BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
behaviour
Google behaviour

Tag #behaviour

1798 papers:

EDMEDM-2019-BotelhoBH #detection #re-engineering #student
Machine-Learned or Expert-Engineered Features? Exploring Feature Engineering Methods in Detectors of Student Behavior and Affect (AFB, RSB, NTH).
EDMEDM-2019-GuthrieC #learning #online #quality #student
Adding duration-based quality labels to learning events for improved description of students' online learning behavior (MWG, ZC).
EDMEDM-2019-HowlinD #approach #clustering #detection #fuzzy #student #using
Detecting Outlier Behaviors in Student Progress Trajectories Using a Repeated Fuzzy Clustering Approach (CPH, CDD).
EDMEDM-2019-KarumbaiahOB #metric #performance #student
The Influence of School Demographics on the Relationship Between Students' Help-Seeking Behavior and Performance and Motivational Measures (SK, JO, RSB).
EDMEDM-2019-MussackFSC #learning #problem #similarity #towards
Towards discovering problem similarity through deep learning: combining problem features and user behavior (DM, RF, PS, PCL).
ICSMEICSME-2019-NewmanPA #identifier #modelling
Modeling the Relationship Between Identifier Name and Behavior (CDN, AP, RSA), pp. 376–378.
MSRMSR-2019-YangC0 #development #predict #source code #specification
Predicting co-changes between functionality specifications and source code in behavior driven development (AZHY, DAdC, YZ0), pp. 534–544.
SCAMSCAM-2019-HarrandSMB #bytecode #java
The Strengths and Behavioral Quirks of Java Bytecode Decompilers (NH, CSV, MM, BB), pp. 92–102.
SCAMSCAM-2019-Kessel019a #comparison #equivalence #functional #on the
On the Efficacy of Dynamic Behavior Comparison for Judging Functional Equivalence (MK, CA0), pp. 193–203.
SCAMSCAM-2019-StorerB #automation #development #exclamation #generative #testing
Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites (TS, RB), pp. 228–237.
SEFMSEFM-2019-BravettiZ #contract
Relating Session Types and Behavioural Contracts: The Asynchronous Case (MB, GZ), pp. 29–47.
SEFMSEFM-2019-PappTB #detection #towards
Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment (DP, TT, LB), pp. 491–509.
AIIDEAIIDE-2019-WangSZ #learning #modelling
Beyond Winning and Losing: Modeling Human Motivations and Behaviors with Vector-Valued Inverse Reinforcement Learning (BW, TS, XSZ), pp. 195–201.
AIIDEAIIDE-2019-ZhangSFK #semantics
Knowledge-Powered Inference of Crowd Behaviors in Semantically Rich Environments (XZ, DS, PF, MK), pp. 202–209.
CHI-PLAYCHI-PLAY-2019-AhmadBKTNE #analysis #modelling
Modeling Individual and Team Behavior through Spatio-temporal Analysis (SA, AB, EK, ZT, THDN, MSEN), pp. 601–612.
CoGCoG-2019-AndroulakakisF #evolution #problem
Evolution of Kiting Behavior in a Two Player Combat Problem (PA, ZEF), pp. 1–8.
CoGCoG-2019-FriedmanS
Desirable Behaviors for Companion Bots in First-Person Shooters (AF, JS), pp. 1–8.
CoGCoG-2019-MassoudBBGP #game studies #profiling #using
Eco-driving Profiling and Behavioral Shifts Using IoT Vehicular Sensors Combined with Serious Games (RM, FB, RB, ADG, SP), pp. 1–8.
CoGCoG-2019-ParmeterF #game studies #interactive #music
Influencing the Behavioral Responses of Players in an Interactive Narrative Game through Music and Arousal Congruency (LP, MF), pp. 1–4.
CoGCoG-2019-PellingG #probability
Two Human-Like Imitation-Learning Bots with Probabilistic Behaviors (CP, HJG), pp. 1–7.
CoGCoG-2019-PerezTBF #game studies #interactive #video
Exploring User Motor Behaviour in Bimanual Interactive Video Games (NPP, LT, EB, IF), pp. 1–7.
CoGCoG-2019-SoaresB #classification
Deep Variational Autoencoders for NPC Behaviour Classification (ESS, VB), pp. 1–4.
CoGCoG-2019-WangSCF #game studies #online
Personality and Behavior in Role-based Online Games (ZW, AS, AC, EF), pp. 1–8.
DiGRADiGRA-2019-Lim #game studies #motivation
Different Frames of Players and the Motivation of Prosocial Behaviors in Digital Games (JSL).
CoGVS-Games-2019-HoffmannMW #education #game studies
Perfectionism in Games - Analyzing Playing Behaviors in an Educational Game (GH, RM, CW), pp. 1–4.
CoGVS-Games-2019-ZojajiP #education #towards
Towards Virtual Agents for Supporting Appropriate Small Group Behaviors in Educational Contexts (SZ, CP0), pp. 1–2.
CIKMCIKM-2019-0009XWSWZG #comprehension #online
Understanding Default Behavior in Online Lending (YY0, YX, CW, YS, FW, YZ, MG), pp. 2043–2052.
CIKMCIKM-2019-GhoshS
Session-based Search Behavior in Naturalistic Settings for Learning-related Tasks (SG, CS), pp. 2449–2452.
CIKMCIKM-2019-Pothirattanachaikul #documentation
Analyzing the Effects of Document's Opinion and Credibility on Search Behaviors and Belief Dynamics (SP, TY, YY, MY), pp. 1653–1662.
CIKMCIKM-2019-QianW0 #comprehension #modelling #named #process
BePT: A Behavior-based Process Translator for Interpreting and Understanding Process Models (CQ, LW, AK0), pp. 1873–1882.
CIKMCIKM-2019-ShresthaMAV #graph #interactive #learning #social
Learning from Dynamic User Interaction Graphs to Forecast Diverse Social Behavior (PS, SM, DA, SV), pp. 2033–2042.
CIKMCIKM-2019-WangL #learning #network
Spotting Terrorists by Learning Behavior-aware Heterogeneous Network Embedding (PCW, CTL), pp. 2097–2100.
CIKMCIKM-2019-YangLSB #interactive #predict
Exploring The Interaction Effects for Temporal Spatial Behavior Prediction (HY, TL, YS, EB), pp. 2013–2022.
CIKMCIKM-2019-YeWYJZXY #graph #network #representation
Bayes EMbedding (BEM): Refining Representation by Integrating Knowledge Graphs and Behavior-specific Networks (YY, XW, JY, KJ, JZ, YX, HY), pp. 679–688.
CIKMCIKM-2019-ZhangPZZWXJ #e-commerce #visual notation
Virtual ID Discovery from E-commerce Media at Alibaba: Exploiting Richness of User Click Behavior for Visual Search Relevance (YZ, PP, YZ, KZ, JW, YX, RJ), pp. 2489–2497.
ICMLICML-2019-AyedLC #modelling #process #statistics
Beyond the Chinese Restaurant and Pitman-Yor processes: Statistical Models with double power-law behavior (FA, JL, FC), pp. 395–404.
ICMLICML-2019-HannaNS #evaluation #policy
Importance Sampling Policy Evaluation with an Estimated Behavior Policy (JH, SN, PS), pp. 2605–2613.
ICMLICML-2019-ZhuWYWM #probability
The Anisotropic Noise in Stochastic Gradient Descent: Its Behavior of Escaping from Sharp Minima and Regularization Effects (ZZ, JW, BY, LW, JM), pp. 7654–7663.
KDDKDD-2019-BellettiCC #dependence
Quantifying Long Range Dependence in Language and User Behavior to improve RNNs (FB, MC, EHC), pp. 1317–1327.
KDDKDD-2019-ChenSJ0Z0 #effectiveness #performance #recommendation #reuse #using
Effective and Efficient Reuse of Past Travel Behavior for Route Recommendation (LC, SS, CSJ, BY0, ZZ, LS0), pp. 488–498.
KDDKDD-2019-ChenZBXL #predict #what
Investment Behaviors Can Tell What Inside: Exploring Stock Intrinsic Properties for Stock Trend Prediction (CC, LZ, JB0, CX, TYL), pp. 2376–2384.
KDDKDD-2019-GuoHJZW0 #multi #network #predict #realtime #using
Buying or Browsing?: Predicting Real-time Purchasing Intent using Attention-based Deep Network with Multiple Behavior (LG, LH, RJ, BZ, XW, BC0), pp. 1984–1992.
KDDKDD-2019-HuangWZZZYC #modelling #multi #online #predict
Online Purchase Prediction via Multi-Scale Modeling of Behavior Dynamics (CH0, XW, XZ, CZ, JZ, DY, NVC), pp. 2613–2622.
KDDKDD-2019-NosakhareP #modelling #probability
Probabilistic Latent Variable Modeling for Assessing Behavioral Influences on Well-Being (EN, RWP), pp. 2718–2726.
KDDKDD-2019-PiBZZG #modelling #predict
Practice on Long Sequential User Behavior Modeling for Click-Through Rate Prediction (QP, WB, GZ, XZ, KG), pp. 2671–2679.
KDDKDD-2019-WangJCJ #named #predict
TUBE: Embedding Behavior Outcomes for Predicting Success (DW, TJ, NVC, MJ0), pp. 1682–1690.
KDDKDD-2019-YabeTSSU #predict #using #web
Predicting Evacuation Decisions using Representations of Individuals' Pre-Disaster Web Search Behavior (TY, KT, TS, YS, SVU), pp. 2707–2717.
MoDELSMoDELS-2019-AlferezPSBR #development #modelling #requirements
Bridging the Gap between Requirements Modeling and Behavior-Driven Development (MA, FP, MS, LCB, JRR), pp. 239–249.
PLDIPLDI-2019-ScalasYB #message passing #source code #verification
Verifying message-passing programs with dependent behavioural types (AS, NY, EB), pp. 502–516.
ASEASE-2019-ChenSHWL #case study #experience #generative #testing #using
An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User Behaviour (JC, WS, AEH, YW, JL), pp. 669–681.
ESEC-FSEESEC-FSE-2019-MenghiNGB #automation #generative #modelling #nondeterminism #online #testing
Generating automated and online test oracles for Simulink models with continuous and uncertain behaviors (CM, SN, KG, LCB), pp. 27–38.
ICSE-2019-AbidSDAM #developer #java #matter
Developer reading behavior while summarizing Java methods: size and context matters (NJA, BS, ND, HA, JIM), pp. 384–395.
ASPLOSASPLOS-2019-DangwalCMS
Safer Program Behavior Sharing Through Trace Wringing (DD, WC, JM, TS), pp. 1059–1072.
CASECASE-2019-AzefackPAGCBX #approach #detection #smarttech
An Approach for Behavioral Drift Detection in a Smart Home (CA, RP, VA, GG, CMC, RB, XX), pp. 727–732.
CASECASE-2019-BabuZBCM #recognition
An Intelligent Action Recognition System to assess Cognitive Behavior for Executive Function Disorder (ARB, MZ, JRB, DC, FM), pp. 164–169.
CASECASE-2019-GaoZ0 #learning #modelling #navigation
Modeling Socially Normative Navigation Behaviors from Demonstrations with Inverse Reinforcement Learning (XG, XZ, MT0), pp. 1333–1340.
CGOCGO-2019-NelsonP #comprehension
Understanding RDMA Behavior in NUMA Systems (JN, RP), pp. 273–274.
ICTSSICTSS-2019-AichernigB0HPRR #hybrid #machine learning #modelling #testing
Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning (BKA, RB, ME0, MH, FP, WR, AR, MT, MT), pp. 3–21.
EDMEDM-2018-ChenLCBC #analysis #learning #scalability
Behavioral Analysis at Scale: Learning Course Prerequisite Structures from Learner Clickstreams (WC, ASL, DC, CGB, MC).
EDMEDM-2018-DuDP #analysis #learning #named
ELBA: Exceptional Learning Behavior Analysis (XD, WD, MP).
EDMEDM-2018-GitinabardKLW #certification #predict #social
Your Actions or Your Associates? Predicting Certification and Dropout in MOOCs with Behavioral and Social Features (NG, FK, CL, EYW).
EDMEDM-2018-LorenzenHA #education #online #student
Tracking Behavioral Patterns among Students in an Online Educational System (SL, NH, SA).
EDMEDM-2018-RajendranKCLB #learning #predict
Predicting Learning by Analyzing Eye-Gaze Data of Reading Behavior (RR, AK, KEC, DTL, GB).
EDMEDM-2018-SawyerRAL #analysis #game studies #learning #problem #student
Filtered Time Series Analyses of Student Problem-Solving Behaviors in Game-based Learning (RS, JPR, RA, JCL).
EDMEDM-2018-SinghSCD #learning #modelling #multi #student
Modeling Hint-Taking Behavior and Knowledge State of Students with Multi-Task Learning (HS, SKS, RC, PD).
ICPCICPC-2018-LiNJWHW #evolution #learning #named
Logtracker: learning log revision behaviors proactively from software evolution history (SL, XN, ZJ, JW, HH, TW0), pp. 178–188.
ICPCICPC-2018-LiuDAA #component #execution #identification #interface
Component interface identification and behavioral model discovery from software execution data (CL, BFvD, NA, WMPvdA), pp. 97–107.
MSRMSR-2018-CiborowskaKD #detection #developer #reuse #using #web
Detecting and characterizing developer behavior following opportunistic reuse of code snippets from the web (AC, NAK, KD), pp. 94–97.
MSRMSR-2018-Soto-ValeroBB #analysis #debugging #detection #process
Detection and analysis of behavioral T-patterns in debugging activities (CSV, JB, BB), pp. 110–113.
SANERSANER-2018-BinamunguE0 #challenge #development #maintenance #specification
Maintaining behaviour driven development specifications: Challenges and opportunities (LPB, SME, NK0), pp. 175–184.
IFM-2018-KamburjanC
Stateful Behavioral Types for Active Objects (EK, TCC), pp. 214–235.
AIIDEAIIDE-2018-NeufeldMB #approach #execution #hybrid #network
A Hybrid Approach to Planning and Execution in Dynamic Environments Through Hierarchical Task Networks and Behavior Trees (XN, SM, SB), pp. 201–207.
AIIDEAIIDE-2018-OliveiraNSR #evolution #interactive
Evolving Behaviors for an Interactive Cube-Based Artifact (VMO, HADdN, FAAMNS, CSR), pp. 81–87.
CHI-PLAYCHI-PLAY-2018-PfauSM #modelling #towards
Towards Deep Player Behavior Models in MMORPGs (JP, JDS, RM), pp. 381–392.
CoGCIG-2018-IshiharaIIHT #game studies #implementation #monte carlo
Monte-Carlo Tree Search for Implementation of Dynamic Difficulty Adjustment Fighting Game AIs Having Believable Behaviors (MI, SI, RI, TH, RT), pp. 1–8.
CIKMCIKM-2018-CaiBWSSW #interactive #modelling #online #process
Modeling Sequential Online Interactive Behaviors with Temporal Point Process (RC, XB, ZW, YS, PS, HW), pp. 873–882.
CIKMCIKM-2018-CaoCCTLL #assessment #community #detection #enterprise #network
Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks (CC, ZC, JC, LAT, CL, ZL), pp. 1977–1985.
CIKMCIKM-2018-ChenKBRKKB #analysis #predict
Predictive Analysis by Leveraging Temporal User Behavior and User Embeddings (CC, SK, HB, RAR, EK, BK, RCB), pp. 2175–2182.
CIKMCIKM-2018-GeZZCLYHLSLYHZZ #image #matter #modelling #using #visual notation
Image Matters: Visually Modeling User Behaviors Using Advanced Model Server (TG, LZ, GZ, KC, SL, HY, ZH, BL, PS, HL, PY, SH, ZZ, XZ, YZ, KG), pp. 2087–2095.
CIKMCIKM-2018-KrishnanSS #learning #online
Insights from the Long-Tail: Learning Latent Representations of Online User Behavior in the Presence of Skew and Sparsity (AK, AS, HS), pp. 297–306.
CIKMCIKM-2018-LeiXWP #mining #named
CAPatternMiner: Mining Ship Collision Avoidance Behavior from AIS Trajectory Data (PRL, LPX, YTW, WCP), pp. 1875–1878.
CIKMCIKM-2018-SantuLCZ #modelling #named
JIM: Joint Influence Modeling for Collective Search Behavior (SKKS, LL, YC, CZ), pp. 637–646.
CIKMCIKM-2018-ShuaiLYLLY #network #social
Newsfeed Filtering and Dissemination for Behavioral Therapy on Social Network Addictions (HHS, YCL, DNY, YFL, WCL, PSY), pp. 597–606.
CIKMCIKM-2018-WuSDHFC #named #rest
RESTFul: Resolution-Aware Forecasting of Behavioral Time Series Data (XW, BS, YD, CH0, LF, NVC), pp. 1073–1082.
CIKMCIKM-2018-YamamotoYF #people #towards #web
Exploring People's Attitudes and Behaviors Toward Careful Information Seeking in Web Search (TY, YY, SF), pp. 963–972.
CIKMCIKM-2018-ZhuangTD #question #sequence
Can User Behaviour Sequences Reflect Perceived Novelty? (MZ, EGT, GD), pp. 1507–1510.
ECIRECIR-2018-BrazierH #case study #comparative
A Comparative Study of Native and Non-native Information Seeking Behaviours (DB, MH), pp. 237–248.
ECIRECIR-2018-MaxwellA #modelling
Information Scent, Searching and Stopping - Modelling SERP Level Stopping Behaviour (DM, LA), pp. 210–222.
ICMLICML-2018-NieZP #visualisation
A Theoretical Explanation for Perplexing Behaviors of Backpropagation-based Visualizations (WN, YZ, AP), pp. 3806–3815.
ICMLICML-2018-ZhitnikovMM #statistics
Revealing Common Statistical Behaviors in Heterogeneous Populations (AZ, RM, TM), pp. 5945–5954.
ICPRICPR-2018-DehzangiM #predict #using
Unobtrusive Driver Drowsiness Prediction Using Driving Behavior from Vehicular Sensors (OD, SM), pp. 3598–3603.
ICPRICPR-2018-DhakaIS #linear #modelling
Latent Linear Dynamics for Modeling Pedestrian Behaviors (DD, MI, AS), pp. 1592–1597.
ICPRICPR-2018-JinZWJ #clustering #detection #representation
Sparse Representation and Weighted Clustering Based Abnormal Behavior Detection (DJ, SZ, SW, XYJ), pp. 1574–1579.
ICPRICPR-2018-SunZWJ #detection #learning
Weak Supervised Learning Based Abnormal Behavior Detection (XS, SZ, SW, XYJ), pp. 1580–1585.
ICPRICPR-2018-YangCTWZ #recognition
Recognition of Infants' Gaze Behaviors and Emotions (BY, JC, YT, LW, HZ), pp. 3204–3209.
KDDKDD-2018-BaiQD #modelling
Discovering Models from Structural and Behavioral Brain Imaging Data (ZB, BQ, ID), pp. 1128–1137.
KDDKDD-2018-ChungCHLE #detection #visual notation
Detection of Apathy in Alzheimer Patients by Analysing Visual Scanning Behaviour with RNNs (JC, SAC, NH, KLL, ME), pp. 149–157.
KDDKDD-2018-GongW #analysis #modelling #network #sentiment #social
When Sentiment Analysis Meets Social Network: A Holistic User Behavior Modeling in Opinionated Data (LG, HW), pp. 1455–1464.
KDDKDD-2018-HangPN #predict #student
Exploring Student Check-In Behavior for Improved Point-of-Interest Prediction (MH, IP, JN), pp. 321–330.
KDDKDD-2018-LiZLHMC #learning #recommendation
Learning from History and Present: Next-item Recommendation via Discriminatively Exploiting User Behaviors (ZL, HZ, QL0, ZH, TM, EC), pp. 1734–1743.
KDDKDD-2018-WangFZWZA #analysis #how #learning #representation
You Are How You Drive: Peer and Temporal-Aware Representation Learning for Driving Behavior Analysis (PW, YF, JZ, PW, YZ, CCA), pp. 2457–2466.
KDDKDD-2018-WangJZEC #learning #multi
Multi-Type Itemset Embedding for Learning Behavior Success (DW, MJ0, QZ, ZE, NVC), pp. 2397–2406.
MoDELSMoDELS-2018-ChenKSPJ
Digital Behavioral Twins for Safe Connected Cars (XC, EK, SS, VMP, ZJ), pp. 144–153.
ECOOPECOOP-2018-AnconaDZ #infinity #modelling
Modeling Infinite Behaviour by Corules (DA, FD, EZ), p. 31.
POPLPOPL-2018-BaoKPS #modelling #source code
Analytical modeling of cache behavior for affine programs (WB, SK, LNP, PS), p. 26.
SASSAS-2018-PrabhuMV #learning #proving #safety
Efficiently Learning Safety Proofs from Appearance as well as Behaviours (SP, KM, RV), pp. 326–343.
ESEC-FSEESEC-FSE-2018-LlerenaBBSR #modelling #nondeterminism #probability #verification
Verifying the long-run behavior of probabilistic system models in the presence of uncertainty (YRSL, MB, MB, GS, DSR), pp. 587–597.
ICSE-2018-BellerSSZ #debugging #on the
On the dichotomy of debugging behavior among programmers (MB, NS, DS, AZ), pp. 572–583.
ICSE-2018-DamevskiCSKP #developer #ide #modelling #predict #topic #using
Predicting future developer behavior in the IDE using topic models (KD, HC, DCS, NAK, LLP), p. 932.
ICSE-2018-DanglotPBM #case study #correctness #runtime
Correctness attraction: a study of stability of software behavior under runtime perturbation (BD, PP, BB, MM), p. 481.
ICSE-2018-LangeNTY #framework #message passing #using #verification
A static verification framework for message passing in Go using behavioural types (JL, NN, BT, NY), pp. 1137–1148.
ICSE-2018-MadalaDA #approach #combinator
A combinatorial approach for exposing off-nominal behaviors (KM, HD, DA), pp. 910–920.
ICSE-2018-ShanNS #android #detection #self
Self-hiding behavior in Android apps: detection and characterization (ZS, IN, RS), pp. 728–739.
CASECASE-2018-FleischerBCRKT #automation #integration #metric #process
Integration of Electronic Pipettes into a Dual-arm Robotic System for Automated Analytical Measurement Processes Behaviors (HF, DB, XC, TR, MK, KT), pp. 22–27.
CASECASE-2018-RenWLG #learning #online #video
Learning Traffic Behaviors by Extracting Vehicle Trajectories from Online Video Streams (XR, DW, ML, KG), pp. 1276–1283.
ESOPESOP-2018-SimpsonV #algebra #equivalence
Behavioural Equivalence via Modalities for Algebraic Effects (AS, NFWV), pp. 300–326.
ICSTICST-2018-HendersonP #control flow #fault #locality
Behavioral Fault Localization by Sampling Suspicious Dynamic Control Flow Subgraphs (TADH, AP), pp. 93–104.
ICSTICST-2018-JiLCPZ0YL #network #nondeterminism #search-based #testing
Uncovering Unknown System Behaviors in Uncertain Networks with Model and Search-Based Testing (RJ, ZL, SC, MP, TZ0, SA0, TY0, XL), pp. 204–214.
ICTSSICTSS-2018-DesaiG #constraints #generative #ocl #testing
Generating OCL Constraints from Test Case Schemas For Testing Model Behavior (ND0, MG), pp. 62–68.
ICSAICSA-2017-CzepaTZKWR #architecture #constraints #empirical #on the #semantics
On the Understandability of Semantic Constraints for Behavioral Software Architecture Compliance: A Controlled Experiment (CC, HT, UZ, TTTK, EW, CR), pp. 155–164.
JCDLJCDL-2017-SinghNGBMG #case study #dataset #reuse
Citation Sentence Reuse Behavior of Scientists: A Case Study on Massive Bibliographic Text Dataset of Computer Science (MS0, AN, DG, NAB, AM0, PG), pp. 277–280.
EDMEDM-2017-AnKM #question
Can Typical Behaviors Identified in MOOCs be Discovered in Other Courses? (TSA, CK, AM).
EDMEDM-2017-BauerFP #analysis #challenge #game studies #problem
Analysis of problem-solving behavior in open-ended scientific-discovery game challenges (AB, JF, ZP).
EDMEDM-2017-DongB #learning #modelling #student
An Extended Learner Modeling Method to Assess Students' Learning Behaviors (YD, GB).
EDMEDM-2017-GeigleZ #markov #modelling #student
Modeling MOOC Student Behavior With Two-Layer Hidden Markov Models (CG, CZ).
EDMEDM-2017-HarrakBL #identification #student
Identifying relationships between students' questions type and their behavior (FH, FB, VL).
EDMEDM-2017-KaiAPBMWM #online #predict #student
Predicting Student Retention from Behavior in an Online Orientation Course (SK, JMLA, LP, RSB, KM, HW, MM).
EDMEDM-2017-KarumbaiahLAWA #student
Addressing Student Behavior and Affect with Empathy and Growth Mindset (SK, RL, DA, BPW, IA).
EDMEDM-2017-LanBYC
Behavior-Based Latent Variable Model for Learner Engagement (ASL, CGB, TYY, MC).
EDMEDM-2017-ParedesHH #comprehension #programming #student #using
Understanding Student's Reviewing and Reflection Behaviors Using Web-based Programming Grading Assistant (YVMP, PKH, SIHH).
ICPCICPC-2017-AlexandruPG #parsing #using
Replicating parser behavior using neural machine translation (CVA, SP, HCG), pp. 316–319.
ICPCICPC-2017-BorgAR #impact analysis
Software engineers' information seeking behavior in change impact analysis: an interview study (MB, EA, PR), pp. 12–22.
ICPCICPC-2017-MostafaRW #android #maintenance #named #network
NetDroid: summarizing network behavior of Android apps for network code maintenance (SM, RR, XW), pp. 165–175.
ICSMEICSME-2017-ChaparroFM #debugging #locality #query #using
Using Observed Behavior to Reformulate Queries during Text Retrieval-based Bug Localization (OC, JMF, AM), pp. 376–387.
ICSMEICSME-2017-CokerDGKSP #exception #metric
Behavior Metrics for Prioritizing Investigations of Exceptions (ZC, KD, CLG, NAK, DCS, LLP), pp. 554–563.
ICSMEICSME-2017-Rodeghero #algorithm #automation #documentation #generative
Behavior-Informed Algorithms for Automatic Documentation Generation (PR), pp. 660–664.
SANERSANER-2017-MaruyamaHYC #refactoring
Frame-based behavior preservation in refactoring (KM, SH, NY, EC), pp. 573–574.
SANERSANER-2017-MoonSLK #analysis #generative #how #what
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding (RJM, KMS, HYL, HJK), pp. 575–576.
AIIDEAIIDE-2017-BunianCCE #difference #game studies #modelling #using
Modeling Individual Differences in Game Behavior Using HMM (SB, AC, RCC, MSEN), pp. 158–164.
AIIDEAIIDE-2017-DrakeSL #adaptation #towards
Towards Adaptability of Demonstration-Based Training of NPC Behavior (JD, AS, ML), pp. 179–185.
AIIDEAIIDE-2017-WangRMML #data-driven #interactive #personalisation #simulation
Simulating Player Behavior for Data-Driven Interactive Narrative Personalization (PW, JPR, WM, BWM, JCL), pp. 255–261.
CHI-PLAYCHI-PLAY-2017-SchaekermannRWK #game studies #metric #motivation #profiling #self
Curiously Motivated: Profiling Curiosity with Self-Reports and Behaviour Metrics in the Game “Destiny” (MS, GR, GW, SK, DMJ0, AD, RS, LEN), pp. 143–156.
CHI-PLAYCHI-PLAY-2017-SeeleMBHS #artificial reality #exclamation #game studies #how #question #social
Here's Looking At You Anyway!: How Important is Realistic Gaze Behavior in Co-located Social Virtual Reality Games? (SS, SM, HB, RH, JS), pp. 531–540.
CoGCIG-2017-GrossiR #communication #multi
Evolved communication strategies and emergent behaviour of multi-agents in pursuit domains (GG, BR), pp. 110–117.
CoGCIG-2017-LoiaconoA #evolution
Fight or flight: Evolving maps for cube 2 to foster a fleeing behavior (DL, LA), pp. 199–206.
CoGCIG-2017-PhucNK #learning #statistics #using
Learning human-like behaviors using neuroevolution with statistical penalties (LHP, KN, KI), pp. 207–214.
FDGFDG-2017-KariAS
Behavior change types with Pokémon GO (TK, JA, MS), p. 10.
FDGFDG-2017-KouJV #community #game studies #online
Prosocial behavior in an online game community: an ethnographic study (YK, MJ, HV), p. 6.
FDGFDG-2017-RaimbaultC #clustering #game studies
Session based behavioral clustering in open world sandbox game TUG (MSR, CC), p. 4.
CIKMCIKM-2017-CaiLZ #detection #modelling #social
Detecting Social Bots by Jointly Modeling Deep Behavior and Content Information (CC, LL, DZ), pp. 1995–1998.
CIKMCIKM-2017-ChenYW0HZ
Exploiting Spatio-Temporal User Behaviors for User Linkage (WC, HY, WW0, LZ0, WH, XZ0), pp. 517–526.
CIKMCIKM-2017-LiuL #effectiveness
Exploiting User Consuming Behavior for Effective Item Tagging (SL, HL), pp. 2175–2178.
CIKMCIKM-2017-WangFTH #modelling #recommendation #topic #visual notation
Improving the Gain of Visual Perceptual Behaviour on Topic Modeling for Text Recommendation (CW, YF, ZT, YH), pp. 2339–2342.
CIKMCIKM-2017-WuSZ #approach #detection #modelling #performance
A Fast Trajectory Outlier Detection Approach via Driving Behavior Modeling (HW0, WS, BZ), pp. 837–846.
CIKMCIKM-2017-YanLWLZJZ #on the #video
On Migratory Behavior in Video Consumption (HY, THL, GW0, YL0, HZ0, DJ, BYZ), pp. 1109–1118.
CIKMCIKM-2017-ZhuangDT #comprehension
Understanding Engagement through Search Behaviour (MZ, GD, EGT), pp. 1957–1966.
ECIRECIR-2017-BrazierH #case study
E-Government and the Digital Divide: A Study of English-as-a-Second-Language Users' Information Behaviour (DB, MH), pp. 266–277.
ECIRECIR-2017-CapraAZ
The Effects of Search Task Determinability on Search Behavior (RC, JA, YZ), pp. 108–121.
ECIRECIR-2017-SepliarskaiaRR #personalisation
Simple Personalized Search Based on Long-Term Behavioral Signals (AS, FR, MdR), pp. 95–107.
ICMLICML-2017-FarinaKS #game studies
Regret Minimization in Behaviorally-Constrained Zero-Sum Games (GF, CK, TS), pp. 1107–1116.
ICMLICML-2017-HannaTSN #evaluation #policy
Data-Efficient Policy Evaluation Through Behavior Policy Search (JPH, PST, PS, SN), pp. 1394–1403.
KDDKDD-2017-Cao
Behavior Informatics to Discover Behavior Insight for Active and Tailored Client Management (LC), pp. 15–16.
KDDKDD-2017-XiaoGVT #learning
Learning Temporal State of Diabetes Patients via Combining Behavioral and Demographic Data (HX, JG0, LHV, DST), pp. 2081–2089.
KDDKDD-2017-YuCSZY #framework #social
A Temporally Heterogeneous Survival Framework with Application to Social Behavior Dynamics (LY, PC0, CS, TZ, SY), pp. 1295–1304.
PLDIPLDI-2017-LeeKSHDMRL
Taming undefined behavior in LLVM (JL, YK, YS, CKH, SD, DM, JR, NPL), pp. 633–647.
ESEC-FSEESEC-FSE-2017-PastoreMM #identification #named
BDCI: behavioral driven conflict identification (FP, LM, DM), pp. 570–581.
ESEC-FSEESEC-FSE-2017-RegisCBPRPAGF #alloy #analysis #modelling #specification
DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviour (GR, CC, SGB, MP, FR, PP, NA, JPG, MFF), pp. 969–973.
ASPLOSASPLOS-2017-KimTGJPW
Kill the Program Counter: Reconstructing Program Behavior in the Processor Cache Hierarchy (JK, ET, PVG, DAJ, SHP, CW), pp. 737–749.
CASECASE-2017-NagavalliCS #multi #on the #scheduling
On time-optimal behavior scheduling of robotic swarms for achieving multiple goals (SN, NC, KPS), pp. 1546–1553.
CASECASE-2017-YaoWL #game studies
Gaming behavior in wholesale electricity markets with active demand response (GY, JW, XL), pp. 1186–1190.
ESOPESOP-2017-CairesP
Linearity, Control Effects, and Behavioral Types (LC, JAP), pp. 229–259.
ICSTICST-2017-WangBO #comparison #execution #question #testing
Behavioral Execution Comparison: Are Tests Representative of Field Behavior? (QW, YB, AO), pp. 321–332.
TAPTAP-2017-GogollaHDD #ocl #uml
Checking UML and OCL Model Behavior with Filmstripping and Classifying Terms (MG, FH, KHD, ND0), pp. 119–128.
WICSAWICSA-2016-NicolaescuL #architecture #consistency #re-engineering
Behavior-Based Architecture Reconstruction and Conformance Checking (AN, HL), pp. 152–157.
WICSAWICSA-2016-OquendoLB #architecture #specification
Specifying Architecture Behavior with SysADL (FO, JCL, TB), pp. 140–145.
EDMEDM-2016-CraigHXFH #identification #learning #persistent #predict
Identifying relevant user behavior and predicting learning and persistence in an ITS-based afterschool program (SDC, XH, JX, YF, XH), pp. 581–582.
EDMEDM-2016-GelmanRDVJ #comparison
Acting the Same Differently: A Cross-Course Comparison of User Behavior in MOOCs (BUG, MR, CD, KV, AJ), pp. 376–381.
EDMEDM-2016-JoTFRG #learning #modelling #social
Expediting Support for Social Learning with Behavior Modeling (YJ, GT, OF, CPR, DG), pp. 400–405.
EDMEDM-2016-LiuBLBBBM #analysis
MOOC Learner Behaviors by Country and Culture; an Exploratory Analysis (ZL, RB, CL, TB, RSB, YB, DSM), pp. 127–134.
EDMEDM-2016-MalkiewichBSKP #education #game studies #problem
Classifying behavior to elucidate elegant problem solving in an educational game (LM, RSB, VS, SK, LP), pp. 448–453.
EDMEDM-2016-McBroomJKY #mining #student
Mining behaviors of students in autograding submission system logs (JM, BJ, IK, KY), pp. 159–166.
EDMEDM-2016-MoriC #identification #online #performance #student
Identifying Student Behaviors Early in the Term for Improving Online Course Performance (MM, PC), pp. 611–612.
EDMEDM-2016-Nam #adaptation #learning #predict
Predicting Off-task Behaviors for Adaptive Vocabulary Learning System (SN), pp. 672–674.
EDMEDM-2016-RamanarayananK #collaboration #novel #problem
Novel features for capturing cooccurrence behavior in dyadic collaborative problem solving tasks (VR, SK), pp. 620–621.
EDMEDM-2016-TissenbaumBK #game studies #markov #modelling #visitor
Modeling Visitor Behavior in a Game-Based Engineering Museum Exhibit with Hidden Markov Models (MT, MB, VK), pp. 517–522.
EDMEDM-2016-TomkinsRG #case study #performance #predict #student
Predicting Post-Test Performance from Student Behavior: A High School MOOC Case Study (ST, AR, LG), pp. 239–246.
ICPCICPC-2016-MakiharaIYFI #detection #programming
Detecting exploratory programming behaviors for introductory programming exercises (EM, HI, NY, KF, HI), pp. 1–4.
MSRMSR-2016-AveryDSG #mining
Externalization of software behavior by the mining of norms (DA, HKD, BTRS, AKG), pp. 223–234.
SANERSANER-2016-LimaSLCMF #energy #functional #haskell
Haskell in Green Land: Analyzing the Energy Behavior of a Purely Functional Language (LGL, FSN, PL, FC, GM, JPF), pp. 517–528.
SANERSANER-2016-YuLQW #android
Revisiting the Description-to-Behavior Fidelity in Android Applications (LY, XL, CQ, SW0), pp. 415–426.
CIAACIAA-2016-WeidemanMBW #ambiguity #automaton #backtracking #nondeterminism #regular expression #using
Analyzing Matching Time Behavior of Backtracking Regular Expression Matchers by Using Ambiguity of NFA (NW, BvdM, MB, BWW), pp. 322–334.
IFM-2016-ChenAGSM #classification #on the #robust #verification
On Robust Malware Classifiers by Verifying Unwanted Behaviours (WC, DA0, ADG, CAS, IM), pp. 326–341.
AIIDEAIIDE-2016-DebkowskiMYYYFK #collaboration #game studies #multi #named #online #using
Contained: Using Multiplayer Online Games to Quantify Success of Collaborative Group Behavior (DD, AM, NY, LY, YY, SF, MK), pp. 149–154.
AIIDEAIIDE-2016-DrakeSL
Demonstration-Based Training of Non-Player Character Tactical Behaviors (JD, AS, ML), pp. 30–36.
CHI-PLAYCHI-PLAY-2016-RaptisFA #difference #game studies #performance #question
Do Field Dependence-Independence Differences of Game Players Affect Performance and Behaviour in Cultural Heritage Games? (GER, CAF, NMA), pp. 38–43.
CoGCIG-2016-DrachenGGHLSK #analysis #clustering #comparative #profiling
Guns and guardians: Comparative cluster analysis and behavioral profiling in destiny (AD, JG, CG, EH, PL, RS, DK), pp. 1–8.
CoGCIG-2016-SorensenOR #evolution #interactive
Breeding a diversity of Super Mario behaviors through interactive evolution (PDS, JMO, SR), pp. 1–7.
CoGCIG-2016-SungurS #algorithm #learning
Voluntary behavior on cortical learning algorithm based agents (AKS, ES), pp. 1–7.
DiGRADiGRA-FDG-2016-WellsSL #energy #feedback #game studies
Behaviour Change Wheel Driven Normative Feedback in a Serious Game for Energy Conservation (LW, KdS, IJL).
CIKMCIKM-2016-GuoS #analysis #mobile #scalability #towards
Large-Scale Analysis of Viewing Behavior: Towards Measuring Satisfaction with Mobile Proactive Systems (QG, YS), pp. 579–588.
CIKMCIKM-2016-HoLSKDWZS #algorithm #distributed #graph #scalability
A Distributed Graph Algorithm for Discovering Unique Behavioral Groups from Large-Scale Telco Data (QH, WL, ES, SK, TAD, JW, ICZ, ASN), pp. 1353–1362.
CIKMCIKM-2016-MaxwellA #analysis #performance
Agents, Simulated Users and Humans: An Analysis of Performance and Behaviour (DM, LA), pp. 731–740.
CIKMCIKM-2016-Niebler0ZDH #named #navigation #social
FolkTrails: Interpreting Navigation Behavior in a Social Tagging System (TN, MB0, DZ, SD, AH), pp. 2311–2316.
CIKMCIKM-2016-Preotiuc-Pietro #twitter
Studying the Dark Triad of Personality through Twitter Behavior (DPP, JC, SG, LHU), pp. 761–770.
CIKMCIKM-2016-QiuSCCK #crowdsourcing #named #predict
CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection (CQ, ACS, BC, JC, DRK), pp. 539–548.
ECIRECIR-2016-LamposAGZC #social #social media
Inferring the Socioeconomic Status of Social Media Users Based on Behaviour and Language (VL, NA, JKG, BZ, IJC), pp. 689–695.
ECIRECIR-2016-Russell-RoseC #retrieval
Real-World Expertise Retrieval: The Information Seeking Behaviour of Recruitment Professionals (TRR, JC), pp. 669–674.
ECIRECIR-2016-ZhuangTD #evaluation #information retrieval #interactive
The Relationship Between User Perception and User Behaviour in Interactive Information Retrieval Evaluation (MZ, EGT, GD), pp. 293–305.
ICMLICML-2016-AbelHL #abstraction #approximate
Near Optimal Behavior via Approximate State Abstraction (DA, DEH, MLL), pp. 2915–2923.
ICPRICPR-2016-KatsageorgiouZH #analysis #data-driven #interactive
Unsupervised mouse behavior analysis: A data-driven study of mice interactions (VMK, MZ, HH, VF0, FP, DS, VM), pp. 925–930.
ICPRICPR-2016-SuzuuchiK #analysis #multi
Location-associated indoor behavior analysis of multiple persons (SS, MK), pp. 2079–2084.
ICPRICPR-2016-TamboB #predict
Temporal dynamics of tip fluorescence predict cell growth behavior in pollen tubes (ALT, BB), pp. 1171–1176.
ICPRICPR-2016-YangA #online
Analyzing user behavior in online advertising with facial expressions (SY, LA), pp. 4238–4243.
KDDKDD-2016-JiangFH #multi #named #representation
CatchTartan: Representing and Summarizing Dynamic Multicontextual Behaviors (MJ0, CF, JH0), pp. 945–954.
KDDKDD-2016-KhanB #modelling #predict
Predictors without Borders: Behavioral Modeling of Product Adoption in Three Developing Countries (MRK, JEB), pp. 145–154.
KDDKDD-2016-Law #online #profiling #social
Profiling Users from Online Social Behaviors with Applications for Tencent Social Ads (CL), p. 409.
KDDKDD-2016-Lemmerich0SHHS #mining
Mining Subgroups with Exceptional Transition Behavior (FL, MB0, PS, DH, AH, MS), pp. 965–974.
KDDKDD-2016-LethamLR #transaction
Bayesian Inference of Arrival Rate and Substitution Behavior from Sales Transaction Data with Stockouts (BL, LML, CR), pp. 1695–1704.
KDDKDD-2016-LoFL #case study #comprehension
Understanding Behaviors that Lead to Purchasing: A Case Study of Pinterest (CL, DF, JL), pp. 531–540.
KDDKDD-2016-LuoYLSYH #online
From Online Behaviors to Offline Retailing (PL0, SY, ZL, ZS, SY, QH), pp. 175–184.
KDDKDD-2016-TrouleauADE #modelling
Just One More: Modeling Binge Watching Behavior (WT, AA, WD, BE), pp. 1215–1224.
KDDKDD-2016-XuZZLZCX #analysis #network #perspective #social
Taxi Driving Behavior Analysis in Latent Vehicle-to-Vehicle Networks: A Social Influence Perspective (TX, HZ, XZ, QL0, HZ, EC, HX), pp. 1285–1294.
ASEASE-2016-Keng #automation #mobile #privacy #testing
Automated testing and notification of mobile app privacy leak-cause behaviours (JCJK), pp. 880–883.
FSEFSE-2016-Alimadadi #comprehension #javascript
Understanding behavioural patterns in JavaScript (SA), pp. 1076–1078.
FSEFSE-2016-MiucinBF #memory management #profiling
End-to-end memory behavior profiling with DINAMITE (SM, CB, AF), pp. 1042–1046.
ICSE-2016-BusanyM #analysis #statistics
Behavioral log analysis with statistical guarantees (NB, SM), pp. 877–887.
ASPLOSASPLOS-2016-NowatzkiS
Analyzing Behavior Specialized Acceleration (TN, KS), pp. 697–711.
CASECASE-2016-JiLSWLSCJ #analysis #smarttech
A human-centered smart home system with wearable-sensor behavior analysis (JJ, TL0, CS0, HW, WL, MS, SC, ZJ), pp. 1112–1117.
CASECASE-2016-SussD #classification #component #performance #simulation
Classification of mechatronic components for efficient plant behaviour simulation (SS, CD), pp. 1146–1151.
CASECASE-2016-TsaiWPXLFZ #predict #process #smarttech #using
Context-aware activity prediction using human behavior pattern in real smart home environments (MJT, CLW, SKP, YX, TYL, LCF, YCZ), pp. 168–173.
ICSTICST-2016-Kowalczyk #modelling #multi
Modeling App Behavior from Multiple Artifacts (EK), pp. 385–386.
ICTSSICTSS-2016-SuzukiPKT #analysis #network #visualisation
Distribution Visualization for User Behavior Analysis on LTE Network (MS, QP, TK, MT), pp. 249–255.
CBSECBSE-2015-MouelhiACM #component #contract #design #object-oriented #using
Object-Oriented Component-Based Design using Behavioral Contracts: Application to Railway Systems (SM, KA, SC, HM), pp. 49–58.
HTHT-2015-ApaolazaHJ #analysis #interactive #low level #web
Longitudinal Analysis of Low-Level Web Interaction through Micro Behaviours (AA, SH, CJ), pp. 337–340.
HTHT-2015-BurelMHA #community #online #predict
Predicting Answering Behaviour in Online Question Answering Communities (GB, PM, YH, HA), pp. 201–210.
HTHT-2015-GadirajuSFK #categorisation #comprehension
Breaking Bad: Understanding Behavior of Crowd Workers in Categorization Microtasks (UG, PS, BF, RK), pp. 33–38.
EDMEDM-2015-BazalduaKDHLW #collaboration #convergence #on the #process
On Convergence of Cognitive and Non-cognitive Behavior in Collaborative Activity (DLB, SMK, AAvD, JH, LL, ZW), pp. 496–499.
EDMEDM-2015-BorjiginMSZ #assessment #using
Skill Assessment Using Behavior Data in Virtual World (AB, CM, ZS, ZZ), pp. 570–571.
EDMEDM-2015-BumbacherSWB #comprehension #concept #development #how #learning #physics
Learning Environments and Inquiry Behaviors in Science Inquiry Learning: How Their Interplay Affects the Development of Conceptual Understanding in Physics (EB, SS, MW, PB), pp. 61–68.
EDMEDM-2015-EagleBRBAE #game studies #problem
Exploring Problem-Solving Behavior in an Optics Game (ME, RB, ER, TB, JAC, TE), pp. 584–585.
EDMEDM-2015-Fancsali #algebra #learning #modelling #using #visual notation
Confounding Carelessness? Exploring Causal Relationships Between Carelessness, Affect, Behavior, and Learning in Cognitive Tutor Algebra Using Graphical Causal Models (SF), pp. 508–511.
EDMEDM-2015-JedrzejewskiBOZ #education #online
Teacher and Learner Behaviour in an Online EFL Workbook (KJ, MB, MO, JZ, KL), pp. 568–569.
EDMEDM-2015-PedroSBMH
Exploring Dynamical Assessments of Affect, Behavior, and Cognition and Math State Test Achievement (MOSP, ELS, RSB, DSM, NTH), pp. 85–92.
EDMEDM-2015-WangYWKR #how #learning #student
Investigating How Student's Cognitive Behavior in MOOC Discussion Forum Affect Learning Gains (XW0, DY, MW, KRK, CPR), pp. 226–233.
EDMEDM-2015-YeKSB #learning #multi #process #sequence
Learning Behavior Characterization with Multi-Feature, Hierarchical Activity Sequences (CY, JSK, JRS, GB), pp. 380–383.
ICSMEICSME-2015-BiegelLD #java
Live object exploration: Observing and manipulating behavior and state of Java objects (BB, BL, SD), pp. 581–585.
ICSMEICSME-2015-LuciaDGR #automation #design pattern #detection #dynamic analysis #towards
Towards automating dynamic analysis for behavioral design pattern detection (ADL, VD, CG, MR), pp. 161–170.
ICSMEICSME-2015-LuciaDGRP #design pattern #detection #named
ePadEvo: A tool for the detection of behavioral design patterns (ADL, VD, CG, MR, CP), pp. 327–329.
MSRMSR-2015-AhmedSH #development #empirical
An Empirical Study of the Copy and Paste Behavior during Development (TMA, WS, AEH), pp. 99–110.
MSRMSR-2015-Marder #approach #stack overflow
Stack Overflow Badges and User Behavior: An Econometric Approach (AM), pp. 450–453.
FMFM-2015-Hauck-Stattelmann #industrial
Analyzing the Restart Behavior of Industrial Control Applications (SHS, SB, BS, SK, RJ), pp. 585–588.
FMFM-2015-Nakajima #energy #maude #realtime #using
Using Real-Time Maude to Model Check Energy Consumption Behavior (SN), pp. 378–394.
HOFMHOFM-2015-BlechH #component #cyber-physical #development
Behavioral Types for Component-Based Development of Cyber-Physical Systems (JOB, PH), pp. 43–52.
SEFMSEFM-2015-BlomHZ #concurrent #functional #source code #verification
History-Based Verification of Functional Behaviour of Concurrent Programs (SB, MH, MZS), pp. 84–98.
AIIDEAIIDE-2015-BarrigaSB #game studies #realtime
Puppet Search: Enhancing Scripted Behavior by Look-Ahead Search with Applications to Real-Time Strategy Games (NAB, MS, MB), pp. 9–15.
AIIDEAIIDE-2015-LimH #approach #data-driven #modelling
A Data-Driven Approach for Computationally Modeling Players' Avatar Customization Behaviors (CUL, DFH), pp. 135–141.
AIIDEAIIDE-2015-ManavalanBS #algorithm #generative #lightweight
A Lightweight Algorithm for Procedural Generation of Emotionally Affected Behavior and Appearance (YBM, VB, MS), pp. 142–148.
AIIDEAIIDE-2015-SchwabH #automation #generative #modelling #towards
Capturing the Essence: Towards the Automated Generation of Transparent Behavior Models (PS, HH), pp. 184–190.
AIIDEAIIDE-2015-SifaDB #analysis #scalability
Large-Scale Cross-Game Player Behavior Analysis on Steam (RS, AD, CB), pp. 198–204.
CHI-PLAYCHI-PLAY-2015-BaskinZ #analysis #exclamation #interactive #tablet #towards
The Player is Chewing the Tablet!: Towards a Systematic Analysis of User Behavior in Animal-Computer Interaction (SB, AZ), pp. 463–468.
CHI-PLAYCHI-PLAY-2015-SteinemannMO #game studies
Increasing Donating Behavior Through a Game for Change: The Role of Interactivity and Appreciation (STS, EDM, KO), pp. 319–329.
CHI-PLAYCHI-PLAY-2015-Wallner #analysis
Sequential Analysis of Player Behavior (GW), pp. 349–358.
CoGCIG-2015-FarooqBK #game studies #mobile
Interpreting behaviors of mobile game players from in-game data and context logs (SSF, JWB, KJK), pp. 548–549.
CoGCIG-2015-KampmannSHBB #automation #parametricity #simulation
Automatic mapping of human behavior data to personality model parameters for traffic simulations in virtual environments (SK, SS, RH, PB0, CB), pp. 336–343.
CoGCIG-2015-KarpovJM #machine learning
Evaluating team behaviors constructed with human-guided machine learning (IVK, LMJ, RM), pp. 292–298.
CoGCIG-2015-LimH #comprehension
Understanding players' identities and behavioral archetypes from avatar customization data (CUL, DFH), pp. 238–245.
DiGRADiGRA-2015-KaufmanFS #design #embedded #game studies
Creating Stealth Game Interventions for Attitude and Behavior Change: An “Embedded Design” Model (GFK, MF, MS).
FDGFDG-2015-CanossaBETC
In Your Face(t) Impact of Personality and Context on Gameplay Behavior (AC, JBB, MSEN, ST, RCC).
FDGFDG-2015-LevySMWLG #difference #game studies #word
Actions Speak Louder Than Words: An exploration of game play behavior and results from traditional assessments of individual differences (LML, RS, JM, JW, RL, MG).
FDGFDG-2015-MuellerKFKMSSG #analysis #statistics
Statistical Analysis of Player Behavior in Minecraft (SM0, MK, SF, SK, RPM, BS, RWS, MHG).
FDGFDG-2015-PackardO #learning #metric #similarity
Learning Behavior form Demonstration in Minecraft via Symbolic Similarity Measures (BP, SO).
FDGFDG-2015-SubramanianHESS #game studies #health #metric #persuasion
Investigating behavior change indicators and cognitive measures in persuasive health games (SS, SH, MSEN, MS, CS).
CHICHI-2015-AhmedHCCK #people #privacy #visual notation
Privacy Concerns and Behaviors of People with Visual Impairments (TA, RH, KC, DJC, AK), pp. 3523–3532.
CHICHI-2015-ChangLKS #comprehension #gesture #mobile #scalability
Understanding Users’ Touch Behavior on Large Mobile Touch-Screens and Assisted Targeting by Tilting Gesture (YC, SL, KK, JS), pp. 1499–1508.
CHICHI-2015-ChenBBOH #interactive
The Emergence of Interactive Behavior: A Model of Rational Menu Search (XC, GB, DPB, AO, AH), pp. 4217–4226.
CHICHI-2015-DamianTBSLA #feedback #interactive #realtime #social #using
Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques (ID, CSST, TB, JS, KL, EA), pp. 565–574.
CHICHI-2015-EgelmanP #scalability #security
Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS) (SE, EP), pp. 2873–2882.
CHICHI-2015-GadirajuKDD #comprehension #crowdsourcing #online #platform
Understanding Malicious Behavior in Crowdsourcing Platforms: The Case of Online Surveys (UG, RK, SD, GD), pp. 1631–1640.
CHICHI-2015-GunaratneN #performance #user interface #using
Informing and Improving Retirement Saving Performance using Behavioral Economics Theory-driven User Interfaces (JG, ON), pp. 917–920.
CHICHI-2015-HollisKW
Change of Heart: Emotion Tracking to Promote Behavior Change (VH, AK, SW), pp. 2643–2652.
CHICHI-2015-JungSGS #experience #nondeterminism
Displayed Uncertainty Improves Driving Experience and Behavior: The Case of Range Anxiety in an Electric Car (MFJ, DS, TMG, MS), pp. 2201–2210.
CHICHI-2015-KwakBH #contest #game studies #online
Exploring Cyberbullying and Other Toxic Behavior in Team Competition Online Games (HK, JB, SH), pp. 3739–3748.
CHICHI-2015-LaseckiGLLBD #crowdsourcing #privacy #trade-off #video
Exploring Privacy and Accuracy Trade-Offs in Crowdsourced Behavioral Video Coding (WSL, MG, WL, EL, JPB, SPD), pp. 1945–1954.
CHICHI-2015-ParkOSJC #image #scalability #web
A Large-Scale Study of User Image Search Behavior on the Web (JYP, NO, RS, AJ, CWC), pp. 985–994.
CHICHI-2015-RedaJPL #visual notation
Effects of Display Size and Resolution on User Behavior and Insight Acquisition in Visual Exploration (KR, AEJ, MEP, JL), pp. 2759–2768.
CHICHI-2015-ShayBCCFKMMSU #feedback
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior (RS, LB, NC, LFC, AF, SK, MLM, WM, SMS, BU), pp. 2903–2912.
CHICHI-2015-YanHC
Masters of Control: Behavioral Patterns of Simultaneous Unit Group Manipulation in StarCraft 2 (EQY, JH, GKC), pp. 3711–3720.
CSCWCSCW-2015-Erete #communication #how #online
Engaging Around Neighborhood Issues: How Online Communication Affects Offline Behavior (SLE), pp. 1590–1601.
CSCWCSCW-2015-JiaWXRC #learning #online #privacy #process
Risk-taking as a Learning Process for Shaping Teen’s Online Information Privacy Behaviors (HJ, PJW, HX, MBR, JMC), pp. 583–599.
CSCWCSCW-2015-LeeL #comprehension #health #multi #social
Understanding the Roles and Influences of Mediators from Multiple Social Channels for Health Behavior Change (YL, YKL), pp. 1070–1079.
CSCWCSCW-2015-MaddockSASOM #multi #online #using
Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
CSCWCSCW-2015-MarlowD #process #visualisation
The Effects of Visualizing Activity History on Attitudes and Behaviors in a Peer Production Context (JM, LAD), pp. 757–764.
CSCWCSCW-2015-SleeperACKMS #network #social
I Would Like To..., I Shouldn’t..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites (MS, AA, LFC, PGK, SAM, NMS), pp. 1058–1069.
CSCWCSCW-2015-WisniewskiJXRC #how #privacy #quote #social #social media
“Preventative” vs. “Reactive”: How Parental Mediation Influences Teens’ Social Media Privacy Behaviors (PJW, HJ, HX, MBR, JMC), pp. 302–316.
CSCWCSCW-2015-ZhengRSC #comprehension #motivation #student
Understanding Student Motivation, Behaviors and Perceptions in MOOCs (SZ, MBR, PCS, JMC), pp. 1882–1895.
CSCWCSCW-2015-ZouMP
Strategic Voting Behavior in Doodle Polls (JYZ, RM, DCP), pp. 464–472.
HCIDHM-EH-2015-LiaoYGOH #gesture
Effect of Care Gesture on Transfer Care Behavior in Elderly Nursing Home in Japan (ML, TY, AG, TO, HH), pp. 174–183.
HCIDHM-EH-2015-ZhengBISEL #monitoring #using
Driving-Behavior Monitoring Using an Unmanned Aircraft System (UAS) (CZ, AB, WI, IS, EE, KL), pp. 305–312.
HCIDHM-HM-2015-ShodaYSS #analysis #how #people
Exploring How People Collaborate with a Stranger: — Analyses of Verbal and Nonverbal Behaviors in Abstract Art Reproduction (HS, TY, NS, MS), pp. 379–388.
HCIDUXU-DD-2015-ChenXNWZS #research #semantics
Semantic Research of Military Icons Based on Behavioral Experiments and Eye-Tracking Experiments (XJC, CX, YN, HW, JZ, JS), pp. 24–31.
HCIDUXU-DD-2015-FloraB #energy #reduction
Motivators of Energy Reduction Behavioral Intentions: Influences of Technology, Personality Characteristics, Perceptions, and Behavior Barriers (JAF, BB), pp. 436–446.
HCIDUXU-DD-2015-Marcus #mobile #persuasion
The Marriage Machine: Mobile Persuasion/Behavior Change (AM), pp. 513–523.
HCIDUXU-DD-2015-OliveiraMMM #analysis #design
Scenario Analysis as a Tool for Informing the Design of Behaviour Change Interventions (LCRdO, MCM, VM, AJM), pp. 535–547.
HCIDUXU-IXD-2015-GoncalvesQ #automation #case study #interactive
Drivers and Automation: A Study About Cultural and Behavioral Influence in the Interaction with Driver Assistants (RCG, MQ), pp. 462–472.
HCIDUXU-IXD-2015-GuYWD #design #interactive #network #social #visualisation
Visualizing Group User Behaviors for Social Network Interaction Design Iteration (ZG, JMY, ZW, ZD), pp. 36–45.
HCIDUXU-UI-2015-MarczalJ #analysis #mobile
Behavioural Variables Analysis in Mobile Environments (DM, PTAJ), pp. 118–130.
HCIHCI-DE-2015-Semnani-AzadN #automation
Automatic Interpretation of Negotiators’ Affect and Involvement Based on Their Non-verbal Behavior (ZSA, EN), pp. 520–529.
HCIHCI-IT-2015-TakedaBSO #coordination #named
COLUMN: Discovering the User Invented Behaviors Through the Interpersonal Coordination (YT, SB, PRSDS, MO), pp. 787–796.
HCIHIMI-IKC-2015-KosakaN #education
Education Method for Safe Bicycle Riding to Evaluate Actual Cycling Behaviors When Entering an Intersection (HK, MN), pp. 225–232.
HCIHIMI-IKC-2015-ZhouI #adaptation
Effect of Adaptive Caution on Driver’s Lane-Change Behavior under Cognitively Distracted Condition (HZ, MI), pp. 262–271.
HCIHIMI-IKD-2015-FujinawaSINHTH #induction
Induction of Human Behavior by Presentation of Environmental Acoustics (EF, SS, MI, TN, OH, TT, MH), pp. 582–594.
HCIHIMI-IKD-2015-IchiharaHIK #metric
Presentation Method of Walking Sensation Based on Walking Behavior Measurement with Inertial Sensors and Pressure Sensors (KI, KH, YI, MK), pp. 374–385.
HCIHIMI-IKD-2015-SuzukiNSTH #artificial reality #using
Changing Drinking Behavior and Beverage Consumption Using Augmented Reality (ES, TN, SS, TT, MH), pp. 648–660.
ICEISICEIS-v1-2015-FolinoGP #modelling #on the #process
On the Discovery of Explainable and Accurate Behavioral Models for Complex Lowly-structured Business Processes (FF, MG, LP), pp. 206–217.
CIKMCIKM-2015-CaoCLGC
Organic or Organized?: Exploring URL Sharing Behavior (CC, JC, KL, HG, JWC), pp. 513–522.
CIKMCIKM-2015-JiangLSW #clustering #matrix #predict #twitter
Message Clustering based Matrix Factorization Model for Retweeting Behavior Prediction (BJ, JL, YS, LW), pp. 1843–1846.
CIKMCIKM-2015-KiselevaKNM #how #question #what
Behavioral Dynamics from the SERP's Perspective: What are Failed SERPs and How to Fix Them? (JK, JK, VN, NM), pp. 1561–1570.
CIKMCIKM-2015-PreumSQ #adaptation #multi #named #personalisation #predict
MAPer: A Multi-scale Adaptive Personalized Model for Temporal Human Behavior Prediction (SMP, JAS, YQ), pp. 433–442.
CIKMCIKM-2015-ShenSYLLYC #internet #online
Forming Online Support Groups for Internet and Behavior Related Addictions (CYS, HHS, DNY, YFL, WCL, PSY, MSC), pp. 163–172.
CIKMCIKM-2015-WangZZLL #dependence #infinity #modelling #social #topic
Modeling Infinite Topics on Social Behavior Data with Spatio-temporal Dependence (PW0, PZ0, CZ0, ZL, GL), pp. 1919–1922.
CIKMCIKM-2015-YinZSWS #modelling #recommendation
Joint Modeling of User Check-in Behaviors for Point-of-Interest Recommendation (HY, XZ0, YS, HW0, SWS), pp. 1631–1640.
ECIRECIR-2015-CaoC #analysis #detection #social #social media
Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
ECIRECIR-2015-RavariMGCR #mobile
User Behavior in Location Search on Mobile Devices (YNR, IM, AG, MC, MdR), pp. 728–733.
KDDKDD-2015-BeutelAF #detection #graph #modelling #predict
Graph-Based User Behavior Modeling: From Prediction to Fraud Detection (AB, LA, CF), pp. 2309–2310.
RecSysRecSys-2015-Geuens #hybrid #recommendation
Factorization Machines for Hybrid Recommendation Systems Based on Behavioral, Product, and Customer Data (SG), pp. 379–382.
SEKESEKE-2015-LacherWFPNM #empirical #metric
A Behavior Marker tool for measurement of the Non-Technical Skills of Software Professionals: An Empirical Investigation (LLL, GSW, FF, MP, KEN, JM), pp. 409–414.
SIGIRSIGIR-2015-Barreda-Angeles #latency
Unconscious Physiological Effects of Search Latency on Users and Their Click Behaviour (MBÁ, IA, XB, BBC, APB), pp. 203–212.
SIGIRSIGIR-2015-ClarkeSY #effectiveness #evaluation #information retrieval #modelling
IR Evaluation: Modeling User Behavior for Measuring Effectiveness (CLAC, MDS, EY), pp. 1117–1120.
SIGIRSIGIR-2015-KellyA #case study #experience #how #user interface
How many results per page?: A Study of SERP Size, Search Behavior and User Experience (DK, LA), pp. 183–192.
SIGIRSIGIR-2015-Kiseleva #information management #using
Using Contextual Information to Understand Searching and Browsing Behavior (JK), p. 1059.
SIGIRSIGIR-2015-LiDDCZB #markov #process #query
Analyzing User’s Sequential Behavior in Query Auto-Completion via Markov Processes (LL, HD, AD, YC, HZ, RABY), pp. 123–132.
SIGIRSIGIR-2015-LiKF #matrix #predict
Predicting User Behavior in Display Advertising via Dynamic Collective Matrix Factorization (SL, JK, YF), pp. 875–878.
SIGIRSIGIR-2015-WangLWZNM #modelling
Incorporating Non-sequential Behavior into Click Models (CW, YL, MW, KZ, JYN, SM), pp. 283–292.
AMTAMT-2015-DyckGLSG #automation #model transformation #towards #verification
Towards the Automatic Verification of Behavior Preservation at the Transformation Level for Operational Model Transformations (JD, HG, LL, SS, SG), pp. 36–45.
MoDELSMoDELS-2015-LarsenDCM #coordination
A Behavioral Coordination Operator Language (BCOoL) (MEVL, JD, BC, FM), pp. 186–195.
MoDELSMoDELS-2015-PrzigodaHWPD #concurrent #modelling #ocl #uml
Checking concurrent behavior in UML/OCL models (NP, CH, RW, JP, RD), pp. 176–185.
SPLCSPLC-2015-RumpeSWRM #evolution #maintenance #modelling #product line
Behavioral compatibility of simulink models for product line maintenance and evolution (BR, CS, MvW, JOR, PM), pp. 141–150.
ASEASE-2015-LemieuxB #ltl #mining #specification #using
Investigating Program Behavior Using the Texada LTL Specifications Miner (CL, IB), pp. 870–875.
ASEASE-2015-WangD #architecture #message passing #using
A Message-Passing Architecture without Public Ids Using Send-to-Behavior (ESSW, ZD), pp. 902–905.
ESEC-FSEESEC-FSE-2015-BusanyM #analysis #statistics
Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
ICSEICSE-v1-2015-YangXALXE #mobile #named #using
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
ICSEICSE-v2-2015-BaoLXWZ #developer #interactive #modelling #named #using #video
scvRipper: Video Scraping Tool for Modeling Developers’ Behavior Using Interaction Data (LB, JL, ZX, XW, BZ), pp. 673–676.
ICSEICSE-v2-2015-RajanNL0 #repository #scalability #specification
Inferring Behavioral Specifications from Large-scale Repositories by Leveraging Collective Intelligence (HR, TNN, GTL, RD), pp. 579–582.
ICSEICSE-v2-2015-Salgado #cpu #gpu #interactive #kernel #profiling
Profiling Kernels Behavior to Improve CPU / GPU Interactions (RS), pp. 754–756.
SACSAC-2015-0001RMW #approach #constraints #process
Matching of events and activities: an approach based on behavioral constraint satisfaction (TB, ARS, JM, MW), pp. 1225–1230.
SACSAC-2015-DuarteBGCT #generative #towards
Towards context-aware behaviour generation (PAdSD, FMB, FAdAG, WVdC, FAMT), pp. 596–598.
SACSAC-2015-FonooniH #on the #visual notation
On the similarities between control based and behavior based visual servoing (BF, TH), pp. 320–326.
SACSAC-2015-JoshiSIY #architecture #design #embedded #functional #modelling
Mapping functional behavior onto architectural model in a model driven embedded system design (PJ, SKS, JPT, HY), pp. 1624–1630.
SACSAC-2015-PaivaBSIJ #learning #recommendation #student
Improving pedagogical recommendations by classifying students according to their interactional behavior in a gamified learning environment (ROAP, IIB, APdS, SI, PAJ), pp. 233–238.
SACSAC-2015-RajtmajerGMS #game studies #network #online #social
An evolutionary game model for the spread of non-cooperative behavior in online social networks (SMR, CG, DM, ACS), pp. 1154–1159.
SACSAC-2015-RodriguesBM #approach #clustering #correlation #energy #using
Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SACSAC-2015-TambeN #game studies #modelling #resource management #robust #security
Robust resource allocation in security games and ensemble modeling of adversary behavior (AT, TN), pp. 277–282.
SACSAC-2015-VilelaCPSCL #modelling
Deriving the behavior of context-sensitive systems from contextual goal models (JV, JBdC, JP, MS, PC, ML), pp. 1397–1400.
GPCEGPCE-2015-RingertRW #code generation
Composing code generators for C&C ADLs with Application-specific behavior languages (JOR, BR, AW), pp. 113–116.
ASPLOSASPLOS-2015-AlglaveBDGKPSW #concurrent #gpu #programming
GPU Concurrency: Weak Behaviours and Programming Assumptions (JA, MB, AFD, GG, JK, DP, TS, JW), pp. 577–591.
CASECASE-2015-CarmenateRLBM #analysis #approach #energy #modelling #using
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-NohAH #assessment
Situation assessment and behavior decision for vehicle/driver cooperative driving in highway environments (SN, KA, WH), pp. 626–633.
CASECASE-2015-ParisACAR #learning #markov #smarttech #using
Using Hidden Semi-Markov Model for learning behavior in smarthomes (AP, SA, NC, AEA, NR), pp. 752–757.
DACDAC-2015-HuangCZL #named #realtime #scheduling
PASS: priority assignment of real-time tasks with dynamic suspending behavior under fixed-priority scheduling (WHH, JJC, HZ, CL), p. 6.
DACDAC-2015-McLaughlin #policy
Blocking unsafe behaviors in control systems through static and dynamic policy enforcement (SM), p. 6.
DACDAC-2015-YoonSMC #detection #embedded #heatmap #memory management #realtime #using
Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
DATEDATE-2015-DaneseGP #automation #execution #modelling
Automatic extraction of assertions from execution traces of behavioural models (AD, TG, GP), pp. 67–72.
DATEDATE-2015-DuqueDY #adaptation #fault #reliability #runtime
Improving MPSoC reliability through adapting runtime task schedule based on time-correlated fault behavior (LARD, JMMD, CY), pp. 818–823.
HPCAHPCA-2015-AroraMPJT #benchmark #comprehension #cpu #gpu #metric #power management
Understanding idle behavior and power gating mechanisms in the context of modern benchmarks on CPU-GPU Integrated systems (MA, SM, IP, NJ, DMT), pp. 366–377.
HPDCHPDC-2015-LuuWGRCHPBY #multi #platform
A Multiplatform Study of I/O Behavior on Petascale Supercomputers (HL, MW, WG, RBR, PHC, KH, P, SB, YY), pp. 33–44.
HPDCHPDC-2015-YangC #benchmark #comprehension #graph #metric #robust
Understanding Graph Computation Behavior to Enable Robust Benchmarking (FY, AAC), pp. 173–178.
ISMMISMM-2015-LinWBHN #comprehension
Stop and go: understanding yieldpoint behavior (YL, KW, SMB, ALH, MN), pp. 70–80.
ESOPESOP-2015-Penninckx0P #composition #source code #verification
Sound, Modular and Compositional Verification of the Input/Output Behavior of Programs (WP, BJ, FP), pp. 158–182.
CSLCSL-2015-SalvatiW #higher-order #source code
A Model for Behavioural Properties of Higher-order Programs (SS, IW), pp. 229–243.
ICSTICST-2015-AliY #cyber-physical #evolution #modelling #named #nondeterminism #testing
U-Test: Evolving, Modelling and Testing Realistic Uncertain Behaviours of Cyber-Physical Systems (SA, TY), pp. 1–2.
ICTSSICTSS-2015-LahamiKBJ #adaptation #approach #generative #testing
Selective Test Generation Approach for Testing Dynamic Behavioral Adaptations (ML, MK, HB, MJ), pp. 224–239.
ISSTAISSTA-2015-XueWLXSC #classification #detection #javascript #modelling
Detection and classification of malicious JavaScript via attack behavior modelling (YX, JW, YL, HX, JS, MC), pp. 48–59.
LICSLICS-2015-BrazdilKKN #probability
Long-Run Average Behaviour of Probabilistic Vector Addition Systems (TB, SK, AK, PN), pp. 44–55.
TAPTAP-2015-AichernigNT #generative #incremental #modelling #scalability #testing
Scalable Incremental Test-case Generation from Large Behavior Models (BKA, DN, ST), pp. 1–18.
HTHT-2014-KumarHL #approach #identification #twitter
A behavior analytics approach to identifying tweets from crisis regions (SK, XH, HL), pp. 255–260.
HTHT-2014-LehmannMLLK #wiki
Reader preferences and behavior on Wikipedia (JL, CMB, DL, ML, AK), pp. 88–97.
JCDLJCDL-2014-DibieMS #approach #comprehension #education #online #predict #using
A computational approach to understanding and predicting the behavior of educators using an online curriculum planning tool (OD, KEM, TS), pp. 487–488.
JCDLJCDL-2014-HinzeAVTA #design #library #physics #social
Social information behaviour in physical libraries: Implications for the design of digital libraries (AH, HA, NV, CT, SA), pp. 107–116.
JCDLJCDL-2014-TakanoSIHT #analysis #classification #documentation #towards
Microscopic analysis of document handling while reading: Classification of behavior toward paper document (KT, HS, JI, TH, ST), pp. 445–446.
SIGMODSIGMOD-2014-LiuWZZK #modelling #named #scalability #social
HYDRA: large-scale social identity linkage via heterogeneous behavior modeling (SL, SW, FZ, JZ, RK), pp. 51–62.
SIGMODSIGMOD-2014-YinCCHH #modelling #social #social media
A temporal context-aware model for user behavior modeling in social media systems (HY, BC, LC, ZH, ZH), pp. 1543–1554.
VLDBVLDB-2015-ZhangWWY14 #predict #social
Inferring Continuous Dynamic Social Influence and Personal Preference for Temporal Behavior Prediction (JZ, CW, JW, JXY), pp. 269–280.
EDMEDM-2014-CiselBB #assessment
Peer assessment in the first French MOOC : Analyzing assessors' behavior (MC, RB, EB), pp. 403–404.
EDMEDM-2014-Fancsali #algebra #learning #modelling
Causal Discovery with Models: Behavior, Affect, and Learning in Cognitive Tutor Algebra (SF), pp. 28–35.
EDMEDM-2014-JiangWSWO #performance #predict
Predicting MOOC performance with Week 1 Behavior (SJ, AEW, KS, MW, DKO), pp. 273–275.
EDMEDM-2014-LeeLP #approach #data-driven #education #game studies #learning
Learning Individual Behavior in an Educational Game: A Data-Driven Approach (SJL, YEL, ZP), pp. 114–121.
EDMEDM-2014-SnowVRM #categorisation #game studies
Who's in Control?: Categorizing Nuanced Patterns of Behaviors within a Game-Based Intelligent Tutoring System (ELS, LKV, DGR, DSM), pp. 185–192.
EDMEDM-2014-ToussaintLT #automation #detection #similarity #towards #using
Towards Using Similarity Measure for Automatic Detection of Significant Behaviors from Continuous Data (BMT, VL, JT), pp. 427–428.
EDMEDM-2014-WatanabeOK #analysis #student
Analysis and extraction of behaviors by students in lectures (EW, TO, TK), pp. 329–330.
ITiCSEITiCSE-2014-SchmolitzkyG #game studies #implementation
Guess my object: an “objects first” game on objects’ behavior and implementation with bluej (AS, TG), pp. 219–224.
SANERCSMR-WCRE-2014-XiaFLCW #learning #multi #towards
Towards more accurate multi-label software behavior learning (XX, YF, DL, ZC, XW), pp. 134–143.
ICPCICPC-2014-NoughiMMC #comprehension #database #source code
Understanding the database manipulation behavior of programs (NN, MM, LM, AC), pp. 64–67.
ICSMEICSME-2014-CachoBAPGCSCFG #c# #case study #exception #how #java
How Does Exception Handling Behavior Evolve? An Exploratory Study in Java and C# Applications (NC, EAB, JA, FP, AFG, TC, ES, AC, TF, IG), pp. 31–40.
ICSMEICSME-2014-KhanIA #approach #heuristic #state machine #uml
A Heuristic-Based Approach to Refactor Crosscutting Behaviors in UML State Machines (MUK, MZI, SA), pp. 557–560.
AFLAFL-2014-BerglundDM #backtracking #regular expression
Analyzing Catastrophic Backtracking Behavior in Practical Regular Expression Matching (MB, FD, BvdM), pp. 109–123.
IFMIFM-2014-MellerGY #uml #verification
Verifying Behavioral UML Systems via CEGAR (YM, OG, KY), pp. 139–154.
SEFMSEFM-2014-LaibinisTGMK #formal method #modelling #verification
Formal Modelling and Verification of Cooperative Ant Behaviour in Event-B (LL, ET, ZG, FM, AHK), pp. 363–377.
SEFMSEFM-2014-PunSS #concurrent
Effect-Polymorphic Behaviour Inference for Deadlock Checking (KIP, MS, VS), pp. 50–64.
ICFPICFP-2014-Findler #contract
Behavioral software contracts (RBF), pp. 137–138.
AIIDEAIIDE-2014-ZhaoS #game studies #scheduling #using
Using Cyclic Scheduling to Generate Believable Behavior in Games (RZ, DS).
CHI-PLAYCHI-PLAY-2014-AssiganaCCKLTZC #game studies
TF-CBT triangle of life: a game to help with cognitive behavioral therapy (EA, EC, SC, VK, BL, HT, YZ, MGC, SMS), pp. 9–16.
CHI-PLAYCHI-PLAY-2014-DiTommasoT #design #game studies #gamification
Beyond gamification: designing behavior change games (DD, CT), p. 475.
CHI-PLAYCHI-PLAY-2014-GaoGMS #game studies #using
Decreasing sedentary behaviours in pre-adolescents using casual exergames at school (YG, KMG, RLM, KGS), pp. 97–106.
CHI-PLAYCHI-PLAY-2014-KabakovCEBCTCA #bottom-up
A bottom-up method for developing a trait-based model of player behavior (MAK, AC, MSEN, JBB, RCC, ST, ZC, KA), pp. 427–428.
CoGCIG-2014-BauckhageSDTH #clustering #game studies #heatmap #using
Beyond heatmaps: Spatio-temporal clustering using behavior-based partitioning of game levels (CB, RS, AD, CT, FH), pp. 1–8.
CoGCIG-2014-GaudlB #biology #low cost #modelling #realtime
Extended ramp goal module: Low-cost behaviour arbitration for real-time controllers based on biological models of dopamine cells (SEG, JJB), pp. 1–8.
CoGCIG-2014-LiuLB #effectiveness #evolution #game studies
Evolving effective micro behaviors in RTS game (SL0, SJL, CAB), pp. 1–8.
DiGRADiGRA-2014-HoogenBI #approach #game studies
Pressure at Play: Measuring Player Approach and Avoidance Behaviour through the Keyboard (WvdH, EB, WAI).
FDGFDG-2014-HsiaoCBP
User behavior transformation through dynamic input mappings (DYH, SC, CB, ZP).
FDGFDG-2014-TomaiF #adaptation #learning #using
Adapting in-game agent behavior by observation of players using learning behavior trees (ET, RF).
FDGFDG-2014-ZhaoS #architecture #scheduling #using
Virtual character behavior architecture using cyclic scheduling (RZ, DS).
CHICHI-2014-AthukoralaLKJOTJ #how #mobile
How carat affects user behavior: implications for mobile battery awareness applications (KA, EL, MvK, AJ, AJO, ST, GJ), pp. 1029–1038.
CHICHI-2014-BrumbyCCF #how #question #visual notation #what
How does knowing what you are looking for change visual search behavior? (DPB, ALC, JC, BF), pp. 3895–3898.
CHICHI-2014-HongMD #framework #platform
A smartphone-based sensing platform to model aggressive driving behaviors (JHH, BM, AKD), pp. 4047–4056.
CHICHI-2014-HydeKHC #elicitation #people #video
Conversing with children: cartoon and video people elicit similar conversational behaviors (JH, SBK, JKH, EJC), pp. 1787–1796.
CHICHI-2014-KobsaKL #personalisation #privacy
Let’s do it at my place instead?: attitudinal and behavioral study of privacy in client-side personalization (AK, BPK, BL), pp. 81–90.
CHICHI-2014-ReitbergerSF #named
Nutriflect: reflecting collective shopping behavior and nutrition (WR, WS, GF), pp. 3309–3318.
CHICHI-2014-SchildLM #3d #design #game studies #using #video
Altering gameplay behavior using stereoscopic 3D vision-based video game design (JS, JJLJ, MM), pp. 207–216.
CHICHI-2014-TanNTNTEW #developer #smarttech
The effect of developer-specified explanations for permission requests on smartphone user behavior (JT, KN, MT, HNA, CT, SE, DW), pp. 91–100.
CSCWCSCW-2014-MejovaGWD #comprehension #email
Giving is caring: understanding donation behavior through email (YM, VRKG, IW, MCD), pp. 1297–1307.
CSCWCSCW-2014-QuattroneMC
Mind the map: the impact of culture and economic affluence on crowd-mapping behaviours (GQ, AJM, LC), pp. 934–944.
HCIDHM-2014-LiuTZSLSF #assessment #framework #modelling #named #performance #platform
COMPAss: A Space Cognitive Behavior Modeling and Performance Assessment Platform (YL, ZT, YZ, QS, JL, JS, FF), pp. 630–636.
HCIDHM-2014-YamadaOFYGKH #music #performance #visual notation
Visual Behavior in a Japanese Drum Performance of Gion Festival Music (KY, MO, TF, HY, AG, NK, HH), pp. 301–310.
HCIDUXU-DI-2014-Marcus #mobile
The Happiness Machine: Mobile Behavior Change (AM), pp. 258–268.
HCIDUXU-DP-2014-MiddenH #energy #feedback #power of
The Power of Negative Feedback from an Artificial Agent to Promote Energy Saving Behavior (CJHM, JRCH), pp. 328–338.
HCIDUXU-ELAS-2014-Abbas #case study #challenge #implementation
Challenges in Implementation of TVM (Ticket Vending Machine) in Developing Countries for Mass Transport System: A Study of Human Behavior while Interacting with Ticket Vending Machine-TVM (MA), pp. 245–254.
HCIDUXU-ELAS-2014-DesouzartFMM #interactive
Human-Bed Interaction: A Methodology and Tool to Measure Postural Behavior during Sleep of the Air Force Military (GD, EF, FM, RM), pp. 662–674.
HCIDUXU-ELAS-2014-FloraB #energy #feedback #graph
Energy Graph Feedback: Attention, Cognition and Behavior Intentions (JAF, BB), pp. 520–529.
HCIDUXU-TMT-2014-CoventryBJM #named #security
SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment (LMC, PB, DJ, APAvM), pp. 229–239.
HCIDUXU-TMT-2014-DoneyEF #framework
Keeping Creative Writing on Track: Co-designing a Framework to Support Behavior Change (PD, RE, MF), pp. 631–642.
HCIHCI-AIMT-2014-NavarrettaL #interactive #multimodal
Multimodal Behaviours in Comparable Danish and Polish Human-Human Triadic Spontaneous Interactions (CN, ML), pp. 462–471.
HCIHCI-AIMT-2014-SantosCMJ #case study #interactive
Behavioral Persona for Human-Robot Interaction: A Study Based on Pet Robot (TFdS, DGdC, AAM, PTAJ), pp. 687–696.
HCIHCI-AIMT-2014-WuttkeM #adaptation #communication
Natural Forms of Communication and Adaptive Behaviour in Human-Computer-Interaction (MW, KUM), pp. 641–647.
HCIHCI-TMT-2014-CafezeiroGCM #collaboration #interactive #roadmap
A Knowledge-Construction Perspective on Human Computing, Collaborative Behavior and New Trends in System Interactions (IC, CG, VC, IdCM), pp. 58–68.
HCIHIMI-AS-2014-KometaniTFA #education #estimation #student
An Improved Teaching Behavior Estimation Model from Student Evaluations (YK, TT, TF, TA), pp. 59–68.
HCIHIMI-AS-2014-MatsuiHKA #case study #education #learning
A Study on Exploration of Relationships between Behaviors and Mental States of Learners for Value Co-creative Education and Learning Environment (TM, YH, KK, TA), pp. 69–79.
HCILCT-NLE-2014-MoissaCG #adaptation #student #visualisation #web
A Web Analytics and Visualization Tool to Understand Students’ Behavior in an Adaptive E-Learning System (BM, LSdC, IG), pp. 312–321.
HCISCSM-2014-BenteDRA #physics
Emotional Contagion with Artificial Others. Effects of Culture, Physical Appearance, and Nonverbal Behavior on the Perception of Positive/Negative Affect in Avatars (GB, TD, DR, AAI), pp. 411–420.
HCISCSM-2014-Biocca
Connected to My Avatar: — Effects of Avatar Embodiments on User Cognitions, Behaviors, and Self Construal (FB), pp. 421–429.
CAiSECAiSE-2014-PikaWFHLA #framework #using
An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
ICEISICEIS-v1-2014-CruzRFC #implementation
Norm-based Behavior Modification in Reflex Agents — An Implementation in JAMDER 2.0 (FISC, RMRJ, ESSF, MIC), pp. 497–504.
ICEISICEIS-v1-2014-KaddesASBAB #transaction
Behavioral Study of Nested Transaction Success Ratio (MK, LA, BS, AB, MA, RB), pp. 179–186.
ICEISICEIS-v1-2014-Rios-AguilarLP #information management #mobile #monitoring #using
Business Information System for the Control of Workforce Through Behaviour Monitoring Using Reactive and Terminal-based Mobile Location Technologies (SRA, FJLM, APS), pp. 30–38.
ICEISICEIS-v3-2014-KubovyAK #composition #control flow
Behavior-based Decomposition of BPMN 2.0 Control Flow (JK, DA, JK), pp. 263–271.
CIKMCIKM-2014-ArguelloC #rank
The Effects of Vertical Rank and Border on Aggregated Search Coherence and Search Behavior (JA, RGC), pp. 539–548.
CIKMCIKM-2014-Deolalikar14a #clustering #modelling #parametricity #retrieval
Parameter Tuning with User Models: Influencing Aggregate User Behavior in Cluster Based Retrieval Systems (VD), pp. 1823–1826.
CIKMCIKM-2014-FangZTSFSDZL #game studies #modelling #network #social
Modeling Paying Behavior in Game Social Networks (ZF, XZ, JT, WS, ACMF, LS, YD, LZ, JL), pp. 411–420.
CIKMCIKM-2014-WenR #identification #mining #online
Identifying Latent Study Habits by Mining Learner Behavior Patterns in Massive Open Online Courses (MW, CPR), pp. 1983–1986.
ECIRECIR-2014-YounusOP #approach #microblog #modelling #personalisation
A Language Modeling Approach to Personalized Search Based on Users’ Microblog Behavior (AY, CO, GP), pp. 727–732.
ICMLICML-c2-2014-WuCLY #consistency #learning #network #predict #social
Learning the Consistent Behavior of Common Users for Target Node Prediction across Social Networks (SHW, HHC, KHL, PSY), pp. 298–306.
ICPRICPR-2014-AlemdarKNME #modelling #using
A Unified Model for Human Behavior Modeling Using a Hierarchy with a Variable Number of States (HÖA, TvK, MEN, AM, CE), pp. 3804–3809.
ICPRICPR-2014-AryafarLA
Exploring User Behaviour on Etsy through Dominant Colors (KA, CL, JA), pp. 1437–1442.
ICPRICPR-2014-BicegoRFRG #using
Behavioural Biometrics Using Electricity Load Profiles (MB, FR, AF, SDR, EG), pp. 1764–1769.
ICPRICPR-2014-ChironGM #parametricity #using
Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
ICPRICPR-2014-NathLHWBS #automation #recognition #social
Automated Social Behaviour Recognition at Low Resolution (TN, GL, BH, BW, SDB, PS), pp. 2323–2328.
ICPRICPR-2014-SengerSMK #multi #segmentation
Velocity-Based Multiple Change-Point Inference for Unsupervised Segmentation of Human Movement Behavior (LS, MS, JHM, EAK), pp. 4564–4569.
ICPRICPR-2014-YamadaM #approach #using
Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
KDDKDD-2014-JiangCBFY #graph #named #scalability
CatchSync: catching synchronized behavior in large directed graphs (MJ, PC, AB, CF, SY), pp. 941–950.
KDDKDD-2014-JiangCWXZY #analysis #flexibility #multi #named
FEMA: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery (MJ, PC, FW, XX, WZ, SY), pp. 1186–1195.
KDDKDD-2014-SongZSS #predict #scalability
Prediction of human emergency behavior and their mobility following large-scale disaster (XS, QZ, YS, RS), pp. 5–14.
KDDKDD-2014-SunSTLKTY #collaboration #network
Analyzing expert behaviors in collaborative networks (HS, MS, ST, YL, LMK, ST, XY), pp. 1486–1495.
KDDKDD-2014-XuL #learning #problem
Product selection problem: improve market share by learning consumer behavior (SX, JCSL), pp. 851–860.
RecSysRecSys-2014-KluverK #recommendation
Evaluating recommender behavior for new users (DK, JAK), pp. 121–128.
SEKESEKE-2014-FariasONCM #case study
Recovering Valuable Information Behaviour from OSS Contributors: An Exploratory Study (MAdFF, PO, RLN, MCJ, MGM), pp. 474–477.
SEKESEKE-2014-JaliGH #case study #generative #ontology
Behavioral Model Generation from Use Cases Based on Ontology Mapping and GRASP Patterns (NJ, DG, PH), pp. 324–329.
SEKESEKE-2014-NetoASFM #architecture #data transformation #framework #modelling #named #using
CoMoVi: a Framework for Data Transformation in Credit Behavioral Scoring Applications Using Model Driven Architecture (RFON, PJLA, ACS, DRdCF, GRM), pp. 286–291.
SIGIRSIGIR-2014-ArapakisBC #latency #web
Impact of response latency on user behavior in web search (IA, XB, BBC), pp. 103–112.
SIGIRSIGIR-2014-ChengYWL #multi #recommendation
Group latent factor model for recommendation with multiple user behaviors (JC, TY, JW, HL), pp. 995–998.
SIGIRSIGIR-2014-JiangHA
Searching, browsing, and clicking in a search session: changes in user behavior by task and over time (JJ, DH, JA), pp. 607–616.
SIGIRSIGIR-2014-JiangKCC #learning #query
Learning user reformulation behavior for query auto-completion (JYJ, YYK, PYC, PJC), pp. 445–454.
SIGIRSIGIR-2014-Kharitonov #evaluation #modelling #online #web
Improving offline and online web search evaluation by modelling the user behaviour (EK), p. 1278.
SIGIRSIGIR-2014-LeeTC #multi #risk management
Characterizing multi-click search behavior and the risks and opportunities of changing results during use (CJL, JT, SdlC), pp. 515–524.
SIGIRSIGIR-2014-WuKS #online #using
Using information scent and need for cognition to understand online search behavior (WCW, DK, AS), pp. 557–566.
SKYSKY-2014-Fernandez-Utrilla #predict #web
An Unified Behaviour Model to Predict Web 2.0 Adoption as a Tool for Software-Knowledge Sharing (MFU, PFU, GM), pp. 3–18.
MODELSMoDELS-2014-LangerMK #difference #semantics #specification
Semantic Model Differencing Utilizing Behavioral Semantics Specifications (PL, TM, GK), pp. 116–132.
MODELSMoDELS-2014-Pazzi #composition #modelling
Modeling Systemic Behavior by State-Based Holonic Modular Units (LP), pp. 99–115.
SPLCSPLC-2014-ShakerA #interactive #product line
Behaviour interactions among product-line features (PS, JMA), pp. 242–246.
SPLCSPLC-2014-Tribastone #algebra #process
Behavioral relations in a process algebra for variants (MT), pp. 82–91.
ECOOPECOOP-2014-WeiR #analysis #javascript #points-to
State-Sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects (SW, BGR), pp. 1–26.
OOPSLAOOPSLA-2014-PintoCL #comprehension #concurrent #energy #thread
Understanding energy behaviors of thread management constructs (GP, FC, YDL), pp. 345–360.
HILTHILT-2014-AhmadLBZD #cyber-physical #hybrid #interactive #modelling
Hybrid annex: an AADL extension for continuous behavior and cyber-physical interaction modeling (EA, BRL, SCB, NZ, YD), pp. 29–38.
ASEASE-2014-AhmedNWS #formal method #integration
Formalisation of the integration of behavior trees (KA, MAHN, LW, AS), pp. 779–784.
ASEASE-2014-OhmannHFHPBB #model inference #resource management
Behavioral resource-aware model inference (TO, MH, SF, AH, MP, IB, YB), pp. 19–30.
FSEFSE-2014-CordyHLSDL #abstraction #modelling #product line #refinement
Counterexample guided abstraction refinement of product-line behavioural models (MC, PH, AL, PYS, BD, ML), pp. 190–201.
ICSEICSE-2014-BeschastnikhBEK #concurrent #modelling
Inferring models of concurrent systems from logs of their behavior with CSight (IB, YB, MDE, AK), pp. 468–479.
ICSEICSE-2014-GhezziPST #mining #modelling #web
Mining behavior models from user-intensive web applications (CG, MP, MS, GT), pp. 277–287.
ICSEICSE-2014-GorlaTGZ
Checking app behavior against app descriptions (AG, IT, FG, AZ), pp. 1025–1035.
ICSEICSE-2014-HuangZTWL #android #detection #named #user interface
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction (JH, XZ, LT, PW, BL), pp. 1036–1046.
ICSEICSE-2014-LeeJP #detection #machine learning #memory management #modelling #using
Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
SACSAC-2014-ChangCHKL #analysis #mobile
Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
SACSAC-2014-Chen #analysis #coordination #energy #research #scheduling #student
Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
SACSAC-2014-JeongLCHP #android #approach #kernel #monitoring
A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
SACSAC-2014-MaWX #commit #developer #empirical #open source
Dynamics of open-source software developer’s commit behavior: an empirical investigation of subversion (YM, YW, YX), pp. 1171–1173.
SACSAC-2014-SaraivaS #how
Choosing my partners based on how they will evaluate my behavior (ECdRCS, VTdS), pp. 781–783.
GPCEGPCE-2014-MalakutiA #composition #representation
Emergent gummy modules: modular representation of emergent behavior (SM, MA), pp. 15–24.
CASECASE-2014-ChangYLC #mining #towards #video
Toward mining anomalous behavior from big moving trajectories in surveillance video (CWC, MHY, CCL, KTC), pp. 1121–1126.
CASECASE-2014-ChenGGLCL #analysis #approach #scheduling
A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
CASECASE-2014-HungCYDYW #data mining #mining
Data mining for analysing kiosk usage behavior patterns (YSH, KLBC, CTY, GFD, YHY, NCW), pp. 1115–1120.
CASECASE-2014-NodaMNKOI #maintenance #online #predict
Online maintaining behavior of high-load and unstable postures based on whole-body load balancing strategy with thermal prediction (SN, MM, SN, YK, KO, MI), pp. 1166–1171.
CASECASE-2014-WangGWG #analysis #generative #multi
Analysis of multi-location PEV charging behaviors based on trip chain generation (DW, XG, JW, JG), pp. 151–156.
DACDAC-2014-YangHCLRX #certification #framework #scalability #synthesis
Scalable Certification Framework for Behavioral Synthesis Front-End (ZY, KH, KC, LL, SR, FX), p. 6.
DATEDATE-2014-HaoRX #equivalence #pipes and filters #synthesis
Equivalence checking for function pipelining in behavioral synthesis (KH, SR, FX), pp. 1–6.
DATEDATE-2014-NepalLBR #approximate #automation #named #synthesis
ABACUS: A technique for automated behavioral synthesis of approximate computing circuits (KN, YL, RIB, SR), pp. 1–6.
HPCAHPCA-2014-AwadS #memory management #named
STM: Cloning the spatial and temporal memory access behavior (AA, YS), pp. 237–247.
FASEFASE-2014-OuederniSCP #named
Comparator: A Tool for Quantifying Behavioural Compatibility (MO, GS, JC, EP), pp. 306–309.
LICSLICS-CSL-2014-AsarinBDDM #logic
Asymptotic behaviour in temporal logic (EA, MB, AD, CD, CM), p. 9.
TAPTAP-2014-DiepenbeckKSD #development #testing #verification
Behaviour Driven Development for Tests and Verification (MD, UK, MS, RD), pp. 61–77.
TAPTAP-2014-HilkenNGW #comparison #modelling #ocl #uml #verification
Filmstripping and Unrolling: A Comparison of Verification Approaches for UML and OCL Behavioral Models (FH, PN, MG, RW), pp. 99–116.
ECSAECSA-2013-MorandiWNG #concurrent #design pattern #development #object-oriented
Concurrent Object-Oriented Development with Behavioral Design Patterns (BM, SW, SN, HG), pp. 25–32.
HTHT-2013-NasimIRN #facebook #on the
On commenting behavior of Facebook users (MN, MUI, AR, NN), pp. 179–183.
HTHT-2013-WeiHGLZW #analysis #case study #twitter
Mainstream media behavior analysis on Twitter: a case study on UK general election (ZW, YH, WG, BL, LZ, KFW), pp. 174–178.
JCDLJCDL-2013-CunninghamM #library
Interacting with and through a digital library collection: commenting behavior in Flickr’s the commons (SJC, MM), pp. 21–24.
JCDLJCDL-2013-GongKZB #case study #clustering #effectiveness #interactive #retrieval
Interactive search result clustering: a study of user behavior and retrieval effectiveness (XG, WK, YZ, RB), pp. 167–170.
SIGMODSIGMOD-2013-ElmoreDPAAY #multitenancy
Characterizing tenant behavior for placement and crisis mitigation in multitenant DBMSs (AJE, SD, AP, DA, AEA, XY), pp. 517–528.
TPDLTPDL-2013-CunninghamVTHB #library #social
Social Information Behaviour in Bookshops: Implications for Digital Libraries (SJC, NV, CT, AH, GB), pp. 84–95.
ICSMEICSM-2013-RoehmBHP #identification #specification #towards
Towards Identification of Software Improvements and Specification Updates by Comparing Monitored and Specified End-User Behavior (TR, BB, TMH, BP), pp. 464–467.
MSRMSR-2013-FuLLDZX #analysis #comprehension
Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
MSRMSR-2013-GrantB #empirical
Encouraging user behaviour with achievements: an empirical study (SG, BB), pp. 65–68.
WCREWCRE-2013-AntonyAC #approach #clone detection #detection #modelling
An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
IFMIFM-2013-Prehofer #diagrams #refinement #specification
Assume-Guarantee Specifications of State Transition Diagrams for Behavioral Refinement (CP), pp. 31–45.
IFMIFM-2013-RuksenasCH #evaluation #interactive #predict
Integrating Formal Predictions of Interactive System Behaviour with User Evaluation (RR, PC, MDH), pp. 238–252.
IFMIFM-2013-TaylorBD #automation #erlang
Automatic Inference of Erlang Module Behaviour (RT, KB, JD), pp. 253–267.
SEFMSEFM-2013-BennaceurCIJ #automation #ontology #reasoning #synthesis
Automated Mediator Synthesis: Combining Behavioural and Ontological Reasoning (AB, CC, MI, BJ), pp. 274–288.
SEFMSEFM-2013-SargolzaeiSAA #approximate #web #web service
A Tool for Behaviour-Based Discovery of Approximately Matching Web Services (MS, FS, FA, HA), pp. 152–166.
SEFMSEFM-2013-SuryadevaraSMP #using #verification
Verifying MARTE/CCSL Mode Behaviors Using UPPAAL (JS, CCS, FM, PP), pp. 1–15.
SFMSFM-2013-BortolussiH #approximate #markov #modelling
Checking Individual Agent Behaviours in Markov Population Models by Fluid Approximation (LB, JH), pp. 113–149.
CoGCIG-2013-AlayedFN #detection #machine learning #online #using
Behavioral-based cheating detection in online first person shooters using machine learning techniques (HA, FF, CN), pp. 1–8.
CoGCIG-2013-DeyC #design #implementation #named
QL-BT: Enhancing behaviour tree design and implementation with Q-learning (RD, CC), pp. 1–8.
CoGCIG-2013-LiuLN #effectiveness #game studies #using
Using CIGAR for finding effective group behaviors in RTS game (SL0, SJL, MNN), pp. 1–8.
CoGCIG-2013-Polceanu #named #using
MirrorBot: Using human-inspired mirroring behavior to pass a turing test (MP), pp. 1–8.
CoGCIG-2013-SifaB #analysis #game studies #learning
Archetypical motion: Supervised game behavior learning with Archetypal Analysis (RS, CB), pp. 1–8.
CoGCIG-2013-SifaDBTC #evolution
Behavior evolution in Tomb Raider Underworld (RS, AD, CB, CT, AC), pp. 1–8.
CoGCIG-2013-WiensDP #game studies #learning #scalability
Creating large numbers of game AIs by learning behavior for cooperating units (SW, JD, SP), pp. 1–8.
DiGRADiGRA-2013-DurgaESSNA #game studies
Leveraging Play in Health-Based Games to Promote Sustained Behavior Change in Healthy Eating and Exercise (SD, MSEN, MS, CS, PN, LA).
DiGRADiGRA-2013-Salazar #case study #online
Online Diasporas: Theoretical Considerations on the Study of Diasporic Behavior in MMORPGs (JS).
DiGRADiGRA-2013-SymborskiJBCRQP #research
Fusing Quantitative and Qualitative Methods in Virtual Worlds Behavioral Research (CS, GMJ, MB, GC, BR, MMQ, CP).
DiGRADiGRA-2013-WarpefeltJV #game studies #matrix #using
Analyzing the believability of game character behavior using the Game Agent Matrix (HW, MJ, HV).
DiGRADiGRA-2013-WilliamsK #approach #case study #collaboration #game studies #social
Elements of Social Action: A Micro- Analytic Approach to the Study of Collaborative Behavior in Digital Games (JPW, DK).
FDGFDG-2013-Barik #game studies #interactive #low level
Inferring cognitive behaviors from low-level user interactions in games (TB), pp. 459–461.
FDGFDG-2013-CabezasT #generative #realtime
Real-time procedural terrain generation through swarm behaviours (ÁFC, TT), pp. 421–422.
FDGFDG-2013-DrachenTSB #clustering #comparison
A comparison of methods for player clustering via behavioral telemetry (AD, CT, RS, CB), pp. 245–252.
FDGFDG-2013-EagleJBB #visual notation
Exploring player behavior with visual analytics (ME, MWJ, TB, AKB), pp. 380–383.
FDGFDG-2013-GaudlDB #design #game studies #realtime
Behaviour oriented design for real-time-strategy games (SEG, SD, JJB), pp. 198–205.
FDGFDG-2013-ORourkeBLBP #education #game studies
The effects of age on player behavior in educational games (EO, EB, YEL, CB, ZP), pp. 158–165.
FDGFDG-2013-TekofskySPHB #assessment #game studies #named
PsyOps: Personality assessment through gaming behavior (ST, PS, AP, HJvdH, JMB), pp. 166–173.
FDGFDG-2013-Vlachou-KonchylakiV
Combining deliberation and reactive behavior for AI players in the Mini-Tichu card-game (MVK, SV), pp. 453–454.
CoGVS-Games-2013-OConnorLP
An Initial Study to Assess the Perceived Realism of Agent Crowd Behaviour in a Virtual City (SO, FL, CEP), pp. 1–8.
GT-VMTGT-VMT-2013-Giese #graph transformation #probability
Invited Talk: Extensions of Graph Transformation Systems for Timed, Continuous, and Probabilistic Behavior (HG).
GT-VMTGT-VMT-2013-TeusnerGRK #interactive #modelling #validation
Interactive Strategy-Based Validation of Behavioral Models (RT, GG, SR, SK).
GT-VMTGT-VMT-2013-WinetzhammerW #emf #modelling #rule-based
ModGraph meets Xcore: Combining Rule-Based and Procedural Behavioral Modeling for EMF (SW, BW).
CHICHI-2013-BentleyT #mobile #power of
The power of mobile notifications to increase wellbeing logging behavior (FB, KT), pp. 1095–1098.
CHICHI-2013-BeyerKSHB #how
Squaring the circle: how framing influences user behavior around a seamless cylindrical display (GB, FK, MS, IH, AB), pp. 1729–1738.
CHICHI-2013-BirnbaumBFDK #identification #using
Using behavioral data to identify interviewer fabrication in surveys (BEB, GB, ADF, BD, ARK), pp. 2911–2920.
CHICHI-2013-BullingWG #named #recognition #visual notation
EyeContext: recognition of high-level contextual cues from human visual behaviour (AB, CW, HG), pp. 305–308.
CHICHI-2013-ChoudhuryCH #predict #social #social media
Predicting postpartum changes in emotion and behavior via social media (MDC, SC, EH), pp. 3267–3276.
CHICHI-2013-DeckersWLA #design
Designing for perceptual crossing: designing and comparing three behaviors (ED, SW, PL, RA), pp. 1901–1910.
CHICHI-2013-HeklerKFB #human-computer #research #using
Mind the theoretical gap: interpreting, using, and developing behavioral theory in HCI research (EBH, PVK, JF, MPB), pp. 3307–3316.
CHICHI-2013-IchinoIHU
Effects of the display angle in museums on user’s cognition, behavior, and subjective responses (JI, KI, AH, TU), pp. 2979–2988.
CHICHI-2013-KramerKKWB #developer #how #ide #navigation #tool support
How tools in IDEs shape developers’ navigation behavior (JPK, TK, JK, MW, JOB), pp. 3073–3082.
CHICHI-2013-MacveanR #comprehension #game studies #motivation #physics #process
Understanding exergame users’ physical activity, motivation and behavior over time (APM, JR), pp. 1251–1260.
CHICHI-2013-MollerKSRD #self
Investigating self-reporting behavior in long-term studies (AM, MK, BS, LR, SD), pp. 2931–2940.
CHICHI-2013-RiceTOYWN #game studies #interactive
The dynamics of younger and older adult’s paired behavior when playing an interactive silhouette game (MDR, WPT, JO, LJY, MW, JN), pp. 1081–1090.
CHICHI-2013-TanenbaumAR #game studies
Three perspectives on behavior change for serious games (JT, ANA, JR), pp. 3389–3392.
CSCWCSCW-2013-ChoudhuryCH #social #social media
Major life changes and behavioral markers in social media: case of childbirth (MDC, SC, EH), pp. 1431–1442.
CSCWCSCW-2013-LiuJ #social
Factors influencing the response rate in social question and answering behavior (ZL, BJJ), pp. 1263–1274.
CSCWCSCW-2013-Massimi #online #social
Exploring remembrance and social support behavior in an online bereavement support group (MM), pp. 1169–1180.
CSCWCSCW-2013-ReineckeNBNG #difference #online #scheduling
Doodle around the world: online scheduling behavior reflects cultural differences in time perception and group decision-making (KR, MKN, AB, MN, KZG), pp. 45–54.
CSCWCSCW-2013-XuHKC #twitter
Structures of broken ties: exploring unfollow behavior on twitter (BX, YH, HK, NSC), pp. 871–876.
HCIDHM-HB-2013-NettenDG #case study #metric
Chair Based Measurements of Sitting Behavior a Field Study of Sitting Postures and Sitting Time in Office Work (MPN, LHMvdD, RHMG), pp. 261–268.
HCIDHM-HB-2013-WangTLCTL #architecture #modelling
Cognitive Behavior Modeling of Manual Rendezvous and Docking Based on the ACT-R Cognitive Architecture (CW, YT, YL, SC, ZT, JL), pp. 143–148.
HCIDHM-SET-2013-BiegBC #bias
Attentional Biases during Steering Behavior (HJB, HHB, LLC), pp. 21–27.
HCIDHM-SET-2013-BusogiKSRYK #problem
Bayesian Affordance-Based Agent Model for Wayfinding Behaviors in Evacuation Problems (MB, NK, DS, HBR, AY, DK), pp. 297–306.
HCIDHM-SET-2013-KongZC #predict #risk management
Personality and Attitudes as Predictors of Risky Driving Behavior: Evidence from Beijing Drivers (JK, KZ, XC), pp. 38–44.
HCIDHM-SET-2013-LiuZLSFG #modelling #towards
Towards Early Status Warning for Driver’s Fatigue Based on Cognitive Behavior Models (YL, YZ, JL, JS, FF, JG), pp. 55–60.
HCIDHM-SET-2013-LiuZX #simulation
Effects of Sleep Deprivation on Pilot’s Cognitive Behavior in Flight Simulation (ZQL, QXZ, FX), pp. 45–54.
HCIDHM-SET-2013-MurataKEH #metric #predict #using
Prediction of Drowsy Driving Using Behavioral Measures of Drivers — Change of Neck Bending Angle and Sitting Pressure Distribution (AM, TK, TE, TH), pp. 78–87.
HCIDUXU-CXC-2013-MenardKD #image #online
Two Solitudes Revisited: A Cross-Cultural Exploration of Online Image Searcher’s Behaviors (EM, NK, JD), pp. 79–88.
HCIDUXU-CXC-2013-MurrayHSHR #feedback #interface
Avatar Interfaces for Biobehavioral Feedback (TM, DH, DSM, EBH, AR), pp. 424–434.
HCIDUXU-CXC-2013-Stevens #gamification #how #social
How Gamification and Behavior Science Can Drive Social Change One Employee at a Time (SHS), pp. 597–601.
HCIDUXU-CXC-2013-ThinG #case study #experience #game studies #integration #interactive
Game-Based Interactive Media in Behavioral Medicine: Creating Serious Affective-Cognitive-Environmental-Social Integration Experiences (AGT, MG), pp. 470–479.
HCIDUXU-NTE-2013-DuarteRTVTN
Sense of Presence in a VR-Based Study on Behavioral Compliance with Warnings (ED, FR, LT, EV, JT, PN), pp. 362–371.
HCIDUXU-NTE-2013-FabriWT #product line
Changing Eating Behaviors through a Cooking-Based Website for the Whole Family (MF, AW, PT), pp. 484–493.
HCIDUXU-NTE-2013-KakaraNM #database #design #geometry #interactive #using
Interaction Design Using a Child Behavior-Geometry Database (HK, YN, HM), pp. 95–104.
HCIDUXU-NTE-2013-MartinsMSA #fault
Human Error in Aviation: The Behavior of Pilots Facing the Modern Technology (ITM, ETM, MMS, LGdSA), pp. 150–159.
HCIDUXU-NTE-2013-SannaVBBR #approach #design
Engineering AwarenessTM: An e-Service Design Approach for Behavioral Change in Healthcare and Well-Being (AS, SV, SB, IB, AR), pp. 558–567.
HCIDUXU-NTE-2013-TrevorrowF
Running to Behavior Change (PT, MF), pp. 585–593.
HCIDUXU-NTE-2013-ViciniBRS
Well-Being on the Go: An IoT Vending Machine Service for the Promotion of Healthy Behaviors and Lifestyles (SV, SB, AR, AS), pp. 594–603.
HCIDUXU-PMT-2013-KarahasanovicF #2d #approach #experience #modelling #network
Modelling User Behaviour and Experience — The R2D2 Networks Approach (AK, AF), pp. 506–515.
HCIDUXU-PMT-2013-LuL13a #design
Innovative Behavioral Intention and Creativity Achievement in Design: Test of an Integrated Model (CCL, DBL), pp. 535–544.
HCIDUXU-PMT-2013-Silveira #approach #design #usability
Participatory Design and Usability: A Behavioral Approach of Workers’ Attitudes in the Work Environment (DMCdS), pp. 409–416.
HCIDUXU-WM-2013-MarcusCNY #design #mobile #persuasion #user interface
The Innovation Machine: Mobile UX Design Combining Information and Persuasion Design to Change Behavior (AM, MC, CN, AY), pp. 67–76.
HCIHCI-AS-2013-BergmansS #mobile #persuasion #using
Reducing Speeding Behavior in Young Drivers Using a Persuasive Mobile Application (AB, SS), pp. 541–550.
HCIHCI-AS-2013-LekkasGTMS #component #experience #how #learning #process
Personality and Emotion as Determinants of the Learning Experience: How Affective Behavior Interacts with Various Components of the Learning Process (ZL, PG, NT, CM, GS), pp. 418–427.
HCIHCI-III-2013-Joo #reasoning #simulation
Perception and BDI Reasoning Based Agent Model for Human Behavior Simulation in Complex System (JJ), pp. 62–71.
HCIHCI-IMT-2013-LiuBCN #visual notation
Behavioral Characteristics of Users with Visual Impairment in Haptically Enhanced Virtual Environments (SL, SB, HC, CSN), pp. 618–625.
HCIHIMI-D-2013-KobayashiYA #analysis
Analysis of Purchasing Behavior Focusing on the Passage of Time at a Group Buying Site of Coupon (TK, TY, YA), pp. 449–455.
HCIHIMI-D-2013-LeeY #comparison #information management #research
Research on Website Usage Behavior through Information Search Perspective: A Comparison of Experiential and Goal-Directed Behaviors (JL, MY), pp. 456–464.
HCIHIMI-D-2013-SusukiTOM #analysis
Cognitive Analysis of Driver’s Behavior with Seamless Display of Back-Monitor and Side-View Mirror (NS, KT, MO, HM), pp. 642–649.
HCIHIMI-HSM-2013-HiraokaTK #parametricity
Proposal of Non-dimensional Parameter Indices to Evaluate Safe Driving Behavior (TH, ST, HK), pp. 470–479.
HCIHIMI-HSM-2013-ItohKMYYO #comparison
Comparison of Cognitively Impaired, Healthy Non-Professional and Healthy Professional Driver Behavior on a Small and Low-Fidelity Driving Simulator (MI, MK, KM, KY, SY, MO), pp. 490–496.
HCIHIMI-HSM-2013-KarashimaN #safety
Influence of the Safety Margin on Behavior that Violates Rules (MK, HN), pp. 497–506.
HCIHIMI-HSM-2013-KosakaN #education
Pilot Experiments in Education for Safe Bicycle Riding to Evaluate Actual Cycling Behaviors When Entering an Intersection (HK, MN), pp. 515–523.
HCIHIMI-HSM-2013-SaitoKII
Influence of Deceleration Intention Indicating System of Forward Vehicle on Driver Behavior (YS, SK, MI, TI), pp. 548–557.
HCIHIMI-HSM-2013-SuzukiMKY
Human Behavior of Prioritizing Right-Turning Vehicles and Traffic Flow at Intersections (HS, YM, TK, YY), pp. 558–567.
HCIOCSC-2013-Abascal-MenaLZ #analysis #mining #twitter
User Generated Content: An Analysis of User Behavior by Mining Political Tweets (RAM, ÉLO, JSZH), pp. 3–12.
HCIOCSC-2013-AdnanHAT #analysis #eye tracking #network #online #social
Eye Tracking Analysis of User Behavior in Online Social Networks (WAWA, WNHH, NA, JT), pp. 113–119.
HCIOCSC-2013-KalwarHP13b #comprehension #internet
Quantifying Cultural Attributes for Understanding Human Behavior on the Internet (SKK, KH, JP), pp. 40–49.
HCIOCSC-2013-LopezFM
Being Example: A Different Kind of Leadership, Looking for Exemplary Behaviors (SRL, HMF, ASM), pp. 182–190.
HCIOCSC-2013-StieglitzES #education #learning #student
Influence of Monetary and Non-monetary Incentives on Students’ Behavior in Blended Learning Settings in Higher Education (SS, AE, MS), pp. 104–112.
VISSOFTVISSOFT-2013-PalepuJ #visualisation
Visualizing constituent behaviors within executions (VKP, JAJ), pp. 1–4.
VISSOFTVISSOFT-2013-ReissT #automation #categorisation #visualisation
Automatic categorization and visualization of lock behavior (SPR, AT), pp. 1–10.
CAiSECAiSE-2013-SuriadiWOHD #case study #comprehension #process #scalability
Understanding Process Behaviours in a Large Insurance Company in Australia: A Case Study (SS, MTW, CO, AHMtH, NJvD), pp. 449–464.
CIKMCIKM-2013-LiaoPPL #mining #mobile #on the #predict #smarttech
On mining mobile apps usage behavior for predicting apps usage in smartphones (ZXL, YCP, WCP, PRL), pp. 609–618.
ECIRECIR-2013-ChuklinSR #using
Using Intent Information to Model User Behavior in Diversified Search (AC, PS, MdR), pp. 1–13.
ICMLICML-c3-2013-AlmingolML #learning #multi
Learning Multiple Behaviors from Unlabeled Demonstrations in a Latent Controller Space (JA, LM, ML), pp. 136–144.
KDDKDD-2013-MukherjeeKLWHCG #using
Spotting opinion spammers using behavioral footprints (AM, AK, BL, JW, MH, MC, RG), pp. 632–640.
KDDKDD-2013-ZafaraniL #approach #social #social media
Connecting users across social media sites: a behavioral-modeling approach (RZ, HL), pp. 41–49.
KDIRKDIR-KMIS-2013-ChenYTH #predict
The Disulfide Connectivity Prediction with Support Vector Machine and Behavior Knowledge Space (HYC, CBY, KTT, CYH), pp. 112–118.
KDIRKDIR-KMIS-2013-ItalaH #diagrams #process #using
Using Stocks and Flows Diagrams to Understand Business Process Behavior (TI, MH), pp. 552–558.
SEKESEKE-2013-BazharAJ #modelling #named #repository
BeMoRe: a Repository for Handling Models Behaviors (YB, YAA, SJ), pp. 262–267.
SEKESEKE-2013-IqbalKH #communication #developer #social
Analyzing Social Behavior of Software Developers Across Different Communication Channels (AI, MK, MH), pp. 113–118.
SIGIRSIGIR-2013-AgeevLA #summary #using
Improving search result summaries by using searcher behavior data (MA, DL, EA), pp. 13–22.
SIGIRSIGIR-2013-AzzopardiKB #how #query
How query cost affects search behavior (LA, DK, KB), pp. 23–32.
SIGIRSIGIR-2013-MoshfeghiJ #effectiveness #feedback #using
An effective implicit relevance feedback technique using affective, physiological and behavioural features (YM, JMJ), pp. 133–142.
SIGIRSIGIR-2013-SavenkovLL #detection
Search engine switching detection based on user personal preferences and behavior patterns (DS, DL, QL), pp. 33–42.
SIGIRSIGIR-2013-Wu #how #online #predict #using
How far will you go?: characterizing and predicting online search stopping behavior using information scent and need for cognition (WCW), p. 1149.
MODELSMoDELS-2013-PiresPWD #embedded #source code #verification
Behavioural Verification in Embedded Software, from Model to Source Code (AFP, TP, VW, SD), pp. 320–335.
PLEASEPLEASE-2013-FangLED #challenge #variability
Challenges in managing behavior variability of production control software (MF, GL, CE, JD), pp. 21–24.
HILTHILT-2013-Goodenough
Building confidence in system behavior (JBG), pp. 49–50.
POPLPOPL-2013-CairesS
The type discipline of behavioral separation (LC, JCS), pp. 275–286.
QAPLQAPL-2013-BernardoNL #nondeterminism #probability #process
The Spectrum of Strong Behavioral Equivalences for Nondeterministic and Probabilistic Processes (MB, RDN, ML), pp. 81–96.
RERE-2013-KrkaM
Distributing refinements of a system-level partial behavior model (IK, NM), pp. 72–81.
ASEASE-2013-ChandramohanTBSP #approach #bound #detection #modelling #scalability
A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
ASEASE-2013-Fard #detection #distributed #independence #using
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ESEC-FSEESEC-FSE-2013-SchurRZ #enterprise #mining #modelling #web
Mining behavior models from enterprise web applications (MS, AR, AZ), pp. 422–432.
SACSAC-2013-GregioFAGMJ #analysis #empirical #internet
An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
SACSAC-2013-NardelliTB
Cross-lattice behavior of general ACO folding for proteins in the HP model (MN, LT, AB), pp. 1320–1327.
SACSAC-2013-SchroderN #resource management
Inter cloud capable dynamic resource management with model of behavior (KS, WN), pp. 408–410.
SACSAC-2013-UmemotoYNT #predict #query
Predicting query reformulation type from user behavior (KU, TY, SN, KT), pp. 894–901.
CASECASE-2013-BengtssonL #algorithm #identification #modelling #using #visualisation
Operation behavior modeling using relation identification and visualization algorithms (KB, BL), pp. 368–373.
CASECASE-2013-DingHMS #collaboration #industrial
Structured collaborative behavior of industrial robots in mixed human-robot environments (HD, JH, BM, HS), pp. 1101–1106.
CASECASE-2013-RoyerBTT #assessment #energy #modelling #multi #simulation #using
Modelling of a multi-zone building and assessment of its thermal behaviour using an energy simulation software (SR, MB, ST, TT), pp. 735–740.
CASECASE-2013-RoyZR #framework #representation
The information framework for material behavior representation (UR, BZ, DJR), pp. 380–385.
DACDAC-2013-Miskov-ZivanovMF #analysis #automation #design #network
Dynamic behavior of cell signaling networks: model design and analysis automation (NMZ, DM, JRF), p. 6.
DACDAC-2013-YangRHX #design #equivalence #implementation #optimisation #synthesis
Handling design and implementation optimizations in equivalence checking for behavioral synthesis (ZY, SR, KH, FX), p. 6.
HPCAHPCA-2013-NereHLT #biology #semantic gap
Bridging the semantic gap: Emulating biological neuronal behaviors with simple digital neurons (AN, AH, MHL, GT), pp. 472–483.
PDPPDP-2013-DrumlMSWGBH #design #functional #performance #verification
Emulation-Based Test and Verification of a Design’s Functional, Performance, Power, and Supply Voltage Behavior (ND, MM, CS, RW, AG, HB, JH), pp. 328–335.
SOSPSOSP-2013-WangZKS #towards
Towards optimization-safe systems: analyzing the impact of undefined behavior (XW, NZ, MFK, ASL), pp. 260–275.
ESOPESOP-2013-CairesPPT #communication #morphism #parametricity #polymorphism
Behavioral Polymorphism and Parametricity in Session-Based Communication (LC, JAP, FP, BT), pp. 330–349.
FASEFASE-2013-BouchouchaSL #comprehension #modelling #probability #towards #using
Towards Understanding the Behavior of Classes Using Probabilistic Models of Program Inputs (AB, HAS, PL), pp. 99–113.
FASEFASE-2013-LinPEHR #analysis #requirements #sequence #specification #string
Augmenting Sequence Enumeration with String-Rewriting for Requirements Analysis and Behavioral Specification (LL, JHP, RE, RMH, CRM), pp. 179–193.
FASEFASE-2013-ZhongTX #api #difference
Exposing Behavioral Differences in Cross-Language API Mapping Relations (HZ, ST, TX), pp. 130–145.
ICSTICST-2013-CzemerinskiBU #abstraction #black box
Behaviour Abstraction Coverage as Black-Box Adequacy Criteria (HC, VAB, SU), pp. 222–231.
LICSLICS-2013-MogaveroMS #bound #on the
On the Boundary of Behavioral Strategies (FM, AM, LS), pp. 263–272.
DocEngDocEng-2012-SoaresNS #architecture #constraints #hypermedia
Architecture for hypermedia dynamic applications with content and behavior constraints (LFGS, CdSSN, JGS), pp. 217–226.
HTHT-2012-CunhaMAGB #gender #twitter
A gender based study of tagging behavior in twitter (EC, GM, VA, MAG, FB), pp. 323–324.
HTHT-2012-SchofeggerKSG #learning #social
Learning user characteristics from social tagging behavior (KS, CK, PS, MG), pp. 207–212.
JCDLJCDL-2012-HinzeMVTC #library #physics
Book selection behavior in the physical library: implications for ebook collections (AH, DM, NV, CT, SJC), pp. 305–314.
TPDLTPDL-2012-McKayHHVTC #library
An Exploration of ebook Selection Behavior in Academic Library Collections (DM, AH, RH, NV, CT, SJC), pp. 13–24.
VLDBVLDB-2012-KanagalAPJYP #learning #recommendation #taxonomy #using
Supercharging Recommender Systems using Taxonomies for Learning User Purchase Behavior (BK, AA, SP, VJ, JY, LGP), pp. 956–967.
ITiCSEITiCSE-2012-BoyceCPCB #game studies #learning
Maximizing learning and guiding behavior in free play user generated content environments (AKB, AC, SP, DC, TB), pp. 10–15.
ITiCSEITiCSE-2012-GomesSM #case study #learning #student #towards
A study on students’ behaviours and attitudes towards learning to program (AJG, ÁNS, AJM), pp. 132–137.
CSMRCSMR-2012-MaezawaWH #internet
Extracting Interaction-Based Stateful Behavior in Rich Internet Applications (YM, HW, SH), pp. 423–428.
ICSMEICSM-2012-RungtaPB #evolution #impact analysis
A change impact analysis to characterize evolving program behaviors (NR, SP, JB), pp. 109–118.
FMFM-2012-GrumbergMY #model checking #modelling #uml
Applying Software Model Checking Techniques for Behavioral UML Models (OG, YM, KY), pp. 277–292.
IFMIFM-2012-TianBB #detection #game studies #multi
Behaviour-Based Cheat Detection in Multiplayer Games with Event-B (HT, PJB, AGB), pp. 206–220.
AIIDEAIIDE-2012-DesaiS #using
Enhancing the Believability of Character Behaviors Using Non-Verbal Cues (ND, DS).
AIIDEAIIDE-2012-Ocio #adaptation
Adapting AI Behaviors To Players in Driver San Francisco: Hinted-Execution Behavior Trees (SO).
CoGCIG-2012-DrachenSBT #clustering #game studies
Guns, swords and data: Clustering of player behavior in computer games in the wild (AD, RS, CB, CT), pp. 163–170.
CoGCIG-2012-JohanssonD
Emotional behavior trees (AJ, PD), pp. 355–362.
CoGCIG-2012-RobertsL #design #evolution
Evolving spaceship designs for optimal control and the emergence of interesting behaviour (SAR, SML), pp. 342–349.
CoGCIG-2012-RosenthalC #generative
Personality profiles for generating believable bot behaviors (CR, CBC), pp. 124–131.
FDGFDG-2012-Canossa
Give me a reason to dig: qualitative associations between player behavior in Minecraft and life motives (AC), pp. 282–283.
CoGVS-Games-2012-AsteriadisKSY #clustering #detection #towards #using #visual notation
Towards Detecting Clusters of Players using Visual and Gameplay Behavioral Cues (SA, KK, NS, GNY), pp. 140–147.
ICGTICGT-2012-GieseL #automation #invariant #model transformation #towards #verification
Towards Automatic Verification of Behavior Preservation for Model Transformation via Invariant Checking (HG, LL), pp. 249–263.
CHICHI-2012-ArroyoBV #embedded #interactive
Embedded interaction in a water fountain for motivating behavior change in public space (EA, LB, NV), pp. 685–688.
CHICHI-2012-BatemanTW #comparison #how
The search dashboard: how reflection and comparison impact search behavior (SB, JT, RWW), pp. 1785–1794.
CHICHI-2012-BirnholtzBF
Do you see that I see?: effects of perceived visibility on awareness checking behavior (JPB, NB, SRF), pp. 1765–1774.
CHICHI-2012-EvansW #metric
Taming wild behavior: the input observer for text entry and mouse pointing measures from everyday computer use (AE, JOW), pp. 1947–1956.
CHICHI-2012-HenzeRB #mobile #type system #using
Observational and experimental investigation of typing behaviour using virtual keyboards for mobile devices (NH, ER, SB), pp. 2659–2668.
CHICHI-2012-KoppelBMW
Chained displays: configurations of public displays can be used to influence actor-, audience-, and passer-by behavior (MTK, GB, JM, RW), pp. 317–326.
CHICHI-2012-LeonUSWBC #evaluation #online #tool support #usability #why
Why Johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising (PGL, BU, RS, YW, RB, LFC), pp. 589–598.
CHICHI-2012-NowakN #monitoring #online #recommendation
Effects of behavior monitoring and perceived system benefit in online recommender systems (MN, CN), pp. 2243–2246.
CHICHI-2012-OdomZFCMP
Investigating the presence, form and behavior of virtual possessions in the context of a teen bedroom (WO, JZ, JF, HC, SM, AP), pp. 327–336.
CHICHI-2012-RaeTM #communication
One of the gang: supporting in-group behavior for embodied mediated communication (IR, LT, BM), pp. 3091–3100.
CSCWCSCW-2012-AntinCN #editing
Technology-mediated contributions: editing behaviors among new wikipedians (JA, CC, ON), pp. 373–382.
CSCWCSCW-2012-MillerPXEKCM #game studies #health #pervasive #student
The work of play: supporting a pervasive health behavior change intervention for us middle school students (ADM, ESP, YX, EE, DK, RC, EDM), pp. 897–900.
ICEISICEIS-v1-2012-LouatiBDS #database #modelling #realtime
Modeling Structural, Temporal and Behavioral Features of a Real-Time Database (NL, RB, CD, BS), pp. 119–125.
ICEISICEIS-v2-2012-LelionnaisBDRS #modelling #operating system #realtime
Formal Behavioral Modeling of Real-time Operating Systems (CL, MB, JD, OHR, CS), pp. 407–414.
CIKMCIKM-2012-AhmedADSA #feature model #multi
Web-scale multi-task feature selection for behavioral targeting (AA, MA, AD, AJS, TA), pp. 1737–1741.
CIKMCIKM-2012-ArguelloC
The effect of aggregated search coherence on search behavior (JA, RC), pp. 1293–1302.
CIKMCIKM-2012-AshkanC #analysis #modelling
Modeling browsing behavior for click analysis in sponsored search (AA, CLAC), pp. 2015–2019.
CIKMCIKM-2012-CarteretteKY #evaluation #variability
Incorporating variability in user behavior into systems based evaluation (BC, EK, EY), pp. 135–144.
CIKMCIKM-2012-KimFC #comprehension #web
Understanding book search behavior on the web (JYK, HAF, MAC), pp. 744–753.
CIKMCIKM-2012-WuJZ
Serial position effects of clicking behavior on result pages returned by search engines (MW, SJ, YZ), pp. 2411–2414.
CIKMCIKM-2012-ZhuGCL #mining #query #recommendation
More than relevance: high utility query recommendation by mining users’ search behaviors (XZ, JG, XC, YL), pp. 1814–1818.
ICMLICML-2012-SheffetMI #predict
Predicting Consumer Behavior in Commerce Search (OS, NM, SI), p. 233.
ICPRICPR-2012-DeyG #consistency #topic #twitter
Discovering regular and consistent behavioral patterns in topical tweeting (LD, BG), pp. 3464–3467.
ICPRICPR-2012-MatsuoK #monitoring #predict
Prediction of drowsy driving by monitoring driver’s behavior (HM, AK), pp. 3390–3393.
ICPRICPR-2012-MinouraW
Driving support by estimating vehicle behavior (KM, TW), pp. 1144–1147.
ICPRICPR-2012-NakamuraIKB #authentication #multi #tablet
Tablet owner authentication based on behavioral characteristics of multi-touch actions (KN, YI, KK, NB), pp. 3431–3434.
KDDKDD-2012-SongCWWYD #analysis
Coupled behavior analysis for capturing coupling relationships in group-based market manipulations (YS, LC, XW, GW, WY, WD), pp. 976–984.
KDDKDD-2012-XingLHCHLLMZ #chat #detection #online #scalability #video
Scalable misbehavior detection in online video chat services (XX, YLL, SH, HC, RH, QL, XL, SM, YZ), pp. 552–560.
KDDKDD-2012-ZhongFWXL #adaptation #named #network #social
ComSoc: adaptive transfer of user behaviors over composite social network (EZ, WF, JW, LX, YL), pp. 696–704.
KDDKDD-2012-ZhouQM #data analysis #social #social media
Social media data analysis for revealing collective behaviors (AZ, WQ, HM), p. 1402.
KDIRKDIR-2012-SantosGSK #detection #finite
Finite Belief Fusion Model for Hidden Source Behavior Change Detection (ESJ, QG, EES, JK), pp. 17–24.
KMISKMIS-2012-LiuAACT #modelling
Modeling Dynamic Behavior of Business Organisations — Extension of BPM with Norms (KL, MAR, ARA, LC, JT), pp. 196–201.
KMISKMIS-2012-MarsanCE #analysis #enterprise #framework #information management #platform #scalability #tool support #using
Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
MLDMMLDM-2012-HossainC #identification
Combination of Physiological and Behavioral Biometric for Human Identification (EH, GC), pp. 380–393.
SEKESEKE-2012-ChenL #approach #elicitation #ontology #requirements #security
Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach (XC, JL), pp. 61–65.
SEKESEKE-2012-CourbisLLPUV #agile #development #incremental #specification
A Formal Support for Incremental Behavior Specification In Agile Development (ALC, TL, HVL, TLP, CU, SV), pp. 694–799.
SEKESEKE-2012-MireslamiMF #detection #distributed
Detecting Emergent Behavior in Distributed Systems Caused by Overgeneralization (SM, MM, BHF), pp. 70–73.
SIGIRSIGIR-2012-BennettWCDBBC #modelling #personalisation
Modeling the impact of short- and long-term behavior on search personalization (PNB, RWW, WC, STD, PB, FB, XC), pp. 185–194.
SIGIRSIGIR-2012-LiuBC #interactive #personalisation #using
Personalization of search results using interaction behaviors in search sessions (CL, NJB, MJC), pp. 205–214.
SIGIRSIGIR-2012-TrevisiolCAJ #image #ranking
Image ranking based on user browsing behavior (MT, LC, LMA, AJ), pp. 445–454.
SIGIRSIGIR-2012-TsagkiasB #modelling
Language intent models for inferring user browsing behavior (MT, RB), pp. 335–344.
SIGIRSIGIR-2012-XuZWY #modelling #social #social media
Modeling user posting behavior on social media (ZX, YZ, YW, QY), pp. 545–554.
MODELSMoDELS-2012-HamannHG #modelling #ocl #on the
On Integrating Structure and Behavior Modeling with OCL (LH, OH, MG), pp. 235–251.
SPLCSPLC-2012-CordySHL #modelling #product line #realtime #verification
Behavioural modelling and verification of real-time software product lines (MC, PYS, PH, AL), pp. 66–75.
OOPSLAOOPSLA-2012-TamayoABS #comprehension #database
Understanding the behavior of database operations under program control (JMT, AA, NGB, MS), pp. 983–996.
OOPSLAOOPSLA-2012-WuZSJGS #correlation #predict
Exploiting inter-sequence correlations for program behavior prediction (BW, ZZ, XS, YJ, YG, RS), pp. 851–866.
TOOLSTOOLS-EUROPE-2012-SoekenWD #development #natural language #using
Assisted Behavior Driven Development Using Natural Language Processing (MS, RW, RD), pp. 269–287.
FSEFSE-2012-ChandramohanTS #clustering #modelling #scalability
Scalable malware clustering through coarse-grained behavior modeling (MC, HBKT, LKS), p. 27.
ICSEICSE-2012-FengC #learning #multi
Multi-label software behavior learning (YF, ZC), pp. 1305–1308.
ICSEICSE-2012-GhezziM #specification #synthesis #validation
Behavioral validation of JFSL specifications through model synthesis (CG, AM), pp. 936–946.
ICSEICSE-2012-ZhengT #architecture #consistency #implementation
Enhancing architecture-implementation conformance with change management and support for behavioral mapping (YZ, RNT), pp. 628–638.
SACSAC-2012-ArpiniA #enterprise #modelling #on the
On the support for the assignment of active structure and behavior in enterprise modeling approaches (RHA, JPAA), pp. 1686–1693.
SACSAC-2012-WangTWWG #algorithm #empirical #evaluation #mining #process
An empirical evaluation of process mining algorithms based on structural and behavioral similarities (JW, ST, LW, RKW, QG), pp. 211–213.
GPCEGPCE-2012-SpacekDTF #component #inheritance #programming #reuse
An inheritance system for structural & behavioral reuse in component-based software programming (PS, CD, CT, LF), pp. 60–69.
CASECASE-2012-CunhaBC #industrial
Discovery of behavior in industrial plants: A KDD based proposal (MJdC, VLB, GAdPC), pp. 986–991.
CASECASE-2012-ParkM #bound #clustering #hybrid #linear #performance #tool support
Performance bounds for hybrid flow lines: Fundamental behavior, practical features and application to linear cluster tools (KP, JRM), pp. 371–376.
CASECASE-2012-WigstromL #scheduling
Scheduling model for systems with complex alternative behaviour (OW, BL), pp. 587–593.
DACDAC-2012-HaoRX #equivalence #pipes and filters
Equivalence checking for behaviorally synthesized pipelines (KH, SR, FX), pp. 344–349.
HPCAHPCA-2012-BalakrishnanS #named #probability #using
WEST: Cloning data cache behavior using Stochastic Traces (GB, YS), pp. 387–398.
ISMMISMM-2012-SeweMSABRG #comparison #java #memory management #scala #source code
new Scala() instance of Java: a comparison of the memory behaviour of Java and Scala programs (AS, MM, AS, DA, WB, NPR, SZG), pp. 97–108.
ESOPESOP-2012-ChenCJK #component #composition #specification
A Compositional Specification Theory for Component Behaviours (TC, CC, BJ, MZK), pp. 148–168.
ESOPESOP-2012-DimoulasTF #contract #monitoring
Complete Monitors for Behavioral Contracts (CD, STH, MF), pp. 214–233.
ICSTICST-2012-DiGiuseppeJ #clustering #empirical #fault
Software Behavior and Failure Clustering: An Empirical Study of Fault Causality (ND, JAJ), pp. 191–200.
ICSTICST-2012-FraserW #testing
Behaviourally Adequate Software Testing (GF, NW), pp. 300–309.
ICTSSICTSS-2012-TaylorHBD #testing #using
Using Behaviour Inference to Optimise Regression Test Sets (RT, MH, KB, JD), pp. 184–199.
ECSAECSA-2011-HamelGKBG #transaction #verification
Verifying Composite Service Transactional Behavior with EVENT-B (LH, MG, MK, MTB, WG), pp. 67–74.
HTHT-2011-IturriozDA
Reactive tags: associating behaviour to prescriptive tags (JI, OD, IA), pp. 191–200.
HTHT-2011-PapagelisMZ #online #social
Individual behavior and social influence in online social systems (MP, VM, RvZ), pp. 241–250.
SIGMODSIGMOD-2011-DamaggioDZ #contract #database #query
Querying contract databases based on temporal behavior (ED, AD, DZ), pp. 397–408.
TPDLTPDL-2011-AlhooriF #comprehension #research #social
Understanding the Dynamic Scholarly Research Needs and Behavior as Applied to Social Reference Management (HA, RF), pp. 169–178.
TPDLTPDL-2011-GiannopoulosDS #ranking
Search Behavior-Driven Training for Result Re-Ranking (GG, TD, TKS), pp. 316–328.
TPDLTPDL-2011-Strebe #visual notation
Visual Aesthetics of Websites: The Visceral Level of Perception and Its Influence on User Behaviour (RS), pp. 523–526.
ITiCSEITiCSE-2011-LeeR #algorithm #towards #visualisation
Toward replicating handmade algorithm visualization behaviors in a digital environment: a pre-study (MHL, GR), pp. 198–202.
ICPCICPC-2011-SyerAH #case study #comprehension #industrial
Industrial Case Study on Supporting the Comprehension of System Behaviour under Load (MDS, BA, AEH), pp. 215–216.
ICPCICPC-2011-YingR
The Influence of the Task on Programmer Behaviour (ATTY, MPR), pp. 31–40.
PASTEPASTE-2011-Detten #detection #execution #generative #symbolic computation #towards
Towards systematic, comprehensive trace generation for behavioral pattern detection through symbolic execution (MvD), pp. 17–20.
IFMIFM-J-2009-ColvinH11 #csp #semantics #specification #using
A semantics for Behavior Trees using CSP with specification commands (RC, IJH), pp. 891–914.
IFMIFM-J-2009-DovlandJOS11 #incremental #inheritance #lazy evaluation #multi #reasoning #type system
Incremental reasoning with lazy behavioral subtyping for multiple inheritance (JD, EBJ, OO, MS), pp. 915–941.
FMFM-2011-AlbertGGJST #bound #concurrent #simulation #worst-case
Simulating Concurrent Behaviors with Worst-Case Cost Bounds (EA, SG, MGZ, EBJ, RS, SLTT), pp. 353–368.
FMFM-2011-Harel #programming
Some Thoughts on Behavioral Programming (DH), p. 2.
SFMSFM-2011-ClarkeDHJSSSW #modelling #variability
Modeling Spatial and Temporal Variability with the HATS Abstract Behavioral Modeling Language (DC, ND, RH, EBJ, IS, JS, RS, PYHW), pp. 417–457.
AIIDEAIIDE-2011-BecroftBMRS #authoring #named #sketching
AIPaint: A Sketch-Based Behavior Tree Authoring Tool (DB, JB, AM, CR, CLS).
AIIDEAIIDE-2011-BlackadarD #contest #testing
Behavior Learning-Based Testing of Starcraft Competition Entries (MB, JD).
AIIDEAIIDE-2011-CenknerBS #generative
A Generative Computational Model for Human Hide and Seek Behavior (AC, VB, MS).
AIIDEAIIDE-2011-ChangMLR #game studies #learning
Learning and Evaluating Human-Like NPC Behaviors in Dynamic Games (YHC, RTM, TL, VR).
AIIDEAIIDE-2011-DereszynskiHFDHU #game studies #learning #modelling #probability #realtime
Learning Probabilistic Behavior Models in Real-Time Strategy Games (EWD, JH, AF, TGD, TTH, MU).
AIIDEAIIDE-2011-Horswill #agile #prototype #towards
Toward a Rapid Prototyping Environment for Character Behavior (IDH).
CoGCIG-2011-CardamoneCLL #game studies
Transfer of driving behaviors across different racing games (LC, AC, DL, PLL), pp. 227–234.
CoGCIG-2011-IshibuchiTHMN #evolution #game studies
Effects of configuration of agents with different strategy representations on the evolution of cooperative behavior in a spatial IPD game (HI, KT, KH, JM, YN), pp. 313–320.
CoGCIG-2011-SchrumKM #named
UT2: Human-like behavior via neuroevolution of combat behavior and replay of human traces (JS, IK, RM), pp. 329–336.
DiGRADiGRA-2011-Marriott #design #game studies #social
Designing Social Behaviour through Play (TM).
FDGFDG-2011-HarrisonR #predict #using
Using sequential observations to model and predict player behavior (BEH, DLR), pp. 91–98.
FDGFDG-2011-PicardiBY #modelling
Modelling virtual camera behaviour through player gaze (AP, PB, GNY), pp. 107–114.
CoGVS-Games-2011-ManiaMCWRRC
Exploring Behavioural Fidelity of Synthetic Stimuli While Immersed in fMRI Displays (KM, NM, GC, PLW, FMR, ER, HDC), pp. 215–219.
CHICHI-2011-BeyerAMSIKSH #interactive #scalability
Audience behavior around large interactive cylindrical screens (GB, FA, JM, AS, KI, SK, MS, IH), pp. 1021–1030.
CHICHI-2011-BogunovichS #constraints
The effects of time constraints on user behavior for deferrable interruptions (PB, DDS), pp. 3123–3126.
CHICHI-2011-ChoeCWK
Opportunities for computing technologies to support healthy sleep behaviors (EKC, SC, NFW, JAK), pp. 3053–3062.
CHICHI-2011-CoyleMDO #game studies
Exploratory evaluations of a computer game supporting cognitive behavioural therapy for adolescents (DC, NM, GD, GO), pp. 2937–2946.
CHICHI-2011-GabrielliSMMM #feedback #interface #named
BeeParking: feedback interfaces for collective behavior change (SG, AS, JM, MM, OM), pp. 2145–2148.
CHICHI-2011-KlasnjaCP #health #how #human-computer #research
How to evaluate technologies for health behavior change in HCI research (PVK, SC, WP), pp. 3063–3072.
CHICHI-2011-LeeKF #design #mining #persuasion
Mining behavioral economics to design persuasive technology for healthy choices (MKL, SBK, JF), pp. 325–334.
CHICHI-2011-PurpuraSWSS #design #named #persuasion
Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight (SP, VS, KW, WS, PS), pp. 423–432.
CHICHI-2011-RomeroVPSA #video #visualisation
Evaluating video visualizations of human behavior (MR, AV, JP, JTS, GDA), pp. 1441–1450.
CHICHI-2011-ScissorsSIRS #collaboration #distributed #editing #realtime
Real-time collaborative editing behavior in USA and Japanese distributed teams (LES, NSS, TI, SLR, SS), pp. 1119–1128.
CSCWCSCW-2011-RauLVKS
Different time management behaviors of Germans, Chinese and Japanese (PLPR, JL, SV, TK, CMS), pp. 701–704.
HCIDHM-2011-LaquaiDR #modelling
Impact and Modeling of Driver Behavior Due to Cooperative Assistance Systems (FL, MD, GR), pp. 473–482.
HCIDHM-2011-TangoMAP #automation #classification
Automation Effects on Driver’s Behaviour When Integrating a PADAS and a Distraction Classifier (FT, LM, RA, OP), pp. 503–512.
HCIDHM-2011-WortelenL #approach #automation #estimation
Less Driving While Driving? An Approach for the Estimation of Effects of Future Vehicle Automation Systems on Driver Behavior (BW, AL), pp. 523–532.
HCIDUXU-v2-2011-Capra #human-computer #web
HCI Browser: A Tool for Administration and Data Collection for Studies of Web Search Behaviors (RC), pp. 259–268.
HCIDUXU-v2-2011-KimL11a #mobile #research
Ethnographic Research of User Behavior of Mobile Devices of China, Korea, India, and The Netherlands (DK, KPL), pp. 294–302.
HCIHCD-2011-AhramK #design #modelling #network #social
Social Networking Applications: Smarter Product Design for Complex Human Behaviour Modeling (TZA, WK), pp. 471–480.
HCIHCD-2011-HajekPJB #multimodal
Influence of a Multimodal Assistance Supporting Anticipatory Driving on the Driving Behavior and Driver’s Acceptance (HH, DP, MJ, KB), pp. 217–226.
HCIHCD-2011-WangL11a #analysis #design #evaluation
Task Analysis for Behavioral Factors Evaluation in Work System Design (LW, HYKL), pp. 440–448.
HCIHCI-DDA-2011-DjamasbiST #eye tracking #visual notation
Visual Hierarchy and Viewing Behavior: An Eye Tracking Study (SD, MS, TT), pp. 331–340.
HCIHCI-DDA-2011-KalwarHP #internet
Finding a Relationship between Internet Anxiety and Human Behavior (SKK, KH, JP), pp. 359–367.
HCIHCI-DDA-2011-KimJRWS #simulation #using
Human Behavioral Simulation Using Affordance-Based Agent Model (NK, JJ, LR, RAW, YJS), pp. 368–377.
HCIHCI-ITE-2011-JohnsonLNY
Analyzing User Behavior within a Haptic System (SLJ, YL, CSN, TY), pp. 62–70.
HCIHCI-MIIE-2011-AiharaKT #cost analysis #recommendation
Behavioral Cost-Based Recommendation Model for Wanderers in Town (KA, HK, HT), pp. 271–279.
HCIHCI-MIIE-2011-AoyagiOIS #communication
Proposal of a Method for Promotion of Continuous Pro-Environmental Behavior with Easy Communication (SA, TO, HI, HS), pp. 465–473.
HCIHCI-MIIE-2011-ChiangT11a #mobile #network #smarttech #social #twitter
The Effort of Social Networking on Social Behavior — Integrating Twitter, Mobile Devices, and Wearable Clothing as an Example (CWC, KT), pp. 30–37.
HCIHCI-MIIE-2011-KimDCH #energy
Assessing the Effect of a Power-Flow Gauge on Driving Behaviors Affecting Energy Consumption (SHK, HD, EC, HH), pp. 411–417.
HCIHCI-MIIE-2011-KimHJHMJ #analysis #using #video
Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
HCIHCI-MIIE-2011-LimPJK #experience
Driver’s Experience and Behavioral Patterns through the Observation of Commercial Vehicle Driving (YL, SP, ESJ, TK), pp. 426–434.
HCIHCI-MIIE-2011-WalterSSGHSBLTS #classification #multimodal
Multimodal Emotion Classification in Naturalistic User Behavior (SW, SS, MS, MG, DH, MS, RB, KL, HCT, FS), pp. 603–611.
HCIHCI-UA-2011-HsuC #approach #navigation
Associating Learners’ Cognitive Style with Their Navigation Behaviors: A Data-Mining Approach (YCH, SYC), pp. 27–34.
HCIHIMI-v1-2011-Asahi #privacy #research #ubiquitous
Privacy Concern in Ubiquitous Society and Research on Consumer Behavior (YA), pp. 291–300.
HCIHIMI-v1-2011-NguyenV #online #privacy #question
Does Privacy Information Influence Users’ Online Purchasing Behavior? (JHN, KPLV), pp. 349–358.
HCIHIMI-v2-2011-BrandonEGFGV #feedback #social #visual notation
The Effects Visual Feedback on Social Behavior during Decision Making Meetings (MB, SE, TdG, TF, BvG, TV), pp. 219–228.
HCIHIMI-v2-2011-Otsuka #analysis #comprehension #multimodal #people
Multimodal Conversation Scene Analysis for Understanding People’s Communicative Behaviors in Face-to-Face Meetings (KO), pp. 171–179.
HCIHIMI-v2-2011-ShinCRR #interactive #named #visualisation
VizKid: A Behavior Capture and Visualization System of Adult-Child Interaction (GS, TC, AR, MR), pp. 190–198.
HCIIDGD-2011-OginoKIK #comprehension
Smart Store Understanding Consumer’s Preference through Behavior Logs (AO, TK, YI, TK), pp. 385–392.
HCIIDGD-2011-YangLD #case study #internet #mobile
A Case Study: Behavior Study of Chinese Users on the Internet and Mobile Internet (YY, HL, GD), pp. 585–593.
HCIOCSC-2011-TsaiHT11a #difference #metric
Measurement of Tagging Behavior Differences (LCT, SLH, KHT), pp. 373–377.
VISSOFTVISSOFT-2011-ChoudhuryR #memory management #runtime #visualisation
Abstract visualization of runtime memory behavior (ANMIC, PR), pp. 1–8.
VISSOFTVISSOFT-2011-WirthPS #approach #multi #visualisation
A multi-level approach for visualization and exploration of reactive program behavior (CW, HP, RS), pp. 1–4.
CAiSECAiSE-2011-LiaskosLJM #information management
Goal-Based Behavioral Customization of Information Systems (SL, ML, MDJ, JM), pp. 77–92.
ICEISICEIS-v1-2011-WeiY #analysis #game studies #metric #security
Security Investment Analysis on Gaming Theory with Measurements of Cost and Decision Behavior (WW, RY), pp. 519–523.
ICEISICEIS-v4-2011-TongYZS #online #overview #research
A Review of Online Consumer Behavior Research (LyT, QJY, QJZ, HZS), pp. 170–175.
ICEISICEIS-v4-2011-ZhangFZ #industrial #performance
An Empericial Study about Franchise Relationship Behaviors’s Impacts on Franchisees’ Performance in Fastfood Industry (YZ, JF, YZ), pp. 695–701.
CIKMCIKM-2011-AielloDOM #clustering #query #topic
Behavior-driven clustering of queries into topics (LMA, DD, UO, FM), pp. 1373–1382.
CIKMCIKM-2011-CarteretteKY #effectiveness #evaluation #simulation
Simulating simple user behavior for system effectiveness evaluation (BC, EK, EY), pp. 611–620.
CIKMCIKM-2011-FeiJYLH #approach #learning #multi #predict #social
Content based social behavior prediction: a multi-task learning approach (HF, RJ, YY, BL, JH), pp. 995–1000.
CIKMCIKM-2011-KimQYL #approach
Advertiser-centric approach to understand user click behavior in sponsored search (SK, TQ, HY, TYL), pp. 2121–2124.
CIKMCIKM-2011-LiuCZZ #crawling #web
User browsing behavior-driven web crawling (ML, RC, MZ, LZ), pp. 87–92.
CIKMCIKM-2011-LiuT #scalability #social
Large-scale behavioral targeting with a social twist (KL, LT), pp. 1815–1824.
CIKMCIKM-2011-ONeilPA #game studies #named #query
Fu-Finder: a game for studying querying behaviours (CO, JP, LA), pp. 2561–2564.
CIKMCIKM-2011-PandeyABHCRZ #learning #what
Learning to target: what works for behavioral targeting (SP, MA, AB, AOH, PC, AR, MZ), pp. 1805–1814.
CIKMCIKM-2011-TangLYSGGYZ #learning #rank
Learning to rank audience for behavioral targeting in display ads (JT, NL, JY, YS, SG, BG, SY, MZ), pp. 605–610.
ECIRECIR-2011-LiuA #collaboration #modelling
Modeling Answerer Behavior in Collaborative Question Answering Systems (QL, EA), pp. 67–79.
KDDKDD-2011-AhmedLAJS #distributed #scalability
Scalable distributed inference of dynamic user interests for behavioral targeting (AA, YL, MA, VJ, AJS), pp. 114–122.
KDDKDD-2011-LiL #community #detection #framework #generative #modelling #network #simulation #social
Social flocks: a crowd simulation framework for social network generation, community detection, and collective behavior modeling (CTL, SDL), pp. 765–768.
KDDKDD-2011-McCloskeyKIKB #data mining #mining #using
From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
KDDKDD-2011-ZhangCWY #comprehension #modelling #predict
User-click modeling for understanding and predicting search-behavior (YZ, WC, DW, QY), pp. 1388–1396.
KMISKMIS-2011-JohnMMMB #enterprise
Impact of Behavioral Forces on Knowledge Sharing in an Extended Enterprise System of Systems (LJ, PMM, TM, GRM, JTB), pp. 67–76.
KMISKMIS-2011-TangPI
Employees’ Innovation Behavior — The Role of External Information Awareness and Proactiveness of Innovation Strategy (JT, LGP, JI), pp. 5–17.
MLDMMLDM-2011-Hasan #on the
On the Temporal Behavior of EEG Recorded during Real Finger Movement (BASH), pp. 335–347.
RecSysRecSys-2011-GorgoglionePT #recommendation #trust
The effect of context-aware recommendations on customer purchasing behavior and trust (MG, UP, AT), pp. 85–92.
RecSysRecSys-2011-LeeL #analysis #music #recommendation
My head is your tail: applying link analysis on long-tailed music listening behavior for music recommendation (KL, KL), pp. 213–220.
RecSysRecSys-2011-SekoYMM #recommendation #representation #using
Group recommendation using feature space representing behavioral tendency and power balance among members (SS, TY, MM, SyM), pp. 101–108.
SEKESEKE-2011-FerreiraS #case study
Use Case Driven Extension of ProjectIT-RSL to Support Behavioral Concerns (DdAF, ARdS), pp. 740–745.
SIGIRSIGIR-2011-Du #coordination #multi #web
Cognitive coordinating behaviors in multitasking web search (JTD), pp. 1117–1118.
SIGIRSIGIR-2011-ElsweilerHH #comprehension #email #interactive
Understanding re-finding behavior in naturalistic email interaction logs (DE, MH, MH), pp. 35–44.
SIGIRSIGIR-2011-KarimiSCK #topic
Domain expert topic familiarity and search behavior (SK, FS, AC, SK), pp. 1135–1136.
SIGIRSIGIR-2011-SinghPS #query
User behavior in zero-recall ecommerce queries (GS, NP, NS), pp. 75–84.
SIGIRSIGIR-2011-Tyler #multi #persistent #personalisation
Persistence in the ephemeral: utilizing repeat behaviors for multi-session personalized search (SKT), pp. 1311–1312.
SIGIRSIGIR-2011-ZhangCB #predict
Predicting users’ domain knowledge from search behaviors (XZ, MJC, NJB), pp. 1225–1226.
MODELSMoDELS-2011-ClavreulMBF #architecture #modelling
Service-Oriented Architecture Modeling: Bridging the Gap between Structure and Behavior (MC, SM, MBF, RBF), pp. 289–303.
MODELSMoDELS-2011-JensenCGN #detection
A Toolchain for the Detection of Structural and Behavioral Latent System Properties (ACJ, BHCC, HG, ECN), pp. 683–698.
PLDIPLDI-2011-BudiLJL #debugging #named
kb-anonymity: a model for anonymized behaviour-preserving test and debugging data (AB, DL, LJ, L), pp. 447–457.
ASEASE-2011-Dwyer #analysis #testing
Unifying testing and analysis through behavioral coverage (MBD), p. 2.
ASEASE-2011-RamirezJCK #adaptation #automation #how #nondeterminism
Automatically exploring how uncertainty impacts behavior of dynamically adaptive systems (AJR, ACJ, BHCC, DBK), pp. 568–571.
ESEC-FSEESEC-FSE-2011-BeschastnikhABE #modelling #named
Synoptic: studying logged behavior with inferred models (IB, JA, YB, MDE), pp. 448–451.
ICSEICSE-2011-CasoBGU #abstraction #validation
Program abstractions for behaviour validation (GdC, VAB, DG, SU), pp. 381–390.
ICSEICSE-2011-DIppolitoBPU #modelling #synthesis
Synthesis of live behaviour models for fallible domains (ND, VAB, NP, SU), pp. 211–220.
ICSEICSE-2011-HolmesN #identification
Identifying program, test, and environmental changes that affect behaviour (RH, DN), pp. 371–380.
ICSEICSE-2011-HolmesN11a #identification
Identifying opaque behavioural changes (RH, DN), pp. 995–997.
ICSEICSE-2011-PirzadehH #analysis #framework
A software behaviour analysis framework based on the human perception systems (HP, AHL), pp. 948–951.
SACSAC-2011-BhaskaranNFG #detection #learning #online
Deceit detection via online behavioral learning (NB, IN, MGF, VG), pp. 29–30.
SACSAC-2011-KimuraEFYN #detection #motivation #named #persuasion #smarttech #using
iDetective: a persuasive application to motivate healthier behavior using smart phone (HK, JE, YF, AY, TN), pp. 399–404.
SACSAC-2011-PorresR #interface #modelling #rest #uml #web #web service
Modeling behavioral RESTful web service interfaces in UML (IP, IR), pp. 1598–1605.
SACSAC-2011-SimoesO #game studies #learning #modelling
Leveraging the dynamics of learning by modeling and managing psychosocial relations and behavior by means of game theory and memetics (JCS, NO), pp. 1194–1201.
CASECASE-2011-FarautPN #equivalence #multi
Equivalence of behaviors between centralized and multi-model approaches (GF, LP, ÉN), pp. 32–38.
CASECASE-2011-Incerti
Dynamic behaviour of elastic cam devices driven by servomotors with PID velocity control (GI), pp. 268–273.
DACDAC-2011-BroedersL #modelling
Extracting behavior and dynamically generated hierarchy from SystemC models (HB, RvL), pp. 357–362.
DACDAC-2011-ChoiYLA #fault #performance
Matching cache access behavior and bit error pattern for high performance low Vcc L1 cache (YGC, SY, SL, JHA), pp. 978–983.
DACDAC-2011-KatzRZS #architecture #generative #learning #quality
Learning microarchitectural behaviors to improve stimuli generation quality (YK, MR, AZ, GS), pp. 848–853.
PDPPDP-2011-EschweilerBW #gpu #performance
Patterns of Inefficient Performance Behavior in GPU Applications (DE, DB, FW), pp. 262–266.
SOSPSOSP-2011-HarterDVAA #comprehension
A file is not a file: understanding the I/O behavior of Apple desktop applications (TH, CD, MV, ACAD, RHAD), pp. 71–83.
FASEFASE-2011-ErmelGLT #consistency #control flow #functional #modelling
Modeling with Plausibility Checking: Inspecting Favorable and Critical Signs for Consistency between Control Flow and Functional Behavior (CE, JG, LL, GT), pp. 156–170.
CADECADE-2011-FredriksonCJ #algorithm #analysis #approximate #complexity
Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms (MF, MC, SJ), pp. 252–267.
CAVCAV-2011-KleinN #automation #formal method #rest #verification
Formalization and Automated Verification of RESTful Behavior (UK, KSN), pp. 541–556.
CAVCAV-2011-RamanK #specification #using
Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP (VR, HKG), pp. 663–668.
TAPTAP-2011-BentakoukPZ #consistency #smt #testing #web #web service
Checking the Behavioral Conformance of Web Services with Symbolic Testing and an SMT Solver (LB, PP, FZ), pp. 33–50.
CBSECBSE-2010-LauNTR #composition #design pattern
(Behavioural) Design Patterns as Composition Operators (KKL, IN, CMT, TR), pp. 232–251.
TPDLECDL-2010-KernKS #motivation
Exploring the Influence of Tagging Motivation on Tagging Behavior (RK, CK, MS), pp. 461–465.
HTHT-2010-HuangW #parallel #web
Parallel browsing behavior on the web (JH, RWW), pp. 13–18.
JCDLJCDL-2010-LiuCLBGBZZ
Search behaviors in different task types (JL, MJC, CL, RB, JG, NJB, JZ, XZ), pp. 69–78.
JCDLJCDL-2010-MakriBC #what #why
This is what I’m doing and why: reflections on a think-aloud study of dl users’ information behaviour (SM, AB, ALC), pp. 349–352.
VLDBVLDB-2010-GlavicAMH #comprehension #named
TRAMP: Understanding the Behavior of Schema Mappings through Provenance (BG, GA, RJM, LMH), pp. 1314–1325.
VLDBVLDB-2010-WangSSWCDGW #pipes and filters #simulation
Behavioral Simulations in MapReduce (GW, MAVS, BS, XW, TC, AJD, JG, WMW), pp. 952–963.
VLDBVLDB-2010-YakoutEEOQ
Behavior Based Record Linkage (MY, AKE, HE, MO, AQ), pp. 439–448.
EDMEDM-2010-BousbiaLBR #learning #using #web
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments (NB, JML, AB, IR), pp. 279–280.
EDMEDM-2010-JeongBJH #analysis #effectiveness #learning #markov #modelling #using
Analysis of Productive Learning Behaviors in a Structured Inquiry Cycle Using Hidden Markov Models (HJ, GB, JJ, LH), pp. 81–90.
EDMEDM-2010-MaullSS #education #online
Online Curriculum Planning Behavior of Teachers (KEM, MGS, TS), pp. 121–130.
EDMEDM-2010-MaullSS10a #education #online
Observing Online Curriculum Planning Behavior of Teachers (KEM, MGS, TS), pp. 303–304.
EDMEDM-2010-PedroBMNG #detection #using
Using Text Replay Tagging to Produce Detectors of Systematic Experimentation Behavior Patterns (MSP, RSJdB, OM, AN, JDG), pp. 181–190.
EDMEDM-2010-ShanabrookCWA #identification #student #using
Identifying High-Level Student Behavior Using Sequence-based Motif Discovery (DHS, DGC, BPW, IA), pp. 191–200.
ITiCSEITiCSE-2010-Armstrong #social
Robotics and intelligent systems for social and behavioral science undergraduates (TA), pp. 194–198.
ITiCSEITiCSE-2010-HowardJN #design #learning #online #using
Reflecting on online learning designs using observed behavior (LH, JJ, CN), pp. 179–183.
CSMRCSMR-2010-CortellessaMP #maintenance #reliability #trade-off
Selecting Optimal Maintenance Plans Based on Cost/Reliability Tradeoffs for Software Subject to Structural and Behavioral Changes (VC, RM, PP), pp. 21–30.
CSMRCSMR-2010-LuciaDGR #design pattern #detection #model checking
Improving Behavioral Design Pattern Detection through Model Checking (ADL, VD, CG, MR), pp. 176–185.
SCAMSCAM-2010-KetterlinC #execution #memory management #source code
Recovering the Memory Behavior of Executable Programs (AK, PC), pp. 189–198.
WCREWCRE-2010-PerscheidSHGH #analysis #online #runtime
Immediacy through Interactivity: Online Analysis of Run-time Behavior (MP, BS, RH, FG, MH), pp. 77–86.
WCREWCRE-2010-WongASLM #detection #programming #reverse engineering #search-based #using
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
SEFMSEFM-2010-Lindsay #re-engineering
Behavior Trees: From Systems Engineering to Software Engineering (PAL), pp. 21–30.
SEFMSEFM-2010-LindsayWY #assessment #model checking #safety #using
Safety Assessment Using Behavior Trees and Model Checking (PAL, KW, NY), pp. 181–190.
SEFMSEFM-2010-Powell #analysis #modelling #scalability
Behavior Engineering — A Scalable Modeling and Analysis Method (DP), pp. 31–40.
SEFMSEFM-2010-WinterHC #requirements
Integrating Requirements: The Behavior Tree Philosophy (KW, IJH, RC), pp. 41–50.
AIIDEAIIDE-2010-HeckelY #coordination #multi #using
Multi-Agent Coordination Using Dynamic Behavior-Based Subsumption (FWPH, GMY).
AIIDEAIIDE-2010-OrkinSR #compilation #game studies
Behavior Compilation for AI in Games (JO, TS, DKR).
AIIDEAIIDE-2010-SharifiZS #game studies #learning #using
Learning Companion Behaviors Using Reinforcement Learning in Games (AS, RZ, DS).
AIIDEAIIDE-2010-Sunshine-HillB #generative
Perceptually Realistic Behavior through Alibi Generation (BSH, NIB).
AIIDEAIIDE-2010-YoungbloodHHC #agile #development #game studies #using
Rapid Development of Characters in FPS/3PS Games Using Visually-Specified Behavior-based Control (GMY, FWPH, DHH, AC).
CoGCIG-2010-AcamporaFL #fuzzy #process
Synthesizing bots emotional behaviors through fuzzy cognitive processes (GA, FF, VL), pp. 329–336.
CoGCIG-2010-JohanssonD #network
Introducing time in emotional behavior networks (AJ, PD), pp. 297–304.
CoGCIG-2010-MahlmannDTCY #predict
Predicting player behavior in Tomb Raider: Underworld (TM, AD, JT, AC, GNY), pp. 178–185.
CoGCIG-2010-MoraMGCAL #evolution
Evolving the cooperative behaviour in Unreal™ bots (AMM, MAM, JJMG, PAC, MGA, JLJL), pp. 241–248.
CoGCIG-2010-RawalRM #using
Constructing competitive and cooperative agent behavior using coevolution (AR, PR, RM), pp. 107–114.
CoGCIG-2010-ShimS
Behavioral profiles of character types in EverQuest II (KJS, JS), pp. 186–194.
FDGFDG-2010-Groenewegen #game studies
Improving crowd behaviour for games and virtual worlds (SG), pp. 256–258.
ICGTICGT-2010-HermannEOG #analysis #formal method #functional #graph grammar #model transformation
Formal Analysis of Functional Behaviour for Model Transformations Based on Triple Graph Grammars (FH, HE, FO, UG), pp. 155–170.
ICGTICGT-2010-Khomenko
A New Type of Behaviour-Preserving Transition Insertions in Unfolding Prefixes (VK), pp. 75–90.
CHICHI-2010-AulaKG #how #question
How does search behavior change as search becomes more difficult? (AA, RMK, ZG), pp. 35–44.
CHICHI-2010-DixonF #implementation #interface #named #reverse engineering #using
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure (MD, JF), pp. 1525–1534.
CHICHI-2010-JensenST #navigation
Studying driver attention and behaviour for three configurations of GPS navigation in real traffic driving (BSJ, MBS, NT), pp. 1271–1280.
CHICHI-2010-Kramer
An unobtrusive behavioral model of “gross national happiness” (ADIK), pp. 287–290.
CHICHI-2010-MorrisTP #network #overview #people #social #what #why
What do people ask their social networks, and why?: a survey study of status message q&a behavior (MRM, JT, KP), pp. 1739–1748.
CHICHI-2010-PancieraPET #analysis #lifecycle
Lurking? cyclopaths?: a quantitative lifecycle analysis of user behavior in a geowiki (KAP, RP, TE, LGT), pp. 1917–1926.
CHICHI-2010-SaerbeckSBJ #education #social
Expressive robots in education: varying the degree of social supportive behavior of a robotic tutor (MS, TS, CB, MDJ), pp. 1613–1622.
CHICHI-2010-StutzmanK #facebook #privacy
Friends only: examining a privacy-enhancing behavior in facebook (FS, JKD), pp. 1553–1562.
CHICHI-2010-TsujitaTS #communication #evaluation #named
InPhase: evaluation of a communication system focused on “happy coincidences” of daily behaviors (HT, KT, IS), pp. 2481–2490.
CHICHI-2010-Villamarin-SalomonB #using
Using reinforcement to strengthen users’ secure behaviors (RVS, JCB), pp. 363–372.
CAiSECAiSE-2010-SerralVP #adaptation #evolution #runtime
Supporting Runtime System Evolution to Adapt to User Behaviour (ES, PV, VP), pp. 378–392.
CAiSECAiSE-2010-WeidlichPDM #metric #process
Process Compliance Measurement Based on Behavioural Profiles (MW, AP, ND, JM), pp. 499–514.
CIKMCIKM-2010-BethardJ #learning #modelling
Who should I cite: learning literature search models from citation behavior (SB, DJ), pp. 609–618.
CIKMCIKM-2010-KotaN #network #social
Threshold behavior of incentives in social networks (NK, YN), pp. 1461–1464.
CIKMCIKM-2010-LimNJLL #detection #overview #rating #using
Detecting product review spammers using rating behaviors (EPL, VAN, NJ, BL, HWL), pp. 939–948.
CIKMCIKM-2010-MoonDJLZ #ranking
User behavior driven ranking without editorial judgments (TM, GD, SJ, CL, ZZ), pp. 1473–1476.
CIKMCIKM-2010-PuneraM #information management #modelling #web
The anatomy of a click: modeling user behavior on web information systems (KP, SM), pp. 989–998.
CIKMCIKM-2010-SushmitaJLV #interface
Factors affecting click-through behavior in aggregated search interfaces (SS, HJ, ML, RV), pp. 519–528.
CIKMCIKM-2010-YangGCTLZS #comprehension #network #social #twitter
Understanding retweeting behaviors in social networks (ZY, JG, KC, JT, JL, LZ, ZS), pp. 1633–1636.
ICPRICPR-2010-KosmopoulosVV #modelling #multi #robust
Robust Human Behavior Modeling from Multiple Cameras (DIK, AV, TAV), pp. 3575–3578.
ICPRICPR-2010-Serra-ToroMTHNC #monitoring #quality #video
Assessing Water Quality by Video Monitoring Fish Swimming Behavior (CST, RM, VJT, IMHM, MNR, PC), pp. 428–431.
ICPRICPR-2010-ZhuHYL #learning #metric #prototype #recognition #using
Prototype Learning Using Metric Learning Based Behavior Recognition (PZ, WH, CY, LL), pp. 2604–2607.
ICPRICPR-2010-ZwengK #image #multi #recognition #sequence #using
Unexpected Human Behavior Recognition in Image Sequences Using Multiple Features (AZ, MK), pp. 368–371.
KDDKDD-2010-CaoOYW #detection #sequence
Detecting abnormal coupled sequences and sequence changes in group-based manipulative trading behaviors (LC, YO, PSY, GW), pp. 85–94.
KDDKDD-2010-LiDHKN #mining
Mining periodic behaviors for moving objects (ZL, BD, JH, RK, PN), pp. 1099–1108.
KDIRKDIR-2010-Codina-FilbaN #analysis #internet #query #web
Collective Behaviour in Internet — Tendency Analysis of the Frequency of User Web Queries (JCF, DFN), pp. 168–175.
KDIRKDIR-2010-Onem #classification #detection #network
Unwanted Behaviour Detection and Classification in Network Traffic (IMÖ), pp. 122–128.
KMISKMIS-2010-AlonsoBL #incremental #modelling
Incremental user Modeling with Heterogeneous user Behaviors (RA, PB, HL), pp. 129–134.
KMISKMIS-2010-LiDFF #comprehension
Understanding Behavioral Intention of e-Learning System Re-use (YL, YD, ZF, WF), pp. 218–223.
SEKESEKE-2010-MoshirpourMF #detection #distributed #specification #using
Detecting Emergent Behavior in Distributed Systems Using Scenario-Based Specifications (MM, AM, BHF), pp. 349–354.
SIGIRSIGIR-2010-ClementsSVR #predict #using
Using flickr geotags to predict user travel behaviour (MC, PS, APdV, MJTR), pp. 851–852.
SIGIRSIGIR-2010-DupretP #precise
A user behavior model for average precision and its generalization to graded judgments (GD, BP), pp. 531–538.
SIGIRSIGIR-2010-LiuLGB #detection
Can search systems detect users’ task difficulty?: some behavioral signals (JL, CL, JG, NJB), pp. 845–846.
SIGIRSIGIR-2010-LiuWD #analysis #comprehension #web
Understanding web browsing behaviors through Weibull analysis of dwell time (CL, RWW, STD), pp. 379–386.
SIGIRSIGIR-2010-LiuYSCCL #learning #rank
Learning to rank audience for behavioral targeting (NL, JY, DS, DC, ZC, YL), pp. 719–720.
SIGIRSIGIR-2010-ZhongWWCZCW
Incorporating post-click behaviors into a click model (FZ, DW, GW, WC, YZ, ZC, HW), pp. 355–362.
ECMFAECMFA-2010-EllnerADJKP #modelling #named
eSPEM — A SPEM Extension for Enactable Behavior Modeling (RE, SAH, JD, MJ, DK, MP), pp. 116–131.
ECMFAECMFA-2010-SterrittCC #design pattern #precise #specification
Precise Specification of Design Pattern Structure and Behaviour (AS, SC, VC), pp. 277–292.
MODELSMoDELS-v1-2010-GoldsbyC #automation #modelling #uml
Automatically Discovering Properties That Specify the Latent Behavior of UML Models (HG, BHCC), pp. 316–330.
ECOOPECOOP-2010-HarelMW #coordination #java #programming
Programming Coordinated Behavior in Java (DH, AM, GW), pp. 250–274.
PLDIPLDI-2010-RichardsLBV #analysis #javascript #source code
An analysis of the dynamic behavior of JavaScript programs (GR, SL, BB, JV), pp. 1–12.
PPDPPPDP-2010-Barbanerad
Two notions of sub-behaviour for session-based client/server systems (FB, Ud), pp. 155–164.
QAPLQAPL-2010-Aldini #approximate #equivalence #probability #testing
Approximate Testing Equivalence Based on Time, Probability, and Observed Behavior (AA), pp. 1–15.
ASEASE-2010-Balint #automation #data type
Automatic inference of abstract type behavior (MB), pp. 499–504.
ASEASE-2010-GabrysiakGS #interactive #multi #process #requirements #validation
Deriving behavior of multi-user processes from interactive requirements validation (GG, HG, AS), pp. 355–356.
ASEASE-2010-IvanovOSV #analysis #embedded #modelling #set #tool support
REMES tool-chain: a set of integrated tools for behavioral modeling and analysis of embedded systems (DI, MO, CCS, AV), pp. 361–362.
ASEASE-2010-LiHG #ajax #detection #interactive #web
Detecting user-visible failures in AJAX web applications by analyzing users’ interaction behaviors (WL, MJH, CG), pp. 155–158.
FSEFSE-2010-DIppolitoBPU #modelling #synthesis
Synthesis of live behaviour models (ND, VAB, NP, SU), pp. 77–86.
FSEFSE-2010-JinOX #named #testing
BERT: a tool for behavioral regression testing (WJ, AO, TX), pp. 361–362.
FSEFSE-2010-Krka #approach #incremental #modelling #refinement #requirements #specification
From requirements to partial behavior models: an iterative approach to incremental specification refinement (IK), pp. 341–344.
FSEFSE-2010-Shokry #synthesis #towards #using
Towards behavior elaboration and synthesis using modes (HS), pp. 349–352.
ICSEICSE-2010-Caso #re-engineering #validation
Behavioural validation of software engineering artefacts (GdC), pp. 335–336.
ICSEICSE-2010-Caso10a #re-engineering #validation
Behavioural validation of software engineering artefacts (GdC), pp. 505–506.
ICSEICSE-2010-KrkaBPGM #execution #invariant #model inference #using
Using dynamic execution traces and program invariants to enhance behavioral model inference (IK, YB, DP, JG, NM), pp. 179–182.
ICSEICSE-2010-ReisnerSMFP #configuration management #evaluation #symbolic computation #using
Using symbolic evaluation to understand behavior in configurable software systems (ER, CS, KKM, JSF, AP), pp. 445–454.
ICSEICSE-2010-SteimannT #constraints #generative
From behaviour preservation to behaviour modification: constraint-based mutant generation (FS, AT), pp. 425–434.
SACSAC-2010-FotoohiG #approach #case study
A supervisory control approach for safe behavior of service robot case study: FRIEND (LF, AG), pp. 1305–1306.
SACSAC-2010-FurukawaOMI #predict #social
Prediction of social bookmarking based on a behavior transition model (TF, SO, YM, MI), pp. 1741–1747.
SACSAC-2010-MassinkHL #analysis #scalability
Scalable analysis of collective behaviour in smart service systems (MM, MDH, DL), pp. 1173–1180.
SLESLE-2010-BandenerSE #debugging #execution #specification #visual notation
Extending DMM Behavior Specifications for Visual Execution and Debugging (NB, CS, GE), pp. 357–376.
ASPLOSASPLOS-2010-Mesa-MartinezAR
Characterizing processor thermal behavior (FJMM, EKA, JR), pp. 193–204.
ASPLOSASPLOS-2010-Shen
Request behavior variations (KS), pp. 103–116.
CASECASE-2010-AhnM #analysis #clustering #modelling #tool support
Analysis of circular cluster tools: Transient behavior and semiconductor equipment models (YA, JRM), pp. 39–44.
CASECASE-2010-LeeFBSSFS #evaluation #framework #modelling
Product modeling framework and language for behavior evaluation (JHL, SJF, CB, HWS, RS, XF, RDS), pp. 136–143.
CGOCGO-2010-JiangZTMGSG #correlation #predict #statistics
Exploiting statistical correlations for proactive prediction of program behaviors (YJ, EZZ, KT, FM, MG, XS, YG), pp. 248–256.
CGOCGO-2010-StephensonRYH #statistics
Statistically regulating program behavior via mainstream computing (MS, RR, EY, EVH), pp. 238–247.
DACDAC-2010-KuoCTCL #approach
Behavior-level yield enhancement approach for large-scaled analog circuits (CCK, YLC, ICT, LYC, CNJL), pp. 903–908.
DATEDATE-2010-CongHJ #algorithm #pattern matching #pattern recognition #recognition #synthesis
A generalized control-flow-aware pattern recognition algorithm for behavioral synthesis (JC, HH, WJ), pp. 1255–1260.
DATEDATE-2010-CongLX #coordination #optimisation #synthesis
Coordinated resource optimization in behavioral synthesis (JC, BL, JX), pp. 1267–1272.
DATEDATE-2010-EguiaTSPT #design #manycore #modelling
General behavioral thermal modeling and characterization for multi-core microprocessor design (TJAE, SXDT, RS, EHP, MT), pp. 1136–1141.
DATEDATE-2010-HaoXRY #equivalence #optimisation #synthesis
Optimizing equivalence checking for behavioral synthesis (KH, FX, SR, JY), pp. 1500–1505.
DATEDATE-2010-YuZQB #design #power management
Behavioral level dual-vth design for reduced leakage power with thermal awareness (JY, QZ, GQ, JB), pp. 1261–1266.
FoSSaCSFoSSaCS-2010-AcciaiBZ #logic #on the #simulation
On the Relationship between Spatial Logics and Behavioral Simulations (LA, MB, GZ), pp. 146–160.
WRLAWRLA-2010-RiveraDV #domain-specific language #on the #realtime #semantics #visual notation
On the Behavioral Semantics of Real-Time Domain Specific Visual Languages (JER, FD, AV), pp. 174–190.
ICSTICST-2010-JinOX #automation #testing
Automated Behavioral Regression Testing (WJ, AO, TX), pp. 137–146.
ICTSSICTSS-2010-Heitmeyer #approach #modelling #testing
A Model-Based Approach to Testing Software for Critical Behavior and Properties (CLH), p. 15.
TAPTAP-2010-BueDKB #abstraction #using
Building a Test-Ready Abstraction of a Behavioral Model Using CLP (PCB, FD, ADK, FB), pp. 167–182.
CBSECBSE-2009-PochP #component #legacy #specification
Extracting Behavior Specification of Components in Legacy Applications (TP, FP), pp. 87–103.
QoSAQoSA-2009-ChanP #architecture #composition #predict #process
Compositional Prediction of Timed Behaviour for Process Control Architecture (KC, IP), pp. 86–100.
DocEngDocEng-2009-BattleB #concurrent #documentation #modelling #state machine
Modelling composite document behaviour with concurrent hierarchical state machines (SB, HB), pp. 25–28.
HTHT-2009-MeissDGRM #web #what
What’s in a session: tracking individual behavior on the web (MM, JD, BG, JJR, FM), pp. 173–182.
HTHT-2009-Santos-NetoCAIR #social
Individual and social behavior in tagging systems (ESN, DC, NA, AI, MR), pp. 183–192.
VLDBVLDB-2009-AliGRSTVWZKALRKSGBCGBLNWMSNG #online
Microsoft CEP Server and Online Behavioral Targeting (MHA, CG, BSR, BS, TT, TV, PW, PZ, AK, AA, ML, AR, RK, RS, TG, SB, BC, JG, SB, YL, VDN, XW, DM, IS, ON, SG), pp. 1558–1561.
ITiCSEITiCSE-2009-RodrigoBJADELPST #predict
Affective and behavioral predictors of novice programmer achievement (MMTR, RSB, MCJ, ACMA, TD, MBVEL, SALL, SAMSP, JOS, EST), pp. 156–160.
ITiCSEITiCSE-2009-WangHCT #collaboration #learning
The role of collective efficacy and collaborative learning behavior in learning computer science through CSCL (SLW, GHH, JCC, PST), p. 352.
ICPCICPC-J-2008-DaltonWDH09 #embedded #network #runtime #tool support #visualisation
Visualizing the runtime behavior of embedded network systems: A toolkit for TinyOS (ARD, SKW, SD, JOH), pp. 446–469.
CSMRCSMR-2009-LuciaDGR #identification #parsing #visual notation
Behavioral Pattern Identification through Visual Language Parsing and Code Instrumentation (ADL, VD, CG, MR), pp. 99–108.
CSMRCSMR-2009-MarwedeRHH #automation #correlation #distributed #scalability
Automatic Failure Diagnosis Support in Distributed Large-Scale Software Systems Based on Timing Behavior Anomaly Correlation (NM, MR, AvH, WH), pp. 47–58.
ICPCICPC-2009-MurphyVS #process #programming #using
Using activity traces to characterize programming behaviour beyond the lab (GCM, PV, DCS), pp. 90–94.
ICSMEICSM-2009-AmalfitanoFT #internet #modelling #reverse engineering
Experimenting a reverse engineering technique for modelling the behaviour of rich internet applications (DA, ARF, PT), pp. 571–574.
WCREWCRE-1999-AckermannLC99a #interactive
Recovering Views of Inter-System Interaction Behaviors (CA, ML, RC), pp. 53–61.
ICALPICALP-v2-2009-AcciaiB #infinity #safety #π-calculus
Deciding Safety Properties in Infinite-State π-Calculus via Behavioural Types (LA, MB), pp. 31–42.
SEFMSEFM-2009-HummelT #specification #using
Behavioral Specification of Reactive Systems Using Stream-Based I/O Tables (BH, JT), pp. 137–146.
CEFPCEFP-2009-CesariniT #design pattern #erlang #process #programming
Erlang Behaviours: Programming with Process Design Patterns (FC, SJT), pp. 19–41.
CEFPCEFP-2009-TothBHLTK #dependence #erlang #graph #impact analysis #source code #using
Impact Analysis of Erlang Programs Using Behaviour Dependency Graphs (MT, IB, ZH, LL, MT, TK), pp. 372–390.
AIIDEAIIDE-2009-CutumisuS #architecture #game studies #multi
An Architecture for Game Behavior AI: Behavior Multi-Queues (MC, DS).
AIIDEAIIDE-2009-HeckelYH #design #interactive #interface #named
BehaviorShop: An Intuitive Interface for Interactive Character Design (FWPH, GMY, DHH).
AIIDEAIIDE-2009-LiSCKSMAA #game studies #video
Constructing Game Agents from Video of Human Behavior (NL, DJS, GC, TK, DGS, MM, DWA, KA).
AIIDEAIIDE-2009-LlansoGG #component #self
Self-Validated Behaviour Trees through Reflective Components (DL, MAGM, PAGC).
AIIDEAIIDE-2009-ZhaoS #game studies #learning #modelling #using
Learning Character Behaviors Using Agent Modeling in Games (RZ, DS).
CoGCIG-2009-CowleyCBH #modelling #predict #using
Analyzing player behavior in Pacman using feature-driven decision theoretic predictive modeling (BC, DC, MMB, RJH), pp. 170–177.
CoGCIG-2009-MalikD #coordination #metaprogramming #multi #testing #using
Improving testing of multi-unit computer players for unwanted behavior using coordination macros (AM, JD), pp. 355–362.
CoGCIG-2009-MorenoLS #game studies #towards
Towards conscious-like behavior in computer game characters (RAM, AL, AS), pp. 217–224.
CoGCIG-2009-SchrumM #evolution #multi
Evolving multi-modal behavior in NPCs (JS, RM), pp. 325–332.
DiGRADiGRA-2009-HoogenIK #experience
Effects of Sensory Immersion on Behavioural Indicators of Player Experience: Movement Synchrony and Controller Pressure (WvdH, WAI, YAWdK).
FDGFDG-2009-Horswill #performance
Very fast action selection for parameterized behaviors (IH), pp. 91–98.
CHICHI-2009-ConsolvoML #design
Theory-driven design strategies for technologies that support behavior change in everyday life (SC, DWM, JAL), pp. 405–414.
CHICHI-2009-LeshedPHCBLMG #feedback #realtime #visualisation
Visualizing real-time language-based feedback on teamwork behavior in computer-mediated groups (GL, DP, JTH, DC, JPB, SL, PLM, GG), pp. 537–546.
CHICHI-2009-MankowskiBSS #canonical #protocol
Finding canonical behaviors in user protocols (WCM, PB, AS, DDS), pp. 1323–1326.
HCIDHM-2009-AmantiniC #fault #predict #simulation
A Simple Simulation Predicting Driver Behavior, Attitudes and Errors (AA, PCC), pp. 345–354.
HCIDHM-2009-BurghardtK #approach #modelling #probability #smarttech
A Probabilistic Approach for Modeling Human Behavior in Smart Environments (CB, TK), pp. 202–210.
HCIDHM-2009-LudtkeWOW #fault #modelling #simulation
Modeling Pilot and Driver Behavior for Human Error Simulation (AL, LW, JPO, BW), pp. 403–412.
HCIDHM-2009-PanCL #adaptation #mining #online #user interface
User Behavior Mining for On-Line GUI Adaptation (WP, YC, JL), pp. 275–284.
HCIDHM-2009-SchwartzeFA #smarttech #user interface
Behavior-Sensitive User Interfaces for Smart Environments (VS, SF, SA), pp. 305–314.
HCIHCD-2009-KurosuH #analysis #communication #development #research
Culture and Communication Behavior: A Research Based on the Artifact Development Analysis (MK, AH), pp. 468–475.
HCIHCD-2009-MahouiJZA #design #interface #personalisation #web
Leveraging User Search Behavior to Design Personalized Browsing Interfaces for Healthcare Web Sites (MM, JFJ, DZ, KA), pp. 511–520.
HCIHCD-2009-ProppF #testing #usability
Defining Expected Behavior for Usability Testing (SP, PF), pp. 110–119.
HCIHCD-2009-Stephane #analysis #predict #simulation
User Behavior Patterns: Gathering, Analysis, Simulation and Prediction (LS), pp. 322–331.
HCIHCI-AUII-2009-IizukaAM #using
The Anticipation of Human Behavior Using “Parasitic Humanoid” (HI, HA, TM), pp. 284–293.
HCIHCI-AUII-2009-ImamuraOK #analysis #modelling #ubiquitous
Modeling Personal Preferences on Commodities by Behavior Log Analysis with Ubiquitous Sensing (NI, AO, TK), pp. 294–303.
HCIHCI-AUII-2009-YuasaTM
Autonomous Turn-Taking Agent System Based on Behavior Model (MY, HT, NM), pp. 368–373.
HCIHCI-NIMT-2009-KimKYK #design #interactive
Designing Emotional and Interactive Behaviors for an Entertainment Robot (YCK, HTK, WCY, JCK), pp. 321–330.
HCIHCI-NIMT-2009-LevendovszkyM #domain-specific language #modelling #visual notation
Tooling the Dynamic Behavior Models of Graphical DSLs (TL, TM), pp. 830–839.
HCIHCI-NT-2009-HuangLH #interactive
E-Shopping Behavior and User-Web Interaction for Developing a Useful Green Website (FHH, YLL, SLH), pp. 446–454.
HCIHCI-NT-2009-MiyazakiSY #distributed #java #runtime #using #virtual machine
Investigating the Run Time Behavior of Distributed Applications by Using Tiny Java Virtual Machines with Wireless Communications (TM, TS, FY), pp. 882–889.
HCIHCI-VAD-2009-KharraziFD #design #game studies #modelling
Healthcare Game Design: Behavioral Modeling of Serious Gaming Design for Children with Chronic Diseases (HK, AF, JD), pp. 335–344.
HCIHCI-VAD-2009-KiriyamaS #interactive
Analyzing Human Behaviors in an Interactive Art Installation (TK, MS), pp. 345–352.
HCIHIMI-DIE-2009-KawataO #information retrieval #named
InfoScape: A Browser for User Behavior-Based Information Retrieval System (MK, KO), pp. 419–428.
HCIHIMI-II-2009-KushiroKNI #health #monitoring
Non-intrusive Human Behavior Monitoring Sensor for Health Care System (NK, MK, MN, YI), pp. 549–558.
HCIIDGD-2009-EuneL #difference #mobile
Cultural Dimensions in User Preferences and Behaviors of Mobile Phones and Interpretation of National Cultural Differences (JE, KPL), pp. 29–38.
HCIOCSC-2009-BreitfussPI #automation #generative #multimodal
Automatic Generation of Non-verbal Behavior for Agents in Virtual Worlds: A System for Supporting Multimodal Conversations of Bots and Avatars (WB, HP, MI), pp. 153–161.
HCIOCSC-2009-DuhC #game studies #online
Cheating Behaviors in Online Gaming (HBLD, VHhC), pp. 567–573.
HCIOCSC-2009-HaefligerRJK #community #rating
Modding as Rating Behavior in Virtual Communities: The Case of Rooster Teeth Productions (SH, PR, PMJ, GvK), pp. 197–206.
HCIOCSC-2009-PhillipsGS #approach #visualisation
A Visualization Approach for Group Behaviors, Beliefs and Intentions to Support Critical Decisions (CLP, NDG, JTS), pp. 91–100.
VISSOFTVISSOFT-2009-OliveiraPHC #domain-specific language #source code #visualisation
Visualization of domain-specific programs’ behavior (NO, MJVP, PRH, DCdC), pp. 37–40.
CAiSECAiSE-2009-PlanasCG #action semantics #modelling #semantics #specification #uml #verification
Verifying Action Semantics Specifications in UML Behavioral Models (EP, JC, CG), pp. 125–140.
ICEISICEIS-DISI-2009-Geczy #interactive #web
Human Behavior and Interactions in Web Environments (PG), pp. 5–6.
CIKMCIKM-2009-TangL #learning #scalability #social
Scalable learning of collective behavior based on sparse social dimensions (LT, HL), pp. 1107–1116.
CIKMCIKM-2009-WhiteD #predict
Characterizing and predicting search engine switching behavior (RWW, STD), pp. 87–96.
KDDKDD-2009-AttenbergPS #modelling #predict
Modeling and predicting user behavior in sponsored search (JA, SP, TS), pp. 1067–1076.
KDDKDD-2009-ChenPC #scalability
Large-scale behavioral targeting (YC, DP, JFC), pp. 209–218.
KDDKDD-2009-ChuPBMPCZ #analysis #case study #exclamation
A case study of behavior-driven conjoint analysis on Yahoo!: front page today module (WC, STP, TB, NM, AP, SC, JZ), pp. 1097–1104.
KDDKDD-2009-LoCHKS #approach #classification #detection #mining
Classification of software behaviors for failure detection: a discriminative pattern mining approach (DL, HC, JH, SCK, CS), pp. 557–566.
KDDKDD-2009-ShiZCZ #online
User grouping behavior in online forums (XS, JZ, RC, LZ), pp. 777–786.
KDIRKDIR-2009-ClementeDCR #classification #image
Behavior of Different Image Classifiers within a Broad Domain (BC, MLD, AC, PGR), pp. 278–283.
SEKESEKE-2009-LiYJQG #consistency #named #testing #web #web service
WSTester: Testing Web Service for Behavior Conformance (BL, LY, SJ, DQ, XG), pp. 456–459.
SIGIRSIGIR-2009-Barabasi #network
From networks to human behavior (ALB), p. 435.
SIGIRSIGIR-2009-DostertK
Users’ stopping behaviors and estimates of recall (MD, DK), pp. 820–821.
SIGIRSIGIR-2009-TomsF #analysis #predict
Predicting stopping behaviour: a preliminary analysis (EGT, LF), pp. 750–751.
ECMFAECMDA-FA-2009-DanielePS #approach #mobile #modelling
An MDA-Based Approach for Behaviour Modelling of Context-Aware Mobile Applications (LD, LFP, MvS), pp. 206–220.
ASEASE-2009-DallmeierZM #generative
Generating Fixes from Object Behavior Anomalies (VD, AZ, BM), pp. 550–554.
ESEC-FSEESEC-FSE-2009-BertolinoIPT #automation #composition #protocol #synthesis
Automatic synthesis of behavior protocols for composable web-services (AB, PI, PP, MT), pp. 141–150.
ESEC-FSEESEC-FSE-2009-HannaBR #automation #automaton #composition #independence #verification
Behavioral automata composition for automatic topology independent verification of parameterized systems (YH, SB, HR), pp. 325–334.
ESEC-FSEESEC-FSE-2009-KrkaBEM #component #modelling #specification
Synthesizing partial component-level behavior models from system specifications (IK, YB, GE, NM), pp. 305–314.
ESEC-FSEESEC-FSE-2009-LoMP #automation #model inference
Automatic steering of behavioral model inference (DL, LM, MP), pp. 345–354.
ESEC-FSEESEC-FSE-2009-PaveseBU #analysis #modelling #probability
Probabilistic environments in the quantitative analysis of (non-probabilistic) behaviour models (EP, VAB, SU), pp. 335–344.
ICSEICSE-2009-DamasLRL #modelling #process #synthesis
Analyzing critical process models through behavior model synthesis (CD, BL, FR, AvL), pp. 441–451.
ICSEICSE-2009-GhezziMM #graph transformation #modelling
Synthesizing intensional behavior models by graph transformation (CG, AM, MM), pp. 430–440.
ICSEICSE-2009-HenklerGHSAEHLSG #realtime #synthesis
Synthesis of timed behavior from scenarios in the Fujaba Real-Time Tool Suite (SH, JG, MH, WS, KA, TE, CH, RL, AS, HG), pp. 615–618.
SACSAC-2009-BroyLSSW #adaptation #formal method
Formalizing the notion of adaptive system behavior (MB, CL, WS, BS, SW), pp. 1029–1033.
SACSAC-2009-OrdinezDSO #resource management #scheduling
Resource sharing in behavioral based scheduling (LO, DD, RMS, JO), pp. 1972–1978.
CASECASE-2009-SinghR #problem
The Potluck Problem with consumers’ choice behavior (NS, SR), pp. 328–333.
DACDAC-2009-MarcilioSAR #novel #verification
A novel verification technique to uncover out-of-order DUV behaviors (GM, LCVdS, BA, SR), pp. 448–453.
DATEDATE-2009-KonigBSMNW #embedded #evaluation #performance #realtime
Application specific performance indicators for quantitative evaluation of the timing behavior for embedded real-time systems (FK, DB, FS, UM, MN, GW), pp. 519–523.
DATEDATE-2009-MukherjeeAPMD #approach #formal method #generative
A formal approach for specification-driven AMS behavioral model generation (SM, AA, SKP, RM, PD), pp. 1512–1517.
DATEDATE-2009-YangHMP #semantics #towards
Towards a formal semantics for the AADL behavior annex (ZY, KH, DM, LP), pp. 1166–1171.
DATEDATE-2009-YeoK #manycore
Temperature-aware scheduler based on thermal behavior grouping in multicore systems (IY, EJK), pp. 946–951.
LCTESLCTES-2009-HinesPGWT #lookahead
Guaranteeing instruction fetch behavior with a lookahead instruction fetch engine (LIFE) (SRH, YP, PG, DBW, GST), pp. 119–128.
FASEFASE-2009-AguirreFMMW #alloy #specification #using
Describing and Analyzing Behaviours over Tabular Specifications Using (Dyn)Alloy (NA, MFF, MMM, TSEM, AW), pp. 155–170.
ICLPICLP-2009-Simari #modelling #probability #reasoning
Stochastic Reasoning with Models of Agent Behavior (GIS), pp. 538–539.
VMCAIVMCAI-2009-BentonF #java #source code
Mostly-Functional Behavior in Java Programs (WCB, CNF), pp. 29–43.
VMCAIVMCAI-2009-GurovH #source code
Reducing Behavioural to Structural Properties of Programs with Procedures (DG, MH), pp. 136–150.
CBSECBSE-2008-KuperbergKR #black box #component #modelling #parametricity #performance #predict #using
Performance Prediction for Black-Box Components Using Reengineered Parametric Behaviour Models (MK, KK, RHR), pp. 48–63.
ECSAECSA-2008-KamalA #design pattern #modelling #using
Modeling Architectural Patterns’ Behavior Using Architectural Primitives (AWK, PA), pp. 164–179.
ECSAECSA-2008-MosserBR #evolution #process #web #web service
Web Services Orchestrations Evolution: A Merge Process for Behavioral Evolution (SM, MBF, MR), pp. 35–49.
TPDLECDL-2008-MastoraMK #case study #query
Exploring Query Formulation and Reformulation: A Preliminary Study to Map Users’ Search Behaviour (AM, MM, SK), pp. 427–430.
JCDLJCDL-2008-LoizidesB #towards
The myth of find: user behaviour and attitudes towards the basic search feature (FL, GB), pp. 48–51.
EDMEDM-2008-BakerC #performance #student
Labeling Student Behavior Faster and More Precisely with Text Replays (RSJdB, AMJBdC), pp. 38–47.
EDMEDM-2008-JeongB #mining #modelling #student
Mining Student Behavior Models in Learning-by-Teaching Environments (HJ, GB), pp. 127–136.
EDMEDM-2008-MostowZ #comparison #tutorial
Analytic Comparison of Three Methods to Evaluate Tutorial Behaviors (JM, XZ), pp. 28–37.
ITiCSEITiCSE-2008-LevyB #tool support
Perceived behavior control and its influence on the adoption of software tools (RBBL, MBA), pp. 169–173.
ICPCICPC-2008-DaltonH #runtime #tool support #visualisation
A Toolkit for Visualizing the Runtime Behavior of TinyOS Applications (ARD, JOH), pp. 43–52.
ICPCICPC-2008-FonsecaCHP #how #web
How to Interconnect Operational and Behavioral Views of Web Applications (RFCdF, DCdC, PRH, MJVP), pp. 263–267.
SCAMSCAM-2008-GondowKI #analysis #approach #automation #c #named #preprocessor
TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor’s Behaviors (KG, HK, TI), pp. 35–44.
FMFM-2008-DovlandJOS #lazy evaluation #type system
Lazy Behavioral Subtyping (JD, EBJ, OO, MS), pp. 52–67.
SEFMSEFM-2008-Hammal #component
Behavioral Compatibility of Active Components (YH), pp. 372–376.
SEFMSEFM-2008-RuksenasCB #game studies #modelling
Modelling Rational User Behaviour as Games between an Angel and a Demon (RR, PC, AB), pp. 355–364.
SEFMSEFM-2008-SampathRRS #code generation #testing
Behaviour Directed Testing of Auto-code Generators (PS, ACR, SR, KCS), pp. 191–200.
AIIDEAIIDE-2008-BulitkoSGL #modelling
Modeling Culturally and Emotionally Affected Behavior (VB, SS, JG, MvL).
AIIDEAIIDE-2008-DohertyO #communication #evolution
Effects of Communication on the Evolution of Squad Behaviours (DD, CO).
AIIDEAIIDE-2008-PugaGDG
Dynamic Expansion of Behaviour Trees (GFP, MAGM, BDA, PAGC).
AIIDEAIIDE-2008-SchrumM #multi
Constructing Complex NPC Behavior via Multi-Objective Neuroevolution (JS, RM).
AIIDEAIIDE-2008-VirmaniKMOR #authoring #game studies #ide #realtime
An Intelligent IDE for Behavior Authoring in Real-Time Strategy Games (SV, YK, MM0, SO, AR).
CoGCIG-2008-ThompsonL #network
Scaling-up behaviours in EvoTanks: Applying subsumption principles to artificial neural networks (TT, JL), pp. 159–166.
GT-VCGT-VC-2007-ErmelE08 #animation
Behavior-Preserving Simulation-to-Animation Model and Rule Transformations (CE, HE), pp. 55–74.
ICGTICGT-2008-Dang #graph grammar #ocl #validation
Triple Graph Grammars and OCL for Validating System Behavior (DHD), pp. 481–483.
ICGTICGT-2008-RangelLKEB #refactoring #using
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts (GR, LL, BK, HE, PB), pp. 242–256.
CHICHI-2008-HayesGAT #named
CareLog: a selective archiving tool for behavior management in schools (GRH, LMG, GDA, KNT), pp. 685–694.
CHICHI-2008-KramerR #modelling #word
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods (ADIK, KR), pp. 1125–1128.
CHICHI-2008-LawranceBBR #maintenance #using
Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks (JL, RKEB, MMB, KR), pp. 1323–1332.
CHICHI-2008-LindleyCB #experience #game studies #social
Stirring up experience through movement in game play: effects on engagement and social behaviour (SEL, JLC, NB), pp. 511–514.
CHICHI-2008-SalminenSLRSRRE
Emotional and behavioral responses to haptic stimulation (KS, VS, JL, JR, RS, RR, JR, GEE), pp. 1555–1562.
ICEISICEIS-HCI-2008-GeczyIAH #enterprise #information management #network
Complex User Behavioral Networks at Enterprise Information Systems (PG, NI, SA, KH), pp. 233–239.
ICEISICEIS-ISAS1-2008-LanoC #refinement #semantics #state machine
Semantics and Refinement of Behavior State Machines (KL, DC), pp. 42–49.
CIKMCIKM-2008-LoekitoB #mining
Mining influential attributes that capture class and group contrast behaviour (EL, JB), pp. 971–980.
CIKMCIKM-2008-ParikhS #query #semantics
Inferring semantic query relations from collective user behavior (NP, NS), pp. 349–358.
ICPRICPR-2008-AzoughDMH #modelling #monitoring #personalisation
Intuitive event modeling for personalized behavior monitoring (AA, AD, FDM, MSH), pp. 1–4.
ICPRICPR-2008-DarbyLC
Behaviour based particle filtering for human articulated motion tracking (JD, BL, NPC), pp. 1–4.
ICPRICPR-2008-LablackD #analysis
Analysis of human behaviour in front of a target scene (AL, CD), pp. 1–4.
KDDKDD-2008-MeloAL #metric #network #predict #question
Can complex network metrics predict the behavior of NBA teams? (POSVdM, VAFA, AAFL), pp. 695–703.
KRKR-2008-SardinaPG #composition
Behavior Composition in the Presence of Failure (SS, FP, GDG), pp. 640–650.
SEKESEKE-2008-KimBBSA #named #using #visualisation
VisRFID: Visualizing Customer Behavior in Geotemporal Space Using RFID Technology (BK, KB, MB, RS, BA), pp. 422–427.
SEKESEKE-2008-PengDZ #correctness #design pattern #implementation #verification
Verifying Behavioral Correctness of Design Pattern Implementation (TP, JD, YZ), pp. 454–459.
SIGIRSIGIR-2008-Shah #collaboration #comprehension #implementation
Understanding system implementation and user behavior in a collaborative information seeking environment (CS), p. 896.
ECMFAECMDA-FA-2008-EngelsKRSSW #model transformation #process #towards #uml
From UML Activities to TAAL — Towards Behaviour-Preserving Model Transformations (GE, AK, AR, MS, CS, HW), pp. 94–109.
MODELSMoDELS-2008-GoldsbyC #adaptation #automation #generative #modelling #nondeterminism
Automatically Generating Behavioral Models of Adaptive Systems to Address Uncertainty (HG, BHCC), pp. 568–583.
MODELSMoDELS-2008-JurackLMT #consistency #diagrams #modelling #process
Sufficient Criteria for Consistent Behavior Modeling with Refined Activity Diagrams (SJ, LL, KM, GT), pp. 341–355.
MODELSMoDELS-2008-LuongLC #consistency #development #implementation #incremental #modelling
Implementation of the Conformance Relation for Incremental Development of Behavioural Models (HVL, TL, ALC), pp. 356–370.
MODELSMoDELS-2008-OberCL #composition #modelling #slicing #using
Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
MODELSMoDELS-2008-GoldsbyC #adaptation #automation #generative #modelling #nondeterminism
Automatically Generating Behavioral Models of Adaptive Systems to Address Uncertainty (HG, BHCC), pp. 568–583.
MODELSMoDELS-2008-JurackLMT #consistency #diagrams #modelling #process
Sufficient Criteria for Consistent Behavior Modeling with Refined Activity Diagrams (SJ, LL, KM, GT), pp. 341–355.
MODELSMoDELS-2008-LuongLC #consistency #development #implementation #incremental #modelling
Implementation of the Conformance Relation for Incremental Development of Behavioural Models (HVL, TL, ALC), pp. 356–370.
MODELSMoDELS-2008-OberCL #composition #modelling #slicing #using
Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
QAPLQAPL-2008-ZhangZ #pseudo
A Behavioural Pseudometric based on λ-Bisimilarity (JZ, ZZ), pp. 115–127.
SASSAS-2008-NanzNN #abstraction #concurrent
Modal Abstractions of Concurrent Behaviour (SN, FN, HRN), pp. 159–173.
FSEFSE-2008-FischbeinU #modelling #on the
On correct and complete strong merging of partial behaviour models (DF, SU), pp. 297–307.
ICSEICSE-2008-KoM #debugging #why
Debugging reinvented: asking and answering why and why not questions about program behavior (AJK, BAM), pp. 301–310.
ICSEICSE-2008-LorenzoliMP #automation #generative #modelling
Automatic generation of software behavioral models (DL, LM, MP), pp. 501–510.
SACSAC-2008-AdnaneSBM #detection #reasoning #trust
Autonomic trust reasoning enables misbehavior detection in OLSR (AA, RTdSJ, CB, LM), pp. 2006–2013.
SACSAC-2008-AtallaMAGA #peer-to-peer #quality #web
Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search (FA, DM, JMA, MAG, VA), pp. 1137–1144.
SACSAC-2008-AtoofianB #embedded #latency #memory management
Exploiting program cyclic behavior to reduce memory latency in embedded processors (EA, AB), pp. 1482–1486.
SACSAC-2008-DirgahayuQS #design #enterprise #integration #interactive
Designing interaction behaviour in service-oriented enterprise application integration (TD, DACQ, MvS), pp. 1048–1054.
SACSAC-2008-OrdinezDS #approach #scheduling
A behavior priority driven approach for resource reservation scheduling (LO, DD, RMS), pp. 315–319.
SLESLE-2008-RiveraGLV #maude #modelling #rule-based #semantics #visual notation
Analyzing Rule-Based Behavioral Semantics of Visual Modeling Languages with Maude (JER, EG, JdL, AV), pp. 54–73.
ASPLOSASPLOS-2008-BallapuramSL #multi #semantics
Exploiting access semantics and program behavior to reduce snoop power in chip multiprocessors (CSB, AS, HHSL), pp. 60–69.
CASECASE-2008-HeribanTGF
Improving rotation behaviour of robotic structures for micro-assembly (DH, AT, MG, GF), pp. 983–988.
CASECASE-2008-NieIYTOM #analysis #performance #video
High-speed video analysis of laboratory rats behaviors in forced swim test (YN, II, KY, TT, KO, HM), pp. 206–211.
DACDAC-2008-HaubeltSKM #agile #automation #design #modelling #named #prototype
SystemCoDesigner: automatic design space exploration and rapid prototyping from behavioral models (CH, TS, JK, MM), pp. 580–585.
DACDAC-2008-PotkonjakK
(Bio)-behavioral CAD (MP, FK), pp. 351–352.
DATEDATE-2008-AliWWB #approach #modelling #performance
A New Approach for Combining Yield and Performance in Behavioural Models for Analogue Integrated Circuits (SA, RW, PRW, ADB), pp. 152–157.
PDPPDP-2008-AggarwalAFTM #modelling #simulation
Reflecting P2P User Behaviour Models in a Simulation Environment (VA, OA, AF, RT, SM), pp. 516–523.
PDPPDP-2008-AldinucciCDVKDLT #component #grid
Behavioural Skeletons in GCM: Autonomic Management of Grid Components (MA, SC, MD, MV, PK, PD, DL, NT), pp. 54–63.
FASEFASE-2008-AlrajehRU #modelling #using
Deriving Non-zeno Behavior Models from Goal Models Using ILP (DA, AR, SU), pp. 1–15.
FASEFASE-2008-MellitiPM #adaptation #automation #composition #distributed #semantics
Distributed Behavioural Adaptation for the Automatic Composition of Semantic Services (TM, PP, SBM), pp. 146–162.
ICLPICLP-2008-ArandaPRV #concurrent #constraints #probability #programming
Stochastic Behavior and Explicit Discrete Time in Concurrent Constraint Programming (JA, JAP, CR, FDV), pp. 682–686.
CBSECBSE-2007-SeryP #component #composition #slicing #specification
Slicing of Component Behavior Specification with Respect to Their Composition (OS, FP), pp. 189–202.
HTHT-2007-BrownBFE
Revealing the hidden rationality of user browsing behaviour (EJB, TJB, TF, CvdE), pp. 85–94.
HTHT-2007-DoerrDD #traversal #web
Simplifying web traversals by recognizing behavior patterns (CD, DvD, AD), pp. 105–114.
JCDLJCDL-2007-ZhouS #design #library
Information behavior of small groups: implications for design of digital libraries (NZ, GS), pp. 183–184.
VLDBVLDB-2007-RomanK #concurrent #logic #reasoning #semantics #transaction #web #web service
Reasoning about the Behavior of Semantic Web Services with Concurrent Transaction Logic (DR, MK), pp. 627–638.
CSEETCSEET-2007-FrezzaT #developer #testing
Testing as a Mental Discipline: Practical Methods for Affecting Developer Behavior (STF, MHT), pp. 355–356.
ICALPICALP-2007-KobayashiS #calculus #type system
Undecidability of 2-Label BPP Equivalences and Behavioral Type Systems for the π -Calculus (NK, TS), pp. 740–751.
IFMIFM-2007-CavarraW #modelling #specification
Behavioural Specifications from Class Models (AC, JW), pp. 118–137.
IFMIFM-2007-ColvinGW #probability
Probabilistic Timed Behavior Trees (RC, LG, KW), pp. 156–175.
SEFMSEFM-2007-CamaraSC #adaptation #composition #runtime #transaction
Run-time Composition and Adaptation of Mismatching Behavioural Transactions (JC, GS, CC), pp. 381–390.
SEFMSEFM-2007-Hameurlain #component #flexibility #protocol #specification
Flexible Behavioural Compatibility and Substitutability for Component Protocols: A Formal Specification (NH), pp. 391–400.
SFMSFM-2007-Bernardo #markov #overview
A Survey of Markovian Behavioral Equivalences (MB), pp. 180–219.
AIIDEAIIDE-2007-CutumisuSSW
Motivational Ambient and Latent Behaviors in Computer RPGs (MC, DS, JS, KW), pp. 74–76.
AIIDEAIIDE-2007-CutumisuSSWOSS
A Demonstration of ScriptEase Motivational Ambient and Latent Behaviors for Computer RPGs (MC, DS, JS, KW, CO, JS, AS), pp. 106–107.
CoGCIG-2007-FinkDA #game studies #machine learning #using
Extracting NPC behavior from computer games using computer vision and machine learning techniques (AF, JD, JA), pp. 24–31.
CoGCIG-2007-SeredynskiBK #ad hoc #evolution #game studies #modelling #network #using
Modelling the Evolution of Cooperative Behavior in Ad Hoc Networks using a Game Based Model (MS, PB, MAK), pp. 96–103.
DiGRADiGRA-2007-DrennanKRD #design #game studies
Designing a Game to Model Consumer Misbehavior (PD, DAK, RRB, JD).
DiGRADiGRA-2007-IhoriSSY #game studies #student #video
Effect of Video Games on Children's Aggressive Behavior and Pro-social Behavior: A Panel Study with Elementary School Students (NI, AS, AS, SY).
DiGRADiGRA-2007-Schultheiss #experience #game studies
Long-term motivations to play MMOGs: A longitudinal study on motivations, experience and behavior (DS).
CHICHI-2007-Baker #comprehension #modelling #student
Modeling and understanding students’ off-task behavior in intelligent tutoring systems (RSJdB), pp. 1059–1068.
HCIDHM-2007-OhS #comprehension #nondeterminism
Understanding RUTH: Creating Believable Behaviors for a Virtual Human Under Uncertainty (IO, MS), pp. 443–452.
HCIHCI-AS-2007-KoJK #comprehension #internet #mobile
Understanding Influence of Mobile Internet Services on Life Behavior of Mobile Users (SMK, YGJ, DK), pp. 944–953.
HCIHCI-AS-2007-LiuLS #comprehension #design #game studies #online #what
What Makes Game Players Want to Play More? A Mathematical and Behavioral Understanding of Online Game Design (DL, XL, RS), pp. 284–293.
HCIHCI-AS-2007-MorDML #approach
A Three-Level Approach for Analyzing User Behavior in Ongoing Relationships (EM, MGD, JM, SL), pp. 971–980.
HCIHCI-AS-2007-TanGT #online
An Investigation of Online Group-Buying Institution and Buyer Behavior (CHT, KYG, HHT), pp. 124–131.
HCIHCI-IDU-2007-GiersichFFKRS #approach #modelling #recognition #towards
Towards an Integrated Approach for Task Modeling and Human Behavior Recognition (MG, PF, GF, TK, DR, HS), pp. 1109–1118.
HCIHCI-IPT-2007-KimC #comprehension
Understanding Camera Phone Imaging: Motivations, Behaviors and Meanings (GK, WC), pp. 374–383.
HCIHCI-IPT-2007-ZaharakisK #interactive #social #ubiquitous
Social Intelligence as the Means for Achieving Emergent Interactive Behaviour in Ubiquitous Computing Environments (IDZ, ADK), pp. 1018–1029.
HCIHCI-MIE-2007-LeeP07a #generative #speech #synthesis
Customized Message Generation and Speech Synthesis in Response to Characteristic Behavioral Patterns of Children (HJL, JCP), pp. 114–123.
HCIHCI-MIE-2007-SerbanTM #interface #learning #predict
A Learning Interface Agent for User Behavior Prediction (GS, AT, GSM), pp. 508–517.
HCIHCI-MIE-2007-TakashimaT #low level #video
Sharing Video Browsing Style by Associating Browsing Behavior with Low-Level Features of Videos (AT, YT), pp. 518–526.
HCIHCI-MIE-2007-YecanSBC #multimodal
Tracing Users’ Behaviors in a Multimodal Instructional Material: An Eye-Tracking Study (EY, ES, BB, ), pp. 755–762.
HCIHIMI-IIE-2007-Liu07a #assessment #industrial
Economic Assessment of Industrial Accidents Caused by Abnormal Behaviors (HL), pp. 1067–1071.
HCIHIMI-IIE-2007-SatoA #analysis
Analysis of Naturalistic Driving Behavior While Approaching an Intersection and Implications for Route Guidance Presentation (TS, MA), pp. 618–627.
HCIHIMI-IIE-2007-ZhangC #analysis #collaboration
A Communicative Behaviour Analysis of Art-Technology Collaboration (YZ, LC), pp. 212–221.
HCIHIMI-MTT-2007-YooYL #design #human-computer
Information Behaviors of HCI Professionals: Design of Intuitive Reference System for Technologies (EY, MY, YL), pp. 237–246.
HCIOCSC-2007-YehWH #case study #online
A Study of Emotional and Rational Purchasing Behavior for Online Shopping (LY, EMYW, SLH), pp. 222–227.
HCIOCSC-2007-ZhouS #collaboration #community #towards
Towards Building a Math Discourse Community: Investigating Collaborative Information Behavior (NZ, GS), pp. 509–518.
CAiSECAiSE-2007-DeckerW #consistency #integration #process
Behavioral Consistency for B2B Process Integration (GD, MW), pp. 81–95.
CAiSECAiSE-2007-LiuBW #modelling #using
Modeling Business Contexture and Behavior Using Business Artifacts (RL, KB, FYW), pp. 324–339.
EDOCEDOC-2007-LiningtonL #approach #modelling #security #using
Incorporating Security Behaviour into Business Models Using a Model Driven Approach (PFL, PL), pp. 405–413.
EDOCEDOC-2007-RiveraV #modelling
Adding Behavior to Models (JER, AV), pp. 169–180.
ICEISICEIS-EIS-2007-MoralesTA #consistency #modelling #semantics #uml
Checking Behavioural Consistency of UML-RT Models through Trace-Based Semantics (LEMM, MICT, KBA), pp. 205–211.
ICEISICEIS-SAIC-2007-BelbezeS #web #web service
Which Contribution of the Web Services in the Improvement of Web Searching? A Behavioural Study of the Net Surfers (CB, CSD), pp. 129–137.
ECIRECIR-2007-SandersonD
Examining Repetition in User Search Behavior (MS, STD), pp. 597–604.
KDDKDD-2007-AsurPU #framework #graph #interactive
An event-based framework for characterizing the evolutionary behavior of interaction graphs (SA, SP, DU), pp. 913–921.
SIGIRSIGIR-2007-Huggett #modelling
Information-behaviour modeling with external cues (MH), p. 920.
SIGIRSIGIR-2007-WhiteM #query
Investigating the querying and browsing behavior of advanced search engine users (RWW, DM), pp. 255–262.
MODELSMoDELS-2007-KienzleDV #design #game studies #modelling
Model-Based Design of Computer-Controlled Game Character Behavior (JK, AD, HV), pp. 650–665.
MODELSMoDELS-2007-KienzleDV #design #game studies #modelling
Model-Based Design of Computer-Controlled Game Character Behavior (JK, AD, HV), pp. 650–665.
ECOOPECOOP-2007-CottenierBE #implementation #specification
Joinpoint Inference from Behavioral Specification to Implementation (TC, AvdB, TE), pp. 476–500.
PEPMPEPM-2007-RooverDBND #logic #query #similarity #source code #using
Behavioral similarity matching using concrete source code templates in logic queries (CDR, TD, JB, CN, LD), pp. 92–101.
PLDIPLDI-2007-DingSKTHZ #parallel
Software behavior oriented parallelization (CD, XS, KK, CT, RH, CZ), pp. 223–234.
QAPLQAPL-2007-Argent-KatwalaB #network
PEPA Queues: Capturing Customer Behaviour in Queueing Networks (AAK, JTB), pp. 3–25.
REFSQREFSQ-2007-SorbyN #framework #towards
Towards a Tomographic Framework for Structured Observation of Communicative Behaviour in Hospital Wards (IDS, ØN), pp. 262–276.
ASEASE-2007-MateescuPS #adaptation #algebra #component #composition #encoding #process
Behavioral adaptation of component compositions based on process algebra encodings (RM, PP, GS), pp. 385–388.
ESEC-FSEESEC-FSE-2007-ChristodorescuJK #mining #specification
Mining specifications of malicious behavior (MC, SJ, CK), pp. 5–14.
ESEC-FSEESEC-FSE-2007-FantechiG #product line
A behavioural model for product families (AF, SG), pp. 521–524.
ESEC-FSEESEC-FSE-2007-KosterK #test coverage #testing
State coverage: a structural test adequacy criterion for behavior checking (KK, DCK), pp. 541–544.
ICSEICSE-2007-UchitelBC #synthesis
Behaviour Model Synthesis from Properties and Scenarios (SU, GB, MC), pp. 34–43.
SACSAC-2007-GustafssonTDH #approach #aspect-oriented #embedded #evolution #performance
Engineering active behavior of embedded software to improve performance and evolution: an aspect-oriented approach (TG, AT, YD, JH), pp. 673–679.
SACSAC-2007-Kofron #component #protocol #using
Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
CASECASE-2007-00010DAR #feature model #realtime
A Micropositioning System with Real-Time Feature Extraction Capability for Quantifying C. elegans Locomotive Behavior (WW, YS, SJD, MA, PJR), pp. 243–248.
CASECASE-2007-IshiiNYOM #quantifier #realtime
Real-time and Long-time Quantification of Behavior of Laboratory Mice Scratching (II, YN, KY, KO, HM), pp. 628–633.
CASECASE-2007-KobetskiRAF
Minimization of Expected Cycle Time in Manufacturing Cells with Uncontrollable Behavior (AK, JR, , MF), pp. 14–19.
CASECASE-2007-LeungG #locality #multi
Multi-Robot Localization and Mapping Strategy: Utilizing Behavior Based Dynamic Tree Structure and Observer-explorer Routine (KKKL, GG), pp. 881–886.
DACDAC-2007-BogdanM
Quantum-Like Effects in Network-on-Chip Buffers Behavior (PB, RM), pp. 266–267.
DACDAC-2007-YangHH #automation #design #verification
Automatic Verification of External Interrupt Behaviors for Microprocessor Design (FCY, WKH, IJH), pp. 896–901.
DATEDATE-2007-BarajasCCMGCBI #interactive #modelling #optimisation
Interactive presentation: Behavioral modeling of delay-locked loops and its application to jitter optimization in ultra wide-band impulse radio systems (EB, RC, DC, DM, JLG, IC, SB, MI), pp. 1430–1435.
DATEDATE-2007-ChenSN #composition #semantics #specification
Compositional specification of behavioral semantics (KC, JS, SN), pp. 906–911.
DATEDATE-2007-IndrusiakTG #execution #interactive #modelling #specification #uml
Interactive presentation: Executable system-level specification models containing UML-based behavioral patterns (LSI, AT, MG), pp. 301–306.
DATEDATE-2007-VermaHR #automation #functional #generative #interactive #modelling
Interactive presentation: Automatic generation of functional coverage models from behavioral verilog descriptions (SV, IGH, KR), pp. 900–905.
HPDCHPDC-2007-MeeheanL #component #distributed #middleware
Environmentally responsible middleware: : an altruistic behavior model for distributed middleware components (JM, ML), pp. 209–210.
LCTESLCTES-2007-WaltherHN #embedded #realtime
Analyzing the real-time behaviour of deeply embedded event driven systems (KW, RH, JN), pp. 149–151.
SOSPSOSP-2007-KicimanL #framework #monitoring #named #platform #web
AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications (EK, VBL), pp. 17–30.
FASEFASE-2007-BurdyHP #bytecode #design #interface #java #specification
Preliminary Design of BML: A Behavioral Interface Specification Language for Java Bytecode (LB, MH, MP), pp. 215–229.
FoSSaCSFoSSaCS-2007-BreugelSW #approximate #probability #pseudo
Approximating a Behavioural Pseudometric Without Discount for Probabilistic Systems (FvB, BS, JW), pp. 123–137.
CAVCAV-2007-LeavensKP #composition #functional #java #ml #specification #tutorial #verification
A JML Tutorial: Modular Specification and Verification of Functional Behavior for Java (GTL, JRK, EP), p. 37.
CBSECBSE-2006-AttieLPC #component #design #explosion #verification
Behavioral Compatibility Without State Explosion: Design and Verification of a Component-Based Elevator Control System (PCA, DHL, AP, HC), pp. 33–49.
QoSAQoSA-2006-DuzbayevP #predict #runtime
Runtime Prediction of Queued Behaviour (ND, IP), pp. 78–94.
HTHT-2006-TzagarakisVK #design
Supporting the design of behaviors in Callimachus (MT, MV, NK), pp. 115–118.
CSEETCSEET-2006-FrezzaT #student #testing
Testing as a Mental Discipline: Practical Methods for Affecting Student Behavior (STF, MHT), p. 241.
ICPCICPC-2006-Hamou-LhadjL #comprehension #scalability
Summarizing the Content of Large Traces to Facilitate the Understanding of the Behaviour of a Software System (AHL, TCL), pp. 181–190.
ICPCICPC-2006-KoskinenKS #approach #comprehension
Profile-Based Approach to Support Comprehension of Software Behavior (JK, MK, TS), pp. 212–224.
ICPCICPC-2006-RooverMGGD #approach #documentation #lightweight #verification
An Approach to High-Level Behavioral Program Documentation Allowing Lightweight Verification (CDR, IM, KG, KG, TD), pp. 202–211.
FMFM-2006-BrunetCU #model merging
Properties of Behavioural Model Merging (GB, MC, SU), pp. 98–114.
SEFMSEFM-2006-MarcheR #java #transaction #verification
Verification of JAVA CARD Applets Behavior with Respect to Transactions and Card Tears (CM, NR), pp. 137–146.
AIIDEAIIDE-2006-CutumisuSSWOSS #game studies #generative
A Demonstration of ScriptEase Ambient and PC-Interactive Behavior Generation for Computer Role-Playing Games (MC, DS, JS, KW, CO, JS, AS), pp. 141–142.
CoGCIG-2006-OlenderskiNL #architecture
A Behavior-Based Architecture for Realistic Autonomous Ship Control (AO, MNN, SJL), pp. 148–155.
CoGCIG-2006-Saund
Capturing The Information Conveyed By Opponents' Betting Behavior in Poker (ES), pp. 126–133.
CHICHI-2006-EngLTCHV #adaptation #automation #generative #performance #predict
Generating automated predictions of behavior strategically adapted to specific performance objectives (KE, RLL, IT, AC, AH, AHV), pp. 621–630.
CHICHI-2006-KamvarB #case study #mobile #scalability
A large scale study of wireless search behavior: Google mobile search (MK, SB), pp. 701–709.
CHICHI-2006-PearsonHBPN #adaptation #how #human-computer #word
Adaptive language behavior in HCI: how expectations and beliefs about a system affect users’ word choice (JP, JH, HPB, MJP, CN), pp. 1177–1180.
CHICHI-2006-RafflePIL #game studies
Beyond record and play: backpacks: tangible modulators for kinetic behavior (HR, AJP, HI, JL), pp. 681–690.
CSCWCSCW-2006-RazaviI #information management #learning
A grounded theory of information sharing behavior in a personal learning space (MNR, LI), pp. 459–468.
CAiSECAiSE-2006-AckermannT #component #library #ocl #specification
A Library of OCL Specification Patterns for Behavioral Specification of Software Components (JA, KT), pp. 255–269.
ICEISICEIS-ISAS-2006-ChengX #approach #concurrent #detection #formal method #online
A Formal Approach to Detecting Shilling Behaviors in Concurrent Online Auctions (YTC, HX), pp. 375–381.
ICEISICEIS-ISAS-2006-SubramaniamKG #evolution #predict #process
Business Processes: Behavior Prediction and Capturing Reasons for Evolution (SS, VK, DG), pp. 3–10.
ECIRECIR-2006-WenRB #online #topic #using
The Effects on Topic Familiarity on Online Search Behaviour and Use of Relevance Criteria (LW, IR, PB), pp. 456–459.
ICPRICPR-v1-2006-CarterYF #approach #markov #recognition
A Combined Bayesian Markovian Approach for Behaviour Recognition (NLC, DPY, JMF), pp. 761–764.
ICPRICPR-v1-2006-GormanTBH #game studies #interactive
Bayesian Imitation of Human Behavior in Interactive Computer Games (BG, CT, CB, MH), pp. 1244–1247.
ICPRICPR-v1-2006-GunesP #analysis #automation #database #gesture
A Bimodal Face and Body Gesture Database for Automatic Analysis of Human Nonverbal Affective Behavior (HG, MP), pp. 1148–1153.
ICPRICPR-v1-2006-LiHWW #image #modelling #recognition
Behavior Modeling and Recognition Based on Space-Time Image Features (HL, ZH, YW, FW), pp. 243–246.
ICPRICPR-v1-2006-ThurauHB #classification #game studies #video
Classification of Team Behaviors in Sports Video Games (CT, TH, CB), pp. 1188–1191.
ICPRICPR-v1-2006-XuSL #adaptation #detection #monitoring
Tree Based Behavior Monitoring for Adaptive Fraud Detection (JX, AHS, QL), pp. 1208–1211.
ICPRICPR-v3-2006-DuongPBV #exponential #markov #modelling #product line #recognition
Human Behavior Recognition with Generic Exponential Family Duration Modeling in the Hidden Semi-Markov Model (TVD, DQP, HHB, SV), pp. 202–207.
ICPRICPR-v3-2006-Law-ToGBB #detection #video
Local Behaviours Labelling for Content Based Video Copy Detection (JLT, VGB, OB, NB), pp. 232–235.
ICPRICPR-v4-2006-YamadaKNT #identification
Hipprint Person Identification and Behavior Analys (MY, MK, HN, JT), pp. 533–536.
KDDKDD-2006-AgichteinZ #identification #mining #web
Identifying “best bet” web search results by mining past user behavior (EA, ZZ), pp. 902–908.
SIGIRSIGIR-2006-AgichteinBD #ranking #web
Improving web search ranking by incorporating user behavior information (EA, EB, STD), pp. 19–26.
SIGIRSIGIR-2006-FreundT #enterprise
Enterprise search behaviour of software engineers (LF, EGT), pp. 645–646.
SIGIRSIGIR-2006-MurrayLC #modelling #predict #query
Action modeling: language models that predict query behavior (GCM, JJL, AC), pp. 681–682.
MODELSMoDELS-2006-GarousiBL #analysis #dependence #distributed #modelling #uml #visualisation
Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
SPLCSPLC-2006-BrownGBSKG #embedded #feature model #modelling #product line #weaving
Weaving Behavior into Feature Models for Embedded System Families (TJB, RG, RB, ITAS, PK, CG), pp. 52–64.
MODELSMoDELS-2006-GarousiBL #analysis #dependence #distributed #modelling #uml #visualisation
Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
ECOOPECOOP-2006-MitchellSS #modelling #runtime
Modeling Runtime Behavior in Framework-Based Applications (NM, GS, HS), pp. 429–451.
AdaEuropeAdaEurope-2006-ValpereiroP
POSIX Trace Based Behavioural Reflection (FV, LMP), pp. 27–39.
PPDPPPDP-2006-RooverBD #fuzzy #logic #similarity #strict #validation
Combining fuzzy logic and behavioral similarity for non-strict program validation (CDR, JB, TD), pp. 15–26.
QAPLQAPL-2006-SotinCJ #java #static analysis
Quantitative Static Analysis Over Semirings: Analysing Cache Behaviour for Java Card (PS, DC, TPJ), pp. 153–167.
ASEASE-2006-TillmannS #generative
Mock-object generation with behavior (NT, WS), pp. 365–368.
ICSEICSE-2006-NakamichiSSM #detection #usability #using #web
Detecting low usability web pages using quantitative data of users’ behavior (NN, KS, MS, KiM), pp. 569–576.
ICSEICSE-2006-PettitG #concurrent #design pattern #modelling
Modeling behavioral design patterns of concurrent objects (RGPI, HG), pp. 202–211.
SACSAC-2006-ColletOR #component #on the
On contracting different behavioral properties in component-based systems (PC, AO, NR), pp. 1798–1799.
SACSAC-2006-OsorioK #analysis
An initial analysis and presentation of malware exhibiting swarm-like behavior (FCCO, ZK), pp. 323–329.
DACDAC-2006-CongFHJZ #communication
Behavior and communication co-optimization for systems with sequential communication media (JC, YF, GH, WJ, ZZ), pp. 675–678.
DATEDATE-2006-PatelSB #design
Heterogeneous behavioral hierarchy for system level designs (HDP, SKS, RAB), pp. 565–570.
HPCAHPCA-2006-ChungCMMCKO #parallel #source code #thread #transaction
The common case transactional behavior of multithreaded programs (JC, HC, CCM, AM, BDC, CK, KO), pp. 266–277.
ISMMISMM-2006-BhatiaCL #co-evolution #design #optimisation
Memory-manager/scheduler co-design: optimizing event-driven servers to improve cache behavior (SB, CC, JLL), pp. 104–114.
FASEFASE-2006-DevereuxC #automation #modelling
Automated Support for Building Behavioral Models of Event-Driven Systems (BD, MC), pp. 122–138.
FASEFASE-2006-SridharH
A Behavioral Model for Software Containers (NS, JOH), pp. 139–154.
AMOSTA-MOST-J-2005-AugustonMS06 #assessment #automation #modelling #safety #testing
Environment behavior models for automation of testing and assessment of system safety (MA, JBM, MtS), pp. 971–980.
ISSTAISSTA-2006-KiviluomaKM #architecture #aspect-oriented #monitoring #runtime #using
Run-time monitoring of architecturally significant behaviors using behavioral profiles and aspects (KK, JK, TM), pp. 181–190.
ITiCSEITiCSE-2005-GomesSVG #multi #named
SoundSpaces: behavior based control system for multimedia systems (RG, RS, JV, NG), p. 407.
ITiCSEITiCSE-2005-Jimenez-DiazGGG #comprehension #visualisation
Software behaviour understanding Supported by dynamic visualization and role-play (GJD, MGA, MAGM, PAGC), pp. 54–58.
ITiCSEITiCSE-2005-Walls
Integrating views on ethical behavior for computer professionals in an interdisciplinary environment (DCW), p. 414.
CSMRCSMR-2005-Hamou-LhadjBAL #design #execution #modelling
Recovering Behavioral Design Models from Execution Traces (AHL, EB, DA, TCL), pp. 112–121.
IWPCIWPC-2005-DuxIDFK #visualisation
Visualizing the Behavior of Dynamically Modifiable Code (BD, AI, SKD, DF, SGK), pp. 337–340.
IWPCIWPC-2005-OBrienB #approach #empirical #modelling
Modelling the Information-Seeking Behaviour of Programmers — An Empirical Approach (MPO, JB), pp. 125–134.
IWPCIWPC-2005-WalkinshawRW #comprehension #object-oriented #perspective #source code
Understanding Object-Oriented Source Code from the Behavioural Perspective (NW, MR, MW), pp. 215–224.
CIAACIAA-2005-BaillyCS #communication #component #composition #contract
Component Composition Preserving Behavioural Contracts Based on Communication Traces (AB, MC, ISR), pp. 54–65.
ICALPICALP-2005-BreugelHMW #approach #pseudo
An Accessible Approach to Behavioural Pseudometrics (FvB, CH, MM, JW), pp. 1018–1030.
IFMIFM-2005-GrunskeLYW #analysis #automation #design #specification
An Automated Failure Mode and Effect Analysis Based on High-Level Design Specification with Behavior Trees (LG, PAL, NY, KW), pp. 129–149.
SEFMSEFM-2005-Hameurlain #component #on the #protocol
On Compatibility and Behavioural Substitutability of Component Protocols (NH), pp. 394–403.
CEFPCEFP-2005-Hammond #approach #bound #functional #programming
Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach (KH), pp. 100–134.
AIIDEAIIDE-2005-DSilvaJCSM #realtime
Retaining Learned Behavior During Real-Time Neuroevolution (TD, RJ, MC, KOS, RM), pp. 39–44.
AIIDEAIIDE-2005-Tomlinson #design #interactive
Negative Behavior Space in the Design of Interactive Agents (BT), pp. 129–134.
CoGCIG-2005-DenzingerLGB #game studies #testing
Dealing with Parameterized Actions in Behavior Testing of Commercial Computer Games (JD, KL, DG, JWB).
CoGCIG-2005-DenzingerW #learning
Combining Coaching and Learning to Create Cooperative Character Behavior (JD, CW).
DiGRADiGRA-2005-Adams #case study #maintenance
Information Behavior and the Formation and Maintenance of Peer Cultures: A Case Study of MMORPG' (SA).
DiGRADiGRA-2005-ChangW #case study #game studies #online
The Study on the Gamers' Lifestyles in On-line Game World: The Emergence of Cyber-Behavior Patterns in two Different Cultural Context of Korea and Japan (GYC, LSMW).
DiGRADiGRA-2005-CiavarroBBWPG #game studies #implementation
Implementation of a 'karma' factor affects behaviour in a sports-action game (CDC, JB, NB, IW, BSP, DG).
DiGRADiGRA-2005-JakobssonP #configuration management
Configuring the player - subversive behaviour in Project Entropia (PJ, DP).
DiGRADiGRA-2005-WhangK #game studies #online
The online game world as a product and the behavioral characteristics of online game consumers as role player (LSMW, JYK).
CHICHI-2005-KaurH #comparison #predict
A comparison of LSA, wordNet and PMI-IR for predicting user click behavior (IK, AJH), pp. 51–60.
KDDKDD-2005-SongLTS #modelling #predict
Modeling and predicting personal information dissemination behavior (XS, CYL, BLT, MTS), pp. 479–488.
SEKESEKE-2005-LiW #approach #implementation #web
Web Search Based on Ant Behavior: Approach and Implementation in Case of Interlegis (WL, MQW), pp. 572–577.
SEKESEKE-2005-WangM #web
Recovering Individual Accessing Behaviour from Web Logs (LW, CM), pp. 590–595.
SEKESEKE-2005-Zhu #multi #reasoning
Formal Reasoning about Emergent Behaviours of Multi-Agent Systems (HZ), pp. 280–285.
MODELSMoDELS-2005-PretschnerP #modelling #refactoring
Computing Refactorings of Behavior Models (AP, WP), pp. 126–141.
MODELSMoDELS-2005-PretschnerP #modelling #refactoring
Computing Refactorings of Behavior Models (AP, WP), pp. 126–141.
SACSAC-2005-DiazLPCV #approach #e-commerce #probability #protocol #realtime #set #validation
An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocol (GD, KGL, JJP, FC, VV), pp. 815–820.
SACSAC-2005-TruongS #modelling #uml #using #verification
Verification of behavioural elements of UML models using B (NTT, JS), pp. 1546–1552.
CASECASE-2005-Hwang #approach #automation #configuration management #finite #generative
Generating finite-state global behavior of reconfigurable automation systems: DEVS approach (MHH), pp. 254–260.
CASECASE-2005-LeeK #distributed #multi
Estimating global stress environment by observing local behavior in distributed multiagent systems (SL, SRTK), pp. 215–219.
DACDAC-2005-GuWDZ #design #incremental #physics
Incremental exploration of the combined physical and behavioral design space (Z(G, JW, RPD, HZ), pp. 208–213.
DACDAC-2005-WeiD #development #megamodelling
Systematic development of analog circuit structural macromodels through behavioral model decoupling (YW, AD), pp. 57–62.
DATEDATE-2005-ForzanP #analysis #library #modelling
Modeling the Non-Linear Behavior of Library Cells for an Accurate Static Noise Analysis (CF, DP), pp. 982–983.
DATEDATE-2005-Ruiz-SautuaMMH #performance #synthesis
Behavioural Transformation to Improve Circuit Performance in High-Level Synthesis (RRS, MCM, JMM, RH), pp. 1252–1257.
FoSSaCSFoSSaCS-2005-DengP #axiom #finite #probability
Axiomatizations for Probabilistic Finite-State Behaviors (YD, CP), pp. 110–124.
AMOSTA-MOST-2005-AugustonMS #automation #generative #modelling #testing
Environment behavior models for scenario generation and testing automation (MA, JBM, MtS), pp. 58–63.
ICSTSAT-2005-SeitzAO #random #satisfiability
Threshold Behaviour of WalkSAT and Focused Metropolis Search on Random 3-Satisfiability (SS, MA, PO), pp. 475–481.
WICSAWICSA-2004-PettitG #architecture #concurrent #modelling #petri net #using
Modeling Behavioral Patterns of Concurrent Software Architectures Using Petri Nets (RGPI, HG), pp. 57–68.
DocEngDocEng-2004-KingST #animation #functional #programming #realtime #xml
Behavioral reactivity and real time programming in XML: functional programming meets SMIL animation (PRK, PS, SJT), pp. 57–66.
HTHT-2004-LepthienA
Unifying structure, behavior, and data with themis types and templates (WVL, KMA), pp. 256–265.
IWPCIWPC-2004-Kelsen #comprehension #source code
A Simple Static Model for Understanding the Dynamic Behavior of Programs (PK), pp. 46–51.
WCREWCRE-2004-ParkKWY #analysis #design pattern
A Static Reference Flow Analysis to Understand Design Pattern Behavior (CP, YK, CW, KY), pp. 300–301.
IFMIFM-2004-Winter #csp #formal method
Formalising Behaviour Trees with CSP (KW), pp. 148–167.
SEFMSEFM-2004-MoisanRR #component #formal method #framework #towards
Towards Formalizing Behavioral Substitutability in Component Frameworks (SM, AR, JPR), pp. 122–131.
SEFMSEFM-2004-RouffVHTR #formal method #predict
Properties of a Formal Method for Prediction of Emergent Behaviors in Swarm-Based Systems (CR, AV, MGH, WT, JLR), pp. 24–33.
CHICHI-2004-BakerCKW #game studies #student
Off-task behavior in the cognitive tutor classroom: when students “game the system” (RSB, ATC, KRK, AZW), pp. 383–390.
CHICHI-2004-HancockTR #communication #design
Deception and design: the impact of communication technology on lying behavior (JTH, JTS, TR), pp. 129–134.
CHICHI-2004-KoM #debugging #design #interface
Designing the whyline: a debugging interface for asking questions about program behavior (AJK, BAM), pp. 151–158.
CHICHI-2004-TeevanAAK #case study
The perfect search engine is not enough: a study of orienteering behavior in directed search (JT, CA, MSA, DRK), pp. 415–422.
EDOCEDOC-2004-KathBBEFH #corba #execution #modelling #towards
Towards Executable Models: Transforming EDOC Behavior Models to CORBA and BPEL (OK, AB, MB, KPE, MF, CH), pp. 267–274.
ICEISICEIS-v1-2004-EstevesP #enterprise #implementation
Organizational and Technological Critical Success Factors Behavior Along the ERP Implementation Phases (JE, JAP), pp. 45–53.
ICEISICEIS-v3-2004-CavareroE #how #information management #metric
Metrics for Dynamics: How to Improve the Behaviour of an Object Information System (JLC, MJEC), pp. 344–349.
ICEISICEIS-v3-2004-McNeileS #mixin #modelling #state machine
Mixin Based Behaviour Modelling — An Example Based on Composed State Machines (ATM, NS), pp. 179–183.
ICEISICEIS-v4-2004-LokeL #workflow
Analyzing Observable Behaviours of Device Ecology Workflows (SWL, SL), pp. 78–83.
ICMLICML-2004-MoralesS #learning
Learning to fly by combining reinforcement learning with behavioural cloning (EFM, CS).
ICPRICPR-v4-2004-KamTEYW #automation #recognition
Automated Recognition of Highly Complex Human Behavior (AHK, KAT, HLE, WYY, JW), pp. 327–330.
ICPRICPR-v4-2004-OyekoyaS #using #visual notation
Exploring Human Eye Behaviour using a Model of Visual Attention (OO, FS), pp. 945–948.
SIGIRSIGIR-2004-GrankaJG #analysis
Eye-tracking analysis of user behavior in WWW search (LAG, TJ, GG), pp. 478–479.
UMLUML-2004-Reinhartz-BergerS #analysis #approach #domain model #modelling
Behavioral Domain Analysis — The Application-Based Domain Modeling Approach (IRB, AS), pp. 410–424.
UMLUML-2004-StraetenJM #consistency #inheritance #refactoring
Supporting Model Refactorings Through Behaviour Inheritance Consistencies (RVDS, VJ, TM), pp. 305–319.
OOPSLAOOPSLA-2004-DufourGHMSV #aspectj #source code
Measuring the dynamic behaviour of AspectJ programs (BD, CG, LJH, OdM, GS, CV), pp. 150–169.
OOPSLAOOPSLA-2004-GeorgesBEB #java
Method-level phase behavior in java workloads (AG, DB, LE, KDB), pp. 270–287.
OOPSLAOOPSLA-2004-HauswirthSDH #comprehension #profiling
Vertical profiling: understanding the behavior of object-priented applications (MH, PFS, AD, MH), pp. 251–269.
PADLPADL-2004-WangRYC #execution #requirements #symbolic computation
Symbolic Execution of Behavioral Requirements (TW, AR, RHCY, SCC), pp. 178–192.
RERE-2004-HallZ #named
OMML: A Behavioural Model Interchange Format (RJH, AZ), pp. 272–282.
SACSAC-J-2003-Dong04 #diagrams
Adding pattern related information in structural and behavioral diagrams (JD), pp. 293–300.
ASEASE-2004-HallZ #requirements #validation
Validating Personal Requirements by Assisted Symbolic Behavior Browsing (RJH, AZ), pp. 56–66.
ASEASE-2004-MehtaMSA #architecture #composition #modelling
Modeling Behavior in Compositions of Software Architectural Primitives (NRM, NM, MS, FA), pp. 371–374.
FSEFSE-2004-UchitelC #modelling
Merging partial behavioural models (SU, MC), pp. 43–52.
ICSEICSE-2004-BirmanRV #web #web service
Adding High Availability and Autonomic Behavior to Web Services (KPB, RvR, WV), pp. 17–26.
ICSEICSE-2004-Mariani #component #evolution #verification
Behavior Capture and Test for Verifying Evolving Component-Based Systems (LM), pp. 78–80.
DACDAC-2004-KappS #automation #control flow #scheduling #synthesis
Automatic correct scheduling of control flow intensive behavioral descriptions in formal synthesis (KK, VKS), pp. 61–66.
DACDAC-2004-OzturkKDCI
Data compression for improving SPM behavior (ÖÖ, MTK, ID, GC, MJI), pp. 401–406.
DATEDATE-v1-2004-BriereCMMOG #design #modelling #tool support
Design and Behavioral Modeling Tools for Optical Network-on-Chip (MB, LC, TM, FM, IO, FG), pp. 738–739.
DATEDATE-v1-2004-HuangM #identification #modelling
Identification and Modeling of Nonlinear Dynamic Behavior in Analog Circuits (XH, HAM), pp. 460–467.
DATEDATE-v1-2004-MolinaRMH #scheduling
Behavioural Bitwise Scheduling Based on Computational Effort Balancing (MCM, RRS, JMM, RH), pp. 684–685.
DATEDATE-v1-2004-NathkeBHB #automation #generative
Hierarchical Automatic Behavioral Model Generation of Nonlinear Analog Circuits Based on Nonlinear Symbolic Techniques (LN, VB, LH, EB), pp. 442–447.
DATEDATE-v1-2004-WilsonRBKB #modelling #performance
Efficient Mixed-Domain Behavioural Modeling of Ferromagnetic Hysteresis Implemented in VHDL-AMS (PRW, JNR, ADB, TJK, JB), pp. 742–743.
FoSSaCSFoSSaCS-2004-Caires #logic #π-calculus
Behavioral and Spatial Observations in a Logic for the π-Calculus (LC), pp. 72–89.
FoSSaCSFoSSaCS-2004-GiambiagiSV #calculus #infinity #on the #process
On the Expressiveness of Infinite Behavior and Name Scoping in Process Calculi (PG, GS, FDV), pp. 226–240.
HTHT-2003-AndersonSL
Structure and behavior awareness in themis (KMA, SAS, WVL), pp. 138–147.
ITiCSEITiCSE-2003-DannDCDRP #named #visualisation
Objects: visualization of behavior and state (WD, TD, SC, KD, KR, RP), pp. 84–88.
ITiCSEITiCSE-2003-ParkerB #effectiveness
Measuring effectiveness of constructivist and behaviourist assignments in CS102 (JRP, KB), pp. 40–44.
SEFMSEFM-2003-LitvakTY #consistency #diagrams #uml #validation
Behavioral Consistency Validation of UML Diagrams (BL, SST, AY), pp. 118–125.
AGTIVEAGTIVE-2003-DottiRS #analysis #fault #graph grammar #specification #using
Specification and Analysis of Fault Behaviours Using Graph Grammars (FLD, LR, OMdS), pp. 120–133.
AGTIVEAGTIVE-2003-MarburgerW #analysis #graph transformation
Behavioral Analysis of Telecommunication Systems by Graph Transformations (AM, BW), pp. 202–219.
ICEISICEIS-v2-2003-ReBB #identification
The Use of Neurofuzzy Computable System to Identify Prominent Behavior Characteristics in Successful Entrepreneurs (AR, RB, LB), pp. 522–528.
ECIRECIR-2003-FinesilverR #documentation
User Behaviour in the Context of Structured Documents (KF, JR), pp. 104–119.
KDDKDD-2003-GunduzO #modelling #predict #representation #web
A Web page prediction model based on click-stream tree representation of user behavior (SG, MTÖ), pp. 535–540.
KDDKDD-2003-Weigend
Analyzing customer behavior at Amazon.com (ASW), p. 5.
SEKESEKE-2003-MicucciT #component #framework
A Pattern-like Framework to Dynamically Change Components Behaviour (DM, AT), pp. 422–426.
UMLUML-2003-PilskalnsAGF #testing #uml
Rigorous Testing by Merging Structural and Behavioral UML Representations (OP, AAA, SG, RBF), pp. 234–248.
ECOOPECOOP-2003-ScharliDNB #composition #named
Traits: Composable Units of Behaviour (NS, SD, ON, APB), pp. 248–274.
OOPSLAOOPSLA-2003-TanterNCC
Partial behavioral reflection: spatial and temporal selection of reification (ÉT, JN, DC, PC), pp. 27–46.
AdaEuropeAdaEurope-2003-LinM #object-oriented #programming #type system
A Behavioural Notion of Subtyping for Object-Oriented Programming in SPARK95 (TML, JAM), pp. 309–321.
REFSQREFSQ-J-2002-AntonEC03 #policy #privacy #requirements #security
Precluding incongruous behavior by aligning software requirements with security and privacy policies (AIA, JBE, RAC), pp. 967–977.
ASEASE-2003-BunusF #automation #fault #locality #modelling #physics #simulation #verification
Semi-Automatic Fault Localization and Behavior Verification for Physical System Simulation Models (PB, PF), pp. 253–258.
ESEC-FSEESEC-FSE-2003-UchitelKM #lts #using
Behaviour model elaboration using partial labelled transition systems (SU, JK, JM), pp. 19–27.
ICSEICSE-2003-MarburgerW #comprehension #tool support
Tools for Understanding the Behavior of Telecommunication Systems (AM, BW), pp. 430–443.
SACSAC-2003-CasteleynTB #adaptation #design #web
Design Time Support for Adaptive Behavior in Web Sites (SC, ODT, SB), pp. 1222–1228.
SACSAC-2003-LanzenbergerMOP #visualisation
Applying Information Visualization Techniques to Capture and Explore the Course of Cognitive Behavioral Therapy (ML, SM, SO, CP), pp. 268–274.
DACDAC-2003-ClarkeKY #bound #c #consistency #model checking #source code #using
Behavioral consistency of C and verilog programs using bounded model checking (EMC, DK, KY), pp. 368–371.
DACDAC-2003-KiranJRN #communication #complexity #effectiveness #modelling
A complexity effective communication model for behavioral modeling of signal processing applications (MNVSK, MNJ, PR, SKN), pp. 412–415.
DACDAC-2003-RootWT #metric #modelling #simulation
New techniques for non-linear behavioral modeling of microwave/RF ICs from simulation and nonlinear microwave measurements (DER, JW, NT), pp. 85–90.
DACDAC-2003-SoDH #design #synthesis #tool support #using
Using estimates from behavioral synthesis tools in compiler-directed design space exploration (BS, PCD, MWH), pp. 514–519.
DATEDATE-2003-BruschiF #modelling #synthesis
Synthesis of Complex Control Structures from Behavioral SystemC Models (FB, FF), pp. 20112–20119.
DATEDATE-2003-Castro-LopezFMR #hardware #modelling #simulation #using
Behavioural Modelling and Simulation of SigmaDelta Modulators Using Hardware Description Languages (RCL, FVF, FM, ÁRV), pp. 10168–10175.
DATEDATE-2003-EberleVWDGM #automation #modelling #simulation
Behavioral Modeling and Simulation of a Mixed Analog/Digital Automatic Gain Control Loop in a 5 GHz WLAN Receiver (WE, GV, PW, SD, GGEG, HDM), pp. 10642–10649.
DATEDATE-2003-LuzKKS #data transformation
Generalized Data Transformations for Enhancing Cache Behavior (VDLL, MTK, IK, US), pp. 10906–10911.
DATEDATE-2003-MemikKCK #approach
An Integrated Approach for Improving Cache Behavior (GM, MTK, ANC, IK), pp. 10796–10801.
DATEDATE-2003-MounirMF #automation #performance #verification
Automatic Behavioural Model Calibration for Efficient PLL System Verification (AM, AM, MF), pp. 20280–20285.
DATEDATE-2003-SaputraVKIBKZ #encryption #energy
Masking the Energy Behavior of DES Encryption (HS, NV, MTK, MJI, RRB, SK, WZ), pp. 10084–10089.
HPCAHPCA-2003-KarlssonMHW #memory management #middleware
Memory System Behavior of Java-Based Middleware (MK, KEM, EH, DAW), pp. 217–228.
PDPPDP-2003-MameiRZ #automaton #case study #distributed
Dissipative Cellular Automata As Minimalist Distributed Systems: A Study On Emergent Behaviors (MM, AR, FZ), pp. 250–257.
FASEFASE-2003-ZhaoR #aspectj #interface #named #specification
Pipa: A Behavioral Interface Specification Language for AspectJ (JZ, MCR), pp. 150–165.
FoSSaCSFoSSaCS-2003-HennessyMR #distributed #towards
Towards a Behavioural Theory of Access and Mobility Control in Distributed Systems (MH, MM, JR), pp. 282–298.
STOCSTOC-2003-Ajtai #algorithm #approximate #worst-case
The worst-case behavior of schnorr’s algorithm approximating the shortest nonzero vector in a lattice (MA), pp. 396–406.
STOCSTOC-2003-GilbertK #on the
On the fractal behavior of TCP (ACG, HJK), pp. 297–306.
TACASTACAS-2003-UchitelCKM #named #tool support #using
LTSA-MSC: Tool Support for Behaviour Model Elaboration Using Implied Scenarios (SU, RC, JK, JM), pp. 597–601.
FATESFATES-2003-TylerS #black box #testing
Black-Box Testing of Grey-Box Behavior (BT, NS), pp. 1–14.
VMCAIVMCAI-2003-SteffenH
Behavior-Based Model Construction (BS, HH), pp. 5–19.
CBSECBSE-2002-VecellioTS #component #predict
Containers for Predictable Behavior of Component-based Software (GJV, WMT, RMS), p. 2.
TPDLECDL-2002-SfakakisK #library
User Behavior Tendencies on Data Collections in a Digital Library (MS, SK), pp. 550–559.
JCDLJCDL-2002-KellyC #information management #topic
The effects of topic familiarity on information search behavior (DK, CC), pp. 74–75.
SCAMSCAM-J-2001-SchuppGML02 #library #semantics
Semantic and behavioral library transformations (SS, DG, DRM, SML), pp. 797–810.
ICSMEICSM-2002-LaiM #modelling
Behavioural Concern Modelling for Software Change Tasks (AL, GCM), pp. 112–121.
IFLIFL-2002-HammondM #predict
Predictable Space Behaviour in FSM-Hume (KH, GM), pp. 1–16.
ICGTICGT-2002-BaldanK #approximate #graph transformation
Approximating the Behaviour of Graph Transformation Systems (PB, BK), pp. 14–29.
ICGTICGT-2002-Harel #requirements #why
Can Behavioral Requirements Be Executed? (And Why Would We Want to Do So?) (DH), pp. 6–7.
ICGTICGT-2002-MensDJ #formal method #program transformation
Formalising Behaviour Preserving Program Transformations (TM, SD, DJ), pp. 286–301.
CHICHI-2002-FioreTS
Observed behavior and perceived value of authors in usenet newsgroups: bridging the gap (ATF, SLT, MAS), pp. 323–330.
CAiSECAiSE-2002-AoumeurS #diagrams #logic #prototype #uml #using
Integrating and Rapid-Prototyping UML Structural and Behavioural Diagrams Using Rewriting Logic (NA, GS), pp. 296–310.
EDOCEDOC-2002-MilosevicD #contract #monitoring #on the
On Expressing and Monitoring Behaviour in Contracts (ZM, RGD), pp. 3–14.
ICMLICML-2002-LaudD #learning
Reinforcement Learning and Shaping: Encouraging Intended Behaviors (AL, GD), pp. 355–362.
ICMLICML-2002-Ryan #automation #learning #modelling #using
Using Abstract Models of Behaviours to Automatically Generate Reinforcement Learning Hierarchies (MRKR), pp. 522–529.
ICMLICML-2002-Zhang #consistency #statistics
Statistical Behavior and Consistency of Support Vector Machines, Boosting, and Beyond (TZ0), pp. 690–700.
ICPRICPR-v1-2002-NguyenVWB #monitoring #multi #people #using
Hierarchical Monitoring of People’s Behaviors in Complex Environments Using Multiple Cameras (NTN, SV, GAWW, HHB), pp. 13–16.
ICPRICPR-v1-2002-RahmanNI #using
Recognizing Human Behavior Using Universal Eigenspace (MMR, KN, SI), pp. 295–298.
ICPRICPR-v2-2002-ChengCK #sequence #video
Recognising Human Running Behaviour in Sports Video Sequences (FC, WJC, JK), pp. 1017–1020.
ICPRICPR-v2-2002-Miyamori #identification #retrieval #using #video
Improving Accuracy in Behaviour Identification for Content-Based Retrieval by Using Audio and Video Information (HM), pp. 826–830.
ICPRICPR-v4-2002-MoriyamaKCXAGI #automation #recognition
Automatic Recognition of Eye Blinking in Spontaneously Occurring Behavior (TM, TK, JFC, JX, ZA, JG, HI), p. 78–?.
KDDKDD-2002-El-RamlySS #approach #mining #runtime
From run-time behavior to usage scenarios: an interaction-pattern mining approach (MER, ES, PGS), pp. 315–324.
SEKESEKE-2002-XuVIY #modelling #multi #using #verification
Modeling and verifying multi-agent behaviors using predicate/transition nets (DX, RAV, TRI, JY), pp. 193–200.
ECOOPECOOP-2002-AlagicK #self
Behavioral Compatibility of Self-Typed Theories (SA, SK), pp. 585–608.
ECOOPECOOP-2002-RedmondC #adaptation
Supporting Unanticipated Dynamic Adaptation of Application Behaviour (BR, VC), pp. 205–230.
TOOLSTOOLS-USA-2002-SoundarajanT #polymorphism #testing
Testing Polymorphic Behavior (NS, BT), pp. 173–188.
SASSAS-2002-Hymans #abstract interpretation #safety
Checking Safety Properties of Behavioral VHDL Descriptions by Abstract Interpretation (CH), pp. 444–460.
SACSAC-2002-El-Ansary #analysis #representation #requirements #towards
Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and events (AEA), pp. 984–991.
SACSAC-2002-GarcesF #analysis #distributed
Analysis of Distributed Routing Balancing behavior (IG, DF), pp. 817–824.
SACSAC-2002-GoldmanGBJ #clustering #simulation
Individual-based simulation of the clustering behaviour of epidermal growth factor receptors (JPG, WJG, DB, CGJ), pp. 127–131.
ASPLOSASPLOS-2002-SherwoodPHC #automation #scalability
Automatically characterizing large scale program behavior (TS, EP, GH, BC), pp. 45–57.
DACDAC-2002-DrinicK #synthesis
Behavioral synthesis via engineering change (MD, DK), pp. 18–21.
DACDAC-2002-Perrott #performance #simulation
Fast and accurate behavioral simulation of fractional-N frequency synthesizers and other PLL/DLL circuits (MHP), pp. 498–503.
DACDAC-2002-VanasscheGS #modelling
Behavioral modeling of (coupled) harmonic oscillators (PV, GGEG, WMCS), pp. 536–541.
DATEDATE-2002-GinesPRSM #design #modelling #parametricity #reuse
A Mixed-Signal Design Reuse Methodology Based on Parametric Behavioural Models with Non-Ideal Effects (AJG, EJP, AR, RS, NMM), pp. 310–314.
DATEDATE-2002-VanasscheGS #matrix #modelling #using
Constructing Symbolic Models for the Input/Output Behavior of Periodically Time-Varying Systems Using Harmonic Transfer Matrices (PV, GGEG, WMCS), pp. 279–284.
DATEDATE-2002-WilsonRZBK #fault #modelling #using
Behavioural Modelling of Operational Amplifier Faults Using VHDL-AMS (PRW, JNR, MZ, ADB, YK), p. 1133.
HPCAHPCA-2002-SairSC
Quantifying Load Stream Behavior (SS, TS, BC), pp. 197–208.
HPCAHPCA-2002-VeraX
Let’s Study Whole-Program Cache Behaviour Analytically (XV, JX), pp. 175–186.
HPDCHPDC-2002-AllcockBBFGILP #distributed #named #scalability #visualisation
GridMapper: A Tool for Visualizing the Behavior of Large-Scale Distributed Systems (WEA, JB, JB, ITF, JG, JAI, JML, MEP), pp. 179–187.
CAVCAV-2002-AlurMY #model checking #performance
Exploiting Behavioral Hierarchy for Efficient Model Checking (RA, MM, ZY), pp. 338–342.
ISSTAISSTA-2002-LatellaM #consistency #diagrams #on the #statechart #testing #uml
On testing and conformance relations for UML statechart diagrams behaviours (DL, MM), pp. 144–153.
SATSAT-2002-SlaneyW #optimisation
Phase Transition Behavior: From Decision to Optimization (JS, TW), p. 4.
TPDLECDL-2001-MahouiC #library
Search Behavior in a Research-Oriented Digital Library (MM, SJC), pp. 13–24.
VLDBVLDB-2001-AnSVKIG #data access #energy
Analyzing energy behavior of spatial access methods for memory-resident data (NA, AS, NV, MTK, MJI, SG), pp. 411–420.
CSMRCSMR-2001-KollmannG #collaboration #diagrams #uml
Capturing Dynamic Program Behaviour with UML Collaboration Diagrams (RK, MG), pp. 58–67.
ICSMEICSM-2001-CookHM #concurrent
Measuring Behavioral Correspondence to a Timed Concurrent Model (JEC, CH, CM), pp. 332–341.
ICSMEICSM-2001-SchauerK #metric
The Method Replacement Indicator: A Metric for Analyzing Behavioral Substitution (RS, RKK), pp. 754–764.
IWPCIWPC-2001-StrouliaS #comprehension
Structure-Behavior-Function Program Understanding (ES, TS), p. 120.
ICALPICALP-2001-Madhusudan #branch #graph #reasoning #sequence
Reasoning about Sequential and Branching Behaviours of Message Sequence Graphs (PM), pp. 809–820.
FMFME-2001-HelkeS #analysis #consistency #eiffel #library
Mechanized Analysis of Behavioral Conformance in the Eiffel Base Libraries (SH, TS), pp. 20–42.
TLCATLCA-2001-Hofmann #bound #complexity #memory management #type system #using
From Bounded Arithmetic to Memory Management: Use of Type Theory to Capture Complexity Classes and Space Behaviour (MH0), pp. 2–3.
IFLIFL-2001-Minamide #runtime #type system
Runtime Behavior of Conversion Interpretation of Subtyping (YM), pp. 155–167.
GT-VMTGT-VMT-2001-HeckelK #constraints #modelling #visual notation
Behavioral Constraints for Visual Models (RH, JMK), pp. 257–265.
CHICHI-2001-CardPWMRSB #analysis #graph #protocol #usability #web
Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
ICMLICML-2001-ChajewskaKO #learning
Learning an Agent’s Utility Function by Observing Behavior (UC, DK, DO), pp. 35–42.
KDDKDD-2001-AdderleyM #case study #commit #data mining #mining #modelling
Data mining case study: modeling the behavior of offenders who commit serious sexual assaults (RA, PBM), pp. 215–220.
UMLUML-2001-EngelsHK #consistency #metamodelling #rule-based #specification #uml
Rule-Based Specification of Behavioral Consistency Based on the UML Meta-model (GE, RH, JMK), pp. 272–286.
UMLUML-2001-SendallS #concurrent #constraints #ocl #specification #uml #using
Specifying Concurrent System Behavior and Timing Constraints Using OCL and UML (SS, AS), pp. 391–405.
LOPSTRLOPSTR-2001-AlferesBLP #logic programming
Computing Environment-Aware Agent Behaviours with Logic Program Updates (JJA, AB, JAL, LMP), pp. 216–232.
PLDIPLDI-2001-ChatterjeePHL #analysis
Exact Analysis of the Cache Behavior of Nested Loops (SC, EP, PJH, ARL), pp. 286–297.
SASSAS-2001-RajamaniR #π-calculus
A Behavioral Module System for the π-Calculus (SKR, JR), pp. 375–394.
ASEASE-2001-LedangS #diagrams #modelling #uml
Modeling Class Operations in B: Application to UML Behavioral Diagrams (HL, JS), pp. 289–296.
ASEASE-2001-PavlovicS #composition #refinement #specification
Composition and Refinement of Behavioral Specifications (DP, DRS), pp. 157–165.
FSEESEC-FSE-2001-EngelsKHG #consistency #modelling #object-oriented #specification
A methodology for specifying and analyzing consistency of object-oriented behavioral models (GE, JMK, RH, LG), pp. 186–195.
FSEESEC-FSE-2001-FindlerLF #contract #type system
Behavioral contracts and behavioral subtyping (RBF, ML, MF), pp. 229–236.
ICSEICSE-2001-MakinenS #interactive #modelling #named #uml
MAS — An Interactive Synthesizer to Support Behavioral Modeling in UML (EM, TS), pp. 15–24.
ICSEICSE-2001-UchitelK #modelling
A Workbench for Synthesising Behaviour Models from Scenarios (SU, JK), pp. 188–197.
SACSAC-2001-Dozier #evolution #interactive #simulation
Evolving robot behavior via interactive evolutionary computation: from real-world to simulation (GVD), pp. 340–344.
SACSAC-2001-MunteanuR #image #modelling
Evolutionary image enhancement with user behaviour modeling (CM, ACR), pp. 316–320.
SACSAC-2001-XiangFY #approach #component #fuzzy #network #prototype
A fuzzy neural network approach to model component behavior for virtual prototyping of hydraulic system (WX, SCF, FFY), pp. 482–483.
DACDAC-2001-GanesanV #clustering #synthesis
Behavioral Partitioning in the Synthesis of Mixed Analog-Digital Systems (SG, RV), pp. 133–138.
DACDAC-2001-KohnoM #pipes and filters #verification
A New Verification Methodology for Complex Pipeline Behavior (KK, NM), pp. 816–821.
DATEDATE-2001-Al-ArsG #array #embedded #memory management
Static and dynamic behavior of memory cell array opens and shorts in embedded DRAMs (ZAA, AJvdG), pp. 496–503.
DATEDATE-2001-BekooijEWB #functional
Functional units with conditional input/output behavior in VLIW processors (MB, LJME, AvdW, NGB), p. 822.
DATEDATE-2001-EconomakosOPPP #synthesis
Behavioral synthesis with systemC (GE, PO, IP, IP, GKP), pp. 21–25.
DATEDATE-2001-FerrandiFSFF #functional #generative #modelling #testing
Functional test generation for behaviorally sequential models (FF, GF, DS, AF, FF), pp. 403–410.
DATEDATE-2001-HajjarCMAB #quality #statistics #using #verification
High quality behavioral verification using statistical stopping criteria (AH, TC, IM, AAA, MB), pp. 411–419.
HPDCHPDC-2001-SkicewiczDS #multi #query #using
Multi-Resolution Resource Behaviour Queries Using Wavelets (JAS, PAD, JMS), pp. 395–394.
PDPPDP-2001-CuencaGG #algebra #algorithm #linear #message passing #modelling
Modeling the Behaviour of Linear Algebra Algorithms with Message-Passing (JC, DG, JG), pp. 282–289.
PDPPDP-2001-SanchoRD #distributed #on the #using
On the Relative Behavior of Source and Distributed Routing in NOWs Using Up/Down Routing Schemes (JCS, AR, JD), pp. 11–18.
SOSPSOSP-2001-EnglerCC #approach #consistency #debugging #fault
Bugs as Inconsistent Behavior: A General Approach to Inferring Errors in Systems Code (DRE, DYC, AC), pp. 57–72.
ICSTSAT-2001-NuallainRB #predict #satisfiability
Ensemble-based prediction of SAT search behaviour (BÓN, MdR, JvB), pp. 278–289.
DL-2000-NevesF #case study #library
A study of user behavior in an immersive virtual environment for digital libraries (FADN, EAF), pp. 103–111.
WCREWCRE-2000-AntoniolCC #modelling #traceability
Traceability Recovery by Modeling Programmer Behavior (GA, GC, AC), pp. 240–247.
WCREWCRE-2000-Systa #comprehension #java #source code
Understanding the Behavior of Java Programs (TS), pp. 214–223.
ICALPICALP-2000-BravettiG #axiom #congruence #finite
A Complete Axiomatization for Observational Congruence of Prioritized Finite-State Behaviors (MB, RG), pp. 744–755.
IFMIFM-2000-MeyerS #approach #consistency #uml #using #verification
Behavioral Conformance Verification in an Integrated Approach Using UML and B (EM, TS), pp. 358–379.
IFLIFL-2000-Hammond #bound #concurrent
The Dynamic Properties of Hume: A Functionally-Based Concurrent Language with Bounded Time and Space Behaviour (KH), pp. 122–139.
CSCWCSCW-2000-JacksonAMM #video
Impact of video frame rate on communicative behaviour in two and four party groups (MJ, AHA, RM, JM), pp. 11–20.
CSCWCSCW-2000-PalenSY #mobile
Going wireless: behavior & practice of new mobile phone users (LP, MCS, EY), pp. 201–210.
CAiSECAiSE-2000-BehrensR #code generation #model transformation #named
StateLator — Behavioral Code Generation as an Instance of a Model Transformation (TB, SR), pp. 401–416.
ICMLICML-2000-AndersonDP #composition #network #student
Behavioral Cloning of Student Pilots with Modular Neural Networks (CWA, BAD, DAP), pp. 25–32.
ICMLICML-2000-MorimotoD #learning #using
Acquisition of Stand-up Behavior by a Real Robot using Hierarchical Reinforcement Learning (JM, KD), pp. 623–630.
ICMLICML-2000-TodorovskiDSWG #difference #equation
Discovering the Structure of Partial Differential Equations from Example Behaviour (LT, SD, AS, JPW, DG), pp. 991–998.
ICPRICPR-v1-2000-SherrahGHB #interactive #visual notation
Interpretation of Group Behavior in Visually Mediated Interaction (JS, SG, AJH, HB), pp. 1266–1269.
ICPRICPR-v3-2000-ValdesME #analysis #case study #image
Behavior Analysis of Fractal Features for Texture Description in Digital Images: An Experimental Study (JJV, LCM, SE), pp. 3917–3920.
ICPRICPR-v4-2000-IskeRMS #learning #navigation
A Bootstrapping Method for Autonomous and in Site Learning of Generic Navigation Behavior (BI, UR, KM, JS), pp. 4656–4659.
ICPRICPR-v4-2000-KojimaITF #generative #image #natural language #video
Generating Natural Language Description of Human Behavior from Video Images (AK, MI, TT, KF), pp. 4728–4731.
ICPRICPR-v4-2000-SanchezM00a #programming #using #visual notation
Robot-Arm Pick and Place Behavior Programming System Using Visual Perception (AJS, JMM), pp. 4507–4510.
KDDKDD-2000-PenaFL #data mining #detection #mining
Data mining to detect abnormal behavior in aerospace data (JMP, FF, SL), pp. 390–397.
SIGIRSIGIR-2000-EfthimiadisF #case study #database #image #query
The effect of query type on subject searching behavior of image databases: an exploratory study (ENE, RF), pp. 328–330.
UMLUML-2000-EngelsHHS #approach #diagrams #metamodelling #modelling #semantics #uml #visual notation
Dynamic Meta Modeling: A Graphical Approach to the Operational Semantics of Behavioral Diagrams in UML (GE, JHH, RH, SS), pp. 323–337.
UMLUML-2000-Pazzi #representation
Part-Whole Statecharts for the Explicit Representation of Compound Behaviors (LP), pp. 541–555.
UMLUML-2000-PetriuS #consistency #diagrams #process #representation #sequence chart
Consistent Behaviour Representation in Activity and Sequence Diagrams (DCP, YS), pp. 369–382.
ECOOPECOOP-2000-KellomakiM #design
Design Templates for Collective Behavior (PK, TM), pp. 277–295.
TOOLSTOOLS-EUROPE-2000-LakosL #inheritance #lifecycle
Behavior Inheritance for Object Lifecycles (CL, GL), p. 262–?.
TOOLSTOOLS-USA-2000-HarelK #inheritance #on the
On the Behavioral Inheritance of State-Based Objects (DH, OK), pp. 83–94.
TOOLSTOOLS-USA-2000-SoundarajanF #multi #type system
Behavioral Subtyping and Behavioral Enrichment of Multimethods (NS, SF), p. 105–?.
AdaEuropeAdaEurope-2000-DeshpandeCT #object-oriented #reliability #simulation
Improving the Reliability of Object-Oriented Software through Object-Level Behavioral Simulation (MD, FPC, JT), pp. 266–279.
REICRE-2000-KnottMP #analysis #modelling #object-oriented #process #using
Process Modeling for Object Oriented Analysis Using BORM Object Behavioral Analysis (RPK, VM, JP), pp. 7–16.
ICSEICSE-2000-MageePGK #animation #modelling #visual notation
Graphical animation of behavior models (JM, NP, DG, JK), pp. 499–508.
SACSAC-2000-PereiraC #adaptation #information retrieval #learning
The Influence of Learning in the Behaviour of Information Retrieval Adaptive Agents (FBP, EC), pp. 452–457.
SACSAC-2000-PiresBM #communication #database #object-oriented #specification
Mechanisms for Specifying Communication Behavior in Object Oriented Database (PFP, MRFB, MM), pp. 389–397.
SACSAC-2000-SrinivasaS #transaction
Discerning Behavioral Properties by Analyzing Transaction Logs (SS, MS), pp. 281–282.
ASPLOSASPLOS-2000-RedstoneEL #analysis #architecture #operating system #parallel #thread
An Analysis of Operating System Behavior on a Simultaneous Multithreaded Architecture (JR, SJE, HML), pp. 245–256.
DACDAC-2000-DoughertyT #design #physics #synthesis
Unifying behavioral synthesis and physical design (WED, DET), pp. 756–761.
DATEDATE-2000-SemeriaSM #c #memory management #pointer #synthesis
Resolution of Dynamic Memory Allocation and Pointers for the Behavioral Synthesis from C (LS, KS, GDM), pp. 312–319.
HPCAHPCA-2000-WongB #policy
Modified LRU Policies for Improving Second-Level Cache Behavior (WAW, JLB), pp. 49–60.
ESOPESOP-2000-HondaVY #data flow #process
Secure Information Flow as Typed Process Behaviour (KH, VTV, NY), pp. 180–199.
WRLAWRLA-2000-GoguenLR #induction
Behavioral and Coinductive Rewriting (JAG, KL, GR), pp. 2–23.
WICSAWICSA-1999-MageeKG #analysis #architecture
Behaviour Analysis of Software Architectures (JM, JK, DG), pp. 35–50.
ITiCSEITiCSE-1999-CabezaCR #education #memory management #named
CacheSim: a cache simulator for teaching memory hierarchy behaviour (MLCC, MIGC, MLR), p. 181.
ICSMEICSM-1999-LiuAQ #legacy #modelling #requirements
Requirements Recovery from Legacy Systems by Analyzing and Modelling Behavior (KL, AA, ZQ), pp. 3–12.
DLTDLT-1999-CaludeC #automaton #bisimulation #nondeterminism
Bisimulations and behaviour of nondeterministic automata (CC, EC), pp. 60–70.
FMFM-v2-1999-Jifeng #co-evolution #design
A Behavioral Model for Co-design (JH), pp. 1420–1438.
FMFM-v2-1999-MoriF #specification #verification
Verifying Behavioural Specifications in CafeOBJ Environment (AM, KF), pp. 1625–1643.
IFMIFM-1999-Fidge #modelling
Modelling Discrete Behaviour in a Continuous-Time Formalism (CJF), pp. 170–188.
IFMIFM-1999-PolHJ #composition #specification
Modular Formal Specification of Data and Behaviour (JvdP, JH, EDdJ), pp. 109–128.
CHICHI-1999-KunoINS #human-computer #interactive
Combining Observations of Intentional and Unintentional Behaviors for Human-Computer Interaction (YK, TI, SN, YS), pp. 238–245.
HCIHCI-CCAD-1999-KlobasM
A planned behavior in context model of networked information resource use (JEK, DM), pp. 823–827.
HCIHCI-CCAD-1999-MoriKSO
A computer-augmented office environment: integrating virtual and real world objects and behavior (HM, TK, ES, YO), pp. 1065–1069.
HCIHCI-CCAD-1999-TakanoSS #simulation
Intellectual simulation of operating team behavior in coping with anomalies occurring at commercial nuclear power plants (KT, WS, KS), pp. 1201–1205.
HCIHCI-CCAD-1999-TrousseJK #approach #recommendation #similarity #using
Using user behaviour similarity for recommendation computation: the broadway approach (BT, MJ, RK), pp. 85–89.
CIKMCIKM-1999-RadevPMP #approach #graph #multi #object-oriented #representation
Graph-Based Object-Oriented Approach for Structural and Behavioral Representation of Multimedia Data (IR, NP, KM, EKP), pp. 522–530.
ICMLICML-1999-GiordanaP #on the
On Some Misbehaviour of Back-Propagation with Non-Normalized RBFNs and a Solution (AG, RP), pp. 162–170.
ICMLICML-1999-IijimaYYK #adaptation #distributed #learning
Distributed Robotic Learning: Adaptive Behavior Acquisition for Distributed Autonomous Swimming Robot in Real World (DI, WY, HY, YK), pp. 191–199.
KDDKDD-1999-FawcettP #monitoring #process
Activity Monitoring: Noticing Interesting Changes in Behavior (TF, FJP), pp. 53–62.
UMLUML-1999-GieseGW #modelling #object-oriented
Closing the Gap Between Object-Oriented Modeling of Structure and Behavior (HG, JG, GW), pp. 534–549.
UMLUML-1999-SoundarajanF #modelling
Modeling Exceptional Behavior (NS, SF), pp. 691–705.
UMLUML-1999-Sourrouille #implementation #inheritance #object-oriented #uml
UML Behavior: Inheritance and Implementation in Current Object-Oriented Languages (JLS), pp. 457–472.
ECOOPECOOP-1999-DieckmannH #benchmark #case study #java #metric
A Study of the Allocation Behavior of the SPECjvm98 Java Benchmark (SD, UH), pp. 92–115.
TOOLSTOOLS-ASIA-1999-FanXZ #inheritance #reasoning
Reasoning about Inheritance and Cloning Behaviors of Software Agents (XF, DX, GZ), pp. 77–82.
TOOLSTOOLS-USA-1999-PlasilBV #bound #component #protocol
Bounding Component Behavior via Protocols (FP, MB, SV), pp. 387–398.
ASEASE-1999-CazzolaSST #architecture #rule-based
Rule-Based Strategic Reflection: Observing and Modifying Behavior at the Architectural Level (WC, AS, AS, FT), pp. 263–266.
ICSEICSE-1999-Magee #analysis #architecture #using
Behavioral Analysis of Software Architectures Using LTSA (JM), pp. 634–637.
SACSAC-1999-DasBHHZ #knowledge base
A Knowledge Based Model of Traffic Behavior in Freeways (SD, BAB, CRH, SJH, YZ), pp. 14–18.
SACSAC-1999-MocellinM #aspect-oriented #modelling #multi #using
Modelling Behavioral Aspects of Multimedia Presentations Using an Active Object DBMS (FM, HM), pp. 450–454.
DACDAC-1999-Bergamaschi #graph #logic #network #synthesis
Behavioral Network Graph: Unifying the Domains of High-Level and Logic Synthesis (RAB), pp. 213–218.
DACDAC-1999-DoboliNDGV #design #synthesis #using
Behavioral Synthesis of Analog Systems Using Two-layered Design Space Exploration (AD, ANA, NRD, SG, RV), pp. 951–957.
DACDAC-1999-ErcegovacKP #multi #optimisation #power management #precise #synthesis #using
Low-Power Behavioral Synthesis Optimization Using Multiple Precision Arithmetic (MDE, DK, MP), pp. 568–573.
DACDAC-1999-HongP #synthesis
Behavioral Synthesis Techniques for Intellectual Property Protection (IH, MP), pp. 849–854.
DACDAC-1999-KirovskiP #synthesis
Engineering Change: Methodology and Applications to Behavioral and System Synthesis (DK, MP), pp. 604–609.
DACDAC-1999-MoussaSSDPCGJ #design
Comparing RTL and Behavioral Design Methodologies in the Case of a 2M-Transistor ATM Shaper (IM, ZS, RS, MDN, MP, SC, LG, AAJ), pp. 598–603.
DACDAC-1999-SchaumontCVEB #hardware #reuse
Hardware Reuse at the Behavioral Level (PS, RC, SV, ME, IB), pp. 784–789.
DATEDATE-1999-DoboliV #architecture #compilation #generative #synthesis
A VHDL-AMS Compiler and Architecture Generator for Behavioral Synthesis of Analog Systems (AD, RV), pp. 338–345.
DATEDATE-1999-MakrisO #reachability #synthesis
Channel-Based Behavioral Test Synthesis for Improved Module Reachability (YM, AO), pp. 283–288.
DATEDATE-1999-Wakabayashi #case study #experience #synthesis
C-based Synthesis Experiences with a Behavior Synthesizer, “Cyber” (KW), p. 390–?.
LCTESLCTES-1999-SchneiderF #abstract interpretation #pipes and filters #predict
Pipeline Behavior Prediction for Superscalar Processors by Abstract Interpretation (JS, CF), pp. 35–44.
TPDLECDL-1998-KapidakisTS #architecture #library #monitoring
A Management Architecture for Measuring and Monitoring the Behavior of Digital Libraries (SK, ST, JS), pp. 95–114.
IWPCIWPC-1998-MayrhauserV #adaptation #comprehension #scalability
Program Understanding Behavior During Adaptation of Large Scale Software (AvM, AMV), pp. 164–172.
ICALPICALP-1998-KarhumakiLP #infinity #word
Locally Periodic Infinite Words and a Chaotic Behaviour (JK, AL, WP), pp. 421–430.
ECIRACIR-1998-ManglanoBR #evaluation #interface #modelling
Evaluation of Interfaces for IRS: Modelling End-User Searching Behaviour (VM, MB, SER).
ICPRICPR-1998-HosieVW #detection #visual notation
Classifying and detecting group behaviour from visual surveillance data (RH, SV, GAWW), pp. 602–604.
KRKR-1998-Sandewall #logic #modelling
Logic Based Modelling of Goal-Directed Behavior (ES), pp. 304–315.
TOOLSTOOLS-ASIA-1998-VieiraT #approach #object-oriented #testing
An Approach to Perform Behavior Testing in Object-Oriented Systems (MERV, GHT), pp. 318–327.
TOOLSTOOLS-USA-1998-Mellor98a #how #modelling #question
Modeling Complex Behavior Simply or How Much is Too Much? (SJM), p. 444.
TOOLSTOOLS-USA-1998-SoundarajanF #polymorphism #reasoning
Reasoning About Polymorphic Behavior (NS, SF), p. 346–?.
SACSAC-1998-BillardL #automaton #distributed #learning #simulation
Simulation of period-doubling behavior in distributed learning automata (EB, SL), pp. 690–695.
SACSAC-1998-HuangE #scheduling
Scheduling control mechanisms for managing indeterminate object behavior (EHH, TE), pp. 650–654.
ASPLOSASPLOS-1998-PeirLH #adaptation #memory management
Capturing Dynamic Memory Reference Behavior with Adaptive Cache Topology (JKP, YL, WWH), pp. 240–250.
ASPLOSASPLOS-1998-SeidlZ
Segregating Heap Objects by Reference Behavior and Lifetime (MLS, BGZ), pp. 12–23.
DACDAC-1998-GuerraPR #optimisation
A Methodology for Guided Behavioral-Level Optimization (LMG, MP, JMR), pp. 309–314.
DACDAC-1998-LakshminarayanaJ #control flow #framework #named #optimisation #throughput
FACT: A Framework for the Application of Throughput and Power Optimizing Transformations to Control-Flow Intensive Behavioral Descriptions (GL, NKJ), pp. 102–107.
DACDAC-1998-LakshminarayanaJ98a #power management #synthesis
Synthesis of Power-Optimized and Area-Optimized Circuits from Hierarchical Behavioral Descriptions (GL, NKJ), pp. 439–444.
DACDAC-1998-LakshminarayanaRJ #control flow #execution #scheduling
Incorporating Speculative Execution into Scheduling of Control-Flow Intensive Behavioral Descriptions (GL, AR, NKJ), pp. 108–113.
DACDAC-1998-ParulkarGB
Introducing Redundant Computations in a Behavior for Reducing BIST Resources (IP, SKG, MAB), pp. 548–553.
DATEDATE-1998-BoglioloBM #modelling
Characterization-Free Behavioral Power Modeling (AB, LB, GDM), pp. 767–773.
DATEDATE-1998-FerrandiFMP #estimation
Power Estimation of Behavioral Descriptions (FF, FF, EM, MP), pp. 762–766.
DATEDATE-1998-JemaiKJ #architecture #simulation #synthesis
Architectural Simulation in the Context of Behavioral Synthesis (AJ, PK, AAJ), pp. 590–595.
DATEDATE-1998-LiG #algorithm
An Algorithm To Determine Mutually Exclusive Operations In Behavioral Descriptions (JL, RKG), pp. 457–463.
DATEDATE-1998-Nicoli #semantics #set
Denotational Semantics of a Behavioral Subset of VHDL (FN), pp. 975–976.
DATEDATE-1998-RosenbergerH #approach #functional #modelling #simulation
A Systems Theoretic Approach to Behavioural Modeling and Simulation of Analog Functional Blocks (RR, SAH), pp. 721–728.
DATEDATE-1998-YiCPHK #multi #synthesis
Multiple Behavior Module Synthesis Based on Selective Groupings (JHY, HC, ICP, SHH, CMK), pp. 384–388.
LCTESLCTES-1998-FerdinandW #on the #predict #realtime
On Predicting Data Cache Behavior for Real-Time Systems (CF, RW), pp. 16–30.
FASEFASE-1998-NielsonAN #analysis #case study #safety
Behaviour Analysis and Safety Conditions: A Case Study in CML (HRN, TA, FN), pp. 255–269.
WRLAWRLA-1998-MatsumotoF #automation #induction #testing #towards #verification
Test set coinduction — Toward automated verification of behavioural properties (MM, KF), pp. 242–262.
LICSLICS-1998-Alfaro #how #probability #verification
How to Specify and Verify the Long-Run Average Behavior of Probabilistic Systems (LdA), pp. 454–465.
ICDARICDAR-1997-NagasakiYN #recognition
The Behavior of Dynamic Relaxation in an Elastic Stroke Model for Character Recognition (TN, TY, MN), pp. 16–22.
CIAAWIA-1997-BrzozowskiN #automaton
Automata of Asynchronous Behaviors (JAB, RN), pp. 29–45.
HCIHCI-CC-1997-Dabija #communication
Communicating about Reactive Behaviors (VGD), pp. 31–34.
HCIHCI-CC-1997-ItohMGA #process
Analyzing Qualitative Data with SPROT (Structural Process Chart of a Task Oriented Behavior) (MI, YM, SG, TA), pp. 541–544.
CAiSECAiSE-1997-CathalaP #how #why
Preserving Behaviour: Why and How (FC, PP), pp. 333–346.
CAiSECAiSE-1997-TryfonaPH #experience #modelling
Modeling Behavior of Geographic Objects: An Experience with the Object Modeling Technique (NT, DP, TH), pp. 347–359.
CAiSECAiSE-1997-VermeerA #database #specification
Behaviour Specification in Database Interoperation (MWWV, PMGA), pp. 61–74.
KDDKDD-1997-DeCoste #mining #multi
Mining Multivariate Time-Series Sensor Data to Discover Behavior Envelopes (DD), pp. 151–154.
TOOLSTOOLS-USA-1997-MagnanVO #specification
From Specification to Management of Composite Object Behavior (MM, SV, MCO), p. 132–?.
TOOLSTOOLS-USA-1997-SoundarajanF
Inheriting and Modifying Behavior (NS, SF), pp. 148–162.
POPLPOPL-1997-PierceS #equivalence #polymorphism #π-calculus
Behavioral Equivalence in the Polymorphic π-calculus (BCP, DS), pp. 242–255.
DACDAC-1997-AgrawalG #clustering #data flow #embedded
Data-Flow Assisted Behavioral Partitioning for Embedded Systems (SA, RKG), pp. 709–712.
DACDAC-1997-PotkonjakKK #case study #design
Methodology for Behavioral Synthesis-Based Algorithm-Level Design Space Exploration: DCT Case Study (MP, KK, RK), pp. 252–257.
DACDAC-1997-SambandamH #architecture #design #embedded #predict #realtime
Predicting Timing Behavior in Architectural Design Exploration of Real-Time Embedded Systems (RSS, XH), pp. 157–160.
DATEEDTC-1997-BoglioloBM #adaptation #modelling
Adaptive least mean square behavioral power modeling (AB, LB, GDM), pp. 404–410.
DATEEDTC-1997-FlottesPR #testing
Analyzing testability from behavioral to RT level (MLF, RP, BR), pp. 158–165.
DATEEDTC-1997-NouraniP #analysis #using
Structural BIST insertion using behavioral test analysis (MN, CAP), pp. 64–68.
DATEEDTC-1997-ShojiHSKN #simulation
Acceleration of behavioral simulation on simulation specific machines (MS, FH, SS, SK, HN), pp. 373–377.
TAPSOFTTAPSOFT-1997-Jacobs #algebra #correctness #induction #proving #specification
Behaviour-Refinement of Coalgebraic Specifications with Coinductive Correctness Proofs (BJ0), pp. 787–802.
WPCWPC-1996-LuciaFM #comprehension #slicing
Understanding Function Behaviors through Program Slicing (ADL, ARF, MM), pp. 9–10.
CHICHI-1996-DarkenS #scalability
Wayfinding Strategies and Behaviors in Large Virtual Worlds (RPD, JLS), pp. 142–149.
CHICHI-1996-Ishizaki #design #multi #visualisation
Multiagent Model of Dynamic Design: Visualization as an Emergent Behavior of Active Design Agents (SI), pp. 347–354.
CHICHI-1996-KoenemannB #case study #effectiveness #information retrieval #interactive
A Case for Interaction: A Study of Interactive Information Retrieval Behavior and Effectiveness (JK, NJB), pp. 205–212.
CSCWCSCW-1996-FinholtOO #evaluation
Behavioral Evaluation of CSCW Technologies (TAF, GMO, JSO), p. 5.
ICPRICPR-1996-ChenJ #network #on the
On the small sample behavior of the class-sensitive neural network (CHC, AJ), pp. 209–213.
ICPRICPR-1996-WeberVS #mobile
Insect inspired behaviours for the autonomous control of mobile robots (KW, SV, MVS), pp. 156–160.
SEKESEKE-1996-GillerHT #visual notation
Scriptless Behaviour Definition of Visual Objects (VG, GH, MT), pp. 499–505.
ECOOPECOOP-1996-KristensenM #abstraction #named #process
Activities: Abstractions for Collective Behavior (BBK, DCMM), pp. 472–501.
SASSAS-1996-AltFMW #abstract interpretation #predict
Cache Behavior Prediction by Abstract Interpretation (MA, CF, FM, RW), pp. 52–66.
FSEFSE-1996-SeiterPL #evolution #using
Evolution of Object Behavior Using Context Relations (LMS, JP, KJL), pp. 46–57.
ICSEICSE-1996-DharaL #inheritance #specification #type system
Forcing Behavioral Subtyping through Specification Inheritance (KKD, GTL), pp. 258–267.
ASEKBSE-1996-HoweP #modelling
Constructing Transition Models of AI Planner Behavior (AEH, LDP), p. 8.
SACSAC-1996-ChungLLD #comparison #using
A comparison of variational data assimilation and nudging using a simple dynamical system with chaotic behavior (WC, JML, SL, SKD), pp. 454–462.
DACDAC-1996-BorchersHB #equation #generative
Equation-Based Behavioral Model Generation for Nonlinear Analog Circuits (CB, LH, EB), pp. 236–239.
DACDAC-1996-Camposano #synthesis
Behavioral Synthesis (RC), pp. 33–34.
HPDCHPDC-1996-AlmerothA #modelling #multi
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone (KCA, MHA), pp. 209–216.
PDPPDP-1996-LeungC #concurrent #equation #inheritance #object-oriented #programming language
Behaviour Equation as Solution of Inheritance Anomaly in Concurrent Object-Oriented Programming Languages (BCLL, PPKC), pp. 360–366.
PDPPDP-1996-ValmariKS #design #visualisation
Visualisation of Reduced Abstracted Behaviour as a Design Tool (AV, KK, MS), pp. 187–195.
TAPSOFTTAPSOFT-J-1995-HofmannS96 #abstraction #higher-order #logic #on the
On Behavioural Abstraction and Behavioural Satisfaction in Higher-Order Logic (MH, DS), pp. 3–45.
WRLARWLW-1996-Diaconescu #logic #specification
Foundations of behavioural specification in rewriting logic (RD), pp. 226–245.
CAVCAV-1996-CapellmannDFGNO #abstraction #case study #detection #interactive #network #verification
Verification by Behaviour Abstraction — A Case Study of Service Interaction Detection in Intelligent Telephone Networks (CC, RD, FFV, RGE, UN, PO), pp. 466–469.
CHICHI-1995-LiebermanF #programming
Bridging the Gulf Between Code and Behavior in Programming (HL, CF), pp. 480–486.
CAiSECAiSE-1995-OliveS #concept #modelling
A Method for Explaining the Behaviour of Conceptual Models (AO, MRS), pp. 12–25.
SEKESEKE-1995-JainSK #reuse #towards #usability
Towards Reusability Based Upon Similar Computational Behavior (AJ, LS, MK), pp. 197–203.
SACSAC-1995-BanachP #graph grammar #linear #source code
Linear behaviour of term graph rewriting programs (RB, GAP), pp. 157–163.
SACSAC-1995-GyseghemC #fuzzy
Fuzzy behaviour and relationships in a fuzzy OODB-model (NVG, RMMDC), pp. 503–507.
DACDAC-1995-KnappLMM #specification #synthesis #validation
Behavioral Synthesis Methodology for HDL-Based Specification and Validation (DK, TL, DM, RM), pp. 286–291.
DACDAC-1995-LyKMM #scheduling #using
Scheduling Using Behavioral Templates (TL, DK, RM, DM), pp. 101–106.
DACDAC-1995-MartinK #named #optimisation #power management
Power-Profiler: Optimizing ASICs Power Consumption at the Behavioral Level (RSM, JPK), pp. 42–47.
DACDAC-1995-SilburtPBNDW #concurrent #design #hardware #modelling #simulation
Accelerating Concurrent Hardware Design with Behavioural Modelling and System Simulation (AS, IP, JB, SN, MD, GW), pp. 528–533.
DACDAC-1995-StollonP #complexity #metric #modelling
Measures of Syntactic Complexity for Modeling Behavioral VHDL (NSS, JDP), pp. 684–689.
ESOPESOP-J-1994-BidoitHW95 #specification
Behavioural and Abstractor Specifications (MB, RH, MW), pp. 149–186.
TAPSOFTTAPSOFT-1995-HofmannS #abstraction #higher-order #logic #on the
On Behavioral Abstraction and Behavioural Satisfaction in Higher-Order Logic (MH0, DS), pp. 247–261.
CAVCAV-1995-AndersenV #fixpoint #performance #using
Efficient Checking of Behavioural Relations and Modal Assertions using Fixed-Point Inversion (HRA, BV), pp. 142–154.
ICLPICLP-1995-DekhtyarD #database #deduction
Dynamic Deductive Data Bases With Steady Behaviour (MID, AJD), pp. 183–197.
ICLPILPS-1995-JamilL #declarative #inheritance #semantics
A Declarative Semantics for Behavioral Inheritance and Conflict Resolution (HMJ, LVSL), pp. 130–144.
LICSLICS-1995-Wang #analysis #realtime
Timing Behavior Analysis for Real-Time Systems (FW), pp. 112–122.
ICSMEICSM-1994-BelkhatirM #evolution #process
Evolving Software Processes by Tailoring the Behavior of Software Objects (NB, WLM), pp. 212–221.
FMFME-1994-PaechR #automaton #concept #modelling #refinement
A new Concept of Refinement used for Behaviour Modelling with Automata (BP, BR), pp. 154–174.
FMFME-1994-RossL #modelling #precise #process
A Precise Examination of the Behaviour of Process Models (KJR, PAL), pp. 251–270.
LISPLFP-1994-StefanovicM #ml #standard
Characterization of Object Behaviour in Standard ML of New Jersey (DS, JEBM), pp. 43–54.
CHICHI-1994-ChaseSHH94a #development #evaluation #representation
Development and evaluation of a taxonomical model of behavioral representation techniques (JDC, RSS, HRH, DH), pp. 159–165.
CAiSECAiSE-1994-Keszenheimer #abstraction #evolution #maintenance
Utilizing Behavioral Abstractions to Facilitate Maintenance During Class Evolution (LMK), pp. 325–338.
CAiSECAiSE-1994-ThiemeS #approach
An Approach to Schema Integratioin Based on Transformations and Behaviour (CT, AS), pp. 297–310.
CIKMCIKM-1994-Al-AnziS #concurrent #modelling #towards
Modeling Behavior, A Step Towards Defining Functionally Correct Views of Complex Objects in Concurrent Engineering (FSAA, DLS), pp. 1–9.
ICMLICML-1994-Valdes-PerezP #heuristic
A Powerful Heuristic for the Discovery of Complex Patterned Behaviour (REVP, AP), pp. 326–334.
SEKESEKE-1994-AtchanE #empirical #functional #modelling #requirements #specification
An experiment in eliminating the separation between data, functional, and behavioral models during requirements specification (HMA, GCE), pp. 2–9.
SEKESEKE-1994-SuzukiT #abstraction #retrieval #using
Associative program retrieval using partially-ordered behavioral abstractions of a program (HS, NT), pp. 395–404.
SIGIRSIGIR-1994-MoritaS #analysis #information management #retrieval
Information Filtering Based on User Behaviour Analysis and Best Match Text Retrieval (MM, YS), pp. 272–281.
TOOLSTOOLS-EUROPE-1994-RuperezJA #object-oriented #rule-based #simulation #using
Embedding of Rule-based Expert System Capabilities in Object-Oriented Applications by Using or Simulating Active Behaviour (RFR, CJ, JRZA), pp. 315–327.
PPDPALP-1994-BidoitH #first-order #logic #proving #standard #theorem
Proving Behavioural Theorems with Standard First-Order Logic (MB, RH), pp. 41–58.
LOPSTRLOPSTR-1994-GilbertHZ #source code #specification
Transforming Specifications of Observable Behaviour into Programs (DRG, CJH, JZ), pp. 88–103.
SASSAS-1994-MuellerW #analysis #on the fly #performance #simulation
Efficient On-the-fly Analysis of Program Behavior and Static Cache Simulation (FM, DBW), pp. 101–115.
ICSEICSE-1994-CheungK #analysis #distributed #effectiveness
An Integrated Method for Effective Behaviour Analysis of Distributed Systems (SCC, JK), pp. 309–320.
SACSAC-1994-HoskinsHH #interactive #multi
An interactive multimedia system for fire behavior training (JAH, WDH, KGH), pp. 379–382.
DACDAC-1994-ArnsteinT #abstraction #synthesis #tool support
The Attributed-Behavior Abstraction and Synthesis Tools (LFA, DET), pp. 557–561.
DATEEDAC-1994-BalboniCFS #architecture #array
From Behavioral Description to Systolic Array Based Architectures (AB, CC, FF, DS), p. 657.
DATEEDAC-1994-BhatiaJ #named #overview #synthesis #testing
Genesis: A Behavioral Synthesis System for Hierarchical Testability (SB, NKJ), pp. 272–276.
DATEEDAC-1994-HolmesG #algorithm #generative
An Algorithm for Generation of Behavioral Shape Functions (NDH, DG), pp. 314–318.
DATEEDAC-1994-HuangR #performance #throughput #using
Maximizing the Throughput of High Performance DSP Applications Using Behavioral Transformations (SHH, JMR), pp. 25–30.
DATEEDAC-1994-MoserNAAP #approach #modelling #visual notation
A Graphical Approach to Analogue Behavioural Modelling (VM, PN, HPA, LA, FP), pp. 535–539.
DATEEDAC-1994-WuTWL #synthesis
A Synthesis Method for Mixed Synchronous / Asynchronous Behavior (TYW, TCT, ACHW, YLL), pp. 277–281.
PDPPDP-1994-KondratyevTVKP #diagrams #parallel
Change Diagram : A behavioural model for very speed VLSI circuit/highly parallel systems (AK, AT, VV, MK, EEP), pp. 220–226.
ESOPESOP-1994-BerthomieuS #framework #ml #programming #semantics #syntax
Programming with Behaviors in an ML Framework — The Syntax and Semantics of LCS (BB, TLS), pp. 89–104.
ESOPESOP-1994-BidoitHW #semantics
Characterizing Behavioural Semantics and Abstractor Semantics (MB, RH, MW), pp. 105–119.
ICLPILPS-1994-DekhtyarD #database #deduction #on the
On Stable Behaviour of Dynamic Deductive Data Bases (MID, AJD), p. 677.
ICSMECSM-1993-Keszenheimer #adaptation #evolution #specification
Specifying and Adapting Object Behavior During System Evolution (LMK), pp. 254–261.
HCIHCI-ACS-1993-HoonhoutZ #industrial #process
Operator Behavior and Supervisory Control Systems in the Chemical Process Industry (HCMH, HJGZ), pp. 109–114.
HCIHCI-SHI-1993-ChaseHHSB #design #representation #user interface
A Model of Behavioral Techniques for Representing User Interface Designs (JDC, HRH, DH, RSS, JLB), pp. 861–866.
HCIHCI-SHI-1993-Edmondson #human-computer #interactive #taxonomy
A Taxonomy for Human Behaviour and Human-Computer Interaction (WHE), pp. 885–890.
CHIINTERCHI-1993-DiGianoBO #monitoring #named #programming
LogoMedia: a sound-enhanced programming environment for monitoring program behavior (CD, RMB, RNO), pp. 301–302.
CIKMCIKM-1993-PetersLOS #query
An Extensible Query Model and Its Languages for a Uniform Behavioral Object Management System (RJP, AL, MTÖ, DS), pp. 403–412.
SEKESEKE-1993-DingK #specification #state machine
Attributed State Machines For Behavior Specification of Reactive Systems (SD, TK), pp. 695–702.
ECOOPECOOP-1993-GangopadhyayM #named #specification
ObjChart: Tangible Specification of Reactive Object Behavior (DG, SM), pp. 432–457.
OOPSLAOOPSLA-1993-PauwHKV #object-oriented #visualisation
Visualizing the Behavior of Object-Oriented Systems (WDP, RH, DK, JMV), pp. 326–337.
ICSEICSE-1993-Hall #retrieval
Generalized Behavior-Based Retrieval (RJH), pp. 371–380.
ICSEICSE-1993-WangP #simulation
Simulating the Behaviour of Software Modules by Trace Rewriting (YW, DLP), pp. 14–23.
DACDAC-1993-LeeJW #synthesis
Behavioral Synthesis of Highly Testable Data Paths under the Non-Scan and Partial Scan Environments (TCL, NKJ, WW), pp. 292–297.
DACDAC-1993-LiuCS #simulation #using #verification
Analog System Verification in the Presence of Parasitics Using Behavioral Simulation (EWYL, HCC, ALSV), pp. 159–163.
DACDAC-1993-SantucciCG #heuristic #using
Speed up of Behavioral A.T.P.G. using a Heuristic Criterion (JFS, ALC, NG), pp. 92–96.
PDPPDP-1993-AugustonF #debugging #parallel #specification
PARFORMAN-an assertion language for specifying behaviour when debugging parallel applications (MA, PF), pp. 150–157.
CAVCAV-1993-ProbstL #automaton #verification
Verifying Timed Behavior Automata with Input/Output Critical Races (DKP, HFL), pp. 424–437.
HTHT-ECHT-1992-BuchananZ #documentation #hypermedia #specification
Specifying Temporal Behavior in Hypermedia Documents (MCB, PZ), pp. 262–271.
SIGMODSIGMOD-1992-AikenWH #confluence #database #termination
Behavior of Database Production Rules: Termination, Confluence, and Observable Determinism (AA, JW, JMH), pp. 59–68.
VLDBVLDB-1992-LiuM #approach #communication #database #declarative #object-oriented #process
Activity Model: A Declarative Approach for Capturing Communication Behavior in Object-Oriented Databases (LL, RM), pp. 481–493.
ICALPICALP-1992-MollerT #abstraction
Behavioural Abstraction in TCCS (FM, CMNT), pp. 559–570.
CIKMCIKM-1992-MartinAD #approach #consistency #database #object-oriented
Consistency Checking in Object Oriented Databases: a Behavioral Approach (HM, MEA, BD), pp. 53–68.
ECOOPECOOP-1992-HartmannJS
Aggregation in a Behaviour Oriented Object Model (TH, RJ, GS), pp. 57–77.
TOOLSTOOLS-EUROPE-1992-Rubin #analysis
Object Behavior Analysis (KSR), p. 407.
AdaTRI-Ada-C-1992-Cherry #ada
Stimulus Response Machines: An Ada-based Graphic Formalism for Describing Class and Object Behavior (GWC), pp. 321–332.
AdaTRI-Ada-C-1992-Crespi-ReghizziMP #ada #concept #experience #implementation #inheritance
Behavioral Inheritance: Concepts, Ada Implementation and Experience (SCR, MDM, SP), pp. 200–210.
ICSEICSE-1992-PodgurskiP #automation #component #retrieval #reuse
Behavior Sampling: A Technique for Automated Retrieval of Reusable Components (AP, LP), pp. 349–360.
DACDAC-1992-BergamaschiLK #optimisation #synthesis #using
Control Optimization in High-Level Synthesis Using Behavioral Don’t Cares (RAB, DAL, AK), pp. 657–661.
DACDAC-1992-SantucciDGB #generative
A Methodology to Reduce the Computational Cost of Behavioral Test Pattern Generation (JFS, GD, NG, MB), pp. 267–272.
DACDAC-1992-WolfTHMW #synthesis
The Princeton University Behavioral Synthesis System (WW, AT, CYH, RM, EW), pp. 182–187.
CAVCAV-1992-CelikkanC #generative
Generating Diagnostic Information for Behavioral Preorders (UC, RC), pp. 370–383.
CAVCAV-1992-ProbstL #automaton #constraints #verification
Verifying Timed Behavior Automata with Nonbinary Delay Constraints (DKP, HFL), pp. 123–136.
ICTSSIWPTS-1992-WittemanWB #nondeterminism
Non-Deterministic and Default Behaviour (MFW, RCvW, SRB), pp. 275–288.
ICALPICALP-1991-CleavelandS
Computing Behavioural Relations, Logically (RC, BS), pp. 127–138.
FMVDME-1991-Butler #csp
Behavioural Extension for CSP (MJB), pp. 254–267.
ICMLML-1991-Ring #development #incremental
Incremental Development of Complex Behaviors (MBR), pp. 343–347.
LOPSTRLOPSTR-1991-LecoutreDL #abstract interpretation #logic programming #recursion #source code
Abstract Interpretation and Recursive Behaviour of Logic Programs (CL, PD, PL), pp. 147–166.
PLDIPLDI-1991-Wall #predict #using
Predicting Program Behavior Using Real or Estimated Profiles (DWW), pp. 59–70.
PLDIBest-of-PLDI-1991-Wall91a #predict #using
Predicting program behavior using real or estimated profiles (with retrospective) (DWW), pp. 429–441.
DACDAC-1991-AmonB #named
OEsim: A Simulator for Timing Behavior (TA, GB), pp. 656–661.
CAVCAV-1991-FernandezM #on the fly #verification
“On the Fly” Verification of Behavioural Equivalences and Preorders (JCF, LM), pp. 181–191.
CAVCAV-1991-Mutz #correctness #proving #term rewriting #using
Using the HOL Prove Assistant for proving the Correctness of term Rewriting Rules reducing Terms of Sequential Behavior (MM), pp. 277–287.
CAVCAV-1991-NicolaFGR #concurrent #framework #logic #verification
An Action Based Framework for Verifying Logical and Behavioural Properties of Concurrent Systems (RDN, AF, SG, GR), pp. 37–47.
CSLCSL-1991-HeuschS #aspect-oriented #probability
Some Aspects of the Probabilistic Behavior of Variants of Resolution (PH, ES), pp. 164–172.
SIGMODSIGMOD-1990-ChrysanthisR #framework #named #reasoning #specification #transaction
ACTA: A Framework for Specifying and Reasoning about Transaction Structure and Behavior (PKC, KR), pp. 194–203.
ICALPICALP-1990-Parrow #network
Structural and Behavioural Equivalences of Networks (JP), pp. 540–552.
OOPSLAOOPSLA-ECOOP-1990-HelmHG #composition #contract #named #object-oriented #specification
Contracts: Specifying Behavioural Compositions in Object-Oriented Systems (RH, IMH, DG), pp. 169–180.
ICSEICSE-1990-Robinson #requirements #specification
Negotiation Behavior During Requirements Specification (WNR), pp. 268–276.
DACDAC-1990-ChenG #component #database #synthesis
An Intelligent Component Database for Behavioral Synthesis (GDC, DG), pp. 150–155.
DACDAC-1990-DuttHG #representation #synthesis
An Intermediate Representation for Behavioral Synthesis (NDD, TH, DG), pp. 14–19.
DACDAC-1990-IshiuraYY #design #hardware #named #semantics
NES: The Behavioral Model for the Formal Semantics of a Hardware Design Language UDL/I (NI, HY, SY), pp. 8–13.
DACDAC-1990-ScheichenzuberGLM #data flow #hardware #synthesis
Global Hardware Synthesis from Behavioral Dataflow Descriptions (JS, WG, UL, SM), pp. 456–461.
DACDAC-1990-WardA #fault #simulation
Behavioral Fault Simulation in VHDL (PCW, JRA), pp. 587–593.
DACDAC-1990-Wolf #automaton #network #synthesis
The FSM Network Model for Behavioral Synthesis of Control-Dominated Machines (WW), pp. 692–697.
PODSPODS-1989-KedemT #database #modelling #relational
Relational Database Behavior: Utilizing Relational Discrete Event Systems and Models (ZMK, AT), pp. 336–346.
FPCAFPCA-1989-Burton #parallel #semantics #source code
Indeterminate Behavior with Determinate Semantics in Parallel Programs (FWB), pp. 340–346.
CHICHI-1989-DeSoiLS #abstraction #specification #user interface #visual notation
Graphical specification of user interfaces with behavior abstraction (JFD, WML, SVS), pp. 139–144.
CHICHI-1989-EganRLLG #analysis #evaluation #hypermedia
Behavioral evaluation and analysis of a hypertext browser (DEE, JRR, TKL, CCL, LMG), pp. 205–210.
CHICHI-1989-Myers #encapsulation #interactive
Encapsulating interactive behaviors (BAM), pp. 319–324.
ICMLML-1989-LeviSP #identification #knowledge base
Identifying Knowledge Base Deficiencies by Observing User Behavior (KRL, VLS, DLP), pp. 296–301.
ICMLML-1989-Paredis #learning
Learning the Behavior of Dynamical Systems form Examples (JP), pp. 137–140.
ICSEICSE-1989-Curtis #development #modelling #problem #process
Three Problems Overcome with Behavioral Models of the Software Development Process (BC), pp. 398–399.
DACDAC-1989-BlaauwSMAR #automation #generative #modelling
Automatic Generation of Behavioral Models from Switch-Level Descriptions (DB, DGS, RBMT, JAA, JTR), pp. 179–184.
DACDAC-1989-BolsensRCM #analysis #debugging #logic
Electrical Debugging of Synchronous MOS VLSI Circuits Exploiting Analysis of the Intended Logic Behaviour (IB, WDR, LJMC, HDM), pp. 513–518.
DACDAC-1989-DuttG #design #synthesis
Designer Controlled Behavioral Synthesis (NDD, DG), pp. 754–757.
DACDAC-1989-HayatiP #automation #specification
Automatic Production of Controller Specifications from Control and Timing Behavioral Descriptions (SH, AP), pp. 75–80.
DACDAC-1989-IshiuraTY #logic #simulation #verification
Time-Symbolic Simulation for Accurate Timing Verification of Asynchronous Behavior of Logic Circuits (NI, MT, SY), pp. 497–502.
DACDAC-1989-KumarKKG #automation #synthesis
Automatic Synthesis of Microprogrammed Control Units from Behavioral Descriptions (AK, SK, PK, SG), pp. 147–154.
DACDAC-1989-Leung #modelling
Behavioral Modeling of Transmission Gates in VHDL (SSL), pp. 746–749.
DACDAC-1989-TrickD #layout #named #synthesis #tool support
LASSIE: Structure to Layout for Behavioral Synthesis Tools (MTT, SWD), pp. 104–109.
DACDAC-1989-YuZYL #algorithm #convergence #novel
A Novel Algorithm for Improving Convergence Behavior of Circuit Simulators (ZY, WZ, ZY, YEL), pp. 626–629.
TAPSOFTCCIPL-1989-ClementI #specification #using #visual notation
Specifying the Behavior of Graphical Objects Using Esterel (DC, JI), pp. 111–125.
ICLPNACLP-1989-GaifmanMS #concurrent #constraints #logic programming #semantics #source code
Reactive Behaviour Semantics for Concurrent Constraint Logic Programs (HG, MJM, EYS), pp. 553–569.
ICALPICALP-1988-Thiagarajan #aspect-oriented
Some Behavioural Aspects of Net Theory (PST), pp. 630–653.
SIGIRSIGIR-1988-KokB #retrieval
Retrieval Based on User Behaviour (AJK, AMB), pp. 343–357.
ICSEICSE-1988-Williams #approach #modelling #process
Software Process Modeling: A Behavioral Approach (LGW), pp. 174–186.
DACDAC-1988-BlackburnTK #design
CORAL II: Linking Behavior and Structure in an IC Design System (RLB, DET, PMK), pp. 529–535.
DACDAC-1988-MadreB #comparison #correctness #proving #using
Proving Circuit Correctness Using Formal Comparison Between Expected and Extracted Behaviour (JCM, JPB), pp. 205–210.
DACDAC-1988-TsengWRTB #named #synthesis
Bridge: A Versatile Behavioral Synthesis System (CJT, RSW, SGR, MMT, AKB), pp. 415–420.
DACDAC-1988-WeiRJ #named #synthesis
BECOME: Behavior Level Circuit Synthesis Based on Structure Mapping (RSW, SGR, JYJ), pp. 409–414.
PPoPPPPEALS-1988-DavisH #parallel #source code
Characterizing the Synchronization Behavior of Parallel Programs (HD, JLH), pp. 198–211.
VLDBVLDB-1987-LingatNR #database
Behaviour Management in Database Applications (JYL, PN, CR), pp. 185–196.
FPCAFPCA-1987-DarlingtonW #functional
Controlling the behaviour of functional language systems (JD, RLW), pp. 278–300.
HCIHCI-CE-1987-Meister #evaluation
Behavioral Test and Evaluation of Expert Systems (DM), pp. 539–549.
ECOOPECOOP-1987-MaruichiUT #simulation
Behavioral Simulation Based on Knowledge Objects (TM, TU, MT), pp. 213–222.
DACDAC-1987-WuHHYY
Function Search from Behavioral Description of a Digital System (JGW, WPCH, YHH, DYYY, HJY), pp. 574–579.
TAPSOFTCAAP-1987-DarondeauG #communication #infinity
A Fullt Observational Model for Infinite Behaviours of Communicating Systems (PD, BG), pp. 153–168.
LICSLICS-1987-Howe
The Computational Behaviour of Girard’s Paradox (DJH), pp. 205–214.
ICLPSLP-1987-DiszL87 #logic programming #parallel #source code #visual notation
A Graphical Tool for Observing the Behavior of Parallel Logic Programs (TD, ELL), pp. 46–53.
SIGMODSIGMOD-1986-Lipeck #database #specification
Stepwise Specification of Dynamic Database Behaviour (UWL), pp. 387–397.
OOPSLAOOPSLA-1986-Lieberman #object-oriented #prototype #using
Using Prototypical Objects to Implement Shared Behavior in Object Oriented Systems (HL), pp. 214–223.
DACDAC-1986-McFarland #bottom-up #design #hardware #synthesis #using
Using bottom-up design techniques in the synthesis of digital hardware from abstract behavioral descriptions (MCM), pp. 474–480.
ICALPICALP-1985-LubyR #algorithm #bidirectional
A Bidirectional Shortest-Path Algorithm With Good Average-Case Behavior (ML, PR), pp. 394–403.
DACDAC-1985-AlthoffS #compilation #modelling
A behavioral modeling system for cell compilers (JCA, RDS), pp. 468–474.
DACDAC-1985-BlackburnT #representation #synthesis
Linking the behavioral and structural dominis of representation in a synthesis system (RLB, DET), pp. 374–380.
STOCSTOC-1985-BollobasS #algorithm #on the #set
On the Expected Behaviour of Disjoint Set Union Algorithms (BB, IS), pp. 224–231.
ICALPICALP-1984-Girault-Beauquier #automaton #finite #infinity
Some Results About Finite and Infinite Behaviours of a Pushdown Automaton (DB), pp. 187–195.
SIGIRSIGIR-1984-KraftB #information retrieval #roadmap
Advances in a Bayesian Decision Model of User Stopping Behaviour for Scanning the Output of an Information Retrieval System (DHK, DAB), pp. 421–433.
STOCSTOC-1984-BentleyJLMM
Some Unexpected Expected Behavior Results for Bin Packing (JLB, DSJ, FTL, CCM, LAM), pp. 279–288.
ICALPICALP-1983-Arnold #infinity
Topological Characterizations of Infinite Behaviours of Transition Systems (AA), pp. 28–38.
ICALPICALP-1983-BrookesR #equivalence #logic #programming
Behavioural Equivalence Relations Induced by Programming Logics (SDB, WCR), pp. 97–108.
SIGIRSIGIR-1983-Borgman #information retrieval #monitoring #online
End User Behavior on an Online Information Retrieval System: A Computer Monitoring Study (CLB), pp. 162–176.
DACDAC-1983-McFarland #clustering #hardware
Computer-aided partitioning of behavioral hardware descriptions (MCM), pp. 472–478.
DACDAC-1983-WalkerT
Behavioral level transformation in the CMU-DA system (RAW, DET), pp. 788–789.
ICSEICSE-1982-Abu-SufahLMY #source code
Experimental Results on the Paging Behavior of Numerical Programs (WAAS, RL, MM, PY), pp. 110–119.
VLDBVLDB-1981-Brodie #database #modelling #on the #semantics
On Modelling Behavioural Semantics of Databases (MLB), pp. 32–42.
DACDAC-1981-Glasser
The analog behavior of digital integrated circuits (LAG), pp. 603–612.
DACDAC-1980-LeinwandL #algebra #analysis #nondeterminism
Algebraic analysis of nondeterministic behavior (SML, TL), pp. 483–493.
CADECADE-1980-Bruynooghe #analysis #dependence #logic programming #source code
Analysis of Dependencies to Improve the Behaviour of Logic Programs (MB), pp. 293–305.
ICALPICALP-1979-Selman #polynomial #set
P-Selective Sets, Tally Languages, and the Behavior of Polynomial Time Reducibilities on NP (ALS), pp. 546–555.
DACDAC-1979-Johnson #development
Behavioral-level test development (WAJ), pp. 171–179.
SOSPSOSP-1979-AimesL #communication #network
The Behavior of Ethernet-Like Computer Communication Networks (GTA, EDL), pp. 66–81.
ICSEICSE-1978-Brooks #comprehension #re-engineering #using
Using a Behavioral Theory of Program Comprehension in Software Engineering (REB), pp. 196–201.
ICSEICSE-1978-RiddleWSSS #design #modelling
Behavior Modelling During Software Design (WER, JCW, JHS, ARS, AMS), pp. 13–22.
ICSEICSE-1976-PimontR #analysis #assessment #reliability #source code
A Software Reliability Assessment Based on a Structural and Behavioral Analysis of Programs (SP, JCR), pp. 486–491.
STOCSTOC-1976-Yao #algorithm #on the #set
On the Average Behavior of Set Merging Algorithms (ACCY), pp. 192–195.
VLDBVLDB-1975-Chin #analysis
Analysis of VSAM’s Free-Space Behavior (YHC), pp. 514–515.
SOSPSOSP-1971-Rodriguez-Rosell #how #parametricity
Experimental Data on How Program Behavior Affects the Choice of Scheduler Parameters (JRR), pp. 156–163.
SOSPSOSP-1967-Denning68 #set
The Working Set Model for Program Behaviour (PJD), pp. 323–333.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.