status Analysis (MTY, YJC, YCS), pp. 131–138.
- HCI-UA-2011-YoshimiMIKOT #database
- Construction and Analysis of Database on Outer Cases of Medicines (HY, HM, AI, MK, MO, FT), pp. 226–231.
- HIMI-v1-2011-JeonKLW #security #smarttech
- A Practical Analysis of Smartphone Security (WJ, JK, YL, DW), pp. 311–320.
- HIMI-v1-2011-JeonLW
- Analysis of Content Filtering Software (WJ, YL, DW), pp. 548–557.
- HIMI-v1-2011-OhoriSNI
- Construction of a Model for Discriminating between Electroencephalographic Patterns at the Time of Incorrect Inputs Based on Sensitivity Spectrum Analysis (RO, DS, YN, SI), pp. 618–626.
- HIMI-v1-2011-Pavel #authentication #case study #protocol
- Analysis of Authentication Protocols with Scyter: Case Study (OP), pp. 359–365.
- HIMI-v1-2011-TakahashiSHNIHKWK #process
- Basic Study of Analysis of Human Brain Activities during Car Driving (NT, SS, YH, HN, HI, NH, SK, EW, SK), pp. 627–635.
- HIMI-v1-2011-VogelZO
- Constructing Phylogenetic Trees Based on Intra-group Analysis of Human Mitochondrial DNA (IV, FZ, PO), pp. 165–169.
- HIMI-v2-2011-ItouOM #chat #word
- Analysis on Relationship between Smiley and Emotional Word Included in Chat Text (JI, TO, JM), pp. 141–146.
- HIMI-v2-2011-KwackKC #mobile
- Economic Analysis of SON-Enabled Mobile WiMAX (SK, JK, JC), pp. 268–277.
- HIMI-v2-2011-Otsuka #behaviour #comprehension #multimodal #people
- Multimodal Conversation Scene Analysis for Understanding People’s Communicative Behaviors in Face-to-Face Meetings (KO), pp. 171–179.
- HIMI-v2-2011-SagaTKTM #comparison #using
- Comparison Analysis for Text Data by Using FACT-Graph (RS, ST, KK, HT, KM), pp. 75–83.
- IDGD-2011-GaoQ #distributed #simulation
- Analysis of the Applied Pattern of Distributed Computing Used in Simulation (SfG, HQ), pp. 152–158.
- IDGD-2011-RigbyD #design #network #on the
- On the Design of Organizational Network Analysis Software (JR, HD), pp. 550–555.
- IDGD-2011-YuSZ
- Driving Distraction Analysis by ECG Signals: An Entropy Analysis (LY, XS, KZ), pp. 258–264.
- VISSOFT-2011-BeckTD #design #visual notation
- A visual analysis and design tool for planning software reengineerings (MB, JT, JD), pp. 1–8.
- CAiSE-2011-KabicherR #process
- Human-Centered Process Engineering Based on Content Analysis and Process View Aggregation (SK, SRM), pp. 467–481.
- CAiSE-2011-MoserWHB #automation #categorisation #empirical #requirements #semantics
- Requirements Management with Semantic Technology: An Empirical Study on Automated Requirements Categorization and Conflict Analysis (TM, DW, MH, SB), pp. 3–17.
- CAiSE-2011-SchmidtJ #design #requirements #security #using
- Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
- EDOC-2011-Bellamy-McIntyreLW #authentication #enterprise #modelling
- OpenID and the Enterprise: A Model-Based Analysis of Single Sign-On Authentication (JBM, CL, GW), pp. 129–138.
- EDOC-2011-MelleriHM #modelling #standard #xml
- Comparing Information Models in XML-based e-Business Standards — A Quantitative Analysis (IM, KH, JM), pp. 225–234.
- ICEIS-J-2011-ChangS11a #mobile #process #research #simulation
- Research on Grid-Based Mobile Business Process and Analysis on Process Simulation (DC, LS), pp. 349–361.
- ICEIS-J-2011-Li11f #approach #case study #machine learning #type system #using
- A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
- ICEIS-J-2011-PereiraB11a #evaluation #lens #social
- Seeing Social Software Analysis and Evaluation through the Lenses of Culture (RP, MCCB), pp. 374–387.
- ICEIS-J-2011-PhillisK #approach
- A System-of-Systems Approach to the Analysis and Conservation of Biodiversity (YAP, VSK), pp. 3–15.
- ICEIS-v1-2011-ChenZ #bound
- Analysis on the Spatial Variation of the Center of Gravity of Inbound Tourism in China (YC, HZ), pp. 441–447.
- ICEIS-v1-2011-NiknafsSRR #comparative #predict
- Comparative Analysis of Three Techniques for Predictions in Time Series Having Repetitive Patterns (AN, BS, MMR, GR), pp. 177–182.
- ICEIS-v1-2011-WeiY #behaviour #game studies #metric #security
- Security Investment Analysis on Gaming Theory with Measurements of Cost and Decision Behavior (WW, RY), pp. 519–523.
- ICEIS-v2-2011-CanoCSF #architecture #integration #multi #process #segmentation
- Multisensory Architecture for Intelligent Surveillance Systems — Integration of Segmentation, Tracking and Activity Analysis (FAC, JCC, JSC, AFC), pp. 157–162.
- ICEIS-v2-2011-LivaniPR
- Decision Support System for Cost-benefit Analysis in Service Provision (EL, EP, GR), pp. 198–203.
- ICEIS-v2-2011-Pang #quality
- Analysis of Remote Quality Inspection System for Construction Projects (JP), pp. 341–344.
- ICEIS-v2-2011-TianZX #case study #network #social #using
- Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis (ZT, ZZ, DX), pp. 438–443.
- ICEIS-v2-2011-WangJ #empirical
- An Empirical Analysis of Beijing Public Transport Users’ Satisfaction Level (HW, LJ), pp. 384–388.
- ICEIS-v3-2011-Li11e #quality
- Construction and Analysis of Service Quality Model for Beijing Urban Mass Transit (WL), pp. 541–543.
- ICEIS-v3-2011-NiZY #uml
- Analysis of Requirement Capture based on UML (TN, ZZ, YY), pp. 313–317.
- ICEIS-v3-2011-QuG #identification #outsourcing #risk management
- The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
- ICEIS-v3-2011-ShenYZT #documentation #security
- Analysis of Core Documents in Information Security Based on Mapping Knowledge Domains (HZS, QJY, QJZ, LyT), pp. 421–427.
- ICEIS-v3-2011-TangX #communication #modelling #network
- Modeling and Analysis of a Power Line Communication Network Subject to Channel Failure (ST, YX), pp. 184–189.
- ICEIS-v3-2011-Zhao #contest #industrial
- The Competitive Strategy Analysis of Express Industry based on Time-based Competition (JZ), pp. 502–506.
- ICEIS-v3-2011-ZhouL #metric
- A New Method and Metric for Quantitative Risk Analysis (PZ, HL), pp. 25–33.
- ICEIS-v3-2011-ZongYTS #research #visual notation
- Visual Analysis of Research on Acceptance of Information Technology (QJZ, QJY, LyT, HZS), pp. 415–420.
- ICEIS-v4-2011-CuiYZ #empirical #industrial #social
- An Empirical Analysis of the Relationship between Social Consumption Demand Factors and the Cultural Industry in China (LC, HY, HZ), pp. 606–610.
- ICEIS-v4-2011-FarwickABRVH #architecture #automation #enterprise #maintenance #overview #requirements
- Requirements for Automated Enterprise Architecture Model Maintenance — A Requirements Analysis based on a Literature Review and an Exploratory Survey (MF, BA, RB, SR, KV, IH), pp. 325–337.
- ICEIS-v4-2011-Feng11a #enterprise
- Factorial Analysis to Measure Developing Ability of Listed Retail Enterprises (YF), pp. 553–556.
- ICEIS-v4-2011-Huang #empirical #industrial #statistics
- Which is Better Innovative Investment — An Empirical Analysis of Statistics from Chinese Industrial Undertakings (ZH), pp. 617–628.
- ICEIS-v4-2011-ShiL
- Analysis of the Economic Benefit of Used Batteries based on Reverse Logistics (XS, ZL), pp. 736–742.
- ICEIS-v4-2011-SunL #industrial
- Brief Analysis on Profits Allocation of IOT Industry Chain (QS, XL), pp. 165–169.
- ICEIS-v4-2011-XiongLL #industrial
- The Analysis of the Internet-of-things Industrial Chain based on Hypercycle Theory (QX, XL, YL), pp. 513–517.
- ICEIS-v4-2011-YangR #e-commerce
- Cost Earnings Analysis on Aquatic Product e-Commerce (ZY, SR), pp. 111–115.
- CIKM-2011-BespalovBQS #classification #n-gram #sentiment
- Sentiment classification based on supervised latent n-gram analysis (DB, BB, YQ, AS), pp. 375–382.
- CIKM-2011-CachedaCFF #algorithm #dataset #nearest neighbour
- Improving k-nearest neighbors algorithms: practical application of dataset analysis (FC, VC, DF, VF), pp. 2253–2256.
- CIKM-2011-GaoL #adaptation #classification #probability #sentiment #using
- A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
- CIKM-2011-GottronAS #semantics
- Insights into explicit semantic analysis (TG, MA, BS), pp. 1961–1964.
- CIKM-2011-GuoZGS #aspect-oriented #multi #sentiment
- Domain customization for aspect-oriented opinion analysis with multi-level latent sentiment clues (HG, HZ, ZG, ZS), pp. 2493–2496.
- CIKM-2011-HeerschopGHFKJ #using
- Polarity analysis of texts using discourse structure (BH, FG, AH, FF, UK, FdJ), pp. 1061–1070.
- CIKM-2011-HsuC #component #independence #privacy
- Privacy preservation by independent component analysis and variance control (CMH, MSC), pp. 925–930.
- CIKM-2011-KimKFL
- Spectral analysis of a blogosphere (SWK, KNK, CF, JHL), pp. 2145–2148.
- CIKM-2011-LiBS #named #network #online #social #towards
- CASINO: towards conformity-aware social influence analysis in online social networks (HL, SSB, AS), pp. 1007–1012.
- CIKM-2011-WangWLZZ #approach #classification #graph #hashtag #sentiment #topic #twitter
- Topic sentiment analysis in twitter: a graph-based hashtag sentiment classification approach (XW, FW, XL, MZ, MZ), pp. 1031–1040.
- CIKM-2011-YinHD #microblog #predict
- Structural link analysis and prediction in microblogs (DY, LH, BDD), pp. 1163–1168.
- ECIR-2011-Carrillo-de-AlbornozPGD #mining #overview #rating #sentiment
- A Joint Model of Feature Mining and Sentiment Analysis for Product Review Rating (JCdA, LP, PG, AD), pp. 55–66.
- ECIR-2011-KimC #web
- An Analysis of Time-Instability in Web Search Results (JK, VRC), pp. 466–478.
- ECIR-2011-NunzioLM #multi
- Multilingual Log Analysis: LogCLEF (GMDN, JL, TM), pp. 675–678.
- ECIR-2011-Rehurek #semantics
- Subspace Tracking for Latent Semantic Analysis (RR), pp. 289–300.
- ECIR-2011-ZucconAR
- Back to the Roots: Mean-Variance Analysis of Relevance Estimations (GZ, LA, KvR), pp. 716–720.
- ICML-2011-ChenPSDC #learning #process
- The Hierarchical Beta Process for Convolutional Factor Analysis and Deep Learning (BC, GP, GS, DBD, LC), pp. 361–368.
- ICML-2011-GhavamzadehLMH
- Finite-Sample Analysis of Lasso-TD (MG, AL, RM, MWH), pp. 1177–1184.
- KDD-2011-ChenDWSNL #process
- Activity analysis based on low sample rate smart meters (FC, JD, BW, SS, MRN, CTL), pp. 240–248.
- KDD-2011-GuerraVMA #approach #bias #realtime #sentiment
- From bias to opinion: a transfer-learning approach to real-time sentiment analysis (PHCG, AV, WMJ, VA), pp. 150–158.
- KDD-2011-Norton #power of
- The power of analysis and data (DN), p. 784.
- KDD-2011-SinkovitsCSTRWB #data-driven #performance
- Data intensive analysis on the gordon high performance data and compute system (RSS, PC, SS, MT, PR, NW, NB), pp. 747–748.
- KDD-2011-TanLTJZL #network #sentiment #social
- User-level sentiment analysis incorporating social networks (CT, LL, JT, LJ, MZ, PL), pp. 1397–1405.
- KDD-2011-WangBB #component #matrix #multi
- Common component analysis for multiple covariance matrices (HW, AB, DB), pp. 956–964.
- KDD-2011-WangLZ #keyword #rating
- Latent aspect rating analysis without aspect keyword supervision (HW, YL, CZ), pp. 618–626.
- KDIR-2011-BallesterosFDHG #dependence #using
- Inferring the Scope of Speculation using Dependency Analysis (MB, VF, AD, JH, PG), pp. 256–261.
- KDIR-2011-CostantiniFP #framework #natural language #representation
- A Framework for Structured Knowledge Extraction and Representation from Natural Language through Deep Sentence Analysis (SC, NF, AP), pp. 282–287.
- KDIR-2011-OlegA #approach #clustering
- Methods for Discovering and Analysis of Regularities Systems — Approach based on Optimal Partitioning of Explanatory Variables Space (OVS, AVK), pp. 423–426.
- KDIR-2011-SethCRSB #query #similarity
- A Tale of Two (Similar) Cities — Inferring City Similarity through Geo-spatial Query Log Analysis (RS, MC, DR, DS, SB), pp. 179–189.
- KEOD-2011-GoczylaWWZ #framework
- Analysis of Mapping within S-module Framework (KG, AW, WW, TZ), pp. 267–272.
- KEOD-2011-PinchukINDBP #distributed #semantics #visual notation
- Augmenting Semantics to Distributed Agents Logs — Enabling Graphical After Action Analysis of Federated Agents Logs (RP, SI, TN, TD, CB, GP), pp. 232–241.
- KEOD-2011-SeppalaN #modelling
- Contextual Analysis and Modeling of Personal Wellness (AS, PN), pp. 202–207.
- KMIS-2011-CostantinoDFS #evaluation #nondeterminism #using
- A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
- KMIS-2011-SchauerZM #collaboration #enterprise #open source #tool support
- A Feature-based Analysis of Open Source Tools for Enterprise 2.0 — Open Source Tools for Team Collaboration in SMEs (BS, MZ, RM), pp. 57–66.
- MLDM-2011-AdolfHHCH #grid #power management
- Techniques for Improving Filters in Power Grid Contingency Analysis (RA, DH, MH, YC, ZH), pp. 599–611.
- MLDM-2011-JiangMY #sentiment #topic
- Topic Sentiment Change Analysis (YJ, WM, CTY), pp. 443–457.
- MLDM-2011-MohebzadaRR #constraints #generative
- Sensitivity Analysis for Weak Constraint Generation (JGM, MMR, GR), pp. 239–252.
- MLDM-2011-PiatkowskaMNP #image #multi #semantics #using
- A Decision Support System Based on the Semantic Analysis of Melanoma Images Using Multi-elitist PSO and SVM (WP, JM, LN, KP), pp. 362–374.
- RecSys-2011-Faridani #canonical #correlation #recommendation #sentiment #using
- Using canonical correlation analysis for generalized sentiment analysis, product recommendation and search (SF), pp. 355–358.
- RecSys-2011-LeeL #behaviour #music #recommendation
- My head is your tail: applying link analysis on long-tailed music listening behavior for music recommendation (KL, KL), pp. 213–220.
- SEKE-2011-AlmeidaMA #execution #process #using
- Analysis of the continuity of software processes execution in software organizations assessed in MPS.BR using Grounded Theory (CDAdA, TCM, AA), pp. 792–797.
- SEKE-2011-BadriT #control flow #dependence #empirical #testing
- Empirical Analysis for Investigating the Effect of Control Flow Dependencies on Testability of Classes (MB, FT), pp. 475–480.
- SEKE-2011-ChangSWSP #component #design #social
- Design of Component-based Slow Intelligence Systems and Application to Social Influence Analysis (SKC, YS, YW, CCS, TCP), pp. 9–16.
- SEKE-2011-ChenHS #adaptation #modelling #process #towards #validation
- Towards Modeling and Validating Analysis Processes for Software Adaptation (XC, GH, LS), pp. 547–552.
- SEKE-2011-DoranTFG #architecture #nondeterminism #parametricity #reliability
- Architecture-based Reliability Analysis With Uncertain Parameters (DD, MT, LF, SSG), pp. 629–634.
- SEKE-2011-El-KharboutlyG #architecture #concurrent #probability #reliability #using
- Architecture-based Reliability Analysis of Concurrent Software Applications using Stochastic Reward Nets (REK, SSG), pp. 635–639.
- SEKE-2011-GaoGMTBK #complexity #component #configuration management #modelling #testing
- Testing Configurable Component-Based Software — Configuration Test Modeling and Complexity Analysis (JG, JG, AM, CT, XB, DCK), pp. 495–502.
- SEKE-2011-GuedesV #case study #metamodelling #multi #requirements #uml #validation
- Applying and Validating a UML Metamodel for the Requirements Analysis in Multi-Agent Systems: The AME-A Case Study (GTAG, RMV), pp. 746–751.
- SEKE-2011-GuoC #comparison #ontology #tool support #visualisation
- A Comparison and Analysis of Some Ontology Visualization Tools (SSG, CWC), pp. 357–362.
- SEKE-2011-JuniorGM #architecture #product line #trade-off
- A Meta-Process to Support Trade-Off Analysis in Software Product Line Architecture (EAdOJ, IMdSG, JCM), pp. 687–692.
- SEKE-2011-LiuL #parallel #petri net #pointer #thread
- Multithreaded Pointer Analysis Based on Petri Net (FL, BL), pp. 127–130.
- SEKE-2011-MoserWHB #automation #detection #empirical #requirements #semantics
- Automating the Detection of Complex Semantic Conflicts between Software Requirements (An empirical study on requirements conflict analysis with semantic technology) (TM, DW, MH, SB), pp. 729–735.
- SEKE-2011-SanfordWX #modelling #security #using
- Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
- SEKE-2011-WuXKP #data mining #debugging #mining #named #reliability
- BUGMINER: Software Reliability Analysis Via Data Mining of Bug Reports (LW, BX, GEK, RJP), pp. 95–100.
- SIGIR-2011-BelloginCC #hybrid #network #recommendation #self #social
- Self-adjusting hybrid recommenders based on social network analysis (AB, PC, IC), pp. 1147–1148.
- SIGIR-2011-Campos #query #using #web
- Using k-Top retrieved web snippets to date temporalimplicit queries based on web content analysis (RNTC), pp. 1325–1326.
- SIGIR-2011-FangSSKM #query
- Analysis of an expert search query log (YF, NS, LS, JK, APM), pp. 1189–1190.
- SIGIR-2011-KotovBWDT #modelling
- Modeling and analysis of cross-session search tasks (AK, PNB, RWW, STD, JT), pp. 5–14.
- SIGIR-2011-Shokouhi #detection #query
- Detecting seasonal queries by time-series analysis (MS), pp. 1171–1172.
- SIGIR-2011-SilvaGVMF #effectiveness #self #sentiment
- Effective sentiment stream analysis with self-augmenting training and demand-driven projection (ISS, JG, AV, WMJ, RF), pp. 475–484.
- SIGIR-2011-WangA #semantics
- Temporal latent semantic analysis for collaboratively generated content: preliminary results (YW, EA), pp. 1145–1146.
- SIGIR-2011-WeerkampBKMBR #people
- People searching for people: analysis of a people search engine log (WW, RB, BK, EM, KB, MdR), pp. 45–54.
- SIGIR-2011-WeiHL #framework #recommendation #semantics
- A unified framework for recommendations based on quaternary semantic analysis (WC, WH, MLL), pp. 1023–1032.
- SIGIR-2011-YangYD #network #predict
- Award prediction with temporal citation network analysis (ZY, DY, BDD), pp. 1203–1204.
- SIGIR-2011-YinHXD #microblog
- Link formation analysis in microblogs (DY, LH, XX, BDD), pp. 1235–1236.
- SIGIR-2011-Zhai #modelling #statistics #topic
- Beyond search: statistical topic models for text analysis (CZ), pp. 3–4.
- BX-2011-Hermann #graph grammar #model transformation
- Analysis of Model Transformations based on TGGs (FH), p. 52.
- ECMFA-2011-ColomboKL #design #generative #modelling #problem #requirements #using
- Generating Early Design Models from Requirements Analysis Artifacts Using Problem Frames and SysML (PC, FK, LL), pp. 97–114.
- ICMT-2011-AmstelB #maintenance #model transformation
- Model Transformation Analysis: Staying Ahead of the Maintenance Nightmare (MvA, MvdB), pp. 108–122.
- ICMT-2011-LepperT #optimisation #performance #visitor
- Optimization of Visitor Performance by Reflection-Based Analysis (ML, BTyW), pp. 15–30.
- MoDELS-2011-MaozRR #configuration management #consistency #diagrams #semantics
- Semantically Configurable Consistency Analysis for Class and Object Diagrams (SM, JOR, BR), pp. 153–167.
- MoDELS-2011-MaozRR11a #alloy #diagrams #named #revisited #using
- CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
- PLEASE-2011-ChastekDM #variability
- Commonality and variability analysis for resource constrained organizations (GJC, PD, JDM), pp. 31–34.
- ECOOP-2011-PrabhuMBIG #c++ #exception #interprocedural
- Interprocedural Exception Analysis for C++ (PP, NM, GB, FI, AG), pp. 583–608.
- OOPSLA-2011-DohertyHR #matlab
- Kind analysis for MATLAB (JD, LJH, SR), pp. 99–118.
- OOPSLA-2011-LiSD #concurrent #detection #named
- SOS: saving time in dynamic race detection with stationary analysis (DL, WSa, MBD), pp. 35–50.
- OOPSLA-2011-MadhavanK #approximate #null #verification
- Null dereference verification via over-approximated weakest pre-conditions analysis (RM, RK), pp. 1033–1052.
- OOPSLA-2011-SeweMSB #benchmark #design #java #metric #scala #virtual machine
- Da capo con scala: design and analysis of a scala benchmark suite for the java virtual machine (AS, MM, AS, WB), pp. 657–676.
- OOPSLA-2011-SridharanAPGTB #named #web
- F4F: taint analysis of framework-based web applications (MS, SA, MP, SG, OT, RB), pp. 1053–1068.
- TOOLS-EUROPE-2011-CianconeFDMG #component #modelling #named #performance #reliability
- KlaperSuite: An Integrated Model-Driven Environment for Reliability and Performance Analysis of Component-Based Systems (AC, AF, MLD, RM, VG), pp. 99–114.
- AdaEurope-2011-CoqR #ada #modelling #quality #source code
- The SQALE Quality and Analysis Models for Assessing the Quality of Ada Source Code (TC, JPR), pp. 61–74.
- AdaEurope-2011-MedinaC #ada #design #distributed #modelling #realtime #uml
- Model-Based Analysis and Design of Real-Time Distributed Systems with Ada and the UML Profile for MARTE (JLM, ÁGC), pp. 89–102.
- LOPSTR-2011-Gallagher #logic programming #source code #using
- Analysis of Logic Programs Using Regular Tree Languages — (JPG), pp. 1–3.
- LOPSTR-2011-PilozziS #self #termination #using
- Improved Termination Analysis of CHR Using Self-sustainability Analysis (PP, DDS), pp. 189–204.
- LOPSTR-2011-StroderESGF #complexity #linear #prolog #semantics #termination
- A Linear Operational Semantics for Termination and Complexity Analysis of ISO Prolog (TS, FE, PSK, JG, CF), pp. 237–252.
- PLDI-2011-BouajjaniDES #interprocedural #on the #source code
- On inter-procedural analysis of programs with lists and data (AB, CD, CE, MS), pp. 578–589.
- POPL-2011-CousotCL #array #automation #parametricity #scalability #segmentation
- A parametric segmentation functor for fully automatic and scalable array content analysis (PC, RC, FL), pp. 105–118.
- POPL-2011-HoffmannAH #multi
- Multivariate amortized resource analysis (JH, KA, MH), pp. 357–370.
- POPL-2011-LhotakC #performance #points-to
- Points-to analysis with efficient strong updates (OL, KCAC), pp. 3–16.
- POPL-2011-PrabhuRMH #named
- EigenCFA: accelerating flow analysis with GPUs (TP, SR, MM, MWH), pp. 511–522.
- POPL-2011-PrountzosMPM #graph #optimisation #parallel #source code
- A shape analysis for optimizing parallel graph programs (DP, RM, KP, KSM), pp. 159–172.
- PPDP-2011-BourdierC #network #policy #security #term rewriting #using
- Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
- PPDP-2011-EscobarKLMMNS #encryption #protocol #unification #using
- Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
- QAPL-2011-AssouramouD #hybrid #probability
- Analysis of Non-Linear Probabilistic Hybrid Systems (JA, JD), pp. 104–119.
- QAPL-2011-LeitnerFischerL #modelling #named #quantum #safety #uml
- QuantUM: Quantitative Safety Analysis of UML Models (FLF, SL), pp. 16–30.
- SAS-2011-BlackshearCSS #precise
- The Flow-Insensitive Precision of Andersen’s Analysis in Practice (SB, BYEC, SS, MS), pp. 60–76.
- SAS-2011-FlexederPS #assembly
- Side-Effect Analysis of Assembly Code (AF, MP, HS), pp. 77–94.
- SAS-2011-MadhavanRV #abstract interpretation
- Purity Analysis: An Abstract Interpretation Formulation (RM, GR, KV), pp. 7–24.
- SAS-2011-ZulegerGSV #abstraction #bound #imperative #source code
- Bound Analysis of Imperative Programs with the Size-Change Abstraction (FZ, SG, MS, HV), pp. 280–297.
- SIGAda-2011-AbrahamCP #ada #quality
- Improving quality of Ada software with range analysis (JA, JC, CP), pp. 7–8.
- SIGAda-2011-AbrahamCP11a #ada #quality
- Improving quality of Ada software with range analysis (JA, JC, CP), pp. 69–74.
- SIGAda-2011-GaudelSPRDL #ada #design pattern #pattern matching #pattern recognition #performance #recognition
- An Ada design pattern recognition tool for AADL performance analysis (VG, FS, AP, SR, PD, JL), pp. 61–68.
- RE-2011-CoteHSH #named #problem #requirements #uml
- UML4PF — A tool for problem-oriented requirements analysis (IC, MH, HS, DH), pp. 349–350.
- RE-2011-DekhtyarDHHCK #on the #performance #requirements #statistics
- On human analyst performance in assisted requirements tracing: Statistical analysis (AD, OD, JH, JHH, DC, WKK), pp. 111–120.
- RE-2011-KomssiKTLD #perspective #process
- Integrating analysis of customers’ processes into roadmapping: The value-creation perspective (MK, MK, HT, LL, AMD), pp. 57–66.
- RE-2011-UbayashiKHT #bound #embedded
- A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
- RE-2011-WeverM #effectiveness #question #what
- What are the day-to-day factors that are preventing business analysts from effective business analysis? (AW, NAMM), pp. 293–298.
- ASE-2011-Dwyer #behaviour #testing
- Unifying testing and analysis through behavioral coverage (MBD), p. 2.
- ASE-2011-Ganai #precise #scalability
- Scalable and precise symbolic analysis for atomicity violations (MKG), pp. 123–132.
- ASE-2011-GanovKP #alloy #incremental #performance
- A case for alloy annotations for efficient incremental analysis via domain specific solvers (SRG, SK, DEP), pp. 464–467.
- ASE-2011-JustSK #compilation #java #mutation testing #named #performance
- MAJOR: An efficient and extensible tool for mutation analysis in a Java compiler (RJ, FS, GMK), pp. 612–615.
- ASE-2011-OsterSB #automation #requirements
- Automating analysis of qualitative preferences in goal-oriented requirements engineering (ZJO, GRS, SB), pp. 448–451.
- ASE-2011-OverbeyJ #difference #lightweight #refactoring #reuse #tool support
- Differential precondition checking: A lightweight, reusable analysis for refactoring tools (JLO, REJ), pp. 303–312.
- ASE-2011-PohlLP #algorithm #automation #comparison #feature model #modelling #performance
- A performance comparison of contemporary algorithmic approaches for automated analysis operations on feature models (RP, KL, KP), pp. 313–322.
- ASE-2011-ZurowskaD #modelling #named #uml
- SAUML: A tool for symbolic analysis of UML-RT models (KZ, JD), pp. 604–607.
- ESEC-FSE-2011-LiCK #performance #points-to #using
- Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
- ESEC-FSE-2011-MeneelyRW #empirical #quality
- Does adding manpower also affect quality?: an empirical, longitudinal analysis (AM, PR, LW), pp. 81–90.
- ESEC-FSE-2011-RamamurthiRS #data flow #graph #probability #using
- Probabilistic dataflow analysis using path profiles on structure graphs (AR, SR, YNS), pp. 512–515.
- ICSE-2011-AdlerBRSSUZ #scalability #test coverage
- Code coverage analysis in practice for large systems (YA, NB, OR, OS, NS, SU, AZ), pp. 736–745.
- ICSE-2011-CataldoH #development #empirical #feature model #integration
- Factors leading to integration failures in global feature-oriented development: an empirical analysis (MC, JDH), pp. 161–170.
- ICSE-2011-Malik #graph #using
- Dynamic shape analysis of program heap using graph spectra (MZM), pp. 952–955.
- ICSE-2011-NearMKJ #dependence #evaluation #lightweight
- A lightweight code analysis and its role in evaluation of a dependability case (JPN, AM, EK, DJ), pp. 31–40.
- ICSE-2011-PirzadehH #behaviour #framework
- A software behaviour analysis framework based on the human perception systems (HP, AHL), pp. 948–951.
- ICSE-2011-RamasubbuCBH #configuration management #multi #quality
- Configuring global software teams: a multi-company analysis of project productivity, quality, and profits (NR, MC, RKB, JDH), pp. 261–270.
- ICSE-2011-SchmerlGDBC #case study #design #framework #named #platform
- SORASCS: a case study in soa-based platform design for socio-cultural analysis (BRS, DG, VD, MWB, KMC), pp. 643–652.
- ICSE-2011-SumnerBZP #nondeterminism #performance
- Coalescing executions for fast uncertainty analysis (WNS, TB, XZ, SP), pp. 581–590.
- ICSE-2011-XiaoZZ #data type
- Tracking data structures for postmortem analysis (XX, JZ, CZ), pp. 896–899.
- ICSE-2011-Xue #automation #legacy #product line #re-engineering #variability
- Reengineering legacy software products into software product line based on automatic variability analysis (YX), pp. 1114–1117.
- SAC-2011-ClaycombS #authentication #formal method #ubiquitous
- Formal analysis of device authentication applications in ubiquitous computing (WC, DS), pp. 451–452.
- SAC-2011-ClevenWW #design #performance #problem #process
- Process performance management: illuminating design issues through a systematic problem analysis (AC, RW, FW), pp. 280–286.
- SAC-2011-DingZ #forensics
- Time based data forensic and cross-reference analysis (XD, HZ), pp. 185–190.
- SAC-2011-ElahiY #heuristic #metric #requirements #trade-off
- Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method (GE, ESKY), pp. 651–658.
- SAC-2011-GomiI
- A personal photograph browser for life log analysis based on location, time, and person (AG, TI), pp. 1245–1251.
- SAC-2011-GutzmannLL #points-to
- Feedback-driven points-to analysis (TG, JL, WL), pp. 1341–1342.
- SAC-2011-HaBKBJ #network #perspective #social
- Analyzing a Korean blogosphere: a social network analysis perspective (JH, DHB, SWK, SCB, BSJ), pp. 773–777.
- SAC-2011-HuangK #ad hoc #performance
- Performance analysis of IEEE 802.11 ad hoc based broadcast (YHH, CYK), pp. 72–73.
- SAC-2011-LammelPS #java #open source #scalability
- Large-scale, AST-based API-usage analysis of open-source Java projects (RL, EP, JS), pp. 1317–1324.
- SAC-2011-LanLSH #algorithm #case study #classification #comparative #image
- A comparative study and analysis on K-view based algorithms for image texture classification (YL, HL, ES, CCH), pp. 859–860.
- SAC-2011-LiuZ11a #distance #performance #stack #worst-case
- Stack distance based worst-case instruction cache performance analysis (YL, WZ), pp. 723–728.
- SAC-2011-LuKNB #approach #embedded #realtime #simulation #statistics #validation
- A statistical approach to simulation model validation in response-time analysis of complex real-time embedded systems (YL, JK, TN, IB), pp. 711–716.
- SAC-2011-MagalhaesS #performance
- Root-cause analysis of performance anomalies in web-based applications (JPM, LMS), pp. 209–216.
- SAC-2011-ManyD #evaluation #fault tolerance #scheduling
- Fault tolerance evaluation and schedulability analysis (FM, DD), pp. 729–734.
- SAC-2011-SinhaTKWG #mobile #resource management
- Resource-aware ECG analysis on mobile devices (AS, HT, SK, ABW, MMG), pp. 1012–1013.
- SAC-2011-VarelaABM #aspect-oriented #product line #requirements
- Aspect-oriented analysis for software product lines requirements engineering (PV, JA, ISB, AMDM), pp. 667–674.
- SAC-2011-YamamotoT #named #web
- ImageAlert: credibility analysis of text-image pairs on the web (YY, KT), pp. 1724–1731.
- SAC-2011-Zhang #constraints #geometry #graph #problem
- Well-constrained completion for under-constrained geometric constraint problem based on connectivity analysis of graph (GFZ), pp. 1094–1099.
- LDTA-2011-GiegerichS #compilation
- Yield grammar analysis in the Bellman’s GAP compiler (RG, GS), p. 7.
- SLE-2011-KlintLP #towards #visualisation
- Towards a One-Stop-Shop for Analysis, Transformation and Visualization of Software (PK, BL, AvdP), pp. 1–18.
- ASPLOS-2011-ChipounovKC #framework #multi #named #platform
- S2E: a platform for in-vivo multi-path analysis of software systems (VC, VK, GC), pp. 265–278.
- CASE-2011-BasileCC #automation
- A discrete event model for the control and analysis of complex automated warehouse systems (FB, PC, JC), pp. 201–207.
- CASE-2011-Gonzalez-CastoloL #fuzzy #nondeterminism
- State uncertainty analysis of Fuzzy Timed DES (JCGC, ELM), pp. 600–606.
- CASE-2011-JulvezMV #simulation #using
- Analysis and simulation of manufacturing systems using SimHPN toolbox (JJ, CM, CRV), pp. 432–437.
- CASE-2011-LeH #random
- Marginal analysis on binary pairwise Gibbs random fields (TL, CNH), pp. 316–321.
- CASE-2011-LemattreDFPS #architecture #design #reachability
- Designing operational control architectures of critical systems by reachability analysis (TL, BD, JMF, JFP, PS), pp. 12–18.
- CASE-2011-QiaoWZ #clustering #modelling #tool support
- Modeling and analysis of dual-arm cluster tools for wafer fabrication with revisiting (YQ, NW, MZ), pp. 90–95.
- CASE-2011-TalpasanuK #approach
- Exoskeleton systems kinematics analysis with graph-matroid approach (IT, SK), pp. 822–827.
- CASE-2011-WangLH #delivery #modelling
- Modeling and analysis of care delivery services within patient rooms (JW, JL, PKH), pp. 537–542.
- CC-2011-JoynerBS #array #bound
- Subregion Analysis and Bounds Check Elimination for High Level Arrays (MJ, ZB, VS), pp. 246–265.
- CC-2011-NaeemL #alias #performance #set #summary #using
- Faster Alias Set Analysis Using Summaries (NAN, OL), pp. 82–103.
- CC-2011-RimsadP #source code
- Tainted Flow Analysis on e-SSA-Form Programs (AR, Md, FMQP), pp. 124–143.
- CC-2011-RodriguezL #data flow #parallel
- Actor-Based Parallel Dataflow Analysis (JR, OL), pp. 179–197.
- CC-2011-SunZC #java #points-to #probability
- Probabilistic Points-to Analysis for Java (QS, JZ, YC), pp. 62–81.
- CGO-2011-GreathouseLAB #data flow #distributed #scalability
- Highly scalable distributed dataflow analysis (JLG, CL, TMA, VB), pp. 277–288.
- CGO-2011-HardekopfL #pointer
- Flow-sensitive pointer analysis for millions of lines of code (BH, CL), pp. 289–298.
- CGO-2011-LiuM #locality #problem #using
- Pinpointing data locality problems using data-centric analysis (XL, JMMC), pp. 171–180.
- CGO-2011-NasreG #constraints #evaluation #performance #points-to
- Prioritizing constraint evaluation for efficient points-to analysis (RN, RG), pp. 267–276.
- DAC-2011-BayrakRBSI #automation #towards
- A first step towards automatic application of power analysis countermeasures (AGB, FR, PB, FXS, PI), pp. 230–235.
- DAC-2011-ChenKCH #multi #reliability
- Reliability analysis and improvement for multi-level non-volatile memories with soft information (SLC, BRK, JNC, CTH), pp. 753–758.
- DAC-2011-CoptyKN #architecture #performance #statistics #transaction
- Transaction level statistical analysis for efficient micro-architectural power and performance studies (EC, GK, SN), pp. 351–356.
- DAC-2011-Fey #data flow #multi
- Orchestrated multi-level information flow analysis to understand SoCs (GF), pp. 284–285.
- DAC-2011-GongYH #monte carlo #orthogonal #performance #probability
- Fast non-monte-carlo transient noise analysis for high-precision analog/RF circuits by stochastic orthogonal polynomials (FG, HY, LH), pp. 298–303.
- DAC-2011-HaddadN #grid #power management #using
- Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
- DAC-2011-HaoTSS #bound #performance #process
- Performance bound analysis of analog circuits considering process variations (ZH, SXDT, RS, GS), pp. 310–315.
- DAC-2011-HsuLFWHHY #design #manycore #modelling #named
- PowerDepot: integrating IP-based power modeling with ESL power analysis for multi-core SoC designs (CWH, JLL, SCF, CCW, SYH, WTH, JCY), pp. 47–52.
- DAC-2011-JungMPL #3d #optimisation #reliability
- TSV stress-aware full-chip mechanical reliability analysis and optimization for 3D IC (MJ, JM, DZP, SKL), pp. 188–193.
- DAC-2011-KoseF #algorithm #information retrieval #locality #performance
- Fast algorithms for IR voltage drop analysis exploiting locality (SK, EGF), pp. 996–1001.
- DAC-2011-KuoSR #performance #reachability #source code #using
- Efficient WCRT analysis of synchronous programs using reachability (MMYK, RS, PSR), pp. 480–485.
- DAC-2011-LiuSCKKL #3d #optimisation
- Full-chip TSV-to-TSV coupling analysis and optimization in 3D IC (CL, TS, JC, JK, JK, SKL), pp. 783–788.
- DAC-2011-MillerBHDCB #testing #validation
- A method to leverage pre-silicon collateral and analysis for post-silicon testing and validation (GM, BB, YCH, JD, XC, GB), pp. 575–578.
- DAC-2011-OnaissiTLN #approach #performance
- A fast approach for static timing analysis covering all PVT corners (SO, FT, JL, FNN), pp. 777–782.
- DAC-2011-SunLT #approximate #grid #incremental #performance #power management
- Efficient incremental analysis of on-chip power grid via sparse approximation (PS, XL, MYT), pp. 676–681.
- DAC-2011-ThieleSYB #embedded #multi #synthesis
- Thermal-aware system analysis and software synthesis for embedded multi-processors (LT, LS, HY, IB), pp. 268–273.
- DAC-2011-ToettcherCTW #constraints
- Biochemical oscillator sensitivity analysis in the presence of conservation constraints (JET, AC, BT, JW), pp. 806–811.
- DAC-2011-YounKH #convergence
- Global convergence analysis of mixed-signal systems (SY, JK, MH), pp. 498–503.
- DATE-2011-AndalamRG #source code
- Pruning infeasible paths for tight WCRT analysis of synchronous programs (SA, PSR, AG), pp. 204–209.
- DATE-2011-BiKVSM #performance #statistics
- Fast statistical analysis of RC nets subject to manufacturing variabilities (YB, KJvdK, JFV, LMS, NvdM), pp. 31–37.
- DATE-2011-BoghratiS #grid #performance #power management #random
- A scaled random walk solver for fast power grid analysis (BB, SSS), pp. 38–43.
- DATE-2011-BonannoBS #energy #modelling #monitoring #optimisation #tool support
- Energy analysis methods and tools for modelling and Optimizing monitoring tyre systems (AB, AB, MS), pp. 1121–1122.
- DATE-2011-BoosNSHHGKS
- Strategies for initial sizing and operating point analysis of analog circuits (VB, JN, MS, SH, SH, HG, DK, RS), pp. 1672–1674.
- DATE-2011-ChenGSS #performance
- Data-oriented performance analysis of SHA-3 candidates on FPGA accelerated computers (ZC, XG, AS, PS), pp. 1650–1655.
- DATE-2011-ChenO #fault #image #statistics
- Diagnosing scan chain timing faults through statistical feature analysis of scan images (MC, AO), pp. 185–190.
- DATE-2011-ErbP #performance
- A method for fast jitter tolerance analysis of high-speed PLLs (SE, WP), pp. 1107–1112.
- DATE-2011-GielenMW #reliability
- Analog circuit reliability in sub-32 nanometer CMOS: Analysis and mitigation (GGEG, EM, PHNDW), pp. 1474–1479.
- DATE-2011-HanJS
- Clause simplification through dominator analysis (HH, HJ, FS), pp. 143–148.
- DATE-2011-KimYLAJ #3d #embedded #mobile #performance
- A quantitative analysis of performance benefits of 3D die stacking on mobile and embedded SoC (DK, SY, SL, JHA, HJ), pp. 1333–1338.
- DATE-2011-KobayashiH #correlation #power management
- An LOCV-based static timing analysis considering spatial correlations of power supply variations (SK, KH), pp. 559–562.
- DATE-2011-KozhikkottuVRD #named #performance #variability
- VESPA: Variability emulation for System-on-Chip performance analysis (VJK, RV, AR, SD), pp. 2–7.
- DATE-2011-LiuV #generative #performance #source code #validation
- Efficient validation input generation in RTL by hybridized source code analysis (LL, SV), pp. 1596–1601.
- DATE-2011-MaricauG #probability #reliability
- Stochastic circuit reliability analysis (EM, GGEG), pp. 1285–1290.
- DATE-2011-MerrettAWZRMRLFA #modelling #monte carlo #performance #statistics #variability
- Modelling circuit performance variations due to statistical variability: Monte Carlo static timing analysis (MM, PA, YW, MZ, DR, CM, SR, ZL, SBF, AA), pp. 1537–1540.
- DATE-2011-PerathonerLT #component #performance
- Composing heterogeneous components for system-wide performance analysis (SP, KL, LT), pp. 842–847.
- DATE-2011-RaiYBCT #realtime #worst-case
- Worst-case temperature analysis for real-time systems (DR, HY, IB, JJC, LT), pp. 631–636.
- DATE-2011-RossiTSM #fault #memory management #performance #reliability
- Error correcting code analysis for cache memory high reliability and performance (DR, NT, MS, CM), pp. 1620–1625.
- DATE-2011-StattelmannBR #manycore #performance #simulation
- Fast and accurate resource conflict simulation for performance analysis of multi-core systems (SS, OB, WR), pp. 210–215.
- DATE-2011-TsukiyamaF #algorithm #statistics
- An algorithm to improve accuracy of criticality in statistical static timing analysis (ST, MF), pp. 1529–1532.
- DATE-2011-VatajeluF #in memory #memory management #robust
- Robustness analysis of 6T SRAMs in memory retention mode under PVT variations (EIV, JF), pp. 980–985.
- DATE-2011-WuM #optimisation
- Aging-aware timing analysis and optimization considering path sensitization (KCW, DM), pp. 1572–1577.
- HPCA-2011-LeeSNY #order
- Offline symbolic analysis to infer Total Store Order (DL, MS, SN, ZY), pp. 357–358.
- HPCA-2011-ZhangO #architecture #gpu #performance
- A quantitative performance analysis model for GPU architectures (YZ, JDO), pp. 382–393.
- HPDC-2011-MinhW #parallel #performance #towards
- Towards a profound analysis of bags-of-tasks in parallel systems and their performance impact (TNM, LW), pp. 111–122.
- LCTES-2011-AlbertAGZ #parallel
- Task-level analysis for a language with async/finish parallelism (EA, PA, SG, DZ), pp. 21–30.
- LCTES-2011-AlthausAN #parametricity #performance #precise
- Precise and efficient parametric path analysis (EA, SA, RN), pp. 141–150.
- LCTES-2011-Cullmann #novel #persistent #theory and practice
- Cache persistence analysis: a novel approachtheory and practice (CC), pp. 121–130.
- PDP-2011-CastroGMMFS #architecture #manycore #memory management #transaction
- Analysis and Tracing of Applications Based on Software Transactional Memory on Multicore Architectures (MBC, KG, VMM, JFM, LGF, MS), pp. 199–206.
- PDP-2011-KotenkoSD #information management #security #social
- Security Analysis of Information Systems Taking into Account Social Engineering Attacks (IVK, MS, ED), pp. 611–618.
- PDP-2011-ShaikhGLWS #visual notation
- In Situ Power Analysis of General Purpose Graphical Processing Units (MZS, MG, WL, MW, SS), pp. 40–44.
- PPoPP-2011-DonaldsonKR #automation #named
- SCRATCH: a tool for automatic analysis of dma races (AFD, DK, PR), pp. 311–312.
- SOSP-2011-ChenSGK #design #enterprise #multi
- Design implications for enterprise storage systems via multi-dimensional trace analysis (YC, KS, GRG, RHK), pp. 43–56.
- ESOP-2011-ChenMWC #linear
- Linear Absolute Value Relation Analysis (LC, AM, JW, PC), pp. 156–175.
- ESOP-2011-DeDN #data flow #source code
- Dataflow Analysis for Datarace-Free Programs (AD, DD, RN), pp. 196–215.
- ESOP-2011-GuhaSK #type system #using
- Typing Local Control and State Using Flow Analysis (AG, CS, SK), pp. 256–275.
- ESOP-2011-SotinJ #interprocedural #pointer #precise #stack
- Precise Interprocedural Analysis in the Presence of Pointers to the Stack (PS, BJ), pp. 459–479.
- FASE-2011-BendispostoL #automation
- Automatic Flow Analysis for Event-B (JB, ML), pp. 50–64.
- FASE-2011-KhanH #contract #dependence #modelling #on the #testing #using #visual notation
- On Model-Based Regression Testing of Web-Services Using Dependency Analysis of Visual Contracts (TAK, RH), pp. 341–355.
- FASE-2011-TkachukR #automation #generative #web
- Automated Driver Generation for Analysis of Web Applications (OT, SPR), pp. 326–340.
- FoSSaCS-2011-JaubertR #automaton #robust
- Quantitative Robustness Analysis of Flat Timed Automata (RJ, PAR), pp. 229–244.
- TACAS-2011-GaravelLMS #distributed #process
- CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes (HG, FL, RM, WS), pp. 372–387.
- TACAS-2011-SeshiaK #named #tool support
- GameTime: A Toolkit for Timing Analysis of Software (SAS, JK), pp. 388–392.
- TACAS-2011-TsitovichSWK #summary #termination
- Loop Summarization and Termination Analysis (AT, NS, CMW, DK), pp. 81–95.
- CADE-2011-AlbertiAR #automation #named #policy #security
- ASASP: Automated Symbolic Analysis of Security Policies (FA, AA, SR), pp. 26–33.
- CADE-2011-FredriksonCJ #algorithm #approximate #behaviour #complexity
- Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms (MF, MC, SJ), pp. 252–267.
- CADE-2011-NoschinskiEG #complexity #dependence #framework #term rewriting
- A Dependency Pair Framework for Innermost Complexity Analysis of Term Rewrite Systems (LN, FE, JG), pp. 422–438.
- CAV-2011-AtigBP
- Getting Rid of Store-Buffers in TSO Analysis (MFA, AB, GP), pp. 99–115.
- CAV-2011-BabicRS #automaton
- Malware Analysis with Tree Automata Inference (DB, DR, DS), pp. 116–131.
- CAV-2011-BardinHLLTV #framework
- The BINCOA Framework for Binary Code Analysis (SB, PH, JL, OL, RT, AV), pp. 165–170.
- CAV-2011-BrazdilKK #bound #performance #probability #source code
- Efficient Analysis of Probabilistic Programs with an Unbounded Counter (TB, SK, AK), pp. 208–224.
- CAV-2011-BrumleyJAS #framework #named #platform
- BAP: A Binary Analysis Platform (DB, IJ, TA, EJS), pp. 463–469.
- CAV-2011-ChatterjeeHJS #algorithm #automaton #markov #process
- Symbolic Algorithms for Qualitative Analysis of Markov Decision Processes with Büchi Objectives (KC, MH, MJ, NS), pp. 260–276.
- CAV-2011-GaneshKAGHE #detection #named #string #testing
- HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection (VG, AK, SA, PJG, PH, MDE), pp. 1–19.
- CAV-2011-Lahiri #composition #smt
- SMT-Based Modular Analysis of Sequential Systems Code (SKL), pp. 21–27.
- CSL-2011-Aschieri
- Transfinite Update Procedures for Predicative Systems of Analysis (FA), pp. 20–34.
- ICLP-2011-ChristiansenHLP #network #sequence
- Bayesian Annotation Networks for Complex Sequence Analysis (HC, CTH, OTL, MP), pp. 220–230.
- ICLP-J-2011-CodishGBFG #constraints #integer #satisfiability #termination #using
- SAT-based termination analysis using monotonicity constraints over the integers (MC, IG, AMBA, CF, JG), pp. 503–520.
- ICLP-J-2011-VoetsS #integer #logic programming #source code
- Non-termination analysis of logic programs with integer arithmetics (DV, DDS), pp. 521–536.
- ICST-2011-CzerwonkaDNTT #case study #experience #named #predict
- CRANE: Failure Prediction, Change Analysis and Test Prioritization in Practice — Experiences from Windows (JC, RD, NN, AT, AT), pp. 357–366.
- ICST-2011-EldhHP #design #testing
- Analysis of Mistakes as a Method to Improve Test Case Design (SE, HH, SP), pp. 70–79.
- ISSTA-2011-BalasubramanianPWKL #modelling #multi #named #statechart
- Polyglot: modeling and analysis for multiple Statechart formalisms (DB, CSP, MWW, GK, MRL), pp. 45–55.
- ISSTA-2011-LeS #detection #fault #generative
- Generating analyses for detecting faults in path segments (WL, MLS), pp. 320–330.
- ISSTA-2011-McGillDS #concept #modelling #scalability
- Scalable analysis of conceptual data models (MJM, LKD, REKS), pp. 56–66.
- ISSTA-2011-TateishiPT #higher-order #logic #monad #string
- Path- and index-sensitive string analysis based on monadic second-order logic (TT, MP, OT), pp. 166–176.
- ISSTA-2011-XiaoZ #encoding #geometry #java #performance #points-to
- Geometric encoding: forging the high performance context sensitive points-to analysis for Java (XX, CZ), pp. 188–198.
- ISSTA-2011-YanXR #alias #java
- Demand-driven context-sensitive alias analysis for Java (DY, G(X, AR), pp. 155–165.
- ISSTA-2011-YasmeenG #automation #framework
- Automated framework for formal operator task analysis (AY, ELG), pp. 78–88.
- LICS-2011-Marion #complexity #type system
- A Type System for Complexity Flow Analysis (JYM), pp. 123–132.
- TAP-2011-ChebaroKGJ #c #debugging #generative #slicing #testing
- The SANTE Tool: Value Analysis, Program Slicing and Test Generation for C Program Debugging (OC, NK, AG, JJ), pp. 78–83.
- VMCAI-2011-GawlitzaLMSW #concurrent #process #reachability #source code
- Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation (TMG, PL, MMO, HS, AW), pp. 199–213.
- VMCAI-2011-HooimeijerV #algorithm #automaton #evaluation #string
- An Evaluation of Automata Algorithms for String Analysis (PH, MV), pp. 248–262.
- VMCAI-2011-KimC #abstract interpretation #string
- String Analysis as an Abstract Interpretation (SWK, KMC), pp. 294–308.
- VMCAI-2011-SiegelG #formal method #message passing
- Formal Analysis of Message Passing — (SFS, GG), pp. 2–18.
- CBSE-2010-FilieriGGM #component #multi #reliability
- Reliability Analysis of Component-Based Systems with Multiple Failure Modes (AF, CG, VG, RM), pp. 1–20.
- ECSA-2010-KiwelekarJ #architecture #generative #ontology
- Ontological Analysis for Generating Baseline Architectural Descriptions (AWK, RKJ), pp. 417–424.
- DocEng-2010-TerradesTSRVJ #documentation #interactive #layout
- Interactive layout analysis and transcription systems for historic handwritten documents (ORT, AHT, NS, VR, EV, AJ), pp. 219–222.
- DRR-2010-BallKSN #documentation #using
- Analysis of line structure in handwritten documents using the Hough transform (GRB, HK, SNS, AN), pp. 1–10.
- ECDL-2010-BiryukovD #community
- Analysis of Computer Science Communities Based on DBLP (MB, CD), pp. 228–235.
- ECDL-2010-GippTB #clustering #proximity
- Link Proximity Analysis — Clustering Websites by Examining Link Proximity (BG, AT, JB), pp. 449–452.
- ECDL-2010-HoareS #design #interface
- Application of Session Analysis to Search Interface Design (CH, HS), pp. 208–215.
- ECDL-2010-Reitz0 #evolution #library
- An Analysis of the Evolving Coverage of Computer Science Sub-fields in the DBLP Digital Library (FR, OH), pp. 216–227.
- ECDL-2010-SykesDBMRUF #library
- A New Focus on End Users: Eye-Tracking Analysis for Digital Libraries (JS, MD, DB, EM, IR, YÜ, PF), pp. 510–513.
- HT-2010-CartledgeN #graph
- Analysis of graphs for digital preservation suitability (CLC, MLN), pp. 109–118.
- HT-2010-MitzlaffBSH #network
- Visit me, click me, be my friend: an analysis of evidence networks of user relationships in BibSonomy (FM, DB, GS, AH), pp. 265–270.
- SIGMOD-2010-Brown #array #overview #scalability
- Overview of sciDB: large scale array storage, processing and analysis (PGB), pp. 963–968.
- SIGMOD-2010-HanSYY #approach #database #mining #network
- Mining knowledge from databases: an information network analysis approach (JH, YS, XY, PSY), pp. 1251–1252.
- VLDB-2010-BotanDDHMT #execution #named #semantics
- SECRET: A Model for Analysis of the Execution Semantics of Stream Processing Systems (IB, RD, ND, LMH, RJM, NT), pp. 232–243.
- VLDB-2010-HaasJAXPJ #database #named
- MCDB-R: Risk Analysis in the Database (SA, RJ, LLP, FX, CMJ, PJH), pp. 782–793.
- VLDB-2010-MelnikGLRSTV #dataset #interactive #named
- Dremel: Interactive Analysis of Web-Scale Datasets (SM, AG, JJL, GR, SS, MT, TV), pp. 330–339.
- CSEET-2010-UsmanKHI
- Pedagogical and Structural Analysis of SE Courses (MU, JIK, MH, NI), pp. 136–143.
- EDM-2010-BachmannGB #student
- Tracking Students’ Inquiry Paths through Student Transition Analysis (MB, JDG, JB), pp. 269–270.
- EDM-2010-BakerG #difference #student
- An Analysis of the Differences in the Frequency of Students’ Disengagement in Urban, Rural, and Suburban High Schools (RSJdB, SMG), pp. 11–20.
- EDM-2010-JeongBJH #behaviour #effectiveness #learning #markov #modelling #using
- Analysis of Productive Learning Behaviors in a Structured Inquiry Cycle Using Hidden Markov Models (HJ, GB, JJ, LH), pp. 81–90.
- EDM-2010-KimC #case study #experience #learning #sentiment #student
- Sentiment Analysis in Student Experiences of Learning (SMK, RAC), pp. 111–120.
- EDM-2010-KrugerMW #education #mining
- A Data Model to Ease Analysis and Mining of Educational Data (AK, AM, BW), pp. 131–140.
- EDM-2010-RaiB #approach #case study #education #modelling
- Analysis of a causal modeling approach: a case study with an educational intervention (DR, JEB), pp. 313–314.
- EDM-2010-RuppSC #game studies #learning #modelling #network #novel
- Modeling Learning Trajectories with Epistemic Network Analysis: A Simulation-based Investigation of a Novel Analytic Method for Epistemic Games (AAR, SJS, YC), pp. 319–320.
- EDM-2010-XuR #learning #network #online #social
- Peer Production of Online Learning Resources: A Social Network Analysis (BX, MR), pp. 315–316.
- ITiCSE-2010-Mirolo #learning #multi #recursion #student
- Learning (through) recursion: a multidimensional analysis of the competences achieved by CS1 students (CM), pp. 160–164.
- ITiCSE-2010-SekiyaMY #education
- Analysis of computer science related curriculum on LDA and Isomap (TS, YM, KY), pp. 48–52.
- SIGITE-2010-UzubellLJ #assurance #information management
- An analysis of the common body of knowledge of software assurance (SU, SL, KJ), pp. 125–130.
- SIGITE-2010-WillisM #assessment
- Centering resonance analysis: a potential tool for IT program assessment (CLW, SLM), pp. 135–142.
- CSMR-2010-Koschke #incremental
- Incremental Reflexion Analysis (RK), pp. 1–10.
- CSMR-2010-LiuM #case study #data flow
- Static Information Flow Analysis with Handling of Implicit Flows and a Study on Effects of Implicit Flows vs Explicit Flows (YL, AM), pp. 146–155.
- CSMR-2010-MalikJAHFH #automation #comparison #enterprise #performance #scalability #testing
- Automatic Comparison of Load Tests to Support the Performance Analysis of Large Enterprise Systems (HM, ZMJ, BA, AEH, PF, GH), pp. 222–231.
- ICPC-2010-OlszakJ #java #named
- Featureous: A Tool for Feature-Centric Analysis of Java Software (AO, BNJ), pp. 44–45.
- ICSM-2010-AryaniPH #case study #co-evolution #enterprise
- Domain-based change propagation analysis: An enterprise system case study (AA, IDP, MH), pp. 1–9.
- ICSM-2010-FisherDBR #context-sensitive grammar
- Exploring the impact of context sensitivity on blended analysis (MFI, BD, SB, BGR), pp. 1–10.
- ICSM-2010-ParandeK #dependence #open source
- A longitudinal analysis of the dependency concentration in smaller modules for open-source software products (MAP, GK), pp. 1–5.
- ICSM-2010-PerinGN #enterprise #java #transaction
- Recovery and analysis of transaction scope from scattered information in Java Enterprise Applications (FP, TG, ON), pp. 1–10.
- ICSM-2010-ZawawyKM
- Log filtering and interpretation for root cause analysis (HZ, KK, JM), pp. 1–5.
- MSR-2010-ColacoMFH #developer
- OSS developers context-specific Preferred Representational systems: A initial Neurolinguistic text analysis of the Apache mailing list (MCJ, MGM, MF, PHdS), pp. 126–129.
- MSR-2010-NiaBDF #network #open source
- Validity of network analyses in Open Source Projects (RN, CB, PTD, VF), pp. 201–209.
- PASTE-2010-AyewahP #null
- Null dereference analysis in practice (NA, WP), pp. 65–72.
- PASTE-2010-CalmanZ #induction #information retrieval #interprocedural
- Interprocedural induction variable analysis based on interprocedural SSA form IR (SC, JZ), pp. 37–44.
- SCAM-2010-EdvinssonLL #parallel #reachability
- Parallel Reachability and Escape Analyses (ME, JL, WL), pp. 125–134.
- SCAM-2010-GrantC #concept #source code
- Estimating the Optimal Number of Latent Concepts in Source Code Analysis (SG, JRC), pp. 65–74.
- SCAM-2010-Harman #source code #why
- Why Source Code Analysis and Manipulation Will Always be Important (MH), pp. 7–19.
- WCRE-2010-Boughanmi #multi
- Multi-Language and Heterogeneously-licensed Software Analysis (FB), pp. 293–296.
- WCRE-2010-GanesanLRWLT #architecture
- Architectural Analysis of Systems Based on the Publisher-Subscriber Style (DG, ML, LR, RW, VL, TT), pp. 173–182.
- WCRE-2010-Guerrouj #automation #concept #identifier #source code
- Automatic Derivation of Concepts Based on the Analysis of Source Code Identifiers (LG), pp. 301–304.
- WCRE-2010-PerscheidSHGH #behaviour #online #runtime
- Immediacy through Interactivity: Online Analysis of Run-time Behavior (MP, BS, RH, FG, MH), pp. 77–86.
- LATA-2010-Casadio
- Agreement and Cliticization in Italian: A Pregroup Analysis (CC), pp. 166–177.
- LATA-2010-MarschallR #algorithm #automaton #pattern matching #probability
- Exact Analysis of Horspool’s and Sunday’s Pattern Matching Algorithms with Probabilistic Arithmetic Automata (TM, SR), pp. 439–450.
- LATA-2010-Muscholl #automaton #communication
- Analysis of Communicating Automata (AM), pp. 50–57.
- IFM-2010-MarronePV #dependence #inheritance #multi
- Multiformalism and Transformation Inheritance for Dependability Analysis of Critical Systems (SM, CP, VV), pp. 215–228.
- RTA-2010-OttoBEG #automation #bytecode #java #term rewriting #termination
- Automated Termination Analysis of Java Bytecode by Term Rewriting (CO, MB, CvE, JG), pp. 259–276.
- RTA-2010-ZanklK #complexity #composition
- Modular Complexity Analysis via Relative Complexity (HZ, MK), pp. 385–400.
- SEFM-2010-KokashKV #modelling #visual notation
- Time and Data-Aware Analysis of Graphical Service Models in Reo (NK, CK, EPdV), pp. 125–134.
- SEFM-2010-MassinkLBH #algebra #approach #process #scalability
- A Scalable Fluid Flow Process Algebraic Approach to Emergency Egress Analysis (MM, DL, AB, MDH), pp. 169–180.
- SEFM-2010-Powell #behaviour #modelling #scalability
- Behavior Engineering — A Scalable Modeling and Analysis Method (DP), pp. 31–40.
- FLOPS-2010-AvanziniM #complexity #graph grammar
- Complexity Analysis by Graph Rewriting (MA, GM), pp. 257–271.
- Haskell-2010-RamseyDJ #composition #data flow #library #named #reuse
- Hoopl: a modular, reusable library for dataflow analysis and transformation (NR, JD, SLPJ), pp. 121–134.
- ICFP-2010-HoldermansH #higher-order #polymorphism
- Polyvariant flow analysis with higher-ranked polymorphic types and higher-order effect operators (SH, JH), pp. 63–74.
- AIIDE-2010-Perkins #approach #composition #detection #game studies #realtime
- Terrain Analysis in Real-Time Strategy Games: An Integrated Approach to Choke Point Detection and Region Decomposition (LP).
- CIG-2010-CiancariniF
- Retrograde Analysis of Kriegspiel endgames (PC, GPF), pp. 411–418.
- FDG-2010-AndersenLABP
- Gameplay analysis through state projection (EA, YEL, EA, FBG, ZP), pp. 1–8.
- FDG-2010-MilamE #design #game studies
- Analysis of level design 'push & pull' within 21 games (DM, MSEN), pp. 139–146.
- GT-VMT-2010-HermannCEK #equivalence #graph #performance #permutation #petri net
- Efficient Analysis of Permutation Equivalence of Graph Derivations Based on Petri Nets (FH, AC, HE, BK).
- ICGT-2010-HermannEOG #behaviour #formal method #functional #graph grammar #model transformation
- Formal Analysis of Functional Behaviour for Model Transformations Based on Triple Graph Grammars (FH, HE, FO, UG), pp. 155–170.
- ICGT-2010-Modica #communication #formal method #modelling #petri net #platform
- Formal Modeling and Analysis of Communication Platforms Like Skype Based on Petri Net Transformation Systems (TM), pp. 400–402.
- CHI-2010-FreirePSG #interface #multi #named #network #visualisation
- ManyNets: an interface for multiple network analysis and visualization (MF, CP, BS, JG), pp. 213–222.
- CHI-2010-KapteinNM #consistency
- Powerful and consistent analysis of likert-type ratingscales (MCK, CN, PM), pp. 2391–2394.
- CHI-2010-PancieraPET #behaviour #lifecycle
- Lurking? cyclopaths?: a quantitative lifecycle analysis of user behavior in a geowiki (KAP, RP, TE, LGT), pp. 1917–1926.
- CHI-2010-ShengHKCD #effectiveness
- Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions (SS, MBH, PK, LFC, JSD), pp. 373–382.
- CHI-2010-WeaverBSIL #artificial reality #empirical #order #using
- An empirical task analysis of warehouse order picking using head-mounted displays (KW, HB, TS, HI, ML), pp. 1695–1704.
- CSCW-2010-BalakrishnanFKK #collaboration #information management #visualisation
- Pitfalls of information access with visualizations in remote collaborative analysis (ADB, SRF, SBK, AK), pp. 411–420.
- CSCW-2010-ScholandTP #network #social
- Social language network analysis (AJS, YRT, JWP), pp. 23–26.
- SOFTVIS-2010-AdamoliH #framework #named #performance #visualisation
- Trevis: a context tree visualization & analysis framework and its use for classifying performance failure reports (AA, MH), pp. 73–82.
- SOFTVIS-2010-BeckD10a #automation #distributed #towards #visualisation
- Towards automated analysis and visualization of distributed software systems (MB, JD), pp. 213–214.
- SOFTVIS-2010-KerrenJ #3d #diagrams #interactive #metric #roadmap
- 3D kiviat diagrams for the interactive analysis of software metric trends (AK, IJ), pp. 203–204.
- CAiSE-2010-RamdoyalCH #concept #database #interactive #reverse engineering #user interface
- Reverse Engineering User Interfaces for Interactive Database Conceptual Analysis (RR, AC, JLH), pp. 332–347.
- CAiSE-2010-SchonenbergJSA #simulation
- Business Trend Analysis by Simulation (HS, JJ, NS, WMPvdA), pp. 515–529.
- CAiSE-2010-StalhaneSB #case study #diagrams #safety #sequence chart
- Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases (TS, GS, LdB), pp. 165–179.
- EDOC-2010-NarmanBKJ #hybrid #modelling #probability #quality #relational
- Hybrid Probabilistic Relational Models for System Quality Analysis (PN, MB, JK, PJ), pp. 57–66.
- ICEIS-AIDSS-2010-CuzzocreaFP #abstraction #collaboration #effectiveness #flexibility #mining #process
- Effective Analysis of Flexible Collaboration Processes by Way of Abstraction and Mining Techniques (AC, FF, LP), pp. 157–166.
- ICEIS-AIDSS-2010-HusterB #evolution #industrial #ontology #visual notation
- Visual Trend Analysis — Ontology Evolution Support for the Trend Related Industry Sector (JH, AB), pp. 46–53.
- ICEIS-DISI-2010-CaronD #case study
- What-if Analysis in OLAP — With a Case Study in Supermarket Sales Data (EC, HD), pp. 208–213.
- ICEIS-HCI-2010-FerrazS #multi #named
- GlobeOLAP — Improving the Geospatial Realism in Multidimensional Analysis Environment (VRTF, MTPS), pp. 99–107.
- ICEIS-ISAS-2010-HulstijnG
- Risk Analysis for Inter-organizational Controls (JH, JG), pp. 314–320.
- ICEIS-ISAS-2010-IizukaIT #approach #effectiveness #process #re-engineering
- Analysis of Effective Approach for Business Process re-Engineering — From the Perspective of Organizational Factors (KI, YI, KT), pp. 384–389.
- ICEIS-ISAS-2010-SetiawanS #process
- Socialization of Work Practice through Business Process Analysis (MAS, SWS), pp. 165–170.
- CIKM-2010-AjiWAG #modelling #using
- Using the past to score the present: extending term weighting models through revision history analysis (AA, YW, EA, EG), pp. 629–638.
- CIKM-2010-BronBR #component #ranking
- Ranking related entities: components and analyses (MB, KB, MdR), pp. 1079–1088.
- CIKM-2010-GuanXZGY #classification #documentation #performance #reduction
- Fast dimension reduction for document classification based on imprecise spectrum analysis (HG, BX, JZ, MG, TY), pp. 1753–1756.
- CIKM-2010-GuoZGZS #mining #named
- OpinionIt: a text mining system for cross-lingual opinion analysis (HG, HZ, ZG, XZ, ZS), pp. 1199–1208.
- CIKM-2010-MadaniY #topic
- Discovery of numerous specific topics via term co-occurrence analysis (OM, JY), pp. 1841–1844.
- CIKM-2010-ShenWL #multi #summary #topic
- Topic aspect analysis for multi-document summarization (CS, DW, TL), pp. 1545–1548.
- CIKM-2010-XueCS #modelling #using
- Modeling reformulation using passage analysis (XX, WBC, DAS), pp. 1497–1500.
- CIKM-2010-YangZ #multi
- Language pyramid and multi-scale text analysis (SHY, HZ), pp. 639–648.
- ECIR-2010-UdupaK #canonical #correlation #equivalence #using
- Transliteration Equivalence Using Canonical Correlation Analysis (RU, MMK), pp. 75–86.
- ICML-2010-BoureauPL #recognition #visual notation
- A Theoretical Analysis of Feature Pooling in Visual Recognition (YLB, JP, YL), pp. 111–118.
- ICML-2010-DillonBL #generative #learning
- Asymptotic Analysis of Generative Semi-Supervised Learning (JVD, KB, GL), pp. 295–302.
- ICML-2010-LazaricGM #algorithm #classification #policy
- Analysis of a Classification-based Policy Iteration Algorithm (AL, MG, RM), pp. 607–614.
- ICML-2010-LazaricGM10a
- Finite-Sample Analysis of LSTD (AL, MG, RM), pp. 615–622.
- ICML-2010-LiuNLL #graph #learning #relational
- Learning Temporal Causal Graphs for Relational Time-Series Analysis (YL, ANM, ACL, YL), pp. 687–694.
- ICML-2010-LizotteBM #learning #multi #performance #random
- Efficient Reinforcement Learning with Multiple Reward Functions for Randomized Controlled Trial Analysis (DJL, MHB, SAM), pp. 695–702.
- ICML-2010-TingHJ #convergence #graph
- An Analysis of the Convergence of Graph Laplacians (DT, LH, MIJ), pp. 1079–1086.
- ICML-2010-WangZ
- A New Analysis of Co-Training (WW, ZHZ), pp. 1135–1142.
- ICPR-2010-BoussellaaZABA #documentation #image #segmentation
- Unsupervised Block Covering Analysis for Text-Line Segmentation of Arabic Ancient Handwritten Document Images (WB, AZ, HEA, AB, AMA), pp. 1929–1932.
- ICPR-2010-ChenSZCL #image
- Color Image Analysis by Quaternion Zernike Moments (BC, HS, HZ, GC, LL), pp. 625–628.
- ICPR-2010-DonoserKB
- Object Tracking by Structure Tensor Analysis (MD, SK, HB), pp. 2600–2603.
- ICPR-2010-DuboisPM #adaptation #component #composition #using
- Decomposition of Dynamic Textures Using Morphological Component Analysis: A New Adaptative Strategy (SD, RP, MM), pp. 2258–2261.
- ICPR-2010-ElnakibECS #corpus
- Dyslexia Diagnostics by Centerline-Based Shape Analysis of the Corpus Callosum (AE, AEB, MC, AES), pp. 261–264.
- ICPR-2010-FengY
- Binary Discriminant Analysis for Face Template Protection (YCF, PCY), pp. 874–877.
- ICPR-2010-Feschet #composition #geometry #multi #parametricity
- Multiscale Analysis from 1D Parametric Geometric Decomposition of Shapes (FF), pp. 2102–2105.
- ICPR-2010-GarciaMS #performance
- Theoretical Analysis of a Performance Measure for Imbalanced Data (VG, RAM, JSS), pp. 617–620.
- ICPR-2010-GilPT #adaptation #integration #visual notation
- Analysis and Adaptation of Integration Time in PMD Camera for Visual Servoing (PG, JP, FT), pp. 311–315.
- ICPR-2010-IbrahimKKG #online #using #verification
- On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
- ICPR-2010-JagerPCC #3d #using
- Dual Channel Colocalization for Cell Cycle Analysis Using 3D Confocal Microscopy (SJ, KP, CSCD, MCC), pp. 2580–2583.
- ICPR-2010-Jean
- Local Optical Operators for Subpixel Scene Analysis (YDJ), pp. 3448–3451.
- ICPR-2010-JingLYBY #kernel
- Kernel Uncorrelated Adjacent-class Discriminant Analysis (XYJ, SL, YFY, LSB, JY), pp. 706–709.
- ICPR-2010-JirachawengHLYA #modelling
- Residual Analysis for Fingerprint Orientation Modeling (SJ, ZH, JL, WYY, VA), pp. 1196–1199.
- ICPR-2010-KasiviswanathanBS #documentation #top-down
- Top Down Analysis of Line Structure in Handwritten Documents (HK, GRB, SNS), pp. 2025–2028.
- ICPR-2010-KhushabaEAAM #fuzzy #locality #orthogonal
- Orthogonal Locality Sensitive Fuzzy Discriminant Analysis in Sleep-Stage Scoring (RNK, RE, AA, AAA, SM), pp. 165–168.
- ICPR-2010-LiP10a #classification #monitoring #realtime
- Human State Classification and Predication for Critical Care Monitoring by Real-Time Bio-signal Analysis (XL, FP), pp. 2460–2463.
- ICPR-2010-LiZXCG #documentation #multi #sentiment
- Exploiting Combined Multi-level Model for Document Sentiment Analysis (SL, HZ, WX, GC, JG), pp. 4141–4144.
- ICPR-2010-MaalejADSB #3d #recognition
- Local 3D Shape Analysis for Facial Expression Recognition (AM, BBA, MD, AS, SB), pp. 4129–4132.
- ICPR-2010-MakiharaY #clustering
- Cluster-Pairwise Discriminant Analysis (YM, YY), pp. 577–580.
- ICPR-2010-MarcialisRT #detection
- Analysis of Fingerprint Pores for Vitality Detection (GLM, FR, AT), pp. 1289–1292.
- ICPR-2010-MaTW #random #using
- Nonlinear Blind Source Separation Using Slow Feature Analysis with Random Features (KM, QT, JW), pp. 830–833.
- ICPR-2010-Meunier #assurance #automation #documentation #logic #quality
- Automated Quality Assurance for Document Logical Analysis (JLM), pp. 253–256.
- ICPR-2010-OGorman #latency #speech
- Latency in Speech Feature Analysis for Telepresence Event Coding (LO), pp. 4464–4467.
- ICPR-2010-OReillyP #prototype #statistics
- Prototype-Based Methodology for the Statistical Analysis of Local Features in Stereotypical Handwriting Tasks (CO, RP), pp. 1864–1867.
- ICPR-2010-PaclikLLD #classification #optimisation
- ROC Analysis and Cost-Sensitive Optimization for Hierarchical Classifiers (PP, CL, TL, RPWD), pp. 2977–2980.
- ICPR-2010-PaivaJT #image #using
- Using Sequential Context for Image Analysis (ARCP, EJ, TT), pp. 2800–2803.
- ICPR-2010-PapadopoulosMKS #approach #image #learning #semantics #statistics
- A Statistical Learning Approach to Spatial Context Exploitation for Semantic Image Analysis (GTP, VM, IK, MGS), pp. 3138–3142.
- ICPR-2010-ParkY #approach #game studies #network #social
- Social Network Approach to Analysis of Soccer Game (KJP, AY), pp. 3935–3938.
- ICPR-2010-PetersenK #estimation #modelling #process #statistics
- Statistical Analysis of Kalman Filters by Conversion to Gauss-Helmert Models with Applications to Process Noise Estimation (AP, RK), pp. 2386–2389.
- ICPR-2010-PletschacherA #framework
- The PAGE (Page Analysis and Ground-Truth Elements) Format Framework (SP, AA), pp. 257–260.
- ICPR-2010-QiaoC #3d #component #modelling #statistics #using
- Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
- ICPR-2010-RahimBBP #sequence
- Pelvic Organs Dynamic Feature Analysis for MRI Sequence Discrimination (MR, MEB, RB, NP), pp. 2496–2499.
- ICPR-2010-RomeroTV #corpus #image
- Computer Assisted Transcription of Text Images: Results on the GERMANA Corpus and Analysis of Improvements Needed for Practical Use (VR, AHT, EV), pp. 2017–2020.
- ICPR-2010-SafayaniS #multi #recognition
- Heteroscedastic Multilinear Discriminant Analysis for Face Recognition (MS, MTMS), pp. 4287–4290.
- ICPR-2010-SagheerNHS #component #novel #word
- A Novel Handwritten Urdu Word Spotting Based on Connected Components Analysis (MWS, NN, CLH, CYS), pp. 2013–2016.
- ICPR-2010-SaidLF #2d #multi
- Multiscale Analysis of Digital Segments by Intersection of 2D Digital Lines (MS, JOL, FF), pp. 4097–4100.
- ICPR-2010-SakarK #canonical #correlation #feature model #hybrid
- A Hybrid Method for Feature Selection Based on Mutual Information and Canonical Correlation Analysis (COS, OK), pp. 4360–4363.
- ICPR-2010-ScandaliarisVS #comparative #detection #image #video
- Comparative Analysis for Detecting Objects Under Cast Shadows in Video Images (JS, MV, AS), pp. 4577–4580.
- ICPR-2010-SertelCLSG #approach #detection #image
- An Image Analysis Approach for Detecting Malignant Cells in Digitized H&E-stained Histology Images of Follicular Lymphoma (OS, ÜVÇ, GL, AS, MNG), pp. 273–276.
- ICPR-2010-SethiC #motivation #probability #process #video
- A Neurobiologically Motivated Stochastic Method for Analysis of Human Activities in Video (RJS, AKRC), pp. 281–285.
- ICPR-2010-SfikasHN #clustering #multi #using
- Multiple Atlas Inference and Population Analysis Using Spectral Clustering (GS, CH, CN), pp. 2500–2503.
- ICPR-2010-SmithW
- A Bias-Variance Analysis of Bootstrapped Class-Separability Weighting for Error-Correcting Output Code Ensembles (RSS, TW), pp. 61–64.
- ICPR-2010-SrikrishnanC #linear #using
- Crowd Motion Analysis Using Linear Cyclic Pursuit (VS, SC), pp. 3340–3343.
- ICPR-2010-TawariT #speech
- Speech Emotion Analysis in Noisy Real-World Environment (AT, MMT), pp. 4605–4608.
- ICPR-2010-TosunWSRM #component #image #independence
- Joint Independent Component Analysis of Brain Perfusion and Structural Magnetic Resonance Images in Dementia (DT, MW, NS, HJR, BLM), pp. 2720–2723.
- ICPR-2010-UchidaL #recognition
- Analysis of Local Features for Handwritten Character Recognition (SU, ML), pp. 1945–1948.
- ICPR-2010-VuYESHAY
- Color Analysis for Segmenting Digestive Organs in VCE (HV, YY, TE, MS, KH, TA, KY), pp. 2468–2471.
- ICPR-2010-WangHL #incremental
- Boosting Incremental Semi-supervised Discriminant Analysis for Tracking (HW, XH, CLL), pp. 2748–2751.
- ICPR-2010-WangWDTLG #interactive #video #web
- Interactive Web Video Advertising with Context Analysis and Search (BW, JW, LYD, QT, HL, WG), pp. 3252–3255.
- ICPR-2010-WeissFM #3d #image #multi
- Multiresolution Analysis of 3D Images Based on Discrete Distortion (KW, LDF, MMM), pp. 4093–4096.
- ICPR-2010-WilliamsTSB #multi #verification
- Body Motion Analysis for Multi-modal Identity Verification (GW, GWT, KS, CB), pp. 2198–2201.
- ICPR-2010-YangGG #locality #recognition
- Extended Locality Preserving Discriminant Analysis for Face Recognition (LY, WG, XG), pp. 539–542.
- ICPR-2010-YangSZ #multi #recognition #using
- Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
- ICPR-2010-ZhangGA #linear
- An Information Theoretic Linear Discriminant Analysis Method (HZ, CG, KKA), pp. 4182–4185.
- ICPR-2010-ZhangK #bound
- Weighted Boundary Points for Shape Analysis (JZ, RK), pp. 1598–1601.
- ICPR-2010-ZhangZ #canonical #correlation #image #using
- Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
- KDD-2010-DurrantK #classification #linear
- Compressed fisher linear discriminant analysis: classification of randomly projected data (RJD, AK), pp. 1119–1128.
- KDD-2010-MarchRG #algorithm #performance
- Fast euclidean minimum spanning tree: algorithm, analysis, and applications (WBM, PR, AGG), pp. 603–612.
- KDD-2010-WangLZ #approach #overview #rating
- Latent aspect rating analysis on review text data: a rating regression approach (HW, YL, CZ), pp. 783–792.
- KDIR-2010-AchaKV #data mining #mining #modelling
- Tactical Analysis Modeling through Data Mining — Pattern Discovery in Racket Sports (ATA, WAK, JKV), pp. 176–181.
- KDIR-2010-CarulloB #machine learning #mining #web
- Machine Learning and Link Analysis for Web Content Mining (MC, EB), pp. 156–161.
- KDIR-2010-Codina-FilbaN #behaviour #internet #query #web
- Collective Behaviour in Internet — Tendency Analysis of the Frequency of User Web Queries (JCF, DFN), pp. 168–175.
- KDIR-2010-OzekiKT #multi #network
- Multi-modal Analysis of Complex Network — Point Stimulus Response Depending on Its Location in the Network (TO, TK, YT), pp. 226–231.
- KEOD-2010-EynardMM #on the #ontology #using
- On the Use of Correspondence Analysis to Learn Seed Ontologies from Text (DE, FM, MM), pp. 430–437.
- KMIS-2010-BrockV #data flow #semantics #using
- A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
- KMIS-2010-Caballero-GilCM #clustering #information management #simulation #using
- Knowledge Management using Clusters in VANETs — Description, Simulation and Analysis (CCG, PCG, JMG), pp. 170–175.
- KMIS-2010-ScheibmayerIB #approach #framework #process
- A Framework to Measure the Impact of Knowledge Process Supporting Technologies — An Integrated Approach for a Technology-oriented Business Benefit Analysis (MS, AI, MB), pp. 253–259.
- KMIS-2010-WiilGM #information management #network
- CrimeFighter Assistant — A Knowledge Management Tool for Terrorist Network Analysis (UKW, JG, NM), pp. 15–24.
- RecSys-2010-BerkovskyF #recommendation
- Group-based recipe recommendations: analysis of data aggregation strategies (SB, JF), pp. 111–118.
- SEKE-2010-AlhassanCB #fault #network #people #social
- Do More People Make the Code More Defect Prone?: Social Network Analysis in OSS Projects (SA, BC, ABB), pp. 93–98.
- SEKE-2010-CunhaCNAM #debugging #visual notation
- A Visual Bug Report Analysis and Search Tool (CEAdC, YCC, PAdMSN, ESdA, SRdLM), pp. 742–747.
- SEKE-2010-El-Attar #case study #precise #robust #security
- Developing Precise Misuse Cases with Security Robustness Analysis (MEA), pp. 571–576.
- SEKE-2010-IbrahimWEF #development #off the shelf
- Conflict Analysis in Commercial Off-The-Shelf (COTS) Based Development (HI, TW, AE, BHF), pp. 686–691.
- SEKE-2010-LuG #architecture #concurrent #performance #thread #web
- Performance Analysis of a Web Server with Dynamic Thread Pool Architecture (JL, SSG), pp. 99–105.
- SEKE-2010-SarkarCCB #framework #object-oriented #requirements
- Business-Object Oriented Requirements Analysis Framework for Data Warehouses (AS, SC, NC, SB), pp. 34–37.
- SEKE-2010-ThovexT #approach #modelling #multi #network #semantics #social
- Dynamic and semantic social networks analysis: a new model based on a multidisciplinary approach (CT, FT), pp. 548–552.
- SEKE-2010-VilaMF #adaptation #qvt #strict #using
- Using QVT for adapting question analysis to restricted domain QA systems (KV, JNM, AF), pp. 335–338.
- SEKE-2010-WangHW #petri net #process
- A Hierarchical Timed Coloured Petri Nets for BPMN-based Process Analysis (CHW, PSH, FJW), pp. 417–420.
- SEKE-2010-WangPACC #automation #process
- An Automatic Failure Mode and Effect Analysis Technique for Processes Defined in the Little-JIL Process Definition Language (DW, JP, GSA, LAC, BC), pp. 765–770.
- SIGIR-2010-LiuWD #behaviour #comprehension #web
- Understanding web browsing behaviors through Weibull analysis of dwell time (CL, RWW, STD), pp. 379–386.
- SIGIR-2010-LiuYHA #adaptation #performance #predict #sentiment
- S-PLASA+: adaptive sentiment analysis with application to sales performance prediction (YL, XY, XH, AA), pp. 873–874.
- SIGIR-2010-LiZM #process
- Exploring desktop resources based on user activity analysis (YL, XZ, XM), p. 700.
- SIGIR-2010-MuhrKG #clustering
- Analysis of structural relationships for hierarchical cluster labeling (MM, RK, MG), pp. 178–185.
- SIGIR-2010-TorresHS #information retrieval #query
- Query log analysis in the context of information retrieval for children (SDT, DH, PS), pp. 847–848.
- SIGIR-2010-WangZ #effectiveness #information retrieval #metric #on the #optimisation #statistics
- On statistical analysis and optimization of information retrieval effectiveness metrics (JW, JZ), pp. 226–233.
- ECMFA-2010-ColomboKL #case study #modelling #problem #requirements
- Requirements Analysis and Modeling with Problem Frames and SysML: A Case Study (PC, FK, LL), pp. 74–89.
- MoDELS-v1-2010-SchwarzlP #consistency #modelling #uml
- Static- and Dynamic Consistency Analysis of UML State Chart Models (CS, BP), pp. 151–165.
- SPLC-2010-FurtadoSR #game studies #product line
- Streamlining Domain Analysis for Digital Games Product Lines (AWBF, ALMS, GLR), pp. 316–330.
- OOPSLA-2010-AltmanAFM #performance #source code
- Performance analysis of idle programs (ERA, MA, SF, NM), pp. 739–753.
- OOPSLA-2010-Mendez-LojoMP #parallel #points-to
- Parallel inclusion-based points-to analysis (MML, AM, KP), pp. 428–443.
- OOPSLA-2010-OssherBSAACDVFK #architecture #challenge #concept #flexibility #modelling #research #tool support
- Flexible modeling tools for pre-requirements analysis: conceptual architecture and research challenges (HO, RKEB, IS, DA, AAT, MC, MD, JdV, AF, SK), pp. 848–864.
- OOPSLA-2010-RinardHMS #comprehension #statistics
- Patterns and statistical analysis for understanding reduced resource computing (MCR, HH, SM, SS), pp. 806–821.
- LOPSTR-2010-SchumannCL #synthesis
- Analysis of Air Traffic Track Data with the AutoBayes Synthesis System (JS, KC, AL), pp. 21–36.
- LOPSTR-2010-StroderSG #dependence #logic programming #source code #termination
- Dependency Triples for Improving Termination Analysis of Logic Programs with Cut (TS, PSK, JG), pp. 184–199.
- LOPSTR-2010-VoetsS #logic programming #source code #using
- Non-termination Analysis of Logic Programs Using Types (DV, DDS), pp. 133–148.
- PEPM-2010-LakhotiaBSM #bytecode #obfuscation
- Context-sensitive analysis of obfuscated x86 executables (AL, DRB, AS, AM), pp. 131–140.
- PLDI-2010-BondBG #context-sensitive grammar #debugging #detection #named #performance
- Breadcrumbs: efficient context sensitivity for dynamic bug detection analyses (MDB, GZB, SZG), pp. 13–24.
- PLDI-2010-RichardsLBV #behaviour #javascript #source code
- An analysis of the dynamic behavior of JavaScript programs (GR, SL, BB, JV), pp. 1–12.
- POPL-2010-ChaudhuriGL #source code
- Continuity analysis of programs (SC, SG, RL), pp. 57–70.
- PPDP-2010-TekleL #complexity #datalog #performance #precise #query
- Precise complexity analysis for efficient datalog queries (KTT, YAL), pp. 35–44.
- QAPL-2010-GuedemannO #modelling #probability #safety
- Probabilistic Model-Based Safety Analysis (MG, FO), pp. 114–128.
- QAPL-2010-StefanekHB #parallel #performance
- A new tool for the performance analysis of massively parallel computer systems (AS, RAH, JTB), pp. 159–181.
- SAS-2010-AlbertAGPD #approach
- From Object Fields to Local Variables: A Practical Approach to Field-Sensitive Analysis (EA, PA, SG, GP, DVRD), pp. 100–116.
- SAS-2010-AmatoPS #abstract domain #component
- Deriving Numerical Abstract Domains via Principal Component Analysis (GA, MP, FS), pp. 134–150.
- SAS-2010-CheriniRB #data type
- A Shape Analysis for Non-linear Data Structures (RC, LR, JOB), pp. 201–217.
- SAS-2010-FarzanK #composition #concurrent #source code
- Compositional Bitvector Analysis for Concurrent Programs with Nested Locks (AF, ZK), pp. 253–270.
- SAS-2010-JensenMT #interprocedural #lazy evaluation
- Interprocedural Analysis with Lazy Propagation (SHJ, AM, PT), pp. 320–339.
- SAS-2010-NasreG #equation #linear #points-to
- Points-to Analysis as a System of Linear Equations (RN, RG), pp. 422–438.
- RE-2010-Al-EmranPR #release planning #robust
- Decision Support for Product Release Planning Based on Robustness Analysis (AAE, DP, GR), pp. 157–166.
- RE-2010-FrickerG #case study #comparison #requirements
- Comparison of Requirements Hand-off, Analysis, and Negotiation: Case Study (SF, MG), pp. 167–176.
- RE-2010-LockerbieBMBE #concept #modelling #simulation #using
- Using i* Modelling as a Bridge between Air Traffic Management Operational Concepts and Agent-based Simulation Analysis (JL, DB, NAMM, HAPB, MHCE), pp. 351–356.
- RE-2010-SieglHG #modelling #requirements #testing
- Model Based Requirements Analysis and Testing of Automotive Systems with Timed Usage Models (SS, KSJH, RG), pp. 345–350.
- RE-2010-SinhaPTN #automation #case study #natural language
- Extending Automated Analysis of Natural Language Use Cases to Other Languages (AS, AMP, HT, TN), pp. 364–369.
- RE-2010-Stanbridge #test coverage #testing #user interface #using
- Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
- RE-2010-YangRGWN #ambiguity #natural language #requirements
- Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements (HY, ANDR, VG, AW, BN), pp. 25–34.
- SAC-PL-J-2008-BussBSE10 #debugging #novel #pointer
- A novel analysis space for pointer analysis and its application for bug finding (MB, DB, VCS, SAE), pp. 921–942.
- ASE-2010-FattoriPMM
- Dynamic and transparent analysis of commodity production systems (AF, RP, LM, MM), pp. 417–426.
- ASE-2010-IvanovOSV #behaviour #embedded #modelling #set #tool support
- REMES tool-chain: a set of integrated tools for behavioral modeling and analysis of embedded systems (DI, MO, CCS, AV), pp. 361–362.
- ASE-2010-Letarte #graph #interprocedural #model checking #precise #representation
- Model checking graph representation of precise boolean inter-procedural flow analysis (DL), pp. 511–516.
- FSE-2010-CossetteW #adaptation #dependence #lightweight #named #sketching
- DSketch: lightweight, adaptable dependency analysis (BC, RJW), pp. 297–306.
- FSE-2010-HalleB #interactive #message passing #using
- Realizability analysis for message-based interactions using shared-state projections (SH, TB), pp. 27–36.
- FSE-2010-LiCK #detection #effectiveness
- Practical and effective symbolic analysis for buffer overflow detection (LL, CC, NK), pp. 317–326.
- FSE-2010-LitvakDBRS #dependence
- Field-sensitive program dependence analysis (SL, ND, RB, NR, MS), pp. 287–296.
- ICSE-2010-Bodden #hybrid #performance #type system
- Efficient hybrid typestate analysis by determining continuation-equivalent states (EB), pp. 5–14.
- ICSE-2010-CalikliBA #bias #developer #education #experience
- An analysis of the effects of company culture, education and experience on confirmation bias levels of software developers and testers (GÇ, ABB, BA), pp. 187–190.
- ICSE-2010-Erdogmus #effectiveness #re-engineering
- Cost effectiveness analysis in software engineering (HE), pp. 479–480.
- ICSE-2010-Ghezzi #named
- SOFAS: software analysis services (GG), pp. 381–384.
- ICSE-2010-HumayunBFLA #development #education #empirical #overview #quality
- An empirical analysis of team review approaches for teaching quality software development (AH, WB, GAF, FL, RA), pp. 567–575.
- ICSE-2010-LiebigALKS #product line #variability
- An analysis of the variability in forty preprocessor-based software product lines (JL, SA, CL, CK, MS), pp. 105–114.
- ICSE-2010-LimQF10a #crowdsourcing #named #network #power of #social
- StakeSource: harnessing the power of crowdsourcing and social networks in stakeholder analysis (SLL, DQ, AF), pp. 239–242.
- ICSE-2010-Ma #constraints #testing #theorem proving
- Constraint solving techniques for software testing and analysis (FM), pp. 417–420.
- ICSE-2010-Malik
- A methodology to support load test analysis (HM), pp. 421–424.
- ICSE-2010-Nagappan #execution
- Analysis of execution log files (MN), pp. 409–412.
- SAC-2010-BayerKK #performance
- Improving the efficiency of dynamic malware analysis (UB, EK, CK), pp. 1871–1878.
- SAC-2010-CappelliCGL #requirements #security
- Transparency versus security: early analysis of antagonistic requirements (CC, HdSC, BGB, JCSdPL), pp. 298–305.
- SAC-2010-ChakrabartiCGM #linear #privacy
- Privacy preserving linear discriminant analysis from perturbed data (SC, ZC, AG, SM), pp. 610–615.
- SAC-2010-ChokshiB #calculus #performance #realtime #revisited #using
- Performance analysis of FlexRay-based systems using real-time calculus, revisited (DBC, PB), pp. 351–356.
- SAC-2010-ClaycombS #framework #security
- A framework for risk analysis in virtual directory security (WC, DS), pp. 1881–1882.
- SAC-2010-DongD #probability
- Analysis of collision probability in unsaturated situation (QD, WD), pp. 772–777.
- SAC-2010-GravinoTS #comprehension #empirical #modelling #source code
- An empirical investigation on the relation between analysis models and source code comprehension (CG, GT, GS), pp. 2365–2366.
- SAC-2010-GuermaziHH #classification #image #using #web
- Classification of violent web images using context based analysis (RG, MH, ABH), pp. 1768–1773.
- SAC-2010-HansenS #implementation #optimisation #reachability
- Reachability analysis of GSPDIs: theory, optimization, and implementation (HAH, GS), pp. 2511–2516.
- SAC-2010-KhakpourKSJ #adaptation #formal method #self
- Formal analysis of policy-based self-adaptive systems (NK, RK, MS, SJ), pp. 2536–2543.
- SAC-2010-MalkowskiJHPKP #benchmark #database #empirical #metric #scalability #using
- Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload (SM, DJ, MH, JP, YK, CP), pp. 1680–1687.
- SAC-2010-MassinkHL #behaviour #scalability
- Scalable analysis of collective behaviour in smart service systems (MM, MDH, DL), pp. 1173–1180.
- SAC-2010-PopeeaC #debugging #proving #safety
- Dual analysis for proving safety and finding bugs (CP, WNC), pp. 2137–2143.
- SAC-2010-StoffelSKK #documentation #using #visual notation
- Enhancing document structure analysis using visual analytics (AS, DS, HK, DAK), pp. 8–12.
- SAC-2010-ZhangZ #canonical #correlation #random
- Canonical random correlation analysis (JZ, DZ), pp. 1111–1112.
- LDTA-2009-DennisJW10 #algorithm #automation #memory management #named
- SLAMM — Automating Memory Analysis for Numerical Algorithms (JMD, ERJ, WMW), pp. 89–104.
- GPCE-2010-SinceroTLS #performance #variability
- Efficient extraction and analysis of preprocessor-based variability (JS, RT, DL, WSP), pp. 33–42.
- LDTA-2010-CruzHP #named #online #verification
- GamaSlicer: an online laboratory for program verification and analysis (DCdC, PRH, JSP), p. 3.
- SLE-2010-FavreGLP #empirical
- Empirical Language Analysis in Software Linguistics (JMF, DG, RL, EP), pp. 316–326.
- SLE-2010-HerrmannsdoerferRK #identification #metamodelling
- Metamodel Usage Analysis for Identifying Metamodel Improvements (MH, DR, MK), pp. 62–81.
- ASPLOS-2010-GoodsteinVCGKM #adaptation #data flow #monitoring #parallel
- Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring (MLG, EV, SC, PBG, MAK, TCM), pp. 257–270.
- CASE-2010-AhnM #behaviour #clustering #modelling #tool support
- Analysis of circular cluster tools: Transient behavior and semiconductor equipment models (YA, JRM), pp. 39–44.
- CASE-2010-AshrafTANBT #array #delivery
- Structural and microfluidic analysis of MEMS based out-of-plane hollow silicon microneedle array for drug delivery (MWA, ST, NA, AN, ELB, AT), pp. 258–262.
- CASE-2010-CaiM #approach #hybrid #industrial #process
- Dwell-time approach to stability analysis for hybrid control systems: Application to an industrial refrigeration process (CC, SM), pp. 728–733.
- CASE-2010-ChenWZZF #performance #process #towards
- Towards performance analysis of wheel loading process in automotive manufacturing (HC, JW, BZ, GZ, TAF), pp. 234–239.
- CASE-2010-DhupatiKRR #detection #novel #speech #using #validation
- A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
- CASE-2010-GuoZW
- Directed motion of an atomic scale engine and stability analysis (YG, WZ, ZW), pp. 545–550.
- CASE-2010-HuSF #biology #using
- Dynamics analysis and closed-loop control of biological cells in transportation using robotic manipulation system with optical tweezers (SH, DS, GF), pp. 240–245.
- CASE-2010-IshiiONTOTM #image #using
- Cardiac motion analysis of a rat model for myocardial infarction using high-frame-rate stereo images (II, TO, YN, TT, KO, AT, HM), pp. 780–785.
- CASE-2010-LiH #framework #modelling #problem
- Modeling and analysis of hospital emergency department: An analytical framework and problem formulation (JL, PKH), pp. 897–902.
- CASE-2010-PintoKK #modelling #probability
- A model-based end-to-end toolchain for the probabilistic analysis of complex systems (AP, SK, SK), pp. 994–1000.
- CASE-2010-RodriguezBMRW #assembly #detection
- Failure detection in assembly: Force signature analysis (AR, DB, MTM, GFR, JW), pp. 210–215.
- CASE-2010-SouzaPC #distributed #implementation #network #predict
- Distributed model predictive control applied to urban traffic networks: Implementation, experimentation, and analysis (FAdS, VBP, EC), pp. 399–405.
- CASE-2010-TahersimaSRN
- Thermal analysis of an HVAC system with TRV controlled hydronic radiator (FT, JS, HR, PGN), pp. 756–761.
- CASE-2010-Zhang #design #exponential
- Kanban-controlled exponential production lines: Analysis and design (LZ), pp. 445–450.
- CASE-2010-ZhangWPTCPJ
- Micro-thermal-fluid transient analysis and active control for two-phase microelectronics cooling (TZ, JTW, YP, TT, JYC, RP, MKJ), pp. 750–755.
- CC-2010-JiangZTS #distance #locality #multi #question #reuse
- Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors? (YJ, EZZ, KT, XS), pp. 264–282.
- CC-2010-LogozzoV #abstract interpretation #agile #javascript #named #optimisation
- RATA: Rapid Atomic Type Analysis by Abstract Interpretation — Application to JavaScript Optimization (FL, HV), pp. 66–83.
- CGO-2010-LindermanHDMN #automation #optimisation #precise #towards
- Towards program optimization through automated analysis of numerical precision (MDL, MH, DLD, THYM, GPN), pp. 230–237.
- CGO-2010-PatilPSLC #framework #named #parallel #source code
- PinPlay: a framework for deterministic replay and reproducible analysis of parallel programs (HP, CP, MS, GL, JC), pp. 2–11.
- CGO-2010-PriceV #scalability
- Large program trace analysis and compression with ZDDs (GDP, MV), pp. 32–41.
- CGO-2010-YuXHFZ #pointer #scalability
- Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code (HY, JX, WH, XF, ZZ), pp. 218–229.
- DAC-2010-DadgourHSB #design #energy #logic #using
- Design and analysis of compact ultra energy-efficient logic gates using laterally-actuated double-electrode NEMS (HFD, MMH, CS, KB), pp. 893–896.
- DAC-2010-FengZ #grid #parallel #power management #robust
- Parallel multigrid preconditioning on graphics processing units (GPUs) for robust power grid analysis (ZF, ZZ), pp. 661–666.
- DAC-2010-FonsecaDBGPVB #reliability #simulation #statistics
- A statistical simulation method for reliability analysis of SRAM core-cells (RAF, LD, AB, PG, SP, AV, NB), pp. 853–856.
- DAC-2010-GaoYWY #correlation #estimation #performance #statistics
- Efficient tail estimation for massive correlated log-normal sums: with applications in statistical leakage analysis (MG, ZY, YW, ZY), pp. 475–480.
- DAC-2010-GlassLHT #reliability #scalability #towards
- Towards scalable system-level reliability analysis (MG, ML, CH, JT), pp. 234–239.
- DAC-2010-HorowitzJLLLM #equivalence #modelling
- Fortifying analog models with equivalence checking and coverage analysis (MH, MJ, FL, SL, BL, JM), pp. 425–430.
- DAC-2010-HsuLML #flexibility
- Static timing analysis for flexible TFT circuits (CHH, CL, EHM, JCML), pp. 799–802.
- DAC-2010-JuHRC #multi #source code
- Timing analysis of esterel programs on general-purpose multiprocessors (LJ, BKH, AR, SC), pp. 48–51.
- DAC-2010-LiuYT #algorithm #performance #robust #scalability
- A robust periodic arnoldi shooting algorithm for efficient analysis of large-scale RF/MM ICs (XL, HY, SXDT), pp. 573–578.
- DAC-2010-Miskov-ZivanovM #formal method #modelling #reasoning #reliability
- Formal modeling and reasoning for reliability analysis (NMZ, DM), pp. 531–536.
- DAC-2010-ObergHITSK #data flow
- Theoretical analysis of gate level information flow tracking (JO, WH, AI, MT, TS, RK), pp. 244–247.
- DAC-2010-SchranzhoferPCTC #manycore #modelling #resource management #worst-case
- Worst-case response time analysis of resource access models in multi-core systems (AS, RP, JJC, LT, MC), pp. 332–337.
- DAC-2010-ShenTX #algorithm #correlation #linear #power management #statistics
- A linear algorithm for full-chip statistical leakage power analysis considering weak spatial correlation (RS, SXDT, JX), pp. 481–486.
- DAC-2010-SilvaPS #modelling #parametricity
- Speedpath analysis under parametric timing models (LGeS, JRP, LMS), pp. 268–273.
- DAC-2010-TangZBM #simulation #statistics
- RDE-based transistor-level gate simulation for statistical static timing analysis (QT, AZ, MB, NvdM), pp. 787–792.
- DAC-2010-XieNXZLWYWL #fault
- Crosstalk noise and bit error rate analysis for optical network-on-chip (YX, MN, JX, WZ, QL, XW, YY, XW, WL), pp. 657–660.
- DAC-2010-YangALLP #3d #layout #optimisation
- TSV stress aware timing analysis with applications to 3D-IC layout optimization (JSY, KA, YJL, SKL, DZP), pp. 803–806.
- DAC-2010-YoonCPC #comparative #multi #network #physics
- Virtual channels vs. multiple physical networks: a comparative analysis (YJY, NC, MP, LPC), pp. 162–165.
- DAC-2010-ZengYFL #delivery #network #optimisation #power management #trade-off
- Tradeoff analysis and optimization of power delivery networks with on-chip voltage regulation (ZZ, XY, ZF, PL), pp. 831–836.
- DAC-2010-ZhangLH
- Separatrices in high-dimensional state space: system-theoretical tangent computation and application to SRAM dynamic stability analysis (YZ, PL, GMH), pp. 567–572.
- DAC-2010-ZuberDM #approach #statistics
- A holistic approach for statistical SRAM analysis (PZ, PD, MM), pp. 717–722.
- DATE-2010-BauerSF #network #worst-case
- Worst-case end-to-end delay analysis of an avionics AFDX network (HB, JLS, CF), pp. 1220–1224.
- DATE-2010-CastrillonVSSCLAM
- Trace-based KPN composability analysis for mapping simultaneous applications to MPSoC platforms (JC, RV, AS, WS, JC, RL, GA, HM), pp. 753–758.
- DATE-2010-ChanHBBC #named #network
- PhoenixSim: A simulator for physical-layer analysis of chip-scale photonic interconnection networks (JC, GH, AB, KB, LPC), pp. 691–696.
- DATE-2010-ChenDS #algorithm
- Properties of and improvements to time-domain dynamic thermal analysis algorithms (XC, RPD, LS), pp. 1165–1170.
- DATE-2010-DietrichEH #statistics #using
- Digital statistical analysis using VHDL (MD, UE, JH), pp. 1007–1010.
- DATE-2010-GuglielmoFP
- Vacuity analysis for property qualification by mutation of checkers (LDG, FF, GP), pp. 478–483.
- DATE-2010-HatamiP #component #library #performance #representation #robust #using
- Efficient representation, stratification, and compression of variational CSM library waveforms using Robust Principle Component Analysis (SH, MP), pp. 1285–1290.
- DATE-2010-JaffariA10a #correlation #performance #variability
- Correlation controlled sampling for efficient variability analysis of analog circuits (JJ, MA), pp. 1305–1308.
- DATE-2010-KanoriaMM #markov #monte carlo #statistics #using
- Statistical static timing analysis using Markov chain Monte Carlo (YK, SM, AM), pp. 813–818.
- DATE-2010-KlobedanzKT0 #case study #development #modelling
- Timing modeling and analysis for AUTOSAR-based software development — a case study (KK, CK, AT, WM), pp. 642–645.
- DATE-2010-LakshmananBR
- Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems (KL, GB, RR), pp. 331–334.
- DATE-2010-LarsenLNP #realtime #synthesis #using
- Scenario-based analysis and synthesis of real-time systems using uppaal (KGL, SL, BN, SP), pp. 447–452.
- DATE-2010-LiSBNO #implementation
- Power Variance Analysis breaks a masked ASIC implementation of AES (YL, KS, LB, DN, KO), pp. 1059–1064.
- DATE-2010-LomneDMTR #difference #preprocessor #statistics
- Differential Power Analysis enhancement with statistical preprocessing (VL, AD, PM, LT, MR), pp. 1301–1304.
- DATE-2010-LuckenbillLHMH #algorithm #fault #logic #named #reliability
- RALF: Reliability Analysis for Logic Faults — An exact algorithm and its applications (SBL, JYL, YH, RM, LH), pp. 783–788.
- DATE-2010-PellizzoniSCCT #manycore #memory management
- Worst case delay analysis for memory interference in multicore systems (RP, AS, JJC, MC, LT), pp. 741–746.
- DATE-2010-QaziTDSC #performance #reduction
- Loop flattening & spherical sampling: Highly efficient model reduction techniques for SRAM yield analysis (MQ, MT, LD, DS, AC), pp. 801–806.
- DATE-2010-RitheGWDGBC #logic #statistics
- Non-linear Operating Point Statistical Analysis for Local Variations in logic timing at low voltage (RR, JG, AW, SD, GG, DB, AC), pp. 965–968.
- DATE-2010-SchlieckerNE #bound #multi #performance
- Bounding the shared resource load for the performance analysis of multiprocessor systems (SS, MN, RE), pp. 759–764.
- DATE-2010-WieckowskiSBCIPA #black box
- A black box method for stability analysis of arbitrary SRAM cell structures (MW, DS, DB, VC, SI, CP, RCA), pp. 795–800.
- DATE-2010-ZuberMDZJ #statistics
- Statistical SRAM analysis for yield enhancement (PZ, MM, PD, KvdZ, JHJ), pp. 57–62.
- HPDC-2010-DunlavySS #modelling #named #scalability
- ParaText: scalable text modeling and analysis (DMD, TMS, ETS), pp. 344–347.
- HPDC-2010-SonmezYAIE #clustering #multi #performance #scheduling #workflow
- Performance analysis of dynamic workflow scheduling in multicluster grids (OOS, NY, SA, AI, DHJE), pp. 49–60.
- LCTES-2010-AltmeyerMR #bound
- Resilience analysis: tightening the CRPD bound for set-associative caches (SA, CM, JR), pp. 153–162.
- LCTES-2010-BiehlCT #development #embedded #modelling #safety
- Integrating safety analysis into the model-based development toolchain of automotive embedded systems (MB, DJC, MT), pp. 125–132.
- LCTES-2010-ForoozannejadHHG #streaming
- Look into details: the benefits of fine-grain streaming buffer analysis (MHF, MH, TLH, SG), pp. 27–36.
- LCTES-2010-LiXLZ #approximate #architecture #memory management
- Analysis and approximation for bank selection instruction minimization on partitioned memory architecture (ML, CJX, TL, YZ), pp. 1–8.
- LCTES-2010-PerathonerRTLR #modelling #performance
- Modeling structured event streams in system level performance analysis (SP, TR, LT, KL, JR), pp. 37–46.
- LCTES-2010-SchlicklingP #automation #modelling
- Semi-automatic derivation of timing models for WCET analysis (MS, MP), pp. 67–76.
- OSDI-2010-AttariyanF #automation #data flow #information management
- Automating Configuration Troubleshooting with Dynamic Information Flow Analysis (MA, JF), pp. 237–250.
- OSDI-2010-Boyd-WickizerCMPKMZ #linux #scalability
- An Analysis of Linux Scalability to Many Cores (SBW, ATC, YM, AP, MFK, RM, NZ), pp. 1–16.
- PDP-2010-CuencaGGQ #compilation #manycore #performance
- Analysis of the Influence of the Compiler on Multicore Performance (JC, LPG, DG, MQ), pp. 170–174.
- PDP-2010-LeoAGZ #clustering #data transformation #throughput #using
- Using Virtual Clusters to Decouple Computation and Data Management in High Throughput Analysis Applications (SL, PA, MG, GZ), pp. 411–415.
- PPoPP-2010-Chakrabarti #abstraction #effectiveness #performance #source code
- New abstractions for effective performance analysis of STM programs (DRC), pp. 333–334.
- PPoPP-2010-RomeinBMN #implementation #performance
- The LOFAR correlator: implementation and performance analysis (JWR, PCB, JDM, RvN), pp. 169–178.
- ESOP-2010-Atkey #logic
- Amortised Resource Analysis with Separation Logic (RA), pp. 85–103.
- ESOP-2010-HoffmannH #polynomial
- Amortized Resource Analysis with Polynomial Potential (JH, MH), pp. 287–306.
- ESOP-2010-VardoulakisS #approach #control flow #named
- CFA2: A Context-Free Approach to Control-Flow Analysis (DV, OS), pp. 570–589.
- FASE-2010-BerardinelliCM #mobile #modelling #performance
- Performance Modeling and Analysis of Context-Aware Mobile Software Systems (LB, VC, ADM), pp. 353–367.
- FASE-2010-BeyerHTZ #refinement
- Shape Refinement through Explicit Heap Analysis (DB, TAH, GT, DZ), pp. 263–277.
- FASE-2010-EhrigERBP #formal method #self #verification
- Formal Analysis and Verification of Self-Healing Systems (HE, CE, OR, AB, PP), pp. 139–153.
- FoSSaCS-2010-HeussnerLMS #automaton #communication #reachability
- Reachability Analysis of Communicating Pushdown Systems (AH, JL, AM, GS), pp. 267–281.
- FoSSaCS-2010-WiesZH #bound #process
- Forward Analysis of Depth-Bounded Processes (TW, DZ, TAH), pp. 94–108.
- STOC-2010-KawamuraC #complexity
- Complexity theory for operators in analysis (AK, SAC), pp. 495–502.
- TACAS-2010-Aderhold #automation #higher-order #recursion #source code #termination
- Automated Termination Analysis for Programs with Second-Order Recursion (MA), pp. 221–235.
- TACAS-2010-DonaldsonKR #automation #manycore #memory management
- Automatic Analysis of Scratch-Pad Memory Code for Heterogeneous Multicore Processors (AFD, DK, PR), pp. 280–295.
- TACAS-2010-WangLGG
- Trace-Based Symbolic Analysis for Atomicity Violations (CW, RL, MKG, AG), pp. 328–342.
- TACAS-2010-YuAB #named #php #string
- Stranger: An Automata-Based String Analysis Tool for PHP (FY, MA, TB), pp. 154–157.
- WRLA-2010-KatelmanKM #concurrent #semantics
- Concurrent Rewriting Semantics and Analysis of Asynchronous Digital Circuits (MK, SK, JM), pp. 140–156.
- CAV-2010-AlbarghouthiGWC #symbolic computation
- Abstract Analysis of Symbolic Executions (AA, AG, OW, MC), pp. 495–510.
- CAV-2010-BloemCGHKRSS #named #requirements #synthesis
- RATSY — A New Requirements Analysis Tool with Synthesis (RB, AC, KG, GH, RK, MR, VS, RS), pp. 425–429.
- CAV-2010-KroeningSTW #composition #invariant #termination
- Termination Analysis with Compositional Transition Invariants (DK, NS, AT, CMW), pp. 89–103.
- CAV-2010-KunduGW #concurrent #named #testing
- Contessa: Concurrency Testing Augmented with Symbolic Analysis (SK, MKG, CW), pp. 127–131.
- CAV-2010-LiXBL #automaton #hardware #performance #reachability
- Efficient Reachability Analysis of Büchi Pushdown Systems for Hardware/Software Co-verification (JL, FX, TB, VL), pp. 339–353.
- ICLP-2010-Zwirchmayr10
- Cutting-Edge Timing Analysis Techniques (JZ), pp. 303–305.
- ICLP-J-2010-Schneider-KampGSST #automation #logic programming #source code #termination
- Automated termination analysis for logic programs with cut (PSK, JG, TS, AS, RT), pp. 365–381.
- ICST-2010-KimSGSHN #automation #debugging #identification
- Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes (MK, SS, CG, HS, MJH, MGN), pp. 383–392.
- ICST-2010-SeguraHBR #approach #automation #feature model #generative #modelling #testing
- Automated Test Data Generation on the Analyses of Feature Models: A Metamorphic Testing Approach (SS, RMH, DB, ARC), pp. 35–44.
- IJCAR-2010-ChevalCD #automation #constraints #equivalence #security
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems (VC, HCL, SD), pp. 412–426.
- ISSTA-2010-ArcuriIB #effectiveness #formal method #predict #random testing #testing
- Formal analysis of the effectiveness and predictability of random testing (AA, MZZI, LCB), pp. 219–230.
- ISSTA-2010-BaoZLZX #data flow #dependence #information management #strict
- Strict control dependence and its effect on dynamic information flow analyses (TB, YZ, ZL, XZ, DX), pp. 13–24.
- ISSTA-2010-GaleottiRPF #bound #invariant #performance #verification
- Analysis of invariants for efficient bounded verification (JPG, NR, CLP, MFF), pp. 25–36.
- ISSTA-2010-Jiang #automation #testing
- Automated analysis of load testing results (ZMJ), pp. 143–146.
- ISSTA-2010-TangBLS #float #statistics
- Perturbing numerical calculations for statistical analysis of floating-point program (in)stability (ET, ETB, XL, ZS), pp. 131–142.
- TAP-2010-Blanchette #algebra #data type #induction #recursion #relational
- Relational Analysis of (Co)inductive Predicates, (Co)algebraic Datatypes, and (Co)recursive Functions (JCB), pp. 117–134.
- TAP-2010-BousquetL #evaluation #mutation testing #process #proving
- Proof Process Evaluation with Mutation Analysis (LdB, ML), pp. 55–60.
- VMCAI-2010-Esparza #probability #process
- Analysis of Systems with Stochastic Process Creation (JE), p. 1.
- VMCAI-2010-KreikerSV #c #low level
- Shape Analysis of Low-Level C with Overlapping Structures (JK, HS, VV), pp. 214–230.
- VMCAI-2010-MarronMSK #set
- Shape Analysis with Reference Set Relations (MM, RM, DS, DK), pp. 247–262.
- VMCAI-2010-Might #pointer
- Shape Analysis in the Absence of Pointers and Structure (MM), pp. 263–278.
- VMCAI-2010-PerrelleH #array #permutation
- An Analysis of Permutations in Arrays (VP, NH), pp. 279–294.
- VMCAI-2010-WilhelmABGHRWW #realtime
- Static Timing Analysis for Hard Real-Time Systems (RW, SA, CB, DG, JH, JR, BW, SW), pp. 3–22.
- DocEng-2009-BarcenasGL #constraints #on the #query
- On the analysis of queries with counting constraints (EB, PG, NL), pp. 21–24.
- DocEng-2009-GeorgHCPI #documentation
- From rhetorical structures to document structure: shallow pragmatic analysis for document engineering (GG, HH, MC, HP, MI), pp. 185–192.
- DocEng-2009-Hassan #documentation
- Object-level document analysis of PDF files (TH), pp. 47–55.
- DocEng-2009-JoshiL #documentation #image #natural language #using #web
- Web document text and images extraction using DOM analysis and natural language processing (PMJ, SL), pp. 218–221.
- DRR-2009-Ding #documentation #image #recognition #research #topic
- Advanced topics in character recognition and document analysis: Research works in Intelligent Image & Document Research Lab, Tsinghua University (XD), pp. 1–10.
- DRR-2009-TaghvaC #bound #documentation #using
- Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
- DRR-2009-YouAADT #retrieval
- Figure content analysis for improved biomedical article retrieval (DY, EA, SA, DDF, GRT), pp. 1–10.
- HT-2009-RosenC #network #social
- Social network analysis in virtual environments (DR, MC), pp. 317–322.
- HT-2009-ToppanoR #design #hypermedia
- Semiotic design and analysis of hypermedia (ET, VR), pp. 367–368.
- HT-2009-WangC #web
- Use noisy link analysis to improve web search (YW, JC), pp. 377–378.
- ICDAR-2009-AntonacopoulosBPP #dataset #documentation #evaluation #layout #performance
- A Realistic Dataset for Performance Evaluation of Document Layout Analysis (AA, DB, CP, SP), pp. 296–300.
- ICDAR-2009-ChaudhuryJTSSM #image #pipes and filters
- Google Newspaper Search — Image Processing and Analysis Pipeline (KC, AJ, ST, VS, SS, SM), pp. 621–625.
- ICDAR-2009-CollFL #documentation
- Graphological Analysis of Handwritten Text Documents for Human Resources Recruitment (RC, AF, JL), pp. 1081–1085.
- ICDAR-2009-FerilliBEB #layout
- A Distance-Based Technique for Non-Manhattan Layout Analysis (SF, MB, FE, TMAB), pp. 231–235.
- ICDAR-2009-Franke #forensics #reliability
- Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations (KF), pp. 1310–1314.
- ICDAR-2009-GaoTLTC #clustering #documentation
- Analysis of Book Documents’ Table of Content Based on Clustering (LG, ZT, XL, XT, YC), pp. 911–915.
- ICDAR-2009-HeLS #linear #metric #novel #recognition
- A Novel Rejection Measurement in Handwritten Numeral Recognition Based on Linear Discriminant Analysis (CLH, LL, CYS), pp. 451–455.
- ICDAR-2009-HendersonL #image
- Raster Map Image Analysis (TCH, TL), pp. 376–380.
- ICDAR-2009-HuangDJG #adaptation #incremental #linear #online #recognition #using
- Writer Adaptive Online Handwriting Recognition Using Incremental Linear Discriminant Analysis (ZH, KD, LJ, XG), pp. 91–95.
- ICDAR-2009-IbrahimKKAG #dependence #online #using #verification
- On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
- ICDAR-2009-IndermuhleLB #documentation
- Combining Alignment Results for Historical Handwritten Document Analysis (EI, ML, HB), pp. 1186–1190.
- ICDAR-2009-Long #architecture
- An RDF-Based Blackboard Architecture for Improving Table Analysis (VL), pp. 916–920.
- ICDAR-2009-LoprestiZHT #documentation
- Document Analysis Support for the Manual Auditing of Elections (DPL, XZ, XH, GT), pp. 733–737.
- ICDAR-2009-MalleronEEDR #documentation #layout
- Text Lines and Snippets Extraction for 19th Century Handwriting Documents Layout Analysis (VM, VE, HE, SDC, PR), pp. 1001–1005.
- ICDAR-2009-SchullerSRK #estimation #online #overview #quote
- “The Godfather” vs. “Chaos”: Comparing Linguistic Analysis Based on On-line Knowledge Sources and Bags-of-N-Grams for Movie Review Valence Estimation (BWS, JS, GR, TK), pp. 858–862.
- ICDAR-2009-SchulzEGAAD
- Seizing the Treasure: Transferring Knowledge in Invoice Analysis (FS, ME, MG, BA, SA, AD), pp. 848–852.
- ICDAR-2009-Silva #documentation #learning #markov #modelling
- Learning Rich Hidden Markov Models in Document Analysis: Table Location (ACeS), pp. 843–847.
- ICDAR-2009-Smith #detection #hybrid #layout
- Hybrid Page Layout Analysis via Tab-Stop Detection (RWS), pp. 241–245.
- JCDL-2009-GaleasKF #assessment #documentation #fourier #using
- Document relevance assessment via term distribution analysis using fourier series expansion (PG, RK, BF), pp. 277–284.
- JCDL-2009-JatowtKOT #web
- Supporting analysis of future-related information in news archives and the web (AJ, KK, SO, KT), pp. 115–124.
- JCDL-2009-WuTTW #enterprise
- Cost and benefit analysis of mediated enterprise search (MW, JAT, AT, RW), pp. 267–276.
- SIGMOD-2009-ChenKM #multi
- Exploiting context analysis for combining multiple entity resolution systems (ZC, DVK, SM), pp. 207–218.
- SIGMOD-2009-SunLDC #detection #workflow
- Detecting and resolving unsound workflow views for correct provenance analysis (PS, ZL, SBD, YC), pp. 549–562.
- VLDB-2009-BenediktC #independence #xml
- Schema-Based Independence Analysis for XML Updates (MB, JC), pp. 61–72.
- VLDB-2009-CohenDDHW #big data
- MAD Skills: New Analysis Practices for Big Data (JC, BD, MD, JMH, CW), pp. 1481–1492.
- VLDB-2009-DaiGBBL #interactive #named
- TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (CD, GG, EB, JWB, NL), pp. 1618–1621.
- VLDB-2009-SchnaitterPG #design #interactive #modelling #physics
- Index Interactions in Physical Design Tuning: Modeling, Analysis, and Applications (KS, NP, LG), pp. 1234–1245.
- VLDB-2009-SunLNDC #detection #named #workflow
- WOLVES: Achieving Correct Provenance Analysis by Detecting and Resolving Unsound Workflow Views (PS, ZL, SN, SBD, YC), pp. 1614–1617.
- VLDB-2009-WuXMH #multi
- Promotion Analysis in Multi-Dimensional Space (TW, DX, QM, JH), pp. 109–120.
- EDM-2009-PavlikCK #automation #domain model #learning #modelling #using
- Learning Factors Transfer Analysis: Using Learning Curve Analysis to Automatically Generate Domain Models (PIPJ, HC, KRK), pp. 121–130.
- ITiCSE-2009-BlasGMB #automation #composition #using
- Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
- ITiCSE-2009-Mirolo #modelling #problem #recursion
- Mental models of recursive computations vs. recursive analysis in the problem domain (CM), p. 397.
- ITiCSE-2009-RosslingK09a #performance
- A system for integral efficiency analysis of sustainable technologies (GR, YK), p. 395.
- CSMR-2009-BurenR #architecture #maintenance #using
- Architectural Maintenance Using a Data Warehouse System for Availability Analysis (GB, CR), pp. 307–308.
- CSMR-2009-EkstedtFJLSUB #architecture #enterprise #maintenance
- A Tool for Enterprise Architecture Analysis of Maintainability (ME, UF, PJ, RL, TS, JU, MB), pp. 327–328.
- CSMR-2009-Laitila #comprehension #named
- SymAnalyzer: A Symbolic Analysis Tool for Program Comprehension (EL), pp. 325–326.
- CSMR-2009-NagyM #fault #security
- Static Security Analysis Based on Input-Related Software Faults (CN, SM), pp. 37–46.
- ICPC-2009-FigueiredoSSGWN #design
- Crosscutting patterns and design stability: An exploratory analysis (EF, BCdS, CS, AFG, JW, DJN), pp. 138–147.
- ICPC-2009-ForwardLB #comprehension
- Improving program comprehension by enhancing program constructs: An analysis of the Umple language (AF, TCL, DB), pp. 311–312.
- ICPC-2009-GrantC
- Vector space analysis of software clones (SG, JRC), pp. 233–237.
- ICPC-2009-PopescuGM #dependence #precise
- Enabling more precise dependency analysis in event-based systems (DP, JG, NM), pp. 305–306.
- ICSM-2009-HindleGH #developer #topic #what
- What’s hot and what’s not: Windowed developer topic analysis (AH, MWG, RCH), pp. 339–348.
- ICSM-2009-JiangHHF #automation #performance #testing
- Automated performance analysis of load tests (ZMJ, AEH, GH, PF), pp. 125–134.
- ICSM-2009-Li #dependence #identification #using
- Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
- ICSM-2009-LiGMMMGC #component #fault #multi #pervasive #scalability
- Analysis of pervasive multiple-component defects in a large software system (ZL, MG, SSM, NHM, AVM, DG, EC), pp. 265–273.
- ICSM-2009-LuciaOT #empirical #traceability
- The role of the coverage analysis during IR-based traceability recovery: A controlled experiment (ADL, RO, GT), pp. 371–380.
- ICSM-2009-Roy #detection
- Detection and analysis of near-miss software clones (CKR), pp. 447–450.
- ICSM-2009-VasaLBN #comparative #evolution #using
- Comparative analysis of evolving software systems using the Gini coefficient (RV, ML, PB, ON), pp. 179–188.
- ICSM-2009-WenzelKKK #3d #evolution #visualisation
- Evolution analysis with animated and 3D-visualizations (SW, JK, UK, AK), pp. 475–478.
- MSR-2009-EnslenHPV #automation #identifier #mining #source code
- Mining source code to automatically split identifiers for software analysis (EE, EH, LLP, KVS), pp. 71–80.
- SCAM-2009-CanetCM #c #source code
- A Value Analysis for C Programs (GC, PC, BM), pp. 123–124.
- SCAM-2009-GutzmannKLL #points-to #towards
- Towards Comparing and Combining Points-to Analyses (TG, AK, JL, WL), pp. 45–54.
- SCAM-2009-KlintSV #domain-specific language #named #rascal #source code
- RASCAL: A Domain Specific Language for Source Code Analysis and Manipulation (PK, TvdS, JJV), pp. 168–177.
- SCAM-2009-QianZX #lazy evaluation
- Improving Side-Effect Analysis with Lazy Access Path Resolving (JQ, YZ, BX), pp. 35–44.
- WCRE-1999-BernardiL99a #identification #named #object-oriented
- ConAn: A Tool for the Identification of Crosscutting Concerns in Object Oriented Systems Based on Type Hierarchy Analysis (MLB, GADL), pp. 319–320.
- WCRE-1999-CapobiancoLOPP99a #traceability #using
- Traceability Recovery Using Numerical Analysis (GC, ADL, RO, AP, SP), pp. 195–204.
- WCRE-1999-Khomh99a #comprehension #design #named #quality
- SQUAD: Software Quality Understanding through the Analysis of Design (FK), pp. 303–306.
- CIAA-J-2008-DixonES09
- Analysis of Bit-Split Languages for Packet Scanning and Experiments with Wildcard Matching (RD, ÖE, TS), pp. 597–612.
- ICALP-v1-2009-BecchettiK #streaming
- Competitive Analysis of Aggregate Max in Windowed Streaming (LB, EK), pp. 156–170.
- ICALP-v2-2009-FinkelG
- Forward Analysis for WSTS, Part II: Complete WSTS (AF, JGL), pp. 188–199.
- ICALP-v2-2009-FriedrichSV #network
- Smoothed Analysis of Balancing Networks (TF, TS, DV), pp. 472–483.
- ICALP-v2-2009-Mosk-AoyamaR #performance #worst-case
- Worst-Case Efficiency Analysis of Queueing Disciplines (DMA, TR), pp. 546–557.
- FM-2009-AlbertAGP
- Field-Sensitive Value Analysis by Field-Insensitive Analysis (EA, PA, SG, GP), pp. 370–386.
- FM-2009-HeidarianSV #network #protocol
- Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks (FH, JS, FWV), pp. 516–531.
- FM-2009-JostLHSH #bound #using
- “Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
- FM-2009-SeidlVV #alias #linear #polynomial
- A Smooth Combination of Linear and Herbrand Equalities for Polynomial Time Must-Alias Analysis (HS, VV, VV), pp. 644–659.
- FM-2009-WangKGG #concurrent #predict #source code
- Symbolic Predictive Analysis for Concurrent Programs (CW, SK, MKG, AG), pp. 256–272.
- IFM-2009-HasanAT #array #configuration management #fault #memory management #probability
- Formal Probabilistic Analysis of Stuck-at Faults in Reconfigurable Memory Arrays (OH, NA, ST), pp. 277–291.
- RTA-2009-TiuG #proving
- A Proof Theoretic Analysis of Intruder Theories (AT, RG), pp. 103–117.
- SEFM-2009-LienO #formal method #modelling #multi #protocol
- Formal Modeling and Analysis of an IETF Multicast Protocol (EL, PCÖ), pp. 273–282.
- SEFM-2009-NgocO #fault #model checking
- Overflow and Roundoff Error Analysis via Model Checking (DTBN, MO), pp. 105–114.
- SEFM-2009-TruongTN #coordination #multi #using
- Coordinated Consensus Analysis of Multi-agent Systems Using Event-B (NTT, TBT, VHN), pp. 201–209.
- SFM-2009-AalstMSW #formal method #interactive
- Service Interaction: Patterns, Formalization, and Analysis (WMPvdA, AJM, CS, KW), pp. 42–88.
- SFM-2009-ClarkGT #using #web #web service
- Quantitative Analysis of Web Services Using SRMC (AC, SG, MT), pp. 296–339.
- ICFP-2009-MidtgaardJ #abstract interpretation #control flow
- Control-flow analysis of function calls and returns by abstract interpretation (JM, TPJ), pp. 287–298.
- CIG-2009-JaskowskiK #algorithm #coordination #formal method #game studies
- Formal analysis and algorithms for extracting coordinate systems of games (WJ, KK), pp. 201–208.
- DiGRA-2009-Carr #game studies
- Textual Analysis, Digital Games, Zombies (DC).
- DiGRA-2009-Conway #game studies
- “It's in the game” and above the game: An analysis of the players of sports videogames [Abstract] (SC).
- DiGRA-2009-Kuts #overview #user interface
- Playful User Interfaces: Literature Review and Model for Analysis (EK).
- DiGRA-2009-LandwehrDC #relational #word
- The Words of Warcraft: relational text analysis of quests in an MMORPG (PML, JD, KMC).
- DiGRA-2009-Linares
- Discovering Super Mario Galaxy: A Textual Analysis (KL).
- FDG-2009-NelsonM #design #game studies #requirements #tool support
- A requirements analysis for videogame design support tools (MJN, MM), pp. 137–144.
- CHI-2009-AlexanderCFGG #design #evaluation
- Revisiting read wear: analysis, design, and evaluation of a footprints scrollbar (JA, AC, SF, CG, SG), pp. 1665–1674.
- CHI-2009-BartneckH
- Scientometric analysis of the CHI proceedings (CB, JH), pp. 699–708.
- CHI-2009-DiakopoulosGE #named #online #quality #video
- Videolyzer: quality analysis of online informational video for bloggers and journalists (ND, SG, IAE), pp. 799–808.
- DHM-2009-DemirelD #feedback
- Impact of Force Feedback on Computer Aided Ergonomic Analyses (HOD, VGD), pp. 608–613.
- DHM-2009-DzaackU #modelling #multi #performance #safety
- Multilevel Analysis of Human Performance Models in Safety-Critical Systems (JD, LU), pp. 375–383.
- DHM-2009-Godil
- Facial Shape Analysis and Sizing System (AG), pp. 29–35.
- HCD-2009-CaratozzoloMPZ
- Caring and Curing by Mixing Information and Emotions in Orphan Diseases Websites: A Twofold Analysis (MCC, EM, OP, MZ), pp. 661–670.
- HCD-2009-JarrettQRAS #development #metric #testing #usability #using #web
- Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
- HCD-2009-KohNTTWH #why
- Why Taking Medicine Is a Chore — An Analysis of Routine and Contextual Factors in the Home (WKK, JN, OYT, ZT, AHYW, MGH), pp. 452–461.
- HCD-2009-KurosuH #behaviour #communication #development #research
- Culture and Communication Behavior: A Research Based on the Artifact Development Analysis (MK, AH), pp. 468–475.
- HCD-2009-LinO #information management
- The Method of User’s Requirement Analysis by Participation of the User: Constructing an Information System for Travelers (CYL, MO), pp. 862–868.
- HCD-2009-LokmanHNN #difference #evaluation
- Website Affective Evaluation: Analysis of Differences in Evaluations Result by Data Population (AML, AFH, NLMN, MN), pp. 643–652.
- HCD-2009-NakanoR #corpus #multimodal #usability
- Multimodal Corpus Analysis as a Method for Ensuring Cultural Usability of Embodied Conversational Agents (YIN, MR), pp. 521–530.
- HCD-2009-NieminenKRM #fine-grained #testing #towards #usability
- Towards Fine-Grained Usability Testing: New Methodological Directions with Conversation Analysis (MN, SK, SR, PM), pp. 879–887.
- HCD-2009-Stephane #behaviour #predict #simulation
- User Behavior Patterns: Gathering, Analysis, Simulation and Prediction (LS), pp. 322–331.
- HCD-2009-WadaY
- The Proposal of Quantitative Analysis Method Based on the Method of Observation Engineering (TW, TY), pp. 342–350.
- HCI-AUII-2009-Cloud-BucknerSSYG #gender
- Expression of Personality through Avatars: Analysis of Effects of Gender and Race on Perceptions of Personality (JCB, MS, BS, BY, JJG), pp. 248–256.
- HCI-AUII-2009-ImamuraOK #behaviour #modelling #ubiquitous
- Modeling Personal Preferences on Commodities by Behavior Log Analysis with Ubiquitous Sensing (NI, AO, TK), pp. 294–303.
- HCI-NIMT-2009-GastBRRWMR #gesture #human-computer #interactive
- Did I Get It Right: Head Gestures Analysis for Human-Machine Interactions (JG, AB, TR, GR, FW, CM, BR), pp. 170–177.
- HCI-NIMT-2009-MatsumotoUYM #interactive #ubiquitous #video
- Life with a Robot Companion: Video Analysis of 16-Days of Interaction with a Home Robot in a “Ubiquitous Home” Environment (NM, HU, TY, HM), pp. 341–350.
- HCI-NT-2009-Goschnick #design #interactive #programming
- People-Oriented Programming: From Agent-Oriented Analysis to the Design of Interactive Systems (SG), pp. 836–845.
- HCI-NT-2009-HoriguchiNSK #interactive
- Analysis of Breakdowns in Menu-Based Interaction Based on Information Scent Model (YH, HN, TS, YK), pp. 438–445.
- HCI-NT-2009-LangeWB #automation #evaluation #information management
- Automated Analysis of Eye-Tracking Data for the Evaluation of Driver Information Systems According to ISO/TS 15007-2: 2001 (CL, MW, HB), pp. 105–110.
- HCI-NT-2009-MatsudaUOM #eye tracking #multi
- An Analysis of Eye Movements during Browsing Multiple Search Results Pages (YM, HU, MO, KiM), pp. 121–130.
- HCI-VAD-2009-EssabbahOHM #approach #design #interactive
- A New Approach to Design an Interactive System for Molecular Analysis (ME, SO, JH, MM), pp. 713–722.
- HCI-VAD-2009-ParkHC #3d #experience #web
- The Experience of Presence in 3D Web Environment: An Analysis of Korean Second Life (SP, HSH, MC), pp. 387–395.
- HCI-VAD-2009-Yarlikas #automation
- A New Automatic Teller Machine (ATM) Proposal through the Analysis of ATMs of Three Banks (SY), pp. 641–650.
- HIMI-DIE-2009-BrangierDE #integration #library
- The 7 Basic Functions of a Digital Library — Analysis of Focus Groups about the Usefulness of a Thematic Digital Library on the History of European Integration (EB, JD, LE), pp. 345–354.
- HIMI-DIE-2009-HendersonS #documentation #empirical
- An Empirical Analysis of Personal Digital Document Structures (SH, AS), pp. 394–403.
- HIMI-DIE-2009-HorvathLK #approach #data mining #mining #usability
- Usability Analyses of CRM Systems in Call Centers: The Data Mining Approach (ÁH, LL, AK), pp. 40–48.
- HIMI-DIE-2009-KumeS #using #web
- Construction of the Data Save System of the Cusp Surface Analysis Using Web Application (YK, JSS), pp. 665–674.
- HIMI-DIE-2009-OcenasekS #metric #process #workflow
- A Model for Measurement and Analysis of the Workflow Processes (PO, MS), pp. 149–153.
- HIMI-DIE-2009-UgaiA #network #social #tool support
- Organization Diagnosis Tools Based on Social Network Analysis (TU, KA), pp. 181–189.
- HIMI-II-2009-FurukawaO
- A Proposal of Collection and Analysis System of Near Miss Incident in Nursing Duties (AF, YO), pp. 497–502.
- HIMI-II-2009-FurutaSKAKT #collaboration #communication
- Analysis of Team Communication and Collaboration in En-Route Air Traffic Control (KF, YS, TK, HA, DK, MT), pp. 758–765.
- HIMI-II-2009-KimuraONOT
- Analysis on Descriptions of Dosage Regimens in Package Inserts of Medicines (MK, KO, KN, MO, FT), pp. 539–548.
- HIMI-II-2009-NozawaK #comparison #realtime #reduction
- A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data (TN, TK), pp. 413–422.
- HIMI-II-2009-SagaTT #mining #named
- Loopo: Integrated Text Miner for FACT-Graph-Based Trend Analysis (RS, HT, KT), pp. 192–200.
- HIMI-II-2009-SpinilloPL #safety
- Patient Safety: Contributions from a Task Analysis Study on Medicine Usage by Brazilians (CS, SP, CL), pp. 604–608.
- IDGD-2009-MarcusK #network #social
- Cross-Cultural Analysis of Social Network Services in Japan, Korea, and the USA (AM, NK), pp. 59–68.
- OCSC-2009-AoyagiFISSYS #collaboration
- A Discussion System for Knowledge Sharing and Collaborative Analysis of Incidents in Nuclear Power Plants (SA, HF, HI, HS, HS, HY, TS), pp. 3–12.
- OCSC-2009-PetersonS #network #social
- Analysis of Information Disclosure on a Social Networking Site (KP, KAS), pp. 256–264.
- OCSC-2009-TaylorT #game studies #multi #online
- A Content Analysis of Interviews with Players of Massively Multiplayer Online Role-Play Games (MMORPGs): Motivating Factors and the Impact on Relationships (JT, JT), pp. 613–621.
- OCSC-2009-ZhaoYGL #modelling #topic
- Propagation Modeling and Analysis of Incidental Topics in Blogosphere (LZ, RY, XG, ML), pp. 401–410.
- VISSOFT-2009-HassaineDSP #generative #maintenance #visualisation
- Generating visualization-based analysis scenarios from maintenance task descriptions (SH, KD, HAS, PP), pp. 41–44.
- CAiSE-2009-EspanaGP #communication #information management #requirements
- Communication Analysis: A Requirements Engineering Method for Information Systems (SE, AG, OP), pp. 530–545.
- CAiSE-2009-GuermoucheG #web #web service
- Asynchronous Timed Web Service-Aware Choreography Analysis (NG, CG), pp. 364–378.
- CAiSE-2009-KaiyaTSSK #quality #requirements #using
- Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map (HK, MT, SS, TS, KK), pp. 546–560.
- CAiSE-2009-LiuLYWH #constraints #using #verification #workflow
- ETL Workflow Analysis and Verification Using Backwards Constraint Propagation (JL, SL, DY, JW, TH), pp. 455–469.
- EDOC-2009-NarmanJECK #architecture #enterprise
- Enterprise Architecture Analysis for Data Accuracy Assessments (PN, PJ, ME, MC, JK), pp. 24–33.
- ICEIS-AIDSS-2009-AlbusacCLVL #detection
- Intelligent Surveillance for Trajectory Analysis — Detecting Anomalous Situations in Monitored Environments (JA, JJCS, LJL, DV, LMLL), pp. 102–107.
- ICEIS-DISI-2009-GustienePH #design #framework #integration #semantics #using
- Semantic Framework for Information Integration — Using Service-oriented Analysis and Design (PG, IP, HH), pp. 64–69.
- ICEIS-DISI-2009-PoelmansR #evaluation #workflow
- Assessing Workflow Management Systems — A Quantitative Analysis of a Worfklow Evaluation Model (SP, HAR), pp. 183–189.
- ICEIS-ISAS-2009-BifflFHM #automation #evaluation #open source #process #tool support
- Evaluation of Case Tool Methods and Processes — An Analysis of Eight Open-source CASE Tools (SB, CF, CH, TM), pp. 41–48.
- ICEIS-ISAS-2009-GruhnK #mobile #modelling #process
- Modelling, Analysis and Improvement of Mobile Business Processes with the MPL Method (VG, AK), pp. 89–94.
- ICEIS-ISAS-2009-LauITR #modelling #process
- Discovery and Analysis of Activity Pattern Co-occurrences in Business Process Models (JML, CI, LHT, MR), pp. 83–88.
- ICEIS-ISAS-2009-LeiteG #multi #process #requirements
- A Process for Multi-agent Domain and Application Engineering — The Domain Analysis and Application Requirements Engineering Phases (AL, RG), pp. 156–161.
- ICEIS-ISAS-2009-OussenaB #implementation #modelling #process #using
- Layered Process Models — Analysis and Implementation (using MDA Principles) (SO, BSB), pp. 168–175.
- ICEIS-ISAS-2009-SunyaevKMK #health #security
- Security Analysis of the German Electronic Health Card’s Peripheral Parts (AS, AK, CM, HK), pp. 19–26.
- ICEIS-J-2009-ChangS #classification #performance
- Fast Unsupervised Classification for Handwritten Stroke Analysis (WDC, JS), pp. 918–927.
- ICEIS-J-2009-FritzscheML #concept #data mining #design #industrial #interactive #mining #quality
- Interactive Quality Analysis in the Automotive Industry: Concept and Design of an Interactive, Web-Based Data Mining Application (SF, MM, CL), pp. 402–414.
- ICEIS-J-2009-MartinoBBF #multi #tool support
- Integrating Google Earth within OLAP Tools for Multidimensional Exploration and Analysis of Spatial Data (SDM, SB, MB, FF), pp. 940–951.
- ICEIS-J-2009-MohebiS #ambiguity #clustering #detection #hybrid #network #using
- An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
- ICEIS-J-2009-NunesKNLC #approach #multi #product line
- A Domain Analysis Approach for Multi-agent Systems Product Lines (IN, UK, CN, CJPdL, EC), pp. 716–727.
- ICEIS-J-2009-SpahnW #development #information management #problem
- End-User Development for Individualized Information Management: Analysis of Problem Domains and Solution Approaches (MS, VW), pp. 843–857.
- ICEIS-J-2009-YamamotoIVCB #framework
- Actor Relationship Analysis for the i* Framework (SY, KI, JMV, KC, SJB), pp. 491–500.
- ICEIS-SAIC-2009-DronavajjalaNS #enterprise #identification #process #project management #relational
- Identification of Critical Success Factors to ERP Project Management — An Application of Grey Relational Analysis and Analytic Hierarchy Process (CSD, SN, RS), pp. 187–192.
- ICEIS-SAIC-2009-PetersA #on the #platform #trust
- On the Helpfulness of Product Reviews — An Analysis of Customer-to-Customer Trust on eShop-Platforms (GP, VA), pp. 41–46.
- CIKM-2009-ChenR #detection
- Event detection from flickr data through wavelet-based spatial analysis (LC, AR), pp. 523–532.
- CIKM-2009-JiaYM #effectiveness #retrieval #sentiment
- The effect of negation on sentiment analysis and retrieval effectiveness (LJ, CTY, WM), pp. 1827–1830.
- CIKM-2009-KobayakawaKTOKT #classification #kernel #using
- Opinion classification with tree kernel SVM using linguistic modality analysis (TSK, TK, HT, NO, JDK, JT), pp. 1791–1794.
- CIKM-2009-LiBS #predict
- Blog cascade affinity: analysis and prediction (HL, SSB, AS), pp. 1117–1126.
- CIKM-2009-LinH #sentiment #topic
- Joint sentiment/topic model for sentiment analysis (CL, YH), pp. 375–384.
- CIKM-2009-LiuZPQCL #interactive #summary #topic #visual notation
- Interactive, topic-based visual text summarization and analysis (SL, MXZ, SP, WQ, WC, XL), pp. 543–552.
- CIKM-2009-LiuZY #collaboration #probability
- Probabilistic latent preference analysis for collaborative filtering (NNL, MZ, QY), pp. 759–766.
- CIKM-2009-MasadaFTHSO #optimisation #topic
- Dynamic hyperparameter optimization for bayesian topical trend analysis (TM, DF, AT, TH, YS, KO), pp. 1831–1834.
- CIKM-2009-MeiKKT #framework #sequence
- An analysis framework for search sequences (QM, KLK, RK, AT), pp. 1991–1994.
- CIKM-2009-MohammedFD
- Walking in the crowd: anonymizing trajectory data for pattern analysis (NM, BCMF, MD), pp. 1441–1444.
- CIKM-2009-ParkR #information retrieval #kernel #semantics #using
- Kernel latent semantic analysis using an information retrieval based kernel (LAFP, KR), pp. 1721–1724.
- CIKM-2009-SayeedSDHMR #documentation #metric #similarity
- Characteristics of document similarity measures for compliance analysis (ABS, SS, YD, RH, RM, NR), pp. 1207–1216.
- CIKM-2009-Wan #multi #summary #topic
- Topic analysis for topic-focused multi-document summarization (XW), pp. 1609–1612.
- CIKM-2009-ZhuM #identification #multi
- Multidimensional political spectrum identification and analysis (LZ, PM), pp. 2045–2048.
- ECIR-2009-TanCWX #adaptation #naive bayes #sentiment
- Adapting Naive Bayes to Domain Adaptation for Sentiment Analysis (ST, XC, YW, HX), pp. 337–349.
- ECIR-2009-Wang #documentation #information retrieval #ranking
- Mean-Variance Analysis: A New Document Ranking Theory in Information Retrieval (JW0), pp. 4–16.
- ICML-2009-BaillyDR #component #grammar inference #problem
- Grammatical inference as a principal component analysis problem (RB, FD, LR), pp. 33–40.
- ICML-2009-ChaudhuriKLS #canonical #clustering #correlation #multi
- Multi-view clustering via canonical correlation analysis (KC, SMK, KL, KS), pp. 129–136.
- ICML-2009-ChoS #learning #modelling
- Learning dictionaries of stable autoregressive models for audio scene analysis (YC, LKS), pp. 169–176.
- ICML-2009-LanLML #algorithm #ranking
- Generalization analysis of listwise learning-to-rank algorithms (YL, TYL, ZM, HL), pp. 577–584.
- ICML-2009-PaisleyC #parametricity #process
- Nonparametric factor analysis with beta process priors (JWP, LC), pp. 777–784.
- ICML-2009-Sutskever
- A simpler unified analysis of budget perceptrons (IS), pp. 985–992.
- KDD-2009-AsurP #approach #graph #interactive
- A viewpoint-based approach for interaction graph analysis (SA, SP), pp. 79–88.
- KDD-2009-ChuPBMPCZ #behaviour #case study #exclamation
- A case study of behavior-driven conjoint analysis on Yahoo!: front page today module (WC, STP, TB, NM, AP, SC, JZ), pp. 1097–1104.
- KDD-2009-HasanSGA #named #novel
- COA: finding novel patents through text analysis (MAH, WSS, TDG, AA), pp. 1175–1184.
- KDD-2009-MelvilleGL #classification #sentiment
- Sentiment analysis of blogs by combining lexical knowledge with text classification (PM, WG, RDL), pp. 1275–1284.
- KDD-2009-PandeyASMK #approach #clustering
- An association analysis approach to biclustering (GP, GA, MS, CLM, VK), pp. 677–686.
- KDD-2009-ScrippsTE #network #preprocessor
- Measuring the effects of preprocessing decisions and network forces in dynamic network analysis (JS, PNT, AHE), pp. 747–756.
- KDD-2009-TangSWY #network #scalability #social
- Social influence analysis in large-scale networks (JT, JS, CW, ZY), pp. 807–816.
- KEOD-2009-DolsakN #design #process
- Intelligent Analytical Aids in Design — Decision Support to Engineering Analysis Process (BD, MN), pp. 129–134.
- KMIS-2009-Bolisani #modelling #transaction
- Modelling Cognitive Transactions for Economic and Accounting Analysis (EB), pp. 242–247.
- KMIS-2009-BounhasS #approach #documentation #social
- A Social Approach for Document Analysis (IB, YS), pp. 95–102.
- KMIS-2009-BuchnerMN #concept #enterprise #open source #tool support
- A Concept and Service based Analysis of Commercial and Open Source Enterprise 2.0 Tools (TB, FM, CN), pp. 37–45.
- KMIS-2009-Kume #using #visual notation #web
- Application of Cusp Surface Analysis using Web Application to Visual Perception (YK), pp. 251–257.
- KMIS-2009-RadeschutzM #optimisation #process
- Extended Analysis Techniques for a Comprehensive Business Process Optimization (SR, BM), pp. 77–82.
- MLDM-2009-DereliogluGO #approach
- A Neural Approach for SME’s Credit Risk Analysis in Turkey (GD, FSG, NO), pp. 749–759.
- MLDM-2009-DuangsoithongW #classification
- Relevance and Redundancy Analysis for Ensemble Classifiers (RD, TW), pp. 206–220.
- RecSys-2009-CremonesiT #recommendation
- Analysis of cold-start recommendations in IPTV systems (PC, RT), pp. 233–236.
- RecSys-2009-TsatsouMKD #framework #personalisation #recommendation #semantics
- A semantic framework for personalized ad recommendation based on advanced textual analysis (DT, FM, IK, PCD), pp. 217–220.
- SEKE-2009-AtkinsonD #modelling #re-engineering #social
- Analysis of Agent Oriented Software Engineering Methodologies for Social Causal Models (MA, SD), pp. 157–163.
- SEKE-2009-ConejeroHJCR #composition #product line
- Early Analysis of Modularity in Software Product Lines (JMC, JH, EJ, PJC, RR), pp. 721–736.
- SEKE-2009-GarlanCSBC #architecture #using
- Using Service-oriented Architectures for Socio-Cultural Analysis (DG, KMC, BRS, MWB, OC), pp. 370–375.
- SEKE-2009-IlievaO #design #object-oriented #representation
- Nested NL Representation for OO Analysis and Design (MI, OO), pp. 49–54.
- SEKE-2009-JiCXZ #clustering #novel
- A Novel Method of Mutation Clustering Based on Domain Analysis (CJ, ZC, BX, ZZ), pp. 422–425.
- SEKE-2009-KocaguneliTBTC #fault #metric #named #predict
- Prest: An Intelligent Software Metrics Extraction, Analysis and Defect Prediction Tool (EK, AT, ABB, BT, BC), pp. 637–642.
- SEKE-2009-LiuC #composition #data flow #testing #web #web service
- Data Flow Analysis and Testing for Web Service Compositions Based on WS-BPEL (CHL, SLC), pp. 306–311.
- SEKE-2009-LudwigTA #concept #database #deduction #performance #reasoning #semantics #web
- Performance Analysis of a Deductive Database with a Semantic Web Reasoning Engine: ConceptBase and Racer (SAL, CT, KA), pp. 688–693.
- SIGIR-2009-AlonsoM #e-commerce
- Relevance criteria for e-commerce: a crowdsourcing-based experimental analysis (OA, SM), pp. 760–761.
- SIGIR-2009-AshkanC
- Term-based commercial intent analysis (AA, CLAC), pp. 800–801.
- SIGIR-2009-Azzopardi #effectiveness #empirical #evaluation #query
- Query side evaluation: an empirical analysis of effectiveness and effort (LA), pp. 556–563.
- SIGIR-2009-Peng #equivalence #probability #semantics
- Equivalence between nonnegative tensor factorization and tensorial probabilistic latent semantic analysis (WP), pp. 668–669.
- SIGIR-2009-SakaiN #query #wiki
- Serendipitous search via wikipedia: a query log analysis (TS, KN), pp. 780–781.
- SIGIR-2009-SakumaK #graph
- Link analysis for private weighted graphs (JS, SK), pp. 235–242.
- SIGIR-2009-TomsF #behaviour #predict
- Predicting stopping behaviour: a preliminary analysis (EGT, LF), pp. 750–751.
- ECMDA-FA-2009-AmeedeenBA #approach #modelling
- A Model Driven Approach to the Analysis of Timeliness Properties (MAA, BB, RA), pp. 221–236.
- ECMDA-FA-2009-KoudriCAS #design #process
- MoPCoM/MARTE Process Applied to a Cognitive Radio System Design and Analysis (AK, JC, DA, PS), pp. 277–288.
- MoDELS-2009-LloydJ #authentication #ml #security #using
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- MoDELS-2009-ShoushaBL #concurrent #detection #uml
- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
- MoDELS-2009-YueBL #approach #case study #concept #empirical #evaluation #modelling #towards
- A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
- SPLC-2009-KastnerARRBS #case study #on the #problem
- On the impact of the optional feature problem: analysis and case studies (CK, SA, SSuR, MR, DSB, GS), pp. 181–190.
- SPLC-2009-MendoncaWC #feature model #modelling #satisfiability
- SAT-based analysis of feature models is easy (MM, AW, KC), pp. 231–240.
- MoDELS-2009-LloydJ #authentication #ml #security #using
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- MoDELS-2009-ShoushaBL #concurrent #detection #uml
- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
- MoDELS-2009-YueBL #approach #case study #concept #empirical #evaluation #modelling #towards
- A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
- ECOOP-2009-XuRS #alias #points-to #scalability #using
- Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis (G(X, AR, MS), pp. 98–122.
- OOPSLA-2009-Abi-AntounA #architecture #consistency #runtime #using
- Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations (MAA, JA), pp. 321–340.
- OOPSLA-2009-BravenboerS #declarative #points-to #specification #strict
- Strictly declarative specification of sophisticated points-to analyses (MB, YS), pp. 243–262.
- AdaEurope-2009-BurnsWZ #ada #implementation #scheduling
- Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005 (AB, AJW, FZ), pp. 119–133.
- AdaEurope-2009-LasnierZPH #automation #code generation #modelling
- Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications (GL, BZ, LP, JH), pp. 237–250.
- AdaEurope-2009-MarrefB #worst-case
- Predicated Worst-Case Execution-Time Analysis (AM, GB), pp. 134–148.
- PADL-2009-MaldeO #haskell #scalability #sequence #using
- Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell (KM, BO), pp. 183–194.
- PEPM-2009-FradeSU #bidirectional #data flow
- Bidirectional data-flow analyses, type-systematically (MJF, AS, TU), pp. 141–150.
- PLDI-2009-GulwaniJK #bound #control flow #invariant #refinement
- Control-flow refinement and progress invariants for bound analysis (SG, SJ, EK), pp. 375–385.
- PLDI-2009-HoffmanEJ #semantics
- Semantics-aware trace analysis (KJH, PE, SJ), pp. 453–464.
- PLDI-2009-Rubio-GonzalezGLAA #fault #file system
- Error propagation analysis for file systems (CRG, HSG, BL, RHAD, ACAD), pp. 270–280.
- PLDI-2009-TallentMF #metric #performance
- Binary analysis for measurement and attribution of program performance (NRT, JMMC, MWF), pp. 441–452.
- PLDI-2009-TrippPFSW #effectiveness #named #web
- TAJ: effective taint analysis of web applications (OT, MP, SJF, MS, OW), pp. 87–97.
- POPL-2009-CalcagnoDOY #composition
- Compositional shape analysis by means of bi-abduction (CC, DD, PWO, HY), pp. 289–300.
- POPL-2009-HardekopfL #pointer
- Semi-sparse flow-sensitive pointer analysis (BH, CL), pp. 226–238.
- PPDP-2009-PhanJ #source code
- Path-sensitive region analysis for mercury programs (QP, GJ), pp. 161–170.
- SAS-2009-GulavaniCRN #bottom-up
- Bottom-Up Shape Analysis (BSG, SC, GR, AVN), pp. 188–204.
- SAS-2009-JensenMT #javascript
- Type Analysis for JavaScript (SHJ, AM, PT), pp. 238–255.
- SAS-2009-SeidlV #concurrent #detection
- Region Analysis for Race Detection (HS, VV), pp. 171–187.
- SAS-2009-Simon #optimisation #pointer #similarity #using
- Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
- SAS-2009-SridharanF #complexity
- The Complexity of Andersen’s Analysis in Practice (MS, SJF), pp. 205–221.
- SIGAda-2009-Gluch #embedded #modelling
- Embedded systems engineering with the AADL: modeling & analysis (DPG), pp. 7–8.
- RE-2009-ClassenHH #feature model #workflow
- Analysis of Feature Configuration Workflows (AC, AH, PH), pp. 381–382.
- RE-2009-ElahiY #requirements #security #trade-off #trust
- Trust Trade-off Analysis for Security Requirements Engineering (GE, ESKY), pp. 243–248.
- RE-2009-GhanavatiAP #evaluation
- Compliance Analysis Based on a Goal-oriented Requirement Language Evaluation Methodology (SG, DA, LP), pp. 133–142.
- RE-2009-JuretaMF #multi #requirements #validation
- Analysis of Multi-Party Agreement in Requirements Validation (IJ, JM, SF), pp. 57–66.
- RE-2009-MussbacherGA #modelling
- Modeling and Analysis of URN Goals and Scenarios with jUCMNav (GM, SG, DA), pp. 383–384.
- ASE-2009-Balagtas-FernandezH #framework #mobile #usability
- A Methodology and Framework to Simplify Usability Analysis of Mobile Applications (FTBF, HH), pp. 520–524.
- ASE-2009-DeshmukhES #concurrent #library
- Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients (JVD, EAE, SS), pp. 480–491.
- ASE-2009-GonzalezCD #automation #implementation #workflow
- Automating the Implementation of Analysis Concerns in Workflow Applications (OG, RC, DD), pp. 585–589.
- ASE-2009-SaekiHK #requirements
- A Tool for Attributed Goal-Oriented Requirements Analysis (MS, SH, HK), pp. 674–676.
- ASE-2009-WongC #dependence #logic #modelling #performance
- Improving the Efficiency of Dependency Analysis in Logical Decision Models (SW, YC), pp. 173–184.
- ASE-2009-YuAB #generative #source code #string #using
- Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
- ESEC-FSE-2009-ArbabMMKQ #coordination #modelling #named #performance
- Reo2MC: a tool chain for performance analysis of coordination models (FA, SM, YJM, MZK, HQ), pp. 287–288.
- ESEC-FSE-2009-BeltRD #lightweight #optimisation #symbolic computation
- Sireum/Topi LDP: a lightweight semi-decision procedure for optimizing symbolic execution-based analyses (JB, R, XD), pp. 355–364.
- ESEC-FSE-2009-CataldoN #empirical #maturity #on the #process #quality
- On the relationship between process maturity and geographic distribution: an empirical analysis of their impact on software quality (MC, SN), pp. 101–110.
- ESEC-FSE-2009-PaveseBU #behaviour #modelling #probability
- Probabilistic environments in the quantitative analysis of (non-probabilistic) behaviour models (EP, VAB, SU), pp. 335–344.
- ICSE-2009-CalinescuK #using
- Using quantitative analysis to implement autonomic IT systems (RC, MZK), pp. 100–110.
- ICSE-2009-ComanSS #automation #case study #industrial #metric #re-engineering #using
- A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment (IDC, AS, GS), pp. 89–99.
- ICSE-2009-DagenaisR #api #evolution #named #recommendation
- SemDiff: Analysis and recommendation support for API evolution (BD, MPR), pp. 599–602.
- ICSE-2009-GeayPTRD #composition #precise #string
- Modular string-sensitive permission analysis with demand-driven precision (EG, MP, TT, BGR, JD), pp. 177–187.
- ICSE-2009-MarianiPP #automation #tool support
- A toolset for automated failure analysis (LM, FP, MP), pp. 563–566.
- ICSE-2009-NandaS #interprocedural #java
- Accurate Interprocedural Null-Dereference Analysis for Java (MGN, SS), pp. 133–143.
- ICSE-2009-RamasubbuB #empirical #maturity #process
- The impact of process choice in high maturity environments: An empirical analysis (NR, RKB), pp. 529–539.
- ICSE-2009-SentillesPNNPC #component #design #embedded #implementation #named
- Save-IDE — A tool for design, analysis and implementation of component-based embedded systems (SS, AP, DN, TN, PP, IC), pp. 607–610.
- ICSE-2009-WlokaRTR #development
- Safe-commit analysis to facilitate team software development (JW, BGR, FT, XR), pp. 507–517.
- ICSE-2009-WolfSDN #communication #developer #network #predict #social #using
- Predicting build failures using social network analysis on developer communication (TW, AS, DD, THDN), pp. 1–11.
- SAC-2009-FahmyRJ #distributed #realtime #transaction
- Response time analysis of software transactional memory-based distributed real-time systems (SFF, BR, EDJ), pp. 334–338.
- SAC-2009-GohKCC #performance #scalability #video
- Fast mode decision for scalable video coding based on neighboring macroblock analysis (GG, JK, MC, KC), pp. 1845–1846.
- SAC-2009-HijikataHON #algorithm #using
- HITS algorithm improvement using anchor-related text extracted by DOM structure analysis (YH, BQH, MO, SN), pp. 1691–1698.
- SAC-2009-JangC #javascript #points-to
- Points-to analysis for JavaScript (DJ, KMC), pp. 1930–1937.
- SAC-2009-OliveiraLG #development #framework #usability
- Development of a biosignals framework for usability analysis (IO, RL, NG), pp. 156–157.
- SAC-2009-PassitoMM #network #protocol #using
- Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
- SAC-2009-PopovaS #constraints #modelling
- Constraint-based modelling and analysis of organisations (VP, AS), pp. 283–284.
- SAC-2009-SmileyHKD #architecture #evaluation #requirements
- Architectural requirements prioritization and analysis applied to software technology evaluation (KS, QH, EK, AD), pp. 397–398.
- LDTA-2008-Nilsson-NymanHME09 #declarative #java #source code
- Declarative Intraprocedural Flow Analysis of Java Source Code (ENN, GH, EM, TE), pp. 155–171.
- GPCE-2009-WillcockLQ #reuse
- Reusable, generic program analyses and transformations (JW, AL, DJQ), pp. 5–14.
- ASPLOS-2009-AleenC #commutative #parallel #program transformation
- Commutativity analysis for software parallelization: letting program transformations see the big picture (FA, NC), pp. 241–252.
- CASE-2009-DotoliFMSU #petri net
- The impact of ICT on an Intermodal Transportation System: an analysis by Petri Nets (MD, MPF, AMM, GS, WU), pp. 513–518.
- CASE-2009-HeraguCKM #network #retrieval
- Analysis of autonomous vehicle storage and retrieval system by open queueing network (SSH, XC, AK, CJM), pp. 455–459.
- CASE-2009-KumarWKSS #fuzzy #predict #using #variability
- A fuzzy filtering based system for maximal oxygen uptake prediction using heart rate variability analysis (MK, MW, SK, NS, RS), pp. 604–608.
- CASE-2009-LiZF
- Analysis of two-loop closed production systems (NL, LZ, WF), pp. 460–465.
- CASE-2009-RamakrishnanR #linear
- Delay-dependent stability analysis of linear system with additive time-varying delays (KR, GR), pp. 122–126.
- CC-2009-VasudevanTDE #concurrent #source code
- Compile-Time Analysis and Specialization of Clocks in Concurrent Programs (NV, OT, JD, SAE), pp. 48–62.
- CGO-2009-CordesFM #abstract interpretation #modelling #performance #precise #slicing
- A Fast and Precise Static Loop Analysis Based on Abstract Interpretation, Program Slicing and Polytope Models (PL, DC, HF, PM), pp. 136–146.
- CGO-2009-PereiraB #pointer
- Wave Propagation and Deep Propagation for Pointer Analysis (FMQP, DB), pp. 126–135.
- DAC-2009-AyalaAB #data flow
- Thermal-aware data flow analysis (JLA, DA, PB), pp. 613–614.
- DAC-2009-CallegariWB #ranking
- Speedpath analysis based on hypothesis pruning and ranking (NC, LCW, PB), pp. 346–351.
- DAC-2009-GlassLTBC #architecture #design #encoding #hybrid #network
- Designing heterogeneous ECU networks via compact architecture encoding and hybrid timing analysis (MG, ML, JT, UDB, SC), pp. 43–46.
- DAC-2009-JuHCR #source code
- Context-sensitive timing analysis of Esterel programs (LJ, BKH, SC, AR), pp. 870–873.
- DAC-2009-KamhiNTW #architecture #named #statistics #transaction
- MAGENTA: transaction-based statistical micro-architectural root-cause analysis (GK, AN, AT, AW), pp. 639–643.
- DAC-2009-KimRH #probability
- Stochastic steady-state and AC analyses of mixed-signal systems (JK, JR, MAH), pp. 376–381.
- DAC-2009-LinB #process
- Analysis and mitigation of process variation impacts on Power-Attack Tolerance (LL, WPB), pp. 238–243.
- DAC-2009-LingVFA #effectiveness
- A moment-based effective characterization waveform for static timing analysis (DDL, CV, PF, SA), pp. 19–24.
- DAC-2009-LuSZZYZ #process #reliability #statistics
- Statistical reliability analysis under process variation and aging effects (YL, LS, HZ, HZ, FY, XZ), pp. 514–519.
- DAC-2009-MutluLMC #approach #parametricity
- A parametric approach for handling local variation effects in timing analysis (AAM, JL, RM, MC), pp. 126–129.
- DAC-2009-ShiCHMTHW #gpu #grid #network #performance #power management
- GPU friendly fast Poisson solver for structured power grid network analysis (JS, YC, WH, LM, SXDT, PHH, XW), pp. 178–183.
- DAC-2009-TakahashiYT #statistics
- A Gaussian mixture model for statistical timing analysis (ST, YY, ST), pp. 110–115.
- DAC-2009-VeetilSBSR #dependence #performance
- Efficient smart sampling based full-chip leakage analysis for intra-die variation considering state dependence (VV, DS, DB, SS, SR), pp. 154–159.
- DAC-2009-WalravensVD #modelling #named #performance
- ActivaSC: a highly efficient and non-intrusive extension for activity-based analysis of SystemC models (CW, YV, WD), pp. 172–177.
- DAC-2009-WangYLP #parametricity
- SRAM parametric failure analysis (JW, SY, XL, LTP), pp. 496–501.
- DAC-2009-YeLCC #layout #process #variability
- Variability analysis under layout pattern-dependent rapid-thermal annealing process (YY, FL, MC, YC), pp. 551–556.
- DATE-2009-BartoliniRB #quality #scalability #visual notation
- Visual quality analysis for dynamic backlight scaling in LCD systems (AB, MR, LB), pp. 1428–1433.
- DATE-2009-BellasiFS #modelling #multi #power management #predict
- Predictive models for multimedia applications power consumption based on use-case and OS level analysis (PB, WF, DS), pp. 1446–1451.
- DATE-2009-ChakrabortyGRP #optimisation
- Analysis and optimization of NBTI induced clock skew in gated clock trees (AC, GG, AR, DZP), pp. 296–299.
- DATE-2009-GargM #3d #process #variability
- System-level process variability analysis and mitigation for 3D MPSoCs (SG, DM), pp. 604–609.
- DATE-2009-HolcombLS #design #fault
- Design as you see FIT: System-level soft error analysis of sequential circuits (DEH, WL, SAS), pp. 785–790.
- DATE-2009-IzosimovPPEP #embedded #fault tolerance #optimisation
- Analysis and optimization of fault-tolerant embedded systems with hardened processors (VI, IP, PP, PE, ZP), pp. 682–687.
- DATE-2009-KuhneGD #comprehension #design
- Property analysis and design understanding (UK, DG, RD), pp. 1246–1249.
- DATE-2009-LiCSSS #on the #statistics
- On hierarchical statistical static timing analysis (BL, NC, MS, WS, US), pp. 1320–1325.
- DATE-2009-NegreanSE #multi
- Response-time analysis of arbitrarily activated tasks in multiprocessor systems with shared resources (MN, SS, RE), pp. 524–529.
- DATE-2009-RistauLAF #parallel
- Dimensioning heterogeneous MPSoCs via parallelism analysis (BR, TL, OA, GF), pp. 554–557.
- DATE-2009-SreedharK #on the
- On linewidth-based yield analysis for nanometer lithography (AS, SK), pp. 381–386.
- DATE-2009-TannirK #using
- Computation of IP3 using single-tone moments analysis (DT, RK), pp. 718–723.
- DATE-2009-ViehlPBR #performance #scheduling
- White box performance analysis considering static non-preemptive software scheduling (AV, MP, OB, WR), pp. 513–518.
- ISMM-2009-AlbertGG #garbage collection
- Live heap space analysis for languages with garbage collection (EA, SG, MGZ), pp. 129–138.
- ISMM-2009-JumpM #metric
- Dynamic shape analysis via degree metrics (MJ, KSM), pp. 119–128.
- ISMM-2009-NaeemL #alias #performance #set #using
- Efficient alias set analysis using SSA form (NAN, OL), pp. 79–88.
- ISMM-2009-UnnikrishnanS #functional #parametricity #source code
- Parametric heap usage analysis for functional programs (LU, SDS), pp. 139–148.
- ISMM-2009-Vengerov #garbage collection #modelling #optimisation #throughput
- Modeling, analysis and throughput optimization of a generational garbage collector (DV), pp. 1–9.
- LCTES-2009-FidgeC #data flow #hardware
- Integrating hardware and software information flow analyses (CJF, DC), pp. 157–166.
- PDP-2009-Ito #effectiveness #evaluation #parametricity
- Job Scheduler Parameter Analysis for Evaluation of Effectiveness (RI), pp. 62–69.
- PDP-2009-MortaraG #named #parallel #performance
- ProTailor: A Parallel Operator for Extremely Fast Shape Analysis in Bioinformatics Applications (MM, AG), pp. 276–282.
- PPoPP-2009-KejariwalC #concurrent #parallel #source code #thread
- Parallelization spectroscopy: analysis of thread-level parallelism in hpc programs (AK, CC), pp. 293–294.
- PPoPP-2009-TallentM #effectiveness #metric #parallel #performance #thread
- Effective performance measurement and analysis of multithreaded applications (NRT, JMMC), pp. 229–240.
- ESOP-2009-Campbell #data type #memory management #using
- Amortised Memory Analysis Using the Depth of Data Structures (BC), pp. 190–204.
- FASE-2009-AlTurkiDYCI #specification
- Formal Specification and Analysis of Timing Properties in Software Systems (MA, DD, DY, AC, HI), pp. 262–277.
- FASE-2009-ClarkGT #scalability
- Scalable Analysis of Scalable Systems (AC, SG, MT), pp. 1–17.
- FoSSaCS-2009-KuhnrichSSK #data flow #infinity #interprocedural
- Interprocedural Dataflow Analysis over Weight Domains with Infinite Descending Chains (MK, SS, JS, SK), pp. 440–455.
- TACAS-2009-AtigBQ #bound #concurrent #source code #thread
- Context-Bounded Analysis for Concurrent Programs with Dynamic Creation of Threads (MFA, AB, SQ), pp. 107–123.
- TACAS-2009-BjornerTV #source code #string
- Path Feasibility Analysis for String-Manipulating Programs (NB, NT, AV), pp. 307–321.
- TACAS-2009-GofmanLSZYS #data access #named #policy
- RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
- TACAS-2009-YuBI #string #verification
- Symbolic String Verification: Combining String Analysis and Size Analysis (FY, TB, OHI), pp. 322–336.
- CADE-2009-FalkeK #approach #automation #imperative #source code #term rewriting #termination
- A Term Rewriting Approach to the Automated Termination Analysis of Imperative Programs (SF, DK), pp. 277–293.
- CADE-2009-SebastianiV #axiom #encoding #lightweight #logic
- Axiom Pinpointing in Lightweight Description Logics via Horn-SAT Encoding and Conflict Analysis (RS, MV), pp. 84–99.
- CADE-2009-SwiderskiPGFS #dependence #induction #proving #termination #theorem proving
- Termination Analysis by Dependency Pairs and Inductive Theorem Proving (SS, MP, JG, CF, PSK), pp. 322–338.
- CAV-2009-CernyA #automation #java
- Automated Analysis of Java Methods for Confidentiality (PC, RA), pp. 173–187.
- CAV-2009-GuernicG #hybrid #reachability #using
- Reachability Analysis of Hybrid Systems Using Support Functions (CLG, AG), pp. 540–554.
- CAV-2009-Gulwani #bound #complexity #named
- SPEED: Symbolic Complexity Bound Analysis (SG), pp. 51–62.
- CSL-2009-AlurCW #algorithm #source code
- Algorithmic Analysis of Array-Accessing Programs (RA, PC, SW), pp. 86–101.
- CSL-2009-HofmannR #performance
- Efficient Type-Checking for Amortised Heap-Space Analysis (MH, DR), pp. 317–331.
- ICLP-2009-ChristiansenL #modelling #optimisation #preprocessor #sequence
- Preprocessing for Optimization of Probabilistic-Logic Models for Sequence Analysis (HC, OTL), pp. 70–83.
- ICLP-2009-Have #biology #constraints #modelling #sequence #statistics
- Logic-Statistic Models with Constraints for Biological Sequence Analysis (CTH), pp. 549–550.
- ICLP-2009-Voets #logic programming #research #source code #summary
- Research Summary: Non-termination Analysis of Logic Programs (DV), pp. 553–554.
- ICLP-2009-VoetsS #approach #logic programming #source code
- A New Approach to Non-termination Analysis of Logic Programs (DV, DDS), pp. 220–234.
- ICST-2009-AngelettiGNPS #automation #generative #testing
- Automatic Test Generation for Coverage Analysis of ERTMS Software (DA, EG, MN, AP, SS), pp. 303–306.
- ISSTA-2009-AdlerFKPRSUZ #string #test coverage #using
- Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
- ISSTA-2009-BravenboerS #exception #points-to
- Exception analysis and points-to analysis: better together (MB, YS), pp. 1–12.
- ISSTA-2009-HalfondAO #identification #interface #precise #testing #web
- Precise interface identification to improve testing and analysis of web applications (WGJH, SA, AO), pp. 285–296.
- ISSTA-2009-PecheurRB #formal method #testing
- A formal analysis of requirements-based testing (CP, FR, GB), pp. 47–56.
- LICS-2009-RougemontT #probability #process #statistics
- Statistic Analysis for Probabilistic Processes (MdR, MT), pp. 299–308.
- SAT-2009-Skvortsov
- A Theoretical Analysis of Search in GSAT (ESS), pp. 265–275.
- TestCom-FATES-2009-Szabados #scalability
- Structural Analysis of Large TTCN-3 Projects (KS), pp. 241–246.
- VMCAI-2009-AmjadB #automation #proving #towards
- Towards Automatic Stability Analysis for Rely-Guarantee Proofs (HA, RB), pp. 14–28.
- VMCAI-2009-Sagiv #thread
- Thread-Modular Shape Analysis (MS), p. 3.
- CBSE-2008-Tolosana-CalasanzRB #automation #performance #workflow
- Automating Performance Analysis from Taverna Workflows (RTC, OFR, JAB), pp. 1–15.
- ECSA-2008-LosavioMR #quality #standard #web #web service
- Web Services Domain Analysis Based on Quality Standards (FL, AM, RR), pp. 354–358.
- QoSA-2008-CortellessaPSV #architecture #framework #modelling #named #performance #platform #uml
- MOSES: MOdeling Software and platform architEcture in UML 2 for Simulation-based performance analysis (VC, PP, RS, AV), pp. 86–102.
- QoSA-2008-JansenVAV #architecture
- Sharing the Architectural Knowledge of Quantitative Analysis (AJ, TdV, PA, MvV), pp. 220–234.
- QoSA-2008-MalletR #distributed #model transformation
- Style-Based Model Transformation for Early Extrafunctional Analysis of Distributed Systems (JM, SR), pp. 55–70.
- QoSA-2008-MorenoM #modelling #performance
- Model-Driven Performance Analysis (GAM, PM), pp. 135–151.
- QoSA-2008-WaignierMD #architecture #specification
- Architectural Specification and Static Analyses of Contractual Application Properties (GW, AFLM, LD), pp. 152–170.
- WICSA-2008-HarrisonA #design pattern #documentation #legacy
- Analysis of Architecture Pattern Usage in Legacy System Architecture Documentation (NBH, PA), pp. 147–156.
- WICSA-2008-KeulerMU #architecture #performance #quality
- Efficient Quality Impact Analyses for Iterative Architecture Construction (TK, DM, TU), pp. 19–28.
- WICSA-2008-MolesiniGCB #architecture #on the
- On the Quantitative Analysis of Architecture Stability in Aspectual Decompositions (AM, AFG, CvFGC, TVB), pp. 29–38.
- WICSA-2008-MucciniP #architecture #functional #simulation
- Simulating Software Architectures for Functional Analysis (HM, PP), pp. 289–292.
- DRR-2008-DejeanM
- Versatile page numbering analysis (HD, JLM), p. 68150.
- DRR-2008-FumeI #categorisation #clustering #documentation #modelling #semantics
- Model-based document categorization employing semantic pattern analysis and local structure clustering (KF, YI), p. 68150.
- ECDL-2008-PfefferES #classification #library #visual notation
- Visual Analysis of Classification Systems and Library Collections (MP, KE, HS), pp. 436–439.
- HT-2008-Yalcin
- Writing on the blog: an assemblage analysis (STY), pp. 253–254.
- JCDL-2008-CarmelYR #library #using
- Enhancing digital libraries using missing content analysis (DC, EYT, HR), pp. 1–10.
- JCDL-2008-Marshall #repository
- From writing and analysis to the repository: taking the scholars’ perspective on scholarly archiving (CCM), pp. 251–260.
- JCDL-2008-McCownN08a #re-engineering
- Usage analysis of a public website reconstruction tool (FM, MLN), pp. 371–374.
- SIGMOD-2008-XiaoT #privacy #statistics
- Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
- VLDB-2008-AntonellisGC #graph #query
- Simrank++: query rewriting through link analysis of the click graph (IA, HGM, CCC), pp. 408–421.
- VLDB-2008-BalminCCLOSV #named #xml
- SEDA: a system for search, exploration, discovery, and analysis of XML Data (AB, LSC, EC, QL, FÖ, SS, ZV), pp. 1408–1411.
- VLDB-2008-PoessN #challenge #energy #power management
- Energy cost, the key challenge of today’s data centers: a power consumption analysis of TPC-C results (MP, RON), pp. 1229–1240.
- VLDB-2008-WeigelPRGC #collaboration #scalability #web
- Large-scale collaborative analysis and extraction of web data (FW, BP, MR, JG, MC), pp. 1476–1479.
- EDM-2008-Heiner #student
- A Preliminary Analysis of the Logged Questions that Students Ask in Introductory Computer Science (CH), pp. 250–257.
- EDM-2008-KoedingerCSL #fine-grained #repository #tool support
- An Open Repository and analysis tools for fine-grained, longitudinal learner data (KRK, KC, AS, BL), pp. 157–166.
- EDM-2008-PardosHRB #composition #multi
- The Composition Effect: Conjuntive or Compensatory? An Analysis of Multi-Skill Math Questions in ITS (ZAP, NTH, CR, JEB), pp. 147–156.
- ITiCSE-2008-KiesmullerB #algorithm #how #problem
- How do 7th graders solve algorithmic problems?: a tool-based analysis (UK, TB), p. 353.
- ITiCSE-2008-Leach #process
- Analysis of ABET accreditation as a software process (RJL), p. 356.
- SIGITE-2008-LeePH
- An instant messenger system for learner analysis in e-learning environment (HL, DSP, MH), pp. 51–52.
- CSMR-2008-DAmbrosL #collaboration #evolution #flexibility #framework
- A Flexible Framework to Support Collaborative Software Evolution Analysis (MD, ML), pp. 3–12.
- CSMR-2008-KenmeiAP #open source #predict #scalability
- Trend Analysis and Issue Prediction in Large-Scale Open Source Systems (BK, GA, MDP), pp. 73–82.
- CSMR-2008-PapastefanatosAVV #database #evolution #named
- Hecataeus: A What-If Analysis Tool for Database Schema Evolution (GP, FA, YV, PV), pp. 326–328.
- ICSM-2008-DAmbros #dependence #evolution #fault
- Supporting software evolution analysis with historical dependencies and defect information (MD), pp. 412–415.
- ICSM-2008-Kamiya #identifier
- Variation analysis of context-sharing identifiers with code clones (TK), pp. 464–465.
- ICSM-2008-YangLLW #empirical #maintenance
- An empirical analysis on distribution patterns of software maintenance effort (YY, QL, ML, QW), pp. 456–459.
- ICSM-2008-ZhangBJAL #generative #visual notation
- Query-based filtering and graphical view generation for clone analysis (YZ, HAB, SJ, DA, ML), pp. 376–385.
- ICSM-2008-Zhu #fault
- Goal trees and fault trees for root cause analysis (QZ), pp. 436–439.
- MSR-2008-LaymanNGBB #mining #visual notation
- Mining software effort data: preliminary analysis of visual studio team system data (LL, NN, SG, JB, AB), pp. 43–46.
- MSR-2008-YoshimuraNHK #approach #detection #named #product line #variability
- FAVE: factor analysis based approach for detecting product line variability from change history (KY, FN, KH, TK), pp. 11–18.
- PASTE-2008-MarronMHSK #array #recursion
- Sharing analysis of arrays, collections, and recursive structures (MM, MML, MVH, DS, DK), pp. 43–49.
- SCAM-2008-BinkleyGHLM
- Evaluating Key Statements Analysis (DB, NG, MH, ZL, KM), pp. 121–130.
- SCAM-2008-BoogerdM #data flow #on the #profiling #using
- On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
- SCAM-2008-GiffhornH #java #precise #source code #using
- Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
- SCAM-2008-GondowKI #approach #automation #behaviour #c #named #preprocessor
- TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor’s Behaviors (KG, HK, TI), pp. 35–44.
- SCAM-2008-GorbovitskiTRSL #debugging #performance
- Analysis and Transformations for Efficient Query-Based Debugging (MG, KTT, TR, SDS, YAL), pp. 174–183.
- SCAM-2008-LundbergGL #performance #points-to #precise
- Fast and Precise Points-to Analysis (JL, TG, WL), pp. 133–142.
- SCAM-2008-ScholzZC #dependence #graph #reachability
- User-Input Dependence Analysis via Graph Reachability (BS, CZ, CC), pp. 25–34.
- SCAM-2008-StoneSB #automation #data flow #set
- Automatic Determination of May/Must Set Usage in Data-Flow Analysis (AS, MS, SB), pp. 153–162.
- SCAM-2008-SunZ #points-to
- Aspect-Aware Points-to Analysis (QS, JZ), pp. 143–152.
- WCRE-2008-GhanbariCA #aspectj #hybrid #java #query #source code
- A Hybrid Query Engine for the Structural Analysis of Java and AspectJ Programs (HG, CC, VA), pp. 133–137.
- WCRE-2008-GrantCS #automation #component #concept #independence #using
- Automated Concept Location Using Independent Component Analysis (SG, JRC, DBS), pp. 138–142.
- WCRE-2008-HashimotoM #fine-grained #named
- Diff/TS: A Tool for Fine-Grained Structural Change Analysis (MH, AM), pp. 279–288.
- WCRE-2008-HayesAG #clustering #named
- PREREQIR: Recovering Pre-Requirements via Cluster Analysis (JHH, GA, YGG), pp. 165–174.
- WCRE-2008-JiangHH
- Analysis of Procedure Splitability (TJ, MH, YH), pp. 247–256.
- WCRE-2008-SobreiraM #comprehension #visual notation
- A Visual Trace Analysis Tool for Understanding Feature Scattering (VS, MdAM), pp. 337–338.
- CIAA-2008-DixonES
- Automata-Theoretic Analysis of Bit-Split Languages for Packet Scanning (RD, ÖE, TS), pp. 141–150.
- DLT-2008-EsparzaKL #fixpoint
- Derivation Tree Analysis for Accelerated Fixed-Point Computation (JE, SK, ML), pp. 301–313.
- DLT-2008-KarhumakiS #theorem
- An Analysis and a Reproof of Hmelevskii’s Theorem (JK, AS), pp. 467–478.
- ICALP-B-2008-Canetti #composition #performance #security
- Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency (RC), pp. 1–13.
- LATA-2008-RegnaultST #2d #automaton #on the #probability
- On the Analysis of “Simple” 2D Stochastic Cellular Automata (DR, NS, ET), pp. 452–463.
- FM-2008-GawlitzaS #game studies #precise
- Precise Interval Analysis vs. Parity Games (TG, HS), pp. 342–357.
- FM-2008-UzuncaovaK #constraints #declarative #modelling #performance
- Constraint Prioritization for Efficient Analysis of Declarative Models (EU, SK), pp. 310–325.
- SEFM-2008-Spoto
- Nullness Analysis in Boolean Form (FS), pp. 21–30.
- SFM-2008-DegasperiG #modelling #probability
- Sensitivity Analysis of Stochastic Models of Bistable Biochemical Reactions (AD, SG), pp. 1–20.
- FLOPS-2008-AvanziniM #complexity
- Complexity Analysis by Rewriting (MA, GM), pp. 130–146.
- FLOPS-2008-Yokouchi #algorithm #difference #lazy evaluation #strict
- Strictness Analysis Algorithms Based on an Inequality System for Lazy Types (HY), pp. 255–271.
- GT-VMT-2006-KonigK08 #graph transformation
- Augur 2 — A New Version of a Tool for the Analysis of Graph Transformation Systems (BK, VK), pp. 201–210.
- GT-VMT-2006-KovacsG08 #formal method #modelling #simulation #workflow
- Simulation and Formal Analysis of Workflow Models (MK, LG), pp. 221–230.
- GT-VMT-2008-BiermannM #configuration management #independence #rule-based
- Independence Analysis of Firing and Rule-based Net Transformations in Reconfigurable Object Nets (EB, TM).
- GT-VMT-2008-BrielerM #ambiguity #diagrams #graph grammar #sketching #syntax
- Ambiguity Resolution for Sketched Diagrams by Syntax Analysis Based on Graph Grammars (FB, MM).
- ICGT-2008-EhrigP #formal method #graph #kernel #model transformation
- Formal Analysis of Model Transformations Based on Triple Graph Rules with Kernels (HE, UP), pp. 178–193.
- ICGT-2008-Hermann #process #workflow
- Process Construction and Analysis for Workflows Modelled by Adhesive HLR Systems with Application Conditions (FH), pp. 496–498.
- ICGT-2008-Khan #configuration management #graph transformation #modelling #network #using
- Model-Based Analysis of Network Reconfigurations Using Graph Transformation Systems (AK), pp. 502–504.
- CHI-2008-AdarTD #scalability #web
- Large scale analysis of web revisitation patterns (EA, JT, STD), pp. 1197–1206.
- CHI-2008-GilbertKS #empirical #network #social #social media
- The network in the garden: an empirical analysis of social media in rural life (EG, KK, CS), pp. 1603–1612.
- CHI-2008-IsenbergTC #case study #visual notation
- An exploratory study of visual information analysis (PI, AT, MSTC), pp. 1217–1226.
- CHI-2008-KatsanosTA #architecture #design #named #semantics #using #web
- AutoCardSorter: designing the information architecture of a web site using latent semantic analysis (CK, NKT, NMA), pp. 875–878.
- CHI-2008-MiaskiewiczSK #identification #semantics
- A latent semantic analysis methodology for the identification and creation of personas (TM, TS, KAK), pp. 1501–1510.
- CHI-2008-OConnellC #interactive #metric #visualisation
- Metrics for measuring human interaction with interactive visualizations for information analysis (TAO, YYC), pp. 1493–1496.
- CSCW-2008-SteptoeWMGRSRS #collaboration
- Eye-tracking for avatar eye-gaze and interactional analysis in immersive collaborative virtual environments (WS, RW, AM, EG, JR, PMS, DJR, AS), pp. 197–200.
- SOFTVIS-2008-DietrichYMJD #clustering #dependence #graph #java
- Cluster analysis of Java dependency graphs (JD, VY, CM, GJ, MD), pp. 91–94.
- SOFTVIS-2008-PichNR #dependence #graph #visual notation
- Visual analysis of importance and grouping in software dependency graphs (CP, LN, GGR), pp. 29–32.
- SOFTVIS-2008-Stasko #visualisation
- Visualization for information exploration and analysis: keynote presentation (JTS), pp. 7–8.
- CAiSE-2008-KongdenfhaBSC #interactive #named
- SpreadMash: A Spreadsheet-Based Interactive Browsing and Analysis Tool for Data Services (WK, BB, RSP, FC), pp. 343–358.
- CAiSE-2008-NiknafsR
- Computer-Aided Method Engineering: An Analysis of Existing Environments (AN, RR), pp. 525–540.
- CAiSE-2008-SpiessNWMB #modelling #performance #process #simulation #ubiquitous
- Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems (PS, DKN, IW, IM, MB), pp. 579–582.
- CAiSE-2008-VaraSP #information management #modelling #process #requirements
- Business Process Modelling and Purpose Analysis for Requirements Analysis of Information Systems (JLdlV, JS, OP), pp. 213–227.
- EDOC-2008-NarmanSJEC #architecture #enterprise #modelling #quality #using
- Using Enterprise Architecture Models for System Quality Analysis (PN, MS, PJ, ME, MC), pp. 14–23.
- EDOC-2008-SommestadEJ #architecture #enterprise #graph #modelling #security
- Combining Defense Graphs and Enterprise Architecture Models for Security Analysis (TS, ME, PJ), pp. 349–355.
- ICEIS-AIDSS-2008-SharpanskykhSB #modelling #safety
- Organizational Modeling and Analysis of Safety Occurrence Reporting in Air Traffic (AS, SHS, HAPB), pp. 225–230.
- ICEIS-AIDSS-2008-VolkelA #design #information management
- Cost-Benefit Analysis for the Design of Personal Knowledge Management Systems (MV, AA), pp. 95–105.
- ICEIS-ISAS2-2008-AgostinhoMMABFRKRC #approach #aspect-oriented #requirements
- A Metadata-Driven Approach for Aspect-Oriented Requirements Analysis (SA, AMDM, AM, JA, ISB, RF, RR, JK, RAR, PC), pp. 129–136.
- ICEIS-ISAS2-2008-BoukhebouzeAB #framework #modelling #named #process
- BP-FAMA: Business Process Framework for Agility of Modelling and Analysis (MB, YA, ANB), pp. 368–373.
- ICEIS-ISAS2-2008-BrockeSC #framework #process #re-engineering #specification #towards
- ECM Systems Analysis and Specification — Towards a Framework for Business Process Re-Engineering (JvB, AS, AC), pp. 345–350.
- ICEIS-ISAS2-2008-GustieneG #design
- Introducing Service-Orientation into System Analysis and Design (PG, RG), pp. 189–194.
- ICEIS-ISAS2-2008-HuberSK #framework #health #security
- Security Analysis of the Health Care Telematics Infrastructure in Germany (MJH, AS, HK), pp. 144–153.
- ICEIS-ISAS2-2008-LeL #web
- Realizing Web Application Vulnerability Analysis via AVDL (HTL, PKKL), pp. 259–265.
- ICEIS-ISAS2-2008-MonteiroFBM #information management #mobile #towards
- An Analysis Pattern for Mobile Geographic Information Systems toward Municipal Urban Administration (BRM, JLF, JLB, WSM), pp. 311–318.
- ICEIS-ISAS2-2008-ParvathyVB #case study #comparative #correlation #documentation #traceability
- A Comparative Study of Document Correlation Techniques for Traceability Analysis (AGP, BGV, RB), pp. 64–69.
- ICEIS-ISAS2-2008-SantosBBR #architecture #modelling #semantics
- A Model Driven Architecture Tool Based on Semantic Analysis Method (TMdS, RB, MCCB, MAR), pp. 305–310.
- ICEIS-ISAS2-2008-Venable #problem #requirements
- Improving Requirements Analysis — Rigourous Problem Analysis and Formulation with Coloured Cognitive Maps (JRV), pp. 466–470.
- ICEIS-SAIC-2008-Bachlechner #architecture #integration #semantics #web #web service
- Integration Architectures Based on Semantic Web Services: Fad or Model for the Future? — Findings of a Comprehensive SWOT Analysis (DB), pp. 45–52.
- CIKM-2008-AcharyyaG #product line
- A spam resistant family of concavo-convex ranks for link analysis (SA, JG), pp. 1505–1506.
- CIKM-2008-DashRMAL
- Dynamic faceted search for discovery-driven analysis (DD, JR, NM, AA, GML), pp. 3–12.
- CIKM-2008-ItoNHN #wiki
- Association thesaurus construction methods based on link co-occurrence analysis for wikipedia (MI, KN, TH, SN), pp. 817–826.
- CIKM-2008-NajorkC #effectiveness #performance
- Efficient and effective link analysis with precomputed salsa maps (MN, NC), pp. 53–62.
- CIKM-2008-NguyenS #correlation #dataset #performance
- Fast correlation analysis on time series datasets (PN, NS), pp. 787–796.
- ECIR-2008-HannahMO #graph
- Analysis of Link Graph Compression Techniques (DH, CM, IO), pp. 596–601.
- ECIR-2008-LangWJLX #ad hoc #dependence #evaluation #retrieval
- An Evaluation and Analysis of Incorporating Term Dependency for Ad-Hoc Retrieval (HL, BW, GJFJ, JL, YX), pp. 602–606.
- ECIR-2008-MohdCR #comparison
- A Comparison of Named Entity Patterns from a User Analysis and a System Analysis (MM, FC, IR), pp. 679–683.
- ICML-2008-AnWSWCD #image #kernel #multi #process
- Hierarchical kernel stick-breaking process for multi-task image analysis (QA, CW, IS, EW, LC, DBD), pp. 17–24.
- ICML-2008-HamL #learning
- Grassmann discriminant analysis: a unifying view on subspace-based learning (JH, DDL), pp. 376–383.
- ICML-2008-LiangJ #generative #pseudo
- An asymptotic analysis of generative, discriminative, and pseudolikelihood estimators (PL, MIJ), pp. 584–591.
- ICML-2008-LuPV #component #multi
- Uncorrelated multilinear principal component analysis through successive variance maximization (HL, KNP, ANV), pp. 616–623.
- ICML-2008-MeloMR #approximate #learning
- An analysis of reinforcement learning with function approximation (FSM, SPM, MIR), pp. 664–671.
- ICML-2008-ParrLTPL #approximate #feature model #learning #linear #modelling
- An analysis of linear models, linear value-function approximation, and feature selection for reinforcement learning (RP, LL, GT, CPW, MLL), pp. 752–759.
- ICML-2008-SalakhutdinovM #network #on the
- On the quantitative analysis of deep belief networks (RS, IM), pp. 872–879.
- ICML-2008-SunJY #canonical #correlation
- A least squares formulation for canonical correlation analysis (LS, SJ, JY), pp. 1024–1031.
- ICML-2008-WangM #using
- Manifold alignment using Procrustes analysis (CW, SM), pp. 1120–1127.
- ICML-2008-WangYQZ #component #composition #feature model
- Dirichlet component analysis: feature extraction for compositional data (HYW, QY, HQ, HZ), pp. 1128–1135.
- ICML-2008-ZhangTK #approximate #fault #rank
- Improved Nyström low-rank approximation and error analysis (KZ, IWT, JTK), pp. 1232–1239.
- ICPR-2008-Boccignone #parametricity #video
- Nonparametric Bayesian attentive video analysis (GB), pp. 1–4.
- ICPR-2008-BridsonA #approach #evaluation #geometry #layout #performance
- A geometric approach for accurate and efficient performance evaluation of layout analysis methods (DB, AA), pp. 1–4.
- ICPR-2008-ChoiGCC #independence #kernel
- Kernel oriented discriminant analysis for speaker-independent phoneme spaces (HC, RGO, SC, YC), pp. 1–4.
- ICPR-2008-ChoiMSH #using
- Quantitative analysis of Iaido proficiency by using motion data (WC, SM, HS, KH), pp. 1–4.
- ICPR-2008-ChuangLL #process #representation
- Human activity analysis based on a torso-less representation (JHC, CWL, KHL), pp. 1–4.
- ICPR-2008-DingB #adaptation
- Adaptive Laplacian eigenfunctions as bases for regression analysis (LD, XB), pp. 1–4.
- ICPR-2008-El-BazCGMSVM #3d #matter
- Dyslexia diagnostics by 3D texture analysis of cerebral white matter gyrifications (AEB, MC, GLG, MM, AES, EV, RM), pp. 1–4.
- ICPR-2008-El-BazGFE #3d #approach #automation #detection #image #monitoring
- A new approach for automatic analysis of 3D low dose CT images for accurate monitoring the detected lung nodules (AEB, GLG, RF, MAEG), pp. 1–4.
- ICPR-2008-HardingE #2d #fourier #gesture #recognition
- The Fourier Analysis of 2DT movement with particular reference to hand gesture recognition (PRGH, TJE), pp. 1–4.
- ICPR-2008-HouLLCWY #modelling
- Fingerprint orientation analysis with topological modeling (ZH, JL, HKL, TPC, HLW, WYY), pp. 1–4.
- ICPR-2008-IhaddadeneD #realtime
- Real-time crowd motion analysis (NI, CD), pp. 1–4.
- ICPR-2008-KaholV #modelling #process #using
- Hand motion expertise analysis using dynamic hierarchical activity modeling and isomap (KK, MV), pp. 1–4.
- ICPR-2008-KaiserH #detection
- Qualitative analysis of spatio-temporal event detectors (BK, GH), pp. 1–4.
- ICPR-2008-KleberSGM #documentation
- Ancient document analysis based on text line extraction (FK, RS, MG, HM), pp. 1–4.
- ICPR-2008-LablackD #behaviour
- Analysis of human behaviour in front of a target scene (AL, CD), pp. 1–4.
- ICPR-2008-LiuS #correlation
- Recovering audio-to-video synchronization by audiovisual correlation analysis (YL, YS), pp. 1–4.
- ICPR-2008-LiZWH #clustering #multi
- Multiclass spectral clustering based on discriminant analysis (XL, ZZ, YW, WH), pp. 1–4.
- ICPR-2008-LuCC #image #multi #recognition
- Multilinear analysis based on image texture for face recognition (HL, HC, YWC), pp. 1–4.
- ICPR-2008-MorrisT #adaptation #process #video
- An adaptive scene description for activity analysis in surveillance video (BM, MMT), pp. 1–4.
- ICPR-2008-NedzvedABMD #image
- The structure analysis of ultra thin magnetic film images (AN, SA, AB, AM, WD), pp. 1–4.
- ICPR-2008-NohHL #invariant #recognition
- Regularized discriminant analysis for transformation-invariant object recognition (YKN, JH, DDL), pp. 1–5.
- ICPR-2008-OjansivuRH #invariant
- Rotation invariant local phase quantization for blur insensitive texture analysis (VO, ER, JH), pp. 1–4.
- ICPR-2008-PaclikLND #estimation #multi #using
- Variance estimation for two-class and multi-class ROC analysis using operating point averaging (PP, CL, JN, RPWD), pp. 1–4.
- ICPR-2008-ParkCDK #clustering #linear
- Linear discriminant analysis for data with subcluster structure (HP, JC, BLD, JK), pp. 1–4.
- ICPR-2008-ParkSK
- Facial expression analysis with facial expression deformation (SP, JS, DK), pp. 1–4.
- ICPR-2008-SaitohMK #performance
- Analysis of efficient lip reading method for various languages (TS, KM, RK), pp. 1–4.
- ICPR-2008-ShafaitBKB #layout #modelling #statistics #variability
- Background variability modeling for statistical layout analysis (FS, JvB, DK, TMB), pp. 1–4.
- ICPR-2008-ThomasRCB #comparative
- Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics (AOT, NKR, JHC, RMB), pp. 1–4.
- ICPR-2008-VillS #automation #classification
- Automated stroke ending analysis for drawing tool classification (MCV, RS), pp. 1–4.
- ICPR-2008-WangYY #fuzzy #recognition
- Fuzzy maximum scatter discriminant analysis and its application to face recognition (JW, WY, JY), pp. 1–4.
- ICPR-2008-XiaDG #invariant
- Locally invariant texture analysis from the topographic map (GSX, JD, YG), pp. 1–4.
- ICPR-2008-YangQ #component #detection #independence #network #using
- A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
- ICPR-2008-ZengLH
- Analysis on two fishermethods and a synthesized discriminant projection (ZZ, CL, LH), pp. 1–4.
- KDD-2008-BoutsidisMD #component #feature model
- Unsupervised feature selection for principal components analysis (CB, MWM, PD), pp. 61–69.
- KDD-2008-GodboleR #automation #classification #industrial
- Text classification, business intelligence, and interactivity: automating C-Sat analysis for services industry (SG, SR), pp. 911–919.
- KDD-2008-GodboleR08a #automation #industrial
- An integrated system for automatic customer satisfaction analysis in the services industry (SG, SR), pp. 1073–1076.
- KDD-2008-KoenigsteinST #query #string #using
- Spotting out emerging artists using geo-aware analysis of P2P query strings (NK, YS, TT), pp. 937–945.
- KDD-2008-YuFRKRDL #privacy
- Privacy-preserving cox regression for survival analysis (SY, GF, RR, SK, RBR, CDO, PL), pp. 1034–1042.
- KDD-2008-ZengMLBM #predict #using
- Using predictive analysis to improve invoice-to-cash collection (SZ, PM, CAL, IMBM, CM), pp. 1043–1050.
- KR-2008-Balbiani #reasoning #representation #standard
- Time Representation and Temporal Reasoning from the Perspective of Non-Standard Analysis (PB), pp. 695–704.
- RecSys-2008-Domingues #adaptation #framework #independence #monitoring #platform #web
- An independent platform for the monitoring, analysis and adaptation of web sites (MAD), pp. 299–302.
- RecSys-2008-LakiotakiTM #multi #named #recommendation
- UTA-Rec: a recommender system based on multiple criteria analysis (KL, ST, NFM), pp. 219–226.
- RecSys-2008-WuWC #automation #incremental #probability #recommendation #semantics
- Incremental probabilistic latent semantic analysis for automatic question recommendation (HW, YW, XC), pp. 99–106.
- SEKE-2008-AltahatET #detection #diagrams #graph transformation #interactive #uml
- Applying Critical Pair Analysis in Graph Transformation Systems to Detect Syntactic Aspect Interaction in UML State Diagrams (ZA, TE, LT), pp. 905–911.
- SEKE-2008-DrumondGS #information management #semantics #similarity #web
- A Similarity Analysis Model for Semantic Web Information Filtering Applications (LD, RG, FS), pp. 638–642.
- SEKE-2008-EmerVJ #database #relational #testing
- Testing Relational Database Schemas with Alternative Instance Analysis (MCFPE, SRV, MJ), pp. 357–362.
- SEKE-2008-GaoKF #complexity #modelling #testing
- Model-based Test Complexity Analysis for Software Installation Testing (JG, KK, TF), pp. 631–637.
- SEKE-2008-LiuCH #named
- PSPCAT: A PSP Data Collection and Analysis Tool (CHL, SLC, YCH), pp. 33–37.
- SEKE-2008-MatalongaG #fault
- Linking Return on Training Investment with Defects Causal Analysis (SM, TSFG), pp. 42–47.
- SEKE-2008-ParveenATMF #detection #probability #towards
- Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls (TP, WHA, SRT, GAM, RF), pp. 802–807.
- SEKE-2008-WuC #data transformation
- A Wed-based data Management and Analysis System for CO2 Capture (YW, CWC), pp. 857–860.
- SIGIR-2008-JiangA #categorisation
- Exploiting subjectivity analysis in blogs to improve political leaning categorization (MJ, SA), pp. 725–726.
- SIGIR-2008-PengL #evolution #topic #using
- Author-topic evolution analysis using three-way non-negative Paratucker (WP, TL), pp. 819–820.
- SIGIR-2008-WangLZD #matrix #multi #semantics #summary #symmetry
- Multi-document summarization via sentence-level semantic analysis and symmetric matrix factorization (DW, TL, SZ, CHQD), pp. 307–314.
- SIGIR-2008-WanY #clustering #multi #summary #using
- Multi-document summarization using cluster-based link analysis (XW, JY), pp. 299–306.
- SIGIR-2008-XuZL #image #named #novel #semantics #web
- WISA: a novel web image semantic analysis system (HX, XZ, LL), pp. 777–778.
- ECMDA-FA-2008-FritzscheGFSKB #modelling #performance #towards
- Towards Utilizing Model-Driven Engineering of Composite Applications for Business Performance Analysis (MF, WG, CF, ITAS, PK, TJB), pp. 369–380.
- ECMDA-FA-2008-WaheedIM #action semantics #data flow #execution #modelling #semantics #uml
- Data Flow Analysis of UML Action Semantics for Executable Models (TW, MZZI, ZIM), pp. 79–93.
- MoDELS-2008-BernardiMP #dependence
- Adding Dependability Analysis Capabilities to the MARTE Profile (SB, JM, DCP), pp. 736–750.
- MoDELS-2008-CabotCGL #declarative #invariant #model transformation
- An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
- MoDELS-2008-NugrohoFC #empirical #fault #modelling #uml
- Empirical Analysis of the Relation between Level of Detail in UML Models and Defect Density (AN, BF, MRVC), pp. 600–614.
- MoDELS-2008-ShoushaBL #algorithm #concurrent #search-based #uml
- A UML/SPT Model Analysis Methodology for Concurrent Systems Based on Genetic Algorithms (MS, LCB, YL), pp. 475–489.
- MoDELS-2008-TawhidP #development #modelling #performance #product line
- Integrating Performance Analysis in the Model Driven Development of Software Product Lines (RT, DCP), pp. 490–504.
- SPLC-2008-AlvesSBRSRPR #case study #information retrieval
- An Exploratory Study of Information Retrieval Techniques in Domain Analysis (VA, CS, LB, AR, PS, PR, CP, AR), pp. 67–76.
- SPLC-2008-HarhurinH
- Service-Oriented Commonality Analysis Across Existing Systems (AH, JH), pp. 255–264.
- SPLC-2008-NiuE #clustering #functional #on-demand #product line #requirements
- On-Demand Cluster Analysis for Product Line Functional Requirements (NN, SME), pp. 87–96.
- MoDELS-2008-BernardiMP #dependence
- Adding Dependability Analysis Capabilities to the MARTE Profile (SB, JM, DCP), pp. 736–750.
- MoDELS-2008-CabotCGL #declarative #invariant #model transformation
- An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
- MoDELS-2008-NugrohoFC #empirical #fault #modelling #uml
- Empirical Analysis of the Relation between Level of Detail in UML Models and Defect Density (AN, BF, MRVC), pp. 600–614.
- MoDELS-2008-ShoushaBL #algorithm #concurrent #search-based #uml
- A UML/SPT Model Analysis Methodology for Concurrent Systems Based on Genetic Algorithms (MS, LCB, YL), pp. 475–489.
- MoDELS-2008-TawhidP #development #modelling #performance #product line
- Integrating Performance Analysis in the Model Driven Development of Software Product Lines (RT, DCP), pp. 490–504.
- ECOOP-2008-HessellundS
- Flow Analysis of Code Customizations (AH, PS), pp. 285–308.
- OOPSLA-2008-GopinathanR #protocol #runtime
- Enforcing object protocols by combining static and runtime analysis (MG, SKR), pp. 245–260.
- OOPSLA-2008-KawachiyaOO #java #memory management #reduction #string
- Analysis and reduction of memory inefficiencies in Java strings (KK, KO, TO), pp. 385–402.
- OOPSLA-2008-NaeemL #multi
- Typestate-like analysis of multiple interacting objects (NAN, OL), pp. 347–366.
- AdaEurope-2008-Pettit #architecture #concurrent
- Increasing Confidence in Concurrent Software through Architectural Analysis (RGPI), pp. 199–210.
- LOPSTR-2008-BandaG #hybrid #linear
- Analysis of Linear Hybrid Systems in CLP (GB, JPG), pp. 55–70.
- PADL-2008-EshkevariAC #aspect-oriented #comprehension #declarative #dependence #reasoning #source code
- Comprehension and Dependency Analysis of Aspect-Oriented Programs through Declarative Reasoning (LME, VA, CC), pp. 35–52.
- PEPM-2008-PietrzakCPH #composition #prolog #source code #verification
- A practical type analysis for verification of modular prolog programs (PP, JC, GP, MVH), pp. 61–70.
- PLDI-2008-ChughVJL #concurrent #data flow #detection #source code #using
- Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
- PLDI-2008-DilligDA #scalability
- Sound, complete and scalable path-sensitive analysis (ID, TD, AA), pp. 270–280.
- PLDI-2008-DincklageD
- Explaining failures of program analyses (DvD, AD), pp. 260–269.
- PLDI-2008-Kahlon #alias #named #pointer #scalability
- Bootstrapping: a technique for scalable flow and context-sensitive pointer alias analysis (VK), pp. 249–259.
- PLDI-2008-WangXLGWZ #correlation #memory management
- Conditional correlation analysis for safe region-based memory management (XW, ZX, XL, ZG, XW, ZZ), pp. 45–55.
- POPL-2008-ChangR #induction #relational
- Relational inductive shape analysis (BYEC, XR), pp. 247–260.
- POPL-2008-Danielsson #complexity #data type #functional #lightweight
- Lightweight semiformal time complexity analysis for purely functional data structures (NAD), pp. 133–144.
- POPL-2008-ZhengR #alias #c
- Demand-driven alias analysis for C (XZ, RR), pp. 197–208.
- PPDP-2008-Hanus #functional #logic programming #source code
- Call pattern analysis for functional logic programs (MH), pp. 67–78.
- QAPL-2008-PierroSW #abstract interpretation #precise #probability #relational
- Relational Analysis and Precision via Probabilistic Abstract Interpretation (ADP, PS, HW), pp. 23–42.
- SAS-2008-BalakrishnanSIWG #detection #named #refinement
- SLR: Path-Sensitive Analysis through Infeasible-Path Detection and Syntactic Language Refinement (GB, SS, FI, OW, AG), pp. 238–254.
- SAS-2008-BauerNNP #correlation #relational
- Relational Analysis of Correlation (JB, FN, HRN, HP), pp. 32–46.
- SAS-2008-ConwayDNB #fault #pointer #proving
- Pointer Analysis, Conditional Soundness, and Proving the Absence of Errors (CLC, DD, KSN, CB), pp. 62–77.
- SAS-2008-HornM
- Flow Analysis, Linearity, and PTIME (DVH, HGM), pp. 255–269.
- SAS-2008-LammichM #concurrent #monitoring #source code #thread
- Conflict Analysis of Programs with Procedures, Dynamic Thread Creation, and Monitors (PL, MMO), pp. 205–220.
- SAS-2008-ManevichLSRB #composition #concurrent
- Heap Decomposition for Concurrent Shape Analysis (RM, TLA, MS, GR, JB), pp. 363–377.
- SAS-2008-MidtgaardJ #abstract interpretation #approach #control flow
- A Calculational Approach to Control-Flow Analysis by Abstract Interpretation (JM, TPJ), pp. 347–362.
- SAS-2008-Perdrix #abstract interpretation #quantum
- Quantum Entanglement Analysis Based on Abstract Interpretation (SP), pp. 270–282.
- SAS-2008-PrabhuS #array #java #pointer #using
- Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
- RE-2008-FeatherHMU #deployment #requirements #using
- Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
- RE-2008-FinkelsteinHMRZ #requirements
- “Fairness Analysis” in Requirements Assignments (AF, MH, SAM, JR, YZ), pp. 115–124.
- RE-2008-GlorioPMT #eclipse #named #plugin
- DaWaRA: An Eclipse Plugin for Usingi* on Data Warehouse Requirement Analysis (OG, JP, JNM, JT), pp. 317–318.
- RE-2008-TanabeUAYKS #requirements
- Supporting Requirements Change Management in Goal Oriented Analysis (DT, KU, KA, TY, HK, MS), pp. 3–12.
- ASE-2008-AdnanGDZ #clustering #component #design #interface #using
- Using Cluster Analysis to Improve the Design of Component Interfaces (RA, BG, AvD, JZ), pp. 383–386.
- ASE-2008-Frisby #tool support
- Unifying Analysis Tools with Rosetta (NF), pp. 505–508.
- ASE-2008-MooreS #design #layout
- Combining the Analysis of Spatial Layout and Text to Support Design Exploration (JMM, FMSI), pp. 379–382.
- ASE-2008-Pinzger #automation #performance #web
- Automated Web Performance Analysis (MP), pp. 513–516.
- ASE-2008-SchumannGPMB #parametricity #scalability #simulation #tool support
- Tool Support for Parametric Analysis of Large Software Simulation Systems (JS, KGB, CSP, TM, TB), pp. 497–498.
- ASE-2008-ZhangGC #automation #clustering #recommendation
- Automated Aspect Recommendation through Clustering-Based Fan-in Analysis (DZ, YG, XC), pp. 278–287.
- FSE-2008-JiangS #effectiveness #testing
- Profile-guided program simplification for effective testing and analysis (LJ, ZS), pp. 48–58.
- FSE-2008-MeneelyWSO #developer #network #predict #social
- Predicting failures with developer networks and social network analysis (AM, LW, WS, JAO), pp. 13–23.
- ICSE-2008-ChenSR #java #named #predict #runtime
- jPredictor: a predictive runtime analysis tool for java (FC, TFS, GR), pp. 221–230.
- ICSE-2008-JurjensSB #mobile #modelling #security
- Model-based security analysis for mobile communications (JJ, JS, PB), pp. 683–692.
- ICSE-2008-MoserPS #comparative #fault #metric #performance #predict
- A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction (RM, WP, GS), pp. 181–190.
- ICSE-2008-ReichertKSMH #network #protocol
- A language for advanced protocol analysis in automotive networks (TR, EK, WS, AM, DH), pp. 593–602.
- ICSE-2008-ZimmermannN #dependence #fault #graph #network #predict #using
- Predicting defects using network analysis on dependency graphs (TZ, NN), pp. 531–540.
- SAC-2008-AbedMS #graph #multi #proving #reachability #theorem proving #using
- Reachability analysis using multiway decision graphs in the HOL theorem prover (SA, OAM, GAS), pp. 333–338.
- SAC-2008-AmatoCCMTVGLGM #detection
- A web-based system for the collection and analysis of spectra signals for early detection of voice alterations (FA, MC, CC, FM, GT, PV, AG, NL, SG, CM), pp. 1405–1409.
- SAC-2008-AraujoSF #algebra #process
- HIV drug resistance analysis tool based on process algebra (LVdA, ECS, JEF), pp. 1358–1363.
- SAC-2008-AvolaC #image
- Encephalic NMR image analysis by textural interpretation (DA, LC), pp. 1338–1342.
- SAC-2008-BallabrigaCS #approach
- An improved approach for set-associative instruction cache partial analysis (CB, HC, PS), pp. 360–367.
- SAC-2008-BaveraB #bytecode #data flow #policy #type system
- Type-based information flow analysis for bytecode languages with variable object field policies (FB, EB), pp. 347–351.
- SAC-2008-BussBSE #flexibility #graph #pointer #using
- Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
- SAC-2008-CernuzziZ #comparative #evaluation
- Profile based comparative analysis for AOSE methodologies evaluation (LC, FZ), pp. 60–65.
- SAC-2008-ChenXN #detection #fault #specification
- A detectability analysis of fault classes for Boolean specifications (ZC, BX, CN), pp. 826–830.
- SAC-2008-CorreaIZF #image #mobile #using
- Medical image analysis using mobile devices (BC, EI, AZ, MF), pp. 1380–1384.
- SAC-2008-CostaNFC #assessment #parametricity
- Parametric cepstral analysis for pathological voice assessment (SCC, BGAN, JMF, SC), pp. 1410–1414.
- SAC-2008-Denner-Broser #algorithm #problem #using
- An algorithm for the tracing problem using interval analysis (BDB), pp. 1832–1837.
- SAC-2008-GarciaH #functional #metric #using
- Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
- SAC-2008-KaiyaSOKK #quality #requirements #towards
- Toward quality requirements analysis based on domain specific quality spectrum (HK, TS, AO, NK, KK), pp. 596–601.
- SAC-2008-OliveiraMWS #locality
- Brain registration and subtraction — improved localization for SPECT analysis (B.R.A.S.I.L.): a computer-aided diagnosis in epilepsy tool kit (LFdO, PMdAM, LWA, ACS), pp. 1390–1394.
- SAC-2008-Papadopoulos #retrieval #semantics
- Trajectory retrieval with latent semantic analysis (ANP), pp. 1089–1094.
- SAC-2008-Schneider #hybrid #reachability
- Reachability analysis of generalized polygonal hybrid systems (GS), pp. 327–332.
- SAC-2008-SilvaDSSM #automation #component #segmentation
- Automated segmentation and volumetric analysis of brain components on MR imaging (MPS, JRD, FLS, ASdS, DCMS), pp. 1422–1423.
- SAC-2008-TakasuA #documentation #information management #layout #probability
- Information extraction from scanned documents by stochastic page layout analysis (AT, KA), pp. 447–448.
- SAC-2008-VellosoR #algorithm
- Percolation analyses in a swarm based algorithm for shortest-path finding (BPV, MR), pp. 1861–1865.
- SAC-2008-WendtGSWNM #mobile #optimisation #smarttech
- System level power profile analysis and optimization for smart cards and mobile devices (MW, MG, CS, RW, UN, AM), pp. 1884–1888.
- ATEM-J-2006-MiguelBSA #development #integration #modelling #safety
- Integration of safety analysis in model-driven software development (MAdM, JFB, JPS, AA), pp. 260–280.
- SLE-2008-HageK #library #named
- Neon: A Library for Language Usage Analysis (JH, PvK), pp. 35–53.
- SLE-2008-MoodyH #diagrams #effectiveness #syntax #uml #visual notation
- Evaluating the Visual Syntax of UML: An Analysis of the Cognitive Effectiveness of the UMLFamily of Diagrams (DLM, JvH), pp. 16–34.
- ASPLOS-2008-TuckACT #hardware #named #optimisation
- SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
- CASE-2008-EconomopoulosK
- Analysis of a simple CONWIP system with impatient customers (AAE, VSK), pp. 291–296.
- CASE-2008-FanKJAB #architecture #design
- Integrated fixture design and analysis system based on service-oriented architecture (LF, ASK, BNJ, SA, SHB), pp. 656–661.
- CASE-2008-GarciaJMM #distributed #effectiveness #modelling
- A procedure for modeling and analysis of service-oriented and distributed productive systems (JIG, FJ, RAGM, PEM), pp. 941–946.
- CASE-2008-HuangK #assembly #design #evaluation #multi #process
- Process capability sensitivity analysis for design evaluation of multi station assembly systems (WH, ZK), pp. 400–405.
- CASE-2008-LeeCAG #automation #evaluation #image #quality
- Color quantization and image analysis for automated fruit quality evaluation (DJL, YC, JKA, CRG), pp. 194–199.
- CASE-2008-LiuL #interactive #mobile
- Track-stair and vehicle-manipulator interaction analysis for tracked mobile manipulators climbing stairs (YL, GL), pp. 157–162.
- CASE-2008-MatsumotoUOI #empirical #process
- Business process analysis to obtain empirical lot sizing rule in printing process (SM, NU, KO, HI), pp. 591–596.
- CASE-2008-MitaniH #metric #symmetry #using
- Analysis of contact between feeder surface and microparts based on measurements for microparts feeder using an asymmetric surface (AM, SH), pp. 720–725.
- CASE-2008-NandakumarHM #automation #flexibility #framework #interactive
- A flexible framework for automation of single cell and cell-to-cell interaction analyses (VN, MH, DRM), pp. 424–430.
- CASE-2008-NieIYTOM #behaviour #performance #video
- High-speed video analysis of laboratory rats behaviors in forced swim test (YN, II, KY, TT, KO, HM), pp. 206–211.
- CASE-2008-SunEHMMMBLM #automation #biology #integration #multi #user interface
- Integration of user interface, device control, data acquisition and analysis for automated multi-spectral imaging of single biological cells (CSS, JRE, MH, TWM, SKM, SM, LWB, MEL, DRM), pp. 1013–1018.
- CASE-2008-WangLABH #flexibility #quality
- Quality analysis in flexible manufacturing systems with batch productions (JW, JL, JA, SB, NH), pp. 460–465.
- CC-2008-KhedkerK #data flow #interprocedural #performance #precise #string
- Efficiency, Precision, Simplicity, and Generality in Interprocedural Data Flow Analysis: Resurrecting the Classical Call Strings Method (UPK, BK), pp. 213–228.
- CC-2008-LogozzoF #bytecode #on the #source code
- On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis (FL, MF), pp. 197–212.
- CC-2008-MarronHKS #graph #modelling #performance
- Efficient Context-Sensitive Shape Analysis with Graph Based Heap Models (MM, MVH, DK, DS), pp. 245–259.
- CC-2008-RepsB #bytecode
- Improved Memory-Access Analysis for x86 Executables (TWR, GB), pp. 16–35.
- CC-2008-RountevSX #data flow #ide #library #object-oriented #scalability
- IDE Dataflow Analysis in the Presence of Large Object-Oriented Libraries (AR, MS, G(X), pp. 53–68.
- CGO-2008-ThakurG #data flow
- Comprehensive path-sensitive data-flow analysis (AVT, RG), pp. 55–63.
- CGO-2008-ZhaoCW #manycore #named #pipes and filters #profiling
- Pipa: pipelined profiling and analysis on multi-core systems (QZ, IC, WFW), pp. 185–194.
- CGO-2008-ZhuangKSC #difference #framework #named #performance #virtual machine
- Perfdiff: a framework for performance difference analysis in a virtual machine environment (XZ, SK, MJS, JDC), pp. 4–13.
- DAC-2008-AhmadiZ #approach #hardware #optimisation
- Symbolic noise analysis approach to computational hardware optimization (AA, MZ), pp. 391–396.
- DAC-2008-FeldmannASSBG #modelling #multi
- Driver waveform computation for timing analysis with multiple voltage threshold driver models (PF, SA, DS, GS, RB, HG), pp. 425–428.
- DAC-2008-GandikotaBS #modelling #statistics
- Modeling crosstalk in statistical static timing analysis (RG, DB, DS), pp. 974–979.
- DAC-2008-GoelV #modelling #standard #statistics
- Statistical waveform and current source based standard cell models for accurate timing analysis (AG, SBKV), pp. 227–230.
- DAC-2008-GuzeyWLF #functional #testing
- Functional test selection based on unsupervised support vector analysis (OG, LCW, JRL, HF), pp. 262–267.
- DAC-2008-HeloueN #modelling
- Parameterized timing analysis with general delay models and arbitrary variation sources (KRH, FNN), pp. 403–408.
- DAC-2008-ImaiSNM #framework #parametricity #statistics
- Non-parametric statistical static timing analysis: an SSTA framework for arbitrary distribution (MI, TS, NN, KM), pp. 698–701.
- DAC-2008-KshirsagarEB #performance
- Analysis and implications of parasitic and screening effects on the high-frequency/RF performance of tunneling-carbon nanotube FETs (CK, MNEZ, KB), pp. 250–255.
- DAC-2008-KumarKS #framework
- A framework for block-based timing sensitivity analysis (SVK, CVK, SSS), pp. 688–693.
- DAC-2008-LiangM #execution #modelling #probability
- Cache modeling in probabilistic execution time analysis (YL, TM), pp. 319–324.
- DAC-2008-LiZY #verification
- Full-chip leakage analysis in nano-scale technologies: mechanisms, variation sources, and verification (TL, WZ, ZY), pp. 594–599.
- DAC-2008-MohalikRDRSPJ #embedded #latency #model checking #realtime
- Model checking based analysis of end-to-end latency in embedded, real-time systems with clock drifts (SM, ACR, MGD, SR, PVS, PKP, SJ), pp. 296–299.
- DAC-2008-ParkM #debugging #locality #named
- IFRA: instruction footprint recording and analysis for post-silicon bug localization in processors (SBP, SM), pp. 373–378.
- DAC-2008-RajaVBG #modelling #performance
- Transistor level gate modeling for accurate and fast timing, noise, and power analysis (SR, FV, MRB, JG), pp. 456–461.
- DAC-2008-TamPB #automation #layout #locality #precise #using
- Precise failure localization using automated layout analysis of diagnosis candidates (WCT, OP, RD(B), pp. 367–372.
- DAC-2008-VeetilSB #incremental #monte carlo #performance #statistics
- Efficient Monte Carlo based incremental statistical timing analysis (VV, DS, DB), pp. 676–681.
- DAC-2008-YeZP #equation #linear #multi
- Generalized Krylov recycling methods for solution of multiple related linear equation systems in electromagnetic analysis (ZY, ZZ, JRP), pp. 682–687.
- DATE-2008-DasMJZMC #component #detection #implementation #network #performance
- An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System (AD, SM, SJ, JZ, GM, ANC), pp. 1160–1165.
- DATE-2008-DubrovaTT #feedback #on the #synthesis
- On Analysis and Synthesis of (n, k)-Non-Linear Feedback Shift Registers (ED, MT, HT), pp. 1286–1291.
- DATE-2008-ElmqvistN #component #incremental #tool support
- Tool Support for Incremental Failure Mode and Effects Analysis of Component-Based Systems (JE, SNT), pp. 921–927.
- DATE-2008-ErnstJSBC #formal method #optimisation #performance
- Formal Methods in System and MpSoC Performance Analysis and Optimisation (RE, MJ, HS, MB, SC).
- DATE-2008-FrankWESN #architecture #design #evaluation #standard #tool support
- Methods, Tools and Standards for the Analysis, Evaluation and Design of Modern Automotive Architectures (EF, RW, RE, ALSV, MDN), pp. 659–663.
- DATE-2008-FrenkilCU #design #physics #power management
- Power Gating for Ultra-low Leakage: Physics, Design, and Analysis (JF, KC, KU).
- DATE-2008-GhamarianGBS #data flow #graph #parametricity #throughput
- Parametric Throughput Analysis of Synchronous Data Flow Graphs (AHG, MG, TB, SS), pp. 116–121.
- DATE-2008-GlassLRHT #network #optimisation #reliability
- Symbolic Reliability Analysis and Optimization of ECU Networks (MG, ML, FR, CH, JT), pp. 158–163.
- DATE-2008-GoelV #standard
- Current source based standard cell model for accurate signal integrity and timing analysis (AG, SBKV), pp. 574–579.
- DATE-2008-GouraryRUZMG #injection
- Analysis of Oscillator Injection Locking by Harmonic Balance Method (MMG, SGR, SLU, MMZ, BJM, KKG), pp. 318–323.
- DATE-2008-HauslerPHHN #design
- Qalitative and Quantitative Analysis of IC Designs (SH, FP, KH, AH, WN), pp. 935–936.
- DATE-2008-Katoen #design #embedded #evaluation #modelling #roadmap
- Quantitative Evaluation in Embedded System Design: Trends in Modeling and Analysis Techniques (JPK), pp. 86–87.
- DATE-2008-LiTM #grid #named #network #power management
- ETBR: Extended Truncated Balanced Realization Method for On-Chip Power Grid Network Analysis (DL, SXDT, BM), pp. 432–437.
- DATE-2008-Liu #probability #statistics
- Signal Probability Based Statistical Timing Analysis (BL), pp. 562–567.
- DATE-2008-RealCCDV #hardware
- Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis (DR, CC, JC, MD, FV), pp. 1274–1279.
- DATE-2008-Rimolo-DonadioSGKR #metric #optimisation
- Analysis and Optimization of the Recessed Probe Launch for High Frequency Measurements of PCB Interconnects (RRD, CS, XG, YHK, MBR), pp. 252–255.
- DATE-2008-ShiRWP #modelling #statistics
- Latch Modeling for Statistical Timing Analysis (SXS, AR, DW, DZP), pp. 1136–1141.
- DATE-2008-SilvaPS #performance #power management #representation
- Efficient Representation and Analysis of Power Grids (JMSS, JRP, LMS), pp. 420–425.
- DATE-2008-SinanogluM #composition #reduction #testing
- Analysis of The Test Data Volume Reduction Benefit of Modular SOC Testing (OS, EJM), pp. 182–187.
- DATE-2008-VersenSSD #locality
- Test Instrumentation for a Laser Scanning Localization Technique for Analysis of High Speed DRAM devices (MV, AS, JS, DD), pp. 776–779.
- DATE-2008-VinkBW #architecture #performance
- Performance Analysis of SoC Architectures Based on Latency-Rate Servers (JPV, KvB, PvdW), pp. 200–205.
- DATE-2008-VytyazHMM #constraints #design #similarity
- Periodic Steady-State Analysis Augmented with Design Equality Constraints (IV, PKH, UKM, KM), pp. 312–317.
- DATE-2008-WolffPBC #detection #problem #towards
- Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme (FGW, CAP, SB, RSC), pp. 1362–1365.
- DATE-2008-ZengC #polynomial #random
- Deep Submicron Interconnect Timing Model with Quadratic Random Variable Analysis (JKZ, CPC), pp. 1091–1094.
- DATE-2008-ZhouPB #generative #metric #modelling #using
- Harvesting Wasted Heat in a Microprocessor Using Thermoelectric Generators: Modeling, Analysis and Measurement (YZ, SP, SB), pp. 98–103.
- DATE-2008-ZjajoG #fault #multi
- Diagnostic Analysis of Static Errors in Multi-Step Analog to Digital Converters (AZ, JPdG), pp. 74–79.
- HPCA-2008-KimGWB #performance #using
- System level analysis of fast, per-core DVFS using on-chip switching regulators (WK, MSG, GYW, DMB), pp. 123–134.
- LCTES-2008-AnandL #embedded #robust #scheduling
- Robust and sustainable schedulability analysis of embedded software (MA, IL), pp. 61–70.
- LCTES-2008-ReinekeG #policy
- Relative competitive analysis of cache replacement policies (JR, DG), pp. 51–60.
- PDP-2008-AlbrechtRKPM #configuration management #framework #performance #platform #runtime
- Performance Analysis of Bus-Based Interconnects for a Run-Time Reconfigurable Co-Processor Platform (CA, PR, RK, TP, EM), pp. 200–205.
- PDP-2008-KrenekPKFSDSWM #multi #simulation #using
- Multiple Ligand Trajectory Docking Study — Semiautomatic Analysis of Molecular Dynamics Simulations using EGEE gLite Services (AK, MP, JK, JF, ZS, FD, JS, JW, LM), pp. 447–454.
- PPoPP-2008-ChandraSSB #data type #distributed #locality #type inference
- Type inference for locality analysis of distributed data structures (SC, VAS, VS, RB), pp. 11–22.
- PPoPP-2008-PraunBC #concurrent #dependence #modelling #using
- Modeling optimistic concurrency using quantitative dependence analysis (CvP, RB, CC), pp. 185–196.
- PPoPP-2008-WangYFDWJ #automation #source code
- Automated application-level checkpointing based on live-variable analysis in MPI programs (PW, XY, HF, YD, ZW, JJ), pp. 273–274.
- FASE-2008-JurjensSY #automation #security #using
- Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
- FASE-2008-LaraV #modelling
- Translating Model Simulators to Analysis Models (JdL, HV), pp. 77–92.
- FASE-2008-MohaGMD #algorithm #design #detection #fault
- A Domain Analysis to Specify Design Defects and Generate Detection Algorithms (NM, YGG, AFLM, LD), pp. 276–291.
- FoSSaCS-2008-BouyerMR #automaton #robust
- Robust Analysis of Timed Automata via Channel Machines (PB, NM, PAR), pp. 157–171.
- STOC-2008-ODonnell #topic
- Some topics in analysis of boolean functions (RO), pp. 569–578.
- TACAS-2008-BlancKS #modelling #named
- Scoot: A Tool for the Analysis of SystemC Models (NB, DK, NS), pp. 467–470.
- TACAS-2008-LalTKR #bound #concurrent #interprocedural #source code
- Interprocedural Analysis of Concurrent Programs Under a Context Bound (AL, TT, NK, TWR), pp. 282–298.
- TACAS-2008-TorreMP #bound #concurrent #queue
- Context-Bounded Analysis of Concurrent Queue Systems (SLT, PM, GP), pp. 299–314.
- CAV-2008-BackesLMP #abstraction #protocol #security
- The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis (MB, SL, MM, KP), pp. 419–422.
- CAV-2008-BerdineLMRS #concurrent #quantifier #thread
- Thread Quantification for Concurrent Shape Analysis (JB, TLA, RM, GR, SS), pp. 399–413.
- CAV-2008-Cremers #protocol #security #verification
- The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (CJFC), pp. 414–418.
- CAV-2008-GulavaniG #abstract domain #abstraction
- A Numerical Abstract Domain Based on Expression Abstraction and Max Operator with Application in Timing Analysis (BSG, SG), pp. 370–384.
- CAV-2008-GulwaniT #approach #constraints #hybrid
- Constraint-Based Approach for Analysis of Hybrid Systems (SG, AT), pp. 190–203.
- CAV-2008-KimJRSPKS #random #simulation
- Application of Formal Word-Level Analysis to Constrained Random Simulation (HK, HJ, KR, PS, JP, RPK, FS), pp. 487–490.
- CAV-2008-LalR #bound #concurrent
- Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis (AL, TWR), pp. 37–51.
- CAV-2008-YangLBCCDO #scalability
- Scalable Shape Analysis for Systems Code (HY, OL, JB, CC, BC, DD, PWO), pp. 385–398.
- ICLP-2008-Lassen #sequence
- Biosequence Analysis in PRISM (OTL), pp. 809–810.
- ICLP-2008-PilozziS #revisited #termination
- Termination Analysis of CHR Revisited (PP, DDS), pp. 501–515.
- ICLP-2008-Vidal #effectiveness #partial evaluation #predict
- Trace Analysis for Predicting the Effectiveness of Partial Evaluation (GV), pp. 790–794.
- ICST-2008-McQuillanP #alloy #metamodelling #metric #object-oriented #using
- A Metamodel for the Measurement of Object-Oriented Systems: An Analysis using Alloy (JAM, JFP), pp. 288–297.
- IJCAR-2008-AvanziniMS #automation #complexity
- Automated Implicit Computational Complexity Analysis (MA, GM, AS), pp. 132–138.
- IJCAR-2008-HirokawaM #automation #complexity #dependence
- Automated Complexity Analysis Based on the Dependency Pair Method (NH, GM), pp. 364–379.
- ISSTA-2008-DoR #modelling #testing #using
- Using sensitivity analysis to create simplified economic models for regression testing (HD, GR), pp. 51–62.
- ISSTA-2008-LoginovYCFRN #safety #verification
- Verifying dereference safety via expanding-scope analysis (AL, EY, SC, SF, NR, MGN), pp. 213–224.
- ISSTA-2008-XuR #points-to #scalability
- Merging equivalent contexts for scalable heap-cloning-based context-sensitive points-to analysis (G(X, AR), pp. 225–236.
- LICS-2008-Kahlon #abstraction #approach #concurrent #data flow #source code
- Parameterization as Abstraction: A Tractable Approach to the Dataflow Analysis of Concurrent Programs (VK), pp. 181–192.
- SAT-2008-AudemardBHJS #framework
- A Generalized Framework for Conflict Analysis (GA, LB, YH, SJ, LS), pp. 21–27.
- TAP-2008-DunetsSR #bound #data type #relational
- Bounded Relational Analysis of Free Data Types (AD, GS, WR), pp. 99–115.
- TestCom-FATES-2008-GrozLPS #composition #reachability #testing #verification
- Modular System Verification by Inference, Testing and Reachability Analysis (RG, KL, AP, MS), pp. 216–233.
- TestCom-FATES-2008-WangH #concurrent #generative #realtime #testing
- Test Plan Generation for Concurrent Real-Time Systems Based on Zone Coverage Analysis (FW, GDH), pp. 234–249.
- VMCAI-2008-Mendez-LojoH #precise #set #source code
- Precise Set Sharing Analysis for Java-Style Programs (MML, MVH), pp. 172–187.
- ECSA-2007-Zalewski #architecture #development #scalability
- Beyond ATAM: Architecture Analysis in the Development of Large Scale Software Systems (AZ), pp. 92–105.
- WICSA-2007-Apte #distributed #performance
- Performance Analysis of Distributed Software Systems: Approaches Based on Queueing Theory (VA), p. 39.
- WICSA-2007-Florentz #architecture #evaluation #optimisation #representation
- Inside Architecture Evaluation: Analysis and Representation of Optimization Potential (BF), p. 3.
- WICSA-2007-SangwanH #architecture #design #object-oriented
- Integrating Architecture-Centric Methods into Object-Oriented Analysis and Design (RSS, ZEH), p. 32.
- DocEng-2007-ZouLT #approach #html #markov
- Structure and content analysis for html medical articles: a hidden markov model approach (JZ, DXL, GRT), pp. 199–201.
- DRR-2007-ZouLT #layout #online
- Online medical journal article layout analysis (JZ, DXL, GRT).
- ECDL-2007-NakamuraKJOKTOT #web
- Trustworthiness Analysis of Web Search Results (SN, SK, AJ, HO, HK, TT, SO, KT), pp. 38–49.
- HT-2007-HalveyK #online #video
- Analysis of online video search and sharing (MH, MTK), pp. 217–226.
- ICDAR-2007-AntonacopoulosB #framework #layout #performance
- Performance Analysis Framework for Layout Analysis Methods (AA, DB), pp. 1258–1262.
- ICDAR-2007-BelaidRF #data transformation #documentation #image #representation #xml
- XML Data Representation in Document Image Analysis (AB, YR, IF), pp. 78–82.
- ICDAR-2007-BoussellaaZTAB #documentation #named #preprocessor
- PRAAD: Preprocessing and Analysis Tool for Arabic Ancient Documents (WB, AZ, BT, AMA, AB), pp. 1058–1062.
- ICDAR-2007-BulacuKSZ #documentation #layout
- Layout Analysis of Handwritten Historical Documents for Searching the Archive of the Cabinet of the Dutch Queen (MB, RvK, LS, TvdZ), pp. 357–361.
- ICDAR-2007-GazzahA #identification #using
- Arabic Handwriting Texture Analysis for Writer Identification Using the DWT-Lifting Scheme (SG, NEBA), pp. 1133–1137.
- ICDAR-2007-HerouxBAT #automation #comprehension #documentation #generative #image
- Automatic Ground-truth Generation for Document Image Analysis and Understanding (PH, EB, SA, ÉT), pp. 476–480.
- ICDAR-2007-HiranoOOY #documentation #information management #layout
- Text and Layout Information Extraction from Document Files of Various Formats Based on the Analysis of Page Description Language (TH, YO, YO, FY), pp. 262–266.
- ICDAR-2007-KoklaPK #image
- Ink Discrimination Based on Co-occurrence Analysis of Visible and Infrared Images (VK, AP, VK), pp. 1148–1152.
- ICDAR-2007-KwonP #implementation #recognition
- Implementation of Content Analysis System for Recognition of Journals_ Table of Contents (YBK, JP), pp. 1018–1022.
- ICDAR-2007-LemaitreGP #2d #approach #layout #markov
- Preliminary experiments in layout analysis of handwritten letters based on textural and spatial information and a 2D Markovian approach (ML, EG, FJP), pp. 1023–1027.
- ICDAR-2007-MinagawaFTF #image #layout #logic
- Logical Structure Analysis for Form Images with Arbitrary Layout by Belief Propagation (AM, YF, HT, KF), pp. 714–718.
- ICDAR-2007-SekiFNSM #documentation #information management #using
- Information Management System Using Structure Analysis of Paper/Electronic Documents and Its Applications (MS, MF, TN, HS, KM), pp. 689–693.
- ICDAR-2007-Silva #documentation #metric #performance
- New Metrics for Evaluating Performance in Document Analysis Tasks_Application to the Table Case (ACeS), pp. 481–485.
- ICDAR-2007-SmirnovaW #aspect-oriented
- Aspects of Mathematical Expression Analysis in Arabic Handwriting (ESS, SMW), pp. 1183–1187.
- ICDAR-2007-TerradesTV #documentation #overview
- A Review of Shape Descriptors for Document Analysis (ORT, ST, EV), pp. 227–231.
- JCDL-2007-AbbasiC #categorisation #communication #using #visualisation
- Categorization and analysis of text in computer mediated communication archives using visualization (AA, HC), pp. 11–18.
- JCDL-2007-ShimboIM #evaluation #kernel #metric #recommendation #research
- Evaluation of kernel-based link analysis measures on research paper recommendation (MS, TI, YM), pp. 354–355.
- JCDL-2007-ThomasMW #music #resource management
- Preparing resource discovery for digitized music: an analysis of an australian application (JAT, MRM, MW), pp. 298–302.
- JCDL-2007-YangM #named
- CiteSearch: next-generation citation analysis (KY, LIM), pp. 101–102.
- SIGMOD-2007-RusuD #sketching #statistics
- Statistical analysis of sketch estimators (FR, AD), pp. 187–198.
- SIGMOD-2007-StahlbergML #database #forensics #privacy
- Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
- VLDB-2007-BansalK #named #online
- BlogScope: A System for Online Analysis of High Volume Text Streams (NB, NK), pp. 1410–1413.
- VLDB-2007-ParreiraMBCW #community #social
- P2P Authority Analysis for Social Communities (JXP, SM, MB, TC, GW), pp. 1398–1401.
- VLDB-2007-PossNW #why
- Why You Should Run TPC-DS: A Workload Analysis (MP, RON, DW), pp. 1138–1149.
- CSEET-2007-SobelC #design #formal method
- Supporting the Formal Analysis of Software Designs (AEKS, SC), pp. 123–132.
- CSEET-2007-Staron #learning #student #using
- Using Students as Subjects in Experiments--A Quantitative Analysis of the Influence of Experimentation on Students’ Learning Proces (MS), pp. 221–228.
- CSEET-2007-TakemuraNHM #education #motivation #programming
- Analysis of the Relation between the Teaching Materials and Motivation in Programming Education (YT, HN, KLH, KiM), pp. 317–326.
- ITiCSE-2007-Bower #concept #independence #online
- Independent, synchronous and asynchronous an analysis of approaches to online concept formation (MB), pp. 141–145.
- SIGITE-2007-MalikHGS #comparative
- Laboratory modules for conducting comparative analysis of 802.11 frames (RAM, RAH, JEG, AHS), pp. 225–232.
- CSMR-2007-Stoermer #architecture #quality #re-engineering
- Software Quality Attribute Analysis by Architecture Reconstruction (SQUA3RE) (CS), pp. 361–364.
- ICPC-2007-ZhangI #fault
- Error Report Driven Post-Mortem Analysis (YZ, SPI), pp. 208–220.
- ICSM-2007-BrandBS #debugging #detection
- Evidence-Based Analysis and Inferring Preconditions for Bug Detection (DB, MB, VCS), pp. 44–53.
- ICSM-2007-Bruntink #legacy
- Analysis and Transformation of Idiomatic Crosscutting Concerns in Legacy Software Systems (MB), pp. 499–500.
- ICSM-2007-CapraFM #empirical #maintenance #open source
- The Economics of Open Source Software: An Empirical Analysis of Maintenance Costs (EC, CF, FM), pp. 395–404.
- ICSM-2007-Chaabane #detection
- Poor Performing Patterns of Code: Analysis and Detection (RC), pp. 501–502.
- ICSM-2007-CossetteW #dependence #evaluation #semiparsing #using
- Polylingual Dependency Analysis Using Island Grammars: A Cost Versus Accuracy Evaluation (BC, RJW), pp. 214–223.
- ICSM-2007-DongG #dependence #object-oriented
- System-level Usage Dependency Analysis of Object-Oriented Systems (XD, MWG), pp. 375–384.
- ICSM-2007-McMasterM #detection #fault #probability #reduction #testing
- Fault Detection Probability Analysis for Coverage-Based Test Suite Reduction (SM, AMM), pp. 335–344.
- MSR-2007-HerraizGR07a #eclipse #using
- Forecasting the Number of Changes in Eclipse Using Time Series Analysis (IH, JMGB, GR), p. 32.
- MSR-2007-LivieriHMI #evolution #kernel #linux #using
- Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
- MSR-2007-RigbyH #developer #what
- What Can OSS Mailing Lists Tell Us? A Preliminary Psychometric Text Analysis of the Apache Developer Mailing List (PCR, AEH), p. 23.
- PASTE-2007-Brown #composition #integration #named
- AWE: improving software analysis through modular integration of static and dynamic analyses (REB), pp. 69–74.
- PASTE-2007-LeS #detection
- Refining buffer overflow detection via demand-driven path-sensitive analysis (WL, MLS), pp. 63–68.
- PASTE-2007-MarronSHK #library
- Heap analysis in the presence of collection libraries (MM, DS, MVH, DK), pp. 31–36.
- PASTE-2007-Milanova #java #points-to
- Light context-sensitive points-to analysis for java (AM), pp. 25–30.
- PASTE-2007-QianXM #alias #data flow #dependence
- Interstatement must aliases for data dependence analysis of heap locations (JQ, BX, HM), pp. 17–24.
- PASTE-2007-XuPV #java #source code
- Dynamic purity analysis for java programs (HX, CJFP, CV), pp. 75–82.
- SCAM-2007-GutzmannLL #points-to #towards
- Towards Path-Sensitive Points-to Analysis (TG, JL, WL), pp. 59–68.
- SCAM-2007-Marinescu #design #enterprise #named
- DATES: Design Analysis Tool for Enterprise Systems (CM), pp. 157–158.
- SCAM-2007-MoorVHAEOST #source code
- Keynote Address: .QL for Source Code Analysis (OdM, MV, EH, PA, TE, NO, DS, JT), pp. 3–16.
- WCRE-2007-Staiger #reverse engineering #user interface #using #visual notation
- Reverse Engineering of Graphical User Interfaces Using Static Analyses (SS), pp. 189–198.
- IFM-2007-KongOF #algebra #formal method
- Algebraic Approaches to Formal Analysis of the Mondex Electronic Purse System (WK, KO, KF), pp. 393–412.
- RTA-2007-HillsR #logic #named #prototype
- KOOL: An Application of Rewriting Logic to Language Prototyping and Analysis (MH, GR), pp. 246–256.
- SFM-2007-GribaudoT #modelling #performance
- Fluid Models in Performance Analysis (MG, MT), pp. 271–317.
- TLCA-2007-Marion
- Predicative Analysis of Feasibility and Diagonalization (JYM), pp. 290–304.
- TLCA-2007-ShkaravskaKE #first-order #polynomial
- Polynomial Size Analysis of First-Order Functions (OS, RvK, MCJDvE), pp. 351–365.
- ICFP-2007-HageHM
- A generic usage analysis with subeffect qualifiers (JH, SH, AM), pp. 235–246.
- ICFP-2007-HornM #complexity #control flow #precise
- Relating complexity and precision in control flow analysis (DVH, HGM), pp. 85–96.
- ICFP-2007-Sereni #functional #graph #higher-order #source code #termination
- Termination analysis and call graph construction for higher-order functional programs (DS), pp. 71–84.
- ILC-2007-GencerGT #lisp #named #network #social
- CL-SNA: social network analysis with Lisp (MG, CG, VST), p. 17.
- ILC-2007-Harmon #lisp #tool support
- Computational tools for the analysis of spatial patterns of gene expression in Common Lisp (CLH), p. 18.
- AIIDE-2007-Magerko #comparative #interactive
- A Comparative Analysis of Story Representations for Interactive Narrative Systems (BM), pp. 91–94.
- DiGRA-2007-Calleja #concept #game studies
- Revising Immersion: A Conceptual Model for the Analysis of Digital Game Involvement (GC).
- DiGRA-2007-TychsenNBH #experience #game studies #multi
- Cross-format analysis of the gaming experience in multi-player role-playing games (AT, KN, TB, MH).
- DiGRA-2007-ZagalM #framework #game studies
- Temporal Frames: A Unifying Framework for the Analysis of Game Temporality (JPZ, MM).
- AGTIVE-2007-BauerDTW #constraints #ocl #synthesis #verification
- Verification and Synthesis of OCL Constraints Via Topology Analysis (JB, WD, TT, BW), pp. 361–376.
- AGTIVE-2007-ErmelE #configuration management #simulation #visualisation
- Visualization, Simulation and Analysis of Reconfigurable Systems (CE, KE), pp. 265–280.
- CHI-2007-GuimbretiereDH #interactive #named
- ExperiScope: an analysis tool for interaction data (FG, MD, KH), pp. 1333–1342.
- CHI-2007-IqbalH #case study
- Disruption and recovery of computing tasks: field study, analysis, and directions (STI, EH), pp. 677–686.
- CHI-2007-KunoSKYYK #interactive
- Museum guide robot based on sociological interaction analysis (YK, KS, MK, KY, AY, HK), pp. 1191–1194.
- DHM-2007-Godil #representation
- Advanced Human Body and Head Shape Representation and Analysis (AG), pp. 92–100.
- DHM-2007-HaoJZZ #3d #finite
- A Finite Element 3D Model of in Vivo Human Knee Joint Based on MRI for the Tibiofemoral Joint Contact Analysis (ZH, DJ, YZ, JZ), pp. 616–622.
- DHM-2007-HuWWJJZCZ #component #finite
- Finite Element Analysis of a Six-Component Force Sensor for the Trans-Femoral Prosthesis (XH, RW, FW, DJ, XJ, JZ, FC, SZ), pp. 633–639.
- DHM-2007-JiangSZLL
- Shape Analysis of Human Brain with Cognitive Disorders (TJ, FS, WZ, SL, XL), pp. 409–414.
- DHM-2007-MariasDSZGMMT #information management #modelling #multi #validation
- Multi-level Analysis and Information Extraction Considerations for Validating 4D Models of Human Function (KM, DDD, GSS, FZ, ECG, TM, TGM, IGT), pp. 703–709.
- DHM-2007-MeulenS #named
- Ramsis — The Leading Cad Tool for Ergonomic Analysis of Vehicles (PvdM, AS), pp. 1008–1017.
- DHM-2007-NiuLS #3d #comparison #overview #perspective
- Mathematical Methods for Shape Analysis and form Comparison in 3D Anthropometry: A Literature Review (JN, ZL, GS), pp. 161–170.
- DHM-2007-TianDM #design #interactive
- Effecting Validity of Ergonomics Analysis During Virtual Interactive Design (RT, VGD, JM), pp. 988–997.
- DHM-2007-WertherMR #petri net #process #simulation
- Colored Petri Net Based Formal Airport Control Model for Simulation and Analysis of Airport Control Processes (BW, CM, MR), pp. 1027–1036.
- DHM-2007-YangWZJW
- Redundant Muscular Force Analysis of Human Lower Limbs During Rising from a Squat (YY, RW, MZ, DJ, FW), pp. 259–267.
- DHM-2007-YangWZJW07a
- Optimal Control and Synergic Pattern Analysis of Upper Limb Reaching-Grasping Movements (YY, RW, MZ, DJ, FW), pp. 268–275.
- DHM-2007-ZhangZPY #linear #multi
- Estimating Mental Fatigue Based on Multichannel Linear Descriptors Analysis (CZ, CZ, XmP, XY), pp. 521–529.
- HCI-AS-2007-ChoiLU #internet #user interface
- Analysis of Internet Users’ Interests Based on Windows GUI Messages (JC, GL, YU), pp. 881–888.
- HCI-AS-2007-HeHDZM #design #optimisation #overview #reliability
- A Review of Possibilistic Approaches to Reliability Analysis and Optimization in Engineering Design (LPH, HZH, LD, XDZ, QM), pp. 1075–1084.
- HCI-AS-2007-HosonoGIT
- ATM Advertisement and Financial Preferences with Sensory Analysis (NH, SG, HI, YT), pp. 42–47.
- HCI-AS-2007-KimuraTHTAOT #approach #using
- The Analysis of Near-Miss Cases Using Data-Mining Approach (MK, KT, TH, YT, TA, MO, FT), pp. 474–483.
- HCI-AS-2007-Song #complexity #segmentation #visual notation #web
- Analysis of Web Page Complexity Through Visual Segmentation (GS), pp. 114–123.
- HCI-AS-2007-YiJ #approach #online #protocol
- The Antecedents of Online Consumers’ Perceived Usefulness of Website: A Protocol Analysis Approach (CY, ZJ), pp. 142–149.
- HCI-IDU-2007-AnastassovaMB #design #evaluation #prototype
- Prototype Evaluation and User-Needs Analysis in the Early Design of Emerging Technologies (MA, CM, JMB), pp. 383–392.
- HCI-IDU-2007-Cox #usability
- Task Analysis, Usability and Engagement (DC), pp. 1072–1081.
- HCI-IDU-2007-HuangLC #usability
- The Practices of Usability Analysis to Wireless Facility Controller for Conference Room (DHH, YZL, WKC), pp. 490–498.
- HCI-IDU-2007-Karjalainen #why
- Why It Is Difficult to Use a Simple Device: An Analysis of a Room Thermostat (SK), pp. 544–548.
- HCI-IDU-2007-Nguyen-Ngoc #design #process
- Activity Theoretical Analysis and Design Model for Web-Based Experimentation (AVNN), pp. 204–213.
- HCI-IDU-2007-YinC #automation #metric #speech #towards
- Towards Automatic Cognitive Load Measurement from Speech Analysis (BY, FC), pp. 1011–1020.
- HCI-IPT-2007-CowellHBFBJDJF #framework #validation
- Construction and Validation of a Neurophysio-technological Framework for Imagery Analysis (AJC, KSH, CB, SF, AB, DJ, GD, RJ, RF), pp. 1096–1105.
- HCI-IPT-2007-NishimuraRDCSPDD #functional
- Functional Brain Imaging for Analysis of Reading Effort for Computer-Generated Text (EMN, EDR, BAD, JPC, JS, DP, THD, JHD), pp. 1183–1192.
- HCI-MIE-2007-HanYYJ #automation #image #mobile #semantics #using
- Automatic Mobile Content Conversion Using Semantic Image Analysis (EH, JY, HY, KJ), pp. 298–307.
- HCI-MIE-2007-HilligesKPBK #automation #classification #image #quality #sorting #using
- Browsing and Sorting Digital Pictures Using Automatic Image Classification and Quality Analysis (OH, PK, AP, AB, HPK), pp. 882–891.
- HCI-MIE-2007-JenkinsCCS #interactive
- Analysis of User Interaction with Service Oriented Chatbot Systems (MCJ, RC, SJC, DS), pp. 76–83.
- HCI-MIE-2007-KimLRHH #design #network #performance #quality #speech
- Performance Analysis of Perceptual Speech Quality and Modules Design for Management over IP Network (JK, HWL, WR, SHH, MH), pp. 84–93.
- HIMI-IIE-2007-HsuCSWY #assessment #game studies #interface #online #using
- Function Interfaces Assessment of Online Game Websites in Great China Area Using Content Analysis (CIH, CC, CHS, PJW, YJY), pp. 337–346.
- HIMI-IIE-2007-KanekoNATT #generative #mining #using
- A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
- HIMI-IIE-2007-ParkZ #distributed
- Requirement Analysis of the Portal Site Serving Distributed Climate Data for e-Science (TP, LZ), pp. 450–456.
- HIMI-IIE-2007-SatoA #behaviour
- Analysis of Naturalistic Driving Behavior While Approaching an Intersection and Implications for Route Guidance Presentation (TS, MA), pp. 618–627.
- HIMI-IIE-2007-TaguchiAT
- Information on the Causal Relationship Between Store kaizen and Store Features That Attract Customers by Covariance Structural Analysis (YT, YA, TT), pp. 973–982.
- HIMI-IIE-2007-ZhangC #behaviour #collaboration
- A Communicative Behaviour Analysis of Art-Technology Collaboration (YZ, LC), pp. 212–221.
- HIMI-IIE-2007-ZhangYIS #case study #development #energy
- A Study on Analysis Support System of Energy and Environmental System for Sustainable Development Based on MFM and GIS (QZ, HY, HI, HS), pp. 1148–1157.
- HIMI-MTT-2007-BalasuriyaMWO #ubiquitous
- Kansei Analysis for Robotic Motions in Ubiquitous Environments (JCB, CAM, KW, MO), pp. 804–813.
- HIMI-MTT-2007-KieliszewskiCBLH #identification #visualisation
- A Visualization Solution for the Analysis and Identification of Workforce Expertise (CAK, JC, AB, AL, TH), pp. 317–326.
- HIMI-MTT-2007-KumeM #web
- Construction of Web Application for Cusp Surface Analysis (YK, ZAHM), pp. 669–676.
- HIMI-MTT-2007-LeeLKC #correlation #human-computer #mobile
- Correlation Analysis of Available Bandwidth Estimators for Mobile HCI (DL, CL, JK, JWC), pp. 687–696.
- HIMI-MTT-2007-LehtoPPL
- Text Analysis of Consumer Reviews: The Case of Virtual Travel Firms (XL, JKP, OP, MRL), pp. 490–499.
- HIMI-MTT-2007-LinL #automation
- A Bayesian Methodology for Semi-automated Task Analysis (SCL, MRL), pp. 697–704.
- HIMI-MTT-2007-NakayasuNH #communication #metric #performance
- Measurement and Analysis of Performance of Human Perception for Information Communication Technology (HN, MN, HH), pp. 126–135.
- HIMI-MTT-2007-OrimoKMT #evaluation #recommendation
- Analysis and Evaluation of Recommendation Systems (EO, HK, TM, AT), pp. 144–152.
- HIMI-MTT-2007-ShinyashikiMHKUN #embedded
- A Suggestion for Analysis of Unexpected Obstacles in Embedded System (YS, TM, MH, KK, NU, TN), pp. 755–768.
- HIMI-MTT-2007-YonemuraYTO #communication #visual notation
- Communication Analysis of Visual Support System That Uses Line Drawing Expression (SY, TY, YT, JO), pp. 359–365.
- OCSC-2007-CetinVF #development #distributed #human-computer
- An Analysis of Involvement of HCI Experts in Distributed Software Development: Practical Issues (GÇ, DV, SF), pp. 32–40.
- OCSC-2007-DayF #community #concept #named #network #research
- CNA2 — Communications and Community; Neighborhoods and Networks; Action and Analysis: Concepts and Methods for Community Technology Research (PD, CF), pp. 301–314.
- VISSOFT-2007-BohnerGHM #source code #uml #using #visual notation #visualisation
- Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
- VISSOFT-2007-KienleMM #challenge #dependence
- Dependencies Analysis of Azureus with Rigi: Tool Demo Challenge (HMK, HAM, JM), pp. 159–160.
- VISSOFT-2007-LangelierD #using #visual notation
- Visual Analysis of Azureus using VERSO (GL, KD), pp. 163–164.
- EDOC-2007-BaudryNT #modelling #requirements
- Model-Driven Engineering for Requirements Analysis (BB, CN, YLT), pp. 459–466.
- EDOC-2007-GruhnK #automation #framework #mobile
- An Analysis Framework for Mobile Workforce Automation (VG, AK), pp. 193–201.
- EDOC-2007-JohnsonJSU #architecture #enterprise
- A Tool for Enterprise Architecture Analysis (PJ, EJ, TS, JU), pp. 142–156.
- EDOC-2007-NarmanJN #architecture #enterprise #framework #quality
- Enterprise Architecture: A Framework Supporting System Quality Analysis (PN, PJ, LN), pp. 130–141.
- ICEIS-AIDSS-2007-Aalst #mining #process #roadmap #verification
- Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
- ICEIS-AIDSS-2007-BecksH #industrial #mining
- Trend Analysis Based on Explorative Data and Text Mining: A Decision Support System for the European Home Textile Industry (AB, JH), pp. 253–258.
- ICEIS-AIDSS-2007-Rodriguez-EliasMFVS #approach #design #identification #information management
- Knowledge Flow Analysis to Identify Knowledge Needs for the Design of Knowledge Management Systems and Strategies — A Methodological Approach (OMRE, AIMG, JF, AV, JPS), pp. 492–497.
- ICEIS-AIDSS-2007-SohniusJME #approach #assessment #design #performance #simulation
- An Approach for Assessing Design Systems: Design System Simulation and Analysis for Performance Assessment (RS, EJ, WEM, VE), pp. 231–236.
- ICEIS-DISI-2007-Aalst #mining #process #roadmap #verification
- Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
- ICEIS-EIS-2007-Aalst #mining #process #roadmap #verification
- Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
- ICEIS-EIS-2007-HuangZZ #approach #process #workflow
- A New Approach for Workflow Process Delta Analysis Based on SYN-NET (XQH, WZ, SZ), pp. 480–488.
- ICEIS-EIS-2007-MarquesRFRAAM #aspect-oriented
- Aspect-Oriented Analysis Applied to the Space Domain (AM, RR, RF, RAR, SA, JA, AMDM), pp. 71–79.
- ICEIS-HCI-2007-Aalst #mining #process #roadmap #verification
- Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
- ICEIS-HCI-2007-Godet-BarRDJ #human-computer
- Interactional Objects: HCI Concerns in the Analysis Phase of the Symphony Method (GGB, DR, SDC, DJ), pp. 37–44.
- ICEIS-J-2007-Aalst07a #challenge #process
- Challenges in Business Process Analysis (WMPvdA), pp. 27–42.
- ICEIS-SAIC-2007-Aalst #mining #process #roadmap #verification
- Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
- ICEIS-SAIC-2007-KirikovaSGO #abstraction #flexibility #process
- Analysis of Business Process Flexibility at Different Levels of Abstraction (MK, RS, JG, JO), pp. 389–396.
- CIKM-2007-FortunaRM #classification #network #social
- Improving the classification of newsgroup messages through social network analysis (BF, EMR, NMF), pp. 877–880.
- CIKM-2007-JurczykA #community #using
- Discovering authorities in question answer communities by using link analysis (PJ, EA), pp. 919–922.
- CIKM-2007-RaoCFB #network #peer-to-peer
- Optimal proactive caching in peer-to-peer network: analysis and application (WR, LC, AWCF, YB), pp. 663–672.
- CIKM-2007-TanWTC #novel #problem #sentiment
- A novel scheme for domain-transfer problem in the context of sentiment analysis (ST, GW, HT, XC), pp. 979–982.
- CIKM-2007-YangQZGL #graph #using #web
- Link analysis using time series of web graphs (LY, LQ, YPZ, BG, TYL), pp. 1011–1014.
- CIKM-2007-ZhangYGY #adaptation #correlation #representation
- Boolean representation based data-adaptive correlation analysis over time series streams (TZ, DY, YG, GY), pp. 203–212.
- ECIR-2007-MeenaP #sentiment #using
- Sentence Level Sentiment Analysis in the Presence of Conjuncts Using Linguistic Analysis (AM, TVP), pp. 573–580.
- ICML-2007-BusseOB #clustering #rank
- Cluster analysis of heterogeneous rank data (LMB, PO, JMB), pp. 113–120.
- ICML-2007-CazzantiG #similarity
- Local similarity discriminant analysis (LC, MRG), pp. 137–144.
- ICML-2007-dAspremontBG #component
- Full regularization path for sparse principal component analysis (Ad, FRB, LEG), pp. 177–184.
- ICML-2007-DingL #adaptation #clustering #reduction #using
- Adaptive dimension reduction using discriminant analysis and K-means clustering (CHQD, TL), pp. 521–528.
- ICML-2007-DollarRB #algorithm #learning
- Non-isometric manifold learning: analysis and an algorithm (PD, VR, SJB), pp. 241–248.
- ICML-2007-MaLTK #correlation #similarity
- Discriminant analysis in correlation similarity measure space (YM, SL, ET, MK), pp. 577–584.
- ICML-2007-Ye #linear
- Least squares linear discriminant analysis (JY), pp. 1087–1093.
- ICML-2007-ZhangC #component #independence
- Nonlinear independent component analysis with minimal nonlinear distortion (KZ, LC), pp. 1127–1134.
- KDD-2007-CastanoWCST
- On-board analysis of uncalibrated data for a spacecraft at mars (RC, KW, SAC, TMS, BT), pp. 922–930.
- KDD-2007-ChiZSTT #community
- Structural and temporal analysis of the blogosphere through community factorization (YC, SZ, XS, JT, BLT), pp. 163–172.
- KDD-2007-JanssensGM #clustering #hybrid #mining
- Dynamic hybrid clustering of bioinformatics by incorporating text mining and citation analysis (FALJ, WG, BDM), pp. 360–369.
- KDD-2007-MoserGE #clustering #specification
- Joint cluster analysis of attribute and relationship data withouta-priori specification of the number of clusters (FM, RG, ME), pp. 510–519.
- KDD-2007-Sandler #modelling #probability
- Hierarchical mixture models: a probabilistic analysis (MS), pp. 580–589.
- KDD-2007-WangPM #component
- Generalized component analysis for text with heterogeneous attributes (XW, CP, AM), pp. 794–803.
- KDD-2007-WuWCX #composition
- Local decomposition for rare class analysis (JW, HX, PW, JC), pp. 814–823.
- KDD-2007-YeJC #kernel #learning #matrix #polynomial #programming
- Learning the kernel matrix in discriminant analysis via quadratically constrained quadratic programming (JY, SJ, JC), pp. 854–863.
- MLDM-2007-GrimH #category theory #clustering
- Minimum Information Loss Cluster Analysis for Categorical Data (JG, JH), pp. 233–247.
- SEKE-2007-AnnoniRT #process #requirements
- Data and Process Analyses of Data Warehouse Requirements (EA, FR, OT), pp. 191–196.
- SEKE-2007-GaoTHCCF #modelling #testing #towards
- Toward Modeling and Analysis for Software Installation Testing (JZG, ST, CPH, YC, AC, TF), pp. 111–116.
- SEKE-2007-KanaskarSR #approach #detection #using
- A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
- SEKE-2007-TagliatiJR #evolution
- Requirement Analysis Evolution through Patterns (LVT, RJ, GR), pp. 197–202.
- SEKE-2007-VandalGG #middleware #performance
- Performance Analysis of the Active Object Pattern in Middleware (PJV, SSG, ASG), pp. 730–735.
- SIGIR-2007-AzzopardiRB #query #topic #using
- Building simulated queries for known-item topics: an analysis using six european languages (LA, MdR, KB), pp. 455–462.
- SIGIR-2007-BozzonCFN #modelling #query #web
- Lexical analysis for modeling web query reformulation (AB, PAC, CSF, WN), pp. 739–740.
- SIGIR-2007-FernandezL #detection #using
- Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
- SIGIR-2007-Fujii #retrieval
- Enhancing patent retrieval by citation analysis (AF), pp. 793–794.
- SIGIR-2007-JurczykA #ranking
- Hits on question answer portals: exploration of link analysis for author ranking (PJ, EA), pp. 845–846.
- SIGIR-2007-MizzaroR #evaluation #information retrieval #network
- Hits hits TREC: exploring IR evaluation results with network analysis (SM, SR), pp. 479–486.
- SIGIR-2007-NguyenJYF #peer-to-peer #query
- An analysis of peer-to-peer file-sharing system queries (LTN, DJ, WGY, OF), pp. 855–856.
- MoDELS-2007-JayaramanWEG #composition #detection #feature model #interactive #product line #using
- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
- MoDELS-2007-KonradGC #incremental #modelling #process
- i2MAP : An Incremental and Iterative Modeling and Analysis Process (SK, HG, BHCC), pp. 451–466.
- MoDELS-2007-WeilMNDB #automation #design #modelling #semantics
- Automated Semantic Analysis of Design Models (FW, BEM, DN, PD, AvdB), pp. 166–180.
- SPLC-2007-Jensen #case study #development #experience #multi #product line
- Experiences with Product Line Development of Multi-Discipline Analysis Software at Overwatch Textron Systems (PJ), pp. 35–43.
- SPLC-2007-SchirmeierS #framework #product line
- Tailoring Infrastructure Software Product Lines by Static Application Analysis (HS, OS), pp. 255–260.
- MoDELS-2007-JayaramanWEG #composition #detection #feature model #interactive #product line #using
- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
- MoDELS-2007-KonradGC #incremental #modelling #process
- i2MAP : An Incremental and Iterative Modeling and Analysis Process (SK, HG, BHCC), pp. 451–466.
- MoDELS-2007-WeilMNDB #automation #design #modelling #semantics
- Automated Semantic Analysis of Design Models (FW, BEM, DN, PD, AvdB), pp. 166–180.
- OOPSLA-2007-TanM #c #java #named
- Ilea: inter-language analysis across java and c (GT, GM), pp. 39–56.
- TOOLS-EUROPE-2007-SteimannM #design #interface #towards
- Type Access Analysis: Towards Informed Interface Design (FS, PM), pp. 147–164.
- AdaEurope-2007-PanunzioV #metamodelling #modelling #process
- A Metamodel-Driven Process Featuring Advanced Model-Based Timing Analysis (MP, TV), pp. 128–141.
- LOPSTR-2007-Mendez-LojoNH #approach #flexibility #object-oriented #source code
- A Flexible, (C)LP-Based Approach to the Analysis of Object-Oriented Programs (MML, JAN, MVH), pp. 154–168.
- LOPSTR-2007-NguyenGSS #dependence #graph #logic programming #source code #termination
- Termination Analysis of Logic Programs Based on Dependency Graphs (MTN, JG, PSK, DDS), pp. 8–22.
- PADL-2007-AlbertGHP #bytecode #java #logic programming #source code #using #verification
- Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
- PADL-2007-EichbergKSMO #automation #prolog
- Automatic Incrementalization of Prolog Based Static Analyses (ME, MK, DS, MM, KO), pp. 109–123.
- PLDI-2007-CheremPR #detection #memory management #using
- Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
- PLDI-2007-GotsmanBCS #thread
- Thread-modular shape analysis (AG, JB, BC, MS), pp. 266–277.
- PLDI-2007-GuoVA #induction #recursion #synthesis
- Shape analysis with inductive recursion synthesis (BG, NV, DIA), pp. 256–265.
- PLDI-2007-HardekopfL #performance #pointer
- The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code (BH, CL), pp. 290–299.
- PLDI-2007-LattnerLA #points-to
- Making context-sensitive points-to analysis with heap cloning practical for the real world (CL, AL, VSA), pp. 278–289.
- PLDI-2007-NarayanasamyWTEC #automation
- Automatically classifying benign and harmful data racesallusing replay analysis (SN, ZW, JT, AE, BC), pp. 22–31.
- PLDI-2007-WassermannS #injection #precise #web
- Sound and precise analysis of web applications for injection vulnerabilities (GW, ZS), pp. 32–41.
- POPL-2007-BerdineCCDO
- Variance analyses from invariance analyses (JB, AC, BC, DD, PWO), pp. 211–224.
- POPL-2007-JhalaM #interprocedural #source code
- Interprocedural analysis of asynchronous programs (RJ, RM), pp. 339–350.
- POPL-2007-KahlonG #automaton #on the
- On the analysis of interacting pushdown systems (VK, AG), pp. 303–314.
- POPL-2007-Might #higher-order #source code
- Logic-flow analysis of higher-order programs (MM), pp. 185–198.
- PPDP-2007-HristovaTL #performance #policy #trust
- Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
- QAPL-2007-PierroHW #data flow #on the #probability
- On Probabilistic Techniques for Data Flow Analysis (ADP, CH, HW), pp. 59–77.
- SAS-2007-CalcagnoDOY
- Footprint Analysis: A Shape Analysis That Discovers Preconditions (CC, DD, PWO, HY), pp. 402–418.
- SAS-2007-ChangRN #invariant
- Shape Analysis with Structural Invariant Checkers (BYEC, XR, GCN), pp. 384–401.
- SAS-2007-HardekopfL #equivalence #pointer
- Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis (BH, CL), pp. 265–280.
- SAS-2007-KamilY #distributed #pointer #source code
- Hierarchical Pointer Analysis for Distributed Programs (AK, KAY), pp. 281–297.
- SAS-2007-LerouxS #data flow
- Accelerated Data-Flow Analysis (JL, GS), pp. 184–199.
- SAS-2007-MagillBCC
- Arithmetic Strengthening for Shape Analysis (SM, JB, EMC, BC), pp. 419–436.
- SAS-2007-Mycroft #design #evolution #hardware #motivation #programming language
- Programming Language Design and Analysis Motivated by Hardware Evolution (AM), pp. 18–33.
- SAS-2007-PayetS #bytecode #java
- Magic-Sets Transformation for the Analysis of Java Bytecode (ÉP, FS), pp. 452–467.
- SIGAda-2007-SinghoffP #modelling
- AADL modeling and analysis of hierarchical schedulers (FS, AP), pp. 41–50.
- RE-2007-MetzgerHPSS #automation #documentation #formal method #product line #variability
- Disambiguating the Documentation of Variability in Software Product Lines: A Separation of Concerns, Formalization and Automated Analysis (AM, PH, KP, PYS, GS), pp. 243–253.
- REFSQ-2007-GuelfiP #approach #flexibility #product line #requirements
- A Flexible Requirements Analysis Approach for Software Product Lines (NG, GP), pp. 78–92.
- REFSQ-2007-RegnellHB #mobile #non-functional #performance #quality #requirements
- A Quality Performance Model for Cost-Benefit Analysis of Non-functional Requirements Applied to the Mobile Handset Domain (BR, MH, RBS), pp. 277–291.
- ASE-2007-ArtziKGE
- Combined static and dynamic mutability analysis (SA, AK, DG, MDE), pp. 104–113.
- ASE-2007-ShiriHR #feature model #interactive #maintenance #perspective
- Feature interaction analysis: a maintenance perspective (MS, JH, JR), pp. 437–440.
- ESEC-FSE-2007-Coman #automation #developer #low level #using
- An analysis of developers’ tasks using low-level, automatically collected data (IDC), pp. 579–582.
- ESEC-FSE-2007-Diep
- Analysis of a deployed software (MD), pp. 595–598.
- ESEC-FSE-2007-DubocRW #framework #scalability
- A framework for characterization and analysis of software system scalability (LD, DSR, TW), pp. 375–384.
- ESEC-FSE-2007-KumarSCP #design #framework #optimisation #realtime #statistics
- A profile-driven statistical analysis framework for the design optimization of soft real-time applications (TK, JS, RC, SP), pp. 529–532.
- ESEC-FSE-2007-LarssonME #integration #statistics
- Product integration improvement based on analysis of build statistics (SL, PM, FE), pp. 505–508.
- ESEC-FSE-2007-RamasubbuB #development #distributed #empirical #performance
- Globally distributed software development project performance: an empirical analysis (NR, RKB), pp. 125–134.
- ESEC-FSE-2007-YuBP #automation #ocl
- Automated size analysis for OCL (FY, TB, EP), pp. 331–340.
- GTTSE-2007-WykM #composition #java
- Adding Dimension Analysis to Java as a Composable Language Extension (EVW, YM), pp. 442–456.
- ICSE-2007-FuR #architecture #exception #java
- Exception-Chain Analysis: Revealing Exception Handling Architecture in Java Server Applications (CF, BGR), pp. 230–239.
- ICSE-2007-Jones #case study #design #implementation #re-engineering
- Bringing the Systems Analysis and Design Course into 21^st Century: A Case Study in Implementing Modern Software Engineering Principles (CGJ), pp. 744–747.
- ICSE-2007-LivieriHMI #distributed #open source #source code #using #visualisation
- Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
- ICSE-2007-RajapakseJ #trade-off #using #web
- Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis (DCR, SJ), pp. 116–126.
- ICSE-2007-ZaraketAK #relational
- Sequential Circuits for Relational Analysis (FAZ, AA, SK), pp. 13–22.
- SAC-2007-DistanteRC #framework #modelling #process #web
- Modeling business processes in web applications: an analysis framework (DD, GR, GC), pp. 1677–1682.
- SAC-2007-HwangPJ #implementation #performance
- An implementation and performance analysis of slave-side arbitration schemes for the ML-AHB BusMatrix (SYH, HJP, KSJ), pp. 1545–1551.
- SAC-2007-KassabL #effectiveness #personalisation #towards
- Towards a synthetic analysis of user’s information need for more effective personalized filtering services (RK, JCL), pp. 852–859.
- SAC-2007-Liebrock #integration #re-engineering
- Integration of well posedness analysis in software engineering (LML), pp. 1479–1483.
- SAC-2007-LiebrockMBPCSU #design #forensics #set
- A preliminary design for digital forensics analysis of terabyte size data sets (LML, NM, DPB, RP, EC, MS, VU), pp. 190–191.
- SAC-2007-PloegerS #automation #documentation #verification
- Analysis and verification of an automatic document feeder (BP, LJS), pp. 1499–1505.
- SAC-2007-ShinH #automation #comparison #difference #process
- Comparison of two activity analyses for automatic differentiation: context-sensitive flow-insensitive vs. context-insensitive flow-sensitive (JS, PDH), pp. 1323–1329.
- SAC-2007-YangWK #modelling #partial order
- General dominant relationship analysis based on partial order models (ZY, BW, MK), pp. 470–474.
- SAC-2007-ZengWN #classification
- Text classification based on partial least square analysis (XQZ, MWW, JYN), pp. 834–838.
- CASE-2007-BogdanKFD #design #fuzzy
- Fuzzy Arithmetic-based Stability Analysis and Design of Fuzzy Controller (SB, ZK, IF, ID), pp. 968–973.
- CASE-2007-BraunP
- Analysis of the Effects of Truncation on the EWMA Observer (MWB, NSP), pp. 472–477.
- CASE-2007-ChandrashekarN #coordination #network
- A Shapley Value Analysis to Coordinate the Formation of Procurement Networks (TSC, YN), pp. 664–669.
- CASE-2007-LiW #approach #reliability
- An Importance Sampling Based Approach for Reliability Analysis (FL, TW), pp. 956–961.
- CASE-2007-MitaniYH #using
- Feeding of Submillimeter-sized Microparts along a Saw-tooth Surface Using Only Horizontal Vibration: Analysis of Convexities on the Surface of Microparts (AM, TY, SH), pp. 69–76.
- CASE-2007-PanH
- Diagnosability Analysis and Sensor Selection in Discrete-Event Systems with Permanent Failures (JP, SHZ), pp. 869–874.
- CASE-2007-SunFSFCD #overview #paradigm
- Decision Paradigms in the Semiconductor Supply Chain: A Survey and Analysis (YS, ALF, DLS, JWF, TEC, BMD), pp. 106–110.
- CASE-2007-WangL #approximate #modelling #reliability
- Approximate Analysis of Re-Entrant Lines with Bernoulli Reliability Models (CW, JL), pp. 398–403.
- CASE-2007-YiDZ0 #clustering #linear #throughput #tool support
- Throughput Analysis of Linear Cluster Tools (JY, SD, MTZ, PvdM), pp. 1063–1068.
- CASE-2007-YooG #network #process
- Intruder Activity Analysis under Unreliable Sensor Networks (TSY, HEG), pp. 578–584.
- CC-2007-CheremR #lightweight #summary
- A Practical Escape and Effect Analysis for Building Lightweight Method Summaries (SC, RR), pp. 172–186.
- CC-2007-FalconerKIMFB #declarative #framework #optimisation
- A Declarative Framework for Analysis and Optimization (HF, PHJK, DMI, MRM, TF, OB), pp. 218–232.
- CC-2007-ScholzB #composition #data flow #framework #using
- A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees (BS, JB), pp. 202–217.
- CGO-2007-KotzmannM #optimisation #runtime
- Run-Time Support for Optimizations Based on Escape Analysis (TK, HM), pp. 49–60.
- COCV-2007-GallardoJM #data flow #on the fly #verification
- On-the-Fly Data Flow Analysis Based on Verification Technology (MdMG, CJ, PM), pp. 33–48.
- DAC-2007-AmbroseRP #injection #named #random
- RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks (JAA, RGR, SP), pp. 489–492.
- DAC-2007-BurnsKMBTD #comparative #design #statistics
- Comparative Analysis of Conventional and Statistical Design Techniques (SMB, MK, NM, KAB, JT, VD), pp. 238–243.
- DAC-2007-ChengXH #statistics
- Non-Linear Statistical Static Timing Analysis for Non-Gaussian Variation Sources (LC, JX, LH), pp. 250–255.
- DAC-2007-DadgourB #design #hybrid #power management
- Design and Analysis of Hybrid NEMS-CMOS Circuits for Ultra Low-Power Applications (HFD, KB), pp. 306–311.
- DAC-2007-FengLZ #higher-order #parametricity #performance #reduction #statistics #using
- Fast Second-Order Statistical Static Timing Analysis Using Parameter Dimension Reduction (ZF, PL, YZ), pp. 244–249.
- DAC-2007-GandikotaCBSB #set
- Top-k Aggressors Sets in Delay Noise Analysis (RG, KC, DB, DS, MRB), pp. 174–179.
- DAC-2007-GhodratLR #estimation #hybrid #using
- Accelerating System-on-Chip Power Analysis Using Hybrid Power Estimation (MAG, KL, AR), pp. 883–886.
- DAC-2007-HagiescuBCSGR #network #performance
- Performance Analysis of FlexRay-based ECU Networks (AH, UDB, SC, PS, PVVG, SR), pp. 284–289.
- DAC-2007-HariziHOB #modelling #performance
- Efficient Modeling Techniques for Dynamic Voltage Drop Analysis (HH, RH, MO, EB), pp. 706–711.
- DAC-2007-HuangTKC #case study #flexibility #reliability
- Reliability Analysis for Flexible Electronics: Case Study of Integrated a-Si: H TFT Scan Driver (TCH, HYT, CPK, KTC), pp. 966–969.
- DAC-2007-KirnerS #execution #modelling #worst-case
- Modeling the Function Cache for Worst-Case Execution Time Analysis (RK, MS), pp. 471–476.
- DAC-2007-LiY #power management #statistics
- Statistical Analysis of Full-Chip Leakage Power Considering Junction Tunneling Leakage (TL, ZY), pp. 99–102.
- DAC-2007-Natale #challenge #platform
- Virtual Platforms and Timing Analysis: Status, Challenges and Future Directions (MDN), pp. 551–555.
- DAC-2007-PimentelP
- Experimental Jitter Analysis in a FlexCAN Based Drive-by-Wire Automotive Application (JRP, JP), pp. 290–293.
- DAC-2007-RamalingamSNOP #composition #modelling #using
- Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
- DAC-2007-SeokHSB #design #optimisation
- Analysis and Optimization of Sleep Modes in Subthreshold Circuit Design (MS, SH, DS, DB), pp. 694–699.
- DAC-2007-SinghalBSLNC #modelling #simulation
- Modeling and Analysis of Non-Rectangular Gate for Post-Lithography Circuit Simulation (RS, AB, ARS, FL, SRN, YC), pp. 823–828.
- DAC-2007-SundaresanM #distributed
- An Analysis of Timing Violations Due to Spatially Distributed Thermal Effects in Global Wires (KS, NRM), pp. 515–520.
- DAC-2007-VenkataramaniBCG
- Global Critical Path: A Tool for System-Level Timing Analysis (GV, MB, TC, SCG), pp. 783–786.
- DAC-2007-YuDFL #framework #nondeterminism #process #statistics
- A Framework for Accounting for Process Model Uncertainty in Statistical Static Timing Analysis (GY, WD, ZF, PL), pp. 829–834.
- DATE-2007-0004XJ #novel #statistics
- A novel criticality computation method in statistical timing analysis (FW, YX, HJ), pp. 1611–1616.
- DATE-2007-AarajRRJ #energy #execution #framework #platform
- Energy and execution time analysis of a software-based trusted platform module (NA, AR, SR, NKJ), pp. 1128–1133.
- DATE-2007-BauerPT #hybrid #modelling
- Tool-support for the analysis of hybrid systems and models (AB, MP, MT), pp. 924–929.
- DATE-2007-BondarevCW #component #design #embedded #named #performance #tool support
- CARAT: a toolkit for design and performance analysis of component-based embedded systems (ERVB, MRVC, PHNdW), pp. 1024–1029.
- DATE-2007-BorremansLWR #multi #using
- Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis (JB, LDL, PW, YR), pp. 261–266.
- DATE-2007-BronckersSPVR #interactive #simulation #verification
- Interactive presentation: Simulation methodology and experimental verification for the analysis of substrate noise on LC-VCO’s (SB, CS, GVdP, GV, YR), pp. 1520–1525.
- DATE-2007-ChenZLC #performance #statistics
- Fast statistical circuit analysis with finite-point based transistor model (MC, WZ, FL, YC), pp. 1391–1396.
- DATE-2007-ChoudhuryM #logic #reliability #scalability
- Accurate and scalable reliability analysis of logic circuits (MRC, KM), pp. 1454–1459.
- DATE-2007-DasM
- Sensitivity analysis for fault-analysis and tolerance in RF front-end circuitry (TD, PRM), pp. 1277–1282.
- DATE-2007-DuboisMAWLW #embedded #quality
- Test quality analysis and improvement for an embedded asynchronous FIFO (TD, EJM, MA, PW, EL, CW), pp. 859–864.
- DATE-2007-ErdoganO #using
- An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
- DATE-2007-GargM #design #interactive #multi #process #throughput
- Interactive presentation: System-level process variation driven throughput analysis for single and multiple voltage-frequency island designs (SG, DM), pp. 403–408.
- DATE-2007-HuangT #correlation #multi #performance #using
- Performance analysis of multimedia applications using correlated streams (KH, LT), pp. 912–917.
- DATE-2007-JuCR #scheduling
- Accounting for cache-related preemption delay in dynamic priority schedulability analysis (LJ, SC, AR), pp. 1623–1628.
- DATE-2007-LasbouyguesWAM
- Temperature and voltage aware timing analysis: application to voltage drops (BL, RW, NA, PM), pp. 1012–1017.
- DATE-2007-Miskov-ZivanovM #fault
- Soft error rate analysis for sequential circuits (NMZ, DM), pp. 1436–1441.
- DATE-2007-NardiTNAGLS #design #statistics #using
- Use of statistical timing analysis on real designs (AN, ET, SN, AA, SG, TL, JS), pp. 1605–1610.
- DATE-2007-NeyGLPVB #fault
- Slow write driver faults in 65nm SRAM technology: analysis and March test solution (AN, PG, CL, SP, AV, MB), pp. 528–533.
- DATE-2007-OgrasM #modelling #performance
- Analytical router modeling for networks-on-chip performance analysis (ÜYO, RM), pp. 1096–1101.
- DATE-2007-PanC #component #fault #framework #quality #reliability
- A framework for system reliability analysis considering both system error tolerance and component test quality (SJ(RP, KTC), pp. 1581–1586.
- DATE-2007-SchlieckerSE #composition #data flow #graph #integration #performance
- Performance analysis of complex systems by integration of dataflow graphs and compositional performance analysis (SS, SS, RE), pp. 273–278.
- DATE-2007-TadesseSLBG #modelling #satisfiability #using
- Accurate timing analysis using SAT and pattern-dependent delay models (DT, DS, EL, RIB, JG), pp. 1018–1023.
- DATE-2007-TannirK #performance
- Efficient nonlinear distortion analysis of RF circuits (DT, RK), pp. 255–260.
- DATE-2007-TiwaryP #named
- WAVSTAN: waveform based variational static timing analysis (SKT, JRP), pp. 1000–1005.
- DATE-2007-XuRC #interactive #pipes and filters #power management
- Interactive presentation: Analysis of power consumption and BER of flip-flop based interconnect pipelining (JX, AR, MHC), pp. 1218–1223.
- DATE-2007-ZhangOSFKB #approach #named #parametricity #process
- CMCal: an accurate analytical approach for the analysis of process variations with non-gaussian parameters and nonlinear functions (MZ, MO, DS, MF, HK, EB), pp. 243–248.
- HPDC-2007-LeeS #performance #precise
- Precise and realistic utility functions for user-centric performance analysis of schedulers (CBL, AS), pp. 107–116.
- ISMM-2007-AlbertGG #bytecode #java
- Heap space analysis for java bytecode (EA, SG, MGZ), pp. 105–116.
- LCTES-2007-CoffmanHMW #parametricity
- Generalizing parametric timing analysis (JC, CAH, FM, DBW), pp. 152–154.
- LCTES-2007-Kastner #abstract interpretation #execution #worst-case
- Safe worst-case execution time analysis by abstract interpretation of executable code (DK), p. 135.
- LCTES-2007-YanZ
- WCET analysis of instruction caches with prefetching (JY, WZ), pp. 175–184.
- PDP-2007-AlmeidaGB #clustering #multi #performance #symmetry
- Performance analysis for clusters of symmetric multiprocessors (FA, JAG, JMB), pp. 121–128.
- PDP-2007-Baz #algorithm #architecture #communication #implementation #message passing #parallel
- Communication Study and Implementation Analysis of Parallel Asynchronous Iterative Algorithms on Message Passing Architectures (DEB), pp. 77–83.
- PDP-2007-LorenzoMMV #automation #composition #control flow #process #web service
- Automatic Analysis of Control Flow inWeb Services Composition Processes (GDL, FM, NM, VV), pp. 299–306.
- PDP-2007-NouJCHCLT #framework #grid #middleware #monitoring
- Monitoring and Analysis Framework for Grid Middleware (RN, FJ, DC, KH, JC, JL, JT), pp. 129–133.
- PPoPP-2007-AgarwalBSS #source code
- May-happen-in-parallel analysis of X10 programs (SA, RB, VS, RKS), pp. 183–193.
- PPoPP-2007-KejariwalTGLKBNVP #concurrent #cpu #performance #specification #thread #using
- Tight analysis of the performance potential of thread speculation using spec CPU 2006 (AK, XT, MG, WL, SK, UB, AN, AVV, CDP), pp. 215–225.
- SOSP-2007-SuAF #configuration management #named #operating system
- AutoBash: improving configuration management with operating system causality analysis (YYS, MA, JF), pp. 237–250.
- WRLA-J-2004-MeseguerT07 #encryption #protocol #reachability #using #verification
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
- WRLA-2006-KatelmanM07 #co-evolution #design #hardware #semantics
- A Rewriting Semantics for ABEL with Applications to Hardware/Software Co-Design and Analysis (MK, JM), pp. 47–60.
- ESOP-2007-GulwaniT #interprocedural #summary
- Computing Procedure Summaries for Interprocedural Analysis (SG, AT), pp. 253–267.
- ESOP-2007-RinetzkyPRSY #composition #encapsulation #source code
- Modular Shape Analysis for Dynamically Encapsulated Programs (NR, APH, GR, MS, EY), pp. 220–236.
- ESOP-2007-SuenagaK #calculus #concurrent #type system
- Type-Based Analysis of Deadlock for a Concurrent Calculus with Interrupts (KS, NK), pp. 490–504.
- ESOP-2007-Versari #calculus #comparative
- A Core Calculus for a Comparative Analysis of Bio-inspired Calculi (CV), pp. 411–425.
- FASE-2007-CortellessaMI #framework #non-functional #performance #reliability
- Integrating Performance and Reliability Analysis in a Non-Functional MDA Framework (VC, ADM, PI), pp. 57–71.
- FoSSaCS-2007-BartolettiDFZ #resource management
- Types and Effects for Resource Usage Analysis (MB, PD, GLF, RZ), pp. 32–47.
- FoSSaCS-2007-HagueO #automaton #higher-order
- Symbolic Backwards-Reachability Analysis for Higher-Order Pushdown Systems (MH, CHLO), pp. 213–227.
- STOC-2007-BorgsCDR
- First to market is not everything: an analysis of preferential attachment with fitness (CB, JTC, CD, SR), pp. 135–144.
- TACAS-2007-AnandOH #execution #program transformation #symbolic computation
- Type-Dependence Analysis and Program Transformation for Symbolic Execution (SA, AO, MJH), pp. 117–133.
- TACAS-2007-BlomCLOPPDW #case study #distributed
- Distributed Analysis with µCRL: A Compendium of Case Studies (SB, JRC, BL, SO, JP, JvdP, MTD, AW), pp. 683–689.
- TACAS-2007-CortierKS #automation #security
- Automatic Analysis of the Security of XOR-Based Key Management Schemes (VC, GK, GS), pp. 538–552.
- TACAS-2007-FarzanM #concurrent #data flow #source code
- Causal Dataflow Analysis for Concurrent Programs (AF, PM), pp. 102–116.
- TACAS-2007-FriasPM #alloy #specification #verification
- Alloy Analyzer+PVS in the Analysis and Verification of Alloy Specifications (MFF, CLP, MMM), pp. 587–601.
- TACAS-2007-ManevichBCRS #composition #graph
- Shape Analysis by Graph Decomposition (RM, JB, BC, GR, MS), pp. 3–18.
- A-MOST-2007-ChenPU #dependence #generative #modelling #testing #using
- Model-based regression test suite generation using dependence analysis (YC, RLP, HU), pp. 54–62.
- CAV-2007-BerdineCCDOWY #data type
- Shape Analysis for Composite Data Structures (JB, CC, BC, DD, PWO, TW, HY), pp. 178–192.
- CAV-2007-BloemCPRT #formal method #named #requirements
- RAT: A Tool for the Formal Analysis of Requirements (RB, RC, IP, MR, AT), pp. 263–267.
- CAV-2007-BogudlovLRS #parametricity
- Revamping TVLA: Making Parametric Shape Analysis Competitive (IB, TLA, TWR, MS), pp. 221–225.
- CAV-2007-BouajjaniFQ #bound #parallel #source code #thread
- Context-Bounded Analysis of Multithreaded Programs with Dynamic Linked Structures (AB, SF, SQ), pp. 207–220.
- CAV-2007-CharltonH #model checking #named #plugin
- Hector: Software Model Checking with Cooperating Analysis Plugins (NC, MH), pp. 168–172.
- CAV-2007-GaravelMLS #distributed #process
- CADP 2006: A Toolbox for the Construction and Analysis of Distributed Processes (HG, RM, FL, WS), pp. 158–163.
- CAV-2007-GopanR #library #low level #summary
- Low-Level Library Analysis and Summarization (DG, TWR), pp. 68–81.
- CAV-2007-ManoliosSV #named
- BAT: The Bit-Level Analysis Tool (PM, SKS, DV), pp. 303–306.
- ICLP-2007-Morozov #design #logic programming #visual notation
- Visual Logic Programming Method Based on Structural Analysis and Design Technique (AAM), pp. 436–437.
- ICLP-2007-Naish #concurrent
- Resource-Oriented Deadlock Analysis (LN), pp. 302–316.
- ICLP-2007-NavasMLH #bound #logic programming #source code
- User-Definable Resource Bounds Analysis for Logic Programs (JAN, EM, PLG, MVH), pp. 348–363.
- ICLP-2007-PhanJ
- Static Region Analysis for Mercury (QP, GJ), pp. 317–332.
- ISSTA-2007-ClauseLO #framework #named
- Dytan: a generic dynamic taint analysis framework (JAC, WL, AO), pp. 196–206.
- ISSTA-2007-DufourRS #comprehension #performance
- Blended analysis for performance understanding of framework-based applications (BD, BGR, GS), pp. 118–128.
- SAT-2007-FuhsGMSTZ #polynomial #satisfiability #termination
- SAT Solving for Termination Analysis with Polynomial Interpretations (CF, JG, AM, PSK, RT, HZ), pp. 340–354.
- VMCAI-2007-BalabanPZ
- Shape Analysis of Single-Parent Heaps (IB, AP, LDZ), pp. 91–105.
- VMCAI-2007-CheremR #invariant #maintenance #reasoning
- Maintaining Doubly-Linked List Invariants in Shape Analysis with Local Reasoning (SC, RR), pp. 234–250.
- VMCAI-2007-Lev-AmiSIR
- Constructing Specialized Shape Analyses for Uniform Change (TLA, MS, NI, TWR), pp. 215–233.
- VMCAI-2007-Logozzo #abstract interpretation #composition #java #named #verification
- Cibai: An Abstract Interpretation-Based Static Analyzer for Modular Analysis and Verification of Java Classes (FL), pp. 283–298.
- VMCAI-2007-Namjoshi #symmetry
- Symmetry and Completeness in the Analysis of Parameterized Systems (KSN), pp. 299–313.
- VMCAI-2007-Yang #towards
- Towards Shape Analysis for Device Drivers (HY), p. 267.
- CBSE-2006-GrassiMS #approach #component #model transformation #performance #reliability
- A Model Transformation Approach for the Early Performance and Reliability Analysis of Component-Based Systems (VG, RM, AS), pp. 270–284.
- QoSA-2006-BucchiaroneMP #architecture #process
- A Practical Architecture-Centric Analysis Process (AB, HM, PP), pp. 127–144.
- QoSA-2006-FlorentzH #architecture #embedded #evaluation
- Embedded Systems Architecture: Evaluation and Analysis (BF, MH), pp. 145–162.
- QoSA-2006-ZullighovenLB #architecture #evaluation
- Software Architecture Analysis and Evaluation (HZ, CL, MB), pp. 7–8.
- DocEng-2006-Chao #geometry
- Text block geometric shape analysis (HC), pp. 22–24.
- HT-2006-QiC #development #named #segmentation
- CUTS: CUrvature-based development pattern analysis and segmentation for blogs and other Text Streams (YQ, KSC), pp. 1–10.
- JCDL-2006-BollenS #architecture
- An architecture for the aggregation and analysis of scholarly usage data (JB, HVdS), pp. 298–307.
- JCDL-2006-CraneJ #challenge #evaluation
- The challenge of virginia banks: an evaluation of named entity analysis in a 19th-century newspaper collection (GRC, AJ), pp. 31–40.
- JCDL-2006-CunninghamM #image #information management
- Looking for a picture: an analysis of everyday image information searching (SJC, MM), pp. 198–199.
- JCDL-2006-MannMM #metric #topic
- Bibliometric impact measures leveraging topic analysis (GSM, DMM, AM), pp. 65–74.
- JCDL-2006-MoenMEPS #learning #metadata
- Learning from artifacts: metadata utilization analysis (WEM, SDM, AE, SP, GS), pp. 270–271.
- JCDL-2006-ZouLT #geometry #layout #online #segmentation
- Combining DOM tree and geometric layout analysis for online medical journal article segmentation (JZ, DXL, GRT), pp. 119–128.
- SIGMOD-2006-ChidlovskiiRB #performance #self
- Documentum ECI self-repairing wrappers: performance analysis (BC, BR, MB), pp. 708–717.
- SIGMOD-2006-Hanrahan #named #query #visualisation
- VizQL: a language for query, analysis and visualization (PH), p. 721.
- SIGMOD-2006-LiOTW #named
- DADA: a data cube for dominant relationship analysis (CL, BCO, AKHT, SW), pp. 659–670.
- SIGMOD-2006-PavlouS #database #forensics
- Forensic analysis of database tampering (KEP, RTS), pp. 109–120.
- VLDB-2006-ChenRST #predict
- Bellwether Analysis: Predicting Global Aggregates from Local Regions (BCC, RR, JWS, PT), pp. 655–666.
- VLDB-2006-GonzalezHL #multi #named
- FlowCube: Constructuing RFID FlowCubes for Multi-Dimensional Analysis of Commodity Flows (HG, JH, XL), pp. 834–845.
- VLDB-2006-MoerkotteN #algorithm #generative #programming
- Analysis of Two Existing and One New Dynamic Programming Algorithm for the Generation of Optimal Bushy Join Trees without Cross Products (GM, TN), pp. 930–941.
- CSEET-2006-Layman #collaboration #development #student
- Changing Students’ Perceptions: An Analysis of the Supplementary Benefits of Collaborative Software Development (LL), pp. 159–166.
- CSEET-2006-WallaceWB #problem
- Instruction in Problem Structuring and Analysis Through Problem Frames (CW, XW, VB), pp. 185–186.
- SCAM-J-2005-AntoniolKT06 #source code
- Special issue on Source code analysis and manipulation (GA, JK, PT), pp. 205–208.
- CSMR-2006-HerraizRG #comparison #evolution #metric
- Comparison between SLOCs and number of files as size metrics for software evolution analysis (IH, GR, JMGB), pp. 206–213.
- ICPC-2006-JetleyZI #slicing #using
- Using Abstraction-driven Slicing for Postmortem Analysis of Software (RPJ, YZ, SPI), pp. 107–116.
- ICPC-2006-KellyB #taxonomy
- A Context-Aware Analysis Scheme for Bloom’s Taxonomy (TK, JB), pp. 275–284.
- ICPC-2006-PhengV #data type #java #source code
- Dynamic Data Structure Analysis for Java Programs (SP, CV), pp. 191–201.
- ICSM-2006-AlsmadiM #evolution #open source
- Open Source Evolution Analysis (IA, KM), pp. 276–278.
- MSR-2006-KimN #multi
- Program element matching for multi-version program analyses (MK, DN), pp. 58–64.
- MSR-2006-TsunodaMYKM #development #enterprise
- Productivity analysis of Japanese enterprise software development projects (MT, AM, HY, NK, KiM), pp. 14–17.
- MSR-2006-VoineaT #cvs #framework #query #repository #visualisation
- An open framework for CVS repository querying, analysis and visualization (LV, ACT), pp. 33–39.
- SCAM-2006-Bruntink #tool support
- Linking Analysis and Transformation Tools with Source-Based Mappings (MB), pp. 107–116.
- WCRE-2006-FischerG #approach #lightweight #named #scalability
- EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software Systems (MF, HG), pp. 179–188.
- WCRE-2006-KnieselB #aspect-oriented #correctness #weaving
- An Analysis of the Correctness and Completeness of Aspect Weaving (GK, UB), pp. 324–333.
- WCRE-2006-MerloLA #injection #php #sql
- Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP (EM, DL, GA), pp. 147–156.
- CIAA-2006-ChengWC #bisimulation #branch #composition #on the fly
- On-the-Fly Branching Bisimulation Minimization for Compositional Analysis (YPC, HYW, YRC), pp. 219–229.
- CIAA-2006-Luttenberger #integer #reachability #source code
- Reachability Analysis of Procedural Programs with Affine Integer Arithmetic (ML), pp. 281–282.
- ICALP-v2-2006-DelauneLLT #morphism #protocol
- Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or (SD, PL, DL, RT), pp. 132–143.
- FM-2006-McIver #model checking #probability #refinement
- Quantitative Refinement and Model Checking for the Analysis of Probabilistic Systems (AM), pp. 131–146.
- RTA-2006-GieslSST #automation #haskell #programming language #term rewriting #termination
- Automated Termination Analysis for Haskell: From Term Rewriting to Programming Languages (JG, SS, PSK, RT), pp. 297–312.
- SEFM-2006-SampathK
- Composing Context Sensitive Analysis (PS, SK), pp. 186–195.
- FLOPS-2006-Avery #bound #termination
- Size-Change Termination and Bound Analysis (JA), pp. 192–207.
- FLOPS-2006-LiKL #lazy evaluation
- Lazy Set-Sharing Analysis (XL, AK, LL), pp. 177–191.
- FLOPS-2006-MarionP
- Resource Analysis by Sup-interpretation (JYM, RP), pp. 163–176.
- ICFP-2006-MightS #garbage collection
- Improving flow analyses via ΓCFA: abstract garbage collection and counting (MM, OS), pp. 13–25.
- ICGT-2006-EdelkampJL #graph #heuristic
- Heuristic Search for the Analysis of Graph Transition Systems (SE, SJ, ALL), pp. 414–429.
- ICGT-2006-EhrigHL #graph transformation
- Molecular Analysis of Metabolic Pathway with Graph Transformation (KE, RH, GL), pp. 107–121.
- ICGT-2006-MendizabalD #distributed #graph grammar #non-functional #probability #using
- Non-functional Analysis of Distributed Systems in Unreliable Environments Using Stochastic Object Based Graph Grammars (OMM, FLD), pp. 275–290.
- ICGT-2006-VarroVEPT #model transformation #petri net #termination
- Termination Analysis of Model Transformations by Petri Nets (DV, SVG, HE, UP, GT), pp. 260–274.
- CHI-2006-LiWL #design #testing
- Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing (YL, EW, JAL), pp. 1019–1022.
- CHI-2006-MedynskiyDF #community #development #hybrid #network #online #using
- Using hybrid networks for the analysis of online software development communities (YEM, ND, AF), pp. 513–516.
- CHI-2006-WrightSPSC #concept
- The sandbox for analysis: concepts and Eevaluation (WW, DS, PP, AWS, BC), pp. 801–810.
- CSCW-2006-DabbishK #email
- Email overload at work: an analysis of factors associated with email strain (LAD, REK), pp. 431–440.
- CSCW-2006-JacoviSGUSM #graph
- The chasms of CSCW: a citation graph analysis of the CSCW conference (MJ, VS, GGF, SU, ES, NM), pp. 289–298.
- CSCW-2006-Lee #social #what
- What goes around comes around: an analysis of del.icio.us as social space (KJL), pp. 191–194.
- CSCW-2006-RanjanBB #collaboration
- An exploratory analysis of partner action and camera control in a video-mediated collaborative task (AR, JPB, RB), pp. 403–412.
- CSCW-2006-VoidaM #challenge #multimodal
- Challenges in the analysis of multimodal messaging (AV, EDM), pp. 427–430.
- CSCW-2006-WeisethMTL #collaboration #framework #tool support
- The wheel of collaboration tools: a typology for analysis within a holistic framework (PEW, BEM, BT, SL), pp. 239–248.
- CAiSE-2006-Franch #modelling #on the
- On the Quantitative Analysis of Agent-Oriented Models (XF), pp. 495–509.
- CAiSE-2006-HaggmarkA #logic #principle #why
- Why Software Engineers Do Not Keep to the Principle of Separating Business Logic from Display: A Method Rationale Analysis (MH, PJÅ), pp. 399–413.
- EDOC-2006-HauserFKV #workflow
- Combining Analysis of Unstructured Workflows with Transformation to Structured Workflows (RH, MF, JMK, JV), pp. 129–140.
- EDOC-2006-JohnsonLNS #architecture #diagrams #enterprise
- Extended Influence Diagrams for Enterprise Architecture Analysis (PJ, RL, PN, MS), pp. 3–12.
- ICEIS-HCI-2006-BadjioP #data mining #mining #process #visual notation
- Context of Use Analysis — Activity Checklist for Visual Data Mining (EPFB, FP), pp. 45–50.
- ICEIS-ISAS-2006-DubinskyHTK #agile #design #development #scalability
- System Analysis and Design in a Large-Scale Software Project: The Case of Transition to Agile Development (YD, OH, DT, AK), pp. 11–18.
- ICEIS-J-2006-DubinskyHTK06a #agile #design
- Agile System Analysis and Design (YD, OH, DT, AK), pp. 281–292.
- CIKM-2006-ChiTT #named
- Eigen-trend: trend analysis in the blogosphere based on singular value decompositions (YC, BLT, JT), pp. 68–77.
- CIKM-2006-LiuCLS #visual notation
- The visual funding navigator: analysis of the NSF funding information (SL, NC, HL, HS), pp. 882–883.
- CIKM-2006-YeXLJBCK #linear #performance
- Efficient model selection for regularized linear discriminant analysis (JY, TX, QL, RJ, JB, VC, CK), pp. 532–539.
- ICML-2006-DingZHZ #component #invariant #named #robust
- R1-PCA: rotational invariant L1-norm principal component analysis for robust subspace factorization (CHQD, DZ, XH, HZ), pp. 281–288.
- ICML-2006-Hanneke #graph #learning
- An analysis of graph cut size for transductive learning (SH), pp. 393–399.
- ICML-2006-KimMB #kernel
- Optimal kernel selection in Kernel Fisher discriminant analysis (SJK, AM, SPB), pp. 465–472.
- ICML-2006-MaggioniM #evaluation #markov #multi #performance #policy #process #using
- Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
- ICML-2006-Sugiyama #reduction
- Local Fisher discriminant analysis for supervised dimensionality reduction (MS), pp. 905–912.
- ICML-2006-TorreK #clustering
- Discriminative cluster analysis (FDlT, TK), pp. 241–248.
- ICML-2006-YeX #linear #null #orthogonal
- Null space versus orthogonal linear discriminant analysis (JY, TX), pp. 1073–1080.
- ICPR-v1-2006-AndradeBF06a #markov #modelling
- Hidden Markov Models for Optical Flow Analysis in Crowds (ELA, SB, RBF), pp. 460–463.
- ICPR-v1-2006-GunesP #automation #behaviour #database #gesture
- A Bimodal Face and Body Gesture Database for Automatic Analysis of Human Nonverbal Affective Behavior (HG, MP), pp. 1148–1153.
- ICPR-v1-2006-HansenMT #clustering #re-engineering #sorting
- Cluster Analysis and Priority Sorting in Huge Point Clouds for Building Reconstruction (WvH, EM, UT), pp. 23–26.
- ICPR-v1-2006-LeeE #modelling #synthesis
- Nonlinear Shape and Appearance Models for Facial Expression Analysis and Synthesis (CSL, AME), pp. 497–502.
- ICPR-v1-2006-LiuD #linear #performance #recognition
- Improve Handwritten Character Recognition Performance by Heteroscedastic Linear Discriminant Analysis (HL, XD), pp. 880–883.
- ICPR-v1-2006-MillerW #semantics #word
- Word Completion with Latent Semantic Analysis (TM, EW), pp. 1252–1255.
- ICPR-v1-2006-OnoMKI #image
- Space-time Analysis of Spherical Projection Image (SO, TM, HK, KI), pp. 975–979.
- ICPR-v1-2006-QiDZ #case study #image #semantics
- Semantic Analysis on Medical Images: A Case Study (DQ, ERED, RZ), pp. 1260–1263.
- ICPR-v1-2006-ReiterDLB #3d #canonical #correlation #re-engineering #using
- 3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis (MR, RD, GL, HB), pp. 425–428.
- ICPR-v1-2006-SchrotterZ #image #modelling #multi #robust
- Robust Model Driven Matching Method for Face Analysis with Multi Image Photogrammetry (GS, LZ), pp. 480–483.
- ICPR-v1-2006-ShimanukiKW #sketching
- Analysis of Overlapping Faces for Constructing Paper-made Objects from Sketches (HS, JK, TW), pp. 247–250.
- ICPR-v1-2006-SibiryakovB #multi #realtime
- Real-Time Multi-Frame Analysis of Dominant Translation (AS, MB), pp. 55–58.
- ICPR-v1-2006-Solem
- Geodesic Curves for Analysis of Continuous Implicit Shapes (JES), pp. 43–46.
- ICPR-v1-2006-Solem06a
- Geodesic Curves for Analysis of Continuous Implicit Shapes (JES), pp. 852–855.
- ICPR-v1-2006-StorkJ #image
- Estimating the location of illuminants in realist master paintings Computer image analysis addresses a debate in art history of the Baroque (DGS, MKJ), pp. 255–258.
- ICPR-v1-2006-WangKY #2d #linear #recognition
- Bilateral Two Dimensional Linear Discriminant Analysis for Stereo Face Recognition (JGW, HK, WYY), pp. 429–432.
- ICPR-v1-2006-YangZJY #feature model
- Unsupervised Discriminant Projection Analysis for Feature Extraction (JY, DZ, ZJ, JYY), pp. 904–907.
- ICPR-v2-2006-ChenW #component #independence #segmentation #using
- Texture Segmentation Using Independent Component Analysis of Gabor Features (YC, RW), pp. 147–150.
- ICPR-v2-2006-GanLY #detection
- Detecting Periodically Expressed Genes based on Time-frequency Analysis and L-curve Method (XG, AWCL, HY), pp. 654–657.
- ICPR-v2-2006-HuDG #performance #retrieval
- Improving Retrieval Performance by Global Analysis (JH, WD, JG), pp. 703–706.
- ICPR-v2-2006-InoueNK #feature model #kernel #recognition #string #using
- Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection (RI, HN, NK), pp. 1094–1097.
- ICPR-v2-2006-InoueU #2d #linear
- Non-Iterative Two-Dimensional Linear Discriminant Analysis (KI, KU), pp. 540–543.
- ICPR-v2-2006-Liang #image
- High-dimensional discriminant analysis and its application to color face images (ZL), pp. 917–920.
- ICPR-v2-2006-LiuCC #image #layout
- Latent Layout Analysis for Discovering Objects in Images (DL, DC, TC), pp. 468–471.
- ICPR-v2-2006-Loog #linear
- Conditional Linear Discriminant Analysis (ML), pp. 387–390.
- ICPR-v2-2006-LuPV #component #multi #recognition
- Multilinear Principal Component Analysis of Tensor Objects for Recognition (HL, KNP, ANV), pp. 776–779.
- ICPR-v2-2006-PungprasertyingCK #approach #learning #migration #performance
- Migration Analysis: An Alternative Approach for Analyzing Learning Performance (PP, RC, BK), pp. 837–840.
- ICPR-v2-2006-QuanHXLL #online #verification
- Spectrum Analysis Based onWindows with Variable Widths for Online Signature Verification (ZHQ, DSH, XLX, MRL, TML), pp. 1122–1125.
- ICPR-v2-2006-SanguansatAJM #2d #component #recognition
- Class-Specific Subspace-Based Two-Dimensional Principal Component Analysis for Face Recognition (PS, WA, SJ, SM), pp. 1246–1249.
- ICPR-v2-2006-SenerU #component #independence #invariant #normalisation #using
- A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
- ICPR-v2-2006-TangT #linear #performance #using
- Fast Linear Discriminant Analysis Using Binary Bases (FT, HT), pp. 52–55.
- ICPR-v2-2006-TongDXTL #recognition #video
- Local Motion Analysis and Its Application in Video based Swimming Style Recognition (XT, LYD, CX, QT, HL), pp. 1258–1261.
- ICPR-v2-2006-TsaiTCY #component #design #detection #fault #image #independence
- Independent component analysis based filter design for defect detection in low-contrast textured images (DMT, YHT, SMC, CHY), pp. 231–234.
- ICPR-v2-2006-UekiHK #2d #classification #linear
- Two-dimensional Heteroscedastic Linear Discriminant Analysis for Age-group Classification (KU, TH, TK), pp. 585–588.
- ICPR-v2-2006-YangL #automation #component
- Automatic Physiognomic Analysis by Classifying Facial Component Feature (HDY, SWL), pp. 1212–1215.
- ICPR-v2-2006-ZhengL #component #kernel #learning #locality #problem
- Regularized Locality Preserving Learning of Pre-Image Problem in Kernel Principal Component Analysis (WSZ, JHL), pp. 456–459.
- ICPR-v3-2006-ChenWTG #empirical #image #matrix #statistics
- Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix (XC, YW, TT, LG), pp. 1107–1110.
- ICPR-v3-2006-El-BazFRYEE #detection #image
- Image Analysis of Renal DCE MRI for the Detection of Acute Renal Rejection (AEB, AAF, RF, SEY, MAEG, TE), pp. 822–825.
- ICPR-v3-2006-GokberkA #3d #algorithm #comparative #recognition
- Comparative Analysis of Decision-level Fusion Algorithms for 3D Face Recognition (BG, LA), pp. 1018–1021.
- ICPR-v3-2006-GutmanWLCT #using
- Hippocampal Surface Analysis Using Spherical Harmonic Function Applied to Surface Conformal Mapping (BG, YW, LML, TFC, PMT), pp. 964–967.
- ICPR-v3-2006-HaiESYSHAY #adaptation #image #video
- Adaptive Control of Video Display for Diagnostic Assistance by Analysis of Capsule Endoscopic Images (HV, TE, RS, KY, MS, KH, TA, YY), pp. 980–983.
- ICPR-v3-2006-JaberAM #approach #information retrieval #metric #novel
- A Novel Approach for Lexical Noise Analysis and Measurement in Intelligent Information Retrieval (TJ, AA, PM), pp. 370–373.
- ICPR-v3-2006-KitasakaNMSMTN #recognition
- Recognition of lung lobes and its application to the bronchial structure analysis (TK, YN, KM, YS, MM, HT, HN), pp. 288–291.
- ICPR-v3-2006-Levitt #component
- Component Analysis of Torah Code Phrases (AL), pp. 412–416.
- ICPR-v3-2006-LiuW #algorithm #component #feature model #recognition #search-based
- Feature Extraction with Genetic Algorithms Based Nonlinear Principal Component Analysis for Face Recognition (NL, HW), pp. 461–464.
- ICPR-v3-2006-LiZSCG #kernel #performance #recognition
- Bagging Based Efficient Kernel Fisher Discriminant Analysis for Face Recognition (YL, BZ, SS, XC, WG), pp. 523–526.
- ICPR-v3-2006-LoogR
- Local Discriminant Analysis (ML, DdR), pp. 328–331.
- ICPR-v3-2006-QinSL #feature model #performance
- Efficient Feature Extraction Based on Regularized Uncorrelated Chernoff Discriminant Analysis (AKQ, PNS, ML), pp. 125–128.
- ICPR-v3-2006-TangkuampienS #component #kernel
- Human Motion De-noising via Greedy Kernel Principal Component Analysis Filtering (TT, DS), pp. 457–460.
- ICPR-v3-2006-VlietF #clustering #multi
- Multi-orientation analysis by decomposing the structure tensor and clustering (LJvV, FGAF), pp. 856–860.
- ICPR-v3-2006-Wang06a #using
- Abnormal Walking Gait Analysis Using Silhouette-Masked Flow Histograms (LW0), pp. 473–476.
- ICPR-v3-2006-WangG #recognition
- Tensor Discriminant Analysis for View-based Object Recognition (YW, SG), pp. 33–36.
- ICPR-v3-2006-XuanCZYHSF #classification #component #novel
- A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA) (GX, PC, XZ, QY, CH, YQS, DF), pp. 320–323.
- ICPR-v3-2006-YamazakiCX #component #image #independence #kernel #using
- Separating Reflections from Images Using Kernel Independent Component Analysis (MY, YWC, GX), pp. 194–197.
- ICPR-v3-2006-YouCBLT #speech
- Emotional Speech Analysis on Nonlinear Manifold (MY, CC, JB, JL, JT), pp. 91–94.
- ICPR-v3-2006-ZhangDC #detection #game studies
- Ball Hit Detection in Table Tennis Games Based on Audio Analysis (BZ, WD, LC), pp. 220–223.
- ICPR-v4-2006-AroraA #image #multi #segmentation
- Analysis of Ramp Discontinuity Model for Multiscale Image Segmentation (HA, NA), pp. 99–103.
- ICPR-v4-2006-DhandraHHM #image #segmentation #using
- Analysis of Abnormality in Endoscopic images using Combined HSI Color Space and Watershed Segmentation (BVD, RH, MH, VSM), pp. 695–698.
- ICPR-v4-2006-GhoshB06a #adaptation #video
- A Psychological Adaptive Model For Video Analysis (NG, BB), pp. 346–349.
- ICPR-v4-2006-GurevichKMSV #automation
- Technology for Automated Morphologic Analysis of Cytological Slides. Methods and Results (IBG, DK, DM, OS, IV), pp. 711–714.
- ICPR-v4-2006-LiZZB #approach #automation #multi #segmentation #using
- A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis (QL, LZ, DZ, PB), pp. 77–80.
- ICPR-v4-2006-LuC06a #3d #metric #using
- Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
- ICPR-v4-2006-MitaniTKF #mobile #recognition
- Environment Recognition Based on Analysis of Human Actions for Mobile Robot (MM, MT, AK, KF), pp. 782–786.
- ICPR-v4-2006-WangR #kernel #recognition
- Kernel Fisher Discriminant Analysis for Palmprint Recognition (YW, QR), pp. 457–460.
- ICPR-v4-2006-WangWLJK #classification #component #independence #using
- Content-Based Audio Classification Using Support Vector Machines and Independent Component Analysis (JCW, JFW, CBL, KTJ, WHK), pp. 157–160.
- ICPR-v4-2006-YaoLYZL #algorithm #identification
- Analysis and Improvement of An Iris Identification Algorithm (PY, JL, XY, ZZ, BL), pp. 362–365.
- KDD-2006-Berger-WolfS #framework #network #social
- A framework for analysis of dynamic social networks (TYBW, JS), pp. 523–528.
- KDD-2006-LiuCHY #dependence #detection #graph #named
- GPLAG: detection of software plagiarism by program dependence graph analysis (CL, CC, JH, PSY), pp. 872–881.
- KDD-2006-LiuZBX #using
- Rule interestingness analysis using OLAP operations (BL, KZ, JB, WX), pp. 297–306.
- KDD-2006-MeiXCHZ #generative #semantics
- Generating semantic annotations for frequent patterns with context analysis (QM, DX, HC, JH, CZ), pp. 337–346.
- KDD-2006-MessaoudBR #data transformation #multi #performance
- Efficient multidimensional data representations based on multiple correspondence analysis (RBM, OB, SLR), pp. 662–667.
- KDD-2006-SuchanekIW #documentation #statistics #web
- Combining linguistic and statistical analysis to extract relations from web documents (FMS, GI, GW), pp. 712–717.
- KDD-2006-SunTF #graph
- Beyond streams and graphs: dynamic tensor analysis (JS, DT, CF), pp. 374–383.
- KDD-2006-WedigM #personalisation #query #scalability
- A large-scale analysis of query logs for assessing personalization opportunities (SW, OM), pp. 742–747.
- KDD-2006-YeW
- Regularized discriminant analysis for high dimensional, low sample size data (JY, TW), pp. 454–463.
- KDD-2006-YuYTKW #component #probability
- Supervised probabilistic principal component analysis (SY, KY, VT, HPK, MW), pp. 464–473.
- SEKE-2006-BokhariP #modelling #petri net #uml
- Translation of UML Models to Object Coloured Petri Nets with a view to Analysis (AB, WFSP), pp. 568–571.
- SEKE-2006-GaaloulG #mining #statistics #workflow
- A Workflow Mining Tool based on Logs Statistical Analysis (WG, CG), pp. 595–600.
- SEKE-2006-GokhaleY #architecture #pipes and filters #reliability
- Reliability Analysis of Pipe and Filter Architecture Style (SSG, SMY), pp. 625–630.
- SEKE-2006-GrauCFN #comparative #modelling
- A Comparative Analysis of i*Agent-Oriented Modelling Techniques (GG, CC, XF, FN), pp. 657–663.
- SEKE-2006-PiaoWCC #diagrams #process #uml
- An Analysis Model of Activity Diagram in UML 2.0 (WCP, CHW, WCC, LPC), pp. 562–567.
- SEKE-2006-SartipiS #concept #evaluation #execution #mining
- Application of Execution Pattern Mining and Concept Lattice Analysis on Software Structure Evaluation (KS, HS), pp. 302–308.
- SEKE-2006-SteinmacherLH #process #simulation #using #workflow
- Task Anticipation: A Quantitative Analysis Using Workflow Process Simulation (IS, JVdL, EHMH), pp. 601–606.
- SEKE-2006-SunSADH #design #formal method #middleware #modelling
- Achieving a Better Middleware Design through Formal Modeling and Analysis (WS, TS, GAG, YD, XH), pp. 463–468.
- SIGIR-2006-CaiHH #documentation
- Tensor space model for document analysis (DC, XH, JH), pp. 625–626.
- SIGIR-2006-JinFM #consistency #feedback #nondeterminism #performance
- Quantative analysis of the impact of judging inconsistency on the performance of relevance feedback (XJ, JCF, JM), pp. 655–656.
- SIGIR-2006-JordanHK #approach #named
- Swordfish: an unsupervised Ngram based approach to morphological analysis (CJ, JH, VK), pp. 657–658.
- SIGIR-2006-NieDQ #topic #web
- Topical link analysis for web search (LN, BDD, XQ), pp. 91–98.
- SIGIR-2006-Olsson #classification #set
- An analysis of the coupling between training set and neighborhood sizes for the kNN classifier (JSO), pp. 685–686.
- SIGIR-2006-WangSCZ #multi #semantics
- Latent semantic analysis for multiple-type interrelated data objects (XW, JTS, ZC, CZ), pp. 236–243.
- SIGIR-2006-YanH #multi #probability #query #retrieval
- Probabilistic latent query analysis for combining multiple retrieval sources (RY, AGH), pp. 324–331.
- SIGIR-2006-ZhangOFM #linear #recommendation
- Analysis of a low-dimensional linear model under recommendation attacks (SZ, YO, JF, FM), pp. 517–524.
- ECMDA-FA-2006-MottuBT #model transformation #mutation testing #testing
- Mutation Analysis Testing for Model Transformations (JMM, BB, YLT), pp. 376–390.
- ECMDA-FA-2006-Perez-MartinezS #architecture
- From Analysis Model to Software Architecture: A PIM2PIM Mapping (JEPM, ASA), pp. 25–39.
- MoDELS-2006-BruckerDW #model transformation #semantics
- A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
- MoDELS-2006-GarousiBL #behaviour #dependence #distributed #modelling #uml #visualisation
- Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
- MoDELS-2006-GoldsbyCKK #assurance #formal method #framework #modelling #visualisation
- A Visualization Framework for the Modeling and Formal Analysis of High Assurance Systems (HG, BHCC, SK, SK), pp. 707–721.
- MoDELS-2006-LundellLPM #uml #xmi
- UML Model Interchange in Heterogeneous Tool Environments: An Analysis of Adoptions of XMI 2 (BL, BL, AP, AM), pp. 619–630.
- MoDELS-2006-MensSD #consistency #dependence #detection #nondeterminism #using
- Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
- MoDELS-2006-MullerFFHSGJ #modelling #syntax #synthesis
- Model-Driven Analysis and Synthesis of Concrete Syntax (PAM, FF, FF, MH, RS, SG, JMJ), pp. 98–110.
- SPLC-2006-LeeKKP #aspect-oriented #development #feature model #product line #programming
- Combining Feature-Oriented Analysis and Aspect-Oriented Programming for Product Line Asset Development (KL, KCK, MK, SP), pp. 103–112.
- MoDELS-2006-BruckerDW #model transformation #semantics
- A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
- MoDELS-2006-GarousiBL #behaviour #dependence #distributed #modelling #uml #visualisation
- Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
- MoDELS-2006-GoldsbyCKK #assurance #formal method #framework #modelling #visualisation
- A Visualization Framework for the Modeling and Formal Analysis of High Assurance Systems (HG, BHCC, SK, SK), pp. 707–721.
- MoDELS-2006-LundellLPM #uml #xmi
- UML Model Interchange in Heterogeneous Tool Environments: An Analysis of Adoptions of XMI 2 (BL, BL, AP, AM), pp. 619–630.
- MoDELS-2006-MensSD #consistency #dependence #detection #nondeterminism #using
- Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
- MoDELS-2006-MullerFFHSGJ #modelling #syntax #synthesis
- Model-Driven Analysis and Synthesis of Concrete Syntax (PAM, FF, FF, MH, RS, SG, JMJ), pp. 98–110.
- ECOOP-2006-SiekT #c++ #semantics
- A Semantic Analysis of C++ Templates (JGS, WT), pp. 304–327.
- OOPSLA-2006-BlackburnGHKMBDFFGHHJLMPSVDW #benchmark #development #java #metric
- The DaCapo benchmarks: java benchmarking development and analysis (SMB, RG, CH, AMK, KSM, RB, AD, DF, DF, SZG, MH, ALH, MJ, HBL, JEBM, AP, DS, TV, DvD, BW), pp. 169–190.
- OOPSLA-2006-KitMB #requirements #semantics #using
- Isolating and relating concerns in requirements using latent semantic analysis (LKK, CKM, ELAB), pp. 383–396.
- QAPL-2005-KwiatkowskaNP06 #model checking #probability
- Quantitative Analysis With the Probabilistic Model Checker PRISM (MZK, GN, DP), pp. 5–31.
- LOPSTR-2006-Schneider-KampGST #automation #logic programming #source code #term rewriting #termination
- Automated Termination Analysis for Logic Programs by Term Rewriting (PSK, JG, AS, RT), pp. 177–193.
- PADL-2006-NavasBH #clique #performance #top-down #using
- Efficient Top-Down Set-Sharing Analysis Using Cliques (JAN, FB, MVH), pp. 183–198.
- PEPM-2006-Cordy #generative #txl
- Source transformation, analysis and generation in TXL (JRC), pp. 1–11.
- PEPM-2006-IwamaIK #exception #functional #resource management
- Resource usage analysis for a functional language with exceptions (FI, AI, NK), pp. 38–47.
- PEPM-2006-LewisJ #model checking
- A dead variable analysis for explicit model checking (ML, MJ), pp. 48–57.
- PLDI-2006-AcarBBT #self
- An experimental analysis of self-adjusting computation (UAA, GEB, MB, KT), pp. 96–107.
- PLDI-2006-DhurjatiKA #alias #named
- SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
- PLDI-2006-PratikakisFH #concurrent #correlation #detection #named
- LOCKSMITH: context-sensitive correlation analysis for race detection (PP, JSF, MWH), pp. 320–331.
- PLDI-2006-SridharanB #java #points-to
- Refinement-based context-sensitive points-to analysis for Java (MS, RB), pp. 387–400.
- POPL-2006-MeunierFF #composition #contract
- Modular set-based analysis from contracts (PM, RBF, MF), pp. 218–231.
- POPL-2006-MightS
- Environment analysis via Delta CFA (MM, OS), pp. 127–140.
- PPDP-2006-Miller #horn clause #source code
- Collection analysis for Horn clause programs (DM), pp. 179–188.
- QAPL-2006-AdaoMRV #protocol #security #towards
- Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
- QAPL-2006-ZhangH #formal method #protocol #streaming
- Formal Analysis of Streaming Downloading Protocol for System Upgrading (MZ, DVH), pp. 205–224.
- SAS-2006-Arnold #logic #refinement #using
- Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
- SAS-2006-ChangHN #low level #using
- Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
- SAS-2006-DhurjatiDY #data flow #refinement
- Path-Sensitive Dataflow Analysis with Iterative Refinement (DD, MD, YY), pp. 425–442.
- SAS-2006-GonnordH #linear
- Combining Widening and Acceleration in Linear Relation Analysis (LG, NH), pp. 144–160.
- SAS-2006-GotsmanBC #abstraction #interprocedural
- Interprocedural Shape Analysis with Separated Heap Abstractions (AG, JB, BC), pp. 240–260.
- SAS-2006-OrlovichR #memory management
- Memory Leak Analysis by Contradiction (MO, RR), pp. 405–424.
- SAS-2006-Yang #low level
- Shape Analysis for Low-Level Code (HY), p. 280.
- RE-2006-ChenZZM #dependence #identification #requirements
- Identification of Crosscutting Requirements Based on Feature Dependency Analysis (KC, HZ, WZ, HM), pp. 300–303.
- RE-2006-CornfordFHJ #modelling #requirements
- Fusing Quantitative Requirements Analysis with Model-based Systems Engineering (SLC, MSF, VAH, JSJ), pp. 272–277.
- RE-2006-EbnenasirCK #case study #fault tolerance #modelling
- Use Case-Based Modeling and Analysis of Failsafe Fault-Tolerance (AE, BHCC, SK), pp. 336–337.
- RE-2006-JiangTBM #biology #case study #data transformation #database #design
- Incorporating Goal Analysis in Database Design: A Case Study from Biological Data Management (LJ, TT, AB, JM), pp. 196–204.
- RE-2006-LiaskosLYYM #on the #variability
- On Goal-based Variability Acquisition and Analysis (SL, AL, YY, ESKY, JM), pp. 76–85.
- RE-2006-LiuJ #problem #requirements
- Integrating Goals and Problem Frames in Requirements Analysis (LL, ZJ), pp. 342–343.
- RE-2006-MehnerMT #aspect-oriented #interactive #modelling
- Interaction Analysis in Aspect-Oriented Models (KM, MM, GT), pp. 66–75.
- ASE-2006-CaiS #composition #design #logic #modelling
- Modularity Analysis of Logical Design Models (YC, KJS), pp. 91–102.
- ASE-2006-EichbergMKOR #scheduling #set
- Integrating and Scheduling an Open Set of Static Analyses (ME, MM, SK, KO, BR), pp. 113–122.
- ASE-2006-Jurjens #automation #java #proving #security #source code #theorem proving #using
- Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
- FSE-2006-YeCCX #collaboration
- Local analysis of atomicity sphere for B2B collaboration (CY, SCC, WKC, CX), pp. 186–196.
- ICSE-2006-CeballosG #performance
- P2P file sharing analysis for a better performance (MRC, JLG), pp. 941–944.
- ICSE-2006-DubocRW #framework #modelling #scalability
- A framework for modelling and analysis of software systems scalability (LD, DSR, TW), pp. 949–952.
- ICSE-2006-FurusawaCW #design #modelling #overview #performance
- Efficiency analysis of model-based review in actual software design (HF, EHC, HW), pp. 604–607.
- ICSE-2006-GallL #evolution #visualisation
- Software evolution: analysis and visualization (HG, ML), pp. 1055–1056.
- ICSE-2006-KitchenhamKJC #database #lessons learnt #scalability
- Lessons learnt from the analysis of large-scale corporate databases (BK, CK, DRJ, CC), pp. 439–444.
- ICSE-2006-KobayashiKSP #agile #effectiveness #interactive
- Analysis of the interaction between practices for introducing XP effectively (OK, MK, MS, EP), pp. 544–550.
- ICSE-2006-MartinX #comprehension #interface #string
- Understanding software application interfaces via string analysis (EM, TX), pp. 901–904.
- ICSE-2006-NakagawaKH #modelling #multi
- Analysis of multi-agent systems based on KAOS modeling (HN, TK, SH), pp. 926–929.
- ICSE-2006-VerlekarA #distributed #performance
- A methodology and tool for performance analysis of distributed server systems (RPV, VA), pp. 913–916.
- ICSE-2006-Zhao #approach #testing
- A new approach for software testability analysis (LZ), pp. 985–988.
- SAC-2006-AgostaCPS #bytecode #compilation #performance
- Selective compilation via fast code analysis and bytecode tracing (GA, SCR, PP, MS), pp. 906–911.
- SAC-2006-BelguidoumD #component #dependence #deployment
- Analysis of deployment dependencies in software components (MB, FD), pp. 735–736.
- SAC-2006-BiermanMPS #array #image #named
- MACE: lossless compression and analysis of microarray images (RB, NM, CP, RS), pp. 167–172.
- SAC-2006-ChengCW #composition #named #scalability
- ARCATS: a scalable compositional analysis tool suite (YPC, YRC, HYW), pp. 1852–1853.
- SAC-2006-CutelloNO #algorithm #heuristic
- Analysis of an evolutionary algorithm with HyperMacromutation and stop at first constructive mutation heuristic for solving trap functions (VC, GN, PSO), pp. 945–949.
- SAC-2006-DattaE #requirements #workflow
- Effects of changing requirements: a tracking mechanism for the analysis workflow (SD, RvE), pp. 1739–1744.
- SAC-2006-DextersPG #algorithm #probability
- A probability analysis for candidate-based frequent itemset algorithms (ND, PWP, DVG), pp. 541–545.
- SAC-2006-FangFHT #geometry #image
- Digital geometry image analysis for medical diagnosis (JF, SF, JH, MT), pp. 217–221.
- SAC-2006-GotoC #logic
- A quantitative analysis of implicational paradoxes in classical mathematical logic (YG, JC), pp. 42–43.
- SAC-2006-HeatherS #infinity #protocol #security
- To infinity and beyond or, avoiding the infinite in security protocol analysis (JH, SS), pp. 346–353.
- SAC-2006-NorguetZS #semantics #web
- Semantic analysis of web site audience (JPN, EZ, RS), pp. 525–529.
- SAC-2006-OrshanskyWCX #robust #statistics
- Interval-based robust statistical techniques for non-negative convex functions, with application to timing analysis of computer chips (MO, WSW, MC, GX), pp. 1645–1649.
- SAC-2006-OsorioK #behaviour
- An initial analysis and presentation of malware exhibiting swarm-like behavior (FCCO, ZK), pp. 323–329.
- SAC-2006-RuizCCP #algebra #concurrent #e-commerce #process #protocol #set #using
- Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
- SAC-2006-WangS
- Escape analysis for synchronization removal (LW, XS), pp. 1419–1423.
- SAC-2006-WuGL #database #modelling #towards
- Towards value disclosure analysis in modeling general databases (XW, SG, YL), pp. 617–621.
- GPCE-2006-KaminAK #generative #staging
- Staging static analyses for program generation (SK, BA, MK), pp. 1–10.
- GPCE-2006-VieraP #multi
- A multi-stage language with intensional analysis (MV, AP), pp. 11–20.
- LDTA-2006-EichbergKKMS #incremental
- Incremental Confined Types Analysis (ME, SK, SK, MM, TS), pp. 81–96.
- ASPLOS-2006-SilvaS #optimisation #pointer #probability
- A probabilistic pointer analysis for speculative optimizations (JDS, JGS), pp. 416–425.
- CASE-2006-Bahrami-SamaniAM #design
- Design and Analysis of a Welding Robot (MBS, MA, SAAM), pp. 454–459.
- CASE-2006-BiggsM #evaluation
- Evaluation of Dimensional Analysis in Robotics (GB, BAM), pp. 286–291.
- CASE-2006-ChaoSZJM #automation #information management #using
- Single-cell information extraction and viability analysis using automated microscopy (ShC, TJS, SZ, KAJI, DRM), pp. 33–38.
- CASE-2006-CheungC #capacity
- Analysis of Capacity Overflow for Manufacturing Systems (KSC, KOC), pp. 331–335.
- CASE-2006-LengC #implementation #mobile
- Velocity Analysis of Omnidirectional Mobile Robot and System Implementation (CL, QC), pp. 81–86.
- CASE-2006-LiZYC #algorithm #locality #network #novel
- A Novel Algorithm for Node Localization and Motion Analysis in Wireless Sensor Networks (SL, DZ, ZY, NC), pp. 574–579.
- CASE-2006-RecaldeMS #petri net #simulation
- Improving analysis and simulation of continuous Petri Nets (LR, CM, MS), pp. 9–14.
- CASE-2006-RenWJXY #fault
- A Methodology to Model Human and Organisational Errors on Offshore Risk Analysis (JR, JW, IJ, DLX, JBY), pp. 144–149.
- CASE-2006-SenanayakeSCS
- Instrumented Orthopaedics Analysis System (SMNAS, CYS, JC, RGS), pp. 194–199.
- CASE-2006-ShaoHM #algorithm #component #linear #multi #using
- Quantitative Analysis Using NIR by Building Principal Component- Multiple Linear Regression-BP Algorithm (YS, YH, JM), pp. 161–164.
- CASE-2006-WuD #multi #network #performance
- Performance analysis of complex supply chain networks with multi-product (YW, MD), pp. 630–635.
- CASE-2006-Zhang #enterprise #modelling #process
- Modeling and Analysis of Enterprise Processes (LZ), pp. 393–398.
- CC-2006-BaconCFGHR #named #online #realtime #visualisation
- Demonstration: On-Line Visualization and Analysis of Real-Time Systems with TuningFork (DFB, PC, DF, DG, MH, VTR), pp. 96–100.
- CC-2006-FangCOW #distance #reuse
- Path-Based Reuse Distance Analysis (CF, SC, SÖ, ZW), pp. 32–46.
- CC-2006-LamprechtMS #data flow #model checking
- Data-Flow Analysis as Model Checking Within the jABC (ALL, TMS, BS), pp. 101–104.
- CC-2006-LhotakH #points-to #question
- Context-Sensitive Points-to Analysis: Is It Worth It? (OL, LJH), pp. 47–64.
- CC-2006-RountevKM #data flow #interprocedural #library #scalability
- Interprocedural Dataflow Analysis in the Presence of Large Libraries (AR, SK, TJM), pp. 2–16.
- CC-2006-TokGL #data flow #interprocedural #performance #pointer
- Efficient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers (TBT, SZG, CL), pp. 17–31.
- CGO-2006-ChakrabartiL #heuristic
- Inline Analysis: Beyond Selection Heuristics (DRC, SML), pp. 221–232.
- CGO-2006-LauPC
- Selecting Software Phase Markers with Code Structure Analysis (JL, EP, BC), pp. 135–146.
- DAC-2006-AgarwalN #statistics
- Statistical analysis of SRAM cell stability (KA, SRN), pp. 57–62.
- DAC-2006-BhardwajVGC #modelling #optimisation #process
- Modeling of intra-die process variations for accurate analysis and optimization of nano-scale circuits (SB, SBKV, PG, YC), pp. 791–796.
- DAC-2006-ChaoCWCW #using
- Unknown-tolerance analysis and test-quality control for test response compaction using space compactors (MCTC, KTC, SW, STC, WW), pp. 1083–1088.
- DAC-2006-FatemiNP #logic #statistics #using
- Statistical logic cell delay analysis using a current-based model (HF, SN, MP), pp. 253–256.
- DAC-2006-GhantaVBP #correlation #power management #probability #scalability
- Stochastic variational analysis of large power grids considering intra-die correlations (PG, SBKV, SB, RP), pp. 211–216.
- DAC-2006-IsseninBDD #memory management #multi #reuse
- Multiprocessor system-on-chip data reuse analysis for exploring customized memory hierarchies (II, EB, BD, ND), pp. 49–52.
- DAC-2006-KanjJN #design
- Mixture importance sampling and its application to the analysis of SRAM designs in the presence of rare failure events (RK, RVJ, SRN), pp. 69–72.
- DAC-2006-KhatibPBBBKJN #architecture #design #monitoring #multi #realtime
- A multiprocessor system-on-chip for real-time biomedical monitoring and analysis: architectural design space exploration (IAK, FP, DB, LB, MB, HK, AJ, RN), pp. 125–130.
- DAC-2006-LeeWA #statistics
- Refined statistical static timing analysis through (BNL, LCW, MSA), pp. 149–154.
- DAC-2006-LiLP #power management #statistics
- Projection-based statistical analysis of full-chip leakage power with non-log-normal distributions (XL, JL, LTP), pp. 103–108.
- DAC-2006-LiuMM #design #reliability #tool support
- Design tools for reliability analysis (ZL, BM, JZM), pp. 182–187.
- DAC-2006-LoiASLSB #3d #performance
- A thermally-aware performance analysis of vertically integrated (3-D) processor-memory hierarchy (GLL, BA, NS, SCL, TS, KB), pp. 991–996.
- DAC-2006-MajumdarCG #validation
- Hold time validation on silicon and the relevance of hazards in timing analysis (AM, WYC, JG), pp. 326–331.
- DAC-2006-MandrekarBSES
- System level signal and power integrity analysis methodology for system-in-package applications (RM, KB, KS, EE, MS), pp. 1009–1012.
- DAC-2006-NassifPRSBR #question
- Variation-aware analysis: savior of the nanometer era? (SRN, VP, NR, DS, CB, RR), pp. 411–412.
- DAC-2006-PakbazniaFP #concept
- Charge recycling in MTCMOS circuits: concept and analysis (EP, FF, MP), pp. 97–102.
- DAC-2006-PaulFOL #modelling #performance
- Modeling and analysis of circuit performance of ballistic CNFET (BCP, SF, MO, TL), pp. 717–722.
- DAC-2006-PillSCRBC #formal method #hardware #requirements
- Formal analysis of hardware requirements (IP, SS, RC, MR, RB, AC), pp. 821–826.
- DAC-2006-PomplSHNS #aspect-oriented #design #reliability
- Practical aspects of reliability analysis for IC designs (TP, CS, MH, HN, JS), pp. 193–198.
- DAC-2006-SinghS #component #correlation #independence #parametricity #statistics #using
- Statistical timing analysis with correlated non-gaussian parameters using independent component analysis (JS, SSS), pp. 155–160.
- DAC-2006-SuhendraMRC #detection #performance
- Efficient detection and exploitation of infeasible paths for software timing analysis (VS, TM, AR, TC), pp. 358–363.
- DAC-2006-YuSH #grid #order #performance #power management #reduction
- Fast analysis of structured power grid by triangularization based structure preserving model order reduction (HY, YS, LH), pp. 205–210.
- DATE-2006-AbbaspourFP #statistics
- Non-gaussian statistical interconnect timing analysis (SA, HF, MP), pp. 533–538.
- DATE-2006-AbdollahiP #diagrams #quantum #synthesis #using
- Analysis and synthesis of quantum circuits by using quantum decision diagrams (AA, MP), pp. 317–322.
- DATE-2006-AsadiSTK
- Vulnerability analysis of L2 cache elements to single event upsets (HA, VS, MBT, DRK), pp. 1276–1281.
- DATE-2006-BalachandranBCWRNB #grid #modelling #power management
- Analysis and modeling of power grid transmission lines (JB, SB, GC, TW, WDR, BN, EB), pp. 33–38.
- DATE-2006-BhaduriSCTGG #architecture #design #fault tolerance #framework #hybrid
- A hybrid framework for design and analysis of fault-tolerant architectures (DB, SKS, DC, VET, PSG, MG), pp. 335–336.
- DATE-2006-DensmoreDS #architecture #performance
- FPGA architecture characterization for system level performance analysis (DD, AD, ALSV), pp. 734–739.
- DATE-2006-GillPW #fault #logic
- Soft delay error analysis in logic circuits (BSG, CAP, FGW), pp. 47–52.
- DATE-2006-JinS #satisfiability
- Strong conflict analysis for propositional satisfiability (HJ, FS), pp. 818–823.
- DATE-2006-Kundu #design
- A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
- DATE-2006-KunzliPBT #formal method #performance #simulation
- Combining simulation and formal methods for system-level performance analysis (SK, FP, LB, LT), pp. 236–241.
- DATE-2006-MeiR #performance #using
- Efficient AC analysis of oscillators using least-squares methods (TM, JSR), pp. 263–268.
- DATE-2006-MochockiLC #3d #mobile
- Power analysis of mobile 3D graphics (BM, KL, SC), pp. 502–507.
- DATE-2006-NazarianP
- Cell delay analysis based on rate-of-current change (SN, MP), pp. 539–544.
- DATE-2006-RossiSM
- Analysis of the impact of bus implemented EDCs on on-chip SSN (DR, CS, CM), pp. 59–64.
- DATE-2006-SchirnerD #modelling #transaction
- Quantitative analysis of transaction level models for the AMBA bus (GS, RD), pp. 230–235.
- DATE-2006-SoffkeZMG #approach #combinator #statistics
- A signal theory based approach to the statistical analysis of combinatorial nanoelectronic circuits (OS, PZ, TM, MG), pp. 632–637.
- DATE-2006-TanjiWKA #scalability #using
- Large scale RLC circuit analysis using RLCG-MNA formulation (YT, TW, HK, HA), pp. 45–46.
- DATE-2006-ViehlSBR #design #modelling #performance #simulation #uml
- Formal performance analysis and simulation of UML/SysML models for ESL design (AV, TS, OB, WR), pp. 242–247.
- DATE-2006-WandelerMT #performance #realtime
- Performance analysis of greedy shapers in real-time systems (EW, AM, LT), pp. 444–449.
- DATE-2006-WangM #algorithm #multi
- A logarithmic full-chip thermal analysis algorithm based on multi-layer Green’s function (BW, PM), pp. 39–44.
- DATE-2006-WangXVI #optimisation
- On-chip bus thermal analysis and optimization (FW, YX, NV, MJI), pp. 850–855.
- DATE-2006-YangGZSD #adaptation #design #synthesis
- Adaptive chip-package thermal analysis for synthesis and design (YY, Z(G, CZ, LS, RPD), pp. 844–849.
- DATE-2006-YangV #evaluation #performance #synthesis
- Efficient temperature-dependent symbolic sensitivity analysis and symbolic performance evaluation in analog circuit synthesis (HY, RV), pp. 283–284.
- DATE-2006-ZhangHC #correlation #statistics
- Statistical timing analysis with path reconvergence and spatial correlations (LZ, YH, CCPC), pp. 528–532.
- DATE-2006-ZhouSMS #composition #grid #power management #scalability #using
- Large power grid analysis using domain decomposition (QZ, KS, KM, DCS), pp. 27–32.
- DATE-DF-2006-BononiC #2d #architecture #network #simulation
- Simulation and analysis of network on chip architectures: ring, spidergon and 2D mesh (LB, NC), pp. 154–159.
- HPCA-2006-JosephVT #linear #modelling #performance #using
- Construction and use of linear regression models for processor performance analysis (PJJ, KV, MJT), pp. 99–108.
- LCTES-2006-Mine #c #embedded #pointer #source code
- Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics (AM), pp. 54–63.
- LCTES-2006-SandbergEGL #performance #slicing
- Faster WCET flow analysis by program slicing (CS, AE, JG, BL), pp. 103–112.
- LCTES-2006-ZhuangP #compilation #concurrent #effectiveness #network #thread
- Effective thread management on network processors with compiler analysis (XZ, SP), pp. 72–82.
- OSDI-2006-JoukovTIWZ #latency #operating system #profiling
- Operating System Profiling via Latency Analysis (NJ, AT, RI, CPW, EZ), pp. 89–102.
- PDP-2006-Barlas #clustering #taxonomy #video
- A Taxonomy and DLT-Based Analysis of Cluster-Based Video Trans/En-Coding (GDB), pp. 388–395.
- PDP-2006-DortaLR #bound #performance
- Performance Analysis of Branch-and-Bound Skeletons (ID, CL, CR), pp. 75–82.
- PDP-2006-VaskoD #modelling #workflow
- A View Based Analysis of Workflow Modeling Languages (MV, SD), pp. 293–300.
- ESOP-2006-CodishLSS #termination
- Size-Change Termination Analysis in k-Bits (MC, VL, PS, PJS), pp. 230–245.
- ESOP-2006-HofmannJ #type system
- Type-Based Amortised Heap-Space Analysis (MH, SJ), pp. 22–37.
- FASE-2006-OlveczkyC #algorithm #maude #realtime #scheduling #simulation
- Formal Simulation and Analysis of the CASH Scheduling Algorithm in Real-Time Maude (PCÖ, MC), pp. 357–372.
- FoSSaCS-2006-BackesMPV #encryption
- Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (MB, SM, BP, LV), pp. 428–445.
- FoSSaCS-2006-ZuninoD #protocol
- Handling exp, × (and Timestamps) in Protocol Analysis (RZ, PD), pp. 413–427.
- TACAS-2006-DistefanoOY #logic
- A Local Shape Analysis Based on Separation Logic (DD, PWO, HY), pp. 287–302.
- TACAS-2006-KonigK #abstraction #graph transformation #refinement
- Counterexample-Guided Abstraction Refinement for the Analysis of Graph Transformation Systems (BK, VK), pp. 197–211.
- CAV-2006-BeyerHT #lazy evaluation
- Lazy Shape Analysis (DB, TAH, GT), pp. 532–546.
- CAV-2006-Lev-AmiIS #abstraction #performance #precise
- Abstraction for Shape Analysis with Fast and Precise Transformers (TLA, NI, SS), pp. 547–561.
- CAV-2006-ManoliosV #graph #termination
- Termination Analysis with Calling Context Graphs (PM, DV), pp. 401–414.
- ISSTA-2006-CsallnerS #debugging #hybrid #named
- DSD-Crasher: a hybrid analysis tool for bug finding (CC, YS), pp. 245–254.
- ISSTA-2006-Wagner #detection #quality
- A model and sensitivity analysis of the quality economics of defect-detection techniques (SW0), pp. 73–84.
- ISSTA-2006-ZhangKPWJMZ
- The case for analysis preserving language transformation (XZ, LK, MP, SW, TJ, GM, LZ), pp. 191–202.
- SAT-2006-ChaviraD #component #encoding
- Encoding CNFs to Empower Component Analysis (MC, AD), pp. 61–74.
- SAT-2006-WatanabeY #problem #satisfiability
- Average-Case Analysis for the MAX-2SAT Problem (OW, MY), pp. 277–282.
- TestCom-2006-CsorbaPDC #concurrent #performance
- Performance Analysis of Concurrent PCOs in TTCN-3 (MJC, SP, SD, GC), pp. 149–160.
- VMCAI-2006-ArnoldMSS #abstraction
- Combining Shape Analyses by Intersecting Abstractions (GA, RM, MS, RS), pp. 33–48.
- VMCAI-2006-KobayashiSW #resource management #π-calculus
- Resource Usage Analysis for the pi-Calculus (NK, KS, LW), pp. 298–312.
- VMCAI-2006-SankaranarayananCSM #performance #relational
- Efficient Strongly Relational Polyhedral Analysis (SS, MC, HBS, ZM), pp. 111–125.
- VMCAI-2006-WiesKLPR #constraints
- Field Constraint Analysis (TW, VK, PL, AP, MCR), pp. 157–173.
- CBSE-2005-Rountev #component #data flow
- Component-Level Dataflow Analysis (AR), pp. 82–89.
- WICSA-2005-Garlan #architecture #evaluation
- Software Architecture Evaluation and Analysis Session Report (DG), pp. 227–228.
- WICSA-2005-SmithS #architecture #automation
- Extending SPQR to Architectural Analysis by Semi-Automated Training (JMS, PDS), pp. 239–242.
- WICSA-2005-TekinerdoganSA #architecture #reliability #using
- Software Architecture Reliability Analysis Using Failure Scenarios (BT, HS, MA), pp. 203–204.
- WICSA-2005-WangSM #architecture #named
- ACCA: An Architecture-Centric Concern Analysis Method (ZW, KS, NHM), pp. 99–108.
- HT-2005-Henzinger #web
- Hyperlink analysis on the world wide web (MRH), pp. 1–3.
- HT-2005-HorieYK #higher-order #rank #web
- Higher-order rank analysis for web structure (IH, KY, KK), pp. 98–106.
- HT-2005-MantratzisOC #html #navigation #using
- Separating XHTML content from navigation clutter using DOM-structure block analysis (CM, MAO, SC), pp. 145–147.
- ICDAR-2005-AradhyeMH #categorisation #email #image #performance
- Image Analysis for Efficient Categorization of Image-based Spam E-mail (HBA, GKM, JAH), pp. 914–918.
- ICDAR-2005-BerardiACM #layout #process
- A color-based layout analysis to process censorship cards of film archives (MB, OA, MC, DM), pp. 1110–1114.
- ICDAR-2005-ChenL #algorithm #component #independence #segmentation
- Independent Component Analysis Segmentation Algorithm (YC, GL), pp. 680–684.
- ICDAR-2005-GarainC #approach #multi #segmentation
- Segmentation of Touching Symbols for OCR of Printed Mathematical Expressions: An Approach based on Multifactorial Analysis (UG, BBC), pp. 177–181.
- ICDAR-2005-IshitaniFS #classification #documentation #xml
- Table Structure Analysis Based on Cell Classification and Cell Modification for XML Document Transformation (YI, KF, KS), pp. 1247–1252.
- ICDAR-2005-LavenLR #approach #documentation #image #learning #statistics
- A Statistical Learning Approach To Document Image Analysis (KL, SL, STR), pp. 357–361.
- ICDAR-2005-LiSC #matrix #multi
- A Threshlod Selection Method Based on Multiscale and Graylevel Co-occurrence Matrix Analysis (YL, CYS, MC), pp. 575–579.
- ICDAR-2005-NakamuraK #online
- Individuality Analysis of Online Kanji Handwriting (YN, MK), pp. 620–624.
- ICDAR-2005-SclaroffBKAALMT #gesture #recognition #video
- Tracking, Analysis, and Recognition of Human Gestures in Video (SS, MB, GK, JA, VA, RL, JJM, TPT), pp. 806–810.
- ICDAR-2005-SextonS #matrix #semantics
- Semantic Analysis of Matrix Structures (APS, VS), pp. 1141–1145.
- ICDAR-2005-YingsaereeK #detection #documentation #layout #rule-based
- Rule-based Middle-level Character Detection for Simplifying Thai Document Layout Analysis (CY, AK), pp. 888–892.
- PODS-2005-AbadiW #documentation #encryption #security #xml
- Security analysis of cryptographically controlled access to XML documents (MA, BW), pp. 108–117.
- PODS-2005-Gehrke #modelling #privacy #tutorial
- Models and methods for privacy-preserving data publishing and analysis: invited tutorial (JG), p. 316.
- CSEET-2005-WangS #architecture #student #using
- Using Post Mortem Analysis to Evaluate Software Architecture Student Projects (AIW, TS), pp. 43–50.
- ITiCSE-2005-AhmadzadehEH #debugging #student
- An analysis of patterns of debugging among novice computer science students (MA, DE, CH), pp. 84–88.
- ITiCSE-2005-Dick #assessment #design #learning #student
- Student interviews as a tool for assessment and learning in a systems analysis and design course (MD), pp. 24–28.
- ITiCSE-2005-Hamza #approach #design #object-oriented
- Introducing object-oriented analysis and design in lower-level undergraduate courses: a pattern-based approach (HSH), p. 350.
- ITiCSE-2005-NodelmanH
- Complex analysis in computer graphics course (VN, BH), p. 381.
- SIGITE-2005-Backhouse #design #learning
- Learning individual group skills for software analysis and design in Africa (JB), pp. 107–112.
- SIGITE-2005-BurnsK #development
- A cross-collegiate analysis of software development course content (TB, RK), pp. 333–337.
- CSMR-2005-Al-EkramK #framework #representation #xml
- An XML-Based Framework for Language Neutral Program Representation and Generic Analysis (RAE, KK), pp. 42–51.
- CSMR-2005-GreevyD #approach #correlation #using
- Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach (OG, SD), pp. 314–323.
- CSMR-2005-JiangLSS #comparison #uml #web #web service
- UML-Level Analysis and Comparison of Web Service Descriptions (JJ, JL, PS, TS), pp. 236–240.
- CSMR-2005-KarailaS #case study #industrial #maintenance #source code #visual notation
- Maintenance and Analysis of Visual Programs — An Industrial Case (MK, TS), pp. 158–167.
- ICSM-2005-AlvesCVSDBR #comparative #game studies #migration
- Comparative Analysis of Porting Strategies in J2ME Games (VA, IC, HV, PHMS, ALGD, PB, GR), pp. 123–132.
- ICSM-2005-GreevyDG #evolution #semantics
- Analyzing Feature Traces to Incorporate the Semantics of Change in Software Evolution Analysis (OG, SD, TG), pp. 347–356.
- ICSM-2005-HayesZ #evolution #maintenance #metric #predict
- Maintainability Prediction: A Regression Analysis of Measures of Evolving Systems (JHH, LZ), pp. 601–604.
- ICSM-2005-JinC #integration #ontology #re-engineering #tool support
- Ontology-Based Software Analysis and Reengineering Tool Integration: The OASIS Service-Sharing Methodology (DJ, JRC), pp. 613–616.
- ICSM-2005-Lock #modelling #named
- Strider: Configuration Modelling and Analysis of Complex Systems (SL), pp. 495–504.
- ICSM-2005-MilanovaR #constraints #precise
- Annotated Inclusion Constraints for Precise Flow Analysis (AM, BGR), pp. 187–196.
- ICSM-2005-StorzerG #aspect-oriented #evolution #using
- Using Pointcut Delta Analysis to Support Evolution of Aspect-Oriented Software (MS, JG), pp. 653–656.
- ICSM-IT-2005-Pacione #abstraction #named #network #visualisation
- VANESSA: Visualisation Abstraction NEtwork for Software Systems Analysis (MJP), pp. 85–88.
- IWPC-2005-FischerOGG #evolution #execution
- System Evolution Tracking through Execution Trace Analysis (MF, JO, HCG, TG), pp. 237–246.
- IWPC-2005-Hamou-LhadjLF #named
- SEAT: A Usable Trace Analysis Tool (AHL, TCL, LF), pp. 157–160.
- MSR-2005-ConklinHC #collaboration #repository #using
- Collaboration using OSSmole: a repository of FLOSS data and analyses (MC, JH, KC), pp. 76–80.
- MSR-2005-KimWB
- Analysis of signature change patterns (SK, EJWJ, JB), pp. 16–20.
- PASTE-2005-BradburyCD #effectiveness #empirical #formal method #framework #testing
- An empirical framework for comparing effectiveness of testing and property-based formal analysis (JSB, JRC, JD), pp. 2–5.
- PASTE-2005-ChristodorescuKG #string
- String analysis for x86 binaries (MC, NK, WHG), pp. 88–95.
- PASTE-2005-HampapuramYD #data flow #simulation
- Symbolic path simulation in path-sensitive dataflow analysis (HH, YY, MD), pp. 52–58.
- PASTE-2005-RountevVR #control flow #diagrams #reverse engineering #sequence chart #uml
- Static control-flow analysis for reverse engineering of UML sequence diagrams (AR, OV, MR), pp. 96–102.
- SCAM-2005-BussEYW #pointer #text-to-text
- Pointer Analysis for Source-to-Source Transformations (MB, SAE, BY, DGW), pp. 139–150.
- SCAM-2005-FluriGP #fine-grained
- Fine-Grained Analysis of Change Couplings (BF, HG, MP), pp. 66–74.
- SCAM-2005-JonesK #garbage collection #performance #thread
- A Fast Analysis for Thread-Local Garbage Collection with Dynamic Class Loading (REJ, ACK), pp. 129–138.
- ICALP-2005-DonatoLT #algorithm #ranking #similarity
- Stability and Similarity of Link Analysis Ranking Algorithms (DD, SL, PT), pp. 717–729.
- FM-2005-BuchholtzGHM #framework #performance #platform #security
- End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform (MB, SG, VH, CM), pp. 286–301.
- FM-2005-CacheraJPS #memory management
- Certified Memory Usage Analysis (DC, TPJ, DP, GS), pp. 91–106.
- FM-2005-SharyginaCCS #component
- Dynamic Component Substitutability Analysis (NS, SC, EMC, NS), pp. 512–528.
- IFM-2005-GrunskeLYW #automation #behaviour #design #specification
- An Automated Failure Mode and Effect Analysis Based on High-Level Design Specification with Behavior Trees (LG, PAL, NY, KW), pp. 129–149.
- SEFM-2005-BarthePS #logic #memory management #precise #using
- Precise Analysis of Memory Consumption using Program Logics (GB, MP, GS), pp. 86–95.
- SEFM-2005-CeroneLC #formal method #human-computer #interactive #model checking #using
- Formal Analysis of Human-computer Interaction using Model-checking (AC, PAL, SC), pp. 352–362.
- SEFM-2005-GeorgievaM #logic
- Description Logics for Shape Analysis (LG, PM), pp. 321–331.
- SEFM-2005-LanotteMT #automaton #data type #design #distributed
- Timed Automata with Data Structures for Distributed Systems Design and Analysis (RL, AMS, AT), pp. 44–53.
- SFM-2005-Grassi #mobile #performance
- Performance Analysis of Mobile Systems (VG), pp. 107–154.
- ICFP-2005-BergerHY #alias #higher-order #imperative #logic
- A logical analysis of aliasing in imperative higher-order functions (MB, KH, NY), pp. 280–293.
- IFL-2005-GrelckSS #array #source code
- A Binding Scope Analysis for Generic Programs on Arrays (CG, SBS, AVS), pp. 212–230.
- AIIDE-2005-SoutheyXHTB #automation #machine learning
- Semi-Automated Gameplay Analysis by Machine Learning (FS, GX, RCH, MT, JWB), pp. 123–128.
- DiGRA-2005-ElverdamA #classification #design #game studies
- Game Classification as Game Design: Construction Through Critical Analysis (CE, EA).
- DiGRA-2005-Galarneau05a #community #ecosystem #game studies #learning #multi #online #social
- Spontaneous Communities of Learning: A Social Analysis of Learning Ecosystems in Massively Multiplayer Online Gaming (MMOG) Environments (LG).
- DiGRA-2005-Huntemann #game studies #industrial
- When Games and Media Collide: A Political Economic Analysis of the Digital Games Industry (NH).
- DiGRA-2005-ThomasH #game studies
- Cinematic Camera as Videogame Cliché: Analysis and Software Demonstration (DT, GH).
- DiGRA-2005-Wong #game studies #online
- Playing with Heritage: Semiotics and cultural analysis of the online Mahjong game in the global environment (WW).
- DiGRA-2005-ZagalMFHL #game studies #ontology #towards
- Towards an Ontological Language for Game Analysis (JPZ, MM, CFV, BH, NL).
- CHI-2005-HinckleyBRG #design #gesture
- Design and analysis of delimiters for selection-action pen gesture phrases in scriboli (KH, PB, GR, FG), pp. 451–460.
- CHI-2005-LiHGL #user interface
- Experimental analysis of mode switching techniques in pen-based user interfaces (YL, KH, ZG, JAL), pp. 461–470.
- SOFTVIS-2005-JohannesSW #algorithm #animation #using #visualisation
- Algorithm animation using shape analysis: visualising abstract executions (DJ, RS, RW), pp. 17–26.
- SOFTVIS-2005-KholkarKSV #case study #specification #visual notation
- Visual specification and analysis of use cases (DK, GMK, US, RV), pp. 77–85.
- VISSOFT-2005-RillingN #3d #comprehension #design pattern
- Applying Code Analysis and 3D Design Pattern Grouping to Facilitate Program Comprehension (JR, VLN), pp. 123–124.
- CAiSE-2005-Evermann #concept #modelling #ontology #using
- The Association Construct in Conceptual Modelling — An Analysis Using the Bunge Ontological Model (JE), pp. 33–47.
- EDOC-2005-JonkersILS #aspect-oriented #development #integration #modelling #non-functional
- Integration and Analysis of Functional and Non-Functional Aspects in Model-Driven E-Service Development (HJ, MEI, MML, PS), pp. 229–238.
- ICEIS-v1-2005-AndreouL #parametricity #reliability
- Nonparametric Analysis of Software Reliability: Revealing the Nature of Software Failure Dataseries (ASA, CL), pp. 138–145.
- ICEIS-v2-2005-MezaNMGC #modelling
- Free Software for Decision Analysis: A Software Package for Data Envelopment Models (LAM, LBN, JCCBSdM, EGG, PHGC), pp. 207–212.
- ICEIS-v3-2005-Boulanger #named #safety
- BRAIL — Safety Requirement Analysis (JLB), pp. 108–111.
- ICEIS-v3-2005-Liang #information management #modelling #specification
- Dialogue Act Modelling for Analysis and Specification of Web-Based Information Systems (YL), pp. 89–97.
- ICEIS-v3-2005-MenkhausA #embedded #metric
- Metric Suite Directing the Failure Mode Analysis of Embedded Software Systems (GM, BA), pp. 266–273.
- ICEIS-v3-2005-MisraKK #modelling
- Modeling Strategic Actor Relationships to Support Risk Analysis and Control in Software Projects (SCM, VK, UK), pp. 288–293.
- ICEIS-v3-2005-PereiraTS #development
- Sustainable Development and Investment in Information Technologies: A Socio-Economic Analysis (MJP, LVT, RS), pp. 81–88.
- ICEIS-v3-2005-YangLZ #performance #process
- A Theoretical Performance Analysis Method for Business Process Model (LY, YL, XZ), pp. 73–80.
- ICEIS-v5-2005-RuschelIRF #concept #design #framework #process
- Designing Geographic Analysis Processes on the Basis of the Conceptual Framework Geoframe (CR, CI, LVdR, JLF), pp. 91–97.
- CIKM-2005-AlonsoL
- Model-guided information discovery for intelligence analysis (RA, HL), pp. 269–270.
- CIKM-2005-AslamY #geometry
- A geometric interpretation and analysis of R-precision (JAA, EY), pp. 664–671.
- CIKM-2005-MishneCHRS #automation
- Automatic analysis of call-center conversations (GM, DC, RH, AR, AS), pp. 453–459.
- CIKM-2005-WhitelawGA #sentiment #using
- Using appraisal groups for sentiment analysis (CW, NG, SA), pp. 625–631.
- ECIR-2005-BalfeS #collaboration #query #similarity #web
- An Analysis of Query Similarity in Collaborative Web Search (EB, BS), pp. 330–344.
- ECIR-2005-CachedaCPO #architecture #distributed #information retrieval #network
- Network Analysis for Distributed Information Retrieval Architectures (FC, VC, VP, IO), pp. 527–529.
- ECIR-2005-DingCZ #clustering #concept #detection #video
- Temporal Shot Clustering Analysis for Video Concept Detection (DD, LC, BZ), pp. 558–560.
- ECIR-2005-HauffA #documentation
- Age Dependent Document Priors in Link Structure Analysis (CH, LA), pp. 552–554.
- ICML-2005-HeCM #locality #statistics
- Statistical and computational analysis of locality preserving projection (XH, DC, WM), pp. 281–288.
- ICML-2005-Pietraszek #classification #optimisation #using
- Optimizing abstaining classifiers using ROC analysis (TP), pp. 665–672.
- ICML-2005-PoczosL #independence #using
- Independent subspace analysis using geodesic spanning trees (BP, AL), pp. 673–680.
- ICML-2005-ShaS #reduction
- Analysis and extension of spectral methods for nonlinear dimensionality reduction (FS, LKS), pp. 784–791.
- ICML-2005-SinghPGBB #learning
- Active learning for sampling in time-series experiments with application to gene expression analysis (RS, NP, DKG, BB, ZBJ), pp. 832–839.
- ICML-2005-StrehlL #estimation #modelling
- A theoretical analysis of Model-Based Interval Estimation (ALS, MLL), pp. 856–863.
- ICML-2005-TorreK #multimodal
- Multimodal oriented discriminant analysis (FDlT, TK), pp. 177–184.
- KDD-2005-ChenH #classification #image #network
- A Bayesian network classifier with inverse tree structure for voxelwise magnetic resonance image analysis (RC, EH), pp. 4–12.
- KDD-2005-ItoSKM #kernel
- Application of kernels to link analysis (TI, MS, TK, YM), pp. 586–592.
- MLDM-2005-BunkeDIK #graph #learning #predict
- Analysis of Time Series of Graphs: Prediction of Node Presence by Means of Decision Tree Learning (HB, PJD, CI, MK), pp. 366–375.
- MLDM-2005-GhoshGYB #algorithm #comparative #network #search-based
- Comparative Analysis of Genetic Algorithm, Simulated Annealing and Cutting Angle Method for Artificial Neural Networks (RG, MG, JY, AMB), pp. 62–70.
- MLDM-2005-HamanoS #semantics
- Semantic Analysis of Association Rules via Item Response Theory (SH, MS), pp. 641–650.
- MLDM-2005-HanCY #component #feature model #image #independence #using
- Aquaculture Feature Extraction from Satellite Image Using Independent Component Analysis (JGH, KHC, YKY), pp. 660–666.
- MLDM-2005-OhnishiI #component #detection #independence #using
- Dominant Plane Detection Using Optical Flow and Independent Component Analysis (NO, AI), pp. 497–506.
- SEKE-2005-AyalaCCGHSFMQ #comparative #modelling
- A Comparative Analysis of i*-Based Agent-Oriented Modeling Languages (CPA, CC, JPC, GG, MH, GS, XF, EM, CQ), pp. 43–50.
- SEKE-2005-KongOF #formal method #security #workflow
- Formal Analysis of Workflow Systems with Security Considerations (WK, KO, KF), pp. 531–536.
- SEKE-2005-LiCLY #design #evolution #feature model #legacy #using
- Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution (SL, FC, ZL, HY), pp. 336–341.
- SEKE-2005-LiuCBGROA #approach #component #composition #quality #requirements #two-level grammar
- Quality of Service-Driven Requirements Analysis for Component Composition: A Two-Level Grammar+Approach (SHL, FC, BRB, JGG, RRR, AMO, MA), pp. 731–734.
- SEKE-2005-LungZ #architecture #combinator #design
- Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis (CHL, MZ), pp. 418–423.
- SEKE-2005-YuLYH #aspect-oriented #modelling
- Formal Aspect-Oriented Modeling and Analysis by Aspect (HY, DL, LY, XH), pp. 169–174.
- SIGIR-2005-AgichteinCB #effectiveness
- Analysis of factoid questions for effective relation extraction (EA, SC, EB), pp. 567–568.
- SIGIR-2005-LiY #recursion
- Analysis of recursive feature elimination methods (FL, YY), pp. 633–634.
- SIGIR-2005-TeevanDH #automation #personalisation #process
- Personalizing search via automated analysis of interests and activities (JT, STD, EH), pp. 449–456.
- SIGIR-2005-XueYZYC
- Exploiting the hierarchical structure for link analysis (GRX, QY, HJZ, YY, ZC), pp. 186–193.
- SIGIR-2005-XuSMK #automation #music #summary #video
- Automatic music video summarization based on audio-visual-text analysis and alignment (CX, XS, NCM, MSK), pp. 361–368.
- ECMDA-FA-2005-GarousiBL #control flow #diagrams #sequence chart #uml
- Control Flow Analysis of UML 2.0 Sequence Diagrams (VG, LCB, YL), pp. 160–174.
- ECMDA-FA-2005-TabuchiSN #algebra #design #modelling #performance #probability #process #uml
- Model-Driven Performance Analysis of UML Design Models Based on Stochastic Process Algebra (NT, NS, HN), pp. 41–58.
- MoDELS-2005-ChengSB #automation #industrial #lessons learnt #modelling #uml
- Lessons Learned from Automated Analysis of Industrial UML Class Models (BHCC, RS, BB), pp. 324–338.
- MoDELS-2005-ShenP #aspect-oriented #modelling #performance #uml #using
- Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
- MoDELS-2005-ChengSB #automation #industrial #lessons learnt #modelling #uml
- Lessons Learned from Automated Analysis of Industrial UML Class Models (BHCC, RS, BB), pp. 324–338.
- MoDELS-2005-ShenP #aspect-oriented #modelling #performance #uml #using
- Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
- ECOOP-2005-PistoiaFKS #detection #interprocedural
- Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
- OOPSLA-2005-ShankarSBS #runtime
- Runtime specialization with optimistic heap analysis (AS, SSS, RB, JES), pp. 327–343.
- OOPSLA-2005-SridharanGSB #java #points-to
- Demand-driven points-to analysis for Java (MS, DG, LS, RB), pp. 59–76.
- QAPL-2004-AldiniP05 #on the #probability #protocol
- On Quantitative Analysis of Probabilistic Protocols (AA, ADP), pp. 131–148.
- QAPL-2004-LanotteMT05 #automation #protocol
- Automatic Analysis of a Non-Repudiation Protocol (RL, AMS, AT), pp. 113–129.
- LOPSTR-2005-CorreasPHB #composition #source code
- Experiments in Context-Sensitive Analysis of Modular Programs (JC, GP, MVH, FB), pp. 163–178.
- POPL-2005-GopanRS #array #framework
- A framework for numeric analysis of array operations (DG, TWR, SS), pp. 338–350.
- POPL-2005-GulwaniN #interprocedural #precise #random #using
- Precise interprocedural analysis using random interpretation (SG, GCN), pp. 324–337.
- POPL-2005-HackettR
- Region-based shape analysis with tracked locations (BH, RR), pp. 310–323.
- POPL-2005-LernerMRC #automation #data flow #proving
- Automated soundness proofs for dataflow analyses and transformations via local rules (SL, TDM, ER, CC), pp. 364–377.
- PPDP-2005-Mitchell #logic #network #protocol #security
- Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
- PPDP-2005-SahaR #incremental #logic programming #points-to #using
- Incremental and demand-driven points-to analysis using logic programming (DS, CRR), pp. 117–128.
- SAS-2005-BruynoogheGH #logic programming #source code #termination
- Inference of Well-Typings for Logic Programs with Application to Termination Analysis (MB, JPG, WVH), pp. 35–51.
- SAS-2005-JungKSY #c #statistics
- Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis (YJ, JK, JS, KY), pp. 203–217.
- SAS-2005-KodumalA #constraints #named #scalability #tool support
- Banshee: A Scalable Constraint-Based Analysis Toolkit (JK, AA), pp. 218–234.
- SAS-2005-Muller-OlmS #framework #interprocedural
- A Generic Framework for Interprocedural Analysis of Numerical Properties (MMO, HS), pp. 235–250.
- SAS-2005-RinetzkySY #interprocedural #source code
- Interprocedural Shape Analysis for Cutpoint-Free Programs (NR, MS, EY), pp. 284–302.
- SAS-2005-SecciS #object-oriented #source code
- Pair-Sharing Analysis of Object-Oriented Programs (SS, FS), pp. 320–335.
- SAS-2005-SimonK
- Exploiting Sparsity in Polyhedral Analysis (AS, AK), pp. 336–351.
- SIGAda-2005-AlexandrID #ada #clustering #performance #source code
- Experimental performance analysis of ada programs in cluster system (KA, SI, KD), pp. 31–36.
- SIGAda-2005-SinghoffLNM #memory management #requirements #scheduling
- Scheduling and memory requirements analysis with AADL (FS, JL, LN, LM), pp. 1–10.
- RE-2005-BucchiaroneGP #case study #industrial #quality #requirements
- Quality Analysis of NL Requirements: An Industrial Case Study (AB, SG, PP), pp. 390–394.
- RE-2005-CoheneE #design
- Contextual Risk Analysis for Interview Design (TC, SME), pp. 95–104.
- RE-2005-Fuji #education #requirements
- Finding Competitive Advantage in Requirements Analysis Education (TF), pp. 493–494.
- RE-2005-GrauFM #architecture #named
- REDEPEND-REACT: an Architecture Analysis Tool (GG, XF, NAMM), pp. 455–456.
- RE-2005-LutzNPFT #identification #requirements #using
- Identifying Contingency Requirements Using Obstacle Analysis (RRL, SN, APH, CRF, DT), pp. 263–272.
- RE-2005-Nakamura #integration #project management
- Analysis of Project Management Reports of 49 System Integration Projects (TN), pp. 485–486.
- RE-2005-RobinsonWW #design #probability #requirements #using
- Risk Mitigation of Design Requirements Using a Probabilistic Analysis (MCR, SEW, DCW), pp. 231–239.
- RE-2005-SvetinovicBG #concept #identification #object-oriented #student #why
- Concept Identification in Object-Oriented Domain Analysis: Why Some Students Just Don’t Get It (DS, DMB, MWG), pp. 189–198.
- ASE-2005-CaiS #design #modelling #named
- Simon: modeling and analysis of design space structures (YC, KJS), pp. 329–332.
- ASE-2005-FredrikssonTC #component #design #development #framework #non-functional
- A component-based development framework for supporting functional and non-functional analysis in control system design (JF, MT, IC), pp. 368–371.
- ASE-2005-FriasGSB #performance #relational #specification #verification
- A strategy for efficient verification of relational specifications, based on monotonicity analysis (MFF, RG, GS, LB), pp. 305–308.
- ASE-2005-HalfondO #injection #monitoring #named
- AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks (WGJH, AO), pp. 174–183.
- ASE-2005-HennessyP #generative #grammarware #testing
- An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based software (MH, JFP), pp. 104–113.
- ASE-2005-JurjensY #security
- Code security analysis with assertions (JJ, MY), pp. 392–395.
- ASE-2005-LangelierSP #quality #scalability #visualisation
- Visualization-based analysis of quality for large-scale software systems (GL, HAS, PP), pp. 214–223.
- ASE-2005-ShepherdPPC #automation #framework #mining #named
- Timna: a framework for automatically combining aspect mining analyses (DCS, JP, LLP, MCC), pp. 184–193.
- ESEC-FSE-2005-InverardiMP #architecture #named
- CHARMY: an extensible tool for architectural analysis (PI, HM, PP), pp. 111–114.
- ESEC-FSE-2005-KuncakJ #algebra #data type #relational
- Relational analysis of algebraic datatypes (VK, DJ), pp. 207–216.
- GTTSE-2005-BenavidesSMC #automation #csp #feature model #java #modelling #using
- Using Java CSP Solvers in the Automated Analyses of Feature Models (DB, SS, PTMA, ARC), pp. 399–408.
- GTTSE-2005-EkmanH #composition #jastadd #java #using
- Modular Name Analysis for Java Using JastAdd (TE, GH), pp. 422–436.
- ICSE-2005-AvotsDLL #c #pointer #security
- Improving software security with a C pointer analysis (DA, MD, VBL, MSL), pp. 332–341.
- ICSE-2005-LetierKMU #monitoring #requirements
- Monitoring and control in scenario-based requirements analysis (EL, JK, JM, SU), pp. 382–391.
- ICSE-2005-RountevC #diagrams #sequence chart
- Object naming analysis for reverse-engineered sequence diagrams (AR, BHC), pp. 254–263.
- SAC-2005-AbbasMG
- Temporal analysis of infectious diseases: influenza (KA, ARM, RG), pp. 267–271.
- SAC-2005-BleisteinCV #approach #requirements
- Strategic alignment in requirements analysis for organizational IT: an integrated approach (SJB, KC, JMV), pp. 1300–1307.
- SAC-2005-Casale #mining #network #performance #web
- Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
- SAC-2005-ChenA #approach #comparative #predict #sequence #using
- A new approach for gene prediction using comparative sequence analysis (RC, HHA), pp. 177–184.
- SAC-2005-CuiK #documentation #topic
- Topic activation analysis for document streams based on document arrival rate and relevance (CC, HK), pp. 1089–1095.
- SAC-2005-DalkilicS #design #evaluation
- Design and evaluation of CATPA: curation and alignment tool for protein analysis (MMD, AS), pp. 190–194.
- SAC-2005-DaoudM #mobile #reliability
- Reliability analysis of mobile agent-based systems (MD, QHM), pp. 92–93.
- SAC-2005-FernandezS #modelling
- An analysis of modeling flaws in HL7 and JAHIS (EBF, TS), pp. 216–223.
- SAC-2005-HouD #design #detection #search-based
- Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
- SAC-2005-JiJC #adaptation #migration
- Adaptation point analysis for computation migration/checkpointing (YJ, HJ, VC), pp. 750–751.
- SAC-2005-NicolaLM #formal method #mobile #modelling
- Formal modeling and quantitative analysis of KLAIM-based mobile systems (RDN, DL, MM), pp. 428–435.
- SAC-2005-PervouchineLM #documentation #forensics
- Handwritten character skeletonisation for forensic document analysis (VP, GL, KM), pp. 754–758.
- SAC-2005-Rosso #framework #message passing #paradigm #performance #scalability
- Performance analysis framework for large software-intensive systems with a message passing paradigm (CDR), pp. 885–889.
- SAC-2005-ZhangP
- Effort and accuracy analysis of choice strategies for electronic product catalogs (JZ, PP), pp. 808–814.
- LDTA-2005-CassidyCDD #concurrent
- Source Transformation for Concurrency Analysis (TC, JRC, TRD, JD), pp. 57–75.
- CASE-2005-JainR #modelling #using
- Analysis of base-stock controlled production-inventory system using discrete-time queueing models (SJ, NRSR), pp. 37–42.
- CASE-2005-KoschwanezHCMGM #automation
- Automated lifetime analysis of a single yeast cell (JK, MH, RHC, MM, DG, DRM), pp. 13–18.
- CASE-2005-LeeH #array #design
- An integrated system of microcantilever arrays with carbon nanotube tips for bio/nano analysis: design and control (EL, HSH), pp. 113–117.
- CASE-2005-LeeP #constraints #graph
- Steady state analysis of a timed event graph with time window constraints (TEL, SHP), pp. 404–409.
- CASE-2005-MeldrumHFSMRPMCDW
- Sample preparation in glass capillaries for high-throughput biochemical analyses (DRM, MH, CHF, MSS, SKM, TTHR, WHP, SEM, DLC, DAD, PJW), pp. 7–12.
- CASE-2005-MillerSSLM #using
- Biopsy preparation for flow analysis using microfabricated disaggregation blades (AKM, MLS, CAS, XL, SM), pp. 1–6.
- CC-2005-QianH #case study #jit
- A Study of Type Analysis for Speculative Method Inlining in a JIT Environment (FQ, LJH), pp. 255–270.
- CC-2005-XueN #object-oriented #source code
- Completeness Analysis for Incomplete Object-Oriented Programs (JX, PHN), pp. 271–286.
- CGO-2005-GuoBTORA #low level #pointer
- Practical and Accurate Low-Level Pointer Analysis (BG, MJB, ST, GO, ER, DIA), pp. 291–302.
- COCV-J-2005-SalcianuA #correctness #data flow #proving
- Machine-Checkable Correctness Proofs for Intra-procedural Dataflow Analyses (AS, KA), pp. 53–68.
- DAC-2005-AgarwalCBZ #optimisation #statistics #using
- Circuit optimization using statistical static timing analysis (AA, KC, DB, VZ), pp. 321–324.
- DAC-2005-AminMKDCHI #how #question #statistics
- Statistical static timing analysis: how simple can we get? (CSA, NM, KK, FD, UC, NH, YII), pp. 652–657.
- DAC-2005-ChangS #correlation #power management #process
- Full-chip analysis of leakage power under process variations, including spatial correlations (HC, SSS), pp. 523–528.
- DAC-2005-ChangZNV #parametricity #statistics
- Parameterized block-based statistical timing analysis with non-gaussian parameters, nonlinear delay functions (HC, VZ, SN, CV), pp. 71–76.
- DAC-2005-ChenDHSW #concurrent #design #simulation
- Simulation based deadlock analysis for system level designs (XC, AD, HH, ALSV, YW), pp. 260–265.
- DAC-2005-DililloGPVB #comparison #fault #injection
- Resistive-open defect injection in SRAM core-cell: analysis and comparison between 0.13 µm and 90 nm technologies (LD, PG, SP, AV, MB), pp. 857–862.
- DAC-2005-GuptaKKS
- Advanced Timing Analysis Based on Post-OPC Extraction of Critical Dimensions (PG, ABK, YK, DS), pp. 365–368.
- DAC-2005-HuLWD #integration #novel #using
- Analysis of full-wave conductor system impedance over substrate using novel integration techniques (XH, JHL, JW, LD), pp. 147–152.
- DAC-2005-KhandelwalS #correlation #framework #statistics
- A general framework for accurate statistical timing analysis considering correlations (VK, AS), pp. 89–94.
- DAC-2005-Li #grid #performance #power management #simulation
- Power grid simulation via efficient sampling-based sensitivity analysis and hierarchical symbolic relaxation (PL), pp. 664–669.
- DAC-2005-Najm #on the #statistics
- On the need for statistical timing analysis (FNN), pp. 764–765.
- DAC-2005-SuWKLK #effectiveness #embedded #functional #performance
- A noise-driven effective capacitance method with fast embedded noise rule calculation for functional noise analysis (HS, DW, CVK, FL, BK), pp. 186–189.
- DAC-2005-YangCS
- Advanced timing analysis based on post-OPC extraction of critical dimensions (JY, LC, DS), pp. 359–364.
- DAC-2005-ZhangCHGC #polynomial #statistics
- Correlation-preserved non-gaussian statistical timing analysis with quadratic timing model (LZ, WC, YH, JAG, CCPC), pp. 83–88.
- DAC-2005-ZhanSLPNS #statistics
- Correlation-aware statistical timing analysis with non-gaussian delay distributions (YZ, AJS, XL, LTP, DN, MS), pp. 77–82.
- DAC-2005-Zhu #pointer #scalability #towards
- Towards scalable flow and context sensitive pointer analysis (JZ), pp. 831–836.
- DATE-2005-Al-ArsHMG #fault #framework #generative #testing
- Framework for Fault Analysis and Test Generation in DRAMs (ZAA, SH, GM, AJvdG), pp. 1020–1021.
- DATE-2005-AlbersS #performance #realtime #scheduling
- Efficient Feasibility Analysis for Real-Time Systems with EDF Scheduling (KA, FS), pp. 492–497.
- DATE-2005-ChakrabortyT #scheduling #streaming
- A New Task Model for Streaming Applications and Its Schedulability Analysis (SC, LT), pp. 486–491.
- DATE-2005-Conti #architecture #power management
- SystemC Analysis of a New Dynamic Power Management Architectur (MC), pp. 177–178.
- DATE-2005-ContiM #standard
- System Level Analysis of the Bluetooth Standard (MC, DM), pp. 118–123.
- DATE-2005-DhillonDC #optimisation
- Soft-Error Tolerance Analysis and Optimization of Nanometer Circuits (YSD, AUD, AC), pp. 288–293.
- DATE-2005-ForzanP #behaviour #library #modelling
- Modeling the Non-Linear Behavior of Library Cells for an Accurate Static Noise Analysis (CF, DP), pp. 982–983.
- DATE-2005-GhantaVPW #grid #power management #probability #process
- Stochastic Power Grid Analysis Considering Process Variations (PG, SBKV, RP, JMW), pp. 964–969.
- DATE-2005-HeniaE #distributed #scheduling
- Context-Aware Scheduling Analysis of Distributed Systems with Tree-Shaped Task-Dependencies (RH, RE), pp. 480–485.
- DATE-2005-KangPR #statistics #using
- Statistical Timing Analysis using Levelized Covariance Propagation (KK, BCP, KR), pp. 764–769.
- DATE-2005-LiC #clustering #hybrid #sequence
- Hybrid BIST Based on Repeating Sequences and Cluster Analysis (LL, KC), pp. 1142–1147.
- DATE-2005-LiuFYO #correlation #graph #modelling
- Hierarchical Variance Analysis for Analog Circuits Based on Graph Modelling and Correlation Loop Tracing (FL, JJF, DVY, SO), pp. 126–131.
- DATE-2005-MangassarianA #on the #statistics
- On Statistical Timing Analysis with Inter- and Intra-Die Variations (HM, MA), pp. 132–137.
- DATE-2005-MilevB
- A Tool and Methodology for AC-Stability Analysis of Continuous-Time Closed-Loop Systems (MM, RB), pp. 204–208.
- DATE-2005-MukhopadhyayBR #logic #modelling
- Modeling and Analysis of Loading Effect in Leakage of Nano-Scaled Bulk-CMOS Logic Circuits (SM, SB, KR), pp. 224–229.
- DATE-2005-NazarianPTLA #modelling
- Modeling and Propagation of Noisy Waveforms in Static Timing Analysis (SN, MP, ET, TL, AHA), pp. 776–777.
- DATE-2005-PomeranzR #detection #testing #worst-case
- Worst-Case and Average-Case Analysis of n-Detection Test Sets (IP, SMR), pp. 444–449.
- DATE-2005-SchianoOLPS #fault #on the #reliability
- On the Analysis of Reed Solomon Coding for Resilience to Transient/Permanent Faults in Highly Reliable Memories (LS, MO, FL, SP, AS), pp. 580–585.
- DATE-2005-ShenQL #algorithm #performance
- A Faster Counterexample Minimization Algorithm Based on Refutation Analysis (SS, YQ, SL), pp. 672–677.
- DATE-2005-SoensPWD #simulation
- Simulation Methodology for Analysis of Substrate Noise Impact on Analog / RF Circuits Including Interconnect Resistance (CS, GVdP, PW, SD), pp. 270–275.
- DATE-2005-StaschulatESW #performance
- Context Sensitive Performance Analysis of Automotive Applications (JS, RE, AS, FW), pp. 165–170.
- DATE-2005-VargheseCY #using
- Systematic Analysis of Active Clock Deskewing Systems Using Control Theory (VV, TC, PMY), pp. 820–825.
- DATE-2005-WangMDCM #embedded #energy #process #variability
- Systematic Analysis of Energy and Delay Impact of Very Deep Submicron Process Variability Effects in Embedded SRAM Modules (HW, MM, WD, FC, KM), pp. 914–919.
- DATE-2005-ZhangCHC #pseudo #statistics
- Statistical Timing Analysis with Extended Pseudo-Canonical Timing Model (LZ, WC, YH, CCPC), pp. 952–957.
- HPDC-2005-BaudCLN #grid #performance
- Performance analysis of a file catalog for the LHC computing grid (JPB, JC, SL, CN), pp. 91–99.
- LCTES-2005-StaschulatE #precise #scalability #scheduling
- Scalable precision cache analysis for preemptive scheduling (JS, RE), pp. 157–165.
- LCTES-2005-TanM
- WCRT analysis for a uniprocessor with a unified prioritized cache (YT, VJMI), pp. 175–182.
- PDP-2005-GuitartCTAL #using #web
- Tuning Dynamic Web Applications using Fine-Grain Analysis (JG, DC, JT, EA, JL), pp. 84–91.
- PPoPP-2005-SasturkarAWS #automation #type system
- Automated type-based analysis of data races and atomicity (AS, RA, LW, SDS), pp. 83–94.
- WRLA-2004-MeseguerT05 #encryption #protocol #reachability #using #verification
- Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
- ESOP-2005-KremerR #protocol #π-calculus
- Analysis of an Electronic Voting Protocol in the Applied π Calculus (SK, MR), pp. 186–200.
- ESOP-2005-LeeYY #automation #grammarware #pointer #source code #using #verification
- Automatic Verification of Pointer Programs Using Grammar-Based Shape Analysis (OL, HY, KY), pp. 124–140.
- ESOP-2005-Muller-OlmS #composition
- Analysis of Modular Arithmetic (MMO, HS), pp. 46–60.
- FASE-2005-JakobacEM #comprehension #interactive #source code
- Improving System Understanding via Interactive, Tailorable, Source Code Analysis (VJ, AE, NM), pp. 253–268.
- FASE-2005-JurjensS #development #security #tool support #uml
- Tools for Secure Systems Development with UML: Security Analysis with ATPs (JJ, PS), pp. 305–309.
- FASE-2005-LeicherS #composition #modelling #uml
- Augmenting UML Models for Composition Conflict Analysis (AL, JGS), pp. 127–140.
- TACAS-2005-JeannetJRZ #approximate #testing
- Symbolic Test Selection Based on Approximate Analysis (BJ, TJ, VR, EZ), pp. 349–364.
- TACAS-2005-JinHS #performance
- Efficient Conflict Analysis for Finding All Satisfying Assignments of a Boolean Circuit (HJ, HH, FS), pp. 287–300.
- TACAS-2005-PnueliPR
- Separating Fairness and Well-Foundedness for the Analysis of Fair Discrete Systems (AP, AP, AR), pp. 124–139.
- SAT-J-2004-TangYRM05 #algorithm #problem #quantifier #satisfiability
- Analysis of Search Based Algorithms for Satisfiability of Propositional and Quantified Boolean Formulas Arising from Circuit State Space Diameter Problems (DT, YY, DR, SM), pp. 292–305.
- CAV-2005-ConwayNDE #algorithm #incremental #interprocedural #safety
- Incremental Algorithms for Inter-procedural Analysis of Safety Properties (CLC, KSN, DD, SAE), pp. 449–461.
- CAV-2005-Monniaux #composition #float #linear
- Compositional Analysis of Floating-Point Linear Numerical Filters (DM), pp. 199–212.
- CSL-2005-Lambov #complexity #framework
- Complexity and Intensionality in a Type-1 Framework for Computable Analysis (BL), pp. 442–461.
- ICLP-2005-BrasselH #functional #logic programming #nondeterminism #source code
- Nondeterminism Analysis of Functional Logic Programs (BB, MH), pp. 265–279.
- ICLP-2005-CorinSE #constraints #protocol #security
- PS-LTL for Constraint-Based Security Protocol Analysis (RC, AS, SE), pp. 439–440.
- ICLP-2005-Fruhwirth #confluence #constraints #using
- Parallelizing Union-Find in Constraint Handling Rules Using Confluence Analysis (TWF), pp. 113–127.
- ICLP-2005-GallagherHB #scalability
- Techniques for Scaling Up Analyses Based on Pre-interpretations (JPG, KSH, GB), pp. 280–296.
- ICLP-2005-NguyenS #logic programming #polynomial #source code #termination
- Polynomial Interpretations as a Basis for Termination Analysis of Logic Programs (MTN, DDS), pp. 311–325.
- ICLP-2005-PueblaAH #framework #logic programming #source code
- A Generic Framework for the Analysis and Specialization of Logic Programs (GP, EA, MVH), pp. 407–409.
- ICLP-2005-Schrijvers #constraints #optimisation #summary
- Analyses, Optimizations and Extensions of Constraint Handling Rules: Ph.D. Summary (TS), pp. 435–436.
- ICLP-2005-Sneyers #optimisation #source code
- Analysis and Optimization of CHR Programs (JS), pp. 450–451.
- LICS-2005-EsparzaKM #automaton #probability
- Quantitative Analysis of Probabilistic Pushdown Automata: Expectations and Variances (JE, AK, RM), pp. 117–126.
- LICS-2005-Hillston #algebra #process
- Process Algebras for Quantitative Analysis (JH), pp. 239–248.
- TestCom-2005-LeeJL #detection #smarttech #using
- Detecting Trapdoors in Smart Cards Using Timing and Power Analysis (JYL, SWJ, JL), pp. 275–288.
- VMCAI-2005-BalabanPZ #abstraction
- Shape Analysis by Predicate Abstraction (IB, AP, LDZ), pp. 164–180.
- VMCAI-2005-GenaimS #bytecode #data flow #java
- Information Flow Analysis for Java Bytecode (SG, FS), pp. 346–362.
- VMCAI-2005-Goubault-LarrecqP #c #encryption #protocol
- Cryptographic Protocol Analysis on Real C Code (JGL, FP), pp. 363–379.
- VMCAI-2005-SalcianuR #java #source code
- Purity and Side Effect Analysis for Java Programs (AS, MCR), pp. 199–215.
- VMCAI-2005-SankaranarayananSM #linear #programming #scalability #using
- Scalable Analysis of Linear Systems Using Mathematical Programming (SS, HBS, ZM), pp. 25–41.
- CBSE-2004-Maydl #component #design #embedded
- Design Accompanying Analysis of Component-Based Embedded Software (WM), pp. 178–193.
- WICSA-2004-MeisterRR #architecture #product line #statistics
- Applying Patterns to Develop a Product Line Architecture for Statistical Analysis Software (JM, RHR, MR), pp. 291–294.
- WICSA-2004-Perez-MartinezS #architecture #heuristic
- Heuristics for the Transition from Analysis to Software Architecture (JEPM, ASA), pp. 311–314.
- WICSA-2004-Tekinerdogan #architecture #named
- ASAAM: Aspectual Software Architecture Analysis Method (BT), pp. 5–14.
- DRR-2004-Nishida #adaptation #documentation #image #multi
- Adaptive inverse halftoning for scanned document images through multiresolution and multiscale analysis (HN), pp. 192–203.
- HT-2004-HorieY #documentation #set #using #web
- Structural analysis for web documentation using the non-well-founded set (IH, KY), pp. 42–43.
- JCDL-2004-CunninghamBM #how #image #people #query #visual notation
- How people describe their image information needs: a grounded theory analysis of visual arts queries (SJC, DB, MM), pp. 47–48.
- SIGMOD-2004-MiklauS #formal method
- A Formal Analysis of Information Disclosure in Data Exchange (GM, DS), pp. 575–586.
- VLDB-2004-XuCOTH #mining #semantics
- Semantic Mining and Analysis of Gene Expression Data (XX, GC, BCO, KLT, AKHT), pp. 1261–1264.
- ITiCSE-2004-BlumensteinGNM #automation #game studies
- An experimental analysis of GAME: a generic automated marking environment (MB, SG, AN, VM), pp. 67–71.
- CSMR-2004-AntoniolP #architecture #distributed
- A Distributed Architecture for Dynamic Analyses on User-Profile Data (GA, MDP), pp. 319–328.
- CSMR-2004-ItkonenHL #java
- Application of Relation Analysis to a Small Java Software (JI, MH, VL), pp. 233–242.
- ICSM-2004-Granja-Alvarez #case study #maintenance #specification
- Software Maintenance: Analysis of Estimates Based on Requirement Specification in the Context of New Technologies, a Case Study (JCGA), p. 531.
- ICSM-2004-LuoJZMS #case study #component #graph #object-oriented
- An Experimental Study of Two Graph Analysis Based Component Capture Methods for Object-Oriented Systems (JL, RJ, LZ, HM, JS), pp. 390–398.
- ICSM-2004-MaleticC #difference #source code
- Supporting Source Code Difference Analysis (JIM, MLC), pp. 210–219.
- ICSM-2004-MerloAPR #clone detection #complexity #detection #evolution #linear #object-oriented #similarity
- Linear Complexity Object-Oriented Similarity for Clone Detection and Software Evolution Analyses (EM, GA, MDP, VFR), pp. 412–416.
- ICSM-2004-Ricca #testing #web
- Analysis, Testing and Re-Structuring of Web Applications (FR), pp. 474–478.
- ICSM-2004-RivaSSX #architecture #maintenance #reverse engineering #uml
- UML-Based Reverse Engineering and Model Analysis Approaches for Software Architecture Maintenance (CR, PS, TS, JX), pp. 50–59.
- ICSM-2004-SatpathySR #case study #maintenance #object-oriented
- Assertions in Object Oriented Software Maintenance: Analysis and a Case Study (MS, NTS, DR), pp. 124–135.
- ICSM-2004-WhiteR #industrial #realtime #testing #using
- Industrial Real-Time Regression Testing and Analysis Using Firewalls (LJW, BR), pp. 18–27.
- IWPC-2004-LuciaFST #re-engineering #web
- Reengineering Web Applications Based on Cloned Pattern Analysis (ADL, RF, GS, GT), pp. 132–141.
- PASTE-2004-Ezick #constraints #query
- Resolving and applying constraint queries on context-sensitive analyses (JE), pp. 2–7.
- PASTE-2004-NystromKH #pointer
- Importance of heap specialization in pointer analysis (EMN, HSK, WmWH), pp. 43–48.
- PASTE-2004-PearceKH #c #performance #pointer
- Efficient field-sensitive pointer analysis for C (DJP, PHJK, CH), pp. 37–42.
- SCAM-2004-RoblesG #execution #source code
- Executable Source Code and Non-Executable Source Code: Analysis and Relationships (GR, JMGB), pp. 149–157.
- SCAM-2004-Rothermel #source code #using
- Using Source-Code Analysis to Help End-User Programmers Create Dependable Software (GR), p. 3.
- WCRE-2004-Harrold #control flow #source code
- Static and Dynamic Analyses of Programs with Implicit Control Flow (MJH), p. 5.
- WCRE-2004-KarailaS #case study #industrial #maintenance #source code #visual notation
- Maintenance and Analysis of Visual Programs — An Industrial Case (MK, TS), pp. 294–295.
- WCRE-2004-LakhotiaP #research #tool support
- Virus Analysis: Techniques, Tools, and Research Issues (AL, PP), p. 2.
- WCRE-2004-MarinDM #aspect-oriented #identification #using
- Identifying Aspects Using Fan-In Analysis (MM, AvD, LM), pp. 132–141.
- WCRE-2004-ParkKWY #behaviour #design pattern
- A Static Reference Flow Analysis to Understand Design Pattern Behavior (CP, YK, CW, KY), pp. 300–301.
- ICALP-2004-Toftdal #effectiveness #logic #theorem
- A Calibration of Ineffective Theorems of Analysis in a Hierarchy of Semi-classical Logical Principles: (MT), pp. 1188–1200.
- RTA-2004-JonesB #calculus #termination
- Termination Analysis of the Untyped lamba-Calculus (NDJ, NB), pp. 1–23.
- SEFM-2004-BertoliniFFO #automaton #generative #network #probability #testing #using
- Test Case Generation Using Stochastic Automata Networks: Quantitative Analysis (CB, AGF, PF, FMO), pp. 251–260.
- SEFM-2004-Fronk #algebra #approach #automation #petri net #using
- Using Relation Algebra for the Analysis of Petri Nets in a CASE Tool Based Approach (AF), pp. 396–405.
- SEFM-2004-NguyenM #consistency
- A Formalism for Conformance Analysis and Its Applications (TNN, EVM), pp. 330–339.
- SFM-2004-KatoenBKH #embedded
- Embedded Software Analysis with MOTOR (JPK, HCB, RK, HH), pp. 268–294.
- FLOPS-2004-BuenoLH #abstract interpretation #multi #standard
- Multivariant Non-failure Analysis via Standard Abstract Interpretation (FB, PLG, MVH), pp. 100–116.
- FLOPS-2004-HagiyaTYS #abstraction #automaton #logic #using
- Analysis of Synchronous and Asynchronous Cellular Automata Using Abstraction by Temporal Logic (MH, KT, MY, TS), pp. 7–21.
- FLOPS-2004-LuK
- Backward Pair Sharing Analysis (LL, AK), pp. 132–146.
- ICGT-2004-RosselloV #graph transformation
- Analysis of Metabolic Pathways by Graph Transformation (FR, GV), pp. 70–82.
- CHI-2004-LawH #combinator #testing #usability
- Analysis of combinatorial user effect in international usability tests (ELCL, EÞH), pp. 9–16.
- CSCW-2004-BarrettKMHTP #tool support
- Field studies of computer system administrators: analysis of system management tools and practices (RB, EK, PPM, EMH, LT, MP), pp. 388–395.
- CSCW-2004-HornFBMJ #evolution #network #research #social
- Six degrees of jonathan grudin: a social network analysis of the evolution and impact of CSCW research (DBH, TAF, JPB, DM, SJ), pp. 582–591.
- CSCW-2004-SorokaJ #collaboration #framework
- The diffusion of reachOut: analysis and framework for the successful diffusion of collaboration technologies (VS, MJ), pp. 314–323.
- CAiSE-2004-GePL #database
- Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment (XG, FP, RL), pp. 234–247.
- CAiSE-2004-SofferW #process
- Goal-Driven Analysis of Process Model Validity (PS, YW), pp. 521–535.
- ICEIS-v1-2004-Lyytinen #functional #requirements #scalability #source code
- Large Scale Requirements Engineering in Action: An Ethnographic Analysis of Functional and Political Ecologies in Situ in Space Mission Programs (KL), p. V.
- ICEIS-v2-2004-CamponovoBP
- Strategic Analysis of the Environment: A DSS for Assessing Technology Environments (GC, SB, YP), pp. 122–129.
- ICEIS-v2-2004-DhoteMR #detection #development #fault
- Development of an Expert System for Detecting Incipient Fault in Transformer by Dissolved Gas Analysis (NKD, DMH, MRR), pp. 210–215.
- ICEIS-v2-2004-Martinez-OtzetaS #algorithm #nearest neighbour #probability
- Analysis of the Iterated Probabilistic Weighted K Nearest Neighbor Method, a new Distance-Based Algorithm (JMMO, BS), pp. 233–240.
- ICEIS-v2-2004-Turowska #nondeterminism
- Application of Uncertain Variables to Stability Analysis and Stabilization for ATM ABR Congestion Control Systems (MT), pp. 523–526.
- ICEIS-v3-2004-BonacinBL #design #diagrams #ontology #semantics
- From Ontology Charts to Class Diagrams: Semantic Analysis Aiding Systems Design (RB, MCCB, KL), pp. 389–395.
- ICEIS-v3-2004-Douglas #enterprise #performance
- Founding Enterprise Systems on Enterprise Performance Analysis (ID), pp. 588–591.
- ICEIS-v3-2004-Hair #concept #design #named #process
- U_VBOOM: Unified Analysis and Design Process Based on the Viewpoint Concept (AH), pp. 217–224.
- ICEIS-v3-2004-Martens #re-engineering #web #web service
- Analysis and Re-Engineering of Web Services (AM), pp. 419–426.
- ICEIS-v3-2004-Ohki #formal method
- Formalization of Class Structure Extraction through Lifetime Analysis (MO), pp. 635–642.
- ICEIS-v3-2004-PanedaMGGN #monitoring #predict #video
- Analysis and Configuration Methodology for Video on Demand Services Based on Monitoring Information and Prediction (XGP, DM, RG, VGG, ÁN), pp. 289–294.
- ICEIS-v4-2004-HislopE #education #online
- An Analysis of Variation in Teaching Effort Across Tasks in Online and Traditional Courses (GWH, HJCE), pp. 202–207.
- ICEIS-v5-2004-MarzalBMC #documentation #perspective #topic
- Verbs & Topic Maps: A Proposal for Legal Documentation from the Document Content Analysis Perspective (MÁM, CB, JM, FC), pp. 63–68.
- CIKM-2004-FradkinK #adaptation #approach #design #information retrieval
- A design space approach to analysis of information retrieval adaptive filtering systems (DF, PBK), pp. 251–260.
- CIKM-2004-GollapudiS #algorithm #framework #set
- Framework and algorithms for trend analysis in massive temporal data sets (SG, DS), pp. 168–177.
- CIKM-2004-LynamBCC #documentation #feedback #multi
- A multi-system analysis of document and term selection for blind feedback (TRL, CB, CLAC, GVC), pp. 261–269.
- CIKM-2004-MegalooikonomouLW #database #performance #reduction #similarity
- A dimensionality reduction technique for efficient similarity analysis of time series databases (VM, GL, QW), pp. 160–161.
- CIKM-2004-SanoE #categorisation #information management
- Circumstance-based categorization analysis of knowledge management systems for the japanese market (MS, DAE), pp. 507–514.
- CIKM-2004-SrinivasanADZ #grammarware #web
- Grammar-based task analysis of web logs (SS, AA, PMD, VZ), pp. 244–245.
- CIKM-2004-TakakiFI #documentation #query #retrieval #topic
- Associative document retrieval by query subtopic analysis and its application to invalidity patent search (TT, AF, TI), pp. 399–405.
- ECIR-2004-CachedaPO #architecture #distributed #performance
- Performance Analysis of Distributed Architectures to Index One Terabyte of Text (FC, VP, IO), pp. 394–408.
- ECIR-2004-StokesNCS #using
- Broadcast News Gisting Using Lexical Cohesion Analysis (NS, EN, JC, AFS), pp. 209–222.
- ICML-2004-BanerjeeDGM #estimation #exponential #product line
- An information theoretic analysis of maximum likelihood mixture estimation for exponential families (AB, ISD, JG, SM).
- ICML-2004-DingH04a #clustering #component
- K-means clustering via principal component analysis (CHQD, XH).
- ICML-2004-EspositoS #classification #monte carlo
- A Monte Carlo analysis of ensemble classification (RE, LS).
- ICML-2004-YeJLP #feature model #linear
- Feature extraction via generalized uncorrelated linear discriminant analysis (JY, RJ, QL, HP).
- ICPR-v1-2004-BelaidB #approach #documentation
- Morphological Tagging Approach in Document Analysis of Invoices (YB, AB), pp. 469–472.
- ICPR-v1-2004-Bruce #image #information management #metric
- Image Analysis Through Local Information Measures (NB), pp. 616–619.
- ICPR-v1-2004-KeysersN #linear #modelling
- Linear Discriminant Analysis and Discriminative Log-linear Modeling (DK, HN), pp. 156–159.
- ICPR-v1-2004-MiasnikovH #rank
- Regression Analysis and Automorphic Orbits in Free Groups of Rank 2 (ADM, RMH), pp. 180–183.
- ICPR-v1-2004-ShenB #kernel #recognition
- Gabor Wavelets and Kernel Direct Discriminant Analysis for Face Recognition (LS, LB), pp. 284–287.
- ICPR-v1-2004-SoaresM
- Watershed Lines Suppression by Waterfall Marker Improvement and Line-Neighbourhood Analysis (FS, FM), pp. 604–607.
- ICPR-v1-2004-VaswaniC #classification #component #null #probability
- Classification Probability Analysis of Principal Component Null Space Analysis (NV, RC), pp. 240–243.
- ICPR-v1-2004-ZhouT #clustering #coordination #documentation #geometry #re-engineering #visual notation
- Coordinate Systems Reconstruction for Graphical Documents by Hough-feature Clustering and Geometric Analysis (YPZ, CLT), pp. 376–379.
- ICPR-v2-2004-BevilacquaG #image
- Age-related Skin Analysis by Capacitance Images (AB, AG), pp. 703–706.
- ICPR-v2-2004-BriassouliA
- Fusion of Frequency and Spatial Domain Information for Motion Analysis (AB, NA), pp. 175–178.
- ICPR-v2-2004-DaiQJ #kernel #pattern matching #pattern recognition #recognition
- A Kernel Fractional-Step Nonlinear Discriminant Analysis for Pattern Recognition (GD, YQ, SJ), pp. 431–434.
- ICPR-v2-2004-DeepuMR #component #online #recognition
- Principal Component Analysis for Online Handwritten Character Recognition (VD, SM, AGR), pp. 327–330.
- ICPR-v2-2004-ErikssonC #2d
- Maximizing Validity in 2D Motion Analysis (ME, SC), pp. 179–183.
- ICPR-v2-2004-GaoHBW #markov #process #using
- Dining Activity Analysis Using a Hidden Markov Model (JG, AGH, AB, HDW), pp. 915–918.
- ICPR-v2-2004-GritaiSS #invariant #on the #using
- On the use of Anthropometry in the Invariant Analysis of Human Actions (AG, YS, MS), pp. 923–926.
- ICPR-v2-2004-ImiyaY
- Principal Curve Analysis for Temporal Data (AI, NY), pp. 475–478.
- ICPR-v2-2004-LinYL #incremental #using
- Object Tracking Using Incremental Fisher Discriminant Analysis (RSL, MHY, SEL), pp. 757–760.
- ICPR-v2-2004-LiuTLM #kernel #recognition
- Kernel Scatter-Difference Based Discriminant Analysis For Face Recognition (QL, XT, HL, SM), pp. 419–422.
- ICPR-v2-2004-PlotzF #biology #feature model #sequence
- Feature Extraction for Improved Profile HMM based Biological Sequence Analysis (TP, GAF), pp. 315–318.
- ICPR-v2-2004-SaadiTC #kernel
- Optimally Regularised Kernel Fisher Discriminant Analysis (KS, NLCT, GCC), pp. 427–430.
- ICPR-v2-2004-SantamariaBS #statistics #using
- Texture Analysis using Level-crossing Statistics (CS, MB, WS), pp. 712–715.
- ICPR-v2-2004-SenerG #component #independence #using
- Blind Audio Watermark Decoding Using Independent Component Analysis (SS, BG), pp. 875–878.
- ICPR-v2-2004-ShihL #detection #using #video
- Face Detection Using Discriminating Feature Analysis and Support Vector Machine in Video (PS, CL), pp. 407–410.
- ICPR-v2-2004-SoiferKK #fuzzy
- Fuzzy Direction Field Method for Fringe and Tree-like Patterns Analysis (VAS, AGK, AOK), pp. 779–782.
- ICPR-v2-2004-TaoT #feedback #image #parametricity #retrieval
- Nonparametric Discriminant Analysis in Relevance Feedback for Content-Based Image Retrieval (DT, XT), pp. 1013–1016.
- ICPR-v2-2004-ZiouB #finite #image #learning #using
- Unsupervised Learning of a Finite Gamma Mixture Using MML: Application to SAR Image Analysis (DZ, NB), pp. 68–71.
- ICPR-v3-2004-AiLZ #automation
- Combination of Wavelet Analysis and Color Applied to Automatic Color Grading of Ceramic Tiles (JA, DL, XZ), pp. 235–238.
- ICPR-v3-2004-GurevichM #image
- Method for Early Diagnostics of Lymphatic System Tumors on the Basis of the Analysis of Chromatin Constitution in Cell Nucleus Images (IBG, DM), pp. 806–809.
- ICPR-v3-2004-KaholTP #gesture
- Computational Analysis of Mannerism Gestures (KK, PT, SP), pp. 946–949.
- ICPR-v3-2004-KolschT #detection #robust
- Analysis of Rotational Robustness of Hand Detection with a Viola-Jones Detector (MK, MT), pp. 107–110.
- ICPR-v3-2004-McCallT #invariant #using
- Pose Invariant Affect Analysis using Thin-Plate Splines (JCM, MMT), pp. 958–964.
- ICPR-v3-2004-NaganumaTMM #using
- Simultaneous Determination of Object Shape and Color by Moire Analysis Using a Reflection Model (SN, NT, AM, TM), pp. 202–205.
- ICPR-v3-2004-NishiF #using #video
- Object-Based Video Coding Using Pixel State Analysis (TN, HF), pp. 306–309.
- ICPR-v3-2004-NovakLCMAHA #markov #modelling #using
- Morphology Analysis of Physiological Signals Using Hidden Markov Models (DN, LL, DCF, PM, TAA, YH, MA), pp. 754–757.
- ICPR-v3-2004-TsujiZHK #correlation
- Levels of Detail Control Based on Correlation Analysis Between Surface Position and Direction (TT, HZ, TH, RK), pp. 622–625.
- ICPR-v3-2004-WangLL #towards
- Tensor Voting Toward Feature Space Analysis (JW, HL, QL), pp. 462–465.
- ICPR-v3-2004-YapCLHP #detection
- Detecting Femur Fractures by Texture Analysis of Trabeculae (DWHY, YC, WKL, TSH, MAP), pp. 730–733.
- ICPR-v4-2004-HagaSY #detection #using
- Human Detection in Outdoor Scene using Spatio-Temporal Motion Analysis (TH, KS, YY), pp. 331–334.
- ICPR-v4-2004-HsiehYCH
- A Shadow Elimination Method for Vehicle Analysis (JWH, SHY, YSC, WFH), pp. 372–375.
- ICPR-v4-2004-OtsukaM #multi
- A Particle Filter for Tracking Densely Populated Objects Based on Explicit Multiview Occlusion Analysis (KO, NM), pp. 745–750.
- ICPR-v4-2004-QinandS #algorithm #clustering #kernel
- Kernel Neural Gas Algorithms with Application to Cluster Analysis (AKQ, PNS), pp. 617–620.
- ICPR-v4-2004-SangiHS #difference #metric #using
- Motion Analysis Using Frame Differences with Spatial Gradient Measures (PS, JH, OS), pp. 733–736.
- ICPR-v4-2004-SelmaouiRLA #detection #image
- Image Analysis for Core Geological Descriptions : Strata and Granulometry Detection (NS, BR, CLM, MA), pp. 305–310.
- ICPR-v4-2004-ShihKG #bound #fault #image
- An Error Bound of Relative Image Blur Analysis (SWS, PSK, WSG), pp. 100–103.
- ICPR-v4-2004-XieHTP #multi #video
- A Multi-Object Tracking System for Surveillance Video Analysis (DX, WH, TT, JP), pp. 767–770.
- ICPR-v4-2004-YazdiAB #process #segmentation
- Morphological Analysis of Spatio-Temporal Patterns for the Segmentation of Cyclic Human Activities (MY, ABA, RB), pp. 240–243.
- ICPR-v4-2004-ZhangLT #image #recognition #using #word
- Italic Font Recognition Using Stroke Pattern Analysis on Wavelet Decomposed Word Images (LZ, YL, CLT), pp. 835–838.
- ICPR-v4-2004-ZhouC #multi #recognition
- Multiple-Exemplar Discriminant Analysis for Face Recognition (SKZ, RC), pp. 191–194.
- KDD-2004-CaruanaN #data mining #empirical #learning #metric #mining #performance
- Data mining in metric space: an empirical analysis of supervised learning performance criteria (RC, ANM), pp. 69–78.
- KDD-2004-JinZM #mining #probability #semantics #web
- Web usage mining based on probabilistic latent semantic analysis (XJ, YZ, BM), pp. 197–205.
- KR-2004-BenferhatBN #reasoning
- An Experimental Analysis of Possibilistic Default Reasoning (SB, JFB, RDSN), pp. 130–140.
- KR-2004-Denecker #logic programming #what
- What’s in a Model? Epistemological Analysis of Logic Programming (MD), pp. 106–113.
- KR-2004-FriedlandAWMSMASICPBC #independence #platform #towards
- Towards a Quantitative, Platform-Independent Analysis of Knowledge Systems (NSF, PGA, MJW, GM, NS, PM, JA, SS, DJI, VKC, BWP, KB, PC), pp. 507–515.
- KR-2004-GrootTH #approximate #case study #classification #problem #towards
- Towards a Structured Analysis of Approximate Problem Solving: A Case Study in Classification (PG, AtT, FvH), pp. 399–406.
- SEKE-2004-CaiGHD #architecture #modelling #performance
- Software Architecture Modelling and Performance Analysis with Argo/MTE (YC, JCG, JGH, XD), pp. 276–281.
- SEKE-2004-JarzabekSZZ #case study #metaprogramming
- Analysis of meta-programs: a case study (SJ, RS, HZ, ZS), pp. 68–73.
- SEKE-2004-SmithC #generative #requirements
- Commonality and Requirements Analysis for Mesh Generating Software (SS, CHC), pp. 384–387.
- SIGIR-2004-BeitzelJCGF #query #scalability #topic #web
- Hourly analysis of a very large topically categorized web query log (SMB, ECJ, AC, DAG, OF), pp. 321–328.
- SIGIR-2004-CaiHWM
- Block-level link analysis (DC, XH, JRW, WYM), pp. 440–447.
- SIGIR-2004-GrankaJG #behaviour
- Eye-tracking analysis of user behavior in WWW search (LAG, TJ, GG), pp. 478–479.
- SIGIR-2004-MontgomerySCE #documentation #empirical #feedback
- Effect of varying number of documents in blind feedback: analysis of the 2003 NRRC RIA workshop “bf_numdocs” experiment suite (JM, LS, JC, DAE), pp. 476–477.
- SIGIR-2004-XuU #mining #ranking #web
- A unified model of literal mining and link analysis for ranking web resources (YX, KU), pp. 546–547.
- SPLC-2004-ChastekD #product line
- Product Line Analysis (GJC, PD), p. 310.
- SPLC-2004-FritschH #product line
- Product Line Potential Analysis (CF, RH), pp. 228–237.
- SPLC-2004-JohnS04a #modelling #product line
- Starting Product Lines (II) — Product Line Analysis and Modeling (IJ, KS), p. 320.
- UML-2004-Reinhartz-BergerS #approach #behaviour #domain model #modelling
- Behavioral Domain Analysis — The Application-Based Domain Modeling Approach (IRB, AS), pp. 410–424.
- TOOLS-USA-2003-EnselmeFL04 #component #contract #dependence #design
- Design by Contract: analysis of hidden dependencies in component based application (DE, GF, FLA), pp. 23–45.
- TOOLS-USA-2003-HamzaE04 #problem
- Applying Analysis Patterns Through Analogy: Problems and Solutions (HSH, MEF), pp. 197–208.
- ECOOP-2004-BeersSF
- Efficiently Verifiable Escape Analysis (MQB, CHS, MF), pp. 75–95.
- ECOOP-2004-HirzelDH #pointer
- Pointer Analysis in the Presence of Dynamic Class Loading (MH, AD, MH), pp. 96–122.
- LOPSTR-2004-CraigGLH #automation #prolog
- Fully Automatic Binding-Time Analysis for Prolog (SJC, JPG, ML, KSH), pp. 53–68.
- LOPSTR-2004-Lopez-GarciaBH #logic programming #source code #using
- Determinacy Analysis for Logic Programs Using Mode and Type Information (PLG, FB, MVH), pp. 19–35.
- PDCL-2004-PueblaCHBBMS #composition #framework #source code
- A Generic Framework for Context-Sensitive Analysis of Modular Programs (GP, JC, MVH, FB, MJGdlB, KM, PJS), pp. 233–260.
- PDCL-2004-VanhoofBL
- Binding-Time Analysis for Mercury (WV, MB, ML), pp. 189–232.
- PLDI-2004-WangL #adaptation #parametricity
- Parametric analysis for adaptive computation offloading (CW, ZL), pp. 119–130.
- PLDI-2004-WhaleyL #alias #diagrams #pointer #using
- Cloning-based context-sensitive pointer alias analysis using binary decision diagrams (JW, MSL), pp. 131–144.
- PLDI-2004-ZhuC #pointer #revisited
- Symbolic pointer analysis revisited (JZ, SC), pp. 145–157.
- POPL-2004-Benton #correctness #program transformation #proving #relational
- Simple relational correctness proofs for static analyses and program transformations (NB), pp. 14–25.
- POPL-2004-Muller-OlmS #algebra #interprocedural #linear #precise
- Precise interprocedural analysis through linear algebra (MMO, HS), pp. 330–341.
- SAS-2004-AmtoftB #data flow #logic
- Information Flow Analysis in Logical Form (TA, AB), pp. 100–115.
- SAS-2004-GulwaniN04a #linear
- Path-Sensitive Analysis for Linear Arithmetic and Uninterpreted Functions (SG, GCN), pp. 328–343.
- SAS-2004-JeannetLRS #approach #interprocedural #relational
- A Relational Approach to Interprocedural Shape Analysis (BJ, AL, TWR, SS), pp. 246–264.
- SAS-2004-NielsonNP
- Spatial Analysis of BioAmbients (HRN, FN, HP), pp. 69–83.
- SAS-2004-NystromKH #bottom-up #pointer #top-down
- Bottom-Up and Top-Down Context-Sensitive Summary-Based Pointer Analysis (EMN, HSK, WmWH), pp. 165–180.
- SAS-2004-Rugina
- Shape Analysis Quantitative Shape Analysis (RR), pp. 228–245.
- SAS-2004-SankaranarayananSM #constraints
- Constraint-Based Linear-Relations Analysis (SS, HBS, ZM), pp. 53–68.
- SAS-2004-Venet #embedded #pointer #scalability #source code
- A Scalable Nonuniform Pointer Analysis for Embedded Programs (AV), pp. 149–164.
- SAS-2004-YongH
- Pointer-Range Analysis (SHY, SH), pp. 133–148.
- SIGAda-2004-ChapmanH #data flow #modelling #safety #security
- Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
- SIGAda-2004-SoriconeN #algorithm #comparative #implementation #search-based
- Comparative analysis of genetic algorithm implementations (RS, MN), pp. 35–38.
- RE-2004-Gonzalez-BaixauliLM #modelling #variability #visual notation
- Visual Variability Analysis for Goal Models (BGB, JCSdPL, JM), pp. 198–207.
- ASE-2004-Alzamil #named #performance
- RCAT: A Performance Analysis Tool (ZA), pp. 366–370.
- ASE-2004-Haydar #automation #framework #verification
- Formal Framework for Automated Analysis and Verification of Web-Based Applications (MH), pp. 410–413.
- ASE-2004-KonradCC #automation #diagrams #uml
- Automated Analysis of Timing Information in UML Diagrams (SK, LAC, BHCC), pp. 350–353.
- FSE-2004-DingelL #automation #concurrent #safety #source code #txl #using
- Automating comprehensive safety analysis of concurrent programs using verisoft and TXL (JD, HL), pp. 13–22.
- FSE-2004-Egyed #nondeterminism
- Resolving uncertainties during trace analysis (AE), pp. 3–12.
- FSE-2004-RinardSB #aspect-oriented #classification #source code
- A classification system and analysis for aspect-oriented programs (MCR, AS, SB), pp. 147–158.
- FSE-2004-ZhangYF
- Refining code-design mapping with flow analysis (XZ, MY, JHEFL), pp. 231–240.
- ICSE-2004-BaniassadC #approach #aspect-oriented #design #named
- Theme: An Approach for Aspect-Oriented Analysis and Design (ELAB, SC), pp. 158–167.
- ICSE-2004-Berenbach #design #evaluation #scalability #uml
- The Evaluation of Large, Complex UML Analysis and Design Model (BB), pp. 232–241.
- ICSE-2004-ChatzigeorgiouXS #design #object-oriented
- Evaluating Object-Oriented Designs with Link Analysis (AC, SX, GS), pp. 656–665.
- ICSE-2004-Kang #approximate #embedded #parametricity #realtime
- Parametric Analysis of Real-Time Embedded Systems with Abstract Approximation Interpretation (EYK), pp. 39–41.
- ICSE-2004-Keenan #agile #problem #process
- Agile Process Tailoring and probLem analYsis (APTLY) (FK), pp. 45–47.
- ICSE-2004-Roshandel #architecture #modelling #reliability
- Calculating Architectural Reliability via Modeling and Analysis (RR), pp. 69–71.
- SAC-2004-DincovP #multi
- Computational analysis of microwave heating patterns in resonant multimode cavities (DDD, KAP), pp. 215–219.
- SAC-2004-Granmo #parallel #video
- Parallel hypothesis driven video content analysis (OCG), pp. 642–648.
- SAC-2004-Kavakli #modelling
- Modeling organizational goals: analysis of current methods (EK), pp. 1339–1343.
- SAC-2004-Kincaid #array #interactive #named #visualisation
- VistaClara: an interactive visualization for exploratory analysis of DNA microarrays (RK), pp. 167–174.
- SAC-2004-MengC #scalability
- Bio-sequence analysis with cradle’s 3SoCTM software scalable system on chip (XM, VC), pp. 202–206.
- SAC-2004-OBrienH #authoring
- Training Needs Analysis: the first step in authoring e-learning content (EO, TH), pp. 935–939.
- SAC-2004-VincentR #framework #using
- A framework and analysis for cooperative search using UAV swarms (PV, IR), pp. 79–86.
- SAC-2004-WebbW #biology #synthesis
- Combining analysis and synthesis in a model of a biological cell (KW, TW), pp. 185–190.
- ATEM-2003-NaikB04 #framework #programmable #reverse engineering
- A Programmable Analysis and Transformation Framework for Reverse Engineering (RN, AB), pp. 39–49.
- LDTA-2004-BegelG #ambiguity #tool support
- Language Analysis and Tools for Ambiguous Input Streams (AB, SLG), pp. 75–96.
- ASPLOS-2004-CherHV #garbage collection #hardware
- Software prefetching for mark-sweep garbage collection: hardware analysis and software redesign (CYC, ALH, TNV), pp. 199–210.
- CC-2004-ChowdhuryDCBM #alias #optimisation
- The Limits of Alias Analysis for Scalar Optimizations (RAC, PD, BC, JHB, KSM), pp. 24–38.
- DAC-2004-AgarwalSBLNV #metric
- Variational delay metrics for interconnect timing analysis (KA, DS, DB, FL, SRN, SBKV), pp. 381–384.
- DAC-2004-AsafMZ #functional
- Defining coverage views to improve functional coverage analysis (SA, EM, AZ), pp. 41–44.
- DAC-2004-ContiCVOT #algorithm #performance
- Performance analysis of different arbitration algorithms of the AMBA AHB bus (MC, MC, GBV, SO, CT), pp. 618–621.
- DAC-2004-HungSYYP #logic #quantum #reachability #synthesis
- Quantum logic synthesis by symbolic reachability analysis (WNNH, XS, GY, JY, MAP), pp. 838–841.
- DAC-2004-LeeZB #using
- Static timing analysis using backward signal propagation (DL, VZ, DB), pp. 664–669.
- DAC-2004-LeLP #correlation #named #statistics
- STAC: statistical timing analysis with correlation (JL, XL, LTP), pp. 343–348.
- DAC-2004-MangH #abstraction #refinement
- Abstraction refinement by controllability and cooperativeness analysis (FYCM, PHH), pp. 224–229.
- DAC-2004-NajmM #statistics
- Statistical timing analysis based on a timing yield model (FNN, NM), pp. 460–465.
- DAC-2004-OrshanskyB #correlation #performance #statistics
- Fast statistical timing analysis handling arbitrary delay correlations (MO, AB), pp. 337–342.
- DAC-2004-PantBZSP #approach #grid #power management #probability
- A stochastic approach To power grid analysis (SP, DB, VZ, SS, RP), pp. 171–176.
- DAC-2004-SchueleS #abstraction #assembly #execution #source code
- Abstraction of assembler programs for symbolic worst case execution time analysis (TS, KS), pp. 107–112.
- DAC-2004-TanGQ #approach #scalability
- Hierarchical approach to exact symbolic analysis of large analog circuits (SXDT, WG, ZQ), pp. 860–863.
- DAC-2004-TanjiA #distributed
- Closed-form expressions of distributed RLC interconnects for analysis of on-chip inductance effects (YT, HA), pp. 810–813.
- DAC-2004-VisweswariahRKWN #first-order #incremental #statistics
- First-order incremental block-based statistical timing analysis (CV, KR, KK, SGW, SN), pp. 331–336.
- DAC-2004-WuC #design #network #performance
- Efficient power/ground network analysis for power integrity-driven design methodology (SWW, YWC), pp. 177–180.
- DAC-2004-ZhangHC #pipes and filters #statistics
- Statistical timing analysis in sequential circuit for on-chip global interconnect pipelining (LZ, YH, CCPC), pp. 904–907.
- DAC-2004-ZhaoBD #scalability
- A scalable soft spot analysis methodology for compound noise effects in nano-meter circuits (CZ, XB, SD), pp. 894–899.
- DATE-DF-2004-BrandoleseFSS #energy #modelling #program transformation #source code
- Analysis and Modeling of Energy Reducing Source Code Transformations (CB, WF, FS, DS), pp. 306–311.
- DATE-DF-2004-FummiMMPP #architecture #industrial #modelling #network
- Modeling and Analysis of Heterogeneous Industrial Networks Architectures (FF, SM, MM, GP, MP), pp. 342–344.
- DATE-v1-2004-BhuniaRR #using
- Trim Bit Setting of Analog Filters Using Wavelet-Based Supply Current Analysis (SB, AR, KR), pp. 704–705.
- DATE-v1-2004-IsseninBMD #memory management #reuse
- Data Reuse Analysis Technique for Software-Controlled Memory Hierarchies (II, EB, MM, ND), pp. 202–207.
- DATE-v1-2004-LaurentJSM #approach #functional #modelling #performance #power management
- Functional Level Power Analysis: An Efficient Approach for Modeling the Power Consumption of Complex Processors (JL, NJ, ES, EM), pp. 666–667.
- DATE-v1-2004-MurgaiRMHT #modelling
- Sensitivity-Based Modeling and Methodology for Full-Chip Substrate Noise Analysis (RM, SMR, TM, TH, MBT), pp. 610–615.
- DATE-v1-2004-PosadasHSVB #performance
- System-Level Performance Analysis in SystemC (HP, FH, PS, EV, FB), pp. 378–383.
- DATE-v1-2004-SiebenbornBR #communication #design
- Communication Analysis for System-On-Chip Design (AS, OB, WR), pp. 648–655.
- DATE-v2-2004-FengZCZF #order #reduction
- Direct Nonlinear Order Reduction with Variational Analysis (LF, XZ, CC, DZ, QF), pp. 1316–1321.
- DATE-v2-2004-GlebovGZOPB
- False-Noise Analysis for Domino Circuits (AG, SG, VZ, CO, RP, MRB), pp. 784–789.
- DATE-v2-2004-HuangCHTHH #fault #probability
- Intermittent Scan Chain Fault Diagnosis Based on Signal Probability Analysis (YH, WTC, CJH, HYT, AH, YTH), pp. 1072–1077.
- DATE-v2-2004-JersakHE #design #embedded #performance
- Context-Aware Performance Analysis for Efficient Embedded System Design (MJ, RH, RE), pp. 1046–1051.
- DATE-v2-2004-KumarBK #algorithm #array #embedded #memory management #named #reduction #using
- MemMap: Technology Mapping Algorithm for Area Reduction in FPGAs with Embedded Memory Arrays Using Reconvergence Analysis (AMK, JB, VK), pp. 922–929.
- DATE-v2-2004-LanD #modelling #synthesis
- Synthesized Compact Models (SCM) of Substrate Noise Coupling Analysis and Synthesis in Mixed-Signal ICs (HL, RWD), pp. 836–843.
- DATE-v2-2004-MondalCM #approach #logic #using
- A New Approach to Timing Analysis Using Event Propagation and Temporal Logic (AM, PPC, CAM), pp. 1198–1203.
- DATE-v2-2004-RanKWM
- Eliminating False Positives in Crosstalk Noise Analysis (YR, AK, YW, MMS), pp. 1192–1197.
- DATE-v2-2004-TanM #multi #realtime
- Timing Analysis for Preemptive Multi-Tasking Real-Time Systems with Caches (YT, VJMI), pp. 1034–1039.
- DATE-v2-2004-ZhangC #embedded #fault tolerance #realtime #scalability
- Task Feasibility Analysis and Dynamic Voltage Scaling in Fault-Tolerant Real-Time Embedded Systems (YZ, KC), pp. 1170–1175.
- DATE-v2-2004-ZhouZLLZC #using
- Steady-State Analysis of Nonlinear Circuits Using Discrete Singular Convolution Method (XZ, DZ, JL, RL, XZ, CC), pp. 1322–1326.
- HPCA-2004-JosephHM #case study #design #experience
- Wavelet Analysis for Microprocessor Design: Experiences with Wavelet-Based dI/dt Characterization (RJ, ZH, MM), pp. 36–47.
- ISMM-2004-ChenKVI #embedded #java #optimisation
- Field level analysis for heap space optimization in embedded java environments (GC, MTK, NV, MJI), pp. 131–142.
- ISMM-2004-CheremR #java #source code
- Region analysis and transformation for Java programs (SC, RR), pp. 85–96.
- PDP-2004-BorzemskiLN #data mining #internet #mining #performance
- Application of Data Mining for the Analysis of Internet Path Performance (LB, LL, ZN), pp. 54–59.
- PDP-2004-BulicG #compilation #dependence #multi #performance
- Fast Dependence Analysis in a Multimedia Vectorizing Compiler (PB, VG), pp. 176–183.
- PDP-2004-GarzonTGB #multi
- Multiprocessing of the Time Domain Analysis of Thin-Wire Antennas and Scatterers (EMG, ST, IG, ARB), pp. 80–87.
- PDP-2004-MoscatoMV #distributed #multi #workflow
- Workflow Principles Applied to Multi-Solution Analysis of Dependable Distributed Systems (FM, NM, VV), p. 134–?.
- ESOP-2004-BugliesiFM #authentication #composition #protocol
- Compositional Analysis of Authentication Protocols (MB, RF, MM), pp. 140–154.
- ESOP-2004-Ghica #approach #logic #semantics #specification
- Semantical Analysis of Specification Logic, 3: An Operational Approach (DRG), pp. 264–278.
- ESOP-2004-LeviB #control flow
- A Control Flow Analysis for Safe and Boxed Ambients (FL, CB), pp. 188–203.
- ESOP-2004-Shmatikov #composition #decidability #encryption #protocol
- Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation (VS), pp. 355–369.
- FASE-2004-ChildsGRDDHJSS #component #development #ide #named #synthesis #verification
- Cadena: An Integrated Development Environment for Analysis, Synthesis, and Verification of Component-Based Systems (AC, JG, VPR, XD, MBD, JH, GJ, PS, GS), pp. 160–164.
- FASE-2004-OlveczkyM #maude #realtime #specification #using
- Specification and Analysis of Real-Time Systems Using Real-Time Maude (PCÖ, JM), pp. 354–358.
- FoSSaCS-2004-RamanathanMST #bisimulation #equivalence #network #probability #protocol #security
- Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (AR, JCM, AS, VT), pp. 468–483.
- STOC-2004-KempeM #algorithm #distributed
- A decentralized algorithm for spectral analysis (DK, FM), pp. 561–568.
- TACAS-2004-KrcalY #automaton #decidability #problem #scheduling #using
- Decidable and Undecidable Problems in Schedulability Analysis Using Timed Automata (PK, WY), pp. 236–250.
- TACAS-2004-LingerS #constraints #ml #theorem proving #type inference
- Binding-Time Analysis for MetaML via Type Inference and Constraint Solving (NL, TS), pp. 266–279.
- TACAS-2004-SenRA #online #parallel #performance #predict #safety #source code #thread
- Online Efficient Predictive Safety Analysis of Multithreaded Programs (KS, GR, GA), pp. 123–138.
- TACAS-2004-SuW #constraints
- A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings (ZS, DW), pp. 280–295.
- TACAS-2004-YorshRS
- Symbolically Computing Most-Precise Abstract Operations for Shape Analysis (GY, TWR, SS), pp. 530–545.
- CAV-2004-FarzanCMR #formal method #java #source code
- Formal Analysis of Java Programs in JavaFAN (AF, FC, JM, GR), pp. 501–505.
- CAV-2004-FuBS #formal method #named #web #web service
- WSAT: A Tool for Formal Analysis of Web Services (XF, TB, JS), pp. 510–514.
- CAV-2004-Metzner #model checking #why
- Why Model Checking Can Improve WCET Analysis (AM), pp. 334–347.
- CAV-2004-Wang #hybrid #linear #parametricity #safety
- Symbolic Parametric Safety Analysis of Linear Hybrid Systems with BDD-Like Data-Structures (FW), pp. 295–307.
- FATES-2004-YoonKSC #component #empirical #fault #injection #mutation testing #testing #using
- Testing COM Components Using Software Fault Injection and Mutation Analysis, and Its Empirical Study (HY, EK, JS, BC), pp. 210–224.
- IJCAR-2004-MeseguerR #formal method #logic #semantics #specification #tool support
- Rewriting Logic Semantics: From Language Specifications to Formal Analysis Tools (JM, GR), pp. 1–44.
- SAT-2004-TangYRM #algorithm #problem #quantifier #satisfiability
- Analysis of Search Based Algorithms for Satisfiability of Quantified Boolean Formulas Arising from Circuit State Space Diameter Problems (DT, YY, DR, SM), pp. 214–223.
- VMCAI-2004-Etessami #data flow #equation #game studies #graph #recursion #using
- Analysis of Recursive Game Graphs Using Data Flow Equations (KE), pp. 282–296.
- VMCAI-2004-KuncakR #algebra #constraints
- Boolean Algebra of Shape Analysis Constraints (VK, MCR), pp. 59–72.
- DocEng-2003-BayerlLGWN #documentation #semantics
- Methods for the semantic analysis of document markup (PSB, HL, DG, AW, DN), pp. 161–170.
- DocEng-2003-SimskeA #image
- User-directed analysis of scanned images (SJS, JA), pp. 212–221.
- DRR-2003-AradhyeHM #detection #recognition
- Syntax-directed content analysis of videotext: application to a map detection recognition system (HBA, JAH, GKM), pp. 57–66.
- DRR-2003-MaoRK #algorithm #documentation #overview
- Document structure analysis algorithms: a literature survey (SM, AR, TK), pp. 197–207.
- HT-2003-WuGDB #collaboration
- Link analysis for collaborative knowledge building (HW, MDG, KD, NB), pp. 216–217.
- ICDAR-2003-AmanoA #documentation #grammarware #graph grammar
- Graph Grammar Based Analysis System of Complex Table Form Document (AA, NA), pp. 916–920.
- ICDAR-2003-Baird #documentation #image #library
- Digital Libraries and Document Image Analysis (HSB), p. 2–?.
- ICDAR-2003-Breuel #algorithm #documentation #layout
- An Algorithm for Finding Maximal Whitespace Rectangles at Arbitrary Orientations for Document Layout Analysis (TMB), pp. 66–70.
- ICDAR-2003-DoermannLL #documentation #image
- Progress in Camera-Based Document Image Analysis (DSD, JL, HL), p. 606–?.
- ICDAR-2003-FutrelleSCG #classification #diagrams #documentation #layout
- Extraction, layout analysis and classification of diagrams in PDF documents (RPF, MS, CC, AEG), pp. 1007–1014.
- ICDAR-2003-GattaniMG #approach #documentation #image #multi #performance
- A Fast Multifunctional Approach for Document Image Analysis (AG, MM, HG), pp. 1178–1182.
- ICDAR-2003-GuestCFP #automation #classification #geometry #sequence #using
- Automatic Classification of Hand Drawn Geometric Shapes using Constructional Sequence Analysis (RMG, SC, MCF, JMP), pp. 990–994.
- ICDAR-2003-HeD #documentation #image #library
- User-Assisted Archive Document Image Analysis for Digital Library Construction (JH, ACD), pp. 498–502.
- ICDAR-2003-HendersonS #approach
- Symbolic Pruning in a Structural Approach to Engineering Drawing Analysis (TH, LS), pp. 180–184.
- ICDAR-2003-KleinAB #comprehension #documentation #modelling
- Understanding Document Analysis and Understanding (through Modeling) (BK, SA, ADB), pp. 1218–1222.
- ICDAR-2003-SimardSP #documentation #network #visual notation
- Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis (PYS, DS, JCP), pp. 958–962.
- ICDAR-2003-SuenMKL #recognition #state of the art
- Analysis and Recognition of Asian Scripts — the State of the Art (CYS, SM, SHK, CHL), p. 866–?.
- ICDAR-2003-SutantoLP #consistency #documentation
- Study of the Consistency of Some Discriminatory Features Used by Document Examiners in the Analysis of Handwritten Letter “a” (PJS, GL, VP), pp. 1091–1095.
- ICDAR-2003-ZhangS #using #word
- Analysis of Handwriting Individuality Using Word Features (BZ, SNS), pp. 1142–1146.
- ICDAR-2003-ZouTLL #online #using #verification
- On-line Signature Verification Using Local Shape Analysis (MZ, JT, CL, ZL), pp. 314–318.
- JCDL-2003-ChaiV
- Structural Analysis of Musical Signals for Indexing and Thumbnailing (WC, BV), p. 27–?.
- JCDL-2003-GoncalvesPRKFJC #deployment #evolution #library #standard #xml
- The XML Log Standard for Digital Libraries: Analysis, Evolution, and Deployment (MAG, GP, UR, AK, EAF, FJ, LNC), pp. 312–314.
- JCDL-2003-MostafaB #interface #library #retrieval #visualisation
- International Workshop on Information Visualization Interfaces for Retrieval and Analysis (IVIRA) at the Joint Conference on Digital Libraries 2003 (JM, KB), p. 416.
- JCDL-2003-RoweRS #3d #library #query #representation
- Acquisition, Representation, Query and Analysis of Spatial Data: A Demonstration 3D Digital Library (JR, AR, AS), pp. 147–158.
- JCDL-2003-Ward #metadata #set
- A Quantitative Analysis of Unqualified Dublin Core Metadata Element Set Usage within Data Providers Registered with the Open Archives Initiative (JW), pp. 315–317.
- SIGMOD-2003-Bierman #query #semantics
- Formal semantics and analysis of object queries (GMB), pp. 407–418.
- VLDB-2003-SrinivasaK #framework #multi #platform
- A Platform Based on the Multi-dimensional Data Model for Analysis of Bio-Molecular Structures (SS, SK), pp. 975–986.
- ITiCSE-2003-MoodyS #assurance #education #process #quality #requirements
- Incorporating quality assurance processes into requirements analysis education (DLM, GS), pp. 74–78.
- ITiCSE-2003-Trakhtenbrot #concept #how
- Analysis of typical misconceptions in a theoretical CS course, and how to address them in e-learning (MBT), p. 241.
- CSMR-2003-MerloAB #fuzzy #performance
- Fast Flow Analysis to Compute Fuzzy Estimates of Risk Levels (EM, GA, PLB), p. 351–?.
- ICSM-2003-Klusener #source code
- Source Code Based Function Point Analysis for Enhancement Projects (SK), pp. 373–376.
- ICSM-2003-LandC #architecture #case study #integration
- Software Systems Integration and Architectural Analysis — A Case Study (RL, IC), pp. 338–347.
- ICSM-2003-OhstWK #design #difference #documentation #tool support
- Difference Tools for Analysis and Design Documents (DO, MW, UK), pp. 13–22.
- IWPC-2003-BeyerL #named #object-oriented #performance #source code
- CrocoPat: Efficient Pattern Analysis in Object-Oriented Programs (DB, CL), pp. 294–295.
- IWPC-2003-CoxC #approximate #semiparsing #using
- Syntactic Approximation Using Iterative Lexical Analysis (AC, CLAC), pp. 154–164.
- IWPC-2003-MarcusFM #3d #comprehension #using #visualisation
- Comprehension of Software Analysis Data Using 3D Visualization (AM, LF, JIM), pp. 105–114.
- IWPC-2003-Reiss #performance
- Event-Based Performance Analysis (SPR), pp. 74–83.
- SCAM-2003-AntoniolPMV #abstract syntax tree #named #xml
- XOgastan: XML-Oriented gcc AST Analysis and Transformations (GA, MDP, GM, UV), pp. 173–182.
- SCAM-2003-BinkleyH #algorithm #graph #optimisation #performance #reachability #scalability #source code
- Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms (DB, MH), p. 203–?.
- SCAM-2003-PearceKH #detection #difference #online #pointer
- Online Cycle Detection and Difference Propagation for Pointer Analysis (DJP, PHJK, CH), pp. 3–12.
- SCAM-2003-Verhoef #multi #source code #using
- Managing Multi-Billion Dollar IT Budgets using Source Code Analysis (CV), p. 77–?.
- WCRE-2003-AliasB #algorithm #data flow #recognition
- Algorithm Recognition based on Demand-Driven Data-flow Analysis (CA, DB), pp. 296–305.
- WCRE-2003-ZouG #detection #using
- Detecting Merging and Splitting using Origin Analysis (LZ, MWG), pp. 146–154.
- CIAA-2003-WangHY
- TCTL Inevitability Analysis of Dense-Time Systems (FW, GDH, FY), pp. 176–187.
- ICALP-2003-Jagerskupper #algorithm
- Analysis of a Simple Evolutionary Algorithm for Minimization in Euclidean Spaces (JJ), pp. 1068–1079.
- ICALP-2003-Rabinovich #probability
- Quantitative Analysis of Probabilistic Lossy Channel Systems (AMR), pp. 1008–1021.
- FME-2003-ArmandoCG #graph #model checking #protocol #satisfiability #security #using
- SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
- FME-2003-CompareIPS #architecture #lifecycle #model checking #validation
- Integrating Model-Checking Architectural Analysis and Validation in a Real Software Life-Cycle (DC, PI, PP, AS), pp. 114–132.
- FME-2003-Schafer #fault #model checking #realtime
- Combining Real-Time Model-Checking and Fault Tree Analysis (AS), pp. 522–541.
- RTA-2003-ChenRV #rule-based #safety
- Rule-Based Analysis of Dimensional Safety (FC, GR, RPV), pp. 197–207.
- SEFM-2003-JinLE #case study #component #design
- Component-Based Design and Analysis: A Case Study (YJ, CL, RE), p. 126–?.
- SFM-2003-Garlan #architecture #component #formal method #modelling
- Formal Modeling and Analysis of Software Architecture: Components, Connectors, and Events (DG), pp. 1–24.
- SFM-2003-KramerMU #approach #architecture #modelling
- Software Architecture Modeling & Analysis: A Rigorous Approach (JK, JM, SU), pp. 44–51.
- SFM-2003-StaffordWC #architecture #dependence
- The Application of Dependence Analysis to Software Architecture Descriptions (JAS, ALW, MC), pp. 52–62.
- ICFP-2003-Mairson #game studies #semantics
- From Hilbert space to Dilbert space: context semantics as a language for games and flow analysis (HGM), p. 125.
- IFL-2003-SeguraP #correctness #nondeterminism
- Correctness of Non-determinism Analyses in a Parallel-Functional Language (CS, RP), pp. 69–85.
- DiGRA-2003-BrandKM #game studies
- The Diverse Worlds of Computer Games: A Content Analysis of Spaces, Populations, Styles and Narratives (JEB, SK, JM).
- AGTIVE-2003-DottiRS #behaviour #fault #graph grammar #specification #using
- Specification and Analysis of Fault Behaviours Using Graph Grammars (FLD, LR, OMdS), pp. 120–133.
- AGTIVE-2003-LaraGV #graph transformation #hybrid #metamodelling #model checking
- Meta-Modelling, Graph Transformation and Model Checking for the Analysis of Hybrid Systems (JdL, EG, HV), pp. 292–298.
- AGTIVE-2003-MarburgerW #behaviour #graph transformation
- Behavioral Analysis of Telecommunication Systems by Graph Transformations (AM, BW), pp. 202–219.
- SOFTVIS-2003-ZhouSC #graph #visualisation
- Graph Visualization for the Analysis of the Structure and Dynamics of Extreme-Scale Supercomputers (CZ, KLS, TPC), pp. 143–149.
- VISSOFT-2003-MarcusFM #3d #multi #visualisation
- Source Viewer 3D (sv3D): A System for Visualizing Multi Dimensional Software Analysis Data (AM, LF, JIM), pp. 62–63.
- CAiSE-2003-KolpGM #requirements
- Organizational Patterns for Early Requirements Analysis (MK, PG, JM), pp. 617–632.
- ICEIS-v2-2003-AzevedoM #capacity #enterprise #network #requirements
- Requirements of a Decision Support System for Capacity Analysis and Planning in Enterprise Networks (ALA, AM), pp. 177–184.
- ICEIS-v2-2003-NetoCMG #network #simulation #using
- Simulating Data Envelopment Analysis Using Neural Networks (LBN, PHGC, JCCBSdM, EGG), pp. 244–249.
- ICEIS-v2-2003-SilvaIE #database #identification #information management #using
- Using Knowledge Discovery to Identify Analysis Patterns for Geographic Database (CS, CI, PME), pp. 359–364.
- ICEIS-v2-2003-TolbaMGA #algorithm #image #multi #segmentation #using
- MR-Brain Image Segmentation Using Gaussian Multiresolution Analysis and the EM Algorithm (MFT, MGM, TFG, MAMS), pp. 165–170.
- ICEIS-v3-2003-AgerfalkW #concept #development #framework
- Systems Development Method Rationale: A Conceptual Framework for Analysis (PJÅ, KW), pp. 185–190.
- ICEIS-v3-2003-AkatsuKK #parametricity
- Analysis on Relation Between Service Parameters for Service Level Management and System Utilization (MA, SK, NK), pp. 191–196.
- ICEIS-v3-2003-NahouraiiWD #information management
- Information System Failure: Analysis and Commentary (AN, JAW, AD), pp. 566–572.
- ICEIS-v3-2003-SaeedA
- Analysis of Level of Involvement of Six Best Practices of RUP in OOSP (MS, FA), pp. 523–526.
- ICEIS-v3-2003-SerraoNT #open source #operating system #security
- Open Source Security Analysis — Evaluating Security of Open Source vs. Closed Source Operating Systems (CS, DN, PT), pp. 433–440.
- ICEIS-v3-2003-TyrvainenP #communication #how #metric
- How Digital Is Communication in Your Organization? a Metrics and an Analysis Method (PT, TP), pp. 156–166.
- ICEIS-v3-2003-WohedPDH #modelling
- Pattern Based Analysis of Eai Languages — The Case of the Business Modeling Language (PW, EP, MD, AHMtH), pp. 174–184.
- ICEIS-v4-2003-CamponovoP #mobile
- Business Model Analysis Applied to Mobile Business (GC, YP), pp. 173–183.
- ICEIS-v4-2003-Oriogun #case study #online #re-engineering #reliability #using
- Content Analysis of Online Interrater Reliability Using the Transcript Reliability Cleaning Percentage (Trcp): A Software Engineering Case Study (PKO), pp. 296–307.
- ICEIS-v4-2003-PierozziGAC #towards #web
- Towards Web Site User’s Profile: Log File Analysis (IPJ, EGG, MdCFA, CAdC), pp. 395–398.
- ICEIS-v4-2003-Zhao
- Analysis of Business to Business Electronic Markets in China: Theoretical and Practical Perspectives (JZ), pp. 377–385.
- CIKM-2003-GloorLDZ #collaboration #communication #network #visualisation
- Visualization of Communication Patterns in Collaborative Innovation Networks — Analysis of Some W3C Working Groups (PAG, RL, SBCD, YZ), pp. 56–60.
- CIKM-2003-JiangC #data type #relational
- Queueing analysis of relational operators for continuous data streams (QJ, SC), pp. 271–278.
- CIKM-2003-LiZO #categorisation #multi #performance
- Efficient multi-way text categorization via generalized discriminant analysis (TL, SZ, MO), pp. 317–324.
- ICML-2003-BerardiCEM #layout #learning #logic programming #source code
- Learning Logic Programs for Layout Analysis Correction (MB, MC, FE, DM), pp. 27–34.
- ICML-2003-FurnkranzF #evaluation #metric
- An Analysis of Rule Evaluation Metrics (JF, PAF), pp. 202–209.
- ICML-2003-KaskiP
- Informative Discriminant Analysis (SK, JP), pp. 329–336.
- ICML-2003-KubicaMCS #collaboration #graph #performance #query
- Finding Underlying Connections: A Fast Graph-Based Method for Link Analysis and Collaboration Queries (JK, AWM, DC, JGS), pp. 392–399.
- ICML-2003-LaudD #learning
- The Influence of Reward on the Speed of Reinforcement Learning: An Analysis of Shaping (AL, GD), pp. 440–447.
- ICML-2003-LiY #categorisation #classification
- A Loss Function Analysis for Classification Methods in Text Categorization (FL, YY), pp. 472–479.
- ICML-2003-Mamitsuka
- Hierarchical Latent Knowledge Analysis for Co-occurrence Data (HM), pp. 504–511.
- KDD-2003-LauLW #similarity
- Similarity analysis on government regulations (GTL, KHL, GW), pp. 711–716.
- KDD-2003-RaoSNGR
- Clinical and financial outcomes analysis with existing hospital patient records (RBR, SS, RSN, CG, HR), pp. 416–425.
- MLDM-2003-KostersPP #complexity #implementation
- Complexity Analysis of Depth First and FP-Growth Implementations of APRIORI (WAK, WP, VP), pp. 284–292.
- MLDM-2003-RodriguesDFVC #algorithm #clustering #comparative #profiling
- A Comparative Analysis of Clustering Algorithms Applied to Load Profiling (FR, FJFD, VF, ZAV, MC), pp. 73–85.
- MLDM-2003-TanakaU #component #multi #principle #using
- Discover Motifs in Multi-dimensional Time-Series Using the Principal Component Analysis and the MDL Principle (YT, KU), pp. 252–265.
- SEKE-2003-CaoLZD #design #information management
- Open Giant Intelligent Information Systems and Its Agent-Oriented Analysis and Design (LC, CL, CZ, RD), pp. 85–89.
- SEKE-2003-ColeT #concept
- Conceptual Analysis of Software Structure (RC, TT), pp. 726–733.
- SEKE-2003-MenziesLM #fault
- Better Analysis of Defect Data at NASA (TM, RRL, ICM), pp. 607–611.
- SIGIR-2003-Davison #towards #unification
- Toward a unification of text and link analysis (BDD0), pp. 367–368.
- SIGIR-2003-Dupret #concept #orthogonal #semantics
- Latent concepts and the number orthogonal factors in latent semantic analysis (GD), pp. 221–226.
- SIGIR-2003-EironM #web
- Analysis of anchor text for web search (NE, KSM), pp. 459–460.
- SIGIR-2003-Hofmann #collaboration #probability #semantics
- Collaborative filtering via gaussian probabilistic latent semantic analysis (TH), pp. 259–266.
- SIGIR-2003-HuBZ #fault #topic
- Error analysis of difficult TREC topics (XH, SB, CZ), pp. 407–408.
- SIGIR-2003-TeevanK #development #empirical #exponential #probability #retrieval #using
- Empirical development of an exponential probabilistic model for text retrieval: using textual analysis to build a better model (JT, DRK), pp. 18–25.
- SIGIR-2003-WesterveldV #generative #image #probability #retrieval
- Experimental result analysis for a generative probabilistic image retrieval model (TW, APdV), pp. 135–142.
- SIGIR-2003-XueZCMZL #web
- Implicit link analysis for small web search (GRX, HJZ, ZC, WYM, HZ, CJL), pp. 56–63.
- SIGIR-2003-YangZK #categorisation #classification #scalability
- A scalability analysis of classifiers in text categorization (YY, JZ, BK), pp. 96–103.
- ECOOP-2003-LamR #automation #design #type system
- A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information (PL, MCR), pp. 275–302.
- AdaEurope-2003-BliebergerBS
- Busy Wait Analysis (JB, BB, BS), pp. 142–152.
- AdaEurope-2003-EvangelistaKPR #ada #concurrent #named #source code
- Quasar: A New Tool for Concurrent Ada Programs Analysis (SE, CK, JFPP, PR), pp. 168–181.
- LOPSTR-2003-Gallagher #logic programming #program transformation #source code
- A Program Transformation for Backwards Analysis of Logic Programs (JPG), pp. 92–105.
- LOPSTR-2003-MurakamiHKT #algorithm #performance #staging
- An Efficient Staging Algorithm for Binding-Time Analysis (TM, ZH, KK, MT), pp. 106–107.
- PADL-2003-FerreiraD
- WAM Local Analysis (MF, LD), pp. 286–303.
- PEPM-2003-ChinKX
- Extending sized type with collection analysis (WNC, SCK, DNX), pp. 75–84.
- PLDI-2003-BerndlLQHU #points-to #using
- Points-to analysis using BDDs (MB, OL, FQ, LJH, NU), pp. 103–114.
- PLDI-2003-DingZ #distance #locality #predict #reuse
- Predicting whole-program locality through reuse distance analysis (CD, YZ), pp. 245–257.
- PLDI-2003-LambTA #linear #optimisation #source code
- Linear analysis and optimization of stream programs (AAL, WT, SPA), pp. 12–25.
- PLDI-2003-LinCHYJNC #compilation #framework #optimisation
- A compiler framework for speculative analysis and optimizations (JL, TC, WCH, PCY, RDCJ, TFN, SC), pp. 289–299.
- PLDI-2003-PraunG #concurrent #multi #object-oriented #source code #thread
- Static conflict analysis for multi-threaded object-oriented programs (CvP, TRG), pp. 115–128.
- POPL-2003-Chakaravarthy #complexity
- New results on the computability and complexity of points — to analysis (VTC), pp. 115–125.
- POPL-2003-GheorghioiuSR #interprocedural
- Interprocedural compatibility analysis for static object preallocation (OG, AS, MCR), pp. 273–284.
- SAS-2003-BessonJ #composition #datalog
- Modular Class Analysis with DATALOG (FB, TPJ), pp. 19–36.
- SAS-2003-CarlssonSW #concurrent
- Message Analysis for Concurrent Languages (RC, KFS, JW), pp. 73–90.
- SAS-2003-ChatterjeeMMZHP #source code #stack
- Stack Size Analysis for Interrupt-Driven Programs (KC, DM, RM, TZ, TAH, JP), pp. 109–126.
- SAS-2003-ChristensenMS #precise #string
- Precise Analysis of String Expressions (ASC, AM, MIS), pp. 1–18.
- SAS-2003-GuyerL #pointer
- Client-Driven Pointer Analysis (SZG, CL), pp. 214–236.
- SAS-2003-HalbwachsMP #linear
- Cartesian Factoring of Polyhedra in Linear Relation Analysis (NH, DM, CPV), pp. 355–365.
- SAS-2003-Logozzo #composition #object-oriented
- Class-Level Modular Analysis for Object Oriented Languages (FL), pp. 37–54.
- SAS-2003-McMillan #reachability
- Craig Interpolation and Reachability Analysis (KLM), p. 336.
- SAS-2003-RepsSJ #automaton #data flow #interprocedural
- Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis (TWR, SS, SJ), pp. 189–213.
- RE-2003-AlspaughA #case study
- Contrasting Use Case, Goal, and Scenario Analysis of the Euronet System (TAA, AIA), pp. 355–356.
- RE-2003-BergmanM #requirements
- In Situ Requirements Analysis: A Deeper Examination of the Relationship between Requirements Determination and Project Selection (MB, GM), pp. 11–22.
- RE-2003-BolchiniPR #hypermedia #requirements
- Adding Hypermedia Requirements to Goal-Driven Analysis (DB, PP, GR), pp. 127–137.
- RE-2003-HuiLM #framework #requirements
- Requirements Analysis for Customizable Software Goals-Skills-Preferences Framework (BH, SL, JM), pp. 117–126.
- RE-2003-KaiyaSMK #java #mobile #policy #requirements #security #trade-off
- Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
- RE-2003-LiuYM #privacy #requirements #security #social
- Security and Privacy Requirements Analysis within a Social Setting (LL, ESKY, JM), pp. 151–161.
- RE-2003-RifautMMPSLV #formal method #named #specification #tool support #using
- FAUST: Formal Analysis Using Specification Tools (AR, PM, JFM, CP, PS, AvL, HTV), p. 350.
- RE-2003-SutcliffeCN #requirements
- Evolutionary Requirements Analysis (AGS, WCC, RN), p. 264–?.
- ASE-2003-FischerS #image
- Applying AutoBayes to the Analysis of Planetary Nebulae Images (BF, JS), pp. 337–342.
- ASE-2003-SabetzadehE #approach #consistency #graph #nondeterminism
- Analysis of Inconsistency in Graph-Based Viewpoints: A Category-Theoretic Approach (MS, SME), pp. 12–21.
- ASE-2003-SkeneE #approach #architecture #modelling #non-functional
- A Model-Driven Approach to Non-Functional Analysis of Software Architectures (JS, WE), pp. 236–239.
- ESEC-FSE-2003-BradburyD #automation
- Evaluating and improving the automatic analysis of implicit invocation systems (JSB, JD), pp. 78–87.
- ESEC-FSE-2003-BrylowP
- Deadline analysis of interrupt-driven software (DB, JP), pp. 198–207.
- ESEC-FSE-2003-ChengYHP #composition #design #modelling #refactoring #scalability #towards
- Towards scalable compositional analysis by refactoring design models (YPC, MY, CLH, CYP), pp. 247–256.
- ESEC-FSE-2003-SenRA #parallel #runtime #safety #source code #thread
- Runtime safety analysis of multithreaded programs (KS, GR, GA), pp. 337–346.
- ESEC-FSE-2003-TkachukD #adaptation #composition #model checking
- Adapting side effects analysis for modular program model checking (OT, MBD), pp. 188–197.
- ESEC-FSE-2003-XieCE #detection #fault #memory management #named #using
- ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
- ICSE-2003-AbrahamssonWSR #agile #comparative
- New Directions on Agile Methods: A Comparative Analysis (PA, JW, MTS, JR), pp. 244–254.
- ICSE-2003-CoppitS #effectiveness #modelling #tool support
- Sound Methods and Effective Tools for Engineering Modeling and Analysis (DC, KJS), pp. 198–209.
- ICSE-2003-HatcliffDDJR #component #development #named #verification
- Cadena: An Integrated Development, Analysis, and Verification Environment for Component-based Systems (JH, XD, MBD, GJ, VPR), pp. 160–173.
- ICSE-2003-JohnsonKACMMZD #metric #process
- Beyond the Personal Software Process: Metrics collection and analysis for the differently disciplined (PMJ, HK, JA, CC, CAM, JM, SZ, WEJD), pp. 641–646.
- ICSE-2003-RountevMR #java #morphism #polymorphism #testing
- Fragment Class Analysis for Testing of Polymorphism in Java Software (AR, AM, BGR), pp. 210–220.
- ICSE-2003-ZageZ #fault #process #scalability
- An Analysis of the Fault Correction Process in a Large-Scale SDL Production Model (DMZ, WMZ), pp. 570–577.
- SAC-2003-BeitzelJCFGG #data fusion #effectiveness #information retrieval
- Disproving the Fusion Hypothesis: An Analysis of Data Fusion via Effective Information Retrieval Strategies (SMB, ECJ, AC, OF, DAG, NG), pp. 823–827.
- SAC-2003-BreeseSMGE #array #framework #information management
- Labrat LIMS: An Extensible Framework for Developing Laboratory Information Management, Analysis, and Bioinformatics Solutions for Microarrays (MRB, MJS, JNM, MWG, HJE), pp. 103–108.
- SAC-2003-FurhtGHM #3d #adaptation
- An Adaptive Three-Dimensional DCT Compression Based on Motion Analysis (BF, KG, HH, OM), pp. 765–768.
- SAC-2003-HuaJVT #algebra #approach #data mining #mining #named #performance #using
- ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques (KAH, NJ, RV, DAT), pp. 490–496.
- SAC-2003-NandaK #web #web service
- Synchronization Analysis for Decentralizing Composite Web Services (MGN, NMK), pp. 407–414.
- SAC-2003-NandaR #java #parallel #pointer #source code #thread
- Pointer Analysis of Multithreaded Java Programs (MGN, SR), pp. 1068–1075.
- GPCE-2003-Kastner #hardware #named #optimisation
- TDL: A Hardware Description Language for Retargetable Postpass Optimizations and Analyses (DK), pp. 18–36.
- LDTA-2003-CostagliolaDFG #development #visual notation
- Exploiting XPG for Visual Languages: Definition, Analysis and Development (GC, VD, FF, CG), pp. 612–627.
- CC-2003-LhotakH #java #points-to #scalability #using
- Scaling Java Points-to Analysis Using SPARK (OL, LJH), pp. 153–169.
- CC-2003-Ryder #object-oriented #precise #programming language
- Dimensions of Precision in Reference Analysis of Object-Oriented Programming Languages (BGR), pp. 126–137.
- DAC-2003-BeniniMMOPP #design #difference #energy
- Energy-aware design techniques for differential power analysis protection (LB, AM, EM, EO, FP, MP), pp. 36–41.
- DAC-2003-BergamaschiJ
- State-based power analysis for systems-on-chip (RAB, YJ), pp. 638–641.
- DAC-2003-ChaiKRTWM
- Temporofunctional crosstalk noise analysis (DC, AK, YR, KHT, YW, MMS), pp. 860–863.
- DAC-2003-ChenHBW #automation #constraints #logic
- Automatic trace analysis for logic of constraints (XC, HH, FB, YW), pp. 460–465.
- DAC-2003-CroixW #modelling #using
- Blade and razor: cell and interconnect delay analysis using current-based models (JFC, DFW), pp. 386–389.
- DAC-2003-JersakE #dependence #multi #scheduling
- Enabling scheduling analysis of heterogeneous systems with multi-rate data dependencies and rate intervals (MJ, RE), pp. 454–459.
- DAC-2003-LeeKBS
- Analysis and minimization techniques for total leakage considering gate oxide leakage (DL, WK, DB, DS), pp. 175–180.
- DAC-2003-LiLXP #megamodelling
- Analog and RF circuit macromodels for system-level analysis (XL, PL, YX, LTP), pp. 478–483.
- DAC-2003-LiMR #interactive #modelling
- Accurate timing analysis by modeling caches, speculation and their interaction (XL, TM, AR), pp. 466–471.
- DAC-2003-MaHDCCCG #optimisation
- Dynamic global buffer planning optimization based on detail block locating and congestion analysis (YM, XH, SD, SC, YC, CKC, JG), pp. 806–811.
- DAC-2003-MantheLS
- Symbolic analysis of analog circuits with hard nonlinearity (AM, ZL, CJRS), pp. 542–545.
- DAC-2003-StehrGA #bound #performance #trade-off
- Performance trade-off analysis of analog circuits by normal-boundary intersection (GS, HEG, KA), pp. 958–963.
- DAC-2003-TsengK
- Static noise analysis with noise windows (KT, VK), pp. 864–868.
- DAC-2003-ZhuYC #adaptation #algebra #approach #multi #network #using
- Power network analysis using an adaptive algebraic multigrid approach (ZZ, BY, CKC), pp. 105–108.
- DATE-2003-AgarwalBZV #bound #statistics #using
- Statistical Timing Analysis Using Bounds (AA, DB, VZ, SBKV), pp. 10062–10067.
- DATE-2003-BrandoleseFSS #library
- Library Functions Timing Characterization for Source-Level Analysis (CB, WF, FS, DS), pp. 11132–11133.
- DATE-2003-CaldariCCCOPT
- System-Level Power Analysis Methodology Applied to the AMBA AHB Bus (MC, MC, MC, PC, SO, LP, CT), pp. 20032–20039.
- DATE-2003-ChoLYCZ #communication #design #scheduling
- Scheduling and Timing Analysis of HW/SW On-Chip Communication in MP SoC Design (YC, GL, SY, KC, NEZ), pp. 20132–20137.
- DATE-2003-DebOJ #embedded #simulation #using
- Simulation and Analysis of Embedded DSP Systems Using MASIC Methodology (AKD, JÖ, AJ), pp. 11100–11101.
- DATE-2003-DobrovolnyVWD #modelling
- Analysis and White-Box Modeling of Weakly Nonlinear Time-Varying Circuits (PD, GV, PW, SD), pp. 10624–10629.
- DATE-2003-GoelB #functional #reachability #set
- Set Manipulation with Boolean Functional Vectors for Symbolic Reachability Analysis (AG, REB), pp. 10816–10821.
- DATE-2003-GouraryRUZM #simulation
- A New Simulation Technique for Periodic Small-Signal Analysis (MMG, SGR, SLU, MMZ, BJM), pp. 10244–10249.
- DATE-2003-LogothetisS #source code
- Exact High Level WCET Analysis of Synchronous Programs by Symbolic State Space Exploration (GL, KS), pp. 10196–10203.
- DATE-2003-LupeaPJ #named
- RF-BIST: Loopback Spectral Signature Analysis (DL, UP, HJJ), pp. 10478–10483.
- DATE-2003-MantheLSM
- Symbolic Analysis of Nonlinear Analog Circuits (AM, ZL, CJRS, KM), pp. 11108–11109.
- DATE-2003-PanBKK #architecture #design #programmable
- Design and Analysis of a Programmable Single-Chip Architecture for DVB-T Base-Band Receiver (CP, NB, AHK, AK), pp. 10468–10475.
- DATE-2003-PopEP #clustering #distributed #embedded #multi #optimisation #scheduling #synthesis
- Schedulability Analysis and Optimization for the Synthesis of Multi-Cluster Distributed Embedded Systems (PP, PE, ZP), pp. 10184–10189.
- DATE-2003-RapakaM #embedded #performance
- Pre-Characterization Free, Efficient Power/Performance Analysis of Embedded and General Purpose Software Applications (VSPR, DM), pp. 10504–10509.
- DATE-2003-RebaudengoRV #fault #pipes and filters
- An Accurate Analysis of the Effects of Soft Errors in the Instruction and Data Caches of a Pipelined Microprocessor (MR, MSR, MV), pp. 10602–10607.
- DATE-2003-VanasscheGS #detection #domain model #modelling
- Time-Varying, Frequency-Domain Modeling and Analysis of Phase-Locked Loops with Sampling Phase-Frequency Detectors (PV, GGEG, WMCS), pp. 10238–10243.
- DATE-2003-WangZ #polynomial
- Transistor-Level Static Timing Analysis by Piecewise Quadratic Waveform Matching (ZW, JZ), pp. 11026–11031.
- DATE-2003-YeBM #communication
- Packetized On-Chip Interconnect Communication Analysis for MPSoC (TTY, LB, GDM), pp. 10344–10349.
- HPCA-2003-SakamotoKIAUMK #architecture #enterprise #performance
- Microarchitecture and Performance Analysis of a SPARC-V9 Microprocessor for Enterprise Server Systems (MS, AK, AI, TA, HU, KM, YK), pp. 141–152.
- HPDC-2003-TakefusaTMM #algorithm #architecture #energy #grid #performance #physics #replication #scheduling
- Performance Analysis of Scheduling and Replication Algorithms on Grid Datafarm Architecture for High-Energy Physics Applications (AT, OT, SM, YM), pp. 34–47.
- LCTES-2003-AmeurBBPW #embedded #robust
- Robustness analysis of avionics embedded systems (YAA, GB, FB, SP, VW), pp. 123–132.
- PDP-2003-BulicG #compilation #dependence
- Practical Dependence Analysis in a SIMD Vectorizing Compiler (PB, VG), pp. 41–48.
- PDP-2003-FahringerMRPVM #modelling #performance #scalability
- Performance Modeling of Scientific Applications: Scalability Analysis of LAPW0 (TF, NM, MR, SP, UV, GM), pp. 5–12.
- PDP-2003-Tessera #clustering #performance
- Performance Analysis of an IBM supercluster (DT), pp. 417–424.
- PDP-2003-WolfM #automation #hybrid #performance
- Automatic Performance Analysis of Hybrid MPI/OpenMP Applications (FW, BM), pp. 13–22.
- PPoPP-2003-ChenHHJL #architecture #compilation #multi #points-to #probability #thread
- Compiler support for speculative multithreading architecture with probabilistic points-to analysis (PSC, MYH, YSH, RDCJ, JKL), pp. 25–36.
- SOSP-2003-GummadiDSGLZ #metric #modelling #peer-to-peer
- Measurement, modeling, and analysis of a peer-to-peer file-sharing workload (PKG, RJD, SS, SDG, HML, JZ), pp. 314–329.
- ESOP-2003-GenaimK #independence #logic programming #scheduling #source code
- Goal-Independent Suspension Analysis for Logic Programs with Dynamic Scheduling (SG, AK), pp. 84–98.
- ESOP-2003-GorrieriLM #encryption #protocol #realtime
- A Simple Language for Real-Time Cryptographic Protocol Analysis (RG, EL, FM), pp. 114–128.
- ESOP-2003-Laud #data flow #encryption
- Handling Encryption in an Analysis for Secure Information Flow (PL), pp. 159–173.
- ESOP-2003-Meadows #encryption #evolution #protocol #requirements #specification #what
- What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis (CM), pp. 10–21.
- FASE-2003-JinELJ #composition #data flow #network #process
- Modular Analysis of Dataflow Process Networks (YJ, RE, CL, JWJ), pp. 184–199.
- TACAS-2003-AmlaKMM #bound #model checking
- Experimental Analysis of Different Techniques for Bounded Model Checking (NA, RPK, KLM, RM), pp. 34–48.
- TACAS-2003-BasuR #composition #verification
- Compositional Analysis for Verification of Parameterized Systems (SB, CRR), pp. 315–330.
- TACAS-2003-BDSV #encryption #information management #protocol #representation
- A New Knowledge Representation Strategy for Cryptographic Protocol Analysis (ICB, LD, RS, AV), pp. 284–298.
- TACAS-2003-BehrmannBFL #automaton #verification
- Static Guard Analysis in Timed Automata Verification (GB, PB, EF, KGL), pp. 254–277.
- TACAS-2003-BerthomieuV #branch #petri net
- State Class Constructions for Branching Analysis of Time Petri Nets (BB, FV), pp. 442–457.
- TACAS-2003-BraghinCFFLP #bound #named
- BANANA — A Tool for Boundary Ambients Nesting ANAlysis (CB, AC, SF, RF, FLL, CP), pp. 437–441.
- TACAS-2003-FersmanMPY #scheduling #using
- Schedulability Analysis Using Two Clocks (EF, LM, PP, WY), pp. 224–239.
- TACAS-2003-HermannsJ #component #dependence #performance #set
- A Set of Performance and Dependability Analysis Components for CADP (HH, CJ), pp. 425–430.
- TACAS-2003-SokolskyPLC #modelling #power management
- Modeling and Analysis of Power-Aware Systems (OS, AP, IL, KC), pp. 409–425.
- TACAS-2003-ZhangCS #concurrent #functional #performance #verification
- The Integrated CWB-NC/PIOATool for Functional Verification and Performance Analysis of Concurrent Systems (DZ, RC, EWS), pp. 431–436.
- CAV-2003-GrumbergHS #algorithm #distributed #reachability
- A Work-Efficient Distributed Algorithm for Reachability Analysis (OG, TH, AS), pp. 54–66.
- CSL-2003-Gerhardy #complexity
- Refined Complexity Analysis of Cut Elimination (PG), pp. 212–225.
- ICLP-2003-LagoonMS #termination
- Termination Analysis with Types Is More Accurate (VL, FM, PJS), pp. 254–268.
- ICLP-2003-Serebrenik #logic programming #source code #termination
- Termination Analysis of Logic Programs: Extended Abstract (AS), pp. 507–508.
- SAT-2003-ArmandoC #protocol #satisfiability #security
- Abstraction-Driven SAT-based Analysis of Security Protocols (AA, LC), pp. 257–271.
- VMCAI-2003-BraghinCFLP #complexity #mobile
- Complexity of Nesting Analysis in Mobile Ambients (CB, AC, RF, FLL, CP), pp. 86–101.
- VMCAI-2003-DamsN #abstraction #model checking
- Shape Analysis through Predicate Abstraction and Model Checking (DD, KSN), pp. 310–324.
- VMCAI-2003-UnnikrishnanSL #bound
- Optimized Live Heap Bound Analysis (LU, SDS, YAL), pp. 70–85.
- CBSE-2002-Mason #component #composition #probability #reliability
- Probabilistic Analysis for Component Reliability Composition (DM), p. 8.
- WICSA-2002-Ramdane-CherifLL #architecture #configuration management #evaluation
- Dynamic Reconfigurable Software Architecture: Analysis and Evaluation (ARC, NL, FL), pp. 79–93.
- CBSE-2003-BaresiHTV #architecture #graph transformation #modelling
- Modeling and Analysis of Architectural Styles Based on Graph Transformation (LB, RH, ST, DV), p. 12.
- ECDL-2002-BollenVX #evaluation #library #retrieval
- Digital Library Evaluation by Analysis of User Retrieval Patterns (JB, SV, WX), pp. 432–447.
- ECDL-2002-GoncalvesLSAF #library #standard #xml
- An XML Log Standard and Tool for Digital Library Logging Analysis (MAG, ML, RS, MFA, EAF), pp. 129–143.
- ECDL-2002-Takasu #documentation #statistics #string
- Statistical Analysis of Bibliographic Strings for Constructing an Integrated Document Space (AT), pp. 75–90.
- ECDL-2002-WittenBPB #architecture #documentation #library #metadata #requirements
- Importing Documents and Metadata into Digital Libraries: Requirements Analysis and an Extensible Architecture (IHW, DB, GWP, SJB), pp. 390–405.
- SIGMOD-2002-PhanN #named #tool support
- GEA: a toolkit for gene expression analysis (JMP, RTN), p. 628.
- VLDB-2002-ChenHWW #data type #multi
- Multi-Dimensional Regression Analysis of Time-Series Data Streams (YC, GD, JH, BWW, JW), pp. 323–334.
- VLDB-2002-Faloutsos #data mining #mining #similarity
- Sensor Data Mining: Similarity Search and Pattern Analysis (CF).
- VLDB-2002-SantiniG #geometry #named
- GeMBASE: A Geometric Mediator for Brain Analysis with Surface Ensembles (SS, AG), pp. 1075–1078.
- CSMR-2002-LuciaPSP #empirical #maintenance #process
- Empirical Analysis of Massive Maintenance Processes (ADL, AP, SS, EP), pp. 5–14.
- ICSM-2002-Barry #evolution #lifecycle #maintenance
- Software Evolution, Volatility and Lifecycle Maintenance Patterns: A Longitudinal Analysis (EJB), pp. 474–477.
- ICSM-2002-BinhDR #component #testing
- Testability Analysis for Software Components (TBN, MD, CR), pp. 422–429.
- ICSM-2002-ChenZBZY #approach #dependence #novel
- A Novel Approach to Measuring Class Cohesion Based on Dependence Analysis (ZC, YZ, BX, JZ, HY), pp. 377–384.
- ICSM-2002-KorelTV #dependence #modelling #reduction #testing #using
- Model Based Regression Test Reduction Using Dependence Analysis (BK, LHT, BV), pp. 214–223.
- ICSM-2002-OhstK #design #fine-grained
- A Fine-Grained Version and Configuration Model in Analysis and Design (DO, UK), pp. 521–527.
- ICSM-2002-RotschkeK #architecture #evolution #industrial #scalability #tool support
- Architecture Analysis Tools to Support Evolution of Large Industrial Systems (TR, RLK), pp. 182–191.
- ICSM-2002-SouterP #testing
- Putting Escape Analysis to Work for Software Testing (ALS, LLP), pp. 430–439.
- ICSM-2002-TonellaP #c++ #diagrams
- Static and Dynamic C++ Code Analysis for the Recovery of the Object Diagram (PT, AP), pp. 54–63.
- IWPC-2002-Hamou-LhadjL #execution #scalability
- Compression Techniques to Simplify the Analysis of Large Execution Traces (AHL, TCL), pp. 159–168.
- IWPC-2002-Walenstein #comprehension #tool support
- Theory-based Analysis of Cognitive Support in Software Comprehension Tools (AW), pp. 75–84.
- PASTE-2002-Morrisett
- Analysis issues for cyclone (JGM), p. 26.
- PASTE-2002-Naumovich #data flow #design pattern #implementation #using
- Using the observer design pattern for implementation of data flow analyses (GN), pp. 61–68.
- SCAM-2002-Baxter #parallel #source code
- Parallel Support for Source Code Analysis and Modification (IDB), p. 3–?.
- SCAM-2002-HarmanFHHDW #dependence #named
- VADA: A Transformation-Based System for Variable Dependence Analysis (MH, CF, RMH, LH, SD, JW), pp. 55–64.
- WCRE-2002-ProbstKS #liveness #optimisation
- Register Liveness Analysis for Optimizing Dynamic Binary Translation (MP, AK, BS), pp. 35–44.
- WCRE-2002-RillingM #3d #on the #source code #using #visual notation
- On the Use of Metaballs to Visually Map Source Code Structures and Analysis Results onto 3D Space (JR, SPM), pp. 299–308.
- WCRE-2002-TrogerC
- Analysis of Virtual Method Invocation for Binary Translation (JT, CC), p. 65–?.
- FME-2002-Fidge #assembly #control flow
- Timing Analysis of Assembler Code Control-Flow Paths (CJF), pp. 370–389.
- FME-2002-Pahl #abstraction #refinement #using
- Interference Analysis for Dependable Systems Using Refinement and Abstraction (CP), pp. 330–349.
- FME-2002-RatsabySU
- Improvements in Coverability Analysis (GR, BS, SU), pp. 41–56.
- RTA-2002-Mitchell #multi #protocol #security
- Multiset Rewriting and Security Protocol Analysis (JCM), pp. 19–22.
- ICFP-2002-DubeF #adaptation
- A demand-driven adaptive type analysis (DD, MF), pp. 84–97.
- ICFP-2002-GlynnSSS #exception #strict
- Exception analysis for non-strict languages (KG, PJS, MS, HS), pp. 98–109.
- ICFP-2002-JonesG #generative #termination
- Program generation, termination, and binding-time analysis (NDJ, AJG), p. 283.
- CGDC-2002-Konzack #game studies
- Computer Game Criticism: A Method for Computer Game Analysis (LK).
- CHI-2002-HinckleyCBM
- Quantitative analysis of scrolling techniques (KH, EC, SB, TM), pp. 65–72.
- CHI-2002-PiperRI #3d #interface
- Illuminating clay: a 3-D tangible interface for landscape analysis (BP, CR, HI), pp. 355–362.
- VISSOFT-2002-RillingSB #complexity #concept #source code #visualisation
- The CONCEPT Project — Applying Source Code Analysis to Reduce Information Complexity of Static and Dynamic Visualization Techniques (JR, AS, CB), p. 90.
- CAiSE-2002-CostalST #comprehension #modelling #object-oriented #uml
- Understanding Redundancy in UML Models for Object-Oriented Analysis (DC, MRS, ET), pp. 659–674.
- ICEIS-2002-Abe #domain model #information management #modelling
- Applying Domain Modeling and SECI Theory in Knowledge Management for Information Systems Analysis (AA), pp. 725–731.
- ICEIS-2002-Audy #information management
- Analysis of the Relation between the Prescriptive and Descriptive Approaches of the Information System Planning (JLNA), pp. 553–561.
- ICEIS-2002-BarjisC #database #design #modelling #semantics #using
- Data Modeling for the Purpose of Database Design Using Entity-Relationship Model and Semantic Analysis (JB, SC), pp. 235–243.
- ICEIS-2002-CastelaTGL #bibliography #modelling #process #validation
- Survey, Analysis and Validation of Information for Business Process Modeling (NC, JMT, AG, ERL), pp. 803–806.
- ICEIS-2002-IochpeT #aspect-oriented #process #workflow
- Inferring Aspects of the Organizational Structure through Workflow Process Analysis (CI, LHT), pp. 758–763.
- ICEIS-2002-LiuL #object-oriented #throughput
- A Knowledge Object Oriented System for High Throughput Collection and Analysis of Data (HL, TL), pp. 764–769.
- ICEIS-2002-SalimifardW #modelling #performance #petri net #using #workflow
- Modelling and Performance Analysis of Workflow Management Systems Using Timed Hierarchical Coloured Petri Nets (KS, MW), pp. 843–846.
- ICEIS-2002-SalterL #semantics #using
- Using Semantic Analysis and Norm Analysis to Model Organisations (AS, KL), pp. 847–850.
- ICEIS-2002-Vellido #e-commerce #network
- Neural Networks for B2C E-Commerce Analysis: Some Elements of Best Practice (AV), pp. 439–445.
- CIKM-2002-BrantsCT #documentation #probability #segmentation #semantics #topic
- Topic-based document segmentation with probabilistic latent semantic analysis (TB, FC, IT), pp. 211–218.
- CIKM-2002-KaoCLH #mining #web
- Entropy-based link analysis for mining web informative structures (HYK, MSC, SHL, JMH), pp. 574–581.
- CIKM-2002-LohLAL #query
- Analysis of pre-computed partition top method for range top-k queries in OLAP data cubes (ZXL, TWL, CHA, SYL), pp. 60–67.
- ECIR-2002-BenammarHM #automation #documentation #using
- Automatic Profile Reformulation Using a Local Document Analysis (AB, GH, JM), pp. 124–134.
- ICML-2002-Gama #functional
- An Analysis of Functional Trees (JG), pp. 155–162.
- ICML-2002-GlobersonT #novel #reduction
- Sufficient Dimensionality Reduction — A novel Analysis Method (AG, NT), pp. 203–210.
- ICML-2002-LangfordZK #trade-off
- Competitive Analysis of the Explore/Exploit Tradeoff (JL, MZ, SK), pp. 339–346.
- ICPR-v1-2002-BagdanovW #documentation #image
- Granulometric Analysis of Document Images (ADB, MW), pp. 468–471.
- ICPR-v1-2002-CarcassoniRH #recognition
- Texture Recognition through Modal Analysis of Spectral Peak Patterns (MC, ER, ERH), pp. 243–246.
- ICPR-v1-2002-DavisT #recognition
- Analysis and Recognition of Walking Movements (JWD, SRT), pp. 315–318.
- ICPR-v1-2002-DockstaderBT #feature model
- Feature Extraction for the Analysis of Gait and Human Motion (SLD, KAB, AMT), pp. 5–8.
- ICPR-v1-2002-HadidKP #learning #linear #using
- Unsupervised Learning Using Locally Linear Embedding: Experiments with Face Pose Analysis (AH, OK, MP), pp. 111–114.
- ICPR-v1-2002-KovalevKC #3d #image #symmetry
- Structural Brain Asymmetry as Revealed by 3D Texture Analysis of Anatomical MR Images (VAK, FK, DYvC), p. 808–?.
- ICPR-v1-2002-Meas-YedidTO #clustering #image #markov #random #segmentation
- Color Image Segmentation Based on Markov Random Field Clustering for Histological Image Analysis (VMY, ST, JCOM), pp. 796–799.
- ICPR-v1-2002-MoreauCP #estimation #using
- Estimation and Analysis of the Deformation of the Cardiac Wall Using Doppler Tissue Imaging (VM, LDC, DP), pp. 784–787.
- ICPR-v1-2002-OjalaMPVKH #algorithm #empirical #evaluation #framework
- Outex- New Framework for Empirical Evaluation of Texture Analysis Algorithms (TO, TM, MP, JV, JK, SH), pp. 701–706.
- ICPR-v1-2002-RellierDZF
- A Gauss-Markov Model for Hyperspectral Texture Analysis of Urban Areas (GR, XD, JZ, FF), pp. 692–695.
- ICPR-v1-2002-SinghMS #dependence #image
- Colour Image Texture Analysis: Dependence on Colour Spaces (MS, MM, SS), pp. 672–675.
- ICPR-v1-2002-SinghS #case study #comparative
- Spatial Texture Analysis: A Comparative Study (MS, SS), pp. 676–679.
- ICPR-v1-2002-VegaS
- Experiments on Gait Analysis by Exploiting Nonstationarity in the Distribution of Feature Relationships (IRV, SS), pp. 1–4.
- ICPR-v1-2002-WollnyTK #segmentation
- Segmentation of Vector Fields by Critical Point Analysis: Application to Brain Deformation (GW, MT, FK), pp. 524–527.
- ICPR-v2-2002-BaekD
- Factor Analysis or Background Suppression (KB, BAD), pp. 643–646.
- ICPR-v2-2002-Duncan #geometry #image #modelling #physics
- Geometrical and Physical Models for the Recovery of Quantitative Information from Medical Image Analysis (JSD), p. 277.
- ICPR-v2-2002-Fasel #network #robust #using
- Robust Face Analysis using Convolutional Neural Networks (BF), pp. 40–43.
- ICPR-v2-2002-Ho #proximity
- Exploratory Analysis of Point Proximity in Subspaces (TKH), pp. 196–199.
- ICPR-v2-2002-KumanoAAUST #editing #video
- Video Editing Support System Based on Video Grammar and Content Analysis (MK, YA, MA, KU, KS, KT), pp. 1031–1036.
- ICPR-v2-2002-LiuHLM #kernel #recognition
- Kernel-Based Optimized Feature Vectors Selection and Discriminant Analysis for Face Recognition (QL, RH, HL, SM), pp. 362–365.
- ICPR-v2-2002-Maloof #machine learning #on the #statistics #testing
- On Machine Learning, ROC Analysis, and Statistical Tests of Significance (MAM), pp. 204–207.
- ICPR-v2-2002-MiyauchiHBK #collaboration #detection #multi #semantics #video
- Collaborative Multimedia Analysis for Detecting Semantical Events from Broadcasted Sports Video (SM, AH, NB, TK), pp. 1009–1012.
- ICPR-v2-2002-MoghaddamZ #linear #online #pattern matching #pattern recognition #performance #recognition
- Fast Linear Discriminant Analysis for On-Line Pattern Recognition Applications (HAM, KAZ), pp. 64–67.
- ICPR-v2-2002-PhungDV #education
- Narrative Structure Analysis with Education and Training Videos for E-Learning (DQP, CD, SV), p. 835–?.
- ICPR-v2-2002-RoliFV #classification #trade-off
- Analysis of Error-Reject Trade-off in Linearly Combined Classifiers (FR, GF, GV), pp. 120–125.
- ICPR-v2-2002-SeokL #algorithm #approach #difference #learning #probability
- The Analysis of a Stochastic Differential Approach for Langevine Comepetitive Learning Algorithm (JS, JWL), pp. 80–83.
- ICPR-v2-2002-TweedM #automation #detection
- Automatic Detection of Regions of Interest in Mammographies Based on a Combined Analysis of Texture and Histogram (TT, SM), pp. 448–452.
- ICPR-v2-2002-VasilescuT #image #multi #recognition
- Multilinear Image Analysis for Facial Recognition (MAOV, DT), pp. 511–514.
- ICPR-v2-2002-WachsmuthS #image #probability #process #speech
- Integrated Analysis of Speech and Images as a Probabilistic Decoding Process (SW, GS), pp. 588–592.
- ICPR-v2-2002-YeungB #mobile #towards
- Towards Log-Polar Fixation for Mobile Robots — Analysis of Corner Tracking on the Log-Polar Camera (AY, NB), pp. 300–303.
- ICPR-v3-2002-BhanuH #recognition
- Individual Recognition by Kinematic-Based Gait Analysis (BB, JH), pp. 343–346.
- ICPR-v3-2002-BoomgaardW #equivalence #estimation #on the #robust
- On the Equivalence of Local-Mode Finding, Robust Estimation and Mean-Shift Analysis as Used in Early Vision Tasks (RvdB, JvdW), pp. 927–930.
- ICPR-v3-2002-ChenZL #component #detection #independence #segmentation
- Edge Detection and Texture Segmentation Based on Independent Component Analysis (YWC, XYZ, HL), pp. 351–354.
- ICPR-v3-2002-DuongEC #documentation #image
- Features for Printed Document Image Analysis (JD, HE, MC), pp. 245–248.
- ICPR-v3-2002-FataichaCNS #approach #documentation #image
- Content Analysis in Document Images: A Scale Space Approach (YF, MC, JYN, CYS), pp. 335–338.
- ICPR-v3-2002-GuestF #approach #clustering #image
- A Clustering Approach to Corner Point Analysis in Hand Drawn Images (RMG, MCF), pp. 940–943.
- ICPR-v3-2002-KatzMDK #automation #linear #robust #speech
- Robustness of Linear Discriminant Analysis in Automatic Speech Recognitio (MK, HGM, HD, DK), pp. 371–374.
- ICPR-v3-2002-Kitamoto #component
- Fractional Component Analysis (FCA) for Mixed Signals (AK), pp. 383–386.
- ICPR-v3-2002-KongZ #authentication #image
- Palmprint Texture Analysis Based on Low-Resolution Images for Personal Authentication (AWKK, DZ), pp. 807–810.
- ICPR-v3-2002-LuT #documentation #image #layout #word
- Word Spotting in Chinese Document Images without Layout Analysis (YL, CLT), pp. 57–60.
- ICPR-v3-2002-NishidaS #documentation #image #multi
- Correcting Show-Through Effects on Document Images by Multiscale Analysis (HN, TS), pp. 65–68.
- ICPR-v3-2002-Vasilescu #recognition #synthesis
- Human Motion Signatures: Analysis, Synthesis, Recognition (MAOV), pp. 456–460.
- ICPR-v4-2002-FengWP #agile #case study #comparative #modelling
- A Comparative Study of Two Velocity ProfIle Models for Rapid Stroke Analysis (CF, AW, RP), p. 52–?.
- ICPR-v4-2002-IbrahimovSD #clustering #performance #similarity #topic
- The Performance Analysis of a Chi-square Similarity Measure for Topic Related Clustering of Noisy Transcripts (OI, IKS, ND), pp. 285–288.
- ICPR-v4-2002-NgoPZ #retrieval #slicing
- Motion Retrieval by Temporal Slices Analysis (CWN, TCP, HZ), pp. 64–67.
- ICPR-v4-2002-SocolinskyS #comparative #performance #recognition
- A Comparative Analysis of Face Recognition Performance with Visible and Thermal Infrared Imagery (DAS, AS), p. 217–?.
- ICPR-v4-2002-ZhuS #adaptation #detection #feature model #statistics
- Discriminant Analysis and Adaptive Wavelet Feature Selection for Statistical Object Detection (YZ, SCS), pp. 86–89.
- KDD-2002-RidgewayM #dataset
- Bayesian analysis of massive datasets via particle filters (GR, DM), pp. 5–13.
- KDD-2002-StolteTH #query #using #visualisation
- Query, analysis, and visualization of hierarchically structured data using Polaris (CS, DT, PH), pp. 112–122.
- KDD-2002-TuzhilinA #array #scalability
- Handling very large numbers of association rules in the analysis of microarray data (AT, GA), pp. 396–404.
- KR-2002-Fruhwirth #automation #complexity
- As Time Goes by: Automatic Complexity Analysis of Simplified Rules (TWF), pp. 547–557.
- SEKE-2002-Fernandez-CondeG #framework #object-oriented
- Domain analysis of object-oriented frameworks in FrameDoc (CFC, PAGC), pp. 27–33.
- SEKE-2002-RiescoSPPJ #metamodelling #uml
- Al analysis patterns as UML meta-model constructs (AMR, GS, DP, SP, JMJ), pp. 237–238.
- SEKE-2002-RusBH #development #empirical #process #simulation
- Systematically combining process simulation and empirical data in support of decision analysis in software development (IR, SB, MH), pp. 827–833.
- SIGIR-2002-BinghamKL #documentation
- ICA and SOM in text document analysis (EB, JK, KL), pp. 361–362.
- SIGIR-2002-Canny #collaboration #privacy
- Collaborative filtering with privacy via factor analysis (JFC), pp. 238–245.
- SIGIR-2002-DingHHZS #framework #rank
- PageRank, HITS and a unified framework for link analysis (CHQD, XH, PH, HZ, HDS), pp. 353–354.
- SIGIR-2002-JonesG #development #topic #visualisation
- A visualisation tool for topic tracking analysis and development (GJFJ, SMG), pp. 389–390.
- SIGIR-2002-LarkeyBC #information retrieval
- Improving stemming for Arabic information retrieval: light stemming and co-occurrence analysis (LSL, LB, MEC), pp. 275–282.
- SIGIR-2002-ParkPGK #documentation
- Analysis of lexical signatures for finding lost or related documents (STP, DMP, CLG, RK), pp. 11–18.
- SPLC-2002-SmithBB #component #mining #product line #re-engineering #using
- Using the Options Analysis for Reengineering (OAR) Method for Mining Components for a Product Line (DBS, LO, JB), pp. 316–327.
- SPLC-2002-Yacoub #component #performance
- Performance Analysis of Component-Based Applications (SMY), pp. 299–315.
- UML-2002-GogollaH #metamodelling #uml
- Analysis of UML Stereotypes within the UML Metamodel (MG, BHS), pp. 84–99.
- OOPSLA-2002-KovedPK #java
- Access rights analysis for Java (LK, MP, AK), pp. 359–372.
- AdaEurope-2002-Amey #design
- Closing the Loop: The Influence of Code Analysis on Design (PA), pp. 151–162.
- AdaEurope-2002-ChenBZY #ada #concurrent #dependence #source code
- Static Dependency Analysis for Concurrent Ada 95 Programs (ZC, BX, JZ, HY), pp. 219–230.
- AdaEurope-2002-CzarneckiHRVR #ada #approach #data flow #named
- DataFAN: A Practical Approach to Data Flow Analysis for Ada 95 (KC, MH, ER, FV, AR), pp. 231–244.
- AdaEurope-2002-MedinaGDH #ada #component #distributed #modelling #realtime #scheduling
- Modeling and Schedulability Analysis of Hard Real-Time Distributed Systems Based on Ada Components (JLM, JJG, JMD, MGH), pp. 282–296.
- ASIA-PEPM-2002-Heintze #alias #c
- Aliasing analysis for a million lines of C (NH), pp. 47–49.
- ASIA-PEPM-2002-SheardL #search-based #using
- Search-based binding time analysis using type-directed pruning (TS, NL), pp. 20–31.
- PADL-2002-GallagherP #abstract interpretation #automaton #finite #logic programming #nondeterminism #source code
- Abstract Interpretation over Non-deterministic Finite Tree Automata for Set-Based Analysis of Logic Programs (JPG, GP), pp. 243–261.
- PADL-2002-Meadows #declarative #using
- Using a Declarative Language to Build an Experimental Analysis Tool (CM), pp. 1–2.
- PEPM-2002-GomezL #automation #bound #higher-order
- Automatic time-bound analysis for a higher-order language (GG, YAL), pp. 75–86.
- PEPM-2002-Lu #logic programming #source code
- Path dependent analysis of logic programs (LL), pp. 63–74.
- PLDI-2002-HallemCXE
- A System and Language for Building System-Specific, Static Analyses (SH, BC, YX, DRE), pp. 69–82.
- PLDI-2002-RamalingamWFGS #component #consistency
- Deriving Specialized Program Analyses for Certifying Component-Client Conformance (GR, AV, JF, DG, SS), pp. 83–94.
- POPL-2002-IgarashiK #resource management
- Resource usage analysis (AI, NK), pp. 331–342.
- POPL-2002-KuncakLR
- Role analysis (VK, PL, MCR), pp. 17–32.
- POPL-2002-LernerGC #data flow
- Composing dataflow analyses and transformations (SL, DG, CC), pp. 270–282.
- PPDP-2002-Fiore #evaluation #normalisation #semantics #λ-calculus
- Semantic analysis of normalisation by evaluation for typed λ calculus (MPF), pp. 26–37.
- PPDP-2002-JonesG #generative #termination
- Abstract and conclusions of PLI invited paper: program generation, termination, and binding-time analysis (NDJ, AJG), p. 1.
- PPDP-2002-LagoonS #logic programming #precise #source code
- Precise pair-sharing analysis of logic programs (VL, PJS), pp. 99–108.
- PPDP-2002-OvertonSS #constraints
- Constraint-based mode analysis of mercury (DO, ZS, PJS), pp. 109–120.
- PPDP-2002-SchrijversD
- Combining an improvement to PARMA trailing with trailing analysis (TS, BD), pp. 88–98.
- SAS-2002-AdamsBDLRSW #data flow #pointer #using
- Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis (SA, TB, MD, SL, SKR, MS, WW), pp. 230–246.
- SAS-2002-BruynoogheCGV #logic programming #reuse #source code #termination #using
- Reuse of Results in Termination Analysis of Typed Logic Programs (MB, MC, SG, WV), pp. 477–492.
- SAS-2002-Faxen #representation
- Representation Analysis for Coercion Placement (KFF), pp. 278–293.
- SAS-2002-LangenbachTH #modelling #pipes and filters
- Pipeline Modeling for Timing Analysis (ML, ST, RH), pp. 294–309.
- SAS-2002-Lee #polynomial
- Finiteness Analysis in Polynomial Time (CSL), pp. 493–508.
- SAS-2002-Probst #composition #control flow #library
- Modular Control Flow Analysis for Libraries (CWP), pp. 165–179.
- SAS-2002-Ruf #data flow #precise
- Improving the Precision of Equality-Based Dataflow Analyses (ER), pp. 247–262.
- SAS-2002-Venet #alias #array #data type #recursion
- Nonuniform Alias Analysis of Recursive Data Structures and Arrays (AV), pp. 36–51.
- SAS-2002-WhaleyL #performance #points-to #strict
- An Efficient Inclusion-Based Points-To Analysis for Strictly-Typed Languages (JW, MSL), pp. 180–195.
- SIGAda-2002-KorochkinK #ada #java #parallel #performance
- Experimental performance analysis of the Ada95 and Java parallel program on SMP systems (DK, SK), pp. 53–56.
- RE-2002-Alexander #case study #experience #industrial #trade-off
- Initial Industrial Experience of Misuse Cases in Trade-Off Analysis (IFA), pp. 61–70.
- RE-2002-BergmanM #empirical #requirements
- Exploring the Relationship between Project Selection and Requirements Analysis: An Empirical Study of the New Millennium Program (MB, GM), pp. 247–254.
- RE-2002-FantechiGLM #case study
- Application of Linguistic Techniques for Use Case Analysis (AF, SG, GL, AM), pp. 157–164.
- RE-2002-JohnMST #evolution #performance
- Efficient and Systematic Software Evolution through Domain Analysis (IJ, DM, PS, ET), pp. 237–246.
- RE-2002-KaiyaHS #named #requirements
- AGORA: Attributed Goal-Oriented Requirements Analysis Method (HK, HH, MS), pp. 13–22.
- RE-2002-StutzSKK #uml
- Analysis beyond UML (CS, JS, DK, WK), pp. 215–218.
- ASE-2002-HeimdahlCW #model checking
- Deviation Analysis Through Model Checking (MPEH, YC, MWW), pp. 37–46.
- ASE-2002-LoerH #interactive #model checking #towards
- Towards Usable and Relevant Model Checking Techniques for the Analysis of Dependable Interactive Systems (KL, MDH), pp. 223–226.
- FSE-2002-BrunsC #points-to
- Searching for points-to analysis (GB, SC), pp. 61–70.
- SAC-2002-BorealeB #automation #protocol #security
- Experimenting with STA, a tool for automatic analysis of security protocols (MB, MGB), pp. 281–285.
- SAC-2002-El-Ansary #behaviour #representation #requirements #towards
- Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and events (AEA), pp. 984–991.
- SAC-2002-GarcesF #behaviour #distributed
- Analysis of Distributed Routing Balancing behavior (IG, DF), pp. 817–824.
- SAC-2002-HauglidM #metadata #named
- SESAM: searching supported by analysis of metadata (JOH, RM), pp. 418–425.
- SAC-2002-SmithH #design #reliability
- Augmenting descriptive scenario analysis for improvements in human reliability design (SPS, MDH), pp. 739–743.
- SAC-2002-TourinoBDG #clustering #performance
- Performance analysis of MPI-I/O primitives on a PC cluster (JT, JB, RD, VMG), pp. 907–912.
- GPCE-2002-JonesG #generative #termination
- Program Generation, Termination, and Binding-Time Analysis (NDJ, AJG), pp. 1–31.
- GPCE-2002-Lee #polynomial #termination
- Program Termination Analysis in Polynomial Time (CSL), pp. 218–235.
- CC-2002-GuptaMZ #optimisation #representation
- A Representation for Bit Section Based Analysis and Optimization (RG, EM, YZ), pp. 62–77.
- CC-2002-Mohnen #approach #data flow
- A Graph-Free Approach to Data-Flow Analysis (MM), pp. 46–61.
- CC-2002-NeculaMRW #c #named #source code #tool support
- CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs (GCN, SM, SPR, WW), pp. 213–228.
- DAC-2002-AttarhaN #fault #modelling #using
- Signal integrity fault analysis using reduced-order modeling (AA, MN), pp. 367–370.
- DAC-2002-BhuniaRS #detection #fault #locality #novel
- A novel wavelet transform based transient current analysis for fault detection and localization (SB, KR, JS), pp. 361–366.
- DAC-2002-BodapatiN #megamodelling
- High-level current macro-model for power-grid analysis (SB, FNN), pp. 385–390.
- DAC-2002-Casinovi #algorithm
- An algorithm for frequency-domain noise analysis in nonlinear systems (GC), pp. 514–517.
- DAC-2002-KoukabDD #named #performance
- HSpeedEx: a high-speed extractor for substrate noise analysis in complex mixed signal SOC (AK, CD, MJD), pp. 767–770.
- DAC-2002-KrauterW
- Variable frequency crosstalk noise analysis: : a methodology to guarantee functionality from dc to fmax (BK, DW), pp. 665–668.
- DAC-2002-LachishMUZ #functional
- Hole analysis for functional coverage data (OL, EM, SU, AZ), pp. 807–812.
- DAC-2002-LeeP #design #embedded #performance #simulation
- Timed compiled-code simulation of embedded software for performance analysis of SOC design (JYL, ICP), pp. 293–298.
- DAC-2002-LiouKWC #performance #statistics #testing #validation
- False-path-aware statistical timing analysis and efficient path selection for delay testing and timing validation (JJL, AK, LCW, KTC), pp. 566–569.
- DAC-2002-OrshanskyK #framework #probability
- A general probabilistic framework for worst case timing analysis (MO, KK), pp. 556–561.
- DAC-2002-RichterZJE #composition #design #framework #platform #scheduling
- Model composition for scheduling analysis in platform design (KR, DZ, MJ, RE), pp. 287–292.
- DAC-2002-VaratkarM #design #multi #network
- Traffic analysis for on-chip networks design of multimedia applications (GV, RM), pp. 795–800.
- DAC-2002-WolfSE #formal method
- Associative caches in formal software timing analysis (FW, JS, RE), pp. 622–627.
- DAC-2002-YeMB #network #power management
- Analysis of power consumption on switch fabrics in network routers (TTY, GDM, LB), pp. 524–529.
- DAC-2002-ZhengP #modelling #network #symmetry
- Modeling and analysis of regular symmetrically structured power/ground distribution networks (HZ, LTP), pp. 395–398.
- DATE-2002-BecerZBPH #using
- Analysis of Noise Avoidance Techniques in DSM Interconnects Using a Complete Crosstalk Noise Model (MRB, VZ, DB, RP, INH), pp. 456–463.
- DATE-2002-BhuniaR #detection #fault #using
- Fault Detection and Diagnosis Using Wavelet Based Transient Current Analysis (SB, KR), p. 1118.
- DATE-2002-GoffioulWVD #approach #architecture #using
- Analysis of Nonlinearities in RF Front-End Architectures Using a Modified Volterra Series Approach (MG, PW, GV, SD), pp. 352–356.
- DATE-2002-Hieu #design #feedback #linear #optimisation
- Optimization Techniques for Design of General and Feedback Linear Analog Amplifier with Symbolic Analysis (TcH), p. 1104.
- DATE-2002-IndrusiakGR #comparative #design #distributed #framework #repository
- Comparative Analysis and Application of Data Repository Infrastructure for Collaboration-Enabled Distributed Design Environments (LSI, MG, RAdLR), p. 1130.
- DATE-2002-IraniGS #multi #power management
- Competitive Analysis of Dynamic Power Management Strategies for Systems with Multiple Power Savings States (SI, RKG, SKS), pp. 117–123.
- DATE-2002-JerkeL #verification
- Hierarchical Current Density Verification for Electromigration Analysis in Arbitrary Shaped Metallization Patterns of Analog Circuits (GJ, JL), pp. 464–469.
- DATE-2002-KimKM #algorithm #realtime #scalability #using
- A Dynamic Voltage Scaling Algorithm for Dynamic-Priority Hard Real-Time Systems Using Slack Time Analysis (WK, JK, SLM), pp. 788–794.
- DATE-2002-LiP #approach #modelling
- A Linear-Centric Modeling Approach to Harmonic Balance Analysis (PL, LTP), pp. 634–639.
- DATE-2002-PoppOHB #automation #parametricity
- Parameter Controlled Automatic Symbolic Analysis of Nonlinear Analog Circuits (RP, JO, LH, EB), pp. 274–278.
- DATE-2002-RichterE #interface
- Event Model Interfaces for Heterogeneous System Analysis (KR, RE), pp. 506–513.
- DATE-2002-VedulaA #functional #generative #named #testing
- FACTOR: A Hierarchical Methodology for Functional Test Generation and Testability Analysis (VMV, JAA), pp. 730–734.
- DATE-2002-ZhengPBK #modelling #scalability
- Window-Based Susceptance Models for Large-Scale RLC Circuit Analyses (HZ, LTP, MWB, BK), pp. 628–633.
- HPCA-2002-KampeSD #branch #fourier #predict #using
- The FAB Predictor: Using Fourier Analysis to Predict the Outcome of Conditional Branches (MK, PS, MD), pp. 223–232.
- OSDI-2002-DunlapKCBC #named
- ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay (GWD, STK, SC, MAB, PMC), pp. 211–224.
- OSDI-2002-SaroiuGDGL #delivery #internet
- An Analysis of Internet Content Delivery Systems (SS, PKG, RJD, SDG, HML), pp. 315–327.
- PDP-2002-GerndtSSW #approach #automation #distributed #performance
- Performance Analysis for Teraflop Computers: A Distributed Automatic Approach (MG, AS, MS, RW), pp. 23–30.
- PDP-2002-Rodriguez #algorithm #design #parallel
- The Design and Analysis of Parallel Algorithms (CR), p. 1.
- ESOP-2002-Feret #dependence #mobile
- Dependency Analysis of Mobile Systems (JF), pp. 314–330.
- ESOP-2002-NielsonNS #automation #complexity
- Automatic Complexity Analysis (FN, HRN, HS), pp. 243–261.
- ESOP-2002-WandW #composition #proving
- A Modular, Extensible Proof Method for Small-Step Flow Analyses (MW, GBW), pp. 213–227.
- ESOP-2002-Weirich #higher-order
- Higher-Order Intensional Type Analysis (SW), pp. 98–114.
- STOC-2002-Bachmat #scheduling #sequence
- Average case analysis for batched disk scheduling and increasing subsequences (EB), pp. 277–286.
- STOC-2002-ChanLTW #video
- A unified analysis of hot video schedulers (WTC, TWL, HFT, PWHW), pp. 179–188.
- STOC-2002-ScharbrodtSS #scheduling
- A new average case analysis for completion time scheduling (MS, TS, AS), pp. 170–178.
- TACAS-2002-JinKS #reachability #scheduling
- Fine-Grain Conjunction Scheduling for Symbolic Reachability Analysis (HJ, AK, FS), pp. 312–326.
- TACAS-2002-Lowry #tool support
- Software Construction and Analysis Tools for Future Space Missions (MRL), pp. 1–19.
- TACAS-2002-Subramani #scheduling
- An Analysis of Zero-Clairvoyant Scheduling (KS), pp. 98–112.
- CADE-2002-Baaz #proving
- Proof Analysis by Resolution (MB), pp. 517–532.
- CAV-2002-ArmandoBBCCMRTVV #protocol #security
- The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
- CAV-2002-BaumgartnerKA
- Property Checking via Structural Analysis (JB, AK, JAA), pp. 151–165.
- CAV-2002-Holzmann #model checking
- Software Analysis and Model Checking (GJH), pp. 1–16.
- CAV-2002-YonedaKM #automation #constraints
- Automatic Derivation of Timing Constraints by Failure Analysis (TY, TK, CJM), pp. 195–208.
- ICLP-2002-DucasseL #automation #execution
- Automated Analysis of CLP(FD) Program Execution Traces (MD, LL), pp. 470–471.
- ICLP-2002-SchrijversBD
- Trailing Analysis for HAL (TS, MJGdlB, BD), pp. 38–53.
- ISSTA-2002-BriandLS #contract #fault #object-oriented #using
- Investigating the use of analysis contracts to support fault isolation in object oriented code (LCB, YL, HS), pp. 70–80.
- ISSTA-2002-LiangPH #precise #profiling #using
- Evaluating the precision of static reference analysis using profiling (DL, MP, MJH), pp. 22–32.
- ISSTA-2002-MilanovaRR #java #points-to
- Parameterized object sensitivity for points-to and side-effect analyses for Java (AM, AR, BGR), pp. 1–11.
- ISSTA-2002-VaysburgTK #dependence #reduction #testing
- Dependence analysis in reduction of requirement based test suites (BV, LHT, BK), pp. 107–111.
- SAT-2002-KaporisKL #algorithm #probability #satisfiability
- The Probabilistic Analysis of a Greedy Satisfiability Algorithm (ACK, LMK, EGL), p. 5.
- SAT-2002-MonassonC #algorithm #exponential #random #satisfiability #scalability
- Restart method and exponential acceleration of random 3-SAT instances resolutions: A large deviation analysis of the Davis-Putnam-Loveland-Logemann algorithm (RM, SC), p. 11.
- TestCom-2002-CastanetR #proving #reachability #testing #theorem proving
- Generate Certified Test Cases by Combining Theorem Proving and Reachability Analysis (RC, DR), pp. 249–266.
- VMCAI-2002-CharatonikMP #composition #termination
- Compositional Termination Analysis of Symbolic Forward Analysis (WC, SM, AP), pp. 109–125.
- VMCAI-2002-MurawskiY
- Static Monotonicity Analysis for lambda-definable Functions over Lattices (ASM, KY), pp. 139–153.
- DocEng-2001-NaF #authoring #documentation #hypermedia #petri net #using
- Dynamic documents: authoring, browsing, and analysis using a high-level petri net-based hypermedia system (JCN, RF), pp. 38–47.
- ICDAR-2001-AmanoAMSS #documentation #grammarware #synthesis
- Table Form Document Synthesis by Grammar-Based Structure Analysis (AA, NA, TM, TS, KS), pp. 533–539.
- ICDAR-2001-BlumensteinV #benchmark #database #metric #performance #segmentation
- Analysis of Segmentation Performance on the CEDAR Benchmark Database (MB, BV), pp. 1142–1146.
- ICDAR-2001-ChaS #algorithm #classification
- Apriori Algorithm for Sub-category Classification Analysis of Handwriting (SHC, SNS), pp. 1022–1025.
- ICDAR-2001-DaWM #classification #fuzzy
- Character Preclassification Based on Fuzzy Typographical Analysis (LD, PW, BM), pp. 74–78.
- ICDAR-2001-GarainC #fuzzy #multi #segmentation #using
- Segmentation of Touching Characters in Printed Devnagari and Bangla Scripts Using Fuzzy Multifactorial Analysis (UG, BBC), pp. 805–809.
- ICDAR-2001-HaritCGVJ #documentation #image
- A Model Guided Document Image Analysis Scheme (GH, SC, PG, NV, SDJ), pp. 1137–1141.
- ICDAR-2001-KimLSN #encoding #performance
- Analysis of Postal Address Fields for Efficient Encoding of Korean Mail Pieces (GK, SL, MS, YSN), pp. 675–679.
- ICDAR-2001-LiuLHY #algorithm #component #layout
- A New Component Based Algorithm for Newspaper Layout Analysis (FL, YL, DH, MY), pp. 1176–1180.
- ICDAR-2001-LoprestiW #documentation #graph
- Evaluating Document Analysis Results via Graph Probing (DPL, GTW), pp. 116–120.
- ICDAR-2001-MatsumotoFN #online
- Collection and Analysis of On-line Handwritten Japanese Character Patterns (KM, TF, MN), pp. 496–500.
- ICDAR-2001-MitchellY #documentation #segmentation
- Newspaper Document Analysis Featuring Connected Line Segmentation (PEM, HY), pp. 1181–1185.
- ICDAR-2001-PennHLM #delivery #documentation #flexibility #web
- Flexible Web Document Analysis for Delivery to Narrow-Bandwidth Devices (GP, JH, HL, RTM), pp. 1074–1078.
- ICDAR-2001-ShinjoHMSS #recognition #recursion
- A Recursive Analysis for Form Cell Recognition (HS, EH, KM, YS, HS), pp. 694–698.
- ICDAR-2001-WongSA01a #layout #using
- Use of Colour in Form Layout Analysis (WSW, NS, TA), pp. 942–946.
- ICDAR-2001-YangZ #html #visual notation
- HTML Page Analysis Based on Visual Cues (YY, HZ), pp. 859–864.
- ICDAR-2001-ZanibbiBC
- Baseline Structure Analysis of Handwritten Mathematics Notation (RZ, DB, JRC), pp. 768–773.
- ICDAR-2001-ZhouT #documentation #image #recognition
- Chart Analysis and Recognition in Document Images (YPZ, CLT), pp. 1055–1058.
- JCDL-2001-ChauZC #personalisation #web
- Personalized spiders for web search and analysis (MC, DDZ, HC), pp. 79–87.
- JCDL-2001-Khoo #community #design #overview #policy
- Community design of DLESE’s collections review policy: a technological frames analysis (MK), pp. 157–164.
- JCDL-2001-RauberM #automation #library
- Integrating automatic genre analysis into digital libraries (AR, AMK), pp. 1–10.
- CSMR-2001-PodnarM #maintenance #process #simulation #using
- Software Maintenance Process Analysis Using Discrete-Event Simulation (IP, BM), pp. 192–195.
- ICSM-2001-AtkinsonG #data flow #implementation #performance #scalability #source code
- Implementation Techniques for Efficient Data-Flow Analysis of Large Programs (DCA, WGG), pp. 52–61.
- ICSM-2001-Chulani #modelling #quality
- Bayesian Analysis of Software Cost and Quality Models (SC), p. 565–?.
- ICSM-2001-EisenbarthKS #comprehension
- Aiding Program Comprehension by Static and Dynamic Feature Analysis (TE, RK, DS), pp. 602–611.
- ICSM-2001-MalenfantAMD #detection
- Flow Analysis to Detect Blocked Statements (BM, GA, EM, MD), p. 62–?.
- ICSM-2001-RotschkeKH #architecture #multi
- Multi-View Architecture Trend Analysis for Medical Imaging (TR, RLK, DH), p. 107.
- IWPC-2001-BassilK #overview #tool support #visualisation
- Software Visualization Tools: Survey and Analysis (SB, RKK), pp. 7–17.
- IWPC-2001-Stewart #automation #semantics
- Automated Analysis of Scientific and Engineering Semantics (MEMS), pp. 113–114.
- PASTE-2001-Hind #pointer #problem #question
- Pointer analysis: haven’t we solved this problem yet? (MH), pp. 54–61.
- PASTE-2001-LiangPH #java #points-to
- Extending and evaluating flow-insenstitive and context-insensitive points-to analyses for Java (DL, MP, MJH), pp. 73–79.
- PASTE-2001-MockDCE #comparison #comprehension #optimisation #points-to #set
- Dynamic points-to sets: a comparison with static analyses and potential applications in program understanding and optimization (MM, MD, CC, SJE), pp. 66–72.
- PASTE-2001-Palsberg #type system
- Type-based analysis and applications (JP), pp. 20–27.
- SCAM-2001-BurdR #automation #evolution #source code #using
- Using Automated Source Code Analysis for Software Evolution (LB, SR), pp. 206–212.
- SCAM-2001-DeruelleMBB #distributed #multi
- Analysis and Manipulation of Distributed Multi-Language Software Code (LD, NM, MB, HB), pp. 45–56.
- SCAM-2001-HorganPW #java #metric #profiling #runtime #source code
- Measurement and Analysis of Runtime Profiling Data for Java Programs (JH, JFP, JW), pp. 124–132.
- SCAM-2001-Knight #exclamation #java #smell
- Smell the Coffee! Uncovering Java Analysis Issues (CK), pp. 163–169.
- SCAM-2001-MaggiS #bytecode #data flow #java #using
- Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.
- SCAM-2001-Ward #approach #source code
- The Formal Transformation Approach to Source Code Analysis and Manipulation (MPW), pp. 187–195.
- WCRE-2001-CifuentesWE #debugging #decompiler #security
- Computer Security Analysis through Decompilation and High-Level Debugging (CC, TW, MVE), pp. 375–380.
- ICALP-2001-Boreale #encryption #protocol
- Symbolic Trace Analysis of Cryptographic Protocols (MB), pp. 667–681.
- FME-2001-Beyer #automaton #reachability
- Improvements in BDD-Based Reachability Analysis of Timed Automata (DB0), pp. 318–343.
- FME-2001-HelkeS #behaviour #consistency #eiffel #library
- Mechanized Analysis of Behavioral Conformance in the Eiffel Base Libraries (SH, TS), pp. 20–42.
- FLOPS-2001-AmatoS #compilation
- Abstract Compilation for Sharing Analysis (GA, FS), pp. 311–325.
- FLOPS-2001-LagoonS #framework #logic programming #source code
- A Framework for Analysis of Typed Logic Programs (VL, PJS), pp. 296–310.
- ICFP-2001-NeubauerS #emacs #lisp
- Down with Emacs Lisp: Dynamic Scope Analysis (MN, MS), pp. 38–49.
- IFL-2001-PenaS01a #nondeterminism
- A Polynomial-Cost Non-determinism Analysis (RP, CS), pp. 121–137.
- CHI-2001-CardPWMRSB #behaviour #graph #protocol #usability #web
- Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
- CHI-2001-Muller
- Layered participatory analysis: new developments in the CARD technique (MJM), pp. 90–97.
- ICEIS-v1-2001-SierraRLG #image #machine learning #mobile #order #recognition
- Machine Learning Approaches for Image Analysis: Recognition of Hand Orders by a Mobile Robot (BS, IR, EL, UG), pp. 330–335.
- ICEIS-v2-2001-ArevaloCQAV #corba #design #framework #industrial #web
- A CORBA and Web Technology Based Framework for the Analysis and Optimal Design of Complex Systems in the Oil Industry (CJA, JAC, NVQ, NA, JV), pp. 953–961.
- ICEIS-v2-2001-BohnackerDFR #automation #feedback
- Automatic Analysis of Customer Feedback and Inquiries (UB, LD, JF, IR), pp. 1162–1165.
- ICEIS-v2-2001-FerreiraL #effectiveness #reuse
- Organization of Analysis Patterns for Effective Reuse (MJF, PL), pp. 766–773.
- ICEIS-v2-2001-MorilloFD #named
- RSHP: A Scheme to Classify Information in a Domain Analysis Environment (JLM, JMF, ID), pp. 686–690.
- ICEIS-v2-2001-OmelayenkoF #integration #problem
- An Analysis of B2B Catalogue Integration Problems (BO, DF), pp. 945–952.
- ICEIS-v2-2001-ShishkovD #case study #diagrams #modelling #process
- Analysis of Suitability, Appropriateness and Adequacy of Use Cases Combined with Activity Diagram for Business Systems Modelling (BS, JLGD), pp. 854–858.
- CIKM-2001-Couchot #composition #set #termination
- Termination Analysis of Active Rules Modular Sets (AC), pp. 326–333.
- KDD-2001-BerkhinBR #interactive #web
- Interactive path analysis of web site traffic (PB, JDB, DJR), pp. 414–419.
- KDD-2001-HotzGHNW #detection #industrial
- REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive industry (EH, UG, WH, GN, MW), pp. 432–437.
- KDD-2001-SpanglerK #knowledge base #maintenance #using
- Knowledge base maintenance using knowledge gap analysis (WSS, JTK), pp. 462–466.
- MLDM-2001-SyG #approach #data mining #mining #statistics
- Data Mining Approach Based on Information-Statistical Analysis: Application to Temporal-Spatial Data (BKS, AKG), pp. 128–140.
- SEKE-2001-BarrosWT #process #project management #reuse
- Scenario Oriented Project Management Knowledge Reuse within a Risk Analysis Process (MdOB, CMLW, GHT), pp. 37–44.
- SEKE-2001-GruerHKC #design #framework #multi
- A Formal Framework for Multi-Agent Systems Analysis and Design (PG, VH, AK, KC), pp. 276–282.
- SEKE-2001-JarzabekZ #abstraction #component #control flow #reuse
- Enhacing component reuse with control flow abstraction analysis (SJ, HZ), pp. 171–178.
- SEKE-2001-Lopez #architecture #evaluation #framework #trade-off
- Application of an Evaluation Framework for Analyzing the Architecture Tradeoff Analysis Method (ML), pp. 397–404.
- SIGIR-2001-AndoL
- Iterative Residual Rescaling: An Analysis and Generalization of LSI (RKA, LL), pp. 154–162.
- SIGIR-2001-ChowdhuryFGM #multi #retrieval
- Analyses of Multiple-Evidence Combinations for Retrieval Strategies (AC, OF, DAG, MCM), pp. 394–395.
- SIGIR-2001-GongL #semantics #summary #using
- Generic Text Summarization Using Relevance Measure and Latent Semantic Analysis (YG, XL), pp. 19–25.
- SIGIR-2001-ZhengNJ #algorithm
- Stable Algorithms for Link Analysis (AXZ, AYN, MIJ), pp. 258–266.
- UML-2001-DevosS #object-oriented #paradigm
- The Message Paradigm in Object-Oriented Analysis (FD, ES), pp. 182–193.
- UML-2001-GrassiM #architecture #mobile #modelling #performance #uml
- UML Modelling and Performance Analysis of Mobile Software Architectures (VG, RM), pp. 209–224.
- UML-2001-XuandongMYJG #diagrams #process #uml
- Timing Analysis of UML Activity Diagrams (XL, CM, YP, JZ, GZ), pp. 62–75.
- OOPSLA-2001-PechtchanskiS #framework #interprocedural
- Dynamic Optimistic Interprocedural Analysis: A Framework and an Application (IP, VS), pp. 195–210.
- OOPSLA-2001-RountevMR #constraints #java #points-to #using
- Points-To Analysis for Java using Annotated Constraints (AR, AM, BGR), pp. 43–55.
- TOOLS-EUROPE-2001-SevitskyPK #java #performance #source code
- An Information Exploration Tool for Performance Analysis of Java Programs (GS, WDP, RK), pp. 85–101.
- PADL-2001-BellaB #constraints #protocol #security
- Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
- PLDI-2001-AggarwalR
- Related Field Analysis (AA, KHR), pp. 214–220.
- PLDI-2001-ChatterjeePHL #behaviour
- Exact Analysis of the Cache Behavior of Nested Loops (SC, EP, PJH, ARL), pp. 286–297.
- PLDI-2001-GhiyaLS #ambiguity #c #memory management #on the #points-to #source code
- On the Importance of Points-to Analysis and Other Memory Disambiguation Methods for C Programs (RG, DML, DCS), pp. 47–58.
- PLDI-2001-HeintzeT #pointer
- Demand-Driven Pointer Analysis (NH, OT), pp. 24–34.
- PLDI-2001-HeintzeT01a #alias #c #using
- Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second (NH, OT), pp. 254–263.
- PLDI-2001-VivienR #pointer
- Incrementalized Pointer and Escape Analysis (FV, MCR), pp. 35–46.
- POPL-2001-Monniaux #monte carlo #probability #source code
- An abstract Monte-Carlo method for the analysis of probabilistic programs (DM), pp. 93–101.
- POPL-2001-RehofF #polymorphism #type system
- Type-base flow analysis: from polymorphic subtyping to CFL-reachability (JR, MF), pp. 54–66.
- PPDP-2001-ChangJ #constraints #java
- Granularity of Constraint-Based Analysis for Java (BMC, JWJ), pp. 94–102.
- QAPL-2001-ClarkHM
- Quantitative Analysis of the Leakage of Confidential Data (DC, SH, PM), pp. 238–251.
- QAPL-2001-Fruhwirth #automation #complexity #concurrent #source code
- As Time Goes By II: More Automatic Complexity Analysis of Concurrent Rule Programs (TWF), pp. 185–206.
- SAS-2001-BagnaraGHZ #constraints
- Finite-Tree Analysis for Constraint Logic-Based Languages (RB, RG, PMH, EZ), pp. 165–184.
- SAS-2001-DorRS #c #integer #source code #string
- Cleanness Checking of String Manipulations in C Programs via Integer Analysis (ND, MR, SS), pp. 194–212.
- SAS-2001-GlynnSS #constraints #effectiveness #strict
- Effective Strictness Analysis with HORN Constraints (KG, PJS, MS), pp. 73–92.
- SAS-2001-GordonJ #protocol #security
- A Type and Effect Analysis of Security Protocols (ADG, AJ), p. 432.
- SAS-2001-Goubault #float #precise
- Static Analyses of the Precision of Floating-Point Operations (EG), pp. 234–259.
- SAS-2001-LiangH #interprocedural #performance #pointer
- Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses (DL, MJH), pp. 279–298.
- SAS-2001-Lu #logic programming #source code
- Parameterizing a Groundness Analysis of Logic Programs (LL), pp. 146–164.
- SAS-2001-Monniaux #probability #source code #termination
- An Abstract Analysis of the Probabilistic Termination of Programs (DM), pp. 111–126.
- SAS-2001-Rinard #parallel #source code #thread
- Analysis of Multithreaded Programs (MCR), pp. 1–19.
- SAS-2001-Spoto #composition #semantics
- Watchpoint Semantics: A Tool for Compositional and Focussed Static Analyses (FS), pp. 127–145.
- RE-2001-ChengC #formal method #modelling #requirements
- Integrating Informal and Formal Approaches to Requirements Modeling and Analysis (BHCC, LAC), pp. 294–295.
- RE-2001-FarbeyF
- Software Acquisition: A Business Strategy Analysis (BF, AF), pp. 76–83.
- RE-2001-InOR #modelling #multi #requirements
- A Requirements Negotiation Model Based on Multi-Criteria Analysis (HI, DO, TR), pp. 312–313.
- ASE-2001-ZarrasI #automation #enterprise #information management #performance #reliability
- Automating the Performance and Reliability Analysis of Enterprise Information Systems (AZ, VI), pp. 350–353.
- ESEC-FSE-2001-EdvardssonK #constraints #generative #testing #theorem proving
- Analysis of the constraint solver in UNA based test data generation (JE, MK), pp. 237–245.
- ICSE-2001-Campbell #diagrams #uml #visualisation
- Visualizaiton an Interpretation of Analysis Results within the Context of Formalized UML Diagrams (LAC), pp. 785–786.
- ICSE-2001-CobleighCO #algorithm #data flow #finite #verification
- The Right Algorithm at the Right Time: Comparing Data Flow Analysis Algorithms for Finite State Verification (JMC, LAC, LJO), pp. 37–46.
- ICSE-2001-DickinsonLP #clustering #execution
- Finding Failures by Cluster Analysis of Execution Profiles (WD, DL, AP), pp. 339–348.
- ICSE-2001-DillonS #graph #specification #using
- Leightweight Analysis of Operational Specifications Using Inference Graphs (LKD, KS), pp. 57–67.
- ICSE-2001-FioravantiMN #object-oriented #re-engineering
- Reengineering Analysis of Object-Oriented Systems via Duplication (FF, GM, PN), pp. 577–586.
- ICSE-2001-JhaW #network
- Survivability Analysis of Network Systems (SJ, JMW), pp. 307–317.
- ICSE-2001-MenziesPH #diagrams #formal method #performance #requirements
- Fast Formal Analysis of Requirements via “Topoi Diagrams” (TM, JDP, MEH), pp. 391–400.
- ICSE-2001-NordPSH #architecture #design #effectiveness #uml
- Effective Software Architecture Design: From Global Analysis to UML Descriptions (RLN, DJP, DS, CH), pp. 741–742.
- ICSE-2001-OvermyerLR #concept #modelling #using
- Conceptual Modeling through Linguistic Analysis Using LIDA (SPO, BL, OR), pp. 401–410.
- ICSE-2001-RiccaT #testing #web
- Analysis and Testing of Web Applications (FR, PT), pp. 25–34.
- ICSE-2001-SmithOB #architecture #component #mining #product line #re-engineering
- Mining Components for a Software Architecture and a Product Line: the Options Analysis for Reengineering (OAR) Method (DBS, LO, JB), p. 728.
- ICSE-2001-StirewaltD #approach #component #formal method #tool support
- A Component-Based Approach to Building Formal Analysis Tools (KS, LKD), pp. 167–176.
- SAC-2001-BaroneBVM #algorithm #approximate #problem
- An approximation algorithm for the shortest common supersequence problem: an experimental analysis (PB, PB, GDV, GM), pp. 56–60.
- SAC-2001-ChangJYC #exception #interprocedural #java
- Interprocedural exception analysis for Java (BMC, JWJ, KY, KMC), pp. 620–625.
- SAC-2001-GuPH #data type #database #design #image #query
- Design and analysis of data structures for querying image databases (YG, BP, KAH), pp. 236–241.
- SAC-2001-LiPJ
- Analysis of dynamic movement-based location update scheme (JL, YP, XJ), pp. 368–372.
- SAC-2001-MinFO #adaptation #network
- Analysis of adaptive wormhole-routed torus networks with IPP input traffic (GM, JDF, MOK), pp. 494–498.
- SAC-2001-ShahrabiOM #adaptation
- Unicast-based broadcast: an analysis for the hypercube with adaptive routing (AS, MOK, LMM), pp. 489–493.
- CC-2001-Engelen #compilation #optimisation #performance
- Efficient Symbolic Analysis for Optimizing Compilers (RvE), pp. 118–132.
- CC-2001-MartenaP #alias #model checking
- Alias Analysis by Means of a Model Checker (VM, PSP), pp. 3–19.
- CC-2001-RinetzkyS #interprocedural #recursion #source code
- Interprocedural Shape Analysis for Recursive Programs (NR, SS), pp. 133–149.
- CC-2001-RountevR #library #points-to #source code
- Points-to and Side-Effect Analyses for Programs Built with Precompiled Libraries (AR, BGR), pp. 20–36.
- DAC-2001-AjamiBPG #performance
- Analysis of Non-Uniform Temperature-Dependent Interconnect Performance in High Performance ICs (AHA, KB, MP, LPPPvG), pp. 567–572.
- DAC-2001-ArunachalamBP #interactive
- False Coupling Interactions in Static Timing Analysis (RA, RDB, LTP), pp. 726–731.
- DAC-2001-BaiBH #power management
- Static Timing Analysis Including Power Supply Noise Effect on Propagation Delay in VLSI Circuits (GB, SB, INH), pp. 295–300.
- DAC-2001-BanerjeeM #distributed #novel #optimisation #performance #using
- Analysis of On-Chip Inductance Effects using a Novel Performance Optimization Methodology for Distributed RLC Interconnects (KB, AM), pp. 798–803.
- DAC-2001-ChenC #grid #performance #power management #scalability
- Efficient Large-Scale Power Grid Analysis Based on Preconditioned Krylov-Subspace Iterative Methods (THC, CCPC), pp. 559–562.
- DAC-2001-DanielSW #performance #using
- Using Conduction Modes Basis Functions for Efficient Electromagnetic Analysis of On-Chip and Off-Chip Interconnect (LD, ALSV, JW), pp. 563–566.
- DAC-2001-GalaBWZZ #design
- Inductance 101: Analysis and Design Issues (KG, DB, JW, VZ, MZ), pp. 329–334.
- DAC-2001-GorenSW #novel #pipes and filters #probability
- A Novel Method for Stochastic Nonlinearity Analysis of a CMOS Pipeline ADC (DG, ES, IAW), pp. 127–132.
- DAC-2001-LiouCKK #performance #probability #statistics
- Fast Statistical Timing Analysis By Probabilistic Event Propagation (JJL, KTC, SK, AK), pp. 661–666.
- DAC-2001-MassoudKMW #difference #induction #modelling
- Modeling and Analysis of Differential Signaling for Minimizing Inductive Cross-Talk (YM, JK, DM, JW), pp. 804–809.
- DAC-2001-MathurS #precise #using
- Improved Merging of Datapath Operators using Information Content and Required Precision Analysis (AM, SS), pp. 462–467.
- DAC-2001-McDonaldB #simulation #using
- Computing Logic-Stage Delays Using Circuit Simulation and Symbolic Elmore Analysis (CBM, REB), pp. 283–288.
- DAC-2001-NandiM #design #embedded #performance
- System-Level Power/Performance Analysis for Embedded Systems Design (AN, RM), pp. 599–604.
- DAC-2001-SchenkelPZSGA #optimisation
- Mismatch Analysis and Direct Yield Optimization by Spec-Wise Linearization and Feasibility-Guided Search (FS, MP, SZ, RS, HEG, KA), pp. 858–863.
- DAC-2001-ShinKL #energy #scheduling #using
- Low-Energy Intra-Task Voltage Scheduling Using Static Timing Analysis (DS, JK, SL), pp. 438–443.
- DAC-2001-VerhaegenG #linear #performance #scalability
- Efficient DDD-based Symbolic Analysis of Large Linear Analog Circuits (WV, GGEG), pp. 139–144.
- DAC-2001-XiaoM #correlation #functional #identification
- Functional Correlation Analysis in Crosstalk Induced Critical Paths Identification (TX, MMS), pp. 653–656.
- DAC-2001-ZhouSN #fixpoint
- Timing Analysis with Crosstalk as Fixpoints on Complete Lattice (HZ, NVS, WN), pp. 714–719.
- DATE-2001-BensoCNP #distributed #fault #injection #open source
- SEU effect analysis in an open-source router via a distributed fault injection environment (AB, SDC, GDN, PP), pp. 219–225.
- DATE-2001-DoboliV #network #scalability
- A regularity-based hierarchical symbolic analysis method for large-scale analog networks (AD, RV), p. 806.
- DATE-2001-FioriM
- Analysis of EME produced by a microcontroller operation (FF, FM), pp. 341–347.
- DATE-2001-HsiehCP #simulation
- Microprocessor power analysis by labeled simulation (CTH, LC, MP), pp. 182–189.
- DATE-2001-JungYC #multi #performance
- Performance improvement of multi-processor systems cosimulation based on SW analysis (JJ, SY, KC), pp. 749–753.
- DATE-2001-KoranneG #automation #geometry #layout #on the
- On automatic analysis of geometrically proximate nets in VSLI layout (SK, OPG), p. 818.
- DATE-2001-KralicekJG #modelling
- Modeling electromagnetic emission of integrated circuits for system analysis (PK, WJ, HG), pp. 336–340.
- DATE-2001-MarculescuN #modelling #probability
- Probabilistic application modeling for system-level perfromance analysis (RM, AN), pp. 572–579.
- DATE-2001-NayakHCB #automation #fault #hardware #matlab #precise #synthesis
- Precision and error analysis of MATLAB applications during automated hardware synthesis for FPGAs (AN, MH, ANC, PB), pp. 722–728.
- DATE-2001-OlbrichRB #algorithm #classification
- An improved hierarchical classification algorithm for structural analysis of integrated circuits (MO, AR, EB), p. 807.
- DATE-2001-Zhu01a #memory management #pointer
- Static memory allocation by pointer analysis and coloring (JZ), pp. 785–790.
- HPDC-2001-WuB #architecture #parallel
- Parallel Retrograde Analysis on Different Architecture (RW, DFB), pp. 356–362.
- LCTES-OM-2001-UnnikrishnanSL #automation #garbage collection #memory management
- Automatic Accurate Live Memory Analysis for Garbage-Collected Languages (LU, SDS, YAL), pp. 102–111.
- LCTES-OM-2001-VivancosHMW #parametricity
- Parametric Timing Analysis (EV, CAH, FM, DBW), pp. 88–93.
- LCTES-OM-2001-ZiegenbeinWRJE #process
- Interval-Based Analysis of Software Processes (DZ, FW, KR, MJ, RE), pp. 94–101.
- PDP-2001-Appelt #what
- What Groupware Functionality Do Users Really Use? Analysis of the Usage of the BSCW System (WA), p. 337–?.
- PDP-2001-StuartBW #visualisation
- Information Visualisation in Numerical Analysis (EJS, DWB, JSW), pp. 250–257.
- PPoPP-2001-InoFH #named #parallel
- LogGPS: a parallel computational model for synchronization analysis (FI, NF, KH), pp. 133–142.
- PPoPP-2001-KimOEFV #execution #framework #optimisation
- Reference idempotency analysis: a framework for optimizing speculative execution (SWK, ClO, RE, BF, TNV), pp. 2–11.
- PPoPP-2001-SalcianuR #parallel #pointer #source code #thread
- Pointer and escape analysis for multithreaded programs (AS, MCR), pp. 12–23.
- PPoPP-2001-VetterM #communication #distributed #scalability #statistics
- Statistical scalability analysis of communication operations in distributed applications (JSV, MOM), pp. 123–132.
- ESOP-2001-GenaimC #approach #dependence
- The Def-inite Approach to Dependency Analysis (SG, MC), pp. 417–432.
- ESOP-2001-Mitchell #calculus #polynomial #probability #process #protocol #security
- Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis (JCM), pp. 23–29.
- ESOP-2001-NielsonS #control flow #polynomial
- Control-Flow Analysis in Cubic Time (FN, HS), pp. 252–268.
- ESOP-2001-Weirich #encoding
- Encoding Intensional Type Analysis (SW), pp. 92–106.
- FASE-2001-OlveczkyKMTZ #maude #network #protocol #realtime #specification
- Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real-Time Maude (PCÖ, MK, JM, CLT, SZ), pp. 333–348.
- FASE-2001-SharyginaBK #design #object-oriented #reliability #verification
- A Formal Object-Oriented Analysis for Software Reliability: Design for Verification (NS, JCB, RPK), pp. 318–332.
- FoSSaCS-2001-JensenS #abstract interpretation #object-oriented #source code
- Class Analysis of Object-Oriented Programs through Abstract Interpretation (TPJ, FS), pp. 261–275.
- STOC-2001-AzarFKMS
- Spectral analysis of data (YA, AF, ARK, FM, JS), pp. 619–626.
- STOC-2001-SpielmanT #algorithm #polynomial #why
- Smoothed analysis of algorithms: why the simplex algorithm usually takes polynomial time (DAS, SHT), pp. 296–305.
- TACAS-2001-Castillo #modelling #state machine #tool support #validation
- The ASM Workbench — A Tool Environment for Computer-Aided Analysis and Validation of Abstract State Machine Models Tool Demonstration (GDC), pp. 578–581.
- TACAS-2001-RiccaT #problem #testing #web
- Building a Tool for the Analysis and Testing of Web Applications: Problems and Solutions (FR, PT), pp. 373–388.
- TACAS-2001-RuysLKLM #algebra #partial order #probability #process #using
- First Passage Time Analysis of Stochastic Process Algebra Using Partial Orders (TCR, RL, JPK, DL, MM), pp. 220–235.
- TACAS-2001-SouterWSP #named #testing
- TATOO: Testing and Analysis Tool for Object- Oriented Software (ALS, TMW, SAS, LLP), pp. 389–403.
- CAV-2001-AlurEY #recursion #state machine
- Analysis of Recursive State Machines (RA, KE, MY), pp. 207–220.
- CAV-2001-AnnichiniBS #named #reachability
- TReX: A Tool for Reachability Analysis of Complex Systems (AA, AB, MS), pp. 368–372.
- CAV-2001-Dang #automaton #reachability
- Binary Reachability Analysis of Pushdown Timed Automata with Dense Clocks (ZD), pp. 506–518.
- ICLP-2001-CodishGSS
- Higher-Precision Groundness Analysis (MC, SG, HS, PJS), pp. 135–149.
- IJCAR-2001-Jones #graph #termination
- Program Termination Analysis by Size-Change Graphs (NDJ), pp. 1–4.
- LICS-2001-MitchellRST #calculus #probability #process #protocol #security
- Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis (JCM, AR, AS, VT), pp. 3–5.
- SAT-2001-CoccoM #backtracking #physics #random #satisfiability #statistics
- Statistical physics analysis of the backtrack resolution of random 3-SAT instances (SC, RM), pp. 36–47.
- DL-2000-FeketeD #comprehension #documentation #named #social #visualisation
- Compus: visualization and analysis of structured documents for understanding social life in the 16th century (JDF, ND), pp. 47–55.
- DL-2000-YaoKEN #architecture #using
- Asynchronous information space analysis architecture using content and structure-based service brokering (KTY, IYK, RE, RN), pp. 133–142.
- ECDL-2000-LeeSBMMO #implementation #interface #video
- Implementation and Analysis of Several Keyframe-Based Browsing Interfaces to Digital Video (HL, AFS, CB, NM, SM, NEO), pp. 206–218.
- ECDL-2000-MahouiC #comparative #transaction
- A Comparative Transaction Log Analysis of Two Computing Collections (MM, SJC), pp. 418–423.
- HT-2000-Neumuller #tool support
- A semiotic analysis of iMarketing tools (MN), pp. 238–239.
- HT-2000-PohlP #authoring #documentation #hypermedia #process
- Analysis of the authoring process of hypertext documents (MP, PP), pp. 240–241.
- HT-2000-YooB
- Finding linking opportunities through relationship-based analysis (JY, MB), pp. 181–190.
- PODS-2000-Lynch #adaptation
- Analysis and Application of Adaptive Sampling (JFL), pp. 260–267.
- VLDB-2000-CarusoCGLM #database #quality
- Telcordia’s Database Reconciliation and Data Quality Analysis Tool (FC, MC, UG, GL, PM), pp. 615–618.
- CSEET-2000-CybulskiL #design #education #multi #using
- Teaching Systems Analysis and Design Using Multimedia and Patterns (JLC, TL), pp. 113–122.
- ITiCSE-2000-Abi-Raad #exclamation
- Systems analysis with attitude! (MAR), pp. 57–60.
- CSMR-2000-AbreuPS #approach #clustering #composition #object-oriented
- A Coupling-Guided Cluster Analysis Approach to Reengineer the Modularity of Object-Oriented Systems (FBeA, GP, PMAS), pp. 13–22.
- ICSM-2000-HuMDL #c #c++ #compilation #execution #symbolic computation #using
- C/C++ Conditional Compilation Analysis using Symbolic Execution (YH, EM, MD, BL), pp. 196–206.
- ICSM-2000-KimbleW #source code
- An Alternative Source Code Analysis (JEKJ, LJW), pp. 64–75.
- ICSM-2000-RiccaT #evolution #web
- Web Site Analysis: Structure and Evolution (FR, PT), p. 76–?.
- IWPC-2000-JahnkeNW #automation #component #embedded #quality
- Automated Quality Analysis of Component Software for Embedded Systems (JHJ, JN, JPW), pp. 18–26.
- IWPC-2000-PowerM #context-free grammar
- Metric-Based Analysis of Context-Free Grammars (JFP, BAM), pp. 171–178.
- WCRE-2000-BurdBD #evolution #process
- Studying the Process of Software Change: An Analysis of Software Evolution (EB, SB, JD), pp. 232–239.
- ICALP-2000-FocardiGM #encryption #protocol
- Non Interference for the Analysis of Cryptographic Protocols (RF, RG, FM), pp. 354–372.
- IFM-2000-BryansBBD #design #specification
- Specification and Analysis of Automata-Based Designs (JB, LB, HB, JD), pp. 176–193.
- RTA-2000-OhlebuschCM #logic programming #named #source code #termination
- TALP: A Tool for the Termination Analysis of Logic Programs (EO, CC, CM), pp. 270–273.
- ICFP-2000-TrifonovSS #reflexive
- Fully reflexive intensional type analysis (VT, BS, ZS), pp. 82–93.
- IFL-2000-GustavssonS #bound #morphism #polymorphism #type system
- A Usage Analysis with Bounded Usage Polymorphism and Subtyping (JG, JS), pp. 140–157.
- IFL-2000-PenaS #nondeterminism
- Non-determinism Analysis in a Parallel-Functional Language (RP, CS), pp. 1–18.
- CHI-2000-Balter #email
- Keystroke level analysis of email message organization (OB), pp. 105–112.
- CAiSE-2000-Wohed #concept #information management #reuse
- Conceptual Patterns for Reuse in Information Systems Analysis (PW), pp. 157–175.
- ICEIS-2000-Feng
- The Need for an “Information Analysis” Stage for ISD (JF), pp. 275–281.
- ICEIS-2000-OFlahertyW #bibliography #intranet
- Intranet Adoption: A Survey Analysis (BO, HW), pp. 429–434.
- ICEIS-2000-Wagner00a #design #enterprise #information management
- Agent-Oriented Analysis and Design of Enterprise Information Systems (GW), pp. 85–89.
- CIKM-2000-StojanovicDS #framework #query #visual notation
- Visual Query and Analysis Tool of the Object-Relational GIS Framework (ZS, SDK, DS), pp. 328–335.
- ICML-2000-NomotoM #automation
- Comparing the Minimum Description Length Principle and Boosting in the Automatic Analysis of Discourse (TN, YM), pp. 687–694.
- ICML-2000-OkamotoY #algorithm #nearest neighbour
- Generalized Average-Case Analyses of the Nearest Neighbor Algorithm (SO, NY), pp. 695–702.
- ICPR-v1-2000-Abrantes #algorithm #clustering #multi
- A Constrained Clustering Algorithm for Shape Analysis with Multiple Features (AJA), pp. 1912–1919.
- ICPR-v1-2000-BasuS
- Analysis of Cylindrical Stereo Imaging (AB, HS), pp. 1366–1369.
- ICPR-v1-2000-FontaineMP #segmentation
- Unsupervised Segmentation Based on Connectivity Analysis (MF, LM, JGP), pp. 1660–1663.
- ICPR-v1-2000-Kanatani #3d #re-engineering #reliability
- Gauge-Based Reliability Analysis of 3-D Reconstruction from Two Uncalibrated Perspective Views (KiK), pp. 1076–1079.
- ICPR-v1-2000-KawasakiIS #image
- EPI Analysis of Omni-Camera Image (HK, KI, MS), pp. 1379–1383.
- ICPR-v1-2000-KornDH #approach #image #independence
- Weather Independent Flight Guidance: Analysis of MMW Radar Images for Approach and Landing (BK, HUD, PH), pp. 1350–1353.
- ICPR-v1-2000-KruizingaP
- A Nonlinear Texture Operator Specialized in the Analysis of Dot-Patterns (PK, NP), pp. 1197–1201.
- ICPR-v1-2000-KuboNEKKMOKNMY #image
- Extraction of Pulmonary Fissures from HRCT Images Based on Surface Curvatures Analysis and Morphology Filters (MK, NN, KE, MK, MK, NM, HO, RK, HN, KM, AY), pp. 1490–1493.
- ICPR-v1-2000-Louchet #evolution #using
- Stereo Analysis Using Individual Evolution Strategy (JL), pp. 1908–1911.
- ICPR-v1-2000-Mitchell #documentation #layout #segmentation #using
- Document Page Segmentation and Layout Analysis Using Soft Ordering (PEM, HY), pp. 1458–1461.
- ICPR-v1-2000-PalettaPP #learning #recognition #using
- Learning Temporal Context in Active Object Recognition Using Bayesian Analysis (LP, MP, AP), pp. 1695–1699.
- ICPR-v1-2000-SuzukiSAO #image
- Dynamic Shadow Compensation of Aerial Images Based on Color and Spatial Analysis (AS, AS, HA, SO), pp. 1317–1320.
- ICPR-v2-2000-ChenW #segmentation #string #using
- Segmentation of Handwritten Connected Numeral String Using Background and Foreground Analysis (YKC, JFW), pp. 2598–2601.
- ICPR-v2-2000-FyfeL #canonical #correlation #network
- Canonical Correlation Analysis Neural Networks (CF, PLL), pp. 2977–2980.
- ICPR-v2-2000-GhaderiW
- Circular ECOC: A Theoretical and Experimental Analysis (RG, TW), pp. 2203–2206.
- ICPR-v2-2000-HiraokaHHMMY #algorithm #learning #linear
- Successive Learning of Linear Discriminant Analysis: Sanger-Type Algorithm (KH, KiH, MH, HM, TM, SY), pp. 2664–2667.
- ICPR-v2-2000-LiLT #cumulative #image
- Image Analysis by Accumulative Hopfield Matching (WJL, TL, HTT), pp. 2442–2445.
- ICPR-v2-2000-MenardDC #ambiguity #distance #modelling #using
- Switching Regression Models Using Ambiguity and Distance Rejects: Application to Ionogram Analysis (MM, PAD, VC), pp. 2688–2691.
- ICPR-v2-2000-PerantonisPV #classification #component #paradigm #using
- Supervised Principal Component Analysis Using a Smooth Classifier Paradigm (SJP, SP, VV), pp. 2109–2112.
- ICPR-v2-2000-Schulerud #bias #fault #feature model #linear
- Bias of Error Rates in Linear Discriminant Analysis Caused by Feature Selection and Sample Size (HS), pp. 2372–2377.
- ICPR-v2-2000-UnsalanE #linear
- Shapes of Features and a Modified Measure for Linear Discriminant Analysis (CÜ, AE), pp. 2410–2413.
- ICPR-v2-2000-Zhao00a #performance
- Performance Perturbation Analysis of Eigen-Systems (WYZ), pp. 2105–2108.
- ICPR-v2-2000-Zhao00b #component #recognition
- Discriminant Component Analysis for Face Recognition (WYZ), pp. 2818–2821.
- ICPR-v3-2000-ChoiL #distance
- Stability Analysis of Medial Axis Transform under Relative Hausdorff Distance (SWC, SWL), pp. 3139–3142.
- ICPR-v3-2000-DoelVHVYGK #metric
- Nanometer-Scale Height Measurements in Micromachined Picoliter Vials Based on Interference Fringe Analysis (LRVdD, LJvV, KTH, MJV, ITY, FG, JGK), pp. 3057–3062.
- ICPR-v3-2000-FukuiIIW #component #using
- Sign of Gaussian Curvature from Eigen Plane Using Principal Components Analysis (SF, YI, AI, RJW), pp. 3807–3810.
- ICPR-v3-2000-Garcia-SevillaP #case study #comparative
- Analysis of Irregularly Shaped Texture Regions: A Comparative Study (PGS, MP), pp. 7080–7083.
- ICPR-v3-2000-HuangCH00a #2d #pseudo
- Local Spectra Features Extraction Based-On 2D Pseudo-Wigner Distribution for Texture Analysis (ZH, KLC, YH), pp. 3925–3928.
- ICPR-v3-2000-LiK #ambiguity #detection
- Detection of Cognitive Binding During Ambiguous Figure Tasks by Wavelet Coherence Analysis of EEG Signals (THL, WRK), pp. 3098–3101.
- ICPR-v3-2000-LuM #symmetry
- Computer Analysis of Rotational Symmetry in CBED Patterns (QY, HL, SM), pp. 3754–3757.
- ICPR-v3-2000-PagetL #markov #parametricity #random #testing
- Nonparametric Markov Random Field Model Analysis of the MeasTex Test Suite (RP, IDL), pp. 3939–3942.
- ICPR-v3-2000-Rahmann #geometry #image
- Polarization Images: A Geometric Interpretation for Shape Analysis (SR), pp. 3542–3546.
- ICPR-v3-2000-ValdesME #behaviour #case study #image
- Behavior Analysis of Fractal Features for Texture Description in Digital Images: An Experimental Study (JJV, LCM, SE), pp. 3917–3920.
- ICPR-v3-2000-VassZ #component #fault #image #performance
- Enhanced Significance-Linked Connected Component Analysis for High Performance Error Resilient Wavelet Image Coding (JV, XZ), pp. 3075–3078.
- ICPR-v3-2000-WilkinsonRDB #using
- Diatom Contour Analysis Using Morphological Curvature Scale Spaces (MHFW, JBTMR, SD, MB), pp. 3656–3659.
- ICPR-v3-2000-ZhangGST #adaptation #modelling #using
- Model-Based Nonrigid Motion Analysis Using Natural Feature Adaptive Mesh (YZ, DBG, SS, LVT), pp. 3839–3843.
- ICPR-v4-2000-KawataNOKKKMMNE
- Computerized Analysis of Pulmonary Nodules in Topological and Histogram Feature Spaces (YK, NN, HO, RK, MK, MK, NM, KM, HN, KE), pp. 4332–4335.
- ICPR-v4-2000-KopilovicVS #detection #lens
- Application of Panoramic Annular Lens for Motion Analysis Tasks: Surveillance and Smoke Detection (IK, BV, TS), pp. 4714–4717.
- ICPR-v4-2000-Leavers #using
- Analysis of Wear Particles Using the Radon Transform (VFL), pp. 4764–4766.
- ICPR-v4-2000-OkunP #automation #documentation #evaluation #generative #layout
- Automatic Ground-Truth Generation for Skew-Tolerance Evaluation of Document Layout Analysis Methods (OO, MP), pp. 4376–4379.
- ICPR-v4-2000-RyuLK #documentation #geometry #independence #layout
- Parameter-Independent Geometric Document Layout Analysis (DSR, SWL, SMK), pp. 4397–4400.
- ICPR-v4-2000-WatanabeOIK #video
- Discourse Structure Analysis for News Video by Checking Surface Information in the Transcript (YW, YO, EI, SK), pp. 4242–4245.
- ICPR-v4-2000-WatanabeS #documentation #layout
- Layout Analysis of Complex Documents (TW, TS), pp. 4447–4450.
- ICPR-v4-2000-XuGMC #performance #retrieval
- Performance Analysis in Content-Based Retrieval with Textures (KX, BG, PM, DC), pp. 4275–4278.
- ICPR-v4-2000-Zheng #flexibility
- A Flexible Laser Range Sensor Based on Spatial-temporal Analysis (JYZ), pp. 4740–4743.
- KDD-2000-TalbertF #empirical
- An empirical analysis of techniques for constructing and searching k-dimensional trees (DAT, DHF), pp. 26–33.
- SPLC-2000-KishiN #architecture #aspect-oriented #product line
- Aspect-oriented analysis for product line architecture (TK, NN), pp. 135–146.
- UML-2000-PickinM #uml
- Describing AI Analysis Patterns with UML (SP, AMR), pp. 466–481.
- OOPSLA-2000-LujanFG #algebra #design #linear #named #object-oriented
- OoLALA: an object oriented analysis and design of numerical linear algebra (ML, TLF, JRG), pp. 229–252.
- TOOLS-ASIA-2000-YeDD #design #development #object-oriented
- Application of Object-Oriented Analysis and Design in CDMA BSS Development (WY, YD, WD), pp. 73–80.
- TOOLS-ASIA-2000-YuSYM #object-oriented
- Improving Object Oriented Analysis by Explicit Change Analysis (LY, CKS, XY, YM), pp. 2–7.
- TOOLS-USA-2000-LeeOA #algorithm #object-oriented
- Algorithmic Analysis of the Impacts of Changes to Object-Oriented Software (ML, AJO, RTA), pp. 61–70.
- TOOLS-USA-2000-YacoubA #approach #composition #design pattern
- Pattern-Oriented Analysis and Design (POAD): A Structural Composition Approach to Glue Design Patterns (SMY, HHA), p. 273–?.
- AdaEurope-2000-BliebergerBS #ada #data flow #detection #source code
- Symbolic Data Flow Analysis for Detecting Deadlocks in Ada Tasking Programs (JB, BB, BS), pp. 225–237.
- AdaEurope-2000-MauriS #embedded #reliability #safety #using
- Constructing Reliable Embedded Systems Using the Results of System Safety Analysis (GM, SS), pp. 173–184.
- AdaEurope-2000-Ringler #execution #source code #worst-case
- Static Worst-Case Execution Time Analysis of Synchronous Programs (TR), pp. 56–68.
- AdaEurope-2000-Schmitt #ada #design #framework #implementation #object-oriented
- Analysis, Design and Implementation of an Object-Oriented Framework in Ada95 (DS), pp. 196–210.
- GCSE-2000-Bruin #component #composition
- Scenario-Based Analysis of Component Compositions (HdB), pp. 129–146.
- LOPSTR-2000-BuenoBHMPS #compilation #optimisation
- A model for inter-module analysis and optimizing compilation (FB, MJGdlB, MVH, KM, GP, PJS).
- LOPSTR-2000-SerebrenikS #logic programming #source code #termination
- Non-tranformational termination analysis of logic programs, based on general term-orderings (AS, DDS).
- LOPSTR-2000-VanhoofB #composition #higher-order #towards
- Towards a modular binding-time analysis for higher-order Mercury (WV, MB).
- LOPSTR-J-2000-BuenoBHMPS #compilation #optimisation
- A Model for Inter-module Analysis and Optimizing Compilation (FB, MJGdlB, MVH, KM, GP, PJS), pp. 86–102.
- LOPSTR-J-2000-SerebrenikS #logic programming #source code #termination
- Non-transformational Termination Analysis of Logic Programs, Based on General Term-Orderings (AS, DDS), pp. 69–85.
- PADL-2000-HuCT #algorithm #data mining #mining
- Calculating a New Data Mining Algorithm for Market Basket Analysis (ZH, WNC, MT), pp. 169–184.
- PEPM-2000-LeviS #linear #refinement
- Non Pair-Sharing and Freeness Analysis Through Linear Refinement (GL, FS), pp. 52–61.
- PEPM-2000-ScholzBF #detection #memory management #pointer
- Symbolic Pointer Analysis for Detecting Memory Leaks (BS, JB, TF), pp. 104–113.
- PLDI-2000-ChengH #composition #design #evaluation #implementation #interprocedural #pointer #using
- Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
- PLDI-2000-Das #pointer
- Unification-based pointer analysis with directional assignments (MD), pp. 35–46.
- PLDI-2000-FahndrichRD #constraints #scalability #using
- Scalable context-sensitive flow analysis using instantiation constraints (MF, JR, MD), pp. 253–263.
- PLDI-2000-GhemawatRS #interprocedural #low cost
- Field analysis: getting useful and low-cost interprocedural information (SG, KHR, DJS), pp. 334–344.
- PLDI-2000-LinP #compilation #memory management
- Compiler analysis of irregular memory accesses (YL, DAP), pp. 157–168.
- PLDI-2000-RouhtevC #points-to #scalability
- Off-line variable substitution for scaling points-to analysis (AR, SC), pp. 47–56.
- PLDI-2000-RuginaR #array #bound #memory management #pointer
- Symbolic bounds analysis of pointers, array indices, and accessed memory regions (RR, MCR), pp. 182–195.
- PLDI-2000-StephensonBA #compilation
- Bitwidth analysis with application to silicon compilation (MS, JB, SPA), pp. 108–120.
- POPL-2000-HeintzeJV #framework #verification
- A Framework for Combining Analysis and Verification (NH, JJ, RV), pp. 26–39.
- POPL-2000-MuthD #complexity #data flow #on the
- On the Complexity of Flow-Sensitive Dataflow Analyses (RM, SKD), pp. 67–80.
- POPL-2000-NielsonN #mobile
- Shape Analysis for Mobile Ambients (HRN, FN), pp. 142–154.
- PPDP-2000-BagnaraZH #evaluation
- Enhanced sharing analysis techniques: a comprehensive evaluation (RB, EZ, PMH), pp. 103–114.
- PPDP-2000-CalcagnoIO #alias #hoare #logic #pointer #semantics
- Semantic analysis of pointer aliasing, allocation and disposal in Hoare logic351292 (CC, SSI, PWO), pp. 190–201.
- PPDP-2000-Lu #logic programming #precise #source code
- A precise type analysis of logic programs (LL), pp. 214–225.
- SAS-2000-ClarkHH #graph grammar #safety #strict
- Safety of Strictness Analysis via Term Graph Rewriting (DC, CH, SH), pp. 95–114.
- SAS-2000-Feret #mobile
- Confidentiality Analysis of Mobile Systems (JF), pp. 135–154.
- SAS-2000-FinkKS #array
- Unified Analysis of Array and Object References in Strongly Typed Languages (SJF, KK, VS), pp. 155–174.
- SAS-2000-FosterFA #c #points-to #polymorphism
- Polymorphic versus Monomorphic Flow-Insensitive Points-to Analysis for C (JSF, MF, AA), pp. 175–198.
- SAS-2000-Lev-AmiS #implementation #named
- TVLA: A System for Implementing Static Analyses (TLA, SS), pp. 280–301.
- SAS-2000-Saidi #abstraction #model checking
- Model Checking Guided Abstraction and Analysis (HS), pp. 377–396.
- SAS-2000-Scozzari #abstract domain #semantics
- Abstract Domains for Sharing Analysis by Optimal Semantics (FS), pp. 397–412.
- SAS-2000-UngureanuJ #concurrent #java
- Concurrency Analysis for Java (CU, SJ), pp. 413–432.
- ICRE-2000-AlcazarM #framework #process #requirements #specification
- A Process Framework for Requirements Analysis and Specification (EGA, AM), p. 27–?.
- ICRE-2000-DayJ #framework #multi #requirements #specification
- A Framework for Multi-Notation Requirements Specification and Analysis (NAD, JJJ), pp. 39–48.
- ICRE-2000-KnottMP #behaviour #modelling #object-oriented #process #using
- Process Modeling for Object Oriented Analysis Using BORM Object Behavioral Analysis (RPK, VM, JP), pp. 7–16.
- ASE-2000-HillL
- Non-Interference Analysis for Mixed Criticality Code in Avionics Systems (MGH, TWL), pp. 257–260.
- ASE-2000-MorisioTS #uml
- Extending UML to Support Domain Analysis (MM, GT, MES), pp. 321–324.
- ASE-2000-SouzaFGW #design #object-oriented
- A Group Critic System for Object-Oriented Analysis and Design (CRBdS, JSFJ, KMG, JW), pp. 313–316.
- FoSE-2000-JacksonR #roadmap
- Software analysis: a roadmap (DJ, MCR), pp. 133–145.
- ICSE-2000-AndrewsZ
- Broad-spectrum studies of log file analysis (JHA, YZ), pp. 105–114.
- ICSE-2000-GannodL #approach #architecture #product line
- An approach to architectural analysis of product lines (GCG, RRL), pp. 548–557.
- ICSE-2000-LeszakPS #case study #fault
- A case study in root cause defect analysis (ML, DEP, DS), pp. 428–437.
- ICSE-2000-LiangH #performance
- Light-weight context recovery for efficient and accurate program analyses (DL, MJH), pp. 366–375.
- SAC-2000-AlhamedL #approach #clustering #multi #using
- A Clustering Approach to Multi-Model Ensemble Analysis Using SAMEX Data (AA, SL), pp. 111–116.
- SAC-2000-BaldwinMP #feature model #semantics
- Semantic Discrimination Analysis for Feature Selection (JFB, TPM, CP), pp. 519–523.
- SAC-2000-BodlaenderRS #design #named
- TRAnD: Temporal Requirement Analysis and Design Tool (MPB, AHLR, PDVvdS), pp. 882–886.
- SAC-2000-BoujarwahSA #data flow #java #source code #testing #using
- Testing Java Programs Using Dynamic Data Flow Analysis (ASB, KS, JAD), pp. 725–727.
- SAC-2000-LenartSG #constant
- SSA-based Flow-sensitive Type Analysis: Combining Constant and Type Propagation (AL, CS, SKSG), pp. 813–817.
- ASPLOS-2000-RedstoneEL #architecture #behaviour #operating system #parallel #thread
- An Analysis of Operating System Behavior on a Simultaneous Multithreaded Architecture (JR, SJE, HML), pp. 245–256.
- CC-2000-GayS #performance #source code #stack
- Fast Escape Analysis and Stack Allocation for Object-Based Programs (DG, BS), pp. 82–93.
- CC-2000-LinP #array #compilation #optimisation
- Analysis of Irregular Single-Indexed Array Accesses and Its Applications in Compiler Optimizations (YL, DAP), pp. 202–218.
- CC-2000-WilhelmSR
- Shape Analysis (RW, SS, TWR), pp. 1–17.
- DAC-2000-ArunachalamRP #named
- TACO: timing analysis with coupling (RA, KR, LTP), pp. 266–269.
- DAC-2000-CarloniS #latency #optimisation #performance
- Performance analysis and optimization of latency insensitive systems (LPC, ALSV), pp. 361–367.
- DAC-2000-ChaudhryBPE
- Current signature compression for IR-drop analysis (RC, DB, RP, TE), pp. 162–167.
- DAC-2000-DickLRJ #embedded #operating system
- Power analysis of embedded operating systems (RPD, GL, AR, NKJ), pp. 312–315.
- DAC-2000-FinF #simulation
- A Web-CAD methodology for IP-core analysis and simulation (AF, FF), pp. 597–600.
- DAC-2000-GalaZPYWB #modelling
- On-chip inductance modeling and analysis (KG, VZ, RP, BY, JW, DB), pp. 63–68.
- DAC-2000-Hassoun #bound #using
- Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
- DAC-2000-JainMMWL #canonical #complexity #composition #graph #how
- Analysis of composition complexity and how to obtain smaller canonical graphs (JJ, KM, DM, IW, YL), pp. 681–686.
- DAC-2000-KahngMS #on the
- On switch factor based analysis of coupled RC interconnects (ABK, SM, ES), pp. 79–84.
- DAC-2000-LevyBBDGOOSZ #design #named
- ClariNet: a noise analysis tool for deep submicron design (RL, DB, GB, AD, AG, CO, BO, SS, VZ), pp. 233–238.
- DAC-2000-LevySMW #performance
- A rank-one update method for efficient processing of interconnect parasitics in timing analysis (HL, WS, DM, JW), pp. 75–78.
- DAC-2000-PiS #approach #diagrams #multi
- Multi-terminal determinant decision diagrams: a new approach to semi-symbolic analysis of analog integrated circuits (TP, CJRS), pp. 19–22.
- DAC-2000-ShepardK
- Static noise analysis for digital integrated circuits in partially-depleted silicon-on-insulator technology (KLS, DJK), pp. 239–242.
- DAC-2000-ShinKC #embedded #multi #performance #realtime
- Schedulability-driven performance analysis of multiple mode embedded real-time systems (YS, DK, KC), pp. 495–500.
- DAC-2000-SomasekharCRYD
- Dynamic noise analysis in precharge-evaluate circuits (DS, SHC, KR, YY, VD), p. 243.
- DAC-2000-SouriBMS #design #motivation #multi #performance
- Multiple Si layer ICs: motivation, performance analysis, and design implications (SJS, KB, AM, KS), pp. 213–220.
- DAC-2000-WangN #linear #multi #order
- Extended Krylov subspace method for reduced order analysis of linear circuits with multiple sources (JMW, TVN), pp. 247–252.
- DAC-2000-ZhaoPSECB #network
- Hierarchical analysis of power distribution networks (MZ, RP, SSS, TE, RC, DB), pp. 150–155.
- DATE-2000-Balarin #abstraction #automation #worst-case
- Automatic Abstraction for Worst-Case Analysis of Discrete Systems (FB), pp. 494–501.
- DATE-2000-CarlettaPN #detection #fault #using
- Detecting Undetectable Controller Faults Using Power Analysis (JC, CAP, MN), pp. 723–728.
- DATE-2000-GuerraRFR #approach #scalability
- A Hierarchical Approach for the Symbolic Analysis of Large Analog Integrated Circuits (OG, ER, FVF, ÁRV), pp. 48–52.
- DATE-2000-GuptaGMC #program transformation #programmable
- Analysis of High-Level Address Code Transformations for Programmable Processors (SG, RKG, MM, FC), pp. 9–13.
- DATE-2000-HergenhanR #architecture #embedded
- Static Timing Analysis of Embedded Software on Advanced Processor Architectures (AH, WR), pp. 552–559.
- DATE-2000-PopEP #distributed #embedded #optimisation #scheduling
- Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis (PP, PE, ZP), pp. 567–574.
- DATE-2000-RingeLB
- Static Timing Analysis Taking Crosstalk into Account (MR, TL, EB), pp. 451–455.
- DATE-2000-SugiharaYD #approach
- Analysis and Minimization of Test Time in a Combined BIST and External Test Approach (MS, HY, HD), pp. 134–140.
- HPCA-2000-BoschSSRH #case study #parallel #performance #using #visualisation
- Performance Analysis and Visualization of Parallel Systems Using SimOS and Rivet: A Case Study (RB, CS, GS, MR, PH), pp. 360–371.
- HPCA-2000-HaungsSF #branch #classification #metric
- Branch Transition Rate: A New Metric for Improved Branch Classification Analysis (MH, PS, MKF), pp. 241–250.
- LCTES-2000-Kastner #named #optimisation
- PROPAN: A Retargetable System for Postpass Optimisations and Analyses (DK), pp. 63–80.
- PDP-2000-TambourisS #component #parallel #scalability
- Scalability analysis of parallel systems with multiple components of work (ET, PVS), pp. 182–189.
- ESOP-2000-HoweK #implementation
- Implementing Groundness Analysis with Definite Boolean Functions (JMH, AK), pp. 200–214.
- ESOP-2000-NielsonNS #mobile
- A Kleene Analysis of Mobile Ambients (FN, HRN, SS), pp. 305–319.
- ESOP-2000-SeidlS #constraints #interprocedural #parallel #source code
- Constraint-Based Inter-Procedural Analysis of Parallel Programs (HS, BS), pp. 351–365.
- ESOP-2000-SmithW
- Polyvariant Flow Analysis with Constrained Types (SFS, TW), pp. 382–396.
- TACAS-2000-AbdullaBE #reachability
- Symbolic Reachability Analysis Based on SAT-Solvers (PAA, PB, NE), pp. 411–425.
- TACAS-2000-Schmidt #low level #reachability #symmetry
- Integrating Low Level Symmetries into Reachability Analysis (KS0), pp. 315–330.
- WRLA-2000-BasinD #comparison #haskell #maude #protocol #security
- Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
- WRLA-2000-Millen #encryption #overview #protocol #term rewriting
- Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk (JKM), pp. 229–234.
- WRLA-2000-Rodriguez #case study #maude #protocol #specification
- Case Studies in the Specification and Analysis of Protocols in Maude (DER), pp. 257–273.
- CAV-2000-AlurGM #performance #reachability
- Efficient Reachability Analysis of Hierarchical Reactive Machines (RA, RG, MM), pp. 280–295.
- CAV-2000-BaierHHK #markov #model checking
- Model Checking Continuous-Time Markov Chains by Transient Analysis (CB, BRH, HH, JPK), pp. 358–372.
- CAV-2000-DangIBKS #automaton #reachability
- Binary Reachability Analysis of Discrete Pushdown Timed Automata (ZD, OHI, TB, RAK, JS), pp. 69–84.
- CAV-2000-FraerKZVF #performance #reachability #traversal #verification
- Prioritized Traversal: Efficient Reachability Analysis for Verification and Falsification (RF, GK, BZ, MYV, LF), pp. 389–402.
- CAV-2000-HeymanGGS #parallel #reachability #scalability
- Achieving Scalability in Parallel Reachability Analysis of Very Large Circuits (TH, DG, OG, AS), pp. 20–35.
- CAV-2000-Meadows #encryption #formal method #protocol
- Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis (CM), p. 2.
- CL-2000-BraileyPN #approach #database #termination
- A Dynamic Approach to Termination Analysis for Active Database Rules (JB, AP, PN), pp. 1106–1120.
- CL-2000-DebrayH #constraints #database #termination
- Constraint-Based Termination Analysis for Cyclic Active Database Rules (SKD, TJH), pp. 1121–1136.
- CL-2000-Gervas #logic programming
- A Logic Programming Application for the Analysis of Spanish Verse (PG), pp. 1330–1344.
- CL-2000-MancarellaNRT #declarative #named
- MuTACLP: A Language for Declarative GIS Analysis (PM, GN, AR, FT), pp. 1002–1016.
- CL-2000-MazurJB #memory management #reuse
- A Module Based Analysis for Memory Reuse in Mercury (NM, GJ, MB), pp. 1255–1269.
- CSL-2000-Schuster
- Elementary Choiceless Constructive Analysis (PS), pp. 512–526.
- ISSTA-2000-BhargavanGKLOSV #formal method #named #network #simulation
- Verisim: Formal analysis of network simulations (KB, CAG, MK, IL, DO, OS, MV), pp. 2–13.
- ISSTA-2000-HindP #pointer #question
- Which pointer analysis should I use? (MH, AP), pp. 113–123.
- ISSTA-2000-KolanoK #classification #realtime
- Classification schemes to aid in the analysis of real-time systems (PZK, RAK), pp. 86–95.
- ISSTA-2000-Pincus #case study #developer #experience #tool support
- Analysis is necessary, but far from sufficient: Experiences building and deploying successful tools for developers and testers (JDP), p. 1.
- ISSTA-2000-SchroederK #black box #reduction #using
- Black-box test reduction using input-output analysis (PJS, BK), pp. 173–177.
- LICS-2000-AehligS #polynomial
- A Syntactical Analysis of Non-Size-Increasing Polynomial Time Computation (KA, HS), pp. 84–91.
- WICSA-1999-JaktmanLL #architecture #assessment #case study #maintenance
- Structural Analysis of the Software Architecture — A Maintenance Assessment Case Study (CBJ, JL, ML), pp. 455–470.
- WICSA-1999-MageeKG #architecture #behaviour
- Behaviour Analysis of Software Architectures (JM, JK, DG), pp. 35–50.
- ADL-1999-KleinA #comprehension #distributed #documentation #knowledge-based #parsing
- Distributed Knowledge-Based Parsing for Document Analysis and Understanding (BK, AA), pp. 6–15.
- DL-1999-HaraTW #integration #web
- Workshop on Organizing Web Space: An Integration of Content Search with Structure Analysis (YH, KT, RW), p. 264.
- ECDL-1999-TakasuYKA #music
- Music Structure Analysis and Its Application to Theme Phrase Extraction (AT, TY, TK, JA), pp. 92–105.
- HT-1999-ChenC #hypermedia
- Trailblazing the Literature of Hypertext: Author Co-Citation Analysis (1989-1998) (CC, LC), pp. 51–60.
- HT-1999-Lange #hypermedia #tool support
- Hypermedia Potentials for Analysis Support Tools (DSL), pp. 165–166.
- HT-1999-Rety #hypermedia
- Structure Analysis for Hypertext with Conditional Linkage (JHR), pp. 135–136.
- ICDAR-1999-AltamuraEM #adaptation #documentation #interactive
- WISDOM++: An Interactive and Adaptive Document Analysis System (OA, FE, DM), pp. 366–369.
- ICDAR-1999-AntonacopoulosB #algorithm #flexibility #performance #segmentation
- Methodology for Flexible and Efficient Analysis of the Performance of Page Segmentation Algorithms (AA, AB), pp. 451–454.
- ICDAR-1999-AntonacopoulosC #comparative #representation #using
- Region Description and Comparative Analysis using a Tesseral Representation (AA, FC), pp. 193–196.
- ICDAR-1999-ChangLTH #documentation #image #multi #using
- Binarization of Document Images using Hadamard Multiresolution Analysis (FC, KHL, TMT, WLH), pp. 157–160.
- ICDAR-1999-ChaSS #algorithm #approximate #recognition #sequence #string
- Approximate Stroke Sequence String Matching Algorithm for Character Recognition and Analysis (SHC, YCS, SNS), pp. 53–56.
- ICDAR-1999-CracknellD #agile #comprehension #documentation #prototype #research
- A Handwriting Understanding Environment (HUE) for Rapid Prototyping in Handwriting and Document Analysis Research (CC, ACD), pp. 362–365.
- ICDAR-1999-Faure #documentation #image
- Preattentive Reading and Selective Attention for Document Image Analysis (CF), pp. 577–580.
- ICDAR-1999-FukudaSTXS
- A Technique of Mathematical Expression Structure Analysis for the Handwriting Input System (RF, IS, FT, MX, MS), pp. 131–134.
- ICDAR-1999-HitzRI #documentation #image
- Analysis of Synthetic Document Images (OH, LR, RI), pp. 374–377.
- ICDAR-1999-Ishitani #documentation #image #logic
- Logical Structure Analysis of Document Images based on Emergent Computation (YI), pp. 189–192.
- ICDAR-1999-JunkerDH #component #documentation #evaluation #on the #precise
- On the Evaluation of Document Analysis Components by Recall, Precision, and Accuracy (MJ, AD, RH), pp. 713–716.
- ICDAR-1999-LebourgeoisE #documentation #using
- Document Analysis in Gray Level and Typography Extraction using Character Pattern Redundancies (FL, HE), pp. 177–180.
- ICDAR-1999-SrihariYG #automation
- Information Theoretic Analysis of Postal Address Fields for Automatic Address Interpretation (SNS, WjY, VG), pp. 309–312.
- ICDAR-1999-SteinherzIR #component #detection
- Skew Detection via Principal Components Analysis (TS, NI, ER), pp. 153–156.
- ICDAR-1999-Thoma #automation #database #documentation #image #online
- Automating Data Entry for an On-line Biomedical Database: A Document Image Analysis Application (GRT), pp. 370–373.
- ICDAR-1999-XingyuanGDO #robust
- A Robust Method for Unknown Forms Analysis (XL, WG, DSD, WGO), pp. 531–534.
- ICDAR-1999-ZhuTW #recognition
- Font Recognition based on Global Texture Analysis (YZ, TT, YW), pp. 349–352.
- PODS-1999-KleinbergT #algebra #hypermedia #information retrieval #linear
- Applications of Linear Algebra in Information Retrieval and Hypertext Analysis (JMK, AT), pp. 185–193.
- CSEET-1999-Hislop #online
- An Online Systems Analysis Course (GWH), pp. 138–144.
- CSEET-1999-MengelU #case study #source code #student
- A Case Study of the Analysis of Novice Student Programs (SAM, JVU), pp. 40–49.
- CSMR-1999-JahnkeW #information management #integration #process #re-engineering
- Integration of Analysis and Redesign Activities in Information System Reengineering (JHJ, JPW), pp. 160–168.
- CSMR-1999-Tonella #points-to #set
- Effects of Different Flow Insensitive Points-to Analyses on DEF/USE Sets (PT), pp. 62–71.
- ICSM-1999-Agrawal #data flow #graph
- Simultaneous Demand-Driven Data-Flow and Call Graph Analysis (GA), pp. 453–462.
- PASTE-1999-ChoiGHS #exception #java #modelling #performance #precise #source code
- Efficient and Precise Modeling of Exceptions for the Analysis of Java Programs (JDC, DG, MH, VS), pp. 21–31.
- PASTE-1999-LiangH #data flow #equivalence #performance #pointer
- Equivalence Analysis: A General Technique to Improve the Efficiency of Data-flow Analyses in the Presence of Pointers (DL, MJH), pp. 39–46.
- PASTE-1999-NaumovichCC #data flow #partial order #performance #using #verification
- Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification (GN, LAC, JMC), pp. 57–65.
- PASTE-1999-SouterPH
- Inter-Class Def-Use Analysis with Partial Class Representations (ALS, LLP, DH), pp. 47–56.
- PASTE-1999-WhitingH #monitoring #safety
- Safety Analysis of Hawk in Flight Monitor (LW, MH), pp. 32–38.
- WCRE-1999-BalazinskaMDLK #java
- Partial Redesign of Java Software Systems Based on Clone Analysis (MB, EM, MD, BL, KK), pp. 326–336.
- WIA-1999-BergeronC
- Analysis of Reactive Systems with n Timers (AB, RC), pp. 27–38.
- WIA-1999-CaludeSY #metric
- Metric Lexical Analysis (CC, KS, SY), pp. 48–59.
- FM-v1-1999-AlurEKKL #case study #coordination #formal method #hybrid #modelling #multi
- Formal Modeling and Analysis of Hybrid Systems: A Case Study in Multi-robot Coordination (RA, JME, MK, VK, IL), pp. 212–232.
- FM-v1-1999-KestenKPR #deduction #model checking #verification
- A Perfect Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software (YK, AK, AP, GR), pp. 173–194.
- FM-v1-1999-LincolnMMS #equivalence #polynomial #probability #security
- Probabilistic Polynomial-Time Equivalence and Security Analysis (PL, JCM, MM, AS), pp. 776–793.
- FM-v1-1999-ZhouC #communication #formal method #protocol
- Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol (DZ, SKC), pp. 758–775.
- FM-v2-1999-SereT #safety #specification
- Safety Analysis in Formal Specification (KS, ET), pp. 1564–1583.
- FLOPS-1999-VerbaetenS #logic programming #source code #termination #using
- Termination Analysis of Tabled Logic Programs Using Mode and Type Information (SV, DDS), pp. 163–178.
- ICFP-1999-CraryW #flexibility
- Flexible Type Analysis (KC, SW), pp. 233–248.
- AGTIVE-1999-BaresiP #graph grammar #programmable
- A Formal Definition of Stuctured Analysis with Programmable Graph Grammars (LB, MP), pp. 193–208.
- CHI-1999-BruckmanE #fault #programming language
- Should we Leverage Natural-Language Knowledge? An Analysis of User Errors in a Natural-Language-Style Programming Language (AB, EE), pp. 207–214.
- CHI-1999-QuintanaECWS #case study #design #named #process
- Symphony: A Case Study in Extending Learner-Centered Design through Process Space Analysis (CQ, JE, AC, HKW, ES), pp. 473–480.
- CHI-1999-Soto #learning #quality #semantics
- Learning and Performing by Exploration: Label Quality Measured by Latent Semantic Analysis (RS), pp. 418–425.
- HCI-CCAD-1999-Callantine #performance #visualisation
- Visualization and analysis of flight crew procedure performance (TJC), pp. 1281–1285.
- HCI-CCAD-1999-MajoeH #gesture #recognition
- Human gesture analysis and recognition for medical and dance applications (DM, NH), pp. 818–822.
- HCI-CCAD-1999-McNeese #learning #metric #performance #process #protocol #using
- Making sense of teamwork: the use of protocol analysis / performance measures to reveal cooperative work processes in a situated learning environment (MDM), pp. 502–506.
- HCI-CCAD-1999-WatanabeO #communication #interactive #synthesis
- Virtual face-to-face communication system for human interaction analysis by synthesis (TW, MO), pp. 182–186.
- HCI-EI-1999-KuzniarzP #design #object-oriented #towards
- Towards Complex Object Oriented Analysis and Design (LK, MP), pp. 1257–1261.
- HCI-EI-1999-NoldusKHD #tool support
- Software Tools for Collection and Analysis of Observational Data (LN, AK, WtH, RD), pp. 1114–1118.
- HCI-EI-1999-TokudaMTL #development #requirements #user interface
- A New Integrated Support Environment for Requirements Analysis of User Interface Development (YT, TM, YT, ESL), pp. 895–899.
- HCI-EI-1999-Urokohara #design #usability #user interface #using
- Method to Build Good Usability: Task Analysis and User Interface Design Using Operation Flowcharts (HU), pp. 928–932.
- CAiSE-1999-GreenR #modelling #ontology #process
- An Ontological Analysis of Integrated Process Modelling (PFG, MR), pp. 225–240.
- ICEIS-1999-AbeT #development #process #scheduling
- IDEFO-Based Software Process Analysis for Scheduling Systems Development (AA, TT), pp. 361–370.
- ICEIS-1999-BarjisD #modelling #network #process #using
- Business Process Modelling and Analysis Using GERT Networks (JB, JLGD), pp. 748–758.
- ICEIS-1999-Cheng #realtime #verification
- Analysis and Verification of Real-Time Systems (AMKC), p. X.
- ICEIS-1999-Gustas #approach #enterprise #information management
- Integrated Approach for Information System Analysis at the Enterprise Level (RG), pp. 435–442.
- ICEIS-1999-KiniSJ #visualisation
- A System for Analysis & Visualization of Domain Specific Data (SNK, S, KPJ), pp. 82–90.
- ICEIS-1999-LiHCHN #automation #comprehension #documentation
- Automatic Document Analysis and Understanding System (XL, JH, ZC, DCDH, PAN), pp. 91–100.
- ICEIS-1999-RodriguesRH
- An Intelligent Retail Analysis System (MdFR, CR, PRH), pp. 140–147.
- ICEIS-1999-Stamper #design #paradigm
- Information-Field Paradigm and New Directions for Systems Analysis and Design (RKS), p. VI.
- ICML-1999-LangleyS #classification #naive bayes
- Tractable Average-Case Analysis of Naive Bayesian Classifiers (PL, SS), pp. 220–228.
- ICML-1999-SchefferJ #fault
- Expected Error Analysis for Model Selection (TS, TJ), pp. 361–370.
- MLDM-1999-PengB #image #independence #retrieval
- Independent Feature Analysis for Image Retrieval (JP, BB), pp. 103–115.
- UML-1999-FirleyHDGG #case study #diagrams #sequence chart
- Timed Sequence Diagrams and Tool-Based Analysis — A Case Study (TF, MH, KD, TG, UG), pp. 645–660.
- UML-1999-LiL #diagrams #sequence chart #uml
- Timing Analysis of UML Sequence Diagrams (XL, JL), pp. 661–674.
- UML-1999-SendallS #case study #uml
- UML Based Fusion Analysis Applied to a Bank Case Study (SS, AS), pp. 278–291.
- OOPSLA-1999-Blanchet #java #object-oriented
- Escape Analysis for Object-Oriented Languages: Application to Java (BB), pp. 20–34.
- OOPSLA-1999-ChoiGSSM #java
- Escape Analysis for Java (JDC, MG, MJS, VCS, SPM), pp. 1–19.
- OOPSLA-1999-France #concept #modelling #problem #requirements #uml
- A Problem-Oriented Analysis of Basic UML Static Requirements Modeling Concepts (RBF), pp. 57–69.
- OOPSLA-1999-Madsen #semantics
- Semantic Analysis of Virtual Classes and Tested Classes (OLM), pp. 114–131.
- OOPSLA-1999-WhaleyR #composition #java #pointer #source code
- Compositional Pointer and Escape Analysis for Java Programs (JW, MCR), pp. 187–206.
- TOOLS-ASIA-1999-Zhou #assessment #object-oriented #using
- Risk Analysis and Assessment Using Object-Oriented Techniques (BZ), pp. 142–145.
- TOOLS-EUROPE-1999-Collins-Cope #approach #case study #interface #requirements
- The Requirements/Service/Interface (RSI) Approach to Use Case Analysis (MCC), pp. 172–183.
- TOOLS-EUROPE-1999-MayerH #metric #object-oriented
- Measuring OO Systems: A Critical Analysis of the MOOD Metrics (TM, TH), pp. 108–117.
- TOOLS-EUROPE-1999-Mitchell99a #contract #exclamation #uml
- Analysis by Contract: UML with Attitude! (RM), p. 407.
- TOOLS-USA-1999-AlexanderO #polymorphism #testing
- Analysis Techniques for Testing Polymorphic Relationships (RTA, AJO), p. 104–?.
- TOOLS-USA-1999-Arsanjani #design #distributed #framework #implementation #java #using
- Analysis, Design and Implementation of Distributed Java Business Frameworks Using Domain Patterns (AA), pp. 490–500.
- TOOLS-USA-1999-Mitchell #contract #uml
- Analysis by Contract or UML with Attitude (RM), p. 465–?.
- TOOLS-USA-1999-Parnas #component #documentation #testing #tool support
- Tools for Component Documentation, Analysis and Testing (DLP), p. 2.
- TOOLS-USA-1999-PloschP #c++ #contract #implementation #named
- Contracts: From Analysis to C++ Implementation (RP, JP), pp. 248–257.
- GCSE-1999-BayerMW
- Customizable Domain Analysis (JB, DM, TW), pp. 178–194.
- LOPSTR-1999-SmausHK #logic programming #source code
- Mode Analysis Domains for Typed Logic Programs (JGS, PMH, AK), pp. 82–101.
- PLDI-1999-BodikGS #design #evaluation
- Load-Reuse Analysis: Design and Evaluation (RB, RG, MLS), pp. 64–76.
- PLDI-1999-RuginaR #parallel #pointer #source code #thread
- Pointer Analysis for Multithreaded Programs (RR, MCR), pp. 77–90.
- PLDI-1999-YongHR #pointer #source code
- Pointer Analysis for Programs with Structures and Casting (SHY, SH, TWR), pp. 91–103.
- POPL-1999-PessauxL #exception #type system
- Type-Based Analysis of Uncaught Exceptions (FP, XL), pp. 276–290.
- POPL-1999-SagivRW #logic #parametricity
- Parametric Shape Analysis via 3-Valued Logic (SS, TWR, RW), pp. 105–118.
- SAS-1999-AldrichCSE #java #source code
- Static Analyses for Eliminating Unnecessary Synchronization from Java Programs (JA, CC, EGS, SJE), pp. 19–38.
- SAS-1999-Asai
- Binding-Time Analysis for Both Static and Dynamic Expressions (KA), pp. 117–133.
- SAS-1999-BessonJT
- Polyhedral Analysis for Synchronous Languages (FB, TPJ, JPT), pp. 51–68.
- SAS-1999-BozgaFG #reduction
- State Space Reduction Based on Live Variables Analysis (MB, JCF, LG), pp. 164–178.
- SAS-1999-HillS #linear #refinement
- Freeness Analysis Through Linear Refinement (PMH, FS), pp. 85–100.
- SAS-1999-JeannetHR #clustering
- Dynamic Partitioning in Analyses of Numerical Properties (BJ, NH, PR), pp. 39–50.
- SAS-1999-McAllester #complexity #on the
- On the Complexity Analysis of Static Analyses (DAM), pp. 312–329.
- SAS-1999-Soffa #data flow #named #precise #scalability #tutorial
- Tutorial: Techniques to Improve the Scalability and Precision of Data Flow Analysis (MLS), pp. 355–356.
- SIGAda-1999-Colket #realtime #using
- Code analysis of saftey-critical and real-time software using ASIS (WCC), pp. 67–76.
- RE-1999-VillerS #process #requirements #social
- Social Analysis in the Requirements Engineering Process: From Ethnography to Method (SV, IS), pp. 6–13.
- ASE-1999-Brackin #automation #effectiveness #encryption #implementation #protocol
- Implementing Effective Automatic Cryptographic Protocol Analysis (SHB), pp. 319–322.
- ASE-1999-MaleticV #automation #clustering #semantics
- Automatic Software Clustering via Latent Semantic Analysis (JIM, NV), pp. 251–254.
- ASE-1999-Saidi #composition #concurrent #incremental
- Modular and Incremental Analysis of Concurrent Software Systems (HS), pp. 92–101.
- ESEC-FSE-1999-RountevRL #data flow
- Data-Flow Analysis of Program Fragments (AR, BGR, WL), pp. 235–252.
- ICSE-1999-ArdisC #product line
- Defining Families — Commonality Analysis (MAA, DAC), pp. 671–672.
- ICSE-1999-KazmanBKCW #architecture #experience #trade-off
- Experience with Performing Architecture Tradeoff Analysis (RK, MB, MK, SJC, SGW), pp. 54–63.
- ICSE-1999-KeyesDC #framework
- Analysis of a Scheduler for a CAD Framework (DSK, LKD, MJC), pp. 152–161.
- ICSE-1999-Magee #architecture #behaviour #using
- Behavioral Analysis of Software Architectures Using LTSA (JM), pp. 634–637.
- ICSE-1999-Mascolo #mobile #prototype #specification
- Specification, Analysis, and Prototyping of Mobile Systems (CM), pp. 724–725.
- ICSE-1999-NaumovichAC #concurrent #data flow #java #source code
- Data Flow Analysis for Checking Properties of Concurrent Java Programs (GN, GSA, LAC), pp. 399–410.
- ICSE-1999-YurRL #alias #incremental #pointer
- An Incremental Flow- and Context-Sensitive Pointer Aliasing Analysis (JSY, BGR, WL), pp. 442–451.
- CC-1999-Martin #comparison #functional #interprocedural #string
- Experimental Comparison of call string and functional Approaches to Interprocedural Analysis (FM), pp. 63–75.
- DAC-1999-BeattieP #modelling
- IC Analyses Including Extracted Inductance Models (MWB, LTP), pp. 915–920.
- DAC-1999-DaemsGS #complexity #reduction
- Circuit Complexity Reduction for Symbolic Analysis of Analog Integrated Circuits (WD, GGEG, WMCS), pp. 958–963.
- DAC-1999-JiangC #performance #power management
- Analysis of Performance Impact Caused by Power Supply Noise in Deep Submicron Devices (YMJ, KTC), pp. 760–765.
- DAC-1999-KamonMMSW #3d #modelling
- Interconnect Analysis: From 3-D Structures to Circuit Models (MK, NAM, YM, LMS, JW), pp. 910–914.
- DAC-1999-LiuPS
- Model Order-Reduction of RC(L) Interconnect Including Variational Analysis (YL, LTP, AJS), pp. 201–206.
- DAC-1999-YalcinMPBS #functional
- Functional Timing Analysis for IP Characterization (HY, MM, RP, CB, KAS), pp. 731–736.
- DATE-1999-Holzheuer #how #process
- How to use Knowledge in an Analysis Process (HH), pp. 498–502.
- DATE-1999-HongB #finite #reachability #scalability #state machine #using
- Symbolic Reachability Analysis of Large Finite State Machines Using Don’t Cares (YH, PAB), p. 13–?.
- DATE-1999-JantschKH #case study #concept #modelling #synthesis
- The Rugby Model: A Conceptual Frame for the Study of Modelling, Analysis and Synthesis Concepts of Electronic Systems (AJ, SK, AH), pp. 256–262.
- DATE-1999-NovakHK #on the
- On Analog Signature Analysis (FN, BH, SK), p. 249–?.
- DATE-1999-RadetzkiSPN #data type #hardware #modelling #object-oriented #synthesis
- Data Type Analysis for Hardware Synthesis from Object-Oriented Models (MR, AS, WPR, WN), p. 491–?.
- HPDC-1999-LeighJDBG #collaboration #set
- A Methodology for Supporting Collaborative Exploratory Analysis of Massive Data Sets in Tele-Immersive Environments (JL, AEJ, TAD, SB, RLG), pp. 62–69.
- LCTES-1999-Persson #embedded #garbage collection #memory management
- Live Memory Analysis for Garbage Collection in Embedded Systems (PP), pp. 45–54.
- PDP-1999-FraboulM #architecture #composition #modelling #performance #realtime
- Modeling advanced modular avionics architectures for early real-time performance analysis (CF, FM), pp. 181–188.
- PDP-1999-GerndtMPW #performance
- Performance analysis on CRAY T3E (MG, BM, MP, FW), pp. 241–248.
- PDP-1999-SahuquilloP #multi
- The split data cache in multiprocessor systems: an initial hit ratio analysis (JS, AP), pp. 27–34.
- PPoPP-1999-MoonH #array #automation #data flow #evaluation #parallel
- Evaluation of Predicated Array Data-Flow Analysis for Automatic Parallelization (SM, MWH), pp. 84–95.
- PPoPP-1999-Sundaram-StukelV #predict #using
- Predictive Analysis of a Wavefront Application using LogGP (DSS, MKV), pp. 141–150.
- ESOP-1999-KingSH #dependence
- Quotienting Share for Dependency Analysis (AK, JGS, PMH), pp. 59–73.
- ESOP-1999-NielsonN #control flow #interprocedural
- Interprocedural Control Flow Analysis (FN, HRN), pp. 20–39.
- ESOP-1999-PodelskiCM #concurrent #constraints #logic programming #source code
- Set-Based Failure Analysis for Logic Programs and Concurrent Constraint Programs (AP, WC, MM), pp. 177–192.
- FoSSaCS-1999-EsparzaK #approach #data flow #interprocedural
- An Automata-Theoretic Approach to Interprocedural Data-Flow Analysis (JE, JK), pp. 14–30.
- TACAS-1999-BakhmurovKS #design #embedded #named
- DYANA: An Environment for Embedded System Design and Analysis (AGB, APK, RLS), pp. 390–404.
- TACAS-1999-BergeronM #automation #email #interactive
- An Automated Analysis of Ping-Pong Interactions in E-mail Services (AB, JCM), pp. 134–147.
- TACAS-1999-BuchholzK #composition #distributed #tool support
- Modular State Level Analysis of Distributed Systems Techniques and Tool Support (PB, PK), pp. 420–434.
- TACAS-1999-MarchignoliM #automation #composition #encryption #protocol #verification
- Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques (DM, FM), pp. 148–162.
- TACAS-1999-SpeltE #database #object-oriented #theorem proving
- A Theorem Prover-Based Analysis Tool for Object-Oriented Databases (DS, SE), pp. 375–389.
- CADE-1999-Prost #formal method #system f
- A formalization of Static Analyses in System F (FP), pp. 252–266.
- CADE-1999-Weidenbach #automation #first-order #logic #protocol #security #towards
- Towards an Automatic Analysis of Security Protocols in First-Order Logic (CW), pp. 314–328.
- CAV-1999-AbdullaABBHL #abstraction #infinity #reachability #verification
- Verification of Infinite-State Systems by Combining Abstraction and Reachability Analysis (PAA, AA, SB, AB, PH, YL), pp. 146–159.
- CAV-1999-BehrmannLPWY #diagrams #difference #performance #reachability #using
- Efficient Timed Reachability Analysis Using Clock Difference Diagrams (GB, KGL, JP, CW, WY), pp. 341–353.
- CAV-1999-BuchholzK
- A Toolbox for the Analysis of Discrete Event Dynamic Systems (PB, PK), pp. 483–486.
- CAV-1999-HermannsMS #composition #markov #modelling #named #performance #specification
- TIPPtool: Compositional Specification and Analysis of Markovian Performance Models (HH, VM, MS), pp. 487–490.
- CAV-1999-NamjoshiK #performance
- Efficient Analysis of Cyclic Definitions (KSN, RPK), pp. 394–405.
- CAV-1999-Schumann #authentication #automation #named #protocol
- PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols (JS), pp. 500–504.
- CSL-1999-DelzannoEP #constraints #protocol
- Constraint-Based Analysis of Broadcast Protocols (GD, JE, AP), pp. 50–66.
- CSL-1999-Franzle #hybrid #infinity
- Analysis of Hybrid Systems: An Ounce of Realism Can Save an Infinity of States (MF), pp. 126–140.
- ICLP-1999-LuC #logic programming #source code
- A Regular Type Analysis of Logic Programs (LL, JGC), p. 613.
- ICLP-1999-VanhoofB
- Binding-time Analysis for Mercury (WV, MB), pp. 500–514.
- ICLP-1999-Verbaeten #abduction #logic programming #source code #termination
- Termination Analysis for Abductive General Logic Programs (SV), pp. 365–379.
- LICS-1999-BanerjeeHR #polymorphism #λ-calculus
- Region Analysis and the Polymorphic λ Calculus (AB, NH, JGR), pp. 88–97.
- LICS-1999-Hofmann #higher-order #semantics #syntax
- Semantical Analysis of Higher-Order Abstract Syntax (MH0), pp. 204–213.
- DL-1998-JansenSS #query #scalability #web
- Failure Analysis in Query Construction: Data and Analysis from a Large Sample of Web Queries (BJJ, AS, TS), pp. 289–290.
- DL-1998-JonesCM #library
- Usage Analysis of a Digital Library (SJ, SJC, RJM), pp. 293–294.
- ECDL-1998-JonesCM #library
- An Analysis of Usage of a Digital Library (SJ, SJC, RJM), pp. 261–277.
- PODS-1998-DavulcuKRR #logic #modelling #workflow
- Logic Based Modeling and Analysis of Workflows (HD, MK, CRR, IVR), pp. 25–33.
- PODS-1998-PapadimitriouRTV #probability #semantics
- Latent Semantic Indexing: A Probabilistic Analysis (CHP, PR, HT, SV), pp. 159–168.
- SIGMOD-1998-ChaudhuriN
- AutoAdmin “What-if” Index Analysis Utility (SC, VRN), pp. 367–378.
- VLDB-1998-Ganguly #algorithm #design #optimisation #parametricity #query
- Design and Analysis of Parametric Query Optimization Algorithms (SG), pp. 228–238.
- VLDB-1998-Mihalisin #interactive
- A Single Pass Computing Engine for Interactive Analysis of VLDBs (TM), p. 707.
- VLDB-1998-WeberSB #performance
- A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces (RW, HJS, SB), pp. 194–205.
- CSEET-1998-Cowling98a #education #experience #re-engineering #student
- Teaching Systems Analysis to Software Engineering Students: Experience with a Structured Methodology (AJC), pp. 102–113.
- CSMR-1998-BorneRS #object-oriented #towards
- Towards a Systematic Object-Oriented transformation of a Mrise Analysis (IB, AR, FS), pp. 213–215.
- CSMR-1998-YehL #data flow #metric #testing
- Software Testability Measurements Derived from Data Flow Analysis (PLY, JCL), pp. 96–103.
- ICSM-1998-HarmanSD #memory management #slicing #using
- Analysis of Dynamic Memory Access Using Amorphous Slicing (MH, YS, SD), p. 336–?.
- ICSM-1998-SinhaH #source code
- Analysis of Programs with Exception-Handling Constructs (SS, MJH), pp. 348–357.
- IWPC-1998-LagueLBMD #architecture #comprehension #framework
- An Analysis Framework for Understanding Layered Software Architectures (BL, CL, ALB, EM, MD), pp. 37–44.
- PASTE-1998-ChaseCHY #architecture #multi #source code
- Recovering Software Architecture from Multiple Source Code Analyses (MPC, SMC, DRH, ASY), pp. 43–50.
- PASTE-1998-DorRS #detection #experience #fault #memory management #pointer
- Detecting Memory Errors via Static Pointer Analysis (Preliminary Experience) (ND, MR, SS), pp. 27–34.
- PASTE-1998-NaumovichCO #concurrent #data flow #performance #source code
- Efficient Composite Data Flow Analysis Applied to Concurrent Programs (GN, LAC, LJO), pp. 51–58.
- PASTE-1998-ZhangRL #alias #pointer
- Experiments with Combined Analysis for Pointer Aliasing (SZ, BGR, WL), pp. 11–18.
- WCRE-1998-CimitileCL #data flow #incremental #migration
- Incremental Migration Strategies: Data Flow Analysis For Wrapping (AC, UdC, ADL), pp. 59–68.
- WCRE-1998-KoschkeG #representation #reverse engineering
- An Intermediate Representation for Reverse Engineering Analyses (RK, JFG), pp. 241–250.
- FM-1998-Borger #design #state machine #using
- High Level System Design and Analysis Using Abstract State Machines (EB), pp. 1–43.
- ICFP-1998-Gustavsson #optimisation
- A Type Based Sharing Analysis for Update Avoidance and Optimisation (JG), pp. 39–50.
- ICFP-1998-Russell #design #functional #named
- MAP: A Functional Analysis and Design Method (DR), p. 342.
- CHI-1998-Boy #automation #safety
- Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems (GAB), pp. 265–272.
- CAiSE-1998-KavakliL #process
- Goal-Driven Business Process Analysis — Application in Electricity Deregulation (VK, PL), pp. 305–324.
- CAiSE-1998-Lam #development #reuse
- Change Analysis and Management in a Reuse-Oriented Software Development Setting (WL), pp. 219–236.
- EDOC-1998-SyrbeP
- An enterprise-level analysis of customer-provider relationships and implications for QoS enforcement (JHS, TP), pp. 208–217.
- CIKM-1998-DulleaS #modelling
- An Analysis of the Structural Validity of Ternary Relatinships in Entity Relationship Modeling (JD, IYS), pp. 331–339.
- ICML-1998-GarciaN #algorithm #learning
- A Learning Rate Analysis of Reinforcement Learning Algorithms in Finite-Horizon (FG, SMN), pp. 215–223.
- ICML-1998-KimuraK #algorithm #learning #using
- An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
- ICML-1998-PendrithM #learning #markov
- An Analysis of Direct Reinforcement Learning in Non-Markovian Domains (MDP, MM), pp. 421–429.
- ICPR-1998-AdigaC98a #image #industrial
- Analysis of volumetric images of filamentous bacteria in industrial sludge (PSUA, BBC), pp. 1735–1737.
- ICPR-1998-Ayache #challenge #image #research
- Medical image analysis a challenge for computer vision research (NA), pp. 1255–1256.
- ICPR-1998-BamfordL #segmentation
- Bayesian analysis of cell nucleus segmentation by a Viterbi search based active contour (PB, BCL), pp. 133–135.
- ICPR-1998-ChenHS #email
- E-mail signature block analysis (HC, JH, RS), pp. 1153–1156.
- ICPR-1998-CutlerD #detection
- View-based detection and analysis of periodic motion (RC, LSD), pp. 495–500.
- ICPR-1998-Duin #problem #relational #scalability
- Relational discriminant analysis and its large sample size problem (RPWD), pp. 445–449.
- ICPR-1998-Garcia-SevillaP #image #using
- The use of Boolean model for texture analysis of grey images (PGS, MP), pp. 811–813.
- ICPR-1998-GovindanDKP #classification #component #independence
- Independent component analysis applied to electrogram classification during atrial fibrillation (AG, GD, JK, JP), pp. 1662–1664.
- ICPR-1998-GuoYM #game studies #multi #robust #segmentation #statistics
- Unsupervised segmentation based on multi-resolution analysis, robust statistics and majority game theory (GG, SY, SM), pp. 799–801.
- ICPR-1998-HatteryL #image #physics
- Depth from physics: physics-based image analysis and feature definition (DH, MHL), pp. 711–713.
- ICPR-1998-HofmanJ #approach #clustering #performance #robust #using
- Robust and efficient cluster analysis using a shared near neighbours approach (IH, RAJ), pp. 243–247.
- ICPR-1998-HontaniD #component #detection #image #multi
- Multi-scale image analysis for detection of characteristic component figure shapes and sizes (HH, KD), pp. 1470–1472.
- ICPR-1998-Huynh #image #re-engineering
- Euclidean reconstruction from an image triplet: a sensitivity analysis (DQH), pp. 835–837.
- ICPR-1998-HyvarinenOHH #component #feature model #image #independence
- Image feature extraction by sparse coding and independent component analysis (AH, EO, POH, JH), pp. 1268–1273.
- ICPR-1998-KangTH #architecture #image #pattern matching #pattern recognition #recognition
- An IRAM architecture for image analysis and pattern recognition (YK, JT, TSH), pp. 1561–1564.
- ICPR-1998-KawataNOKMEKM #image #using
- Curvature based analysis of pulmonary nodules using thin-section CT images (YK, NN, HO, RK, KM, KE, MK, NM), pp. 361–363.
- ICPR-1998-KogaKSF #segmentation #using
- Segmentation of Japanese handwritten characters using peripheral feature analysis (MK, TK, HS, HF), pp. 1137–1141.
- ICPR-1998-LeeHSL #automation #bound #detection #parsing #using #video
- Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
- ICPR-1998-LuYI
- Intensity modulated moire and its intensity-phase analysis (CL, AY, SI), pp. 1791–1793.
- ICPR-1998-MaedaKIZ #multi #using
- Surface recovery by using regularization theory and its application to multiresolution analysis (MM, KK, KI, HZ), pp. 19–23.
- ICPR-1998-MottlBKKM #image
- Variational methods in signal and image analysis (VM, AB, AK, AK, IBM), pp. 525–527.
- ICPR-1998-NakaiMI #simulation
- Simulation and analysis of spectral distributions of human skin (HN, YM, SI), pp. 1065–1067.
- ICPR-1998-OhLS #using
- Using class separation for feature analysis and combination of class-dependent features (ISO, JSL, CYS), pp. 453–455.
- ICPR-1998-OzdemirBMEE #algorithm #comparative #evaluation #fault
- Comparative evaluation of texture analysis algorithms for defect inspection of textile products (SÖ, AB, RM, AE, AE), pp. 1738–1740.
- ICPR-1998-Perner #classification #image
- Image analysis and classification of HEp-2 cells in fluorescent images (PP), pp. 1677–1679.
- ICPR-1998-Shevlin #problem #using
- Analysis of orientation problems using Plucker lines (FS), pp. 685–689.
- ICPR-1998-SimonB #clustering #image
- WaveStat-cluster analysis of image data and wavelet coefficients (US, MB), pp. 1622–1625.
- ICPR-1998-Takasu #documentation #image #probability
- Probabilistic interpage analysis for article extraction from document images (AT), pp. 932–935.
- ICPR-1998-Tayeb-beySE #documentation
- Analysis and conversion of documents (STb, ASS, HE), pp. 1089–1091.
- ICPR-1998-WatanabeT #2d #image
- An analysis system for two-dimensional gel electrophoresis images of genomic DNA (YW, KT), pp. 368–371.
- ICPR-1998-YogesanEB #image
- Texture analysis of retinal images to determine nerve fibre loss (KY, RHE, CJB), pp. 1665–1667.
- ICPR-1998-ZhaoN #linear #recognition
- Linear discriminant analysis of MPF for face recognition (WZ, NN), pp. 185–188.
- ICPR-1998-ZhugeTLHD #image #interactive #programming #segmentation
- An interactive image segmentation method based on dynamic programming and its application in medical image analysis (YZ, JT, NL, ZH, RD), pp. 1558–1560.
- UML-1998-BourdeauLR #case study #diagrams #experience #uml
- Hierarchical Context Diagrams with UML: An Experience Report on Satellite Ground System Analysis (EB, PL, PR), pp. 227–239.
- ECOOP-1998-GilI #complexity #object-oriented #source code
- The Complexity of Type Analysis of Object Oriented Programs (JYG, AI), pp. 601–634.
- TOOLS-ASIA-1998-YuanCXMY #c++ #database #information management #tool support
- C++ Program Information Database for Analysis Tools (WY, XC, TX, HM, FY), pp. 173–180.
- TOOLS-USA-1998-Mitchell #constraints #contract #ocl #uml
- Analysis by Contract: An Introduction to UML’s Object Constraint Language (OCL) (RM), p. 448–?.
- TOOLS-USA-1998-Walden #contract #design #named
- BON: Seamless, Reversible, Contract-Based Analysis and Design (KW), p. 445.
- AdaEurope-1998-BliebergerB #ada #source code
- Symbolic Reaching Definitions Analysis of Ada Programs (JB, BB), pp. 238–250.
- ALP-PLILP-1998-CodishS #logic #set
- The Boolean Logic of Set Sharing Analysis (MC, HS), pp. 89–101.
- ALP-PLILP-1998-HatcliffDL #staging #using
- Staging Static Analyses Using Abstraction-Based Program Specialization (JH, MBD, SL), pp. 134–151.
- LOPSTR-1998-GabricGS #constraints #strict #theorem proving
- Strictness Analysis as Finite-Domain Constraint Solving (TG, KG, HS), pp. 255–270.
- PLDI-1998-AmmonsL #data flow
- Improving Data-flow Analysis with Path Profiles (GA, JRL), pp. 72–84.
- PLDI-1998-DiwanMM #alias #type system
- Type-Based Alias Analysis (AD, KSM, JEBM), pp. 106–117.
- PLDI-1998-HastiH #pointer #using
- Using Static Single Assignment Form to Improve Flow-Insensitive Pointer Analysis (RH, SH), pp. 97–105.
- POPL-1998-Blanchet #correctness #implementation #proving
- Escape Analysis: Correctness Proof, Implementation and Experimental Results (BB), pp. 25–37.
- POPL-1998-BodikA
- Path-Sensitive Value-Flow Analysis (RB, SA), pp. 237–251.
- POPL-1998-DebrayMW #alias #execution
- Alias Analysis of Executable Code (SKD, RM, MW), pp. 12–24.
- POPL-1998-DeFouwGC #interprocedural #performance
- Fast Interprocedural Class Analysis (GD, DG, CC), pp. 222–236.
- POPL-1998-GhiyaH #pointer
- Putting Pointer Analysis to Work (RG, LJH), pp. 121–133.
- POPL-1998-JagannathanTWW #alias #higher-order
- Single and Loving It: Must-Alias Analysis for Higher-Order Languages (SJ, PT, SW, AKW), pp. 329–341.
- POPL-1998-Schmidt #abstract interpretation #data flow #model checking
- Data Flow Analysis is Model Checking of Abstract Interpretations (DAS), pp. 38–48.
- SAS-1998-FagesG #logic programming #source code
- Analysis of Normal Logic Programs (FF, RG), pp. 82–98.
- SAS-1998-HagiyaT #data flow #java #on the #virtual machine
- On a New Method for Dataflow Analysis of Java Virtual Machine Subroutines (MH, AT), pp. 17–32.
- SAS-1998-HandjievaT #clustering #control flow #using
- Refining Static Analyses by Trace-Based Partitioning Using Control Flow (MH, ST), pp. 200–214.
- SAS-1998-HindP #alias #pointer
- Assessing the Effects of Flow-Sensitivity on Pointer Alias Analyses (MH, AP), pp. 57–81.
- SAS-1998-PeraltaGS #constraints #imperative #logic programming #source code
- Analysis of Imperative Programs through Analysis of Constraint Logic Programs (JCP, JPG, HS), pp. 246–261.
- SAS-1998-Ruthing #bidirectional #data flow
- Bidirectional Data Flow Analysis in Code Motion: Myth and Reality (OR), pp. 1–16.
- SIGAda-1998-LaskiSH #ada #dependence #source code
- Dependency Analysis of Ada Programs (JWL, WS, JH), pp. 263–275.
- SIGAda-1998-MillsP #ada #co-evolution #design #hardware #migration
- Hardware/Software Co-Design: VHDL and Ada 95 Code Migration and Integrated Analysis (MM, GP), pp. 18–27.
- Best-of-PLDI-1998-AmmonsL98a #data flow
- Improving data-flow analysis with path profiles (with retrospective) (GA, JRL), pp. 568–582.
- ICRE-1998-HaglindJR #case study #empirical #experience #requirements
- Experiences Integrating Requirements Engineering and Business Analysis An Empirical Study of Operations & Management System Procurement Projects (MH, LJ, MR), pp. 108–117.
- ICRE-1998-LutzHMST #product line #requirements #safety
- Safety Analysis of Requirements for a Product Family (RRL, GGH, MMM, DES, SRT), p. 24–?.
- ICRE-1998-SutcliffeR #experience #requirements
- Experience with SCRAM, a SCenario Requirements Analysis Method (AGS, MR), p. 164–?.
- REFSQ-1998-SutcliffeM #non-functional #requirements
- Scenario-based Analysis of Non-Functional Requirements (AGS, SM), pp. 219–233.
- ASE-1998-Andrews #testing #tool support #using
- Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
- ASE-1998-CzernyH #automation #requirements
- Automated Integrative Analysis of State-based Requirements (BJC, MPEH), p. 125–?.
- ASE-1998-MorzentiPM #automation #composition #specification
- A Tool for Automated System Analysis based on Modular Specifications (AM, PSP, SM), pp. 2–11.
- FSE-1998-AllenG #component #formal method #integration #modelling #standard
- Formal Modeling and Analysis of the HLA Component Integration Standard (RA, DG), pp. 70–79.
- FSE-1998-Jackson #design
- An Intermedicate Design Language and Its Analysis (DJ), pp. 121–130.
- ICSE-1998-ChanBS #named #specification
- Promises: Limited Specifications for Analysis and Manipulation (ECC, JB, WLS), pp. 167–176.
- ICSE-1998-MascarenhasKBK #artificial reality #modelling #petri net
- Modeling and Analysis of a Virtual Reality System with Time Petri Nets (RM, DK, UAB, RVK), pp. 33–42.
- ICSE-1998-TanakaAOY #metric #process #quality
- Software Quality Analysis & Measurement Service Activity in the Company (TT, MA, HO, AY), pp. 426–429.
- ICSE-1998-YokoyamaK #quality #statistics
- Software Cost and Quality Analysis by Statistical Approaches (YY, MK), pp. 465–467.
- SAC-1998-KimYL #policy
- Analysis of buffer replacement policies for WWW proxy (IK, HYY, JL), pp. 98–103.
- SAC-1998-Marchiori
- Light analysis of complex systems (MM), pp. 18–22.
- ASPLOS-1998-GhoshMM #precise #program transformation
- Precise Miss Analysis for Program Transformations with Caches of Arbitrary Associativity (SG, MM, SM), pp. 228–239.
- ASPLOS-1998-SodaniS #empirical
- An Empirical Analysis of Instruction Repetition (AS, GSS), pp. 35–45.
- CC-1998-BraunKK #control flow #generative #named
- Cool: A Control-Flow Generator for System Analysis (VB, JK, DK), pp. 306–309.
- CC-1998-BrouwerGP #automaton #finite #implementation #performance
- Myths and Facts about the Efficient Implementation of Finite Automata and Lexical Analysis (KB, WG, EP), pp. 1–15.
- CC-1998-MalacariaH #approach #control flow
- A New Approach to Control Flow Analysis (PM, CH), pp. 95–108.
- CC-1998-MartinAWF
- Analysis of Loops (FM, MA, RW, CF), pp. 80–94.
- CC-1998-NielsonN #constraints #logic
- Flow Logics for Constraint Based Analysis (HRN, FN), pp. 109–127.
- DAC-1998-ChenOIB #architecture #validation
- Validation of an Architectural Level Power Analysis Technique (RYC, RMO, MJI, RSB), pp. 242–245.
- DAC-1998-DartuP #named
- TETA: Transistor-Level Engine for Timing Analysis (FD, LTP), pp. 595–598.
- DAC-1998-DharchoudhuryPBVTB #design #network
- Design and Analysis of Power Distribution Networks in PowerPC Microprocessors (AD, RP, DB, RV, BT, DB), pp. 738–743.
- DAC-1998-GhoshJB #testing
- A BIST Scheme for RTL Controller-Data Paths Based on Symbolic Testability Analysis (IG, NKJ, SB), pp. 554–559.
- DAC-1998-KishinevskyCK #interface #specification #synthesis
- Asynchronous Interface Specification, Analysis and Synthesis (MK, JC, AK), pp. 2–7.
- DAC-1998-KrauterM #layout
- Layout Based Frequency Dependent Inductance and Resistance Extraction for On-Chip Interconnect Timing Analysis (BK, SM), pp. 303–308.
- DAC-1998-KukimotoB #functional
- Hierarchical Functional Timing Analysis (YK, RKB), pp. 580–585.
- DAC-1998-MalkaZ #debugging #design #estimation #reliability #statistics
- Design Reliability — Estimation through Statistical Analysis of Bug Discovery Data (YM, AZ), pp. 644–649.
- DAC-1998-NagarajCHY #approach
- A Practical Approach to Static Signal Electromigration Analysis (NSN, FC, HH, DY), pp. 572–577.
- DATE-1998-AllaraFSS #profiling
- A Model for System-Level Timed Analysis and Profiling (AA, WF, FS, DS), pp. 204–210.
- DATE-1998-BolchiniSS #concurrent #detection #fault #network
- Fault Analysis in Networks with Concurrent Error Detection Properties (CB, FS, DS), pp. 957–958.
- DATE-1998-ChandramouliWS #functional #named
- AFTA: A Formal Delay Model for Functional Timing Analysis (VC, JW, KAS), pp. 350–355.
- DATE-1998-CoppensAR #fault #modelling
- VHDL Modelling and Analysis of Fault Secure Systems (JC, DAK, CR), pp. 148–152.
- DATE-1998-FassnachtS #optimisation
- Timing Analysis and Optimization of a High-Performance CMOS Processor Chipset (UF, JS), pp. 325–331.
- DATE-1998-KassabCAK #constraints
- Propagation of Last-Transition-Time Constraints in Gate-Level Timing Analysis (MK, EC, SA, THK), pp. 796–802.
- DATE-1998-KimuraI #design
- A Unified Technique for PCB/MCM Design by Combining Electromagnetic Field Analysis with Circuit Simulator (HK, NI), pp. 951–952.
- DATE-1998-KoegstGCW #design #reuse
- A Systematic Analysis of Reuse Strategies for Design of Electronic Circuits (MK, DG, PC, MGW), pp. 292–296.
- DATE-1998-MirRVH #fault
- Switch-Level Fault Coverage Analysis for Switched-Capacitor Systems (SM, AR, DV, JLH), pp. 810–814.
- DATE-1998-PastorC #encoding #performance #petri net
- Efficient Encoding Schemes for Symbolic Analysis of Petri Nets (EP, JC), pp. 790–795.
- DATE-1998-VercauterenVJL #partial order #performance #using #verification
- Efficient Verification using Generalized Partial Order Analysis (SV, DV, GGdJ, BL), pp. 782–789.
- HPDC-1998-TierneyJCHBG #distributed #performance
- The NetLogger Methodology for High Performance Distributed Systems Performance Analysis (BT, WEJ, BC, GH, CXB, DG), pp. 260–267.
- LCTES-1998-LiuG #automation #bound
- Automatic Accurate Time-Bound Analysis for High-Level Languages (YAL, GG), pp. 31–40.
- LCTES-1998-LundqvistS #simulation #using
- Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques (TL, PS), pp. 1–15.
- PDP-1998-AlonsoGEGGM #embedded #parallel #performance #prototype #realtime #tool support #visualisation
- A toolset for visualization and analysis of parallel real-time embedded systems based on fast prototyping techniques (FJSA, JG, JE, DFG, SG, PDM), pp. 186–194.
- PDP-1998-MontoyaG #algorithm #implementation #parallel
- Implementation of parallel thinning algorithms on multicomputers: analysis of the work load balance (MDGM, IG), pp. 257–263.
- PDP-1998-MorenoFZCT #biology #memory management #multi #sequence
- Biological sequence analysis on distributed-shared memory multiprocessors (ARM, LGdlF, ELZ, JMC, OT), pp. 20–26.
- ESOP-1998-BruynoogheLS #deduction
- A Polyvariant Binding-Time Analysis for Off-line Partial Deduction (MB, ML, KFS), pp. 27–41.
- ESOP-1998-ChinKL
- Synchronisation Analysis to Stop Tulping (WNC, SCK, TWL), pp. 75–89.
- FASE-1998-NielsonAN #behaviour #case study #safety
- Behaviour Analysis and Safety Conditions: A Case Study in CML (HRN, TA, FN), pp. 255–269.
- FASE-1998-ReedJDR #automation #formal method #modelling #network
- Automated Formal Analysis of Networks: FDR Models of Arbitrary Topologies and Flow-Control Mechanisms (JNR, DMJ, BD, GMR), pp. 239–254.
- FoSSaCS-1998-AmadioC #type system
- Analysis of a Guard Condition in Type Theory (RMA, SCG), pp. 48–62.
- STOC-1998-BellareCK #approach #authentication #composition #design #protocol
- A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (MB, RC, HK), pp. 419–428.
- STOC-1998-LubyMSS #design #graph #using
- Analysis of Low Density Codes and Improved Designs Using Irregular Graphs (ML, MM, MAS, DAS), pp. 249–258.
- TACAS-1998-CharatonikP #infinity
- Set-Based Analysis of Reactive Infinite-State Systems (WC, AP), pp. 358–375.
- TACAS-1998-Lind-NielsenABHKL #composition #dependence #scalability #using #verification
- Verification of Large State/Event Systems Using Compositionality and Dependency Analysis (JLN, HRA, GB, HH, KJK, KGL), pp. 201–216.
- TACAS-1998-LindahlPY #design
- Formal Design and Analysis of a Gear Controller (ML, PP, WY), pp. 281–297.
- CADE-1998-BrauburgerG #evaluation #induction #termination
- Termination Analysis by Inductive Evaluation (JB, JG), pp. 254–269.
- CADE-1998-FleuriotP #geometry #proving #standard #theorem proving
- A Combination of Nonstandard Analysis and Geometry Theorem Proving, with Application to Newton’s Principia (JDF, LCP), pp. 3–16.
- CAV-1998-AbdullaBJ #bound #on the fly
- On-the-Fly Analysis of Systems with Unbounded, Lossy FIFO Channels (PAA, AB, BJ), pp. 305–318.
- CAV-1998-ComonJ #automaton #multi #safety
- Multiple Counters Automata, Safety Analysis and Presburger Arithmetic (HC, YJ), pp. 268–279.
- CAV-1998-Mitchell #finite #protocol #security
- Finite-State Analysis of Security Protocols (JCM), pp. 71–76.
- ISSTA-1998-Ball #control flow #on the #testing
- On the Limit of Control Flow Analysis for Regression Test Selection (TB), pp. 134–142.
- ISSTA-1998-GodefroidHJ #model checking #monitoring #using
- Model Checking Without a Model: An Analysis of the Heart-Beat Monitor of a Telephone Switch Using VeriSoft (PG, RSH, LJJ), pp. 124–133.
- JICSLP-1998-DecorteS #termination
- Termination Analysis: Some Practical Properties of the Norm and Level Mapping Space (SD, DDS), pp. 235–249.
- LICS-1998-StarkS #automaton #composition #network #probability
- Compositional Analysis of Expected Delays in Networks of Probabilistic I/O Automata (EWS, SAS), pp. 466–477.
- ADL-1997-KleinF #documentation #fault
- Error Tolerant Document Structure Analysis (BK, PF), pp. 116–127.
- DL-1997-SchiffH #comprehension #social
- Understanding Complex Information Environments: A Social Analysis of Watershed Planning (LRS, NAVH), pp. 161–168.
- HT-1997-Chen #similarity #visualisation
- Structuring and Visualising the WWW by Generalised Similarity Analysis (CC), pp. 177–186.
- ICDAR-1997-Ah-SoonT #architecture
- Variations on the Analysis of Architectural Drawing (CAS, KT), pp. 347–351.
- ICDAR-1997-AraiO
- Form Processing based on Background Region Analysis (HA, KO), pp. 164–169.
- ICDAR-1997-BlasiusGJK #documentation #knowledge-based
- Knowledge-based Document Analysis (KHB, BG, IJ, NK), pp. 728–731.
- ICDAR-1997-ChangCCLLSTWY #documentation #recognition
- A Document Analysis and Recognition System (FC, TFC, TRC, MCL, YCL, TYS, TMT, JJW, CSY), pp. 736–739.
- ICDAR-1997-ChangLP #algorithm
- Line sweep thinning algorithm for feature analysis (FC, YCL, TP), pp. 123–127.
- ICDAR-1997-CracknellDD97a #comprehension #documentation #framework #image #named
- TABS — A New Software Framework for Document Image Processing, Analysis, and Understanding (CC, ACD, LD), pp. 1001–1005.
- ICDAR-1997-CullenHH #database #documentation #image #retrieval #using
- Document image database retrieval and browsing using texture analysis (JFC, JJH, PEH), pp. 718–721.
- ICDAR-1997-Ishitani #documentation #layout
- Document Layout Analysis Based on Emergent Computation (YI), pp. 45–50.
- ICDAR-1997-JingboXT #segmentation
- Segmentation of Stick Text Based on Sub Connected Area Analysis (JG, XL, ZT), p. 417–?.
- ICDAR-1997-Kim #documentation #problem
- Problems and Approaches for Oriental Document Analysis (JHK), p. 1111.
- ICDAR-1997-KoppenLN #documentation #framework #image #internet
- An Image Consulting Framework for Document Analysis of Internet Graphics (MK, LL, BN), p. 819–?.
- ICDAR-1997-LiangRHP #documentation #image
- UW-ISL Document Image Analysis Toolbox: An Experimental Environment (JL, RR, RMH, ITP), pp. 984–988.
- ICDAR-1997-LinNN #documentation #image #logic #using
- Logical Structure Analysis of Book Document Images Using Contents Information (CL, YN, SN), pp. 1048–1054.
- ICDAR-1997-MaergnerKP #benchmark #documentation #metric #on the
- On Benchmarking of Document Analysis Systems (VFM, PK, AKP), p. 331–?.
- ICDAR-1997-MiyamotoISNT #documentation #requirements
- Analysis of required elements for next-generation document reader on the basis of user requirements (TM, YI, KS, TN, YT), pp. 428–432.
- ICDAR-1997-OgierMLL #image #reliability #semantics
- An Image Interpretation Device cannot be Reliable without any Semantic Coherency Analysis of the Interpretated Objects — Application to French Cadastral Maps (JMO, RM, JL, YL), pp. 532–535.
- ICDAR-1997-SauvolaHKSPD #algorithm #distributed #documentation #image #testing
- A distributed management system for testing document image analysis algorithms (JJS, SH, HK, TS, MP, DSD), pp. 989–995.
- PODS-1997-HellersteinKP #on the
- On the Analysis of Indexing Schemes (JMH, EK, CHP), pp. 249–256.
- CSEET-1997-LethbridgeIMG #re-engineering
- An Undergraduate Option in Software Engineering: Analysis and Rationale (TCL, DI, AM, DG), pp. 120–131.
- CSMR-1997-FantechiNS #cobol #object-oriented
- Object-Oriented Analysis of COBOL (AF, PN, ES), pp. 157–164.
- CSMR-1997-MendoncaK #architecture
- A Quality-Based Analysis of Architecture Recovery Environments (NCM, JK), pp. 54–59.
- CSMR-1997-TonellaAFM #maintenance #precise
- Variable Precision Reaching Definitions Analysis for Software Maintenance (PT, GA, RF, EM), pp. 60–67.
- WCRE-1997-MooreR #reuse
- Domain Analysis for Transformational Reuse (MMM, SR), pp. 156–163.
- WPC-1997-TonellaAFM #comprehension #points-to
- Points-to Analysis for Program Understanding (PT, GA, RF, EM), pp. 90–99.
- ICSM-2000-Basili #maintenance #reuse
- Analysis for Reuse and Maintenance: A Program for Experimentation (VRB), p. 296–?.
- ICSM-2000-EmamHM #process #requirements #scalability
- Causal Analysis of the Requirements Change Process for a Large System (KEE, DH, NHM), pp. 214–221.
- ICSM-2000-IioFA #maintenance #process
- Experimental Analysis of the Cognitive Processes of Program Maintainers during Software Maintenance (KI, TF, YA), pp. 242–249.
- ICALP-1997-BouajjaniH #reachability #set
- Symbolic Reachability Analysis of FIFO Channel Systems with Nonregular Sets of Configurations (AB, PH), pp. 560–570.
- ICALP-1997-HemaspaandraHR #parallel
- Exact Analysis of Dodgson Elections: Lewis Carroll’s 1876 Voting System is Complete for Parallel Access to NP (EH, LAH, JR), pp. 214–224.
- ICALP-1997-HondaY #call-by #game studies
- Game Theoretic Analysis of Call-by-Value Computation (KH, NY), pp. 225–236.
- FME-1997-MartinJ #concurrent #network #performance #process #scalability
- An Efficient Technique for Deadlock Analysis of Large Scale Process Networks (JMRM, SAJ), pp. 418–441.
- FME-1997-YoungB #memory management #modelling
- Mathematical Modeling and Analysis of an External Memory Manager (WDY, WRB), pp. 237–257.
- TLCA-1997-BelleM
- Typed Intermediate Languages for Shape Analysis (GB, EM), pp. 11–29.
- ICFP-1997-Ashley #effectiveness
- The Effectiveness of Flow Analysis for Inlining (JMA), pp. 99–111.
- ICFP-1997-Banerjee #composition #type system
- A Modular, Polyvariant, and Type-Based Closure Analysis (AB), pp. 1–10.
- ICFP-1997-GasserNN #control flow
- Systematic Realisation of Control Flow Analyses for CML (KLSG, FN, HRN), pp. 38–51.
- ICFP-1997-HeintzeM #complexity #on the
- On the Complexity of Set-Based Analysis (NH, DAM), pp. 150–163.
- ICFP-1997-SabelfeldS #functional #problem #semantics #source code
- Simple Semantic Analysis Problems for Functional Programs (VKS, AS), p. 319.
- ICFP-1997-Shao #flexibility #representation
- Flexible Representation Analysis (ZS), pp. 85–98.
- CHI-1997-BhavnaniJ #performance
- From Sufficient to Efficient Usage: An Analysis of Strategic Knowledge (SKB, BEJ), pp. 91–98.
- CHI-1997-ChinRC #development #requirements
- Participatory Analysis: Shared Development of Requirements from Scenarios (GCJ, MBR, JMC), pp. 162–169.
- CHI-1997-Muller #collaboration #human-computer
- Translation in HCI: Formal Representations for Work Analysis and Collaboration (MJM), pp. 544–545.
- CHI-1997-Ramsay
- A Factor Analysis of User Cognition and Emotion (JR), pp. 546–547.
- HCI-CC-1997-Angehrn #framework #platform
- An Agent-Centered Framework for the Analysis and Diagnosis of Organizational Groupware Platforms (AAA), pp. 289–292.
- HCI-CC-1997-FunadaYIN #effectiveness #evaluation #how #human-computer #performance
- How Efficient are Combined Tasks for Effective HCI?: An Objective Evaluation Through AR Analysis of EEG (MFF, YY, KI, SPN), pp. 579–582.
- HCI-CC-1997-KazumaSNGOS #evaluation #process
- Evaluation of Mental Stress During Tracking Tasks Based on the Analysis of Electrodermal Activity, Blinks and Blood Pressure (HK, MS, YN, HG, YO, MS), pp. 567–570.
- HCI-CC-1997-LeporeMMPTCT
- Computer-Aided Analysis in Ophthalmological Imaging (DL, FM, GM, MMP, ST, GC, MT), pp. 753–756.
- HCI-CC-1997-StrohmU #concept #people
- Sociotechnical Analysis According to the Concept of People, Technology, Organization (OS, EU), pp. 241–244.
- HCI-CC-1997-Suzuki #development #evaluation #variability
- The Application of Heart Rate Variability Analysis on the Evaluation of Mental Strain and its Future Development (KS), pp. 559–562.
- HCI-CC-1997-Venda #communication #performance #predict
- Ergodynamics in Analysis and Prediction of Communication Efficiency (VFV), pp. 833–836.
- HCI-CC-1997-WhisenandE
- Analysis of Cursor Movements with a Mouse (TGW, HHE), pp. 533–536.
- HCI-SEC-1997-Brath #3d #experience #guidelines #interactive #visualisation
- 3D Interactive Information Visualization: Guidelines from Experience and Analysis of Applications (RB), pp. 865–868.
- HCI-SEC-1997-EarlYMK #case study #design #usability
- The Contribution of Usability Analysis to the Design of Medical Devices: A Case Study (SE, MY, BM, RJK), pp. 601–604.
- HCI-SEC-1997-HolstCG #constraints #interface
- Transporting Honey Bears: A Cognitive Analysis of the Effects of Interface Manipulation Style on a Constraint-Based Planning Task (SJH, EFC, DJG), pp. 169–172.
- HCI-SEC-1997-JackoD #interface #requirements
- Interface Requirements: An Analysis of Technologies Designed for Individual and Group Work (JAJ, VGD), pp. 347–350.
- HCI-SEC-1997-JungY
- Managing Information by a New Compound Noun Analysis (IHJ, SYY), pp. 299–302.
- HCI-SEC-1997-MacLeodMK #comprehension #human-computer #requirements
- Understanding HCI Requirements: Expertise and Assistance to Imagery Analysis (ISM, AJM, EK), pp. 559–562.
- HCI-SEC-1997-Mizuno
- Conjoint Analysis of Consumer Preferences in Cyber Space (MM), pp. 475–478.
- HCI-SEC-1997-PedraliB #process #question
- Can We Trace Back Cognitive Processes in Root Cause Analysis? (MP, RB), pp. 59–62.
- HCI-SEC-1997-WatanabeO #communication
- Physiological Analysis of Entrainment in Face-to-Face Communication (TW, MO), pp. 411–414.
- CAiSE-1997-CarricoG
- Facilitating Analysis and Diagnosis in Organisations (LC, NG), pp. 131–144.
- CAiSE-1997-CastanoA #framework #information management #legacy #multi
- A Multi-Perspective Framework for the Analysis of Legacy Information Systems (SC, VDA), pp. 117–130.
- CIKM-1997-DulleaS #constraints
- An Analysis of Cardinality Constraints in Redundant Relationships (JD, IYS), pp. 270–277.
- CIKM-1997-GauchW #approach #automation #corpus #query
- A Corpus Analysis Approach for Automatic Query Expansion (SG, JW), pp. 278–284.
- CIKM-1997-ZarkeshASSS #design
- Analysis and Design of Server Informative WWW-Sites (AMZ, JA, CS, RS, VS), pp. 254–261.
- ICML-1997-Joachims #algorithm #categorisation #probability
- A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization (TJ), pp. 143–151.
- KDD-1997-BergstenSS #data mining #machine learning #mining
- Applying Data Mining and Machine Learning Techniques to Submarine Intelligence Analysis (UB, JS, PS), pp. 127–130.
- KDD-1997-ProvostF #classification #comparison #performance #visualisation
- Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions (FJP, TF), pp. 43–48.
- SIGIR-1997-Lee #multi
- Analyses of Multiple Evidence Combination (JHL), pp. 267–276.
- SIGIR-1997-Stairmand #information retrieval
- Textual Context Analysis for Information Retrieval (MAS), pp. 140–147.
- OOPSLA-1997-Haines #design #implementation #lightweight #thread
- An Open Implementation Analysis and Design for Lightweight Threads (MH), pp. 229–242.
- TOOLS-ASIA-1997-Mitchell97a #contract
- Analysis by Contract (RM), p. 421.
- TOOLS-ASIA-1997-PengCC #morphism #multi #performance #polymorphism
- The Implement Mechanism and Efficiency Analysis of Multiinheritance and Polymorphism (RP, JC, SC), pp. 389–392.
- TOOLS-PACIFIC-1997-FrohlichS #architecture #interactive
- Interactive Analysis of Object Architectures (JHF, TS), pp. 252–266.
- TOOLS-PACIFIC-1997-Hoffman #object-oriented
- A Practical Notation for Object Oriented Analysis with a Formal Meaning (JH), pp. 225–237.
- TOOLS-USA-1997-FetckeAN #approach
- Mapping the OO-Jacobson Approach into Function Point Analysis (TF, AA, THN), pp. 192–202.
- TOOLS-USA-1997-Mitchell #contract
- Analysis by Contract (RM), p. 372.
- TOOLS-USA-1997-Walden #design #reuse #usability
- The BON Method: Analysis and Design for Reusability (KW), p. 372.
- AdaEurope-1997-Bell #ada #source code #tool support
- An Alternative Toolset for Analysis of Ada Programs (AEB), pp. 112–124.
- ALP-1997-CodishT #constraints #logic programming #semantics #source code #termination #using
- A Semantic Basis for Termination Analysis of Logic Programs and Its Realization Using Symbolic Norm Constraints (MC, CT), pp. 31–45.
- LOPSTR-1997-DecorteSLMS #logic programming #termination
- Termination Analysis for Tabled Logic Programming (SD, DDS, ML, BM, KFS), pp. 111–127.
- LOPSTR-1997-HeatonHK #logic programming #source code
- Analysis of Logic Programs with Delay (AH, PMH, AK), pp. 148–167.
- PEPM-1997-HornofN #imperative
- Accurate Binding-Time Analysis For Imperative Languages: Flow, Context, and Return Sensitivity (LH, JN), pp. 63–73.
- PLDI-1997-Collberg #automation #mutation testing
- Reverse Interpretation + Mutation Analysis = Automatic Retargeting (CSC), pp. 57–70.
- PLDI-1997-FlanaganF #component
- Componential Set-Based Analysis (CF, MF), pp. 235–248.
- PLDI-1997-Goodwin #data flow #execution #interprocedural
- Interprocedural Dataflow Analysis in an Executable Optimizer (DWG), pp. 122–133.
- PLDI-1997-HeintzeM #control flow #linear #transitive
- Linear-time Subtransitive Control Flow Analysis (NH, DAM), pp. 261–272.
- PLDI-1997-WagnerG #incremental #programming language
- Incremental Analysis of real Programming Languages (TAW, SLG), pp. 31–43.
- POPL-1997-Biswas
- A Demand-Driven Set-Based Analysis (SKB), pp. 372–385.
- POPL-1997-Deutsch #complexity #on the
- On the Complexity of Escape Analysis (AD), pp. 358–371.
- POPL-1997-NielsonN #control flow #semantics
- Infinitary Control Flow Analysis: a Collecting Semantics for Closure Analysis (HRN, FN), pp. 332–345.
- POPL-1997-Ruf #clustering #data flow #using
- Partitioning Dataflow Analyses Using Types (ER), pp. 15–26.
- POPL-1997-ShapiroH #performance #points-to
- Fast and Accurate Flow-Insensitive Points-To Analysis (MS, SH), pp. 1–14.
- SAS-1997-Braunburger #automation #order #polynomial #termination #using
- Automatic Termination Analysis for Partial Functions Using Polynomial Orderings (JB), pp. 330–344.
- SAS-1997-CodishLB #algebra #approach #logic programming #source code
- An Algebraic Approach to Sharing Analysis of Logic Programs (MC, VL, FB), pp. 68–82.
- SAS-1997-Granger #congruence
- Static Analyses of Congruence Properties on Rational Numbers (PG), pp. 278–292.
- SAS-1997-IgarashiK #communication #concurrent #programming language #type system
- Type-Based Analysis of Communication for Concurrent Programming Languages (AI, NK), pp. 187–201.
- SAS-1997-JagannathanWW
- Type-Directed Flow Analysis for Typed Intermediate Languages (SJ, SW, AKW), pp. 232–249.
- SAS-1997-Mossin
- Exact Flow Analysis (CM), pp. 250–264.
- SAS-1997-Ryder
- Practical Compile-Time Analysis (BGR), pp. 406–412.
- SAS-1997-Scozzari #logic
- Logical Optimality of Groundness Analysis (FS), pp. 83–97.
- SAS-1997-ShapiroH #pointer #precise
- The Effects of the Precision of Pointer Analysis (MS, SH), pp. 16–34.
- SAS-1997-SpeirsSS #termination
- Termination Analysis for Mercury (CS, ZS, HS), pp. 160–171.
- SAS-1997-TalbotTD #automaton #logic programming
- Set-Based Analysis for Logic Programming and Tree Automata (JMT, ST, PD), pp. 127–140.
- TRI-Ada-1997-Conn #source code
- The Source Code Analysis Tool Construction Project (RLC), pp. 141–148.
- TRI-Ada-1997-RileyDP #implementation #verification
- An Instance of the Application Download Pattern: The SPAIDS Software Loader/Verifier Domain Analysis and Implementation (JDR, SD, WP), pp. 273–278.
- RE-1997-Ben-AbdallahLK #functional #requirements #specification
- Integrated Specification and Analysis of Functional, Temporal, and Resource Requirements (HBA, IL, YSK), pp. 198–209.
- RE-1997-DarimontDML #integration #layout #named #requirements
- GRAIL/KAOS: An Environment for Goal-Driven Requirements Analysis, Integration and Layout (RD, ED, PM, AvL), p. 140.
- RE-1997-FaulkH #approach #requirements #specification
- The SCR Approach to Requirements Specification and Analysis (SRF, CLH), p. 263.
- RE-1997-ModugnoLRPS #requirements #safety #specification
- Integrated Safety Analysis of Requirements Specifications (FM, NGL, JDR, KP, SDS), pp. 148–159.
- RE-1997-YenT #requirements #trade-off
- A Systematic Tradeoff Analysis for Conflicting Imprecise Requirements (JY, WAT), p. 87–?.
- ASE-1997-Dwyer #composition #concurrent
- Modular Flow Analysis for Concurrent Software (MBD), pp. 264–273.
- ASE-1997-HarrisonB #data flow #design #information management
- Data Flow Analysis within the ITOC Information System Design Recovery Tool (JVH, AB), p. 227–?.
- ASE-1997-LamJ #requirements #reuse
- Mechanising Requirements Engineering: Reuse and the Application of Domain Analysis Technology (WL, SJ), pp. 303–304.
- ESEC-FSE-1997-AlborghettiGM #automation #deduction
- Providing Automated Support to Deductive Analysis of Time Critical Systems (AA, AG, AM), pp. 211–226.
- ESEC-FSE-1997-ChenGK #c++ #detection #reachability
- A C++ Data Model Supporting Reachability Analysis and Dead Code Detection (YFC, ERG, EK), pp. 414–431.
- ESEC-FSE-1997-CheungGK #composition #liveness #reachability #using #verification
- Verification of Liveness Properties Using Compositional Reachability Analysis (SCC, DG, JK), pp. 227–243.
- ESEC-FSE-1997-Obbink #architecture #case study #experience #industrial
- Analysis of Software Architectures in High and Low Volume Electronic Systems, Industrial Experience Report (JHO), pp. 523–524.
- ICSE-1997-ArdisW #product line
- Defining Families: The Commonality Analysis (MAA, DMW), pp. 649–650.
- ICSE-1997-Damon #design #interactive #named
- Nitpick: A Tool for Interactive Design Analysis (CD), pp. 596–597.
- ICSE-1997-Fowler #design #object-oriented #overview
- A Survey of Object Oriented Analysis and Design Methods (MF), pp. 653–654.
- ICSE-1997-PezzeY #modelling #multi #semantics #tool support #using
- Constructing Multi-Formalism State-Space Analysis Tools: Using Rules to Specify Dynamic Semantics of Models (MP, MY), pp. 239–249.
- ICSE-1997-PighinZ #metric #predict #statistics
- A Predictive Metric Based on Discriminant Statistical Analysis (MP, RZ), pp. 262–270.
- ICSE-1997-ReeseL
- Software Deviation Analysis (JDR, NGL), pp. 250–260.
- ICSE-1997-TonellaAFM #c++ #morphism #pointer #polymorphism #slicing
- Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing (PT, GA, RF, EM), pp. 433–443.
- ICSE-1997-WilsonRH #automation #specification
- Automated Analysis of Requirement Specifications (WMW, LHR, LEH), pp. 161–171.
- ICSE-1997-YurRLS #c #incremental
- Incremental Analysis of Side Effects for C Software System (JSY, BGR, WL, PS), pp. 422–432.
- SAC-1997-DamianiT #clustering
- Dynamic clustering for technology-based domain analysis (TDA) (ED, ADT), pp. 204–206.
- SAC-1997-LinXY #parallel #performance #problem
- Performance analysis for parallel solutions to generic search problems (WML, WX, BY), pp. 422–430.
- ASF+SDF-1997-Moonen #architecture #data flow #reverse engineering
- A generic architecture for data flow analysis to support reverse engineering (LM), p. 10.
- DAC-1997-ChenL #design #power management
- Power Supply Noise Analysis Methodology for Deep-Submicron VLSI Chip Design (HHC, DDL), pp. 638–643.
- DAC-1997-CongHKNSY #2d
- Analysis and Justification of a Simple, Practical 2 1/2-D Capacitance Extraction Methodology (JC, LH, ABK, DN, NS, SHCY), pp. 627–632.
- DAC-1997-KlenkeMAJRG #dependence #design #performance
- An Integrated Design Environment for Performance and Dependability Analysis (RHK, MM, JHA, BWJ, RR, AG), pp. 184–189.
- DAC-1997-KukimotoB #detection
- Exact Required Time Analysis via False Path Detection (YK, RKB), pp. 220–225.
- DAC-1997-MalikML #embedded
- Static Timing Analysis of Embedded Software (SM, MM, YTSL), pp. 147–152.
- DAC-1997-MarculescuMP #finite #probability #sequence #state machine
- Sequence Compaction for Probabilistic Analysis of Finite-State Machines (DM, RM, MP), pp. 12–15.
- DAC-1997-PasseroneLCS #hardware #performance #prototype #trade-off
- Fast Hardware/Software Co-Simulation for Virtual Prototyping and Trade-Off Analysis (CP, LL, MC, ALSV), pp. 389–394.
- DAC-1997-SudarsanamLD #architecture #evaluation
- Analysis and Evaluation of Address Arithmetic Capabilities in Custom DSP Architectures (AS, SYL, SD), pp. 287–292.
- EDTC-1997-DasdanMG #constraints #debugging #embedded #named
- RATAN: A tool for rate analysis and rate constraint debugging for embedded systems (AD, AM, RKG), pp. 2–6.
- EDTC-1997-FradinMD #3d
- Analysis of 3D conjugate heat transfers in electronics (JPF, LM, BD), pp. 190–194.
- EDTC-1997-Garcia-VargasGFR #algorithm #generative #scalability
- An algorithm for numerical reference generation in symbolic analysis of large analog circuits (IGV, MG, FVF, ÁRV), pp. 395–399.
- EDTC-1997-GuLKP #testing
- A controller testability analysis and enhancement technique (XG, EL, KK, ZP), pp. 153–157.
- EDTC-1997-KunduG
- Inductance analysis of on-chip interconnects [deep submicron CMOS] (SK, UG), pp. 252–255.
- EDTC-1997-NouraniP #behaviour #using
- Structural BIST insertion using behavioral test analysis (MN, CAP), pp. 64–68.
- EDTC-1997-WalrathVB #partial evaluation #performance #using #verification
- Performance verification using partial evaluation and interval analysis (JW, RV, WB), p. 622.
- PDP-1997-JellyMRSC #concurrent #detection
- Detecting deadlock with client-server analysis (IJ, MM, SR, CS, PRC), pp. 351–357.
- PPoPP-1997-GuLL #array #data flow #experience #performance
- Experience with Efficient Array Data-Flow Analysis for Array Privatization (JG, ZL, GL), pp. 157–167.
- TACAS-1997-ParashkevovY #performance #pseudo #reachability #using
- Space Efficient Reachability Analysis Through Use of Pseudo-Root States (ANP, JY), pp. 50–64.
- TACAS-1997-Tofts #composition #performance
- Compositional Performance Analysis (CMNT), pp. 290–305.
- TAPSOFT-1997-MuthD #alias #complexity #on the #pointer
- On the Complexity of Function Pointer May-Alias Analysis (RM, SKD), pp. 381–392.
- TAPSOFT-1997-Thiemann #framework
- A Unified Framework for Binding-Time Analysis (PT), pp. 742–756.
- CAV-1997-BoigelotBR #hybrid #linear #reachability
- An Improved Reachability Analysis Method for Strongly Linear Hybrid Systems (BB, LB, SR), pp. 167–178.
- CAV-1997-Godefroid #automation #concurrent #named
- VeriSoft: A Tool for the Automatic Analysis of Concurrent Reactive Software (PG), pp. 476–479.
- CAV-1997-VarpaaniemiHL #performance #reachability
- prod 3.2: An Advanced Tool for Efficient Reachability Analysis (KV, KH, JL), pp. 472–475.
- ICLP-1997-BruynoogheJK #logic programming #programming language
- Live-Structure Analysis for Logic Programming Languages with Declarations (MB, GJ, AK), pp. 33–47.
- ICLP-1997-BuenoCL #logic programming #set #source code #using
- Sharing Analysis Using Set Logic Programs (FB, MC, VL), p. 417.
- ICLP-1997-DebrayGH #logic programming #source code
- Non-Failure Analysis for Logic Programs (SKD, PLG, MVH), pp. 48–62.
- ICLP-1997-DecorteS #automation #constraints #logic programming #source code
- Demand-Driven and Constraint-Based Automatic Left-Termination Analysis for Logic Programs (SD, DDS), pp. 78–92.
- ICLP-1997-LindenstraussS #automation #logic programming #source code #termination
- Automatic Termination Analysis of Logic Programs (NL, YS), pp. 63–77.
- ICLP-1997-SmausHK #logic programming #source code
- Domain Construction for Mode Analysis of Typed Logic Programs (JGS, PMH, AK), p. 418.
- ILPS-1997-Hermenegildo #programming
- Programming with Global Analysis (MVH), pp. 49–50.
- ILPS-1997-KingSB #bound #logic programming #source code
- Lower-bound Time-complexity Analysis of Logic Programs (AK, KS, FB), pp. 261–275.
- ILPS-1997-Podelski #logic programming #source code
- Set-Based Analysis of Logic Programs and Reactive Logic Programs (AP), pp. 35–36.
- ILPS-1997-TanL #logic programming #precise #recursion #source code
- Recursive Modes for Precise Analysis of Logic Programs (JT, IPL), pp. 277–290.
- LICS-1997-HeintzeM #on the #polynomial #type system
- On the Cubic Bottleneck in Subtyping and Flow Analysis (NH, DAM), pp. 342–351.
- LICS-1997-HuthK #model checking
- Quantitative Analysis and Model Checking (MH, MZK), pp. 111–122.
- DL-1996-PediotakisH #visual notation
- Visual Relevance Analysis (NP, MHZ), pp. 54–62.
- VLDB-1996-Cuppens #database #logic #multi #query
- Querying a Multilevel Database: A Logical Analysis (FC), pp. 484–494.
- VLDB-1996-FaloutsosG #using
- Analysis of n-Dimensional Quadtrees using the Hausdorff Fractal Dimension (CF, VG), pp. 40–50.
- VLDB-1996-Suciu96a #implementation #parallel #query
- Implementation and Analysis of a Parallel Collection Query Language (DS), pp. 366–377.
- VLDB-1996-Sullivan #database #named #network
- Tribeca: A Stream Database Manager for Network Traffic Analysis (MS), p. 594.
- ITiCSE-1996-Krone #algorithm #data type #education #symbolic computation #using
- Using symbolic computation for teaching data structures and algorithm analysis (JK), p. 230.
- ITiCSE-1996-MarsdenO #education #framework #modelling #multi #named #process #tool support
- MuPMoTT: a multimedia based tool supporting the teaching of process modelling within a framework of structured system analysis (PM, MO), pp. 116–118.
- ITiCSE-1996-SanchezV #education #image #lisp
- ViLi (Vision LISP): a software environment for teaching image processing and analysis (JS, JV), p. 234.
- ICSM-1996-CanforaCL #specification #tool support
- Specifying code analysis tools (GC, AC, ADL), pp. 95–103.
- ICSM-1996-YoungerLBB #concurrent #formal method #modelling #reverse engineering #source code #using
- Reverse Engineering Concurrent Programs using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 255–264.
- WCRE-1996-ChaseHRY #architecture
- Analysis and Presentation of Recovered Software Architectures (MPC, DRH, SNR, ASY), pp. 153–162.
- WCRE-1996-TonellaFAM #architecture #case study
- Augmenting Pattern-Based Architectural Recovery with Flow Analysis: Mosaic — A Case Study (PT, RF, GA, EM), pp. 198–207.
- WCRE-1996-YoungerLBB #concurrent #formal method #modelling #reverse engineering #source code #using
- Reverse Engineering Concurrent Programs Using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 239–248.
- WPC-1996-BlazyF #comprehension #interprocedural
- Interprocedural analysis for program comprehension by specialization (SB, PF), p. 133–?.
- ICALP-1996-AlbersM #algorithm
- Average Case Analyses of List Update Algorithms, with Applications to Data Compression (SA, MM), pp. 514–525.
- ICALP-1996-ChoiG #algorithm
- Lopsided Trees: Analyses, Algorithms, and Applications (VSNC, MJG), pp. 538–549.
- FME-1996-BicarreguiDW #formal method
- Quantitative Analysis of an Application of Formal Methods (JB, JD, EW), pp. 60–73.
- FME-1996-BoigelotG #model checking #protocol #using
- Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
- ICFP-1996-AbadiLL #dependence
- Analysis and Caching of Dependencies (MA, BWL, JJL), pp. 83–91.
- ICFP-1996-SerranoF
- Storage Use Analysis and its Applications (MS, MF), pp. 50–61.
- IFL-1996-DebbabiFT #algorithm #concurrent #control flow #higher-order #source code #type system
- A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs (MD, AF, NT), pp. 247–266.
- CHI-1996-Erickson #design #using
- The Design and Long-Term Use of a Personal Electronic Notebook: A Teflective Analysis (TE), pp. 11–18.
- CAiSE-1996-BatesBFL #formal method #guidelines #object-oriented
- Guidelines for Formalizing Fusion Object-Oriented Analysis Methods (BWB, JMB, RBF, MMLP), pp. 222–233.
- CAiSE-1996-CastanoA #process #unification
- Techniques for Process Analysis and Unification (SC, VDA), pp. 234–254.
- AKDDM-1996-FayyadDW #automation
- Automating the Analysis and Cataloging of Sky Surveys (UMF, SGD, NW), pp. 471–493.
- ICML-1996-OkamotoY #classification #nearest neighbour
- Theoretical Analysis of the Nearest Neighbor Classifier in Noisy Domains (SO, NY), pp. 355–363.
- ICPR-1996-AstromH #detection #modelling #probability
- Stochastic modelling and analysis of sub-pixel edge detection (KÅ, AH), pp. 86–90.
- ICPR-1996-AstromH96a #probability
- Stochastic analysis of scale-space smoothing (KÅ, AH), pp. 305–309.
- ICPR-1996-BatistaAA
- Pose view stability analysis for camera look angles computation (JB, HA, ATdA), pp. 171–175.
- ICPR-1996-BelloK #using
- Co-occurrence-based texture analysis using irregular tessellations (FB, RIK), pp. 780–784.
- ICPR-1996-BiancardiM #component #image #source code
- Connected component support for image analysis programs (AB, AM), pp. 620–624.
- ICPR-1996-ChangH
- Ribbon-based motion analysis of human body movements (ICC, CLH), pp. 436–440.
- ICPR-1996-ChenL96a #multi
- A multiresolution wavelet analysis of digital mammograms (CHC, GGL), pp. 710–714.
- ICPR-1996-ChenLC #classification #sequence #using
- Handwritten Chinese character analysis and preclassification using stroke structural sequence (ZC, CWL, RHC), pp. 89–93.
- ICPR-1996-Dzemyda #set #visual notation
- Visual analysis of a set of function values (GD), pp. 700–704.
- ICPR-1996-GunselT #retrieval #similarity
- Similarity analysis for shape retrieval by example (BG, AMT), pp. 330–334.
- ICPR-1996-HancockP #correlation #exponential #memory management
- An analysis of the exponential correlation associative memory (ERH, MP), pp. 291–295.
- ICPR-1996-Hauta-KasariPJL #matrix #multi
- Generalized co-occurrence matrix for multispectral texture analysis (MHK, JP, TJ, RL), pp. 785–789.
- ICPR-1996-HotterMM #detection #estimation #fault #robust #statistics #using
- Detection of moving objects using a robust displacement estimation including a statistical error analysis (MH, RM, MM), pp. 249–255.
- ICPR-1996-HusseinNO #using
- Analysis of detailed patterns of contour shapes using wavelet local extrema (EH, YN, YO), pp. 335–339.
- ICPR-1996-KashinoH #integration #music
- A music scene analysis system with the MRF-based information integration scheme (KK, NH), pp. 725–729.
- ICPR-1996-KasprzakC #component #image #independence
- Hidden image separation from incomplete image mixtures by independent component analysis (WK, AC), pp. 394–398.
- ICPR-1996-KiaD #documentation
- Structural compression for document analysis (OEK, DSD), pp. 664–668.
- ICPR-1996-KosibaK #automation
- Automatic invoice interpretation: invoice structure analysis (DAK, RK), pp. 721–725.
- ICPR-1996-KotcheffRTH
- Shape model analysis of THR radiographs (ACWK, ALR, CJT, DWLH), pp. 391–395.
- ICPR-1996-KrotkovKZ #invariant #synthesis
- Analysis and synthesis of the sounds of impact based on shape-invariant properties of materials (EK, RLK, NBZ), pp. 115–119.
- ICPR-1996-LasakulAK #formal method #image #linear #multi #using
- A theory of image restoration for linear spatial degradation using multiresolution analysis (AL, KA, SK), pp. 422–426.
- ICPR-1996-Marchand-MailletS #approach #image
- A minimum spanning tree approach to line image analysis (SMM, YMS), pp. 225–230.
- ICPR-1996-MozefWJT #architecture #component #parallel
- Parallel architecture dedicated to connected component analysis (EM, SW, JJ, ET), pp. 699–703.
- ICPR-1996-NakajimaTKY #layout #process #verification
- Analysis of address layout on Japanese handwritten mail-a hierarchical process of hypothesis verification (NN, TT, TK, KY), pp. 726–731.
- ICPR-1996-Nishida #modelling #synthesis
- Analysis and synthesis of deformed patterns based on structural models (HN), pp. 315–319.
- ICPR-1996-OkadaS
- A morphological subtraction scheme for form analysis (MO, MS), pp. 190–194.
- ICPR-1996-Polikarpova #on the
- On the fractal features in fingerprint analysis (NP), pp. 591–595.
- ICPR-1996-Roberts #clustering
- Scale-space unsupervised cluster analysis (SJR), pp. 106–110.
- ICPR-1996-Sablatnig #automation #detection #flexibility #visual notation
- Flexible automatic visual inspection based on the separation of detection and analysis (RS), pp. 944–948.
- ICPR-1996-SawasakiMU #design #implementation #performance #realtime #visual notation
- Design and implementation of high-speed visual tracking system for real-time motion analysis (NS, TM, TU), pp. 478–483.
- ICPR-1996-ShihHL #estimation #parametricity
- Accuracy analysis on the estimation of camera parameters for active vision systems (SWS, YPH, WSL), pp. 930–935.
- ICPR-1996-ShiniK #3d #metric
- 3D measurement strategy based on a projection invariance motion analysis with an artificial retina sensor (CWS, KIK), pp. 369–373.
- ICPR-1996-Sinclair96a #clustering
- Cluster-based texture analysis (DS), pp. 825–829.
- ICPR-1996-Solberg #classification #flexibility
- Texture fusion and classification based on flexible discriminant analysis (AHSS), pp. 596–600.
- ICPR-1996-SugiyamaA #multi
- Edge feature analysis by a vectorized feature extractor and in multiple edges (TS, KA), pp. 280–284.
- ICPR-1996-TatsunoSYIT #image #synthesis #using
- Analysis and synthesis of six primary facial expressions using range images (YT, SS, NY, HI, HT), pp. 489–493.
- ICPR-1996-TozakiKNOEM #3d #image #using
- Three-dimensional analysis of lung areas using thin-slice CT images (TT, YK, NN, HO, KE, NM), pp. 548–552.
- ICPR-1996-UhlF #recognition
- Spatiotemporal signal analysis: recognition of interacting modes (CU, RF), pp. 55–59.
- ICPR-1996-WalkerJ #geometry #statistics
- Statistical geometric features-extensions for cytological texture analysis (RFW, PTJ), pp. 790–794.
- ICPR-1996-WangF #algorithm #overview #pattern matching #pattern recognition #recognition #search-based
- Applying genetic algorithms on pattern recognition: an analysis and survey (YKW, KCF), pp. 740–744.
- ICPR-1996-WatanabeTO #recognition
- A moving object recognition method by optical flow analysis (MW, NT, KO), pp. 528–533.
- ICPR-1996-WilsonCH
- Sensitivity analysis for structural matching (RCW, ADJC, ERH), pp. 62–66.
- ICPR-1996-WorringW #using
- Analysis of complex motion patterns using region-based curve analysis (MW, AdW), pp. 388–392.
- ICPR-1996-WouwerSD #classification #speech
- Wavelet-FILVQ classifier for speech analysis (GVdW, PS, DVD), pp. 214–218.
- ICPR-1996-Young #image
- Sampling density for image analysis (ITY), pp. 840–843.
- ICPR-1996-ZribiFG #3d #invariant #set
- Set of invariant features for three-dimensional gray-level objects by harmonic analysis (MZ, HF, FG), pp. 549–553.
- SEKE-1996-CiancariniCM #requirements #testing
- Engineering Formal Requirements: Analysis and Testing (PC, SC, CM), pp. 385–392.
- SEKE-1996-Starks #architecture #development
- Development of a Software Architecture for the Analysis of Geographic and Image-Based Data (SAS), pp. 116–120.
- SEKE-1996-WangTCR #slicing
- The Role of Program Slicing in Ripple Effect Analysis (YW, WTT, XC, SR), pp. 369–376.
- SEKE-1996-XuZ #automation #problem #requirements #specification
- Requirements Analysis and Specification as a Problem of Software Automation (JX, HZ), pp. 457–464.
- SIGIR-1996-XuC #documentation #query #using
- Query Expansion Using Local and Global Document Analysis (JX, WBC), pp. 4–11.
- OOPSLA-1996-DiwanMM #effectiveness #object-oriented #source code #static typing
- Simple and Effective Analysis of Statically Typed Object-Oriented Programs (AD, JEBM, KSM), pp. 292–305.
- PLDI-1996-ChakrabartiGC #communication #optimisation
- Global Communication Analysis and Optimization (SC, MG, JDC), pp. 68–78.
- PLDI-1996-Ramalingam #data flow
- Data Flow Frequency Analysis (GR), pp. 267–277.
- PLDI-1996-RinardD #commutative #compilation #framework
- Commutativity Analysis: A New Analysis Framework for Parallelizing Compilers (MCR, PCD), pp. 54–67.
- PLDI-1996-SreedharGL #data flow #framework #graph #incremental #using
- A New Framework for Exhaustive and Incremental Data Flow Analysis Using DJ Graphs (VCS, GRG, YFL), pp. 278–290.
- PLILP-1996-WeyerW #graph #prolog
- Annotated Structure Shape Graphs for Abstract Analysis of Prolog (GW, WHW), pp. 92–106.
- POPL-1996-Ashley #flexibility #higher-order
- A Practical and Flexible Flow Analysis for Higher-Order Languages (JMA), pp. 184–194.
- POPL-1996-DaviesP #staged
- A Modal Analysis of Staged Computation (RD, FP), pp. 258–270.
- POPL-1996-GhiyaH #c #graph #pointer
- Is it a Tree, a DAG, or a Cyclic Graph? A Shape Analysis for Heap-Directed Pointers in C (RG, LJH), pp. 1–15.
- POPL-1996-Steensgaard #linear #points-to
- Points-to Analysis in Almost Linear Time (BS), pp. 32–41.
- SAS-1996-AndersenH #functional #higher-order #partial evaluation #termination
- Termination Analysis for Offline Partial Evaluation of a Higher Order Functional Language (PHA, CKH), pp. 67–82.
- SAS-1996-BrauburgerG #termination
- Termination Analysis for Partial Functions (JB, JG), pp. 113–127.
- SAS-1996-BruynoogheDBDM #logic programming #source code
- A Freeness and Sharing Analysis of Logic Programs Based on a Pre-interpretation (MB, BD, DB, MD, AM), pp. 128–142.
- SAS-1996-Emeljanov #similarity
- Analysis of the Equality Relations for the Program Terms (PGE), pp. 174–188.
- SAS-1996-KellyMSS #constraints #incremental #logic programming #source code
- Two Applications of an Incremental Analysis Engine for (Constraint) Logic Programs (ADK, KM, HS, PJS), pp. 385–386.
- SAS-1996-PueblaH #algorithm #incremental #logic programming #source code
- Optimized Algorithms for Incremental Analysis of Logic Programs (GP, MVH), pp. 270–284.
- SAS-1996-Venet #alias #source code
- Abstract Cofibered Domains: Application to the Alias Analysis of Untyped Programs (AV), pp. 366–382.
- ICRE-1996-Anton #requirements
- Goal-Based Requirements Analysis (AIA), pp. 136–144.
- ICRE-1996-BustardDC #object-oriented
- Integrating Soft Systems and Object-Oriented Analysis (DWB, TJD, BNC), pp. 52–59.
- ICRE-1996-ChampionM #enterprise #requirements
- Exploiting an enterprise model during systems’ requirements capture and analysis (REMC, TTM), pp. 208–216.
- ICRE-1996-KoestersPS #information management #named #object-oriented
- GeoOOA: Object-Oriented Analysis for Geographic Information Systems (GK, BUP, HWS), pp. 245–254.
- ICRE-1996-KostersSV #requirements #user interface
- Combined Analysis of User Interface and Domain Requirements (GK, HWS, JV), pp. 199–207.
- ICRE-1996-LutzW #case study #experience #requirements
- Experience Report: Contributions of SFMEA to Requirements Analysis (RRL, RMW), pp. 44–51.
- ICRE-1996-NissenJJZH #case study #concept #experience #modelling #multi #requirements
- Requirements Analysis from Multiple Perspectives: Experiences with Conceptual Modeling Technology (HWN, MAJ, MJ, GVZ, HH), p. 217.
- ICRE-1996-SantosC #assessment #development #information management #object-oriented
- An assessment of the applicability of object-oriented analysis to the development of information systems (IS, JAC), pp. 238–244.
- ICRE-1996-TakahashiPKOS #collaboration #hypermedia #requirements
- Hypermedia Support for Collaboration in Requirements Analysis (KT, CP, VK, KO, JDS), pp. 31–41.
- ICRE-1996-Vanwelkenhuysen #development #quality #requirements
- Quality Requirements Analysis in Customer-Centered Software Development (JV), pp. 117–125.
- FSE-1996-NaumovichCO #communication #data flow #protocol #using #verification
- Verification of Communication Protocols Using Data Flow Analysis (GN, LAC, LJO), pp. 93–105.
- FSE-1996-ZhangRL #alias #composition #pointer #towards
- Program Decomposition for Pointer Aliasing: A Step Toward Practical Analyses (SZ, BGR, WL), pp. 81–92.
- ICSE-1996-CheungK #composition #reachability #safety
- Checking Subsystem Safety Properties in Compositional Reachability Analysis (SCC, JK), pp. 144–154.
- ICSE-1996-Forgacs #array #data flow #testing
- An Exact Array Reference Analysis for Data Flow Testing (IF), pp. 565–574.
- ICSE-1996-WoodsY #approach #comprehension #heuristic #problem
- The Program Understanding Problem: Analysis and a Heuristic Approach (SGW, QY), pp. 6–15.
- SAC-1996-Asgharzadeh #fuzzy #image #rule-based #using
- Image analysis and enhancement using fuzzy rule based expert system (AA), pp. 529–531.
- SAC-1996-RajePG #named #object-oriented #source code
- OFFERS — a tool for hierarchical implicit analysis of sequential object-oriented programs (RRR, DP, ETG), pp. 437–441.
- ASPLOS-1996-ChenCM #branch #predict
- Analysis of Branch Prediction Via Data Compression (ICKC, JTC, TNM), pp. 128–137.
- ASPLOS-1996-McKinleyT #locality
- A Quantitative Analysis of Loop Nest Locality (KSM, OT), pp. 94–104.
- CC-1996-Steensgaard #points-to #source code #type inference
- Points-to Analysis by Type Inference of Programs with Structures and Unions (BS), pp. 136–150.
- DAC-1996-AluruNW #parallel
- A Parallel Precorrected FFT Based Capacitance Extraction Program for Signal Integrity Analysis (NRA, VBN, JW), pp. 363–366.
- DAC-1996-Bryant
- Bit-Level Analysis of an SRT Divider Circuit (REB), pp. 661–665.
- DAC-1996-Gupta #constraints #embedded #execution
- Analysis of Operation Delay and Execution Rate Constraints for Embedded Systems (RKG), pp. 601–604.
- DAC-1996-HosseiniMK #code generation #functional #verification
- Code Generation and Analysis for the Functional Verification of Microprocessors (AH, DM, PK), pp. 305–310.
- DAC-1996-KahngM
- Analysis of RC Interconnections Under Ramp Input (ABK, SM), pp. 533–538.
- DAC-1996-KantrowitzN #correctness #simulation #verification #what
- I’m Done Simulating: Now What? Verification Coverage Analysis and Correctness Checking of the DECchip 21164 Alpha Microprocessor (MK, LMN), pp. 325–330.
- DAC-1996-KernsY #congruence #multi #network #performance #reduction #scalability
- Stable and Efficient Reduction of Large, Multiport RC Networks by Pole Analysis via Congruence Transformations (KJK, ATY), pp. 280–285.
- DAC-1996-MonahanB #concurrent #optimisation
- Concurrent Analysis Techniques for Data Path Timing Optimization (CM, FB), pp. 47–50.
- DAC-1996-PhilippsCL #performance #reduction
- Efficient Full-Wave Electromagnetic Analysis via Model-Order Reduction of Fast Integral Transforms (JRP, EC, DDL), pp. 377–382.
- DAC-1996-RaghunathanDJ #reduction
- Glitch Analysis and Reduction in Register Transfer Level (AR, SD, NKJ), pp. 331–336.
- DAC-1996-SatyanarayanaP #energy #named
- HEAT: Hierarchical Energy Analysis Tool (JHS, KKP), pp. 9–14.
- DAC-1996-TelicheveskyKW #performance
- Efficient AC and Noise Analysis of Two-Tone RF Circuits (RT, KSK, JW), pp. 292–297.
- DAC-1996-VerlindJL #performance
- Efficient Partial Enumeration for Timing Analysis of Asynchronous Systems (EV, GGdJ, BL), pp. 55–58.
- PDP-1996-AlcoverLDZ #design #interactive #network #statistics
- Interconnection Network Design: A Statistical Analysis of Interactions between Factors (RA, PL, JD, LZ), pp. 211–218.
- PDP-1996-BorgeestR #database #relational
- Trace Analysis with a Relational Database System (RB, CR), pp. 243–251.
- PDP-1996-KimKYMC #multi #network #performance
- Performance Analysis of Multipath Multistage Interconnection Networks with Nonuniform Output Traffic Distribution (BK, BK, HY, SM, JWC), pp. 196–203.
- PDP-1996-SchikutaK #evaluation #sorting
- Analysis and Evaluation of Sorting on Hypercube-Based Systems (ES, PK), pp. 258–265.
- TAPSOFT-J-1995-SagivRH96 #constant #data flow #interprocedural #precise
- Precise Interprocedural Dataflow Analysis with Applications to Constant Propagation (SS, TWR, SH), pp. 131–170.
- ESOP-1996-BuenoGHP #prolog #source code #standard
- Global Analysis of Standard Prolog Programs (FB, DCG, MVH, GP), pp. 108–124.
- ESOP-1996-JensenM #geometry #interactive
- Flow Analysis in the Geometry of Interaction (TPJ, IM), pp. 188–203.
- STOC-1996-DimitriouI #algorithm #optimisation #towards
- Towards an Analysis of Local Optimization Algorithms (TD, RI), pp. 304–313.
- STOC-1996-Slavik #algorithm #set
- A Tight Analysis of the Greedy Algorithm for Set Cover (PS), pp. 435–441.
- TACAS-1996-BerghammerKU #algebra #perspective #petri net
- Realtion-Algebraic Analysis of Petri Nets with RELVIEW (RB, BvK, CU), pp. 49–69.
- TACAS-1996-HermannsMR #algebra #probability #process
- A Construction and Analysis Tool Based on the Stochastic Process Algebra TIPP (HH, VM, MR), pp. 427–430.
- TACAS-1996-Rauzy #constraints #reduction #specification #using
- Using the Constraint Language Toupie for “Software Cost Reduction” Specification Analysis (AR), p. 417.
- CAV-1996-CamposG #model checking #verification
- Selective Quantitative Analysis and Interval Model Checking: Verifying Different Facets of a System (SVAC, OG), pp. 257–268.
- CAV-1996-ClarkeBLXS #bound #named #realtime #specification #tool support #visual notation
- XVERSA: An Integrated Graphical and Textual Toolset for the Specification and Analysis of Resource-Bound Real-Time Sytems (DC, HBA, IL, HlX, OS), pp. 402–405.
- CAV-1996-MerinoT #communication #integration #named #protocol #verification
- EVP: Integration of FDTs for the Analysis and Verification of Communication Protocols (PM, JMT), pp. 406–410.
- CAV-1996-TripakisY #bisimulation
- Analysis of Timed Systems Based on Time-Abstracting Bisimulation (ST, SY), pp. 232–243.
- ISSTA-1996-ChamillardC #concurrent #petri net #source code
- Improving the Accuracy of Petri Net-Based Analysis of Concurrent Programs (ATC, LAC), pp. 24–38.
- ISSTA-1996-DaranT #case study #fault
- Software Error Analysis: A Real Case Study Involving Real Faults and Mutations (MD, PTF), pp. 158–171.
- ISSTA-1996-Heimdahl #case study #experience #lessons learnt
- Experiences and Lessons from the Analysis of TCAS II (MPEH), pp. 79–83.
- ISSTA-1996-HowdenS #linear #sequence
- Linear and Structural Event Sequence Analysis (WEH, GMS), pp. 98–106.
- ISSTA-1996-KangL #generative #performance #realtime
- An Efficient State Space Generation for Analysis of Real-Time Systems (IK, IL), pp. 4–13.
- ISSTA-1996-MorellM #testing #using
- Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets (LJM, BWM), pp. 92–97.
- ISSTA-1996-PezzeY #generative #multi #tool support
- Generation of Multi-Formalism State-Space Analysis Tools (MP, MY), pp. 172–179.
- ISSTA-1996-PomakisA #feature model #interactive #reachability
- Reachability Analysis of Feature Interactions: A Progress Report (KPP, JMA), pp. 216–223.
- ISSTA-1996-Tracz #architecture
- Test and Analysis of Software Architectures (WT), pp. 1–3.
- JICSLP-1996-FalaschiHW #concurrent #constraints #source code
- Demand Transformation Analysis for Concurrent Constraint Programs (MF, PH, WHW), pp. 333–347.
- LICS-1996-BasinG #complexity #order
- Complexity Analysis Based on Ordered Resolution (DAB, HG), pp. 456–465.
- LICS-1996-Davies #approach
- A Temporal-Logic Approach to Binding-Time Analysis (RD), pp. 184–195.
- ICDAR-v1-1995-EspositoMS #approach #knowledge-based #layout
- A knowledge-based approach to the layout analysis (FE, DM, GS), pp. 466–471.
- ICDAR-v1-1995-GarciaDPC #detection #fault #pseudo #recognition #using
- Error detection in character recognition using pseudosyllable analysis (RGG, YAD, FMP, JLC), pp. 446–449.
- ICDAR-v1-1995-GreenK #modelling
- Model-based analysis of printed tables (EAG, MSK), pp. 214–217.
- ICDAR-v1-1995-HoriD #reasoning #robust
- Robust table-form structure analysis based on box-driven reasoning (OH, DSD), pp. 218–221.
- ICDAR-v1-1995-LeTW #documentation #image #using
- Document image analysis using integrated image and neural processing (DXL, GRT, HW), pp. 327–330.
- ICDAR-v1-1995-TwaakyondoO #recognition
- Structure analysis and recognition of mathematical expressions (HMT, MO), pp. 430–437.
- ICDAR-v2-1995-AlimiG #fault #online #recognition
- The analysis of error in an on-line recognition system of Arabic handwritten characters (AMA, OAG), pp. 890–893.
- ICDAR-v2-1995-CouasnonC #documentation #music #recognition
- A way to separate knowledge from program in structured document analysis: application to optical music recognition (BC, JC), pp. 1092–1097.
- ICDAR-v2-1995-FutrelleN #constraints #diagrams #parsing #performance #using
- Efficient analysis of complex diagrams using constraint-based parsing (RPF, NN), pp. 782–790.
- ICDAR-v2-1995-Hirayama #using
- A method for table structure analysis using DP matching (YH), pp. 583–586.
- ICDAR-v2-1995-Hoch #documentation #named #recognition
- READLEX: a lexicon for the recognition and analysis of structured documents (RH), pp. 549–552.
- ICDAR-v2-1995-Liu-GongDP #documentation #layout #recognition
- A general analysis system for document’s layout structure recognition (YHLG, BD, HNP), pp. 597–600.
- ICDAR-v2-1995-LuLC #documentation #named #retrieval
- TheSys — A comprehensive thesaurus system for intelligent document analysis and text retrieval (CL, KHL, HYC), pp. 1169–1173.
- ICDAR-v2-1995-PavlidisSS #graph
- Matching graph embeddings for shape analysis (TP, WJS, HS), pp. 729–733.
- ICDAR-v2-1995-SauvolaP #classification #feature model #performance #segmentation #using
- Page segmentation and classification using fast feature extraction and connectivity analysis (JJS, MP), pp. 1127–1131.
- ICDAR-v2-1995-TangMMLS #approach #documentation
- A new approach to document analysis based on modified fractal signature (YYT, HM, XM, DL, CYS), pp. 567–570.
- ICDAR-v2-1995-TrierTJ
- Data capture from maps based on gray scale topographic analysis (ØDT, TT, AKJ), pp. 923–926.
- ICSM-1995-Williams #case study #design #experience #object-oriented #using
- Using object oriented analysis and design in a non-object oriented environment experience report (KW), p. 109–?.
- WCRE-1995-LeiteC #specification
- Recovering Business Rules from Structured Analysis Specifications (JCSdPL, PMC), pp. 13–21.
- FPCA-1995-JeuringS #functional #problem #source code
- Constructing Functional Programs for Grammar Analysis Problems (JJ, SDS), pp. 259–269.
- CHI-1995-AalstCM #design #framework #learning #user interface
- Design Space Analysis as “Training Wheels” in a Framework for Learning User Interface Design (JWvA, TTC, DLM), pp. 154–161.
- CAiSE-1995-DuffyMMM #automation #framework #reasoning #requirements #using
- A Framework for Requirements Analysis Using Automated Reasoning (DAD, CM, JAM, PM), pp. 68–81.
- CAiSE-1995-Herbst #metamodelling
- A Meta-Model for Business Rules in Systems Analysis (HH), pp. 186–199.
- CAiSE-1995-OpdahlS #modelling #problem
- Facet Models for Problem Analysis (ALO, GS), pp. 54–67.
- ICML-1995-Cussens #algorithm #finite #learning
- A Bayesian Analysis of Algorithms for Learning Finite Functions (JC), pp. 142–149.
- SEKE-1995-Debenham #approach #design #knowledge-based #requirements #specification
- A Unified Approach to Requirements Specification and System Analysis in the Design of Knowledge-Based Systems (JKD), p. 144.
- SEKE-1995-LuD #distributed #object-oriented #simulation #specification
- An Environment for Specification, Simulation and Analysis of Distributed Object-Oriented Systems (SL, YD), pp. 402–410.
- SIGIR-1995-Dubin #documentation #visualisation
- Document Analysis for Visualization (DD), pp. 199–204.
- SIGIR-1995-Ornager #clustering #database #empirical #image #word
- The Newspaper Image Database: Empirical Supported Analysis of Users’ Typology and Word Association Clusters (SO), pp. 212–218.
- ECOOP-1995-DeanGC #object-oriented #optimisation #source code #using
- Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis (JD, DG, CC), pp. 77–101.
- AdaEurope-1995-SchneeweissAV #ada #modelling #object-oriented
- Translating Shlaer/Mellor Object-Oriented Analysis Models into Ada 95 (HS, VA, OV), pp. 249–270.
- AdaEurope-1995-Simoens #design #development #lifecycle #metric #object-oriented
- The Introduction of an Object-Oriented Analysis/Design Method and Object-Oriented Metrics in the Software Development Life-Cycle (RS), pp. 271–283.
- PEPM-1995-Cridlig #concurrent #model checking #semantics #using
- Semantic Analysis of Shared-Memory Concurrent Languages using Abstract Model-Checking (RC), pp. 214–225.
- PEPM-1995-DasRH #imperative #semantics #source code
- Semantic Foundations of Binding Time Analysis for Imperative Programs (MD, TWR, PVH), pp. 100–110.
- PEPM-1995-Jensen #data flow #source code
- Clock Analysis of Synchronous Dataflow Programs (TPJ), pp. 156–167.
- PEPM-1995-Lu #logic programming #source code
- Type Analysis of Logic Programs in the Presence of Type Definitions (LL), pp. 241–252.
- PEPM-1995-RamakrishnanRS #constraints #framework #logic programming #source code #theorem proving
- A Symbolic Constraint Solving Framework for Analysis of Logic Programs (CRR, IVR, RCS), pp. 12–23.
- PEPM-1995-Reps #problem
- Shape Analysis as a Generalized Path Problem (TWR), pp. 1–11.
- PLDI-1995-AikenFL #higher-order #memory management
- Better Static Memory Management: Improving Region-Based Analysis of Higher-Order Languages (AA, MF, RL), pp. 174–185.
- PLDI-1995-Ruf #alias
- Context-Insensitive Alias Analysis Reconsidered (ER), pp. 13–22.
- PLDI-1995-WilsonL #c #performance #pointer #source code
- Efficient Context-Sensitive Pointer Analysis for C Programs (RPW, MSL), p. 1–?.
- PLILP-1995-MasseyT #array #comprehension
- Modes of Comprehension: Mode Analysis of Arrays and Array Comprehensions (BCM, ET), pp. 207–222.
- PLILP-1995-MycroftS
- Uniform PERs and Comportment Analysis (AM, KLS), pp. 169–187.
- POPL-1995-AltucherL #alias
- An Extended Form of Must Alias Analysis for Dynamic Allocation (RA, WL), pp. 74–84.
- POPL-1995-HarperM #compilation #morphism #polymorphism #using
- Compiling Polymorphism Using Intensional Type Analysis (RH, JGM), pp. 130–141.
- POPL-1995-JagannathanW #higher-order
- A Unified Treatment of Flow Analysis in Higher-Order Languages (SJ, SW), pp. 393–407.
- POPL-1995-PalsbergO #type system
- A Type System Equivalent to Flow Analysis (JP, PO), pp. 367–378.
- POPL-1995-RepsHS #data flow #graph #interprocedural #precise #reachability
- Precise Interprocedural Dataflow Analysis via Graph Reachability (TWR, SH, SS), pp. 49–61.
- SAS-1995-DussartHM #polymorphism #polynomial #recursion #type system
- Polymorphic Recursion and Subtype Qualifications: Polymorphic Binding-Time Analysis in Polynomial Time (DD, FH, CM), pp. 118–135.
- SAS-1995-Giesl #functional #order #source code #termination #using
- Termination Analysis for Functional Programs using Term Orderings (JG), pp. 154–171.
- SAS-1995-Hannan #functional #stack #type system
- A Type-based Analysis for Stack Allocation in Functional Languages (JH), pp. 172–188.
- SAS-1995-Heintze #control flow #type system
- Control-Flow Analysis and Type Systems (NH), pp. 189–206.
- SAS-1995-JagannathanW #effectiveness #runtime
- Effective Flow Analysis for Avoiding Run-Time Checks (SJ, AKW), pp. 207–224.
- SAS-1995-Mohnen #higher-order #inheritance #performance
- Efficient Closure Utilisation by Higher-Order Inheritance Analysis (MM), pp. 261–278.
- SAS-1995-Seward #haskell #implementation #polymorphism #prototype
- Beyond Prototype Implementations: Polymorphic Projection Analysis for Glasgow Haskell (JS), pp. 382–399.
- SAS-1995-Vedrine #abstract interpretation #strict
- Binding-Time Analysis and Strictness Analysis by Abstract Interpretation (FV), pp. 400–417.
- TRI-Ada-1995-Shumate95b #design #functional #object-oriented #requirements
- BATCES Solution #1: An Object-Oriented Design from Functional Requirements Analysis (KS), pp. 737–739.
- RE-1995-AtleeM #requirements #safety
- Integrating requirements analysis and safety analysis (JMA, JAM), pp. 158–159.
- RE-1995-BustardL #formal method #modelling
- Enhancing soft systems analysis with formal modelling (DWB, PJL), pp. 164–171.
- RE-1995-PottsTSO #evaluation #internet #requirements
- An evaluation of inquiry-based requirements analysis for an Internet service (CP, KT, JDS, KO), pp. 172–180.
- ESEC-1995-Chamillard #case study #metric #performance #predict #reachability
- An Exploratory Study of Program Metrics as Predictors of Reachability Analysis Performance (ATC), pp. 343–361.
- ESEC-1995-GaskellP #ambiguity #execution #semantics
- A Structured Analysis Formalism with Execution Semantics to Allow Unambiguous Model Interpretation (CG, RP), pp. 235–253.
- ESEC-1995-WagnerG #incremental
- Integrating Incremental Analysis with Version Management (TAW, SLG), pp. 205–218.
- FSE-1995-CheungK #composition #constraints #distributed #finite #reachability
- Compositional Reachability Analysis of Finite-State Distributed Systems with User-Specified Constraints (SCC, JK), pp. 140–150.
- FSE-1995-HorwitzRS #data flow #interprocedural
- Demand Interprocedural Dataflow Analysis (SH, TWR, SS), pp. 104–115.
- ICSE-1995-HeimdahlL #consistency #requirements
- Completeness and Consistency Analysis of State-Based Requirements (MPEH, NGL), pp. 3–14.
- ICSE-1995-HenningerLR #approach #learning
- An Organizational Learning Approach to Domain Analysis (SH, KL, AR), pp. 95–104.
- SAC-1995-ChenH #algorithm #concurrent #database #performance
- Performance analysis of a periodic data reorganization algorithm for concurrent B-trees in database systems (IRC, SH), pp. 40–45.
- SAC-1995-Serrano #compilation #control flow #functional #paradigm
- Control flow analysis: a functional languages compilation paradigm (MS), pp. 118–122.
- SAC-1995-SmithPN #network #performance
- Performance analysis of small FDDI networks (JS, LDP, TN), pp. 401–405.
- SAC-1995-WongP #design
- Design and analysis of fractals in an individual computing environment (KWW, JP), pp. 431–433.
- DAC-1995-LeeT #algorithm #incremental
- An Algorithm for Incremental Timing Analysis (JfL, DTT), pp. 696–701.
- DAC-1995-LiM #embedded #performance #using
- Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 456–461.
- DAC-1995-Rao #distributed
- Delay Analysis of the Distributed RC Line (VBR), pp. 370–375.
- DAC-1995-Ribas-XirgoC #fault #simulation
- Analysis of Switch-Level Faults by Symbolic Simulation (LR, JC), pp. 352–357.
- DAC-1995-RohfleischWA #logic #optimisation
- Logic Clause Analysis for Delay Optimization (BR, BW, KA), pp. 668–672.
- DAC-1995-TelicheveskyKW #performance
- Efficient Steady-State Analysis Based on Matrix-Free Krylov-Subspace Methods (RT, KSK, JW), pp. 480–484.
- DAC-1995-TremblayMIK #architecture #flexibility #performance #trade-off
- A Fast and Flexible Performance Simulator for Micro-Architecture Trade-off Analysis on UltraSPARC-I (MT, GM, AI, LK), pp. 2–6.
- DAC-1995-WempleY #megamodelling #using
- Mixed-Signal Switching Noise Analysis Using Voronoi-Tessellated Substrate Macromodels (ILW, ATY), pp. 439–444.
- LCT-RTS-1995-CamposCMM #finite #named #realtime
- Verus: A Tool for Quantitative Analysis of Finite-State Real-Time Systems (SVAC, EMC, WRM, MM), pp. 70–78.
- LCT-RTS-1995-JourdanM #realtime
- Static Timing Analysis of Real-Time Systems (MJ, FM), pp. 79–87.
- LCT-RTS-1995-KoWH #constraints
- Supporting User-Friendly Analysis of Timing Constraints (LK, DBW, MGH), pp. 99–107.
- LCT-RTS-1995-LiM #embedded #performance #using
- Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 88–98.
- LCT-RTS-1995-NilsenR #execution #worst-case
- Worst-Case Execution Time Analysis on Modern Processors (KDN, BR), pp. 20–30.
- PDP-1995-EspasaVPJA
- Quantitative analysis of vector code (RE, MV, DAP, MJ, EA), pp. 452–463.
- PPoPP-1995-CollardBF #array #data flow #fuzzy
- Fuzzy Array Dataflow Analysis (JFC, DB, PF), pp. 92–101.
- STOC-1995-GhoshLMMPRRTZ #algorithm
- Tight analyses of two local load balancing algorithms (BG, FTL, BMM, SM, CGP, RR, AWR, RET, DZ), pp. 548–558.
- TACAS-1995-KnoopSV #exclamation #explosion #for free #parallel
- Parallelism for Free: Bitvector Analyses -> No State Explosion! (JK, BS, JV), pp. 264–289.
- TAPSOFT-1995-Palsberg
- Comparing Flow-Based Binding-Time Analyses (JP), pp. 561–574.
- TAPSOFT-1995-SagivRH #constant #data flow #interprocedural #precise
- Precise Interprocedural Dataflow Analysis with Applications to Constant Propagation (SS, TWR, SH), pp. 651–665.
- TAPSOFT-1995-Solberg #strict
- Strictness and Totality Analysis with Conjunction (KLS), pp. 501–515.
- CAV-1995-EirikssonM #case study #design #using #verification
- Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
- CAV-1995-HenzingerH #algorithm #hybrid
- Algorithmic Analysis of Nonlinear Hybrid Systems (TAH, PHH), pp. 225–238.
- CAV-1995-HoW #automation #protocol
- Automated Analysis of an Audio Control Protocol (PHH, HWT), pp. 381–394.
- CAV-1995-HulgaardB #performance #petri net
- Efficient Timing Analysis of a Class of Petri Nets (HH, SMB), pp. 423–436.
- ICLP-1995-HeintzeJ #algorithm
- A Generic Algorithm for CLP Analysis (NH, JJ), pp. 49–63.
- ICLP-1995-HermenegildoPMS #incremental #logic programming #source code
- Incremental Analysis of Logic Programs (MVH, GP, KM, PJS), pp. 797–811.
- ICLP-1995-ZhaoCU #concurrent #dependence #logic programming #source code
- Program Dependence Analysis of Concurrent Logic Programs and Its Applications (JZ, JC, KU), p. 825.
- ILPS-1995-BandaMS #logic programming #performance #scheduling #source code
- Efficient Analysis of Logic Programs with Dynamic Scheduling (MJGdlB, KM, PJS), pp. 417–431.
- ILPS-1995-Lindgren #control flow #prolog
- Control Flow Analysis of Prolog (TL), pp. 432–446.
- LICS-1995-Wang #behaviour #realtime
- Timing Behavior Analysis for Real-Time Systems (FW), pp. 112–122.
- DL-1994-FayyadS #approach #automation #image #library #machine learning
- The Automated Analysis, Cataloging, and Searching of Digital Image Libraries: A Machine Learning Approach (UMF, PS), pp. 225–249.
- PODS-1994-FaloutsosK #concept #independence #using
- Beyond Uniformity and Independence: Analysis of R-trees Using the Concept of Fractal Dimension (CF, IK), pp. 4–13.
- VLDB-1994-BaralisW #algebra #approach #database
- An Algebraic Approach to Rule Analysis in Expert Database Systems (EB, JW), pp. 475–486.
- CSEE-1994-HartrumB #education #object-oriented
- Teaching Formal Extensions of Informal-Based Object-Oriented Analysis Methodologies (TCH, PDB), pp. 389–409.
- ICSM-1994-BriandBKS #maintenance #process
- A Change Analysis Process to Characterize Software Maintenance Projects (LCB, VRB, YMK, DRS), pp. 38–49.
- ICSM-1994-DeBaudMR #reverse engineering
- Domain Analysis and Reverse Engineering (JMD, BM, SR), pp. 326–335.
- ICSM-1994-GuptaS #data flow #framework
- A Framework for Partial Data Flow Analysis (RG, MLS), pp. 4–13.
- ICSM-1994-MatwinA #automation #composition #reuse #using
- Reuse of Modular Software with Automated Comment Analysis (SM, AA), pp. 222–231.
- ICALP-1994-HoftingW #graph #polynomial
- Polynomial Time Analysis of Torodial Periodic Graphs (FH, EW), pp. 544–555.
- ICALP-1994-HotzP #context-free grammar #performance
- Fast Uniform Analysis of Coupled-Context-Free Languages (GH, GP), pp. 412–423.
- ICALP-1994-KanellakisHM #re-engineering
- An Analysis of the Core-ML Language: Expressive Power and Type Reconstruction (PCK, GGH, HGM), pp. 83–105.
- ICALP-1994-Sanchez-CousoF #pattern matching #probability
- Average-Case Analysis of Pattern-Matching in Trees under the BST Probability Model (JRSC, MIFC), pp. 178–190.
- FME-1994-Cherkaoui #security #specification
- Specification and Analysis of a Security Management System (OC), pp. 66–82.
- LFP-1994-Heintze #ml #source code
- Set-Based Analysis of ML Programs (NH), pp. 306–317.
- LFP-1994-StefanescuZ #equation #framework #functional #higher-order #source code
- An Equational Framework for the Flow Analysis of Higher Order Functional Programs (DCS, YZ), pp. 318–327.
- CHI-1994-HaunoldK94a
- A keystroke level analysis of a graphics application: manual map digitizing (PH, WK), pp. 337–343.
- CHI-1994-IrvingPI94a #automation
- A GOMS analysis of the advanced automated cockpit (SI, PGP, JEI), pp. 344–350.
- CHI-1994-Newman94a #human-computer #research #using
- A Preliminary Analysis of the Products of HCI Research, Using Pro Forma Abstracts (WN), pp. 278–284.
- CAiSE-1994-AntonMP #composition #process #re-engineering
- Goal Decomposition and Scenario Analysis in Business Process Reengineering (AIA, WMM, CP), pp. 94–104.
- CAiSE-1994-Kurbel #automation #case study #code generation #experience #using
- From Analysis to Code Generation: Experiences from an Information Engineering Project Using I-CASE Technology (KK), pp. 214–227.
- ICML-1994-SchapireW #algorithm #learning #on the #worst-case
- On the Worst-Case Analysis of Temporal-Difference Learning Algorithms (RES, MKW), pp. 266–274.
- KDD-1994-MatheusPM
- An Application of KEFM to the Analysis of Healthcare Information (CJM, GPS, DM), pp. 441–452.
- SEKE-1994-AbranDMMS #hypermedia #learning #using
- Structured hypertext for using and learning function point analysis (AA, JMD, DM, MM, DSP), pp. 164–171.
- SEKE-1994-FigueiredoPC #fuzzy #petri net #realtime #using
- Timing analysis of real-time software systems using fuzzy time Petri nets (JCAdF, AP, SKC), pp. 257–266.
- SEKE-1994-LuqiG #certification #synthesis
- Suggestions for progress in software analysis, synthesis and certification (L, JAG), pp. 501–507.
- SEKE-1994-Meskens #knowledge-based #quality
- A knowledge-based system for software quality analysis (NM), pp. 180–187.
- SIGIR-1994-Hoch #classification #documentation #information retrieval #using
- Using IR Techniques for Text Classification in Document Analysis (RH), pp. 31–40.
- SIGIR-1994-MoritaS #behaviour #information management #retrieval
- Information Filtering Based on User Behaviour Analysis and Best Match Text Retrieval (MM, YS), pp. 272–281.
- SIGIR-1994-ShoensTG #incremental #performance
- Synthetic Workload Performance Analysis of Incremental Updates (KAS, AT, HGM), pp. 329–338.
- ECOOP-1994-BriggsW #design #object-oriented #specification
- A Specification Language for Object-Oriented Analysis and Design (TLB, JW), pp. 365–385.
- ECOOP-1994-MoreiraC #object-oriented
- Combining Object-Oriented Analysis and Formal Description Techniques (AMDM, RGC), pp. 344–364.
- TOOLS-EUROPE-1994-BaelenLS #constraints #design #object-oriented
- Constraints in Object-Oriented Analysis and Design (SVB, JL, ES), pp. 185–199.
- TOOLS-EUROPE-1994-Firesmith #design #logic #requirements
- O-O Requirements Analysis and Logical Design (DF), p. 513.
- TOOLS-EUROPE-1994-Fowler #comparison #design
- Comparison of Analysis and Design Methods (MF), p. 517.
- TOOLS-EUROPE-1994-Goldberg #c++ #design #object-oriented
- Object-Oriented Analysis and Design with C++ (MG), p. 531.
- TOOLS-EUROPE-1994-Graham #case study #object-oriented #process #re-engineering #requirements
- Beyond the Use Case: Combining Task Analysis and Scripts in Object-Oriented Requirements Capture and Business Process Re-engineering (IMG), pp. 203–215.
- AdaEurope-1994-Anderson94a #case study #development #experience #object-oriented
- Experiences Integrating Object-Oriented Analysis with Joint Application Development (JAD) (JAA), pp. 509–521.
- AdaEurope-1994-Noseck #reuse
- Cost-Benefit Analysis for Software-Reuse — A Decision Procedure (HN), pp. 397–405.
- AdaEurope-1994-ObermayerSSKKL #ada #realtime
- Portability Effort Estimates for Real Time Applications Written in Ada Through Static Code Analysis (PEO, JS, GS, AK, PK, RL), pp. 483–488.
- ALP-1994-AlpuenteFV #composition #equation #source code
- Compositional Analysis for Equational Horn Programs (MA, MF, GV), pp. 77–94.
- ALP-1994-FerreiraZ #termination
- Syntactical Analysis of Total Termination (MCFF, HZ), pp. 204–222.
- LOPSTR-1994-BoulangerB #logic programming #program transformation #using
- Using Call/Exit Analysis for Logic Program Transformation (DB, MB), pp. 36–50.
- LOPSTR-1994-CookG #source code #termination
- A Transformation System for Definite Programs Based on Termination Analysis (JC, JPG), pp. 51–68.
- PEPM-1994-BirkedalW #ml #standard
- Binding-Time Analysis for Standard ML (LB, MW), pp. 61–71.
- PEPM-1994-Davis
- PERs from Projections for Binding-Time Analysis (KD), pp. 53–60.
- PLDI-1994-Deutsch #alias #interprocedural #pointer
- Interprocedural May-Alias Analysis for Pointers: Beyond k-limiting (AD), pp. 230–241.
- PLDI-1994-EmamiGH #interprocedural #pointer #points-to
- Context-Sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers (ME, RG, LJH), pp. 242–256.
- PLDI-1994-HentenryckCC #graph #prolog #using
- Type Analysis of Prolog Using Type Graphs (PVH, AC, BLC), pp. 337–348.
- PLDI-1994-SabryF #continuation #data flow #question
- Is Continuation-Passing Useful for Data Flow Analysis? (AS, MF), pp. 1–12.
- PLDI-1994-Wismuller #data flow #debugging #source code #using
- Debugging of Globally Optimized Programs Using Data Flow Analysis (RW), pp. 278–289.
- PLILP-1994-Serrano #compilation #control flow #functional #higher-order #using
- Using Higher-Order Control Flow Analysis When Compiling Functional Languages (MS), pp. 447–448.
- POPL-1994-HankinM #algorithm #strict #type inference
- Deriving Algorithms From Type Inference Systems: Application to Strictness Analysis (CH, DLM), pp. 202–212.
- POPL-1994-Maslov #array #data flow #dependence #lazy evaluation
- Lazy Array Data-Flow Dependence Analysis (VM), pp. 311–325.
- SAS-1994-ArmstrongMSS #algebra #dependence #performance #representation
- Boolean Functions for Dependency Analysis: Algebraic Properties and Efficient Representation (TA, KM, PS, HS), pp. 266–280.
- SAS-1994-Consel #fixpoint #performance #strict
- Fast Strictness Analysis Via Symbolic Fixpoint Iteration (CC), pp. 423–431.
- SAS-1994-Garza-SalazarB #array
- Uniqueness and Completeness Analysis of Array Comprehensions (DAGS, APWB), pp. 193–207.
- SAS-1994-HanusZ #functional #logic programming #source code
- Mode Analysis of Functional Logic Programs (MH, FZ), pp. 26–42.
- SAS-1994-Henglein #fixpoint #strict #type system
- Iterative Fixed Point Computation for Type-Based Strictness Analysis (FH), pp. 395–407.
- SAS-1994-JensenHR #haskell #performance #strict
- Efficient Strictness Analysis of Haskell (KDJ, PH, MR), pp. 246–362.
- SAS-1994-Jorgensen #finite #fixpoint #using
- Finding Fixpoints in Finite Function Spaces Using Neddedness Analysis and Chaotic Iteration (NJ), pp. 329–345.
- SAS-1994-LisperC
- Extended Analysis of Data Fields (BL, JFC), pp. 208–222.
- SAS-1994-MuellerW #behaviour #on the fly #performance #simulation
- Efficient On-the-fly Analysis of Program Behavior and Static Cache Simulation (FM, DBW), pp. 101–115.
- SAS-1994-Solberg #strict
- Strictness and Totality Analysis (KLS), pp. 408–422.
- ICRE-1994-DrakeT #bound
- System bounding issues for analysis (JMD, WTT), pp. 24–31.
- ICRE-1994-Eckert #object-oriented
- Types, classes and collections in object-oriented analysis (GE), pp. 32–39.
- ICRE-1994-GotelF #problem #requirements #traceability
- An analysis of the requirements traceability problem (OCZG, AF), pp. 94–101.
- ICRE-1994-HollandSCC #case study #information management
- The directorate information system at St Thomas’ hospital: a study in domain analysis (JH, PHS, ERC, BC), pp. 102–109.
- ICRE-1994-HughesRS #requirements #taxonomy
- Taxonomy for requirements analysis (KJH, RMR, CTS), pp. 176–179.
- ICRE-1994-White #comparative #embedded #requirements
- Comparative analysis of embedded computer system requirements methods (SMW), pp. 126–134.
- FSE-1994-CorbettA #composition #scalability #towards
- Towards Scalable Compositional Analysis (JCC, GSA), pp. 53–61.
- FSE-1994-DwyerC #concurrent #data flow #source code #verification
- Data Flow Analysis for Verifying Properties of Concurrent Programs (MBD, LAC), pp. 62–75.
- FSE-1994-VandevoordeG #composition #runtime #using
- Using Specialized Procedures and Specification-Based Analysis to Reduce the Runtime Costs of Modularity (MTV, JVG), pp. 121–127.
- ICSE-1994-CheungK #behaviour #distributed #effectiveness
- An Integrated Method for Effective Behaviour Analysis of Distributed Systems (SCC, JK), pp. 309–320.
- ICSE-1994-DevanbuRW #automation #testing #tool support
- Automated Construction of Testing and Analysis Tools (PTD, DSR, ALW), pp. 241–250.
- ICSE-1994-YuM #comprehension #design #modelling #process #why
- Understanding “Why” in Software Process Modelling, Analysis, and Design (ESKY, JM), pp. 159–168.
- KBSE-1994-ChilenskiN #specification #test coverage #tool support
- Formal Specification Tools for Test Coverage Analysis (JC, PN), pp. 59–68.
- SAC-1994-Arango
- A brief introduction to domain analysis (GA), pp. 42–46.
- SAC-1994-ChenB #concurrent #database #detection #performance #petri net #transaction
- A Petri net model for the performance analysis of transaction database systems with continuous deadlock detection (IRC, RB), pp. 539–544.
- SAC-1994-Foster #education #named #using
- FRA: using a goal-based scenario to teach financial statement analysis (DAF), pp. 568–572.
- SAC-1994-GabbrielliG #logic programming #source code
- Goal independency and call patterns in the analysis of logic programs (MG, RG), pp. 394–399.
- SAC-1994-LiMC #fuzzy #performance
- Performance analysis of fuzzy proportional-derivative control systems (HL, HAM, GC), pp. 115–119.
- SAC-1994-MerkleL #algorithm #parallel #performance #search-based
- An initial analysis of data parallelism in the fast messy genetic algorithm (LDM, GBL), pp. 488–492.
- SAC-1994-OsborneH #development #interactive
- Development of an interactive weather analysis and display system to support agricultural planning (LFO, BCH), pp. 346–350.
- CC-1994-CheathamGS #interpreter #tool support
- A Suite of Analysis Tools Based on a General Purpose Abstract Interpreter (TC, HG, DCS), pp. 188–202.
- CC-1994-Reps #interprocedural #problem
- Solving Demand Versions of Interprocedural Analysis Problems (TWR), pp. 389–403.
- CC-1994-UhlH
- Flow Grammars — a Flow Analysis Methodology (JSU, RNH), pp. 203–217.
- DAC-1994-BhattacharyaDB94a #optimisation #performance #specification
- Performance Analysis and Optimization of Schedules for Conditional and Loop-Intensive Specifications (SB, SD, FB), pp. 491–496.
- DAC-1994-ChenF #using
- Transient Sensitivity Computation of MOSFET Circuits Using Iterated Timing Analysis and Selective-Tracing Waveform Eelaxation (CJC, WSF), pp. 581–585.
- DAC-1994-HachtelMPS #finite #probability #scalability #state machine
- Probabilistic Analysis of Large Finite State Machines (GDH, EM, AP, FS), pp. 270–275.
- DAC-1994-KahngM #equation #using
- Delay Analysis of VLSI Interconnections Using the Diffusion Equation Model (ABK, SM), pp. 563–569.
- DAC-1994-LeviaMR #design
- Lessons in Language Design: Cost/Benefit analysis of VHDL Features (OL, SM, JR), pp. 447–453.
- DAC-1994-NielsenK #performance #simulation
- Performance Analysis Based on Timing Simulation (CDN, MK), pp. 70–76.
- EDAC-1994-BaharCHMS #using
- Timing Analysis of Combinational Circuits using ADD’s (RIB, HC, GDH, EM, FS), pp. 625–629.
- EDAC-1994-BrashearMOPM #performance #predict #statistics #using
- Predicting Circuit Performance Using Circuit-level Statistical Timing Analysis (RBB, NM, CO, LTP, MRM), pp. 332–337.
- EDAC-1994-Rodriguez-MontanesF #fault #testing
- Analysis of Bridging Defects in Sequential CMOS Circuits and their Current Testability (RRM, JF), pp. 356–360.
- EDAC-1994-SafiniaLS #functional #modelling
- Taking Advantage of High Level Functional Information to Refine Timing Analysis and Timing Modeling (CS, RL, GS), pp. 349–353.
- EDAC-1994-SivaramanS #parametricity #towards
- Towards Incorporating Device Parameter Variations in Timing Analysis (MS, AJS), pp. 338–342.
- EDAC-1994-Stroele
- Signature Analysis for Sequential Circuits with Reset (APS), pp. 113–118.
- EDAC-1994-XueDJ #fault #float #probability
- Probability Analysis for CMOS Floating Gate Faults (HX, CD, JAGJ), pp. 443–448.
- HPDC-1994-BurrellMP #capacity #implementation #multi #network #performance #protocol
- Performance Analysis of a New Implementation Efficient Capacity Allocation Protocol for Multimedia Traffic in ATM Networks (AB, DM, PPK), pp. 51–60.
- PDP-1994-McConnellMMM #migration #monitoring #parallel #source code
- Monitoring, Analysis And Tuning Of Parallel Programs Within The Fortport Migration Environment (RM, PM, JFM, PM), pp. 479–485.
- ESOP-J-1992-NielsonN94
- The Tensor Product in Wadler’s Analysis of Lists (FN, HRN), pp. 327–354.
- ESOP-1994-HankinM #lazy evaluation #strict #type inference
- Lazy Type Inference for the Strictness Analysis of Lists (CH, DLM), pp. 257–271.
- ESOP-1994-HengleinM #polymorphism
- Polymorphic Binding-Time Analysis (FH, CM), pp. 287–301.
- ESOP-1994-JeuringS #bottom-up #functional
- Bottom-up Grammar Analysis — A Functional Formulation (JJ, SDS), pp. 317–332.
- ESOP-1994-King
- A Synergistic Analysis for Sharing and Groundness with Traces Linearity (AK), pp. 363–378.
- STOC-1994-BlumFJKMR #fourier #learning #query #statistics #using
- Weakly learning DNF and characterizing statistical query learning using Fourier analysis (AB, MLF, JCJ, MJK, YM, SR), pp. 253–262.
- STOC-1994-JacquetS #algorithm #equation #functional
- A functional equation often arising in the analysis of algorithms (PJ, WS), pp. 780–789.
- ICLP-1994-Kagedal #data flow #prolog
- A Dataflow Analysis Method for Ground Prolog (AK), p. 746.
- ILPS-1994-BraemCMH #prolog
- Cardinality Analysis of Prolog (CB, BLC, SM, PVH), pp. 457–471.
- ILPS-1994-BuenoBH #automation #effectiveness #parallel #strict
- Effectiveness of Global Analysis in Strict Independence-Based Automatic Parallelization (FB, MJGdlB, MVH), pp. 320–336.
- ILPS-1994-Giacobazzi #abduction #composition #logic programming #source code
- Abductive Analysis of Modular Logic Programs (RG), pp. 377–391.
- ILPS-1994-SwiftW #evaluation #source code
- Analysis of SLG-WAM Evaluation of Definite Programs (TS, DSW), pp. 219–235.
- ISSTA-1994-BuyS #petri net #realtime #source code
- Analysis of Real-Time Programs with Simple Time Petri Nets (UAB, RHS), pp. 228–239.
- ISSTA-1994-Corbett #ada #concurrent #empirical #evaluation #source code
- An Empirical Evaluation of Three Methods for Deadlock Analysis of Ada Tasking Programs (JCC), pp. 204–215.
- ISSTA-1994-FleyshgakkerW #approach #mutation testing #performance
- Efficient Mutation Analysis: A New Approach (VNF, SNW), pp. 185–195.
- ISSTA-1994-GoldbergWZ #testing
- Applications of Feasible Path Analysis to Program Testing (AG, TCW, DZ), pp. 80–94.
- ISSTA-1994-JasperBWCZ #generative #testing
- Test Data Generation and Feasible Path Analysis (RJ, MB, KEW, BC, DZ), pp. 95–107.
- ISSTA-1994-Richardson #named #testing
- TAOS: Testing with Analysis and Oracle Support (DJR), pp. 138–153.
- ISSTA-1994-Young #testing
- State-Space Analysis as an Aid to Testing (MY), p. 203.
- ICDAR-1993-Bayer #comprehension #documentation #modelling
- Understanding structured text documents by a model based document analysis system (TAB), pp. 448–453.
- ICDAR-1993-CollinTV #documentation
- Don’t tell mom I’m doing document analysis; she believes I’m in the computer vision field (SC, KT, PV), pp. 619–622.
- ICDAR-1993-Dengel93a #comprehension #documentation #information management #multi
- The role of document analysis and understanding in multi-media information systems (AD), pp. 385–390.
- ICDAR-1993-DoermannF #documentation #image
- Image based typographic analysis of documents (DSD, RF), pp. 769–773.
- ICDAR-1993-Hamada #diagrams
- A new system for the analysis of schematic diagrams (AHH), pp. 369–372.
- ICDAR-1993-HaoWN #approach #classification #documentation #layout #segmentation
- Nested segmentation: an approach for layout analysis in document classification (XH, JTLW, PAN), pp. 319–322.
- ICDAR-1993-ItoTFHU #evaluation
- Pattern analysis and evaluation of printed circuit boards (MI, YT, IF, MH, TU), pp. 798–801.
- ICDAR-1993-IttnerB #layout
- Language-free layout analysis (DJI, HSB), pp. 336–340.
- ICDAR-1993-IwaneYI #approach #classification #documentation #functional #image #layout
- A functional classification approach to layout analysis of document images (KI, MY, OI), pp. 778–781.
- ICDAR-1993-JainC #locality #using
- Bar code localization using texture analysis (AKJ, YC), pp. 41–44.
- ICDAR-1993-MadejS #automation #evaluation #statistics #towards
- Towards automatic evaluation of drawing analysis performance-A statistical model of cadastral map (DM, AS), pp. 890–893.
- ICDAR-1993-RoseE #recognition #scalability #semantics
- Semantic analysis for large vocabulary cursive script recognition (TGR, LJE), pp. 236–239.
- ICDAR-1993-TungCL #generative #performance
- Performance analysis of an OCR system via an artificial handwritten Chinese character generator (CHT, YJC, HJL), pp. 315–318.
- ICDAR-1993-Wang #comprehension #documentation #visualisation
- Machine visualization, understanding and interpretation of polyhedral line-drawings in document analysis (PSPW), pp. 882–885.
- ICDAR-1993-WieserP #image #layout
- Layout and analysis: Finding text, titles, and photos in digital images of newspaper pages (JW, AP), pp. 774–777.
- PODS-1993-PagelSTW #data type #performance #query #towards
- Towards an Analysis of Range Query Performance in Spatial Data Structures (BUP, HWS, HT, PW), pp. 214–221.
- VLDB-1993-AmatoGM #abstract interpretation #database #programming
- Data Sharing Analysis for a Database Programming Lanaguage via Abstract Interpretation (GA, FG, GM), pp. 405–415.
- VLDB-1993-RahmM #database #parallel
- Analysis of Dynamic Load Balancing Strategies for Parallel Shared Nothing Database Systems (ER, RM), pp. 182–193.
- CSM-1993-KurishimaONAF #fault
- Quantitative Analysis of Errors in Telecommunications Software (NK, HO, JiN, KA, MF), pp. 190–198.
- CSM-1993-LoyallM #dependence #maintenance #process #using
- Using Dependence Analysis to Support the Software Maintenance Process (JPL, SAM), pp. 282–291.
- WCRE-1993-ReubensteinPR #parsing #reverse engineering #tool support
- Separating Parsing and Analysis in Reverse Engineering Tools (HBR, RLP, SNR), pp. 117–125.
- ICALP-1993-CodishFMW #concurrent #constraints #logic programming #performance #source code
- Efficient Analysis of Concurrent Constraint Logic Programs (MC, MF, KM, WHW), pp. 633–644.
- FME-1993-ValmariKCL #reachability
- Putting Advanced Reachability Analysis Techniques Together: the “ARA” Tool (AV, JK, MC, ML), pp. 597–616.
- FPCA-1993-Nocker #reduction #strict #using
- Strictness Analysis using Abstract Reduction (EN), pp. 255–265.
- FPCA-1993-SastryCA #functional #strict
- Order-of-evaluation Analysis for Destructive Updates in Strict Functional Languages with Flat Aggregates (AVSS, WDC, ZMA), pp. 266–275.
- HCI-ACS-1993-BextenHM #named #simulation
- AUCA: A Tool for Presentation and Analysis of Simulation Results (EMzB, DH, CM), pp. 267–272.
- HCI-ACS-1993-BrinkmanS #fault
- Analysis and Support of Fault Diagnosis Strategies (JAB, TWvdS), pp. 115–120.
- HCI-ACS-1993-CarstensenS #requirements
- Work Analysis — Perspectives on and Requirements for a Methodology (PHC, KS), pp. 575–580.
- HCI-ACS-1993-TakedaHS93a
- Analysis of Uric Properties for Stress Caused by VDT Work and Relationship Among CFF, HRV and VEP (MT, YH, KS), pp. 903–908.
- HCI-ACS-1993-TsujiMND
- New Analysis of HRV Through Wavelet Transform (HT, HM, TN, TD), pp. 920–924.
- HCI-ACS-1993-VendaH #complexity
- Qualitative and Quantitative Analysis of Human Decision-Making Complexity (VFV, HWH), pp. 636–641.
- HCI-SHI-1993-FrascinaS #design #human-computer #interface
- Task Analysis in Design of a Human-Computer Interface for a Ward Based System (TF, RAS), pp. 226–230.
- HCI-SHI-1993-Gautsch #architecture #difference #hypermedia
- An Analysis of Hypermedia Program Architecture with Individual Differences of Learners (SG), pp. 482–487.
- HCI-SHI-1993-KatoO #using
- Task Analysis Method using the GOMS Model with Grouping (KK, KO), pp. 891–896.
- HCI-SHI-1993-KirbyH #design
- An Analysis Technique for User Centered Design (JK, HH), pp. 991–996.
- HCI-SHI-1993-MorganHCHQMO #design #implementation #interactive #knowledge base #multi #perspective
- Implementation and Design Issues in Interactive Multi-Media Knowledge Based Systems for Criminal Intelligence Analysis: The Mycroft Perspective (KM, PH, JC, LH, TQ, RM, RO), pp. 513–518.
- HCI-SHI-1993-TakeguchiTO #information management #representation #scalability
- A Knowledge Representation for Large Scale Integrated Circuit Failure Analysis (YT, TT, SO), pp. 92–97.
- HCI-SHI-1993-UetakeNTT #using
- A Meeting Support System Based on Analyses of Human-Communication — Using the Context and Contents of Meetings (TU, MN, KT, HT), pp. 967–972.
- HCI-SHI-1993-UjitaKIK
- Cooperative Work Analysis of Plant Operator Crew (HU, RK, KI, RK), pp. 955–960.
- INTERCHI-1993-HillLSW #multi
- Planning for multiple task work: an analysis of a medical reception worksystem (BH, JL, WS, AW), pp. 314–320.
- INTERCHI-1993-MacleodB #metric #music #tool support #usability #video
- MUSiC video analysis and context tools for usability measurement (MM, NB), p. 55.
- INTERCHI-1993-StaskoBL #algorithm #animation #empirical #learning
- Do algorithm animations assist learning?: an empirical study and analysis (JTS, ANB, CL), pp. 61–66.
- CAiSE-1993-BrunetCMS #object-oriented
- Object-Oriented Analysis in Practice (JB, CC, DM, FS), pp. 293–308.
- CIKM-1993-FayyadWD #automation #database #image #overview
- Automated Cataloging and Analysis of Sky Survey Image Databases: The SKICAT System (UMF, NW, SGD), pp. 527–536.
- CIKM-1993-PearceN #generative #hypermedia #n-gram
- Generating a Dynamic Hypertext Environment with n-gram Analysis (CP, CKN), pp. 148–153.
- CIKM-1993-QianFF #database #metric #object-oriented
- An Object-Oriented Database for the Display Measurement and Analysis System (YQ, EAF, WWF), pp. 384–392.
- ICML-1993-CohenCBA #automation #modelling
- Automating Path Analysis for Building Causal Models from Data (PRC, AC, LB, ASA), pp. 57–64.
- SEKE-1993-BiebowS #requirements #validation
- Acquisition, Analysis and Validation of Informal Requirements (BB, SS), pp. 109–116.
- SEKE-1993-BombanaBCFSZ #functional #testing
- An Expert Solution to Functional Testability Analysis of VLSI Circuits (MB, GB, PC, FF, DS, GZ), pp. 263–265.
- SEKE-1993-JaegerP #information management #named #specification
- BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems (TJ, AP), pp. 191–198.
- SEKE-1993-KomiyaSHKOHOO #process #specification
- An Experimental Analysis for Classifying Specification Processes (SK, MS, SH, JK, AO, HH, SO, KO), pp. 231–234.
- SIGIR-1993-AktugC #multi #query
- Analysis of Multiterm Queries in a Dynamic Signature File Organization (DA, FC), pp. 96–105.
- SIGIR-1993-Botafogo #clustering #hypermedia
- Cluster Analysis for Hypertext Systems (RAB), pp. 116–125.
- ECOOP-1993-DuboisBP #perspective #requirements
- O-O Requirements Analysis: an Agent Perspective (ED, PDB, MP), pp. 458–481.
- OOPSLA-1993-Civello #design #object-oriented
- Roles for Composite Objects in Object-Oriented Analysis and Design (FC), pp. 376–393.
- OOPSLA-1993-HoydalsvikS #object-oriented #on the
- On the Purpose of Object-Oriented Analysis (GMH, GS), pp. 240–255.
- TOOLS-EUROPE-1993-CattaneoCLZ #database #evolution #object-oriented #overview
- Overview and Progress Report of the ESSE Project: Supporting Object-Oriented Database Schema Analysis and Evolution (FC, ACP, LL, RZ), pp. 63–74.
- TOOLS-EUROPE-1993-KetabchiS #automation #documentation #generative #maintenance #using
- Automated Generation of Software Documentation Using an O.O. Analysis and Maintenance System (MAK, ESLB), pp. 167–179.
- TOOLS-EUROPE-1993-LeeS #object-oriented
- Object-Oriented Analysis in the Real World (MML, LS), pp. 127–149.
- TOOLS-EUROPE-1993-Walden #design #object-oriented
- Object-Oriented Analysis & Design (KW), p. 291.
- TOOLS-PACIFIC-1993-Firesmith93c #design #logic #object-oriented #requirements
- Object-Oriented Requirements Analysis and Logical Design (DF), p. 319.
- TOOLS-PACIFIC-1993-McEwinR #design #object-oriented
- Semiotics, Ethnomethodology, and Object-Oriented Analysis and Design Notations (JM, SR), pp. 143–151.
- TOOLS-USA-1993-Fowler #comparison #design #object-oriented
- A Comparison of Object-Oriented Analysis and Design Methods (MF), p. 527.
- TOOLS-USA-1993-MinginsDS #eiffel #metric
- Collection and Analysis of Software Metrics from the Eiffel Class Hierarchy (CM, BD, GS), pp. 427–435.
- TOOLS-USA-1993-MorabitoS #approach #design #object-oriented
- A New Approach to Object-Oriented Analysis and Design (JM, MSS), pp. 45–55.
- TOOLS-USA-1993-Roberts #design #object-oriented
- Object-Oriented Analysis and Design (TR), pp. 509–522.
- LOPSTR-1993-Neugebauer #reachability
- Reachability Analysis for the Extension Procedure — A Topological Result (GN), pp. 32–44.
- PEPM-1993-Andersen #c #pointer
- Binding-Time Analysis and the Taming of C Pointers (LOA), pp. 47–58.
- PEPM-1993-Bulyonkov
- Extracting Polyvariant Binding Time Analysis from Polyvariant Specializer (MAB), pp. 59–65.
- PEPM-1993-CharlierH #evaluation #implementation #prolog
- Groundness Analysis for PROLOG: Implementation and Evaluation of the Domain Prop (BLC, PVH), pp. 99–110.
- PEPM-1993-Consel
- Polyvariant Binding-Time Analysis For Applicative Languages (CC), pp. 66–77.
- PEPM-1993-Davis #higher-order
- Higher-order Binding-time Analysis (KD), pp. 78–87.
- PEPM-1993-Seward #polymorphism #strict #using
- Polymorphic Strictness Analysis using Frontiers (JS), pp. 186–193.
- PEPM-1993-Thiemann #functional #safety #source code
- A Safety Analysis for Functional Programs (PT), pp. 133–144.
- PLDI-1993-BoydW #fault #optimisation
- Isolation and Analysis of Optimization Errors (MRB, DBW), pp. 26–35.
- PLDI-1993-DuesterwaldGS #array #data flow #framework #optimisation
- A Practical Data Flow Framework for Array Reference Analysis and its Use in Optimizations (ED, RG, MLS), pp. 68–77.
- PLDI-1993-KolteH
- Load/Store Range Analysis for Global Register Allocation (PK, MJH), pp. 268–277.
- PLDI-1993-LandiRZ #alias #interprocedural #pointer
- Interprocedural Side Effect Analysis With Pointer Aliasing (WL, BGR, SZ), pp. 56–67.
- PLILP-1993-BurnM #compilation #correctness #optimisation #proving #strict
- Proving the Correctness of Compiler Optimizations Based on Strictness Analysis (GLB, DLM), pp. 346–364.
- PLILP-1993-Kagedal #prolog
- Improvements in Compile-Time Analysis for Ground Prolog (AK), pp. 92–107.
- PLILP-1993-Moreno-NavarroKMWH #lazy evaluation #performance #using
- Efficient Lazy Narrowing using Demandedness Analysis (JJMN, HK, JMC, SW, WH), pp. 167–183.
- POPL-1993-CodishDG #composition #logic programming #source code
- Compositional Analysis of Modular Logic Programs (MC, SKD, RG), pp. 451–464.
- POPL-1993-DhamdhereK #bidirectional #complexity #data flow
- Complexity of Bidirectional Data Flow Analysis (DMD, UPK), pp. 397–408.
- POPL-1993-MaydanAL #array #data flow
- Array Data-Flow Analysis and its Use in Array Privatization (DEM, SPA, MSL), pp. 2–15.
- POPL-1993-Wand #correctness #specification
- Specifying the Correctness of Binding-Time Analysis (MW), pp. 137–143.
- POPL-1993-YiH #automation #generative #interprocedural
- Automatic Generation and Management of Interprocedural Program Analyses (KY, WLHI), pp. 246–259.
- WSA-1993-CridligG #semantics
- Semantics and Analysis of Linda-Based Languages (RC, EG), pp. 72–86.
- WSA-1993-NielsonN #strict
- Finiteness Conditions for Strictness Analysis (FN, HRN), pp. 194–205.
- WSA-1993-WrightB #reduction
- Usage Analysis with Natural Reduction Types (DAW, CABF), pp. 254–266.
- ICRE-1993-Beeck #execution #precise #realtime #specification
- Improving Structured Analysis — Achieving Preciseness, Executability, and Real-Time Specification (MvdB), pp. 227–245.
- ICRE-1993-FenselAS #semantics
- Giving Structured Analysis Techniques a Formal and Operational Semantics with KARL (DF, JA, RS), pp. 267–286.
- RE-1993-LuffJHG #interactive #requirements #social
- Tasks and social interaction: the relevance of naturalistic analyses of conduct for requirements engineering (PL, MJ, CH, DG), pp. 187–190.
- RE-1993-TakedaSKO #editing
- Requirement analysis by the KJ editor (NT, AS, KK, HO), pp. 98–101.
- ESEC-1993-Beeck #concurrent #integration #realtime #specification
- Integration of Structured Analysis and Timed Statecharts for Real-Time and Concurrency Specification (MvdB), pp. 313–328.
- ESEC-1993-CheungK #detection #distributed #source code
- Tractable Flow Analysis for Anomaly Detection in Distributed Programs (SCC, JK), pp. 283–300.
- FSE-1993-CheungK #composition #constraints #reachability
- Enhancing Compositional Reachability Analysis with Context Constraints (SCC, JK), pp. 115–125.
- FSE-1993-Lutz #fault #requirements
- Targeting Safety-Related Errors During Software Requirements Analysis (RRL), pp. 99–106.
- FSE-1993-PodgurskiY #clustering #testing
- Partition testing, stratified sampling, and cluster analysis (AP, CY), pp. 169–181.
- ICSE-1993-DrakeXTZ #approach #case study
- Approach and Case Study of Requirement Analysis Where End Users Take an Active Role (JMD, WWX, WTT, IAZ), pp. 177–186.
- ICSE-1993-KitsonM #assessment #process
- An Analysis of SEI Software Process Assessment Results: 1987-1991 (DHK, SMM), pp. 68–77.
- ICSE-1993-LaskiSL #mutation testing #testing
- Dynamic Mutation Testing in Integrated Regression Analysis (JWL, WS, PL), pp. 108–117.
- ICSE-1993-TamaiI #backtracking #design #development #process #requirements #scalability
- Requirements and Design Change in Large-Scale Software Development: Analysis From the Viewpoint of Process Backtracking (TT, AI), pp. 167–176.
- SAC-1993-AcreeCUGS #adaptation #algorithm #linear #parallel
- Parallelization and Analysis of a Linear Adaptive Filtering Algorithm (RKA, DTC, NU, MJG, DMS), pp. 165–172.
- SAC-1993-HitzW #development #information management #multi
- Development and Analysis of a Wide Area Multimedia Information System (MH, HW), pp. 238–246.
- SAC-1993-Konstam #algorithm #linear #search-based #using
- Linear Discriminant Analysis Using Genetic Algorithms (AHK), pp. 152–156.
- SAC-1993-LungU #approach #integration #reuse
- Integration of Domain Analysis and Analogical Approach for Software Reuse (CHL, JEU), pp. 48–53.
- SAC-1993-VaidyanathanL #bound #learning
- Analysis of Upper Bound in Valiant’s Model for Learning Bounded CNF Expressions (SV, SL), pp. 754–761.
- DAC-1993-GraebWA #optimisation #worst-case
- Improved Methods for Worst-Case Analysis and Optimization Incorporating Operating Tolerances (HEG, CUW, KA), pp. 142–147.
- DAC-1993-HaqueC #design #distributed #reliability
- Analysis and Reliable Design of ECL Circuits with Distributed RLC Interconnections (MH, SC), pp. 697–701.
- HPDC-1993-BiswasRTK #distributed #file system #performance
- Performance Analysis of Distributed File Systems with Non-Volatile Caches (PB, KKR, DFT, CMK), pp. 252–262.
- HPDC-1993-Coddington #distributed #hardware #physics
- An Analysis of Distributed Computing Software and Hardware for Applications in Computational Physics (PDC), pp. 179–186.
- HPDC-1993-DowdBAP #architecture #design #scalability
- Design and Analysis of a Hierarchical Scalable Photonic Architecture (PWD, KB, KAA, JAP), pp. 289–296.
- PDP-1993-ClematisT #distributed #memory management #message passing
- An analysis of message passing systems for distributed memory computers (AC, OT), pp. 299–306.
- PDP-1993-GetovH #comparative #distributed #performance
- Comparative performance analysis of uniformly distributed applications (VG, RWH), pp. 259–262.
- PDP-1993-PrasadW #communication #finite
- Communication vs. computation-experiences within a finite element analysis application on transputers (JCP, RW), pp. 3–10.
- PDP-1993-RebaudengoR #algorithm #migration #parallel #search-based
- An experimental analysis of the effects of migration in parallel genetic algorithms (MR, MSR), pp. 232–238.
- PPoPP-1993-MasticolaR
- Non-concurrency Analysis (SPM, BGR), pp. 129–138.
- PPoPP-1993-SarukkaiM #source code
- Perturbation Analysis of High Level Instrumentation for SPMD Programs (SRS, ADM), pp. 44–53.
- STOC-1993-CoffmanJSW #markov #proving
- Markov chains, computer proofs, and average-case analysis of best fit bin packing (EGCJ, DSJ, PWS, RRW), pp. 412–421.
- STOC-1993-RackoffS #encryption
- Cryptographic defense against traffic analysis (CR, DRS), pp. 672–681.
- TAPSOFT-1993-DiehlJR #distributed #reachability
- Reachability Analysis on Distributed Executions (CD, CJ, JXR), pp. 629–643.
- CAV-1993-Halbwachs #source code
- Delay Analysis in Synchronous Programs (NH), pp. 333–346.
- CAV-1993-MalerP #multi #reachability
- Reachability Analysis of Planar Multi-limear Systems (OM, AP), pp. 194–209.
- CSL-1993-Coquand #semantics
- From Semantics to Rules: A Machine Assisted Analysis (CC), pp. 91–105.
- ICLP-1993-CodishDFB #correctness #logic programming #question #source code
- Freeness Analysis for Logic Programs — And Correctness? (MC, DD, GF, MB), pp. 116–131.
- ICLP-1993-CorsiniR #fault #safety
- Safety Analysis by Means of Fault Trees: An Application for Open Boolean Solvers (MMC, AR), p. 834.
- ICLP-1993-DumortierJBC #constraints
- Freeness Analysis in the Presence of Numerical Constraints (VD, GJ, MB, MC), pp. 100–115.
- ICLP-1993-Hanus #constraints
- Analysis of Nonlinear Constraints in CLP(R) (MH), pp. 83–99.
- ICLP-1993-KempS #constraints #optimisation #query
- Analysis Based Constraint Query Optimization (DBK, PJS), pp. 666–682.
- ILPS-1993-AlpuenteFV #constraints #equation #incremental
- Incremental Equational Constraint Analyses (MA, MF, GV), p. 657.
- ILPS-1993-BandaH #approach #source code
- A Practical Approach to the Global Analysis of CLP Programs (MJGdlB, MVH), pp. 437–455.
- ILPS-1993-DecorteSF #automation #termination
- Automatic Inference of Norms: A Missing Link in Automatic Termination Analysis (SD, DDS, MF), pp. 420–436.
- ILPS-1993-Sohn #logic programming #relational #source code
- Relational Groundness Analysis for Logic Programs (KS), p. 635.
- ISSTA-1993-BelliJ #prolog #source code #testing
- Implementation-Based Analysis and Testing of Prolog Programs (FB, OJ), pp. 70–80.
- ISSTA-1993-DuriBDS #ada #concurrent #reduction #using
- Using State Space Reduction Methods for Deadlock Analysis in Ada Tasking (SD, UAB, RD, SMS), pp. 51–60.
- ISSTA-1993-Jackson
- Abstract Analysis with Aspect (DJ), pp. 19–27.
- ISSTA-1993-LevineT #concurrent #metric #re-engineering
- Metric-Driven Reengineering for Static Concurrency Analysis (DLL, RNT), pp. 40–50.
- ISSTA-1993-UntchOH #mutation testing #using
- Mutation Analysis Using Mutant Schemata (RHU, AJO, MJH), pp. 139–148.
- ISSTA-1993-WeissF #algorithm #mutation testing
- Improved Serial Algorithms for Mutation Analysis (SNW, VNF), pp. 149–158.
- PODS-1992-Rotem #scalability
- Analysis of Disk Arm Movement for Large Sequential Reads (DR), pp. 47–54.
- SIGMOD-1992-DanY #performance #policy
- Performance Analysis of Coherency Control Policies through Lock Retention (AD, PSY), pp. 114–123.
- SIGMOD-1992-GhandeharizadehDQ #clustering #multi #performance
- A Performance Analysis of Alternative Multi-Attribute Declustering Strategies (SG, DJD, WQ), pp. 29–38.
- SIGMOD-1992-JhingranK #database #protocol #using
- Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
- ICALP-1992-Debray #complexity #data flow #logic programming #on the #source code
- On the Complexity of Dataflow Analysis of Logic Programs (SKD), pp. 509–520.
- ICALP-1992-Flajolet #algorithm
- Analytic Analysis of Algorithms (PF), pp. 186–210.
- ICALP-1992-KirschenhoferPS #how #probability #problem
- How to Count Quickly and Accurately: A Unified Analysis of Probabilistic Counting and Other Related Problems (PK, HP, WS), pp. 211–222.
- LFP-1992-NeubergerM #deduction #power of #precise #strict
- A Precise Relationship Between the Deductive Power of Forward and Backward Strictness Analysis (MN, PM), pp. 127–138.
- LFP-1992-TraubCS #clustering #source code #strict #thread
- Global Analysis for Partitioning Non-Strict Programs into Sequential Threads (KRT, DEC, KES), pp. 324–334.
- LFP-1992-WangH #recursion
- Analysis of Recursive Types in Lisp-Like Languages (EW, PNH), pp. 216–225.
- CHI-1992-HammontreeHH #research #testing #tool support #user interface #visual notation
- Integrated data capture and analysis tools for research and testing on graphical user interfaces (MLH, JJH, BWH), pp. 431–432.
- CHI-1992-JohnV #interactive
- A GOMS Analysis of a Graphic Machine-Paced, Highly Interactive Task (BEJ, AHV), pp. 251–258.
- CAiSE-1992-Dewal #evaluation #requirements
- A Methodology for Requirements Analysis and Evaluation of SDEs (SD), pp. 394–409.
- CAiSE-1992-FouqueV #approach #machine learning
- Building a Tool for Software Code Analysis: A Machine Learning Approach (GF, CV), pp. 278–289.
- CAiSE-1992-MacGinnes #how #object-oriented #question
- How Objective is Object-Oriented Analysis? (SM), pp. 1–16.
- KR-1992-BaaderHNPF #empirical #optimisation #representation
- An Empirical Analysis of Optimization Techniques for Terminological Representation Systems, or Making KRIS Get a Move On (FB, BH, BN, HJP, EF), pp. 270–281.
- ML-1992-Etzioni #learning
- An Asymptotic Analysis of Speedup Learning (OE), pp. 129–136.
- ML-1992-GratchD #learning #problem
- An Analysis of Learning to Plan as a Search Problem (JG, GD), pp. 179–188.
- ML-1992-HirschbergP #concept #learning
- Average Case Analysis of Learning κ-CNF Concepts (DSH, MJP), pp. 206–211.
- SEKE-1992-AbateDNP #query #specification
- Querying and Analysis of Software Specifications (AFA, CD, GN, GP), pp. 470–478.
- SEKE-1992-Olson #interface #object-oriented
- An Object-Oriented Analysis Model of an Iconic Interface to Macsyma (AMO), pp. 253–260.
- SEKE-1992-Schaschinger #information management #object-oriented
- Expert-Supported Object-Oriented Analysis in Knowledge Engineering (HS), pp. 116–122.
- SEKE-1992-WatsonN #development #named
- ProTest: A Knowledge Analysis Tool for the Development of Expert Systems (IW, MN), pp. 206–212.
- SIGIR-1992-BlossevilleHMP #automation #classification #documentation #natural language #statistics
- Automatic Document Classification: Natural Language Processing, Statistical Analysis, and Expert System Techniques used together (MJB, GH, MGM, NP), pp. 51–58.
- SIGIR-1992-WangWY #geometry #modelling
- An Analysis of Vector Space Models Based on Computational Geometry (ZW, SKMW, YY), pp. 152–160.
- OOPSLA-1992-ClydeEW #object-oriented
- Tunable Formalism in Object-Oriented Systems Analysis: Meeting the Needs of Both Theoreticians and Practitioners (SWC, DWE, SNW), pp. 452–465.
- TOOLS-EUROPE-1992-BuddeCSZ #design #tool support
- Tools and Materials: an Analysis and Design Metaphor (RB, MLCN, KHS, HZ), pp. 135–146.
- TOOLS-EUROPE-1992-FritzsonVHF #algebra #industrial #modelling #object-oriented
- Industrial Application of OO Mathematical Modeling and Computer Algebra in Mechanical Analysis (PF, LV, JH, DF), pp. 167–181.
- TOOLS-EUROPE-1992-Nerson #design #object-oriented
- Object-Oriented Analysis and Design (JMN), p. 405.
- TOOLS-EUROPE-1992-Rubin #behaviour
- Object Behavior Analysis (KSR), p. 407.
- TOOLS-PACIFIC-1992-Henderson-Sellers92a #design
- Techniques and Notation for Analysis and Design (BHS), p. 236.
- TOOLS-PACIFIC-1992-KotakaKH #modelling #object-oriented #process #specification
- Specification Process Modelling in Object-Oriented Analysis (NK, YK, SH), pp. 67–81.
- TOOLS-PACIFIC-1992-Miller #architecture #finite #interactive
- A Class Architecture for Interactive Finite Element Analysis (GRM), pp. 101–108.
- TOOLS-USA-1992-Walden #design #object-oriented
- Object-Oriented Analysis and Design (KW), p. 255.
- ALP-1992-BundgenE #algorithm #normalisation #performance
- A Fast Algorithm for Ground Normal Form Analysis (RB, HE), pp. 291–305.
- ALP-1992-KingS #concurrent #logic programming #source code
- Serialisation Analysis of Concurrent Logic Programs (AK, PS), pp. 322–334.
- LOPSTR-1992-VerschaetseDS #automation #termination
- Automatic Termination Analysis (KV, SD, DDS), pp. 168–183.
- PEPM-1992-AndersenG #partial evaluation
- Speedup Analysis in Partial Evaluation: Preliminary Results (LOA, CKG), pp. 1–7.
- PEPM-1992-DehboneiJ #evaluation #interprocedural #semantics #symbolic computation
- Semantical Interprocedural Analysis by Partial Symbolic Evaluation (BD, PJ), pp. 14–20.
- PEPM-1992-RufW #control flow #higher-order #using
- Improving the Accuracy of Higher-Order Specialization using Control Flow Analysis (ER, DW), pp. 67–74.
- PEPM-1992-RytzG
- A Polyvariant Binding Time Analysis (BR, MG), pp. 21–28.
- PLDI-1992-HendrenHN #abstraction #data type #imperative #pointer #recursion #source code
- Abstractions for Recursive Pointer Data Structures: Improving the Analysis of Imperative Programs (LJH, JH, AN), pp. 249–260.
- PLDI-1992-ParkG
- Escape Analysis on Lists (YGP, BG), pp. 116–127.
- PLDI-1992-TanL #compilation #data flow #logic programming #source code
- Compiling Dataflow Analysis of Logic Programs (JT, IPL), pp. 106–115.
- PLILP-1992-AlpuenteFM #consistency #equation #incremental #logic programming #nondeterminism
- Analyses of Inconsistency for Incremental Equational Logic Programming (MA, MF, FM), pp. 443–457.
- PLILP-1992-GomardS #data type #lazy evaluation
- Path Analysis for Lazy Data Structures (CKG, PS), pp. 54–68.
- PLILP-1992-Rosendahl #attribute grammar #strict
- Strictness Analysis for Attribute Grammars (MR), pp. 145–157.
- POPL-1992-ChowH #memory management #parallel #source code
- Compile-Time Analysis of Parallel Programs that Share Memory (JHC, WLHI), pp. 130–141.
- TRI-Ada-C-1992-Frankel #architecture #modelling
- Analysis/Architecture Models to ASG Models: Enabling the Transition (MIF), pp. 220–231.
- TRI-Ada-T1-1992-Roseman
- Rate Monotonic Analysis (TR), pp. 261–376.
- WSA-1992-AmatoGM #concurrent #database #functional #programming language #transaction
- Analysis of Concurrent Transactions in a Functional Database Programming Language (GA, FG, GM), pp. 174–184.
- WSA-1992-Ayers #performance #reachability
- Efficient Closure Analysis with Reachability (AEA), pp. 126–134.
- WSA-1992-Baker-Finch #logic #strict
- Relevant Logic and Strictness Analysis (CABF), pp. 221–228.
- WSA-1992-CodishFMW #concurrent #constraints #logic programming #performance #source code
- Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs (MC, MF, KM, WHW), pp. 35–42.
- WSA-1992-GenglerR
- A Polyvariant Binding Time Analysis Handling Partially Known Values (MG, MR), pp. 322–330.
- WSA-1992-Hamilton #first-order #functional #lazy evaluation #source code
- Sharing Analysis of Lazy First-Order Functional Programs (GWH), pp. 68–78.
- WSA-1992-ParkG #lazy evaluation
- Order-of-Demand Analysis for Lazy Languages (YGP, BG), pp. 91–101.
- WSA-1992-SolbergNN
- Inference Systems for Binding Time Analysis (KLS, HRN, FN), pp. 247–254.
- WSA-1992-TangJ #control flow
- Control-Flow Effects for Escape Analysis (YMT, PJ), pp. 313–321.
- ICSE-1992-LubarsMPR #evolution #object-oriented
- Object-Oriented Analysis for Evolving Systems (MDL, GM, CP, CR), pp. 173–185.
- ICSE-1992-MargonoR #ada #reuse #scalability
- Software Reuse Economics: Cost-Benefit Analysis on a Large-Scale Ada Project (JM, TER), pp. 338–348.
- ICSE-1992-TsudaMTT #automation #development
- Productivity Analysis of Software Development with an Integrated CASE Tool (MT, YM, MT, MT), pp. 49–58.
- CC-1992-Knopp #lisp #parallel #performance
- Improving the Performance of Parallel LISP by Compile Time Analysis (JK), pp. 271–277.
- CC-1992-SudholtS #data flow #interprocedural #object-oriented #on the
- On Interprocedural Data Flow Analysis for Object Oriented Languages (MS, CS), pp. 156–162.
- CC-1992-VitekHU #object-oriented #source code
- Compile-Time Analysis of Object-Oriented Programs (JV, RNH, JSU), pp. 236–250.
- DAC-1992-ChiproutN #network
- Generalized Moment-Matching Methods for Transient Analysis of Interconnect Networks (EC, MSN), pp. 201–206.
- DAC-1992-LeeR #evaluation #linear #named #using
- AWEsymbolic: Compiled Analysis of Linear(ized) Circuits using Asymptotic Waveform Evaluation (JYL, RAR), pp. 213–218.
- DAC-1992-RuehliH #challenge
- Challenges and Advances in Electrical Interconnect Analysis (AER, HH), pp. 460–465.
- HPDC-1992-ParasharHMF #distributed #performance
- A Requirement Analysis for High Performance Distributed Computing over LANs (MP, SH, AGM, GF), pp. 142–151.
- ESOP-1992-NielsonN
- The Tensor Product in Wadler’s Analysis of Lists (FN, HRN), pp. 351–370.
- CADE-1992-Ammon #automation #logic #proving
- Automatic Proofs in Mathematical Logic and Analysis (KA), pp. 4–19.
- CADE-1992-Sutcliffe #set
- Linear-Input Subset Analysis (GS), pp. 268–280.
- JICSLP-1992-BigotDM #abstract interpretation #comprehension #using
- Understanding Finiteness Analysis Using Abstract Interpretation (PAB, SKD, KM), pp. 735–749.
- JICSLP-1992-Heintze #aspect-oriented #set
- Practical Aspects of Set Based Analysis (NH), pp. 765–779.
- JICSLP-1992-KingS #concurrent #logic programming #source code
- Schedule Analysis of Concurrent Logic programs (AK, PS), pp. 478–492.
- JICSLP-1992-Overbeek #logic programming #search-based #sequence #tutorial
- Logic Programming and Genetic Sequence Analysis: a Tutorial (RAO), pp. 32–34.
- JICSLP-1992-SundararajanST #concurrent #logic programming #source code #thread
- Variable Threadedness Analysis for Concurrent Logic Programs (RS, AVSS, ET), pp. 493–508.
- LICS-1992-Jensen #strict
- Disjunctive Strictness Analysis (TPJ), pp. 174–185.
- LICS-1992-Murthy
- A Computational Analysis of Girard’s Translation and LC (CRM), pp. 90–101.
- HT-1991-SamuelsonG #hypermedia #library
- Intellectual Property Rights for Digital Library and Hypertext Publishing Systems: An Analysis of Xanadu (PS, RJG), pp. 39–50.
- PODS-1991-Matsliach #multi #performance
- Performance Analysis of File Organizations that Use Multi-Bucket Data Leaves with Partial Expansions (GM), pp. 164–180.
- SIGMOD-1991-IoannidisK #optimisation #query
- Left-Deep vs. Bushy Trees: An Analysis of Strategy Spaces and its Implications for Query Optimization (YEI, YCK), pp. 168–177.
- ICALP-1991-ErnoultM #strict
- Uniform Ideals and Strictness Analysis (CE, AM), pp. 47–59.
- VDME-1991-PlatKP #design
- A Case for Structured Analysis/Formal Design (NP, JvK, KP), pp. 81–105.
- FPCA-1991-Henglein #higher-order #performance #type inference
- Efficient Type Inference for Higher-Order Binding-Time Analysis (FH), pp. 448–472.
- FPCA-1991-Holst
- Finiteness Analysis (CKH), pp. 473–495.
- FPCA-1991-Jensen #logic #strict
- Strictness Analysis in Logical Form (TPJ), pp. 352–366.
- CHI-1991-SiochiH #case study #evaluation #user interface #using
- A study of computer-supported user interface evaluation using maximal repeating pattern analysis (ACS, DH), pp. 301–305.
- CHI-1991-WhittakerBC #interactive #process
- Co-ordinating activity: an analysis of interaction in computer-supported co-operative work (SW, SEB, HHC), pp. 361–367.
- KDD-1991-Piatetsky
- Discovery, Analysis, and Presentation of Strong Rules (GPS), pp. 229–248.
- KDD-1991-Ziarko #database #dependence #representation
- The Discovery, Analysis, and Representation of Data Dependencies in Databases (WZ), pp. 195–212.
- SIGIR-1991-Swanson
- Analysis of Unintended Connections Between Disjoint Science Literatures (DRS), pp. 280–289.
- SIGIR-1991-WendlandtD #documentation #retrieval #semantics
- Incorporating a Semantic Analysis into a Document Retrieval Strategy (EBW, JRD), pp. 270–279.
- ECOOP-1991-Champeaux #development #object-oriented #top-down
- Object-Oriented Analysis and Top-Down Software Development (DdC), pp. 360–376.
- OOPSLA-1991-HayesC #modelling #object-oriented
- Coherent Models for Object-Oriented Analysis (FH, DC), pp. 171–183.
- TOOLS-USA-1991-Henderson-Sellers #design
- Techniques and Notation for Analysis and Design (BHS), pp. 403–404.
- TOOLS-USA-1991-Murphy #case study #experience #object-oriented
- Experiences in Applying Object-Oriented Analysis (GCM), pp. 249–264.
- TOOLS-USA-1991-Nerson #design
- Analysis and Design Methodologies (JMN), pp. 375–376.
- TOOLS-USA-1991-Nerson91a #design #eiffel #towards
- Associated Paper: Extending Eiffel Toward O-O Analysis and Design (JMN), pp. 377–392.
- PEPM-1991-CortesiF #abstract domain #abstract interpretation #logic programming #source code
- Abstract Interpretation of Logic Programs: An Abstract Domain for Groundness, Sharing, Freeness and Compoundness Analysis (AC, GF), pp. 52–61.
- PEPM-1991-HuntS #perspective
- Binding Time Analysis: A New PERspective (SH, DS), pp. 154–165.
- PEPM-1991-ParkG #optimisation
- Reference Escape Analysis: Optimizing Reference Counting based on the Lifetime of References (YGP, BG), pp. 178–189.
- PEPM-1991-Sahlin #prolog
- Determinacy Analysis for Full Prolog (DS), pp. 23–30.
- PEPM-1991-Shivers #control flow #semantics
- The Semantics of Scheme Control-Flow Analysis (OS), pp. 190–198.
- PLDI-1991-Launchbury #strict
- Strictness and Binding-Time Analyses: Two for the Price of One (JL), pp. 80–91.
- PLDI-1991-MaydanHL #data flow #dependence #performance
- Efficient and Exact Data Dependence Analysis (DEM, JLH, MSL), pp. 1–14.
- POPL-1991-AbramskyJ #approach #higher-order #polymorphism #relational #strict
- A Relational Approach to Strictness Analysis for Higher-Order Polymorphic Functions (SA, TPJ), pp. 49–54.
- POPL-1991-SekarMR #abstract interpretation #on the #strict
- On the Power and Limitation of Strictness Analysis Based on Abstract Interpretation (RCS, PM, IVR), pp. 37–48.
- WSA-1991-BoeckC #automation #prolog #type checking
- Automatic Construction of Prolog Primitives for Type Checking Analysis (PDB, BLC), pp. 165–172.
- WSA-1991-Breuer #learning #synthesis
- An Analysis/Synthesis Language with Learning Strategies (PTB), pp. 202–209.
- RE-1991-Hruschka #german #standard
- Structured Analysis auf dem Weg zum De-facte-Standard (PH), pp. 1–13.
- RE-1991-Wittstadt #german #question
- Structured Analysis: Ein Weg aus der Krise? (WW), pp. 191–208.
- ESEC-1991-RozmanGD #metric #source code
- Relation Between Source Code Metrics and Structure Analysis Metrics (IR, JG, TD), pp. 332–342.
- ESEC-1991-SelbyM #classification #metric
- Metric-Driven Classification Analysis (RWS, RKM), pp. 290–307.
- ICSE-1991-GorlickR #using
- Using Weaves for Software Construction and Analysis (MMG, RRR), pp. 23–34.
- ICSE-1991-SelbyPSB #development #empirical #feedback #metric
- Metric-Driven Analysis and Feedback Systems for Enabling Empirically Guided Software Development (RWS, AAP, DCS, JB), pp. 288–298.
- ASPLOS-1991-CmelikKDK #benchmark #metric #set #specification
- An Analysis of SPARC and MIPS Instruction Set Utilization on the SPEC Benchmarks (RFC, SIK, DRD, EJK), pp. 290–302.
- DAC-1991-BergamaschiCP #synthesis #using
- Data-Path Synthesis Using Path Analysis (RAB, RC, MP), pp. 591–596.
- DAC-1991-DeguchiIY #fault #logic #probability
- Probabilistic CTSS: Analysis of Timing Error Probability in Asynchronous Logic Circuits (YD, NI, SY), pp. 650–655.
- DAC-1991-Hwang #named
- REX — A VLSI Parasitic Extraction Tool for Electromigration and Signal Analysis (JPH), pp. 717–722.
- DAC-1991-RaghavanR
- A New Nonlinear Driver Model for Interconnect Analysis (VR, RAR), pp. 561–566.
- DAC-1991-SastryM #branch #process
- A Branching Process Model for Observability Analysis of Combinational Circuits (SS, AM), pp. 452–457.
- CAAP-1991-NajmS #calculus #concurrent #process
- Object-Based Concurrency: A Process Calculus Analysis (EN, JBS), pp. 359–380.
- CCPSD-1991-Wright #strict
- A New Technique for Strictness Analysis (DAW), pp. 235–258.
- STOC-1991-CoffmanCGJMSWY #case study
- Fundamental Discrepancies between Average-Case Analyses under Discrete and Continuous Distributions: A Bin Packing Case Study (EGCJ, CC, MRG, DSJ, LAM, PWS, RRW, MY), pp. 230–240.
- CAV-1991-AvruninBC #concurrent #integer #programming
- Integer Programming in the Analysis of Concurrent Systems (GSA, UAB, JCC), pp. 92–102.
- ICLP-1991-CharlierMH #abstract interpretation #algorithm #complexity
- A Generic Abstract Interpretation Algorithm and its Complexity Analysis (BLC, KM, PVH), pp. 64–78.
- ICLP-1991-CodishDY #algorithm #alias #safety #unification
- Derivation and Safety of an Abstract Unification Algorithm for Groundness and Aliasing Analysis (MC, DD, EY), pp. 79–93.
- ICLP-1991-CodishFM #concurrent #logic programming #source code
- Suspension Analysis for Concurrent Logic Programs (MC, MF, KM), pp. 331–345.
- ICLP-1991-DebrayL #automation #complexity #logic programming #source code
- Automatic Complexity Analysis of Logic Programs (SKD, NWL), pp. 599–613.
- ISLP-1991-FosterW #reuse
- Copy Avoidance through Compile-Time Analysis and Local Reuse (ITF, WHW), pp. 455–469.
- LICS-1991-CortesiFW #abstract domain
- Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis (AC, GF, WHW), pp. 322–327.
- TAV-1991-DuesterwaldS #concurrent #data flow #framework #using
- Concurrency Analysis in the Presence of Procedures Using a Data-Flow Framework (ED, MLS), pp. 36–48.
- TAV-1991-LongC #concurrent #data flow
- Data Flow Analysis of Concurrent Systems that Use the Rendezvous Model of Synchronization (DLL, LAC), pp. 21–35.
- TAV-1991-OstrandW #data flow #pointer #test coverage #testing
- Data Flow-Based Test Adequacy Analysis for Languages with Pointers (TJO, EJW), pp. 74–86.
- TAV-1991-YehY #algebra #composition #process #reachability #using
- Compositional Reachability Analysis Using Process Algebra (WJY, MY), pp. 49–59.
- PODS-1990-JohnsonS #algorithm #concurrent #framework #performance
- A Framework for the Performance Analysis of Concurrent B-tree Algorithms (TJ, DS), pp. 273–287.
- VLDB-1990-MuntzL #array #performance
- Performance Analysis of Disk Arrays under Failure (RRM, JCSL), pp. 162–173.
- LFP-1990-Burn #using
- Using Projection Analysis of Evaluation-Order and Its Application (GLB), pp. 227–240.
- LFP-1990-Consel #functional #higher-order
- Binding Time Analysis for High Order Untyped Functional Languages (CC), pp. 264–272.
- LFP-1990-DraghicescuP #composition
- A Compositional Analysis of Evaluation-Order and Its Application (MD, SP), pp. 242–250.
- CHI-1990-Campbell #programming #smalltalk
- Developmental scenario analysis of Smalltalk programming (RLC), pp. 269–276.
- CHI-1990-GeorgeVN #implementation #process
- The organizational implementation of an electronic meeting system: an analysis of the innovation process (JFG, JSV, JFNJ), pp. 361–368.
- CHI-1990-HowesP #learning #semantics
- Semantic analysis during exploratory learning (AH, SJP), pp. 399–406.
- CHI-1990-John #performance #visual notation
- Extensions of GOMS analyses to expert performance requiring perception of dynamic visual and auditory information (BEJ), pp. 107–116.
- CHI-1990-YoungW #concept #fault #predict #using
- Using a knowledge analysis to predict conceptual errors in text-editor usage (RMY, JW), pp. 91–98.
- ML-1990-AndersonM #categorisation
- A Rational Analysis of Categorization (JRA, MM), pp. 76–84.
- ML-1990-ChanW #induction #learning #performance #probability
- Performance Analysis of a Probabilistic Inductive Learning System (KCCC, AKCW), pp. 16–23.
- ML-1990-Cohen #concept #learning #representation
- An Analysis of Representation Shift in Concept Learning (WWC), pp. 104–112.
- ML-1990-PazzaniS #algorithm #learning
- Average Case Analysis of Conjunctive Learning Algorithms (MJP, WS), pp. 339–347.
- SIGIR-1990-Sacks-DavisW #documentation #retrieval #using
- Using Syntactic Analysis in a Document Retrieval System that uses Signature Files (RSD, PW), pp. 179–192.
- PLDI-1990-ChambersU #dynamic typing #object-oriented #optimisation #source code
- Iterative Type Analysis and Extended Message Splitting: Optimizing Dynamically-Typed Object-Oriented Programs (CC, DU), pp. 150–164.
- PLDI-1990-ChaseWZ #pointer
- Analysis of Pointers and Structures (DRC, MNW, FKZ), pp. 296–310.
- PLDI-1990-DebrayLH #logic programming #source code
- Task Granularity Analysis in Logic Programs (SKD, NWL, MVH), pp. 174–188.
- PLILP-1990-BoeckC #correctness #prolog #static typing
- Static Type Analysis of Prolog Procedures for Ensuring Correctness (PDB, BLC), pp. 222–237.
- PLILP-1990-SagivFRW #approach #data flow #problem
- A Logic-Based Approach to Data Flow Analysis Problem (SS, NF, MR, RW), pp. 277–292.
- POPL-1990-Burn #abstract interpretation
- A Relationship Between Abstract Interpretation and Projection Analysis (GLB), pp. 151–156.
- POPL-1990-Field #lazy evaluation #on the #specification #tool support
- On Laziness and Optimality in λ Interpreters: Tools for Specification and Analysis (JF), pp. 1–15.
- POPL-1990-MarloweR #algorithm #data flow #hybrid #incremental #performance
- An Efficient Hybrid Algorithm for Incremental Data Flow Analysis (TJM, BGR), pp. 184–196.
- POPL-1990-SekarPR #performance #strict
- Small Domains Spell Fast Strictness Analysis (RCS, SP, IVR), pp. 169–183.
- Best-of-PLDI-1990-ChaseWZ90a #pointer
- Analysis of pointers and structures (with retrospective) (DRC, MNW, FKZ), pp. 343–359.
- DAC-1990-KuoLW #fault
- A Fault Analysis Method for Synchronous Sequential Circuits (TYK, JYL, JFW), pp. 732–735.
- DAC-1990-McCormickA
- Waveform Moment Methods for Improved Interconnection Analysis (SPM, JA), pp. 406–412.
- DAC-1990-McGeerB #network
- Timing Analysis in Precharge/Unate Networks (PCM, RKB), pp. 124–129.
- DAC-1990-SakallahMO #design
- Analysis and Design of Latch-Controlled Synchronous Digital Circuits (KAS, TNM, KO), pp. 111–117.
- PPoPP-1990-CallahanKS #parallel #programming
- Analysis of Event Synchronization in A Parallel Programming Tool (DC, KK, JS), pp. 21–30.
- PPoPP-1990-Nicol #parallel
- Analysis of Synchronization in Massively Parallel Discrete-Event Sumulations (DMN), pp. 89–98.
- ESOP-1990-GoldbergP #functional #higher-order #implementation #optimisation #stack
- Higher Order Escape Analysis: Optimizing Stack Allocation in Functional Program Implementations (BG, YGP), pp. 152–160.
- ESOP-1990-JensenM #garbage collection
- A Backwards Analysis for Compile-time Garbage Collection (TPJ, TÆM), pp. 227–239.
- ESOP-1990-JourdanP
- Techniques for Improving Grammar Flow Analysis (MJ, DP), pp. 240–255.
- ESOP-1990-Sands #complexity #higher-order #lazy evaluation
- Complexity Analysis for a Lazy Higher-Order Language (DS), pp. 361–376.
- STOC-1990-SchmidtS
- The Analysis of Closed Hashing under Limited Randomness (JPS, AS), pp. 224–234.
- CAV-1990-BerthelotJP #named #petri net
- PAPETRI: Environment for the Analysis of Petri Nets (GB, CJ, LP), pp. 13–22.
- CAV-1990-Ness
- Issues Arising in the Analysis of L.0 (LAN), pp. 106–115.
- CLP-1990-MulkersWB90 #data type
- Analysis of Shared Data Structures for Compile-Time Garbage (AM, WHW, MB), pp. 747–762.
- NACLP-1990-MarriottS #constraints #logic programming #source code
- Analysis of Constraint Logic Programs (KM, HS), pp. 531–547.
- NACLP-1990-Pereira #prolog
- Prolog and Natural-Language Analysis: Into the Third Decade (FCNP), pp. 813–832.
- NACLP-1990-RoyD #compilation #data flow #optimisation #prolog
- The Benefits of Global Dataflow Analysis for an Optimizing Prolog Compiler (PVR, AMD), pp. 501–515.
- ICALP-1989-Kenyon-MathieuV #data type
- General Methods for the Analysis of the Maximum Size of Dynamic Data Structures (CKM, JSV), pp. 473–487.
- ICALP-1989-LouchardRS #algorithm #probability
- Dynamic Algorithms in D. E. Knuth’s Model: A Probabilistic Analysis (GL, BR, RS), pp. 521–533.
- FPCA-1989-BjernerH #approach #composition #first-order #functional #lazy evaluation #source code
- A Composition Approach to Time Analysis of First Order Lazy Functional Programs (BB, SH), pp. 157–165.
- FPCA-1989-Bloss #functional #implementation #performance
- Update Analysis and the Efficient Implementation of Functional Aggregates (AGB), pp. 26–38.
- FPCA-1989-JonesM #garbage collection
- Computer-Time Garbage Collection by Sharing Analysis (SBJ, DLM), pp. 54–74.
- FPCA-1989-KuoM #strict #type inference
- Strictness Analysis: A New Perspective Based on Type Inference (TMK, PM), pp. 260–272.
- FPCA-1989-Rosendahl #automation #complexity
- Automatic Complexity Analysis (MR), pp. 144–156.
- CHI-1989-EganRLLG #behaviour #evaluation #hypermedia
- Behavioral evaluation and analysis of a hypertext browser (DEE, JRR, TKL, CCL, LMG), pp. 205–210.
- CAiSE-1989-HakkarainenIO #embedded #knowledge-based
- A Knowledge-Based Support System for Embedded Computer Software Analysis (KH, TI, MO).
- CAiSE-1989-HernbackL #automation #classification #framework #implementation #tool support
- A Framework for Use and Classification of CASE Tools in Systems Analysis and a Strategy for Implementation (JH, IL).
- KR-1989-Nebel
- A Knowledge Level Analysis of Belief Revision (BN), pp. 301–311.
- ML-1989-Greiner #formal method #towards
- Towards a Formal Analysis of EBL (RG), pp. 450–453.
- ML-1989-Hsu
- A Knowledge-Level Analysis of Informing (JYjH), pp. 485–488.
- ML-1989-Shavlik #empirical #learning
- An Empirical Analysis of EBL Approaches for Learning Plan Schemata (JWS), pp. 183–187.
- SEKE-1989-TsaiYLCH #specification
- Knowledge-oriented Specification Analysis and Transformation (STT, CCY, CCL, STC, CHH), pp. 110–115.
- SIGIR-1989-Pejtersen #information retrieval #interface #library
- A Library System for Information Retrieval Based on a Cognitive Task Analysis and Supported by an Icon-Based Interface (AMP), pp. 40–47.
- SIGIR-1989-SaltonS #automation #on the
- On the Application of Syntactic Methodologies in Automatic Text Analysis (GS, MS), pp. 137–150.
- PLDI-1989-HorwitzPR #dependence #pointer
- Dependence Analysis for Pointer Variables (SH, PP, TWR), pp. 28–40.
- POPL-1989-CooperK #alias #interprocedural #performance
- Fast Interprocedural Alias Analysis (KDC, KK), pp. 49–59.
- POPL-1989-SagivEFR #attribute grammar #data flow
- Resolving Circularity in Attribute Grammars with Applications to Data Flow Analysis (SS, OE, NF, MR), pp. 36–48.
- ESEC-1989-FranceD #specification #using
- Formal Specification Using Structured Systems Analysis (RBF, TWGD), pp. 293–310.
- ESEC-1989-Ince #data flow #design #empirical #metric
- Martin J. Shepperd: An Empirical and Theoretical Analysis of an Information Flow-Based System Design Metric (DCI), pp. 86–99.
- ESEC-1989-ManfrediOT #approach #object-oriented
- An Object-oriented Approach to the System Analysis (FM, GO, PT), pp. 395–410.
- ICSE-1989-BendifallahS #empirical #specification
- Work Structures and Shifts: An Empirical Analysis of Software Specification Teamwork (SB, WS), pp. 260–270.
- ICSE-1989-Hsieh #concurrent #source code
- Timing Analysis of Cyclic Concurrent Programs (CSH), pp. 312–318.
- ICSE-1989-LongC #concurrent #graph #interactive
- Task Interaction Graphs for Concurrency Analysis (DLL, LAC), pp. 44–52.
- ICSE-1989-VernerTJH #case study #dependence #overview #perspective
- Technology Dependence in Function Point Analysis: A Case Study and Critical Review (JMV, GT, BJ, RGH), pp. 375–382.
- ASPLOS-1989-AdamsZ #set #source code
- An Analysis of 8086 Instruction Set Usage in MS DOS Programs (TLA, REZ), pp. 152–160.
- ASPLOS-1989-WeberG #multi
- Analysis of Cache Invalidation Patterns in Multiprocessors (WDW, AG), pp. 243–256.
- DAC-1989-BolsensRCM #behaviour #debugging #logic
- Electrical Debugging of Synchronous MOS VLSI Circuits Exploiting Analysis of the Intended Logic Behaviour (IB, WDR, LJMC, HDM), pp. 513–518.
- DAC-1989-Coppola #algorithm #logic
- New Methods in the Analysis of Logic Minimization Data and Algorithms (AJC), pp. 226–231.
- DAC-1989-DuYG #on the #problem
- On the General False Path Problem in Timing Analysis (DHCD, SHY, SG), pp. 555–560.
- DAC-1989-PerremansCM
- Static Timing Analysis of Dynamically Sensitizable Paths (SP, LJMC, HDM), pp. 568–573.
- DAC-1989-PillageHR #evaluation #named
- AWEsim: Asymptotic Waveform Evaluation for Timing Analysis (LTP, XH, RAR), pp. 634–637.
- DAC-1989-WeinerS #logic #synthesis
- Timing Analysis in a Logic Synthesis Environment (NW, ALSV), pp. 655–661.
- DAC-1989-YenDG #algorithm #performance
- Efficient Algorithms for Extracting the K most Critical Paths in Timing Analysis (SHY, DHCD, SG), pp. 649–654.
- SOSP-1989-Duchamp #performance #transaction
- Analysis of Transaction Management Performance (DD), pp. 177–190.
- CCIPL-1989-Mogensen #higher-order
- Binding Time Analysis for Polymorphically Typed Higher Order Languages (TÆM), pp. 298–312.
- STOC-1989-Motwani #algorithm #graph #problem
- Expanding Graphs and the Average-case Analysis of Algorithms for Matchings and Related Problems (RM), pp. 550–561.
- NACLP-1989-Mudambi #multi #performance
- Performance Analysis of Aurora on a Switch-Based Multiprocessor (SM), pp. 697–712.
- NACLP-1989-Szeredi #performance #prolog
- Performance Analysis of the Aurora Or-Parallel Prolog System (PS), pp. 713–732.
- NACLP-1989-Winsborough #multi #reachability
- Path-Dependent Reachability Analysis for Multiple Specialization (WHW), pp. 133–153.
- TAV-1989-AvruninWD #automation #concurrent
- Experiments in Automated Analysis of Concurrent Software Systems (GSA, JCW, LKD), pp. 124–130.
- TAV-1989-KotikM #automation #program transformation #testing #using
- Automating Software Analysis and Testing Using a Program Transformation System (GK, LM), pp. 75–84.
- TAV-1989-YoungTFB #concurrent #development
- Integrated Concurrency Analysis in a Software Development Enviornment (MY, RNT, KF, DB), pp. 200–209.
- PODS-1988-RamakrishnaM #bound
- Analysis of Bounded Disorder File Organization (MVR, PM), pp. 117–125.
- SIGMOD-1988-ChristodoulakisF #performance
- Performance Analysis and Fundamental Performance Trade Offs for CLV Optical Disks (SC, DAF), pp. 286–294.
- SIGMOD-1988-DeWittGS #database #performance
- A Performance Analysis of the Gamma Database Machine (DJD, SG, DAS), pp. 350–360.
- SIGMOD-1988-Hanson #database #performance #query
- Processing Queries Against Database Procedures: A Performance Analysis (ENH), pp. 295–302.
- SIGMOD-1988-Ramakrishna
- Hashing in Practive, Analysis of Hashing and Universal Hashing (MVR), pp. 191–199.
- VLDB-1988-Bhide #architecture #transaction
- An Analysis of Three Transaction Processing Architectures (AB), pp. 339–350.
- SEI-1988-LaviW #embedded #industrial #requirements #specification
- Embedded Computer Systems. Requirements Analysis & Specification — An Industrial Course (JZL, MW), pp. 81–105.
- ICALP-1988-AlbertF #algorithm #complexity #multi
- Average Case Complexity Analysis of the Rete Multi-Pattern Match Algorithm (LA, FF), pp. 18–37.
- ICALP-1988-LengauerW #graph #performance
- Efficient Analysis of Graph Properties on Context-free Graph Languages (TL, EW), pp. 379–393.
- CSCW-1988-Greenbaum
- In Search of Cooperation: An Historical Analysis of Work Organization and Management Strategies (JG), pp. 102–114.
- SIGIR-1988-BollmannR
- A Utility-Theoretic Analysis of Expected Search Length (PB, VVR), pp. 245–256.
- OOPSLA-1988-Alabiso #data flow #design #modelling #object-oriented
- Transformation of Data Flow Analysis Models to Object-Oriented Design (BA), pp. 335–354.
- PLDI-1988-BallanceBG #abstraction #editing #incremental #syntax
- Grammatical Abstraction and Incremental Syntax Analysis in a Language-Based Editor (RAB, JB, SLG), pp. 185–198.
- PLDI-1988-Callahan #data flow #graph #interprocedural #summary
- The Program Summary Graph and Flow-Sensitive Interprocedural Data Flow Analysis (DC), pp. 47–56.
- PLDI-1988-CooperK #interprocedural #linear
- Interprocedural Side-Effect Analysis in Linear Time (KDC, KK), pp. 57–66.
- PLDI-1988-JainT #approach #data flow #multi #performance
- An Efficient Approach to Data Flow Analysis in a Multi Pass Global Optimizer (SJ, CLT), pp. 154–163.
- PLDI-1988-SeshadriWJWYS #compilation #concurrent #semantics
- Semantic Analysis in a Concurrent Compiler (VS, DBW, MDJ, SW, CPY, IS), pp. 233–240.
- PLDI-1988-Shivers #control flow
- Control-Flow Analysis in Scheme (OS), pp. 164–174.
- POPL-1988-CarrollR #data flow #incremental
- Incremental Data Flow Analysis via Dominator and Attribute Updates (MDC, BGR), pp. 274–284.
- POPL-1988-Debray #data flow #logic programming #performance #source code
- Efficient Dataflow Analysis of Logic Programs (SKD), pp. 260–273.
- POPL-1988-MontenyohlW #continuation #semantics
- Correct Flow Analysis in Continuation Semantics (MM, MW), pp. 204–218.
- POPL-1988-NielsonN #automation #λ-calculus
- Automatic Binding Time Analysis for a Typed λ-Calculus (HRN, FN), pp. 98–106.
- POPL-1988-RuggieriM
- Lifetime Analysis of Dynamically Allocated Objects (CR, TPM), pp. 285–293.
- POPL-1988-Wadler #strict
- Strictness Analysis Aids Time Analysis (PW), pp. 119–132.
- Best-of-PLDI-1988-CooperK88a #interprocedural #linear
- Interprocedural side-effect analysis in linear time (with retrospective) (KDC, KK), pp. 217–228.
- Best-of-PLDI-1988-Shivers88a #control flow #higher-order #lessons learnt
- Higher-order control-flow analysis in retrospect: lessons learned, lessons abandoned (with retrospective) (OS), pp. 257–269.
- ICSE-1988-ChaLS #fault #safety #using #verification
- Safety Verification in Murphy Using Fault Tree Analysis (SSC, NGL, TJS), pp. 377–387.
- ICSE-1988-Hagemann #automation #realtime #requirements
- Requirements Analysis for Real-Time Automation Projects (MH), pp. 122–129.
- DAC-1988-BeattyB #incremental #performance #using
- Fast Incremental Circuit Analysis Using Extracted Hierarchy (DLB, REB), pp. 495–500.
- DAC-1988-BurchNYH #estimation #independence #reliability
- Pattern-Independent Current Estimation for Reliability Analysis of CMOS Circuits (RB, FNN, PY, DEH), pp. 294–299.
- DAC-1988-ChiangNL #algorithm #performance
- Time Efficient VLSI Artwork Analysis Algorithms in GOALIE2 (KWC, SN, CYL), pp. 471–475.
- DAC-1988-Cirit #random #testing
- Switch Level Random Pattern Testability Analysis (MAC), pp. 587–590.
- DAC-1988-Sherman #algorithm #generative
- Algorithms for Timing Requirement Analysis and Generation (SKS), pp. 724–727.
- DAC-1988-YenGD #algorithm
- A Path Selection Algorithm for Timing Analysis (HCY, SG, DHCD), pp. 720–723.
- PPEALS-1988-LiY #interprocedural #parallel #performance
- Efficient Interprocedural Analysis for Program Parallelization and Restructuring (ZL, PCY), pp. 85–99.
- ESOP-1988-Takayama #compilation #named #proving
- QPC: QJ-based Proof Compiler — Simple Examples and Analysis (YT), pp. 49–63.
- STOC-1988-HalpernMT #knowledge-based
- A Knowledge-Based Analysis of Zero Knowledge (JYH, YM, MRT), pp. 132–147.
- STOC-1988-LuekerM
- More Analysis of Double Hashing (GSL, MM), pp. 354–359.
- STOC-1988-PapadimitriouY88b #algorithm #architecture #independence #parallel #towards
- Towards an Architecture-Independent Analysis of Parallel Algorithms (CHP, MY), pp. 510–513.
- JICSCP-1988-Docker88 #implementation #named #prolog
- SAME — A Structured Analysis Tool and its Implementation in Prolog (TWGD), pp. 82–95.
- JICSCP-1988-GorlickK88 #logic programming #named #performance #source code
- Gauge: A Workbench for the Performance Analysis of Logic Programs (MMG, CK), pp. 548–561.
- JICSCP-1988-HuynhL88
- A CLP(R) Options Trading Analysis System (TH, CL), pp. 59–69.
- JICSCP-1988-WarrenHD88 #logic programming #on the #source code
- On the Practicality of Global Flow Analysis of Logic Programs (RW, MVH, SKD), pp. 684–699.
- PODS-1987-Hadzilacos #protocol
- A Knowledge Theoretic Analysis of Atomic Commitment Protocols (VH), pp. 129–134.
- PODS-1987-Marchetti-SpaccamelaPS #complexity #implementation #logic #query #worst-case
- Worst-case Complexity Analysis of Methods for Logic Query Implementation (AMS, AP, DS), pp. 294–301.
- SIGMOD-1987-FaloutsosSR #data access #object-oriented
- Analysis of Object Oriented Spatial Access Methods (CF, TKS, NR), pp. 426–439.
- SIGMOD-1987-Hanson #performance
- A Performance Analysis of View Materialization Strategies (ENH), pp. 440–453.
- SIGMOD-1987-NelsonS #data type
- A Population Analysis for Hierarchical Data Structures (RCN, HS), pp. 270–277.
- VLDB-1987-DiasIRY #design
- Design and Analysis of Integrated Concurrency-Coherence Controls (DMD, BRI, JTR, PSY), pp. 463–471.
- ICALP-1987-Dybjer #image
- Inverse Image Analysis (PD), pp. 21–30.
- FPCA-1987-WadlerH #strict
- Projections for strictness analysis (PW, RJMH), pp. 385–407.
- HCI-CE-1987-LuekePB #protocol #requirements
- User Requirements Gathering Through Verbal Protocol Analysis (EEL, PDP, CRB), pp. 523–528.
- HCI-SES-1987-Malt #approach #human-computer #interface
- Skills Analysis in Human-Computer Interface: A Holistic Approach (LGM), pp. 319–326.
- HCI-SES-1987-Saito #evaluation #eye tracking
- Quantitative Evaluation of VDT Operations Through the Analysis of Spatio-Temporal Characteristics of Eye Movement (SS), pp. 197–202.
- SIGIR-1987-Harman #online
- A Failure Analysis on the Limitations of Suffixing in an Online Environment (DH), pp. 102–107.
- SIGIR-1987-SmithWF #named #retrieval
- MICROARRAS: An Advanced Full-Text Retrieval and Analysis System (JBS, SFW, GJF), pp. 187–195.
- OOPSLA-1987-KerrP #object-oriented #programming #using
- Use of Object-Oriented Programming in a Time Series Analysis System (RKK, DBP), pp. 1–10.
- PLDI-1987-OffuttK #fortran #interpreter #mutation testing
- A Fortran 77 interpreter for mutation analysis (AJO, KNK), pp. 177–188.
- POPL-1987-KuoM #on the #strict
- On Strictness and its Analysis (TMK, PM), pp. 144–155.
- POPL-1987-Nielson #abstract interpretation #strict
- Strictness Analysis and Denotational Abstract Interpretation (FN), pp. 120–131.
- ESEC-1987-RobinsonE #database #requirements
- Requirements Analysis for a Database Administration Support Environment (HMR, JME), pp. 377–386.
- DAC-1987-Parks #design #named #tutorial
- Tutorial: Reading and Reviewing the Common Schema for Electrical Design and Analysis (CHP), pp. 479–483.
- STOC-1987-Bach #algorithm #random
- Realistic Analysis of Some Randomized Algorithms (EB), pp. 453–461.
- STOC-1987-HastadLR #multi #protocol
- Analysis of Backoff Protocols for Multiple Access Channels (JH, FTL, BR), pp. 241–253.
- SLP-1987-Debray87 #logic programming #source code
- Flow Analysis of a Simple Class of Dynamic Logic Programs (SKD), pp. 307–316.
- SLP-1987-MannilaU87 #prolog #source code
- Flow Analysis of Prolog Programs (HM, EU), pp. 205–214.
- ICALP-1986-BrzozowskiS #network #simulation
- Correspondence between Ternary Simulation and Binary Race Analysis in Gate Networks (JAB, CJHS), pp. 69–78.
- LFP-1986-BlossH #strict
- Variations on Strictness Analysis (AGB, PH), pp. 132–142.
- GG-1986-MoldovanP #graph grammar #parallel #rule-based #using
- Parallelism analysis in rule-based systems using graph grammars (DIM, FPP), pp. 427–439.
- CSCW-1986-ApplegateKN #generative #idea
- A group decision support system for idea generation and issue analysis in organization planning (LMA, BRK, JFN), pp. 16–34.
- CSCW-1986-BegemanCEGRS
- Project Nick: meetings augmentation and analysis (MLB, PC, CAE, MG, GLR, TS), pp. 1–6.
- SIGIR-1986-TruckenmullerR #design #perspective #topic
- Methodological Issues for the Design of an Office Information Server — Focal Topics for the Analysis from an Office System Perspective (TWT, MR), pp. 39–48.
- POPL-1986-Coutant #alias
- Retargetable High-Level Alias Analysis (DSC), pp. 110–118.
- POPL-1986-HudakY #higher-order #strict #λ-calculus
- Higher-Order Strictness Analysis in Untyped λ Calculus (PH, JY), pp. 97–109.
- POPL-1986-JonesM #data flow #graph #source code #using
- Data Flow Analysis of Applicative Programs Using Minimal Function Graphs (NDJ, AM), pp. 296–306.
- POPL-1986-SneltingH #algebra #incremental #semantics #unification
- Unification in Many-Sorted Algebras as a Device for Incremental Semantic Analysis (GS, WH), pp. 229–235.
- Best-of-PLDI-1986-BurkeC #dependence #interprocedural #parallel
- Interprocedural dependence analysis and parallelization (with retrospective) (MGB, RC), pp. 139–154.
- DAC-1986-BarzilaiBHIS #fault #named #performance #verification
- SLS — a fast switch level simulator for verification and fault coverage analysis (ZB, DKB, LMH, VSI, GMS), pp. 164–170.
- DAC-1986-Hartoog #layout #standard
- Analysis of placement procedures for VLSI standard cell layout (MRH), pp. 314–319.
- DAC-1986-JacobNP #empirical #multi #performance
- An empirical analysis of the performance of a multiprocessor-based circuit simulator (GKJ, ARN, DOP), pp. 588–593.
- DAC-1986-Larsen #clustering #data type #synthesis
- Rules-based object clustering: a data structure for symbolic VLSI synthesis and analysis (RPL), pp. 768–777.
- DAC-1986-ToyoshimaTMHHKT #design #effectiveness #scalability
- An effective delay analysis system for a large scale computer design (RT, YT, KM, HH, MH, RK, KT), pp. 398–403.
- DAC-1986-VidigalND #integration #named #network
- CINNAMON: coupled integration and nodal analysis of MOS networks (LMV, SRN, SWD), pp. 179–185.
- ESOP-1986-KastensS #parametricity
- Lifetime Analysis for Procedure Parameters (UK, MS), pp. 53–69.
- STOC-1986-LeightonS #algorithm #bound #grid
- Tight Bounds for Minimax Grid Matching, With Applications to the Average Case Analysis of Algorithms (FTL, PWS), pp. 91–103.
- CADE-1986-Jager #logic
- Some Contributions to the Logical Analysis of Circumscrition (GJ), pp. 154–171.
- ICLP-1986-Matsumoto86 #natural language #parallel #parsing
- A Parallel Parsing System for Natural Language Analysis (YM), pp. 396–409.
- LICS-1986-Coquand
- An Analysis of Girard’s Paradox (TC), pp. 227–236.
- SIGMOD-1985-DemoK #database #dependence
- Analysis of the Context Dependency of CODASYL Find-Statements with Application to Database Program Conversion (GBD, SK), pp. 354–361.
- SIGMOD-1985-KamelK
- A Model of Data Distribution Based on Texture Analysis (NK, RK), pp. 319–325.
- ICALP-1985-KurtzM #algorithm #distributed #probability #set
- A Probabilistic Distributed Algorithm for Set Intersection and Its Analysis (TGK, UM), pp. 356–362.
- FPCA-1985-ClackJ85 #approach #strict
- Strictness Analysis — A Practical Approach (CDC, SLPJ), pp. 35–49.
- FPCA-1985-PatelSE85 #algorithm #hardware #multi #named #specification #synthesis
- vFP: An Environment for the Multi-level Specification, Analysis, and Synthesis of Hardware Algorithms (DP, MDFS, MDE), pp. 238–255.
- ICSE-1985-GirgisW #data flow #testing #using
- An Integrated System for Program Testing Using Weak Mutation and Data Flow Analysis (MRG, MRW), pp. 313–319.
- ICSE-1985-StephensW #design
- The Analyst — A Workstation for Analysis and Design (MS, KW), pp. 364–371.
- DAC-1985-Chan #development #multi #network
- Development of a timing analysis program for multiple clocked network (EC), pp. 816–819.
- DAC-1985-MuraokaIKMH #named
- ACTAS: an accurate timing analysis system for VLSI (MM, HI, HK, MM, KH), pp. 152–158.
- DAC-1985-PerryMP #modelling
- Yield analysis modeling (SP, MM, DJP), pp. 425–428.
- DAC-1985-PierroD #design #integration
- Mechanical design/analysis integration on Apollo workstations (JAP, GFD), pp. 96–101.
- DAC-1985-RoseBT #design #performance #probability #tool support
- Integrating stochastic performance analysis with system design tools (CWR, MB, YT), pp. 482–488.
- DAC-1985-SchefferS #abstraction
- Hierarchical analysis of IC artwork with user defined abstraction rules (LS, RS), pp. 293–298.
- DAC-1985-Tendolkar #fault #random
- Analysis of timing failures due to random AC defects in VLSI modules (NNT), pp. 709–714.
- DAC-1985-Wunderlich #named #probability #testing
- PROTEST: a tool for probabilistic testability analysis (HJW), pp. 204–211.
- SOSP-1985-OusterhoutCHKKT #file system
- A Trace-Driven Analysis of the UNIX 4.2 BSD File System (JKO, HDC, DH, JAK, MDK, JGT), pp. 15–24.
- SLP-1985-ChangD85 #backtracking #dependence #prolog
- Semi-Intelligent Backtracking of Prolog Based on Static Data Dependency Analysis (JHC, AMD), pp. 10–21.
- VLDB-1984-BennR #image #relational #retrieval #sequence
- Retrieval of Relational Structures for Image Sequence Analysis (WB, BR), pp. 533–536.
- ICALP-1984-KirschenhoferP #algorithm #recursion #traversal
- Recursion Depth Analysis for Special Tree Traversal Algorithms (PK, HP), pp. 303–311.
- ICALP-1984-Lagarias #performance
- Performance Analysis of Shamir’s Attack on the Basic Merkle-Hellman Knapsack Cryptosystem (JCL), pp. 312–323.
- SIGIR-1984-NiedermairTB #named #retrieval
- MARS: A Retrieval Tool on the Basis of Morphological Analysis (GTN, GT, IB), pp. 369–381.
- SIGIR-1984-Tolle #evaluation #information management #monitoring #transaction
- Monitoring and Evaluation of Information Systems Via Transaction Log Analysis (JT), pp. 247–258.
- SCC-1984-Koskimies #semantics #specification
- A specification language for one-pass semantic analysis (KK), pp. 179–189.
- SCC-1984-Zadeck #data flow #editing #incremental
- Incremental data flow analysis in a structured program editor (FKZ), pp. 132–143.
- ICSE-1984-ToriiMSK #functional #logic #problem #programming
- Functional Programming and Logical Programming for the Telegram Analysis Problem (KT, YM, YS, TK), pp. 463–472.
- DAC-1984-GeusRRW #named
- IDA: Interconnect delay analysis for integrated circuits (AJdG, JBR, MR, GW), pp. 536–541.
- DAC-1984-JhonK #concurrent #data flow #design
- Deadlock analysis in the design of data-flow circuits (CSJ, RMK), pp. 705–707.
- STOC-1984-KarpLM #multi #probability #problem
- A Probabilistic Analysis of Multidimensional Bin Packing Problems (RMK, ML, AMS), pp. 289–298.
- CADE-1984-Plaisted #dependence #graph #proving #theorem proving #using
- Using Examples, Case Analysis, and Dependency Graphs in Theorem Proving (DAP), pp. 356–374.
- SIGIR-1983-BrooksB #design #information retrieval #interactive #using
- Using Discourse Analysis for The Design of Information Retrieval Interaction Mechanisms (HMB, NJB), pp. 31–47.
- SIGIR-1983-Somers #file system #recommendation #user interface
- The User View of File Management: Recommendations for a User Interface Based in an Analysis of UNIX File System Use (PS), p. 161.
- SIGIR-1983-Tolle #online #transaction
- Transactional Log Analysis: Online Catalogs (JT), pp. 147–160.
- POPL-1983-Ryder #data flow #incremental
- Incremental Data Flow Analysis (BGR), pp. 167–176.
- DAC-1983-Jouppi
- Timing analysis for nMOS VLSI (NPJ), pp. 411–418.
- DAC-1983-SzymanskiW #algorithm #performance
- Space efficient algorithms for VLSI artwork analysis (TGS, CJVW), pp. 734–739.
- DAC-1983-TamuraON #layout
- Path delay analysis for hierarchical building block layout system (ET, KO, TN), pp. 403–410.
- STOC-1983-Turner #algorithm #probability
- Probabilistic Analysis of Bandwidth Minimization Algorithms (JST), pp. 467–476.
- SIGMOD-1982-BatesBD #database #framework #research #statistics
- A Framework for Research in Database Management for Statistical Analysis (DMB, HB, DJD), pp. 69–78.
- SIGMOD-1982-Cooper #commit #distributed #protocol
- Analysis of Distributed Commit Protocols (ECC), pp. 175–183.
- SIGMOD-1982-Finkelstein #database
- Common Subexpression Analysis in Database Applications (SJF), pp. 235–245.
- POPL-1982-JonesM #approach #data flow #data type #flexibility #interprocedural #recursion #source code
- A Flexible Approach to Interprocedural Data Flow Analysis and Programs with Recursive Data Structures (NDJ, SSM), pp. 66–74.
- POPL-1982-Reps #editing #incremental #semantics
- Optimal-Time Incremental Semantic Analysis for Syntax-Directed Editors (TWR), pp. 169–176.
- ICSE-1982-Forman #composition #data flow
- Global Data Flow Analysis by Decomposition into Primes (IRF), pp. 386–392.
- ICSE-1982-RappsW #data flow #testing
- Data Flow Analysis Techniques for Test Data Selection (SR, EJW), pp. 272–278.
- ASPLOS-1982-McDaniel #set #using
- An Analysis of a Mesa Instruction Set Using Dynamic Instruction Frequencies (GM), pp. 167–176.
- ASPLOS-1982-SweetS #empirical #set
- Empirical Analysis of the Mesa Instruction Set (RES, JGSJ), pp. 158–166.
- DAC-1982-Agrawal
- Synchronous path analysis in MOS circuit simulator (VDA), pp. 629–635.
- DAC-1982-BeningLAS #logic #network
- Developments in logic network path delay analysis (LB, TAL, CRA, JES), pp. 605–615.
- DAC-1982-GoelM82a #interactive #testing
- An interactive testability analysis program — ITTAP (DKG, RMM), pp. 581–586.
- DAC-1982-Sr #verification
- Timing Verification and the Timing Analysis program (RBHS), pp. 594–604.
- VLDB-1981-MenonH #design #relational
- Design and Analysis of a Relational Join Operation for VLSI (JM, DKH), pp. 44–55.
- VLDB-1981-MontgomeryR #data-driven #information management
- The Active Information System: A Data-Driven System for the Analysis of Imprecise Data (CAM, EHR), pp. 376–384.
- ICALP-1981-Jones
- Flow Analysis of λ Expressions (NDJ), pp. 114–128.
- ICALP-1981-Schnorr #algorithm
- Refined Analysis and Improvements on Some Factoring Algorithms (CPS), pp. 1–15.
- ICALP-1981-Sharir #data flow #source code
- Data Flow Analysis of Applicative Programs (MS), pp. 98–113.
- SIGIR-1981-Carroll
- Content Analysis as a Word-Processing Option (JMC), pp. 126–131.
- ICSE-1981-BasiliW #documentation #evaluation #requirements
- Evaluation of a Software Requirements Document by Analysis of Change Data (VRB, DMW), pp. 314–324.
- ICSE-1981-ChenZ #clustering #re-engineering #using
- Use of Cluster Analysis to Evaluate Software Engineering Methodologies (EC, MVZ), pp. 117–124.
- ICSE-1981-FutamuraKHT #development #diagrams #problem #source code
- Development of Computer Programs by Problem Analysis Diagram (PAD) (YF, TK, HH, MT), pp. 325–332.
- ICSE-1981-KomodaHKS #approach #modelling #requirements #using
- An Innovative Approach to System Requirements Analysis by Using Structural Modeling Method (NK, KH, HK, HS), pp. 305–313.
- ICSE-1981-RichardsonC #reliability
- A Partition Analysis Method to Increase Program Reliability (DJR, LAC), pp. 244–253.
- ICSE-1981-ZeilW #testing
- Sufficient Tset Sets for Path Analysis Testing Strategies (SJZ, LJW), pp. 184–194.
- DAC-1981-DewhirstH #design #modelling
- Application of volumetric modeling to mechanical design and analysis (DLD, RCH), pp. 171–178.
- DAC-1981-HaferP #design #formal method #logic #specification
- A formal method for the specification, analysis, and design of register-transfer level digital logic (LJH, ACP), pp. 846–853.
- DAC-1981-McDermott #fault #random
- Random fault analysis (RMM), pp. 360–364.
- DAC-1981-Ruehli #logic #modelling #overview #scalability #simulation
- Survey of analysis, simulation and modeling for large scale logic circuits (AER), pp. 124–129.
- STOC-1981-GonnetM #linear
- A Linear Probing Sort and its Analysis (GHG, JIM), pp. 90–95.
- VLDB-1980-Badal #concurrent #database #distributed #performance
- The Analysis of the Effects of Concurrency Control on Distributed Database System Performance (DZB), pp. 376–383.
- VLDB-1980-EpsteinS #database #distributed
- Analysis of Distributed Data Base Processing Strategies (RSE, MS), pp. 92–101.
- ICALP-1980-CousotC #communication #csp #process #semantics
- Semantic Analysis of Communicating Sequential Processes (Shortened Version) (PC, RC), pp. 119–133.
- ICALP-1980-FlajoletS #algorithm #on the
- On the Analysis of Tree-Matching Algorithms (PF, JMS), pp. 208–219.
- ICALP-1980-PapadimitriouB #nearest neighbour #worst-case
- A Worst-Case Analysis of Nearest Neighbor Searching by Projection (CHP, JLB), pp. 470–482.
- SIGIR-1980-KracsonyKM #comparative #hardware
- Comparative Analysis of Hardware Versus Software Text Search (PK, GJK, AM), pp. 268–279.
- POPL-1980-Kfoury #set #source code
- Analysis of Simple Programs Over Different Sets of Primitives (AJK), pp. 56–61.
- POPL-1980-Suzuki #pointer
- Analysis of Pointer Rotation (NS), pp. 1–11.
- POPL-1980-Weihl #data flow #interprocedural #pointer
- Interprocedural Data Flow Analysis in the Presence of Pointers, Procedure Variables and Label Variables (WEW), pp. 83–94.
- DAC-1980-AbramoviciB #fault
- Fault diagnosis based on effect-cause analysis: An introduction (MA, MAB), pp. 69–76.
- DAC-1980-AltmanP #design
- The SLIDE simulator: A facility for the design and analysis of computer interconnections (AHA, ACP), pp. 148–155.
- DAC-1980-Goel #generative #testing
- Test generation costs analysis and projections (PG), pp. 77–84.
- DAC-1980-GoldsteinT #named
- SCOAP: Sandia controllability/observability analysis program (LHG, ELT), pp. 190–196.
- DAC-1980-LeinwandL #algebra #behaviour #nondeterminism
- Algebraic analysis of nondeterministic behavior (SML, TL), pp. 483–493.
- DAC-1980-Miller #automation #design
- Inter-active graphic methods for automating mechanical engineering design and analyses (JMM), pp. 114–128.
- DAC-1980-MitsuhashiCTY
- An integrated mask artwork analysis system (TM, TC, MT, KY), pp. 277–284.
- DAC-1980-Powell
- Justification and financial analysis for CAD (REP), pp. 564–571.
- DAC-1980-Yates #design #metric #process
- Design process analysis: A measurement and analysis technique (KDY), pp. 420–421.
- CADE-1980-Bruynooghe #behaviour #dependence #logic programming #source code
- Analysis of Dependencies to Improve the Behaviour of Logic Programs (MB), pp. 293–305.
- SIGMOD-1979-BadalP #performance #semantics #validation
- Cost and Performance Analysis of Semantic Integrity Validation Methods (DZB, GJP), pp. 109–115.
- SIGMOD-1979-HawthornS #database #performance #relational
- Performance Analysis of a Relational Data Base Management System (PBH, MS), pp. 1–12.
- SIGMOD-1979-YuLSO #performance #problem
- Performance Analysis of three Related Assignment Problems (CTY, KL, MKS, ZMÖ), pp. 82–92.
- ICALP-1979-Karp #algorithm #graph #probability
- Recent Advances in the Probabilistic Analysis of Graph-Theoretic Algorithms (RMK), pp. 338–339.
- SIGIR-1979-DominickP #automation #evaluation #information management #monitoring
- Automated Monitoring to Support the Analysis and Evaluation of Information Systems (WDD, WDP), pp. 2–9.
- POPL-1979-JonesM #optimisation
- Flow Analysis and Optimization of Lisp-Like Structures (NDJ, SSM), pp. 244–256.
- POPL-1979-Reif #communication #data flow #process
- Data Flow Analysis of Communicating Processes (JHR), pp. 257–268.
- ICSE-1979-AbeSA
- An Analysis of Software Project Failure (JA, KS, HA), pp. 378–385.
- DAC-1979-LoslebenT
- Topological analysis for VLSI circuits (PL, KT), pp. 461–473.
- SOSP-1979-KumarG #distributed #modelling
- Modelling and Analysis of Distributed Software Systems (BK, TAG), pp. 2–8.
- VLDB-1978-Ashany #classification #database #matrix #retrieval #scalability
- Application of Sparse Matrix Techniques to Search, Retrieval, Classification and Relationship Analysis in Large Data Base Systems — SPARCOM (RA), pp. 499–516.
- VLDB-1978-Mason #architecture
- A DBMS Architecture to Support Information Analysis (PJM), p. 332.
- VLDB-1978-NakamuraM
- An Analysis of Storage Utilization Factor in Block Split Data Structuring Scheme (TN, TM), pp. 489–495.
- GG-1978-RosendahlM #reduction #source code
- Analysis of Programs by Reduction of Their Structure (MR, KPM), pp. 409–417.
- GG-1978-Wileden #concurrent #design #graph grammar
- Relationships Between Graph Grammars and the Design and Analysis of Concurrent Software (JCW), pp. 456–463.
- SIGIR-1978-Hill #database
- Analysis of An Inverted Data Base Structure (EHJ), pp. 37–64.
- POPL-1978-Reif #linear #programming
- Symbolic Programming Analysis in Almost Linear Time (JHR), pp. 76–83.
- POPL-1978-Rosen #agile #data flow #monad
- Monoids for Rapid Data Flow Analysis (BKR), pp. 47–59.
- ICSE-1978-HerndonK #fault #validation
- Analysis of Error Remediation Expenditures During Validation (MAH, APK), pp. 202–206.
- ICSE-1978-McClure #complexity
- A Model for Program Complexity Analysis (CLM), pp. 149–157.
- ICSE-1978-Willis #automation #design #named
- DAS: An Automated System to Support Design Analysis (RRW), pp. 109–115.
- DAC-1978-Weste #design
- A color graphics system for I.C. mask design and analysis (NW), pp. 199–205.
- DAC-1978-Willis #automation #design #named
- DAS: An automated system to support design analysis (RRW), pp. 359–365.
- DAC-1978-Wold #design #performance #verification
- Design verification and performance analysis (MAW), pp. 264–270.
- STOC-1978-Baudet #algorithm
- An Analysis of the Full αβ Pruning Algorithm (GMB), pp. 296–313.
- VLDB-1977-HultenS #database #performance #scalability #simulation
- A Simulation Model for Performance Analysis of Large Shared Data Bases (CH, LS), pp. 524–532.
- VLDB-1977-Navathe #database
- Schema Analysis for Database Restructuring (SBN), p. 326.
- POPL-1977-Barth #algorithm #data flow #interprocedural
- An Interprocedural Data Flow Analysis Algorithm (JMB), pp. 119–131.
- POPL-1977-KennedyZ #control flow #graph grammar
- Applications of Graph Grammar for Program Control Flow Analysis (KK, LZ), pp. 72–85.
- DAC-1977-Baird #algorithm #performance
- Fast algorithms for LSI artwork analysis (HSB), pp. 303–311.
- DAC-1977-Domaszewicz
- Flight test analysis of missile control systems (MD), pp. 101–108.
- SOSP-1977-Potier #policy #set
- Analysis of Demand Paging Policies with Swapped Working Sets (DP), pp. 125–131.
- SOSP-1977-Snyder #on the #synthesis
- On the Synthesis and Analysis of Protection Systems (LS), pp. 141–150.
- STOC-1977-GonnetM
- The Analysis of an Improved Hashing Technique (GHG, JIM), pp. 113–121.
- POPL-1976-Franck #2d #graph grammar #named #precedence
- PLAN2D — Syntactic Analysis of Precedence Graph Grammars (RF), pp. 134–139.
- ICSE-1976-GoudaM #design #modelling #on the #protocol
- On the Modelling, Analysis and Design of Protocols — A Special Class of Software Structures (MGG, EGM), pp. 256–262.
- ICSE-1976-PimontR #assessment #behaviour #reliability #source code
- A Software Reliability Assessment Based on a Structural and Behavioral Analysis of Programs (SP, JCR), pp. 486–491.
- ICSE-1976-RossS #requirements
- Structured Analysis for Requirements Definition (DTR, KESJ), p. 1.
- ICSE-1976-Stephenson #development
- An Analysis of the Resources Used in the SAFEGUARD System Software Development (WES), pp. 312–321.
- ICSE-1976-TeichroewH #documentation #information management #named
- PSL/PSA: A Computer-Aided Technique for Structured Documentation and Analysis of Information Processing Systems (DT, EAHI), p. 2.
- ICSE-1976-WensleyGLS #design #fault tolerance #verification
- The Design, Analysis, and Verification of the SIFT Fault-Tolerant System (JHW, MWG, KNL, RES), pp. 458–469.
- SOSP-J-1975-ChuO76 #algorithm #markov
- Analysis of the PFF Replacement Algorithm via a Semi-Markov Model (WWC, HO), pp. 298–304.
- DAC-1976-BuntineP #design
- Design rule checking and analysis of IC mask designs (WLB, BP), pp. 301–308.
- DAC-1976-Case #fault #logic
- Analysis of actual fault mechanisms in CMOS logic gates (GRC), pp. 265–270.
- DAC-1976-Ho #preprocessor #source code
- A preprocessor for structural analysis programs (PKH), pp. 17–24.
- DAC-1976-PreasBG #automation
- Automatic circuit analysis based on mask information (BP, WLB, CWG), pp. 309–317.
- STOC-1976-GuibasS
- The Analysis of Double Hashing (LJG, ES), pp. 187–191.
- VLDB-1975-Chin #behaviour
- Analysis of VSAM’s Free-Space Behavior (YHC), pp. 514–515.
- VLDB-1975-HofferS #clustering #database #design #physics #using
- The Use of Cluster Analysis in Physical Data Base Design (JAH, DGS), pp. 69–86.
- VLDB-1975-Miyamoto #database #modelling #performance
- Hierarchical Performance Analysis Models for Data Base Systems (IM), pp. 322–352.
- POPL-1975-GrahamW #algorithm #linear #performance
- A Fast and Usually Linear Algorithm for Global Flow Analysis (SLG, MNW), pp. 22–34.
- POPL-1975-Kennedy #data flow
- Node Listings Applied to Data Flow Analysis (KK), pp. 10–21.
- DAC-1975-Foster #source code
- Prerouting analysis programs (JCF), pp. 306–310.
- SOSP-1975-LamS #algorithm #scheduling
- Analysis of a Level Algorithm for Preemptive Scheduling (SL, RS), pp. 178–186.
- SOSP-1975-Sadeh #algorithm #fault #performance
- An Analysis of the Performance of the Page Fault Frequency (PFF) Replacement Algorithm (ES), pp. 6–13.
- STOC-1975-Pratt #modelling #optimisation
- Four Models for the Analysis of Optimization of Program Control Structures (TWP), pp. 167–176.
- SIGFIDET-1974-BehymerOM
- Analysis of Indexed Sequential and Direct Access File Organizations (JAB, RAO, AGM), pp. 389–417.
- DAC-1974-Garrett #modelling
- Transmission line models for transient analysis (SJG), pp. 209–219.
- DAC-1974-MitchellG #automation #named
- MAP: A user-controlled automated Mask Analysis Program (CLM, JMG), pp. 107–118.
- DAC-1974-ThompsonSBP #fault #simulation #using
- Timing analysis for digital fault simulation using assignable delays (EWT, SAS, NB, RP), pp. 266–272.
- SIGIR-1973-MartinP #comparative #interactive #retrieval
- Comparative Analysis of Interactive Retrieval Systems (THM, EBP), pp. 75–85.
- POPL-1973-HechtU #algorithm #problem
- Analysis of a Simple Algorithm for Global Flow Problems (MSH, JDU), pp. 207–217.
- STOC-1973-GentlemanJ #algorithm #case study
- Analysis of Algorithms, a Case Study: Determinants of Polynomials (WMG, SCJ), pp. 135–141.
- STOC-1973-Kosaraju #source code
- Analysis of Structured Programs (SRK), pp. 240–252.
- STOC-1973-Teitelbaum #algebra #evaluation #fault
- Context-Free Error Analysis by Evaluation of Algebraic Power Series (RT), pp. 196–199.
- DAC-1972-ChangDE #fault #logic #self #simulation
- Logic simulation and fault analysis of a self-checking switching processor (HYC, RCD, RAE), pp. 128–137.
- DAC-1972-UlrichBW #logic #simulation
- Fault-test analysis techniques based on logic simulation (EGU, TEB, LRW), pp. 111–115.
- SOSP-J-1973-TeoreyP72 #comparative #policy #scheduling
- A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 177–184.
- STOC-1972-GareyGU #algorithm #memory management #worst-case
- Worst-Case Analysis of Memory Allocation Algorithms (MRG, RLG, JDU), pp. 143–150.
- SIGFIDET-1971-Engles #database
- An Analysis of the April 1971 Data Base Task Group Report (RWE), pp. 69–91.
- DAC-1971-HarrisonO #logic #simulation
- Race analysis of digital systems without logic simulation (RAH, DJO), pp. 82–94.
- DAC-1971-TsudaKGN #named #network #simulation
- NONLISA: Nonlinear network simulation and analysis program (TT, TK, SG, TN), pp. 347–357.
- DAC-1971-VishnubhotlaC #approach
- A path analysis approach to the diagnosis of combinational circuits (SRV, YHC), pp. 222–230.
- SOSP-1971-TeoreyP #comparative #policy #scheduling
- A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 114–121.
- DAC-1970-MitchellG #design #monte carlo #simulation
- A simulation program for monte carlo analysis and design (EELM, DG), pp. 265–270.
- DAC-1970-RockwellP #finite
- Computer aided input/output for use with the finite element method of structural analysis (RDR, DSP), pp. 315–334.
- DAC-1970-Sr #clustering #graph #logic #reduction
- Partitioning of logic graphs: A theoretical analysis of pin reduction (RBHS), pp. 54–63.
- STOC-1970-Chang #2d #using
- The Analysis of Two-Dimensional Patterns using Picture Processing Grammars (SKC), pp. 206–216.
- DAC-1969-BoehmLMR #interactive
- Interactive trajectory analysis: the graphic rocket system (BWB, VRL, RLM, JER), pp. 205–232.
- SOSP-1969-BryanS #performance
- The UTS time-sharing system: performance analysis and instrumentation (GEB, JES), pp. 147–158.
- STOC-1969-PetersR #context-free grammar #revisited
- Context-Sensitive Immediate Constituent Analysis — Context-Free Languages Revisited (PSPJ, RWR), pp. 1–8.
- DAC-1968-Anstiss #named
- MDELTA — a digital program for control system analysis (BHA).
- DAC-1968-Bernstein #graph #online
- Electronic circuit analysis with on-line graphs via a time-sharing terminal (SB).
- DAC-1968-GarrettV #worst-case
- Circuit frequency response analysis program with worst-case capabilities (FRWC) (SJG, THV).
- DAC-1968-Murray-LassoK #online #optimisation
- On-line circuit analysis and optimization with commercially available time-shared computer systems (MAML, FJK).
- DAC-1967-Branin #network
- Computer methods of network analysis (FHBJ).
- DAC-1967-CalvinCEM #design
- Design and analysis of electronic circuits (ELC, LCC, JRE, RSM).
- DAC-1967-Malakoff
- Coupling graphics and circuit analysis techniques (JLM).
- DAC-1967-Pritchard #overview #source code
- A survey of transient circuit analysis programs (GKP).
- DAC-1967-WilliamsMCE
- A package of computer subprograms for control system analysis (GJW, RSM, LCC, JPE).
- SHARE-1965-BitontiCFH
- A computer-aided linkage analysis system (FB, DWC, DNF, HHH).
- SHARE-1964-Branin #network #using
- D-C and transient analysis of networks using a digital computer (FHBJ).
- SHARE-1964-SimpsonA
- Space frame analysis and applications to other types of structures (HS, JA).
- LISP-1963-Yates #compilation #lisp #source code #word
- LISP. Group Analysis programs. Λ LISP Compiler for a variable word machine (Gamma 30 Scientific) (RY), p. 15.