BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
approach
Google approach

Tag #approach

5783 papers:

ASPLOSASPLOS-2020-ApostolakisXCCA #automation #named #parallel
Perspective: A Sensible Approach to Speculative Automatic Parallelization (SA, ZX, GC, SC, DIA), pp. 351–367.
CGOCGO-2020-ShobakiKM #combinator #gpu #optimisation #using
Optimizing occupancy and ILP on the GPU using a combinatorial approach (GS, AK, SM), pp. 133–144.
ECSAECSA-2019-NunesSS #architecture #transaction
From a Monolith to a Microservices Architecture: An Approach Based on Transactional Contexts (LN, NS0, ARS), pp. 37–52.
ICSAICSA-2019-UllahB #adaptation #architecture #big data #security
An Architecture-Driven Adaptation Approach for Big Data Cyber Security Analytics (FU, MAB), pp. 41–50.
EDMEDM-2019-DicklerLG #assessment #automation #data-driven
A Data-Driven Approach for Automated Assessment of Scientific Explanations in Science Inquiry (RD, HL, JDG).
EDMEDM-2019-HarrakBL #categorisation #hybrid #student #using
Categorizing students' questions using an ensemble hybrid approach (FH, FB, VL).
EDMEDM-2019-HowlinD #behaviour #clustering #detection #fuzzy #student #using
Detecting Outlier Behaviors in Student Progress Trajectories Using a Repeated Fuzzy Clustering Approach (CPH, CDD).
EDMEDM-2019-MooreCEZRB #component #multi #student
Skills Embeddings: A Neural Approach to Multicomponent Representations of Students and Tasks (RM, AC, ME, AHZ, AR, PB).
ICSMEICSME-2019-AnuCSH0Q #recommendation
An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention (HA, JC, WS, JH, BL0, BQ), pp. 125–134.
ICSMEICSME-2019-BraiekK #named #network #search-based #testing
DeepEvolution: A Search-Based Testing Approach for Deep Neural Networks (HBB, FK), pp. 454–458.
ICSMEICSME-2019-GaoWLYSC #clone detection #detection #named
TECCD: A Tree Embedding Approach for Code Clone Detection (YG, ZW, SL, LY, WS, YC), pp. 145–156.
ICSMEICSME-2019-NeupaneCW #development #named
EmoD: An End-to-End Approach for Investigating Emotion Dynamics in Software Development (KN, KC, YW), pp. 252–256.
MSRMSR-2019-MatsumotoHK #hybrid
Beyond GumTree: a hybrid approach to generate edit scripts (JM, YH, SK), pp. 550–554.
SANERSANER-2019-ChenYYZ #api #documentation #integration
A Human-as-Sensors Approach to API Documentation Integration and Its Effects on Novice Programmers (CC, YY, LY, KZ), pp. 197–206.
SANERSANER-2019-XieCYLHDZ #graph #learning #named
DeepLink: A Code Knowledge Graph Based Deep Learning Approach for Issue-Commit Link Recovery (RX, LC, WY0, ZL, TH, DD, SZ), pp. 434–444.
SANERSANER-2019-ZhangLML #effectiveness #fault #named #network #using
CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks (ZZ0, YL, XM, PL), pp. 445–455.
FMFM-2019-TanP #axiom #difference #equation #liveness
An Axiomatic Approach to Liveness for Differential Equations (YKT, AP), pp. 371–388.
IFM-2019-BowlesC #combinator #optimisation #problem
An Integrated Approach to a Combinatorial Optimisation Problem (JB, MBC), pp. 284–302.
SEFMSEFM-2019-AvellanedaP #automaton #learning #satisfiability
Learning Minimal DFA: Taking Inspiration from RPNI to Improve SAT Approach (FA, AP), pp. 243–256.
HaskellHaskell-2019-Devriese #case study #composition #haskell #morphism #polymorphism #taxonomy #verification
Modular effects in Haskell through effect polymorphism and explicit dictionary applications: a new approach and the μVeriFast verifier as a case study (DD), pp. 1–14.
CHI-PLAYCHI-PLAY-2019-CmentowskiKK #artificial reality #game studies #multi #named
Outstanding: A Multi-Perspective Travel Approach for Virtual Reality Games (SC, AK, JHK), pp. 287–299.
CoGCoG-2019-HuangL #optimisation #policy #self
A Self-Play Policy Optimization Approach to Battling Pokémon (DH, SL), pp. 1–4.
CoGCoG-2019-LucasDVBGBPMK #game studies #learning
A Local Approach to Forward Model Learning: Results on the Game of Life Game (SML, AD, VV, CB, RDG, IB, DPL, SM, RK), pp. 1–8.
CoGCoG-2019-NaderiBRH #learning
A Reinforcement Learning Approach To Synthesizing Climbing Movements (KN, AB, SR, PH), pp. 1–7.
CoGCoG-2019-NeufeldML #evaluation #evolution #game studies #hybrid
Evolving Game State Evaluation Functions for a Hybrid Planning Approach (XN, SM, DPL), pp. 1–8.
CoGCoG-2019-ParakhCS #design #game studies #network #problem #towards
An Approach Towards Designing Problem Networks in Serious Games (AP, PC, MS), pp. 1–8.
CoGCoG-2019-VihangaBLK #clustering #game studies #online
Weekly Seasonal Player Population Patterns in Online Games: A Time Series Clustering Approach (DV, MB, EL, KK), pp. 1–8.
CoGCoG-2019-XuC #challenge
A Hierarchical Approach for MARLÖ Challenge (LX, YC), pp. 1–4.
DiGRADiGRA-2019-SusiTW #game studies #online
“Can you send me a photo?” - A Game-Based Approach for Increasing Young Children's Risk Awareness to Prevent Online Sexual Grooming (TS, NT, UW).
FDGFDG-2019-KicikogluBCP #gamification #named
Wormingo: a 'true gamification' approach to anaphoric annotation (DK, RB, JC, MP), p. 7.
FDGFDG-2019-ZelekeOS #game studies #hybrid
Analyzing action games: a hybrid systems approach (YZ, JCO, RGS), p. 11.
ICGJICGJ-2019-MyersPC #game studies #social
Game Jams as a Space to Tackle Social Issues: an Approach Based on the Critical Pedagogy (CM, LSGP, TC), p. 8.
CoGVS-Games-2019-GardeliV #artificial reality #named
ARQuest: A Tangible Augmented Reality Approach to Developing Computational Thinking Skills (AG, SV), pp. 1–8.
CIKMCIKM-2019-DengLSDFYL #multi #named
MedTruth: A Semi-supervised Approach to Discovering Knowledge Condition Information from Multi-Source Medical Data (YD, YL, YS, ND, WF, MY0, KL), pp. 719–728.
CIKMCIKM-2019-FanZDCSL #graph #identification #learning #network #novel
Learning to Identify High Betweenness Centrality Nodes from Scratch: A Novel Graph Neural Network Approach (CF, LZ, YD, MC, YS, ZL), pp. 559–568.
CIKMCIKM-2019-HuangCLCHLZZW #classification #multi #network
Hierarchical Multi-label Text Classification: An Attention-based Recurrent Network Approach (WH, EC, QL0, YC, ZH, YL, ZZ, DZ, SW), pp. 1051–1060.
CIKMCIKM-2019-KrishnanCTS #composition #recommendation #social
A Modular Adversarial Approach to Social Recommendation (AK, HC, TC0, HS), pp. 1753–1762.
CIKMCIKM-2019-LiJC0W #hybrid #named #recommendation
HAES: A New Hybrid Approach for Movie Recommendation with Elastic Serendipity (XL, WJ, WC, JW0, GW0), pp. 1503–1512.
CIKMCIKM-2019-LongWDSJL #community #network
Hierarchical Community Structure Preserving Network Embedding: A Subspace Approach (QL, YW, LD, GS, YJ, WL), pp. 409–418.
CIKMCIKM-2019-SinhaMSMS0 #identification #multi #twitter
#suicidal - A Multipronged Approach to Identify and Explore Suicidal Ideation in Twitter (PPS, RM, RS, DM, RRS, HL0), pp. 941–950.
CIKMCIKM-2019-YiDLLZZ #modelling #named
CityTraffic: Modeling Citywide Traffic via Neural Memorization and Generalization Approach (XY, ZD, TL, TL, JZ, YZ), pp. 2665–2671.
ECIRECIR-p1-2019-DijkFFK #information retrieval #markov
A Markovian Approach to Evaluate Session-Based IR Systems (DvD, MF, NF0, EK), pp. 621–635.
ECIRECIR-p1-2019-GhaderyMSFS #detection #independence #named
LICD: A Language-Independent Approach for Aspect Category Detection (EG, SM, MJS, HF, AS), pp. 575–589.
ECIRECIR-p1-2019-KimY #automation #hybrid #modelling
A Hybrid Modeling Approach for an Automated Lyrics-Rating System for Adolescents (JK, MYY), pp. 779–786.
ECIRECIR-p1-2019-PfeiferL #clustering #modelling #topic
Topic Grouper: An Agglomerative Clustering Approach to Topic Modeling (DP, JLL), pp. 590–603.
ECIRECIR-p1-2019-RenningsMH #axiom #information retrieval #modelling
An Axiomatic Approach to Diagnosing Neural IR Models (DR, FM, CH), pp. 489–503.
ECIRECIR-p2-2019-CetoliBOSA
A Neural Approach to Entity Linking on Wikidata (AC, SB, ADO, MS, MA), pp. 78–86.
ECIRECIR-p2-2019-RamrakhiyaniPV
A Simple Neural Approach to Spatial Role Labelling (NR, GKP, VV), pp. 102–108.
ECIRECIR-p2-2019-Russell-RoseCK #query
Rethinking 'Advanced Search': A New Approach to Complex Query Formulation (TRR, JC, UK), pp. 236–240.
ICMLICML-2019-AdelW #learning #named #visual notation
TibGM: A Transferable and Information-Based Graphical Model Approach for Reinforcement Learning (TA, AW), pp. 71–81.
ICMLICML-2019-AndertonA #scalability
Scaling Up Ordinal Embedding: A Landmark Approach (JA, JAA), pp. 282–290.
ICMLICML-2019-BalajiHCF #statistics
Entropic GANs meet VAEs: A Statistical Approach to Compute Sample Likelihoods in GANs (YB, HH, RC, SF), pp. 414–423.
ICMLICML-2019-ChenTZB00 #generative #network
A Gradual, Semi-Discrete Approach to Generative Network Training via Explicit Wasserstein Minimization (YC, MT, CZ, BB, DH0, JP0), pp. 1071–1080.
ICMLICML-2019-DiaconuW #learning
Learning to Convolve: A Generalized Weight-Tying Approach (ND, DEW), pp. 1586–1595.
ICMLICML-2019-LeeJAJ #functional #game studies
Functional Transparency for Structured Data: a Game-Theoretic Approach (GHL, WJ, DAM, TSJ), pp. 3723–3733.
ICMLICML-2019-LiuLWJ #adaptation #classification
Transferable Adversarial Training: A General Approach to Adapting Deep Classifiers (HL, ML, JW0, MIJ), pp. 4013–4022.
ICMLICML-2019-PolianskiiP #bound #classification #geometry #integration #monte carlo
Voronoi Boundary Classification: A High-Dimensional Geometric Approach via Weighted Monte Carlo Integration (VP, FTP), pp. 5162–5170.
ICMLICML-2019-WengCNSBOD #named #network #probability #robust #verification
PROVEN: Verifying Robustness of Neural Networks with a Probabilistic Approach (LW, PYC, LMN, MSS, AB, IVO, LD), pp. 6727–6736.
ICMLICML-2019-ZhouYWP #architecture #named
BayesNAS: A Bayesian Approach for Neural Architecture Search (HZ, MY, JW0, WP), pp. 7603–7613.
KDDKDD-2019-ChenTYZC #data-driven #industrial #multi #problem
A Data-Driven Approach for Multi-level Packing Problems in Manufacturing Industry (LC0, XT, MY, JZ, LC0), pp. 1762–1770.
KDDKDD-2019-HanNCLHX #generative #recommendation
A Deep Generative Approach to Search Extrapolation and Recommendation (FXH, DN, HC, KL, YH, YX), pp. 1771–1779.
KDDKDD-2019-HulsebosHBZSKDH #data type #detection #learning #named #semantics
Sherlock: A Deep Learning Approach to Semantic Data Type Detection (MH, KZH, MAB, EZ, AS, TK, ÇD, CAH), pp. 1500–1508.
KDDKDD-2019-InabaFKZ #distance #energy #learning #metric
A Free Energy Based Approach for Distance Metric Learning (SI, CTF, RVK, KZ), pp. 5–13.
KDDKDD-2019-LeeIFSM #data-driven #estimation #named #using
DeepRoof: A Data-driven Approach For Solar Potential Estimation Using Rooftop Imagery (SL, SI, MF, PJS, SM), pp. 2105–2113.
KDDKDD-2019-LiHWL #community #detection #named
EdMot: An Edge Enhancement Approach for Motif-aware Community Detection (PZL, LH, CDW, JHL), pp. 479–487.
KDDKDD-2019-NetoPPTBMO #health #machine learning #permutation
A Permutation Approach to Assess Confounding in Machine Learning Applications for Digital Health (ECN, AP, TMP, MT, BMB, LM, LO), pp. 54–64.
KDDKDD-2019-SrivastavaHK #machine learning
Mathematical Notions vs. Human Perception of Fairness: A Descriptive Approach to Fairness for Machine Learning (MS, HH, AK), pp. 2459–2468.
KDDKDD-2019-SunZZSHX #network
The Impact of Person-Organization Fit on Talent Management: A Structure-Aware Convolutional Neural Network Approach (YS, FZ, HZ, XS, QH, HX), pp. 1625–1633.
KDDKDD-2019-TangQZWXMZY #multi #order
A Deep Value-network Based Approach for Multi-Driver Order Dispatching (XT, Z(Q, FZ, ZW, ZX, YM, HZ, JY), pp. 1780–1790.
KDDKDD-2019-Thondikulam #ml #scalability
Analytics Journey Map: An Approach Enable to ML at Scale (GT), p. 3167.
KDDKDD-2019-TuLYC #feedback #modelling
Feedback Shaping: A Modeling Approach to Nurture Content Creation (YT, CL, YY, SC), pp. 2241–2250.
KDDKDD-2019-WangLYLLZ0 #machine learning #nondeterminism #quantifier
Deep Uncertainty Quantification: A Machine Learning Approach for Weather Forecasting (BW, JL0, ZY0, HL, TL, YZ0, GZ0), pp. 2087–2095.
KDDKDD-2019-Ye #data-driven #named
Transportation: A Data Driven Approach (JY), p. 3183.
KDDKDD-2019-YoonHSF #detection #graph #performance
Fast and Accurate Anomaly Detection in Dynamic Graphs with a Two-Pronged Approach (MY, BH, KS, CF), pp. 647–657.
MoDELSMoDELS-2019-BesnardTJ0D19a #automaton #modelling #monitoring #uml #verification
Verifying and Monitoring UML Models with Observer Automata: A Transformation-Free Approach (VB, CT, FJ, MB0, PD), pp. 161–171.
MoDELSMoDELS-2019-BrandG #adaptation #architecture #evaluation #modelling #runtime
Modeling Approach and Evaluation Criteria for Adaptable Architectural Runtime Model Instances (TB, HG), pp. 227–232.
MoDELSMoDELS-2019-IqbalSKHQ #modelling #testing
A Model-Based Testing Approach for Cockpit Display Systems of Avionics (MZI, HS, MUK, FUH, IQ), pp. 67–77.
MoDELSMoDELS-2019-NguyenRRPI #automation #classification #machine learning #metamodelling #repository
Automated Classification of Metamodel Repositories: A Machine Learning Approach (PTN, JDR, DDR, AP, LI), pp. 272–282.
MoDELSMoDELS-2019-PouraliA19a #challenge #debugging #editing #modelling #uml
A Focus+Context Approach to Alleviate Cognitive Challenges of Editing and Debugging UML Models (PP, JMA), pp. 183–193.
ECOOPECOOP-2019-LuoDB #analysis #editing #ide #named
MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper) (LL, JD, EB), p. 25.
OnwardOnward-2019-KaminaA #persistent
An approach for persistent time-varying values (TK, TA), pp. 17–31.
OOPSLAOOPSLA-2019-HenriksenBP #parsing
Derivative grammars: a symbolic approach to parsing with derivatives (IH, GB, KP), p. 28.
OOPSLAOOPSLA-2019-WuCHS0 #fault #generative #learning #precise #specification
Generating precise error specifications for C: a zero shot learning approach (BW, JPCI, YH, AS, SC0), p. 30.
PLATEAUPLATEAU-2019-CohenNS #declarative #design
Designing Declarative Language Tutorials: A Guided and Individualized Approach (AKC, WN, JS), p. 6.
PADLPADL-2019-PendharkarG #natural language
An ASP Based Approach to Answering Questions for Natural Language Text (DP, GG), pp. 46–63.
PLDIPLDI-2019-AndersonPDC #abstraction #network #optimisation #robust
Optimization and abstraction: a synergistic approach for analyzing neural network robustness (GA, SP, ID, SC), pp. 731–744.
PLDIPLDI-2019-KrishnaswamiY #algebra #parsing
A typed, algebraic approach to parsing (NRK, JY), pp. 379–393.
POPLPOPL-2019-WangWS #compilation #composition #stack
An abstract stack based approach to verified compositional compilation to machine code (YW, PW, ZS), p. 30.
ASEASE-2019-Gu00 #api #graph #kernel #named
CodeKernel: A Graph Kernel Based Approach to the Selection of API Usage Examples (XG, HZ0, SK0), pp. 590–601.
ASEASE-2019-LacomisYSAGNV #identifier #named
DIRE: A Neural Approach to Decompiled Identifier Naming (JL, PY, EJS, MA, CLG, GN, BV), pp. 628–639.
ASEASE-2019-LiY0C #android #automation #black box #named #testing
Humanoid: A Deep Learning-Based Approach to Automated Black-box Android App Testing (YL, ZY, YG0, XC), pp. 1070–1073.
ASEASE-2019-Neupane #development
An Approach for Investigating Emotion Dynamics in Software Development (KN), pp. 1268–1270.
ASEASE-2019-Xiao #android #detection
An Image-Inspired and CNN-Based Android Malware Detection Approach (XX), pp. 1259–1261.
ASEASE-2019-Zhang #identification #injection #machine learning #sql
A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities (KZ), pp. 1286–1288.
ASEASE-2019-ZhangC #adaptation #learning #modelling #named
Apricot: A Weight-Adaptation Approach to Fixing Deep Learning Models (HZ, WKC), pp. 376–387.
ESEC-FSEESEC-FSE-2019-ChenCLML #analysis #learning #named #re-engineering #sentiment
SEntiMoji: an emoji-powered learning approach for sentiment analysis in software engineering (ZC, YC, XL, QM, XL), pp. 841–852.
ESEC-FSEESEC-FSE-2019-HiraoMIM #code review #empirical #graph #overview
The review linkage graph for code review analytics: a recovery approach and empirical study (TH, SM, AI, KM), pp. 578–589.
ESEC-FSEESEC-FSE-2019-MiryeganehAH #automation #dataset #integration #towards
An IR-based approach towards automated integration of geo-spatial datasets in map-based software systems (NM, MA, HH), pp. 946–954.
ESEC-FSEESEC-FSE-2019-SantosSCGM #architecture
Achilles' heel of plug-and-Play software architectures: a grounded theory based approach (JCSS, AS, TC, SG, MM), pp. 671–682.
ESEC-FSEESEC-FSE-2019-Wang0LXBXW #automation #documentation #source code #taxonomy
A learning-based approach for automatic construction of domain glossary from source code and documentation (CW, XP0, ML, ZX, XB, BX, TW), pp. 97–108.
ASPLOSASPLOS-2019-JiangSF0 #parallel #scalability
Scalable Processing of Contemporary Semi-Structured Data on Commodity Parallel Processors - A Compilation-based Approach (LJ, XS, UF, ZZ0), pp. 79–92.
ASPLOSASPLOS-2019-LascorzJSPMSNSM #hardware #named #network
Bit-Tactical: A Software/Hardware Approach to Exploiting Value and Bit Sparsity in Neural Networks (ADL, PJ, DMS, ZP, MM, SS, MN, KS, AM), pp. 749–763.
CASECASE-2019-AhmedG0 #detection #generative #named #online
O-LoMST: An Online Anomaly Detection Approach And Its Application In A Hydropower Generation Plant (IA, TG, YD0), pp. 762–767.
CASECASE-2019-AzefackPAGCBX #behaviour #detection #smarttech
An Approach for Behavioral Drift Detection in a Smart Home (CA, RP, VA, GG, CMC, RB, XX), pp. 727–732.
CASECASE-2019-CarliDP #distributed #energy #game studies #generative #scheduling
A Distributed Control Approach Based on Game Theory for the Optimal Energy Scheduling of a Residential Microgrid with Shared Generation and Storage (RC, MD, VP), pp. 960–965.
CASECASE-2019-ColomboGARTBG #constraints #mobile #predict
Parameterized Model Predictive Control of a Nonholonomic Mobile Manipulator: A Terminal Constraint-Free Approach (RC, FG, VA, PR, ST, LB, SKG), pp. 1437–1442.
CASECASE-2019-JiangO #grid
Optimal Control of a Fleet of AGVs on a Rectangular Grid: a MILP-based Approach (JJ, DO), pp. 1054–1059.
CASECASE-2019-JiaXSWLS #development #industrial #internet #research
Research on the development approach of regional manufacturing industry in Internet+era* (ZJ, YX, GS, MW, TL, ZS), pp. 356–361.
CASECASE-2019-KutzkeB
Conflict Resolution for Heterogeneous Teams in Communication-limited Environments: A Generous Agent Approach (DTK, MJB), pp. 535–540.
CASECASE-2019-LiuHS #exponential #learning #scheduling
A new solution approach for flow shop scheduling with an exponential time-dependent learning effect (LL, HH, LS), pp. 468–473.
CASECASE-2019-LugaresiAFM #modelling #novel #realtime #validation
Real-time Validation of Digital Models for Manufacturing Systems: a Novel Signal-processing-based Approach (GL, GA, FF, AM), pp. 450–455.
CASECASE-2019-MatsuokaNT #identification #machine learning #problem #scheduling
Machine Learning Approach for Identification of Objective Function in Production Scheduling Problems (YM, TN, KT), pp. 679–684.
CASECASE-2019-PippiaLCSS #predict
Scenario-based Model Predictive Control Approach for Heating Systems in an Office Building (TP, JL, RDC, JS, BDS), pp. 1243–1248.
CASECASE-2019-RazaL #learning #multi #policy
Constructive Policy: Reinforcement Learning Approach for Connected Multi-Agent Systems (SJAR, ML), pp. 257–262.
CASECASE-2019-SartoriZY #3d #design #multi #performance
An efficient approach to near-optimal 3D trajectory design in cluttered environments for multirotor UAVs (DS, DZ, WY), pp. 1016–1022.
CASECASE-2019-StrengeSR #modelling #petri net
Modeling and control of prosumer-based microgrids: a Petri net approach (LS, GS, JR), pp. 209–215.
CASECASE-2019-WangY0 #learning #monitoring
A Deep Learning Approach for Heating and Cooling Equipment Monitoring (YW, CY, WS0), pp. 228–234.
CASECASE-2019-XuLWZCQ #learning #performance
An Improved GA-KRR Nested Learning Approach for Refrigeration Compressor Performance Forecasting* (CX, XL, JW, JZ, JC, WQ), pp. 622–627.
CASECASE-2019-ZhouWXS00G #learning #modelling #personalisation #predict
A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment (YZ, XW, ZX, YS, TL0, CS0, XG), pp. 739–744.
CGOCGO-2019-QiaoRHT #kernel #locality #optimisation
From Loop Fusion to Kernel Fusion: A Domain-Specific Approach to Locality Optimization (BQ, OR, FH, JT), pp. 242–253.
FASEFASE-2019-SchneiderLO #graph #incremental
A Logic-Based Incremental Approach to Graph Repair (SS0, LL, FO), pp. 151–167.
CAVCAV-2019-Busatto-GastonM #automaton #robust #synthesis
Robust Controller Synthesis in Timed Büchi Automata: A Symbolic Approach (DBG, BM, PAR, OS), pp. 572–590.
ICSTICST-2019-MuscoYN #clustering #implementation #named #testing
SmokeOut: An Approach for Testing Clustering Implementations (VM, XY, IN), pp. 473–480.
ICSTICST-2019-Tan #modelling #testing
A Model-Based Approach to Generate Dynamic Synthetic Test Data (CT), pp. 495–497.
ICTSSICTSS-2019-VinarskiiLKYZ #detection #model checking
A Model Checking Based Approach for Detecting SDN Races (EV, JL, NK, NY, DZ), pp. 194–211.
ECSAECSA-2018-AlkhabbasSD #architecture #internet #named
ECo-IoT: An Architectural Approach for Realizing Emergent Configurations in the Internet of Things (FA, RS, PD), pp. 86–102.
ECSAECSA-2018-AvritzerFJRSH #architecture #assessment #automation #deployment #performance #testing
A Quantitative Approach for the Assessment of Microservice Architecture Deployment Alternatives by Automated Performance Testing (AA, VF, AJ, BR, HS, AvH), pp. 159–174.
ICSAICSA-2018-ArcelliCDP #architecture #multi #named #refactoring
EASIER: An Evolutionary Approach for Multi-objective Software ArchItecturE Refactoring (DA, VC, MD, DDP), pp. 105–114.
ICSAICSA-2018-ArtacBNGPT #architecture #data-driven #development #modelling
Infrastructure-as-Code for Data-Intensive Architectures: A Model-Driven Development Approach (MA, TB, EDN, MG, DPP, DAT), pp. 156–165.
JCDLJCDL-2018-MeuschkeGSBKG #adaptation #detection
An Adaptive Image-based Plagiarism Detection Approach (NM, CG, DS, CB, DAK, BG), pp. 131–140.
JCDLJCDL-2018-RischK #question
My Approach = Your Apparatus? (JR, RK), pp. 283–292.
EDMEDM-2018-BackenkohlerSSW #data-driven #education #personalisation #towards
Data-Driven Approach Towards a Personalized Curriculum (MB, FS, AS, VW).
EDMEDM-2018-ChopraGKMG #difference #gender #mining
Gender Differences in Undergraduate Engineering Applicants: A Text Mining Approach (SC, HG, AK, MM, LG).
EDMEDM-2018-CookOKD #authentication #education #using
An Open Vocabulary Approach for Estimating Teacher Use of Authentic Questions in Classroom Discourse (CC, AO, SK, SD).
EDMEDM-2018-EstebanGR #algorithm #hybrid #multi #recommendation #search-based #student #using
A Hybrid Multi-Criteria approach using a Genetic Algorithm for Recommending Courses to University Students (AE, AZG, CR).
ICPCICPC-2018-JaffeLSGV
Meaningful variable names for decompiled code: a machine translation approach (AJ, JL, EJS, CLG, BV), pp. 20–30.
ICPCICPC-2018-MessaoudiPBBS #identification #search-based
A search-based approach for accurate identification of log message formats (SM, AP, DB, LCB, RS), pp. 167–177.
ICSMEICSME-2018-HuZLWLG #analysis #hybrid #named #semantics
BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis (YH, YZ0, JL, HW, BL, DG), pp. 104–114.
ICSMEICSME-2018-LecerfBGD #automation #pattern matching #program transformation #reflexive
A Reflexive and Automated Approach to Syntactic Pattern Matching in Code Transformations (JL, JB, TG, SD), pp. 426–436.
ICSMEICSME-2018-SabettaB #automation #classification #commit
A Practical Approach to the Automatic Classification of Security-Relevant Commits (AS, MB), pp. 579–582.
ICSMEICSME-2018-StanikMMFM #community #open source
A Simple NLP-Based Approach to Support Onboarding and Retention in Open Source Communities (CS, LM, DM, DF, WM), pp. 172–182.
MSRMSR-2018-BenkocziGHK08 #design #matrix
A design structure matrix approach for measuring co-change-modularity of software products (RB, DRG, SH, MAK), pp. 331–335.
MSRMSR-2018-OttAHBL08 #identification #image #learning #source code #video
A deep learning approach to identifying source code in images and video (JO, AA, PH, AB, EL), pp. 376–386.
SANERSANER-2018-DorningerMK #challenge #industrial #re-engineering
Reengineering an industrial HMI: Approach, objectives, and challenges (BD, MM, AK), pp. 547–551.
SANERSANER-2018-KuleszK0 #correctness #evolution #semantics #spreadsheet
Spreadsheet guardian: An approach to protecting semantic correctness throughout the evolution of spreadsheets (journal-first abstract) (DK, VK, SW0), p. 476.
SANERSANER-2018-ObbinkMSL #challenge #javascript
An extensible approach for taming the challenges of JavaScript dead code elimination (NGO, IM, GLS, PL), pp. 391–401.
DLTDLT-2018-Davies #complexity #formal method
A General Approach to State Complexity of Operations: Formalization and Limitations (SD), pp. 256–268.
FMFM-2018-AmericoAM #algebra #data flow #reasoning
An Algebraic Approach for Reasoning About Information Flow (AA, MSA, AM), pp. 55–72.
AIIDEAIIDE-2018-BeaupreWBS #design pattern #generative #multi
A Design Pattern Approach for Multi-Game Level Generation (SB, TW, SB, GS), pp. 145–151.
AIIDEAIIDE-2018-HornMSC #automation #monte carlo
A Monte Carlo Approach to Skill-Based Automated Playtesting (BH, JAM, GS, SC), pp. 166–172.
AIIDEAIIDE-2018-NeufeldMB #behaviour #execution #hybrid #network
A Hybrid Approach to Planning and Execution in Dynamic Environments Through Hierarchical Task Networks and Behavior Trees (XN, SM, SB), pp. 201–207.
CHI-PLAYCHI-PLAY-2018-DSouzaPKW #game studies #social
Augmenting Co-Located Social Play with Biofeedback: An Interactional Approach (AD, BP, MK, PW), pp. 113–125.
CoGCIG-2018-VolzMP #game studies #social
A Social Science-based Approach to Explanations for (Game) AI (VV, KM, MP), pp. 1–2.
FDGFDG-2018-GundryD #design #elicitation #game studies
Intrinsic elicitation: a model and design approach for games collecting human subject data (DG, SD), p. 10.
CIKMCIKM-2018-0002SZW0 #modelling #quantum
A Quantum Many-body Wave Function Inspired Language Modeling Approach (PZ0, ZS, LZ, BW, DS0), pp. 1303–1312.
CIKMCIKM-2018-DaveZHAK #learning #recommendation #representation
A Combined Representation Learning Approach for Better Job and Skill Recommendation (VSD, BZ, MAH, KA, MK), pp. 1997–2005.
CIKMCIKM-2018-FangOMHXY #effectiveness #modelling #topic #twitter
An Effective Approach for Modelling Time Features for Classifying Bursty Topics on Twitter (AF, IO, CM, PH, XX, HTY), pp. 1547–1550.
CIKMCIKM-2018-GiannakopoulosT #modelling
A Content-Based Approach for Modeling Analytics Operators (IG, DT, NK), pp. 227–236.
CIKMCIKM-2018-KrishnanSSS #collaboration #performance
An Adversarial Approach to Improve Long-Tail Performance in Neural Collaborative Filtering (AK, AS, AS, HS), pp. 1491–1494.
CIKMCIKM-2018-LiLCOL #classification #documentation #modelling #topic
Dataless Text Classification: A Topic Modeling Approach with Document Manifold (XL, CL, JC, JO, CL), pp. 973–982.
CIKMCIKM-2018-VainshteinGKSR #automation #hybrid #recommendation
A Hybrid Approach for Automatic Model Recommendation (RV, AGM, GK, BS, LR), pp. 1623–1626.
CIKMCIKM-2018-ZhaoX0ZLZ #comprehension #learning #on the #predict
On Prediction of User Destination by Sub-Trajectory Understanding: A Deep Learning based Approach (JZ, JX, RZ0, PZ, CL, FZ), pp. 1413–1422.
CIKMCIKM-2018-Zhu0WL
K-core Minimization: An Edge Manipulation Approach (WZ, CC0, XW0, XL0), pp. 1667–1670.
ECIRECIR-2018-CohenC #hybrid #retrieval
A Hybrid Embedding Approach to Noisy Answer Passage Retrieval (DC, WBC), pp. 127–140.
ECIRECIR-2018-GharebaghRN #agile #mining #novel
T-Shaped Mining: A Novel Approach to Talent Finding for Agile Software Teams (SSG, PR, MN), pp. 411–423.
ECIRECIR-2018-JiaS #performance #recommendation
Local Is Good: A Fast Citation Recommendation Approach (HJ, ES), pp. 758–764.
ECIRECIR-2018-MajumderPVGMBG #automation #e-commerce #retrieval
Automated Assistance in E-commerce: An Approach Based on Category-Sensitive Retrieval (AM, AP, KV, AG, SM, PB, PG), pp. 604–610.
ECIRECIR-2018-Martinez-Castano #detection #modelling #realtime #social #social media
A Micromodule Approach for Building Real-Time Systems with Python-Based Models: Application to Early Risk Detection of Depression on Social Media (RMC, JCP, DEL, FC), pp. 801–805.
ECIRECIR-2018-MeladianosXNV #detection #optimisation #summary #twitter
An Optimization Approach for Sub-event Detection and Summarization in Twitter (PM, CX, GN, MV), pp. 481–493.
ECIRECIR-2018-ShahshahaniHZS #ranking #towards
Towards a Unified Supervised Approach for Ranking Triples of Type-Like Relations (MSS, FH, HZ, AS), pp. 707–714.
ECIRECIR-2018-SpitzG #topic
Entity-Centric Topic Extraction and Exploration: A Network-Based Approach (AS, MG), pp. 3–15.
ECIRECIR-2018-SreepadaP #collaboration #incremental #streaming
An Incremental Approach for Collaborative Filtering in Streaming Scenarios (RSS, BKP), pp. 632–637.
ECIRECIR-2018-StihecZP #detection #hybrid #semantics
Simplified Hybrid Approach for Detection of Semantic Orientations in Economic Texts (JS, MZ, SP), pp. 692–698.
ICMLICML-2018-AgarwalBD0W #classification #reduction
A Reductions Approach to Fair Classification (AA, AB, MD, JL0, HMW), pp. 60–69.
ICMLICML-2018-Arora0NZ #bound
Stronger Generalization Bounds for Deep Nets via a Compression Approach (SA, RG0, BN, YZ), pp. 254–263.
ICMLICML-2018-BacciuEM #generative #graph #markov
Contextual Graph Markov Model: A Deep and Generative Approach to Graph Processing (DB, FE, AM), pp. 304–313.
ICMLICML-2018-EfroniDSM #learning
Beyond the One-Step Greedy Approach in Reinforcement Learning (YE, GD, BS, SM), pp. 1386–1395.
ICMLICML-2018-JaffeWCKN #learning #modelling
Learning Binary Latent Variable Models: A Tensor Eigenpair Approach (AJ, RW, SC, YK, BN), pp. 2201–2210.
ICMLICML-2018-LiaoC18a #learning #matrix #random
The Dynamics of Learning: A Random Matrix Approach (ZL, RC), pp. 3078–3087.
ICMLICML-2018-LiH #learning #network
An Optimal Control Approach to Deep Learning and Applications to Discrete-Weight Neural Networks (QL, SH), pp. 2991–3000.
ICMLICML-2018-Mitrovic0ZK #scalability #summary
Data Summarization at Scale: A Two-Stage Submodular Approach (MM, EK0, MZ, AK), pp. 3593–3602.
ICMLICML-2018-PearceBZN #learning #predict
High-Quality Prediction Intervals for Deep Learning: A Distribution-Free, Ensembled Approach (TP, AB, MZ, AN), pp. 4072–4081.
ICMLICML-2018-ShiS0 #estimation
A Spectral Approach to Gradient Estimation for Implicit Distributions (JS, SS, JZ0), pp. 4651–4660.
ICMLICML-2018-WuHS #collaboration #named #ranking
SQL-Rank: A Listwise Approach to Collaborative Ranking (LW, CJH, JS), pp. 5311–5320.
ICMLICML-2018-YeS #network
Variable Selection via Penalized Neural Network: a Drop-Out-One Loss Approach (MY, YS), pp. 5616–5625.
ICMLICML-2018-ZhengPF #robust
A Robust Approach to Sequential Information Theoretic Planning (SZ, JP, JWFI), pp. 5936–5944.
ICPRICPR-2018-Aldana-LopezCZG #learning #network
Dynamic Learning Rate for Neural Networks: A Fixed-Time Stability Approach (RAL, LECM, JZ, DGG, AC), pp. 1378–1383.
ICPRICPR-2018-AnnadaniJ #adaptation #detection #image
Augment and Adapt: A Simple Approach to Image Tampering Detection (YA, CVJ), pp. 2983–2988.
ICPRICPR-2018-BandyopadhyayND #named
DivGroup: A Diversified Approach to Divide Collection of Patterns into Uniform Groups (SB, SN, RD, NMM), pp. 964–969.
ICPRICPR-2018-Chen18b #self
An Improved Self-Representation Approach for Missing Value Imputation (XC), pp. 1450–1455.
ICPRICPR-2018-CombinidoMA #image #network #using
A Convolutional Neural Network Approach for Estimating Tropical Cyclone Intensity Using Satellite-based Infrared Images (JSC, JRM, JA), pp. 1474–1480.
ICPRICPR-2018-DangCLOT #random
A randomized hierarchical trees indexing approach for camera-based information spotting (QBD, MC, MML, JMO, CDT), pp. 3692–3697.
ICPRICPR-2018-FariaS #analysis #graph #image
A Graph-based Approach for Static Ensemble Selection in Remote Sensing Image Analysis (FAF, SS), pp. 344–349.
ICPRICPR-2018-LiuWL0ZHL #image
An Attention-Based Approach for Single Image Super Resolution (YL, YW, NL, XC0, YZ, YH, GL), pp. 2777–2784.
ICPRICPR-2018-MahboubiBC #identification #problem
A structural approach to Person Re-identification problem (AM, LB, DC), pp. 1616–1621.
ICPRICPR-2018-MoTWW #detection #performance
An Efficient Approach for Polyps Detection in Endoscopic Videos Based on Faster R-CNN (XM, KT, QW, GW), pp. 3929–3934.
ICPRICPR-2018-ShahinJA #verification
One-Class SVMs Based Pronunciation Verification Approach (MAS, JXJ, BA), pp. 2881–2886.
ICPRICPR-2018-SiddiquiV0 #learning #recognition
Face Recognition for Newborns, Toddlers, and Pre-School Children: A Deep Learning Approach (SS, MV, RS0), pp. 3156–3161.
ICPRICPR-2018-ZhangJCXP #graph #kernel #learning #network
Kernel-Weighted Graph Convolutional Network: A Deep Learning Approach for Traffic Forecasting (QZ, QJ, JC, SX, CP), pp. 1018–1023.
ICPRICPR-2018-ZhengZ #classification #network
Accelerating the Classification of Very Deep Convolutional Network by A Cascading Approach (WZ, ZZ), pp. 355–360.
KDDKDD-2018-Christakopoulou #interactive #recommendation #towards
Q&R: A Two-Stage Approach toward Interactive Recommendation (KC, AB, RL, SJ, EHC), pp. 139–148.
KDDKDD-2018-Fan #machine learning
The Pinterest Approach to Machine Learning (LF), p. 2870.
KDDKDD-2018-IyengarLISW #data-driven #energy #named #performance
WattHome: A Data-driven Approach for Energy Efficiency Analytics at City-scale (SI, SL, DEI, PJS, BW), pp. 396–405.
KDDKDD-2018-LiZY #learning
Dynamic Bike Reposition: A Spatio-Temporal Reinforcement Learning Approach (YL, YZ, QY), pp. 1724–1733.
KDDKDD-2018-RouxPMVF #detection #machine learning #using
Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach (DdR, BP, AM, MDPV, CF), pp. 215–222.
KDDKDD-2018-Schlosser0 #contest #data-driven #online
Dynamic Pricing under Competition on Online Marketplaces: A Data-Driven Approach (RS, MB0), pp. 705–714.
KDDKDD-2018-SpeicherHGGSWZ #algorithm #difference
A Unified Approach to Quantifying Algorithmic Unfairness: Measuring Individual &Group Unfairness via Inequality Indices (TS, HH, NGH, KPG, AS, AW, MBZ), pp. 2239–2248.
KDDKDD-2018-WeiZYL #learning #named
IntelliLight: A Reinforcement Learning Approach for Intelligent Traffic Light Control (HW, GZ, HY, ZL), pp. 2496–2505.
KDDKDD-2018-XuLGZLNLBY #learning #on-demand #order #platform #scalability
Large-Scale Order Dispatch in On-Demand Ride-Hailing Platforms: A Learning and Planning Approach (ZX, ZL, QG, DZ, QL, JN, CL, WB, JY), pp. 905–913.
KDDKDD-2018-YuanZY #learning #named #predict
Hetero-ConvLSTM: A Deep Learning Approach to Traffic Accident Prediction on Heterogeneous Spatio-Temporal Data (ZY, XZ, TY), pp. 984–992.
KDDKDD-2018-YuCAZCW #detection #flexibility #named #network
NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks (WY, WC, CCA, KZ0, HC, WW0), pp. 2672–2681.
KDDKDD-2018-ZhangLMGS #multi #named
TextTruth: An Unsupervised Approach to Discover Trustworthy Information from Multi-Sourced Text Data (HZ, YL, FM, JG0, LS), pp. 2729–2737.
MoDELSMoDELS-2018-MorinHSHB #modelling
Engineering Software Diversity: a Model-Based Approach to Systematically Diversify Communications (BM, JH, HS, NH, BB), pp. 155–165.
ECOOPECOOP-2018-KrugerS0BM #api #encryption #named #validation
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (SK, JS, KA0, EB, MM), p. 27.
OnwardOnward-2018-BrandauerCW #composition #implementation #performance
C♭: a new modular approach to implementing efficient and tunable collections (SB, EC, TW), pp. 57–71.
OOPSLAOOPSLA-2018-PradelS #debugging #detection #learning #named
DeepBugs: a learning approach to name-based bug detection (MP, KS), p. 25.
LOPSTRLOPSTR-2018-PapapanagiotouF #composition #linear #logic #process #scalability #using
A Pragmatic, Scalable Approach to Correct-by-Construction Process Composition Using Classical Linear Logic Inference (PP, JDF), pp. 77–93.
PEPMPEPM-2018-ImanishiSI #verification
A guess-and-assume approach to loop fusion for program verification (AI, KS, AI), pp. 2–14.
POPLPOPL-2018-AgrawalC0 #performance #probability #ranking #source code #termination
Lexicographic ranking supermartingales: an efficient approach to termination of probabilistic programs (SA, KC, PN0), p. 32.
POPLPOPL-2018-WilliamsR #ml
A principled approach to ornamentation in ML (TW, DR), p. 30.
PPDPPPDP-2018-PardoGPV #compilation
An Internalist Approach to Correct-by-Construction Compilers (AP, EG, MP, MV), p. 12.
ASEASE-2018-ChenSXHJ #automation #execution #metric #test coverage
An automated approach to estimating code coverage measures via execution logs (BC, JS, PX, XH, ZM(J), pp. 305–316.
ASEASE-2018-Galinier #domain-specific language #requirements
A DSL for requirements in the context of a seamless approach (FG), pp. 932–935.
ASEASE-2018-WangBC #alloy #specification
An evolutionary approach for analyzing Alloy specifications (JW, HB, MBC), pp. 820–825.
ASEASE-2018-WangCYJ #analysis #constraints #model checking #string
A symbolic model checking approach to the analysis of string and length constraints (HEW, SYC, FY, JHRJ), pp. 623–633.
ESEC-FSEESEC-FSE-2018-HuaZWK #automation #generative #lazy evaluation #named #program repair #sketching #using
SketchFix: a tool for automated program repair approach using lazy candidate generation (JH, MZ, KW, SK), pp. 888–891.
ESEC-FSEESEC-FSE-2018-SongM0 #automation #estimation #novel
A novel automated approach for software effort estimation based on data augmentation (LS, LLM, XY0), pp. 468–479.
ICSE-2018-BenninKPMM #fault #named #predict
MAHAKIL: diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction (KEB, JK, PP, AM, SM), p. 699.
ICSE-2018-HassanW #automation #named
HireBuild: an automatic approach to history-driven repair of build scripts (FH, XW), pp. 1078–1089.
ICSE-2018-MadalaDA #behaviour #combinator
A combinatorial approach for exposing off-nominal behaviors (KM, HD, DA), pp. 910–920.
ICSE-2018-MoralesSKCA #energy #mobile #named #refactoring
EARMO: an energy-aware refactoring approach for mobile apps (RM, RS, FK, FC, GA), p. 59.
ICSE-2018-YanSCX #detection #reduction
Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities (HY, YS, SC0, JX), pp. 327–337.
SLESLE-2018-RiesCG #named #requirements #uml
Messir: a text-first DSL-based approach for UML requirements engineering (BR, AC, NG), pp. 103–107.
SLESLE-2018-Rinard #correctness #reliability
A new approach for software correctness and reliability (MCR), pp. 1–2.
ASPLOSASPLOS-2018-GinsbachRSBDO #api #automation #legacy
Automatic Matching of Legacy Code to Heterogeneous APIs: An Idiomatic Approach (PG, TR, MS, BB, CD, MFPO), pp. 139–153.
CASECASE-2018-AbbatecolaFPU #clustering #problem
A New Cluster-Based Approach for the Vehicle Routing Problem with Time Windows (LA, MPF, GP, WU), pp. 744–749.
CASECASE-2018-AssadRAAH #energy #optimisation
An Approach of Optimising S-curve Trajectory for a Better Energy Consumption (FA, ER, MHA, BA, RH), pp. 98–103.
CASECASE-2018-DelangTBP #implementation #modelling
An approach of service modeling for the demand-driven implementation of Human-Robot-Interaction in manufacturing (KD, MT, MB, MP), pp. 705–710.
CASECASE-2018-FanXSZ
Overbooking for Specialty Clinics with Patient No-Shows: A Queueing Approach (ZF, XX, RAS, XZ), pp. 396–401.
CASECASE-2018-FrancoAGABB #deployment #optimisation #probability #using
Strategic territorial deployment of hospital pharmacy robots using a stochastic p-robust optimization approach (CF, VA, TG, EAL, MB, HB), pp. 390–395.
CASECASE-2018-HildebrandtTCF #cyber-physical #ontology
Ontology Building for Cyber-Physical Systems: A domain expert-centric approach (CH, ST, BC, AF), pp. 1079–1086.
CASECASE-2018-JalalianLWAC #automation #detection #fault #statistics #visual notation
An Automatic Visual Inspection Method based on Statistical Approach for Defect Detection of Ship Hull Surfaces (AJ, WFL, FSW, SMA, CMC), pp. 445–450.
CASECASE-2018-JantschNWHM #bound #branch
Enhanced branch and bound approach for receding horizon based planning (MJ, NNN, LW, MH, UM), pp. 160–163.
CASECASE-2018-JordanHP
Extension of the Plant Feature Approach Introducing Temporal Relations (CVJ, JCH, JP), pp. 1164–1169.
CASECASE-2018-LongoFMMS #big data #complexity #monitoring
Big Data for advanced monitoring system: an approach to manage system complexity (CSL, CF, FM, LM, MS), pp. 341–346.
CASECASE-2018-OutafraoutAN #analysis #hybrid #modelling #multi #performance #petri net
A colored hybrid Petri net-based modeling approach for performance analysis of a multi-modal transportation system (KO, EhCEA, ANSM), pp. 1568–1573.
CASECASE-2018-PetittiPCMSCN #distributed #mobile #network
A Distributed Map Building Approach for Mobile Robotic Networks (AP, DDP, RC, AM, ES, AC, DN), pp. 116–121.
CASECASE-2018-RibeiroRPS #architecture #design #using
An Approach for Architectural Design of Automotive Systems using MARTE and SysML (FGCR, AR, CEP, MSS), pp. 1574–1580.
CASECASE-2018-SabattiniVFCMLV #adaptation #evaluation #human-computer
Methodological Approach for the Evaluation of an Adaptive and Assistive Human-Machine System (LS, VV, CF, JNC, AM, FL, BVH), pp. 57–62.
CASECASE-2018-SussDA #automation #classification #component
An approach to automatically assign mechatronic components to an existing or identified classification (SS, CD, FA), pp. 1525–1529.
CASECASE-2018-Wu #automation #clustering #detection #multi #online
CASE 2018 Special Session Presentation-Only Abstract Submission Form: A Sequential Bayesian Partitioning Approach for Online Steady State Detection of Multivariate Systems (JW), pp. 1308–1309.
ESOPESOP-2018-AguadoMPRH #concurrent #memory management
Deterministic Concurrency: A Clock-Synchronised Shared Memory Approach (JA, MM, MP, PSR, RvH), pp. 86–113.
FASEFASE-2018-0012SRYHBRS #analysis #effectiveness #modelling
Effective Analysis of Attack Trees: A Model-Driven Approach (RK0, SS, ER, BMY, DH, JB, AR, MS), pp. 56–73.
CAVCAV-2018-FarinierBBP #generative #quantifier
Model Generation for Quantified Formulas: A Taint-Based Approach (BF, SB, RB, MLP), pp. 294–313.
ICSTICST-2018-KhosrowjerdiMR #injection #machine learning #testing
Virtualized-Fault Injection Testing: A Machine Learning Approach (HK, KM, AR), pp. 297–308.
ICTSSICTSS-2018-LopezKBYZ #logic
Test Derivation for SDN-Enabled Switches: A Logic Circuit Based Approach (JL, NK, AB, NY, DZ), pp. 69–84.
IJCARIJCAR-2018-CiobacaL #induction #proving #reachability #term rewriting
A Coinductive Approach to Proving Reachability Properties in Logically Constrained Term Rewriting Systems (SC, DL), pp. 295–311.
IJCARIJCAR-2018-IgnatievPNM #satisfiability #set
A SAT-Based Approach to Learn Explainable Decision Sets (AI, FP, NN, JMS0), pp. 627–645.
IJCARIJCAR-2018-LagniezBLM #problem #satisfiability
An Assumption-Based Approach for Solving the Minimal S5-Satisfiability Problem (JML, DLB, TdL, VM), pp. 1–18.
TAPTAP-2018-BernardHK #approximate #modelling #random #scalability
An Approximation-Based Approach for the Random Exploration of Large Models (JB0, PCH, OK), pp. 27–43.
VMCAIVMCAI-2018-BuroM #injection #semantics
Abstract Code Injection - A Semantic Approach Based on Abstract Non-Interference (SB, IM), pp. 116–137.
ECSAECSA-2017-BhatSBHM #automation #design #machine learning
Automatic Extraction of Design Decisions from Issue Management Systems: A Machine Learning Based Approach (MB, KS, AB, UH, FM), pp. 138–154.
ECSAECSA-2017-Khakpour #adaptation #composition #self
Control of Self-adaptation Under Partial Observation: A Modular Approach (NK), pp. 112–119.
ICSAICSA-2017-HassanAB #architecture #metamodelling
Microservice Ambients: An Architectural Meta-Modelling Approach for Microservice Granularity (SH, NA, RB), pp. 1–10.
JCDLJCDL-2017-WuCCLG #hybrid #named
HESDK: A Hybrid Approach to Extracting Scientific Domain Knowledge Entities (JW0, SRC, AC, CL, CLG), pp. 241–244.
CSEETCSEET-2017-DemuthK #approximate #scalability
An Approach for Project Task Approximation in a Large-Scale Software Project Course (BD, MK), pp. 67–76.
EDMEDM-2017-BalyanMM #comprehension #machine learning #natural language
Combining Machine Learning and Natural Language Processing Approach to Assess Literary Text Comprehension (RB, KSM, DSM).
EDMEDM-2017-ChountaMAJK #development #modelling
Modeling the Zone of Proximal Development with a Computational Approach (IAC, BMM, PLA, PWJ, SK).
EDMEDM-2017-GuoCC #network #student
A Neural Network Approach to Estimate Student Skill Mastery in Cognitive Diagnostic Assessments (QG, MC, YC).
ICSMEICSME-2017-AbidDCM #automation #documentation #evaluation
The Evaluation of an Approach for Automatic Generated Documentation (NJA, ND, MLC, JIM), pp. 307–317.
ICSMEICSME-2017-FujiokaN #constraints #feature model #interactive
Constraints Based Approach to Interactive Feature Location (DF, NN), pp. 499–503.
ICSMEICSME-2017-LiFZMR #clone detection #detection #named
CCLearner: A Deep Learning-Based Clone Detection Approach (LL, HF, WZ, NM, BGR), pp. 249–260.
SANERSANER-2017-Kirda #automation #detection #named #scalability
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) (EK), p. 1.
SANERSANER-2017-Steinbeck #smell #visualisation
An arc-based approach for visualization of code smells (MS), pp. 397–401.
SANERSANER-2017-TangL #mining #named #novel #probability #using
StiCProb: A novel feature mining approach using conditional probability (YT, HL), pp. 45–55.
DLTDLT-2017-Bruyere #game studies #synthesis
Computer Aided Synthesis: A Game-Theoretic Approach (VB), pp. 3–35.
FSCDFSCD-2017-0001TK #confluence #induction #proving
Improving Rewriting Induction Approach for Proving Ground Confluence (TA0, YT, YK), p. 18.
FSCDFSCD-2017-PradicR #synthesis
A Curry-Howard Approach to Church's Synthesis (PP, CR), p. 16.
IFM-2017-SilvettiPB #black box #cyber-physical #learning
An Active Learning Approach to the Falsification of Black Box Cyber-Physical Systems (SS, AP, LB), pp. 3–17.
ICFP-2017-ByrdBRM #functional #problem #programming
A unified approach to solving seven programming problems (functional pearl) (WEB, MB, GR, MM), p. 26.
CHI-PLAYCHI-PLAY-2017-PetersenTMD #game studies #mobile
Evaluating the Onboarding Phase of Free-toPlay Mobile Games: A Mixed-Method Approach (FWP, LET, PMB, AD), pp. 377–388.
CHI-PLAYCHI-PLAY-2017-ScozziIL #design #game studies #learning
A Mixed Method Approach for Evaluating and Improving the Design of Learning in Puzzle Games (MVS, II, CL), pp. 217–228.
CoGCIG-2017-FontMLR #game studies #heuristic #hybrid #towards
Towards a hybrid neural and evolutionary heuristic approach for playing tile-matching puzzle games (JMF, DM, SL, PRC), pp. 76–79.
CoGCIG-2017-Greenwood #fuzzy #game studies
A fuzzy system approach for choosing public goods game strategies (GWG), pp. 104–109.
DiGRADiGRA-2017-GoddardM #design #game studies #research #towards
Towards Genre as a Game Design Research Approach (WG, AM).
FDGFDG-2017-TengB #generative #network #semantics
A semantic approach to patch-based procedural generation of urban road networks (ET, RB), p. 10.
CoGVS-Games-2017-LopeMMGV #design #education #game studies
Designing educational games: Key elements and methodological approach (RPdL, NMM, RMS, AMG, FLGV), pp. 63–70.
CIKMCIKM-2017-AnwarNH #community #novel #performance
A Novel Approach for Efficient Computation of Community Aware Ridesharing Groups (SA, SN, TH), pp. 1971–1974.
CIKMCIKM-2017-CaoZL #approximate #distributed #effectiveness #graph #mining #named #scalability
PMS: an Effective Approximation Approach for Distributed Large-scale Graph Data Processing and Mining (YC, YZ, JL), pp. 1999–2002.
CIKMCIKM-2017-Ha-ThucYWDGS
From Query-By-Keyword to Query-By-Example: LinkedIn Talent Search Approach (VHT, YY, XW, VD, AG, SS), pp. 1737–1745.
CIKMCIKM-2017-Han0YZ #assembly #graph #keyword #query #rdf
Keyword Search on RDF Graphs - A Query Graph Assembly Approach (SH, LZ0, JXY, DZ0), pp. 227–236.
CIKMCIKM-2017-HuLSLL0Z #information management #named #probability #segmentation
CNN-IETS: A CNN-based Probabilistic Approach for Information Extraction by Text Segmentation (MH, ZL, YS, AL0, GL0, KZ0, LZ0), pp. 1159–1168.
CIKMCIKM-2017-LiGBC #correlation #modelling #named #online #process
FM-Hawkes: A Hawkes Process Based Approach for Modeling Online Activity Correlations (SL, XG, WB, GC), pp. 1119–1128.
CIKMCIKM-2017-LinMZ #identification #modelling #multi #topic
An Enhanced Topic Modeling Approach to Multiple Stance Identification (JL, WM, YZ), pp. 2167–2170.
CIKMCIKM-2017-MalmiGT #network
Active Network Alignment: A Matching-Based Approach (EM, AG, ET), pp. 1687–1696.
CIKMCIKM-2017-SunSGOC #community #detection #symmetry
A Non-negative Symmetric Encoder-Decoder Approach for Community Detection (BJS, HS, JG, WO, XC), pp. 597–606.
CIKMCIKM-2017-VellosoD #using #web
Extracting Records from the Web Using a Signal Processing Approach (RPV, CFD), pp. 197–206.
CIKMCIKM-2017-WuSZ #behaviour #detection #modelling #performance
A Fast Trajectory Outlier Detection Approach via Driving Behavior Modeling (HW0, WS, BZ), pp. 837–846.
CIKMCIKM-2017-WuZCC #image #scalability
A New Approach to Compute CNNs for Extremely Large Images (SW, MZ, GC0, KC0), pp. 39–48.
ECIRECIR-2017-BasuRGBG #microblog #novel #retrieval #word
A Novel Word Embedding Based Stemming Approach for Microblog Retrieval During Disasters (MB, AR, KG, SB, SG0), pp. 589–597.
ECIRECIR-2017-RomeoMBM #learning #multi #ranking
A Multiple-Instance Learning Approach to Sentence Selection for Question Ranking (SR, GDSM, ABC, AM), pp. 437–449.
ECIRECIR-2017-SoldainiG #health #learning #rank #semantics
Learning to Rank for Consumer Health Search: A Semantic Approach (LS, NG), pp. 640–646.
ICMLICML-2017-AcharyaDOS #symmetry
A Unified Maximum Likelihood Approach for Estimating Symmetric Properties of Discrete Distributions (JA, HD, AO, ATS), pp. 11–21.
ICMLICML-2017-BogunovicMSC #clustering #robust
Robust Submodular Maximization: A Non-Uniform Partitioning Approach (IB, SM, JS, VC), pp. 508–516.
ICMLICML-2017-HartfordLLT #flexibility #predict
Deep IV: A Flexible Approach for Counterfactual Prediction (JSH, GL, KLB, MT), pp. 1414–1423.
ICMLICML-2017-MaystreG #effectiveness #exclamation #learning
Just Sort It! A Simple and Effective Approach to Active Preference Learning (LM, MG), pp. 2344–2353.
ICMLICML-2017-RahmaniA17a #clustering #problem
Innovation Pursuit: A New Approach to the Subspace Clustering Problem (MR, GKA), pp. 2874–2882.
KDDKDD-2017-ChojnackiDFSWZA #comprehension
A Data Science Approach to Understanding Residential Water Contamination in Flint (AC, CD, AF, GS, JW, DTZ, JDA, EMS), pp. 1407–1416.
KDDKDD-2017-RozenshteinTG #social
Inferring the Strength of Social Ties: A Community-Driven Approach (PR, NT, AG), pp. 1017–1025.
KDDKDD-2017-SalehianHL #crowdsourcing #machine learning #scalability
Matching Restaurant Menus to Crowdsourced Food Data: A Scalable Machine Learning Approach (HS, PDH, CL), pp. 2001–2009.
KDDKDD-2017-TongCZCWYYL #online #platform #predict #scalability
The Simpler The Better: A Unified Approach to Predicting Original Taxi Demands based on Large-Scale Online Platforms (YT, YC, ZZ, LC0, JW0, QY0, JY, WL), pp. 1653–1662.
KDDKDD-2017-YangBZY0 #collaboration #learning #recommendation
Bridging Collaborative Filtering and Semi-Supervised Learning: A Neural Approach for POI Recommendation (CY, LB, CZ0, QY0, JH0), pp. 1245–1254.
ECMFAECMFA-2017-RuscioEIPS #migration #model transformation #variability
A Feature-Based Approach for Variability Exploration and Resolution in Model Transformation Migration (DDR, JE, LI, AP, WS), pp. 71–89.
ICMTICMT-2017-HoWP #bidirectional #named
BXE2E: A Bidirectional Transformation Approach for Medical Record Exchange (JH, JHW, MP), pp. 155–170.
ICMTICMT-2017-NassarRA #automation #emf #interactive #modelling #rule-based
Rule-Based Repair of EMF Models: An Automated Interactive Approach (NN, HR, TA), pp. 171–181.
MoDELSMoDELS-2017-Al-RefaiCG #fuzzy #logic #modelling #testing
A Fuzzy Logic Based Approach for Model-Based Regression Test Selection (MAR, WC, SG), pp. 55–62.
MoDELSMoDELS-2017-DouBB #modelling
A Model-Driven Approach to Trace Checking of Pattern-Based Temporal Properties (WD, DB, LCB), pp. 323–333.
ECOOPECOOP-2017-Gordon #polymorphism
A Generic Approach to Flow-Sensitive Polymorphic Effects (CSG), p. 31.
LOPSTRLOPSTR-2017-EngelsBB #database #datalog #rule-based
A Rule-Based Approach to Analyzing Database Schema Objects with Datalog (CE, AB, SB), pp. 20–36.
PPDPPPDP-2017-MezzinaP #consistency
Causally consistent reversible choreographies: a monitors-as-memories approach (CAM, JAP), pp. 127–138.
ESEC-FSEESEC-FSE-2017-Jaffe
Suggesting meaningful variable names for decompiled code: a machine translation approach (AJ), pp. 1050–1052.
ESEC-FSEESEC-FSE-2017-NguyenARH #invariant
Counterexample-guided approach to finding numerical invariants (TN, TA, AR, MH0), pp. 605–615.
ICSE-2017-JiangZRZ #api #tutorial
An unsupervised approach for discovering relevant tutorial fragments for APIs (HJ, JZ, ZR, TZ0), pp. 38–48.
ICSE-2017-TsutanoBSRD #android #performance #robust #scalability
An efficient, robust, and scalable approach for analyzing interacting android apps (YT, SB, WSa, GR, JD), pp. 324–334.
GPCEGPCE-2017-ParreauxSK #optimisation #staged
Quoted staged rewriting: a practical approach to library-defined optimizations (LP, AS, CEK), pp. 131–145.
SLESLE-2017-BarisicBAG #development #domain-specific language #requirements #usability
A requirements engineering approach for usability-driven DSL development (AB, DB, VA, MG), pp. 115–128.
SLESLE-2017-TendelooMMV #modelling #multi #syntax
Concrete syntax: a multi-paradigm modelling approach (YVT, SVM, BM, HV), pp. 182–193.
CASECASE-2017-DingWL #feedback #logic #matrix #network
Output feedback disturbance decoupling of boolean control networks: A logical matrix factorization approach (XD, SW, HL0), pp. 181–186.
CASECASE-2017-FranckAXG #people #problem
An optimization-simulation approach for long term care structure assignment problem for elderly people (TF, VA, XX, RG), pp. 574–579.
CASECASE-2017-FriedrichZTLV #maintenance #modelling #recognition
Environment modeling for maintenance automation-a next-best-view approach for combining space exploration and object recognition tasks (CF, VZ, MT, AL, AV), pp. 1445–1450.
CASECASE-2017-HaasWTUS #authentication #industrial #mobile
A secured offline authentication approach for industrial mobile robots (SH, AW, RT, TU, CS), pp. 308–313.
CASECASE-2017-HanCZ #detection #matrix
Matrix approach to detectability of discrete event systems under partial observation (XH, ZC, JZ), pp. 187–192.
CASECASE-2017-HanPM #learning #linear #modelling
Model-based reinforcement learning approach for deformable linear object manipulation (HH, GP, TM), pp. 750–755.
CASECASE-2017-KinghorstGLCYFZ #algorithm #maintenance #markov #modelling #predict #search-based
Hidden Markov model-based predictive maintenance in semiconductor manufacturing: A genetic algorithm approach (JK, OG, ML, HLC, KY, JF, MZ, BVH), pp. 1260–1267.
CASECASE-2017-KongN #fault #predict #using
A practical yield prediction approach using inline defect metrology data for system-on-chip integrated circuits (YK, DN), pp. 744–749.
CASECASE-2017-LiXLK #classification #learning #physics
Improving colorectal polyp classification based on physical examination data - A ensemble learning approach (CL, XX, JL, NK), pp. 193–194.
CASECASE-2017-NingHHG #3d #continuation #process
A cloud-supported cps approach to control decision of process manufacturing: 3D ONoC (ZN, WH, XH0, XG), pp. 458–463.
CASECASE-2017-PengHXC #coordination #information management #optimisation
An optimization approach for team coordination through information sharing (YP, EH, JX, CHC), pp. 282–287.
CASECASE-2017-SabattiniVCMF #design #human-computer
Methodological approach for the design of a complex inclusive human-machine system (LS, VV, JNC, AM, CF), pp. 145–150.
CASECASE-2017-WangHZL #automation #petri net #robust
A robust control approach to automated manufacturing systems allowing failures and reworks with Petri nets (XW, HH, YZ0, YL0), pp. 370–375.
CASECASE-2017-WangLZH #design #optimisation
A design approach for event-driven optimization in complex air conditioning systems (JW, SL, PZ, GH), pp. 912–917.
CASECASE-2017-WangW #constraints #higher-order #programming #using
Resolve reactive robot control with perturbed constraints using a second order cone programming approach (YW, LW), pp. 124–129.
CASECASE-2017-XiaoHTJ #multi
Containment control of multiagent systems: A DOBC approach (BX, TH, QT, TJ), pp. 1577–1580.
CASECASE-2017-ZhaoLHWZ #fault
A nussbaum gain approach to attitude tracking control of spacecrafts with actuator faults (XZ, YL, LH, XW, QZ), pp. 1581–1585.
CASECASE-2017-ZhouSLLC #industrial
Information based approach for sort operation in logistic industry (CZ, AS, HL, LHL, EPC), pp. 1356–1361.
CASECASE-2017-ZhouWY #learning
Dynamic dispatching for re-entrant production lines - A deep learning approach (FYZ, CHW, CJY), pp. 1026–1031.
CASECASE-2017-ZouV #automation #consistency #design #development #nondeterminism
Feature-based systematic approach development for inconsistency resolution in automated production system design (MZ, BVH), pp. 687–694.
CGOCGO-2017-GinsbachO #constraints #reduction
Discovery and exploitation of general reductions: a constraint based approach (PG, MFPO), pp. 269–280.
CGOCGO-2017-SuLX #automation #compilation #generative #performance
Automatic generation of fast BLAS3-GEMM: a portable compiler approach (XS, XL, JX), pp. 122–133.
FASEFASE-2017-ChengT #atl #deduction #fault #locality #model transformation
A Deductive Approach for Fault Localization in ATL Model Transformations (ZC, MT), pp. 300–317.
FASEFASE-2017-Wang0YP #empirical #model checking #modelling #probability
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study (JW, JS0, QY, JP0), pp. 3–21.
CSLCSL-2017-HorcikMV #algebra #constraints
An Algebraic Approach to Valued Constraint Satisfaction (RH, TM, AV), p. 20.
CSLCSL-2017-Thomas #algorithm #game studies #infinity
Determinacy of Infinite Games: Perspectives of the Algorithmic Approach (Invited Talk) (WT), p. 1.
ICSTICST-2017-Al-QahtaniER #api #modelling #ontology #security #semantics #traceability
Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach (SSAQ, EEE, JR), pp. 80–91.
ICSTICST-2017-JanNAB #injection #search-based #testing #web #xml
A Search-Based Testing Approach for XML Injection Vulnerabilities in Web Applications (SJ, CDN, AA, LCB), pp. 356–366.
ECSAECSA-2016-KaptoEKT #analysis #architecture #detection #evolution #source code
Inferring Architectural Evolution from Source Code Analysis - A Tool-Supported Approach for the Detection of Architectural Tactics (CK, GEB, SK, CT), pp. 149–165.
ECSAECSA-2016-SchenkhuizenWJC #consistency #nondeterminism
Consistent Inconsistency Management: A Concern-Driven Approach (JS, JMEMvdW, SJ, LC), pp. 201–209.
QoSAQoSA-2016-PitakratOHG #architecture #online #predict
An Architecture-Aware Approach to Hierarchical Online Failure Prediction (TP, DO, AvH, LG), pp. 60–69.
WICSAWICSA-2016-BuchgeherKHSH #architecture #enterprise #testing
Improving Testing in an Enterprise SOA with an Architecture-Based Approach (GB, CK, WH, MS, HH), pp. 231–240.
WICSAWICSA-2016-BuresHKAS #architecture #physics #statistics
Statistical Approach to Architecture Modes in Smart Cyber Physical Systems (TB, PH, JK, RAA, DS), pp. 168–177.
WICSAWICSA-2016-FengKCMX #analysis #architecture #security #towards
Towards an Architecture-Centric Approach to Security Analysis (QF, RK, YC, RM, LX0), pp. 221–230.
CSEETCSEET-2016-JohnsonPH #education #re-engineering
An Athletic Approach to Software Engineering Education (PMJ, DP, EH0), pp. 8–17.
CSEETCSEET-2016-MarsicanoMFF #education #modelling #process #requirements
An Integrated Approach to the Requirements Engineering and Process Modelling Teaching (GM, FFM, MVF, SAAdF), pp. 166–174.
EDMEDM-2016-AtapattuFT #classification #topic #visual notation
Topic-wise Classification of MOOC Discussions: A Visual Analytics Approach (TA, KF, HT), pp. 276–281.
EDMEDM-2016-JiangG #contest #graph #mining #on the
On Competition for Undergraduate Co-op Placements: A Graph Mining Approach (YHJ, LG), pp. 394–399.
EDMEDM-2016-LeeRBY #analysis #clustering #heatmap #interactive #learning #visualisation
Hierarchical Cluster Analysis Heatmaps and Pattern Analysis: An Approach for Visualizing Learning Management System Interaction Data (JEL, MR, AB, MY), pp. 603–604.
EDMEDM-2016-SweeneyLRJ #performance #predict #recommendation #student
Next-Term Student Performance Prediction: A Recommender Systems Approach (MS, JL, HR, AJ), p. 7.
ICPCICPC-2016-AvelinoPHV #novel
A novel approach for estimating Truck Factors (GA, LTP, ACH, MTV), pp. 1–10.
ICPCICPC-2016-SaiedS #api #mining
A cooperative approach for combining client-based and library-based API usage pattern mining (MAS, HAS), pp. 1–10.
ICSMEICSME-2016-AlghmadiSSH #automation #performance #recommendation #testing
An Automated Approach for Recommending When to Stop Performance Tests (HMA, MDS, WS, AEH), pp. 279–289.
ICSMEICSME-2016-PatilKDB #domain model #modelling #optimisation
An Optimization Approach for Matching Textual Domain Models with Existing Code (TP, RK, DD, IB), pp. 133–143.
ICSMEICSME-2016-StroblZBG #incremental #migration #towards
A Tiered Approach Towards an Incremental BPEL to BPMN 2.0 Migration (SS, MZ, MB, TG), pp. 563–567.
CIAACIAA-2016-BelovsMY #quantum
Looking for Pairs that Hard to Separate: A Quantum Approach (AB, JAM, AY), pp. 213–223.
DLTDLT-2016-CadilhacKL #complexity
A Language-Theoretical Approach to Descriptive Complexity (MC, AK, KJL), pp. 64–76.
DLTDLT-2016-UezatoM #automaton #problem
Monoid-Based Approach to the Inclusion Problem on Superdeterministic Pushdown Automata (YU, YM), pp. 393–405.
FMFM-2016-BenesBDPS #analysis #model checking
A Model Checking Approach to Discrete Bifurcation Analysis (NB, LB, MD, SP, DS), pp. 85–101.
FMFM-2016-YangHCL0 #generative #hybrid #linear #programming
A Linear Programming Relaxation Based Approach for Generating Barrier Certificates of Hybrid Systems (ZY, CH, XC0, WL, ZL0), pp. 721–738.
FSCDFSCD-2016-Hasuo #algebra #higher-order
Coalgebras and Higher-Order Computation: a GoI Approach (IH), p. 2.
IFM-2016-MullerMRSP #component #hybrid #safety #verification
A Component-Based Approach to Hybrid Systems Safety Verification (AM0, SM, WR, WS, AP), pp. 441–456.
AIIDEAIIDE-2016-GunesSAES #modelling #using
A Generic Approach for Player Modeling Using Event-Trait Mapping and Feature Weighting (MAG, GS, UA, OE, SS), pp. 169–175.
AIIDEAIIDE-2016-SnodgrassO #2d #game studies #generative
An Approach to Domain Transfer in Procedural Content Generation of Two-Dimensional Videogame Levels (SS, SO), pp. 79–85.
CoGCIG-2016-SaccoLY #game studies #generative #semantics
A holistic approach for semantic-based game generation (OS, AL, GNY), pp. 1–8.
CoGCIG-2016-TamassiaRSDZH #game studies #markov #modelling #online #predict
Predicting player churn in destiny: A Hidden Markov models approach to predicting player departure in a major online game (MT, WLR, RS, AD, FZ, MH), pp. 1–8.
DiGRADiGRA-FDG-2016-LimLH #bottom-up #category theory #clustering #image #social #using
Discovering Social and Aesthetic Categories of Avatars: A Bottom-Up Artificial Intelligence Approach Using Image Clustering (CUL, AL, DFH).
DiGRADiGRA-FDG-2016-SoaresLPM #geometry #random
Rapidly-Exploring Random Tree approach for Geometry Friends (RS, FL, RP, FSM).
CoGVS-Games-2016-VosinakisKMS #artificial reality #using
A Kinesthetic Approach to Digital Heritage Using Leap Motion: The Cycladic Sculpture Application (SV, PK, DM, ES), pp. 1–8.
CIKMCIKM-2016-GhoshCCBR #word
Characterizing Diseases from Unstructured Text: A Vocabulary Driven Word2vec Approach (SG, PC, EC, JSB, NR), pp. 1129–1138.
CIKMCIKM-2016-GhoshGA
A Preference Approach to Reputation in Sponsored Search (AG, DG, RA), pp. 2041–2044.
CIKMCIKM-2016-JinFF #collaboration #detection
A Context-aware Collaborative Filtering Approach for Urban Black Holes Detection (LJ, ZF, LF), pp. 2137–2142.
CIKMCIKM-2016-LiLF #classification #multi
Multi-View Time Series Classification: A Discriminative Bilinear Projection Approach (SL0, YL, YF0), pp. 989–998.
CIKMCIKM-2016-Liu0 #twitter
Where are You Tweeting?: A Context and User Movement Based Approach (ZL, YH0), pp. 1949–1952.
CIKMCIKM-2016-LiXSM #documentation #effectiveness #topic #word
Effective Document Labeling with Very Few Seed Words: A Topic Model Approach (CL, JX, AS, ZM), pp. 85–94.
CIKMCIKM-2016-LuQZHG #network #recommendation #social
Location-aware Friend Recommendation in Event-based Social Networks: A Bayesian Latent Factor Approach (YL, ZQ, CZ0, YH0, LG0), pp. 1957–1960.
CIKMCIKM-2016-MouJXL0J #encoding #word
Distilling Word Embeddings: An Encoding Approach (LM, RJ, YX, GL, LZ0, ZJ), pp. 1977–1980.
CIKMCIKM-2016-RongZC #network
A Model-Free Approach to Infer the Diffusion Network from Event Cascade (YR, QZ, HC), pp. 1653–1662.
CIKMCIKM-2016-RongZYSL #markov #optimisation #performance #process
The Rich and the Poor: A Markov Decision Process Approach to Optimizing Taxi Driver Revenue Efficiency (HR, XZ, CY, MZS, AXL), pp. 2329–2334.
CIKMCIKM-2016-RuanXSTFLZ
When Sensor Meets Tensor: Filling Missing Sensor Values Through a Tensor Approach (WR, PX, QZS, NKT0, NJGF, XL0, WEZ), pp. 2025–2028.
CIKMCIKM-2016-TanWX #network #recommendation
A Neural Network Approach to Quote Recommendation in Writings (JT, XW0, JX), pp. 65–74.
CIKMCIKM-2016-WuJ #clustering #retrieval
A Density-Based Approach to the Retrieval of Top-K Spatial Textual Clusters (DW0, CSJ), pp. 2095–2100.
ECIRECIR-2016-AkerKBPBHG #clustering #graph #online #topic
A Graph-Based Approach to Topic Clustering for Online Comments to News (AA, EK, ARB, MLP, EB, MH, RJG), pp. 15–29.
ECIRECIR-2016-NiuLC #learning #named #twitter
LExL: A Learning Approach for Local Expert Discovery on Twitter (WN, ZL, JC), pp. 803–809.
ICMLICML-2016-CouilletWAS #matrix #network #random
A Random Matrix Approach to Echo-State Neural Networks (RC, GW, HTA, HS), pp. 517–525.
ICMLICML-2016-KasaiM #rank
Low-rank tensor completion: a Riemannian manifold preconditioning approach (HK, BM), pp. 1012–1021.
ICMLICML-2016-LimW #permutation #problem
A Box-Constrained Approach for Hard Permutation Problems (CHL, SW), pp. 2454–2463.
ICMLICML-2016-MalherbeCV #optimisation #ranking
A ranking approach to global optimization (CM, EC, NV), pp. 1539–1547.
ICMLICML-2016-PlataniosDM
Estimating Accuracy from Unlabeled Data: A Bayesian Approach (EAP, AD, TMM), pp. 1416–1425.
ICMLICML-2016-RahmaniA #composition #learning #matrix #performance
A Subspace Learning Approach for High Dimensional Matrix Decomposition with Efficient Column/Row Sampling (MR, GKA), pp. 1206–1214.
ICMLICML-2016-RosenskiSS #multi
Multi-Player Bandits - a Musical Chairs Approach (JR, OS, LS), pp. 155–163.
ICMLICML-2016-ShahamCDJNCK #learning
A Deep Learning Approach to Unsupervised Ensemble Learning (US, XC, OD, AJ, BN, JTC, YK), pp. 30–39.
ICMLICML-2016-TaylorBXSPG #network #scalability
Training Neural Networks Without Gradients: A Scalable ADMM Approach (GT, RB, ZX0, BS, ABP, TG), pp. 2722–2731.
ICMLICML-2016-YenHRZD #classification #multi
PD-Sparse : A Primal and Dual Sparse Approach to Extreme Multiclass and Multilabel Classification (IEHY, XH, PR, KZ, ISD), pp. 3069–3077.
ICMLICML-2016-YenLZRD #multi #sequence
A Convex Atomic-Norm Approach to Multiple Sequence Alignment and Motif Discovery (IEHY, XL, JZ, PR, ISD), pp. 2272–2280.
ICMLICML-2016-ZhengTDZ #collaboration
A Neural Autoregressive Approach to Collaborative Filtering (YZ, BT, WD, HZ), pp. 764–773.
ICPRICPR-2016-0013LS #3d #retrieval #semantics #sketching
A semantic tree-based approach for sketch-based 3D model retrieval (BL0, YL, JS), pp. 3880–3885.
ICPRICPR-2016-AbdicFBARMS #detection #learning
Detecting road surface wetness from audio: A deep learning approach (IA, LF, DEB, WA, BR, EM, BWS), pp. 3458–3463.
ICPRICPR-2016-AginakoMRLS #difference #machine learning
Machine Learning approach to dissimilarity computation: Iris matching (NA, JMMO, IRR, EL, BS), pp. 170–175.
ICPRICPR-2016-AsplundHTS
A new approach to mathematical morphology on one dimensional sampled signals (TA, CLLH, MJT, RS), pp. 3904–3909.
ICPRICPR-2016-BrauJ #3d #estimation
A Bayesian part-based approach to 3D human pose and camera estimation (EB, HJ0), pp. 1762–1767.
ICPRICPR-2016-BSSH #classification #network #using
HEp-2 cell classification using artificial neural network approach (DB, KS, NH), pp. 84–89.
ICPRICPR-2016-ChenZW #learning #network #summary #video
Wireless capsule endoscopy video summarization: A learning approach based on Siamese neural network and support vector machine (JC, YZ, YW0), pp. 1303–1308.
ICPRICPR-2016-CosmoABTRC #image #multi
A game-theoretical approach for joint matching of multiple feature throughout unordered images (LC, AA, FB, AT, ER, DC), pp. 3715–3720.
ICPRICPR-2016-GaoYGC #constraints #network #using
Bayesian approach to learn Bayesian networks using data and constraints (XGG, YY, ZgG, DQC0), pp. 3667–3672.
ICPRICPR-2016-GattupalliCL
A computational approach to relative aesthetics (VG, PSC, BL), pp. 2446–2451.
ICPRICPR-2016-GuoCY #adaptation
A simple approach for unsupervised domain adaptation (XG0, WC, JY), pp. 1566–1570.
ICPRICPR-2016-HajduTKH #constraints #execution #probability
Composing ensembles by a stochastic approach under execution time constraint (AH, HT, LK, LH), pp. 222–227.
ICPRICPR-2016-HoSSEA #estimation #learning #parametricity
A temporal deep learning approach for MR perfusion parameter estimation in stroke (KCH, FS, KVS, SES, CWA), pp. 1315–1320.
ICPRICPR-2016-JordaoSS #detection #multi
A late fusion approach to combine multiple pedestrian detectors (AJ, JSdS, WRS), pp. 4250–4255.
ICPRICPR-2016-KhelifiM #image #multi #problem #segmentation
A multi-objective approach based on TOPSIS to solve the image segmentation combination problem (LK, MM), pp. 4220–4225.
ICPRICPR-2016-KimP #detection #network #using
A shape preserving approach for salient object detection using convolutional neural networks (JK, VP), pp. 609–614.
ICPRICPR-2016-LiH #detection #image #performance
A fast approach for traffic panel detection from natural scene images (ZML, LLH), pp. 579–584.
ICPRICPR-2016-LimK #feature model #multi #optimisation
Convex optimization approach for multi-label feature selection based on mutual information (HL, DWK), pp. 1512–1517.
ICPRICPR-2016-MeyL #self
A soft-labeled self-training approach (AM, ML), pp. 2604–2609.
ICPRICPR-2016-NguyenY #artificial reality #named #novel
StereoTag: A novel stereogram-marker-based approach for Augmented Reality (MN, AY), pp. 1059–1064.
ICPRICPR-2016-SahooA0 #automation #clustering #generative #multi #using
Automatic generation of biclusters from gene expression data using multi-objective simulated annealing approach (PS, SA, SS0), pp. 2174–2179.
ICPRICPR-2016-SharabatiX #performance #polynomial
Fast local polynomial regression approach for speckle noise removal (WKS, BX), pp. 3198–3203.
ICPRICPR-2016-ValevYK #geometry #pattern matching #pattern recognition #problem #recognition
A new geometrical approach for solving the supervised pattern recognition problem (VV, NY, AK), pp. 1648–1652.
ICPRICPR-2016-YanRZC #clustering #set
A constrained clustering based approach for matching a collection of feature sets (JY, ZR, HZ, SMC), pp. 3832–3837.
ICPRICPR-2016-ZamzamiPGKAS #analysis #automation #multimodal
An approach for automated multimodal analysis of infants' pain (GZ, CYP, DBG, RK, TA, YS0), pp. 4148–4153.
ICPRICPR-2016-ZhaoYWL #recognition
Landmark manifold: Revisiting the Riemannian manifold approach for facial emotion recognition (KZ, SY, AW, BCL), pp. 1095–1100.
ICPRICPR-2016-ZhuangYH #modelling #retrieval #scalability #video
DLSTM approach to video modeling with hashing for large-scale video retrieval (NZ, JY0, KAH), pp. 3222–3227.
KDDKDD-2016-AmoualianCGA #dependence #documentation #modelling #named #topic
Streaming-LDA: A Copula-based Approach to Modeling Topic Dependencies in Document Streams (HA, MC, ÉG, MRA), pp. 695–704.
KDDKDD-2016-AnCPS #named
MAP: Frequency-Based Maximization of Airline Profits based on an Ensemble Forecasting Approach (BA, HC0, NP, VSS), pp. 421–430.
KDDKDD-2016-BanerjeeYR #mining #named #scalability
MANTRA: A Scalable Approach to Mining Temporally Anomalous Sub-trajectories (PB, PY, SR), pp. 1415–1424.
KDDKDD-2016-BaoWL #data-driven #network #predict #resource management
From Prediction to Action: A Closed-Loop Approach for Data-Guided Network Resource Allocation (YB, HW, XL0), pp. 1425–1434.
KDDKDD-2016-MalmiTTRG #generative #named
DopeLearning: A Computational Approach to Rap Lyrics Generation (EM, PT, HT, TR, AG), pp. 195–204.
KDDKDD-2016-NakagawaSKTT #mining #performance #predict
Safe Pattern Pruning: An Efficient Approach for Predictive Pattern Mining (KN, SS, MK, KT, IT), pp. 1785–1794.
KDDKDD-2016-SalehiRLP #predict #risk management #robust
Dynamic and Robust Wildfire Risk Prediction System: An Unsupervised Approach (MS, LIR, TML, AP), pp. 245–254.
KDDKDD-2016-WanCKHGZ #modelling
From Truth Discovery to Trustworthy Opinion Discovery: An Uncertainty-Aware Quantitative Modeling Approach (MW, XC, LMK, JH0, JG0, BZ0), pp. 1885–1894.
KDDKDD-2016-XiaoGLMSFZ #towards
Towards Confidence in the Truth: A Bootstrapping based Truth Discovery Approach (HX, JG0, QL0, FM, LS, YF, AZ), pp. 1935–1944.
KDDKDD-2016-XiaoGWWSL
A Truth Discovery Approach with Theoretical Guarantee (HX, JG0, ZW, SW, LS, HL0), pp. 1925–1934.
KDDKDD-2016-ZhaoATBDBKD #detection #parametricity #strict #using
A Non-parametric Approach to Detect Epileptogenic Lesions using Restricted Boltzmann Machines (YZ, BA, TT, KEB, JGD, CEB, RK, OD), pp. 373–382.
BXBX-2016-Leblebici #consistency #grammarware #graph grammar #towards #traceability
Towards a Graph Grammar-Based Approach to Inter-Model Consistency Checks with Traceability Support (EL), pp. 35–39.
BXBX-2016-McKinna #bidirectional
Bidirectional Transformations with Deltas: A Dependently Typed Approach (Talk Proposal) (JM), p. 14.
ECMFAECMFA-2016-El-khouryEE #emf #linked data #maintenance #modelling #open data
Supporting the Linked Data Approach to Maintain Coherence Across Rich EMF Models (JEk, CE, CE), pp. 36–47.
ECMFAECMFA-2016-KessentiniSW #automation #co-evolution #metamodelling #multi #optimisation #using
Automated Metamodel/Model Co-evolution Using a Multi-objective Optimization Approach (WK, HAS, MW), pp. 138–155.
ICMTICMT-2016-JungHH #aspect-oriented #composition #domain-specific language #generative #named
GECO: A Generator Composition Approach for Aspect-Oriented DSLs (RJ, RH, WH), pp. 141–156.
MoDELSMoDELS-2016-AlkhaziRKWG #atl #automation #model transformation #refactoring #search-based
Automated refactoring of ATL model transformations: a search-based approach (BA, TR, MK, MW, WIG), pp. 295–304.
MoDELSMoDELS-2016-AroraSBZ #domain model #evaluation #industrial #modelling #requirements
Extracting domain models from natural-language requirements: approach and industrial evaluation (CA, MS, LCB, FZ), pp. 250–260.
MoDELSMoDELS-2016-KokalySCMC #assurance #evolution #model management #reuse
A model management approach for assurance case reuse due to system evolution (SK, RS, VC, TM, MC), pp. 196–206.
MoDELSMoDELS-2016-PrehoferWJ #interactive #modelling #multi
A model-based approach for multi-device user interactions (CP, AW, YJ), pp. 13–23.
MoDELSMoDELS-2016-RabbiLY #category theory #game studies #metamodelling #towards
Towards a categorical approach for meta-modelling epistemic game theory (FR, YL, ICY), pp. 57–64.
ECOOPECOOP-2016-AndreasenGCSTS #type system
Trace Typing: An Approach for Evaluating Retrofitted Type Systems (EA, CSG, SC0, MS, FT, KS), p. 26.
OOPSLAOOPSLA-2016-PetersKTC #named
OrcO: a concurrency-first approach to objects (AMP, DK, JAT, WRC), pp. 548–567.
LOPSTRLOPSTR-2016-ZielenkiewiczS #automaton #logic
Automata Theory Approach to Predicate Intuitionistic Logic (MZ, AS), pp. 345–360.
POPLPOPL-2016-BhaskaracharyaB #named #optimisation
SMO: an integrated approach to intra-array and inter-array storage optimization (SGB, UB, AC0), pp. 526–538.
POPLPOPL-2016-WuXCZZ #named #performance
Casper: an efficient approach to call trace collection (RW, XX0, SCC, HZ0, CZ), pp. 678–690.
ASEASE-2016-VojdaniARSVV #concurrent #detection
Static race detection for device drivers: the Goblint approach (VV, KA, VR, HS, VV, RV), pp. 391–402.
ASEASE-2016-YangJGS #automaton #verification
Verifying simulink stateflow model: timed automata approach (YY, YJ, MG, JGS), pp. 852–857.
FSEFSE-2016-HammoudiRS #incremental #named #testing #web
WATERFALL: an incremental approach for repairing record-replay tests of web applications (MH, GR, AS0), pp. 751–762.
FSEFSE-2016-Shevtsov #adaptation #reuse #self
Developing a reusable control-based approach to build self-adaptive software systems with formal guarantees (SS), pp. 1060–1062.
ICSE-2016-NguyenPVN #api #bytecode #learning #statistics
Learning API usages from bytecode: a statistical approach (TTN, HVP, PMV, TTN), pp. 416–427.
GPCEGPCE-2016-BrazGMRMT #configuration management
A change-centric approach to compile configurable systems with #ifdefs (LB, RG, MM, MR, FM, LT), pp. 109–119.
ASPLOSASPLOS-2016-HasabnisS #assembly #compilation #novel #representation
Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers (NH, RS), pp. 311–324.
CASECASE-2016-AlvesBPT #logic
Planning on Discrete Events Systems: A logical approach (LVRA, HJB, PNP, RHCT), pp. 1055–1060.
CASECASE-2016-CampbellTLPOF #concurrent #configuration management #modelling #π-calculus
Modeling concurrency and reconfiguration in vehicular systems: A π-calculus approach (JC, CET, PL0, TPP, ÜÖ, GEF), pp. 523–530.
CASECASE-2016-Csiszar #automation #combinator #equation #generative
A combinatorial approach to the automated generation of inverse kinematics equations for robot arms (AC), pp. 984–989.
CASECASE-2016-FeldmannWKV #automation #consistency #nondeterminism
A comprehensive approach for managing inter-model inconsistencies in automated production systems engineering (SF, MW, KK, BVH), pp. 1120–1127.
CASECASE-2016-HamanaAX #information management #petri net #verification
A timed Petri net approach for verification of Territorial Healthcare Information Systems (SH, VA, XX), pp. 658–663.
CASECASE-2016-MaP #embedded #named #programmable #testing
DTT-MAT: A software toolbox on a design-to-test approach for testing of embedded programmable controllers (CM, JP), pp. 878–884.
CASECASE-2016-OkaemeMW
A comfort zone set-based approach for coupled temperature and humidity control in buildings (CCO, SM, JTW), pp. 456–461.
CASECASE-2016-RehbergerSV #automation #flexibility #reasoning
An agent approach to flexible automated production systems based on discrete and continuous reasoning (SR, LS, BVH), pp. 1249–1256.
CASECASE-2016-SchwesingerS #3d #locality #scalability
A 3D approach to infrastructure-free localization in large scale warehouse environments (DS, JRS), pp. 274–279.
CASECASE-2016-SrinivasanC #approximate #orthogonal #using
Path planning with user route preference - A reward surface approximation approach using orthogonal Legendre polynomials (ARS, SC), pp. 1100–1105.
CASECASE-2016-WiebeRRV #automation #composition #delivery #fault #generative #injection #simulation #testing #using
Automated test suite generation to test modular designed packaging machines using Fault Injection and a simulink-based simulation approach (FW, SR, SR, BVH), pp. 758–765.
CGOCGO-2016-BarikFLHS #black box #cpu #energy #gpu #scheduling
A black-box approach to energy-aware scheduling on integrated CPU-GPU systems (RB, NF, BTL, CH, TS), pp. 70–81.
ESOPESOP-2016-KawabataI #adaptation #float #lazy evaluation #refinement
Improving Floating-Point Numbers: A Lazy Approach to Adaptive Accuracy Refinement for Numerical Computations (HK, HI), pp. 390–418.
ESOPESOP-2016-LourencoFP #adaptation #formal method #verification
Formalizing Single-Assignment Program Verification: An Adaptation-Complete Approach (CBL, MJF, JSP), pp. 41–67.
ESOPESOP-2016-WangN #functional #higher-order #source code #syntax
A Higher-Order Abstract Syntax Approach to Verified Transformations on Functional Programs (YW, GN), pp. 752–779.
CAVCAV-2016-ChenSW #commutative #framework #pipes and filters #problem #transducer
The Commutativity Problem of the MapReduce Framework: A Transducer-Based Approach (YFC, LS, ZW), pp. 91–111.
ICSTICST-2016-ChenBHXZ0X #compilation #testing
Test Case Prioritization for Compilers: A Text-Vector Based Approach (JC0, YB, DH, YX, HZ0, LZ0, BX), pp. 266–277.
ICTSSICTSS-2016-SimosKGGL #combinator #security #testing #web
A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing (DES, KK, LSGG, BG, YL), pp. 70–85.
ECSAECSA-2015-AngelovB #agile #architecture #development #education
An Approach to Software Architecting in Agile Software Development Projects in Education (SA, PdB), pp. 157–168.
ECSAECSA-2015-BaresiS #architecture
An Architecture-Centric Approach for Dynamic Smart Spaces (LB, AS), pp. 277–284.
ECSAECSA-2015-SporerMKB #agile #design #requirements
A Lean Automotive E/E-System Design Approach with Integrated Requirements Management Capability (HS, GM, CK, EB), pp. 251–258.
QoSAQoSA-2015-Kramer #consistency #generative #modelling #multi
A Generative Approach to Change-Driven Consistency in Multi-View Modeling (MEK), pp. 129–134.
WICSAWICSA-2015-CaraccioloLN #architecture #consistency
A Unified Approach to Architecture Conformance Checking (AC, MFL, ON), pp. 41–50.
WICSAWICSA-2015-HauptLP #api #modelling #rest
A Conversation Based Approach for Modeling REST APIs (FH, FL, CP), pp. 165–174.
DocEngDocEng-2015-AzevedoLS #3d
An Approach to Convert NCL Applications into Stereoscopic 3D (RGDAA, GAFL, LFGS), pp. 177–186.
DocEngDocEng-2015-DumasCBS #design
An Approach for Designing Proofreading Views in Publishing Chains (LD, SC, BB, SS), pp. 215–218.
DocEngDocEng-2015-RastanPS #comprehension #named
TEXUS: A Task-based Approach for Table Extraction and Understanding (RR, HYP, JS), pp. 25–34.
DocEngDocEng-2015-SarkisCD #multi #named #segmentation #web
MSoS: A Multi-Screen-Oriented Web Page Segmentation Approach (MS, CC, JCD), pp. 85–88.
DRRDRR-2015-PengCN #using
Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
JCDLJCDL-2015-PintoB #probability #semantics
Demystifying the Semantics of Relevant Objects in Scholarly Collections: A Probabilistic Approach (JMGP, WTB), pp. 157–164.
SIGMODSIGMOD-2015-ArmenatzoglouPN #clustering #game studies #graph #multi #realtime #social
Real-Time Multi-Criteria Social Graph Partitioning: A Game Theoretic Approach (NA, HP, VN, DP, CS), pp. 1617–1628.
SIGMODSIGMOD-2015-DeshpandeRDA #named
ShareInsights: An Unified Approach to Full-stack Data Processing (MD, DR, SD, AA), pp. 1925–1940.
SIGMODSIGMOD-2015-GurukarRR #commit #communication #mining #named #network #scalability
COMMIT: A Scalable Approach to Mining Communication Motifs from Dynamic Networks (SG, SR, BR), pp. 475–489.
SIGMODSIGMOD-2015-ShinJSK #graph #named #random #scalability
BEAR: Block Elimination Approach for Random Walk with Restart on Large Graphs (KS, JJ, LS, UK), pp. 1571–1585.
SIGMODSIGMOD-2015-TangSX
Influence Maximization in Near-Linear Time: A Martingale Approach (YT, YS, XX), pp. 1539–1554.
SIGMODSIGMOD-2015-WangLYXZ #network #performance
Efficient Route Planning on Public Transportation Networks: A Labelling Approach (SW, WL, YY, XX, SZ), pp. 967–982.
SIGMODSIGMOD-2015-WangXL #adaptation
Crowd-Based Deduplication: An Adaptive Approach (SW, XX, CHL), pp. 1263–1277.
SIGMODSIGMOD-2015-WongHFXL #as a service #database #named #parallel #using
Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
SIGMODSIGMOD-2015-ZhengZLYSZ #graph #how #nondeterminism #rdf #similarity
How to Build Templates for RDF Question/Answering: An Uncertain Graph Similarity Join Approach (WZ, LZ, XL, JXY, SS, DZ), pp. 1809–1824.
VLDBVLDB-2015-AkidauBCCFLMMPS #bound #correctness #data flow #latency
The Dataflow Model: A Practical Approach to Balancing Correctness, Latency, and Cost in Massive-Scale, Unbounded, Out-of-Order Data Processing (TA, RB, CC, SC, RFM, RL, SM, DM, FP, ES, SW), pp. 1792–1803.
VLDBVLDB-2015-GreenOW #live programming #programming
Live Programming in the LogicBlox System: A MetaLogiQL Approach (TJG, DO, GW), pp. 1782–1793.
VLDBVLDB-2015-JhaHLCH #in memory #memory management
Improving Main Memory Hash Joins on Intel Xeon Phi Processors: An Experimental Approach (SJ, BH, ML, XC, HPH), pp. 642–653.
VLDBVLDB-2015-LiCM #data-driven #query
Query From Examples: An Iterative, Data-Driven Approach to Query Construction (HL, CYC, DM), pp. 2158–2169.
VLDBVLDB-2015-SH #big data #named #testing
CODD: A Dataless Approach to Big Data Testing (AS, JRH), pp. 2008–2019.
VLDBVLDB-2015-YangMFLK #lens #named #on-demand
Lenses: An On-Demand Approach to ETL (YY, NM, RF, ZHL, OK), pp. 1578–1589.
VLDBVLDB-2015-ZhangC0 #distributed #graph #set
Bonding Vertex Sets Over Distributed Graph: A Betweenness Aware Approach (XZ, HC, LC), pp. 1418–1429.
EDMEDM-2015-AlexandronZP #machine learning #student
Discovering the Pedagogical Resources that Assist Students to Answer Questions Correctly - A Machine Learning Approach (GA, QZ, DEP), pp. 520–523.
EDMEDM-2015-AnayaGLH #analysis #collaboration #diagrams #network #social #using
An Approach of Collaboration Analytics in MOOCs Using Social Network Analysis and Influence Diagram (ARA, JGB, EL, FHdO), pp. 492–495.
EDMEDM-2015-ChangHC #modelling
Modeling Exercise Relationships in E-Learning: A Unified Approach (HSC, HJH, KTC), pp. 532–535.
EDMEDM-2015-DesmaraisXB
A Partition Tree Approach to Combine Techniques to Refine Item to Skills Q-Matrices (MCD, PX, BB), pp. 29–36.
EDMEDM-2015-HershkovitzMS #interactive #student
Teacher-Student Classroom Interactions: A Computational Approach (AH, AM, AS), pp. 558–559.
EDMEDM-2015-SaarelaK #clustering #education #scalability
Do Country Stereotypes Exist in Educational Data? A Clustering Approach for Large, Sparse, and Weighted Data (MS, TK), pp. 156–153.
EDMEDM-2015-VossSMS #dataset #learning #matrix
A Transfer Learning Approach for Applying Matrix Factorization to Small ITS Datasets (LV, CS, CM, LST), pp. 372–375.
ITiCSEITiCSE-2015-Patitsas #education #student
A Numpy-First Approach to Teaching CS1 to Natural Science Students (EP), p. 333.
ITiCSEITiCSE-2015-Silvis-Cividjian #education #multi #pervasive
Teaching Pervasive Computing to CS Freshmen: A Multidisciplinary Approach (NSC), pp. 195–200.
ITiCSEITiCSE-2015-XhakajL #education
A New Approach To Teaching Red Black Tree (FX, CWL), pp. 278–283.
SIGITESIGITE-2015-Jonas #online
Flipping a Flipped Approach: Online Techniques In-Person (MJ), p. 73.
SIGITESIGITE-2015-SobieskBCLT #education #multi
Cyber Education: A Multi-Level, Multi-Discipline Approach (ES, JRSB, GJC, ML, HT), pp. 43–47.
ICSMEICSME-2015-Verebi #modelling #refactoring
A model-based approach to software refactoring (IV), pp. 606–609.
MSRMSR-2015-Marder #behaviour #stack overflow
Stack Overflow Badges and User Behavior: An Econometric Approach (AM), pp. 450–453.
SANERSANER-2015-NagyMC #concept #query #sql
Where was this SQL query executed? a static concept location approach (CN, LM, AC), pp. 580–584.
SANERSANER-2015-NayrollesHTL #debugging #model checking #named #using
JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
SANERSANER-2015-SaeidiHKJ #clustering #multi #search-based
A search-based approach to multi-view clustering of software systems (AS, JH, RK, SJ), pp. 429–438.
SANERSANER-2015-ThongtanunamTKY #code review #overview #perspective #recommendation
Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review (PT, CT, RGK, NY, HI, KiM), pp. 141–150.
ICALPICALP-v2-2015-KariS #algebra #geometry
An Algebraic Geometric Approach to Nivat’s Conjecture (JK, MS), pp. 273–285.
ICALPICALP-v2-2015-Zetzsche
An Approach to Computing Downward Closures (GZ), pp. 440–451.
LATALATA-2015-Peltier #reasoning
Reasoning on Schemas of Formulas: An Automata-Based Approach (NP), pp. 263–274.
HaskellHaskell-2015-OliveiraMY #composition
Modular reifiable matching: a list-of-functors approach to two-level types (BCdSO, SCM, SHY), pp. 82–93.
AIIDEAIIDE-2015-LimH #behaviour #data-driven #modelling
A Data-Driven Approach for Computationally Modeling Players' Avatar Customization Behaviors (CUL, DFH), pp. 135–141.
AIIDEAIIDE-2015-SnodgrassO #2d #game studies #generative #video
A Hierarchical MdMC Approach to 2D Video Game Map Generation (SS, SO), pp. 205–211.
CHI-PLAYCHI-PLAY-2015-ChattaHSGQ #game studies
Get off the Couch: An Approach to Utilize Sedentary Commercial Games as Exergames (AC, TH, GS, RG, JQ), pp. 47–56.
CHI-PLAYCHI-PLAY-2015-WallnerPHW #game studies #modelling
Modeling Routinization in Games: An Information Theory Approach (SW, MP, MH, MW), pp. 727–732.
CoGCIG-2015-DannZT #learning
An improved approach to reinforcement learning in Computer Go (MD, FZ, JT), pp. 169–176.
CoGCIG-2015-QuiterioPM #geometry #learning
A reinforcement learning approach for the circle agent of geometry friends (JQ, RP, FSM), pp. 423–430.
CoGCIG-2015-YinLCOZ #adaptation #data-driven #game studies #online
A data-driven approach for online adaptation of game difficulty (HY, LL, WC, YSO, JZ), pp. 146–153.
FDGFDG-2015-AzadeganHS #collaboration #design #game studies
Design Approach for Collaborative Cognitive Games (AA, CH, SCS).
FDGFDG-2015-Lederle-EnsignR
A Software Studies Approach to Interpreting Passage (DLE, WR, JP, MM).
CoGVS-Games-2015-AsadipourDC #game studies #learning
A Game-Based Training Approach to Enhance Human Hand Motor Learning and Control Abilities (AA0, KD, AC), pp. 1–6.
CoGVS-Games-2015-WangC #gamification #performance
A Social-Centred Gamification Approach to Improve Household Water Use Efficiency (ZW, AC), pp. 1–4.
GaMGaM-2015-ValletKPM #modelling #network #social #visual notation
A Visual Analytics Approach to Compare Propagation Models in Social Networks (JV, HK, BP, GM), pp. 65–79.
CHICHI-2015-GannonGF #design #named
Tactum: A Skin-Centric Approach to Digital Design and Fabrication (MG, TG, GWF), pp. 1779–1788.
CHICHI-2015-GiaccardiK #experience #human-computer
Foundations of Materials Experience: An Approach for HCI (EG, EK), pp. 2447–2456.
CHICHI-2015-HillmanW #social #social media
Situated Social Media Use: A Methodological Approach to Locating Social Media Practices and Trajectories (TH, AW), pp. 4057–4060.
CHICHI-2015-KoemanKR #distributed #exclamation #quote #visualisation
“Everyone Is Talking about It!”: A Distributed Approach to Urban Voting Technology and Visualisations (LK, VK, YR), pp. 3127–3136.
CHICHI-2015-NoroozMJMF #learning #named #smarttech #visualisation
BodyVis: A New Approach to Body Learning Through Wearable Sensing and Visualization (LN, MLM, AJ, BM, JEF), pp. 1025–1034.
CHICHI-2015-OLearyEKVRP #comprehension #design #health #trade-off
Understanding Design Tradeoffs for Health Technologies: A Mixed-Methods Approach (KO, JE, LK, LMV, JDR, WP), pp. 4151–4160.
CHICHI-2015-PengZG #3d #design #modelling #named
D-Coil: A Hands-on Approach to Digital 3D Models Design (HP, AZ, FG), pp. 1807–1815.
CHICHI-2015-RamakersTL #design #named
PaperPulse: An Integrated Approach for Embedding Electronics in Paper Designs (RR, KT, KL), pp. 2457–2466.
CHICHI-2015-ZhaoDFZ #named
CoFaçade: A Customizable Assistive Approach for Elders and Their Helpers (JCZ, RCD, PSF, SZ), pp. 1583–1592.
HCIDHM-EH-2015-CheffiRBBS #cost analysis #feedback #optimisation
A Bi-level Optimization Approach to Get an Optimal Combination of Cost Functions for Pilot’s Arm Movement: The Case of Helicopter’s Flying Aid Functions with Haptic Feedback (SC, TR, LB, PB, JCS), pp. 248–257.
HCIDHM-EH-2015-HeftSBR #visualisation
An Approach for Intuitive Visualization of Ergonomic Issues (WH, MS, ACB, PR), pp. 26–36.
HCIDUXU-DD-2015-BarrosSRTBS #human-computer #interface #usability
A Usability Study of a Brain-Computer Interface Apparatus: An Ergonomic Approach (RQB, GS, CR, RT, MQB, MMS), pp. 224–236.
HCIDUXU-DD-2015-DiasVSVPSE #testing #usability
A Living Labs Approach for Usability Testing of Ambient Assisted Living Technologies (MSD, EV, FS, AV, FMP, NS, SE), pp. 167–178.
HCIDUXU-DD-2015-Lera #design #interactive #matter
Emotion-Centered-Design (ECD) New Approach for Designing Interactions that Matter (EdL), pp. 406–416.
HCIDUXU-IXD-2015-Gasparini #experience #interactive #library #user interface
A Holistic Approach to User Experience in the Context of an Academic Library Interactive System (AAG), pp. 173–184.
HCIDUXU-UI-2015-SoutoFS #comprehension #design #process #towards #women
The Creative Process in Digital Design: Towards an Understanding of Women’s Approach (VTS, PCLAF, FAdS), pp. 252–263.
HCIHCI-DE-2015-Bakke #process
An Activity Theory Approach to Intuitiveness: From Artefact to Process (SB), pp. 3–13.
HCIHCI-DE-2015-ChamunZMOS #design #documentation #what
What About Document Folding? User Impressions and a Design Approach (RC, AdCAZ, IHM, JBSdO, MSS), pp. 307–319.
HCIHCI-DE-2015-GhoshP #design #mobile
Designing of a Natural Voice Assistants for Mobile Through User Centered Design Approach (SG, JP), pp. 320–331.
HCIHCI-DE-2015-Uchida #security
A Psychological Approach to Information Security — Some Ideas for Establishing Information Security Psychology (KU), pp. 96–104.
HCIHCI-IT-2015-EskerudSOH #automation #design #interface
Controlling the Home — A User Participatory Approach to Designing a Simple Interface for a Complex Home Automation System (ME, AS, CSO, HH), pp. 717–728.
HCIHCI-UC-2015-AzhariF #experience #social #social media #user interface #using
Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
HCIHCI-UC-2015-HessBFHKMNRLT #ecosystem #mobile
Building Mobile Software Ecosystems — A Practical Approach (SH, SB, JF, MH, FK, DM, MN, DR, TL, MT), pp. 165–177.
HCIHCI-UC-2015-OhJK #human-computer #simulation #using
Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
HCIHIMI-IKC-2015-HasegawaD #framework #learning #platform #ubiquitous
A Ubiquitous Lecture Archive Learning Platform with Note-Centered Approach (SH, JD), pp. 294–303.
HCIHIMI-IKC-2015-LiangG #information management #ontology #safety #semantics #web
Improving Knowledge Management in Patient Safety Reporting: A Semantic Web Ontology Approach (CL, YG), pp. 118–128.
HCIHIMI-IKD-2015-0002S #visualisation
An Approach to Spatial Visualizing Method for Information Structure to Enhance Remember to Look (JGL, DHS), pp. 67–73.
HCIHIMI-IKD-2015-GonzalezCB #design #modelling #sentiment
Modeling User’s Sentiment in User Segmentations: An Argumentation Approach for User Centered Design (MPG, CIC, RFB), pp. 595–606.
HCIHIMI-IKD-2015-NoseLBK #network
Centralized Approach for a Unified Wireless Network Access (JDN, JL, CB, AK), pp. 547–559.
HCILCT-2015-Sirisaengtaksin #design #education #mobile #online #recommendation #research
A Notification and Recommender Mobile App for Educational Online Discussion: A Design Research Approach (KS, LO, NA), pp. 325–336.
CAiSECAiSE-2015-AbubahiaC #clustering
A Clustering Approach for Protecting GIS Vector Data (AA, MC), pp. 133–147.
CAiSECAiSE-2015-FukusumiMK #crowdsourcing #data transformation #game studies
Game Aspect: An Approach to Separation of Concerns in Crowdsourced Data Management (SF, AM, HK), pp. 3–19.
CAiSECAiSE-2015-KhouriSB #data transformation #lifecycle #traceability
Managing Data Warehouse Traceability: A Life-Cycle Driven Approach (SK, KS, LB), pp. 199–213.
CAiSECAiSE-2015-SunB #clustering #novel #top-down
A Novel Top-Down Approach for Clustering Traces (YS, BB), pp. 331–345.
CAiSECAiSE-2015-YeddulaDR #enterprise #migration #modelling
A Model-Driven Approach to Enterprise Data Migration (RRY, PD, SR), pp. 230–243.
ICEISICEIS-v1-2015-ArevaloRC #information management #legacy #modelling #process
Discovering Business Models for Software Process Management — An Approach for Integrating Time and Resource Perspectives from Legacy Information Systems (CA, IMR, MJEC), pp. 353–359.
ICEISICEIS-v1-2015-BorgesDRAS #generative #using
An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
ICEISICEIS-v1-2015-CarboneraA15a #information management #knowledge-based #representation
A Cognition-inspired Knowledge Representation Approach for Knowledge-based Interpretation Systems (JLC, MA), pp. 644–649.
ICEISICEIS-v1-2015-FerrandinENSA #classification
A Centroid-based Approach for Hierarchical Classification (MF, FE, JCN, EES, BCÁ), pp. 25–33.
ICEISICEIS-v1-2015-GharbiGB #configuration management #embedded #hybrid #realtime #scheduling #search-based
A Hybrid Genetic based Approach for Real-time Reconfigurable Scheduling of OS Tasks in Uniprocessor Embedded Systems (IG, HG, SB), pp. 385–390.
ICEISICEIS-v1-2015-JuniorS #compilation #optimisation #reasoning #set
Finding Good Compiler Optimization Sets — A Case-based Reasoning Approach (NLQJ, AFdS), pp. 504–515.
ICEISICEIS-v1-2015-MendoncaMSS #named #query
CORE — A Context-based Approach for Rewriting User Queries (AM, PM, DS, ACS), pp. 391–398.
ICEISICEIS-v1-2015-SabelnikovaCT #case study #outsourcing
Analysing Business-IT Alignment in the IT Outsourcing Context — A Case Study Approach (ES, CMC, JJMT), pp. 5–16.
ICEISICEIS-v1-2015-SilvaHL #hybrid #memory management
A Hybrid Memory Data Cube Approach for High Dimension Relations (RRS, CMH, JdCL), pp. 139–149.
ICEISICEIS-v2-2015-AizebojeP #pointer #using
An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
ICEISICEIS-v2-2015-BayaADM #composition #product line #scalability
Dynamic Large Scale Product Lines through Modularization Approach (AB, BEA, ID, ZM), pp. 439–444.
ICEISICEIS-v2-2015-Brant-RibeiroAM #interactive #modelling #petri net #using #web
A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
ICEISICEIS-v2-2015-DuarteOB #architecture
Smart Cities — An Architectural Approach (AD, CO, JB), pp. 563–573.
ICEISICEIS-v2-2015-EttaziHNE #adaptation #towards #transaction
Towards a Context-Aware Adaptation Approach for Transactional Services (WE, HH, MN, SE), pp. 553–562.
ICEISICEIS-v2-2015-JuniorP #identification #named #ontology #requirements
OnTheme/Doc — An Ontology-based Approach for Crosscutting Concern Identification from Software Requirements (PAPJ, RADP), pp. 188–200.
ICEISICEIS-v2-2015-KhlifKKD #architecture #multi #uml
A UML-based Approach for Multi-scale Software Architectures (IK, MHK, AHK, KD), pp. 374–381.
ICEISICEIS-v2-2015-LucenaAAAJ #modelling
Integrating User Stories and i* Models — A Systematic Approach (ML, CA, FMRA, EA, AJ), pp. 428–438.
ICEISICEIS-v2-2015-MeloFOS #diagrams #modelling #process #uml
A Model-driven Approach to Transform SysML Internal Block Diagrams to UML Activity Diagrams (MdSM, JMSF, EAOJ, MSS), pp. 92–101.
ICEISICEIS-v3-2015-GhezziCRB #agile #case study #comparative #design #mobile #performance
A Comparative Study on the Impact of Business Model Design & Lean Startup Approach versus Traditional Business Plan on Mobile Startups Performance (AG, AC, AR, RB), pp. 196–203.
ICEISICEIS-v3-2015-NicastroPAMBT #case study #guidelines #interface #mobile
A Semiotic-informed Approach to Interface Guidelines for Mobile Applications — A Case Study on Phenology Data Acquisition (FN, RP, BA, LPCM, CB, RdST), pp. 34–43.
ICEISICEIS-v3-2015-ProencaNBB #risk management
Digital Curation Costs — A Risk Management Approach Supported by the Business Model Canvas (DP, AN, RB, JLB), pp. 299–306.
ICEISICEIS-v3-2015-Wissotzki #identification #process
A Process Approach for Capability Identification and Management (MW), pp. 204–212.
CIKMCIKM-2015-AnwarMS #data-driven #fault #grid #physics #smarttech
A Data-Driven Approach to Distinguish Cyber-Attacks from Physical Faults in a Smart Grid (AA, ANM, ZS), pp. 1811–1814.
CIKMCIKM-2015-ChenZSW #eye tracking #modelling #query #realtime #topic
A Real-Time Eye Tracking Based Query Expansion Approach via Latent Topic Modeling (YC, PZ0, DS0, BW), pp. 1719–1722.
CIKMCIKM-2015-GribelBA #clustering #detection
A Clustering-based Approach to Detect Probable Outcomes of Lawsuits (DLG, MGdB, LGA), pp. 1831–1834.
CIKMCIKM-2015-HuangLY #clustering #data type #parallel #performance
A Parallel GPU-Based Approach to Clustering Very Fast Data Streams (PH, XL, BY0), pp. 23–32.
CIKMCIKM-2015-LagreeCV #social #social media
A Network-Aware Approach for Searching As-You-Type in Social Media (PL, BC, HV), pp. 563–572.
CIKMCIKM-2015-LinZWLL0C #data-driven #parametricity #pipes and filters #predict
Data Driven Water Pipe Failure Prediction: A Bayesian Nonparametric Approach (PL, BZ, YW0, ZL, BL0, YW0, FC0), pp. 193–202.
CIKMCIKM-2015-LiXJL #adaptation #dataset
Differentially Private Histogram Publication for Dynamic Datasets: an Adaptive Sampling Approach (HL, LX0, XJ, JL), pp. 1001–1010.
CIKMCIKM-2015-MaoLF #network #recognition #transaction
Fraud Transaction Recognition: A Money Flow Network Approach (RM, ZL, JF), pp. 1871–1874.
CIKMCIKM-2015-MunozTG #learning #ranking
A Soft Computing Approach for Learning to Aggregate Rankings (JAVM, RdST, MAG), pp. 83–92.
CIKMCIKM-2015-PerezSLK #recommendation
Category-Driven Approach for Local Related Business Recommendations (YP, MS, ML, SK), pp. 73–82.
CIKMCIKM-2015-RudraGGGG #classification #microblog
Extracting Situational Information from Microblogs during Disaster Events: a Classification-Summarization Approach (KR, SG, NG, PG, SG0), pp. 583–592.
CIKMCIKM-2015-WangSFYXL #effectiveness #multi
An Integrated Bayesian Approach for Effective Multi-Truth Discovery (XW0, QZS, XSF, LY, XX, XL0), pp. 493–502.
CIKMCIKM-2015-WangWWX #categorisation
An Inference Approach to Basic Level of Categorization (ZW, HW, JRW, YX), pp. 653–662.
CIKMCIKM-2015-YeZMJZ #consistency #learning #multi #privacy #rank
Rank Consistency based Multi-View Learning: A Privacy-Preserving Approach (HJY, DCZ, YM, YJ0, ZHZ), pp. 991–1000.
ECIRECIR-2015-AmigoGM #clustering #effectiveness #formal method #information management #metric #retrieval
A Formal Approach to Effectiveness Metrics for Information Access: Retrieval, Filtering, and Clustering (EA, JG, SM), pp. 817–821.
ECIRECIR-2015-JungL #predict
A Discriminative Approach to Predicting Assessor Accuracy (HJJ, ML), pp. 159–171.
ECIRECIR-2015-LiangCC #detection #social #social media
A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media (YL, JC, CC), pp. 233–244.
ECIRECIR-2015-SchindlerR #classification #music
An Audio-Visual Approach to Music Genre Classification through Affective Color Features (AS, AR), pp. 61–67.
ICMLICML-2015-JerniteRS #learning #markov #modelling #performance #random
A Fast Variational Approach for Learning Markov Random Field Language Models (YJ, AMR, DS), pp. 2209–2217.
ICMLICML-2015-PachecoS #pseudo
Proteins, Particles, and Pseudo-Max-Marginals: A Submodular Approach (JP, EBS), pp. 2200–2208.
ICMLICML-2015-Romera-ParedesT #learning
An embarrassingly simple approach to zero-shot learning (BRP, PHST), pp. 2152–2161.
ICMLICML-2015-SzorenyiBWH #multi
Qualitative Multi-Armed Bandits: A Quantile-Based Approach (BS, RBF, PW, EH), pp. 1660–1668.
ICMLICML-2015-TangS #composition
Guaranteed Tensor Decomposition: A Moment Approach (GT, PS), pp. 1491–1500.
ICMLICML-2015-YenLZRD #modelling #process
A Convex Exemplar-based Approach to MAD-Bayes Dirichlet Process Mixture Models (IEHY, XL, KZ, PKR, ISD), pp. 2418–2426.
ICMLICML-2015-ZhuE #hybrid #probability #random #using
A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
KDDKDD-2015-BarajasA #health #modelling
Dynamically Modeling Patient’s Health State from Electronic Medical Records: A Time Series Approach (KLCB, RA), pp. 69–78.
KDDKDD-2015-RenEWH #automation #corpus #mining #network #recognition #type system
Automatic Entity Recognition and Typing from Massive Text Corpora: A Phrase and Network Mining Approach (XR, AEK, CW, JH), pp. 2319–2320.
KDDKDD-2015-SunWH #named #predict #risk management
LINKAGE: An Approach for Comprehensive Risk Prediction for Care Management (ZS, FW, JH), pp. 1145–1154.
KDDKDD-2015-WangLSH #composition #interactive #recursion #topic #towards
Towards Interactive Construction of Topical Hierarchy: A Recursive Tensor Decomposition Approach (CW, XL, YS, JH), pp. 1225–1234.
KDDKDD-2015-ZhouM #kernel #predict
Predicting Ambulance Demand: a Spatio-Temporal Kernel Approach (ZZ, DSM), pp. 2297–2303.
MLDMMLDM-2015-CoralloFMACCGS #analysis #sentiment
Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
MLDMMLDM-2015-GovadaJMS #hybrid #induction #learning #using
Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
MLDMMLDM-2015-KrasotkinaM #optimisation #ranking
A Bayesian Approach to Sparse Learning-to-Rank for Search Engine Optimization (OK, VM), pp. 382–394.
MLDMMLDM-2015-KrasotkinaM15a #analysis
A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
RecSysRecSys-2015-GuoD #bias #category theory
Uncovering Systematic Bias in Ratings across Categories: a Bayesian Approach (FG, DBD), pp. 317–320.
SEKESEKE-2015-AdamEA #design
An approach for classifying design artifacts (SA, GEB, AA), pp. 164–167.
SEKESEKE-2015-GomedeSB #delivery #lifecycle
A Practical Approach to Software Continuous Delivery Focused on Application Lifecycle Management (EG, RTDS, RMdB), pp. 320–325.
SEKESEKE-2015-MagalhaesAM #framework #independence #model transformation #on the #platform #specification
On the Specification of Model Transformations through a Platform Independent Approach (APM, AMSA, RSPM), pp. 558–561.
SEKESEKE-2015-Murillo-MoreraJ #algorithm #framework #learning #predict #search-based #using
A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
SEKESEKE-2015-NoureddineJHKM #correlation #named #profiling #research
CARP: Correlation Based Approach for Researcher Profiling (HN, IJ, HH, OAK, EM), pp. 461–464.
SEKESEKE-2015-SaharAA #case study #detection #image #modelling #prototype
A Case Study Approach: Iterative Prototyping Model Based Detection of Macular Edema in Retinal OCT Images (SS, SA, MUA), pp. 266–271.
SEKESEKE-2015-SampaioMLM #adaptation #learning #research
Reflecting, adapting and learning in small software organizations: an action research approach (SS, MM, AL, HPM), pp. 46–50.
SEKESEKE-2015-TironiMRM #identification #learning
An approach to identify relevant subjects for supporting the Learning Scheme creation task (HT, ALAM, SSR, AM), pp. 506–511.
SEKESEKE-2015-WangG #hybrid #novel #predict
A Novel Hybrid Approach for Diarrhea Prediction (YW, JG), pp. 168–173.
SIGIRSIGIR-2015-CanutoGSRM #classification #documentation #parallel #performance #scalability
An Efficient and Scalable MetaFeature-based Document Classification Approach based on Massively Parallel Computing (SDC, MAG, WS, TR, WM), pp. 333–342.
ECMFAECMFA-J-2012-BaresiBKMMPRR15 #embedded #uml #validation #verification
Formal verification and validation of embedded systems: the UML-based MADES approach (LB, GB, DSK, NDM, AM, RFP, AR, MR), pp. 343–363.
AMTAMT-2015-RabbiLYK #diagrams
A Diagrammatic Approach to Model Completion (FR, YL, IY, LK), pp. 56–65.
BXBX-2015-AnjorinLKSS #graph grammar #guidelines
A Systematic Approach and Guidelines to Developing a Triple Graph Grammar (AA, EL, RK, AS, PS), pp. 81–95.
BXBX-2015-HidakaBTM #analysis #bidirectional #graph transformation
Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
ECMFAECMFA-2015-BousseMCB #generative #metamodelling
A Generative Approach to Define Rich Domain-Specific Trace Metamodels (EB, TM, BC, BB), pp. 45–61.
ECMFAECMFA-2015-JahanbanifarKT #integration #modelling
A Model-Based Approach for the Integration of Configuration Fragments (AJ, FK, MT), pp. 125–136.
MoDELSMoDELS-2015-AtkinsonGK15a #modelling #multi
A unifying approach to connections for multi-level modeling (CA, RG, TK), pp. 216–225.
MoDELSMoDELS-2015-HajriGBS #case study #embedded #industrial #lessons learnt #modelling #product line
Applying product line Use case modeling in an industrial automotive embedded system: Lessons learned and a refined approach (IH, AG, LCB, TS), pp. 338–347.
MoDELSMoDELS-2015-IftikharIKM #automation #framework #game studies #modelling #platform #testing
An automated model based testing approach for platform games (SI, MZI, MUK, WM), pp. 426–435.
MoDELSMoDELS-2015-Rodriguez-Echeverria #analysis #evolution #model transformation #statistics
A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
PLEASEPLEASE-2015-TzeremesG #development #product line
A Software Product Line Approach for End User Development of Smart Spaces (VT, HG), pp. 23–26.
SPLCSPLC-2015-0002Z #agile
Lean variation management: increasing business value with a diversified approach (MB, BZ), p. 385.
SPLCSPLC-2015-MartinezZBKT #bottom-up #product line
Bottom-up adoption of software product lines: a generic and extensible approach (JM, TZ, TFB, JK, YLT), pp. 101–110.
SPLCSPLC-2015-Munoz-Fernandez #adaptation #named #requirements #self #simulation
REFAS: a PLE approach for simulation of self-adaptive systems requirements (JCMF, GT, IR, RM, CS), pp. 121–125.
OOPSLAOOPSLA-2015-CrafaP #programming
The chemical approach to typestate-oriented programming (SC, LP), pp. 917–934.
OOPSLAOOPSLA-2015-HagueLO #css #detection #html
Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach (MH, AWL, CHLO), pp. 1–19.
LOPSTRLOPSTR-2015-FuK
A Type-Theoretic Approach to Resolution (PF0, EK), pp. 91–106.
PLDIPLDI-2015-EmaniO #runtime
Celebrating diversity: a mixture of experts approach for runtime mapping in dynamic environments (MKE, MFPO), pp. 499–508.
REFSQREFSQ-2015-GhaziSG #named #requirements #visualisation
FlexiView: A Magnet-Based Approach for Visualizing Requirements Artifacts (PG, NS, MG), pp. 262–269.
ASEASE-2015-GuzmanEB #classification #evolution #overview
Ensemble Methods for App Review Classification: An Approach for Software Evolution (N) (EG, MEH, BB), pp. 771–776.
ASEASE-2015-NguyenNN #divide and conquer #migration #multi #source code #statistics
Divide-and-Conquer Approach for Multi-phase Statistical Migration for Source Code (T) (ATN, TTN, TNN), pp. 585–596.
ASEASE-2015-VierhauserRGE #case study #experience #lessons learnt #monitoring
Developing a DSL-Based Approach for Event-Based Monitoring of Systems of Systems: Experiences and Lessons Learned (E) (MV, RR, PG, AE), pp. 715–725.
ASEASE-2015-VuNPN #keyword #mining #mobile
Mining User Opinions in Mobile App Reviews: A Keyword-Based Approach (T) (PMV, TTN, HVP, TTN), pp. 749–759.
ESEC-FSEESEC-FSE-2015-MangalZNN #program analysis
A user-guided approach to program analysis (RM, XZ, AVN, MN), pp. 462–473.
ESEC-FSEESEC-FSE-2015-MorenoCGS #adaptation #model checking #nondeterminism #probability #self
Proactive self-adaptation under uncertainty: a probabilistic model checking approach (GAM, JC, DG, BRS), pp. 1–12.
ESEC-FSEESEC-FSE-2015-VasquezBBOPP #android #energy #multi #optimisation #user interface
Optimizing energy consumption of GUIs in Android apps: a multi-objective approach (MLV, GB, CEBC, RO, MDP, DP), pp. 143–154.
GTTSEGTTSE-2015-PontesMOP #algebra #implementation #linear
Implementing a Linear Algebra Approach to Data Processing (RP, MM, JNO, JOP), pp. 215–222.
ICSEICSE-v1-2015-JoblinMASR #community #developer #fine-grained #network
From Developer Networks to Verified Communities: A Fine-Grained Approach (MJ, WM, SA, JS, DR), pp. 563–573.
ICSEICSE-v1-2015-SahaZKP #information retrieval #testing
An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes (RKS, LZ, SK, DEP), pp. 268–279.
ICSEICSE-v1-2015-WhalenPRSG #flexibility #metric
A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics (MWW, SP, NR, MS, DG), pp. 506–516.
ICSEICSE-v1-2015-YuBC #fault #multi #testing
Does the Failing Test Execute a Single or Multiple Faults? An Approach to Classifying Failing Tests (ZY, CB, KYC), pp. 924–935.
ICSEICSE-v2-2015-Baia #multi #project management #simulation
An Integrated Multi-Agent-Based Simulation Approach to Support Software Project Management (DdMB), pp. 911–914.
ICSEICSE-v2-2015-Caracciolo #architecture #automation #constraints #testing
A Unified Approach to Automatic Testing of Architectural Constraints (AC), pp. 871–874.
ICSEICSE-v2-2015-Hecht #android #detection
An Approach to Detect Android Antipatterns (GH), pp. 766–768.
SACSAC-2015-0001RMW #behaviour #constraints #process
Matching of events and activities: an approach based on behavioral constraint satisfaction (TB, ARS, JM, MW), pp. 1225–1230.
SACSAC-2015-AliK #effectiveness #recommendation
An effective approach to group recommendation based on belief propagation (IA, SWK), pp. 1148–1153.
SACSAC-2015-AwadBESAS #anti #detection #process #runtime
Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
SACSAC-2015-BadouelHKM #collaboration #distributed
A grammatical approach to data-centric case management in a distributed collaborative environment (EB, LH, GEK, CM), pp. 1834–1839.
SACSAC-2015-BarnPB #evaluation #privacy #requirements
An approach to early evaluation of informational privacy requirements (BSB, GP, RB), pp. 1370–1375.
SACSAC-2015-BekkoucheCR #constraints #fault #locality #named
LocFaults: a new flow-driven and constraint-based error localization approach (MB, HC, MR), pp. 1773–1780.
SACSAC-2015-BorgesDSEAS #performance #reasoning #reuse #using
Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
SACSAC-2015-BurityE #recommendation
A quantitative, evidence-based approach for recommending software modules (TB, GEdS), pp. 1449–1456.
SACSAC-2015-DAddioM #collaboration #sentiment
A sentiment-based item description approach for kNN collaborative filtering (RMD, MGM), pp. 1060–1065.
SACSAC-2015-FauconnierKR #machine learning #recognition #taxonomy
A supervised machine learning approach for taxonomic relation recognition through non-linear enumerative structures (JPF, MK, BR), pp. 423–425.
SACSAC-2015-GassaraRJ #architecture #deployment #modelling #multi
A multi-scale modeling approach for software architecture deployment (AG, IBR, MJ), pp. 1405–1410.
SACSAC-2015-JoCKBO #algorithm #collaboration #cpu #data-driven #on the
On running data-intensive algorithms with intelligent SSD and host CPU: a collaborative approach (YYJ, SC, SWK, DHB, HO), pp. 2060–2065.
SACSAC-2015-JuniorRSM #deployment #multi #non-functional #requirements
A multi-criteria approach for assessing cloud deployment options based on non-functional requirements (RGJ, TR, AS, NCM), pp. 1383–1389.
SACSAC-2015-JuniorSM #semantics
An approach for building lexical-semantic resources based on heterogeneous information sources (JGdAJ, US, LBM), pp. 402–408.
SACSAC-2015-Khenfri #architecture #optimisation #synthesis
A holistic optimization approach for the synthesis of AUTOSAR E/E architecture (FK), pp. 1960–1961.
SACSAC-2015-KhlifKKD #architecture #modelling #multi #towards
Towards a multi-scale modeling approach for software architectures (IK, MHK, AHK, KD), pp. 1468–1470.
SACSAC-2015-LabibPCG #development #learning #product line #reuse
Enforcing reuse and customization in the development of learning objects: a product line approach (AEL, MCP, JHC, AG), pp. 261–263.
SACSAC-2015-MeftehBB #case study #diagrams #evaluation #feature model #implementation #modelling #uml
Implementation and evaluation of an approach for extracting feature models from documented UML use case diagrams (MM, NB, HBA), pp. 1602–1609.
SACSAC-2015-MongioviGFPT #analysis #data flow #detection #hybrid #java
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SACSAC-2015-NascimentoBJ #geometry #recognition
A new approach to biometric recognition based on hand geometry (MVPdN, LVB, NLCJ), pp. 59–65.
SACSAC-2015-PedrosaT #encoding #visual notation #word
Compact and discriminative approach for encoding spatial-relationship of visual words (GVP, AJMT), pp. 92–95.
SACSAC-2015-PerkusichMSGAP #metric #network
A Bayesian network approach to assist on the interpretation of software metrics (MP, AM, LCeS, KCG, HOdA, AP), pp. 1498–1503.
SACSAC-2015-ReddySC #aspect-oriented #incremental #learning #performance #weaving
Incremental aspect weaving: an approach for faster AOP learning (YRR, AS, MC), pp. 1480–1485.
SACSAC-2015-RegoMP #detection #folksonomy #learning
A supervised learning approach to detect subsumption relations between tags in folksonomies (ASdCR, LBM, CESP), pp. 409–415.
SACSAC-2015-RodriguesAFSB #ontology #simulation
An ontological approach for simulating legal action in the Brazilian penal code (CMdOR, RRdA, FLGdF, EPdS, PVdSB), pp. 376–381.
SACSAC-2015-RodriguesBM #behaviour #clustering #correlation #energy #using
Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SACSAC-2015-SantiagoPH #detection #modelling
A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
SACSAC-2015-ShahriarH #assessment #metric #risk management #security #web
Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
SACSAC-2015-SilvaMR #algorithm #problem #using
An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
SACSAC-2015-Soares0W #modelling #named #recognition #requirements #speech
VoiceToModel: an approach to generate requirements models from speech recognition mechanisms (FS, JA, FW), pp. 1350–1357.
SACSAC-2015-VielMT #multi
An approach for controlling synchronous remote instances of a multimedia presentation (CCV, ELM, CACT), pp. 1285–1290.
GPCEGPCE-2015-KabacC #development
Orchestrating masses of sensors: a design-driven development Approach (MK, CC), pp. 117–120.
ASPLOSASPLOS-2015-MishraZLH #constraints #energy #modelling #performance #probability #visual notation
A Probabilistic Graphical Model-based Approach for Minimizing Energy Under Performance Constraints (NM, HZ, JDL, HH), pp. 267–281.
CASECASE-2015-AlfonsoXA #capacity #programming #representation #scheduling
A simulation-optimization approach for capacity planning and appointment scheduling of blood donors based on mathematical programming representation of event dynamics (EA, XX, VA), pp. 728–733.
CASECASE-2015-CarmenateRLBM #analysis #behaviour #energy #modelling #using
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-ChuFRSKT #automation #hardware #integration
A LC-MS integration approach in life science automation: Hardware integration and software integration (XC, HF, TR, NS, MK, KT), pp. 979–984.
CASECASE-2015-DiganiHSS #coordination #multi #polynomial #programming
A Quadratic Programming approach for coordinating multi-AGV systems (VD, MAH, LS, CS), pp. 600–605.
CASECASE-2015-FerrerALVLH #assembly #automation #process
An approach for knowledge-driven product, process and resource mappings for assembly automation (BRF, BA, AL, DAV, JLML, RH), pp. 1104–1109.
CASECASE-2015-KouiderHOO #graph #integer #linear #scheduling #source code
Mixed integer linear programs and tabu search approach to solve mixed graph coloring for unit-time job shop scheduling (AK, HAH, SO, AO), pp. 1177–1181.
CASECASE-2015-LiDLZ #composition #problem
A decomposition approach to colored traveling salesman problems (JL, XD, HL, MZ), pp. 51–56.
CASECASE-2015-LuSJSX #multi #nondeterminism #programming
A chance constrained programming approach for multi-product multi-stage integrated production planning under internal and external uncertainties (SL, HS, CJ, HS, LX), pp. 880–885.
CASECASE-2015-MaP #black box #programmable #testing
Design-to-test approach for black-box testing of programmable controllers (CM, JP), pp. 1018–1024.
CASECASE-2015-SathishRB #detection #industrial #simulation
A simulation based approach to detect wear in industrial robots (VS, SR, SB), pp. 1570–1575.
CASECASE-2015-SemeniutaF #data flow #formal method #industrial #specification
Discrete event dataflow as a formal approach to specification of industrial vision systems (OS, PF), pp. 849–854.
CASECASE-2015-SenfeldsVMB #industrial
Power smoothing approach within industrial DC microgrid with supercapacitor storage for robotic manufacturing application (AS, MV, DM, OB), pp. 1333–1338.
CASECASE-2015-SustoM #machine learning #multi #predict
Slow release drug dissolution profile prediction in pharmaceutical manufacturing: A multivariate and machine learning approach (GAS, SFM), pp. 1218–1223.
CASECASE-2015-XieZLSD #agile #analysis #multi #process
Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
CGOCGO-2015-ZhengLHWJ #debugging #manycore #on the #performance
On performance debugging of unnecessary lock contentions on multicore processors: a replay-based approach (LZ, XL, BH, SW, HJ), pp. 56–67.
DACDAC-2015-ChaariENTK #modelling #safety
A model-based and simulation-assisted FMEDA approach for safety-relevant E/E systems (MC, WE, CN, BAT, TK), p. 6.
DACDAC-2015-HanF #analysis #cpu #gpu #graph #scalability
Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
DACDAC-2015-KadjoAKG #cpu #energy #gpu #mobile #performance #platform
A control-theoretic approach for energy efficient CPU-GPU subsystem in mobile platforms (DK, RA, MK, PVG), p. 6.
DACDAC-2015-SripadaP #graph
A timing graph based approach to mode merging (SS, MP), p. 6.
DACDAC-2015-ZhanOGZ0 #named #network #power management #towards
DimNoC: a dim silicon approach towards power-efficient on-chip network (JZ, JO, FG, JZ, YX), p. 6.
DATEDATE-2015-0001CY #optimisation #process #robust
A robust approach for process variation aware mask optimization (JK, WKC, EFYY), pp. 1591–1594.
DATEDATE-2015-BiewerAGSH #coordination #realtime #synthesis
A symbolic system synthesis approach for hard real-time systems based on coordinated SMT-solving (AB, BA, JG, TS, CH), pp. 357–362.
DATEDATE-2015-Bogdan #challenge #cyber-physical #manycore #personalisation #platform
A cyber-physical systems approach to personalized medicine: challenges and opportunities for noc-based multicore platforms (PB), pp. 253–258.
DATEDATE-2015-HoqueMS #analysis #maintenance #model checking #probability #reliability #towards
Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
DATEDATE-2015-LiuLY #effectiveness
An effective triple patterning aware grid-based detailed routing approach (ZL, CL, EFYY), pp. 1641–1646.
DATEDATE-2015-ReehmanCCS #architecture #hardware #memory management #parallel
In-place memory mapping approach for optimized parallel hardware interleaver architectures (SUR, CC, PC, AS), pp. 896–899.
DATEDATE-2015-RuizMK #reuse
Systematic application of ISO 26262 on a SEooC: Support by applying a systematic reuse approach (AR, AM, TK), pp. 393–396.
DATEDATE-2015-TrinadhBSPK #named #programming #testing
DP-fill: a dynamic programming approach to X-filling for minimizing peak test power in scan tests (ST, CSB, SGS, SP, VK), pp. 836–841.
HPCAHPCA-2015-MeswaniBRSIL #architecture #memory management
Heterogeneous memory architectures: A HW/SW approach for mixing die-stacked and off-package memories (MRM, SB, DR, JS, MI, GHL), pp. 126–136.
HPCAHPCA-2015-WangM #architecture #manycore #named #resource management #scalability
XChange: A market-based approach to scalable dynamic multi-resource allocation in multicore architectures (XW, JFM), pp. 113–125.
HPDCHPDC-2015-KaxirasKNRS #distributed #execution #memory management #scalability
Turning Centralized Coherence and Distributed Critical-Section Execution on their Head: A New Approach for Scalable Distributed Shared Memory (SK, DK, MN, AR, KFS), pp. 3–14.
PDPPDP-2015-VallsSRG #energy
The Tag Filter Cache: An Energy-Efficient Approach (JJV, JS, AR, MEG), pp. 182–189.
PPoPPPPoPP-2015-HarshvardhanAR #algorithm #communication #graph #parallel
A hierarchical approach to reducing communication in parallel graph algorithms (H, NMA, LR), pp. 285–286.
ESOPESOP-2015-TerauchiU #refinement
Relaxed Stratification: A New Approach to Practical Complete Predicate Refinement (TT, HU), pp. 610–633.
FASEFASE-2015-StruberRCT #model transformation #performance #reuse #variability
A Variability-Based Approach to Reusable and Efficient Model Transformations (DS, JR, MC, GT), pp. 283–298.
CAVCAV-2015-DietschHLP #ltl #model checking #modulo theories
Fairness Modulo Theory: A New Approach to LTL Software Model Checking (DD, MH, VL, AP), pp. 49–66.
CAVCAV-2015-ReinkingP #program repair
A Type-Directed Approach to Program Repair (AR, RP), pp. 511–517.
CSLCSL-2015-Kaiser0LL #bound
A Unified Approach to Boundedness Properties in MSO (LK, ML, SL, CL), pp. 441–456.
ICLPICLP-2015-AlrajehG #comprehension
A Logic-Based Approach to Understanding Lone-Actor Terrorism (DA, PG), pp. 166–178.
ICLPICLP-2015-AngelopoulosG #biology #database #logic
A Logical Approach to Working with Biological Databases (NA, GG), pp. 235–246.
ICLPICLP-J-2015-BlackmoreRE #compilation #effectiveness #embedded #logic programming #predict
A logic programming approach to predict effective compiler settings for embedded software (CB, OR, KE), pp. 481–494.
ICSTICST-2015-CastillosWW
Show Me New Counterexamples: A Path-Based Approach (KCC, HW, VW), pp. 1–10.
ICSTICST-2015-ErmanTBRA #automation #clustering #development #information management #multi #navigation #testing
Navigating Information Overload Caused by Automated Testing — a Clustering Approach in Multi-Branch Development (NE, VT, MB, PR, AA), pp. 1–9.
ICSTICST-2015-XuLCK #bound #detection #lightweight #thread
A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops (JX, YL, RHC, DCK), pp. 1–10.
ICTSSICTSS-2015-AbreuAHW #spreadsheet #testing
Testing for Distinguishing Repair Candidates in Spreadsheets - the Mussco Approach (RA, SA, BH, FW), pp. 124–140.
ICTSSICTSS-2015-LahamiKBJ #adaptation #behaviour #generative #testing
Selective Test Generation Approach for Testing Dynamic Behavioral Adaptations (ML, MK, HB, MJ), pp. 224–239.
ISSTAISSTA-2015-WangGMC #android #clone detection #detection #named #scalability
WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
LICSLICS-2015-LicataB
A Cubical Approach to Synthetic Homotopy Theory (DRL, GB), pp. 92–103.
LICSLICS-2015-MoninN
A Unifying Approach to the Gamma Question (BM, AN), pp. 585–596.
ICSTSAT-2015-Zielke0
A New Approach to Partial MUS Enumeration (CZ, MK), pp. 387–404.
CBSECBSE-2014-DidierM #component #detection
A new approach to detect potential race conditions in component-based systems (JYD, MM), pp. 97–106.
QoSAQoSA-2014-RaatikainenSM #architecture #case study #evaluation #experience #lightweight #maturity
Architecture management and evaluation in mature products: experiences from a lightweight approach (MR, JS, TM), pp. 73–82.
WICSAWICSA-2014-DragomirLB #architecture
Systematic Architectural Decision Management, A Process-Based Approach (AD, HL, TB), pp. 255–258.
WICSAWICSA-2014-ZernadjiTC #evolution #quality #requirements #web #web service
Processing the Evolution of Quality Requirements of Web Service Orchestrations: A Pattern-Based Approach (TZ, CT, CF), pp. 139–142.
DocEngDocEng-2014-NourashrafeddinMA #clustering #concept #documentation #using #wiki
An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
DRRDRR-2014-HajiABSP #documentation #keyword
Two-stage approach to keyword spotting in handwritten documents (MMH, MRA, TDB, CYS, DP), p. ?–12.
HTHT-2014-KotoulasLSSTA #coordination #linked data #open data
A linked data approach to care coordination (SK, VL, MLS, MS, PT, PMA), pp. 77–87.
HTHT-2014-KumarHL #behaviour #identification #twitter
A behavior analytics approach to identifying tweets from crisis regions (SK, XH, HL), pp. 255–260.
JCDLJCDL-2014-BatjargalKKM14a #documentation
An approach to named entity extraction from historical documents in traditional mongolian script (BB, GK, FK, AM), pp. 489–490.
JCDLJCDL-2014-ChakrabortyKGGM #learning #predict #towards
Towards a stratified learning approach to predict future citation counts (TC, SK, PG, NG, AM), pp. 351–360.
JCDLJCDL-2014-DibieMS #behaviour #comprehension #education #online #predict #using
A computational approach to understanding and predicting the behavior of educators using an online curriculum planning tool (OD, KEM, TS), pp. 487–488.
JCDLJCDL-2014-LiuYGSG #mining #network #recommendation
Full-text based context-rich heterogeneous network mining approach for citation recommendation (XL, YY, CG, YS, LG), pp. 361–370.
SIGMODSIGMOD-2014-LongWZX
Hypersphere dominance: an optimal approach (CL, RCWW, BZ, MX), pp. 111–122.
SIGMODSIGMOD-2014-RoyS #database #formal method #query
A formal approach to finding explanations for database queries (SR, DS), pp. 1579–1590.
SIGMODSIGMOD-2014-TranNST #clustering #named
JECB: a join-extension, code-based approach to OLTP data partitioning (KQT, JFN, BS, DT), pp. 39–50.
SIGMODSIGMOD-2014-XiongHN #distributed #network #performance #query
A software-defined networking based approach for performance management of analytical queries on distributed data stores (PX, HH, JFN), pp. 955–966.
SIGMODSIGMOD-2014-ZhuLWX #graph #order #query #reachability #scalability
Reachability queries on large dynamic graphs: a total order approach (ADZ, WL, SW, XX), pp. 1323–1334.
SIGMODSIGMOD-2014-ZouHWYHZ #data-driven #graph #natural language #rdf
Natural language question answering over RDF: a graph data driven approach (LZ, RH, HW, JXY, WH, DZ), pp. 313–324.
VLDBVLDB-2014-AltowimKM #relational
Progressive Approach to Relational Entity Resolution (YA, DVK, SM), pp. 999–1010.
VLDBVLDB-2014-ArenasDFKS #graph
A Principled Approach to Bridging the Gap between Graph Data and their Schemas (MA, GID, AF, AK, KS), pp. 601–612.
VLDBVLDB-2014-DuttNH #named #query #robust
QUEST: An Exploratory Approach to Robust Query Processing (AD, SN, JRH), pp. 1585–1588.
VLDBVLDB-2014-WeiYLJ #independence #permutation #query #reachability
Reachability Querying: An Independent Permutation Labeling Approach (HW, JXY, CL, RJ), pp. 1191–1202.
VLDBVLDB-2015-LiLGSZDFH14
A Confidence-Aware Approach for Truth Discovery on Long-Tail Data (QL, YL, JG, LS, BZ, MD, WF, JH), pp. 425–436.
EDMEDM-2014-AtapattuFF
Acquisition of Triples of Knowledge from Lecture Notes: A Natural Langauge Processing Approach (TA, KF, NJGF), pp. 193–196.
EDMEDM-2014-EagleB #data-driven #difference #problem
Exploring Differences in Problem Solving with Data-Driven Approach Maps (ME, TB), pp. 76–83.
EDMEDM-2014-LeeLP #behaviour #data-driven #education #game studies #learning
Learning Individual Behavior in an Educational Game: A Data-Driven Approach (SJL, YEL, ZP), pp. 114–121.
EDMEDM-2014-SegalKGSS #collaboration #named #personalisation
EduRank: A Collaborative Filtering Approach to Personalization in E-learning (AS, ZK, KG, GS, BS), pp. 68–75.
ITiCSEITiCSE-2014-Dorge
A methodological approach to key competencies in informatics (CD), pp. 201–206.
SIGITESIGITE-2014-Trabelsi #comprehension #education #network #security #using
Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach (ZT), pp. 39–44.
SANERCSMR-WCRE-2014-AlawnehHML #communication #effectiveness
A contextual approach for effective recovery of inter-process communication patterns from HPC traces (LA, AHL, SSM, YL), pp. 274–282.
SANERCSMR-WCRE-2014-VidacsBTSG #detection #fault #locality #reduction #testing
Test suite reduction for fault detection and localization: A combined approach (LV, ÁB, DT, IS, TG), pp. 204–213.
ICPCICPC-2014-PerezA #comprehension
A diagnosis-based approach to software comprehension (AP, RA), pp. 37–47.
ICPCICPC-2014-SuzukiSIH #modelling #n-gram #using
An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICSMEICSME-2014-AlomariCM #estimation #maintenance
A Slice-Based Estimation Approach for Maintenance Effort (HWA, MLC, JIM), pp. 81–90.
ICSMEICSME-2014-BauerVJ #detection #novel
A Novel Approach to Detect Unintentional Re-implementations (VB, TV, EJ), pp. 491–495.
ICSMEICSME-2014-BhattacharyaNF #developer #graph
Determining Developers’ Expertise and Role: A Graph Hierarchy-Based Approach (PB, IN, MF), pp. 11–20.
ICSMEICSME-2014-KevicFS #named #navigation
CoMoGen: An Approach to Locate Relevant Task Context by Combining Search and Navigation (KK, TF, DCS), pp. 61–70.
ICSMEICSME-2014-KhanIA #behaviour #heuristic #state machine #uml
A Heuristic-Based Approach to Refactor Crosscutting Behaviors in UML State Machines (MUK, MZI, SA), pp. 557–560.
ICALPICALP-v1-2014-GolovnevKM #problem #product line
Families with Infants: A General Approach to Solve Hard Partition Problems (AG, ASK, IM), pp. 551–562.
HOFMHOFM-2014-LadenbergerDL #csp #modelling #visualisation
An Approach for Creating Domain Specific Visualisations of CSP Models (LL, ID, ML), pp. 20–35.
LISPILC-2014-Nunes-Harwitt14a #code generation #evaluation #semantics
Eager Evaluation Isn’t Eager Enough A Transformation Based Approach to Semantics-Directed Code Generation (ANH), p. 79.
AIIDEAIIDE-2014-RoweML #composition #experience #interactive #learning #optimisation
Optimizing Player Experience in Interactive Narrative Planning: A Modular Reinforcement Learning Approach (JPR, BWM, JCL).
AIIDEAIIDE-2014-ShakerA #combinator #game studies #generative
Alone We Can Do So Little, Together We Can Do So Much: A Combinatorial Approach for Generating Game Content (NS, MAZ).
AIIDEAIIDE-2014-SnodgrassO #generative #markov #using
A Hierarchical Approach to Generating Maps Using Markov Chains (SS, SO).
CoGCIG-2014-FerreiraT #generative #search-based
A search-based approach for generating Angry Birds levels (LF, CFMT), pp. 1–8.
CoGCIG-2014-LimH #automation #evaluation #game studies #generative #using
An approach to general videogame evaluation and automatic generation using a description language (CUL, DFH), pp. 1–8.
CoGCIG-2014-MahmoudLWA #game studies #visual notation
Believable NPCs in serious games: HTN planning approach based on visual perception (IMM, LL, DW, MZA), pp. 1–8.
CoGCIG-2014-TremblayTV #algorithm #game studies
An algorithmic approach to analyzing combat and stealth games (JT, PAT, CV), pp. 1–8.
DiGRADiGRA-2014-HoogenBI #behaviour #game studies
Pressure at Play: Measuring Player Approach and Avoidance Behaviour through the Keyboard (WvdH, EB, WAI).
FDGFDG-2014-ChauvinLDN #game studies
An out-of-character approach to emergent game narratives (SC, GL, JYD, SN).
FDGFDG-2014-WinnOKM #education
Sparks of Eternity: A new approach to religious education (BMW, CO, GK, RM).
CHICHI-2014-DunwellFPHALS #game studies #learning #safety
A game-based learning approach to road safety: the code of everand (ID, SdF, PP, MH, SA, PL, CDS), pp. 3389–3398.
CHICHI-2014-HashishBY #collaboration
Involving children in content control: a collaborative and education-oriented content filtering approach (YH, AB, JEY), pp. 1797–1806.
CHICHI-2014-LaureyssensCCMCM #component #composition #game studies #named #network
ZWERM: a modular component network approach for an urban participation game (TL, TC, LC, PM, JC, AVM), pp. 3259–3268.
CHICHI-2014-LeeLKKHC
An EEG-based approach for evaluating audio notifications under ambient sounds (YCL, WCL, JTK, LWK, YTH, FYC), pp. 3817–3826.
CHICHI-2014-SunH #relational
Binding the material and the discursive with a relational approach of affordances (HS, WHD), pp. 3533–3542.
CSCWCSCW-2014-XiaLSLDG #mobile #replication
A partial replication approach for anywhere anytime mobile commenting (HX, TL, BS, GL, XD, NG), pp. 530–541.
HCIDHM-2014-GaoH #fault #nondeterminism #research
Research on the Continuous Descent Approach (CDA) Operational Error of Pilot Base on Cloud Model and Uncertainty Theory (YG, YH), pp. 91–100.
HCIDUXU-DI-2014-Bockermann #big data #data analysis #programming #visual notation
A Visual Programming Approach to Big Data Analytics (CB), pp. 393–404.
HCIDUXU-DI-2014-CastroRG #design
Information Design — Qualitative Approach for Corporative App in iPad (JAGFdC, MVR, JYLG), pp. 203–212.
HCIDUXU-DI-2014-WojdziakG #3d #design #interface #modelling
Beyond Perspective — A Model-Based Approach for Camera-Based 3D-Interface Design (JW, RG), pp. 488–498.
HCIDUXU-DP-2014-GokturkS #development #interface
A Perception Oriented Approach for Usable and Secure Interface Development (MG, IS), pp. 23–31.
HCIDUXU-TMT-2014-GoodeLSGB #research
A Mixed-Method Approach for In-Depth Contextual User Research (AWG, CL, AS, RG, VB), pp. 86–95.
HCIHCI-AIMT-2014-LiapisKKX #experience #human-computer
Evaluating User’s Emotional Experience in HCI: The PhysiOBS Approach (AL, NK, CK, MNX), pp. 758–767.
HCIHCI-AS-2014-SjolinderEBFHSNB #development #multi
A Multi-disciplinary Approach in the Development of a Stroke Rehabilitation Tool (MS, ME, ILB, MF, PH, DS, SN, JB), pp. 351–362.
HCIHCI-TMT-2014-AssilaOE #evaluation #human-computer #integration #quality #towards
Towards Qualitative and Quantitative Data Integration Approach for Enhancing HCI Quality Evaluation (AA, KMdO, HE), pp. 469–480.
HCIHCI-TMT-2014-Bakke #process #user interface
Immediacy in User Interfaces: An Activity Theoretical Approach (SB), pp. 14–22.
HCIHCI-TMT-2014-FangZ #online
A Revised Lexical Approach for Analyzing Online Reviews (XF, FZ), pp. 69–76.
HCIHIMI-DE-2014-Lucas #constraints #interactive #visualisation
An Interactive Approach to Constraint-Based Visualizations (WTL), pp. 54–63.
HCILCT-NLE-2014-ElciD #case study #education #experience #research #social #social media
A Narrative Research Approach: The Experiences of Social Media Support in Higher Education (AE, BÇD), pp. 36–42.
HCILCT-TRE-2014-AlmazovaK #student
Computer Assisted Individual Approach to Acquiring Foreign Vocabulary of Students Major (NA, MK), pp. 248–257.
HCILCT-TRE-2014-Hayes14a #development #game studies #learning #simulation
An Approach to Holistic Development of Serious Games and Learning Simulations (ATH), pp. 42–49.
HCISCSM-2014-FardounA #community #feedback #framework #platform
Feedback Platform for Community Colleges: An Approach to Knowledge Excellence (HMF, AAMAG), pp. 306–313.
HCISCSM-2014-LeeLS #network #social
A New Approach to Exploring Spatiotemporal Space in the Context of Social Network Services (JGL, KCL, DHS), pp. 221–228.
HCISCSM-2014-PlikynasM #social
Agent-Based Nonlocal Social Systems: Neurodynamic Oscillations Approach (DP, SM), pp. 253–264.
HCISCSM-2014-SolingerHHFL #facebook #multi #predict #social #social media
Beyond Facebook Personality Prediction: — A Multidisciplinary Approach to Predicting Social Media Users’ Personality (CS, LMH, SHH, RF, CL), pp. 486–493.
VISSOFTVISSOFT-2014-BarikLCM #compilation #developer #how #visualisation
How Developers Visualize Compiler Messages: A Foundational Approach to Notification Construction (TB, KL, SC, ERMH), pp. 87–96.
CAiSECAiSE-2014-GarciaDC #adaptation #model-to-text #sql
An Adapter-Based Approach to Co-evolve Generated SQL in Model-to-Text Transformations (JG, OD, JC), pp. 518–532.
CAiSECAiSE-2014-LiH #requirements #security
Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach (TL, JH), pp. 285–300.
CAiSECAiSE-2014-NobauerSG #analysis #automation #evaluation #product line #similarity
Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
EDOCEDOC-2014-FlorezSV #analysis #automation #enterprise #modelling
Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
ICEISICEIS-v1-2014-AmaralCRGTS #data mining #framework #image #mining
The SITSMining Framework — A Data Mining Approach for Satellite Image Time Series (BFA, DYTC, LASR, RRdVG, AJMT, EPMdS), pp. 225–232.
ICEISICEIS-v1-2014-BouzidCFP #enterprise #retrieval #semantics
A Pattern-based Approach for Semantic Retrieval of Information Resources in Enterprises — Application Within STMicroelectronics (SB, CC, CSF, JP), pp. 193–200.
ICEISICEIS-v1-2014-CaetanoLC #case study #data-driven #predict
A Data-driven Approach to Predict Hospital Length of Stay — A Portuguese Case Study (NC, RMSL, PC), pp. 407–414.
ICEISICEIS-v1-2014-KammererN #comparison #named #sql
Application-Mimes — An Approach for Quantitative Comparison of SQL — and NoSQL-databases (MK, JN), pp. 256–263.
ICEISICEIS-v1-2014-Tribolet #adaptation #bottom-up #enterprise #top-down
An Engineering Approach to Natural Enterprise Dynamics — From Top-down Purposeful Systemic Steering to Bottom-up Adaptive Guidance Control (JT), p. XIII.
ICEISICEIS-v2-2014-BeenK #analysis #internet #online #people
Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEISICEIS-v2-2014-FerreiraS #enterprise #implementation #named #semantics #towards #web
e-swim: Enterprise Semantic Web Implementation Model — Towards a Systematic Approach to Implement the Semantic Web in Enterprises (RF, IS), pp. 653–658.
ICEISICEIS-v2-2014-Kupper #research #social
Measuring the Success of Social CRM — First Approach and Future Research (TK), pp. 573–582.
ICEISICEIS-v2-2014-MachadoLPWO
A Reactive and Proactive Approach for Ambient Intelligence (AM, DL, AMP, LKW, JPMdO), pp. 501–512.
ICEISICEIS-v2-2014-MahmoudBAG #learning
A New Approach Based on Learning Services to Generate Appropriate Learning Paths (CBM, FB, MHA, FG), pp. 643–646.
ICEISICEIS-v2-2014-MarcolinoOG #diagrams #effectiveness #sequence chart #towards #variability
Towards the Effectiveness of the SMarty Approach for Variability Management at Sequence Diagram Level (AM, EAOJ, IMdSG), pp. 249–256.
ICEISICEIS-v2-2014-MerouaniMS #consistency #formal method #process #testing #towards
Formalizing Artifact-Centric Business Processes — Towards a Conformance Testing Approach (HM, FM, HSB), pp. 368–374.
ICEISICEIS-v2-2014-MurianaMG #development #information management #open source
Development of Open Source Software, a Qualitative View in a Knowledge Management Approach (LMM, CM, ACBG), pp. 391–399.
ICEISICEIS-v2-2014-SarmientoLRS #automation #concurrent #generative #requirements #testing
An Automated Approach of Test Case Generation for Concurrent Systems from Requirements Descriptions (ES, JCSdPL, NR, AvS), pp. 339–347.
ICEISICEIS-v3-2014-BaldominosCC #information management #interactive
An Approach to Circumstantial Knowledge Management for Human-Like Interaction (AB, FJCG, DC), pp. 71–78.
ICEISICEIS-v3-2014-BarrosFSA #towards
Deriving Service Level Agreements from Business Level Agreements — An Approach Towards Strategic Alignment in Organizations (VAB, MF, GMBS, JPdA), pp. 214–225.
ICEISICEIS-v3-2014-PereiraV #enterprise #named
e-Strategy — An Enterprise Engineer Approach to Strategic Management (RP, AV), pp. 472–477.
ICEISICEIS-v3-2014-RavasanRH #framework #fuzzy #process #using
A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
ICEISICEIS-v3-2014-ZouhaierHA #adaptation #people #user interface
A MDA-based Approach for Enabling Accessibility Adaptation of User Interface for Disabled People (LZ, YBH, LJBA), pp. 120–127.
CIKMCIKM-2014-DuQF #fine-grained #owl
A Practical Fine-grained Approach to Resolving Incoherent OWL 2 DL Terminologies (JD, GQ, XF), pp. 919–928.
CIKMCIKM-2014-LiuXCXTY #bound #linear #network #scalability #social
Influence Maximization over Large-Scale Social Networks: A Bounded Linear Approach (QL, BX, EC, HX, FT, JXY), pp. 171–180.
CIKMCIKM-2014-MingYC #re-engineering #summary #topic
A Dynamic Reconstruction Approach to Topic Summarization of User-Generated-Content (ZM, JY, TSC), pp. 311–320.
CIKMCIKM-2014-TangWPTL #detection
An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
CIKMCIKM-2014-YeMAG #privacy #visual notation
Negative FaceBlurring: A Privacy-by-Design Approach to Visual Lifelogging with Google Glass (TY, BM, RA, CG), pp. 2036–2038.
CIKMCIKM-2014-ZhangKLCY #named #scalability
NCR: A Scalable Network-Based Approach to Co-Ranking in Question-and-Answer Sites (JZ, XK, RJL, YC, PSY), pp. 709–718.
CIKMCIKM-2014-ZhaoCN #data type #probability
Truth Discovery in Data Streams: A Single-Pass Probabilistic Approach (ZZ, JC, WN), pp. 1589–1598.
ECIRECIR-2014-HuangDHL
A Two-level Approach for Subtitle Alignment (JH, HD, XH, YL), pp. 468–473.
ECIRECIR-2014-MeguebliKDP #identification
Unsupervised Approach for Identifying Users’ Political Orientations (YM, MK, BLD, FP), pp. 507–512.
ECIRECIR-2014-VechtomovaST #information retrieval #word
An Information Retrieval-Based Approach to Determining Contextual Opinion Polarity of Words (OV, KS, JT), pp. 553–559.
ECIRECIR-2014-YounusOP #behaviour #microblog #modelling #personalisation
A Language Modeling Approach to Personalized Search Based on Users’ Microblog Behavior (AY, CO, GP), pp. 727–732.
ICMLICML-c1-2014-BardenetDH #adaptation #markov #monte carlo #scalability #towards
Towards scaling up Markov chain Monte Carlo: an adaptive subsampling approach (RB, AD, CCH), pp. 405–413.
ICMLICML-c1-2014-HutterHL #performance
An Efficient Approach for Assessing Hyperparameter Importance (FH, HH, KLB), pp. 754–762.
ICPRICPR-2014-BagheriGE #classification #novel #subclass
Generic Subclass Ensemble: A Novel Approach to Ensemble Classification (MAB, QG, SE), pp. 1254–1259.
ICPRICPR-2014-BayramogluKEANKH #detection #image #machine learning #using
Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPRICPR-2014-BiswasBC #documentation #image
A Global-to-Local Approach to Binarization of Degraded Document Images (BB, UB, BBC), pp. 3008–3013.
ICPRICPR-2014-CaoHS #classification #kernel #learning #multi
Optimization-Based Extreme Learning Machine with Multi-kernel Learning Approach for Classification (LlC, WbH, FS), pp. 3564–3569.
ICPRICPR-2014-CechFM #3d #detection #refinement
A 3D Approach to Facial Landmarks: Detection, Refinement, and Tracking (JC, VF, JM), pp. 2173–2178.
ICPRICPR-2014-ChakeriH #clustering #framework #game studies #set
Dominant Sets as a Framework for Cluster Ensembles: An Evolutionary Game Theory Approach (AC, LOH), pp. 3457–3462.
ICPRICPR-2014-ChatbriKK #documentation #image #independence #query
An Application-Independent and Segmentation-Free Approach for Spotting Queries in Document Images (HC, PWK, KK), pp. 2891–2896.
ICPRICPR-2014-ChenCF #classification #hybrid #semantics
A Hybrid Holistic/Semantic Approach for Scene Classification (ZC, ZC, HF), pp. 2299–2304.
ICPRICPR-2014-ColonnaCN #distributed
A Distributed Approach for Classifying Anuran Species Based on Their Calls (JGC, MC, EFN), pp. 1242–1247.
ICPRICPR-2014-Desrosiers #adaptation #image #performance #random #segmentation
A Fast and Adaptive Random Walks Approach for the Unsupervised Segmentation of Natural Images (CD), pp. 130–135.
ICPRICPR-2014-DingM #detection #image
An Accurate Approach for Microaneurysm Detection in Digital Fundus Images (SD, WM), pp. 1846–1851.
ICPRICPR-2014-DuanA #estimation #image
A J-Linkage Based Approach for Vanishing Direction Estimation in Catadioptric Images (WD, NMA), pp. 2113–2118.
ICPRICPR-2014-DumonceauxRG #algebra #clustering
An Algebraic Approach to Ensemble Clustering (FD, GR, MG), pp. 1301–1306.
ICPRICPR-2014-FrintropGC
A Cognitive Approach for Object Discovery (SF, GMG, ABC), pp. 2329–2334.
ICPRICPR-2014-HalsteadDSF #database #people #semantics #video
Locating People in Video from Semantic Descriptions: A New Database and Approach (MH, SD, SS, CF), pp. 4501–4506.
ICPRICPR-2014-JinIHS #using
A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
ICPRICPR-2014-KapsourasN #recognition #using
Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
ICPRICPR-2014-KeceliC #multimodal #using
A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
ICPRICPR-2014-LablackDBD #detection
A Local Approach for Negative Emotion Detection (AL, TD, IMB, CD), pp. 417–420.
ICPRICPR-2014-MaHXP #3d #robust #using
A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
ICPRICPR-2014-MarcaciniDHR #clustering #documentation #learning #metric
Privileged Information for Hierarchical Document Clustering: A Metric Learning Approach (RMM, MAD, ERH, SOR), pp. 3636–3641.
ICPRICPR-2014-MasselliZ #geometry #performance #problem
A New Geometric Approach for Faster Solving the Perspective-Three-Point Problem (AM, AZ), pp. 2119–2124.
ICPRICPR-2014-MehnertMSMB
A Structural Texture Approach for Characterising Malignancy Associated Changes in Pap Smears Based on Mean-Shift and the Watershed Transform (AM, RM, KS, PM, EB), pp. 1189–1193.
ICPRICPR-2014-MeloLMS #detection
An Optimized Sliding Window Approach to Pedestrian Detection (VHCdM, SL, DM, WRS), pp. 4346–4351.
ICPRICPR-2014-NagyM #grid #search-based
Binary Tomography on the Triangular Grid with 3 Alternative Directions — A Genetic Approach (BN, EVM), pp. 1079–1084.
ICPRICPR-2014-NourbakhshBP #graph #matrix
A Matrix Factorization Approach to Graph Compression (FN, SRB, MP), pp. 76–81.
ICPRICPR-2014-RodriguesPPW #feature model
A Binary Krill Herd Approach for Feature Selection (DR, LAMP, JPP, SATW), pp. 1407–1412.
ICPRICPR-2014-SharmaCL #3d #generative #hybrid #novel
Kinect-Variety Fusion: A Novel Hybrid Approach for Artifacts-Free 3DTV Content Generation (MS, SC, BL), pp. 2275–2280.
ICPRICPR-2014-SilvaTT #graph #named
BoG: A New Approach for Graph Matching (FBS, ST, RdST), pp. 82–87.
ICPRICPR-2014-WalhaDLGA #image #learning #taxonomy
Sparse Coding with a Coupled Dictionary Learning Approach for Textual Image Super-resolution (RW, FD, FL, CG, AMA), pp. 4459–4464.
ICPRICPR-2014-WangEGLLF #distance #documentation #edit distance #graph #word
A Coarse-to-Fine Word Spotting Approach for Historical Handwritten Documents Based on Graph Embedding and Graph Edit Distance (PW, VE, CG, CL, JL, AF), pp. 3074–3079.
ICPRICPR-2014-WangZH #data-driven #health #named
DensityTransfer: A Data Driven Approach for Imputing Electronic Health Records (FW, JZ, JH), pp. 2763–2768.
ICPRICPR-2014-XianCZ #automation #image #segmentation
A Fully Automatic Breast Ultrasound Image Segmentation Approach Based on Neutro-Connectedness (MX, HDC, YZ), pp. 2495–2500.
ICPRICPR-2014-YamadaM #behaviour #using
Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
ICPRICPR-2014-ZhangHLHZL #feature model #hybrid
A Hybrid Feature Selection Approach by Correlation-Based Filters and SVM-RFE (JZ, XH, PPL, WH, YZ, HL), pp. 3684–3689.
KDDKDD-2014-0001GHHLMSSZ #probability
Knowledge vault: a web-scale approach to probabilistic knowledge fusion (XD, EG, GH, WH, NL, KM, TS, SS, WZ), pp. 601–610.
KDDKDD-2014-ChengB0 #dependence #effectiveness #named
FBLG: a simple and effective approach for temporal dependence discovery from time series data (DC, MTB, YL), pp. 382–391.
KDDKDD-2014-KapoorSSY #predict
A hazard based approach to user return time prediction (KK, MS, JS, TY), pp. 1719–1728.
KDDKDD-2014-QianHJPZ #distance #learning #metric #using
Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
KDDKDD-2014-Schadt #data-driven
A data driven approach to diagnosing and treating disease (EES), p. 3.
KDDKDD-2014-YinW #clustering #modelling #multi
A dirichlet multinomial mixture model-based approach for short text clustering (JY, JW), pp. 233–242.
KDIRKDIR-2014-BarbantanLP #health #identification #ontology
Disease Identification in Electronic Health Records — An Ontology based Approach (IB, CL, RP), pp. 261–268.
KDIRKDIR-2014-ChakrabortyGR #performance #retrieval #word
A Word Association Based Approach for Improving Retrieval Performance from Noisy OCRed Text (AC, KG, UR), pp. 450–456.
KDIRKDIR-2014-DeglInnocentiNT #knowledge base #multi
A New Multi-lingual Knowledge-base Approach to Keyphrase Extraction for the Italian Language (DD, DDN, CT), pp. 78–85.
KDIRKDIR-2014-MojahedI #distance #semistructured data
A Fusion Approach to Computing Distance for Heterogeneous Data (AM, BdlI), pp. 269–276.
KEODKEOD-2014-Grabska #concept #ontology #process
An Ontology based Approach for Assisting Conceptualisation in CAD Processes (EG), pp. 272–279.
KEODKEOD-2014-PaniCP #content management #multi
An Approach to Multimedia Content Management (FEP, GC, SP), pp. 264–271.
KMISKMIS-2014-GuerrucciDAB #information management #network
Phased Approach to a Knowledge Management Network (DG, RMD, RCA, DB), pp. 101–108.
KMISKMIS-2014-Schmitt #generative #information management #novel
Proposing a Next Generation of Knowledge Management Systems for Creative Collaborations in Support of Individuals and Institutions — Featuring a Novel Approach for Meme-based Personal Knowledge Management (US), pp. 346–353.
KMISKMIS-2014-ToureAD #enterprise #named #performance
AM2O — An Efficient Approach for Managing Training in Enterprise (FT, EA, KD), pp. 405–412.
KRKR-2014-DiakidoyKM0 #automation #comprehension
A Psychology-Inspired Approach to Automated Narrative Text Comprehension (IAD, ACK, LM, RM).
KRKR-2014-PereiraDH #abduction #bias #reasoning
An Abductive Reasoning Approach to the Belief Bias Effect (LMP, EAD, SH).
MLDMMLDM-2014-AbdullahiCM #identification #novel #using
A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
MLDMMLDM-2014-JiangDPL #estimation #markov #optimisation #recognition
Modified Bootstrap Approach with State Number Optimization for Hidden Markov Model Estimation in Small-Size Printed Arabic Text Line Recognition (ZJ, XD, LP, CL), pp. 437–441.
MLDMMLDM-2014-WaiyamaiS #classification #dataset
A Cost-Sensitive Based Approach for Improving Associative Classification on Imbalanced Datasets (KW, PS), pp. 31–42.
RecSysRecSys-2014-LingLK #recommendation
Ratings meet reviews, a combined approach to recommend (GL, MRL, IK), pp. 105–112.
SEKESEKE-2014-AssoudiL #multi #process
A Multi-Agent-Based Approach for Autonomic Data Exchange Processes (HA, HL), pp. 334–337.
SEKESEKE-2014-DalliloAF #multi #process
Making the link between strategy and process model collections: a multi-layered approach (FD, JPdA, MF), pp. 387–392.
SEKESEKE-2014-DegrossiAFM #risk management
Flood Citizen Observatory: a crowdsourcing-based approach for flood risk management in Brazil (LCD, JPdA, MCF, EMM), pp. 570–575.
SEKESEKE-2014-GomedeB #multi
A Multicriteria Approach to Project Portfolio Selection (EG, RMB), pp. 43–48.
SEKESEKE-2014-GuessiON #architecture
An Approach for Capturing and Documenting Architectural Decisions of Reference Architectures (MG, FO, EYN), pp. 162–167.
SEKESEKE-2014-HartmannFNMKT #modelling #reasoning #runtime #using
Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
SEKESEKE-2014-HauboldBH #flexibility #towards
Towards a flexible approach to manage varying and altering information representations (TH, GB, WH), pp. 566–569.
SEKESEKE-2014-JingLC #collaboration #design
An Argument-based Collaborative Negotiation Approach to Support Software Design Collaboration (NJ, SCYL, HFC), pp. 274–279.
SEKESEKE-2014-LingZF #modelling #process #similarity
An Improved Structure-based Approach to Measure Similarity of Business Process Models (JL, LZ, QF), pp. 377–380.
SEKESEKE-2014-QueirozB #embedded #modelling #product line
A Critical Embedded System Product Line Model-based Approach (PGGQ, RTVB), pp. 71–75.
SEKESEKE-2014-Saito0TO #constraints #generative #knowledge-based #testing #web
Test Data Generation for Web Applications: A Constraint and Knowledge-based Approach (HS, ST, HT, MO), pp. 110–114.
SEKESEKE-2014-SatapathyPR #agile #estimation #kernel #using
Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SEKESEKE-2014-ShahnewazR #named
RELREA — An Analytical Approach for Evaluating Release Readiness (SMS, GR), pp. 437–442.
SEKESEKE-2014-WangC #analysis #social #visualisation
User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
SEKESEKE-2014-XuL #architecture #automation #synthesis #using
Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
SIGIRSIGIR-2014-BabbarPGA #classification #distributed #ranking #scalability
Re-ranking approach to classification in large-scale power-law distributed category systems (RB, IP, ÉG, MRA), pp. 1059–1062.
SIGIRSIGIR-2014-ChengCBB #twitter
Who is the barbecue king of texas?: a geo-spatial approach to finding local experts on twitter (ZC, JC, HB, VB), pp. 335–344.
SIGIRSIGIR-2014-HingmireC #classification #topic
Topic labeled text classification: a weakly supervised approach (SH, SC), pp. 385–394.
SIGIRSIGIR-2014-KotsakosLKGKN #documentation
A burstiness-aware approach for document dating (DK, TL, DK, DG, NK, KN), pp. 1003–1006.
SIGIRSIGIR-2014-QureshiOP #visualisation
A perspective-aware approach to search: visualizing perspectives in news search results (MAQ, CO, GP), pp. 1261–1262.
SIGIRSIGIR-2014-RoitmanHS #clustering
A fusion approach to cluster labeling (HR, SH, MSS), pp. 883–886.
AMTAMT-2014-GholizadehDM #model transformation #query
A Query Structured Approach for Model Transformation (HG, ZD, TSEM), pp. 54–63.
ECMFAECMFA-2014-LogreMCR #variability #visualisation
Sensor Data Visualisation: A Composition-Based Approach to Support Domain Variability (IL, SM, PC, MR), pp. 101–116.
ICMTICMT-2014-JilaniIK #generative #model transformation #testing
A Search Based Test Data Generation Approach for Model Transformations (AAJ, MZI, MUK), pp. 17–24.
MODELSMoDELS-2014-EnriciAP #communication #modelling #uml
A UML Model-Driven Approach to Efficiently Allocate Complex Communication Schemes (AE, LA, RP), pp. 370–385.
MODELSMoDELS-2014-NataleCSS #adaptation #communication #component #generative
An MDA Approach for the Generation of Communication Adapters Integrating SW and FW Components from Simulink (MDN, FC, AS, ALSV), pp. 353–369.
MODELSMoDELS-2014-SoltanaFASB #case study #modelling #uml #using
Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
SPLCSPLC-2014-BarreirosM
A cover-based approach for configuration repair (JB, AMDM), pp. 157–166.
SPLCSPLC-2014-ColanziVGO #design #product line #search-based
A search-based approach for software product line design (TEC, SRV, IMSG, WNO), pp. 237–241.
SPLCSPLC-2014-DieumegardTP #data flow #library #product line #semantics #specification
A software product line approach for semantic specification of block libraries in dataflow languages (AD, AT, MP), pp. 217–226.
SPLCSPLC-2014-DillonRD #product line
A methodical approach to product line adoption (MD, JR, RD), pp. 340–349.
SPLCSPLC-2014-UrliBC #product line
Handling complex configurations in software product lines: a tooled approach (SU, MBF, PC), pp. 112–121.
AdaEuropeAdaEurope-2014-IliasovLR #formal method
Practical Formal Methods in Railways — The SafeCap Approach (AI, IL, AR), pp. 177–192.
AdaEuropeAdaEurope-2014-ZhouLL #embedded #requirements #safety #validation
A TASM-Based Requirements Validation Approach for Safety-Critical Embedded Systems (JZ, YL, KL), pp. 43–57.
PLDIPLDI-2014-StorkNSMFMA #named #programming language
Æminium: a permission based concurrent-by-default programming language approach (SS, KN, JS, MM, AF, PM, JA), p. 4.
POPLPOPL-2014-BeyeneCPR #constraints #game studies #graph #infinity
A constraint-based approach to solving games on infinite graphs (TAB, SC, CP, AR), pp. 221–234.
POPLPOPL-2014-RamsayNO #abstraction #higher-order #model checking #refinement
A type-directed abstraction refinement approach to higher-order model checking (SJR, RPN, CHLO), pp. 61–72.
RERE-2014-AdedjoumaSB #automation #case study #detection
Automated detection and resolution of legal cross references: Approach and a study of Luxembourg’s legislation (MA, MS, LCB), pp. 63–72.
RERE-2014-Daneva #game studies #how #multi #online #requirements
How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games (MD), pp. 3–12.
RERE-2014-FilipovikjNR #formal method #requirements
Reassessing the pattern-based approach for formalizing requirements in the automotive domain (PF, MN, GRN), pp. 444–450.
RERE-2014-PutnamC #game studies #multi #requirements
Therapist-centered requirements: A multi-method approach of requirement gathering to support rehabilitation gaming (CP, JC), pp. 13–22.
RERE-2014-TranM #evolution #feature model #nondeterminism
An Approach for Decision Support on the Uncertainty in Feature Model Evolution (LMST, FM), pp. 93–102.
REFSQREFSQ-2014-MaidenLZBAL #case study #experience #specification
A Requirements-Led Approach for Specifying QoS-Aware Service Choreographies: An Experience Report (NAMM, JL, KZ, AB, GDA, FL), pp. 239–253.
REFSQREFSQ-2014-SannierB #analysis #modelling #named #requirements
INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
ASEASE-2014-NguyenNNN #api #learning #migration #mining #statistics
Statistical learning approach for mining API usage mappings for code migration (ATN, HAN, TTN, TNN), pp. 457–468.
FSEFSE-2014-Wille #modelling
Managing lots of models: the FaMine approach (DW), pp. 817–819.
ICSEICSE-2014-CaiWC #constraints #dynamic analysis #named #parallel #source code #thread
ConLock: a constraint-based approach to dynamic checking on deadlocks in multithreaded programs (YC, SW, WKC), pp. 491–502.
SACSAC-2014-BergamascoN #3d #feature model #retrieval #using
A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
SACSAC-2014-BrinkeMBBAK #composition #design #energy
A tool-supported approach for modular design of energy-aware software (StB, SM, CB, LB, MA, SK), pp. 1206–1212.
SACSAC-2014-ChenWWZL #3d #web
An approach to support stereoscopic 3D web (QC, WW, RW, JZ, ZL), pp. 981–984.
SACSAC-2014-EngielCL #concept #elicitation #using
Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SACSAC-2014-Fernandez-MarquezSSYDZ #mobile #self
Self-managing and self-organising mobile computing applications: a separation of concerns approach (JLFM, GDMS, GS, JY, SD, FZ), pp. 458–465.
SACSAC-2014-GamaD #deployment #fault #self #testing
A fault deployment and activation approach for testing self-recovery mechanisms (KG, DD), pp. 1114–1119.
SACSAC-2014-GriebeG #automation #mobile #modelling #testing
A model-based approach to test automation for context-aware mobile applications (TG, VG), pp. 420–427.
SACSAC-2014-HoritaHSNTO #modelling #refinement #using
Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
SACSAC-2014-HuergoPD #identification #modelling #using
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SACSAC-2014-JeongLCHP #android #behaviour #kernel #monitoring
A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
SACSAC-2014-KimLSKL #named #ranking #web
C-Rank: a contribution-based web page ranking approach (DJK, SCL, HYS, SWK, JBL), pp. 908–912.
SACSAC-2014-LiuCM #ad hoc #composition #mobile #network
A low-latency service composition approach in mobile ad hoc networks (CL, JC, FLM), pp. 509–511.
SACSAC-2014-ManducaMFP #database #implementation #multitenancy #web
A nonintrusive approach for implementing single database, multitenant services from web applications (AMM, EVM, RPMF, MdGCP), pp. 751–756.
SACSAC-2014-Moin #collaboration #visualisation
A unified approach to collaborative data visualization (AM), pp. 280–286.
SACSAC-2014-OliveiraNWB #kernel #named
Ianus: secure and holistic coexistence with kernel extensions — a immune system-inspired approach (DO, JN, NW, MB), pp. 1672–1679.
SACSAC-2014-PapadakisT #analysis #effectiveness #fault #locality #mutation testing
Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
SACSAC-2014-ParraJGI #automation #product line
An SOA approach for automating software product line adoption (CP, DJ, LG, AI), pp. 1231–1238.
SACSAC-2014-RolimBCCAPM #multimodal #recommendation
A recommendation approach for digital TV systems based on multimodal features (RR, FB, AC, GC, HOdA, AP, AFM), pp. 289–291.
SACSAC-2014-SantosSTO #hybrid #navigation
A hybrid GA-ANN approach for autonomous robots topological navigation (VdCS, DOS, CFMT, FSO), pp. 148–153.
SACSAC-2014-Silva #automation #overview #quality #requirements #specification #validation
Quality of requirements specifications: a preliminary overview of an automatic validation approach (ARdS), pp. 1021–1022.
SACSAC-2014-VidalCNM #automation #generative
A semi-automatic approach for generating customized R2RML mappings (VMPV, MAC, LETN, JMM), pp. 316–322.
SACSAC-2014-ZiadiHPZT #independence #product line #towards
Towards a language-independent approach for reverse-engineering of software product lines (TZ, CH, MP, MZ, YLT), pp. 1064–1071.
GPCEGPCE-2014-SmeltzerEM #visualisation
A transformational approach to data visualization (KS, ME, RAM), pp. 53–62.
ASPLOSASPLOS-2014-RuwaseKGM #hardware #named
Guardrail: a high fidelity approach to protecting hardware devices from buggy drivers (OR, MAK, PBG, TCM), pp. 655–670.
CASECASE-2014-ChenGGLCL #analysis #behaviour #scheduling
A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
CASECASE-2014-ChenS #markov #modelling #novel #using
Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
CASECASE-2014-FantiLIMUA
A Decision Support System approach for the postal delivery operations (MPF, RL, GI, AMM, WU, LA), pp. 588–593.
CASECASE-2014-GlorieuxDSL #optimisation #using
Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
CASECASE-2014-HuangNXCSD #3d #geometry #modelling #predict
Predictive modeling of geometric deviations of 3D printed products — A unified modeling approach for cylindrical and polygon shapes (QH, HN, KX, YC, SS, TD), pp. 25–30.
CASECASE-2014-HuangYL #identification
An intelligent approach to identify elderly body information (YPH, WJY, SYL), pp. 824–829.
CASECASE-2014-HuCLY #automation #comparative #petri net #using
A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
CASECASE-2014-LiXG #capacity
A queuing approach for radiotherapy treatment capacity planning (SL, XX, NG), pp. 540–545.
CASECASE-2014-LiZLM #capacity #scheduling
An intercell scheduling approach considering transportation capacity (ML, HZ, DL, XM), pp. 594–599.
CASECASE-2014-Murakami #generative #multi #problem
A column generation approach for the multi-vehicle covering tour problem (KM), pp. 1063–1068.
CASECASE-2014-NagataO #multi #using
Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
CASECASE-2014-RahmanCBM #assessment #safety
Ex-ante assessment of struck-by safety hazards in construction projects: A motion-planning approach (MMR, TC, LB, AM), pp. 277–282.
CASECASE-2014-TiengYHC #multi #optimisation #process
A multi-objective optimization approach for selecting key features of machining processes (HT, HCY, MHH, FTC), pp. 899–904.
CASECASE-2014-TrikiGX #health
A two-phase approach for periodic home health care planning (NT, TG, XX), pp. 518–523.
CASECASE-2014-WantiaLR #industrial
Symbolic planning for industrial applications — the eRobotics approach (NW, DL, JR), pp. 367–372.
CASECASE-2014-WuBZ #linear #scheduling
Linear programming-based approach to scheduling of crude oil operations in refinery with oil type mixing requirement (NW, LB, MZ), pp. 430–435.
CASECASE-2014-YuM #data-driven #detection #statistics
Data-driven bottleneck detection in manufacturing systems: A statistical approach (CY, AM), pp. 710–715.
CGOCGO-2014-JimboreanKSBK #compilation #hardware #scalability
Fix the code. Don’t tweak the hardware: A new compiler approach to Voltage-Frequency scaling (AJ, KK, VS, DBS, SK), p. 262.
DACDAC-2014-AgostaBPS #embedded #encryption #execution #multi
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software (GA, AB, GP, MS), p. 6.
DACDAC-2014-KiamehrOTN #analysis #fault
Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
DACDAC-2014-Rodriguez-NavasSHNLL #automation #functional #safety #specification #verification
Automated Specification and Verification of Functional Safety in Heavy-Vehicles: the VeriSpec Approach (GRN, CCS, HH, MN, OL, HL), p. 4.
DATEDATE-2014-BahrebarS #network
Improving hamiltonian-based routing methods for on-chip networks: A turn model approach (PB, DS), pp. 1–4.
DATEDATE-2014-BraojosDBAA #hardware #manycore #power management
Hardware/software approach for code synchronization in low-power multi-core sensor nodes (RB, AYD, IB, GA, DA), pp. 1–6.
DATEDATE-2014-CannellaBS #realtime #scheduling #streaming #using
System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
DATEDATE-2014-EckerVZG #metamodelling #synthesis
The metamodeling approach to system level synthesis (WE, MV, LZ, AG), pp. 1–2.
DATEDATE-2014-FrancillonNRT
A minimalist approach to Remote Attestation (AF, QN, KBR, GT), pp. 1–6.
DATEDATE-2014-KarakonstantisSSAB #analysis #energy #variability
A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
DATEDATE-2014-KimHPSL #implementation #modelling #testing
A layered approach for testing timing in the model-based implementation (BK, HIH, TP, SHS, IL), pp. 1–4.
DATEDATE-2014-RiefertCSBRB #automation #effectiveness #fault #functional #generative #testing
An effective approach to automatic functional processor test generation for small-delay faults (AR, LMC, MS, PB, MSR, BB), pp. 1–6.
HPCAHPCA-2014-HechtmanCHTBHRW #consistency #named
QuickRelease: A throughput-oriented approach to release consistency on GPUs (BAH, SC, DRH, YT, BMB, MDH, SKR, DAW), pp. 189–200.
HPCAHPCA-2014-PariharH #dependence #metaheuristic
Accelerating decoupled look-ahead via weak dependence removal: A metaheuristic approach (RP, MCH), pp. 662–677.
HPDCHPDC-2014-IslamLWP #named
SOR-HDFS: a SEDA-based approach to maximize overlapping in RDMA-enhanced HDFS (NSI, XL, MWuR, DKP), pp. 261–264.
PDPPDP-2014-AmorettiGZST #formal method #in the cloud #mobile #towards
Towards a Formal Approach to Mobile Cloud Computing (MA, AG, FZ, VS, FT), pp. 743–750.
PDPPDP-2014-AudemardHJP #distributed #effectiveness #problem #satisfiability
An Effective Distributed D&C Approach for the Satisfiability Problem (GA, BH, SJ, CP), pp. 183–187.
PDPPDP-2014-Misale #concurrent #memory management
Accelerating Bowtie2 with a lock-less concurrency approach and memory affinity (CM), pp. 578–585.
PDPPDP-2014-RossRPSH #hybrid #parallel
A Class-Structured Approach to Couple Application and Hybrid Core Parallelism (JAR, DAR, SJP, DRS, BJH), pp. 681–687.
PDPPDP-2014-SanchezAGCMC #gpu #named
FRODRUG: A Virtual Screening GPU Accelerated Approach for Drug Discovery (SGS, ERA, JIG, PC, ASM, RC), pp. 594–600.
PDPPDP-2014-SmithWWA #clustering #distributed
A Cluster-Based Approach to Consensus Based Distributed Task Allocation (DS, JW, SRW, AAA), pp. 428–431.
PDPPDP-2014-TcarenkoFLPT #manycore #modelling
Multi Rectangle Modeling Approach for Application Mapping on a Many-Core System (IT, MF, PL, JP, HT), pp. 452–457.
FoSSaCSFoSSaCS-2014-Cirstea #algebra #linear #logic
A Coalgebraic Approach to Linear-Time Logics (CC), pp. 426–440.
STOCSTOC-2014-DinurS #parallel
Analytical approach to parallel repetition (ID, DS), pp. 624–633.
STOCSTOC-2014-GavinskyMWW #bound #complexity #composition #towards
Toward better formula lower bounds: an information complexity approach to the KRW composition conjecture (DG, OM, OW, AW), pp. 213–222.
CAVCAV-2014-AlglaveKNP #automation #static analysis
Don’t Sit on the Fence — A Static Analysis Approach to Automatic Fence Insertion (JA, DK, VN, DP), pp. 508–524.
CAVCAV-2014-EsparzaK #automaton #composition #ltl
From LTL to Deterministic Automata: A Safraless Compositional Approach (JE, JK), pp. 192–208.
CAVCAV-2014-EsparzaLMMN #analysis #smt
An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
ICLPICLP-J-2014-AmadiniGM #constraints #lazy evaluation #named #theorem proving
SUNNY: a Lazy Portfolio Approach for Constraint Solving (RA, MG, JM), pp. 509–524.
ICSTICST-2014-Marin #automation #database #multi #testing
A Data-Agnostic Approach to Automatic Testing of Multi-dimensional Databases (MM), pp. 133–142.
ICSTICST-2014-PotetMPD #control flow #evaluation #injection #named #robust
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
ICTSSICTSS-2014-SamihGBAB #modelling #testing
An Approach to Derive Usage Models Variants for Model-Based Testing (HS, HLG, RB, MA, BB), pp. 80–96.
ISSTAISSTA-2014-AppeltNBA #automation #injection #sql #testing
Automated testing for SQL injection vulnerabilities: an input mutation approach (DA, CDN, LCB, NA), pp. 259–269.
ISSTAISSTA-2014-GalindoAABB #sequence #testing #variability #video
A variability-based testing approach for synthesizing video sequences (JAG, MA, MA, BB, DB), pp. 293–303.
LICSLICS-CSL-2014-BilokonE #probability #process
A domain-theoretic approach to Brownian motion and general continuous stochastic processes (PB, AE), p. 10.
LICSLICS-CSL-2014-FredriksonJ #privacy #satisfiability
Satisfiability modulo counting: a new approach for analyzing privacy properties (MF, SJ), p. 10.
VMCAIVMCAI-2014-AcunaAMS #complexity #heuristic #modelling #network
Modeling Parsimonious Putative Regulatory Networks: Complexity and Heuristic Approach (VA, AA, AM, AS), pp. 322–336.
ECSAECSA-2013-DimechB #architecture #consistency #development #maintenance
Maintaining Architectural Conformance during Software Development: A Practical Approach (CD, DB), pp. 208–223.
QoSAQoSA-2013-KonersmannDGR #architecture #evolution #towards
Towards architecture-centric evolution of long-living systems (the ADVERT approach) (MK, ZD, MG, RHR), pp. 163–168.
QoSAQoSA-2013-Schmid #formal method #technical debt
A formal approach to technical debt decision making (KS), pp. 153–162.
DocEngDocEng-2013-AgostiCFHM
Interacting with digital cultural heritage collections via annotations: the CULTURA approach (MA, OC, NF, CH, GM), pp. 13–22.
DRRDRR-2013-MedjkouneMPV #online #recognition #using
Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
DRRDRR-2013-SabbourS
A segmentation-free approach to Arabic and Urdu OCR (NS, FS).
HTHT-2013-RoutBPC #classification #social
Where’s @wally?: a classification approach to geolocating users based on their social ties (DPR, KB, DPP, TC), pp. 11–20.
ICDARICDAR-2013-BougueliaBB #classification #documentation #learning
A Stream-Based Semi-supervised Active Learning Approach for Document Classification (MRB, YB, AB), pp. 611–615.
ICDARICDAR-2013-ChiC #recognition
Chinese Handwritten Legal Amount Recognition with HMM-Based Approach (BC, YC), pp. 778–782.
ICDARICDAR-2013-DingsAE #segmentation
A Locale Group Based Line Segmentation Approach for Non Uniform Skewed and Curved Arabic Handwritings (LD, AAH, ME), pp. 803–806.
ICDARICDAR-2013-DingsAE13a #modelling #synthesis
An Approach for Arabic Handwriting Synthesis Based on Active Shape Models (LD, AAH, ME), pp. 1260–1264.
ICDARICDAR-2013-DoTT #recognition #representation
New Approach for Symbol Recognition Combining Shape Context of Interest Points with Sparse Representation (THD, ST, ORT), pp. 265–269.
ICDARICDAR-2013-DuH #normalisation #online #recognition #variability
An Irrelevant Variability Normalization Based Discriminative Training Approach for Online Handwritten Chinese Character Recognition (JD, QH), pp. 69–73.
ICDARICDAR-2013-ElzobiADES #adaptation #markov #modelling #recognition
A Hidden Markov Model-Based Approach with an Adaptive Threshold Model for Off-Line Arabic Handwriting Recognition (ME, AAH, LD, ME, AS), pp. 945–949.
ICDARICDAR-2013-GarzFBI #clustering
A Binarization-Free Clustering Approach to Segment Curved Text Lines in Historical Manuscripts (AG, AF, HB, RI), pp. 1290–1294.
ICDARICDAR-2013-HoRRES #classification #documentation
Document Classification in a Non-stationary Environment: A One-Class SVM Approach (AKNH, NR, JYR, VE, NS), pp. 616–620.
ICDARICDAR-2013-LiuSZM #multi #novel
A Novel Multi-oriented Chinese Text Extraction Approach from Videos (YL, YS, YZ, QM), pp. 1355–1359.
ICDARICDAR-2013-LuoOWK #automation #classification #using
Automatic Chinese Text Classification Using Character-Based and Word-Based Approach (XL, WO, TW, FK), pp. 329–333.
ICDARICDAR-2013-MehriHGBM
A Pixel Labeling Approach for Historical Digitized Books (MM, PH, PGK, AB, RM), pp. 817–821.
ICDARICDAR-2013-PrumVFO #modelling #online #recognition #using
A Discriminative Approach to On-Line Handwriting Recognition Using Bi-character Models (SP, MV, AF, JMO), pp. 364–368.
ICDARICDAR-2013-StammLD #analysis #documentation #multi #partial order
Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
ICDARICDAR-2013-SunH #component #image
An Improved Component Tree Based Approach to User-Intention Guided Text Extraction from Natural Scene Images (LS, QH), pp. 383–387.
ICDARICDAR-2013-TangHF #analysis #recognition
A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
ICDARICDAR-2013-TarafdarPRRR #documentation #visual notation #word
A Two-Stage Approach for Word Spotting in Graphical Documents (AT, UP, PPR, NR, JYR), pp. 319–323.
ICDARICDAR-2013-ToselliV #documentation #performance #word
Fast HMM-Filler Approach for Key Word Spotting in Handwritten Documents (AHT, EV), pp. 501–505.
JCDLJCDL-2013-GodoiTCGFFF #ambiguity #feedback #problem
A relevance feedback approach for the author name disambiguation problem (TAG, RdST, AMBRC, MAG, AAF, WF, EAF), pp. 209–218.
JCDLJCDL-2013-LeeCFP #game studies #interactive #metadata #video
User-centered approach in creating a metadata schema for video games and interactive media (JHL, HC, VF, AP), pp. 229–238.
JCDLJCDL-2013-SmithST #gender
A search engine approach to estimating temporal changes in gender orientation of first names (BNS, MS, VIT), pp. 199–208.
SIGMODSIGMOD-2013-LongWWF #distance #keyword #query
Collective spatial keyword queries: a distance owner-driven approach (CL, RCWW, KW, AWCF), pp. 689–700.
SIGMODSIGMOD-2013-WhangYYSKK #named #parallel #using
ODYS: an approach to building a massively-parallel search engine using a DB-IR tightly-integrated parallel DBMS for higher-level functionality (KYW, TSY, YMY, IYS, HYK, IJK), pp. 313–324.
SIGMODSIGMOD-2013-ZhuZQ #graph #mining #performance
A direct mining approach to efficient constrained graph pattern discovery (FZ, ZZ, QQ), pp. 821–832.
TPDLTPDL-2013-KlampflK #machine learning
An Unsupervised Machine Learning Approach to Body Text and Table of Contents Extraction from Digital Scientific Articles (SK, RK), pp. 144–155.
TPDLTPDL-2013-NadeemOAV #requirements
Users Requirements in Audiovisual Search: A Quantitative Approach (DN, RO, RA, EV), pp. 241–246.
VLDBVLDB-2013-AltwaijryKM
Query-Driven Approach to Entity Resolution (HA, DVK, SM), pp. 1846–1857.
VLDBVLDB-2013-BoghSJ #named #retrieval
GroupFinder: A New Approach to Top-K Point-of-Interest Group Retrieval (KSB, AS, CSJ), pp. 1226–1229.
VLDBVLDB-2013-DeBrabantPTSZ #architecture #database #named
Anti-Caching: A New Approach to Database Management System Architecture (JD, AP, ST, MS, SBZ), pp. 1942–1953.
VLDBVLDB-2013-DuanZCG #database #keyword #probability
Supporting Keyword Search in Product Database: A Probabilistic Approach (HD, CZ, JC, AG), pp. 1786–1797.
VLDBVLDB-2013-DuttaNB #approximate #data type #detection #streaming
Streaming Quotient Filter: A Near Optimal Approximate Duplicate Detection Approach for Data Streams (SD, AN, SKB), pp. 589–600.
VLDBVLDB-2013-Franceschini #big data #how #open source
How to maximize the value of big data with the open source SpagoBI suite through a comprehensive approach (MF), pp. 1170–1171.
VLDBVLDB-2013-GattaniLGTCDSRHD #classification #social #social media
Entity Extraction, Linking, Classification, and Tagging for Social Media: A Wikipedia-Based Approach (AG, DSL, NG, MT, XC, SD, SS, AR, VH, AD), pp. 1126–1137.
VLDBVLDB-2013-Lomet #database #hardware #sql
Microsoft SQL Server’s Integrated Database Approach for Modern Applications and Hardware (DBL), pp. 1178–1179.
VLDBVLDB-2014-GyssensPGWW13 #case study #query #symmetry #towards
An Approach towards the Study of Symmetric Queries (MG, JP, DVG, JW, YW), pp. 25–36.
VLDBVLDB-2014-ZhaoXLLZ13 #similarity
A Partition-Based Approach to Structure Similarity Search (XZ, CX, XL, QL, WZ), pp. 169–180.
CSEETCSEET-2013-EterovicGB #education #process
Teaching software processes to professionals: The approach taken by an evening master’s degree program (YE, GG, JB), pp. 309–313.
CSEETCSEET-2013-ShethBK #re-engineering
A competitive-collaborative approach for introducing software engineering in a CS2 class (SS, JB, GEK), pp. 41–50.
ITiCSEITiCSE-2013-Baumgartner #case study #delivery #design #education #information management #using
Using case studies to design and deliver technology-centered computing education courses: an innovative approach from an undergraduate information systems program in singapore (IB), pp. 189–194.
ITiCSEITiCSE-2013-Buck #reliability
First, do no harm: a curricular approach to reliability (DB), p. 319.
SIGITESIGITE-2013-Jonas #collaboration
Group note taking in mediawiki, a collaborative approach (MJ), pp. 131–132.
CSMRCSMR-2013-NerellaMW #optimisation #query #using
An Approach for Optimization of Object Queries on Collections Using Annotations (VKSN, SKM, TW), pp. 273–282.
ICSMEICSM-2013-AsaduzzamanRSP #hybrid #independence #named #source code
LHDiff: A Language-Independent Hybrid Approach for Tracking Source Code Lines (MA, CKR, KAS, MDP), pp. 230–239.
ICSMEICSM-2013-FontanaZMM #detection #machine learning #smell #towards
Code Smell Detection: Towards a Machine Learning-Based Approach (FAF, MZ, AM, MM), pp. 396–399.
ICSMEICSM-2013-LeL #automation #effectiveness #fault #locality #predict #tool support
Will Fault Localization Work for These Failures? An Automated Approach to Predict Effectiveness of Fault Localization Tools (TDBL, DL), pp. 310–319.
ICSMEICSM-2013-SorOTS #detection #machine learning #memory management #statistics #using
Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
MSRMSR-2013-AlipourHS #debugging #detection #towards
A contextual approach towards more accurate duplicate bug report detection (AA, AH, ES), pp. 183–192.
MSRMSR-2013-SahaSS #automation #stack overflow
A discriminative model approach for suggesting tags automatically for stack overflow questions (AKS, RKS, KAS), pp. 73–76.
WCREWCRE-2013-AntonyAC #behaviour #clone detection #detection #modelling
An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
WCREWCRE-2013-BernardiCL #design pattern #detection #graph #modelling
A model-driven graph-matching approach for design pattern detection (MLB, MC, GADL), pp. 172–181.
DLTDLT-2013-BolligHLM #automaton #learning
A Fresh Approach to Learning Register Automata (BB, PH, ML, BM), pp. 118–130.
ICALPICALP-v2-2013-DieudonneP #polynomial
Deterministic Polynomial Approach in the Plane (YD, AP), pp. 533–544.
LATALATA-2013-Blanchet-SadriBFH #graph #polynomial
A Graph Polynomial Approach to Primitivity (FBS, MB, NF, JH), pp. 153–164.
SEFMSEFM-2013-BorekMSR #model checking #modelling
Model Checking of Security-Critical Applications in a Model-Driven Approach (MB, NM, KS, WR), pp. 76–90.
SEFMSEFM-2013-MenadD #multi #requirements
A Transformation Approach for Multiform Time Requirements (NM, PD), pp. 16–30.
HaskellHaskell-2013-AnknerS #haskell #performance #programming
An EDSL approach to high performance Haskell programming (JA, JS), pp. 1–12.
ICFPICFP-2013-AbelP #pattern matching #recursion #termination
Wellfounded recursion with copatterns: a unified approach to termination and productivity (AA, BP), pp. 185–196.
ICFPICFP-2013-BroadbentCHS #higher-order #named #verification
C-SHORe: a collapsible approach to higher-order verification (CHB, AC, MH, OS), pp. 13–24.
IFLIFL-2013-HackettHJ #optimisation #recursion #source code
The Under-Performing Unfold: A new approach to optimising corecursive programs (JH, GH, MJ), p. 1.
AIIDEAIIDE-2013-ShakerST #evolution
Evolving Playable Content for Cut the Rope through a Simulation-Based Approach (NS, MS, JT).
CoGCIG-2013-AdrianL #design #generative #using
An approach to level design using procedural content generation and difficulty curves (DFHA, ALSGC), pp. 1–8.
DiGRADiGRA-2013-Lenhart #design
Defragmentation and Mashup: Ludic Mashup as a Design Approach (IL).
DiGRADiGRA-2013-WilliamsK #behaviour #case study #collaboration #game studies #social
Elements of Social Action: A Micro- Analytic Approach to the Study of Collaborative Behavior in Digital Games (JPW, DK).
FDGFDG-2013-Wallner #analysis #named #visualisation
Play-Graph: A methodology and visualization approach for the analysis of gameplay data (GW), pp. 253–260.
CoGVS-Games-2013-DunwellLSFHA #game studies #named
Metycoon: A Game-Based Approach to Career Guidance (ID, PL, KS, SdF, MH, SA), pp. 1–6.
GT-VMTGT-VMT-2013-MaierM #diagrams #layout
A Pattern-based Approach for Initial Diagram Layout (SM, MM).
CHICHI-2013-AtkinsonOPBWBPC #design #research
Tactile perceptions of digital textiles: a design research approach (DA, PMO, BP, NBB, PW, SB, SP, MJC), pp. 1669–1678.
CHICHI-2013-BowserHRRGHRP #game studies #prototype #scalability
Prototyping in PLACE: a scalable approach to developing location-based apps and games (AB, DLH, JR, MR, RJG, YH, DR, JP), pp. 1519–1528.
CHICHI-2013-DalsgardE #case study #library #scalability
Large-scale participation: a case study of a participatory approach to developing a new public library (PD, EE), pp. 399–408.
CHICHI-2013-GaverBBBCHJP #human-computer #prototype
Indoor weather stations: investigating a ludic approach to environmental HCI through batch prototyping (WWG, JB, KB, AB, DWTC, MH, NJ, SP), pp. 3451–3460.
CHICHI-2013-KhovanskayaBCVG #design #quote #what
“Everybody knows what you’re doing”: a critical design approach to personal informatics (VDK, EPSB, DC, SV, GG), pp. 3403–3412.
CHICHI-2013-MonroeLOSPM #challenge #query #specification #visual notation
The challenges of specifying intervals and absences in temporal queries: a graphical language approach (MM, RL, JMdO, BS, CP, JM), pp. 2349–2358.
CHICHI-2013-YinOPZ #adaptation
Making touchscreen keyboards adaptive to keys, hand postures, and individuals: a hierarchical spatial backoff model approach (YY, TO, KP, SZ), pp. 2775–2784.
HCIDHM-HB-2013-Yuan #evaluation #modelling #validation
Validation of an Integrated Biomechanical Modeling Approach to the Ergonomic Evaluation of Drywall Installation (LY), pp. 159–168.
HCIDHM-SET-2013-GoreM #modelling #performance #validation
A Validation Approach for Complex NextGen Air Traffic Control Human Performance Models (BFG, PM), pp. 28–37.
HCIDUXU-CXC-2013-OkimotoMB #assessment #multi #usability
Usability Assessment in the Multicultural Approach (MLLRO, COM, KJB), pp. 89–94.
HCIDUXU-CXC-2013-Sun #experience #locality #social #social media #user interface
Tracing Technology Diffusion of Social Media with Culturally Localized User Experience Approach (HS), pp. 115–120.
HCIDUXU-NTE-2013-SannaVBBR #behaviour #design
Engineering AwarenessTM: An e-Service Design Approach for Behavioral Change in Healthcare and Well-Being (AS, SV, SB, IB, AR), pp. 558–567.
HCIDUXU-PMT-2013-BellowsHY #design #difference #research
An Individual Differences Approach to Design Fixation: Comparing Laboratory and Field Research (BGB, JFH, RJY), pp. 13–21.
HCIDUXU-PMT-2013-GockelGPPE #evaluation #experience #named #user interface
VMUXE — An Approach to User Experience Evaluation for Virtual Museums (BG, HG, AP, SP, JE), pp. 262–272.
HCIDUXU-PMT-2013-KarahasanovicF #2d #behaviour #experience #modelling #network
Modelling User Behaviour and Experience — The R2D2 Networks Approach (AK, AF), pp. 506–515.
HCIDUXU-PMT-2013-KohnoYSN #analysis #design
Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
HCIDUXU-PMT-2013-RaisonS #agile #design
Keeping User Centred Design (UCD) Alive and Well in Your Organisation: Taking an Agile Approach (CR, SS), pp. 573–582.
HCIDUXU-PMT-2013-Silveira #behaviour #design #usability
Participatory Design and Usability: A Behavioral Approach of Workers’ Attitudes in the Work Environment (DMCdS), pp. 409–416.
HCIDUXU-WM-2013-FordK #visual notation
Graphical Displays in Eco-Feedback: A Cognitive Approach (RF, BK), pp. 486–495.
HCIDUXU-WM-2013-Igler #design #evaluation #mobile #prototype
Feature Evaluation for Mobile Applications: A Design Science Approach Based on Evolutionary Software Prototypes (BI), pp. 673–681.
HCIDUXU-WM-2013-SauckenML #case study #design #experience #how #metaprogramming #user interface
How to Design Experiences: Macro UX versus Micro UX Approach (CvS, IM, UL), pp. 130–139.
HCIDUXU-WM-2013-SchneidermeierMS #communication #concept
Human-Centered Communication Planning: A Conceptual Approach (TS, FM, JS), pp. 94–102.
HCIDUXU-WM-2013-SchutzOV #automation #development #evaluation #usability
SysML-Based Approach for Automation Software Development — Explorative Usability Evaluation of the Provided Notation (DS, MO, BVH), pp. 568–574.
HCIDUXU-WM-2013-Tussyadiah #case study #experience #mobile #platform
Meta-design Approach for Mobile Platforms Supporting Creative Tourism Experiences (IPT), pp. 733–739.
HCIDUXU-WM-2013-WilliamsGMW #enterprise #performance
A User Centred Approach to Determining the Impact of Faster Broadband on Small and Medium Sized Enterprises (DW, AG, JM, JW), pp. 140–149.
HCIDUXU-WM-2013-WilliamsGMW13a
A User Centred Approach to Evaluating the Future Demand for Bandwidth from Consumers (DW, AG, JM, JW), pp. 150–159.
HCIHCI-AMTE-2013-HashizumeK #comprehension #design #development #experience #user interface
Understanding User Experience and Artifact Development through Qualitative Investigation: Ethnographic Approach for Human-Centered Design (AH, MK), pp. 68–76.
HCIHCI-III-2013-SouiAG #adaptation #design #fuzzy #logic
Fuzzy Logic Approach for Adaptive Systems Design (MS, MA, KG), pp. 141–150.
HCIHCI-IMT-2013-BarbeWM #design
Human Centered Design Approach to Integrate Touch Screen in Future Aircraft Cockpits (JB, MW, RM), pp. 429–438.
HCIHCI-UC-2013-KleinS #development #industrial #process #social #social media
Social Media in the Product Development Process of the Automotive Industry: A New Approach (AK, GS), pp. 396–401.
HCIHIMI-D-2013-EbbessonE #design #industrial
A User Driven Design Approach to Creating UGC Services — Challenging the Newspaper Industry (EE, CIE), pp. 187–196.
HCIHIMI-D-2013-KlomannM #interactive #named #prototype
Freiform: A SmartPen Based Approach for Creating Interactive Paper Prototypes for Collecting Data (MK, JTM), pp. 316–321.
HCIHIMI-D-2013-OhnoNK #design
Environment-Centered Approach to ICT Service Design (TO, MN, YK), pp. 347–356.
HCIHIMI-HSM-2013-AhramKAF #energy
Power and Energy Management: A User-Centered System-of-Systems Engineering Approach (TZA, WK, BA, PF), pp. 3–12.
HCIHIMI-HSM-2013-WadaNS
Approach to Haptic Guidance Control in Steering Operation Based on Cooperative States between Driver and Control System (TW, RN, SS), pp. 596–605.
HCIHIMI-HSM-2013-Wesugi #design #experience #novel #simulation #using
Design Approach of Simulation Exercise with Use of Device and Its Significance — Design of Novel Device for Realistic Experience of Being a Hemiplegia Patient (SW), pp. 315–324.
HCIHIMI-LCCB-2013-NarumiKHATH
Digital Railway Museum: An Approach to Introduction of Digital Exhibition Systems at the Railway Museum (TN, TK, TH, KA, TT, MH), pp. 238–247.
HCIHIMI-LCCB-2013-YuL #feedback #mining
Exploring User Feedback of a E-Learning System: A Text Mining Approach (WBY, RL), pp. 182–191.
HCIOCSC-2013-AlaouiL #communication #design
A LivingLab Approach to Involve Elderly in the Design of Smart TV Applications Offering Communication Services (MA, ML), pp. 325–334.
HCIOCSC-2013-HallCW #community #predict
Well-Being’s Predictive Value — A Gamified Approach to Managing Smart Communities (MH, SC, CW), pp. 13–22.
HCIOCSC-2013-JiangB #case study #multi #network #social
A Three-Level Approach to the Study of Multi-cultural Social Networking (YJ, OdB), pp. 365–374.
VISSOFTVISSOFT-2013-FittkauWWH #scalability #visualisation
Live trace visualization for comprehending large software landscapes: The ExplorViz approach (FF, JW, CW, WH), pp. 1–4.
CAiSECAiSE-2013-BakkerFV #detection #hybrid #web
A Hybrid Model Words-Driven Approach for Web Product Duplicate Detection (MdB, FF, DV), pp. 149–161.
CAiSECAiSE-2013-MaggiBA #knowledge-based
A Knowledge-Based Integrated Approach for Discovering and Repairing Declare Maps (FMM, RPJCB, WMPvdA), pp. 433–448.
EDOCEDOC-2013-GoknilKM #metamodelling #modelling #multi #reasoning #requirements
A metamodeling approach for reasoning on multiple requirements models (AG, IK, JVM), pp. 159–166.
EDOCEDOC-2013-SelwayGMS #formal method #natural language #specification #using
Formalising Natural Language Specifications Using a Cognitive Linguistics/Configuration Based Approach (MS, GG, WM, MS), pp. 59–68.
EDOCEDOC-2013-SousaMGM #architecture #data type #enterprise #risk management #using
Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
EDOCEDOC-2013-TranZ #analysis #architecture #verification
Event Actors Based Approach for Supporting Analysis and Verification of Event-Driven Architectures (HT, UZ), pp. 217–226.
ICEISICEIS-J-2013-BouneffaA13a #graph grammar #impact analysis #ontology
The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach (MB, AA), pp. 280–295.
ICEISICEIS-J-2013-GiordanoTSAF13a #architecture #case study #enterprise #ontology #semantics
Joining Data and Maps in the Government Enterprise Architecture by a Semantic Approach: Methodology, Ontology and Case Study (DG, AT, CS, SA, AF), pp. 506–519.
ICEISICEIS-J-2013-PintoKG13a #analysis #architecture #automation #evaluation #metadata
An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
ICEISICEIS-J-2013-VaniyaBN13a
Analysing the M&A Preparedness Building Approach (NV, PB, ON), pp. 459–473.
ICEISICEIS-v1-2013-BevacquaCFGP #abstraction #adaptation #predict #process
A Data-adaptive Trace Abstraction Approach to the Prediction of Business Process Performances (AB, MC, FF, MG, LP), pp. 56–65.
ICEISICEIS-v1-2013-LimaSKCF #enterprise #evolution
A Delta Oriented Approach to the Evolution and Reconciliation of Enterprise Software Products Lines (GL, JS, UK, DAdC, SVF), pp. 255–263.
ICEISICEIS-v1-2013-OliveiraB #modelling #novel #process #standard
ETL Standard Processes Modelling — A Novel BPMN Approach (BCdSO, OB), pp. 120–127.
ICEISICEIS-v1-2013-ZaamouneBPB #analysis #multi #relational
A New Relational Spatial OLAP Approach for Multi-resolution and Spatio-multidimensional Analysis of Incomplete Field Data (MZ, SB, FP, PB), pp. 145–152.
ICEISICEIS-v2-2013-Abbo
The Analytical Approach to Information Value Management (DA), pp. 549–554.
ICEISICEIS-v2-2013-BenhaddiBA #evaluation #formal method #implementation #user satisfaction
Formalization of the User Centric SOA Approach — Implementation and End User Satisfaction Evaluation (MB, KB, EHA), pp. 481–488.
ICEISICEIS-v2-2013-ClayerTC #adaptation #design #education #towards
Towards a Pattern-based Adaptive Approach for Instructional Design based on Teacher’s Pedagogical Design Scheme (JPC, CT, CC), pp. 532–538.
ICEISICEIS-v2-2013-FragalSGJ #embedded #product line #specification
Application Engineering for Embedded Systems — Transforming SysML Specification to Simulink within a Product-Line based Approach (VHF, RFS, IMdSG, EAdOJ), pp. 94–101.
ICEISICEIS-v2-2013-KuCY #recommendation
Effect of Product Type and Recommendation Approach on Consumers’ Intention to Purchase Recommended Products (YCK, CHC, CSY), pp. 475–480.
ICEISICEIS-v2-2013-RibeiroS #modelling #realtime #requirements
An Approach for Modeling Real-time Requirements with SysML and MARTE Stereotypes (FGCR, MSS), pp. 70–81.
ICEISICEIS-v2-2013-SilvaFJGO #embedded #named #product line
SyMPLES — A SysML-based Approach for Developing Embedded Systems Software Product Lines (RFS, VHF, EAdOJ, IMdSG, FO), pp. 257–264.
ICEISICEIS-v2-2013-TomasSGGA #api #architecture #framework #using
Synaptic City — An Architectural Approach using an OSGI Infrastructure and GMaps API to Build a City Simulator (GHRPT, WMdS, KG, VCG, ), pp. 427–434.
ICEISICEIS-v2-2013-WolfengagenRSBS #modelling #process #towards
Applicative Approach to Information Processes Modeling — Towards a Constructive Information Theory (VW, VR, LS, AB, AS), pp. 323–328.
ICEISICEIS-v3-2013-AhmadO #architecture #enterprise #process #semantics
A New Approach to Semantically Derive Enterprise Information Architecture from Business Process Architecture (MA, MO), pp. 363–369.
ICEISICEIS-v3-2013-GiordanoTSAF #architecture #case study #enterprise #ontology
An Ontology based Approach to Integrate Data and Maps — In the Government Enterprise Architecture: A Case Study (DG, AT, CS, SA, AF), pp. 356–362.
ICEISICEIS-v3-2013-GromoffKPS #architecture #enterprise #flexibility
Newer Approach to Flexible Business Architecture of Modern Enterprise (AG, NK, MP, YS), pp. 326–332.
ICEISICEIS-v3-2013-LangermeierBB #architecture #distributed #enterprise #framework #modelling #using
A Model Driven Approach for Open Distributed Systems using an Enterprise Architecture Framework (ML, AJB, BB), pp. 284–291.
ICEISICEIS-v3-2013-LuxHH #enterprise #flexibility #representation #towards
Towards Enterprise Management Systems — A Generic and Flexible Information Representation Approach (AL, JH, RH), pp. 251–257.
ICEISICEIS-v3-2013-PanTG #dependence #modelling #ontology #process
Artefact-oriented Business Process Modelling — An Ontological Dependency Approach (YCP, YT, SRG), pp. 223–230.
ICEISICEIS-v3-2013-SbaiFK #adaptation #configuration management #modelling #process #towards
Towards a Process Patterns based Approach for Promoting Adaptability in Configurable Process Models (HS, MF, LK), pp. 382–387.
CIKMCIKM-2013-HashemiNB #learning #network #retrieval #topic
Expertise retrieval in bibliographic network: a topic dominance learning approach (SHH, MN, HB), pp. 1117–1126.
CIKMCIKM-2013-JabbourSSU
Mining-based compression approach of propositional formulae (SJ, LS, YS, TU), pp. 289–298.
CIKMCIKM-2013-KimNC #modelling #probability #social #social media
Modeling dynamics of meta-populations with a probabilistic approach: global diffusion in social media (MK, DN, PC), pp. 489–498.
CIKMCIKM-2013-RousseauV #ad hoc #information retrieval
Graph-of-word and TW-IDF: new approach to ad hoc IR (FR, MV), pp. 59–68.
CIKMCIKM-2013-TianCZ #database #hybrid #mobile #privacy #query
A hybrid approach for privacy-preserving processing of knn queries in mobile database systems (ST, YC, QZ), pp. 1161–1164.
CIKMCIKM-2013-WangLZ #graph #metric #multi #random #towards
Towards metric fusion on multi-view data: a cross-view based graph random walk approach (YW, XL, QZ), pp. 805–810.
ECIRECIR-2013-IgnatovKC #detection
Near-Duplicate Detection for Online-Shops Owners: An FCA-Based Approach (DII, AVK, YC), pp. 722–725.
ECIRECIR-2013-RahimiS #corpus #modelling
A Language Modeling Approach for Extracting Translation Knowledge from Comparable Corpora (RR, AS), pp. 606–617.
ICMLICML-c1-2013-BootsG #learning
A Spectral Learning Approach to Range-Only SLAM (BB, GJG), pp. 19–26.
ICMLICML-c1-2013-GiguereLMS #algorithm #bound #learning #predict
Risk Bounds and Learning Algorithms for the Regression Approach to Structured Output Prediction (SG, FL, MM, KS), pp. 107–114.
ICMLICML-c1-2013-GonenSS #learning #performance
Efficient Active Learning of Halfspaces: an Aggressive Approach (AG, SS, SSS), pp. 480–488.
ICMLICML-c1-2013-KadriGP #kernel #learning
A Generalized Kernel Approach to Structured Output Learning (HK, MG, PP), pp. 471–479.
ICMLICML-c1-2013-NarasimhanA #optimisation
A Structural SVM Based Approach for Optimizing Partial AUC (HN, SA), pp. 516–524.
ICMLICML-c2-2013-WangK13a #message passing #problem
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passing (HW, DK), pp. 190–198.
ICMLICML-c3-2013-DembczynskiJKWH #classification #multi #optimisation #plugin
Optimizing the F-Measure in Multi-Label Classification: Plug-in Rule Approach versus Structured Loss Minimization (KD, AJ, WK, WW, EH), pp. 1130–1138.
ICMLICML-c3-2013-GermainHLM #adaptation #classification #linear
A PAC-Bayesian Approach for Domain Adaptation with Specialization to Linear Classifiers (PG, AH, FL, EM), pp. 738–746.
ICMLICML-c3-2013-GuptaPV #learning #multi #parametricity
Factorial Multi-Task Learning : A Bayesian Nonparametric Approach (SKG, DQP, SV), pp. 657–665.
ICMLICML-c3-2013-Izbicki #algebra #classification #online #parallel #performance
Algebraic classifiers: a generic approach to fast cross-validation, online training, and parallel training (MI), pp. 648–656.
ICMLICML-c3-2013-NiuJDHS #learning #novel
Squared-loss Mutual Information Regularization: A Novel Information-theoretic Approach to Semi-supervised Learning (GN, WJ, BD, HH, MS), pp. 10–18.
KDDKDD-2013-CuiJYWZY #data-driven #network #predict
Cascading outbreak prediction in networks: a data-driven approach (PC, SJ, LY, FW, WZ, SY), pp. 901–909.
KDDKDD-2013-LiuCZ #performance #probability
Summarizing probabilistic frequent patterns: a fast approach (CL, LC, CZ), pp. 527–535.
KDDKDD-2013-NiemannW #collaboration #recommendation
A new collaborative filtering approach for increasing the aggregate diversity of recommender systems (KN, MW), pp. 955–963.
KDDKDD-2013-Vatsavai #learning #multi #using
Gaussian multiple instance learning approach for mapping the slums of the world using very high resolution imagery (RRV), pp. 1419–1426.
KDDKDD-2013-ZafaraniL #behaviour #social #social media
Connecting users across social media sites: a behavioral-modeling approach (RZ, HL), pp. 41–49.
KDDKDD-2013-ZhouTWN #predict #probability
A “semi-lazy” approach to probabilistic path prediction (JZ, AKHT, WW, WSN), pp. 748–756.
KDIRKDIR-KMIS-2013-CheetiSC #adaptation #classification #naive bayes #sentiment #syntax #using
Cross-domain Sentiment Classification using an Adapted Naïve Bayes Approach and Features Derived from Syntax Trees (SC, AS, DC), pp. 169–176.
KDIRKDIR-KMIS-2013-DimasKV #sentiment #twitter
Every Character Counts — A Character based Approach to Determine Political Sentiment on Twitter (AD, PCK, EMV), pp. 261–266.
KDIRKDIR-KMIS-2013-FerchichiBF #adaptation #image #predict
An Approach based on Adaptive Decision Tree for Land Cover Change Prediction in Satellite Images (AF, WB, IRF), pp. 82–90.
KDIRKDIR-KMIS-2013-MattaD #design #memory management
Memory Meetings — An Approach to Keep Track of Project Knowledge in Design (NM, GD), pp. 336–343.
KDIRKDIR-KMIS-2013-MorganK #ambiguity #twitter
A Generic Open World Named Entity Disambiguation Approach for Tweets (MBM, MvK), pp. 267–276.
KDIRKDIR-KMIS-2013-NhungNCLT #image #learning #multi
A Multiple Instance Learning Approach to Image Annotation with Saliency Map (TPN, CTN, JC, HVL, TT), pp. 152–159.
KDIRKDIR-KMIS-2013-SmirnovSK #multi #self #smarttech
Multilevel Self-Organization in Smart Environment — Service-Oriented Approach (AVS, NS, AK), pp. 290–297.
KDIRKDIR-KMIS-2013-SucaS #documentation #ontology #using
An Ontology for Portability and Interoperability Digital Documents — An Approach in Document Engineering using Ontologies (EGS, FSCdS), pp. 373–380.
KEODKEOD-2013-AveiroP13a #enterprise #implementation #ontology #semantics
Implementing Organizational Self Awareness — A Semantic Mediawiki based Enterprise Ontology Management Approach (DA, DP), pp. 453–461.
KEODKEOD-2013-BouiadjraB #ontology
User-centered Approach for Evaluating Ontologies (ABB, SMB), pp. 192–198.
KEODKEOD-2013-ChulyadyoHB #automation #ontology
Core Ontology based Approach for Treating the Flatness of Automatically Built Ontology (RC, MH, GB), pp. 316–323.
KEODKEOD-2013-CostaFML #classification #information management #ontology #using
Classification of Knowledge Representations using an Ontology-based Approach (RC, PF, PMNM, CL), pp. 184–191.
KEODKEOD-2013-PaniLCB #web
An Approach to Manage the Web Knowledge (FEP, MIL, GC, GB), pp. 81–88.
KEODKEOD-2013-SouissiCG #ontology #semantics
A Semantic-based Approach for Ontology Module Extraction (AS, WC, KG), pp. 222–229.
KEODKEOD-2013-ZarradDZ #wiki
Title-based Approach to Relation Discovery from Wikipedia (RZ, ND, EZ), pp. 70–80.
MLDMMLDM-2013-LiuLM #combinator #lightweight #multi
A Lightweight Combinatorial Approach for Inferring the Ground Truth from Multiple Annotators (XL, LL, NDM), pp. 616–628.
RecSysRecSys-2013-Shi #graph #recommendation #similarity
Trading-off among accuracy, similarity, diversity, and long-tail: a graph-based recommendation approach (LS), pp. 57–64.
SEKESEKE-2013-AdamE #multi
A multi-dimensional approach for analyzing software artifacts (SA, GEB), pp. 650–655.
SEKESEKE-2013-DingXG #petri net #specification
An Approach for Analyzing Software Specifications in Petri Nets (JD, DX, JG), pp. 411–416.
SEKESEKE-2013-DuttaAKB #distributed
Virtual Medical Board: A Distributed Bayesian Agent Based Approach (AD, SA, AK, SB), pp. 685–688.
SEKESEKE-2013-FelizardoBM #overview #replication #validation #visual notation
A Visual Approach to Validate the Selection Review of Primary Studies in Systematic Reviews: A Replication Study (KRF, EFB, JCM), pp. 141–146.
SEKESEKE-2013-FerreiraVQ #product line #testing
A Mutation Approach to Feature Testing of Software Product Lines (JMF, SRV, MAQ), pp. 232–237.
SEKESEKE-2013-Lacanienta0TO #generative #knowledge-based #web
A Knowledge-based Approach for Generating Test Scenarios for Web Applications (RL, ST, HT, MO), pp. 166–171.
SEKESEKE-2013-MarcolinoOGM #case study #effectiveness #towards #variability
Towards the Effectiveness of a Variability Management Approach at Use Case Level (AM, EAOJ, IMSG, JCM), pp. 214–219.
SEKESEKE-2013-MolleriSB #automation #overview #process
Proposal of an Automated Approach to Support the Systematic Review of Literature Process (JSM, LEdS, FBVB), pp. 488–493.
SEKESEKE-2013-MoshirpourEF #automation #ontology #using
Automated Construction of System Domain Knowledge Using an Ontology-Based Approach (MM, AE, BHF), pp. 63–66.
SEKESEKE-2013-SadiqJ #elicitation #fuzzy #process #requirements
A fuzzy based approach for requirements prioritization in goal oriented requirements elicitation process (MS, SKJ), pp. 54–58.
SEKESEKE-2013-SeveroFS #collaboration #game studies #risk management
A Dialogue Game Approach to Collaborative Risk Management (FS, LMF, LAdLS), pp. 548–551.
SEKESEKE-2013-SilvaD #semantics
A context-aware approach on semantic trajectories (CS, MARD), pp. 435–440.
SEKESEKE-2013-SilvaVMA #product line
Scrum-based Approach for Analyzing Commonalities and Variabilities in Software Product Lines (IFdS, TV, SRLM, ESdA), pp. 238–243.
SEKESEKE-2013-TaoLG #architecture #component #configuration management #incremental #testing #using
Testing Configurable Architectures For Component-Based Software Using an Incremental Approach (CT, BL, JG), pp. 356–361.
SIGIRSIGIR-2013-Boehm #information management #knowledge-based
Group-support for task-based information searching: a knowledge-based approach (TB), p. 1141.
SIGIRSIGIR-2013-FreitasFOC #graph #linked data #natural language #open data #query #semantics
Answering natural language queries over linked data graphs: a distributional semantics approach (AF, FFdF, SO, EC), pp. 1107–1108.
SIGIRSIGIR-2013-WuF #feedback #incremental #performance #pseudo
An incremental approach to efficient pseudo-relevance feedback (HW, HF), pp. 553–562.
AMTAMT-2013-MatragkasKPZ #model transformation #testing
A Traceability-Driven Approach to Model Transformation Testing (NDM, DSK, RFP, AZ), pp. 2–11.
ECMFAECMFA-2013-AmbertBLLP #modelling #testing
Applying a Def-Use Approach on Signal Exchange to Implement SysML Model-Based Testing (FA, FB, JL, BL, FP), pp. 134–151.
ICMTICMT-2013-FaunesSB #model transformation
Genetic-Programming Approach to Learn Model Transformation Rules from Examples (MF, HAS, MB), pp. 17–32.
ICMTICMT-2013-RuscioIP #atl #co-evolution #evolution #metamodelling
A Methodological Approach for the Coupled Evolution of Metamodels and ATL Transformations (DDR, LI, AP), pp. 60–75.
ICMTICMT-2013-WieberS #graph transformation #testing
Systematic Testing of Graph Transformations: A Practical Approach Based on Graph Patterns (MW, AS), pp. 205–220.
MODELSMoDELS-2013-ArkinTI #algorithm #modelling #parallel #platform
Model-Driven Approach for Supporting the Mapping of Parallel Algorithms to Parallel Computing Platforms (EA, BT, KMI), pp. 757–773.
MODELSMoDELS-2013-ChavezSFM #implementation #java #testing #uml
An Approach to Testing Java Implementation against Its UML Class Model (HMC, WS, RBF, BAM), pp. 220–236.
MODELSMoDELS-2013-Gonzalez-HuertaIA #architecture #multi #validation
Defining and Validating a Multimodel Approach for Product Architecture Derivation and Improvement (JGH, EI, SA), pp. 388–404.
MODELSMoDELS-2013-RajbhojR #detection #metamodelling #version control
A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
MODELSMoDELS-2013-ZalilaCP #domain-specific language #integration #verification
Formal Verification Integration Approach for DSML (FZ, XC, MP), pp. 336–351.
SPLCSPLC-2013-Quinton0D #constraints #feature model #modelling
Cardinality-based feature models with constraints: a pragmatic approach (CQ, DR, LD), pp. 162–166.
TOOLSTOOLS-EUROPE-J-2012-LilisS13 #debugging #fault #metaprogramming
An Integrated Approach to Source Level Debugging and Compile Error Reporting in Metaprograms (YL, AS), pp. 1–26.
AdaEuropeAdaEurope-2013-AsensioLCN #analysis #execution #safety #worst-case
Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
HILTHILT-2013-WardRL #integration #process
An approach to integration of complex systems: the SAVI virtual integration process (DTW, DAR, BAL), pp. 43–46.
LOPSTRLOPSTR-2013-AlbertGG #analysis
A Transformational Approach to Resource Analysis with Typed-Norms (EA, SG, RG), pp. 38–53.
PPDPPPDP-2013-LamoMRL #bidirectional #declarative #graph #model transformation
A declarative and bidirectional model transformation approach based on graph co-spans (YL, FM, AR, JdL), pp. 1–12.
PPDPPPDP-2013-MatsudaW #bidirectional #for free #problem #runtime
Bidirectionalization for free with runtime recording: or, a light-weight approach to the view-update problem (KM, MW), pp. 297–308.
REER-BR-2013-CabrejosMC #development #elicitation #requirements #usability #web
An Approach for the Elicitation of Usability Requirements in the Development of Web Applications (LJERC, SM, TC).
REER-BR-2013-GuedesSC #product line
Goals and Scenarios to Software Product Lines: the GS2SPL Approach (GG, CTLLS, JC).
RERE-2013-NistalaK #analysis #consistency #requirements #validation
An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure (PN, PK), pp. 320–325.
RERE-2013-Valenca #ecosystem #evolution #requirements #social
Requirements negotiation model: A social oriented approach for software ecosystems evolution (GV), pp. 393–396.
REFSQREFSQ-2013-Cleland-HuangCK #agile #architecture #requirements
A Persona-Based Approach for Exploring Architecturally Significant Requirements in Agile Projects (JCH, AC, EK), pp. 18–33.
ASEASE-2013-ChandramohanTBSP #behaviour #bound #detection #modelling #scalability
A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
ASEASE-2013-Garcia-GalanTC #game studies #multi #variability
Multi-user variability configuration: A game theoretic approach (JGG, PT, ARC), pp. 574–579.
ASEASE-2013-GuoCASW #learning #performance #predict #statistics #variability
Variability-aware performance prediction: A statistical learning approach (JG, KC, SA, NS, AW), pp. 301–311.
ASEASE-2013-KifetewJTOT #grammarware #named #source code
SBFR: A search based approach for reproducing failures of programs with grammar based input (FMK, WJ, RT, AO, PT), pp. 604–609.
ASEASE-2013-PilgrimUTS #co-evolution
Model/code co-refactoring: An MDE approach (JvP, BU, AT, FS), pp. 682–687.
ASEASE-2013-RegerBR #mining #parametricity #specification
A pattern-based approach to parametric specification mining (GR, HB, DER), pp. 658–663.
ASEASE-2013-VeerappaH #maturity #requirements
Assessing the maturity of requirements through argumentation: A good enough approach (VV, RH), pp. 670–675.
ESEC-FSEESEC-FSE-2013-MockusHP #quality #risk management
Risky files: an approach to focus quality improvement effort (AM, RLH, JDP), pp. 691–694.
ESEC-FSEESEC-FSE-2013-WangHJK #evaluation
Searching for better configurations: a rigorous approach to clone evaluation (TW, MH, YJ, JK), pp. 455–465.
ICSEICSE-2013-AversanoCRT
An approach for restructuring text content (LA, GC, GDR, MT), pp. 1225–1228.
ICSEICSE-2013-BortisH #debugging #named
PorchLight: a tag-based approach to bug triaging (GB, AvdH), pp. 342–351.
ICSEICSE-2013-CarrenoW #analysis #evolution #requirements
Analysis of user comments: an approach for software requirements evolution (LVGC, KW), pp. 582–591.
ICSEICSE-2013-Che #architecture #design #evolution
An approach to documenting and evolving architectural design decisions (MC), pp. 1373–1376.
ICSEICSE-2013-Kukreja #requirements #towards
Decision theoretic requirements prioritization: a two-step approach for sliding towards value realization (NK), pp. 1465–1467.
ICSEICSE-2013-NetoCLGM #named #problem #programming #student #testing
POPT: a problem-oriented programming and testing approach for novice students (VLN, RC, LL, DSG, APM), pp. 1099–1108.
ICSEICSE-2013-PanichellaDOPPL #algorithm #effectiveness #how #modelling #re-engineering #search-based #topic
How to effectively use topic models for software engineering tasks? an approach based on genetic algorithms (AP, BD, RO, MDP, DP, ADL), pp. 522–531.
SACSAC-2013-AbdallahHA #design #quantifier
Quantified extreme scenario based design approach (AA, RH, MAA), pp. 1117–1122.
SACSAC-2013-AraujoGMSAB #composition #feature model #modelling
Advanced modularity for building SPL feature models: a model-driven approach (JA, MG, AMDM, IS, VA, ELAB), pp. 1246–1253.
SACSAC-2013-AzarianCWB #manycore #pipes and filters
An FPGA-based multi-core approach for pipelining computing stages (AA, JMPC, SW, JB), pp. 1533–1540.
SACSAC-2013-BakreBE #interactive #uml
Aspect interaction chart — a UML approach for modularizing aspect interaction conflicts (SB, AB, TE), pp. 1254–1259.
SACSAC-2013-BasgaluppBSC #predict
Software effort prediction: a hyper-heuristic decision-tree based approach (MPB, RCB, TSdS, ACPLFC), pp. 1109–1116.
SACSAC-2013-BlancoMLJ #probability
A Kalman filter based approach to probabilistic gas distribution mapping (JLB, JGM, AJL, JGJ), pp. 217–222.
SACSAC-2013-JungS #garbage collection #named
LINK-GC: a preemptive approach for garbage collection in NAND flash storages (SJ, YHS), pp. 1478–1484.
SACSAC-2013-KaratasK #composition #flexibility #security
A flexible approach for considering interdependent security objectives in service composition (FK, DK), pp. 1919–1926.
SACSAC-2013-KinderenP #named
e3RoME: a value-based approach for method bundling (SdK, HAP), pp. 1469–1471.
SACSAC-2013-LaneseBF #calculus #internet #process
Internet of things: a process calculus approach (IL, LB, MDF), pp. 1339–1346.
SACSAC-2013-LiBB #ad hoc #composition #web #web service
Service farming: an ad-hoc and QoS-aware web service composition approach (WL, YB, FB), pp. 750–756.
SACSAC-2013-LinCLG #data-driven #distributed #learning #predict
Distributed dynamic data driven prediction based on reinforcement learning approach (SYL, KMC, CCL, NG), pp. 779–784.
SACSAC-2013-LiZSL #graph #mining #named #novel
WAVE-CIA: a novel CIA approach based on call graph mining (BL, QZ, XS, HL), pp. 1000–1005.
SACSAC-2013-Marques-NetoAV #maintenance
A quantitative approach for evaluating software maintenance services (HMN, GJA, MTV), pp. 1068–1073.
SACSAC-2013-MehtaRCN #dependence #using
Selecting among alternatives using dependencies: an NFR approach (RM, TRL, LC, MN), pp. 1292–1297.
SACSAC-2013-MeloAOAMB #analysis #concept #visual notation
A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
SACSAC-2013-PougetSCM #data flow #debugging #embedded #interactive #novel
A novel approach for interactive debugging of dynamic dataflow embedded applications (KP, MS, PLC, JFM), pp. 1547–1549.
SACSAC-2013-SaitoRFSG #image #performance #reduction
A data reduction and organization approach for efficient image annotation (PTMS, PJdR, AXF, CTNS, JFG), pp. 53–57.
SACSAC-2013-TounsiKKDM #design pattern #formal method #modelling #towards
Towards an approach for modeling and formalizing SOA design patterns with Event-B (IT, MHK, AHK, KD, EM), pp. 1937–1938.
SACSAC-2013-VivianHL #development #distributed
Supporting distributed software development through context awareness on software artifacts: the DiSEN-CollaborAR approach (RLV, EHMH, GCLL), pp. 765–770.
SACSAC-2013-WaflerH #analysis #dependence #grid #modelling #smarttech
A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
SACSAC-2013-XuTTZ #fault #fine-grained
An instruction-level fine-grained recovery approach for soft errors (JX, QT, LT, HZ), pp. 1511–1516.
SLESLE-2013-DialloCL #formal method #modelling #using
A Model-Driven Approach to Enhance Tool Interoperability Using the Theory of Models of Computation (PID, JC, LL), pp. 218–237.
ASPLOSASPLOS-2013-DashtiFFGLLQR #memory management
Traffic management: a holistic approach to memory placement on NUMA systems (MD, AF, JRF, FG, RL, BL, VQ, MR), pp. 381–394.
ASPLOSASPLOS-2013-KangW #hardware
To hardware prefetch or not to prefetch?: a virtualized environment study and core binding approach (HK, JLW), pp. 357–368.
CASECASE-2013-ChenZL #design #novel
A novel design approach for lower limb rehabilitation training robot (JC, XZ, RL), pp. 554–557.
CASECASE-2013-HeZJ #fault #robust
UIO based robust fault diagnosis approach for aero-engine fiber-optic sensor (CH, XZ, BJ), pp. 550–553.
CASECASE-2013-KernschmidtV #modelling
An interdisciplinary SysML based modeling approach for analyzing change influences in production plants to support the engineering (KK, BVH), pp. 1113–1118.
CASECASE-2013-LiF #integer #linear #multi #problem #programming #scheduling
A mixed integer linear programming approach for multi-degree cyclic multi-hoist scheduling problems without overlapping (XL, RYKF), pp. 274–279.
CASECASE-2013-LiuZZ #data-driven #modelling
Data driven modeling of human welder intelligence: A neuro-fuzzy approach (YL, WZ, YZ), pp. 663–668.
CASECASE-2013-ParisioMVJ #predict
A scenario-based predictive control approach to building HVAC management systems (AP, MM, DV, KHJ), pp. 428–435.
CASECASE-2013-ShaoLW #markov
A Markov chain approach to study flow disruptions on surgery in emergency care (XS, JL, DAW), pp. 990–995.
CASECASE-2013-SunSZS #optimisation
A two-stage approach for VMAT treatment plan optimization (BS, JS, GZ, LS), pp. 455–460.
CASECASE-2013-XieLSD #analysis #markov #modelling #process
Modeling and analysis of hospital inpatient rescue process: A Markov chain approach (XX, JL, CHS, YD), pp. 978–983.
CASECASE-2013-YeWZML #network #optimisation #predict #scalability
A signal split optimization approach based on model predictive control for large-scale urban traffic networks (BLY, WW, XZ, WJM, JL), pp. 904–909.
DACDAC-2013-0001WAWG #empirical #estimation #towards
Towards variation-aware system-level power estimation of DRAMs: an empirical approach (KC, CW, BA, NW, KG), p. 8.
DACDAC-2013-EbrahimiAT #analysis #multi
A layout-based approach for multiple event transient analysis (ME, HA, MBT), p. 6.
DACDAC-2013-KuangY #composition #layout #performance
An efficient layout decomposition approach for triple patterning lithography (JK, EFYY), p. 6.
DACDAC-2013-MishraMD #design #multi
A heterogeneous multiple network-on-chip design: an application-aware approach (AKM, OM, CRD), p. 10.
DATEDATE-2013-AncajasCR
Proactive aging management in heterogeneous NoCs through a criticality-driven routing approach (DMA, KC, SR), pp. 1032–1037.
DATEDATE-2013-ChaG #detection #effectiveness #metric
Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost (BC, SKG), pp. 1265–1270.
DATEDATE-2013-DaloukasMETS #delivery #network #parallel #performance #power management
A parallel fast transform-based preconditioning approach for electrical-thermal co-simulation of power delivery networks (KD, AM, NEE, PT, GIS), pp. 1689–1694.
DATEDATE-2013-GuanYL0 #analysis #estimation
FIFO cache analysis for WCET estimation: a quantitative approach (NG, XY, ML, WY), pp. 296–301.
DATEDATE-2013-KumarCT #distributed #realtime #satisfiability
A satisfiability approach to speed assignment for distributed real-time systems (PK, DBC, LT), pp. 749–754.
DATEDATE-2013-LeeKPK
An integrated approach for managing the lifetime of flash-based SSDs (SL, TK, JP, JK), pp. 1522–1525.
DATEDATE-2013-LiD #debugging #hybrid #performance
A hybrid approach for fast and accurate trace signal selection for post-silicon debug (ML, AD), pp. 485–490.
DATEDATE-2013-Moy #modelling #parallel #programming
Parallel programming with SystemC for loosely timed models: a non-intrusive approach (MM), pp. 9–14.
DATEDATE-2013-MushtaqAB #fault tolerance #manycore #performance #platform
Efficient software-based fault tolerance approach on multicore platforms (HM, ZAA, KB), pp. 921–926.
DATEDATE-2013-RahimiBG #adaptation
Hierarchically focused guardbanding: an adaptive approach to mitigate PVT variations and aging (AR, LB, RKG), pp. 1695–1700.
DATEDATE-2013-ShreejithVFL #configuration management #network #using
An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
DATEDATE-2013-TodorovMRS #clustering #synthesis
A spectral clustering approach to application-specific network-on-chip synthesis (VT, DMG, HR, US), pp. 1783–1788.
DATEDATE-2013-WettinMPSG #design #energy #manycore
Energy-efficient multicore chip design through cross-layer approach (PW, JM, PPP, BS, AG), pp. 725–730.
DATEDATE-2013-YuZHWLT #manycore #set #simulation
A critical-section-level timing synchronization approach for deterministic multi-core instruction set simulations (FWY, BHZ, YHH, HIW, CRL, RST), pp. 643–648.
ISMMISMM-2013-Musuvathi #consistency #memory management #modelling
Safety-first approach to memory consistency models (MM), pp. 1–2.
PDPPDP-2013-AmorettiLS #distributed #execution
A Cooperative Approach for Distributed Task Execution in Autonomic Clouds (MA, ALL, SS), pp. 274–281.
PDPPDP-2013-BachCEEGKKLLPR #performance
A Comprehensive Approach for a Power Efficient General Purpose Supercomputer (MB, JdC, HE, DE, JG, SK, MK, VL, HJL, MP, DR), pp. 336–342.
PDPPDP-2013-IjazSW
Fewest Common Hops (FCH): An Improved Peer Selection Approach for P2P Applications (HI, SS, MW), pp. 449–453.
ESOPESOP-2013-SharmaGHALN #algebra #data-driven #invariant
A Data Driven Approach for Algebraic Loop Invariants (RS, SG, BH, AA, PL, AVN), pp. 574–592.
FASEFASE-2013-YangPX #automation #generative #mobile
A Grey-Box Approach for Automated GUI-Model Generation of Mobile Applications (WY, MRP, TX), pp. 250–265.
STOCSTOC-2013-BravermanM #complexity
An information complexity approach to extended formulations (MB, AM), pp. 161–170.
STOCSTOC-2013-LeeRS #using
A new approach to computing maximum flows using electrical flows (YTL, SR, NS), pp. 755–764.
TACASTACAS-2013-LindenW #memory management
A Verification-Based Approach to Memory Fence Insertion in PSO Memory Systems (AL, PW), pp. 339–353.
CAVCAV-2013-ArmoniFJ
SVA and PSL Local Variables — A Practical Approach (RA, DF, NJ), pp. 197–212.
ICLPICLP-J-2013-ErdemPSSU #multi
Finding optimal plans for multiple teams of robots through a mediator: A logic-based approach (EE, VP, ZGS, PS, TU), pp. 831–846.
ICLPICLP-J-2013-MaLWRL #analysis #declarative #distributed #execution #specification
A declarative approach to distributed computing: Specification, execution and analysis (JM, FL, DW, AR, JL), pp. 815–830.
ICSTICST-2013-GraslandBGP #functional #hybrid #safety #testing
A Functional Testing Approach for Hybrid Safety Properties with Incomplete Information (YG, LdB, RG, IP), pp. 104–113.
ICTSSICTSS-2013-VorobyovKS #memory management
A Dynamic Approach to Locating Memory Leaks (KV, PK, PS), pp. 255–270.
ISSTAISSTA-2013-TrippWG #learning #security #testing #web
Finding your way in the testing jungle: a learning approach to web security testing (OT, OW, LG), pp. 347–357.
ICSTSAT-2013-CimattiGSS #composition #modulo theories #satisfiability
A Modular Approach to MaxSAT Modulo Theories (AC, AG, BJS, RS), pp. 150–165.
ICSTSAT-2013-HeuleS #clique #satisfiability
A SAT Approach to Clique-Width (MH, SS), pp. 318–334.
ICSTSAT-2013-IgnatievJM #quantifier #satisfiability
Quantified Maximum Satisfiability: — A Core-Guided Approach (AI, MJ, JMS), pp. 250–266.
ICSTSAT-2013-MihalT #constraints #logic #programmable
A Constraint Satisfaction Approach for Programmable Logic Detailed Placement (AM, ST), pp. 208–223.
CBSECBSE-2012-GhafariJSH #architecture #component #configuration management #consistency
An architectural approach to ensure globally consistent dynamic reconfiguration of component-based systems (MG, PJ, SS, HH), pp. 177–182.
CBSECBSE-2012-MartinezV #component #realtime
An MDE approach to address synchronization needs in component-based real-time systems (PLM, TV), pp. 125–134.
QoSAQoSA-2012-DurdikR #architecture #design #modelling
Position paper: approach for architectural design and modelling with documented design decisions (ADMD3) (ZD, RHR), pp. 49–54.
WICSA-ECSAWICSA-ECSA-2012-KebirSCC #component #identification #object-oriented
Quality-Centric Approach for Software Component Identification from Object-Oriented Code (SK, ADS, SC, AC), pp. 181–190.
WICSA-ECSAWICSA-ECSA-2012-KuzZBSX #architecture #effectiveness
An Architectural Approach for Cost Effective Trustworthy Systems (IK, LZ, LB, MS, XX), pp. 325–328.
DocEngDocEng-2012-Delprat #documentation
Content and document based approach for digital productivity applications (TD), pp. 83–84.
DocEngDocEng-2012-IorioPPV #automation #documentation #recognition #xml
A first approach to the automatic recognition of structural patterns in XML documents (ADI, SP, FP, FV), pp. 85–94.
DRRDRR-2012-EsserSMBS #automation #documentation
Automatic indexing of scanned documents: a layout-based approach (DE, DS, KM, MB, AS).
DRRDRR-2012-SadawiSS #recognition #rule-based
Chemical structure recognition: a rule-based approach (NMS, APS, VS).
HTHT-2012-WalshOW #evaluation
Evaluation of a domain-aware approach to user model interoperability (EW, AO, VW), pp. 197–206.
HTHT-2012-WolffMC #named
Storyspace: a story-driven approach for creating museum narratives (AW, PM, TDC), pp. 89–98.
JCDLJCDL-2012-ParkEF #canonical #hybrid #independence #representation
A hybrid two-stage approach for discipline-independent canonical representation extraction from references (SHP, RWE, EAF), pp. 285–294.
SIGMODSIGMOD-2012-ChengKCC #distance #graph #performance #query #scalability
Efficient processing of distance queries in large graphs: a vertex cover approach (JC, YK, SC, CC), pp. 457–468.
SIGMODSIGMOD-2012-JinRXL #distance #graph #query #scalability
A highway-centric labeling approach for answering distance queries on large sparse graphs (RJ, NR, YX, VEL), pp. 445–456.
SIGMODSIGMOD-2012-XuKWCC #clustering #graph #modelling
A model-based approach to attributed graph clustering (ZX, YK, YW, HC, JC), pp. 505–516.
TPDLTPDL-2012-Gartner #metadata
Linking the Parliamentary Record: A New Approach to Metadata for Legislative Proceedings (RG), pp. 179–184.
TPDLTPDL-2012-GeelNN #named #using
PubLight: Managing Publications Using a Task-Oriented Approach (MG, MN, MCN), pp. 363–369.
TPDLTPDL-2012-MercunZA #named #product line #visualisation
FrbrVis: An Information Visualization Approach to Presenting FRBR Work Families (TM, MZ, TA), pp. 504–507.
VLDBVLDB-2012-SunHYY #analysis #mining #network
Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach (YS, JH, XY, PSY), pp. 2022–2023.
VLDBVLDB-2012-ZhaoRGH #integration
A Bayesian Approach to Discovering Truth from Conflicting Sources for Data Integration (BZ, BIPR, JG, JH), pp. 550–561.
ITiCSEITiCSE-2012-CookDHHJKS #abstraction #education #modelling
A systematic approach to teaching abstraction and mathematical modeling (CTC, SDS, JOH, JEH, DPJ, JK, MS), pp. 357–362.
ITiCSEITiCSE-2012-Kurmas #design
The presenter first design approach (ZK), p. 379.
ITiCSEITiCSE-2012-MorgadoB12a #problem
A structured approach to problem solving in CS1 (CM, FB), p. 399.
ITiCSEITiCSE-2012-Velazquez-Iturbide #algorithm #learning #refinement
Refinement of an experimental approach tocomputer-based, active learning of greedy algorithms (JÁVI), pp. 46–51.
SIGITESIGITE-2012-Wang #design #education #web
A holistic and pragmatic approach to teaching web accessibility in an undergraduate web design course (YDW), pp. 55–60.
CSMRCSMR-2012-Penta #developer #empirical #maintenance #reverse engineering
Empirical Studies in Reverse Engineering and Maintenance: Employing Developers to Evaluate Your Approach and Tool (MDP), pp. 567–568.
CSMRCSMR-2012-YoshidaKI #functional #maintenance #metric #source code
A Cohesion Metric Approach to Dividing Source Code into Functional Segments to Improve Maintainability (NY, MK, HI), pp. 365–370.
ICPCICPC-2012-MahmoudNX #semantics #traceability
A semantic relatedness approach for traceability link recovery (AM, NN, SX), pp. 183–192.
ICPCICPC-2012-Sajnani #architecture #automation #machine learning
Automatic software architecture recovery: A machine learning approach (HS), pp. 265–268.
ICSMEICSM-2012-BauerHD #library
A structured approach to assess third-party library usage (VB, LH, FD), pp. 483–492.
ICSMEICSM-2012-CorazzaMM #identifier #named #performance
LINSEN: An efficient approach to split identifiers and expand abbreviations (AC, SDM, VM), pp. 233–242.
ICSMEICSM-2012-DuseauDS #named #visual notation
Vasco: A visual approach to explore object churn in framework-intensive applications (FD, BD, HAS), pp. 15–24.
ICSMEICSM-2012-Perez-Castillo #information management #legacy #named #process
MARBLE: Modernization approach for recovering business processes from legacy information systems (RPC), pp. 671–676.
WCREWCRE-2012-AlomariCM #performance #scalability #slicing
A Very Efficient and Scalable Forward Static Slicing Approach (HWA, MLC, JIM), pp. 425–434.
WCREWCRE-2012-IchiiMNCO #automation #modelling #rule-based #source code
A Rule-based Automated Approach for Extracting Models from Source Code (MI, TM, YN, MC, HO), pp. 308–317.
WCREWCRE-2012-MaigaABSGA #anti #detection #incremental #named
SMURF: A SVM-based Incremental Anti-pattern Detection Approach (AM, NA, NB, AS, YGG, EA), pp. 466–475.
WCREWCRE-2012-MediniAGPT #execution #named
SCAN: An Approach to Label and Relate Execution Trace Segments (SM, GA, YGG, MDP, PT), pp. 135–144.
ICALPICALP-v1-2012-CharikarL #problem
A Dependent LP-Rounding Approach for the k-Median Problem (MC, SL), pp. 194–205.
ICALPICALP-v1-2012-LaekhanukitGS #problem
A Rounding by Sampling Approach to the Minimum Size k-Arc Connected Subgraph Problem (BL, SOG, MS), pp. 606–616.
ICALPICALP-v2-2012-BouyerMS #automaton #game studies #reachability #robust
Robust Reachability in Timed Automata: A Game-Based Approach (PB, NM, OS), pp. 128–140.
FMFM-2012-AsplundMBCC #coordination #formal method
A Formal Approach to Autonomous Vehicle Coordination (MA, AM, MB, SC, VC), pp. 52–67.
FMFM-2012-ZhaoZKL #case study #hybrid #industrial
A “Hybrid” Approach for Synthesizing Optimal Controllers of Hybrid Systems: A Case Study of the Oil Pump Industrial Example (HZ, NZ, DK, KGL), pp. 471–485.
IFMIFM-2012-IsobeMNR #capacity #csp #safety
Safety and Line Capacity in Railways — An Approach in Timed CSP (YI, FM, HNN, MR), pp. 54–68.
SEFMSEFM-2012-AbdelhalimST #effectiveness #model checking #optimisation
An Optimization Approach for Effective Formalized fUML Model Checking (IA, SS, HT), pp. 248–262.
SEFMSEFM-2012-BicknellRBCS #using #verification
A Practical Approach for Closed Systems Formal Verification Using Event-B (BB, JR, MJB, JC, CFS), pp. 323–332.
SEFMSEFM-2012-FathabadiBR #composition
A Systematic Approach to Atomicity Decomposition in Event-B (ASF, MJB, AR), pp. 78–93.
SEFMSEFM-2012-JanuzajKBM
A Configuration Approach for IMA Systems (VJ, SK, FB, RM), pp. 203–217.
SEFMSEFM-2012-LefticaruI #algorithm #finite #generative #search-based #state machine #testing #using
An Improved Test Generation Approach from Extended Finite State Machines Using Genetic Algorithms (RL, FI), pp. 293–307.
SEFMSEFM-2012-VorobyovKS #data flow #security
A Low-Overhead, Value-Tracking Approach to Information Flow Security (KV, PK, PS), pp. 367–381.
SEFMSEFM-2012-ZhuXMQQ #concurrent #source code #verification
The Rely/Guarantee Approach to Verifying Concurrent BPEL Programs (HZ, QX, CM, SQ, ZQ), pp. 172–187.
CoGCIG-2012-FoderaroSF #composition #game studies #modelling #online #video
A model-based cell decomposition approach to on-line pursuit-evasion path planning and the video game Ms. Pac-Man (GF, AS, SF), pp. 281–287.
CoGCIG-2012-JustinussenRCT #game studies
Resource systems in games: An analytical approach (TJ, PHR, AC, JT), pp. 171–178.
CoGCIG-2012-MachadoPC #automation #classification #modelling
A binary classification approach for automatic preference modeling of virtual agents in Civilization IV (MCM, GLP, LC), pp. 155–162.
CoGCIG-2012-SynnaeveB
Special tactics: A Bayesian approach to tactical decision-making (GS, PB), pp. 409–416.
FDGFDG-2012-Linderoth #challenge #game studies
Monkey see, monkey do: an ecological approach to challenges in games (JL), p. 1.
CoGVS-Games-2012-ClarkeADB #game studies #named
PR: EPARe: A Game-Based Approach to Relationship Guidance for Adolescents (SC, SA, ID, KB), pp. 38–44.
CoGVS-Games-2012-FernandesDRFPS #collaboration #elicitation #game studies #named #towards
iThink: A Game-Based Approach Towards Improving Collaboration and Participation in Requirement Elicitation (JF, DD, CR, CF, JMP, MMdS), pp. 66–77.
CoGVS-Games-2012-SuttieLLR #adaptation #game studies #realtime #towards
Towards a Biocybernetic Approach for Serious Games Real-time Psychophysiological Inferences for Adaptive Agents in Serious Games (NS, SL, TL, JR), pp. 316–317.
GT-VMTGT-VMT-2012-GabrielLE #algebra #petri net
Algebraic Approach to Timed Petri Nets (KG, PL, CE).
GT-VMTGT-VMT-2012-NatschlagerS #algebra #graph #graph transformation #inheritance
A Flattening Approach for Attributed Type Graphs with Inheritance in Algebraic Graph Transformation (CN, KDS).
CHICHI-2012-FrauenbergerGKP
Interpreting input from children: a designerly approach (CF, JG, WKB, HP), pp. 2377–2386.
CHICHI-2012-LazarFBMWHOE #interactive #proving
The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users (JL, JF, TB, GM, BW, JH, AO, NE), pp. 2267–2276.
CHICHI-2012-MorrisonMRSC #hybrid #mobile
A hybrid mass participation approach to mobile software trials (AM, DM, SR, SS, MC), pp. 1311–1320.
CHICHI-2012-Sae-BaeAIM #authentication #gesture #multi #novel
Biometric-rich gestures: a novel approach to authentication on multi-touch devices (NSB, KA, KI, NDM), pp. 977–986.
CHICHI-2012-WallnerK #analysis #visualisation
A spatiotemporal visualization approach for the analysis of gameplay data (GW, SK), pp. 1115–1124.
CSCWCSCW-2012-FuksMCVUB #co-evolution #collaboration #design
Collaborative museums: an approach to co-design (HF, HM, DC, KV, WU, MB), pp. 681–684.
CSCWCSCW-2012-NobaranyHF #collaboration #distributed #process #reuse
Facilitating the reuse process in distributed collaboration: a distributed cognition approach (SN, MH, BDF), pp. 1223–1232.
CSCWCSCW-2012-PaoMCR #collaboration #design
A need-driven design approach: addressing latent needs in collaboration rooted in early childhood (SYP, SM, KC, AR), pp. 829–832.
CAiSECAiSE-2012-DaskalakiP #multi
OtO Matching System: A Multi-strategy Approach to Instance Matching (ED, DP), pp. 286–300.
CAiSECAiSE-2012-KaragiannisMM #evaluation #heatmap #metamodelling
Compliance Evaluation Featuring Heat Maps (CE-HM): A Meta-Modeling-Based Approach (DK, CM, AM), pp. 414–428.
CAiSECAiSE-2012-LaraGC #modelling
Abstracting Modelling Languages: A Reutilization Approach (JdL, EG, JSC), pp. 127–143.
CAiSECAiSE-2012-LiptchinskyKTD #collaboration #modelling #novel #process #social
A Novel Approach to Modeling Context-Aware and Social Collaboration Processes (VL, RK, HLT, SD), pp. 565–580.
CAiSECAiSE-2012-NederstigtAVF #automation #e-commerce #taxonomy
An Automatic Approach for Mapping Product Taxonomies in E-Commerce Systems (LJN, SSA, DV, FF), pp. 334–349.
EDOCEDOC-2012-CostaMPA #detection #modelling #rule-based
A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection (PDC, ITM, IP, JPAA), pp. 154–163.
EDOCEDOC-2012-DohringSG #adaptation #aspect-oriented #model transformation #recursion #rule-based #runtime #weaving #workflow
Emulating Runtime Workflow Adaptation and Aspect Weaving by Recursive Rule-Based Sub-Process Selection — A Model Transformation Approach (MD, AS, IG), pp. 133–142.
ICEISICEIS-J-2012-GottardiPC12a #framework #modelling #reuse #using
Accelerating Crosscutting Framework Reuse Using a Model-Based Approach (TG, OPL, VVdC), pp. 257–273.
ICEISICEIS-J-2012-KaragiannisS #design #hybrid #modelling
An Engineering Approach for the Design of Hybrid Modelling Methods (DK, MS), pp. 3–17.
ICEISICEIS-J-2012-RibeiroFBKE #algorithm #learning #markov #process
Combining Learning Algorithms: An Approach to Markov Decision Processes (RR, FF, MACB, ALK, FE), pp. 172–188.
ICEISICEIS-J-2012-XavierN12a #component
Measuring Users’ Emotions with a Component-Based Approach (RACX, VPdAN), pp. 393–409.
ICEISICEIS-v1-2012-BoulilBP #ocl #quality #uml
A UML & Spatial OCL based Approach for Handling Quality Issues in SOLAP Systems (KB, SB, FP), pp. 99–104.
ICEISICEIS-v1-2012-Dustdar #design #novel
Design by Units — A Novel Approach for Building Elastic Systems (SD).
ICEISICEIS-v1-2012-RibeiroFBBDKE #algorithm #learning
Unified Algorithm to Improve Reinforcement Learning in Dynamic Environments — An Instance-based Approach (RR, FF, MACB, APB, OBD, ALK, FE), pp. 229–238.
ICEISICEIS-v1-2012-ZianiRO #constraints #mining #multi
A Constraint-based Mining Approach for Multi-attribute Index Selection (BZ, FR, YO), pp. 93–98.
ICEISICEIS-v2-2012-CapelM #automation #composition #correctness #model checking #safety #verification
A Formal Compositional Verification Approach for Safety-Critical Systems Correctness — Model-Checking based Methodological Approach to Automatically Verify Safety Critical Systems Software (MIC, LEMM), pp. 105–112.
ICEISICEIS-v2-2012-GottardiPC #framework #modelling #reuse
A Model-based Approach for Reusing Crosscutting Frameworks (TG, OPL, VVdC), pp. 46–55.
ICEISICEIS-v2-2012-PantojaC #development #using
A MDA Approach for Agent-oriented Development using FAML (CEP, RC), pp. 415–420.
ICEISICEIS-v2-2012-ParreirasGW #linked data #modelling #ontology #open data
An Ontology-based Approach for Enabling Linked Data Capabilities to MOF Compliant Models (FSP, GG, TW), pp. 126–131.
ICEISICEIS-v2-2012-SousaPS #concept
A Pragmatic Approach to Conceptual Negotiation Support (CS, CP, ALS), pp. 349–354.
ICEISICEIS-v3-2012-BoukhedoumaOAT #adaptation #architecture #modelling #workflow
Service based Approach for Adaptability of Workflow Models — The Subcontracting Architecture (SB, MO, ZA, DT), pp. 224–231.
ICEISICEIS-v3-2012-GoncalvesNUS #flexibility #mobile #user interface
An Analitic Approach to Evaluate Flexible Mobile User Interfaces for the Elderly (VPG, VPdAN, JU, SS), pp. 91–96.
ICEISICEIS-v3-2012-HayashiMB #towards
Schools as Organizations — A Semiotic Approach towards Making Sense of Information Technology (ECSH, MCM, MCCB), pp. 15–24.
ICEISICEIS-v3-2012-KumarS #architecture #enterprise #metric #performance
Enterprise Architecture Performance Management — A Context based Approach to EA Metrics Definition (AK, PS), pp. 249–254.
ICEISICEIS-v3-2012-XavierN #evaluation #hybrid #information management
A Hybrid Evaluation Approach for the Emotional State of Information Systems Users (RACX, VPdAN), pp. 45–53.
CIKMCIKM-2012-BhatiaHHS #query #scalability
A scalable approach for performing proximal search for verbose patent search queries (SB, BH, QH, WSS), pp. 2603–2606.
CIKMCIKM-2012-CamposDJN #higher-order #identification #named #web
GTE: a distributional second-order co-occurrence approach to improve the identification of top relevant dates in web snippets (RC, GD, AJ, CN), pp. 2035–2039.
CIKMCIKM-2012-FangS #feedback #learning #recommendation
A latent pairwise preference learning approach for recommendation from implicit feedback (YF, LS), pp. 2567–2570.
CIKMCIKM-2012-IntagornL #mining #probability #social
A probabilistic approach to mining geospatial knowledge from social annotations (SI, KL), pp. 1717–1721.
CIKMCIKM-2012-LiKBCL #named #probability #query #recommendation
DQR: a probabilistic approach to diversified query recommendation (RL, BK, BB, RC, EL), pp. 16–25.
CIKMCIKM-2012-LongGXK #design #using
A simple approach to the design of site-level extractors using domain-centric principles (CL, XG, CX, SK), pp. 1517–1521.
CIKMCIKM-2012-OrangS #correlation #nondeterminism #probability #query
A probabilistic approach to correlation queries in uncertain time series data (MO, NS), pp. 2229–2233.
CIKMCIKM-2012-ShenWLW #graph #ontology
A graph-based approach for ontology population with named entities (WS, JW, PL, MW), pp. 345–354.
CIKMCIKM-2012-XieFTCMLL #hybrid #performance
A hybrid approach for efficient provenance storage (YX, DF, ZT, LC, KKMR, YL, DDEL), pp. 1752–1756.
CIKMCIKM-2012-ZhaoN #data type #modelling
A model-based approach for RFID data stream cleansing (ZZ, WN), pp. 862–871.
CIKMCIKM-2012-ZhuYCQ #classification #feature model #graph
Graph classification: a diversified discriminative feature selection approach (YZ, JXY, HC, LQ), pp. 205–214.
ECIRECIR-2012-TamFL #automation #email
Automatic Foldering of Email Messages: A Combination Approach (TT, AF, AL), pp. 232–243.
ECIRECIR-2012-YanZ #community #recommendation
A New Approach to Answerer Recommendation in Community Question Answering Services (ZY, JZ), pp. 121–132.
ICMLICML-2012-FengXY #robust
Robust PCA in High-dimension: A Deterministic Approach (JF, HX, SY), p. 237.
ICMLICML-2012-GeistSLG #difference #learning
A Dantzig Selector Approach to Temporal Difference Learning (MG, BS, AL, MG), p. 49.
ICMLICML-2012-KiralyT #algebra #combinator #matrix #rank
A Combinatorial Algebraic Approach for the Identifiability of Low-Rank Matrix Completion (FJK, RT), p. 100.
ICMLICML-2012-MerchanteGG #analysis #linear #performance
An Efficient Approach to Sparse Linear Discriminant Analysis (LFSM, YG, GG), p. 168.
ICMLICML-2012-XieHS #automation #generative #learning
Artist Agent: A Reinforcement Learning Approach to Automatic Stroke Generation in Oriental Ink Painting (NX, HH, MS), p. 139.
ICMLICML-2012-ZhongG #approximate #matrix
A Bayesian Approach to Approximate Joint Diagonalization of Square Matrices (MZ, MAG), p. 87.
ICPRICPR-2012-BriaMMT #semistructured data
A ranking-based cascade approach for unbalanced data (AB, CM, MM, FT), pp. 3439–3442.
ICPRICPR-2012-ClausnerAP #documentation #hybrid #robust #segmentation
A robust hybrid approach for text line segmentation in historical documents (CC, AA, SP), pp. 335–338.
ICPRICPR-2012-CourtyAL #classification #image
A classwise supervised ordering approach for morphology based hyperspectral image classification (NC, EA, SL), pp. 1997–2000.
ICPRICPR-2012-DornellesH #algorithm #image #search-based
A genetic algorithm based approach for combining binary image operators (MMD, NSTH), pp. 3184–3187.
ICPRICPR-2012-DuanHC #image #segmentation
Shape prior regularized continuous max-flow approach to image segmentation (YD, WH, HC), pp. 2516–2519.
ICPRICPR-2012-DuH #adaptation #linear
A discriminative linear regression approach to OCR adaptation (JD, QH), pp. 629–632.
ICPRICPR-2012-Ho #detection #effectiveness
An effective vortex detection approach for velocity vector field (SSH), pp. 2643–2646.
ICPRICPR-2012-KawabataK #multi #using
Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
ICPRICPR-2012-KennardBS #2d #detection #geometry #using #verification
Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPRICPR-2012-LiF #named #process #recognition
ARMA-HMM: A new approach for early recognition of human activity (KL, YF), pp. 1779–1782.
ICPRICPR-2012-MarcaciniCR #clustering #learning
An active learning approach to frequent itemset-based text clustering (RMM, GNC, SOR), pp. 3529–3532.
ICPRICPR-2012-MinKCK #detection #higher-order #using
A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
ICPRICPR-2012-MorinDD #multi #random #segmentation
A random walk approach for multiatlas-based segmentation (JPM, CD, LD), pp. 3636–3639.
ICPRICPR-2012-NegiBC
Characterizing user-subgroups in Flickr Group: A block LDA based approach (SN, RB, SC), pp. 2262–2265.
ICPRICPR-2012-PazzagliaC #recognition #tool support #visual notation
Visual description and recognition of mechanical tools with a silhouette-based approach (FP, CC), pp. 2549–2552.
ICPRICPR-2012-PohKA #authentication #parametricity
A discriminative parametric approach to video-based score-level fusion for biometric authentication (NP, JK, FMA), pp. 2335–2338.
ICPRICPR-2012-RattaniMGR #automation #classification
A dual-staged classification-selection approach for automated update of biometric templates (AR, GLM, EG, FR), pp. 2972–2975.
ICPRICPR-2012-San-BiagioUCCCM #classification #kernel #learning #multi
A multiple kernel learning approach to multi-modal pedestrian classification (MSB, AU, MC, MC, UC, VM), pp. 2412–2415.
ICPRICPR-2012-ShaukatGWB #bottom-up #detection #top-down
Meeting in the Middle: A top-down and bottom-up approach to detect pedestrians (AS, AG, DW, RB), pp. 874–877.
ICPRICPR-2012-SrikanthaSM #detection #image
An SVD-based approach for ghost detection and removal in high dynamic range images (AS, DS, FM), pp. 380–383.
ICPRICPR-2012-SunXAL #online #performance #video
A tracking based fast online complete video synopsis approach (LS, JX, HA, SL), pp. 1956–1959.
ICPRICPR-2012-WangJ12a #novel #probability #recognition
A novel probabilistic approach utilizing clip attribute as hidden knowledge for event recognition (XW, QJ), pp. 3382–3385.
ICPRICPR-2012-WeberT #documentation #performance
Symbol spotting for technical documents: An efficient template-matching approach (JW, ST), pp. 669–672.
ICPRICPR-2012-WongLTYCCBW #automation #graph #locality
Automatic localization of the macula in a supervised graph-based approach with contextual superpixel features (DWKW, JL, NMT, FY, XC, CMGC, MB, TYW), pp. 2063–2066.
ICPRICPR-2012-ZhangWSD #detection #effectiveness
A simple and effective saliency detection approach (HZ, WW, GS, LD), pp. 186–189.
ICPRICPR-2012-Zheng0CP #adaptation
A Grassmann manifold-based domain adaptation approach (JZ, MYL, RC, PJP), pp. 2095–2099.
ICPRICPR-2012-ZhongHH
A hierarchical approach to high-quality partial shape registration (MZ, TH, QH), pp. 113–116.
KDDKDD-2012-0001LHSE #towards
Towards heterogeneous temporal clinical event pattern discovery: a convolutional approach (FW, NL, JH, JS, SE), pp. 453–461.
KDDKDD-2012-MaoCCLKB #data mining #mining #monitoring #realtime
An integrated data mining approach to real-time clinical monitoring and deterioration warning (YM, WC, YC, CL, MK, TCB), pp. 1140–1148.
KDDKDD-2012-PatroDSWFK #data-driven #how #learning #modelling #network
The missing models: a data-driven approach for learning how networks grow (RP, GD, ES, HW, DF, CK), pp. 42–50.
KDDKDD-2012-ShaferRBAGF #mining #monitoring #named
RainMon: an integrated approach to mining bursty timeseries monitoring data (IS, KR, VNB, YA, GRG, CF), pp. 1158–1166.
KDIRKDIR-2012-AlkouzA #network #semantics #social
An Interests Discovery Approach in Social Networks based on a Semantically Enriched Bayesian Network Model (AA, SA), pp. 300–305.
KDIRKDIR-2012-CheungZZ #network
A Bayesian Approach for Constructing Ensemble Neural Network (SHC, YZ, ZZ), pp. 374–377.
KDIRKDIR-2012-Dagnino #grid #information management #machine learning #smarttech
Knowledge Discovery in the Smart Grid — A Machine Learning Approach (AD), pp. 366–369.
KDIRKDIR-2012-DinsoreanuMHP #recommendation
A Unified Approach for Context-sensitive Recommendations (MD, FCM, OLH, RP), pp. 85–94.
KDIRKDIR-2012-FerraraT #social
A Keyphrase Extraction Approach for Social Tagging Systems (FF, CT), pp. 362–365.
KDIRKDIR-2012-FleissnerF
A Syntax-oriented Event Extraction Approach (SF, ACF), pp. 336–339.
KDIRKDIR-2012-GayLM #constraints #mining #multi #sequence
Constraint-programming Approach for Multiset and Sequence Mining (PG, BL, JM), pp. 212–220.
KEODKEOD-2012-BrandaoMS #composition #incremental #interactive #named #navigation #ontology
I3OM — An Iterative, Incremental and Interactive Approach for Ontology Navigation based on Ontology Modularization (RB, PM, NS), pp. 265–270.
KEODKEOD-2012-FigueirasCPLJ #collaboration #information retrieval
Information Retrieval in Collaborative Engineering Projects — A Vector Space Model Approach (PF, RC, LP, CL, RJG), pp. 233–238.
KEODKEOD-2012-KotowskiS #library #ontology
Ontology Library — A New Approach for Storing, Searching and Discovering Ontologies (DK, DAS), pp. 271–277.
KEODKEOD-2012-LiangCI #development #using
A Product Development System using Knowledge-intensive Support Approach (JSL, KMC, PI), pp. 25–33.
KEODKEOD-2012-MatskanisAMMR #linked data #open data #query #research
A Linked Data Approach for Querying Heterogeneous Sources — Assisting Researchers in Finding Answers to Complex Clinical Questions (NM, VA, PM, KM, JR), pp. 411–414.
KEODKEOD-2012-PereiraS #design #information management #ontology #security
An Ontology Approach in Designing Security Information Systems to Support Organizational Security Risk Knowledge (TSMP, HMDS), pp. 461–466.
KEODKEOD-2012-SchlenoffFB #ontology #recognition #using
An Approach to Ontology-based Intention Recognition using State Representations (CS, SF, SB), pp. 178–183.
KEODKEOD-2012-WicaksonoRO #energy #ontology
Ontology Driven Approach for Intelligent Energy Management in Discrete Manufacturing (HW, SR, JO), pp. 108–114.
KMISKMIS-2012-Chai-ArayalertN #information management #towards
Towards a Semiotic Approach to Practice-oriented Knowledge Transfer (SCA, KN), pp. 119–124.
KMISKMIS-2012-LageA12a #process
Information and Knowledge Sharing in Inter-organizational Relationships under the Process Approach (EL, BA), pp. 273–276.
KMISKMIS-2012-ThonssenL #contract #semantics
Semantically Enriched Obligation Management — An Approach for Improving the Handling of Obligations Represented in Contracts (BT, JL), pp. 40–48.
KMISKMIS-2012-Vaiyavuth #challenge #concept #energy #framework #how #modelling
How Open Innovation Models Might Help the Thai Energy Sector to Address the Climate Change Challenge? — A Conceptual Framework on an Approach to Measure the Impact of Adoption of Open Innovation (RV), pp. 229–234.
KRKR-2012-ConitzerX #approximate #multi
Paradoxes of Multiple Elections: An Approximation Approach (VC, LX).
KRKR-2012-LutzSW #approximate #logic
An Automata-Theoretic Approach to Uniform Interpolation and Approximation in the Description Logic EL (CL, IS, FW).
MLDMMLDM-2012-DiezC #classification #multi #predict
A Multiclassifier Approach for Drill Wear Prediction (AD, AC), pp. 617–630.
MLDMMLDM-2012-EbrahimiA #clustering
Semi Supervised Clustering: A Pareto Approach (JE, MSA), pp. 237–251.
MLDMMLDM-2012-Garcia-ConstantinoCNRS #automation #classification #summary
A Semi-Automated Approach to Building Text Summarisation Classifiers (MGC, FC, PJN, AR, CS), pp. 495–509.
MLDMMLDM-2012-LiHO #correlation #mining
Top-N Minimization Approach for Indicative Correlation Change Mining (AL, MH, YO), pp. 102–116.
MLDMMLDM-2012-MondalPMMB #clustering #concept analysis #mining #using
A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
MLDMMLDM-2012-PirasGP #image #retrieval
Enhancing Image Retrieval by an Exploration-Exploitation Approach (LP, GG, RP), pp. 355–365.
MLDMMLDM-2012-SinghCS #hybrid #performance #recognition #using
A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines (LS, GC, DS), pp. 660–668.
MLDMMLDM-2012-TaTB #clustering #data type #using
Clustering Data Stream by a Sub-window Approach Using DCA (MTT, LTHA, LBA), pp. 279–292.
MLDMMLDM-2012-TurkovKM #concept #pattern matching #pattern recognition #problem #recognition
Bayesian Approach to the Concept Drift in the Pattern Recognition Problems (PAT, OK, VM), pp. 1–10.
RecSysRecSys-2012-AntunesCG #development #recommendation
An approach to context-based recommendation in software development (BA, JC, PG), pp. 171–178.
RecSysRecSys-2012-ZhangTSWY #image #recommendation #semantics
A semantic approach to recommending text advertisements for images (WZ, LT, XS, HW, YY), pp. 179–186.
SEKESEKE-2012-AlbuquerquePL #case study #experience #natural language #requirements #reuse #using
Reuse of Experiences Applied to Requirements Engineering: An Approach Based on Natural Language Processing (AA, VP, TL), pp. 574–577.
SEKESEKE-2012-AsuncionT #traceability
A Holistic Approach to Software Traceability (HUA, RNT), pp. 412–417.
SEKESEKE-2012-AvelarSP #database #ontology #relational #xml
An Ontology-based Approach for Storing XML Data Into Relational Databases (FTMdA, DdBS, EKP), pp. 438–443.
SEKESEKE-2012-ChangCSZQ #component #ontology #reuse
An Approach for Software Component Reusing Based on Ontological Mapping (SKC, FC, MDS, EZ, YQ), pp. 180–187.
SEKESEKE-2012-ChenCZS #analysis #integration
A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
SEKESEKE-2012-ChenL #behaviour #elicitation #ontology #requirements #security
Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach (XC, JL), pp. 61–65.
SEKESEKE-2012-DuttaUA #analysis #automation #semantics #verification
Requirement Analysis and Automated Verification: A Semantic Approach (AD, PDU, SA), pp. 51–54.
SEKESEKE-2012-FerreiraS #overview
An Overview of the RSLingo Approach (DdAF, ARdS), pp. 66–69.
SEKESEKE-2012-GrunwaldM #named #owl #uml
umlTUowl — A Both Generic and Vendor-specific Approach for UML to OWL Transformation (AG, TM), pp. 730–736.
SEKESEKE-2012-JlaielA #novel #process #reuse #semantics #towards
Towards a Novel Semantic Approach for Process Patterns’ Capitalization and Reuse (NJ, MBA), pp. 505–510.
SEKESEKE-2012-LeeS #re-engineering
A Process-Based Approach to Improving Knowledge Sharing in Software Engineering (SBL, KS), pp. 700–705.
SEKESEKE-2012-RakaLM #generative #modelling #product line
Interoperable EMR Message Generation: A Model-Driven Software Product Line Approach (DR, SHL, MM), pp. 537–540.
SEKESEKE-2012-WangL #analysis #modelling #petri net #workflow
Resource Modeling and Analysis for Workflows: A Petri Net Approach (JW, DL), pp. 381–386.
SEKESEKE-2012-YangCXZZ #multi #optimisation
A New Approach to Evaluate Path Feasibility and Coverage Ratio of EFSM Based on Multi-objective Optimization (RY, ZC, BX, ZZ, WZ), pp. 470–475.
SIGIRSIGIR-2012-Bonzanini #knowledge-based
A knowledge-based approach for summarising opinions (MB), p. 991.
SIGIRSIGIR-2012-DangC
Diversity by proportionality: an election-based approach to search result diversification (VD, WBC), pp. 65–74.
SIGIRSIGIR-2012-Hassan #modelling #web
A semi-supervised approach to modeling web search satisfaction (AH), pp. 275–284.
SIGIRSIGIR-2012-HauffH #image #microblog
Placing images on the world map: a microblog-based enrichment approach (CH, GJH), pp. 691–700.
SIGIRSIGIR-2012-JiangWLAW #alias #detection #learning #similarity #string #towards
Towards alias detection without string similarity: an active learning based approach (LJ, JW, PL, NA, MW), pp. 1155–1156.
SIGIRSIGIR-2012-SinghPR #thread
Retrieving similar discussion forum threads: a structure based approach (AS, DP, DR), pp. 135–144.
SIGIRSIGIR-2012-YeLL #generative #recommendation #social
Exploring social influence for recommendation: a generative model approach (MY, XL, WCL), pp. 671–680.
SIGIRSIGIR-2012-YuanCSLM #data-driven #maintenance
Category hierarchy maintenance: a data-driven approach (QY, GC, AS, CYL, NMT), pp. 791–800.
ECMFAECMFA-2012-KolovosRWMP #documentation #lightweight #xml
A Lightweight Approach for Managing XML Documents with MDE Languages (DSK, LMR, JRW, NDM, RFP), pp. 118–132.
ECMFAECMFA-2012-RadjenovicPRWK #plugin #simulation #uml
A Plug-in Based Approach for UML Model Simulation (AR, RFP, LMR, JW, SK), pp. 328–339.
MODELSMoDELS-2012-BehjatiYB #modelling #reuse #similarity #using
A Modeling Approach to Support the Similarity-Based Reuse of Configuration Data (RB, TY, LCB), pp. 497–513.
MODELSMoDELS-2012-CuadradoLG #bottom-up #interactive #metamodelling
Bottom-Up Meta-Modelling: An Interactive Approach (JSC, JdL, EG), pp. 3–19.
MODELSMoDELS-2012-GonzalezC #atl #generative #named #testing
ATLTest: A White-Box Test Generation Approach for ATL Transformations (CAG, JC), pp. 449–464.
MODELSMoDELS-2012-KainzBK #model transformation
A Generic Approach Simplifying Model-to-Model Transformation Chains (GK, CB, AK), pp. 579–594.
MODELSMoDELS-2012-SchulzeCA #modelling #uml
An Approach for Synchronizing UML Models and Narrative Text in Literate Modeling (GS, JCO, JA), pp. 595–608.
MODELSMoDELS-2012-SunGBB #industrial #modelling
A Model-Driven Approach to Support Engineering Changes in Industrial Robotics Software (YS, JG, KB, NvB), pp. 368–382.
PLEASEPLEASE-2012-BaumgartFP #certification #component #functional #performance #safety #towards #using
Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
SPLCSPLC-2012-DietrichTSL #linux #robust #variability
A robust approach for variability extraction from the Linux build system (CD, RT, WSP, DL), pp. 21–30.
TOOLSTOOLS-EUROPE-J-2011-LangerWWC12 #emf #lightweight #modelling
EMF Profiles: A Lightweight Extension Approach for EMF Models (PL, KW, MW, JC), pp. 1–29.
OOPSLAOOPSLA-2012-KaliberaMJV #black box #comprehension #concurrent
A black-box approach to understanding concurrency in DaCapo (TK, MM, REJ, JV), pp. 335–354.
AdaEuropeAdaEurope-2012-FariaMP #ada #model checking #source code
An Approach to Model Checking Ada Programs (JMF, JM, JSP), pp. 105–118.
HILTHILT-2012-Sanden #design #modelling #multi
Design of Multitask Software: The Entity-life Modeling Approach (BIS), pp. 1–2.
PADLPADL-2012-GoldbergW #declarative #modelling
A Declarative Approach for Software Modeling (MG, GW), pp. 18–32.
PADLPADL-2012-GuzmanCCH
A Segment-Swapping Approach for Executing Trapped Computations (PCdG, AC, MC, MVH), pp. 138–152.
PEPMPEPM-2012-GotoS #functional
An approach to completing variable names for implicitly typed functional languages (TG, IS), pp. 131–140.
POPLPOPL-2012-Balabonski #lazy evaluation
A unified approach to fully lazy sharing (TB), pp. 469–480.
PPDPPPDP-2012-OlartePRC #automation #concurrent #constraints #linear #verification
A linear concurrent constraint approach for the automatic verification of access permissions (CO, EP, CR, NC), pp. 207–216.
SASSAS-2012-Alonso-BlasG #cost analysis #on the
On the Limits of the Classical Approach to Cost Analysis (DEAB, SG), pp. 405–421.
RERE-2012-Hoffmann #requirements
A Pattern-based approach for analysing requirements in socio-technical systems engineering (AH), pp. 341–344.
RERE-2012-MendizabalSS #elicitation #performance #requirements
Log-based approach for performance requirements elicitation and prioritization (OMM, MS, RS), pp. 297–302.
REFSQREFSQ-2012-WangLWZW #dependence #impact analysis #simulation
A Simulation Approach for Impact Analysis of Requirement Volatility Considering Dependency Change (JW, JL, QW, HZ, HW), pp. 59–76.
ASEASE-2012-AminGC #automation #linear #modelling
An automated approach to forecasting QoS attributes based on linear and non-linear time series modeling (AA, LG, AC), pp. 130–139.
ASEASE-2012-YuanG #clone detection #detection #named #scalability
Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
FSEFSE-2012-ManiCSD #debugging #named #summary
AUSUM: approach for unsupervised bug report summarization (SM, RC, VSS, AD), p. 11.
FSEFSE-2012-NguyenNNN #debugging #multi
Multi-layered approach for recovering l