Tag #approach
5783 papers:
- ASPLOS-2020-ApostolakisXCCA #automation #named #parallel
- Perspective: A Sensible Approach to Speculative Automatic Parallelization (SA, ZX, GC, SC, DIA), pp. 351–367.
- CGO-2020-ShobakiKM #combinator #gpu #optimisation #using
- Optimizing occupancy and ILP on the GPU using a combinatorial approach (GS, AK, SM), pp. 133–144.
- ECSA-2019-NunesSS #architecture #transaction
- From a Monolith to a Microservices Architecture: An Approach Based on Transactional Contexts (LN, NS0, ARS), pp. 37–52.
- ICSA-2019-UllahB #adaptation #architecture #big data #security
- An Architecture-Driven Adaptation Approach for Big Data Cyber Security Analytics (FU, MAB), pp. 41–50.
- EDM-2019-DicklerLG #assessment #automation #data-driven
- A Data-Driven Approach for Automated Assessment of Scientific Explanations in Science Inquiry (RD, HL, JDG).
- EDM-2019-HarrakBL #categorisation #hybrid #student #using
- Categorizing students' questions using an ensemble hybrid approach (FH, FB, VL).
- EDM-2019-HowlinD #behaviour #clustering #detection #fuzzy #student #using
- Detecting Outlier Behaviors in Student Progress Trajectories Using a Repeated Fuzzy Clustering Approach (CPH, CDD).
- EDM-2019-MooreCEZRB #component #multi #student
- Skills Embeddings: A Neural Approach to Multicomponent Representations of Students and Tasks (RM, AC, ME, AHZ, AR, PB).
- ICSME-2019-AnuCSH0Q #recommendation
- An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention (HA, JC, WS, JH, BL0, BQ), pp. 125–134.
- ICSME-2019-BraiekK #named #network #search-based #testing
- DeepEvolution: A Search-Based Testing Approach for Deep Neural Networks (HBB, FK), pp. 454–458.
- ICSME-2019-GaoWLYSC #clone detection #detection #named
- TECCD: A Tree Embedding Approach for Code Clone Detection (YG, ZW, SL, LY, WS, YC), pp. 145–156.
- ICSME-2019-NeupaneCW #development #named
- EmoD: An End-to-End Approach for Investigating Emotion Dynamics in Software Development (KN, KC, YW), pp. 252–256.
- MSR-2019-MatsumotoHK #hybrid
- Beyond GumTree: a hybrid approach to generate edit scripts (JM, YH, SK), pp. 550–554.
- SANER-2019-ChenYYZ #api #documentation #integration
- A Human-as-Sensors Approach to API Documentation Integration and Its Effects on Novice Programmers (CC, YY, LY, KZ), pp. 197–206.
- SANER-2019-XieCYLHDZ #graph #learning #named
- DeepLink: A Code Knowledge Graph Based Deep Learning Approach for Issue-Commit Link Recovery (RX, LC, WY0, ZL, TH, DD, SZ), pp. 434–444.
- SANER-2019-ZhangLML #effectiveness #fault #named #network #using
- CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks (ZZ0, YL, XM, PL), pp. 445–455.
- FM-2019-TanP #axiom #difference #equation #liveness
- An Axiomatic Approach to Liveness for Differential Equations (YKT, AP), pp. 371–388.
- IFM-2019-BowlesC #combinator #optimisation #problem
- An Integrated Approach to a Combinatorial Optimisation Problem (JB, MBC), pp. 284–302.
- SEFM-2019-AvellanedaP #automaton #learning #satisfiability
- Learning Minimal DFA: Taking Inspiration from RPNI to Improve SAT Approach (FA, AP), pp. 243–256.
- Haskell-2019-Devriese #case study #composition #haskell #morphism #polymorphism #taxonomy #verification
- Modular effects in Haskell through effect polymorphism and explicit dictionary applications: a new approach and the μVeriFast verifier as a case study (DD), pp. 1–14.
- CHI-PLAY-2019-CmentowskiKK #artificial reality #game studies #multi #named
- Outstanding: A Multi-Perspective Travel Approach for Virtual Reality Games (SC, AK, JHK), pp. 287–299.
- CoG-2019-HuangL #optimisation #policy #self
- A Self-Play Policy Optimization Approach to Battling Pokémon (DH, SL), pp. 1–4.
- CoG-2019-LucasDVBGBPMK #game studies #learning
- A Local Approach to Forward Model Learning: Results on the Game of Life Game (SML, AD, VV, CB, RDG, IB, DPL, SM, RK), pp. 1–8.
- CoG-2019-NaderiBRH #learning
- A Reinforcement Learning Approach To Synthesizing Climbing Movements (KN, AB, SR, PH), pp. 1–7.
- CoG-2019-NeufeldML #evaluation #evolution #game studies #hybrid
- Evolving Game State Evaluation Functions for a Hybrid Planning Approach (XN, SM, DPL), pp. 1–8.
- CoG-2019-ParakhCS #design #game studies #network #problem #towards
- An Approach Towards Designing Problem Networks in Serious Games (AP, PC, MS), pp. 1–8.
- CoG-2019-VihangaBLK #clustering #game studies #online
- Weekly Seasonal Player Population Patterns in Online Games: A Time Series Clustering Approach (DV, MB, EL, KK), pp. 1–8.
- CoG-2019-XuC #challenge
- A Hierarchical Approach for MARLÖ Challenge (LX, YC), pp. 1–4.
- DiGRA-2019-SusiTW #game studies #online
- “Can you send me a photo?” - A Game-Based Approach for Increasing Young Children's Risk Awareness to Prevent Online Sexual Grooming (TS, NT, UW).
- FDG-2019-KicikogluBCP #gamification #named
- Wormingo: a 'true gamification' approach to anaphoric annotation (DK, RB, JC, MP), p. 7.
- FDG-2019-ZelekeOS #game studies #hybrid
- Analyzing action games: a hybrid systems approach (YZ, JCO, RGS), p. 11.
- ICGJ-2019-MyersPC #game studies #social
- Game Jams as a Space to Tackle Social Issues: an Approach Based on the Critical Pedagogy (CM, LSGP, TC), p. 8.
- VS-Games-2019-GardeliV #artificial reality #named
- ARQuest: A Tangible Augmented Reality Approach to Developing Computational Thinking Skills (AG, SV), pp. 1–8.
- CIKM-2019-DengLSDFYL #multi #named
- MedTruth: A Semi-supervised Approach to Discovering Knowledge Condition Information from Multi-Source Medical Data (YD, YL, YS, ND, WF, MY0, KL), pp. 719–728.
- CIKM-2019-FanZDCSL #graph #identification #learning #network #novel
- Learning to Identify High Betweenness Centrality Nodes from Scratch: A Novel Graph Neural Network Approach (CF, LZ, YD, MC, YS, ZL), pp. 559–568.
- CIKM-2019-HuangCLCHLZZW #classification #multi #network
- Hierarchical Multi-label Text Classification: An Attention-based Recurrent Network Approach (WH, EC, QL0, YC, ZH, YL, ZZ, DZ, SW), pp. 1051–1060.
- CIKM-2019-KrishnanCTS #composition #recommendation #social
- A Modular Adversarial Approach to Social Recommendation (AK, HC, TC0, HS), pp. 1753–1762.
- CIKM-2019-LiJC0W #hybrid #named #recommendation
- HAES: A New Hybrid Approach for Movie Recommendation with Elastic Serendipity (XL, WJ, WC, JW0, GW0), pp. 1503–1512.
- CIKM-2019-LongWDSJL #community #network
- Hierarchical Community Structure Preserving Network Embedding: A Subspace Approach (QL, YW, LD, GS, YJ, WL), pp. 409–418.
- CIKM-2019-SinhaMSMS0 #identification #multi #twitter
- #suicidal - A Multipronged Approach to Identify and Explore Suicidal Ideation in Twitter (PPS, RM, RS, DM, RRS, HL0), pp. 941–950.
- CIKM-2019-YiDLLZZ #modelling #named
- CityTraffic: Modeling Citywide Traffic via Neural Memorization and Generalization Approach (XY, ZD, TL, TL, JZ, YZ), pp. 2665–2671.
- ECIR-p1-2019-DijkFFK #information retrieval #markov
- A Markovian Approach to Evaluate Session-Based IR Systems (DvD, MF, NF0, EK), pp. 621–635.
- ECIR-p1-2019-GhaderyMSFS #detection #independence #named
- LICD: A Language-Independent Approach for Aspect Category Detection (EG, SM, MJS, HF, AS), pp. 575–589.
- ECIR-p1-2019-KimY #automation #hybrid #modelling
- A Hybrid Modeling Approach for an Automated Lyrics-Rating System for Adolescents (JK, MYY), pp. 779–786.
- ECIR-p1-2019-PfeiferL #clustering #modelling #topic
- Topic Grouper: An Agglomerative Clustering Approach to Topic Modeling (DP, JLL), pp. 590–603.
- ECIR-p1-2019-RenningsMH #axiom #information retrieval #modelling
- An Axiomatic Approach to Diagnosing Neural IR Models (DR, FM, CH), pp. 489–503.
- ECIR-p2-2019-CetoliBOSA
- A Neural Approach to Entity Linking on Wikidata (AC, SB, ADO, MS, MA), pp. 78–86.
- ECIR-p2-2019-RamrakhiyaniPV
- A Simple Neural Approach to Spatial Role Labelling (NR, GKP, VV), pp. 102–108.
- ECIR-p2-2019-Russell-RoseCK #query
- Rethinking 'Advanced Search': A New Approach to Complex Query Formulation (TRR, JC, UK), pp. 236–240.
- ICML-2019-AdelW #learning #named #visual notation
- TibGM: A Transferable and Information-Based Graphical Model Approach for Reinforcement Learning (TA, AW), pp. 71–81.
- ICML-2019-AndertonA #scalability
- Scaling Up Ordinal Embedding: A Landmark Approach (JA, JAA), pp. 282–290.
- ICML-2019-BalajiHCF #statistics
- Entropic GANs meet VAEs: A Statistical Approach to Compute Sample Likelihoods in GANs (YB, HH, RC, SF), pp. 414–423.
- ICML-2019-ChenTZB00 #generative #network
- A Gradual, Semi-Discrete Approach to Generative Network Training via Explicit Wasserstein Minimization (YC, MT, CZ, BB, DH0, JP0), pp. 1071–1080.
- ICML-2019-DiaconuW #learning
- Learning to Convolve: A Generalized Weight-Tying Approach (ND, DEW), pp. 1586–1595.
- ICML-2019-LeeJAJ #functional #game studies
- Functional Transparency for Structured Data: a Game-Theoretic Approach (GHL, WJ, DAM, TSJ), pp. 3723–3733.
- ICML-2019-LiuLWJ #adaptation #classification
- Transferable Adversarial Training: A General Approach to Adapting Deep Classifiers (HL, ML, JW0, MIJ), pp. 4013–4022.
- ICML-2019-PolianskiiP #bound #classification #geometry #integration #monte carlo
- Voronoi Boundary Classification: A High-Dimensional Geometric Approach via Weighted Monte Carlo Integration (VP, FTP), pp. 5162–5170.
- ICML-2019-WengCNSBOD #named #network #probability #robust #verification
- PROVEN: Verifying Robustness of Neural Networks with a Probabilistic Approach (LW, PYC, LMN, MSS, AB, IVO, LD), pp. 6727–6736.
- ICML-2019-ZhouYWP #architecture #named
- BayesNAS: A Bayesian Approach for Neural Architecture Search (HZ, MY, JW0, WP), pp. 7603–7613.
- KDD-2019-ChenTYZC #data-driven #industrial #multi #problem
- A Data-Driven Approach for Multi-level Packing Problems in Manufacturing Industry (LC0, XT, MY, JZ, LC0), pp. 1762–1770.
- KDD-2019-HanNCLHX #generative #recommendation
- A Deep Generative Approach to Search Extrapolation and Recommendation (FXH, DN, HC, KL, YH, YX), pp. 1771–1779.
- KDD-2019-HulsebosHBZSKDH #data type #detection #learning #named #semantics
- Sherlock: A Deep Learning Approach to Semantic Data Type Detection (MH, KZH, MAB, EZ, AS, TK, ÇD, CAH), pp. 1500–1508.
- KDD-2019-InabaFKZ #distance #energy #learning #metric
- A Free Energy Based Approach for Distance Metric Learning (SI, CTF, RVK, KZ), pp. 5–13.
- KDD-2019-LeeIFSM #data-driven #estimation #named #using
- DeepRoof: A Data-driven Approach For Solar Potential Estimation Using Rooftop Imagery (SL, SI, MF, PJS, SM), pp. 2105–2113.
- KDD-2019-LiHWL #community #detection #named
- EdMot: An Edge Enhancement Approach for Motif-aware Community Detection (PZL, LH, CDW, JHL), pp. 479–487.
- KDD-2019-NetoPPTBMO #health #machine learning #permutation
- A Permutation Approach to Assess Confounding in Machine Learning Applications for Digital Health (ECN, AP, TMP, MT, BMB, LM, LO), pp. 54–64.
- KDD-2019-SrivastavaHK #machine learning
- Mathematical Notions vs. Human Perception of Fairness: A Descriptive Approach to Fairness for Machine Learning (MS, HH, AK), pp. 2459–2468.
- KDD-2019-SunZZSHX #network
- The Impact of Person-Organization Fit on Talent Management: A Structure-Aware Convolutional Neural Network Approach (YS, FZ, HZ, XS, QH, HX), pp. 1625–1633.
- KDD-2019-TangQZWXMZY #multi #order
- A Deep Value-network Based Approach for Multi-Driver Order Dispatching (XT, Z(Q, FZ, ZW, ZX, YM, HZ, JY), pp. 1780–1790.
- KDD-2019-Thondikulam #ml #scalability
- Analytics Journey Map: An Approach Enable to ML at Scale (GT), p. 3167.
- KDD-2019-TuLYC #feedback #modelling
- Feedback Shaping: A Modeling Approach to Nurture Content Creation (YT, CL, YY, SC), pp. 2241–2250.
- KDD-2019-WangLYLLZ0 #machine learning #nondeterminism #quantifier
- Deep Uncertainty Quantification: A Machine Learning Approach for Weather Forecasting (BW, JL0, ZY0, HL, TL, YZ0, GZ0), pp. 2087–2095.
- KDD-2019-Ye #data-driven #named
- Transportation: A Data Driven Approach (JY), p. 3183.
- KDD-2019-YoonHSF #detection #graph #performance
- Fast and Accurate Anomaly Detection in Dynamic Graphs with a Two-Pronged Approach (MY, BH, KS, CF), pp. 647–657.
- MoDELS-2019-BesnardTJ0D19a #automaton #modelling #monitoring #uml #verification
- Verifying and Monitoring UML Models with Observer Automata: A Transformation-Free Approach (VB, CT, FJ, MB0, PD), pp. 161–171.
- MoDELS-2019-BrandG #adaptation #architecture #evaluation #modelling #runtime
- Modeling Approach and Evaluation Criteria for Adaptable Architectural Runtime Model Instances (TB, HG), pp. 227–232.
- MoDELS-2019-IqbalSKHQ #modelling #testing
- A Model-Based Testing Approach for Cockpit Display Systems of Avionics (MZI, HS, MUK, FUH, IQ), pp. 67–77.
- MoDELS-2019-NguyenRRPI #automation #classification #machine learning #metamodelling #repository
- Automated Classification of Metamodel Repositories: A Machine Learning Approach (PTN, JDR, DDR, AP, LI), pp. 272–282.
- MoDELS-2019-PouraliA19a #challenge #debugging #editing #modelling #uml
- A Focus+Context Approach to Alleviate Cognitive Challenges of Editing and Debugging UML Models (PP, JMA), pp. 183–193.
- ECOOP-2019-LuoDB #analysis #editing #ide #named
- MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper) (LL, JD, EB), p. 25.
- Onward-2019-KaminaA #persistent
- An approach for persistent time-varying values (TK, TA), pp. 17–31.
- OOPSLA-2019-HenriksenBP #parsing
- Derivative grammars: a symbolic approach to parsing with derivatives (IH, GB, KP), p. 28.
- OOPSLA-2019-WuCHS0 #fault #generative #learning #precise #specification
- Generating precise error specifications for C: a zero shot learning approach (BW, JPCI, YH, AS, SC0), p. 30.
- PLATEAU-2019-CohenNS #declarative #design
- Designing Declarative Language Tutorials: A Guided and Individualized Approach (AKC, WN, JS), p. 6.
- PADL-2019-PendharkarG #natural language
- An ASP Based Approach to Answering Questions for Natural Language Text (DP, GG), pp. 46–63.
- PLDI-2019-AndersonPDC #abstraction #network #optimisation #robust
- Optimization and abstraction: a synergistic approach for analyzing neural network robustness (GA, SP, ID, SC), pp. 731–744.
- PLDI-2019-KrishnaswamiY #algebra #parsing
- A typed, algebraic approach to parsing (NRK, JY), pp. 379–393.
- POPL-2019-WangWS #compilation #composition #stack
- An abstract stack based approach to verified compositional compilation to machine code (YW, PW, ZS), p. 30.
- ASE-2019-Gu00 #api #graph #kernel #named
- CodeKernel: A Graph Kernel Based Approach to the Selection of API Usage Examples (XG, HZ0, SK0), pp. 590–601.
- ASE-2019-LacomisYSAGNV #identifier #named
- DIRE: A Neural Approach to Decompiled Identifier Naming (JL, PY, EJS, MA, CLG, GN, BV), pp. 628–639.
- ASE-2019-LiY0C #android #automation #black box #named #testing
- Humanoid: A Deep Learning-Based Approach to Automated Black-box Android App Testing (YL, ZY, YG0, XC), pp. 1070–1073.
- ASE-2019-Neupane #development
- An Approach for Investigating Emotion Dynamics in Software Development (KN), pp. 1268–1270.
- ASE-2019-Xiao #android #detection
- An Image-Inspired and CNN-Based Android Malware Detection Approach (XX), pp. 1259–1261.
- ASE-2019-Zhang #identification #injection #machine learning #sql
- A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities (KZ), pp. 1286–1288.
- ASE-2019-ZhangC #adaptation #learning #modelling #named
- Apricot: A Weight-Adaptation Approach to Fixing Deep Learning Models (HZ, WKC), pp. 376–387.
- ESEC-FSE-2019-ChenCLML #analysis #learning #named #re-engineering #sentiment
- SEntiMoji: an emoji-powered learning approach for sentiment analysis in software engineering (ZC, YC, XL, QM, XL), pp. 841–852.
- ESEC-FSE-2019-HiraoMIM #code review #empirical #graph #overview
- The review linkage graph for code review analytics: a recovery approach and empirical study (TH, SM, AI, KM), pp. 578–589.
- ESEC-FSE-2019-MiryeganehAH #automation #dataset #integration #towards
- An IR-based approach towards automated integration of geo-spatial datasets in map-based software systems (NM, MA, HH), pp. 946–954.
- ESEC-FSE-2019-SantosSCGM #architecture
- Achilles' heel of plug-and-Play software architectures: a grounded theory based approach (JCSS, AS, TC, SG, MM), pp. 671–682.
- ESEC-FSE-2019-Wang0LXBXW #automation #documentation #source code #taxonomy
- A learning-based approach for automatic construction of domain glossary from source code and documentation (CW, XP0, ML, ZX, XB, BX, TW), pp. 97–108.
- ASPLOS-2019-JiangSF0 #parallel #scalability
- Scalable Processing of Contemporary Semi-Structured Data on Commodity Parallel Processors - A Compilation-based Approach (LJ, XS, UF, ZZ0), pp. 79–92.
- ASPLOS-2019-LascorzJSPMSNSM #hardware #named #network
- Bit-Tactical: A Software/Hardware Approach to Exploiting Value and Bit Sparsity in Neural Networks (ADL, PJ, DMS, ZP, MM, SS, MN, KS, AM), pp. 749–763.
- CASE-2019-AhmedG0 #detection #generative #named #online
- O-LoMST: An Online Anomaly Detection Approach And Its Application In A Hydropower Generation Plant (IA, TG, YD0), pp. 762–767.
- CASE-2019-AzefackPAGCBX #behaviour #detection #smarttech
- An Approach for Behavioral Drift Detection in a Smart Home (CA, RP, VA, GG, CMC, RB, XX), pp. 727–732.
- CASE-2019-CarliDP #distributed #energy #game studies #generative #scheduling
- A Distributed Control Approach Based on Game Theory for the Optimal Energy Scheduling of a Residential Microgrid with Shared Generation and Storage (RC, MD, VP), pp. 960–965.
- CASE-2019-ColomboGARTBG #constraints #mobile #predict
- Parameterized Model Predictive Control of a Nonholonomic Mobile Manipulator: A Terminal Constraint-Free Approach (RC, FG, VA, PR, ST, LB, SKG), pp. 1437–1442.
- CASE-2019-JiangO #grid
- Optimal Control of a Fleet of AGVs on a Rectangular Grid: a MILP-based Approach (JJ, DO), pp. 1054–1059.
- CASE-2019-JiaXSWLS #development #industrial #internet #research
- Research on the development approach of regional manufacturing industry in Internet+era* (ZJ, YX, GS, MW, TL, ZS), pp. 356–361.
- CASE-2019-KutzkeB
- Conflict Resolution for Heterogeneous Teams in Communication-limited Environments: A Generous Agent Approach (DTK, MJB), pp. 535–540.
- CASE-2019-LiuHS #exponential #learning #scheduling
- A new solution approach for flow shop scheduling with an exponential time-dependent learning effect (LL, HH, LS), pp. 468–473.
- CASE-2019-LugaresiAFM #modelling #novel #realtime #validation
- Real-time Validation of Digital Models for Manufacturing Systems: a Novel Signal-processing-based Approach (GL, GA, FF, AM), pp. 450–455.
- CASE-2019-MatsuokaNT #identification #machine learning #problem #scheduling
- Machine Learning Approach for Identification of Objective Function in Production Scheduling Problems (YM, TN, KT), pp. 679–684.
- CASE-2019-PippiaLCSS #predict
- Scenario-based Model Predictive Control Approach for Heating Systems in an Office Building (TP, JL, RDC, JS, BDS), pp. 1243–1248.
- CASE-2019-RazaL #learning #multi #policy
- Constructive Policy: Reinforcement Learning Approach for Connected Multi-Agent Systems (SJAR, ML), pp. 257–262.
- CASE-2019-SartoriZY #3d #design #multi #performance
- An efficient approach to near-optimal 3D trajectory design in cluttered environments for multirotor UAVs (DS, DZ, WY), pp. 1016–1022.
- CASE-2019-StrengeSR #modelling #petri net
- Modeling and control of prosumer-based microgrids: a Petri net approach (LS, GS, JR), pp. 209–215.
- CASE-2019-WangY0 #learning #monitoring
- A Deep Learning Approach for Heating and Cooling Equipment Monitoring (YW, CY, WS0), pp. 228–234.
- CASE-2019-XuLWZCQ #learning #performance
- An Improved GA-KRR Nested Learning Approach for Refrigeration Compressor Performance Forecasting* (CX, XL, JW, JZ, JC, WQ), pp. 622–627.
- CASE-2019-ZhouWXS00G #learning #modelling #personalisation #predict
- A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment (YZ, XW, ZX, YS, TL0, CS0, XG), pp. 739–744.
- CGO-2019-QiaoRHT #kernel #locality #optimisation
- From Loop Fusion to Kernel Fusion: A Domain-Specific Approach to Locality Optimization (BQ, OR, FH, JT), pp. 242–253.
- FASE-2019-SchneiderLO #graph #incremental
- A Logic-Based Incremental Approach to Graph Repair (SS0, LL, FO), pp. 151–167.
- CAV-2019-Busatto-GastonM #automaton #robust #synthesis
- Robust Controller Synthesis in Timed Büchi Automata: A Symbolic Approach (DBG, BM, PAR, OS), pp. 572–590.
- ICST-2019-MuscoYN #clustering #implementation #named #testing
- SmokeOut: An Approach for Testing Clustering Implementations (VM, XY, IN), pp. 473–480.
- ICST-2019-Tan #modelling #testing
- A Model-Based Approach to Generate Dynamic Synthetic Test Data (CT), pp. 495–497.
- ICTSS-2019-VinarskiiLKYZ #detection #model checking
- A Model Checking Based Approach for Detecting SDN Races (EV, JL, NK, NY, DZ), pp. 194–211.
- ECSA-2018-AlkhabbasSD #architecture #internet #named
- ECo-IoT: An Architectural Approach for Realizing Emergent Configurations in the Internet of Things (FA, RS, PD), pp. 86–102.
- ECSA-2018-AvritzerFJRSH #architecture #assessment #automation #deployment #performance #testing
- A Quantitative Approach for the Assessment of Microservice Architecture Deployment Alternatives by Automated Performance Testing (AA, VF, AJ, BR, HS, AvH), pp. 159–174.
- ICSA-2018-ArcelliCDP #architecture #multi #named #refactoring
- EASIER: An Evolutionary Approach for Multi-objective Software ArchItecturE Refactoring (DA, VC, MD, DDP), pp. 105–114.
- ICSA-2018-ArtacBNGPT #architecture #data-driven #development #modelling
- Infrastructure-as-Code for Data-Intensive Architectures: A Model-Driven Development Approach (MA, TB, EDN, MG, DPP, DAT), pp. 156–165.
- JCDL-2018-MeuschkeGSBKG #adaptation #detection
- An Adaptive Image-based Plagiarism Detection Approach (NM, CG, DS, CB, DAK, BG), pp. 131–140.
- JCDL-2018-RischK #question
- My Approach = Your Apparatus? (JR, RK), pp. 283–292.
- EDM-2018-BackenkohlerSSW #data-driven #education #personalisation #towards
- Data-Driven Approach Towards a Personalized Curriculum (MB, FS, AS, VW).
- EDM-2018-ChopraGKMG #difference #gender #mining
- Gender Differences in Undergraduate Engineering Applicants: A Text Mining Approach (SC, HG, AK, MM, LG).
- EDM-2018-CookOKD #authentication #education #using
- An Open Vocabulary Approach for Estimating Teacher Use of Authentic Questions in Classroom Discourse (CC, AO, SK, SD).
- EDM-2018-EstebanGR #algorithm #hybrid #multi #recommendation #search-based #student #using
- A Hybrid Multi-Criteria approach using a Genetic Algorithm for Recommending Courses to University Students (AE, AZG, CR).
- ICPC-2018-JaffeLSGV
- Meaningful variable names for decompiled code: a machine translation approach (AJ, JL, EJS, CLG, BV), pp. 20–30.
- ICPC-2018-MessaoudiPBBS #identification #search-based
- A search-based approach for accurate identification of log message formats (SM, AP, DB, LCB, RS), pp. 167–177.
- ICSME-2018-HuZLWLG #analysis #hybrid #named #semantics
- BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis (YH, YZ0, JL, HW, BL, DG), pp. 104–114.
- ICSME-2018-LecerfBGD #automation #pattern matching #program transformation #reflexive
- A Reflexive and Automated Approach to Syntactic Pattern Matching in Code Transformations (JL, JB, TG, SD), pp. 426–436.
- ICSME-2018-SabettaB #automation #classification #commit
- A Practical Approach to the Automatic Classification of Security-Relevant Commits (AS, MB), pp. 579–582.
- ICSME-2018-StanikMMFM #community #open source
- A Simple NLP-Based Approach to Support Onboarding and Retention in Open Source Communities (CS, LM, DM, DF, WM), pp. 172–182.
- MSR-2018-BenkocziGHK08 #design #matrix
- A design structure matrix approach for measuring co-change-modularity of software products (RB, DRG, SH, MAK), pp. 331–335.
- MSR-2018-OttAHBL08 #identification #image #learning #source code #video
- A deep learning approach to identifying source code in images and video (JO, AA, PH, AB, EL), pp. 376–386.
- SANER-2018-DorningerMK #challenge #industrial #re-engineering
- Reengineering an industrial HMI: Approach, objectives, and challenges (BD, MM, AK), pp. 547–551.
- SANER-2018-KuleszK0 #correctness #evolution #semantics #spreadsheet
- Spreadsheet guardian: An approach to protecting semantic correctness throughout the evolution of spreadsheets (journal-first abstract) (DK, VK, SW0), p. 476.
- SANER-2018-ObbinkMSL #challenge #javascript
- An extensible approach for taming the challenges of JavaScript dead code elimination (NGO, IM, GLS, PL), pp. 391–401.
- DLT-2018-Davies #complexity #formal method
- A General Approach to State Complexity of Operations: Formalization and Limitations (SD), pp. 256–268.
- FM-2018-AmericoAM #algebra #data flow #reasoning
- An Algebraic Approach for Reasoning About Information Flow (AA, MSA, AM), pp. 55–72.
- AIIDE-2018-BeaupreWBS #design pattern #generative #multi
- A Design Pattern Approach for Multi-Game Level Generation (SB, TW, SB, GS), pp. 145–151.
- AIIDE-2018-HornMSC #automation #monte carlo
- A Monte Carlo Approach to Skill-Based Automated Playtesting (BH, JAM, GS, SC), pp. 166–172.
- AIIDE-2018-NeufeldMB #behaviour #execution #hybrid #network
- A Hybrid Approach to Planning and Execution in Dynamic Environments Through Hierarchical Task Networks and Behavior Trees (XN, SM, SB), pp. 201–207.
- CHI-PLAY-2018-DSouzaPKW #game studies #social
- Augmenting Co-Located Social Play with Biofeedback: An Interactional Approach (AD, BP, MK, PW), pp. 113–125.
- CIG-2018-VolzMP #game studies #social
- A Social Science-based Approach to Explanations for (Game) AI (VV, KM, MP), pp. 1–2.
- FDG-2018-GundryD #design #elicitation #game studies
- Intrinsic elicitation: a model and design approach for games collecting human subject data (DG, SD), p. 10.
- CIKM-2018-0002SZW0 #modelling #quantum
- A Quantum Many-body Wave Function Inspired Language Modeling Approach (PZ0, ZS, LZ, BW, DS0), pp. 1303–1312.
- CIKM-2018-DaveZHAK #learning #recommendation #representation
- A Combined Representation Learning Approach for Better Job and Skill Recommendation (VSD, BZ, MAH, KA, MK), pp. 1997–2005.
- CIKM-2018-FangOMHXY #effectiveness #modelling #topic #twitter
- An Effective Approach for Modelling Time Features for Classifying Bursty Topics on Twitter (AF, IO, CM, PH, XX, HTY), pp. 1547–1550.
- CIKM-2018-GiannakopoulosT #modelling
- A Content-Based Approach for Modeling Analytics Operators (IG, DT, NK), pp. 227–236.
- CIKM-2018-KrishnanSSS #collaboration #performance
- An Adversarial Approach to Improve Long-Tail Performance in Neural Collaborative Filtering (AK, AS, AS, HS), pp. 1491–1494.
- CIKM-2018-LiLCOL #classification #documentation #modelling #topic
- Dataless Text Classification: A Topic Modeling Approach with Document Manifold (XL, CL, JC, JO, CL), pp. 973–982.
- CIKM-2018-VainshteinGKSR #automation #hybrid #recommendation
- A Hybrid Approach for Automatic Model Recommendation (RV, AGM, GK, BS, LR), pp. 1623–1626.
- CIKM-2018-ZhaoX0ZLZ #comprehension #learning #on the #predict
- On Prediction of User Destination by Sub-Trajectory Understanding: A Deep Learning based Approach (JZ, JX, RZ0, PZ, CL, FZ), pp. 1413–1422.
- CIKM-2018-Zhu0WL
- K-core Minimization: An Edge Manipulation Approach (WZ, CC0, XW0, XL0), pp. 1667–1670.
- ECIR-2018-CohenC #hybrid #retrieval
- A Hybrid Embedding Approach to Noisy Answer Passage Retrieval (DC, WBC), pp. 127–140.
- ECIR-2018-GharebaghRN #agile #mining #novel
- T-Shaped Mining: A Novel Approach to Talent Finding for Agile Software Teams (SSG, PR, MN), pp. 411–423.
- ECIR-2018-JiaS #performance #recommendation
- Local Is Good: A Fast Citation Recommendation Approach (HJ, ES), pp. 758–764.
- ECIR-2018-MajumderPVGMBG #automation #e-commerce #retrieval
- Automated Assistance in E-commerce: An Approach Based on Category-Sensitive Retrieval (AM, AP, KV, AG, SM, PB, PG), pp. 604–610.
- ECIR-2018-Martinez-Castano #detection #modelling #realtime #social #social media
- A Micromodule Approach for Building Real-Time Systems with Python-Based Models: Application to Early Risk Detection of Depression on Social Media (RMC, JCP, DEL, FC), pp. 801–805.
- ECIR-2018-MeladianosXNV #detection #optimisation #summary #twitter
- An Optimization Approach for Sub-event Detection and Summarization in Twitter (PM, CX, GN, MV), pp. 481–493.
- ECIR-2018-ShahshahaniHZS #ranking #towards
- Towards a Unified Supervised Approach for Ranking Triples of Type-Like Relations (MSS, FH, HZ, AS), pp. 707–714.
- ECIR-2018-SpitzG #topic
- Entity-Centric Topic Extraction and Exploration: A Network-Based Approach (AS, MG), pp. 3–15.
- ECIR-2018-SreepadaP #collaboration #incremental #streaming
- An Incremental Approach for Collaborative Filtering in Streaming Scenarios (RSS, BKP), pp. 632–637.
- ECIR-2018-StihecZP #detection #hybrid #semantics
- Simplified Hybrid Approach for Detection of Semantic Orientations in Economic Texts (JS, MZ, SP), pp. 692–698.
- ICML-2018-AgarwalBD0W #classification #reduction
- A Reductions Approach to Fair Classification (AA, AB, MD, JL0, HMW), pp. 60–69.
- ICML-2018-Arora0NZ #bound
- Stronger Generalization Bounds for Deep Nets via a Compression Approach (SA, RG0, BN, YZ), pp. 254–263.
- ICML-2018-BacciuEM #generative #graph #markov
- Contextual Graph Markov Model: A Deep and Generative Approach to Graph Processing (DB, FE, AM), pp. 304–313.
- ICML-2018-EfroniDSM #learning
- Beyond the One-Step Greedy Approach in Reinforcement Learning (YE, GD, BS, SM), pp. 1386–1395.
- ICML-2018-JaffeWCKN #learning #modelling
- Learning Binary Latent Variable Models: A Tensor Eigenpair Approach (AJ, RW, SC, YK, BN), pp. 2201–2210.
- ICML-2018-LiaoC18a #learning #matrix #random
- The Dynamics of Learning: A Random Matrix Approach (ZL, RC), pp. 3078–3087.
- ICML-2018-LiH #learning #network
- An Optimal Control Approach to Deep Learning and Applications to Discrete-Weight Neural Networks (QL, SH), pp. 2991–3000.
- ICML-2018-Mitrovic0ZK #scalability #summary
- Data Summarization at Scale: A Two-Stage Submodular Approach (MM, EK0, MZ, AK), pp. 3593–3602.
- ICML-2018-PearceBZN #learning #predict
- High-Quality Prediction Intervals for Deep Learning: A Distribution-Free, Ensembled Approach (TP, AB, MZ, AN), pp. 4072–4081.
- ICML-2018-ShiS0 #estimation
- A Spectral Approach to Gradient Estimation for Implicit Distributions (JS, SS, JZ0), pp. 4651–4660.
- ICML-2018-WuHS #collaboration #named #ranking
- SQL-Rank: A Listwise Approach to Collaborative Ranking (LW, CJH, JS), pp. 5311–5320.
- ICML-2018-YeS #network
- Variable Selection via Penalized Neural Network: a Drop-Out-One Loss Approach (MY, YS), pp. 5616–5625.
- ICML-2018-ZhengPF #robust
- A Robust Approach to Sequential Information Theoretic Planning (SZ, JP, JWFI), pp. 5936–5944.
- ICPR-2018-Aldana-LopezCZG #learning #network
- Dynamic Learning Rate for Neural Networks: A Fixed-Time Stability Approach (RAL, LECM, JZ, DGG, AC), pp. 1378–1383.
- ICPR-2018-AnnadaniJ #adaptation #detection #image
- Augment and Adapt: A Simple Approach to Image Tampering Detection (YA, CVJ), pp. 2983–2988.
- ICPR-2018-BandyopadhyayND #named
- DivGroup: A Diversified Approach to Divide Collection of Patterns into Uniform Groups (SB, SN, RD, NMM), pp. 964–969.
- ICPR-2018-Chen18b #self
- An Improved Self-Representation Approach for Missing Value Imputation (XC), pp. 1450–1455.
- ICPR-2018-CombinidoMA #image #network #using
- A Convolutional Neural Network Approach for Estimating Tropical Cyclone Intensity Using Satellite-based Infrared Images (JSC, JRM, JA), pp. 1474–1480.
- ICPR-2018-DangCLOT #random
- A randomized hierarchical trees indexing approach for camera-based information spotting (QBD, MC, MML, JMO, CDT), pp. 3692–3697.
- ICPR-2018-FariaS #analysis #graph #image
- A Graph-based Approach for Static Ensemble Selection in Remote Sensing Image Analysis (FAF, SS), pp. 344–349.
- ICPR-2018-LiuWL0ZHL #image
- An Attention-Based Approach for Single Image Super Resolution (YL, YW, NL, XC0, YZ, YH, GL), pp. 2777–2784.
- ICPR-2018-MahboubiBC #identification #problem
- A structural approach to Person Re-identification problem (AM, LB, DC), pp. 1616–1621.
- ICPR-2018-MoTWW #detection #performance
- An Efficient Approach for Polyps Detection in Endoscopic Videos Based on Faster R-CNN (XM, KT, QW, GW), pp. 3929–3934.
- ICPR-2018-ShahinJA #verification
- One-Class SVMs Based Pronunciation Verification Approach (MAS, JXJ, BA), pp. 2881–2886.
- ICPR-2018-SiddiquiV0 #learning #recognition
- Face Recognition for Newborns, Toddlers, and Pre-School Children: A Deep Learning Approach (SS, MV, RS0), pp. 3156–3161.
- ICPR-2018-ZhangJCXP #graph #kernel #learning #network
- Kernel-Weighted Graph Convolutional Network: A Deep Learning Approach for Traffic Forecasting (QZ, QJ, JC, SX, CP), pp. 1018–1023.
- ICPR-2018-ZhengZ #classification #network
- Accelerating the Classification of Very Deep Convolutional Network by A Cascading Approach (WZ, ZZ), pp. 355–360.
- KDD-2018-Christakopoulou #interactive #recommendation #towards
- Q&R: A Two-Stage Approach toward Interactive Recommendation (KC, AB, RL, SJ, EHC), pp. 139–148.
- KDD-2018-Fan #machine learning
- The Pinterest Approach to Machine Learning (LF), p. 2870.
- KDD-2018-IyengarLISW #data-driven #energy #named #performance
- WattHome: A Data-driven Approach for Energy Efficiency Analytics at City-scale (SI, SL, DEI, PJS, BW), pp. 396–405.
- KDD-2018-LiZY #learning
- Dynamic Bike Reposition: A Spatio-Temporal Reinforcement Learning Approach (YL, YZ, QY), pp. 1724–1733.
- KDD-2018-RouxPMVF #detection #machine learning #using
- Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach (DdR, BP, AM, MDPV, CF), pp. 215–222.
- KDD-2018-Schlosser0 #contest #data-driven #online
- Dynamic Pricing under Competition on Online Marketplaces: A Data-Driven Approach (RS, MB0), pp. 705–714.
- KDD-2018-SpeicherHGGSWZ #algorithm #difference
- A Unified Approach to Quantifying Algorithmic Unfairness: Measuring Individual &Group Unfairness via Inequality Indices (TS, HH, NGH, KPG, AS, AW, MBZ), pp. 2239–2248.
- KDD-2018-WeiZYL #learning #named
- IntelliLight: A Reinforcement Learning Approach for Intelligent Traffic Light Control (HW, GZ, HY, ZL), pp. 2496–2505.
- KDD-2018-XuLGZLNLBY #learning #on-demand #order #platform #scalability
- Large-Scale Order Dispatch in On-Demand Ride-Hailing Platforms: A Learning and Planning Approach (ZX, ZL, QG, DZ, QL, JN, CL, WB, JY), pp. 905–913.
- KDD-2018-YuanZY #learning #named #predict
- Hetero-ConvLSTM: A Deep Learning Approach to Traffic Accident Prediction on Heterogeneous Spatio-Temporal Data (ZY, XZ, TY), pp. 984–992.
- KDD-2018-YuCAZCW #detection #flexibility #named #network
- NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks (WY, WC, CCA, KZ0, HC, WW0), pp. 2672–2681.
- KDD-2018-ZhangLMGS #multi #named
- TextTruth: An Unsupervised Approach to Discover Trustworthy Information from Multi-Sourced Text Data (HZ, YL, FM, JG0, LS), pp. 2729–2737.
- MoDELS-2018-MorinHSHB #modelling
- Engineering Software Diversity: a Model-Based Approach to Systematically Diversify Communications (BM, JH, HS, NH, BB), pp. 155–165.
- ECOOP-2018-KrugerS0BM #api #encryption #named #validation
- CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (SK, JS, KA0, EB, MM), p. 27.
- Onward-2018-BrandauerCW #composition #implementation #performance
- C♭: a new modular approach to implementing efficient and tunable collections (SB, EC, TW), pp. 57–71.
- OOPSLA-2018-PradelS #debugging #detection #learning #named
- DeepBugs: a learning approach to name-based bug detection (MP, KS), p. 25.
- LOPSTR-2018-PapapanagiotouF #composition #linear #logic #process #scalability #using
- A Pragmatic, Scalable Approach to Correct-by-Construction Process Composition Using Classical Linear Logic Inference (PP, JDF), pp. 77–93.
- PEPM-2018-ImanishiSI #verification
- A guess-and-assume approach to loop fusion for program verification (AI, KS, AI), pp. 2–14.
- POPL-2018-AgrawalC0 #performance #probability #ranking #source code #termination
- Lexicographic ranking supermartingales: an efficient approach to termination of probabilistic programs (SA, KC, PN0), p. 32.
- POPL-2018-WilliamsR #ml
- A principled approach to ornamentation in ML (TW, DR), p. 30.
- PPDP-2018-PardoGPV #compilation
- An Internalist Approach to Correct-by-Construction Compilers (AP, EG, MP, MV), p. 12.
- ASE-2018-ChenSXHJ #automation #execution #metric #test coverage
- An automated approach to estimating code coverage measures via execution logs (BC, JS, PX, XH, ZM(J), pp. 305–316.
- ASE-2018-Galinier #domain-specific language #requirements
- A DSL for requirements in the context of a seamless approach (FG), pp. 932–935.
- ASE-2018-WangBC #alloy #specification
- An evolutionary approach for analyzing Alloy specifications (JW, HB, MBC), pp. 820–825.
- ASE-2018-WangCYJ #analysis #constraints #model checking #string
- A symbolic model checking approach to the analysis of string and length constraints (HEW, SYC, FY, JHRJ), pp. 623–633.
- ESEC-FSE-2018-HuaZWK #automation #generative #lazy evaluation #named #program repair #sketching #using
- SketchFix: a tool for automated program repair approach using lazy candidate generation (JH, MZ, KW, SK), pp. 888–891.
- ESEC-FSE-2018-SongM0 #automation #estimation #novel
- A novel automated approach for software effort estimation based on data augmentation (LS, LLM, XY0), pp. 468–479.
- ICSE-2018-BenninKPMM #fault #named #predict
- MAHAKIL: diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction (KEB, JK, PP, AM, SM), p. 699.
- ICSE-2018-HassanW #automation #named
- HireBuild: an automatic approach to history-driven repair of build scripts (FH, XW), pp. 1078–1089.
- ICSE-2018-MadalaDA #behaviour #combinator
- A combinatorial approach for exposing off-nominal behaviors (KM, HD, DA), pp. 910–920.
- ICSE-2018-MoralesSKCA #energy #mobile #named #refactoring
- EARMO: an energy-aware refactoring approach for mobile apps (RM, RS, FK, FC, GA), p. 59.
- ICSE-2018-YanSCX #detection #reduction
- Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities (HY, YS, SC0, JX), pp. 327–337.
- SLE-2018-RiesCG #named #requirements #uml
- Messir: a text-first DSL-based approach for UML requirements engineering (BR, AC, NG), pp. 103–107.
- SLE-2018-Rinard #correctness #reliability
- A new approach for software correctness and reliability (MCR), pp. 1–2.
- ASPLOS-2018-GinsbachRSBDO #api #automation #legacy
- Automatic Matching of Legacy Code to Heterogeneous APIs: An Idiomatic Approach (PG, TR, MS, BB, CD, MFPO), pp. 139–153.
- CASE-2018-AbbatecolaFPU #clustering #problem
- A New Cluster-Based Approach for the Vehicle Routing Problem with Time Windows (LA, MPF, GP, WU), pp. 744–749.
- CASE-2018-AssadRAAH #energy #optimisation
- An Approach of Optimising S-curve Trajectory for a Better Energy Consumption (FA, ER, MHA, BA, RH), pp. 98–103.
- CASE-2018-DelangTBP #implementation #modelling
- An approach of service modeling for the demand-driven implementation of Human-Robot-Interaction in manufacturing (KD, MT, MB, MP), pp. 705–710.
- CASE-2018-FanXSZ
- Overbooking for Specialty Clinics with Patient No-Shows: A Queueing Approach (ZF, XX, RAS, XZ), pp. 396–401.
- CASE-2018-FrancoAGABB #deployment #optimisation #probability #using
- Strategic territorial deployment of hospital pharmacy robots using a stochastic p-robust optimization approach (CF, VA, TG, EAL, MB, HB), pp. 390–395.
- CASE-2018-HildebrandtTCF #cyber-physical #ontology
- Ontology Building for Cyber-Physical Systems: A domain expert-centric approach (CH, ST, BC, AF), pp. 1079–1086.
- CASE-2018-JalalianLWAC #automation #detection #fault #statistics #visual notation
- An Automatic Visual Inspection Method based on Statistical Approach for Defect Detection of Ship Hull Surfaces (AJ, WFL, FSW, SMA, CMC), pp. 445–450.
- CASE-2018-JantschNWHM #bound #branch
- Enhanced branch and bound approach for receding horizon based planning (MJ, NNN, LW, MH, UM), pp. 160–163.
- CASE-2018-JordanHP
- Extension of the Plant Feature Approach Introducing Temporal Relations (CVJ, JCH, JP), pp. 1164–1169.
- CASE-2018-LongoFMMS #big data #complexity #monitoring
- Big Data for advanced monitoring system: an approach to manage system complexity (CSL, CF, FM, LM, MS), pp. 341–346.
- CASE-2018-OutafraoutAN #analysis #hybrid #modelling #multi #performance #petri net
- A colored hybrid Petri net-based modeling approach for performance analysis of a multi-modal transportation system (KO, EhCEA, ANSM), pp. 1568–1573.
- CASE-2018-PetittiPCMSCN #distributed #mobile #network
- A Distributed Map Building Approach for Mobile Robotic Networks (AP, DDP, RC, AM, ES, AC, DN), pp. 116–121.
- CASE-2018-RibeiroRPS #architecture #design #using
- An Approach for Architectural Design of Automotive Systems using MARTE and SysML (FGCR, AR, CEP, MSS), pp. 1574–1580.
- CASE-2018-SabattiniVFCMLV #adaptation #evaluation #human-computer
- Methodological Approach for the Evaluation of an Adaptive and Assistive Human-Machine System (LS, VV, CF, JNC, AM, FL, BVH), pp. 57–62.
- CASE-2018-SussDA #automation #classification #component
- An approach to automatically assign mechatronic components to an existing or identified classification (SS, CD, FA), pp. 1525–1529.
- CASE-2018-Wu #automation #clustering #detection #multi #online
- CASE 2018 Special Session Presentation-Only Abstract Submission Form: A Sequential Bayesian Partitioning Approach for Online Steady State Detection of Multivariate Systems (JW), pp. 1308–1309.
- ESOP-2018-AguadoMPRH #concurrent #memory management
- Deterministic Concurrency: A Clock-Synchronised Shared Memory Approach (JA, MM, MP, PSR, RvH), pp. 86–113.
- FASE-2018-0012SRYHBRS #analysis #effectiveness #modelling
- Effective Analysis of Attack Trees: A Model-Driven Approach (RK0, SS, ER, BMY, DH, JB, AR, MS), pp. 56–73.
- CAV-2018-FarinierBBP #generative #quantifier
- Model Generation for Quantified Formulas: A Taint-Based Approach (BF, SB, RB, MLP), pp. 294–313.
- ICST-2018-KhosrowjerdiMR #injection #machine learning #testing
- Virtualized-Fault Injection Testing: A Machine Learning Approach (HK, KM, AR), pp. 297–308.
- ICTSS-2018-LopezKBYZ #logic
- Test Derivation for SDN-Enabled Switches: A Logic Circuit Based Approach (JL, NK, AB, NY, DZ), pp. 69–84.
- IJCAR-2018-CiobacaL #induction #proving #reachability #term rewriting
- A Coinductive Approach to Proving Reachability Properties in Logically Constrained Term Rewriting Systems (SC, DL), pp. 295–311.
- IJCAR-2018-IgnatievPNM #satisfiability #set
- A SAT-Based Approach to Learn Explainable Decision Sets (AI, FP, NN, JMS0), pp. 627–645.
- IJCAR-2018-LagniezBLM #problem #satisfiability
- An Assumption-Based Approach for Solving the Minimal S5-Satisfiability Problem (JML, DLB, TdL, VM), pp. 1–18.
- TAP-2018-BernardHK #approximate #modelling #random #scalability
- An Approximation-Based Approach for the Random Exploration of Large Models (JB0, PCH, OK), pp. 27–43.
- VMCAI-2018-BuroM #injection #semantics
- Abstract Code Injection - A Semantic Approach Based on Abstract Non-Interference (SB, IM), pp. 116–137.
- ECSA-2017-BhatSBHM #automation #design #machine learning
- Automatic Extraction of Design Decisions from Issue Management Systems: A Machine Learning Based Approach (MB, KS, AB, UH, FM), pp. 138–154.
- ECSA-2017-Khakpour #adaptation #composition #self
- Control of Self-adaptation Under Partial Observation: A Modular Approach (NK), pp. 112–119.
- ICSA-2017-HassanAB #architecture #metamodelling
- Microservice Ambients: An Architectural Meta-Modelling Approach for Microservice Granularity (SH, NA, RB), pp. 1–10.
- JCDL-2017-WuCCLG #hybrid #named
- HESDK: A Hybrid Approach to Extracting Scientific Domain Knowledge Entities (JW0, SRC, AC, CL, CLG), pp. 241–244.
- CSEET-2017-DemuthK #approximate #scalability
- An Approach for Project Task Approximation in a Large-Scale Software Project Course (BD, MK), pp. 67–76.
- EDM-2017-BalyanMM #comprehension #machine learning #natural language
- Combining Machine Learning and Natural Language Processing Approach to Assess Literary Text Comprehension (RB, KSM, DSM).
- EDM-2017-ChountaMAJK #development #modelling
- Modeling the Zone of Proximal Development with a Computational Approach (IAC, BMM, PLA, PWJ, SK).
- EDM-2017-GuoCC #network #student
- A Neural Network Approach to Estimate Student Skill Mastery in Cognitive Diagnostic Assessments (QG, MC, YC).
- ICSME-2017-AbidDCM #automation #documentation #evaluation
- The Evaluation of an Approach for Automatic Generated Documentation (NJA, ND, MLC, JIM), pp. 307–317.
- ICSME-2017-FujiokaN #constraints #feature model #interactive
- Constraints Based Approach to Interactive Feature Location (DF, NN), pp. 499–503.
- ICSME-2017-LiFZMR #clone detection #detection #named
- CCLearner: A Deep Learning-Based Clone Detection Approach (LL, HF, WZ, NM, BGR), pp. 249–260.
- SANER-2017-Kirda #automation #detection #named #scalability
- UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) (EK), p. 1.
- SANER-2017-Steinbeck #smell #visualisation
- An arc-based approach for visualization of code smells (MS), pp. 397–401.
- SANER-2017-TangL #mining #named #novel #probability #using
- StiCProb: A novel feature mining approach using conditional probability (YT, HL), pp. 45–55.
- DLT-2017-Bruyere #game studies #synthesis
- Computer Aided Synthesis: A Game-Theoretic Approach (VB), pp. 3–35.
- FSCD-2017-0001TK #confluence #induction #proving
- Improving Rewriting Induction Approach for Proving Ground Confluence (TA0, YT, YK), p. 18.
- FSCD-2017-PradicR #synthesis
- A Curry-Howard Approach to Church's Synthesis (PP, CR), p. 16.
- IFM-2017-SilvettiPB #black box #cyber-physical #learning
- An Active Learning Approach to the Falsification of Black Box Cyber-Physical Systems (SS, AP, LB), pp. 3–17.
- ICFP-2017-ByrdBRM #functional #problem #programming
- A unified approach to solving seven programming problems (functional pearl) (WEB, MB, GR, MM), p. 26.
- CHI-PLAY-2017-PetersenTMD #game studies #mobile
- Evaluating the Onboarding Phase of Free-toPlay Mobile Games: A Mixed-Method Approach (FWP, LET, PMB, AD), pp. 377–388.
- CHI-PLAY-2017-ScozziIL #design #game studies #learning
- A Mixed Method Approach for Evaluating and Improving the Design of Learning in Puzzle Games (MVS, II, CL), pp. 217–228.
- CIG-2017-FontMLR #game studies #heuristic #hybrid #towards
- Towards a hybrid neural and evolutionary heuristic approach for playing tile-matching puzzle games (JMF, DM, SL, PRC), pp. 76–79.
- CIG-2017-Greenwood #fuzzy #game studies
- A fuzzy system approach for choosing public goods game strategies (GWG), pp. 104–109.
- DiGRA-2017-GoddardM #design #game studies #research #towards
- Towards Genre as a Game Design Research Approach (WG, AM).
- FDG-2017-TengB #generative #network #semantics
- A semantic approach to patch-based procedural generation of urban road networks (ET, RB), p. 10.
- VS-Games-2017-LopeMMGV #design #education #game studies
- Designing educational games: Key elements and methodological approach (RPdL, NMM, RMS, AMG, FLGV), pp. 63–70.
- CIKM-2017-AnwarNH #community #novel #performance
- A Novel Approach for Efficient Computation of Community Aware Ridesharing Groups (SA, SN, TH), pp. 1971–1974.
- CIKM-2017-CaoZL #approximate #distributed #effectiveness #graph #mining #named #scalability
- PMS: an Effective Approximation Approach for Distributed Large-scale Graph Data Processing and Mining (YC, YZ, JL), pp. 1999–2002.
- CIKM-2017-Ha-ThucYWDGS
- From Query-By-Keyword to Query-By-Example: LinkedIn Talent Search Approach (VHT, YY, XW, VD, AG, SS), pp. 1737–1745.
- CIKM-2017-Han0YZ #assembly #graph #keyword #query #rdf
- Keyword Search on RDF Graphs - A Query Graph Assembly Approach (SH, LZ0, JXY, DZ0), pp. 227–236.
- CIKM-2017-HuLSLL0Z #information management #named #probability #segmentation
- CNN-IETS: A CNN-based Probabilistic Approach for Information Extraction by Text Segmentation (MH, ZL, YS, AL0, GL0, KZ0, LZ0), pp. 1159–1168.
- CIKM-2017-LiGBC #correlation #modelling #named #online #process
- FM-Hawkes: A Hawkes Process Based Approach for Modeling Online Activity Correlations (SL, XG, WB, GC), pp. 1119–1128.
- CIKM-2017-LinMZ #identification #modelling #multi #topic
- An Enhanced Topic Modeling Approach to Multiple Stance Identification (JL, WM, YZ), pp. 2167–2170.
- CIKM-2017-MalmiGT #network
- Active Network Alignment: A Matching-Based Approach (EM, AG, ET), pp. 1687–1696.
- CIKM-2017-SunSGOC #community #detection #symmetry
- A Non-negative Symmetric Encoder-Decoder Approach for Community Detection (BJS, HS, JG, WO, XC), pp. 597–606.
- CIKM-2017-VellosoD #using #web
- Extracting Records from the Web Using a Signal Processing Approach (RPV, CFD), pp. 197–206.
- CIKM-2017-WuSZ #behaviour #detection #modelling #performance
- A Fast Trajectory Outlier Detection Approach via Driving Behavior Modeling (HW0, WS, BZ), pp. 837–846.
- CIKM-2017-WuZCC #image #scalability
- A New Approach to Compute CNNs for Extremely Large Images (SW, MZ, GC0, KC0), pp. 39–48.
- ECIR-2017-BasuRGBG #microblog #novel #retrieval #word
- A Novel Word Embedding Based Stemming Approach for Microblog Retrieval During Disasters (MB, AR, KG, SB, SG0), pp. 589–597.
- ECIR-2017-RomeoMBM #learning #multi #ranking
- A Multiple-Instance Learning Approach to Sentence Selection for Question Ranking (SR, GDSM, ABC, AM), pp. 437–449.
- ECIR-2017-SoldainiG #health #learning #rank #semantics
- Learning to Rank for Consumer Health Search: A Semantic Approach (LS, NG), pp. 640–646.
- ICML-2017-AcharyaDOS #symmetry
- A Unified Maximum Likelihood Approach for Estimating Symmetric Properties of Discrete Distributions (JA, HD, AO, ATS), pp. 11–21.
- ICML-2017-BogunovicMSC #clustering #robust
- Robust Submodular Maximization: A Non-Uniform Partitioning Approach (IB, SM, JS, VC), pp. 508–516.
- ICML-2017-HartfordLLT #flexibility #predict
- Deep IV: A Flexible Approach for Counterfactual Prediction (JSH, GL, KLB, MT), pp. 1414–1423.
- ICML-2017-MaystreG #effectiveness #exclamation #learning
- Just Sort It! A Simple and Effective Approach to Active Preference Learning (LM, MG), pp. 2344–2353.
- ICML-2017-RahmaniA17a #clustering #problem
- Innovation Pursuit: A New Approach to the Subspace Clustering Problem (MR, GKA), pp. 2874–2882.
- KDD-2017-ChojnackiDFSWZA #comprehension
- A Data Science Approach to Understanding Residential Water Contamination in Flint (AC, CD, AF, GS, JW, DTZ, JDA, EMS), pp. 1407–1416.
- KDD-2017-RozenshteinTG #social
- Inferring the Strength of Social Ties: A Community-Driven Approach (PR, NT, AG), pp. 1017–1025.
- KDD-2017-SalehianHL #crowdsourcing #machine learning #scalability
- Matching Restaurant Menus to Crowdsourced Food Data: A Scalable Machine Learning Approach (HS, PDH, CL), pp. 2001–2009.
- KDD-2017-TongCZCWYYL #online #platform #predict #scalability
- The Simpler The Better: A Unified Approach to Predicting Original Taxi Demands based on Large-Scale Online Platforms (YT, YC, ZZ, LC0, JW0, QY0, JY, WL), pp. 1653–1662.
- KDD-2017-YangBZY0 #collaboration #learning #recommendation
- Bridging Collaborative Filtering and Semi-Supervised Learning: A Neural Approach for POI Recommendation (CY, LB, CZ0, QY0, JH0), pp. 1245–1254.
- ECMFA-2017-RuscioEIPS #migration #model transformation #variability
- A Feature-Based Approach for Variability Exploration and Resolution in Model Transformation Migration (DDR, JE, LI, AP, WS), pp. 71–89.
- ICMT-2017-HoWP #bidirectional #named
- BXE2E: A Bidirectional Transformation Approach for Medical Record Exchange (JH, JHW, MP), pp. 155–170.
- ICMT-2017-NassarRA #automation #emf #interactive #modelling #rule-based
- Rule-Based Repair of EMF Models: An Automated Interactive Approach (NN, HR, TA), pp. 171–181.
- MoDELS-2017-Al-RefaiCG #fuzzy #logic #modelling #testing
- A Fuzzy Logic Based Approach for Model-Based Regression Test Selection (MAR, WC, SG), pp. 55–62.
- MoDELS-2017-DouBB #modelling
- A Model-Driven Approach to Trace Checking of Pattern-Based Temporal Properties (WD, DB, LCB), pp. 323–333.
- ECOOP-2017-Gordon #polymorphism
- A Generic Approach to Flow-Sensitive Polymorphic Effects (CSG), p. 31.
- LOPSTR-2017-EngelsBB #database #datalog #rule-based
- A Rule-Based Approach to Analyzing Database Schema Objects with Datalog (CE, AB, SB), pp. 20–36.
- PPDP-2017-MezzinaP #consistency
- Causally consistent reversible choreographies: a monitors-as-memories approach (CAM, JAP), pp. 127–138.
- ESEC-FSE-2017-Jaffe
- Suggesting meaningful variable names for decompiled code: a machine translation approach (AJ), pp. 1050–1052.
- ESEC-FSE-2017-NguyenARH #invariant
- Counterexample-guided approach to finding numerical invariants (TN, TA, AR, MH0), pp. 605–615.
- ICSE-2017-JiangZRZ #api #tutorial
- An unsupervised approach for discovering relevant tutorial fragments for APIs (HJ, JZ, ZR, TZ0), pp. 38–48.
- ICSE-2017-TsutanoBSRD #android #performance #robust #scalability
- An efficient, robust, and scalable approach for analyzing interacting android apps (YT, SB, WSa, GR, JD), pp. 324–334.
- GPCE-2017-ParreauxSK #optimisation #staged
- Quoted staged rewriting: a practical approach to library-defined optimizations (LP, AS, CEK), pp. 131–145.
- SLE-2017-BarisicBAG #development #domain-specific language #requirements #usability
- A requirements engineering approach for usability-driven DSL development (AB, DB, VA, MG), pp. 115–128.
- SLE-2017-TendelooMMV #modelling #multi #syntax
- Concrete syntax: a multi-paradigm modelling approach (YVT, SVM, BM, HV), pp. 182–193.
- CASE-2017-DingWL #feedback #logic #matrix #network
- Output feedback disturbance decoupling of boolean control networks: A logical matrix factorization approach (XD, SW, HL0), pp. 181–186.
- CASE-2017-FranckAXG #people #problem
- An optimization-simulation approach for long term care structure assignment problem for elderly people (TF, VA, XX, RG), pp. 574–579.
- CASE-2017-FriedrichZTLV #maintenance #modelling #recognition
- Environment modeling for maintenance automation-a next-best-view approach for combining space exploration and object recognition tasks (CF, VZ, MT, AL, AV), pp. 1445–1450.
- CASE-2017-HaasWTUS #authentication #industrial #mobile
- A secured offline authentication approach for industrial mobile robots (SH, AW, RT, TU, CS), pp. 308–313.
- CASE-2017-HanCZ #detection #matrix
- Matrix approach to detectability of discrete event systems under partial observation (XH, ZC, JZ), pp. 187–192.
- CASE-2017-HanPM #learning #linear #modelling
- Model-based reinforcement learning approach for deformable linear object manipulation (HH, GP, TM), pp. 750–755.
- CASE-2017-KinghorstGLCYFZ #algorithm #maintenance #markov #modelling #predict #search-based
- Hidden Markov model-based predictive maintenance in semiconductor manufacturing: A genetic algorithm approach (JK, OG, ML, HLC, KY, JF, MZ, BVH), pp. 1260–1267.
- CASE-2017-KongN #fault #predict #using
- A practical yield prediction approach using inline defect metrology data for system-on-chip integrated circuits (YK, DN), pp. 744–749.
- CASE-2017-LiXLK #classification #learning #physics
- Improving colorectal polyp classification based on physical examination data - A ensemble learning approach (CL, XX, JL, NK), pp. 193–194.
- CASE-2017-NingHHG #3d #continuation #process
- A cloud-supported cps approach to control decision of process manufacturing: 3D ONoC (ZN, WH, XH0, XG), pp. 458–463.
- CASE-2017-PengHXC #coordination #information management #optimisation
- An optimization approach for team coordination through information sharing (YP, EH, JX, CHC), pp. 282–287.
- CASE-2017-SabattiniVCMF #design #human-computer
- Methodological approach for the design of a complex inclusive human-machine system (LS, VV, JNC, AM, CF), pp. 145–150.
- CASE-2017-WangHZL #automation #petri net #robust
- A robust control approach to automated manufacturing systems allowing failures and reworks with Petri nets (XW, HH, YZ0, YL0), pp. 370–375.
- CASE-2017-WangLZH #design #optimisation
- A design approach for event-driven optimization in complex air conditioning systems (JW, SL, PZ, GH), pp. 912–917.
- CASE-2017-WangW #constraints #higher-order #programming #using
- Resolve reactive robot control with perturbed constraints using a second order cone programming approach (YW, LW), pp. 124–129.
- CASE-2017-XiaoHTJ #multi
- Containment control of multiagent systems: A DOBC approach (BX, TH, QT, TJ), pp. 1577–1580.
- CASE-2017-ZhaoLHWZ #fault
- A nussbaum gain approach to attitude tracking control of spacecrafts with actuator faults (XZ, YL, LH, XW, QZ), pp. 1581–1585.
- CASE-2017-ZhouSLLC #industrial
- Information based approach for sort operation in logistic industry (CZ, AS, HL, LHL, EPC), pp. 1356–1361.
- CASE-2017-ZhouWY #learning
- Dynamic dispatching for re-entrant production lines - A deep learning approach (FYZ, CHW, CJY), pp. 1026–1031.
- CASE-2017-ZouV #automation #consistency #design #development #nondeterminism
- Feature-based systematic approach development for inconsistency resolution in automated production system design (MZ, BVH), pp. 687–694.
- CGO-2017-GinsbachO #constraints #reduction
- Discovery and exploitation of general reductions: a constraint based approach (PG, MFPO), pp. 269–280.
- CGO-2017-SuLX #automation #compilation #generative #performance
- Automatic generation of fast BLAS3-GEMM: a portable compiler approach (XS, XL, JX), pp. 122–133.
- FASE-2017-ChengT #atl #deduction #fault #locality #model transformation
- A Deductive Approach for Fault Localization in ATL Model Transformations (ZC, MT), pp. 300–317.
- FASE-2017-Wang0YP #empirical #model checking #modelling #probability
- Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study (JW, JS0, QY, JP0), pp. 3–21.
- CSL-2017-HorcikMV #algebra #constraints
- An Algebraic Approach to Valued Constraint Satisfaction (RH, TM, AV), p. 20.
- CSL-2017-Thomas #algorithm #game studies #infinity
- Determinacy of Infinite Games: Perspectives of the Algorithmic Approach (Invited Talk) (WT), p. 1.
- ICST-2017-Al-QahtaniER #api #modelling #ontology #security #semantics #traceability
- Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach (SSAQ, EEE, JR), pp. 80–91.
- ICST-2017-JanNAB #injection #search-based #testing #web #xml
- A Search-Based Testing Approach for XML Injection Vulnerabilities in Web Applications (SJ, CDN, AA, LCB), pp. 356–366.
- ECSA-2016-KaptoEKT #analysis #architecture #detection #evolution #source code
- Inferring Architectural Evolution from Source Code Analysis - A Tool-Supported Approach for the Detection of Architectural Tactics (CK, GEB, SK, CT), pp. 149–165.
- ECSA-2016-SchenkhuizenWJC #consistency #nondeterminism
- Consistent Inconsistency Management: A Concern-Driven Approach (JS, JMEMvdW, SJ, LC), pp. 201–209.
- QoSA-2016-PitakratOHG #architecture #online #predict
- An Architecture-Aware Approach to Hierarchical Online Failure Prediction (TP, DO, AvH, LG), pp. 60–69.
- WICSA-2016-BuchgeherKHSH #architecture #enterprise #testing
- Improving Testing in an Enterprise SOA with an Architecture-Based Approach (GB, CK, WH, MS, HH), pp. 231–240.
- WICSA-2016-BuresHKAS #architecture #physics #statistics
- Statistical Approach to Architecture Modes in Smart Cyber Physical Systems (TB, PH, JK, RAA, DS), pp. 168–177.
- WICSA-2016-FengKCMX #analysis #architecture #security #towards
- Towards an Architecture-Centric Approach to Security Analysis (QF, RK, YC, RM, LX0), pp. 221–230.
- CSEET-2016-JohnsonPH #education #re-engineering
- An Athletic Approach to Software Engineering Education (PMJ, DP, EH0), pp. 8–17.
- CSEET-2016-MarsicanoMFF #education #modelling #process #requirements
- An Integrated Approach to the Requirements Engineering and Process Modelling Teaching (GM, FFM, MVF, SAAdF), pp. 166–174.
- EDM-2016-AtapattuFT #classification #topic #visual notation
- Topic-wise Classification of MOOC Discussions: A Visual Analytics Approach (TA, KF, HT), pp. 276–281.
- EDM-2016-JiangG #contest #graph #mining #on the
- On Competition for Undergraduate Co-op Placements: A Graph Mining Approach (YHJ, LG), pp. 394–399.
- EDM-2016-LeeRBY #analysis #clustering #heatmap #interactive #learning #visualisation
- Hierarchical Cluster Analysis Heatmaps and Pattern Analysis: An Approach for Visualizing Learning Management System Interaction Data (JEL, MR, AB, MY), pp. 603–604.
- EDM-2016-SweeneyLRJ #performance #predict #recommendation #student
- Next-Term Student Performance Prediction: A Recommender Systems Approach (MS, JL, HR, AJ), p. 7.
- ICPC-2016-AvelinoPHV #novel
- A novel approach for estimating Truck Factors (GA, LTP, ACH, MTV), pp. 1–10.
- ICPC-2016-SaiedS #api #mining
- A cooperative approach for combining client-based and library-based API usage pattern mining (MAS, HAS), pp. 1–10.
- ICSME-2016-AlghmadiSSH #automation #performance #recommendation #testing
- An Automated Approach for Recommending When to Stop Performance Tests (HMA, MDS, WS, AEH), pp. 279–289.
- ICSME-2016-PatilKDB #domain model #modelling #optimisation
- An Optimization Approach for Matching Textual Domain Models with Existing Code (TP, RK, DD, IB), pp. 133–143.
- ICSME-2016-StroblZBG #incremental #migration #towards
- A Tiered Approach Towards an Incremental BPEL to BPMN 2.0 Migration (SS, MZ, MB, TG), pp. 563–567.
- CIAA-2016-BelovsMY #quantum
- Looking for Pairs that Hard to Separate: A Quantum Approach (AB, JAM, AY), pp. 213–223.
- DLT-2016-CadilhacKL #complexity
- A Language-Theoretical Approach to Descriptive Complexity (MC, AK, KJL), pp. 64–76.
- DLT-2016-UezatoM #automaton #problem
- Monoid-Based Approach to the Inclusion Problem on Superdeterministic Pushdown Automata (YU, YM), pp. 393–405.
- FM-2016-BenesBDPS #analysis #model checking
- A Model Checking Approach to Discrete Bifurcation Analysis (NB, LB, MD, SP, DS), pp. 85–101.
- FM-2016-YangHCL0 #generative #hybrid #linear #programming
- A Linear Programming Relaxation Based Approach for Generating Barrier Certificates of Hybrid Systems (ZY, CH, XC0, WL, ZL0), pp. 721–738.
- FSCD-2016-Hasuo #algebra #higher-order
- Coalgebras and Higher-Order Computation: a GoI Approach (IH), p. 2.
- IFM-2016-MullerMRSP #component #hybrid #safety #verification
- A Component-Based Approach to Hybrid Systems Safety Verification (AM0, SM, WR, WS, AP), pp. 441–456.
- AIIDE-2016-GunesSAES #modelling #using
- A Generic Approach for Player Modeling Using Event-Trait Mapping and Feature Weighting (MAG, GS, UA, OE, SS), pp. 169–175.
- AIIDE-2016-SnodgrassO #2d #game studies #generative
- An Approach to Domain Transfer in Procedural Content Generation of Two-Dimensional Videogame Levels (SS, SO), pp. 79–85.
- CIG-2016-SaccoLY #game studies #generative #semantics
- A holistic approach for semantic-based game generation (OS, AL, GNY), pp. 1–8.
- CIG-2016-TamassiaRSDZH #game studies #markov #modelling #online #predict
- Predicting player churn in destiny: A Hidden Markov models approach to predicting player departure in a major online game (MT, WLR, RS, AD, FZ, MH), pp. 1–8.
- DiGRA-FDG-2016-LimLH #bottom-up #category theory #clustering #image #social #using
- Discovering Social and Aesthetic Categories of Avatars: A Bottom-Up Artificial Intelligence Approach Using Image Clustering (CUL, AL, DFH).
- DiGRA-FDG-2016-SoaresLPM #geometry #random
- Rapidly-Exploring Random Tree approach for Geometry Friends (RS, FL, RP, FSM).
- VS-Games-2016-VosinakisKMS #artificial reality #using
- A Kinesthetic Approach to Digital Heritage Using Leap Motion: The Cycladic Sculpture Application (SV, PK, DM, ES), pp. 1–8.
- CIKM-2016-GhoshCCBR #word
- Characterizing Diseases from Unstructured Text: A Vocabulary Driven Word2vec Approach (SG, PC, EC, JSB, NR), pp. 1129–1138.
- CIKM-2016-GhoshGA
- A Preference Approach to Reputation in Sponsored Search (AG, DG, RA), pp. 2041–2044.
- CIKM-2016-JinFF #collaboration #detection
- A Context-aware Collaborative Filtering Approach for Urban Black Holes Detection (LJ, ZF, LF), pp. 2137–2142.
- CIKM-2016-LiLF #classification #multi
- Multi-View Time Series Classification: A Discriminative Bilinear Projection Approach (SL0, YL, YF0), pp. 989–998.
- CIKM-2016-Liu0 #twitter
- Where are You Tweeting?: A Context and User Movement Based Approach (ZL, YH0), pp. 1949–1952.
- CIKM-2016-LiXSM #documentation #effectiveness #topic #word
- Effective Document Labeling with Very Few Seed Words: A Topic Model Approach (CL, JX, AS, ZM), pp. 85–94.
- CIKM-2016-LuQZHG #network #recommendation #social
- Location-aware Friend Recommendation in Event-based Social Networks: A Bayesian Latent Factor Approach (YL, ZQ, CZ0, YH0, LG0), pp. 1957–1960.
- CIKM-2016-MouJXL0J #encoding #word
- Distilling Word Embeddings: An Encoding Approach (LM, RJ, YX, GL, LZ0, ZJ), pp. 1977–1980.
- CIKM-2016-RongZC #network
- A Model-Free Approach to Infer the Diffusion Network from Event Cascade (YR, QZ, HC), pp. 1653–1662.
- CIKM-2016-RongZYSL #markov #optimisation #performance #process
- The Rich and the Poor: A Markov Decision Process Approach to Optimizing Taxi Driver Revenue Efficiency (HR, XZ, CY, MZS, AXL), pp. 2329–2334.
- CIKM-2016-RuanXSTFLZ
- When Sensor Meets Tensor: Filling Missing Sensor Values Through a Tensor Approach (WR, PX, QZS, NKT0, NJGF, XL0, WEZ), pp. 2025–2028.
- CIKM-2016-TanWX #network #recommendation
- A Neural Network Approach to Quote Recommendation in Writings (JT, XW0, JX), pp. 65–74.
- CIKM-2016-WuJ #clustering #retrieval
- A Density-Based Approach to the Retrieval of Top-K Spatial Textual Clusters (DW0, CSJ), pp. 2095–2100.
- ECIR-2016-AkerKBPBHG #clustering #graph #online #topic
- A Graph-Based Approach to Topic Clustering for Online Comments to News (AA, EK, ARB, MLP, EB, MH, RJG), pp. 15–29.
- ECIR-2016-NiuLC #learning #named #twitter
- LExL: A Learning Approach for Local Expert Discovery on Twitter (WN, ZL, JC), pp. 803–809.
- ICML-2016-CouilletWAS #matrix #network #random
- A Random Matrix Approach to Echo-State Neural Networks (RC, GW, HTA, HS), pp. 517–525.
- ICML-2016-KasaiM #rank
- Low-rank tensor completion: a Riemannian manifold preconditioning approach (HK, BM), pp. 1012–1021.
- ICML-2016-LimW #permutation #problem
- A Box-Constrained Approach for Hard Permutation Problems (CHL, SW), pp. 2454–2463.
- ICML-2016-MalherbeCV #optimisation #ranking
- A ranking approach to global optimization (CM, EC, NV), pp. 1539–1547.
- ICML-2016-PlataniosDM
- Estimating Accuracy from Unlabeled Data: A Bayesian Approach (EAP, AD, TMM), pp. 1416–1425.
- ICML-2016-RahmaniA #composition #learning #matrix #performance
- A Subspace Learning Approach for High Dimensional Matrix Decomposition with Efficient Column/Row Sampling (MR, GKA), pp. 1206–1214.
- ICML-2016-RosenskiSS #multi
- Multi-Player Bandits - a Musical Chairs Approach (JR, OS, LS), pp. 155–163.
- ICML-2016-ShahamCDJNCK #learning
- A Deep Learning Approach to Unsupervised Ensemble Learning (US, XC, OD, AJ, BN, JTC, YK), pp. 30–39.
- ICML-2016-TaylorBXSPG #network #scalability
- Training Neural Networks Without Gradients: A Scalable ADMM Approach (GT, RB, ZX0, BS, ABP, TG), pp. 2722–2731.
- ICML-2016-YenHRZD #classification #multi
- PD-Sparse : A Primal and Dual Sparse Approach to Extreme Multiclass and Multilabel Classification (IEHY, XH, PR, KZ, ISD), pp. 3069–3077.
- ICML-2016-YenLZRD #multi #sequence
- A Convex Atomic-Norm Approach to Multiple Sequence Alignment and Motif Discovery (IEHY, XL, JZ, PR, ISD), pp. 2272–2280.
- ICML-2016-ZhengTDZ #collaboration
- A Neural Autoregressive Approach to Collaborative Filtering (YZ, BT, WD, HZ), pp. 764–773.
- ICPR-2016-0013LS #3d #retrieval #semantics #sketching
- A semantic tree-based approach for sketch-based 3D model retrieval (BL0, YL, JS), pp. 3880–3885.
- ICPR-2016-AbdicFBARMS #detection #learning
- Detecting road surface wetness from audio: A deep learning approach (IA, LF, DEB, WA, BR, EM, BWS), pp. 3458–3463.
- ICPR-2016-AginakoMRLS #difference #machine learning
- Machine Learning approach to dissimilarity computation: Iris matching (NA, JMMO, IRR, EL, BS), pp. 170–175.
- ICPR-2016-AsplundHTS
- A new approach to mathematical morphology on one dimensional sampled signals (TA, CLLH, MJT, RS), pp. 3904–3909.
- ICPR-2016-BrauJ #3d #estimation
- A Bayesian part-based approach to 3D human pose and camera estimation (EB, HJ0), pp. 1762–1767.
- ICPR-2016-BSSH #classification #network #using
- HEp-2 cell classification using artificial neural network approach (DB, KS, NH), pp. 84–89.
- ICPR-2016-ChenZW #learning #network #summary #video
- Wireless capsule endoscopy video summarization: A learning approach based on Siamese neural network and support vector machine (JC, YZ, YW0), pp. 1303–1308.
- ICPR-2016-CosmoABTRC #image #multi
- A game-theoretical approach for joint matching of multiple feature throughout unordered images (LC, AA, FB, AT, ER, DC), pp. 3715–3720.
- ICPR-2016-GaoYGC #constraints #network #using
- Bayesian approach to learn Bayesian networks using data and constraints (XGG, YY, ZgG, DQC0), pp. 3667–3672.
- ICPR-2016-GattupalliCL
- A computational approach to relative aesthetics (VG, PSC, BL), pp. 2446–2451.
- ICPR-2016-GuoCY #adaptation
- A simple approach for unsupervised domain adaptation (XG0, WC, JY), pp. 1566–1570.
- ICPR-2016-HajduTKH #constraints #execution #probability
- Composing ensembles by a stochastic approach under execution time constraint (AH, HT, LK, LH), pp. 222–227.
- ICPR-2016-HoSSEA #estimation #learning #parametricity
- A temporal deep learning approach for MR perfusion parameter estimation in stroke (KCH, FS, KVS, SES, CWA), pp. 1315–1320.
- ICPR-2016-JordaoSS #detection #multi
- A late fusion approach to combine multiple pedestrian detectors (AJ, JSdS, WRS), pp. 4250–4255.
- ICPR-2016-KhelifiM #image #multi #problem #segmentation
- A multi-objective approach based on TOPSIS to solve the image segmentation combination problem (LK, MM), pp. 4220–4225.
- ICPR-2016-KimP #detection #network #using
- A shape preserving approach for salient object detection using convolutional neural networks (JK, VP), pp. 609–614.
- ICPR-2016-LiH #detection #image #performance
- A fast approach for traffic panel detection from natural scene images (ZML, LLH), pp. 579–584.
- ICPR-2016-LimK #feature model #multi #optimisation
- Convex optimization approach for multi-label feature selection based on mutual information (HL, DWK), pp. 1512–1517.
- ICPR-2016-MeyL #self
- A soft-labeled self-training approach (AM, ML), pp. 2604–2609.
- ICPR-2016-NguyenY #artificial reality #named #novel
- StereoTag: A novel stereogram-marker-based approach for Augmented Reality (MN, AY), pp. 1059–1064.
- ICPR-2016-SahooA0 #automation #clustering #generative #multi #using
- Automatic generation of biclusters from gene expression data using multi-objective simulated annealing approach (PS, SA, SS0), pp. 2174–2179.
- ICPR-2016-SharabatiX #performance #polynomial
- Fast local polynomial regression approach for speckle noise removal (WKS, BX), pp. 3198–3203.
- ICPR-2016-ValevYK #geometry #pattern matching #pattern recognition #problem #recognition
- A new geometrical approach for solving the supervised pattern recognition problem (VV, NY, AK), pp. 1648–1652.
- ICPR-2016-YanRZC #clustering #set
- A constrained clustering based approach for matching a collection of feature sets (JY, ZR, HZ, SMC), pp. 3832–3837.
- ICPR-2016-ZamzamiPGKAS #analysis #automation #multimodal
- An approach for automated multimodal analysis of infants' pain (GZ, CYP, DBG, RK, TA, YS0), pp. 4148–4153.
- ICPR-2016-ZhaoYWL #recognition
- Landmark manifold: Revisiting the Riemannian manifold approach for facial emotion recognition (KZ, SY, AW, BCL), pp. 1095–1100.
- ICPR-2016-ZhuangYH #modelling #retrieval #scalability #video
- DLSTM approach to video modeling with hashing for large-scale video retrieval (NZ, JY0, KAH), pp. 3222–3227.
- KDD-2016-AmoualianCGA #dependence #documentation #modelling #named #topic
- Streaming-LDA: A Copula-based Approach to Modeling Topic Dependencies in Document Streams (HA, MC, ÉG, MRA), pp. 695–704.
- KDD-2016-AnCPS #named
- MAP: Frequency-Based Maximization of Airline Profits based on an Ensemble Forecasting Approach (BA, HC0, NP, VSS), pp. 421–430.
- KDD-2016-BanerjeeYR #mining #named #scalability
- MANTRA: A Scalable Approach to Mining Temporally Anomalous Sub-trajectories (PB, PY, SR), pp. 1415–1424.
- KDD-2016-BaoWL #data-driven #network #predict #resource management
- From Prediction to Action: A Closed-Loop Approach for Data-Guided Network Resource Allocation (YB, HW, XL0), pp. 1425–1434.
- KDD-2016-MalmiTTRG #generative #named
- DopeLearning: A Computational Approach to Rap Lyrics Generation (EM, PT, HT, TR, AG), pp. 195–204.
- KDD-2016-NakagawaSKTT #mining #performance #predict
- Safe Pattern Pruning: An Efficient Approach for Predictive Pattern Mining (KN, SS, MK, KT, IT), pp. 1785–1794.
- KDD-2016-SalehiRLP #predict #risk management #robust
- Dynamic and Robust Wildfire Risk Prediction System: An Unsupervised Approach (MS, LIR, TML, AP), pp. 245–254.
- KDD-2016-WanCKHGZ #modelling
- From Truth Discovery to Trustworthy Opinion Discovery: An Uncertainty-Aware Quantitative Modeling Approach (MW, XC, LMK, JH0, JG0, BZ0), pp. 1885–1894.
- KDD-2016-XiaoGLMSFZ #towards
- Towards Confidence in the Truth: A Bootstrapping based Truth Discovery Approach (HX, JG0, QL0, FM, LS, YF, AZ), pp. 1935–1944.
- KDD-2016-XiaoGWWSL
- A Truth Discovery Approach with Theoretical Guarantee (HX, JG0, ZW, SW, LS, HL0), pp. 1925–1934.
- KDD-2016-ZhaoATBDBKD #detection #parametricity #strict #using
- A Non-parametric Approach to Detect Epileptogenic Lesions using Restricted Boltzmann Machines (YZ, BA, TT, KEB, JGD, CEB, RK, OD), pp. 373–382.
- BX-2016-Leblebici #consistency #grammarware #graph grammar #towards #traceability
- Towards a Graph Grammar-Based Approach to Inter-Model Consistency Checks with Traceability Support (EL), pp. 35–39.
- BX-2016-McKinna #bidirectional
- Bidirectional Transformations with Deltas: A Dependently Typed Approach (Talk Proposal) (JM), p. 14.
- ECMFA-2016-El-khouryEE #emf #linked data #maintenance #modelling #open data
- Supporting the Linked Data Approach to Maintain Coherence Across Rich EMF Models (JEk, CE, CE), pp. 36–47.
- ECMFA-2016-KessentiniSW #automation #co-evolution #metamodelling #multi #optimisation #using
- Automated Metamodel/Model Co-evolution Using a Multi-objective Optimization Approach (WK, HAS, MW), pp. 138–155.
- ICMT-2016-JungHH #aspect-oriented #composition #domain-specific language #generative #named
- GECO: A Generator Composition Approach for Aspect-Oriented DSLs (RJ, RH, WH), pp. 141–156.
- MoDELS-2016-AlkhaziRKWG #atl #automation #model transformation #refactoring #search-based
- Automated refactoring of ATL model transformations: a search-based approach (BA, TR, MK, MW, WIG), pp. 295–304.
- MoDELS-2016-AroraSBZ #domain model #evaluation #industrial #modelling #requirements
- Extracting domain models from natural-language requirements: approach and industrial evaluation (CA, MS, LCB, FZ), pp. 250–260.
- MoDELS-2016-KokalySCMC #assurance #evolution #model management #reuse
- A model management approach for assurance case reuse due to system evolution (SK, RS, VC, TM, MC), pp. 196–206.
- MoDELS-2016-PrehoferWJ #interactive #modelling #multi
- A model-based approach for multi-device user interactions (CP, AW, YJ), pp. 13–23.
- MoDELS-2016-RabbiLY #category theory #game studies #metamodelling #towards
- Towards a categorical approach for meta-modelling epistemic game theory (FR, YL, ICY), pp. 57–64.
- ECOOP-2016-AndreasenGCSTS #type system
- Trace Typing: An Approach for Evaluating Retrofitted Type Systems (EA, CSG, SC0, MS, FT, KS), p. 26.
- OOPSLA-2016-PetersKTC #named
- OrcO: a concurrency-first approach to objects (AMP, DK, JAT, WRC), pp. 548–567.
- LOPSTR-2016-ZielenkiewiczS #automaton #logic
- Automata Theory Approach to Predicate Intuitionistic Logic (MZ, AS), pp. 345–360.
- POPL-2016-BhaskaracharyaB #named #optimisation
- SMO: an integrated approach to intra-array and inter-array storage optimization (SGB, UB, AC0), pp. 526–538.
- POPL-2016-WuXCZZ #named #performance
- Casper: an efficient approach to call trace collection (RW, XX0, SCC, HZ0, CZ), pp. 678–690.
- ASE-2016-VojdaniARSVV #concurrent #detection
- Static race detection for device drivers: the Goblint approach (VV, KA, VR, HS, VV, RV), pp. 391–402.
- ASE-2016-YangJGS #automaton #verification
- Verifying simulink stateflow model: timed automata approach (YY, YJ, MG, JGS), pp. 852–857.
- FSE-2016-HammoudiRS #incremental #named #testing #web
- WATERFALL: an incremental approach for repairing record-replay tests of web applications (MH, GR, AS0), pp. 751–762.
- FSE-2016-Shevtsov #adaptation #reuse #self
- Developing a reusable control-based approach to build self-adaptive software systems with formal guarantees (SS), pp. 1060–1062.
- ICSE-2016-NguyenPVN #api #bytecode #learning #statistics
- Learning API usages from bytecode: a statistical approach (TTN, HVP, PMV, TTN), pp. 416–427.
- GPCE-2016-BrazGMRMT #configuration management
- A change-centric approach to compile configurable systems with #ifdefs (LB, RG, MM, MR, FM, LT), pp. 109–119.
- ASPLOS-2016-HasabnisS #assembly #compilation #novel #representation
- Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers (NH, RS), pp. 311–324.
- CASE-2016-AlvesBPT #logic
- Planning on Discrete Events Systems: A logical approach (LVRA, HJB, PNP, RHCT), pp. 1055–1060.
- CASE-2016-CampbellTLPOF #concurrent #configuration management #modelling #π-calculus
- Modeling concurrency and reconfiguration in vehicular systems: A π-calculus approach (JC, CET, PL0, TPP, ÜÖ, GEF), pp. 523–530.
- CASE-2016-Csiszar #automation #combinator #equation #generative
- A combinatorial approach to the automated generation of inverse kinematics equations for robot arms (AC), pp. 984–989.
- CASE-2016-FeldmannWKV #automation #consistency #nondeterminism
- A comprehensive approach for managing inter-model inconsistencies in automated production systems engineering (SF, MW, KK, BVH), pp. 1120–1127.
- CASE-2016-HamanaAX #information management #petri net #verification
- A timed Petri net approach for verification of Territorial Healthcare Information Systems (SH, VA, XX), pp. 658–663.
- CASE-2016-MaP #embedded #named #programmable #testing
- DTT-MAT: A software toolbox on a design-to-test approach for testing of embedded programmable controllers (CM, JP), pp. 878–884.
- CASE-2016-OkaemeMW
- A comfort zone set-based approach for coupled temperature and humidity control in buildings (CCO, SM, JTW), pp. 456–461.
- CASE-2016-RehbergerSV #automation #flexibility #reasoning
- An agent approach to flexible automated production systems based on discrete and continuous reasoning (SR, LS, BVH), pp. 1249–1256.
- CASE-2016-SchwesingerS #3d #locality #scalability
- A 3D approach to infrastructure-free localization in large scale warehouse environments (DS, JRS), pp. 274–279.
- CASE-2016-SrinivasanC #approximate #orthogonal #using
- Path planning with user route preference - A reward surface approximation approach using orthogonal Legendre polynomials (ARS, SC), pp. 1100–1105.
- CASE-2016-WiebeRRV #automation #composition #delivery #fault #generative #injection #simulation #testing #using
- Automated test suite generation to test modular designed packaging machines using Fault Injection and a simulink-based simulation approach (FW, SR, SR, BVH), pp. 758–765.
- CGO-2016-BarikFLHS #black box #cpu #energy #gpu #scheduling
- A black-box approach to energy-aware scheduling on integrated CPU-GPU systems (RB, NF, BTL, CH, TS), pp. 70–81.
- ESOP-2016-KawabataI #adaptation #float #lazy evaluation #refinement
- Improving Floating-Point Numbers: A Lazy Approach to Adaptive Accuracy Refinement for Numerical Computations (HK, HI), pp. 390–418.
- ESOP-2016-LourencoFP #adaptation #formal method #verification
- Formalizing Single-Assignment Program Verification: An Adaptation-Complete Approach (CBL, MJF, JSP), pp. 41–67.
- ESOP-2016-WangN #functional #higher-order #source code #syntax
- A Higher-Order Abstract Syntax Approach to Verified Transformations on Functional Programs (YW, GN), pp. 752–779.
- CAV-2016-ChenSW #commutative #framework #pipes and filters #problem #transducer
- The Commutativity Problem of the MapReduce Framework: A Transducer-Based Approach (YFC, LS, ZW), pp. 91–111.
- ICST-2016-ChenBHXZ0X #compilation #testing
- Test Case Prioritization for Compilers: A Text-Vector Based Approach (JC0, YB, DH, YX, HZ0, LZ0, BX), pp. 266–277.
- ICTSS-2016-SimosKGGL #combinator #security #testing #web
- A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing (DES, KK, LSGG, BG, YL), pp. 70–85.
- ECSA-2015-AngelovB #agile #architecture #development #education
- An Approach to Software Architecting in Agile Software Development Projects in Education (SA, PdB), pp. 157–168.
- ECSA-2015-BaresiS #architecture
- An Architecture-Centric Approach for Dynamic Smart Spaces (LB, AS), pp. 277–284.
- ECSA-2015-SporerMKB #agile #design #requirements
- A Lean Automotive E/E-System Design Approach with Integrated Requirements Management Capability (HS, GM, CK, EB), pp. 251–258.
- QoSA-2015-Kramer #consistency #generative #modelling #multi
- A Generative Approach to Change-Driven Consistency in Multi-View Modeling (MEK), pp. 129–134.
- WICSA-2015-CaraccioloLN #architecture #consistency
- A Unified Approach to Architecture Conformance Checking (AC, MFL, ON), pp. 41–50.
- WICSA-2015-HauptLP #api #modelling #rest
- A Conversation Based Approach for Modeling REST APIs (FH, FL, CP), pp. 165–174.
- DocEng-2015-AzevedoLS #3d
- An Approach to Convert NCL Applications into Stereoscopic 3D (RGDAA, GAFL, LFGS), pp. 177–186.
- DocEng-2015-DumasCBS #design
- An Approach for Designing Proofreading Views in Publishing Chains (LD, SC, BB, SS), pp. 215–218.
- DocEng-2015-RastanPS #comprehension #named
- TEXUS: A Task-based Approach for Table Extraction and Understanding (RR, HYP, JS), pp. 25–34.
- DocEng-2015-SarkisCD #multi #named #segmentation #web
- MSoS: A Multi-Screen-Oriented Web Page Segmentation Approach (MS, CC, JCD), pp. 85–88.
- DRR-2015-PengCN #using
- Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
- JCDL-2015-PintoB #probability #semantics
- Demystifying the Semantics of Relevant Objects in Scholarly Collections: A Probabilistic Approach (JMGP, WTB), pp. 157–164.
- SIGMOD-2015-ArmenatzoglouPN #clustering #game studies #graph #multi #realtime #social
- Real-Time Multi-Criteria Social Graph Partitioning: A Game Theoretic Approach (NA, HP, VN, DP, CS), pp. 1617–1628.
- SIGMOD-2015-DeshpandeRDA #named
- ShareInsights: An Unified Approach to Full-stack Data Processing (MD, DR, SD, AA), pp. 1925–1940.
- SIGMOD-2015-GurukarRR #commit #communication #mining #named #network #scalability
- COMMIT: A Scalable Approach to Mining Communication Motifs from Dynamic Networks (SG, SR, BR), pp. 475–489.
- SIGMOD-2015-ShinJSK #graph #named #random #scalability
- BEAR: Block Elimination Approach for Random Walk with Restart on Large Graphs (KS, JJ, LS, UK), pp. 1571–1585.
- SIGMOD-2015-TangSX
- Influence Maximization in Near-Linear Time: A Martingale Approach (YT, YS, XX), pp. 1539–1554.
- SIGMOD-2015-WangLYXZ #network #performance
- Efficient Route Planning on Public Transportation Networks: A Labelling Approach (SW, WL, YY, XX, SZ), pp. 967–982.
- SIGMOD-2015-WangXL #adaptation
- Crowd-Based Deduplication: An Adaptive Approach (SW, XX, CHL), pp. 1263–1277.
- SIGMOD-2015-WongHFXL #as a service #database #named #parallel #using
- Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
- SIGMOD-2015-ZhengZLYSZ #graph #how #nondeterminism #rdf #similarity
- How to Build Templates for RDF Question/Answering: An Uncertain Graph Similarity Join Approach (WZ, LZ, XL, JXY, SS, DZ), pp. 1809–1824.
- VLDB-2015-AkidauBCCFLMMPS #bound #correctness #data flow #latency
- The Dataflow Model: A Practical Approach to Balancing Correctness, Latency, and Cost in Massive-Scale, Unbounded, Out-of-Order Data Processing (TA, RB, CC, SC, RFM, RL, SM, DM, FP, ES, SW), pp. 1792–1803.
- VLDB-2015-GreenOW #live programming #programming
- Live Programming in the LogicBlox System: A MetaLogiQL Approach (TJG, DO, GW), pp. 1782–1793.
- VLDB-2015-JhaHLCH #in memory #memory management
- Improving Main Memory Hash Joins on Intel Xeon Phi Processors: An Experimental Approach (SJ, BH, ML, XC, HPH), pp. 642–653.
- VLDB-2015-LiCM #data-driven #query
- Query From Examples: An Iterative, Data-Driven Approach to Query Construction (HL, CYC, DM), pp. 2158–2169.
- VLDB-2015-SH #big data #named #testing
- CODD: A Dataless Approach to Big Data Testing (AS, JRH), pp. 2008–2019.
- VLDB-2015-YangMFLK #lens #named #on-demand
- Lenses: An On-Demand Approach to ETL (YY, NM, RF, ZHL, OK), pp. 1578–1589.
- VLDB-2015-ZhangC0 #distributed #graph #set
- Bonding Vertex Sets Over Distributed Graph: A Betweenness Aware Approach (XZ, HC, LC), pp. 1418–1429.
- EDM-2015-AlexandronZP #machine learning #student
- Discovering the Pedagogical Resources that Assist Students to Answer Questions Correctly - A Machine Learning Approach (GA, QZ, DEP), pp. 520–523.
- EDM-2015-AnayaGLH #analysis #collaboration #diagrams #network #social #using
- An Approach of Collaboration Analytics in MOOCs Using Social Network Analysis and Influence Diagram (ARA, JGB, EL, FHdO), pp. 492–495.
- EDM-2015-ChangHC #modelling
- Modeling Exercise Relationships in E-Learning: A Unified Approach (HSC, HJH, KTC), pp. 532–535.
- EDM-2015-DesmaraisXB
- A Partition Tree Approach to Combine Techniques to Refine Item to Skills Q-Matrices (MCD, PX, BB), pp. 29–36.
- EDM-2015-HershkovitzMS #interactive #student
- Teacher-Student Classroom Interactions: A Computational Approach (AH, AM, AS), pp. 558–559.
- EDM-2015-SaarelaK #clustering #education #scalability
- Do Country Stereotypes Exist in Educational Data? A Clustering Approach for Large, Sparse, and Weighted Data (MS, TK), pp. 156–153.
- EDM-2015-VossSMS #dataset #learning #matrix
- A Transfer Learning Approach for Applying Matrix Factorization to Small ITS Datasets (LV, CS, CM, LST), pp. 372–375.
- ITiCSE-2015-Patitsas #education #student
- A Numpy-First Approach to Teaching CS1 to Natural Science Students (EP), p. 333.
- ITiCSE-2015-Silvis-Cividjian #education #multi #pervasive
- Teaching Pervasive Computing to CS Freshmen: A Multidisciplinary Approach (NSC), pp. 195–200.
- ITiCSE-2015-XhakajL #education
- A New Approach To Teaching Red Black Tree (FX, CWL), pp. 278–283.
- SIGITE-2015-Jonas #online
- Flipping a Flipped Approach: Online Techniques In-Person (MJ), p. 73.
- SIGITE-2015-SobieskBCLT #education #multi
- Cyber Education: A Multi-Level, Multi-Discipline Approach (ES, JRSB, GJC, ML, HT), pp. 43–47.
- ICSME-2015-Verebi #modelling #refactoring
- A model-based approach to software refactoring (IV), pp. 606–609.
- MSR-2015-Marder #behaviour #stack overflow
- Stack Overflow Badges and User Behavior: An Econometric Approach (AM), pp. 450–453.
- SANER-2015-NagyMC #concept #query #sql
- Where was this SQL query executed? a static concept location approach (CN, LM, AC), pp. 580–584.
- SANER-2015-NayrollesHTL #debugging #model checking #named #using
- JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
- SANER-2015-SaeidiHKJ #clustering #multi #search-based
- A search-based approach to multi-view clustering of software systems (AS, JH, RK, SJ), pp. 429–438.
- SANER-2015-ThongtanunamTKY #code review #overview #perspective #recommendation
- Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review (PT, CT, RGK, NY, HI, KiM), pp. 141–150.
- ICALP-v2-2015-KariS #algebra #geometry
- An Algebraic Geometric Approach to Nivat’s Conjecture (JK, MS), pp. 273–285.
- ICALP-v2-2015-Zetzsche
- An Approach to Computing Downward Closures (GZ), pp. 440–451.
- LATA-2015-Peltier #reasoning
- Reasoning on Schemas of Formulas: An Automata-Based Approach (NP), pp. 263–274.
- Haskell-2015-OliveiraMY #composition
- Modular reifiable matching: a list-of-functors approach to two-level types (BCdSO, SCM, SHY), pp. 82–93.
- AIIDE-2015-LimH #behaviour #data-driven #modelling
- A Data-Driven Approach for Computationally Modeling Players' Avatar Customization Behaviors (CUL, DFH), pp. 135–141.
- AIIDE-2015-SnodgrassO #2d #game studies #generative #video
- A Hierarchical MdMC Approach to 2D Video Game Map Generation (SS, SO), pp. 205–211.
- CHI-PLAY-2015-ChattaHSGQ #game studies
- Get off the Couch: An Approach to Utilize Sedentary Commercial Games as Exergames (AC, TH, GS, RG, JQ), pp. 47–56.
- CHI-PLAY-2015-WallnerPHW #game studies #modelling
- Modeling Routinization in Games: An Information Theory Approach (SW, MP, MH, MW), pp. 727–732.
- CIG-2015-DannZT #learning
- An improved approach to reinforcement learning in Computer Go (MD, FZ, JT), pp. 169–176.
- CIG-2015-QuiterioPM #geometry #learning
- A reinforcement learning approach for the circle agent of geometry friends (JQ, RP, FSM), pp. 423–430.
- CIG-2015-YinLCOZ #adaptation #data-driven #game studies #online
- A data-driven approach for online adaptation of game difficulty (HY, LL, WC, YSO, JZ), pp. 146–153.
- FDG-2015-AzadeganHS #collaboration #design #game studies
- Design Approach for Collaborative Cognitive Games (AA, CH, SCS).
- FDG-2015-Lederle-EnsignR
- A Software Studies Approach to Interpreting Passage (DLE, WR, JP, MM).
- VS-Games-2015-AsadipourDC #game studies #learning
- A Game-Based Training Approach to Enhance Human Hand Motor Learning and Control Abilities (AA0, KD, AC), pp. 1–6.
- VS-Games-2015-WangC #gamification #performance
- A Social-Centred Gamification Approach to Improve Household Water Use Efficiency (ZW, AC), pp. 1–4.
- GaM-2015-ValletKPM #modelling #network #social #visual notation
- A Visual Analytics Approach to Compare Propagation Models in Social Networks (JV, HK, BP, GM), pp. 65–79.
- CHI-2015-GannonGF #design #named
- Tactum: A Skin-Centric Approach to Digital Design and Fabrication (MG, TG, GWF), pp. 1779–1788.
- CHI-2015-GiaccardiK #experience #human-computer
- Foundations of Materials Experience: An Approach for HCI (EG, EK), pp. 2447–2456.
- CHI-2015-HillmanW #social #social media
- Situated Social Media Use: A Methodological Approach to Locating Social Media Practices and Trajectories (TH, AW), pp. 4057–4060.
- CHI-2015-KoemanKR #distributed #exclamation #quote #visualisation
- “Everyone Is Talking about It!”: A Distributed Approach to Urban Voting Technology and Visualisations (LK, VK, YR), pp. 3127–3136.
- CHI-2015-NoroozMJMF #learning #named #smarttech #visualisation
- BodyVis: A New Approach to Body Learning Through Wearable Sensing and Visualization (LN, MLM, AJ, BM, JEF), pp. 1025–1034.
- CHI-2015-OLearyEKVRP #comprehension #design #health #trade-off
- Understanding Design Tradeoffs for Health Technologies: A Mixed-Methods Approach (KO, JE, LK, LMV, JDR, WP), pp. 4151–4160.
- CHI-2015-PengZG #3d #design #modelling #named
- D-Coil: A Hands-on Approach to Digital 3D Models Design (HP, AZ, FG), pp. 1807–1815.
- CHI-2015-RamakersTL #design #named
- PaperPulse: An Integrated Approach for Embedding Electronics in Paper Designs (RR, KT, KL), pp. 2457–2466.
- CHI-2015-ZhaoDFZ #named
- CoFaçade: A Customizable Assistive Approach for Elders and Their Helpers (JCZ, RCD, PSF, SZ), pp. 1583–1592.
- DHM-EH-2015-CheffiRBBS #cost analysis #feedback #optimisation
- A Bi-level Optimization Approach to Get an Optimal Combination of Cost Functions for Pilot’s Arm Movement: The Case of Helicopter’s Flying Aid Functions with Haptic Feedback (SC, TR, LB, PB, JCS), pp. 248–257.
- DHM-EH-2015-HeftSBR #visualisation
- An Approach for Intuitive Visualization of Ergonomic Issues (WH, MS, ACB, PR), pp. 26–36.
- DUXU-DD-2015-BarrosSRTBS #human-computer #interface #usability
- A Usability Study of a Brain-Computer Interface Apparatus: An Ergonomic Approach (RQB, GS, CR, RT, MQB, MMS), pp. 224–236.
- DUXU-DD-2015-DiasVSVPSE #testing #usability
- A Living Labs Approach for Usability Testing of Ambient Assisted Living Technologies (MSD, EV, FS, AV, FMP, NS, SE), pp. 167–178.
- DUXU-DD-2015-Lera #design #interactive #matter
- Emotion-Centered-Design (ECD) New Approach for Designing Interactions that Matter (EdL), pp. 406–416.
- DUXU-IXD-2015-Gasparini #experience #interactive #library #user interface
- A Holistic Approach to User Experience in the Context of an Academic Library Interactive System (AAG), pp. 173–184.
- DUXU-UI-2015-SoutoFS #comprehension #design #process #towards #women
- The Creative Process in Digital Design: Towards an Understanding of Women’s Approach (VTS, PCLAF, FAdS), pp. 252–263.
- HCI-DE-2015-Bakke #process
- An Activity Theory Approach to Intuitiveness: From Artefact to Process (SB), pp. 3–13.
- HCI-DE-2015-ChamunZMOS #design #documentation #what
- What About Document Folding? User Impressions and a Design Approach (RC, AdCAZ, IHM, JBSdO, MSS), pp. 307–319.
- HCI-DE-2015-GhoshP #design #mobile
- Designing of a Natural Voice Assistants for Mobile Through User Centered Design Approach (SG, JP), pp. 320–331.
- HCI-DE-2015-Uchida #security
- A Psychological Approach to Information Security — Some Ideas for Establishing Information Security Psychology (KU), pp. 96–104.
- HCI-IT-2015-EskerudSOH #automation #design #interface
- Controlling the Home — A User Participatory Approach to Designing a Simple Interface for a Complex Home Automation System (ME, AS, CSO, HH), pp. 717–728.
- HCI-UC-2015-AzhariF #experience #social #social media #user interface #using
- Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
- HCI-UC-2015-HessBFHKMNRLT #ecosystem #mobile
- Building Mobile Software Ecosystems — A Practical Approach (SH, SB, JF, MH, FK, DM, MN, DR, TL, MT), pp. 165–177.
- HCI-UC-2015-OhJK #human-computer #simulation #using
- Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
- HIMI-IKC-2015-HasegawaD #framework #learning #platform #ubiquitous
- A Ubiquitous Lecture Archive Learning Platform with Note-Centered Approach (SH, JD), pp. 294–303.
- HIMI-IKC-2015-LiangG #information management #ontology #safety #semantics #web
- Improving Knowledge Management in Patient Safety Reporting: A Semantic Web Ontology Approach (CL, YG), pp. 118–128.
- HIMI-IKD-2015-0002S #visualisation
- An Approach to Spatial Visualizing Method for Information Structure to Enhance Remember to Look (JGL, DHS), pp. 67–73.
- HIMI-IKD-2015-GonzalezCB #design #modelling #sentiment
- Modeling User’s Sentiment in User Segmentations: An Argumentation Approach for User Centered Design (MPG, CIC, RFB), pp. 595–606.
- HIMI-IKD-2015-NoseLBK #network
- Centralized Approach for a Unified Wireless Network Access (JDN, JL, CB, AK), pp. 547–559.
- LCT-2015-Sirisaengtaksin #design #education #mobile #online #recommendation #research
- A Notification and Recommender Mobile App for Educational Online Discussion: A Design Research Approach (KS, LO, NA), pp. 325–336.
- CAiSE-2015-AbubahiaC #clustering
- A Clustering Approach for Protecting GIS Vector Data (AA, MC), pp. 133–147.
- CAiSE-2015-FukusumiMK #crowdsourcing #data transformation #game studies
- Game Aspect: An Approach to Separation of Concerns in Crowdsourced Data Management (SF, AM, HK), pp. 3–19.
- CAiSE-2015-KhouriSB #data transformation #lifecycle #traceability
- Managing Data Warehouse Traceability: A Life-Cycle Driven Approach (SK, KS, LB), pp. 199–213.
- CAiSE-2015-SunB #clustering #novel #top-down
- A Novel Top-Down Approach for Clustering Traces (YS, BB), pp. 331–345.
- CAiSE-2015-YeddulaDR #enterprise #migration #modelling
- A Model-Driven Approach to Enterprise Data Migration (RRY, PD, SR), pp. 230–243.
- ICEIS-v1-2015-ArevaloRC #information management #legacy #modelling #process
- Discovering Business Models for Software Process Management — An Approach for Integrating Time and Resource Perspectives from Legacy Information Systems (CA, IMR, MJEC), pp. 353–359.
- ICEIS-v1-2015-BorgesDRAS #generative #using
- An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
- ICEIS-v1-2015-CarboneraA15a #information management #knowledge-based #representation
- A Cognition-inspired Knowledge Representation Approach for Knowledge-based Interpretation Systems (JLC, MA), pp. 644–649.
- ICEIS-v1-2015-FerrandinENSA #classification
- A Centroid-based Approach for Hierarchical Classification (MF, FE, JCN, EES, BCÁ), pp. 25–33.
- ICEIS-v1-2015-GharbiGB #configuration management #embedded #hybrid #realtime #scheduling #search-based
- A Hybrid Genetic based Approach for Real-time Reconfigurable Scheduling of OS Tasks in Uniprocessor Embedded Systems (IG, HG, SB), pp. 385–390.
- ICEIS-v1-2015-JuniorS #compilation #optimisation #reasoning #set
- Finding Good Compiler Optimization Sets — A Case-based Reasoning Approach (NLQJ, AFdS), pp. 504–515.
- ICEIS-v1-2015-MendoncaMSS #named #query
- CORE — A Context-based Approach for Rewriting User Queries (AM, PM, DS, ACS), pp. 391–398.
- ICEIS-v1-2015-SabelnikovaCT #case study #outsourcing
- Analysing Business-IT Alignment in the IT Outsourcing Context — A Case Study Approach (ES, CMC, JJMT), pp. 5–16.
- ICEIS-v1-2015-SilvaHL #hybrid #memory management
- A Hybrid Memory Data Cube Approach for High Dimension Relations (RRS, CMH, JdCL), pp. 139–149.
- ICEIS-v2-2015-AizebojeP #pointer #using
- An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
- ICEIS-v2-2015-BayaADM #composition #product line #scalability
- Dynamic Large Scale Product Lines through Modularization Approach (AB, BEA, ID, ZM), pp. 439–444.
- ICEIS-v2-2015-Brant-RibeiroAM #interactive #modelling #petri net #using #web
- A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
- ICEIS-v2-2015-DuarteOB #architecture
- Smart Cities — An Architectural Approach (AD, CO, JB), pp. 563–573.
- ICEIS-v2-2015-EttaziHNE #adaptation #towards #transaction
- Towards a Context-Aware Adaptation Approach for Transactional Services (WE, HH, MN, SE), pp. 553–562.
- ICEIS-v2-2015-JuniorP #identification #named #ontology #requirements
- OnTheme/Doc — An Ontology-based Approach for Crosscutting Concern Identification from Software Requirements (PAPJ, RADP), pp. 188–200.
- ICEIS-v2-2015-KhlifKKD #architecture #multi #uml
- A UML-based Approach for Multi-scale Software Architectures (IK, MHK, AHK, KD), pp. 374–381.
- ICEIS-v2-2015-LucenaAAAJ #modelling
- Integrating User Stories and i* Models — A Systematic Approach (ML, CA, FMRA, EA, AJ), pp. 428–438.
- ICEIS-v2-2015-MeloFOS #diagrams #modelling #process #uml
- A Model-driven Approach to Transform SysML Internal Block Diagrams to UML Activity Diagrams (MdSM, JMSF, EAOJ, MSS), pp. 92–101.
- ICEIS-v3-2015-GhezziCRB #agile #case study #comparative #design #mobile #performance
- A Comparative Study on the Impact of Business Model Design & Lean Startup Approach versus Traditional Business Plan on Mobile Startups Performance (AG, AC, AR, RB), pp. 196–203.
- ICEIS-v3-2015-NicastroPAMBT #case study #guidelines #interface #mobile
- A Semiotic-informed Approach to Interface Guidelines for Mobile Applications — A Case Study on Phenology Data Acquisition (FN, RP, BA, LPCM, CB, RdST), pp. 34–43.
- ICEIS-v3-2015-ProencaNBB #risk management
- Digital Curation Costs — A Risk Management Approach Supported by the Business Model Canvas (DP, AN, RB, JLB), pp. 299–306.
- ICEIS-v3-2015-Wissotzki #identification #process
- A Process Approach for Capability Identification and Management (MW), pp. 204–212.
- CIKM-2015-AnwarMS #data-driven #fault #grid #physics #smarttech
- A Data-Driven Approach to Distinguish Cyber-Attacks from Physical Faults in a Smart Grid (AA, ANM, ZS), pp. 1811–1814.
- CIKM-2015-ChenZSW #eye tracking #modelling #query #realtime #topic
- A Real-Time Eye Tracking Based Query Expansion Approach via Latent Topic Modeling (YC, PZ0, DS0, BW), pp. 1719–1722.
- CIKM-2015-GribelBA #clustering #detection
- A Clustering-based Approach to Detect Probable Outcomes of Lawsuits (DLG, MGdB, LGA), pp. 1831–1834.
- CIKM-2015-HuangLY #clustering #data type #parallel #performance
- A Parallel GPU-Based Approach to Clustering Very Fast Data Streams (PH, XL, BY0), pp. 23–32.
- CIKM-2015-LagreeCV #social #social media
- A Network-Aware Approach for Searching As-You-Type in Social Media (PL, BC, HV), pp. 563–572.
- CIKM-2015-LinZWLL0C #data-driven #parametricity #pipes and filters #predict
- Data Driven Water Pipe Failure Prediction: A Bayesian Nonparametric Approach (PL, BZ, YW0, ZL, BL0, YW0, FC0), pp. 193–202.
- CIKM-2015-LiXJL #adaptation #dataset
- Differentially Private Histogram Publication for Dynamic Datasets: an Adaptive Sampling Approach (HL, LX0, XJ, JL), pp. 1001–1010.
- CIKM-2015-MaoLF #network #recognition #transaction
- Fraud Transaction Recognition: A Money Flow Network Approach (RM, ZL, JF), pp. 1871–1874.
- CIKM-2015-MunozTG #learning #ranking
- A Soft Computing Approach for Learning to Aggregate Rankings (JAVM, RdST, MAG), pp. 83–92.
- CIKM-2015-PerezSLK #recommendation
- Category-Driven Approach for Local Related Business Recommendations (YP, MS, ML, SK), pp. 73–82.
- CIKM-2015-RudraGGGG #classification #microblog
- Extracting Situational Information from Microblogs during Disaster Events: a Classification-Summarization Approach (KR, SG, NG, PG, SG0), pp. 583–592.
- CIKM-2015-WangSFYXL #effectiveness #multi
- An Integrated Bayesian Approach for Effective Multi-Truth Discovery (XW0, QZS, XSF, LY, XX, XL0), pp. 493–502.
- CIKM-2015-WangWWX #categorisation
- An Inference Approach to Basic Level of Categorization (ZW, HW, JRW, YX), pp. 653–662.
- CIKM-2015-YeZMJZ #consistency #learning #multi #privacy #rank
- Rank Consistency based Multi-View Learning: A Privacy-Preserving Approach (HJY, DCZ, YM, YJ0, ZHZ), pp. 991–1000.
- ECIR-2015-AmigoGM #clustering #effectiveness #formal method #information management #metric #retrieval
- A Formal Approach to Effectiveness Metrics for Information Access: Retrieval, Filtering, and Clustering (EA, JG, SM), pp. 817–821.
- ECIR-2015-JungL #predict
- A Discriminative Approach to Predicting Assessor Accuracy (HJJ, ML), pp. 159–171.
- ECIR-2015-LiangCC #detection #social #social media
- A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media (YL, JC, CC), pp. 233–244.
- ECIR-2015-SchindlerR #classification #music
- An Audio-Visual Approach to Music Genre Classification through Affective Color Features (AS, AR), pp. 61–67.
- ICML-2015-JerniteRS #learning #markov #modelling #performance #random
- A Fast Variational Approach for Learning Markov Random Field Language Models (YJ, AMR, DS), pp. 2209–2217.
- ICML-2015-PachecoS #pseudo
- Proteins, Particles, and Pseudo-Max-Marginals: A Submodular Approach (JP, EBS), pp. 2200–2208.
- ICML-2015-Romera-ParedesT #learning
- An embarrassingly simple approach to zero-shot learning (BRP, PHST), pp. 2152–2161.
- ICML-2015-SzorenyiBWH #multi
- Qualitative Multi-Armed Bandits: A Quantile-Based Approach (BS, RBF, PW, EH), pp. 1660–1668.
- ICML-2015-TangS #composition
- Guaranteed Tensor Decomposition: A Moment Approach (GT, PS), pp. 1491–1500.
- ICML-2015-YenLZRD #modelling #process
- A Convex Exemplar-based Approach to MAD-Bayes Dirichlet Process Mixture Models (IEHY, XL, KZ, PKR, ISD), pp. 2418–2426.
- ICML-2015-ZhuE #hybrid #probability #random #using
- A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
- KDD-2015-BarajasA #health #modelling
- Dynamically Modeling Patient’s Health State from Electronic Medical Records: A Time Series Approach (KLCB, RA), pp. 69–78.
- KDD-2015-RenEWH #automation #corpus #mining #network #recognition #type system
- Automatic Entity Recognition and Typing from Massive Text Corpora: A Phrase and Network Mining Approach (XR, AEK, CW, JH), pp. 2319–2320.
- KDD-2015-SunWH #named #predict #risk management
- LINKAGE: An Approach for Comprehensive Risk Prediction for Care Management (ZS, FW, JH), pp. 1145–1154.
- KDD-2015-WangLSH #composition #interactive #recursion #topic #towards
- Towards Interactive Construction of Topical Hierarchy: A Recursive Tensor Decomposition Approach (CW, XL, YS, JH), pp. 1225–1234.
- KDD-2015-ZhouM #kernel #predict
- Predicting Ambulance Demand: a Spatio-Temporal Kernel Approach (ZZ, DSM), pp. 2297–2303.
- MLDM-2015-CoralloFMACCGS #analysis #sentiment
- Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
- MLDM-2015-GovadaJMS #hybrid #induction #learning #using
- Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
- MLDM-2015-KrasotkinaM #optimisation #ranking
- A Bayesian Approach to Sparse Learning-to-Rank for Search Engine Optimization (OK, VM), pp. 382–394.
- MLDM-2015-KrasotkinaM15a #analysis
- A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
- RecSys-2015-GuoD #bias #category theory
- Uncovering Systematic Bias in Ratings across Categories: a Bayesian Approach (FG, DBD), pp. 317–320.
- SEKE-2015-AdamEA #design
- An approach for classifying design artifacts (SA, GEB, AA), pp. 164–167.
- SEKE-2015-GomedeSB #delivery #lifecycle
- A Practical Approach to Software Continuous Delivery Focused on Application Lifecycle Management (EG, RTDS, RMdB), pp. 320–325.
- SEKE-2015-MagalhaesAM #framework #independence #model transformation #on the #platform #specification
- On the Specification of Model Transformations through a Platform Independent Approach (APM, AMSA, RSPM), pp. 558–561.
- SEKE-2015-Murillo-MoreraJ #algorithm #framework #learning #predict #search-based #using
- A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
- SEKE-2015-NoureddineJHKM #correlation #named #profiling #research
- CARP: Correlation Based Approach for Researcher Profiling (HN, IJ, HH, OAK, EM), pp. 461–464.
- SEKE-2015-SaharAA #case study #detection #image #modelling #prototype
- A Case Study Approach: Iterative Prototyping Model Based Detection of Macular Edema in Retinal OCT Images (SS, SA, MUA), pp. 266–271.
- SEKE-2015-SampaioMLM #adaptation #learning #research
- Reflecting, adapting and learning in small software organizations: an action research approach (SS, MM, AL, HPM), pp. 46–50.
- SEKE-2015-TironiMRM #identification #learning
- An approach to identify relevant subjects for supporting the Learning Scheme creation task (HT, ALAM, SSR, AM), pp. 506–511.
- SEKE-2015-WangG #hybrid #novel #predict
- A Novel Hybrid Approach for Diarrhea Prediction (YW, JG), pp. 168–173.
- SIGIR-2015-CanutoGSRM #classification #documentation #parallel #performance #scalability
- An Efficient and Scalable MetaFeature-based Document Classification Approach based on Massively Parallel Computing (SDC, MAG, WS, TR, WM), pp. 333–342.
- ECMFA-J-2012-BaresiBKMMPRR15 #embedded #uml #validation #verification
- Formal verification and validation of embedded systems: the UML-based MADES approach (LB, GB, DSK, NDM, AM, RFP, AR, MR), pp. 343–363.
- AMT-2015-RabbiLYK #diagrams
- A Diagrammatic Approach to Model Completion (FR, YL, IY, LK), pp. 56–65.
- BX-2015-AnjorinLKSS #graph grammar #guidelines
- A Systematic Approach and Guidelines to Developing a Triple Graph Grammar (AA, EL, RK, AS, PS), pp. 81–95.
- BX-2015-HidakaBTM #analysis #bidirectional #graph transformation
- Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
- ECMFA-2015-BousseMCB #generative #metamodelling
- A Generative Approach to Define Rich Domain-Specific Trace Metamodels (EB, TM, BC, BB), pp. 45–61.
- ECMFA-2015-JahanbanifarKT #integration #modelling
- A Model-Based Approach for the Integration of Configuration Fragments (AJ, FK, MT), pp. 125–136.
- MoDELS-2015-AtkinsonGK15a #modelling #multi
- A unifying approach to connections for multi-level modeling (CA, RG, TK), pp. 216–225.
- MoDELS-2015-HajriGBS #case study #embedded #industrial #lessons learnt #modelling #product line
- Applying product line Use case modeling in an industrial automotive embedded system: Lessons learned and a refined approach (IH, AG, LCB, TS), pp. 338–347.
- MoDELS-2015-IftikharIKM #automation #framework #game studies #modelling #platform #testing
- An automated model based testing approach for platform games (SI, MZI, MUK, WM), pp. 426–435.
- MoDELS-2015-Rodriguez-Echeverria #analysis #evolution #model transformation #statistics
- A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
- PLEASE-2015-TzeremesG #development #product line
- A Software Product Line Approach for End User Development of Smart Spaces (VT, HG), pp. 23–26.
- SPLC-2015-0002Z #agile
- Lean variation management: increasing business value with a diversified approach (MB, BZ), p. 385.
- SPLC-2015-MartinezZBKT #bottom-up #product line
- Bottom-up adoption of software product lines: a generic and extensible approach (JM, TZ, TFB, JK, YLT), pp. 101–110.
- SPLC-2015-Munoz-Fernandez #adaptation #named #requirements #self #simulation
- REFAS: a PLE approach for simulation of self-adaptive systems requirements (JCMF, GT, IR, RM, CS), pp. 121–125.
- OOPSLA-2015-CrafaP #programming
- The chemical approach to typestate-oriented programming (SC, LP), pp. 917–934.
- OOPSLA-2015-HagueLO #css #detection #html
- Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach (MH, AWL, CHLO), pp. 1–19.
- LOPSTR-2015-FuK
- A Type-Theoretic Approach to Resolution (PF0, EK), pp. 91–106.
- PLDI-2015-EmaniO #runtime
- Celebrating diversity: a mixture of experts approach for runtime mapping in dynamic environments (MKE, MFPO), pp. 499–508.
- REFSQ-2015-GhaziSG #named #requirements #visualisation
- FlexiView: A Magnet-Based Approach for Visualizing Requirements Artifacts (PG, NS, MG), pp. 262–269.
- ASE-2015-GuzmanEB #classification #evolution #overview
- Ensemble Methods for App Review Classification: An Approach for Software Evolution (N) (EG, MEH, BB), pp. 771–776.
- ASE-2015-NguyenNN #divide and conquer #migration #multi #source code #statistics
- Divide-and-Conquer Approach for Multi-phase Statistical Migration for Source Code (T) (ATN, TTN, TNN), pp. 585–596.
- ASE-2015-VierhauserRGE #case study #experience #lessons learnt #monitoring
- Developing a DSL-Based Approach for Event-Based Monitoring of Systems of Systems: Experiences and Lessons Learned (E) (MV, RR, PG, AE), pp. 715–725.
- ASE-2015-VuNPN #keyword #mining #mobile
- Mining User Opinions in Mobile App Reviews: A Keyword-Based Approach (T) (PMV, TTN, HVP, TTN), pp. 749–759.
- ESEC-FSE-2015-MangalZNN #program analysis
- A user-guided approach to program analysis (RM, XZ, AVN, MN), pp. 462–473.
- ESEC-FSE-2015-MorenoCGS #adaptation #model checking #nondeterminism #probability #self
- Proactive self-adaptation under uncertainty: a probabilistic model checking approach (GAM, JC, DG, BRS), pp. 1–12.
- ESEC-FSE-2015-VasquezBBOPP #android #energy #multi #optimisation #user interface
- Optimizing energy consumption of GUIs in Android apps: a multi-objective approach (MLV, GB, CEBC, RO, MDP, DP), pp. 143–154.
- GTTSE-2015-PontesMOP #algebra #implementation #linear
- Implementing a Linear Algebra Approach to Data Processing (RP, MM, JNO, JOP), pp. 215–222.
- ICSE-v1-2015-JoblinMASR #community #developer #fine-grained #network
- From Developer Networks to Verified Communities: A Fine-Grained Approach (MJ, WM, SA, JS, DR), pp. 563–573.
- ICSE-v1-2015-SahaZKP #information retrieval #testing
- An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes (RKS, LZ, SK, DEP), pp. 268–279.
- ICSE-v1-2015-WhalenPRSG #flexibility #metric
- A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics (MWW, SP, NR, MS, DG), pp. 506–516.
- ICSE-v1-2015-YuBC #fault #multi #testing
- Does the Failing Test Execute a Single or Multiple Faults? An Approach to Classifying Failing Tests (ZY, CB, KYC), pp. 924–935.
- ICSE-v2-2015-Baia #multi #project management #simulation
- An Integrated Multi-Agent-Based Simulation Approach to Support Software Project Management (DdMB), pp. 911–914.
- ICSE-v2-2015-Caracciolo #architecture #automation #constraints #testing
- A Unified Approach to Automatic Testing of Architectural Constraints (AC), pp. 871–874.
- ICSE-v2-2015-Hecht #android #detection
- An Approach to Detect Android Antipatterns (GH), pp. 766–768.
- SAC-2015-0001RMW #behaviour #constraints #process
- Matching of events and activities: an approach based on behavioral constraint satisfaction (TB, ARS, JM, MW), pp. 1225–1230.
- SAC-2015-AliK #effectiveness #recommendation
- An effective approach to group recommendation based on belief propagation (IA, SWK), pp. 1148–1153.
- SAC-2015-AwadBESAS #anti #detection #process #runtime
- Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
- SAC-2015-BadouelHKM #collaboration #distributed
- A grammatical approach to data-centric case management in a distributed collaborative environment (EB, LH, GEK, CM), pp. 1834–1839.
- SAC-2015-BarnPB #evaluation #privacy #requirements
- An approach to early evaluation of informational privacy requirements (BSB, GP, RB), pp. 1370–1375.
- SAC-2015-BekkoucheCR #constraints #fault #locality #named
- LocFaults: a new flow-driven and constraint-based error localization approach (MB, HC, MR), pp. 1773–1780.
- SAC-2015-BorgesDSEAS #performance #reasoning #reuse #using
- Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
- SAC-2015-BurityE #recommendation
- A quantitative, evidence-based approach for recommending software modules (TB, GEdS), pp. 1449–1456.
- SAC-2015-DAddioM #collaboration #sentiment
- A sentiment-based item description approach for kNN collaborative filtering (RMD, MGM), pp. 1060–1065.
- SAC-2015-FauconnierKR #machine learning #recognition #taxonomy
- A supervised machine learning approach for taxonomic relation recognition through non-linear enumerative structures (JPF, MK, BR), pp. 423–425.
- SAC-2015-GassaraRJ #architecture #deployment #modelling #multi
- A multi-scale modeling approach for software architecture deployment (AG, IBR, MJ), pp. 1405–1410.
- SAC-2015-JoCKBO #algorithm #collaboration #cpu #data-driven #on the
- On running data-intensive algorithms with intelligent SSD and host CPU: a collaborative approach (YYJ, SC, SWK, DHB, HO), pp. 2060–2065.
- SAC-2015-JuniorRSM #deployment #multi #non-functional #requirements
- A multi-criteria approach for assessing cloud deployment options based on non-functional requirements (RGJ, TR, AS, NCM), pp. 1383–1389.
- SAC-2015-JuniorSM #semantics
- An approach for building lexical-semantic resources based on heterogeneous information sources (JGdAJ, US, LBM), pp. 402–408.
- SAC-2015-Khenfri #architecture #optimisation #synthesis
- A holistic optimization approach for the synthesis of AUTOSAR E/E architecture (FK), pp. 1960–1961.
- SAC-2015-KhlifKKD #architecture #modelling #multi #towards
- Towards a multi-scale modeling approach for software architectures (IK, MHK, AHK, KD), pp. 1468–1470.
- SAC-2015-LabibPCG #development #learning #product line #reuse
- Enforcing reuse and customization in the development of learning objects: a product line approach (AEL, MCP, JHC, AG), pp. 261–263.
- SAC-2015-MeftehBB #case study #diagrams #evaluation #feature model #implementation #modelling #uml
- Implementation and evaluation of an approach for extracting feature models from documented UML use case diagrams (MM, NB, HBA), pp. 1602–1609.
- SAC-2015-MongioviGFPT #analysis #data flow #detection #hybrid #java
- Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
- SAC-2015-NascimentoBJ #geometry #recognition
- A new approach to biometric recognition based on hand geometry (MVPdN, LVB, NLCJ), pp. 59–65.
- SAC-2015-PedrosaT #encoding #visual notation #word
- Compact and discriminative approach for encoding spatial-relationship of visual words (GVP, AJMT), pp. 92–95.
- SAC-2015-PerkusichMSGAP #metric #network
- A Bayesian network approach to assist on the interpretation of software metrics (MP, AM, LCeS, KCG, HOdA, AP), pp. 1498–1503.
- SAC-2015-ReddySC #aspect-oriented #incremental #learning #performance #weaving
- Incremental aspect weaving: an approach for faster AOP learning (YRR, AS, MC), pp. 1480–1485.
- SAC-2015-RegoMP #detection #folksonomy #learning
- A supervised learning approach to detect subsumption relations between tags in folksonomies (ASdCR, LBM, CESP), pp. 409–415.
- SAC-2015-RodriguesAFSB #ontology #simulation
- An ontological approach for simulating legal action in the Brazilian penal code (CMdOR, RRdA, FLGdF, EPdS, PVdSB), pp. 376–381.
- SAC-2015-RodriguesBM #behaviour #clustering #correlation #energy #using
- Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
- SAC-2015-SantiagoPH #detection #modelling
- A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
- SAC-2015-ShahriarH #assessment #metric #risk management #security #web
- Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
- SAC-2015-SilvaMR #algorithm #problem #using
- An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
- SAC-2015-Soares0W #modelling #named #recognition #requirements #speech
- VoiceToModel: an approach to generate requirements models from speech recognition mechanisms (FS, JA, FW), pp. 1350–1357.
- SAC-2015-VielMT #multi
- An approach for controlling synchronous remote instances of a multimedia presentation (CCV, ELM, CACT), pp. 1285–1290.
- GPCE-2015-KabacC #development
- Orchestrating masses of sensors: a design-driven development Approach (MK, CC), pp. 117–120.
- ASPLOS-2015-MishraZLH #constraints #energy #modelling #performance #probability #visual notation
- A Probabilistic Graphical Model-based Approach for Minimizing Energy Under Performance Constraints (NM, HZ, JDL, HH), pp. 267–281.
- CASE-2015-AlfonsoXA #capacity #programming #representation #scheduling
- A simulation-optimization approach for capacity planning and appointment scheduling of blood donors based on mathematical programming representation of event dynamics (EA, XX, VA), pp. 728–733.
- CASE-2015-CarmenateRLBM #analysis #behaviour #energy #modelling #using
- Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
- CASE-2015-ChuFRSKT #automation #hardware #integration
- A LC-MS integration approach in life science automation: Hardware integration and software integration (XC, HF, TR, NS, MK, KT), pp. 979–984.
- CASE-2015-DiganiHSS #coordination #multi #polynomial #programming
- A Quadratic Programming approach for coordinating multi-AGV systems (VD, MAH, LS, CS), pp. 600–605.
- CASE-2015-FerrerALVLH #assembly #automation #process
- An approach for knowledge-driven product, process and resource mappings for assembly automation (BRF, BA, AL, DAV, JLML, RH), pp. 1104–1109.
- CASE-2015-KouiderHOO #graph #integer #linear #scheduling #source code
- Mixed integer linear programs and tabu search approach to solve mixed graph coloring for unit-time job shop scheduling (AK, HAH, SO, AO), pp. 1177–1181.
- CASE-2015-LiDLZ #composition #problem
- A decomposition approach to colored traveling salesman problems (JL, XD, HL, MZ), pp. 51–56.
- CASE-2015-LuSJSX #multi #nondeterminism #programming
- A chance constrained programming approach for multi-product multi-stage integrated production planning under internal and external uncertainties (SL, HS, CJ, HS, LX), pp. 880–885.
- CASE-2015-MaP #black box #programmable #testing
- Design-to-test approach for black-box testing of programmable controllers (CM, JP), pp. 1018–1024.
- CASE-2015-SathishRB #detection #industrial #simulation
- A simulation based approach to detect wear in industrial robots (VS, SR, SB), pp. 1570–1575.
- CASE-2015-SemeniutaF #data flow #formal method #industrial #specification
- Discrete event dataflow as a formal approach to specification of industrial vision systems (OS, PF), pp. 849–854.
- CASE-2015-SenfeldsVMB #industrial
- Power smoothing approach within industrial DC microgrid with supercapacitor storage for robotic manufacturing application (AS, MV, DM, OB), pp. 1333–1338.
- CASE-2015-SustoM #machine learning #multi #predict
- Slow release drug dissolution profile prediction in pharmaceutical manufacturing: A multivariate and machine learning approach (GAS, SFM), pp. 1218–1223.
- CASE-2015-XieZLSD #agile #analysis #multi #process
- Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
- CGO-2015-ZhengLHWJ #debugging #manycore #on the #performance
- On performance debugging of unnecessary lock contentions on multicore processors: a replay-based approach (LZ, XL, BH, SW, HJ), pp. 56–67.
- DAC-2015-ChaariENTK #modelling #safety
- A model-based and simulation-assisted FMEDA approach for safety-relevant E/E systems (MC, WE, CN, BAT, TK), p. 6.
- DAC-2015-HanF #analysis #cpu #gpu #graph #scalability
- Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
- DAC-2015-KadjoAKG #cpu #energy #gpu #mobile #performance #platform
- A control-theoretic approach for energy efficient CPU-GPU subsystem in mobile platforms (DK, RA, MK, PVG), p. 6.
- DAC-2015-SripadaP #graph
- A timing graph based approach to mode merging (SS, MP), p. 6.
- DAC-2015-ZhanOGZ0 #named #network #power management #towards
- DimNoC: a dim silicon approach towards power-efficient on-chip network (JZ, JO, FG, JZ, YX), p. 6.
- DATE-2015-0001CY #optimisation #process #robust
- A robust approach for process variation aware mask optimization (JK, WKC, EFYY), pp. 1591–1594.
- DATE-2015-BiewerAGSH #coordination #realtime #synthesis
- A symbolic system synthesis approach for hard real-time systems based on coordinated SMT-solving (AB, BA, JG, TS, CH), pp. 357–362.
- DATE-2015-Bogdan #challenge #cyber-physical #manycore #personalisation #platform
- A cyber-physical systems approach to personalized medicine: challenges and opportunities for noc-based multicore platforms (PB), pp. 253–258.
- DATE-2015-HoqueMS #analysis #maintenance #model checking #probability #reliability #towards
- Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
- DATE-2015-LiuLY #effectiveness
- An effective triple patterning aware grid-based detailed routing approach (ZL, CL, EFYY), pp. 1641–1646.
- DATE-2015-ReehmanCCS #architecture #hardware #memory management #parallel
- In-place memory mapping approach for optimized parallel hardware interleaver architectures (SUR, CC, PC, AS), pp. 896–899.
- DATE-2015-RuizMK #reuse
- Systematic application of ISO 26262 on a SEooC: Support by applying a systematic reuse approach (AR, AM, TK), pp. 393–396.
- DATE-2015-TrinadhBSPK #named #programming #testing
- DP-fill: a dynamic programming approach to X-filling for minimizing peak test power in scan tests (ST, CSB, SGS, SP, VK), pp. 836–841.
- HPCA-2015-MeswaniBRSIL #architecture #memory management
- Heterogeneous memory architectures: A HW/SW approach for mixing die-stacked and off-package memories (MRM, SB, DR, JS, MI, GHL), pp. 126–136.
- HPCA-2015-WangM #architecture #manycore #named #resource management #scalability
- XChange: A market-based approach to scalable dynamic multi-resource allocation in multicore architectures (XW, JFM), pp. 113–125.
- HPDC-2015-KaxirasKNRS #distributed #execution #memory management #scalability
- Turning Centralized Coherence and Distributed Critical-Section Execution on their Head: A New Approach for Scalable Distributed Shared Memory (SK, DK, MN, AR, KFS), pp. 3–14.
- PDP-2015-VallsSRG #energy
- The Tag Filter Cache: An Energy-Efficient Approach (JJV, JS, AR, MEG), pp. 182–189.
- PPoPP-2015-HarshvardhanAR #algorithm #communication #graph #parallel
- A hierarchical approach to reducing communication in parallel graph algorithms (H, NMA, LR), pp. 285–286.
- ESOP-2015-TerauchiU #refinement
- Relaxed Stratification: A New Approach to Practical Complete Predicate Refinement (TT, HU), pp. 610–633.
- FASE-2015-StruberRCT #model transformation #performance #reuse #variability
- A Variability-Based Approach to Reusable and Efficient Model Transformations (DS, JR, MC, GT), pp. 283–298.
- CAV-2015-DietschHLP #ltl #model checking #modulo theories
- Fairness Modulo Theory: A New Approach to LTL Software Model Checking (DD, MH, VL, AP), pp. 49–66.
- CAV-2015-ReinkingP #program repair
- A Type-Directed Approach to Program Repair (AR, RP), pp. 511–517.
- CSL-2015-Kaiser0LL #bound
- A Unified Approach to Boundedness Properties in MSO (LK, ML, SL, CL), pp. 441–456.
- ICLP-2015-AlrajehG #comprehension
- A Logic-Based Approach to Understanding Lone-Actor Terrorism (DA, PG), pp. 166–178.
- ICLP-2015-AngelopoulosG #biology #database #logic
- A Logical Approach to Working with Biological Databases (NA, GG), pp. 235–246.
- ICLP-J-2015-BlackmoreRE #compilation #effectiveness #embedded #logic programming #predict
- A logic programming approach to predict effective compiler settings for embedded software (CB, OR, KE), pp. 481–494.
- ICST-2015-CastillosWW
- Show Me New Counterexamples: A Path-Based Approach (KCC, HW, VW), pp. 1–10.
- ICST-2015-ErmanTBRA #automation #clustering #development #information management #multi #navigation #testing
- Navigating Information Overload Caused by Automated Testing — a Clustering Approach in Multi-Branch Development (NE, VT, MB, PR, AA), pp. 1–9.
- ICST-2015-XuLCK #bound #detection #lightweight #thread
- A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops (JX, YL, RHC, DCK), pp. 1–10.
- ICTSS-2015-AbreuAHW #spreadsheet #testing
- Testing for Distinguishing Repair Candidates in Spreadsheets - the Mussco Approach (RA, SA, BH, FW), pp. 124–140.
- ICTSS-2015-LahamiKBJ #adaptation #behaviour #generative #testing
- Selective Test Generation Approach for Testing Dynamic Behavioral Adaptations (ML, MK, HB, MJ), pp. 224–239.
- ISSTA-2015-WangGMC #android #clone detection #detection #named #scalability
- WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
- LICS-2015-LicataB
- A Cubical Approach to Synthetic Homotopy Theory (DRL, GB), pp. 92–103.
- LICS-2015-MoninN
- A Unifying Approach to the Gamma Question (BM, AN), pp. 585–596.
- SAT-2015-Zielke0
- A New Approach to Partial MUS Enumeration (CZ, MK), pp. 387–404.
- CBSE-2014-DidierM #component #detection
- A new approach to detect potential race conditions in component-based systems (JYD, MM), pp. 97–106.
- QoSA-2014-RaatikainenSM #architecture #case study #evaluation #experience #lightweight #maturity
- Architecture management and evaluation in mature products: experiences from a lightweight approach (MR, JS, TM), pp. 73–82.
- WICSA-2014-DragomirLB #architecture
- Systematic Architectural Decision Management, A Process-Based Approach (AD, HL, TB), pp. 255–258.
- WICSA-2014-ZernadjiTC #evolution #quality #requirements #web #web service
- Processing the Evolution of Quality Requirements of Web Service Orchestrations: A Pattern-Based Approach (TZ, CT, CF), pp. 139–142.
- DocEng-2014-NourashrafeddinMA #clustering #concept #documentation #using #wiki
- An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
- DRR-2014-HajiABSP #documentation #keyword
- Two-stage approach to keyword spotting in handwritten documents (MMH, MRA, TDB, CYS, DP), p. ?–12.
- HT-2014-KotoulasLSSTA #coordination #linked data #open data
- A linked data approach to care coordination (SK, VL, MLS, MS, PT, PMA), pp. 77–87.
- HT-2014-KumarHL #behaviour #identification #twitter
- A behavior analytics approach to identifying tweets from crisis regions (SK, XH, HL), pp. 255–260.
- JCDL-2014-BatjargalKKM14a #documentation
- An approach to named entity extraction from historical documents in traditional mongolian script (BB, GK, FK, AM), pp. 489–490.
- JCDL-2014-ChakrabortyKGGM #learning #predict #towards
- Towards a stratified learning approach to predict future citation counts (TC, SK, PG, NG, AM), pp. 351–360.
- JCDL-2014-DibieMS #behaviour #comprehension #education #online #predict #using
- A computational approach to understanding and predicting the behavior of educators using an online curriculum planning tool (OD, KEM, TS), pp. 487–488.
- JCDL-2014-LiuYGSG #mining #network #recommendation
- Full-text based context-rich heterogeneous network mining approach for citation recommendation (XL, YY, CG, YS, LG), pp. 361–370.
- SIGMOD-2014-LongWZX
- Hypersphere dominance: an optimal approach (CL, RCWW, BZ, MX), pp. 111–122.
- SIGMOD-2014-RoyS #database #formal method #query
- A formal approach to finding explanations for database queries (SR, DS), pp. 1579–1590.
- SIGMOD-2014-TranNST #clustering #named
- JECB: a join-extension, code-based approach to OLTP data partitioning (KQT, JFN, BS, DT), pp. 39–50.
- SIGMOD-2014-XiongHN #distributed #network #performance #query
- A software-defined networking based approach for performance management of analytical queries on distributed data stores (PX, HH, JFN), pp. 955–966.
- SIGMOD-2014-ZhuLWX #graph #order #query #reachability #scalability
- Reachability queries on large dynamic graphs: a total order approach (ADZ, WL, SW, XX), pp. 1323–1334.
- SIGMOD-2014-ZouHWYHZ #data-driven #graph #natural language #rdf
- Natural language question answering over RDF: a graph data driven approach (LZ, RH, HW, JXY, WH, DZ), pp. 313–324.
- VLDB-2014-AltowimKM #relational
- Progressive Approach to Relational Entity Resolution (YA, DVK, SM), pp. 999–1010.
- VLDB-2014-ArenasDFKS #graph
- A Principled Approach to Bridging the Gap between Graph Data and their Schemas (MA, GID, AF, AK, KS), pp. 601–612.
- VLDB-2014-DuttNH #named #query #robust
- QUEST: An Exploratory Approach to Robust Query Processing (AD, SN, JRH), pp. 1585–1588.
- VLDB-2014-WeiYLJ #independence #permutation #query #reachability
- Reachability Querying: An Independent Permutation Labeling Approach (HW, JXY, CL, RJ), pp. 1191–1202.
- VLDB-2015-LiLGSZDFH14
- A Confidence-Aware Approach for Truth Discovery on Long-Tail Data (QL, YL, JG, LS, BZ, MD, WF, JH), pp. 425–436.
- EDM-2014-AtapattuFF
- Acquisition of Triples of Knowledge from Lecture Notes: A Natural Langauge Processing Approach (TA, KF, NJGF), pp. 193–196.
- EDM-2014-EagleB #data-driven #difference #problem
- Exploring Differences in Problem Solving with Data-Driven Approach Maps (ME, TB), pp. 76–83.
- EDM-2014-LeeLP #behaviour #data-driven #education #game studies #learning
- Learning Individual Behavior in an Educational Game: A Data-Driven Approach (SJL, YEL, ZP), pp. 114–121.
- EDM-2014-SegalKGSS #collaboration #named #personalisation
- EduRank: A Collaborative Filtering Approach to Personalization in E-learning (AS, ZK, KG, GS, BS), pp. 68–75.
- ITiCSE-2014-Dorge
- A methodological approach to key competencies in informatics (CD), pp. 201–206.
- SIGITE-2014-Trabelsi #comprehension #education #network #security #using
- Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach (ZT), pp. 39–44.
- CSMR-WCRE-2014-AlawnehHML #communication #effectiveness
- A contextual approach for effective recovery of inter-process communication patterns from HPC traces (LA, AHL, SSM, YL), pp. 274–282.
- CSMR-WCRE-2014-VidacsBTSG #detection #fault #locality #reduction #testing
- Test suite reduction for fault detection and localization: A combined approach (LV, ÁB, DT, IS, TG), pp. 204–213.
- ICPC-2014-PerezA #comprehension
- A diagnosis-based approach to software comprehension (AP, RA), pp. 37–47.
- ICPC-2014-SuzukiSIH #modelling #n-gram #using
- An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
- ICSME-2014-AlomariCM #estimation #maintenance
- A Slice-Based Estimation Approach for Maintenance Effort (HWA, MLC, JIM), pp. 81–90.
- ICSME-2014-BauerVJ #detection #novel
- A Novel Approach to Detect Unintentional Re-implementations (VB, TV, EJ), pp. 491–495.
- ICSME-2014-BhattacharyaNF #developer #graph
- Determining Developers’ Expertise and Role: A Graph Hierarchy-Based Approach (PB, IN, MF), pp. 11–20.
- ICSME-2014-KevicFS #named #navigation
- CoMoGen: An Approach to Locate Relevant Task Context by Combining Search and Navigation (KK, TF, DCS), pp. 61–70.
- ICSME-2014-KhanIA #behaviour #heuristic #state machine #uml
- A Heuristic-Based Approach to Refactor Crosscutting Behaviors in UML State Machines (MUK, MZI, SA), pp. 557–560.
- ICALP-v1-2014-GolovnevKM #problem #product line
- Families with Infants: A General Approach to Solve Hard Partition Problems (AG, ASK, IM), pp. 551–562.
- HOFM-2014-LadenbergerDL #csp #modelling #visualisation
- An Approach for Creating Domain Specific Visualisations of CSP Models (LL, ID, ML), pp. 20–35.
- ILC-2014-Nunes-Harwitt14a #code generation #evaluation #semantics
- Eager Evaluation Isn’t Eager Enough A Transformation Based Approach to Semantics-Directed Code Generation (ANH), p. 79.
- AIIDE-2014-RoweML #composition #experience #interactive #learning #optimisation
- Optimizing Player Experience in Interactive Narrative Planning: A Modular Reinforcement Learning Approach (JPR, BWM, JCL).
- AIIDE-2014-ShakerA #combinator #game studies #generative
- Alone We Can Do So Little, Together We Can Do So Much: A Combinatorial Approach for Generating Game Content (NS, MAZ).
- AIIDE-2014-SnodgrassO #generative #markov #using
- A Hierarchical Approach to Generating Maps Using Markov Chains (SS, SO).
- CIG-2014-FerreiraT #generative #search-based
- A search-based approach for generating Angry Birds levels (LF, CFMT), pp. 1–8.
- CIG-2014-LimH #automation #evaluation #game studies #generative #using
- An approach to general videogame evaluation and automatic generation using a description language (CUL, DFH), pp. 1–8.
- CIG-2014-MahmoudLWA #game studies #visual notation
- Believable NPCs in serious games: HTN planning approach based on visual perception (IMM, LL, DW, MZA), pp. 1–8.
- CIG-2014-TremblayTV #algorithm #game studies
- An algorithmic approach to analyzing combat and stealth games (JT, PAT, CV), pp. 1–8.
- DiGRA-2014-HoogenBI #behaviour #game studies
- Pressure at Play: Measuring Player Approach and Avoidance Behaviour through the Keyboard (WvdH, EB, WAI).
- FDG-2014-ChauvinLDN #game studies
- An out-of-character approach to emergent game narratives (SC, GL, JYD, SN).
- FDG-2014-WinnOKM #education
- Sparks of Eternity: A new approach to religious education (BMW, CO, GK, RM).
- CHI-2014-DunwellFPHALS #game studies #learning #safety
- A game-based learning approach to road safety: the code of everand (ID, SdF, PP, MH, SA, PL, CDS), pp. 3389–3398.
- CHI-2014-HashishBY #collaboration
- Involving children in content control: a collaborative and education-oriented content filtering approach (YH, AB, JEY), pp. 1797–1806.
- CHI-2014-LaureyssensCCMCM #component #composition #game studies #named #network
- ZWERM: a modular component network approach for an urban participation game (TL, TC, LC, PM, JC, AVM), pp. 3259–3268.
- CHI-2014-LeeLKKHC
- An EEG-based approach for evaluating audio notifications under ambient sounds (YCL, WCL, JTK, LWK, YTH, FYC), pp. 3817–3826.
- CHI-2014-SunH #relational
- Binding the material and the discursive with a relational approach of affordances (HS, WHD), pp. 3533–3542.
- CSCW-2014-XiaLSLDG #mobile #replication
- A partial replication approach for anywhere anytime mobile commenting (HX, TL, BS, GL, XD, NG), pp. 530–541.
- DHM-2014-GaoH #fault #nondeterminism #research
- Research on the Continuous Descent Approach (CDA) Operational Error of Pilot Base on Cloud Model and Uncertainty Theory (YG, YH), pp. 91–100.
- DUXU-DI-2014-Bockermann #big data #data analysis #programming #visual notation
- A Visual Programming Approach to Big Data Analytics (CB), pp. 393–404.
- DUXU-DI-2014-CastroRG #design
- Information Design — Qualitative Approach for Corporative App in iPad (JAGFdC, MVR, JYLG), pp. 203–212.
- DUXU-DI-2014-WojdziakG #3d #design #interface #modelling
- Beyond Perspective — A Model-Based Approach for Camera-Based 3D-Interface Design (JW, RG), pp. 488–498.
- DUXU-DP-2014-GokturkS #development #interface
- A Perception Oriented Approach for Usable and Secure Interface Development (MG, IS), pp. 23–31.
- DUXU-TMT-2014-GoodeLSGB #research
- A Mixed-Method Approach for In-Depth Contextual User Research (AWG, CL, AS, RG, VB), pp. 86–95.
- HCI-AIMT-2014-LiapisKKX #experience #human-computer
- Evaluating User’s Emotional Experience in HCI: The PhysiOBS Approach (AL, NK, CK, MNX), pp. 758–767.
- HCI-AS-2014-SjolinderEBFHSNB #development #multi
- A Multi-disciplinary Approach in the Development of a Stroke Rehabilitation Tool (MS, ME, ILB, MF, PH, DS, SN, JB), pp. 351–362.
- HCI-TMT-2014-AssilaOE #evaluation #human-computer #integration #quality #towards
- Towards Qualitative and Quantitative Data Integration Approach for Enhancing HCI Quality Evaluation (AA, KMdO, HE), pp. 469–480.
- HCI-TMT-2014-Bakke #process #user interface
- Immediacy in User Interfaces: An Activity Theoretical Approach (SB), pp. 14–22.
- HCI-TMT-2014-FangZ #online
- A Revised Lexical Approach for Analyzing Online Reviews (XF, FZ), pp. 69–76.
- HIMI-DE-2014-Lucas #constraints #interactive #visualisation
- An Interactive Approach to Constraint-Based Visualizations (WTL), pp. 54–63.
- LCT-NLE-2014-ElciD #case study #education #experience #research #social #social media
- A Narrative Research Approach: The Experiences of Social Media Support in Higher Education (AE, BÇD), pp. 36–42.
- LCT-TRE-2014-AlmazovaK #student
- Computer Assisted Individual Approach to Acquiring Foreign Vocabulary of Students Major (NA, MK), pp. 248–257.
- LCT-TRE-2014-Hayes14a #development #game studies #learning #simulation
- An Approach to Holistic Development of Serious Games and Learning Simulations (ATH), pp. 42–49.
- SCSM-2014-FardounA #community #feedback #framework #platform
- Feedback Platform for Community Colleges: An Approach to Knowledge Excellence (HMF, AAMAG), pp. 306–313.
- SCSM-2014-LeeLS #network #social
- A New Approach to Exploring Spatiotemporal Space in the Context of Social Network Services (JGL, KCL, DHS), pp. 221–228.
- SCSM-2014-PlikynasM #social
- Agent-Based Nonlocal Social Systems: Neurodynamic Oscillations Approach (DP, SM), pp. 253–264.
- SCSM-2014-SolingerHHFL #facebook #multi #predict #social #social media
- Beyond Facebook Personality Prediction: — A Multidisciplinary Approach to Predicting Social Media Users’ Personality (CS, LMH, SHH, RF, CL), pp. 486–493.
- VISSOFT-2014-BarikLCM #compilation #developer #how #visualisation
- How Developers Visualize Compiler Messages: A Foundational Approach to Notification Construction (TB, KL, SC, ERMH), pp. 87–96.
- CAiSE-2014-GarciaDC #adaptation #model-to-text #sql
- An Adapter-Based Approach to Co-evolve Generated SQL in Model-to-Text Transformations (JG, OD, JC), pp. 518–532.
- CAiSE-2014-LiH #requirements #security
- Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach (TL, JH), pp. 285–300.
- CAiSE-2014-NobauerSG #analysis #automation #evaluation #product line #similarity
- Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
- EDOC-2014-FlorezSV #analysis #automation #enterprise #modelling
- Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
- ICEIS-v1-2014-AmaralCRGTS #data mining #framework #image #mining
- The SITSMining Framework — A Data Mining Approach for Satellite Image Time Series (BFA, DYTC, LASR, RRdVG, AJMT, EPMdS), pp. 225–232.
- ICEIS-v1-2014-BouzidCFP #enterprise #retrieval #semantics
- A Pattern-based Approach for Semantic Retrieval of Information Resources in Enterprises — Application Within STMicroelectronics (SB, CC, CSF, JP), pp. 193–200.
- ICEIS-v1-2014-CaetanoLC #case study #data-driven #predict
- A Data-driven Approach to Predict Hospital Length of Stay — A Portuguese Case Study (NC, RMSL, PC), pp. 407–414.
- ICEIS-v1-2014-KammererN #comparison #named #sql
- Application-Mimes — An Approach for Quantitative Comparison of SQL — and NoSQL-databases (MK, JN), pp. 256–263.
- ICEIS-v1-2014-Tribolet #adaptation #bottom-up #enterprise #top-down
- An Engineering Approach to Natural Enterprise Dynamics — From Top-down Purposeful Systemic Steering to Bottom-up Adaptive Guidance Control (JT), p. XIII.
- ICEIS-v2-2014-BeenK #analysis #internet #online #people
- Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
- ICEIS-v2-2014-FerreiraS #enterprise #implementation #named #semantics #towards #web
- e-swim: Enterprise Semantic Web Implementation Model — Towards a Systematic Approach to Implement the Semantic Web in Enterprises (RF, IS), pp. 653–658.
- ICEIS-v2-2014-Kupper #research #social
- Measuring the Success of Social CRM — First Approach and Future Research (TK), pp. 573–582.
- ICEIS-v2-2014-MachadoLPWO
- A Reactive and Proactive Approach for Ambient Intelligence (AM, DL, AMP, LKW, JPMdO), pp. 501–512.
- ICEIS-v2-2014-MahmoudBAG #learning
- A New Approach Based on Learning Services to Generate Appropriate Learning Paths (CBM, FB, MHA, FG), pp. 643–646.
- ICEIS-v2-2014-MarcolinoOG #diagrams #effectiveness #sequence chart #towards #variability
- Towards the Effectiveness of the SMarty Approach for Variability Management at Sequence Diagram Level (AM, EAOJ, IMdSG), pp. 249–256.
- ICEIS-v2-2014-MerouaniMS #consistency #formal method #process #testing #towards
- Formalizing Artifact-Centric Business Processes — Towards a Conformance Testing Approach (HM, FM, HSB), pp. 368–374.
- ICEIS-v2-2014-MurianaMG #development #information management #open source
- Development of Open Source Software, a Qualitative View in a Knowledge Management Approach (LMM, CM, ACBG), pp. 391–399.
- ICEIS-v2-2014-SarmientoLRS #automation #concurrent #generative #requirements #testing
- An Automated Approach of Test Case Generation for Concurrent Systems from Requirements Descriptions (ES, JCSdPL, NR, AvS), pp. 339–347.
- ICEIS-v3-2014-BaldominosCC #information management #interactive
- An Approach to Circumstantial Knowledge Management for Human-Like Interaction (AB, FJCG, DC), pp. 71–78.
- ICEIS-v3-2014-BarrosFSA #towards
- Deriving Service Level Agreements from Business Level Agreements — An Approach Towards Strategic Alignment in Organizations (VAB, MF, GMBS, JPdA), pp. 214–225.
- ICEIS-v3-2014-PereiraV #enterprise #named
- e-Strategy — An Enterprise Engineer Approach to Strategic Management (RP, AV), pp. 472–477.
- ICEIS-v3-2014-RavasanRH #framework #fuzzy #process #using
- A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
- ICEIS-v3-2014-ZouhaierHA #adaptation #people #user interface
- A MDA-based Approach for Enabling Accessibility Adaptation of User Interface for Disabled People (LZ, YBH, LJBA), pp. 120–127.
- CIKM-2014-DuQF #fine-grained #owl
- A Practical Fine-grained Approach to Resolving Incoherent OWL 2 DL Terminologies (JD, GQ, XF), pp. 919–928.
- CIKM-2014-LiuXCXTY #bound #linear #network #scalability #social
- Influence Maximization over Large-Scale Social Networks: A Bounded Linear Approach (QL, BX, EC, HX, FT, JXY), pp. 171–180.
- CIKM-2014-MingYC #re-engineering #summary #topic
- A Dynamic Reconstruction Approach to Topic Summarization of User-Generated-Content (ZM, JY, TSC), pp. 311–320.
- CIKM-2014-TangWPTL #detection
- An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
- CIKM-2014-YeMAG #privacy #visual notation
- Negative FaceBlurring: A Privacy-by-Design Approach to Visual Lifelogging with Google Glass (TY, BM, RA, CG), pp. 2036–2038.
- CIKM-2014-ZhangKLCY #named #scalability
- NCR: A Scalable Network-Based Approach to Co-Ranking in Question-and-Answer Sites (JZ, XK, RJL, YC, PSY), pp. 709–718.
- CIKM-2014-ZhaoCN #data type #probability
- Truth Discovery in Data Streams: A Single-Pass Probabilistic Approach (ZZ, JC, WN), pp. 1589–1598.
- ECIR-2014-HuangDHL
- A Two-level Approach for Subtitle Alignment (JH, HD, XH, YL), pp. 468–473.
- ECIR-2014-MeguebliKDP #identification
- Unsupervised Approach for Identifying Users’ Political Orientations (YM, MK, BLD, FP), pp. 507–512.
- ECIR-2014-VechtomovaST #information retrieval #word
- An Information Retrieval-Based Approach to Determining Contextual Opinion Polarity of Words (OV, KS, JT), pp. 553–559.
- ECIR-2014-YounusOP #behaviour #microblog #modelling #personalisation
- A Language Modeling Approach to Personalized Search Based on Users’ Microblog Behavior (AY, CO, GP), pp. 727–732.
- ICML-c1-2014-BardenetDH #adaptation #markov #monte carlo #scalability #towards
- Towards scaling up Markov chain Monte Carlo: an adaptive subsampling approach (RB, AD, CCH), pp. 405–413.
- ICML-c1-2014-HutterHL #performance
- An Efficient Approach for Assessing Hyperparameter Importance (FH, HH, KLB), pp. 754–762.
- ICPR-2014-BagheriGE #classification #novel #subclass
- Generic Subclass Ensemble: A Novel Approach to Ensemble Classification (MAB, QG, SE), pp. 1254–1259.
- ICPR-2014-BayramogluKEANKH #detection #image #machine learning #using
- Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
- ICPR-2014-BiswasBC #documentation #image
- A Global-to-Local Approach to Binarization of Degraded Document Images (BB, UB, BBC), pp. 3008–3013.
- ICPR-2014-CaoHS #classification #kernel #learning #multi
- Optimization-Based Extreme Learning Machine with Multi-kernel Learning Approach for Classification (LlC, WbH, FS), pp. 3564–3569.
- ICPR-2014-CechFM #3d #detection #refinement
- A 3D Approach to Facial Landmarks: Detection, Refinement, and Tracking (JC, VF, JM), pp. 2173–2178.
- ICPR-2014-ChakeriH #clustering #framework #game studies #set
- Dominant Sets as a Framework for Cluster Ensembles: An Evolutionary Game Theory Approach (AC, LOH), pp. 3457–3462.
- ICPR-2014-ChatbriKK #documentation #image #independence #query
- An Application-Independent and Segmentation-Free Approach for Spotting Queries in Document Images (HC, PWK, KK), pp. 2891–2896.
- ICPR-2014-ChenCF #classification #hybrid #semantics
- A Hybrid Holistic/Semantic Approach for Scene Classification (ZC, ZC, HF), pp. 2299–2304.
- ICPR-2014-ColonnaCN #distributed
- A Distributed Approach for Classifying Anuran Species Based on Their Calls (JGC, MC, EFN), pp. 1242–1247.
- ICPR-2014-Desrosiers #adaptation #image #performance #random #segmentation
- A Fast and Adaptive Random Walks Approach for the Unsupervised Segmentation of Natural Images (CD), pp. 130–135.
- ICPR-2014-DingM #detection #image
- An Accurate Approach for Microaneurysm Detection in Digital Fundus Images (SD, WM), pp. 1846–1851.
- ICPR-2014-DuanA #estimation #image
- A J-Linkage Based Approach for Vanishing Direction Estimation in Catadioptric Images (WD, NMA), pp. 2113–2118.
- ICPR-2014-DumonceauxRG #algebra #clustering
- An Algebraic Approach to Ensemble Clustering (FD, GR, MG), pp. 1301–1306.
- ICPR-2014-FrintropGC
- A Cognitive Approach for Object Discovery (SF, GMG, ABC), pp. 2329–2334.
- ICPR-2014-HalsteadDSF #database #people #semantics #video
- Locating People in Video from Semantic Descriptions: A New Database and Approach (MH, SD, SS, CF), pp. 4501–4506.
- ICPR-2014-JinIHS #using
- A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
- ICPR-2014-KapsourasN #recognition #using
- Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
- ICPR-2014-KeceliC #multimodal #using
- A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
- ICPR-2014-LablackDBD #detection
- A Local Approach for Negative Emotion Detection (AL, TD, IMB, CD), pp. 417–420.
- ICPR-2014-MaHXP #3d #robust #using
- A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
- ICPR-2014-MarcaciniDHR #clustering #documentation #learning #metric
- Privileged Information for Hierarchical Document Clustering: A Metric Learning Approach (RMM, MAD, ERH, SOR), pp. 3636–3641.
- ICPR-2014-MasselliZ #geometry #performance #problem
- A New Geometric Approach for Faster Solving the Perspective-Three-Point Problem (AM, AZ), pp. 2119–2124.
- ICPR-2014-MehnertMSMB
- A Structural Texture Approach for Characterising Malignancy Associated Changes in Pap Smears Based on Mean-Shift and the Watershed Transform (AM, RM, KS, PM, EB), pp. 1189–1193.
- ICPR-2014-MeloLMS #detection
- An Optimized Sliding Window Approach to Pedestrian Detection (VHCdM, SL, DM, WRS), pp. 4346–4351.
- ICPR-2014-NagyM #grid #search-based
- Binary Tomography on the Triangular Grid with 3 Alternative Directions — A Genetic Approach (BN, EVM), pp. 1079–1084.
- ICPR-2014-NourbakhshBP #graph #matrix
- A Matrix Factorization Approach to Graph Compression (FN, SRB, MP), pp. 76–81.
- ICPR-2014-RodriguesPPW #feature model
- A Binary Krill Herd Approach for Feature Selection (DR, LAMP, JPP, SATW), pp. 1407–1412.
- ICPR-2014-SharmaCL #3d #generative #hybrid #novel
- Kinect-Variety Fusion: A Novel Hybrid Approach for Artifacts-Free 3DTV Content Generation (MS, SC, BL), pp. 2275–2280.
- ICPR-2014-SilvaTT #graph #named
- BoG: A New Approach for Graph Matching (FBS, ST, RdST), pp. 82–87.
- ICPR-2014-WalhaDLGA #image #learning #taxonomy
- Sparse Coding with a Coupled Dictionary Learning Approach for Textual Image Super-resolution (RW, FD, FL, CG, AMA), pp. 4459–4464.
- ICPR-2014-WangEGLLF #distance #documentation #edit distance #graph #word
- A Coarse-to-Fine Word Spotting Approach for Historical Handwritten Documents Based on Graph Embedding and Graph Edit Distance (PW, VE, CG, CL, JL, AF), pp. 3074–3079.
- ICPR-2014-WangZH #data-driven #health #named
- DensityTransfer: A Data Driven Approach for Imputing Electronic Health Records (FW, JZ, JH), pp. 2763–2768.
- ICPR-2014-XianCZ #automation #image #segmentation
- A Fully Automatic Breast Ultrasound Image Segmentation Approach Based on Neutro-Connectedness (MX, HDC, YZ), pp. 2495–2500.
- ICPR-2014-YamadaM #behaviour #using
- Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
- ICPR-2014-ZhangHLHZL #feature model #hybrid
- A Hybrid Feature Selection Approach by Correlation-Based Filters and SVM-RFE (JZ, XH, PPL, WH, YZ, HL), pp. 3684–3689.
- KDD-2014-0001GHHLMSSZ #probability
- Knowledge vault: a web-scale approach to probabilistic knowledge fusion (XD, EG, GH, WH, NL, KM, TS, SS, WZ), pp. 601–610.
- KDD-2014-ChengB0 #dependence #effectiveness #named
- FBLG: a simple and effective approach for temporal dependence discovery from time series data (DC, MTB, YL), pp. 382–391.
- KDD-2014-KapoorSSY #predict
- A hazard based approach to user return time prediction (KK, MS, JS, TY), pp. 1719–1728.
- KDD-2014-QianHJPZ #distance #learning #metric #using
- Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
- KDD-2014-Schadt #data-driven
- A data driven approach to diagnosing and treating disease (EES), p. 3.
- KDD-2014-YinW #clustering #modelling #multi
- A dirichlet multinomial mixture model-based approach for short text clustering (JY, JW), pp. 233–242.
- KDIR-2014-BarbantanLP #health #identification #ontology
- Disease Identification in Electronic Health Records — An Ontology based Approach (IB, CL, RP), pp. 261–268.
- KDIR-2014-ChakrabortyGR #performance #retrieval #word
- A Word Association Based Approach for Improving Retrieval Performance from Noisy OCRed Text (AC, KG, UR), pp. 450–456.
- KDIR-2014-DeglInnocentiNT #knowledge base #multi
- A New Multi-lingual Knowledge-base Approach to Keyphrase Extraction for the Italian Language (DD, DDN, CT), pp. 78–85.
- KDIR-2014-MojahedI #distance #semistructured data
- A Fusion Approach to Computing Distance for Heterogeneous Data (AM, BdlI), pp. 269–276.
- KEOD-2014-Grabska #concept #ontology #process
- An Ontology based Approach for Assisting Conceptualisation in CAD Processes (EG), pp. 272–279.
- KEOD-2014-PaniCP #content management #multi
- An Approach to Multimedia Content Management (FEP, GC, SP), pp. 264–271.
- KMIS-2014-GuerrucciDAB #information management #network
- Phased Approach to a Knowledge Management Network (DG, RMD, RCA, DB), pp. 101–108.
- KMIS-2014-Schmitt #generative #information management #novel
- Proposing a Next Generation of Knowledge Management Systems for Creative Collaborations in Support of Individuals and Institutions — Featuring a Novel Approach for Meme-based Personal Knowledge Management (US), pp. 346–353.
- KMIS-2014-ToureAD #enterprise #named #performance
- AM2O — An Efficient Approach for Managing Training in Enterprise (FT, EA, KD), pp. 405–412.
- KR-2014-DiakidoyKM0 #automation #comprehension
- A Psychology-Inspired Approach to Automated Narrative Text Comprehension (IAD, ACK, LM, RM).
- KR-2014-PereiraDH #abduction #bias #reasoning
- An Abductive Reasoning Approach to the Belief Bias Effect (LMP, EAD, SH).
- MLDM-2014-AbdullahiCM #identification #novel #using
- A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
- MLDM-2014-JiangDPL #estimation #markov #optimisation #recognition
- Modified Bootstrap Approach with State Number Optimization for Hidden Markov Model Estimation in Small-Size Printed Arabic Text Line Recognition (ZJ, XD, LP, CL), pp. 437–441.
- MLDM-2014-WaiyamaiS #classification #dataset
- A Cost-Sensitive Based Approach for Improving Associative Classification on Imbalanced Datasets (KW, PS), pp. 31–42.
- RecSys-2014-LingLK #recommendation
- Ratings meet reviews, a combined approach to recommend (GL, MRL, IK), pp. 105–112.
- SEKE-2014-AssoudiL #multi #process
- A Multi-Agent-Based Approach for Autonomic Data Exchange Processes (HA, HL), pp. 334–337.
- SEKE-2014-DalliloAF #multi #process
- Making the link between strategy and process model collections: a multi-layered approach (FD, JPdA, MF), pp. 387–392.
- SEKE-2014-DegrossiAFM #risk management
- Flood Citizen Observatory: a crowdsourcing-based approach for flood risk management in Brazil (LCD, JPdA, MCF, EMM), pp. 570–575.
- SEKE-2014-GomedeB #multi
- A Multicriteria Approach to Project Portfolio Selection (EG, RMB), pp. 43–48.
- SEKE-2014-GuessiON #architecture
- An Approach for Capturing and Documenting Architectural Decisions of Reference Architectures (MG, FO, EYN), pp. 162–167.
- SEKE-2014-HartmannFNMKT #modelling #reasoning #runtime #using
- Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
- SEKE-2014-HauboldBH #flexibility #towards
- Towards a flexible approach to manage varying and altering information representations (TH, GB, WH), pp. 566–569.
- SEKE-2014-JingLC #collaboration #design
- An Argument-based Collaborative Negotiation Approach to Support Software Design Collaboration (NJ, SCYL, HFC), pp. 274–279.
- SEKE-2014-LingZF #modelling #process #similarity
- An Improved Structure-based Approach to Measure Similarity of Business Process Models (JL, LZ, QF), pp. 377–380.
- SEKE-2014-QueirozB #embedded #modelling #product line
- A Critical Embedded System Product Line Model-based Approach (PGGQ, RTVB), pp. 71–75.
- SEKE-2014-Saito0TO #constraints #generative #knowledge-based #testing #web
- Test Data Generation for Web Applications: A Constraint and Knowledge-based Approach (HS, ST, HT, MO), pp. 110–114.
- SEKE-2014-SatapathyPR #agile #estimation #kernel #using
- Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
- SEKE-2014-ShahnewazR #named
- RELREA — An Analytical Approach for Evaluating Release Readiness (SMS, GR), pp. 437–442.
- SEKE-2014-WangC #analysis #social #visualisation
- User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
- SEKE-2014-XuL #architecture #automation #synthesis #using
- Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
- SIGIR-2014-BabbarPGA #classification #distributed #ranking #scalability
- Re-ranking approach to classification in large-scale power-law distributed category systems (RB, IP, ÉG, MRA), pp. 1059–1062.
- SIGIR-2014-ChengCBB #twitter
- Who is the barbecue king of texas?: a geo-spatial approach to finding local experts on twitter (ZC, JC, HB, VB), pp. 335–344.
- SIGIR-2014-HingmireC #classification #topic
- Topic labeled text classification: a weakly supervised approach (SH, SC), pp. 385–394.
- SIGIR-2014-KotsakosLKGKN #documentation
- A burstiness-aware approach for document dating (DK, TL, DK, DG, NK, KN), pp. 1003–1006.
- SIGIR-2014-QureshiOP #visualisation
- A perspective-aware approach to search: visualizing perspectives in news search results (MAQ, CO, GP), pp. 1261–1262.
- SIGIR-2014-RoitmanHS #clustering
- A fusion approach to cluster labeling (HR, SH, MSS), pp. 883–886.
- AMT-2014-GholizadehDM #model transformation #query
- A Query Structured Approach for Model Transformation (HG, ZD, TSEM), pp. 54–63.
- ECMFA-2014-LogreMCR #variability #visualisation
- Sensor Data Visualisation: A Composition-Based Approach to Support Domain Variability (IL, SM, PC, MR), pp. 101–116.
- ICMT-2014-JilaniIK #generative #model transformation #testing
- A Search Based Test Data Generation Approach for Model Transformations (AAJ, MZI, MUK), pp. 17–24.
- MoDELS-2014-EnriciAP #communication #modelling #uml
- A UML Model-Driven Approach to Efficiently Allocate Complex Communication Schemes (AE, LA, RP), pp. 370–385.
- MoDELS-2014-NataleCSS #adaptation #communication #component #generative
- An MDA Approach for the Generation of Communication Adapters Integrating SW and FW Components from Simulink (MDN, FC, AS, ALSV), pp. 353–369.
- MoDELS-2014-SoltanaFASB #case study #modelling #uml #using
- Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
- SPLC-2014-BarreirosM
- A cover-based approach for configuration repair (JB, AMDM), pp. 157–166.
- SPLC-2014-ColanziVGO #design #product line #search-based
- A search-based approach for software product line design (TEC, SRV, IMSG, WNO), pp. 237–241.
- SPLC-2014-DieumegardTP #data flow #library #product line #semantics #specification
- A software product line approach for semantic specification of block libraries in dataflow languages (AD, AT, MP), pp. 217–226.
- SPLC-2014-DillonRD #product line
- A methodical approach to product line adoption (MD, JR, RD), pp. 340–349.
- SPLC-2014-UrliBC #product line
- Handling complex configurations in software product lines: a tooled approach (SU, MBF, PC), pp. 112–121.
- AdaEurope-2014-IliasovLR #formal method
- Practical Formal Methods in Railways — The SafeCap Approach (AI, IL, AR), pp. 177–192.
- AdaEurope-2014-ZhouLL #embedded #requirements #safety #validation
- A TASM-Based Requirements Validation Approach for Safety-Critical Embedded Systems (JZ, YL, KL), pp. 43–57.
- PLDI-2014-StorkNSMFMA #named #programming language
- Æminium: a permission based concurrent-by-default programming language approach (SS, KN, JS, MM, AF, PM, JA), p. 4.
- POPL-2014-BeyeneCPR #constraints #game studies #graph #infinity
- A constraint-based approach to solving games on infinite graphs (TAB, SC, CP, AR), pp. 221–234.
- POPL-2014-RamsayNO #abstraction #higher-order #model checking #refinement
- A type-directed abstraction refinement approach to higher-order model checking (SJR, RPN, CHLO), pp. 61–72.
- RE-2014-AdedjoumaSB #automation #case study #detection
- Automated detection and resolution of legal cross references: Approach and a study of Luxembourg’s legislation (MA, MS, LCB), pp. 63–72.
- RE-2014-Daneva #game studies #how #multi #online #requirements
- How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games (MD), pp. 3–12.
- RE-2014-FilipovikjNR #formal method #requirements
- Reassessing the pattern-based approach for formalizing requirements in the automotive domain (PF, MN, GRN), pp. 444–450.
- RE-2014-PutnamC #game studies #multi #requirements
- Therapist-centered requirements: A multi-method approach of requirement gathering to support rehabilitation gaming (CP, JC), pp. 13–22.
- RE-2014-TranM #evolution #feature model #nondeterminism
- An Approach for Decision Support on the Uncertainty in Feature Model Evolution (LMST, FM), pp. 93–102.
- REFSQ-2014-MaidenLZBAL #case study #experience #specification
- A Requirements-Led Approach for Specifying QoS-Aware Service Choreographies: An Experience Report (NAMM, JL, KZ, AB, GDA, FL), pp. 239–253.
- REFSQ-2014-SannierB #analysis #modelling #named #requirements
- INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
- ASE-2014-NguyenNNN #api #learning #migration #mining #statistics
- Statistical learning approach for mining API usage mappings for code migration (ATN, HAN, TTN, TNN), pp. 457–468.
- FSE-2014-Wille #modelling
- Managing lots of models: the FaMine approach (DW), pp. 817–819.
- ICSE-2014-CaiWC #constraints #dynamic analysis #named #parallel #source code #thread
- ConLock: a constraint-based approach to dynamic checking on deadlocks in multithreaded programs (YC, SW, WKC), pp. 491–502.
- SAC-2014-BergamascoN #3d #feature model #retrieval #using
- A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
- SAC-2014-BrinkeMBBAK #composition #design #energy
- A tool-supported approach for modular design of energy-aware software (StB, SM, CB, LB, MA, SK), pp. 1206–1212.
- SAC-2014-ChenWWZL #3d #web
- An approach to support stereoscopic 3D web (QC, WW, RW, JZ, ZL), pp. 981–984.
- SAC-2014-EngielCL #concept #elicitation #using
- Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
- SAC-2014-Fernandez-MarquezSSYDZ #mobile #self
- Self-managing and self-organising mobile computing applications: a separation of concerns approach (JLFM, GDMS, GS, JY, SD, FZ), pp. 458–465.
- SAC-2014-GamaD #deployment #fault #self #testing
- A fault deployment and activation approach for testing self-recovery mechanisms (KG, DD), pp. 1114–1119.
- SAC-2014-GriebeG #automation #mobile #modelling #testing
- A model-based approach to test automation for context-aware mobile applications (TG, VG), pp. 420–427.
- SAC-2014-HoritaHSNTO #modelling #refinement #using
- Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
- SAC-2014-HuergoPD #identification #modelling #using
- A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
- SAC-2014-JeongLCHP #android #behaviour #kernel #monitoring
- A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
- SAC-2014-KimLSKL #named #ranking #web
- C-Rank: a contribution-based web page ranking approach (DJK, SCL, HYS, SWK, JBL), pp. 908–912.
- SAC-2014-LiuCM #ad hoc #composition #mobile #network
- A low-latency service composition approach in mobile ad hoc networks (CL, JC, FLM), pp. 509–511.
- SAC-2014-ManducaMFP #database #implementation #multitenancy #web
- A nonintrusive approach for implementing single database, multitenant services from web applications (AMM, EVM, RPMF, MdGCP), pp. 751–756.
- SAC-2014-Moin #collaboration #visualisation
- A unified approach to collaborative data visualization (AM), pp. 280–286.
- SAC-2014-OliveiraNWB #kernel #named
- Ianus: secure and holistic coexistence with kernel extensions — a immune system-inspired approach (DO, JN, NW, MB), pp. 1672–1679.
- SAC-2014-PapadakisT #analysis #effectiveness #fault #locality #mutation testing
- Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
- SAC-2014-ParraJGI #automation #product line
- An SOA approach for automating software product line adoption (CP, DJ, LG, AI), pp. 1231–1238.
- SAC-2014-RolimBCCAPM #multimodal #recommendation
- A recommendation approach for digital TV systems based on multimodal features (RR, FB, AC, GC, HOdA, AP, AFM), pp. 289–291.
- SAC-2014-SantosSTO #hybrid #navigation
- A hybrid GA-ANN approach for autonomous robots topological navigation (VdCS, DOS, CFMT, FSO), pp. 148–153.
- SAC-2014-Silva #automation #overview #quality #requirements #specification #validation
- Quality of requirements specifications: a preliminary overview of an automatic validation approach (ARdS), pp. 1021–1022.
- SAC-2014-VidalCNM #automation #generative
- A semi-automatic approach for generating customized R2RML mappings (VMPV, MAC, LETN, JMM), pp. 316–322.
- SAC-2014-ZiadiHPZT #independence #product line #towards
- Towards a language-independent approach for reverse-engineering of software product lines (TZ, CH, MP, MZ, YLT), pp. 1064–1071.
- GPCE-2014-SmeltzerEM #visualisation
- A transformational approach to data visualization (KS, ME, RAM), pp. 53–62.
- ASPLOS-2014-RuwaseKGM #hardware #named
- Guardrail: a high fidelity approach to protecting hardware devices from buggy drivers (OR, MAK, PBG, TCM), pp. 655–670.
- CASE-2014-ChenGGLCL #analysis #behaviour #scheduling
- A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
- CASE-2014-ChenS #markov #modelling #novel #using
- Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
- CASE-2014-FantiLIMUA
- A Decision Support System approach for the postal delivery operations (MPF, RL, GI, AMM, WU, LA), pp. 588–593.
- CASE-2014-GlorieuxDSL #optimisation #using
- Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
- CASE-2014-HuangNXCSD #3d #geometry #modelling #predict
- Predictive modeling of geometric deviations of 3D printed products — A unified modeling approach for cylindrical and polygon shapes (QH, HN, KX, YC, SS, TD), pp. 25–30.
- CASE-2014-HuangYL #identification
- An intelligent approach to identify elderly body information (YPH, WJY, SYL), pp. 824–829.
- CASE-2014-HuCLY #automation #comparative #petri net #using
- A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
- CASE-2014-LiXG #capacity
- A queuing approach for radiotherapy treatment capacity planning (SL, XX, NG), pp. 540–545.
- CASE-2014-LiZLM #capacity #scheduling
- An intercell scheduling approach considering transportation capacity (ML, HZ, DL, XM), pp. 594–599.
- CASE-2014-Murakami #generative #multi #problem
- A column generation approach for the multi-vehicle covering tour problem (KM), pp. 1063–1068.
- CASE-2014-NagataO #multi #using
- Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
- CASE-2014-RahmanCBM #assessment #safety
- Ex-ante assessment of struck-by safety hazards in construction projects: A motion-planning approach (MMR, TC, LB, AM), pp. 277–282.
- CASE-2014-TiengYHC #multi #optimisation #process
- A multi-objective optimization approach for selecting key features of machining processes (HT, HCY, MHH, FTC), pp. 899–904.
- CASE-2014-TrikiGX #health
- A two-phase approach for periodic home health care planning (NT, TG, XX), pp. 518–523.
- CASE-2014-WantiaLR #industrial
- Symbolic planning for industrial applications — the eRobotics approach (NW, DL, JR), pp. 367–372.
- CASE-2014-WuBZ #linear #scheduling
- Linear programming-based approach to scheduling of crude oil operations in refinery with oil type mixing requirement (NW, LB, MZ), pp. 430–435.
- CASE-2014-YuM #data-driven #detection #statistics
- Data-driven bottleneck detection in manufacturing systems: A statistical approach (CY, AM), pp. 710–715.
- CGO-2014-JimboreanKSBK #compilation #hardware #scalability
- Fix the code. Don’t tweak the hardware: A new compiler approach to Voltage-Frequency scaling (AJ, KK, VS, DBS, SK), p. 262.
- DAC-2014-AgostaBPS #embedded #encryption #execution #multi
- A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software (GA, AB, GP, MS), p. 6.
- DAC-2014-KiamehrOTN #analysis #fault
- Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
- DAC-2014-Rodriguez-NavasSHNLL #automation #functional #safety #specification #verification
- Automated Specification and Verification of Functional Safety in Heavy-Vehicles: the VeriSpec Approach (GRN, CCS, HH, MN, OL, HL), p. 4.
- DATE-2014-BahrebarS #network
- Improving hamiltonian-based routing methods for on-chip networks: A turn model approach (PB, DS), pp. 1–4.
- DATE-2014-BraojosDBAA #hardware #manycore #power management
- Hardware/software approach for code synchronization in low-power multi-core sensor nodes (RB, AYD, IB, GA, DA), pp. 1–6.
- DATE-2014-CannellaBS #realtime #scheduling #streaming #using
- System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
- DATE-2014-EckerVZG #metamodelling #synthesis
- The metamodeling approach to system level synthesis (WE, MV, LZ, AG), pp. 1–2.
- DATE-2014-FrancillonNRT
- A minimalist approach to Remote Attestation (AF, QN, KBR, GT), pp. 1–6.
- DATE-2014-KarakonstantisSSAB #analysis #energy #variability
- A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
- DATE-2014-KimHPSL #implementation #modelling #testing
- A layered approach for testing timing in the model-based implementation (BK, HIH, TP, SHS, IL), pp. 1–4.
- DATE-2014-RiefertCSBRB #automation #effectiveness #fault #functional #generative #testing
- An effective approach to automatic functional processor test generation for small-delay faults (AR, LMC, MS, PB, MSR, BB), pp. 1–6.
- HPCA-2014-HechtmanCHTBHRW #consistency #named
- QuickRelease: A throughput-oriented approach to release consistency on GPUs (BAH, SC, DRH, YT, BMB, MDH, SKR, DAW), pp. 189–200.
- HPCA-2014-PariharH #dependence #metaheuristic
- Accelerating decoupled look-ahead via weak dependence removal: A metaheuristic approach (RP, MCH), pp. 662–677.
- HPDC-2014-IslamLWP #named
- SOR-HDFS: a SEDA-based approach to maximize overlapping in RDMA-enhanced HDFS (NSI, XL, MWuR, DKP), pp. 261–264.
- PDP-2014-AmorettiGZST #formal method #in the cloud #mobile #towards
- Towards a Formal Approach to Mobile Cloud Computing (MA, AG, FZ, VS, FT), pp. 743–750.
- PDP-2014-AudemardHJP #distributed #effectiveness #problem #satisfiability
- An Effective Distributed D&C Approach for the Satisfiability Problem (GA, BH, SJ, CP), pp. 183–187.
- PDP-2014-Misale #concurrent #memory management
- Accelerating Bowtie2 with a lock-less concurrency approach and memory affinity (CM), pp. 578–585.
- PDP-2014-RossRPSH #hybrid #parallel
- A Class-Structured Approach to Couple Application and Hybrid Core Parallelism (JAR, DAR, SJP, DRS, BJH), pp. 681–687.
- PDP-2014-SanchezAGCMC #gpu #named
- FRODRUG: A Virtual Screening GPU Accelerated Approach for Drug Discovery (SGS, ERA, JIG, PC, ASM, RC), pp. 594–600.
- PDP-2014-SmithWWA #clustering #distributed
- A Cluster-Based Approach to Consensus Based Distributed Task Allocation (DS, JW, SRW, AAA), pp. 428–431.
- PDP-2014-TcarenkoFLPT #manycore #modelling
- Multi Rectangle Modeling Approach for Application Mapping on a Many-Core System (IT, MF, PL, JP, HT), pp. 452–457.
- FoSSaCS-2014-Cirstea #algebra #linear #logic
- A Coalgebraic Approach to Linear-Time Logics (CC), pp. 426–440.
- STOC-2014-DinurS #parallel
- Analytical approach to parallel repetition (ID, DS), pp. 624–633.
- STOC-2014-GavinskyMWW #bound #complexity #composition #towards
- Toward better formula lower bounds: an information complexity approach to the KRW composition conjecture (DG, OM, OW, AW), pp. 213–222.
- CAV-2014-AlglaveKNP #automation #static analysis
- Don’t Sit on the Fence — A Static Analysis Approach to Automatic Fence Insertion (JA, DK, VN, DP), pp. 508–524.
- CAV-2014-EsparzaK #automaton #composition #ltl
- From LTL to Deterministic Automata: A Safraless Compositional Approach (JE, JK), pp. 192–208.
- CAV-2014-EsparzaLMMN #analysis #smt
- An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
- ICLP-J-2014-AmadiniGM #constraints #lazy evaluation #named #theorem proving
- SUNNY: a Lazy Portfolio Approach for Constraint Solving (RA, MG, JM), pp. 509–524.
- ICST-2014-Marin #automation #database #multi #testing
- A Data-Agnostic Approach to Automatic Testing of Multi-dimensional Databases (MM), pp. 133–142.
- ICST-2014-PotetMPD #control flow #evaluation #injection #named #robust
- Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
- ICTSS-2014-SamihGBAB #modelling #testing
- An Approach to Derive Usage Models Variants for Model-Based Testing (HS, HLG, RB, MA, BB), pp. 80–96.
- ISSTA-2014-AppeltNBA #automation #injection #sql #testing
- Automated testing for SQL injection vulnerabilities: an input mutation approach (DA, CDN, LCB, NA), pp. 259–269.
- ISSTA-2014-GalindoAABB #sequence #testing #variability #video
- A variability-based testing approach for synthesizing video sequences (JAG, MA, MA, BB, DB), pp. 293–303.
- LICS-CSL-2014-BilokonE #probability #process
- A domain-theoretic approach to Brownian motion and general continuous stochastic processes (PB, AE), p. 10.
- LICS-CSL-2014-FredriksonJ #privacy #satisfiability
- Satisfiability modulo counting: a new approach for analyzing privacy properties (MF, SJ), p. 10.
- VMCAI-2014-AcunaAMS #complexity #heuristic #modelling #network
- Modeling Parsimonious Putative Regulatory Networks: Complexity and Heuristic Approach (VA, AA, AM, AS), pp. 322–336.
- ECSA-2013-DimechB #architecture #consistency #development #maintenance
- Maintaining Architectural Conformance during Software Development: A Practical Approach (CD, DB), pp. 208–223.
- QoSA-2013-KonersmannDGR #architecture #evolution #towards
- Towards architecture-centric evolution of long-living systems (the ADVERT approach) (MK, ZD, MG, RHR), pp. 163–168.
- QoSA-2013-Schmid #formal method #technical debt
- A formal approach to technical debt decision making (KS), pp. 153–162.
- DocEng-2013-AgostiCFHM
- Interacting with digital cultural heritage collections via annotations: the CULTURA approach (MA, OC, NF, CH, GM), pp. 13–22.
- DRR-2013-MedjkouneMPV #online #recognition #using
- Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
- DRR-2013-SabbourS
- A segmentation-free approach to Arabic and Urdu OCR (NS, FS).
- HT-2013-RoutBPC #classification #social
- Where’s @wally?: a classification approach to geolocating users based on their social ties (DPR, KB, DPP, TC), pp. 11–20.
- ICDAR-2013-BougueliaBB #classification #documentation #learning
- A Stream-Based Semi-supervised Active Learning Approach for Document Classification (MRB, YB, AB), pp. 611–615.
- ICDAR-2013-ChiC #recognition
- Chinese Handwritten Legal Amount Recognition with HMM-Based Approach (BC, YC), pp. 778–782.
- ICDAR-2013-DingsAE #segmentation
- A Locale Group Based Line Segmentation Approach for Non Uniform Skewed and Curved Arabic Handwritings (LD, AAH, ME), pp. 803–806.
- ICDAR-2013-DingsAE13a #modelling #synthesis
- An Approach for Arabic Handwriting Synthesis Based on Active Shape Models (LD, AAH, ME), pp. 1260–1264.
- ICDAR-2013-DoTT #recognition #representation
- New Approach for Symbol Recognition Combining Shape Context of Interest Points with Sparse Representation (THD, ST, ORT), pp. 265–269.
- ICDAR-2013-DuH #normalisation #online #recognition #variability
- An Irrelevant Variability Normalization Based Discriminative Training Approach for Online Handwritten Chinese Character Recognition (JD, QH), pp. 69–73.
- ICDAR-2013-ElzobiADES #adaptation #markov #modelling #recognition
- A Hidden Markov Model-Based Approach with an Adaptive Threshold Model for Off-Line Arabic Handwriting Recognition (ME, AAH, LD, ME, AS), pp. 945–949.
- ICDAR-2013-GarzFBI #clustering
- A Binarization-Free Clustering Approach to Segment Curved Text Lines in Historical Manuscripts (AG, AF, HB, RI), pp. 1290–1294.
- ICDAR-2013-HoRRES #classification #documentation
- Document Classification in a Non-stationary Environment: A One-Class SVM Approach (AKNH, NR, JYR, VE, NS), pp. 616–620.
- ICDAR-2013-LiuSZM #multi #novel
- A Novel Multi-oriented Chinese Text Extraction Approach from Videos (YL, YS, YZ, QM), pp. 1355–1359.
- ICDAR-2013-LuoOWK #automation #classification #using
- Automatic Chinese Text Classification Using Character-Based and Word-Based Approach (XL, WO, TW, FK), pp. 329–333.
- ICDAR-2013-MehriHGBM
- A Pixel Labeling Approach for Historical Digitized Books (MM, PH, PGK, AB, RM), pp. 817–821.
- ICDAR-2013-PrumVFO #modelling #online #recognition #using
- A Discriminative Approach to On-Line Handwriting Recognition Using Bi-character Models (SP, MV, AF, JMO), pp. 364–368.
- ICDAR-2013-StammLD #analysis #documentation #multi #partial order
- Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
- ICDAR-2013-SunH #component #image
- An Improved Component Tree Based Approach to User-Intention Guided Text Extraction from Natural Scene Images (LS, QH), pp. 383–387.
- ICDAR-2013-TangHF #analysis #recognition
- A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
- ICDAR-2013-TarafdarPRRR #documentation #visual notation #word
- A Two-Stage Approach for Word Spotting in Graphical Documents (AT, UP, PPR, NR, JYR), pp. 319–323.
- ICDAR-2013-ToselliV #documentation #performance #word
- Fast HMM-Filler Approach for Key Word Spotting in Handwritten Documents (AHT, EV), pp. 501–505.
- JCDL-2013-GodoiTCGFFF #ambiguity #feedback #problem
- A relevance feedback approach for the author name disambiguation problem (TAG, RdST, AMBRC, MAG, AAF, WF, EAF), pp. 209–218.
- JCDL-2013-LeeCFP #game studies #interactive #metadata #video
- User-centered approach in creating a metadata schema for video games and interactive media (JHL, HC, VF, AP), pp. 229–238.
- JCDL-2013-SmithST #gender
- A search engine approach to estimating temporal changes in gender orientation of first names (BNS, MS, VIT), pp. 199–208.
- SIGMOD-2013-LongWWF #distance #keyword #query
- Collective spatial keyword queries: a distance owner-driven approach (CL, RCWW, KW, AWCF), pp. 689–700.
- SIGMOD-2013-WhangYYSKK #named #parallel #using
- ODYS: an approach to building a massively-parallel search engine using a DB-IR tightly-integrated parallel DBMS for higher-level functionality (KYW, TSY, YMY, IYS, HYK, IJK), pp. 313–324.
- SIGMOD-2013-ZhuZQ #graph #mining #performance
- A direct mining approach to efficient constrained graph pattern discovery (FZ, ZZ, QQ), pp. 821–832.
- TPDL-2013-KlampflK #machine learning
- An Unsupervised Machine Learning Approach to Body Text and Table of Contents Extraction from Digital Scientific Articles (SK, RK), pp. 144–155.
- TPDL-2013-NadeemOAV #requirements
- Users Requirements in Audiovisual Search: A Quantitative Approach (DN, RO, RA, EV), pp. 241–246.
- VLDB-2013-AltwaijryKM
- Query-Driven Approach to Entity Resolution (HA, DVK, SM), pp. 1846–1857.
- VLDB-2013-BoghSJ #named #retrieval
- GroupFinder: A New Approach to Top-K Point-of-Interest Group Retrieval (KSB, AS, CSJ), pp. 1226–1229.
- VLDB-2013-DeBrabantPTSZ #architecture #database #named
- Anti-Caching: A New Approach to Database Management System Architecture (JD, AP, ST, MS, SBZ), pp. 1942–1953.
- VLDB-2013-DuanZCG #database #keyword #probability
- Supporting Keyword Search in Product Database: A Probabilistic Approach (HD, CZ, JC, AG), pp. 1786–1797.
- VLDB-2013-DuttaNB #approximate #data type #detection #streaming
- Streaming Quotient Filter: A Near Optimal Approximate Duplicate Detection Approach for Data Streams (SD, AN, SKB), pp. 589–600.
- VLDB-2013-Franceschini #big data #how #open source
- How to maximize the value of big data with the open source SpagoBI suite through a comprehensive approach (MF), pp. 1170–1171.
- VLDB-2013-GattaniLGTCDSRHD #classification #social #social media
- Entity Extraction, Linking, Classification, and Tagging for Social Media: A Wikipedia-Based Approach (AG, DSL, NG, MT, XC, SD, SS, AR, VH, AD), pp. 1126–1137.
- VLDB-2013-Lomet #database #hardware #sql
- Microsoft SQL Server’s Integrated Database Approach for Modern Applications and Hardware (DBL), pp. 1178–1179.
- VLDB-2014-GyssensPGWW13 #case study #query #symmetry #towards
- An Approach towards the Study of Symmetric Queries (MG, JP, DVG, JW, YW), pp. 25–36.
- VLDB-2014-ZhaoXLLZ13 #similarity
- A Partition-Based Approach to Structure Similarity Search (XZ, CX, XL, QL, WZ), pp. 169–180.
- CSEET-2013-EterovicGB #education #process
- Teaching software processes to professionals: The approach taken by an evening master’s degree program (YE, GG, JB), pp. 309–313.
- CSEET-2013-ShethBK #re-engineering
- A competitive-collaborative approach for introducing software engineering in a CS2 class (SS, JB, GEK), pp. 41–50.
- ITiCSE-2013-Baumgartner #case study #delivery #design #education #information management #using
- Using case studies to design and deliver technology-centered computing education courses: an innovative approach from an undergraduate information systems program in singapore (IB), pp. 189–194.
- ITiCSE-2013-Buck #reliability
- First, do no harm: a curricular approach to reliability (DB), p. 319.
- SIGITE-2013-Jonas #collaboration
- Group note taking in mediawiki, a collaborative approach (MJ), pp. 131–132.
- CSMR-2013-NerellaMW #optimisation #query #using
- An Approach for Optimization of Object Queries on Collections Using Annotations (VKSN, SKM, TW), pp. 273–282.
- ICSM-2013-AsaduzzamanRSP #hybrid #independence #named #source code
- LHDiff: A Language-Independent Hybrid Approach for Tracking Source Code Lines (MA, CKR, KAS, MDP), pp. 230–239.
- ICSM-2013-FontanaZMM #detection #machine learning #smell #towards
- Code Smell Detection: Towards a Machine Learning-Based Approach (FAF, MZ, AM, MM), pp. 396–399.
- ICSM-2013-LeL #automation #effectiveness #fault #locality #predict #tool support
- Will Fault Localization Work for These Failures? An Automated Approach to Predict Effectiveness of Fault Localization Tools (TDBL, DL), pp. 310–319.
- ICSM-2013-SorOTS #detection #machine learning #memory management #statistics #using
- Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
- MSR-2013-AlipourHS #debugging #detection #towards
- A contextual approach towards more accurate duplicate bug report detection (AA, AH, ES), pp. 183–192.
- MSR-2013-SahaSS #automation #stack overflow
- A discriminative model approach for suggesting tags automatically for stack overflow questions (AKS, RKS, KAS), pp. 73–76.
- WCRE-2013-AntonyAC #behaviour #clone detection #detection #modelling
- An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
- WCRE-2013-BernardiCL #design pattern #detection #graph #modelling
- A model-driven graph-matching approach for design pattern detection (MLB, MC, GADL), pp. 172–181.
- DLT-2013-BolligHLM #automaton #learning
- A Fresh Approach to Learning Register Automata (BB, PH, ML, BM), pp. 118–130.
- ICALP-v2-2013-DieudonneP #polynomial
- Deterministic Polynomial Approach in the Plane (YD, AP), pp. 533–544.
- LATA-2013-Blanchet-SadriBFH #graph #polynomial
- A Graph Polynomial Approach to Primitivity (FBS, MB, NF, JH), pp. 153–164.
- SEFM-2013-BorekMSR #model checking #modelling
- Model Checking of Security-Critical Applications in a Model-Driven Approach (MB, NM, KS, WR), pp. 76–90.
- SEFM-2013-MenadD #multi #requirements
- A Transformation Approach for Multiform Time Requirements (NM, PD), pp. 16–30.
- Haskell-2013-AnknerS #haskell #performance #programming
- An EDSL approach to high performance Haskell programming (JA, JS), pp. 1–12.
- ICFP-2013-AbelP #pattern matching #recursion #termination
- Wellfounded recursion with copatterns: a unified approach to termination and productivity (AA, BP), pp. 185–196.
- ICFP-2013-BroadbentCHS #higher-order #named #verification
- C-SHORe: a collapsible approach to higher-order verification (CHB, AC, MH, OS), pp. 13–24.
- IFL-2013-HackettHJ #optimisation #recursion #source code
- The Under-Performing Unfold: A new approach to optimising corecursive programs (JH, GH, MJ), p. 1.
- AIIDE-2013-ShakerST #evolution
- Evolving Playable Content for Cut the Rope through a Simulation-Based Approach (NS, MS, JT).
- CIG-2013-AdrianL #design #generative #using
- An approach to level design using procedural content generation and difficulty curves (DFHA, ALSGC), pp. 1–8.
- DiGRA-2013-Lenhart #design
- Defragmentation and Mashup: Ludic Mashup as a Design Approach (IL).
- DiGRA-2013-WilliamsK #behaviour #case study #collaboration #game studies #social
- Elements of Social Action: A Micro- Analytic Approach to the Study of Collaborative Behavior in Digital Games (JPW, DK).
- FDG-2013-Wallner #analysis #named #visualisation
- Play-Graph: A methodology and visualization approach for the analysis of gameplay data (GW), pp. 253–260.
- VS-Games-2013-DunwellLSFHA #game studies #named
- Metycoon: A Game-Based Approach to Career Guidance (ID, PL, KS, SdF, MH, SA), pp. 1–6.
- GT-VMT-2013-MaierM #diagrams #layout
- A Pattern-based Approach for Initial Diagram Layout (SM, MM).
- CHI-2013-AtkinsonOPBWBPC #design #research
- Tactile perceptions of digital textiles: a design research approach (DA, PMO, BP, NBB, PW, SB, SP, MJC), pp. 1669–1678.
- CHI-2013-BowserHRRGHRP #game studies #prototype #scalability
- Prototyping in PLACE: a scalable approach to developing location-based apps and games (AB, DLH, JR, MR, RJG, YH, DR, JP), pp. 1519–1528.
- CHI-2013-DalsgardE #case study #library #scalability
- Large-scale participation: a case study of a participatory approach to developing a new public library (PD, EE), pp. 399–408.
- CHI-2013-GaverBBBCHJP #human-computer #prototype
- Indoor weather stations: investigating a ludic approach to environmental HCI through batch prototyping (WWG, JB, KB, AB, DWTC, MH, NJ, SP), pp. 3451–3460.
- CHI-2013-KhovanskayaBCVG #design #quote #what
- “Everybody knows what you’re doing”: a critical design approach to personal informatics (VDK, EPSB, DC, SV, GG), pp. 3403–3412.
- CHI-2013-MonroeLOSPM #challenge #query #specification #visual notation
- The challenges of specifying intervals and absences in temporal queries: a graphical language approach (MM, RL, JMdO, BS, CP, JM), pp. 2349–2358.
- CHI-2013-YinOPZ #adaptation
- Making touchscreen keyboards adaptive to keys, hand postures, and individuals: a hierarchical spatial backoff model approach (YY, TO, KP, SZ), pp. 2775–2784.
- DHM-HB-2013-Yuan #evaluation #modelling #validation
- Validation of an Integrated Biomechanical Modeling Approach to the Ergonomic Evaluation of Drywall Installation (LY), pp. 159–168.
- DHM-SET-2013-GoreM #modelling #performance #validation
- A Validation Approach for Complex NextGen Air Traffic Control Human Performance Models (BFG, PM), pp. 28–37.
- DUXU-CXC-2013-OkimotoMB #assessment #multi #usability
- Usability Assessment in the Multicultural Approach (MLLRO, COM, KJB), pp. 89–94.
- DUXU-CXC-2013-Sun #experience #locality #social #social media #user interface
- Tracing Technology Diffusion of Social Media with Culturally Localized User Experience Approach (HS), pp. 115–120.
- DUXU-NTE-2013-SannaVBBR #behaviour #design
- Engineering AwarenessTM: An e-Service Design Approach for Behavioral Change in Healthcare and Well-Being (AS, SV, SB, IB, AR), pp. 558–567.
- DUXU-PMT-2013-BellowsHY #design #difference #research
- An Individual Differences Approach to Design Fixation: Comparing Laboratory and Field Research (BGB, JFH, RJY), pp. 13–21.
- DUXU-PMT-2013-GockelGPPE #evaluation #experience #named #user interface
- VMUXE — An Approach to User Experience Evaluation for Virtual Museums (BG, HG, AP, SP, JE), pp. 262–272.
- DUXU-PMT-2013-KarahasanovicF #2d #behaviour #experience #modelling #network
- Modelling User Behaviour and Experience — The R2D2 Networks Approach (AK, AF), pp. 506–515.
- DUXU-PMT-2013-KohnoYSN #analysis #design
- Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
- DUXU-PMT-2013-RaisonS #agile #design
- Keeping User Centred Design (UCD) Alive and Well in Your Organisation: Taking an Agile Approach (CR, SS), pp. 573–582.
- DUXU-PMT-2013-Silveira #behaviour #design #usability
- Participatory Design and Usability: A Behavioral Approach of Workers’ Attitudes in the Work Environment (DMCdS), pp. 409–416.
- DUXU-WM-2013-FordK #visual notation
- Graphical Displays in Eco-Feedback: A Cognitive Approach (RF, BK), pp. 486–495.
- DUXU-WM-2013-Igler #design #evaluation #mobile #prototype
- Feature Evaluation for Mobile Applications: A Design Science Approach Based on Evolutionary Software Prototypes (BI), pp. 673–681.
- DUXU-WM-2013-SauckenML #case study #design #experience #how #metaprogramming #user interface
- How to Design Experiences: Macro UX versus Micro UX Approach (CvS, IM, UL), pp. 130–139.
- DUXU-WM-2013-SchneidermeierMS #communication #concept
- Human-Centered Communication Planning: A Conceptual Approach (TS, FM, JS), pp. 94–102.
- DUXU-WM-2013-SchutzOV #automation #development #evaluation #usability
- SysML-Based Approach for Automation Software Development — Explorative Usability Evaluation of the Provided Notation (DS, MO, BVH), pp. 568–574.
- DUXU-WM-2013-Tussyadiah #case study #experience #mobile #platform
- Meta-design Approach for Mobile Platforms Supporting Creative Tourism Experiences (IPT), pp. 733–739.
- DUXU-WM-2013-WilliamsGMW #enterprise #performance
- A User Centred Approach to Determining the Impact of Faster Broadband on Small and Medium Sized Enterprises (DW, AG, JM, JW), pp. 140–149.
- DUXU-WM-2013-WilliamsGMW13a
- A User Centred Approach to Evaluating the Future Demand for Bandwidth from Consumers (DW, AG, JM, JW), pp. 150–159.
- HCI-AMTE-2013-HashizumeK #comprehension #design #development #experience #user interface
- Understanding User Experience and Artifact Development through Qualitative Investigation: Ethnographic Approach for Human-Centered Design (AH, MK), pp. 68–76.
- HCI-III-2013-SouiAG #adaptation #design #fuzzy #logic
- Fuzzy Logic Approach for Adaptive Systems Design (MS, MA, KG), pp. 141–150.
- HCI-IMT-2013-BarbeWM #design
- Human Centered Design Approach to Integrate Touch Screen in Future Aircraft Cockpits (JB, MW, RM), pp. 429–438.
- HCI-UC-2013-KleinS #development #industrial #process #social #social media
- Social Media in the Product Development Process of the Automotive Industry: A New Approach (AK, GS), pp. 396–401.
- HIMI-D-2013-EbbessonE #design #industrial
- A User Driven Design Approach to Creating UGC Services — Challenging the Newspaper Industry (EE, CIE), pp. 187–196.
- HIMI-D-2013-KlomannM #interactive #named #prototype
- Freiform: A SmartPen Based Approach for Creating Interactive Paper Prototypes for Collecting Data (MK, JTM), pp. 316–321.
- HIMI-D-2013-OhnoNK #design
- Environment-Centered Approach to ICT Service Design (TO, MN, YK), pp. 347–356.
- HIMI-HSM-2013-AhramKAF #energy
- Power and Energy Management: A User-Centered System-of-Systems Engineering Approach (TZA, WK, BA, PF), pp. 3–12.
- HIMI-HSM-2013-WadaNS
- Approach to Haptic Guidance Control in Steering Operation Based on Cooperative States between Driver and Control System (TW, RN, SS), pp. 596–605.
- HIMI-HSM-2013-Wesugi #design #experience #novel #simulation #using
- Design Approach of Simulation Exercise with Use of Device and Its Significance — Design of Novel Device for Realistic Experience of Being a Hemiplegia Patient (SW), pp. 315–324.
- HIMI-LCCB-2013-NarumiKHATH
- Digital Railway Museum: An Approach to Introduction of Digital Exhibition Systems at the Railway Museum (TN, TK, TH, KA, TT, MH), pp. 238–247.
- HIMI-LCCB-2013-YuL #feedback #mining
- Exploring User Feedback of a E-Learning System: A Text Mining Approach (WBY, RL), pp. 182–191.
- OCSC-2013-AlaouiL #communication #design
- A LivingLab Approach to Involve Elderly in the Design of Smart TV Applications Offering Communication Services (MA, ML), pp. 325–334.
- OCSC-2013-HallCW #community #predict
- Well-Being’s Predictive Value — A Gamified Approach to Managing Smart Communities (MH, SC, CW), pp. 13–22.
- OCSC-2013-JiangB #case study #multi #network #social
- A Three-Level Approach to the Study of Multi-cultural Social Networking (YJ, OdB), pp. 365–374.
- VISSOFT-2013-FittkauWWH #scalability #visualisation
- Live trace visualization for comprehending large software landscapes: The ExplorViz approach (FF, JW, CW, WH), pp. 1–4.
- CAiSE-2013-BakkerFV #detection #hybrid #web
- A Hybrid Model Words-Driven Approach for Web Product Duplicate Detection (MdB, FF, DV), pp. 149–161.
- CAiSE-2013-MaggiBA #knowledge-based
- A Knowledge-Based Integrated Approach for Discovering and Repairing Declare Maps (FMM, RPJCB, WMPvdA), pp. 433–448.
- EDOC-2013-GoknilKM #metamodelling #modelling #multi #reasoning #requirements
- A metamodeling approach for reasoning on multiple requirements models (AG, IK, JVM), pp. 159–166.
- EDOC-2013-SelwayGMS #formal method #natural language #specification #using
- Formalising Natural Language Specifications Using a Cognitive Linguistics/Configuration Based Approach (MS, GG, WM, MS), pp. 59–68.
- EDOC-2013-SousaMGM #architecture #data type #enterprise #risk management #using
- Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
- EDOC-2013-TranZ #analysis #architecture #verification
- Event Actors Based Approach for Supporting Analysis and Verification of Event-Driven Architectures (HT, UZ), pp. 217–226.
- ICEIS-J-2013-BouneffaA13a #graph grammar #impact analysis #ontology
- The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach (MB, AA), pp. 280–295.
- ICEIS-J-2013-GiordanoTSAF13a #architecture #case study #enterprise #ontology #semantics
- Joining Data and Maps in the Government Enterprise Architecture by a Semantic Approach: Methodology, Ontology and Case Study (DG, AT, CS, SA, AF), pp. 506–519.
- ICEIS-J-2013-PintoKG13a #analysis #architecture #automation #evaluation #metadata
- An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
- ICEIS-J-2013-VaniyaBN13a
- Analysing the M&A Preparedness Building Approach (NV, PB, ON), pp. 459–473.
- ICEIS-v1-2013-BevacquaCFGP #abstraction #adaptation #predict #process
- A Data-adaptive Trace Abstraction Approach to the Prediction of Business Process Performances (AB, MC, FF, MG, LP), pp. 56–65.
- ICEIS-v1-2013-LimaSKCF #enterprise #evolution
- A Delta Oriented Approach to the Evolution and Reconciliation of Enterprise Software Products Lines (GL, JS, UK, DAdC, SVF), pp. 255–263.
- ICEIS-v1-2013-OliveiraB #modelling #novel #process #standard
- ETL Standard Processes Modelling — A Novel BPMN Approach (BCdSO, OB), pp. 120–127.
- ICEIS-v1-2013-ZaamouneBPB #analysis #multi #relational
- A New Relational Spatial OLAP Approach for Multi-resolution and Spatio-multidimensional Analysis of Incomplete Field Data (MZ, SB, FP, PB), pp. 145–152.
- ICEIS-v2-2013-Abbo
- The Analytical Approach to Information Value Management (DA), pp. 549–554.
- ICEIS-v2-2013-BenhaddiBA #evaluation #formal method #implementation #user satisfaction
- Formalization of the User Centric SOA Approach — Implementation and End User Satisfaction Evaluation (MB, KB, EHA), pp. 481–488.
- ICEIS-v2-2013-ClayerTC #adaptation #design #education #towards
- Towards a Pattern-based Adaptive Approach for Instructional Design based on Teacher’s Pedagogical Design Scheme (JPC, CT, CC), pp. 532–538.
- ICEIS-v2-2013-FragalSGJ #embedded #product line #specification
- Application Engineering for Embedded Systems — Transforming SysML Specification to Simulink within a Product-Line based Approach (VHF, RFS, IMdSG, EAdOJ), pp. 94–101.
- ICEIS-v2-2013-KuCY #recommendation
- Effect of Product Type and Recommendation Approach on Consumers’ Intention to Purchase Recommended Products (YCK, CHC, CSY), pp. 475–480.
- ICEIS-v2-2013-RibeiroS #modelling #realtime #requirements
- An Approach for Modeling Real-time Requirements with SysML and MARTE Stereotypes (FGCR, MSS), pp. 70–81.
- ICEIS-v2-2013-SilvaFJGO #embedded #named #product line
- SyMPLES — A SysML-based Approach for Developing Embedded Systems Software Product Lines (RFS, VHF, EAdOJ, IMdSG, FO), pp. 257–264.
- ICEIS-v2-2013-TomasSGGA #api #architecture #framework #using
- Synaptic City — An Architectural Approach using an OSGI Infrastructure and GMaps API to Build a City Simulator (GHRPT, WMdS, KG, VCG, AÁ), pp. 427–434.
- ICEIS-v2-2013-WolfengagenRSBS #modelling #process #towards
- Applicative Approach to Information Processes Modeling — Towards a Constructive Information Theory (VW, VR, LS, AB, AS), pp. 323–328.
- ICEIS-v3-2013-AhmadO #architecture #enterprise #process #semantics
- A New Approach to Semantically Derive Enterprise Information Architecture from Business Process Architecture (MA, MO), pp. 363–369.
- ICEIS-v3-2013-GiordanoTSAF #architecture #case study #enterprise #ontology
- An Ontology based Approach to Integrate Data and Maps — In the Government Enterprise Architecture: A Case Study (DG, AT, CS, SA, AF), pp. 356–362.
- ICEIS-v3-2013-GromoffKPS #architecture #enterprise #flexibility
- Newer Approach to Flexible Business Architecture of Modern Enterprise (AG, NK, MP, YS), pp. 326–332.
- ICEIS-v3-2013-LangermeierBB #architecture #distributed #enterprise #framework #modelling #using
- A Model Driven Approach for Open Distributed Systems using an Enterprise Architecture Framework (ML, AJB, BB), pp. 284–291.
- ICEIS-v3-2013-LuxHH #enterprise #flexibility #representation #towards
- Towards Enterprise Management Systems — A Generic and Flexible Information Representation Approach (AL, JH, RH), pp. 251–257.
- ICEIS-v3-2013-PanTG #dependence #modelling #ontology #process
- Artefact-oriented Business Process Modelling — An Ontological Dependency Approach (YCP, YT, SRG), pp. 223–230.
- ICEIS-v3-2013-SbaiFK #adaptation #configuration management #modelling #process #towards
- Towards a Process Patterns based Approach for Promoting Adaptability in Configurable Process Models (HS, MF, LK), pp. 382–387.
- CIKM-2013-HashemiNB #learning #network #retrieval #topic
- Expertise retrieval in bibliographic network: a topic dominance learning approach (SHH, MN, HB), pp. 1117–1126.
- CIKM-2013-JabbourSSU
- Mining-based compression approach of propositional formulae (SJ, LS, YS, TU), pp. 289–298.
- CIKM-2013-KimNC #modelling #probability #social #social media
- Modeling dynamics of meta-populations with a probabilistic approach: global diffusion in social media (MK, DN, PC), pp. 489–498.
- CIKM-2013-RousseauV #ad hoc #information retrieval
- Graph-of-word and TW-IDF: new approach to ad hoc IR (FR, MV), pp. 59–68.
- CIKM-2013-TianCZ #database #hybrid #mobile #privacy #query
- A hybrid approach for privacy-preserving processing of knn queries in mobile database systems (ST, YC, QZ), pp. 1161–1164.
- CIKM-2013-WangLZ #graph #metric #multi #random #towards
- Towards metric fusion on multi-view data: a cross-view based graph random walk approach (YW, XL, QZ), pp. 805–810.
- ECIR-2013-IgnatovKC #detection
- Near-Duplicate Detection for Online-Shops Owners: An FCA-Based Approach (DII, AVK, YC), pp. 722–725.
- ECIR-2013-RahimiS #corpus #modelling
- A Language Modeling Approach for Extracting Translation Knowledge from Comparable Corpora (RR, AS), pp. 606–617.
- ICML-c1-2013-BootsG #learning
- A Spectral Learning Approach to Range-Only SLAM (BB, GJG), pp. 19–26.
- ICML-c1-2013-GiguereLMS #algorithm #bound #learning #predict
- Risk Bounds and Learning Algorithms for the Regression Approach to Structured Output Prediction (SG, FL, MM, KS), pp. 107–114.
- ICML-c1-2013-GonenSS #learning #performance
- Efficient Active Learning of Halfspaces: an Aggressive Approach (AG, SS, SSS), pp. 480–488.
- ICML-c1-2013-KadriGP #kernel #learning
- A Generalized Kernel Approach to Structured Output Learning (HK, MG, PP), pp. 471–479.
- ICML-c1-2013-NarasimhanA #optimisation
- A Structural SVM Based Approach for Optimizing Partial AUC (HN, SA), pp. 516–524.
- ICML-c2-2013-WangK13a #message passing #problem
- Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passing (HW, DK), pp. 190–198.
- ICML-c3-2013-DembczynskiJKWH #classification #multi #optimisation #plugin
- Optimizing the F-Measure in Multi-Label Classification: Plug-in Rule Approach versus Structured Loss Minimization (KD, AJ, WK, WW, EH), pp. 1130–1138.
- ICML-c3-2013-GermainHLM #adaptation #classification #linear
- A PAC-Bayesian Approach for Domain Adaptation with Specialization to Linear Classifiers (PG, AH, FL, EM), pp. 738–746.
- ICML-c3-2013-GuptaPV #learning #multi #parametricity
- Factorial Multi-Task Learning : A Bayesian Nonparametric Approach (SKG, DQP, SV), pp. 657–665.
- ICML-c3-2013-Izbicki #algebra #classification #online #parallel #performance
- Algebraic classifiers: a generic approach to fast cross-validation, online training, and parallel training (MI), pp. 648–656.
- ICML-c3-2013-NiuJDHS #learning #novel
- Squared-loss Mutual Information Regularization: A Novel Information-theoretic Approach to Semi-supervised Learning (GN, WJ, BD, HH, MS), pp. 10–18.
- KDD-2013-CuiJYWZY #data-driven #network #predict
- Cascading outbreak prediction in networks: a data-driven approach (PC, SJ, LY, FW, WZ, SY), pp. 901–909.
- KDD-2013-LiuCZ #performance #probability
- Summarizing probabilistic frequent patterns: a fast approach (CL, LC, CZ), pp. 527–535.
- KDD-2013-NiemannW #collaboration #recommendation
- A new collaborative filtering approach for increasing the aggregate diversity of recommender systems (KN, MW), pp. 955–963.
- KDD-2013-Vatsavai #learning #multi #using
- Gaussian multiple instance learning approach for mapping the slums of the world using very high resolution imagery (RRV), pp. 1419–1426.
- KDD-2013-ZafaraniL #behaviour #social #social media
- Connecting users across social media sites: a behavioral-modeling approach (RZ, HL), pp. 41–49.
- KDD-2013-ZhouTWN #predict #probability
- A “semi-lazy” approach to probabilistic path prediction (JZ, AKHT, WW, WSN), pp. 748–756.
- KDIR-KMIS-2013-CheetiSC #adaptation #classification #naive bayes #sentiment #syntax #using
- Cross-domain Sentiment Classification using an Adapted Naïve Bayes Approach and Features Derived from Syntax Trees (SC, AS, DC), pp. 169–176.
- KDIR-KMIS-2013-DimasKV #sentiment #twitter
- Every Character Counts — A Character based Approach to Determine Political Sentiment on Twitter (AD, PCK, EMV), pp. 261–266.
- KDIR-KMIS-2013-FerchichiBF #adaptation #image #predict
- An Approach based on Adaptive Decision Tree for Land Cover Change Prediction in Satellite Images (AF, WB, IRF), pp. 82–90.
- KDIR-KMIS-2013-MattaD #design #memory management
- Memory Meetings — An Approach to Keep Track of Project Knowledge in Design (NM, GD), pp. 336–343.
- KDIR-KMIS-2013-MorganK #ambiguity #twitter
- A Generic Open World Named Entity Disambiguation Approach for Tweets (MBM, MvK), pp. 267–276.
- KDIR-KMIS-2013-NhungNCLT #image #learning #multi
- A Multiple Instance Learning Approach to Image Annotation with Saliency Map (TPN, CTN, JC, HVL, TT), pp. 152–159.
- KDIR-KMIS-2013-SmirnovSK #multi #self #smarttech
- Multilevel Self-Organization in Smart Environment — Service-Oriented Approach (AVS, NS, AK), pp. 290–297.
- KDIR-KMIS-2013-SucaS #documentation #ontology #using
- An Ontology for Portability and Interoperability Digital Documents — An Approach in Document Engineering using Ontologies (EGS, FSCdS), pp. 373–380.
- KEOD-2013-AveiroP13a #enterprise #implementation #ontology #semantics
- Implementing Organizational Self Awareness — A Semantic Mediawiki based Enterprise Ontology Management Approach (DA, DP), pp. 453–461.
- KEOD-2013-BouiadjraB #ontology
- User-centered Approach for Evaluating Ontologies (ABB, SMB), pp. 192–198.
- KEOD-2013-ChulyadyoHB #automation #ontology
- Core Ontology based Approach for Treating the Flatness of Automatically Built Ontology (RC, MH, GB), pp. 316–323.
- KEOD-2013-CostaFML #classification #information management #ontology #using
- Classification of Knowledge Representations using an Ontology-based Approach (RC, PF, PMNM, CL), pp. 184–191.
- KEOD-2013-PaniLCB #web
- An Approach to Manage the Web Knowledge (FEP, MIL, GC, GB), pp. 81–88.
- KEOD-2013-SouissiCG #ontology #semantics
- A Semantic-based Approach for Ontology Module Extraction (AS, WC, KG), pp. 222–229.
- KEOD-2013-ZarradDZ #wiki
- Title-based Approach to Relation Discovery from Wikipedia (RZ, ND, EZ), pp. 70–80.
- MLDM-2013-LiuLM #combinator #lightweight #multi
- A Lightweight Combinatorial Approach for Inferring the Ground Truth from Multiple Annotators (XL, LL, NDM), pp. 616–628.
- RecSys-2013-Shi #graph #recommendation #similarity
- Trading-off among accuracy, similarity, diversity, and long-tail: a graph-based recommendation approach (LS), pp. 57–64.
- SEKE-2013-AdamE #multi
- A multi-dimensional approach for analyzing software artifacts (SA, GEB), pp. 650–655.
- SEKE-2013-DingXG #petri net #specification
- An Approach for Analyzing Software Specifications in Petri Nets (JD, DX, JG), pp. 411–416.
- SEKE-2013-DuttaAKB #distributed
- Virtual Medical Board: A Distributed Bayesian Agent Based Approach (AD, SA, AK, SB), pp. 685–688.
- SEKE-2013-FelizardoBM #overview #replication #validation #visual notation
- A Visual Approach to Validate the Selection Review of Primary Studies in Systematic Reviews: A Replication Study (KRF, EFB, JCM), pp. 141–146.
- SEKE-2013-FerreiraVQ #product line #testing
- A Mutation Approach to Feature Testing of Software Product Lines (JMF, SRV, MAQ), pp. 232–237.
- SEKE-2013-Lacanienta0TO #generative #knowledge-based #web
- A Knowledge-based Approach for Generating Test Scenarios for Web Applications (RL, ST, HT, MO), pp. 166–171.
- SEKE-2013-MarcolinoOGM #case study #effectiveness #towards #variability
- Towards the Effectiveness of a Variability Management Approach at Use Case Level (AM, EAOJ, IMSG, JCM), pp. 214–219.
- SEKE-2013-MolleriSB #automation #overview #process
- Proposal of an Automated Approach to Support the Systematic Review of Literature Process (JSM, LEdS, FBVB), pp. 488–493.
- SEKE-2013-MoshirpourEF #automation #ontology #using
- Automated Construction of System Domain Knowledge Using an Ontology-Based Approach (MM, AE, BHF), pp. 63–66.
- SEKE-2013-SadiqJ #elicitation #fuzzy #process #requirements
- A fuzzy based approach for requirements prioritization in goal oriented requirements elicitation process (MS, SKJ), pp. 54–58.
- SEKE-2013-SeveroFS #collaboration #game studies #risk management
- A Dialogue Game Approach to Collaborative Risk Management (FS, LMF, LAdLS), pp. 548–551.
- SEKE-2013-SilvaD #semantics
- A context-aware approach on semantic trajectories (CS, MARD), pp. 435–440.
- SEKE-2013-SilvaVMA #product line
- Scrum-based Approach for Analyzing Commonalities and Variabilities in Software Product Lines (IFdS, TV, SRLM, ESdA), pp. 238–243.
- SEKE-2013-TaoLG #architecture #component #configuration management #incremental #testing #using
- Testing Configurable Architectures For Component-Based Software Using an Incremental Approach (CT, BL, JG), pp. 356–361.
- SIGIR-2013-Boehm #information management #knowledge-based
- Group-support for task-based information searching: a knowledge-based approach (TB), p. 1141.
- SIGIR-2013-FreitasFOC #graph #linked data #natural language #open data #query #semantics
- Answering natural language queries over linked data graphs: a distributional semantics approach (AF, FFdF, SO, EC), pp. 1107–1108.
- SIGIR-2013-WuF #feedback #incremental #performance #pseudo
- An incremental approach to efficient pseudo-relevance feedback (HW, HF), pp. 553–562.
- AMT-2013-MatragkasKPZ #model transformation #testing
- A Traceability-Driven Approach to Model Transformation Testing (NDM, DSK, RFP, AZ), pp. 2–11.
- ECMFA-2013-AmbertBLLP #modelling #testing
- Applying a Def-Use Approach on Signal Exchange to Implement SysML Model-Based Testing (FA, FB, JL, BL, FP), pp. 134–151.
- ICMT-2013-FaunesSB #model transformation
- Genetic-Programming Approach to Learn Model Transformation Rules from Examples (MF, HAS, MB), pp. 17–32.
- ICMT-2013-RuscioIP #atl #co-evolution #evolution #metamodelling
- A Methodological Approach for the Coupled Evolution of Metamodels and ATL Transformations (DDR, LI, AP), pp. 60–75.
- ICMT-2013-WieberS #graph transformation #testing
- Systematic Testing of Graph Transformations: A Practical Approach Based on Graph Patterns (MW, AS), pp. 205–220.
- MoDELS-2013-ArkinTI #algorithm #modelling #parallel #platform
- Model-Driven Approach for Supporting the Mapping of Parallel Algorithms to Parallel Computing Platforms (EA, BT, KMI), pp. 757–773.
- MoDELS-2013-ChavezSFM #implementation #java #testing #uml
- An Approach to Testing Java Implementation against Its UML Class Model (HMC, WS, RBF, BAM), pp. 220–236.
- MoDELS-2013-Gonzalez-HuertaIA #architecture #multi #validation
- Defining and Validating a Multimodel Approach for Product Architecture Derivation and Improvement (JGH, EI, SA), pp. 388–404.
- MoDELS-2013-RajbhojR #detection #metamodelling #version control
- A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
- MoDELS-2013-ZalilaCP #domain-specific language #integration #verification
- Formal Verification Integration Approach for DSML (FZ, XC, MP), pp. 336–351.
- SPLC-2013-Quinton0D #constraints #feature model #modelling
- Cardinality-based feature models with constraints: a pragmatic approach (CQ, DR, LD), pp. 162–166.
- TOOLS-EUROPE-J-2012-LilisS13 #debugging #fault #metaprogramming
- An Integrated Approach to Source Level Debugging and Compile Error Reporting in Metaprograms (YL, AS), pp. 1–26.
- AdaEurope-2013-AsensioLCN #analysis #execution #safety #worst-case
- Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
- HILT-2013-WardRL #integration #process
- An approach to integration of complex systems: the SAVI virtual integration process (DTW, DAR, BAL), pp. 43–46.
- LOPSTR-2013-AlbertGG #analysis
- A Transformational Approach to Resource Analysis with Typed-Norms (EA, SG, RG), pp. 38–53.
- PPDP-2013-LamoMRL #bidirectional #declarative #graph #model transformation
- A declarative and bidirectional model transformation approach based on graph co-spans (YL, FM, AR, JdL), pp. 1–12.
- PPDP-2013-MatsudaW #bidirectional #for free #problem #runtime
- Bidirectionalization for free with runtime recording: or, a light-weight approach to the view-update problem (KM, MW), pp. 297–308.
- ER-BR-2013-CabrejosMC #development #elicitation #requirements #usability #web
- An Approach for the Elicitation of Usability Requirements in the Development of Web Applications (LJERC, SM, TC).
- ER-BR-2013-GuedesSC #product line
- Goals and Scenarios to Software Product Lines: the GS2SPL Approach (GG, CTLLS, JC).
- RE-2013-NistalaK #analysis #consistency #requirements #validation
- An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure (PN, PK), pp. 320–325.
- RE-2013-Valenca #ecosystem #evolution #requirements #social
- Requirements negotiation model: A social oriented approach for software ecosystems evolution (GV), pp. 393–396.
- REFSQ-2013-Cleland-HuangCK #agile #architecture #requirements
- A Persona-Based Approach for Exploring Architecturally Significant Requirements in Agile Projects (JCH, AC, EK), pp. 18–33.
- ASE-2013-ChandramohanTBSP #behaviour #bound #detection #modelling #scalability
- A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
- ASE-2013-Garcia-GalanTC #game studies #multi #variability
- Multi-user variability configuration: A game theoretic approach (JGG, PT, ARC), pp. 574–579.
- ASE-2013-GuoCASW #learning #performance #predict #statistics #variability
- Variability-aware performance prediction: A statistical learning approach (JG, KC, SA, NS, AW), pp. 301–311.
- ASE-2013-KifetewJTOT #grammarware #named #source code
- SBFR: A search based approach for reproducing failures of programs with grammar based input (FMK, WJ, RT, AO, PT), pp. 604–609.
- ASE-2013-PilgrimUTS #co-evolution
- Model/code co-refactoring: An MDE approach (JvP, BU, AT, FS), pp. 682–687.
- ASE-2013-RegerBR #mining #parametricity #specification
- A pattern-based approach to parametric specification mining (GR, HB, DER), pp. 658–663.
- ASE-2013-VeerappaH #maturity #requirements
- Assessing the maturity of requirements through argumentation: A good enough approach (VV, RH), pp. 670–675.
- ESEC-FSE-2013-MockusHP #quality #risk management
- Risky files: an approach to focus quality improvement effort (AM, RLH, JDP), pp. 691–694.
- ESEC-FSE-2013-WangHJK #evaluation
- Searching for better configurations: a rigorous approach to clone evaluation (TW, MH, YJ, JK), pp. 455–465.
- ICSE-2013-AversanoCRT
- An approach for restructuring text content (LA, GC, GDR, MT), pp. 1225–1228.
- ICSE-2013-BortisH #debugging #named
- PorchLight: a tag-based approach to bug triaging (GB, AvdH), pp. 342–351.
- ICSE-2013-CarrenoW #analysis #evolution #requirements
- Analysis of user comments: an approach for software requirements evolution (LVGC, KW), pp. 582–591.
- ICSE-2013-Che #architecture #design #evolution
- An approach to documenting and evolving architectural design decisions (MC), pp. 1373–1376.
- ICSE-2013-Kukreja #requirements #towards
- Decision theoretic requirements prioritization: a two-step approach for sliding towards value realization (NK), pp. 1465–1467.
- ICSE-2013-NetoCLGM #named #problem #programming #student #testing
- POPT: a problem-oriented programming and testing approach for novice students (VLN, RC, LL, DSG, APM), pp. 1099–1108.
- ICSE-2013-PanichellaDOPPL #algorithm #effectiveness #how #modelling #re-engineering #search-based #topic
- How to effectively use topic models for software engineering tasks? an approach based on genetic algorithms (AP, BD, RO, MDP, DP, ADL), pp. 522–531.
- SAC-2013-AbdallahHA #design #quantifier
- Quantified extreme scenario based design approach (AA, RH, MAA), pp. 1117–1122.
- SAC-2013-AraujoGMSAB #composition #feature model #modelling
- Advanced modularity for building SPL feature models: a model-driven approach (JA, MG, AMDM, IS, VA, ELAB), pp. 1246–1253.
- SAC-2013-AzarianCWB #manycore #pipes and filters
- An FPGA-based multi-core approach for pipelining computing stages (AA, JMPC, SW, JB), pp. 1533–1540.
- SAC-2013-BakreBE #interactive #uml
- Aspect interaction chart — a UML approach for modularizing aspect interaction conflicts (SB, AB, TE), pp. 1254–1259.
- SAC-2013-BasgaluppBSC #predict
- Software effort prediction: a hyper-heuristic decision-tree based approach (MPB, RCB, TSdS, ACPLFC), pp. 1109–1116.
- SAC-2013-BlancoMLJ #probability
- A Kalman filter based approach to probabilistic gas distribution mapping (JLB, JGM, AJL, JGJ), pp. 217–222.
- SAC-2013-JungS #garbage collection #named
- LINK-GC: a preemptive approach for garbage collection in NAND flash storages (SJ, YHS), pp. 1478–1484.
- SAC-2013-KaratasK #composition #flexibility #security
- A flexible approach for considering interdependent security objectives in service composition (FK, DK), pp. 1919–1926.
- SAC-2013-KinderenP #named
- e3RoME: a value-based approach for method bundling (SdK, HAP), pp. 1469–1471.
- SAC-2013-LaneseBF #calculus #internet #process
- Internet of things: a process calculus approach (IL, LB, MDF), pp. 1339–1346.
- SAC-2013-LiBB #ad hoc #composition #web #web service
- Service farming: an ad-hoc and QoS-aware web service composition approach (WL, YB, FB), pp. 750–756.
- SAC-2013-LinCLG #data-driven #distributed #learning #predict
- Distributed dynamic data driven prediction based on reinforcement learning approach (SYL, KMC, CCL, NG), pp. 779–784.
- SAC-2013-LiZSL #graph #mining #named #novel
- WAVE-CIA: a novel CIA approach based on call graph mining (BL, QZ, XS, HL), pp. 1000–1005.
- SAC-2013-Marques-NetoAV #maintenance
- A quantitative approach for evaluating software maintenance services (HMN, GJA, MTV), pp. 1068–1073.
- SAC-2013-MehtaRCN #dependence #using
- Selecting among alternatives using dependencies: an NFR approach (RM, TRL, LC, MN), pp. 1292–1297.
- SAC-2013-MeloAOAMB #analysis #concept #visual notation
- A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
- SAC-2013-PougetSCM #data flow #debugging #embedded #interactive #novel
- A novel approach for interactive debugging of dynamic dataflow embedded applications (KP, MS, PLC, JFM), pp. 1547–1549.
- SAC-2013-SaitoRFSG #image #performance #reduction
- A data reduction and organization approach for efficient image annotation (PTMS, PJdR, AXF, CTNS, JFG), pp. 53–57.
- SAC-2013-TounsiKKDM #design pattern #formal method #modelling #towards
- Towards an approach for modeling and formalizing SOA design patterns with Event-B (IT, MHK, AHK, KD, EM), pp. 1937–1938.
- SAC-2013-VivianHL #development #distributed
- Supporting distributed software development through context awareness on software artifacts: the DiSEN-CollaborAR approach (RLV, EHMH, GCLL), pp. 765–770.
- SAC-2013-WaflerH #analysis #dependence #grid #modelling #smarttech
- A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
- SAC-2013-XuTTZ #fault #fine-grained
- An instruction-level fine-grained recovery approach for soft errors (JX, QT, LT, HZ), pp. 1511–1516.
- SLE-2013-DialloCL #formal method #modelling #using
- A Model-Driven Approach to Enhance Tool Interoperability Using the Theory of Models of Computation (PID, JC, LL), pp. 218–237.
- ASPLOS-2013-DashtiFFGLLQR #memory management
- Traffic management: a holistic approach to memory placement on NUMA systems (MD, AF, JRF, FG, RL, BL, VQ, MR), pp. 381–394.
- ASPLOS-2013-KangW #hardware
- To hardware prefetch or not to prefetch?: a virtualized environment study and core binding approach (HK, JLW), pp. 357–368.
- CASE-2013-ChenZL #design #novel
- A novel design approach for lower limb rehabilitation training robot (JC, XZ, RL), pp. 554–557.
- CASE-2013-HeZJ #fault #robust
- UIO based robust fault diagnosis approach for aero-engine fiber-optic sensor (CH, XZ, BJ), pp. 550–553.
- CASE-2013-KernschmidtV #modelling
- An interdisciplinary SysML based modeling approach for analyzing change influences in production plants to support the engineering (KK, BVH), pp. 1113–1118.
- CASE-2013-LiF #integer #linear #multi #problem #programming #scheduling
- A mixed integer linear programming approach for multi-degree cyclic multi-hoist scheduling problems without overlapping (XL, RYKF), pp. 274–279.
- CASE-2013-LiuZZ #data-driven #modelling
- Data driven modeling of human welder intelligence: A neuro-fuzzy approach (YL, WZ, YZ), pp. 663–668.
- CASE-2013-ParisioMVJ #predict
- A scenario-based predictive control approach to building HVAC management systems (AP, MM, DV, KHJ), pp. 428–435.
- CASE-2013-ShaoLW #markov
- A Markov chain approach to study flow disruptions on surgery in emergency care (XS, JL, DAW), pp. 990–995.
- CASE-2013-SunSZS #optimisation
- A two-stage approach for VMAT treatment plan optimization (BS, JS, GZ, LS), pp. 455–460.
- CASE-2013-XieLSD #analysis #markov #modelling #process
- Modeling and analysis of hospital inpatient rescue process: A Markov chain approach (XX, JL, CHS, YD), pp. 978–983.
- CASE-2013-YeWZML #network #optimisation #predict #scalability
- A signal split optimization approach based on model predictive control for large-scale urban traffic networks (BLY, WW, XZ, WJM, JL), pp. 904–909.
- DAC-2013-0001WAWG #empirical #estimation #towards
- Towards variation-aware system-level power estimation of DRAMs: an empirical approach (KC, CW, BA, NW, KG), p. 8.
- DAC-2013-EbrahimiAT #analysis #multi
- A layout-based approach for multiple event transient analysis (ME, HA, MBT), p. 6.
- DAC-2013-KuangY #composition #layout #performance
- An efficient layout decomposition approach for triple patterning lithography (JK, EFYY), p. 6.
- DAC-2013-MishraMD #design #multi
- A heterogeneous multiple network-on-chip design: an application-aware approach (AKM, OM, CRD), p. 10.
- DATE-2013-AncajasCR
- Proactive aging management in heterogeneous NoCs through a criticality-driven routing approach (DMA, KC, SR), pp. 1032–1037.
- DATE-2013-ChaG #detection #effectiveness #metric
- Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost (BC, SKG), pp. 1265–1270.
- DATE-2013-DaloukasMETS #delivery #network #parallel #performance #power management
- A parallel fast transform-based preconditioning approach for electrical-thermal co-simulation of power delivery networks (KD, AM, NEE, PT, GIS), pp. 1689–1694.
- DATE-2013-GuanYL0 #analysis #estimation
- FIFO cache analysis for WCET estimation: a quantitative approach (NG, XY, ML, WY), pp. 296–301.
- DATE-2013-KumarCT #distributed #realtime #satisfiability
- A satisfiability approach to speed assignment for distributed real-time systems (PK, DBC, LT), pp. 749–754.
- DATE-2013-LeeKPK
- An integrated approach for managing the lifetime of flash-based SSDs (SL, TK, JP, JK), pp. 1522–1525.
- DATE-2013-LiD #debugging #hybrid #performance
- A hybrid approach for fast and accurate trace signal selection for post-silicon debug (ML, AD), pp. 485–490.
- DATE-2013-Moy #modelling #parallel #programming
- Parallel programming with SystemC for loosely timed models: a non-intrusive approach (MM), pp. 9–14.
- DATE-2013-MushtaqAB #fault tolerance #manycore #performance #platform
- Efficient software-based fault tolerance approach on multicore platforms (HM, ZAA, KB), pp. 921–926.
- DATE-2013-RahimiBG #adaptation
- Hierarchically focused guardbanding: an adaptive approach to mitigate PVT variations and aging (AR, LB, RKG), pp. 1695–1700.
- DATE-2013-ShreejithVFL #configuration management #network #using
- An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
- DATE-2013-TodorovMRS #clustering #synthesis
- A spectral clustering approach to application-specific network-on-chip synthesis (VT, DMG, HR, US), pp. 1783–1788.
- DATE-2013-WettinMPSG #design #energy #manycore
- Energy-efficient multicore chip design through cross-layer approach (PW, JM, PPP, BS, AG), pp. 725–730.
- DATE-2013-YuZHWLT #manycore #set #simulation
- A critical-section-level timing synchronization approach for deterministic multi-core instruction set simulations (FWY, BHZ, YHH, HIW, CRL, RST), pp. 643–648.
- ISMM-2013-Musuvathi #consistency #memory management #modelling
- Safety-first approach to memory consistency models (MM), pp. 1–2.
- PDP-2013-AmorettiLS #distributed #execution
- A Cooperative Approach for Distributed Task Execution in Autonomic Clouds (MA, ALL, SS), pp. 274–281.
- PDP-2013-BachCEEGKKLLPR #performance
- A Comprehensive Approach for a Power Efficient General Purpose Supercomputer (MB, JdC, HE, DE, JG, SK, MK, VL, HJL, MP, DR), pp. 336–342.
- PDP-2013-IjazSW
- Fewest Common Hops (FCH): An Improved Peer Selection Approach for P2P Applications (HI, SS, MW), pp. 449–453.
- ESOP-2013-SharmaGHALN #algebra #data-driven #invariant
- A Data Driven Approach for Algebraic Loop Invariants (RS, SG, BH, AA, PL, AVN), pp. 574–592.
- FASE-2013-YangPX #automation #generative #mobile
- A Grey-Box Approach for Automated GUI-Model Generation of Mobile Applications (WY, MRP, TX), pp. 250–265.
- STOC-2013-BravermanM #complexity
- An information complexity approach to extended formulations (MB, AM), pp. 161–170.
- STOC-2013-LeeRS #using
- A new approach to computing maximum flows using electrical flows (YTL, SR, NS), pp. 755–764.
- TACAS-2013-LindenW #memory management
- A Verification-Based Approach to Memory Fence Insertion in PSO Memory Systems (AL, PW), pp. 339–353.
- CAV-2013-ArmoniFJ
- SVA and PSL Local Variables — A Practical Approach (RA, DF, NJ), pp. 197–212.
- ICLP-J-2013-ErdemPSSU #multi
- Finding optimal plans for multiple teams of robots through a mediator: A logic-based approach (EE, VP, ZGS, PS, TU), pp. 831–846.
- ICLP-J-2013-MaLWRL #analysis #declarative #distributed #execution #specification
- A declarative approach to distributed computing: Specification, execution and analysis (JM, FL, DW, AR, JL), pp. 815–830.
- ICST-2013-GraslandBGP #functional #hybrid #safety #testing
- A Functional Testing Approach for Hybrid Safety Properties with Incomplete Information (YG, LdB, RG, IP), pp. 104–113.
- ICTSS-2013-VorobyovKS #memory management
- A Dynamic Approach to Locating Memory Leaks (KV, PK, PS), pp. 255–270.
- ISSTA-2013-TrippWG #learning #security #testing #web
- Finding your way in the testing jungle: a learning approach to web security testing (OT, OW, LG), pp. 347–357.
- SAT-2013-CimattiGSS #composition #modulo theories #satisfiability
- A Modular Approach to MaxSAT Modulo Theories (AC, AG, BJS, RS), pp. 150–165.
- SAT-2013-HeuleS #clique #satisfiability
- A SAT Approach to Clique-Width (MH, SS), pp. 318–334.
- SAT-2013-IgnatievJM #quantifier #satisfiability
- Quantified Maximum Satisfiability: — A Core-Guided Approach (AI, MJ, JMS), pp. 250–266.
- SAT-2013-MihalT #constraints #logic #programmable
- A Constraint Satisfaction Approach for Programmable Logic Detailed Placement (AM, ST), pp. 208–223.
- CBSE-2012-GhafariJSH #architecture #component #configuration management #consistency
- An architectural approach to ensure globally consistent dynamic reconfiguration of component-based systems (MG, PJ, SS, HH), pp. 177–182.
- CBSE-2012-MartinezV #component #realtime
- An MDE approach to address synchronization needs in component-based real-time systems (PLM, TV), pp. 125–134.
- QoSA-2012-DurdikR #architecture #design #modelling
- Position paper: approach for architectural design and modelling with documented design decisions (ADMD3) (ZD, RHR), pp. 49–54.
- WICSA-ECSA-2012-KebirSCC #component #identification #object-oriented
- Quality-Centric Approach for Software Component Identification from Object-Oriented Code (SK, ADS, SC, AC), pp. 181–190.
- WICSA-ECSA-2012-KuzZBSX #architecture #effectiveness
- An Architectural Approach for Cost Effective Trustworthy Systems (IK, LZ, LB, MS, XX), pp. 325–328.
- DocEng-2012-Delprat #documentation
- Content and document based approach for digital productivity applications (TD), pp. 83–84.
- DocEng-2012-IorioPPV #automation #documentation #recognition #xml
- A first approach to the automatic recognition of structural patterns in XML documents (ADI, SP, FP, FV), pp. 85–94.
- DRR-2012-EsserSMBS #automation #documentation
- Automatic indexing of scanned documents: a layout-based approach (DE, DS, KM, MB, AS).
- DRR-2012-SadawiSS #recognition #rule-based
- Chemical structure recognition: a rule-based approach (NMS, APS, VS).
- HT-2012-WalshOW #evaluation
- Evaluation of a domain-aware approach to user model interoperability (EW, AO, VW), pp. 197–206.
- HT-2012-WolffMC #named
- Storyspace: a story-driven approach for creating museum narratives (AW, PM, TDC), pp. 89–98.
- JCDL-2012-ParkEF #canonical #hybrid #independence #representation
- A hybrid two-stage approach for discipline-independent canonical representation extraction from references (SHP, RWE, EAF), pp. 285–294.
- SIGMOD-2012-ChengKCC #distance #graph #performance #query #scalability
- Efficient processing of distance queries in large graphs: a vertex cover approach (JC, YK, SC, CC), pp. 457–468.
- SIGMOD-2012-JinRXL #distance #graph #query #scalability
- A highway-centric labeling approach for answering distance queries on large sparse graphs (RJ, NR, YX, VEL), pp. 445–456.
- SIGMOD-2012-XuKWCC #clustering #graph #modelling
- A model-based approach to attributed graph clustering (ZX, YK, YW, HC, JC), pp. 505–516.
- TPDL-2012-Gartner #metadata
- Linking the Parliamentary Record: A New Approach to Metadata for Legislative Proceedings (RG), pp. 179–184.
- TPDL-2012-GeelNN #named #using
- PubLight: Managing Publications Using a Task-Oriented Approach (MG, MN, MCN), pp. 363–369.
- TPDL-2012-MercunZA #named #product line #visualisation
- FrbrVis: An Information Visualization Approach to Presenting FRBR Work Families (TM, MZ, TA), pp. 504–507.
- VLDB-2012-SunHYY #analysis #mining #network
- Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach (YS, JH, XY, PSY), pp. 2022–2023.
- VLDB-2012-ZhaoRGH #integration
- A Bayesian Approach to Discovering Truth from Conflicting Sources for Data Integration (BZ, BIPR, JG, JH), pp. 550–561.
- ITiCSE-2012-CookDHHJKS #abstraction #education #modelling
- A systematic approach to teaching abstraction and mathematical modeling (CTC, SDS, JOH, JEH, DPJ, JK, MS), pp. 357–362.
- ITiCSE-2012-Kurmas #design
- The presenter first design approach (ZK), p. 379.
- ITiCSE-2012-MorgadoB12a #problem
- A structured approach to problem solving in CS1 (CM, FB), p. 399.
- ITiCSE-2012-Velazquez-Iturbide #algorithm #learning #refinement
- Refinement of an experimental approach tocomputer-based, active learning of greedy algorithms (JÁVI), pp. 46–51.
- SIGITE-2012-Wang #design #education #web
- A holistic and pragmatic approach to teaching web accessibility in an undergraduate web design course (YDW), pp. 55–60.
- CSMR-2012-Penta #developer #empirical #maintenance #reverse engineering
- Empirical Studies in Reverse Engineering and Maintenance: Employing Developers to Evaluate Your Approach and Tool (MDP), pp. 567–568.
- CSMR-2012-YoshidaKI #functional #maintenance #metric #source code
- A Cohesion Metric Approach to Dividing Source Code into Functional Segments to Improve Maintainability (NY, MK, HI), pp. 365–370.
- ICPC-2012-MahmoudNX #semantics #traceability
- A semantic relatedness approach for traceability link recovery (AM, NN, SX), pp. 183–192.
- ICPC-2012-Sajnani #architecture #automation #machine learning
- Automatic software architecture recovery: A machine learning approach (HS), pp. 265–268.
- ICSM-2012-BauerHD #library
- A structured approach to assess third-party library usage (VB, LH, FD), pp. 483–492.
- ICSM-2012-CorazzaMM #identifier #named #performance
- LINSEN: An efficient approach to split identifiers and expand abbreviations (AC, SDM, VM), pp. 233–242.
- ICSM-2012-DuseauDS #named #visual notation
- Vasco: A visual approach to explore object churn in framework-intensive applications (FD, BD, HAS), pp. 15–24.
- ICSM-2012-Perez-Castillo #information management #legacy #named #process
- MARBLE: Modernization approach for recovering business processes from legacy information systems (RPC), pp. 671–676.
- WCRE-2012-AlomariCM #performance #scalability #slicing
- A Very Efficient and Scalable Forward Static Slicing Approach (HWA, MLC, JIM), pp. 425–434.
- WCRE-2012-IchiiMNCO #automation #modelling #rule-based #source code
- A Rule-based Automated Approach for Extracting Models from Source Code (MI, TM, YN, MC, HO), pp. 308–317.
- WCRE-2012-MaigaABSGA #anti #detection #incremental #named
- SMURF: A SVM-based Incremental Anti-pattern Detection Approach (AM, NA, NB, AS, YGG, EA), pp. 466–475.
- WCRE-2012-MediniAGPT #execution #named
- SCAN: An Approach to Label and Relate Execution Trace Segments (SM, GA, YGG, MDP, PT), pp. 135–144.
- ICALP-v1-2012-CharikarL #problem
- A Dependent LP-Rounding Approach for the k-Median Problem (MC, SL), pp. 194–205.
- ICALP-v1-2012-LaekhanukitGS #problem
- A Rounding by Sampling Approach to the Minimum Size k-Arc Connected Subgraph Problem (BL, SOG, MS), pp. 606–616.
- ICALP-v2-2012-BouyerMS #automaton #game studies #reachability #robust
- Robust Reachability in Timed Automata: A Game-Based Approach (PB, NM, OS), pp. 128–140.
- FM-2012-AsplundMBCC #coordination #formal method
- A Formal Approach to Autonomous Vehicle Coordination (MA, AM, MB, SC, VC), pp. 52–67.
- FM-2012-ZhaoZKL #case study #hybrid #industrial
- A “Hybrid” Approach for Synthesizing Optimal Controllers of Hybrid Systems: A Case Study of the Oil Pump Industrial Example (HZ, NZ, DK, KGL), pp. 471–485.
- IFM-2012-IsobeMNR #capacity #csp #safety
- Safety and Line Capacity in Railways — An Approach in Timed CSP (YI, FM, HNN, MR), pp. 54–68.
- SEFM-2012-AbdelhalimST #effectiveness #model checking #optimisation
- An Optimization Approach for Effective Formalized fUML Model Checking (IA, SS, HT), pp. 248–262.
- SEFM-2012-BicknellRBCS #using #verification
- A Practical Approach for Closed Systems Formal Verification Using Event-B (BB, JR, MJB, JC, CFS), pp. 323–332.
- SEFM-2012-FathabadiBR #composition
- A Systematic Approach to Atomicity Decomposition in Event-B (ASF, MJB, AR), pp. 78–93.
- SEFM-2012-JanuzajKBM
- A Configuration Approach for IMA Systems (VJ, SK, FB, RM), pp. 203–217.
- SEFM-2012-LefticaruI #algorithm #finite #generative #search-based #state machine #testing #using
- An Improved Test Generation Approach from Extended Finite State Machines Using Genetic Algorithms (RL, FI), pp. 293–307.
- SEFM-2012-VorobyovKS #data flow #security
- A Low-Overhead, Value-Tracking Approach to Information Flow Security (KV, PK, PS), pp. 367–381.
- SEFM-2012-ZhuXMQQ #concurrent #source code #verification
- The Rely/Guarantee Approach to Verifying Concurrent BPEL Programs (HZ, QX, CM, SQ, ZQ), pp. 172–187.
- CIG-2012-FoderaroSF #composition #game studies #modelling #online #video
- A model-based cell decomposition approach to on-line pursuit-evasion path planning and the video game Ms. Pac-Man (GF, AS, SF), pp. 281–287.
- CIG-2012-JustinussenRCT #game studies
- Resource systems in games: An analytical approach (TJ, PHR, AC, JT), pp. 171–178.
- CIG-2012-MachadoPC #automation #classification #modelling
- A binary classification approach for automatic preference modeling of virtual agents in Civilization IV (MCM, GLP, LC), pp. 155–162.
- CIG-2012-SynnaeveB
- Special tactics: A Bayesian approach to tactical decision-making (GS, PB), pp. 409–416.
- FDG-2012-Linderoth #challenge #game studies
- Monkey see, monkey do: an ecological approach to challenges in games (JL), p. 1.
- VS-Games-2012-ClarkeADB #game studies #named
- PR: EPARe: A Game-Based Approach to Relationship Guidance for Adolescents (SC, SA, ID, KB), pp. 38–44.
- VS-Games-2012-FernandesDRFPS #collaboration #elicitation #game studies #named #towards
- iThink: A Game-Based Approach Towards Improving Collaboration and Participation in Requirement Elicitation (JF, DD, CR, CF, JMP, MMdS), pp. 66–77.
- VS-Games-2012-SuttieLLR #adaptation #game studies #realtime #towards
- Towards a Biocybernetic Approach for Serious Games Real-time Psychophysiological Inferences for Adaptive Agents in Serious Games (NS, SL, TL, JR), pp. 316–317.
- GT-VMT-2012-GabrielLE #algebra #petri net
- Algebraic Approach to Timed Petri Nets (KG, PL, CE).
- GT-VMT-2012-NatschlagerS #algebra #graph #graph transformation #inheritance
- A Flattening Approach for Attributed Type Graphs with Inheritance in Algebraic Graph Transformation (CN, KDS).
- CHI-2012-FrauenbergerGKP
- Interpreting input from children: a designerly approach (CF, JG, WKB, HP), pp. 2377–2386.
- CHI-2012-LazarFBMWHOE #interactive #proving
- The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users (JL, JF, TB, GM, BW, JH, AO, NE), pp. 2267–2276.
- CHI-2012-MorrisonMRSC #hybrid #mobile
- A hybrid mass participation approach to mobile software trials (AM, DM, SR, SS, MC), pp. 1311–1320.
- CHI-2012-Sae-BaeAIM #authentication #gesture #multi #novel
- Biometric-rich gestures: a novel approach to authentication on multi-touch devices (NSB, KA, KI, NDM), pp. 977–986.
- CHI-2012-WallnerK #analysis #visualisation
- A spatiotemporal visualization approach for the analysis of gameplay data (GW, SK), pp. 1115–1124.
- CSCW-2012-FuksMCVUB #co-evolution #collaboration #design
- Collaborative museums: an approach to co-design (HF, HM, DC, KV, WU, MB), pp. 681–684.
- CSCW-2012-NobaranyHF #collaboration #distributed #process #reuse
- Facilitating the reuse process in distributed collaboration: a distributed cognition approach (SN, MH, BDF), pp. 1223–1232.
- CSCW-2012-PaoMCR #collaboration #design
- A need-driven design approach: addressing latent needs in collaboration rooted in early childhood (SYP, SM, KC, AR), pp. 829–832.
- CAiSE-2012-DaskalakiP #multi
- OtO Matching System: A Multi-strategy Approach to Instance Matching (ED, DP), pp. 286–300.
- CAiSE-2012-KaragiannisMM #evaluation #heatmap #metamodelling
- Compliance Evaluation Featuring Heat Maps (CE-HM): A Meta-Modeling-Based Approach (DK, CM, AM), pp. 414–428.
- CAiSE-2012-LaraGC #modelling
- Abstracting Modelling Languages: A Reutilization Approach (JdL, EG, JSC), pp. 127–143.
- CAiSE-2012-LiptchinskyKTD #collaboration #modelling #novel #process #social
- A Novel Approach to Modeling Context-Aware and Social Collaboration Processes (VL, RK, HLT, SD), pp. 565–580.
- CAiSE-2012-NederstigtAVF #automation #e-commerce #taxonomy
- An Automatic Approach for Mapping Product Taxonomies in E-Commerce Systems (LJN, SSA, DV, FF), pp. 334–349.
- EDOC-2012-CostaMPA #detection #modelling #rule-based
- A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection (PDC, ITM, IP, JPAA), pp. 154–163.
- EDOC-2012-DohringSG #adaptation #aspect-oriented #model transformation #recursion #rule-based #runtime #weaving #workflow
- Emulating Runtime Workflow Adaptation and Aspect Weaving by Recursive Rule-Based Sub-Process Selection — A Model Transformation Approach (MD, AS, IG), pp. 133–142.
- ICEIS-J-2012-GottardiPC12a #framework #modelling #reuse #using
- Accelerating Crosscutting Framework Reuse Using a Model-Based Approach (TG, OPL, VVdC), pp. 257–273.
- ICEIS-J-2012-KaragiannisS #design #hybrid #modelling
- An Engineering Approach for the Design of Hybrid Modelling Methods (DK, MS), pp. 3–17.
- ICEIS-J-2012-RibeiroFBKE #algorithm #learning #markov #process
- Combining Learning Algorithms: An Approach to Markov Decision Processes (RR, FF, MACB, ALK, FE), pp. 172–188.
- ICEIS-J-2012-XavierN12a #component
- Measuring Users’ Emotions with a Component-Based Approach (RACX, VPdAN), pp. 393–409.
- ICEIS-v1-2012-BoulilBP #ocl #quality #uml
- A UML & Spatial OCL based Approach for Handling Quality Issues in SOLAP Systems (KB, SB, FP), pp. 99–104.
- ICEIS-v1-2012-Dustdar #design #novel
- Design by Units — A Novel Approach for Building Elastic Systems (SD).
- ICEIS-v1-2012-RibeiroFBBDKE #algorithm #learning
- Unified Algorithm to Improve Reinforcement Learning in Dynamic Environments — An Instance-based Approach (RR, FF, MACB, APB, OBD, ALK, FE), pp. 229–238.
- ICEIS-v1-2012-ZianiRO #constraints #mining #multi
- A Constraint-based Mining Approach for Multi-attribute Index Selection (BZ, FR, YO), pp. 93–98.
- ICEIS-v2-2012-CapelM #automation #composition #correctness #model checking #safety #verification
- A Formal Compositional Verification Approach for Safety-Critical Systems Correctness — Model-Checking based Methodological Approach to Automatically Verify Safety Critical Systems Software (MIC, LEMM), pp. 105–112.
- ICEIS-v2-2012-GottardiPC #framework #modelling #reuse
- A Model-based Approach for Reusing Crosscutting Frameworks (TG, OPL, VVdC), pp. 46–55.
- ICEIS-v2-2012-PantojaC #development #using
- A MDA Approach for Agent-oriented Development using FAML (CEP, RC), pp. 415–420.
- ICEIS-v2-2012-ParreirasGW #linked data #modelling #ontology #open data
- An Ontology-based Approach for Enabling Linked Data Capabilities to MOF Compliant Models (FSP, GG, TW), pp. 126–131.
- ICEIS-v2-2012-SousaPS #concept
- A Pragmatic Approach to Conceptual Negotiation Support (CS, CP, ALS), pp. 349–354.
- ICEIS-v3-2012-BoukhedoumaOAT #adaptation #architecture #modelling #workflow
- Service based Approach for Adaptability of Workflow Models — The Subcontracting Architecture (SB, MO, ZA, DT), pp. 224–231.
- ICEIS-v3-2012-GoncalvesNUS #flexibility #mobile #user interface
- An Analitic Approach to Evaluate Flexible Mobile User Interfaces for the Elderly (VPG, VPdAN, JU, SS), pp. 91–96.
- ICEIS-v3-2012-HayashiMB #towards
- Schools as Organizations — A Semiotic Approach towards Making Sense of Information Technology (ECSH, MCM, MCCB), pp. 15–24.
- ICEIS-v3-2012-KumarS #architecture #enterprise #metric #performance
- Enterprise Architecture Performance Management — A Context based Approach to EA Metrics Definition (AK, PS), pp. 249–254.
- ICEIS-v3-2012-XavierN #evaluation #hybrid #information management
- A Hybrid Evaluation Approach for the Emotional State of Information Systems Users (RACX, VPdAN), pp. 45–53.
- CIKM-2012-BhatiaHHS #query #scalability
- A scalable approach for performing proximal search for verbose patent search queries (SB, BH, QH, WSS), pp. 2603–2606.
- CIKM-2012-CamposDJN #higher-order #identification #named #web
- GTE: a distributional second-order co-occurrence approach to improve the identification of top relevant dates in web snippets (RC, GD, AJ, CN), pp. 2035–2039.
- CIKM-2012-FangS #feedback #learning #recommendation
- A latent pairwise preference learning approach for recommendation from implicit feedback (YF, LS), pp. 2567–2570.
- CIKM-2012-IntagornL #mining #probability #social
- A probabilistic approach to mining geospatial knowledge from social annotations (SI, KL), pp. 1717–1721.
- CIKM-2012-LiKBCL #named #probability #query #recommendation
- DQR: a probabilistic approach to diversified query recommendation (RL, BK, BB, RC, EL), pp. 16–25.
- CIKM-2012-LongGXK #design #using
- A simple approach to the design of site-level extractors using domain-centric principles (CL, XG, CX, SK), pp. 1517–1521.
- CIKM-2012-OrangS #correlation #nondeterminism #probability #query
- A probabilistic approach to correlation queries in uncertain time series data (MO, NS), pp. 2229–2233.
- CIKM-2012-ShenWLW #graph #ontology
- A graph-based approach for ontology population with named entities (WS, JW, PL, MW), pp. 345–354.
- CIKM-2012-XieFTCMLL #hybrid #performance
- A hybrid approach for efficient provenance storage (YX, DF, ZT, LC, KKMR, YL, DDEL), pp. 1752–1756.
- CIKM-2012-ZhaoN #data type #modelling
- A model-based approach for RFID data stream cleansing (ZZ, WN), pp. 862–871.
- CIKM-2012-ZhuYCQ #classification #feature model #graph
- Graph classification: a diversified discriminative feature selection approach (YZ, JXY, HC, LQ), pp. 205–214.
- ECIR-2012-TamFL #automation #email
- Automatic Foldering of Email Messages: A Combination Approach (TT, AF, AL), pp. 232–243.
- ECIR-2012-YanZ #community #recommendation
- A New Approach to Answerer Recommendation in Community Question Answering Services (ZY, JZ), pp. 121–132.
- ICML-2012-FengXY #robust
- Robust PCA in High-dimension: A Deterministic Approach (JF, HX, SY), p. 237.
- ICML-2012-GeistSLG #difference #learning
- A Dantzig Selector Approach to Temporal Difference Learning (MG, BS, AL, MG), p. 49.
- ICML-2012-KiralyT #algebra #combinator #matrix #rank
- A Combinatorial Algebraic Approach for the Identifiability of Low-Rank Matrix Completion (FJK, RT), p. 100.
- ICML-2012-MerchanteGG #analysis #linear #performance
- An Efficient Approach to Sparse Linear Discriminant Analysis (LFSM, YG, GG), p. 168.
- ICML-2012-XieHS #automation #generative #learning
- Artist Agent: A Reinforcement Learning Approach to Automatic Stroke Generation in Oriental Ink Painting (NX, HH, MS), p. 139.
- ICML-2012-ZhongG #approximate #matrix
- A Bayesian Approach to Approximate Joint Diagonalization of Square Matrices (MZ, MAG), p. 87.
- ICPR-2012-BriaMMT #semistructured data
- A ranking-based cascade approach for unbalanced data (AB, CM, MM, FT), pp. 3439–3442.
- ICPR-2012-ClausnerAP #documentation #hybrid #robust #segmentation
- A robust hybrid approach for text line segmentation in historical documents (CC, AA, SP), pp. 335–338.
- ICPR-2012-CourtyAL #classification #image
- A classwise supervised ordering approach for morphology based hyperspectral image classification (NC, EA, SL), pp. 1997–2000.
- ICPR-2012-DornellesH #algorithm #image #search-based
- A genetic algorithm based approach for combining binary image operators (MMD, NSTH), pp. 3184–3187.
- ICPR-2012-DuanHC #image #segmentation
- Shape prior regularized continuous max-flow approach to image segmentation (YD, WH, HC), pp. 2516–2519.
- ICPR-2012-DuH #adaptation #linear
- A discriminative linear regression approach to OCR adaptation (JD, QH), pp. 629–632.
- ICPR-2012-Ho #detection #effectiveness
- An effective vortex detection approach for velocity vector field (SSH), pp. 2643–2646.
- ICPR-2012-KawabataK #multi #using
- Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
- ICPR-2012-KennardBS #2d #detection #geometry #using #verification
- Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
- ICPR-2012-LiF #named #process #recognition
- ARMA-HMM: A new approach for early recognition of human activity (KL, YF), pp. 1779–1782.
- ICPR-2012-MarcaciniCR #clustering #learning
- An active learning approach to frequent itemset-based text clustering (RMM, GNC, SOR), pp. 3529–3532.
- ICPR-2012-MinKCK #detection #higher-order #using
- A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
- ICPR-2012-MorinDD #multi #random #segmentation
- A random walk approach for multiatlas-based segmentation (JPM, CD, LD), pp. 3636–3639.
- ICPR-2012-NegiBC
- Characterizing user-subgroups in Flickr Group: A block LDA based approach (SN, RB, SC), pp. 2262–2265.
- ICPR-2012-PazzagliaC #recognition #tool support #visual notation
- Visual description and recognition of mechanical tools with a silhouette-based approach (FP, CC), pp. 2549–2552.
- ICPR-2012-PohKA #authentication #parametricity
- A discriminative parametric approach to video-based score-level fusion for biometric authentication (NP, JK, FMA), pp. 2335–2338.
- ICPR-2012-RattaniMGR #automation #classification
- A dual-staged classification-selection approach for automated update of biometric templates (AR, GLM, EG, FR), pp. 2972–2975.
- ICPR-2012-San-BiagioUCCCM #classification #kernel #learning #multi
- A multiple kernel learning approach to multi-modal pedestrian classification (MSB, AU, MC, MC, UC, VM), pp. 2412–2415.
- ICPR-2012-ShaukatGWB #bottom-up #detection #top-down
- Meeting in the Middle: A top-down and bottom-up approach to detect pedestrians (AS, AG, DW, RB), pp. 874–877.
- ICPR-2012-SrikanthaSM #detection #image
- An SVD-based approach for ghost detection and removal in high dynamic range images (AS, DS, FM), pp. 380–383.
- ICPR-2012-SunXAL #online #performance #video
- A tracking based fast online complete video synopsis approach (LS, JX, HA, SL), pp. 1956–1959.
- ICPR-2012-WangJ12a #novel #probability #recognition
- A novel probabilistic approach utilizing clip attribute as hidden knowledge for event recognition (XW, QJ), pp. 3382–3385.
- ICPR-2012-WeberT #documentation #performance
- Symbol spotting for technical documents: An efficient template-matching approach (JW, ST), pp. 669–672.
- ICPR-2012-WongLTYCCBW #automation #graph #locality
- Automatic localization of the macula in a supervised graph-based approach with contextual superpixel features (DWKW, JL, NMT, FY, XC, CMGC, MB, TYW), pp. 2063–2066.
- ICPR-2012-ZhangWSD #detection #effectiveness
- A simple and effective saliency detection approach (HZ, WW, GS, LD), pp. 186–189.
- ICPR-2012-Zheng0CP #adaptation
- A Grassmann manifold-based domain adaptation approach (JZ, MYL, RC, PJP), pp. 2095–2099.
- ICPR-2012-ZhongHH
- A hierarchical approach to high-quality partial shape registration (MZ, TH, QH), pp. 113–116.
- KDD-2012-0001LHSE #towards
- Towards heterogeneous temporal clinical event pattern discovery: a convolutional approach (FW, NL, JH, JS, SE), pp. 453–461.
- KDD-2012-MaoCCLKB #data mining #mining #monitoring #realtime
- An integrated data mining approach to real-time clinical monitoring and deterioration warning (YM, WC, YC, CL, MK, TCB), pp. 1140–1148.
- KDD-2012-PatroDSWFK #data-driven #how #learning #modelling #network
- The missing models: a data-driven approach for learning how networks grow (RP, GD, ES, HW, DF, CK), pp. 42–50.
- KDD-2012-ShaferRBAGF #mining #monitoring #named
- RainMon: an integrated approach to mining bursty timeseries monitoring data (IS, KR, VNB, YA, GRG, CF), pp. 1158–1166.
- KDIR-2012-AlkouzA #network #semantics #social
- An Interests Discovery Approach in Social Networks based on a Semantically Enriched Bayesian Network Model (AA, SA), pp. 300–305.
- KDIR-2012-CheungZZ #network
- A Bayesian Approach for Constructing Ensemble Neural Network (SHC, YZ, ZZ), pp. 374–377.
- KDIR-2012-Dagnino #grid #information management #machine learning #smarttech
- Knowledge Discovery in the Smart Grid — A Machine Learning Approach (AD), pp. 366–369.
- KDIR-2012-DinsoreanuMHP #recommendation
- A Unified Approach for Context-sensitive Recommendations (MD, FCM, OLH, RP), pp. 85–94.
- KDIR-2012-FerraraT #social
- A Keyphrase Extraction Approach for Social Tagging Systems (FF, CT), pp. 362–365.
- KDIR-2012-FleissnerF
- A Syntax-oriented Event Extraction Approach (SF, ACF), pp. 336–339.
- KDIR-2012-GayLM #constraints #mining #multi #sequence
- Constraint-programming Approach for Multiset and Sequence Mining (PG, BL, JM), pp. 212–220.
- KEOD-2012-BrandaoMS #composition #incremental #interactive #named #navigation #ontology
- I3OM — An Iterative, Incremental and Interactive Approach for Ontology Navigation based on Ontology Modularization (RB, PM, NS), pp. 265–270.
- KEOD-2012-FigueirasCPLJ #collaboration #information retrieval
- Information Retrieval in Collaborative Engineering Projects — A Vector Space Model Approach (PF, RC, LP, CL, RJG), pp. 233–238.
- KEOD-2012-KotowskiS #library #ontology
- Ontology Library — A New Approach for Storing, Searching and Discovering Ontologies (DK, DAS), pp. 271–277.
- KEOD-2012-LiangCI #development #using
- A Product Development System using Knowledge-intensive Support Approach (JSL, KMC, PI), pp. 25–33.
- KEOD-2012-MatskanisAMMR #linked data #open data #query #research
- A Linked Data Approach for Querying Heterogeneous Sources — Assisting Researchers in Finding Answers to Complex Clinical Questions (NM, VA, PM, KM, JR), pp. 411–414.
- KEOD-2012-PereiraS #design #information management #ontology #security
- An Ontology Approach in Designing Security Information Systems to Support Organizational Security Risk Knowledge (TSMP, HMDS), pp. 461–466.
- KEOD-2012-SchlenoffFB #ontology #recognition #using
- An Approach to Ontology-based Intention Recognition using State Representations (CS, SF, SB), pp. 178–183.
- KEOD-2012-WicaksonoRO #energy #ontology
- Ontology Driven Approach for Intelligent Energy Management in Discrete Manufacturing (HW, SR, JO), pp. 108–114.
- KMIS-2012-Chai-ArayalertN #information management #towards
- Towards a Semiotic Approach to Practice-oriented Knowledge Transfer (SCA, KN), pp. 119–124.
- KMIS-2012-LageA12a #process
- Information and Knowledge Sharing in Inter-organizational Relationships under the Process Approach (EL, BA), pp. 273–276.
- KMIS-2012-ThonssenL #contract #semantics
- Semantically Enriched Obligation Management — An Approach for Improving the Handling of Obligations Represented in Contracts (BT, JL), pp. 40–48.
- KMIS-2012-Vaiyavuth #challenge #concept #energy #framework #how #modelling
- How Open Innovation Models Might Help the Thai Energy Sector to Address the Climate Change Challenge? — A Conceptual Framework on an Approach to Measure the Impact of Adoption of Open Innovation (RV), pp. 229–234.
- KR-2012-ConitzerX #approximate #multi
- Paradoxes of Multiple Elections: An Approximation Approach (VC, LX).
- KR-2012-LutzSW #approximate #logic
- An Automata-Theoretic Approach to Uniform Interpolation and Approximation in the Description Logic EL (CL, IS, FW).
- MLDM-2012-DiezC #classification #multi #predict
- A Multiclassifier Approach for Drill Wear Prediction (AD, AC), pp. 617–630.
- MLDM-2012-EbrahimiA #clustering
- Semi Supervised Clustering: A Pareto Approach (JE, MSA), pp. 237–251.
- MLDM-2012-Garcia-ConstantinoCNRS #automation #classification #summary
- A Semi-Automated Approach to Building Text Summarisation Classifiers (MGC, FC, PJN, AR, CS), pp. 495–509.
- MLDM-2012-LiHO #correlation #mining
- Top-N Minimization Approach for Indicative Correlation Change Mining (AL, MH, YO), pp. 102–116.
- MLDM-2012-MondalPMMB #clustering #concept analysis #mining #using
- A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
- MLDM-2012-PirasGP #image #retrieval
- Enhancing Image Retrieval by an Exploration-Exploitation Approach (LP, GG, RP), pp. 355–365.
- MLDM-2012-SinghCS #hybrid #performance #recognition #using
- A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines (LS, GC, DS), pp. 660–668.
- MLDM-2012-TaTB #clustering #data type #using
- Clustering Data Stream by a Sub-window Approach Using DCA (MTT, LTHA, LBA), pp. 279–292.
- MLDM-2012-TurkovKM #concept #pattern matching #pattern recognition #problem #recognition
- Bayesian Approach to the Concept Drift in the Pattern Recognition Problems (PAT, OK, VM), pp. 1–10.
- RecSys-2012-AntunesCG #development #recommendation
- An approach to context-based recommendation in software development (BA, JC, PG), pp. 171–178.
- RecSys-2012-ZhangTSWY #image #recommendation #semantics
- A semantic approach to recommending text advertisements for images (WZ, LT, XS, HW, YY), pp. 179–186.
- SEKE-2012-AlbuquerquePL #case study #experience #natural language #requirements #reuse #using
- Reuse of Experiences Applied to Requirements Engineering: An Approach Based on Natural Language Processing (AA, VP, TL), pp. 574–577.
- SEKE-2012-AsuncionT #traceability
- A Holistic Approach to Software Traceability (HUA, RNT), pp. 412–417.
- SEKE-2012-AvelarSP #database #ontology #relational #xml
- An Ontology-based Approach for Storing XML Data Into Relational Databases (FTMdA, DdBS, EKP), pp. 438–443.
- SEKE-2012-ChangCSZQ #component #ontology #reuse
- An Approach for Software Component Reusing Based on Ontological Mapping (SKC, FC, MDS, EZ, YQ), pp. 180–187.
- SEKE-2012-ChenCZS #analysis #integration
- A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
- SEKE-2012-ChenL #behaviour #elicitation #ontology #requirements #security
- Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach (XC, JL), pp. 61–65.
- SEKE-2012-DuttaUA #analysis #automation #semantics #verification
- Requirement Analysis and Automated Verification: A Semantic Approach (AD, PDU, SA), pp. 51–54.
- SEKE-2012-FerreiraS #overview
- An Overview of the RSLingo Approach (DdAF, ARdS), pp. 66–69.
- SEKE-2012-GrunwaldM #named #owl #uml
- umlTUowl — A Both Generic and Vendor-specific Approach for UML to OWL Transformation (AG, TM), pp. 730–736.
- SEKE-2012-JlaielA #novel #process #reuse #semantics #towards
- Towards a Novel Semantic Approach for Process Patterns’ Capitalization and Reuse (NJ, MBA), pp. 505–510.
- SEKE-2012-LeeS #re-engineering
- A Process-Based Approach to Improving Knowledge Sharing in Software Engineering (SBL, KS), pp. 700–705.
- SEKE-2012-RakaLM #generative #modelling #product line
- Interoperable EMR Message Generation: A Model-Driven Software Product Line Approach (DR, SHL, MM), pp. 537–540.
- SEKE-2012-WangL #analysis #modelling #petri net #workflow
- Resource Modeling and Analysis for Workflows: A Petri Net Approach (JW, DL), pp. 381–386.
- SEKE-2012-YangCXZZ #multi #optimisation
- A New Approach to Evaluate Path Feasibility and Coverage Ratio of EFSM Based on Multi-objective Optimization (RY, ZC, BX, ZZ, WZ), pp. 470–475.
- SIGIR-2012-Bonzanini #knowledge-based
- A knowledge-based approach for summarising opinions (MB), p. 991.
- SIGIR-2012-DangC
- Diversity by proportionality: an election-based approach to search result diversification (VD, WBC), pp. 65–74.
- SIGIR-2012-Hassan #modelling #web
- A semi-supervised approach to modeling web search satisfaction (AH), pp. 275–284.
- SIGIR-2012-HauffH #image #microblog
- Placing images on the world map: a microblog-based enrichment approach (CH, GJH), pp. 691–700.
- SIGIR-2012-JiangWLAW #alias #detection #learning #similarity #string #towards
- Towards alias detection without string similarity: an active learning based approach (LJ, JW, PL, NA, MW), pp. 1155–1156.
- SIGIR-2012-SinghPR #thread
- Retrieving similar discussion forum threads: a structure based approach (AS, DP, DR), pp. 135–144.
- SIGIR-2012-YeLL #generative #recommendation #social
- Exploring social influence for recommendation: a generative model approach (MY, XL, WCL), pp. 671–680.
- SIGIR-2012-YuanCSLM #data-driven #maintenance
- Category hierarchy maintenance: a data-driven approach (QY, GC, AS, CYL, NMT), pp. 791–800.
- ECMFA-2012-KolovosRWMP #documentation #lightweight #xml
- A Lightweight Approach for Managing XML Documents with MDE Languages (DSK, LMR, JRW, NDM, RFP), pp. 118–132.
- ECMFA-2012-RadjenovicPRWK #plugin #simulation #uml
- A Plug-in Based Approach for UML Model Simulation (AR, RFP, LMR, JW, SK), pp. 328–339.
- MoDELS-2012-BehjatiYB #modelling #reuse #similarity #using
- A Modeling Approach to Support the Similarity-Based Reuse of Configuration Data (RB, TY, LCB), pp. 497–513.
- MoDELS-2012-CuadradoLG #bottom-up #interactive #metamodelling
- Bottom-Up Meta-Modelling: An Interactive Approach (JSC, JdL, EG), pp. 3–19.
- MoDELS-2012-GonzalezC #atl #generative #named #testing
- ATLTest: A White-Box Test Generation Approach for ATL Transformations (CAG, JC), pp. 449–464.
- MoDELS-2012-KainzBK #model transformation
- A Generic Approach Simplifying Model-to-Model Transformation Chains (GK, CB, AK), pp. 579–594.
- MoDELS-2012-SchulzeCA #modelling #uml
- An Approach for Synchronizing UML Models and Narrative Text in Literate Modeling (GS, JCO, JA), pp. 595–608.
- MoDELS-2012-SunGBB #industrial #modelling
- A Model-Driven Approach to Support Engineering Changes in Industrial Robotics Software (YS, JG, KB, NvB), pp. 368–382.
- PLEASE-2012-BaumgartFP #certification #component #functional #performance #safety #towards #using
- Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
- SPLC-2012-DietrichTSL #linux #robust #variability
- A robust approach for variability extraction from the Linux build system (CD, RT, WSP, DL), pp. 21–30.
- TOOLS-EUROPE-J-2011-LangerWWC12 #emf #lightweight #modelling
- EMF Profiles: A Lightweight Extension Approach for EMF Models (PL, KW, MW, JC), pp. 1–29.
- OOPSLA-2012-KaliberaMJV #black box #comprehension #concurrent
- A black-box approach to understanding concurrency in DaCapo (TK, MM, REJ, JV), pp. 335–354.
- AdaEurope-2012-FariaMP #ada #model checking #source code
- An Approach to Model Checking Ada Programs (JMF, JM, JSP), pp. 105–118.
- HILT-2012-Sanden #design #modelling #multi
- Design of Multitask Software: The Entity-life Modeling Approach (BIS), pp. 1–2.
- PADL-2012-GoldbergW #declarative #modelling
- A Declarative Approach for Software Modeling (MG, GW), pp. 18–32.
- PADL-2012-GuzmanCCH
- A Segment-Swapping Approach for Executing Trapped Computations (PCdG, AC, MC, MVH), pp. 138–152.
- PEPM-2012-GotoS #functional
- An approach to completing variable names for implicitly typed functional languages (TG, IS), pp. 131–140.
- POPL-2012-Balabonski #lazy evaluation
- A unified approach to fully lazy sharing (TB), pp. 469–480.
- PPDP-2012-OlartePRC #automation #concurrent #constraints #linear #verification
- A linear concurrent constraint approach for the automatic verification of access permissions (CO, EP, CR, NC), pp. 207–216.
- SAS-2012-Alonso-BlasG #cost analysis #on the
- On the Limits of the Classical Approach to Cost Analysis (DEAB, SG), pp. 405–421.
- RE-2012-Hoffmann #requirements
- A Pattern-based approach for analysing requirements in socio-technical systems engineering (AH), pp. 341–344.
- RE-2012-MendizabalSS #elicitation #performance #requirements
- Log-based approach for performance requirements elicitation and prioritization (OMM, MS, RS), pp. 297–302.
- REFSQ-2012-WangLWZW #dependence #impact analysis #simulation
- A Simulation Approach for Impact Analysis of Requirement Volatility Considering Dependency Change (JW, JL, QW, HZ, HW), pp. 59–76.
- ASE-2012-AminGC #automation #linear #modelling
- An automated approach to forecasting QoS attributes based on linear and non-linear time series modeling (AA, LG, AC), pp. 130–139.
- ASE-2012-YuanG #clone detection #detection #named #scalability
- Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
- FSE-2012-ManiCSD #debugging #named #summary
- AUSUM: approach for unsupervised bug report summarization (SM, RC, VSS, AD), p. 11.
- FSE-2012-NguyenNNN #debugging #multi
- Multi-layered approach for recovering links between bug reports and fixes (ATN, TTN, HAN, TNN), p. 63.
- ICSE-2012-AstromskisJM #modelling #named
- Egidio: A non-invasive approach for synthesizing organizational models (SA, AJ, ARM), pp. 1465–1466.
- ICSE-2012-BalasubramaniamJKMN #automation #constraints #generative #performance #theorem proving
- An automated approach to generating efficient constraint solvers (DB, CJ, LK, IM, PN), pp. 661–671.
- ICSE-2012-BavotaLFOZ #education #project management #re-engineering
- Teaching software engineering and software project management: An integrated and practical approach (GB, ADL, FF, RO, CZ), pp. 1155–1164.
- ICSE-2012-Khoshnevis #product line #variability
- An approach to variability management in service-oriented product lines (SK), pp. 1483–1486.
- ICSE-2012-KimKKJ #case study #industrial #testing #using
- Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE (YK, MK, YJK, YJ), pp. 1143–1152.
- ICSE-2012-MengWZM #evolution #framework #identification
- A history-based matching approach to identification of framework evolution (SM, XW, LZ, HM), pp. 353–363.
- ICSE-2012-MirakhorliSCC #automation #quality #traceability
- A tactic-centric approach for automating traceability of quality concerns (MM, YS, JCH, MÇ), pp. 639–649.
- ICSE-2012-SongHLSLD #model checking #multi #probability
- Analyzing multi-agent systems with probabilistic model checking approach (SS, JH, YL, JS, HfL, JSD), pp. 1337–1340.
- ICSE-2012-Souza #adaptation #design
- A requirements-based approach for the design of adaptive systems (VESS), pp. 1635–1637.
- ICSE-2012-WagnerLHKTPSGS #assessment #modelling #quality
- The Quamoco product quality modelling and assessment approach (SW, KL, LH, MK, AT, RP, AS, AG, JS), pp. 1133–1142.
- SAC-2012-BarabucciPPV #semantics
- Embedding semantic annotations within texts: the FRETTA approach (GB, SP, FP, FV), pp. 658–663.
- SAC-2012-BartschS #policy
- Guiding decisions on authorization policies: a participatory approach to decision support (SB, MAS), pp. 1502–1507.
- SAC-2012-BhattiBA #manycore #platform #realtime #scheduling
- A semi-partitioned real-time scheduling approach for periodic task systems on multicore platforms (MKB, CB, MA), pp. 1594–1601.
- SAC-2012-BoulilaEFS #adaptation #database #image #predict
- High level adaptive fusion approach: application to land cover change prediction in satellite image databases (WB, KSE, IRF, BS), pp. 21–22.
- SAC-2012-CentenoA #algorithm #clustering #image
- Clustering approach algorithm for image interpolation (TMC, MTA), pp. 56–57.
- SAC-2012-ChanvilaiHNTO #constraints #diagrams #ocl
- Goal-oriented approach to creating class diagrams with OCL constraints (SC, KH, HN, YT, AO), pp. 1051–1056.
- SAC-2012-CosciaCMZ #development #web #web service
- An approach to improve code-first web services discoverability at development time (JLOC, MC, CM, AZ), pp. 638–643.
- SAC-2012-FerrariGT #clustering #requirements #specification
- A clustering-based approach for discovering flaws in requirements specifications (AF, SG, GT), pp. 1043–1050.
- SAC-2012-FkiJST #composition #flexibility #using
- A flexible approach for service composition using service patterns (EF, MJ, CSD, ST), pp. 1976–1983.
- SAC-2012-FreitasCO #linked data #open data #semantics #web
- A distributional approach for terminological semantic search on the Linked Data Web (AF, EC, SO), pp. 384–391.
- SAC-2012-GuidaraCF #semantics
- Intention based semantic approach for service sourcing (IG, TC, KF), pp. 401–402.
- SAC-2012-LiuCZ #architecture #petri net #self #towards
- Towards a colored reflective Petri-net approach to model self-evolving service-oriented architectures (YL, WC, BZ), pp. 1858–1865.
- SAC-2012-MalaverriML #quality
- A provenance approach to assess the quality of geospatial data (JGM, CBM, RCL), pp. 2043–2044.
- SAC-2012-SenarathneW #coordination #multi
- A two-level approach for multi-robot coordinated exploration of unstructured environments (PGCNS, DW), pp. 274–279.
- SAC-2012-TaherHP #adaptation #web #web service
- A three step based approach for Web Service adaptation (YT, WJvdH, MP), pp. 1992–1993.
- SLE-2012-GarciaDA #automation #co-evolution #model transformation
- Model Transformation Co-evolution: A Semi-automatic Approach (JG, OD, MA), pp. 144–163.
- ASPLOS-2012-RadojkovicCMVPCNV #parallel #statistics #thread
- Optimal task assignment in multithreaded processors: a statistical approach (PR, VC, MM, JV, AP, FJC, MN, MV), pp. 235–248.
- CASE-2012-BrunoMSVZ #modelling #recognition
- Human motion modelling and recognition: A computational approach (BB, FM, AS, TV, RZ), pp. 156–161.
- CASE-2012-CaoZF #mobile #search-based
- Point stabilization of mobile robots by genetic sliding mode approach with neural dynamics model on uneven surface (ZC, YZ, YF), pp. 1150–1155.
- CASE-2012-ChenZAB #analysis #performance #realtime
- Real-time performance analysis of production lines: A system-theoretic approach (GC, LZ, JA, SB), pp. 656–661.
- CASE-2012-FeiMAL #automaton #finite #scalability
- A symbolic approach to large-scale discrete event systems modeled as finite automata with variables (ZF, SM, KÅ, BL), pp. 502–507.
- CASE-2012-HansenOMO #energy #generative #industrial
- Enhanced approach for energy-efficient trajectory generation of industrial robots (CH, JÖ, DM, TO), pp. 1–7.
- CASE-2012-HN #multi #network #social
- Influence limitation in multi-campaign social networks: A Shapley value based approach (PRH, YN), pp. 735–740.
- CASE-2012-MatsumotoN #clustering #composition #concurrent #petri net #scheduling #tool support
- Petri net decomposition approach to deadlock-free scheduling for dual-armed cluster tools (IM, TN), pp. 194–199.
- CASE-2012-PehlivanAXC #capacity #multi #network #optimisation
- Multi-period capacity planning for maternity facilities in a perinatal network: A queuing and optimization approach (CP, VA, XX, CCH), pp. 137–142.
- CASE-2012-PrabhuJT #modelling #physics
- Modeling green factory physics — An analytical approach (VVP, HWJ, MT), pp. 46–51.
- CASE-2012-QuangR #implementation
- Implementation of Time Domain Passivity Approach on Rate-Mode bilateral teleoperation (HVQ, JHR), pp. 846–850.
- CASE-2012-SugiyamaNITU #composition #problem
- A bilevel decomposition approach to railway crew rostering problems for fair labor condition (TS, TN, MI, ST, KU), pp. 383–389.
- CASE-2012-SustoSPNB
- An information-theory and Virtual Metrology-based approach to Run-to-Run semiconductor manufacturing control (GAS, AS, SP, GDN, AB), pp. 358–363.
- DAC-2012-KumarGCALT #cyber-physical #hybrid #verification
- A hybrid approach to cyber-physical systems verification (PK, DG, SC, AA, KL, LT), pp. 688–696.
- DATE-2012-BolchiniMS #adaptation #architecture #fault #manycore #online
- An adaptive approach for online fault management in many-core architectures (CB, AM, DS), pp. 1429–1432.
- DATE-2012-FritzBAH #evaluation #monitoring #performance
- Evaluation of a new RFID system performance monitoring approach (GF, VB, OEKA, DH), pp. 1439–1442.
- DATE-2012-KamalASP #architecture #process
- An architecture-level approach for mitigating the impact of process variations on extensible processors (MK, AAK, SS, MP), pp. 467–472.
- DATE-2012-LiuTW #analysis #graph #parallel #statistics
- Parallel statistical analysis of analog circuits by GPU-accelerated graph-based approach (XL, SXDT, HW), pp. 852–857.
- DATE-2012-LuoCH #fault #synthesis
- A cyberphysical synthesis approach for error recovery in digital microfluidic biochips (YL, KC, TYH), pp. 1239–1244.
- DATE-2012-MilbredtGLST #architecture #design
- Designing FlexRay-based automotive architectures: A holistic OEM approach (PM, MG, ML, AS, JT), pp. 276–279.
- DATE-2012-PanagopoulosAR #framework #hybrid #simulation
- A framework for simulating hybrid MTJ/CMOS circuits: Atoms to system approach (GP, CA, KR), pp. 1443–1446.
- DATE-2012-SabryAC #embedded #fault #hybrid
- A hybrid HW-SW approach for intermittent error mitigation in streaming-based embedded systems (MMS, DA, FC), pp. 1110–1113.
- DATE-2012-SuriBE #multi #problem #scalability
- A scalable GPU-based approach to accelerate the multiple-choice knapsack problem (BS, UDB, PE), pp. 1126–1129.
- DATE-2012-TabkhiS #power management
- Application-specific power-efficient approach for reducing register file vulnerability (HT, GS), pp. 574–577.
- DATE-2012-WuLMC #correlation
- Mitigating lifetime underestimation: A system-level approach considering temperature variations and correlations between failure mechanisms (KCW, MCL, DM, SCC), pp. 1269–1274.
- DATE-2012-ZambelliIFCPOB #trade-off
- A cross-layer approach for new reliability-performance trade-offs in MLC NAND flash memories (CZ, MI, MF, SDC, PP, PO, DB), pp. 881–886.
- HPCA-2012-AhnCK #architecture #network #scalability
- Network within a network approach to create a scalable high-radix router microarchitecture (JHA, SC, JK), pp. 455–466.
- PDP-2012-AchourN #clustering #multi #performance #predict
- A Performance Prediction Approach for MPI Routines on Multi-clusters (SA, WN), pp. 125–129.
- PDP-2012-KerteszKMOFM #monitoring
- Integrated Monitoring Approach for Seamless Service Provisioning in Federated Clouds (AK, GK, CAM, MO, XF, JM), pp. 567–574.
- PDP-2012-LahyaniKJ #analysis #monitoring
- QoS Monitoring and Analysis Approach for Publish/Subscribe Systems Deployed on MANET (IL, NK, MJ), pp. 120–124.
- PDP-2012-LuWYX #novel
- A Novel Approach for Single-Packet IP Traceback Based on Routing Path (NL, YW, FY, MX), pp. 253–260.
- PDP-2012-MakassikisVW #fault tolerance #named #parallel #towards
- FT-GReLoSSS: A Skeletal-Based Approach towards Application Parallelization and Low-Overhead Fault Tolerance (CM, SV, XW), pp. 237–244.
- PDP-2012-MoreauxSV #effectiveness
- An Effective Approach for Home Services Management (PM, FS, FV), pp. 47–51.
- PDP-2012-SterponeSR #fault #injection #testing
- A New Fault Injection Approach for Testing Network-on-Chips (LS, DS, MSR), pp. 530–535.
- PDP-2012-WangSYR #hybrid #performance
- A More Efficient Hybrid Approach for Single-Packet IP Traceback (YW, SS, YY, JR), pp. 275–282.
- PPoPP-2012-KwonJEM #clustering #hybrid
- A hybrid approach of OpenMP for clusters (OK, FJ, RE, SPM), pp. 75–84.
- ESOP-2012-DownenA #multi
- A Systematic Approach to Delimited Control with Multiple Prompts (PD, ZMA), pp. 234–253.
- CSL-2012-AltenkirchR
- A Syntactical Approach to Weak ω-Groupoids (TA, OR), pp. 16–30.
- CSL-2012-ChaudhuriHM #calculus
- A Systematic Approach to Canonicity in the Classical Sequent Calculus (KC, SH, DM), pp. 183–197.
- ICLP-2012-0002KZPM #data access #logic programming #rdf
- A Logic Programming approach for Access Control over RDF (NL, SK, AZ, AP, AM), pp. 381–392.
- ICLP-2012-Peano
- An ASP Approach for the Optimal Placement of the Isolation Valves in a Water Distribution System (AP), pp. 464–468.
- ICST-2012-AmraniLSCDVTC #model transformation #verification
- A Tridimensional Approach for Studying the Formal Verification of Model Transformations (MA, LL, GMKS, BC, JD, HV, YLT, JRC), pp. 921–928.
- ICST-2012-BekrarBGM #fuzzing
- A Taint Based Approach for Smart Fuzzing (SB, CB, RG, LM), pp. 818–825.
- ICST-2012-BlancoTS #evaluation #interactive #test coverage #testing
- Test Adequacy Evaluation for the User-database Interaction: A Specification-Based Approach (RB, JT, RVS), pp. 71–80.
- ICST-2012-FilhoB #modelling #testing
- An Integrated Model-Driven Approach for Mechatronic Systems Testing (RSSF, CJB), pp. 447–456.
- ICST-2012-KimKR #distributed #empirical #evaluation #scalability #testing
- A Scalable Distributed Concolic Testing Approach: An Empirical Evaluation (MK, YK, GR), pp. 340–349.
- ICST-2012-MarbackDE #effectiveness #php #testing #web
- An Effective Regression Testing Approach for PHP Web Applications (AM, HD, NE), pp. 221–230.
- ICST-2012-MarcoLA #re-engineering
- Property-Driven Software Engineering Approach (ADM, FL, GDA), pp. 966–967.
- ICST-2012-ParkVH #concurrent #debugging
- A Unified Approach for Localizing Non-deadlock Concurrency Bugs (SP, RWV, MJH), pp. 51–60.
- ICTSS-2012-StrugS #machine learning #mutation testing #testing
- Machine Learning Approach in Mutation Testing (JS, BS), pp. 200–214.
- ISSTA-2012-YuL #data flow #dependence #named #parallel #profiling
- Multi-slicing: a compiler-supported parallel approach to data dependence profiling (HY, ZL), pp. 23–33.
- ISSTA-2012-ZhaiXCT #named #parallel #thread
- CARISMA: a context-sensitive approach to race-condition sample-instance selection for multithreaded applications (KZ, BX, WKC, THT), pp. 221–231.
- SMT-2012-MichelHGH #automation #smt
- An SMT-based approach to automated configuration (RM, AH, VG, PH), pp. 109–119.
- CBSE-2011-PiresDPFM #aspect-oriented #evolution
- Software evolution in AOSD: a MDA-based approach (PFP, FCD, MP, LF, ÉM), pp. 193–198.
- ECSA-2011-AdmodisastroK #analysis #architecture #black box #development
- An Architecture Analysis Approach for Supporting Black-Box Software Development (NA, GK), pp. 180–189.
- ECSA-2011-DeitersR #architecture #composition #design
- A Constructive Approach to Compositional Architecture Design (CD, AR), pp. 75–82.
- ECSA-2011-DwivediEFGS #architecture
- An Architectural Approach to End User Orchestrations (VD, PVE, JMF, DG, BRS), pp. 370–378.
- ECSA-2011-KrichenHZJ #configuration management #modelling #towards
- Towards a Model-Based Approach for Reconfigurable DRE Systems (FK, BH, BZ, MJ), pp. 295–302.
- WICSA-2011-BalasubramaniamSJKMN #architecture #constraints #generative #named #performance #theorem proving
- Dominion: An Architecture-Driven Approach to Generating Efficient Constraint Solvers (DB, LdS, CJ, LK, IM, PN), pp. 228–231.
- WICSA-2011-WeynsMHB #architecture #online #product line
- An Architectural Approach to Support Online Updates of Software Product Lines (DW, BM, AH, NB), pp. 204–213.
- DRR-2011-PengSGS #documentation #using
- Binarization of camera-captured document using A MAP approach (XP, SS, VG, RS), pp. 1–10.
- HT-2011-StewartSN #detection #social #social media
- A transfer approach to detecting disease reporting events in blog social media (AS, MS, WN), pp. 271–280.
- HT-2011-WoenselCT #on the fly
- A generic approach for on-the-fly adding of context-aware features to existing websites (WVW, SC, ODT), pp. 143–152.
- ICDAR-2011-AbidiSK #library #retrieval #towards #word
- Towards Searchable Digital Urdu Libraries — A Word Spotting Based Retrieval Approach (AA, IS, KK), pp. 1344–1348.
- ICDAR-2011-AlaeiNP11a #algorithm #documentation
- A New Text-Line Alignment Approach Based on Piece-Wise Painting Algorithm for Handwritten Documents (AA, PN, UP), pp. 324–328.
- ICDAR-2011-BoumaizaT #novel #recognition #representation #word
- A Novel Approach for Graphics Recognition Based on Galois Lattice and Bag of Words Representation (AB, ST), pp. 829–833.
- ICDAR-2011-HassanGHCG
- Searching OCR’ed Text: An LDA Based Approach (EH, VG, SKMH, SC, MG), pp. 1210–1214.
- ICDAR-2011-KluznerTCW #adaptation #hybrid
- Hybrid Approach to Adaptive OCR for Historical Books (VK, AT, DC, EW), pp. 900–904.
- ICDAR-2011-MalleronE #analysis #documentation
- A Mixed Approach for Handwritten Documents Structural Analysis (VM, VE), pp. 269–273.
- ICDAR-2011-MessaoudAAM
- New Binarization Approach Based on Text Block Extraction (IBM, HA, HEA, VM), pp. 1205–1209.
- ICDAR-2011-NguyenCO #classification
- Bags of Strokes Based Approach for Classification and Indexing of Drop Caps (TTHN, MC, JMO), pp. 349–353.
- ICDAR-2011-ParodiGB #feature model #invariant #verification
- A Circular Grid-Based Rotation Invariant Feature Extraction Approach for Off-line Signature Verification (MP, JCG, AB), pp. 1289–1293.
- ICDAR-2011-Saund #graph #image #maintenance
- A Graph Lattice Approach to Maintaining Dense Collections of Subgraphs as Image Features (ES), pp. 1069–1074.
- ICDAR-2011-ShahabSD #recognition
- Bayesian Approach to Photo Time-Stamp Recognition (AS, FS, AD), pp. 1039–1043.
- ICDAR-2011-UchidaSKF #detection #towards
- A Keypoint-Based Approach toward Scenery Character Detection (SU, YS, YK, YF), pp. 819–823.
- ICDAR-2011-VajdaJF #learning
- A Semi-supervised Ensemble Learning Approach for Character Labeling with Minimal Human Effort (SV, AJ, GAF), pp. 259–263.
- ICDAR-2011-YamazoeEYT #finite #recognition #transducer
- Hypothesis Preservation Approach to Scene Text Recognition with Weighted Finite-State Transducer (TY, ME, TY, KT), pp. 359–363.
- JCDL-2011-BainbridgeTN #library #metadata
- That’s “é” not “þ” “?” or “◓”': a user-driven context-aware approach to erroneous metadata in digital libraries (DB, MBT, DMN), pp. 39–48.
- JCDL-2011-MaullSS #comprehension #library
- Understanding digital library adoption: a use diffusion approach (KEM, MGS, TS), pp. 259–268.
- SIGMOD-2011-BergamaschiDGLV #database #keyword #metadata #relational
- Keyword search over relational databases: a metadata approach (SB, ED, FG, RTL, YV), pp. 565–576.
- SIGMOD-2011-HanLMHY #sequence
- A new approach for processing ranked subsequence matching based on ranked union (WSH, JL, YSM, SwH, HY), pp. 457–468.
- SIGMOD-2011-KonstantinidisA #graph #query #scalability
- Scalable query rewriting: a graph-based approach (GK, JLA), pp. 97–108.
- SIGMOD-2011-PoundPT #mining #web
- Facet discovery for structured web search: a query-log mining approach (JP, SP, PT), pp. 169–180.
- SIGMOD-2011-XuKQWZ #distributed #parallel
- A Hadoop based distributed loading approach to parallel data warehouses (YX, PK, YQ, JW, KKZ), pp. 1091–1100.
- TPDL-2011-AssantePCFL #research #user interface
- An Approach to Virtual Research Environment User Interfaces Dynamic Construction (MA, PP, LC, FDF, LL), pp. 101–109.
- TPDL-2011-FreireBC #independence #recognition
- A Language Independent Approach for Named Entity Recognition in Subject Headings (NF, JLB, PC), pp. 52–61.
- VLDB-2011-BorisovB #declarative #detection #towards
- Proactive Detection and Repair of Data Corruption: Towards a Hassle-free Declarative Approach with Amulet (NB, SB), pp. 1403–1408.
- VLDB-2011-OgasawaraOVDPM #algebra #workflow
- An Algebraic Approach for Data-Centric Scientific Workflows (ESO, DdO, PV, JD, FP, MM), pp. 1328–1339.
- VLDB-2012-GaoJZYJW11 #graph #relational #scalability
- Relational Approach for Shortest Path Discovery over Large Graphs (JG, RJ, JZ, JXY, XJ, TW), pp. 358–369.
- VLDB-2012-GoyalBL11 #data-driven #social
- A Data-Based Approach to Social Influence Maximization (AG, FB, LVSL), pp. 73–84.
- VLDB-2012-KonigDCN11 #estimation #robust #statistics #towards
- A Statistical Approach Towards Robust Progress Estimation (ACK, BD, SC, VRN), pp. 382–393.
- CSEET-2011-Georgas #community #development #education #re-engineering #student
- Software development as service to the student community: An experiential and high student involvement approach to software engineering education (JCG), pp. 434–438.
- ITiCSE-2011-Mahmoud11a #mobile #programming
- A mobile web-based approach to introductory programming (QHM), p. 334.
- ITiCSE-2011-RussellMD #learning #student
- A contextualized project-based approach for improving student engagement and learning in AI courses (IR, ZM, JD), p. 368.
- SIGITE-2011-GorkaMY
- A competency based approach to developing articulation agreements in computing (SG, JRM, DWY), pp. 129–132.
- SIGITE-2011-Prabhakar #java #programming
- Applying pair programming for advanced Java course: a different approach (ABP), pp. 319–320.
- ICPC-2011-BettenburgAHS #lightweight #semistructured data
- A Lightweight Approach to Uncover Technical Artifacts in Unstructured Data (NB, BA, AEH, MS), pp. 185–188.
- ICPC-2011-KeivanlooRC #clone detection #hybrid #named #realtime
- SeClone — A Hybrid Approach to Internet-Scale Real-Time Code Clone Search (IK, JR, PC), pp. 223–224.
- ICPC-2011-SamaraweeraSQ #programming #towards
- Programming from the Reader’s Perspective: Toward an Expectations Approach (GS, MS, JQ), pp. 211–212.
- ICPC-2011-ZibranR #constraints #programming #refactoring #scheduling
- Conflict-Aware Optimal Scheduling of Code Clone Refactoring: A Constraint Programming Approach (MFZ, CKR), pp. 266–269.
- ICSM-2011-CarlsonDD #case study #clustering #industrial #testing
- A clustering approach to improving test case prioritization: An industrial case study (RC, HD, AD), pp. 382–391.
- ICSM-2011-HassaineBGHA #co-evolution
- A seismology-inspired approach to study change propagation (SH, FB, YGG, SH, GA), pp. 53–62.
- ICSM-2011-HuangLZXW #novel #testing
- A novel approach to regression test selection for J2EE applications (SH, ZJL, JZ, YX, WW), pp. 13–22.
- SCAM-2011-AvanciniC #search-based #security #testing #web
- Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities (AA, MC), pp. 85–94.
- SCAM-2011-ZibranR #constraints #programming #refactoring #scheduling
- A Constraint Programming Approach to Conflict-Aware Optimal Scheduling of Prioritized Code Clone Refactoring (MFZ, CKR), pp. 105–114.
- WCRE-2011-HigoUNK #clone detection #detection #incremental
- Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
- WCRE-2011-KhomhCZH #case study #evaluation
- An Entropy Evaluation Approach for Triaging Field Crashes: A Case Study of Mozilla Firefox (FK, BC, YZ, AEH), pp. 261–270.
- DLT-J-2010-BrodaMMR11 #automaton #combinator #complexity #on the
- On the Average State Complexity of Partial derivative Automata: an analytic Combinatorics Approach (SB, AM, NM, RR), pp. 1593–1606.
- CIAA-2011-CastanoC #satisfiability
- Variable and Clause Ordering in an FSA Approach to Propositional Satisfiability (JMC, RC), pp. 76–87.
- CIAA-2011-PajicPP #finite #information management #transducer
- Information Extraction from Semi-structured Resources: A Two-Phase Finite State Transducers Approach (VP, GPL, MP), pp. 282–289.
- DLT-2011-MenibusS #automaton #self
- Self-organization in Cellular Automata: A Particle-Based Approach (BHdM, MS), pp. 251–263.
- ICALP-v2-2011-Cord-LandwehrDFHKKKKMHRSWWW #algorithm #convergence #mobile
- A New Approach for Analyzing Convergence Algorithms for Mobile Robots (ACL, BD, MF, MH, BK, AK, PK, SK, MM, FMadH, CR, KS, DW, CW, DW), pp. 650–661.
- FM-2011-RozierV #encoding #ltl #multi #satisfiability
- A Multi-encoding Approach for LTL Symbolic Satisfiability Checking (KYR, MYV), pp. 417–431.
- SEFM-2011-MadeiraFMB #hybrid #specification
- Hybrid Specification of Reactive Systems: An Institutional Approach (AM, JMF, MAM, LSB), pp. 269–285.
- SEFM-2011-TongSJ #formal method #information management #process
- A Formal Approach to Analysing Knowledge Transfer Processes in Developing Countries (JT, SAS, AEJ), pp. 486–501.
- AIIDE-2011-MohanL #game studies #learning #object-oriented
- An Object-Oriented Approach to Reinforcement Learning in an Action Game (SM, JEL).
- CIG-2011-GalliLCL #detection #framework #machine learning
- A cheating detection framework for Unreal Tournament III: A machine learning approach (LG, DL, LC, PLL), pp. 266–272.
- CIG-2011-TongMS #monte carlo
- A Monte-Carlo approach for the endgame of Ms. Pac-Man (BKBT, CMM, CWS), pp. 9–15.
- CIG-2011-UusitaloJ #using
- A reactive mutli-agent approach to car driving using artificial potential fields (TU, SJJ), pp. 203–210.
- DiGRA-2011-Linderoth11a
- Beyond the digital divide: An ecological approach to gameplay (JL).
- FDG-2011-CheongKGCMIPY #game studies #towards
- A computational approach towards conflict resolution for serious games (YGC, RK, CG, JC0, CM, GI, AP, GNY), pp. 15–22.
- FDG-2011-Maraffi #animation #design #named
- Performatology: an arts approach to designing performative embodied agents (PEAs) for procedural character animation (CTM), pp. 235–237.
- FDG-2011-ShepherdDAZT #education #game studies
- A different approach to teaching Chinese through serious games (JJS, RJD, MA, YZ, JT), pp. 304–306.
- VS-Games-2011-KravtsovFAPC #animation #game studies #hybrid #interactive
- A New Hybrid Approach to the Animation of Complex Character Interactions in Games (DK, OF, VA, AAP, PC), pp. 8–15.
- VS-Games-2011-MathieuPP #learning #multi #named
- Format-Store: A Multi-agent Based Approach to Experiential Learning (PM, DP, SP), pp. 120–127.
- CHI-2011-JayatilakaBSG #visual notation
- Evaluating a pattern-based visual support approach for humanitarian landmine clearance (LGJ, LFB, JS, KZG), pp. 453–462.
- CHI-2011-MadathilG #testing #usability
- Synchronous remote usability testing: a new approach facilitated by virtual worlds (KCM, JSG), pp. 2225–2234.
- CHI-2011-MarshallMRKD #how #interface #multi
- Rethinking “multi-user”: an in-the-wild study of how groups approach a walk-up-and-use tabletop interface (PM, RM, YR, SK, MD), pp. 3033–3042.
- CHI-2011-MatthewsWMY #collaboration #design #tool support
- Collaboration personas: a new approach to designing workplace collaboration tools (TM, SW, TPM, SY), pp. 2247–2256.
- CSCW-2011-AspinR #3d #gpu #multi
- A GPU based, projective multi-texturing approach to reconstructing the 3D human form for application in tele-presence (RAA, DJR), pp. 105–112.
- CSCW-2011-ZhaoLLG #game studies #hybrid #internet #realtime #video
- Back to the future: a hybrid approach to transparent sharing of video games over the internet in real time (SZ, DL, TL, NG), pp. 187–196.
- DHM-2011-WangPBN
- A Biomechanical Approach for Evaluating Motion Related Discomfort : Illustration by an Application to Pedal Clutching Movement (XW, RP, NKB, JN), pp. 210–219.
- DHM-2011-WortelenL #automation #behaviour #estimation
- Less Driving While Driving? An Approach for the Estimation of Effects of Future Vehicle Automation Systems on Driver Behavior (BW, AL), pp. 523–532.
- DUXU-v1-2011-BeccariO #experience #user interface
- A Philosophical Approach about User Experience Methodology (MNB, TLO), pp. 13–22.
- DUXU-v1-2011-ChandersekaranS #enterprise #multi
- A Multi-tiered Approach to Enterprise Support Services (CC, WRS), pp. 388–397.
- DUXU-v1-2011-Hsu11a #design #education #industrial
- Training Designers of Real-World Products: Scenario Approach in Industrial Design Curriculum (YCH), pp. 432–441.
- DUXU-v1-2011-KimPHE #case study #design #experience
- The Essence of Enjoyable Experiences: The Human Needs — A Psychological Needs-Driven Experience Design Approach (JK, SP, MH, KE), pp. 77–83.
- DUXU-v1-2011-Liem #concept #design #development #user interface
- A Culturally Driven Approach for the Development of Innovative User Interface Design Concepts (AL), pp. 84–93.
- DUXU-v2-2011-KomogortsevTMCH #automation #identification #named #usability
- EMA: Automated Eye-Movement-Driven Approach for Identification of Usability Issues (OVK, DET, CJM, JC, CH), pp. 459–468.
- DUXU-v2-2011-Sauter #interface #mobile #towards
- Implied Aesthetics: A Sensor-Based Approach towards Mobile Interfaces (DS), pp. 645–654.
- DUXU-v2-2011-UangLC #axiom #design
- A Product Design Approach by Integrating Axiomatic Design and TRIZ (STU, CLL, MC), pp. 225–233.
- HCD-2011-ChoiS #design #implementation #process
- A Design-Supporting Tool for Implementing the Learning-Based Approach: Accommodating Users’ Domain Knowledge into Design Processes (JMC, KS), pp. 369–378.
- HCD-2011-DaimaruK #design
- A Pattern Approach for Designing Application (KD, BK), pp. 22–27.
- HCD-2011-GoreHHBM #modelling #performance
- A Methodical Approach for Developing Valid Human Performance Models of Flight Deck Operations (BFG, BLH, NH, DLB, EM), pp. 379–388.
- HCI-DDA-2011-PeissnerSS #adaptation #design pattern #user interface
- A Design Patterns Approach to Adaptive User Interfaces for Users with Special Needs (MP, AS, DS), pp. 268–277.
- HCI-ITE-2011-CarrinoTMKI #interface #multimodal
- Head-Computer Interface: A Multimodal Approach to Navigate through Real and Virtual Worlds (FC, JT, EM, OAK, RI), pp. 222–230.
- HCI-MIIE-2011-BlockLT #social #social media
- A Context Centric Approach to Utilize Social Media Services on Public Terminals (MB, JL, ST), pp. 474–482.
- HCI-MIIE-2011-CarrinoMKI #hybrid #interactive #named #towards
- ARAMIS: Toward a Hybrid Approach for Human- Environment Interaction (SC, EM, OAK, RI), pp. 165–174.
- HCI-MIIE-2011-KarthikP #adaptation #classification #email #machine learning
- Adaptive Machine Learning Approach for Emotional Email Classification (KK, RP), pp. 552–558.
- HCI-MIIE-2011-OehlSTHP #detection #human-computer #interactive
- Improving Human-Machine Interaction — A Non Invasive Approach to Detect Emotions in Car Drivers (MO, FWS, TKT, RH, HRP), pp. 577–585.
- HCI-MIIE-2011-RosnerFOLHF #empirical
- Intentionality in Interacting with Companion Systems — An Empirical Approach (DFR, RF, MO, JL, MH, JF), pp. 593–602.
- HCI-UA-2011-HsuC #behaviour #navigation
- Associating Learners’ Cognitive Style with Their Navigation Behaviors: A Data-Mining Approach (YCH, SYC), pp. 27–34.
- HCI-UA-2011-JohnsonLTS #comprehension #monitoring #towards
- Toward an Understanding of a Computerized Monitoring System Failure: An Interpretive Approach (NJ, YL, FT, SS), pp. 336–345.
- HIMI-v1-2011-Pavel11a #composition #design #protocol #security
- An Approach for Security Protocol Design Based on Zero-Knowledge Primitives Composition (OP), pp. 374–378.
- HIMI-v1-2011-PavelJ #authentication #design #logic #protocol
- Routing Functionality in the Logic Approach for Authentication Protocol Design (OP, HJ), pp. 366–373.
- HIMI-v1-2011-PlumbaumSKA #semantics #user interface
- My Personal User Interface: A Semantic User-Centric Approach to Manage and Share User Information (TP, KS, MK, SA), pp. 585–593.
- HIMI-v1-2011-TokosumiT #multi #ontology
- Ontological Approach to Aesthetic Feelings: A Multilingual Case of Cutism (AT, FT), pp. 161–164.
- HIMI-v2-2011-LuC #collaboration #design #information management
- From Personal to Collaborative Information Management: A Design Science’s Approach (ML, PC), pp. 36–45.
- HIMI-v2-2011-Rebello
- Macroergonomics in Air Traffic Control — The Approach of a New System (LHBR), pp. 516–525.
- OCSC-2011-PujariK #machine learning #predict #recommendation
- A Supervised Machine Learning Link Prediction Approach for Tag Recommendation (MP, RK), pp. 336–344.
- VISSOFT-2011-NovaisLCPM #difference #evolution #interactive #visual notation
- An interactive differential and temporal approach to visually analyze software evolution (RLN, CANL, GdFC, RMSP, MGM), pp. 1–4.
- VISSOFT-2011-WirthPS #behaviour #multi #visualisation
- A multi-level approach for visualization and exploration of reactive program behavior (CW, HP, RS), pp. 1–4.
- CAiSE-2011-AwadGTW #process #synthesis
- An Iterative Approach for Business Process Template Synthesis from Compliance Rules (AA, RG, JT, MW), pp. 406–421.
- CAiSE-2011-CaresF #metamodelling
- A Metamodelling Approach for i* Model Translations (CC, XF), pp. 337–351.
- CAiSE-2011-SmirnovRW #abstraction #process #semantics
- A Semantic Approach for Business Process Model Abstraction (SS, HAR, MW), pp. 497–511.
- CAiSE-2011-WeidlichMW #process #variability
- A Foundational Approach for Managing Process Variability (MW, JM, MW), pp. 267–282.
- ICEIS-J-2011-BrasilSFSC11a #multi #optimisation #release planning #requirements
- A Multiobjective Optimization Approach to the Software Release Planning with Undefined Number of Releases and Interdependent Requirements (MMAB, TGNdS, FGdF, JTdS, MIC), pp. 300–314.
- ICEIS-J-2011-Li11f #analysis #case study #machine learning #type system #using
- A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
- ICEIS-J-2011-NovaisCJM11a #difference #evolution #interactive #on the #using #visualisation
- On the Use of Software Visualization to Analyze Software Evolution: An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGM), pp. 241–255.
- ICEIS-J-2011-PhillisK #analysis
- A System-of-Systems Approach to the Analysis and Conservation of Biodiversity (YAP, VSK), pp. 3–15.
- ICEIS-v1-2011-AsghariNAA #enterprise #fuzzy #implementation #resource management #risk management #using
- Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
- ICEIS-v1-2011-Cuzzocrea #information management #mining
- A UML-extended Approach for Mining OLAP Data Cubes in Complex Knowledge Discovery Environments (AC), pp. 281–289.
- ICEIS-v1-2011-LezochePA #concept #information management
- Conceptualisation Approach for Cooperative Information Systems Interoperability (ML, HP, AA), pp. 101–110.
- ICEIS-v2-2011-FronzaSSV #predict #towards
- Toward a Non Invasive Control of Applications — A Biomedical Approach to Failure Prediction (IF, AS, GS, JV), pp. 83–91.
- ICEIS-v2-2011-MarquezCCS #distributed #multi #social
- A Distributed Agency Methodology Applied to Complex Social Systems — A Multi-Dimensional Approach (BYM, MCP, JRC, EDS), pp. 204–209.
- ICEIS-v3-2011-BoudebousBBS #design #distributed #industrial #process
- Design Approach of Distributed Systems for the Control of Industrial Process (DB, JB, SB, NS), pp. 157–164.
- ICEIS-v3-2011-ChakirF #modelling #multi #variability
- A Model Driven Approach Supporting Multi-view Services Modeling and Variability Management (BC, MF), pp. 247–252.
- ICEIS-v3-2011-Garcia-GarciaECA #generative #named #taxonomy
- NDT-Glossary — A MDE Approach for Glossary Generation (JAGG, MJEC, CRC, MA), pp. 170–175.
- ICEIS-v3-2011-HafiddiNBAK #architecture
- A Context-aware Service Centric Approach for Service Oriented Architectures (HH, MN, HB, BEA, AK), pp. 176–183.
- ICEIS-v3-2011-LinLMZN #verification #workflow
- Approach for Verifying Workflow Validity (YL, TL, IM, RZ, RN), pp. 66–75.
- ICEIS-v3-2011-MateoPC #modelling #product line #testing
- Testing in Software Product Lines — A Model based Approach (PRM, MP, DC), pp. 46–54.
- ICEIS-v3-2011-NovaisCJM #difference #evolution #interactive #on the #using #visualisation
- On the Use of Software Visualization to Analyze Software Evolution — An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGdMN), pp. 15–24.
- ICEIS-v4-2011-BenhaddiBA #modelling
- Model-driven Approach for User-centric Mashuped SOA (MB, KB, EHA), pp. 116–123.
- ICEIS-v4-2011-DoumiBB #modelling
- Modeling Approach for Business IT Alignment (KD, SB, KB), pp. 457–464.
- ICEIS-v4-2011-NguyenD #information management #mobile #performance
- An Efficient Cooperative Cache Approach in Mobile Information System (TTMN, TTBD), pp. 153–159.
- ICEIS-v4-2011-XieH #architecture #quality
- An Architectural Approach to Analyze Information Quality for Inter-organizational Service (SX, MH), pp. 438–443.
- ICEIS-v4-2011-XuF #case study #education #game studies #re-engineering #social
- A Case Study: Integrating a Game Application-driven Approach and Social Collaborations into Software Engineering Education (WX, STF), pp. 23–32.
- CIKM-2011-DengZFX #in memory #memory management
- Information re-finding by context: a brain memory inspired approach (TD, LZ, LF, WX), pp. 1553–1558.
- CIKM-2011-FeiJYLH #behaviour #learning #multi #predict #social
- Content based social behavior prediction: a multi-task learning approach (HF, RJ, YY, BL, JH), pp. 995–1000.
- CIKM-2011-KimJHSZ #corpus #graph #mining
- Mining entity translations from comparable corpora: a holistic graph mapping approach (JK, LJ, SwH, YIS, MZ), pp. 1295–1304.
- CIKM-2011-KimQYL #behaviour
- Advertiser-centric approach to understand user click behavior in sponsored search (SK, TQ, HY, TYL), pp. 2121–2124.
- CIKM-2011-Nomoto #documentation #named
- WikiLabel: an encyclopedic approach to labeling documents en masse (TN), pp. 2341–2344.
- CIKM-2011-OroR #learning #named
- SILA: a spatial instance learning approach for deep webpages (EO, MR), pp. 2329–2332.
- CIKM-2011-SellamanickamGS #learning #ranking
- A pairwise ranking based approach to learning with positive and unlabeled examples (SS, PG, SKS), pp. 663–672.
- CIKM-2011-TomasevRMI #classification #nearest neighbour #probability
- A probabilistic approach to nearest-neighbor classification: naive hubness bayesian kNN (NT, MR, DM, MI), pp. 2173–2176.
- CIKM-2011-UysalC #microblog #ranking #twitter
- User oriented tweet ranking: a filtering approach to microblogs (IU, WBC), pp. 2261–2264.
- CIKM-2011-WangWLZZ #analysis #classification #graph #hashtag #sentiment #topic #twitter
- Topic sentiment analysis in twitter: a graph-based hashtag sentiment classification approach (XW, FW, XL, MZ, MZ), pp. 1031–1040.
- CIKM-2011-WangYZ
- A language model approach to capture commercial intent and information relevance for sponsored search (LW, MY, YZ), pp. 599–604.
- CIKM-2011-WeilerMM #ambiguity #library #named #scalability
- Authormagic: an approach to author disambiguation in large-scale digital libraries (HW, KMW, SM), pp. 2293–2296.
- CIKM-2011-YuKL #bidirectional #bottom-up #information management #top-down #towards
- Towards a top-down and bottom-up bidirectional approach to joint information extraction (XY, IK, MRL), pp. 847–856.
- ECIR-2011-AltingovdeOCU #hybrid
- Second Chance: A Hybrid Approach for Dynamic Result Caching in Search Engines (ISA, RO, BBC, ÖU), pp. 510–516.
- ECIR-2011-ChilukaAP #predict #recommendation #scalability
- A Link Prediction Approach to Recommendations in Large-Scale User-Generated Content Systems (NC, NA, JAP), pp. 189–200.
- ECIR-2011-Dulac-ArnoldDG #classification
- Text Classification: A Sequential Reading Approach (GDA, LD, PG), pp. 411–423.
- ECIR-2011-SongDDK #segmentation
- An Iterative Approach to Text Segmentation (FS, WMD, AD, FWK), pp. 629–640.
- ECIR-2011-ZhaoZSH #metric #novel #quantum #ranking
- A Novel Re-ranking Approach Inspired by Quantum Measurement (XZ, PZ, DS, YH), pp. 721–724.
- ICML-2011-DeisenrothR #modelling #named #policy
- PILCO: A Model-Based and Data-Efficient Approach to Policy Search (MPD, CER), pp. 465–472.
- ICML-2011-GermainLLMS #kernel
- A PAC-Bayes Sample-compression Approach to Kernel Methods (PG, AL, FL, MM, SS), pp. 297–304.
- ICML-2011-GlorotBB #adaptation #classification #learning #scalability #sentiment
- Domain Adaptation for Large-Scale Sentiment Classification: A Deep Learning Approach (XG, AB, YB), pp. 513–520.
- ICML-2011-KumarD #clustering #multi
- A Co-training Approach for Multi-view Spectral Clustering (AK, HDI), pp. 393–400.
- ICML-2011-MartinsFASX
- An Augmented Lagrangian Approach to Constrained MAP Inference (AFTM, MATF, PMQA, NAS, EPX), pp. 169–176.
- ICML-2011-MeyerBS #constraints #linear
- Linear Regression under Fixed-Rank Constraints: A Riemannian Approach (GM, SB, RS), pp. 545–552.
- KDD-2011-CotterSK #kernel
- A GPU-tailored approach for training kernelized SVMs (AC, NS, JK), pp. 805–813.
- KDD-2011-GabburPFT #detection
- A pattern discovery approach to retail fraud detection (PG, SP, QF, HT), pp. 307–315.
- KDD-2011-GilpinD #algorithm #clustering #flexibility #performance #satisfiability
- Incorporating SAT solvers into hierarchical clustering algorithms: an efficient and flexible approach (SG, IND), pp. 1136–1144.
- KDD-2011-GuerraVMA #analysis #bias #realtime #sentiment
- From bias to opinion: a transfer-learning approach to real-time sentiment analysis (PHCG, AV, WMJ, VA), pp. 150–158.
- KDD-2011-ZhangHLSL #learning #multi #scalability
- Multi-view transfer learning with a large margin approach (DZ, JH, YL, LS, RDL), pp. 1208–1216.
- KDD-2011-ZhouBS #graph #ranking
- An iterated graph laplacian approach for ranking on manifolds (XZ, MB, NS), pp. 877–885.
- KDIR-2011-BarbieriCMR #clustering #probability
- Characterizing Relationships through Co-clustering — A Probabilistic Approach (NB, GC, GM, ER), pp. 64–73.
- KDIR-2011-CostaRO #classification #transaction #xml
- A Transactional Approach to Associative XML Classification by Content and Structure (GC, RO, ER), pp. 104–113.
- KDIR-2011-DeruyverH #consistency #graph #image #information management #semantics
- Semantic Graphs and Arc Consistency Checking — The Renewal of an Old Approach for Information Extraction from Images (AD, YH), pp. 515–522.
- KDIR-2011-DoquireV #category theory #feature model #hybrid
- An Hybrid Approach to Feature Selection for Mixed Categorical and Continuous Data (GD, MV), pp. 394–401.
- KDIR-2011-Jean-LouisBFD #scalability
- A Weakly Supervised Approach for Large-scale Relation Extraction (LJL, RB, OF, AD), pp. 94–103.
- KDIR-2011-JeongY #proximity #semantics #summary
- An Approach for Combining Semantic Information and Proximity Information for Text Summarization (HJ, YY), pp. 427–432.
- KDIR-2011-MauleKR #automation #using
- Automated Approach for Whole Brain Infarction Core Delineation — Using Non-contrast and Computed Tomography Angiography (PM, JK, VR), pp. 433–437.
- KDIR-2011-OlegA #analysis #clustering
- Methods for Discovering and Analysis of Regularities Systems — Approach based on Optimal Partitioning of Explanatory Variables Space (OVS, AVK), pp. 423–426.
- KDIR-2011-Osuna-OntiverosLS #clustering #documentation #semantics
- A Semantic Clustering Approach for Indexing Documents (DOO, ILA, VSS), pp. 288–293.
- KEOD-2011-AhmedMB #dependence #ontology
- Existential Dependency Driven Approach for Extracting Views from Domain Ontology (SSA, MM, SMB), pp. 413–418.
- KEOD-2011-BouiadjraB #evaluation #ontology #state of the art
- Ontology Evaluation — State of the Art, New Approach and Perspectives (ABB, SMB), pp. 365–368.
- KEOD-2011-HmidaCBN #3d #detection #ontology #semantics
- From 3D Point Clouds to Semantic Objects — An Ontology-based Detection Approach (HBH, CC, FB, CN), pp. 255–260.
- KEOD-2011-IshakLA #learning #modelling #ontology #probability #visual notation
- A Two-way Approach for Probabilistic Graphical Models Structure Learning and Ontology Enrichment (MBI, PL, NBA), pp. 189–194.
- KEOD-2011-KhuratS #ontology #policy #verification
- An Ontological Approach to Verifying P3P Policies (AK, BS), pp. 349–353.
- KEOD-2011-KudryavtsevG #diagrams #modelling #ontology
- Diagrammatic Knowledge Modeling for Managers — Ontology-based Approach (DK, TG), pp. 386–389.
- KEOD-2011-LunesuPC #semantics
- Approach to Manage Semantic Informations from UGC (MIL, FEP, GC), pp. 470–473.
- KMIS-2011-AinsworthM #pervasive
- Breaching the Strongroom — A Pervasive Informatics Approach to Working with Medieval Manuscripts (PFA, MM), pp. 264–271.
- KMIS-2011-AnthopoulosGF
- Supporting the Solution Selection for a Digital City with a Fuzzy-based Approach (LGA, VCG, PF), pp. 355–358.
- KMIS-2011-CachiaM #modelling #re-engineering
- An Event-driven Cartographic Approach to Modelling Software Engineering Knowledge (EC, MM), pp. 18–27.
- KMIS-2011-GesquiereMN #multi #semantics
- Interoperability between GIS and BIM — A Semantic-based Multi-representation Approach (GG, CM, CN), pp. 359–362.
- KMIS-2011-GoncalvesP #challenge #process #towards
- Business Processes and Organisations — Challenges and Opportunities Towards a People-centric Approach (NPG, JASP), pp. 418–423.
- KMIS-2011-LunesuPC11a #knowledge base #multi #standard #using
- Using a Standards-based Approach for a Multimedia Knowledge-base (MIL, FEP, GC), pp. 87–95.
- KMIS-2011-SchwinnKR #editing #information management #ontology #query #visual notation
- An Approach to a Graphical Query Editor — For Ontology-based Knowledge Management (MS, NK, SR), pp. 436–441.
- KMIS-2011-Silva #concept #learning
- Learning Organization — Concept and Proposal of a New Approach (AFdS), pp. 384–389.
- KMIS-2011-WeberL #assessment #quality #social
- A User Centered Approach for Quality Assessment in Social Systems (NW, SNL), pp. 211–216.
- MLDM-2011-Bouguessa #clustering #transaction
- A Practical Approach for Clustering Transaction Data (MB), pp. 265–279.
- MLDM-2011-SimeonH #correlation #difference #mining #named #set
- GENCCS: A Correlated Group Difference Approach to Contrast Set Mining (MS, RJH), pp. 140–154.
- RecSys-2011-AnandG #problem
- A market-based approach to address the new item problem (SSA, NG), pp. 205–212.
- RecSys-2011-BarbieriCMO #modelling #recommendation
- Modeling item selection and relevance for accurate recommendations: a bayesian approach (NB, GC, GM, RO), pp. 21–28.
- SEKE-2011-AllisonAYC #re-engineering
- A Software Engineering Approach to User-Driven Control of the Microgrid (MA, AAA, ZY, PJC), pp. 59–64.
- SEKE-2011-AndradeDBW #communication #documentation #retrieval #using
- An approach for retrieval and knowledge communication using medical documents (RA, MARD, FCB, AvW), pp. 169–174.
- SEKE-2011-BagheriS #architecture #formal method
- A Formal Approach for Incorporating Architectural Tactics into the Software Architecture (HB, KJS), pp. 770–775.
- SEKE-2011-CaiZWXS #component #recommendation
- Recommending Component by Citation: A Semi-supervised Approach for Determination (SC, YZ, LW, BX, WS), pp. 489–494.
- SEKE-2011-CassellAG #clustering #refactoring
- A Dual Clustering Approach to the Extract Class Refactoring (KC, PA, LG), pp. 77–82.
- SEKE-2011-CatalA #development #enterprise #estimation
- A Composite Project Effort Estimation Approach in an Enterprise Software Development Project (CC, MSA), pp. 331–334.
- SEKE-2011-FreireAKAC #automation #deployment #modelling #monitoring #process
- Automatic Deployment and Monitoring of Software Processes: A Model-Driven Approach (MAF, FAA, UK, EA, RC), pp. 42–47.
- SEKE-2011-KimLZKLS #configuration management #modelling #privacy
- A Feature-Based Modeling Approach to Configuring Privacy and Temporality in RBAC (SK, YTL, YZ, DKK, LL, VS), pp. 666–671.
- SEKE-2011-Krishna #non-functional #process #requirements #uml
- A Process Oriented Approach to Model Non-Functional Requirements Proposition Extending UML (AK), pp. 736–739.
- SEKE-2011-ParkK #automation #formal method #lightweight
- Applying Lightweight Formal Approach to Automatic Configuration Inspection (SP, GK), pp. 107–110.
- SEKE-2011-ReformatP #evaluation #feature model
- Criteria of Human Software Evaluation: Feature Selection Approach (MR, SP), pp. 71–76.
- SEKE-2011-ScatalonGC #delivery #ontology #using
- Packaging Controlled Experiments Using an Evolutionary Approach Based on Ontology(S) (LPS, REG, RCMC), pp. 408–413.
- SEKE-2011-SeriaiC #architecture #object-oriented #search-based
- A Genetic Approach for Software Architecture Recovery from Object-Oriented Code (ADS, SC), pp. 515–520.
- SEKE-2011-TaoLG #component #modelling #testing
- A Model-based Approach to Regression Testing of Component-based Software (CT, BL, JG), pp. 230–237.
- SEKE-2011-ZaatarHH #identification #implementation #product line
- An Approach for Identifying and Implementing Aspectual Features inSoftware Product Lines (MAZ, HSH, AEFH), pp. 722–728.
- SIGIR-2011-KimKWHK #classification #mining
- Authorship classification: a discriminative syntactic tree mining approach (SK, HK, TW, JH, HDK), pp. 455–464.
- SIGIR-2011-LinLJY #machine learning #query #social
- Social annotation in query expansion: a machine learning approach (YL, HL, SJ, ZY), pp. 405–414.
- SIGIR-2011-LvZC #feedback #pseudo
- A boosting approach to improving pseudo-relevance feedback (YL, CZ, WC), pp. 165–174.
- SIGIR-2011-MinackSN #incremental #scalability #set
- Incremental diversification for very large sets: a streaming-based approach (EM, WS, WN), pp. 585–594.
- SIGIR-2011-WengLCZZYZ #documentation #query #retrieval
- Query by document via a decomposition-based two-level retrieval approach (LW, ZL, RC, YZ, YZ, LTY, LZ), pp. 505–514.
- SIGIR-2011-ZhangMLM #how #information retrieval #ranking
- How to count thumb-ups and thumb-downs?: an information retrieval approach to user-rating based ranking of items (DZ, RM, HL, JM), pp. 1223–1224.
- BX-2011-Hainaut #data-driven #evolution
- The transformational approach to data-intensive system engineering and evolution (JLH), p. 51.
- ECMFA-2011-DouxABCFL #eclipse #framework #platform #problem
- An MDE-Based Approach for Solving Configuration Problems: An Application to the Eclipse Platform (GD, PA, GB, JC, MDDF, SUJL), pp. 160–171.
- ECMFA-2011-GessenharterR #code generation #development #diagrams #modelling #process #towards #uml
- Code Generation for UML 2 Activity Diagrams — Towards a Comprehensive Model-Driven Development Approach (DG, MR), pp. 205–220.
- ICMT-2011-SunGWGW #editing
- A Demonstration-based Approach to Support Live Transformations in a Model Editor (YS, JG, CW, MG, JW), pp. 213–227.
- MoDELS-2011-Espinazo-PaganCM #modelling #named #scalability
- Morsa: A Scalable Approach for Persisting and Accessing Large Models (JEP, JSC, JGM), pp. 77–92.
- MoDELS-2011-IzukuraYOSKX #development #modelling #using
- Applying a Model-Based Approach to IT Systems Development Using SysML Extension (SI, KY, TO, HS, DK, JX), pp. 563–577.
- MoDELS-2011-KulkarniBR #agile #experience #modelling
- Early Experience with Agile Methodology in a Model-Driven Approach (VK, SB, UR), pp. 578–590.
- MoDELS-2011-LindH #automation #component #embedded #estimation #modelling
- A Model-Based and Automated Approach to Size Estimation of Embedded Software Components (KL, RH), pp. 334–348.
- PLEASE-2011-SunCGW #feature model #using
- Supporting feature model configuration using a demonstration-based approach (YS, HC, JGG, JW), pp. 55–59.
- SPLC-2011-DaoLK #problem #product line #quality
- Problem Frames-Based Approach to Achieving Quality Attributes in Software Product Line Engineering (TMD, HL, KCK), pp. 175–180.
- SPLC-2011-GhezziS #model checking #non-functional #parametricity #performance #product line #towards #using #verification
- Verifying Non-functional Properties of Software Product Lines: Towards an Efficient Approach Using Parametric Model Checking (CG, AMS), pp. 170–174.
- ECOOP-2011-Igarashi
- A Featherweight Approach to FOOL (AI), p. 433.
- TOOLS-EUROPE-2011-HeideggerT #heuristic
- A Heuristic Approach for Computing Effects (PH, PT), pp. 147–162.
- AdaEurope-2011-CarnevaliLPV #design #formal method #scheduling #verification
- A Formal Approach to Design and Verification of Two-Level Hierarchical Scheduling Systems (LC, GL, AP, EV), pp. 118–131.
- PEPM-2011-Consel #development #named
- DiaSuite: a paradigm-oriented software development approach (CC), pp. 77–78.
- RE-2011-VoglLGE #architecture #requirements
- Reconciling requirements and architectures with the CBSP approach in an iPhone app project (HV, KL, PG, AE), pp. 273–278.
- REFSQ-2011-El-SharkawyS #empirical #heuristic #requirements
- A Heuristic Approach for Supporting Product Innovation in Requirements Engineering: A Controlled Experiment (SES, KS), pp. 78–93.
- ASE-2011-ChakrabortyS #framework #towards
- Towards an approach and framework for test-execution plan derivation (SSC, VS), pp. 488–491.
- ASE-2011-ChenHX #evaluation #machine learning #process
- Software process evaluation: A machine learning approach (NC, SCHH, XX), pp. 333–342.
- ASE-2011-FilieriGLM #adaptation #reliability #requirements #self
- Self-adaptive software meets control theory: A preliminary approach supporting reliability requirements (AF, CG, AL, MM), pp. 283–292.
- ASE-2011-GethersKDP #adaptation #impact analysis #source code
- An adaptive approach to impact analysis from change requests to source code (MG, HHK, BD, DP), pp. 540–543.
- ASE-2011-KehrerKT #difference #rule-based #semantics #version control
- A rule-based approach to the semantic lifting of model differences in the context of model versioning (TK, UK, GT), pp. 163–172.
- ASE-2011-NguyenNANN #debugging #topic
- A topic-based approach for narrowing the search space of buggy files from a bug report (ATN, TTN, JMAK, HVN, TNN), pp. 263–272.
- ESEC-FSE-2011-Bodden #monitoring #runtime
- Stateful breakpoints: a practical approach to defining parameterized runtime monitors (EB), pp. 492–495.
- ESEC-FSE-2011-Durdik #architecture #elicitation #requirements
- An architecture-centric approach for goal-driven requirements elicitation (ZD), pp. 384–387.
- ESEC-FSE-2011-TamrawiNAN #debugging #fuzzy #set
- Fuzzy set and cache-based approach for bug triaging (AT, TTN, JMAK, TNN), pp. 365–375.
- ICSE-2011-Bagheri #architecture #formal method #platform #synthesis
- A formal approach to software synthesis for architectural platforms (HB), pp. 1143–1145.
- ICSE-2011-ChenHG #automation #traceability
- A combination approach for enhancing automated traceability (XC, JGH, JCG), pp. 912–915.
- ICSE-2011-Mirakhorli #architecture #requirements
- Tracing architecturally significant requirements: a decision-centric approach (MM), pp. 1126–1127.
- ICSE-2011-Pinto #composition #declarative #flexibility
- A declarative approach to enable flexible and dynamic service compositions (LSP), pp. 1130–1131.
- ICSE-2011-RosuS #logic #verification
- Matching logic: a new program verification approach (GR, AS), pp. 868–871.
- ICSE-2011-Sun #aspect-oriented #modelling
- An end-user demonstration approach to support aspect-oriented modeling (YS), pp. 1176–1178.
- ICSE-2011-SunGW #evolution #named
- MT-Scribe: an end-user approach to automate software model evolution (YS, JG, JW), pp. 980–982.
- SAC-2011-BarreraV #automation #summary
- Automated extractive single-document summarization: beating the baselines with a new approach (AB, RV), pp. 268–269.
- SAC-2011-BenouaretBH #composition #fuzzy
- Top-k service compositions: a fuzzy set-based approach (KB, DB, AH), pp. 1033–1038.
- SAC-2011-BiancoGH #manycore #parallel #performance
- A fast approach for parallel deduplication on multicore processors (GDB, RdMG, CAH), pp. 1027–1032.
- SAC-2011-BouidghaghenTB #mobile #reasoning
- Inferring situation-based interests for mobile users: a case based reasoning approach (OB, LT, MB), pp. 1166–1167.
- SAC-2011-ChangH #model transformation #multi #using #verification
- A model transformation approach for verifying multi-agent systems using SPIN (LC, XH), pp. 37–42.
- SAC-2011-ChenZGZWSC #interactive #reduction #requirements #testing
- A test suite reduction approach based on pairwise interaction of requirements (XC, LZ, QG, HZ, ZW, XS, DC), pp. 1390–1397.
- SAC-2011-ChuHLCHC #development #manycore #verification
- A pattern-based verification approach for a multi-core system development (PHC, NLH, CCL, MJC, PAH, WCC), pp. 49–53.
- SAC-2011-DattoloEM #semantics
- An integrated approach to discover tag semantics (AD, DE, LM), pp. 814–820.
- SAC-2011-HauptPH #programming language #type system
- Type harvesting: a practical approach to obtaining typing information in dynamic programming languages (MH, MP, RH), pp. 1282–1289.
- SAC-2011-LiOZ #collaboration #modelling #process
- An integrated approach for modeling and facilitating RFID-based collaborative logistics processes (YL, AO, HZ), pp. 301–307.
- SAC-2011-LuKNB #analysis #embedded #realtime #simulation #statistics #validation
- A statistical approach to simulation model validation in response-time analysis of complex real-time embedded systems (YL, JK, TN, IB), pp. 711–716.
- SAC-2011-Mammar #c #detection #overview
- An overview of a proof-based approach to detecting C vulnerabilities (AM), pp. 1343–1344.
- SAC-2011-MammarFD #reachability #verification
- A proof-based approach to verifying reachability properties (AM, MF, FD), pp. 1651–1657.
- SAC-2011-MichauxBSS #collaboration #semantics
- A semantically rich approach for collaborative model edition (JM, XB, MS, PS), pp. 1470–1475.
- SAC-2011-MitraZA #experience #metric #pervasive #probability #quality
- A probabilistic context-aware approach for quality of experience measurement in pervasive systems (KM, ABZ, CÅ), pp. 419–424.
- SAC-2011-MohammadiG #representation
- Integrated PSO and line based representation approach for SLAM (MRM, SSG), pp. 1382–1388.
- SAC-2011-RodriguezSV #composition #execution #multi
- Executable model composition: a multilevel approach (CR, MES, JV), pp. 877–884.
- SAC-2011-SantosaMK #named #programming #search-based
- HMXT-GP: an information-theoretic approach to genetic programming that maintains diversity (HS, JM, PJK), pp. 1070–1075.
- SAC-2011-SchryenVRH #distributed #formal method #towards #trust
- A formal approach towards measuring trust in distributed systems (GS, MV, SR, SMH), pp. 1739–1745.
- SAC-2011-SebastianC #design #re-engineering #towards #using
- Towards designing a tool for event reconstruction using Gladyshev Approach (MS, PC), pp. 193–194.
- SAC-2011-SimKM #adaptation #embedded #fuzzing #linux #random
- Fuzzing the out-of-memory killer on embedded Linux: an adaptive random approach (KYS, FCK, RGM), pp. 387–392.
- SAC-2011-Thierry #constraints #geometry
- A particle-spring approach to geometric constraints solving (SEBT), pp. 1100–1105.
- SAC-2011-VandicDHF #clustering #semantics
- A semantic clustering-based approach for searching and browsing tag spaces (DV, JWvD, FH, FF), pp. 1693–1699.
- SAC-2011-YeHL #network #query
- A Bayesian network approach to context sensitive query expansion (ZY, XH, HL), pp. 1138–1142.
- SAC-2011-ZellerWEK #adaptation #distributed #embedded #self
- An approach for providing dependable self-adaptation in distributed embedded systems (MZ, GW, DE, RK), pp. 236–237.
- SAC-2011-ZhaoGFC #predict #smarttech
- A system context-aware approach for battery lifetime prediction in smart phones (XZ, YG, QF, XC), pp. 641–646.
- SAC-2011-ZhouZJY #evolution #framework #in the cloud #platform
- An approach of creative application evolution on cloud computing platform (JZ, SZ, DJ, HY), pp. 54–58.
- SLE-2011-TombelleVR #modelling #reuse
- Reusing Pattern Solutions in Modeling: A Generic Approach Based on a Role Language (CT, GV, ER), pp. 139–159.
- ASPLOS-2011-SchupbachBRP #declarative
- A declarative language approach to device configuration (AS, AB, TR, SP), pp. 119–132.
- CASE-2011-CostantinoDFFMSU #design #fuzzy #network #programming
- A fuzzy programming approach for the strategic design of distribution networks (NC, MD, MF, MPF, AMM, FS, WU), pp. 66–71.
- CASE-2011-MalkiM #modelling
- Boolean temporal model-based approach for the diagnosis of Discrete Event Systems (NM, MSM), pp. 175–180.
- CASE-2011-MikosFG #agile #distributed #injection #process #reasoning
- A distributed system for rapid determination of nonconformance causes and solutions for the thermoplastic injection molding process: A Case-Based Reasoning Agents approach (WLM, JCEF, FGCG), pp. 755–760.
- CASE-2011-MovafaghpourM #linear #probability #programming
- A linear programming approach for probabilistic robot path planning with missing information of outcomes (MAM, EM), pp. 126–132.
- CASE-2011-NaibR #automation #constraints
- A P2P approach for automating seamless connectivity given intermittent bandwidth constraints (VVBN, SR), pp. 637–641.
- CASE-2011-NishiYI #generative #problem #scheduling
- Column generation approach to ship scheduling problems for international crude oil transportation (TN, SY, TI), pp. 468–473.
- CASE-2011-SharviaP #assessment #named #safety #towards
- IACoB-SA: An approach towards integrated safety assessment (SS, YP), pp. 220–225.
- CASE-2011-TalpasanuK #analysis
- Exoskeleton systems kinematics analysis with graph-matroid approach (IT, SK), pp. 822–827.
- CASE-2011-Tanaka #problem #scheduling
- A unified approach for the scheduling problem with rejection (ST), pp. 369–374.
- CASE-2011-Vogel-HeuserS #automation #modelling #usability
- A methodological approach to evaluate the benefit and usability of different modeling notations for open loop control in automation systems (BVH, KS), pp. 474–481.
- CASE-2011-WengerMHHZ #development
- Utilizing IEC 61499 in an MDA control application development approach (MW, MMM, IH, RH, AZ), pp. 495–500.
- CASE-2011-YonezawaKZIHSIYF #experience #performance
- Long-term operational experience with a robot cell production system controlled by low carbon-footprint Senju (thousand-handed) Kannon Model robots and an approach to improving operating efficiency (HY, HK, MZ, KI, NH, YS, MY, TF), pp. 291–298.
- CC-2011-GreweO #clustering #using
- A Static Task Partitioning Approach for Heterogeneous Systems Using OpenCL (DG, MFPO), pp. 286–305.
- DAC-2011-ChangS
- Plugging versus logging: a new approach to write buffer management for solid-state disks (LPC, YCS), pp. 23–28.
- DAC-2011-KadryMGAK #challenge #design #effectiveness #verification
- Facing the challenge of new design features: an effective verification approach (WK, RM, AG, EA, CAK), pp. 842–847.
- DAC-2011-OnaissiTLN #analysis #performance
- A fast approach for static timing analysis covering all PVT corners (SO, FT, JL, FNN), pp. 777–782.
- DATE-2011-FuWT #manycore #performance #simulation
- A shared-variable-based synchronization approach to efficient cache coherence simulation for multi-core systems (CYF, MHW, RST), pp. 347–352.
- DATE-2011-GraupnerJW #design #generative #layout #optimisation
- Generator based approach for analog circuit and layout design and optimization (AG, RJ, RW), pp. 1675–1680.
- DATE-2011-KlobedanzK0 #configuration management #fault tolerance #network
- A reconfiguration approach for fault-tolerant FlexRay networks (KK, AK, WM), pp. 82–87.
- DATE-2011-RemondNBM #design #empirical #process #simulation
- Mathematical approach based on a “Design of Experiment” to simulate process variations (ER, EN, CB, RM), pp. 1486–1490.
- DATE-2011-RinaudoGCMP #design #energy #performance #power management
- Moving to Green ICT: From stand-alone power-aware IC design to an integrated approach to energy efficient design for heterogeneous electronic systems (SR, GG, AC, AM, MP), pp. 1127–1128.
- DATE-2011-WangLH #embedded
- An approach to improve accuracy of source-level TLMs of embedded software (ZW, KL, AH), pp. 216–221.
- DATE-2011-WangWT #modelling #named #performance #scheduling #simulation
- DOM: A Data-dependency-Oriented Modeling approach for efficient simulation of OS preemptive scheduling (PCW, MHW, RST), pp. 335–340.
- DATE-2011-WelpK #markov #process #synthesis
- An approach for dynamic selection of synthesis transformations based on Markov Decision Processes (TW, AK), pp. 1533–1536.
- LCTES-2011-SahaLM #kernel #linux
- An approach to improving the structure of error-handling code in the linux kernel (SS, JLL, GM), pp. 41–50.
- PDP-2011-AliKGP #communication #fault tolerance #modelling #programming #scalability
- A Redundant Communication Approach to Scalable Fault Tolerance in PGAS Programming Models (NA, SK, NG, BJP), pp. 24–31.
- PDP-2011-BarlasHJ #case study #cpu #design #encryption #gpu #parallel
- An Analytical Approach to the Design of Parallel Block Cipher Encryption/Decryption: A CPU/GPU Case Study (GDB, AH, YAJ), pp. 247–251.
- PDP-2011-EjarqueMSPKB #scheduling #semantics
- Job Scheduling with License Reservation: A Semantic Approach (JE, AM, RS, PP, LK, RMB), pp. 47–54.
- PPoPP-2011-ChafiSBLAO #parallel
- A domain-specific approach to heterogeneous parallelism (HC, AKS, KJB, HL, ARA, KO), pp. 35–46.
- FASE-2011-GattiBC #development
- A Step-Wise Approach for Integrating QoS throughout Software Development (SG, EB, CC), pp. 217–231.
- FoSSaCS-2011-BertrandSJK #automaton #game studies
- A Game Approach to Determinize Timed Automata (NB, AS, TJ, MK), pp. 245–259.
- STOC-2011-MahdianY #online #random
- Online bipartite matching with random arrivals: an approach based on strongly factor-revealing LPs (MM, QY), pp. 597–606.
- CSL-2011-Czajka #combinator #logic #semantics
- A Semantic Approach to Illative Combinatory Logic (LC0), pp. 174–188.
- ICLP-2011-AlrajehKRU #induction #refinement
- An Inductive Approach for Modal Transition System Refinement (DA, JK, AR, SU), pp. 106–116.
- ICLP-J-2011-LierlerT #generative
- Transition systems for model generators — A unifying approach (YL, MT), pp. 629–646.
- ICST-2011-GoKKL #generative #testing #variability
- A Systematic Test Case Generation Approach for Testing Message Length Variability (KG, SK, MK, JL), pp. 397–406.
- ICST-2011-RomanoPA #exception #null #pointer #testing
- An Approach for Search Based Testing of Null Pointer Exceptions (DR, MDP, GA), pp. 160–169.
- SAT-2011-SpeckenmeyerWP #graph #satisfiability
- A Satisfiability-Based Approach for Embedding Generalized Tanglegrams on Level Graphs (ES, AW, SP), pp. 134–144.
- TAP-2011-HeamM #automaton #random testing #testing #using
- A Random Testing Approach Using Pushdown Automata (PCH, CM), pp. 119–133.
- CBSE-2010-LoiretSDS #composition #embedded #realtime
- A Three-Tier Approach for Composition of Real-Time Embedded Software Stacks (FL, LS, LD, DS), pp. 37–54.
- ECSA-2010-AltiBR #modelling #pervasive #quality
- Context-Aware Quality Model Driven Approach: A New Approach for Quality Control in Pervasive Computing Environments (AA, AB, PR), pp. 441–448.
- ECSA-2010-Hock-koonO
- Many to Many Service Discovery: A First Approach (AAHk, MO), pp. 449–456.
- ECSA-2010-KacemKD #adaptation #consistency #formal method #self
- A Formal Approach to Enforcing Consistency in Self-adaptive Systems (NHK, AHK, KD), pp. 279–294.
- ECSA-2010-PhoomvuthisarnLZ #architecture #distributed
- An Architectural Approach to Composing Reputation-Based Distributed Services (SP, YL, LZ), pp. 133–149.
- QoSA-2010-MartensAKMR #component #hybrid #multi #optimisation
- A Hybrid Approach for Multi-attribute QoS Optimisation in Component Based Software Systems (AM, DA, HK, RM, RHR), pp. 84–101.
- QoSA-2010-Wirsing #adaptation #component #pervasive
- A Component-Based Approach to Adaptive User-Centric Pervasive Applications (MW), p. 2.
- DocEng-2010-FagaMCTP #authoring #social
- A social approach to authoring media annotations (RFJ, VGM, RGC, CACT, MdGCP), pp. 17–26.
- DocEng-2010-LecarpentierBC #documentation #framework #internet #multi
- Multilingual composite document management framework for the internet: an FRBR approach (JML, CB, HLC), pp. 13–16.
- DRR-2010-CheikhKB #recognition #word
- A neural-linguistic approach for the recognition of a wide Arabic word lexicon (IBC, AK, AB), pp. 1–10.
- DRR-2010-KnoblockCCGMS
- A general approach to discovering, registering, and extracting features from raster maps (CAK, CCC, YYC, AG, MM, CS), pp. 1–10.
- DRR-2010-OuwayedBA #estimation
- General text line extraction approach based on locally orientation estimation (NO, AB, FA), pp. 1–10.
- DRR-2010-SankarasubramaniamNVK #detection #documentation
- Detecting modifications in paper documents: a coding approach (YS, BN, KV, AK), pp. 1–10.
- ECDL-2010-BatjargalKM #database #retrieval
- Approach to Cross-Language Retrieval for Japanese Traditional Fine Art: Ukiyo-e Database (BB, FK, AM), pp. 518–521.
- ECDL-2010-BernardBFKKRSS #library #visual notation
- A Visual Digital Library Approach for Time-Oriented Scientific Primary Data (JB, JB, DWF, OK, JK, TR, TS, IS), pp. 352–363.
- ECDL-2010-BerndtBCDDFFKKSa #documentation #lessons learnt #library
- The PROBADO Project — Approach and Lessons Learned in Building a Digital Library System for Heterogeneous Non-textual Documents (RB, IB, MC, DD, JD, DWF, CF, RK, FK, MS), pp. 376–383.
- ECDL-2010-GennaroABS #image #library #retrieval
- An Approach to Content-Based Image Retrieval Based on the Lucene Search Engine Library (CG, GA, PB, PS), pp. 55–66.
- ECDL-2010-JacquinDC #documentation #modelling #process #towards
- Xeproc(c): A Model-Based Approach towards Document Process Preservation (TJ, HD, JPC), pp. 538–541.
- ECDL-2010-ZhangK #evaluation
- A Search Log-Based Approach to Evaluation (JZ, JK), pp. 248–260.
- HT-2010-GippB #detection #identification #independence
- Citation based plagiarism detection: a new approach to identify plagiarized work language independently (BG, JB), pp. 273–274.
- HT-2010-HallerA #information management #named #semantics #user interface
- iMapping: a zooming user interface approach for personal and semantic knowledge management (HH, AA), pp. 119–128.
- HT-2010-HargoodMW #generative
- A semiotic approach for the generation of themed photo narratives (CH, DEM, MJW), pp. 19–28.
- HT-2010-HsiaoBYO #adaptation #case study
- The value of adaptive link annotation in e-learning: a study of a portal-based approach (IHH, PB, MY, AO), pp. 223–228.
- HT-2010-LeivaV #clustering #documentation #interactive #web
- Assessing users’ interactions for clustering web documents: a pragmatic approach (LAL, EV), pp. 277–278.
- HT-2010-WolffMZ #feedback #hypermedia #summary #visual notation
- Visual summaries of data: a spatial hypertext approach to user feedback (AW, PM, ZZ), pp. 287–288.
- HT-2010-ZhangQHJWHHJ #collaboration #hybrid #identification #web
- Collaborative identification and annotation of government deep web resources: a hybrid approach (PZ, YQ, CH, PTJ, JW, WSH, JEH, XJ), pp. 285–286.
- JCDL-2010-YeZWDWZ #hybrid
- In-depth utilization of Chinese ancient maps: a hybrid approach to digitizing map resources in CADAL (ZY, LZ, JW, CD, BW, YZ), pp. 263–272.
- SIGMOD-2010-HanSYY #analysis #database #mining #network
- Mining knowledge from databases: an information network analysis approach (JH, YS, XY, PSY), pp. 1251–1252.
- SIGMOD-2010-KimWS #independence #memory management #performance
- Page-differential logging: an efficient and DBMS-independent approach for storing data into flash memory (YRK, KYW, IYS), pp. 363–374.
- SIGMOD-2010-LiuBCDNA #adaptation #documentation #named
- Pay-as-you-go: an adaptive approach to provide full context-aware text search over document content (ZHL, TB, SC, JD, AN, VA), pp. 1025–1036.
- SIGMOD-2010-MayfieldNP #database #named #statistics
- ERACER: a database approach for statistical inference and data cleaning (CM, JN, SP), pp. 75–86.
- SIGMOD-2010-SternBB #network #query
- Processing continuous join queries in sensor networks: a filtering approach (MS, KB, EB), pp. 267–278.
- SIGMOD-2010-WangWLW #algorithm #summary
- An algorithmic approach to event summarization (PW, HW, ML, WW), pp. 183–194.
- SIGMOD-2010-ZhaoDTT #elicitation #order
- Call to order: a hierarchical browsing approach to eliciting users’ preference (FZ, GD, KLT, AKHT), pp. 27–38.
- VLDB-2010-AraiDGHK #cost analysis #multi #retrieval
- An Access Cost-Aware Approach for Object Retrieval over Multiple Sources (BA, GD, DG, VH, NK), pp. 1125–1136.
- VLDB-2010-CurinoZJM #clustering #database #named #replication
- Schism: a Workload-Driven Approach to Database Replication and Partitioning (CC, YZ, EPCJ, SM), pp. 48–57.
- VLDB-2010-JohnsonPSAA #named #scalability
- Aether: A Scalable Approach to Logging (RJ, IP, RS, MA, AA), pp. 681–692.
- VLDB-2010-McConnellPH #named #performance #reliability #replication
- iFlow: An Approach for Fast and Reliable Internet-Scale Stream Processing Utilizing Detouring and Replication (CM, FP, JHH), pp. 1557–1560.
- VLDB-2010-SpezzanoG #constraints #termination
- Chase Termination: A Constraints Rewriting Approach (FS, SG), pp. 93–104.
- VLDB-2011-TodaCSM10 #automation #interface #probability #web
- A Probabilistic Approach for Automatically Filling Form-Based Web Interfaces (GAT, EC, ASdS, ESdM), pp. 151–160.
- EDM-2010-ArroyoMW #empirical
- Effort-based Tutoring: An Empirical Approach to Intelligent Tutoring (IA, HM, BPW), pp. 1–10.
- EDM-2010-ChampaignC
- An Annotations Approach to Peer Tutoring (JC, RC), pp. 231–240.
- EDM-2010-ChampaignC10a #learning
- A Distillation Approach to Refining Learning Objects (JC, RC), pp. 283–284.
- EDM-2010-KoedingerS #data-driven #modelling
- A Data Driven Approach to the Discovery of Better Cognitive Models (KRK, JCS), pp. 325–326.
- EDM-2010-RaiB #analysis #case study #education #modelling
- Analysis of a causal modeling approach: a case study with an educational intervention (DR, JEB), pp. 313–314.
- ITiCSE-2010-ForsterJ #education #network
- Hands-on approach to teaching wireless sensor networks at the undergraduate level (AF, MJ), pp. 284–288.
- CSMR-2010-AsadiPAG #concept #execution #heuristic #identification
- A Heuristic-Based Approach to Identify Concepts in Execution Traces (FA, MDP, GA, YGG), pp. 31–40.
- CSMR-2010-CorazzaMS #clustering #probability #towards
- A Probabilistic Based Approach towards Software System Clustering (AC, SDM, GS), pp. 88–96.
- CSMR-2010-OlivetoKAG
- Numerical Signatures of Antipatterns: An Approach Based on B-Splines (RO, FK, GA, YGG), pp. 248–251.
- ICSM-2010-Al-KofahiTNNN #automation #evolution #fuzzy #set
- Fuzzy set approach for automatic tagging in evolving software (JMAK, AT, TTN, HAN, TNN), pp. 1–10.
- ICSM-2010-CollardMR #adaptation #lightweight #scalability
- A lightweight transformational approach to support large scale adaptive changes (MLC, JIM, BPR), pp. 1–10.
- ICSM-2010-CorazzaMMS #clone detection #detection #kernel
- A Tree Kernel based approach for clone detection (AC, SDM, VM, GS), pp. 1–5.
- ICSM-2010-FerreiraMSBCP #performance
- An approach to improving software inspections performance (ALF, RJM, JGS, RFB, LC, MCP), pp. 1–8.
- MSR-2010-PentaGA #identification #using
- Identifying licensing of jar archives using a code-search approach (MDP, DMG, GA), pp. 151–160.
- WCRE-2010-RupakhetiH #java #similarity
- An Abstraction-Oriented, Path-Based Approach for Analyzing Object Equality in Java (CRR, DH), pp. 205–214.
- CIAA-2010-AntosM #automaton #finite #pattern matching
- Finite Automata for Generalized Approach to Backward Pattern Matching (JA, BM), pp. 49–58.
- ICALP-v2-2010-FontaineLV #algebra #automaton #using
- Automata for Coalgebras: An Approach Using Predicate Liftings (GF, RAL, YV), pp. 381–392.
- ICALP-v2-2010-GehrkeGP #recognition
- A Topological Approach to Recognition (MG, SG, JÉP), pp. 151–162.
- LATA-2010-FlorencioF #bound #consistency
- Finding Consistent Categorial Grammars of Bounded Value: A Parameterized Approach (CCF, HF), pp. 202–213.
- IFM-2010-ArenasABW
- An Event-B Approach to Data Sharing Agreements (AEA, BA, JB, MDW), pp. 28–42.
- IFM-2010-SchneiderTW #csp
- A CSP Approach to Control in Event-B (SS, HT, HW), pp. 260–274.
- RTA-2010-HillsR #composition #logic #program analysis #semantics
- A Rewriting Logic Semantics Approach to Modular Program Analysis (MH, GR), pp. 151–160.
- SEFM-2010-EscobedoGGC #testing #web #web service
- Testing Web Service Orchestrators in Context: A Symbolic Approach (JPE, CG, PLG, ARC), pp. 257–267.
- SEFM-2010-MassinkLBH #algebra #analysis #process #scalability
- A Scalable Fluid Flow Process Algebraic Approach to Emergency Egress Analysis (MM, DL, AB, MDH), pp. 169–180.
- AIIDE-2010-HansonR
- A Non-Modal Approach to Integrating Dialogue and Action (PH, CR).
- AIIDE-2010-LaviersS #game studies #generative #monte carlo
- A Monte Carlo Approach for Football Play Generation (KRL, GS).
- AIIDE-2010-LiR #adaptation #game studies
- An Offline Planning Approach to Game Plotline Adaptation (BL, MOR).
- AIIDE-2010-Perkins #analysis #composition #detection #game studies #realtime
- Terrain Analysis in Real-Time Strategy Games: An Integrated Approach to Choke Point Detection and Region Decomposition (LP).
- CIG-2010-SalgeM #game studies #information management
- Relevant Information as a formalised approach to evaluate game mechanics (CS, TM), pp. 281–288.
- FDG-2010-SheldonPKOCTR #game studies #learning #mobile #named #student #using
- Weatherlings: a new approach to student learning using web-based mobile games (JS, JP, EK, JO, VHHC, PWT, LR), pp. 203–208.
- VS-Games-2010-SmithR #multi
- Facial Expression Tracking for Remote Conferencing Applications: An Approach to Tackling the Disadvantages of Remote Worker Multitasking (PS, SR), pp. 91–92.
- CHI-2010-GrigoreanuBR #debugging #design #tool support
- A strategy-centric approach to the design of end-user debugging tools (VG, MMB, GGR), pp. 713–722.
- CHI-2010-KelleyCBC #online #privacy #standard
- Standardizing privacy notices: an online study of the nutrition label approach (PGK, LC, JB, LFC), pp. 1573–1582.
- CHI-2010-MalacriaLG
- Clutch-free panning and integrated pan-zoom control on touch-sensitive surfaces: the cyclostar approach (SM, EL, YG), pp. 2615–2624.
- CAiSE-2010-BouassidaB #detection #problem
- A New Approach for Pattern Problem Detection (NB, HBA), pp. 150–164.
- CAiSE-2010-EsfahaniYC #evaluation
- Situational Evaluation of Method Fragments: An Evidence-Based Goal-Oriented Approach (HCE, ESKY, JC), pp. 424–438.
- CAiSE-2010-KohlbornLKFRRK #bottom-up #concept
- Conceptualizing a Bottom-Up Approach to Service Bundling (TK, CL, AK, EF, MR, CR, HK), pp. 129–134.
- CAiSE-2010-KrastevaID #agile #development
- Experience-Based Approach for Adoption of Agile Practices in Software Development Projects (IK, SI, AD), pp. 266–280.
- EDOC-2010-CalhauF #integration #ontology #semantics
- An Ontology-Based Approach for Semantic Integration (RFC, RdAF), pp. 111–120.
- EDOC-2010-KalsingNIT #incremental #legacy #mining #process
- An Incremental Process Mining Approach to Extract Knowledge from Legacy Systems (AK, GSdN, CI, LHT), pp. 79–88.
- EDOC-2010-NezhadBGSS #process
- IT Support Conversation Manager: A Conversation-Centered Approach and Tool for Managing Best Practice IT Processes (HRMN, CB, SG, SS, SS), pp. 247–256.
- EDOC-2010-ZdravkovicI #design #framework #modelling #ontology #using
- A Model-Driven Approach for Designing E-Services Using Business Ontological Frameworks (JZ, TI), pp. 121–130.
- ICEIS-AIDSS-2010-CostaCNBA
- An Agent-based Approach to Consumer’s Law Dispute Resolution (NC, DC, PN, DB, FA), pp. 103–110.
- ICEIS-AIDSS-2010-VialeBGP #modelling #process #scalability #sequence #using
- Modeling Large Scale Manufacturing Process from Timed Data — Using the TOM4L Approach and Sequence Alignment Information for Modeling STMicroelectronics’ Production Processes (PV, NB, MLG, JP), pp. 129–138.
- ICEIS-DISI-2010-LangA
- Fostering IT-enabled Business Innovations — An Approach for CIOs to Innovate the Business (ML, MA), pp. 242–248.
- ICEIS-DISI-2010-LimaH #named #parallel
- p-MDAG — A Parallel MDAG Approach (JdCL, CMH), pp. 322–331.
- ICEIS-DISI-2010-PapatheocharousIA #cost analysis #estimation #modelling #programming #search-based
- A Genetic Programming Approach to Software Cost Modeling and Estimation (EP, AI, ASA), pp. 281–287.
- ICEIS-ISAS-2010-AleixoFSK #modelling #process
- A Model-driven Approach to Managing and Customizing Software Process Variabilities (FAA, MAF, WCdS, UK), pp. 92–100.
- ICEIS-ISAS-2010-DAmbrosioFST #development #information management
- An Approach for the Development of DOOH-oriented Information Systems (PD, FF, FS, MT), pp. 326–331.
- ICEIS-ISAS-2010-IizukaIT #analysis #effectiveness #process #re-engineering
- Analysis of Effective Approach for Business Process re-Engineering — From the Perspective of Organizational Factors (KI, YI, KT), pp. 384–389.
- ICEIS-ISAS-2010-MacielSM #modelling #process
- Applying and Evaluating an MDA Process Modeling Approach (RSPM, BCdS, APFM), pp. 185–190.
- ICEIS-ISAS-2010-SeemuellerVHB #development #process
- Situational Method Engineering Applied for the Enactment of Development Processes — An Agent based Approach (HS, HV, BH, BB), pp. 399–405.
- ICEIS-ISAS-2010-TaveiraAS #incremental
- A Method for Portfolio Management and Prioritization — An Incremental Funding Method Approach (GT, AJA, EAS), pp. 23–33.
- ICEIS-J-2010-AleixoFSK10a #automation #deployment #modelling #process #variability
- Automating the Variability Management, Customization and Deployment of Software Processes: A Model-Driven Approach (FAA, MAF, WCdS, UK), pp. 372–387.
- ICEIS-J-2010-BarbagalloCFM10a #web
- Enhancing the Selection of Web Sources: A Reputation Based Approach (DB, CC, CF, MM), pp. 464–476.
- ICEIS-J-2010-LinS10a #constraints #dependence #process
- A Business Process Driven Approach to Manage Data Dependency Constraints (JYCL, SWS), pp. 326–339.
- ICEIS-J-2010-PotoleaBL #recognition
- A Hierarchical Approach for the Offline Handwritten Signature Recognition (RP, IB, CL), pp. 264–279.
- ICEIS-SAIC-2010-ChukmolBA #collaboration #web #web service
- An Approach for Web Service Discovery based on Collaborative Structured Tagging (UC, ANB, YA), pp. 47–56.
- ICEIS-SAIC-2010-GoyalK #automation #fuzzy #multi #set #using
- Using Fuzzy Set Approach in Multi-attribute Automated Auctions (MLG, SK), pp. 81–85.
- ICEIS-SAIC-2010-MatCS #collaboration #network
- Selecting Partners for Collaborative Networks — Mixed Methods Approach (NACM, YC, HS), pp. 122–128.
- ICEIS-SAIC-2010-SilvaGFTG #monitoring #named
- Aspect-Monitor — An Aspect-based Approach to WS-contract Monitoring (MFdS, IMdSG, MF, MBFdT, AFG), pp. 5–12.
- CIKM-2010-CaoBYCT #effectiveness #mining #mobile
- An effective approach for mining mobile user habits (HC, TB, QY, EC, JT), pp. 1677–1680.
- CIKM-2010-ChengCL #twitter
- You are where you tweet: a content-based approach to geo-locating twitter users (ZC, JC, KL), pp. 759–768.
- CIKM-2010-DeyJ #database #graph #query #reachability #scalability
- A hierarchical approach to reachability query answering in very large graph databases (SKD, HMJ), pp. 1377–1380.
- CIKM-2010-GuoCXS #query #recommendation #social
- A structured approach to query recommendation with social annotation data (JG, XC, GX, HS), pp. 619–628.
- CIKM-2010-MiaoLTZ #category theory #community #identification #modelling #topic
- Identifying new categories in community question answering archives: a topic modeling approach (YM, CL, JT, LZ), pp. 1673–1676.
- CIKM-2010-NguyenNF #named #web
- PruSM: a prudent schema matching approach for web forms (THN, HN, JF), pp. 1385–1388.
- CIKM-2010-VirgilioB #flexibility #metamodelling #semantics #web #web service
- A metamodel approach to flexible semantic web service discovery (RDV, DB), pp. 1309–1312.
- CIKM-2010-WangCLC #mining #modelling #probability
- Accelerating probabilistic frequent itemset mining: a model-based approach (LW, RC, SDL, DWLC), pp. 429–438.
- CIKM-2010-WuIPR #detection #wiki
- Elusive vandalism detection in wikipedia: a text stability-based approach (QW, DI, CP, LR), pp. 1797–1800.
- CIKM-2010-ZhangMWW #automation #database #formal method #object-oriented #ontology
- Formal approach and automated tool for constructing ontology from object-oriented database model (FZ, ZMM, XW, YW), pp. 1329–1332.
- CIKM-2010-ZhouLMW #documentation #ranking
- A late fusion approach to cross-lingual document re-ranking (DZ, SL, JM, VW), pp. 1433–1436.
- ECIR-2010-BelloginC #collaboration #performance #predict
- A Performance Prediction Approach to Enhance Collaborative Filtering Performance (AB, PC), pp. 382–393.
- ECIR-2010-BerberichBAW #modelling
- A Language Modeling Approach for Temporal Information Needs (KB, SJB, OA, GW), pp. 13–25.
- ECIR-2010-JamborW #collaboration #fault
- Goal-Driven Collaborative Filtering — A Directional Error Based Approach (TJ, JW), pp. 407–419.
- ECIR-2010-TuHCLZ #information retrieval #modelling #semantics
- Wikipedia-Based Semantic Smoothing for the Language Modeling Approach to Information Retrieval (XT, TH, LC, JL, MZ), pp. 370–381.
- ICML-2010-GerrishB
- A Language-based Approach to Measuring Scholarly Impact (SG, DMB), pp. 375–382.
- ICML-2010-LiangJK #learning #source code
- Learning Programs: A Hierarchical Bayesian Approach (PL, MIJ, DK), pp. 639–646.
- ICML-2010-OntanonP #induction #learning #multi
- Multiagent Inductive Learning: an Argumentation-based Approach (SO, EP), pp. 839–846.
- ICML-2010-ThiaoTA #problem #programming
- A DC Programming Approach for Sparse Eigenvalue Problem (MT, PDT, LTHA), pp. 1063–1070.
- ICPR-2010-AkgulE #automation #probability
- A Probabilistic Information Fusion Approach to MR-based Automated Diagnosis of Dementia (CBA, AE), pp. 265–268.
- ICPR-2010-Al-HuseinyMN #set
- Gait Learning-Based Regenerative Model: A Level Set Approach (MSAH, SM, MSN), pp. 2644–2647.
- ICPR-2010-AlaeiNP #segmentation
- A Baseline Dependent Approach for Persian Handwritten Character Segmentation (AA, PN, UP), pp. 1977–1980.
- ICPR-2010-AlbarelliRCT #game studies #robust
- Robust Figure Extraction on Textured Background: A Game-Theoretic Approach (AA, ER, AC, AT), pp. 360–363.
- ICPR-2010-ArgunsahC #classification #human-computer #interface
- AR-PCA-HMM Approach for Sensorimotor Task Classification in EEG-based Brain-Computer Interfaces (AOA, MÇ), pp. 113–116.
- ICPR-2010-BasakKTR #identification #multi
- A Gradient Descent Approach for Multi-modal Biometric Identification (JB, KK, VT, NKR), pp. 1322–1325.
- ICPR-2010-BauerEOBKFHN #bound #estimation #graph #performance #robust
- A Fast and Robust Graph-Based Approach for Boundary Estimation of Fiber Bundles Relying on Fractional Anisotropy Maps (MHAB, JE, TO, SB, JK, BF, HKH, CN), pp. 4016–4019.
- ICPR-2010-BayramDSM #classification
- An Ensemble of Classifiers Approach to Steganalysis (SB, AED, HTS, NDM), pp. 4376–4379.
- ICPR-2010-CansizogluB #multi
- An Information Fusion Approach for Multiview Feature Tracking (EAC, MB), pp. 1706–1709.
- ICPR-2010-ChangCH #estimation #image #ranking
- A Ranking Approach for Human Ages Estimation Based on Face Images (KYC, CSC, YPH), pp. 3396–3399.
- ICPR-2010-ChevionNR #image
- Image Processing Based Approach for Retrieving Data from a Seismic Section in Bitmap Format (DC, YN, DR), pp. 4444–4447.
- ICPR-2010-ChiangK
- An Approach for Recognizing Text Labels in Raster Maps (YYC, CAK), pp. 3199–3202.
- ICPR-2010-CiompiPR #random #using
- A Meta-Learning Approach to Conditional Random Fields Using Error-Correcting Output Codes (FC, OP, PR), pp. 710–713.
- ICPR-2010-DahmG #2d #3d #invariant #novel #recognition #using
- A Novel Pose Invariant Face Recognition Approach Using a 2D-3D Searching Strategy (ND, YG), pp. 3967–3970.
- ICPR-2010-DundarBRJSG #classification #learning #multi #towards
- A Multiple Instance Learning Approach toward Optimal Classification of Pathology Slides (MD, SB, VCR, RKJ, OS, MNG), pp. 2732–2735.
- ICPR-2010-DuttaPFL #documentation #performance
- An Efficient Staff Removal Approach from Printed Musical Documents (AD, UP, AF, JL), pp. 1965–1968.
- ICPR-2010-FaradjiWB #classification #problem
- A Simple Approach to Find the Best Wavelet Basis in Classification Problems (FF, RKW, GEB), pp. 641–644.
- ICPR-2010-FreireCF #generative #graph #problem
- A Column Generation Approach for the Graph Matching Problem (ASF, RMCJ, CEF), pp. 1088–1091.
- ICPR-2010-FrohlichRD #image #performance
- A Fast Approach for Pixelwise Labeling of Facade Images (BF, ER, JD), pp. 3029–3032.
- ICPR-2010-GiannakopoulosPT #detection #multimodal #video
- A Multimodal Approach to Violence Detection in Video Sharing Sites (TG, AP, ST), pp. 3244–3247.
- ICPR-2010-GordoP #classification #documentation #multi
- A Bag-of-Pages Approach to Unordered Multi-page Document Classification (AG, FP), pp. 1920–1923.
- ICPR-2010-GudkovU
- A Topologic Approach to User-Dependent Key Extraction from Fingerprints (VYG, OU), pp. 1281–1284.
- ICPR-2010-GuoBC #learning #using
- Support Vectors Selection for Supervised Learning Using an Ensemble Approach (LG, SB, NC), pp. 37–40.
- ICPR-2010-HalderG #documentation
- Color Feature Based Approach for Determining Ink Age in Printed Documents (BH, UG), pp. 3212–3215.
- ICPR-2010-KimLL #probability #segmentation
- A Unified Probabilistic Approach to Feature Matching and Object Segmentation (THK, KML, SUL), pp. 464–467.
- ICPR-2010-MumtazMM
- A New Approach to Aircraft Surface Inspection Based on Directional Energies of Texture (MM, ABM, HM), pp. 4404–4407.
- ICPR-2010-NguyenAC #locality #performance
- Unifying Approach for Fast License Plate Localization and Super-Resolution (CDN, MA, LC), pp. 376–379.
- ICPR-2010-NguyenD #multi
- A Multi-scale Approach to Decompose a Digital Curve into Meaningful Parts (TPN, IDR), pp. 1072–1075.
- ICPR-2010-PapadopoulosMKS #analysis #image #learning #semantics #statistics
- A Statistical Learning Approach to Spatial Context Exploitation for Semantic Image Analysis (GTP, VM, IK, MGS), pp. 3138–3142.
- ICPR-2010-ParkY #analysis #game studies #network #social
- Social Network Approach to Analysis of Soccer Game (KJP, AY), pp. 3935–3938.
- ICPR-2010-PutpuekCLS #detection #identification
- Unified Approach to Detection and Identification of Commercial Films by Temporal Occurrence Pattern (NP, NC, CL, SS), pp. 3288–3291.
- ICPR-2010-RodolaAT #game studies #multi #robust
- A Game-Theoretic Approach to Robust Selection of Multi-view Point Correspondence (ER, AA, AT), pp. 57–60.
- ICPR-2010-SanromaAS #graph #using
- A Discrete Labelling Approach to Attributed Graph Matching Using SIFT Features (GS, RA, FS), pp. 954–957.
- ICPR-2010-SchelsS #classification #image #multi #sequence
- A Multiple Classifier System Approach for Facial Expressions in Image Sequences Utilizing GMM Supervectors (MS, FS), pp. 4251–4254.
- ICPR-2010-SertelCLSG #analysis #detection #image
- An Image Analysis Approach for Detecting Malignant Cells in Digitized H&E-stained Histology Images of Follicular Lymphoma (OS, ÜVÇ, GL, AS, MNG), pp. 273–276.
- ICPR-2010-SmeetsFHVS #3d #composition #invariant #modelling #recognition #using
- Fusion of an Isometric Deformation Modeling Approach Using Spectral Decomposition and a Region-Based Approach Using ICP for Expression-Invariant 3D Face Recognition (DS, TF, JH, DV, PS), pp. 1172–1175.
- ICPR-2010-SoldeaESU #image #segmentation #using
- Segmentation of Anatomical Structures in Brain MR Images Using Atlases in FSL — A Quantitative Approach (OS, AE, DFS, DU, MÇ, AE, MGU, ZF, MC), pp. 2592–2595.
- ICPR-2010-SunDTX #locality #multi #robust
- A Robust Approach for Person Localization in Multi-camera Environment (LS, HD, LT, GX), pp. 4036–4039.
- ICPR-2010-SunLS #visual notation
- A Visual Attention Based Approach to Text Extraction (QS, YL, SS), pp. 3991–3995.
- ICPR-2010-TanveerI #using
- A Bayesian Approach to Face Hallucination Using DLPP and KRR (MT, NI), pp. 2154–2157.
- ICPR-2010-TopalAG #detection #heuristic #realtime #robust
- Edge Drawing: A Heuristic Approach to Robust Real-Time Edge Detection (CT, CA, YG), pp. 2424–2427.
- ICPR-2010-TorrentPLFSMP #detection #using
- Detecting Faint Compact Sources Using Local Features and a Boosting Approach (AT, MP, XL, JF, JRSS, JM, JMP), pp. 4613–4616.
- ICPR-2010-VenkateshKM #3d #recognition #using
- Resampling Approach to Facial Expression Recognition Using 3D Meshes (YVV, AAK, OVRM), pp. 3772–3775.
- ICPR-2010-WangS #problem
- The Motion Dynamics Approach to the PnP Problem (BW, FS), pp. 1682–1685.
- ICPR-2010-WuS #identification #testing
- A Hypothesis Testing Approach for Fluorescent Blob Identification (LSW, SLS), pp. 2476–2479.
- ICPR-2010-YangQ #detection #distributed #effectiveness #parametricity
- An Effective Decentralized Nonparametric Quickest Detection Approach (DY, HQ), pp. 2278–2281.
- ICPR-2010-ZachariaKMK #2d #image #segmentation
- A Spot Segmentation Approach for 2D Gel Electrophoresis Images Based on 2D Histograms (EZ, EK, DM, SK), pp. 2540–2543.
- ICPR-2010-ZhangLD #kernel #learning #multi #named #novel
- AdaMKL: A Novel Biconvex Multiple Kernel Learning Approach (ZZ, ZNL, MSD), pp. 2126–2129.
- ICPR-2010-ZhouNW #detection #novel
- A Novel Approach to Detect Ship-Radiated Signal Based on HMT (YZ, ZN, CW), pp. 4601–4604.
- ICPR-2010-ZhouZP #graph #named
- Lipreading: A Graph Embedding Approach (ZZ, GZ, MP), pp. 523–526.
- KDD-2010-ChenLB #detection #named #statistics
- GLS-SOD: a generalized local statistical approach for spatial outlier detection (FC, CTL, APB), pp. 1069–1078.
- KDD-2010-HendersonEFALMPT #forensics #graph #metric #mining #multi
- Metric forensics: a multi-level approach for mining volatile graphs (KH, TER, CF, LA, LL, KM, BAP, HT), pp. 163–172.
- KDD-2010-KhoslaCLCHL #machine learning #predict
- An integrated machine learning approach to stroke prediction (AK, YC, CCYL, HKC, JH, HL), pp. 183–192.
- KDD-2010-SunCY #reduction #scalability
- A scalable two-stage approach for a class of dimensionality reduction techniques (LS, BC, JY), pp. 313–322.
- KDD-2010-WangLZ #analysis #overview #rating
- Latent aspect rating analysis on review text data: a rating regression approach (HW, YL, CZ), pp. 783–792.
- KDIR-2010-CamposFHM #feedback #query
- A Content-Bsed Approach to Relevance Feedback in XML-IR for Content and Structure Queries (LMdC, JMFL, JFH, CJMD), pp. 418–427.
- KDIR-2010-EjbaliZA #network #recognition #word
- Intelligent Approach to Train Wavelet Networks for Recognition System of Arabic Words (RE, MZ, CBA), pp. 518–522.
- KDIR-2010-KaiserSB #fuzzy #network #online #social
- Discovering Critical Situations in Online Social Networks — A Neuro Fuzzy Approach to Alert Marketing Managers (CK, SS, FB), pp. 56–64.
- KDIR-2010-KleizaKT #documentation #identification #query #semantics #similarity #visualisation #word
- Semantic Identification and Visualization of Significant Words within Documents — Approach to Visualize Relevant Words within Documents to a Search Query by Word Similarity Computation (KK, PK, KDT), pp. 481–486.
- KEOD-2010-Alfort #classification #information retrieval
- Scale and the Classificatory Dimension — A Linguistic Approach to Contextual IR (EA), pp. 370–373.
- KEOD-2010-KorukhovaF #reasoning #synthesis
- A Case-based Reasoning Approach to Program Synthesis (YK, NF), pp. 335–338.
- KEOD-2010-LimaFC #collaboration #information management #semantics
- A Knowledge Engineering Approach Supporting Collaborative Working Environments based on Semantic Services (CL, PF, RC), pp. 123–132.
- KEOD-2010-ReinosoOGH #statistics #wiki
- A Statistical Approach to the Impact of Featured Articles in Wikipedia (AJR, FO, JMGB, IH), pp. 420–423.
- KEOD-2010-TeguiakAJS #design #incremental #model transformation #ontology
- Incremental Design of Ontologies — A Model Transformation-based Approach (HVT, YAA, SJ, ÉS), pp. 94–103.
- KMIS-2010-ChakrabortyZ #process #towards
- A Systematic Approach Towards Collection, Processing & Distribution of Information about Competitor Activities & Customer Needs in Terms of Products & Services (SC, MZ), pp. 348–353.
- KMIS-2010-KhalifaS #information management #process
- An Integrated Approach in Developing Knowledge Management Process Capabilities (MK, KNS), pp. 121–128.
- KMIS-2010-Rodriguez-EliasRVM #information management
- Integrating Current Practices and Information Systems in KM Initiatives — A Knowledge Management Audit Approach (OMRE, CERG, AV, AIMG), pp. 71–80.
- KMIS-2010-ScheibmayerIB #analysis #framework #process
- A Framework to Measure the Impact of Knowledge Process Supporting Technologies — An Integrated Approach for a Technology-oriented Business Benefit Analysis (MS, AI, MB), pp. 253–259.
- KR-2010-KontchakovLTWZ #query
- The Combined Approach to Query Answering in DL-Lite (RK, CL, DT, FW, MZ).
- KR-2010-LiVK #performance
- An Efficient Majority-Rule-Based Approach for Collective Decision Making with CP-Nets (ML, QBV, RK).
- RecSys-2010-BenchettaraKR #collaboration #machine learning #predict #recommendation
- A supervised machine learning link prediction approach for academic collaboration recommendation (NB, RK, CR), pp. 253–256.
- RecSys-2010-Gutschmidt #online #segmentation
- An approach to situational market segmentation on on-line newspapers based on current tasks (AG), pp. 321–324.
- RecSys-2010-KamishimaA #collaboration #modelling
- Nantonac collaborative filtering: a model-based approach (TK, SA), pp. 273–276.
- SEKE-2010-BaratK #code generation #configuration management #development #modelling
- Developing configurable extensible code generators for model-driven development approach (SB, VK), pp. 577–582.
- SEKE-2010-ElabdCH #data access #implementation #web #web service
- Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control (EE, EC, MSH), pp. 235–240.
- SEKE-2010-JarouchehLS #as a service #flexibility #modelling #multi
- A Model-driven Approach to Flexible Multi-Level Customization of SaaS Applications (ZJ, XL, SS), pp. 241–246.
- SEKE-2010-Nehmer #consistency #exception
- A Log-Assisted Approach Enforcing Consistency in the Presence of Exceptions (NN), pp. 757–764.
- SEKE-2010-SouzaPB #optimisation #testing
- A Constrained Particle Swarm Optimization Approach for Test Case Selection (LSdS, RBCP, FdAB), pp. 259–264.
- SEKE-2010-ThovexT #analysis #modelling #multi #network #semantics #social
- Dynamic and semantic social networks analysis: a new model based on a multidisciplinary approach (CT, FT), pp. 548–552.
- SEKE-2010-ZegarraCSC #ontology
- An Ontology-based Configurator for Customized Product Information based upon the Slow Intelligence Systems Approach (EZ, FC, MDS, SKC), pp. 521–528.
- SEKE-2010-ZhuP #adaptation #design #documentation #self
- A documentation approach for the self-adaptive system design (WZ, DLP), pp. 791–796.
- SIGIR-2010-CaputoBS #ranking #semantics
- From fusion to re-ranking: a semantic approach (AC, PB, GS), pp. 815–816.
- SIGIR-2010-FernandezPLB #clustering
- Where to start filtering redundancy?: a cluster-based approach (RTF, JP, DEL, AB), pp. 735–736.
- SIGIR-2010-HeR #automation #detection #generative #ranking
- A ranking approach to target detection for automatic link generation (JH, MdR), pp. 831–832.
- SIGIR-2010-Huerta #approximate #stack #string
- A stack decoder approach to approximate string matching (JMH), pp. 823–824.
- SIGIR-2010-ParaparLB
- Blog snippets: a comments-biased approach (JP, JLC, AB), pp. 711–712.
- SIGIR-2010-YiA #web
- A content based approach for discovering missing anchor text for web search (XY, JA), pp. 427–434.
- SIGIR-2010-YinHZL #modelling #using #wiki
- A survival modeling approach to biomedical search result diversification using wikipedia (XY, XH, XZ, ZL), pp. 901–902.
- ECMFA-2010-Atkinson #modelling #novel #re-engineering
- Orthographic Software Modelling: A Novel Approach to View-Based Software Engineering (CA), p. 1.
- ECMFA-2010-ClowesKHRPJDP #modelling #web
- A Reflective Approach to Model-Driven Web Engineering (DC, DSK, CH, LMR, RFP, JJ, RD, SGP), pp. 62–73.
- ECMFA-2010-YueBL #automation #case study #diagrams #process
- An Automated Approach to Transform Use Cases into Activity Diagrams (TY, LCB, YL), pp. 337–353.
- ICMT-2010-FiorentiniMOP #model transformation #testing
- A Constructive Approach to Testing Model Transformations (CF, AM, MO, IP), pp. 77–92.
- MoDELS-v1-2010-CruzF #automation #generative #metamodelling #user interface
- A Metamodel-Based Approach for Automatic User Interface Generation (AMRdC, JPF), pp. 256–270.
- MoDELS-v1-2010-MadsenM #modelling #programming
- A Unified Approach to Modeling and Programming (OLM, BMP), pp. 1–15.
- MoDELS-v1-2010-SaxenaK #design
- MDE-Based Approach for Generalizing Design Space Exploration (TS, GK), pp. 46–60.
- MoDELS-v1-2010-Shiraishi #modelling #variability
- An AADL-Based Approach to Variability Modeling of Automotive Control Systems (SS), pp. 346–360.
- MoDELS-v1-2010-WangXHZZM #consistency #feature model #modelling
- A Dynamic-Priority Based Approach to Fixing Inconsistent Feature Models (BW, YX, ZH, HZ, WZ, HM), pp. 181–195.
- SPLC-2010-DaoK #component #problem #reuse
- Mapping Features to Reusable Components: A Problem Frames-Based Approach (TMD, KCK), pp. 377–392.
- SPLC-2010-GadelhaCGCFL #component #product line #using
- An Approach for Developing Component-Based Groupware Product Lines Using the Groupware Workbench (BG, EC, MAG, AC, HF, CJPdL), pp. 446–450.
- SPLC-2010-LinYT #performance #product line
- An Approach to Efficient Product Configuration in Software Product Lines (YL, HY, JT), pp. 435–439.
- SPLC-2010-MedeirosAM #architecture #design #named #product line
- SOPLE-DE: An Approach to Design Service-Oriented Product Line Architectures (FMM, ESdA, SRLM), pp. 456–460.
- SPLC-2010-RabiserHELGS #documentation #flexibility #generative #product line
- A Flexible Approach for Generating Product-Specific Documents in Product Lines (RR, WH, CE, ML, PG, CS), pp. 47–61.
- SPLC-2010-TekinerdoganTS #classification #multi #product line
- Multidimensional Classification Approach for Defining Product Line Engineering Transition Strategies (BT, ET, ES), pp. 461–465.
- SPLC-2010-ZhangJ #feature model #hybrid #programming
- A Hybrid Approach to Feature-Oriented Programming in XVCL (HZ, SJ), pp. 440–445.
- OOPSLA-2010-MercadalECL #architecture #fault #pervasive
- A domain-specific approach to architecturing error handling in pervasive computing (JM, QE, CC, NL), pp. 47–61.
- OOPSLA-2010-NguyenNWNKN #adaptation #api #graph
- A graph-based approach to API usage adaptation (HAN, TTN, GWJ, ATN, MK, TNN), pp. 302–321.
- TOOLS-EUROPE-2010-ChristBEGL #framework #metamodelling #specification
- A Generic Meta-model-Based Approach for Specifying Framework Functionality and Usage (FC, JCB, GE, CG, ML), pp. 21–40.
- AdaEurope-2010-PastorASA #modelling #realtime #sequence #towards #using
- Towards the Definition of a Pattern Sequence for Real-Time Applications Using a Model-Driven Engineering Approach (JAP, DA, PS, BÁ), pp. 167–180.
- LOPSTR-2010-Vidal #hybrid #logic programming #partial evaluation #source code
- A Hybrid Approach to Conjunctive Partial Evaluation of Logic Programs (GV), pp. 200–214.
- PADL-2010-WangG #domain-specific language #implementation #protocol #stack
- A Domain-Specific Language Approach to Protocol Stack Implementation (YW, VG), pp. 183–185.
- PEPM-2010-ContejeanPUCPF #automation #proving #termination
- A3PAT, an approach for certified automated termination proofs (EC, AP, XU, PC, OP, JF), pp. 63–72.
- PLDI-2010-ZhouD #manycore #named #object-oriented
- Bamboo: a data-centric, object-oriented approach to many-core software (JZ, BD), pp. 388–399.
- PPDP-2010-BofillBV #declarative #robust #satisfiability
- A declarative approach to robust weighted Max-SAT (MB, DB, MV), pp. 67–76.
- PPDP-2010-SnowBN #logic programming #metaprogramming
- A meta-programming approach to realizing dependently typed logic programming (ZS, DB, GN), pp. 187–198.
- QAPL-2010-NdukwuMc #abstraction #independence #probability #source code
- An expectation transformer approach to predicate abstraction and data independence for probabilistic programs (UN, AM), pp. 129–143.
- SAS-2010-AlbertAGPD #analysis
- From Object Fields to Local Variables: A Practical Approach to Field-Sensitive Analysis (EA, PA, SG, GP, DVRD), pp. 100–116.
- RE-2010-KamalrudinHG #automation #consistency #named #nondeterminism #requirements #visual notation
- MaramaAI: Automated and Visual Approach for Inconsistency Checking of Requirements (MK, JGH, JCG), pp. 393–394.
- RE-2010-LiuWZJ #dependence #elicitation #requirements
- Elicitation of Dependability Requirements: A HAZOP-based Approach (CL, YW, WZ, ZJ), pp. 407–408.
- RE-2010-MavinW #requirements
- Big Ears (The Return of “Easy Approach to Requirements Engineering”) (AM, PW), pp. 277–282.
- RE-2010-SupakkulHCTL
- An NFR Pattern Approach to Dealing with NFRs (SS, TH, LC, TTT, JCSdPL), pp. 179–188.
- ASE-2010-BoucherCHBD #implementation #product line
- Tag and prune: a pragmatic approach to software product line implementation (QB, AC, PH, AB, LD), pp. 333–336.
- ASE-2010-HeJBGW #bound #model checking #statistics
- A bounded statistical approach for model checking of unbounded until properties (RH, PJ, SB, APG, HW), pp. 225–234.
- ASE-2010-LawallL #automation #debugging
- An automated approach for finding variable-constant pairing bugs (JLL, DL), pp. 103–112.
- FSE-2010-Elkhodary #adaptation #feature model #self
- A learning-based approach for engineering feature-oriented self-adaptive software systems (AME), pp. 345–348.
- FSE-2010-HemmatiBAA #case study #industrial #modelling #testing
- An enhanced test case selection approach for model-based testing: an industrial case study (HH, LCB, AA, SA), pp. 267–276.
- FSE-2010-Krka #behaviour #incremental #modelling #refinement #requirements #specification
- From requirements to partial behavior models: an iterative approach to incremental specification refinement (IK), pp. 341–344.
- ICSE-2010-CeccarelliCCP #impact analysis
- An eclectic approach for change impact analysis (MC, LC, GC, MDP), pp. 163–166.
- ICSE-2010-Chan #formal method #taxonomy #web #web service
- Formal methods for web services: a taxonomic approach (KSMC), pp. 357–360.
- ICSE-2010-ChenM #evolution #monitoring #requirements #safety #towards
- Towards better support for the evolution of safety requirements via the model monitoring approach (ZC, GM), pp. 219–222.
- ICSE-2010-Cleland-HuangCGE #machine learning #requirements
- A machine learning approach for tracing regulatory codes to product specific requirements (JCH, AC, MG, JE), pp. 155–164.
- ICSE-2010-MetayerMTMPCFH #case study #overview #re-engineering
- Liability in software engineering: overview of the LISE approach and illustration on a case study (DLM, MM, VVTT, EM, MLP, NC, SF, RH), pp. 135–144.
- ICSE-2010-Moody #design #physics #re-engineering #visual notation
- The “physics” of notations: a scientific approach to designing visual notations in software engineering (DLM), pp. 485–486.
- ICSE-2010-Rodrigues #3d #architecture #artificial reality #education #named
- VisAr3D: an approach to software architecture teaching based on virtual and augmented reality (CSCR), pp. 351–352.
- ICSE-2010-SunLWJK #debugging #retrieval
- A discriminative model approach for accurate duplicate bug report retrieval (CS, DL, XW, JJ, SCK), pp. 45–54.
- ICSE-2010-WuGAK #evolution #framework #hybrid #identification #named
- AURA: a hybrid approach to identify framework evolution (WW, YGG, GA, MK), pp. 325–334.
- ICSE-2010-YangL #bound #verification
- A cut-off approach for bounded verification of parameterized systems (QY, ML), pp. 345–354.
- SAC-2010-AminBFJ #probability
- A stochastic approach to candidate disease gene subnetwork extraction (MSA, AB, RLFJ, HMJ), pp. 1534–1538.
- SAC-2010-BernalFMD #identification #process #rule-based
- Dynamic context-aware business process: a rule-based approach supported by pattern identification (JFMB, PF, MM, JD), pp. 470–474.
- SAC-2010-BraynerCS #detection #energy #network #quality #query #requirements
- Dealing with application requirements and energy consumption in wireless sensor networks: a novelty detection approach for quality of query services (AB, ALVC, KMdS), pp. 786–790.
- SAC-2010-CaoWWH #composition #named #network #social
- OASNET: an optimal allocation approach to influence maximization in modular social networks (TC, XW, SW, XH), pp. 1088–1094.
- SAC-2010-CeciALM #data mining #mining #ranking #relational
- Complex objects ranking: a relational data mining approach (MC, AA, CL, DM), pp. 1071–1077.
- SAC-2010-ChoppyR #modelling
- A well-founded approach to service modelling with Casl4Soa: part 1 (service in isolation) (CC, GR), pp. 2451–2458.
- SAC-2010-ColantonioPOV #adaptation #clustering #matrix #named
- ABBA: adaptive bicluster-based approach to impute missing values in binary matrices (AC, RDP, AO, NVV), pp. 1026–1033.
- SAC-2010-DeigmoellerISJ #video
- An approach to intelligently crop and scale video for broadcast applications (JD, TI, GS, NJ), pp. 1911–1918.
- SAC-2010-DelisVT #classification
- A data perturbation approach to sensitive classification rule hiding (AD, VSV, AAT), pp. 605–609.
- SAC-2010-EcksteinHW #multi #named #visual notation
- LFRP-search: multi-layer ranked visual faceted search: an approach to cope with complex search situations (RE, AH, NW), pp. 1713–1717.
- SAC-2010-EspinozaBG #formal method #reuse #traceability
- A formal approach to reuse successful traceability practices in SPL projects (AE, GB, JG), pp. 2352–2359.
- SAC-2010-FotoohiG #behaviour #case study
- A supervisory control approach for safe behavior of service robot case study: FRIEND (LF, AG), pp. 1305–1306.
- SAC-2010-HarshN #architecture #independence #multi #network
- Mode independent session directory service architecture: a unified approach for ASM and SSM multicast networks (PH, REN), pp. 647–654.
- SAC-2010-HilaireGGK #documentation
- An approach based upon OWL-S for method fragments documentation and selection (VH, NG, SG, AK), pp. 938–939.
- SAC-2010-Kaneiwa #information management #mining #set
- A rough set approach to mining connections from information systems (KK), pp. 990–996.
- SAC-2010-KaoLW #hybrid #novel
- Expert finding in question-answering websites: a novel hybrid approach (WCK, DRL, SWW), pp. 867–871.
- SAC-2010-KnappMWZ #specification
- A heterogeneous approach to service-oriented systems specification (AK, GM, MW, AZ), pp. 2477–2484.
- SAC-2010-LajmiZZC #component #delivery #modelling #multi
- A multi-view model-driven approach for packaging software components (AL, MZ, TZ, SC), pp. 2297–2304.
- SAC-2010-LamprierASL10a #clustering #multi #query
- Query-oriented clustering: a multi-objective approach (SL, TA, FS, BL), pp. 1789–1795.
- SAC-2010-MylavarapuSB #capacity #framework #probability
- An optimized capacity planning approach for virtual infrastructure exhibiting stochastic workload (SM, VS, PB), pp. 386–390.
- SAC-2010-ParkKYMY #reuse
- An approach to developing reusable domain services for service oriented applications (JP, JK, SY, MM, KY), pp. 2252–2256.
- SAC-2010-PirkolaT #crawling #problem #using
- Addressing the limited scope problem of focused crawling using a result merging approach (AP, TT), pp. 1735–1740.
- SAC-2010-RiponGHT #layout #multi #problem #using
- Multi-objective evolutionary approach for solving facility layout problem using local search (KSNR, KG, MH, JT), pp. 1155–1156.
- SAC-2010-ScannielloDDD #architecture
- An approach for architectural layer recovery (GS, AD, CD, TD), pp. 2198–2202.
- SAC-2010-SchoutenRBFLH #personalisation #semantics
- A semantic web-based approach for personalizing news (KS, PR, JB, FF, LL, FH), pp. 854–861.
- SAC-2010-SchutzC #fault tolerance #hybrid #multi #network #optimisation
- A multi-objective optimization approach for fault-tolerance provisioning in multi-radio hybrid wireless-optical broadband access networks (GS, NSCC), pp. 635–640.
- SAC-2010-SpinolaPT #named #requirements
- UbiCheck: an approach to support requirements definition in the ubicomp domain (ROS, FCRP, GHT), pp. 306–310.
- SAC-2010-TeixeiraFP #distributed
- Distributed discrimination of media moments and media intervals: a Watch-and-Comment approach (CACT, GBF, MdGCP), pp. 1929–1935.
- SAC-2010-WelferSM #detection #image
- A morphologic three-stage approach for detecting exudates in color eye fundus images (DW, JS, DRM), pp. 964–968.
- GPCE-2010-RompfO #code generation #composition #domain-specific language #lightweight #runtime #staging
- Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs (TR, MO), pp. 127–136.
- ASPLOS-2010-ZhangSL #concurrent #debugging #detection #named
- ConMem: detecting severe concurrency bugs through an effect-oriented approach (WZ, CS, SL), pp. 179–192.
- CASE-2010-BraunS #constraints #logic #predict
- A Mixed Logical Dynamic Model Predictive Control approach for handling industrially relevant transportation constraints (MWB, JS), pp. 966–971.
- CASE-2010-CaiM #analysis #hybrid #industrial #process
- Dwell-time approach to stability analysis for hybrid control systems: Application to an industrial refrigeration process (CC, SM), pp. 728–733.
- CASE-2010-KwokHFRW #image #using
- Color image contrast enhancement using a local equalization and weighted sum approach (NMK, QPH, GF, ABR, DW), pp. 568–573.
- CASE-2010-MacwanNB #bound #multi #novel #online #predict #probability
- On-line target-motion prediction for autonomous multirobot search in realistic terrains with time-expanding boundaries: A novel probabilistic approach (AM, GN, BB), pp. 662–667.
- CASE-2010-MehtaPD #similarity
- An approach to compute similarity between engineering changes (CM, LP, DD), pp. 332–337.
- CASE-2010-NazeemR #design #resource management
- A practical approach to the design of maximally permissive liveness-enforcing supervisors for complex resource allocation systems (AN, SR), pp. 451–458.
- CASE-2010-OuedraogoKMA #automaton #finite
- Symbolic approach to nonblocking and safe control of Extended Finite Automata (LO, RK, RM, KÅ), pp. 471–476.
- CASE-2010-ThayerE
- Developing a practical approach to measuring sustainability for the proceedings of the 2010 IEEE society spring conference (JT, DEE), pp. 162–167.
- CASE-2010-WangKF #assembly #hybrid #layout
- A hybrid approach for dynamic assembly shop floor layout (LW, SK, HYF), pp. 604–609.
- CASE-2010-WangLAB #flexibility #quality
- Improving quality in flexible manufacturing systems: A bottleneck transition approach (JW, JL, JA, SB), pp. 610–616.
- DAC-2010-HaquePJP #embedded #named #performance #policy #simulation
- SCUD: a fast single-pass L1 cache simulation approach for embedded processors with round-robin replacement policy (MSH, JP, AJ, SP), pp. 356–361.
- DAC-2010-HsuPH #data flow #modelling #physics #simulation
- A mixed-mode vector-based dataflow approach for modeling and simulating LTE physical layer (CJH, JLP, FJH), pp. 18–23.
- DAC-2010-KuoCTCL #behaviour
- Behavior-level yield enhancement approach for large-scaled analog circuits (CCK, YLC, ICT, LYC, CNJL), pp. 903–908.
- DAC-2010-WuDL #integer #parallel #programming
- A parallel integer programming approach to global routing (THW, AD, JTL), pp. 194–199.
- DAC-2010-ZitterellS #energy #online #probability #realtime #scheduling
- A probabilistic and energy-efficient scheduling approach for online application in real-time systems (TZ, CS), pp. 42–47.
- DAC-2010-ZuberDM #analysis #statistics
- A holistic approach for statistical SRAM analysis (PZ, PD, MM), pp. 717–722.
- DATE-2010-BonfiettiBLM #manycore #performance #scheduling
- An efficient and complete approach for throughput-maximal SDF allocation and scheduling on multi-core platforms (AB, LB, ML, MM), pp. 897–902.
- DATE-2010-FerentSGD #embedded #linear #network #programming
- Linear programming approach for performance-driven data aggregation in networks of embedded sensors (CF, VS, MG, AD), pp. 1456–1461.
- DATE-2010-HaquePJP #embedded #named #performance #policy #simulation
- DEW: A fast level 1 cache simulation approach for embedded processors with FIFO replacement policy (MSH, JP, AJ, SP), pp. 496–501.
- DATE-2010-Krupp0
- A systematic approach to the test of combined HW/SW systems (AK, WM), pp. 323–326.
- DATE-2010-MartinelloMRR #logic #multi #named #synthesis
- KL-Cuts: A new approach for logic synthesis targeting multiple output blocks (OM, FSM, RPR, AIR), pp. 777–782.
- DATE-2010-OstendorffWSK #adaptation
- A new approach for adaptive failure diagnostics based on emulation test (SO, HDW, JS, SK), pp. 327–330.
- DATE-2010-PanYZS #megamodelling #order #performance #reduction
- An efficient transistor-level piecewise-linear macromodeling approach for model order reduction of nonlinear circuits (XP, FY, XZ, YS), pp. 1673–1676.
- DATE-2010-ZhangLL #markov #modelling #simulation #using #verification
- An abstraction-guided simulation approach using Markov models for microprocessor verification (TZ, TL, XL), pp. 484–489.
- HPCA-2010-WareRFBRRC #architecture #power management
- Architecting for power management: The IBM POWER7TM approach (MSW, KR, MSF, BB, JCR, FLRI, JBC), pp. 1–11.
- ISMM-2010-BegB #graph
- A graph theoretic approach to cache-conscious placement of data for direct mapped caches (MB, PvB), pp. 113–120.
- LCTES-2010-PykaKMM #embedded #framework #platform
- Versatile system-level memory-aware platform description approach for embedded MPSoCs (RP, FK, PM, SM), pp. 9–16.
- PDP-2010-GaliziaVCM #image #parallel
- A Dynamic Parallel Approach to Recognize Tubular Breast Cancer for TMA Image Building (AG, FV, AC, LM), pp. 403–410.
- PDP-2010-SunWC #clustering #coordination #graph #network
- A Graph Clustering Approach to Computing Network Coordinates (YS, BW, KC), pp. 129–136.
- PDP-2010-WangBBW #modelling #parallel #search-based #source code
- Model Driven Iterative Multi-dimensional Parallelization of Multi-task Programs for the Cell BE: A Genetic Algorithm-Based Approach (MW, NB, FB, ZW), pp. 218–222.
- ESOP-2010-MatsudaMHT #grammarware #source code
- A Grammar-Based Approach to Invertible Programs (KM, SCM, ZH, MT), pp. 448–467.
- ESOP-2010-VardoulakisS #analysis #control flow #named
- CFA2: A Context-Free Approach to Control-Flow Analysis (DV, OS), pp. 570–589.
- FASE-2010-KimLK #configuration management #data access #modelling
- A Verifiable Modeling Approach to Configurable Role-Based Access Control (DKK, LL, SK), pp. 188–202.
- FASE-2010-LiXBLM #hardware
- An Automata-Theoretic Approach to Hardware/Software Co-verification (JL, FX, TB, VL, CM), pp. 248–262.
- FASE-2010-LuoZZH #concurrent #lightweight
- A Lightweight and Portable Approach to Making Concurrent Failures Reproducible (QL, SZ, JZ, MH), pp. 323–337.
- STOC-2010-BayatiGT #combinator #graph #random #scalability
- Combinatorial approach to the interpolation method and scaling limits in sparse random graphs (MB, DG, PT), pp. 105–114.
- CAV-2010-GhorbalGP #logic
- A Logical Product Approach to Zonotope Intersection (KG, EG, SP), pp. 212–226.
- CAV-2010-PulinaT #abstraction #network #verification
- An Abstraction-Refinement Approach to Verification of Artificial Neural Networks (LP, AT), pp. 243–257.
- ICLP-J-2010-Delgrande #logic programming #semantics #set #source code
- A program-level approach to revising logic programs under the answer set semantics (JPD), pp. 565–580.
- ICLP-J-2010-DrescherW #constraints #set
- A translational approach to constraint answer set solving (CD, TW), pp. 465–480.
- ICST-2010-AngelisPA #testing
- A Counter-Example Testing Approach for Orchestrated Services (FDA, AP, GDA), pp. 373–382.
- ICST-2010-BaresiLM #java #named
- TestFul: An Evolutionary Test Approach for Java (LB, PLL, MM), pp. 185–194.
- ICST-2010-SeguraHBR #analysis #automation #feature model #generative #modelling #testing
- Automated Test Data Generation on the Analyses of Feature Models: A Metamorphic Testing Approach (SS, RMH, DB, ARC), pp. 35–44.
- ICTSS-2010-Heitmeyer #behaviour #modelling #testing
- A Model-Based Approach to Testing Software for Critical Behavior and Properties (CLH), p. 15.
- ICTSS-2010-MeinkeN #testing
- A Learning-Based Approach to Unit Testing of Numerical Software (KM, FN), pp. 221–235.
- LICS-2010-BodirskyHM #algebra #constraints #on the
- On the Scope of the Universal-Algebraic Approach to Constraint Satisfaction (MB, MH, BM), pp. 90–99.
- WICSA-ECSA-2009-Bass #architecture #design
- Generate and test as a software architecture design approach (LB), pp. 309–312.
- WICSA-ECSA-2009-KotonyaLR #development #product line
- A consumer-centred approach for service-oriented product line development (GK, JL, DR), pp. 211–220.
- DocEng-2009-KuttyNL #clustering #documentation #hybrid #named #performance #xml
- HCX: an efficient hybrid clustering approach for XML documents (SK, RN, YL), pp. 94–97.
- DocEng-2009-LuoFLLXL #visual notation #web
- Web article extraction for web printing: a DOM+visual based approach (PL, JF, SL, FL, YX, JL), pp. 66–69.
- ECDL-2009-SimeoniCLPS #adaptation #functional #library
- Functional Adaptivity for Digital Library Services in e-Infrastructures: The gCube Approach (FS, LC, DL, PP, MS), pp. 51–62.
- HT-2009-AlAghaB #hypermedia #learning #towards
- Towards a constructivist approach to learning from hypertext (IA, LB), pp. 51–56.
- HT-2009-AmitayCHOSYG #social #using
- Social search and discovery using a unified approach (EA, DC, NH, SOK, AS, SY, NG), pp. 199–208.
- HT-2009-Martinez-RomoA #information management #using #web
- Retrieving broken web links using an approach based on contextual information (JMR, LA), pp. 351–352.
- HT-2009-MorishimaNISK #lessons learnt
- Bringing your dead links back to life: a comprehensive approach and lessons learned (AM, AN, TI, SS, HK), pp. 15–24.
- ICDAR-2009-AgrawalD09a #segmentation
- Voronoi++: A Dynamic Page Segmentation Approach Based on Voronoi and Docstrum Features (MA, DSD), pp. 1011–1015.
- ICDAR-2009-BatistaGS #multi #verification
- A Multi-Hypothesis Approach for Off-Line Signature Verification with HMMs (LB, EG, RS), pp. 1315–1319.
- ICDAR-2009-ChandaPFP #identification
- Two-stage Approach for Word-wise Script Identification (SC, SP, KF, UP), pp. 926–930.
- ICDAR-2009-DingJG #online #recognition #word
- A New Method for Rotation Free Method for Online Unconstrained Handwritten Chinese Word Recognition: A Holistic Approach (KD, LJ, XG), pp. 1131–1135.
- ICDAR-2009-HeH #online
- A Character-Structure-Guided Approach to Estimating Possible Orientations of a Rotated Isolated Online Handwritten Chinese Character (TH, QH), pp. 536–540.
- ICDAR-2009-HuangJL #novel #online #recognition
- A Novel Approach for Rotation Free Online Handwritten Chinese Character Recognition (SH, LJ, JL), pp. 1136–1140.
- ICDAR-2009-KanounSGIAH #recognition
- Affixal Approach versus Analytical Approach for Off-Line Arabic Decomposable Vocabulary Recognition (SK, FS, HG, RI, AMA, JH), pp. 661–665.
- ICDAR-2009-MoghaddamRC #classification #independence #multi #segmentation #set #using
- Restoration and Segmentation of Highly Degraded Characters Using a Shape-Independent Level Set Approach and Multi-level Classifiers (RFM, DRH, MC), pp. 828–832.
- ICDAR-2009-MoghaddamRYC #documentation #framework #image #segmentation #set
- A Unified Framework Based on the Level Set Approach for Segmentation of Unconstrained Double-Sided Document Images Suffering from Bleed-Through (RFM, DRH, IBY, MC), pp. 441–445.
- ICDAR-2009-NavonBO #scalability
- A Generic Form Processing Approach for Large Variant Templates (YN, EB, BO), pp. 311–315.
- ICDAR-2009-NguyenTB #visual notation
- A Symbol Spotting Approach Based on the Vector Model and a Visual Vocabulary (TON, ST, AB), pp. 708–712.
- ICDAR-2009-OroR #documentation #named
- PDF-TREX: An Approach for Recognizing and Extracting Tables from PDF Documents (EO, MR), pp. 906–910.
- ICDAR-2009-RoyPL #detection #documentation #recognition
- Seal Detection and Recognition: An Approach for Document Indexing (PPR, UP, JL), pp. 101–105.
- ICDAR-2009-RusinolL #categorisation #documentation
- Logo Spotting by a Bag-of-words Approach for Document Categorization (MR, JL), pp. 111–115.
- ICDAR-2009-SadriC #documentation #optimisation
- A New Approach for Skew Correction of Documents Based on Particle Swarm Optimization (JS, MC), pp. 1066–1070.
- JCDL-2009-DiriyeBT #interactive #query
- A polyrepresentational approach to interactive query expansion (AD, AB, AT), pp. 217–220.
- JCDL-2009-LiC #graph #kernel #machine learning #predict #recommendation
- Recommendation as link prediction: a graph kernel-based machine learning approach (XL, HC), pp. 213–216.
- PODS-2009-KirschMPPUV #identification #performance #statistics
- An efficient rigorous approach for identifying statistically significant frequent itemsets (AK, MM, AP, GP, EU, FV), pp. 117–126.
- SIGMOD-2009-DalviBS #probability #robust #web
- Robust web extraction: an approach based on a probabilistic tree-edit model (NND, PB, FS), pp. 335–348.
- SIGMOD-2009-LiJLF #performance #relational
- Efficient type-ahead search on relational data: a TASTIER approach (GL, SJ, CL, JF), pp. 695–706.
- SIGMOD-2009-NehmeLBR #data type #named #privacy #security #towards
- StreamShield: a stream-centric approach towards security and privacy in data stream environments (RVN, HSL, EB, EAR), pp. 1027–1030.
- SIGMOD-2009-Plattner #database #in memory #using
- A common database approach for OLTP and OLAP using an in-memory column database (HP), pp. 1–2.
- SIGMOD-2009-ZhongLLXTZP #ontology
- A gauss function based approach for unbalanced ontology matching (QZ, HL, JL, GTX, JT, LZ, YP), pp. 669–680.
- VLDB-2009-FriedmanPC #named #pipes and filters #polymorphism #self #sql
- SQL/MapReduce: A practical approach to self-describing, polymorphic, and parallelizable user-defined functions (EF, PMP, JC), pp. 1402–1413.
- VLDB-2009-KabischDYL #integration #interface #query #web
- A Hierarchical Approach to Model Web Query Interfaces for Web Source Integration (TK, ECD, CTY, UL), pp. 325–336.
- VLDB-2009-LiSD #database #probability #ranking
- A Unified Approach to Ranking in Probabilistic Databases (JL, BS, AD), pp. 502–513.
- CSEET-2009-AroraG #development #education #enterprise #re-engineering #scalability
- Software Engineering Approach for Teaching Development of Scalable Enterprise Applications (RA, SG), pp. 105–112.
- CSEET-2009-BoerFV #architecture #community #education
- A Community of Learners Approach to Software Architecture Education (RCdB, RF, HvV), pp. 190–197.
- CSEET-2009-CastilloOFE #developer #education #programming #towards
- Toward an Approach to Programming Education to Produce Qualified Software Developers (JFC, CMdO, ESF, PVE), pp. 101–104.
- CSEET-2009-Kumar #education #re-engineering
- Innovative Teaching of Software Engineering: Practical Approach with Labs (SK), pp. 284–287.
- CSEET-2009-ThompsonE #industrial #scalability #student
- A Scalable Approach to Graduate Student Projects: Hundreds with Industry Every Year (JBT, HME), pp. 158–161.
- EDM-2009-AnayaB #collaboration #data mining #framework #mining
- A Data Mining Approach to Reveal Representative Collaboration Indicators in Open Collaboration Frameworks (ARA, JB), pp. 210–219.
- EDM-2009-Ben-NaimBM #adaptation #data-driven #education
- A User-Driven and Data-Driven Approach for Supporting Teachers in Reflection and Adaptation of Adaptive Tutorials (DBN, MB, NM), pp. 21–30.
- ITiCSE-2009-BuendiaCB #learning
- An instructional approach to drive computer science courses through virtual learning environments (FB, JCC, JVB), pp. 6–10.
- ITiCSE-2009-Christensen #design #re-engineering
- A story-telling approach for a software engineering course design (HBC), pp. 60–64.
- ITiCSE-2009-HuangB #question
- A unified approach to introductory computer science: can one size fit all? (TH, AB), pp. 253–257.
- ITiCSE-2009-PatersonHC #education #modelling #object-oriented #programming #using
- Using coding patterns in a model-driven approach to teaching object oriented programming (JHP, JH, KFC), p. 358.
- SIGITE-2009-QuinnG #education
- An approach to a capstone curriculum (RTQ, DTG), pp. 150–154.
- SIGITE-2009-SmarkuskyT #concept
- An interdisciplinary approach in applying fundamental concepts (DLS, SAT), pp. 224–228.
- ICPC-J-2008-RoyCK09 #clone detection #comparison #detection #evaluation #tool support
- Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
- CSMR-2009-Schwarz #maintenance #towards #traceability
- Towards a Comprehensive Traceability Approach in the Context of Software Maintenance (HS), pp. 339–342.
- CSMR-2009-Trifu #identification
- Improving the Dataflow-Based Concern Identification Approach (MT), pp. 109–118.
- ICPC-2009-CarneiroMM #comprehension #process #visual notation
- Proposing a visual approach to support the characterization of software comprehension activities (GdFC, MGM, RCM), pp. 291–292.
- ICPC-2009-KnieselB #data fusion #design pattern #detection
- Standing on the shoulders of giants — A data fusion approach to design pattern detection (GK, AB), pp. 208–217.
- ICSM-2009-CaiYW #empirical #maintenance #process
- Business process recovery for system maintenance — An empirical approach (ZC, XY, XW), pp. 399–402.
- ICSM-2009-WangLSKKL #combinator #graph #navigation #web
- A combinatorial approach to building navigation graphs for dynamic web applications (WW, YL, SS, RK, RK, JL), pp. 211–220.
- LATA-2009-ScornavaccaBR
- From Gene Trees to Species Trees through a Supertree Approach (CS, VB, VR), pp. 702–714.
- FM-2009-ShaoKP #bound #formal method #incremental #lightweight #using
- An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
- RTA-2009-DuvalEP #category theory #graph transformation
- A Heterogeneous Pushout Approach to Term-Graph Transformation (DD, RE, FP), pp. 194–208.
- SEFM-2009-EzekielL #automation #multi #verification
- An Automated Approach to Verifying Diagnosability in Multi-agent Systems (JE, AL), pp. 51–60.
- TLCA-2009-HarperLZ
- A Pronominal Approach to Binding and Computation (RH, DRL, NZ), pp. 3–4.
- CIG-2009-MehtaC #evaluation #independence #natural language #user interface
- Evaluation of a domain independent approach to natural language processing for game-like user interfaces (MM0, AC), pp. 225–232.
- CIG-2009-WeberM #data mining #mining #predict
- A data mining approach to strategy prediction (BGW, MM), pp. 140–147.
- DiGRA-2009-Deterding #game studies #video
- The Game Frame: Systemizing a Goffmanian Approach to Video Game Theory [Extended Abstract] (SD).
- DiGRA-2009-Sunden #game studies
- Play as Transgression: An Ethnographic Approach to Queer Game Cultures (JS).
- VS-Games-2009-AmanatiadouW #game studies
- Extending the Reference Method for Game Production: A Situational Approach (AA, IvdW), pp. 20–27.
- GT-VMT-2009-Tveit #metamodelling #specification #visual notation
- A Meta-Model-Based Approach for Specification of Graphical Representations (MST), pp. 85–99.
- CHI-2009-HarrisonH09a
- Texture displays: a passive approach to tactile presentation (CH, SEH), pp. 2261–2264.
- CHI-2009-LawRHVK #comprehension #experience #overview #user interface
- Understanding, scoping and defining user experience: a survey approach (ELCL, VR, MH, APOSV, JK), pp. 719–728.
- CHI-2009-SchechterER #authentication #social #what
- It’s not what you know, but who you know: a social approach to last-resort authentication (SES, SE, RWR), pp. 1983–1992.
- DHM-2009-AksenovVLC
- Ambient Compass: One Approach to Model Spatial Relations (PA, GV, KL, KC), pp. 183–191.
- DHM-2009-BurghardtK #behaviour #modelling #probability #smarttech
- A Probabilistic Approach for Modeling Human Behavior in Smart Environments (CB, TK), pp. 202–210.
- DHM-2009-ClavelM #modelling #multimodal #named #permutation
- PERMUTATION: A Corpus-Based Approach for Modeling Personality and Multimodal Expression of Affects in Virtual Characters (CC, JCM), pp. 211–220.
- DHM-2009-JunLS #fault #simulation
- A Simulation Approach to Understand the Viability of RFID Technology in Reducing Medication Dispensing Errors (EJ, JL, XS), pp. 531–539.
- DHM-2009-MobusE #modelling #programming #towards
- Further Steps towards Driver Modeling According to the Bayesian Programming Approach (CM, ME), pp. 413–422.
- DHM-2009-SakellariouCWCA #novel
- A Novel Approach to CT Scans’ Interpretation via Incorporation into a VR Human Model (SS, VC, BMW, DC, PA), pp. 550–559.
- HCD-2009-AdnanND #difference
- Examining Individual Differences Effects: An Experimental Approach (WAWA, NLMN, NGND), pp. 570–575.
- HCD-2009-Eraslan #evaluation #multi #usability
- Usability Evaluation of Mp3/CD Players: A Multi-Criteria Decision Making Approach (EE), pp. 55–64.
- HCD-2009-GuessardPBMS #concept
- Ergonomic Approach for the Conception of a Theatre Medical Regulation System (WG, AP, RB, POM, AS), pp. 965–971.
- HCD-2009-KrohnKH #design #development #web
- User-Centered Design Meets Feature-Driven Development: An Integrating Approach for Developing the Web Application myPIM (TK, MCK, MH), pp. 739–748.
- HCD-2009-Kurosu
- Full Description Persona vs. Trait List Persona in the Persona-Based sHEM Approach (MK), pp. 230–238.
- HCD-2009-PohlmeyerBWM #experience #user interface
- The Value of Answers without Question[s]: A Qualitative Approach to User Experience and Aging (AEP, LTMB, HW, JM), pp. 894–903.
- HCD-2009-Yamazaki #design #prototype
- Approach to Human Centered Design Innovation by Utilized Paper Prototyping (KY), pp. 367–373.
- HCI-AUII-2009-BamidisFKLLKBPP #recognition
- An Integrated Approach to Emotion Recognition for Advanced Emotional Intelligence (PDB, CAF, EIK, AL, CDL, MAK, CB, CLP, CP), pp. 565–574.
- HCI-AUII-2009-BlanchardML #human-computer #ontology
- Addressing the Interplay of Culture and Affect in HCI: An Ontological Approach (EGB, RM, SPL), pp. 575–584.
- HCI-AUII-2009-MillardS #interactive #ubiquitous
- An Embodied Approach for Engaged Interaction in Ubiquitous Computing (MOM, FS), pp. 464–472.
- HCI-NIMT-2009-Alexandris #editing #process
- A Speech-Act Oriented Approach for User-Interactive Editing and Regulation Processes Applied in Written and Spoken Technical Texts (CA), pp. 645–653.
- HCI-NIMT-2009-ParviniMSNZG #gesture #recognition
- An Approach to Glove-Based Gesture Recognition (FP, DM, CS, BN, BZ, SG), pp. 236–245.
- HCI-NIMT-2009-QueirozFBF #evaluation #multimodal #towards #user interface
- Towards a Multidimensional Approach for the Evaluation of Multimodal Application User Interfaces (JERdQ, JMF, AEVB, DdSF), pp. 29–38.
- HCI-NT-2009-AdikariMC #agile #design #requirements #usability
- Little Design Up-Front: A Design Science Approach to Integrating Usability into Agile Requirements Engineering (SA, CM, JAC), pp. 549–558.
- HCI-NT-2009-EliassonPR #design #interactive
- Embodied Interaction or Context-Aware Computing? An Integrated Approach to Design (JE, TCP, RR), pp. 606–615.
- HCI-NT-2009-QueirozF #evaluation #mobile #multi #user interface
- A Multidimensional Approach for the Evaluation of Mobile Application User Interfaces (JERdQ, DdSF), pp. 242–251.
- HCI-VAD-2009-Al-NanihAO #health #human-computer #information management #modelling
- New Health Information Systems (HIS) Quality-in-Use Model Based on the GQM Approach and HCI Principles (RAN, HAN, OO), pp. 429–438.
- HCI-VAD-2009-ArditoBCLS #scheduling #visualisation
- An Information Visualization Approach to Hospital Shifts Scheduling (CA, PB, MFC, RL, ALS), pp. 439–447.
- HCI-VAD-2009-EssabbahOHM #analysis #design #interactive
- A New Approach to Design an Interactive System for Molecular Analysis (ME, SO, JH, MM), pp. 713–722.
- HCI-VAD-2009-LilleyP #assessment
- The Application of the Flexilevel Approach for the Assessment of Computer Science Undergraduates (ML, AP), pp. 140–148.
- HIMI-DIE-2009-HorvathLK #analysis #data mining #mining #usability
- Usability Analyses of CRM Systems in Call Centers: The Data Mining Approach (ÁH, LL, AK), pp. 40–48.
- HIMI-DIE-2009-Ocenasek09a #communication #design #embedded
- An Approach for the Design of Secure Communication in Embedded Systems (PO), pp. 579–586.
- HIMI-II-2009-AyodeleZK #email #machine learning #predict
- Email Reply Prediction: A Machine Learning Approach (TA, SZ, RK), pp. 114–123.
- HIMI-II-2009-BaekPY #comprehension #mobile
- Understanding Key Attributes in Mobile Service: Kano Model Approach (SIB, SKP, WSY), pp. 355–364.
- HIMI-II-2009-GiakoumisTKBH #mobile #towards
- An Integrated Approach towards the Homogeneous Provision of Geographically Dispersed Info-Mobility Services to Mobile Users (DG, DT, DK, EB, GH), pp. 385–394.
- HIMI-II-2009-MinC #generative #personalisation #privacy
- An Interactive-Content Technique Based Approach to Generating Personalized Advertisement for Privacy Protection (WHM, YGC), pp. 185–191.
- HIMI-II-2009-RingardDPC #collaboration
- Computer-Aided Collaborative Work into War Rooms: A New Approach of Collaboration (JR, SD, SLDP, CC), pp. 835–844.
- HIMI-II-2009-SawaragiIHN #identification #using
- Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
- IDGD-2009-Howe #categorisation
- Anthropomorphic Systems: An Approach for Categorization (KH), pp. 173–179.
- OCSC-2009-AlmeidaNMHB #design #network #social
- Designing Inclusive Social Networks: A Participatory Approach (LDAA, VPdAN, LCdM, ECSH, MCCB), pp. 653–662.
- OCSC-2009-PhillipsGS #behaviour #visualisation
- A Visualization Approach for Group Behaviors, Beliefs and Intentions to Support Critical Decisions (CLP, NDG, JTS), pp. 91–100.
- CAiSE-2009-WeberRZW #declarative #empirical #execution #process
- The Declarative Approach to Business Process Execution: An Empirical Test (BW, HAR, SZ, WW), pp. 470–485.
- EDOC-2009-RosenbergCMLD #composition
- An End-to-End Approach for QoS-Aware Service Composition (FR, PC, AM, PL, SD), pp. 151–160.
- ICEIS-AIDSS-2009-BoryczkaK #heuristic
- A New Heuristic Function in Ant-miner Approach (UB, JK), pp. 33–38.
- ICEIS-AIDSS-2009-CastroAP #concept #implementation #metadata #named #using
- K-annotations — An Approach for Conceptual Knowledge Implementation using Metadata Annotations (ESEC, MA, RTP), pp. 66–72.
- ICEIS-AIDSS-2009-TsengCH #assembly #multi #sequence #using
- A Decision Support System for Multi-plant Assembly Sequence Planning using a PSO Approach (YJT, JYC, FYH), pp. 124–129.
- ICEIS-DISI-2009-Daute #database #maintenance #realtime
- Introducing Real-time Business Case Database — An Approach to Improve System Maintenance of Complex Application Landscapes (OD), pp. 202–207.
- ICEIS-DISI-2009-MartinsS #evolution #ontology #semantics
- A User-driven and a Semantic-based Ontology Mapping Evolution Approach (HM, NS), pp. 214–221.
- ICEIS-DISI-2009-MoserMBM #integration #modelling #performance #requirements #semantics #using
- Efficient System Integration using Semantic Requirements and Capability Models — An Approach for Integrating Heterogeneous Business Services (TM, RM, SB, AM), pp. 56–63.
- ICEIS-DISI-2009-PyCBT #integration #modelling #process
- A Service-based Approach for Data Integration based on Business Process Models (HP, LC, FAB, AKT), pp. 222–227.
- ICEIS-ISAS-2009-AzevedoSBSLCS #architecture #enterprise #ontology
- Enterprise Ontology Management — An Approach based on Information Architecture (LGA, SWMS, FAB, JdS, ML, CC, FMS), pp. 243–248.
- ICEIS-ISAS-2009-EspindolaA #integration #modelling #quality
- An Evolutionary Approach for Quality Models Integration (RSdE, JLNA), pp. 231–236.
- ICEIS-ISAS-2009-FerriniB #policy
- A Comprehensive Approach for Solving Policy Heterogeneity (RF, EB), pp. 63–68.
- ICEIS-ISAS-2009-HastbackaK #automation #development
- A Service Oriented Engineering Approach to Enhance the Development of Automation and Control Systems (DH, SK), pp. 219–224.
- ICEIS-ISAS-2009-LundbergG #distributed #information management #robust #towards
- Robust Approach Towards Context Dependant Information Sharing in Distributed Environments (JL, RG), pp. 200–205.
- ICEIS-ISAS-2009-MacielSMR #development #modelling #process #specification
- An Approach to Model-driven Development Process Specification (RSPM, BCdS, APFM, NSR), pp. 27–32.
- ICEIS-ISAS-2009-MansourH #database #framework #rule-based #using #xml
- A Rule-based Approach and Framework for Managing Best Practices — An XML-based Management using Pure Database System Utilities (EM, HH), pp. 109–115.
- ICEIS-ISAS-2009-OhmoriK #development #enterprise #invariant
- Enterprise System Development with Invariant Preserving — A Mathematical Approach by the Homotopy Lifting and Extension Properties (KO, TLK), pp. 116–123.
- ICEIS-ISAS-2009-PereiraSS #concept #process #scalability #semantics
- A Socio-semantic Approach to the Conceptualisation of Domains, Processes and Tasks in Large Projects (CP, CS, ALS), pp. 237–242.
- ICEIS-ISAS-2009-SarmientoBC #detection #interactive #requirements
- Applying an Event-based Approach for Detecting Requirements Interaction (ES, MRSB, MLMC), pp. 225–230.
- ICEIS-J-2009-IorioSVM #detection #documentation #multi
- A Natural and Multi-layered Approach to Detect Changes in Tree-Based Textual Documents (ADI, MS, FV, CM), pp. 90–101.
- ICEIS-J-2009-NerisB #interface
- Interfaces for All: A Tailoring-Based Approach (VPdAN, MCCB), pp. 928–939.
- ICEIS-J-2009-NguyenH #documentation
- Frequent Subgraph-Based Approach for Classifying Vietnamese Text Documents (TANH, KH), pp. 299–308.
- ICEIS-J-2009-NunesKNLC #analysis #multi #product line
- A Domain Analysis Approach for Multi-agent Systems Product Lines (IN, UK, CN, CJPdL, EC), pp. 716–727.
- ICEIS-J-2009-WauteletAKK #component #development #framework
- A Service-Oriented Framework for Component-Based Software Development: An i* Driven Approach (YW, YA, SK, MK), pp. 551–563.
- CIKM-2009-AnastasakosHKR #collaboration #graph #recommendation #using
- A collaborative filtering approach to ad recommendation using the query-ad click graph (TA, DH, SK, HR), pp. 1927–1930.
- CIKM-2009-ArampatzisK #normalisation
- A signal-to-noise approach to score normalization (AA, JK), pp. 797–806.
- CIKM-2009-GardnerX #automation #detection #sequence
- Automatic link detection: a sequence labeling approach (JJG, LX), pp. 1701–1704.
- CIKM-2009-GedikAW #code generation #data type #distributed #optimisation
- A code generation approach to optimizing high-performance distributed data stream processing (BG, HA, KLW), pp. 847–856.
- CIKM-2009-KuttyNL #clustering #documentation #named #using #xml
- XCFS: an XML documents clustering approach using both the structure and the content (SK, RN, YL), pp. 1729–1732.
- CIKM-2009-LeeCKC #dependence #query #ranking
- A term dependency-based approach for query terms ranking (CJL, RCC, SHK, PJC), pp. 1267–1276.
- CIKM-2009-LeeNL #feedback #retrieval #using
- An improved feedback approach using relevant local posts for blog feed retrieval (YL, SHN, JHL), pp. 1971–1974.
- CIKM-2009-MomtaziK #clustering #modelling #retrieval #word
- A word clustering approach for language model-based sentence retrieval in question answering systems (SM, DK), pp. 1911–1914.
- CIKM-2009-SvoreB #machine learning #retrieval
- A machine learning approach for improved BM25 retrieval (KMS, CJCB), pp. 1811–1814.
- CIKM-2009-WuCZZ #definite clause grammar #learning #novel #rank #using
- Smoothing DCG for learning to rank: a novel approach using smoothed hinge functions (MW, YC, ZZ, HZ), pp. 1923–1926.
- CIKM-2009-YuLC #information management #probability
- An integrated discriminative probabilistic approach to information extraction (XY, WL, BC), pp. 325–334.
- ECIR-2009-RajuPV
- An Unsupervised Approach to Product Attribute Extraction (SR, PP, VV), pp. 796–800.
- ICML-2009-KamisettyL #assessment #quality
- A Bayesian approach to protein model quality assessment (HK, CJL), pp. 481–488.
- KDD-2009-AsurP #analysis #graph #interactive
- A viewpoint-based approach for interaction graph analysis (SA, SP), pp. 79–88.
- KDD-2009-DuJDLT #migration #mining
- Migration motif: a spatial — temporal pattern mining approach for financial markets (XD, RJ, LD, VEL, JHTJ), pp. 1135–1144.
- KDD-2009-FrankEK #classification #multi
- A multi-relational approach to spatial classification (RF, ME, AJK), pp. 309–318.
- KDD-2009-LoCHKS #behaviour #classification #detection #mining
- Classification of software behaviors for failure detection: a discriminative pattern mining approach (DL, HC, JH, SCK, CS), pp. 557–566.
- KDD-2009-NijssenGR #constraints #correlation #mining #programming
- Correlated itemset mining in ROC space: a constraint programming approach (SN, TG, LDR), pp. 647–656.
- KDD-2009-PandeyASMK #analysis #clustering
- An association analysis approach to biclustering (GP, GA, MS, CLM, VK), pp. 677–686.
- KDD-2009-YangJCZ #community #detection
- Combining link and content for community detection: a discriminative approach (TY, RJ, YC, SZ), pp. 927–936.
- KDIR-2009-GhemtioSDSM #design
- A KDD Approach for Designing Filtering Strategies to Improve Virtual Screening (LG, MST, MDD, MS, BM), pp. 146–151.
- KDIR-2009-KiranR
- An Improved Frequent Pattern-growth Approach to Discover Rare Association Rules (RUK, PKR), pp. 43–52.
- KDIR-2009-Weichselbraun #optimisation
- A Utility Centered Approach for Evaluating and Optimizing Geo-tagging (AW), pp. 134–139.
- KEOD-2009-AnderlMS #complexity #optimisation #reduction
- An Approach to Support Interdisciplinary Variant Diversity Optimization — Planning Variant Diversity — Beyond Complexity Reduction (RA, SM, DS), pp. 408–411.
- KEOD-2009-Essert-VillardBS #multi #semantics #towards
- Multi-semantic Approach Towards a Generic Formal Solver of Tool Placement for Percutaneous Surgery (CEV, CB, PS), pp. 443–446.
- KEOD-2009-GoczylaWW #knowledge base #named #semantics
- S-modules — Approach to Capture Semantics of Modularized DL Knowledge Bases (KG, AW, WW), pp. 117–122.
- KEOD-2009-GrozaH #hybrid #metadata #towards
- A Hybrid Approach Towards Information Expansion based on Shallow and Deep Metadata (TG, SH), pp. 109–116.
- KEOD-2009-Haddad #probability #representation #towards #word
- Representation of Arabic Words — An Approach Towards Probabilistic Root-Pattern Relationships (BH), pp. 147–152.
- KEOD-2009-HlomaniS #composition #ontology
- An Ontology Driven Approach to Software Systems Composition (HH, DAS), pp. 254–260.
- KEOD-2009-MoulinL #distributed #ontology #semantics
- Ontologies based Approach for Semantic Indexing in Distributed Environments (CM, CL), pp. 420–423.
- KEOD-2009-SassiJG #how #maintenance #ontology
- How to Evolve Ontology and Maintain Its Coherence — A Corrective Operations-based Approach (NS, WJ, FG), pp. 384–387.
- KMIS-2009-BounhasS #analysis #documentation #social
- A Social Approach for Document Analysis (IB, YS), pp. 95–102.
- KMIS-2009-CastellanoD #grid #workflow
- A Workflow based Approach for Knowledge Grid Application (MC, CD), pp. 230–235.
- KMIS-2009-GallupMZRO #collaboration #information management #self
- Facilitating Decision Making, Re-use and Collaboration — A Knowledge Management Approach for System Self-Awareness (SPG, DJM, YZ, JR, CO), pp. 236–241.
- KMIS-2009-KoznovMSN #industrial #information management #modelling #testing
- A Knowledge Management Approach for Industrial Model-based Testing (DK, VM, ES, MN), pp. 200–205.
- KMIS-2009-SaadaouiM #development
- Improving Software Development in SME through Knowledge Sharing — A Practical Approach (SS, FFM), pp. 313–317.
- KMIS-2009-SeifertEHSKRN #information management #library #named #visualisation
- DiLiA — a Digital Library Assistant — A New Approach to Information Discovery through Information Extraction and Visualization (IS, KE, HH, SS, MK, NR, GN), pp. 180–185.
- KMIS-2009-SerranoA #implementation #information management #towards
- Knowledge Management Implementation Methodology — Towards a Practical Approach (DBS, RMdA), pp. 305–308.
- MLDM-2009-AbdalaJ #clustering
- An Evidence Accumulation Approach to Constrained Clustering Combination (DDA, XJ), pp. 361–371.
- MLDM-2009-BenabdeslemS #clustering #probability
- A Probabilistic Approach for Constrained Clustering with Topological Map (KB, JS), pp. 413–426.
- MLDM-2009-DereliogluGO #analysis
- A Neural Approach for SME’s Credit Risk Analysis in Turkey (GD, FSG, NO), pp. 749–759.
- MLDM-2009-FersiniMAA #multi #recognition
- Audio-Based Emotion Recognition in Judicial Domain: A Multilayer Support Vector Machines Approach (EF, EM, GA, FA), pp. 594–602.
- MLDM-2009-Mendes-MoreiraJSS #case study #learning
- Ensemble Learning: A Study on Different Variants of the Dynamic Selection Approach (JMM, AMJ, CS, JFdS), pp. 191–205.
- MLDM-2009-MendesA #mining #natural language
- Pattern Mining with Natural Language Processing: An Exploratory Approach (ACM, CA), pp. 266–279.
- MLDM-2009-SarmentoKOU09a #ambiguity
- An Approach to Web-Scale Named-Entity Disambiguation (LS, AK, ECO, LHU), pp. 689–703.
- RecSys-2009-BaragliaCCFFPS #query #recommendation
- Search shortcuts: a new approach to the recommendation of queries (RB, FC, VC, DF, VF, RP, FS), pp. 77–84.
- RecSys-2009-GunawardanaM #hybrid #recommendation
- A unified approach to building hybrid recommender systems (AG, CM), pp. 117–124.
- RecSys-2009-LuAD #collaboration
- A spatio-temporal approach to collaborative filtering (ZL, DA, ISD), pp. 13–20.
- SEKE-2009-AlvesPCL #development #lifecycle #lightweight #outsourcing
- From Strategy to Solution: A Lightweight Semi-prescriptive Approach for Software Development Lifecycle with Outsourcing Support (NA, SP, AC, ELJ), pp. 672–675.
- SEKE-2009-ChangH #adaptation #aspect-oriented #modelling #towards
- Towards Adaptable BDI Agent: A Formal Aspect-oriented Modeling Approach (LC, XH), pp. 189–193.
- SEKE-2009-ChenZLLYLGW #development #embedded #ontology
- An Ontology-based Approach to Portable Embedded System Development (FC, HZ, JL, RL, HY, HL, HG, YW), pp. 569–574.
- SEKE-2009-LiangKS #automation #case study #diagrams
- Automatic Class Matching to Compare Extracted Class Diagrams: Approach and Case Study (YL, NAK, RKS), pp. 268–273.
- SEKE-2009-LounisAS #impact analysis #maintenance #predict
- Predicting Maintainability expressed as Change Impact: A Machine-learning-based Approach (HL, MKA, HAS), pp. 122–128.
- SEKE-2009-McElroyR #nondeterminism
- A Layered Approach for Planning Releases under Uncertain Capacities (JM, GR), pp. 649–654.
- SEKE-2009-MomeniRSR #graph transformation #network
- A Graph Transformation-based Approach to Task Allocation in Wireless Sensor Actor Networks (HM, VR, MS, ATR), pp. 609–612.
- SEKE-2009-TianCYL #learning #modelling #music #ontology
- An Ontology-based Model Driven Approach for a Music Learning System (YT, FC, HY, LL), pp. 739–744.
- SIGIR-2009-AmatriainLPKO #collaboration #web
- The wisdom of the few: a collaborative filtering approach based on expert opinions from the web (XA, NL, JMP, HK, NO), pp. 532–539.
- SIGIR-2009-BrunoM #clustering #modelling #multi #using
- Multiview clustering: a late fusion approach using latent models (EB, SMM), pp. 736–737.
- SIGIR-2009-HongD #classification
- A classification-based approach to question answering in discussion boards (LH, BDD), pp. 171–178.
- SIGIR-2009-HuangH #information retrieval #learning #ranking
- A bayesian learning approach to promoting diversity in ranking for biomedical information retrieval (XH, QH), pp. 307–314.
- SIGIR-2009-JiangHL #ranking
- A ranking approach to keyphrase extraction (XJ, YH, HL), pp. 756–757.
- SIGIR-2009-LinYCWW #modelling #semantics #thread
- Simultaneously modeling semantics and structure of threaded discussions: a sparse coding approach and its applications (CL, JMY, RC, XJW, WW, LZ), pp. 131–138.
- SIGIR-2009-WangMC
- A syntactic tree matching approach to finding similar questions in community-based qa services (KW, ZM, TSC), pp. 187–194.
- SIGIR-2009-YeHL #graph #mining #multi #wiki #word
- A graph-based approach to mining multilingual word associations from wikipedia (ZY, XH, HL), pp. 690–691.
- ECMDA-FA-2009-AmeedeenBA #analysis #modelling
- A Model Driven Approach to the Analysis of Timeliness Properties (MAA, BB, RA), pp. 221–236.
- ECMDA-FA-2009-DanielePS #behaviour #mobile #modelling
- An MDA-Based Approach for Behaviour Modelling of Context-Aware Mobile Applications (LD, LFP, MvS), pp. 206–220.
- ECMDA-FA-2009-KublerG #mining #qvt #using
- A Pattern Mining Approach Using QVT (JK, TG), pp. 50–65.
- ECMDA-FA-2009-StefanescuWK #modelling #named #testing
- MBT4Chor: A Model-Based Testing Approach for Service Choreographies (AS, SW, AK), pp. 313–324.
- ICMT-2009-HettelLR #abduction #towards
- Towards Model Round-Trip Engineering: An Abductive Approach (TH, ML, KR), pp. 100–115.
- ICMT-2009-Stevens #game studies #qvt
- A Simple Game-Theoretic Approach to Checkonly QVT Relations (PS), pp. 165–180.
- MoDELS-2009-ChengSBW #adaptation #modelling #nondeterminism #requirements
- A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty (BHCC, PS, NB, JW), pp. 468–483.
- MoDELS-2009-MoiseevHS #generative #implementation #ocl
- Generating Assertion Code from OCL: A Transformational Approach Based on Similarities of Implementation Languages (RM, SH, MS), pp. 650–664.
- MoDELS-2009-YieCWD #evolution
- An Approach for Evolving Transformation Chains (AY, RC, DW, DD), pp. 551–555.
- MoDELS-2009-YueBL #analysis #case study #concept #empirical #evaluation #modelling #towards
- A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
- SPLC-2009-CarbonAU #product line #towards
- Towards a product line approach for office devices: facilitating customization of office devices at Ricoh Co. Ltd (RC, SA, TU), pp. 151–160.
- SPLC-2009-TunBCHH #feature model #requirements
- Relating requirements and feature configurations: a systematic approach (TTT, QB, AC, AH, PH), pp. 201–210.
- MoDELS-2009-ChengSBW #adaptation #modelling #nondeterminism #requirements
- A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty (BHCC, PS, NB, JW), pp. 468–483.
- MoDELS-2009-MoiseevHS #generative #implementation #ocl
- Generating Assertion Code from OCL: A Transformational Approach Based on Similarities of Implementation Languages (RM, SH, MS), pp. 650–664.
- MoDELS-2009-YieCWD #evolution
- An Approach for Evolving Transformation Chains (AY, RC, DW, DD), pp. 551–555.
- MoDELS-2009-YueBL #analysis #case study #concept #empirical #evaluation #modelling #towards
- A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
- OOPSLA-2009-NandaMSS #automation #model transformation
- Demystifying model transformations: an approach based on automated rule inference (MGN, SM, VSS, SS), pp. 341–360.
- TOOLS-EUROPE-2009-KastnerATKB #correctness #independence #product line
- Guaranteeing Syntactic Correctness for All Product Line Variants: A Language-Independent Approach (CK, SA, ST, MK, DSB), pp. 175–194.
- LOPSTR-2009-PilozziSB #constraints #proving
- A Transformational Approach for Proving Properties of the CHR Constraint Store (PP, TS, MB), pp. 22–36.
- PLDI-2009-ChandraFS #named
- Snugglebug: a powerful approach to weakest preconditions (SC, SJF, MS), pp. 363–374.
- PLDI-2009-SubramanianHM
- Dynamic software updates: a VM-centric approach (SS, MWH, KSM), pp. 1–12.
- PLDI-2009-TournavitisWFO #detection #parallel #towards
- Towards a holistic approach to auto-parallelization: integrating profile-driven parallelism detection and machine-learning based mapping (GT, ZW, BF, MFPO), pp. 177–187.
- POPL-2009-BoudolP #memory management #modelling
- Relaxed memory models: an operational approach (GB, GP), pp. 392–403.
- POPL-2009-Ridge #distributed #verification
- Verifying distributed systems: the operational approach (TR), pp. 429–440.
- POPL-2009-TateSTL #optimisation #similarity
- Equality saturation: a new approach to optimization (RT, MS, ZT, SL), pp. 264–276.
- SIGAda-2009-Knight #ada #named #verification
- Echo: a new approach to formal verification based on Ada (JK), pp. 85–86.
- RE-2009-Breaux #requirements
- Exercising Due Diligence in Legal Requirements Acquisition: A Tool-supported, Frame-Based Approach (TDB), pp. 225–230.
- RE-2009-LongLYJ #evaluation #requirements #security
- AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment (TL, LL, YY, ZJ), pp. 377–378.
- RE-2009-MavinWHN #requirements #syntax
- Easy Approach to Requirements Syntax (EARS) (AM, PW, AH, MN), pp. 317–322.
- RE-2009-WangZZJM #case study #feature model #modelling
- A Use Case Based Approach to Feature Models’ Construction (BW, WZ, HZ, ZJ, HM), pp. 121–130.
- REFSQ-2009-TunYLN #identification #interactive #problem
- Early Identification of Problem Interactions: A Tool-Supported Approach (TTT, YY, RCL, BN), pp. 74–88.
- REFSQ-2009-VaraS #lessons learnt #specification
- BPMN-Based Specification of Task Descriptions: Approach and Lessons Learnt (JLdlV, JS), pp. 124–138.
- ASE-2009-DeanPMW #automation #fault #linear #locality #multi #programming
- A Linear Programming Approach for Automated Localization of Multiple Faults (BCD, WBP, BAM, AAW), pp. 640–644.
- ASE-2009-DenneyF #documentation #traceability
- A Verification-Driven Approach to Traceability and Documentation for Auto-Generated Mathematical Software (ED, BF), pp. 560–564.
- ASE-2009-KiS #development #open source
- An Open Source-Based Approach to Software Development Infrastructures (YK, MS), pp. 525–529.
- ASE-2009-LalanneMOCMG #automation #testing
- An Automated Passive Testing Approach for the IMS PoC Service (FL, SM, EMdO, ARC, WM, AG), pp. 535–539.
- ASE-2009-LinTCZ #adaptation #java #random testing #source code #testing
- A Divergence-Oriented Approach to Adaptive Random Testing of Java Programs (YL, XT, YC, JZ), pp. 221–232.
- ASE-2009-Meads #mobile
- A Holistic Approach to Mobile Service Provisioning (AJDM), pp. 698–702.
- ASE-2009-WangM #configuration management #requirements #self
- Self-Repair through Reconfiguration: A Requirements Engineering Approach (YW, JM), pp. 257–268.
- ESEC-FSE-2009-QiRLV #debugging #evolution #named #source code
- Darwin: an approach for debugging evolving programs (DQ, AR, ZL, KV), pp. 33–42.
- ICSE-2009-Zhang #aspect-oriented #java #named
- FlexSync: An aspect-oriented approach to Java synchronization (CZ), pp. 375–385.
- SAC-2009-AgentA #problem
- Extending Problem Frames to deal with stakeholder problems: An Agent- and Goal-Oriented Approach (SS, LC), pp. 389–394.
- SAC-2009-AneddaGM #virtual machine
- A general service oriented approach for managing virtual machines allocation (PA, MG, SM), pp. 2154–2161.
- SAC-2009-Bouarab-DahmaniSCC #automation #evaluation
- Learners automated evaluation with the ODALA approach (FBD, MSM, CC, PJC), pp. 98–103.
- SAC-2009-CaladoBB #automation #composition #metric #semantics #similarity #web #web service
- An approach for semantic web services automatic discovery and composition with similarity metrics (IC, HB, IIB), pp. 694–695.
- SAC-2009-CavalliMO #consistency #protocol #testing
- A passive conformance testing approach for a MANET routing protocol (ARC, SM, EMdO), pp. 207–211.
- SAC-2009-ChavezSL #detection #uml
- An approach to detection of UML-based ownership violation (HMC, WS, SL), pp. 541–542.
- SAC-2009-HidakaHKN #composition #development #model transformation #towards
- Towards a compositional approach to model transformation for software development (SH, ZH, HK, KN), pp. 468–475.
- SAC-2009-HuangSMZH #using
- A new cross-training approach by using labeled data (DH, ES, GM, HZ, CCH), pp. 941–942.
- SAC-2009-JesiMNS
- Prestige-based peer sampling service: interdisciplinary approach to secure gossip (GPJ, EM, SKN, MvS), pp. 1209–1213.
- SAC-2009-LimaH #using
- Computing data cubes using exact sub-graph matching: the sequential MCG approach (JdCL, CMH), pp. 1541–1548.
- SAC-2009-LiuMZ #dependence #evolution #identification
- An approach to identifying conversation dependency in service oriented system during dynamic evolution (ML, DM, YZ), pp. 1072–1073.
- SAC-2009-MaoLPCH #detection #learning #multi
- Semi-supervised co-training and active learning based approach for multi-view intrusion detection (CHM, HML, DP, TC, SYH), pp. 2042–2048.
- SAC-2009-ParkYAMP #algorithm #detection #novel #search-based #segmentation #using
- A novel approach to detect copy number variation using segmentation and genetic algorithm (CP, YY, JA, MM, SP), pp. 788–792.
- SAC-2009-SchmidtSS #personalisation #social #using #web
- Socially filtered web search: an approach using social bookmarking tags to personalize web search (KUS, TS, LS), pp. 670–674.
- SAC-2009-SchneidewindH #reliability #testing
- A consumer/producer approach to risk-driven software reliability and testing (NFS, MH), pp. 537–538.
- SAC-2009-SilvaAM #component #empirical #testing #validation
- An approach for component testing and its empirical validation (FRCS, ESdA, SRdLM), pp. 574–581.
- SAC-2009-SilvaML #automation #heuristic
- Heuristic approach for automated shelf space allocation (DLS, FM, KL), pp. 922–928.
- SAC-2009-SongKS #aspect-oriented #modelling #verification
- A property-based verification approach in aspect-oriented modeling (ES, HK, WS), pp. 545–546.
- SAC-2009-ThanheiserLS #assessment #named #simulation
- SimSOA: an approach for agent-based simulation and design-time assessment of SOC-based IT systems (ST, LL, HS), pp. 2162–2169.
- SAC-2009-TreDWMC
- Heterogeneous bipolar criteria satisfaction handling in geographical decision support systems: an LSP based approach (GDT, JJD, NVdW, TM, NC), pp. 1704–1708.
- SAC-2009-YangLLW #approximate #constraints #theorem proving
- An approximate approach to constraint solving in soft sensing (TY, ZL, XL, HW), pp. 1415–1416.
- GPCE-2009-CassouBLC #generative #pervasive #programming
- A generative programming approach to developing pervasive computing systems (DC, BB, NL, CC), pp. 137–146.
- GPCE-2009-SanenTJ #feature model #interactive #problem
- Mapping problem-space to solution-space features: a feature interaction approach (FS, ET, WJ), pp. 167–176.
- SLE-2009-LevendovszkyBNK #automation #domain-specific language #evolution #model transformation #novel
- A Novel Approach to Semi-automated Evolution of DSML Model Transformation (TL, DB, AN, GK), pp. 23–41.
- SLE-2009-WendeTZ #composition #towards
- A Role-Based Approach towards Modular Language Engineering (CW, NT, SZ), pp. 254–273.
- ASPLOS-2009-DimitrovZ #automation #debugging #predict #validation
- Anomaly-based bug prediction, isolation, and validation: an automated approach for software debugging (MD, HZ), pp. 61–72.
- CASE-2009-BiradarM #multi #reliability
- Reliable ring based multicast routing scheme in MANET: An agent based approach (RCB, SSM), pp. 507–512.
- CASE-2009-ChakiC #automation #fuzzy #multi #using
- An Automatic decission support system for medical instrument suppliers using fuzzy multifactor based approach (AC, TC), pp. 158–163.
- CASE-2009-HuangL #assessment #effectiveness #multi
- A multi-disciplinary approach for effective hand rehabilitation with clinical-based assessment outcomes (YYH, KHL), pp. 597–603.
- CASE-2009-LeCS #assembly
- A path planning approach to (dis)assembly sequencing (DTL, JC, TS), pp. 286–291.
- CASE-2009-PattanaikC #ecosystem
- Services innovation — digital ecosystem approach to dissemination and co-creation of knowledge for Indian Agriculture Extension Services (DP, JC), pp. 65–70.
- CASE-2009-SuCFTJKL #identification #information management #novel #ontology
- A novel ontology-based knowledge engineering approach for yield symptom identification in semiconductor manufacturing (FHS, SCC, CMF, YJT, JJ, CPK, CYL), pp. 433–438.
- CASE-2009-WuCCZ #clustering #novel #scheduling #tool support
- A novel approach to scheduling of single-arm cluster tools with wafer revisiting (NW, FC, CC, MZ), pp. 567–572.
- CGO-2009-CuthbertsonVBAS #hardware #monitoring #optimisation #performance #virtual machine
- A Practical Approach to Hardware Performance Monitoring Based Dynamic Optimizations in a Production JVM (JC, SV, KB, AA, EK, US), pp. 190–199.
- DAC-2009-MutluLMC #analysis #parametricity
- A parametric approach for handling local variation effects in timing analysis (AAM, JL, RM, MC), pp. 126–129.
- DAC-2009-WangH #embedded #performance #simulation
- An efficient approach for system-level timing simulation of compiler-optimized embedded software (ZW, AH), pp. 220–225.
- DATE-2009-AvnitS #design #formal method #protocol
- A formal approach to design space exploration of protocol converters (KA, AS), pp. 129–134.
- DATE-2009-CostaM #embedded
- A MILP-based approach to path sensitization of embedded software (JCC, JCM), pp. 1568–1571.
- DATE-2009-DasV #automation #design #grammarware #graph grammar #multi
- A graph grammar based approach to automated multi-objective analog circuit design (AD, RV), pp. 700–705.
- DATE-2009-GuptaRHWB
- An event-guided approach to reducing voltage noise in processors (MSG, VJR, GHH, GYW, DMB), pp. 160–165.
- DATE-2009-LuGUH #development #novel
- A novel approach to entirely integrate Virtual Test into test development flow (PL, DG, GU, KH), pp. 797–802.
- DATE-2009-MrabtiPB #design
- Extending IP-XACT to support an MDE based approach for SoC design (AEM, FP, AB), pp. 586–589.
- DATE-2009-MukherjeeAPMD #behaviour #formal method #generative
- A formal approach for specification-driven AMS behavioral model generation (SM, AA, SKP, RM, PD), pp. 1512–1517.
- DATE-2009-MullerWJSM #linear #modelling #testing
- An approach to linear model-based testing for nonlinear cascaded mixed-signal systems (RM, CW, HJJ, SS, HM), pp. 1662–1667.
- DATE-2009-PlishkerSB #data flow #scheduling
- A generalized scheduling approach for dynamic dataflow applications (WP, NS, SSB), pp. 111–116.
- DATE-2009-SabeghiB #configuration management #runtime #towards
- Toward a runtime system for reconfigurable computers: A virtualization approach (MS, KB), pp. 1576–1579.
- DATE-2009-ShafiqueBH #design #hardware #parallel #performance #predict #video
- A parallel approach for high performance hardware design of intra prediction in H.264/AVC Video Codec (MS, LB, JH), pp. 1434–1439.
- DATE-2009-VidalLGSD #co-evolution #code generation #design #embedded #modelling #uml
- A co-design approach for embedded system modeling and code generation with UML and MARTE (JV, FdL, GG, PS, JPD), pp. 226–231.
- HPDC-2009-QinFP #automation #composition #graph #grid #novel #quality #workflow
- A novel graph based approach for automatic composition of high quality grid workflows (JQ, TF, RP), pp. 167–176.
- ISMM-2009-OanceaMW #algorithm
- A new approach to parallelising tracing algorithms (CEO, AM, SMW), pp. 10–19.
- PDP-2009-ZhaoMLHH #architecture #evolution #graph transformation #runtime
- A Graph Transformation based Approach for Runtime Constrained Evolution of Service-Oriented Architectures (YZ, DM, ML, CH, YH), pp. 203–209.
- PPoPP-2009-ScottEVNTOLNNPMWNV
- A tunable holistic resiliency approach for high-performance computing systems (SLS, CE, GV, TN, AT, GO, CL, NN, RN, MP, FM, CW, ABN, JV), pp. 305–306.
- PPoPP-2009-WangO #machine learning #parallel
- Mapping parallelism to multi-cores: a machine learning based approach (ZW, MFPO), pp. 75–84.
- FASE-2009-AutiliBI #adaptation
- Context-Aware Adaptive Services: The PLASTIC Approach (MA, PDB, PI), pp. 124–139.
- FASE-2009-RutleRLW #formal method #version control
- A Category-Theoretical Approach to the Formalisation of Version Control in MDE (AR, AR, YL, UW), pp. 64–78.
- STOC-2009-ChenM #design
- A new approach to auctions and resilient mechanism design (JC, SM), pp. 503–512.
- STOC-2009-ImpagliazzoKK #axiom
- An axiomatic approach to algebrization (RI, VK, AK), pp. 695–704.
- CADE-2009-FalkeK #analysis #automation #imperative #source code #term rewriting #termination
- A Term Rewriting Approach to the Automated Termination Analysis of Imperative Programs (SF, DK), pp. 277–293.
- CAV-2009-WintersteigerHM #concurrent #smt
- A Concurrent Portfolio Approach to SMT Solving (CMW, YH, LMdM), pp. 715–720.
- ICLP-2009-Ji #architecture #programming #set
- A Cognitive Architecture for a Service Robot: An Answer Set Programming Approach (JJ), pp. 532–533.
- ICLP-2009-VoetsS #analysis #logic programming #source code
- A New Approach to Non-termination Analysis of Logic Programs (DV, DDS), pp. 220–234.
- ICST-2009-AlmeidaAM #case study #estimation
- An Alternative Approach to Test Effort Estimation Based on Use Cases (ERCdA, BTdA, RLdOM), pp. 279–288.
- ICST-2009-DelamareBGT #aspect-oriented #aspectj #testing
- A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ (RD, BB, SG, YLT), pp. 376–385.
- ICST-2009-MurphyKVC #assurance #quality #testing #using
- Quality Assurance of Software Applications Using the In Vivo Testing Approach (CM, GEK, IV, MC), pp. 111–120.
- ICST-2009-SilvaAJ #estimation #execution #functional #testing
- A Simple Approach for Estimation of Execution Effort of Functional Test Cases (DGeS, BTdA, MJ), pp. 289–298.
- SAT-2009-BalintHG #novel #problem #satisfiability
- A Novel Approach to Combine a SLS- and a DPLL-Solver for the Satisfiability Problem (AB, MH, OG), pp. 284–297.
- TestCom-FATES-2009-SubramaniamXGP #proving #testing #theorem proving #using
- An Approach for Test Selection for EFSMs Using a Theorem Prover (MS, LX, BG, ZP), pp. 146–162.
- VMCAI-2009-LavironL #linear #named #scalability
- SubPolyhedra: A (More) Scalable Approach to Infer Linear Inequalities (VL, FL), pp. 229–244.
- CBSE-2008-GamaD #framework #platform
- A Practical Approach for Finding Stale References in a Dynamic Service Platform (KG, DD), pp. 246–261.
- ECSA-2008-FankamJBA #architecture #database #ontology #semantics
- Extending the ANSI/SPARC Architecture Database with Explicit Data Semantics: An Ontology-Based Approach (CF, SJ, LB, YAA), pp. 318–321.
- ECSA-2008-GilsonEM #architecture #design #distributed #scalability
- A Large Scope Transformational Approach for Distributed Architecture Design (FG, VE, RM), pp. 330–333.
- ECSA-2008-MyllarniemiPRGM #architecture #constraints #distributed
- Approach for Dynamically Composing Decentralised Service Architectures with Cross-Cutting Constraints (VM, CP, MR, JvG, TM), pp. 180–195.
- ECSA-2008-NavarroC #architecture #automation #design #using
- Automating the Trace of Architectural Design Decisions and Rationales Using a MDD Approach (EN, CEC), pp. 114–130.
- WICSA-2008-BahsoonE #architecture #distributed #scalability
- An Economics-Driven Approach for Valuing Scalability in Distributed Architectures (RB, WE), pp. 9–18.
- WICSA-2008-LiFWWJ #development #protocol
- A Pattern-Based Approach to Development of Service Mediators for Protocol Mediation (XL, YF, JW, LW, FJ), pp. 137–146.
- DocEng-2008-GormishWPH #distributed #documentation #flexibility #metadata #security
- Document logs: a distributed approach to metadata for better security and flexibility (MJG, GW, KWP, PH), pp. 119–122.
- DocEng-2008-GuimaraesNS #modelling #visual notation
- A visual approach for modeling spatiotemporal relations (RLG, CdSSN, LFGS), pp. 285–288.
- DocEng-2008-Rinaldi #documentation #representation #retrieval
- A content-based approach for document representation and retrieval (AMR), pp. 106–109.
- DocEng-2008-SchroederM #design #documentation #performance #query #xml
- Improving query performance on XML documents: a workload-driven design approach (RS, RdSM), pp. 177–186.
- DocEng-2008-SturgillS #algorithm #recognition
- An optical character recognition approach to qualifying thresholding algorithms (MS, SJS), pp. 263–266.
- DRR-2008-BhardwajKSG #documentation #word
- An OCR based approach for word spotting in Devanagari documents (AB, SK, SS, VG), p. 68150.
- DRR-2008-GaoT
- A mixed approach to book splitting (LG, ZT), p. 68150.
- DRR-2008-GaoTQ #detection
- A mixed approach to auto-detection of page body (LG, ZT, RQ), p. 68150.
- DRR-2008-KimLT #hybrid #identification #statistics
- Hybrid approach combining contextual and statistical information for identifying MEDLINE citation terms (ICK, DXL, GRT), p. 68150.
- ECDL-2008-Liu #memory management
- A Participative Digital Archiving Approach to University History and Memory (JL), pp. 135–147.
- HT-2008-PourabdollahAB #hypermedia #rdf #xml
- Are we talking about the same structure?: a unified approach to hypertext links, xml, rdf and zigzag (AP, HA, TJB), pp. 241–242.
- HT-2008-VaisenbergSMJM
- A new approach for adding browser functionality (RV, AS, KAM, RJ, SM), pp. 247–248.
- SIGMOD-2008-HuaPZL #nondeterminism #probability #query #ranking
- Ranking queries on uncertain data: a probabilistic threshold approach (MH, JP, WZ, XL), pp. 673–686.
- SIGMOD-2008-JampaniXWPJH #monte carlo #named #nondeterminism
- MCDB: a monte carlo approach to managing uncertain data (RJ, FX, MW, LLP, CMJ, PJH), pp. 687–700.
- VLDB-2008-GeZ #query
- A skip-list approach for efficiently processing forecasting queries (TG, SBZ), pp. 984–995.
- VLDB-2008-NutanongZTK #query
- The V*-Diagram: a query-dependent approach to moving KNN queries (SN, RZ, ET, LK), pp. 1095–1106.
- ITiCSE-2008-Diaz-AgudoJR #education #how #semantics #web
- How to teach semantic web?: a project-based approach (BDA, GJD, JARG), pp. 98–102.
- ITiCSE-2008-Hollingsworth #education #query
- Teaching query writing: an informed instruction approach (JEH), p. 351.
- ITiCSE-2008-MatzkoD #data type
- A graphics-based approach to data structures (SM, TAD), pp. 109–113.
- ITiCSE-2008-MurphyPK #distance #education #learning #programming
- A distance learning approach to teaching eXtreme programming (CM, DBP, GEK), pp. 199–203.
- CSMR-2008-Ebert #metamodelling
- Metamodels Taken Seriously: The TGraph Approach (JE), p. 2.
- ICPC-2008-RohatgiHR #dynamic analysis
- An Approach for Mapping Features to Code Based on Static and Dynamic Analysis (AR, AHL, JR), pp. 236–241.
- ICSM-2008-ScannielloLMT #eclipse #migration
- An approach and an eclipse based environment for data migration (GS, ADL, MM, GT), pp. 237–246.
- MSR-2008-YoshimuraNHK #analysis #detection #named #product line #variability
- FAVE: factor analysis based approach for detecting product line variability from change history (KY, FN, KH, TK), pp. 11–18.
- PASTE-2008-ZhangLGZ #effectiveness #hybrid #identification
- Effective identification of failure-inducing changes: a hybrid approach (SZ, YL, ZG, JZ), pp. 77–83.
- SCAM-2008-GondowKI #analysis #automation #behaviour #c #named #preprocessor
- TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor’s Behaviors (KG, HK, TI), pp. 35–44.
- SCAM-2008-Mihancea #re-engineering #visual notation
- Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering (PFM), pp. 207–216.
- WCRE-2008-ZhouWGGL #network #predict
- A Bayesian Network Based Approach for Change Coupling Prediction (YZ, MW, EG, HG, JL), pp. 27–36.
- ICALP-A-2008-BlellochVW #combinator #graph #problem
- A New Combinatorial Approach for Sparse Graph Problems (GEB, VV, RW), pp. 108–120.
- LATA-2008-PhuongHRV #hybrid #segmentation #word
- A Hybrid Approach to Word Segmentation of Vietnamese Texts (HPL, NTMH, AR, HTV), pp. 240–249.
- FM-2008-RidgeNS #implementation #network #protocol
- A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service (TR, MN, PS), pp. 294–309.
- SFM-2008-ChiarugiDKM
- Cells in Silico: A Holistic Approach (DC, PD, JBVK, RM), pp. 366–386.
- AIIDE-2008-IsazaLBG #multi
- A Cover-Based Approach to Multi-Agent Moving Target Pursuit (AI, JL, VB, RG).
- CIG-2008-GreenwoodT #design
- A game-theoretical approach for designing market trading strategies (GWG, RT), pp. 316–322.
- CIG-2008-ThangG #contest #fuzzy
- A fuzzy approach for the 2007 CIG simulated car racing competition (HDT, JMG), pp. 127–134.
- GDCSE-2008-SettleLB #game studies #hybrid
- A hybrid approach to projects in gaming courses (AS, JL, AB), pp. 36–40.
- GT-VMT-2006-Braatz08 #modelling #object-oriented #rule-based
- A Rule-Based, Integrated Modelling Approach for Object-Oriented Systems (BB), pp. 251–260.
- GT-VMT-2006-Willink08 #challenge #on the #visual notation
- On Challenges for a Graphical Transformation Notation and the UMLX Approach (EDW), pp. 171–179.
- GT-VMT-2008-EhrigEH #algebra #graph grammar #integration #model transformation
- From Model Transformation to Model Integration based on the Algebraic Approach to Triple Graph Grammars (HE, KE, FH).
- ICGT-2008-Horvath #graph transformation #towards #verification
- Towards a Two Layered Verification Approach for Compiled Graph Transformation (ÁH), pp. 499–501.
- CHI-2008-FindlaterMM #development #evaluation
- Evaluation of a role-based approach for customizing a complex development environment (LF, JM, DM), pp. 1267–1270.
- CAiSE-2008-Arni-BlochR #information management #integration
- Service-Oriented Information Systems Engineering: A Situation-Driven Approach for Service Integration (NAB, JR), pp. 140–143.
- CAiSE-2008-BoukadiGV #adaptation #aspect-oriented
- An Aspect Oriented Approach for Context-Aware Service Domain Adapted to E-Business (KB, CG, LV), pp. 64–78.
- CAiSE-2008-ViscusiTS #case study #empirical #using
- Strategic Alignment in the Context of e-Services — An Empirical Investigation of the INSTAL Approach Using the Italian eGovernment Initiative Case Study (GV, LHT, CS), pp. 163–166.
- EDOC-2008-AmeedeenB #diagrams #modelling #petri net #sequence chart
- A Model Driven Approach to Represent Sequence Diagrams as Free Choice Petri Nets (MAA, BB), pp. 213–221.
- EDOC-2008-KarakostasZ #modelling
- Engineering Service Oriented Systems: A Model Driven Approach (BK, YZ).
- EDOC-2008-KimKLP #architecture #non-functional #requirements
- A Tactic-Based Approach to Embodying Non-functional Requirements into Software Architectures (SK, DKK, LL, SP), pp. 139–148.
- EDOC-2008-MartinWL #distributed #novel #workflow
- A Novel Approach to Decentralized Workflow Enactment (DM, DW, FL), pp. 127–136.
- EDOC-2008-PolyvyanyySW #abstraction #process
- Process Model Abstraction: A Slider Approach (AP, SS, MW), pp. 325–331.
- EDOC-2008-TakahashiTIHF #composition #coordination #metadata #multi #protocol #using
- Coordination Protocol Composition Approach Using Metadata in Multi-agent Systems (RT, KT, FI, SH, YF), pp. 372–378.
- EDOC-2008-WehrweinMT #collaboration #implementation
- A Requirements-Driven and Collaborative Decision Support Approach for Evaluating the Viability of Candidate Implementation Technologies (BW, GM, RT), pp. 293–299.
- ICEIS-AIDSS-2008-LeoDMD #image #recognition
- SIFT Approach for Ball Recognition in Soccer Images (ML, TD, NM, AD), pp. 207–212.
- ICEIS-AIDSS-2008-MahdaviSP #automation #using
- Machine Grouping in Cellular Manufacturing System Using Tandem Automated Guided vehicle with ACO Based Six Sigma Approach (IM, BS, MMP), pp. 261–267.
- ICEIS-AIDSS-2008-NguyenG #evolution #mining #multi
- Rule Evolution Approach for Mining Multivariate Time Series Data (VAN, VG), pp. 19–26.
- ICEIS-AIDSS-2008-TsengKH #assembly #using
- A Decision Support System for Integrated Assembly and Disassembly Planning Using a GA Approach (YJT, HTK, FYH), pp. 348–355.
- ICEIS-DISI-2008-BrahmiaB #database #multi #version control #xml
- An Approach for Schema Versioning in Multi-Temporal XML Databases (ZB, RB), pp. 290–297.
- ICEIS-DISI-2008-MouzakitisSLP #integration
- A Methodological Approach for Measuring B2B Integration Readiness of SMEs (SM, AMS, FL, JEP), pp. 298–303.
- ICEIS-DISI-2008-SaccolNEG #ontology #semantics
- An Ontology-Based Approach for Semantic Interoperability in P2P Systems (DdBS, RPN, NE, RdMG), pp. 310–316.
- ICEIS-DISI-2008-SousaL #enterprise
- ERP Impact on Number of Employees and Personnel Costs in Small and Medium Sized Enterprises — A Panel Data Approach (JES, VBL), pp. 196–202.
- ICEIS-DISI-2008-VidalLAC #maintenance #sql #xml
- A Mapping-Driven Approach for SQL/XML View Maintenance (VMPV, FCL, VdSA, MAC), pp. 65–73.
- ICEIS-ISAS1-2008-BeckerAP #process #source code
- An Approach to Support the Strategic Alignment of Software Process Improvement Programs (ALB, JLNA, RP), pp. 66–73.
- ICEIS-ISAS2-2008-AgostinhoMMABFRKRC #analysis #aspect-oriented #requirements
- A Metadata-Driven Approach for Aspect-Oriented Requirements Analysis (SA, AMDM, AM, JA, ISB, RF, RR, JK, RAR, PC), pp. 129–136.
- ICEIS-ISAS2-2008-AlencarSAFF #bound #branch
- Maximizing the Business Value of Software Projects — A Branch & Bound Approach (AJA, EAS, EPdA, MCF, ALF), pp. 162–169.
- ICEIS-ISAS2-2008-AnwarENCK #composition #qvt
- A QVT-Based Approach for Model Composition — Application to the VUML Profile (AA, SE, MN, BC, AK), pp. 360–367.
- ICEIS-ISAS2-2008-BrockeMR #modelling #process #towards
- Towards a Value-Oriented Approach to Business Process Modelling (JvB, JM, JR), pp. 380–395.
- ICEIS-ISAS2-2008-GrimanPOM #quality #web
- Context-Oriented Web Methodology with a Quality Approach (AG, MAP, MO, LEM), pp. 213–219.
- ICEIS-ISAS2-2008-VerjusP #agile #architecture #evolution #formal method #information management #named
- DIAPASON: A Formal Approach for Supporting Agile and Evolvable Information System Service-Based Architectures (HV, FP), pp. 76–81.
- ICEIS-ISAS2-2008-ZhangRSG #petri net #product line
- Production Configuration of Product Families — An Approach based on Petri Nets (LZ, BR, JS, GJCG), pp. 5–11.
- ICEIS-J-2008-Eessaar08a #metric #quality #specification
- A Semiotic Approach to Quality in Specifications of Software Measures (EE), pp. 73–86.
- ICEIS-J-2008-PapatheocharousA08a #algorithm #hybrid #modelling #network #predict #search-based #using
- Hybrid Computational Models for Software Cost Prediction: An Approach Using Artificial Neural Networks and Genetic Algorithms (EP, ASA), pp. 87–100.
- ICEIS-SAIC-2008-JainB #novel
- A Novel Approach to Model and Evaluate Dynamic Agility in Supply Chains (VJ, LB), pp. 93–100.
- ICEIS-SAIC-2008-SantosM #semantics #web
- Transparency in Citizen-Centric Services — A Traceability-based Approach on the Semantic Web (IJGdS, ERMM), pp. 184–189.
- ICEIS-SAIC-2008-StellerKCNL #pervasive #reasoning #semantics #using
- A Weighted Approach for Optimised Reasoning for Pervasive Service Discovery Using Semantics and Context (LS, SK, SC, JN, SWL), pp. 113–118.
- CIKM-2008-ChenLYH #effectiveness #graph #on the
- On effective presentation of graph patterns: a structural representative approach (CC, CXL, XY, JH), pp. 299–308.
- CIKM-2008-ChenWD #clustering #documentation
- A matrix-based approach for semi-supervised document co-clustering (YC, LW, MD), pp. 1523–1524.
- CIKM-2008-Croft #how #problem
- Unsolved problems in search: (and how we approach them) (WBC), p. 1001.
- CIKM-2008-DuanCM #clustering #requirements
- A consensus based approach to constrained clustering of software requirements (CD, JCH, BM), pp. 1073–1082.
- CIKM-2008-HeMHO #effectiveness #retrieval #statistics
- An effective statistical approach to blog post opinion retrieval (BH, CM, JH, IO), pp. 1063–1072.
- CIKM-2008-KohlschutterN #segmentation #web
- A densitometric approach to web page segmentation (CK, WN), pp. 1173–1182.
- CIKM-2008-NiXLH #learning
- Group-based learning: a boosting approach (WN, JX, HL, YH), pp. 1443–1444.
- CIKM-2008-PlacekTSDS #heuristic #query
- A heuristic approach for checking containment of generalized tree-pattern queries (PP, DT, SS, TD, TKS), pp. 551–560.
- CIKM-2008-RazenteBTFT #data access #metric #novel #optimisation #process #query #similarity
- A novel optimization approach to efficiently process aggregate similarity queries in metric access methods (HLR, MCNB, AJMT, CF, CTJ), pp. 193–202.
- CIKM-2008-StroeBNP #approximate #string
- An approximate string matching approach for handling incorrectly typed urls (MS, RB, CN, DP), pp. 1339–1340.
- ECIR-2008-AbdullahG #usability #using
- Using a Task-Based Approach in Evaluating the Usability of BoBIs in an E-book Environment (NA, FG), pp. 246–257.
- ECIR-2008-KneesPSSS #music #natural language
- A Document-Centered Approach to a Natural Language Music Search Engine (PK, TP, MS, DS, KS), pp. 627–631.
- ICML-2008-NowozinB #learning
- A decoupled approach to exemplar-based unsupervised learning (SN, GHB), pp. 704–711.
- ICML-2008-SzitaL
- The many faces of optimism: a unifying approach (IS, AL), pp. 1048–1055.
- ICML-2008-UenoKMMI #evaluation #policy #statistics
- A semiparametric statistical approach to model-free policy evaluation (TU, MK, TM, SiM, SI), pp. 1072–1079.
- ICML-2008-XiaLWZL #algorithm #learning #rank
- Listwise approach to learning to rank: theory and algorithm (FX, TYL, JW, WZ, HL), pp. 1192–1199.
- ICML-2008-YuVGS #optimisation
- A quasi-Newton approach to non-smooth convex optimization (JY, SVNV, SG, NNS), pp. 1216–1223.
- ICPR-2008-AgrisBK #adaptation #agile #recognition #using
- Rapid signer adaptation for continuous sign language recognition using a combined approach of eigenvoices, MLLR, and MAP (UvA, CB, KFK), pp. 1–4.
- ICPR-2008-AlliliZ #bound #segmentation
- An approach for dynamic combination of region and boundary information in segmentation (MSA, DZ), pp. 1–4.
- ICPR-2008-BridsonA #analysis #evaluation #geometry #layout #performance
- A geometric approach for accurate and efficient performance evaluation of layout analysis methods (DB, AA), pp. 1–4.
- ICPR-2008-BruneauGP #modelling #reduction
- Parameter-based reduction of Gaussian mixture models with a variational-Bayes approach (PB, MG, FP), pp. 1–4.
- ICPR-2008-BuloATP #estimation #parametricity
- A hypergraph-based approach to affine parameters estimation (SRB, AA, AT, MP), pp. 1–4.
- ICPR-2008-CheikhBK #novel #recognition #word
- A novel approach for the recognition of a wide Arabic handwritten word lexicon (IBC, AB, AK), pp. 1–4.
- ICPR-2008-CheongL #image #matrix #multi #orthogonal #recognition #using
- An approach to texture-based image recognition by deconstructing multispectral co-occurrence matrices using Tchebichef orthogonal polynomials (MCYC, KSL), pp. 1–4.
- ICPR-2008-DonoserMBK #probability
- A probabilistic approach for tracking fibers (MD, TM, HB, JK), pp. 1–4.
- ICPR-2008-El-BazGFE #3d #analysis #automation #detection #image #monitoring
- A new approach for automatic analysis of 3D low dose CT images for accurate monitoring the detected lung nodules (AEB, GLG, RF, MAEG), pp. 1–4.
- ICPR-2008-FuCLL #automation #segmentation
- Saliency Cuts: An automatic approach to object segmentation (YF, JC, ZL, HL), pp. 1–4.
- ICPR-2008-FuR08a #image #performance #segmentation
- A fast hierarchical approach to image segmentation (ZF, ARK), pp. 1–4.
- ICPR-2008-GuimaraesPP #detection #difference #distance #graph #using #video
- An approach for video cut detection using bipartite graph matching as dissimilarity distance (SJFG, ZKGdPJ, HBdP), pp. 1–4.
- ICPR-2008-GuptaR #clustering #multi
- A microeconomic approach to multi-objective spatial clustering (UG, NR), pp. 1–4.
- ICPR-2008-KarnickMP #classification #concept #incremental #learning #multi #using
- Incremental learning in non-stationary environments with concept drift using a multiple classifier based approach (MTK, MM, RP), pp. 1–4.
- ICPR-2008-LangerK #detection #image #realtime #robust
- A new hierarchical approach in robust real-time image feature detection and matching (ML, KDK), pp. 1–4.
- ICPR-2008-LeeWCYL #video
- Extended Kalman filtering approach to stereo video stabilization (KKL, KhW, MMYC, YKY, MKL), pp. 1–4.
- ICPR-2008-LiLCL #image #segmentation
- A variational inference based approach for image segmentation (ZL, QL, JC, HL), pp. 1–4.
- ICPR-2008-MaL #online #recognition
- A new radical-based approach to online handwritten Chinese character recognition (LLM, CLL), pp. 1–4.
- ICPR-2008-MaL08a #concept #detection #optimisation #performance #semantics
- An efficient gradient computation approach to discriminative fusion optimization in semantic concept detection (CM, CHL), pp. 1–4.
- ICPR-2008-NaturelO #detection #statistics
- Detecting queues at vending machines: A statistical layered approach (XN, JMO), pp. 1–4.
- ICPR-2008-NguyenBP #learning #set
- A supervised learning approach for imbalanced data sets (GHN, AB, SLP), pp. 1–4.
- ICPR-2008-Obafemi-AjayiAF #documentation #image #performance
- Efficient MRF approach to document image enhancement (TOA, GA, OF), pp. 1–4.
- ICPR-2008-PrakashR
- A semisupervised approach to space carving (SP, ARK), pp. 1–4.
- ICPR-2008-RognvaldssonPBS #detection #fault #multi #self
- A self-organized approach for unsupervised fault detection in multiple systems (TSR, GP, SB, MS), pp. 1–4.
- ICPR-2008-RoyPLK #documentation #multi #recognition #visual notation
- Convex hull based approach for multi-oriented character recognition from graphical documents (PPR, UP, JL, FK), pp. 1–4.
- ICPR-2008-Sakai #classification #incremental #monte carlo
- Monte Carlo subspace method: An incremental approach to high-dimensional data classification (TS), pp. 1–4.
- ICPR-2008-ScrippsTCE #matrix #predict
- A matrix alignment approach for link prediction (JS, PNT, FC, AHE), pp. 1–4.
- ICPR-2008-ShawPS #recognition #segmentation #word
- Offline handwritten Devanagari word recognition: A segmentation based approach (BS, SKP, MS), pp. 1–4.
- ICPR-2008-TortorellaPM #programming
- A Dynamic Programming approach for segmenting digital planar curves into line segments and circular arcs (FT, RP, MM), pp. 1–4.
- ICPR-2008-TuSK #3d #image
- A new approach to 3D shape recovery of local planar surface patches from shift-variant blurred images (XT, MS, YsK), pp. 1–5.
- ICPR-2008-WattuyaRPJ #multi #random
- A random walker based approach to combining multiple segmentations (PW, KR, JSP, XJ), pp. 1–4.
- ICPR-2008-WuWW #estimation
- Motion estimation approach based on dual-tree complex wavelets (CW, QW, HW), pp. 1–4.
- ICPR-2008-YuOWL #3d #estimation #novel
- A novel 3-D motion estimation approach to virtual viewpoint control (YKY, SHO, KhW, KKL), pp. 1–4.
- KDD-2008-MoiseS #clustering #novel #statistics
- Finding non-redundant, statistically significant regions in high dimensional data: a novel approach to projected and subspace clustering (GM, JS), pp. 533–541.
- KDD-2008-SimonKZ #agile #reliability #scalability #set
- Semi-supervised approach to rapid and reliable labeling of large data sets (GJS, VK, ZLZ), pp. 641–649.
- KDD-2008-WickRSM
- A unified approach for schema matching, coreference and canonicalization (MLW, KR, KS, AM), pp. 722–730.
- RecSys-2008-CelmaH #novel #recommendation
- A new approach to evaluating novel recommendations (ÒC, PH), pp. 179–186.
- SEKE-2008-AlferezKSSMAA #modelling #product line #requirements
- A Model-driven Approach for Software Product Lines Requirements Engineering (MA, UK, AS, JPS, AMDM, JA, VA), pp. 779–784.
- SEKE-2008-Argote-GarciaCHFS #architecture #formal method
- A Formal Approach for Translating a SAM Architecture to PROMELA (GAG, PJC, XH, YF, LS), pp. 440–447.
- SEKE-2008-BadriBS #co-evolution #object-oriented #predict
- Predicting Change Propagation in Object-oriented Systems: a Control-call Path Based Approach and Associated Tool (LB, MB, DSY), pp. 103–110.
- SEKE-2008-BaratK #enterprise #integration #modelling #process #tool support
- A Model-driven Toolset to Support an Approach for Analyzing Integration of Business Process Aspect of Enterprise Application Integration (SB, VK), pp. 625–630.
- SEKE-2008-Chavarria-BaezL #confluence #petri net #termination
- Analyzing Termination and Confluence in Active Rule Base via a Petri Net Approach (LCB, XL), pp. 363–366.
- SEKE-2008-ChenZX #reduction #testing
- A Degraded ILP Approach for Test Suite Reduction (ZC, XZ, BX), pp. 494–499.
- SEKE-2008-DaiYZG #composition #predict #self #web #web service
- Failure Prediction Based Self-healing Approach for Web Service Composition (YD, LY, BZ, KG), pp. 853–856.
- SEKE-2008-EzenwoyeS #reliability #web #web service
- A Language-based Approach to Addressing Reliability in Composite Web Services (OE, SMS), pp. 649–654.
- SEKE-2008-FatolahiSL #automation #generative #modelling #requirements
- A Model-Driven Approach for the Semi-automated Generation of Web-based Applications from Requirements (AF, SSS, TCL), pp. 619–624.
- SEKE-2008-FontouraP #process #risk management
- Systematic Approach to Risk Management in Software Projects through Process Tailoring (LMF, RTP), pp. 179–184.
- SEKE-2008-GaoLCSX #case study #component
- Building Testable Components — a Systematic Approach and Its Experimental Study (JG, WRL, RC, RS, MX), pp. 715–722.
- SEKE-2008-GhezziT #architecture #case study
- Choosing a Software Architecture: An Approach and a Case Study (CG, GT), pp. 255–260.
- SEKE-2008-HuLTS #configuration management #enterprise #maintenance #named
- MAPLE: a Maintenance Approach for Pattern-enabLed rEconfiguration of SOA-based Enterprise Application (SH, YL, JT, YS), pp. 209–214.
- SEKE-2008-MarquesMNF #interface #ontology #semantics #using #web #web service
- Active Ontologies — an Approach for Using Ontologies as Semantic Web Services Interfaces (TCM, MGM, JCCN, PPMF), pp. 847–852.
- SEKE-2008-OliveiraO #comparison #difference
- Model Comparison: a Strategy-Based Approach (KSFO, TCdO), pp. 912–917.
- SEKE-2008-SilvaAAMC
- Tailoring an Aspectual Goal-oriented Approach to Model Features (CTLLS, FMRA, JA, AMDM, JBdC), pp. 472–477.
- SEKE-2008-TekbacakTD #certification #data access #security #semantics #using
- A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
- SEKE-2008-ZhangH #middleware #owl #pervasive
- An OWL/SWRL Based Diagnosis Approach in a Pervasive Middleware (WZ, KMH), pp. 893–898.
- SIGIR-2008-ChiaSLN #documentation #retrieval
- A lattice-based approach to query-by-example spoken document retrieval (TKC, KCS, HL, HTN), pp. 363–370.
- SIGIR-2008-Gan #query #using
- Using a mediated query approach for matching unstructured query with structured resources (KHG), p. 895.
- SIGIR-2008-KalashnikovNM #people #quality #towards #web
- Towards breaking the quality curse.: a web-querying approach to web people search (DVK, RNT, SM), pp. 27–34.
- SIGIR-2008-Kurland #clustering #documentation #ranking
- The opposite of smoothing: a language model approach to ranking query-specific document clusters (OK), pp. 171–178.
- SIGIR-2008-KurlandD #clustering
- A rank-aggregation approach to searching for optimal query-specific clusters (OK, CD), pp. 547–554.
- SIGIR-2008-LiuY #collaboration #named
- EigenRank: a ranking-oriented approach to collaborative filtering (NNL, QY), pp. 83–90.
- SIGIR-2008-MurthyTFVYG #concept #implementation #information retrieval #tool support #visualisation
- From concepts to implementation and visualization: tools from a team-based approach to ir (UM, RdST, EAF, LV, SY, MAG), p. 889.
- SIGIR-2008-Nguyen #preprocessor #query #web #word
- Query preprocessing: improving web search through a Vietnamese word tokenization approach (DN), pp. 765–766.
- SIGIR-2008-RadlinskiBCGJR #optimisation #query
- Optimizing relevance and revenue in ad search: a query substitution approach (FR, AZB, PC, EG, VJ, LR), pp. 403–410.
- SIGIR-2008-ValletZ #query #semantics
- Inferring the most important types of a query: a semantic approach (DV, HZ), pp. 857–858.
- ECMDA-FA-2008-BorkGSZ #reverse engineering #towards
- Towards Roundtrip Engineering — A Template-Based Reverse Engineering Approach (MB, LG, CS, AZ), pp. 33–47.
- ECMDA-FA-2008-Espinazo-PaganTM #metamodelling
- Metamodel Syntactic Sheets: An Approach for Defining Textual Concrete Syntaxes (JEP, MMT, JGM), pp. 185–199.
- ECMDA-FA-2008-GoknilKB #metamodelling #reasoning #requirements
- A Metamodeling Approach for Reasoning about Requirements (AG, IK, KvdB), pp. 310–325.
- ECMDA-FA-2008-HolmesTZD #aspect-oriented #modelling #process
- Modeling Human Aspects of Business Processes — A View-Based, Model-Driven Approach (TH, HT, UZ, SD), pp. 246–261.
- ECMDA-FA-2008-MarzulloPLSB #assessment #performance #profiling
- A Practical MDA Approach for Autonomic Profiling and Performance Assessment (FPM, RNP, DGL, JMdS, JRB), pp. 110–120.
- MoDELS-2008-GutheilKA #modelling #multi
- A Systematic Approach to Connectors in a Multi-level Modeling Environment (MG, BK, CA), pp. 843–857.
- MoDELS-2008-KelsenM #lightweight #modelling #semantics
- A Lightweight Approach for Defining the Formal Semantics of a Modeling Language (PK, QM), pp. 690–704.
- MoDELS-2008-LiangDDP #integration
- A General Approach for Scenario Integration (HL, ZD, JD, EP), pp. 204–218.
- MoDELS-2008-MonperrusJCH #metric #modelling
- A Model-Driven Measurement Approach (MM, JMJ, JC, BH), pp. 505–519.
- MoDELS-2008-MorinFBJSDB #aspect-oriented #modelling #variability
- An Aspect-Oriented and Model-Driven Approach for Managing Dynamic Variability (BM, FF, NB, JMJ, AS, VD, GSB), pp. 782–796.
- SPLC-2008-ChoLK #aspect-oriented #dependence
- Feature Relation and Dependency Management: An Aspect-Oriented Approach (HC, KL, KCK), pp. 3–11.
- SPLC-2008-LeeMN #product line
- An Approach for Developing Service Oriented Product Lines (JL, DM, MN), pp. 275–284.
- MoDELS-2008-GutheilKA #modelling #multi
- A Systematic Approach to Connectors in a Multi-level Modeling Environment (MG, BK, CA), pp. 843–857.
- MoDELS-2008-KelsenM #lightweight #modelling #semantics
- A Lightweight Approach for Defining the Formal Semantics of a Modeling Language (PK, QM), pp. 690–704.
- MoDELS-2008-LiangDDP #integration
- A General Approach for Scenario Integration (HL, ZD, JD, EP), pp. 204–218.
- MoDELS-2008-MonperrusJCH #metric #modelling
- A Model-Driven Measurement Approach (MM, JMJ, JC, BH), pp. 505–519.
- MoDELS-2008-MorinFBJSDB #aspect-oriented #modelling #variability
- An Aspect-Oriented and Model-Driven Approach for Managing Dynamic Variability (BM, FF, NB, JMJ, AS, VD, GSB), pp. 782–796.
- OOPSLA-2008-BouilletFLRR #composition #design #information management
- A tag-based approach for the design and composition of information processing applications (EB, MF, ZL, AR, AR), pp. 585–602.
- AdaEurope-2008-ChoppyPR #modelling #petri net
- A Modelling Approach with Coloured Petri Nets (CC, LP, GR), pp. 73–86.
- AdaEurope-2008-NarayananK #automation #multi #semantics
- A Systematic Approach to Automatically Generate Multiple Semantically Equivalent Program Versions (SHKN, MTK), pp. 185–198.
- AdaEurope-2008-UruenaPLZP #clustering #memory management
- A New Approach to Memory Partitioning in On-Board Spacecraft Software (SU, JAP, JL, JZ, JAdlP), pp. 1–14.
- LOPSTR-2008-ArroyoRTV #functional #higher-order #source code
- A Transformational Approach to Polyvariant BTA of Higher-Order Functional Programs (GA, JGR, ST, GV), pp. 40–54.
- POPL-2008-HerbelinG #call-by #continuation
- An approach to call-by-name delimited continuations (HH, SG), pp. 383–394.
- SAS-2008-MidtgaardJ #abstract interpretation #analysis #control flow
- A Calculational Approach to Control-Flow Analysis by Abstract Interpretation (JM, TPJ), pp. 347–362.
- RE-2008-Monzon #product line #requirements #reuse
- A Practical Approach to Requirements Reuse in Product Families of On-Board Systems (AM), pp. 223–228.
- RE-2008-RegevGW #education #learning #requirements
- Requirements Engineering Education in the 21st Century, An Experiential Learning Approach (GR, DCG, AW), pp. 85–94.
- RE-2008-WestonCR #aspect-oriented #composition #formal method #requirements #semantics
- A Formal Approach to Semantic Composition of Aspect-Oriented Requirements (NW, RC, AR), pp. 173–182.
- REFSQ-2008-BrinkkemperWSV #process #requirements
- Process Improvement in Requirements Management: A Method Engineering Approach (SB, IvdW, MS, JV), pp. 6–22.
- REFSQ-2008-WebersTS #feature model #modelling #requirements
- Connecting Feature Models and AUTOSAR: An Approach Supporting Requirements Engineering in Automotive Industries (WW, CT, KS), pp. 95–108.
- ASE-2008-Eltaher #testing #towards
- Towards Good Enough Testing: A Cognitive-Oriented Approach Applied to Infotainment Systems (AE), pp. 525–528.
- ASE-2008-FalleriHN #normalisation
- A Generic Approach for Class Model Normalization (JRF, MH, CN), pp. 431–434.
- ASE-2008-KastnerA #formal method #product line
- Type-Checking Software Product Lines — A Formal Approach (CK, SA), pp. 258–267.
- ASE-2008-MartinhoVD #flexibility #modelling #process
- A Two-Step Approach for Modelling Flexibility in Software Processes (RM, JV, DD), pp. 427–430.
- ASE-2008-TurnerPKC #automation #code generation #process #using #web
- An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
- ICSE-2008-LanzaMRLB #java #programming #smalltalk
- A teamwork-based approach to programming fundamentals with scheme, smalltalk & java (ML, ALM, RR, ML, PB), pp. 787–790.
- ICSE-2008-RuthruffPMER #predict #static analysis
- Predicting accurate and actionable static analysis warnings: an experimental approach (JRR, JP, JDM, SGE, GR), pp. 341–350.
- ICSE-2008-WangZXAS #debugging #detection #execution #natural language #using
- An approach to detecting duplicate bug reports using natural language and execution information (XW, LZ, TX, JA, JS), pp. 461–470.
- SAC-2008-AntonyBHP #biology #interactive #mining #using #validation
- Computational approach to biological validation of protein-protein interactions discovered using literature mining (AA, SB, SH, MJP), pp. 1302–1306.
- SAC-2008-BallabrigaCS #analysis
- An improved approach for set-associative instruction cache partial analysis (CB, HC, PS), pp. 360–367.
- SAC-2008-ChenXZN #novel #reduction #testing
- A novel approach for test suite reduction based on requirement relation contraction (ZC, BX, XZ, CN), pp. 390–394.
- SAC-2008-ColantonioPO
- A cost-driven approach to role engineering (AC, RDP, AO), pp. 2129–2136.
- SAC-2008-CostaMO #clustering #modelling
- A hierarchical model-based approach to co-clustering high-dimensional data (GC, GM, RO), pp. 886–890.
- SAC-2008-CruzBC #embedded #modelling #realtime #towards
- Towards a model-driven engineering approach for developing embedded hard real-time software (FC, RSB, LC), pp. 308–314.
- SAC-2008-CruzBDSTVCCTM #detection #named #workflow
- OrthoSearch: a scientific workflow approach to detect distant homologies on protozoans (SMSdC, VB, AMRD, ES, FT, CV, MLMC, RRCC, DAT, MM), pp. 1282–1286.
- SAC-2008-Deba #model transformation #modelling #on the #transducer
- On the conformity of models: a transducer-based approach for model transformation (EAD), pp. 791–796.
- SAC-2008-DiasSCCA #case study #specification
- Elaboration of use case specifications: an approach based on use case fragments (FGD, EAS, MLMC, ALC, AJA), pp. 614–618.
- SAC-2008-DingMH #refinement #specification #using
- An approach for specification construction using property-preserving refinement patterns (JD, LM, XH), pp. 797–803.
- SAC-2008-FreireBF #metric #monitoring #web
- An approach based on metrics for monitoring web accessibility in Brazilian municipalities web sites (APF, TJB, RPdMF), pp. 2421–2425.
- SAC-2008-JermannH #constraints #geometry #sketching
- A constraint hierarchies approach to geometric constraints on sketches (CJ, HH), pp. 1843–1844.
- SAC-2008-Jimenez-PerisPM #distributed #web #web service
- Decentralized web service orchestration: a reflective approach (RJP, MPM, EMJ), pp. 494–498.
- SAC-2008-KemalisT #detection #injection #named
- SQL-IDS: a specification-based approach for SQL-injection detection (KK, TT), pp. 2153–2158.
- SAC-2008-KeyvanpourA #image #interactive #retrieval #semantics #using
- A new approach for interactive semantic image retrieval using the high level semantics (MK, SA), pp. 1175–1179.
- SAC-2008-LuizPBR #mobile #programming #search-based #using
- A new approach to control a population of mobile robots using genetic programming (AL, FP, GB, MR), pp. 1602–1606.
- SAC-2008-MaagG #protocol #self #testing #using
- Interoperability testing of a MANET routing protocol using a node self-similarity approach (SM, CG), pp. 1908–1912.
- SAC-2008-OrdinezDS #behaviour #scheduling
- A behavior priority driven approach for resource reservation scheduling (LO, DD, RMS), pp. 315–319.
- SAC-2008-PalmaBKA #clustering
- A clustering-based approach for discovering interesting places in trajectories (ATP, VB, BK, LOA), pp. 863–868.
- SAC-2008-SchepersIE #lifecycle
- A lifecycle approach to SOA governance (TGJS, MEI, PvE), pp. 1055–1061.
- SAC-2008-ShiguemoriVS #network #retrieval
- Atmospheric temperature retrieval from satellite data: new non-extensive artificial neural network approach (EHS, HFdCV, JDSdS), pp. 1688–1692.
- SAC-2008-SomeC #case study #generative
- An approach for supporting system-level test scenarios generation from textual use cases (SSS, XC), pp. 724–729.
- SAC-2008-SoonRT #collaboration #mobile
- An approach to mobile collaborative mapping (CJS, PR, DT), pp. 1929–1934.
- SAC-2008-SousaFVRV #modelling #process #user interface
- User interface derivation from business processes: a model-driven approach for organizational engineering (KSS, HMF, JV, ER, JV), pp. 553–560.
- SAC-2008-SouzaOVO #predict #simulation #statistics
- A statistical approach for prediction of projects based on simulation (MMdS, HCBdO, AMLdV, SRBO), pp. 23–27.
- SAC-2008-VazquezCP #architecture #design #object-oriented #reasoning
- A case-based reasoning approach for materializing software architectures onto object-oriented designs (GLV, MRC, JADP), pp. 842–843.
- SAC-2008-WalterG #multi #simulation
- Electricity market simulation: multiagent system approach (IW, FACG), pp. 34–38.
- SAC-2008-WinterS #architecture #enterprise
- Enterprise architecture governance: the need for a business-to-IT approach (RW, JS), pp. 548–552.
- SAC-2008-ZhangNLH #enterprise #modelling #network #security
- A model-based semi-quantitative approach for evaluating security of enterprise networks (ZZ, FNA, XL, PHH), pp. 1069–1074.
- ATEM-J-2006-HenrikssonHJZA #metamodelling #reuse
- Extending grammars and metamodels for reuse: the Reuseware approach (JH, FH, JJ, SZ, UA), pp. 165–184.
- ATEM-J-2006-ZhangWRH #ontology #semantics #traceability
- Ontological approach for the semantic recovery of traceability links between software artefacts (YZ, RW, JR, VH), pp. 185–203.
- SLE-2008-Goldschmidt #incremental #repository #towards
- Towards an Incremental Update Approach for Concrete Textual Syntaxes for UUID-Based Model Repositories (TG), pp. 168–177.
- SLE-2008-SunDJTG
- A Model Engineering Approach to Tool Interoperability (YS, ZD, FJ, RT, JG), pp. 178–187.
- ASPLOS-2008-ChenGLSWBDP #named #operating system
- Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems (XC, TG, ECL, PS, CAW, DB, JSD, DRKP), pp. 2–13.
- CASE-2008-FerrariniBV #automation #case study #fault
- A pragmatic approach to fault diagnosis in hydraulic circuits for automated machining: A case study (LF, RB, CV), pp. 29–34.
- CASE-2008-HouZWCT #adaptation #fuzzy #nondeterminism #using
- Adaptive dynamic surface control of a class of uncertain nonlinear systems in pure-feedback form using fuzzy backstepping approach (ZGH, AMZ, FXW, LC, MT), pp. 821–826.
- CASE-2008-KannanGSN #nash #optimisation
- A Nash bargaining approach to retention enhancing bid optimization in sponsored search auctions with discrete bids (RK, DG, KS, YN), pp. 1007–1012.
- CASE-2008-LiuSXYLZF #agile #using
- Rapid robot/workcell calibration using line-based approach (YL, YS, NX, RY, XL, GZ, TAF), pp. 510–515.
- CASE-2008-NishiTI #automation #composition #optimisation #petri net
- Petri Net decomposition approach for the simultaneous optimization of task assignment and routing with automated guided vehicles (TN, YT, MI), pp. 175–180.
- CASE-2008-StabelliniZ #learning #network #self
- Interference aware self-organization for wireless sensor networks: A reinforcement learning approach (LS, JZ), pp. 560–565.
- CASE-2008-Wang #modelling
- A model-driven approach for remote machine control (LW), pp. 644–649.
- DAC-2008-AhmadiZ #analysis #hardware #optimisation
- Symbolic noise analysis approach to computational hardware optimization (AA, MZ), pp. 391–396.
- DAC-2008-FeldmannA #modelling #physics #towards
- Towards a more physical approach to gate modeling for timing, noise, and power (PF, SA), pp. 453–455.
- DAC-2008-KwonYHMCE #memory management #parallel
- A practical approach of memory access parallelization to exploit multiple off-chip DDR memories (WCK, SY, SMH, BM, KMC, SKE), pp. 447–452.
- DAC-2008-LiBNPC #how #implementation #power management #set
- How to let instruction set processor beat ASIC for low power wireless baseband implementation: a system level approach (ML, BB, DN, LVdP, FC), pp. 345–346.
- DATE-2008-AliWWB #behaviour #modelling #performance
- A New Approach for Combining Yield and Performance in Behavioural Models for Analogue Integrated Circuits (SA, RW, PRW, ADB), pp. 152–157.
- DATE-2008-AvnitDSRP #formal method #problem #protocol
- A Formal Approach To The Protocol Converter Problem (KA, VD, AS, SR, SP), pp. 294–299.
- DATE-2008-BonnotLEGRG #architecture #implementation #multi
- Definition and SIMD Implementation of a Multi-Processing Architecture Approach on FPGA (PB, FL, GE, GG, OR, PG), pp. 610–615.
- DATE-2008-BrinksmaH #dependence
- Dependability for high-tech systems: an industry-as-laboratory approach (EB, JH), pp. 1226–1231.
- DATE-2008-CertnerLPTAD #parallel #performance #predict #source code
- A Practical Approach for Reconciling High and Predictable Performance in Non-Regular Parallel Programs (OC, ZL, PP, OT, FA, ND), pp. 740–745.
- DATE-2008-DavidLLN #game studies #realtime #testing
- A Game-Theoretic Approach to Real-Time System Testing (AD, KGL, SL, BN), pp. 486–491.
- DATE-2008-NagpalGK #design #using
- A Delay-efficient Radiation-hard Digital Design Approach Using CWSP Elements (CN, RG, SPK), pp. 354–359.
- DATE-2008-SchutzGBG #embedded #research #tutorial
- Embedded Tutorial — ARTEMIS and ENIAC Joint Undertakings: A New Approach to Conduct Research in Europe (ES, KG, DB, LG), p. 658.
- DATE-2008-StubeSHL #design #novel
- A Novel Approach for EMI Design of Power Electronics (BS, BS, EH, AL), pp. 170–175.
- DATE-2008-WangKABT #energy #modelling #optimisation #performance
- Integrated approach to energy harvester mixed technology modelling and performance optimisation (LW, TJK, BMAH, SPB, RNT), pp. 704–709.
- HPCA-2008-HurL #power management
- A comprehensive approach to DRAM power management (IH, CL), pp. 305–316.
- HPDC-2008-RaoHK #peer-to-peer
- An unstructured peer-to-peer approach to aggregate node selection (IR, AH, SK), pp. 209–212.
- HPDC-2008-XiaFJTW #correlation #evaluation #file system #mining #named #novel #optimisation #performance
- FARMER: a novel approach to file access correlation mining and evaluation reference model for optimizing peta-scale file system performance (PX, DF, HJ, LT, FW), pp. 185–196.
- PDP-2008-TaillardGD #framework #performance #using #visual notation
- A Graphical Framework for High Performance Computing Using An MDE Approach (JT, FG, JLD), pp. 165–173.
- PPoPP-2008-TatikondaP #adaptation #architecture #manycore #memory management #mining
- An adaptive memory conscious approach for mining frequent trees: implications for multi-core architectures (ST, SP), pp. 263–264.
- ESOP-2008-Ong #higher-order #semantics #verification
- Verification of Higher-Order Computation: A Game-Semantic Approach (CHLO), pp. 299–306.
- FASE-2008-FantechiGLMPT #model checking #specification #verification
- A Model Checking Approach for Verifying COWS Specifications (AF, SG, AL, FM, RP, FT), pp. 230–245.
- FASE-2008-JanotaB #architecture #formal method #modelling
- Formal Approach to Integrating Feature and Architecture Models (MJ, GB), pp. 31–45.
- STOC-2008-BlumLR #database #learning #privacy
- A learning theory approach to non-interactive database privacy (AB, KL, AR), pp. 609–618.
- STOC-2008-GoldwasserGHKR
- A (de)constructive approach to program checking (SG, DG, AH, TK, GNR), pp. 143–152.
- TACAS-2008-Ben-AmramC #ranking #satisfiability #termination
- A SAT-Based Approach to Size Change Termination with Global Ranking Functions (AMBA, MC), pp. 218–232.
- CAV-2008-Bjesse #industrial #model checking #word
- A Practical Approach to Word Level Model Checking of Industrial Netlists (PB), pp. 446–458.
- CAV-2008-GulwaniT #analysis #constraints #hybrid
- Constraint-Based Approach for Analysis of Hybrid Systems (SG, AT), pp. 190–203.
- CAV-2008-MeikleF #proving #verification
- Prover’s Palette: A User-Centric Approach to Verification with Isabelle and QEPCAD-B (LIM, JDF), pp. 309–313.
- CAV-2008-WienandWSKG #algebra #correctness #proving
- An Algebraic Approach for Proving Data Correctness in Arithmetic Data Paths (OW, MW, DS, WK, GMG), pp. 473–486.
- CSL-2008-HermantL #axiom #semantics
- A Constructive Semantic Approach to Cut Elimination in Type Theories with Axioms (OH, JL), pp. 169–183.
- ICLP-2008-BelhaouariP #automation #constraints #logic programming #testing
- A Constraint Logic Programming Approach to Automated Testing (HB, FP), pp. 754–758.
- ICLP-2008-BistarelliGLR #multi #optimisation
- A Soft Approach to Multi-objective Optimization (SB, FG, JL, ER), pp. 764–768.
- ICLP-2008-MileoMB #logic programming #monitoring
- A Logic Programming Approach to Home Monitoring for Risk Prevention in Assisted Living (AM, DM, RB), pp. 145–159.
- ICST-2008-KaplanKPSWY #consistency #generative #less is more #modelling #testing #uml
- Less is More: A Minimalistic Approach to UML Model-Based Conformance Test Generation (MK, TK, AMP, AS, CW, CY), pp. 82–91.
- ICST-2008-KodreZR #statistics #testing
- Statistical Sampling Based Approach to Alleviate Log Replay Testing (RK, HZ, DJR), pp. 533–536.
- ICST-2008-MirarabT #empirical #testing
- An Empirical Study on Bayesian Network-based Approach for Test Case Prioritization (SM, LT), pp. 278–287.
- LICS-2008-DelandeM #proving
- A Neutral Approach to Proof and Refutation in MALL (OD, DM), pp. 498–508.
- LICS-2008-Kahlon #abstraction #analysis #concurrent #data flow #source code
- Parameterization as Abstraction: A Tractable Approach to the Dataflow Analysis of Concurrent Programs (VK), pp. 181–192.
- MBT-2008-PonsG #lightweight #semantics #validation
- A Lightweight Approach for the Semantic Validation of Model Refinements (CP, DG), pp. 43–61.
- TAP-2008-CalvagnaG #combinator #constraints #testing
- A Logic-Based Approach to Combinatorial Testing with Constraints (AC, AG), pp. 66–83.
- CBSE-2007-CortellessaG #component #fault #modelling #reliability
- A Modeling Approach to Analyze the Impact of Error Propagation on Reliability of Component-Based Systems (VC, VG), pp. 140–156.
- CBSE-2007-MallickS #algorithm #constraints #web #web service
- Capturing Web Services Provider Constraints — An Algorithmic Approach (SM, SVS), pp. 211–226.
- CBSE-2007-MulugetaS #component #contract #distributed
- An Approach for QoS Contract Negotiation in Distributed Component-Based Software (MM, AS), pp. 90–106.
- ECSA-2007-EstevezM #design #industrial #modelling
- Model-Driven Approach for Designing Industrial Control Systems (EE, MM), pp. 284–287.
- ECSA-2007-GrauF #architecture #evaluation #generative
- A Goal-Oriented Approach for the Generation and Evaluation of Alternative Architectures (GG, XF), pp. 139–155.
- ECSA-2007-LosillaVAIS #architecture #development #network
- Wireless Sensor Network Application Development: An Architecture-Centric MDE Approach (FL, CVC, BÁ, AI, PS), pp. 179–194.
- ECSA-2007-MorrisonBOWG #architecture #co-evolution
- An Active Architecture Approach to Dynamic Systems Co-evolution (RM, DB, FO, BW, RMG), pp. 2–10.
- ECSA-2007-OrtizPAAS #architecture #case study #component #experience #framework #using
- Experiences Using a Component-Oriented Architectural Framework for Robots and Its Improvement with a MDE Approach (FJO, JAP, DA, BÁ, PS), pp. 335–338.
- ECSA-2007-PahlGH #architecture #modelling #ontology
- An Ontology-Based Approach for Modelling Architectural Styles (CP, SG, WH), pp. 60–75.
- WICSA-2007-AlmeidaAGNML #architecture #design #towards
- Designing Domain-Specific Software Architecture (DSSA): Towards a New Approach (ESdA, AÁ, VCG, LMN, SRdLM, DL), p. 30.
- WICSA-2007-FragaL #architecture #enterprise #ontology
- Training Initiative for New Software/Enterprise Architects: An Ontological Approach (AF, JL), p. 19.
- WICSA-2007-OliveiraW #architecture #modelling
- A Model-Driven Approach to Extract Views from an Architecture Description Language (CO, MW), p. 7.
- WICSA-2007-RossoM #architecture #knowledge-based #scalability #using
- Assessing the Architectonics of Large, Software-Intensive Systems Using a Knowledge-Based Approach (CDR, AM), p. 2.
- DocEng-2007-GrozaSH07a #documentation #generative #named #semantics
- SALT: a semantic approach for generating document representations (TG, AS, SH), pp. 171–173.
- DocEng-2007-ZouLT #analysis #html #markov
- Structure and content analysis for html medical articles: a hidden markov model approach (JZ, DXL, GRT), pp. 199–201.
- DRR-2007-ArivazhaganSS #documentation #segmentation #statistics
- A statistical approach to line segmentation in handwritten documents (MA, HS, SNS).
- DRR-2007-Yan #novel
- A novel approach for nonuniform list fusion (WQY).
- ECDL-2007-DobratzS #repository
- Trustworthy Digital Long-Term Repositories: The Nestor Approach in the Context of International Developments (SD, AS), pp. 210–222.
- ECDL-2007-MaliziaBLA #library
- A Cooperative-Relational Approach to Digital Libraries (AM, PB, SL, FAP), pp. 75–86.
- ECDL-2007-Tonkin #design #metadata
- A User-Centred Approach to Metadata Design (ET), pp. 551–554.
- ECDL-2007-VuongLSCCGTZ #maintenance #metadata #performance #web
- Key Element-Context Model: An Approach to Efficient Web Metadata Maintenance (BQV, EPL, AS, CHC, KC, DHLG, YLT, JZ), pp. 63–74.
- ECDL-2007-WanX #graph #multi #towards
- Towards a Unified Approach Based on Affinity Graph to Various Multi-document Summarizations (XW, JX), pp. 297–308.
- HT-2007-CasteleynWH #adaptation #aspect-oriented #semantics #web
- A semantics-based aspect-oriented approach to adaptation in web engineering (SC, WVW, GJH), pp. 189–198.
- HT-2007-GuerreroCPMM #automation #clustering #semantics
- Clustering as an approach to support the automatic definition of semantic hyperlinks (JACG, AAC, MdGCP, EVM, AAM), pp. 81–84.
- ICDAR-2007-AmorA #multi
- An Approach for Multifont Arabic Characters Features Extraction Based on Contourlet Transform (NBA, NEBA), pp. 1048–1052.
- ICDAR-2007-AraujoCF #online #verification
- An Approach to Improve Accuracy Rate of On-line Signature Verification Systems of Different Sizes (RA, GDCC, ECBCF), pp. 332–336.
- ICDAR-2007-CeciBPM #data mining #detection #mining #order
- A Data Mining Approach to Reading Order Detection (MC, MB, GP, DM), pp. 924–928.
- ICDAR-2007-DriraLE #documentation #image #segmentation
- A Coupled Mean Shift-Anisotropic Diffusion Approach for Document Image Segmentation and Restoration (FD, FL, HE), pp. 814–818.
- ICDAR-2007-DriraLE07a
- OCR Accuracy Improvement through a PDE-Based Approach (FD, FL, HE), pp. 1068–1072.
- ICDAR-2007-GuoMBSR #clustering #geometry #web
- A General Approach for Partitioning Web Page Content Based on Geometric and Style Information (HFG, JM, YB, AS, IVR), pp. 929–933.
- ICDAR-2007-HamzaBB #reasoning
- A Case-Based Reasoning Approach for Invoice Structure Extraction (HH, YB, AB), pp. 327–331.
- ICDAR-2007-HuangSHFN #difference #recognition #using
- An SVM-Based High-accurate Recognition Approach for Handwritten Numerals by Using Difference Features (KH, JS, YH, KF, SN), pp. 589–593.
- ICDAR-2007-JayaramanSC #composition #recognition
- Modular Approach to Recognition of Strokes in Telugu Script (AJ, CCS, VSC), pp. 501–505.
- ICDAR-2007-KessentiniPB #multi #recognition #word
- A Multi-stream Approach to Off-Line Handwritten Word Recognition (YK, TP, ABH), pp. 317–321.
- ICDAR-2007-LemaitreGP #2d #analysis #layout #markov
- Preliminary experiments in layout analysis of handwritten letters based on textural and spatial information and a 2D Markovian approach (ML, EG, FJP), pp. 1023–1027.
- ICDAR-2007-LouloudisGH #detection #documentation #using
- Text Line Detection in Unconstrained Handwritten Documents Using a Block-Based Hough Transform Approach (GL, BG, CH), pp. 599–603.
- ICDAR-2007-MaSLW #modelling #online #recognition
- A MSD-HMM Approach to Pen Trajectory Modeling for Online Handwriting Recognition (LM, FKS, PL, YJW), pp. 128–132.
- ICDAR-2007-SriraghavendraKB #distance #documentation #online
- Fréchet Distance Based Approach for Searching Online Handwritten Documents (ES, KK, CB), pp. 461–465.
- ICDAR-2007-ToujAA07a #hybrid #markov #modelling #recognition
- A hybrid approach for off-line Arabic handwriting recognition based on a Planar Hidden Markov modeling (SMT, NEBA, HA), pp. 964–968.
- ICDAR-2007-WillemsV #detection #interactive #network
- A Bayesian Network Approach to Mode Detection for Interactive Maps (DW, LV), pp. 869–873.
- ICDAR-2007-YoshidaN #documentation #modelling #parsing #web
- Web Document Parsing: A New Approach to Modeling Layout-Language Relations (MY, HN), pp. 203–207.
- ICDAR-2007-YuZL #recognition
- A New Syntactic Approach to Graphic Symbol Recognition (YY, WZ, WL), pp. 516–520.
- JCDL-2007-ChenKM #adaptation #visual notation
- Adaptive graphical approach to entity resolution (ZC, DVK, SM), pp. 204–213.
- JCDL-2007-MonroyFC #multi
- A multilingual approach to technical manuscripts: 16th and 17th-century Portuguese shipbuilding treatises (CM, RF, FC), pp. 413–414.
- SIGMOD-2007-ChuBN #relational #set
- The case for a wide-table approach to manage sparse relational data sets (EC, JLB, JFN), pp. 821–832.
- SIGMOD-2007-DasguptaDM #database #random
- A random walk approach to sampling hidden databases (AD, GD, HM), pp. 629–640.
- SIGMOD-2007-LeeM #design
- Design of flash-based DBMS: an in-page logging approach (SWL, BM), pp. 55–66.
- VLDB-2007-BatiGHS #database #random testing #search-based #testing
- A genetic approach for random testing of database systems (HB, LG, SH, AS), pp. 1243–1251.
- VLDB-2007-ChuBCDN #incremental #query #relational #semistructured data
- A Relational Approach to Incrementally Extracting and Querying Structure in Unstructured Data (EC, AB, TC, AD, JFN), pp. 1045–1056.
- VLDB-2007-DeRoseSCDR #community #composition #incremental #top-down #web
- Building Structured Web Community Portals: A Top-Down, Compositional, and Incremental Approach (PD, WS, FC, AD, RR), pp. 399–410.
- VLDB-2007-GonzalezHLMS #adaptation #mining #network #performance
- Adaptive Fastest Path Computation on a Road Network: A Traffic Mining Approach (HG, JH, XL, MM, JPS), pp. 794–805.
- VLDB-2007-LeeZL #concurrent #distributed #integration #query #throughput
- Request Window: an Approach to Improve Throughput of RDBMS-based Data Integration System by Utilizing Data Sharing Across Concurrent Distributed Queries (RL, MZ, HL), pp. 1219–1230.
- VLDB-2007-SilbersteinGMPY
- Making Sense of Suppressions and Failures in Sensor Data: A Bayesian Approach (AS, AEG, KM, GP, JY), pp. 842–853.
- VLDB-2007-VrhovnikSSMMMK #process
- An Approach to Optimize Data Processing in Business Processes (MV, HS, OS, BM, VM, AM, TK), pp. 615–626.
- CSEET-2007-BradySVW #case study #communication #development
- Addressing Communication Issues in Software Development: A Case Study Approach (AB, MS, TV, CW), pp. 301–308.
- CSEET-2007-GargV #case study #education #effectiveness #re-engineering
- A Study of the Effectiveness of Case Study Approach in Software Engineering Education (KG, VV), pp. 309–316.
- CSEET-2007-WangAJ #architecture #education #empirical
- Educational Approach to an Experiment in a Software Architecture Course (AIW, EA, MLJ), pp. 291–300.
- ITiCSE-2007-Impagliazzo #source code #using
- Using an outcome-based approach to assess computing programs (JI), p. 344.
- ITiCSE-2007-KorteAPG #education #learning #novel
- Learning by game-building: a novel approach to theoretical computer science education (LK, SA, HP, JG), pp. 53–57.
- ITiCSE-2007-MillerS #agile #embedded #programming #student
- A TDD approach to introducing students to embedded programming (JM, MRS), pp. 33–37.
- SIGITE-2007-LeungC07a #automation #detection #natural language
- A natural language processing approach to automatic plagiarism detection (CHL, YYC), pp. 213–218.
- CSMR-2007-GrossoPG #database #mining
- An approach for mining services in database oriented applications (CDG, MDP, IGRdG), pp. 287–296.
- CSMR-2007-Leitao #framework #java #lisp #migration #platform #source code
- Migration of Common Lisp Programs to the Java Platform — The Linj Approach (AML), pp. 243–251.
- CSMR-2007-LuciaDGR #design pattern
- A Two Phase Approach to Design Pattern Recovery (ADL, VD, CG, MR), pp. 297–306.
- CSMR-2007-SharafatT #object-oriented #predict #probability
- A Probabilistic Approach to Predict Changes in Object-Oriented Software Systems (ARS, LT), pp. 27–38.
- ICPC-2007-PetterssonL #design pattern #detection
- A Non-conservative Approach to Software Pattern Detection (NP, WL), pp. 189–198.
- ICSM-2007-LiuZHB
- Indexing Noncrashing Failures: A Dynamic Program Slicing-Based Approach (CL, XZ, YZ, JH, BKB), pp. 455–464.
- ICSM-2007-PentaHAQ #communication #maintenance #search-based
- The Effect of Communication Overhead on Software Maintenance Project Staffing: a Search-Based Approach (MDP, MH, GA, FQ), pp. 315–324.
- ICSM-2007-Vivanco #modelling #predict #quality #using
- Improving Predictive Models of Software Quality Using an Evolutionary Computational Approach (RV), pp. 503–504.
- MSR-2007-JoshiZRB #debugging #predict
- Local and Global Recency Weighting Approach to Bug Prediction (HJ, CZ, SR, CB), p. 33.
- MSR-2007-MizunoINK
- Spam Filter Based Approach for Finding Fault-Prone Software Modules (OM, SI, SN, TK), p. 4.
- WCRE-2007-DuffyM #automation #c++ #grammar recovery
- An Automated Approach to Grammar Recovery for a Dialect of the C++ Language (EBD, BAM), pp. 11–20.
- WCRE-2007-GuzmanPP #database #relational #towards #web #web service
- An ADM Approach to Reengineer Relational Databases towards Web Services (IGRdG, MP, MP), pp. 90–99.
- WCRE-2007-RaberL07a #automation #identification #named #obfuscation
- Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation (JR, EL), pp. 275–276.
- LATA-2007-Bensch #context-sensitive grammar #parallel
- An Approach to Parallel Mildly Context-Sensitive Grammar Formalisms (SB), pp. 91–102.
- LATA-2007-DassowF #comparison
- Comparison of Some Descriptional Complexities of 0L Systems Obtained by a Unifying Approach (JD, HF), pp. 249–260.
- LATA-2007-Nemeth #comparative #on the
- On the Regularity of Binoid Languages: A Comparative Approach (ZLN), pp. 449–460.
- IFM-2007-HanebergGRS #smarttech #verification
- Verifying Smart Card Applications: An ASM Approach (DH, HG, WR, GS), pp. 313–332.
- SEFM-2007-SalehD #novel #security #verification
- Verifying Security Properties of Cryptoprotocols: A Novel Approach (MS, MD), pp. 349–360.
- SEFM-2007-ZhuHLB #algebra #semantics #web #web service
- Algebraic Approach to Linking the Semantics of Web Services (HZ, JH, JL, JPB), pp. 315–328.
- SFM-2007-Ciardo #data transformation #diagrams #performance #representation
- Data Representation and Efficient Solution: A Decision Diagram Approach (GC), pp. 371–394.
- AIIDE-2007-ThueBSW #interactive #modelling
- Interactive Storytelling: A Player Modelling Approach (DT, VB, MS, EW), pp. 43–48.
- AIIDE-2007-WintermuteXL #named #realtime
- SORTS: A Human-Level Approach to Real-Time Strategy AI (SW, JZX, JEL), pp. 55–60.
- DiGRA-2007-LinderothB #game studies
- This is not a Door: an Ecological approach to Computer Games (JL, UB).
- DiGRA-2007-WalzB #design #game studies #persuasion #pervasive
- Pervasive Persuasive: A Rhetorical Design Approach to a Location-Based Spell-Casting Game for Tourists (SPW, RB).
- GDCSE-J-2007-AbeeleHVD #design #game studies
- A Soft Approach to Computer Science: Designing & Developing Computer Games for and with Senior Citizens (VVA, JH, LV, SD).
- AGTIVE-2007-KniemeyerBHK #architecture #biology #graph transformation #parallel #relational
- Relational Growth Grammars — A Parallel Graph Transformation Approach with Applications in Biology and Architecture (OK, GB, RH, WK), pp. 152–167.
- GT-VMT-2007-RangelKE #bisimulation #verification
- Bisimulation Verification for the DPO Approach with Borrowed (GR, BK, HE).
- CHI-2007-TanYM #adaptation #people #visual notation #web
- An adaptive & adaptable approach to enhance web graphics accessibility for visually impaired people (CCT, WY, GM), pp. 1539–1542.
- CHI-2007-ZimmermanTSHMCM #automation #learning #named
- Vio: a mixed-initiative approach to learning and automating procedural update tasks (JZ, AT, IS, IH, KM, JC, RMM), pp. 1445–1454.
- DHM-2007-BeurierCMTW #data-driven #database #simulation #using
- Simulation of Digital Human Hand Postures of Car Controls Using a Data Based Approach (GB, NC, GM, JT, XW), pp. 13–22.
- DHM-2007-LiLZ #algorithm #identification #modelling #multi #robust
- A Robust Algorithm for a System Identification Approach to Digital Human Modeling: An Application to Multi-fingered Hand Movement (KL, SWL, XZ), pp. 157–160.
- DHM-2007-WangCC #capacity #data-driven #modelling
- A Data-Based Modeling Approach of Reach Capacity and Discomfort for Digital Human Models (XW, EC, NC), pp. 215–223.
- DHM-2007-ZhengB #modelling #navigation
- An Integrated Approach for Reconstructing Surface Models of the Proximal Femur from Sparse Input Data for Surgical Navigation (GZ, MÁGB), pp. 767–775.
- HCI-AS-2007-ConvertinoZGCR #distributed #multi
- A Role-Based Multiple View Approach to Distributed Geo-Collaboration (GC, DZ, CHG, JMC, MBR), pp. 561–570.
- HCI-AS-2007-KimuraTHTAOT #analysis #using
- The Analysis of Near-Miss Cases Using Data-Mining Approach (MK, KT, TH, YT, TA, MO, FT), pp. 474–483.
- HCI-AS-2007-LinJYLHC #design
- A Human-Centered Systems Approach to Ship Facility Design (CJL, YTJ, CWY, SBL, YHH, HJC), pp. 639–648.
- HCI-AS-2007-LiuKL #learning
- Breaking the Traditional E-Learning Mould: Support for the Learning Preference Approach (FL, JK, LL), pp. 294–301.
- HCI-AS-2007-MorDML #behaviour
- A Three-Level Approach for Analyzing User Behavior in Ongoing Relationships (EM, MGD, JM, SL), pp. 971–980.
- HCI-AS-2007-PengKLC #tablet
- The Practices of Scenario Observation Approach in Defining Medical Tablet PC Applications (CYP, WSK, YZL, WKC), pp. 518–524.
- HCI-AS-2007-YiJ #analysis #online #protocol
- The Antecedents of Online Consumers’ Perceived Usefulness of Website: A Protocol Analysis Approach (CY, ZJ), pp. 142–149.
- HCI-IDU-2007-AndoK #concept #research #towards #usability
- Long Term Usability; Its Concept and Research Approach — The Origin of the Positive Feeling Toward the Product (MA, MK), pp. 393–396.
- HCI-IDU-2007-Berkman #interactive #testing #usability
- General Interaction Expertise: An Approach for Sampling in Usability Testing of Consumer Products (AEB), pp. 397–406.
- HCI-IDU-2007-FangTZ #composition #design #interactive
- A Pattern Decomposition and Interaction Design Approach (CF, PT, MZ), pp. 1102–1108.
- HCI-IDU-2007-FerreM #development #how
- How a Human-Centered Approach Impacts Software Development (XF, NM), pp. 68–77.
- HCI-IDU-2007-GiersichFFKRS #behaviour #modelling #recognition #towards
- Towards an Integrated Approach for Task Modeling and Human Behavior Recognition (MG, PF, GF, TK, DR, HS), pp. 1109–1118.
- HCI-IDU-2007-LiangHC #design #experience
- User Oriented Design to the Chinese Industries Scenario and Experience Innovation Design Approach for the Industrializing Countries in the Digital Technology Era (YZL, DHH, WKC), pp. 156–163.
- HCI-IDU-2007-Yenisey #axiom #design #web
- Axiomatic Design Approach for E-Commercial Web Sites (MMY), pp. 308–315.
- HCI-IDU-2007-ZimmermannG #design
- A Requirement Engineering Approach to User Centered Design (DZ, LG), pp. 360–369.
- HCI-MIE-2007-BaranDC #eye tracking #how #problem
- How Do Adults Solve Digital Tangram Problems? Analyzing Cognitive Strategies Through Eye Tracking Approach (BB, BD, KÇ), pp. 555–563.
- HIMI-IIE-2007-CastroCM #design #education
- A Quantitative Approach for the Design of Academic Curricula (CC, BC, EM), pp. 279–288.
- HIMI-IIE-2007-RheeCB #performance #process
- A More Comprehensive Approach to Enhancing Business Process Efficiency (SHR, NWC, HB), pp. 955–964.
- HIMI-MTT-2007-Aikio #development #usability
- Exporting Usability Knowledge into a Small-Sized Software Development Organization — A Pattern Approach (KPA), pp. 3–11.
- HIMI-MTT-2007-CornsML #development #machine learning #optimisation #using
- Development of an Approach for Optimizing the Accuracy of Classifying Claims Narratives Using a Machine Learning Tool (TEXTMINER[4]) (HLC, HRM, MRL), pp. 411–416.
- HIMI-MTT-2007-CouturierRC #interactive #scalability #set
- An Interactive Approach to Display Large Sets of Association Rules (OC, JR, VC), pp. 258–267.
- HIMI-MTT-2007-KimYKYK #interactive
- A Cognitive Approach to Enhancing Human-Robot Interaction for Service Robots (YCK, WCY, HTK, YSY, HJK), pp. 858–867.
- HIMI-MTT-2007-MarucciLC #classification #fuzzy #using
- Computer Classification of Injury Narratives Using a Fuzzy Bayes Approach: Improving the Model (HRM, MRL, HLC), pp. 500–506.
- HIMI-MTT-2007-NishimuraH #case study #data mining #fault #mining #visualisation
- The Study of Past Working History Visualization for Supporting Trial and Error Approach in Data Mining (KN, MH), pp. 327–334.
- HIMI-MTT-2007-ZhuSC #process #quality #visualisation
- Integrating Data Quality Data into Decision-Making Process: An Information Visualization Approach (BZ, GS, YC), pp. 366–369.
- OCSC-2007-Bakx #community #design #social
- User-Centred Design Approach for a Community Website with Social Software (IB), pp. 3–11.
- OCSC-2007-KanawatiM #information management #network #social
- Computing Social Networks for Information Sharing: A Case-Based Approach (RK, MM), pp. 86–95.
- CAiSE-2007-MutschlerRR #information management #modelling
- Analyzing the Dynamic Cost Factors of Process-Aware Information Systems: A Model-Based Approach (BM, MR, SR), pp. 589–603.
- EDOC-2007-HessHVE #multi
- Structuring Software Cities A Multidimensional Approach (AH, BH, MV, GE), pp. 122–129.
- EDOC-2007-LiningtonL #behaviour #modelling #security #using
- Incorporating Security Behaviour into Business Models Using a Model Driven Approach (PFL, PL), pp. 405–413.
- EDOC-2007-WangVG #named #transaction
- TxQoS: A Contractual Approach for Transaction Management (TW, JV, PWPJG), pp. 327–338.
- ICEIS-AIDSS-2007-CrawfordLCP #set
- A Evolutionary Approach to Solve Set Covering (BC, CL, CC, FP), pp. 356–363.
- ICEIS-AIDSS-2007-Dignum #performance
- Knowledge Sharing and Organizational Performance — An Agent-mediated Approach (VD), pp. 504–509.
- ICEIS-AIDSS-2007-HouariF #collaboration #performance
- An Agent-Based Approach to Support Performance Management for Dynamic and Collaborative Work (NH, BHF), pp. 178–184.
- ICEIS-AIDSS-2007-LevashovaPL #enterprise #modelling
- Provision of Context-Sensitive Enterprise Knowledge for Decision Support: An Approach based on Enterprise Models and Information Demand Contexts (TL, MP, ML), pp. 88–93.
- ICEIS-AIDSS-2007-RamabadranG #flexibility #learning
- Intelligent E-Learning Systems — An Intelligent Approach to Flexible Learning Methodologies (SR, VG), pp. 107–112.
- ICEIS-AIDSS-2007-Rodriguez-EliasMFVS #analysis #design #identification #information management
- Knowledge Flow Analysis to Identify Knowledge Needs for the Design of Knowledge Management Systems and Strategies — A Methodological Approach (OMRE, AIMG, JF, AV, JPS), pp. 492–497.
- ICEIS-AIDSS-2007-SkaruzSB #detection #network #sql
- Recurrent Neural Networks Approach to The Detection of SQL Attacks (JS, FS, PB), pp. 191–197.
- ICEIS-AIDSS-2007-SohniusJME #analysis #assessment #design #performance #simulation
- An Approach for Assessing Design Systems: Design System Simulation and Analysis for Performance Assessment (RS, EJ, WEM, VE), pp. 231–236.
- ICEIS-AIDSS-2007-StateCPS #classification
- A Connectionist Approach in Bayesian Classification (LS, CC, PV, VS), pp. 185–190.
- ICEIS-AIDSS-2007-Vallejo-FernandezGL #optimisation
- A Qualitative Expert Knowledge Approach to Rendering Optimization (DVF, CGM, LJL), pp. 336–341.
- ICEIS-DISI-2007-CabreroGP #design #maintenance
- Maintenance cost of a software design: A value-based approach (DCM, JG, MP), pp. 384–389.
- ICEIS-DISI-2007-FavreBB
- Dimension hierarchies updates in data warehouses — a user-driven approach (CF, FB, OB), pp. 206–211.
- ICEIS-DISI-2007-GorawskiG #distributed #query
- Distributed approach of continuous queries with knn join processing in spatial data warehouse (MG, WG), pp. 131–136.
- ICEIS-DISI-2007-KalinichenkoBMSS #enterprise #framework #information management
- Mediation framework for enterprise information system infrastructures: Application-driven approach (LAK, DOB, DOM, NAS, SAS), pp. 246–251.
- ICEIS-DISI-2007-NowalczykT #privacy
- A policy-based privacy storage approach (JN, FTC), pp. 605–608.
- ICEIS-DISI-2007-RajuganCD #modelling
- Modeling dimensions in the XDW model — a LVM-driven approach (RR, EC, TSD), pp. 60–70.
- ICEIS-DISI-2007-RaminhosP #declarative #using
- Extraction and transformation of data from semi-structured text files using a declarative approach (RR, JMP), pp. 199–205.
- ICEIS-DISI-2007-WagnerM #adaptation #middleware #reuse
- A virtualization approach for reusing middleware adapters (RW, BM), pp. 78–85.
- ICEIS-EIS-2007-BonacinBS #flexibility
- A Semiotic Approach for Flexible E-Government Service Oriented Systems (RB, MCCB, TMdS), pp. 381–386.
- ICEIS-EIS-2007-HuangZZ #analysis #process #workflow
- A New Approach for Workflow Process Delta Analysis Based on SYN-NET (XQH, WZ, SZ), pp. 480–488.
- ICEIS-EIS-2007-NetjesMRA #process #towards
- An Evolutionary Approach for Business Process Redesign — Towards an Intelligent System (MN, SLM, HAR, WMPvdA), pp. 47–54.
- ICEIS-EIS-2007-VacaS #metric #modelling #quality
- GIS Quality Model — A Metric Approach to Quality Models (WS, APRS), pp. 176–183.
- ICEIS-HCI-2007-BabaianLT #graph #process #visualisation
- Visualizing the Process — A Graph-Based Approach to Enhancing System-User Knowledge Sharing (TB, WTL, HT), pp. 123–128.
- ICEIS-HCI-2007-WerdaMH #interactive
- A New LIP-Reading Approach for Human Computer Interaction (SW, WM, ABH), pp. 27–36.
- ICEIS-J-2007-Castro-SchezVBG #e-commerce #fuzzy #logic
- A Fuzzy Logic Based Approach to Improve Cataloguing and Searching in e-Commerce Portals (JJCS, DVF, LRB, JMG), pp. 316–327.
- ICEIS-J-2007-CombemaleCGTV #modelling #process #verification
- A Property-Driven Approach to Formal Verification of Process Models (BC, XC, PLG, XT, FV), pp. 286–300.
- ICEIS-J-2007-NetjesMRA07a #process
- Performing Business Process Redesign with Best Practices: An Evolutionary Approach (MN, SLM, HAR, WMPvdA), pp. 199–211.
- ICEIS-J-2007-SteenbergenBB07a #architecture #enterprise
- A Balanced Approach to Developing the Enterprise Architecture Practice (MvS, MvdB, SB), pp. 240–253.
- ICEIS-SAIC-2007-Gerlicher #aspect-oriented #collaboration #framework #integration #multi #realtime
- Transparent Extension of Single-User Applications to Multi-User Real-Time Collaborative Systems — An Aspect Oriented Approach to Framework Integration (ARSG), pp. 327–334.
- ICEIS-SAIC-2007-LokeLIK #adaptation #smarttech #towards #workflow
- Adaptive Workflows for Smart Devices — A Concrete Approach Towards Device Failures (SWL, SL, MI, SK), pp. 191–197.
- ICEIS-SAIC-2007-Maximilien #challenge #problem #ruby #semantics #using #web #web service
- A Partial Solution to the Semantic Web Services Challenge Problem Using Swashup — The Ruby on Rails Services Mashup Approach (EMM), pp. 438–446.
- ICEIS-SAIC-2007-SchneiderSS #collaboration #named #online
- CONEWS: A Collaborative Approach to Online News Stories (DSS, JMdS, EdS), pp. 101–106.
- ICEIS-SAIC-2007-ShahSA #framework
- An Intelligent Agent Based Approach to MOSAICA’s Pedagogical Framework (NS, JIAS, BA), pp. 219–226.
- ICEIS-SAIC-2007-ShengN #novel #robust #web #web service
- A Novel Approach for Robust Web Services Provisioning (QZS, AHHN), pp. 121–128.
- CIKM-2007-AltingovdeOCYU #automation #web
- An automatic approach to construct domain-specific web portals (ISA, RO, SC, HY, ÖU), pp. 849–852.
- CIKM-2007-JiangZ #adaptation #classification #statistics
- A two-stage approach to domain adaptation for statistical classifiers (JJ, CZ), pp. 401–410.
- CIKM-2007-LiA #clustering #multi #named #relational
- Diva: a variance-based clustering approach for multi-type relational data (TL, SSA), pp. 147–156.
- CIKM-2007-NamataSGS #interactive #network #visualisation
- A dual-view approach to interactive network visualization (GN, BS, LG, BS), pp. 939–942.
- CIKM-2007-RaghuveerJMDD #performance #semistructured data #towards
- Towards efficient search on unstructured data: an intelligent-storage approach (AR, MJ, MFM, BKD, DHCD), pp. 951–954.
- ECIR-2007-DalmauF #clustering
- Experimental Results of the Signal Processing Approach to Distributional Clustering of Terms on Reuters-21578 Collection (MCD, ÓWMF), pp. 678–681.
- ECIR-2007-VildjiounaiteK #modelling
- A Layered Approach to Context-Dependent User Modelling (EV, SK), pp. 749–752.
- ECIR-2007-YeungBCK #documentation #learning
- A Bayesian Approach for Learning Document Type Relevance (PCKY, SB, CLAC, MK), pp. 753–756.
- ICML-2007-CaoQLTL #learning #rank
- Learning to rank: from pairwise approach to listwise approach (ZC, TQ, TYL, MFT, HL), pp. 129–136.
- ICML-2007-DavisCRP #predict #process
- An integrated approach to feature invention and model construction for drug activity prediction (JD, VSC, SR, DP), pp. 217–224.
- ICML-2007-GuoHFX #modelling #network
- Recovering temporally rewiring networks: a model-based approach (FG, SH, WF, EPX), pp. 321–328.
- ICML-2007-KrauseG #learning #process
- Nonmyopic active learning of Gaussian processes: an exploration-exploitation approach (AK, CG), pp. 449–456.
- ICML-2007-WilsonFRT #learning #multi
- Multi-task reinforcement learning: a hierarchical Bayesian approach (AW, AF, SR, PT), pp. 1015–1022.
- KDD-2007-HuaP #heuristic
- Cleaning disguised missing data: a heuristic approach (MH, JP), pp. 950–958.
- KDD-2007-ShigaTM #clustering #composition #network
- A spectral clustering approach to optimally combining numericalvectors with a modular network (MS, IT, HM), pp. 647–656.
- KDD-2007-ZhuZNWH #comprehension
- Webpage understanding: an integrated approach (JZ, BZ, ZN, JRW, HWH), pp. 903–912.
- MLDM-2007-ChristiansenD #case study #evaluation #generative #machine learning #testing
- A Machine Learning Approach to Test Data Generation: A Case Study in Evaluation of Gene Finders (HC, CMD), pp. 742–755.
- MLDM-2007-CzarnowskiJ #multi
- An Agent-Based Approach to the Multiple-Objective Selection of Reference Vectors (IC, PJ), pp. 117–130.
- MLDM-2007-MicarelliS #detection
- A Case-Based Approach to Anomaly Intrusion Detection (AM, GS), pp. 434–448.
- MLDM-2007-RaudysM #multi
- Multi-agent System Approach to React to Sudden Environmental Changes (SR, AM), pp. 810–823.
- MLDM-2007-WangXC #classification #mining #novel
- A Novel Rule Ordering Approach in Classification Association Rule Mining (YJW, QX, FC), pp. 339–348.
- MLDM-2007-YuL #classification #graph #named
- PE-PUC: A Graph Based PU-Learning Approach for Text Classification (SY, CL), pp. 574–584.
- RecSys-2007-Lorenzi #knowledge-based #maintenance #multi #recommendation
- A multiagent knowledge-based recommender approach with truth maintenance (FL), pp. 195–198.
- RecSys-2007-TaghipourKG #learning #recommendation #web
- Usage-based web recommendations: a reinforcement learning approach (NT, AAK, SSG), pp. 113–120.
- SEKE-2007-Chao #documentation #object-oriented #rdf #retrieval #xml
- An Object-Oriented Approach to Storage and Retrieval of RDF/XML Documents (CMC), pp. 586–591.
- SEKE-2007-FarEHA #concept #learning #named #ontology #statistics
- Adjudicator: A Statistical Approach for Learning Ontology Concepts from Peer Agents (BHF, AHE, NH, MA), p. 654–?.
- SEKE-2007-FerriGP #human-computer #interactive #multimodal
- An Approach to Multimodal Input Interpretation in Human-Computer Interaction (FF, PG, SP), pp. 664–669.
- SEKE-2007-FuDASH #correctness #java #validation
- An Approach to Validating Translation Correctness From SAM to Java (YF, ZD, GAG, LS, XH), p. 45–?.
- SEKE-2007-KanaskarSR #analysis #detection #using
- A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
- SEKE-2007-MaiaBW #component #modelling #named
- Odyssey-MDA: A Transformational Approach to Component Models (NM, APTB, CMLW), pp. 9–14.
- SEKE-2007-MurphyKA #machine learning #testing
- An Approach to Software Testing of Machine Learning Applications (CM, GEK, MA), p. 167–?.
- SEKE-2007-OladimejiSC #architecture #modelling
- A Model-driven Approach to Architecting Secure Software (EAO, SS, LC), p. 535–?.
- SEKE-2007-RaibuletUM #adaptation #resource management
- An Adaptive Resource Management Approach for a Healthcare System (CR, LU, SM), pp. 286–291.
- SEKE-2007-TeekayuphunS #hybrid #natural language #query
- A Hybrid Approach for Natural Language Query Translation (PT, OS), pp. 368–373.
- SIGIR-2007-AlmeidaGCC #adaptation #component #programming #ranking #search-based
- A combined component approach for finding collection-adapted ranking functions based on genetic programming (HMdA, MAG, MC, PC), pp. 399–406.
- SIGIR-2007-BroderFJR #semantics
- A semantic approach to contextual advertising (AZB, MF, VJ, LR), pp. 559–566.
- SIGIR-2007-CaiCLBH #retrieval
- MRF based approach for sentence retrieval (KC, CC, KL, JB, PH), pp. 795–796.
- SIGIR-2007-CustisA #query
- A new approach for evaluating query expansion: query-document term mismatch (TC, KAK), pp. 575–582.
- SIGIR-2007-FarahV #information retrieval #rank
- An outranking approach for rank aggregation in information retrieval (MF, DV), pp. 591–598.
- ECMDA-FA-2007-BarberoJGB
- A Practical Approach to Model Extension (MB, FJ, JG, JB), pp. 32–42.
- ECMDA-FA-2007-YuZZWZZL #automation #generative #modelling #towards
- Towards a Model Driven Approach to Automatic BPEL Generation (XY, YZ, TZ, LW, JZ, GZ, XL), pp. 204–218.
- MoDELS-2007-BasinCDE #metamodelling #modelling
- A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
- MoDELS-2007-RenggliDK #developer #named
- Magritte — A Meta-driven Approach to Empower Developers and End Users (LR, SD, AK), pp. 106–120.
- MoDELS-2007-SukaviriyaSRM #design #interface #lifecycle #modelling
- Model-Driven Approach for Managing Human Interface Design Life Cycle (NS, VS, TR, SM), pp. 226–240.
- MoDELS-2007-ZhaoZHM #e-commerce #generative #user interface
- A Business-Process-Driven Approach for Generating E-Commerce User Interfaces (XZ, YZ, JH, BM), pp. 256–270.
- SPLC-2007-Ishida #development #enterprise #product line
- Software Product Lines Approach in Enterprise System Development (YI), pp. 44–53.
- MoDELS-2007-BasinCDE #metamodelling #modelling
- A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
- MoDELS-2007-RenggliDK #developer #named
- Magritte — A Meta-driven Approach to Empower Developers and End Users (LR, SD, AK), pp. 106–120.
- MoDELS-2007-SukaviriyaSRM #design #interface #lifecycle #modelling
- Model-Driven Approach for Managing Human Interface Design Life Cycle (NS, VS, TR, SM), pp. 226–240.
- MoDELS-2007-ZhaoZHM #e-commerce #generative #user interface
- A Business-Process-Driven Approach for Generating E-Commerce User Interfaces (XZ, YZ, JH, BM), pp. 256–270.
- OOPSLA-2007-XianSJ #garbage collection #named #performance
- Microphase: an approach to proactively invoking garbage collection for improved performance (FX, WSa, HJ), pp. 77–96.
- TOOLS-EUROPE-2007-CicchettiRP #difference #independence #metamodelling #representation
- A Metamodel Independent Approach to Difference Representation (AC, DDR, AP), pp. 165–185.
- AdaEurope-2007-AlonsoVSAL #ada #automation #code generation #modelling #using
- Automatic Ada Code Generation Using a Model-Driven Engineering Approach (DA, CVC, PS, BÁ, FL), pp. 168–179.
- AdaEurope-2007-BordinV #correctness #metamodelling #realtime
- Correctness by Construction for High-Integrity Real-Time Systems: A Metamodel-Driven Approach (MB, TV), pp. 114–127.
- AdaEurope-2007-ElleuchKA #development #embedded #realtime
- ArchMDE Approach for the Development of Embedded Real Time Systems (NE, AK, SBA), pp. 142–154.
- AdaEurope-2007-WooCJ #compilation #representation #testing
- An Intermediate Representation Approach to Reducing Test Suites for Retargeted Compilers (GW, HSC, HJ), pp. 100–113.
- LOPSTR-2007-AbdennadherS #constraints #generative #rule-based #theorem proving
- Generation of Rule-Based Constraint Solvers: Combined Approach (SA, IS), pp. 106–120.
- LOPSTR-2007-Mendez-LojoNH #analysis #flexibility #object-oriented #source code
- A Flexible, (C)LP-Based Approach to the Analysis of Object-Oriented Programs (MML, JAN, MVH), pp. 154–168.
- PADL-2007-BarahonaK #constraints #problem #programming
- A Constraint Programming Approach to Bioinformatics Structural Problems (PB, LK), pp. 33–49.
- POPL-2007-Ghica #design #geometry #synthesis
- Geometry of synthesis: a structured approach to VLSI design (DRG), pp. 363–375.
- POPL-2007-PredaCJD #detection #semantics
- A semantics-based approach to malware detection (MDP, MC, SJ, SKD), pp. 377–388.
- QAPL-2007-YaikhomCGH #modelling #performance #using
- A Structural Approach for Modelling Performance of Systems Using Skeletons (GY, MC, SG, JH), pp. 167–183.
- RE-2007-AsnarGBMR #empirical
- Secure and Dependable Patterns in Organizations: An Empirical Approach (YA, PG, RB, VM, CR), pp. 287–292.
- RE-2007-ThurimellaB #evolution #product line #requirements
- Evolution in Product Line Requirements Engineering: A Rationale Management Approach (AKT, BB), pp. 254–257.
- REFSQ-2007-AurumW #concept #requirements
- A Value-Based Approach in Requirements Engineering: Explaining Some of the Fundamental Concepts (AA, CW), pp. 109–115.
- REFSQ-2007-GuelfiP #analysis #flexibility #product line #requirements
- A Flexible Requirements Analysis Approach for Software Product Lines (NG, GP), pp. 78–92.
- ASE-2007-DevescoviNM #development #framework
- An infrastructure for autonomic system development: the selflet approach (DD, EDN, RM), pp. 449–452.
- ASE-2007-KagdiCM #mining
- An approach to mining call-usage patternswith syntactic context (HHK, MLC, JIM), pp. 457–460.
- ASE-2007-NakagawaTH #generative #model transformation #modelling #requirements #specification
- Formal specification generator for KAOS: model transformation approach to generate formal specifications from KAOS requirements models (HN, KT, SH), pp. 531–532.
- ASE-2007-WangMYM #automation #monitoring #requirements
- An automated approach to monitoring and diagnosing requirements (YW, SAM, YY, JM), pp. 293–302.
- ASE-2007-YilmazW #automation #debugging #modelling
- An automated model-based debugging approach (CY, CW), pp. 174–183.
- ESEC-FSE-2007-EvansS #detection #difference #testing
- Differential testing: a new approach to change detection (RBE, AS), pp. 549–552.
- ESEC-FSE-2007-Kavaldjian #generative #modelling #user interface
- A model-driven approach to generating user interfaces (SK), pp. 603–606.
- ESEC-FSE-2007-MiranskyyMGDWG #execution #multi #scalability
- An iterative, multi-level, and scalable approach to comparing execution traces (AVM, NHM, MG, MD, MW, DG), pp. 537–540.
- ESEC-FSE-2007-Pietrantuono #component #novel
- Component airbag: a novel approach to develop dependable component-based applications (RP), pp. 599–602.
- ESEC-FSE-2007-UzuncaovaGKB #product line #testing
- A specification-based approach to testing software product lines (EU, DG, SK, DSB), pp. 525–528.
- ESEC-FSE-2007-ZhouLZ #model transformation
- A segment-based approach for reconcilable model transformation (XZ, YL, JZ), pp. 517–520.
- ICSE-2007-SrinivasanL #education #process
- A Constructivist Approach to Teaching Software Processes (JS, KL), pp. 664–672.
- SAC-2007-BirukouBDGKM #development #named #recommendation
- IC-service: a service-oriented approach to the development of recommendation systems (AB, EB, VD, PG, NK, AM), pp. 1683–1688.
- SAC-2007-CimadamoreV #java #using
- Reifying wildcards in Java using the EGO approach (MC, MV), pp. 1315–1322.
- SAC-2007-ClementeHS #aspect-oriented #component
- An MDA approach to develop systems based on components and aspects (PJC, JH, FS), pp. 1033–1034.
- SAC-2007-FerreiraLO #java #model checking
- A Java code annotation approach for model checking software systems (GF, EL, EASO), pp. 1536–1537.
- SAC-2007-GiuntaPT #grid #integration
- An aspect-generated approach for the integration of applications into grid (RG, GP, ET), pp. 1295–1296.
- SAC-2007-GustafssonTDH #aspect-oriented #behaviour #embedded #evolution #performance
- Engineering active behavior of embedded software to improve performance and evolution: an aspect-oriented approach (TG, AT, YD, JH), pp. 673–679.
- SAC-2007-HuXP #modelling #using
- Modeling deceptive information dissemination using a holistic approach (YH, ZX, BP), pp. 1591–1598.
- SAC-2007-InokiF #evolution #product line
- Software product line evolution method based on kaizen approach (MI, YF), pp. 1207–1214.
- SAC-2007-KimHK #folksonomy #mining
- FCA-based approach for mining contextualized folksonomy (HLK, ShH, HGK), pp. 1340–1345.
- SAC-2007-KimS #consistency #modelling #uml
- An approach to evaluating structural pattern conformance of UML models (DKK, WS), pp. 1404–1408.
- SAC-2007-KoralalageRMGC #lifecycle #privacy #security
- POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
- SAC-2007-LiuMB #clustering
- A clustering entropy-driven approach for exploring and exploiting noisy functions (SHL, MM, BRB), pp. 738–742.
- SAC-2007-NarendraO #composition #execution #modelling #web #web service
- Modeling web service composition and execution via a requirements-driven approach (NCN, BO), pp. 1642–1648.
- SAC-2007-PetterssonSK #network
- A CP-LP approach to network management in OSPF routing (MPP, RS, KK), pp. 311–315.
- SAC-2007-SantosBOJ #documentation #forensics #verification
- Off-line signature verification based on forensic questioned document examination approach (CRS, FB, LSO, EJRJ), pp. 637–638.
- SAC-2007-SpinosaCG #clustering #concept #data type #detection #named
- OLINDDA: a cluster-based approach for detecting novelty and concept drift in data streams (EJS, ACPdLFdC, JG), pp. 448–452.
- SAC-2007-Suzuki #problem
- An edit operation-based approach to the inclusion problem for DTDs (NS), pp. 482–488.
- SAC-2007-WuJN
- An approach for indexing, storing and retrieving domain knowledge (HW, HJ, XN), pp. 1381–1382.
- SAC-2007-YingboJJ #machine learning #workflow
- A machine learning approach to semi-automating workflow staff assignment (YL, JW, JS), pp. 340–345.
- SAC-2007-YouH #personalisation #ranking
- Personalized ranking: a contextual ranking approach (GwY, SwH), pp. 506–510.
- ATEM-2007-FleureyBFG #automation #composition
- A Generic Approach for Automatic Model Composition (FF, BB, RBF, SG), pp. 7–15.
- GPCE-2007-MaraninchiB #component #embedded #modelling #named #programmable
- 42: programmable models of computation for a component-based approach to heterogeneous embedded systems (FM, TB), pp. 53–62.
- CASE-2007-GodeHRCS #automation #flexibility #framework #information management #integration #platform
- Laboratory Information Management Systems — An Approach as an Integration Platform within Flexible Laboratory Automation for Application in Life Sciences (BG, SHL, KR, MYC, NS), pp. 841–845.
- CASE-2007-GuLZF #problem #scheduling
- Dynamic Local Focusing Approach for Production Scheduling Problems (PG, YL, XZ, SF), pp. 466–471.
- CASE-2007-HablaMD #capacity #finite
- A Finite Capacity Production Planning Approach for Semiconductor Manufacturing (CH, LM, RD), pp. 82–87.
- CASE-2007-HongC #automation #petri net #resource management
- Resource Allocation for a Life Science Automation Line: a Petri nets Approach (TH, MYC), pp. 887–892.
- CASE-2007-JinBS
- A Consolidated Approach to Minimize Semiconductor Production Loss Due to Unscheduled ATE Downtime (TJ, FB, CHS), pp. 188–193.
- CASE-2007-KeirHCC #artificial reality
- A New Approach to Accelerometer-based Head Tracking for Augmented Reality & Other Applications (MSK, CEH, JGC, XC), pp. 603–608.
- CASE-2007-KimLSSZ #biology #metric #performance #using
- Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), pp. 219–224.
- CASE-2007-KimLSSZ07a #biology #metric #performance #using
- Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), p. 91–?.
- CASE-2007-LiW #analysis #reliability
- An Importance Sampling Based Approach for Reliability Analysis (FL, TW), pp. 956–961.
- CASE-2007-NarasimhaKS #email #information management #markov #process
- A Semi Markov Decision Process Approach To E-mail Management In A Knowledge Work Environment (CYN, MK, RS), pp. 1051–1056.
- CASE-2007-QuadtM
- Line Planning in a Hierarchical Production Planning Approach (DQ, CKM), pp. 489–494.
- CASE-2007-YangM #automation #feature model #interactive #matrix #verification
- Automatic Feasibility Verification of Object Configurations: A New Approach Based on Feature Interaction Matrices (FY, MMM), pp. 686–691.
- CASE-2007-ZhangG
- Calibration of Wafer Handling Robots: A Fixturing Approach (MTZ, KG), pp. 255–260.
- CGO-2007-BirkbeckLA #abstraction #matlab
- A Dimension Abstraction Approach to Vectorization in Matlab (NB, JL, JNA), pp. 115–130.
- DAC-2007-AgostaBPS #canonical
- A Unified Approach to Canonical Form-based Boolean Matching (GA, FB, GP, DS), pp. 841–846.
- DAC-2007-CoptyJKV #generative #novel #testing
- Intelligent Interleaving of Scenarios: A Novel Approach to System Level Test Generation (SC, IJ, YK, MV), pp. 891–895.
- DAC-2007-KumarMCTH #estimation #multi #performance #probability
- A Probabilistic Approach to Model Resource Contention for Performance Estimation of Multi-featured Media Devices (AK, BM, HC, BDT, YH), pp. 726–731.
- DATE-2007-BrandenburgSHEE #algorithm #design #novel #prototype
- From algorithm to first 3.5G call in record time: a novel system design approach based on virtual prototyping and its consequences for interdisciplinary system design teams (MB, AS, SH, JE, TE), pp. 828–830.
- DATE-2007-MoonBP #composition #equivalence
- A compositional approach to the combination of combinational and sequential equivalence checking of circuits without known reset states (IHM, PB, CP), pp. 1170–1175.
- DATE-2007-SatishRK #communication #constraints #graph #multi #optimisation #scheduling
- A decomposition-based constraint optimization approach for statically scheduling task graphs with communication delays to multiprocessors (NS, KR, KK), pp. 57–62.
- DATE-2007-SinanogluP
- A non-intrusive isolation approach for soft cores (OS, TP), pp. 27–32.
- DATE-2007-ZhangOSFKB #analysis #named #parametricity #process
- CMCal: an accurate analytical approach for the analysis of process variations with non-gaussian parameters and nonlinear functions (MZ, MO, DS, MF, HK, EB), pp. 243–248.
- DATE-2007-ZhouB #reduction #scheduling #testing #using
- Test cost reduction for SoC using a combined approach to test data compression and test scheduling (QZ, KJB), pp. 39–44.
- HPCA-2007-ChafiCCMMBKO #memory management #scalability #transaction
- A Scalable, Non-blocking Approach to Transactional Memory (HC, JC, BDC, AM, CCM, WB, CK, KO), pp. 97–108.
- HPDC-2007-SandholmL #statistics
- A statistical approach to risk mitigation in computational markets (TS, KL), pp. 85–96.
- PDP-2007-AielloACSU #distributed #information management #named #network
- DNK-WSD: A Distributed Approach for Knowledge Discovery in Peer to Peer Networks (GA, MA, MC, PS, AU), pp. 325–332.
- PDP-2007-CilardoCMR07a #evaluation #performance #security
- Performance Evaluation of Security Services: An Experimental Approach (AC, LC, AM, LR), pp. 387–394.
- PDP-2007-FalcoSTC #difference #distributed #evolution #grid
- A Distributed Differential Evolution Approach for Mapping in a Grid Environment (IDF, US, ET, ADC), pp. 442–449.
- PDP-2007-MezmazMT #bound #branch #parallel
- A Grid-based Parallel Approach of the Multi-Objective Branch and Bound (MSM, NM, EGT), pp. 23–30.
- FASE-2007-MirarabT #network #testing
- A Prioritization Approach for Software Test Cases Based on Bayesian Networks (SM, LT), pp. 276–290.
- FASE-2007-RobbesLL #evolution #semantics
- An Approach to Software Evolution Based on Semantic Change (RR, ML, ML), pp. 27–41.
- FASE-2007-ZhouY #clustering #design #object-oriented
- A Clustering-Based Approach for Tracing Object-Oriented Design to Requirement (XZ, HY), pp. 412–422.
- STOC-2007-AroraK #combinator #source code
- A combinatorial, primal-dual approach to semidefinite programs (SA, SK), pp. 227–236.
- TACAS-2007-CondratK #preprocessor
- A Gröbner Basis Approach to CNF-Formulae Preprocessing (CC, PK), pp. 618–631.
- TACAS-2007-DAprileDSS #automaton #petri net
- From Time Petri Nets to Timed Automata: An Untimed Approach (DD, SD, AS, JS), pp. 216–230.
- TACAS-2007-DoyenR #algorithm #model checking
- Improved Algorithms for the Automata-Based Approach to Model-Checking (LD, JFR), pp. 451–465.
- A-MOST-2007-FarooqIMN #state machine #testing
- An approach for selective state machine based regression testing (QuaF, MZZI, ZIM, AN), pp. 44–52.
- CAV-2007-Russinoff #verification
- A Mathematical Approach to RTL Verification (DMR), p. 2.
- CSL-2007-Alfaro #game studies
- The Symbolic Approach to Repeated Games (LdA), p. 3.
- ICLP-2007-UnelT #logic programming
- Logic Programming Approach to Automata-Based Decision Procedures (GÜ, DT), pp. 165–179.
- ISSTA-2007-ChangPY #what
- Finding what’s not there: a new approach to revealing neglected conditions in software (RYC, AP, JY), pp. 163–173.
- LICS-2007-Edalat #integration
- A computable approach to measure and integration theory (AE), pp. 463–472.
- SAT-2007-AloulK #deployment #satisfiability
- Sensor Deployment for Failure Diagnosis in Networked Aerial Robots: A Satisfiability-Based Approach (FAA, NK), pp. 369–376.
- TestCom-FATES-2007-BenharrefDSEG #testing #web #web service
- New Approach for EFSM-Based Passive Testing of Web Services (AB, RD, MAS, AEN, RHG), pp. 13–27.
- TestCom-FATES-2007-UralX #detection #fault
- An EFSM-Based Passive Fault Detection Approach (HU, ZX), pp. 335–350.
- VMCAI-2007-Revesz #constraints #database #verification
- The Constraint Database Approach to Software Verification (PZR), pp. 329–345.
- CBSE-2006-GrassiMS #analysis #component #model transformation #performance #reliability
- A Model Transformation Approach for the Early Performance and Reliability Analysis of Component-Based Systems (VG, RM, AS), pp. 270–284.
- CBSE-2006-SuveeFV #aspect-oriented #component #development #symmetry #towards
- A Symmetric and Unified Approach Towards Combining Aspect-Oriented and Component-Based Software Development (DS, BDF, WV), pp. 114–122.
- ECDL-2006-LeeTGF #design #learning
- An Exploratory Factor Analytic Approach to Understand Design Features for Academic Learning Environments (SSL, YLT, DHLG, SSBF), pp. 315–328.
- JCDL-2006-McRae-SpencerS #ambiguity #graph
- Also by the same author: AKTiveAuthor, a citation graph approach to name disambiguation (DMMS, NRS), pp. 53–54.
- JCDL-2006-OnELKP #clique #effectiveness #library #problem #using
- An effective approach to entity resolution problem using quasi-clique and its application to digital libraries (BWO, EE, DL, JK, JP), pp. 51–52.
- SIGMOD-2006-KandoganKRVZ #database #information retrieval #semantics
- Avatar semantic search: a database approach to information retrieval (EK, RK, SR, SV, HZ), pp. 790–792.
- SIGMOD-2006-SharfmanSK #data type #distributed #geometry #monitoring
- A geometric approach to monitoring threshold functions over distributed data streams (IS, AS, DK), pp. 301–312.
- VLDB-2006-LauM #distributed
- An Integrated Approach to Recovery and High Availability in an Updatable, Distributed Data Warehouse (EL, SM), pp. 703–714.
- VLDB-2006-MohanW #data access #interactive #named
- IPAC — An Interactive Approach to Access Control for Semi-structured Data (SM, YW), pp. 1147–1150.
- VLDB-2006-TuLPY #database
- Load Shedding in Stream Databases: A Control-Based Approach (YCT, SL, SP, BY), pp. 787–798.
- VLDB-2006-Tung0KO #similarity
- Similarity Search: A Matching Based Approach (AKHT, RZ, NK, BCO), pp. 631–642.
- VLDB-2006-XinHCL #multi #query #ranking
- Answering Top-k Queries with Multi-Dimensional Selections: The Ranking Cube Approach (DX, JH, HC, XL), pp. 463–475.
- CSEET-2006-GrunbacherSBIKP #education #re-engineering #student
- Making Every Student a Winner: The WinWin Approach in Software Engineering Education (PG, NS, ROB, HPI, HK, DP), pp. 201–208.
- ITiCSE-2006-Ellis06a #learning #named #self
- Self-grading: an approach to supporting self-directed learning (HJCE), p. 349.
- ITiCSE-2006-GrayH #user interface #visual notation
- An introspective approach to marking graphical user interfaces (GRG, CAH), pp. 43–47.
- ITiCSE-2006-Hamer #case study #experience #student
- Some experiences with the “contributing student approach” (JH), pp. 68–72.
- ITiCSE-2006-Moses #animation #programming
- Animation programming: an alternative approach to CS1 (LM), p. 317.
- ITiCSE-2006-OKellyG #education #learning #problem #programming
- RoboCode & problem-based learning: a non-prescriptive approach to teaching programming (JO, JPG), pp. 217–221.
- ITiCSE-2006-PecinovskyPP
- Let’s modify the objects-first approach into design-patterns-first (RP, JP, LP), pp. 188–192.
- ITiCSE-2006-Snapp
- A Puzzles-First approach to computer science (RRS), p. 310.
- SIGITE-2006-Catanio #development #education #lifecycle
- An interdisciplinary practical approach to teaching the software development life-cycle (JC), pp. 3–8.
- SIGITE-2006-Gutierrez #learning #named #security
- Stingray: a hands-on approach to learning information security (FG), pp. 53–58.
- CSMR-2006-Cleve #automation #database #re-engineering
- Automating Program Conversion in Database Reengineering A Wrapper-based Approach (AC), pp. 323–326.
- CSMR-2006-DAmbrosL #debugging #evolution #visual notation
- Software Bugs and Evolution: A Visual Approach to Uncover Their Relationship (MD, ML), pp. 229–238.
- CSMR-2006-DistanteTC #legacy #towards #web
- Towards a Holistic Approach to Redesigning Legacy Applications for the Web with UWAT (DD, SRT, GC), pp. 295–299.
- CSMR-2006-TonuAT #architecture #using
- Evaluating Architectural Stability Using a Metric-Based Approach (SAT, AA, LT), pp. 261–270.
- CSMR-2006-TuunanenKK #information retrieval #named #reverse engineering
- ASLA: Reverse Engineering Approach for Software License Information Retrieval (TT, JK, TK), pp. 291–294.
- ICPC-2006-KoskinenKS #behaviour #comprehension
- Profile-Based Approach to Support Comprehension of Software Behavior (JK, MK, TS), pp. 212–224.
- ICPC-2006-RooverMGGD #behaviour #documentation #lightweight #verification
- An Approach to High-Level Behavioral Program Documentation Allowing Lightweight Verification (CDR, IM, KG, KG, TD), pp. 202–211.
- ICPC-2006-VinzE #comprehension
- A Synergistic Approach to Program Comprehension (BLV, LHE), pp. 69–73.
- ICPC-2006-ZouH #e-commerce #workflow
- An Approach for Extracting Workflows from E-Commerce Applications (YZ, MH), pp. 127–136.
- ICSM-2006-GoldHLM #bound #concept #source code #using
- Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
- ICSM-2006-LiuGSLZS #generative #multi #testing
- An Approach to Test Data Generation for Killing Multiple Mutants (MHL, YFG, JS, JHL, LZ, JS), pp. 113–122.
- ICSM-2006-LiuT #comprehension #maintenance #validation
- An Approach to Aid the Understanding and Maintenance of Input Validation (HL, HBKT), pp. 370–379.
- ICSM-2006-LuciaOS #incremental #traceability
- Incremental Approach and User Feedbacks: a Silver Bullet for Traceability Recovery (ADL, RO, PS), pp. 299–309.
- MSR-2006-WalkerHHKS #estimation #impact analysis #lightweight #probability
- A lightweight approach to technical risk estimation via probabilistic impact analysis (RJW, RH, IH, PK, AS), pp. 98–104.
- WCRE-2006-FischerG #analysis #lightweight #named #scalability
- EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software Systems (MF, HG), pp. 179–188.
- WCRE-2006-LaitkorpiKS #interface #uml
- A UML-based Approach for Abstracting Application Interfaces to REST-like Services (ML, JK, TS), pp. 134–146.
- DLT-2006-DediuKKN #generative #graph grammar
- Contextual Hypergraph Grammars — A New Approach to the Generation of Hypergraph Languages (AHD, RKH, HJK, BN), pp. 327–338.
- ICALP-v2-2006-Stirling #game studies #higher-order
- A Game-Theoretic Approach to Deciding Higher-Order Matching (CS), pp. 348–359.
- FM-2006-ZhengWWX #case study #development #formal method #object-oriented #using
- Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach (YZ, JW, KW, JX), pp. 190–204.
- SEFM-2006-RodriguesBCFG #using
- A Bag-of-Tasks Approach for State Space Exploration Using Computational Grids (CLR, PESB, JMC, JCAdF, DSG), pp. 226–235.
- SEFM-2006-SukumaranSV #requirements #validation
- A Rigorous Approach to Requirements Validation (SS, AS, RV), pp. 236–245.
- FLOPS-2006-CasasCH #evaluation #functional #higher-order #lazy evaluation
- A Syntactic Approach to Combining Functional Notation, Lazy Evaluation, and Higher-Order in LP Systems (AC, DC, MVH), pp. 146–162.
- FLOPS-2006-GregoireTW #type system
- A Computational Approach to Pocklington Certificates in Type Theory (BG, LT, BW), pp. 97–113.
- Haskell-2006-DerrinEKCC #development #kernel
- Running the manual: an approach to high-assurance microkernel development (PD, KE, GK, DC, MMTC), pp. 60–71.
- AIIDE-2006-JhalaY #automation #requirements
- Representational Requirements for a Plan Based Approach to Automated Camera Control (AJ, RMY), pp. 36–41.
- AIIDE-2006-McQuigganLL #induction #interactive #predict
- Predicting User Physiological Response for Interactive Environments: An Inductive Approach (SWM, SL, JCL), pp. 60–65.
- ICGT-2006-VelascoL #graph transformation #matrix #sequence
- Matrix Approach to Graph Transformation: Matching and Sequences (PPPV, JdL), pp. 122–137.
- CHI-2006-ParikhJSGT #documentation #mobile
- Mobile phones and paper documents: evaluating a new approach for capturing microfinance data in rural India (TSP, PJ, KS, KG, KT), pp. 551–560.
- CHI-2006-TangKFH #people #privacy
- Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications (KPT, PK, JF, JIH), pp. 93–102.
- CSCW-2006-LiL #editing #lightweight
- A lightweight approach to transparent sharing of familiar single-user editors (DL, JL), pp. 139–148.
- CAiSE-2006-ValderasPP #development #towards #web
- Towards an End-User Development Approach for Web Engineering Methods (PV, VP, OP), pp. 528–543.
- CAiSE-2006-YangNLC #outsourcing #performance #query #xml
- An Efficient Approach to Support Querying Secure Outsourced XML Information (YY, WN, HLL, JC), pp. 157–171.
- EDOC-2006-MutschlerBR06a #evaluation #perspective #workflow
- An Evaluation Approach for Analyzing Workflow Management Systems from a Value-based Perspective (BM, JB, MR), pp. 477–482.
- EDOC-2006-SunMY #flexibility #novel #workflow
- A Novel Approach for Role Hierarchies in Flexible RBAC Workflow (YS, XM, FY), pp. 488–491.
- ICEIS-AIDSS-2006-Fornells-HerreraRMB #evolution
- Decision Support System for Breast Cancer Diagnosis by a Meta-Learning Approach Based on Grammar Evolution (AFH, EGiR, EBiM, JMB), pp. 222–229.
- ICEIS-AIDSS-2006-JacquenetLU #performance #scalability
- Efficient Management of Non Redundant Rules in Large Pattern Bases: A Bitmap Approach (FJ, CL, CU), pp. 208–215.
- ICEIS-AIDSS-2006-RuffoloM #information management #semantics
- A Logic-Based Approach to Semantic Information Extraction (MR, MM), pp. 115–123.
- ICEIS-AIDSS-2006-ShrLC #constraints #scheduling
- A Load Balancing Scheduling Approach for Dedicated Machine Constraint (AMDS, AL, PPC), pp. 170–175.
- ICEIS-DISI-2006-DingGJH #modelling #transaction
- A New Approach to Implement Extended Transaction Models in J2EE (XD, XG, BJ, TH), pp. 118–123.
- ICEIS-DISI-2006-GascuenaCM #multi #representation
- A Multidimensional Approach to the Representation of the Spatio-Temporal Multi-Granularity (CMG, DC, PM), pp. 175–180.
- ICEIS-DISI-2006-QuimbayaA #ontology
- Data Warehouses: An Ontology Approach (APQ, JA), pp. 187–192.
- ICEIS-HCI-2006-MeloB #evaluation #user interface #web
- An Inclusive Approach to Cooperative Evaluation of Web User Interfaces (AMM, MCCB), pp. 65–70.
- ICEIS-ISAS-2006-ChengX #behaviour #concurrent #detection #formal method #online
- A Formal Approach to Detecting Shilling Behaviors in Concurrent Online Auctions (YTC, HX), pp. 375–381.
- ICEIS-ISAS-2006-CostelloFMLD #distributed #framework #modelling #named #process #using
- iWISE: A Framework for Providing Distributed Process Visibility Using an Event-Based Process Modelling Approach (CC, WF, OM, GL, JD), pp. 224–233.
- ICEIS-ISAS-2006-GrimanPM #development #guidelines #process
- Methodological Guidelines for SQA in Development Process — An Approach Based on the SPICE Model (AG, MAP, LEM), pp. 269–275.
- ICEIS-ISAS-2006-KnackstedtJR #configuration management #modelling #transaction
- Configuring Reference Models — An Integrated Approach for Transaction Processing and Decision Support (RK, CJ, TR), pp. 135–143.
- ICEIS-ISAS-2006-MaamarBBNC #development #modelling #towards #web #web service
- Towards a Contextual Model-Driven Development Approach for Web Services (ZM, KB, DB, NCN, MC), pp. 78–85.
- ICEIS-ISAS-2006-MansetVMO #architecture #automation #generative #grid #modelling
- A Formal Architecture-Centric Model-Driven Approach for the Automatic Generation of Grid Applications (DM, HV, RM, FO), pp. 322–330.
- ICEIS-ISAS-2006-PourrazVO #architecture #evolution
- An Architecture-Centric Approach for Managing the Evolution of EAI Services-Oriented Architecture (FP, HV, FO), pp. 234–241.
- ICEIS-ISAS-2006-QueirosR #information management #social
- Structured Approach for the Introduction of Information Services into the Private Social Solidarity Institutions (AQ, NPdR), pp. 343–348.
- ICEIS-ISAS-2006-Vaisman #elicitation #quality #requirements
- Requirements Elicitation for Decision Support Systems: A Data Quality Approach (AAV), pp. 316–321.
- ICEIS-J-2006-Ifinedo06a #enterprise #equation #modelling #resource management
- Measuring Enterprise Resource Planning (ERP) Systems Success: A Structural Equation Modeling Approach (PI), pp. 86–97.
- ICEIS-J-2006-Leukel06a #classification #data transformation
- Controlling Property Growth in Product Classification Schemes: A Data Management Approach (JL), pp. 363–374.
- ICEIS-J-2006-PourrazV #architecture #evolution #using
- Managing Service-Based EAI Architectures Evolution Using a Formal Architecture-Centric Approach (FP, HV), pp. 269–280.
- ICEIS-SAIC-2006-Gonzalez0 #named #programming
- AOPOA — Organizational Approach for Agent Oriented Programming (EG, METM), pp. 75–80.
- ICEIS-SAIC-2006-HendersonS #collaboration #process
- A Narrative Approach to Collaborative Writing — A Business Process Model (PH, NDS), pp. 166–173.
- ICEIS-SAIC-2006-KohlerMO #composition #petri net
- Dynamic Service Composition: A Petri-Net Based Approach (MK, DM, JO), pp. 159–165.
- ICEIS-SAIC-2006-MaamarMB #web #web service
- A Policy-Based Approach to Secure Context in a Web Services Environment (ZM, GKM, DB), pp. 100–105.
- ICEIS-SAIC-2006-MarjanovicSMRG #collaboration #learning #process
- Supporting Complex Collaborative Learning Activities — The Libresource Approach (OM, HSM, PM, FAR, CG), pp. 59–65.
- CIKM-2006-AngelovaS #clustering #documentation
- A neighborhood-based approach for clustering of linked document collections (RA, SS), pp. 778–779.
- CIKM-2006-ButtcherC #retrieval
- A document-centric approach to static index pruning in text retrieval systems (SB, CLAC), pp. 182–189.
- CIKM-2006-Gkoulalas-DivanisV #integer #programming
- An integer programming approach for frequent itemset hiding (AGD, VSV), pp. 748–757.
- CIKM-2006-LiuWL #modelling #pervasive #physics #query
- Integrated RFID data modeling: an approach for querying physical objects in pervasive computing (SL, FW, PL), pp. 822–823.
- CIKM-2006-WangRMJ #named #xml
- HUX: a schemacentric approach for updating XML views (LW, EAR, MM, MJ), pp. 816–817.
- ECIR-2006-Amati #information retrieval
- Frequentist and Bayesian Approach to Information Retrieval (GA), pp. 13–24.
- ECIR-2006-ButtcherC #hybrid #maintenance #retrieval
- A Hybrid Approach to Index Maintenance in Dynamic Text Retrieval Systems (SB, CLAC), pp. 229–240.
- ECIR-2006-CornacchiaV #declarative #information retrieval
- A Declarative DB-Powered Approach to IR (RC, APdV), pp. 543–547.
- ECIR-2006-KoolenAKR #documentation #retrieval
- A Cross-Language Approach to Historic Document Retrieval (MK, FA, JK, MdR), pp. 407–419.
- ECIR-2006-ZhouZH #concept #information retrieval #modelling #using
- Using Concept-Based Indexing to Improve Language Modeling Approach to Genomic IR (XZ, XZ, XH), pp. 444–455.
- ICML-2006-AzranG #clustering #data-driven
- A new approach to data driven clustering (AA, ZG), pp. 57–64.
- ICML-2006-RuckertK #learning #statistics
- A statistical approach to rule learning (UR, SK), pp. 785–792.
- ICPR-v1-2006-BoschMOM #classification #question #what
- Object and Scene Classification: what does a Supervised Approach Provide us? (AB, XM, AO, RM), pp. 773–777.
- ICPR-v1-2006-CarterYF #behaviour #markov #recognition
- A Combined Bayesian Markovian Approach for Behaviour Recognition (NLC, DPY, JMF), pp. 761–764.
- ICPR-v1-2006-HadidP #detection #hybrid
- A Hybrid Approach to Face Detection under Unconstrained Environments (AH, MP), pp. 227–230.
- ICPR-v1-2006-LiHS #bound #image #machine learning
- A Machine Learning Approach for Locating Boundaries of Liver Tumors in CT Images (YL, SH, KS), pp. 400–403.
- ICPR-v1-2006-MaiH #multi #re-engineering
- Augmented Lagrangian Approach for Projective Reconstruction from Multiple Views (FM, YSH), pp. 634–637.
- ICPR-v1-2006-MollerR #clustering #nearest neighbour
- A Cluster Validity Approach based on Nearest-Neighbor Resampling (UM, DR), pp. 892–895.
- ICPR-v1-2006-OlagueP #3d #re-engineering
- Honeybees as an Intelligent based Approach for 3D Reconstruction (GO, CP), pp. 1116–1119.
- ICPR-v1-2006-Sun #constraints #estimation
- A Three-Frame Approach to Constraint-Consistent Motion Estimation (ZS), pp. 35–38.
- ICPR-v1-2006-WenhardtDHND #3d #re-engineering
- An Information Theoretic Approach for Next Best View Planning in 3-D Reconstruction (SW, BD, JH, HN, JD), pp. 103–106.
- ICPR-v1-2006-YingZ #image #linear #novel
- A Novel Linear Approach to Camera Calibration from Sphere Images (XY, HZ), pp. 535–538.
- ICPR-v2-2006-ChangYP
- An Iterative Bayesian Approach for Digital Matting (HC, QY, CP), pp. 122–125.
- ICPR-v2-2006-ChenLC
- In this paper, an approach for deaf-people (ZWC, YCL, CCC), pp. 104–107.
- ICPR-v2-2006-DeguchiO #effectiveness
- An Information Theoretic Approach for Active and Effective Object Recognitions (KD, HO), p. 622.
- ICPR-v2-2006-DhandraMHH #detection #documentation #image
- Skew Detection in Binary Image Documents Based on Image Dilation and Region labeling Approach (BVD, VSM, MH, RH), pp. 954–957.
- ICPR-v2-2006-GaoLL #classification #learning #optimisation
- An ensemble classifier learning approach to ROC optimization (SG, CHL, JHL), pp. 679–682.
- ICPR-v2-2006-GarainCM
- Improvement of OCR Accuracy by Similar Character Pair Discrimination: an Approach based on Artificial Immune System (UG, MPC, DDM), pp. 1046–1049.
- ICPR-v2-2006-GrimHSP #modelling #using
- A Subspace Approach to Texture Modelling by Using Gaussian Mixtures (JG, MH, PS, PP), pp. 235–238.
- ICPR-v2-2006-HaindlM #modelling #multi #segmentation #using
- Unsupervised Texture Segmentation Using Multispectral Modelling Approach (MH, SM), pp. 203–206.
- ICPR-v2-2006-HautiereA
- Visible Edges Thresholding: a HVS based Approach (NH, DA), pp. 155–158.
- ICPR-v2-2006-McDanielKP #classification #visual notation
- A Bayesian Approach to Visual Size Classification of Everyday Objects (TLM, KK, SP), pp. 255–259.
- ICPR-v2-2006-MitaKH #categorisation #performance #probability #robust
- A Probabilistic Approach to Fast and Robust Template Matching and its Application to Object Categorization (TM, TK, OH), pp. 597–601.
- ICPR-v2-2006-PungprasertyingCK #analysis #learning #migration #performance
- Migration Analysis: An Alternative Approach for Analyzing Learning Performance (PP, RC, BK), pp. 837–840.
- ICPR-v2-2006-RooverCM #multi #set
- Smoothing with Active Surfaces: A Multiphase Level Set Approach (CDR, JC, BMM), pp. 243–246.
- ICPR-v2-2006-WimmerRB #classification
- A Person and Context Specific Approach for Skin Color Classification (MW, BR, MB), pp. 39–42.
- ICPR-v2-2006-YuanQYZ #classification #kernel
- An Approach for Constructing Sparse Kernel Classifier (ZY, YQ, YY, NZ), pp. 560–563.
- ICPR-v2-2006-ZhanWG #image #robust #segmentation
- A Robust Split-and-Merge Text Segmentation Approach for Images (YZ, WW, WG), pp. 1002–1005.
- ICPR-v3-2006-BaldacciGLR #clustering
- A Template-Matching Approach for Protein Surface Clustering (LB, MG, AL, SR), pp. 340–343.
- ICPR-v3-2006-ChiuLWCC #detection #video
- A Time Warping Based Approach for Video Copy Detection (CYC, CHL, HAW, CSC, LFC), pp. 228–231.
- ICPR-v3-2006-ChongTL #modelling #recognition
- A Model-based Approach for Rigid Object Recognition (CBC, TT, FLL), pp. 116–120.
- ICPR-v3-2006-HalavatiSTCR #novel #performance #recognition #robust #speech #word
- A Novel Approach to Very Fast and Noise Robust, Isolated Word Speech Recognition (RH, SBS, HT, AC, MR), pp. 190–193.
- ICPR-v3-2006-HuRH #clustering #robust
- An Interweaved HMM/DTW Approach to Robust Time Series Clustering (JH, BKR, LH), pp. 145–148.
- ICPR-v3-2006-JaberAM #analysis #information retrieval #metric #novel
- A Novel Approach for Lexical Noise Analysis and Measurement in Intelligent Information Retrieval (TJ, AA, PM), pp. 370–373.
- ICPR-v3-2006-JoshiNLS #correlation
- A Maximum-Likelihood Approach to Symbolic Indirect Correlation (AJ, GN, DPL, SCS), pp. 99–103.
- ICPR-v3-2006-KongGT #invariant
- A Viewpoint Invariant Approach for Crowd Counting (DK, DG, HT), pp. 1187–1190.
- ICPR-v3-2006-NicolasPH #documentation #markov #segmentation
- A Markovian Approach for Handwritten Document Segmentation (SN, TP, LH), pp. 292–295.
- ICPR-v3-2006-SagheerTTAM #feature model #multi #performance #problem
- Fast Feature Extraction Approach for Multi-Dimension Feature Space Problems (AES, NT, RiT, DA, SM), pp. 417–420.
- ICPR-v3-2006-SagirogluE #assembly #automation
- A Texture Based Matching Approach for Automated Assembly of Puzzles (MSS, AE), pp. 1036–1041.
- ICPR-v3-2006-SchmidtWY
- A Split & Merge Approach to Metric-Topological Map-Building (JS, CKW, WKY), pp. 1069–1072.
- ICPR-v3-2006-WangHWH #image
- A New Approach for Fractal Image Compression on a Virtual Hexagonal Structure (HW, XH, QW, TH), pp. 909–912.
- ICPR-v3-2006-WangNC #classification
- A Minimum Sphere Covering Approach to Pattern Classification (JW, PN, LNC), pp. 433–436.
- ICPR-v3-2006-Xu #artificial reality #gesture #network #recognition
- A Neural Network Approach for Hand Gesture Recognition in Virtual Reality Driving Training System of SPG (DX), pp. 519–522.
- ICPR-v3-2006-ZhangSZS #clustering #geometry #image
- A Global Geometric Approach for Image Clustering (SZ, CS, ZZ, ZS), pp. 1244–1247.
- ICPR-v4-2006-KiseNIY #performance #physics #recognition #towards
- Efficient Recognition of Planar Objects Based on Hashing of Keypoints — An Approach Towards Making the Physical World Clickable (KK, TN, MI, SY), pp. 813–816.
- ICPR-v4-2006-LiZZB #analysis #automation #multi #segmentation #using
- A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis (QL, LZ, DZ, PB), pp. 77–80.
- ICPR-v4-2006-MohantySK
- A Non-Iterative Approach to Reconstruct Face Templates from Match Scores (PM, SS, RK), pp. 598–601.
- ICPR-v4-2006-OliverMMBF #classification
- A new approach to the classification of mammographic masses and normal breast tissue (AO, JM, RM, AB, JF), pp. 707–710.
- ICPR-v4-2006-SaadS #composition #image #segmentation
- Shape Decomposition Approach for Ultrasound Color Doppler Image Segmentation (AAS, LGS), pp. 691–694.
- ICPR-v4-2006-WangK #automation #estimation #using
- Automatic Alignment of High-Resolution NMR Spectra Using a Bayesian Estimation Approach (ZW, SBK), pp. 667–670.
- ICPR-v4-2006-YuI #named #semantics
- Spatial-HMM: A new approach for Semantic Annotation of Histological (FY, HHSI), pp. 663–666.
- ICPR-v4-2006-ZhangSZS06a #clustering #geometry #image
- A Global Geometric Approach for Image Clustering (SZ, CS, ZZ, ZS), p. 960.
- KDD-2006-KeCN #correlation #mining #using
- Mining quantitative correlated patterns using an information-theoretic approach (YK, JC, WN), pp. 227–236.
- KDD-2006-MeruguRP #estimation #multi
- A new multi-view regression approach with an application to customer wallet estimation (SM, SR, CP), pp. 656–661.
- KDD-2006-NathBM #classification #clustering #scalability #using
- Clustering based large margin classification: a scalable approach using SOCP formulation (JSN, CB, MNM), pp. 674–679.
- KR-2006-Truszczynski #algebra #equivalence
- Strong and Uniform Equivalence of Nonmonotonic Theories — An Algebraic Approach (MT), pp. 389–399.
- SEKE-2006-HappelKST #named #reuse
- KOntoR: An Ontology-enabled Approach to Software Reuse (HJH, AK, SS, PT), pp. 349–354.
- SEKE-2006-KrishnaCG #elicitation #requirements
- Genre-based approach to Requirements Elicitation (AK, RJC, AKG), pp. 682–687.
- SEKE-2006-LeeDSG #modelling #verification
- A PVS Approach to Verifying ORA-SS Data Models (SUJL, GD, JS, LG), pp. 126–131.
- SEKE-2006-Merz #java #security #using
- Using the Dynamic Proxy Approach to Introduce Role-Based Security to Java Data Objects (MM), pp. 404–409.
- SEKE-2006-MokhatiBG #diagrams #maude #specification #uml
- Translating UML Diagrams Into Maude Formal Specifications: A Systematic Approach (FM, MB, PG), pp. 572–577.
- SEKE-2006-Sarna-StarostaSD #concurrent #modelling #multi #thread
- A Model-based Design-for-Verification Approach to Checking for Deadlock in Multi-threaded Applications (BSS, REKS, LKD), pp. 120–125.
- SEKE-2006-Simpson #enterprise
- A Pragmatic Approach to Enterprise Services Orientation (GS), p. 3.
- SEKE-2006-ZiemerSS #development #modelling #requirements #trade-off #web
- A Decision Modelling Approach for Analysing Requirements Configuration Trade-offs in Timeconstrained Web Application Development (SZ, PRFS, TS), pp. 144–149.
- SIGIR-2006-CaverleeLB #distributed #query
- Distributed query sampling: a quality-conscious approach (JC, LL, JB), pp. 340–347.
- SIGIR-2006-Chu-CarrollPCFD #information retrieval #semantics #xml
- Semantic search via XML fragments: a high-precision approach to IR (JCC, JMP, KC, DAF, PAD), pp. 445–452.
- SIGIR-2006-JordanHK #analysis #named
- Swordfish: an unsupervised Ngram based approach to morphological analysis (CJ, JH, VK), pp. 657–658.
- SIGIR-2006-LillisTCD #data fusion #named #probability
- ProbFuse: a probabilistic approach to data fusion (DL, FT, RWC, JD), pp. 139–146.
- SIGIR-2006-ZhouHZLS #information retrieval #modelling #semantics
- Context-sensitive semantic smoothing for the language modeling approach to genomic IR (XZ, XH, XZ, XL, IYS), pp. 170–177.
- ECMDA-FA-2006-BrecherBCJS #flexibility #modelling
- A Model Driven Approach to Engineering of Flexible Manufacturing System Control Software (CB, TB, YC, MJ, DS), pp. 66–77.
- ECMDA-FA-2006-KerenKRT #maintenance
- MDA Approach for Maintenance of Business Applications (MK, AK, JR, AT), pp. 40–51.
- MoDELS-2006-ArevaloFHN #abstraction #concept analysis #modelling
- Building Abstractions in Class Models: Formal Concept Analysis in a Model-Driven Approach (GA, JRF, MH, CN), pp. 513–527.
- MoDELS-2006-ElaasarBL #metamodelling #specification
- A Metamodeling Approach to Pattern Specification (ME, LCB, YL), pp. 484–498.
- MoDELS-2006-HogganvikS #empirical #identification #motivation #risk management #visual notation
- A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
- MoDELS-2006-MottuBT #component #reuse
- Reusable MDA Components: A Testing-for-Trust Approach (JMM, BB, YLT), pp. 589–603.
- SPLC-2006-KircherSG #challenge #product line
- Transitioning to a Software Product Family Approach — Challenges and Best Practices (MK, CS, IG), pp. 163–171.
- SPLC-2006-LeeK #configuration management #feature model #product line
- A Feature-Oriented Approach to Developing Dynamically Reconfigurable Products in Product Line Engineering (JL, KCK), pp. 131–140.
- MoDELS-2006-ArevaloFHN #abstraction #concept analysis #modelling
- Building Abstractions in Class Models: Formal Concept Analysis in a Model-Driven Approach (GA, JRF, MH, CN), pp. 513–527.
- MoDELS-2006-ElaasarBL #metamodelling #specification
- A Metamodeling Approach to Pattern Specification (ME, LCB, YL), pp. 484–498.
- MoDELS-2006-HogganvikS #empirical #identification #motivation #risk management #visual notation
- A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
- MoDELS-2006-MottuBT #component #reuse
- Reusable MDA Components: A Testing-for-Trust Approach (JMM, BB, YLT), pp. 589–603.
- OOPSLA-2006-ChinCKP #parametricity
- A flow-based approach for variant parametric types (WNC, FC, SCK, CP), pp. 273–290.
- AdaEurope-2006-AlonsoSAP
- A Systematic Approach to Developing Safe Tele-operated Robots (DA, PS, BÁ, JAP), pp. 119–130.
- PEPM-2006-Lopez-HerrejonBL #composition
- A disciplined approach to aspect composition (RELH, DSB, CL), pp. 68–77.
- PEPM-2006-SwadiTKP #monad #staging
- A monadic approach for avoiding code duplication when staging memoized functions (KNS, WT, OK, EP), pp. 160–169.
- RE-2006-BritoM #requirements #towards
- Towards an Integrated Approach for Aspectual Requirements (ISB, AMDM), pp. 334–335.
- RE-2006-MunozVPP #pervasive #requirements
- Requirements Engineering for Pervasive Systems. A Transformational Approach (JM, PV, VP, OP), pp. 344–345.
- ASE-2006-Volanschi
- A Portable Compiler-Integrated Approach to Permanent Checking (ENV), pp. 103–112.
- ASE-2006-WarrenSKW #automation #configuration management #formal method
- An Automated Formal Approach to Managing Dynamic Reconfiguration (IW, JS, SK, TW), pp. 37–46.
- ASE-2006-WinbladhAZR #automation #testing
- An Automated Approach for Goal-driven, Specification-based Testing (KW, TAA, HZ, DJR), pp. 289–292.
- FSE-2006-LiuH #fault #proximity
- Failure proximity: a fault localization-based approach (CL, JH), pp. 46–56.
- FSE-2006-LuCT #data flow #middleware #source code #testing
- Testing context-aware middleware-centric programs: a data flow approach and an RFID-based experimentation (HL, WKC, THT), pp. 242–252.
- ICSE-2006-KojarskiL #modelling #top-down
- Modeling aspect mechanisms: a top-down approach (SK, DHL), pp. 212–221.
- ICSE-2006-MandelinKY #architecture #diagrams #modelling
- A Bayesian approach to diagram matching with application to architectural models (DM, DK, DMY), pp. 222–231.
- ICSE-2006-NehmerBKL
- Living assistance systems: an ambient intelligence approach (JN, MB, AIK, RL), pp. 43–50.
- ICSE-2006-OgasawaraIM #development #process #scalability
- Practical approach to development of SPI activities in a large organization: Toshiba’s SPI history since 2000 (HO, TI, TM), pp. 595–599.
- ICSE-2006-Venkatagiri #requirements
- Engineering the software requirements of nonprofits: a service-learning approach (SV), pp. 643–648.
- ICSE-2006-WangJGLLW #named #performance #process #statistics
- BSR: a statistic-based approach for establishing and refining software process performance baseline (QW, NJ, LG, XL, ML, YW), pp. 585–594.
- ICSE-2006-WillmorE #database #specification #testing
- An intensional approach to the specification of test cases for database applications (DW, SME), pp. 102–111.
- ICSE-2006-Yin #verification
- The echo approach to formal verification (XY), pp. 981–984.
- ICSE-2006-Zhao #analysis #testing
- A new approach for software testability analysis (LZ), pp. 985–988.
- SAC-2006-BiD
- An evidential approach in ensembles (YB, WD), pp. 1–6.
- SAC-2006-CabotT #constraints #ocl
- Transforming OCL constraints: a context change approach (JC, ET), pp. 1196–1201.
- SAC-2006-DobrzanskiK #execution #modelling #refactoring #uml
- An approach to refactoring of executable UML models (LD, LK), pp. 1273–1279.
- SAC-2006-FortinoGR #distributed #modelling #workflow
- From modeling to enactment of distributed workflows: an agent-based approach (GF, AG, WR), pp. 128–129.
- SAC-2006-GaberY #clustering #data type #framework #information management #resource management
- A framework for resource-aware knowledge discovery in data streams: a holistic approach with its application to clustering (MMG, PSY), pp. 649–656.
- SAC-2006-HazelTVW #named #scalability
- TerraCost: a versatile and scalable approach to computing least-cost-path surfaces for massive grid-based terrains (TH, LT, JV, RW), pp. 52–57.
- SAC-2006-KassabL #information management
- An innovative approach to intelligent information filtering (RK, JCL), pp. 1089–1093.
- SAC-2006-LokkuN #constraints
- Morphogenetic constraint-satisfaction based approach for organizational engineering (DSL, KVN), pp. 1563–1564.
- SAC-2006-MalgouyresM #consistency #formal method #metamodelling #uml #verification
- A UML model consistency verification approach based on meta-modeling formalization (HM, GM), pp. 1804–1809.
- SAC-2006-MerschmannP #classification
- A Bayesian approach for protein classification (LHdCM, AP), pp. 200–201.
- SAC-2006-PaluPHL #3d #constraints #logic programming #scalability
- A constraint logic programming approach to 3D structure determination of large protein complexes (ADP, EP, JH, YL), pp. 131–136.
- SAC-2006-PhilippePBBH #black box #web
- A black-box approach for web application SLA (JP, NDP, SB, FB, DH), pp. 807–808.
- SAC-2006-WangTTY #identification #multi
- An approach for identifying attribute correspondences in multilingual schemas (HW, ST, YT, DY), pp. 1674–1678.
- CASE-2006-BassiSFB #modelling #object-oriented
- An object-oriented approach to manufacturing systems modeling (LB, CS, CF, MB), pp. 442–447.
- CASE-2006-LimACYL #3d
- An Alternative Approach In Sensing Simultaneous 3-DOF Motions (CKL, CYA, IMC, GY, WL), pp. 588–593.
- CASE-2006-TranNKHF #low level #robust
- Sliding Mode-PID Approach for Robust Low-level Control of a UGV (THT, MTN, NMK, QPH, GF), pp. 672–677.
- CGO-2006-SonCK #locality #power management
- A Compiler-Guided Approach for Reducing Disk Power Consumption by Exploiting Disk Access Locality (SWS, GC, MTK), pp. 256–268.
- DAC-2006-GargJKC #design
- A design approach for radiation-hard digital electronics (RG, NJ, SPK, GC), pp. 773–778.
- DAC-2006-JayakumarGGK #design
- A PLA based asynchronous micropipelining approach for subthreshold circuit design (NJ, RG, BG, SPK), pp. 419–424.
- DAC-2006-KumarSPJ #coordination #named
- HybDTM: a coordinated hardware-software approach for dynamic thermal management (AK, LS, LSP, NKJ), pp. 548–553.
- DAC-2006-OzturkCK #constraints #network #optimisation #parallel
- Optimizing code parallelization through a constraint network based approach (ÖÖ, GC, MTK), pp. 863–688.
- DAC-2006-WangDC #named #scheduling #tool support
- ExtensiveSlackBalance: an approach to make front-end tools aware of clock skew scheduling (KW, LD, XC), pp. 951–954.
- DATE-2006-AlimondaACP #energy #optimisation #pipes and filters #runtime
- A control theoretic approach to run-time energy optimization of pipelined processing in MPSoCs (AA, AA, SC, AP), pp. 876–877.
- DATE-2006-DErricoQ
- Constructing portable compiled instruction-set simulators: an ADL-driven approach (JD, WQ), pp. 112–117.
- DATE-2006-SoffkeZMG #analysis #combinator #statistics
- A signal theory based approach to the statistical analysis of combinatorial nanoelectronic circuits (OS, PZ, TM, MG), pp. 632–637.
- DATE-DF-2006-MartinaMMVSV #programmable
- A new approach to compress the configuration information of programmable devices (MM, GM, AM, FV, LS, MV), pp. 48–51.
- HPCA-2006-HuKLS #implementation #performance
- An approach for implementing efficient superscalar CISC processors (SH, IK, MHL, JES), pp. 41–52.
- HPDC-2006-LiuSW #combinator #throughput
- A High Throughput Approach to Combinatorial Search on Grids (YL, AMS, SW), pp. 351–352.
- HPDC-2006-WieczorekPF #grid #programming #scheduling #workflow
- Dynamic Programming Based Approach for Bi-criteria Workflow Scheduling on the Grid (MW, RP, TF), pp. 381–382.
- PDP-2006-HuangJC #ad hoc #distributed #network
- A Distributed Approach to Construction of Topology Mismatching Aware P2P Overlays in Wireless Ad Hoc Networks (YH, BJ, JC), pp. 340–347.
- PDP-2006-Kutil #2d #parallel
- A Single-Loop Approach to SIMD Parallelization of 2-D Wavelet Lifting (RK), pp. 413–420.
- FASE-2006-FiadeiroL #architecture #formal method
- A Formal Approach to Event-Based Architectures (JLF, AL), pp. 18–32.
- FASE-2006-TaentzerC #documentation #graph #xml
- A Graph-Based Approach to Transform XML Documents (GT, GTC), pp. 48–62.
- FoSSaCS-2006-PopescuSR #semantics
- A Semantic Approach to Interpolation (AP, TS, GR), pp. 307–321.
- STOC-2006-Gurvits #algorithm #bound #proving
- Hyperbolic polynomials approach to Van der Waerden/Schrijver-Valiant like conjectures: sharper bounds, simpler proofs and algorithmic applications (LG), pp. 417–426.
- TACAS-2006-JhalaM #refinement
- A Practical and Complete Approach to Predicate Refinement (RJ, KLM), pp. 459–473.
- TACAS-2006-LeueW #graph #proving #termination
- A Region Graph Based Approach to Termination Proofs (SL, WW), pp. 318–333.
- CAV-2006-EisingerK #word
- Don’t Care Words with an Application to the Automata-Based Approach for Real Addition (JE, FK), pp. 67–80.
- CSL-2006-Ong #infinity #semantics #verification
- Some Results on a Game-Semantic Approach to Verifying Finitely-Presentable Infinite Structures (CHLO), pp. 31–40.
- ICLP-2006-Aguilar-Solis #constraints #learning #parsing #semantics
- Learning Semantic Parsers: A Constraint Handling Rule Approach (DAS), pp. 447–448.
- ICLP-2006-RuckhausKPG #datalog #owl
- Integrating Datalog with OWL: Exploring the AL-log Approach (ER, VK, BP, BCG), pp. 455–456.
- IJCAR-2006-Pientka #higher-order #lightweight #unification
- Eliminating Redundancy in Higher-Order Unification: A Lightweight Approach (BP), pp. 362–376.
- ISSTA-2006-McMinnHBT #generative #testing
- The species per path approach to SearchBased test data generation (PM, MH, DB, PT), pp. 13–24.
- ISSTA-2006-SevcikovaBSB #automation #probability #statistics #testing
- Automated testing of stochastic systems: a statistically grounded approach (HS, AB, DS, WGB), pp. 215–224.
- LICS-2006-KahlonG #ltl #model checking #thread
- An Automata-Theoretic Approach for Model Checking Threads for LTL Propert (VK, AG), pp. 101–110.
- MBT-2006-CallananGRSTZ #monte carlo #runtime #verification
- Runtime Verification for High-Confidence Systems: A Monte Carlo Approach (SC, RG, AR, SAS, MRT, EZ), pp. 41–52.
- WICSA-2005-IngstrupH #architecture #declarative
- A Declarative Approach to Architectural Reflection (MI, KMH), pp. 149–158.
- WICSA-2005-PerezLCCR #architecture #aspect-oriented #coordination
- Coordination in Software Architectures: an Aspect-Oriented Approach (JP, ML, JÁC, JHCC, IR), pp. 219–220.
- WICSA-2005-SantosC #architecture #multi
- An MDA Approach for a Multi-Layered Satellite On-Board Software Architecture (WADS, AMdC), pp. 253–256.
- WICSA-2005-VasconcelosW #architecture #clustering #independence #set #towards
- Towards a Set of Application Independent Clustering Criteria within an Architecture Recovery Approach (APVdV, CW), pp. 235–236.
- DRR-2005-SadriSB #recognition #segmentation #string
- New approach for segmentation and recognition of handwritten numeral strings (JS, CYS, TDB), pp. 92–100.
- ECDL-2005-SaidisPN #effectiveness #on the #prototype
- On the Effective Manipulation of Digital Objects: A Prototype-Based Instantiation Approach (KS, GP, MN), pp. 13–24.
- ICDAR-2005-ArrivaultRB #fuzzy #graph
- A Fuzzy Hierarchical Attributed Graph Approach for Handwritten Egyptian Hieroglyphs description and matching (DA, NR, PB), pp. 898–903.
- ICDAR-2005-BharathDM #identification #online #recognition
- An Approach to Identify Unique Styles in Online Handwriting Recognition (AB, VD, SM), pp. 775–779.
- ICDAR-2005-CecottiB05a #documentation #hybrid
- Hybrid OCR combination approach complemented by a specialized ICR applied on ancient documents (HC, AB), pp. 1045–1049.
- ICDAR-2005-ChevalierPGL #2d #recognition
- A generic 2D approach of handwriting recognition (SC, FJP, EG, ML), pp. 489–493.
- ICDAR-2005-ChuZZT #documentation #image #performance
- A Fast and Stable Approach for Restoration of Warped Document Images (KBC, LZ, YZ, CLT), pp. 384–388.
- ICDAR-2005-FengHG #learning #semantics #web
- A Learning Approach to Discovering Web Page Semantic Structures (JF, PH, MG), pp. 1055–1059.
- ICDAR-2005-GarainC #analysis #multi #segmentation
- Segmentation of Touching Symbols for OCR of Printed Mathematical Expressions: An Approach based on Multifactorial Analysis (UG, BBC), pp. 177–181.
- ICDAR-2005-GarainD #documentation
- An Approach for Stemming in Symbolically Compressed Indian Language Imaged Documents (UG, AKD), pp. 1080–1084.
- ICDAR-2005-GatosKNPP #documentation #keyword
- A Segmentation-free Approach for Keyword Search in Historical Typewritten Documents (BG, TK, KN, IP, SJP), pp. 54–58.
- ICDAR-2005-HanL #recognition #segmentation
- A two-stage handwritten character segmentation approach in mail address recognition (ZH, CPL), pp. 111–115.
- ICDAR-2005-KanounAL #recognition #validation #word
- Affixal Approach for Arabic Decomposable Vocabulary Recognition: A Validation on Printed Word in Only One Font (SK, AMA, YL), pp. 1025–1029.
- ICDAR-2005-KieningerD #benchmark #metric #recognition #towards
- An Approach towards Benchmarking of Table Structure Recognition Results (TK, AD), pp. 1232–1236.
- ICDAR-2005-LavenLR #analysis #documentation #image #learning #statistics
- A Statistical Learning Approach To Document Image Analysis (KL, SL, STR), pp. 357–361.
- ICDAR-2005-QiaoY #image #novel #order
- A Novel Approach to Recover Writing Order From Single Stroke Offline Handwritten Images (YQ, MY), pp. 227–231.
- ICDAR-2005-ZhouS #fault #recognition #using
- Unconstrained Numeral Pair Recognition Using Enhanced Error Correcting Output Coding: A Holistic Approach (JZ, CYS), pp. 484–488.
- JCDL-2005-Blake #synthesis
- Information synthesis: a new approach to explore secondary information in scientific literature (CB), pp. 56–64.
- JCDL-2005-HuangLC #collaboration #predict
- Link prediction approach to collaborative filtering (ZH, XL, HC), pp. 141–142.
- JCDL-2005-IacobD #authoring #named #xml
- xTagger: a new approach to authoring document-centric XML (IEI, AD), pp. 44–45.
- SIGMOD-2005-BabcockC #query #robust #towards
- Towards a Robust Query Optimizer: A Principled and Practical Approach (BB, SC), pp. 119–130.
- SIGMOD-2005-BrunoC #automation #database #physics
- Automatic Physical Database Tuning: A Relaxation-based Approach (NB, SC), pp. 227–238.
- SIGMOD-2005-CaoB #relational #sql
- A Nested Relational Approach to Processing SQL Subqueries (BC, AB), pp. 191–202.
- VLDB-2005-ChoC #network #performance #query #scalability
- An Efficient and Scalable Approach to CNN Queries in a Road Network (HJC, CWC), pp. 865–876.
- VLDB-2005-PeiJET #semantics
- Catching the Best Views of Skyline: A Semantic Approach Based on Decisive Subspaces (JP, WJ, ME, YT), pp. 253–264.
- CSEET-2005-Cowling #diagrams #formal method
- Translating Diagrams: A New Approach to Introducing Formal Methods (AJC), pp. 121–128.
- CSEET-2005-ZeidE #development #education #framework #object-oriented
- A Peer-Review Based Approach to Teaching Object-Oriented Framework Development (AZ, ME), pp. 51–58.
- ITiCSE-2005-Cox #functional #human-computer #programming
- A pragmatic HCI approach: engagement by reinforcing perception with functional dsesign and programming (DC), pp. 39–43.
- ITiCSE-2005-Hamza #analysis #design #object-oriented
- Introducing object-oriented analysis and design in lower-level undergraduate courses: a pattern-based approach (HSH), p. 350.
- SIGITE-2005-LeungJ #concept
- Computational concepts in IT: a new approach to IT mathematics (SL, CJ), pp. 37–42.
- SIGITE-2005-Matthews #education #network #using
- Hands-on approach to teaching computer networking using packet traces (JNM), pp. 361–367.
- SIGITE-2005-Matthews05a #community
- Common sense computing: an approach to community outreach with IT (JNM), pp. 375–376.
- SIGITE-2005-Prayaga #comparative #web
- Building dynamic web applications with ASP.Net and ColdFusion MX 7.0: a comparative approach (LP), pp. 121–124.
- CSMR-2005-GreevyD #analysis #correlation #using
- Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach (OG, SD), pp. 314–323.
- CSMR-2005-Sneed #incremental #integration
- An Incremental Approach to System Replacement and Integration (HMS), pp. 196–206.
- ICSM-2005-AntoniolG #case study #identification #novel
- Feature Identification: A Novel Approach and a Case Study (GA, YGG), pp. 357–366.
- ICSM-2005-NiuES
- A Category-theoretic Approach to Syntactic Software Merging (NN, SME, MS), pp. 197–206.
- IWPC-2005-HendricksonDT #architecture #comprehension
- An (Architecture-Centric) Approach for Tracing, Organizing, and Understanding Events in Event-Based Software Architectures (SAH, EMD, RNT), pp. 227–236.
- IWPC-2005-OBrienB #behaviour #empirical #modelling
- Modelling the Information-Seeking Behaviour of Programmers — An Empirical Approach (MPO, JB), pp. 125–134.
- SCAM-2005-HongLS #abstract interpretation #model checking #slicing
- Abstract Slicing: A New Approach to Program Slicing Based on Abstract Interpretation and Model Checking (HSH, IL, OS), pp. 25–34.
- CIAA-J-2004-HanMZ05 #automaton #database #sequence
- An automata approach to match gapped sequence tags against protein database (YH, BM, KZ), pp. 487–497.
- ICALP-2005-BreugelHMW #behaviour #pseudo
- An Accessible Approach to Behavioural Pseudometrics (FvB, CH, MM, JW), pp. 1018–1030.
- FM-2005-KimBC #formal method #modelling #towards
- An MDA Approach Towards Integrating Formal and Informal Modeling Languages (SKK, DB, DAC), pp. 448–464.
- FM-2005-LeiI #communication #protocol
- An Approach to Unfolding Asynchronous Communication Protocols (YL, SPI), pp. 334–349.
- RTA-2005-Felty #semantics #tutorial
- A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code (APF), pp. 394–406.
- RTA-2005-Hoffman #algebra #equation
- Union of Equational Theories: An Algebraic Approach (PH), pp. 61–73.
- SEFM-2005-WilsonMC #configuration management #flexibility #policy #verification
- Omnibus Verification Policies: A flexible, configurable approach to assertion-based software verification (TW, SM, RGC), pp. 150–159.
- TLCA-2005-Felty #semantics #tutorial
- A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code: Abstract (APF), p. 10.
- CEFP-2005-Hammond #behaviour #bound #functional #programming
- Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach (KH), pp. 100–134.
- ICFP-2005-HallgrenJLT #haskell #operating system
- A principled approach to operating system construction in Haskell (TH, MPJ, RL, APT), pp. 116–128.
- ICFP-2005-WestbrookSW #imperative #programming
- A language-based approach to functionally correct imperative programming (EMW, AS, IW), pp. 268–279.
- CIG-2005-Frayn #game studies
- An Evolutionary Approach to Strategies for the Game of Monopoly (CF).
- CIG-2005-KishimotoM #composition #divide and conquer #problem
- Dynamic Decomposition Search: A Divide and Conquer Approach and its Application to the One-Eye Problem in Go (AK, MM0).
- CIG-2005-YannakakisH #generative #interactive
- A Generic Approach for Generating Interesting Interactive Pac-Man Opponents (GNY, JH).
- DiGRA-2005-Isbister #game studies #research #social
- A Social Psychological Approach to Games Research (KI).
- DiGRA-2005-LogasM #adaptation #design
- Mise-en-scène Applied to Level Design: Adapting a Holistic Approach to Level Design (HL, DM).
- DiGRA-2005-Perron
- A Cognitive Psychological Approach to Gameplay Emotions (BP).
- DiGRA-2005-Spierling #concept #hybrid #interactive #towards
- Interactive Digital Storytelling: Towards a Hybrid Conceptual Approach (US).
- CAiSE-2005-BaidaGSAM #comprehension #elicitation #ontology
- An Ontological Approach for Eliciting and Understanding Needs in e-Services (ZB, JG, HS, HA, AZM), pp. 400–414.
- CAiSE-2005-BertinoCM #multi #representation
- An Object-Relational Approach to the Representation of Multi-granular Spatio-Temporal Data (EB, DC, PM), pp. 119–134.
- CAiSE-2005-RiggioUKK
- Interoperability in Meta-environments: An XMI-Based Approach (RR, DU, HK, DK), pp. 77–89.
- CAiSE-2005-RizopoulosM #concept #generative #model transformation
- A General Approach to the Generation of Conceptual Model Transformations (NR, PM), pp. 326–341.
- EDOC-2005-GannodBT #interactive #specification
- An Interactive Approach for Specifying OWL-S Groundings (GCG, RJB, JTET), pp. 251–260.
- EDOC-2005-QuartelDS #using
- An approach to relate business and application services using ISDL (DACQ, RMD, MvS), pp. 157–168.
- EDOC-2005-XuXH
- An Extended Event Matching Approach in Content-based Pub/Sub Systems for EAI (GX, WX, TH), pp. 287–296.
- ICEIS-v1-2005-IzzaVB #framework #integration
- A Unified Framework for Application Integration — an Ontology-driven Service-oriented Approach (SI, LV, PB), pp. 165–170.
- ICEIS-v1-2005-JaniMJ #adaptation #performance
- An Efficient Approach for Web-Site Adaptation (SJ, SAMM, XJ), pp. 108–114.
- ICEIS-v1-2005-OuziriVF #integration #logic #modelling #topic
- Data Integration and User Modelling: An Approach Based on Topic Maps and Description Logics (MO, CV, AF), pp. 171–175.
- ICEIS-v1-2005-SimonssonLJNGW #enterprise #evaluation #top-down
- Scenario-based Evaluation of Enterprise — a Top-Down Approach for Chief Information Officer Decision Making (MS, ÅL, PJ, LN, JG, OW), pp. 130–137.
- ICEIS-v1-2005-UrbanKD #component #integration #prototype #web #web service
- A Prototype for Integration of Web Services into the Irules Approach to Component Integration (SDU, VVK, SWD), pp. 3–10.
- ICEIS-v2-2005-AhmanH #game studies #reduction #simulation #using
- Using a Game Theoretical Approach for Experimental Simulation of Brood Reduction — Conflict and Co-Operation, Effect on Brood Size with Limited Resources (FÅ, LH), pp. 220–225.
- ICEIS-v2-2005-Celikel #encryption #identification
- A Cryptographic Approach to Language Identification: PPM (EC), pp. 213–219.
- ICEIS-v2-2005-ColaceSVF #algorithm #learning #multi #network
- A Bayesian Networks Structural Learning Algorithm Based on a Multiexpert Approach (FC, MDS, MV, PF), pp. 194–200.
- ICEIS-v2-2005-KianmehrZNOA #data mining #mining #network
- Combining Neural Network and Support Vector Machine into Integrated Approach for Biodata Mining (KK, HZ, KN, TÖ, RA), pp. 182–187.
- ICEIS-v2-2005-MashechkinPR #anti #enterprise #machine learning
- Enterprise Anti-Spam Solution Based on Machine Learning Approach (IM, MP, AR), pp. 188–193.
- ICEIS-v3-2005-GarciaLPAAM #aspect-oriented #re-engineering #towards
- Towards an Approach for Aspect-Oriented Software Reengineering (VCG, DL, AFdP, ESdA, AÁ, SRdLM), pp. 274–279.
- ICEIS-v3-2005-Shah #architecture #enterprise #integration #modelling #realtime
- Model Driven Architecture Based Real-Time Enterprise Information Integration — An Approach and Impact on Businesses (VSS), pp. 167–173.
- ICEIS-v4-2005-FraserM #adaptation #web #web service
- Content Package Adaptation: A Web Services Approach (RF, PM), p. 238–?.
- CIKM-2005-FanLHB #novel #privacy #video
- A novel approach for privacy-preserving video sharing (JF, HL, MSH, EB), pp. 609–616.
- CIKM-2005-FreskoRF #hybrid
- A hybrid approach to NER by MEMM and manual rules (MF, BR, RF), pp. 361–362.
- CIKM-2005-HuangLH #distributed #mining #permutation
- A new permutation approach for distributed association rule mining (YH, ZL, HH), pp. 351–352.
- CIKM-2005-LeonardiB #database #detection #documentation #relational #using #xml
- Detecting changes on unordered XML documents using relational databases: a schema-conscious approach (EL, SSB), pp. 509–516.
- CIKM-2005-LiCXHLM #information management #intranet
- A new approach to intranet search based on information extraction (HL, YC, JX, YH, SL, DM), pp. 460–468.
- CIKM-2005-MessaoudBR #evaluation
- Evaluation of a MCA-based approach to organize data cubes (RBM, OB, SR), pp. 341–342.
- CIKM-2005-MohanSW #data access #query #xml
- Access control for XML: a dynamic query rewriting approach (SM, AS, YW), pp. 251–252.
- CIKM-2005-RoussinovFN05a #information retrieval #learning
- Discretization based learning approach to information retrieval (DR, WF, FADN), pp. 321–322.
- CIKM-2005-SrihariLB #concept #graph
- Unapparent information revelation: a concept chain graph approach (RKS, SL, AB), pp. 329–330.
- CIKM-2005-TanCGWX #categorisation #novel #refinement
- A novel refinement approach for text categorization (ST, XC, MG, BW, HX), pp. 469–476.
- ECIR-2005-NottelmannS #named #probability
- sPLMap: A Probabilistic Approach to Schema Matching (HN, US), pp. 81–95.
- ICML-2005-GroisW #comprehension #learning
- Learning strategies for story comprehension: a reinforcement learning approach (EG, DCW), pp. 257–264.
- ICML-2005-JonssonB #composition
- A causal approach to hierarchical decomposition of factored MDPs (AJ, AGB), pp. 401–408.
- ICML-2005-KulisBDM #clustering #graph #kernel
- Semi-supervised graph clustering: a kernel approach (BK, SB, ISD, RJM), pp. 457–464.
- ICML-2005-RohanimaneshM #concurrent #generative #markov #named #process
- Coarticulation: an approach for generating concurrent plans in Markov decision processes (KR, SM), pp. 720–727.
- ICML-2005-SunD #learning
- Explanation-Augmented SVM: an approach to incorporating domain knowledge into SVM learning (QS, GD), pp. 864–871.
- ICML-2005-TaskarCKG #learning #modelling #predict #scalability
- Learning structured prediction models: a large margin approach (BT, VC, DK, CG), pp. 896–903.
- KDD-2005-FujimakiYM #detection #kernel #problem #using
- An approach to spacecraft anomaly detection problem using kernel feature space (RF, TY, KM), pp. 401–410.
- KDD-2005-HeC #robust
- Making holistic schema matching robust: an ensemble approach (BH, KCCC), pp. 429–438.
- KDD-2005-SurdeanuTA #clustering #documentation #hybrid
- A hybrid unsupervised approach for document clustering (MS, JT, AA), pp. 685–690.
- KDD-2005-YanCHX
- Summarizing itemset patterns: a profile-based approach (XY, HC, JH, DX), pp. 314–323.
- LSO-2005-DeckerM #community #evolution #product line
- A Community Based Approach for Organizing Software Product Line Evolution (BD, DM), pp. 62–66.
- MLDM-2005-AdegoriteBKS #mining
- An Approach to Mining Picture Objects Based on Textual Cues (AIA, OAB, MSK, KBS), pp. 466–475.
- MLDM-2005-BouguilaZ #estimation #finite
- MML-Based Approach for Finite Dirichlet Mixture Estimation and Selection (NB, DZ), pp. 42–51.
- MLDM-2005-KurganH #feature model #predict #sequence
- Prediction of Secondary Protein Structure Content from Primary Sequence Alone — A Feature Selection Based Approach (LAK, LH), pp. 334–345.
- MLDM-2005-LeHS #ambiguity #classification #reasoning #word
- An Evidential Reasoning Approach to Weighted Combination of Classifiers for Word Sense Disambiguation (CAL, VNH, AS), pp. 516–525.
- MLDM-2005-SharmaVTV #database #mining #multi #novel
- A Novel Approach of Multilevel Positive and Negative Association Rule Mining for Spatial Databases (LKS, OPV, UST, RV), pp. 620–629.
- MLDM-2005-Sy #detection
- Signature-Based Approach for Intrusion Detection (BKS), pp. 526–536.
- MLDM-2005-VermaVV #mining #using
- Temporal Approach to Association Rule Mining Using T-Tree and P-Tree (KV, OPV, RV), pp. 651–659.
- MLDM-2005-XiangZCL #recognition #sequence
- A New Approach to Human Motion Sequence Recognition with Application to Diving Actions (SX, CZ, XC, NL), pp. 487–496.
- MLDM-2005-YeWWCHT #mining
- An Integrated Approach for Mining Meta-rules (FY, JW, SW, HC, TH, LT), pp. 549–557.
- SEKE-2005-CooperDW #architecture #aspect-oriented #modelling #reuse #security
- Modeling Reusable Security Aspects for Software Architectures: a Pattern Driven Approach (KMLC, LD, WEW), pp. 158–162.
- SEKE-2005-FekiMG #integration #multi
- A Two-Phase Approach for Multidimensional Schemes Integration (JF, JM, FG), pp. 498–503.
- SEKE-2005-LbathCC #development #modelling #multi #process
- A Multi-Agent Approach to a SPEM-based Modeling and Enactment of Software Development Processes (RL, BC, XC), pp. 241–246.
- SEKE-2005-LiuCBGROA #analysis #component #composition #quality #requirements #two-level grammar
- Quality of Service-Driven Requirements Analysis for Component Composition: A Two-Level Grammar+Approach (SHL, FC, BRB, JGG, RRR, AMO, MA), pp. 731–734.
- SEKE-2005-LiW #behaviour #implementation #web
- Web Search Based on Ant Behavior: Approach and Implementation in Case of Interlegis (WL, MQW), pp. 572–577.
- SEKE-2005-OgataF #liveness #proving #verification
- Proof Score Approach to Verification of Liveness Properties (KO, KF), pp. 608–613.
- SEKE-2005-WangDSL #design #process
- TCOZ Approach to OWL-S Process Model Design (HHW, JSD, JS, YFL), pp. 354–359.
- SEKE-2005-XuXN #aspect-oriented #source code #testing
- A State-Based Approach to Testing Aspect-Oriented Programs (DX, WX, KEN), pp. 366–371.
- SEKE-2005-ZhouL #diagrams
- Measuring Class Cohesion: A Causality Diagram Based Approach (YZ, HKNL), pp. 767–771.
- SEKE-2005-ZhouXZS #refactoring
- An Aspect Transformation Approach with Refactoring (CZ, BX, TZ, LS), pp. 318–323.
- SIGIR-2005-Grivolla #automation #documentation #natural language #query #retrieval #using
- Using Oracle for natural language document retrieval an automatic query reformulation approach (JG), pp. 605–606.
- SIGIR-2005-Hosanagar #distributed #information retrieval
- A utility theoretic approach to determining optimal wait times in distributed information retrieval (KH), pp. 91–97.
- SIGIR-2005-TrieschniggK #detection #scalability #topic
- Scalable hierarchical topic detection: exploring a sample based approach (DT, WK), pp. 655–656.
- ECMDA-FA-2005-BendraouDG #component #flexibility #implementation
- MDA Components: A Flexible Way for Implementing the MDA Approach (RB, PD, MPG), pp. 59–73.
- ECMDA-FA-2005-ChanP #contract #design #metamodelling
- Designing a Domain-Specific Contract Language: A Metamodelling Approach (ZEC, RFP), pp. 175–189.
- ECMDA-FA-2005-Gobel #adaptation #component
- An MDA Approach for Adaptable Components (SG), pp. 74–87.
- MoDELS-2005-GuizzardiPS #modelling #ontology
- An Ontology-Based Approach for Evaluating the Domain Appropriateness and Comprehensibility Appropriateness of Modeling Languages (GG, LFP, MvS), pp. 691–705.
- MoDELS-2005-ZhangMZY #component #feature model
- Transformation from CIM to PIM: A Feature-Oriented Component-Based Approach (WZ, HM, HZ, JY), pp. 248–263.
- MoDELS-2005-ZiaMVK #design #modelling #simulation
- A Modelling and Simulation Based Approach to Dependable System Design (MZ, SM, HV, JK), pp. 217–231.
- SPLC-2005-ErikssonBB #case study #domain model #modelling
- The PLUSS Approach — Domain Modeling with Features, Use Cases and Use Case Realizations (ME, JB, KB), pp. 33–44.
- SPLC-2005-MatturroS #knowledge-based #product line
- A Knowledge-Based Perspective for Preparing the Transition to a Software Product Line Approach (GM, AS), pp. 96–101.
- MoDELS-2005-GuizzardiPS #modelling #ontology
- An Ontology-Based Approach for Evaluating the Domain Appropriateness and Comprehensibility Appropriateness of Modeling Languages (GG, LFP, MvS), pp. 691–705.
- MoDELS-2005-ZhangMZY #component #feature model
- Transformation from CIM to PIM: A Feature-Oriented Component-Based Approach (WZ, HM, HZ, JY), pp. 248–263.
- MoDELS-2005-ZiaMVK #design #modelling #simulation
- A Modelling and Simulation Based Approach to Dependable System Design (MZ, SM, HV, JK), pp. 217–231.
- OOPSLA-2005-CharlesGSDKEPS #clustering #named #object-oriented
- X10: an object-oriented approach to non-uniform cluster computing (PC, CG, VAS, CD, AK, KE, CvP, VS), pp. 519–538.
- LOPSTR-2005-SuenagaKY #automation #generative #source code #type system
- Extension of Type-Based Approach to Generation of Stream-Processing Programs by Automatic Insertion of Buffering Primitives (KS, NK, AY), pp. 98–114.
- POPL-2005-FosterGMPS #combinator #problem #program transformation
- Combinators for bi-directional tree transformations: a linguistic approach to the view update problem (JNF, MBG, JTM, BCP, AS), pp. 233–246.
- POPL-2005-Goguen #similarity #type system
- A syntactic approach to eta equality in type theory (HG), pp. 75–84.
- PPDP-2005-JagadeesanM #constraints #declarative #programming
- Timed constraint programming: a declarative approach to usage control (RJ, WM, CP, VAS), pp. 164–175.
- SAS-2005-DimovskiGL #game studies #refinement #semantics
- Data-Abstraction Refinement: A Game Semantic Approach (AD, DRG, RL), pp. 102–117.
- RE-2005-ChenZZM #clustering #feature model #modelling #requirements
- An Approach to Constructing Feature Models Based on Requirements Clustering (KC, WZ, HZ, HM), pp. 31–40.
- RE-2005-ChitchyanSR #named #requirements
- CoCA: A Composition-Centric Approach to Requirements Engineering (RC, IS, AR), pp. 475–476.
- RE-2005-LiaskosLWYE #configuration management
- Configuring Common Personal Software: a Requirements-Driven Approach (SL, AL, YW, YY, SME), pp. 9–18.
- RE-2005-SampaioRR #aspect-oriented #identification #named #requirements
- Early-AIM: An Approach for Identifying Aspects in Requirements (AS, AR, PR), pp. 487–488.
- RE-2005-ZhangMZ #dependence #feature model #modelling #requirements
- A Feature-Oriented Approach to Modeling Requirements Dependencies (WZ, HM, HZ), pp. 273–284.
- ASE-2005-CouchotGK #deduction #protocol #safety
- A uniform deductive approach for parameterized protocol safety (JFC, AG, NK), pp. 364–367.
- ASE-2005-GheyiMB #proving #refactoring
- A rigorous approach for proving model refactorings (RG, TM, PB), pp. 372–375.
- ASE-2005-Grov #algorithm #correctness #deduction #reasoning #source code #verification
- Verifying the correctness of hume programs: an approach combining deductive and algorithmic reasoning (GG), pp. 444–447.
- ASE-2005-HaoPZZMS #fault #locality #testing
- A similarity-aware approach to testing based fault localization (DH, YP, LZ, WZ, HM, JS), pp. 291–294.
- ASE-2005-InverardiMTA #adaptation #automation #component #distributed #synthesis
- Synthesis of correct and distributed adaptors for component-based systems: an automatic approach (PI, LM, MT, MA), pp. 405–409.
- ASE-2005-LinG #automation #evolution #model transformation
- A model transformation approach to automatic model construction and evolution (YL, JG), pp. 448–451.
- ASE-2005-MehraGH #collaboration #design #diagrams #difference
- A generic approach to supporting diagram differencing and merging for collaborative design (AM, JCG, JGH), pp. 204–213.
- ASE-2005-XuN #modelling #verification
- A threat-driven approach to modeling and verifying secure software (DX, KEN), pp. 342–346.
- ESEC-FSE-2005-McCloskeyB #c #named #refactoring
- ASTEC: a new approach to refactoring C (BM, EAB), pp. 21–30.
- ESEC-FSE-2005-MetzLG #hybrid #performance #using
- Performance data collection using a hybrid approach (EM, RL, TFG), pp. 126–135.
- ESEC-FSE-2005-PetterssonJ #experience #industrial #lightweight #product line #using #web
- Industrial experience with building a web portal product line using a lightweight, reactive approach (UP, SJ), pp. 326–335.
- GTTSE-2005-Hainaut #database
- The Transformational Approach to Database Engineering (JLH), pp. 95–143.
- ICSE-2005-Al-NaeemGBRB #architecture #distributed #quality
- A quality-driven systematic approach for architecting distributed software applications (TAN, IG, MAB, FAR, BB), pp. 244–253.
- ICSE-2005-Liu #open source #re-engineering
- Enriching software engineering courses with service-learning projects and the open-source approach (CL), pp. 613–614.
- ICSE-2005-SchmidJKM #embedded
- Introducing the puLSE approach to an embedded system population at testo AG (KS, IJ, RK, GM), pp. 544–552.
- SAC-2005-AdaikkalavanC #named #security #web
- SmartGate: a smart push-pull approach to support role-based security in web gateways (RA, SC), pp. 1727–1731.
- SAC-2005-AjiliRE #optimisation
- A branch-price-and-propagate approach for optimizing IGP weight setting subject to unique shortest paths (FA, RR, AE), pp. 366–370.
- SAC-2005-BleisteinCV #analysis #requirements
- Strategic alignment in requirements analysis for organizational IT: an integrated approach (SJB, KC, JMV), pp. 1300–1307.
- SAC-2005-BocchiCMPR #coordination #grid
- An OWL-S based approach to express grid services coordination (LB, PC, RM, VP, DR), pp. 1661–1667.
- SAC-2005-BraunWHW
- Method construction — a core approach to organizational engineering (CB, FW, MH, RW), pp. 1295–1299.
- SAC-2005-CazzolaPA #aspect-oriented #design #evolution
- AOP for software evolution: a design oriented approach (WC, SP, MA), pp. 1346–1350.
- SAC-2005-ChenA #analysis #comparative #predict #sequence #using
- A new approach for gene prediction using comparative sequence analysis (RC, HHA), pp. 177–184.
- SAC-2005-ColucciNSDPC #composition #knowledge base #semantics
- Knowledge based approach to semantic composition of teams in an organization (SC, TDN, EDS, FMD, GP, SC), pp. 1314–1319.
- SAC-2005-DiazLPCV #behaviour #e-commerce #probability #protocol #realtime #set #validation
- An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocol (GD, KGL, JJP, FC, VV), pp. 815–820.
- SAC-2005-EbertG
- A “Go With the Winners” approach to finding frequent patterns (TE, DG), pp. 498–502.
- SAC-2005-EgidiT #database #flexibility
- A flexible approach to user-defined symbolic granularities in temporal databases (LE, PT), pp. 592–597.
- SAC-2005-Eliassi-RadC #hybrid #modelling #multi #scalability
- A hybrid approach for multiresolution modeling of large-scale scientific data (TER, TC), pp. 511–518.
- SAC-2005-FalcoTCG05a #clustering #grammarware #novel #programming #search-based
- A novel grammar-based genetic programming approach to clustering (IDF, ET, ADC, FG), pp. 928–932.
- SAC-2005-FalcoTCP #induction #programming #search-based
- Inductive inference of chaotic series by Genetic Programming: a Solomonoff-based approach (IDF, ET, ADC, AP), pp. 957–958.
- SAC-2005-HuangSMZGGP #clustering #predict
- A clustering-based approach for prediction of cardiac resynchronization therapy (HH, LS, FM, SZ, MG, LG, JDP), pp. 260–266.
- SAC-2005-LauW #multi #optimisation #problem
- A multi-agent approach for solving optimization problems involving expensive resources (HCL, HW), pp. 79–83.
- SAC-2005-MikhailovT #fuzzy #outsourcing
- Fuzzy approach to outsourcing of information technology services (LM, PET), pp. 94–98.
- SAC-2005-NatarajanS #data-driven
- A relatedness-based data-driven approach to determination of interestingness of association rules (RN, BS), pp. 551–552.
- SAC-2005-RahmanBA #grid
- Replica selection in grid environment: a data-mining approach (RMR, KB, RA), pp. 695–700.
- SAC-2005-SunZ #semantics
- An approach to acquire semantic relationships between terms (XS, QZ), pp. 1630–1633.
- SAC-2005-TangV #clustering #documentation
- An artificial immune system approach to document clustering (NT, VRV), pp. 918–922.
- SAC-2005-WangG #domain-specific language #framework #implementation #prototype #semantics
- Rapidly prototyping implementation infrastructure of domain specific languages: a semantics-based approach (QW, GG), pp. 1419–1426.
- SAC-2005-ZhouP #data-driven #design #distance
- Data driven approach to designing minimum hamming distance polychotomizer (JZ, GP), pp. 27–31.
- SAC-2005-ZhouX #complexity #diagrams
- Measuring structural complexity for class diagrams: an information theory approach (YZ, BX), pp. 1679–1683.
- GPCE-2005-ConselLRC #compilation #domain-specific language #generative #programming
- A Generative Programming Approach to Developing DSL Compilers (CC, FL, LR, PC), pp. 29–46.
- GPCE-2005-CzarneckiA #modelling
- Mapping Features to Models: A Template Approach Based on Superimposed Variants (KC, MA), pp. 422–437.
- GPCE-2005-PeruginiR #case study #experience #generative #information retrieval #interactive #programming
- A Generative Programming Approach to Interactive Information Retrieval: Insights and Experiences (SP, NR), pp. 205–220.
- CASE-2005-CastelnuovoFP #incremental #modelling #petri net #sequence
- An incremental Petri net approach to production sequence modeling (AC, LF, LP), pp. 333–338.
- CASE-2005-GuschinskayaDGL #heuristic #optimisation
- A combined heuristic approach for optimization of a class of machining lines (OG, AD, NG, GL), pp. 154–159.
- CASE-2005-Hwang #automation #behaviour #configuration management #finite #generative
- Generating finite-state global behavior of reconfigurable automation systems: DEVS approach (MHH), pp. 254–260.
- CASE-2005-PanSY #optimisation #problem
- A new optimization approach to the general single machine earliness-tardiness problem (YP, LS, HY), pp. 43–48.
- CASE-2005-PengLZ #fuzzy #set
- Intelligent setup planning in manufacturing by fuzzy set theory based approach (GP, WL, YZ), pp. 130–135.
- CASE-2005-TanonkouBBX #probability #problem #using
- Solving a stochastic inventory-location problem using Lagrangian relaxation approach (GAT, LB, RB, XX), pp. 279–284.
- CC-2005-LiCKB #security
- A Compiler-Based Approach to Data Security (FL, GC, MTK, RRB), pp. 188–203.
- CGO-2005-ZhaoCS #framework #modelling #optimisation
- Model-Based Framework: An Approach for Profit-Driven Optimization (MZ, BRC, MLS), pp. 317–327.
- DAC-2005-AdirABPS #architecture #testing #verification
- A generic micro-architectural test plan approach for microprocessor verification (AA, HA, EB, OP, KS), pp. 769–774.
- DAC-2005-BhuniaBCMR #novel #power management #reduction #synthesis #using
- A novel synthesis approach for active leakage power reduction using dynamic supply gating (SB, NB, QC, HMM, KR), pp. 479–484.
- DAC-2005-CaoC #modelling #performance #process #statistics #towards #variability
- Mapping statistical process variations toward circuit performance variability: an analytical modeling approach (YC, LTC), pp. 658–663.
- DAC-2005-FoxCMHHJKYZ #question
- Should our power approach be current? (TF, LC, SM, DH, EPH, VJ, AK, AY, PSZ), p. 611.
- DAC-2005-JayakumarK #design
- A variation tolerant subthreshold design approach (NJ, SPK), pp. 716–719.
- DAC-2005-LiQTWCH #clustering #performance
- Partitioning-based approach to fast on-chip decap budgeting and minimization (HL, ZQ, SXDT, LW, YC, XH), pp. 170–175.
- DAC-2005-NieuwoudtM #multi #optimisation
- Multi-level approach for integrated spiral inductor optimization (AN, YM), pp. 648–651.
- DAC-2005-NookalaCLS #architecture #design #statistics #using
- Microarchitecture-aware floorplanning using a statistical design of experiments approach (VN, YC, DJL, SSS), pp. 579–584.
- DAC-2005-SouMD #optimisation #order #reduction
- A quasi-convex optimization approach to parameterized model order reduction (KCS, AM, LD), pp. 933–938.
- DAC-2005-TopalogluO #process
- A DFT approach for diagnosis and process variation-aware structural test of thermometer coded current steering DACs (ROT, AO), pp. 851–856.
- DAC-2005-WagnerBA #automation #generative #monitoring #named #process #testing
- StressTest: an automatic approach to test generation via activity monitors (IW, VB, TMA), pp. 783–788.
- DAC-2005-WuZN #estimation #parametricity
- A non-parametric approach for dynamic range estimation of nonlinear systems (BW, JZ, FNN), pp. 841–844.
- DATE-2005-AbsarC #array
- Compiler-Based Approach for Exploiting Scratch-Pad in Presence of Irregular Array Access (MJA, FC), pp. 1162–1167.
- DATE-2005-Brinkmeyer #component #testing
- A New Approach to Component Testing (HB), pp. 534–535.
- DATE-2005-ChenKK #constraints #layout #memory management #network #optimisation
- A Constraint Network Based Approach to Memory Layout Optimization (GC, MTK, MK), pp. 1156–1161.
- DATE-2005-DingV #megamodelling #modelling #performance
- A Two-Level Modeling Approach to Analog Circuit Performance Macromodeling (MD, RV), pp. 1088–1089.
- DATE-2005-JhumkaKH #design #embedded
- A Dependability-Driven System-Level Design Approach for Embedded Systems (AJ, SK, SAH), pp. 372–377.
- DATE-2005-KherijiDCM #optimisation #testing
- Optimising Test Sets for a Low Noise Amplifier with a Defect-Oriented Approach (RK, VD, JLC, SM), pp. 170–171.
- DATE-2005-OgrasM #architecture #communication #composition #energy #synthesis #using
- Energy- and Performance-Driven NoC Communication Architecture Synthesis Using a Decomposition Approach (ÜYO, RM), pp. 352–357.
- DATE-2005-SavioliCCF #fault
- Fault-Trajectory Approach for Fault Diagnosis on Analog Circuits (CES, CCC, JVC, ACdMF), pp. 174–175.
- DATE-2005-SchattkowskyMR #configuration management #execution #hardware #modelling #specification
- A Model-Based Approach for Executable Specifications on Reconfigurable Hardware (TS, WM, AR), pp. 692–697.
- DATE-2005-StittV #clustering #decompiler #platform
- A Decompilation Approach to Partitioning Software for Microprocessor/FPGA Platforms (GS, FV), pp. 396–397.
- DATE-2005-VanderperrenD #complexity #design #uml
- UML 2 and SysML: An Approach to Deal with Complexity in SoC/NoC Design (YV, WD), pp. 716–717.
- DATE-2005-YangWVSX #design
- Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach (SY, WW, NV, DNS, YX), pp. 64–69.
- PDP-2005-ChandlerF #multi #named #realtime
- Rendezvous: An Alternative Approach to Conflict Resolution for Real Time Multi-User Applications (AC, JF), pp. 160–167.
- PDP-2005-Ojeda-GuerraAA #ad hoc #network
- A New Approach to Merge Partitions in an Ad Hoc Wireless Network Based on an Updating of DHCP (CNOG, VAH, IGAG), pp. 144–151.
- PPoPP-2005-ChenFGLABD #fault tolerance #performance
- Fault tolerant high performance computing by a coding approach (ZC, GEF, EG, JL, TA, GB, JD), pp. 213–223.
- PPoPP-2005-KejariwalNBP #clustering #novel
- A novel approach for partitioning iteration spaces with variable densities (AK, AN, UB, CDP), pp. 120–131.
- FoSSaCS-2005-LuttgenV #bisimulation
- Bisimulation on Speed: A Unified Approach (GL, WV), pp. 79–94.
- SAT-J-2004-BaulandCCHV05 #algebra #complexity #query
- An Algebraic Approach to the Complexity of Generalized Conjunctive Queries (MB, PC, NC, MH, HV), pp. 30–45.
- CSL-2005-Tiwari #algebra #constraints #satisfiability
- An Algebraic Approach for the Unsatisfiability of Nonlinear Constraints (AT), pp. 248–262.
- FATES-2005-XieD #concurrent #testing
- Testing Systems of Concurrent Black-Boxes-An Automata-Theoretic and Decompositional Approach (GX, ZD), pp. 170–186.
- LICS-2005-Hofmann
- Proof-Theoretic Approach to Description-Logic (MH0), pp. 229–237.
- SAT-2005-AudemardS #quantifier
- A Symbolic Search Based Approach for Quantified Boolean Formulas (GA, LS), pp. 16–30.
- SAT-2005-WeiS
- A New Approach to Model Counting (WW, BS), pp. 324–339.
- TestCom-2005-FernandezMP #modelling #robust #testing
- A Model-Based Approach for Robustness Testing (JCF, LM, CP), pp. 333–348.
- TestCom-2005-LadaniAC #invariant #testing
- Passive Testing — A Constrained Invariant Checking Approach (BTL, BA, ARC), pp. 9–22.
- TestCom-2005-ZanderDSD #execution #modelling #testing
- From U2TP Models to Executable Tests with TTCN-3 — An Approach to Model Driven Testing (JZ, ZRD, IS, GD), pp. 289–303.
- WICSA-2004-BardramCH #architecture #design #learning #prototype
- Architectural Prototyping: An Approach for Grounding Architectural Design and Learning (JB, HBC, KMH), pp. 15–24.
- WICSA-2004-IonitaAHOT #architecture #cost analysis
- A Scenario-Driven Approach for Value, Risk, and Cost Analysis in System Architecting for Innovation (MTI, PA, DKH, JHO, JJMT), pp. 277–280.
- WICSA-2004-OliveiraWFL #architecture #case study
- An Architectural Approach to Mobility — The Handover Case Study (CO, MW, JLF, AL), pp. 305–310.
- WICSA-2004-PostmaAW #architecture #component
- Component Replacement in a Long-Living Architecture: The 3RDBA Approach (AP, PA, JGW), pp. 89–100.
- DocEng-2004-AndradeMP #generative #web
- A document-based approach to the generation of web applications (ARdA, EVM, MdGCP), pp. 45–47.
- ECDL-2004-Henry #named
- Connexions: An Alternative Approach to Publishing (GLH), pp. 421–431.
- ECDL-2004-HongOL #library #problem
- System Support for Name Authority Control Problem in Digital Libraries: OpenDBLP Approach (YH, BWO, DL), pp. 134–144.
- HT-2004-BerleantMABDDEGL #documentation #lightweight
- Head-tail display: a lightweight approach to query-dependent document display (DB, JM, MA, JB, RD, TD, LE, CG, KHL), pp. 22–23.
- HT-2004-OngL #algorithm #generative #interactive #search-based
- A genetic algorithm approach to interactive narrative generation (TO, JJL), pp. 181–182.
- HT-2004-WhiteheadGP #automation #generative #hypermedia #modelling #repository
- Automatic generation of hypertext system repositories: a model driven approach (EJWJ, GG, KP), pp. 205–214.
- JCDL-2004-CaoN #multi
- Question answering on lecture videos: a multifaceted approach (JC, JFNJ), pp. 214–215.
- JCDL-2004-ShiawJC #3d #library
- The 3D vase museum: a new approach to context in a digital library (HyS, RJKJ, GRC), pp. 125–134.
- JCDL-2004-WangTCLC #library #query #using
- Translating unknown cross-lingual queries in digital libraries using a web-based approach (JHW, JWT, PJC, WHL, LFC), pp. 108–116.
- JCDL-2004-YangL #fault #segmentation #statistics #using
- Error anaylsis of Chinese text segmentation using statistical approach (CCY, KWL), pp. 256–257.
- SIGMOD-2004-QianZZ #clustering #effectiveness #named #performance
- FAÇADE: A Fast and Effective Approach to the Discovery of Dense Clusters in Noisy Spatial Data (YQ, GZ, KZ), pp. 921–922.
- SIGMOD-2004-WuYDM #clustering #interactive #interface #query #web
- An Interactive Clustering-based Approach to Integrating Source Query interfaces on the Deep Web (WW, CTY, AD, WM), pp. 95–106.
- SIGMOD-2004-YanYH #graph
- Graph Indexing: A Frequent Structure-based Approach (XY, PSY, JH), pp. 335–346.
- VLDB-2004-LiHG
- High-Dimensional OLAP: A Minimal Cubing Approach (XL, JH, HG), pp. 528–539.
- ITiCSE-2004-Hamer #composition #design pattern #education #using
- An approach to teaching design patterns using musical composition (JH), pp. 156–160.
- ITiCSE-2004-Ragonis
- A refreshing approach to an academic seminar course (NR), p. 236.
- ITiCSE-WGR-2004-CinneideT #design pattern #education #problem
- A problem-based approach to teaching design patterns (MÓC, RT), pp. 80–82.
- ITiCSE-WGR-2004-NairM #concept #data type
- Conceptualizing data structures: a pedagogic approach (ASN, TM), pp. 97–100.
- SIGITE-2004-JiangMK #education #visual notation
- A different approach of teaching introductory visual basic course (KJ, JM, RK), pp. 219–223.
- SIGITE-2004-Klassen #concept #education #programming
- Another approach to teaching programming concept course with object first (MK), p. 277.
- SIGITE-2004-MasonJT #collaboration #network #security
- Network and systems security, a collaborative approach (SM, DJ, LT), p. 279.
- CSMR-2004-Torchiano #comprehension #empirical #modelling
- Empirical Investigation of a Non-Intrusive Approach to Study Comprehension Cognitive Models (MT), pp. 184–194.
- ICSM-2004-JanssensMHV #composition #configuration management
- A Modular Approach Enforcing Safe Reconfiguration of Producer-Consumer Applications (NJ, SM, TH, PV), pp. 274–283.
- ICSM-2004-MohanGL #complexity #comprehension #concept #using
- An Approach to Understanding Program Comprehensibility Using Spatial Complexity, Concept Assignment and Typographical Style (AM, NG, PJL), p. 530.
- ICSM-2004-SoodD #component #maintenance
- An Approach to Measure Software Maintenance and Support as a Value Added Component of To-Day’s Business (HRS, DD), p. 503.
- ICSM-2004-TahvildariK #multi #source code
- Developing a Multi-Objective Decision Approach to Select Source-Code Improving Transformations (LT, KK), pp. 427–431.
- WCRE-2004-GarciaLPAA #effectiveness #reverse engineering #towards
- Towards an Effective Approach for Reverse Engineering (VCG, DL, AFdP, AÁ, ESdA), pp. 298–299.
- WCRE-2004-MarcusSRM #concept #information retrieval #source code
- An Information Retrieval Approach to Concept Location in Source Code (AM, AS, VR, JIM), pp. 214–223.
- WCRE-2004-MohanGL #complexity #concept #using
- An Initial Approach to Assessing Program Comprehensibility Using Spatial Complexity, Number of Concepts and Typographical Style (AM, NG, PJL), pp. 246–255.
- WCRE-2004-WuMSL #maintenance #reverse engineering #version control
- A Reverse Engineering Approach to Support Software Maintenance: Version Control Knowledge Extraction (XW, AM, MADS, RL), pp. 90–99.
- CIAA-2004-HanMZ #automaton #database #sequence
- An Automata Approach to Match Gapped Sequence Tags Against Protein Database (YH, BM, KZ), pp. 167–177.
- IFM-2004-PuHHY #clustering #hardware
- An Optimal Approach to Hardware/Software Partitioning for Synchronous Model (GP, DVH, JH, WY), pp. 363–381.
- IFM-2004-SeceleanuP #design #uml
- Constituent Elements of a Correctness-Preserving UML Design Approach (TS, JP), pp. 227–246.
- RTA-2004-Blom #approximate #λ-calculus
- An Approximation Based Approach to Infinitary λ Calculi (SB), pp. 221–232.
- SEFM-2004-Fronk #algebra #analysis #automation #petri net #using
- Using Relation Algebra for the Analysis of Petri Nets in a CASE Tool Based Approach (AF), pp. 396–405.
- SEFM-2004-GeguangXSZHY #clustering #hardware #multi
- An Approach to Hardware/Software Partitioning for Multiple Hardware Devices Model (GP, XZ, SW, ZQ, JH, WY), pp. 376–385.
- CHI-2004-VeraHML #constraints #interactive #predict
- A constraint satisfaction approach to predicting skilled interactive cognition (AHV, AH, MM, RLL), pp. 121–128.
- CSCW-2004-AckermanHCWMW #community #question #social
- Communities and technologies: an approach to foster social capital? (MSA, MH, JMC, BW, GDM, VW), pp. 406–408.
- CSCW-2004-XiaSSCS #collaboration #multi
- Leveraging single-user applications for multi-user collaboration: the coword approach (SX, DS, CS, DC, HS), pp. 162–171.
- CAiSE-2004-KaldeichS #process
- Data Warehouse Methodology: A Process Driven Approach (CK, JOeS), pp. 536–549.
- CAiSE-2004-NikiforovaK #development #modelling
- Two-Hemisphere Model Driven Approach: Engineering Based Software Development (ON, MK), pp. 219–233.
- CAiSE-2004-SalinesiEZ #evolution #modelling #requirements #similarity #using
- A Systematic Approach to Express IS Evolution Requirements Using Gap Modelling and Similarity Modelling Techniques (CS, AE, IZ), pp. 338–352.
- EDOC-2004-BezivinHLJ #framework #platform #web #web service
- Applying MDA Approach for Web Service Platform (JB, SH, DL, FJ), pp. 58–70.
- EDOC-2004-DijkmanQPS #enterprise
- A Rigorous Approach to Relate Enterprise and Computational Viewpoints (RMD, DACQ, LFP, MvS), pp. 187–200.
- EDOC-2004-SvenssonVW #architecture #consistency
- Data Consistency in a Heterogeneous IT Landscape: A Service Oriented Architecture Approach (ES, CV, TW), pp. 3–8.
- EDOC-2004-WeisUGB #middleware #modelling #quality
- Quality of Service in Middleware and Applications: A Model-Driven Approach (TW, AU, KG, CB), pp. 160–171.
- ICEIS-v1-2004-ChertourasC #case study #enterprise #process #re-engineering
- ERP Based Business Process Reengineering in a Human Resources Department: A Case Study Approach (KC, TC), pp. 78–83.
- ICEIS-v1-2004-HezzahT #design #enterprise #representation
- Design and Representation of the Time Dimension in Enterprise Data Warehouses — A Business Related Practical Approach (AH, AMT), pp. 416–424.
- ICEIS-v1-2004-NegreteST #database #evolution
- An Approach For Schema Evolution in ODMG Databases (CDN, JS, MT), pp. 136–141.
- ICEIS-v1-2004-Rostanin
- An Alternative Approach for Building Web-Applications (OR), pp. 119–124.
- ICEIS-v2-2004-BailonDGT #reasoning
- A Connexionist Approach for Case Based Reasoning (ABB, MD, ELGG, JMdlT), pp. 369–374.
- ICEIS-v2-2004-BillyMPC #adaptation #reasoning
- Model P: An Approach of the Adaptability of Case-Based Reasoning Systems (MB, FXM, CP, LC), pp. 357–362.
- ICEIS-v2-2004-DangerRB #mining #named
- Objectminer: A New Approach for Mining Complex Objects (RD, JRS, RBL), pp. 42–47.
- ICEIS-v2-2004-EnnigrouG #flexibility #multi #problem #scheduling
- Multi-Agent Approach Based on Tabu Search for the Flexible Job Shop Scheduling Problem (ME, KG), pp. 22–28.
- ICEIS-v2-2004-MoutinhoTNC #detection #network #using
- Face Pattern Detection — an Approach Using Neural Networks (AMM, ACGT, LBN, PHGC), pp. 172–177.
- ICEIS-v3-2004-BennasriS #component #requirements #variability
- Capturing Requirements Variability into Components: A Goal Driven Approach (SB, CS), pp. 438–443.
- ICEIS-v3-2004-BringelCT #modelling #process #quality #towards
- Business Process Modeling Towards Data Quality: A Organizational Engineering Approach (HB, AC, JMT), pp. 565–568.
- ICEIS-v3-2004-FerreiraCC
- Securing a Web-Based EPR: An Approach to Secure a Centralized EPR Within a Hospital (AMF, RJCC, AdCP), pp. 54–59.
- ICEIS-v3-2004-KazakovA #automation #integration #logic
- Semi-Automated Software Integration: An Approach Based on Logical Inference (MK, HA), pp. 527–530.
- ICEIS-v3-2004-LeymonerieJCBO #architecture #formal method #process #towards
- Towards a Business Process Formalisation Based on an Architecture Centred Approach (FL, LBDJ, SC, CB, FO), pp. 513–518.
- ICEIS-v3-2004-Shinkawa #enterprise #formal method #modelling
- A Formal Approach to Enterprise Modeling (YS), pp. 663–668.
- ICEIS-v3-2004-ZoukarS #enterprise #requirements #similarity
- Matching ERP Functionalities with the Logistic Requirements of French Railways: A Similarity Approach (IZ, CS), pp. 444–450.
- ICEIS-v4-2004-MaamarMYH #towards #web #web service
- Towards an Agent-Based and Context-Oriented Approach to Compose Web Services (ZM, SKM, HY, WJvdH), pp. 214–221.
- ICEIS-v4-2004-StockheimNSS #enterprise #how #multi
- How to Build a Multi-Multi-Agent System: The Agent.Enterprise Approach (TS, JN, TS, MS), pp. 364–371.
- ICEIS-v4-2004-SuiAM #e-commerce #email
- Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce (NTS, SIA, DM), pp. 106–113.
- CIKM-2004-ChuangC #generative #topic
- A practical web-based approach to generating topic hierarchy for text segments (SLC, LFC), pp. 127–136.
- CIKM-2004-FradkinK #adaptation #analysis #design #information retrieval
- A design space approach to analysis of information retrieval adaptive filtering systems (DF, PBK), pp. 251–260.
- CIKM-2004-HeTC #clustering #query #web
- Organizing structured web sources by query schemas: a clustering approach (BH, TT, KCCC), pp. 22–31.
- CIKM-2004-LuCL #performance #xml
- Efficient processing of XML twig patterns with parent child edges: a look-ahead approach (JL, TC, TWL), pp. 533–542.
- CIKM-2004-RosenfeldFFSA #hybrid #information management #named
- TEG: a hybrid approach to information extraction (BR, RF, MF, JS, YA), pp. 589–596.
- ECIR-2004-AbolhassaniF #documentation #xml
- Applying the Divergence from Randomness Approach for Content-Only Search in XML Documents (MA, NF), pp. 409–419.
- ECIR-2004-KellyDBA #modelling #topic
- A User-Centered Approach to Evaluating Topic Models (DK, FD, NJB, JA), pp. 27–41.
- ECIR-2004-NottelmannF
- Combining CORI and the Decision-Theoretic Approach for Advanced Resource Selection (HN, NF), pp. 138–153.
- ICML-2004-BaskiotisS
- C4.5 competence map: a phase transition-inspired approach (NB, MS).
- ICML-2004-ClimerZ #clustering
- Take a walk and cluster genes: a TSP-based approach to optimal rearrangement clustering (SC, WZ).
- ICML-2004-GaoWLC #categorisation #learning #multi #robust
- A MFoM learning approach to robust multiclass multi-label text categorization (SG, WW, CHL, TSC).
- ICML-2004-PhillipsDS #modelling
- A maximum entropy approach to species distribution modeling (SJP, MD, RES).
- ICPR-v1-2004-BelaidB #analysis #documentation
- Morphological Tagging Approach in Document Analysis of Invoices (YB, AB), pp. 469–472.
- ICPR-v1-2004-LiEFR #multi #segmentation
- A Multi-Label Front Propagation Approach for Object Segmentation (HL, AE, MJF, SR), pp. 600–603.
- ICPR-v1-2004-LiuLJ
- A Structural Approach to Recognizing Incomplete Graphic Objects (YL, WL, CJ), pp. 371–375.
- ICPR-v1-2004-NasiosB #image #segmentation
- A Variational Approach for Color Image Segmentation (NN, AGB), pp. 680–683.
- ICPR-v1-2004-WangJW #detection #integration #multi #novel #using #video
- A Novel Video Caption Detection Approach Using Multi-Frame Integration (RW, WJ, LW), pp. 449–452.
- ICPR-v1-2004-YanL #documentation #image #information management #multi
- The Multistage Approach to Information Extraction in Degraded Document Images (YC, GL), pp. 445–448.
- ICPR-v2-2004-BaiH #documentation #image
- A Goal-Oriented Verification-Based Approach for Target Text Line Extraction from a Document Image Captured by a Pen Scanner (ZLB, QH), pp. 574–577.
- ICPR-v2-2004-BajaN #2d #3d
- 2D Grey-level Skeleton Computation: A Discrete 3D Approach (GSdB, IN), pp. 455–458.
- ICPR-v2-2004-BeginF #using
- Blind Super-Resolution Using a Learning-Based Approach (IB, FPF), pp. 85–89.
- ICPR-v2-2004-FarmerJ #classification #image #segmentation
- A Wrapper-Based Approach to Image Segmentation and Classification (MEF, AKJ), pp. 106–109.
- ICPR-v2-2004-LourakisAM #graph #information management #similarity #using
- A Graph-Based Approach to Corner Matching Using Mutual Information as a Local Similarity Measure (MIAL, AAA, KM), pp. 827–830.
- ICPR-v2-2004-LuCY #composition #graph
- A Graph Decomposition Approach to Least Squares Attributed Graph Matching (JL, TC, JYY), pp. 471–474.
- ICPR-v2-2004-Nagao #feature model #kernel
- Bayesian Approach with Nonlinear Kernels to Feature Extraction (KN), pp. 153–156.
- ICPR-v2-2004-Ortegon-AguilarB #3d #algebra #estimation
- Monocular Lie Algebra Approach for 3D Motion Estimation (JOA, EBC), pp. 200–203.
- ICPR-v2-2004-ParkYKJ #recognition #segmentation #string
- A Two-Stage Approach for Segmentation and Recognition of Handwritten Digit Strings Collected from Mail Pieces (SP, YY, GK, SHJ), pp. 626–629.
- ICPR-v2-2004-SebeCHG #detection #network
- Skin Detection: A Bayesian Network Approach (NS, IC, TSH, TG), pp. 903–906.
- ICPR-v2-2004-StefanoGM #feature model #multi #online #segmentation
- A Multiresolution Approach to On-line Handwriting Segmentation and Feature Extraction (CDS, MG, AM), pp. 614–617.
- ICPR-v2-2004-WangDZSLB #multi #network #visual notation
- A Dynamic Bayesian Network Approach to Multi-cue based Visual Tracking (TW, QD, YZ, GS, CL, GRB), pp. 167–170.
- ICPR-v3-2004-AnsaryVD #3d #modelling #retrieval
- A Bayesian Approach for 3D Models Retrieval Based on Characteristic Views (TFA, JPV, MD), pp. 898–901.
- ICPR-v3-2004-AntoniolC #array #image #markov #random
- A Markov Random Field Approach to Microarray Image Gridding (GA, MC), pp. 550–553.
- ICPR-v3-2004-ForestSCP #3d #detection
- Laser Stripe Peak Detector for 3D Scanners. A FIR Filter Approach (JF, JS, EC, CP), pp. 646–649.
- ICPR-v3-2004-HuangSK #detection #multi #robust
- A Multi-Expert Approach for Robust Face Detection (LLH, AS, HK), pp. 942–945.
- ICPR-v3-2004-IsgumGP #automation #pattern matching #pattern recognition #recognition
- A Pattern Recognition Approach to Automated Coronary Calcium Scoring (II, BvG, MP), pp. 746–749.
- ICPR-v3-2004-KellerS #algebra #detection #symmetry
- An Algebraic Approach to Symmetry Detection (YK, YS), pp. 186–189.
- ICPR-v3-2004-LaporteBA #estimation #performance #recognition
- A Fast Discriminant Approach to Active Object Recognition and Pose Estimation (CL, RB, TA), pp. 91–94.
- ICPR-v3-2004-NeuhausB #distance #edit distance #graph #learning #probability
- A Probabilistic Approach to Learning Costs for Graph Edit Distance (MN, HB), pp. 389–393.
- ICPR-v3-2004-SchuldtLC
- Recognizing Human Actions: A Local SVM Approach (CS, IL, BC), pp. 32–36.
- ICPR-v3-2004-TwiningMT #image #problem
- A Unified Information-Theoretic Approach to the Correspondence Problem in Image Registration (CJT, SM, CJT), pp. 704–709.
- ICPR-v4-2004-AggarwalCC #identification #recognition
- A System Identification Approach for Video-based Face Recognition (GA, AKRC, RC), pp. 175–178.
- ICPR-v4-2004-DharaC #estimation #hybrid #predict #using #video
- Video Motion Estimation Using Prediction Based Hybrid Approach (BCD, BC), pp. 737–740.
- ICPR-v4-2004-FangGGC #automation #novel
- A Novel Approach to Automatically Extracting Basic Units from Chinese Sign Language (GF, XG, WG, YC), pp. 454–457.
- ICPR-v4-2004-FrancoLM #feedback
- A New Approach for Relevance Feedback Through Positive and Negative Samples (AF, AL, DM), pp. 905–908.
- ICPR-v4-2004-HabedB #constraints #self
- Camera Self-Calibration: A New Approach for Solving the Modulus Constraint (AH, BB), pp. 116–119.
- ICPR-v4-2004-ImbaultL #optimisation #parametricity #probability
- A Stochastic Optimization Approach for Parameter Tuning of Support Vector Machines (FI, KL), pp. 597–600.
- ICPR-v4-2004-KangCM04a #2d #estimation #multi
- Non-Iterative Approach to Multiple 2D Motion Estimation (EYEK, IC, GGM), pp. 791–794.
- ICPR-v4-2004-LeungALS #energy #re-engineering
- An Energy Minimisation Approach to Stereo-Temporal Dense Reconstruction (CL, BA, BCL, CS), pp. 72–75.
- ICPR-v4-2004-ReyesB #geometry #re-engineering
- Geometric Approach for Simultaneous Projective Reconstruction of Points, Lines, Planes, Quadrics, Plane Conics and Degenerate Quadrics (LR, EBC), pp. 60–63.
- ICPR-v4-2004-Richard #consistency #difference #image
- A New Approach For The Registration of Images With Inconsistent Differences (FJPR), pp. 649–652.
- ICPR-v4-2004-Rivera-RoveloB #geometry
- Non-Rigid Registration and Geometric Approach for Tracking in Neurosurgery (JRR, EBC), pp. 717–720.
- ICPR-v4-2004-StefanoDM #learning
- A Dynamic Approach to Learning Vector Quantization (CDS, CD, AM), pp. 601–604.
- ICPR-v4-2004-YangFTH04a #detection #image #novel
- A Novel Approach to Detecting Adult Images (JY, ZF, TT, WH), pp. 479–482.
- KDD-2004-BanerjeeDGMM #approximate #clustering #matrix
- A generalized maximum entropy approach to bregman co-clustering and matrix approximation (AB, ISD, JG, SM, DSM), pp. 509–514.
- KDD-2004-DavidsonGST #algorithm #data mining #matrix #mining #quality
- A general approach to incorporate data quality matrices into data mining algorithms (ID, AG, AS, GKT), pp. 794–798.
- KDD-2004-HeCH #correlation #interface #mining #query #web
- Discovering complex matchings across web query interfaces: a correlation mining approach (BH, KCCC, JH), pp. 148–157.
- KDD-2004-KumarMS #graph
- A graph-theoretic approach to extract storylines from search results (RK, UM, DS), pp. 216–225.
- KDD-2004-Poole
- Estimating the size of the telephone universe: a Bayesian Mark-recapture approach (DP), pp. 659–664.
- KDD-2004-TinoKS #generative #probability #sequence #set #visualisation
- A generative probabilistic approach to visualizing sets of symbolic sequences (PT, AK, YS), pp. 701–706.
- KDD-2004-ZhangZK #category theory #data mining #image #mining #modelling
- A data mining approach to modeling relationships among categories in image collection (RZ, Z(Z, SK), pp. 749–754.
- KDD-2004-ZhengPZ
- A DEA approach for model combination (Z(Z, BP, HZ), pp. 755–760.
- KR-2004-AmgoudP
- Reaching Agreement Through Argumentation: A Possibilistic Approach (LA, HP), pp. 175–182.
- KR-2004-PetrickB #knowledge-based
- Extending the Knowledge-Based Approach to Planning with Incomplete Information and Sensing (RPAP, FB), pp. 613–622.
- LSO-2004-GomesPPSCFB #design #information management #named
- REBUILDER: A CBR Approach to Knowledge Management in Software Design (PG, FCP, PP, NS, PC, JLF, CB), pp. 31–42.
- LSO-2004-MontoniMRT #community #information management #multi
- Knowledge Acquisition and Communities of Practice: An Approach to Convert Individual Knowledge into Multi-organizational Knowledge (MM, RM, ARR, GHT), pp. 110–121.
- SEKE-2004-AvesaniBPS #machine learning #process #requirements
- Supporting the Requirements Prioritization Process. A Machine Learning approach (PA, CB, AP, AS), pp. 306–311.
- SEKE-2004-CorreaW #specification #transaction #validation
- Specification and Validation of Transactional Business Software: An Approach Based on the Exploration of Concrete Scenarios (ALC, CMLW), pp. 294–299.
- SEKE-2004-FaulknerKNCD #architecture #development #integration #multi
- Information Integration Architecture Development: A Multi-Agent Approach (SF, MK, TN, AC, TTD), pp. 192–198.
- SEKE-2004-MaidantchikSM #distributed #information management #xml
- Organizational Knowledge: an XML-based Approach to Support Knowledge Management in Distributed and Heterogeneous Environments (CM, GS, MM), pp. 427–430.
- SEKE-2004-Stojanovic #modelling #on the
- On Modelling an e-shop Application on the Knowledge Level: e-ShopAgent Approach (NS), pp. 232–237.
- SEKE-2004-YangEY #aspect-oriented #security
- Enhancing Mediation Security by Aspect-Oriented Approach (LY, RKE, HY), pp. 155–160.
- SIGIR-2004-KimSR #information retrieval #using #word
- Information retrieval using word senses: root sense tagging approach (SBK, HCS, HCR), pp. 258–265.
- SIGIR-2004-LiuLYM #documentation #effectiveness #retrieval
- An effective approach to document retrieval via utilizing WordNet and recognizing phrases (SL, FL, CTY, WM), pp. 266–272.
- SIGIR-2004-Trotman #information retrieval
- An artificial intelligence approach to information retrieval (AT), p. 603.
- SIGIR-2004-XuWL #evaluation
- Evaluation of an extraction-based approach to answering definitional questions (JX, RMW, AL), pp. 418–424.
- SPLC-2004-FritschR #adaptation #product line
- Four Mechanisms for Adaptable Systems: A Meta-level Approach to Building a Software Product Line (CF, BR), pp. 51–72.
- SPLC-2004-LeeKK #product line
- A Feature-Based Approach to Product Line Production Planning (JL, KCK, SK), pp. 183–196.
- UML-2004-Reinhartz-BergerS #analysis #behaviour #domain model #modelling
- Behavioral Domain Analysis — The Application-Based Domain Modeling Approach (IRB, AS), pp. 410–424.
- TOOLS-USA-2003-Bouktif04 #predict #quality #search-based #set
- Improving Rule Set Based Software Quality Prediction: A Genetic Algorithm-based Approach (SB), pp. 227–241.
- TOOLS-USA-2003-HallstromSSAL04 #object-oriented #product line
- A Container-Based Approach to Object-Oriented Product Lines (JOH, NS, PAGS, AA, WL), pp. 161–175.
- TOOLS-USA-2003-Silva04 #concurrent #object-oriented #programming
- Concurrent Object-Oriented Programming: The MP-Eiffel Approach (MOeS), pp. 97–124.
- OOPSLA-2004-FactorSS #library #object-oriented #standard
- Instrumentation of standard libraries in object-oriented languages: the twin class hierarchy approach (MF, AS, KS), pp. 288–300.
- AdaEurope-2004-GiriMJK #ada #random #safety #testing
- A Randomised Test Approach to Testing Safety Critical Ada Code (SKG, AM, YVJ, KK), pp. 190–199.
- PADL-2004-ChenSX #inheritance #multi #object-oriented #programming
- A Typeful Approach to Object-Oriented Programming with Multiple Inheritance (CC, RS, HX), pp. 23–38.
- PDCL-2004-LindenstraussSS #logic programming #proving #source code #termination
- Proving Termination for Logic Programs by the Query-Mapping Pairs Approach (NL, YS, AS), pp. 453–498.
- PPDP-2004-ClevaLL #functional #logic programming #source code #verification
- A logic programming approach to the verification of functional-logic programs (JMC, JL, FJLF), pp. 9–19.
- SAS-2004-JeannetLRS #analysis #interprocedural #relational
- A Relational Approach to Interprocedural Shape Analysis (BJ, AL, TWR, SS), pp. 246–264.
- SAS-2004-Rodriguez-CarbonellK #abstract interpretation #automation #generative #invariant #polynomial
- An Abstract Interpretation Approach for Automatic Generation of Polynomial Invariants (ERC, DK), pp. 280–295.
- RE-2004-HillWN #non-functional #process #requirements
- Quantifying Non-Functional Requirements: A Process Oriented Approach (RLH, JW, KN), pp. 352–353.
- RE-2004-RegevW #requirements
- Defining Early IT System Requirements with Regulation Principles: The Lightswitch Approach (GR, AW), pp. 144–153.
- RE-2004-TsuchiyaMGSO #specification
- Requirement-driven Approach to Interoperable Traveler Support System Specification (RT, AM, KG, KS, TO), pp. 316–321.
- ASE-2004-ChoiH #case study #model checking
- Combination Model Checking: Approach and a Case Study (YC, MPEH), pp. 354–357.
- ASE-2004-FleureyTB #automation #testing
- From Testing to Diagnosis: An Automated Approach (FF, YLT, BB), pp. 306–309.
- ASE-2004-SampathMSP #concept analysis #scalability #testing #web
- Scalable Approach to User-Session based Testing of Web Applications through Concept Analysis (SS, VM, ALS, LLP), pp. 132–141.
- ASE-2004-Xie #component #hybrid #verification
- Decompositional Verification of Component-based Systems — A Hybrid Approach (GX), pp. 414–417.
- ICSE-2004-BaniassadC #analysis #aspect-oriented #design #named
- Theme: An Approach for Aspect-Oriented Analysis and Design (ELAB, SC), pp. 158–167.
- ICSE-2004-OReilly #coordination
- A Weakly Constrained Approach to Software Change Coordination (CO), pp. 66–68.
- ICSE-2004-Rodrigues #modelling #reliability
- A Model Driven Approach for Software Systems Reliability (GNR), pp. 30–32.
- ICSE-2004-Waewsawangwong #architecture #component #constraints #self
- A Constraint Architectural Description Approach to Self-Organising Component-Based Software Systems (PW), pp. 81–83.
- ICSE-2004-ZhaoZLSY #feature model #named #towards
- SNIAFL: Towards a Static Non-Interactive Approach to Feature Location (WZ, LZ, YL, JS, FY), pp. 293–303.
- ICSE-2004-ZiadiHJ #algebra #statechart #synthesis
- Revisiting Statechart Synthesis with an Algebraic Approach (TZ, LH, JMJ), pp. 242–251.
- SAC-2004-ArdagnaFT #design
- A cost-oriented approach for infrastructural design (DA, CF, MT), pp. 1431–1437.
- SAC-2004-AversanoBCET #evolution #process #towards #using
- Evolution of business processes towards eBusiness using a critiquing approach (LA, TB, GC, RE, MT), pp. 1351–1358.
- SAC-2004-ChakravarthySJP
- A learning-based approach for fetching pages in WebVigiL (SC, AS, JJ, NP), pp. 1725–1731.
- SAC-2004-CombiOQ #constraints #modelling #semistructured data #specification
- Specifying temporal data models for semistructured data by a constraint-based approach (CC, BO, EQ), pp. 1103–1108.
- SAC-2004-Hosobe04a #graph #interactive #visualisation
- A high-dimensional approach to interactive graph visualization (HH), pp. 1253–1257.
- SAC-2004-HuP #data mining #database #detection #mining
- A data mining approach for database intrusion detection (YH, BP), pp. 711–716.
- SAC-2004-JoCC #modelling
- A new approach to the BDI agent-based modeling (CHJ, GC, JC), pp. 1541–1545.
- SAC-2004-KantardzicSS #monitoring
- The time diversification monitoring of a stock portfolio: an approach based on the fractal dimension (MMK, PS, CS), pp. 637–641.
- SAC-2004-LeeTT
- A seriate coverage filtration approach for homology search (HPL, YTT, CYT), pp. 180–184.
- SAC-2004-MaamarKY #composition #web #web service
- A Web services composition approach based on software agents and context (ZM, SKM, HY), pp. 1619–1623.
- SAC-2004-MadirajuS #constraints #database #mobile
- A mobile agent approach for global database constraint checking (PM, RS), pp. 679–683.
- SAC-2004-PowerPSHS #database #relational
- A relational approach to the capture of DICOM files for Grid-enabled medical imaging databases (DJP, EAP, MS, SH, ACS), pp. 272–279.
- SAC-2004-RahalP #categorisation #using
- An optimized approach for KNN text categorization using P-trees (IR, WP), pp. 613–617.
- SAC-2004-ScottoSSV #metric #relational
- A relational approach to software metrics (MS, AS, GS, TV), pp. 1536–1540.
- SAC-2004-ZhangVlY #communication #design #multi
- A decision-theoretic approach for designing proactive communication in multi-agent teamwork (YZ, RAV, TRI, JY), pp. 64–71.
- GPCE-2004-BonnetPMG #modelling #smarttech
- A Model-Driven Approach for Smart Card Configuration (SB, OP, RM, JMG), pp. 416–435.
- GPCE-2004-PadovaniCZ #documentation #generative #implementation
- A Generative Approach to the Implementation of Language Bindings for the Document Object Model (LP, CSC, SZ), pp. 469–487.
- GPCE-2004-Smith #aspect-oriented #generative #programming
- A Generative Approach to Aspect-Oriented Programming (DRS), pp. 39–54.
- CC-2004-ClaussT #optimisation #program analysis
- A Symbolic Approach to Bernstein Expansion for Program Analysis and Optimization (PC, IT), pp. 120–133.
- DAC-2004-BraunNSCHSLM #consistency #design #flexibility #novel
- A novel approach for flexible and consistent ADL-driven ASIP design (GB, AN, WS, JC, MH, HS, RL, HM), pp. 717–722.
- DAC-2004-CasuM #design #latency
- A new approach to latency insensitive design (MRC, LM), pp. 576–581.
- DAC-2004-FrancescoMABCM #hardware #runtime
- An integrated hardware/software approach for run-time scratchpad management (FP, PM, DA, LB, FC, JMM), pp. 238–243.
- DAC-2004-Hopkins #framework #mobile #multi #platform
- Nomadic platform approach for wireless mobile multimedia (MH), p. 408.
- DAC-2004-HrkicLB #logic #replication
- An approach to placement-coupled logic replication (MH, JL, GB), pp. 711–716.
- DAC-2004-LiXLGP #simulation
- A frequency relaxation approach for analog/RF system-level simulation (XL, YX, PL, PG, LTP), pp. 842–847.
- DAC-2004-PantBZSP #analysis #grid #power management #probability
- A stochastic approach To power grid analysis (SP, DB, VZ, SS, RP), pp. 171–176.
- DAC-2004-PasrichaDB #architecture #communication #modelling #performance #transaction
- Extending the transaction level modeling approach for fast communication architecture exploration (SP, NDD, MBR), pp. 113–118.
- DAC-2004-TanGQ #analysis #scalability
- Hierarchical approach to exact symbolic analysis of large analog circuits (SXDT, WG, ZQ), pp. 860–863.
- DAC-2004-WuZN #estimation
- An analytical approach for dynamic range estimation (BW, JZ, FNN), pp. 472–477.
- DATE-v1-2004-IranliCP #energy #game studies #streaming #video
- A Game Theoretic Approach to Low Energy Wireless Video Streaming (AI, KC, MP), pp. 696–697.
- DATE-v1-2004-LaurentJSM #analysis #functional #modelling #performance #power management
- Functional Level Power Analysis: An Efficient Approach for Modeling the Power Consumption of Complex Processors (JL, NJ, ES, EM), pp. 666–667.
- DATE-v1-2004-StefanovZTKD #design #network #process #using
- System Design Using Kahn Process Networks: The Compaan/Laura Approach (TS, CZ, AT, BK, EFD), pp. 340–345.
- DATE-v2-2004-BobrekPNPT #hybrid #modelling #simulation #using
- Modeling Shared Resource Contention Using a Hybrid Simulation/Analytical Approach (AB, JJP, JEN, JMP, DET), pp. 1144–1149.
- DATE-v2-2004-CortadellaKLLS #automation
- From Synchronous to Asynchronous: An Automatic Approach (JC, AK, LL, KL, CPS), pp. 1368–1369.
- DATE-v2-2004-MondalCM #analysis #logic #using
- A New Approach to Timing Analysis Using Event Propagation and Temporal Logic (AM, PPC, CAM), pp. 1198–1203.
- DATE-v2-2004-PestanaRRGG #network #trade-off
- Cost-Performance Trade-Offs in Networks on Chip: A Simulation-Based Approach (SGP, ER, AR, KGWG, OPG), pp. 764–769.
- DATE-v2-2004-PisharathCK #database #execution #in memory #query
- Data Windows: A Data-Centric Approach for Query Execution in Memory-Resident Databases (JP, ANC, MTK), pp. 1352–1353.
- DATE-v2-2004-TirumurtiKSC #modelling #power management
- A Modeling Approach for Addressing Power Supply Switching Noise Related Failures of Integrated Circuit (CT, SK, SSK, YSC), pp. 1078–1083.
- HPDC-2004-WengACKNS #automation
- An Approach for Automatic Data Virtualization (LW, GA, ÜVÇ, TMK, SN, JHS), pp. 24–33.
- PDP-2004-AlmeidaGM #paradigm #programming
- The Master-Slave Paradigm on Heterogeneous Systems: A Dynamic Programming Approach for the Optimal Mapping (FA, DG, LMM), p. 266–?.
- PDP-2004-JelasityKS #distributed #network #peer-to-peer
- An Approach to Massively Distributed Aggregate Computing on Peer-to-Peer Networks (MJ, WK, MvS), pp. 200–207.
- DATE-2005-BernardiMQR04 #logic #testing #using
- Testing Logic Cores using a BIST P1500 Compliant Approach: A Case of Study (PB, GM, FQ, MSR), pp. 228–233.
- ESOP-2004-Ghica #analysis #logic #semantics #specification
- Semantical Analysis of Specification Logic, 3: An Operational Approach (DRG), pp. 264–278.
- FoSSaCS-2004-EhrigK #bisimulation #graph grammar
- Deriving Bisimulation Congruences in the DPO Approach to Graph Rewriting (HE, BK), pp. 151–166.
- TACAS-2004-LugiezNZ #automaton #explosion #partial order #problem #semantics
- A Partial Order Semantics Approach to the Clock Explosion Problem of Timed Automata (DL, PN, SZ), pp. 296–311.
- FATES-2004-BordbarO #formal method #realtime #testing
- Testing Deadlock-Freeness in Real-Time Systems: A Formal Approach (BB, KO), pp. 95–109.
- FATES-2004-XieD #component #model checking
- An Automata-Theoretic Approach for Model-Checking Systems with Unspecified Components (GX, ZD), pp. 155–169.
- ICLP-2004-ElkabaniPS #effectiveness
- Smodels with CLP and Its Applications: A Simple and Effective Approach to Aggregates in ASP (IE, EP, TCS), pp. 73–89.
- LICS-2004-NordhJ #algebra #complexity
- An Algebraic Approach to the Complexity of Propositional Circumscription (GN, PJ), pp. 367–376.
- SAT-2004-BaulandCCHV #algebra #complexity #query
- An Algebraic Approach to the Complexity of Generalized Conjunctive Queries (MB, PC, NC, MH, HV), pp. 181–190.
- DocEng-2003-PurvisHOF #documentation #optimisation #personalisation
- Creating personalized documents: an optimization approach (LP, SH, BO, ECF), pp. 68–77.
- HT-2003-KarousosTP #developer #hypermedia
- Increasing the usage of open hypermedia systems: a developer-side approach (NK, MT, IP), pp. 148–149.
- ICDAR-2003-AlamHKRTW #natural language #summary #web
- Web Page Summarization for Handheld Devices: A Natural Language Approach (HA, RH, AK, AFRR, YT, CW), pp. 1153–1157.
- ICDAR-2003-AlhajjE #novel
- A Novel Approach to Separate Handwritten Connected Digits (RA, AE), pp. 1198–1202.
- ICDAR-2003-BaiH #documentation #image
- An Approach to Extracting the Target Text Line from a Document Image Captured by a Pen Scanner (ZLB, QH), p. 76–?.
- ICDAR-2003-CaoDL #bound #documentation #image #modelling
- Rectifying the Bound Document Image Captured by the Camera: A Model Based Approach (HC, XD, CL), pp. 71–75.
- ICDAR-2003-DawoudK #image
- New Approach for the Skeletonization of Handwritten Characters in Gray-Level Images (AD, MK), pp. 1233–1237.
- ICDAR-2003-GattaniMG #analysis #documentation #image #multi #performance
- A Fast Multifunctional Approach for Document Image Analysis (AG, MM, HG), pp. 1178–1182.
- ICDAR-2003-HendersonS #analysis
- Symbolic Pruning in a Structural Approach to Engineering Drawing Analysis (TH, LS), pp. 180–184.
- ICDAR-2003-HoqueSF #classification #multi #performance #recognition
- A New Chain-code Quantization Approach Enabling High Performance Handwriting Recognition based on Multi-Classifier Schemes (SH, KS, MCF), pp. 834–838.
- ICDAR-2003-Hurst #constraints
- A Constraint-based Approach to Table Structure Derivation (MH), pp. 911–915.
- ICDAR-2003-Legal-AyalaF #image #learning #segmentation
- Image Segmentation By Learning Approach (HALA, JF), pp. 819–823.
- ICDAR-2003-LiWZ #image #statistics #string #using
- String Extraction From Color Airline Coupon Image Using Statistical Approach (YL, ZW, HZ), pp. 289–293.
- ICDAR-2003-LuoL #recognition #using
- Engineering Drawings Recognition Using a Case-based Approach (YL, LW), pp. 190–194.
- ICDAR-2003-LuT03a #documentation #estimation #nearest neighbour
- Improved Nearest Neighbor Based Approach to Accurate Document Skew Estimation (YL, CLT), pp. 503–507.
- ICDAR-2003-MalerbaEACB #documentation #layout #machine learning
- Correcting the Document Layout: A Machine Learning Approach (DM, FE, OA, MC, MB), p. 97–?.
- ICDAR-2003-MenotiBFB #feature model #segmentation
- Segmentation of Postal Envelopes for Address Block Location: an approach based on feature selection in wavelet space (DM, DLB, JF, AdSBJ), pp. 699–703.
- ICDAR-2003-NishidaS #documentation #image #multi
- A Multiscale Approach to Restoring Scanned Color Document Images with Show-Through Effects (HN, TS), pp. 584–588.
- ICDAR-2003-OliveiraSBS #algorithm #feature model #multi #search-based
- Feature Selection for Ensembles: A Hierarchical Multi-Objective Genetic Algorithm Approach (LESdO, RS, FB, CYS), p. 676–?.
- ICDAR-2003-PechwitzM #database #recognition #using #word
- HMM Based Approach for Handwritten Arabic Word Recognition Using the IFN/ENIT- Database (MP, VM), pp. 890–894.
- ICDAR-2003-SrihariNLD #documentation
- A Case Restoration Approach to Named Entity Tagging in Degraded Documents (RKS, CN, WL, JD), p. 720–?.
- ICDAR-2003-VermaG #architecture #online #recognition
- A Neural-Evolutionary Approach for Feature and Architecture Selection in Online Handwriting Recognition (BV, MG), pp. 1038–1042.
- ICDAR-2003-ViglinoP #automation
- A Vector Approach for Automatic Interpretation of the French Cadatral Map (JMV, MPD), pp. 304–308.
- ICDAR-2003-WangXTL #documentation #image
- Directional Wavelet Approach to Remove Document Image Interference (QW, TX, CLT, LL), pp. 736–740.
- ICDAR-2003-WuA #automation #multi #using
- Automatic Thresholding of Gray-level Using Multi-stage Approach (SW, AA), pp. 493–497.
- ICDAR-2003-YouK #network #segmentation #string #using
- An approach for locating segmentation points of handwritten digit strings using a neural network (DY, GK), p. 142–?.
- JCDL-2003-OldenettelMR #learning #library
- Integrating Digital Libraries into Learning Environments: The LEBONED Approach (FO, MM, DR), pp. 280–290.
- PODS-2003-ArenasL #normalisation #relational #xml
- An information-theoretic approach to normal forms for relational and XML data (MA, LL), pp. 15–26.
- PODS-2003-Lechtenborger #constant #towards
- The impact of the constant complement approach towards view updating (JL), pp. 49–55.
- VLDB-2003-EleftheriouBCDHLPPABDDDGJHLRSVW
- A Nanotechnology-based Approach to Data Storage (EE, PB, GC, AD, CH, TL, AP, HP, TRA, GKB, MD, UD, UD, BG, DJ, WH, MAL, HER, RS, PV, DW), pp. 3–7.
- VLDB-2003-Koch #performance #query #xml
- Efficient Processing of Expressive Node-Selecting Queries on XML Data in Secondary Storage: A Tree Automata-based Approach (CK), pp. 249–260.
- VLDB-2003-LeeHJT #bottom-up
- Supporting Frequent Updates in R-Trees: A Bottom-Up Approach (MLL, WH, CSJ, BC, KLT), pp. 608–619.
- VLDB-2003-ShahDR #performance #streaming
- An Efficient and Resilient Approach to Filtering and Disseminating Streaming Data (SS, SD, KR), pp. 57–68.
- VLDB-2003-ShiSZ #data analysis #multi
- A Shrinking-Based Approach for Multi-Dimensional Data Analysis (YS, YS, AZ), pp. 440–451.
- CSEET-2003-GnatzKPS #education #re-engineering
- A Practical Approach of Teaching Software Engineering (MG, LK, FP, TS), pp. 120–128.
- ITiCSE-2003-Allert #concept #visualisation
- A companion technology approach to CS1: handheld computers with concept visualization software (JDA), pp. 134–138.
- ITiCSE-2003-AndersenBBCM #education #programming #student
- Teaching programming to liberal arts students: a narrative media approach (PBA, JB, SB, MEC, JM), pp. 109–113.
- ITiCSE-2003-Becker #education #multi
- A multiple intelligences approach to teaching number systems (KB), p. 250.
- ITiCSE-2003-Gal-EzerVZ #algorithm #education #performance
- Teaching algorithm efficiency in a CS1 course SBTa different approach (JGE, TV, EZ), p. 256.
- ITiCSE-2003-GunawardenaA #education #learning #programming
- A customized learning objects approach to teaching programming (AG, VA), p. 264.
- ITiCSE-2003-Kruse #representation
- “Magic numbers” approach to introducing binary number representation in CSO (GK), p. 272.
- CSMR-2003-TahvildariK #design #quality
- A Metric-Based Approach to Enhance Design Quality through Meta-pattern Transformation (LT, KK), pp. 183–192.
- ICSM-2003-MahdaviHH #clustering #multi
- A Multiple Hill Climbing Approach to Software Module Clustering (KM, MH, RMH), pp. 315–324.
- ICSM-2003-Mitchell #clustering #heuristic #problem
- A Heuristic Approach to Solving the Software Clustering Problem (BSM), pp. 285–288.
- CIAA-2003-MelicharP #automaton #finite #problem #sequence
- The Longest Common Subsequence Problem A Finite Automata Approach (BM, TP), pp. 294–296.
- DLT-2003-Esparza #verification
- An Automata-Theoretic Approach to Software Verification (JE), p. 21.
- FME-2003-AldiniB #architecture #concurrent #verification
- A General Approach to Deadlock Freedom Verification for Software Architectures (AA, MB), pp. 658–677.
- FME-2003-BurdyRL #correctness #developer #java
- Java Applet Correctness: A Developer-Oriented Approach (LB, AR, JLL), pp. 422–439.
- FME-2003-FenkamGJ #concurrent
- Constructing Deadlock Free Event-Based Applications: A Rely/Guarantee Approach (PF, HCG, MJ), pp. 636–657.
- RTA-2003-BournezCCKI #automation #generative #rule-based
- A Rule-Based Approach for Automated Generation of Kinetic Chemical Mechanisms (OB, GMC, VC, HK, LI), pp. 30–45.
- SFM-2003-KramerMU #analysis #architecture #modelling
- Software Architecture Modeling & Analysis: A Rigorous Approach (JK, JM, SU), pp. 44–51.
- ICFP-2003-JonesBB
- A user-centred approach to functions in Excel (SLPJ, AFB, MMB), pp. 165–176.
- SOFTVIS-2003-EiglspergerKS #automation #diagrams #layout #uml
- A Topology-Shape-Metrics Approach for the Automatic Layout of UML Class Diagram (ME, MK, MS), pp. 189–198.
- SOFTVIS-2003-GutwengerJKKLM #diagrams #uml #visualisation
- A New Approach for Visualizing UML Class Diagrams (CG, MJ, KK, JK, SL, PM), pp. 179–188.
- CAiSE-2003-BarilB #cost analysis
- Selection of Materialized Views: A Cost-Based Approach (XB, ZB), pp. 665–680.
- CAiSE-2003-GordijnW #design #process
- A Value-Oriented Approach to E-business Process Design (JG, RW), pp. 390–403.
- CAiSE-2003-Weiss #case study #design
- Pattern-Driven Design of Agent Systems: Approach and Case Study (MW), pp. 711–723.
- EDOC-2003-AlmeidaSPQ #concept #design #independence #platform
- A Systematic Approach to Platform-Independent Design Based on the Service Concept (JPAA, MvS, LFP, DACQ), pp. 112–123.
- EDOC-2003-BahlerCM #experience #generative #interface #modelling #specification #xml
- Experience with a Model-Driven Approach for Enterprise-Wide Interface Specification and XML Schema Generation (LB, FC, JM), pp. 288–295.
- EDOC-2003-DijkmanQPS #modelling
- An Approach to Relate Viewpoints and Modeling Languages (RMD, DACQ, LFP, MvS), pp. 14–27.
- EDOC-2003-DuddyGLRS #declarative #model transformation #reuse
- Model Transformation: A declarative, reusable patterns approach (KD, AG, ML, KR, JS), pp. 174–185.
- ICEIS-v1-2003-AhmadHAMW #database #object-oriented #xml
- An Integrated Approach for Extraction of Objects From XML and Transformation to Heterogeneous Object Oriented Databases (UA, MWH, AA, RM, IW), pp. 445–449.
- ICEIS-v1-2003-Al-Fawareh #comprehension #dependence #named #object-oriented #source code
- O2PDGS: An Approach for Understanding Object Oriented Programs (HJAF), pp. 450–455.
- ICEIS-v1-2003-ChengTKRWYH #e-commerce #enterprise #integration #modelling #scalability
- A Model-Driven Approach for Item Synchronization and Uccnet Integration in Large E-Commerce Enterprise Systems (SC, MT, SK, AR, FYW, YY, YH), pp. 128–135.
- ICEIS-v1-2003-GhomariD #multi #petri net #towards
- Towards a Timed-Petri Net Based Approach for Multimedia Scenario Synchronization (AG, CD), pp. 267–272.
- ICEIS-v1-2003-HoBE #database #performance #xml
- Efficient Storage for XML Databases: Vertical View Model with Signature-Based Approach (WH, LB, DE), pp. 55–62.
- ICEIS-v1-2003-LeongL #component #development #generative #named #using
- REPCOM: A Customisable Report Generator Component System Using XML-Driven, Component-Based Development Approach (CHL, SPL), pp. 499–504.
- ICEIS-v1-2003-LocMP #component #trust
- Try and Patch: An Approach to Improve the Trust in Software Components (PTXL, PM, GP), pp. 505–508.
- ICEIS-v1-2003-MimounePA #database #ontology #semistructured data
- An Ontology-Based Approach for Exchanging Data Between Heterogeneous Database Systems (MEHM, GP, YAA), pp. 512–524.
- ICEIS-v1-2003-MorzyW #formal method #modelling #multi
- Modeling a Multiversion Data Warehouse: A Formal Approach (TM, RW), pp. 120–127.
- ICEIS-v1-2003-PfeiferW
- A Transparent Client-Side Caching Approach for Application Server Systems (DP, ZW), pp. 545–549.
- ICEIS-v1-2003-ZhangLZC #case study #enterprise #implementation #metric
- ERP Systems Implementation Determinants and Success Measures in China: A Case Study Approach (LZ, MKOL, ZZ, CMKC), pp. 136–143.
- ICEIS-v2-2003-Bates #maturity #metric #modelling
- A Capability Maturity Model-Based Approach to the Measurement of Shared Situation Awareness (EB), pp. 406–413.
- ICEIS-v2-2003-GhediniB
- A Process-Centered Approach for Kdd Application Management (CG, KB), pp. 238–243.
- ICEIS-v2-2003-KropotovV #fuzzy
- One Approach to Fuzzy Expert Systems Construction (DK, DV), pp. 566–570.
- ICEIS-v2-2003-KuusikL #data mining #mining #using
- An Approach of Data Mining Using Monotone Systems (RK, GL), pp. 482–485.
- ICEIS-v2-2003-PetitP #data mining #mining
- A New Approach of Data Mining: The Meta Projectories (CP, SP), pp. 515–518.
- ICEIS-v2-2003-SalemSH #fuzzy #hybrid #recognition #self
- A Hybrid Approach for Handwritten Arabic Character Recognition: Combining Self-Organizing Maps (SOMS) and Fuzzy Rules (ABMS, MMS, MKH), pp. 529–532.
- ICEIS-v3-2003-AllouiMO #architecture #generative #modelling #using
- Modelling and Generating Business-To-Business Applications Using an Architecture Description Language — Based Approach (IA, KM, FO), pp. 201–210.
- ICEIS-v3-2003-CaroGGCA #communication #modelling #reasoning #workflow
- A Temporal Reasoning Approach of Communication Based Workflow Modelling (JLC, AG, SG, AC, AA), pp. 245–250.
- ICEIS-v3-2003-Damij #modelling
- An Approach to Dfd Modelling (KD), pp. 551–557.
- ICEIS-v3-2003-Gittoes #implementation #quality
- A Three Perspective Approach to Groupware Implementation Quality Management: Within an Australian University (DG), pp. 307–312.
- ICEIS-v3-2003-GustasG #bound #enterprise #information management #modelling #towards
- Towards the Enterprise Engineering Approach for Information System Modelling Across Organisational and Technical Boundaries (RG, PG), pp. 77–88.
- ICEIS-v3-2003-Olla #development
- An Innovative Approach to Wireless Applications Development: An Exploration of Practise (PO), pp. 627–632.
- ICEIS-v3-2003-TianLD #community #peer-to-peer #research
- A Peer-To-Peer Knowledge Sharing Approach for a Networked Research Community (YT, LMSL, PMD), pp. 642–645.
- ICEIS-v4-2003-ChibaniKA #pervasive
- Agents-Middleware Approach for Context Awareness in Pervasive Computing (AC, KD, YA), pp. 184–189.
- ICEIS-v4-2003-LingL #composition #interactive #multi #petri net #protocol
- Engineering Multiagent Systems Based on Interaction Protocols: A Compositional Petri Net Approach (SL, SWL), pp. 42–48.
- ICEIS-v4-2003-Lopez-LopezT #information management #scalability #web
- A Dynamic and Scalable Agent-Based Approach for Knowledge Discovery : Web Site Exploration (ALL, AMT), pp. 451–454.
- ICEIS-v4-2003-PanMK #implementation #internet #modelling
- An Internet Enabled Approach for MRO Models and Its Implementation (PP, ZM, DFK), pp. 317–323.
- CIKM-2003-SrikanthS #information retrieval #modelling #query
- Exploiting syntactic structure of queries in a language modeling approach to IR (MS, RKS), pp. 476–483.
- CIKM-2003-WhiteJR #detection
- An approach for implicitly detecting information needs (RW, JMJ, IR), pp. 504–507.
- ECIR-2003-ShiEMSLLKO #machine learning
- A Machine Learning Approach for the Curation of Biomedical Literature (MS, DSE, RM, LS, JYKL, HTL, SSK, CJO), pp. 597–604.
- ECIR-2003-XuXYT #hybrid #retrieval
- A Hybrid Relevance-Feedback Approach to Text Retrieval (ZX, XX, KY, VT), pp. 281–293.
- ICML-2003-EngelMM #difference #learning #process
- Bayes Meets Bellman: The Gaussian Process Approach to Temporal Difference Learning (YE, SM, RM), pp. 154–161.
- ICML-2003-FernB03a #clustering #random
- Random Projection for High Dimensional Data Clustering: A Cluster Ensemble Approach (XZF, CEB), pp. 186–193.
- ICML-2003-SebbanJ #grammar inference #on the #semistructured data #statistics
- On State Merging in Grammatical Inference: A Statistical Approach for Dealing with Noisy Data (MS, JCJ), pp. 688–695.
- ICML-2003-StimpsonG #learning #social
- Learning To Cooperate in a Social Dilemma: A Satisficing Approach to Bargaining (JLS, MAG), pp. 728–735.
- KDD-2003-LastFK #automation #data mining #mining #testing
- The data mining approach to automated software testing (ML, MF, AK), pp. 388–396.
- SEKE-2003-CanforaCPT #case study #implementation
- A Tool for Decision Support Implementing OFNWA Approach: A Case Study (GC, LC, RP, LT), pp. 714–720.
- SEKE-2003-MaLCCZ #architecture #distributed #implementation
- A Graph-Oriented Approach to the Description and Implementation of Distributed and Dynamic Software Architecture (XM, JL, JC, ATSC, KZ), pp. 518–525.
- SEKE-2003-Morasca #evaluation #testing
- A Bayesian Approach to Software Testing Evaluation (SM), pp. 706–713.
- SEKE-2003-NetiniantiE #aspect-oriented #using #verification
- Adding Verification Property of Inter-Processes Using Aspect-Oriented Approach (PN, TE), pp. 54–60.
- SEKE-2003-SpanoudakisGZ #machine learning #requirements #traceability
- Revising Rules to Capture Requirements Traceability Relations: A Machine Learning Approach (GS, ASdG, AZ), pp. 570–577.
- SEKE-2003-TrentiniFT #architecture #distributed #documentation #workflow
- A Distributed Document Management Approach for Workflow Support in the DBSA Architecture (AT, FAF, FT), pp. 503–509.
- SEKE-2003-WuS #data mining #mining
- A Data Mining Approach for Dynamic Software Project Plan Tracking (CSW, DBS), pp. 634–638.
- SEKE-2003-ZhangJ #development #product line
- An XVCL-based Approach to Software Product Line Development (HZ, SJ), pp. 267–275.
- SIGIR-2003-GaoWLC #categorisation #learning
- A maximal figure-of-merit learning approach to text categorization (SG, WW, CHL, TSC), pp. 174–181.
- OOPSLA-2003-AllenBC
- A first-class approach to genericity (EEA, JB, RC), pp. 96–114.
- AdaEurope-2003-KuballH #certification
- Evidential Volume Approach for Certification (SK, GH), pp. 246–257.
- LOPSTR-2003-ChristiansenM #constraints #database
- Simplification of Database Integrity Constraints Revisited: A Transformational Approach (HC, DM), pp. 178–197.
- PLDI-2003-GayLBWBC #embedded
- The nesC language: A holistic approach to networked embedded systems (DG, PL, JRvB, MW, EAB, DEC), pp. 1–11.
- POPL-2003-BouajjaniET #concurrent #source code #static analysis
- A generic approach to the static analysis of concurrent programs with procedures (AB, JE, TT), pp. 62–73.
- PPDP-2003-Blanchet #automation #encryption #logic programming #protocol #verification
- Automatic verification of cryptographic protocols: a logic programming approach (BB), pp. 1–3.
- PPDP-2003-Hamana #algebra #term rewriting
- Term rewriting with variable binding: an initial algebra approach (MH), pp. 148–159.
- RE-2003-Archer
- Requirement Tracking: A Streamlined Approach (JEAJ), p. 305.
- RE-2003-ChardonD #imperative #metric #process #requirements
- One Approach to the Metric Baselining Imperative for Requirements Processes (RC, MD), p. 292.
- RE-2003-PaimC #named #requirements
- DWARF: AN Approach for Requirements Definition and Management of Data Warehouse Systems (FRSP, JC), p. 75–?.
- RE-2003-RichardsFA #case study #multi #visualisation
- An Approach to Visualise and Reconcile Use Case Descriptions from Multiple Viewpoints (DR, ABF, OA), pp. 373–374.
- ASE-2003-HendricksonDT #architecture #comprehension
- An Approach for Tracing and Understanding Asynchronous Architectures (SAH, EMD, RNT), pp. 318–322.
- ASE-2003-Holz #delivery #incremental
- An Incremental Approach to Task-Specific Information Delivery in SE Processe (HH), pp. 295–298.
- ASE-2003-SabetzadehE #analysis #consistency #graph #nondeterminism
- Analysis of Inconsistency in Graph-Based Viewpoints: A Category-Theoretic Approach (MS, SME), pp. 12–21.
- ASE-2003-SkeneE #analysis #architecture #modelling #non-functional
- A Model-Driven Approach to Non-Functional Analysis of Software Architectures (JS, WE), pp. 236–239.
- ESEC-FSE-2003-BalsamoM #modelling #performance
- A simulation-based approach to software performance modeling (SB, MM), pp. 363–366.
- ESEC-FSE-2003-CangussuDM #monitoring #process #statistics #testing #using
- Monitoring the software test process using statistical process control: a logarithmic approach (JWC, RAD, APM), pp. 158–167.
- ICSE-2003-ConstantineL #agile #re-engineering #usability #user interface
- Usage-Centered Software Engineering: An Agile Approach to Integrating Users, User Interfaces, and Usability into Software Engineering Practice (LLC, LADL), pp. 746–747.
- SAC-2003-HuaJVT #algebra #analysis #data mining #mining #named #performance #using
- ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques (KAH, NJ, RV, DAT), pp. 490–496.
- SAC-2003-LiLR #hybrid #problem
- A Hybrid AI Approach for Nurse Rostering Problem (HL, AL, BR), pp. 730–735.
- SAC-2003-MenezesT #scalability
- A New Approach to Scalable Linda-systems Based on Swarms (RM, RT), pp. 375–379.
- SAC-2003-NgZT #interactive
- Integrative Approach for Computationally Inferring Protein Domain Interactions (SKN, ZZ, SHT), pp. 115–121.
- SAC-2003-PenaCA #protocol #top-down
- A Top Down Approach for MAS Protocol Descriptions (JP, RC, JLA), pp. 45–49.
- SAC-2003-QianZ #clustering #hybrid
- A Customizable Hybrid Approach to Data Clustering (YQ, KZ), pp. 485–489.
- SAC-2003-RumetshoferW #adaptation #aspect-oriented #learning
- An Approach for Adaptable Learning Systems with Respect to Psychological Aspects (HR, WW), pp. 558–563.
- SAC-2003-VulloF #predict #recursion
- A Recursive Connectionist Approach for Predicting Disulfide Connectivity in Proteins (AV, PF), pp. 67–71.
- SAC-2003-WangBD #classification
- A Density Based Approach to Classification (HW, DAB, ID), pp. 470–474.
- SAC-2003-YangZ #data access #data flow #object-oriented
- An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model (CY, CNZ), pp. 302–306.
- GPCE-2003-CechtickyCPS #framework
- A Genertative Approach to Framework Instantiation (VC, PC, AP, WS), pp. 267–286.
- GPCE-2003-ConselHRSYP #domain-specific language #named #specification #streaming
- Spidle: A DSL Approach to Specifying Streaming Applications (CC, HH, LR, LS, HY, CP), pp. 1–17.
- GPCE-2003-GrayBNSGN #aspect-oriented #domain model #modelling
- An Approach for Supporting Aspect-Oriented Domain Modeling (JG, TB, SN, DCS, ASG, BN), pp. 151–168.
- DAC-2003-RongP #markov #mobile #network
- Extending the lifetime of a network of battery-powered mobile devices by remote processing: a markovian decision-based approach (PR, MP), pp. 906–911.
- DAC-2003-StittLV #clustering #hardware
- Dynamic hardware/software partitioning: a first approach (GS, RLL, FV), pp. 250–255.
- DAC-2003-ZhuYC #adaptation #algebra #analysis #multi #network #using
- Power network analysis using an adaptive algebraic multigrid approach (ZZ, BY, CKC), pp. 105–108.
- DATE-2003-BernardiRRV #embedded #programmable
- A P1500-Compatible Programmable BIST Approach for the Test of Embedded Flash Memories (PB, MR, MSR, MV), pp. 10720–10725.
- DATE-2003-BlodgetML #configuration management #embedded #lightweight
- A Lightweight Approach for Embedded Reconfiguration of FPGAs (BB, SM, PL), pp. 10399–10401.
- DATE-2003-CorsiMM #classification #pseudo #random testing #testing
- An Approach to the Classification of Mixed-Signal Circuits in a Pseudorandom Testing Scheme (FC, CM, GM), pp. 11178–11179.
- DATE-2003-GouraryRUZGM #approximate
- Approximation Approach for Timing Jitter Characterization in Circuit Simulators (MMG, SGR, SLU, MMZ, KKG, BJM), pp. 10156–10161.
- DATE-2003-HettiaratchiC #clustering #energy #layout #performance
- Mesh Partitioning Approach to Energy Efficient Data Layout (SH, PYKC), pp. 11076–11081.
- DATE-2003-IyengarCSC #optimisation #testing #using
- A Unified Approach for SOC Testing Using Test Data Compression and TAM Optimization (VI, AC, SS, KC), pp. 11188–11190.
- DATE-2003-LiuC #fault #identification
- A Partition-Based Approach for Identifying Failing Scan Cells in Scan-BIST with Applications to System-on-Chip Fault Diagnosis (CL, KC), pp. 10230–10237.
- DATE-2003-LomenaLWK #explosion #performance #scheduling
- An Efficient Hash Table Based Approach to Avoid State Space Explosion in History Driven Quasi-Static Scheduling (AGL, MLLV, YW, AK), pp. 10428–10435.
- DATE-2003-MemikKCK #behaviour
- An Integrated Approach for Improving Cache Behavior (GM, MTK, ANC, IK), pp. 10796–10801.
- DATE-2003-NicolescuV #detection #fault #tool support
- Detecting Soft Errors by a Purely Software Approach: Method, Tools and Experimental Results (BN, RV), pp. 20057–20063.
- DATE-2003-OgawaNCSWNST #architecture #optimisation #transaction
- A Practical Approach for Bus Architecture Optimization at Transaction Level (OO, SBdN, PC, KS, YW, HN, TS, YT), pp. 20176–20181.
- DATE-2003-PomeranzR #generative #testing
- A New Approach to Test Generation and Test Compaction for Scan Circuits (IP, SMR), pp. 11000–11005.
- DATE-2003-TanRJ #architecture #embedded #energy
- Software Architectural Transformations: A New Approach to Low Energy Embedded Software (TKT, AR, NKJ), pp. 11046–11051.
- HPCA-2003-ChristodoulopoulouAB #clustering #fault tolerance #memory management #replication
- Dynamic Data Replication: An Approach to Providing Fault-Tolerant Shared Memory Clusters (RC, RA, AB), pp. 203–214.
- HPCA-2003-YiLH #simulation #statistics
- A Statistically Rigorous Approach for Improving Simulation Methodology (JJY, DJL, DMH), pp. 281–291.
- HPDC-2003-ThainL #grid
- The Ethernet Approach to Grid Computing (DT, ML), pp. 138–151.
- LCTES-2003-CaspiCMSTN #distributed #embedded
- From simulink to SCADE/lustre to TTA: a layered approach for distributed embedded applications (PC, AC, AM, CS, ST, PN), pp. 153–162.
- PDP-2003-HeLJ #case study #queue
- A Case Study of a System Level Approach to Exploration of Queuing Management Schemes for Input Queue Packet Switches (CH, ML, MFJ), pp. 401–408.
- SOSP-2003-SekarVBBD #execution
- Model-carrying code: a practical approach for safe execution of untrusted applications (RS, VNV, SB, SB, DCD), pp. 15–28.
- FASE-2003-Kubica #pointer #specification #verification
- A Temporal Approach to Specification and Verification of Pointer Data-Structures (MK), pp. 231–245.
- FASE-2003-Morasca #metric
- Foundations of a Weak Measurement-Theoretic Approach to Software Measurement (SM), pp. 200–215.
- FASE-2003-ReichmannKM #design #embedded #modelling #object-oriented
- An Overall System Design Approach Doing Object-Oriented Modeling to Code-Generation for Embedded Electronic Systems (CR, MK, KDMG), pp. 52–66.
- STOC-2003-DemetrescuI
- A new approach to dynamic all pairs shortest paths (CD, GFI), pp. 159–166.
- CAV-2003-LahiriBC #abstraction
- A Symbolic Approach to Predicate Abstraction (SKL, REB, BC), pp. 141–153.
- FATES-2003-BadriBN #case study #collaboration #diagrams #formal method #process #testing #towards #uml
- A Use Case Driven Testing Process: Towards a Formal Approach Based on UML Collaboration Diagrams (MB, LB, MN), pp. 223–235.
- ICLP-2003-BackofenW #constraints #modelling #predict
- A Constraint-Based Approach to Structure Prediction for Simplified Protein Models That Outperforms Other Existing Methods (RB, SW), pp. 49–71.
- SAT-2003-Parisi #on the #probability #problem #random #satisfiability
- On the Probabilistic Approach to the Random Satisfiability Problem (GP), pp. 203–213.
- TestCom-2003-HallalBUP #testing
- An Automata-Based Approach to Property Testing in Event Traces (HH, SB, AU, AP), pp. 180–196.
- CBSE-2002-AguirreM #component #logic #reasoning #specification
- A Temporal Logic Approach to Component–Based System Specification and Reasoning (NA, TM), p. 11.
- CBSE-2002-InverardiT #architecture #assembly #automation #component #off the shelf
- Correct and automatic assembly of COTS components: an architectural approach (PI, MT), p. 3.
- DocEng-2002-AllierE #image #using
- Degraded character image restoration using active contours: a first approach (BA, HE), pp. 142–148.
- HT-2002-EmmetC #design #hypermedia #persuasion #visual notation
- Graphical notations, narratives and persuasion: a Pliant Systems approach to Hypertext Tool Design (LE, GC), pp. 55–64.
- JCDL-2002-CuiHZ #automation #classification #information retrieval
- An approach to automatic classification of text for information retrieval (HC, PBH, HZ), pp. 96–97.
- JCDL-2002-HarperCY #documentation #modelling #profiling
- A language modelling approach to relevance profiling for document browsing (DJH, SC, SY), pp. 76–83.
- JCDL-2002-WeatherleySKWH #education #overview
- Partnership reviewing: a cooperative approach for peer review of complex educational resources (JW, TS, MK, MJW, MH), pp. 106–114.
- SIGMOD-2002-DattaDTVSR #implementation #web
- Proxy-based acceleration of dynamically generated content on the world wide web: an approach and implementation (AD, KD, HMT, DEV, S, KR), pp. 97–108.
- SIGMOD-2002-Team
- Mid-tier caching: the TimesTen approach (TTT), pp. 588–593.
- VLDB-2002-LakshmananNWZJ #summary
- The Generalized MDL Approach for Summarization (LVSL, RTN, CXW, XZ, TJ), pp. 766–777.
- CSEET-2002-FullerCD #case study #education #risk management
- A New Approach to Teaching Software Risk Management with Case Studies (AF, PRC, LD), p. 215–?.
- ITiCSE-2002-Hamer02a #design pattern #education
- A musical approach to teaching design patterns (JH), p. 197.
- ITiCSE-2002-Lee #education
- The emporium approach to computer science education (JANL), pp. 203–207.
- CSMR-2002-Favre
- A New Approach to Software Exploration: Back-Packing with GSEE (JMF), p. 251–?.
- CSMR-2002-Raghavan #mobile #re-engineering
- A Practical Reengineering Approach for Mobile Terminal Software (GR), p. 193–?.
- ICSM-2002-BochicchioL #effectiveness
- An Effective Approach to Reduce the “Avalanche Effect” in the Management of Fiscal Data in Local Public Administration (MAB, AL), pp. 560–567.
- ICSM-2002-BouktifSK #modelling #predict #quality
- Combining Software Quality Predictive Models: An Evolutionary Approach (SB, HAS, BK), pp. 385–392.
- ICSM-2002-ChenZBZY #analysis #dependence #novel
- A Novel Approach to Measuring Class Cohesion Based on Dependence Analysis (ZC, YZ, BX, JZ, HY), pp. 377–384.
- ICSM-2002-LinH #reduction #testing
- A Table Reduction Approach for Software Structure Testing (JCL, LHH), pp. 414–421.
- ICSM-2002-LuccaPG #maintenance
- An Approach to Classify Software Maintenance Requests (GADL, MDP, SG), pp. 93–102.
- ICSM-2002-WaqarKV #formal method #maintenance
- A Formal Approach for Software Maintenance (UW, FK, DV), pp. 608–617.
- ICSM-2002-ZouK #migration #object-oriented #platform
- Migration to Object Oriented Platforms: A State Transformation Approach (YZ, KK), pp. 530–539.
- IWPC-2002-LuccaFPTC #clustering #web
- Comprehending Web Applications by a Clustering Based Approach (GADL, ARF, FP, PT, UdC), pp. 261–270.
- IWPC-2002-TuG #architecture #evolution
- An Integrated Approach for Studying Architectural Evolution (QT, MWG), pp. 127–136.
- WCRE-2002-DaoudiOHDHFW #named #scalability #slicing
- ConSUS: A Scalable Approach to Conditioned Slicing (MD, LO, JH, SD, MH, CF, MPW), pp. 109–118.
- WCRE-2002-PowerM #xml
- Program Annotation in XML: A Parse-Tree Based Approach (JFP, BAM), p. 190–?.
- ICALP-2002-MeseguerR #algebra #specification
- A Total Approach to Partial Algebraic Specification (JM, GR), pp. 572–584.
- FME-2002-BarnerBGSW #algorithm #design
- An Algorithmic Approach to Design Exploration (SB, SBD, AG, BS, YW), pp. 146–162.
- IFM-2002-NepomniaschySBK #design #distributed #named #specification #verification
- Basic-REAL: Integrated Approach for Design, Specification and Verification of Distributed Systems (VAN, NVS, EVB, VEK), pp. 69–88.
- AFP-2002-ChakravartyK02 #array #haskell #performance
- An Approach to Fast Arrays in Haskell (MMTC, GK), pp. 27–58.
- CAiSE-2002-BrasethvikG #concept #documentation #modelling #retrieval #semantics
- A Conceptual Modeling Approach to Semantic Document Retrieval (TB, JAG), pp. 167–182.
- CAiSE-2002-CaiY #performance #requirements #using
- Addressing Performance Requirements Using a Goal and Scenario-Oriented Approach (ZC, ESKY), pp. 706–710.
- CAiSE-2002-IvanDP #complexity #design #middleware #protocol #using
- Managing Complexity of Designing Routing Protocols Using a Middleware Approach (CI, VD, KP), pp. 737–741.
- CAiSE-2002-LiuY #design #social
- Designing Web-Based Systems in Social Context: A Goal and Scenario Based Approach (LL, ESKY), pp. 37–51.
- CAiSE-2002-McBrienP #architecture #database #evolution #semistructured data
- Schema Evolution in Heterogeneous Database Architectures, A Schema Transformation Approach (PM, AP), pp. 484–499.
- CAiSE-2002-MohanCS #development #process #state machine
- A State Machine Based Approach for a Process Driven Development of Web-Applications (RM, MAC, JS), pp. 52–66.
- CAiSE-2002-NorrieP #composition #modelling
- A Modelling Approach to the Realisation of Modular Information Spaces (MCN, AP), pp. 245–261.
- CAiSE-2002-PontieriUZ #data flow #integration
- An Approach for Synergically Carrying out Intensional and Extensional Integration of Data Sources Having Different Formats (LP, DU, EZ), pp. 752–756.
- CAiSE-2002-SugumaranT #case study #information management #lifecycle
- Life Cycle Based Approach for Knowledge Management: A Knowledge Organization Case Study (VS, MT), pp. 766–769.
- EDOC-2002-MosM #architecture #component #modelling #performance #using
- Performance Management in Component-Oriented Systems Using a Model Driven ArchitectureTM Approach (AM, JM), pp. 227–237.
- ICEIS-2002-Al-TahatISY #development #framework #multi #using #web
- Using Hot-Spot-Driven Approach in the Development of a Framework for Multimedia Presentation on the Web (KSAT, SBI, TMTS, MY), pp. 855–860.
- ICEIS-2002-AlarconGYG #data flow #integration #semistructured data
- Data Sources Server: An Approach to Heterogeneous Data Integration (PPA, JG, AY, CG), pp. 3–10.
- ICEIS-2002-AnwarH
- An Integrated Approach for Finding enRoute Best Alternate Route (MAA, SH), pp. 226–234.
- ICEIS-2002-BurbridgeMS #enterprise #integration
- The “Shared Data Approach” to the Integration of Dynamic Business Enterprises (TB, JM, BS), pp. 1023–1028.
- ICEIS-2002-Chandramouli #design #user interface
- SRIUI Model: A Design Centric Approach to User Interfaces for Shopping Carts with Emphasis on Intelligence (CC), pp. 1099–1102.
- ICEIS-2002-CortesCD #automation #web
- An Automated Approach to Quality-Aware Web Applications (ARC, RC, AD), pp. 995–1000.
- ICEIS-2002-HillbrandK #metamodelling #network #using
- Using Artificial Neural Networks to Prove Hypothetic Cause-And-Effect Relations: A Metamodel-Based Approach to Support Strategic Decisions (CH, DK), pp. 367–373.
- ICEIS-2002-OliveiraFL #framework #named
- Frameworks — A High Level Instantiation Approach (TCdO, IMF, CJPdL), pp. 650–657.
- ICEIS-2002-OuziriV #documentation #logic #modelling #probability
- Logic and Probabilistic Based Approach for Document Data Modeling (MO, CV), pp. 1126–1129.
- ICEIS-2002-RoqueA
- The Context Engineering Approach (LR, AA), pp. 676–682.
- ICEIS-2002-SalemEKH #clustering #database
- A Density-Based Approach for Clustering Spatial Database (ABMS, TE, MFK, AEH), pp. 418–423.
- ICEIS-2002-TanL #query
- A Hierarchical Approach to Complex Data Cube Queries (RBNT, GL), pp. 187–194.
- CIKM-2002-AljlaylF #effectiveness #on the #retrieval
- On arabic search: improving the retrieval effectiveness via a light stemming approach (MA, OF), pp. 340–347.
- CIKM-2002-MandreoliMT
- A syntactic approach for searching similarities within sentences (FM, RM, PT), pp. 635–637.
- CIKM-2002-RajaramanT #concept #graph #information management
- Knowledge discovery from texts: a concept frame graph approach (KR, AHT), pp. 669–671.
- CIKM-2002-StehlingNF #classification #image #performance #retrieval
- A compact and efficient image retrieval approach based on border/interior pixel classification (ROS, MAN, AXF), pp. 102–109.
- CIKM-2002-YuS #information management
- An agent-based approach to knowledge management (BY, MPS), pp. 642–644.
- ICML-2002-ChenWZ #statistics
- A New Statistical Approach to Personal Name Extraction (ZC, LW, FZ), pp. 67–74.
- ICML-2002-KamvarKM #algorithm #clustering #modelling #using
- Interpreting and Extending Classical Agglomerative Clustering Algorithms using a Model-Based approach (SDK, DK, CDM), pp. 283–290.
- ICML-2002-TeowLNY #fault #feature model
- Refining the Wrapper Approach — Smoothed Error Estimates for Feature Selection (LNT, HL, HTN, EY), pp. 626–633.
- ICPR-v1-2002-AiYX #detection
- A Subspace Approach to Face Detection with Support Vector Machines (HA, LY, GX), pp. 45–48.
- ICPR-v1-2002-Auclair-FortierPZA #algebra
- A Computational Algebraic Topology Approach for Optical Flow (MFAF, PP, DZ, MA), pp. 352–355.
- ICPR-v1-2002-Bayro-CorrochanoA #detection #geometry
- Geometric Approach for Pose Detection of Moving Human Heads (EBC, AA), pp. 636–639.
- ICPR-v1-2002-FrimanBLTK #network
- Recognizing Emphysema- A Neural Network Approach (OF, MB, ML, UT, HK), pp. 512–515.
- ICPR-v1-2002-HarnsomburanaS #database #feedback #hybrid #image #performance #retrieval
- A Hybrid Tree Approach for Efficient Image Database Retrieval with Dynamic Feedback (JH, CRS), pp. 263–266.
- ICPR-v1-2002-HungTL #3d #segmentation #video
- A Bayesian Approach to Video Object Segmentation via Merging 3D Watershed Volumes (YPH, YPT, CCL), pp. 496–499.
- ICPR-v1-2002-KimMK #detection
- Wavelet-Based Morphological Approach for Detection of Human Face Region (JBK, CHM, HJK), pp. 417–420.
- ICPR-v1-2002-LiH #recognition
- Recognition of Human Periodic Motion — A Frequency Domain Approach (BL, HH), pp. 311–314.
- ICPR-v1-2002-LioliosKFK #recognition
- A New Shape Transformation Approach to Handwritten Character Recognition (NL, EK, NF, GKK), pp. 584–587.
- ICPR-v1-2002-LuoE #detection
- A Physics-Motivated Approach to Detecting Sky in Photographs (JL, SPE), pp. 155–158.
- ICPR-v1-2002-RibeiroSH
- An Evidence Combining Approach to Shape-from-Shading (ER, FS, ERH), pp. 624–627.
- ICPR-v1-2002-SongCLC #image #recognition #using
- A New Approach for Line Recognition in Large-size Images Using Hough Transform (JS, MC, MRL, SC), pp. 33–36.
- ICPR-v1-2002-VelekLJN #generative #image #online #performance #recognition
- An Improved Approach to Generating Realistic Kanji Character Images from On-Line Characters and its Benefit to Off-Line Recognition Performance (OV, CLL, SJ, MN), p. 588–?.
- ICPR-v1-2002-ZhaoN #3d #recognition
- 3D Tracking of Human Locomotion: A Tracking as Recognition Approach (TZ, RN), pp. 546–551.
- ICPR-v2-2002-ChenCH #programming #recognition
- A Dynamic Programming Approach for Appearance-Based Recognition of Environments (CSC, JHC, WTH), pp. 893–896.
- ICPR-v2-2002-ChengWHT #equation #self
- A New Approach to Solving Kruppa Equations for Camera Self-Calibration (LC, FW, ZH, HTT), pp. 308–311.
- ICPR-v2-2002-GargSCC #representation #video
- An Appearance Based Approach for Video Object Extraction and Representation (GG, PKS, SC, RC), pp. 536–539.
- ICPR-v2-2002-KimLLKK #detection #multi #video
- Integrated Approach of Multiple Face Detection for Video Surveillance (TKK, SUL, JHL, SCK, SRK), pp. 394–397.
- ICPR-v2-2002-LacombeKAB
- A Variational Approach to One Dimensional Phase Unwrapping (CL, PK, GA, LBF), p. 810–?.
- ICPR-v2-2002-NadimiB #detection #using
- Moving Shadow Detection Using a Physics-Based Approach (SN, BB), pp. 701–704.
- ICPR-v2-2002-NaphadeBSLT #modelling #retrieval #statistics #video
- A Statistical Modeling Approach to Content Based Video Retrieval (MRN, SB, JRS, CYL, BLT), pp. 953–956.
- ICPR-v2-2002-RyazanovV #automation #classification #scalability
- Discrete Approach for Automatic Knowledge Extraction from Precedent Large-Scale Data, and Classification (VVR, VAV), pp. 188–191.
- ICPR-v2-2002-SeokL #algorithm #analysis #difference #learning #probability
- The Analysis of a Stochastic Differential Approach for Langevine Comepetitive Learning Algorithm (JS, JWL), pp. 80–83.
- ICPR-v2-2002-TamakiYO #image
- Unified Approach to Image Distortion (TT, TY, NO), pp. 584–587.
- ICPR-v2-2002-TohM #learning #network
- A Global Transformation Approach to RBF Neural Network Learning (KAT, KZM), pp. 96–99.
- ICPR-v2-2002-WangWH #novel
- A Novel Approach for Single View Based Plane Metrology (GW, YW, ZH), pp. 556–559.
- ICPR-v2-2002-WildenauerMB
- A Gradient-Based Eigenspace Approach to Dealing with Occlusions and Non-Gaussian Noise (HW, TM, HB), pp. 977–980.
- ICPR-v3-2002-Al-MaadeedHE #markov #recognition #using #word
- Recognition of Off-Line Handwritten Arabic Words Using Hidden Markov Model Approach (SAM, CH, DE), pp. 481–484.
- ICPR-v3-2002-BernierPLS #interactive #modelling
- Interaction-Centric Modelling for Interactive Virtual Worlds: The APIA Approach (FB, DP, DL, MS), pp. 1007–1010.
- ICPR-v3-2002-ChenKK #using
- Albedo Recovery Using a Photometric Stereo Approach (CYC, RK, RK), pp. 700–703.
- ICPR-v3-2002-FataichaCNS #analysis #documentation #image
- Content Analysis in Document Images: A Scale Space Approach (YF, MC, JYN, CYS), pp. 335–338.
- ICPR-v3-2002-GuestF #analysis #clustering #image
- A Clustering Approach to Corner Point Analysis in Hand Drawn Images (RMG, MCF), pp. 940–943.
- ICPR-v3-2002-LuoWH02a #graph #learning
- Graph Spectral Approach for Learning View Structure (BL, RCW, ERH), pp. 785–788.
- ICPR-v3-2002-PaulinoA #estimation
- Pose Estimation for Central Catadioptric Systems: An Analytical Approach (AP, HA), pp. 696–699.
- ICPR-v3-2002-QianCZ #estimation #independence #multi
- A Bayesian Approach to Simultaneous Motion Estimation of Multiple Independently Moving Objects (GQ, RC, QZ), p. 309–?.
- ICPR-v3-2002-Robles-KellyH
- A Graph-Spectral Approach to Surface Segmentatio (ARK, ERH), pp. 509–508.
- ICPR-v3-2002-ShashuaLA #recognition
- Manifold Pursuit: A New Approach to Appearance Based Recognition (AS, AL, SA), pp. 590–594.
- ICPR-v3-2002-TubicHL #image #integration #interactive #modelling #towards
- A Volumetric Approach for the Registration and Integration of Range Images: Towards Interactive Modeling Systems (DT, PH, DL), p. 283–?.
- ICPR-v3-2002-WadaKS #generative #using
- An Evolutionary Approach for the Generation of Diversiform Characters Using a Handwriting Model (YW, HK, KS), pp. 131–134.
- ICPR-v3-2002-ZhangHHYW #embedded #recognition #robust
- A Robust Approach for Recognition of Text Embedded in Natural Scenes (JZ, XC, AH, JY, AW), pp. 204–207.
- ICPR-v4-2002-CollingsKN #image #polynomial
- A Piecewise Quadratic Approach to Single Image Shape from Shading (SC, RK, LN), p. 126–?.
- ICPR-v4-2002-MathisB #classification #using
- Classification Using a Hierarchical Bayesian Approach (CM, TMB), p. 103–?.
- ICPR-v4-2002-MollinedaVC #approximate #string
- A Windowed Weighted Approach for Approximate Cyclic String Matching (RAM, EV, FC), pp. 188–191.
- ICPR-v4-2002-Robles-KellyH02a
- A Graph-Spectral Approach to Correspondence Matching (ARK, ERH), pp. 176–179.
- ICPR-v4-2002-SerranoSL #classification #performance
- A Computationally Efficient Approach to Indoor/Outdoor Scene Classification (NS, AES, JL), p. 146–?.
- KDD-2002-El-RamlySS #behaviour #mining #runtime
- From run-time behavior to usage scenarios: an interaction-pattern mining approach (MER, ES, PGS), pp. 315–324.
- KDD-2002-Frigui #clustering #identification #named #performance #scalability #set
- SyMP: an efficient clustering approach to identify clusters of arbitrary shapes in large data sets (HF), pp. 507–512.
- KDD-2002-WuFS #classification #data mining #mining #named
- B-EM: a classifier incorporating bootstrap with EM approach for data mining (XW, JF, KRS), pp. 670–675.
- KDD-2002-WuPLL #categorisation #refinement
- A refinement approach to handling model misfit in text categorization (HW, THP, BL, XL), pp. 207–216.
- KR-2002-CalmesDHPS #flexibility #fuzzy #query
- A Fuzzy Approach to Flexible Case-based Querying: Methodology and Experimentation (MdC, DD, EH, HP, FS), pp. 449–458.
- KR-2002-Darwiche #logic #network
- A Logical Approach to Factoring Belief Networks (AD), pp. 409–420.
- KR-2002-EiterFST #knowledge-based
- A Generic Approach for Knowledge-Based Information-Site Selection (TE, MF, GS, HT), pp. 459–469.
- KR-2002-EiterL #complexity
- Complexity Results for Explanations in the Structural-Model Approach (TE, TL), pp. 49–60.
- KR-2002-Kern-Isberner #reasoning
- A Structural Approach to Default Reasoning (GKI), pp. 147–157.
- LSO-2002-HofmannW #community #learning
- Building Communities among Software Engineers: The ViSEK Approach to Intra- and Inter-Organizational Learning (BH, VW), pp. 25–33.
- SEKE-2002-AbateB #architecture #component #design #scalability
- A scalable approach to the design of SW architectures with dynamically create/destroyed components (PA, MB), pp. 255–262.
- SEKE-2002-BalustF #modelling #process
- A precedence-based approach for proactive control in software process modelling (JMRB, XF), pp. 457–468.
- SEKE-2002-CanforaC #visual notation #xml
- A visual approach to define XML to FO transformations (GC, LC), pp. 563–570.
- SEKE-2002-CavalcantiV #automation #maintenance #synthesis #web
- A logic-based approach for automatic synthesis and maintenance of web sites (JMBC, WWV), pp. 619–626.
- SEKE-2002-ChungC #knowledge-based #requirements
- A knowledge-based COTS-aware requirements engineering approach (LC, KMLC), pp. 175–182.
- SEKE-2002-CostagliolaMFP #3d #authoring #web
- An approach for authoring 3D cultural heritage exhibitions on the web (GC, SDM, FF, FP), pp. 601–608.
- SEKE-2002-FalboGD #domain model #ontology
- An ontological approach to domain engineering (RdAF, GG, KCD), pp. 351–358.
- SEKE-2002-GergicKDSPAP #deployment #lightweight #web #web service
- An Approach to lightweight deployment of web services (JG, JK, YD, JS, GP, AA, LP), pp. 635–640.
- SEKE-2002-GrutznerAP #information management #learning
- A systematic approach to produce small courseware modules for combined learning and knowledge management environements (IG, NA, DP), pp. 533–539.
- SEKE-2002-NakkrasaeS #classification #component #formal method #specification
- A formal approach for specification and classification of software components (SN, PS), pp. 773–780.
- SEKE-2002-WangCH #design #knowledge-based
- Design of knowledge-based systems with the ontology-domain-system approach (XW, CWC, HJH), pp. 233–236.
- SIGIR-2002-FengZP #database #music #query #scalability
- A hierarchical approach: query large music database by acoustic input (YF, YZ, YP), pp. 441–442.
- SIGIR-2002-Hiemstra #information retrieval #modelling #query
- Term-specific smoothing for the language modeling approach to information retrieval: the importance of a query term (DH), pp. 35–41.
- SIGIR-2002-JohoSB
- Hierarchical approach to term suggestion device (HJ, MS, MB), p. 454.
- SIGIR-2002-Larson #distributed #information retrieval
- A logistic regression approach to distributed IR (RRL), pp. 399–400.
- SIGIR-2002-PossasZMR #information retrieval
- Set-based model: a new approach for information retrieval (BP, NZ, WMJ, BARN), pp. 230–237.
- SPLC-2002-Wijnstra #platform #product line
- Critical Factors for a Successful Platform-Based Product Family Approach (JGW), pp. 68–89.
- UML-2002-AkehurstK #metamodelling #relational
- A Relational Approach to Defining Transformations in a Metamodel (DHA, SK), pp. 243–258.
- UML-2002-BasanieriBM #testing #uml
- The Cow_Suite Approach to Planning and Deriving Test Suites in UML Projects (FB, AB, EM), pp. 383–397.
- ECOOP-2002-BryceRP #named #programming
- Lana: An Approach to Programming Autonomous Systems (CB, CR, MP), pp. 281–308.
- ECOOP-2002-CheonL #ml #testing
- A Simple and Practical Approach to Unit Testing: The JML and JUnit Way (YC, GTL), pp. 231–255.
- OOPSLA-2002-KillijianRF #corba
- Portable serialization of CORBA objects: a reflective approach (MOK, JCRG, JCF), pp. 68–82.
- AdaEurope-2002-CzarneckiHRVR #ada #analysis #data flow #named
- DataFAN: A Practical Approach to Data Flow Analysis for Ada 95 (KC, MH, ER, FV, AR), pp. 231–244.
- LOPSTR-2002-FernandezS #calculus
- An Operational Approach to Program Extraction in the Calculus of Constructions (MF, PS), pp. 111–125.
- PADL-2002-Karczmarczuk #functional #generative
- Functional Approach to Texture Generation (JK), pp. 225–242.
- PLDI-2002-SoHD #compilation #design #hardware #performance
- A Compiler Approach to Fast Hardware Design Space Exploration in FPGA-based Systems (BS, MWH, PCD), pp. 165–176.
- SAS-2002-Esparza #algebra #concurrent #static analysis
- An Algebraic Approach to the Static Analysis of Concurrent Software (JE), p. 3.
- RE-2002-FranchC
- A Quality-Model-Based Approach for Describing and Evaluating Software Packages (XF, JPC), pp. 104–111.
- RE-2002-FritzhannsK #assessment
- Product Management Assessment — A New Approach to Optimize the Early Phases (TF, FK), pp. 124–126.
- RE-2002-Schmid #product line
- The Product Line Mapping Approach to Defining and Structuring Product Portfolios (KS), pp. 219–226.
- RE-2002-WooR #automation #lightweight #relational #reuse #specification #using
- Reuse of Scenario Specifications Using an Automated Relational Learner: A Lightweight Approach (HGW, WNR), pp. 173–180.
- ASE-2002-AguirreM #component #configuration management #logic #specification
- A Temporal Logic Approach to the Specification of Reconfigurable Component-Based Systems (NA, TSEM), pp. 271–274.
- ASE-2002-MartinezESP #prototype #requirements #user interface
- From Early Requirements to User Interface Prototyping: A Methodological Approach (AM, HE, JS, OP), pp. 257–260.
- ASE-2002-VasconcelosSE #agile #multi #prototype #scalability
- An Approach to Rapid Prototyping of Large Multi-Agent Systems (WWV, CS, ME), pp. 13–22.
- FSE-2002-CapraEM #mobile
- A micro-economic approach to conflict resolution in mobile computing (LC, WE, CM), pp. 31–40.
- ICSE-2002-Butler #attribute grammar #security
- Security attribute evaluation method: a cost-benefit approach (SAB), pp. 232–240.
- ICSE-2002-HausmannHT #case study #detection #functional #graph transformation #requirements #static analysis
- Detection of conflicting functional requirements in a use case-driven approach: a static analysis technique based on graph transformation (JHH, RH, GT), pp. 105–115.
- ICSE-2002-MaysL #realtime #reliability #robust
- The cyclefree methodology: a simple approach to building reliable, robust, real-time systems (DM, RJL), pp. 567–575.
- ICSE-2002-MockusH #identification
- Expertise browser: a quantitative approach to identifying expertise (AM, JDH), pp. 503–512.
- ICSE-2002-MurugesanD #challenge #development #web
- Meeting the challenges of web application development: the web engineering approach (SM, YD), pp. 687–688.
- ICSE-2002-SchapachnikBO #architecture #automaton #development #distributed #model checking
- An architecture-centric approach to the development of a distributed model-checker for timed automata (FS, VAB, AO), p. 710.
- ICSE-2002-Schmid #product line #validation
- A comprehensive product line scoping approach and its validation (KS), pp. 593–603.
- ICSE-2002-Silva #requirements #specification
- Requirements, domain and specifications: a viewpoint-based approach to requirements engineering (AS), pp. 94–104.
- ICSE-2002-SmithACO #named
- PROPEL: an approach supporting property elucidation (RLS, GSA, LAC, LJO), pp. 11–21.
- ICSE-2002-TrilnikPC #aspect-oriented #development #named
- Smartweaver: an agent-based approach for aspect-oriented development (FT, JADP, MRC), p. 716.
- SAC-2002-ChadesSC #assessment #heuristic #problem
- A heuristic approach for solving decentralized-POMDP: assessment on the pursuit problem (IC, BS, FC), pp. 57–62.
- SAC-2002-DascaluH #specification
- An approach to integrating semi-formal and formal notations in software specification (SD, PH), pp. 1014–1020.
- SAC-2002-FiegeMG #composition
- A modular approach to build structured event-based systems (LF, GM, FCG), pp. 385–392.
- SAC-2002-HaddadT #reuse
- Reusable subsystems: domain-based approach (HH, HT), pp. 971–975.
- SAC-2002-HarrisonD
- A hypothesis driven approach to condition specific transcription factor binding site characterization in S.c (RH, CD), pp. 151–158.
- SAC-2002-HurleyW #network
- An agent based approach to site selection for wireless networks (SH, RMW), pp. 574–577.
- SAC-2002-PandaH #database #dependence #robust
- Extended data dependency approach: a robust way of rebuilding database (BP, KAH), pp. 446–452.
- SAC-2002-Thissen #performance
- Load balancing for the management of service performance in open service markets: a customer-oriented approach (DT), pp. 902–906.
- SAC-2002-WangW #data mining #mining #optimisation #query #relational
- Optimizing relational store for e-catalog queries: a data mining approach (MW, XSW), pp. 1147–1152.
- CC-2002-Mohnen #analysis #data flow
- A Graph-Free Approach to Data-Flow Analysis (MM), pp. 46–61.
- CC-2002-QianHV #array #bound #java
- A Comprehensive Approach to Array Bounds Check Elimination for Java (FQ, LJH, CV), pp. 325–342.
- DAC-2002-AnderssonBCH #automation #design #problem #proving
- A proof engine approach to solving combinational design automation problems (GA, PB, BC, ZH), pp. 725–730.
- DAC-2002-CesarioBGLNPYJD #component #design #manycore
- Component-based design approach for multicore SoCs (WOC, AB, LG, DL, GN, YP, SY, AAJ, MDN), pp. 789–794.
- DAC-2002-HazelhurstWKF #design #hybrid #verification
- A hybrid verification approach: getting deep into the design (SH, OW, GK, LF), pp. 111–116.
- DAC-2002-KadayifKS #integer #linear #multi #programming
- An integer linear programming based approach for parallelizing applications in On-chip multiprocessors (IK, MTK, US), pp. 703–708.
- DAC-2002-MassoudW
- Improving the generality of the fictitious magnetic charge approach to computing inductances in the presence of permeable materials (YM, JW), pp. 552–555.
- DATE-2002-DaemsGS #linear #performance
- A Fitting Approach to Generate Symbolic Expressions for Linear and Nonlinear Analog Circuit Performance Characteristics (WD, GGEG, WMCS), pp. 268–273.
- DATE-2002-FavalliD #design #generative #pseudo #random testing
- An Evolutionary Approach to the Design of On-Chip Pseudorandom Test Pattern Generators (MF, MD), p. 1122.
- DATE-2002-GoffioulWVD #analysis #architecture #using
- Analysis of Nonlinearities in RF Front-End Architectures Using a Modified Volterra Series Approach (MG, PW, GV, SD), pp. 352–356.
- DATE-2002-GorenZGGLASW #design
- An Interconnect-Aware Methodology for Analog and Mixed Signal Design, Based on High Bandwidth (Over 40 Ghz) On-Chip Transmission Line Approach (DG, MZ, TCG, RG, BL, AA, AS, IAW), pp. 804–811.
- DATE-2002-HartongHB #model checking
- An Approach to Model Checking for Nonlinear Analog Systems (WH, LH, EB), p. 1080.
- DATE-2002-Kandemir #reuse
- A Compiler-Based Approach for Improving Intra-Iteration Data Reuse (MTK), pp. 984–990.
- DATE-2002-Kania #multi #using
- Improved Technology Mapping for PAL-Based Devices Using a New Approach to Multi-Output Boolean Functions (DK), p. 1087.
- DATE-2002-LiP #analysis #modelling
- A Linear-Centric Modeling Approach to Harmonic Balance Analysis (PL, LTP), pp. 634–639.
- DATE-2002-PaulT #modelling #virtual machine
- A Layered, Codesign Virtual Machine Approach to Modeling Computer Systems (JMP, DET), pp. 522–528.
- DATE-2002-YmeriNMRSV #parametricity #performance
- Simple and Efficient Approach for Shunt Admittance Parameters Calculations of VLSI On-Chip Interconnects on Semiconducting Substrate (HY, BN, KM, DDR, MS, SV), p. 1113.
- HPCA-2002-GurumurthiSIVKLJ #estimation #simulation #using
- Using Complete Machine Simulation for Software Power Estimation: The SoftWatt Approach (SG, AS, MJI, NV, MTK, TL, LKJ), pp. 141–150.
- HPDC-2002-IamnitchiFN #grid #peer-to-peer
- A Peer-to-Peer Approach to Resource Location in Grid Environments (AI, ITF, DN), p. 419.
- LCTES-SCOPES-2002-WakabayashiT #adaptation #debugging #evaluation #interface #specification #standard
- Standardization approach of ITRON debugging interface specification and evaluation of its adaptability (TW, HT), pp. 65–74.
- OSDI-2002-MusuvathiPCED #model checking #named
- CMC: A Pragmatic Approach to Model Checking Real Code (MM, DYWP, AC, DRE, DLD), pp. 75–88.
- PDP-2002-GerndtSSW #analysis #automation #distributed #performance
- Performance Analysis for Teraflop Computers: A Distributed Automatic Approach (MG, AS, MS, RW), pp. 23–30.
- WRLA-J-1996-WirsingK02 #formal method #object-oriented #re-engineering
- A formal approach to object-oriented software engineering (MW, AK), pp. 519–560.
- ESOP-2002-Martel #fault #finite #precise #semantics
- Propagation of Roundoff Errors in Finite Precision Computations: A Semantics Approach (MM), pp. 194–208.
- FASE-2002-Charpentier #composition #motivation
- An Approach to Composition Motivated by wp (MC), pp. 1–14.
- FASE-2002-ClarkEK #metamodelling #modelling #precise
- Engineering Modelling Languages: A Precise Meta-Modelling Approach (TC, AE, SK), pp. 159–173.
- FASE-2002-LopezLG #automation #case study #generative #petri net #workflow
- Automatic Generation of Use Cases from Workflows: A Petri Net Based Approach (OL, MAL, FJGP), pp. 279–293.
- STOC-2002-JainMS #problem
- A new greedy approach for facility location problems (KJ, MM, AS), pp. 731–740.
- TACAS-2002-KwiatkowskaNP #hybrid #model checking #probability
- Probabilistic Symbolic Model Checking with PRISM: A Hybrid Approach (MZK, GN, DP), pp. 52–66.
- CADE-2002-AudemardBCKS #linear #satisfiability
- A SAT Based Approach for Solving Formulas over Boolean and Linear Mathematical Propositions (GA, PB, AC, AK, RS), pp. 195–210.
- CADE-2002-SchneckN #scalability
- A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code (RRS, GCN), pp. 47–62.
- CAV-2002-Henzinger #hybrid
- The Symbolic Approach to Hybrid Systems (TAH), p. 57.
- ICLP-2002-MedinaCO #logic programming #multi
- Multi-adjoint Logic Programming: A Neural Net Approach (JM, EMC, MOA), p. 468.
- ICLP-2002-OsorioNA #debugging #logic #prolog
- Debugging in A-Prolog: A Logical Approach (MO, JANP, JA), pp. 482–483.
- ICLP-2002-RussoMNK #abduction #requirements #specification
- An Abductive Approach for Analysing Event-Based Requirements Specifications (AR, RM, BN, JK), pp. 22–37.
- LICS-2002-HamidSTMN
- A Syntactic Approach to Foundational Proof-Carrying Code (NAH, ZS, VT, SM, ZN), pp. 89–100.
- LICS-2002-LaplanteLMPR #abstraction #model checking #probability #testing
- Probabilistic Abstraction for Model Checking: An Approach Based on Property Testing (SL, RL, FM, SP, MdR), pp. 30–39.
- SAT-2002-PrestwichB #optimisation #query #satisfiability
- A SAT approach to query optimization in mediator systems (SP, SB), p. 33.
- TestCom-2002-SerdarT #finite #generative #sequence #state machine
- A New Approach To Checking Sequence Generation for Finite State Machines (BS, KCT), p. 391–?.
- WICSA-2001-DingM #architecture #evolution #incremental #named
- Focus: A Light-Weight, Incremental Approach to Software Architecture Recovery and Evolution (LD, NM), p. 191–?.
- WICSA-2001-SpitznagelG #composition
- A Compositional Approach for Constructing Connectors (BS, DG), pp. 148–157.
- DocEng-2001-PietrigaVQ #named #visual notation #xml
- VXT: a visual approach to XML transformations (EP, JYVD, VQ), pp. 1–10.
- DocEng-2001-Silberhorn #named
- TabulaMagica: an integrated approach to manage complex tables (HS), pp. 68–75.
- HT-2001-Feise #persistent #web
- An approach to persistence of Web resources (JF), pp. 215–216.
- HT-2001-WiilHN #hypermedia #multi
- Multiple open services: a new approach to service provision in open hypermedia systems (UKW, DLH, PJN), pp. 83–92.
- ICDAR-2001-BelaidCP #segmentation
- Water Reservoir Based Approach for Touching Numeral Segmentation (AB, CC, UP), pp. 892–897.
- ICDAR-2001-FreitasBS #recognition #set #validation #word
- Handwritten Isolated Word Recognition: An Approach Based on Mutual Information for Feature Set Validation (COdAF, FB, RS), pp. 665–669.
- ICDAR-2001-GaoJYH #feature model #recognition
- A New Stroke-Based Directional Feature Extraction Approach for Handwritten Chinese Character Recognition (XG, LJ, JY, JH), pp. 635–639.
- ICDAR-2001-HadjarHI #composition #using
- Newspaper Page Decomposition Using a Split and Merge Approach (KH, OH, RI), pp. 1186–1189.
- ICDAR-2001-LuTHF #distance #image #word
- An Approach to Word Image Matching Based on Weighted Hausforff Distance (YL, CLT, WH, LF), pp. 921–925.
- ICDAR-2001-NakaiASS #online #recognition
- Substroke Approach to HMM-Based On-line Kanji Handwriting Recognition (MN, NA, HS, SS), pp. 491–495.
- ICDAR-2001-SendaY #recognition
- A Maximum-Likelihood Approach to Segmentation-Based Recognition of Unconstrained Handwriting Text (SS, KY), pp. 184–188.
- ICDAR-2001-TeredesaiG #classification #optimisation
- Active Digit Classifiers: A Separability Optimization Approach to Emulate Cognition (AT, VG), pp. 401–405.
- ICDAR-2001-VincentF #quantifier
- Gray Level Use in a Handwriting Fractal Approach and Morphological Properties Quantification (NV, TF), pp. 307–311.
- ICDAR-2001-YangLL
- A Bezier Curve-Based Approach to Shape Description for Chinese Calligraphy Characters (HMY, JJL, HJL), pp. 276–280.
- ICDAR-2001-ZhaoCSW #segmentation #using
- Handwritten Chinese Character Segmentation Using a Two-Stage Approach (SZ, ZC, PS, QW), pp. 179–183.
- ICDAR-2001-ZhouSL
- A Feedback-based Approach for Segmenting Handwritten Legal Amounts on Bank Cheques (JZ, CYS, KL), pp. 887–891.
- JCDL-2001-FrasconiSV #categorisation #documentation #hybrid #multi #naive bayes
- Text categorization for multi-page documents: a hybrid naive Bayes HMM approach (PF, GS, AV), pp. 11–20.
- JCDL-2001-TomsB #library
- An approach to search for the digital library (EGT, JCB), pp. 341–342.
- VLDB-2001-MorishimaKKT #data-driven #repository #xml
- Enabling End-users to Construct Data-intensive Web-sites from XML Repositories: An Example-based Approach (AM, SK, HK, ST), pp. 703–704.
- VLDB-2001-SeegerBBKSDS #database #implementation #library #named #performance #query
- XXL — A Library Approach to Supporting Efficient Implementations of Advanced Database Queries (JVdB, BB, JPD, JK, TS, MS, BS), pp. 39–48.
- VLDB-2001-WaasCB #interactive #named #query #similarity
- FeedbackBypass: A New Approach to Interactive Similarity Query Processing (IB, PC, FW), pp. 201–210.
- CSEET-2001-DonaldsonJ01a
- Systems Failures: An Approach to Building a Coping Strategy (JD, JJ), pp. 187–190.
- CSEET-2001-Willams #re-engineering
- Professional Engineers Ontario’s Approach to Licensing Software Engineering Practitioners (NSWW), p. 77–?.
- ITiCSE-2001-MendesMC #education #flexibility #hypermedia
- The cognitive flexibility theory0: an approach for teaching Hypermedia Engineering (EM, NM, SC), pp. 21–24.
- ICSM-2001-AntoniolCLPR #maintenance #queue
- A Queue Theory-Based Approach to Staff Software Maintenance Centers (GA, GC, GADL, MDP, FR), pp. 510–519.
- ICSM-2001-KustersH #maintenance #towards
- Software Maintenance: An Approach towards Control (RJK, FJH), p. 667–?.
- ICSM-2001-LehmanRS #modelling #roadmap
- An Approach to Modelling Long-Term Growth Trends in Software Systems (MML, JFR, US), p. 219–?.
- ICSM-2001-Rashid #database #evolution #object-oriented
- A Database Evolution Approach for Object-Oriented Databases (AR), pp. 561–564.
- ICSM-2001-SartipiK #architecture #graph #pattern matching
- A Graph Pattern Matching Approach to Software Architecture Recovery (KS, KK), p. 408–?.
- SCAM-2001-Ward #analysis #source code
- The Formal Transformation Approach to Source Code Analysis and Manipulation (MPW), pp. 187–195.
- WCRE-2001-Balmas #dependence #game studies #graph
- Displaying Dependence Graphs: A Hierarchical Approach (FB), pp. 261–270.
- WCRE-2001-KullbachR #comprehension #named
- Folding: An Approach to Enable Program Understanding of Preprocessed Languages (BK, VR), pp. 3–12.
- WCRE-2001-LuccaPAC #reverse engineering
- An Approach for Reverse Engineering of Web-Based Application (GADL, MDP, GA, GC), pp. 231–240.
- ICALP-2001-HonsellMS #algebra #axiom
- An Axiomatic Approach to Metareasoning on Nominal Algebras in HOAS (FH, MM, IS), pp. 963–978.
- FME-2001-AlagarX #architecture #e-commerce #modelling
- A Rigorous Approach to Modeling and Analyzing E-Commerce Architectures (VSA, ZX), pp. 173–196.
- FME-2001-DocheVK #composition #specification #validation
- A Modular Approach to the Specification and Validation of an Electrical Flight Control System (MD, IVM, FK), pp. 590–610.
- FME-2001-SharyginaP #reliability #testing #verification
- A Combined Testing and Verification Approach for Software Reliability (NS, DP), pp. 611–628.
- FME-2001-SherifSC #realtime #specification #validation
- An Integrated Approach to Specification and Validation of Real-Time Systems (AS, AS, SC), pp. 278–299.
- ICFP-2001-Pitts #functional #programming #representation #syntax
- A Fresh Approach to Representing Syntax with Static Binders in Functional Programming (AMP), p. 1.
- GT-VMT-2001-Pfaltz #concept #empirical #graph #induction
- Transformations of Concept Graphs: An Approach to Empirical Induction (JLP), pp. 318–324.
- CAiSE-2001-AalstW #workflow
- The P2P Approach to Interorganizational Workflows (WMPvdA, MW), pp. 140–156.
- CAiSE-2001-DiazPF #requirements #user interface
- From User Requirements to User Interfaces: A Methodological Approach (JSD, OP, JJF), pp. 60–75.
- CAiSE-2001-GlinzBJRSX #modelling #object-oriented
- The ADORA Approach to Object-Oriented Modeling of Software (MG, SB, SJ, JR, NS, YX), pp. 76–92.
- CAiSE-2001-McBrienP #data flow #semantics #xml
- A Semantic Approach to Integrating XML and Structured Data Sources (PM, AP), pp. 330–345.
- EDOC-2001-Ensel #automation #dependence #modelling #scalability
- A Scalable Approach to Automated Service Dependency Modeling in Heterogeneous Environments (CE), pp. 128–139.
- EDOC-2001-JainCIR #component #formal method #identification
- Business Component Identification — A Formal Approach (HKJ, NC, NI, BR), pp. 183–187.
- ICEIS-v1-2001-BeneventanoBGV #integration
- The MOMIS Approach to Information Integration (DB, SB, FG, MV), pp. 194–198.
- ICEIS-v1-2001-GamboaF #design
- Designing Intelligent Tutoring Systems: A Bayesian Approach (HG, ALNF), pp. 452–458.
- ICEIS-v1-2001-LeeK #logic programming
- A Logic Programming Approach to Negotiation for Conflict Resolution in BDI Agents System (MJL, JSK), pp. 514–517.
- ICEIS-v2-2001-Ahmed-Nacer #evolution #process
- A Case Tool Approach for Software Process Evolution (MAN), pp. 761–765.
- ICEIS-v2-2001-BarjisC #aspect-oriented #modelling #petri net #process
- Integrating Organizational Semiotic Approach with the Temporal Aspects of Petri Nets for Business Process Modeling (JB, SC), pp. 745–752.
- ICEIS-v2-2001-EtcheverryLD #coordination #problem
- An Approach for Coordination Problem Solving (PE, PL, PD), pp. 880–883.
- ICEIS-v2-2001-HelmT
- An Approach for Totally Dynamic Forms Processing in Web-Based Applications (DJH, BWT), pp. 974–977.
- ICEIS-v2-2001-PoelsD #metric #modelling #process #re-engineering
- An Integrated Approach of Modeling, Transformation and Measurement to Evaluate Business Process Re-Engineering (GP, GD), pp. 691–698.
- ICEIS-v2-2001-SerucaL
- The Pattcar Approach to Capturing Patterns for Business Improvement (IS, PL), pp. 730–739.
- ICEIS-v2-2001-StojanovicDS01a #component #development #enterprise #specification
- An Integrated Component-Based Approach to Enterprise System Specification and Development (ZS, ANWD, HGS), pp. 667–672.
- CIKM-2001-ParkKCP #database #effectiveness #named #sequence
- Prefix-Querying: An Approach for Effective Subsequence Matching Under Time Warping in Sequence Databases (SP, SWK, JSC, SP), pp. 255–262.
- CIKM-2001-ZhaiL #feedback #information retrieval #modelling
- Model-based Feedback in the Language Modeling Approach to Information Retrieval (CZ, JDL), pp. 403–410.
- ICML-2001-DomeniconiG #approximate #classification #dataset #multi #nearest neighbour #performance #query #scalability
- An Efficient Approach for Approximating Multi-dimensional Range Queries and Nearest Neighbor Classification in Large Datasets (CD, DG), pp. 98–105.
- ICML-2001-Eliassi-RadS #information management
- A Theory-Refinement Approach to Information Extraction (TER, JWS), pp. 130–137.
- ICML-2001-JinH #information retrieval #learning #word
- Learning to Select Good Title Words: An New Approach based on Reverse Information Retrieval (RJ, AGH), pp. 242–249.
- ICML-2001-TaoBW #multi #network
- A Multi-Agent Policy-Gradient Approach to Network Routing (NT, JB, LW), pp. 553–560.
- KDD-2001-KeoghCP #database #named #scalability
- Ensemble-index: a new approach to indexing large databases (EJK, SC, MJP), pp. 117–125.
- LSO-2001-StarkloffP #development #learning
- Process-Integrated Learning: The ADVISOR Approach for Corporate Development (PS, KP), pp. 152–162.
- MLDM-2001-SyG #analysis #data mining #mining #statistics
- Data Mining Approach Based on Information-Statistical Analysis: Application to Temporal-Spatial Data (BKS, AKG), pp. 128–140.
- SEKE-2001-WangenheimLW #hybrid #memory management
- A Hybrid Approach for Corporate Memory Management Systems in Software R&D Organizations (CGvW, DL, AvW), pp. 326–330.
- SIGIR-2001-LamL #categorisation
- A Meta-Learning Approach for Text Categorization (WL, KYL), pp. 303–309.
- SIGIR-2001-NomotoM #summary
- A New Approach to Unsupervised Text Summarization (TN, YM), pp. 26–34.
- UML-2001-BriandL #testing #uml
- A UML-Based Approach to System Testing (LCB, YL), pp. 194–208.
- UML-2001-CrettazKSS
- Integrating the ConcernBASE Approach with SADL (VC, MMK, SS, AS), pp. 166–181.
- OOPSLA-2001-BinderHV #java
- Portable Resource Control in Java: The J-SEAL2 Approach (WB, JH, AV), pp. 139–155.
- TOOLS-EUROPE-2001-HornsbyN #migration #reuse
- Migrating to Reuse: The DesignMatcher Approach (PH, IN), pp. 78–84.
- TOOLS-EUROPE-2001-KleppeW #architecture #aspect-oriented #case study #integration #metamodelling #modelling #object-oriented #uml
- Integration of Static and Dynamic Core for UML: A Study in Dynamic Aspects of the pUML OO Meta Modelling Approach to the Rearchitecting of UML (AK, JW), pp. 66–77.
- TOOLS-USA-2001-Arsanjani #architecture #component #design #enterprise
- A Domain-Language Approach to Designing Dynamic Enterprise Component-Based Architectures to Support Business Services (AA), pp. 130–142.
- AdaEurope-2001-Gaudel #specification #testing
- Testing from Formal Specifications, a Generic Approach (MCG), pp. 35–48.
- GCSE-2001-ZhangJS #product line
- XVCL Approach to Separating Concerns in Product Family Assets (HZ, SJ, SMS), pp. 36–47.
- PADL-2001-IglesiasGPRM #logic programming #tool support
- Interoperability between Bioinformatics Tools: A Logic Programming Approach (JRI, GG, EP, DR, BM), pp. 153–168.
- PPDP-2001-HengleinMN #control flow #memory management
- A Direct Approach to Control-Flow Sensitive Region-Based Memory Management (FH, HM, HN), pp. 175–186.
- SAIG-2001-DanvyGR #evaluation
- A Unifying Approach to Goal-Directed Evaluation (OD, BG, MR), pp. 108–125.
- SAIG-2001-HerrmannL #optimisation
- A Transformational Approach which Combines Size Inference and Program Optimization (CAH, CL), pp. 199–218.
- RE-2001-Faulk #case study #product line #requirements #specification
- Product-Line Requirements Specification (PRS): An Approach and Case Study (SRF), pp. 48–55.
- RE-2001-GansJKLEFM #modelling #network #requirements #trust
- Requirements Modeling for Organization Networks: A (Dis-)Trust-Based Approach (GG, MJ, SK, GL, LE, CF, MM), pp. 154–165.
- RE-2001-GrossY #architecture #evolution
- Evolving System Architecture to Meet Changing Business Goals: An Agent and Goal-Oriented Approach (DG, ESKY), pp. 316–317.
- RE-2001-GrunbacherEM #architecture #requirements
- Reconciling Software Requirements and Architectures: The CBSP Approach (PG, AE, NM), pp. 202–211.
- RE-2001-Hall #requirements
- A Unified Approach to Systems and Software Requirements (AH), p. 267.
- RE-2001-ThompsonH #product line
- Extending the Product Family Approach to Support n-Dimensional and Hierarchical Product Lines (JMT, MPEH), pp. 56–65.
- RE-2001-WatahikiS
- Scenario Patterns Based on Case Grammar Approach (KW, MS), pp. 300–301.
- ASE-2001-Egyed #consistency #scalability
- Scalable Consistency Checking Between Diagrams-The ViewIntegra Approach (AE), pp. 387–390.
- ASE-2001-ZismanK #consistency #knowledge base #specification #uml
- Knowledge Base Approach to Consistency Management of UML Specification (AZ, AK), pp. 359–363.
- ESEC-FSE-2001-RamseyC #algebra
- An algebraic approach to file synchronization (NR, EC), pp. 175–185.
- ESEC-FSE-2001-Wendorff #assessment #formal method #information management #modelling
- A formal approach to the assessment and improvement of terminological models used in information systems engineering (PW), pp. 83–87.
- ICSE-2001-ClarkeW #aspect-oriented #composition #design #reuse
- Composition Patterns: An Approach to Designing Reusable Aspects (SC, RJW), pp. 5–14.
- ICSE-2001-Egyed #traceability
- A Scenario-Driven Approach to Traceability (AE), pp. 123–132.
- ICSE-2001-LorenzV #component #design
- Designing Components Versus Objects: A Transformational Approach (DHL, JMV), pp. 253–224.
- ICSE-2001-SitaramanLWHW #component #education #evaluation #formal method #re-engineering
- A Formal Approach to Component-Based Software Engineering: Education and Evaluation (MS, TJL, BWW, EJH, LW), pp. 601–609.
- ICSE-2001-StirewaltD #analysis #component #formal method #tool support
- A Component-Based Approach to Building Formal Analysis Tools (KS, LKD), pp. 167–176.
- SAC-2001-ChenO #component
- Component-centric approach in a web-based home schooling application (LC, YO), pp. 89–93.
- SAC-2001-DiazRST #integration #named #parallel
- DIP: a pattern-based approach for task and data parallelism integration (MD, BR, ES, JMT), pp. 148–150.
- SAC-2001-HuangH #clustering
- Finding a hamiltonian paths in tournaments on clusters — a provably communication-efficient approach (CHH, XH), pp. 549–553.
- SAC-2001-Jo #development
- A seamless approach to the agent development (CHJ), pp. 641–647.
- SAC-2001-KhatriR #automation #education #health #reuse
- A software reuse reference model approach in developing an automated educational system for patients health care management (AK, DCR), pp. 675–678.
- SAC-2001-OngCC #clustering #image
- A simple partitioning approach to fractal image compression (GHO, CMC, YC), pp. 301–305.
- SAC-2001-ParkKC #database #sequence
- Segment-based approach for subsequence searches in sequence databases (SP, SWK, WWC), pp. 248–252.
- SAC-2001-XiangFY #behaviour #component #fuzzy #network #prototype
- A fuzzy neural network approach to model component behavior for virtual prototyping of hydraulic system (WX, SCF, FFY), pp. 482–483.
- DAC-2001-PomeranzR #testing
- An Approach to Test Compaction for Scan Circuits that Enhances At-Speed Testing (IP, SMR), pp. 156–161.
- DAC-2001-PopEPP #design #distributed #embedded #incremental
- An Approach to Incremental Design of Distributed Embedded Systems (PP, PE, TP, ZP), pp. 450–455.
- DATE-2001-LienigJA #named
- AnalogRouter: a new approach of current-driven routing for analog circuits (JL, GJ, TA), p. 819.
- DATE-2001-NamSR #incremental #satisfiability
- A boolean satisfiability-based incremental rerouting approach with application to FPGAs (GJN, KAS, RAR), pp. 560–565.
- DATE-2001-ZengKC #named #satisfiability
- LPSAT: a unified approach to RTL satisfiability (ZZ, PK, MJC), pp. 398–402.
- HPCA-2001-YangPFRV #architecture
- An Integrated Circuit/Architecture Approach to Reducing Leakage in Deep-Submicron High-Performance I-Caches (SHY, MDP, BF, KR, TNV), pp. 147–157.
- HPDC-2001-BustamanteES #adaptation
- The Active Streams Approach to Adaptive Distrubuted Systems (FEB, GE, KS), pp. 437–438.
- HPDC-2001-ThainBSL #data flow #grid
- The Kangaroo Approach to Data Movement on the Grid (DT, JB, SCS, ML), pp. 325–333.
- LCTES-OM-2001-KesslerB #code generation #programming
- A Dynamic Programming Approach to Optimal Integrated Code Generation (CWK, AB), pp. 165–174.
- PDP-2001-FlorioDL #fault tolerance
- The Recovery Language Approach for Software-Implemented Fault Tolerance (VDF, GD, RL), p. 418–?.
- SOSP-2001-EnglerCC #behaviour #consistency #debugging #fault
- Bugs as Inconsistent Behavior: A General Approach to Inferring Errors in Systems Code (DRE, DYC, AC), pp. 57–72.
- ESOP-2001-GenaimC #analysis #dependence
- The Def-inite Approach to Dependency Analysis (SG, MC), pp. 417–432.
- ESOP-2001-PottierSS #data access
- A Systematic Approach to Static Access Control (FP, CS, SFS), pp. 30–45.
- FASE-2001-ReggioCA #multi #semantics #towards #uml
- Towards a Rigorous Semantics of UML Supporting Its Multiview Approach (GR, MC, EA), pp. 171–186.
- FoSSaCS-2001-KochMP #data access #graph #policy #specification
- Foundations for a Graph-Based Approach to the Specification of Access Control Policies (MK, LVM, FPP), pp. 287–302.
- CAV-2001-ChocklerKKV #model checking
- A Practical Approach to Coverage in Model Checking (HC, OK, RPK, MYV), pp. 66–78.
- CAV-2001-Maidl #model checking #safety
- A Unifying Model Checking Approach for Safety Properties of Parameterized Systems (MM), pp. 311–323.
- ICLP-2001-DrabentM #correctness #declarative #proving #source code
- Proving Correctness and Completeness of Normal Programs — A Declarative Approach (WD, MM), pp. 284–299.
- ICLP-2001-GrecoGZ #consistency #database #integration #logic programming #query
- A Logic Programming Approach to the Integration, Repairing and Querying of Inconsistent Databases (GG, SG, EZ), pp. 348–364.
- ICLP-2001-MedinaOV #abduction #logic #multi #reasoning
- A Multi-adjoint Logic Approach to Abductive Reasoning (JM, MOA, PV), pp. 269–283.
- IJCAR-2001-BaaderT #automaton #satisfiability
- The Inverse Method Implements the Automata Approach for Modal Satisfiability (FB, ST), pp. 92–106.
- IJCAR-2001-HaarslevMW #logic #motivation
- The Description Logic ALCNHR+ Extended with Concrete Domains: A Practically Motivated Approach (VH, RM, MW), pp. 29–44.
- LICS-2001-BenediktLSS #string
- A Model-Theoretic Approach to Regular String Relations (MB, LL, TS, LS), pp. 431–440.
- SAT-2001-HorvitzRGKSC #problem
- A Bayesian Approach to Tackling Hard Computational Problems (EH, YR, CPG, HAK, BS, DMC), pp. 376–391.
- CBSE-2000-AtkinsonBLZ #component #re-engineering
- Component-Based Software Engineering: The KobrA Approach (CA, JB, OL, JZ), p. 4.
- ECDL-2000-AlewaetersGNRV #implementation #library
- Implementing Electronic Journals in the Library and Making them Available to the End-User: An Integrated Approach (GA, SG, PN, SR, MV), pp. 506–510.
- ECDL-2000-BollenR #adaptation #evaluation #implementation #library #recommendation
- An Adaptive Systems Approach to the Implementation and Evaluation of Digital Library Recommendation Systems (JB, LMR), pp. 356–359.
- ECDL-2000-Monch #library #named
- INDIGO — An Approach to Infrastructures for Digital Libraries (CM), pp. 158–167.
- ECDL-2000-RauberDM #automation #detection #documentation #network #topic
- Automatically Detecting and Organizing Documents into Topic Hierarchies: A Neural Network Based Approach to Bookshelf Creation and Arrangement (AR, MD, DM), pp. 348–351.
- HT-2000-Carter #hypermedia
- Arguments in hypertext: a rhetorical approach (LMC), pp. 85–91.
- PODS-2000-YuOB #performance
- Indexing the Edges — A Simple and Yet Efficient Approach to High-Dimensional Indexing (BCO, KLT, CY, SB), pp. 166–174.
- SIGMOD-2000-BressanGOT #policy
- Integrating Replacement Policies in StorM: An Extensible Approach (CLG, BCO, SB, KLT), p. 599.
- SIGMOD-2000-GoldmanW #database #named #query #web
- WSQ/DSQ: A Practical Approach for Combined Querying of Databases and the Web (RG, JW), pp. 285–296.
- VLDB-2000-ChakrabartiM #reduction
- Local Dimensionality Reduction: A New Approach to Indexing High Dimensional Spaces (KC, SM), pp. 89–100.
- VLDB-2000-PantiSG #integration
- A Case-Based Approach to Information Integration (MP, LS, AG), pp. 557–565.
- CSEET-2000-BoehmKP #development #education #re-engineering #research
- A Combined Curriculum Research and Curriculum Development Approach to Software Engineering Education (BWB, GEK, DP), p. 310–?.
- CSEET-2000-DemuthHZS #education #experience #implementation
- A Framework-Based Approach to Teaching OOT: Aims, Implementation, and Experience (BD, HH, SZ, LS), pp. 283–293.
- CSEET-2000-ParrishDHH #case study #component #education #re-engineering
- A Case Study Approach to Teaching Component Based Software Engineering (ASP, BD, DPH, JEH), p. 140–?.
- ITiCSE-2000-Jackson #assessment #automation #online
- A semi-automated approach to online assessment (DJ), pp. 164–167.
- WCRE-J-1997-QuiliciWZ00 #constraints
- Program plan matching: experiments with a constraint-based approach (AQ, SW, YZ), pp. 285–302.
- CSMR-2000-AbreuPS #analysis #clustering #composition #object-oriented
- A Coupling-Guided Cluster Analysis Approach to Reengineer the Modularity of Object-Oriented Systems (FBeA, GP, PMAS), pp. 13–22.
- CSMR-2000-Zhao #architecture #reuse
- A Slicing-based Approach to Extracting Reusable Software Architectures (JZ), pp. 215–223.
- ICSM-2000-AntoniolCCT #problem
- An Approach to Limit the Wynot Problem (GA, GC, AC, MT), pp. 207–215.
- IWPC-2000-GirardW #classification #data type #detection
- Evaluating the Accessor Classification Approach to Detect Abstract Data Types (JFG, MW), pp. 87–95.
- IWPC-2000-WohlinHO #comprehension #fault
- Understanding the Sources of Software Defects: A Filtering Approach (CW, MH, MCO), pp. 9–17.
- WCRE-2000-CanforaCK #component
- Revisiting the Delta IC Approach to Component Recovery (GC, JC, RK), pp. 140–149.
- WCRE-2000-GannodML #adaptation #architecture #legacy
- An Architectural-based Approach for Synthesizing and Integrating Adapters for Legacy Software (GCG, SVM, TEL), p. 128–?.
- WCRE-2000-LuccaFC #case study #modelling #object-oriented #thread
- Recovering Use Case Models from Object-Oriented Code: A Thread-based Approach (GADL, ARF, UdC), pp. 108–117.
- ICALP-2000-CalcagnoMT #imperative #multi #programming
- Closed Types as a Simple Approach to Safe Imperative Multi-stage Programming (CC, EM, WT), pp. 25–36.
- ICALP-2000-EsparzaH #ltl #model checking
- A New Unfolding Approach to LTL Model Checking (JE, KH), pp. 475–486.
- IFM-2000-MeyerS #behaviour #consistency #uml #using #verification
- Behavioral Conformance Verification in an Integrated Approach Using UML and B (EM, TS), pp. 358–379.
- IFM-2000-RusuBJ #generative #testing
- An Approach to Symbolic Test Generation (VR, LdB, TJ), pp. 338–357.
- CHI-2000-PuF #case study #experience
- Enriching buyers’ experiences: the SmartClient approach (PP, BF), pp. 289–296.
- CSCW-2000-GodefroidyHJL #automation #privacy #verification
- Ensuring privacy in presence awareness: an automated verification approach (PG, JDH, LJJ, DL), pp. 59–68.
- CAiSE-2000-GomezCP #concept #design #modelling #web
- Extending a Conceptual Modelling Approach to Web Application Design (JG, CC, OP), pp. 79–93.
- CAiSE-2000-RollandSPLPG #development #empirical
- Evaluating a Pattern Approach as an Aid for the Development of Organisational Knowledge: An Empirical Study (CR, JS, NP, PL, AP, GG), pp. 176–191.
- EDOC-2000-ArreguiPR #component #coordination
- Heterogeneous Component Coordination: The CLF Approach (DA, FP, MR), pp. 194–203.
- ICEIS-2000-Barker #logic #security
- Information Security: A Logic Based Approach (SB), pp. 9–14.
- ICEIS-2000-KundaB #bibliography #off the shelf
- Accessing Success of a Social-Technical Method for Cots Software Selection: A Survey Approach (DK, LB), pp. 294–298.
- ICEIS-2000-Morand #abduction #diagrams #process #representation
- Representation Process and Abductive Reasoning-An Experimental Approach of the Diagrammatic Case (BM), pp. 322–326.
- CIKM-2000-DomenigD #data flow #query #semistructured data
- A Query based Approach for Integrating Heterogeneous Data Sources (RD, KRD), pp. 453–460.
- CIKM-2000-LohKW #database #normalisation #sequence
- Index Interpolation: An Approach to Subsequence Matching Supporting Normalization Transform in Time-Series Databases (WKL, SWK, KYW), pp. 480–487.
- ICML-2000-AllweinSS #classification #multi
- Reducing Multiclass to Binary: A Unifying Approach for Margin Classifiers (ELA, RES, YS), pp. 9–16.
- ICML-2000-AndersonMC #optimisation #parametricity
- A Nonparametric Approach to Noisy and Costly Optimization (BSA, AWM, DC), pp. 17–24.
- ICML-2000-ChownD #divide and conquer #information management #learning
- A Divide and Conquer Approach to Learning from Prior Knowledge (EC, TGD), pp. 143–150.
- ICML-2000-CoelhoG #learning
- Learning in Non-stationary Conditions: A Control Theoretic Approach (JACJ, RAG), pp. 151–158.
- ICML-2000-HougenGS #learning
- An Integrated Connectionist Approach to Reinforcement Learning for Robotic Control (DFH, MLG, JRS), pp. 383–390.
- ICML-2000-LiB #clustering #markov #modelling #using
- A Bayesian Approach to Temporal Data Clustering using Hidden Markov Models (CL, GB), pp. 543–550.
- ICML-2000-MyersKSW #topic
- A Boosting Approach to Topic Spotting on Subdialogues (KM, MJK, SPS, MAW), pp. 655–662.
- ICML-2000-NiyogiK #clustering #reduction
- An Approach to Data Reduction and Clustering with Theoretical Guarantees (PN, NK), pp. 679–686.
- ICML-2000-Veeser #automaton #finite #learning
- An Evolutionary Approach to Evidence-Based Learning of Deterministic Finite Automata (SV), pp. 1071–1078.
- ICML-2000-WnagZ #lazy evaluation #learning #multi #problem
- Solving the Multiple-Instance Problem: A Lazy Learning Approach (JW, JDZ), pp. 1119–1126.
- ICPR-v1-2000-Chetverikov #fault
- Structural Defects: General Approach and Application to Textile Inspection (DC), pp. 1521–1524.
- ICPR-v1-2000-DuchesneH #artificial reality #problem
- A Point-Based Approach to the Interposition Problem in Augmented Reality (CD, JYH), pp. 1261–1265.
- ICPR-v1-2000-HoogsM #bound
- An Integrated Boundary and Region Approach to Perceptual Grouping (AH, JLM), pp. 1284–1290.
- ICPR-v1-2000-KornDH #analysis #image #independence
- Weather Independent Flight Guidance: Analysis of MMW Radar Images for Approach and Landing (BK, HUD, PH), pp. 1350–1353.
- ICPR-v1-2000-MalmH
- A New Approach to Hand-Eye Calibration (HM, AH), pp. 1525–1529.
- ICPR-v1-2000-MarquesV #segmentation
- A Morphological Approach for Segmentation and Tracking of Human Face (FM, VV), pp. 5064–5067.
- ICPR-v2-2000-FanW
- A Run-Length Coding Based Approach to Stroke Extraction of Chinese Characters (KCF, WHW), pp. 2565–2568.
- ICPR-v2-2000-GuoM #automation #feature model #hybrid #statistics
- Automatic Feature Selection — A Hybrid Statistical Approach (HG, YLM), pp. 2382–2385.
- ICPR-v2-2000-LamICTH #multi
- A Multi-Window Approach to Classify Histological Features (RWKL, HHSI, KKTC, LHYT, RH), pp. 2259–2262.
- ICPR-v2-2000-OliveiraLBS #segmentation
- A New Segmentation Approach for Handwritten Digits (LESdO, EL, FB, RS), pp. 2323–2326.
- ICPR-v2-2000-PalaciosR #editing #prototype
- Weighting Prototypes. A New Editing Approach (RPP, EV), pp. 2025–2028.
- ICPR-v2-2000-RitterG #identification #pattern matching #pattern recognition #recognition
- A Bayesian Approach to Object Identification in Pattern Recognition (GR, MTG), pp. 2418–2421.
- ICPR-v2-2000-WangZCF #markov #random #recognition
- Hidden Markov Random Field Based Approach for Off-Line Handwritten Chinese Character Recognition (QW, RZ, ZC, DDF), pp. 2347–2350.
- ICPR-v3-2000-AparicioG #parametricity
- An Approach for Determining Phong Reflectance Parameters from Real Objects (JIA, JGGB), pp. 3572–3575.
- ICPR-v3-2000-DengT #gesture #recognition #segmentation
- An HMM-Based Approach for Gesture Segmentation and Recognition (JD, HTT), pp. 3683–3686.
- ICPR-v3-2000-dOrnellas #multi #segmentation
- A Multi-Scale Gradient Approach for Color-Based Morphological Segmentation (MCd), pp. 3367–3370.
- ICPR-v3-2000-Garcia-VareaSC #statistics
- A New Approach to Speech-Input Statistical Translation (IGV, AS, FC), pp. 3094–3097.
- ICPR-v3-2000-KornprobstM #2d
- A 2D + t Tensor Voting Based Approach for Tracking (PK, GGM), pp. 7104–7107.
- ICPR-v3-2000-KwanCG #automation #bound #using
- Automatic Extraction of Bone Boundaries from CT Scans Using an Intelligence-Based Approach (FYK, KCC, IG), pp. 3441–3444.
- ICPR-v3-2000-LuJ #image
- A New Bayesian Approach to Image Denoising with a Combination of MRFs and Pixon Method (QL, TJ), pp. 3734–3737.
- ICPR-v3-2000-LuoT #multi #using
- Multi-Level Thresholding: Maximum Entropy Approach Using ICM (XL, JT), pp. 3786–3789.
- ICPR-v3-2000-OrriolsTBRVV #detection #modelling #probability #using
- Probabilistic Saliency Approach for Elongated Structure Detection Using Deformable Models (XO, RT, XB, PR, JV, JJV), pp. 7018–7021.
- ICPR-v3-2000-YeH #adaptation
- Optical Flow from a Least-Trimmed Squares Based Adaptive Approach (MY, RMH), pp. 7064–7067.
- ICPR-v4-2000-AksoyHCG #distance #feedback
- A Weighted Distance Approach to Relevance Feedback (SA, RMH, FAC, MG), pp. 4812–4815.
- ICPR-v4-2000-GarainC #documentation
- A Syntactic Approach for Processing Mathematical Expressions in Printed Documents (UG, BBC), pp. 4523–4526.
- ICPR-v4-2000-GilRS #image #probability #segmentation
- Segmentation of artery wall in coronary IVUS images: A Probabilistic Approach (DG, PR, JS), pp. 4352–4355.
- ICPR-v4-2000-MaoK #algorithm #automation #optimisation #segmentation
- Automatic Training of Page Segmentation Algorithms: An Optimization Approach (SM, TK), pp. 4531–4534.
- ICPR-v4-2000-NittaBK #video
- Extracting Actors, Actions and Events from Sports Video — A Fundamental Approach to Story Tracking (NN, NB, TK), pp. 4718–4721.
- ICPR-v4-2000-ThaibaouiRB #detection #fuzzy #image #logic
- A Fuzzy Logic Approach to Drusen Detection in Retinal Angiographic Images (AT, AR, PB), pp. 4748–4751.
- ICPR-v4-2000-WangHP #segmentation #statistics #word
- Statistical-Based Approach to Word Segmentation (YW, RMH, ITP), pp. 4555–4558.
- KR-2000-ChomickiLN #logic programming #policy
- A Logic Programming Approach to Conflict Resolution in Policy Management (JC, JL, SAN), pp. 121–132.
- KR-2000-FattahP #automation #composition #query
- A Compositional Structured Query Approach to Automated Inference (YEF, MAP), pp. 213–224.
- SIGIR-2000-BelhassenAG #information retrieval
- Captive approach for building user model in an information retrieval context (ASB, NBA, HHBG), pp. 337–338.
- SIGIR-2000-ChuangY #machine learning #summary
- Extracting sentence segments for text summarization: a machine learning approach (WTC, JY), pp. 152–159.
- SIGIR-2000-McCabeLCGF #design #evaluation #information retrieval #multi #on the
- On the design and evaluation of a multi-dimensional approach to information retrieval (MCM, JL, AC, DAG, OF), pp. 363–365.
- SIGIR-2000-Mikheev #documentation #normalisation
- Document centered approach to text normalization (AM), pp. 136–143.
- SIGIR-2000-ZhaiJE #adaptation #heuristic #learning
- Exploration of a heuristic approach to threshold learning in adaptive filtering (CZ, PJ, DAE), pp. 360–362.
- SPLC-2000-AtkinsonBM #component #development #product line
- Component-based product line development: the KobrA Approach (CA, JB, DM), pp. 289–310.
- SPLC-2000-Pronk #framework #interface #platform
- An Interface-based platform approach (BJP), pp. 331–352.
- SPLC-2000-ThielP #product line
- Starting a product line approach for an envisioned market (ST, FP), pp. 495–512.
- UML-2000-EngelsHHS #behaviour #diagrams #metamodelling #modelling #semantics #uml #visual notation
- Dynamic Meta Modeling: A Graphical Approach to the Operational Semantics of Behavioral Diagrams in UML (GE, JHH, RH, SS), pp. 323–337.
- UML-2000-MizunoSN #concurrent #source code #uml
- A Structured Approach to Develop Concurrent Programs in UML (MM, GS, MLN), pp. 451–465.
- UML-2000-NunesC #design #interactive #towards #uml
- Towards a UML profile for interaction design: the Wisdom approach (NJN, JFeC), pp. 101–116.
- ECOOP-2000-Duggan #domain-specific language #mixin #programming language #reuse #semantics
- A Mixin-Based, Semantics-Based Approach to Reusing Domain-Specific Programming Languages (DD), pp. 179–200.
- OOPSLA-2000-BryceR
- An approach to safe object sharing (CB, CR), pp. 367–381.
- OOPSLA-2000-ViroliN #java #morphism #parametricity #polymorphism
- Parametric polymorphism in Java: an approach to translation based on reflective features (MV, AN), pp. 146–165.
- TOOLS-ASIA-2000-LiuJC #graph
- A Graph-Theoretic Approach for Recognizing the User Interpretation without Conflicts (GL, WJ, ZC), pp. 291–298.
- TOOLS-EUROPE-2000-GerodolleTG #middleware #scalability
- A Middleware Approach for Building Large-Scale Open Shared Virtual Worlds (AG, FDT, LGB), pp. 169–180.
- TOOLS-PACIFIC-2000-NguyenZA #modelling #set
- A Set Approach to Role Modeling (LTN, LZ, BA), pp. 158–169.
- TOOLS-PACIFIC-2000-WeinreichP
- An Integrated Approach for Documenting, Exploring, and Building Framework-Based Software (RW, JP), pp. 316–327.
- TOOLS-USA-2000-Boldt #object-oriented #requirements
- Requirements Management: An Object-Oriented Approach (LB), pp. 431–432.
- TOOLS-USA-2000-FeldmannMRGR #paradigm #quality #repository #reuse
- An ORDBMS-Based Reuse Repository Supporting the Quality Improvement Paradigm — Exemplified by the SDL-Pattern Approach (RLF, WM, NR, BG, FR), pp. 125–136.
- TOOLS-USA-2000-YacoubA #analysis #composition #design pattern
- Pattern-Oriented Analysis and Design (POAD): A Structural Composition Approach to Glue Design Patterns (SMY, HHA), p. 273–?.
- PADL-2000-Hanus #functional #logic programming #user interface #visual notation
- A Functional Logic Programming Approach to Graphical User Interfaces (MH), pp. 47–62.
- PADL-2000-Yeh #database #documentation #logic programming #xml
- A Logic Programming Approach to Supporting the Entries of XML Documents in an Object Database (CLY), pp. 278–292.
- PADL-2000-YunesMS #hybrid #problem #scalability #scheduling
- A Hybrid Approach for Solving Large Scale Crew Scheduling Problems (THY, AVM, CCdS), pp. 293–307.
- PEPM-2000-SumiiK #partial evaluation
- Online-and-Offline Partial Evaluation: A Mixed Approach (ES, NK), pp. 12–21.
- POPL-2000-Hinze #functional #programming
- A New Approach to Generic Functional Programming (RH), pp. 119–132.
- SAIG-2000-SongF #termination
- A New Termination Approach for Specialization (LS, YF), pp. 72–91.
- SAS-2000-BensalemBFGL #generative #invariant
- A Transformational Approach for Generating Non-linear Invariants (SB, MB, JCF, LG, YL), pp. 58–74.
- ICRE-2000-Glinz #consistency #lightweight #modelling
- A Lightweight Approach to Consistency of Scenarios and Class Models (MG), p. 49–?.
- ASE-2000-BoinotMNMC #adaptation #component #declarative #design
- A Declarative Approach for Designing and Developing Adaptive Components (PB, RM, JN, GM, CC), p. 111–?.
- ASE-2000-ReveillereMCMM #development #domain-specific language #safety
- A DSL Approach to Improve Productivity and Safety in Device Drivers Development (LR, FM, CC, RM, GM), pp. 101–110.
- FSE-2000-BehrendsS #composition #concurrent #reliability #source code
- The universe model: an approach for improving the modularity and reliability of concurrent programs (RB, KS), pp. 20–29.
- FSE-2000-LuttgenBC #composition #semantics
- A compositional approach to statecharts semantics (GL, MvdB, RC), pp. 120–129.
- ICSE-2000-GannodL #analysis #architecture #product line
- An approach to architectural analysis of product lines (GCG, RRL), pp. 548–557.
- ICSE-2000-Kammer #component #distributed #process
- Supporting dynamic distributed work processes with a component and event based approach (PJK), pp. 710–712.
- ICSE-2000-MarcaP #internet #re-engineering #set
- A software engineering approach and tool set for developing Internet applications (DAM, BAP), pp. 738–741.
- ICSE-2000-PradellaRMC #corba #design #formal method
- A formal approach for designing CORBA based applications (MP, MR, DM, ACP), pp. 188–197.
- SAC-2000-AleR
- An Approach to Discovering Temporal Association Rules (JMA, GR), pp. 294–300.
- SAC-2000-AlhamedL #analysis #clustering #multi #using
- A Clustering Approach to Multi-Model Ensemble Analysis Using SAMEX Data (AA, SL), pp. 111–116.
- SAC-2000-FacchinettiMP #fuzzy #industrial #strict
- A Fuzzy Approach to the Geography of Industrial Districts (GF, GM, SP), pp. 514–518.
- SAC-2000-IizukaTSI #information retrieval #integration #web
- An Approach to Integration of Web Information Source Search and Web Information Retrieval (YI, MT, SiS, TI), pp. 289–293.
- SAC-2000-JaberNR #product line #validation
- Product Line Stakeholder Viewpoint Approach and Validation Model (KJ, NN, DCR), pp. 871–875.
- SAC-2000-LoiaSTS #design #hybrid
- An Evolutionary Hybrid Approach to the Design of a Decision Support System (VL, AS, RT, SS), pp. 524–528.
- SAC-2000-Narendra #adaptation #architecture #workflow
- Adaptive Workflow Management — An Integrated Approach and System Architecture (NCN), pp. 858–865.
- SAC-2000-PowerM #c++ #modelling #problem #programming language
- An Approach for Modeling the Name Lookup Problem in the C++ Programming Language (JFP, BAM), pp. 792–796.
- ASPLOS-2000-MartinSAADMMPHW
- Timestamp snooping: an approach for extending SMPs (MMKM, DJS, AA, ARA, RMD, CJM, KEM, MP, MDH, DAW), pp. 25–36.
- DAC-2000-PiS #analysis #diagrams #multi
- Multi-terminal determinant decision diagrams: a new approach to semi-symbolic analysis of analog integrated circuits (TP, CJRS), pp. 19–22.
- DAC-2000-YouVMX #design #multi
- A practical approach to parasitic extraction for design of multimillion-transistor integrated circuits (EY, LV, JM, WX), pp. 69–74.
- DATE-2000-CordoneFSC #heuristic #performance #problem
- An Efficient Heuristic Approach to Solve the Unate Covering Problem (RC, FF, DS, RWC), pp. 364–371.
- DATE-2000-GouraryRUZGM
- A New Approach for Computation of Timing Jitter in Phase Locked Loops (MMG, SGR, SLU, MMZ, KKG, BJM), pp. 345–349.
- DATE-2000-GuerraRFR #analysis #scalability
- A Hierarchical Approach for the Symbolic Analysis of Large Analog Integrated Circuits (OG, ER, FVF, ÁRV), pp. 48–52.
- DATE-2000-SugiharaYD #analysis
- Analysis and Minimization of Test Time in a Combined BIST and External Test Approach (MS, HY, HD), pp. 134–140.
- PDP-2000-BottiFDLCDBKKTV #fault tolerance #reuse
- The TIRAN approach to reusing software implemented fault tolerance (OB, VDF, GD, RL, FC, SD, AB, AK, HK, EMT, EV), pp. 325–332.
- PDP-2000-NabrzyskiPS #knowledge-based #scheduling
- A knowledge-based approach to scheduling jobs in metacomputer environment (JN, JP, MS), pp. 212–219.
- FASE-2000-EgyedM #formal method #modelling
- A Formal Approach to Heterogeneous Software Modeling (AE, NM), pp. 178–192.
- FASE-2000-ReggioACH #formal method #lightweight #state machine #uml
- Analysing UML Active Classes and Associated State Machines — A Lightweight Formal Approach (GR, EA, CC, HH), pp. 127–146.
- STOC-2000-Bar-NoyBFNS #approximate #resource management #scheduling
- A unified approach to approximating resource allocation and scheduling (ABN, RBY, AF, JN, BS), pp. 735–744.
- STOC-2000-CzumajS #algorithm #problem #satisfiability #scheduling
- A new algorithm approach to the general Lovász local lemma with applications to scheduling and satisfiability problems (AC, CS), pp. 38–47.
- CAV-2000-KupfermanV #infinity #reasoning
- An Automata-Theoretic Approach to Reasoning about Infinite-State Systems (OK, MYV), pp. 36–52.
- CL-2000-BraileyPN #analysis #database #termination
- A Dynamic Approach to Termination Analysis for Active Database Rules (JB, AP, PN), pp. 1106–1120.
- CL-2000-FranconiGM #database #evolution #object-oriented #semantics #version control
- A Semantic Approach for Schema Evolution and Versioning in Object-Oriented Databases (EF, FG, FM), pp. 1048–1062.
- CL-2000-HuiG #constraints #finite
- Developing Finite Domain Constraints — A Data Model Approach (KyH, PMDG), pp. 448–462.
- CL-2000-LimN #documentation #heuristic #html #xml
- A Heuristic Approach for Converting HTML Documents to XML Documents (SJL, YKN), pp. 1182–1196.
- TestCom-2000-KhoumsiADEG #protocol #realtime #testing
- An Approach for Testing Real Time Protocol Entities (AK, MA, RD, AEN, LG), pp. 281–300.
- TestCom-2000-MaggioreVP #quality
- The Test Sub Group (TSG): A Cooperative Approach to Improve the Release Quality before Type Acceptance (GM, SV, JP), p. 239–?.
- ECDL-1999-ShumMD #internet #library #modelling #representation
- Representing Scholarly Claims in Internet Digital Libraries: A Knowledge Modelling Approach (SBS, EM, JD), pp. 423–442.
- HT-1999-TzagarakisVPC #distributed #hypermedia
- The Callimachus Approach to Distributed Hypermedia (MT, MV, AP, DC), pp. 47–48.
- ICDAR-1999-AokiANNM #multi #recognition
- A New Approach for Multilingual Address Recognition (YA, TA, AN, NN, HM), pp. 313–316.
- ICDAR-1999-CesariniFGS #comprehension #documentation #multi
- A Two Level Knowledge Approach for Understanding Documents of a Multi-Class Domain (FC, EF, MG, GS), pp. 135–138.
- ICDAR-1999-ClavierCL #classification #image #sorting
- Image Sorting — Image Classification: A Global Approach (EC, SC, JL), pp. 123–126.
- ICDAR-1999-CordellaFSV #documentation #multi #validation
- Document Validation by Signature: A Serial Multi-Expert Approach (LPC, PF, CS, MV), pp. 601–604.
- ICDAR-1999-DehkordiSW #classification #component #word
- A Principal Component Approach to Classification of Handwritten Words (MED, NS, RJW), pp. 781–784.
- ICDAR-1999-FangWLTKTW #verification
- A Smoothness Index based Approach for Off-line Signature Verification (BF, YYW, CHL, YYT, PCKK, KWT, YKW), pp. 785–787.
- ICDAR-1999-FengTY #documentation #image
- A Wavelet Approach to Extracting Contours of Document Images (LF, YT, LY), pp. 71–74.
- ICDAR-1999-KimJS #recognition #word
- A Lexicon Driven Approach for Off-line Recognition of Unconstrained Handwritten Korean Words (SHK, SJ, CYS), pp. 507–510.
- ICDAR-1999-VaidyaDGS #documentation #feature model #recognition #statistics
- Statistical Approach to Feature Extraction for Numeral Recognition from Degraded Documents (VV, VD, DG, BS), pp. 273–276.
- ICDAR-1999-YamaokaIBK #documentation #image #interactive #logic #using
- Interactive Approach to the Extraction of Logical Structures from Unformatted Document Images Using a Sub-structure Model (MY, OI, NB, TK), pp. 185–188.
- SIGMOD-1999-Team #data transformation #in memory #transaction
- In-Memory Data Management for Consumer Transactions The Times-Ten Approach (TTT), pp. 528–529.
- CSEET-1999-Murphy #education #project management
- Teaching Software Project Management: A Response-Interaction Approach (MGM), p. 26–?.
- ITiCSE-1999-DeeR #education #learning
- ACOM (“computing for all”): an integrated approach to the teaching and learning of information technology (HD, PR), p. 195.
- ITiCSE-1999-DeveauxFF #education #re-engineering
- Software engineering teaching: a “Docware” approach (DD, RF, PF), pp. 163–166.
- ITiCSE-1999-Hadjerrouit #design #object-oriented #programming
- A constructivist approach to object-oriented design and programming (SH), pp. 171–174.
- CSMR-1999-KarhinenST #legacy
- An Approach to Manage Variance in Legacy Systems (AK, MS, JOT), pp. 190–193.
- ICSM-1999-ChuHLH #design #formal method #reuse
- A Semi-Formal Approach to Assist Software Design with Reuse (WCC, CPH, CWL, XH), pp. 256–264.
- ICSM-1999-DucasseRD #detection #independence
- A Language Independent Approach for Detecting Duplicated Code (SD, MR, SD), pp. 109–118.
- ICSM-1999-MayrhauserWL #architecture #comprehension #experience #reverse engineering
- Experience Paper: Experience with a Reverse Engineering Architecture Approach to Increase Understanding (AvM, JW, QL), pp. 131–138.
- IWPC-1999-CanforaCLL #case study #identification
- A Case Study of Applying an Eclectic Approach to Identify Objects in Code (GC, AC, ADL, GADL), pp. 136–143.
- IWPC-1999-KesslerS #automation #comprehension #matrix
- The SPARAMAT Approach to Automatic Comprehension of Sparse Matrix Computations (CWK, CS), pp. 200–207.
- WCRE-1999-BurdM #evolution #towards
- An Initial Approach towards Measuring and Characterizing Software Evolution (EB, MM), pp. 168–174.
- WCRE-1999-DemeyerDL #hybrid #metric #reverse engineering #visualisation
- A Hybrid Reverse Engineering Approach Combining Metrics and Program Visualization (SD, SD, ML), pp. 175–186.
- WCRE-1999-GannodC99a #case study #formal method #reverse engineering
- A Formal Approach for Reverse Engineering: A Case Study (GCG, BHCC), pp. 100–111.
- WCRE-1999-StrouliaEKSM #interface #legacy #reverse engineering
- Reverse Engineering Legacy Interfaces: An Interaction-Driven Approach (ES, MER, LK, PGS, BM), p. 292–?.
- FM-v1-1999-Butler #csp #named
- csp2B: A Practical Approach to Combining CSP and B (MJB), pp. 490–508.
- FM-v1-1999-CharpentierC #composition #design #distributed #towards #verification
- Towards a Compositional Approach to the Design and Verification of Distributed Systems (MC, KMC), pp. 570–589.
- FM-v1-1999-FocardiM #security
- A Uniform Approach for the Definition of Security Properties (RF, FM), pp. 794–813.
- FM-v1-1999-MeyerS #diagrams #specification
- A Systematic Approach to Transform OMT Diagrams to a B Specification (EM, JS), pp. 875–895.
- FM-v2-1999-BoerHR #concurrent #paradigm #semantics
- Formal Justification of the Rely-Guarantee Paradigm for Shared-Variable Concurrency: A Semantic Approach (FSdB, UH, WPdR), pp. 1245–1265.
- FM-v2-1999-LevyT #education
- A PVS-Based Approach for Teaching Constructing Correct Iterations (ML, LT), pp. 1859–1860.
- FM-v2-1999-PoizatCR #automaton #concurrent #requirements
- From Informal Requirements to COOP: A Concurrent Automata Approach (PP, CC, JCR), pp. 939–962.
- FM-v2-1999-RandimbivololonaSBPRS #proving
- Applying Formal Proof Techniques to Avionics Software: A Pragmatic Approach (FR, JS, PB, AP, JR, DS), pp. 1798–1815.
- IFM-1999-Deiss
- An Approach to the Combination of Formal Description Techniques: Statecharts and TLA (TD), pp. 231–250.
- TLCA-1999-EidorffHMNST #problem
- AnnoDomini in Practice: A Type-Theoretic Approach to the Year 2000 Problem (PHE, FH, CM, HN, MHS, MT), pp. 6–13.
- AGTIVE-1999-Gruner #consistency #distributed #graph grammar #modelling
- A Combined Graph Schema and Graph Grammar Approach to Consistency in Distributed Data Modeling (SG), pp. 247–254.
- HCI-CCAD-1999-AntonaAS #design #grammarware #human-computer
- A grammar-based approach for populating HCI design spaces (MA, DA, CS), pp. 843–847.
- HCI-CCAD-1999-ArnoldV
- Broad spectrum approach and information society for all (AGA, LJV), pp. 757–761.
- HCI-CCAD-1999-Chiu #algorithm #learning #search-based #using
- Learning path planning using genetic algorithm approach (CC), pp. 71–75.
- HCI-CCAD-1999-Hofmann #information management #integration #video
- Video in digital storys: a new approach for team integration and knowledge management in business context (JH), pp. 217–220.
- HCI-CCAD-1999-HollnagelN #collaboration #performance
- The collaboration between operators and procedures: a cognitive systems engineering approach to performance improvement (EH, YN), pp. 1211–1215.
- HCI-CCAD-1999-KeatesCR #design
- A design approach for accessibility (SK, PJC, PR), pp. 878–882.
- HCI-CCAD-1999-KumeST #agile #integration
- Integration approach for agile manufacturing cell (YK, NS, YT), pp. 1256–1260.
- HCI-CCAD-1999-TrousseJK #behaviour #recommendation #similarity #using
- Using user behaviour similarity for recommendation computation: the broadway approach (BT, MJ, RK), pp. 85–89.
- HCI-CCAD-1999-VayrynenTK #development
- Ergonomic approach to customised development of videophony applications (SV, VT, HK), pp. 261–265.
- HCI-EI-1999-Arnold #evaluation #interface
- Mental effort and evaluation of user-interfaces: a questionnaire approach (AGA), pp. 1003–1007.
- HCI-EI-1999-AtkinsonW #database #industrial #information retrieval #legacy #scalability
- Exploiting Knowledge in Large Industrial Companies: A Combined Approach to Information Retrieval from Legacy Databases (MA, OMW), pp. 1177–1181.
- HCI-EI-1999-BaggenW #evaluation #interactive #interface #named
- WorkLAB — An interactive interface evaluation approach (RB, RW), pp. 1013–1017.
- HCI-EI-1999-Borchers #design #interactive #music
- Designing Interactive Music Systems: A Pattern Approach (JOB), pp. 276–280.
- HCI-EI-1999-Burov #detection
- Psychophysiological effect of the information technologies on users and a psychophysiological approach for its detection (AB), pp. 120–123.
- HCI-EI-1999-Furtado #design #usability #user interface #using
- An Approach to Improve Design and Usability of User Interfaces for Supervision Systems by Using Human Factors (EF), pp. 993–997.
- HCI-EI-1999-Knapheide #functional #specification
- From Focus Group to Functional Specification — A Linguistic Approach to the Transfer of Knowledge (CK), pp. 1247–1251.
- HCI-EI-1999-KongSM #interface #legacy #migration
- Legacy Interface Migration: A Task-Centered Approach (LK, ES, BM), pp. 1167–1171.
- HCI-EI-1999-MosconiP #development #internet #visual notation
- A Visual Approach to Internet Applications Development (MM, MP), pp. 600–604.
- HCI-EI-1999-Takeda #communication #diagrams #using
- Evolutionary Approach to Revolutionary Use of Software Diagrams in Client-Designer Communication (KT), pp. 866–870.
- HCI-EI-1999-WangL
- An Approach for the Complementary Model to Improve Supervisory System (CHW, TDL), pp. 641–645.
- HCI-EI-1999-Weber99b #aspect-oriented #health #safety
- A Pragmatic and Inclusive Approach to Assess Health and Safety Aspects at VDU Workplaces (HW), pp. 31–35.
- CAiSE-1999-Becker-KornstaedtHKRVWZ #process
- Support for the Process Engineer: The Spearmint Approach to Software Process Definition and Process Guidance (UBK, DH, RK, PR, MV, RW, JZ), pp. 119–133.
- CAiSE-1999-HesseN #modelling #multi #process
- A Multi-variant Approach to Software Process Modelling (WH, JN), pp. 210–224.
- CAiSE-1999-MatthesWH #component
- A Process-Oriented Approach to Software Component Definition (FM, HW, PH), pp. 26–40.
- CAiSE-1999-McBrienP #model transformation
- A Uniform Approach to Inter-model Transformations (PM, AP), pp. 333–348.
- CAiSE-1999-RezendeHOPR #database #distributed
- A Practical Approach to Access Heterogeneous and Distributed Databases (FdFR, UH, GdSO, RCGP, JR), pp. 317–332.
- EDOC-1999-Senivongse #corba #equivalence
- An approach to making CORBA support equivalence relationships (TS), pp. 233–244.
- ICEIS-1999-Belo #process
- Gathering the Right Information at the Right Time-An Agent Based Approach to Data Warehouses Loading Processes (OB), pp. 29–36.
- ICEIS-1999-Chattopadhyay99a #enterprise #information management #lifecycle
- Customer Oriented Enterprise Information Management: A Customer Relationship Life Cycle Approach (SPC), pp. 391–395.
- ICEIS-1999-Goossens #ambiguity #modelling #object-oriented
- An Aggregation Based Approach to Reconcile Expressiveness and Unambiguity in Object Oriented Modelling Languages (LG), pp. 427–434.
- ICEIS-1999-Gustas #analysis #enterprise #information management
- Integrated Approach for Information System Analysis at the Enterprise Level (RG), pp. 435–442.
- ICEIS-1999-LeonardoS #development #information management
- An Interpretative Approach to Organisational Inquiry and Description for Information Systems Development in Innovation Centres (PL, ALS), pp. 469–476.
- ICEIS-1999-SzentivanyiGA #distributed #enterprise #information management #integration #novel
- A Novel Approach for the Seamless Integration of Media Management into Distributed Enterprise Information Systems (GS, WG, MA), pp. 148–155.
- ICEIS-1999-ZarriE #implementation #metadata #semantics #web
- A Semantic Approach for Implementing Metadata on the World Wide Web (GPZ), pp. 740–747.
- ICEIS-1999-ZoltiV #design #distributed #towards #web
- A Distributed Approach Towards Designing Intelligent Tutoring Systems for the World Wide Web (CIZ, SLV), pp. 343–352.
- CIKM-1999-AponWD #learning #parallel
- A Learning Approach to Processor Allocation in Parallel Systems (AWA, TDW, LWD), pp. 531–537.
- CIKM-1999-GovertLF #categorisation #documentation #probability #web
- A Probabilistic Description-Oriented Approach for Categorizing Web Documents (NG, ML, NF), pp. 475–482.
- CIKM-1999-LimN #automation #html
- An Automated Approach for Retrieving Hierarchical Data from HTML Tables (SJL, YKN), pp. 466–474.
- CIKM-1999-RadevPMP #behaviour #graph #multi #object-oriented #representation
- Graph-Based Object-Oriented Approach for Structural and Behavioral Representation of Multimedia Data (IR, NP, KM, EKP), pp. 522–530.
- ICML-1999-MorikBJ #case study #knowledge-based #learning #monitoring #statistics
- Combining Statistical Learning with a Knowledge-Based Approach — A Case Study in Intensive Care Monitoring (KM, PB, TJ), pp. 268–277.
- ICML-1999-Zhang #learning
- An Region-Based Learning Approach to Discovering Temporal Structures in Data (WZ), pp. 484–492.
- ICML-1999-ZhouB #algorithm #hybrid #learning #memory management #parametricity #requirements
- A Hybrid Lazy-Eager Approach to Reducing the Computation and Memory Requirements of Local Parametric Learning Algorithms (YZ, CEB), p. 503–?.
- KDD-1999-AggarwalWWY #collaboration #graph
- Horting Hatches an Egg: A New Graph-Theoretic Approach to Collaborative Filtering (CCA, JLW, KLW, PSY), pp. 201–212.
- KDD-1999-AnkerstEEK #classification #interactive #visual notation
- Visual Classification: An Interactive Approach to Decision Tree Construction (MA, CE, ME, HPK), pp. 392–396.
- SEKE-1999-HoudekB #evolution #experience
- Transferring and Evolving Experience: A Practical Approach and Its Application to Software Inspections (FH, CB), pp. 210–226.
- UML-1999-Belaunde #flexibility #repository #uml
- A Pragmatic Approach for Building a Flexible UML Model Repository (MB), pp. 188–203.
- UML-1999-EvansK #metamodelling #semantics #uml
- Core Meta-Modelling Semantics of UML: The pUML Approach (AE, SK), pp. 140–155.
- UML-1999-Overgaard #formal method #modelling
- A Formal Approach to Collaborations in the Unified Modeling Language (GÖ), pp. 99–115.
- ECOOP-1999-BertinoGMM
- An Approach to Classify Semi-structured Objects (EB, GG, IM, MM), pp. 416–440.
- OOPSLA-1999-EvansD #contract #evolution
- Zones, Contracts and Absorbing Changes: An Approach to Software Evolution (HE, PD), pp. 415–434.
- TOOLS-ASIA-1999-LuDD #evolution #object-oriented #using
- A Equivalent Object-Oriented Schema Evolution Approach Using the Path-Independence Language (JL, CD, WD), pp. 212–217.
- TOOLS-ASIA-1999-PeriorellisD #modelling #network
- Modeling Dynamic Networks: Advantages and Limitations of the O-O Approach (PP, JED), pp. 448–457.
- TOOLS-ASIA-1999-WangLPZZ #calculus #development #formal method #refinement
- A Formal Software Development Approach Based on COOZ and Refinement Calculus (YW, BL, JP, MZ, GZ), pp. 261–266.
- TOOLS-EUROPE-1999-Collins-Cope #analysis #case study #interface #requirements
- The Requirements/Service/Interface (RSI) Approach to Use Case Analysis (MCC), pp. 172–183.
- TOOLS-EUROPE-1999-Li #automation #case study #diagrams #sequence chart
- A Semi-Automatic Approach to Translating Use Cases to Sequence Diagrams (LL), pp. 184–193.
- GCSE-1999-Bruin #component #composition
- A Grey-Box Approach to Component Composition (HdB), pp. 195–209.
- LOPSTR-1999-PeraltaG #imperative #using
- Imperative Program Specialisation: An Approach Using CLP (JCP, JPG), pp. 102–117.
- PADL-1999-DemoenS #chat #named
- CHAT: The Copy-Hybrid Approach to Tabling (BD, KFS), pp. 106–121.
- SIGAda-1999-Wang #ada #re-engineering
- Integrating a software engineering approach into an Ada closed laboratory (MW), pp. 163–168.
- RE-1999-HaumerJPH #past present future
- Bridging the Gap Between Past and Future in RE: A Scenario-Based Approach (PH, MJ, KP, PH), pp. 66–73.
- ASE-1999-MartinsD #elicitation #process #requirements #using
- An Approach to Software Requirements Elicitation Using the Precepts from Activity Theory (LEGM, BMD), pp. 15–23.
- ASE-1999-WhalenH #automation #code generation #safety
- An Approach to Automatic Code Generation for Safety-Critical Systems (MWW, MPEH), pp. 315–318.
- ESEC-FSE-1999-JaramilloGS #comparison #debugging
- Comparison Checking: An Approach to Avoid Debugging of Optimized Code (CJ, RG, MLS), pp. 268–284.
- ICSE-1999-DeBaudS #product line
- A Systematic Approach to Derive the Scope of Software Product Lines (JMD, KS), pp. 34–43.
- ICSE-1999-GannodC #reverse engineering #specification
- A Specification Matching Based Approach to Reverse Engineering (GCG, BHCC), pp. 389–398.
- ICSE-1999-HallHW #deployment #using
- A Cooperative Approach to Support Software Deployment Using the Software Dock (RSH, DH, ALW), pp. 174–183.
- ICSE-1999-KasikKFF #flexibility
- A Flexible Approach to Alliances of Complex Applications (DJK, CEK, JLF, KBF), pp. 23–32.
- ICSE-1999-MemonPS #testing #user interface #using
- Using a Goal-Driven Approach to Generate Test Cases for GUIs (AMM, MEP, MLS), pp. 257–266.
- ICSE-1999-Oreizy #distributed #evolution #flexibility
- A Flexible Approach to Decentralized Software Evolution (PO), pp. 730–731.
- SAC-1999-Kaizoji
- A Synergetic Approach to Speculative Price Volatility (TK), pp. 57–65.
- SAC-1999-MarmelsteinL #clustering #evolution
- A New Approach for Evolving Clusters (REM, GBL), pp. 268–274.
- SAC-1999-OwensS #database #design #distributed
- Tool-Based Approach to Distributed Database Design: Includes Web-Based Forms Design for Access to Academic Affairs Data (DAO, FTS), pp. 227–231.
- SAC-1999-Sabharwal #database #hybrid #image #implementation
- An Implementation of Hybrid Approach to Indexing Image Databases (CLS), pp. 421–426.
- SAC-1999-SmithH
- Organizational Alignment Through Information Technology: A Web-based Approach to Change (JHS, WH), pp. 566–570.
- DAC-1999-EcklMZL #multi
- A Practical Approach to Multiple-Class Retiming (KE, JCM, PZ, CL), pp. 237–242.
- DAC-1999-FengPNKW #performance
- Efficient Computation of Quasi-Periodic Circuit Operating Conditions via a Mixed Frequency/Time Approach (DF, JRP, KN, KSK, JW), pp. 635–640.
- DAC-1999-HansenNR #algorithm #specification
- An Approach for Extracting RT Timing Information to Annotate Algorithmic VHDL Specifications (CH, FN, WR), pp. 678–683.
- DAC-1999-Henkel #clustering #embedded #hardware #power management
- A Low Power Hardware/Software Partitioning Approach for Core-Based Embedded Systems (JH), pp. 122–127.
- DAC-1999-KaulVGO #automation #clustering #configuration management #synthesis
- An Automated Temporal Partitioning and Loop Fission Approach for FPGA Based Reconfigurable Synthesis of DSP Applications (MK, RV, SG, IO), pp. 616–622.
- DAC-1999-LiWW #equation #generative #modelling #performance
- An Efficient Lyapunov Equation-Based Approach for Generating Reduced-Order Models of Interconnect (JRL, FW, JW), pp. 1–6.
- DATE-1999-AlippiFPS #configuration management #design
- A DAG-Based Design Approach for Reconfigurable VLIW Processors (CA, WF, LP, MS), pp. 778–779.
- DATE-1999-BuhlerPKB #performance #process #simulation #using
- Efficient Switching Activity Simulation under a Real Delay Model Using a Bitparallel Approach (MB, MP, KK, UGB), p. 459–?.
- DATE-1999-MaestroMH #hardware #problem
- The Heterogeneous Structure Problem in Hardware/Software Codesign: A Macroscopic Approach (JAM, DM, RH), pp. 766–767.
- DATE-1999-MukherjeeJTFAF #performance #verification
- An Efficient Filter-Based Approach for Combinational Verification (RM, JJ, KT, MF, JAA, DSF), pp. 132–137.
- DATE-1999-WuGR #fault #performance #reduction
- A Fault List Reduction Approach for Efficient Bridge Fault Diagnosis (JW, GSG, EMR), pp. 780–781.
- HPCA-1999-BilasJZS #memory management #performance
- Limits to the Performance of Software Shared Memory: A Layered Approach (AB, DJ, YZ, JPS), pp. 193–202.
- HPDC-1999-ReschGG
- An Approach for MPI based Metacomputing (MMR, EG, AG), pp. 333–334.
- HPDC-1999-RosePASSWR #distributed #parallel #performance #visualisation
- An Approach to Immersive Performance Visualization of Parallel and Wide-Area Distributed Applications (LDR, MP, RAA, ES, BS, SW, DAR), pp. 247–254.
- PDP-1999-CabriLZ
- Supporting cooperative WWW browsing: a proxy-based approach (GC, LL, FZ), pp. 138–145.
- PDP-1999-Jose #parallel #source code
- An approach to mapping parallel programs on hypercube multiprocessors (AJ), pp. 221–225.
- PDP-1999-Ludwig #exception #termination #workflow
- Termination handling in inter-organisational workflows-an exception management approach (HL), pp. 122–129.
- FASE-1999-Muller-OlmSC #algebra #component #evolution #on the
- On the Evolution of Reactive Components: A Process-Algebraic Approach (MMO, BS, RC), pp. 161–175.
- FoSSaCS-1999-EsparzaK #analysis #data flow #interprocedural
- An Automata-Theoretic Approach to Interprocedural Data-Flow Analysis (JE, JK), pp. 14–30.
- STOC-1999-FerraginaMB #geometry #multi #problem #string
- Multi-Method Dispatching: A Geometric Approach With Applications to String Matching Problems (PF, SM, MdB), pp. 483–491.
- STOC-1999-OlshevskyS #algebra #geometry #performance
- A Displacement Approach to Efficient Decoding of Algebraic-Geometric Codes (VO, MAS), pp. 235–244.
- TACAS-1999-Knoop #multi #paradigm
- From DFA-Frameworks to DFA-Generators: A Unifying Multiparadigm Approach (JK), pp. 360–374.
- CADE-1999-Groote #deduction #programming
- A dynamic programming approach to categorial deduction (PdG), pp. 1–15.
- ICLP-1999-JahierD #monitoring
- A Generic Approach to Monitor Program Executions (EJ, MD), pp. 139–153.
- LICS-1999-GabbayP #syntax
- A New Approach to Abstract Syntax Involving Binders (MG, AMP), pp. 214–224.
- ADL-1998-RamseyOC #multi #recognition #web
- Multilingual Input System for the Web — An Open Multimedia Approach of Keyboard and Handwriting Recognition for Chinese and Japanese (MR, THO, HC), pp. 188–194.
- DL-1998-SanchezLS #library
- An Agent-Based Approach to the Construction of Floristic Digital Libraries (JAS, CAL, JLS), pp. 210–216.
- ECDL-1998-BosmanBWW #documentation #navigation #query
- Documentation, Cataloging and Query by Navigation: A Practical and Sound Approach (FJMB, PB, TPvdW, LVMW), pp. 459–478.
- ECDL-1998-BraschlerPPS #query #web
- Cross-Language Web Querying: The EuroSearch Approach (MB, CP, EP, PS), pp. 701–702.
- ECDL-1998-KnollABBGHHHLMNS #documentation #evaluation #multi #retrieval #semantics
- An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents (AK, CA, JB, HMB, IG, SH, HH, CH, RL, BM, TN, NS), pp. 409–428.
- HT-1998-ChenC #hypermedia #semantics
- From Latent Semantics to Spatial Hypertext — An Integrated Approach (CC, MC), pp. 77–86.
- VLDB-1998-GibsonKR #category theory #clustering
- Clustering Categorical Data: An Approach Based on Dynamical Systems (DG, JMK, PR), pp. 311–322.
- VLDB-1998-LakshmiZ #database #estimation #network
- Selectivity Estimation in Extensible Databases — A Neural Network Approach (MSL, SZ), pp. 623–627.
- VLDB-1998-SheikholeslamiCZ #clustering #database #multi #named #scalability
- WaveCluster: A Multi-Resolution Clustering Approach for Very Large Spatial Databases (GS, SC, AZ), pp. 428–439.
- ITiCSE-1998-Jenkins #education #programming
- A participative approach to teaching programming (TJ), pp. 125–129.
- ITiCSE-1998-KarpouzisK #pipes and filters
- The rendering pipeline in the classroom: a diversified approach (KK, SDK), pp. 139–142.
- CSMR-1998-GhannouchiGK #reverse engineering
- A Generic Approach for Data Reverse Engineering Taking into Account Application Doamin Knowledge (SAG, HHBG, FK), pp. 21–28.
- CSMR-1998-LamL #evolution #requirements
- Requirements Evolution in the Midst of Environmental Change: A Managed Approach (WL, ML), pp. 121–127.
- CSMR-1998-ZedanY #re-engineering
- A Sound and Practical Approach To The Re-Engineering Of Time-Critical Systems (HZ, HY), pp. 220–223.
- ICSM-1998-BurdM #clustering #component #evolution #maintenance #re-engineering #using
- Investigating Component-Based Maintenance and the Effect of Software Evolution: A Reengineering Approach Using Data Clustering (EB, MM), pp. 199–207.
- ICSM-1998-YangLZ #abstraction #problem #re-engineering #reverse engineering
- Tackling the Abstraction Problem for Reverse Engineering in a System Re-engineering Approach (HY, XL, HZ), pp. 284–293.
- IWPC-1998-Kamp #comprehension #multi #repository #tool support
- Managing a Multi-File, Multi-Language Software Repository for Program Comprehension Tools 3/4 A Generic Approach (MK), pp. 64–71.
- IWPC-1998-MendoncaK #architecture #distributed
- Developing an Approach for the Recovery of Distributed Software Architectures (NCM, JK), pp. 28–36.
- PASTE-1998-TiceG #named
- OPTVIEW: A New Approach for Examining Optimized Code (CT, SLG), pp. 19–26.
- ICALP-1998-PowerR #composition #semantics
- A Modular Approach to Denotational Semantics (JP, GR), pp. 351–362.
- ICALP-1998-RaymondTT #algebra #communication #complexity
- An Algebraic Approach to Communication Complexity (JFR, PT, DT), pp. 29–40.
- ICALP-1998-Zakharov #decidability #equivalence #performance #source code
- An Efficient and Unified Approach to the Decidability of Equivalence of Propositional Programs (VAZ), pp. 247–258.
- FM-1998-AgerholmL #formal method #lightweight
- A Lightweight Approach to Formal Methods (SA, PGL), pp. 168–183.
- FM-1998-MargariaG #flexibility #process #reliability
- Flexible and Reliable Process Model Properties: An Integrated Approach (TMS, VG), pp. 213–227.
- FLOPS-1998-AbramovG #programming language #semantics #standard
- Semantics Modifiers: An Approach to Non-Standard Semantics of Programming Languages (SMA, RG), pp. 247–270.
- ICFP-1998-AnP
- A Structured Approach to Retrieving Functions by Types (NA, YP), p. 344.
- ICFP-1998-Faggian #calculus
- A Term Calculus for Unitary Approach to Nomalization (CF), p. 347.
- ICFP-1998-MarcosLR #authoring #functional #hypermedia #programming
- A Functional Programming Approach to Hypermedia Authoring (DHM, PEML, WAR), p. 346.
- IFL-1998-CharlesR #functional #interactive #parallel #profiling #source code
- An Interactive Approach to Profiling Parallel Functional Programs (NC, CR), pp. 20–37.
- TAGT-1998-HabelMP #injection
- Double-Pushout Approach with Injective Matching (AH, JM, DP), pp. 103–116.
- TAGT-1998-JacquetK
- Node Replacement in Hypergraphs: Translating NCE Rewriting into the Pullback Approach (HJ, RKH), pp. 117–130.
- CHI-1998-Rekimoto #interactive #multi
- A Multiple Device Approach for Supporting Whiteboard-Based Interactions (JR), pp. 344–351.
- CAiSE-1998-Dahchour #formal method #using
- Formalizing Materialization Using a Metaclass Approach (MD), pp. 401–421.
- CAiSE-1998-LacroixSC #database #information management #query #web
- Information Extraction and Database Techniques: A User-Oriented Approach to Querying the Web (ZL, AS, RC), pp. 289–304.
- CAiSE-1998-NurcanGS #case study #process
- Describing Business Processes with a Guided Use Case Approach (SN, GG, CS), pp. 339–362.
- EDOC-1998-SchaderK #development #modelling #object-oriented #process #uml
- Modeling business processes as part of the BOOSTER approach to business object-oriented system development based on UML (MS, AK), pp. 56–67.
- CIKM-1998-BellatrecheKL #database #deduction #distributed
- An Iterative Approach for Rules and Data Allocation in Distributed Deductive Database Systems (LB, KK, QL), pp. 356–363.
- CIKM-1998-FritschiGD #database #named
- Framboise — An Approach to Framework-Based Active Database Management System Construction (HF, SG, KRD), pp. 364–370.
- CIKM-1998-LimaLR #automation #categorisation #documentation
- A Hierarchical Approach to the Automatic Categorization of Medical Documents (LRSdL, AHFL, BARN), pp. 132–139.
- CIKM-1998-SchmittT #incremental #integration
- An Incremental Approach to Schema Integration by Refining Extensional Relationships (IS, CT), pp. 322–330.
- ICML-1998-AlerBI #learning #multi #programming #search-based
- Genetic Programming and Deductive-Inductive Learning: A Multi-Strategy Approach (RA, DB, PI), pp. 10–18.
- ICML-1998-Heskes #learning #multi
- Solving a Huge Number of Similar Tasks: A Combination of Multi-Task Learning and a Hierarchical Bayesian Approach (TH), pp. 233–241.
- ICPR-1998-AsadaBA #image #synthesis
- Calibrated computer graphics: a new approach to realistic image synthesis based on camera calibration (NA, MB, AA), pp. 705–707.
- ICPR-1998-BouzidiBH #data fusion #monitoring
- A remote sensing data fusion approach to monitor agricultural areas (SB, JPB, IH), pp. 1387–1389.
- ICPR-1998-CallariSF #estimation #nondeterminism
- Uncertainty in pose estimation: a Bayesian approach (FGC, GS, FPF), pp. 972–976.
- ICPR-1998-ChengX #fuzzy
- Fuzzy approach to contrast enhancement (HDC, HjX), pp. 1549–1551.
- ICPR-1998-GriffinWSKC
- An MRF approach for interpreting thermochromic paint (AG, TW, AJS, JK, RCC), pp. 1741–1743.
- ICPR-1998-HansenEL #finite #modelling #simulation
- Region-of-interest based finite element modelling of the brain-an approach to brain surgery simulation (KVH, MSE, OVL), pp. 292–296.
- ICPR-1998-HofmanJ #analysis #clustering #performance #robust #using
- Robust and efficient cluster analysis using a shared near neighbours approach (IH, RAJ), pp. 243–247.
- ICPR-1998-HuangSLW #detection #image #robust
- A robust approach to face and eyes detection from images with cluttered background (WH, QS, CPL, JKW), pp. 110–113.
- ICPR-1998-KatoWNGK #modelling #process
- A model-based approach for recognizing folding process of origami (JK, TW, TN, LG, HK), pp. 1808–1811.
- ICPR-1998-Masuda #image #integration #multi
- A unified approach to volumetric registration and integration of multiple range images (TM), pp. 977–981.
- ICPR-1998-MelzerKZ #detection #modelling #parametricity #using
- Stroke detection of brush strokes in portrait miniatures using a semi-parametric and a model based approach (TM, PK, EZ), pp. 474–476.
- ICPR-1998-MorookaZH #modelling
- Next best viewpoint (NBV) planning for active object modeling based on a learning-by-showing approach (KM, HZ, TH), pp. 677–681.
- ICPR-1998-RigollKW #hybrid #recognition #scalability
- A new hybrid approach to large vocabulary cursive handwriting recognition (GR, AK, DW), pp. 1512–1514.
- ICPR-1998-Rizzi #clustering #graph #search-based
- A genetic approach to hierarchical clustering of Euclidean graphs (SR), pp. 1543–1545.
- ICPR-1998-SanchezPF #induction
- A Voronoi-diagram-based approach to oblique decision tree induction (JSS, FP, FJF), pp. 542–544.
- ICPR-1998-SattarT #documentation #fuzzy #image #logic #multi #on the #using
- On the multiresolution enhancement of document images using fuzzy logic approach (FS, DBHT), pp. 939–941.
- ICPR-1998-WarkSC #feature model #identification #modelling #statistics
- An approach to statistical lip modelling for speaker identification via chromatic feature extraction (TW, SS, VC), pp. 123–125.
- ICPR-1998-WeberVS
- An insect-based approach to robotic homing (KW, SV, MVS), pp. 297–299.
- ICPR-1998-WilliamsB #image
- A non-linear filtering approach to image matching (JAW, MB), pp. 1–3.
- ICPR-1998-ZaoZLH #image
- A new approach for intelligent object picking in line drawing images (JZ, HZ, JL, JH), pp. 1084–1088.
- ICPR-1998-ZhengS #generative #modelling
- A model based approach in extracting and generating human motion (JYZ, SS), pp. 1201–1205.
- KDD-1998-HinneburgK #clustering #database #multi #performance #scalability
- An Efficient Approach to Clustering in Large Multimedia Databases with Noise (AH, DAK), pp. 58–65.
- KR-1998-BenferhatDLPSS #consistency #knowledge base #nondeterminism
- A General Approach for Inconsistency Handling and Merging Information in Prioritized Knowledge Bases (SB, DD, JL, HP, AS, PS), pp. 466–477.
- KR-1998-Darwiche #compilation
- Compiling Devices: A Structure-Based Approach (AD), pp. 156–155.
- SIGIR-1998-LinSCHKH #classification #documentation #internet #mining #semantics
- Extracting Classification Knowledge of Internet Documents with Mining Term Associations: A Semantic Approach (SHL, CSS, MCC, JMH, MTK, YMH), pp. 241–249.
- SIGIR-1998-PonteC #information retrieval #modelling
- A Language Modeling Approach to Information Retrieval (JMP, WBC), pp. 275–281.
- SIGIR-1998-WangL #documentation #roadmap
- Discovering Typical Structures of Documents: A Road Map Approach (KW, HL), pp. 146–154.
- SIGIR-1998-Williams #database #named
- Cafe: An Indexed Approach to Searching Genomic Databases (HEW), p. 389.
- UML-1998-LanusseGT #modelling #realtime #uml
- Real-Time Modeling with UML: The ACCORD Approach (AL, SG, FT), pp. 319–335.
- UML-1998-OvergaardP #case study #formal method
- A Formal Approach to Use Cases and Their Relationships (GÖ, KP), pp. 406–418.
- TOOLS-ASIA-1998-DengH #named #object-oriented #testing
- BATOOM: A Practical Approach to Testing Object-Oriented Software (YD, ZH), p. 328–?.
- TOOLS-ASIA-1998-Pour98b #component #development #towards
- Moving Toward Component-Based Software Development Approach (GP), pp. 296–300.
- TOOLS-ASIA-1998-VieiraT #behaviour #object-oriented #testing
- An Approach to Perform Behavior Testing in Object-Oriented Systems (MERV, GHT), pp. 318–327.
- TOOLS-ASIA-1998-ZhangP #composition #concurrent
- A Compositional Approach to Concurrent Objects (XZ, JP), pp. 116–126.
- TOOLS-USA-1998-ChoMK #protocol #specification
- A Protocol Based Approach to Specifying Interoperability between Objects (IHC, JDM, LK), pp. 84–96.
- AdaEurope-1998-Gonzalez-BarahonaQCB #ada #communication #composition
- Building Modular Communication Systems in Ada: The Simple_Com Approach (JMGB, PdlHQ, JCG, FJB), pp. 225–237.
- ALP-PLILP-1998-DemoenS #named
- CAT: The Copying Approach to Tabling (BD, KFS), pp. 21–35.
- ICRE-1998-GaskaG #process #requirements
- An Approach for Cross-Discipline Requirements Engineering Process Patterns (MTG, DCG), pp. 182–189.
- ICRE-1998-Leveson #specification
- Intent Specifications: An Approach to Building Human-Centered Specifications (NGL), pp. 204–213.
- ICRE-1998-SommervilleSV #elicitation #requirements
- Viewpoints for Requirements Elicitation: A Practical Approach (IS, PS, SV), pp. 74–81.
- ASE-1998-AndreoliFM #coordination #evolution #process #workflow
- A Coordination System Approach to Software Workflow Process Evolution (JMA, CF, JLM), p. 297–?.
- ASE-1998-GannodCC #automation #reuse #reverse engineering
- An Automated Approach for Supporting Software Reuse via Reverse Engineering (GCG, YC, BHCC), p. 94–?.
- ASE-1998-JacobsenK #adaptation #design pattern #generative
- A Design Pattern based Approach to Generating Synchronization Adaptors from Annotated IDL (HAJ, BJK), p. 63–?.
- ASE-1998-MichailN #library #object-oriented #reuse
- Illustrating Object-Oriented Library Reuse by Example: A Tool-based Approach (AM, DN), pp. 200–203.
- ICSE-1998-HilbertR #internet #scalability
- An Approach to Large-Scale Collection of Application Usage Data Over the Internet (DMH, DFR), pp. 136–145.
- ICSE-1998-McCallCO #adaptation #generative
- An Adaptable Generation Approach to Agenda Management (EKM, LAC, LJO), pp. 282–291.
- ICSE-1998-ShimizuFH #development
- A Systematic Approach to Domain-Oriented Software Development (YS, NF, MH), pp. 499–502.
- SAC-1998-BeschP #clustering
- A group theoretic approach to data and code partitioning (MB, HWP), pp. 575–583.
- SAC-1998-DAntonaC #documentation #named
- ANATEMA: a neural approach to extended markup of SGML documents (OMD, MWLC), pp. 297–302.
- SAC-1998-HashemiTTSP #development #network
- The development of profiles for children with attention deficit disorder and monkeys: a neural network approach (RRH, MST, AAT, WS, MGP), pp. 55–59.
- SAC-1998-SimpsonS #multi
- A multiple processor approach to data compression (JLS, CLS), pp. 641–649.
- SAC-1998-WangA #retrieval
- A vertex-based shape coding approach for similar shape retrieval (JW, RA), pp. 520–522.
- ASPLOS-1998-Weissman #concurrent #locality #performance #thread
- Performance Counters and State Sharing Annotations: a Unified Approach to Thread Locality (BW), pp. 127–138.
- CC-1998-MalacariaH #analysis #control flow
- A New Approach to Control Flow Analysis (PM, CH), pp. 95–108.
- DAC-1998-HwangCH #design #power management #re-engineering #using
- A Re-engineering Approach to Low Power FPGA Design Using SPFD (JMH, FYC, TH), pp. 722–725.
- DAC-1998-NagarajCHY #analysis
- A Practical Approach to Static Signal Electromigration Analysis (NSN, FC, HH, DY), pp. 572–577.
- DAC-1998-SuttonD #framework
- Framework Encapsulations: A New Approach to CAD Tool Interoperability (PRS, SWD), pp. 134–139.
- DATE-1998-AntolaPS #detection #fault
- A Low-Redundancy Approach to Semi-Concurrent Error Detection in Data Paths (AA, VP, MS), pp. 266–272.
- DATE-1998-HedrichB #formal method #linear #parametricity #verification
- A Formal Approach to Verification of Linear Analog Circuits with Parameter Tolerances (LH, EB), pp. 649–654.
- DATE-1998-LubaszewskiCC #problem #testing
- Microsystems Testing: an Approach and Open Problems (ML, ÉFC, BC), pp. 524–528.
- DATE-1998-MesmanSTMJ #constraints #pipes and filters
- A Constraint Driven Approach to Loop Pipelining and Register Binding (BM, MTJS, AHT, JLvM, JAGJ), pp. 377–383.
- DATE-1998-NeulBLSHW #component #modelling #simulation
- A Modeling Approach to Include Mechanical Microsystem Components into the System Simulation (RN, UB, GL, PS, JH, SW), pp. 510–517.
- DATE-1998-PrietoRGPHR #design #fault #layout #predict #testing
- An Approach to Realistic Fault Prediction and Layout Design for Testability in Analog Circuits (JAP, AR, IAG, EJP, JLH, AMDR), pp. 905–909.
- DATE-1998-RenovellPFZ #configuration management #logic
- RAM-Based FPGA’s: A Test Approach for the Configurable Logic (MR, JMP, JF, YZ), pp. 82–88.
- DATE-1998-RosenbergerH #behaviour #functional #modelling #simulation
- A Systems Theoretic Approach to Behavioural Modeling and Simulation of Analog Functional Blocks (RR, SAH), pp. 721–728.
- HPDC-1998-DiwanG #adaptation #communication
- Adaptive Utilization of Communication and Computational Resources in High-Performance Distribution Systems: The EMOP Approach (SD, DG), pp. 2–9.
- HPDC-1998-FryNS #constant #distributed
- Computing Twin Primes and Brun’s Constant: A Distributed Approach (PHF, JN, BKS), pp. 42–49.
- HPDC-1998-JuddCS
- The DOGMA Approach to High-Utilization Supercomputing (GJ, MJC, QS), pp. 64–70.
- PDP-1998-BarretoJ #communication #reliability
- Open and reliable group communication processing: the FITOS-RPC approach (LPB, IJP), pp. 389–394.
- STOC-1998-BellareCK #analysis #authentication #composition #design #protocol
- A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (MB, RC, HK), pp. 419–428.
- STOC-1998-HuangR #algebra #black box #composition #problem #set
- A Black Box Approach to the Algebraic Set Decomposition Problem (MDAH, AJR), pp. 497–506.
- CAV-1998-AbdullaJKP #partial order #reduction #verification
- A General Approach to Partial Order Reductions in Symbolic Verification (PAA, BJ, MK, DP), pp. 379–390.
- CAV-1998-Balarin #concurrent #correctness #modelling #verification
- Correctness of the Concurrent Approach to Symbolic Verification of Interleaved Models (FB), pp. 391–402.
- CAV-1998-NalumasuGMG #memory management #model checking #modelling #multi #verification
- The “Test Model-Checking” Approach to the Verification of Formal Memory Models of Multiprocessors (RN, RG, AM, GG), pp. 464–476.
- ISSTA-1998-BultanGL #constraints #integer #verification
- Verifying Systems with Integer Constraints and Boolean Predicates: A Composite Approach (TB, RG, CL), pp. 113–123.
- ADL-1997-SenguptaD #database #query #visual notation
- Query by Templates: A Generalized Approach for Visual Query Formulation for Text Dominated Databases (AS, AD), pp. 36–47.
- DL-1997-Nevill-ManningWP #library
- Browsing in Digital Libraries: A Phrase-Based Approach (CGNM, IHW, GWP), pp. 230–236.
- ECDL-1997-ChristophidesDF #documentation #network #repository #semantics
- A Semantic Network Approach to Semi-Structured Documents Repositories (VC, MD, IF), pp. 305–324.
- ECDL-1997-DartoisSSTMF #documentation #encapsulation #multi #on the fly #set
- Building a Multi-lingual Electronic Text Collection of Folk Tales as a Set of Encapsulated Document Objects: An Approach for Casual Users to Browse Multi-lingual Documents on the Fly (MD, AM, TF, TS, SS, KT), pp. 215–231.
- ECDL-1997-Ferber #automation #multi #retrieval
- Automated Indexing with Thesaurus Descriptors: A Co-occurence Based Approach to Multilingual Retrieval (RF), pp. 233–252.
- HT-1997-WiilL #internet #named
- Workspaces: The HyperDisco Approach to Internet Distribution (UKW, JJL), pp. 13–23.
- ICDAR-1997-Alimi #online
- An Evolutionary Neuro-Fuzzy Approach to Recognize On-Line Arabic Handwriting (AMA), pp. 382–386.
- ICDAR-1997-CracknellDD #object-oriented
- An Object-Oriented form Description Language and Approach to Handwritten Form Processing (CC, ACD, LD), p. 180–?.
- ICDAR-1997-KimSC #classification #multi #recognition
- A systematic approach to classifier selection on combining multiple classifiers for handwritten digit recognition (JK, KS, KC), pp. 459–462.
- ICDAR-1997-LallicanV #order
- A Kalman Approach for Stroke Order Recovering from Off-Line Handwriting (PML, CVG), pp. 519–523.
- ICDAR-1997-ONeil #categorisation #incremental #representation #retrieval
- An Incremental Approach to Text Representation, Categorization, and Retrieval (PO), pp. 714–717.
- ICDAR-1997-SafariNSA
- Form Registration: A Computer Vision Approach (RS, NN, MS, MA), pp. 758–761.
- ICDAR-1997-SudaBKM #using #word
- Logo and Word Matching Using a General Approach to Signal Registration (PS, CB, BK, GM), p. 61–?.
- ICDAR-1997-TangLY #automation #documentation #image #polynomial
- Quadratic Spline Wavelet Approach to Automatic Extraction of Baselines from Document Images (YYT, JL, LY), pp. 693–696.
- VLDB-1997-BerckenSW #multi
- A Generic Approach to Bulk Loading Multidimensional Index Structures (JVdB, BS, PW), pp. 406–415.
- VLDB-1997-WangYM #data mining #grid #mining #named #statistics
- STING: A Statistical Information Grid Approach to Spatial Data Mining (WW, JY, RRM), pp. 186–195.
- ITiCSE-1997-WesterSK #java #programming #visual notation
- Visual programming with Java; an alternative approach to introductory programming (FW, MS, PGK), pp. 57–58.
- CSMR-1997-Favre #maintenance #scalability
- A Rigorous Approach to Support the Maintenance of Large Portable Software (JMF), pp. 44–47.
- CSMR-1997-KutschaHK #concept #maintenance #re-engineering
- The Task Artifact Cycle: a Conceptual Approach to Maintenance and Reengineering (SK, KH, HK), pp. 17–19.
- CSMR-1997-Ory
- A theory driven approach to century change (ZÖ), pp. 101–105.
- ICSM-1997-Krikhaar #architecture
- Reverse Architecting Approach for Complex Systems (RLK), pp. 4–11.
- WCRE-1997-AprilMA #reverse engineering
- A Reverse Engineering Approach to Evaluate Function Point Rules (AA, EM, AA), pp. 236–246.
- WCRE-1997-Mfourga #database #relational
- Extracting Entity-Relationship Schemas from Relational Databases: A Form-Driven Approach (NM), pp. 184–193.
- WCRE-1997-PalthepuGM #knowledge-based #legacy #recognition #scalability
- Cliché Recognition in Legacy Software: A Scalable, Knowledge-Based Approach (SP, JEG, GIM), pp. 94–103.
- WCRE-1997-QuiliciWZ #constraints
- New Experiments with a Constraint-Based Approach to Program Plan Matching (AQ, SW, YZ), pp. 114–123.
- WCRE-1997-ReevesS #comprehension #named
- JACKAL: A Hierarchical Approach to Program Understanding (AAR, JDS), pp. 84–93.
- ICSM-2000-AlencarCNL #maintenance
- Viewpoints as an evolutionary approach to software system maintenance (PSCA, DDC, TN, CJPdL), p. 260–?.
- ICALP-1997-Fu #communication #proving
- A Proof Theoretical Approach to Communication (YF), pp. 325–335.
- ICALP-1997-Fujito #approximate #problem
- A Primal-Dual Approach to Approximation of Node-Deletion Problems for Matroidal Properties (TF), pp. 749–759.
- ICALP-1997-VinkR #algebra #bisimulation #probability
- Bisimulation for Probabilistic Transition Systems: A Coalgebraic Approach (EPdV, JJMMR), pp. 460–470.
- TLCA-1997-Urzyczyn #λ-calculus
- Inhabitation in Typed λ-Calculi (A Syntactic Approach) (PU), pp. 373–389.
- ICFP-1997-BlumeA #higher-order #named #optimisation
- λ-Splitting: A Higher-Order Approach to Cross-Module Optimizations (MB, AWA), pp. 112–124.
- ICFP-1997-SpiliopoulouHD #distributed #functional #programming
- Distributed Programming, a Purely Functional Approach (ES, IH, ND), p. 320.
- GG-Handbook-Vol1-CorradiniMREHL #algebra #category theory #concept #graph transformation
- Algebraic Approaches to Graph Transformation — Part I: Basic Concepts and Double Pushout Approach (AC, UM, FR, HE, RH, ML), pp. 163–246.
- GG-Handbook-Vol1-EhrigHKLRWC #algebra #category theory #comparison #graph transformation
- Algebraic Approaches to Graph Transformation — Part II: Single Pushout Approach and Comparison with Double Pushout Approach (HE, RH, MK, ML, LR, AW, AC), pp. 247–312.
- HCI-CC-1997-ButeraS #convergence #towards
- The Convergence Toward a New Sociotechnical System Approach (FB, TS), pp. 201–204.
- HCI-CC-1997-EbinaI #user interface
- A New Approach to Providing GUI Access for Blind People-Combined Tactile/Voice GUI Access (TE, SI), pp. 405–408.
- HCI-CC-1997-KlocknerPP #design
- A Cooperative Design Approach for CSCW in Ministries (KK, UPB, WP), pp. 313–316.
- HCI-CC-1997-Pejtersen #communication #information retrieval #network #semantics
- A Cognitive Engineering Approach to Cross Disciplinary Exploration of Work Domains and Semantic Information Retrieval in Communication Networks (AMP), pp. 69–72.
- HCI-CC-1997-ShumayP #using
- Healthy Computing: A Comprehensive Group Training Approach Using Biofeedback (DMS, EP), pp. 555–558.
- HCI-CC-1997-SteeleOS #development
- A User-Centred Approach to Groupwork Systems Development (RAS, GO, JIAS), pp. 77–80.
- HCI-SEC-1997-AnkerA #communication #development #mobile #multi
- Mobile Multimedia Communication: A Task- and User-Centered Approach to Future Systems Development (FWGvdA, AGA), pp. 651–654.
- HCI-SEC-1997-Brusilovsky #adaptation #knowledge-based
- A Knowledge-Based Approach to Creating Adaptive Electronic Textbooks (PB), pp. 107–110.
- HCI-SEC-1997-Eggleston #adaptation #human-computer #interface
- Adaptive Interfaces as an Approach to Human-Machine Cooperation (RGE), pp. 495–500.
- HCI-SEC-1997-HolmquistA #scalability #set #visualisation
- Flip Zooming: A Practical Focus+Context Approach to Visualizing Large Data Sets (LEH, CA), pp. 763–766.
- HCI-SEC-1997-ItogaKL #database #nondeterminism #object-oriented #retrieval
- All Object-Oriented Uncertainty Retrieval Approach for Graphics Databases (SYI, XK, YL), pp. 683–686.
- HCI-SEC-1997-Reichert
- Perception-Oriented Stereo Rendering: A New Approach to Control the Third Dimension (LR), pp. 845–848.
- HCI-SEC-1997-SoFTSY #case study #database #development #distributed
- A Closed-Loop Approach for Integrating Human Factors into Systems Development: A Case Study Involving a Distributed Database System (RHYS, CMF, MMT, CJS, BPY), pp. 517–520.
- CAiSE-1997-DominguezZR #concept #metamodelling
- A Conceptual Approach to Meta-Modelling (ED, MAZ, JR), pp. 319–332.
- CAiSE-1997-FilippidouL #requirements #using #validation
- Using Scenarios to Validate Requirements in a Plausibility Centred Approach (DF, PL), pp. 47–60.
- CAiSE-1997-Puustjarvi #automation #transaction #workflow
- Negotiation Transactions: An Approach to Increase the Automation of Workflows (JP), pp. 89–102.
- EDOC-1997-SilvaGRBA #information management #modelling
- Organization, Information System and Distribution Modeling: An Integrated Approach (ARS, TG, FAR, AJB, JØA), p. 57–?.
- ACIR-1997-OunisH #information retrieval #logic #relational
- A Logical Relational Approach for Information Retrieval Indexing (IO, TWCH).
- CIKM-1997-ChengBL #learning #network
- Learning Belief Networks from Data: An Information Theory Based Approach (JC, DAB, WL), pp. 325–331.
- CIKM-1997-GauchW #analysis #automation #corpus #query
- A Corpus Analysis Approach for Automatic Query Expansion (SG, JW), pp. 278–284.
- CIKM-1997-KimC #database #execution #static analysis
- A Practical Approach to Static Analysis and Execution of Rules in Active Databases (SKK, SC), pp. 161–168.
- CIKM-1997-LeeHL #concurrent #multi
- A Uniform Approach to Global Concurrency Control and Recovery in Multidatabase Environment (SL, CSH, WGL), pp. 51–58.
- ICML-1997-Auer #empirical #evaluation #learning #multi #on the
- On Learning From Multi-Instance Examples: Empirical Evaluation of a Theoretical Approach (PA), pp. 21–29.
- ICML-1997-Opitz #component #effectiveness #network
- The Effective Size of a Neural Network: A Principal Component Approach (DWO), pp. 263–271.
- ICML-1997-SuematsuHL #learning #markov
- A Bayesian Approach to Model Learning in Non-Markovian Environments (NS, AH, SL), pp. 349–357.
- KDD-1997-AdomaviciusT #database
- Discovery of Actionable Patterns in Databases: The Action Hierarchy Approach (GA, AT), pp. 111–114.
- KDD-1997-KeoghS #database #pattern matching #performance #probability
- A Probabilistic Approach to Fast Pattern Matching in Time Series Databases (EJK, PS), pp. 24–30.
- KDD-1997-ZupanBBC #composition #data mining #dataset #mining
- A Dataset Decomposition Approach to Data Mining and Machine Discovery (BZ, MB, IB, BC), pp. 299–302.
- ECOOP-1997-BicarreguiLM #encapsulation
- Objects, Associations and Subsystems: A Hierarchical Approach to Encapsulation (JB, KL, TSEM), pp. 324–343.
- TOOLS-ASIA-1997-ChenWP #multi #object-oriented
- Intelligent Multimedia Presentation System: An Object-Oriented Approach (YC, ZW, YP), pp. 304–309.
- TOOLS-ASIA-1997-Dai #data mining #database #integration #mining #multi #object-oriented
- An Object-Oriented Approach to Schema Integration and Data Mining in Multiple Databases (HD), pp. 294–303.
- TOOLS-ASIA-1997-MisicM #metamodelling #metric #object-oriented
- From Formal Metamodels to Metrics: An Object-Oriented Approach (VBM, SM), pp. 330–339.
- TOOLS-ASIA-1997-NguyenD #modelling #object-oriented
- A Practical Formally-Based Approach to Object-Oriented Modeling of Control Systems (KN, TSD), pp. 404–415.
- TOOLS-USA-1997-FetckeAN #analysis
- Mapping the OO-Jacobson Approach into Function Point Analysis (TF, AA, THN), pp. 192–202.
- ALP-1997-BartheR #algebra #termination #type system
- Termination of Algebraic Type Systems: The Syntactic Approach (GB, FvR), pp. 174–193.
- LOPSTR-1997-BibelKKKOSS #multi #synthesis
- A Multi-level Approach to Program Synthesis (WB, DSK, CK, FK, JO, SS, GS), pp. 1–27.
- PLDI-1997-TauraY #compilation #effectiveness #implementation #multi #performance #thread
- Fine-grain Multithreading with Minimal Compiler Support — A Cost Effective Approach to Implementing Efficient Multithreading Languages (KT, AY), pp. 320–333.
- PLILP-1997-Gregory #concurrent #declarative #programming
- A Declarative Approach to Concurrent Programming (SG), pp. 79–93.
- PLILP-1997-JohanssonJLBM #compilation #erlang
- A Pragmatic Approach to Compilation of Erlang (EJ, CJ, TL, JB, HM), pp. 419–420.
- PLILP-1997-Thompson #education #functional #problem #programming
- Where Do I Begin? A Problem Solving Approach in teaching Functional Programming (SJT), pp. 323–334.
- SAS-1997-CodishLB #algebra #analysis #logic programming #source code
- An Algebraic Approach to Sharing Analysis of Logic Programs (MC, VL, FB), pp. 68–82.
- TRI-Ada-1997-QuirosGC #distributed #fault tolerance #programming
- Programming Distributed Fault Tolerant Systems: The replicAda Approach (PdlHQ, JMGB, JCG), pp. 21–29.
- RE-1997-DanoBB #case study #concept #object-oriented #specification
- An Approach Based on the Concept of Use Case to Produce Dynamic Object-Oriented Specifications (BD, HB, FB), pp. 54–64.
- RE-1997-DarimontS #requirements #reuse
- Reusing Operational Requirements: A Process-Oriented Approach (RD, JS), p. 16–?.
- RE-1997-FaulkH #analysis #requirements #specification
- The SCR Approach to Requirements Specification and Analysis (SRF, CLH), p. 263.
- RE-1997-Sutcliffe #requirements
- A Technique Combination Approach to Requirements Engineering (AGS), p. 65–?.
- ASE-1997-ChenC #architecture #automation #reuse
- Facilitating an Automated Approach to Architecture-based Software Reuse (YC, BHCC), pp. 238–245.
- ASE-1997-GannodC #automation #pointer #reverse engineering #source code
- A Formal Automated Approach for Reverse Engineering Programs with Pointers (GCG, BHCC), pp. 219–226.
- ASE-1997-GirardKS #data type #detection
- A Metric-based Approach to Detect Abstract Data Types and State Encapsulations (JFG, RK, GS), pp. 82–89.
- ASE-1997-SrivastavaKM #specification
- A Structured Approach for Synthesizing Planners from Specifications (BS, SK, ADM), pp. 18–27.
- ESEC-FSE-1997-EngelsHTE #graph transformation #modelling
- A View-Oriented Approach to System Modelling Based on Graph Transformation (GE, RH, GT, HE), pp. 327–343.
- ESEC-FSE-1997-PohlW #tool support
- A Contextual Approach for Process-Integrated Tools (KP, KW), pp. 176–192.
- ICSE-1997-BrodmanJ #process
- A Software Process Improvement Approach Tailored for Small Organizations and Small Projects (JGB, DLJ), pp. 661–662.
- ICSE-1997-JacquotQ #formal method #interface #specification #towards
- Early Specification of User-Interfaces: Toward a Formal Approach (JPJ, DQ), pp. 150–160.
- ICSE-1997-LaneZ #metric
- Intergrating Measurement with Improvement: An Action-Oriented Approach (JAL, DZ), pp. 380–389.
- SAC-1997-BaumannFRW #database #multi
- The RasDaMan approach to multidimensional database management (PB, PF, RR, NW), pp. 166–173.
- SAC-1997-FeielR #image #search-based
- A genetic approach to color image compression (HF, SR), pp. 252–256.
- SAC-1997-FeinsilverGS #on the #polynomial
- On the computation of polynomial representations of nilpotent Lie groups: a symbolic mathematical approach (PF, UG, RS), pp. 537–539.
- SAC-1997-KhuriSC #finite #string
- Randomness of finite strings: a reconstructive approach (SK, FS, TC), pp. 527–531.
- SAC-1997-LeeLP #empirical #information management #towards #using
- Towards Interoperable Heterogeneous Information Systems: An Experiment Using the DIOM Approach (YL, LL, CP), pp. 112–114.
- SAC-1997-Panda #multi #transaction
- An alternative approach to serialization of multilevel secure Transactions (BP), pp. 134–135.
- SAC-1997-Ritter #authoring
- Group-authoring in CONCORDA DB-based approach (NR), pp. 158–165.
- SAC-1997-SiLL97a #database #documentation #modelling
- A data modeling approach to the seamless information exchange among structured documents and databases (AS, HVL, RWHL), pp. 78–87.
- SAC-1997-TsaurHC #authentication #data access #distributed #geometry #using
- An authentication-combined access control scheme using a geometric approach in distributed systems (WJT, SJH, CHC), pp. 361–365.
- ASF+SDF-1997-DineshT #case study #fault
- A case study of a slicing-based approach for locating type errors (TBD, FT), p. 8.
- DAC-1997-BauerE #hardware
- Hardware/Software Co-Simulation in a VHDL-Based Test Bench Approach (MB, WE), pp. 774–779.
- DAC-1997-CabodiCLQ #clustering #effectiveness #scalability #traversal
- Disjunctive Partitioning and Partial Iterative Squaring: An Effective Approach for Symbolic Traversal of Large Circuits (GC, PC, LL, SQ), pp. 728–733.
- DAC-1997-ChangC #multi #performance
- An Efficient Approach to Multi-Layer Layer Assignment with Application to Via Minimization (CCC, JC), pp. 600–603.
- DAC-1997-ChangLMAC #synthesis
- A Test Synthesis Approach to Reducing BALLAST DFT Overhead (DC, MTCL, MMS, TA, KTC), pp. 466–471.
- DAC-1997-ChenHL #design #power management #re-engineering
- Low Power FPGA Design — A Re-engineering Approach (CSC, TH, CLL), pp. 656–661.
- DAC-1997-KuoC #clustering #network
- A Network Flow Approach for Hierarchical Tree Partitioning (MTK, CKC), pp. 512–517.
- DAC-1997-PomeranzR #fault #multi #simulation #using
- Fault Simulation under the Multiple Observation Time Approach using Backward Implications (IP, SMR), pp. 608–613.
- DAC-1997-WalterLDLMKW #multi #random #simulation #verification
- Hierarchical Random Simulation Approach for the Verification of S/390 CMOS Multiprocessors (JAW, JL, GD, BL, HJM, KWK, BW), pp. 89–94.
- DAC-1997-WillemsBKGM #design #fixpoint
- System Level Fixed-Point Design Based on an Interpolative Approach (MW, VB, HK, TG, HM), pp. 293–298.
- EDTC-1997-BensoPRRU #fault #graph #low level
- A new approach to build a low-level malicious fault list starting from high-level description and alternative graphs (AB, PP, MR, MSR, RU), pp. 560–565.
- EDTC-1997-EisenbieglerKB #correctness #towards
- A constructive approach towards correctness of synthesis-application within retiming (DE, RK, CB), pp. 427–431.
- EDTC-1997-HendricxC #verification
- A symbolic core approach to the formal verification of integrated mixed-mode applications (SH, LJMC), pp. 432–436.
- EDTC-1997-SaxenaNH #estimation #monte carlo
- Monte-Carlo approach for power estimation in sequential circuits (VS, FNN, INH), pp. 416–420.
- EDTC-1997-VerhaeghLAM #multi #scheduling
- Multidimensional periodic scheduling: a solution approach (WFJV, PERL, EHLA, JLvM), pp. 468–474.
- HPDC-1997-KeaheyG #corba #named #parallel
- PARDIS: A Parallel Approach to CORBA (KK, DG), pp. 31–39.
- HPDC-1997-RosuSF #clustering #interface #network #parallel
- Supporting Parallel Applications on Clusters of Workstations: The Intelligent Network Interface Approach (MCR, KS, RF), pp. 159–168.
- PDP-1997-CateRV #composition #data type
- A rigorous approach to the decomposition of data structures (HHtC, MRR, EAHV), pp. 281–288.
- PDP-1997-CorradiLZ #architecture #parallel #tuple
- Multiple tuple spaces onto massively parallel architectures: A hierarchical approach (AC, LL, FZ), pp. 259–264.
- PDP-1997-IsmailC #execution #graph #multi #scheduling
- A greedy approach for scheduling directed cyclic weighted task graphs on multiprocessors running under the macrodataflow model of execution (MAI, TC), pp. 47–53.
- PDP-1997-SenarRCL #clustering #parallel #performance #source code
- An efficient clustering-based approach for mapping parallel programs (MAS, AR, AC, EL), pp. 407–412.
- STOC-1997-BroderFU #graph #random
- Static and Dynamic Path Selection on Expander Graphs: A Random Walk Approach (AZB, AMF, EU), pp. 531–539.
- TAPSOFT-1997-EmersonT #automaton #reasoning
- Generalized Quantitative Temporal Reasoning: An Automata Theoretic Approach (EAE, RJT), pp. 189–200.
- TAPSOFT-1997-VolpanoS #security #type system
- A Type-Based Approach to Program Security (DMV, GS), pp. 607–621.
- CADE-1997-BaaderT #problem #word
- A New Approach for Combining Decision Procedure for the Word Problem, and Its Connection to the Nelson-Oppen Combination Method (FB, CT), pp. 19–33.
- CAV-1997-CamposCM #realtime #verification
- The Verus Tool: A Quantitative Approach to the Formal Verification of Real-Time Systems (SVAC, EMC, MM), pp. 452–455.
- CAV-1997-Hughes #verification
- Formal Verification of Digital Systems, from ASICs to HW/SW Codesign — a Pragmatic Approach (RBH), pp. 3–6.
- CAV-1997-SawadaH #pipes and filters #verification
- Trace Table Based Approach for Pipeline Microprocessor Verification (JS, WAHJ), pp. 364–375.
- CSL-1997-Schiering #graph #higher-order #logic #monad
- A Hierarchical Approach to Monadic Second-Order Logic over Graphs (IS), pp. 424–440.
- ICLP-1997-KagedalD #array #reuse #using
- A Practical Approach to Structure Reuse of Arrays in Single Assignment Languages (AK, SKD), pp. 18–32.
- ADL-1996-WiesenerKB #distributed #documentation #named #scalability #semantics
- SemaLink: An Approach For Semantic Browsing Through Large Distributed Document Spaces (SW, WLJK, RB), pp. 86–94.
- DL-1996-OrendorfK #library
- A Spatial Approach to Organizing and Locating Digital Libraries and Their Content (JO, CJK), pp. 83–89.
- HT-1996-WiilL #hypermedia
- The HyperDisco Approach to Open Hypermedia Systems (UKW, JJL), pp. 140–148.
- VLDB-1996-Atal #database
- The XPS Approach to Loading and Unloading Terabyte Databases (SA), p. 589.
- CSEE-1996-Rosen #assessment #re-engineering
- Individual Assessment of Group Projects in Software Engineering: A Facilitated Peer Assessment Approach (CCHR), pp. 68–77.
- ITiCSE-1996-CarswellB #distance #education #game studies #multi
- An adventure game approach to multimedia distance education (LC, DB), pp. 122–124.
- ITiCSE-1996-SharpH #experience #multi #student
- A multi-media approach to providing software project experience for postgraduate students (HS, PH), pp. 109–115.
- ICSM-1996-Abd-El-Hafiz #comprehension #evaluation #knowledge-based
- Evaluation of a Knowledge-Based Approach to Program Understanding (SKAEH), p. 275–?.
- ICSM-1996-GloverB #agile #domain model #evolution
- An Agent-Based Approach to Rapid Software Evolution Based on a Domain Model (SJG, KHB), pp. 228–237.
- WCRE-1996-Abd-El-Hafiz #comprehension #evaluation #knowledge-based
- Evaluation of a Knowledge-Based Approach to Program Understanding (SKAEH), p. 259–?.
- WCRE-1996-LakeB #assembly #logic #modelling #reverse engineering #source code
- Reverse Engineering of Assembler Programs: A Model-Based Approach and its Logical Basis (TL, TB), pp. 67–75.
- WPC-1996-AlencarCKL #comprehension #design pattern
- A Formal Architectural Design Patterns-Based Approach to Software Understanding (PSCA, DDC, TK, CJPdL), pp. 154–163.
- WPC-1996-WallnauCMK #architecture #comprehension
- The Gadfly: An Approach to Architectural-Level System Comprehension (KCW, PCC, EJM, RK), pp. 178–186.
- FME-1996-AlencarL #design pattern #formal method
- A Formal Approach to Architectural Design Patterns (PSCA, DDC, CJPdL), pp. 576–594.
- FME-1996-BohnJ #design
- A Strategic Approach to Transformational Design (JB, WJ), pp. 609–628.
- FME-1996-SeguinW #category theory #fault tolerance #logic #using #validation
- Using a Logical and Categorical Approach for the Validation of Fault-Tolerant Systems (CS, VW), pp. 347–366.
- ICFP-1996-ChuangH #automation #data transformation #probability #problem
- A Probabilistic Approach to the Problem of Automatic Selection of Data Representations (TRC, WLH), pp. 190–200.
- CHI-1996-Gale #collaboration
- A Collaborative Approach to Developing Style Guides (SG), pp. 362–367.
- CHI-1996-HofmeesterKB #design
- Sensuality in Product Design: A Structured Approach (GHH, JAMK, ACMB), pp. 428–435.
- CHI-1996-Miller #development #multi #using
- Integrating Human Factors in Customer Support Systems Development Using a Multi-Level Organisational Approach (AM), pp. 368–375.
- CSCW-1996-ResselNG #concurrent #editing #undo
- An Integrating, Transformation-Oriented Approach to Concurrency Control and Undo in Group Editors (MR, DNR, RG), pp. 288–297.
- CAiSE-1996-WeigandVD #modelling #transaction
- Interoperable Transactions in Business Models: A Structured Approach (HW, EV, FD), pp. 193–209.
- AKDDM-1996-BerndtC #programming
- Finding Patterns in Time Series: A Dynamic Programming Approach (DJB, JC), pp. 229–248.
- CIKM-1996-FortinL #mining #multi #object-oriented
- An Object-Oriented Approach to Multi-Level Association Rule Mining (SF, LL), pp. 65–72.
- ICML-1996-LiuS #feature model #probability
- A Probabilistic Approach to Feature Selection — A Filter Solution (HL, RS), pp. 319–327.
- ICML-1996-Sebag #bias
- Delaying the Choice of Bias: A Disjunctive Version Space Approach (MS), pp. 444–452.
- ICPR-1996-AmanoHYI #detection #image
- Eigen space approach for a pose detection with range images (TA, SH, AY, SI), pp. 622–626.
- ICPR-1996-Brailovsky #detection #probability
- An approach to outlier detection based on Bayesian probabilistic model (VLB), pp. 70–74.
- ICPR-1996-ChenL96b #online #recognition #rule-based
- On-line handwriting recognition of Chinese characters via a rule-based approach (JWC, SYL), pp. 220–224.
- ICPR-1996-DaniilidisB
- The dual quaternion approach to hand-eye calibration (KD, EBC), pp. 318–322.
- ICPR-1996-ErenshteynLFMS #comprehension #gesture #recognition
- Recognition approach to gesture language understanding (RE, PL, RAF, LM, GS), pp. 431–435.
- ICPR-1996-FengLC #estimation
- Fractional box-counting approach to fractal dimension estimation (JF, WCL, CTC), pp. 854–858.
- ICPR-1996-FrankH #learning
- Pretopological approach for supervised learning (FL, HE), pp. 256–260.
- ICPR-1996-Garcia-SilventeFG #image #multi
- A multi-channel-based approach for extracting significant scales on gray-level images (MGS, JFV, JAG), pp. 231–235.
- ICPR-1996-GofmanK #detection #image #optimisation #symmetry
- Detecting symmetry in grey level images: the global optimization approach (YG, NK), pp. 889–894.
- ICPR-1996-GroBertKN #fuzzy #image
- A new approach to fuzzy morphology based on fuzzy integral and its application in image processing (SG, MK, BN), pp. 625–630.
- ICPR-1996-HeA #clustering #documentation #string
- A clustering-based approach to the separation of text strings from mixed text/graphics documents (SH, NA), pp. 706–710.
- ICPR-1996-HeijdenV #difference
- A landmark-based approach of shape dissimilarity (GWAMvdH, AMV), pp. 120–124.
- ICPR-1996-HennebertRB #2d #segmentation
- A hierarchical approach for scene segmentation based on 2D motion (CH, VR, PB), pp. 218–222.
- ICPR-1996-HoY #programming
- A dynamic programming approach for stereo line matching with structural information (WPH, RKKY), pp. 791–794.
- ICPR-1996-HuangLSSSLTH #classification #nearest neighbour #prototype
- A simulated annealing approach to construct optimized prototypes for nearest-neighbor classification (YSH, KL, CYS, AJS, IIS, MCL, RYT, PKH), pp. 483–487.
- ICPR-1996-HwangH #using
- Performing temporal action with a hand-eye system using the SHOSLIF approach (WSH, SJH), pp. 35–39.
- ICPR-1996-IraniA #2d #3d #detection
- A unified approach to moving object detection in 2D and 3D scenes (MI, PA), pp. 712–717.
- ICPR-1996-JengLLC #detection #geometry #performance #using
- An efficient approach for facial feature detection using geometrical face model (SHJ, HYML, YTL, MYC), pp. 426–430.
- ICPR-1996-JiangHF #detection #documentation #performance
- A fast approach to detect and correct skew documents (HFJ, CCH, KCF), pp. 742–746.
- ICPR-1996-KanungoH #automation #documentation #generative
- Automatic generation of character groundtruth for scanned documents: a closed-loop approach (TK, RMH), pp. 669–675.
- ICPR-1996-LaumyDL #comparison #optimisation
- Segments matching: comparison between a neural approach and a classical optimization way (ML, MD, JTL), pp. 261–265.
- ICPR-1996-LiuL #classification #effectiveness #performance #using
- An efficient and effective texture classification approach using a new notion in wavelet theory (JFL, JCML), pp. 820–824.
- ICPR-1996-MaioM #classification
- A structural approach to fingerprint classification (DM, DM), pp. 578–585.
- ICPR-1996-Marchand-MailletS #analysis #image
- A minimum spanning tree approach to line image analysis (SMM, YMS), pp. 225–230.
- ICPR-1996-Mel #3d #multi #named #recognition #using #visual notation
- SEEMORE: a view-based approach to 3-D object recognition using multiple visual cues (BWM), pp. 570–574.
- ICPR-1996-Molina-GamezS #polynomial #recognition
- Sparse groups: A polynomial middle-level approach for object recognition (MCMG, JBSV), pp. 518–522.
- ICPR-1996-MullotOBLC
- An original approach for extracting circular shapes from technical charts (RM, JMO, FB, YL, MFC), pp. 813–817.
- ICPR-1996-MuraseN #generative #learning #recognition
- Learning by a generation approach to appearance-based object recognition (HM, SKN), pp. 24–29.
- ICPR-1996-MurshedBS #classification #detection #fuzzy #problem
- A fuzzy ARTMAP-based classification system for detecting cancerous cells, based on the one-class problem approach (NAM, FB, RS), pp. 478–482.
- ICPR-1996-NishimuraT #symmetry
- Active shape inferring based on the symmetry in stable poses-shape from function approach (KN, HTT), pp. 136–140.
- ICPR-1996-ParkL #recognition #statistics
- An HMMRF-based statistical approach for off-line handwritten character recognition (HSP, SWL), pp. 320–324.
- ICPR-1996-PeiH #symmetry
- A moment-based approach for deskewing rotationally symmetric shapes (SCP, JHH), pp. 248–252.
- ICPR-1996-PeuraVK #classification
- A new approach to land-based cloud classification (MP, AV, PK), pp. 143–147.
- ICPR-1996-RuskoneGAJ #detection #image
- Vehicle detection on aerial images: a structural approach (RR, LG, SA, OJ), pp. 900–904.
- ICPR-1996-SmitsD #adaptation #image #markov #random #segmentation #using
- Information fusion in a Markov random field-based image segmentation approach using adaptive neighbourhoods (PCS, SGD), pp. 570–575.
- ICPR-1996-SpinuGC #detection #distributed #multi #optimisation #problem
- A multi-agent approach to edge detection as a distributed optimization problem (CS, CG, JMC), pp. 81–85.
- ICPR-1996-TangLMLLS #novel #recognition
- A novel approach to optical character recognition based on ring-projection-wavelet-fractal signatures (YYT, BFL, HM, JL, CHL, CYS), pp. 325–329.
- KDD-1996-FlockhartR #data mining #mining #search-based
- A Genetic Algorithm-Based Approach to Data Mining (IWF, NJR), pp. 299–302.
- KDD-1996-LagusHKK #documentation #interactive #self
- Self-Organizing Maps of Document Collections: A New Approach to Interactive Exploration (KL, TH, SK, TK), pp. 238–243.
- KDD-1996-Lange #empirical #predict #recursion #using
- An Empirical Test of the Weighted Effect Approach to Generalized Prediction Using Recursive Neural Nets (RL), pp. 183–188.
- KDD-1996-PadmanabhanT #database #logic
- Pattern Discovery in Temporal Databases: A Temporal Logic Approach (BP, AT), pp. 351–354.
- KDD-1996-WirthR #database #detection #multi
- Detecting Early Indicator Cars in an Automotive Database: A Multi-Strategy Approach (RW, TPR), pp. 76–81.
- KR-1996-CohnG #representation
- Representing Spatial Vagueness: A Mereological Approach (AGC, NMG), pp. 230–241.
- KR-1996-DungS #reasoning
- An Argumentation-theoretic Approach to Reasoning with Specificity (PMD, TCS), pp. 506–517.
- KR-1996-GiacomoINR
- Moving a Robot: The KR&R Approach at Work (GDG, LI, DN, RR), pp. 198–209.
- KR-1996-Williams #towards
- Towards a Practical Approach to Belief Revision: Reason-Based Change (MAW), pp. 412–420.
- SEKE-1996-ChangDC #fuzzy #metric #usability #using
- Measurement of Usability of Software Using a Fuzzy Systems Approach (EC, TSD, DC), pp. 69–76.
- SEKE-1996-HsiaLK #sequence #testing
- An Early Warning Approach for Method Sequence Testing (PH, XL, DCK), pp. 330–337.
- SEKE-1996-Liu #quality #requirements
- A Quantitative Approach for Assessing the Priorities of Software Quality Requirements (XFL), pp. 377–384.
- SEKE-1996-MillsG #automation #concurrent #design #knowledge-based #realtime
- A Knowledge-based Approach for Automating a Design Method for Concurrent and Real-Time Systems (KLM, HG), pp. 529–536.
- SEKE-1996-RoscaW
- Business Rules in the Real World: A Decision Support Approach (DR, JCW), pp. 121–128.
- SIGIR-1996-HullG #information retrieval #multi #query
- Querying Across Languages: A Dictionary-Based Approach to Multilingual Information Retrieval (DAH, GG), pp. 49–57.
- AdaEurope-1996-CraigenSM #ada
- Ada 95 and Critical Systems: An Analytical Approach (DC, MS, SM), pp. 171–182.
- AdaEurope-1996-KimB #ada #component #reuse #usability
- An Approach to Increasing Software Component Reusability in Ada (HK, CB), pp. 89–100.
- ALP-1996-AnconaZ #algebra #composition #mixin
- An Algebraic Approach to Mixins and Modularity (DA, EZ), pp. 179–193.
- PLILP-1996-Li #implementation #prolog
- Program Sharing: A New Implementation Approach for Prolog (XL), pp. 259–273.
- POPL-1996-ConselN #c #runtime
- A General Approach for Run-Time Specialization and its Application to C (CC, FN), pp. 145–156.
- ICRE-1996-CarlshamreK #requirements #usability
- A Usability-Oriented Approach to Requirements Engineering (PC, JK), pp. 145–153.
- ICRE-1996-LeathrumL #formal method #requirements #standard #testing
- A formal approach to requirements based testing in open systems standards (JFL, KAL), pp. 94–101.
- ICSE-1996-GreenwoodWS #component #evolution #scalability
- Cooperating Evolving Components: A Rigorous Approach to Evolving Large Software Systems (RMG, BW, JS), pp. 428–437.
- ICSE-1996-HeidenreichMK #consistency #re-engineering
- A New Approach to Consistency Control in Software Engineering (GH, MM, DK), pp. 289–297.
- ICSE-1996-SullivanK #architecture #experience #reuse #scalability
- Experience Assessing an Architectural Approach to Large-Scale Systematic Reuse (KJS, JCK), pp. 220–229.
- ICSE-1996-WoodsY #analysis #comprehension #heuristic #problem
- The Program Understanding Problem: Analysis and a Heuristic Approach (SGW, QY), pp. 6–15.
- SAC-1996-BaoH
- A new approach to software tool interoperability (YB, EH), pp. 500–509.
- SAC-1996-BedarhallyPC #algorithm #product line #search-based
- A family elitist approach in genetic algorithms (PVB, RAP, WSC), pp. 238–244.
- SAC-1996-HasemiPAHP #classification #search-based
- A rough-genetic approach for classification of complex data (RH, BAP, RBA, WGH, MGP), pp. 282–288.
- SAC-1996-Langari #fuzzy #logic
- Hierarchical approach to fuzzy logic control (RL), pp. 605–608.
- SAC-1996-Leopold #automation #fuzzy #locality #optimisation
- A fuzzy approach to automatic data locality optimization (CL), pp. 515–518.
- SAC-1996-MisirMC #fuzzy #heuristic
- A heuristic approach to determine the gains of a fuzzy PID controller (DM, HAM, GC), pp. 609–613.
- SAC-1996-PowellFK #documentation #maintenance
- A systematic approach to creating and maintaining software documentation (ALP, JCF, JCK), pp. 201–208.
- ASPLOS-1996-ScalesGT #memory management #named
- Shasta: A Low Overhead, Software-Only Approach for Supporting Fine-Grain Shared Memory (DJS, KG, CAT), pp. 174–185.
- CC-1996-Bosch #compilation #object-oriented
- Delegating Compiler Objects: An Object-Oriented Approach to Crafting Compilers (JB), pp. 326–340.
- DAC-1996-DuttD #clustering
- A Probability-Based Approach to VLSI Circuit Partitioning (SD, WD), pp. 100–105.
- DAC-1996-LeglWE #design
- A Boolean Approach to Performance-Directed Technology Mapping for LUT-Based FPGA Designs (CL, BW, KE), pp. 730–733.
- DAC-1996-LiLLC #clustering #linear
- New Spectral Linear Placement and Clustering Approach (JL, JL, LTL, CKC), pp. 88–93.
- DAC-1996-LimSPS #estimation #process #statistics
- A Statistical Approach to the Estimation of Delay Dependent Switching Activities in CMOS Combinational Circuits (YJL, KIS, HJP, MS), pp. 445–450.
- DAC-1996-SrivastavaP #implementation #linear #optimisation #programmable
- Power Optimization in Programmable Processors and ASIC Implementations of Linear Systems: Transformation-based Approach (MBS, MP), pp. 343–348.
- PDP-1996-DjemameGMB #distributed #simulation
- Distributed Simulation of ECATNets: A Conservative Approach (KD, DCG, LMM, MB), pp. 518–525.
- PDP-1996-HaringKM #monitoring #named
- InHouse — A User-Oriented Monitoring Approach (GH, GK, SM), pp. 478–485.
- PDP-1996-SanchezBT #algorithm #parallel #simulation
- Deblocking Event Algorithm: A New Approach to Conservative Parallel Discrete Event Simulation (VS, AB, FT), pp. 510–517.
- ESOP-1996-PalsbergPL #adaptation #compilation #source code
- A New Approach to Compiling Adaptive Programs (JP, BPS, KJL), pp. 280–295.
- RWLW-1996-WirsingK #formal method #object-oriented #re-engineering
- A formal approach to object-oriented software engineering (MW, AK), pp. 322–360.
- ISSTA-1996-CallahanM #multi #protocol #reliability #validation #verification
- An Approach to Verification and Validation of a Reliable Multicasting Protocol (JRC, TLM), pp. 187–194.
- ISSTA-1996-KoppolT #concurrent #incremental #testing
- An Incremental Approach to Structural Testing of Concurrent Software (PVK, KCT), pp. 14–23.
- ISSTA-1996-MarxF #data flow #pointer #testing
- The Path-Wise Approach to Data Flow Testing with Pointer Variables (DISM, PGF), pp. 135–146.
- LICS-1996-Davies #analysis
- A Temporal-Logic Approach to Binding-Time Analysis (RD), pp. 184–195.
- ADL-1995-NicaR #constraints #documentation #using
- Uniform Structured Document Handling using a Constraint-based Object Approach (AN, EAR), pp. 83–101.
- ICDAR-v1-1995-BertilleG #automation #probability
- A probabilistic approach to automatic handwritten address reading (JMB, MG), pp. 368–371.
- ICDAR-v1-1995-EspositoMS #analysis #knowledge-based #layout
- A knowledge-based approach to the layout analysis (FE, DM, GS), pp. 466–471.
- ICDAR-v1-1995-FangH #algorithm #recognition #testing #using #word
- A hypothesis testing approach to word recognition using an A* search algorithm (CF, JJH), pp. 360–363.
- ICDAR-v1-1995-JonkS #axiom #clustering
- An axiomatic approach to clustering line-segments (AJ, AWMS), pp. 386–389.
- ICDAR-v1-1995-LeeS #classification #formal method #network
- A theory of classifier combination: the neural network approach (DSL, SNS), pp. 42–45.
- ICDAR-v1-1995-LuoAD #string
- Directional mathematical morphology approach for line thinning and extraction of character strings from maps and line drawings (HL, GA, ID), pp. 257–260.
- ICDAR-v1-1995-MurshedBS #verification
- Off-line signature verification, without a priori knowledge of class /spl omega//sub 2/. A new approach (NAM, FB, RS), pp. 191–196.
- ICDAR-v1-1995-RaoA
- Telugu script recognition-a feature based approach (PVSR, TMA), pp. 323–326.
- ICDAR-v1-1995-SabourinG #classification #evaluation #multi #verification
- An extended-shadow-code based approach for off-line signature verification. II. Evaluation of several multi-classifier combination strategies (RS, GG), pp. 197–201.
- ICDAR-v2-1995-BouchaffraM #information retrieval #markov #random
- A Markovian random field approach to information retrieval (DB, JGM), pp. 997–1002.
- ICDAR-v2-1995-DengelD #classification #clustering #documentation #machine learning
- Clustering and classification of document structure-a machine learning approach (AD, FD), pp. 587–591.
- ICDAR-v2-1995-FanCW #image
- A new vectorization-based approach to the skeletonization of binary images (KCF, DFC, MGW), pp. 627–630.
- ICDAR-v2-1995-FanLW #clustering #documentation #segmentation
- A feature point clustering approach to the segmentation of form documents (KCF, JML, JYW), pp. 623–626.
- ICDAR-v2-1995-LiangAS #segmentation #using
- Segmentation of interference marks using morphological approach (SL, MA, MS), pp. 1042–1046.
- ICDAR-v2-1995-MiyaoN #music #network #using
- Head and stem extraction from printed music scores using a neural network approach (HM, YN), pp. 1074–1079.
- ICDAR-v2-1995-NajouaN #robust #segmentation
- A robust approach for Arabic printed character segmentation (NEBA, NE), pp. 865–868.
- ICDAR-v2-1995-NegiSA #segmentation #word
- A correspondence based approach to segmentation of cursive words (AN, KSS, AA), pp. 1034–1037.
- ICDAR-v2-1995-Romeo-PakkerML #segmentation
- A new approach for Latin/Arabic character segmentation (KRP, HM, YL), pp. 874–877.
- ICDAR-v2-1995-TangMMLS #analysis #documentation
- A new approach to document analysis based on modified fractal signature (YYT, HM, XM, DL, CYS), pp. 567–570.
- ICDAR-v2-1995-Yeung #case study #grammar inference #modelling #online #recognition
- A grammatical inference approach to on-line handwriting modeling and recognition: a pilot study (DYY), pp. 1069–1073.
- ICDAR-v2-1995-YouCCC #comprehension #documentation #knowledge-based
- A knowledge-based approach to Chinese archive document understanding (SSY, GHC, PCC, BSC), pp. 553–556.
- ICDAR-v2-1995-Zarri #documentation #information management #knowledge-based #representation
- The “Narrative Knowledge Representation Language”, a knowledge-based approach for representing the “meaning” of textual documents (GPZ), pp. 545–548.
- SIGMOD-1995-HouZ #correctness #database #statistics
- Enhancing Database Correctness: a Statistical Approach (WCH, ZZ), pp. 223–232.
- VLDB-1995-DidriksenGD #database
- Database De-Centralization — A Practical Approach (TD, CAGL, ED), pp. 654–665.
- VLDB-1995-LuSL #data mining #mining #named
- NeuroRule: A Connectionist Approach to Data Mining (HL, RS, HL), pp. 478–489.
- VLDB-1995-LuTD #adaptation #optimisation #query
- The Fittest Survives: An Adaptive Approach to Query Optimization (HL, KLT, SD), pp. 251–262.
- VLDB-1995-Meier #database #migration #tool support
- Providing Database Migration Tools — A Practicioner’s Approach (AM), pp. 635–641.
- VLDB-1995-WienerN
- OODB Bulk Loading Revisited: The Partitioned-List Approach (JLW, JFN), pp. 30–41.
- CSEE-1995-AllenS #education #modelling #requirements
- An Integrated Approach to Teaching Requirements Modelling (PA, LS), pp. 223–237.
- CSEE-1995-CoyneDGR #case study #education #experience #modelling #re-engineering
- Teaching More Comprehensive Model-Based Software Engineering: Experience with Objectory’s Use Case Approach (RFC, AHD, BB, DR), pp. 339–374.
- CSEE-1995-FortinJLUV #industrial #process
- Is this Training? A Unique Approach to Software Process Training in Industry (PDF, CAJ, JRL, KBU, AV), pp. 409–417.
- CSEE-1995-Geier #delphi #overview
- The Delphi Survey Methodology: An Approach to Determine Training Needs (JDG), pp. 389–402.
- CSEE-1995-Gorski #education #re-engineering
- Software Engineering Education: A Dragging-Through Approach (JG), pp. 31–44.
- CSEE-1995-PaprzyckiWZ #distributed #education #parallel #re-engineering
- Parallel and Distributed Computing Education: A Software Engineering Approach (MP, RW, JZ), pp. 187–204.
- ICSM-1995-BoldyreffBHMMY #case study #comprehension
- The AMES approach to application understanding: a case study (CB, EB, RMH, REM, MM, EJY), pp. 182–191.
- WCRE-1995-GallK #source code
- Finding Objects in Procedural Programs: An Alternative Approach (HG, RK), pp. 208–216.
- ICALP-1995-Paun
- Grammar Systems: A Grammatical Approach to Distribution and Cooperation (GP), pp. 429–443.
- CHI-1995-JohnP #case study #learning #using
- Learning and Using the Cognitive Walkthrough Method: A Case Study Approach (BEJ, HP), pp. 429–436.
- CAiSE-1995-BounabG #integration #tool support
- A Federated Approach to Tool Integration (MB, CG), pp. 269–282.
- CAiSE-1995-BurgR #modelling #named
- COLOR-X: Linguistically-based Event Modeling: A General Approach to Dynamic Modeling (JFMB, RPvdR), pp. 26–39.
- CIKM-1995-LukasiewiczKKG #constraints #database #nondeterminism #object-oriented #taxonomy
- Taxonomic and Uncertain Integrity Constraints in Object-Oriented Databases — the TOP Approach (TL, WK, GK, UG), pp. 241–249.
- CIKM-1995-PapazoglouR #metamodelling #semantics
- A Semantic Meta-Modeling Approach to Schema Transformation (MPP, NR), pp. 113–121.
- CIKM-1995-RossBT #named
- MessageWorld: A New Approach to Facilitating Asynchronous Group Communications (DER, JJB, KT), pp. 266–273.
- CIKM-1995-YangP #configuration management #multi
- A Configurable Approach for Object Sharing Among Multidatabase Systems (JY, MPP), pp. 129–136.
- CIKM-1995-YoonSP #database #deduction #object-oriented #query #semantics #using
- Semantic Query Processing in Object-Oriented Databases Using Deductive Approach (SCY, IYS, EKP), pp. 150–157.
- ICML-1995-GambardellaD #learning #named #problem
- Ant-Q: A Reinforcement Learning Approach to the Traveling Salesman Problem (LMG, MD), pp. 252–260.
- ICML-1995-StreetMW #induction #learning #predict
- An Inductive Learning Approach to Prognostic Prediction (WNS, OLM, WHW), pp. 522–530.
- ICML-1995-Wang #incremental #learning
- Learning by Observation and Practice: An Incremental Approach for Planning Operator Acquisition (XW), pp. 549–557.
- KDD-1995-CiampiL #data analysis #design #modelling #network #statistics
- Designing Neural Networks from Statistical Models: A New Approach to Data Exploration (AC, YL), pp. 45–50.
- KDD-1995-KetterlinGK #clustering #concept #database
- Conceptual Clustering in Structured Databases: A Practical Approach (AK, PG, JJK), pp. 180–185.
- KDD-1995-Pazzani #classification
- An Iterative Improvement Approach for the Discretization of Numeric Attributes in Bayesian Classifiers (MJP), pp. 228–233.
- KDD-1995-SkowronS #concurrent #modelling #set
- Discovery of Concurrent Data Models from Experimental Tables: A Rough Set Approach (AS, ZS), pp. 288–293.
- SEKE-1995-Al-SaadoonTE #composition #named #object-oriented
- AURA-CFG/E: An Object-Oriented approach for Acquisition and Decomposition of DFDs from End users (OAAS, WTT, HEb), pp. 1–7.
- SEKE-1995-BarzdinsBK #modelling #rule-based
- Rule-Based Approach to Business Modeling (JB, GB, AK), pp. 161–165.
- SEKE-1995-Dai #re-engineering #reuse
- A Software Engineering Approach to Buildling Reusable Expert System (WD), pp. 212–219.
- SEKE-1995-Debenham #analysis #design #knowledge-based #requirements #specification
- A Unified Approach to Requirements Specification and System Analysis in the Design of Knowledge-Based Systems (JKD), p. 144.
- SEKE-1995-NourO #information management #representation
- An Approach Based on “Frames” for Knowledge Representation and Scenes Interpretation in a Robot-Vision System (MN, KO), pp. 275–282.
- SEKE-1995-Patsouris #framework #information management #object-oriented #representation
- A Unified Framework for Knowledge Representation: A Formal Object-Oriented Approach (PAP), pp. 131–135.
- SIGIR-1995-DanielsR #information retrieval
- A Case-Based Approach To Intelligent Information Retrieval (JJD, ELR), pp. 238–245.
- SIGIR-1995-PfeiferF #data type #performance #query #using
- Efficient Processing of Vague Queries using a Data Stream Approach (UP, NF), pp. 189–197.
- SIGIR-1995-Yang #categorisation #reduction #statistics
- Noise Reduction in a Statistical Approach to Text Categorization (YY), pp. 256–263.
- OOPSLA-1995-HainesMR #named #object-oriented
- SmartFiles: An OO Approach to Data File Interoperabilty (MH, PM, JVR), pp. 453–466.
- AdaEurope-1995-ChoukairK #ada #corba #distributed #object-oriented #programming
- Distributed Object Oriented Programming and Interoperability for Ada 95: An OMG/CORBA Approach (ZC, YK), pp. 217–227.
- AdaEurope-1995-Mangold #ada #named #question
- Ada95 — An Approach to Overcome the Software Crisis? (KM), pp. 4–10.
- LOPSTR-1995-ToniK #logic programming #program transformation
- An Argumentation-Theoretic Approach to Logic Program Transformation (FT, RAK), pp. 61–75.
- LOPSTR-1995-VasconcelosF #logic programming #optimisation #program analysis #using
- An Opportunistic Approach for Logic Program Analysis and Optimisation Using Enhanced Schema-Based Transformations (WWV, NEF), pp. 174–188.
- SAS-1995-WolperB #constraints
- An Automata-Theoretic Approach to Presburger Arithmetic Constraints (PW, BB), pp. 21–32.
- TRI-Ada-1995-Duncan #ada #re-engineering
- Conversion to Ada and Ada 95: A Software Re-engineering Approach (AGD), pp. 121–171.
- TRI-Ada-1995-Shumate #ada #design #specification
- Software Specification and Design with Ada: A Disciplined Approach (KS), pp. 118–119.
- TRI-Ada-1995-Shumate95a #design #specification
- Software Specification and Design: A Disciplined Approach (KS), pp. 687–736.
- RE-1995-FieldsWH #fault #requirements
- A task centered approach to analysing human error tolerance requirements (BF, PCW, MDH), pp. 18–26.
- RE-1995-MaidenMS #how #people #requirements #reuse
- How People Categorise Requirements for Reuse: a Natural Approach (NAMM, PM, AGS), pp. 148–157.
- RE-1995-RegnellKW #case study #requirements
- Improving the use case driven approach to requirements engineering (BR, KK, AW), pp. 40–41.
- FSE-1995-GuptaS #hybrid #information management #slicing #using
- Hybrid Slicing: An Approach for Refining Static Slices Using Dynamic Information (RG, MLS), pp. 29–40.
- ICSE-1995-BoehmBHL #requirements
- Software Requirements Negotiation and Renegotiation Aids: A Theory-W Based Spiral Approach (BWB, PKB, EH, MJL), pp. 243–253.
- ICSE-1995-ChungN #non-functional #requirements
- Dealing with Non-Functional Requirements: Three Experimental Studies of a Process-Oriented Approach (LC, BAN), pp. 25–37.
- ICSE-1995-HenningerLR #analysis #learning
- An Organizational Learning Approach to Domain Analysis (SH, KL, AR), pp. 95–104.
- SAC-1995-Beams #development
- Adding spice to software development: a software development approach designed for rapidly changing environments (JDB), pp. 384–389.
- SAC-1995-CarchioloM #clustering #co-evolution #design #fuzzy
- A fuzzy approach to co-design system partitioning (VC, MM), pp. 514–518.
- SAC-1995-NauckK #classification
- NEFCLASSmdash;a neuro-fuzzy approach for the classification of data (DN, RK), pp. 461–465.
- SAC-1995-SchachY #metric #reuse
- Metrics for targeting candidates for reuse: an experimental approach (SRS, XY), pp. 379–383.
- SAC-1995-SmitsBSD #fuzzy #image #using
- An image processing approach using fuzzy topology (PCS, DdB, AS, SGD), pp. 557–561.
- DAC-1995-ChengL #optimisation
- A Transformation-Based Approach for Storage Optimization (WKC, YLL), pp. 158–163.
- DAC-1995-ChouKW #3d #simulation #using
- Transient Simulations of Three-Dimensional Integrated Circuit Interconnect Using a Mixed Surface-Volume Approach (MC, TK, JW), pp. 485–490.
- DAC-1995-DeCastelo-Vide-e-SouzaPP #algorithm #architecture #optimisation #throughput #using
- Optimal ILP-Based Approach for Throughput Optimization Using Simultaneous Algorithm/Architecture Matching and Retiming (YGDVeS, MP, ACP), pp. 113–118.
- DAC-1995-LiuKCH #clustering #graph #replication #using
- Performance-Driven Partitioning Using a Replication Graph Approach (LTL, MTK, CKC, TCH), pp. 206–210.
- DAC-1995-WuM #2d #optimisation #orthogonal
- Orthogonal Greedy Coupling — A New Optimization Approach to 2-D FPGA Routing (YLW, MMS), pp. 568–573.
- HPDC-1995-RamanjuanBT #clustering #memory management #network #parallel
- Network Shared Memory: A New Approach for Clustering Workstations for Parallel Processing (RSR, JB, KJT), pp. 48–56.
- PDP-1995-ClematisADGL #fault tolerance #object-oriented
- An object oriented approach to fault tolerant software (AC, TA, GD, VG, MLBL), pp. 383–391.
- PDP-1995-DikenelliUOO #database #parallel
- A load balancing approach for parallel database machines (OD, MOÜ, AÖ, EAO), pp. 51–59.
- SOSP-1995-FongS #resource management #scheduling
- Time-Function Scheduling: A General Approach To Controllable Resource Management (LLF, MSS), p. 230.
- TAPSOFT-1995-Karger #algebra #logic
- An Algebraic Approach to Temporal Logic (BvK), pp. 232–246.
- TAPSOFT-1995-Schieferdecker #specification
- Performance-Oriented Formal Specifications - the LotoTis Approach (IS), pp. 772–786.
- CAV-1995-EmersonS #model checking #symmetry
- Utilizing Symmetry when Model Checking under Fairness Assumptions: An Automata-theoretic Approach (EAE, APS), pp. 309–324.
- CAV-1995-Vardi #synthesis
- An Automata-Theoretic Approach to Fair Realizability and Synthesis (MYV), pp. 267–278.
- ICLP-1995-YuanY #logic programming #on the
- On Coherence Approach to Logic Program Revision (LYY, JHY), pp. 167–181.
- ICLP-1995-Zhou #logic programming
- A Logic Programming Approach to Channel Routing (NFZ), pp. 217–231.
- ILPS-1995-BigotD
- A Simple Approach to Supporting Untagged Objects in Dynamically Typed Languages (PAB, SKD), pp. 257–271.
- ILPS-1995-LauO #constraints #deduction #formal method #logic programming #source code #synthesis
- A Formal Approach to Deductive Synthesis of Constraint Logic Programs (KKL, MO), pp. 543–557.
- ILPS-1995-MalfonF #semantics #source code
- Type Correct programs: A semantic approach (BM, GF), pp. 576–590.
- ILPS-1995-PedroM #logic programming #verification
- An Approach to Verification in Contextual Logic Programming (VP, LM), p. 634.
- DL-1994-FayyadS #analysis #automation #image #library #machine learning
- The Automated Analysis, Cataloging, and Searching of Digital Image Libraries: A Machine Learning Approach (UMF, PS), pp. 225–249.
- PODS-1994-AgrawalBAK #transaction
- Relative Serializbility: An Approach for Relaxing the Atomicity of Transactions (DA, JLB, AEA, VK), pp. 139–149.
- VLDB-1994-BaralisW #algebra #analysis #database
- An Algebraic Approach to Rule Analysis in Expert Database Systems (EB, JW), pp. 475–486.
- VLDB-1994-JonscherD #database
- An Approach for Building Secure Database Federations (DJ, KRD), pp. 24–35.
- VLDB-1994-MuntzR #modelling #re-engineering
- A Requirement-Based Approach to Data Modeling and Re-Engineering (AHM, CTR), pp. 643–654.
- VLDB-1994-OuzzaniAB #top-down
- A Top-Down Approach for Two Level Serializability (MO, MAA, NLB), pp. 226–237.
- CSEE-1994-CardowW #education #reuse
- A Practical Approach to Teaching Software Reuse (JEC, WDWJ), pp. 517–525.
- CSEE-1994-GotterbarnR #re-engineering
- Real-World Software Engineering: A Spiral Approach to a Project-Oriented Course (DG, RR), pp. 119–150.
- CSEE-1994-Weinberger #delivery
- Awareness Week at Texas Instruments: An Alternative Approach to Instructor-Led Delivery (BJW), pp. 245–250.
- FME-1994-CordeiroSM #development #eiffel
- From MooZ to Eiffel — A Rigorous Approach to System Development (VAOC, AS, SRdLM), pp. 306–325.
- FME-1994-MensMS #formal method #named #object-oriented
- OPUS: a Formal Approach to Object-Orientation (TM, KM, PS), pp. 326–345.
- TAGT-1994-AlberichBRVW #algebra #graph transformation
- A Partial Algebras Approach to Graph Transformation (RA, PB, FR, GV, BW), pp. 1–15.
- TAGT-1994-Bauderon #generative #graph #infinity
- A Category-Theoretical Approach to Vertex Replacement: The Generation of Infinite Graphs (MB), pp. 27–37.
- CHI-1994-SparksMB94a #object-oriented
- An object-oriented approach to dialogue management in spoken language systems (RS, LM, HB), pp. 211–217.
- CSCW-1994-WanJ #collaboration #learning #using
- Computer Supported Collaborative Learning Using CLARE: The Approach and Experimental Findings (DW, PMJ), pp. 187–198.
- CAiSE-1994-Johannesson #communication #information management #representation #speech
- Representation and Communication in Information Systems — A Speech Act Based Approach (PJ), pp. 200–213.
- CAiSE-1994-MorenoRS
- A Generic Approach to Support a Way-of-Working Definition (MM, CR, CS), pp. 367–379.
- CAiSE-1994-ThiemeS #behaviour
- An Approach to Schema Integratioin Based on Transformations and Behaviour (CT, AS), pp. 297–310.
- CIKM-1994-HuC #database #relational #set
- Discovery of Decision Rules in Relational Databases: A Rough Set Approach (XH, NC), pp. 392–400.
- CIKM-1994-LabrouF #communication #semantics
- A Semantics Approach for KQML — A General Purpose Communication Language for Software Agents (YL, TWF), pp. 447–455.
- CIKM-1994-LamirelC #database #design #interactive #learning #online
- Application of a Symbolico-Connectionist Approach for the Design of a Highly Interactive Documentary Database Interrogation System with On-Line Learning Capabilities (JCL, MC), pp. 155–163.
- CIKM-1994-ZhaoZ #database #graph #roadmap #traversal
- Spatial Data Traversal in Road Map Databases: A Graph Indexing Approach (JLZ, AZ), pp. 355–362.
- ICML-1994-GervasioD #incremental #learning
- An Incremental Learning Approach for Completable Planning (MTG, GD), pp. 78–86.
- ICML-1994-Jordan #modelling #statistics
- A Statistical Approach to Decision Tree Modeling (MIJ), pp. 363–370.
- KDD-1994-HammondBS #navigation
- A Case-Based Approach to Knowledge Navigation (KJH, RDB, KS), pp. 383–394.
- KR-1994-DelgrandeS #reasoning
- A General Approach to Specificity in Default Reasoning (JPD, TS), pp. 146–157.
- SEKE-1994-Rolland #process #requirements
- A contextual approach for the requirements engineering process (CR), pp. 28–35.
- ECOOP-1994-PeltonenMAS #prototype
- Product Configurations — An Application for Prototype Object Approach (HP, TM, KA, RS), pp. 513–534.
- ECOOP-1994-WieringaJS #logic #subclass
- Roles and Dynamic Subclasses: A Modal Logic Approach (RW, WdJ, PS), pp. 32–59.
- OOPSLA-1994-GronbaekM #hypermedia
- Building Tailorable Hypermedia Systems: The Embedded-Interpreter Approach (KG, JM), pp. 85–101.
- OOPSLA-1994-KarpovichGF #file system #object-oriented #performance
- Extensible File Systems (ELFS): An Object-Oriented Approach to High Performance File I/O (JFK, ASG, JCF), pp. 191–204.
- TOOLS-EUROPE-1994-AdnaniS #information management #named #object-oriented
- SPATIO2: An Object Oriented Approach for a Generalized Spatial Information System (MEA, MS), pp. 375–381.
- TOOLS-EUROPE-1994-PapaGRFCM #documentation #multi #object-oriented
- An Object-Oriented Approach to Manage Multimedia Documents (MPP, SG, GR, AF, GC, GM), pp. 35–47.
- AdaEurope-1994-DissauxFLM #ada
- A New Approach for HOOD/Ada Mapping (PD, PF, PL, PM), pp. 147–154.
- LOPSTR-1994-SakamaS #declarative #deduction #logic programming #source code
- Partial Deduction of Disjunctive Logic Programs: A Declarative Approach (CS, HS), pp. 170–182.
- PLILP-1994-BoulangerBD #using
- Abstracting s-semantincs Using A Model-Theoretic Approach (DB, MB, MD), pp. 432–446.
- POPL-1994-HarperL #higher-order
- A Type-Theoretic Approach to Higher-Order Modules with Sharing (RH, ML), pp. 123–137.
- TRI-Ada-1994-Kortright #component #development #incremental #reuse
- An Incremental Approach to the Development of Reusable General-Purpose Discrete-Event Simulator Components (LMLK), pp. 486–493.
- TRI-Ada-1994-Riley #modelling #object-oriented #process
- An Object-Oriented Approach to Software Process Modeling and Definition (JDR), pp. 16–22.
- TRI-Ada-1994-WelkerS #ada #re-engineering
- Software Reengineering in Ada: A Practical Approach (KDW, MWS), pp. 248–254.
- ICRE-1994-LiangP #clustering #pattern matching #requirements
- A pattern matching and clustering based approach for supporting requirements transformation (JL, JDP), pp. 180–183.
- ICRE-1994-WoodCS #modelling #multi #requirements
- A multimedia approach to requirements capture and modeling (DPW, MGC, SMS), pp. 53–56.
- FSE-1994-LevyS #independence #specification
- A Language-Independent Approach to Specification Construction (NL, GS), pp. 76–86.
- ICSE-1994-GargMPST #process
- The SMART Approach for Software Process Engineering (PKG, PM, TP, WS, GT), pp. 341–350.
- ICSE-1994-Johnson #overview #perspective #quality
- An Instrumented Approach to Improving Software Quality Through Formal Technical Review (PMJ), pp. 113–122.
- ICSE-1994-KeaneH #case study #experience #formal method #parallel
- A Formal Approach to Determining Parallel Resource Bindings: Experience Report (JAK, WH), pp. 15–22.
- KBSE-1994-JengC #component #formal method #reuse
- A Formal Approach to Reusing More General Components (JJJ, BHCC), pp. 90–97.
- KBSE-1994-LowryPPU94a #design #formal method
- A Formal Approach to Domain-Oriented Software Design Environments (MRL, AP, TP, IU), pp. 48–57.
- SAC-1994-RaoI #probability #problem
- A stochastic approach to the bin-packing problem (RLR, SSI), pp. 261–265.
- CC-1994-PineoS #debugging
- A Practical Approach to the Symbolic Debugging of Parallelized Code (PPP, MLS), pp. 339–356.
- DAC-1994-MadhwapathySBP #multi
- A Unified Approach to Multilayer Over-the-Cell Routing (SM, NAS, SB, AP), pp. 182–187.
- DAC-1994-MehrotraFL #optimisation #probability
- Stochastic Optimization Approach to Transistor Sizing for CMOS VLSI Circuits (SM, PDF, WL), pp. 36–40.
- DAC-1994-ParkesBP #generative #named #object-oriented #parallel #testing
- ProperHITEC: A Portable, Parallel, Object-Oriented Approach to Sequential Test Generation (SP, PB, JHP), pp. 717–721.
- DAC-1994-PuriG #clustering #composition #synthesis
- A Modular Partitioning Approach for Asynchronous Circuit Synthesis (RP, JG), pp. 63–69.
- DAC-1994-SarabiSCP #2d #array #design #logic #physics #synthesis
- A Comprehensive Approach to Logic Synthesis and Physical Design for Two-Dimensional Logic Arrays (AS, NS, MCJ, MAP), pp. 321–326.
- DAC-1994-SilveiraEWCK #performance #simulation #using
- An Efficient Approach to Transmission Line Simulation Using Measured or Tabulated S-parameter Data (LMS, IME, JW, MC, KSK), pp. 634–639.
- EDAC-1994-AhmedCC #fault #modelling #optimisation #using
- A Model-based Approach to Analog Fault Diagnosis using Techniques from Optimisation (SA, PYKC, PC), p. 665.
- EDAC-1994-FummiSS #fault #functional #generative #testing
- A Functional Approach to Delay Faults Test Generation for Sequential Circuits (FF, DS, MS), pp. 51–57.
- EDAC-1994-HahnKB #fault
- A Hierarchical Approach to Fault Collapsing (RH, RK, BB), pp. 171–176.
- EDAC-1994-JamoussiK #evaluation #named #testing
- M-Testability: An Approach for Data-Path Testability Evaluation (MJ, BK), pp. 449–455.
- EDAC-1994-LinKL #synthesis
- Direct Synthesis of Hazard-Free Asynchronous Circuits from STGs Based on Lock Relation and BG-Decomposition Approach (KJL, JWK, CSL), pp. 178–183.
- EDAC-1994-MoserNAAP #behaviour #modelling #visual notation
- A Graphical Approach to Analogue Behavioural Modelling (VM, PN, HPA, LA, FP), pp. 535–539.
- EDAC-1994-VuksicF #fault #testing
- A New BIST Approach for Delay Fault Testing (AV, KF), pp. 284–288.
- PDP-1994-GonzalezSSC #concurrent #latency
- A New Approach To Concurrent Ring: 1 Bit latency (JDSG, ÁSS, CS, CMRC), pp. 559–565.
- PDP-1994-MoonsV #distributed #persistent
- Persistence In Open Distributed Systems : The COMET Approach (HM, PV), pp. 342–349.
- PDP-1994-StuartW #algorithm #linear #parallel #using #visualisation
- The Enhancement Of Parallel Numerical Linear Algorithms Using A Visualization Approach (EJS, JSW), pp. 274–281.
- STOC-1994-ApsitisFS #learning
- Choosing a learning team: a topological approach (KA, RF, CHS), pp. 283–289.
- CADE-1994-Paulson #implementation #induction
- A Fixedpoint Approach to Implementing (Co)Inductive Definitions (LCP), pp. 148–161.
- CAV-1994-BernholtzVW #model checking
- An Automata-Theoretic Approach to Branching-Time Model Checking (OB, MYV, PW), pp. 142–155.
- ICLP-1994-Barthelemy #definite clause grammar #parsing
- A Grammatical Approach to DCG Parsing (FB), pp. 632–646.
- ICLP-1994-BoulangerS #abstract interpretation #compilation
- Compiling Control Revisited: A New Approach based upon Abstract Interpretation (DB, DDS), pp. 699–713.
- ICLP-1994-DixM #axiom #semantics #source code
- An Axiomatic Approach to Semantics of Disjunctive Programs (JD, MM), pp. 303–320.
- ISSTA-1994-FleyshgakkerW #analysis #mutation testing #performance
- Efficient Mutation Analysis: A New Approach (VNF, SNW), pp. 185–195.
- ISSTA-1994-MurrillM #fault #semantics #using
- An Experimental Approach to Analyzing Software Semantics Using Error Flow Information (BWM, LJM), p. 200.
- HT-1993-Chang #automation #generative #named
- HieNet: A User-Centered Approach for Automatic Link Generation (DTC), pp. 145–158.
- ICDAR-1993-Armand #recognition #recursion
- Musical score recognition: A hierarchical and recursive approach (JPA), pp. 906–909.
- ICDAR-1993-BelaidA #documentation
- A labeling approach for mixed document blocks (AB, OTA), pp. 749–752.
- ICDAR-1993-Bertille #recognition
- An elastic matching approach applied to digit recognition (JMB), pp. 82–83.
- ICDAR-1993-ChenD #recognition #word
- Word recognition in a segmentation-free approach to OCR (CHC, JLD), pp. 573–576.
- ICDAR-1993-Conway #documentation #layout #parsing #recognition
- Page grammars and page parsing. A syntactic approach to document layout recognition (AC), pp. 761–764.
- ICDAR-1993-HaoWN #analysis #classification #documentation #layout #segmentation
- Nested segmentation: an approach for layout analysis in document classification (XH, JTLW, PAN), pp. 319–322.
- ICDAR-1993-IwaneYI #analysis #classification #documentation #functional #image #layout
- A functional classification approach to layout analysis of document images (KI, MY, OI), pp. 778–781.
- ICDAR-1993-LiuZT #online #recognition
- A new approach to on-line handwritten Chinese character recognition (YJL, LQZ, JT), pp. 192–195.
- ICDAR-1993-SabourinCG #verification
- An extended-shadow-code based approach for off-line signature verification (RS, MC, GG), pp. 1–5.
- ICDAR-1993-SinK #online #recognition #statistics
- A statistical approach with HMMs for on-line cursive Hangul (Korean script) recognition (BKS, JHK), pp. 147–150.
- ICDAR-1993-TaiLZ #detection #feature model #modelling #recognition
- A model based detecting approach for feature extraction of off-line handwritten Chinese character recognition (JWT, YJL, LQZ), pp. 826–829.
- ICDAR-1993-Viard-GaudinNB #2d #algorithm #using
- A bar code location algorithm using a two-dimensional approach (CVG, NN, DB), pp. 45–48.
- ICDAR-1993-YuTS #architecture #documentation
- Document architecture language (DAL) approach to document processing (CLY, YYT, CYS), pp. 103–106.
- PODS-1993-WongA #concurrent #semantics
- Context-Based Synchronisation: An Approach beyond Semantics for Concurrency Control (MHW, DA), pp. 276–287.
- SIGMOD-1993-AnanthanarayananGKLP #object-oriented #relational #using
- Using the Co-existence Approach to Achieve Combined Functionality of Object-Oriented and Relational Systems (RA, VG, WK, TJL, HP), pp. 109–118.
- SIGMOD-1993-HongJC #realtime #scheduling #transaction
- Real-Time Transaction Scheduling: A Cost Conscious Approach (DH, TJ, SC), pp. 197–206.
- SIGMOD-1993-WangJS #database #towards
- Temporal Modules: An Approach Toward Federated Temporal Databases (XSW, SJ, VSS), pp. 227–236.
- VLDB-1993-Grefen #declarative #specification #theory and practice #transaction
- Combining Theory and Practice in Integrity Control: A Declarative Approach to the Specification of a Transaction Modification Subsystem (PWPJG), pp. 581–591.
- VLDB-1993-IshikawaK #constraints #database #multi #object-oriented
- An Active Object-Oriented Database: A Multi-Paradigm Approach to Constraint Management (HI, KK), pp. 467–478.
- VLDB-1993-MitchellDZ #query
- Control of an Extensible Query Optimizer: A Planning-Based Approach (GM, UD, SBZ), pp. 517–528.
- VLDB-1993-PonceletTCL #database #design #formal method #towards
- Towards a Formal Approach for Object Database Design (PP, MT, RC, LL), pp. 278–289.
- VLDB-1993-PoulovassilisS #database #functional #logic
- A Domain-theoretic Approach to Integrating Functional and Logic Database Languages (AP, CS), pp. 416–428.
- CSM-1993-Chu #re-engineering
- A Re-Engineering Approach to Program Translation (WCC), pp. 42–50.
- WCRE-1993-BertelsVB #comprehension
- A Cognitive Approach to Program Understanding (KB, PV, CDB), pp. 1–7.
- WCRE-1993-PremerlaniB #database #relational #reverse engineering
- An Approach for Reverse Engineering of Relational Databases (WJP, MRB), pp. 151–160.
- WCRE-1993-Quilici #hybrid #programming
- A Hybrid Approach to Recognizing Programming Plans (AQ), pp. 126–133.
- ICALP-1993-Blum #reliability #source code
- Program Result Checking: A New Approach to Making Programs More Reliable (MB), pp. 1–14.
- RTA-1993-Field #graph #incremental #reduction #term rewriting
- A Graph Reduction Approach to Incremental Term Rewriting (JF), pp. 259–273.
- RTA-1993-Werner #order #semantics
- A Semantic Approach to Order-Sorted Rewriting (AW), pp. 47–61.
- HCI-ACS-1993-Franco #hypermedia
- From Risk to Disease: Capturing Knowledge by a Hypertext Approach (GF), pp. 438–443.
- HCI-ACS-1993-LimC #cumulative
- An Integrated Approach to Cumulative Trauma Disorders in Computerized Offices: The Role of Psychosocial Work Factors, Psychological Stress and Ergonomic Risk Factors (SYL, PC), pp. 880–885.
- HCI-SHI-1993-ChenN #modelling
- An Associative Approach in Dynamic User Modeling (QC, AFN), pp. 909–914.
- HCI-SHI-1993-Cohill #design #development #interface #tool support
- Information Tools: A New Approach to Interface Design and Development (AMC), pp. 915–920.
- HCI-SHI-1993-HerczegHR #design #programming #user interface #visual notation
- A New Approach to Visual Programming in User Interface Design (JH, HH, MR), pp. 74–79.
- HCI-SHI-1993-KirschA #education #multi #using #visual notation
- Using Multimedia to Teach Visual Literacy: A Systematic Approach (RPK, RMA), pp. 531–536.
- HCI-SHI-1993-ResselHH #multi
- An Eventful Approach to Multi-Media, Multi-User Applications (MR, HH, JH), pp. 428–433.
- HCI-SHI-1993-Warren #development #modelling #realtime #safety #tool support
- The TOM Approach to System Development: Methods and Tools for Task Oriented Modelling of Real-Time Safety Critical Systems (CW), pp. 285–290.
- HCI-SHI-1993-YoungM #assessment #learning #problem
- A Situated Cognition Approach to Problem Solving with Implications for Computer-Based Learning and Assessment (MFY, MDM), pp. 825–830.
- INTERCHI-1993-HudsonH #independence #specification
- A synergistic approach to specifying simple number independent layouts by example (SEH, CNH), pp. 285–292.
- CAiSE-1993-BreuLSBPU #architecture #development #distributed #information management
- The BOS-Method Architecture: An Improved Structured Approach for the Development of Distributed Information Systems (MB, GL, BPdS, LB, MP, JCU), pp. 221–233.
- CAiSE-1993-EwaldO #evolution
- A Procedural Approach to Schema Evolution (CAE, MEO), pp. 22–38.
- CAiSE-1993-PipraniM #multi #requirements #specification
- A Multi-Model Approach for Deriving Requirements Specifications for a Mega-Project (CBP, RBM), pp. 199–220.
- CAiSE-1993-Seltveit #development #information management #scalability
- An Abstraction-Based Rule Approach to Large-Scale Information Systems Development (AHS), pp. 328–351.
- CAiSE-1993-SpanoudakisC #concept #modelling #reuse #similarity
- Similarity for Analogical Software Reuse: A Conceptual Modelling Approach (GS, PC), pp. 483–503.
- CAiSE-1993-VlachantonisHGDCE #information management #reliability #towards
- Towards Reliable Information Systems: The KorSo Approach (NV, RH, MG, GD, SC, HDE), pp. 463–482.
- CAiSE-1993-WangHH #database #hypermedia #object-oriented
- An Object Oriented Database Approach for Supporting Hypertext (BW, PH, TH), pp. 601–628.
- CIKM-1993-Anderson #database #deduction #knowledge base #multi #problem #statistics
- A Dynamic Knowledge Based Approach to the Problem of Deduction in a Non-Statistical Multilevel Secure Database (MA), pp. 154–163.
- CIKM-1993-BhatiaY #information management
- A New Approach to Knowledge Acquisition by Repertory Grids (SKB, QY), pp. 738–740.
- CIKM-1993-ElmasriKF #database #modelling #object-oriented
- Temporal Database Modeling: An Object-Oriented Approach (RE, VK, SF), pp. 574–585.
- CIKM-1993-HwangHS #concurrent #database
- Concurrency Control in Federated Databases: A Dynamic Approach (SYH, JH, JS), pp. 694–703.
- CIKM-1993-Shum #semantics
- Quick and Incomplete Responses: The Semantic Approach (CDS), pp. 39–48.
- CIKM-1993-Zlatareva #assurance #knowledge base #quality
- An Integrated Approach to Quality Assurance of Expert System Knowledge Bases (NZ), pp. 85–94.
- ICML-1993-CarpinetoR #clustering #concept #named
- GALOIS: An Order-Theoretic Approach to Conceptual Clustering (CC, GR), pp. 33–40.
- ICML-1993-JordanJ #divide and conquer #learning #statistics
- Supervised Learning and Divide-and-Conquer: A Statistical Approach (MIJ, RAJ), pp. 159–166.
- SEKE-1993-BoetticherSE #metric
- A Neural Net-Based Approach to Software Metrics (GDB, KS, DE), pp. 271–274.
- SEKE-1993-MinouraCS #lifecycle
- The SAOS Approach to Software Lifecycle Support (TM, SC, AS), pp. 54–61.
- SEKE-1993-TsaiLN #debugging #requirements #specification
- Debugging Logic-Based Requirements Specifications — a FRORL Approach (JJPT, AL, KRN), pp. 372–379.
- SIGIR-1993-Kupiec #named #online #robust #using
- MURAX: A Robust Linguistic Approach for Question Answering Using an On-Line Encyclopedia (JK), pp. 181–190.
- ECOOP-1993-Jezequel #compilation #library #parallel #reuse
- Transparent Parallelisation Through Reuse: Between a Compiler and a Library Approach (JMJ), pp. 384–405.
- OOPSLA-1993-Hauck #inheritance
- Inheritance Modeled with Explicit Bindings: An Approach to Typed Inheritance (FJH), pp. 231–239.
- TOOLS-EUROPE-1993-BahsounFS #design #implementation #object-oriented
- Designing and Implementing Synchronization: an Object Oriented Approach (JPB, LF, JCS), pp. 235–248.
- TOOLS-EUROPE-1993-Howard #eiffel #standard
- Associated Paper: The NICE Approach to Eiffel Standardization (RH), p. 273.
- TOOLS-EUROPE-1993-Jacobson #case study #object-oriented #re-engineering
- Object-Oriented Software Engineering — a Use Case Driven Approach (IJ), p. 333.
- TOOLS-EUROPE-1993-LaurentS #case study #industrial #object-oriented
- “Traditional” versus Object-Oriented Approach: a Case Study in an Industrial Environment (PL, NS), pp. 109–114.
- TOOLS-EUROPE-1993-Marcaillou-EbersoldCV #modelling
- An Approach to View Point Modelling (SME, BC, DPV), pp. 151–164.
- TOOLS-PACIFIC-1993-Jentzsch #concept
- Deriving a Conceptual Model: a Business Forms Approach (RJ), pp. 7–19.
- TOOLS-USA-1993-MorabitoS #analysis #design #object-oriented
- A New Approach to Object-Oriented Analysis and Design (JM, MSS), pp. 45–55.
- TOOLS-USA-1993-ParrottW #development #object-oriented
- Media Language: An Object-Oriented Approach to Generic Application Development (CP, PW), pp. 173–191.
- TOOLS-USA-1993-Polze #c++ #communication
- The Object Space Approach: Decoupled Communication in C++ (AP), pp. 195–204.
- PLDI-1993-Pinter #scheduling
- Register Allocation with Instruction Scheduling: A New Approach (SSP), pp. 248–257.
- PLILP-1993-LimS #constraints #logic programming #metaprogramming
- A Conservative Approach to Meta-Programming in Constraint Logic Programming (PL, JS), pp. 44–59.
- TRI-Ada-1993-GrossmanKE #ada #automation #programming
- Automating the Ada Programming Rrocess: A Domain-Specific Approach (FG, RJK, CBEJ), pp. 302–311.
- ESEC-1993-Kunzmann-Combelles
- Quantitative Approach to Software Management: the ami Method (AKC), pp. 238–250.
- ESEC-1993-TuyaSZC #design #realtime #specification
- A Pragmatic Task Design Approach Based on a Ward/Mellor Real-Time Structured Specification (JT, LS, RZ, JAC), pp. 301–312.
- FSE-1993-Turpin #data type #logic
- A Logical Approach to Data Structures (RT), pp. 138–148.
- FSE-1993-Wood #calculus #re-engineering #refinement #using
- A Practical Approach to Software Engineering Using Z and the Refinement Calculus (KRW), pp. 79–88.
- ICSE-1993-BandinelliF #modelling #process
- Computational Reflection in Software Process Modeling: The SLANG Approach (SB, AF), pp. 144–154.
- ICSE-1993-DrakeXTZ #analysis #case study
- Approach and Case Study of Requirement Analysis Where End Users Take an Active Role (JMD, WWX, WTT, IAZ), pp. 177–186.
- ICSE-1993-Lakhotia #rule-based
- Rule-Based Approach to Computing Module Cohesion (AL), pp. 35–44.
- KBSE-1993-KingstonVD #development #evaluation #hybrid #using
- Development of an Expert Assistant for Software Evaluation using a Hybrid Approach (GK, RV, PD), p. 26.
- KBSE-1993-MiS #named #process
- Articulation: An Integrated Approach to the Diagnosis, Replanning, and Rescheduling of Software Process Failures (PM, WS), p. 14.
- KBSE-1993-Scacchi #knowledge-based #process
- A Knowledge-Based Approach To Software Process Engineering (WS), p. 3.
- KBSE-1993-SmithP #scheduling
- Transformational Approach to Transportation Scheduling (DS, EAP), p. 12.
- SAC-1993-CanL #information retrieval #named
- HypIR: A Hypertext-Based Approach to Information Retrieval (FC, YML), pp. 729–736.
- SAC-1993-Jimenez-CedenoV #communication #network #predict #realtime
- Centralized Packet Radio Network: A Communication Approach Suited for Data Collection in a Real-Time Flash Flood Prediction System (MJC, RVE), pp. 709–713.
- SAC-1993-Larouk #logic #statistics
- Linguistico-Statistical Approach and Logics Applied in Documentary System (OL), pp. 737–744.
- SAC-1993-Liu #complexity
- To Approach an Intelligent System in Coping with an Aspect of Complexity of Water Management (YL), pp. 460–468.
- SAC-1993-LungU #analysis #integration #reuse
- Integration of Domain Analysis and Analogical Approach for Software Reuse (CHL, JEU), pp. 48–53.
- SAC-1993-PurdinH #search-based
- A Genetic-Algorithm Approach to Solving Crossword Puzzles (TDMP, GH), pp. 263–270.
- SAC-1993-Sabharwal #parametricity
- An Intelligent Approach to Discrete Sampling of Parametric Curves (CLS), pp. 397–401.
- DAC-1993-HamadaCC #linear #named #network #using
- Prime: A Timing-Driven Placement Tool using A Piecewise Linear Resistive Network Approach (TH, CKC, PMC), pp. 531–536.
- DAC-1993-HojatiSBK #model checking
- A Unified Approach to Language Containment and Fair CTL Model Checking (RH, TRS, RKB, RPK), pp. 475–481.
- DAC-1993-HuangPS #approximate #heuristic #polynomial #problem
- A Polynomial-Time Heuristic Approach to Approximate a Solution to the False Path Problem (STH, TMP, JMS), pp. 118–122.
- DAC-1993-MogakiSKH #layout
- Cooperative Approach to a Practical Analog LSI Layout System (MM, YS, MK, TH), pp. 544–549.
- DAC-1993-PapachristouHN #synthesis
- An Approach for Redesigning in Data Path Synthesis (CAP, HH, MN), pp. 419–423.
- DAC-1993-ParikhA #cost analysis
- A Cost-Based Approach to Partial Scan (PSP, MA), pp. 255–259.
- PDP-1993-ScarabottoloSS #detection #parallel
- Edge detection on massively parallel machines: a local threshold approach (NS, DGS, MS), pp. 14–21.
- PDP-1993-WuWF #fault tolerance #hardware
- A uniform approach to software and hardware fault tolerance (JW, YMW, EBF), pp. 409–416.
- PPoPP-1993-SandhuGZ #multi
- The Shared Regions Approach to Software Cache Coherence on Multiprocessors (HSS, BG, SZ), pp. 229–238.
- SOSP-1993-JongeKH #file system #logic
- The Logical Disk: A New Approach to Improving File Systems (WdJ, MFK, WCH), pp. 15–28.
- CAV-1993-BalarinS
- An Iterative Approach to Language Containment (FB, ALSV), pp. 29–40.
- ICLP-1993-MeklyY #automation #generative #logic programming #modelling #requirements #testing
- A Logic Programming Approach to Requirements Modelling and Automated Test Generation (LJM, MPY), p. 849.
- ILPS-1993-BandaH #analysis #source code
- A Practical Approach to the Global Analysis of CLP Programs (MJGdlB, MVH), pp. 437–455.
- ILPS-1993-DongL #deduction #query
- A Deductive Approach to Hypothetical Query Answering (FD, LVSL), pp. 609–628.
- ILPS-1993-LifschitzMT #automation #logic programming #reasoning
- Automated Reasoning About Actions: A Logic Programming Approach (VL, NM, HT), p. 641.
- IWPTS-1993-Tretmans #consistency #formal method #testing
- A Formal Approach to Conformance Testing (JT), pp. 257–276.
- HT-ECHT-1992-Caloini #hypermedia #modelling
- Matching Hypertext Models to Hypertext Systems: A Compilative Approach (AC), pp. 91–101.
- HT-ECHT-1992-LeluF #hypermedia #information retrieval #paradigm
- Hypertext Paradigm in the Field of Information Retrieval: A Neural Approach (AL, CF), pp. 112–121.
- PODS-1992-AgrawalAJ #protocol #transaction
- An Approach to Eliminate Transaction Blocking in Locking Protocols (DA, AEA, RJ), pp. 223–235.
- PODS-1992-GinsburgW #pattern matching #query #towards
- Pattern Matching by Rs-Operations: Toward a Unified Approach to Querying Sequenced Data (SG, XSW), pp. 293–300.
- SIGMOD-1992-LieuwenD #database #optimisation #programming language
- A Transformation-Based Approach to Optimizing Loops in Database Programming Languages (DFL, DJD), pp. 91–100.
- VLDB-1992-DayalW #query
- A Uniform Approach to Processing Temporal Queries (UD, GTJW), pp. 407–418.
- VLDB-1992-HanCC #database #information management
- Knowledge Discovery in Databases: An Attribute-Oriented Approach (JH, YC, NC), pp. 547–559.
- VLDB-1992-LiuM #behaviour #communication #database #declarative #object-oriented #process
- Activity Model: A Declarative Approach for Capturing Communication Behavior in Object-Oriented Databases (LL, RM), pp. 481–493.
- VLDB-1992-RabittiS #database #image
- An Information-Retrieval Approach for Image Databases (FR, PS), pp. 574–584.
- VLDB-1992-Richardson
- Supporting Lists in a Data Model (A Timely Approach) (JER), pp. 127–138.
- SEI-1992-Pewle #formal method #process
- Software Process Training: A Formal and Informal Approach at McDonnell Douglas Electronic Systems Company (KLP), pp. 308–312.
- ICALP-1992-MontanariY #parametricity
- A Parametric Approach to Localities (UM, DY), pp. 617–628.
- LFP-1992-ChuangG #finite #fixpoint
- A Syntactic Approach to Fixed Point Computation on Finite Domains (TRC, BG), pp. 109–118.
- CSCW-1992-Medina-MoraWFF #workflow
- The Action Workflow Approach to Workflow Management Technology (RMM, TW, RF, FF), pp. 281–288.
- CAiSE-1992-FonkamG #database #elicitation #relational #semantics
- An Approach to Eliciting the Semantics of Relational Databases (MMF, WAG), pp. 463–480.
- CAiSE-1992-FouqueV #analysis #machine learning
- Building a Tool for Software Code Analysis: A Machine Learning Approach (GF, CV), pp. 278–289.
- CAiSE-1992-RollandP #natural language #requirements
- A Natural Language Approach for Requirements Engineering (CR, CP), pp. 257–277.
- CIKM-1992-MartinAD #behaviour #consistency #database #object-oriented
- Consistency Checking in Object Oriented Databases: a Behavioral Approach (HM, MEA, BD), pp. 53–68.
- KR-1992-EtzioniHWDLW
- An Approach to Planning with Incomplete Information (OE, SH, DSW, DD, NL, MW), pp. 115–125.
- KR-1992-GoldszmidtP #reasoning
- Rank-based Systems: A Simple Approach to Belief Revision, Belief Update, and Reasoning about Evidence and Actions (MG, JP), pp. 661–672.
- ML-1992-GrefenstetteR #learning
- An Approach to Anytime Learning (JJG, CLR), pp. 189–195.
- ML-1992-Hickey #algorithm #evaluation #towards
- Artificial Universes — Towards a Systematic Approach to Evaluation Algorithms which Learn form Examples (RJH), pp. 196–205.
- ML-1992-HoggerB #heuristic #learning #logic programming #source code
- The MENTLE Approach to Learning Heuristics for the Control of Logic Programs (EIH, KB), pp. 212–217.
- ML-1992-KiraR #feature model
- A Practical Approach to Feature Selection (KK, LAR), pp. 249–256.
- ML-1992-Markov #concept #learning
- An Approach to Concept Learning Based on Term Generalization (ZM), pp. 310–315.
- SEKE-1992-CaporasoRFMP #automation #development
- CASE Approach in Telecom Software Development (CC, GDR, GF, FAM, AP), pp. 443–454.
- SEKE-1992-ChunH #compilation #knowledge base #query
- Compiling Rules and Queries in Knowledge Base Systems: A Substitution-Based Approach (JC, LJH), pp. 109–115.
- SEKE-1992-MillerQ #knowledge-based #modelling #reuse #simulation #source code #using
- A Knowledge-Based Approach to Encouraging Reuse of Simulation and Modeling Programs (LM, AQ), pp. 158–163.
- SEKE-1992-StamperTM #design #re-engineering
- A Software Engineering Approach to the Design of a Medical Expert System (RS, BST, PMM), pp. 341–348.
- SEKE-1992-TuS #linear #petri net #programming #static analysis
- Linear Programming Supporting Ada-Tasking Static Analysis: A Petri Net Approach (ST, WS), pp. 222–226.
- SIGIR-1992-CuttingPKT #clustering #documentation #named #scalability
- Scatter/Gather: A Cluster-based Approach to Browsing Large Document Collections (DRC, JOP, DRK, JWT), pp. 318–329.
- ECOOP-1992-AksitBV #integration #object-oriented
- An Object-Oriented Language-Database Integration Model: The Composition-Filters Approach (MA, LB, SV), pp. 372–395.
- ECOOP-1992-Casais #incremental
- An Incremental Class Reorganization Approach (EC), pp. 114–132.
- ECOOP-1992-Uustalu #logic programming #object-oriented #paradigm
- Combining Object-Oriented and Logic Paradigms: A Modal Logic Programming Approach (TU), pp. 98–113.
- TOOLS-EUROPE-1992-Zhao #geometry #object-oriented #online #recognition #using
- On-Line Geometry Recognition Using C++, an Object-Oriented Approach (RZ), pp. 371–378.
- TOOLS-PACIFIC-1992-MaE #library #relational #using
- A Practical Approach to Class Library Management Using a Relational DBMS (JM, JME), pp. 165–173.
- TOOLS-USA-1992-Kim92a #multi #named #object-oriented
- Keynote: Object-Oriented Approach to Multimedia Management (WK), p. 5.
- TOOLS-USA-1992-Mandrioli92a #logic #object-oriented #realtime #specification
- Associated paper: The Specification of Real-Time Systems: a Logical, Object-Oriented Approach (DM), p. 277.
- LOPSTR-1992-Neugebauer #perspective
- The LOPS Approach: A Transformational Point of View (GN), pp. 80–81.
- PLDI-1992-BrooksHS #debugging
- A New Approach to Debugging Optimized Code (GB, GJH, SS), pp. 1–11.
- TRI-Ada-T2-1992-Shumate #ada #design #specification
- Software Specification and Design with Ada: A Disciplined Approach (KS), pp. 497–589.
- KBSE-1992-MaidenS #abstraction #requirements
- Domain Abstractions in Requirements Engineering: A Exemplar Approach (NM, AS), p. 19.
- CC-1992-DuesterwaldGS #pipes and filters
- Register Pipelining: An Integrated Approach to Register Allocation for Scalar and Subscripted Variables (ED, RG, MLS), pp. 192–206.
- DAC-1992-AbramoviciRM #exclamation #testing
- Freeze!: A New Approach for Testing Sequential Circuits (MA, KBR, DTM), pp. 22–25.
- DAC-1992-AmonB #verification
- An Approach to Symbolic Timing Verification (TA, GB), pp. 410–413.
- DAC-1992-DharchoudhuryK #design #optimisation #worst-case
- An Integrated Approach to Realistic Worst-Case Design Optimization of MOS Analog Circuits (AD, SMK), pp. 704–709.
- DAC-1992-FangFL #multi #performance #problem
- A New Efficient Approach to Multilayer Channel Routing Problem (SCF, WSF, SLL), pp. 579–584.
- DAC-1992-GirardLP #novel
- A Novel Approach to Delay-Fault Diagnosis (PG, CL, SP), pp. 357–360.
- DAC-1992-LingKW #3d #bound #simulation
- A Boundary-Element Approach to Transient simulation of Three-Dimensional Integrated Circuit Interconnect (DDL, SK, JW), pp. 93–98.
- DAC-1992-LinS #fuzzy #logic #problem
- Fuzzy Logic Approach to Placement Problem (RBL, ES), pp. 153–158.
- DAC-1992-MaulikCR #programming #synthesis
- A Mixed-Integer Nonlinear Programming Approach to Analog Circuit Synthesis (PCM, LRC, RAR), pp. 698–703.
- DAC-1992-YuS #design
- A Path-Oriented Approach for Reducing Hazards in Asynchronous Designs (MLY, PAS), pp. 239–244.
- CADE-1992-DoughertyJ #combinator #higher-order #logic
- A Combinatory Logic Approach to Higher-order E-unification (DJD, PJ), pp. 79–93.
- IWPTS-1992-ConcettoMMZ
- An Approach to the Test of an ATM Based Signalling Application (MDC, GM, EM, FZ), pp. 119–130.
- JICSLP-1992-ChenW #semantics
- A Goal-Oriented Approach to Computing Well Founded Semantics (WC, DSW), pp. 589–603.
- SIGMOD-1991-Annevelink #database #functional #programming language
- Database Programming Languages: A Functional Approach (JA), pp. 318–327.
- SIGMOD-1991-PuL #distributed
- Replica Control in Distributed Systems: An Asynchronous Approach (CP, AL), pp. 377–386.
- SIGMOD-1991-TsangarisN #clustering #probability
- A Stochastic Approach for Clustering in Object Bases (MMT, JFN), pp. 12–21.
- VLDB-1991-SiegelM #metadata #semantics
- A Metadata Approach to Resolving Semantic Conflicts (MS, SEM), pp. 133–145.
- SEI-1991-Bustard #education #project management
- A Layered Approach to Teaching Software Project Management (DWB), pp. 181–191.
- VDME-1991-Benveniste #semantics
- Writing Operational Semantics in Z: A Sructural Approach (MVB), pp. 164–188.
- VDME-1991-BruunHD #semantics
- An Approach to the Static Semantics of VDM-SL (HB, BSH, FMD), pp. 220–253.
- VDME-1991-Guttag #specification
- The Larch Approach to Specification (JVG), p. 10.
- CHI-1991-Tatsukawa #interactive #tool support #visual notation
- Graphical toolkit approach to user interaction description (KT), pp. 323–328.
- CAiSE-1991-WuwongseM #model management #object-oriented
- An Object-Oriented Approach to Model Management (VW, JM), pp. 525–539.
- ML-1991-Aha #incremental #induction
- Incremental Constructive Induction: An Instance-Based Approach (DWA), pp. 117–121.
- ML-1991-CallanU #induction
- A Transformational Approach to Constructive Induction (JPC, PEU), pp. 122–126.
- ML-1991-GratchD #effectiveness #hybrid
- A Hybrid Approach to Guaranteed Effective Control Strategies (JG, GD), pp. 509–513.
- ML-1991-LeckieZ #induction #learning
- Learning Search Control Rules for Planning: An Inductive Approach (CL, IZ), pp. 422–426.
- ML-1991-PazzaniBS #concept #learning #relational
- A Knowledge-intensive Approach to Learning Relational Concepts (MJP, CB, GS), pp. 432–436.
- ML-1991-RamH #information retrieval
- A Goal-Based Approach to Intelligent Information Retrieval (AR, LH), pp. 265–269.
- ML-1991-Thompson #information retrieval #machine learning
- Machine Learning in the Combination of Expert Opinion Approach to IR (PT), pp. 270–274.
- ML-1991-Yeung #induction #network
- A Neural Network Approach to Constructive Induction (DYY), pp. 228–232.
- TOOLS-USA-1991-Hong #database #design #normalisation
- A Class Normalization Approach to the Design of O-O Databases (SH), pp. 63–72.
- TOOLS-USA-1991-HorvilleurH #component #reuse
- Documneting Reusable Components: An Engineering Approach (CH, GH), pp. 319–326.
- TOOLS-USA-1991-LeaW #distributed #object-oriented
- Supporting Object-Oriented Languages in a Distributed Environment: The COOL Approach (RL, JW), pp. 37–48.
- TOOLS-USA-1991-NagvarSK #semantics #towards
- An O-O Approach Toward Semantic Interpretation of Indian Languages (PN, VS, GK), pp. 181–194.
- AdaEurope-1991-Curley #ada #benchmark #compilation #metric
- An Approach To Benchmarking Ada Compilation Systems (TC), pp. 87–108.
- PEPM-1991-AriolaA #program transformation
- A Syntactic Approach to Program Transformations (ZMA, A), pp. 116–129.
- PLDI-1991-Venkatesh #semantics #slicing
- The Semantic Approach to Program Slicing (GAV), pp. 107–119.
- PLILP-1991-KeslerPR #heuristic #random
- A Randomized Heuristic Approach to Register Allocation (CWK, WJP, TR), pp. 195–206.
- POPL-1991-AbramskyJ #analysis #higher-order #polymorphism #relational #strict
- A Relational Approach to Strictness Analysis for Higher-Order Polymorphic Functions (SA, TPJ), pp. 49–54.
- POPL-1991-PingaliBJMS #algebra #dependence #graph
- Dependence Flow Graphs: An Algebraic Approach to Program Dependencies (KP, MB, RJ, MM, PS), pp. 67–78.
- ESEC-1991-DickL #formal method #visual notation
- Integrating Structured and Formal Methods: A Visual Approach to VDM (JD, JL), pp. 37–59.
- ESEC-1991-KopetzZFKPS #design #realtime
- An Engineering Approach to Hard Real-Time System Design (HK, RZ, GF, HK, PPP, WS), pp. 166–188.
- KBSE-1991-FrinckeAL #algorithm #automation #concurrent #detection #named
- CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms (DAF, MA, KNL), pp. 151–160.
- KBSE-1991-KozaczynskiLN #comprehension #knowledge-based
- A Knowledge-Based Approach to Software System Understanding (WK, SL, JQN), pp. 162–170.
- DAC-1991-ChenMMF #network #optimisation
- A Resynthesis Approach for Network Optimization (KCC, YM, SM, MF), pp. 458–463.
- DAC-1991-CiesielskiSD #automaton #encoding
- A Unified Approach to Input-Output Encoding for FSM State Assignment (MJC, JJS, MD), pp. 176–181.
- DAC-1991-DonzelleDHPS #automation #constraints #design
- A Constraint Based Approach to Automatic Design of Analog Cells (LOD, PFD, BH, JP, PS), pp. 506–509.
- DAC-1991-EschermannW #finite #self #state machine #synthesis
- A Unified Approach for the Synthesis of Self-Testable Finite State Machines (BE, HJW), pp. 372–377.
- DAC-1991-ShihK #equation #named #performance #using
- ILLIADS: A New Fast MOS Timing Simulator Using Direct Equation-Solving Approach (YHS, SMK), pp. 20–25.
- DAC-1991-TsayK #optimisation #performance
- An Analytic Net Weighting Approach for Performance Optimization in Circuit Placement (RST, JK), pp. 620–625.
- DAC-1991-Utesch #adaptation #interactive #using
- A New Approach to Hierarchical Adaptation Using Sequence-Control Based on Cell Interactions (MCU), pp. 723–726.
- STOC-1991-Gabow
- A Matroid Approach to Finding Edge Connectivity and Packing Arborescences (HNG), pp. 112–122.
- CAV-1991-BarbeauB #fault #petri net #using #verification
- The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach (MB, GvB), pp. 103–113.
- CAV-1991-GjessingKM #specification #top-down
- A Top Down Approach to the Formal Specification of SCI Cache Coherence (SG, SK, EMK), pp. 83–91.
- CAV-1991-Jong #automaton #logic
- An Automata Theoretic Approach to Temporal Logic (GGdJ), pp. 477–487.
- CSL-1991-Feferman #data type
- A New Approach to Abstract Data Types II: Computation on ADTs as Ordinary Computation (SF), pp. 79–95.
- ICLP-1991-MansfieldTMN #named #towards
- AMLOG-E: A New Approach towards Amalgamation (GM, AT, NM, SN), pp. 364–378.
- IWPTS-1991-VelthuysZ #consistency #testing
- Relating Events for Conformance Testing — a Pragmatic Approach (RJV, GZ), pp. 231–253.
- LICS-1991-GodefroidW #model checking
- A Partial Approach to Model Checking (PG, PW), pp. 406–415.
- TAV-1991-GhezziK #specification
- Executing Formal Specifications: The ASTRAL to TRIO Translation Approach (CG, RAK), pp. 112–122.
- TAV-1991-GuptaS #detection #performance #runtime
- Loop Monotonic Computations: An Approach for the Efficient Run-Time Detection of Races (RG, MS), pp. 98–111.
- ECHT-1990-Andersen #hypermedia #towards
- Towards an Aesthetics of Hypertext Systems. A Semiotic Approach (PBA), pp. 224–237.
- ECHT-1990-HofmannSL #hypermedia #information management
- An Integrated Approach of Knowledge Acquisition by the Hypertext System CONCORDE (MH, US, HL), pp. 166–179.
- ECHT-1990-PuttressG #hypermedia #tool support
- The Toolkit Approach to Hypermedia (JJP, NMG), pp. 25–37.
- PODS-1990-CareyKL
- Load Control for Locking: The “Half-and-Half” Approach (MJC, SK, ML), pp. 72–84.
- VLDB-1990-AgrawalA #performance #protocol
- The Tree Quorum Protocol: An Efficient Approach for Managing Replicated Data (DA, AEA), pp. 243–254.
- VLDB-1990-HoutsmaAC #distributed #set #transitive
- Distributed Transitive Closure Computations: The Disconnection Set Approach (MAWH, PMGA, SC), pp. 335–346.
- VLDB-1990-KorthLS #formal method #transaction
- A Formal Approach to Recovery by Compensating Transactions (HFK, EL, AS), pp. 95–106.
- ICALP-1990-Blum #graph
- A New Approach to Maximum Matching in General Graphs (NB), pp. 586–597.
- ICALP-1990-DobkinK
- Determining the Separation of Preprocessed Polyhedra — A Unified Approach (DPD, DGK), pp. 400–413.
- VDME-1990-Goguen #algebra #refinement
- An Algebraic Approach to Refinement (JAG), pp. 12–28.
- VDME-1990-Lange #formal method #hypermedia #prototype #specification #using
- A Formal Approach to Hypertext using Post-Prototype Formal Specification (DBL), pp. 99–121.
- GG-1990-Brandenburg #graph grammar #layout
- Layout Graph Grammars: The Placement Approach (FJB), pp. 144–156.
- GG-1990-Courcelle90a #algebra #graph #logic #relational
- Graphs as Relational Structures: An Algebraic an Logical Approach (BC), pp. 238–252.
- GG-1990-EhrigKL #algebra #category theory #graph grammar #tutorial
- Tutorial Introduction to the Algebraic Approach of Graph Grammars Based on Double and Single Pushouts (HE, MK, ML), pp. 24–37.
- GG-1990-HessM
- The Four Musicians: Analogies and Expert Systems — A Graphic Approach (LH, BHM), pp. 430–445.
- CHI-1990-GongE #design #documentation #evaluation #usability #using
- Designing minimal documentation using a GOMS model: a usability evaluation of an engineering approach (RG, JE), pp. 99–107.
- CAiSE-1990-Dietz #communication #concept #information management #modelling
- A Communication Oriented Approach to Conceptual Modelling of Information Systems (JLGD), pp. 134–151.
- ML-1990-Bostrom #order
- Generalizing the Order of Goals as an Approach to Generalizing Number (HB), pp. 260–267.
- ML-1990-GenestMP #learning
- Explanation-Based Learning with Incomplete Theories: A Three-step Approach (JG, SM, BP), pp. 286–294.
- ML-1990-NordhausenL #robust
- A Robust Approach to Numeric Discovery (BN, PL), pp. 411–418.
- SEKE-1990-Blum #knowledge-based #re-engineering
- Knowledge-Based Software Engineering: A Different Approach (BIB), pp. 1–6.
- SEKE-1990-LukZH #database #named #relational
- Path: An Approach to Incorporate List Processing in A Relational Database (WSL, WZ, JH), pp. 189–194.
- SIGIR-1990-ChiaramellaN #logic #modelling #retrieval
- A Retrieval Model Based on an Extended Modal Logic and its Application to the RIME Experimental Approach (YC, JYN), pp. 25–43.
- SIGIR-1990-Rousseau #heuristic #question #retrieval
- Extended Boolean Retrieval: A Heuristic Approach? (RR), pp. 495–508.
- PLILP-1990-BowenJP #compilation #prototype #specification
- An Approach to Verifiable Compiling Specification and Prototyping (JPB, JH, PKP), pp. 45–59.
- PLILP-1990-SagivFRW #analysis #data flow #problem
- A Logic-Based Approach to Data Flow Analysis Problem (SS, NF, MR, RW), pp. 277–292.
- ICSE-1990-Decina #named
- CEFRIEL: an Innovative Approach to University-Industry Cooperation in Information Technologies (MD), pp. 330–331.
- ICSE-1990-Parisi-Presicce #composition #design #rule-based
- A Rule-Based Approach to Modular System Design (FPP), pp. 202–211.
- DAC-1990-AsharDN #composition
- A Unified Approach to the Decomposition and Re-Decomposition of Sequential Machines (PA, SD, ARN), pp. 601–606.
- DAC-1990-ChatterjeeH #clustering
- A New Simultaneous Circuit Partitioning and Chip Placement Approach Based on Simulated Annealing (AC, RIH), pp. 36–39.
- DAC-1990-KageyamaMS #algorithm #linear #logic #optimisation #programming
- Logic Optimization Algorithm by Linear Programming Approach (NK, CM, TS), pp. 345–348.
- DAC-1990-SutanthavibulSR #design #optimisation
- An Analytical Approach to Floorplan Design and Optimization (SS, ES, JBR), pp. 187–192.
- PPoPP-1990-WhitfieldS #optimisation
- An Approach to Ordering Optimizing Transformations (DW, MLS), pp. 137–146.
- CAV-1990-PengP #communication #concurrent #detection #finite #network #problem #state machine
- A Unified Approach to the Deadlock Detection Problem in Networks of Communicating Finite State Machines (WP, SP), pp. 243–252.
- CLP-1990-SawamuraMYO90 #logic #logic programming #proving #specification
- A Logic Programming Approach to Specifying Logics and Constructing Proofs (HS, TM, KY, KO), pp. 405–424.
- NACLP-1990-OhwadaM #consistency #constraints #design #interface #logic programming #maintenance
- A Constraint Logic Programming Approach for Maintaining Consistency in User-Interface Design (HO, FM), pp. 139–153.
- NACLP-1990-Sahlin #automation #partial evaluation #prolog
- The Mixtus Approach to Automatic Partial Evaluation of Full Prolog (DS), pp. 377–398.
- SIGMOD-1989-GyssensPG #grammarware #modelling #towards
- A Grammar-Based Approach Towards Unifying Hierarchical Data Models (MG, JP, DVG), pp. 263–272.
- SEI-1989-Page #ada #case study #re-engineering
- Holisitc Case Study Approach to Ada Based Software Engineering Training (RDP), pp. 109–123.
- ICALP-1989-LiV89a #complexity #formal method
- A New Approach to Formal Language Theory by Kolmogorov Complexity (ML, PMBV), pp. 506–520.
- FPCA-1989-BjernerH #analysis #composition #first-order #functional #lazy evaluation #source code
- A Composition Approach to Time Analysis of First Order Lazy Functional Programs (BB, SH), pp. 157–165.
- FPCA-1989-Traub #clustering #compilation #functional #strict
- Compilation as Partitioning: A New Approach to Compiling Non-Strict Functional Languages (KRT), pp. 75–88.
- CAiSE-1989-LausenNOSS #concept #information management #modelling #prototype
- The INCOME Approach for Conceptual Modelling and Prototyping of Information Systems (GL, TN, AO, FS, WS).
- ML-1989-HilliardLRP #classification #hybrid #learning #problem #scheduling
- Learning Decision Rules for scheduling Problems: A Classifier Hybrid Approach (MRH, GEL, GR, MRP), pp. 188–190.
- ML-1989-MorkK #clustering #concept
- A Bootstrapping Approach to Concept Clustering (KM, JUK), pp. 503–504.
- ML-1989-Rajamoney #consistency #experience #problem
- Exemplar-Based Theory Rejection: An Approach to the Experience Consistency Problem (SAR), pp. 284–289.
- ML-1989-TanS #concept #learning #recognition
- Cost-Sensitive Concept Learning of Sensor Use in Approach ad Recognition (MT, JCS), pp. 392–395.
- SIGIR-1989-Baeza-YatesG
- A New Approach to Text Searching (RABY, GHG), pp. 168–175.
- SIGIR-1989-BerrutC #multi
- Indexing Medical Reports in a Multimedia Environment: The RIME Experimental Approach (CB, YC), pp. 187–197.
- OOPSLA-1989-Schelvis #distributed #garbage collection #incremental
- Incremental Distribution of Timestamp Packets: A New Approach to Distributed Garbage Collection (MS), pp. 37–48.
- OOPSLA-1989-Wirfs-BrockW #design #object-oriented
- Object-Oriented Design: A Responsibility-Driven Approach (RWB, BW), pp. 71–75.
- ESEC-1989-ManfrediOT #analysis #object-oriented
- An Object-oriented Approach to the System Analysis (FM, GO, PT), pp. 395–410.
- ESEC-1989-NiskierMS #knowledge-based #specification
- A Pluralistic Knowledge-Based Approach to Software Specification (CN, TSEM, DS), pp. 411–423.
- ICSE-1989-BernardYL #configuration management
- A Process-Oriented Approach to Configuration Management (YB, PL), pp. 320–330.
- ICSE-1989-GalloST #configuration management #named #object-oriented #scalability
- ObNet: An Object-Oriented Approach for Supporting Large, Long-Lived, Highly Configurable Systems (TG, GS, FT), pp. 138–144.
- ICSE-1989-NakagawaF #algebra #composition #process #refinement
- Stepwise Refinement Process with Modularity: An Algebraic Approach (ATN, KF), pp. 166–177.
- ASPLOS-1989-BlackRGHB #consistency
- Translation Lookaside Buffer Consistency: A Software Approach (DLB, RFR, DBG, CRH, RVB), pp. 113–122.
- DAC-1989-BalakrishnanM #design #scheduling #synthesis
- Integrated Scheduling and Binding: A Synthesis Approach for Design Space Exploration (MB, PM), pp. 68–74.
- DAC-1989-DaniellD #design #framework #object-oriented
- An Object Oriented Approach to CAD Tool Control within a Design Framework (JD, SWD), pp. 197–202.
- DAC-1989-GloverM #fault #testing
- A Deterministic Approach to Adjacency Testing for Delay Faults (CTG, MRM), pp. 351–356.
- DAC-1989-HoVW #problem
- A New Approach to the Rectilinear Steiner Tree Problem (JMH, GV, CKW), pp. 161–166.
- DAC-1989-JoneP #clustering #coordination #generative #pseudo #testing
- A Coordinated Approach to Partitioning and Test Pattern Generation for Pseudoexhaustive Testing (WBJ, CAP), pp. 525–534.
- DAC-1989-Muller-GlaserB #design #specification #using
- An Approach to Intelligent Assistance for the Specification of ASIC Design Using Objects and Rules (KDMG, JB), pp. 472–477.
- DAC-1989-PrasitjutrakulK #programming
- Path-Delay Constrained Floorplanning: A Mathematical Programming Approach for Initial Placement (SP, WJK), pp. 364–369.
- DAC-1989-RoyA #novel #using #verification
- A Novel Approach to Accurate Timing Verification Using RTL Descriptions (KR, JAA), pp. 638–641.
- DAC-1989-SaabR #clustering
- An Evolution-Based Approach to Partitioning ASIC Systems (YS, VBR), pp. 767–770.
- DAC-1989-WangKL #fault #logic #robust #set
- A New Approach to Derive Robust Sets for Stuck-open Faults in CMOS Combinational Logic Circuits (JFW, TYK, JYL), pp. 726–729.
- SOSP-1989-WeiserDH #runtime
- The Portable Common Runtime Approach to Interoperability (MW, AJD, CH), pp. 114–122.
- CAAP-1989-Gogolla #algebra #constraints
- Algebraization and Integrity Constraints for an Extended Entity-Relationship Approach (MG), pp. 259–274.
- STOC-1989-Feder #fixpoint #network
- A New Fixed Point Approach for Stable Networks and Stable Marriages (TF), pp. 513–522.
- NACLP-1989-DungK89a #declarative #fixpoint #logic programming #semantics #source code
- A Fixpoint Approach to Declarative Semantics of Logic Programs (PMD, KK), pp. 604–625.
- NACLP-1989-MarkovitchS #automation #machine learning
- Automatic Ordering of Subgoals — A Machine Learning Approach (SM, PDS), pp. 224–240.
- TAV-1989-Moriconi #configuration management #semantics
- A Practical Approach to Semantic Configuration Management (MM), pp. 103–113.
- PODS-1988-KiferRS #axiom #database #deduction #query #safety
- An Axiomatic Approach to Deciding Query Safety in Deductive Databases (MK, RR, AS), pp. 52–60.
- ICALP-1988-Schafer #linear
- A Kleene-Presburgerian Approach to Linear Production Systems (JS), pp. 525–534.
- LFP-1988-GharachorlooSH #performance
- A Simple and Efficient Implmentation Approach for Single Assignment Languages (KG, VS, JLH), pp. 259–268.
- ML-1988-BergadanoG #concept #induction
- A Knowledge Intensive Approach to Concept Induction (FB, AG), pp. 305–317.
- ML-1988-Carpineto #generative #learning
- An Approach Based on Integrated Learning to Generating Stories (CC), pp. 298–304.
- ML-1988-Etzioni #learning #reliability
- Hypothesis Filtering: A Practical Approach to Reliable Learning (OE), pp. 416–429.
- ML-1988-RajamoneyD #multi #problem #reduction
- Active Explanation Reduction: An Approach to the Multiple Explanations Problem (SAR, GD), pp. 242–255.
- ML-1988-RoseL
- A Hill-Climbing Approach to Machine Discovery (DR, PL), pp. 367–373.
- ML-1988-SannierG #adaptation #distributed #named #search-based
- Midgard: A Genetic Approach to Adaptive Load Balancing for Distributed Systems (AVSI, EDG), pp. 174–180.
- SIGIR-1988-Crouch #clustering
- A Cluster-Based Approach to Thesaurus Construction (CJC), pp. 309–320.
- ECOOP-1988-Pasquier-BoltuckGC #interactive #object-oriented #prototype #using
- Prototyping an Interactive Electronic Book System Using an Object-Oriented Approach (JPB, EG, GC), pp. 177–190.
- OOPSLA-1988-Shibayama #concurrent #distributed #how #implementation
- How To Invent Distributed Implementation Schemes of an Object-Based Concurrent Language: A Transformational Approach (ES), pp. 297–305.
- PLDI-1988-CoutantMR #debugging #named
- DOC: A Practical Approach to Source-Level Debugging of Globally Optimized Code (DSC, SM, MR), pp. 125–134.
- PLDI-1988-JainT #analysis #data flow #multi #performance
- An Efficient Approach to Data Flow Analysis in a Multi Pass Global Optimizer (SJ, CLT), pp. 154–163.
- POPL-1988-BougeF #composition
- A Compositional Approach to Superimposition (LB, NF), pp. 240–249.
- ICSE-1988-KishidaKMMOSSTW #design #named #novel
- SDA: A Novel Approach to Software Environment Design and Construction (KK, TK, MM, IM, KO, NS, JHS, KT, LGW), pp. 69–79.
- ICSE-1988-Williams #behaviour #modelling #process
- Software Process Modeling: A Behavioral Approach (LGW), pp. 174–186.
- DAC-1988-HarelK #fault #graph #simulation
- A Graph Compaction Approach to Fault Simulation (DH, BK), pp. 601–604.
- DAC-1988-MotoharaMUMS #fault #performance #simulation
- An Approach to Fast Hierarchical Fault Simulation (AM, MM, MU, YM, MS), pp. 698–703.
- DAC-1988-Pangre #heuristic #named
- Splicer: A Heuristic Approach to Connectivity Binding (BMP), pp. 536–541.
- DAC-1988-Stroud #automation #logic #synthesis
- An Automated BIST Approach for General Sequential Logic Synthesis (CES), pp. 3–8.
- DAC-1988-YaoYL #problem
- A New Approach to the Pin Assignment Problem (XY, MY, CLL), pp. 566–572.
- CADE-1988-FranzenH #unification
- A New Approach to Universal Unification and Its Application to AC-Unification (MF, LJH), pp. 643–657.
- CSL-1988-DaneluttoM #concurrent #finite #logic
- A temporal Logic Approach to Specify and to Prove Properties of Finite State Concurrent Systems (MD, AM), pp. 63–79.
- JICSCP-1988-Abramson88 #aspect-oriented #definite clause grammar #metaprogramming
- Metarules and an Approach to Conjunction in Definite Clause Translation Grammars: Some Aspects of Grammatical Metaprogramming (HA), pp. 233–248.
- JICSCP-1988-CarlssonDO88 #implementation
- A Simplified Approach to the Implementation of AND-Parallelism in an OR-Parallel Environment (MC, KJD, RAO), pp. 1565–1577.
- JICSCP-1988-Port88 #using
- A Simple Approach to Finding the Cause of Non-Unifiability (GSP), pp. 651–665.
- JICSCP-1988-Ramakrishnan88 #logic programming #source code
- Magic Templates: A Spellbinding Approach to Logic Programs (RR), pp. 140–159.
- JICSCP-1988-Zachary88 #equation #logic programming
- A Pragmatic Approach to Equational Logic Programming (JLZ), pp. 295–310.
- LICS-1988-Baudinet #prolog #proving #semantics #source code #termination
- Proving Termination Properties of Prolog Programs: A Semantic Approach (MB), pp. 336–347.
- VLDB-1987-Dayal #quantifier #query
- Of Nests and Trees: A Unified Approach to Processing Queries That Contain Nested Subqueries, Aggregates, and Quantifiers (UD), pp. 197–208.
- VLDB-1987-GonnetT #modelling
- Mind Your Grammar: a New Approach to Modelling Text (GHG, FWT), pp. 339–346.
- VLDB-1987-SernadasSE #algebra #database #object-oriented #specification
- Object-Oriented Specification of Databases: An Algebraic Approach (AS, CS, HDE), pp. 107–116.
- VLDB-1987-WhangN #logic #normalisation #optimisation #query #recursion
- An Extended Disjunctive Normal Form Approach for Optimizing Recursive Logic Queries in Loosely Coupled Environments (KYW, SBN), pp. 275–287.
- HCI-CE-1987-EasonONBA #design
- The Design of Usable IT Products: The ESPRIT/HUFIT Approach (KDE, CWO, FN, NB, NA), pp. 147–154.
- HCI-CE-1987-GlinertGS #problem #programming #visual notation
- An Integrated Approach to Solving Visual Programming’s Problems (EPG, JG, CDS), pp. 341–348.
- HCI-CE-1987-Gopher #design
- Cognition at Your Fingertips: A Cognitive Approach to the Design of Data Entry Devices (DG), pp. 233–240.
- HCI-CE-1987-HoyosGSZ #agile #empirical #overview #prototype
- Software-Design with the Rapid Prototyping Approach: A Survey and Some Empirical Results (CGH, HG, VS, BZ), pp. 329–340.
- HCI-SES-1987-Malt #analysis #human-computer #interface
- Skills Analysis in Human-Computer Interface: A Holistic Approach (LGM), pp. 319–326.
- SIGIR-1987-CroftL #documentation #natural language #retrieval
- An Approach to Natural Language Processing for Document Retrieval (WBC, DDL), pp. 26–32.
- SIGIR-1987-RabittiS #database #image #retrieval #scalability
- An Approach to Image Retrieval from Large Image Databases (FR, PLS), pp. 284–295.
- OOPSLA-1987-MinskyR #object-oriented #programming
- A Law-Based Approach to Object-Oriented Programming (NHM, DR), pp. 482–493.
- PLDI-1987-KoskimiesP #named #object-oriented #tool support
- TOOLS: a unifying approach to object-oriented language interpretation (KK, JP), pp. 153–164.
- ESEC-1987-Allen #data transformation #distributed #named #re-engineering #realtime
- SOFTBUS — An Approach to Software Engineering for Distributed Real-Time Long-Lifetime Spacecraft Data Management Systems (RCA), pp. 202–211.
- ESEC-1987-AsirelliI #development #logic
- Enhancing Configuration Facilities in Software Development: A Logic Approach (PA, PI), pp. 55–63.
- ESEC-1987-Laprie #dependence
- The Dependability Approach to Critical Computing Systems (JCL), pp. 233–243.
- ICSE-1987-Dowson
- ISTAR and the Contractual Approach (MD), pp. 287–288.
- DAC-1987-ChandraP #generative
- A Hierarchical Approach Test Vector Generation (SJC, JHP), pp. 495–501.
- DAC-1987-ChangCH #automation #generative #layout #matrix #using
- Automated Layout Generation Using Gate Matrix Approach (YCC, SCC, LHH), pp. 552–558.
- DAC-1987-HeilerDAOR #data transformation #database #design #object-oriented #why
- An Object-Oriented Approach to Data Management: Why Design Databases Need It (SH, UD, JAO, SRS), pp. 335–340.
- DAC-1987-Kaplan
- Routing with a Scanning Window-8Ma Unified Approach (DK), pp. 629–632.
- DAC-1987-Krishnamurthy #problem #programming
- A Dynamic Programming Approach to the Test Point Insertion Problem (BK), pp. 695–705.
- DAC-1987-MinaiWB #evaluation #heuristic #predict
- A Discrete Heuristics Approach to Predictive Evaluation of Semi-Custom IC Layouts (AAM, RDW, FWB), pp. 770–776.
- DAC-1987-RosenthalH #knowledge-based #query
- Querying Part Hierarchies: A Knowledge-Based Approach (AR, SH), pp. 328–334.
- DAC-1987-TouKFH #automation #database #knowledge base #verification
- Knowledge Based Approach for the Verification of CAD Database Generated by an Automated Schematic Capture System (JYT, WHK, KCF, CLH), pp. 713–720.
- CAAP-1987-Szpankowski #complexity #multi
- Average Complexity of Additive Properties for Multiway Tries: A Unified Approach (Extended Abstract) (WS), pp. 13–25.
- STOC-1987-Frederickson #graph
- A New Approach to All Pairs Shortest Paths in Planar Graphs (GNF), pp. 19–28.
- CSL-1987-Dahlhaus #parallel #programming
- Is SETL a Suitable Language for Parallel Programming — A Theoretical Approach (ED), pp. 56–63.
- ICLP-1987-Bacha87 #programming
- Meta-Level Programming: A Compiled Approach (HB), pp. 394–410.
- ICLP-1987-LeviP87 #declarative #logic #semantics
- An Approach to the Declarative Semantics of Synchronization in Logic Languages (GL, CP), pp. 877–893.
- LICS-1987-Shoham #logic #semantics
- A Semantical Approach to Nonmonotic Logics (YS), pp. 275–279.
- SLP-1987-MillerN87 #logic programming #source code
- A Logic Programming Approach to Manipulating Formulas and Programs (DM, GN), pp. 379–388.
- PODS-1986-Wilkins #database #logic
- A Model-Theoretic Approach to Updating Logical Databases (MW), pp. 224–234.
- SIGMOD-1986-Chen #modelling #rule-based
- A Rule-Based Object/Task Modelling Approach (QC), pp. 281–292.
- SIGMOD-1986-ChrstodoulakisHT #multi #symmetry
- The Multimedia Object Presentation Manager of MINOS: A Symmetric Approach (SC, FH, MT), pp. 295–310.
- SIGMOD-1986-RosenthalHDM #recursion #traversal
- Traversal Recursion: A Practical Approach to Supporting Recursive Applications (AR, SH, UD, FM), pp. 166–176.
- SIGMOD-1986-WoelkKL #database #multi #object-oriented
- An Object-Oriented Approach to Multimedia Databases (DW, WK, WL), pp. 311–325.
- VLDB-1986-CeriGL #algebra #logic #optimisation #query
- Translation and Optimization of Logic Queries: The Algebraic Approach (SC, GG, LL), pp. 395–402.
- ICALP-1986-ArquesFGG #algorithm #combinator #comparison #concurrent #database
- Comparison of Algorithms Controlling Concurrent Access to a Database: A Combinatorial Approach (DA, JF, MTG, PG), pp. 11–20.
- ICALP-1986-ShavitF #detection
- A New Approach to Detection of Locally Indicative Stability (NS, NF), pp. 344–358.
- LFP-1986-Mitchell #polymorphism #reduction #semantics
- A Type-Inference Approach to Reduction Properties and Semantics of Polymorphic Expressions (JCM), pp. 308–319.
- GG-1986-Ehrig #algebra #graph grammar #tutorial
- Tutorial introduction to the algebraic approach of graph grammars (HE), pp. 3–14.
- SIGIR-1986-GallelliIM #information management #multi
- An Approach to Multimedia Information Management (SG, CI, PM), pp. 31–38.
- SIGIR-1986-WongZ #information retrieval #machine learning
- A Machine Learning Approach to Information Retrieval (SKMW, WZ), pp. 228–233.
- OOPSLA-1986-JackyK #object-oriented #scalability
- An Object-Oriented Approach to a Large Scientific Application (JJ, IK), pp. 368–376.
- CRAI-1986-AstesianoR #programming language #semantics #tutorial
- The SMoLCS Approach to the Formal Semantics of Programming Languages — A Tutorial Introduction (EA, GR), pp. 81–116.
- CRAI-1986-Gallo #re-engineering #towards
- The PCTE Initiative: Toward a European Approach to Software Engineering (FG), pp. 16–29.
- POPL-1986-JohnsonW #incremental #type inference
- A Maximum-Flow Approach to Anomaly Isolation in Unification-Based Incremental Type Inference (GFJ, JAW), pp. 44–57.
- DAC-1986-BootehsazC #independence #layout
- A technology independent approach to hierarchical IC layout extraction (AB, RAC), pp. 425–431.
- DAC-1986-Ghosh #fault #functional #rule-based #simulation #verification
- A rule-based approach to unifying functional and fault simulation and timing verification (SG), pp. 677–682.
- DAC-1986-NavedaCD #multi
- A new approach to multi-layer PCB routing with short vias (JFN, KCC, DHCD), pp. 696–701.
- DAC-1986-PaulinKG #automation #multi #named #synthesis
- HAL: a multi-paradigm approach to automatic data path synthesis (PGP, JPK, EFG), pp. 263–270.
- ESOP-1986-FelgentreuL #optimisation
- A General Approach to the Optimization of Function Calls (KUF, WML), pp. 41–52.
- ESOP-1986-HankinBJ #combinator #parallel #reduction
- A Safe Approach to Parallel Combinator Reduction (CH, GLB, SLPJ), pp. 99–110.
- STOC-1986-GoldbergT #problem
- A New Approach to the Maximum Flow Problem (AVG, RET), pp. 136–146.
- ICLP-1986-GoebelFP86 #constraints #reasoning #using
- Using Definite Clauses and Integrity Constraints as the Basis for a Theory Formation Approach to Diagnostic Reasoning (RG, KF, DP), pp. 211–222.
- ICLP-1986-MahlerSS86 #prolog
- A New Approach for Intruducing Prolog to Naive Users (OM, ZS, EYS), pp. 544–551.
- LICS-1986-VardiW #automation #verification
- An Automata-Theoretic Approach to Automatic Program Verification (MYV, PW), pp. 332–344.
- PODS-1985-AtzeniC #performance #query
- Efficient Query Answering in the Representative Instance Approach (PA, EPFC), pp. 181–188.
- PODS-1985-TuzhilinS #concurrent #correctness #semantics #transaction
- A Semantic Approach to Correctness of Concurrent Transaction Executions (AT, PGS), pp. 85–95.
- SIGMOD-1985-ShinI #clustering #database #knowledge-based #relational #using
- Partitioning a Relational Database Horizontally Using a Knowledge-Based Approach (DGS, KBI), pp. 95–105.
- VLDB-1985-AfsarmaneshMKP #database #object-oriented
- An Extensible Object-Oriented Approach to Databases for VLSI/CAD (HA, DM, DK, ACP), pp. 13–24.
- VLDB-1985-BouzeghoubGM #database #design #tool support
- Database Design Tools: An Expert System Approach (MB, GG, EM), pp. 82–95.
- VLDB-1985-BrovermanC #data transformation #knowledge-based #user interface
- A Knowledge-Based Approach to Data Management for Intelligent User Interfaces (CAB, WBC), pp. 96–104.
- RTA-1985-Kandri-RodyKN #algebra #commutative #problem #unification
- An Ideal-Theoretic Approach to Work Problems and Unification Problems over Finitely Presented Commutative Algebras (AKR, DK, PN), pp. 345–364.
- FPCA-1985-ClackJ85 #analysis #strict
- Strictness Analysis — A Practical Approach (CDC, SLPJ), pp. 35–49.
- SIGIR-1985-Lowden #multi #retrieval
- An Approach to Multikey Sequencing in an Equiprobable Keyterm Retrieval Situation (BGTL), pp. 92–96.
- POPL-1985-FordS #code generation #incremental
- A Greedy Approach to Incremental Code Generation (RF, DS), pp. 165–178.
- POPL-1985-LamportS #alias #constraints #named #type system
- Constraints: A Uniform Approach to Aliasing and Typing (LL, FBS), pp. 205–216.
- DAC-1985-Joseph
- An expert systems approach to completing partially routed printed circuit boards (RLJ), pp. 523–528.
- DAC-1985-Kalay #database #integration
- A database management approach to CAD/CAM systems integration (YEK), pp. 111–116.
- DAC-1985-MokkaralaFA #functional #simulation #verification
- A unified approach to simulation and timing verification at the functional level (VRM, AF, RA), pp. 757–761.
- DAC-1985-NgJ #generative #graph
- Generation of layouts from MOS circuit schematics: a graph theoretic approach (TKN, SLJ), pp. 39–45.
- DAC-1985-ObermeierK
- PLA driver selection: an analytic approach (FWO, RHK), pp. 798–802.
- DAC-1985-SmtihD #file system #independence
- The VIVID system approach to technology independence: the matster technology file system (PS, SWD), pp. 76–81.
- DAC-1985-YoffaH #design #named #physics
- ACORN: a local customization approach to DCVS physical design (EJY, PSH), pp. 32–38.
- SOSP-1985-Reinhardt #data flow #multi
- A Data-Flow Approach to Multitasking ob CRAY X-MP Compputers (SKR), pp. 107–114.
- CAAP-1985-KapurS #data type #rule-based
- A Rewrite Rule Based Approach for Synthesizing Abstract Data Types (DK, MKS), pp. 188–207.
- STOC-1985-YaoY #geometry #query
- A General Approach to d-Dimensional Geometric Queries (ACCY, FFY), pp. 163–168.
- PODS-1984-CosmadakisK #dependence #functional #graph
- Functional and Inclusion Dependencies: A Graph Theoretic Approach (SSC, PCK), pp. 29–37.
- PODS-1984-KuperV #database #logic
- A New Approach to Database Logic (GMK, MYV), pp. 86–96.
- PODS-1984-Ong #database
- Synapse Approach to Database Recovery (KSO), pp. 79–85.
- VLDB-1984-BeeriK #database #design #relational
- Comprehensive Approach to the Design of Relational Database Schemes (CB, MK), pp. 196–207.
- VLDB-1984-Borr #database #distributed #multi #robust
- Robustness to Crash in a Distributed Database: A Non Shared-memory Multi-Processor Approach (AJB), pp. 445–453.
- VLDB-1984-KrishnamurthyM #query
- Query Processing on Personal Computers: A Pragmatic Approach (RK, SPM), pp. 26–29.
- VLDB-1984-Walter #commit #database #multi #transaction
- Nested Transactions with Multiple Commit Points: An Approach to the Structuring of Advanced Database Applications (BW), pp. 161–171.
- ICALP-1984-Schoning #algorithm #robust
- Robust Algorithms: A Different Approach to Oracles (US), pp. 448–453.
- LFP-1984-Katayama #functional #programming language #type checking #type inference
- Type Inference and Type Checking for Functional Programming Languages: A Reduced Computation Approach (TK), pp. 263–272.
- SIGIR-1984-HahnR #algorithm #generative #graph
- Computing text Constituency: An Algorithmic Approach to the Generation of Text Graphs (UH, UR), pp. 343–368.
- SIGIR-1984-OmiecinskiS #clustering
- A Global Approach to Record Clustering and File Reorganization (EO, PS), pp. 201–219.
- SCC-1984-Reiss #compilation #incremental
- An approach to incremental compilation (SPR), pp. 144–156.
- ICSE-1984-ChongH #database #distributed #relational
- Diagnostic System for Distributed Software: A Relational Database Approach (KC, PH), pp. 30–43.
- ICSE-1984-Spicer #education #project management #re-engineering
- A Spiral Approach to Software Engineering Project Management Education (JCS), pp. 78–85.
- ICSE-1984-UemuraO #development
- A Cooperative Approach to Software Development by Application Engineers and Software Engineers (KU, MO), pp. 86–96.
- DAC-1984-ChapmanC #case study #design #experience
- The scan line approach to design rules checking: Computational experiences (PTC, KCJ), pp. 235–241.
- DAC-1984-KarpovskyM #testing
- An approach to the testing of microprocessors (MGK, RVM), pp. 196–202.
- DAC-1984-SteinbergM #knowledge base
- A knowledge based approach to VLSI CAD the redesign system (LIS, TMM), pp. 412–418.
- DAC-1984-WardleWWMN #declarative #design
- A declarative design approach for combining macrocells by directed placement and constructive routing (CLW, CRW, CAW, JCM, BJN), pp. 594–601.
- SLP-1984-PortoF84 #logic programming #natural language #semantics
- Natural Language Semantics: A Logic Programming Approach (AP, MF), pp. 228–232.
- PODS-1983-Dayal #quantifier #query
- Processing Queries with Quantifiers: A Horticultural Approach (UD), pp. 125–136.
- SIGMOD-1983-ShuWL #database #design #requirements #specification
- Forms Approach to Requirements Specification for Database Design (NCS, HKTW, VYL), pp. 161–172.
- VLDB-1983-BiskupB
- Universal Relation Views: A Pragmatic Approach (JB, HHB), pp. 172–185.
- VLDB-1983-BittonDT #benchmark #database #metric
- Benchmarking Database Systems A Systematic Approach (DB, DJD, CT), pp. 8–19.
- VLDB-1983-LefonsST #database #statistics
- An Analytic Approach to Statistical Databases (EL, AS, FT), pp. 260–274.
- VLDB-1983-LyngbaekM #database #distributed
- An Approach to Object Sharing in Distributed Database Systems (PL, DM), pp. 364–375.
- VLDB-1983-Pilote #design #modelling #user interface
- A Data Modeling Approach to Simplify the Design of User Interfaces (MP), pp. 290–301.
- VLDB-1983-TuchermanFC #database #design
- A Pragmatic Approach to Structured Database Design (LT, ALF, MAC), pp. 219–231.
- SIGIR-1983-GriffithsK #database #overview #statistics
- An Approach to Enhancement of Statistical Survey Databases (JMG, DWK), pp. 239–245.
- SIGIR-1983-Pollitt #rule-based
- End User Touch Searching for Cancer Therapy Literature: A Rule-Based Approach (ASP), pp. 136–145.
- Ada-1983-OsterweilC
- The Toolpack/IST Approach to Extensibility in Software Environments (LJO, GC), pp. 133–163.
- POPL-1983-ClarkeES #automation #concurrent #finite #logic #specification #using #verification
- Automatic Verification of Finite State Concurrent Systems Using Temporal Logic Specifications: A Practical Approach (EMC, EAE, APS), pp. 117–126.
- DAC-1983-FukunagaYSK #graph #using
- Placement of circuit modules using a graph space approach (KF, SY, HSS, TK), pp. 465–471.
- DAC-1983-HofmannL #feature model #named
- HEX: An instruction-driven approach to feature extraction (MH, UL), pp. 331–336.
- STOC-1983-ODunlaingSY #named
- Retraction: A New Approach to Motion-Planning (CÓ, MS, CKY), pp. 207–220.
- STOC-1983-Sipser83a #complexity
- A Complexity Theoretic Approach to Randomness (MS), pp. 330–335.
- PODS-1982-Spyratos #database
- An Operational Approach to Data Bases (NS), pp. 212–220.
- SIGMOD-1982-ImielinskiL #database #relational
- A Systematic Approach to Relational Database Theory (TI, WLJ), pp. 8–14.
- VLDB-1982-Chang #distributed #heuristic #query
- A Heuristic Approach to Distributed Query Processing (JMC), pp. 54–61.
- VLDB-1982-GangopadhyayDB #network #object-oriented #semantics
- Semantics of Network Data Manipulation Languages: An Object-Oriented Approach (DG, UD, JCB), pp. 357–369.
- GG-1982-Meier #database #graph
- A graph-relational approach to geographic databases (AM), pp. 245–254.
- SIGIR-1982-Knorz #automation
- A Decision Theory Approach to Optimal Automatic Indexing (GK), pp. 174–193.
- POPL-1982-JonesM #analysis #data flow #data type #flexibility #interprocedural #recursion #source code
- A Flexible Approach to Interprocedural Data Flow Analysis and Programs with Recursive Data Structures (NDJ, SSM), pp. 66–74.
- ICSE-1982-KuoLR
- A Form-Based Approach to Human Engineering Methodologies (HCCK, CHL, JR), pp. 254–271.
- DAC-1982-ArnoldO #geometry #layout #named
- Lyra: A new approach to geometric layout rule checking (MHA, JKO), pp. 530–536.
- DAC-1982-EustaceM #automaton #design #finite
- A Deterministic finite automaton approach to design rule checking for VLSI (RAE, AM), pp. 712–717.
- DAC-1982-Hassett #automation #layout #problem
- Automated layout in ASHLAR: An approach to the problems of “General Cell” layout for VLSI (JEH), pp. 777–784.
- DAC-1982-Katz #database #design
- A database approach for managing VLSI design data (RHK), pp. 274–282.
- DAC-1982-MaisselO #design #documentation #hardware #interactive #simulation #synthesis
- Interactive design language: A unified approach to hardware simulation, synthesis and documentation (LIM, DLO), pp. 193–201.
- DAC-1982-NoonRR #design
- A design system approach to data integrity (WAN, KNR, MTR), pp. 699–705.
- DAC-1982-Thompson
- A utilitarian approach to CAD (TJT), pp. 23–29.
- ILPC-1982-EisingerKM82 #logic programming #parallel
- Logic Programming: A Parallel Approach (NE, SK, JM), pp. 71–77.
- VLDB-1981-BussolatiM #database #modelling #security
- A Database Approach to Modelling and Managing Security Information (UB, GM), pp. 532–542.
- VLDB-1981-LeonardL #design #information management #transaction
- Information Systems Design Approach Integrating Data and Transactions (ML, BTL), pp. 235–246.
- VLDB-1981-WhangWS #database #design #named #physics
- Separability — An Approach to Physical Data Base Design (KYW, GW, DS), pp. 320–332.
- ICALP-1981-Courcelle #algorithm #axiom
- An Axiomatic Approach to the Korenjak-Hopcroft Algorithms (BC), pp. 393–407.
- SIGIR-1981-YuL #probability #retrieval
- An Approach to Probabilistic Retrieval (CTY, KL), pp. 46–55.
- ICSE-1981-KomodaHKS #analysis #modelling #requirements #using
- An Innovative Approach to System Requirements Analysis by Using Structural Modeling Method (NK, KH, HK, HS), pp. 305–313.
- DAC-1981-McNallD
- A structured approach to selecting a CAD/CAM system (RIMJ, RJD), p. 702.
- DAC-1981-Mills #design
- A totally integrated systems approach to design and manufacturing at McDonnell Douglas Corporation (MM), pp. 160–165.
- SIGMOD-1980-Sakai #concept #design
- Entity-Relationship Approach to the Conceptual Schema Design (HS), pp. 1–8.
- VLDB-1980-Brodie80a #database #relational #standard
- Standardization and the Relational Approach to Databases: An ANSI Task Group Status Report (MLB), pp. 326–327.
- VLDB-1980-Navathe #network
- An Intuitive Approach to Normalize Network Structured Data (SBN), pp. 350–358.
- VLDB-1980-Spewak #database #design
- A Pragmatic Approach to Database Design (SHS), pp. 151–152.
- ICALP-1980-Mosses #compilation #correctness
- A Constructive Approach to Compiler Correctness (PDM), pp. 449–469.
- SIGIR-1980-Paice #automation #generative #identification #self
- The Automatic Generation of Literature Abstracts: An Approach Based on the Identification of Self-Indicating Phrases (CDP), pp. 172–191.
- POPL-1980-Reid #documentation #pretty-printing
- A High-Level Approach to Computer Document Formatting (BKR), pp. 24–31.
- DAC-1980-ChaoHY #consistency #layout
- A hierarchical approach for layout versus circuit consistency check (SPC, YSH, LMY), p. 269.
- DAC-1980-ChaoHY80a #consistency #layout
- A hierarchical approach for layout versus circuit consistency check (SPC, YSH, LMY), pp. 270–276.
- DAC-1980-HanauL #design #interactive #prototype #simulation
- A prototyping and simulation approach to interactive computer system design (PRH, DRL), pp. 572–578.
- DAC-1980-SzepieniecO #layout #problem
- The genealogical approach to the layout problem (AAS, RHJMO), pp. 535–542.
- SDCG-1980-Mosses #compilation #correctness
- A constructive approach to compiler correctness (PDM), pp. 189–210.
- STOC-1980-Cypher #problem
- An Approach to The k Paths Problem (AC), pp. 211–217.
- STOC-1980-PaulSS #bound #online
- An Information-Theoretic Approach to Time Bounds for On-Line Computation (WJP, JIS, JS), pp. 357–367.
- CADE-1980-Nederpelt #proving #theorem proving #λ-calculus
- An Approach to Theorem Proving on the Basis of a Typed Lambda-Calculus (RN), pp. 182–194.
- SIGMOD-1979-HammerN #clustering #heuristic
- A Heuristic Approach to Attribute Partitioning (MH, BN), pp. 93–101.
- SIGMOD-1979-Vassiliou #database #null #semantics
- Null Values in Data Base Management: A Denotational Semantics Approach (YV), pp. 162–169.
- VLDB-1979-BachCK #adaptation #towards
- The ADAPT System: A Generalized Approach Towards Data Conversion (MJB, NHC, MMK), pp. 183–193.
- VLDB-1979-Schmidt #parallel
- Parallel Processing of Relations: A Single-Assignment Approach (JWS), pp. 398–408.
- ICALP-1979-Rozenberg #formal method #parallel
- A Systematic Approach to Formal Language Theory Through Parallel Rewriting (GR), pp. 471–478.
- ICALP-1979-Wegner #decidability #two-level grammar
- Bracketed Two-Level Grammars — A Decidable and Practical Approach to Language Definitions (LMW), pp. 668–682.
- FM-1979-FrantaBB #distributed #specification
- An Approach to the Specification of Distributed Software (WRF, WEB, HKB), pp. 197–236.
- POPL-1979-ReitmanA #axiom #data flow #source code
- Certifying Information Flow Properties of Programs: An Axiomatic Approach (RPR, GRA), pp. 283–290.
- SCC-1979-CordyHW #diagrams #semantics
- Semantic charts: A diagrammatic approach to semantic processing (JRC, RCH, DBW), pp. 39–49.
- ICSE-1979-Laventhal #reliability
- A Constructive Approach to Reliable Synchronization Code (MSL), pp. 194–202.
- ICSE-1979-RamamoorthyBFMNS #development #on the #validation
- On A Systematic Approach to the Development and Validation of Critical Software for Nuclear Power Plants (CVR, FBB, JMF, YKRM, CWN, KS), pp. 231–240.
- ICSE-1979-Rault #reliability #towards
- France on An Approach Towards Reliable Software (JCR), pp. 220–230.
- SIGMOD-1978-MarchS #automation #database #design #modelling
- A Mathematical Modeling Approach to the Automatic Selection of Database Designs (STM, DGS), pp. 52–65.
- GG-1978-NyrupM #algebra
- Map Grammars: Cycles and the Algebraic Approach (KN, BHM), pp. 331–340.
- SIGIR-1978-Koll1 #concept #information retrieval #named
- WEIRD: An Approach to Concept-Based Information Retrieval (MBK), p. 1.
- SIGIR-1978-Koll2 #concept #information retrieval #named
- WEIRD: An Approach to Concept-Based Information Retrieval (MBK), p. 180.
- SIGIR-1978-SlonimMF #information retrieval #named
- Mediator: An Integrated Approach to Information Retrieval (JS, FJM, PSF), pp. 14–36.
- ICSE-1978-AzemaAB #bottom-up #communication #design #verification
- Design and Verification of Communication Procedures: A Bottom-Up Approach (PA, JMA, BB), pp. 168–174.
- ICSE-1978-BrownF #graph #verification
- A Graph Theoretic Approach to the Verification of Program Structures (JRB, KFF), pp. 136–141.
- DAC-1978-Fisher #multi
- A multi-pass, multi-algorithm approach to PCB routing (RSF), pp. 82–91.
- DAC-1978-Gianfagna #data analysis #testing
- A unified approach to test data analysis (MAG), pp. 117–124.
- DAC-1978-NishiokaKYSO
- An approach to gate assignment and module placement for printed wiring boards (IN, TK, SY, IS, HO), pp. 60–69.
- DAC-1978-Ruch #graph #interactive #layout
- Interactive space layout: A graph theoretical approach (JR), pp. 152–157.
- STOC-1978-Goldschlager #modelling #parallel
- A Unified Approach to Models of Synchronous Parallel Machines (LMG), pp. 89–94.
- SIGMOD-1977-Bubenko #concept #design #modelling #named
- IAM: An Inferential Abstract Modeling Approach to Design of Conceptual Schema (JABJ), pp. 62–74.
- SIGMOD-1977-Merrett #cost analysis #database #top-down
- Database Cost Analysis: a Top-Down Approach (THM), pp. 135–143.
- SIGMOD-1977-Sharman #database #interactive #named
- Update-by-Dialogue: An Interactive Approach to Database Modification (GCHS), pp. 21–29.
- VLDB-1977-Fagin #composition #database #design #relational
- The Decomposition Versus Synthetic Approach to Relational Database Design (RF), pp. 441–446.
- VLDB-1977-Housel
- A Unified Approach to Program and Data Conversion (BCH), pp. 327–336.
- VLDB-1977-YehB #design #re-engineering #towards
- Toward a Design Methodology for DBMS: A Software Engineering Approach (RTY, JWB), pp. 16–27.
- DAC-1977-AllgairE #comparison
- A comprehensive approach to a connectivity audit, or a fruitful comparison of apples and oranges (RMA, DSE), pp. 312–321.
- DAC-1977-BergesonB #architecture
- An affordable approach to an architectural computer system (DEB, RB), pp. 254–264.
- DAC-1977-ChoKS #automation #design #layout #named
- Floss: An approach to automated layout for high-volume designs (YEC, AJK, DES), pp. 138–141.
- VLDB-J-1975-AstrahanBCEGGKLMMPTWW76 #database #relational
- System R: Relational Approach to Database Management (MMA, MWB, DDC, KPE, JG, PPG, WFKI, RAL, PRM, JWM, GRP, ILT, BWW, VW), pp. 97–137.
- SIGMOD-1976-Beck
- An Approach to the Creation of Structured Data Processing Systems (LLB), pp. 179–188.
- VLDB-1976-NahouraiiBC #communication #database
- An Approach to Data Communication between Different Generalized Data Base Management Systems (EN, LOB, AFC), pp. 117–142.
- ICSE-1976-BalzerGW #implementation #on the #programming
- On the Transformational Implementation Approach to Programming (RB, NMG, DSW), pp. 337–344.
- ICSE-1976-BellBD #requirements
- An Extendable Approach to Computer-Aided Software Requirements Engineering (TEB, DCB, MED), p. 70.
- ICSE-1976-Greene #automation #development #re-engineering
- Dynamic Software Engineering: An Evolutionary Approach to Automated Software Development and Management (JSG), pp. 373–378.
- ICSE-1976-Panzl #testing #verification
- Test Procedures: A New Approach to Software Verification (DJP), pp. 477–485.
- ICSE-1976-TurnDR #development
- A Management Approach to the Development of Computer-Based Systems (RT, MRD, RNR), pp. 305–311.
- ICSE-1976-WhiteB #design #towards
- Towards and Engineering Approach to Software Design (JRW, TLB), pp. 214–222.
- ICSE-1976-YauCC #design
- An Approach to Error-Resistant Software Design (SSY, RCC, DCC), pp. 429–436.
- SOSP-J-1975-OwickiG76 #axiom #parallel #source code #verification
- Verifying Properties of Parallel Programs: An Axiomatic Approach (SSO, DG), pp. 279–285.
- DAC-1976-Bernstein #modelling #network #physics
- Transmission line models, a unified physical network approach (SB), pp. 117–130.
- DAC-1976-HellerF
- An organizational approach to routing printed circuit boards (BDH, RSF), pp. 168–171.
- DAC-1976-VeldermanPM #interactive #programming
- An approach to interactive graphic programming (PV, GFP, PJM), pp. 366–370.
- DAC-1976-Yeh #verification
- An approach to program verification (RTY), pp. 295–300.
- SIGMOD-1975-BernsteinST #dependence #functional
- A Unified Approach to Functional Dependencies and Relations (PAB, JRS, DT), pp. 237–245.
- SIGMOD-1975-Shoshani #database
- A Logical-Level Approach to Data Base Conversion (AS), pp. 112–122.
- POPL-1975-Ligler #design
- A Mathematical Approach to Language Design (GTL), pp. 41–53.
- DAC-1975-Groger #clustering #logic
- A new approach to structural partitioning of computer logic (HJG), pp. 378–383.
- SIGFIDET-1974-MertenF
- A Data Description Language Approach to File Translation (AGM, JPF), pp. 191–205.
- SIGFIDET-1974-Rothnie #data transformation #implementation #relational
- An Approach to Implementing a Relational Data Management System (JBRJ), pp. 277–294.
- ICALP-1974-Roever #axiom #parametricity #recursion
- Recursion and Parameter Mechanisms: An Axiomatic Approach (WPdR), pp. 34–65.
- DAC-1974-HananMS #clustering #interactive #logic #problem
- An interactive man-machine approach to the computer logic partitioning problem (MH, AM, PKWS), pp. 70–81.
- DAC-1974-Los #combinator #optimisation #programming
- A combinatorial programming approach to the joint optimization of land use and transportation (ML), pp. 220–228.
- POPL-1973-Kildall #optimisation
- A Unified Approach to Global Program Optimization (GAK), pp. 194–206.
- POPL-1973-Zosel #compilation #parallel
- A Parallel Approach to Compilation (MZ), pp. 59–70.
- SIGFIDET-1972-FryST
- An Approach to Stored Data Definition and Translation (JPF, DCPS, RWT), pp. 13–56.
- SIGFIDET-1972-HawryszkiewyczD #correctness #database #proving
- An Approach to Proving the Correctness of Data Base Operations (IH, JBD), pp. 323–348.
- SIGFIDET-1972-JervisP #relational
- An Approach for a Working Relational Data System (BJ, JLP), pp. 125–145.
- ICALP-1972-AguzziPS #algorithm #programming language #semantics
- An Algorithmic Approach to the Semantics of Programming Languages (GA, RP, RS), pp. 147–166.
- ICALP-1972-MannaV #fixpoint #formal method
- Fixpoint Approach to the Theory of Computation (ZM, JV), pp. 273–291.
- ICALP-1972-Turner #complexity #infinity
- An Infinite Hierarchy of Term Languages — An Approach to Mathematical Complexity (RT), pp. 593–608.
- ICALP-1972-Wand #recursion
- A Concrete Approach to Abstract Recursion Definitions (MW), pp. 331–341.
- DAC-1972-FrewR #layout #problem
- Building polyonimoes; an approach to the space layout problem (RSF, PHR), p. 238.
- DAC-1972-Roberts #comparison
- A heathkit approach for computer-aided comparison of building alternatives (RDR), pp. 220–228.
- SIGIR-1971-Teichroew #research
- An Approach to Research in File Organization (DT), pp. 147–154.
- DAC-1971-Grason #graph #using
- An approach to computerized space planning using graph theory (JG), pp. 170–178.
- DAC-1971-Penz #design #simulation
- A computer simulation approach to elevator system design (AJP), pp. 259–268.
- DAC-1971-VishnubhotlaC #analysis
- A path analysis approach to the diagnosis of combinational circuits (SRV, YHC), pp. 222–230.
- SOSP-1971-Kahn #correctness
- An Approach to System Correctness (GK), pp. 86–94.
- SIGFIDET-1970-Young
- A Procedural Approach to File Translation (JWY), pp. 354–367.
- DAC-1970-BottorffSV #automation #fault #memory management #problem #testing
- An automatic system approach to the problem of memory circuit testing & fault diagnosis (PSB, MES, FJV), pp. 95–99.
- DAC-1970-KrolakFM #problem #towards
- A man-machine approach toward solving the traveling salesman problem (PDK, WF, GM), pp. 250–264.
- DAC-1970-Sr70a #design #network
- Digital network design aids — an integrated approach (EKBS), pp. 220–229.
- DAC-1969-OuallineMER #generative #named
- GLAD — a systems approach to artwork generation (CMO, LFHM, PE, SPR), pp. 403–414.
- DAC-1968-LewisS #design
- Dames an integrated systems approach to computer-aided design of electronic systems (RL, RS).