Tag #approach
5783 papers:
ASPLOS-2020-ApostolakisXCCA #automation #named #parallel- Perspective: A Sensible Approach to Speculative Automatic Parallelization (SA, ZX, GC, SC, DIA), pp. 351–367.
CGO-2020-ShobakiKM #combinator #gpu #optimisation #using- Optimizing occupancy and ILP on the GPU using a combinatorial approach (GS, AK, SM), pp. 133–144.
ECSA-2019-NunesSS #architecture #transaction- From a Monolith to a Microservices Architecture: An Approach Based on Transactional Contexts (LN, NS0, ARS), pp. 37–52.
ICSA-2019-UllahB #adaptation #architecture #big data #security- An Architecture-Driven Adaptation Approach for Big Data Cyber Security Analytics (FU, MAB), pp. 41–50.
EDM-2019-DicklerLG #assessment #automation #data-driven- A Data-Driven Approach for Automated Assessment of Scientific Explanations in Science Inquiry (RD, HL, JDG).
EDM-2019-HarrakBL #categorisation #hybrid #student #using- Categorizing students' questions using an ensemble hybrid approach (FH, FB, VL).
EDM-2019-HowlinD #behaviour #clustering #detection #fuzzy #student #using- Detecting Outlier Behaviors in Student Progress Trajectories Using a Repeated Fuzzy Clustering Approach (CPH, CDD).
EDM-2019-MooreCEZRB #component #multi #student- Skills Embeddings: A Neural Approach to Multicomponent Representations of Students and Tasks (RM, AC, ME, AHZ, AR, PB).
ICSME-2019-AnuCSH0Q #recommendation- An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention (HA, JC, WS, JH, BL0, BQ), pp. 125–134.
ICSME-2019-BraiekK #named #network #search-based #testing- DeepEvolution: A Search-Based Testing Approach for Deep Neural Networks (HBB, FK), pp. 454–458.
ICSME-2019-GaoWLYSC #clone detection #detection #named- TECCD: A Tree Embedding Approach for Code Clone Detection (YG, ZW, SL, LY, WS, YC), pp. 145–156.
ICSME-2019-NeupaneCW #development #named- EmoD: An End-to-End Approach for Investigating Emotion Dynamics in Software Development (KN, KC, YW), pp. 252–256.
MSR-2019-MatsumotoHK #hybrid- Beyond GumTree: a hybrid approach to generate edit scripts (JM, YH, SK), pp. 550–554.
SANER-2019-ChenYYZ #api #documentation #integration- A Human-as-Sensors Approach to API Documentation Integration and Its Effects on Novice Programmers (CC, YY, LY, KZ), pp. 197–206.
SANER-2019-XieCYLHDZ #graph #learning #named- DeepLink: A Code Knowledge Graph Based Deep Learning Approach for Issue-Commit Link Recovery (RX, LC, WY0, ZL, TH, DD, SZ), pp. 434–444.
SANER-2019-ZhangLML #effectiveness #fault #named #network #using- CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks (ZZ0, YL, XM, PL), pp. 445–455.
FM-2019-TanP #axiom #difference #equation #liveness- An Axiomatic Approach to Liveness for Differential Equations (YKT, AP), pp. 371–388.
- IFM-2019-BowlesC #combinator #optimisation #problem
- An Integrated Approach to a Combinatorial Optimisation Problem (JB, MBC), pp. 284–302.
SEFM-2019-AvellanedaP #automaton #learning #satisfiability- Learning Minimal DFA: Taking Inspiration from RPNI to Improve SAT Approach (FA, AP), pp. 243–256.
Haskell-2019-Devriese #case study #composition #haskell #morphism #polymorphism #taxonomy #verification- Modular effects in Haskell through effect polymorphism and explicit dictionary applications: a new approach and the μVeriFast verifier as a case study (DD), pp. 1–14.
CHI-PLAY-2019-CmentowskiKK #artificial reality #game studies #multi #named- Outstanding: A Multi-Perspective Travel Approach for Virtual Reality Games (SC, AK, JHK), pp. 287–299.
CoG-2019-HuangL #optimisation #policy #self- A Self-Play Policy Optimization Approach to Battling Pokémon (DH, SL), pp. 1–4.
CoG-2019-LucasDVBGBPMK #game studies #learning- A Local Approach to Forward Model Learning: Results on the Game of Life Game (SML, AD, VV, CB, RDG, IB, DPL, SM, RK), pp. 1–8.
CoG-2019-NaderiBRH #learning- A Reinforcement Learning Approach To Synthesizing Climbing Movements (KN, AB, SR, PH), pp. 1–7.
CoG-2019-NeufeldML #evaluation #evolution #game studies #hybrid- Evolving Game State Evaluation Functions for a Hybrid Planning Approach (XN, SM, DPL), pp. 1–8.
CoG-2019-ParakhCS #design #game studies #network #problem #towards- An Approach Towards Designing Problem Networks in Serious Games (AP, PC, MS), pp. 1–8.
CoG-2019-VihangaBLK #clustering #game studies #online- Weekly Seasonal Player Population Patterns in Online Games: A Time Series Clustering Approach (DV, MB, EL, KK), pp. 1–8.
CoG-2019-XuC #challenge- A Hierarchical Approach for MARLÖ Challenge (LX, YC), pp. 1–4.
DiGRA-2019-SusiTW #game studies #online- “Can you send me a photo?” - A Game-Based Approach for Increasing Young Children's Risk Awareness to Prevent Online Sexual Grooming (TS, NT, UW).
FDG-2019-KicikogluBCP #gamification #named- Wormingo: a 'true gamification' approach to anaphoric annotation (DK, RB, JC, MP), p. 7.
FDG-2019-ZelekeOS #game studies #hybrid- Analyzing action games: a hybrid systems approach (YZ, JCO, RGS), p. 11.
ICGJ-2019-MyersPC #game studies #social- Game Jams as a Space to Tackle Social Issues: an Approach Based on the Critical Pedagogy (CM, LSGP, TC), p. 8.
VS-Games-2019-GardeliV #artificial reality #named- ARQuest: A Tangible Augmented Reality Approach to Developing Computational Thinking Skills (AG, SV), pp. 1–8.
CIKM-2019-DengLSDFYL #multi #named- MedTruth: A Semi-supervised Approach to Discovering Knowledge Condition Information from Multi-Source Medical Data (YD, YL, YS, ND, WF, MY0, KL), pp. 719–728.
CIKM-2019-FanZDCSL #graph #identification #learning #network #novel- Learning to Identify High Betweenness Centrality Nodes from Scratch: A Novel Graph Neural Network Approach (CF, LZ, YD, MC, YS, ZL), pp. 559–568.
CIKM-2019-HuangCLCHLZZW #classification #multi #network- Hierarchical Multi-label Text Classification: An Attention-based Recurrent Network Approach (WH, EC, QL0, YC, ZH, YL, ZZ, DZ, SW), pp. 1051–1060.
CIKM-2019-KrishnanCTS #composition #recommendation #social- A Modular Adversarial Approach to Social Recommendation (AK, HC, TC0, HS), pp. 1753–1762.
CIKM-2019-LiJC0W #hybrid #named #recommendation- HAES: A New Hybrid Approach for Movie Recommendation with Elastic Serendipity (XL, WJ, WC, JW0, GW0), pp. 1503–1512.
CIKM-2019-LongWDSJL #community #network- Hierarchical Community Structure Preserving Network Embedding: A Subspace Approach (QL, YW, LD, GS, YJ, WL), pp. 409–418.
CIKM-2019-SinhaMSMS0 #identification #multi #twitter- #suicidal - A Multipronged Approach to Identify and Explore Suicidal Ideation in Twitter (PPS, RM, RS, DM, RRS, HL0), pp. 941–950.
CIKM-2019-YiDLLZZ #modelling #named- CityTraffic: Modeling Citywide Traffic via Neural Memorization and Generalization Approach (XY, ZD, TL, TL, JZ, YZ), pp. 2665–2671.
ECIR-p1-2019-DijkFFK #information retrieval #markov- A Markovian Approach to Evaluate Session-Based IR Systems (DvD, MF, NF0, EK), pp. 621–635.
ECIR-p1-2019-GhaderyMSFS #detection #independence #named- LICD: A Language-Independent Approach for Aspect Category Detection (EG, SM, MJS, HF, AS), pp. 575–589.
ECIR-p1-2019-KimY #automation #hybrid #modelling- A Hybrid Modeling Approach for an Automated Lyrics-Rating System for Adolescents (JK, MYY), pp. 779–786.
ECIR-p1-2019-PfeiferL #clustering #modelling #topic- Topic Grouper: An Agglomerative Clustering Approach to Topic Modeling (DP, JLL), pp. 590–603.
ECIR-p1-2019-RenningsMH #axiom #information retrieval #modelling- An Axiomatic Approach to Diagnosing Neural IR Models (DR, FM, CH), pp. 489–503.
ECIR-p2-2019-CetoliBOSA - A Neural Approach to Entity Linking on Wikidata (AC, SB, ADO, MS, MA), pp. 78–86.
ECIR-p2-2019-RamrakhiyaniPV - A Simple Neural Approach to Spatial Role Labelling (NR, GKP, VV), pp. 102–108.
ECIR-p2-2019-Russell-RoseCK #query- Rethinking 'Advanced Search': A New Approach to Complex Query Formulation (TRR, JC, UK), pp. 236–240.
ICML-2019-AdelW #learning #named #visual notation- TibGM: A Transferable and Information-Based Graphical Model Approach for Reinforcement Learning (TA, AW), pp. 71–81.
ICML-2019-AndertonA #scalability- Scaling Up Ordinal Embedding: A Landmark Approach (JA, JAA), pp. 282–290.
ICML-2019-BalajiHCF #statistics- Entropic GANs meet VAEs: A Statistical Approach to Compute Sample Likelihoods in GANs (YB, HH, RC, SF), pp. 414–423.
ICML-2019-ChenTZB00 #generative #network- A Gradual, Semi-Discrete Approach to Generative Network Training via Explicit Wasserstein Minimization (YC, MT, CZ, BB, DH0, JP0), pp. 1071–1080.
ICML-2019-DiaconuW #learning- Learning to Convolve: A Generalized Weight-Tying Approach (ND, DEW), pp. 1586–1595.
ICML-2019-LeeJAJ #functional #game studies- Functional Transparency for Structured Data: a Game-Theoretic Approach (GHL, WJ, DAM, TSJ), pp. 3723–3733.
ICML-2019-LiuLWJ #adaptation #classification- Transferable Adversarial Training: A General Approach to Adapting Deep Classifiers (HL, ML, JW0, MIJ), pp. 4013–4022.
ICML-2019-PolianskiiP #bound #classification #geometry #integration #monte carlo- Voronoi Boundary Classification: A High-Dimensional Geometric Approach via Weighted Monte Carlo Integration (VP, FTP), pp. 5162–5170.
ICML-2019-WengCNSBOD #named #network #probability #robust #verification- PROVEN: Verifying Robustness of Neural Networks with a Probabilistic Approach (LW, PYC, LMN, MSS, AB, IVO, LD), pp. 6727–6736.
ICML-2019-ZhouYWP #architecture #named- BayesNAS: A Bayesian Approach for Neural Architecture Search (HZ, MY, JW0, WP), pp. 7603–7613.
KDD-2019-ChenTYZC #data-driven #industrial #multi #problem- A Data-Driven Approach for Multi-level Packing Problems in Manufacturing Industry (LC0, XT, MY, JZ, LC0), pp. 1762–1770.
KDD-2019-HanNCLHX #generative #recommendation- A Deep Generative Approach to Search Extrapolation and Recommendation (FXH, DN, HC, KL, YH, YX), pp. 1771–1779.
KDD-2019-HulsebosHBZSKDH #data type #detection #learning #named #semantics- Sherlock: A Deep Learning Approach to Semantic Data Type Detection (MH, KZH, MAB, EZ, AS, TK, ÇD, CAH), pp. 1500–1508.
KDD-2019-InabaFKZ #distance #energy #learning #metric- A Free Energy Based Approach for Distance Metric Learning (SI, CTF, RVK, KZ), pp. 5–13.
KDD-2019-LeeIFSM #data-driven #estimation #named #using- DeepRoof: A Data-driven Approach For Solar Potential Estimation Using Rooftop Imagery (SL, SI, MF, PJS, SM), pp. 2105–2113.
KDD-2019-LiHWL #community #detection #named- EdMot: An Edge Enhancement Approach for Motif-aware Community Detection (PZL, LH, CDW, JHL), pp. 479–487.
KDD-2019-NetoPPTBMO #health #machine learning #permutation- A Permutation Approach to Assess Confounding in Machine Learning Applications for Digital Health (ECN, AP, TMP, MT, BMB, LM, LO), pp. 54–64.
KDD-2019-SrivastavaHK #machine learning- Mathematical Notions vs. Human Perception of Fairness: A Descriptive Approach to Fairness for Machine Learning (MS, HH, AK), pp. 2459–2468.
KDD-2019-SunZZSHX #network- The Impact of Person-Organization Fit on Talent Management: A Structure-Aware Convolutional Neural Network Approach (YS, FZ, HZ, XS, QH, HX), pp. 1625–1633.
KDD-2019-TangQZWXMZY #multi #order- A Deep Value-network Based Approach for Multi-Driver Order Dispatching (XT, Z(Q, FZ, ZW, ZX, YM, HZ, JY), pp. 1780–1790.
KDD-2019-Thondikulam #ml #scalability- Analytics Journey Map: An Approach Enable to ML at Scale (GT), p. 3167.
KDD-2019-TuLYC #feedback #modelling- Feedback Shaping: A Modeling Approach to Nurture Content Creation (YT, CL, YY, SC), pp. 2241–2250.
KDD-2019-WangLYLLZ0 #machine learning #nondeterminism #quantifier- Deep Uncertainty Quantification: A Machine Learning Approach for Weather Forecasting (BW, JL0, ZY0, HL, TL, YZ0, GZ0), pp. 2087–2095.
KDD-2019-Ye #data-driven #named- Transportation: A Data Driven Approach (JY), p. 3183.
KDD-2019-YoonHSF #detection #graph #performance- Fast and Accurate Anomaly Detection in Dynamic Graphs with a Two-Pronged Approach (MY, BH, KS, CF), pp. 647–657.
MoDELS-2019-BesnardTJ0D19a #automaton #modelling #monitoring #uml #verification- Verifying and Monitoring UML Models with Observer Automata: A Transformation-Free Approach (VB, CT, FJ, MB0, PD), pp. 161–171.
MoDELS-2019-BrandG #adaptation #architecture #evaluation #modelling #runtime- Modeling Approach and Evaluation Criteria for Adaptable Architectural Runtime Model Instances (TB, HG), pp. 227–232.
MoDELS-2019-IqbalSKHQ #modelling #testing- A Model-Based Testing Approach for Cockpit Display Systems of Avionics (MZI, HS, MUK, FUH, IQ), pp. 67–77.
MoDELS-2019-NguyenRRPI #automation #classification #machine learning #metamodelling #repository- Automated Classification of Metamodel Repositories: A Machine Learning Approach (PTN, JDR, DDR, AP, LI), pp. 272–282.
MoDELS-2019-PouraliA19a #challenge #debugging #editing #modelling #uml- A Focus+Context Approach to Alleviate Cognitive Challenges of Editing and Debugging UML Models (PP, JMA), pp. 183–193.
ECOOP-2019-LuoDB #analysis #editing #ide #named- MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper) (LL, JD, EB), p. 25.
Onward-2019-KaminaA #persistent- An approach for persistent time-varying values (TK, TA), pp. 17–31.
OOPSLA-2019-HenriksenBP #parsing- Derivative grammars: a symbolic approach to parsing with derivatives (IH, GB, KP), p. 28.
OOPSLA-2019-WuCHS0 #fault #generative #learning #precise #specification- Generating precise error specifications for C: a zero shot learning approach (BW, JPCI, YH, AS, SC0), p. 30.
PLATEAU-2019-CohenNS #declarative #design- Designing Declarative Language Tutorials: A Guided and Individualized Approach (AKC, WN, JS), p. 6.
PADL-2019-PendharkarG #natural language- An ASP Based Approach to Answering Questions for Natural Language Text (DP, GG), pp. 46–63.
PLDI-2019-AndersonPDC #abstraction #network #optimisation #robust- Optimization and abstraction: a synergistic approach for analyzing neural network robustness (GA, SP, ID, SC), pp. 731–744.
PLDI-2019-KrishnaswamiY #algebra #parsing- A typed, algebraic approach to parsing (NRK, JY), pp. 379–393.
POPL-2019-WangWS #compilation #composition #stack- An abstract stack based approach to verified compositional compilation to machine code (YW, PW, ZS), p. 30.
ASE-2019-Gu00 #api #graph #kernel #named- CodeKernel: A Graph Kernel Based Approach to the Selection of API Usage Examples (XG, HZ0, SK0), pp. 590–601.
ASE-2019-LacomisYSAGNV #identifier #named- DIRE: A Neural Approach to Decompiled Identifier Naming (JL, PY, EJS, MA, CLG, GN, BV), pp. 628–639.
ASE-2019-LiY0C #android #automation #black box #named #testing- Humanoid: A Deep Learning-Based Approach to Automated Black-box Android App Testing (YL, ZY, YG0, XC), pp. 1070–1073.
ASE-2019-Neupane #development- An Approach for Investigating Emotion Dynamics in Software Development (KN), pp. 1268–1270.
ASE-2019-Xiao #android #detection- An Image-Inspired and CNN-Based Android Malware Detection Approach (XX), pp. 1259–1261.
ASE-2019-Zhang #identification #injection #machine learning #sql- A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities (KZ), pp. 1286–1288.
ASE-2019-ZhangC #adaptation #learning #modelling #named- Apricot: A Weight-Adaptation Approach to Fixing Deep Learning Models (HZ, WKC), pp. 376–387.
ESEC-FSE-2019-ChenCLML #analysis #learning #named #re-engineering #sentiment- SEntiMoji: an emoji-powered learning approach for sentiment analysis in software engineering (ZC, YC, XL, QM, XL), pp. 841–852.
ESEC-FSE-2019-HiraoMIM #code review #empirical #graph #overview- The review linkage graph for code review analytics: a recovery approach and empirical study (TH, SM, AI, KM), pp. 578–589.
ESEC-FSE-2019-MiryeganehAH #automation #dataset #integration #towards- An IR-based approach towards automated integration of geo-spatial datasets in map-based software systems (NM, MA, HH), pp. 946–954.
ESEC-FSE-2019-SantosSCGM #architecture- Achilles' heel of plug-and-Play software architectures: a grounded theory based approach (JCSS, AS, TC, SG, MM), pp. 671–682.
ESEC-FSE-2019-Wang0LXBXW #automation #documentation #source code #taxonomy- A learning-based approach for automatic construction of domain glossary from source code and documentation (CW, XP0, ML, ZX, XB, BX, TW), pp. 97–108.
ASPLOS-2019-JiangSF0 #parallel #scalability- Scalable Processing of Contemporary Semi-Structured Data on Commodity Parallel Processors - A Compilation-based Approach (LJ, XS, UF, ZZ0), pp. 79–92.
ASPLOS-2019-LascorzJSPMSNSM #hardware #named #network- Bit-Tactical: A Software/Hardware Approach to Exploiting Value and Bit Sparsity in Neural Networks (ADL, PJ, DMS, ZP, MM, SS, MN, KS, AM), pp. 749–763.
CASE-2019-AhmedG0 #detection #generative #named #online- O-LoMST: An Online Anomaly Detection Approach And Its Application In A Hydropower Generation Plant (IA, TG, YD0), pp. 762–767.
CASE-2019-AzefackPAGCBX #behaviour #detection #smarttech- An Approach for Behavioral Drift Detection in a Smart Home (CA, RP, VA, GG, CMC, RB, XX), pp. 727–732.
CASE-2019-CarliDP #distributed #energy #game studies #generative #scheduling- A Distributed Control Approach Based on Game Theory for the Optimal Energy Scheduling of a Residential Microgrid with Shared Generation and Storage (RC, MD, VP), pp. 960–965.
CASE-2019-ColomboGARTBG #constraints #mobile #predict- Parameterized Model Predictive Control of a Nonholonomic Mobile Manipulator: A Terminal Constraint-Free Approach (RC, FG, VA, PR, ST, LB, SKG), pp. 1437–1442.
CASE-2019-JiangO #grid- Optimal Control of a Fleet of AGVs on a Rectangular Grid: a MILP-based Approach (JJ, DO), pp. 1054–1059.
CASE-2019-JiaXSWLS #development #industrial #internet #research- Research on the development approach of regional manufacturing industry in Internet+era* (ZJ, YX, GS, MW, TL, ZS), pp. 356–361.
CASE-2019-KutzkeB - Conflict Resolution for Heterogeneous Teams in Communication-limited Environments: A Generous Agent Approach (DTK, MJB), pp. 535–540.
CASE-2019-LiuHS #exponential #learning #scheduling- A new solution approach for flow shop scheduling with an exponential time-dependent learning effect (LL, HH, LS), pp. 468–473.
CASE-2019-LugaresiAFM #modelling #novel #realtime #validation- Real-time Validation of Digital Models for Manufacturing Systems: a Novel Signal-processing-based Approach (GL, GA, FF, AM), pp. 450–455.
CASE-2019-MatsuokaNT #identification #machine learning #problem #scheduling- Machine Learning Approach for Identification of Objective Function in Production Scheduling Problems (YM, TN, KT), pp. 679–684.
CASE-2019-PippiaLCSS #predict- Scenario-based Model Predictive Control Approach for Heating Systems in an Office Building (TP, JL, RDC, JS, BDS), pp. 1243–1248.
CASE-2019-RazaL #learning #multi #policy- Constructive Policy: Reinforcement Learning Approach for Connected Multi-Agent Systems (SJAR, ML), pp. 257–262.
CASE-2019-SartoriZY #3d #design #multi #performance- An efficient approach to near-optimal 3D trajectory design in cluttered environments for multirotor UAVs (DS, DZ, WY), pp. 1016–1022.
CASE-2019-StrengeSR #modelling #petri net- Modeling and control of prosumer-based microgrids: a Petri net approach (LS, GS, JR), pp. 209–215.
CASE-2019-WangY0 #learning #monitoring- A Deep Learning Approach for Heating and Cooling Equipment Monitoring (YW, CY, WS0), pp. 228–234.
CASE-2019-XuLWZCQ #learning #performance- An Improved GA-KRR Nested Learning Approach for Refrigeration Compressor Performance Forecasting* (CX, XL, JW, JZ, JC, WQ), pp. 622–627.
CASE-2019-ZhouWXS00G #learning #modelling #personalisation #predict- A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment (YZ, XW, ZX, YS, TL0, CS0, XG), pp. 739–744.
CGO-2019-QiaoRHT #kernel #locality #optimisation- From Loop Fusion to Kernel Fusion: A Domain-Specific Approach to Locality Optimization (BQ, OR, FH, JT), pp. 242–253.
FASE-2019-SchneiderLO #graph #incremental- A Logic-Based Incremental Approach to Graph Repair (SS0, LL, FO), pp. 151–167.
CAV-2019-Busatto-GastonM #automaton #robust #synthesis- Robust Controller Synthesis in Timed Büchi Automata: A Symbolic Approach (DBG, BM, PAR, OS), pp. 572–590.
ICST-2019-MuscoYN #clustering #implementation #named #testing- SmokeOut: An Approach for Testing Clustering Implementations (VM, XY, IN), pp. 473–480.
ICST-2019-Tan #modelling #testing- A Model-Based Approach to Generate Dynamic Synthetic Test Data (CT), pp. 495–497.
ICTSS-2019-VinarskiiLKYZ #detection #model checking- A Model Checking Based Approach for Detecting SDN Races (EV, JL, NK, NY, DZ), pp. 194–211.
ECSA-2018-AlkhabbasSD #architecture #internet #named- ECo-IoT: An Architectural Approach for Realizing Emergent Configurations in the Internet of Things (FA, RS, PD), pp. 86–102.
ECSA-2018-AvritzerFJRSH #architecture #assessment #automation #deployment #performance #testing- A Quantitative Approach for the Assessment of Microservice Architecture Deployment Alternatives by Automated Performance Testing (AA, VF, AJ, BR, HS, AvH), pp. 159–174.
ICSA-2018-ArcelliCDP #architecture #multi #named #refactoring- EASIER: An Evolutionary Approach for Multi-objective Software ArchItecturE Refactoring (DA, VC, MD, DDP), pp. 105–114.
ICSA-2018-ArtacBNGPT #architecture #data-driven #development #modelling- Infrastructure-as-Code for Data-Intensive Architectures: A Model-Driven Development Approach (MA, TB, EDN, MG, DPP, DAT), pp. 156–165.
JCDL-2018-MeuschkeGSBKG #adaptation #detection- An Adaptive Image-based Plagiarism Detection Approach (NM, CG, DS, CB, DAK, BG), pp. 131–140.
JCDL-2018-RischK #question- My Approach = Your Apparatus? (JR, RK), pp. 283–292.
EDM-2018-BackenkohlerSSW #data-driven #education #personalisation #towards- Data-Driven Approach Towards a Personalized Curriculum (MB, FS, AS, VW).
EDM-2018-ChopraGKMG #difference #gender #mining- Gender Differences in Undergraduate Engineering Applicants: A Text Mining Approach (SC, HG, AK, MM, LG).
EDM-2018-CookOKD #authentication #education #using- An Open Vocabulary Approach for Estimating Teacher Use of Authentic Questions in Classroom Discourse (CC, AO, SK, SD).
EDM-2018-EstebanGR #algorithm #hybrid #multi #recommendation #search-based #student #using- A Hybrid Multi-Criteria approach using a Genetic Algorithm for Recommending Courses to University Students (AE, AZG, CR).
ICPC-2018-JaffeLSGV - Meaningful variable names for decompiled code: a machine translation approach (AJ, JL, EJS, CLG, BV), pp. 20–30.
ICPC-2018-MessaoudiPBBS #identification #search-based- A search-based approach for accurate identification of log message formats (SM, AP, DB, LCB, RS), pp. 167–177.
ICSME-2018-HuZLWLG #analysis #hybrid #named #semantics- BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis (YH, YZ0, JL, HW, BL, DG), pp. 104–114.
ICSME-2018-LecerfBGD #automation #pattern matching #program transformation #reflexive- A Reflexive and Automated Approach to Syntactic Pattern Matching in Code Transformations (JL, JB, TG, SD), pp. 426–436.
ICSME-2018-SabettaB #automation #classification #commit- A Practical Approach to the Automatic Classification of Security-Relevant Commits (AS, MB), pp. 579–582.
ICSME-2018-StanikMMFM #community #open source- A Simple NLP-Based Approach to Support Onboarding and Retention in Open Source Communities (CS, LM, DM, DF, WM), pp. 172–182.
MSR-2018-BenkocziGHK08 #design #matrix- A design structure matrix approach for measuring co-change-modularity of software products (RB, DRG, SH, MAK), pp. 331–335.
MSR-2018-OttAHBL08 #identification #image #learning #source code #video- A deep learning approach to identifying source code in images and video (JO, AA, PH, AB, EL), pp. 376–386.
SANER-2018-DorningerMK #challenge #industrial #re-engineering- Reengineering an industrial HMI: Approach, objectives, and challenges (BD, MM, AK), pp. 547–551.
SANER-2018-KuleszK0 #correctness #evolution #semantics #spreadsheet- Spreadsheet guardian: An approach to protecting semantic correctness throughout the evolution of spreadsheets (journal-first abstract) (DK, VK, SW0), p. 476.
SANER-2018-ObbinkMSL #challenge #javascript- An extensible approach for taming the challenges of JavaScript dead code elimination (NGO, IM, GLS, PL), pp. 391–401.
DLT-2018-Davies #complexity #formal method- A General Approach to State Complexity of Operations: Formalization and Limitations (SD), pp. 256–268.
FM-2018-AmericoAM #algebra #data flow #reasoning- An Algebraic Approach for Reasoning About Information Flow (AA, MSA, AM), pp. 55–72.
AIIDE-2018-BeaupreWBS #design pattern #generative #multi- A Design Pattern Approach for Multi-Game Level Generation (SB, TW, SB, GS), pp. 145–151.
AIIDE-2018-HornMSC #automation #monte carlo- A Monte Carlo Approach to Skill-Based Automated Playtesting (BH, JAM, GS, SC), pp. 166–172.
AIIDE-2018-NeufeldMB #behaviour #execution #hybrid #network- A Hybrid Approach to Planning and Execution in Dynamic Environments Through Hierarchical Task Networks and Behavior Trees (XN, SM, SB), pp. 201–207.
CHI-PLAY-2018-DSouzaPKW #game studies #social- Augmenting Co-Located Social Play with Biofeedback: An Interactional Approach (AD, BP, MK, PW), pp. 113–125.
CIG-2018-VolzMP #game studies #social- A Social Science-based Approach to Explanations for (Game) AI (VV, KM, MP), pp. 1–2.
FDG-2018-GundryD #design #elicitation #game studies- Intrinsic elicitation: a model and design approach for games collecting human subject data (DG, SD), p. 10.
CIKM-2018-0002SZW0 #modelling #quantum- A Quantum Many-body Wave Function Inspired Language Modeling Approach (PZ0, ZS, LZ, BW, DS0), pp. 1303–1312.
CIKM-2018-DaveZHAK #learning #recommendation #representation- A Combined Representation Learning Approach for Better Job and Skill Recommendation (VSD, BZ, MAH, KA, MK), pp. 1997–2005.
CIKM-2018-FangOMHXY #effectiveness #modelling #topic #twitter- An Effective Approach for Modelling Time Features for Classifying Bursty Topics on Twitter (AF, IO, CM, PH, XX, HTY), pp. 1547–1550.
CIKM-2018-GiannakopoulosT #modelling- A Content-Based Approach for Modeling Analytics Operators (IG, DT, NK), pp. 227–236.
CIKM-2018-KrishnanSSS #collaboration #performance- An Adversarial Approach to Improve Long-Tail Performance in Neural Collaborative Filtering (AK, AS, AS, HS), pp. 1491–1494.
CIKM-2018-LiLCOL #classification #documentation #modelling #topic- Dataless Text Classification: A Topic Modeling Approach with Document Manifold (XL, CL, JC, JO, CL), pp. 973–982.
CIKM-2018-VainshteinGKSR #automation #hybrid #recommendation- A Hybrid Approach for Automatic Model Recommendation (RV, AGM, GK, BS, LR), pp. 1623–1626.
CIKM-2018-ZhaoX0ZLZ #comprehension #learning #on the #predict- On Prediction of User Destination by Sub-Trajectory Understanding: A Deep Learning based Approach (JZ, JX, RZ0, PZ, CL, FZ), pp. 1413–1422.
CIKM-2018-Zhu0WL - K-core Minimization: An Edge Manipulation Approach (WZ, CC0, XW0, XL0), pp. 1667–1670.
ECIR-2018-CohenC #hybrid #retrieval- A Hybrid Embedding Approach to Noisy Answer Passage Retrieval (DC, WBC), pp. 127–140.
ECIR-2018-GharebaghRN #agile #mining #novel- T-Shaped Mining: A Novel Approach to Talent Finding for Agile Software Teams (SSG, PR, MN), pp. 411–423.
ECIR-2018-JiaS #performance #recommendation- Local Is Good: A Fast Citation Recommendation Approach (HJ, ES), pp. 758–764.
ECIR-2018-MajumderPVGMBG #automation #e-commerce #retrieval- Automated Assistance in E-commerce: An Approach Based on Category-Sensitive Retrieval (AM, AP, KV, AG, SM, PB, PG), pp. 604–610.
ECIR-2018-Martinez-Castano #detection #modelling #realtime #social #social media- A Micromodule Approach for Building Real-Time Systems with Python-Based Models: Application to Early Risk Detection of Depression on Social Media (RMC, JCP, DEL, FC), pp. 801–805.
ECIR-2018-MeladianosXNV #detection #optimisation #summary #twitter- An Optimization Approach for Sub-event Detection and Summarization in Twitter (PM, CX, GN, MV), pp. 481–493.
ECIR-2018-ShahshahaniHZS #ranking #towards- Towards a Unified Supervised Approach for Ranking Triples of Type-Like Relations (MSS, FH, HZ, AS), pp. 707–714.
ECIR-2018-SpitzG #topic- Entity-Centric Topic Extraction and Exploration: A Network-Based Approach (AS, MG), pp. 3–15.
ECIR-2018-SreepadaP #collaboration #incremental #streaming- An Incremental Approach for Collaborative Filtering in Streaming Scenarios (RSS, BKP), pp. 632–637.
ECIR-2018-StihecZP #detection #hybrid #semantics- Simplified Hybrid Approach for Detection of Semantic Orientations in Economic Texts (JS, MZ, SP), pp. 692–698.
ICML-2018-AgarwalBD0W #classification #reduction- A Reductions Approach to Fair Classification (AA, AB, MD, JL0, HMW), pp. 60–69.
ICML-2018-Arora0NZ #bound- Stronger Generalization Bounds for Deep Nets via a Compression Approach (SA, RG0, BN, YZ), pp. 254–263.
ICML-2018-BacciuEM #generative #graph #markov- Contextual Graph Markov Model: A Deep and Generative Approach to Graph Processing (DB, FE, AM), pp. 304–313.
ICML-2018-EfroniDSM #learning- Beyond the One-Step Greedy Approach in Reinforcement Learning (YE, GD, BS, SM), pp. 1386–1395.
ICML-2018-JaffeWCKN #learning #modelling- Learning Binary Latent Variable Models: A Tensor Eigenpair Approach (AJ, RW, SC, YK, BN), pp. 2201–2210.
ICML-2018-LiaoC18a #learning #matrix #random- The Dynamics of Learning: A Random Matrix Approach (ZL, RC), pp. 3078–3087.
ICML-2018-LiH #learning #network- An Optimal Control Approach to Deep Learning and Applications to Discrete-Weight Neural Networks (QL, SH), pp. 2991–3000.
ICML-2018-Mitrovic0ZK #scalability #summary- Data Summarization at Scale: A Two-Stage Submodular Approach (MM, EK0, MZ, AK), pp. 3593–3602.
ICML-2018-PearceBZN #learning #predict- High-Quality Prediction Intervals for Deep Learning: A Distribution-Free, Ensembled Approach (TP, AB, MZ, AN), pp. 4072–4081.
ICML-2018-ShiS0 #estimation- A Spectral Approach to Gradient Estimation for Implicit Distributions (JS, SS, JZ0), pp. 4651–4660.
ICML-2018-WuHS #collaboration #named #ranking- SQL-Rank: A Listwise Approach to Collaborative Ranking (LW, CJH, JS), pp. 5311–5320.
ICML-2018-YeS #network- Variable Selection via Penalized Neural Network: a Drop-Out-One Loss Approach (MY, YS), pp. 5616–5625.
ICML-2018-ZhengPF #robust- A Robust Approach to Sequential Information Theoretic Planning (SZ, JP, JWFI), pp. 5936–5944.
ICPR-2018-Aldana-LopezCZG #learning #network- Dynamic Learning Rate for Neural Networks: A Fixed-Time Stability Approach (RAL, LECM, JZ, DGG, AC), pp. 1378–1383.
ICPR-2018-AnnadaniJ #adaptation #detection #image- Augment and Adapt: A Simple Approach to Image Tampering Detection (YA, CVJ), pp. 2983–2988.
ICPR-2018-BandyopadhyayND #named- DivGroup: A Diversified Approach to Divide Collection of Patterns into Uniform Groups (SB, SN, RD, NMM), pp. 964–969.
ICPR-2018-Chen18b #self- An Improved Self-Representation Approach for Missing Value Imputation (XC), pp. 1450–1455.
ICPR-2018-CombinidoMA #image #network #using- A Convolutional Neural Network Approach for Estimating Tropical Cyclone Intensity Using Satellite-based Infrared Images (JSC, JRM, JA), pp. 1474–1480.
ICPR-2018-DangCLOT #random- A randomized hierarchical trees indexing approach for camera-based information spotting (QBD, MC, MML, JMO, CDT), pp. 3692–3697.
ICPR-2018-FariaS #analysis #graph #image- A Graph-based Approach for Static Ensemble Selection in Remote Sensing Image Analysis (FAF, SS), pp. 344–349.
ICPR-2018-LiuWL0ZHL #image- An Attention-Based Approach for Single Image Super Resolution (YL, YW, NL, XC0, YZ, YH, GL), pp. 2777–2784.
ICPR-2018-MahboubiBC #identification #problem- A structural approach to Person Re-identification problem (AM, LB, DC), pp. 1616–1621.
ICPR-2018-MoTWW #detection #performance- An Efficient Approach for Polyps Detection in Endoscopic Videos Based on Faster R-CNN (XM, KT, QW, GW), pp. 3929–3934.
ICPR-2018-ShahinJA #verification- One-Class SVMs Based Pronunciation Verification Approach (MAS, JXJ, BA), pp. 2881–2886.
ICPR-2018-SiddiquiV0 #learning #recognition- Face Recognition for Newborns, Toddlers, and Pre-School Children: A Deep Learning Approach (SS, MV, RS0), pp. 3156–3161.
ICPR-2018-ZhangJCXP #graph #kernel #learning #network- Kernel-Weighted Graph Convolutional Network: A Deep Learning Approach for Traffic Forecasting (QZ, QJ, JC, SX, CP), pp. 1018–1023.
ICPR-2018-ZhengZ #classification #network- Accelerating the Classification of Very Deep Convolutional Network by A Cascading Approach (WZ, ZZ), pp. 355–360.
KDD-2018-Christakopoulou #interactive #recommendation #towards- Q&R: A Two-Stage Approach toward Interactive Recommendation (KC, AB, RL, SJ, EHC), pp. 139–148.
KDD-2018-Fan #machine learning- The Pinterest Approach to Machine Learning (LF), p. 2870.
KDD-2018-IyengarLISW #data-driven #energy #named #performance- WattHome: A Data-driven Approach for Energy Efficiency Analytics at City-scale (SI, SL, DEI, PJS, BW), pp. 396–405.
KDD-2018-LiZY #learning- Dynamic Bike Reposition: A Spatio-Temporal Reinforcement Learning Approach (YL, YZ, QY), pp. 1724–1733.
KDD-2018-RouxPMVF #detection #machine learning #using- Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach (DdR, BP, AM, MDPV, CF), pp. 215–222.
KDD-2018-Schlosser0 #contest #data-driven #online- Dynamic Pricing under Competition on Online Marketplaces: A Data-Driven Approach (RS, MB0), pp. 705–714.
KDD-2018-SpeicherHGGSWZ #algorithm #difference- A Unified Approach to Quantifying Algorithmic Unfairness: Measuring Individual &Group Unfairness via Inequality Indices (TS, HH, NGH, KPG, AS, AW, MBZ), pp. 2239–2248.
KDD-2018-WeiZYL #learning #named- IntelliLight: A Reinforcement Learning Approach for Intelligent Traffic Light Control (HW, GZ, HY, ZL), pp. 2496–2505.
KDD-2018-XuLGZLNLBY #learning #on-demand #order #platform #scalability- Large-Scale Order Dispatch in On-Demand Ride-Hailing Platforms: A Learning and Planning Approach (ZX, ZL, QG, DZ, QL, JN, CL, WB, JY), pp. 905–913.
KDD-2018-YuanZY #learning #named #predict- Hetero-ConvLSTM: A Deep Learning Approach to Traffic Accident Prediction on Heterogeneous Spatio-Temporal Data (ZY, XZ, TY), pp. 984–992.
KDD-2018-YuCAZCW #detection #flexibility #named #network- NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks (WY, WC, CCA, KZ0, HC, WW0), pp. 2672–2681.
KDD-2018-ZhangLMGS #multi #named- TextTruth: An Unsupervised Approach to Discover Trustworthy Information from Multi-Sourced Text Data (HZ, YL, FM, JG0, LS), pp. 2729–2737.
MoDELS-2018-MorinHSHB #modelling- Engineering Software Diversity: a Model-Based Approach to Systematically Diversify Communications (BM, JH, HS, NH, BB), pp. 155–165.
ECOOP-2018-KrugerS0BM #api #encryption #named #validation- CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (SK, JS, KA0, EB, MM), p. 27.
Onward-2018-BrandauerCW #composition #implementation #performance- C♭: a new modular approach to implementing efficient and tunable collections (SB, EC, TW), pp. 57–71.
OOPSLA-2018-PradelS #debugging #detection #learning #named- DeepBugs: a learning approach to name-based bug detection (MP, KS), p. 25.
LOPSTR-2018-PapapanagiotouF #composition #linear #logic #process #scalability #using- A Pragmatic, Scalable Approach to Correct-by-Construction Process Composition Using Classical Linear Logic Inference (PP, JDF), pp. 77–93.
PEPM-2018-ImanishiSI #verification- A guess-and-assume approach to loop fusion for program verification (AI, KS, AI), pp. 2–14.
POPL-2018-AgrawalC0 #performance #probability #ranking #source code #termination- Lexicographic ranking supermartingales: an efficient approach to termination of probabilistic programs (SA, KC, PN0), p. 32.
POPL-2018-WilliamsR #ml- A principled approach to ornamentation in ML (TW, DR), p. 30.
PPDP-2018-PardoGPV #compilation- An Internalist Approach to Correct-by-Construction Compilers (AP, EG, MP, MV), p. 12.
ASE-2018-ChenSXHJ #automation #execution #metric #test coverage- An automated approach to estimating code coverage measures via execution logs (BC, JS, PX, XH, ZM(J), pp. 305–316.
ASE-2018-Galinier #domain-specific language #requirements- A DSL for requirements in the context of a seamless approach (FG), pp. 932–935.
ASE-2018-WangBC #alloy #specification- An evolutionary approach for analyzing Alloy specifications (JW, HB, MBC), pp. 820–825.
ASE-2018-WangCYJ #analysis #constraints #model checking #string- A symbolic model checking approach to the analysis of string and length constraints (HEW, SYC, FY, JHRJ), pp. 623–633.
ESEC-FSE-2018-HuaZWK #automation #generative #lazy evaluation #named #program repair #sketching #using- SketchFix: a tool for automated program repair approach using lazy candidate generation (JH, MZ, KW, SK), pp. 888–891.
ESEC-FSE-2018-SongM0 #automation #estimation #novel- A novel automated approach for software effort estimation based on data augmentation (LS, LLM, XY0), pp. 468–479.
- ICSE-2018-BenninKPMM #fault #named #predict
- MAHAKIL: diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction (KEB, JK, PP, AM, SM), p. 699.
- ICSE-2018-HassanW #automation #named
- HireBuild: an automatic approach to history-driven repair of build scripts (FH, XW), pp. 1078–1089.
- ICSE-2018-MadalaDA #behaviour #combinator
- A combinatorial approach for exposing off-nominal behaviors (KM, HD, DA), pp. 910–920.
- ICSE-2018-MoralesSKCA #energy #mobile #named #refactoring
- EARMO: an energy-aware refactoring approach for mobile apps (RM, RS, FK, FC, GA), p. 59.
- ICSE-2018-YanSCX #detection #reduction
- Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities (HY, YS, SC0, JX), pp. 327–337.
SLE-2018-RiesCG #named #requirements #uml- Messir: a text-first DSL-based approach for UML requirements engineering (BR, AC, NG), pp. 103–107.
SLE-2018-Rinard #correctness #reliability- A new approach for software correctness and reliability (MCR), pp. 1–2.
ASPLOS-2018-GinsbachRSBDO #api #automation #legacy- Automatic Matching of Legacy Code to Heterogeneous APIs: An Idiomatic Approach (PG, TR, MS, BB, CD, MFPO), pp. 139–153.
CASE-2018-AbbatecolaFPU #clustering #problem- A New Cluster-Based Approach for the Vehicle Routing Problem with Time Windows (LA, MPF, GP, WU), pp. 744–749.
CASE-2018-AssadRAAH #energy #optimisation- An Approach of Optimising S-curve Trajectory for a Better Energy Consumption (FA, ER, MHA, BA, RH), pp. 98–103.
CASE-2018-DelangTBP #implementation #modelling- An approach of service modeling for the demand-driven implementation of Human-Robot-Interaction in manufacturing (KD, MT, MB, MP), pp. 705–710.
CASE-2018-FanXSZ - Overbooking for Specialty Clinics with Patient No-Shows: A Queueing Approach (ZF, XX, RAS, XZ), pp. 396–401.
CASE-2018-FrancoAGABB #deployment #optimisation #probability #using- Strategic territorial deployment of hospital pharmacy robots using a stochastic p-robust optimization approach (CF, VA, TG, EAL, MB, HB), pp. 390–395.
CASE-2018-HildebrandtTCF #cyber-physical #ontology- Ontology Building for Cyber-Physical Systems: A domain expert-centric approach (CH, ST, BC, AF), pp. 1079–1086.
CASE-2018-JalalianLWAC #automation #detection #fault #statistics #visual notation- An Automatic Visual Inspection Method based on Statistical Approach for Defect Detection of Ship Hull Surfaces (AJ, WFL, FSW, SMA, CMC), pp. 445–450.
CASE-2018-JantschNWHM #bound #branch- Enhanced branch and bound approach for receding horizon based planning (MJ, NNN, LW, MH, UM), pp. 160–163.
CASE-2018-JordanHP - Extension of the Plant Feature Approach Introducing Temporal Relations (CVJ, JCH, JP), pp. 1164–1169.
CASE-2018-LongoFMMS #big data #complexity #monitoring- Big Data for advanced monitoring system: an approach to manage system complexity (CSL, CF, FM, LM, MS), pp. 341–346.
CASE-2018-OutafraoutAN #analysis #hybrid #modelling #multi #performance #petri net- A colored hybrid Petri net-based modeling approach for performance analysis of a multi-modal transportation system (KO, EhCEA, ANSM), pp. 1568–1573.
CASE-2018-PetittiPCMSCN #distributed #mobile #network- A Distributed Map Building Approach for Mobile Robotic Networks (AP, DDP, RC, AM, ES, AC, DN), pp. 116–121.
CASE-2018-RibeiroRPS #architecture #design #using- An Approach for Architectural Design of Automotive Systems using MARTE and SysML (FGCR, AR, CEP, MSS), pp. 1574–1580.
CASE-2018-SabattiniVFCMLV #adaptation #evaluation #human-computer- Methodological Approach for the Evaluation of an Adaptive and Assistive Human-Machine System (LS, VV, CF, JNC, AM, FL, BVH), pp. 57–62.
CASE-2018-SussDA #automation #classification #component- An approach to automatically assign mechatronic components to an existing or identified classification (SS, CD, FA), pp. 1525–1529.
CASE-2018-Wu #automation #clustering #detection #multi #online- CASE 2018 Special Session Presentation-Only Abstract Submission Form: A Sequential Bayesian Partitioning Approach for Online Steady State Detection of Multivariate Systems (JW), pp. 1308–1309.
ESOP-2018-AguadoMPRH #concurrent #memory management- Deterministic Concurrency: A Clock-Synchronised Shared Memory Approach (JA, MM, MP, PSR, RvH), pp. 86–113.
FASE-2018-0012SRYHBRS #analysis #effectiveness #modelling- Effective Analysis of Attack Trees: A Model-Driven Approach (RK0, SS, ER, BMY, DH, JB, AR, MS), pp. 56–73.
CAV-2018-FarinierBBP #generative #quantifier- Model Generation for Quantified Formulas: A Taint-Based Approach (BF, SB, RB, MLP), pp. 294–313.
ICST-2018-KhosrowjerdiMR #injection #machine learning #testing- Virtualized-Fault Injection Testing: A Machine Learning Approach (HK, KM, AR), pp. 297–308.
ICTSS-2018-LopezKBYZ #logic- Test Derivation for SDN-Enabled Switches: A Logic Circuit Based Approach (JL, NK, AB, NY, DZ), pp. 69–84.
IJCAR-2018-CiobacaL #induction #proving #reachability #term rewriting- A Coinductive Approach to Proving Reachability Properties in Logically Constrained Term Rewriting Systems (SC, DL), pp. 295–311.
IJCAR-2018-IgnatievPNM #satisfiability #set- A SAT-Based Approach to Learn Explainable Decision Sets (AI, FP, NN, JMS0), pp. 627–645.
IJCAR-2018-LagniezBLM #problem #satisfiability- An Assumption-Based Approach for Solving the Minimal S5-Satisfiability Problem (JML, DLB, TdL, VM), pp. 1–18.
TAP-2018-BernardHK #approximate #modelling #random #scalability- An Approximation-Based Approach for the Random Exploration of Large Models (JB0, PCH, OK), pp. 27–43.
VMCAI-2018-BuroM #injection #semantics- Abstract Code Injection - A Semantic Approach Based on Abstract Non-Interference (SB, IM), pp. 116–137.
ECSA-2017-BhatSBHM #automation #design #machine learning- Automatic Extraction of Design Decisions from Issue Management Systems: A Machine Learning Based Approach (MB, KS, AB, UH, FM), pp. 138–154.
ECSA-2017-Khakpour #adaptation #composition #self- Control of Self-adaptation Under Partial Observation: A Modular Approach (NK), pp. 112–119.
ICSA-2017-HassanAB #architecture #metamodelling- Microservice Ambients: An Architectural Meta-Modelling Approach for Microservice Granularity (SH, NA, RB), pp. 1–10.
JCDL-2017-WuCCLG #hybrid #named- HESDK: A Hybrid Approach to Extracting Scientific Domain Knowledge Entities (JW0, SRC, AC, CL, CLG), pp. 241–244.
CSEET-2017-DemuthK #approximate #scalability- An Approach for Project Task Approximation in a Large-Scale Software Project Course (BD, MK), pp. 67–76.
EDM-2017-BalyanMM #comprehension #machine learning #natural language- Combining Machine Learning and Natural Language Processing Approach to Assess Literary Text Comprehension (RB, KSM, DSM).
EDM-2017-ChountaMAJK #development #modelling- Modeling the Zone of Proximal Development with a Computational Approach (IAC, BMM, PLA, PWJ, SK).
EDM-2017-GuoCC #network #student- A Neural Network Approach to Estimate Student Skill Mastery in Cognitive Diagnostic Assessments (QG, MC, YC).
ICSME-2017-AbidDCM #automation #documentation #evaluation- The Evaluation of an Approach for Automatic Generated Documentation (NJA, ND, MLC, JIM), pp. 307–317.
ICSME-2017-FujiokaN #constraints #feature model #interactive- Constraints Based Approach to Interactive Feature Location (DF, NN), pp. 499–503.
ICSME-2017-LiFZMR #clone detection #detection #named- CCLearner: A Deep Learning-Based Clone Detection Approach (LL, HF, WZ, NM, BGR), pp. 249–260.
SANER-2017-Kirda #automation #detection #named #scalability- UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) (EK), p. 1.
SANER-2017-Steinbeck #smell #visualisation- An arc-based approach for visualization of code smells (MS), pp. 397–401.
SANER-2017-TangL #mining #named #novel #probability #using- StiCProb: A novel feature mining approach using conditional probability (YT, HL), pp. 45–55.
DLT-2017-Bruyere #game studies #synthesis- Computer Aided Synthesis: A Game-Theoretic Approach (VB), pp. 3–35.
FSCD-2017-0001TK #confluence #induction #proving- Improving Rewriting Induction Approach for Proving Ground Confluence (TA0, YT, YK), p. 18.
FSCD-2017-PradicR #synthesis- A Curry-Howard Approach to Church's Synthesis (PP, CR), p. 16.
- IFM-2017-SilvettiPB #black box #cyber-physical #learning
- An Active Learning Approach to the Falsification of Black Box Cyber-Physical Systems (SS, AP, LB), pp. 3–17.
- ICFP-2017-ByrdBRM #functional #problem #programming
- A unified approach to solving seven programming problems (functional pearl) (WEB, MB, GR, MM), p. 26.
CHI-PLAY-2017-PetersenTMD #game studies #mobile- Evaluating the Onboarding Phase of Free-toPlay Mobile Games: A Mixed-Method Approach (FWP, LET, PMB, AD), pp. 377–388.
CHI-PLAY-2017-ScozziIL #design #game studies #learning- A Mixed Method Approach for Evaluating and Improving the Design of Learning in Puzzle Games (MVS, II, CL), pp. 217–228.
CIG-2017-FontMLR #game studies #heuristic #hybrid #towards- Towards a hybrid neural and evolutionary heuristic approach for playing tile-matching puzzle games (JMF, DM, SL, PRC), pp. 76–79.
CIG-2017-Greenwood #fuzzy #game studies- A fuzzy system approach for choosing public goods game strategies (GWG), pp. 104–109.
DiGRA-2017-GoddardM #design #game studies #research #towards- Towards Genre as a Game Design Research Approach (WG, AM).
FDG-2017-TengB #generative #network #semantics- A semantic approach to patch-based procedural generation of urban road networks (ET, RB), p. 10.
VS-Games-2017-LopeMMGV #design #education #game studies- Designing educational games: Key elements and methodological approach (RPdL, NMM, RMS, AMG, FLGV), pp. 63–70.
CIKM-2017-AnwarNH #community #novel #performance- A Novel Approach for Efficient Computation of Community Aware Ridesharing Groups (SA, SN, TH), pp. 1971–1974.
CIKM-2017-CaoZL #approximate #distributed #effectiveness #graph #mining #named #scalability- PMS: an Effective Approximation Approach for Distributed Large-scale Graph Data Processing and Mining (YC, YZ, JL), pp. 1999–2002.
CIKM-2017-Ha-ThucYWDGS - From Query-By-Keyword to Query-By-Example: LinkedIn Talent Search Approach (VHT, YY, XW, VD, AG, SS), pp. 1737–1745.
CIKM-2017-Han0YZ #assembly #graph #keyword #query #rdf- Keyword Search on RDF Graphs - A Query Graph Assembly Approach (SH, LZ0, JXY, DZ0), pp. 227–236.
CIKM-2017-HuLSLL0Z #information management #named #probability #segmentation- CNN-IETS: A CNN-based Probabilistic Approach for Information Extraction by Text Segmentation (MH, ZL, YS, AL0, GL0, KZ0, LZ0), pp. 1159–1168.
CIKM-2017-LiGBC #correlation #modelling #named #online #process- FM-Hawkes: A Hawkes Process Based Approach for Modeling Online Activity Correlations (SL, XG, WB, GC), pp. 1119–1128.
CIKM-2017-LinMZ #identification #modelling #multi #topic- An Enhanced Topic Modeling Approach to Multiple Stance Identification (JL, WM, YZ), pp. 2167–2170.
CIKM-2017-MalmiGT #network- Active Network Alignment: A Matching-Based Approach (EM, AG, ET), pp. 1687–1696.
CIKM-2017-SunSGOC #community #detection #symmetry- A Non-negative Symmetric Encoder-Decoder Approach for Community Detection (BJS, HS, JG, WO, XC), pp. 597–606.
CIKM-2017-VellosoD #using #web- Extracting Records from the Web Using a Signal Processing Approach (RPV, CFD), pp. 197–206.
CIKM-2017-WuSZ #behaviour #detection #modelling #performance- A Fast Trajectory Outlier Detection Approach via Driving Behavior Modeling (HW0, WS, BZ), pp. 837–846.
CIKM-2017-WuZCC #image #scalability- A New Approach to Compute CNNs for Extremely Large Images (SW, MZ, GC0, KC0), pp. 39–48.
ECIR-2017-BasuRGBG #microblog #novel #retrieval #word- A Novel Word Embedding Based Stemming Approach for Microblog Retrieval During Disasters (MB, AR, KG, SB, SG0), pp. 589–597.
ECIR-2017-RomeoMBM #learning #multi #ranking- A Multiple-Instance Learning Approach to Sentence Selection for Question Ranking (SR, GDSM, ABC, AM), pp. 437–449.
ECIR-2017-SoldainiG #health #learning #rank #semantics- Learning to Rank for Consumer Health Search: A Semantic Approach (LS, NG), pp. 640–646.
ICML-2017-AcharyaDOS #symmetry- A Unified Maximum Likelihood Approach for Estimating Symmetric Properties of Discrete Distributions (JA, HD, AO, ATS), pp. 11–21.
ICML-2017-BogunovicMSC #clustering #robust- Robust Submodular Maximization: A Non-Uniform Partitioning Approach (IB, SM, JS, VC), pp. 508–516.
ICML-2017-HartfordLLT #flexibility #predict- Deep IV: A Flexible Approach for Counterfactual Prediction (JSH, GL, KLB, MT), pp. 1414–1423.
ICML-2017-MaystreG #effectiveness #exclamation #learning- Just Sort It! A Simple and Effective Approach to Active Preference Learning (LM, MG), pp. 2344–2353.
ICML-2017-RahmaniA17a #clustering #problem- Innovation Pursuit: A New Approach to the Subspace Clustering Problem (MR, GKA), pp. 2874–2882.
KDD-2017-ChojnackiDFSWZA #comprehension- A Data Science Approach to Understanding Residential Water Contamination in Flint (AC, CD, AF, GS, JW, DTZ, JDA, EMS), pp. 1407–1416.
KDD-2017-RozenshteinTG #social- Inferring the Strength of Social Ties: A Community-Driven Approach (PR, NT, AG), pp. 1017–1025.
KDD-2017-SalehianHL #crowdsourcing #machine learning #scalability- Matching Restaurant Menus to Crowdsourced Food Data: A Scalable Machine Learning Approach (HS, PDH, CL), pp. 2001–2009.
KDD-2017-TongCZCWYYL #online #platform #predict #scalability- The Simpler The Better: A Unified Approach to Predicting Original Taxi Demands based on Large-Scale Online Platforms (YT, YC, ZZ, LC0, JW0, QY0, JY, WL), pp. 1653–1662.
KDD-2017-YangBZY0 #collaboration #learning #recommendation- Bridging Collaborative Filtering and Semi-Supervised Learning: A Neural Approach for POI Recommendation (CY, LB, CZ0, QY0, JH0), pp. 1245–1254.
ECMFA-2017-RuscioEIPS #migration #model transformation #variability- A Feature-Based Approach for Variability Exploration and Resolution in Model Transformation Migration (DDR, JE, LI, AP, WS), pp. 71–89.
ICMT-2017-HoWP #bidirectional #named- BXE2E: A Bidirectional Transformation Approach for Medical Record Exchange (JH, JHW, MP), pp. 155–170.
ICMT-2017-NassarRA #automation #emf #interactive #modelling #rule-based- Rule-Based Repair of EMF Models: An Automated Interactive Approach (NN, HR, TA), pp. 171–181.
MoDELS-2017-Al-RefaiCG #fuzzy #logic #modelling #testing- A Fuzzy Logic Based Approach for Model-Based Regression Test Selection (MAR, WC, SG), pp. 55–62.
MoDELS-2017-DouBB #modelling- A Model-Driven Approach to Trace Checking of Pattern-Based Temporal Properties (WD, DB, LCB), pp. 323–333.
ECOOP-2017-Gordon #polymorphism- A Generic Approach to Flow-Sensitive Polymorphic Effects (CSG), p. 31.
LOPSTR-2017-EngelsBB #database #datalog #rule-based- A Rule-Based Approach to Analyzing Database Schema Objects with Datalog (CE, AB, SB), pp. 20–36.
PPDP-2017-MezzinaP #consistency- Causally consistent reversible choreographies: a monitors-as-memories approach (CAM, JAP), pp. 127–138.
ESEC-FSE-2017-Jaffe - Suggesting meaningful variable names for decompiled code: a machine translation approach (AJ), pp. 1050–1052.
ESEC-FSE-2017-NguyenARH #invariant- Counterexample-guided approach to finding numerical invariants (TN, TA, AR, MH0), pp. 605–615.
- ICSE-2017-JiangZRZ #api #tutorial
- An unsupervised approach for discovering relevant tutorial fragments for APIs (HJ, JZ, ZR, TZ0), pp. 38–48.
- ICSE-2017-TsutanoBSRD #android #performance #robust #scalability
- An efficient, robust, and scalable approach for analyzing interacting android apps (YT, SB, WSa, GR, JD), pp. 324–334.
GPCE-2017-ParreauxSK #optimisation #staged- Quoted staged rewriting: a practical approach to library-defined optimizations (LP, AS, CEK), pp. 131–145.
SLE-2017-BarisicBAG #development #domain-specific language #requirements #usability- A requirements engineering approach for usability-driven DSL development (AB, DB, VA, MG), pp. 115–128.
SLE-2017-TendelooMMV #modelling #multi #syntax- Concrete syntax: a multi-paradigm modelling approach (YVT, SVM, BM, HV), pp. 182–193.
CASE-2017-DingWL #feedback #logic #matrix #network- Output feedback disturbance decoupling of boolean control networks: A logical matrix factorization approach (XD, SW, HL0), pp. 181–186.
CASE-2017-FranckAXG #people #problem- An optimization-simulation approach for long term care structure assignment problem for elderly people (TF, VA, XX, RG), pp. 574–579.
CASE-2017-FriedrichZTLV #maintenance #modelling #recognition- Environment modeling for maintenance automation-a next-best-view approach for combining space exploration and object recognition tasks (CF, VZ, MT, AL, AV), pp. 1445–1450.
CASE-2017-HaasWTUS #authentication #industrial #mobile- A secured offline authentication approach for industrial mobile robots (SH, AW, RT, TU, CS), pp. 308–313.
CASE-2017-HanCZ #detection #matrix- Matrix approach to detectability of discrete event systems under partial observation (XH, ZC, JZ), pp. 187–192.
CASE-2017-HanPM #learning #linear #modelling- Model-based reinforcement learning approach for deformable linear object manipulation (HH, GP, TM), pp. 750–755.
CASE-2017-KinghorstGLCYFZ #algorithm #maintenance #markov #modelling #predict #search-based- Hidden Markov model-based predictive maintenance in semiconductor manufacturing: A genetic algorithm approach (JK, OG, ML, HLC, KY, JF, MZ, BVH), pp. 1260–1267.
CASE-2017-KongN #fault #predict #using- A practical yield prediction approach using inline defect metrology data for system-on-chip integrated circuits (YK, DN), pp. 744–749.
CASE-2017-LiXLK #classification #learning #physics- Improving colorectal polyp classification based on physical examination data - A ensemble learning approach (CL, XX, JL, NK), pp. 193–194.
CASE-2017-NingHHG #3d #continuation #process- A cloud-supported cps approach to control decision of process manufacturing: 3D ONoC (ZN, WH, XH0, XG), pp. 458–463.
CASE-2017-PengHXC #coordination #information management #optimisation- An optimization approach for team coordination through information sharing (YP, EH, JX, CHC), pp. 282–287.
CASE-2017-SabattiniVCMF #design #human-computer- Methodological approach for the design of a complex inclusive human-machine system (LS, VV, JNC, AM, CF), pp. 145–150.
CASE-2017-WangHZL #automation #petri net #robust- A robust control approach to automated manufacturing systems allowing failures and reworks with Petri nets (XW, HH, YZ0, YL0), pp. 370–375.
CASE-2017-WangLZH #design #optimisation- A design approach for event-driven optimization in complex air conditioning systems (JW, SL, PZ, GH), pp. 912–917.
CASE-2017-WangW #constraints #higher-order #programming #using- Resolve reactive robot control with perturbed constraints using a second order cone programming approach (YW, LW), pp. 124–129.
CASE-2017-XiaoHTJ #multi- Containment control of multiagent systems: A DOBC approach (BX, TH, QT, TJ), pp. 1577–1580.
CASE-2017-ZhaoLHWZ #fault- A nussbaum gain approach to attitude tracking control of spacecrafts with actuator faults (XZ, YL, LH, XW, QZ), pp. 1581–1585.
CASE-2017-ZhouSLLC #industrial- Information based approach for sort operation in logistic industry (CZ, AS, HL, LHL, EPC), pp. 1356–1361.
CASE-2017-ZhouWY #learning- Dynamic dispatching for re-entrant production lines - A deep learning approach (FYZ, CHW, CJY), pp. 1026–1031.
CASE-2017-ZouV #automation #consistency #design #development #nondeterminism- Feature-based systematic approach development for inconsistency resolution in automated production system design (MZ, BVH), pp. 687–694.
CGO-2017-GinsbachO #constraints #reduction- Discovery and exploitation of general reductions: a constraint based approach (PG, MFPO), pp. 269–280.
CGO-2017-SuLX #automation #compilation #generative #performance- Automatic generation of fast BLAS3-GEMM: a portable compiler approach (XS, XL, JX), pp. 122–133.
FASE-2017-ChengT #atl #deduction #fault #locality #model transformation- A Deductive Approach for Fault Localization in ATL Model Transformations (ZC, MT), pp. 300–317.
FASE-2017-Wang0YP #empirical #model checking #modelling #probability- Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study (JW, JS0, QY, JP0), pp. 3–21.
CSL-2017-HorcikMV #algebra #constraints- An Algebraic Approach to Valued Constraint Satisfaction (RH, TM, AV), p. 20.
CSL-2017-Thomas #algorithm #game studies #infinity- Determinacy of Infinite Games: Perspectives of the Algorithmic Approach (Invited Talk) (WT), p. 1.
ICST-2017-Al-QahtaniER #api #modelling #ontology #security #semantics #traceability- Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach (SSAQ, EEE, JR), pp. 80–91.
ICST-2017-JanNAB #injection #search-based #testing #web #xml- A Search-Based Testing Approach for XML Injection Vulnerabilities in Web Applications (SJ, CDN, AA, LCB), pp. 356–366.
ECSA-2016-KaptoEKT #analysis #architecture #detection #evolution #source code- Inferring Architectural Evolution from Source Code Analysis - A Tool-Supported Approach for the Detection of Architectural Tactics (CK, GEB, SK, CT), pp. 149–165.
ECSA-2016-SchenkhuizenWJC #consistency #nondeterminism- Consistent Inconsistency Management: A Concern-Driven Approach (JS, JMEMvdW, SJ, LC), pp. 201–209.
QoSA-2016-PitakratOHG #architecture #online #predict- An Architecture-Aware Approach to Hierarchical Online Failure Prediction (TP, DO, AvH, LG), pp. 60–69.
WICSA-2016-BuchgeherKHSH #architecture #enterprise #testing- Improving Testing in an Enterprise SOA with an Architecture-Based Approach (GB, CK, WH, MS, HH), pp. 231–240.
WICSA-2016-BuresHKAS #architecture #physics #statistics- Statistical Approach to Architecture Modes in Smart Cyber Physical Systems (TB, PH, JK, RAA, DS), pp. 168–177.
WICSA-2016-FengKCMX #analysis #architecture #security #towards- Towards an Architecture-Centric Approach to Security Analysis (QF, RK, YC, RM, LX0), pp. 221–230.
CSEET-2016-JohnsonPH #education #re-engineering- An Athletic Approach to Software Engineering Education (PMJ, DP, EH0), pp. 8–17.
CSEET-2016-MarsicanoMFF #education #modelling #process #requirements- An Integrated Approach to the Requirements Engineering and Process Modelling Teaching (GM, FFM, MVF, SAAdF), pp. 166–174.
EDM-2016-AtapattuFT #classification #topic #visual notation- Topic-wise Classification of MOOC Discussions: A Visual Analytics Approach (TA, KF, HT), pp. 276–281.
EDM-2016-JiangG #contest #graph #mining #on the- On Competition for Undergraduate Co-op Placements: A Graph Mining Approach (YHJ, LG), pp. 394–399.
EDM-2016-LeeRBY #analysis #clustering #heatmap #interactive #learning #visualisation- Hierarchical Cluster Analysis Heatmaps and Pattern Analysis: An Approach for Visualizing Learning Management System Interaction Data (JEL, MR, AB, MY), pp. 603–604.
EDM-2016-SweeneyLRJ #performance #predict #recommendation #student- Next-Term Student Performance Prediction: A Recommender Systems Approach (MS, JL, HR, AJ), p. 7.
ICPC-2016-AvelinoPHV #novel- A novel approach for estimating Truck Factors (GA, LTP, ACH, MTV), pp. 1–10.
ICPC-2016-SaiedS #api #mining- A cooperative approach for combining client-based and library-based API usage pattern mining (MAS, HAS), pp. 1–10.
ICSME-2016-AlghmadiSSH #automation #performance #recommendation #testing- An Automated Approach for Recommending When to Stop Performance Tests (HMA, MDS, WS, AEH), pp. 279–289.
ICSME-2016-PatilKDB #domain model #modelling #optimisation- An Optimization Approach for Matching Textual Domain Models with Existing Code (TP, RK, DD, IB), pp. 133–143.
ICSME-2016-StroblZBG #incremental #migration #towards- A Tiered Approach Towards an Incremental BPEL to BPMN 2.0 Migration (SS, MZ, MB, TG), pp. 563–567.
CIAA-2016-BelovsMY #quantum- Looking for Pairs that Hard to Separate: A Quantum Approach (AB, JAM, AY), pp. 213–223.
DLT-2016-CadilhacKL #complexity- A Language-Theoretical Approach to Descriptive Complexity (MC, AK, KJL), pp. 64–76.
DLT-2016-UezatoM #automaton #problem- Monoid-Based Approach to the Inclusion Problem on Superdeterministic Pushdown Automata (YU, YM), pp. 393–405.
FM-2016-BenesBDPS #analysis #model checking- A Model Checking Approach to Discrete Bifurcation Analysis (NB, LB, MD, SP, DS), pp. 85–101.
FM-2016-YangHCL0 #generative #hybrid #linear #programming- A Linear Programming Relaxation Based Approach for Generating Barrier Certificates of Hybrid Systems (ZY, CH, XC0, WL, ZL0), pp. 721–738.
FSCD-2016-Hasuo #algebra #higher-order- Coalgebras and Higher-Order Computation: a GoI Approach (IH), p. 2.
- IFM-2016-MullerMRSP #component #hybrid #safety #verification
- A Component-Based Approach to Hybrid Systems Safety Verification (AM0, SM, WR, WS, AP), pp. 441–456.
AIIDE-2016-GunesSAES #modelling #using- A Generic Approach for Player Modeling Using Event-Trait Mapping and Feature Weighting (MAG, GS, UA, OE, SS), pp. 169–175.
AIIDE-2016-SnodgrassO #2d #game studies #generative- An Approach to Domain Transfer in Procedural Content Generation of Two-Dimensional Videogame Levels (SS, SO), pp. 79–85.
CIG-2016-SaccoLY #game studies #generative #semantics- A holistic approach for semantic-based game generation (OS, AL, GNY), pp. 1–8.
CIG-2016-TamassiaRSDZH #game studies #markov #modelling #online #predict- Predicting player churn in destiny: A Hidden Markov models approach to predicting player departure in a major online game (MT, WLR, RS, AD, FZ, MH), pp. 1–8.
DiGRA-FDG-2016-LimLH #bottom-up #category theory #clustering #image #social #using- Discovering Social and Aesthetic Categories of Avatars: A Bottom-Up Artificial Intelligence Approach Using Image Clustering (CUL, AL, DFH).
DiGRA-FDG-2016-SoaresLPM #geometry #random- Rapidly-Exploring Random Tree approach for Geometry Friends (RS, FL, RP, FSM).
VS-Games-2016-VosinakisKMS #artificial reality #using- A Kinesthetic Approach to Digital Heritage Using Leap Motion: The Cycladic Sculpture Application (SV, PK, DM, ES), pp. 1–8.
CIKM-2016-GhoshCCBR #word- Characterizing Diseases from Unstructured Text: A Vocabulary Driven Word2vec Approach (SG, PC, EC, JSB, NR), pp. 1129–1138.
CIKM-2016-GhoshGA - A Preference Approach to Reputation in Sponsored Search (AG, DG, RA), pp. 2041–2044.
CIKM-2016-JinFF #collaboration #detection- A Context-aware Collaborative Filtering Approach for Urban Black Holes Detection (LJ, ZF, LF), pp. 2137–2142.
CIKM-2016-LiLF #classification #multi- Multi-View Time Series Classification: A Discriminative Bilinear Projection Approach (SL0, YL, YF0), pp. 989–998.
CIKM-2016-Liu0 #twitter- Where are You Tweeting?: A Context and User Movement Based Approach (ZL, YH0), pp. 1949–1952.
CIKM-2016-LiXSM #documentation #effectiveness #topic #word- Effective Document Labeling with Very Few Seed Words: A Topic Model Approach (CL, JX, AS, ZM), pp. 85–94.
CIKM-2016-LuQZHG #network #recommendation #social- Location-aware Friend Recommendation in Event-based Social Networks: A Bayesian Latent Factor Approach (YL, ZQ, CZ0, YH0, LG0), pp. 1957–1960.
CIKM-2016-MouJXL0J #encoding #word- Distilling Word Embeddings: An Encoding Approach (LM, RJ, YX, GL, LZ0, ZJ), pp. 1977–1980.
CIKM-2016-RongZC #network- A Model-Free Approach to Infer the Diffusion Network from Event Cascade (YR, QZ, HC), pp. 1653–1662.
CIKM-2016-RongZYSL #markov #optimisation #performance #process- The Rich and the Poor: A Markov Decision Process Approach to Optimizing Taxi Driver Revenue Efficiency (HR, XZ, CY, MZS, AXL), pp. 2329–2334.
CIKM-2016-RuanXSTFLZ - When Sensor Meets Tensor: Filling Missing Sensor Values Through a Tensor Approach (WR, PX, QZS, NKT0, NJGF, XL0, WEZ), pp. 2025–2028.
CIKM-2016-TanWX #network #recommendation- A Neural Network Approach to Quote Recommendation in Writings (JT, XW0, JX), pp. 65–74.
CIKM-2016-WuJ #clustering #retrieval- A Density-Based Approach to the Retrieval of Top-K Spatial Textual Clusters (DW0, CSJ), pp. 2095–2100.
ECIR-2016-AkerKBPBHG #clustering #graph #online #topic- A Graph-Based Approach to Topic Clustering for Online Comments to News (AA, EK, ARB, MLP, EB, MH, RJG), pp. 15–29.
ECIR-2016-NiuLC #learning #named #twitter- LExL: A Learning Approach for Local Expert Discovery on Twitter (WN, ZL, JC), pp. 803–809.
ICML-2016-CouilletWAS #matrix #network #random- A Random Matrix Approach to Echo-State Neural Networks (RC, GW, HTA, HS), pp. 517–525.
ICML-2016-KasaiM #rank- Low-rank tensor completion: a Riemannian manifold preconditioning approach (HK, BM), pp. 1012–1021.
ICML-2016-LimW #permutation #problem- A Box-Constrained Approach for Hard Permutation Problems (CHL, SW), pp. 2454–2463.
ICML-2016-MalherbeCV #optimisation #ranking- A ranking approach to global optimization (CM, EC, NV), pp. 1539–1547.
ICML-2016-PlataniosDM - Estimating Accuracy from Unlabeled Data: A Bayesian Approach (EAP, AD, TMM), pp. 1416–1425.
ICML-2016-RahmaniA #composition #learning #matrix #performance- A Subspace Learning Approach for High Dimensional Matrix Decomposition with Efficient Column/Row Sampling (MR, GKA), pp. 1206–1214.
ICML-2016-RosenskiSS #multi- Multi-Player Bandits - a Musical Chairs Approach (JR, OS, LS), pp. 155–163.
ICML-2016-ShahamCDJNCK #learning- A Deep Learning Approach to Unsupervised Ensemble Learning (US, XC, OD, AJ, BN, JTC, YK), pp. 30–39.
ICML-2016-TaylorBXSPG #network #scalability- Training Neural Networks Without Gradients: A Scalable ADMM Approach (GT, RB, ZX0, BS, ABP, TG), pp. 2722–2731.
ICML-2016-YenHRZD #classification #multi- PD-Sparse : A Primal and Dual Sparse Approach to Extreme Multiclass and Multilabel Classification (IEHY, XH, PR, KZ, ISD), pp. 3069–3077.
ICML-2016-YenLZRD #multi #sequence- A Convex Atomic-Norm Approach to Multiple Sequence Alignment and Motif Discovery (IEHY, XL, JZ, PR, ISD), pp. 2272–2280.
ICML-2016-ZhengTDZ #collaboration- A Neural Autoregressive Approach to Collaborative Filtering (YZ, BT, WD, HZ), pp. 764–773.
ICPR-2016-0013LS #3d #retrieval #semantics #sketching- A semantic tree-based approach for sketch-based 3D model retrieval (BL0, YL, JS), pp. 3880–3885.
ICPR-2016-AbdicFBARMS #detection #learning- Detecting road surface wetness from audio: A deep learning approach (IA, LF, DEB, WA, BR, EM, BWS), pp. 3458–3463.
ICPR-2016-AginakoMRLS #difference #machine learning- Machine Learning approach to dissimilarity computation: Iris matching (NA, JMMO, IRR, EL, BS), pp. 170–175.
ICPR-2016-AsplundHTS - A new approach to mathematical morphology on one dimensional sampled signals (TA, CLLH, MJT, RS), pp. 3904–3909.
ICPR-2016-BrauJ #3d #estimation- A Bayesian part-based approach to 3D human pose and camera estimation (EB, HJ0), pp. 1762–1767.
ICPR-2016-BSSH #classification #network #using- HEp-2 cell classification using artificial neural network approach (DB, KS, NH), pp. 84–89.
ICPR-2016-ChenZW #learning #network #summary #video- Wireless capsule endoscopy video summarization: A learning approach based on Siamese neural network and support vector machine (JC, YZ, YW0), pp. 1303–1308.
ICPR-2016-CosmoABTRC #image #multi- A game-theoretical approach for joint matching of multiple feature throughout unordered images (LC, AA, FB, AT, ER, DC), pp. 3715–3720.
ICPR-2016-GaoYGC #constraints #network #using- Bayesian approach to learn Bayesian networks using data and constraints (XGG, YY, ZgG, DQC0), pp. 3667–3672.
ICPR-2016-GattupalliCL - A computational approach to relative aesthetics (VG, PSC, BL), pp. 2446–2451.
ICPR-2016-GuoCY #adaptation- A simple approach for unsupervised domain adaptation (XG0, WC, JY), pp. 1566–1570.
ICPR-2016-HajduTKH #constraints #execution #probability- Composing ensembles by a stochastic approach under execution time constraint (AH, HT, LK, LH), pp. 222–227.
ICPR-2016-HoSSEA #estimation #learning #parametricity- A temporal deep learning approach for MR perfusion parameter estimation in stroke (KCH, FS, KVS, SES, CWA), pp. 1315–1320.
ICPR-2016-JordaoSS #detection #multi- A late fusion approach to combine multiple pedestrian detectors (AJ, JSdS, WRS), pp. 4250–4255.
ICPR-2016-KhelifiM #image #multi #problem #segmentation- A multi-objective approach based on TOPSIS to solve the image segmentation combination problem (LK, MM), pp. 4220–4225.
ICPR-2016-KimP #detection #network #using- A shape preserving approach for salient object detection using convolutional neural networks (JK, VP), pp. 609–614.
ICPR-2016-LiH #detection #image #performance- A fast approach for traffic panel detection from natural scene images (ZML, LLH), pp. 579–584.
ICPR-2016-LimK #feature model #multi #optimisation- Convex optimization approach for multi-label feature selection based on mutual information (HL, DWK), pp. 1512–1517.
ICPR-2016-MeyL #self- A soft-labeled self-training approach (AM, ML), pp. 2604–2609.
ICPR-2016-NguyenY #artificial reality #named #novel- StereoTag: A novel stereogram-marker-based approach for Augmented Reality (MN, AY), pp. 1059–1064.
ICPR-2016-SahooA0 #automation #clustering #generative #multi #using- Automatic generation of biclusters from gene expression data using multi-objective simulated annealing approach (PS, SA, SS0), pp. 2174–2179.
ICPR-2016-SharabatiX #performance #polynomial- Fast local polynomial regression approach for speckle noise removal (WKS, BX), pp. 3198–3203.
ICPR-2016-ValevYK #geometry #pattern matching #pattern recognition #problem #recognition- A new geometrical approach for solving the supervised pattern recognition problem (VV, NY, AK), pp. 1648–1652.
ICPR-2016-YanRZC #clustering #set- A constrained clustering based approach for matching a collection of feature sets (JY, ZR, HZ, SMC), pp. 3832–3837.
ICPR-2016-ZamzamiPGKAS #analysis #automation #multimodal- An approach for automated multimodal analysis of infants' pain (GZ, CYP, DBG, RK, TA, YS0), pp. 4148–4153.
ICPR-2016-ZhaoYWL #recognition- Landmark manifold: Revisiting the Riemannian manifold approach for facial emotion recognition (KZ, SY, AW, BCL), pp. 1095–1100.
ICPR-2016-ZhuangYH #modelling #retrieval #scalability #video- DLSTM approach to video modeling with hashing for large-scale video retrieval (NZ, JY0, KAH), pp. 3222–3227.
KDD-2016-AmoualianCGA #dependence #documentation #modelling #named #topic- Streaming-LDA: A Copula-based Approach to Modeling Topic Dependencies in Document Streams (HA, MC, ÉG, MRA), pp. 695–704.
KDD-2016-AnCPS #named- MAP: Frequency-Based Maximization of Airline Profits based on an Ensemble Forecasting Approach (BA, HC0, NP, VSS), pp. 421–430.
KDD-2016-BanerjeeYR #mining #named #scalability- MANTRA: A Scalable Approach to Mining Temporally Anomalous Sub-trajectories (PB, PY, SR), pp. 1415–1424.
KDD-2016-BaoWL #data-driven #network #predict #resource management- From Prediction to Action: A Closed-Loop Approach for Data-Guided Network Resource Allocation (YB, HW, XL0), pp. 1425–1434.
KDD-2016-MalmiTTRG #generative #named- DopeLearning: A Computational Approach to Rap Lyrics Generation (EM, PT, HT, TR, AG), pp. 195–204.
KDD-2016-NakagawaSKTT #mining #performance #predict- Safe Pattern Pruning: An Efficient Approach for Predictive Pattern Mining (KN, SS, MK, KT, IT), pp. 1785–1794.
KDD-2016-SalehiRLP #predict #risk management #robust- Dynamic and Robust Wildfire Risk Prediction System: An Unsupervised Approach (MS, LIR, TML, AP), pp. 245–254.
KDD-2016-WanCKHGZ #modelling- From Truth Discovery to Trustworthy Opinion Discovery: An Uncertainty-Aware Quantitative Modeling Approach (MW, XC, LMK, JH0, JG0, BZ0), pp. 1885–1894.
KDD-2016-XiaoGLMSFZ #towards- Towards Confidence in the Truth: A Bootstrapping based Truth Discovery Approach (HX, JG0, QL0, FM, LS, YF, AZ), pp. 1935–1944.
KDD-2016-XiaoGWWSL - A Truth Discovery Approach with Theoretical Guarantee (HX, JG0, ZW, SW, LS, HL0), pp. 1925–1934.
KDD-2016-ZhaoATBDBKD #detection #parametricity #strict #using- A Non-parametric Approach to Detect Epileptogenic Lesions using Restricted Boltzmann Machines (YZ, BA, TT, KEB, JGD, CEB, RK, OD), pp. 373–382.
BX-2016-Leblebici #consistency #grammarware #graph grammar #towards #traceability- Towards a Graph Grammar-Based Approach to Inter-Model Consistency Checks with Traceability Support (EL), pp. 35–39.
BX-2016-McKinna #bidirectional- Bidirectional Transformations with Deltas: A Dependently Typed Approach (Talk Proposal) (JM), p. 14.
ECMFA-2016-El-khouryEE #emf #linked data #maintenance #modelling #open data- Supporting the Linked Data Approach to Maintain Coherence Across Rich EMF Models (JEk, CE, CE), pp. 36–47.
ECMFA-2016-KessentiniSW #automation #co-evolution #metamodelling #multi #optimisation #using- Automated Metamodel/Model Co-evolution Using a Multi-objective Optimization Approach (WK, HAS, MW), pp. 138–155.
ICMT-2016-JungHH #aspect-oriented #composition #domain-specific language #generative #named- GECO: A Generator Composition Approach for Aspect-Oriented DSLs (RJ, RH, WH), pp. 141–156.
MoDELS-2016-AlkhaziRKWG #atl #automation #model transformation #refactoring #search-based- Automated refactoring of ATL model transformations: a search-based approach (BA, TR, MK, MW, WIG), pp. 295–304.
MoDELS-2016-AroraSBZ #domain model #evaluation #industrial #modelling #requirements- Extracting domain models from natural-language requirements: approach and industrial evaluation (CA, MS, LCB, FZ), pp. 250–260.
MoDELS-2016-KokalySCMC #assurance #evolution #model management #reuse- A model management approach for assurance case reuse due to system evolution (SK, RS, VC, TM, MC), pp. 196–206.
MoDELS-2016-PrehoferWJ #interactive #modelling #multi- A model-based approach for multi-device user interactions (CP, AW, YJ), pp. 13–23.
MoDELS-2016-RabbiLY #category theory #game studies #metamodelling #towards- Towards a categorical approach for meta-modelling epistemic game theory (FR, YL, ICY), pp. 57–64.
ECOOP-2016-AndreasenGCSTS #type system- Trace Typing: An Approach for Evaluating Retrofitted Type Systems (EA, CSG, SC0, MS, FT, KS), p. 26.
OOPSLA-2016-PetersKTC #named- OrcO: a concurrency-first approach to objects (AMP, DK, JAT, WRC), pp. 548–567.
LOPSTR-2016-ZielenkiewiczS #automaton #logic- Automata Theory Approach to Predicate Intuitionistic Logic (MZ, AS), pp. 345–360.
POPL-2016-BhaskaracharyaB #named #optimisation- SMO: an integrated approach to intra-array and inter-array storage optimization (SGB, UB, AC0), pp. 526–538.
POPL-2016-WuXCZZ #named #performance- Casper: an efficient approach to call trace collection (RW, XX0, SCC, HZ0, CZ), pp. 678–690.
ASE-2016-VojdaniARSVV #concurrent #detection- Static race detection for device drivers: the Goblint approach (VV, KA, VR, HS, VV, RV), pp. 391–402.
ASE-2016-YangJGS #automaton #verification- Verifying simulink stateflow model: timed automata approach (YY, YJ, MG, JGS), pp. 852–857.
FSE-2016-HammoudiRS #incremental #named #testing #web- WATERFALL: an incremental approach for repairing record-replay tests of web applications (MH, GR, AS0), pp. 751–762.
FSE-2016-Shevtsov #adaptation #reuse #self- Developing a reusable control-based approach to build self-adaptive software systems with formal guarantees (SS), pp. 1060–1062.
- ICSE-2016-NguyenPVN #api #bytecode #learning #statistics
- Learning API usages from bytecode: a statistical approach (TTN, HVP, PMV, TTN), pp. 416–427.
GPCE-2016-BrazGMRMT #configuration management- A change-centric approach to compile configurable systems with #ifdefs (LB, RG, MM, MR, FM, LT), pp. 109–119.
ASPLOS-2016-HasabnisS #assembly #compilation #novel #representation- Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers (NH, RS), pp. 311–324.
CASE-2016-AlvesBPT #logic- Planning on Discrete Events Systems: A logical approach (LVRA, HJB, PNP, RHCT), pp. 1055–1060.
CASE-2016-CampbellTLPOF #concurrent #configuration management #modelling #π-calculus- Modeling concurrency and reconfiguration in vehicular systems: A π-calculus approach (JC, CET, PL0, TPP, ÜÖ, GEF), pp. 523–530.
CASE-2016-Csiszar #automation #combinator #equation #generative- A combinatorial approach to the automated generation of inverse kinematics equations for robot arms (AC), pp. 984–989.
CASE-2016-FeldmannWKV #automation #consistency #nondeterminism- A comprehensive approach for managing inter-model inconsistencies in automated production systems engineering (SF, MW, KK, BVH), pp. 1120–1127.
CASE-2016-HamanaAX #information management #petri net #verification- A timed Petri net approach for verification of Territorial Healthcare Information Systems (SH, VA, XX), pp. 658–663.
CASE-2016-MaP #embedded #named #programmable #testing- DTT-MAT: A software toolbox on a design-to-test approach for testing of embedded programmable controllers (CM, JP), pp. 878–884.
CASE-2016-OkaemeMW - A comfort zone set-based approach for coupled temperature and humidity control in buildings (CCO, SM, JTW), pp. 456–461.
CASE-2016-RehbergerSV #automation #flexibility #reasoning- An agent approach to flexible automated production systems based on discrete and continuous reasoning (SR, LS, BVH), pp. 1249–1256.
CASE-2016-SchwesingerS #3d #locality #scalability- A 3D approach to infrastructure-free localization in large scale warehouse environments (DS, JRS), pp. 274–279.
CASE-2016-SrinivasanC #approximate #orthogonal #using- Path planning with user route preference - A reward surface approximation approach using orthogonal Legendre polynomials (ARS, SC), pp. 1100–1105.
CASE-2016-WiebeRRV #automation #composition #delivery #fault #generative #injection #simulation #testing #using- Automated test suite generation to test modular designed packaging machines using Fault Injection and a simulink-based simulation approach (FW, SR, SR, BVH), pp. 758–765.
CGO-2016-BarikFLHS #black box #cpu #energy #gpu #scheduling- A black-box approach to energy-aware scheduling on integrated CPU-GPU systems (RB, NF, BTL, CH, TS), pp. 70–81.
ESOP-2016-KawabataI #adaptation #float #lazy evaluation #refinement- Improving Floating-Point Numbers: A Lazy Approach to Adaptive Accuracy Refinement for Numerical Computations (HK, HI), pp. 390–418.
ESOP-2016-LourencoFP #adaptation #formal method #verification- Formalizing Single-Assignment Program Verification: An Adaptation-Complete Approach (CBL, MJF, JSP), pp. 41–67.
ESOP-2016-WangN #functional #higher-order #source code #syntax- A Higher-Order Abstract Syntax Approach to Verified Transformations on Functional Programs (YW, GN), pp. 752–779.
CAV-2016-ChenSW #commutative #framework #pipes and filters #problem #transducer- The Commutativity Problem of the MapReduce Framework: A Transducer-Based Approach (YFC, LS, ZW), pp. 91–111.
ICST-2016-ChenBHXZ0X #compilation #testing- Test Case Prioritization for Compilers: A Text-Vector Based Approach (JC0, YB, DH, YX, HZ0, LZ0, BX), pp. 266–277.
ICTSS-2016-SimosKGGL #combinator #security #testing #web- A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing (DES, KK, LSGG, BG, YL), pp. 70–85.
ECSA-2015-AngelovB #agile #architecture #development #education- An Approach to Software Architecting in Agile Software Development Projects in Education (SA, PdB), pp. 157–168.
ECSA-2015-BaresiS #architecture- An Architecture-Centric Approach for Dynamic Smart Spaces (LB, AS), pp. 277–284.
ECSA-2015-SporerMKB #agile #design #requirements- A Lean Automotive E/E-System Design Approach with Integrated Requirements Management Capability (HS, GM, CK, EB), pp. 251–258.
QoSA-2015-Kramer #consistency #generative #modelling #multi- A Generative Approach to Change-Driven Consistency in Multi-View Modeling (MEK), pp. 129–134.
WICSA-2015-CaraccioloLN #architecture #consistency- A Unified Approach to Architecture Conformance Checking (AC, MFL, ON), pp. 41–50.
WICSA-2015-HauptLP #api #modelling #rest- A Conversation Based Approach for Modeling REST APIs (FH, FL, CP), pp. 165–174.
DocEng-2015-AzevedoLS #3d- An Approach to Convert NCL Applications into Stereoscopic 3D (RGDAA, GAFL, LFGS), pp. 177–186.
DocEng-2015-DumasCBS #design- An Approach for Designing Proofreading Views in Publishing Chains (LD, SC, BB, SS), pp. 215–218.
DocEng-2015-RastanPS #comprehension #named- TEXUS: A Task-based Approach for Table Extraction and Understanding (RR, HYP, JS), pp. 25–34.
DocEng-2015-SarkisCD #multi #named #segmentation #web- MSoS: A Multi-Screen-Oriented Web Page Segmentation Approach (MS, CC, JCD), pp. 85–88.
DRR-2015-PengCN #using- Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
JCDL-2015-PintoB #probability #semantics- Demystifying the Semantics of Relevant Objects in Scholarly Collections: A Probabilistic Approach (JMGP, WTB), pp. 157–164.
SIGMOD-2015-ArmenatzoglouPN #clustering #game studies #graph #multi #realtime #social- Real-Time Multi-Criteria Social Graph Partitioning: A Game Theoretic Approach (NA, HP, VN, DP, CS), pp. 1617–1628.
SIGMOD-2015-DeshpandeRDA #named- ShareInsights: An Unified Approach to Full-stack Data Processing (MD, DR, SD, AA), pp. 1925–1940.
SIGMOD-2015-GurukarRR #commit #communication #mining #named #network #scalability- COMMIT: A Scalable Approach to Mining Communication Motifs from Dynamic Networks (SG, SR, BR), pp. 475–489.
SIGMOD-2015-ShinJSK #graph #named #random #scalability- BEAR: Block Elimination Approach for Random Walk with Restart on Large Graphs (KS, JJ, LS, UK), pp. 1571–1585.
SIGMOD-2015-TangSX - Influence Maximization in Near-Linear Time: A Martingale Approach (YT, YS, XX), pp. 1539–1554.
SIGMOD-2015-WangLYXZ #network #performance- Efficient Route Planning on Public Transportation Networks: A Labelling Approach (SW, WL, YY, XX, SZ), pp. 967–982.
SIGMOD-2015-WangXL #adaptation- Crowd-Based Deduplication: An Adaptive Approach (SW, XX, CHL), pp. 1263–1277.
SIGMOD-2015-WongHFXL #as a service #database #named #parallel #using- Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
SIGMOD-2015-ZhengZLYSZ #graph #how #nondeterminism #rdf #similarity- How to Build Templates for RDF Question/Answering: An Uncertain Graph Similarity Join Approach (WZ, LZ, XL, JXY, SS, DZ), pp. 1809–1824.
VLDB-2015-AkidauBCCFLMMPS #bound #correctness #data flow #latency- The Dataflow Model: A Practical Approach to Balancing Correctness, Latency, and Cost in Massive-Scale, Unbounded, Out-of-Order Data Processing (TA, RB, CC, SC, RFM, RL, SM, DM, FP, ES, SW), pp. 1792–1803.
VLDB-2015-GreenOW #live programming #programming- Live Programming in the LogicBlox System: A MetaLogiQL Approach (TJG, DO, GW), pp. 1782–1793.
VLDB-2015-JhaHLCH #in memory #memory management- Improving Main Memory Hash Joins on Intel Xeon Phi Processors: An Experimental Approach (SJ, BH, ML, XC, HPH), pp. 642–653.
VLDB-2015-LiCM #data-driven #query- Query From Examples: An Iterative, Data-Driven Approach to Query Construction (HL, CYC, DM), pp. 2158–2169.
VLDB-2015-SH #big data #named #testing- CODD: A Dataless Approach to Big Data Testing (AS, JRH), pp. 2008–2019.
VLDB-2015-YangMFLK #lens #named #on-demand- Lenses: An On-Demand Approach to ETL (YY, NM, RF, ZHL, OK), pp. 1578–1589.
VLDB-2015-ZhangC0 #distributed #graph #set- Bonding Vertex Sets Over Distributed Graph: A Betweenness Aware Approach (XZ, HC, LC), pp. 1418–1429.
EDM-2015-AlexandronZP #machine learning #student- Discovering the Pedagogical Resources that Assist Students to Answer Questions Correctly - A Machine Learning Approach (GA, QZ, DEP), pp. 520–523.
EDM-2015-AnayaGLH #analysis #collaboration #diagrams #network #social #using- An Approach of Collaboration Analytics in MOOCs Using Social Network Analysis and Influence Diagram (ARA, JGB, EL, FHdO), pp. 492–495.
EDM-2015-ChangHC #modelling- Modeling Exercise Relationships in E-Learning: A Unified Approach (HSC, HJH, KTC), pp. 532–535.
EDM-2015-DesmaraisXB - A Partition Tree Approach to Combine Techniques to Refine Item to Skills Q-Matrices (MCD, PX, BB), pp. 29–36.
EDM-2015-HershkovitzMS #interactive #student- Teacher-Student Classroom Interactions: A Computational Approach (AH, AM, AS), pp. 558–559.
EDM-2015-SaarelaK #clustering #education #scalability- Do Country Stereotypes Exist in Educational Data? A Clustering Approach for Large, Sparse, and Weighted Data (MS, TK), pp. 156–153.
EDM-2015-VossSMS #dataset #learning #matrix- A Transfer Learning Approach for Applying Matrix Factorization to Small ITS Datasets (LV, CS, CM, LST), pp. 372–375.
ITiCSE-2015-Patitsas #education #student- A Numpy-First Approach to Teaching CS1 to Natural Science Students (EP), p. 333.
ITiCSE-2015-Silvis-Cividjian #education #multi #pervasive- Teaching Pervasive Computing to CS Freshmen: A Multidisciplinary Approach (NSC), pp. 195–200.
ITiCSE-2015-XhakajL #education- A New Approach To Teaching Red Black Tree (FX, CWL), pp. 278–283.
SIGITE-2015-Jonas #online- Flipping a Flipped Approach: Online Techniques In-Person (MJ), p. 73.
SIGITE-2015-SobieskBCLT #education #multi- Cyber Education: A Multi-Level, Multi-Discipline Approach (ES, JRSB, GJC, ML, HT), pp. 43–47.
ICSME-2015-Verebi #modelling #refactoring- A model-based approach to software refactoring (IV), pp. 606–609.
MSR-2015-Marder #behaviour #stack overflow- Stack Overflow Badges and User Behavior: An Econometric Approach (AM), pp. 450–453.
SANER-2015-NagyMC #concept #query #sql- Where was this SQL query executed? a static concept location approach (CN, LM, AC), pp. 580–584.
SANER-2015-NayrollesHTL #debugging #model checking #named #using- JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
SANER-2015-SaeidiHKJ #clustering #multi #search-based- A search-based approach to multi-view clustering of software systems (AS, JH, RK, SJ), pp. 429–438.
SANER-2015-ThongtanunamTKY #code review #overview #perspective #recommendation- Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review (PT, CT, RGK, NY, HI, KiM), pp. 141–150.
ICALP-v2-2015-KariS #algebra #geometry- An Algebraic Geometric Approach to Nivat’s Conjecture (JK, MS), pp. 273–285.
ICALP-v2-2015-Zetzsche - An Approach to Computing Downward Closures (GZ), pp. 440–451.
LATA-2015-Peltier #reasoning- Reasoning on Schemas of Formulas: An Automata-Based Approach (NP), pp. 263–274.
Haskell-2015-OliveiraMY #composition- Modular reifiable matching: a list-of-functors approach to two-level types (BCdSO, SCM, SHY), pp. 82–93.
AIIDE-2015-LimH #behaviour #data-driven #modelling- A Data-Driven Approach for Computationally Modeling Players' Avatar Customization Behaviors (CUL, DFH), pp. 135–141.
AIIDE-2015-SnodgrassO #2d #game studies #generative #video- A Hierarchical MdMC Approach to 2D Video Game Map Generation (SS, SO), pp. 205–211.
CHI-PLAY-2015-ChattaHSGQ #game studies- Get off the Couch: An Approach to Utilize Sedentary Commercial Games as Exergames (AC, TH, GS, RG, JQ), pp. 47–56.
CHI-PLAY-2015-WallnerPHW #game studies #modelling- Modeling Routinization in Games: An Information Theory Approach (SW, MP, MH, MW), pp. 727–732.
CIG-2015-DannZT #learning- An improved approach to reinforcement learning in Computer Go (MD, FZ, JT), pp. 169–176.
CIG-2015-QuiterioPM #geometry #learning- A reinforcement learning approach for the circle agent of geometry friends (JQ, RP, FSM), pp. 423–430.
CIG-2015-YinLCOZ #adaptation #data-driven #game studies #online- A data-driven approach for online adaptation of game difficulty (HY, LL, WC, YSO, JZ), pp. 146–153.
FDG-2015-AzadeganHS #collaboration #design #game studies- Design Approach for Collaborative Cognitive Games (AA, CH, SCS).
FDG-2015-Lederle-EnsignR - A Software Studies Approach to Interpreting Passage (DLE, WR, JP, MM).
VS-Games-2015-AsadipourDC #game studies #learning- A Game-Based Training Approach to Enhance Human Hand Motor Learning and Control Abilities (AA0, KD, AC), pp. 1–6.
VS-Games-2015-WangC #gamification #performance- A Social-Centred Gamification Approach to Improve Household Water Use Efficiency (ZW, AC), pp. 1–4.
GaM-2015-ValletKPM #modelling #network #social #visual notation- A Visual Analytics Approach to Compare Propagation Models in Social Networks (JV, HK, BP, GM), pp. 65–79.
CHI-2015-GannonGF #design #named- Tactum: A Skin-Centric Approach to Digital Design and Fabrication (MG, TG, GWF), pp. 1779–1788.
CHI-2015-GiaccardiK #experience #human-computer- Foundations of Materials Experience: An Approach for HCI (EG, EK), pp. 2447–2456.
CHI-2015-HillmanW #social #social media- Situated Social Media Use: A Methodological Approach to Locating Social Media Practices and Trajectories (TH, AW), pp. 4057–4060.
CHI-2015-KoemanKR #distributed #exclamation #quote #visualisation- “Everyone Is Talking about It!”: A Distributed Approach to Urban Voting Technology and Visualisations (LK, VK, YR), pp. 3127–3136.
CHI-2015-NoroozMJMF #learning #named #smarttech #visualisation- BodyVis: A New Approach to Body Learning Through Wearable Sensing and Visualization (LN, MLM, AJ, BM, JEF), pp. 1025–1034.
CHI-2015-OLearyEKVRP #comprehension #design #health #trade-off- Understanding Design Tradeoffs for Health Technologies: A Mixed-Methods Approach (KO, JE, LK, LMV, JDR, WP), pp. 4151–4160.
CHI-2015-PengZG #3d #design #modelling #named- D-Coil: A Hands-on Approach to Digital 3D Models Design (HP, AZ, FG), pp. 1807–1815.
CHI-2015-RamakersTL #design #named- PaperPulse: An Integrated Approach for Embedding Electronics in Paper Designs (RR, KT, KL), pp. 2457–2466.
CHI-2015-ZhaoDFZ #named- CoFaçade: A Customizable Assistive Approach for Elders and Their Helpers (JCZ, RCD, PSF, SZ), pp. 1583–1592.
DHM-EH-2015-CheffiRBBS #cost analysis #feedback #optimisation- A Bi-level Optimization Approach to Get an Optimal Combination of Cost Functions for Pilot’s Arm Movement: The Case of Helicopter’s Flying Aid Functions with Haptic Feedback (SC, TR, LB, PB, JCS), pp. 248–257.
DHM-EH-2015-HeftSBR #visualisation- An Approach for Intuitive Visualization of Ergonomic Issues (WH, MS, ACB, PR), pp. 26–36.
DUXU-DD-2015-BarrosSRTBS #human-computer #interface #usability- A Usability Study of a Brain-Computer Interface Apparatus: An Ergonomic Approach (RQB, GS, CR, RT, MQB, MMS), pp. 224–236.
DUXU-DD-2015-DiasVSVPSE #testing #usability- A Living Labs Approach for Usability Testing of Ambient Assisted Living Technologies (MSD, EV, FS, AV, FMP, NS, SE), pp. 167–178.
DUXU-DD-2015-Lera #design #interactive #matter- Emotion-Centered-Design (ECD) New Approach for Designing Interactions that Matter (EdL), pp. 406–416.
DUXU-IXD-2015-Gasparini #experience #interactive #library #user interface- A Holistic Approach to User Experience in the Context of an Academic Library Interactive System (AAG), pp. 173–184.
DUXU-UI-2015-SoutoFS #comprehension #design #process #towards #women- The Creative Process in Digital Design: Towards an Understanding of Women’s Approach (VTS, PCLAF, FAdS), pp. 252–263.
HCI-DE-2015-Bakke #process- An Activity Theory Approach to Intuitiveness: From Artefact to Process (SB), pp. 3–13.
HCI-DE-2015-ChamunZMOS #design #documentation #what- What About Document Folding? User Impressions and a Design Approach (RC, AdCAZ, IHM, JBSdO, MSS), pp. 307–319.
HCI-DE-2015-GhoshP #design #mobile- Designing of a Natural Voice Assistants for Mobile Through User Centered Design Approach (SG, JP), pp. 320–331.
HCI-DE-2015-Uchida #security- A Psychological Approach to Information Security — Some Ideas for Establishing Information Security Psychology (KU), pp. 96–104.
HCI-IT-2015-EskerudSOH #automation #design #interface- Controlling the Home — A User Participatory Approach to Designing a Simple Interface for a Complex Home Automation System (ME, AS, CSO, HH), pp. 717–728.
HCI-UC-2015-AzhariF #experience #social #social media #user interface #using- Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
HCI-UC-2015-HessBFHKMNRLT #ecosystem #mobile- Building Mobile Software Ecosystems — A Practical Approach (SH, SB, JF, MH, FK, DM, MN, DR, TL, MT), pp. 165–177.
HCI-UC-2015-OhJK #human-computer #simulation #using- Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
HIMI-IKC-2015-HasegawaD #framework #learning #platform #ubiquitous- A Ubiquitous Lecture Archive Learning Platform with Note-Centered Approach (SH, JD), pp. 294–303.
HIMI-IKC-2015-LiangG #information management #ontology #safety #semantics #web- Improving Knowledge Management in Patient Safety Reporting: A Semantic Web Ontology Approach (CL, YG), pp. 118–128.
HIMI-IKD-2015-0002S #visualisation- An Approach to Spatial Visualizing Method for Information Structure to Enhance Remember to Look (JGL, DHS), pp. 67–73.
HIMI-IKD-2015-GonzalezCB #design #modelling #sentiment- Modeling User’s Sentiment in User Segmentations: An Argumentation Approach for User Centered Design (MPG, CIC, RFB), pp. 595–606.
HIMI-IKD-2015-NoseLBK #network- Centralized Approach for a Unified Wireless Network Access (JDN, JL, CB, AK), pp. 547–559.
LCT-2015-Sirisaengtaksin #design #education #mobile #online #recommendation #research- A Notification and Recommender Mobile App for Educational Online Discussion: A Design Research Approach (KS, LO, NA), pp. 325–336.
CAiSE-2015-AbubahiaC #clustering- A Clustering Approach for Protecting GIS Vector Data (AA, MC), pp. 133–147.
CAiSE-2015-FukusumiMK #crowdsourcing #data transformation #game studies- Game Aspect: An Approach to Separation of Concerns in Crowdsourced Data Management (SF, AM, HK), pp. 3–19.
CAiSE-2015-KhouriSB #data transformation #lifecycle #traceability- Managing Data Warehouse Traceability: A Life-Cycle Driven Approach (SK, KS, LB), pp. 199–213.
CAiSE-2015-SunB #clustering #novel #top-down- A Novel Top-Down Approach for Clustering Traces (YS, BB), pp. 331–345.
CAiSE-2015-YeddulaDR #enterprise #migration #modelling- A Model-Driven Approach to Enterprise Data Migration (RRY, PD, SR), pp. 230–243.
ICEIS-v1-2015-ArevaloRC #information management #legacy #modelling #process- Discovering Business Models for Software Process Management — An Approach for Integrating Time and Resource Perspectives from Legacy Information Systems (CA, IMR, MJEC), pp. 353–359.
ICEIS-v1-2015-BorgesDRAS #generative #using- An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
ICEIS-v1-2015-CarboneraA15a #information management #knowledge-based #representation- A Cognition-inspired Knowledge Representation Approach for Knowledge-based Interpretation Systems (JLC, MA), pp. 644–649.
ICEIS-v1-2015-FerrandinENSA #classification- A Centroid-based Approach for Hierarchical Classification (MF, FE, JCN, EES, BCÁ), pp. 25–33.
ICEIS-v1-2015-GharbiGB #configuration management #embedded #hybrid #realtime #scheduling #search-based- A Hybrid Genetic based Approach for Real-time Reconfigurable Scheduling of OS Tasks in Uniprocessor Embedded Systems (IG, HG, SB), pp. 385–390.
ICEIS-v1-2015-JuniorS #compilation #optimisation #reasoning #set- Finding Good Compiler Optimization Sets — A Case-based Reasoning Approach (NLQJ, AFdS), pp. 504–515.
ICEIS-v1-2015-MendoncaMSS #named #query- CORE — A Context-based Approach for Rewriting User Queries (AM, PM, DS, ACS), pp. 391–398.
ICEIS-v1-2015-SabelnikovaCT #case study #outsourcing- Analysing Business-IT Alignment in the IT Outsourcing Context — A Case Study Approach (ES, CMC, JJMT), pp. 5–16.
ICEIS-v1-2015-SilvaHL #hybrid #memory management- A Hybrid Memory Data Cube Approach for High Dimension Relations (RRS, CMH, JdCL), pp. 139–149.
ICEIS-v2-2015-AizebojeP #pointer #using- An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
ICEIS-v2-2015-BayaADM #composition #product line #scalability- Dynamic Large Scale Product Lines through Modularization Approach (AB, BEA, ID, ZM), pp. 439–444.
ICEIS-v2-2015-Brant-RibeiroAM #interactive #modelling #petri net #using #web- A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
ICEIS-v2-2015-DuarteOB #architecture- Smart Cities — An Architectural Approach (AD, CO, JB), pp. 563–573.
ICEIS-v2-2015-EttaziHNE #adaptation #towards #transaction- Towards a Context-Aware Adaptation Approach for Transactional Services (WE, HH, MN, SE), pp. 553–562.
ICEIS-v2-2015-JuniorP #identification #named #ontology #requirements- OnTheme/Doc — An Ontology-based Approach for Crosscutting Concern Identification from Software Requirements (PAPJ, RADP), pp. 188–200.
ICEIS-v2-2015-KhlifKKD #architecture #multi #uml- A UML-based Approach for Multi-scale Software Architectures (IK, MHK, AHK, KD), pp. 374–381.
ICEIS-v2-2015-LucenaAAAJ #modelling- Integrating User Stories and i* Models — A Systematic Approach (ML, CA, FMRA, EA, AJ), pp. 428–438.
ICEIS-v2-2015-MeloFOS #diagrams #modelling #process #uml- A Model-driven Approach to Transform SysML Internal Block Diagrams to UML Activity Diagrams (MdSM, JMSF, EAOJ, MSS), pp. 92–101.
ICEIS-v3-2015-GhezziCRB #agile #case study #comparative #design #mobile #performance- A Comparative Study on the Impact of Business Model Design & Lean Startup Approach versus Traditional Business Plan on Mobile Startups Performance (AG, AC, AR, RB), pp. 196–203.
ICEIS-v3-2015-NicastroPAMBT #case study #guidelines #interface #mobile- A Semiotic-informed Approach to Interface Guidelines for Mobile Applications — A Case Study on Phenology Data Acquisition (FN, RP, BA, LPCM, CB, RdST), pp. 34–43.
ICEIS-v3-2015-ProencaNBB #risk management- Digital Curation Costs — A Risk Management Approach Supported by the Business Model Canvas (DP, AN, RB, JLB), pp. 299–306.
ICEIS-v3-2015-Wissotzki #identification #process- A Process Approach for Capability Identification and Management (MW), pp. 204–212.
CIKM-2015-AnwarMS #data-driven #fault #grid #physics #smarttech- A Data-Driven Approach to Distinguish Cyber-Attacks from Physical Faults in a Smart Grid (AA, ANM, ZS), pp. 1811–1814.
CIKM-2015-ChenZSW #eye tracking #modelling #query #realtime #topic- A Real-Time Eye Tracking Based Query Expansion Approach via Latent Topic Modeling (YC, PZ0, DS0, BW), pp. 1719–1722.
CIKM-2015-GribelBA #clustering #detection- A Clustering-based Approach to Detect Probable Outcomes of Lawsuits (DLG, MGdB, LGA), pp. 1831–1834.
CIKM-2015-HuangLY #clustering #data type #parallel #performance- A Parallel GPU-Based Approach to Clustering Very Fast Data Streams (PH, XL, BY0), pp. 23–32.
CIKM-2015-LagreeCV #social #social media- A Network-Aware Approach for Searching As-You-Type in Social Media (PL, BC, HV), pp. 563–572.
CIKM-2015-LinZWLL0C #data-driven #parametricity #pipes and filters #predict- Data Driven Water Pipe Failure Prediction: A Bayesian Nonparametric Approach (PL, BZ, YW0, ZL, BL0, YW0, FC0), pp. 193–202.
CIKM-2015-LiXJL #adaptation #dataset- Differentially Private Histogram Publication for Dynamic Datasets: an Adaptive Sampling Approach (HL, LX0, XJ, JL), pp. 1001–1010.
CIKM-2015-MaoLF #network #recognition #transaction- Fraud Transaction Recognition: A Money Flow Network Approach (RM, ZL, JF), pp. 1871–1874.
CIKM-2015-MunozTG #learning #ranking- A Soft Computing Approach for Learning to Aggregate Rankings (JAVM, RdST, MAG), pp. 83–92.
CIKM-2015-PerezSLK #recommendation- Category-Driven Approach for Local Related Business Recommendations (YP, MS, ML, SK), pp. 73–82.
CIKM-2015-RudraGGGG #classification #microblog- Extracting Situational Information from Microblogs during Disaster Events: a Classification-Summarization Approach (KR, SG, NG, PG, SG0), pp. 583–592.
CIKM-2015-WangSFYXL #effectiveness #multi- An Integrated Bayesian Approach for Effective Multi-Truth Discovery (XW0, QZS, XSF, LY, XX, XL0), pp. 493–502.
CIKM-2015-WangWWX #categorisation- An Inference Approach to Basic Level of Categorization (ZW, HW, JRW, YX), pp. 653–662.
CIKM-2015-YeZMJZ #consistency #learning #multi #privacy #rank- Rank Consistency based Multi-View Learning: A Privacy-Preserving Approach (HJY, DCZ, YM, YJ0, ZHZ), pp. 991–1000.
ECIR-2015-AmigoGM #clustering #effectiveness #formal method #information management #metric #retrieval- A Formal Approach to Effectiveness Metrics for Information Access: Retrieval, Filtering, and Clustering (EA, JG, SM), pp. 817–821.
ECIR-2015-JungL #predict- A Discriminative Approach to Predicting Assessor Accuracy (HJJ, ML), pp. 159–171.
ECIR-2015-LiangCC #detection #social #social media- A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media (YL, JC, CC), pp. 233–244.
ECIR-2015-SchindlerR #classification #music- An Audio-Visual Approach to Music Genre Classification through Affective Color Features (AS, AR), pp. 61–67.
ICML-2015-JerniteRS #learning #markov #modelling #performance #random- A Fast Variational Approach for Learning Markov Random Field Language Models (YJ, AMR, DS), pp. 2209–2217.
ICML-2015-PachecoS #pseudo- Proteins, Particles, and Pseudo-Max-Marginals: A Submodular Approach (JP, EBS), pp. 2200–2208.
ICML-2015-Romera-ParedesT #learning- An embarrassingly simple approach to zero-shot learning (BRP, PHST), pp. 2152–2161.
ICML-2015-SzorenyiBWH #multi- Qualitative Multi-Armed Bandits: A Quantile-Based Approach (BS, RBF, PW, EH), pp. 1660–1668.
ICML-2015-TangS #composition- Guaranteed Tensor Decomposition: A Moment Approach (GT, PS), pp. 1491–1500.
ICML-2015-YenLZRD #modelling #process- A Convex Exemplar-based Approach to MAD-Bayes Dirichlet Process Mixture Models (IEHY, XL, KZ, PKR, ISD), pp. 2418–2426.
ICML-2015-ZhuE #hybrid #probability #random #using- A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
KDD-2015-BarajasA #health #modelling- Dynamically Modeling Patient’s Health State from Electronic Medical Records: A Time Series Approach (KLCB, RA), pp. 69–78.
KDD-2015-RenEWH #automation #corpus #mining #network #recognition #type system- Automatic Entity Recognition and Typing from Massive Text Corpora: A Phrase and Network Mining Approach (XR, AEK, CW, JH), pp. 2319–2320.
KDD-2015-SunWH #named #predict #risk management- LINKAGE: An Approach for Comprehensive Risk Prediction for Care Management (ZS, FW, JH), pp. 1145–1154.
KDD-2015-WangLSH #composition #interactive #recursion #topic #towards- Towards Interactive Construction of Topical Hierarchy: A Recursive Tensor Decomposition Approach (CW, XL, YS, JH), pp. 1225–1234.
KDD-2015-ZhouM #kernel #predict- Predicting Ambulance Demand: a Spatio-Temporal Kernel Approach (ZZ, DSM), pp. 2297–2303.
MLDM-2015-CoralloFMACCGS #analysis #sentiment- Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
MLDM-2015-GovadaJMS #hybrid #induction #learning #using- Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
MLDM-2015-KrasotkinaM #optimisation #ranking- A Bayesian Approach to Sparse Learning-to-Rank for Search Engine Optimization (OK, VM), pp. 382–394.
MLDM-2015-KrasotkinaM15a #analysis- A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
RecSys-2015-GuoD #bias #category theory- Uncovering Systematic Bias in Ratings across Categories: a Bayesian Approach (FG, DBD), pp. 317–320.
SEKE-2015-AdamEA #design- An approach for classifying design artifacts (SA, GEB, AA), pp. 164–167.
SEKE-2015-GomedeSB #delivery #lifecycle- A Practical Approach to Software Continuous Delivery Focused on Application Lifecycle Management (EG, RTDS, RMdB), pp. 320–325.
SEKE-2015-MagalhaesAM #framework #independence #model transformation #on the #platform #specification- On the Specification of Model Transformations through a Platform Independent Approach (APM, AMSA, RSPM), pp. 558–561.
SEKE-2015-Murillo-MoreraJ #algorithm #framework #learning #predict #search-based #using- A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
SEKE-2015-NoureddineJHKM #correlation #named #profiling #research- CARP: Correlation Based Approach for Researcher Profiling (HN, IJ, HH, OAK, EM), pp. 461–464.
SEKE-2015-SaharAA #case study #detection #image #modelling #prototype- A Case Study Approach: Iterative Prototyping Model Based Detection of Macular Edema in Retinal OCT Images (SS, SA, MUA), pp. 266–271.
SEKE-2015-SampaioMLM #adaptation #learning #research- Reflecting, adapting and learning in small software organizations: an action research approach (SS, MM, AL, HPM), pp. 46–50.
SEKE-2015-TironiMRM #identification #learning- An approach to identify relevant subjects for supporting the Learning Scheme creation task (HT, ALAM, SSR, AM), pp. 506–511.
SEKE-2015-WangG #hybrid #novel #predict- A Novel Hybrid Approach for Diarrhea Prediction (YW, JG), pp. 168–173.
SIGIR-2015-CanutoGSRM #classification #documentation #parallel #performance #scalability- An Efficient and Scalable MetaFeature-based Document Classification Approach based on Massively Parallel Computing (SDC, MAG, WS, TR, WM), pp. 333–342.
ECMFA-J-2012-BaresiBKMMPRR15 #embedded #uml #validation #verification- Formal verification and validation of embedded systems: the UML-based MADES approach (LB, GB, DSK, NDM, AM, RFP, AR, MR), pp. 343–363.
AMT-2015-RabbiLYK #diagrams- A Diagrammatic Approach to Model Completion (FR, YL, IY, LK), pp. 56–65.
BX-2015-AnjorinLKSS #graph grammar #guidelines- A Systematic Approach and Guidelines to Developing a Triple Graph Grammar (AA, EL, RK, AS, PS), pp. 81–95.
BX-2015-HidakaBTM #analysis #bidirectional #graph transformation- Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
ECMFA-2015-BousseMCB #generative #metamodelling- A Generative Approach to Define Rich Domain-Specific Trace Metamodels (EB, TM, BC, BB), pp. 45–61.
ECMFA-2015-JahanbanifarKT #integration #modelling- A Model-Based Approach for the Integration of Configuration Fragments (AJ, FK, MT), pp. 125–136.
MoDELS-2015-AtkinsonGK15a #modelling #multi- A unifying approach to connections for multi-level modeling (CA, RG, TK), pp. 216–225.
MoDELS-2015-HajriGBS #case study #embedded #industrial #lessons learnt #modelling #product line- Applying product line Use case modeling in an industrial automotive embedded system: Lessons learned and a refined approach (IH, AG, LCB, TS), pp. 338–347.
MoDELS-2015-IftikharIKM #automation #framework #game studies #modelling #platform #testing- An automated model based testing approach for platform games (SI, MZI, MUK, WM), pp. 426–435.
MoDELS-2015-Rodriguez-Echeverria #analysis #evolution #model transformation #statistics- A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
PLEASE-2015-TzeremesG #development #product line- A Software Product Line Approach for End User Development of Smart Spaces (VT, HG), pp. 23–26.
SPLC-2015-0002Z #agile- Lean variation management: increasing business value with a diversified approach (MB, BZ), p. 385.
SPLC-2015-MartinezZBKT #bottom-up #product line- Bottom-up adoption of software product lines: a generic and extensible approach (JM, TZ, TFB, JK, YLT), pp. 101–110.
SPLC-2015-Munoz-Fernandez #adaptation #named #requirements #self #simulation- REFAS: a PLE approach for simulation of self-adaptive systems requirements (JCMF, GT, IR, RM, CS), pp. 121–125.
OOPSLA-2015-CrafaP #programming- The chemical approach to typestate-oriented programming (SC, LP), pp. 917–934.
OOPSLA-2015-HagueLO #css #detection #html- Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach (MH, AWL, CHLO), pp. 1–19.
LOPSTR-2015-FuK - A Type-Theoretic Approach to Resolution (PF0, EK), pp. 91–106.
PLDI-2015-EmaniO #runtime- Celebrating diversity: a mixture of experts approach for runtime mapping in dynamic environments (MKE, MFPO), pp. 499–508.
REFSQ-2015-GhaziSG #named #requirements #visualisation- FlexiView: A Magnet-Based Approach for Visualizing Requirements Artifacts (PG, NS, MG), pp. 262–269.
ASE-2015-GuzmanEB #classification #evolution #overview- Ensemble Methods for App Review Classification: An Approach for Software Evolution (N) (EG, MEH, BB), pp. 771–776.
ASE-2015-NguyenNN #divide and conquer #migration #multi #source code #statistics- Divide-and-Conquer Approach for Multi-phase Statistical Migration for Source Code (T) (ATN, TTN, TNN), pp. 585–596.
ASE-2015-VierhauserRGE #case study #experience #lessons learnt #monitoring- Developing a DSL-Based Approach for Event-Based Monitoring of Systems of Systems: Experiences and Lessons Learned (E) (MV, RR, PG, AE), pp. 715–725.
ASE-2015-VuNPN #keyword #mining #mobile- Mining User Opinions in Mobile App Reviews: A Keyword-Based Approach (T) (PMV, TTN, HVP, TTN), pp. 749–759.
ESEC-FSE-2015-MangalZNN #program analysis- A user-guided approach to program analysis (RM, XZ, AVN, MN), pp. 462–473.
ESEC-FSE-2015-MorenoCGS #adaptation #model checking #nondeterminism #probability #self- Proactive self-adaptation under uncertainty: a probabilistic model checking approach (GAM, JC, DG, BRS), pp. 1–12.
ESEC-FSE-2015-VasquezBBOPP #android #energy #multi #optimisation #user interface- Optimizing energy consumption of GUIs in Android apps: a multi-objective approach (MLV, GB, CEBC, RO, MDP, DP), pp. 143–154.
GTTSE-2015-PontesMOP #algebra #implementation #linear- Implementing a Linear Algebra Approach to Data Processing (RP, MM, JNO, JOP), pp. 215–222.
ICSE-v1-2015-JoblinMASR #community #developer #fine-grained #network- From Developer Networks to Verified Communities: A Fine-Grained Approach (MJ, WM, SA, JS, DR), pp. 563–573.
ICSE-v1-2015-SahaZKP #information retrieval #testing- An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes (RKS, LZ, SK, DEP), pp. 268–279.
ICSE-v1-2015-WhalenPRSG #flexibility #metric- A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics (MWW, SP, NR, MS, DG), pp. 506–516.
ICSE-v1-2015-YuBC #fault #multi #testing- Does the Failing Test Execute a Single or Multiple Faults? An Approach to Classifying Failing Tests (ZY, CB, KYC), pp. 924–935.
ICSE-v2-2015-Baia #multi #project management #simulation- An Integrated Multi-Agent-Based Simulation Approach to Support Software Project Management (DdMB), pp. 911–914.
ICSE-v2-2015-Caracciolo #architecture #automation #constraints #testing- A Unified Approach to Automatic Testing of Architectural Constraints (AC), pp. 871–874.
ICSE-v2-2015-Hecht #android #detection- An Approach to Detect Android Antipatterns (GH), pp. 766–768.
SAC-2015-0001RMW #behaviour #constraints #process- Matching of events and activities: an approach based on behavioral constraint satisfaction (TB, ARS, JM, MW), pp. 1225–1230.
SAC-2015-AliK #effectiveness #recommendation- An effective approach to group recommendation based on belief propagation (IA, SWK), pp. 1148–1153.
SAC-2015-AwadBESAS #anti #detection #process #runtime- Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
SAC-2015-BadouelHKM #collaboration #distributed- A grammatical approach to data-centric case management in a distributed collaborative environment (EB, LH, GEK, CM), pp. 1834–1839.
SAC-2015-BarnPB #evaluation #privacy #requirements- An approach to early evaluation of informational privacy requirements (BSB, GP, RB), pp. 1370–1375.
SAC-2015-BekkoucheCR #constraints #fault #locality #named- LocFaults: a new flow-driven and constraint-based error localization approach (MB, HC, MR), pp. 1773–1780.
SAC-2015-BorgesDSEAS #performance #reasoning #reuse #using- Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
SAC-2015-BurityE #recommendation- A quantitative, evidence-based approach for recommending software modules (TB, GEdS), pp. 1449–1456.
SAC-2015-DAddioM #collaboration #sentiment- A sentiment-based item description approach for kNN collaborative filtering (RMD, MGM), pp. 1060–1065.
SAC-2015-FauconnierKR #machine learning #recognition #taxonomy- A supervised machine learning approach for taxonomic relation recognition through non-linear enumerative structures (JPF, MK, BR), pp. 423–425.
SAC-2015-GassaraRJ #architecture #deployment #modelling #multi- A multi-scale modeling approach for software architecture deployment (AG, IBR, MJ), pp. 1405–1410.
SAC-2015-JoCKBO #algorithm #collaboration #cpu #data-driven #on the- On running data-intensive algorithms with intelligent SSD and host CPU: a collaborative approach (YYJ, SC, SWK, DHB, HO), pp. 2060–2065.
SAC-2015-JuniorRSM #deployment #multi #non-functional #requirements- A multi-criteria approach for assessing cloud deployment options based on non-functional requirements (RGJ, TR, AS, NCM), pp. 1383–1389.
SAC-2015-JuniorSM #semantics- An approach for building lexical-semantic resources based on heterogeneous information sources (JGdAJ, US, LBM), pp. 402–408.
SAC-2015-Khenfri #architecture #optimisation #synthesis- A holistic optimization approach for the synthesis of AUTOSAR E/E architecture (FK), pp. 1960–1961.
SAC-2015-KhlifKKD #architecture #modelling #multi #towards- Towards a multi-scale modeling approach for software architectures (IK, MHK, AHK, KD), pp. 1468–1470.
SAC-2015-LabibPCG #development #learning #product line #reuse- Enforcing reuse and customization in the development of learning objects: a product line approach (AEL, MCP, JHC, AG), pp. 261–263.
SAC-2015-MeftehBB #case study #diagrams #evaluation #feature model #implementation #modelling #uml- Implementation and evaluation of an approach for extracting feature models from documented UML use case diagrams (MM, NB, HBA), pp. 1602–1609.
SAC-2015-MongioviGFPT #analysis #data flow #detection #hybrid #java- Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SAC-2015-NascimentoBJ #geometry #recognition- A new approach to biometric recognition based on hand geometry (MVPdN, LVB, NLCJ), pp. 59–65.
SAC-2015-PedrosaT #encoding #visual notation #word- Compact and discriminative approach for encoding spatial-relationship of visual words (GVP, AJMT), pp. 92–95.
SAC-2015-PerkusichMSGAP #metric #network- A Bayesian network approach to assist on the interpretation of software metrics (MP, AM, LCeS, KCG, HOdA, AP), pp. 1498–1503.
SAC-2015-ReddySC #aspect-oriented #incremental #learning #performance #weaving- Incremental aspect weaving: an approach for faster AOP learning (YRR, AS, MC), pp. 1480–1485.
SAC-2015-RegoMP #detection #folksonomy #learning- A supervised learning approach to detect subsumption relations between tags in folksonomies (ASdCR, LBM, CESP), pp. 409–415.
SAC-2015-RodriguesAFSB #ontology #simulation- An ontological approach for simulating legal action in the Brazilian penal code (CMdOR, RRdA, FLGdF, EPdS, PVdSB), pp. 376–381.
SAC-2015-RodriguesBM #behaviour #clustering #correlation #energy #using- Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SAC-2015-SantiagoPH #detection #modelling- A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
SAC-2015-ShahriarH #assessment #metric #risk management #security #web- Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
SAC-2015-SilvaMR #algorithm #problem #using- An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
SAC-2015-Soares0W #modelling #named #recognition #requirements #speech- VoiceToModel: an approach to generate requirements models from speech recognition mechanisms (FS, JA, FW), pp. 1350–1357.
SAC-2015-VielMT #multi- An approach for controlling synchronous remote instances of a multimedia presentation (CCV, ELM, CACT), pp. 1285–1290.
GPCE-2015-KabacC #development- Orchestrating masses of sensors: a design-driven development Approach (MK, CC), pp. 117–120.
ASPLOS-2015-MishraZLH #constraints #energy #modelling #performance #probability #visual notation- A Probabilistic Graphical Model-based Approach for Minimizing Energy Under Performance Constraints (NM, HZ, JDL, HH), pp. 267–281.
CASE-2015-AlfonsoXA #capacity #programming #representation #scheduling- A simulation-optimization approach for capacity planning and appointment scheduling of blood donors based on mathematical programming representation of event dynamics (EA, XX, VA), pp. 728–733.
CASE-2015-CarmenateRLBM #analysis #behaviour #energy #modelling #using- Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASE-2015-ChuFRSKT #automation #hardware #integration- A LC-MS integration approach in life science automation: Hardware integration and software integration (XC, HF, TR, NS, MK, KT), pp. 979–984.
CASE-2015-DiganiHSS #coordination #multi #polynomial #programming- A Quadratic Programming approach for coordinating multi-AGV systems (VD, MAH, LS, CS), pp. 600–605.
CASE-2015-FerrerALVLH #assembly #automation #process- An approach for knowledge-driven product, process and resource mappings for assembly automation (BRF, BA, AL, DAV, JLML, RH), pp. 1104–1109.
CASE-2015-KouiderHOO #graph #integer #linear #scheduling #source code- Mixed integer linear programs and tabu search approach to solve mixed graph coloring for unit-time job shop scheduling (AK, HAH, SO, AO), pp. 1177–1181.
CASE-2015-LiDLZ #composition #problem- A decomposition approach to colored traveling salesman problems (JL, XD, HL, MZ), pp. 51–56.
CASE-2015-LuSJSX #multi #nondeterminism #programming- A chance constrained programming approach for multi-product multi-stage integrated production planning under internal and external uncertainties (SL, HS, CJ, HS, LX), pp. 880–885.
CASE-2015-MaP #black box #programmable #testing- Design-to-test approach for black-box testing of programmable controllers (CM, JP), pp. 1018–1024.
CASE-2015-SathishRB #detection #industrial #simulation- A simulation based approach to detect wear in industrial robots (VS, SR, SB), pp. 1570–1575.
CASE-2015-SemeniutaF #data flow #formal method #industrial #specification- Discrete event dataflow as a formal approach to specification of industrial vision systems (OS, PF), pp. 849–854.
CASE-2015-SenfeldsVMB #industrial- Power smoothing approach within industrial DC microgrid with supercapacitor storage for robotic manufacturing application (AS, MV, DM, OB), pp. 1333–1338.
CASE-2015-SustoM #machine learning #multi #predict- Slow release drug dissolution profile prediction in pharmaceutical manufacturing: A multivariate and machine learning approach (GAS, SFM), pp. 1218–1223.
CASE-2015-XieZLSD #agile #analysis #multi #process- Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
CGO-2015-ZhengLHWJ #debugging #manycore #on the #performance- On performance debugging of unnecessary lock contentions on multicore processors: a replay-based approach (LZ, XL, BH, SW, HJ), pp. 56–67.
DAC-2015-ChaariENTK #modelling #safety- A model-based and simulation-assisted FMEDA approach for safety-relevant E/E systems (MC, WE, CN, BAT, TK), p. 6.
DAC-2015-HanF #analysis #cpu #gpu #graph #scalability- Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
DAC-2015-KadjoAKG #cpu #energy #gpu #mobile #performance #platform- A control-theoretic approach for energy efficient CPU-GPU subsystem in mobile platforms (DK, RA, MK, PVG), p. 6.
DAC-2015-SripadaP #graph- A timing graph based approach to mode merging (SS, MP), p. 6.
DAC-2015-ZhanOGZ0 #named #network #power management #towards- DimNoC: a dim silicon approach towards power-efficient on-chip network (JZ, JO, FG, JZ, YX), p. 6.
DATE-2015-0001CY #optimisation #process #robust- A robust approach for process variation aware mask optimization (JK, WKC, EFYY), pp. 1591–1594.
DATE-2015-BiewerAGSH #coordination #realtime #synthesis- A symbolic system synthesis approach for hard real-time systems based on coordinated SMT-solving (AB, BA, JG, TS, CH), pp. 357–362.
DATE-2015-Bogdan #challenge #cyber-physical #manycore #personalisation #platform- A cyber-physical systems approach to personalized medicine: challenges and opportunities for noc-based multicore platforms (PB), pp. 253–258.
DATE-2015-HoqueMS #analysis #maintenance #model checking #probability #reliability #towards- Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
DATE-2015-LiuLY #effectiveness- An effective triple patterning aware grid-based detailed routing approach (ZL, CL, EFYY), pp. 1641–1646.
DATE-2015-ReehmanCCS #architecture #hardware #memory management #parallel- In-place memory mapping approach for optimized parallel hardware interleaver architectures (SUR, CC, PC, AS), pp. 896–899.
DATE-2015-RuizMK #reuse- Systematic application of ISO 26262 on a SEooC: Support by applying a systematic reuse approach (AR, AM, TK), pp. 393–396.
DATE-2015-TrinadhBSPK #named #programming #testing- DP-fill: a dynamic programming approach to X-filling for minimizing peak test power in scan tests (ST, CSB, SGS, SP, VK), pp. 836–841.
HPCA-2015-MeswaniBRSIL #architecture #memory management- Heterogeneous memory architectures: A HW/SW approach for mixing die-stacked and off-package memories (MRM, SB, DR, JS, MI, GHL), pp. 126–136.
HPCA-2015-WangM #architecture #manycore #named #resource management #scalability- XChange: A market-based approach to scalable dynamic multi-resource allocation in multicore architectures (XW, JFM), pp. 113–125.
HPDC-2015-KaxirasKNRS #distributed #execution #memory management #scalability- Turning Centralized Coherence and Distributed Critical-Section Execution on their Head: A New Approach for Scalable Distributed Shared Memory (SK, DK, MN, AR, KFS), pp. 3–14.
PDP-2015-VallsSRG #energy- The Tag Filter Cache: An Energy-Efficient Approach (JJV, JS, AR, MEG), pp. 182–189.
PPoPP-2015-HarshvardhanAR #algorithm #communication #graph #parallel- A hierarchical approach to reducing communication in parallel graph algorithms (H, NMA, LR), pp. 285–286.
ESOP-2015-TerauchiU #refinement- Relaxed Stratification: A New Approach to Practical Complete Predicate Refinement (TT, HU), pp. 610–633.
FASE-2015-StruberRCT #model transformation #performance #reuse #variability- A Variability-Based Approach to Reusable and Efficient Model Transformations (DS, JR, MC, GT), pp. 283–298.
CAV-2015-DietschHLP #ltl #model checking #modulo theories- Fairness Modulo Theory: A New Approach to LTL Software Model Checking (DD, MH, VL, AP), pp. 49–66.
CAV-2015-ReinkingP #program repair- A Type-Directed Approach to Program Repair (AR, RP), pp. 511–517.
CSL-2015-Kaiser0LL #bound- A Unified Approach to Boundedness Properties in MSO (LK, ML, SL, CL), pp. 441–456.
ICLP-2015-AlrajehG #comprehension- A Logic-Based Approach to Understanding Lone-Actor Terrorism (DA, PG), pp. 166–178.
ICLP-2015-AngelopoulosG #biology #database #logic- A Logical Approach to Working with Biological Databases (NA, GG), pp. 235–246.
ICLP-J-2015-BlackmoreRE #compilation #effectiveness #embedded #logic programming #predict- A logic programming approach to predict effective compiler settings for embedded software (CB, OR, KE), pp. 481–494.
ICST-2015-CastillosWW - Show Me New Counterexamples: A Path-Based Approach (KCC, HW, VW), pp. 1–10.
ICST-2015-ErmanTBRA #automation #clustering #development #information management #multi #navigation #testing- Navigating Information Overload Caused by Automated Testing — a Clustering Approach in Multi-Branch Development (NE, VT, MB, PR, AA), pp. 1–9.
ICST-2015-XuLCK #bound #detection #lightweight #thread- A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops (JX, YL, RHC, DCK), pp. 1–10.
ICTSS-2015-AbreuAHW #spreadsheet #testing- Testing for Distinguishing Repair Candidates in Spreadsheets - the Mussco Approach (RA, SA, BH, FW), pp. 124–140.
ICTSS-2015-LahamiKBJ #adaptation #behaviour #generative #testing- Selective Test Generation Approach for Testing Dynamic Behavioral Adaptations (ML, MK, HB, MJ), pp. 224–239.
ISSTA-2015-WangGMC #android #clone detection #detection #named #scalability- WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
LICS-2015-LicataB - A Cubical Approach to Synthetic Homotopy Theory (DRL, GB), pp. 92–103.
LICS-2015-MoninN - A Unifying Approach to the Gamma Question (BM, AN), pp. 585–596.
SAT-2015-Zielke0 - A New Approach to Partial MUS Enumeration (CZ, MK), pp. 387–404.
CBSE-2014-DidierM #component #detection- A new approach to detect potential race conditions in component-based systems (JYD, MM), pp. 97–106.
QoSA-2014-RaatikainenSM #architecture #case study #evaluation #experience #lightweight #maturity- Architecture management and evaluation in mature products: experiences from a lightweight approach (MR, JS, TM), pp. 73–82.
WICSA-2014-DragomirLB #architecture- Systematic Architectural Decision Management, A Process-Based Approach (AD, HL, TB), pp. 255–258.
WICSA-2014-ZernadjiTC #evolution #quality #requirements #web #web service- Processing the Evolution of Quality Requirements of Web Service Orchestrations: A Pattern-Based Approach (TZ, CT, CF), pp. 139–142.
DocEng-2014-NourashrafeddinMA #clustering #concept #documentation #using #wiki- An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
DRR-2014-HajiABSP #documentation #keyword- Two-stage approach to keyword spotting in handwritten documents (MMH, MRA, TDB, CYS, DP), p. ?–12.
HT-2014-KotoulasLSSTA #coordination #linked data #open data- A linked data approach to care coordination (SK, VL, MLS, MS, PT, PMA), pp. 77–87.
HT-2014-KumarHL #behaviour #identification #twitter- A behavior analytics approach to identifying tweets from crisis regions (SK, XH, HL), pp. 255–260.
JCDL-2014-BatjargalKKM14a #documentation- An approach to named entity extraction from historical documents in traditional mongolian script (BB, GK, FK, AM), pp. 489–490.
JCDL-2014-ChakrabortyKGGM #learning #predict #towards- Towards a stratified learning approach to predict future citation counts (TC, SK, PG, NG, AM), pp. 351–360.
JCDL-2014-DibieMS #behaviour #comprehension #education #online #predict #using- A computational approach to understanding and predicting the behavior of educators using an online curriculum planning tool (OD, KEM, TS), pp. 487–488.
JCDL-2014-LiuYGSG #mining #network #recommendation- Full-text based context-rich heterogeneous network mining approach for citation recommendation (XL, YY, CG, YS, LG), pp. 361–370.
SIGMOD-2014-LongWZX - Hypersphere dominance: an optimal approach (CL, RCWW, BZ, MX), pp. 111–122.
SIGMOD-2014-RoyS #database #formal method #query- A formal approach to finding explanations for database queries (SR, DS), pp. 1579–1590.
SIGMOD-2014-TranNST #clustering #named- JECB: a join-extension, code-based approach to OLTP data partitioning (KQT, JFN, BS, DT), pp. 39–50.
SIGMOD-2014-XiongHN #distributed #network #performance #query- A software-defined networking based approach for performance management of analytical queries on distributed data stores (PX, HH, JFN), pp. 955–966.
SIGMOD-2014-ZhuLWX #graph #order #query #reachability #scalability- Reachability queries on large dynamic graphs: a total order approach (ADZ, WL, SW, XX), pp. 1323–1334.
SIGMOD-2014-ZouHWYHZ #data-driven #graph #natural language #rdf- Natural language question answering over RDF: a graph data driven approach (LZ, RH, HW, JXY, WH, DZ), pp. 313–324.
VLDB-2014-AltowimKM #relational- Progressive Approach to Relational Entity Resolution (YA, DVK, SM), pp. 999–1010.
VLDB-2014-ArenasDFKS #graph- A Principled Approach to Bridging the Gap between Graph Data and their Schemas (MA, GID, AF, AK, KS), pp. 601–612.
VLDB-2014-DuttNH #named #query #robust- QUEST: An Exploratory Approach to Robust Query Processing (AD, SN, JRH), pp. 1585–1588.
VLDB-2014-WeiYLJ #independence #permutation #query #reachability- Reachability Querying: An Independent Permutation Labeling Approach (HW, JXY, CL, RJ), pp. 1191–1202.
VLDB-2015-LiLGSZDFH14 - A Confidence-Aware Approach for Truth Discovery on Long-Tail Data (QL, YL, JG, LS, BZ, MD, WF, JH), pp. 425–436.
EDM-2014-AtapattuFF - Acquisition of Triples of Knowledge from Lecture Notes: A Natural Langauge Processing Approach (TA, KF, NJGF), pp. 193–196.
EDM-2014-EagleB #data-driven #difference #problem- Exploring Differences in Problem Solving with Data-Driven Approach Maps (ME, TB), pp. 76–83.
EDM-2014-LeeLP #behaviour #data-driven #education #game studies #learning- Learning Individual Behavior in an Educational Game: A Data-Driven Approach (SJL, YEL, ZP), pp. 114–121.
EDM-2014-SegalKGSS #collaboration #named #personalisation- EduRank: A Collaborative Filtering Approach to Personalization in E-learning (AS, ZK, KG, GS, BS), pp. 68–75.
ITiCSE-2014-Dorge - A methodological approach to key competencies in informatics (CD), pp. 201–206.
SIGITE-2014-Trabelsi #comprehension #education #network #security #using- Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach (ZT), pp. 39–44.
CSMR-WCRE-2014-AlawnehHML #communication #effectiveness- A contextual approach for effective recovery of inter-process communication patterns from HPC traces (LA, AHL, SSM, YL), pp. 274–282.
CSMR-WCRE-2014-VidacsBTSG #detection #fault #locality #reduction #testing- Test suite reduction for fault detection and localization: A combined approach (LV, ÁB, DT, IS, TG), pp. 204–213.
ICPC-2014-PerezA #comprehension- A diagnosis-based approach to software comprehension (AP, RA), pp. 37–47.
ICPC-2014-SuzukiSIH #modelling #n-gram #using- An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICSME-2014-AlomariCM #estimation #maintenance- A Slice-Based Estimation Approach for Maintenance Effort (HWA, MLC, JIM), pp. 81–90.
ICSME-2014-BauerVJ #detection #novel- A Novel Approach to Detect Unintentional Re-implementations (VB, TV, EJ), pp. 491–495.
ICSME-2014-BhattacharyaNF #developer #graph- Determining Developers’ Expertise and Role: A Graph Hierarchy-Based Approach (PB, IN, MF), pp. 11–20.
ICSME-2014-KevicFS #named #navigation- CoMoGen: An Approach to Locate Relevant Task Context by Combining Search and Navigation (KK, TF, DCS), pp. 61–70.
ICSME-2014-KhanIA #behaviour #heuristic #state machine #uml- A Heuristic-Based Approach to Refactor Crosscutting Behaviors in UML State Machines (MUK, MZI, SA), pp. 557–560.
ICALP-v1-2014-GolovnevKM #problem #product line- Families with Infants: A General Approach to Solve Hard Partition Problems (AG, ASK, IM), pp. 551–562.
HOFM-2014-LadenbergerDL #csp #modelling #visualisation- An Approach for Creating Domain Specific Visualisations of CSP Models (LL, ID, ML), pp. 20–35.
ILC-2014-Nunes-Harwitt14a #code generation #evaluation #semantics- Eager Evaluation Isn’t Eager Enough A Transformation Based Approach to Semantics-Directed Code Generation (ANH), p. 79.
AIIDE-2014-RoweML #composition #experience #interactive #learning #optimisation- Optimizing Player Experience in Interactive Narrative Planning: A Modular Reinforcement Learning Approach (JPR, BWM, JCL).
AIIDE-2014-ShakerA #combinator #game studies #generative- Alone We Can Do So Little, Together We Can Do So Much: A Combinatorial Approach for Generating Game Content (NS, MAZ).
AIIDE-2014-SnodgrassO #generative #markov #using- A Hierarchical Approach to Generating Maps Using Markov Chains (SS, SO).
CIG-2014-FerreiraT #generative #search-based- A search-based approach for generating Angry Birds levels (LF, CFMT), pp. 1–8.
CIG-2014-LimH #automation #evaluation #game studies #generative #using- An approach to general videogame evaluation and automatic generation using a description language (CUL, DFH), pp. 1–8.
CIG-2014-MahmoudLWA #game studies #visual notation- Believable NPCs in serious games: HTN planning approach based on visual perception (IMM, LL, DW, MZA), pp. 1–8.
CIG-2014-TremblayTV #algorithm #game studies- An algorithmic approach to analyzing combat and stealth games (JT, PAT, CV), pp. 1–8.
DiGRA-2014-HoogenBI #behaviour #game studies- Pressure at Play: Measuring Player Approach and Avoidance Behaviour through the Keyboard (WvdH, EB, WAI).
FDG-2014-ChauvinLDN #game studies- An out-of-character approach to emergent game narratives (SC, GL, JYD, SN).
FDG-2014-WinnOKM #education- Sparks of Eternity: A new approach to religious education (BMW, CO, GK, RM).
CHI-2014-DunwellFPHALS #game studies #learning #safety- A game-based learning approach to road safety: the code of everand (ID, SdF, PP, MH, SA, PL, CDS), pp. 3389–3398.
CHI-2014-HashishBY #collaboration- Involving children in content control: a collaborative and education-oriented content filtering approach (YH, AB, JEY), pp. 1797–1806.
CHI-2014-LaureyssensCCMCM #component #composition #game studies #named #network- ZWERM: a modular component network approach for an urban participation game (TL, TC, LC, PM, JC, AVM), pp. 3259–3268.
CHI-2014-LeeLKKHC - An EEG-based approach for evaluating audio notifications under ambient sounds (YCL, WCL, JTK, LWK, YTH, FYC), pp. 3817–3826.
CHI-2014-SunH #relational- Binding the material and the discursive with a relational approach of affordances (HS, WHD), pp. 3533–3542.
CSCW-2014-XiaLSLDG #mobile #replication- A partial replication approach for anywhere anytime mobile commenting (HX, TL, BS, GL, XD, NG), pp. 530–541.
DHM-2014-GaoH #fault #nondeterminism #research- Research on the Continuous Descent Approach (CDA) Operational Error of Pilot Base on Cloud Model and Uncertainty Theory (YG, YH), pp. 91–100.
DUXU-DI-2014-Bockermann #big data #data analysis #programming #visual notation- A Visual Programming Approach to Big Data Analytics (CB), pp. 393–404.
DUXU-DI-2014-CastroRG #design- Information Design — Qualitative Approach for Corporative App in iPad (JAGFdC, MVR, JYLG), pp. 203–212.
DUXU-DI-2014-WojdziakG #3d #design #interface #modelling- Beyond Perspective — A Model-Based Approach for Camera-Based 3D-Interface Design (JW, RG), pp. 488–498.
DUXU-DP-2014-GokturkS #development #interface- A Perception Oriented Approach for Usable and Secure Interface Development (MG, IS), pp. 23–31.
DUXU-TMT-2014-GoodeLSGB #research- A Mixed-Method Approach for In-Depth Contextual User Research (AWG, CL, AS, RG, VB), pp. 86–95.
HCI-AIMT-2014-LiapisKKX #experience #human-computer- Evaluating User’s Emotional Experience in HCI: The PhysiOBS Approach (AL, NK, CK, MNX), pp. 758–767.
HCI-AS-2014-SjolinderEBFHSNB #development #multi- A Multi-disciplinary Approach in the Development of a Stroke Rehabilitation Tool (MS, ME, ILB, MF, PH, DS, SN, JB), pp. 351–362.
HCI-TMT-2014-AssilaOE #evaluation #human-computer #integration #quality #towards- Towards Qualitative and Quantitative Data Integration Approach for Enhancing HCI Quality Evaluation (AA, KMdO, HE), pp. 469–480.
HCI-TMT-2014-Bakke #process #user interface- Immediacy in User Interfaces: An Activity Theoretical Approach (SB), pp. 14–22.
HCI-TMT-2014-FangZ #online- A Revised Lexical Approach for Analyzing Online Reviews (XF, FZ), pp. 69–76.
HIMI-DE-2014-Lucas #constraints #interactive #visualisation- An Interactive Approach to Constraint-Based Visualizations (WTL), pp. 54–63.
LCT-NLE-2014-ElciD #case study #education #experience #research #social #social media- A Narrative Research Approach: The Experiences of Social Media Support in Higher Education (AE, BÇD), pp. 36–42.
LCT-TRE-2014-AlmazovaK #student- Computer Assisted Individual Approach to Acquiring Foreign Vocabulary of Students Major (NA, MK), pp. 248–257.
LCT-TRE-2014-Hayes14a #development #game studies #learning #simulation- An Approach to Holistic Development of Serious Games and Learning Simulations (ATH), pp. 42–49.
SCSM-2014-FardounA #community #feedback #framework #platform- Feedback Platform for Community Colleges: An Approach to Knowledge Excellence (HMF, AAMAG), pp. 306–313.
SCSM-2014-LeeLS #network #social- A New Approach to Exploring Spatiotemporal Space in the Context of Social Network Services (JGL, KCL, DHS), pp. 221–228.
SCSM-2014-PlikynasM #social- Agent-Based Nonlocal Social Systems: Neurodynamic Oscillations Approach (DP, SM), pp. 253–264.
SCSM-2014-SolingerHHFL #facebook #multi #predict #social #social media- Beyond Facebook Personality Prediction: — A Multidisciplinary Approach to Predicting Social Media Users’ Personality (CS, LMH, SHH, RF, CL), pp. 486–493.
VISSOFT-2014-BarikLCM #compilation #developer #how #visualisation- How Developers Visualize Compiler Messages: A Foundational Approach to Notification Construction (TB, KL, SC, ERMH), pp. 87–96.
CAiSE-2014-GarciaDC #adaptation #model-to-text #sql- An Adapter-Based Approach to Co-evolve Generated SQL in Model-to-Text Transformations (JG, OD, JC), pp. 518–532.
CAiSE-2014-LiH #requirements #security- Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach (TL, JH), pp. 285–300.
CAiSE-2014-NobauerSG #analysis #automation #evaluation #product line #similarity- Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
EDOC-2014-FlorezSV #analysis #automation #enterprise #modelling- Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
ICEIS-v1-2014-AmaralCRGTS #data mining #framework #image #mining- The SITSMining Framework — A Data Mining Approach for Satellite Image Time Series (BFA, DYTC, LASR, RRdVG, AJMT, EPMdS), pp. 225–232.
ICEIS-v1-2014-BouzidCFP #enterprise #retrieval #semantics- A Pattern-based Approach for Semantic Retrieval of Information Resources in Enterprises — Application Within STMicroelectronics (SB, CC, CSF, JP), pp. 193–200.
ICEIS-v1-2014-CaetanoLC #case study #data-driven #predict- A Data-driven Approach to Predict Hospital Length of Stay — A Portuguese Case Study (NC, RMSL, PC), pp. 407–414.
ICEIS-v1-2014-KammererN #comparison #named #sql- Application-Mimes — An Approach for Quantitative Comparison of SQL — and NoSQL-databases (MK, JN), pp. 256–263.
ICEIS-v1-2014-Tribolet #adaptation #bottom-up #enterprise #top-down- An Engineering Approach to Natural Enterprise Dynamics — From Top-down Purposeful Systemic Steering to Bottom-up Adaptive Guidance Control (JT), p. XIII.
ICEIS-v2-2014-BeenK #analysis #internet #online #people- Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEIS-v2-2014-FerreiraS #enterprise #implementation #named #semantics #towards #web- e-swim: Enterprise Semantic Web Implementation Model — Towards a Systematic Approach to Implement the Semantic Web in Enterprises (RF, IS), pp. 653–658.
ICEIS-v2-2014-Kupper #research #social- Measuring the Success of Social CRM — First Approach and Future Research (TK), pp. 573–582.
ICEIS-v2-2014-MachadoLPWO - A Reactive and Proactive Approach for Ambient Intelligence (AM, DL, AMP, LKW, JPMdO), pp. 501–512.
ICEIS-v2-2014-MahmoudBAG #learning- A New Approach Based on Learning Services to Generate Appropriate Learning Paths (CBM, FB, MHA, FG), pp. 643–646.
ICEIS-v2-2014-MarcolinoOG #diagrams #effectiveness #sequence chart #towards #variability- Towards the Effectiveness of the SMarty Approach for Variability Management at Sequence Diagram Level (AM, EAOJ, IMdSG), pp. 249–256.
ICEIS-v2-2014-MerouaniMS #consistency #formal method #process #testing #towards- Formalizing Artifact-Centric Business Processes — Towards a Conformance Testing Approach (HM, FM, HSB), pp. 368–374.
ICEIS-v2-2014-MurianaMG #development #information management #open source- Development of Open Source Software, a Qualitative View in a Knowledge Management Approach (LMM, CM, ACBG), pp. 391–399.
ICEIS-v2-2014-SarmientoLRS #automation #concurrent #generative #requirements #testing- An Automated Approach of Test Case Generation for Concurrent Systems from Requirements Descriptions (ES, JCSdPL, NR, AvS), pp. 339–347.
ICEIS-v3-2014-BaldominosCC #information management #interactive- An Approach to Circumstantial Knowledge Management for Human-Like Interaction (AB, FJCG, DC), pp. 71–78.
ICEIS-v3-2014-BarrosFSA #towards- Deriving Service Level Agreements from Business Level Agreements — An Approach Towards Strategic Alignment in Organizations (VAB, MF, GMBS, JPdA), pp. 214–225.
ICEIS-v3-2014-PereiraV #enterprise #named- e-Strategy — An Enterprise Engineer Approach to Strategic Management (RP, AV), pp. 472–477.
ICEIS-v3-2014-RavasanRH #framework #fuzzy #process #using- A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
ICEIS-v3-2014-ZouhaierHA #adaptation #people #user interface- A MDA-based Approach for Enabling Accessibility Adaptation of User Interface for Disabled People (LZ, YBH, LJBA), pp. 120–127.
CIKM-2014-DuQF #fine-grained #owl- A Practical Fine-grained Approach to Resolving Incoherent OWL 2 DL Terminologies (JD, GQ, XF), pp. 919–928.
CIKM-2014-LiuXCXTY #bound #linear #network #scalability #social- Influence Maximization over Large-Scale Social Networks: A Bounded Linear Approach (QL, BX, EC, HX, FT, JXY), pp. 171–180.
CIKM-2014-MingYC #re-engineering #summary #topic- A Dynamic Reconstruction Approach to Topic Summarization of User-Generated-Content (ZM, JY, TSC), pp. 311–320.
CIKM-2014-TangWPTL #detection- An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
CIKM-2014-YeMAG #privacy #visual notation- Negative FaceBlurring: A Privacy-by-Design Approach to Visual Lifelogging with Google Glass (TY, BM, RA, CG), pp. 2036–2038.
CIKM-2014-ZhangKLCY #named #scalability- NCR: A Scalable Network-Based Approach to Co-Ranking in Question-and-Answer Sites (JZ, XK, RJL, YC, PSY), pp. 709–718.
CIKM-2014-ZhaoCN #data type #probability- Truth Discovery in Data Streams: A Single-Pass Probabilistic Approach (ZZ, JC, WN), pp. 1589–1598.
ECIR-2014-HuangDHL - A Two-level Approach for Subtitle Alignment (JH, HD, XH, YL), pp. 468–473.
ECIR-2014-MeguebliKDP #identification- Unsupervised Approach for Identifying Users’ Political Orientations (YM, MK, BLD, FP), pp. 507–512.
ECIR-2014-VechtomovaST #information retrieval #word- An Information Retrieval-Based Approach to Determining Contextual Opinion Polarity of Words (OV, KS, JT), pp. 553–559.
ECIR-2014-YounusOP #behaviour #microblog #modelling #personalisation- A Language Modeling Approach to Personalized Search Based on Users’ Microblog Behavior (AY, CO, GP), pp. 727–732.
ICML-c1-2014-BardenetDH #adaptation #markov #monte carlo #scalability #towards- Towards scaling up Markov chain Monte Carlo: an adaptive subsampling approach (RB, AD, CCH), pp. 405–413.
ICML-c1-2014-HutterHL #performance- An Efficient Approach for Assessing Hyperparameter Importance (FH, HH, KLB), pp. 754–762.
ICPR-2014-BagheriGE #classification #novel #subclass- Generic Subclass Ensemble: A Novel Approach to Ensemble Classification (MAB, QG, SE), pp. 1254–1259.
ICPR-2014-BayramogluKEANKH #detection #image #machine learning #using- Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPR-2014-BiswasBC #documentation #image- A Global-to-Local Approach to Binarization of Degraded Document Images (BB, UB, BBC), pp. 3008–3013.
ICPR-2014-CaoHS #classification #kernel #learning #multi- Optimization-Based Extreme Learning Machine with Multi-kernel Learning Approach for Classification (LlC, WbH, FS), pp. 3564–3569.
ICPR-2014-CechFM #3d #detection #refinement- A 3D Approach to Facial Landmarks: Detection, Refinement, and Tracking (JC, VF, JM), pp. 2173–2178.
ICPR-2014-ChakeriH #clustering #framework #game studies #set- Dominant Sets as a Framework for Cluster Ensembles: An Evolutionary Game Theory Approach (AC, LOH), pp. 3457–3462.
ICPR-2014-ChatbriKK #documentation #image #independence #query- An Application-Independent and Segmentation-Free Approach for Spotting Queries in Document Images (HC, PWK, KK), pp. 2891–2896.
ICPR-2014-ChenCF #classification #hybrid #semantics- A Hybrid Holistic/Semantic Approach for Scene Classification (ZC, ZC, HF), pp. 2299–2304.
ICPR-2014-ColonnaCN #distributed- A Distributed Approach for Classifying Anuran Species Based on Their Calls (JGC, MC, EFN), pp. 1242–1247.
ICPR-2014-Desrosiers #adaptation #image #performance #random #segmentation- A Fast and Adaptive Random Walks Approach for the Unsupervised Segmentation of Natural Images (CD), pp. 130–135.
ICPR-2014-DingM #detection #image- An Accurate Approach for Microaneurysm Detection in Digital Fundus Images (SD, WM), pp. 1846–1851.
ICPR-2014-DuanA #estimation #image- A J-Linkage Based Approach for Vanishing Direction Estimation in Catadioptric Images (WD, NMA), pp. 2113–2118.
ICPR-2014-DumonceauxRG #algebra #clustering- An Algebraic Approach to Ensemble Clustering (FD, GR, MG), pp. 1301–1306.
ICPR-2014-FrintropGC - A Cognitive Approach for Object Discovery (SF, GMG, ABC), pp. 2329–2334.
ICPR-2014-HalsteadDSF #database #people #semantics #video- Locating People in Video from Semantic Descriptions: A New Database and Approach (MH, SD, SS, CF), pp. 4501–4506.
ICPR-2014-JinIHS #using- A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
ICPR-2014-KapsourasN #recognition #using- Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
ICPR-2014-KeceliC #multimodal #using- A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
ICPR-2014-LablackDBD #detection- A Local Approach for Negative Emotion Detection (AL, TD, IMB, CD), pp. 417–420.
ICPR-2014-MaHXP #3d #robust #using- A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
ICPR-2014-MarcaciniDHR #clustering #documentation #learning #metric- Privileged Information for Hierarchical Document Clustering: A Metric Learning Approach (RMM, MAD, ERH, SOR), pp. 3636–3641.
ICPR-2014-MasselliZ #geometry #performance #problem- A New Geometric Approach for Faster Solving the Perspective-Three-Point Problem (AM, AZ), pp. 2119–2124.
ICPR-2014-MehnertMSMB - A Structural Texture Approach for Characterising Malignancy Associated Changes in Pap Smears Based on Mean-Shift and the Watershed Transform (AM, RM, KS, PM, EB), pp. 1189–1193.
ICPR-2014-MeloLMS #detection- An Optimized Sliding Window Approach to Pedestrian Detection (VHCdM, SL, DM, WRS), pp. 4346–4351.
ICPR-2014-NagyM #grid #search-based- Binary Tomography on the Triangular Grid with 3 Alternative Directions — A Genetic Approach (BN, EVM), pp. 1079–1084.
ICPR-2014-NourbakhshBP #graph #matrix- A Matrix Factorization Approach to Graph Compression (FN, SRB, MP), pp. 76–81.
ICPR-2014-RodriguesPPW #feature model- A Binary Krill Herd Approach for Feature Selection (DR, LAMP, JPP, SATW), pp. 1407–1412.
ICPR-2014-SharmaCL #3d #generative #hybrid #novel- Kinect-Variety Fusion: A Novel Hybrid Approach for Artifacts-Free 3DTV Content Generation (MS, SC, BL), pp. 2275–2280.
ICPR-2014-SilvaTT #graph #named- BoG: A New Approach for Graph Matching (FBS, ST, RdST), pp. 82–87.
ICPR-2014-WalhaDLGA #image #learning #taxonomy- Sparse Coding with a Coupled Dictionary Learning Approach for Textual Image Super-resolution (RW, FD, FL, CG, AMA), pp. 4459–4464.
ICPR-2014-WangEGLLF #distance #documentation #edit distance #graph #word- A Coarse-to-Fine Word Spotting Approach for Historical Handwritten Documents Based on Graph Embedding and Graph Edit Distance (PW, VE, CG, CL, JL, AF), pp. 3074–3079.
ICPR-2014-WangZH #data-driven #health #named- DensityTransfer: A Data Driven Approach for Imputing Electronic Health Records (FW, JZ, JH), pp. 2763–2768.
ICPR-2014-XianCZ #automation #image #segmentation- A Fully Automatic Breast Ultrasound Image Segmentation Approach Based on Neutro-Connectedness (MX, HDC, YZ), pp. 2495–2500.
ICPR-2014-YamadaM #behaviour #using- Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
ICPR-2014-ZhangHLHZL #feature model #hybrid- A Hybrid Feature Selection Approach by Correlation-Based Filters and SVM-RFE (JZ, XH, PPL, WH, YZ, HL), pp. 3684–3689.
KDD-2014-0001GHHLMSSZ #probability- Knowledge vault: a web-scale approach to probabilistic knowledge fusion (XD, EG, GH, WH, NL, KM, TS, SS, WZ), pp. 601–610.
KDD-2014-ChengB0 #dependence #effectiveness #named- FBLG: a simple and effective approach for temporal dependence discovery from time series data (DC, MTB, YL), pp. 382–391.
KDD-2014-KapoorSSY #predict- A hazard based approach to user return time prediction (KK, MS, JS, TY), pp. 1719–1728.
KDD-2014-QianHJPZ #distance #learning #metric #using- Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
KDD-2014-Schadt #data-driven- A data driven approach to diagnosing and treating disease (EES), p. 3.
KDD-2014-YinW #clustering #modelling #multi- A dirichlet multinomial mixture model-based approach for short text clustering (JY, JW), pp. 233–242.
KDIR-2014-BarbantanLP #health #identification #ontology- Disease Identification in Electronic Health Records — An Ontology based Approach (IB, CL, RP), pp. 261–268.
KDIR-2014-ChakrabortyGR #performance #retrieval #word- A Word Association Based Approach for Improving Retrieval Performance from Noisy OCRed Text (AC, KG, UR), pp. 450–456.
KDIR-2014-DeglInnocentiNT #knowledge base #multi- A New Multi-lingual Knowledge-base Approach to Keyphrase Extraction for the Italian Language (DD, DDN, CT), pp. 78–85.
KDIR-2014-MojahedI #distance #semistructured data- A Fusion Approach to Computing Distance for Heterogeneous Data (AM, BdlI), pp. 269–276.
KEOD-2014-Grabska #concept #ontology #process- An Ontology based Approach for Assisting Conceptualisation in CAD Processes (EG), pp. 272–279.
KEOD-2014-PaniCP #content management #multi- An Approach to Multimedia Content Management (FEP, GC, SP), pp. 264–271.
KMIS-2014-GuerrucciDAB #information management #network- Phased Approach to a Knowledge Management Network (DG, RMD, RCA, DB), pp. 101–108.
KMIS-2014-Schmitt #generative #information management #novel- Proposing a Next Generation of Knowledge Management Systems for Creative Collaborations in Support of Individuals and Institutions — Featuring a Novel Approach for Meme-based Personal Knowledge Management (US), pp. 346–353.
KMIS-2014-ToureAD #enterprise #named #performance- AM2O — An Efficient Approach for Managing Training in Enterprise (FT, EA, KD), pp. 405–412.
KR-2014-DiakidoyKM0 #automation #comprehension- A Psychology-Inspired Approach to Automated Narrative Text Comprehension (IAD, ACK, LM, RM).
KR-2014-PereiraDH #abduction #bias #reasoning- An Abductive Reasoning Approach to the Belief Bias Effect (LMP, EAD, SH).
MLDM-2014-AbdullahiCM #identification #novel #using- A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
MLDM-2014-JiangDPL #estimation #markov #optimisation #recognition- Modified Bootstrap Approach with State Number Optimization for Hidden Markov Model Estimation in Small-Size Printed Arabic Text Line Recognition (ZJ, XD, LP, CL), pp. 437–441.
MLDM-2014-WaiyamaiS #classification #dataset- A Cost-Sensitive Based Approach for Improving Associative Classification on Imbalanced Datasets (KW, PS), pp. 31–42.
RecSys-2014-LingLK #recommendation- Ratings meet reviews, a combined approach to recommend (GL, MRL, IK), pp. 105–112.
SEKE-2014-AssoudiL #multi #process- A Multi-Agent-Based Approach for Autonomic Data Exchange Processes (HA, HL), pp. 334–337.
SEKE-2014-DalliloAF #multi #process- Making the link between strategy and process model collections: a multi-layered approach (FD, JPdA, MF), pp. 387–392.
SEKE-2014-DegrossiAFM #risk management- Flood Citizen Observatory: a crowdsourcing-based approach for flood risk management in Brazil (LCD, JPdA, MCF, EMM), pp. 570–575.
SEKE-2014-GomedeB #multi- A Multicriteria Approach to Project Portfolio Selection (EG, RMB), pp. 43–48.
SEKE-2014-GuessiON #architecture- An Approach for Capturing and Documenting Architectural Decisions of Reference Architectures (MG, FO, EYN), pp. 162–167.
SEKE-2014-HartmannFNMKT #modelling #reasoning #runtime #using- Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
SEKE-2014-HauboldBH #flexibility #towards- Towards a flexible approach to manage varying and altering information representations (TH, GB, WH), pp. 566–569.
SEKE-2014-JingLC #collaboration #design- An Argument-based Collaborative Negotiation Approach to Support Software Design Collaboration (NJ, SCYL, HFC), pp. 274–279.
SEKE-2014-LingZF #modelling #process #similarity- An Improved Structure-based Approach to Measure Similarity of Business Process Models (JL, LZ, QF), pp. 377–380.
SEKE-2014-QueirozB #embedded #modelling #product line- A Critical Embedded System Product Line Model-based Approach (PGGQ, RTVB), pp. 71–75.
SEKE-2014-Saito0TO #constraints #generative #knowledge-based #testing #web- Test Data Generation for Web Applications: A Constraint and Knowledge-based Approach (HS, ST, HT, MO), pp. 110–114.
SEKE-2014-SatapathyPR #agile #estimation #kernel #using- Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SEKE-2014-ShahnewazR #named- RELREA — An Analytical Approach for Evaluating Release Readiness (SMS, GR), pp. 437–442.
SEKE-2014-WangC #analysis #social #visualisation- User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
SEKE-2014-XuL #architecture #automation #synthesis #using- Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
SIGIR-2014-BabbarPGA #classification #distributed #ranking #scalability- Re-ranking approach to classification in large-scale power-law distributed category systems (RB, IP, ÉG, MRA), pp. 1059–1062.
SIGIR-2014-ChengCBB #twitter- Who is the barbecue king of texas?: a geo-spatial approach to finding local experts on twitter (ZC, JC, HB, VB), pp. 335–344.
SIGIR-2014-HingmireC #classification #topic- Topic labeled text classification: a weakly supervised approach (SH, SC), pp. 385–394.
SIGIR-2014-KotsakosLKGKN #documentation- A burstiness-aware approach for document dating (DK, TL, DK, DG, NK, KN), pp. 1003–1006.
SIGIR-2014-QureshiOP #visualisation- A perspective-aware approach to search: visualizing perspectives in news search results (MAQ, CO, GP), pp. 1261–1262.
SIGIR-2014-RoitmanHS #clustering- A fusion approach to cluster labeling (HR, SH, MSS), pp. 883–886.
AMT-2014-GholizadehDM #model transformation #query- A Query Structured Approach for Model Transformation (HG, ZD, TSEM), pp. 54–63.
ECMFA-2014-LogreMCR #variability #visualisation- Sensor Data Visualisation: A Composition-Based Approach to Support Domain Variability (IL, SM, PC, MR), pp. 101–116.
ICMT-2014-JilaniIK #generative #model transformation #testing- A Search Based Test Data Generation Approach for Model Transformations (AAJ, MZI, MUK), pp. 17–24.
MoDELS-2014-EnriciAP #communication #modelling #uml- A UML Model-Driven Approach to Efficiently Allocate Complex Communication Schemes (AE, LA, RP), pp. 370–385.
MoDELS-2014-NataleCSS #adaptation #communication #component #generative- An MDA Approach for the Generation of Communication Adapters Integrating SW and FW Components from Simulink (MDN, FC, AS, ALSV), pp. 353–369.
MoDELS-2014-SoltanaFASB #case study #modelling #uml #using- Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
SPLC-2014-BarreirosM - A cover-based approach for configuration repair (JB, AMDM), pp. 157–166.
SPLC-2014-ColanziVGO #design #product line #search-based- A search-based approach for software product line design (TEC, SRV, IMSG, WNO), pp. 237–241.
SPLC-2014-DieumegardTP #data flow #library #product line #semantics #specification- A software product line approach for semantic specification of block libraries in dataflow languages (AD, AT, MP), pp. 217–226.
SPLC-2014-DillonRD #product line- A methodical approach to product line adoption (MD, JR, RD), pp. 340–349.
SPLC-2014-UrliBC #product line- Handling complex configurations in software product lines: a tooled approach (SU, MBF, PC), pp. 112–121.
AdaEurope-2014-IliasovLR #formal method- Practical Formal Methods in Railways — The SafeCap Approach (AI, IL, AR), pp. 177–192.
AdaEurope-2014-ZhouLL #embedded #requirements #safety #validation- A TASM-Based Requirements Validation Approach for Safety-Critical Embedded Systems (JZ, YL, KL), pp. 43–57.
PLDI-2014-StorkNSMFMA #named #programming language- Æminium: a permission based concurrent-by-default programming language approach (SS, KN, JS, MM, AF, PM, JA), p. 4.
POPL-2014-BeyeneCPR #constraints #game studies #graph #infinity- A constraint-based approach to solving games on infinite graphs (TAB, SC, CP, AR), pp. 221–234.
POPL-2014-RamsayNO #abstraction #higher-order #model checking #refinement- A type-directed abstraction refinement approach to higher-order model checking (SJR, RPN, CHLO), pp. 61–72.
RE-2014-AdedjoumaSB #automation #case study #detection- Automated detection and resolution of legal cross references: Approach and a study of Luxembourg’s legislation (MA, MS, LCB), pp. 63–72.
RE-2014-Daneva #game studies #how #multi #online #requirements- How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games (MD), pp. 3–12.
RE-2014-FilipovikjNR #formal method #requirements- Reassessing the pattern-based approach for formalizing requirements in the automotive domain (PF, MN, GRN), pp. 444–450.
RE-2014-PutnamC #game studies #multi #requirements- Therapist-centered requirements: A multi-method approach of requirement gathering to support rehabilitation gaming (CP, JC), pp. 13–22.
RE-2014-TranM #evolution #feature model #nondeterminism- An Approach for Decision Support on the Uncertainty in Feature Model Evolution (LMST, FM), pp. 93–102.
REFSQ-2014-MaidenLZBAL #case study #experience #specification- A Requirements-Led Approach for Specifying QoS-Aware Service Choreographies: An Experience Report (NAMM, JL, KZ, AB, GDA, FL), pp. 239–253.
REFSQ-2014-SannierB #analysis #modelling #named #requirements- INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
ASE-2014-NguyenNNN #api #learning #migration #mining #statistics- Statistical learning approach for mining API usage mappings for code migration (ATN, HAN, TTN, TNN), pp. 457–468.
FSE-2014-Wille #modelling- Managing lots of models: the FaMine approach (DW), pp. 817–819.
ICSE-2014-CaiWC #constraints #dynamic analysis #named #parallel #source code #thread- ConLock: a constraint-based approach to dynamic checking on deadlocks in multithreaded programs (YC, SW, WKC), pp. 491–502.
SAC-2014-BergamascoN #3d #feature model #retrieval #using- A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
SAC-2014-BrinkeMBBAK #composition #design #energy- A tool-supported approach for modular design of energy-aware software (StB, SM, CB, LB, MA, SK), pp. 1206–1212.
SAC-2014-ChenWWZL #3d #web- An approach to support stereoscopic 3D web (QC, WW, RW, JZ, ZL), pp. 981–984.
SAC-2014-EngielCL #concept #elicitation #using- Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SAC-2014-Fernandez-MarquezSSYDZ #mobile #self- Self-managing and self-organising mobile computing applications: a separation of concerns approach (JLFM, GDMS, GS, JY, SD, FZ), pp. 458–465.
SAC-2014-GamaD #deployment #fault #self #testing- A fault deployment and activation approach for testing self-recovery mechanisms (KG, DD), pp. 1114–1119.
SAC-2014-GriebeG #automation #mobile #modelling #testing- A model-based approach to test automation for context-aware mobile applications (TG, VG), pp. 420–427.
SAC-2014-HoritaHSNTO #modelling #refinement #using- Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
SAC-2014-HuergoPD #identification #modelling #using- A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SAC-2014-JeongLCHP #android #behaviour #kernel #monitoring- A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
SAC-2014-KimLSKL #named #ranking #web- C-Rank: a contribution-based web page ranking approach (DJK, SCL, HYS, SWK, JBL), pp. 908–912.
SAC-2014-LiuCM #ad hoc #composition #mobile #network- A low-latency service composition approach in mobile ad hoc networks (CL, JC, FLM), pp. 509–511.
SAC-2014-ManducaMFP #database #implementation #multitenancy #web- A nonintrusive approach for implementing single database, multitenant services from web applications (AMM, EVM, RPMF, MdGCP), pp. 751–756.
SAC-2014-Moin #collaboration #visualisation- A unified approach to collaborative data visualization (AM), pp. 280–286.
SAC-2014-OliveiraNWB #kernel #named- Ianus: secure and holistic coexistence with kernel extensions — a immune system-inspired approach (DO, JN, NW, MB), pp. 1672–1679.
SAC-2014-PapadakisT #analysis #effectiveness #fault #locality #mutation testing- Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
SAC-2014-ParraJGI #automation #product line- An SOA approach for automating software product line adoption (CP, DJ, LG, AI), pp. 1231–1238.
SAC-2014-RolimBCCAPM #multimodal #recommendation- A recommendation approach for digital TV systems based on multimodal features (RR, FB, AC, GC, HOdA, AP, AFM), pp. 289–291.
SAC-2014-SantosSTO #hybrid #navigation- A hybrid GA-ANN approach for autonomous robots topological navigation (VdCS, DOS, CFMT, FSO), pp. 148–153.
SAC-2014-Silva #automation #overview #quality #requirements #specification #validation- Quality of requirements specifications: a preliminary overview of an automatic validation approach (ARdS), pp. 1021–1022.
SAC-2014-VidalCNM #automation #generative- A semi-automatic approach for generating customized R2RML mappings (VMPV, MAC, LETN, JMM), pp. 316–322.
SAC-2014-ZiadiHPZT #independence #product line #towards- Towards a language-independent approach for reverse-engineering of software product lines (TZ, CH, MP, MZ, YLT), pp. 1064–1071.
GPCE-2014-SmeltzerEM #visualisation- A transformational approach to data visualization (KS, ME, RAM), pp. 53–62.
ASPLOS-2014-RuwaseKGM #hardware #named- Guardrail: a high fidelity approach to protecting hardware devices from buggy drivers (OR, MAK, PBG, TCM), pp. 655–670.
CASE-2014-ChenGGLCL #analysis #behaviour #scheduling- A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
CASE-2014-ChenS #markov #modelling #novel #using- Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
CASE-2014-FantiLIMUA - A Decision Support System approach for the postal delivery operations (MPF, RL, GI, AMM, WU, LA), pp. 588–593.
CASE-2014-GlorieuxDSL #optimisation #using- Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
CASE-2014-HuangNXCSD #3d #geometry #modelling #predict- Predictive modeling of geometric deviations of 3D printed products — A unified modeling approach for cylindrical and polygon shapes (QH, HN, KX, YC, SS, TD), pp. 25–30.
CASE-2014-HuangYL #identification- An intelligent approach to identify elderly body information (YPH, WJY, SYL), pp. 824–829.
CASE-2014-HuCLY #automation #comparative #petri net #using- A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
CASE-2014-LiXG #capacity- A queuing approach for radiotherapy treatment capacity planning (SL, XX, NG), pp. 540–545.
CASE-2014-LiZLM #capacity #scheduling- An intercell scheduling approach considering transportation capacity (ML, HZ, DL, XM), pp. 594–599.
CASE-2014-Murakami #generative #multi #problem- A column generation approach for the multi-vehicle covering tour problem (KM), pp. 1063–1068.
CASE-2014-NagataO #multi #using- Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
CASE-2014-RahmanCBM #assessment #safety- Ex-ante assessment of struck-by safety hazards in construction projects: A motion-planning approach (MMR, TC, LB, AM), pp. 277–282.
CASE-2014-TiengYHC #multi #optimisation #process- A multi-objective optimization approach for selecting key features of machining processes (HT, HCY, MHH, FTC), pp. 899–904.
CASE-2014-TrikiGX #health- A two-phase approach for periodic home health care planning (NT, TG, XX), pp. 518–523.
CASE-2014-WantiaLR #industrial- Symbolic planning for industrial applications — the eRobotics approach (NW, DL, JR), pp. 367–372.
CASE-2014-WuBZ #linear #scheduling- Linear programming-based approach to scheduling of crude oil operations in refinery with oil type mixing requirement (NW, LB, MZ), pp. 430–435.
CASE-2014-YuM #data-driven #detection #statistics- Data-driven bottleneck detection in manufacturing systems: A statistical approach (CY, AM), pp. 710–715.
CGO-2014-JimboreanKSBK #compilation #hardware #scalability- Fix the code. Don’t tweak the hardware: A new compiler approach to Voltage-Frequency scaling (AJ, KK, VS, DBS, SK), p. 262.
DAC-2014-AgostaBPS #embedded #encryption #execution #multi- A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software (GA, AB, GP, MS), p. 6.
DAC-2014-KiamehrOTN #analysis #fault- Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
DAC-2014-Rodriguez-NavasSHNLL #automation #functional #safety #specification #verification- Automated Specification and Verification of Functional Safety in Heavy-Vehicles: the VeriSpec Approach (GRN, CCS, HH, MN, OL, HL), p. 4.
DATE-2014-BahrebarS #network- Improving hamiltonian-based routing methods for on-chip networks: A turn model approach (PB, DS), pp. 1–4.
DATE-2014-BraojosDBAA #hardware #manycore #power management- Hardware/software approach for code synchronization in low-power multi-core sensor nodes (RB, AYD, IB, GA, DA), pp. 1–6.
DATE-2014-CannellaBS #realtime #scheduling #streaming #using- System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
DATE-2014-EckerVZG #metamodelling #synthesis- The metamodeling approach to system level synthesis (WE, MV, LZ, AG), pp. 1–2.
DATE-2014-FrancillonNRT - A minimalist approach to Remote Attestation (AF, QN, KBR, GT), pp. 1–6.
DATE-2014-KarakonstantisSSAB #analysis #energy #variability- A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
DATE-2014-KimHPSL #implementation #modelling #testing- A layered approach for testing timing in the model-based implementation (BK, HIH, TP, SHS, IL), pp. 1–4.
DATE-2014-RiefertCSBRB #automation #effectiveness #fault #functional #generative #testing- An effective approach to automatic functional processor test generation for small-delay faults (AR, LMC, MS, PB, MSR, BB), pp. 1–6.
HPCA-2014-HechtmanCHTBHRW #consistency #named- QuickRelease: A throughput-oriented approach to release consistency on GPUs (BAH, SC, DRH, YT, BMB, MDH, SKR, DAW), pp. 189–200.
HPCA-2014-PariharH #dependence #metaheuristic- Accelerating decoupled look-ahead via weak dependence removal: A metaheuristic approach (RP, MCH), pp. 662–677.
HPDC-2014-IslamLWP #named- SOR-HDFS: a SEDA-based approach to maximize overlapping in RDMA-enhanced HDFS (NSI, XL, MWuR, DKP), pp. 261–264.
PDP-2014-AmorettiGZST #formal method #in the cloud #mobile #towards- Towards a Formal Approach to Mobile Cloud Computing (MA, AG, FZ, VS, FT), pp. 743–750.
PDP-2014-AudemardHJP #distributed #effectiveness #problem #satisfiability- An Effective Distributed D&C Approach for the Satisfiability Problem (GA, BH, SJ, CP), pp. 183–187.
PDP-2014-Misale #concurrent #memory management- Accelerating Bowtie2 with a lock-less concurrency approach and memory affinity (CM), pp. 578–585.
PDP-2014-RossRPSH #hybrid #parallel- A Class-Structured Approach to Couple Application and Hybrid Core Parallelism (JAR, DAR, SJP, DRS, BJH), pp. 681–687.
PDP-2014-SanchezAGCMC #gpu #named- FRODRUG: A Virtual Screening GPU Accelerated Approach for Drug Discovery (SGS, ERA, JIG, PC, ASM, RC), pp. 594–600.
PDP-2014-SmithWWA #clustering #distributed- A Cluster-Based Approach to Consensus Based Distributed Task Allocation (DS, JW, SRW, AAA), pp. 428–431.
PDP-2014-TcarenkoFLPT #manycore #modelling- Multi Rectangle Modeling Approach for Application Mapping on a Many-Core System (IT, MF, PL, JP, HT), pp. 452–457.
FoSSaCS-2014-Cirstea #algebra #linear #logic- A Coalgebraic Approach to Linear-Time Logics (CC), pp. 426–440.
STOC-2014-DinurS #parallel- Analytical approach to parallel repetition (ID, DS), pp. 624–633.
STOC-2014-GavinskyMWW #bound #complexity #composition #towards- Toward better formula lower bounds: an information complexity approach to the KRW composition conjecture (DG, OM, OW, AW), pp. 213–222.
CAV-2014-AlglaveKNP #automation #static analysis- Don’t Sit on the Fence — A Static Analysis Approach to Automatic Fence Insertion (JA, DK, VN, DP), pp. 508–524.
CAV-2014-EsparzaK #automaton #composition #ltl- From LTL to Deterministic Automata: A Safraless Compositional Approach (JE, JK), pp. 192–208.
CAV-2014-EsparzaLMMN #analysis #smt- An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
ICLP-J-2014-AmadiniGM #constraints #lazy evaluation #named #theorem proving- SUNNY: a Lazy Portfolio Approach for Constraint Solving (RA, MG, JM), pp. 509–524.
ICST-2014-Marin #automation #database #multi #testing- A Data-Agnostic Approach to Automatic Testing of Multi-dimensional Databases (MM), pp. 133–142.
ICST-2014-PotetMPD #control flow #evaluation #injection #named #robust- Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
ICTSS-2014-SamihGBAB #modelling #testing- An Approach to Derive Usage Models Variants for Model-Based Testing (HS, HLG, RB, MA, BB), pp. 80–96.
ISSTA-2014-AppeltNBA #automation #injection #sql #testing- Automated testing for SQL injection vulnerabilities: an input mutation approach (DA, CDN, LCB, NA), pp. 259–269.
ISSTA-2014-GalindoAABB #sequence #testing #variability #video- A variability-based testing approach for synthesizing video sequences (JAG, MA, MA, BB, DB), pp. 293–303.
LICS-CSL-2014-BilokonE #probability #process- A domain-theoretic approach to Brownian motion and general continuous stochastic processes (PB, AE), p. 10.
LICS-CSL-2014-FredriksonJ #privacy #satisfiability- Satisfiability modulo counting: a new approach for analyzing privacy properties (MF, SJ), p. 10.
VMCAI-2014-AcunaAMS #complexity #heuristic #modelling #network- Modeling Parsimonious Putative Regulatory Networks: Complexity and Heuristic Approach (VA, AA, AM, AS), pp. 322–336.
ECSA-2013-DimechB #architecture #consistency #development #maintenance- Maintaining Architectural Conformance during Software Development: A Practical Approach (CD, DB), pp. 208–223.
QoSA-2013-KonersmannDGR #architecture #evolution #towards- Towards architecture-centric evolution of long-living systems (the ADVERT approach) (MK, ZD, MG, RHR), pp. 163–168.
QoSA-2013-Schmid #formal method #technical debt- A formal approach to technical debt decision making (KS), pp. 153–162.
DocEng-2013-AgostiCFHM - Interacting with digital cultural heritage collections via annotations: the CULTURA approach (MA, OC, NF, CH, GM), pp. 13–22.
DRR-2013-MedjkouneMPV #online #recognition #using- Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
DRR-2013-SabbourS - A segmentation-free approach to Arabic and Urdu OCR (NS, FS).
HT-2013-RoutBPC #classification #social- Where’s @wally?: a classification approach to geolocating users based on their social ties (DPR, KB, DPP, TC), pp. 11–20.
ICDAR-2013-BougueliaBB #classification #documentation #learning- A Stream-Based Semi-supervised Active Learning Approach for Document Classification (MRB, YB, AB), pp. 611–615.
ICDAR-2013-ChiC #recognition- Chinese Handwritten Legal Amount Recognition with HMM-Based Approach (BC, YC), pp. 778–782.
ICDAR-2013-DingsAE #segmentation- A Locale Group Based Line Segmentation Approach for Non Uniform Skewed and Curved Arabic Handwritings (LD, AAH, ME), pp. 803–806.
ICDAR-2013-DingsAE13a #modelling #synthesis- An Approach for Arabic Handwriting Synthesis Based on Active Shape Models (LD, AAH, ME), pp. 1260–1264.
ICDAR-2013-DoTT #recognition #representation- New Approach for Symbol Recognition Combining Shape Context of Interest Points with Sparse Representation (THD, ST, ORT), pp. 265–269.
ICDAR-2013-DuH #normalisation #online #recognition #variability- An Irrelevant Variability Normalization Based Discriminative Training Approach for Online Handwritten Chinese Character Recognition (JD, QH), pp. 69–73.
ICDAR-2013-ElzobiADES #adaptation #markov #modelling #recognition- A Hidden Markov Model-Based Approach with an Adaptive Threshold Model for Off-Line Arabic Handwriting Recognition (ME, AAH, LD, ME, AS), pp. 945–949.
ICDAR-2013-GarzFBI #clustering- A Binarization-Free Clustering Approach to Segment Curved Text Lines in Historical Manuscripts (AG, AF, HB, RI), pp. 1290–1294.
ICDAR-2013-HoRRES #classification #documentation- Document Classification in a Non-stationary Environment: A One-Class SVM Approach (AKNH, NR, JYR, VE, NS), pp. 616–620.
ICDAR-2013-LiuSZM #multi #novel- A Novel Multi-oriented Chinese Text Extraction Approach from Videos (YL, YS, YZ, QM), pp. 1355–1359.
ICDAR-2013-LuoOWK #automation #classification #using- Automatic Chinese Text Classification Using Character-Based and Word-Based Approach (XL, WO, TW, FK), pp. 329–333.
ICDAR-2013-MehriHGBM - A Pixel Labeling Approach for Historical Digitized Books (MM, PH, PGK, AB, RM), pp. 817–821.
ICDAR-2013-PrumVFO #modelling #online #recognition #using- A Discriminative Approach to On-Line Handwriting Recognition Using Bi-character Models (SP, MV, AF, JMO), pp. 364–368.
ICDAR-2013-StammLD #analysis #documentation #multi #partial order- Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
ICDAR-2013-SunH #component #image- An Improved Component Tree Based Approach to User-Intention Guided Text Extraction from Natural Scene Images (LS, QH), pp. 383–387.
ICDAR-2013-TangHF #analysis #recognition- A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
ICDAR-2013-TarafdarPRRR #documentation #visual notation #word- A Two-Stage Approach for Word Spotting in Graphical Documents (AT, UP, PPR, NR, JYR), pp. 319–323.
ICDAR-2013-ToselliV #documentation #performance #word- Fast HMM-Filler Approach for Key Word Spotting in Handwritten Documents (AHT, EV), pp. 501–505.
JCDL-2013-GodoiTCGFFF #ambiguity #feedback #problem- A relevance feedback approach for the author name disambiguation problem (TAG, RdST, AMBRC, MAG, AAF, WF, EAF), pp. 209–218.
JCDL-2013-LeeCFP #game studies #interactive #metadata #video- User-centered approach in creating a metadata schema for video games and interactive media (JHL, HC, VF, AP), pp. 229–238.
JCDL-2013-SmithST #gender- A search engine approach to estimating temporal changes in gender orientation of first names (BNS, MS, VIT), pp. 199–208.
SIGMOD-2013-LongWWF #distance #keyword #query- Collective spatial keyword queries: a distance owner-driven approach (CL, RCWW, KW, AWCF), pp. 689–700.
SIGMOD-2013-WhangYYSKK #named #parallel #using- ODYS: an approach to building a massively-parallel search engine using a DB-IR tightly-integrated parallel DBMS for higher-level functionality (KYW, TSY, YMY, IYS, HYK, IJK), pp. 313–324.
SIGMOD-2013-ZhuZQ #graph #mining #performance- A direct mining approach to efficient constrained graph pattern discovery (FZ, ZZ, QQ), pp. 821–832.
TPDL-2013-KlampflK #machine learning- An Unsupervised Machine Learning Approach to Body Text and Table of Contents Extraction from Digital Scientific Articles (SK, RK), pp. 144–155.
TPDL-2013-NadeemOAV #requirements- Users Requirements in Audiovisual Search: A Quantitative Approach (DN, RO, RA, EV), pp. 241–246.
VLDB-2013-AltwaijryKM - Query-Driven Approach to Entity Resolution (HA, DVK, SM), pp. 1846–1857.
VLDB-2013-BoghSJ #named #retrieval- GroupFinder: A New Approach to Top-K Point-of-Interest Group Retrieval (KSB, AS, CSJ), pp. 1226–1229.
VLDB-2013-DeBrabantPTSZ #architecture #database #named- Anti-Caching: A New Approach to Database Management System Architecture (JD, AP, ST, MS, SBZ), pp. 1942–1953.
VLDB-2013-DuanZCG #database #keyword #probability- Supporting Keyword Search in Product Database: A Probabilistic Approach (HD, CZ, JC, AG), pp. 1786–1797.
VLDB-2013-DuttaNB #approximate #data type #detection #streaming- Streaming Quotient Filter: A Near Optimal Approximate Duplicate Detection Approach for Data Streams (SD, AN, SKB), pp. 589–600.
VLDB-2013-Franceschini #big data #how #open source- How to maximize the value of big data with the open source SpagoBI suite through a comprehensive approach (MF), pp. 1170–1171.
VLDB-2013-GattaniLGTCDSRHD #classification #social #social media- Entity Extraction, Linking, Classification, and Tagging for Social Media: A Wikipedia-Based Approach (AG, DSL, NG, MT, XC, SD, SS, AR, VH, AD), pp. 1126–1137.
VLDB-2013-Lomet #database #hardware #sql- Microsoft SQL Server’s Integrated Database Approach for Modern Applications and Hardware (DBL), pp. 1178–1179.
VLDB-2014-GyssensPGWW13 #case study #query #symmetry #towards- An Approach towards the Study of Symmetric Queries (MG, JP, DVG, JW, YW), pp. 25–36.
VLDB-2014-ZhaoXLLZ13 #similarity- A Partition-Based Approach to Structure Similarity Search (XZ, CX, XL, QL, WZ), pp. 169–180.
CSEET-2013-EterovicGB #education #process- Teaching software processes to professionals: The approach taken by an evening master’s degree program (YE, GG, JB), pp. 309–313.
CSEET-2013-ShethBK #re-engineering- A competitive-collaborative approach for introducing software engineering in a CS2 class (SS, JB, GEK), pp. 41–50.
ITiCSE-2013-Baumgartner #case study #delivery #design #education #information management #using- Using case studies to design and deliver technology-centered computing education courses: an innovative approach from an undergraduate information systems program in singapore (IB), pp. 189–194.
ITiCSE-2013-Buck #reliability- First, do no harm: a curricular approach to reliability (DB), p. 319.
SIGITE-2013-Jonas #collaboration- Group note taking in mediawiki, a collaborative approach (MJ), pp. 131–132.
CSMR-2013-NerellaMW #optimisation #query #using- An Approach for Optimization of Object Queries on Collections Using Annotations (VKSN, SKM, TW), pp. 273–282.
ICSM-2013-AsaduzzamanRSP #hybrid #independence #named #source code- LHDiff: A Language-Independent Hybrid Approach for Tracking Source Code Lines (MA, CKR, KAS, MDP), pp. 230–239.
ICSM-2013-FontanaZMM #detection #machine learning #smell #towards- Code Smell Detection: Towards a Machine Learning-Based Approach (FAF, MZ, AM, MM), pp. 396–399.
ICSM-2013-LeL #automation #effectiveness #fault #locality #predict #tool support- Will Fault Localization Work for These Failures? An Automated Approach to Predict Effectiveness of Fault Localization Tools (TDBL, DL), pp. 310–319.
ICSM-2013-SorOTS #detection #machine learning #memory management #statistics #using- Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
MSR-2013-AlipourHS #debugging #detection #towards- A contextual approach towards more accurate duplicate bug report detection (AA, AH, ES), pp. 183–192.
MSR-2013-SahaSS #automation #stack overflow- A discriminative model approach for suggesting tags automatically for stack overflow questions (AKS, RKS, KAS), pp. 73–76.
WCRE-2013-AntonyAC #behaviour #clone detection #detection #modelling- An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
WCRE-2013-BernardiCL #design pattern #detection #graph #modelling- A model-driven graph-matching approach for design pattern detection (MLB, MC, GADL), pp. 172–181.
DLT-2013-BolligHLM #automaton #learning- A Fresh Approach to Learning Register Automata (BB, PH, ML, BM), pp. 118–130.
ICALP-v2-2013-DieudonneP #polynomial- Deterministic Polynomial Approach in the Plane (YD, AP), pp. 533–544.
LATA-2013-Blanchet-SadriBFH #graph #polynomial- A Graph Polynomial Approach to Primitivity (FBS, MB, NF, JH), pp. 153–164.
SEFM-2013-BorekMSR #model checking #modelling- Model Checking of Security-Critical Applications in a Model-Driven Approach (MB, NM, KS, WR), pp. 76–90.
SEFM-2013-MenadD #multi #requirements- A Transformation Approach for Multiform Time Requirements (NM, PD), pp. 16–30.
Haskell-2013-AnknerS #haskell #performance #programming- An EDSL approach to high performance Haskell programming (JA, JS), pp. 1–12.
ICFP-2013-AbelP #pattern matching #recursion #termination- Wellfounded recursion with copatterns: a unified approach to termination and productivity (AA, BP), pp. 185–196.
ICFP-2013-BroadbentCHS #higher-order #named #verification- C-SHORe: a collapsible approach to higher-order verification (CHB, AC, MH, OS), pp. 13–24.
IFL-2013-HackettHJ #optimisation #recursion #source code- The Under-Performing Unfold: A new approach to optimising corecursive programs (JH, GH, MJ), p. 1.
AIIDE-2013-ShakerST #evolution- Evolving Playable Content for Cut the Rope through a Simulation-Based Approach (NS, MS, JT).
CIG-2013-AdrianL #design #generative #using- An approach to level design using procedural content generation and difficulty curves (DFHA, ALSGC), pp. 1–8.
DiGRA-2013-Lenhart #design- Defragmentation and Mashup: Ludic Mashup as a Design Approach (IL).
DiGRA-2013-WilliamsK #behaviour #case study #collaboration #game studies #social- Elements of Social Action: A Micro- Analytic Approach to the Study of Collaborative Behavior in Digital Games (JPW, DK).
FDG-2013-Wallner #analysis #named #visualisation- Play-Graph: A methodology and visualization approach for the analysis of gameplay data (GW), pp. 253–260.
VS-Games-2013-DunwellLSFHA #game studies #named- Metycoon: A Game-Based Approach to Career Guidance (ID, PL, KS, SdF, MH, SA), pp. 1–6.
GT-VMT-2013-MaierM #diagrams #layout- A Pattern-based Approach for Initial Diagram Layout (SM, MM).
CHI-2013-AtkinsonOPBWBPC #design #research- Tactile perceptions of digital textiles: a design research approach (DA, PMO, BP, NBB, PW, SB, SP, MJC), pp. 1669–1678.
CHI-2013-BowserHRRGHRP #game studies #prototype #scalability- Prototyping in PLACE: a scalable approach to developing location-based apps and games (AB, DLH, JR, MR, RJG, YH, DR, JP), pp. 1519–1528.
CHI-2013-DalsgardE #case study #library #scalability- Large-scale participation: a case study of a participatory approach to developing a new public library (PD, EE), pp. 399–408.
CHI-2013-GaverBBBCHJP #human-computer #prototype- Indoor weather stations: investigating a ludic approach to environmental HCI through batch prototyping (WWG, JB, KB, AB, DWTC, MH, NJ, SP), pp. 3451–3460.
CHI-2013-KhovanskayaBCVG #design #quote #what- “Everybody knows what you’re doing”: a critical design approach to personal informatics (VDK, EPSB, DC, SV, GG), pp. 3403–3412.
CHI-2013-MonroeLOSPM #challenge #query #specification #visual notation- The challenges of specifying intervals and absences in temporal queries: a graphical language approach (MM, RL, JMdO, BS, CP, JM), pp. 2349–2358.
CHI-2013-YinOPZ #adaptation- Making touchscreen keyboards adaptive to keys, hand postures, and individuals: a hierarchical spatial backoff model approach (YY, TO, KP, SZ), pp. 2775–2784.
DHM-HB-2013-Yuan #evaluation #modelling #validation- Validation of an Integrated Biomechanical Modeling Approach to the Ergonomic Evaluation of Drywall Installation (LY), pp. 159–168.
DHM-SET-2013-GoreM #modelling #performance #validation- A Validation Approach for Complex NextGen Air Traffic Control Human Performance Models (BFG, PM), pp. 28–37.
DUXU-CXC-2013-OkimotoMB #assessment #multi #usability- Usability Assessment in the Multicultural Approach (MLLRO, COM, KJB), pp. 89–94.
DUXU-CXC-2013-Sun #experience #locality #social #social media #user interface- Tracing Technology Diffusion of Social Media with Culturally Localized User Experience Approach (HS), pp. 115–120.
DUXU-NTE-2013-SannaVBBR #behaviour #design- Engineering AwarenessTM: An e-Service Design Approach for Behavioral Change in Healthcare and Well-Being (AS, SV, SB, IB, AR), pp. 558–567.
DUXU-PMT-2013-BellowsHY #design #difference #research- An Individual Differences Approach to Design Fixation: Comparing Laboratory and Field Research (BGB, JFH, RJY), pp. 13–21.
DUXU-PMT-2013-GockelGPPE #evaluation #experience #named #user interface- VMUXE — An Approach to User Experience Evaluation for Virtual Museums (BG, HG, AP, SP, JE), pp. 262–272.
DUXU-PMT-2013-KarahasanovicF #2d #behaviour #experience #modelling #network- Modelling User Behaviour and Experience — The R2D2 Networks Approach (AK, AF), pp. 506–515.
DUXU-PMT-2013-KohnoYSN #analysis #design- Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
DUXU-PMT-2013-RaisonS #agile #design- Keeping User Centred Design (UCD) Alive and Well in Your Organisation: Taking an Agile Approach (CR, SS), pp. 573–582.
DUXU-PMT-2013-Silveira #behaviour #design #usability- Participatory Design and Usability: A Behavioral Approach of Workers’ Attitudes in the Work Environment (DMCdS), pp. 409–416.
DUXU-WM-2013-FordK #visual notation- Graphical Displays in Eco-Feedback: A Cognitive Approach (RF, BK), pp. 486–495.
DUXU-WM-2013-Igler #design #evaluation #mobile #prototype- Feature Evaluation for Mobile Applications: A Design Science Approach Based on Evolutionary Software Prototypes (BI), pp. 673–681.
DUXU-WM-2013-SauckenML #case study #design #experience #how #metaprogramming #user interface- How to Design Experiences: Macro UX versus Micro UX Approach (CvS, IM, UL), pp. 130–139.
DUXU-WM-2013-SchneidermeierMS #communication #concept- Human-Centered Communication Planning: A Conceptual Approach (TS, FM, JS), pp. 94–102.
DUXU-WM-2013-SchutzOV #automation #development #evaluation #usability- SysML-Based Approach for Automation Software Development — Explorative Usability Evaluation of the Provided Notation (DS, MO, BVH), pp. 568–574.
DUXU-WM-2013-Tussyadiah #case study #experience #mobile #platform- Meta-design Approach for Mobile Platforms Supporting Creative Tourism Experiences (IPT), pp. 733–739.
DUXU-WM-2013-WilliamsGMW #enterprise #performance- A User Centred Approach to Determining the Impact of Faster Broadband on Small and Medium Sized Enterprises (DW, AG, JM, JW), pp. 140–149.
DUXU-WM-2013-WilliamsGMW13a - A User Centred Approach to Evaluating the Future Demand for Bandwidth from Consumers (DW, AG, JM, JW), pp. 150–159.
HCI-AMTE-2013-HashizumeK #comprehension #design #development #experience #user interface- Understanding User Experience and Artifact Development through Qualitative Investigation: Ethnographic Approach for Human-Centered Design (AH, MK), pp. 68–76.
HCI-III-2013-SouiAG #adaptation #design #fuzzy #logic- Fuzzy Logic Approach for Adaptive Systems Design (MS, MA, KG), pp. 141–150.
HCI-IMT-2013-BarbeWM #design- Human Centered Design Approach to Integrate Touch Screen in Future Aircraft Cockpits (JB, MW, RM), pp. 429–438.
HCI-UC-2013-KleinS #development #industrial #process #social #social media- Social Media in the Product Development Process of the Automotive Industry: A New Approach (AK, GS), pp. 396–401.
HIMI-D-2013-EbbessonE #design #industrial- A User Driven Design Approach to Creating UGC Services — Challenging the Newspaper Industry (EE, CIE), pp. 187–196.
HIMI-D-2013-KlomannM #interactive #named #prototype- Freiform: A SmartPen Based Approach for Creating Interactive Paper Prototypes for Collecting Data (MK, JTM), pp. 316–321.
HIMI-D-2013-OhnoNK #design- Environment-Centered Approach to ICT Service Design (TO, MN, YK), pp. 347–356.
HIMI-HSM-2013-AhramKAF #energy- Power and Energy Management: A User-Centered System-of-Systems Engineering Approach (TZA, WK, BA, PF), pp. 3–12.
HIMI-HSM-2013-WadaNS - Approach to Haptic Guidance Control in Steering Operation Based on Cooperative States between Driver and Control System (TW, RN, SS), pp. 596–605.
HIMI-HSM-2013-Wesugi #design #experience #novel #simulation #using- Design Approach of Simulation Exercise with Use of Device and Its Significance — Design of Novel Device for Realistic Experience of Being a Hemiplegia Patient (SW), pp. 315–324.
HIMI-LCCB-2013-NarumiKHATH - Digital Railway Museum: An Approach to Introduction of Digital Exhibition Systems at the Railway Museum (TN, TK, TH, KA, TT, MH), pp. 238–247.
HIMI-LCCB-2013-YuL #feedback #mining- Exploring User Feedback of a E-Learning System: A Text Mining Approach (WBY, RL), pp. 182–191.
OCSC-2013-AlaouiL #communication #design- A LivingLab Approach to Involve Elderly in the Design of Smart TV Applications Offering Communication Services (MA, ML), pp. 325–334.
OCSC-2013-HallCW #community #predict- Well-Being’s Predictive Value — A Gamified Approach to Managing Smart Communities (MH, SC, CW), pp. 13–22.
OCSC-2013-JiangB #case study #multi #network #social- A Three-Level Approach to the Study of Multi-cultural Social Networking (YJ, OdB), pp. 365–374.
VISSOFT-2013-FittkauWWH #scalability #visualisation- Live trace visualization for comprehending large software landscapes: The ExplorViz approach (FF, JW, CW, WH), pp. 1–4.
CAiSE-2013-BakkerFV #detection #hybrid #web- A Hybrid Model Words-Driven Approach for Web Product Duplicate Detection (MdB, FF, DV), pp. 149–161.
CAiSE-2013-MaggiBA #knowledge-based- A Knowledge-Based Integrated Approach for Discovering and Repairing Declare Maps (FMM, RPJCB, WMPvdA), pp. 433–448.
EDOC-2013-GoknilKM #metamodelling #modelling #multi #reasoning #requirements- A metamodeling approach for reasoning on multiple requirements models (AG, IK, JVM), pp. 159–166.
EDOC-2013-SelwayGMS #formal method #natural language #specification #using- Formalising Natural Language Specifications Using a Cognitive Linguistics/Configuration Based Approach (MS, GG, WM, MS), pp. 59–68.
EDOC-2013-SousaMGM #architecture #data type #enterprise #risk management #using- Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
EDOC-2013-TranZ #analysis #architecture #verification- Event Actors Based Approach for Supporting Analysis and Verification of Event-Driven Architectures (HT, UZ), pp. 217–226.
ICEIS-J-2013-BouneffaA13a #graph grammar #impact analysis #ontology- The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach (MB, AA), pp. 280–295.
ICEIS-J-2013-GiordanoTSAF13a #architecture #case study #enterprise #ontology #semantics- Joining Data and Maps in the Government Enterprise Architecture by a Semantic Approach: Methodology, Ontology and Case Study (DG, AT, CS, SA, AF), pp. 506–519.
ICEIS-J-2013-PintoKG13a #analysis #architecture #automation #evaluation #metadata- An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
ICEIS-J-2013-VaniyaBN13a - Analysing the M&A Preparedness Building Approach (NV, PB, ON), pp. 459–473.
ICEIS-v1-2013-BevacquaCFGP #abstraction #adaptation #predict #process- A Data-adaptive Trace Abstraction Approach to the Prediction of Business Process Performances (AB, MC, FF, MG, LP), pp. 56–65.
ICEIS-v1-2013-LimaSKCF #enterprise #evolution- A Delta Oriented Approach to the Evolution and Reconciliation of Enterprise Software Products Lines (GL, JS, UK, DAdC, SVF), pp. 255–263.
ICEIS-v1-2013-OliveiraB #modelling #novel #process #standard- ETL Standard Processes Modelling — A Novel BPMN Approach (BCdSO, OB), pp. 120–127.
ICEIS-v1-2013-ZaamouneBPB #analysis #multi #relational- A New Relational Spatial OLAP Approach for Multi-resolution and Spatio-multidimensional Analysis of Incomplete Field Data (MZ, SB, FP, PB), pp. 145–152.
ICEIS-v2-2013-Abbo - The Analytical Approach to Information Value Management (DA), pp. 549–554.
ICEIS-v2-2013-BenhaddiBA #evaluation #formal method #implementation #user satisfaction- Formalization of the User Centric SOA Approach — Implementation and End User Satisfaction Evaluation (MB, KB, EHA), pp. 481–488.
ICEIS-v2-2013-ClayerTC #adaptation #design #education #towards- Towards a Pattern-based Adaptive Approach for Instructional Design based on Teacher’s Pedagogical Design Scheme (JPC, CT, CC), pp. 532–538.
ICEIS-v2-2013-FragalSGJ #embedded #product line #specification- Application Engineering for Embedded Systems — Transforming SysML Specification to Simulink within a Product-Line based Approach (VHF, RFS, IMdSG, EAdOJ), pp. 94–101.
ICEIS-v2-2013-KuCY #recommendation- Effect of Product Type and Recommendation Approach on Consumers’ Intention to Purchase Recommended Products (YCK, CHC, CSY), pp. 475–480.
ICEIS-v2-2013-RibeiroS #modelling #realtime #requirements- An Approach for Modeling Real-time Requirements with SysML and MARTE Stereotypes (FGCR, MSS), pp. 70–81.
ICEIS-v2-2013-SilvaFJGO #embedded #named #product line- SyMPLES — A SysML-based Approach for Developing Embedded Systems Software Product Lines (RFS, VHF, EAdOJ, IMdSG, FO), pp. 257–264.
ICEIS-v2-2013-TomasSGGA #api #architecture #framework #using- Synaptic City — An Architectural Approach using an OSGI Infrastructure and GMaps API to Build a City Simulator (GHRPT, WMdS, KG, VCG, AÁ), pp. 427–434.
ICEIS-v2-2013-WolfengagenRSBS #modelling #process #towards- Applicative Approach to Information Processes Modeling — Towards a Constructive Information Theory (VW, VR, LS, AB, AS), pp. 323–328.
ICEIS-v3-2013-AhmadO #architecture #enterprise #process #semantics- A New Approach to Semantically Derive Enterprise Information Architecture from Business Process Architecture (MA, MO), pp. 363–369.
ICEIS-v3-2013-GiordanoTSAF #architecture #case study #enterprise #ontology- An Ontology based Approach to Integrate Data and Maps — In the Government Enterprise Architecture: A Case Study (DG, AT, CS, SA, AF), pp. 356–362.
ICEIS-v3-2013-GromoffKPS #architecture #enterprise #flexibility- Newer Approach to Flexible Business Architecture of Modern Enterprise (AG, NK, MP, YS), pp. 326–332.
ICEIS-v3-2013-LangermeierBB #architecture #distributed #enterprise #framework #modelling #using- A Model Driven Approach for Open Distributed Systems using an Enterprise Architecture Framework (ML, AJB, BB), pp. 284–291.
ICEIS-v3-2013-LuxHH #enterprise #flexibility #representation #towards- Towards Enterprise Management Systems — A Generic and Flexible Information Representation Approach (AL, JH, RH), pp. 251–257.
ICEIS-v3-2013-PanTG #dependence #modelling #ontology #process- Artefact-oriented Business Process Modelling — An Ontological Dependency Approach (YCP, YT, SRG), pp. 223–230.
ICEIS-v3-2013-SbaiFK #adaptation #configuration management #modelling #process #towards- Towards a Process Patterns based Approach for Promoting Adaptability in Configurable Process Models (HS, MF, LK), pp. 382–387.
CIKM-2013-HashemiNB #learning #network #retrieval #topic- Expertise retrieval in bibliographic network: a topic dominance learning approach (SHH, MN, HB), pp. 1117–1126.
CIKM-2013-JabbourSSU - Mining-based compression approach of propositional formulae (SJ, LS, YS, TU), pp. 289–298.
CIKM-2013-KimNC #modelling #probability #social #social media- Modeling dynamics of meta-populations with a probabilistic approach: global diffusion in social media (MK, DN, PC), pp. 489–498.
CIKM-2013-RousseauV #ad hoc #information retrieval- Graph-of-word and TW-IDF: new approach to ad hoc IR (FR, MV), pp. 59–68.
CIKM-2013-TianCZ #database #hybrid #mobile #privacy #query- A hybrid approach for privacy-preserving processing of knn queries in mobile database systems (ST, YC, QZ), pp. 1161–1164.
CIKM-2013-WangLZ #graph #metric #multi #random #towards- Towards metric fusion on multi-view data: a cross-view based graph random walk approach (YW, XL, QZ), pp. 805–810.
ECIR-2013-IgnatovKC #detection- Near-Duplicate Detection for Online-Shops Owners: An FCA-Based Approach (DII, AVK, YC), pp. 722–725.
ECIR-2013-RahimiS #corpus #modelling- A Language Modeling Approach for Extracting Translation Knowledge from Comparable Corpora (RR, AS), pp. 606–617.
ICML-c1-2013-BootsG #learning- A Spectral Learning Approach to Range-Only SLAM (BB, GJG), pp. 19–26.
ICML-c1-2013-GiguereLMS #algorithm #bound #learning #predict- Risk Bounds and Learning Algorithms for the Regression Approach to Structured Output Prediction (SG, FL, MM, KS), pp. 107–114.
ICML-c1-2013-GonenSS #learning #performance- Efficient Active Learning of Halfspaces: an Aggressive Approach (AG, SS, SSS), pp. 480–488.
ICML-c1-2013-KadriGP #kernel #learning- A Generalized Kernel Approach to Structured Output Learning (HK, MG, PP), pp. 471–479.
ICML-c1-2013-NarasimhanA #optimisation- A Structural SVM Based Approach for Optimizing Partial AUC (HN, SA), pp. 516–524.
ICML-c2-2013-WangK13a #message passing #problem- Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passing (HW, DK), pp. 190–198.
ICML-c3-2013-DembczynskiJKWH #classification #multi #optimisation #plugin- Optimizing the F-Measure in Multi-Label Classification: Plug-in Rule Approach versus Structured Loss Minimization (KD, AJ, WK, WW, EH), pp. 1130–1138.
ICML-c3-2013-GermainHLM #adaptation #classification #linear- A PAC-Bayesian Approach for Domain Adaptation with Specialization to Linear Classifiers (PG, AH, FL, EM), pp. 738–746.
ICML-c3-2013-GuptaPV #learning #multi #parametricity- Factorial Multi-Task Learning : A Bayesian Nonparametric Approach (SKG, DQP, SV), pp. 657–665.
ICML-c3-2013-Izbicki #algebra #classification #online #parallel #performance- Algebraic classifiers: a generic approach to fast cross-validation, online training, and parallel training (MI), pp. 648–656.
ICML-c3-2013-NiuJDHS #learning #novel- Squared-loss Mutual Information Regularization: A Novel Information-theoretic Approach to Semi-supervised Learning (GN, WJ, BD, HH, MS), pp. 10–18.
KDD-2013-CuiJYWZY #data-driven #network #predict- Cascading outbreak prediction in networks: a data-driven approach (PC, SJ, LY, FW, WZ, SY), pp. 901–909.
KDD-2013-LiuCZ #performance #probability- Summarizing probabilistic frequent patterns: a fast approach (CL, LC, CZ), pp. 527–535.
KDD-2013-NiemannW #collaboration #recommendation- A new collaborative filtering approach for increasing the aggregate diversity of recommender systems (KN, MW), pp. 955–963.
KDD-2013-Vatsavai #learning #multi #using- Gaussian multiple instance learning approach for mapping the slums of the world using very high resolution imagery (RRV), pp. 1419–1426.
KDD-2013-ZafaraniL #behaviour #social #social media- Connecting users across social media sites: a behavioral-modeling approach (RZ, HL), pp. 41–49.
KDD-2013-ZhouTWN #predict #probability- A “semi-lazy” approach to probabilistic path prediction (JZ, AKHT, WW, WSN), pp. 748–756.
KDIR-KMIS-2013-CheetiSC #adaptation #classification #naive bayes #sentiment #syntax #using- Cross-domain Sentiment Classification using an Adapted Naïve Bayes Approach and Features Derived from Syntax Trees (SC, AS, DC), pp. 169–176.
KDIR-KMIS-2013-DimasKV #sentiment #twitter- Every Character Counts — A Character based Approach to Determine Political Sentiment on Twitter (AD, PCK, EMV), pp. 261–266.
KDIR-KMIS-2013-FerchichiBF #adaptation #image #predict- An Approach based on Adaptive Decision Tree for Land Cover Change Prediction in Satellite Images (AF, WB, IRF), pp. 82–90.
KDIR-KMIS-2013-MattaD #design #memory management- Memory Meetings — An Approach to Keep Track of Project Knowledge in Design (NM, GD), pp. 336–343.
KDIR-KMIS-2013-MorganK #ambiguity #twitter- A Generic Open World Named Entity Disambiguation Approach for Tweets (MBM, MvK), pp. 267–276.
KDIR-KMIS-2013-NhungNCLT #image #learning #multi- A Multiple Instance Learning Approach to Image Annotation with Saliency Map (TPN, CTN, JC, HVL, TT), pp. 152–159.
KDIR-KMIS-2013-SmirnovSK #multi #self #smarttech- Multilevel Self-Organization in Smart Environment — Service-Oriented Approach (AVS, NS, AK), pp. 290–297.
KDIR-KMIS-2013-SucaS #documentation #ontology #using- An Ontology for Portability and Interoperability Digital Documents — An Approach in Document Engineering using Ontologies (EGS, FSCdS), pp. 373–380.
KEOD-2013-AveiroP13a #enterprise #implementation #ontology #semantics- Implementing Organizational Self Awareness — A Semantic Mediawiki based Enterprise Ontology Management Approach (DA, DP), pp. 453–461.
KEOD-2013-BouiadjraB #ontology- User-centered Approach for Evaluating Ontologies (ABB, SMB), pp. 192–198.
KEOD-2013-ChulyadyoHB #automation #ontology- Core Ontology based Approach for Treating the Flatness of Automatically Built Ontology (RC, MH, GB), pp. 316–323.
KEOD-2013-CostaFML #classification #information management #ontology #using- Classification of Knowledge Representations using an Ontology-based Approach (RC, PF, PMNM, CL), pp. 184–191.
KEOD-2013-PaniLCB #web- An Approach to Manage the Web Knowledge (FEP, MIL, GC, GB), pp. 81–88.
KEOD-2013-SouissiCG #ontology #semantics- A Semantic-based Approach for Ontology Module Extraction (AS, WC, KG), pp. 222–229.
KEOD-2013-ZarradDZ #wiki- Title-based Approach to Relation Discovery from Wikipedia (RZ, ND, EZ), pp. 70–80.
MLDM-2013-LiuLM #combinator #lightweight #multi- A Lightweight Combinatorial Approach for Inferring the Ground Truth from Multiple Annotators (XL, LL, NDM), pp. 616–628.
RecSys-2013-Shi #graph #recommendation #similarity- Trading-off among accuracy, similarity, diversity, and long-tail: a graph-based recommendation approach (LS), pp. 57–64.
SEKE-2013-AdamE #multi- A multi-dimensional approach for analyzing software artifacts (SA, GEB), pp. 650–655.
SEKE-2013-DingXG #petri net #specification- An Approach for Analyzing Software Specifications in Petri Nets (JD, DX, JG), pp. 411–416.
SEKE-2013-DuttaAKB #distributed- Virtual Medical Board: A Distributed Bayesian Agent Based Approach (AD, SA, AK, SB), pp. 685–688.
SEKE-2013-FelizardoBM #overview #replication #validation #visual notation- A Visual Approach to Validate the Selection Review of Primary Studies in Systematic Reviews: A Replication Study (KRF, EFB, JCM), pp. 141–146.
SEKE-2013-FerreiraVQ #product line #testing- A Mutation Approach to Feature Testing of Software Product Lines (JMF, SRV, MAQ), pp. 232–237.
SEKE-2013-Lacanienta0TO #generative #knowledge-based #web- A Knowledge-based Approach for Generating Test Scenarios for Web Applications (RL, ST, HT, MO), pp. 166–171.
SEKE-2013-MarcolinoOGM #case study #effectiveness #towards #variability- Towards the Effectiveness of a Variability Management Approach at Use Case Level (AM, EAOJ, IMSG, JCM), pp. 214–219.
SEKE-2013-MolleriSB #automation #overview #process- Proposal of an Automated Approach to Support the Systematic Review of Literature Process (JSM, LEdS, FBVB), pp. 488–493.
SEKE-2013-MoshirpourEF #automation #ontology #using- Automated Construction of System Domain Knowledge Using an Ontology-Based Approach (MM, AE, BHF), pp. 63–66.
SEKE-2013-SadiqJ #elicitation #fuzzy #process #requirements- A fuzzy based approach for requirements prioritization in goal oriented requirements elicitation process (MS, SKJ), pp. 54–58.
SEKE-2013-SeveroFS #collaboration #game studies #risk management- A Dialogue Game Approach to Collaborative Risk Management (FS, LMF, LAdLS), pp. 548–551.
SEKE-2013-SilvaD #semantics- A context-aware approach on semantic trajectories (CS, MARD), pp. 435–440.
SEKE-2013-SilvaVMA #product line- Scrum-based Approach for Analyzing Commonalities and Variabilities in Software Product Lines (IFdS, TV, SRLM, ESdA), pp. 238–243.
SEKE-2013-TaoLG #architecture #component #configuration management #incremental #testing #using- Testing Configurable Architectures For Component-Based Software Using an Incremental Approach (CT, BL, JG), pp. 356–361.
SIGIR-2013-Boehm #information management #knowledge-based- Group-support for task-based information searching: a knowledge-based approach (TB), p. 1141.
SIGIR-2013-FreitasFOC #graph #linked data #natural language #open data #query #semantics- Answering natural language queries over linked data graphs: a distributional semantics approach (AF, FFdF, SO, EC), pp. 1107–1108.
SIGIR-2013-WuF #feedback #incremental #performance #pseudo- An incremental approach to efficient pseudo-relevance feedback (HW, HF), pp. 553–562.
AMT-2013-MatragkasKPZ #model transformation #testing- A Traceability-Driven Approach to Model Transformation Testing (NDM, DSK, RFP, AZ), pp. 2–11.
ECMFA-2013-AmbertBLLP #modelling #testing- Applying a Def-Use Approach on Signal Exchange to Implement SysML Model-Based Testing (FA, FB, JL, BL, FP), pp. 134–151.
ICMT-2013-FaunesSB #model transformation- Genetic-Programming Approach to Learn Model Transformation Rules from Examples (MF, HAS, MB), pp. 17–32.
ICMT-2013-RuscioIP #atl #co-evolution #evolution #metamodelling- A Methodological Approach for the Coupled Evolution of Metamodels and ATL Transformations (DDR, LI, AP), pp. 60–75.
ICMT-2013-WieberS #graph transformation #testing- Systematic Testing of Graph Transformations: A Practical Approach Based on Graph Patterns (MW, AS), pp. 205–220.
MoDELS-2013-ArkinTI #algorithm #modelling #parallel #platform- Model-Driven Approach for Supporting the Mapping of Parallel Algorithms to Parallel Computing Platforms (EA, BT, KMI), pp. 757–773.
MoDELS-2013-ChavezSFM #implementation #java #testing #uml- An Approach to Testing Java Implementation against Its UML Class Model (HMC, WS, RBF, BAM), pp. 220–236.
MoDELS-2013-Gonzalez-HuertaIA #architecture #multi #validation- Defining and Validating a Multimodel Approach for Product Architecture Derivation and Improvement (JGH, EI, SA), pp. 388–404.
MoDELS-2013-RajbhojR #detection #metamodelling #version control- A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
MoDELS-2013-ZalilaCP #domain-specific language #integration #verification- Formal Verification Integration Approach for DSML (FZ, XC, MP), pp. 336–351.
SPLC-2013-Quinton0D #constraints #feature model #modelling- Cardinality-based feature models with constraints: a pragmatic approach (CQ, DR, LD), pp. 162–166.
TOOLS-EUROPE-J-2012-LilisS13 #debugging #fault #metaprogramming- An Integrated Approach to Source Level Debugging and Compile Error Reporting in Metaprograms (YL, AS), pp. 1–26.
AdaEurope-2013-AsensioLCN #analysis #execution #safety #worst-case- Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
HILT-2013-WardRL #integration #process- An approach to integration of complex systems: the SAVI virtual integration process (DTW, DAR, BAL), pp. 43–46.
LOPSTR-2013-AlbertGG #analysis- A Transformational Approach to Resource Analysis with Typed-Norms (EA, SG, RG), pp. 38–53.
PPDP-2013-LamoMRL #bidirectional #declarative #graph #model transformation- A declarative and bidirectional model transformation approach based on graph co-spans (YL, FM, AR, JdL), pp. 1–12.
PPDP-2013-MatsudaW #bidirectional #for free #problem #runtime- Bidirectionalization for free with runtime recording: or, a light-weight approach to the view-update problem (KM, MW), pp. 297–308.
ER-BR-2013-CabrejosMC #development #elicitation #requirements #usability #web- An Approach for the Elicitation of Usability Requirements in the Development of Web Applications (LJERC, SM, TC).
ER-BR-2013-GuedesSC #product line- Goals and Scenarios to Software Product Lines: the GS2SPL Approach (GG, CTLLS, JC).
RE-2013-NistalaK #analysis #consistency #requirements #validation- An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure (PN, PK), pp. 320–325.
RE-2013-Valenca #ecosystem #evolution #requirements #social- Requirements negotiation model: A social oriented approach for software ecosystems evolution (GV), pp. 393–396.
REFSQ-2013-Cleland-HuangCK #agile #architecture #requirements- A Persona-Based Approach for Exploring Architecturally Significant Requirements in Agile Projects (JCH, AC, EK), pp. 18–33.
ASE-2013-ChandramohanTBSP #behaviour #bound #detection #modelling #scalability- A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
ASE-2013-Garcia-GalanTC #game studies #multi #variability- Multi-user variability configuration: A game theoretic approach (JGG, PT, ARC), pp. 574–579.
ASE-2013-GuoCASW #learning #performance #predict #statistics #variability- Variability-aware performance prediction: A statistical learning approach (JG, KC, SA, NS, AW), pp. 301–311.
ASE-2013-KifetewJTOT #grammarware #named #source code- SBFR: A search based approach for reproducing failures of programs with grammar based input (FMK, WJ, RT, AO, PT), pp. 604–609.
ASE-2013-PilgrimUTS #co-evolution- Model/code co-refactoring: An MDE approach (JvP, BU, AT, FS), pp. 682–687.
ASE-2013-RegerBR #mining #parametricity #specification- A pattern-based approach to parametric specification mining (GR, HB, DER), pp. 658–663.
ASE-2013-VeerappaH #maturity #requirements- Assessing the maturity of requirements through argumentation: A good enough approach (VV, RH), pp. 670–675.
ESEC-FSE-2013-MockusHP #quality #risk management- Risky files: an approach to focus quality improvement effort (AM, RLH, JDP), pp. 691–694.
ESEC-FSE-2013-WangHJK #evaluation- Searching for better configurations: a rigorous approach to clone evaluation (TW, MH, YJ, JK), pp. 455–465.
ICSE-2013-AversanoCRT - An approach for restructuring text content (LA, GC, GDR, MT), pp. 1225–1228.
ICSE-2013-BortisH #debugging #named- PorchLight: a tag-based approach to bug triaging (GB, AvdH), pp. 342–351.
ICSE-2013-CarrenoW #analysis #evolution #requirements- Analysis of user comments: an approach for software requirements evolution (LVGC, KW), pp. 582–591.
ICSE-2013-Che #architecture #design #evolution- An approach to documenting and evolving architectural design decisions (MC), pp. 1373–1376.
ICSE-2013-Kukreja #requirements #towards- Decision theoretic requirements prioritization: a two-step approach for sliding towards value realization (NK), pp. 1465–1467.
ICSE-2013-NetoCLGM #named #problem #programming #student #testing- POPT: a problem-oriented programming and testing approach for novice students (VLN, RC, LL, DSG, APM), pp. 1099–1108.
ICSE-2013-PanichellaDOPPL #algorithm #effectiveness #how #modelling #re-engineering #search-based #topic- How to effectively use topic models for software engineering tasks? an approach based on genetic algorithms (AP, BD, RO, MDP, DP, ADL), pp. 522–531.
SAC-2013-AbdallahHA #design #quantifier- Quantified extreme scenario based design approach (AA, RH, MAA), pp. 1117–1122.
SAC-2013-AraujoGMSAB #composition #feature model #modelling- Advanced modularity for building SPL feature models: a model-driven approach (JA, MG, AMDM, IS, VA, ELAB), pp. 1246–1253.
SAC-2013-AzarianCWB #manycore #pipes and filters- An FPGA-based multi-core approach for pipelining computing stages (AA, JMPC, SW, JB), pp. 1533–1540.
SAC-2013-BakreBE #interactive #uml- Aspect interaction chart — a UML approach for modularizing aspect interaction conflicts (SB, AB, TE), pp. 1254–1259.
SAC-2013-BasgaluppBSC #predict- Software effort prediction: a hyper-heuristic decision-tree based approach (MPB, RCB, TSdS, ACPLFC), pp. 1109–1116.
SAC-2013-BlancoMLJ #probability- A Kalman filter based approach to probabilistic gas distribution mapping (JLB, JGM, AJL, JGJ), pp. 217–222.
SAC-2013-JungS #garbage collection #named- LINK-GC: a preemptive approach for garbage collection in NAND flash storages (SJ, YHS), pp. 1478–1484.
SAC-2013-KaratasK #composition #flexibility #security- A flexible approach for considering interdependent security objectives in service composition (FK, DK), pp. 1919–1926.
SAC-2013-KinderenP #named- e3RoME: a value-based approach for method bundling (SdK, HAP), pp. 1469–1471.
SAC-2013-LaneseBF #calculus #internet #process- Internet of things: a process calculus approach (IL, LB, MDF), pp. 1339–1346.
SAC-2013-LiBB #ad hoc #composition #web #web service- Service farming: an ad-hoc and QoS-aware web service composition approach (WL, YB, FB), pp. 750–756.
SAC-2013-LinCLG #data-driven #distributed #learning #predict- Distributed dynamic data driven prediction based on reinforcement learning approach (SYL, KMC, CCL, NG), pp. 779–784.
SAC-2013-LiZSL #graph #mining #named #novel- WAVE-CIA: a novel CIA approach based on call graph mining (BL, QZ, XS, HL), pp. 1000–1005.
SAC-2013-Marques-NetoAV #maintenance- A quantitative approach for evaluating software maintenance services (HMN, GJA, MTV), pp. 1068–1073.
SAC-2013-MehtaRCN #dependence #using- Selecting among alternatives using dependencies: an NFR approach (RM, TRL, LC, MN), pp. 1292–1297.
SAC-2013-MeloAOAMB #analysis #concept #visual notation- A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
SAC-2013-PougetSCM #data flow #debugging #embedded #interactive #novel- A novel approach for interactive debugging of dynamic dataflow embedded applications (KP, MS, PLC, JFM), pp. 1547–1549.
SAC-2013-SaitoRFSG #image #performance #reduction- A data reduction and organization approach for efficient image annotation (PTMS, PJdR, AXF, CTNS, JFG), pp. 53–57.
SAC-2013-TounsiKKDM #design pattern #formal method #modelling #towards- Towards an approach for modeling and formalizing SOA design patterns with Event-B (IT, MHK, AHK, KD, EM), pp. 1937–1938.
SAC-2013-VivianHL #development #distributed- Supporting distributed software development through context awareness on software artifacts: the DiSEN-CollaborAR approach (RLV, EHMH, GCLL), pp. 765–770.
SAC-2013-WaflerH #analysis #dependence #grid #modelling #smarttech- A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
SAC-2013-XuTTZ #fault #fine-grained- An instruction-level fine-grained recovery approach for soft errors (JX, QT, LT, HZ), pp. 1511–1516.
SLE-2013-DialloCL #formal method #modelling #using- A Model-Driven Approach to Enhance Tool Interoperability Using the Theory of Models of Computation (PID, JC, LL), pp. 218–237.
ASPLOS-2013-DashtiFFGLLQR #memory management- Traffic management: a holistic approach to memory placement on NUMA systems (MD, AF, JRF, FG, RL, BL, VQ, MR), pp. 381–394.
ASPLOS-2013-KangW #hardware- To hardware prefetch or not to prefetch?: a virtualized environment study and core binding approach (HK, JLW), pp. 357–368.
CASE-2013-ChenZL #design #novel- A novel design approach for lower limb rehabilitation training robot (JC, XZ, RL), pp. 554–557.
CASE-2013-HeZJ #fault #robust- UIO based robust fault diagnosis approach for aero-engine fiber-optic sensor (CH, XZ, BJ), pp. 550–553.
CASE-2013-KernschmidtV #modelling- An interdisciplinary SysML based modeling approach for analyzing change influences in production plants to support the engineering (KK, BVH), pp. 1113–1118.
CASE-2013-LiF #integer #linear #multi #problem #programming #scheduling- A mixed integer linear programming approach for multi-degree cyclic multi-hoist scheduling problems without overlapping (XL, RYKF), pp. 274–279.
CASE-2013-LiuZZ #data-driven #modelling- Data driven modeling of human welder intelligence: A neuro-fuzzy approach (YL, WZ, YZ), pp. 663–668.
CASE-2013-ParisioMVJ #predict- A scenario-based predictive control approach to building HVAC management systems (AP, MM, DV, KHJ), pp. 428–435.
CASE-2013-ShaoLW #markov- A Markov chain approach to study flow disruptions on surgery in emergency care (XS, JL, DAW), pp. 990–995.
CASE-2013-SunSZS #optimisation- A two-stage approach for VMAT treatment plan optimization (BS, JS, GZ, LS), pp. 455–460.
CASE-2013-XieLSD #analysis #markov #modelling #process- Modeling and analysis of hospital inpatient rescue process: A Markov chain approach (XX, JL, CHS, YD), pp. 978–983.
CASE-2013-YeWZML #network #optimisation #predict #scalability- A signal split optimization approach based on model predictive control for large-scale urban traffic networks (BLY, WW, XZ, WJM, JL), pp. 904–909.
DAC-2013-0001WAWG #empirical #estimation #towards- Towards variation-aware system-level power estimation of DRAMs: an empirical approach (KC, CW, BA, NW, KG), p. 8.
DAC-2013-EbrahimiAT #analysis #multi- A layout-based approach for multiple event transient analysis (ME, HA, MBT), p. 6.
DAC-2013-KuangY #composition #layout #performance- An efficient layout decomposition approach for triple patterning lithography (JK, EFYY), p. 6.
DAC-2013-MishraMD #design #multi- A heterogeneous multiple network-on-chip design: an application-aware approach (AKM, OM, CRD), p. 10.
DATE-2013-AncajasCR - Proactive aging management in heterogeneous NoCs through a criticality-driven routing approach (DMA, KC, SR), pp. 1032–1037.
DATE-2013-ChaG #detection #effectiveness #metric- Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost (BC, SKG), pp. 1265–1270.
DATE-2013-DaloukasMETS #delivery #network #parallel #performance #power management- A parallel fast transform-based preconditioning approach for electrical-thermal co-simulation of power delivery networks (KD, AM, NEE, PT, GIS), pp. 1689–1694.
DATE-2013-GuanYL0 #analysis #estimation- FIFO cache analysis for WCET estimation: a quantitative approach (NG, XY, ML, WY), pp. 296–301.
DATE-2013-KumarCT #distributed #realtime #satisfiability- A satisfiability approach to speed assignment for distributed real-time systems (PK, DBC, LT), pp. 749–754.
DATE-2013-LeeKPK - An integrated approach for managing the lifetime of flash-based SSDs (SL, TK, JP, JK), pp. 1522–1525.
DATE-2013-LiD #debugging #hybrid #performance- A hybrid approach for fast and accurate trace signal selection for post-silicon debug (ML, AD), pp. 485–490.
DATE-2013-Moy #modelling #parallel #programming- Parallel programming with SystemC for loosely timed models: a non-intrusive approach (MM), pp. 9–14.
DATE-2013-MushtaqAB #fault tolerance #manycore #performance #platform- Efficient software-based fault tolerance approach on multicore platforms (HM, ZAA, KB), pp. 921–926.
DATE-2013-RahimiBG #adaptation- Hierarchically focused guardbanding: an adaptive approach to mitigate PVT variations and aging (AR, LB, RKG), pp. 1695–1700.
DATE-2013-ShreejithVFL #configuration management #network #using- An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
DATE-2013-TodorovMRS #clustering #synthesis- A spectral clustering approach to application-specific network-on-chip synthesis (VT, DMG, HR, US), pp. 1783–1788.
DATE-2013-WettinMPSG #design #energy #manycore- Energy-efficient multicore chip design through cross-layer approach (PW, JM, PPP, BS, AG), pp. 725–730.
DATE-2013-YuZHWLT #manycore #set #simulation- A critical-section-level timing synchronization approach for deterministic multi-core instruction set simulations (FWY, BHZ, YHH, HIW, CRL, RST), pp. 643–648.
ISMM-2013-Musuvathi #consistency #memory management #modelling- Safety-first approach to memory consistency models (MM), pp. 1–2.
PDP-2013-AmorettiLS #distributed #execution- A Cooperative Approach for Distributed Task Execution in Autonomic Clouds (MA, ALL, SS), pp. 274–281.
PDP-2013-BachCEEGKKLLPR #performance- A Comprehensive Approach for a Power Efficient General Purpose Supercomputer (MB, JdC, HE, DE, JG, SK, MK, VL, HJL, MP, DR), pp. 336–342.
PDP-2013-IjazSW - Fewest Common Hops (FCH): An Improved Peer Selection Approach for P2P Applications (HI, SS, MW), pp. 449–453.
ESOP-2013-SharmaGHALN #algebra #data-driven #invariant- A Data Driven Approach for Algebraic Loop Invariants (RS, SG, BH, AA, PL, AVN), pp. 574–592.
FASE-2013-YangPX #automation #generative #mobile- A Grey-Box Approach for Automated GUI-Model Generation of Mobile Applications (WY, MRP, TX), pp. 250–265.
STOC-2013-BravermanM #complexity- An information complexity approach to extended formulations (MB, AM), pp. 161–170.
STOC-2013-LeeRS #using- A new approach to computing maximum flows using electrical flows (YTL, SR, NS), pp. 755–764.
TACAS-2013-LindenW #memory management- A Verification-Based Approach to Memory Fence Insertion in PSO Memory Systems (AL, PW), pp. 339–353.
CAV-2013-ArmoniFJ - SVA and PSL Local Variables — A Practical Approach (RA, DF, NJ), pp. 197–212.
ICLP-J-2013-ErdemPSSU #multi- Finding optimal plans for multiple teams of robots through a mediator: A logic-based approach (EE, VP, ZGS, PS, TU), pp. 831–846.
ICLP-J-2013-MaLWRL #analysis #declarative #distributed #execution #specification- A declarative approach to distributed computing: Specification, execution and analysis (JM, FL, DW, AR, JL), pp. 815–830.
ICST-2013-GraslandBGP #functional #hybrid #safety #testing- A Functional Testing Approach for Hybrid Safety Properties with Incomplete Information (YG, LdB, RG, IP), pp. 104–113.
ICTSS-2013-VorobyovKS #memory management- A Dynamic Approach to Locating Memory Leaks (KV, PK, PS), pp. 255–270.
ISSTA-2013-TrippWG #learning #security #testing #web- Finding your way in the testing jungle: a learning approach to web security testing (OT, OW, LG), pp. 347–357.
SAT-2013-CimattiGSS #composition #modulo theories #satisfiability- A Modular Approach to MaxSAT Modulo Theories (AC, AG, BJS, RS), pp. 150–165.
SAT-2013-HeuleS #clique #satisfiability- A SAT Approach to Clique-Width (MH, SS), pp. 318–334.
SAT-2013-IgnatievJM #quantifier #satisfiability- Quantified Maximum Satisfiability: — A Core-Guided Approach (AI, MJ, JMS), pp. 250–266.
SAT-2013-MihalT #constraints #logic #programmable- A Constraint Satisfaction Approach for Programmable Logic Detailed Placement (AM, ST), pp. 208–223.
CBSE-2012-GhafariJSH #architecture #component #configuration management #consistency- An architectural approach to ensure globally consistent dynamic reconfiguration of component-based systems (MG, PJ, SS, HH), pp. 177–182.
CBSE-2012-MartinezV #component #realtime- An MDE approach to address synchronization needs in component-based real-time systems (PLM, TV), pp. 125–134.
QoSA-2012-DurdikR #architecture #design #modelling- Position paper: approach for architectural design and modelling with documented design decisions (ADMD3) (ZD, RHR), pp. 49–54.
WICSA-ECSA-2012-KebirSCC #component #identification #object-oriented- Quality-Centric Approach for Software Component Identification from Object-Oriented Code (SK, ADS, SC, AC), pp. 181–190.
WICSA-ECSA-2012-KuzZBSX #architecture #effectiveness- An Architectural Approach for Cost Effective Trustworthy Systems (IK, LZ, LB, MS, XX), pp. 325–328.
DocEng-2012-Delprat #documentation- Content and document based approach for digital productivity applications (TD), pp. 83–84.
DocEng-2012-IorioPPV #automation #documentation #recognition #xml- A first approach to the automatic recognition of structural patterns in XML documents (ADI, SP, FP, FV), pp. 85–94.
DRR-2012-EsserSMBS #automation #documentation- Automatic indexing of scanned documents: a layout-based approach (DE, DS, KM, MB, AS).
DRR-2012-SadawiSS #recognition #rule-based- Chemical structure recognition: a rule-based approach (NMS, APS, VS).
HT-2012-WalshOW #evaluation- Evaluation of a domain-aware approach to user model interoperability (EW, AO, VW), pp. 197–206.
HT-2012-WolffMC #named- Storyspace: a story-driven approach for creating museum narratives (AW, PM, TDC), pp. 89–98.
JCDL-2012-ParkEF #canonical #hybrid #independence #representation- A hybrid two-stage approach for discipline-independent canonical representation extraction from references (SHP, RWE, EAF), pp. 285–294.
SIGMOD-2012-ChengKCC #distance #graph #performance #query #scalability- Efficient processing of distance queries in large graphs: a vertex cover approach (JC, YK, SC, CC), pp. 457–468.
SIGMOD-2012-JinRXL #distance #graph #query #scalability- A highway-centric labeling approach for answering distance queries on large sparse graphs (RJ, NR, YX, VEL), pp. 445–456.
SIGMOD-2012-XuKWCC #clustering #graph #modelling- A model-based approach to attributed graph clustering (ZX, YK, YW, HC, JC), pp. 505–516.
TPDL-2012-Gartner #metadata- Linking the Parliamentary Record: A New Approach to Metadata for Legislative Proceedings (RG), pp. 179–184.
TPDL-2012-GeelNN #named #using- PubLight: Managing Publications Using a Task-Oriented Approach (MG, MN, MCN), pp. 363–369.
TPDL-2012-MercunZA #named #product line #visualisation- FrbrVis: An Information Visualization Approach to Presenting FRBR Work Families (TM, MZ, TA), pp. 504–507.
VLDB-2012-SunHYY #analysis #mining #network- Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach (YS, JH, XY, PSY), pp. 2022–2023.
VLDB-2012-ZhaoRGH #integration- A Bayesian Approach to Discovering Truth from Conflicting Sources for Data Integration (BZ, BIPR, JG, JH), pp. 550–561.
ITiCSE-2012-CookDHHJKS #abstraction #education #modelling- A systematic approach to teaching abstraction and mathematical modeling (CTC, SDS, JOH, JEH, DPJ, JK, MS), pp. 357–362.
ITiCSE-2012-Kurmas #design- The presenter first design approach (ZK), p. 379.
ITiCSE-2012-MorgadoB12a #problem- A structured approach to problem solving in CS1 (CM, FB), p. 399.
ITiCSE-2012-Velazquez-Iturbide #algorithm #learning #refinement- Refinement of an experimental approach tocomputer-based, active learning of greedy algorithms (JÁVI), pp. 46–51.
SIGITE-2012-Wang #design #education #web- A holistic and pragmatic approach to teaching web accessibility in an undergraduate web design course (YDW), pp. 55–60.
CSMR-2012-Penta #developer #empirical #maintenance #reverse engineering- Empirical Studies in Reverse Engineering and Maintenance: Employing Developers to Evaluate Your Approach and Tool (MDP), pp. 567–568.
CSMR-2012-YoshidaKI #functional #maintenance #metric #source code- A Cohesion Metric Approach to Dividing Source Code into Functional Segments to Improve Maintainability (NY, MK, HI), pp. 365–370.
ICPC-2012-MahmoudNX #semantics #traceability- A semantic relatedness approach for traceability link recovery (AM, NN, SX), pp. 183–192.
ICPC-2012-Sajnani #architecture #automation #machine learning- Automatic software architecture recovery: A machine learning approach (HS), pp. 265–268.
ICSM-2012-BauerHD #library- A structured approach to assess third-party library usage (VB, LH, FD), pp. 483–492.
ICSM-2012-CorazzaMM #identifier #named #performance- LINSEN: An efficient approach to split identifiers and expand abbreviations (AC, SDM, VM), pp. 233–242.
ICSM-2012-DuseauDS #named #visual notation- Vasco: A visual approach to explore object churn in framework-intensive applications (FD, BD, HAS), pp. 15–24.
ICSM-2012-Perez-Castillo #information management #legacy #named #process- MARBLE: Modernization approach for recovering business processes from legacy information systems (RPC), pp. 671–676.
WCRE-2012-AlomariCM #performance #scalability #slicing- A Very Efficient and Scalable Forward Static Slicing Approach (HWA, MLC, JIM), pp. 425–434.
WCRE-2012-IchiiMNCO #automation #modelling #rule-based #source code- A Rule-based Automated Approach for Extracting Models from Source Code (MI, TM, YN, MC, HO), pp. 308–317.
WCRE-2012-MaigaABSGA #anti #detection #incremental #named- SMURF: A SVM-based Incremental Anti-pattern Detection Approach (AM, NA, NB, AS, YGG, EA), pp. 466–475.
WCRE-2012-MediniAGPT #execution #named- SCAN: An Approach to Label and Relate Execution Trace Segments (SM, GA, YGG, MDP, PT), pp. 135–144.
ICALP-v1-2012-CharikarL #problem- A Dependent LP-Rounding Approach for the k-Median Problem (MC, SL), pp. 194–205.
ICALP-v1-2012-LaekhanukitGS #problem- A Rounding by Sampling Approach to the Minimum Size k-Arc Connected Subgraph Problem (BL, SOG, MS), pp. 606–616.
ICALP-v2-2012-BouyerMS #automaton #game studies #reachability #robust- Robust Reachability in Timed Automata: A Game-Based Approach (PB, NM, OS), pp. 128–140.
FM-2012-AsplundMBCC #coordination #formal method- A Formal Approach to Autonomous Vehicle Coordination (MA, AM, MB, SC, VC), pp. 52–67.
FM-2012-ZhaoZKL #case study #hybrid #industrial- A “Hybrid” Approach for Synthesizing Optimal Controllers of Hybrid Systems: A Case Study of the Oil Pump Industrial Example (HZ, NZ, DK, KGL), pp. 471–485.
IFM-2012-IsobeMNR #capacity #csp #safety- Safety and Line Capacity in Railways — An Approach in Timed CSP (YI, FM, HNN, MR), pp. 54–68.
SEFM-2012-AbdelhalimST #effectiveness #model checking #optimisation- An Optimization Approach for Effective Formalized fUML Model Checking (IA, SS, HT), pp. 248–262.
SEFM-2012-BicknellRBCS #using #verification- A Practical Approach for Closed Systems Formal Verification Using Event-B (BB, JR, MJB, JC, CFS), pp. 323–332.
SEFM-2012-FathabadiBR #composition- A Systematic Approach to Atomicity Decomposition in Event-B (ASF, MJB, AR), pp. 78–93.
SEFM-2012-JanuzajKBM - A Configuration Approach for IMA Systems (VJ, SK, FB, RM), pp. 203–217.
SEFM-2012-LefticaruI #algorithm #finite #generative #search-based #state machine #testing #using- An Improved Test Generation Approach from Extended Finite State Machines Using Genetic Algorithms (RL, FI), pp. 293–307.
SEFM-2012-VorobyovKS #data flow #security- A Low-Overhead, Value-Tracking Approach to Information Flow Security (KV, PK, PS), pp. 367–381.
SEFM-2012-ZhuXMQQ #concurrent #source code #verification- The Rely/Guarantee Approach to Verifying Concurrent BPEL Programs (HZ, QX, CM, SQ, ZQ), pp. 172–187.
CIG-2012-FoderaroSF #composition #game studies #modelling #online #video- A model-based cell decomposition approach to on-line pursuit-evasion path planning and the video game Ms. Pac-Man (GF, AS, SF), pp. 281–287.
CIG-2012-JustinussenRCT #game studies- Resource systems in games: An analytical approach (TJ, PHR, AC, JT), pp. 171–178.
CIG-2012-MachadoPC #automation #classification #modelling- A binary classification approach for automatic preference modeling of virtual agents in Civilization IV (MCM, GLP, LC), pp. 155–162.
CIG-2012-SynnaeveB - Special tactics: A Bayesian approach to tactical decision-making (GS, PB), pp. 409–416.
FDG-2012-Linderoth #challenge #game studies- Monkey see, monkey do: an ecological approach to challenges in games (JL), p. 1.
VS-Games-2012-ClarkeADB #game studies #named- PR: EPARe: A Game-Based Approach to Relationship Guidance for Adolescents (SC, SA, ID, KB), pp. 38–44.
VS-Games-2012-FernandesDRFPS #collaboration #elicitation #game studies #named #towards- iThink: A Game-Based Approach Towards Improving Collaboration and Participation in Requirement Elicitation (JF, DD, CR, CF, JMP, MMdS), pp. 66–77.
VS-Games-2012-SuttieLLR #adaptation #game studies #realtime #towards- Towards a Biocybernetic Approach for Serious Games Real-time Psychophysiological Inferences for Adaptive Agents in Serious Games (NS, SL, TL, JR), pp. 316–317.
GT-VMT-2012-GabrielLE #algebra #petri net- Algebraic Approach to Timed Petri Nets (KG, PL, CE).
GT-VMT-2012-NatschlagerS #algebra #graph #graph transformation #inheritance- A Flattening Approach for Attributed Type Graphs with Inheritance in Algebraic Graph Transformation (CN, KDS).
CHI-2012-FrauenbergerGKP - Interpreting input from children: a designerly approach (CF, JG, WKB, HP), pp. 2377–2386.
CHI-2012-LazarFBMWHOE #interactive #proving- The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users (JL, JF, TB, GM, BW, JH, AO, NE), pp. 2267–2276.
CHI-2012-MorrisonMRSC #hybrid #mobile- A hybrid mass participation approach to mobile software trials (AM, DM, SR, SS, MC), pp. 1311–1320.
CHI-2012-Sae-BaeAIM #authentication #gesture #multi #novel- Biometric-rich gestures: a novel approach to authentication on multi-touch devices (NSB, KA, KI, NDM), pp. 977–986.
CHI-2012-WallnerK #analysis #visualisation- A spatiotemporal visualization approach for the analysis of gameplay data (GW, SK), pp. 1115–1124.
CSCW-2012-FuksMCVUB #co-evolution #collaboration #design- Collaborative museums: an approach to co-design (HF, HM, DC, KV, WU, MB), pp. 681–684.
CSCW-2012-NobaranyHF #collaboration #distributed #process #reuse- Facilitating the reuse process in distributed collaboration: a distributed cognition approach (SN, MH, BDF), pp. 1223–1232.
CSCW-2012-PaoMCR #collaboration #design- A need-driven design approach: addressing latent needs in collaboration rooted in early childhood (SYP, SM, KC, AR), pp. 829–832.
CAiSE-2012-DaskalakiP #multi- OtO Matching System: A Multi-strategy Approach to Instance Matching (ED, DP), pp. 286–300.
CAiSE-2012-KaragiannisMM #evaluation #heatmap #metamodelling- Compliance Evaluation Featuring Heat Maps (CE-HM): A Meta-Modeling-Based Approach (DK, CM, AM), pp. 414–428.
CAiSE-2012-LaraGC #modelling- Abstracting Modelling Languages: A Reutilization Approach (JdL, EG, JSC), pp. 127–143.
CAiSE-2012-LiptchinskyKTD #collaboration #modelling #novel #process #social- A Novel Approach to Modeling Context-Aware and Social Collaboration Processes (VL, RK, HLT, SD), pp. 565–580.
CAiSE-2012-NederstigtAVF #automation #e-commerce #taxonomy- An Automatic Approach for Mapping Product Taxonomies in E-Commerce Systems (LJN, SSA, DV, FF), pp. 334–349.
EDOC-2012-CostaMPA #detection #modelling #rule-based- A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection (PDC, ITM, IP, JPAA), pp. 154–163.
EDOC-2012-DohringSG #adaptation #aspect-oriented #model transformation #recursion #rule-based #runtime #weaving #workflow- Emulating Runtime Workflow Adaptation and Aspect Weaving by Recursive Rule-Based Sub-Process Selection — A Model Transformation Approach (MD, AS, IG), pp. 133–142.
ICEIS-J-2012-GottardiPC12a #framework #modelling #reuse #using- Accelerating Crosscutting Framework Reuse Using a Model-Based Approach (TG, OPL, VVdC), pp. 257–273.
ICEIS-J-2012-KaragiannisS #design #hybrid #modelling- An Engineering Approach for the Design of Hybrid Modelling Methods (DK, MS), pp. 3–17.
ICEIS-J-2012-RibeiroFBKE #algorithm #learning #markov #process- Combining Learning Algorithms: An Approach to Markov Decision Processes (RR, FF, MACB, ALK, FE), pp. 172–188.
ICEIS-J-2012-XavierN12a #component- Measuring Users’ Emotions with a Component-Based Approach (RACX, VPdAN), pp. 393–409.
ICEIS-v1-2012-BoulilBP #ocl #quality #uml- A UML & Spatial OCL based Approach for Handling Quality Issues in SOLAP Systems (KB, SB, FP), pp. 99–104.
ICEIS-v1-2012-Dustdar #design #novel- Design by Units — A Novel Approach for Building Elastic Systems (SD).
ICEIS-v1-2012-RibeiroFBBDKE #algorithm #learning- Unified Algorithm to Improve Reinforcement Learning in Dynamic Environments — An Instance-based Approach (RR, FF, MACB, APB, OBD, ALK, FE), pp. 229–238.
ICEIS-v1-2012-ZianiRO #constraints #mining #multi- A Constraint-based Mining Approach for Multi-attribute Index Selection (BZ, FR, YO), pp. 93–98.
ICEIS-v2-2012-CapelM #automation #composition #correctness #model checking #safety #verification- A Formal Compositional Verification Approach for Safety-Critical Systems Correctness — Model-Checking based Methodological Approach to Automatically Verify Safety Critical Systems Software (MIC, LEMM), pp. 105–112.
ICEIS-v2-2012-GottardiPC #framework #modelling #reuse- A Model-based Approach for Reusing Crosscutting Frameworks (TG, OPL, VVdC), pp. 46–55.
ICEIS-v2-2012-PantojaC #development #using- A MDA Approach for Agent-oriented Development using FAML (CEP, RC), pp. 415–420.
ICEIS-v2-2012-ParreirasGW #linked data #modelling #ontology #open data- An Ontology-based Approach for Enabling Linked Data Capabilities to MOF Compliant Models (FSP, GG, TW), pp. 126–131.
ICEIS-v2-2012-SousaPS #concept- A Pragmatic Approach to Conceptual Negotiation Support (CS, CP, ALS), pp. 349–354.
ICEIS-v3-2012-BoukhedoumaOAT #adaptation #architecture #modelling #workflow- Service based Approach for Adaptability of Workflow Models — The Subcontracting Architecture (SB, MO, ZA, DT), pp. 224–231.
ICEIS-v3-2012-GoncalvesNUS #flexibility #mobile #user interface- An Analitic Approach to Evaluate Flexible Mobile User Interfaces for the Elderly (VPG, VPdAN, JU, SS), pp. 91–96.
ICEIS-v3-2012-HayashiMB #towards- Schools as Organizations — A Semiotic Approach towards Making Sense of Information Technology (ECSH, MCM, MCCB), pp. 15–24.
ICEIS-v3-2012-KumarS #architecture #enterprise #metric #performance- Enterprise Architecture Performance Management — A Context based Approach to EA Metrics Definition (AK, PS), pp. 249–254.
ICEIS-v3-2012-XavierN #evaluation #hybrid #information management- A Hybrid Evaluation Approach for the Emotional State of Information Systems Users (RACX, VPdAN), pp. 45–53.
CIKM-2012-BhatiaHHS #query #scalability- A scalable approach for performing proximal search for verbose patent search queries (SB, BH, QH, WSS), pp. 2603–2606.
CIKM-2012-CamposDJN #higher-order #identification #named #web- GTE: a distributional second-order co-occurrence approach to improve the identification of top relevant dates in web snippets (RC, GD, AJ, CN), pp. 2035–2039.
CIKM-2012-FangS #feedback #learning #recommendation- A latent pairwise preference learning approach for recommendation from implicit feedback (YF, LS), pp. 2567–2570.
CIKM-2012-IntagornL #mining #probability #social- A probabilistic approach to mining geospatial knowledge from social annotations (SI, KL), pp. 1717–1721.
CIKM-2012-LiKBCL #named #probability #query #recommendation- DQR: a probabilistic approach to diversified query recommendation (RL, BK, BB, RC, EL), pp. 16–25.
CIKM-2012-LongGXK #design #using- A simple approach to the design of site-level extractors using domain-centric principles (CL, XG, CX, SK), pp. 1517–1521.
CIKM-2012-OrangS #correlation #nondeterminism #probability #query- A probabilistic approach to correlation queries in uncertain time series data (MO, NS), pp. 2229–2233.
CIKM-2012-ShenWLW #graph #ontology- A graph-based approach for ontology population with named entities (WS, JW, PL, MW), pp. 345–354.
CIKM-2012-XieFTCMLL #hybrid #performance- A hybrid approach for efficient provenance storage (YX, DF, ZT, LC, KKMR, YL, DDEL), pp. 1752–1756.
CIKM-2012-ZhaoN #data type #modelling- A model-based approach for RFID data stream cleansing (ZZ, WN), pp. 862–871.
CIKM-2012-ZhuYCQ #classification #feature model #graph- Graph classification: a diversified discriminative feature selection approach (YZ, JXY, HC, LQ), pp. 205–214.
ECIR-2012-TamFL #automation #email- Automatic Foldering of Email Messages: A Combination Approach (TT, AF, AL), pp. 232–243.
ECIR-2012-YanZ #community #recommendation- A New Approach to Answerer Recommendation in Community Question Answering Services (ZY, JZ), pp. 121–132.
ICML-2012-FengXY #robust- Robust PCA in High-dimension: A Deterministic Approach (JF, HX, SY), p. 237.
ICML-2012-GeistSLG #difference #learning- A Dantzig Selector Approach to Temporal Difference Learning (MG, BS, AL, MG), p. 49.
ICML-2012-KiralyT #algebra #combinator #matrix #rank- A Combinatorial Algebraic Approach for the Identifiability of Low-Rank Matrix Completion (FJK, RT), p. 100.
ICML-2012-MerchanteGG #analysis #linear #performance- An Efficient Approach to Sparse Linear Discriminant Analysis (LFSM, YG, GG), p. 168.
ICML-2012-XieHS #automation #generative #learning- Artist Agent: A Reinforcement Learning Approach to Automatic Stroke Generation in Oriental Ink Painting (NX, HH, MS), p. 139.
ICML-2012-ZhongG #approximate #matrix- A Bayesian Approach to Approximate Joint Diagonalization of Square Matrices (MZ, MAG), p. 87.
ICPR-2012-BriaMMT #semistructured data- A ranking-based cascade approach for unbalanced data (AB, CM, MM, FT), pp. 3439–3442.
ICPR-2012-ClausnerAP #documentation #hybrid #robust #segmentation- A robust hybrid approach for text line segmentation in historical documents (CC, AA, SP), pp. 335–338.
ICPR-2012-CourtyAL #classification #image- A classwise supervised ordering approach for morphology based hyperspectral image classification (NC, EA, SL), pp. 1997–2000.
ICPR-2012-DornellesH #algorithm #image #search-based- A genetic algorithm based approach for combining binary image operators (MMD, NSTH), pp. 3184–3187.
ICPR-2012-DuanHC #image #segmentation- Shape prior regularized continuous max-flow approach to image segmentation (YD, WH, HC), pp. 2516–2519.
ICPR-2012-DuH #adaptation #linear- A discriminative linear regression approach to OCR adaptation (JD, QH), pp. 629–632.
ICPR-2012-Ho #detection #effectiveness- An effective vortex detection approach for velocity vector field (SSH), pp. 2643–2646.
ICPR-2012-KawabataK #multi #using- Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
ICPR-2012-KennardBS #2d #detection #geometry #using #verification- Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPR-2012-LiF #named #process #recognition- ARMA-HMM: A new approach for early recognition of human activity (KL, YF), pp. 1779–1782.
ICPR-2012-MarcaciniCR #clustering #learning- An active learning approach to frequent itemset-based text clustering (RMM, GNC, SOR), pp. 3529–3532.
ICPR-2012-MinKCK #detection #higher-order #using- A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
ICPR-2012-MorinDD #multi #random #segmentation- A random walk approach for multiatlas-based segmentation (JPM, CD, LD), pp. 3636–3639.
ICPR-2012-NegiBC - Characterizing user-subgroups in Flickr Group: A block LDA based approach (SN, RB, SC), pp. 2262–2265.
ICPR-2012-PazzagliaC #recognition #tool support #visual notation- Visual description and recognition of mechanical tools with a silhouette-based approach (FP, CC), pp. 2549–2552.
ICPR-2012-PohKA #authentication #parametricity- A discriminative parametric approach to video-based score-level fusion for biometric authentication (NP, JK, FMA), pp. 2335–2338.
ICPR-2012-RattaniMGR #automation #classification- A dual-staged classification-selection approach for automated update of biometric templates (AR, GLM, EG, FR), pp. 2972–2975.
ICPR-2012-San-BiagioUCCCM #classification #kernel #learning #multi- A multiple kernel learning approach to multi-modal pedestrian classification (MSB, AU, MC, MC, UC, VM), pp. 2412–2415.
ICPR-2012-ShaukatGWB #bottom-up #detection #top-down- Meeting in the Middle: A top-down and bottom-up approach to detect pedestrians (AS, AG, DW, RB), pp. 874–877.
ICPR-2012-SrikanthaSM #detection #image- An SVD-based approach for ghost detection and removal in high dynamic range images (AS, DS, FM), pp. 380–383.
ICPR-2012-SunXAL #online #performance #video- A tracking based fast online complete video synopsis approach (LS, JX, HA, SL), pp. 1956–1959.
ICPR-2012-WangJ12a #novel #probability #recognition- A novel probabilistic approach utilizing clip attribute as hidden knowledge for event recognition (XW, QJ), pp. 3382–3385.
ICPR-2012-WeberT #documentation #performance- Symbol spotting for technical documents: An efficient template-matching approach (JW, ST), pp. 669–672.
ICPR-2012-WongLTYCCBW #automation #graph #locality- Automatic localization of the macula in a supervised graph-based approach with contextual superpixel features (DWKW, JL, NMT, FY, XC, CMGC, MB, TYW), pp. 2063–2066.
ICPR-2012-ZhangWSD #detection #effectiveness- A simple and effective saliency detection approach (HZ, WW, GS, LD), pp. 186–189.
ICPR-2012-Zheng0CP #adaptation- A Grassmann manifold-based domain adaptation approach (JZ, MYL, RC, PJP), pp. 2095–2099.
ICPR-2012-ZhongHH - A hierarchical approach to high-quality partial shape registration (MZ, TH, QH), pp. 113–116.
KDD-2012-0001LHSE #towards- Towards heterogeneous temporal clinical event pattern discovery: a convolutional approach (FW, NL, JH, JS, SE), pp. 453–461.
KDD-2012-MaoCCLKB #data mining #mining #monitoring #realtime- An integrated data mining approach to real-time clinical monitoring and deterioration warning (YM, WC, YC, CL, MK, TCB), pp. 1140–1148.
KDD-2012-PatroDSWFK #data-driven #how #learning #modelling #network- The missing models: a data-driven approach for learning how networks grow (RP, GD, ES, HW, DF, CK), pp. 42–50.
KDD-2012-ShaferRBAGF #mining #monitoring #named- RainMon: an integrated approach to mining bursty timeseries monitoring data (IS, KR, VNB, YA, GRG, CF), pp. 1158–1166.
KDIR-2012-AlkouzA #network #semantics #social- An Interests Discovery Approach in Social Networks based on a Semantically Enriched Bayesian Network Model (AA, SA), pp. 300–305.
KDIR-2012-CheungZZ #network- A Bayesian Approach for Constructing Ensemble Neural Network (SHC, YZ, ZZ), pp. 374–377.
KDIR-2012-Dagnino #grid #information management #machine learning #smarttech- Knowledge Discovery in the Smart Grid — A Machine Learning Approach (AD), pp. 366–369.
KDIR-2012-DinsoreanuMHP #recommendation- A Unified Approach for Context-sensitive Recommendations (MD, FCM, OLH, RP), pp. 85–94.
KDIR-2012-FerraraT #social- A Keyphrase Extraction Approach for Social Tagging Systems (FF, CT), pp. 362–365.
KDIR-2012-FleissnerF - A Syntax-oriented Event Extraction Approach (SF, ACF), pp. 336–339.
KDIR-2012-GayLM #constraints #mining #multi #sequence- Constraint-programming Approach for Multiset and Sequence Mining (PG, BL, JM), pp. 212–220.
KEOD-2012-BrandaoMS #composition #incremental #interactive #named #navigation #ontology- I3OM — An Iterative, Incremental and Interactive Approach for Ontology Navigation based on Ontology Modularization (RB, PM, NS), pp. 265–270.
KEOD-2012-FigueirasCPLJ #collaboration #information retrieval- Information Retrieval in Collaborative Engineering Projects — A Vector Space Model Approach (PF, RC, LP, CL, RJG), pp. 233–238.
KEOD-2012-KotowskiS #library #ontology- Ontology Library — A New Approach for Storing, Searching and Discovering Ontologies (DK, DAS), pp. 271–277.
KEOD-2012-LiangCI #development #using- A Product Development System using Knowledge-intensive Support Approach (JSL, KMC, PI), pp. 25–33.
KEOD-2012-MatskanisAMMR #linked data #open data #query #research- A Linked Data Approach for Querying Heterogeneous Sources — Assisting Researchers in Finding Answers to Complex Clinical Questions (NM, VA, PM, KM, JR), pp. 411–414.
KEOD-2012-PereiraS #design #information management #ontology #security- An Ontology Approach in Designing Security Information Systems to Support Organizational Security Risk Knowledge (TSMP, HMDS), pp. 461–466.
KEOD-2012-SchlenoffFB #ontology #recognition #using- An Approach to Ontology-based Intention Recognition using State Representations (CS, SF, SB), pp. 178–183.
KEOD-2012-WicaksonoRO #energy #ontology- Ontology Driven Approach for Intelligent Energy Management in Discrete Manufacturing (HW, SR, JO), pp. 108–114.
KMIS-2012-Chai-ArayalertN #information management #towards- Towards a Semiotic Approach to Practice-oriented Knowledge Transfer (SCA, KN), pp. 119–124.
KMIS-2012-LageA12a #process- Information and Knowledge Sharing in Inter-organizational Relationships under the Process Approach (EL, BA), pp. 273–276.
KMIS-2012-ThonssenL #contract #semantics- Semantically Enriched Obligation Management — An Approach for Improving the Handling of Obligations Represented in Contracts (BT, JL), pp. 40–48.
KMIS-2012-Vaiyavuth #challenge #concept #energy #framework #how #modelling- How Open Innovation Models Might Help the Thai Energy Sector to Address the Climate Change Challenge? — A Conceptual Framework on an Approach to Measure the Impact of Adoption of Open Innovation (RV), pp. 229–234.
KR-2012-ConitzerX #approximate #multi- Paradoxes of Multiple Elections: An Approximation Approach (VC, LX).
KR-2012-LutzSW #approximate #logic- An Automata-Theoretic Approach to Uniform Interpolation and Approximation in the Description Logic EL (CL, IS, FW).
MLDM-2012-DiezC #classification #multi #predict- A Multiclassifier Approach for Drill Wear Prediction (AD, AC), pp. 617–630.
MLDM-2012-EbrahimiA #clustering- Semi Supervised Clustering: A Pareto Approach (JE, MSA), pp. 237–251.
MLDM-2012-Garcia-ConstantinoCNRS #automation #classification #summary- A Semi-Automated Approach to Building Text Summarisation Classifiers (MGC, FC, PJN, AR, CS), pp. 495–509.
MLDM-2012-LiHO #correlation #mining- Top-N Minimization Approach for Indicative Correlation Change Mining (AL, MH, YO), pp. 102–116.
MLDM-2012-MondalPMMB #clustering #concept analysis #mining #using- A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
MLDM-2012-PirasGP #image #retrieval- Enhancing Image Retrieval by an Exploration-Exploitation Approach (LP, GG, RP), pp. 355–365.
MLDM-2012-SinghCS #hybrid #performance #recognition #using- A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines (LS, GC, DS), pp. 660–668.
MLDM-2012-TaTB #clustering #data type #using- Clustering Data Stream by a Sub-window Approach Using DCA (MTT, LTHA, LBA), pp. 279–292.
MLDM-2012-TurkovKM #concept #pattern matching #pattern recognition #problem #recognition- Bayesian Approach to the Concept Drift in the Pattern Recognition Problems (PAT, OK, VM), pp. 1–10.
RecSys-2012-AntunesCG #development #recommendation- An approach to context-based recommendation in software development (BA, JC, PG), pp. 171–178.
RecSys-2012-ZhangTSWY #image #recommendation #semantics- A semantic approach to recommending text advertisements for images (WZ, LT, XS, HW, YY), pp. 179–186.
SEKE-2012-AlbuquerquePL #case study #experience #natural language #requirements #reuse #using- Reuse of Experiences Applied to Requirements Engineering: An Approach Based on Natural Language Processing (AA, VP, TL), pp. 574–577.
SEKE-2012-AsuncionT #traceability- A Holistic Approach to Software Traceability (HUA, RNT), pp. 412–417.
SEKE-2012-AvelarSP #database #ontology #relational #xml- An Ontology-based Approach for Storing XML Data Into Relational Databases (FTMdA, DdBS, EKP), pp. 438–443.
SEKE-2012-ChangCSZQ #component #ontology #reuse- An Approach for Software Component Reusing Based on Ontological Mapping (SKC, FC, MDS, EZ, YQ), pp. 180–187.
SEKE-2012-ChenCZS #analysis #integration- A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
SEKE-2012-ChenL #behaviour #elicitation #ontology #requirements #security- Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach (XC, JL), pp. 61–65.
SEKE-2012-DuttaUA #analysis #automation #semantics #verification- Requirement Analysis and Automated Verification: A Semantic Approach (AD, PDU, SA), pp. 51–54.
SEKE-2012-FerreiraS #overview- An Overview of the RSLingo Approach (DdAF, ARdS), pp. 66–69.
SEKE-2012-GrunwaldM #named #owl #uml- umlTUowl — A Both Generic and Vendor-specific Approach for UML to OWL Transformation (AG, TM), pp. 730–736.
SEKE-2012-JlaielA #novel #process #reuse #semantics #towards- Towards a Novel Semantic Approach for Process Patterns’ Capitalization and Reuse (NJ, MBA), pp. 505–510.
SEKE-2012-LeeS #re-engineering- A Process-Based Approach to Improving Knowledge Sharing in Software Engineering (SBL, KS), pp. 700–705.
SEKE-2012-RakaLM #generative #modelling #product line- Interoperable EMR Message Generation: A Model-Driven Software Product Line Approach (DR, SHL, MM), pp. 537–540.
SEKE-2012-WangL #analysis #modelling #petri net #workflow- Resource Modeling and Analysis for Workflows: A Petri Net Approach (JW, DL), pp. 381–386.
SEKE-2012-YangCXZZ #multi #optimisation- A New Approach to Evaluate Path Feasibility and Coverage Ratio of EFSM Based on Multi-objective Optimization (RY, ZC, BX, ZZ, WZ), pp. 470–475.
SIGIR-2012-Bonzanini #knowledge-based- A knowledge-based approach for summarising opinions (MB), p. 991.
SIGIR-2012-DangC - Diversity by proportionality: an election-based approach to search result diversification (VD, WBC), pp. 65–74.
SIGIR-2012-Hassan #modelling #web- A semi-supervised approach to modeling web search satisfaction (AH), pp. 275–284.
SIGIR-2012-HauffH #image #microblog- Placing images on the world map: a microblog-based enrichment approach (CH, GJH), pp. 691–700.
SIGIR-2012-JiangWLAW #alias #detection #learning #similarity #string #towards- Towards alias detection without string similarity: an active learning based approach (LJ, JW, PL, NA, MW), pp. 1155–1156.
SIGIR-2012-SinghPR #thread- Retrieving similar discussion forum threads: a structure based approach (AS, DP, DR), pp. 135–144.
SIGIR-2012-YeLL #generative #recommendation #social- Exploring social influence for recommendation: a generative model approach (MY, XL, WCL), pp. 671–680.
SIGIR-2012-YuanCSLM #data-driven #maintenance- Category hierarchy maintenance: a data-driven approach (QY, GC, AS, CYL, NMT), pp. 791–800.
ECMFA-2012-KolovosRWMP #documentation #lightweight #xml- A Lightweight Approach for Managing XML Documents with MDE Languages (DSK, LMR, JRW, NDM, RFP), pp. 118–132.
ECMFA-2012-RadjenovicPRWK #plugin #simulation #uml- A Plug-in Based Approach for UML Model Simulation (AR, RFP, LMR, JW, SK), pp. 328–339.
MoDELS-2012-BehjatiYB #modelling #reuse #similarity #using- A Modeling Approach to Support the Similarity-Based Reuse of Configuration Data (RB, TY, LCB), pp. 497–513.
MoDELS-2012-CuadradoLG #bottom-up #interactive #metamodelling- Bottom-Up Meta-Modelling: An Interactive Approach (JSC, JdL, EG), pp. 3–19.
MoDELS-2012-GonzalezC #atl #generative #named #testing- ATLTest: A White-Box Test Generation Approach for ATL Transformations (CAG, JC), pp. 449–464.
MoDELS-2012-KainzBK #model transformation- A Generic Approach Simplifying Model-to-Model Transformation Chains (GK, CB, AK), pp. 579–594.
MoDELS-2012-SchulzeCA #modelling #uml- An Approach for Synchronizing UML Models and Narrative Text in Literate Modeling (GS, JCO, JA), pp. 595–608.
MoDELS-2012-SunGBB #industrial #modelling- A Model-Driven Approach to Support Engineering Changes in Industrial Robotics Software (YS, JG, KB, NvB), pp. 368–382.
PLEASE-2012-BaumgartFP #certification #component #functional #performance #safety #towards #using- Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
SPLC-2012-DietrichTSL #linux #robust #variability- A robust approach for variability extraction from the Linux build system (CD, RT, WSP, DL), pp. 21–30.
TOOLS-EUROPE-J-2011-LangerWWC12 #emf #lightweight #modelling- EMF Profiles: A Lightweight Extension Approach for EMF Models (PL, KW, MW, JC), pp. 1–29.
OOPSLA-2012-KaliberaMJV #black box #comprehension #concurrent- A black-box approach to understanding concurrency in DaCapo (TK, MM, REJ, JV), pp. 335–354.
AdaEurope-2012-FariaMP #ada #model checking #source code- An Approach to Model Checking Ada Programs (JMF, JM, JSP), pp. 105–118.
HILT-2012-Sanden #design #modelling #multi- Design of Multitask Software: The Entity-life Modeling Approach (BIS), pp. 1–2.
PADL-2012-GoldbergW #declarative #modelling- A Declarative Approach for Software Modeling (MG, GW), pp. 18–32.
PADL-2012-GuzmanCCH - A Segment-Swapping Approach for Executing Trapped Computations (PCdG, AC, MC, MVH), pp. 138–152.
PEPM-2012-GotoS #functional- An approach to completing variable names for implicitly typed functional languages (TG, IS), pp. 131–140.
POPL-2012-Balabonski #lazy evaluation- A unified approach to fully lazy sharing (TB), pp. 469–480.
PPDP-2012-OlartePRC #automation #concurrent #constraints #linear #verification- A linear concurrent constraint approach for the automatic verification of access permissions (CO, EP, CR, NC), pp. 207–216.
SAS-2012-Alonso-BlasG #cost analysis #on the- On the Limits of the Classical Approach to Cost Analysis (DEAB, SG), pp. 405–421.
RE-2012-Hoffmann #requirements- A Pattern-based approach for analysing requirements in socio-technical systems engineering (AH), pp. 341–344.
RE-2012-MendizabalSS #elicitation #performance #requirements- Log-based approach for performance requirements elicitation and prioritization (OMM, MS, RS), pp. 297–302.
REFSQ-2012-WangLWZW #dependence #impact analysis #simulation- A Simulation Approach for Impact Analysis of Requirement Volatility Considering Dependency Change (JW, JL, QW, HZ, HW), pp. 59–76.
ASE-2012-AminGC #automation #linear #modelling- An automated approach to forecasting QoS attributes based on linear and non-linear time series modeling (AA, LG, AC), pp. 130–139.
ASE-2012-YuanG #clone detection #detection #named #scalability- Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
FSE-2012-ManiCSD #debugging #named #summary- AUSUM: approach for unsupervised bug report summarization (SM, RC, VSS, AD), p. 11.
FSE-2012-NguyenNNN #debugging #multi- Multi-layered approach for recovering l